• 제목/요약/키워드: Location Tracking Service

검색결과 166건 처리시간 0.022초

항공안전규제와 새로운 이슈에 대한 ICAO의 대응 (Aviation Safety Regulation and ICAO's Response to Emerging Issues)

  • 신동춘
    • 항공우주정책ㆍ법학회지
    • /
    • 제30권1호
    • /
    • pp.207-244
    • /
    • 2015
  • 항공안전은 계속적인 위험성의 확인과 관리를 통하여 개인에의 위해나 재산손실의 위험이 수용 가능한 수준으로 감소되거나 그 이하로 유지되는 상태를 의미하며, 항공 안전을 증진하기 위한 다양한 방법이 모색되고 있다. 최근 10여 년 간 국제민간항공은 비교적 높은 수준의 안전을 유지하여 왔으나 2014년부터 여러 가지 사고가 발생하면서 국제민간항공계가 다시 긴장하고 있고 ICAO를 중심으로 다각적인 대응방안을 모색하고 있다. 항공안전은 국제민간항공을 지탱하는 가장 중요한 요소이다. 국제민간항공협약(시카고협약)은 서문에서 안전과 질서가 중요함을 강조하였고, 협약의 다수 조문이 안전에 관계되어 있다. 부속서(1-19)는 몇 개를 빼고는 모두 안전에 관한 국제표준과 권고를 규정하고 있다. 특히 부속서 19는 안전관리체제에 대하여 기존의 부속서에 산재되어 있는 규정을 통합했고 도한 새로운 규정을 신설하였다. 또한 ICAO는 안전 문제를 증진하기 위한 의사결정과 입법 기능을 가지고 있으며 항행위원회, 법률위원회, 항공운송위원회 등과 이사회의 심의를 기초로 하여 총회가 최종 결정 권한을 가지고 있다. 보조 기구로서 전문가 그룹, 태스크포스 등을 수시로 설치, 운영하고 있고, 사무국은 이러한 제반 기구의 사무를 보조하고 있다. 또한 ICAO는 USAOP과 USAP 프로그램을 통하여 체약국의 안전 및 보안 수준을 점검하고 있고, 미국, EU, IATA 등이 별도의 안전점검제도를 운영하고 있다. 2014년에 발생한 MH370기 실종 사건은 회원국, 관제기관, 항행시설, 항공기 등이 제공한 정보를 토대로 전세계추적시스템(Global Tracking System)의 구축을 통하여 항공기의 위치를 실시간 추적 가능토록 하여 문제를 해결하려고 하고 있다. 또한 우크라이나 상공에서 격추된 MH17 사건 이후 ICAO는 회원국이 제공한 정보 및 NOTAM, AIP 등 운항정보를 기반으로 정보를 공유하는 웹사이트를 운영함으로써 분쟁지역에서의 위험관리를 통하여 유사한 사고를 방지하려고 하고 있다. 에볼라가 서아프리카에서 발생한 이래 보건당국과 항공당국간의 긴밀한 협조를 통하여 항공기에 의한 전염병의 확산을 막도록 다각적인 조치를 강구하고 있다. 또한 QZ8501 사건은 악기상하에서 제대로 대처하지 못한 운항의 결과로서 이 또한 ICAO를 중심으로 추가적인 보완 조치를 강구하고 있다. 이밖에도 2015년 3월에 발생한 저먼윙즈의 부기장에 의한 항공기 추락사고와 관련 후속 조치의 강구가 요구되고 있다. 국제항공계는 이러한 사고를 예방하고 안전 수준을 더욱 제고하기 위해서는 안전 관련 데이터 및 정보의 보호와 공유가 필수적임을 인식하여 현재 있는 정보 보호 및 공유에 관한 조항 이외에 추가적인 규정을 제의하고 있으며 회원국에 의한 검토를 거쳐 부속서나 ICAO 안내 문서에 반영될 예정으로 있다. ICAO의 문제해결 방식은 네 가지 차원에서 접근되고 있다. 시간적으로 과거의 경험과 정보를 분석하는 토대위에서 단기, 중기, 장기의 대책을 마련하고, 공간적으로는 각 회원국, 지역, 전 세계에 적용될 수 있는 대책을 수립하고 있고, 항공사, 공항, 지역 사회, 소비자, 제조자, 항행서비스 공급자, 관제기관, 산업계, 보험업계 등을 망라하는 이해관계자를 고려하여야 하고, 규제적인 개선을 위하여 최선의 관행, ICAO 안내문서, 표준 및 권고 관행에 반영될 방안을 심의하고 결정하는 구조를 가지고 있다.

