• Title/Summary/Keyword: service continuity

Search Result 242, Processing Time 0.025 seconds

Determinant of Market Orientation on SME Performance: RBV and SCP Perspective

  • NURHILALIA, NURHILALIA;RAHMAN Kadir, Abdul;MAHLIA, Muis;JUSNI, JUSNI;ADITYA, Halim Perdana Kusuma Putra
    • Journal of Distribution Science
    • /
    • v.17 no.9
    • /
    • pp.35-45
    • /
    • 2019
  • Purpose - This study analyzes the relationship between inter-function coordination variables, competitor, customer and innovation orientation that has been developed by Narver & Slater (1990), also known as Market Orientation Strategy on SME Sutera's marketing performance, through direct and indirect effect relationships. Research design, data, and methodology - This study uses a sample of 168 respondents who are silk SME entrepreneurs in eleven Silk Craftsman sub-districts in Wajo Regency - South Sulawesi Province, Indonesia. Data collection using a questionnaire with a period between January - June 2019. Data analysis use PLS. The stages of testing the results of analysis go through several stages: the first stage, analysis of variable descriptions, the goodness of fit model (AVE, CR, Cronbach Alpha, R2) and hypothesis test. Results and Findings - From the fifteen hypothesis by direct and indirect effect state six hypothesis are rejected and eleven hypothesis are accepted. Overall, the concepts of Resource Based View theory (RBV) and Structure-Conduct- Performance theory (SCP) also provide a strategic picture for businessmen related to product innovation and service innovation and the urgency of regeneration in order to maintain the continuity of superior products in the future.

An Analysis of the Relationships between the Technology Acceptance Model and Switching Costs (기술수용모형과 전환비용의 관계 분석)

  • Lee, Woong-Kyu;Kwon, Jeong-Il
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.37 no.1
    • /
    • pp.89-104
    • /
    • 2012
  • As the generalization of using computer and the internet, most people, who would decide the acceptance of new information technology (IT), may consider the current systems which have been used so far. The objective of this study was to analyze the relationships between technology acceptance model (TAM) and the switching costs which may incur during switching from the current system into another on. For this purpose, this study suggested the hypotheses, in which continuity cost and setup cost, two types of switching costs in IT adoption, would influence perceived usefulness and perceived ease of use respectively. Moreover, the moderation effects of system types, hedonic system and utilitarian system, on the relationships between switching costs and TAM, were also suggested as the hypotheses. In order to prove the validity of the hypotheses, two groups were surveyed. Before surveying, to the one group who were believed to be a user of 'Cyworld', a new blog service, Naver Blog, was introduced. Similarly, to another group, Google Docs was introduced. The analysis by Partial Least Square (PLS) approach showed that most hypotheses in this study were statistically supported.

A Study on Information Security Governance Framework (정보보안 거버넌스 프레임워크에 관한 연구)

  • Kim, Min-Jun;Kim, Kui-Nam J.
    • Convergence Security Journal
    • /
    • v.10 no.4
    • /
    • pp.13-19
    • /
    • 2010
  • The flow of time, depending on the company's ongoing business link to guarantee the proportion of much greater importance, it in the organization as part of an enterprise-wide level, rather than acting on the information society has been considered as the topic of race. Information Security Governance, the integrity of the information, service continuity, the three kinds of information asset protection purpose begins. It is essential for corporate governance, transparency should be part, must be aligned with the IT framework. Existing information security governance framework that small businesses a wide range of governance issues and interests have never had. Therefore, we simplified the information security governance framework is proposed, and solve problems, and propose a framework for analysis of the safety and efficiency through the analysis of the effectiveness of the proposed method were discussed.

