• Title/Summary/Keyword: service capability

Search Result 810, Processing Time 0.026 seconds

Development of a Web-based User Experience Certification System based on User-centered System Design Approach (사용자 중심의 웹 기반 제품 사용경험 인증·평가 시스템 개발)

  • Na, Ju Yeoun;Kim, Jihee;Jung, Sungwook;Lee, Dong Hyun;Lee, Cheol;Bahn, Sangwoo
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.1
    • /
    • pp.29-48
    • /
    • 2019
  • Recently, product design innovation to improve user experience has been perceived as a core element of enterprise competitiveness due to the fierce market competition and decrease of the technological gap between companies, but there is insufficient services to support the product experience evaluation of small and medium-sized companies (SMCs). The aim of this study is to develop a web-based product user experience evaluation and certification system supporting product design practices for SMCs. For system interface design, we conducted systematic functional requirement elicitation methods such as user survey, workflow analysis, user task definition, and function definition. Then main functions, information structure, navigation method, and detailed graphic user interfaces were developed with consideration of user interactions and requirements. In particular, it provides the databases for evaluation efficiency to support the evaluation process above a certain level of performance and efficiency, and knowledge databases to utilize in the evaluation and product design improvement. With help of the developed service platform, It is expected that the service platform would enhance SMCs' product development capability with regard to the user experience evaluation by connecting the consulting firms with SMCs.

Transmission Performance Evaluation of MPR-based Wireless Communication System Applying for Disaster Investigation (재난조사 활용을 위한 MPR기반 무선통신 전송 성능 평가)

  • Kim, Seong Sam;Shin, Dong Yoon;Noh, Hyun Ju
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.3
    • /
    • pp.754-762
    • /
    • 2021
  • Seamless wireless communication network access technology enables users to guarantee service continuity. Hence, it is necessary for disaster situations in which network service may be interrupted. The Multi-path router is a technology to improve network stability and strengthen field operability, particularly in a disaster environment where network failure can occur by providing high-performance data transmission using multi-communication networks and network security by VPN-based wireless IP. In this paper, a prototype system for an MPR-based wireless communication network was proposed to improve the operation performance for disaster field investigation applications. A comparative experiment was performed on various data transmission performances with the existing single wireless communication network. In addition, another experiment was conducted by measuring the data packet transmission and receiving performance in the existing/new wireless communication system first and then assessing the UDP transmission performance in a single router environment to understand the transmission capability of the new MPR. The experimental results showed that the sending and receiving performance was improved by approximately double that of the existing single wireless communication system. The proposed prototype system is expected to allow users to share and disseminate collected on-site data more quickly and efficiently during a disaster site investigation.

Study of the ENC reduction for mobile platform (모바일 플랫폼을 위한 전자해도 소형화 연구)

  • 심우성;박재민;서상현
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2003.05a
    • /
    • pp.181-186
    • /
    • 2003
  • The satellite navigation system is widely used for identifying a user's position regardless of weather or geographic conditions and also make effect on new technology of marine LBS(Location Based Service), which has the technology of geographic information such as the ENC. Generally, there are conceivable systems of marine LBS such as ECDIS, or ECS that use the ENC itself with powerful processor in installed type on ships bridge. Since the ENC is relatively heavy structure with dummy format for data transfer between different systems, we should reduce the ENC to small and compact size in order to use it in mobile platform. In this paper, we assumed that the mobile system like PDA, or Webpad can be used for small capability of mobile platform. However, the ENC should be updated periodically by update profile data produced by HO. If we would reduce the ENC without a consideration of update, we could not get newly updated data furthermore. As summary, we studied considerations for ENC reduction with update capability. It will make the ENC be useful in many mobile platforms for various applications.

