SlideShare a Scribd company logo
1 of 39
Master75.18473.416-216.822-62.774-98.972229103.995-
200225121
Preference
Fresca
Crush
Dr Pepper
Coke
Pepsi
Intense Carbonation
Refreshing
Adrenline Rush
Unpopular
7-Up
Sierra Mist
Red Bull
Mountain Dew
Not Healthy
High Caffeine
Energy Boost
Fruity
Classy
Good Reputation
Sweet
Original Flavor
Tastes Bad
Hard to Find
Bold Packages
Sheet1cocacola129.23775.184pepsi170.07973.416fresca-185-
216.822sierramist36.859-62.7747-up47.399-98.972Adrenaline
Rush-225229Red Bull-45103.995crush-120-200mountaindew-
35225drpepper115121
Preference Line
Preference Line75.18473.416-216.822-62.774-
98.972229103.995-200225121
Preference
Fresca
Crush
Dr Pepper
Coke
Pepsi
Adrenline Rush
7-Up
Sierra Mist
Red Bull
Mountain Dew
Competitive Clusters
Competitive Clusters75.18473.416-216.822-62.774-
98.972229103.995-200225121
Fresca
Crush
Dr Pepper
Coke
Pepsi
Adrenline Rush
7-Up
Sierra Mist
Red Bull
Mountain Dew
Sheet2
Human Resource Information Management Model based on
Blockchain Technology
Xin Wang
School of Traffic and Transportation Management
Dalian Maritime University
Dalian, P. R. China
Libo Feng*, Hui Zhang
Digital Society & Blockchain Laboratory,
School of Computer Science and Engineering,
Beihang University
Beijing, P. R. China
Chan Lyu,
Assistant Professor, School of Business,
Macau University of Science and Technology
Macau, P. R. China
Li Wang Yue You
School of Economics and Management
Beihang University
Beijing, P. R. China
Abstract
The authenticity of human resource
information has become an important factor that
affects the cost and efficiency of human resource
management. With the rapid development of
mobile devices and Internet technology, various
human resource risks caused by information
asymmetry constantly bring economic loss, and
even a fatal blow, to enterprises. Based on
Blockchain(BC), this paper aims to combine
traditional encryption technology with Internet-
distributed technology, to establish a human
resource information management model that
reduces the risk of authenticity of human resource
information. This model aims to solve the lack of
discrimination of the authenticity of human
resource information, and to provide authentic and
effective decision support information to the
human resource management of an organization.
The operation method, such as Bitcoin, is used to
certify the human resource documentations, as
well as to bind the information and the
documentation. Furthermore, human resource
information is recorded in an accounting book
based on BC technology; thus, modifying and
validating may be difficult in the entire net work.
Consensus mechanism, smart contract, accounting,
and payment functions of BC can provide the basic
support for human resource information
management. Moreover, decentralization of the
protection mechanism can be achieved to achieve
low cost and high efficiency of information transfer,
and to ensure a high-performance work system in
the human resource management of enterprises.
Keywords: Blockchain; Human resources;
Information management
1. Introduction
With the rapid development of society and the
accelerating process of economic globalization,
enterprises face unprecedented pressures and
challenges. Human resources, as an important
carrier of knowledge, technology, and service, is
the core element of enterprise management
practice. The strategic value and significance of
human resources for the development of
organization cannot be replaced. The increasing
update of information technology has become a
powerful driving force for the rapid development
of all sectors of society. Human resource is the
primary productive force. Only retaining talent can
promote the development of the organization.
Accordingly, modern human resource management
should combine information technology with an
advanced human resource management concept,
optimize management method and mode, as well
as improve human resource management
efficiency and effect to guarantee the attainment of
the core competitive power in the dynamic
environment of an enterprise.
The authenticity of human resource
information directly affects the cost and efficiency
of human resource management. Some surveys
show that over 70% of job seekers show relatively
hidden and fraudulent information during the
recruitment process. Some job applicants submit
fake résumés, diplomas, and certificates of
2017 IEEE Symposium on Service-Oriented System Engineering
978-1-5090-6320-8/17 $31.00 © 2017 IEEE
DOI 10.1109/SOSE.2017.34
168
Authorized licensed use limited to: University of the
Cumberlands. Downloaded on May 26,2020 at 22:12:31 UTC
from IEEE Xplore. Restrictions apply.
qualification, and others deliberately exaggerate
their abilities. To enhance the quality of service, the
process of improving identification and
management of human resource information
authenticity has become an urgent issue that
requires solutions from the human resource and
social security department. This paper aims to
establish a human resource-oriented management
mode by introducing BC technology to reduce the
risk faced by human resource information
authenticity, thereby providing authentic and
effective decision support information for the
human resource management of an organization.
2. Analysis of risk management needs of human
resource information
Information is the key issue in human resource
management. For a long time, the authenticity of
human resource information has been in a
relatively ineffective regulatory state. In the
practice of human resource management, we
constantly face the following risks:
(1) Employment risk
In the labor market, the labor age value that
job seekers are willing to accept, as well as the
ability, educational background, and experience of
job seekers are the private information of
applicants. Furthermore, enterprises spend
significant costs to obtain the information, as well
as to conduct interviews and psychological tests. In
most cases, enterprises do not know if the types of
job seekers comply with the needs of organizations.
Reality shows that a relative number of job seekers
are not honest, and many enterprises do not easily
believe in the message of job seekers. Job seekers
intentionally deceive enterprises, and enterprises
cannot completely identify the types of job seekers
that they have to deal with. Thus, the application
process may have poor results. This practice is
simply a form of adverse selection in information
economics. Adverse selection results in increased
costs. Therefore, a high uncertainty exists in the
labor service trade, there by resulting in human
resource risks of enterprises.
(2)Risk of moral degeneration
In the process of implementing labor contracts,
enterprises frequently address the following
problems: employees are lazy and they cut corners.
Alternately, employees sell products at lower
prices to relatives and friends, or they claim back
expenses for tickets unrelated to their work. In the
process of implementing labor contracts, the
efforts of employees cannot be generally observed.
Employees know their own efforts, but managers
do not. Thus, employees may behave in an indolent
manner, such as contributing to non-labor.
The information is asymmetric between
enterprises and job seekers (or employees). Job
seekers have private information regarding their
types. Uncertainty occurs whether or not they
truthfully inform the enterprises about their types.
After labor contracts are assigned, uncertainty still
exists whether the employees are lazy or diligent at
work. This uncertainty poses risks to human
resources. Thus, information asymmetry is the
important reason for human resource risk.
The human resource risk information that
affects the operational efficiency of enterprises are
as below includes the following:
� demographic information of human resources,
including age, marital status, work experience
as measured by number of years, and so on;
� education and training of human resources,
including education and various training
experiences;
� ability of quality information of human
resources, including technical title, technical
grade, certificate, and so on;
� pay-for-performance information of human
resources, including assessment result, salary
incentive, promotion, and so on;
� incentive information of human resources,
including various certificates of honor, as well
as reward and punishment information.
The risks of human resources caused by
information asymmetry constantly bring economic
loss to enterprises, even causing a fatal blow.
Therefore, developing a new human resource
management modeis imperative to effectively solve
employment risk and the risk of moral
degeneration in human resource management.
3. Blockchain Technology model
3.1Introduction to Blockchain technology
The concept of a BC was initially presented by
Satoshi Nakamoto in a paper titled “Bitcoin:A Peer-to-
Peer Electronic Cash System,” which was published in
2008. A BC is a type of new decentralization data
framework. It is commonly owned, managed, and
supervised by all nodes in the network, without
accepting a single control. This technology is the core
of Bitcoin and other new digital encryption currencies.
Many well-known banks and insurance companies, as
well as brokers and future companies worldwide have
made technical development in the field of BCs. They
used blockchain-based Bitcoin and other electric
currencies in related commercial systems or
application services.
Blockchain technology is a type of technical
program to save, validate, transfer, and communicate
network data through its own distributed node without
depending on a third party. Based on agreed
regulations and agreements (similar to hash algorithm
and various mathematical algorithms adopted by
Bitcoin), all nodes can automatically and safely
validate and exchange data in the system without any
human intervention. A BC is a series of data blocks
generated from the association with the cryptography
method. Each block contains all network trade
169
Authorized licensed use limited to: University of the
Cumberlands. Downloaded on May 26,2020 at 22:12:31 UTC
from IEEE Xplore. Restrictions apply.
information in the last 10minutes, which is used to
verify the validity of the information (anti-fake
mechanism) and to form a next block. A BC has the
following main features:
