Abstracts of Annual Conference of Japan Society for Management Information
Annual Conference of Japan Society for Management Information 2011 Autumn
Displaying 51-97 of 97 articles from this issue
  • Shinji Watanabe
    Session ID: E1-2
    Published: 2011
    Released on J-STAGE: December 01, 2011
    CONFERENCE PROCEEDINGS FREE ACCESS
    The purpose of this paper is to analyze whether the consensus building between the information system sector and the user sector influences the satisfaction rating of the user sector. If the consensus building between the information system sector and the use sector doesn't function well, a final IT effect of the user sector cannot be expected. The WEB questionnaire data for about 10,000 people of Kanto-Kinki region executed in February 2010 was used for the analysis. I used the level of the hearing from user sector when the new information system introduced as the consensus index. It turns out that the enterprise with an insufficient consensus building had the negative effects on the IT satisfaction rating and the job satisfaction rating.
    Download PDF (286K)
  • Masaaki HIRANO
    Session ID: E1-3
    Published: 2011
    Released on J-STAGE: December 01, 2011
    CONFERENCE PROCEEDINGS FREE ACCESS
    The author has demonstrated that the level of IT investment is not correlated with the level of organisational IQ based on the empirical data of Japanese firms. When the relationship is assumed as causal, the former being the independent variable while the latter the dependent, however, the variance will be considered to be large. Thus some firms obtaining extremely good returns from their IT investments in terms of improve organisational IQ. The article speculates on how to improve the organisational IQ via IT investments.
    Download PDF (678K)
  • Shuhei KUDO, Kazuhiko YASUDA
    Session ID: E1-4
    Published: 2011
    Released on J-STAGE: December 01, 2011
    CONFERENCE PROCEEDINGS FREE ACCESS
    The purpose of this study is to propose Strategic Information Technology (IT) Portfolio Management System supporting IT investment for achieving a firm's competitive advantage. IT portfolio research has been conducted in terms of four research perspectives. This study focues on IT investment portfolio model research. Four categories of IT (Function IT, Network IT, Offensive Enterprise IT, and Defensive Enterprise IT) are proposed. These four categories make up the IT investment portfolio model. The four IT categories are fundamentally different in the light of business-IT alignment. The IT investment portfolio model is a foundation for evaluating and comparing IT investment projects. IT project portfolio model is developled based on the IT investment portfolio model.
    Download PDF (93K)
  • Shin-ichi Sato, Takehiro Inohara
    Session ID: E2-1
    Published: 2011
    Released on J-STAGE: December 01, 2011
    CONFERENCE PROCEEDINGS FREE ACCESS
    With growing interests about ultra-upper process in software development, BABOK, which is proposed by IIBA, have attracted attention as road maps for holding it together. However, BABOK gives only road maps, and concrete methods to achieve them depends on analysts. In this paper, requirements that are one of the various road maps given by BABOK are focused on, and a result comparing with features between four requirements defined in BABOK and a combining method having proposed by authors is described. In the result, it was found that each requirements in BABOK can be elicited by it, and it is useful as a concrete method to elicit requirements defined in BABOK.
    Download PDF (260K)
  • Koki Yodokawa, Masaaki Hirano
    Session ID: E2-2
    Published: 2011
    Released on J-STAGE: December 01, 2011
    CONFERENCE PROCEEDINGS FREE ACCESS
    IT has evolved from a means of automating business process and improving business efficiency to tools for communication, collaboration, and trial and error activities in digital form. In order to enhance a series of intellectual activities conducted by an organization,i.e.,'find ,explore,measure,analyze,try,judge,implement and use,'enterprises must full use of this IT power. In this article, I develop the model of the stages of intellectual activities, select the candidates of IT tools that can support each stage, and conduct a survey on utilization and effectiveness of these IT tools. From the survey results, I divide these IT tools into four groups such as widespread, expected, advanced, and future.
