• Title/Summary/Keyword: an Evaluation Model of IS Services

Search Result 314, Processing Time 0.028 seconds

A Study on Contact Center Evaluation Model Using AHP and Content Analysis (AHP와 내용분석을 이용한 컨택센터 평가 모델 연구)

  • Ryu, Ki-Dong;Kim, Woo-Je
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.5
    • /
    • pp.106-116
    • /
    • 2018
  • Recently, the role of the contact center for business-to-consumer (B2C) operations is becoming more and more important as the customer contact point. In particular, an Internet Protocol (IP)-based contact center system is made up of a complicated information system in order to accommodate various customer channels, in addition to the telephone, and to respond in real time. However, until now, evaluations of contact centers have focused on customer service-based research from inbound contact centers. We used the contact center as a measure of performance, focusing on indicators that have traditionally influenced customer satisfaction, such as response rates and service levels. There is insufficient research on the characteristics of the services that a contact center should have and on the evaluation models for information systems. The role of information systems is becoming important as the latest contact center, which has moved from the TDM-driven digital phone system center to the IP-based contact center, accommodates a variety of digital channels other than voice phones. In particular, as offline branches decrease due to the development of the Internet and mobile phones, non-facing responses to customers are important, so the contact center has influenced the enterprise. Therefore, we developed an evaluation model not only in terms of customer service, but also from information system and business aspects, using the AHP and verifying the evaluation model through empirical cases. In particular, content analysis was used to ensure objectivity of AHP evaluation items.

Semantics-aware Obfuscation for Location Privacy

  • Damiani, Maria Luisa;Silvestri, Claudio;Bertino, Elisa
    • Journal of Computing Science and Engineering
    • /
    • v.2 no.2
    • /
    • pp.137-160
    • /
    • 2008
  • The increasing availability of personal location data pushed by the widespread use of location-sensing technologies raises concerns with respect to the safeguard of location privacy. To address such concerns location privacy-preserving techniques are being investigated. An important area of application for such techniques is represented by Location Based Services (LBS). Many privacy-preserving techniques designed for LBS are based on the idea of forwarding to the LBS provider obfuscated locations, namely position information at low spatial resolution, in place of actual users' positions. Obfuscation techniques are generally based on the use of geometric methods. In this paper, we argue that such methods can lead to the disclosure of sensitive location information and thus to privacy leaks. We thus propose a novel method which takes into account the semantic context in which users are located. The original contribution of the paper is the introduction of a comprehensive framework consisting of a semantic-aware obfuscation model, a novel algorithm for the generation of obfuscated spaces for which we report results from an experimental evaluation and reference architecture.

Specialization, Firm Dynamics and Economic Growth

  • Cho, Jaehan;Ge, Zhizhuang
    • East Asian Economic Review
    • /
    • v.23 no.2
    • /
    • pp.169-202
    • /
    • 2019
  • Productivity in agriculture or services has long been understood as playing an important role in the growth of manufacturing. In this paper we present a general equilibrium model in which manufacturing growth is stimulated by non-manufacturing sectors that provides goods used in both research and final consumption. The model permits the evaluation of two policy options for stimulating manufacturing growth: (1) a country imports more non-manufacturing goods from a foreign country with higher productivity and (2) a country increases productivity of domestic non-manufacturing. We find that both policies improve welfare of the economy, but depending on the policy the manufacturing sector responses differently. Specifically, employment and value-added in manufacturing increase with policy (1), but contract with policy (2). Therefore, specialization of the import non-manufactured goods helps explain why some Asian economies experience rapid growth in the manufacturing sector without progress in other sectors.

