• Title/Summary/Keyword: real-time enterprise

Search Result 182, Processing Time 0.028 seconds

A study on the new Business Opportunity of E-Commerce (e-비즈니스의 기회창출 방안에 대한 연구)

  • Cho, Jae-Wan;Ko, Chang-Bae
    • Information Systems Review
    • /
    • v.4 no.2
    • /
    • pp.191-208
    • /
    • 2002
  • In the area of new millennium of twenty first century, one of the urgent and critical research issues in commerce area is the regenerating of new business opportunities from the high value added perspectives. With this motivation, in this paper, we create new on-line e-businesses with the speed of lightning their affiliated supply, finance and business communities - which are involved in more and more tightly connected, open trading - we find that we need to deal with hundreds of business collaborative partners, millions of buyers and sellers while we have to face incompatible IT systems. Challenges of new business opportunities linking multi-enterprise data and processes cost effectively, reliably and securely in real time remains an open area in e-business. This challenge we shall describe as the problem of synchronization of multiple enterprise collaborative e-business opportunities (production related), value (finance related), business (operations related) in new business opportunity and infrastructure integrated all together over the off-line and online basis. It brings a new e-commerce opportunities infrastructure into this profitable challenge: by extracting and tracking new business information, new trends in the events of e-business processes. The transformation of the traditional commerce into this type of electronic based commerce can be interpreted as new Cultural Revolution. The revolution will be a new paradigm crossing over the geographical, and organizational zone, restructuring enterprise business process infrastructure.

Implementation of Security Kernel based on Linux OS (리눅스 운영체제 기반의 보안 커널 구현)

  • Shon, Hyung-Gil;Park, Tae-Kyou;Lee, Kuem-Suk
    • The KIPS Transactions:PartC
    • /
    • v.10C no.2
    • /
    • pp.145-154
    • /
    • 2003
  • Current security efforts provided in such as firewall or IDS (intrusion detection system) of the network level suffer from many vulnerabilities in internal computing servers. Thus the necessity of secure OS is especially crucial in today's computing environment. This paper identifies secure OS requirements, analyzes tile research trends for secure Linux in terms of security kernel, and provides the descriptions of the multi-level security(MLS) Linux kernel which we have implemented. This security kernel-based Linux meets the minimum requirements for TCSEC Bl class as well providing anti-hacking, real-time audit trailing, restricting of root privileges, and enterprise suity management functions.

Applying Text Mining to Identify Factors Which Affect Likes and Dislikes of Online News Comments (텍스트마이닝을 통한 댓글의 공감도 및 비공감도에 영향을 미치는 댓글의 특성 연구)

  • Kim, Jeonghun;Song, Yeongeun;Jin, Yunseon;kwon, Ohbyung
    • Journal of Information Technology Services
    • /
    • v.14 no.2
    • /
    • pp.159-176
    • /
    • 2015
  • As a public medium and one of the big data sources that is accumulated informally and real time, online news comments or replies are considered a significant resource to understand mentalities of article readers. The comments are also being regarded as an important medium of WOM (Word of Mouse) about products, services or the enterprises. If the diffusing effect of the comments is referred to as the degrees of agreement and disagreement from an angle of WOM, figuring out which characteristics of the comments would influence the agreements or the disagreements to the comments in very early stage would be very worthwhile to establish a comment-based eWOM (electronic WOM) strategy. However, investigating the effects of the characteristics of the comments on eWOM effect has been rarely studied. According to this angle, this study aims to conduct an empirical analysis which understands the characteristics of comments that affect the numbers of agreement and disagreement, as eWOM performance, to particular news articles which address a specific product, service or enterprise per se. While extant literature has focused on the quantitative attributes of the comments which are collected by manually, this paper used text mining techniques to acquire the qualitative attributes of the comments in an automatic and cost effective manner.