    Download PDF (134K)
  • A Case Study of the West Japan Railway Accident on the Fukuchiyama Line
    Muneyuki Fujii, Makoto Ichimiya
    Session ID: E2-3
    Published: 2011
    Released on J-STAGE: December 01, 2011
    CONFERENCE PROCEEDINGS FREE ACCESS
    The railway accidents don't have been eliminated in the world. In addition, the public regard as the response of after the accident. We think that this accident's causes are not only merely safety measures but also the organizational management. In the announcement, we take up the JR accidents on the Fukuchiyama Line. And we clarify the system error which the context of the accident. And, we come out about a problem of the management in JR west as compared with the other railway companies. Furthermore we consider structural inertia behind the organization. Finally, we retroacted about CSR of the JR West, and we propose the management system of the organizations in the future.
    Download PDF (414K)
  • Systems Approach Re-examined
    shoei komatsu
    Session ID: E2-4
    Published: 2011
    Released on J-STAGE: December 01, 2011
    CONFERENCE PROCEEDINGS FREE ACCESS
    Systems approach has been generally discussed on modeling the concerned system, but rarely on the process and organization to implement the system from start to finish. Also, it has been rarely done to evaluate the system performance and to feed back the evaluation results to form the management cycle. Furthermore, the concerned system itself has been also discussed without distinction between technical systems and social systems including its technical system. Then, the systems approach is re-examined as for the enterprise system regarded as a social system.
    Download PDF (56K)
  • Mikako Ogawa
    Session ID: E3-1
    Published: 2011
    Released on J-STAGE: December 01, 2011
    CONFERENCE PROCEEDINGS FREE ACCESS
    Many prefectures in Tohoku and Kanto districts suffered badly from the Great East Japan Earthquake on March 11, 2011. The Food Industry is no exception. The intent of this research is to clarify the initial damages and the current situation to examine countermeasures against disaster from the viewpoint of risk management and risk communication. In August 2011, we visited 2 food companies, which are located Aomori prefecture and Iwate Prefecture, to conduct interviews and to observe factories. In this paper, real damages and countermeasures of these companies are reported. For example, for these 2 food companies, unexpected 3-day electrical outage and several-weeks shutoff of transportation network gave severe impacts on food production process.
    Download PDF (340K)
  • Tamaki Masumitsu, Kazuhiko Yasuda
    Session ID: E3-2
    Published: 2011
    Released on J-STAGE: December 01, 2011
    CONFERENCE PROCEEDINGS FREE ACCESS
    The Great Japan Earthquake which occurred on March 11, 2011 brought destructive damage to the Miyagi area along the shore, and stopped the business operations of the companies. It is still in a restorative stage even now when half a year has passed. Based on such a situation, domestic IT companies provides various restoration support services. In this research, we show the information about the main restoration support services provided for the suffered companies. It is very useful to perform information service of a restoration support service for the suffered companies.
    Download PDF (267K)
  • Tamaki Masumitsu
    Session ID: E3-3
    Published: 2011
    Released on J-STAGE: December 01, 2011
    CONFERENCE PROCEEDINGS FREE ACCESS
    The great earthquake of M9.0 and huge TSUNAMI attacked East Japan at 14:46 on March 11, 2011. The Internet communication contractor's base station, and equipment of an electric power company, etc. flowed out and sank. Therefore, communication was intercepted completely in Ishinomaki city. Ishinomaki Senshu University also suffered the damage which does not have experience in the past. In this research, I report the disaster situation and repair work in the Ishinomaki Senshu University Information and Communication Technology Center (ICTC). Moreover, I clarify also about issues of ICTC under The Great East Japan Earthquake.
    Download PDF (442K)
  • Kazunori Ueda, Ryousuke Fujimoto
    Session ID: E3-4
    Published: 2011
    Released on J-STAGE: December 01, 2011
    CONFERENCE PROCEEDINGS FREE ACCESS
    After the East Japan earthquake, there are many supports which are manpower, material, and economic aid from the whole of Japan and overseas. However, it is said that support is not enough for victims, for example, the mismatch of the supply and demand of material supports, the distribution of the contribution delays, and unbalance of the manpower. In this report, firstly, we clarified the networking of support about the stricken area, and compare this case and 'Hanshin earthquake'. Secondly, we focused organizational networking and cooperative support. Finally, we refer to necessity of sustainable support that considered about radioactive contamination of Fukushima nuclear disaster.
