• Title/Summary/Keyword: Ubiquitous electronic commerce

Search Result 22, Processing Time 0.021 seconds

A Study on e-Trade Application, Limitation and Activation (전자무역 활용에 따른 한계와 활성화에 관한 연구)

  • Lee, Jeong-Ho
    • International Commerce and Information Review
    • /
    • v.15 no.3
    • /
    • pp.453-474
    • /
    • 2013
  • The Internet is also fragmenting containers of goods that could have been custom cleared on a single entry into dozens of individual shipments that each require separate customs documents and clearance procedures. The policies of Korean government could promote the e-business environment and market conditions in legal and infrastructure terms, but not much of business itself. The facilitation of trade procedures is seen by all major international business as vital for economic development. The purpose of the study is to develop the e-Trade application, limitation and activation. This article intends to derive which factors are significant at information strategic planning stage as well as its evaluation stage. The study include the technical explanations under the ubiquitous computing.

  • PDF

A Methodology for u-Service Business Model Diagram and Analysis (u-서비스에 대한 비즈니스 모델 다이어그램 및 분석 방법론 개발)

  • Lee, Nam-Yeon;Kwon, Oh-Byung
    • The Journal of Society for e-Business Studies
    • /
    • v.14 no.1
    • /
    • pp.13-34
    • /
    • 2009
  • As ubiquitous computing technology is proliferating, a wider range of u-services applying ubiquitous computing technology has been implemented and some of the u-services have been actively considered for commercialization. Accordingly, establishing corresponding business models based on u-services also have been increased. However, structured methodologies to build u-service business models are still in its very early age. Moreover, since most of the legacy business model formulation and analysis methodologies have stressed on conventional or digital services, not u-services. Hence, the purpose of this paper is to propose a structured methodology of formulating and analyzing business models for u-services. An illustrative example is described to show the feasibility of the proposed methodology. To do so, Business Model Diagram (BMD), which adopts model components for u-services, is newly developed.

  • PDF

A Study on Acceptance of CDM/UCR in WCO as e-Customs clearance procedures (WCO의 CDM과 UCR을 수용한 전자통관시스템 발전 방안)

  • Ryu, Geun-Woo;Kim, Young-Chun
    • International Commerce and Information Review
    • /
    • v.9 no.2
    • /
    • pp.327-350
    • /
    • 2007
  • A single window platform must be successfully established by implementing CDM/UCR in WCO and UNeDocs in UN/CEFACT, which is part of the framework of standards for secure and facilitate global trade. Core success factors in single window platform for international trade depend on political innovative capacity, advanced leadership of high ranking officials and departments in charge, effective collaborations between the ministries and offices concerned which are supported by supreme executives, self-controlled coordinations between users, convenience and access availability to users, promotion and marketing, identification on predictive impediments, financial raising and revenue model payable, communication's strategy, valid legal basis etc. To settle a stable ubiquitous e-trade platform, firstly, procedures and practices of customs clearance which different from one another mutually must be standardized globally. Secondly, the international standard electronic data exchanges must be introduced to facilitate and simplify customs clearing procedures by holding administrative informations in common between public institutions. thirdly, cooperative work model must be accepted with enhancing outsourcing business between reference groups (export-import firms and IT service providers).

  • PDF

A Study on the Development of KPI for Measuring Performance of B2B e-Commerce Guarantee Intermediary Service based on RFID (RFID기반 B2B 전자상거래 보증 중계 서비스의 성과관리를 위한 KPI 개발에 관한 연구)

  • Han, Chang-Hee;Kim, Min-Kwan;Kim, Jung-Min;Shin, Yun-Ho
    • Information Systems Review
    • /
    • v.11 no.3
    • /
    • pp.63-82
    • /
    • 2009
  • In B2B e-Commerce(Business to Business Electronic Commerce) market, many companies use B2B e-Commerce Guarantee Service. Guarantee service raised the stability of collect debts for seller, and made purchase fund for buyer. The purpose of this study is development of KPI (Key Performance Index) for measuring performance and improving service quality. Through analysis for 'B2B e-Commerce Guarantee Intermediary Service based on RFID', the study developed KPI and made the case. The study suggests KPI of B2B e-Commerce Guarantee Intermediary Service based on RFID by IT BSC(Balanced Scorecard) model. The process of developing KPI is 4 phase. First phase is connection between service goal and KPI, second phase is make a KPI pool, third phase is development of standard for valuating and selecting index, the last phase is defining and applying of index. This study suggests the standard of measuring performance in B2B e-commerce Guarantee Service and guidelines on revitalization of service in B2B e-commerce industry and the other industry.

EXPLORING THE MEANING OF COMFORTABILITY IN WEB SITES: THE KANSEI APPROACH

  • Okada, Roberto;Watanabe, Yuri
    • Proceedings of the Korean Society for Emotion and Sensibility Conference
    • /
    • 2002.05a
    • /
    • pp.51-56
    • /
    • 2002
  • Information Technology is becoming ubiquitous. Our lifestyle is changing due to this digital revolution. Many researchers had been working on exploring the meaning and ways to realize the comfortability in physical sites. With the appearance of huge amount of Web sites, which provide a variety of services like electronic commerce, network game, search engines and so on, there are many researchers working on the definition of Web Usability. In this research, we go one step forward, by exploring the meaning of Web Comfortability, based on Kansei Engineering methods.