(1) Decentralized structure. Blockchain
technology does not rely on third management
organizations or hardware facilities; without
central control, all nodes realize information self-
validation, transmission, and management.
Decentralization is the most prominent and
essential feature of BC.
(2) Trustlessness. Data exchange in the system
does not require nodes to trust one another. The
operation regulations of the entire system and all data
contents are open and transparent. Therefore, nodes
are unable to deceive each other in terms of rule scope
and time range designated by the system.
(3) Collective maintenance. Data blocks in the
system are commonly maintained by all nodes with
maintenance function in the entire system.
Furthermore, these nodes with maintenance function
can be involved by anyone.
(4) Reliability and security. When 51% of all data
nodes cannot be grasped, network data cannot be
controlled and modified without restraint. Thus, the
BC itself becomes relatively safe and is able to avoid
subjective and artificial data modification. Therefore,
if a greater number of nodes with strong calculation
ability are involved in the system, then the data in this
system have higher security.
(5) Open source. Blockchain technology is based
on the open-source concept. Except for the encrypted
private information of trading parties, BC data are
accessible to all people. Anyone can search the BC
data through the public interface, as well as develop
related applications. Thus, the entire system is highly
transparent.
(6) Anonymity. Nodes do not need to trust one
another except when a legal requirement exists.
Technically, the identity information of all nodes in the
block does not need to be open or verified, and
transfer can be anonymous.
3.2 Comparison of Blockchain and existing
technologies
At present, human resource information
management systems are based on the B/S or C/S
framework. Several safety factors exist in this
management mode. As a new development mode,
Blockchain technology adopts consistency
verification, Byzantine Agreement, public key and
private key encryption mechanism, including a
hash test and a series of security algorithms and
protocols to ensure security in management,
storage, tampering, and other aspects. With the
development of Blockchain technology, security is
guaranteed whether to the human resource
department or system users. The credibility of this
technology has been further strengthened.
Table 1 shows a comparison of three technologies
in terms of consistency verification, storage
equipment, real time, encryption mechanism,
tamper resistance, and other security aspects.
Table 1 Analysis of different design model
Consistency
verification
Storage
equipment
Encryption
mechanism
Internal
operation
Real time Tamper
resistance
C/S
framework
None Host Common
password
encryption
Yes Poor Can be
modified
inside
B/S
framework
None Network
server
Common
password
encryption
Yes General
Can be
modified
inside
Blockchain
technology
Yes
Each node of
block chain
Public and
private key
encryption
Public Strong Cannot be
modified
Table 1 shows that, compared with the
existing technologies, the management system
adopting Blockchain technology is significantly
improved in security. Meanwhile, permission to the
management system becomes more open, and it
can effectively avoid malicious tampering of system
information from the internal staff. Therefore,
further enhancement is expected in the efficiency
of the management system. It is different with the
traditional software engineering by using C/S
architecture or B/S architecture, BC architecture
more need to consider distributed, non center,
multi-copy communication, consistency,
concurrent, conflict control problem. It is similar to
C/MS (Client /Multiple Server Client)
4. Human resource information management mode
based on Blockchain technology
170
Authorized licensed use limited to: University of the
Cumberlands. Downloaded on May 26,2020 at 22:12:31 UTC
from IEEE Xplore. Restrictions apply.
4.1 Contents of human resource information
management
Based on the analysis of human resource risk
information, the contents of human resource
information management include the following:
(1) Basic information management of
human resources
Inclusion: employee information, contract
information, archival information, as well as
organizational and personal information. The main
information of employees should be managed,
recorded, and searched. The system sets different
permissions for people to read through the relative
contents. The staff in the human resource
department can read through assigned contract
information, new information, modified
information, and canceled information.
(2) Post-appointment and title information
management
Post-appointment and title information
management is one of the crucial personal system
components in China, and one of the basic
functions of personnel departments at all levels.
Professional title management is directly related to
the vital interests of many professional and
technical staff. With greater prominence in the
aspects of policy and correlation, professional title
management further relates to the enthusiasm of
professional and technical personnel; thus, these
professionals can be mobilized or protected.
(3) Training and deployment information
management
Based on the training experience and results
of human resources as well as the previous post-
deployment information, competency, job
promotion, and some post moves can be realized.
Training and post-move information of human
resources are recorded in a computer information
system that is promptly updated to ensure human
resource-related competency, and to promote
efficient use of human resources through efficient
allocation.
(4)Performance appraisal and salary
information management
The performance appraisal and salary information
management is the core of human resource
management. Its results, reflecting human resource
input and output, directly affect the possibility of
the promotion. The relevant information is entered
in the computer system to obtain the
corresponding performance appraisal and salary
information. Then, the relevant sheets are output
through these software information systems to
predict the investment value of human resources.
4.2 Design of human resource management
framework based on Blockchain
Human resource information management
based on BC is based on the establishment of a
private BC. The owners of the BC are firms or
enterprises. The BC is open to the internal staff and
is not limited to the management. Thus, the BC can
improve the transparency of the management
system, particularly in terms of training, allocation,
performance, salary, and sensitive information. It is
highly significant to be fair, impartial, open, and
improves the credibility of enterprises to establish
a good and positive atmosphere in the enterprise.
The design of a human resource information
management system is shown in Fig. 1. The system
is divided into four layers, namely, online
distributed database, basic layer of block chain,
application interface, and human resource
management system. All layers are independent,
with a certain coupling, thereby facilitating
software development and operation maintenance.
Fig.1Design of a human resource management
system framework based on Blockchain
4.3 Smart contract model of human resource
information management
Information asymmetry in human resource
management brings risk to enterprises. We can
design a series of contract arrangements to
stimulate and restrain the behavior of people. This
model is a contract conceived by human resource
management. It is based on the following idea: all
actions taken by individuals are for their own
interests; and the relevant information is
asymmetric between enterprises and employees.
Generally, employees grasp additional information
regarding jobs.
Once the authenticity of human resource
information is involved in the model, it is recorded
and embodied as a digital contract to be saved in
the accounting book. The generation of a smart
contract is an automatic behavior without artificial
intervention. Each smart contract has an unique
digital ID, which can be encrypted and embedded
in the text or on other digital carriers that record
the content of the contract. Therefore, a contract
management system can be used to ensure
effective identification and maintenance.
In this model, the BC is created and maintained
by an engineering team. The trust relationship
throughout the stem is automatically established in the
block chain, and does not need to be grasped by a
certain organization. This new human resource
171
Authorized licensed use limited to: University of the
Cumberlands. Downloaded on May 26,2020 at 22:12:31 UTC
from IEEE Xplore. Restrictions apply.
information management model successfully achieves
decentralization. Therefore, a larger number of cross
verification and supervision channels exist.
4.4 Language design
To better realize the function, we propose a BC
modeling language to specify, design, develop, and
test blockchain-based applications. It needs to support
system customization and extension. BML will be a
new modeling language as existing modeling
languages do not model BCs.
In the BML framework, the detail needs should
be specified. Firstly, the personal and parties
information that involved will be shared; furthermore,
we must consider the frequency of sharing. In addition,
the security and privacy mechanisms are also
important in the model. So there is a lot of Encryption
algorithm application in the process. Taking into
account the convenience of management, there will
have the locking mechanisms in it.
Application modeling concludes the process
modeling and architecture modeling. It is can be
shown as the following:
BML is a common visual modeling language, which is
used to describe the business process and data flow in
the process of block chain development. BML is in the
UML (United Modeling Language) on the basis of
introducing the time stamp, encryption mechanism,
chain structure modeling method. BML applies to all
kinds of blockchain software development methods,
block chain software life cycle of various stages, a
variety of application areas and a variety of
development tools. BML includes the concept of