    Download PDF (273K)
  • Agency Theory Aproach
    Yasuhiro Yamada
    Session ID: E4-1
    Published: 2011
    Released on J-STAGE: December 01, 2011
    CONFERENCE PROCEEDINGS FREE ACCESS
    When workers are paid salary from organization, inequity with other workers arises naturally. Because inequity aversion preference may significantly affect policy and contracting decisions, it is important to analyze impact of the attitudes of workers toward inequity on contracting issues. This paper aims at obtaining new theoretical insights by combing the standard moral hazard model of principal-agent relationship with theories of inequity averse preferences, in particular, inequity which exists when worker compares with ratio of the outcome to the inputs with the ratio of other's outcome to the inputs. Then we try to answer a research question ''what is the best incentive system for principal''.
    Download PDF (213K)
  • An analysis by agent-based approach
    takaya choshitani, naoki shiba, toshio saito
    Session ID: E4-2
    Published: 2011
    Released on J-STAGE: December 01, 2011
    CONFERENCE PROCEEDINGS FREE ACCESS
    There is a social dilemma in workplace regarding the contribution to a organization. Each workplace consisting of many workers, constructs each company. The society is evolved by the competition of many companies.
    This paper offers a new model and helps to solve the free rider problem. The model consists of two-levels, workplace level that is modeled as a set of N-person games and social level that is in higher level than workplace.
    Workers are given some strategies and the natural selection is carried out in workplace level. Similarly, companies are given some performance appraisal methods and the natural selection is also carried out in social level.We analyze the relationship between performance appraisal methods and strategies.
    Download PDF (285K)
  • Yurie Honna, Chunhui Xu, Motoi Iwashita
    Session ID: E4-3
    Published: 2011
    Released on J-STAGE: December 01, 2011
    CONFERENCE PROCEEDINGS FREE ACCESS
    It is widely accepted that reward of workers should be linked with their contribution, and properly linking reward with contribution is not an easy work. This research takes university teachers as the research target, by comparing the reward and evalution systems in Japan and China, we aim at making clear their drawback and advantage, and proposing improvement suggestions.
    Download PDF (28K)
  • Consideration on Case Studies
    Kumiko YOKOI
    Session ID: F1-1
    Published: 2011
    Released on J-STAGE: December 01, 2011
    CONFERENCE PROCEEDINGS FREE ACCESS
    There are many start-up companies which have been founded by founders with a strong technological or craftsmanship orientation. By definition, whose companies are to strive for continuous innovation and compete with the technological strength in the market. In this presentation, I introduce a few examples of this kind of companies and discuss the types of innovations they have made.
    Download PDF (161K)
  • Katsuhiro Suzuki, Junichi Sakata, Jun Hosoya
    Session ID: F1-2
    Published: 2011
    Released on J-STAGE: December 01, 2011
    CONFERENCE PROCEEDINGS FREE ACCESS
    Since late 90's, academic-industrial alliances have been intensified. In this study, we turn our attention on patents filed by firms which contain joint inventions between firms and universities. Indeed, since most important outcomes of joint researches are considered to be transferred to firms from universities before they are filed. We investigate the life-cycles of such patents to verify their importance quantitatively.
    Download PDF (539K)
  • Ken-ichi AIHARA, Kazue SATO
    Session ID: F1-3
    Published: 2011
    Released on J-STAGE: December 01, 2011
    CONFERENCE PROCEEDINGS FREE ACCESS
    This paper discusses on social innovation design approach understanding of value bridging between whole and parts. First, existing research results are outlined in various eight points. Next, social dilemmas emerged in Japan and social design goals are analyzed. Finally, a dialectic approach to design social innovation with resilience is provided and demonstrated by a typical example.
