This study probes the effect of loyalty program on the customer retention based on the real transaction data(n=2,892) acquired from education service industry. We try to figure out the outcomes of reward program through more than 1 year-long data gathered and analyzed according to quasi-experimental design(i.e., before and after design). We adopt this kinds of research scheme in regard that previous studies measured the effect of loyalty program by dividing the customers into two group(i.e., members vs. non-members) after the firms or stores had started the program. We believe that it might not avoid the self-selection bias. The research questions of this study could be explained such as: First, most research said that the loyalty programs could increase the customer loyalty and contribute to the sustainable growth of company. But there are little confirmation that this promotional tool could be justified in terms of financial perspective. Thus, we are interested in both the retention rate and financial outcomes caused by the introduction of loyalty programs. Second, reward programs target mainly current customer. Especially CRM(customer relationship management) said that it is more profitable for company to build positive relationship with current customer instead of pursuing new customer. And it claims that reward program is excellent means to achieve this goal. For this purpose, we check in this study whether there is a interaction effect between loyalty program and customer type in retaining customer. Third, it is said that dis-satisfied customers are more likely to leave the company than satisfied customers. While, Bolton, Kannan and Bramlett(2000) claimed that reward program could contribute to minimize the effect of negative service by building emotional link with customer, it is not empirically confirmed. This point of view explained that the loyalty programs might work as exit barrier to current customer. Thus, this study tries to identify whether there is a interaction effect between loyalty program and service experience in keeping customer. To achieve this purpose, this study adopt both Kaplan-Meier survival analysis and Cox proportional hazard model. The research outcomes show that the average retention period is 179 days before introducing loyalty program but it is increased to 227 days after reward is given to the customers. Since this difference is statistically significant, it could be said that H1 is supported. In addition, the contribution margin coming from increased transaction period is bigger than the cost for administering loyalty programs. To address other research questions, we probe the interaction effect between loyalty program and other factors(i.e., customer type and service experience) affecting it. The analysis of Cox proportional hazard model said that the current customer is more likely to engage in building relationship with company compared to new customer. In addition, retention rate of satisfied customer is significantly increased in relation to dis-satisfied customer. Interestingly, the transaction period of dis-satisfied customer is notably increased after introducing loyalty programs. Thus, it could be said that H2, H3, and H4 are also supported. In summary, we found that the loyalty programs have values as a promotional tool in forming positive relationship with customer and building exit barrier.
As the 4th industrial revolution progresses, new technologies and services are being born, growing, and maturing. Now, beyond the mobile era, the metaverse is being discussed as a new paradigm. Therefore, in this study, in preparation for the metaverse era, we tried to analyze what factors have an important influence when consumers want to use new technologies. In particular, the research was conducted focusing on how the context in which consumers use the technology changes depending on whether they are B2C or B2B. For this, augmented reality (AR) was selected in the B2C context by linking the research subject with the metaverse era, and the smart factory was selected in the B2B context. The research model for the analysis was established by deriving and setting common influence variables by reflecting the characteristics of the research target technology based on the modified extended unified theory of acceptance and use of technology. A survey was conducted for empirical analysis, and 150 AR and 150 smart factory subjects were analyzed. The empirical study results are as follows. The relationship between performance expectancy and intention to use, technology readiness and intention to use was found to have a significant positive (+) effect on both AR and smart factory. On the other hand, it was found that effort expectancy, social influence, and trust had a positive (+) effect on intention to use only in AR. Only in smart factory, facilitating conditions had a significant positive (+) effect on intention to use. It was also found that the perceived risk had a significant negative (-) effect on the intention to use only in the smart factory. The results of this study are academically significant in that we empirically test that influencing factors of technology use varies depending on the context in which it is used by consumers. In practice, it provided an implication of what to focus on first is being implemented.
