• Title/Summary/Keyword: Platform management

Search Result 2,214, Processing Time 0.033 seconds

The Impact of Managerial Response to Negative Customer Reviews on the Success of Accommodation Services: Evidence from Online Accommodation Reservation Platforms (부정적 리뷰의 대응 전략이 숙박시설 성공에 미치는 영향: 숙박 중개 플랫폼 사례)

  • Mingi Song;Heejin Seo;Gunwoong Lee
    • Information Systems Review
    • /
    • v.24 no.3
    • /
    • pp.1-21
    • /
    • 2022
  • This research investigates how a service provider's response(s) to negative customer reviews influences the success of accommodation services in the context of online accommodation reservation platforms. Specifically, we attempt to comprehend the important role of attentive and instant responses to users' negative review comments in fostering future success by analyzing panel data on 856 motels registered in the largest accommodation reservation platform in Korea. The results present that response volume (Attentiveness) and faster responses (Timeliness) are positively associated with success. We further find that the two review-response strategies have a positive interaction effect on success. Moreover, we show that the effect of review responses is strengthened when the reputation of motels drops. The key findings of this research offer a set of practical guidelines for accommodation owners to achieve business success by effectively managing customer reviews and claims

Research on digital evidence-based countermeasure depending on the type of small and medium-sized enterprises technology leakage accident (중소기업 기술유출사고 유형에 따른 디지털증거기반 대응방안 연구)

  • Jaeyun Wang;Hangbae Chang
    • Journal of Platform Technology
    • /
    • v.12 no.1
    • /
    • pp.67-76
    • /
    • 2024
  • Small and medium-sized enterprises play a fundamental role in the foundation of our country's industry and economy, and most technological innovations occur in small and medium-sized enterprises rather than large corporations. Technology development and innovation are the only way for small and medium-sized enterprises to survive in a fiercely competitive environment, so they focus on it, but interest and investment in technology protection tend to be stingy. As a result, industrial technology leakage accidents occur frequently, and it is difficult to meet improvement measures. When a leak occurs, digital evidence is required to prove criminal activity, but problems such as digital evidence being damaged or deleted due to management loopholes often occur. Therefore, through this study, we aim to design a digital evidence-based countermeasure depending on the type of technology leak accident. We will classify the types of technology leak incidents that actually occurred and study ways to secure digital evidence in the security environment of small and medium-sized businesses that operate internal information leak prevention solutions.

  • PDF

A Study on the Identification of Cloud Security Risks in the Manufacturing Industry (제조산업 클라우드 보안위험 식별 연구)

  • Junghun Oh;Juno Lee;Hangbae Chang
    • Journal of Platform Technology
    • /
    • v.12 no.2
    • /
    • pp.3-11
    • /
    • 2024
  • In the trend of digital transformation and the increase in non-face-to-face services triggered by the Fourth Industrial Revolution, the demand for cloud computing services is being sharply stimulated. Currently, the cloud is being introduced in various industrial sectors including public, IT, and finance, and the manufacturing industry is also adopting the cloud to secure future sustainability and is promoting innovation through smart manufacturing. However, it has been found that there are constraints in the adoption of cloud by manufacturing companies due to concerns about security. Existing studies that have identified cloud security risks have been limited to presenting general cloud security risks or technical security risks rather than focusing on the manufacturing industry. Therefore, this study aimed to identify cloud security risks in the manufacturing industry based on the actual concerns in the field. For this, expert interviews and literature research were conducted to newly identify cloud security risks in the manufacturing industry, and the adequacy and urgency of the selected security risks were verified through surveys. Based on this study, if a cloud security management system for the manufacturing industry is designed in the future, it is expected that the adoption of cloud in the manufacturing industry will be more activated.

