• Title/Summary/Keyword: enterprise

Search Result 4,491, Processing Time 0.034 seconds

A Study on the Product Design Case Study of Differential Design Concept (차별화 된 디자인 개념의 제품디자인 사례 연구)

  • 이덕상;한세준;김홍규;조철희
    • Archives of design research
    • /
    • v.17 no.2
    • /
    • pp.335-350
    • /
    • 2004
  • Design takes concrete form from the things which are not yet exist to the molded reality. Creation of value which is accompanied by the rational value could be possible only through the searching examination of the basic concept. All designs are under circumstances because the results and the character of the problems are different under the given conditions and circumstances which are the characteristic of the design. The aim of this study is searching for the differential design conce- pt which is the most appropriate and reasonable in the basic design process in which the phase of the analysis, synthesis and evaluation of the problem. First of all the pursuit value of the times and the change of the view point of value of the product design. How the pursuit value of times were searched and analyzed. Analyze the successful product design realization of the typical trend of the modern design which are 3-2. function-focused design, 3-3. emotion-centered design, 3-4. image communicative design through the metaphor, 3-5. environmental affinity design. On the base of the case analysis how to apply the differential design concept which is coming as a trend in the future society which are sustainable developing society was examined closely. The outcome through the analysis of the success cases are as follows, \circled1 the value of the spirit of the times should be emphasized as the design image, \circled2 environmental appropriateness should be taken into consideration as the first primary factor, \circled3 the realization of value of the fulfillment of differential consumer's needs, \circled4 lead to prolong the life cycle of the product, \circled5 promote the sustaining growth of enterprise, \circled6 user-centered product value should be the first consideration. \circled7 It is necessary to overcome the cultural andinguistic barriers and to reflect the metaphor which people remember well. \circled8 The application of human's true character should be decided beforehand. It is the commonness of values of times and customs. \circled9 The differentiated design concept which meets our mental satisfaction, not material one, will be required. In addition to this the creative and differentiated design concepts which are accompanied by the good design factor under the base of product could achieve the emotional consensus from the consumers. That is, the value of all designs should be estimated by the base of the humanism ' The human beings are the barometer of all things".ngs".uot;.

  • PDF

The influences of individual personality types on ERP system's acceptance: a preliminary test (개인의 성격유형이 ERP수용에 미치는 영향에 관한 탐색적 연구)

  • Kim, Hyun-Sang;Lee, Jang-Hyung
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.11 no.4
    • /
    • pp.47-65
    • /
    • 2006
  • The application of the ERP system is becoming more common to the businesses since a firm needs to reinforce positive competitiveness and to maintain competitive advantage. The ERP system is an enterprise integration solution that converts the whole business processes through information technology. Extant research provides plenty of results about the success factors of the ERP system; however, most of the researches focus on the exterior factors such as techniques rather than on the influences that a firm's employees' individual personality has in accepting the information technology of the ERP system. The objective of this study is to investigate the role of the employees' individual personality as a factor that makes the ERP system a success. The surveys--composed of the extent of information technology acceptance about the personality type of MBTI (Myers-Briggs type indicator) and the ERP system--were given to the companies applying the ERP system The personality type of MBTI is measured by 4 types of Myers, and Davis's TAM (technology acceptance model) is used for the information technology acceptance. The results of this study are summarized as follows. First the extraversion and the judging in the personality types of MBTI have a significant influence on the information technology acceptance of the ERP system. However, the thinking and the feeling in the personality types of MBTI were analyzed to not have a critical affect on the ERP system acceptance. Second as verified in the extant research the information technology acceptance verification related to the ERP system has a significant influence on perceived ease of use, perceived usefulness, behavioral intention and actual usage of the ERP system. The results of this study can be used for a successful application of the ERP system as follows. First it offers foundation of perception that the type of the individual personality is a significant key figure for the successful use of the ERP system. Second it provides a basis for the knowledge of combining the model of information technology acceptance and the psychological factors.

