• Title/Summary/Keyword: 기술경영

Search Result 7,057, Processing Time 0.04 seconds

A Comparative Case Study on the Adaptation Process of Advanced Information Technology: A Grounded Theory Approach for the Appropriation Process (신기술 사용 과정에 관한 비교 사례 연구: 기술 전유 과정의 근거이론적 접근)

  • Choi, Hee-Jae;Lee, Zoon-Ky
    • Asia pacific journal of information systems
    • /
    • v.19 no.3
    • /
    • pp.99-124
    • /
    • 2009
  • Many firms in Korea have adopted and used advanced information technology in an effort to boost efficiency. The process of adapting to the new technology, at the same time, can vary from one firm to another. As such, this research focuses on several relevant factors, especially the roles of social interaction as a key variable that influences the technology adaptation process and the outcomes. Thus far, how a firm goes through the adaptation process to the new technology has not been yet fully explored. Previous studies on changes undergone by a firm or an organization due to information technology have been pursued from various theoretical points of views, evolved from technological and institutional views to an integrated social technology views. The technology adaptation process has been understood to be something that evolves over time and has been regarded as cycles between misalignments and alignments, gradually approaching the stable aligned state. The adaptation process of the new technology was defined as "appropriation" process according to Poole and DeSanctis (1994). They suggested that this process is not automatically determined by the technology design itself. Rather, people actively select how technology structures should be used; accordingly, adoption practices vary. But concepts of the appropriation process in these studies are not accurate while suggested propositions are not clear enough to apply in practice. Furthermore, these studies do not substantially suggest which factors are changed during the appropriation process and what should be done to bring about effective outcomes. Therefore, research objectives of this study lie in finding causes for the difference in ways in which advanced information technology has been used and adopted among organizations. The study also aims to explore how a firm's interaction with social as well as technological factors affects differently in resulting organizational changes. Detail objectives of this study are as follows. First, this paper primarily focuses on the appropriation process of advanced information technology in the long run, and we look into reasons for the diverse types of the usage. Second, this study is to categorize each phases in the appropriation process and make clear what changes occur and how they are evolved during each phase. Third, this study is to suggest the guidelines to determine which strategies are needed in an individual, group and organizational level. For this, a substantially grounded theory that can be applied to organizational practice has been developed from a longitudinal comparative case study. For these objectives, the technology appropriation process was explored based on Structuration Theory by Giddens (1984), Orlikoski and Robey (1991) and Adaptive Structuration Theory by Poole and DeSanctis (1994), which are examples of social technology views on organizational change by technology. Data have been obtained from interviews, observations of medical treatment task, and questionnaires administered to group members who use the technology. Data coding was executed in three steps following the grounded theory approach. First of all, concepts and categories were developed from interviews and observation data in open coding. Next, in axial coding, we related categories to subcategorize along the lines of their properties and dimensions through the paradigm model. Finally, the grounded theory about the appropriation process was developed through the conditional/consequential matrix in selective coding. In this study eight hypotheses about the adaptation process have been clearly articulated. Also, we found that the appropriation process involves through three phases, namely, "direct appropriation," "cooperate with related structures," and "interpret and make judgments." The higher phases of appropriation move, the more users represent various types of instrumental use and attitude. Moreover, the previous structures like "knowledge and experience," "belief that other members know and accept the use of technology," "horizontal communication," and "embodiment of opinion collection process" are evolved to higher degrees in their dimensions of property. Furthermore, users continuously create new spirits and structures, while removing some of the previous ones at the same time. Thus, from longitudinal view, faithful and unfaithful appropriation methods appear recursively, but gradually faithful appropriation takes over the other. In other words, the concept of spirits and structures has been changed in the adaptation process over time for the purpose of alignment between the task and other structures. These findings call for a revised or extended model of structural adaptation in IS (Information Systems) literature now that the vague adaptation process in previous studies has been clarified through the in-depth qualitative study, identifying each phrase with accuracy. In addition, based on these results some guidelines can be set up to help determine which strategies are needed in an individual, group, and organizational level for the purpose of effective technology appropriation. In practice, managers can focus on the changes of spirits and elevation of the structural dimension to achieve effective technology use.