  • PDF

An Air-Interface for Ad Hoc Networks Supporting High Mobility

  • Lott, Matthias;Ebner, Andre;Meincke, Michael;Halfmann, Rudiger;Wischhof, Lars;Schulz, Egon;Rohling,
    • Journal of Communications and Networks
    • /
    • v.6 no.4
    • /
    • pp.295-306
    • /
    • 2004
  • In this paper, a novel air-interface is presented for Fleet-Net1, a self-organizing network for inter-vehicle and vehicle-toroadsidecommunication. The air-interface is based upon the lowchip-rate version of UMTS/TDD. To adapt the cellular UMTS standard to an air-interface for ad hoc networks, changes of the physical layer, medium access control sub-layer and radio resource management are required. An overview of the required modifications is given here. Particularly, a decentralized synchronization mechanism is presented and analyzed by means of simulations. Furthermore, changes for the medium access control are explained in detail, which allow for an efficient operation in partly meshed networks and prioritization. Performance results of the overall system considering throughput and delay are derived by means of analytical evaluations and event-driven simulations. Based on realistic mobility models, it is shown that the presented solution provides a robust communication platform even in vehicular environments. The proposed air-interface is a cost-effective solution not only for inter-vehicle communication, but also for ad hoc networking in general, benefiting from the mass-market of UMTS.

Access Control of Visiting Mobile Node on the Foreign Domain Network in Mobile IPv6

  • Park, Sugil;Masayuki Abe;Kim, Kwangjo
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.495-498
    • /
    • 2002
  • The need for network protection, accounting and resource management in foreign administrative domain requires appropriate security services. In this paper, we propose an access control protocol to support the authentication between mobile node and visiting subnet. Our hybrid way of approach aims to reduce computational overhead and minimize the use of network bandwidth. We also propose non-certificate based public-key cryptography to provide non-repudiation, which does not require CRL retrieval and certificate validation.

  • PDF

Model-Driven Development of RTOS-based Embedded Software (RTOS-기반 임베디드 소프트웨어를 위한 모델기반 개발방법)

  • Maeng Ji-Chan;Kim Jong-Hyuk;Ryu Min-Soo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.05a
    • /
    • pp.1325-1328
    • /
    • 2006
  • 본 논문에서는 RTOS 기반 임베디드 소프트웨어 개발에 적합한 모델기반 방법론을 제안하고 이와 함께 개발된 자동코드생성 도구를 기술한다. 현재까지 알려진 대표적인 모델기반 방법론으로는 OMG (Object Management Group)의 MDA (Model-Driven Architecture)가 있으며, MDA 에서는 EJB, 웹서비스,.NET, 그리고 CORBA 와 같은 미들웨어 플랫폼을 대상으로 하는 응용 소프트웨어의 개발을 지원한다. 하지만, 통상적인 임베디드 시스템은 실시간성에 대한 요구조건은 물론 성능과 자원활용에 있어 많은 제약을 가짐에 따라 상당수의 임베디드 시스템은 미들웨어를 사용하지 않고 RTOS 상에서 직접 수행되도록 개발되고 있다. 이에 따라 본 연구에서는 MDA 방법론을 확장하여 플랫폼 의존적인 모델 (PSM, Platform Specific Model) 단계에서 추상화된 RTOS 행위를 표현할 수 있도록 추상 RTOS API (Generic RTOS API)를 정의하고, 아울러 추상화된 RTOS 행위를 자동으로 변환하여 C 코드를 생성해주는 도구인 TransPI 를 함께 제시한다.

  • PDF

The implementation of home-server for intelligent Personal Video Recorder (지능형 PVR의 원격제어를 위한 홈 서버 구현)

  • Son, Kang-Sun;Oh, Young-Ho;Kim, Dae-Jin
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.414-416
    • /
    • 2004
  • The intelligent PVR(Personal Video Recorder) is an enhanced PVR that provides viewers with some advanced features as well as pause, instant replay, search and skip forward found in conventional PVRs. By embedding a home server into a PVR, it is possible for an intelligent PVR to provide a powerful web-based management user interface constructed using HTML, graphics and other features common to web-browsers. When applied to other embedded systems, web technologies offer graphical user interfaces which are user-friendly, inexpensive, cross-platform and network-ready. It is the purpose of this paper to introduce implementation of intelligent PVR which is control by internet. We present the architecture of an home- server with a simple but powerful web-based network interconnection.

