• Title/Summary/Keyword: e-Business Standard

Search Result 333, Processing Time 0.023 seconds

Problems of Shariah Governance Framework and Different Bodies: An Empirical Investigation of Islamic Banks in Bangladesh

  • ALAM, Md. Kausar;MUSTAFA, Hasri;UDDIN, Md. Salah;ISLAM, Md. Jahirul;MOHUA, Marjea Jannat;HASSAN, Md. Farjin
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.3
    • /
    • pp.265-276
    • /
    • 2020
  • The study aims to explore the problems of the existing Shariah Governance Framework (SGF) and its concerned authorities in the context of Bangladesh. Thus, according to responses from 17 respondents, this study outlines that Bangladesh has an absence of a shortage of experts, experienced, knowledgeable, and qualified Shariah people at all levels (i.e., the central bank, Islamic banks, Shariah Supervisory Boards (SSBs), and regulators). Therefore, Bangladesh does not have a separate Islamic banking act, Shariah audit firm, Shariah index institutions, and comprehensive SGF. The existing guideline has a limitation concerning its comprehensiveness, accountability, responsibility, and structure of SSBs. Islamic banks do not follow the instruction of the central bank in the formation of SSBs. As a result, there is an absence of competent and qualified SSB, which also results in the functions of Shariah departments as well as Shariah applications. Usually, the Board of Directors (BOD), management, executives, customers, and the public also have the conceptual gap about Islamic banks, SGF, and banking system compared to the regular prayers, faith, and belief. Concisely, Bangladesh requisites a comprehensive SGF, Islamic banking act, a standard accounting system, and a robust Shariah audit system for the overall development of Islamic banks and SGF.

XML Web Services for Learning ContentsBased on a Pedagogical Design Model (교수법적 설계 모델링에 기반한 학습 컨텐츠의 XML 웹 서비스 구축)

  • Shin, Haeng-Ja;Park, Kyung-Hwan
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.8
    • /
    • pp.1131-1144
    • /
    • 2004
  • In this paper, we investigate a problem with an e-learning system for e-business environments and introduce the solving method of the problem. To be more accurate, existing Web-hosted and ASP (Application Service Provider)-oriented service model is difficult to cooperate and integrate among the different kinds of systems. So we have produced sharable and reusable learning object, they have extracted a principle from pedagogical designs for units of reuse. We call LIO (Learning Item Object). This modeling makes use of a constructing for XML Web Services. So to speak, units of reuse from pedagogical designs are test tutorial, resource, case example, simulation, problem, test, discovery and discussion and then map introduction, fact, try, quiz, test, link-more, tell-more LIO learning object. These typed LIOs are stored in metadata along with the information for a content location. Each one of LIOs is designed with components and exposed in an interface for XML Web services. These services are module applications, which are used a standard SOAP (Simple Object Access Protocol) and locate any computer over Internet and publish, find and bind to services. This guarantees the interoperation and integration of the different kinds of systems. As a result, the problem of e-learning systems for e-business environments was resolved and then the power of understanding about learning objects based on pedagogical design was increased for learner and instruction designers. And organizations of education hope for particular decreased costs in constructing e-learning systems.

  • PDF

Design of Framework for Ubiquitous Privacy-Aware Web Services (유비쿼터스 Privacy-Aware Web Services Framework 설계)

  • Song, You-Jin;Lee, Dong-Hyeok
    • The Journal of Society for e-Business Studies
    • /
    • v.11 no.2
    • /
    • pp.13-30
    • /
    • 2006
  • Web services are independent on a platform and are suitable in the Ubiquitous environment which an interaction for each device. Ubiquitous web services can use various applied service in any network neighborhood or terminal. Main characteristic of Ubiquitous is context-awareness. Therefore, Ubiquitous web services must include context-aware control process and protect user privacy because context-aware environment collects privacy data. But current web services standard is not specially designed in respect of context-communication. Therefore, the framework which can add flexibility in transmission of context is required. Our Framework can give extension for context and can communicate flexibly Context information for every session. Therefore, Our Framework can solve overhead problem of context in SOAP message and protect user's privacy according to user preference.

  • PDF

Fraud Click Identification Using Fingerprinting Method (핑거프린팅 기법을 이용한 부정 클릭의 식별)

  • Hong, Young-Ran;Kim, Dong-Soo
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.3
    • /
    • pp.159-168
    • /
    • 2011
  • To identify fraud clicks in the Internet advertisement, existing studies have considered keyword, visit time, and client IP as an independent variable for the standard. These methods have limitations in identifying the fraud clicks that utilize automation tools, for they are methods based on client IP and human activities on the Internet. This paper proposes that fingerprinting values of the variable combination should be used to identify fraud clicks. The proposed model is composed of 3 stages and the fingerprinting values are compared with the other input data at each stage; IP fingerprinting in the first stage, IP and session data fingerprinting in the second stage, and session data and keyword fingerprinting in the third stage. We showed that the proposed model of the fraud click identification is more correct than existing methods through experiments according to the proposed scheme.

Adaptive Framework for Designing R&D Project Management Process Using Cloud Computing Technology (클라우드 컴퓨팅 기술을 활용한 적응형 연구개발 프로젝트 관리 프로세스 설계 프레임워크)

  • Shin, Kwang-Sup
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.4
    • /
    • pp.25-43
    • /
    • 2013
  • Two of the most important changes in the global market can be represented with Hyper-connection and Glocalization. To cope with these changes and secure the competitive advantages, it is essential to develop the standard organization, policy, processes and criteria for service management. In addition, the service management system is required to effectively support the R&D project management. In this research, an adaptive framework and system architecture for designing R&D project management process using cloud computing has been introduced. With the proposed system, it is able to overcome the limitations of traditional service management and treat the demand from the market in agility. Moreover, it may be possible to present more value than customers want and secure the competitive advantages in the global market with the proposed system.

