• 제목/요약/키워드: Mutually Exclusive Projects

검색결과 5건 처리시간 0.023초

다수의 투자대안들에 대한 수익률 기준의 경제성 평가방법 (Economic Evaluation Method Based on Rate of Return for Multiple Investment Alternatives)

  • 김진욱
    • 산업경영시스템학회지
    • /
    • 제42권1호
    • /
    • pp.137-142
    • /
    • 2019
  • There are two methods for evaluating two or more mutually exclusive projects. One is a total investment approach and the other is an incremental investment approach. The former can rank projects by the criterion of the net present value, but the latter can't do it. An incremental investment approach is only possible when all pairwise alternatives are compared. Thus an incremental investment approach is superior in ranking them over an incremental investment approach. To do so, a principle of comparison must be established. Comparisons of profitability are reasonable when operating the same amount of investment over the same period of time. One principle is that all projects are invested in the largest of the projects. Another principle is that all projects are invested during the longest project life of the projects. In this paper, even if the principle is followed, it will be shown that the external rate of return fails to rank them. However, the productive rate of return criterion would prove to be able to rank them like the net present value standard, provided that the principle of comparison is kept. In addition, rate of returns can be assessed so that all mutually exclusive projects can be compared at once, such as on the criterion of the net present value. That is, it can be also compared with many other returns, such as the profit rates on financial investments or real investments.

상호배타적 투자대안들의 순위매김 (Ranking Mutually Exclusive Alternatives)

  • 김진욱;차동수;박춘태
    • 산업경영시스템학회지
    • /
    • 제28권1호
    • /
    • pp.134-139
    • /
    • 2005
  • There are two approaches for evaluating two or more investment projects. One is a total investment approach and the other is an incremental investment approach. We present that ranking projects by the latter is not sufficient for an investor to accept the next best alternative. We prove that ranking projects by the former is superior to that by the latter. We also prove that the ranks obtained by the criteria like ORR and B/C ratio are consistent to the ranks by DCF criteria. However the result is different when IRR is adapted.

QFD와 AHP를 이용한 ITS 프로젝트관리자 핵심역량 연구 (A Study on Core Competencies of ITS Project Managers Using QFD and AHP)

  • 이봉우;김자희;김우제
    • 한국IT서비스학회지
    • /
    • 제10권1호
    • /
    • pp.89-103
    • /
    • 2011
  • ITS (Intelligent Transportation System) has been more popular but ITS project managements remain complex because of diverse stakeholders and multidisciplinary processes of ITS. The multidisciplinary process enforces specialized competencies on ITS project managers comparing to other system integration project managers. In this paper, we derived core competencies of ITS projects from previous researches, built the hierarchy of the competencies, and employed AHP (Analytic Hierarchy Process) surveying ITS project managers and auditors with the hierarchy. Finally, we analyzed the difference of evaluation model on ITS project manager between project managers and auditors using Mann-Whitney U test. Additionally we suggest a method of building MECE (Mutually Exclusive and Collectively Exhaustive) structure for AHP using the HoQ (House of Quality). We expect our model to give some inspirations for raising capable ITS project managers and selecting a proper project manager for an ITS project.

컴포넌트의 다면성과 서비스를 기반으로 하는 재사용 모델 (A Reuse Model Utilizing Diverse Aspects of Components and Services)

  • 박수진;박수용
    • 한국정보과학회논문지:소프트웨어및응용
    • /
    • 제34권4호
    • /
    • pp.303-316
    • /
    • 2007
  • 소프트웨어 재사용을 위해 여러 가지의 접근법이 제시되어 왔으나,소프트웨어 개발자들은 이미 개발된 소프트웨어 컴포넌트를 재사용하는데 있어서 여전히 회의적이다. 여러 가지 원인이 있겠으나,기존의 재사용 접근법들이 개발자들이 재사용에 기울이는 노력을 감소시키는데 실질적인 도움을 주지는 못한 것이 가장 큰 원인 중 하나라고 볼 수 있다. 이러한 문제점 해결을 위해 본 논문에서는 RAS기반의 명세를 중심으로 컴포넌트의 다양한 측면을 활용하는 재사용 모델을 제시한다. 제시된 재사용 모델의 실용성 검증을 위해 실제적인 사례연구를 진행하였으며, 기존의 소스코드 기반의 소프트웨어 재사용 프로세스와 비교한 실험을 통해 재사용의 효율성 증가를 검증하였다. 이러한 검증을 통해,제안된 재사용 모델이 이미 개발된 기존 컴포넌트를 개발자들이 검색하고 이해하는데 소요되었던 시간을 감소시킴으로써 전반적인 재사용 소요비용 감소시키고 있음을 확인할 수 있었으며,제품라인공학과 같은 접근방법과 비교하여 일상적인 개발 공정의 지연을 초래할 수 있는 초기 투자비용을 최소화함에 따라,자발적인 개발자들의 참여를 끌어낼 수 있다는 점에서 차별성을 찾을 수 있다. 뿐만 아니라, 제안된 재사용 모델은 컴포넌트 기반 개발 방법론이나 제품라인공학과 같은 기존의 재사용 방법들과 배타적인 개념이 아니므로,필요에 따라 함께 적용하여 재사용 효과를 배가시킬 수 있을 것으로 기대한다.

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • 제20권2호
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.