A Study on the Possibility of Introducing Arbitration Program to Consumer Dispute Resolution System (소비자분쟁해결제도에 중재제도 도입가능성에 관한 연구)

  • Park, Sung -Yang
    • Journal of Arbitration Studies
    • /
    • v.19 no.2
    • /
    • pp.73-94
    • /
    • 2009
  • There are significant differences between disputes among enterprises and disputes between consumers and an enterprise. A majority of consumers may suffer from the same damages at the same time with small amount concerned and sometimes low chances for find the real cause. Among these distinctive features, the most significant characteristic in consumer-business disputes can be found in that consumers are in a disadvantageous position compared to businesses. When it comes to consumer policy, the biggest aim lies with turning back the damage a consumer is suffering into normalcy. In this regard, the Consumer Dispute Resolution System is the most essential among consumer policies. In Korea, the Collective Alternative Dispute Resolution (ADR) System was introduced to the Consumer Dispute Resolution System in 2007 in line with revision on the Consumer Basic Law. However, smooth damage redress for consumers is still not taking place. Against this backdrop, this report suggests that 'consumer arbitration' program should be introduced to the Consumer Dispute Resolution System as part of making good and smooth progress for consumer damage redress.

  • PDF

The Customer Knowledge Structure for Building Perceived Value and Reputation of Location-based App Service (위치기반 앱 서비스를 통한 인지된 가치와 평판 형성을 위한 소비자 지식 구조)

  • Sohn, Bong-Jin;Choi, Jaewon
    • Knowledge Management Research
    • /
    • v.18 no.1
    • /
    • pp.159-176
    • /
    • 2017
  • Recently, the popularity of smartphones has led to a dramatic increase in the frequency of use of App(Application) services. LBS (Location-Based Service) App service adopts various methods such as push marketing and useful information by region through providing location-based service based on the location of the consumer. In particular, an enterprise or an App management company can provide necessary information to the consumer through the necessary information among the customer related knowledge information obtained by utilizing the location information of the consumer in real time. Nevertheless, since LBS is a service that can be performed only when the company obtains consent to provide location information voluntarily by the consumer, there is a case of privacy infringement due to consumers' use of personal information. The purpose of this study is to identify the characteristics of privacy related variables and the knowledge structure for consumer value formation based on the theory of privacy calculation. We also compared the characteristics of Korea with those of China in privacy issue. As a result of the analysis, it was confirmed that factors such as information utilization ability and information control ability were influential as a key factor of privacy calculation. In addition, perceived value influences the reputation of the LBS App service.

Design of Concurrent Engineering Framework for the Quality Management with Real Time Enterprise Portal (실시간 전사적 통합 품질경영 활동을 위한 동시공학적 프레임워크 설계)

  • Lee, Myeong-Ho
    • Proceedings of the KAIS Fall Conference
    • /
    • 2006.05a
    • /
    • pp.457-461
    • /
    • 2006
  • 디지털 융합(Digital Convergence)이 모든 분야에서 급속히 전개됨으로서 기업들은 전략적으로 IT를 전사적으로 활용하면서 글로벌 시대의 경쟁 기업들에 비해 보다 빠른 신기술 습득을 적용함으로써 생존 경쟁의 우위 확보 전략이 점차 강화되고 있는 실정이다. IT 기술의 발전 방향도 전사적 데이터 및 비즈니스 프로세스의 통합을 통하여 전 영역에 걸쳐 신기술을 이용하여 표준화와 통합화로 진보되고 있다. 그러나 글로벌 경쟁체제인 세계화가 가속화 되고 있는 기업들의 품질 경영 활동이 실시간으로 처리되지 못함에 따라 각종 경영혁신 활동에 대한 통제/관리와 비용 절감 노력이 기업 역량 강화에 유기적인 효과를 거두지 못하고 있는 실정이다. 따라서 본 연구에서 일반적으로 제조 부문이나 사무간접(관리)부문에서도 적용 가능한 6시그마 추진 방법론을 기반으로 목표관리 및 방침관리인 Top-Down 프로세스인 순공학 품질경영 활동인 뿐만 아니라, 현장의 창의적인 품질경영 활동을 통한 Bottom-Up 프로세스인 역공학 품질경영 활동에서도 적용 가능한 실시간 동시공학적인 품질경영 활동의 프레임워크를 설계하도록 한다. 또한 가치 흐름 분석을 통해 낭비 요인을 철저하게 제거하고, 프로세스의 흐름을 최적화하여 원하는 품질경영 활동이 프로젝트로 발전하여 기업경영에 실시간으로 반영될 수 있는 전사적 통합 품질경영 활동 시스템을 제안하도록 한다.