Sensor Fault Detection, Localization, and System Reconfiguration with a Sliding Mode Observer and Adaptive Threshold of PMSM

  • Abderrezak, Aibeche;Madjid, Kidouche
    • Journal of Power Electronics
    • /
    • v.16 no.3
    • /
    • pp.1012-1024
    • /
    • 2016
  • This study deals with an on-line software fault detection, localization, and system reconfiguration method for electrical system drives composed of three-phase AC/DC/AC converters and three-phase permanent magnet synchronous machine (PMSM) drives. Current sensor failure (outage), speed/position sensor loss (disconnection), and damaged DC-link voltage sensor are considered faults. The occurrence of these faults in PMSM drive systems degrades system performance and affects the safety, maintenance, and service continuity of the electrical system drives. The proposed method is based on the monitoring signals of "abc" currents, DC-link voltage, and rotor speed/position using a measurement chain. The listed signals are analyzed and evaluated with the generated residuals and threshold values obtained from a Sliding Mode Current-Speed-DC-link Voltage Observer (SMCSVO) to acquire an on-line fault decision. The novelty of the method is the faults diagnosis algorithm that combines the use of SMCSVO and adaptive thresholds; thus, the number of false alarms is reduced, and the reliability and robustness of the fault detection system are guaranteed. Furthermore, the proposed algorithm's performance is experimentally analyzed and tested in real time using a dSPACE DS 1104 digital signal processor board.

The Geriatric Care Workers' Role Care for Elderly of Sanatorium in Korea

  • Kim, Kyung-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.11
    • /
    • pp.105-110
    • /
    • 2017
  • This paper is to research the difference of care workers' role in Sanatorium between urban and rural areas. Interviews have been conducted with 100 care managers with structured questionnaires in community care settings. The findings of the study are as follows. In the analysis of working with carers a care manager acting as a counsellor in rural was required rather more than any other role in working with clients' carers. In working with formal and informal networks, an administrative specialist role was also important in both areas. With resource management, there were some regional variances between rural and urban. In the urban area, a care managers as a coordinator was more required than as a broker. In the rural area, a care manager as a broker, selecting service resources for elderly clients was the most suitable role. In conclusion, in general rural care managers' roles were similar to those of many core managers in urban area. Among the many possible roles of care managers that effective continuity of care is to be provided for elderly clients in community care, two have been specified as essential roles. The first is the role of care managers that provides coordination and integration of services at the clients' levels as a care manager as an implementer, a linkman, counsellor. The second is at the system level which is possible role for coordination and linkage of programs as a characteristics of care managers, task with formal & informal network, community resources, available residential & NHS resourcesw.

A Study on the Medical Program and Spatial Organization for Musculoskeletal Center (근골격센터의 프로그램 및 공간구성에 관한 연구)

  • Yun, Woo Young;Chai, Choul Gyun
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.21 no.4
    • /
    • pp.49-58
    • /
    • 2015
  • Purpose: Musculoskeletal disorder is one of diseases with high medical demand over-65 populations. Considering complex, chronic property of diseases, it is important for patients to provide specialized medical service. The musculoskeletal center is one of the most essential facility type in order to give adequate care to the patient suffering from musculoskeletal diseases. Methods: Statistical analysis relating to the component ratio of patients for the demand for medical care. Literature analysis for characteristic of the musculoskeletal diseases. The Status Survey of health care facilities operating in the musculoskeletal center. Results: It is necessary for the musculoskeletal center to be composed of four major areas such as consultation, examination, diagnosis, intervention for continuity of care. For continuum of care, it is essential to build medical environment integrated with each level of care such as consultant, examination, diagnosis procedure. Implications: This study is a basic research for design of musculoskeletal center, and need to be followed by further study using various perspectives and methods.

A Study on the Realities and Preventive Countermeasures of Child Abuse Committed by Biological Parents by information analysis.