3D Model Generation and Accuracy Evaluation using Unmanned Aerial Oblique Image (무인항공 경사사진을 이용한 3차원 모델 생성 및 정확도 평가)

  • Park, Joon-Kyu;Jung, Kap-Yong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.3
    • /
    • pp.587-593
    • /
    • 2019
  • The field of geospatial information is rapidly changing due to the development of sensor and data processing technology that can acquire location information. And demand is increasing in various related industries and social activities. The construction and utilization of three dimensional geospatial information that is easy to understand and easy to understand can be an essential element to improve the quality and reliability of related services. In recent years, 3D laser scanners are widely used as 3D geospatial information construction technology. However, 3D laser scanners may cause shadow areas where data acquisition is not possible when objects are large in size or complex in shape. In this study, 3D model of an object has been created by acquiring oblique images using an unmanned aerial vehicle and processing the data. The study area was selected, oblique images were acquired using an unmanned aerial vehicle, and point cloud type 3D model with 0.02 m spacing was created through data processing. The accuracy of the 3D model was 0.19m and the average was 0.11m. In the future, if accuracy is evaluated according to shooting and data processing methods, and 3D model construction and accuracy evaluation and analysis according to camera types are performed, the accuracy of the 3D model will be improved. In the point cloud type 3D model, Cross section generation, drawing of objects, and so on, it is possible to improve work efficiency of spatial information service and related work.

Mobile User Task Prediction Models and Accuracy Evaluation Method (모바일 사용자 작업 예측 모델 및 정확도 평가 기법)

  • Kang, Young-Min;Ok, Soo-Yol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.9
    • /
    • pp.1742-1748
    • /
    • 2007
  • In order to provide the convenient access to the mobile services and the efficient utilization of the mobile devices, it is required to devise an intelligent user interface which guarantees the efficient task selection and transition in the limited input/output environments of the mobile devices. In this paper, we propose user task prediction models which are essential for the intelligent user interface, and an accuracy estimation model is also proposed for evaluating the prediction models.

Effects of Application of Social Marketing Theory and the Health Belief Model in Promoting Cervical Cancer Screening among Targeted Women in Sisaket Province, Thailand

  • Wichachai, Suparp;Songserm, Nopparat;Akakul, Theerawut;Kuasiri, Chanapong
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.17 no.7
    • /
    • pp.3505-3510
    • /
    • 2016
  • Cervical cancer is a major public health problem in Thailand, being ranked second only to breast cancer. Thai women have been reported to have a low rate of cervical cancer screening (27.7% of the 80% goal of WHO). We therefore aimed to apply the social marketing theory and health belief model in promoting cervical cancer screening in Kanthararom District, Sisaket Province. A total of 92 from 974 targeted women aged 30-60 years were randomly divided into two groups. The experimental group underwent application of social marketing theory and a health belief model program promoting cervical cancer screening while the control group received normal services. Two research tools were used: (1) application of social marketing theory and health belief model program and (2) questionnaire used to evaluate perceptions of cervical cancer. Descriptive and inferential statistics including paired sample t-test and independent t-test were used to analyze the data. After the program had been used, the mean score of perception of cervical cancer of experimental group was at a higher level (${\bar{x}}=4.09$; S.D.=0.30), than in the control group (${\bar{x}}=3.82$; S.D.=0.20) with statistical significance (p<0.001). This research demonstrated an appropriate communication process in behavioral modification to prevent cervical cancer. It can be recommended that this program featuring social marketing and the health belief model be used to promote cervical cancer screening in targeted women and it can be promoted as a guideline for other health services, especially in health promotion and disease prevention.

Evaluation of Applicability of APEX-Paddy Model based on Seasonal Forecast (계절예측 정보 기반 APEX-Paddy 모형 적용성 평가)