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • 제20권2호
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.

U-마켓에서의 사용자 정보보호를 위한 매장 추천방법 (A Store Recommendation Procedure in Ubiquitous Market for User Privacy)

  • 김재경;채경희;구자철
    • Asia pacific journal of information systems
    • /
    • 제18권3호
    • /
    • pp.123-145
    • /
    • 2008
  • Recently, as the information communication technology develops, the discussion regarding the ubiquitous environment is occurring in diverse perspectives. Ubiquitous environment is an environment that could transfer data through networks regardless of the physical space, virtual space, time or location. In order to realize the ubiquitous environment, the Pervasive Sensing technology that enables the recognition of users' data without the border between physical and virtual space is required. In addition, the latest and diversified technologies such as Context-Awareness technology are necessary to construct the context around the user by sharing the data accessed through the Pervasive Sensing technology and linkage technology that is to prevent information loss through the wired, wireless networking and database. Especially, Pervasive Sensing technology is taken as an essential technology that enables user oriented services by recognizing the needs of the users even before the users inquire. There are lots of characteristics of ubiquitous environment through the technologies mentioned above such as ubiquity, abundance of data, mutuality, high information density, individualization and customization. Among them, information density directs the accessible amount and quality of the information and it is stored in bulk with ensured quality through Pervasive Sensing technology. Using this, in the companies, the personalized contents(or information) providing became possible for a target customer. Most of all, there are an increasing number of researches with respect to recommender systems that provide what customers need even when the customers do not explicitly ask something for their needs. Recommender systems are well renowned for its affirmative effect that enlarges the selling opportunities and reduces the searching cost of customers since it finds and provides information according to the customers' traits and preference in advance, in a commerce environment. Recommender systems have proved its usability through several methodologies and experiments conducted upon many different fields from the mid-1990s. Most of the researches related with the recommender systems until now take the products or information of internet or mobile context as its object, but there is not enough research concerned with recommending adequate store to customers in a ubiquitous environment. It is possible to track customers' behaviors in a ubiquitous environment, the same way it is implemented in an online market space even when customers are purchasing in an offline marketplace. Unlike existing internet space, in ubiquitous environment, the interest toward the stores is increasing that provides information according to the traffic line of the customers. In other words, the same product can be purchased in several different stores and the preferred store can be different from the customers by personal preference such as traffic line between stores, location, atmosphere, quality, and price. Krulwich(1997) has developed Lifestyle Finder which recommends a product and a store by using the demographical information and purchasing information generated in the internet commerce. Also, Fano(1998) has created a Shopper's Eye which is an information proving system. The information regarding the closest store from the customers' present location is shown when the customer has sent a to-buy list, Sadeh(2003) developed MyCampus that recommends appropriate information and a store in accordance with the schedule saved in a customers' mobile. Moreover, Keegan and O'Hare(2004) came up with EasiShop that provides the suitable tore information including price, after service, and accessibility after analyzing the to-buy list and the current location of customers. However, Krulwich(1997) does not indicate the characteristics of physical space based on the online commerce context and Keegan and O'Hare(2004) only provides information about store related to a product, while Fano(1998) does not fully consider the relationship between the preference toward the stores and the store itself. The most recent research by Sedah(2003), experimented on campus by suggesting recommender systems that reflect situation and preference information besides the characteristics of the physical space. Yet, there is a potential problem since the researches are based on location and preference information of customers which is connected to the invasion of privacy. The primary beginning point of controversy is an invasion of privacy and individual information in a ubiquitous environment according to researches conducted by Al-Muhtadi(2002), Beresford and Stajano(2003), and Ren(2006). Additionally, individuals want to be left anonymous to protect their own personal information, mentioned in Srivastava(2000). Therefore, in this paper, we suggest a methodology to recommend stores in U-market on the basis of ubiquitous environment not using personal information in order to protect individual information and privacy. The main idea behind our suggested methodology is based on Feature Matrices model (FM model, Shahabi and Banaei-Kashani, 2003) that uses clusters of customers' similar transaction data, which is similar to the Collaborative Filtering. However unlike Collaborative Filtering, this methodology overcomes the problems of personal information and privacy since it is not aware of the customer, exactly who they are, The methodology is compared with single trait model(vector model) such as visitor logs, while looking at the actual improvements of the recommendation when the context information is used. It is not easy to find real U-market data, so we experimented with factual data from a real department store with context information. The recommendation procedure of U-market proposed in this paper is divided into four major phases. First phase is collecting and preprocessing data for analysis of shopping patterns of customers. The traits of shopping patterns are expressed as feature matrices of N dimension. On second phase, the similar shopping patterns are grouped into clusters and the representative pattern of each cluster is derived. The distance between shopping patterns is calculated by Projected Pure Euclidean Distance (Shahabi and Banaei-Kashani, 2003). Third phase finds a representative pattern that is similar to a target customer, and at the same time, the shopping information of the customer is traced and saved dynamically. Fourth, the next store is recommended based on the physical distance between stores of representative patterns and the present location of target customer. In this research, we have evaluated the accuracy of recommendation method based on a factual data derived from a department store. There are technological difficulties of tracking on a real-time basis so we extracted purchasing related information and we added on context information on each transaction. As a result, recommendation based on FM model that applies purchasing and context information is more stable and accurate compared to that of vector model. Additionally, we could find more precise recommendation result as more shopping information is accumulated. Realistically, because of the limitation of ubiquitous environment realization, we were not able to reflect on all different kinds of context but more explicit analysis is expected to be attainable in the future after practical system is embodied.