The Effects of Psychological Contract Violation on OS User's Betrayal Behaviors: Window XP Technical Support Ending Case (심리적 계약 위반이 OS이용자의 배신 행동에 미치는 영향: 윈도우 XP 기술적 지원서비스 중단 사례)

  • Lee, Un-Kon
    • Asia pacific journal of information systems
    • /
    • v.24 no.3
    • /
    • pp.325-344
    • /
    • 2014
  • Technical support of Window XP ended in March, 8, 2014, and it makes OS(Operating System) users fall in a state of confusion. Sudden decision making of OS upgrade and replacement is not a simple problem. Firms need to change the long term capacity plan in enterprise IS management, but they are pressed for time and cost to complete it. Individuals can not help selecting the second best plan, because the following OSs of Window XP are below expectations in performances, new PC sales as the opportunities of OS upgrade decrease, and the potential risk of OS technical support ending had not announced to OS users at the point of purchase. Microsoft as the OS vendors had not presented precaution or remedy for this confusion. Rather, Microsoft announced that the technical support of the other following OSs of Wndow XP such as Window 7 would ended in two years. This conflict between OS vendor and OS users could not happen in one time, but could recur in recent future. Although studies on the ways of OS user protection policy would be needed to escape from this conflict, few prior studies had conducted this issue. This study had challenge to cautiously investigate in such OS user's reactions as the confirmation with OS user's expectation in the point of purchase, three types of justice perception on the treatment of OS vendor, psychological contract violation, satisfaction and the other betrayal behavioral intention in the case of Window XP technical support ending. By adopting the justice perception on this research, and by empirically validating the impact on OS user's reactions, I could suggest the direction of establishing OS user protection policy of OS vendor. Based on the expectation-confirmation theory, the theory of justice, literatures about psychological contract violation, and studies about consumer betrayal behaviors in the perspective of Herzberg(1968)'s dual factor theory, I developed the research model and hypothesis. Expectation-confirmation theory explain that consumers had expectation on the performance of product in the point of sale, and they could satisfied with their purchase behaviors, when the expectation could have confirmed in the point of consumption. The theory of justice in social exchange argues that treatee could be willing to accept the treatment by treater when the three types of justice as distributive, procedural, and interactional justice could be established in treatment. Literatures about psychological contract violation in human behaviors explains that contracter in a side could have the implied contract (also called 'psychological contract') which the contracter in the other side would sincerely execute the contract, and that they are willing to do vengeance behaviors when their contract had unfairly been broken. When the psychological contract of consumers had been broken, consumers feel distrust with the vendors and are willing to decrease such beneficial attitude and behavior as satisfaction, loyalty and repurchase intention. At the same time, consumers feel betrayal and are willing to increase such retributive attitude and behavior as negative word-of-mouth, complain to the vendors, complain to the third parties for consumer protection. We conducted a scenario survey in order to validate our research model at March, 2013, when is the point of news released firstly and when is the point of one year before the acture Window XP technical support ending. We collected the valid data from 238 voluntary participants who are the OS users but had not yet exposed the news of Window OSs technical support ending schedule. The subject had been allocated into two groups and one of two groups had been exposed this news. The data had been analyzed by the MANOVA and PLS. MANOVA results indicate that the OSs technical support ending could significantly decrease all three types of justice perception. PLS results indicated that it could significantly increase psychological contract violation and that this increased psychological contract violation could significantly reduce the trust and increase the perceived betrayal. Then, it could significantly reduce satisfaction, loyalty, and repurchase intention, and it also could significantly increase negative word-of-month intention, complain to the vendor intention, and complain to the third party intention. All hypothesis had been significantly approved. Consequently, OS users feel that the OSs technical support ending is not natural value added service ending, but the violation of the core OS purchase contract, that it could be the posteriori prohibition of OS user's OS usage right, and that it could induce the psychological contract violation of OS users. This study would contributions to introduce the psychological contract violation of the OS users from the OSs technical support ending in IS field, to introduce three types of justice as the antecedents of psychological contract violation, and to empirically validate the impact of psychological contract violation both on the beneficial and retributive behavioral intentions of OS users. For practice, the results of this study could contribute to make more comprehensive OS user protection policy and consumer relationship management practices of OS vendor.