  • PDF

L-PRS: A Location-based Personalized Recommender System

  • Kim, Taek-hun;Song, Jin-woo;Yang, Sung-bong
    • Proceedings of the KAIS Fall Conference
    • /
    • 2003.11a
    • /
    • pp.113-117
    • /
    • 2003
  • As the wireless communication technology advances rapidly, a personalization technology can be incorporated with the mobile Internet environment, which is based on location-based services to support more accurate personalized services. A location-based personalized recommender system is one of the essential technologies of the location-based application services, and is also a crucial technology for the ubiquitous environment. In this paper we propose a framework of a location-based personalized recommender system for the mobile Internet environment. The proposed system consists of three modules the interface module, the neighbor selection module and the prediction and recommendation module. The proposed system incorporates the concept of the recommendation system in the Electronic Commerce along with that of the mobile devices for possible expansion of services on the mobile devices. Finally a service scenario for entertainment recommendation based on the proposed recommender system is described.

  • PDF

The Ontology-Based Intelligent Solution for Managing U-Cultural Heritage: Early Fire Detection Systems (U-문화재관리를 위한 온톨로지 기반의 지능형 솔루션: 화재조기탐지 시스템)

  • Joo, Jae-Hun;Myeong, Sung-Jae
    • Information Systems Review
    • /
    • v.12 no.2
    • /
    • pp.89-104
    • /
    • 2010
  • Recently, ubiquitous sensor network (USN) has been applied to many areas including environment monitoring. A few studies applied the USN to disaster prevention and emergency management, in particular, aiming to conserve cultural heritage. USN is an useful technology to do online real-time monitoring for the purpose of early detection of the fire which is a critical cause of damage and destruction of cultural heritages. It is necessary to online monitor the cultural heritages that human has a difficulty to access or their external appearance and beauty are important, by using the USN. However, there exists false warning from USN-based monitoring systems without human intervention. In this paper, we presented an alternative to resolve the problem by applying ontology. Our intelligent fire early detection systems for conserving cultural heritages are based on ontology and inference rules, and tested under laboratory environments.

A Study on the Education of 5GL Program Tool at College (대학에서 국산 5세대 프로그램 저작도구의 교육에 대한 연구)

  • Park Daewoo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.4 s.32
    • /
    • pp.41-48
    • /
    • 2004
  • At Ubiquitous ages I am teaching of the Fifth Generation Languages Program Tool which was producted by Korea at college, and it develop software program for Internet Electronic Commerce Information. In this paper I have researched the problems from education in Operating System and the Use of Tool that Korean 5GL Program Tool was better than Foreign Program Tool on functions and peculiarity, merits and demerits. I have a research and analysis of students response about the Using of Tool, Coding(Script), Application Programming in college education whose have had existing Foreign Tool. Also. I propose that the alternative plans which analyze out opinions from teaching professors and program developers.

  • PDF

A Study on Secure and Efficient Heterogenous Network Management Scheme based on Static TTP (정적인 TTP 기반의 안전하고 효율적인 이기종 네트워크 관리 기법에 관한 연구)

  • Seo, Dae-Hee;Baek, Jang-Mi;Cho, Dong-Sub
    • Journal of Internet Computing and Services
    • /
    • v.9 no.6
    • /
    • pp.63-72
    • /
    • 2008
  • Recent heterogeneous network management researches on information security, however, deal only with simple management using PKI and could not sufficiently address the different kinds of security problems that could arise in a heterogeneous network. Thus, various security requirements should first be satisfied and a security management protocol should first be developed to achieve a secure heterogeneous network. Hence, in this paper, various secure and effective heterogeneous network management that address security issues, which were merely a consideration in existing studies, are proposed. The proposed scheme for the protection of the user privacy is the central object and static middle objects of the process used to mutual authentication, also if communication between users is required 1-out-2 oblivious transfer to communicate by using secret communication, as well as the effectiveness and security conscious approach. Specially The proposed scheme is designed to enhance security and efficiency related to various services required in heterogeneous network, based on the reliable peripheral devices for TTP. Using Mobile device, which has been applied to electronic commerce transactions in existing schemes, this study also proposed an appropriate management scheme that is suitable for a dynamic environment and setting a temporary group to provide various services.

  • PDF

The Adoption of New Service-Deliverly Channel under the Multi-channel Usage (다채널 이용 상황에서 신규 서비스채널의 수용에 관한 연구)

  • Kim, Hyun-Cheol;Han, Jang-Hui;Choi, Ji-Ho
    • Journal of Distribution Research
    • /
    • v.12 no.2
    • /
    • pp.23-49
    • /
    • 2007
  • Recently, mobile marketing is becoming one of the major topics of interest to the marketing discipline. Emerging from rapid developments in mobile technology, it has created opportunities for new and innovative mobile services. Also, it is enabling to conduct always-on connections that consumers can interact anytime and anywhere. Especially, mobile devices place themselves to the core means of mobile-commerce which to execute a function as a distribution channel in mobile environments. Although the adoption researches about innovative services or technologies had executed in marketing areas over the past decades, most researches just expanded or modified existing theories and explanation models. There has been little study on the comprehensive and systematic review of adoption process. Therefore, it deserves to be considered prior usage experiences of the existing channels(CL) and attractiveness of the new channel(CLalt) based on social exchange theory. In order to address this void, this study unifies components of perceived attributes in the each dimensions (ie. benefit, cost, and risk dimensions) and explores prior usage experiences of the existing channels on adoption intention in electronic financial service channels through developing comprehensive model and employing empirical test for the hierarchy of effects model. Based on these empirical results, this study suggests managerial implications for new channel management in electronic financial service areas by focusing on the prior usage experiences of the existing objects on adoption intention and perceived attributes of ubiquitous-based mobile service channel.

  • PDF