• Title/Summary/Keyword: internet management

Search Result 5,984, Processing Time 0.036 seconds

A Study on Home Visiting Hospice Care of the Terminally Ill Patients (가정 호스피스케어환자 방문간호 조사분석)

  • Lee, So-Woo;Lee, Eun-Ok;Park, Hyun-Ae;Oh, Hyo-Sook;Ahn, Hyo-Seop;Huh, Dae-Suk;Yun, Young-Ho;Kim, Dal-Sook;Rho, Yoo-Ja
    • Journal of Hospice and Palliative Care
    • /
    • v.1 no.1
    • /
    • pp.39-46
    • /
    • 1998
  • Purpose : Hospice Care is considered as one of the most perfect solutions for the problems brought up as the number of chronically ill patients are increasing rapidly and most of social welfare oriented countries are seeking the quality of life. Our former studies(1996, 1997) were to find out the current status of the hospice care in Korea by surveying terminally ill patients and their family members as well as medical professionals. The former study was also to conduct the operation research by developing an information service system for training of hospice care teams and volunteers, and hospice patients management. The purpose of this study was that hospice information service system was tested by home visiting hospice care through visiting nurses. Methods : From October 1, 1997 to March 31, 1998, Twenty six terminal cancer patients were included in this study from Seoul National University Hospital and other hospital. Databases and homepage, hospice information service system were designed and developed for the information needed for the hospice care before this study by our research team and this services were available through the internet. Visiting nurses were trained about this system and they visited the patients with PC notebook and provided them hospice care with hospice information system. They collected physical, psychiatric, social data of the subjects at the first visit and during hospice care at home. Results : Sixteen subjects(61.5%) died during the study and the mean survival was 20.7 days. Anorexia(96.2%), immobility(88.5%) and pain(84.6%) were the major symptom in the 26 subjects, Altered nutrition(26.1%) and pain(12.4%) were the most frequent diagnoses in 226 nursing diagnoses of the subjects. Families understood and demanded the hospice care more than patients. And most patients and families didn't demand spiritual or social care. Conclusion : Through this demonstration study, it was found that we have to provide the information of pain management and nutritional support for patients by the nurses and visiting hospice nurse. The information service system needs to be upgraded with information and manpower of spiritual and social care according to the findings.

  • PDF

The Efficiency Analysis of CRM System in the Hotel Industry Using DEA (DEA를 이용한 호텔 관광 서비스 업계의 CRM 도입 효율성 분석)