Analyses of Factors Affecting Satisfaction of the Visually Impaired SNS Users (시각장애인 SNS 이용자의 이용만족에 영향을 미치는 요인)

  • Lee, Hyun Mi;Hong, Soon Goo;Kim, Jong Ki
    • Information Systems Review
    • /
    • v.14 no.3
    • /
    • pp.25-51
    • /
    • 2012
  • The purpose of this study is to analyze the key factors affecting satisfaction of the visually impaired SNS users so that they may use SNS more effectively in the future. This study has used three factors such as the information factor, the relationship factor and the speed factor and the usability as independent variables. The social presence factor was used as a parameter and the SNS user satisfaction as a dependent variable. For the research, 195 visually impaired SNS users have participated in this survey. The major findings of this study are that the relationship factor has strong effects on the self-identification factor, the social presence factor and the SNS usage satisfaction among the factors affecting the visually impaired users to be satisfied with SNS. On the other hand, the information factor and usage factor have no effects on the self-identification factor and the social presence factor. However, they have effects on the SNS usage satisfaction. Additionally, the self-identification factor has no effect on the SNS usage satisfaction, but the social presence factor has effect. Based on the above study results, this paper proposed for the government to enhance the educational program on the use of SNS for the visually impaired and to increase its financial and political support on this subject. Additionally, technical supports on SNS service accessibility and usage by the government are vital for the visually impaired. Academically, this study provides a concrete groundwork for the research on the use of SNS by the visually impaired by providing a solid research direction for further study on this subject. Socially, this study helps the visually impaired use SNS more effectively by increasing the general public awareness of the importance of SNS usages by the visually impaired so that the information gap of the society may be diminished in the future.

  • PDF

The Adoption and Diffusion of Semantic Web Technology Innovation: Qualitative Research Approach (시맨틱 웹 기술혁신의 채택과 확산: 질적연구접근법)

  • Joo, Jae-Hun
    • Asia pacific journal of information systems
    • /
    • v.19 no.1
    • /
    • pp.33-62
    • /
    • 2009
  • Internet computing is a disruptive IT innovation. Semantic Web can be considered as an IT innovation because the Semantic Web technology possesses the potential to reduce information overload and enable semantic integration, using capabilities such as semantics and machine-processability. How should organizations adopt the Semantic Web? What factors affect the adoption and diffusion of Semantic Web innovation? Most studies on adoption and diffusion of innovation use empirical analysis as a quantitative research methodology in the post-implementation stage. There is criticism that the positivist requiring theoretical rigor can sacrifice relevance to practice. Rapid advances in technology require studies relevant to practice. In particular, it is realistically impossible to conduct quantitative approach for factors affecting adoption of the Semantic Web because the Semantic Web is in its infancy. However, in an early stage of introduction of the Semantic Web, it is necessary to give a model and some guidelines and for adoption and diffusion of the technology innovation to practitioners and researchers. Thus, the purpose of this study is to present a model of adoption and diffusion of the Semantic Web and to offer propositions as guidelines for successful adoption through a qualitative research method including multiple case studies and in-depth interviews. The researcher conducted interviews with 15 people based on face-to face and 2 interviews by telephone and e-mail to collect data to saturate the categories. Nine interviews including 2 telephone interviews were from nine user organizations adopting the technology innovation and the others were from three supply organizations. Semi-structured interviews were used to collect data. The interviews were recorded on digital voice recorder memory and subsequently transcribed verbatim. 196 pages of transcripts were obtained from about 12 hours interviews. Triangulation of evidence was achieved by examining each organization website and various documents, such as brochures and white papers. The researcher read the transcripts several times and underlined core words, phrases, or sentences. Then, data analysis used the procedure of open coding, in which the researcher forms initial categories of information about the phenomenon being studied by segmenting information. QSR NVivo version 8.0 was used to categorize sentences including similar concepts. 47 categories derived from interview data were grouped into 21 categories from which six factors were named. Five factors affecting adoption of the Semantic Web were identified. The first factor is demand pull including requirements for improving search and integration services of the existing systems and for creating new services. Second, environmental conduciveness, reference models, uncertainty, technology maturity, potential business value, government sponsorship programs, promising prospects for technology demand, complexity and trialability affect the adoption of the Semantic Web from the perspective of technology push. Third, absorptive capacity is an important role of the adoption. Fourth, suppler's competence includes communication with and training for users, and absorptive capacity of supply organization. Fifth, over-expectance which results in the gap between user's expectation level and perceived benefits has a negative impact on the adoption of the Semantic Web. Finally, the factor including critical mass of ontology, budget. visible effects is identified as a determinant affecting routinization and infusion. The researcher suggested a model of adoption and diffusion of the Semantic Web, representing relationships between six factors and adoption/diffusion as dependent variables. Six propositions are derived from the adoption/diffusion model to offer some guidelines to practitioners and a research model to further studies. Proposition 1 : Demand pull has an influence on the adoption of the Semantic Web. Proposition 1-1 : The stronger the degree of requirements for improving existing services, the more successfully the Semantic Web is adopted. Proposition 1-2 : The stronger the degree of requirements for new services, the more successfully the Semantic Web is adopted. Proposition 2 : Technology push has an influence on the adoption of the Semantic Web. Proposition 2-1 : From the perceptive of user organizations, the technology push forces such as environmental conduciveness, reference models, potential business value, and government sponsorship programs have a positive impact on the adoption of the Semantic Web while uncertainty and lower technology maturity have a negative impact on its adoption. Proposition 2-2 : From the perceptive of suppliers, the technology push forces such as environmental conduciveness, reference models, potential business value, government sponsorship programs, and promising prospects for technology demand have a positive impact on the adoption of the Semantic Web while uncertainty, lower technology maturity, complexity and lower trialability have a negative impact on its adoption. Proposition 3 : The absorptive capacities such as organizational formal support systems, officer's or manager's competency analyzing technology characteristics, their passion or willingness, and top management support are positively associated with successful adoption of the Semantic Web innovation from the perceptive of user organizations. Proposition 4 : Supplier's competence has a positive impact on the absorptive capacities of user organizations and technology push forces. Proposition 5 : The greater the gap of expectation between users and suppliers, the later the Semantic Web is adopted. Proposition 6 : The post-adoption activities such as budget allocation, reaching critical mass, and sharing ontology to offer sustainable services are positively associated with successful routinization and infusion of the Semantic Web innovation from the perceptive of user organizations.