A Study on the Information Modeling of Defense R&D Process Using IDEF Methodology (IDEF 방법론을 이용한 국방 연구개발 프로세스의 정보모델링 연구)

  • Kim, Chul-Whan
    • The Journal of Society for e-Business Studies
    • /
    • v.10 no.1
    • /
    • pp.41-60
    • /
    • 2005
  • IDEF(Integrated Definition) method, a standard methodology of CALS process modelling, was applied to the weapon system R&D process to provide information modelling by analysing about goal, input, output and constraints in the R&D process. The information to be managed in R&D institutes was identified by using SmartER which is the automation program of IDEF1/1X and obtained information modelling for TO-BE model. The work process of weapon system R&D consists of the concept study phase, the exploration development phase, the system development phase, the prototype manufacturing phase, and the report writing of R&D results phase. The information modelling of weapon system R&D is the R&D work process with information sharing by means of IWSDB Since IDEF is suitable for large scale system development like weapon system R&D, further studies on IDEF would be required to achieve the goal of defense CALS.

  • PDF

Analysis on the Correlation Between Mobile Contents Use and Active Attitude toward Mobile Internet (모바일 콘텐츠 활용과 모바일 인터넷에 대한 적극적 태도와의 연관성 분석)

  • Jang, Sejung;Jin, Seohoon
    • The Journal of Society for e-Business Studies
    • /
    • v.21 no.4
    • /
    • pp.15-28
    • /
    • 2016
  • As the industry of Mobile Internet has been gradually developed, the major device for accessing the web is predicted to shift from PC to Mobile devices in the near future. This drastic increase of demand in Mobile devices has drawn a more convenient standard of living by transcending time and space in our lives, however, it triggered various side effects such as a digital divide. This study was conducted to analyze how people utilize the contents via Mobile devices and their active attitude toward Mobile Internet by dividing individual characteristics into generations, education level and income level, and also identify whether Mobile contents utilization has an effect on the active attitude. The research results could be used for establishing a policy to narrow the gap in Mobile contents use and active attitude by individual characteristics.

A Study on Design Security Management Evaluation Model for Small-Medium size Healthcare Institutions (중소형 의료기관 보안관리 평가모델 설계 연구)

  • Kim, Ja Won;Chang, Hang Bae
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.1
    • /
    • pp.89-102
    • /
    • 2018
  • In this paper, the security characteristics of healthcare institutions were derived through analysis of previous research, and the characteristics and status of small and medium sized healthcare institutions were surveyed through field surveys of small and medium sized healthcare institutions. The security management evaluation model for small and medium sized healthcare institutions was designed and verified based on the security characteristics of small and medium healthcare institutions. For the design, we compared and analyzed existing security management system and evaluation certification system of healthcare institutions. We also confirmed the proposed security management evaluation model and the degree of sharing. In addition, we conducted validation for the statistical verification of the proposed security management evaluation model for small and medium sized healthcare institutions, and we performed the relative priority analysis through AHP analysis to derive the weight for each item. The result of this study is expected to be used as a standard of security management evaluation model that can be practiced in small and medium sized healthcare institutions.

Design of Automatic Database Schema Generator Based on XML Schema (XML 스키마 기반의 데이터베이스 스키마 생성기 설계)

  • Lim, Jong-Seon;Kim, Kyung-Soo
    • Convergence Security Journal
    • /
    • v.7 no.3
    • /
    • pp.79-86
    • /
    • 2007
  • B2B e-business is an economic transaction formed between companies through various networks including internet. At present, e-business between companies partly applies information distribution between companies, but many enterprises expect that a corporate basic system will be gradually changed into XML basis if web service is earnestly materialized, so they are competing with each other in developing XML DBMS. Existing XML DBMS studies used XML DTD in order to represent the structure of XML document. Such XML DTD defines the expression of a simple type, so there are many difficulties in defining the structure of XML document. To cope with this, in this paper, the author will develop database schema generator utilizing relational database generally used in storing contents of data, on the basis of XML schema selected as a standard of W3C. Also, to store XML data, the author proposed the automatic conversion method of relational database schema that used XML schema.

  • PDF

A Construction and Operation Analysis of Group Management Network about Control Devices based on CIM Level 3 (CIM 계층 3에서 제어 기기들의 그룹 관리 네트워크 구축과 운영 해석)

  • 김정호
    • The Journal of Society for e-Business Studies
    • /
    • v.4 no.1
    • /
    • pp.87-101
    • /
    • 1999
  • To operate the automatic devices of manufacturing process more effectively and to solve the needs of the resource sharing, network technology is applied to the control devices located in common manufacturing zone and operated by connecting them. In this paper, functional standard of the network layers are set as physical and data link layer of IEEE 802.2, 802.4, and VMD application layer and ISO-CIM reference model. Then, they are divided as minimized architecture, designed as group objects which perform group management and service objects which organizes and operates the group. For the stability in this network, this paper measures the variation of data packet length and node number and analyzes the variated value of the waiting time for the network operation. For the method of the analysis, non-exhausted service method are selected, and the arrival rates of the each data packet to the nodes that are assumed to form a Poission distribution. Then, queue model is set as M/G/1, and the analysis equation for waiting time is found. For the evalution of the performance, the length of the data packet varies from 10 bytes to 100 bytes in the operation of the group management network, the variation of the wating time is less than 10 msec. Since the waiting time in this case is less than 10 msec, response time is fast enough. Furthermore, to evaluate the real time processing of the group management network, it shows if the number of nodes is less than 40, and the average arrival time is less than 40 packet/sec, it can perform stable operation even taking the overhead such as software delay time, indicated packet service, and transmissin safety margin.

  • PDF