  • Kim, Tai-Young;Seol, Kyung-Jin;Kwak, Young-Dai
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.1
    • /
    • pp.91-110
    • /
    • 2011
  • This paper analyzes the cases where the hotels have increased their services and enhanced their work process through IT solutions to cope with computerization globalization. Also the cases have been studies where national hotels use the CRM solution internally to respond effectively to customers requests, increase customer analysis, and build marketing strategies. In particular, this study discusses the introduction of the CRM solutions and CRM sales business and marketing services using a process for utilizing the presumed, CRM by introducing effective DEA(Data Envelopment Analysis). First, the comparison has done regarding the relative efficiency of L Company with the CCR model, then compared L Company's restaurants and facilities' effectiveness through BCC model. L Company reached a conclusion that it is important to precisely create and manage sales data which are the preliminary data for CRM, and for that reason it made it possible to save sales data generated by POS system on each sales performance database. In order to do that, it newly established Oracle POS system and LORIS POS system concerned with restaurants for food and beverage as well as rooms, and made it possible to stably generate and manage sales data and manage. Moreover, it set up a composite database to control comprehensively the results of work processes during a specific period by collecting customer registration information and made it possible to systematically control the information on sales performances. By establishing a system which unifies database and managing it comprehensively, impeccability of data has been greatly enhanced and a problem which generated asymmetric data could be thoroughly solved. Using data accumulated on the comprehensive database, sales data can be analyzed, categorized, classified through data mining engine imbedded in Polaris CRM and the results can be organized on data mart to provide them in the form of CRM application data. By transforming original sales data into forms which are easy to handle and saving them on data mart separately, it enabled acquiring well-organized data with ease when engaging in various marketing operations, holding a morning meeting and working on decision-making. By using summarized data at data mart, it was possible to process marketing operations such as telemarketing, direct mailing, internet marketing service and service product developments for perceived customers; moreover, information on customer perceptions which is one of CRM's end-products could feed back into the comprehensive database. This research was undertaken to find out how effectively CRM has been employed by comparing and analyzing the management performance of each enterprise site and store after introducing CRM to Hotel enterprises using DEA technique. According to the research results, efficiency evaluation for each site was calculated through input and output factors to find out comparative CRM system usage efficiency of L's Company four sites; moreover, with regard to stores, the sizes of workforce and budget application show a huge difference and so does the each store efficiency. Furthermore, by using the DEA technique, it could assess which sites have comparatively high efficiency and which don't by comparing and evaluating hotel enterprises IT project outcomes such as CRM introduction using the CCR model for each site of the related enterprises. By using the BCC model, it could comparatively evaluate the outcome of CRM usage at each store of A site, which is representative of L Company, and as a result, it could figure out which stores maintain high efficiency in using CRM and which don't. It analyzed the cases of CRM introduction at L Company, which is a hotel enterprise, and precisely evaluated them through DEA. L Company analyzed the customer analysis system by introducing CRM and achieved to provide customers identified through client analysis data with one to one tailored services. Moreover, it could come up with a plan to differentiate the service for customers who revisit by assessing customer discernment rate. As tasks to be solved in the future, it is required to do research on the process analysis which can lead to a specific outcome such as increased sales volumes by carrying on test marketing, target marketing using CRM. Furthermore, it is also necessary to do research on efficiency evaluation in accordance with linkages between other IT solutions such as ERP and CRM system.

The Influence of Online Social Networking on Individual Virtual Competence and Task Performance in Organizations (온라인 네트워킹 활동이 가상협업 역량 및 업무성과에 미치는 영향)

  • Suh, A-Young;Shin, Kyung-Shik
    • Asia pacific journal of information systems
    • /
    • v.22 no.2
    • /
    • pp.39-69
    • /
    • 2012
  • With the advent of communication technologies including electronic collaborative tools and conferencing systems provided over the Internet, virtual collaboration is becoming increasingly common in organizations. Virtual collaboration refers to an environment in which the people working together are interdependent in their tasks, share responsibility for outcomes, are geographically dispersed, and rely on mediated rather than face-to face, communication to produce an outcome. Research suggests that new sets of individual skill, knowledge, and ability (SKAs) are required to perform effectively in today's virtualized workplace, which is labeled as individual virtual competence. It is also argued that use of online social networking sites may influence not only individuals' daily lives but also their capability to manage their work-related relationships in organizations, which in turn leads to better performance. The existing research regarding (1) the relationship between virtual competence and task performance and (2) the relationship between online networking and task performance has been conducted based on different theoretical perspectives so that little is known about how online social networking and virtual competence interplay to predict individuals' task performance. To fill this gap, this study raises the following research questions: (1) What is the individual virtual competence required for better adjustment to the virtual collaboration environment? (2) How does online networking via diverse social network service sites influence individuals' task performance in organizations? (3) How do the joint effects of individual virtual competence and online networking influence task performance? To address these research questions, we first draw on the prior literature and derive four dimensions of individual virtual competence that are related with an individual's self-concept, knowledge and ability. Computer self-efficacy is defined as the extent to which an individual beliefs in his or her ability to use computer technology broadly. Remotework self-efficacy is defined as the extent to which an individual beliefs in his or her ability to work and perform joint tasks with others in virtual settings. Virtual media skill is defined as the degree of confidence of individuals to function in their work role without face-to-face interactions. Virtual social skill is an individual's skill level in using technologies to communicate in virtual settings to their full potential. It should be noted that the concept of virtual social skill is different from the self-efficacy and captures an individual's cognition-based ability to build social relationships with others in virtual settings. Next, we discuss how online networking influences both individual virtual competence and task performance based on the social network theory and the social learning theory. We argue that online networking may enhance individuals' capability in expanding their social networks with low costs. We also argue that online networking may enable individuals to learn the necessary skills regarding how they use technological functions, communicate with others, and share information and make social relations using the technical functions provided by electronic media, consequently increasing individual virtual competence. To examine the relationships among online networking, virtual competence, and task performance, we developed research models (the mediation, interaction, and additive models, respectively) by integrating the social network theory and the social learning theory. Using data from 112 employees of a virtualized company, we tested the proposed research models. The results of analysis partly support the mediation model in that online social networking positively influences individuals' computer self-efficacy, virtual social skill, and virtual media skill, which are key predictors of individuals' task performance. Furthermore, the results of the analysis partly support the interaction model in that the level of remotework self-efficacy moderates the relationship between online social networking and task performance. The results paint a picture of people adjusting to virtual collaboration that constrains and enables their task performance. This study contributes to research and practice. First, we suggest a shift of research focus to the individual level when examining virtual phenomena and theorize that online social networking can enhance individual virtual competence in some aspects. Second, we replicate and advance the prior competence literature by linking each component of virtual competence and objective task performance. The results of this study provide useful insights into how human resource responsibilities assess employees' weakness and strength when they organize virtualized groups or projects. Furthermore, it provides managers with insights into the kinds of development or training programs that they can engage in with their employees to advance their ability to undertake virtual work.