Research about a successful adopting for the CRM in the companies (기업에서의 성공적인 CRM 정착에 대한 연구)

  • Kim, Gipyoung
    • The Journal of Industrial Distribution & Business
    • /
    • v.2 no.1
    • /
    • pp.5-15
    • /
    • 2011
  • Prior to the introduction of the CRM, we need to analyze the characteristics and the situations of the company, and should establish a clear vision of the CRM. And each company should identify elements and technologies for introducing the most suitable CRM for them, and optimize them, with long-term perspective. In addition, it requires the implementation strategy which integrates the existing company's routine marketing activities with the concept of the CRM. According to the implementation strategy, the company should improve the business process which is the most effective in investment step by step, and the information system strategy, which develops system investment gradually, should harmonize with it. First, we recognized that raising the company value is important by maximizing customer lifetime value (LTV) by understanding customer needs, and achieving the company's goal through customer satisfaction. Second, we understood that adopting the CRM should be accompanied by changes in the structure, business process and customer contact channels, and it can be successfully integrated with business when it gets proper understandings and attentions of the management. Third, the reality is that there are few cases of successful implementation of domestic companies, and some companies that successfully implement the system mean nothing but implement the solution for developing the CRM. Therefore, it needs to be observed for the long haul, and it seems that we need to approach more systematically to implementation cases for each industry about implementation of the CRM. Fourth, the CRM is no longer the preserve of major companies, and it is the time that medium and small sized enterprises also need it. Taking lesson from Switzerland's small size store merchants who successfully adopt right size of the CRM for their business, for domestic medium and small sized enterprises, the necessity to develop business through developing the CRM models which fit their situations and maintaining relationships with customers has been grown. Fifth, for adopting the CRM business processes, changing or converting the CRM system to the model which fits the company's situation is important rather than applying the advanced company's CRM system model. In other words, the CRM solution which can maximize their own strength by developing the CRM program that makes the most of features and characteristics of the company should be adopted.

