There is a lot of something concerned with "cost reduction" and " new business development " directly connected with achievement for a management problem of an enterprise. When you pick up a concern, "business continuity", "cost reduction", "compliance", "global development", "new business creation" is raised since the earthquake. Correspondence to a cyberattack was added to these inside in recent years. When management information "was computerized", the proprietor who grasps the threat and risk accurately is little. A study on the behavior of the management team at the time of decision-making for the protection of cyber attack.
Though it is apparent that some of information security risks are caused from contractor side incidents, inter-organizational risk assessment is often difficult. This paper proposes a risk evaluation method named "Interface Response Method" which can analyze, without disclosure of detailed information from those participants, such cases where multiple organizations are cooperating. Specifically, it is a mathematical algorithm which focuses only on the events occurred at boundaries among organizations and extract enough information from them. This method is an application of Qualitative Sensitivity Analysis proposed in our previous work.
In South Korea, cyber attacks from North Korea and abroad have been increasing year by year.Not only Companies, but also government agencies operating a cyber security response organizations. When government agencies had detected a cyber crime, they inform the companies the signs of crime. There is a needs for rapid and smooth cyber security communication between the government and the companies, in order to maintain a safe environment for everyone using the Internet service companies. From the Korean case, it travels through cyber security, to study the communication of the way between the government and business in an emergency. The Focus on caes study of Korea, research on proper cybersecurity communication between government and companies.
Construction methods of the multiple classification systems using binary classifiers are discussed and evaluated by the system evaluation model based on rate-distortion functions. Suppose the multiclass problems constructed by M (M≧3) categories and N (N≧M-1) discriminators, then they can be solved by the matrices W , where the matrices W are given by the table of M code words with length N. Applying the bench-mark test data (Newspaper articles of 2000 Yomiuri Shinbun), the relationships between the classification error Pe and the number of the binary discriminator N for a given M are investigated, and the systems have desirable properties such as “Flexible", “Elastic", and so on.
This research aims to propose an asset valuation model based on the Banzhaf value under a portfolio choice decision with a generalized utility function. In this model, an utility function on risk and return is given, and a game in characteristic function form is constructed by assigning to each subset of risk asset in the portfolio the maximum utility of all possible portfolios combined by the risk assets in the subset and the risk-free asset. Each asset is then valuated with the Banzhaf value of the game. In this paper, the proposed model is compared to the capital asset pricing model (CAPM), which is the most basic asset valuation model in modern portfolio theory, and characteristics and potentiality of development of the model are studied.
In Japan, Ominichannel is still under development, but in US, it's already approached to the popular stage and they moved to the next stage, that is, ‘Personalization'. In this report, we summarize the omnichannel approaches those were taken by US companies, and figure out the differences between Japan and USA, and describe the challenges about ‘Personalization'.
This research focus on several kinds of Indonesian e-commerce with its diversified business models and features in Indonesia such as business to consumer (B2C), consumer to consumer (C2C), classifieds, shopping mall, and online shop in social media. Furthermore, this study focus on the e-commerce consumer adoption. One model used by researchers to understand the adoption of e-commerce by consumer in general is unified theory of acceptance and use of technology (UTAUT). This study suggest the extension of UTAUT and UTAUT2 by previous researcher to better understand behavioral intention and actual use in e-commerce from consumer perspective. Proposed model building with several hypotheses was provided in this study.
Weekly Sunday 19:30-20:00 ONAIR, in the radio program by which I take charge of personality, a try of related marketing of "radio media" and "social media" is being carried out in a radio program of a RAJIO Tsukuba delivery "Masaki Hoshida's dream management lecture". Specifically, execution of "preliminary announcement of the contents of a radio program", "two-way communication about thoughts and a question at the time of radio program ONAIR" and "promotion of information sharing between the radio program listener" is being tried. These radio media and social media are a part of marketing campaign related to a management learning lecture, and to consider 2 of media about the synergistic effect of the information communication becomes possible.
In recent years, the bicycle has been a variety of usage. In addition to the everyday means of transportation, for example, commuting, schooling and shopping, we use it for "exercise for health" and "enjoy for tourinsm". Among their usages, with a focus on cycle tourism, we research the attributes with high interest in the cycle tourism through a questionnaire survey. This time, we limit the target of university students. We consider the characteristics of the cycle with the classificationand the method of information provision.