  • PDF

A study on transferring the effects of brand reputation and level of service satisfaction of an offline channel company when it is expanding to an online distribution channel (온라인 유통채널 확장시 오프라인 채널의 브랜드 명성, 서비스 만족도의 이전 효과에 관한 연구)

  • Hwang, Hee-Joong;Lee, Sun-Mi
    • Journal of Distribution Science
    • /
    • v.9 no.2
    • /
    • pp.31-36
    • /
    • 2011
  • I conducted empirical analyses of what happens when an offline channel expands to an online channel and whether the pre-existing offline channel's competitive assets (e.g. brand reputation and level of service satisfaction) can be linked to online channel preference. I found that an offline channel's brand reputation and level of service satisfaction can have a direct influence on offline channel preference and a second-hand influence on online channel preference. Thus, if the competitiveness of the online channel is strong enough and its customers have a higher preference for the offline channel, they will be committed and loyal to the company. The resultant enhanced competitiveness of the offline channel will present opportunities for both present and future success. The main results are the following. First, the management of the distribution channel service quality is more important than that of the brand reputation. Customers' experiences of service and subjective evaluations are not important only as the leading factors in the long-term brand reputation management but also as influential factors in channel preference. SoThus, given that the service quality of the pre-existing channel is not the customers' main concern, a strategy of improving the level of service satisfaction aimed at present customers is more valuable than a wide brand positioning strategy aimed at general and new customers. Second, when an offline channel company establishes an internet shopping mall on an online channel, it is highly likely that the preference and subjective evaluation of the present customers will influence the online channel. This applies not only to the special case of an expansion from an offline intermediary channel to an online one, but also to an online channel acting as an expansion of the business model of a conventional manufacturing or service company: both cases are vertical integrations of marketing channels in an expansion of the distribution channel. My theory applies to a wide range of contexts. Third and finally, any business strategy can grasp the meaning of 'channel expansion. Fundamentally, it is an expansion of the sales activity channel and marketing activity. However, it is also a way of enhancing marketing and sales competitiveness through an expansion to an online or offline channel. The expansion of an offline company to an online channel could be seen not as improvement but as an innovation of the business process by which two goals are achieved with one technique. The former is expected to increase the sales of the offline company, and the latter is also expected to increase sales while also contributing to cost reduction.

