• Title/Summary/Keyword: Strategic Network

Search Result 505, Processing Time 0.028 seconds

A Study on the Intelligent Strategic Planning Model that Combines a Case-Based Reasoning and a Neural Network (사례기반추론과 인공신경망을 결합한 지능적인 경영전략수립 모형에 관한 연구)

  • Lee, Kun-Chang;Lee, Cheol-Won
    • Asia pacific journal of information systems
    • /
    • v.8 no.1
    • /
    • pp.1-26
    • /
    • 1998
  • 본 연구에서는 사례기반추론, 인공신경망, 선형계획법 모형을 결합한 새로운 개념의 지능적인 경영전략수립 및 상충관계 해결 추론메카니즘을 제안한다. 본 연구에서 제안한 경영전략추론 메카니즘의 타당성을 검증하기 위하여 (1) 과거 문헌조사 결과와 (2) 비쥬얼 베이직 언어로 구현한 프로토타입인 CANNIE-SP (CAse-based Neural Network Inference Engine for Strategic Planning)를 제시하였다. 특히 본 연구에서 제안하는 인공신경망은 순방향 추론과 역방향 추론이 가능하도록 설계하여서 What-If분석 및 Goal-Seeking분석이 가능하도록 하였다. 또한 사례기반추론기관은 마이크로 소프트사의 데이터베이스 엔진인 엑세스(Access)를 사용하였다. 본 연구에서 제안하는 추론 메카니즘의 타당성을 검증하기 위하여 우리나라 화장품 시장의 실제자료를 가지고 실험하였으며 그 결과 매우 의미가 있음을 확인하였다.

  • PDF

Upward Influence to Overcome Hierarchical Authority Expectations: A New Approach for Stakeholder Management

  • Fan, Yang;Anantatmula, Vittal
    • Journal of Construction Engineering and Project Management
    • /
    • v.2 no.2
    • /
    • pp.28-35
    • /
    • 2012
  • Critical to project success is effective stakeholder management. This paper presents a challenge for the project manager who uses traditional approaches to manage mid-level stakeholders in an organization. Dual roles of a mid-level stakeholder (as a stakeholder of a project and as an agent of the corporate) may cause problems that would result in difficulties for project managers in identifying the stakeholder's attributes and overcoming hierarchical authority expectation. However, the dual roles of the stakeholder result in its weakness in the project-stakeholder relationship. Can a project leverage its strategic role for effective upward influence by linking project objectives to corporate strategic objectives? To address this research question, case study method was used to gain a deeper understanding of mid-level stakeholder's salience. This research proposes an upward influence strategy to embed a project-stakeholder relationship in a hierarchical stakeholder network.

Informational and Methodological Approach to Ensuring the Economic Security of the State in the Banking Sphere

  • Shemayeva, Luidmila;Hladkykh, Dmytro;Mihus, Iryna;Onofriichuk, Andrii;Onofriichuk, Vitalii
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.477-482
    • /
    • 2021
  • The existing approaches to ensuring the banking security of the state do not take into account the peculiarities of the banking system in the rapid development of the information economy (increasing uncertainty, imbalance and nonlinearity of processes in the banking system under the influence of innovation, institutions, information asymmetry, etc.). A methodological approach to determining the synergetic effect in the implementation of the regulatory influence of the state on the development of innovation processes related to informatization in the banking system, based on the use of differential equations and modelling the sensitivity of innovation processes related to informatization in the banking system, to the regulatory influence of the state to prevent the deployment of risks and threats to economic security of the state in this area has been suggested in the present article.

Strategic Business Values of the Blockchain Technology Market to Assist Professionals: Deployment Perspective

  • Waleed Rashideh
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.210-226
    • /
    • 2023
  • It is difficult to transform a blockchain initiative from the feasibility stage to the fully commercialized the technology's products or services, especially considering the significant investment required and the lack of studies on the benefits and barriers from deployment perspective. Whereas some organizations have come up with their own solutions to moving beyond the feasibility stage, commercial applications do not yet exist and few organizations are willing to invest beyond the prototype phase and fill in the gap between the expected and actual business value of these types of projects. This study aims to develop a blockchain model using a survey to gather qualitative data on experts' opinions on the deployment of blockchain technology. Our model will measure how business professionals could take advantage of blockchain's disruptive technology to develop business opportunities. This study's contribution is to show blockchain technology's potential strategic business value. The findings from this exploration include the prospective for delivering comprehensions to businesses for different creating investment choices on the embracing of the blockchain technology.

User Requirements Analysis for the Strategic Planning of Virtual University Systems : A Case Study on the Perspective of Instructors (가상대학시스템 전략계획수립을 위한 교수자 측면의 요구분석에 관한 연구: K대학의 사례를 중심으로)

  • Jeong, Dae-Yul;Jun, Yong-Kee
    • Information Systems Review
    • /
    • v.4 no.1
    • /
    • pp.89-110
    • /
    • 2002
  • Today, many universities are confronted with the changing education paradigm such as e-Learning, CBT(Computer-based Training), Virtual University. Particularly, the Virtual University is now in the countrys educational mainstream as a legitimate, potentially standards-setting educational environment. These streams are certainly a new opportunity or threat to our universities. To overcome this problem, we should think this as strategic, and should implement IT-based Virtual University System to which computer and network technology is main edge. So, we think that the Virtual University System is SIS(Strategic Information System) which support universitys future education strategies. We proposed a planning framework for the Virtual University System. The framework which is based on the IS planning methodology is composed of such as environment analysis, requirement analysis of the system, strategic roles and objectives setting, scenario analysis of budget and revenue. To define the strategic roles and objectives of the system, we surveyed it on the side of instructors. We proposed five factors, which are to (1) improve competitiveness (2) reduce cost and secure profit (3) enhance education services (4) change the future education model (5) decrease dysfunctions of virtual education model.

