• Title/Summary/Keyword: knowledge-based services

Search Result 905, Processing Time 0.026 seconds

Business Strategies for Korean Private Security-Guard Companies Utilizing Resource-based Theory and AHP Method (자원기반 이론과 AHP 방법을 활용한 민간 경호경비 기업의 전략 연구)

  • Kim, Heung-Ki;Lee, Jong-Won
    • Korean Security Journal
    • /
    • no.36
    • /
    • pp.177-200
    • /
    • 2013
  • As we enter a high industrial society that widens the gap between the rich and poor, demand for the security services has grown explosively. With the growth in quantitative expansion of security services, people have also placed increased requirements on more sophisticated and diversified security services. Consequently, market outlook for private security services industry is positive. However, Korea's private security services companies are experiencing difficulties in finding a direction to capture this new market opportunity due to their small sizes and lack of management-strategic thinking skills. Therefore, we intend to offer a direction of development for our private security services industry using a management-strategy theory and the Analytic Hierarchy Process(AHP), a structured decision-making method. A resource-based theory is one of the important management strategy theories. It explains that a company's overall performance is primarily determined by its competitive resources. Using this theory, we could analyze a company's unique resources and core competencies and set a strategic direction for the company accordingly. The usefulness and validity of this theory has been demonstrated as it has often been subject to empirical verification since 1990s. Based on this theory, we outlined a set of basic procedures to establish a management strategy for the private security services companies. We also used the AHP method to identify competitive resources, core competencies, and strategies from private security services companies in contrast with public companies. The AHP method is a technique that can be used in the decision making process by quantifying experts' knowledge and unstructured problems. This is a verified method that has been used in the management decision making in the corporate environment as well as for the various academic studies. In order to perform this method, we gathered data from 11 experts from academic, industrial, and research sectors and drew distinctive resources, competencies, and strategic direction for private security services companies vis-a-vis public organizations. Through this process, we came to the conclusion that private security services companies generally have intangible resources as their distinctive resources compared with public organization. Among those intangible resources, relational resources, customer information, and technologies were analyzed as important. In contrast, tangible resources such as equipment, funds, distribution channels are found to be relatively scarce. We also found the competencies in sales and marketing and new product development as core competencies. We chose a concentration strategy focusing on a particular market segment as a strategic direction considering these resources and competencies of private security services companies. A concentration strategy is the right fit for smaller companies as a strategy to allow them to focus all of their efforts on target customers in a single segment. Thus, private security services companies would face the important tasks such as developing a new market and appropriate products for such market segment and continuing marketing activities to manage their customers. Additionally, continuous recruitment is required to facilitate the effective use of human resources in order to strengthen their marketing competency in a long term.

  • PDF

A Study on the Concept of Literacy in Library and Information Science and in Public Library Services (문헌정보학과 공공도서관 서비스에 있어서 리터러시 개념에 대한 연구)

  • Song, Kyeong-Jin;Cha, Mikyeong
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.48 no.4
    • /
    • pp.215-240
    • /
    • 2014
  • The purpose of this study is to examine for redefining the concept of literacy in Library and Information Science research field and in public library services. For the purpose, literature review, bibliometric analysis and case study were conducted. Based on the results, this study proposed the concept of literacy as "a comprehensive ability to use a medium, information and knowledge for solving the problems people faces in order to understand particular subjects or situations they are in" and the concept of literacy service as "the services or programs offered by public libraries in order to develop their patrons' literacies." This research also suggests four new literacy service concepts for public library services: early literacy service, adult literacy service, digital literacy service, information literacy service.

A Survey on Service Demand and Industrial Classification of Smart Work (스마트워크 산업의 분류 체계 및 서비스별 수요 조사 분석)

  • Kim, Hoontae;Ji, Yong Gu;Oh, Seongtak;Han, Hyeongjin
    • The Journal of Society for e-Business Studies
    • /
    • v.19 no.1
    • /
    • pp.145-157
    • /
    • 2014
  • The advent of ubiquitous connectivity from smart devices and network is changing the lifestyles of workers and work patterns. However, the smart work for the knowledge workers and mobile workers is not yet popular due to not enough services in supporting smart work and difficulties in employing smart work. For these reasons, it is necessary to study the current smart work industry to provide the bases for incubating smart work industry and increasing the smart work adoption. In this study, first, we reviewed and analyzed the smart work services. And then, we classified the smart work industry based on their services. Second, we conducted a survey study to identify the factors that affect on the adoption of smart work. Finally, we provided the current adoption rate of smart work services and discussed the Willing-To-Use, cost, and barriers from the smart work adoption.