  • PDF

An Intelligent Intrusion Detection Model Based on Support Vector Machines and the Classification Threshold Optimization for Considering the Asymmetric Error Cost (비대칭 오류비용을 고려한 분류기준값 최적화와 SVM에 기반한 지능형 침입탐지모형)

  • Lee, Hyeon-Uk;Ahn, Hyun-Chul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.157-173
    • /
    • 2011
  • As the Internet use explodes recently, the malicious attacks and hacking for a system connected to network occur frequently. This means the fatal damage can be caused by these intrusions in the government agency, public office, and company operating various systems. For such reasons, there are growing interests and demand about the intrusion detection systems (IDS)-the security systems for detecting, identifying and responding to unauthorized or abnormal activities appropriately. The intrusion detection models that have been applied in conventional IDS are generally designed by modeling the experts' implicit knowledge on the network intrusions or the hackers' abnormal behaviors. These kinds of intrusion detection models perform well under the normal situations. However, they show poor performance when they meet a new or unknown pattern of the network attacks. For this reason, several recent studies try to adopt various artificial intelligence techniques, which can proactively respond to the unknown threats. Especially, artificial neural networks (ANNs) have popularly been applied in the prior studies because of its superior prediction accuracy. However, ANNs have some intrinsic limitations such as the risk of overfitting, the requirement of the large sample size, and the lack of understanding the prediction process (i.e. black box theory). As a result, the most recent studies on IDS have started to adopt support vector machine (SVM), the classification technique that is more stable and powerful compared to ANNs. SVM is known as a relatively high predictive power and generalization capability. Under this background, this study proposes a novel intelligent intrusion detection model that uses SVM as the classification model in order to improve the predictive ability of IDS. Also, our model is designed to consider the asymmetric error cost by optimizing the classification threshold. Generally, there are two common forms of errors in intrusion detection. The first error type is the False-Positive Error (FPE). In the case of FPE, the wrong judgment on it may result in the unnecessary fixation. The second error type is the False-Negative Error (FNE) that mainly misjudges the malware of the program as normal. Compared to FPE, FNE is more fatal. Thus, when considering total cost of misclassification in IDS, it is more reasonable to assign heavier weights on FNE rather than FPE. Therefore, we designed our proposed intrusion detection model to optimize the classification threshold in order to minimize the total misclassification cost. In this case, conventional SVM cannot be applied because it is designed to generate discrete output (i.e. a class). To resolve this problem, we used the revised SVM technique proposed by Platt(2000), which is able to generate the probability estimate. To validate the practical applicability of our model, we applied it to the real-world dataset for network intrusion detection. The experimental dataset was collected from the IDS sensor of an official institution in Korea from January to June 2010. We collected 15,000 log data in total, and selected 1,000 samples from them by using random sampling method. In addition, the SVM model was compared with the logistic regression (LOGIT), decision trees (DT), and ANN to confirm the superiority of the proposed model. LOGIT and DT was experimented using PASW Statistics v18.0, and ANN was experimented using Neuroshell 4.0. For SVM, LIBSVM v2.90-a freeware for training SVM classifier-was used. Empirical results showed that our proposed model based on SVM outperformed all the other comparative models in detecting network intrusions from the accuracy perspective. They also showed that our model reduced the total misclassification cost compared to the ANN-based intrusion detection model. As a result, it is expected that the intrusion detection model proposed in this paper would not only enhance the performance of IDS, but also lead to better management of FNE.

The Family History of Chronic Diseases, Food Group Intakes, and Physical Activity Practices among School Children in Seoul, Korea (서울지역 일부 초등학생의 생활 습관병 가족력, 식품군 섭취 형태 및 활동량 평가)