Analysis for Factors of Firms' Exporting in Industrial Organization Theory and Strategic Perspective (산업조직론과 전략관점에서 기업의 수출 영향요인 분석)

  • Park, Sung-Gon;Kang, Seok-Min
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.6
    • /
    • pp.406-414
    • /
    • 2020
  • Exporting plays the important role in reducing dependence on the domestic market by creating the new foreign markets. As a business strategy, exporting contributes to the national growth and provides firms with opportunities which enable economies of scale, economies of scope, and experience curve effects. Because of both the growth limitation of the domestic market and development of information technology, many firms enter in foreign markets by increasing exporting. Using firms located in Taegu, this study examined the factors of firms' exporting with industrial organization theory and strategic perspective. In the empirical results on industrial organization theory, systematic cooperation and governmental supporting positively affect firms' exporting and only systematic cooperation positively affects exporting performance. In the empirical results on strategic perspective, product differentiation foreign exporting network, and foreign entry nation positively affect firms' exporting, and foreign exporting network, and foreign entry nation positively affect exporting performance.

International cyber security strategy as a tool for comprehensive security assurance of civil aviation security: methodological considerations

  • Grygorov, Oleksandr;Basysta, Albina;Yedeliev, Roman;Paziuk, Andrii;Tropin, Zakhar
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.332-338
    • /
    • 2021
  • Civil aviation cybersecurity challenges are global in nature and must be addressed using global best practices and the combined efforts of all stakeholders. This requires the development of comprehensive international strategies and detailed plans for their implementation, with appropriate resources. It is important to build such strategies on a common methodology that can be applied to civil aviation and other interrelated critical infrastructure sectors. The goal of the study was to determine the methodological basis for developing an international civil aviation cybersecurity strategy, taking into account existing experience in strategic planning at the level of international specialized organizations. The research was conducted using general scientific and theoretical research methods: observation, description, formalization, analysis, synthesis, generalization, explanation As a result of the study, it was established the specifics of the approach to formulating strategic goals in civil aviation cybersecurity programs in the documents of intergovernmental and international non-governmental organizations in the aviation sphere, generally based on a comprehensive vision of cybersecurity management. A comparative analysis of strategic priorities, objectives, and planned activities for their implementation revealed common characteristics based on a single methodological sense of cybersecurity as a symbiosis of five components: human capacity, processes, technologies, communications, and its regulatory support. It was found that additional branching and detailing of priority areas in the strategic documents of international civil aviation organizations (by the example of Cybersecurity Strategy and Cybersecurity Action Plan) does not always contribute to compliance with a unified methodological framework. It is argued that to develop an international civil aviation cybersecurity strategy, it is advisable to use the methodological basis of the Cyber Security Index.

The Empirical Analysis on the Performance of Inter-firm Network Management in the IT Service Firms (IT서비스 기업에서의 네트워크 경영 관련 성과 요인에 대한 실증 연구)

  • Ahn, Yeon S.
    • Journal of Information Technology Services
    • /
    • v.10 no.1
    • /
    • pp.47-64
    • /
    • 2011
  • In the IT(Information Technology) service, which supply the solutions related to business management and IT, network construction and application trends, the related service business are increasing according to the enlargement of project scope and the diversity of project types as the need of service customers. In this paper, I propose the significant effect factors on the network management of IT service firms. The key findings are from the analysis result about 94 IT service firms as follows. For implementation the high performance of network management in the IT service firms, the strategic elements in the process of network construction are more conceived highly than the basic element in them. Also the perspective of project objectives are considered than the nominal perspectives in the partner selection process. The competency of partner firms', the cooperation process between the partner firms', network relation operation management and network relation structure management are the significant effect factors of network management.

IACS UR E26 - Analysis of the Cyber Resilience of Ships (국제선급협회 공통 규칙 - 선박의 사이버 복원력에 대한 기술적 분석)

  • Nam-seon Kang;Gum-jun Son;Rae-Chon Park;Chang-sik Lee;Seong-sang Yu
    • Journal of Advanced Navigation Technology
    • /
    • v.28 no.1
    • /
    • pp.27-36
    • /
    • 2024
  • In this paper, we analyze the unified requirements of international association of classification societies - cyber resilience of ships, ahead of implementation of the agreement on July 1, 2024, and respond to ship cyber security and resilience programs based on 5 requirements, 17 details, and documents that must be submitted or maintained according to the ship's cyber resilience,. Measures include document management such as classification certification documents and design documents, configuration of a network with enhanced security, establishment of processes for accident response, configuration management using software tools, integrated network management, malware protection, and detection of ship network security threats with security management solutions. proposed a technology capable of real-time response.

A Study on the Regional Characteristics of the Photonics Industry's Growth: Based on the location and business network of photonics firms (광산업체 입지와 사업네트워크 특성으로 본 광산업의 지역적 성장에 관한 연구)

  • Lim, Young-Hun
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.14 no.4
    • /
    • pp.628-641
    • /
    • 2011
  • Focusing on the photonics industry as a new one and the photonics industry agglomeration in Gwangju, this study investigated the regional characteristics of the photonics industry's growth. To analyze the location and business network of photonics firms as foundation of industrial growth, in-depth interviews were conducted. It also aimed to review the meanings of regional policy to promote a strategic industry. As a result, it founded the differential growth of the photonics industry in the Capital region(with a market advantage) and Gwangju(with a policy advantage). Gwangju's regional policy had an importance that it formed a regional consensus and increased the momentum and variety to drive regional industrial development.

  • PDF