Abstracts of Annual Conference of Japan Society for Management Information
Annual Conference of Japan Society for Management Information 2007 Autumn
Displaying 1-50 of 53 articles from this issue
  • Tadashi Yoshii, Kazuhiko Yasuda
    Session ID: B1-1
    Published: 2007
    Released on J-STAGE: May 14, 2008
    CONFERENCE PROCEEDINGS FREE ACCESS
    The purpose of this paper is to present a conceptual framework which will be useful for designing a suitable supply chain. In recent years, supply chain design has received considerable attention from researchers and practitioners. It has been suggested that supply chain design should be based on product characteristics such as the nature of the demand for the products a company supplies. In addition, supply chain design should be based on enterprise discipline as well as product characteristics to gain higher performance, since each discipline requires a different kind of supply chain type. In this research, a conceptual framework based on enterprise discipline and product characteristics is presented to facilitate a rational design process of supply chains.
  • Kouta Hosoya
    Session ID: B2-4
    Published: 2007
    Released on J-STAGE: May 14, 2008
    CONFERENCE PROCEEDINGS FREE ACCESS
    Recently, it is necessary to achieve the high quality product design and manufacturing in short term by shortening product life cycle. And it is important to obtain the parts reliability information that manufacturer needs for improvement of product reliability. This study defines reliability information of the parts that required to be added for procurement activity. This study proposes the distribution of this information with currently distributed parts information within electric industry and considers that reliability information of procurement activity contributes the improvement of product reliability.
    Download PDF (70K)
  • Analysis of Securities Report Data
    Shoei KOMATSU
    Session ID: B4-1
    Published: 2007
    Released on J-STAGE: May 14, 2008
    CONFERENCE PROCEEDINGS FREE ACCESS
    From around 1990 to present, there have been many studies and discussions relating to computing productivity in firms, but almost of them have been limited only to information systems. However, there have been rarely such kinds of research as analyzing simultaneously the effects brought from both manufacturing facilities and information investments. Therefore, statistical analysis on securities report data had been done relating to companies of three business categories, i.e. chemicals, machinery and electrical machinery, listed in Tokyo Stock Exchange 1st Section. Now, the existence of regional differences is studied on the computing productivity of enterprises located in Tokai region, i.e. Shizuoka, Aichi, Gifu and Mie.
    Download PDF (44K)
  • Fumito Kondo
    Session ID: B4-3
    Published: 2007
    Released on J-STAGE: May 14, 2008
    CONFERENCE PROCEEDINGS FREE ACCESS
    Today, under the matured market circumstance, SOA (Service Oriented Architecture) was worthy of note for enterprises which turn the helm toward the global growth strategy. However, ROI of SOA is not immediately appeared, furthermore SOA is infrastructure therefore, it is very difficult to intuitive understand it effectiveness, so, this difficulty caused hardship getting approval from top management. These difficulties seems exist in SOA's effect is not deterministic effect, it affected by indeterministic event. This paper tried to establish decision making process with rational propriety by making consensus among stakeholder for strategic scenario such as supposed changing environment, and reaction of enterprise, and making standard evaluation model with visible risk coefficients.
    Download PDF (314K)
  • Mikako OGAWA
    Session ID: B5-4
    Published: 2007
    Released on J-STAGE: May 14, 2008
    CONFERENCE PROCEEDINGS FREE ACCESS
    In a case of a food manufacturer, to open its own management system to the public strengthens the connection with its raw material suppliers and achieves higher quality control. Q.P. Corporation has established an original quality management system, "QITEC" (QP Information Technology System), by Kaizen activities which propose to prevent human errors and to reduce the mental load of workers. QITEC has achieved operational standardization, the efficiency improvement of work, and inventory reduction etc. In addition, Q.P. Corporation has achieved higher quality control such as prevention of row material mix-ups by cooperation with its row material suppliers as a result of opening its production know-how by selling QITEC as package software and introducing the industry-standard code.