  • PDF

Heuristic Inference in the Expert System for Autonomous Navigation of AUV (AUV의 자율항행을 위한 전문가시스템에서의 휴리스틱 추론기법)

  • 이영일;김창민;김용기
    • Proceedings of the Korea Database Society Conference
    • /
    • 1999.06a
    • /
    • pp.155-159
    • /
    • 1999
  • 자율무인잠수정(AUV, Autonomous Underwater Vehicle)이 해저 속에서 주어진 임무(mission)를 수행하는데 있어 가장 먼저 선행되어야 하는 것은 목표점(Goal Position)까지 안전하고 빠르게 항행할 수 있는 자율 항행시스템(Autonomous Navigation System) 관련 기술의 개발이다. 이러한 시스템은 IPMS(Integrated Platform Management System)률 기반으로 하여 자율무인잠수정에 자율성을 부여하는 항행전문가시스템(Navigation Expert System)이 결합된 구조이다. 본 논문에서는 IPMS에 기반 한 자율항행시스템의 개념적 구조를 설계하고 항행전문가시스템의 추론방법으로서 퍼지관계곱(Fuzzy Relational Products) 기반 평가함수를 이용한 항행 휴리스틱탐색(navigation heuristic search) 기법을 제안한다.

  • PDF

게임산업의 가치사슬체계와 산업으로서의 역할 분석에 관한 연구

  • Choi, Sang-In;Jeong, Sang-Yeop;Sin, Min-Su
    • 한국경영정보학회:학술대회논문집
    • /
    • 2008.06a
    • /
    • pp.695-700
    • /
    • 2008
  • 본 연구는 게임산업이 과연 산업으로서 가치가 있는 산업이고, 생산성을 가진 하나의 산업으로 볼 수 있는지를 알아보기 위해서 가치 사슬 관점에서 게임 산업을 분석하였다. 기존의 연구는 게임산업을 플랫폼 별로 나누어 그에 따른 일반적인 분석과 동향, 전망이 주를 이루고 있으며, 게임산업 전반을 살펴볼 수 있는 공통적 가치사슬에 대한 연구는 부족한 실정이다. 그리고 게임산업 분석에 관한 명확한 프레임 워크가 연구되지 않고 있으며 세부 구성요소들의 관계, 가치의 생성과정에 관한 연구 또한 이뤄지지 않고 있다. 따라서 본 연구에서는 게임산업을 분석하기 위한 산업 전반의 공통적 프레임워크를 제시하고, 가치사슬 관점에서 세부적으로 게임산업을 분석한다. 그리고 게임산업의 내부구조와 상호 연결관계를 분석한다. 이를 통해 본 연구에서는 국가 경제에 있어 게임산업의 역할을 분석하여, 게임산업이 생산성을 가지는 하나의 산업으로서 가치가 있는 산업인지를 알아보려고 한다.

  • PDF

SGS: Splicing Graph Server

  • Bollina, Durgaprasad;Lee, Bernett T.K.;Ranganathan, Shoba
    • Proceedings of the Korean Society for Bioinformatics Conference
    • /
    • 2005.09a
    • /
    • pp.47-50
    • /
    • 2005
  • SGS (Splicing Graph Server) is as web application based on the MVC architecture with a Java platform. The specifications of the implemented design pattern are closely associated with the specific requirements of splicing graphs for analyzing alternative splice variants from a single gene. The paper presents the use of MVC architecture using JavaBeans as a model, with a JSP viewer and the servlet as the controller for this bioinformatics web application, with the open source apache/tomcat application server and a MySql database management system.

  • PDF