  • Lee, Young-Nam;Ha, Ae-Wha
    • Journal of the East Asian Society of Dietary Life
    • /
    • v.17 no.5
    • /
    • pp.644-652
    • /
    • 2007
  • In this study, we examined family history of chronic diseases, food group intake and physical activity in $5^{th}\;and\; 6^{th}$ grade elementary school children. Food group intake was compared with the KDRI food guides for children. The measurements of daily physical activity, television viewing, computer use, and daily servings of five food groups, including grains, meats, dairy products, fruits, and vegetables, were based on child and parent self-reports. As indices of obesity, the obesity index(%) and BMI(Body Mass Index) were used. The results were as follows. In boys, 83.2% were normal weight with 7.4% slightly obese, 7.4% moderately obese, and 2.0 were highly obese while the percentages of normal and slightly obese in girls were 89.9% and 6.2% respectively (p<0.05). The boys had more hours of daily physical activity(p<0.05) and more hours of computer usage(Internet searching or games)(p<0.05) than the girls. Slightly over 50% of the subjects met the daily recommended servings of grains, dairy products, fruits, and vegetables according to the KDRI food guides. However, only 26% of boys and 27% of girls met the recommended daily servings of protein foods such as meats, beans, and eggs. Thirty two percent(32%) of girls consumed high fat snacks everyday while 32% consumed high sugar snacks every day. The girls consumed more vegetables(p<0.05) and more high sugar snacks(p<0.05) than the boys. The children with family histories of obesity showed greater obesity rates(p<0.05) and sedentary lifestyles(p< 0.05) than those children without a family history of obesity. Children with family histories of high blood pressure consumed more sewings of vegetables and high fat snacks than the controls(p<0.05). The children with family histories of obesity consumed more high sugar or high fat snacks than the controls(p<0.05).

  • PDF

Trend and future prospect on the development of technology for electronic security system (기계경비시스템의 기술 변화추세와 개발전망)

  • Chung, Tae-Hwang;So, Sung-Young
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.225-244
    • /
    • 2009
  • Electronic security system is composed mainly of electronic-information-communication device, so system technology, configuration and management of the electronic security system could be affected by the change of information-communication environment. This study is to propose the future prospect on the development of technique for electronic security system through the analysis of the trend and the actual condition on the development of technique. This study is based on literature study and interview with user and provider of electronic security system, also survey was carried out by system provider and members of security integration company to come up with more practical result. Hybrid DVR technology that has multi-function such as motion detection, target tracking and image identification is expected to be developed. And 'Embedded IP camera' technology that internet server and image identification software are built in. Those technologies could change the configuration and management of CCTV system. Fingerprint identification technology and face identification technology are continually developed to get more reliability, but continual development of surveillance and three-dimension identification technology for more efficient face identification system is needed. As radio identification and tracking function of RFID is appreciated as very useful for access control system, hardware and software of RFID technology is expected to be developed, but government's support for market revitalization is necessary. Behavior pattern identification sensor technology is expected to be developed and could replace passive infrared sensor that cause system error, giving security guard firm confidence for response. The principle of behavior pattern identification is similar to image identification, so those two technology could be integrated with tracking technology and radio identification technology of RFID for total monitoring system. For more efficient electronic security system, middle-ware's role is very important to integrate the technology of electronic security system, this could make possible of installing the integrated security system.

  • PDF

An Analysis of Efficiency of Security Services : A Comparative Determinants Analysis of Public and Private Security (경호업무 효율성에 관한 연구 : 공공경호와 민간경호의 효율성 영향요인의 비교분석)

  • Park, Moon-Sun
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.67-103
    • /
    • 2009
  • Objectives of this study is develop security services through determinants analysis on the efficiency of security works regarding security and guarding business in Korea because nowadays the modern society like Korea let alone all over the world faces the increase of dangerous factors in every security field of the human societies, and also it is the very present situation that an individual's life even the national security itself can be at the risk without guaranteeing the efficiency of the security services. For this purpose, this study reviewed related documents, surveyed and interviewed security personnels to identify what the potentially influential factors are in both the public and private security organizations regarding the efficiency of present security services and organizations, and what differences are. Also, comparing the public and private security sectors, this study intended to suggest policy agendas how to enhance the efficiency of security services in the future. This study surveyed the 177 agents and former agents of the Presidential Security Service(PSS) for the public security sector, and also surveyed, interviewed, and internet-based polled 821 randomly selected personnels for the private security sector. This research showed that regarding the efficiency of the security services number of independent variables which had positive responses in the public security sector was more than that in the private security sector. Among the 21 questions regarding this issue, there were all of 21 positive responses in the public security sector while there were 18 negative responses in the private security sector. As a result of synthesizing all the answers of the both sides, it is possible to understand that mostly the ratio of the positive response was much higher. In the public security service, statistically significant variables were budget support for events, prior access of information, an integrated teamwork training, organizational atmosphere, morale of organization personnel. However, practical training of the security service and mutual communication showed unexpectedly negative(-) signs. In the private security service, statistically significant variables were budget support for events, integrated teamwork training, socially friendly atmosphere, compensation for the personnels, bullet-proof equipments and vehicles, mood of organization, personnel recruit and disposition, unexpected incidents and basic attitude for security services. In sum, while organizational personnel variables and organizational management variables were significant in the public security service, some organizational management variables and all socio-environment variables were statistically significant at 5% significance level.