semantics, representation and description, which
provides a static, dynamic, system environment and
organizational structure of the model.
4.5 Testing Blockchain Applications
Testing consistency of BC nodes will be relatively
simple as each block has been voted to be consistent
before they can be stored, and each block is encrypted
with the hash of the previous hash to ensure that these
blocks cannot be changed without detection (at least
theoretically). Testing a new block is a part of the BC
protocol.
Thus, regression testing is relatively simple as
contents in any nodes can be randomly selected for
testing, and the results should be consistent. Testing
multiple BCs is a research topic such as ABC, TBC,
SBC, HBC and DBC.
A TBC(trading blockchain) will store only
information necessary to carry out trades and
settlements only, and it will not store all the account
information for all the participating administrative
departments.
An ABC(Account blockchain) stores account
information within a management institution or a
family of institutions. For example, an ABC can store
all kinds of information about the Department staff.
A HBC(History blockchain) can record the
history of the transaction information. When you need
to check the transaction history, it
will greatly improve the efficiency of retrieval.
A DBC(Data blockchain) can will store the big
data of the detail application. In the specific
application, there may be a lot of audio, video and
other large amount of data storage, then you can use
DBC. This can reduce the amount of communication
and improve the processing efficiency of BC.
A SBC(Summary blockchain) can store
comprehensive records of transactions, accounts and
other information, it runs on other BC.
There is also a lot of interconnection in various
BCs. For example, TBCs and ABCs interoperate with
each other in banking applications. The traditional
software to consider the deployment and upgrade of
the server and the client, such as B/S architecture only
on the server deployment and upgrade; C/S
architecture need to be upgraded at the same time in
the server and the client. Application of block chain
based on the need to synchronize all the nodes, and
C/MS architecture, and to all the server nodes and
synchronization upgrade deploymen
5. Conclusion
This study aims to solve the information risk
of human resource management by introducing BC
technology. Establishing a human resource
information management model based on this
technology can provides are and effective
supporting information for human-resource
decision making. This model can realize the valid
application of human resource information at an
extremely low operation cost without any third
party. The human resource information
management model based on BC is established to
reduce the risk of authenticity of human resource
information, to solve the problem of the lack of
discrimination of the human resource information
authenticity, and promote the use efficiency and
effect of human resource management information.
6. Acknowledgement
This work is supported by National Key Laboratory
of Software Environment at Beihang University,
National 973 Program (Grant No. 2013CB329601)
Beijing Municipal Natural Science Foundation
(Grant No.9142012 and 9152009), National
Natural Science Foundation of China (No.
71271013 , No. M1450009 and No. 61462003)
Federation Social Sciences Circles of Liaoning
Province (No. 2016lslktglx-04) and Research
Base of Federation Social Sciences Circles of
Liaoning Province.
172
Authorized licensed use limited to: University of the
Cumberlands. Downloaded on May 26,2020 at 22:12:31 UTC
from IEEE Xplore. Restrictions apply.
References
[1] Nakamoto, S.: Bitcoin: a peer-to-peer
electronic cash system, Consulted 1, p. 2012
(2008)
[2] Bentov and R. Kumaresan. How to use bitcoin
to design fair protocols. In Advances in
Cryptology -CRYPTO 2014 - 34th Annual
Cryptology Conference, Santa Barbara, CA,
USA, August 17-21, 2014, Proceedings, Part II,
2014: 421–439.
[3] Reid, F., Harrigan, M.: An analysis of
anonymity in the bitcoin system. In: Altshuler,
Y., Elovici, Y., Cremers, A.B., Aharony, N.,
Pentland, A. (eds.) Security and Privacy in
Social Networks, pp. 197–223. Springer, New
York
[4] Michele Spagnuolo, Federico Maggi, and
Stefano Zanero BitIodine: Extracting
Intelligence from the Bitcoin Network[C].
Financial cryptography and data security,
International Conference, Christ Church,
Barbados,2014,457-468
[5] Ron, D., Shamir, A.: Quantitative analysis of
the full bitcoin transaction graph. IACR
Cryptology ePrint Archive vol. 2012, 584
[6] Yang, B., Garcia-Molina, H.: PPay:
micropayments for peer-to-peer systems.
In:Proceedings of the 10th ACM Conference
on Computer and Communications
Security,pp. 300-310. ACM (2003)
[7] Luo Wenjia, Chen Changping, Xu Hongyan.
Localized Application of PeopleSoft human
resources management system
[J].Information Technology and
Informatization,2015,12:138-139.
[8] Liu Bo, Chu Qifeng, Song Hongyan, Su Guangri.
Establishment and Application of human
resources information management system of
surveying and mapping business unit [J].
Geomatics & Spatial Information
Technology,2016,2:222-224.
[9] Anthony S,Constance P S,Joshua M.Crypto
currencies:core information technology and
information system fundamentals enabling
currency without borders[J].Information
Systems Education Journal,2015,13(3):43-52.
[10] Wang Yanan. Analysis and design of human
resources information system in colleges and
universities [D]. Tianjin University, May 2013.
[11] Xu Yan. Study on the effect of information
technology on human resources management
model, Business Manager 2015,12:215.
[12] Wang Ping. Analysis on the effect of
information technology on human resources
management model [J]. China Management
Information,2015,18(22):39.
[13] Blockchain—To drive evil from Internet
finance by using technology [J]. China Chief
Financial Officer,2015,12:143-145.
[14] Ren Likai, Qu Jiangsheng, Liu Xudong, Ti
Yunheng. Study on the promotion of
technology innovation ability of private
scientific and technological enterprises —
from the angle of international
cooperation[J].Science and technology
economic market,2013(11):89-90.
[15] Mao Wuxin, Xu Qingrui, Chen Jin, Wang Yi.
Study on core competency of enterprises and
rigid problem in dynamic environment—
taking evolution of technical ability of
information communication enterprises as an
example [J].Journal of University of Electronic
Science and Technology (Social science
edition),2012(02):75-76.
[16] Quan Yuji, Chen Yiyun. Innovation from non-
core technology to core technology: an
innovative strategy of middle and small scale
enterprises [J].Scientific management
research,2013(03):34-35.
[17] Li Xianyang, Chen Mujing, Wang Xiaonan.
Development and design of human resources
decision-making system [J]. Journal of Beijing
University of Chemical Technology (social
science edition),2014(02):62-63.
[18] Melanie S.Blockchain:blueprint for a new
economy[M].Sebastopol:O’Reilly Media,2015.
[19] Epicenter.Bitcoin quotations[EB/OL].[2015-
01-20].http: bitcoinquotations.com/.
[20] Coindesk.IBM reveals proof of concept for
block-chain-powered Internet of
Things[EB/OL].[2015-01-17].http:
www.coindesk.com/ibm-reveals-proof-
concept-blockchain-powered-internet-
things/.
173
Authorized licensed use limited to: University of the
Cumberlands. Downloaded on May 26,2020 at 22:12:31 UTC
from IEEE Xplore. Restrictions apply.
YOUR NAME:____________________________
Final Exam Strategic Tools for Marketers –Vermillion
Take Home Exam Due via dropbox on 6/7 by 9:00pm
You MUST have questions on exam - simply fill in your
answers in a different color than blue.
MUST WORK ALONE
1. How do you tie Perceptual Mapping and Conjoint Analysis
together when presenting be specific? (5 pts)
2. Define Perceptual Mapping and Conjoint Analysis. (4 pts)
3. What is the problem with conventional marketing? (4 pts)
Use the chart below to answer questions 4-8
4. If I was a marketing manager - what is the ideal or best TPU
product for chart – be sure to list feature level and utility? (4
pts)
5. Tell me why I am crying if I am the Ford, Chevy or Dodge
brand manager? (3 pts)
6. What can you tell me about price, style and material?
Explain your answer!(10pts)
(Make assumptions about numerical value of style and material.
Hint: the SUVs cost consumers as follows: Small SUV $10,000,
Midsize $20,000, and Large $30,000, consumer pays following
for each material - Vinyl $200, Fabric $300, and Leather $400)
7. What is the most important thing you can tell me about a
$40,000, Large SUV, Vinyl, Ford? (2 pts)
8. Calculate Market Share for the following SUVs. (15pts) You
MUST show your work!
Product A: 30,000, Midsize, Leather, Ford
Product B: 30,000, Midsize, Vinyl, Chevy
Product C: 50,000, Large, Fabric, Dodge
9. How many total profiles would the following features and
levels create –(only give one number!!!)? (3 pts)
Material:
linen
cotton
denim
Color:
blue
red
white
Style:
hip
square
classic
Sleeves:
long
short
3/4
Neck:
V
polo
button down
Use the perceptual maps posted on Blackboard under Course
Documents and named “Final Exam Maps” as a guide for the
following two questions:
10. List the order of Brand Preference for drinks on the
perceptual maps. Explain. (5 pts)
11. If you were the marketing team for Fresca and wanted to
reposition Fresca to be a preferred soft drink competing with 7-
Up and Sierra Mist what would you do? Be specific. (15pts)
12. Where are the coordinates for attributes on the SPSS output?
(2 pts)
13. Where are the coordinates for brands on SPSS? (3 pts)
14. How do you know what recommendations should be
considered strong recommendations when doing a Perceptual
Mapping and Conjoint Analysis project for a company? (10 pts)
15. What does TVE mean? (2pts) (explain meaning not just
what letters stand for)
16. Rescale the following output that has been run through
Regression Data Analysis? (5pts)
Intercept
4.32
X1 - $100
3.7
X2 - $200
1.2
X3 - 10mpg
-.98
X4 - 20mpg
.21
X5 – Silver
3.2
X6 – Black
2.1
X7 - $300
0
X8 – 30mpg
0
X9 – Red
0
17. Explain what TPU means. (3pts) (Not just what letter stand
for)
18. A high tech company is trying to find out how important
certain attribute levels are to customers. What tool would be
best to help them understand the most important attribute
levels? (5pts)