  • PDF

A Study on Emergence of Innovative Retailing and Its Development Process (혁신적인 소매업태의 출현과 발전과정에 관한 연구)

  • Park, Chul-Ju;Jeong, Tae-Seok
    • Journal of Distribution Science
    • /
    • v.9 no.1
    • /
    • pp.29-38
    • /
    • 2011
  • Since a distribution market was opened in 1993 after the conclusion of the Uruguay Round (UR), various new businesses emerged in the Korean retail industry, such as convenience shops, supermarkets, specialty stores, non-store marketing methods, and cyber shopping malls, in addition to traditional markets and department stores. Competition among these retail businesses has intensified. According to the National Statistical Office (NSO), the growth rate of the total retail industry has shown a 32% increase in the past 5 years. While department stores, supermarkets, specialty stores, and other non-store retailing venues have shown signs of stagnation at a growth rate of 20-30%, which is similar to the growth rate of the entire retail industry, convenience shops and non-store marketing have shown 60-70% growth over the same period. By comparison, the growth rate of cyber shopping malls has nearly tripled. When applying development aspects of retail businesses through the competition to the retail life cycle, mom-and-pop stores and traditional markets have already entered the decline phase as specialty stores reach their maturity phase and demonstrate their limit of growth. Department stores are now in the latter part of the growth phase, which is still considered to have some growth potential. Big super markets are still in the early part of their growth stage although they were introduced 20 years ago. Meanwhile, retail businesses such as convenience stores, supermarkets, mail order houses, and warehouse stores are entering the middle growth phase and are expected to continue with their quantitative growth. At a time when most retail businesses in Korea are in a state of development or in the full growth stage, what kind of new innovative retailing will appear and develop? Moreover, what growth engine will drive it? This study analyzes the appearance of innovative retailing and its development process by establishing a discussable consumer's choice model through the interlocking mutual behavior of differentiated competitiveness and consumers' choice based on an awareness of this issue. The analysis of the results of this study can be summarized as follows. First, if a new vacuum zone emerges at the retail market level, innovative retailing such as low price/low service or high price/high service will emerge simultaneously. Second, if the number of new businesses in the vacuum zone increases, this will create competitiveness among the businesses, and each retailer will develop raising of level. Third, if a new business that raises the level develops, competition between the new and the existing retailer will occur, and an assimilation process between the existing retailing and the new retailing will be unfolded. Fourth, each retailing will promote distribution innovations in order to break the frontier of the existing distribution technology, and other retailing will follow the innovator. On the basis of an analysis of the abovementioned results, this study presents the following three suggestions. First, responding to the consumer's decision-making process on the attributes of retail shops that promote differentiation in strategies, this study established a consumer's choice model that can be discussed in relation to changes in market share. Second, this study provided an analysis of the emerging and developmental processes of innovative retail businesses using a more precise logical structure on the basis of the consumer's choice model described in this study. Third, the development process of retail businesses discussed in this study presented retailing solutions regarding management aspects on how to compose a strong retail mix that can help retail businesses gain competitive advantages in the market.

  • PDF

Database Security System supporting Access Control for Various Sizes of Data Groups (다양한 크기의 데이터 그룹에 대한 접근 제어를 지원하는 데이터베이스 보안 시스템)

  • Jeong, Min-A;Kim, Jung-Ja;Won, Yong-Gwan;Bae, Suk-Chan
    • The KIPS Transactions:PartD
    • /
    • v.10D no.7
    • /
    • pp.1149-1154
    • /
    • 2003
  • Due to various requirements for the user access control to large databases in the hospitals and the banks, database security has been emphasized. There are many security models for database systems using wide variety of policy-based access control methods. However, they are not functionally enough to meet the requirements for the complicated and various types of access control. In this paper, we propose a database security system that can individually control user access to data groups of various sites and is suitable for the situation where the user's access privilege to arbitrary data is changed frequently. Data group(s) in different sixes d is defined by the table name(s), attribute(s) and/or record key(s), and the access privilege is defined by security levels, roles and polices. The proposed system operates in two phases. The first phase is composed of a modified MAC (Mandatory Access Control) model and RBAC (Role-Based Access Control) model. A user can access any data that has lower or equal security levels, and that is accessible by the roles to which the user is assigned. All types of access mode are controlled in this phase. In the second phase, a modified DAC(Discretionary Access Control) model is applied to re-control the 'read' mode by filtering out the non-accessible data from the result obtained at the first phase. For this purpose, we also defined the user group s that can be characterized by security levels, roles or any partition of users. The policies represented in the form of Block(s, d, r) were also defined and used to control access to any data or data group(s) that is not permitted in 'read ' mode. With this proposed security system, more complicated 'read' access to various data sizes for individual users can be flexibly controlled, while other access mode can be controlled as usual. An implementation example for a database system that manages specimen and clinical information is presented.

