• Title/Summary/Keyword: e-Learning Business

Search Result 312, Processing Time 0.029 seconds

Knowledge Management Research Based on Social Network Theories: A Review with Future Directions

  • Tae Hun Kim
    • Asia pacific journal of information systems
    • /
    • v.32 no.1
    • /
    • pp.168-190
    • /
    • 2022
  • This review aims to synthesize social network theories by drawing on the importance of social network perspectives in understanding knowledge management with technology in organizations. I provide an overview of prior social network research with the following core ideas: the primacy of relations between organizational actors, the utility of actors' embeddedness in social fields, the social utility of network connections, and the structural patterning of social life. On top of that, I summarize critical social perspectives (the social capital theory, the structural hole theory, the embeddedness perspective, the social exchange theory, the organizational learning theory, and the innovation diffusion theory) to suggest potential research questions for future studies in social network research in the knowledge management discipline.

A Study on the Performance Evaluation System of Internet venture Business (인터넷 벤처비즈니스 평가체계에 관한 연구)

  • 이명호;이우형;손성혁
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.26 no.3
    • /
    • pp.21-37
    • /
    • 2001
  • Riding on the wave of the information technology revolution, a slow of internet venture businesses (IVB) came into being. Hence, one of the recent developments in Korean capital market has been the proliferation of IVB, which is in accordance with the worldwide trend of ‘new economy’. Although the fair valuation is crucial for the nourishment of IVB, it is difficult to apply traditional valuation methods to these firms without reservation. It is due to the facts that most venture firms have little records of performance, grow unprecedently fast, and have highly uncertain future. The main purpose of this study is to suggest performance evaluation system of IVB and to develop KPE (Key Performance Indicators). Our empirical study is based upon Kaplan & Norton’s Balance Scorecard (BSC) approach. Specifically, our research has been conducted by the following two subsequent procedures: Firstly, seven internet venture firms have been selected and their executives have been interviewed by FGI(Focus Group Interview) method. Based upon these results, performance indicators have been developed. Secondly, by using the above mentioned BSC items (i.e., financial perspective, customer perspective, internal perspective and innovation & learning perspective), questionnaires have been constructed and sent to IVB through e-mail as well as over the Fax. Among the collected 110 samples, reliable 106 samples have been used to build BSC model and to draw our conclusion. In the future study, it would be much better to consider the role of strategy in IVB and the causal relationship among Key Performance Indicators of BSC.

  • PDF

A Study on Application of Predictive Coding Tool for Enterprise E-Discovery (기업의 전자증거개시 대응을 위한 예측 부호화(Predictive Coding) 도구 적용 방안)

  • Yu, Jun Sang;Yim, Jin Hee
    • Journal of the Korean Society for information Management
    • /
    • v.33 no.4
    • /
    • pp.125-157
    • /
    • 2016
  • As the domestic companies which have made inroads into foreign markets have more lawsuits, these companies' demands for responding to E-Discovery are also increasing. E-Discovery, derived from Anglo-American law, is the system to find electronic evidences related to lawsuits among scattered electronic data within limited time, to review them as evidences, and to submit them. It is not difficult to find, select, review, and submit evidences within limited time given the reality that the domestic companies do not manage their records even though lots of electronic records are produced everyday. To reduce items to be reviewed and proceed the process efficiently is one of the most important tasks to win a lawsuit. The Predictive Coding is a computer assisted review instrument used in reviewing process of E-Discovery, which is to help companies review their own electronic data using mechanical learning. Predictive Coding is more efficient than the previous computer assister review tools and has a merit to select electronic data related to lawsuit. Through companies' selection of efficient computer assisted review instrument and continuous records management, it is expected that time and cost for reviewing will be saved. Therefore, in for companies to respond to E-Discovery, it is required to seek the most effective method through introduction of the professional Predictive Coding solution and Business records management with consideration of time and cost.