    Download PDF (38K)
  • Kenichi Aida
    Session ID: C1-2
    Published: 2007
    Released on J-STAGE: May 14, 2008
    CONFERENCE PROCEEDINGS FREE ACCESS
    Abstract: This report analyzes the payment method of the business in the B2C market around Rakuten which is the B2C market which is representative in the country and a market of Yahoo! Shopping. There were article cash COD mail, credit and debit card payment, convenience store payment, credit payment, bank transfer, postal transfer, the cash exchange, in a payment method, but analyzed what kind of business method was used in B2C. As a result of analysis mainly in goods cash payment, a credit card, next the convenience store payment many; was analyzed to be the good thing.
    Download PDF (326K)
  • Masamichi Mukai, Tatsuyuki Negoro
    Session ID: C2-1
    Published: 2007
    Released on J-STAGE: May 14, 2008
    CONFERENCE PROCEEDINGS FREE ACCESS
    Nowadays, Information Systems have developed larger and more complex. As a result, it is too hard to explain how these information systems correlating to the firm's competitive advantage. At the same time, Information Technology (IT) becomes 'commodity'; therefore IT doesn't contribute to the firm's long term competitive advantage. On this paper, we research Seven-Eleven Japan which has excellent information systems, and denote the contribution of firm's competitive advantage from the "Path Dependency" perspective.
    Download PDF (196K)
  • Hiroyuki OGURA, Masaru SAKAMOTO
    Session ID: C2-3
    Published: 2007
    Released on J-STAGE: May 14, 2008
    CONFERENCE PROCEEDINGS FREE ACCESS
    We apply the theory of positioning portfolio strategy of a Japanese Integral and Modular Production System to the issue of construction of Government Information-System in network centric era. In this article, we study a Production System Architecture of complex adaptive system using of open standard innovation technology , about a Integral-type electronic government Legacy-System and a Modular-type ASP(Application Service Provider)/SaaS(Software as a Service) system , based on network analysis . And , we suggest a new Integral and Modular Supply Chain System in a Production of Government Information-System , by the introduction of the enterprise crossing type project team.
    Download PDF (132K)
  • Bunpei Kida, Kazuaki Nanba, Yoshiyasu Yamada
    Session ID: C3-3
    Published: 2007
    Released on J-STAGE: May 14, 2008
    CONFERENCE PROCEEDINGS FREE ACCESS
    It is thought that positively doing the CSR activity exerts the good influence on the future corporate performance. However, the research of their relation hasn't been done. Therefore,this research analyzes the relation between the amount of money spent on the CSR activity and growth potential, profitability and safety, and their relation is clarified. The analysis objects are automotive and electric companies that positively having been doing the CSR activity. Result that should make a special mention is that environmental preservation activity and social contribution activity have negative relation with the corporate performance. It might be a cause that the analysis period was short, although a long period is required for the good influence of these activities to appear.
    Download PDF (283K)
  • Mika Goto, Toshiyuki Sueyoshi
    Session ID: C4-1
    Published: 2007
    Released on J-STAGE: May 14, 2008
    CONFERENCE PROCEEDINGS FREE ACCESS
    This study examines a synergy effect between electricity and gas businesses of US electric power utilities during the deregulation period. In addition to the productive efficiency measured by DEA, this study extends the analysis to DEA—DA in order to examine the financial performance of these businesses. Financial data are often used by investors to evaluate firms' performances. This study proposes an integrated approach to examine both productive efficiency and financial performance.
  • Business Model to Work Breakdown Structure
    Shoei KOMATSU
    Session ID: C5-1
    Published: 2007
    Released on J-STAGE: May 14, 2008
    CONFERENCE PROCEEDINGS FREE ACCESS
    Work breakdown structure being the core of project management has been written frequently on the size of structure elements but not on the process to breakdown up to the elements. On the other hand, software architecture has been frequently defined on application software, while the building process has been rarely written consistently from business model to architecture. Moreover, the database architecture is independently built without any relationship with the application software, while it has been rarely written building the integrated architecture of application software and database. Therefore, the integrated process is studied from business model to work breakdown structure both on the application and database.