    Download PDF (252K)
  • Foundamental provlem in service iinovation
    Ryo Sato
    Session ID: F1-4
    Published: 2011
    Released on J-STAGE: December 01, 2011
    CONFERENCE PROCEEDINGS FREE ACCESS
    The big challenge for service-program oriented society is to develop appropriate methodology and theory. It is also a challenge for management information. A practical approach to the challenge is to use a methodology service innovation strategy formulation. This paper tries to consider theory for service-providing process. Since the complete theory is not clear yet, we first observe conflict between things and information that is common in service-program oriented society. MRP and Kanban will be considered as typical examples of such conflict.
    Download PDF (348K)
  • Andrew Adams
    Session ID: F2-1
    Published: 2011
    Released on J-STAGE: December 01, 2011
    CONFERENCE PROCEEDINGS FREE ACCESS
    An overview of types of social networking site is presented, along with some of the issues they raise with respect to a balance between the rights and expectations of the individual and those of organisations to which they belong as members or as employees.
    Download PDF (39K)
  • HITOSHI OKADA, TAKAAKI KAMOGAWA
    Session ID: F2-2
    Published: 2011
    Released on J-STAGE: December 01, 2011
    CONFERENCE PROCEEDINGS FREE ACCESS
    In recent years, the money exchange method known as electronic money is getting popular. Once widely distributed in society, the risk of invasion of privacy is caused by spills and abuse of personal data stored in electronic money. However, if you provide personal information to the electronic money, you can get it more convenient. This paper thus presents the result of conjoint analysis in terms of trade off between privacy and convenience by electronic money.
    Download PDF (237K)
  • Hajime Saito, Takeshi Hiromatsu
    Session ID: F2-3
    Published: 2011
    Released on J-STAGE: December 01, 2011
    CONFERENCE PROCEEDINGS FREE ACCESS
    Many of information security measures are technical ones, and today even small and medium-sized enterprises adopt such measures. However, it is also true that human error is one of the most important fact for information security measures. In this paper, factors of incidents are classified based on investigation on statistics related to the information security incidents in Japan. By making use of this classification including human error factor we build cognitive map of information security and clarify factors of information security incidents.
    Download PDF (369K)
  • The Representation of Responsiblity for Customer Information Leak
    Kazuki TAKADA
    Session ID: F2-4
    Published: 2011
    Released on J-STAGE: December 01, 2011
    CONFERENCE PROCEEDINGS FREE ACCESS
    On April 2011, it has come to light that personal information over 77million users was leaked from the server of an amusement company. Who is responsible for that?
    The purpose of the report is to examine the development of the concept of responsibility, forcing on the power of analogy. The useful analogies play a leading role to provide a general background to the incident and explore several allocations of responsibility for information control; though, it is unable to adopt an underlying reasoning.
    The report concludes that the concept of responsibility is based on an ethical imagination, which possesses a main attribute for prompt action (imputability) on the information management.
    Download PDF (463K)
  • Tomoyuki MIKAMI, Naoki SHIBA, Toshio SAITO
    Session ID: F3-1
    Published: 2011
    Released on J-STAGE: December 01, 2011
    CONFERENCE PROCEEDINGS FREE ACCESS
    User reviews on Web sites offer the product evaluation by consumers' view point which is different from providers' view point. However, thier contents are the mixture of good and bad ones because reviews with less credibility by the stealth marketing might lurk in them. Then, the purpose of this study is to support credibility judgment of user review, focusing on reviews by the stealth marketing. The text mining technique is used for finding reviews by the stealth marketing. It has the possibility to detects the tendency of unnatural reviews from the correlation between time and the appearance of key words. As a result, a new material to judge the user review credibility is offered.
    Download PDF (495K)
  • Takayuki Murai, Yoshimi Chujo, Eunjee Park, Toshiyuki Maeda
    Session ID: F3-2
    Published: 2011
    Released on J-STAGE: December 01, 2011
    CONFERENCE PROCEEDINGS FREE ACCESS
    This study extracts common words characterizing independent environmental reports of Japanese firms which also disclose the environmental conservation costs in the reports, and examines the relation between such common words and the amount of environmental conservation costs. The result shows that the common words associated with the firms group, which expends more for environmental conservation activities, generally relate to 'CSR' or 'pollution problem', whereas those for the firms with relatively small expenditure relate to 'market' or 'customer satisfaction'.
