• Title/Summary/Keyword: Sharing Strategy

Search Result 512, Processing Time 0.022 seconds

Improving the Quality of Bibliographic Data in Public Libraries: Focusing on Public Libraries in Busan Metropolitan City (공공도서관 서지데이터의 품질 제고 방안)

  • Jee-Hyun Rho;Eun-Ju Lee
    • Journal of Korean Library and Information Science Society
    • /
    • v.54 no.3
    • /
    • pp.105-128
    • /
    • 2023
  • In 2020, the Busan metropolitan library took the lead in establishing an integrated library system (ILS) that integrates bibliographic data from 49 public libraries and 103 small public libraries. However, each library still builds bibliographic data individually and repeatedly, and the bibliographic data built by each library is only physically stored in an integrated DB. Therefore the improvement in work efficiency or data quality has not been achieved. This study aimed to analyze the construction processes and quality of bibliographic data in Busan public libraries and to suggest a new implementation strategy for an integrated environment. To this end, (1) the construction process of bibliographic data was investigated, (2) the quality of the constructed bibliographic data was objectively analyzed, and (3) four implementation strategies were suggested based on critical problems. The implementation strategy aims not only to improve the quality of bibliographic data, but also to increase work efficiency and build an infrastructure for data sharing.

Case Analysis of Conflicts in Renewable Power Generation Projects Using Non-cooperative Game Theory (비협조적 게임이론을 활용한 신재생발전사업 갈등 사례분석)

  • Park, Jaehyon;Kim, Kyeongkuk;Kim, Kyeongseok
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.44 no.2
    • /
    • pp.215-221
    • /
    • 2024
  • The government is encouraging the expansion of renewable energy facilities through national renewable energy policy. However, the installation of renewable energy generation facilities has led to local resident complaints due to landscape degradation, electromagnetic wave emission, real estate devaluation, and environmental pollution. This creates conflicts between power project developers and residents, making the progress of projects more difficult. This study applies non-cooperative game theory to analyze eight cases of renewable energy projects where conflicts between developers and residents were resolved through resident's investment participation. By accepting investments from local stakeholders, residents achieved returns ranging from a maximum of 25 % to a minimum of 4.1 %. It was found through game theory analysis that a dominant strategy involves residents agreeing to the development of the project and the developers sharing a portion of the profits with the residents. The analysis results show that the point where dominant strategy meet forms a Nash equilibrium, and at the same time becomes the Pareto optimal point, benefiting both power generation operators and residents.

Exploratory Case Study for Key Successful Factors of Producy Service System (Product-Service System(PSS) 성공과 실패요인에 관한 탐색적 사례 연구)

  • Park, A-Rum;Jin, Dong-Su;Lee, Kyoung-Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.255-277
    • /
    • 2011
  • Product Service System(PSS), which is an integrated combination of product and service, provides new value to customer and makes companies sustainable as well. The objective of this paper draws Critical Successful Factors(CSF) of PSS through multiple case study. First, we review various concepts and types in PSS and Platform business literature currently available on this topic. Second, after investigating various cases with the characteristics of PSS and platform business, we select four cases of 'iPod of Apple', 'Kindle of Amazon', 'Zune of Microsoft', and 'e-book reader of Sony'. Then, the four cases are categorized as successful and failed cases according to criteria of case selection and PSS classification. We consider two methodologies for the case selection, i.e., 'Strategies for the Selection of Samples and Cases' proposed by Bent(2006) and the seven case selection procedures proposed by Jason and John(2008). For case selection, 'Stratified sample and Paradigmatic cases' is adopted as one of several options for sampling. Then, we use the seven case selection procedures such as 'typical', 'diverse', 'extreme', 'deviant', 'influential', 'most-similar', and 'mostdifferent' and among them only three procedures of 'diverse', 'most?similar', and 'most-different' are applied for the case selection. For PSS classification, the eight PSS types, suggested by Tukker(2004), of 'product related', 'advice and consulancy', 'product lease', 'product renting/sharing', 'product pooling', 'activity management', 'pay per service unit', 'functional result' are utilized. We categorize the four selected cases as a product oriented group because the cases not only sell a product, but also offer service needed during the use phase of the product. Then, we analyze the four cases by using cross-case pattern that Eisenhardt(1991) suggested. Eisenhardt(1991) argued that three processes are required for avoiding reaching premature or even false conclusion. The fist step includes selecting categories of dimensions and finding within-group similarities coupled with intergroup difference. In the second process, pairs of cases are selected and listed. The second step forces researchers to find the subtle similarities and differences between cases. The third process is to divide the data by data source. The result of cross-case pattern indicates that the similarities of iPod and Kindle as successful cases are convenient user interface, successful plarform strategy, and rich contents. The differences between the successful cases are that, wheares iPod has been recognized as the culture code, Kindle has implemented a low price as its main strategy. Meanwhile, the similarities of Zune and PRS series as failed cases are lack of sufficient applications and contents. The differences between the failed cases are that, wheares Zune adopted an undifferentiated strategy, PRS series conducted high-price strategy. From the analysis of the cases, we generate three hypotheses. The first hypothesis assumes that a successful PSS system requires convenient user interface. The second hypothesis assumes that a successful PSS system requires a reciprocal(win/win) business model. The third hypothesis assumes that a successful PSS system requires sufficient quantities of applications and contents. To verify the hypotheses, we uses the cross-matching (or pattern matching) methodology. The methodology matches three key words (user interface, reciprocal business model, contents) of the hypotheses to the previous papers related to PSS, digital contents, and Information System (IS). Finally, this paper suggests the three implications from analyzed results. A successful PSS system needs to provide differentiated value for customers such as convenient user interface, e.g., the simple design of iTunes (iPod) and the provision of connection to Kindle Store without any charge. A successful PSS system also requires a mutually benefitable business model as Apple and Amazon implement a policy that provides a reasonable proft sharing for third party. A successful PSS system requires sufficient quantities of applications and contents.