More Related Content

Similar to Master75.18473.416-216.822-62.774-98.972229103.995-200225121Pref.docx

Digital operations in banking advantages & challenges
Digital operations in banking  advantages & challengesDigital operations in banking  advantages & challenges
Digital operations in banking advantages & challengesMaveric Systems
 
DataManagement_Waters_GFT_trimmed
DataManagement_Waters_GFT_trimmedDataManagement_Waters_GFT_trimmed
DataManagement_Waters_GFT_trimmedDana Canavan
 
Top technological trend in wealth management
Top technological trend in wealth managementTop technological trend in wealth management
Top technological trend in wealth managementPratiksha Manan
 
EAI Checklist
EAI ChecklistEAI Checklist
EAI ChecklistIdeba
 
Prescriptions for Healthcare's Digital CIOs
Prescriptions for Healthcare's Digital CIOsPrescriptions for Healthcare's Digital CIOs
Prescriptions for Healthcare's Digital CIOsCognizant
 
How Are Data Analytics Used In The Banking And Finance Industries.pdf
How Are Data Analytics Used In The Banking And Finance Industries.pdfHow Are Data Analytics Used In The Banking And Finance Industries.pdf
How Are Data Analytics Used In The Banking And Finance Industries.pdfMaveric Systems
 
CX-and-the-future-of-work.pdf
CX-and-the-future-of-work.pdfCX-and-the-future-of-work.pdf
CX-and-the-future-of-work.pdfMohammed557959
 
Innovation and Transformation in Financial Services
Innovation and Transformation in Financial ServicesInnovation and Transformation in Financial Services
Innovation and Transformation in Financial ServicesCertus Solutions
 
CMGTCB582 - Security and Ethics - Compt-1 Assessment 2Inf
CMGTCB582 - Security and Ethics - Compt-1 Assessment 2InfCMGTCB582 - Security and Ethics - Compt-1 Assessment 2Inf
CMGTCB582 - Security and Ethics - Compt-1 Assessment 2InfWilheminaRossi174
 
New expectations for a new era
New expectations for a new eraNew expectations for a new era
New expectations for a new eraIBM Software India
 
3 Opportunities the Coronavirus Crisis Uncovers for Improving Bank Operations
3 Opportunities the Coronavirus Crisis Uncovers for Improving Bank Operations3 Opportunities the Coronavirus Crisis Uncovers for Improving Bank Operations
3 Opportunities the Coronavirus Crisis Uncovers for Improving Bank OperationsConnieG2
 
Financial services blog by shamayun miah
Financial services blog by shamayun miahFinancial services blog by shamayun miah
Financial services blog by shamayun miahAccenture
 
TRANSFORMATION - BANKING INDUSTRY.pdf
TRANSFORMATION - BANKING INDUSTRY.pdfTRANSFORMATION - BANKING INDUSTRY.pdf
TRANSFORMATION - BANKING INDUSTRY.pdfCeyhun Jay Tugcu
 
Disruption in Wealth Management
Disruption in Wealth ManagementDisruption in Wealth Management
Disruption in Wealth ManagementGreg Simmons
 
Deep dive on digital governance
Deep dive on digital governanceDeep dive on digital governance
Deep dive on digital governanceBen Gilchriest
 
RT__WPT_Guide_FinalDigitalSingle
RT__WPT_Guide_FinalDigitalSingleRT__WPT_Guide_FinalDigitalSingle
RT__WPT_Guide_FinalDigitalSingleConnor Wilson
 
2022’s Go-To Guide to Data Analytics in Banking & Financial Services.pptx
2022’s Go-To Guide to Data Analytics in Banking & Financial Services.pptx2022’s Go-To Guide to Data Analytics in Banking & Financial Services.pptx
2022’s Go-To Guide to Data Analytics in Banking & Financial Services.pptxMaveric Systems
 

Similar to Master75.18473.416-216.822-62.774-98.972229103.995-200225121Pref.docx (20)

CDO IBM
CDO IBMCDO IBM
CDO IBM
 
Digital operations in banking advantages & challenges
Digital operations in banking  advantages & challengesDigital operations in banking  advantages & challenges
Digital operations in banking advantages & challenges
 
DataManagement_Waters_GFT_trimmed
DataManagement_Waters_GFT_trimmedDataManagement_Waters_GFT_trimmed
DataManagement_Waters_GFT_trimmed
 
Top technological trend in wealth management
Top technological trend in wealth managementTop technological trend in wealth management
Top technological trend in wealth management
 
EAI Checklist
EAI ChecklistEAI Checklist
EAI Checklist
 
Prescriptions for Healthcare's Digital CIOs
Prescriptions for Healthcare's Digital CIOsPrescriptions for Healthcare's Digital CIOs
Prescriptions for Healthcare's Digital CIOs
 
How Are Data Analytics Used In The Banking And Finance Industries.pdf
How Are Data Analytics Used In The Banking And Finance Industries.pdfHow Are Data Analytics Used In The Banking And Finance Industries.pdf
How Are Data Analytics Used In The Banking And Finance Industries.pdf
 
CX-and-the-future-of-work.pdf
CX-and-the-future-of-work.pdfCX-and-the-future-of-work.pdf
CX-and-the-future-of-work.pdf
 
Innovation and Transformation in Financial Services
Innovation and Transformation in Financial ServicesInnovation and Transformation in Financial Services
Innovation and Transformation in Financial Services
 
CMGTCB582 - Security and Ethics - Compt-1 Assessment 2Inf
CMGTCB582 - Security and Ethics - Compt-1 Assessment 2InfCMGTCB582 - Security and Ethics - Compt-1 Assessment 2Inf
CMGTCB582 - Security and Ethics - Compt-1 Assessment 2Inf
 
New expectations for a new era
New expectations for a new eraNew expectations for a new era
New expectations for a new era
 
3 Opportunities the Coronavirus Crisis Uncovers for Improving Bank Operations
3 Opportunities the Coronavirus Crisis Uncovers for Improving Bank Operations3 Opportunities the Coronavirus Crisis Uncovers for Improving Bank Operations
3 Opportunities the Coronavirus Crisis Uncovers for Improving Bank Operations
 
Bus
BusBus
Bus
 
Financial services blog by shamayun miah
Financial services blog by shamayun miahFinancial services blog by shamayun miah
Financial services blog by shamayun miah
 
TRANSFORMATION - BANKING INDUSTRY.pdf
TRANSFORMATION - BANKING INDUSTRY.pdfTRANSFORMATION - BANKING INDUSTRY.pdf
TRANSFORMATION - BANKING INDUSTRY.pdf
 
The CFO in Insurance
The CFO in InsuranceThe CFO in Insurance
The CFO in Insurance
 
Disruption in Wealth Management
Disruption in Wealth ManagementDisruption in Wealth Management
Disruption in Wealth Management
 
Deep dive on digital governance
Deep dive on digital governanceDeep dive on digital governance
Deep dive on digital governance
 
RT__WPT_Guide_FinalDigitalSingle
RT__WPT_Guide_FinalDigitalSingleRT__WPT_Guide_FinalDigitalSingle
RT__WPT_Guide_FinalDigitalSingle
 
2022’s Go-To Guide to Data Analytics in Banking & Financial Services.pptx
2022’s Go-To Guide to Data Analytics in Banking & Financial Services.pptx2022’s Go-To Guide to Data Analytics in Banking & Financial Services.pptx
2022’s Go-To Guide to Data Analytics in Banking & Financial Services.pptx
 

More from tienboileau

MAT308Chapter 10 Test (75 Points)Show You Work!(1) The mean .docx
MAT308Chapter 10 Test (75 Points)Show You Work!(1) The mean .docxMAT308Chapter 10 Test (75 Points)Show You Work!(1) The mean .docx
MAT308Chapter 10 Test (75 Points)Show You Work!(1) The mean .docxtienboileau
 
Masters level forum Compare and contrast what President Woodrow .docx
Masters level forum Compare and contrast what President Woodrow .docxMasters level forum Compare and contrast what President Woodrow .docx
Masters level forum Compare and contrast what President Woodrow .docxtienboileau
 
Martin Wolf MARCH 24 2020 The coronavirus seeks only t.docx
Martin Wolf MARCH 24 2020 The coronavirus seeks only t.docxMartin Wolf MARCH 24 2020 The coronavirus seeks only t.docx
Martin Wolf MARCH 24 2020 The coronavirus seeks only t.docxtienboileau
 
Mass movementChoose oneA.  happens only when the slope .docx
Mass movementChoose oneA.  happens only when the slope .docxMass movementChoose oneA.  happens only when the slope .docx
Mass movementChoose oneA.  happens only when the slope .docxtienboileau
 
Marys one year old daughter is due to be given the Measles, Mum.docx
Marys one year old daughter is due to be given the Measles, Mum.docxMarys one year old daughter is due to be given the Measles, Mum.docx
Marys one year old daughter is due to be given the Measles, Mum.docxtienboileau
 
Masaccio, Trinity, Santa Maria Novella, Florence, 1426-27.docx
Masaccio, Trinity, Santa Maria Novella, Florence, 1426-27.docxMasaccio, Trinity, Santa Maria Novella, Florence, 1426-27.docx
Masaccio, Trinity, Santa Maria Novella, Florence, 1426-27.docxtienboileau
 