This study focuses upon an innovative industrial product that one smaller firm in Higashiosaka city developed. The goal of this paper is to show how the industrial product, the PA13-A, contributes to life support when disaster occurs and examine the present situation of the product diffusion. The problems which confront us for diffusion will be clarified from the result of an interview to Setagaya Ward in Tokyo. As a research method this study uses informal interviews. If disaster occurs and the city gas line stops, ‘the PA13-A Gas Generator' will be able to keep on offering gas for people. There are achievements with the introduction of PA13-A in the Great Hanshin Awaji Earthquake, the Niigata Chuetsu Earthquake and the Great Tohoku Japan Earthquake.
In the movement of the regional revitalization, social business is attracting attention to work by utilizing the technique of business to social issues. To solving social issues by using ICT, it is expected to create new value and solutions. However, method of used ICT in social business has not been established. In this study, as a social business used ICT, pick up the case of the Happa business which Irodori has been conducted in Kamikatsu Town, Tokushima Prefecture. Through analysis using DEMO which is a kind of business modeling approach and interviews research, an element that ICT affects the social business clarified those facts “automation," “shifting of role," “matching of collaborators," “shifting of role," “virtualization of market function (control supply volume)."
This study compares frequent SNS users with infrequent users to examine the purchase behavior and purchase awareness of frequent SNS users. We inspect the data using statistical analysis and find that it is easier for frequent SNS users to buy products and services because they often go back and forth between the Internet and real stores.
The market size and sales of e-commerce are still expanding in Japan. In such the market, the B2C e-commerce sales is highest, thus the B2C e-commerce websites are required to enhance customer loyalty by their appeal in the new competitive environment. Although a large number of researches have been made on offline customer loyalty in the real world, little is known about online customer loyalty in the internet. Therefore, we have clarified factors of the formation of online customer loyalty based on the former studies of offline customer loyalty considering the special circumstances of online. Moreover, we have validated the factors and their relationships by the analysis of a questionnaire survey to users of the B2C e-commerce websites.
To implement an analysis of consumer behavior effectively, it is important to grasp customer interests in purchasing, and the reactions to sales promotion. So it is useful to analyze both ID-POS data and the data of customer's action log simultaneously, and it is needed that the log data is collected easily and precisely. In this paper, we propose indoor location estimation method based on received signal strength indicator between Bluetooth devices. In our experiments, we devise a layout of Bluetooth devices and algorithm of the estimation. Additionally, we make a benchmark instances to test our method, and we show that our method has good performance.
In a market where network effects exist, a firm acquiring high market share can have a competitive advantage. Once a firm successfully wins a large market share, it is difficult for other firms to diffuse their new product in the market. However, although the Microsoft OS based-PC had kept a large market share for a long time in the PC market where the network effects exist are typically at work, the Apple rapidly has increased its market share in recent years. This study attempted to reveal the factors increasing market share of the Apple and provide a new suggestion to the diffusion strategy for a challenger in a market with network effects.
In recent years, “overshooting," which means product over quality and over performance which result in decreasing profitability, has become a critical issue for firms. Although there are many theoretical studies and case studies related to overshooting, there are a few quantitative analysis. This study picked up mirrorless interchangeable-lens camera. We analyzed the date of product performance and also compared the appearance frequency of terms related to product performance between each product's press-releases and consumers' reviews on a website. Through these analyses, we could discuss overshooting quantitatively and provide new insight for overshooting.
Today many organizations use the information system. Information is assets of the organizations. We need to work on information security in order to protect these assets. However, based on results of the information security questionnaire that our university is carried out, a few students are interested in information security. Human threats such as password leakage, hoax by a SNS, data destruction by the virus, personal information leakage often due to apathy of information security. We extract the cause of the apathy of information security by questionnaire survey, and analyze threats of information security by the apathy.
We used the ID-POS data to analyze consumers' brand loyalty to milk. We picked up 4 brands,A,B,C,D. We also picked up 1,609 consumers, who had bought the same brand more than 24 times in two years, and analyzed their brand switching behavior. Results are as follows; (1) the rank order of brand loyalty is A, D, C, and B. (2) Switched brand depends on consumers' main brand. Heavy users of A tend to choose B, B users tend to choose A, C users tend to choose A and B, D users do not conflict with 3 brands, tend to choose other brand.