  • PDF

A Study on the Optimization Methods of Security Risk Analysis and Management (경비위험 분석 및 관리의 최적화 방안에 관한 연구)

  • Lee, Doo-Suck
    • Korean Security Journal
    • /
    • no.10
    • /
    • pp.189-213
    • /
    • 2005
  • Risk management should be controlled systematically by effectively evaluating and suggesting countermeasures against the various risks which are followed by the change of the society and environment. These days, enterprise risk management became a new trend in the field. The first step in risk analysis is to recognize the risk factors, that is to verify the vulnerabilities of loss in the security facilities. The second step is to consider the probability of loss in assessing the risk factors. And the third step is to evaluate the criticality of loss. The security manager will determine the assessment grades and then the risk levels of each risk factor, on the basis of the result of risk analysis which includes the assessment of vulnerability, the provability of loss and the criticality. It is of great importance to put the result of risk analysis in mathematical statement for a scientific approach to risk management. Using the risk levels gained from the risk analysis, the security manager can develop a comprehensive and supplementary security plan. In planning the risk management measures to prepare against and minimize the loss, insurance is one of the best loss-prevention programs. However, insurance in and of itself is no longer able to meet the security challenges faced by major corporations. The security manager have to consider the cost-effectiveness, to suggest the productive risk management alternatives by using the security files which contains every information about the security matters. Also he/she have to reinforce the company regulations on security and safety, and to execute education repeatedly on security and risk management. Risk management makes the most efficient before-the-loss arrangement for and after-the-loss continuation of a business. So it is very much important to suggest a best cost-effective and realistic alternatives for optimizing risk management above all, and this function should by maintained and developed continuously and repeatedly.

  • PDF

A Study on Developing Web based Logistic Information System(KT-Logis) (웹 기반 통합물류정보시스템(KT-Logis) 개발에 관한 연구)

  • 오상호;김태준
    • Proceedings of the Korean DIstribution Association Conference
    • /
    • 2001.11b
    • /
    • pp.125-141
    • /
    • 2001
  • In this paper, the current problems of logistics industry in Korea and their possible solutions were discussed. With Korea Telecoms KT-Logis, the supplier and demander of logistics service would not have to invest large sum of money into their computer system. All they need is just a computer with internet connected. What KT-Logis influence on the logistics industry are the following; 1. Many logistics service supplier and demander can do the business on the web with one computer system. 2. This web based computer system does not only work on the office but also apply on the field worker such as delivery personnel or even the forwarder with mobile phone. 3. KT-Logis is an integrated system which cover the broad arrange of logistics management from truck management to customer relations management. 4. Finally, KT-Logis is web based systems which suits for current e-business and mobile environment. In future, more studies should be done to develop more progressive integrated logistics information systems with enterprise resource planning(ERP) and supply chain management(SCM).

  • PDF

A PLS Path Modeling Approach on the Cause-and-Effect Relationships among BSC Critical Success Factors for IT Organizations (PLS 경로모형을 이용한 IT 조직의 BSC 성공요인간의 인과관계 분석)