Matthew Shepard Was Killed Due To His Sexual Orientation. Defend, Ch.docx
Matthew Shepard Was Killed Due To His Sexual Orientation. Defend, Ch.docxMatthew Shepard Was Killed Due To His Sexual Orientation. Defend, Ch.docx
Matthew Shepard Was Killed Due To His Sexual Orientation. Defend, Ch.docxtienboileau
 
MBA 665 Final Project Milestone Three Guidelines and Rubric .docx
MBA 665 Final Project Milestone Three Guidelines and Rubric .docxMBA 665 Final Project Milestone Three Guidelines and Rubric .docx
MBA 665 Final Project Milestone Three Guidelines and Rubric .docxtienboileau
 
max 200 words due in 2 hoursSummarize the article by parap.docx
max 200 words due in 2 hoursSummarize the article by parap.docxmax 200 words due in 2 hoursSummarize the article by parap.docx
max 200 words due in 2 hoursSummarize the article by parap.docxtienboileau
 
MBA 599 – Strategic Management Case Project This capsto.docx
MBA 599 – Strategic Management Case Project  This capsto.docxMBA 599 – Strategic Management Case Project  This capsto.docx
MBA 599 – Strategic Management Case Project This capsto.docxtienboileau
 
MBA 640 Final Project Milestone Two Guidelines and Rubric .docx
MBA 640 Final Project Milestone Two Guidelines and Rubric  .docxMBA 640 Final Project Milestone Two Guidelines and Rubric  .docx
MBA 640 Final Project Milestone Two Guidelines and Rubric .docxtienboileau
 
Mary and Elmer’s fifth child, Melvin, was born 6 weeks prematurely a.docx
Mary and Elmer’s fifth child, Melvin, was born 6 weeks prematurely a.docxMary and Elmer’s fifth child, Melvin, was born 6 weeks prematurely a.docx
Mary and Elmer’s fifth child, Melvin, was born 6 weeks prematurely a.docxtienboileau
 
Maryland Technology Consultants is a fictitious company create.docx
Maryland Technology Consultants is a fictitious company create.docxMaryland Technology Consultants is a fictitious company create.docx
Maryland Technology Consultants is a fictitious company create.docxtienboileau
 
Martha Rogers’ Science of Unitary Human BeingsFOR THE THEORY CRI.docx
Martha Rogers’ Science of Unitary Human BeingsFOR THE THEORY CRI.docxMartha Rogers’ Science of Unitary Human BeingsFOR THE THEORY CRI.docx
Martha Rogers’ Science of Unitary Human BeingsFOR THE THEORY CRI.docxtienboileau
 
Materials for Your Works Cited PagesNOTE When you are writing.docx
Materials for Your Works Cited PagesNOTE When you are writing.docxMaterials for Your Works Cited PagesNOTE When you are writing.docx
Materials for Your Works Cited PagesNOTE When you are writing.docxtienboileau
 
MasubenPrivate equity firm can be very helpful for a company’s g.docx
MasubenPrivate equity firm can be very helpful for a company’s g.docxMasubenPrivate equity firm can be very helpful for a company’s g.docx
MasubenPrivate equity firm can be very helpful for a company’s g.docxtienboileau
 
MATH 114Discussion Board Forum 2 PromptPlease also pay close a.docx
MATH 114Discussion Board Forum 2 PromptPlease also pay close a.docxMATH 114Discussion Board Forum 2 PromptPlease also pay close a.docx
MATH 114Discussion Board Forum 2 PromptPlease also pay close a.docxtienboileau
 
MaterialsGeology.com (httpsgeology.comrocks) as .docx
MaterialsGeology.com (httpsgeology.comrocks) as .docxMaterialsGeology.com (httpsgeology.comrocks) as .docx
MaterialsGeology.com (httpsgeology.comrocks) as .docxtienboileau
 
MAT 308 Test 1 Chapters 6 & 7(170 Total Points)Show All Work!.docx
MAT 308 Test 1 Chapters 6 & 7(170 Total Points)Show All Work!.docxMAT 308 Test 1 Chapters 6 & 7(170 Total Points)Show All Work!.docx
MAT 308 Test 1 Chapters 6 & 7(170 Total Points)Show All Work!.docxtienboileau
 
MarketingModes of CommunicationHierarchy of Effect.docx
MarketingModes of CommunicationHierarchy of Effect.docxMarketingModes of CommunicationHierarchy of Effect.docx
MarketingModes of CommunicationHierarchy of Effect.docxtienboileau
 

More from tienboileau (20)

MAT308Chapter 10 Test (75 Points)Show You Work!(1) The mean .docx
MAT308Chapter 10 Test (75 Points)Show You Work!(1) The mean .docxMAT308Chapter 10 Test (75 Points)Show You Work!(1) The mean .docx
MAT308Chapter 10 Test (75 Points)Show You Work!(1) The mean .docx
 
Masters level forum Compare and contrast what President Woodrow .docx
Masters level forum Compare and contrast what President Woodrow .docxMasters level forum Compare and contrast what President Woodrow .docx
Masters level forum Compare and contrast what President Woodrow .docx
 
Martin Wolf MARCH 24 2020 The coronavirus seeks only t.docx
Martin Wolf MARCH 24 2020 The coronavirus seeks only t.docxMartin Wolf MARCH 24 2020 The coronavirus seeks only t.docx
Martin Wolf MARCH 24 2020 The coronavirus seeks only t.docx
 
Mass movementChoose oneA.  happens only when the slope .docx
Mass movementChoose oneA.  happens only when the slope .docxMass movementChoose oneA.  happens only when the slope .docx
Mass movementChoose oneA.  happens only when the slope .docx
 
Marys one year old daughter is due to be given the Measles, Mum.docx
Marys one year old daughter is due to be given the Measles, Mum.docxMarys one year old daughter is due to be given the Measles, Mum.docx
Marys one year old daughter is due to be given the Measles, Mum.docx
 
Masaccio, Trinity, Santa Maria Novella, Florence, 1426-27.docx
Masaccio, Trinity, Santa Maria Novella, Florence, 1426-27.docxMasaccio, Trinity, Santa Maria Novella, Florence, 1426-27.docx
Masaccio, Trinity, Santa Maria Novella, Florence, 1426-27.docx
 
Matthew Shepard Was Killed Due To His Sexual Orientation. Defend, Ch.docx
Matthew Shepard Was Killed Due To His Sexual Orientation. Defend, Ch.docxMatthew Shepard Was Killed Due To His Sexual Orientation. Defend, Ch.docx
Matthew Shepard Was Killed Due To His Sexual Orientation. Defend, Ch.docx
 
MBA 665 Final Project Milestone Three Guidelines and Rubric .docx
MBA 665 Final Project Milestone Three Guidelines and Rubric .docxMBA 665 Final Project Milestone Three Guidelines and Rubric .docx
MBA 665 Final Project Milestone Three Guidelines and Rubric .docx
 
max 200 words due in 2 hoursSummarize the article by parap.docx
max 200 words due in 2 hoursSummarize the article by parap.docxmax 200 words due in 2 hoursSummarize the article by parap.docx
max 200 words due in 2 hoursSummarize the article by parap.docx
 
MBA 599 – Strategic Management Case Project This capsto.docx
MBA 599 – Strategic Management Case Project  This capsto.docxMBA 599 – Strategic Management Case Project  This capsto.docx
MBA 599 – Strategic Management Case Project This capsto.docx
 
MBA 640 Final Project Milestone Two Guidelines and Rubric .docx
MBA 640 Final Project Milestone Two Guidelines and Rubric  .docxMBA 640 Final Project Milestone Two Guidelines and Rubric  .docx
MBA 640 Final Project Milestone Two Guidelines and Rubric .docx
 
Mary and Elmer’s fifth child, Melvin, was born 6 weeks prematurely a.docx
Mary and Elmer’s fifth child, Melvin, was born 6 weeks prematurely a.docxMary and Elmer’s fifth child, Melvin, was born 6 weeks prematurely a.docx
Mary and Elmer’s fifth child, Melvin, was born 6 weeks prematurely a.docx
 
Maryland Technology Consultants is a fictitious company create.docx
Maryland Technology Consultants is a fictitious company create.docxMaryland Technology Consultants is a fictitious company create.docx
Maryland Technology Consultants is a fictitious company create.docx
 
Martha Rogers’ Science of Unitary Human BeingsFOR THE THEORY CRI.docx
Martha Rogers’ Science of Unitary Human BeingsFOR THE THEORY CRI.docxMartha Rogers’ Science of Unitary Human BeingsFOR THE THEORY CRI.docx
Martha Rogers’ Science of Unitary Human BeingsFOR THE THEORY CRI.docx
 