Do Not Just Talk, Show Me in Action: Investigating the Effect of OSSD Activities on Job Change of IT Professional (오픈소스 소프트웨어 개발 플랫폼 활동이 IT 전문직 취업에 미치는 영향)

  • Jang, Moonkyoung;Lee, Saerom;Baek, Hyunmi;Jung, Yoonhyuk
    • The Journal of Society for e-Business Studies
    • /
    • v.26 no.1
    • /
    • pp.43-65
    • /
    • 2021
  • With the advancement of information and communications technology, a means to recruit IT professional has fundamentally changed. Nowadays recruiters search for candidate information from the Web as well as traditional information sources such as résumés or interviews. Particularly, open-source software development (OSSD) platforms have become an opportunity for developers to demonstrate their IT capabilities, making it a way for recruiters to find the right candidates, whom they need. Therefore, this study aims to investigate the impact developers' profiles in an OSSD platform on their finding a job. This study examined four antecedents of developer information that can accelerate their job search: job-seeking status, personal-information posting, learning activities and knowledge contribution activities. For the empirical analysis, we developed a Web crawler and gathered a dataset on 4,005 developers from GitHub, which is a well-known OSSD platform. Proportional hazards regression was used for data analysis because shorter job-seeking period implies more successful result of job change. Our results indicate that developers, who explicitly posted their job-seeking status, had shorter job-seeking periods than those who did not. The other antecedents (i.e., personal-information posting, learning, and knowledge contribution activities) also contributed in reducing the job-seeking period. These findings imply values of OSSD platforms for recruiters to find proper candidates and for developers to successfully find a job.

An Error Analysis on Business E-mails in English : A Case-Study (비지니스 이메일 영작문에 나타난 오류분석: 사례연구)

  • Hwang, Seon-Yoo
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.6
    • /
    • pp.273-279
    • /
    • 2018
  • This study aimed at providing a comprehensive account of the sources and causes of errors in business emails that Korean college students wrote using a translation machine. Data were collected from 21 emails written by the students who took a business English course. Findings indicated that the students tended to make frequent errors in verb use and verb tense as well as a definite article, countable/noncountable nouns, time adverbs and prepositions. Therefore, the study suggested that the students' common errors imply that they experience some difficulties learning these linguistic features. Given that learners' errors can give us valuable insights into teaching and learning how to write in English, pedagogical suggestions are put forward based on the study results.

An Automatic Setting Method of Data Constraints for Cleansing Data Errors between Business Services (비즈니스 서비스간의 오류 정제를 위한 데이터 제약조건 자동 설정 기법)

  • Lee, Jung-Won
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.3
    • /
    • pp.161-171
    • /
    • 2009
  • In this paper, we propose an automatic method for setting data constraints of a data cleansing service, which is for managing the quality of data exchanged between composite services based on SOA(Service-Oriented Architecture) and enables to minimize human intervention during the process. Because it is impossible to deal with all kinds of real-world data, we focus on business data (i.e. costumer order, order processing) which are frequently used in services such as CRM(Customer Relationship Management) and ERP(Enterprise Resource Planning). We first generate an extended-element vector by extending semantics of data exchanged between composite services and then build a rule-based system for setting data constraints automatically using the decision tree learning algorithm. We applied this rule-based system into the data cleansing service and showed the automation rate over 41% by learning data from multiple registered services in the field of business.

A Study on the Construction Method of HS Item Classification Decision System Based on Artificial Intelligence

  • Choi, keong ju
    • International Journal of Advanced Culture Technology
    • /
    • v.8 no.1
    • /
    • pp.165-172
    • /
    • 2020
  • Industrial Revolution means the improvement of productivity through technological innovation and has been a driving force of the whole change of economic system and social structure as the characteristic of technology as the tool of this productivity has changed. Since the first industrial revolution of the 18th century, productivity efficiency has been advanced through three industrial revolutions so far, and this fourth industrial revolution is expected to bring about another revolution of production. In this study, the demand for the introduction of artificial intelligence(AI) technology has been increasing in various business fields due to the rapid development of ICT technology, and the classification of HS(harmonized commodity description and coding system) items has been decided using artificial intelligence technology, which is the core of the fourth industrial revolution. And it is enough to construct HS classification system based on AI technology using inference and deep learning. Performing the HS item classification is not an easy task. Implementation of item classification system using artificial intelligence technology to analyze information of HS item classification which is performed manually by the current person more accurately and without any mistake, And the customs administrations, customs offices, and customs agencies, it is expected to be highly utilized in the innovation of trade practice and the customs administration innovation FTA origin agent.