    Download PDF (274K)
  • MAO NISHIGUCHI, HIROYUKI MORITA
    Session ID: F3-3
    Published: 2011
    Released on J-STAGE: December 01, 2011
    CONFERENCE PROCEEDINGS FREE ACCESS
    Here we propose a predictive model that identifies customers who switches their brand loyalty. Our basic idea is that enumerates emerging sequential patterns and classifies customers by "CAESP". In our experiments, we select a target brand and its competitive brand, and express their discount price and a gap between them by some categories. By doing this, it can be shown not only a brand selection, but also a condition of selecting the brand. In addition to this, we introduce some taxonomy for the item. From our computational results using a practical POS data, we show that our method has good performance for the data.
    Download PDF (468K)
  • Hiroki Kataoka, Hiroyuki MORITA
    Session ID: F3-4
    Published: 2011
    Released on J-STAGE: December 01, 2011
    CONFERENCE PROCEEDINGS FREE ACCESS
    In this paper, we propose an unsupervised learning algorithm to predict an anomaly detection which loyal customers lose their loyalty. A flow of our method is that finds characteristic items for loyal customers, enumerates sequential item patterns from their historical purchasing data, and expresses normal or abnormal state for the sequential patterns as a score. Then for each customer, total score is calculated as a difference between aggregated normal and abnormal scores which the customer has. When the total score is minus, we detect an anomaly. From some computational experiments using a practical POS data, we show that our method is suitable for practical use.
    Download PDF (2434K)
  • Hiroshi Takahashi
    Session ID: G1-1
    Published: 2011
    Released on J-STAGE: December 01, 2011
    CONFERENCE PROCEEDINGS FREE ACCESS
    Despite higher levels of R&D investment, Japanese companies continue to have lower IT investments than other advanced countries. Some attribute this to the low productivity growth rate and "the lost decade". Therefore, this paper studied the differences between the IT investments in Japan and the USA by accessing an open database to show the reason for these phenomena. As a result, there were typical differences especially about the usage patterns of software investment between Japan-USA IT investments. This suggests that the rapid change emerged during IT-evolution age and Japan could not catch up the new trends. So, this study sets the hypotheses based on the findings and clarifies the mechanism to generate these differences through the verification processes of the hypotheses.
    Download PDF (669K)
  • Masato Yotsumoto, Thomas Taro Lennerfors, Takashi Majima
    Session ID: G1-2
    Published: 2011
    Released on J-STAGE: December 01, 2011
    CONFERENCE PROCEEDINGS FREE ACCESS
    Today, in a situation where global requirements of sustainability are high, and where sustainability and energy use has received renewed interest because of the Great East Japan Earthquake, we address one of the sustainability efforts that Japanese companies are doing - namely Green IT.
    Basically, Green IT means to reduce environmental impact by using IT, and reduce the environmental impact of IT as such. In the U.S. and Europe, Green IT is gaining speed, but might it be the case that Japan is lagging behind?
    In this presentation, we present the current state of Green IT in Japan and situate it in a global context, while discussing its importance for the future.
    Download PDF (203K)
  • :An Interview with i-Mode Developer
    Mikako Ogawa, Donald L. Amoroso
    Session ID: G1-3
    Published: 2011
    Released on J-STAGE: December 01, 2011
    CONFERENCE PROCEEDINGS FREE ACCESS
    The goal of this research is to examine the factors of success with Japan's mobile industry to develop the ecosystem research model. Takeshi Natsuno, former senior vice president of NTT DoCoMo and developer of i-Mode, discussed with us that a clear and huge investment in i-Mode and e-payment technologies created the initial mobile ecosystem in 1999 in Japan. The ecosystem defined by Mr.Natsuno as a collection of roles in a collaborative balance has been established. We concluded in this research that risk-taking was the predominant factor influencing the success of the mobile ecosystem in Japan. NTT DoCoMo was the major risk-taker in Japan during this time and other players, such as mobile phone manufacturers or contents providers, could participate with little risk.
