• Title/Summary/Keyword: 철모

Search Result 90, Processing Time 0.028 seconds

Influencing Factors on Knowledge Adoption of Administrator in an Online Idea Proposal Community: Focusing on the Tourism Idea Bank of Korea Tourism Organization (온라인 아이디어 제안 커뮤니티에서 담당자 지식수용에 영향을 미치는 요인: 한국관광공사 관광아이디어뱅크 게시판을 중심으로)

  • Park, Jong-Won;Koo, Chulmo;Yang, Sung-Byung
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.10
    • /
    • pp.1-17
    • /
    • 2016
  • Recently, although many government agencies, including the Korea Tourism Organization, have been operating two-way interactive online idea proposal communities in order to reflect the various ideas of citizens in business, the utilization rate is still extremely low due to the lack of public's understandings and management's commitments. Therefore, based on previous studies on the characteristics of information quality, this research (1) derives key factors constituting idea quality in the context of online idea proposal communities, (2) classifies them into the content cues (value-added, relevancy, originality, and completeness) and the non-content cue (amount of writing) according to the heuristic-systematic model, and (3) finally validates how these content/non-content cues influence the knowledge adoption of administrators in an online idea proposal community. The findings of the structural equation modeling analysis with all of the 240 completed idea proposals in the 'Tourism Idea Bank' of Korea Tourism Organization reveal that, among content cues, value-added, relevancy, and originality have a significant effect on knowledge adoption. Moreover, it is also found that amount of writing as a non-content cue has a positive moderation effect on the relationships between originality and knowledge adoption.

Analyzing the Importance and Priority of Safety Information in Walking Tourism: Focusing on Open Data Utilization (도보여행 안전정보의 유형별 중요도 및 우선순위 도출: 오픈데이터 활용을 중심으로)

  • Ham, Juyeon;Choi, Sujeong;Koo, Chulmo
    • Knowledge Management Research
    • /
    • v.19 no.1
    • /
    • pp.59-77
    • /
    • 2018
  • The tourism industry is now changing to smart tourism, which maximizes tourists' overall tourism experience with the use of advanced mobile technologies and emphasizes the utilization of tourism information. Despite the quantitative expansion of the tourism industry, there is a lack of academic and practical discussion on tourism safety. Especially, in the context of walking tourism, tourists are more likely to be exposed to natural or social disasters and emergencies. Therefore, it is necessary to build a system that can provide walking tourists with safety information not only on dangerous factors which are anticipated to be confronted during a walking trip in advance but also on specific dangers in real time. Under the circumstances, this study seeks to identify the types of tourism safety information that can be offered by using publicly available open data, drawing on the safety information framework on the walking tourism that is presented in Choi et al. (2017)'s study. More specifically, this study focuses on the use of open data which is provided by the Korean government. Furthermore, this study verifies the types of safety information that are most urgently needed in walking travel situations. Specifically, this study aims to derive the importance and priority of each type of safety information for a walking trip by applying the analytic hierarchy process (AHP) analysis. For this, we collected 35 questionnaires from walking tour operators (practitioners) and walking tourists. The main results are as follows. First, natural disaster information is the most important factor in the top-level factor of safety information for walking tourists, followed by social disaster, life safety, and exhibition (security crisis) information. Second, information on natural disasters, environmental pollution, and weather is considered to be important at the sub-level factor. Lastly, the noteworthy result of this study is that the importance of each type of safety information varies depending on the walking tour operators (practitioners) and the walking tourists. That is, there is a recognition difference between the operator (practitioner) and the user in the importance and priority of the safety information of the walking trip. Therefore, it is necessary to develop policies and services reflecting the opinions of potential users when providing safety information so that the most importantly recognized information can be provided first.

An Empirical Investigation into the Role of Core-Competency Orientation and IT Outsourcing Process Management Capability (핵심역량 지향성과 프로세스 관리역량이 IT 아웃소싱 성과에 미치는 연구)