실시간 위치추적 및 정보가전제어를 지원하는 능동형 홈 서비스 시스템 환경 구축 및 응용 (A Construction of Active Home Service System Environment Supporting Both Real-Time Location Tracking and Information Appliance Control and Its Application)

  • 장재호;임정택;신창선;김남균;주수종
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2004년도 가을 학술발표논문집 Vol.31 No.2 (3)
    • /
    • pp.631-633
    • /
    • 2004
  • 본 논문에서는 유비쿼터스 홈 네트워킹 환경에서 사용자의 위치 이동을 실시간 추적하고 가정 내 주거 활동의 편의를 제공하는 정보가전기기들을 제어할 수 있는 능동형 홈 서비스 시스템을 제안한다. 본 시스템은 다계층의 분산시스템 환경으로 구성된다. 즉, 물리 센서와 정보가전기기 등이 존재하는 물리층과 유/무선 지원 인터넷/인트라넷 통신 플랫폼을 포함하는 시스템층, 그리고 물리적 장치들로부터 시스템층을 통해 들어오는 정보를 처리하는 응용층으로 구성되며 실 생활 공간 및 시간을 응용 시뮬레이션 환경으로 반영시킨다. 능동형 홈 서비스 시스템의 개발 목적은 실버아파트에서 독거노인의 위치기반 건강관리 정보 서비스 및 아파트 내 정보가전기기들의 맞춤형 제어를 제공하기 위함이다. 이와 같은 시스템을 구축하기 위해서는 홈 네트워크 내에서 사용자의 이동 위치를 파악하는 실시간 위치추적 기술과 정보가전기기들의 동작을 실시간 제어하기 위한 기술이 요구된다. 제안한 시스템에서는 UC at Irine의 DREAM Lab.에서 개발한 TMO(Time-triggered Message -triggered Objecl) 스킴을 적용하여 각 물리 센서와 정보가전기기들을 응용의 구성요소로 개발했다. 이를 통해 가정 내에 이동하는 TMO로 매핑된 이동객체를 추적하고 또한 홍 네트워크로 연결된 정보가전기기들을 정보가전 TMO 동작객체로 매핑하여 이들 사이의 능동적인 상호동작을 통해 맞춤형 서비스 및 실시간 제어가 가능하도록 했다. 마지막으로, 실시간 위치추적 및 정보가전제어 응용 시뮬레이션을 통해 능동형 홈 서비스 시스템을 구성하는 개별 동작객체들의 기능성과 수행성을 검증했다.황에 대하여 소개한다.이스는 실험정보가 저장된 데이터베이스, 분석결과가 저장된 데이터베이스, 그리고 유전자 정보 탐색을 위한 데이터베이스로 분류해 데이터를 효율적으로 관리할 수 있게 하였다. 본 시스템은 LiNUX를 운영체계로 하고 데이터베이스는 MYSQL로 하여 JSP, Perl. 통계처리 언어인 R로 구현되었다.프트웨어를 사용하지 않고도 국내의 순수 솔루션인 리눅스 기반의 LonWare 3.0 다중 바인딩 기능을 통해 저 비용으로 홈 네트워크 구성 관리 서버 시스템 개발에 대한 비용을 줄일 수 있다. 