use served data and create various service is provided, and the lots of systems which promote users participation are based. For example, Wikipedia, Amazon, ebay, and intellectual knowledge search service at never let us to share our knowledge and information.
On the other hand, people who does not educated information ethics, information can be abused and have malfunctions like non-professional
use.
3. Design of the Business
1) Product
The mobile product we provide to customer is electronic passport. This electronic passport has many essential functions for tourists. This passport has necessary personal information for travel. But existing passport (old type passport) has chance that is stolen. Stolen passport can be abused for crimes but this electronic passport doesn’t h
pretty much everything is the same for buyers, except that the rates they can give the sellers have gotten for precise; from three levels of negative, neutral, positive to five levels of five stars. However, for sellers, instead of giving buyers feedbacks, they can choose to engage in the transaction with the buyers who they thing are trustful through buyer requirements and protect themselves
Ⅰ. 개요
정량적 성격이 강한 경제학적 접근법과 경제적 가치 접근법은 대체로 구조화(structured)된 문제에 적용된다. 반면에 정성적 성격이 강한 효용 가치 접근법과 정보 체계 접근법은 대체로 비구조화(unstructured)된 문제에 적용된다. 구조화된 문제는 문제 풀이 과정에 일정한 경향(pattern)이 있어서
of the resident registration number
is the POLICY that
strengthen the protection of “resident registration number” and prevent its abuse by hackers and other criminals
Our Research Questions are…
Who is Policy entrepreneur?
How can we examine the policy with 3 streams in Kingdon’s model?
Is there any limitation?
Auction Hacking Incident (2008)
18,630,000 people’s information