An Analysis of the Message on Internet Fashion Brand's Community - Focused on Brand Reneevon - (패션 브랜드의 인터넷 커뮤니티 메시지 유형 분석 - 브랜드 레니본을 중심으로 -)

  • Son, Hee-Jung;Yu, Ji-Hun
    • The Research Journal of the Costume Culture
    • /
    • v.17 no.5
    • /
    • pp.791-806
    • /
    • 2009
  • Internet brand community's message makes significant contributions for fashion industry. Therefore, if we understand and implement the characteristics of the message on the Internet brand's community, it can be useful for future marketing strategy. This study was to classified the internet community and to examine messages with regard to direction, write motive and prior knowledge. The messages were taken from February, 20th, to August, 7th in 2008. Content analysis method was used for this study. The results were as follows: First, Fashion brand community divided into user initiative type and enterprise establishing type. Second, User initiative type had positive direction message more than enterprise establishing type had. Third, User initiative type had large volumes of information searching or sharing related message, but enterprise establishing type had large quantities of personal experience related message about write motive. Fourth, There was no difference numerical prior knowledge between user initiative type and enterprise establishing type, and then both had a high rate of prior knowledge.

  • PDF

A Study on Sleep Environment in Bedroom and Segmentation of Sleepers in Seoul and Metropolitan Area (서울시 및 수도권 거주자의 침실환경과 침실 사용자그룹 세분화에 관한 연구)

  • Kim, Bi-Na;Chun, Chung-Yoon
    • Journal of the Korean housing association
    • /
    • v.20 no.1
    • /
    • pp.37-44
    • /
    • 2009
  • Sleep has big influence on our life, for example productivity, character formation of babies, mortality and the people who suffered from sleep problem are also diverse. Therefore, indoor environmental supports for good sleep, might be different with the situation and need of respective person. The objectives of this study are: 1) to investigate the current bedroom condition, sleep problem, and life pattern of Korean. 2) to classify Korean into several groups and explain their characteristics relevant to sleep, in order to understand Korean's need for good sleep. The questionnaire was sent out to Seoul and its environs in Jan.$\sim$Feb. 2008, and total of 702 questionnaires were collected. The research on the bedroom condition was conducted around perceived influence of environmental factors, opening and closing of the door, cooling and heating strategy, clo value during sleep, bedding type, lighting, sharing bedroom. People are divided into 6 groups by 8 factors, and 5 groups could be seen that they need some management for good sleep because of their sleep problem.

An Exploratory Study on the Knowledge Management Process Models (지식 경영 프로세스의 모형에 관한 탐색적 연구)

  • 장영택
    • The Journal of Information Systems
    • /
    • v.9 no.1
    • /
    • pp.157-188
    • /
    • 2000
  • Today a knowledge management systems (KMS) is an enabler for gaining competitive position in the market environments. However, it is just recognized as a conceptual management paradigm not as realistic management philosophy in an organization. A firm just accustomed to deal with tangible assets such as inventory and buildings based on the cumulated experiences. However, the firm often struggle with how to define and apply the knowledge management system into its real business activities such as business strategy and productivity. For example, one of textile company, E-land, in Korea found the way how the firm utilize intelligent assets of its employees to overcome the performance differences among the employees in an organization to increase their ability. Managers in an organization should fully understand and try to figure out the concept of knowledge management systems to implement KMS more efficiently and effectively. Even though lots of previous knowledge management literature proposed several unique knowledge management process models, they have their own terms, process sequences, or different approaches. There are three common knowledge management processes: knowledge creation, knowledge store and search, knowledge sharing process. In this study, a new KM process theoretical framework based on the previous researches is developed. This study will guide to those who will adopt or implement of KMS in the organization in near future.