In a competitive market like mail order market, it is crucial for companies in the market to identify key factors that affect customer retention, and to make action plans based on the factors and the corporate strategy. Then, it is needed for data-mining process from customer's historical purchasing data, to find proper customer segment, to predict change of the specific customer segment, and to clarify the prediction factors. In our paper, we propose an ensemble algorithm which combine logistic regression model, decision tree model, K-nearest neighbor algorithm. From some computational experiments for benchmark instances and real data, we show the robustness and usefulness of our method.
To evaluation enterprise, it is important to consider not only enterprise financial states but also enterprise strategies or those changes. In this article, we extract the strategy words of the enterprise from the investor relations information published by the enterprise (IR information). In the enterprise strategy words appearing in IR information, there are many originally created words by companies, such as coined and proper words and so on. It is difficult to extract these words by morphological analysis with dictionary. So, we propose a method which consists of the following steps. (1) To extract candidates of strategy words by N-gram analysis. (2) To reduce noise words by using corpus of the common words that appears frequently in Japanese documents except IRs.
Today, because there are many academic societies in the same academic fields, it is essential to differentiate the society from other similar ones. The features of the academic society is thought to be represented by papers published on the journal. However, it is difficult to recognize the differences of the features of societies by comparing manually the contents of large amounts of papers. This study picked up the academic societies related to the field of industrial engineering, and attempted to compare their features quantitatively by using text-mining. We developed a new method to demonstrate the feature of the societies more precisely than existing methods. As a result, we could obtain useful information for understanding the differentiation of academic societies.
During Japan's Edo period, “yugaku" was the system of studying at “hanko" (higher education facilities for children of vassals) from outside a “han" (domain). This study demonstrates the influence of yugaku on the formation of the hanko ego-network. Network and statistical analyses were performed using 10 sets of hanko and han panel data (from 1736 to 1835). The result shows that although the increasing age of a hanko has a negative impact on the formulation of an ego-network, the degree of dedication to the yugaku of a han has a positive influence on it. These results indicate that although the reduction of an organization's environmental adaptability by age promotes a scale-down of the organization's ego-network, the degree of exploration expands it.
This research investigates the influence of regulation revisions on the diversity of gymnastics skill combinations. We employ network analysis and a random-effects model using the Japan gymnastics championships from 2013 to 2016. The analysis shows that stricter judgment of regulation revisions decreases the network constraints of skill and has a negative effect on decreasing the combination of skills. Additionally, a relaxation of judgment also promotes a decrease in the combination of skills. The results indicate that stricter judgment of regulation revisions promotes skill upgrades in maintaining the existing skill combinations and facilitates the creation of new skill combinations with decreasing network constraints. However, the relaxation of judgment promotes the disappearance of skill erosion.
This study demonstrates the influence of a strategy for maintaining proper inventory and rethinking strategy with inter-organizational learning on the bullwhip effect in a supply chain (SC). The bullwhip effect is essentially a phenomenon of demand variability amplification along an SC. We use game data from the latest online supply chain management (SCM) game by businessmen and researchers for analysis. The result of the random-effects model shows that even if there is no strategy, the dialogue in the supply chain has an influence on reducing the bullwhip effect. We also demonstrate the importance of dialogue with strategy for reducing inventory cost. This research proposes the importance of inter-organizational learning for the optimization of SC.
Due to the issue of low birthrate and aging, securing of means of transportation is becoming a big problem. However, the number of users has continued to decrease. Therefore, the bus company is forced to severe management. In this study, we focus on the improvement of bus diagram with prediction of number of passengers. In the conventional method, the potential user was missed when diagram was generated. Therefore, our study focused on the population around the bus stop and realized business improvement based on the weather prediction and optimized diagram generation method. In addition, for the problem of perturbation of number of bus user, a new prediction model using the machine learning was established. The estimation results with actual data have shown good predictive precision.
