• Title/Summary/Keyword: Owners

Search Result 1,357, Processing Time 0.023 seconds

A Study on User Competency Training for Building Space Management Platform for Urban Regeneration (도시재생을 위한 건물공간관리 플랫폼 사용자 역량 교육에 관한 연구)

  • Kang, Hyun-joo;Kim, Chee-Yong
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.3
    • /
    • pp.499-507
    • /
    • 2020
  • This paper is one of the types of 'sharing economy', a social economic model that borrows and shares things, spaces, and services from the development of the 4th Industrial Revolution. Through sharing of empty space and time in the city, I would like to suggest a way to reduce the closure of small business owners in order to create jobs, which is one of urban problems in the community. We also build a platform that utilizes the free time and space of buildings through space sharing, one of the types of sharing economy, and provides education programs for start-up education, promotion, marketing, and consulting by matching small business owners with building owners. Therefore, in this paper, by sharing the space and time, the landlord and the small business can share the profits of the small business by reducing the business owner's closure and the job creation plan. Coaching urban regeneration was proposed.

An Effective Analysis and Management of Technical Risk to Turn-key based Plant Construction Contracts using Systems Engineering (시스템엔지니어링을 이용한 턴키방식 플랜트 건설계약의 기술적 위험요인 효과적 분석 및 관리)

  • Hong, Dae Geun;Byun, Hee Chul;Suh, Suk-Hwan
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.10 no.2
    • /
    • pp.59-69
    • /
    • 2014
  • In the bidding stage of turn-key based plant construction contracts, owners provide design and performance basis for contractors instead of giving design drawing. To win the bid for a plant construction, the contractors should be obliged to satisfy and ensure owners'requirements such as design and performance basis in a plant construction project, In other words, owners imposes technical risk of the design to the contractors by specifying responsibility for the analysis and verification of the plant construction. Thus, it is very important that contracters make accurate and realistic basic design plan in a short period of time. To deal with such a situation, we propose a systems engineering approach for the analysis and management of the technical risk. Specifically, we first: 1) Analyzes technical risk related with the plant design information for the bidders, followed by 2) Developing stakeholder requirements for the basic engineering design, and 3) System requirements for dealing with technical risk. Also, in this paper, we proposed converting method from MOE(Measure of Effectiveness) to MOP(Measure of Performance) in the risk analysis. To show the effectiveness of the proposed method, we carried out a case study.

Success Factors of Immigrant-Owned Informal Grocery Shops in South African Townships: Native Shop-Owners' Account

  • Mukwarami, Josephat;Tengeh, Robertson Khan;Iwu, Chux Gervase
    • Journal of Distribution Science
    • /
    • v.16 no.3
    • /
    • pp.49-57
    • /
    • 2018
  • Purpose - This paper explores the perceptions held by native grocery shop-owners of their foreign counterparts to ascertain if there are lessons to be shared especially regarding operational/survival strategies. Research design, data and methodology - A questionnaire was used to collect data from 121 subjects who were purposively selected. The data was processed and analysed with the aid of Statistical Package for the Social Sciences(SPSS) software. Results - The study found that native South Africans hold the perception that immigrants have operational advantage over them. The study also found that with bulk buying, immigrants' stores stock a larger variety of groceries while their items are sold cheaper. It is also arguable from the standpoint of the findings that immigrant grocery store owners avoid expensive lifestyles which often is common among natives who own informal grocery shops. Conclusions - It is the position of this paper that adopting the strategies utilized by immigrant entrepreneurs, informal grocery shops owned by native South Africans are likely to see an improvement in their township-based grocery stores. A major merit of this study beyond its novelty is its potential to advance learnership and collaboration between immigrant entrepreneurs and their native counterparts.