  • PDF

Perception on the Nursing Accident Experience of the Nurses and Its Cause (간호사(看護師)들의 간호사고(看護事故) 경험(經驗)과 사고원인(事故原因)에 관한 지각(知覺))

  • Lee, Soon-Bok;Moon, Heui-Ja
    • Journal of Korean Academy of Nursing Administration
    • /
    • v.1 no.2
    • /
    • pp.246-267
    • /
    • 1995
  • Recently the request of the patients to participate in the medical courses has been expanding due to the elevated sense of right on the people's health, merchandised medical treatment by mass supply, human right declaration of the patients, generalized medical informations by the mass media and the change of human relation between the medical personnels and the patients. Under these phenomena the patients have been in the thought of solving such accidents only by regulation of the laws which they think to be all powerful, Such trends are same in the area of nursing service. Also today the accident by the nurses have been increasing by the area of the nurses having been expanded and their independent roles having been increased. Such nursing accidents are the important subject which the professional occupation of the nurse has been facing but legal protective capability of the nurses has been very weak. Therefore this study has examined the degree of the experience of the nursing accident that happens in the clinical nursing scenes in the general hospital to provide the basic materials for the protection and the counter measures of the nursing accident. The following is the conclusion based by the above examination. 1) The experience degree of the whole nursing accidents has been appeared as 1.90 in average. And the degree according to service area has been 1.77 in the area of supervising management of patients, 1.54 in the area of the same management of patients by head-nurses, 1.84 in the area of doctors' treatment performances, 14 in the enforcement and education areas of the nursing technology, 2.04 in the area of observing patients and judgement and 2.07 in the area of nursing records and maintaining confidentials. Accordingly there has been higher degree of accidental experiences in the independent service areas of the patients than in the dependent ones directed by the doctors. 2) The perception of the nurses showed that the cause of the nursing accident has been due to the heavy work of the nurses with the 60.4% of the response rate, the highest rate. They report the accident to the head nurse first by 2/3 nurses after accident. And the hour of the accident has been frequently happened regardless of service hours with 48.1% in response rate, the highest rate, and the nursing accident happens in the night more than the daytime with the rate of 37.5% at night while 14. 4% daytime. 3) The nurses are in the perception that the patients are responsible for the accident with 48.2% response rate while 43.9% rate in response showed that it has been caused by many people. They are in the perception that 41.7% when the nursing power was lacking, 46.7% lower recognition of actual state about indivitual patient in the section of technical speciality and 35.8% when the patients were not cooperative and 37.8% when the wards were dirty and in disorder. 4) the attitude of the patients after the various nursing accidents has been violent words in 72.7%, violence in 17.4% and 3.9% in attending the court by the sue of the patient's side(18 nurses). 5) The action of the hospital has been : requesting the submission of the story of the accident in 22.8%, the report of the accidents in 14.4%, thus the written statement disposal was most, 4.5% was the transfer to the other departments when the accident was larger or the patients' guardians protested strongly and 0.6% of the dismissals of the nurses. 6) In regard to the responsiblity of the nurse accidents, 78.9% was the highest rate of supplying the nursing manpowers, 48.4% of mutual cooperation of the medical personnels, 37.2% of strengthening the education for the nurses and hospital facilities reformation in 32.7%. 7) The review of relation between the general characters of the object of the study and the degree of experience of nursing accidents showed the significant differences in ages (F=4.04, p=0.000).

  • PDF

Factors Influencing the Adoption of Location-Based Smartphone Applications: An Application of the Privacy Calculus Model (스마트폰 위치기반 어플리케이션의 이용의도에 영향을 미치는 요인: 프라이버시 계산 모형의 적용)