기대된다.e 함량이 대체로 높게 나타났다. 점미가 수가용성분에서 goucose대비 용출함량이 고르게 나타나는 경향을 보였고 흑미는 알칼리가용분에서 glucose가 상당량(0.68%) 포함되고 있음을 보여주었고 arabinose(0.68%), xylose(0.05%)도 다른 종류에 비해서 다량 함유한 것으로 나타났다. 흑미는 총식이섬유 함량이 높고 pectic substances, hemicellulose, uronic acid 함량이 높아서 콜레스테롤 저하 등의 효과가 기대되며 고섬유식품으로서 조리 특성 연구가 필요한 것으로 사료된다.리하였다. 얻어진 소견(所見)은 다음과 같았다. 1. 모년령(母年齡), 임신회수(姙娠回數), 임신기간(姙娠其間), 출산시체중등(出産時體重等)의 제요인(諸要因)은 주산기사망(周産基死亡)에 대(對)하여 통계적(統計的)으로 유의(有意)한 영향을 미치고 있어 $25{\sim}29$세(歲)의 연령군에서, 2번째 임신과 2번째의 출산에서 그리고 만삭의 임신 기간에, 출산시체중(出産時體重) $3.50{\

  • PDF

서버와 태그 비동기시에도 효율적으로 검색이 가능한 해시기반 RFID 인증 프로토콜 (Hash-based Authentication Protocol for RFID Applicable to Desynchronization between the Server and Tag with efficient searching method)

  • 권혜진;김해문;정선영;김순자
    • 정보보호학회논문지
    • /
    • 제21권5호
    • /
    • pp.71-82
    • /
    • 2011
  • RFID 시스템은 여러 장점을 가지며 다양한 곳에서 이용되고 있다. 그러나 현재의 RFID 시스템은 무선통신과 저가 태그의 사용으로 인해 도청, 재전송 공격, 메시지 탈취, 태그에 대한 물리적 공격에 취약하다. 이런 공격들은 태그와 리더 사칭, 태그 무능화를 통한 서비스 거부공격, 태그 소지자의 위치 추적등을 유발한다. 이런 취약점을 해결하기 위해 다수의 RFID 인증 프로토콜이 제안되었다. 특히 Weis, Sarma, Rivest, Engels이 해시 기반 RFID 인증 프로토콜을 제안한 이래로, 많은 해시 기반 RFID 인증 프로토콜이 제안되었고 최근의 해시 기반 프로토콜은 보안성과 만족할 만한 수준의 프라이버시를 제공한다. 그러나 보안성과 만족할 만한 수준의 프라이버시를 제공하는 동시에 서버에서의 태그 인식 시간을 줄이는 것은 여전히 풀리지 않는 문제다. 이에 우리는 태그가 이전 통신 상태에 따라 응답 메시지를 생성하는 프로토콜을 제안한다. 그 결과 보안성과 프라이버시를 보장하는 동시에 서버에서 합리적인 시간안에 태그를 인식할 수 있다. 구체적으로 제안하는 프로토콜은 세션키와 롱텀 고정키를 모두 사용해서 이전 세션이 비정상 종료 된 경우에 비슷한 수준의 안전성을 제공하는 기존의 연구결과에 비해 태그 인식시간이 50%로 절감한 효과를 제공한다.