    Download PDF (701K)
  • Iori Matsuura, Shoichi Morimoto
    Session ID: G1-4
    Published: 2011
    Released on J-STAGE: December 01, 2011
    CONFERENCE PROCEEDINGS FREE ACCESS
    In Japan, e-books have been becoming popular and their market has been growing for the last years. There are two types of the reader; a special device for e-books and a software application in a general device. The former is popular for e-books reading worldwide. However, the e-reader has not generally been accepted in Japan, because there are not still enough Japanese contents for the e-reader. It is also caused by the difference of the publishing culture and attitude toward e-books between Japan and the others. In this paper, we survey the difference and Japanese e-book market and discuss a means to recognize the e-reader as a general tool of e-books reading.
    Download PDF (526K)
  • Shogo Suzuki
    Session ID: G2-1
    Published: 2011
    Released on J-STAGE: December 01, 2011
    CONFERENCE PROCEEDINGS FREE ACCESS
    Mirror has been a beloved tool since ancient times due to the compelling function of realtime visual reflection. We focus on mirror's latent ability which influences human mental aspects as well as physical one. Our research goal is to clarify the influence of realtime visual information on human mentality. We build two types of prototypes, Digital mirror which serves realtime visual information and Mobile application which does not serve the one but has high intimacy with us. We validate how the realtime visual information give an impact on human mentality through user test with the prototypes.
    Download PDF (1168K)
  • : Is There a Difference?
    Donald L. Amoroso, Naruyo Matsuoka Amoroso, ORITA Akiko
    Session ID: G2-2
    Published: 2011
    Released on J-STAGE: December 01, 2011
    CONFERENCE PROCEEDINGS FREE ACCESS
    It appears that culture in the United States has an impact on the use of social media, as different from Japan. We hypothesized that the use of social media included age, comfort with social media, time spent communicating, number of friends, and when and where users check on social media. Data was collected from 71 respondents with approximately 34% Japanese-born and 66% were American-born. It was found that younger social media users tended to have more friends and check on their social media during work and at school more regularly. More Japanese-born users stated that they "never" checked on social media during work or class. Older respondents appeared to be as comfortable as younger respondents in using social media.
    Download PDF (529K)
  • Survey on Hatsugen-Komachi 2 : Attitude towards Real-name, Pseudonym and Anonymity
    Akiko Orita, Asako Miura
    Session ID: G2-3
    Published: 2011
    Released on J-STAGE: December 01, 2011
    CONFERENCE PROCEEDINGS FREE ACCESS
    This paper reports how users of online community represent themselves based on our survey on Hatsugen Komachi by Yomiuri Online. Users in Japan tend to conceal their real name then use pseudonym instead, but they seem unconscious to be revealed their real identity by information linkable to their nickname. According to our survey, users like to separate their online identity from real life and active users showed tendency to change their nicknames by sessions.
    Download PDF (560K)
  • An estimation with panel data
    Atsushi Inuzuka, Toshiya Watanabe
    Session ID: G3-1
    Published: 2011
    Released on J-STAGE: December 01, 2011
    CONFERENCE PROCEEDINGS FREE ACCESS
    Since most of the network analyses ignore the effect of actors' entry-timing to its networks, the estimation of network effect may be biased. In this paper, the authors abstract co-invention networks in chronological order and estimated the real network effect with panel data. The analysis revealed that the factors which facilitated the professional capability were direct and indirect relationships in networks.
    Download PDF (261K)
  • Yoshito Matsudaira
    Session ID: G3-2
    Published: 2011
    Released on J-STAGE: December 01, 2011
    CONFERENCE PROCEEDINGS FREE ACCESS
    This paper clarifies the limit of the behavioural theory of leadership towards studying the substance of leadership managing and enabling knowledge creating process (Nonaka and Takeuchi, 1995). Firstly, this paper commences with a review of literature on the behavioural theory of leadership. Secondly, the location of problems of behavioural theory is explained. Finally, this research shows the direction of future research on leadership in the context of knowledge-based management.