  • Cha, Hoon S.
    • Asia pacific journal of information systems
    • /
    • v.22 no.4
    • /
    • pp.7-29
    • /
    • 2012
  • Smartphone and its applications (i.e. apps) are increasingly penetrating consumer markets. According to a recent report from Korea Communications Commission, nearly 50% of mobile subscribers in South Korea are smartphone users that accounts for over 25 million people. In particular, the importance of smartphone has risen as a geospatially-aware device that provides various location-based services (LBS) equipped with GPS capability. The popular LBS include map and navigation, traffic and transportation updates, shopping and coupon services, and location-sensitive social network services. Overall, the emerging location-based smartphone apps (LBA) offer significant value by providing greater connectivity, personalization, and information and entertainment in a location-specific context. Conversely, the rapid growth of LBA and their benefits have been accompanied by concerns over the collection and dissemination of individual users' personal information through ongoing tracking of their location, identity, preferences, and social behaviors. The majority of LBA users tend to agree and consent to the LBA provider's terms and privacy policy on use of location data to get the immediate services. This tendency further increases the potential risks of unprotected exposure of personal information and serious invasion and breaches of individual privacy. To address the complex issues surrounding LBA particularly from the user's behavioral perspective, this study applied the privacy calculus model (PCM) to explore the factors that influence the adoption of LBA. According to PCM, consumers are engaged in a dynamic adjustment process in which privacy risks are weighted against benefits of information disclosure. Consistent with the principal notion of PCM, we investigated how individual users make a risk-benefit assessment under which personalized service and locatability act as benefit-side factors and information privacy risks act as a risk-side factor accompanying LBA adoption. In addition, we consider the moderating role of trust on the service providers in the prohibiting effects of privacy risks on user intention to adopt LBA. Further we include perceived ease of use and usefulness as additional constructs to examine whether the technology acceptance model (TAM) can be applied in the context of LBA adoption. The research model with ten (10) hypotheses was tested using data gathered from 98 respondents through a quasi-experimental survey method. During the survey, each participant was asked to navigate the website where the experimental simulation of a LBA allows the participant to purchase time-and-location sensitive discounted tickets for nearby stores. Structural equations modeling using partial least square validated the instrument and the proposed model. The results showed that six (6) out of ten (10) hypotheses were supported. On the subject of the core PCM, H2 (locatability ${\rightarrow}$ intention to use LBA) and H3 (privacy risks ${\rightarrow}$ intention to use LBA) were supported, while H1 (personalization ${\rightarrow}$ intention to use LBA) was not supported. Further, we could not any interaction effects (personalization X privacy risks, H4 & locatability X privacy risks, H5) on the intention to use LBA. In terms of privacy risks and trust, as mentioned above we found the significant negative influence from privacy risks on intention to use (H3), but positive influence from trust, which supported H6 (trust ${\rightarrow}$ intention to use LBA). The moderating effect of trust on the negative relationship between privacy risks and intention to use LBA was tested and confirmed by supporting H7 (privacy risks X trust ${\rightarrow}$ intention to use LBA). The two hypotheses regarding to the TAM, including H8 (perceived ease of use ${\rightarrow}$ perceived usefulness) and H9 (perceived ease of use ${\rightarrow}$ intention to use LBA) were supported; however, H10 (perceived effectiveness ${\rightarrow}$ intention to use LBA) was not supported. Results of this study offer the following key findings and implications. First the application of PCM was found to be a good analysis framework in the context of LBA adoption. Many of the hypotheses in the model were confirmed and the high value of $R^2$ (i.,e., 51%) indicated a good fit of the model. In particular, locatability and privacy risks are found to be the appropriate PCM-based antecedent variables. Second, the existence of moderating effect of trust on service provider suggests that the same marginal change in the level of privacy risks may differentially influence the intention to use LBA. That is, while the privacy risks increasingly become important social issues and will negatively influence the intention to use LBA, it is critical for LBA providers to build consumer trust and confidence to successfully mitigate this negative impact. Lastly, we could not find sufficient evidence that the intention to use LBA is influenced by perceived usefulness, which has been very well supported in most previous TAM research. This may suggest that more future research should examine the validity of applying TAM and further extend or modify it in the context of LBA or other similar smartphone apps.

  • PDF

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

Effect of SMEs' Business Environment Perception, Corporate Competency, and Managerial Competency on Intention to Discontinue Business of CEOs: Mediating Effect of Business Confidence (중소기업의 사업환경 인식, 기업 역량, 경영자 역량이 사업중단의도에 미치는 영향: 사업자신감의 매개효과)