  • Cho, Jaepil;Choi, Soon-Kun;Hwang, Syewoon;Park, Jihoon
    • Journal of Korean Society of Rural Planning
    • /
    • v.24 no.4
    • /
    • pp.99-119
    • /
    • 2018
  • Unit load factor, which is used for the quantification of non-point pollution in watersheds, has the limitation that it does not reflect spatial characteristics of soil, topography and temporal change due to the interannual or seasonal variability of precipitation. Therefore, we developed the method to estimate a watershed-scale non-point pollutant load using seasonal forecast data that forecast changes of precipitation up to 6 months from present time for watershed-scale water quality management. To establish a preemptive countermeasure against non-point pollution sources, it is possible to consider the unstructured management plan which is possible over several months timescale. Notably, it is possible to apply various management methods such as control of sowing and irrigation timing, control of irrigation through water management, and control of fertilizer through fertilization management. In this study, APEX-Paddy model, which can consider the farming method in field scale, was applied to evaluate the applicability of seasonal forecast data. It was confirmed that the rainfall amount during the growing season is an essential factor in the non-point pollution pollutant load. The APEX-Paddy model for quantifying non-point pollution according to various farming methods in paddy fields simulated similarly the annual variation tendency of TN and TP pollutant loads in rice paddies but showed a tendency to underestimate load quantitatively.

Advanced Mandatory Authentication Architecture Designed for Internet Bank (인터넷은행을 위한 개선된 본인확인 구조)

  • Hong, Ki-seok;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1503-1514
    • /
    • 2015
  • Non-face-to-face real name verification policy that financial authorities announced, in order to secure a face-to-face or more of accuracy, are in principle of multi check. The business model and legal entities of Internet banks is different from existing Internet banking. Relpacing real name verification from face-to-facd to non-face-to-face while maintaining the structure of identification can not only cause inconvenience to a first time member, but also can be more vulnerable to verious security risks. In this study, to evaluate a service level of a bank of the Internet, and provide an improved identification of the structure such that the registration and use of differentiated services is performed in accordance with the evaluation. In addition, the security that may occur with respect to Bank of the Internet to establish a vulnerability and attack model, the results of the analysis of the safety of the step-by-step security attributes and services of the authentication medium of each attack model, existing the safer than Internet banking, confirmed the usefulness in user registration guide.

Robust URL Phishing Detection Based on Deep Learning

  • Al-Alyan, Abdullah;Al-Ahmadi, Saad
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.7
    • /
    • pp.2752-2768
    • /
    • 2020
  • Phishing websites can have devastating effects on governmental, financial, and social services, as well as on individual privacy. Currently, many phishing detection solutions are evaluated using small datasets and, thus, are prone to sampling issues, such as representing legitimate websites by only high-ranking websites, which could make their evaluation less relevant in practice. Phishing detection solutions which depend only on the URL are attractive, as they can be used in limited systems, such as with firewalls. In this paper, we present a URL-only phishing detection solution based on a convolutional neural network (CNN) model. The proposed CNN takes the URL as the input, rather than using predetermined features such as URL length. For training and evaluation, we have collected over two million URLs in a massive URL phishing detection (MUPD) dataset. We split MUPD into training, validation and testing datasets. The proposed CNN achieves approximately 96% accuracy on the testing dataset; this accuracy is achieved with URL schemes (such as HTTP and HTTPS) removed from the URL. Our proposed solution achieved better accuracy compared to an existing state-of-the-art URL-only model on a published dataset. Finally, the results of our experiment suggest keeping the CNN up-to-date for better results in practice.

A Study on Antecedents of Online Trust in the Context of e-Government Services (전자정부 서비스 사용에 있어 온라인 신뢰에 관한 연구)

  • Moon, Chul-Woo;Kim, Jae-Hyoun
    • Journal of Internet Computing and Services
    • /
    • v.12 no.3
    • /
    • pp.57-67
    • /
    • 2011
  • Trust is generally assumed to be an important precondition for people's adoption of e-government services. This study analyzes the direct and indirect impact of information privacy, interactivity, subjective norms and words-of-mouth on perceived trust of e-government services and trust toward government. The Partial Least Square(PLS) was applied to the citizen survey data for hypotheses testing. PLS permits the simultaneous testing of cause-effect hypotheses while also allowing evaluation of the measurement model. Statistical results indicate that interactivity, subjective norms and words-of-mouth positively affects perceived trust of e-government services, which in turn affects the level of political efficacy and the trust toward the government. Interactivity has been found to affect words-of-mouth as well. However, information privacy has no significant effect on the trust of e-government services.