Proposal for User-Product Attributes to Enhance Chatbot-Based Personalized Fashion Recommendation Service (챗봇 기반의 개인화 패션 추천 서비스 향상을 위한 사용자-제품 속성 제안)

  • Hyosun An;Sunghoon Kim;Yerim Choi
    • Journal of Fashion Business
    • /
    • v.27 no.3
    • /
    • pp.50-62
    • /
    • 2023
  • The e-commerce fashion market has experienced a remarkable growth, leading to an overwhelming availability of shared information and numerous choices for users. In light of this, chatbots have emerged as a promising technological solution to enhance personalized services in this context. This study aimed to develop user-product attributes for a chatbot-based personalized fashion recommendation service using big data text mining techniques. To accomplish this, over one million consumer reviews from Coupang, an e-commerce platform, were collected and analyzed using frequency analyses to identify the upper-level attributes of users and products. Attribute terms were then assigned to each user-product attribute, including user body shape (body proportion, BMI), user needs (functional, expressive, aesthetic), user TPO (time, place, occasion), product design elements (fit, color, material, detail), product size (label, measurement), and product care (laundry, maintenance). The classification of user-product attributes was found to be applicable to the knowledge graph of the Conversational Path Reasoning model. A testing environment was established to evaluate the usefulness of attributes based on real e-commerce users and purchased product information. This study is significant in proposing a new research methodology in the field of Fashion Informatics for constructing the knowledge base of a chatbot based on text mining analysis. The proposed research methodology is expected to enhance fashion technology and improve personalized fashion recommendation service and user experience with a chatbot in the e-commerce market.

University/Hospital Collaborations to Promote Research and Evidence Based Practice in Clinical Environments

  • Griffiths, Rhonda
    • Perspectives in Nursing Science
    • /
    • v.4 no.1
    • /
    • pp.19-25
    • /
    • 2007
  • Systems and processes to provide clinical education to students of nursing have been established between universities and health facilities in all countries where nurse education is tertiary based. However, systems and processes to link nurse researchers based in universities to their clinical colleagues are less well developed. When collaborations are established they are frequently based on personal networks, and while the rhetoric of the organizations encourages these collaborations, they are largely unrecognised by senior administrators in health facilities. The research is frequently "invisible" and the clinician researchers usually do not have access to appropriate infrastructure and other resources that are required to support large projects that have the potential to change practice across organisations. This situation influences the focus and scope of nursing research and limits opportunities for clinicians to be engaged in the generation of professional knowledge. The University of Western Sydney (UWS) has taken a strategic approach to the development of collaborations for research and has linked with health services in Western Sydney to establish and maintain research centres and adjunct appointments. The partner organisations jointly fund the infrastructure of the centres which include a Professor, research assistant position(s) and administrative staff. Five Professors of Nursing have been appointed to positions in one of three nursing research centres. This paper describes the approach established by the School of Nursing at UWS to build collaborations with clinical areas to promote research. This approach could be adopted or adapted by other facilities.

  • PDF

Pradigm Shift in Policy and Policy Direction for the Future e-Government (정책패러다임변화와 미래 전자정부 정책방향)

  • Kim, Young-Mi
    • Journal of Digital Convergence
    • /
    • v.10 no.2
    • /
    • pp.37-45
    • /
    • 2012
  • In the 21st century, administration is changing rapidly. The process of reconstruction based on ubiquitous environment in the enhanced information society reflects the paradigm shift to the information and knowledge society. Attempts to improve administrative services are also continuing through restructuring of administrative organization and organization reengineering in public sector. Thus, this study reviews the process of development in the e-government and tries a preliminary approach for diagnosis and performance measurement. It is needed to examine in order to maintain continuity of the future e-government. Henceforth, clear and diverse performance management and evaluation on the e-government should be made.