  • Yoon, Deok Sang;Ha, Kyu So
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.17 no.3
    • /
    • pp.103-117
    • /
    • 2022
  • The recent corporate economy, such as the COVID 19 pandemic that has spread all over the world since the beginning of 2020, the acceleration of the 4th industrial revolution, and supply chain management risks triggered by the US-China conflict and the Ukraine crisis, is more serious than ever before. CEOs who have started and managed small and medium-sized enterprises (SMEs) are more concerned than ever about the sustainability of their businesses in this reality. Nevertheless, there were few empirical studies on the factors that influence the intention of SME CEOs to discontinue business. In this study, the perception of the business environment of SMEs (intensity of competition in key business areas, difficulty in manpower management), corporate competency (employee competency, company product or service competitiveness, supply chain and consumer relations, digital competency and technical expertise), and CEO's competency(trust between employees and the CEO, management competency and perceived health status of CEO) on CEO's intention to discontinue business was discussed. As a result of the study, the intensity of competition in the main business field, and the difficulty in manpower management had a positive (+) effect on the intention to discontinue the business, and the employee competency, product (service) competitiveness, digital competency of the company, and the CEO's Health status had a negative (-) effect on intention to discontinue business. The relationship between these influences was found in the order of CEO's health status, product competitiveness, employee competency, digital competency, competitive strength in the main business, and difficulty in manpower management. It was analyzed that supply chain and consumer relations, trust between employees and the CEO, and management capabilities did not significantly affect the intention to discontinue business. On the other hand, business confidence has a mediating effect between the intensity of competition in the main business field, the difficulty in manpower management, product or service competitiveness, digital competency, trust between employees and the CEO, and the management capability and intention to discontinue business was tested. This study had academic significance in that it empirically analyzed factors related to intention to discontinue business targeting small and medium-sized business CEOs. In practice, as it has been found that business environment awareness, corporate competency, managerial competency, and business confidence are factors that influence the intention to discontinue business, if an action ideas that can reinforce this part can be found, SMEs can achieve sustainable growth or it may help CEO find an meaningful exit.

The Influence of Online Social Networking on Individual Virtual Competence and Task Performance in Organizations (온라인 네트워킹 활동이 가상협업 역량 및 업무성과에 미치는 영향)

  • Suh, A-Young;Shin, Kyung-Shik
    • Asia pacific journal of information systems
    • /
    • v.22 no.2
    • /
    • pp.39-69
    • /
    • 2012
  • With the advent of communication technologies including electronic collaborative tools and conferencing systems provided over the Internet, virtual collaboration is becoming increasingly common in organizations. Virtual collaboration refers to an environment in which the people working together are interdependent in their tasks, share responsibility for outcomes, are geographically dispersed, and rely on mediated rather than face-to face, communication to produce an outcome. Research suggests that new sets of individual skill, knowledge, and ability (SKAs) are required to perform effectively in today's virtualized workplace, which is labeled as individual virtual competence. It is also argued that use of online social networking sites may influence not only individuals' daily lives but also their capability to manage their work-related relationships in organizations, which in turn leads to better performance. The existing research regarding (1) the relationship between virtual competence and task performance and (2) the relationship between online networking and task performance has been conducted based on different theoretical perspectives so that little is known about how online social networking and virtual competence interplay to predict individuals' task performance. To fill this gap, this study raises the following research questions: (1) What is the individual virtual competence required for better adjustment to the virtual collaboration environment? (2) How does online networking via diverse social network service sites influence individuals' task performance in organizations? (3) How do the joint effects of individual virtual competence and online networking influence task performance? To address these research questions, we first draw on the prior literature and derive four dimensions of individual virtual competence that are related with an individual's self-concept, knowledge and ability. Computer self-efficacy is defined as the extent to which an individual beliefs in his or her ability to use computer technology broadly. Remotework self-efficacy is defined as the extent to which an individual beliefs in his or her ability to work and perform joint tasks with others in virtual settings. Virtual media skill is defined as the degree of confidence of individuals to function in their work role without face-to-face interactions. Virtual social skill is an individual's skill level in using technologies to communicate in virtual settings to their full potential. It should be noted that the concept of virtual social skill is different from the self-efficacy and captures an individual's cognition-based ability to build social relationships with others in virtual settings. Next, we discuss how online networking influences both individual virtual competence and task performance based on the social network theory and the social learning theory. We argue that online networking may enhance individuals' capability in expanding their social networks with low costs. We also argue that online networking may enable individuals to learn the necessary skills regarding how they use technological functions, communicate with others, and share information and make social relations using the technical functions provided by electronic media, consequently increasing individual virtual competence. To examine the relationships among online networking, virtual competence, and task performance, we developed research models (the mediation, interaction, and additive models, respectively) by integrating the social network theory and the social learning theory. Using data from 112 employees of a virtualized company, we tested the proposed research models. The results of analysis partly support the mediation model in that online social networking positively influences individuals' computer self-efficacy, virtual social skill, and virtual media skill, which are key predictors of individuals' task performance. Furthermore, the results of the analysis partly support the interaction model in that the level of remotework self-efficacy moderates the relationship between online social networking and task performance. The results paint a picture of people adjusting to virtual collaboration that constrains and enables their task performance. This study contributes to research and practice. First, we suggest a shift of research focus to the individual level when examining virtual phenomena and theorize that online social networking can enhance individual virtual competence in some aspects. Second, we replicate and advance the prior competence literature by linking each component of virtual competence and objective task performance. The results of this study provide useful insights into how human resource responsibilities assess employees' weakness and strength when they organize virtualized groups or projects. Furthermore, it provides managers with insights into the kinds of development or training programs that they can engage in with their employees to advance their ability to undertake virtual work.