Between two manufacturers making the same product, one may decide to be a manufacturer as well as operate its own online marketplace, whereas the other might simple choose to offload the sales function entirely to a wholesaler. Is this a result of the company's strategy? Or is it perhaps because keeping these transactions internal gives it a cost advantage? What factors define this “boundary of company operations"? And what causes a company to operate in areas outside of its core competence? Further, how is the problem compounded by human and capital constraints? Choosing small-medium sized Japanese companies as my target, I decided to investigate these questions for my research.
The video game machine was prohibited to sale in 2000 in China,PC game has become widespread.In 2013, video game machine became open in China. This paper clarifies that it will it be popular like Japan or Western and what are the important things to make it be popular. More concretely, the development history of three companies' -Sony, Microsoft and Nintendo- video game machine were contrasted by different generation and series.Hard, soft, third-party and customer sales were contrasted and analyzed. This paper, then, the problems and proposed the strategies for diffusing widely in China.
Because the number of customers with limited interests in vehicles has been increasing, it has become more important to give an opportunity to make them have an interest in vehicles. Usually, when they search vehicles by using vehicle search system on the Internet, the vehicles are presented based on the information inputted by them, such as automobile manufacture name, vehicle name, vehicle performance and so on. However, it is difficult to show a vehicle attracting them by this system, because they have poor knowledge of vehicles. On the other hand, this study made it clear that vehicle's design attracts their interests. Therefore, this study proposed a recommender system considering customer's design preference and constructed required database.
The value of product, which a consumer feels when he/she makes a decision to buy, changes depending on the options simultaneously presented to him/her. As a representative example, the attraction effect is well known. This effect means that choice probability of the target increases when an option which is asymmetrically dominated to the target, called decoy, is added in his/her alternatives. Although the previous studies clarified the existence of the attraction effect, the impact of the difference of decoy's attributes value on its effect is not clear. Thus, this study attempted to clarify how the difference of them influences the attributes which consumer place significance on and the sequent attraction effect through a questionnaire survey.
The company Q, the manufacturer of electronic equipment, has been developed a new product for the surface layer processing market by applying the conventional products for the non-destructive testing market. Since this is a new entry market for Q, it was difficult for Q to understand the needs of the customers at the beginning of the development. In addition, most of the customers did not have experience of using radiation technology. This development has been made under the interaction with customers. We found that this process can be exactly said the iterative learning process for the technical seeds and the market needs. We studied based on the previous research with respect to knowledge obtained in this new product development and market entry process.
The purpose of this reseach is the media to be used in gathering information about a shopping were classified into two types of realistic media and Internet Media. Then, we classified consumers from the use frequency of the two media into four. By analyzing the characteristics of the buying behavior of each of the consumer, the suggestions for to the actual store to induce the customer.
Business Process Modeling Notation (BPMN) is one of the standard business process (BP) description, which is established by the Object Management Group (OMG). In addition to the notational elements to control the task execution sequence, BPMN provides us with those elements to express the time constraints such as deadline and delay. Since the behavior of BP models with the time constraints become complicated, it seems difficult to verify them using BPMN alone. This paper presents a method to make the rigorous verification possible for the models expressed in the form of BPMN, by converting them into the simulatable timed CPN models.
In many cases, business process and consumer behavior have hitherto been modeled, analyzed, and evaluated independently, however they are tightly interrelated, especially in B2C business. Therefore it seems inadequate to deal with them separately. This paper proposes a method to integrate the models for BP and consumer behavior expressed in the form of Colored Petri Nets (CPN), using the events interfacing these two different activities, in order to make it possible to simulate the original two models including their interactions. By this method, we can predict the effect of business process improvement and innovation on the consumer behavior. In addition, the paper examines how the effect affects the data in the databases and web, and then refers to the evaluation of the effect through data analysis.
In recent years , are visible signs of spread to a wearable device . The new device in the appearance , such as watches and glasses , has attracted particular attention on how to take advantage in business . If you look at the needs of the market health care , payment , there are a variety of use of the method of entertainment , etc. , to quantify the field workers of the business among them , perform the appropriate output , of how employer profits and workers I suggest you bring a richness .
In recent years, the importance of Corporate Social Responsibility (CSR) activities has been increasing. Although it had been thought that CSR activities may increase the cost and result in the decrease of corporate financial performance, recent studies has reported CSR activities raise corporate value. However, while there are various CSR activities, the impact of the difference of CSR activities' characteristics on corporate value is unclear. Thus, this study attempted to clarify the difference of the characteristics of some Japanese companies' CSR activities and analyze the impact of those difference on corporate value quantitatively. We provided suggestions to achieve both active CSR activity and increasing corporate value effectively.