Materials for Your Works Cited PagesNOTE When you are writing.docx
Materials for Your Works Cited PagesNOTE When you are writing.docxMaterials for Your Works Cited PagesNOTE When you are writing.docx
Materials for Your Works Cited PagesNOTE When you are writing.docx
 
MasubenPrivate equity firm can be very helpful for a company’s g.docx
MasubenPrivate equity firm can be very helpful for a company’s g.docxMasubenPrivate equity firm can be very helpful for a company’s g.docx
MasubenPrivate equity firm can be very helpful for a company’s g.docx
 
MATH 114Discussion Board Forum 2 PromptPlease also pay close a.docx
MATH 114Discussion Board Forum 2 PromptPlease also pay close a.docxMATH 114Discussion Board Forum 2 PromptPlease also pay close a.docx
MATH 114Discussion Board Forum 2 PromptPlease also pay close a.docx
 
MaterialsGeology.com (httpsgeology.comrocks) as .docx
MaterialsGeology.com (httpsgeology.comrocks) as .docxMaterialsGeology.com (httpsgeology.comrocks) as .docx
MaterialsGeology.com (httpsgeology.comrocks) as .docx
 
MAT 308 Test 1 Chapters 6 & 7(170 Total Points)Show All Work!.docx
MAT 308 Test 1 Chapters 6 & 7(170 Total Points)Show All Work!.docxMAT 308 Test 1 Chapters 6 & 7(170 Total Points)Show All Work!.docx
MAT 308 Test 1 Chapters 6 & 7(170 Total Points)Show All Work!.docx
 
MarketingModes of CommunicationHierarchy of Effect.docx
MarketingModes of CommunicationHierarchy of Effect.docxMarketingModes of CommunicationHierarchy of Effect.docx
MarketingModes of CommunicationHierarchy of Effect.docx
 

Recently uploaded

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxNikitaBankoti2
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIShubhangi Sonawane
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 

Recently uploaded (20)