    Download PDF (39K)
  • SHINOBU SAITO, HIROFUMI OTA
    Session ID: C5-2
    Published: 2007
    Released on J-STAGE: May 14, 2008
    CONFERENCE PROCEEDINGS FREE ACCESS
    This paper proposes the management methodology and support tool of business flow design. Management methodology is modeling approach based on the flow-based viewpoint and the structured-based viewpoint. That methodology supports mainly business users for describing, validating, and refining business models. In proposed approach, business models consist of the business flow diagram and the business structured list. Those business models are collaborative each other focused on 5W1H (Why, What, How, Who, Where, When) aspect. So, we introduce the developing support tool, which maintains mutual coordination of the business flow diagram and business structured list automatically.
    Download PDF (96K)
  • Hirofumi OTA, Taro NAKAO, Shuichiro YAMAMOTO
    Session ID: C5-3
    Published: 2007
    Released on J-STAGE: May 14, 2008
    CONFERENCE PROCEEDINGS FREE ACCESS
    The Zachman Framework is well known as the logical structure to organize the information needed for promoting an enterprise total optimization, on the other hand, it may not be useful necessarily for users who are eager to introduce EA because of its abstraction. We propose the EA Implementation Process with the goal-based approach focused on Why, What and How, reflecting the method of Dr. Finkelstein (2006) which is the EA implementation strategy based on the Zachman Framework. This paper reports the result of applying our process to the solution business case study of an IT system enterprise for its efficacy assessment.
    Download PDF (110K)
  • A Proposal for Research Framework
    Shuhei KUDO, Kazuhiko YASUDA
    Session ID: C5-4
    Published: 2007
    Released on J-STAGE: May 14, 2008
    CONFERENCE PROCEEDINGS FREE ACCESS
    The purpose of this research is to present the alignment cycle as a research framework for strategic alignment between business and IT (Information Technology). Many past alignment studies could be related to the framework of alignment cycle. The proposed alignment cycle, which is based on PDCA (Plan-Do-Check-Act) cycle, consists of four phases: (1) Plan, (2) Do, (3) Check, (4) Act. There are eight alignment research perspectives. These research perspectives contribute to an efficient and effective implementation of each phase in alignment cycle. It is necessary to implement the alignment cycle repeatedly in upward spirals for achieving a successful use of IT.
    Download PDF (217K)
  • AKIKO ORITA
    Session ID: D1-4
    Published: 2007
    Released on J-STAGE: May 14, 2008
    CONFERENCE PROCEEDINGS FREE ACCESS
    This paper proposes the classification of Consumer Generated Media (CGM) based on linkability and browsability, which consist anonymity. As CGM contains numerous history of consumers sessions, such as ratings,postings, conversations and so on, appeared information forms"real" identity though they act anonymously. Firstly,we distinguish pseudonymity from anonymity, which includes any handles or IDs. Secondly, we focused on linkability and its browsability of sessions that defines to what extent personal information and history of sessions are gathered. Based on our framework of anonymity, we classified current CGM.
    Download PDF (291K)
  • sakura sakata, ramon meguro
    Session ID: D2-2
    Published: 2007
    Released on J-STAGE: May 14, 2008
    CONFERENCE PROCEEDINGS FREE ACCESS
    This study is business to business marketing of venture company with highly qualified original technology in Japan .The main investigation is element extraction for success at product development and promotion on the venture company. The following investigation is shown from the analysis result. What element for success with product development or promotion in the venture company? This study is grow up and market environmental adaptation method in the venture company.
    Download PDF (176K)
  • Hisashi KIKUCHI, Susumu SAITO
    Session ID: D2-4
    Published: 2007
    Released on J-STAGE: May 14, 2008
    CONFERENCE PROCEEDINGS FREE ACCESS
    Sales promotions to individual customers are often carried out by, for example, sending direct mail, transmitting E-mail and calling. The purpose of this study is to model such sales promotions for individual customers into knapsack problem, and proposing a metaheuristics algorithm for the problem. If probabilities of the customer's purchase are known, the method of this study is able to determine targets, goods and channels that maximize the expected value of profit while considering the budget and the risk.