  • PDF

A Case Study on Mechanism Factors for Result Creation of Informatization of IT Service Company (IT서비스 기업의 정보화 성과 창출을 위한 메커니즘 요인 사례 연구)

  • Choi, Hae-Lyong;Gu, Ja-Won
    • Management & Information Systems Review
    • /
    • v.36 no.5
    • /
    • pp.1-26
    • /
    • 2017
  • In the meantime, research on corporate informatization focuses on the completeness of information technology itself and its financial effects, so there is insufficient research on whether information technology can support business strategy. It is necessary to verify whether the management strategy implementation of the company can be led through the informatization of the enterprise and the relation between the main mechanism factors and the informatization performance. In this study, what a mechanism factor is applied in the process of result creation of informatization from three mechanism perspectives such as selecting mechanism, learning mechanism and coordinating mechanism with cases of representative domestic IT company and what an importance mechanism factors have been ascertained. This study results in 8 propositions. For a main agent of companies, securement of information capability of organizations has been selected to realize informatization results and investment of informatization has been selected to solve organizational decentralization problems as the most important factor. Additionally, as competition in the industry gets fierce, investment on informatization has been changed to a utility way of implementation of strategies and decision on investment has been made through the official process and information technology. Differentiated company capability has been made based on acquisition of technical knowledge and company information has been expanded to its whole employees through the information system. Also, informatization change management and outside subcontractor management have been acknowledged as an important adjustment factor of company. The first implication of this study is that since case studies on mechanism factors that preceding studies on informatization results did not empirically cover have directly been dealt with based on experiences of executives in charge of business and in charge of informatization, this study can provide practical views about factors that should be mainly managed for informatization results of IT companies. Secondly, since ser-M framework has been applied for IT companies for the first time, this study can academically contribute to companies in other fields about main mechanism factors for result creation of informatization based on deeper understanding and empirical cases.

A Study on the Application of Transfer Equipment Pooling Systems for Enhancing Productivity at Container Terminals (컨테이너터미널에서 생산성 향상을 위한 이송장비 풀링시스템 적용방안에 관한 연구)

  • Cha, Sang-Hyun;Noh, Chang-Kyun
    • Journal of Navigation and Port Research
    • /
    • v.38 no.4
    • /
    • pp.399-407
    • /
    • 2014
  • Due to the increase of container terminals, as the volume of terminals become distributed, the competition of preserving existing volume and inviting new volume are becoming fierce, and various ways for processing terminal volume and inviting volume are being sought. Container terminal efforts to maximize efficiency in order to improve the volume handling capability and productivity by both expansion of the latest equipment and development of the latest terminal system. There are a variety of factors that influence the improvement of productivity at container terminals. Among them, in the case of yard transfer equipment, if it were to convert from the method of a Yard Tractor(YT) being fixed allocated to a certain Gantry Cranes(GC) to a Pooling System that processes in a method that properly distributes and allocates a Yard Tractor(YT) to multiple Gantry Cranes(GC), the terminal productivity and the fusibility of YT may be increased. The KPI which is an indicator for the productivity at container terminals is GC productivity and since GC productivity cannot exceed the speed of physical GC operations, a Pooling System is applied to increase productivity which its meaning and effect is massive. Here in the Report, we produce the Pooling Algorithm system to improve the efficiency of the transported equipments in container terminal which is actually applying for this method and have compared Non pooling system with Pooling system in the fields. By introducing a transfer equipment pooling system and enhancing the productivity compared to other terminals, it may become an essential factor for increasing the continuous service quality and profitability in terms of terminal business.