Despite of the growth of the global semiconductor industry, Japanese semiconductor companies have been declining. On the other hand, Korean companies became global through the acquirement of an overwhelming competitive advantage especially in DRAM market. It is said that the fact that the late entrant "Samsung" dominates the market was brought by the strategy. This article reveals what is in the background of the differences between Samsung and Elpida by comparing each other from the view point of the strategy. As a result, it became clear that traditional Japanese companies tend to choose “Premier" directivity in terms of the differentiation. But it affects negatively in increasing competitive advantage to adapt the globalization.
This research demonstrates that the mother factory system has been getting increasingly complex and dynamic changes have been taking place through the influence of global factory networks on technological knowledge transfer. Network and statistical analyses are completed using data from Japanese factories (2012 to 2015). The result shows that when a firm has a strategy of creating a global network by a self-sustaining factory with the capability of product development and providing global offerings, the number of network creeks of the factory promotes the technological knowledge transfer. Nonetheless, the strategy of the top grandmother factory in Japan has no influence on technological knowledge transfer and indicates the enhancement of the control of the mother factory area in the global network.
Recent business processes (BP) need more speed than what they were, and therefore the time constraints are important. Among many kinds of notation, UML is one of the alternatives to be taken into account for the information systems. Although UML provides us with 13 types of diagrams, only the sequence and timing diagrams can express the time constraints. While the former is suitable for modeling the global behavior, the latter focuses on more local behavior. The BP shows global behavior, therefore this paper uses the sequence diagram, and presents how the BP is modeled verified from behavioral viewpoints including time constraints. In this verification, we use the UPPAAL model checker, since UML itself is not capable of verification.
The purpose of this study is to identify the factors that affect the average length of service of employees in the company. The average length of service of the employee gives significant impact on the personnel policy of companies. Longer years of service make it easier to accumulate the implicit knowledge in-house, while these companies may be evaluated highly in job market. Although it is known that age of company have the strong positive correlation with the average length of service of employees, it has not been verified yet enough for the other elements. In this study, the relationship between the various factors including profitability indicators and the average length of service will be investigated with quantitative data.
Even though I had worked in IT for almost five years, I consistently had trouble coordinating work with offshore resources in India. Deliveries were late, and what was delivered was often quite different from what had been originally agreed. My being Indian seemed to have no positive effect either. And when I spoke to a senior friend he explained it as - “Even though the people we co-ordinate with offshore are manager level, the skills required to be a manager are different." I found this interesting and decided to see what exactly it was that made a good offshore manager.
Since the IT Strategic Headquarters decided the Open Government Data Strategy in 2012, initiatives for “open data" have been enhanced by the government. Subsequently, local governments started recognizing the importance of initiatives for open data. To date, some progressive local governments have already attempted to implement some of them. In this research, we performed interviews with leading persons in such local governments. The aim of our research is to elucidate what kind of data should be targeted and what procedures are required for the open data initiative to function well. The use of open data might solve the issues that the community faces and provide the regional revitalization not only at the national level but also at the level of a local community.
Recently, as Japanese society ages, increasing the number of people waiting to be admitted to nursing home care has become a critical issue. However, comparing the number of people waiting by prefectures, the situation varies among them. Thus, we extracted characteristic of areas with low waiting and revealed the factors reducing the number of people waiting. It is found that private nursing home cares are enhanced in the areas with low waiting. Additionally, families live nearby and aged person are not tight on money. We also revealed that the fixed number of private nursing home cares is affected by the number of home care support services and low labor cost. We provided useful information for care policy.
We presents a food labeling service using barcode and Web in order to achieve customer-led improvement of safety and quality of foods. Existing food labeling framework has some problems such as limited area for labeling and cost for changing labeling contents. Using our service, customers scan a barcode attached on a food with his/her smartphone to browse a Web page of the food information provided beforehand by a food maker. This could avoid the problems mentioned above. Furthermore, customers could evaluate the provided information and require the maker to correct and expand them. This leads to improvement of safety and quality of foods, and then enables customers to make a subjective and rational choice of foods.