  • PDF

Networked Creativity on the Censored Web 2.0: Chinese Users' Twitter-based Activities on the Issue of Internet Censorship

  • Xu, Weiai Wayne;Feng, Miao
    • Journal of Contemporary Eastern Asia
    • /
    • v.14 no.1
    • /
    • pp.23-43
    • /
    • 2015
  • In most of the world, the current trend in information technology is for open data movement that promotes transparency and equal access. An opposite trend is observed in China, which has the world's largest Internet population. The country has implemented sophisticated cyber-infrastructure and practices under the name of The Golden Shield Project (commonly referred to as the Great Firewall) to limit access to popular international web services and to filter traffic containing 'undesirable' political content. Increasingly, tech-savvy Chinese bypass this firewall and use Twitter to share knowledge on censorship circumvention and encryption to collectively troubleshoot firewall evasion methods, and even mobilize actions that border on activism. Using a mixed mythological approach, the current study addresses such networked knowledge sharing among citizens in a restricted web ecosystem. On the theoretical front, this study uses webometric approaches to understand change agents and positive deviant in the diffusion of censorship circumvention technology. On policy-level, the study provides insights for Internet regulators and digital rights groups to help best utilize communication networks of positive deviants to counter Internet control.

Who Leads Nonprofit Advocacy through Social Media? Some Evidence from the Australian Marine Conservation Society's Twitter Networks

  • Jung, Kyujin;No, Won;Kim, Ji Won
    • Journal of Contemporary Eastern Asia
    • /
    • v.13 no.1
    • /
    • pp.69-81
    • /
    • 2014
  • While much in the field of public management has emphasized the importance of nonprofit advocacy activities in policy and decision-making procedures, few have considered the relevance and impact of leading actors on structuring diverse patterns of information sharing and communication through social media. Building nonprofit advocacy is a complicated process for a single organization to undertake, but social media applications such as Facebook and Twitter have facilitated nonprofit organizations and stakeholders to effectively share information and communicate with each other for identifying their mission as it relates to environmental issues. By analyzing the Australian Marine Conservation Society's (AMCS) Twitter network data from the period 1 April to 20 April, 2013, this research discovered diverse patterns in nonprofit advocacy by leading actors in building advocacy. Based on the webometrics approach, analysis results show that nonprofit advocacy through social media is structured by dynamic information flows and intercommunications among participants and followers of the AMCS. Also, the findings indicate that the news media and international and domestic nonprofit organizations have a leading role in building nonprofit advocacy by clustering with their followers.

Joint Spectrum and Power Allocation for Green D2D Communication with Physical Layer Security Consideration

  • Chen, Hualiang;Cai, Yueming;Wu, Dan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.3
    • /
    • pp.1057-1073
    • /
    • 2015
  • In this paper, we consider cooperative D2D communications in cellular networks. More precisely, a cellular user leases part of its spectrum to facilitate the D2D communication with a goal of improving the energy efficiency of a D2D pair. However the D2D pair is untrusted to the cellular user, such resource sharing may result in the information of this cellular user unsecured. In order to motivate the cellular user's generosity, this D2D pair needs to help the cellular user maintain a target secrecy rate. To address this issue, we formulate a joint spectrum and power allocation problem to maximize the energy efficiency of the D2D communication while guaranteeing the physical layer security of the cellular user. Then, a theorem is proved to indicate the best resource allocation strategy, and accordingly, an algorithm is proposed to find the best solution to this resource allocation problem. Numerical results are finally presented to verify the validity and effectiveness of the proposed algorithm.

A Study on the Identifying Emerging Defense Technology using S&T Text Mining (S&T Text Mining을 이용한 국방 유망기술 식별에 관한 연구)

  • Lee, Tae-Bong;Lee, Choon-Joo
    • Journal of the military operations research society of Korea
    • /
    • v.36 no.1
    • /
    • pp.39-49
    • /
    • 2010
  • This paper tries to identify emerging defense technology using S&T Text Mining. As a national agenda, there has been much effort to build S&T information systems including NTIS and DTiMS that enable researchers, policy makers, or field users to analyze technological changes and promote the best policy practices for efficient workflow, knowledge sharing, strategy development, or institutional competitiveness. In this paper, the S&T Text Mining application to unmanned combat technology using INSPEC DB is empirically illustrated and shows that it is a feasible approach to identify emerging defense technology as well as the structure of knowledge network of the future technology candidates.