  • Lee, Jung-Hoon;Shin, Taek-Soo;Lim, Jong-Ho
    • Asia pacific journal of information systems
    • /
    • v.17 no.4
    • /
    • pp.207-228
    • /
    • 2007
  • Measuring Information Technology(IT) organizations' activities have been limited to mainly measure financial indicators for a long time. However, according to the multifarious functions of Information System, a number of researches have been done for the new trends on measurement methodologies that come with financial measurement as well as new measurement methods. Especially, the researches on IT Balanced Scorecard(BSC), concept from BSC measuring IT activities have been done as well in recent years. BSC provides more advantages than only integration of non-financial measures in a performance measurement system. The core of BSC rests on the cause-and-effect relationships between measures to allow prediction of value chain performance measures to allow prediction of value chain performance measures, communication, and realization of the corporate strategy and incentive controlled actions. More recently, BSC proponents have focused on the need to tie measures together into a causal chain of performance, and to test the validity of these hypothesized effects to guide the development of strategy. Kaplan and Norton[2001] argue that one of the primary benefits of the balanced scorecard is its use in gauging the success of strategy. Norreklit[2000] insist that the cause-and-effect chain is central to the balanced scorecard. The cause-and-effect chain is also central to the IT BSC. However, prior researches on relationship between information system and enterprise strategies as well as connection between various IT performance measurement indicators are not so much studied. Ittner et al.[2003] report that 77% of all surveyed companies with an implemented BSC place no or only little interest on soundly modeled cause-and-effect relationships despite of the importance of cause-and-effect chains as an integral part of BSC. This shortcoming can be explained with one theoretical and one practical reason[Blumenberg and Hinz, 2006]. From a theoretical point of view, causalities within the BSC method and their application are only vaguely described by Kaplan and Norton. From a practical consideration, modeling corporate causalities is a complex task due to tedious data acquisition and following reliability maintenance. However, cause-and effect relationships are an essential part of BSCs because they differentiate performance measurement systems like BSCs from simple key performance indicator(KPI) lists. KPI lists present an ad-hoc collection of measures to managers but do not allow for a comprehensive view on corporate performance. Instead, performance measurement system like BSCs tries to model the relationships of the underlying value chain in cause-and-effect relationships. Therefore, to overcome the deficiencies of causal modeling in IT BSC, sound and robust causal modeling approaches are required in theory as well as in practice for offering a solution. The propose of this study is to suggest critical success factors(CSFs) and KPIs for measuring performance for IT organizations and empirically validate the casual relationships between those CSFs. For this purpose, we define four perspectives of BSC for IT organizations according to Van Grembergen's study[2000] as follows. The Future Orientation perspective represents the human and technology resources needed by IT to deliver its services. The Operational Excellence perspective represents the IT processes employed to develop and deliver the applications. The User Orientation perspective represents the user evaluation of IT. The Business Contribution perspective captures the business value of the IT investments. Each of these perspectives has to be translated into corresponding metrics and measures that assess the current situations. This study suggests 12 CSFs for IT BSC based on the previous IT BSC's studies and COBIT 4.1. These CSFs consist of 51 KPIs. We defines the cause-and-effect relationships among BSC CSFs for IT Organizations as follows. The Future Orientation perspective will have positive effects on the Operational Excellence perspective. Then the Operational Excellence perspective will have positive effects on the User Orientation perspective. Finally, the User Orientation perspective will have positive effects on the Business Contribution perspective. This research tests the validity of these hypothesized casual effects and the sub-hypothesized causal relationships. For the purpose, we used the Partial Least Squares approach to Structural Equation Modeling(or PLS Path Modeling) for analyzing multiple IT BSC CSFs. The PLS path modeling has special abilities that make it more appropriate than other techniques, such as multiple regression and LISREL, when analyzing small sample sizes. Recently the use of PLS path modeling has been gaining interests and use among IS researchers in recent years because of its ability to model latent constructs under conditions of nonormality and with small to medium sample sizes(Chin et al., 2003). The empirical results of our study using PLS path modeling show that the casual effects in IT BSC significantly exist partially in our hypotheses.

Importance of End User's Feedback Seeking Behavior for Faithful Appropriation of Information Systems in Small and Medium Enterprises (중소기업 환경에서의 합목적적 정보시스템 활용을 위한 최종사용자 피드백 탐색행위의 중요성)