Conventional study and practice of data governance, which is a set of processes of governing any data pertain to information systems, have been made around master data management and data quality management of structured data. The dawn of the big data era, which occurred around the year of 2011, has drawn enterprises' attention to ways to process, utilize and extract value out of the vast quantity of data brought about by system logs, sensors, SNSs and so on. Academic research aiming towards expansion of a data governance framework to cope with the era of big data is still few, albeit its significance in the industry. This article overviews existing research work of data governance and discusses future directions of data governance research.
System analysis has been concerned with as-is or to-be, while is concerned with another aspect in this paper. It is unfavorable to see competing alternatives over the course of IS development activity. Dialectical solutions among alternatives are expected prior to the development. It is constructive to appreciate the similarities and differences of the their constitutive conditions rather than to compare the alternatives. Cultural and historical analysis of organization is required in the early part of systems analysis. However, the method for it is not shared. In this paper, therefore we present a method that uses Activity Theory as a representation method of constitutive conditions and phenomenology as a methodology. We show the method contribute the dialectical solution with an artificial example.
In recent years, the use of cloud services is becoming an effective and practical option in corporate information system development. For instance, Carr(2008) pointed out that cloud services IT service providers are commonly providing are promoting commoditization of IT and business process. However, the use of cloud services (especially Paas: Platform as a Service) seems also to promote the uniqueness of the corporate information systems related to business processes (Yoda, Tateiwa & Matsunaga 2014). This study focuses on PaaS discussed use in the corporates information system, and the object thereof is to clarify the whereabouts of its theoretical issues.
When we generalize the business of topic companies, Uber and Airbnb, it can be said the platform services business that enables the peer to peer type direct interaction between professional service providers and users. And a feature of this embodiment is that the assets are left to the professional service providers, platform service providers specialize to support the dealings between professional service providers and the user. For this reason, it enables service start-up in the small assets and small number of people. On the other hand, conventional professional service providers that was only as the employee at companies, has the means to make a independently living as a personal manager. This is considered as a new co-creation between people and IT. So, explore this direction.
Application of LCDs is classified to television (TV), personal computer (PC), and small-sized mobile devices. The LCDs for PC and TV have already been led to "module". However, smartphone has been led to "module" at last. The cases of Sharp and Japan Display was comparatively analyzed from the viewpoint to sense and deal with the "modularization." Sharp sense it late, and have inadequate support, compared to Japan Display. As the result, Sharp was crushed by debt, and acquired by Hon Hai. In the modern era of rapid change, it is important to perceive quickly the change, and to respond appropriately.
Open Source Software (OSS) is the software of which source code is open to public, and then users can study and improve them corresponding to their needs. This study conducted the questionnaire survey to IT companies in Japan, investigating how OSS utilization and contribution to the development community affect the business growth of companies. The survey was first implemented in 2012 and continued for 3 consecutive years until 2014. In order to analyze the 2-year transition (from 2012 to 2014) in terms of the OSS utilization, contribution, and company growth, t-test was employed to each of the average data. As the fifth report of the study, we will present the result of the analysis, and then summarize our research findings for further research.
This paper presents factors that increase the competitive advantage of the information security business was extracted by comparison of Mcafee and Symantec. Symantec has built portfolio information security related business with own business resources. Mcafee has established to advantages in technologies for IoT, through merger with Intel in 2010. It is impossible with a standalone software nor product to protect the information from wide variety of security risks recently.
May 27, 2017 Due to the urgent maintenance of Japan Link Center system, following linking services will not be available on Jun 8 from 10:00 to 15:00 (JST)(Jun 8, from 1:00 to 6:00(UTC)). We apologize for the inconvenience. a)reference linking b)cited-by linking c)linking with JOI/DOI/OpenURL d)linking via related services , such as PubMed , Google , etc.
April 03, 2017 There had been a system trouble from April 1, 2017, 13:24 to April 2, 2017, 16:07(JST) (April 1, 2017, 04:24 to April 2, 2017, 07:07(UTC)) .The service has been back to normal.We apologize for any inconvenience this may cause you.
May 18, 2016 We have released “J-STAGE BETA site”.
May 01, 2015 Please note the "spoofing mail" that pretends to be J-STAGE.