  • Tamotsu NOJI, Yuta NAKAI, Masashi ARINO
    Session ID: D4-3
    Published: 2007
    Released on J-STAGE: May 14, 2008
    CONFERENCE PROCEEDINGS FREE ACCESS
    The music and artist of a result who referred to this system in order to use the technique of extracting the peculiarity information on music which the user is heard by preference usually, and discovering the target music based on the peculiarity information have the high probability which is a user's favorite music tone.
  • Satoshi Fukunaka, Hideaki Kitanaka, Chunhui Xu, Naoki Shiba
    Session ID: D5-2
    Published: 2007
    Released on J-STAGE: May 14, 2008
    CONFERENCE PROCEEDINGS FREE ACCESS
    We analyze firm's promotion strategies for products with network externalities. Adopters estimate products based on the weight of three attributes, "function","price", and "network externalities". In this research, we define that the promotion is to change adopter7s weights. So, we assume two firms with different parameters for changing adopter's weights by promotion strategies, and we analyze the results with a model by an agent-based simulator.
    Download PDF (236K)
  • Hiroshi Komoriya
    Session ID: E1-3
    Published: 2007
    Released on J-STAGE: May 14, 2008
    CONFERENCE PROCEEDINGS FREE ACCESS
    For these few years, a global business, a public organization and the small and medium-sized enterprise have begun to work this method as a leadership and organization development technique exceeding the only tool of solving problem. This method is worked with an important, urgent problem by various members of 4-8 person, has visible effect of "Question". In this text, the author examines the possibility of "Management by the good question" through the practice.
    Download PDF (296K)
  • Taketoshi Yoshida
    Session ID: E1-4
    Published: 2007
    Released on J-STAGE: May 14, 2008
    CONFERENCE PROCEEDINGS FREE ACCESS
    We try to explain organizational knowledge-creating processes while following both tacit knowing and propositional knowledge. Accordingly, we say that it is not a conversion process between tacit and explicit knowledge. Instead, we understand that an organizational knowledge-creating process is one that we at first emerge a comprehensive entity, and it is justified, and judged whether or not it is true by a prototype, and finally crystallizes to knowledge. We further discuss that the dynamic process as the fountain of knowledge, which has been thus practiced and acquired, and will produce values in the future acts, can become the knowledge of an organization. However, this knowledge cannot be defined by the traditional epistemology.
    Download PDF (182K)
  • Masahiko Ishino, Naokazu Yamaki, Haruki Inoue
    Session ID: E3-1
    Published: 2007
    Released on J-STAGE: May 14, 2008
    CONFERENCE PROCEEDINGS FREE ACCESS
    Many information securities measures are being needed by development of the internet society. We propose a method to presume the accident about the information securities in the section of the enterprise. We presented research about the algorithm of the recommendation system was recommend goods of suitable the specific customer's tastes. We presume the accident which can occur now to IT assets of each section using the method. We were changed attributes of the warning log data which occurred on every section of the enterprise and presume the similar accident which doesn't occur yet. We can give priority to the information securities measure to the accident which presumed the possibility which occurs to be high by applying log data to this method.
  • Tsuyoshi WATANABE, Noboru SHIMIZU, Takahiro HASEGAWA, Naokazu YAMAKI
    Session ID: E3-2
    Published: 2007
    Released on J-STAGE: May 14, 2008
    CONFERENCE PROCEEDINGS FREE ACCESS
  • Information and Learnign in West Japan Railway Company
    Shae-Chang SHYI, Junji ASAI, Shigeo ATSUJI
    Session ID: E4-1
    Published: 2007
    Released on J-STAGE: May 14, 2008
    CONFERENCE PROCEEDINGS FREE ACCESS
    In this study, we review the organizational learning with range of innovations of information and communication technology. First, the case with "JR railroad accident 4.25" is analyzed from a technical side and a human side, and the issue of the resent traffic control system is examined. Finally, we propose what should be of the traffic control system in the future.