    Download PDF (281K)
  • Tsuneki Mukahi
    Session ID: G3-3
    Published: 2011
    Released on J-STAGE: December 01, 2011
    CONFERENCE PROCEEDINGS FREE ACCESS
    While some researchers mention that trust enhances information and knowledge sharing, others have the opposite idea, i.e., that information and knowledge sharing enhances trust. Based on information sharing theory, this study discusses what kind of information should be shared for trust formation and how organization should share the information. According to the discussion, it is encouraged that managers give information about open mindness to employees in order to avoid organizational inertia.
    Download PDF (250K)
  • Masaki Okui
    Session ID: G3-4
    Published: 2011
    Released on J-STAGE: December 01, 2011
    CONFERENCE PROCEEDINGS FREE ACCESS
    In this research, we focus on the middle managers' of Japanese software firms, and we discuss on their styles of communication (context pattern) in their offices. Based on the result of the questionnaire survey, we attempt to examine that their styles of communication are different depending upon groups of job or duty position to which they belong.
    Download PDF (405K)
  • Based on the research in Matsuyama University and Ehime University
    Taro Kumagai, Nobuyuki Soga, Keiichirou Nishio, Takashi Okamoto
    Session ID: H1-1
    Published: 2011
    Released on J-STAGE: December 01, 2011
    CONFERENCE PROCEEDINGS FREE ACCESS
    Since many university students are faced with severe employment conditions, attentions have gathered for the career education of the university. The researches on occupational attitudes are not enough. In this article, we show local university students' attitudes for occupation and their characteristics. We will contribute career education programs which matched the students' actual condition.
    Download PDF (188K)
  • involves analysis about the "Information Study" in high school curriculum
    Kazuo TERASHIMA, Toshitaka KOIKE, Keisuke NOMA
    Session ID: H1-2
    Published: 2011
    Released on J-STAGE: December 01, 2011
    CONFERENCE PROCEEDINGS FREE ACCESS
    It is expected that many freshmen of university who are growing up in the information-oriented society have already acquired basic computer skills before they enter the university. However their skills related to the office-type software are ranging widely, so it is desirable improving such situation as early as possible after their entering university. Faculty of Business Administration of Ryukoku University has been trying a new approach from 2008 to improve such conditions. Our research aims to clear the effects of that trial, finally. In this paper, we especially focus on subject "Information Study" at high school from some points of view, as a first step. We also examine the relation between the feature of learning information at high school and the skills required in our faculty.
    Download PDF (883K)
  • Masahiko Ishino, Shota Ueda, Tsukasa Kudo, Kenji Saotoma
    Session ID: H1-3
    Published: 2011
    Released on J-STAGE: December 01, 2011
    CONFERENCE PROCEEDINGS FREE ACCESS
    In university of science and technology, we plan the improvement to more effective class method in education about the construction of the information system now. We adopt the interactive communication method of teacher and student using interactive education apparatus for a training method and collaborative learning such as programming or the systems architecture and suggest it about the improvement of the education method. Furthermore, we suggest effective collaborative learning and an interactive learning method to the presentation screen of the projector by the handwriting of wireless electronic stylus by the practice of the student and comment and the class questionnaire of the teacher.
    Download PDF (1228K)
  • An experience of conducting classes at a state university in the US
    Akiko Orita, Atsushi Yoshikawa, takao Terano
    Session ID: H1-4
    Published: 2011
    Released on J-STAGE: December 01, 2011
    CONFERENCE PROCEEDINGS FREE ACCESS
    This paper reports our classes conducted with MANGA-case for business learning. As a visiting faculty of State University in US, where "learner-centered"way is required rather than "teacher-centered", the author designed courses including MANGA-case discussions. The author conducted three courses in Department of Information Systems, including "Information Resource Management" for undergraduate students. Their backgrounds are various. MANGA, as drawings played a role to share common understandings in the classroom rather than written description.