  • Shin, Young-Mee;Lee, Joo-Ryang;Lee, Ho-Geun
    • Asia pacific journal of information systems
    • /
    • v.17 no.4
    • /
    • pp.61-95
    • /
    • 2007
  • Small-and-medium sized enterprises(SMEs) represent quite a large proportion of the industry as a whole in terms of the number of enterprises or employees. However researches on information system so far have focused on large companies, probably because SMEs were not so active in introducing information systems as larger enterprises. SMEs are now increasingly bringing in information systems such as ERP(Enterprise Resource Planning Systems) and some of the companies already entered the stage of ongoing use. Accordingly, researches should deal with the use of information systems by SME s operating under different conditions from large companies. This study examined factors and mechanism inducing faithful appropriation of information systems, in particular integrative systems such as ERP, in view of individuals` active feedback-seeking behavior. There are three factors expected to affect end users` feedback-seeking behavior for faithful appropriation of information systems. They are management support, peer IT champ support, and IT staff support. The main focus of the study is on how these factors affect feedback-seeking behavior and whether the feedback-seeking behavior plays the role of mediator for realizing faithful appropriation of information systems by end users. To examine the research model and the hypotheses, this study employed an empirical method based on a field survey. The survey used measurements mostly employed and verified by previous researches, while some of the measurements had gone through minor modifications for the purpose of the study. The survey respondents are individual employees of SMEs that have been using ERP for one year or longer. To prevent common method bias, Task-Technology Fit items used as the control variable were made to be answered by different respondents. In total, 127 pairs of valid questionnaires were collected and used for the analysis. The PLS(Partial Least Squares) approach to structural equation modeling(PLS-Graph v.3.0) was used as our data analysis strategy because of its ability to model both formative and reflective latent constructs under small-and medium-size samples. The analysis shows Reliability, Construct Validity and Discriminant Validity are appropriate. The path analysis results are as follows; first, the more there is peer IT champ support, the more the end user is likely to show feedback-seeking behavior(path-coefficient=0.230, t=2.28, p<0.05). In other words, if colleagues proficient in information system use recognize the importance of their help, pass on what they have found to be an effective way of using the system or correct others' misuse, ordinary end users will be able to seek feedback on the faithfulness of their appropriation of information system without hesitation, because they know the convenience of getting help. Second, management support encourages ordinary end users to seek more feedback(path-coefficient=0.271, t=3.06, p<0.01) by affecting the end users' perceived value of feedback(path-coefficient=0.401, t=6.01, p<0.01). Management support is far more influential than other factors that when the management of an SME well understands the benefit of ERP, promotes its faithful appropriation and pays attention to employees' satisfaction with the system, employees will make deliberate efforts for faithful appropriation of the system. However, the third factor, IT staff support was found not to be conducive to feedback-seeking behavior from end users(path-coefficient=0.174, t=1.83). This is partly attributable to the fundamental reason that there is little support for end users from IT staff in SMEs. Even when IT staff provides support, end users may find it less important than that from coworkers more familiar with the end users' job. Meanwhile, the more end users seek feedback and attempt to find ways of faithful appropriation of information systems, the more likely the users will be able to deploy the system according to the purpose the system was originally meant for(path-coefficient=0.35, t=2.88, p<0.01). Finally, the mediation effect analysis confirmed the mediation effect of feedback-seeking behavior. By confirming the mediation effect of feedback-seeking behavior, this study draws attention to the importance of feedback-seeking behavior that has long been overlooked in research about information system use. This study also explores the factors that promote feedback-seeking behavior which in result could affect end user`s faithful appropriation of information systems. In addition, this study provides insight about which inducements or resources SMEs should offer to promote individual users' feedback-seeking behavior when formal and sufficient support from IT staff or an outside information system provider is hardly expected. As the study results show, under the business environment of SMEs, help from skilled colleagues and the management plays a critical role. Therefore, SMEs should seriously consider how to utilize skilled peer information system users, while the management should pay keen attention to end users and support them to make the most of information systems.

Analysis on the core factors in the successful importing of ERP system in Small & Medium Enterprises - Focusing on the Cooperation Model between Industry and Education in Chung-Buk province (중소기업 ERP 시스템 도입 핵심성공요인 분석 -충북지역 산학연계 모델을 중심으로-)

  • 김범년;김영렬
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.8 no.3
    • /
    • pp.51-60
    • /
    • 2003
  • In the radical char]go of the business environments that the existing facilities can not guarantee the business-frosts anymore, enterprises have been importing ERP system. In Korea, Sam-sung Electronics did it for the first tin in the latter half of 1994 and other enterprises succeeded. Currently, government and public enterprises as well as most of the large enterprises are employing ERP system to sharpen the competitiveness and to win the business transparency. On the other hand, it is harder for small and medium enterprises shaded by the large enterprises to be well-equipped with information system such as ERP, because they have already suffered from chronic financial difficulties and shortage of many resources. Most of all, they prefer the short-term project that does not need much tine for them to make decisions and to carry out fully. Grounded on the above factors, in this work, I suggest the suitable ERP model for the small and medium enterprises and the successful importing process of ERP, which is derived from the previous researches made by other masters' thesis. If necessary information and human resources are interchanged pertinently between local education institute and small and medium enterprise, the latter could not only deal with the confronted difficulties successfully inside and outside but attain the goal of being proficient in up-to-minute high technology. Besides, giving the students the opportunity of researching into the practice of the business they have not ever known, local universities could help their students accumulate knowledges and acquire ideas which could not be achieved in pure academic studies. When the above-mentioned procedure is over, the students might get the intellectual faculty to ponder on the future more concretely and enter a profession more carefully. In the result, we would raise up the percentage of the employment among the graduates. And active participation of university professors is the last important factor that assists the small and medium enterprises for introducing ERP system successfully. Their scholarly attainments play an important role in strengthening local economy and make the business competitiveness balanced between the capital and the local economy.