    Download PDF (228K)
  • 'Nikkin Kyouiku' in Railroad Accident
    Makoto ICHIMIYA, Shigeo ATSUJI, Shae-Chang SHYI, Junji ASAI
    Session ID: E4-2
    Published: 2007
    Released on J-STAGE: May 14, 2008
    CONFERENCE PROCEEDINGS FREE ACCESS
    In this study, we analyzed "Negative organizational learning" that is the issue in C. Argyris's 'organizational double-loop learning'. Especially we examined "JR railroad accident 4.25" is taken up as a case 'Nikkin Kyouiku'. We guess this is a negative organizationallearning process, and find out the "Learning Disability".
    Download PDF (256K)
  • Rika Narisawa
    Session ID: E5-1
    Published: 2007
    Released on J-STAGE: May 14, 2008
    CONFERENCE PROCEEDINGS FREE ACCESS
    With the transition to the knowledge-based society, the priorities of enterprises are being human resources' skill-set management and the stretch of their capability. This study is an examination of the effect of visualization and sharing of human resources information on the autonomy and flexibility of human resource management.
    Download PDF (259K)
  • NOBUO NUMANO
    Session ID: F1-2
    Published: 2007
    Released on J-STAGE: May 14, 2008
    CONFERENCE PROCEEDINGS FREE ACCESS
    Abstract:In this paper,I'd like to discuss the importance of IT control audits under Internal Control Reporting Systems, cases of doing IT control audits under Internal Control Reporting Systems, differences between current systems audits and IT control audits under Internal Control Reporting Systems, and finally the importance of systems audits in the information society.
    Download PDF (166K)
  • Yoshiaki Fukami, Hideaki Takeda, Ikki Ohmukai, Jiro Kokuryo
    Session ID: F1-3
    Published: 2007
    Released on J-STAGE: May 14, 2008
    CONFERENCE PROCEEDINGS FREE ACCESS
    More and more web services have allowed users to utilize metadata to organize and help finding contents on the web. Metadata especially used to classify contents are called "tags". "Social tagging" means activity of utilizing metadata generated other users. Social tagging and using other types of metadata have caused changes the process of information distribution on the web. In this paper, we illustrate features of these metadata and discuss the way to make use of them on the basis of user survey.
    Download PDF (174K)
  • With focusing on conflict among interested parties
    Akinobu Chiwaki, Yu Sakazume
    Session ID: F1-4
    Published: 2007
    Released on J-STAGE: May 14, 2008
    CONFERENCE PROCEEDINGS FREE ACCESS
    In this study, we pay attention to executives, a user, information systems division and a vendor as stakeholders about information system implementation. Between the stakeholders, we pay attention to the conflict of which a purpose does not always accord or recognition to the fact is different, and we analyze a failure cause of the information system introduction. On this basis, we clarify a prevention method for the failure of the information system implementation from the viewpoint of the information systems division.
    Download PDF (237K)
  • Naoyoshi SUZUKI, Miyuki AKUTAGAWA, Misa YAMAGAMI, Mai MORISHITA, Ayumi ...
    Session ID: F2-2
    Published: 2007
    Released on J-STAGE: May 14, 2008
    CONFERENCE PROCEEDINGS FREE ACCESS
    The authors have worked on a long-term business-academia collaboration project for three years in which university students have developed a software system for a large-scale sporting event. This study reports on the process and progress of this project. Questionnaire surveys and interviews were conducted in order to assess the effectiveness of the information education which the students received. Questionnaire surveys and interviews were also conducted in order to analyze the results of the project from the view point of collaborative organizations.
  • Hirokazu Akamatsu, Masahiro Arima, Kazuaki Tanno, Yasutada Hashimoto, ...
    Session ID: F3-2
    Published: 2007
    Released on J-STAGE: May 14, 2008
    CONFERENCE PROCEEDINGS FREE ACCESS
    In the age of group management, it is said that strengthening its role and conducting needed drastic change is important for general headquarters of group management corporation. However, whether the general headquarters has changed its structure to cope with group management or not is a big question. In this paper, we summarize the history of struggle made by functional divisions of general headquarters for change and propose some hypotheses on the relationship among CxOs who lead the change, information systems and corporate performance. Based on the hypotheses we made, we are planning to conduct corporate questionnaire survey this fall.