    Download PDF (575K)
  • YOSHIKI NAKAMURA
    Session ID: H2-1
    Published: 2011
    Released on J-STAGE: December 01, 2011
    CONFERENCE PROCEEDINGS FREE ACCESS
    In the era of the Web2.0, it has changed the way of the enterprise advertising. Therefore, in this study, it pays attention to the "word-of-mouth" from the consumers. Concretely, focus on the cosmetic sites, it has been analyzed and considered whether the WOM will be influence to the sales, and how long the time lag will be between WOM and sales. From this research, it must be shown the example of an efficient and effective Internet advertising strategy for the company. Website analysis
    Download PDF (288K)
  • Hideaki Kitanaka, Akira Suzuki, Shigeru Kido, Jinya Nakamura
    Session ID: H2-2
    Published: 2011
    Released on J-STAGE: December 01, 2011
    CONFERENCE PROCEEDINGS FREE ACCESS
    The 2011 Tohoku earthquake and tsunami brought about serious damages to various fields in Japan, and TV advertisements was one of them. After the disaster, many companies imposed voluntary restrictions on TV advertising. Due to the actions, the amount of TV commercials broadcasted in March was reduced drastically against previous year. Consequently, consumers' exposures to TV commercials were limited substantially. In this study, we examined the relationship between the patterns of placing TV commercials before and after the disaster and consumers' recall of TV commercials using the empirical data obtained by our Web survey.
    Download PDF (382K)
  • Yoshikazu Sakamaki
    Session ID: H2-4
    Published: 2011
    Released on J-STAGE: December 01, 2011
    CONFERENCE PROCEEDINGS FREE ACCESS
    Mobile phone carriers develop various marketing strategies to hold good customers, for example, by discounting service charge drastically or delivering discount coupon ticket for long-term users. But they have not stop outflowing customers perfectly yet. By the way, mobile phone carriers have various types of transaction data on their database, but it is also fact that they cannot fully use those data yet because those data is vast and computer resource available to data analysis is limited. In this study, we pay attention to search word put into search engine and propose the way of forecasting cancellation of mobile phone contract based on search word.
    Download PDF (901K)
  • Tetsuro Adachi, Kentaro Taguchi, Takahiro Yoshida, Hidenori Kiuchi
    Session ID: H3-1
    Published: 2011
    Released on J-STAGE: December 01, 2011
    CONFERENCE PROCEEDINGS FREE ACCESS
    With the development of Cloud computing, the market for SaaS(Software as a Service) has been increasing. The operation process is important to provide the business application software by SaaS. The management process of SI (system integration) can be used to manage SaaS. However, the management processes of SI is not enough and not effective management for SaaS. The purpose of this research is to clarify standard business processes in consideration of a characteristic of SaaS business.
    Download PDF (316K)
  • Investigation on the Desirable Relationship between Factor Groups based on the Extent of Activation of KAIZEN Activities
    Jun Yamaguchi, Hirokazu Kono
    Session ID: H3-2
    Published: 2011
    Released on J-STAGE: December 01, 2011
    CONFERENCE PROCEEDINGS FREE ACCESS
    In general, the importance of Kaizen activities is recognized in many companies, but there are various impediments against its continuity. This paper extracts the relationship between seven factor groups for sustaining KAIZEN activities based on two cause-effect relationships built through two case study literatures. The paper also clarifies transitions of the extent of activation of each company's Kaizen activities, and then illustrates and analyzes the relationship of extent of activation. Through examining the illustrated relationship, the paper proposes desirable relationship between seven factor groups based on the extent of activation of Kaizen activities.
    Download PDF (426K)
  • Atsushi Yoshikawa, Akiko Orita, Masaaki Kunigami, Takao Terano
    Session ID: H3-4
    Published: 2011
    Released on J-STAGE: December 01, 2011
    CONFERENCE PROCEEDINGS FREE ACCESS
    We propose a key phrase finding method to assess organization's characteristic instead of questionnaire-based assessment. We propose two approaches; One is "Problem-finding"that ask responders to check where they find as problems from sentences in a scenario. Another is "Problem-Solving" that ask responders not only to check but also propose their own solution towards embedded troubles in a scenario. We analyzed two companies along with these method then showed that there are obvious differences between them and similarity as well.
    Download PDF (352K)
feedback
Top