Networked Creativity on the Censored Web 2.0: Chinese Users' Twitter-based Activities on the Issue of Internet Censorship

  • Xu, Weiai Wayne;Feng, Miao
    • Journal of Contemporary Eastern Asia
    • /
    • v.14 no.1
    • /
    • pp.23-43
    • /
    • 2015
  • In most of the world, the current trend in information technology is for open data movement that promotes transparency and equal access. An opposite trend is observed in China, which has the world's largest Internet population. The country has implemented sophisticated cyber-infrastructure and practices under the name of The Golden Shield Project (commonly referred to as the Great Firewall) to limit access to popular international web services and to filter traffic containing 'undesirable' political content. Increasingly, tech-savvy Chinese bypass this firewall and use Twitter to share knowledge on censorship circumvention and encryption to collectively troubleshoot firewall evasion methods, and even mobilize actions that border on activism. Using a mixed mythological approach, the current study addresses such networked knowledge sharing among citizens in a restricted web ecosystem. On the theoretical front, this study uses webometric approaches to understand change agents and positive deviant in the diffusion of censorship circumvention technology. On policy-level, the study provides insights for Internet regulators and digital rights groups to help best utilize communication networks of positive deviants to counter Internet control.

Global Data Repository Status and Analysis: Based on Korea, China and Japan Data in re3data.org

  • Kim, Suntae
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.8 no.1
    • /
    • pp.79-89
    • /
    • 2018
  • We collected and analyzed data from e3data.org, which is a global registry of data repository services. We analyzed data profile for three leading Asian economies-Korea, China, and Japan-against the reference data for other participating countries. In particular, we examined how individual countries contribute to the repository, organizational type, versioning and product quality management, and subject tagging. We come to the conclusion that all three Asian countries still fall short in terms of involvement. As for participating institutions, there are 7 from Korea, 64 from China, and 120 from Japan. Among Chinese organizations, 3 are profit, 61 non-profit, and 37 organizations (which yields 1.8%) are involved in repository building. In Japan, there is 1 is commercial and 119 non-profit organizations, of which 57 (3.0%) are involved in repository building. All 7 organizations from Korea are non-profit, and 6 of them (0.3%) are involved in repository building. As regards versioning and product quality management, Korea, China, and Japan are up to par with other countries. Subject analysis reveals that Korea contributes more to geosciences, Japan to physics and geosciences, while China, unlike Korea and Japan, is more active in life sciences. It is hoped that this study will help planning domestic infrastructure for research data repositories with proper consideration for specific research domains and national characteristics.

Perception on the Use of Mobile Phones in Retrieving Information from Academic Libraries: A developing country perspective

  • Elahi, Hasinul;Islam, Shiful;Begum, Dilara
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.8 no.1
    • /
    • pp.37-50
    • /
    • 2018
  • The purpose of the study is to identify the perception of the Library and Information Science (LIS) specialists about the use of mobile phones in retrieving information. It investigates the present status of the LIS specialists regarding mobile phone usage, perceptions regarding the use of mobile phones in retrieving information from libraries and points out the possible drawbacks and their solutions for embracing mobile phones in retrieving information from libraries and providing some suggestions. The methodology includes a quantitative approach. The authors used a survey method using a structured questionnaire to measure the perception of LIS specialists regarding the use of mobile phones in retrieving information from libraries. The findings confirmed that the majority (72%) of LIS specialists have the experience of using mobile phones for more than 10 years. Findings also indicate that the LIS specialists have agreed with the statements of advantages of using mobile phones. This paper concludes that the respondents also agreed regarding the possible advantages of introducing mobile phones in retrieving information from libraries. The paper explores the original perceptions of LIS specialists regarding the use of mobile phones in retrieving information from libraries.

Predicting the Lifespan and Retweet Times of Tweets Based on Multiple Feature Analysis

  • Bae, Yongjin;Ryu, Pum-Mo;Kim, Hyunki
    • ETRI Journal
    • /
    • v.36 no.3
    • /
    • pp.418-428
    • /
    • 2014
  • In social network services, such as Facebook, Google+, Twitter, and certain postings attract more people than others. In this paper, we propose a novel method for predicting the lifespan and retweet times of tweets, the latter being a proxy for measuring the popularity of a tweet. We extract information from retweet graphs, such as posting times; and social, local, and content features, so as to construct prediction knowledge bases. Tweets with a similar topic, retweet pattern, and properties are sequentially extracted from the knowledge base and then used to make a prediction. To evaluate the performance of our model, we collected tweets on Twitter from June 2012 to October 2012. We compared our model with conventional models according to the prediction goal. For the lifespan prediction of a tweet, our model can reduce the time tolerance of a tweet lifespan by about four hours, compared with conventional models. In terms of prediction of the retweet times, our model achieved a significantly outstanding precision of about 50%, which is much higher than two of the conventional models showing a precision of around 30% and 20%, respectively.