    Download PDF (397K)
  • Akinori Yokota, Kazuhiko Yasuda
    Session ID: F4-1
    Published: 2007
    Released on J-STAGE: May 14, 2008
    CONFERENCE PROCEEDINGS FREE ACCESS
    This study is focusing on the ERP (Enterprise Resource Planning) system which is one of the major information technology developments of the 1990s. Especially, this study is specialized in the maintenance tasks which are improvement and enhancement after system implementation. About 10 years have already passed since ERP system has been implemented or used in a many companies, and ERP system was improved and enhanced on various functions and subsystems. The purposes of this study are (1) to identify the system maintenance tasks in order to improve and enhance the enterprise system, and (2) to suggest "the enterprise system maturity model" related with maintenance tasks.
    Download PDF (144K)
  • Toshio SAITO
    Session ID: F4-2
    Published: 2007
    Released on J-STAGE: May 14, 2008
    CONFERENCE PROCEEDINGS FREE ACCESS
    Model theory approach is one of the formal methods for information systems development. This paper discusses how basic file operation in transaction processing systems is formulated and implemented by this approach and shows its effectiveness.
    Download PDF (169K)
  • Masashi ARINO, Tamotsu NOJI, Mamoru HIRAYAMA
    Session ID: F4-3
    Published: 2007
    Released on J-STAGE: May 14, 2008
    CONFERENCE PROCEEDINGS FREE ACCESS
    The matter about the P to P network which is a subject from precedence research is newly considered, and the authentic method by the certificate which used the encryption key as a technique aiming at prevention of diffusion on the P to P network towards a systems configuration is examined.
  • Hiroki Tomizawa, Tetsuya Uchiki
    Session ID: F4-4
    Published: 2007
    Released on J-STAGE: May 14, 2008
    CONFERENCE PROCEEDINGS FREE ACCESS
    The conventional systems design is based on the supposition that the operator maintain the computer system suitably. The user in that system design is the passive element that only enjoys the merit of the system. Though EUD is taken seriously and increased, almost people have little understanding a user's role for maintenance. As a result, even if a system is working in the early stages of the operation, many maintenance troubles arise soon. Therefore, the design method that can reflect these functions as user's roles on their needs is necessary. In this paper, we consider the suitability for the information system environments of the university education.
    Download PDF (77K)
  • Mitsuko Yamazaki
    Session ID: F5-2
    Published: 2007
    Released on J-STAGE: May 14, 2008
    CONFERENCE PROCEEDINGS FREE ACCESS
    Risk assessment is an important activity in risk management of information system operation and maintenance. However, in the survey of Japan Information Processing Development Corporation (JIPDEC) in 2005, 62.7% of companies that assessed their risks recognized the problem of risk assessment was methods had not been defined enough. As the survey illustrates, loss and probability estimation are difficult at risk management of information system operation and maintenance. This study discusses about loss estimation at risk management of information system operation and maintenance based on the incident's loss calculation model at information security that was proposed by Japan Network Security Association (JNSA).
  • Masayuki Goto, Shigeyuki Harada, Wataru Tanabe
    Session ID: G1-3
    Published: 2007
    Released on J-STAGE: May 14, 2008
    CONFERENCE PROCEEDINGS FREE ACCESS
    It is effective to refer the cases of strategies which were successful in the other companies in the company management. In this paper, the concept of analogy between the strategy cases is introduced and the new method is proposed to search the best case which is similar to the situation facing to a company. Concretely, the structural criteria to measure the analogy between the strategy cases are constructed from a set of practical cases by considering the SWOT analysis and other concepts known in the area of corporate strategy theory. It can be regarded as a strategy data base and it is shown that the mapping of strategies can be visualized. The analysis of the strategy cases by using proposed model gives us useful aspects.