Protecting Copyright Owners in Nigeria: A Panacea for Intellectual Development

  • Owushi, Emmanuel
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.10 no.1
    • /
    • pp.21-34
    • /
    • 2020
  • The paper looks at protecting copyright owners in Nigeria: a panacea for intellectual development. A descriptive survey design was adopted in carrying out the study. The sample size for the study was 112. Three research objectives guided the study. The study utilized a self-developed questionnaire for data collection. A total of 112 copies of the questionnaire were distributed to librarian and lecturers, out of which 108 copies were duly filled and returned, representing 96.4%. The collected data was arranged in frequency and analyzed using percentage and mean score. The findings revealed that protection of copyright will encourage creators of intellectual works, and that if authors are well remunerated there is likelihood of adequate availability of various publications to meet information needs of Nigerians. The result showed that the right to intellectual properties is one of the ways to encourage intellectual development. The finding revealed that copyright protection provides security for intellectual product and does not negatively affect the availability of intellectual materials. Based on the research findings, it was recommended that owners of intellectual property deserve good earnings for their intellectual works in order to promote Knowledge proliferation and availability so as to meet the reading needs of the citizens at the various levels. The study also recommended that all cases relating to copyright violation in our courts should be summarily dealt with. The study advocated that the provision on the punishment should be reviewed such that it could deter people from infringing on authors rights.

Efficient Public Verification on the Integrity of Multi-Owner Data in the Cloud

  • Wang, Boyang;Li, Hui;Liu, Xuefeng;Li, Fenghua;Li, Xiaoqing
    • Journal of Communications and Networks
    • /
    • v.16 no.6
    • /
    • pp.592-599
    • /
    • 2014
  • Cloud computing enables users to easily store their data and simply share data with others. Due to the security threats in an untrusted cloud, users are recommended to compute verification metadata, such as signatures, on their data to protect the integrity. Many mechanisms have been proposed to allow a public verifier to efficiently audit cloud data integrity without receiving the entire data from the cloud. However, to the best of our knowledge, none of them has considered about the efficiency of public verification on multi-owner data, where each block in data is signed by multiple owners. In this paper, we propose a novel public verification mechanism to audit the integrity of multi-owner data in an untrusted cloud by taking the advantage of multisignatures. With our mechanism, the verification time and storage overhead of signatures on multi-owner data in the cloud are independent with the number of owners. In addition, we demonstrate the security of our scheme with rigorous proofs. Compared to the straightforward extension of previous mechanisms, our mechanism shows a better performance in experiments.

A Security-Enhanced Identity-Based Batch Provable Data Possession Scheme for Big Data Storage

  • Zhao, Jining;Xu, Chunxiang;Chen, Kefei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4576-4598
    • /
    • 2018
  • In big data age, flexible and affordable cloud storage service greatly enhances productivity for enterprises and individuals, but spontaneously has their outsourced data susceptible to integrity breaches. Provable Data Possession (PDP) as a critical technology, could enable data owners to efficiently verify cloud data integrity, without downloading entire copy. To address challenging integrity problem on multiple clouds for multiple owners, an identity-based batch PDP scheme was presented in ProvSec 2016, which attempted to eliminate public key certificate management issue and reduce computation overheads in a secure and batch method. In this paper, we firstly demonstrate this scheme is insecure so that any clouds who have outsourced data deleted or modified, could efficiently pass integrity verification, simply by utilizing two arbitrary block-tag pairs of one data owner. Specifically, malicious clouds are able to fabricate integrity proofs by 1) universally forging valid tags and 2) recovering data owners' private keys. Secondly, to enhance the security, we propose an improved scheme to withstand these attacks, and prove its security with CDH assumption under random oracle model. Finally, based on simulations and overheads analysis, our batch scheme demonstrates better efficiency compared to an identity based multi-cloud PDP with single owner effort.

Information and Communication Technology Adoption in Small- and Medium-Sized Enterprises: Demographic Characteristics

  • KUSUMA, Hadri;MUAFI, Muafi;AJI, Hendy Mustiko;PAMUNGKAS, Sigit
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.10
    • /
    • pp.969-980
    • /
    • 2020
  • This study examines the acceptance factors, barriers, benefits, and strategies for resolving Information and Communication Technology (ICT) adoption and usage problems based on the different demographic characteristics of SMEs. The demographic characteristics investigated are gender, educational qualifications, age, managerial status, and years of business experience. To the best of our knowledge, this paper is the first to examine a more comprehensive demographic characteristics in the context of ICT adoption. A survey using self-administered questionnaires was conducted to retrieve information from SME owners/managers in Pekalongan, the local city of Indonesia. The items in the questionnaire were discussed with various experts in the field and a pilot study was conducted prior to the distribution of the research instrument. The study made some interesting findings. No significant differences were found in the SMEs' adoption factors between the demographics of gender groups and educational qualifications. However, significant disparities were found to exist among the age compositions, managerial status, and years in business. Additionally, younger managers/owners of SMEs find it easier to understand the background factors of ICT adoption. Lastly, older managers/owners are more likely to stick to the organizational status quo, be less able to learn new technology, and more likely to avoid risky decisions.