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 

Master75.18473.416-216.822-62.774-98.972229103.995-200225121Pref.docx

  • 1. Master75.18473.416-216.822-62.774-98.972229103.995- 200225121 Preference Fresca Crush Dr Pepper Coke Pepsi Intense Carbonation Refreshing Adrenline Rush Unpopular 7-Up Sierra Mist Red Bull Mountain Dew Not Healthy High Caffeine Energy Boost Fruity Classy Good Reputation Sweet Original Flavor Tastes Bad Hard to Find Bold Packages Sheet1cocacola129.23775.184pepsi170.07973.416fresca-185- 216.822sierramist36.859-62.7747-up47.399-98.972Adrenaline Rush-225229Red Bull-45103.995crush-120-200mountaindew- 35225drpepper115121 Preference Line Preference Line75.18473.416-216.822-62.774- 98.972229103.995-200225121
  • 2. Preference Fresca Crush Dr Pepper Coke Pepsi Adrenline Rush 7-Up Sierra Mist Red Bull Mountain Dew Competitive Clusters Competitive Clusters75.18473.416-216.822-62.774- 98.972229103.995-200225121 Fresca Crush Dr Pepper Coke Pepsi Adrenline Rush 7-Up Sierra Mist Red Bull Mountain Dew Sheet2 Human Resource Information Management Model based on Blockchain Technology Xin Wang School of Traffic and Transportation Management Dalian Maritime University
  • 3. Dalian, P. R. China Libo Feng*, Hui Zhang Digital Society & Blockchain Laboratory, School of Computer Science and Engineering, Beihang University Beijing, P. R. China Chan Lyu, Assistant Professor, School of Business, Macau University of Science and Technology Macau, P. R. China Li Wang Yue You School of Economics and Management Beihang University Beijing, P. R. China Abstract
  • 4. The authenticity of human resource information has become an important factor that affects the cost and efficiency of human resource management. With the rapid development of mobile devices and Internet technology, various human resource risks caused by information asymmetry constantly bring economic loss, and even a fatal blow, to enterprises. Based on Blockchain(BC), this paper aims to combine traditional encryption technology with Internet- distributed technology, to establish a human resource information management model that reduces the risk of authenticity of human resource information. This model aims to solve the lack of discrimination of the authenticity of human resource information, and to provide authentic and effective decision support information to the human resource management of an organization.
  • 5. The operation method, such as Bitcoin, is used to certify the human resource documentations, as well as to bind the information and the documentation. Furthermore, human resource information is recorded in an accounting book based on BC technology; thus, modifying and validating may be difficult in the entire net work. Consensus mechanism, smart contract, accounting, and payment functions of BC can provide the basic support for human resource information management. Moreover, decentralization of the protection mechanism can be achieved to achieve low cost and high efficiency of information transfer, and to ensure a high-performance work system in the human resource management of enterprises. Keywords: Blockchain; Human resources; Information management 1. Introduction
  • 6. With the rapid development of society and the accelerating process of economic globalization, enterprises face unprecedented pressures and challenges. Human resources, as an important carrier of knowledge, technology, and service, is the core element of enterprise management practice. The strategic value and significance of human resources for the development of organization cannot be replaced. The increasing update of information technology has become a powerful driving force for the rapid development of all sectors of society. Human resource is the primary productive force. Only retaining talent can promote the development of the organization. Accordingly, modern human resource management should combine information technology with an advanced human resource management concept, optimize management method and mode, as well
  • 7. as improve human resource management efficiency and effect to guarantee the attainment of the core competitive power in the dynamic environment of an enterprise. The authenticity of human resource information directly affects the cost and efficiency of human resource management. Some surveys show that over 70% of job seekers show relatively hidden and fraudulent information during the recruitment process. Some job applicants submit fake résumés, diplomas, and certificates of 2017 IEEE Symposium on Service-Oriented System Engineering 978-1-5090-6320-8/17 $31.00 © 2017 IEEE DOI 10.1109/SOSE.2017.34 168 Authorized licensed use limited to: University of the Cumberlands. Downloaded on May 26,2020 at 22:12:31 UTC from IEEE Xplore. Restrictions apply.
  • 8. qualification, and others deliberately exaggerate their abilities. To enhance the quality of service, the process of improving identification and management of human resource information authenticity has become an urgent issue that requires solutions from the human resource and social security department. This paper aims to establish a human resource-oriented management mode by introducing BC technology to reduce the risk faced by human resource information authenticity, thereby providing authentic and effective decision support information for the human resource management of an organization. 2. Analysis of risk management needs of human resource information Information is the key issue in human resource management. For a long time, the authenticity of human resource information has been in a
  • 9. relatively ineffective regulatory state. In the practice of human resource management, we constantly face the following risks: (1) Employment risk In the labor market, the labor age value that job seekers are willing to accept, as well as the ability, educational background, and experience of job seekers are the private information of applicants. Furthermore, enterprises spend significant costs to obtain the information, as well as to conduct interviews and psychological tests. In most cases, enterprises do not know if the types of job seekers comply with the needs of organizations. Reality shows that a relative number of job seekers are not honest, and many enterprises do not easily believe in the message of job seekers. Job seekers intentionally deceive enterprises, and enterprises cannot completely identify the types of job seekers
  • 10. that they have to deal with. Thus, the application process may have poor results. This practice is simply a form of adverse selection in information economics. Adverse selection results in increased costs. Therefore, a high uncertainty exists in the labor service trade, there by resulting in human resource risks of enterprises. (2)Risk of moral degeneration In the process of implementing labor contracts, enterprises frequently address the following problems: employees are lazy and they cut corners. Alternately, employees sell products at lower prices to relatives and friends, or they claim back expenses for tickets unrelated to their work. In the process of implementing labor contracts, the efforts of employees cannot be generally observed. Employees know their own efforts, but managers do not. Thus, employees may behave in an indolent
  • 11. manner, such as contributing to non-labor. The information is asymmetric between enterprises and job seekers (or employees). Job seekers have private information regarding their types. Uncertainty occurs whether or not they truthfully inform the enterprises about their types. After labor contracts are assigned, uncertainty still exists whether the employees are lazy or diligent at work. This uncertainty poses risks to human resources. Thus, information asymmetry is the important reason for human resource risk. The human resource risk information that affects the operational efficiency of enterprises are as below includes the following: � demographic information of human resources, including age, marital status, work experience as measured by number of years, and so on; � education and training of human resources, including education and various training
  • 12. experiences; � ability of quality information of human resources, including technical title, technical grade, certificate, and so on; � pay-for-performance information of human resources, including assessment result, salary incentive, promotion, and so on; � incentive information of human resources, including various certificates of honor, as well as reward and punishment information. The risks of human resources caused by information asymmetry constantly bring economic loss to enterprises, even causing a fatal blow. Therefore, developing a new human resource management modeis imperative to effectively solve employment risk and the risk of moral degeneration in human resource management. 3. Blockchain Technology model 3.1Introduction to Blockchain technology The concept of a BC was initially presented by
  • 13. Satoshi Nakamoto in a paper titled “Bitcoin:A Peer-to- Peer Electronic Cash System,” which was published in 2008. A BC is a type of new decentralization data framework. It is commonly owned, managed, and supervised by all nodes in the network, without accepting a single control. This technology is the core of Bitcoin and other new digital encryption currencies. Many well-known banks and insurance companies, as well as brokers and future companies worldwide have made technical development in the field of BCs. They used blockchain-based Bitcoin and other electric currencies in related commercial systems or application services. Blockchain technology is a type of technical program to save, validate, transfer, and communicate network data through its own distributed node without depending on a third party. Based on agreed regulations and agreements (similar to hash algorithm and various mathematical algorithms adopted by Bitcoin), all nodes can automatically and safely validate and exchange data in the system without any human intervention. A BC is a series of data blocks generated from the association with the cryptography method. Each block contains all network trade 169 Authorized licensed use limited to: University of the Cumberlands. Downloaded on May 26,2020 at 22:12:31 UTC from IEEE Xplore. Restrictions apply. information in the last 10minutes, which is used to
  • 14. verify the validity of the information (anti-fake mechanism) and to form a next block. A BC has the following main features: (1) Decentralized structure. Blockchain technology does not rely on third management organizations or hardware facilities; without central control, all nodes realize information self- validation, transmission, and management. Decentralization is the most prominent and essential feature of BC. (2) Trustlessness. Data exchange in the system does not require nodes to trust one another. The operation regulations of the entire system and all data contents are open and transparent. Therefore, nodes are unable to deceive each other in terms of rule scope and time range designated by the system. (3) Collective maintenance. Data blocks in the system are commonly maintained by all nodes with maintenance function in the entire system. Furthermore, these nodes with maintenance function can be involved by anyone. (4) Reliability and security. When 51% of all data nodes cannot be grasped, network data cannot be controlled and modified without restraint. Thus, the BC itself becomes relatively safe and is able to avoid subjective and artificial data modification. Therefore,
  • 15. if a greater number of nodes with strong calculation ability are involved in the system, then the data in this system have higher security. (5) Open source. Blockchain technology is based on the open-source concept. Except for the encrypted private information of trading parties, BC data are accessible to all people. Anyone can search the BC data through the public interface, as well as develop related applications. Thus, the entire system is highly transparent. (6) Anonymity. Nodes do not need to trust one another except when a legal requirement exists. Technically, the identity information of all nodes in the block does not need to be open or verified, and transfer can be anonymous. 3.2 Comparison of Blockchain and existing technologies At present, human resource information management systems are based on the B/S or C/S framework. Several safety factors exist in this management mode. As a new development mode, Blockchain technology adopts consistency verification, Byzantine Agreement, public key and private key encryption mechanism, including a
  • 16. hash test and a series of security algorithms and protocols to ensure security in management, storage, tampering, and other aspects. With the development of Blockchain technology, security is guaranteed whether to the human resource department or system users. The credibility of this technology has been further strengthened. Table 1 shows a comparison of three technologies in terms of consistency verification, storage equipment, real time, encryption mechanism, tamper resistance, and other security aspects. Table 1 Analysis of different design model Consistency verification Storage equipment Encryption mechanism
  • 17. Internal operation Real time Tamper resistance C/S framework None Host Common password encryption Yes Poor Can be modified inside B/S framework None Network server Common password
  • 18. encryption Yes General Can be modified inside Blockchain technology Yes Each node of block chain Public and private key encryption Public Strong Cannot be modified Table 1 shows that, compared with the existing technologies, the management system adopting Blockchain technology is significantly
  • 19. improved in security. Meanwhile, permission to the management system becomes more open, and it can effectively avoid malicious tampering of system information from the internal staff. Therefore, further enhancement is expected in the efficiency of the management system. It is different with the traditional software engineering by using C/S architecture or B/S architecture, BC architecture more need to consider distributed, non center, multi-copy communication, consistency, concurrent, conflict control problem. It is similar to C/MS (Client /Multiple Server Client) 4. Human resource information management mode based on Blockchain technology 170 Authorized licensed use limited to: University of the Cumberlands. Downloaded on May 26,2020 at 22:12:31 UTC from IEEE Xplore. Restrictions apply.
  • 20. 4.1 Contents of human resource information management Based on the analysis of human resource risk information, the contents of human resource information management include the following: (1) Basic information management of human resources Inclusion: employee information, contract information, archival information, as well as organizational and personal information. The main information of employees should be managed, recorded, and searched. The system sets different permissions for people to read through the relative contents. The staff in the human resource department can read through assigned contract information, new information, modified information, and canceled information. (2) Post-appointment and title information management