    Download PDF (383K)
  • Masaru Sakamoto, Hiroyuki Ogura
    Session ID: G2-2
    Published: 2007
    Released on J-STAGE: May 14, 2008
    CONFERENCE PROCEEDINGS FREE ACCESS
    Japanese Economic Growth is maturing and a new goal is needed. There are problems of health care, pension and welfare. The achievement of "Sustainable social Secure" is a new goal. The pension, health care, and education are the independent systems in the institutions of Japan. These systems are needed to be linked. The integration of information in different systems should be developed. THE accessibility of information for the people should be proceeded and the networks should be developed. Now Social-Secure Card project start to solve these problems. In this project the role of regional networks are important. We analyze problems and propose a new approach based on Asymmetric-Information Theory.
    Download PDF (262K)
  • Identity around Local Production in Consumption Place
    nobuko Inagaki
    Session ID: G2-3
    Published: 2007
    Released on J-STAGE: May 14, 2008
    CONFERENCE PROCEEDINGS FREE ACCESS
    Recently in home health care industry we would focus on local firms' activities in city areas. There may be not only economic rationality but personal and regional identity working and shared. I take data available of two districts in Yokohama city in 2006 to analyze active small capitals, to find some points.
    Download PDF (154K)
  • Takashi Namatame
    Session ID: G3-1
    Published: 2007
    Released on J-STAGE: May 14, 2008
    CONFERENCE PROCEEDINGS FREE ACCESS
    The Japanese life insurance faces various changes of circumstance, e.g. deregulation of finance or revitalizationof Japan post. So, the future market seems vary unceitainty. For these drastic changes, it seems that the ordinal estimation method cannot work to estimate the future market. In this study, we attempt to estimate the Japanese life insurance market by using the concept of multi agent simulation.
  • RYO SATO
    Session ID: G5-1
    Published: 2007
    Released on J-STAGE: May 14, 2008
    CONFERENCE PROCEEDINGS FREE ACCESS
    After considering service delivery process and service infrastructure, we characterize the service process. The processes are classified into three groups: value-adding process, enabling process, and support process, according to Harvey(2005). The innovation architecture for service (service IA)is proposed and applied for a newly started railway company, called the Tukuba express. It is turned out that the service IA is a tool for intelligence of service innovation strategy formulation. Based on the consideration above, we examine possible application of business process engineering to service innovation.
    Download PDF (366K)
  • Ryuichi IMAI, Ryosuke SHIBASAKI, Satoshi UEYAMA, Fumihiko KANAZAWA
    Session ID: G5-2
    Published: 2007
    Released on J-STAGE: May 14, 2008
    CONFERENCE PROCEEDINGS FREE ACCESS
    Analysis of the problems by the present business process model is important work. However, the problem is analyzed according to the hearing investigation to the domain engineer, the analysis person's experience, and the capability. Therefore, realization of the support measures to discover a problem is expected by the business process model. This study is aimed for suggestion of a method to effective utilization of the business process model. Therefore, we made the template which included the key to discover a classic problem from the business process model.
    Download PDF (312K)
  • Takeshi Kosaka
    Session ID: G5-3
    Published: 2007
    Released on J-STAGE: May 14, 2008
    CONFERENCE PROCEEDINGS FREE ACCESS
    The development of information systems is becoming an organizational change. Rich findings on organizational changes have been accumulated. It is examined with the use of IS development examples that the findings are slightly used in IS development. We will show the possible effectiveness of Activity Theory for bridging a gulf between IS development and Organization Development as a methodology of organizational change.
    Download PDF (394K)
  • Takashi INOUE, Amane SUGINO, Borworn MOROE
    Session ID: H2-1
    Published: 2007
    Released on J-STAGE: May 14, 2008
    CONFERENCE PROCEEDINGS FREE ACCESS
    This does a share of the layout of one multifamily housing with two or three people, and it is the lease space that it is cheaper than the wage charges of the market, and it can borrow. They begin to use it in this space. The landladies live together and can reduce housing expenses burden and can profit as a lease business as an owner. I am cheap, and the tenant can have a comfortable house and address. I redecorate the multifamily housing that this "guest house" is considerably old, and is cheap, and it is good to inflect. It is one of the charms to get off with little investment. By this report, I consider unfolding method of the "guest house" business as the solution of the one of these social problems.