제이륜국제성공(第二轮国际成功): 일개안례연구(一个案例研究) (International Success the Second Time Around: A Case Study)

  • Colley, Mary Catherine;Gatlin, Brandie
    • 마케팅과학연구
    • /
    • 제20권2호
    • /
    • pp.173-178
    • /
    • 2010
  • 这是一家私人, 第三代家族拥有的公司, Boom Technologies 公司(BTI). 对电力设施提供产品和服务的供应商, 通信和承包商的市场,不断进步的出口. 尽管在2008年出口销售只占总收入的5%, BTI已形成了一个完整的出口部门. 他们的出口部门的执行董事揭示了一家私营公司的试验和错误以及他们对成功的海外市场的疑问. 自成立以来, BTI始终相信它最大的资产是它的雇员. 当出口销售因为缺乏战略和方向而挣扎时, BTI为其出口部门雇了一位董事总经理. 在BTI总裁和总经理的领导下, 他们很好的利用了这个部门的技能和知识. 为向海外扩展他们的市场份额, 增加出口销售他们进行了机构调整. 结果就是, 出口销售增加了4倍, 国家的地区经理增加了, 同时成功养成了分销渠道网络. 有时, 由于公司的结构, 收入形成很难决定. 因此, 在1996年, 出口部门重组为有限责任公司. 这使得公司改进收入和费用. 最初, 80%的BTI出口销售来自两个国家;因此,最初在海外出售的方法并没有达到预期目标. 然而, 所做的修改, 使得现在公司 经营, 销售超过80个国家. 总经理指出主要有三个出口扩张挑战 1. 产品和船运—BTI主要障碍是产品装配. 最初, 大多数的产品被聚集在美国, 这增加了运输包装费用. 有这么多的部分指定订购, 很多次定的东西到的时候有些零部件都丢失了. 失踪的零件价值上万美元. 装运这些失踪的部分也花费成千上万的美元, 外加一个延迟交货时间六到八周, 所有的费用都由BTI出. 2. 产品适应—在BTI80个出口国家中, 每个国家的安全, 产品标准都不同. 重量, 特殊证, 产品的规格要求, 测量系统的稳定性, 卡车都会因国别而不同. 作为一种准入障碍,以致很难使产品适应. 技术和安全标准的障碍, 作为一种保护国内产业的方法, 可以阻碍成功的进入外国市场 3. 市场的挑战—分销的重要性给BTI带来了很多挑战,因为他们试图根据他们的分销系统来确定每个国家如何操作. 有些国家已经从一个小的竞争对手, 只生产一种具有竞争力的产品而极具竞争力. 而BTI制造超过100种的产品. 营销资料是另一个BTI所关心的, 因为他们试图对经销商推动销售成本. 从翻译和文化差异的角度, 合适的市场营销资料可能会花费很多. 此外, 美国的纸张大小不同于别的一些国家, 当试图复制相同的布局和设计时, 就会出现许多问题. 分销已经成为BTI所面临的挑战之一, 公司宣称他们的分销网络是他们的竞争优势之一, 因为他们的分销商的位置和名字都是保密的. 另外, BTI每年有两次奉献: 培训分销商一年, 另一个是分销商会议. 产品, 航运, 产品适应性, 营销这些挑战,这些海外市场错综复杂需要时间和耐心. 另一个竞争优势是BTI的摇篮到坟墓的策略, 他们遵循产品销售到它的最终安息地, 无论卡车是出租或购买新的或用过的. 他们对该公司购买或租赁之前的产品都提供服务和设备维护计划和一份详细的费用分析. 扩大海外总是会面临挑战. 如总经理说, "如果你没有耐心(出口业务), 你最好做别的事." 知道如何快速适应提供必要的技能, 适应每个国家的不同需求, 以及独特的挑战, 使他们能够保持竞争力.