This study attempted to identify the factors affecting entrepreneurial intention and to confirm the moderating effect of social support that plays a positive role in increasing entrepreneurial intention. The subjects of the study were 419 ordinary people, and data were obtained online and analyzed. The analysis method of this study was based on the SPSS statistical program Ver. 24, and a hierarchical regression analysis method was conducted to analyze the moderating effect. The results of hypothesis verification analysis in this study are as follows. First, innovativeness, risk-taking, self-fulfillment, economic motivation, immersion in a drama, drama role model, and indirect experience, all had a significant positive(+) effect on entrepreneurial intention. Second, among the factors affecting entrepreneurial intention, self-fulfillment was found to have the greatest influence. Third, it was confirmed that the moderating effect of social support between various variables and entrepreneurial intention had a significant effect on innovativeness, self-fulfillment, drama role model, and indirect experience, and entrepreneurial intention. The academic value of this study is to confirm the effect of drama characteristic variables on entrepreneurial intention. In addition, it was possible to confirm the moderating effect of social support, which is the total of individual external support. The implication of this study is that the desire for achievement had the greatest influence on entrepreneurial intention. Therefore, it is necessary to develop a desire to achieve in start-up support policies and start-up education. In addition, in light of the ripple effect of TV dramas, drama role model and indirect experience increase entrepreneurial intention, so it was possible to predict its influence on changes in perception of start-ups and entrepreneurs.
A large-scale IS development project takes a long time, thus its project manager needs to be more careful on risk management. In particular, appropriate cutover decision making is critical in large-scale IS development projects because the opening of the large-scale IS significantly impacts the organization. Regardless of its importance, cutover decision making in conventional IS development projects has been done in a quite simple way. Conventional cutover decisions have been made by considering just whether the new IS operates or not from the system, application, and data implementation perspectives. However, this approach may lead to unsatisfactory performance or system failure in complex large-scale IS development. Under this background, we propose a new framework for cutover decision making on large-scale IS projects. To validate the applicability, we applied the framework to a core banking system development case. The case study shows that our framework is effective in proper cutover decision making.
This study aims at analyzing the global trend of standardization in the field of Industrial Security through ISO/TC 292. It covers broad areas from risk management for industrial property protection and loss prevention through supply chain security, product and document fraud and counterfeiting countermeasures and control and community resilience. It also explores the historical background of the standardization in the security field, how ISO TC 292 came out as a leading group in order to standardize relevant security management systems. TC 292 deals with terminology, general security-related standards and supply chain security management. One of the major findings from this analysis is that security targets and threats are diversified and so organizations like enterprises should have proper flexibility to adapt themselves to new security environment and take appropriate resilience system to cope with the threats and incidents. Also the ISO standardization requires public or private entities to take holistic approaches in security management. Finally, it was found that South Korea has to prepare for this global trend of standardization in this field so that ISO certification market demand and the requirements for transnational trades can be well met.
In recent years, by utilizing the greatest strengths of process mining, the various research activities have been actively progressed to use auditing work of business organization. On the other hand, there is insufficient research on systematic and efficient analysis of massive data generated under big data environment using process mining, and proactive monitoring of risk management from audit side, which is one of important management activities of corporate organization. In this study, we intend to realize Hadoop-based internal audit integrated real-time monitoring system in order to detect the abnormal symptoms in prevent accidents in advance. Through the integrated real-time monitoring system for purchasing audit, we intend to realize strengthen the delivery management of purchasing materials ordered, reduce cost of purchase, manage competitive companies, prevent fraud, comply with regulations, and adhere to internal control accounting system. As a result, we can provide information that can be immediately executed due to enhanced purchase audit integrated real-time monitoring by analyzing data efficiently using process mining via Hadoop-based systems. From an integrated viewpoint, it is possible to manage the business status, by processing a large amount of work at a high speed faster than the continuous monitoring, the effectiveness of the quality improvement of the purchase audit and the innovation of the purchase process appears.