  • Elica Miwa
    Session ID: H2-3
    Published: 2007
    Released on J-STAGE: May 14, 2008
    CONFERENCE PROCEEDINGS FREE ACCESS
    The Alexander Technique is a way of body control, introduced and developed by an Australian actor about a hundred years ago. It is a technique to use and manage one's own body without tension nor waste, but naturally, powerfully and freely. It has already been well known to actors, singers, and musical instrumental players in Europe and America, and is now wide spreading among top managers of various organizations, and therapists and teachers. This is an occasion to take a look into this system of which basic function leads to develop potential powers of human abilities by physical relaxation and coordination, and how it could work as better communication skills.
  • Yukimasa OZAWA, Kazuo MUKAI
    Session ID: H4-1
    Published: 2007
    Released on J-STAGE: May 14, 2008
    CONFERENCE PROCEEDINGS FREE ACCESS
    JASMIN has established a special society for the "Study of Information Systems History (ISH Study) in Japan" in 2007. This paper describes the outline of ISH Study, and then provides overviews of the history of Information Technologies and Information Systems in Japan.
    Download PDF (52K)
  • Takanobu Nakahara, Hiroyuki Morita, Tomohiro Yoneda
    Session ID: H5-1
    Published: 2007
    Released on J-STAGE: May 14, 2008
    CONFERENCE PROCEEDINGS FREE ACCESS
    In recent years, e-commerce users have increased rapidly with an increase in Internet users. Therefore, the Internet has become an important marketing tool for companies. Website design and Web browsing analysis are very important to attract users toward corporate sites. In our study, we transform the access log data into a directed graph and extract the main structure from it by using graph reduction method. Thereafter, we extract promising patterns from the main structure by using the MOEA. The main structure expresses the relationship among the pages that are browsed by many users. Additionally, by using patterns that obtained from the main structure, we can implement some sales promotions. We show our method is more useful in practical business application.
    Download PDF (115K)
  • Applying to semantic differential data
    Keiichi Hayakawa, kazuo Takamine, Fumiyasu Yamada
    Session ID: H5-2
    Published: 2007
    Released on J-STAGE: May 14, 2008
    CONFERENCE PROCEEDINGS FREE ACCESS
    In this paper, we proposed a method to distinguish defective responses from a questionnaire data on the basis of internal consistency of responses. In general, several questions in a questionnaire relate each other, so higher correlation coefficients are observed among them. However in the case of defective responses, the coefficients may be lower because of lack of internal consistency among responses. In the method proposed, we focus on correlation coefficients calculated for each respondent and compare them among respondents so as to identify defective respondents from normal ones. Applying our method to semantic differential data, we could appropriately distinguish several respondents considered to be defective.
    Download PDF (90K)
  • Shinya Nishimura, Naokazu Yamaki, Eizo Takai
    Session ID: I1-1
    Published: 2007
    Released on J-STAGE: May 14, 2008
    CONFERENCE PROCEEDINGS FREE ACCESS
    A building a house company performs plural projects in simultaneous parallel. Each project makes ends meet from various work. In addition, a resource of various roles is necessary to work. In addition, there are work and the work that a resource can do. In consideration of these, the scheduling that was decided "which work" of "which project" "when" / "who" performs is necessary. Therefore, in this study, I suggest elucidation as a limitation supplement problem for Resource Constrained Project Scheduling Problem for housing construction projects.
  • Hiroyuki MORITA, Tomonori ISHIGAKI, Takanobu NAKAHARA
    Session ID: I1-2
    Published: 2007
    Released on J-STAGE: May 14, 2008
    CONFERENCE PROCEEDINGS FREE ACCESS
    Sales promotion based on cash discounts is one of the important marketing tools for retail stores. The progress of IT has enabled easy accumulation of POS data. However, it is difficult to estimate the effects. Because the number of items handled is huge, and their relationships are so complex, even if it is a small store. In addition, it is difficult to optimize a combination of discount items and their price. In our study, we propose a method which provides an optimal pricing strategy. From computational experiments using certain practical POS data, we show that our method has good performance.
    Download PDF (320K)
feedback
Top