  • PDF

Success Factors of the Supdari(A Wooden Bridge) Restoration in Jeonju-River through Citizens' Initiative (적극적 주민참여를 통한 전통문화시설 복원 성공요인 분석 - 전주천 섶다리 놓기 사업을 중심으로 -)

  • Kim, Sang-Wook;Kim, Gil-Joong
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.28 no.1
    • /
    • pp.93-101
    • /
    • 2010
  • This paper aims to analyze success factors for the construction of Supdari(a traditional wooden bridge to connect small streams temporarily), which is a citizens' initiative project to revitalize local community in Jeonju-River, Jeonju City. Recently Supdari has been restored for the use of belongings in local festivals. But Jeonju-River Supdari was designed and built to unite local citizens and connect river-divided villages. This project shows how investing social capital like Supdari makes the community vitalize through citizen's active participation. As a citizen leading project, there were several critical factors for sucess. At first, there were some noticeable ways to encourage local citizen's participation in online and offline. In the online, the Supdari internet cafe introduced what is a Supdari, how to make it and where we build using various media of UCCs and photos. In the offline, the small scaled model of Supdari was made and exhibited in the entrance of the village and related several seminars were hosted to discuss how to construct Supdari with citizens, local assembly men and public officials together. The Second is the movement to restore traditional and cultural resources for the community recovery triggered the supports from local councils and many civic groups. Civic groups supported ecological and structural expertise to guarantee environment friendly and stable construction. And local councils mediated citizen's and administrative office's opinions. The third is flexible administrative management to help citizen's ideas to be realized. Officials extended setting period of Supdari on the condition with the civic-control safety management.

Requirement Analysis for Agricultural Meteorology Information Service Systems based on the Fourth Industrial Revolution Technologies (4차 산업혁명 기술에 기반한 농업 기상 정보 시스템의 요구도 분석)

  • Kim, Kwang Soo;Yoo, Byoung Hyun;Hyun, Shinwoo;Kang, DaeGyoon
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.21 no.3
    • /
    • pp.175-186
    • /
    • 2019
  • Efforts have been made to introduce the climate smart agriculture (CSA) for adaptation to future climate conditions, which would require collection and management of site specific meteorological data. The objectives of this study were to identify requirements for construction of agricultural meteorology information service system (AMISS) using technologies that lead to the fourth industrial revolution, e.g., internet of things (IoT), artificial intelligence, and cloud computing. The IoT sensors that require low cost and low operating current would be useful to organize wireless sensor network (WSN) for collection and analysis of weather measurement data, which would help assessment of productivity for an agricultural ecosystem. It would be recommended to extend the spatial extent of the WSN to a rural community, which would benefit a greater number of farms. It is preferred to create the big data for agricultural meteorology in order to produce and evaluate the site specific data in rural areas. The digital climate map can be improved using artificial intelligence such as deep neural networks. Furthermore, cloud computing and fog computing would help reduce costs and enhance the user experience of the AMISS. In addition, it would be advantageous to combine environmental data and farm management data, e.g., price data for the produce of interest. It would also be needed to develop a mobile application whose user interface could meet the needs of stakeholders. These fourth industrial revolution technologies would facilitate the development of the AMISS and wide application of the CSA.