  • PDF

Container Flow Management in Port Logistics Based on BPM Framework

  • Nisafani, Amna Shifia;Park, Jaehun;Bae, Hyerim;Yahya, Bernardo Nugroho
    • Journal of Information Technology and Architecture
    • /
    • v.9 no.1
    • /
    • pp.1-10
    • /
    • 2012
  • To promote process effectiveness and efficiency, it is necessary that port logistics employ automated equipments for handling containers. There exists a system for automatically managing the container flow, called Control Module. However, it has limitation to assign the execution order to the machine and monitor the container flow in real time process. Business process management (BPM) provides a suitable and effective framework to address this problem including controlling and monitoring the flow of each container. Since the nature of container handling process is different with the common process in BPM that is conducted by human performer, it is necessary to adjust the BPM framework in the domain of port logistic management. This study presents a BPM framework corresponds with both human-based and machine-based activity to enhance the efficiency of port process flow including container flow. This framework is introduced as an integrated approach and mechanism of BPM application into the container handling system for the purpose of port logistics process automation.

A Study of Internet Address Collision Detection Method (인터넷 주소 충돌 감지에 관한 연구)

  • 위선정;임영희;이태헌;박기홍
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.545-547
    • /
    • 2004
  • Currently possibility of the change of seal computer it increases geometrical progression and the general individuals the knowledge which is special regarding the ip are using the flow child blood which it Provides without from the isp enterprise. But most of the case peon of the school which uses the fixation child blood or the company because is not the knowledge against a TCP/IP address is not oneself at deliberation or real income and it will use the TCP/IP address of the different user and the network whole it will paralyze, the original user will not be able to use the network and it makes. With information where address information where the network administrator present time after data base anger one uses address information of the civil official objective personal computers and network systems of the watch inside in the dictionary is stored will be same from the dissertation which it sees hereupon and the web which it will yell it leads and packet it detects, the use of the TCP/IP address which goes wrong in the user and it notifies the method which is the possibility of closing the paralysis of the network system which it follows in the IP address fringe land due to a deliberation or a real income to sleep it presents it does.

  • PDF

- A Case Study on OOP Component Build-up for Reliability of MRP System - (MRP 시스템의 신뢰성을 위한 객체재향 컴포넌트 개발 사례)

  • Seo Jang Hoon
    • Journal of the Korea Safety Management & Science
    • /
    • v.6 no.3
    • /
    • pp.211-235
    • /
    • 2004
  • Component based design is perceived as a key technology for developing advanced real-time systems in a both cost- and time effective manner. Already today, component based design is seen to increase software productivity, by reducing the amount of effort needed to update and maintain systems, by packaging solutions for re-use, and easing distribution. Nowdays, a thousand and one companies in If(Information Technology) industry such as Sl(System Integration) and software development companies, regardless of scale of their projects, has spent their time and endeavor on developing reusable business logic. The component software is the outcome of software developers effort on overcoming this problem; the component software is the way propositioned for quick and easy implementation of software. In addition, there has been lots of investment on researching and developing the software development methodology and leading If companies has released new standard technologies to help with component development. For instance, COM(Component Object Model) and DCOM(Distribute COM) technology of Microsoft and EJB(Enterprise Java Beans) technology of Sun Microsystems has turned up. Component-Based Development (CBD) has not redeemed its promises of reuse and flexibility. Reuse is inhibited due to problems such as component retrieval, architectural mismatch, and application specificness. Component-based systems are flexible in the sense that components can be replaced and fine-tuned, but only under the assumption that the software architecture remains stable during the system's lifetime. In this paper, It suggest that systems composed of components should be generated from functional and nonfunctional requirements rather than being composed out of existing or newly developed components. about implements and accomplishes the modeling for the Product Control component development by applying CCD(Contract-Collaboration Diagram), one of component development methodology, to MRP(Material Requirement Planning) System

An Empirical Study on the Influencing Factors of Perceived Job Performance in the Context of Enterprise Mobile Applications (업무성과에 영향을 주는 업무용 모바일 어플리케이션의 주요 요인에 관한 연구)