  • 21. Post-appointment and title information management is one of the crucial personal system components in China, and one of the basic functions of personnel departments at all levels. Professional title management is directly related to the vital interests of many professional and technical staff. With greater prominence in the aspects of policy and correlation, professional title management further relates to the enthusiasm of professional and technical personnel; thus, these professionals can be mobilized or protected. (3) Training and deployment information management Based on the training experience and results of human resources as well as the previous post- deployment information, competency, job promotion, and some post moves can be realized. Training and post-move information of human
  • 22. resources are recorded in a computer information system that is promptly updated to ensure human resource-related competency, and to promote efficient use of human resources through efficient allocation. (4)Performance appraisal and salary information management The performance appraisal and salary information management is the core of human resource management. Its results, reflecting human resource input and output, directly affect the possibility of the promotion. The relevant information is entered in the computer system to obtain the corresponding performance appraisal and salary information. Then, the relevant sheets are output through these software information systems to predict the investment value of human resources. 4.2 Design of human resource management framework based on Blockchain
  • 23. Human resource information management based on BC is based on the establishment of a private BC. The owners of the BC are firms or enterprises. The BC is open to the internal staff and is not limited to the management. Thus, the BC can improve the transparency of the management system, particularly in terms of training, allocation, performance, salary, and sensitive information. It is highly significant to be fair, impartial, open, and improves the credibility of enterprises to establish a good and positive atmosphere in the enterprise. The design of a human resource information management system is shown in Fig. 1. The system is divided into four layers, namely, online distributed database, basic layer of block chain, application interface, and human resource management system. All layers are independent, with a certain coupling, thereby facilitating
  • 24. software development and operation maintenance. Fig.1Design of a human resource management system framework based on Blockchain 4.3 Smart contract model of human resource information management Information asymmetry in human resource management brings risk to enterprises. We can design a series of contract arrangements to stimulate and restrain the behavior of people. This model is a contract conceived by human resource management. It is based on the following idea: all actions taken by individuals are for their own interests; and the relevant information is asymmetric between enterprises and employees. Generally, employees grasp additional information regarding jobs. Once the authenticity of human resource information is involved in the model, it is recorded
  • 25. and embodied as a digital contract to be saved in the accounting book. The generation of a smart contract is an automatic behavior without artificial intervention. Each smart contract has an unique digital ID, which can be encrypted and embedded in the text or on other digital carriers that record the content of the contract. Therefore, a contract management system can be used to ensure effective identification and maintenance. In this model, the BC is created and maintained by an engineering team. The trust relationship throughout the stem is automatically established in the block chain, and does not need to be grasped by a certain organization. This new human resource 171 Authorized licensed use limited to: University of the Cumberlands. Downloaded on May 26,2020 at 22:12:31 UTC from IEEE Xplore. Restrictions apply. information management model successfully achieves decentralization. Therefore, a larger number of cross verification and supervision channels exist.
  • 26. 4.4 Language design To better realize the function, we propose a BC modeling language to specify, design, develop, and test blockchain-based applications. It needs to support system customization and extension. BML will be a new modeling language as existing modeling languages do not model BCs. In the BML framework, the detail needs should be specified. Firstly, the personal and parties information that involved will be shared; furthermore, we must consider the frequency of sharing. In addition, the security and privacy mechanisms are also important in the model. So there is a lot of Encryption algorithm application in the process. Taking into account the convenience of management, there will have the locking mechanisms in it. Application modeling concludes the process modeling and architecture modeling. It is can be shown as the following: BML is a common visual modeling language, which is used to describe the business process and data flow in the process of block chain development. BML is in the UML (United Modeling Language) on the basis of introducing the time stamp, encryption mechanism, chain structure modeling method. BML applies to all kinds of blockchain software development methods, block chain software life cycle of various stages, a variety of application areas and a variety of development tools. BML includes the concept of semantics, representation and description, which provides a static, dynamic, system environment and organizational structure of the model.
  • 27. 4.5 Testing Blockchain Applications Testing consistency of BC nodes will be relatively simple as each block has been voted to be consistent before they can be stored, and each block is encrypted with the hash of the previous hash to ensure that these blocks cannot be changed without detection (at least theoretically). Testing a new block is a part of the BC protocol. Thus, regression testing is relatively simple as contents in any nodes can be randomly selected for testing, and the results should be consistent. Testing multiple BCs is a research topic such as ABC, TBC, SBC, HBC and DBC. A TBC(trading blockchain) will store only information necessary to carry out trades and settlements only, and it will not store all the account information for all the participating administrative departments. An ABC(Account blockchain) stores account information within a management institution or a family of institutions. For example, an ABC can store all kinds of information about the Department staff. A HBC(History blockchain) can record the history of the transaction information. When you need to check the transaction history, it will greatly improve the efficiency of retrieval. A DBC(Data blockchain) can will store the big data of the detail application. In the specific application, there may be a lot of audio, video and
  • 28. other large amount of data storage, then you can use DBC. This can reduce the amount of communication and improve the processing efficiency of BC. A SBC(Summary blockchain) can store comprehensive records of transactions, accounts and other information, it runs on other BC. There is also a lot of interconnection in various BCs. For example, TBCs and ABCs interoperate with each other in banking applications. The traditional software to consider the deployment and upgrade of the server and the client, such as B/S architecture only on the server deployment and upgrade; C/S architecture need to be upgraded at the same time in the server and the client. Application of block chain based on the need to synchronize all the nodes, and C/MS architecture, and to all the server nodes and synchronization upgrade deploymen 5. Conclusion This study aims to solve the information risk of human resource management by introducing BC technology. Establishing a human resource information management model based on this technology can provides are and effective supporting information for human-resource decision making. This model can realize the valid
  • 29. application of human resource information at an extremely low operation cost without any third party. The human resource information management model based on BC is established to reduce the risk of authenticity of human resource information, to solve the problem of the lack of discrimination of the human resource information authenticity, and promote the use efficiency and effect of human resource management information. 6. Acknowledgement This work is supported by National Key Laboratory of Software Environment at Beihang University, National 973 Program (Grant No. 2013CB329601) Beijing Municipal Natural Science Foundation (Grant No.9142012 and 9152009), National Natural Science Foundation of China (No. 71271013 , No. M1450009 and No. 61462003) Federation Social Sciences Circles of Liaoning
  • 30. Province (No. 2016lslktglx-04) and Research Base of Federation Social Sciences Circles of Liaoning Province. 172 Authorized licensed use limited to: University of the Cumberlands. Downloaded on May 26,2020 at 22:12:31 UTC from IEEE Xplore. Restrictions apply. References [1] Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system, Consulted 1, p. 2012 (2008) [2] Bentov and R. Kumaresan. How to use bitcoin to design fair protocols. In Advances in Cryptology -CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part II, 2014: 421–439. [3] Reid, F., Harrigan, M.: An analysis of anonymity in the bitcoin system. In: Altshuler,
  • 31. Y., Elovici, Y., Cremers, A.B., Aharony, N., Pentland, A. (eds.) Security and Privacy in Social Networks, pp. 197–223. Springer, New York [4] Michele Spagnuolo, Federico Maggi, and Stefano Zanero BitIodine: Extracting Intelligence from the Bitcoin Network[C]. Financial cryptography and data security, International Conference, Christ Church, Barbados,2014,457-468 [5] Ron, D., Shamir, A.: Quantitative analysis of the full bitcoin transaction graph. IACR Cryptology ePrint Archive vol. 2012, 584 [6] Yang, B., Garcia-Molina, H.: PPay: micropayments for peer-to-peer systems. In:Proceedings of the 10th ACM Conference on Computer and Communications Security,pp. 300-310. ACM (2003) [7] Luo Wenjia, Chen Changping, Xu Hongyan. Localized Application of PeopleSoft human
  • 32. resources management system [J].Information Technology and Informatization,2015,12:138-139. [8] Liu Bo, Chu Qifeng, Song Hongyan, Su Guangri. Establishment and Application of human resources information management system of surveying and mapping business unit [J]. Geomatics & Spatial Information Technology,2016,2:222-224. [9] Anthony S,Constance P S,Joshua M.Crypto currencies:core information technology and information system fundamentals enabling currency without borders[J].Information Systems Education Journal,2015,13(3):43-52. [10] Wang Yanan. Analysis and design of human resources information system in colleges and universities [D]. Tianjin University, May 2013. [11] Xu Yan. Study on the effect of information technology on human resources management model, Business Manager 2015,12:215.
  • 33. [12] Wang Ping. Analysis on the effect of information technology on human resources management model [J]. China Management Information,2015,18(22):39. [13] Blockchain—To drive evil from Internet finance by using technology [J]. China Chief Financial Officer,2015,12:143-145. [14] Ren Likai, Qu Jiangsheng, Liu Xudong, Ti Yunheng. Study on the promotion of technology innovation ability of private scientific and technological enterprises — from the angle of international cooperation[J].Science and technology economic market,2013(11):89-90. [15] Mao Wuxin, Xu Qingrui, Chen Jin, Wang Yi. Study on core competency of enterprises and rigid problem in dynamic environment— taking evolution of technical ability of information communication enterprises as an example [J].Journal of University of Electronic
  • 34. Science and Technology (Social science edition),2012(02):75-76. [16] Quan Yuji, Chen Yiyun. Innovation from non- core technology to core technology: an innovative strategy of middle and small scale enterprises [J].Scientific management research,2013(03):34-35. [17] Li Xianyang, Chen Mujing, Wang Xiaonan. Development and design of human resources decision-making system [J]. Journal of Beijing University of Chemical Technology (social science edition),2014(02):62-63. [18] Melanie S.Blockchain:blueprint for a new economy[M].Sebastopol:O’Reilly Media,2015. [19] Epicenter.Bitcoin quotations[EB/OL].[2015- 01-20].http: bitcoinquotations.com/. [20] Coindesk.IBM reveals proof of concept for block-chain-powered Internet of Things[EB/OL].[2015-01-17].http: www.coindesk.com/ibm-reveals-proof- concept-blockchain-powered-internet-
  • 35. things/. 173 Authorized licensed use limited to: University of the Cumberlands. Downloaded on May 26,2020 at 22:12:31 UTC from IEEE Xplore. Restrictions apply. YOUR NAME:____________________________ Final Exam Strategic Tools for Marketers –Vermillion Take Home Exam Due via dropbox on 6/7 by 9:00pm You MUST have questions on exam - simply fill in your answers in a different color than blue. MUST WORK ALONE 1. How do you tie Perceptual Mapping and Conjoint Analysis together when presenting be specific? (5 pts) 2. Define Perceptual Mapping and Conjoint Analysis. (4 pts) 3. What is the problem with conventional marketing? (4 pts) Use the chart below to answer questions 4-8 4. If I was a marketing manager - what is the ideal or best TPU product for chart – be sure to list feature level and utility? (4 pts) 5. Tell me why I am crying if I am the Ford, Chevy or Dodge brand manager? (3 pts) 6. What can you tell me about price, style and material? Explain your answer!(10pts)
  • 36. (Make assumptions about numerical value of style and material. Hint: the SUVs cost consumers as follows: Small SUV $10,000, Midsize $20,000, and Large $30,000, consumer pays following for each material - Vinyl $200, Fabric $300, and Leather $400) 7. What is the most important thing you can tell me about a $40,000, Large SUV, Vinyl, Ford? (2 pts) 8. Calculate Market Share for the following SUVs. (15pts) You MUST show your work! Product A: 30,000, Midsize, Leather, Ford Product B: 30,000, Midsize, Vinyl, Chevy Product C: 50,000, Large, Fabric, Dodge 9. How many total profiles would the following features and levels create –(only give one number!!!)? (3 pts) Material: linen cotton denim Color: blue red
  • 37. white Style: hip square classic Sleeves: long short 3/4 Neck: V polo button down Use the perceptual maps posted on Blackboard under Course Documents and named “Final Exam Maps” as a guide for the following two questions: 10. List the order of Brand Preference for drinks on the perceptual maps. Explain. (5 pts) 11. If you were the marketing team for Fresca and wanted to
  • 38. reposition Fresca to be a preferred soft drink competing with 7- Up and Sierra Mist what would you do? Be specific. (15pts) 12. Where are the coordinates for attributes on the SPSS output? (2 pts) 13. Where are the coordinates for brands on SPSS? (3 pts) 14. How do you know what recommendations should be considered strong recommendations when doing a Perceptual Mapping and Conjoint Analysis project for a company? (10 pts) 15. What does TVE mean? (2pts) (explain meaning not just what letters stand for) 16. Rescale the following output that has been run through Regression Data Analysis? (5pts) Intercept 4.32 X1 - $100 3.7 X2 - $200 1.2 X3 - 10mpg -.98 X4 - 20mpg .21 X5 – Silver
  • 39. 3.2 X6 – Black 2.1 X7 - $300 0 X8 – 30mpg 0 X9 – Red 0 17. Explain what TPU means. (3pts) (Not just what letter stand for) 18. A high tech company is trying to find out how important certain attribute levels are to customers. What tool would be best to help them understand the most important attribute levels? (5pts)