  • Ryu, Chae-Hyoung;Yoon, Hyun-Seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.5
    • /
    • pp.171-177
    • /
    • 2019
  • In this paper, we analyze the current phenomenon of child abuse crimes based on the information gathered by the National Child Protection Agency. The purpose of this paper is to diagnose the seriousness of child abuse by biological parents based on the analyzed information and propose measures against it. Comprehensive and integrated measures are needed for child abuse committed by biological parents due to abuse concealment, continuity of damage, and inactive national intervention by considering punishment on attackers through national intervention, fundamental in-depth psychological counseling, therapeutic care, promoting recovery of victims, and ultimately continuous and regular management and monitoring as a long-terms measure. To do so, developing customized and individual educational programs and make them obligations can be first presented to identify child abuse in advance and build up preventive systems based on the principle of family preservation. In addition, problems should be addressed at a fundamental level by performing various and active therapeutic treatments such as psychological treatment, mental treatment, or drug treatment gradually and through phases for biological parents who commit child abuse and contributing to recovering the relationship. Furthermore, proper protection and treatment service should be provided to children victimized by abuse by extending professional children care facilities and adopting the professional family commission system as measures by separating family.

Sparse DTMNs routihg protocol for the M2M environment (Sparse M2M 환경을 위한 DTMNs 라우팅 프로토콜)

  • Wang, Jong Soo;Seo, Doo Ok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.4
    • /
    • pp.11-18
    • /
    • 2014
  • Recently, ICT technology has been evolving towards an M2M (Machine to Machine) environment that allows communication between machine and machine from the communication between person and person, and now the IoT (Internet of Things) technology that connects all things without human intervention is receiving great attention. In such a network environment, the communication network between object and object as well as between person and person, and person and object is available which leads to the sharing of information between all objects, which is the essential technical element for us to move forward to the information service society of the era of future ubiquitous computing. On this paper, the protocol related to DTMNs in a Sparse M2M environment was applied and the improved routing protocol was applied by using the azimuth and density of the moving node in order to support a more efficient network environment to deliver the message between nodes in an M2M environment. This paper intends to verify the continuity of the study related to efficient routing protocols to provide an efficient network environment in the IoT and IoE (Internet of Everything) environment which is as of recently in the spotlight.

Ransomware Threat Countermeasures for the Defense Information System: In terms of Information Security Risk Management (국방정보시스템에서의 랜섬웨어 위협 대응방안: 정보보안 위험관리 관점에서)

  • Yoo, Jincheol;Moon, Sangwoo;Kim, Jong-hwa
    • Convergence Security Journal
    • /
    • v.20 no.5
    • /
    • pp.75-80
    • /
    • 2020
  • Damage caused by ransomware has continued to increase since last year, but cyber operations are managed without any separate classification of ransomware types in the military's guidelines for carrying out cyber operations. However, unlike other malware, ransomware is a threat that could paralyze all defense operations in one moment, and the military should reevaluate ransomware and take countermeasures. Accordingly, this paper aims to analyze the assets, vulnerabilities, and threats related to defense information service based on information security risk management, and propose alternatives to ensure continuity of defense work from ransomware threats.

Rationalization of Network Segregation for Continuity of Financial Services Following COVID-19

  • Choi, Manyong;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.11
    • /
    • pp.4163-4183
    • /
    • 2021
  • As measures for protecting users and ensuring security of electronic financial transactions, such as online banking, financial institutions in South Korea have implemented network segregation policies. However, a revision of such domain-centered standardized network segregation policies has been increasingly requested because of: 1) increased demand for remote work due to changes resulting from COVID-19 pandemic; and 2) the difficulty of applying new technologies of fintech companies based on information and communications technologies (ICTs) such as cloud services. Therefore, in this study, problems of the remote work environment arising from the network segregation policy currently applied to the financial sector in South Korea and those from the application of new ICTs such as fintech technology have been investigated. In addition, internal network protection policies of foreign financial sectors, such as those of the United States, United Kingdom, European Union, and Russia, and internal network protection policies of non-financial sectors, such as control systems, have been analyzed. As measures for the effective improvement of the current network segregation policy, we propose a policy change from domain-based to data-centric network segregation. Furthermore, to resolve threats of hacking at remote work, recently emerging as a global problem due to COVID-19 pandemic, a standard model for remote work system development applicable to financial companies and a reinforced terminal security model are presented, and an alternative control method applicable when network segregation is not applied is proposed.