Security Act has been partially revised many times since it was revised to "Security Service Act". Main contents of such revision consist of the addition of security work such as protection or special security, responsibility enforcement of security company or security guard and systematic management of security service based on security work of previous security service act. But, it needs to be checked out that the fundamental matter about the concept of 'security' is directly related as double-edged sword in such flow of legal revision. That is because security service satisfies the multiple needs for security in the modern risky society and is based on the concept of active management whose goal is to forster and develop the function of actual security service comparing that current "Security Service Act" regulates the formal security service whose goal is permission of security service and systematic management based on article 2 as previous facilities and manned security that is guard duty-centered security service in another respect. So, this study pointed out the limit of interpreting security and security service in "Security Services Industry Act" in respect of providing private security service and drew the conclusion that the legislation and efforts are required for 'security for citizen' by reinterpreting the legislation and revision of private security service-related law as the normal regulation of "Security Services Industry Act" and the special law of "Private Security Services Industry Act".
IT Systems based on Global Single Instance (GSI) can manage a corporation's internal information, resources and assets effectively and raise business efficiency through consolidation of their business process and productivity. But, It has also dangerous factor that IT system fault failure can cause a state of paralysis of a business itself, followed by huge loss of money. Many of studies have been conducted about fault-tolerance based on using redundant component. The concept of fault tolerance is rather simple but, designing and adopting fault-tolerance system is not easy due to uncertainty of a type and frequency of faults. So, Operational fault management that working after developed IT system is important more and more along with technical fault management. This study proposes the fault management process that including a pre-estimation method using TRM (Technical Reference Model) check point and event rule engine. And also proposes a effect of fault-free process through built fault management system to representative company of Hi-tech industry. After adopting fault-free process, a number of failure decreased by 46%, a failure time decreased by 56% and the Opportunity loss costs decreased by 77%.
The ownership structure of a franchise system is determined by the franchisor's strategic choice. A close look at the extant theories and perspectives in economics and management such as resource scarcity theory, agency theory, transaction cost analysis, and mixed ownership theory reveals that firms choose their ownership structure for the sake of economic efficiency, profit potentials, the chance of survival, and other strategic concerns. The present study, on the basis of strategic choice perspective, reviews the divergent theories of a franchise system's ownership structure and its determinants, thus providing a theoretical framework for comparing the contradictory arguments along the several critical dimensions. We also developed and tested the conflicting hypotheses regarding key determinants of ownership structure including firm's age, size, transaction-specific investments, uncertainty, and risk-sharing propensity. Using a FDD (Franchise Disclosure Document) data set of 543 Korean franchisors, we found that the years in business, the total number of employees, days of training, the inverse of the years of franchising, and the requirement of royalty payment have positive relationships with the proportion of company-owned outlets to total number of outlets. On the other hand, the proportion of company-owned outlets was found to have negative relationships with the total number of outlets and the extent of geographic dispersion of outlets, but to have no significant relationships with the initial investment required and the inverse of contract length. Based on the findings, we provide several theoretical and managerial implications for studying ownership structure of franchise systems.
Journal of the Korea Academia-Industrial cooperation Society
/
v.18
no.3
/
pp.518-526
/
2017
This study analyzed the impact of family firms and their characteristics on how they use debts to analyze the decision-making process of Korean family firms. For analysis, we classified the characteristics of family firms into three categories, through the influence of the relationship between the lack of funds and net debt issuance, which was confirmed as the 'packing order theory' of family firms. There was a total of 4,503 enterprises in the Korean Exchange (KRX). The period of analysis was 10 years, between 2004 and 2014. To summarize, Shyam-Sunder and Myers (1999) validated the packing order theory by presenting a model of family businesses that showed greater applicable to higher packing order theory than a model of non-family businesses. Moreover, the results also confirmed the application of the packing order theory by the family stronger corporate governance and ownership structure. The ownership and governance characteristics of the ruling family has also shown the applicability of higher packing order theory.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.