  • Chung, Sunghun;Kim, Kimin
    • Asia pacific journal of information systems
    • /
    • v.24 no.1
    • /
    • pp.31-50
    • /
    • 2014
  • The ubiquitous accessibility of information through mobile devices has led to an increased mobility of workers from their fixed workplaces. Market researchers estimate that by 2016, 350 million workers will be using their smartphones for business purposes, and the use of smartphones will offer new business benefits. Enterprises are now adopting mobile technologies for numerous applications to increase their operational efficiency, improve their responsiveness and competitiveness, and cultivate their innovativeness. For these reasons, various organizational aspects concerning "mobile work" have received a great deal of recent attention. Moreover, many CIOs plan to allocate a considerable amount of their budgets mobile work environments. In particular, with the consumerization of information technology, enterprise mobile applications (EMA) have played a significant role in the explosive growth of mobile computing in the workplace, and even in improving sales for firms in this field. EMA can be defined as mobile technologies and role-based applications, as companies design them for specific roles and functions in organizations. Technically, EMA can be defined as business enterprise systems, including critical business functions that enable users to access enterprise systems via wireless mobile devices, such as smartphones or tablets. Specifically, EMA enables employees to have greater access to real-time information, and provides them with simple features and functionalities that are easy for them to complete specific tasks. While the impact of EMA on organizational workers' productivity has been given considerable attention in various literatures, relatively little research effort has been made to examine how EMA actually lead to users' job performance. In particular, we have a limited understanding of what the key antecedents are of such an EMA usage outcome. In this paper, we focus on employees' perceived job performance as the outcome of EMA use, which indicates the successful role of EMA with regard to employees' tasks. Thus, to develop a deeper understanding of the relationship among EMA, its environment, and employees' perceived job performance, we develop a comprehensive model that considers the perceived-fit between EMA and employees' tasks, satisfaction on EMA, and the organizational environment. With this model, we try to examine EMA to explain how job performance through EMA is revealed from both the task-technology fit for EMA and satisfaction on EMA, while also considering the antecedent factors for these constructs. The objectives of this study are to address the following research questions: (1) How can employees successfully manage EMA in order to enhance their perceived job performance? (2) What internal and/or external factors are important antecedents in increasing EMA users' satisfaction on MES and task-technology fit for EMA? (3) What are the impacts of organizational (e.g. organizational agility), and task-related antecedents (e.g., task mobility) on task-technology fit for EMA? (4) What are the impacts of internal (e.g., self-efficacy) and external antecedents (e.g., system reputation) for the habitual use of EMA? Based on a survey from 254 actual employees who use EMA in their workplace across industries, our results indicate that task-technology fit for EMA and satisfaction on EMA are positively associated with job performance. We also identify task mobility, organizational agility, and system accessibility that are found to be positively associated with task-technology fit for EMA. Further, we find that external factor, such as the reputation of EMA, and internal factor, such as self-efficacy for EMA that are found to be positively associated with the satisfaction of EMA. The present findings enable researchers and practitioners to understand the role of EMA, which facilitates organizational workers' efficient work processes, as well as the importance of task-technology fit for EMA. Our model provides a new set of antecedents and consequence variables for a TAM involving mobile applications. The research model also provides empirical evidence that EMA are important mobile services that positively influence individuals' performance. Our findings suggest that perceived organizational agility and task mobility do have a significant influence on task-technology fit for EMA usage through positive beliefs about EMA, that self-efficacy and system reputation can also influence individuals' satisfaction on EMA, and that these factors are important contingent factors for the impact of system satisfaction and perceived job performance. Our findings can help managers gauge the impact of EMA in terms of its contribution to job performance. Our results provide an explanation as to why many firms have recently adopted EMA for efficient business processes and productivity support. Our findings additionally suggest that the cognitive fit between task and technology can be an important requirement for the productivity support of EMA. Further, our study findings can help managers in formulating their strategies and building organizational culture that can affect employees perceived job performance. Managers, thus, can tailor their dependence on EMA as high or low, depending on their task's characteristics, to maximize the job performance in the workplace. Overall, this study strengthens our knowledge regarding the impact of mobile applications in organizational contexts, technology acceptance and the role of task characteristics. To conclude, we hope that our research inspires future studies exploring digital productivity in the workplace and/or taking the role of EMA into account for employee job performance.