  • PDF

Recommending Core and Connecting Keywords of Research Area Using Social Network and Data Mining Techniques (소셜 네트워크와 데이터 마이닝 기법을 활용한 학문 분야 중심 및 융합 키워드 추천 서비스)

  • Cho, In-Dong;Kim, Nam-Gyu
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.1
    • /
    • pp.127-138
    • /
    • 2011
  • The core service of most research portal sites is providing relevant research papers to various researchers that match their research interests. This kind of service may only be effective and easy to use when a user can provide correct and concrete information about a paper such as the title, authors, and keywords. However, unfortunately, most users of this service are not acquainted with concrete bibliographic information. It implies that most users inevitably experience repeated trial and error attempts of keyword-based search. Especially, retrieving a relevant research paper is more difficult when a user is novice in the research domain and does not know appropriate keywords. In this case, a user should perform iterative searches as follows : i) perform an initial search with an arbitrary keyword, ii) acquire related keywords from the retrieved papers, and iii) perform another search again with the acquired keywords. This usage pattern implies that the level of service quality and user satisfaction of a portal site are strongly affected by the level of keyword management and searching mechanism. To overcome this kind of inefficiency, some leading research portal sites adopt the association rule mining-based keyword recommendation service that is similar to the product recommendation of online shopping malls. However, keyword recommendation only based on association analysis has limitation that it can show only a simple and direct relationship between two keywords. In other words, the association analysis itself is unable to present the complex relationships among many keywords in some adjacent research areas. To overcome this limitation, we propose the hybrid approach for establishing association network among keywords used in research papers. The keyword association network can be established by the following phases : i) a set of keywords specified in a certain paper are regarded as co-purchased items, ii) perform association analysis for the keywords and extract frequent patterns of keywords that satisfy predefined thresholds of confidence, support, and lift, and iii) schematize the frequent keyword patterns as a network to show the core keywords of each research area and connecting keywords among two or more research areas. To estimate the practical application of our approach, we performed a simple experiment with 600 keywords. The keywords are extracted from 131 research papers published in five prominent Korean journals in 2009. In the experiment, we used the SAS Enterprise Miner for association analysis and the R software for social network analysis. As the final outcome, we presented a network diagram and a cluster dendrogram for the keyword association network. We summarized the results in Section 4 of this paper. The main contribution of our proposed approach can be found in the following aspects : i) the keyword network can provide an initial roadmap of a research area to researchers who are novice in the domain, ii) a researcher can grasp the distribution of many keywords neighboring to a certain keyword, and iii) researchers can get some idea for converging different research areas by observing connecting keywords in the keyword association network. Further studies should include the following. First, the current version of our approach does not implement a standard meta-dictionary. For practical use, homonyms, synonyms, and multilingual problems should be resolved with a standard meta-dictionary. Additionally, more clear guidelines for clustering research areas and defining core and connecting keywords should be provided. Finally, intensive experiments not only on Korean research papers but also on international papers should be performed in further studies.