A Study on the Evaluation of Web-based Cyber Education Program as a Tool for Self Directed Human Resources Development (자기주도형 인적자원개발 도구로서의 사이버 교육 프로그램의 효과 평가에 관한 연구;POSCO 안전관리 사이버 과정을 중심으로)

  • Lee, Sung
    • Journal of Agricultural Extension & Community Development
    • /
    • v.8 no.2
    • /
    • pp.179-190
    • /
    • 2001
  • The purpose of this study was to analysis the education effects of web-based on-line cyber program mesaured by Kirkpatrick’s evaluation process. The average score on satisfaction of the program was 4.28(.59), which was designed to evaluate the level 1, reaction. To test level 2, learning, the average score that students achieved was calculated and it was 86.87(std.=7.05) in the term examinations. The level 3, job months. It was reported that most employees who took the course are utilizing the knowledge that they acquired from the course(mean=3.80, std.=.77). To identify the level 4, business results, the mean score of the number of accidents and near misses that happened in their factories for 3 months before and after the course were compared. There was statistically significant difference between the number of accidents that happened 3 months before the course and 3 months after the course, at the significance level of .01, which was tested by Paired t-test.

  • PDF

A Study on the Emoticon Extraction based on Facial Expression Recognition using Deep Learning Technique (딥 러닝 기술 이용한 얼굴 표정 인식에 따른 이모티콘 추출 연구)

  • Jeong, Bong-Jae;Zhang, Fan
    • Korean Journal of Artificial Intelligence
    • /
    • v.5 no.2
    • /
    • pp.43-53
    • /
    • 2017
  • In this paper, the pattern of extracting the same expression is proposed by using the Android intelligent device to identify the facial expression. The understanding and expression of expression are very important to human computer interaction, and the technology to identify human expressions is very popular. Instead of searching for the emoticons that users often use, you can identify facial expressions with acamera, which is a useful technique that can be used now. This thesis puts forward the technology of the third data is available on the website of the set, use the content to improve the infrastructure of the facial expression recognition accuracy, in order to improve the synthesis of neural network algorithm, making the facial expression recognition model, the user's facial expressions and similar e xpressions, reached 66%.It doesn't need to search for emoticons. If you use the camera to recognize the expression, itwill appear emoticons immediately. So this service is the emoticons used when people send messages to others, and it can feel a lot of convenience. In countless emoticons, there is no need to find emoticons, which is an increasing trend in deep learning. So we need to use more suitable algorithm for expression recognition, and then improve accuracy.

URL Phishing Detection System Utilizing Catboost Machine Learning Approach

  • Fang, Lim Chian;Ayop, Zakiah;Anawar, Syarulnaziah;Othman, Nur Fadzilah;Harum, Norharyati;Abdullah, Raihana Syahirah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.297-302
    • /
    • 2021
  • The development of various phishing websites enables hackers to access confidential personal or financial data, thus, decreasing the trust in e-business. This paper compared the detection techniques utilizing URL-based features. To analyze and compare the performance of supervised machine learning classifiers, the machine learning classifiers were trained by using more than 11,005 phishing and legitimate URLs. 30 features were extracted from the URLs to detect a phishing or legitimate URL. Logistic Regression, Random Forest, and CatBoost classifiers were then analyzed and their performances were evaluated. The results yielded that CatBoost was much better classifier than Random Forest and Logistic Regression with up to 96% of detection accuracy.