Access Right Assignment Mechanisms for Secure Home Networks

  • Kim, Tiffany Hyun-Jin;Bauer, Lujo;Newsome, James;Perrig, Adrian;Walker, Jesse
    • Journal of Communications and Networks
    • /
    • v.13 no.2
    • /
    • pp.175-186
    • /
    • 2011
  • The proliferation of advanced technologies has been altering our lifestyle and social interactions-the next frontier is the digital home. Although the future of smart homes is promising, many technical challenges must be addressed to achieve convenience and security. In this paper, we delineate the unique combination of security challenges specifically for access control and consider the challenges of how to simply and securely assign access control policies to visitors for home devices and resources. We present a set of intuitive access control policies and suggest four access control settings based on our in-person interview results. Furthermore, we propose the automated Clairvoyant access right assignment (CARA) mechanism that utilizes home owners' social relationship to automatically deduce to which class a visitor belongs. The combination of CARA and the suggested mapping provides a promising first step for home policy assignment such that nonexpert home owners can let visitors use their home network with confidence. We anticipate that future research can build on our proposed mechanisms to provide confidence to non-expert home owners for letting visitors use their home network.

Beauty Shop Owner's Employment of Immigrant Women (미용산업고용주의 다문화이주여성에 대한 고용 연구)

  • Kim, Soon Sim
    • The Korean Journal of Community Living Science
    • /
    • v.26 no.2
    • /
    • pp.415-426
    • /
    • 2015
  • This study examines the employment experience of beauty shop owners with respect to immigrant women. A quantitative analysis was conducted through a survey of beauty shop employers. Total 400 beauty shop owners were given a questionnaire and 380 responses were obtained. IBM SPSS 21.0 was used for frequency analysis, chi-square test, t-test using obtained data. Most of the respondents reported rare immigrant women employment. In addition, they were not likely to have experienced benefits from government support system and had little knowledge of such systems. According to an the employment analysis, there were differences in business areas, locations, regions, business type, and the number of employees according to characteristics of beauty shops. Immigrant women were more likely to be employed in Gyeonggi than in Seoul and Chungcheong Province and in skincareshops than in hairshops, nailshops and make-up shops. Shops with fewer than six employees were more likely to employ immigrant women. Those shop owners has employed immigrant women were more likely to hire immigrant women. Employment intentions of employers included mitigation services for auxiliary and sharing purposes, government benefits, and solutions for employment difficulties. Government support had a positive effect on employment intentions of beauty shop employers. Employers with knowledge of government support programs were more likely to hire immigrant women. The results suggest that the government should make more efforts to promote relevant policies. Future research should identify the reasons why few immigrant women are employed.

Proposed Open Source Model for Video Offline Distribution using Cinema DRM for Home Users

  • Pardeshi, Sunil;Kwon, Soon Chul;Lee, Seung Hyun;Hamacher, Alaric
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.7 no.1
    • /
    • pp.10-14
    • /
    • 2015
  • Video Content owners seek to squeeze the maximum amount of revenue from their assets via distribution into more territories. Digital Cinema Package(DCP), trusted solution to distribute protected content to theaters, caters to relatively small user base, which limits revenue. With the growth of the Internet & other digital media, the economics of media content has changed dramatically. Security remains main concern to deliver content to millions of consumers using intelligent digital display devices like Tablets, Smartphones, Smart TVs, Desktop & Laptop. By making the video content available to this segment securely, content owners will benefit from increased revenue. Through this paper we propose Open Source HomeDCP model to distribute the content to home users for offline viewing. We propose to include other open source CODEC than JPEG2000/MPEG2, which are specifically designed for theatrical performance. Final image size will be further reduced considering the display device resolution where video will be finally played. Key Delivery Message(KDM) system to be altered to suit new devices. This will be a big boost to Content Economy as content owners would be able to distribute the content securely to the wider audience & ensure more revenue.