What happens after IT adoption?: Role of habits, confirmation, and computer self-efficacy formed by the experiences of use (정보기술 수용 후 주관적 지각 형성: 사용 경험에서 형성된 습관, 기대일치, 자기효능감의 역할)

  • Kim, Yong-Young;Oh, Sang-Jo;Ahn, Joong-Ho;Jahng, Jung-Joo
    • Asia pacific journal of information systems
    • /
    • v.18 no.1
    • /
    • pp.25-51
    • /
    • 2008
  • Researchers have been continuously interested in the adoption of information technology (IT) since it is of great importance to the information systems success and it is also an important stage to the success. Adoption alone, however, does not ensure information systems success because it does not necessarily lead to achieving organizational or individual objectives. When an organization or an individual decide to adopt certain information technologies, they have objectives to accomplish by using those technologies. Adoption itself is not the ultimate goal. The period after adoption is when users continue to use IT and intended objectives can be accomplished. Therefore, continued IT use in the post-adoption period accounts more for the accomplishment of the objectives and thus information systems success. Previous studies also suggest that continued IT use in the post-adoption period is one of the important factors to improve long-term productivity. Despite the importance there are few empirical studies focusing on the user behavior of continued IT use in the post-adoption period. User behavior in the post-adoption period is different from that in the pre-adoption period. According to the technology acceptance model, which explains well about the IT adoption, users decide to adopt IT assessing the usefulness and the ease of use. After adoption, users are exposed to new experiences and they shape new beliefs different from the thoughts they had before. Users come to make decisions based on their experiences of IT use whether they will continue to use it or not. Most theories about the user behaviors in the pre-adoption period are limited in describing them after adoption since they do not consider user's experiences of using the adopted IT and the beliefs formed by those experiences. Therefore, in this study, we explore user's experiences and beliefs in the post-adoption period and examine how they affect user's intention to continue to use IT. Through deep literature reviews on the construction of subjective beliefs by experiences, we draw three meaningful constructs which theoretically have great impacts on the continued use of IT: perceived habit, confirmation, and computer self-efficacy. Then, we examine the role of the subjective beliefs on the cognitive/affective attitudes and intention to continue to use that IT. We set up a research model and conducted survey research. Since IT use implies interactions among a user, IT, and a task, we carefully selected the sample of users using same/similar IT to perform same/similar tasks, to exclude unwanted influences of other factors than subjective beliefs on the IT use. We also considered that the sample of users were able to make decisions to continue to use IT volitionally or at least quasi-volitionally. For each construct, we used measurement items recognized for reliability and widely used in the previous research. We slightly modified some items proper to the research context and a pilot test was carried out for forty users of a portal service in a university. We performed a full-scale survey after verifying the reliability of the measurement. The results show that the intention to continue to use IT is strongly influenced by cognitive/affective attitudes, perceived habits, and computer self-efficacy. Confirmation affects the intention to continue indirectly through cognitive/affective attitudes. All the constructs representing the subjective beliefs built by the experiences of IT use have direct and/or indirect impacts on the intention of users. The results also show that the attitudes in the post-adoption period are formed, at least partly, by the experiences of IT use and newly shaped beliefs after adoption. The findings suggest that subjective beliefs built by the experiences have deep impacts on the continued use. The results of the study signify that while experiencing IT in the post-adoption period users form new beliefs, attitudes, and intentions which may be different from those of the pre-adoption period. The results of this study partly demonstrate that the beliefs shaped by the behaviors, those are the experiences of IT use, influence users' attitudes and intention. The results also suggest that behaviors (experiences) also change attitudes while attitudes shape behaviors. If we combine the findings of this study with the results of the previous research on IT adoption, we can propose a cycle of IT adoption and use where behavior shapes attitude, the attitude forms new behavior, and that behavior shapes new attitude. Different from the previous research, the study focused on the user experience after IT adoption and empirically demonstrated the strong influence of the subjective beliefs formed in the post-adoption period on the continued use. This partly confirms the differences between attitudes in the pre-adoption and in the post-adoption period. Users continuously change their attitudes and intentions while experiencing (using) IT. Therefore, to make users adopt IT and to make them use IT after adoption is a different problem. To encourage users to use IT after adoption, experiential variables such as perceived habit, confirmation, and computer self-efficacy should be managed properly.