Development of Market Growth Pattern Map Based on Growth Model and Self-organizing Map Algorithm: Focusing on ICT products (자기조직화 지도를 활용한 성장모형 기반의 시장 성장패턴 지도 구축: ICT제품을 중심으로)

  • Park, Do-Hyung;Chung, Jaekwon;Chung, Yeo Jin;Lee, Dongwon
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.4
    • /
    • pp.1-23
    • /
    • 2014
  • Market forecasting aims to estimate the sales volume of a product or service that is sold to consumers for a specific selling period. From the perspective of the enterprise, accurate market forecasting assists in determining the timing of new product introduction, product design, and establishing production plans and marketing strategies that enable a more efficient decision-making process. Moreover, accurate market forecasting enables governments to efficiently establish a national budget organization. This study aims to generate a market growth curve for ICT (information and communication technology) goods using past time series data; categorize products showing similar growth patterns; understand markets in the industry; and forecast the future outlook of such products. This study suggests the useful and meaningful process (or methodology) to identify the market growth pattern with quantitative growth model and data mining algorithm. The study employs the following methodology. At the first stage, past time series data are collected based on the target products or services of categorized industry. The data, such as the volume of sales and domestic consumption for a specific product or service, are collected from the relevant government ministry, the National Statistical Office, and other relevant government organizations. For collected data that may not be analyzed due to the lack of past data and the alteration of code names, data pre-processing work should be performed. At the second stage of this process, an optimal model for market forecasting should be selected. This model can be varied on the basis of the characteristics of each categorized industry. As this study is focused on the ICT industry, which has more frequent new technology appearances resulting in changes of the market structure, Logistic model, Gompertz model, and Bass model are selected. A hybrid model that combines different models can also be considered. The hybrid model considered for use in this study analyzes the size of the market potential through the Logistic and Gompertz models, and then the figures are used for the Bass model. The third stage of this process is to evaluate which model most accurately explains the data. In order to do this, the parameter should be estimated on the basis of the collected past time series data to generate the models' predictive value and calculate the root-mean squared error (RMSE). The model that shows the lowest average RMSE value for every product type is considered as the best model. At the fourth stage of this process, based on the estimated parameter value generated by the best model, a market growth pattern map is constructed with self-organizing map algorithm. A self-organizing map is learning with market pattern parameters for all products or services as input data, and the products or services are organized into an $N{\times}N$ map. The number of clusters increase from 2 to M, depending on the characteristics of the nodes on the map. The clusters are divided into zones, and the clusters with the ability to provide the most meaningful explanation are selected. Based on the final selection of clusters, the boundaries between the nodes are selected and, ultimately, the market growth pattern map is completed. The last step is to determine the final characteristics of the clusters as well as the market growth curve. The average of the market growth pattern parameters in the clusters is taken to be a representative figure. Using this figure, a growth curve is drawn for each cluster, and their characteristics are analyzed. Also, taking into consideration the product types in each cluster, their characteristics can be qualitatively generated. We expect that the process and system that this paper suggests can be used as a tool for forecasting demand in the ICT and other industries.

An Effect of Compassion, Moral Obligation on Social Entrepreneurial Intention: Examining the Moderating Role of Perceived Social Support (공감, 도덕적 의무감, 사회적 지지에 대한 인식이 사회적 기업가적 의도에 미치는 영향)

  • Lee, Chaewon;Oh, Hyemi
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.12 no.5
    • /
    • pp.127-139
    • /
    • 2017
  • In recent 10 years the attention to social entrepreneurship has raised increasing among scholars, public sector, and community development. However less research has been conducted on how social entrepreneurship intention create a social enterprise and what factors can be affected to the social entrepreneurial intentions. This paper aims at contributing to identify the antecedents of entrepreneurial behavior and intentions. Especially, we have had a strong interests in compassion factors which haven't been used as important variables to encourage for people to do social entrepreneurial activities. Also, we try to find the moral obligation and perceived social support as antecedents of social entrepreneurial intentions. Finding show that compassion and moral obligation affect to the social entrepreneurial intention. Especially this study identify the external factor of society with the variable, perceived social support. Once individuals recognize that the infrastructure and societal positive mood on social entrepreneurship is friendly to social entrepreneurship, people have a tendency to try to do some social entrepreneurial activities. Only few empirical studies exist in this research domain. A study of more than 271 Korean college students has studied which personal traits predict certain characteristics of social entrepreneurs (such as having social vision or looking for social innovational opportunities). In addition to those antecedents, students experience is the critical factor that enabled continued expansion of the social entrepreneurial activities. The results of this research show how we can nurture social entrepreneurs and how we can develop the social environment to promote social entrepreneurship.

  • PDF