Properties of Pepper growth and Yield, Cost Down with No-Tillage Organic Cultivation in Vinyl Greenhouse (시설고추 무경운 유기 재배의 생육 및 수량 특성과 생산비 절감효과)

  • Yang, Seung-Koo;Seo, Youn-Won;Son, Jang-Hwan;Park, Jong-Dae;Choi, Kyung-Ju;Jung, Woo-Jin
    • Korean Journal of Organic Agriculture
    • /
    • v.20 no.3
    • /
    • pp.411-422
    • /
    • 2012
  • To investigate the possibility of sustainable agriculture in no-tillage pepper this study was carried out in vinyl greenhouse with organic cultivation having no pesticide certification. 1. Growth and yield in pepper cultivation General growth in pepper was suppressed with decreasing hill spacing, primary branch length, and stem width. Fruit diameter and fruit weight in no-tillage increased significantly, and yield of pepper increased by 10% compared with conventional tillage. From results organic cultivation in no-tillage improved a quality of pepper compared with conventional tillage. 2. Production cost of conventional tillage and no-tillage Production cost of conventional tillage and no-tillage was not different in seed cost, inorganic fertilizer cost, pesticide cost, repair cost, light agricultural tool cost, agriculture facilities depreciation cost and so on. Intermediary goods cost in no-tillage was decreased by 11% for organic fertilizer cost, light and heat expenses and power rate, heavy agricultural tool cost, and repairing expenses compare with conventional tillage. Employment effort cost and work effort cost were decreased, and farm income and farm income rate were increased by 11% and 5%, respectively, in no-tillage. In this work, yield and gross income were increased by 10% and 25%, respectively, in no-tillage. Therefore material cost, intermediary goods cost, working expensive, farm income, and income rate were increased by 34%, 3%, 2%, 52% and 22%, respectively.

Questionnaire Study on the Difficulties and Improvements of the 6th Industrialization Dairy Farm (설문을 통한 6차산업형 목장경영의 애로사항과 개선방안에 관한 연구)

  • Lee, Jin-Sung;Nam, Ki-Taeg;Park, Seong-Min;Son, Yong-Suk
    • Journal of Dairy Science and Biotechnology
    • /
    • v.34 no.4
    • /
    • pp.255-262
    • /
    • 2016
  • This study was conducted to investigate the difficulties of dairy farms in practicing 6th industrialization and methods for overcoming these difficulties. A qustionnaire survey was carried out to examine the present states of farms, recognition of the farmstead milk-processing market situation, possibility of farmstead milk processing for reducing the raw milk surplus, assessment of government policies, and difficulties dairy farmers confront in realizing the 6th industrialization. Farm sizes, types, and human resources organizations varied between farms. Most farmers were producing yogurt and/or fresh (string or barbecue) cheeses, which were marketed through 'Visit and Purchase' channel. Farmers who answered the questionnaire were relatively positive about the current situation of farmstead milk processing, expecting to be involved in the disposal of excess raw milk. Nevertheless, they responded negatively about current relevant policies, citing the main difficulties caused by 'excessive regulation'. Other barriers to successful '6th industrialization' are difficulties in marketing and lack of funds. Approximately 19% of dairy farms practicing the '6th industrialization' use automatic milking system (AMS) and 38.46% of dairy farmers whose milking depends on conventional milking system intend to introduce AMS in the future. Positive expectations of AMS adoption were mostly related to 'lack of time and labor', 'exhibiting for tourism', and 'succession of dairying'.