  • Kim, Yong-Jin;Nam, Ki-Chan;Song, Jae-Ki;Koo, Chul-Mo
    • Asia pacific journal of information systems
    • /
    • v.17 no.3
    • /
    • pp.131-146
    • /
    • 2007
  • Recently, the role of IT service providers has been enlarged from managing a single function or system to reconstructing entire information management processes in new ways to contribute to shareholder value across the enterprise. This movement toward extensive and complex outsourcing agreements has been driven by the assumption that outsourcing information technology functions is a reliable approach to maximizing resource productivity. Hiring external IT service providers to manage part or all of its information-related services helps a firm focus on its core business and provides better services to its clients, thus obtaining sustainable competitive advantage. This practice of focusing on the strategic aspect of outsourcing is referred to as strategic sourcing where the focus is capability sourcing, not procurement. Given the importance of the strategic outsourcing, however, to our knowledge, there is little empirical research on the relationship between the strategic outsourcing orientation and outsourcing performance. Moreover, there is little research on the factor that makes the strategic outsourcing effective. This study is designed to investigate the relationship between strategic IT outsourcing orientation and IT outsourcing performance and the process through which strategic IT outsourcing orientation influences outsourcing performance, Based on the framework of strategic orientation-performance and core competence based management, this study first identifies core competency orientation as a proper strategic orientation pertinent to IT outsourcing and IT outsourcing process management capability as the mediator to affect IT outsourcing performance. The proposed research model is then tested with a sample of 200 firms. The findings of this study may contribute to the literature in two ways. First, it draws on the strategic orientation - performance framework in developing its research model so that it can provide a new perspective to the well studied phenomena. This perspective allows practitioners and researchers to look at outsourcing from an angle that emphasizes the strategic decision making to outsource its IT functions. Second, by separating the concept of strategic orientation and outsourcing process management capability, this study provides practices with insight into how the strategic orientation can work effectively to achieve an expected result. In addition, the current study provides a basis for future studies that examine the factors affecting IT outsourcing performance with more controllable factors such as IT outsourcing process management capability rather than external hard-to-control factors including trust and relationship management. This study investigates the major factors that determine IT outsourcing success. Based on strategic orientation and core competency theories, we develop the proposed research model to investigate the relationship between core competency orientation and IT outsourcing performance and the mediating role of IT outsourcing process management capability on IT outsourcing performance. The model consists of two independent variables (core-competency-orientation and IT outsourcing process management capability), and two dependent variables (outsourced task complexity and IT outsourcing performance). Comprehensive data collection was conducted through an outsourcing association. The survey data were analyzed using a structural analysis method. IT outsourcing process management capability was found to mediate the effect of core competency orientation on both outsourced task complexity and IT outsourcing performance. Further analysis and findings are discussed.

Determinants of Hotel Customers' Use of the Contactless Service: Mixed-Method Approach (호텔 고객의 비대면 서비스 이용의도의 영향요인에 대한 연구)

  • Chung, Hee Chung;Koo, Chulmo;Chung, Namho
    • Knowledge Management Research
    • /
    • v.22 no.3
    • /
    • pp.235-252
    • /
    • 2021
  • The development of information and communication technology and COVID-19 have caused an unusual change in the hotel industry, and the demand for the contactless services such as service robots from hotel customers has surged. Therefore, this study investigates the perception of hotel customers on contactless services by applying a mixed-method analysis. Specifically, this study identified the causal correlations between variables through the structural equation model, and further applied the fuzzy set qualitative comparison analysis to derive patterns of variables that form the intention to use the non-face-to-face services. As a result of the analysis, it was shown that service experience co-creation, palyfulness, personalization, and trust had a significant effect on intention to use through the contactless service use desire. On the other hand, in the results of fuzzy-set qualitative comparison analysis, playfulness was derived as a core factor in all patterns. Based on these analysis results, this study provides academic basis for in-depth understanding of hotel customers' perception of contactless service and specific guidelines for hotel managers on the contactless service strategies in the era of COVID-19 pandemic.

Olive Pests in Jeju, Korea (제주도 올리브 과원에 발생하는 해충 종류)

  • Kyung San Choi;Sang-Wook Goh;Hyeonseok Oh;Hyojoong Kim;Sora Kim;Jeong Joon Ahn
    • Korean journal of applied entomology
    • /
    • v.62 no.2
    • /
    • pp.103-107
    • /
    • 2023
  • Fifteen insect species have been identified as olive pests through a survey conducted in olive orchards on Jeju island from 2019 to 2022. The occurrence and fruit damage caused by Lepidopteran and hemipteran were significant severity. Among the moths, the order in which the population was large was as follows: Alpita nigropunctalis, Aterpia circumfluxana, Homona magnanima, and Adoxophyes honmai. These lepidopteran species primarily caused damage to leaves, but P. nigropunctalis inflicted severe damage to the fruits by feeding on the inside. Three stink bugs, namely Plautia stali, Halyomorpha halys, and Chinavia hilaris, were commonly observed and responsible for damaging olive furits. Chrysomphalus bifasciculatus and Pseudaulacaspis pentagona were found to occur and damaged fruit in non-controlled orchard. Prociphilus oleae, which is being recognized for the first time in Korea, and Ricania shantungensis discovered for the first timein olive orchard. Saissetia olea, a quarantine pest, was found in one farm, but subsequent pesticide spraying resulted in their elimination. Although severe damage was inflicted upon the olives, no perforated pests were found during the survey.

Analysis of Changes in Restaurant Attributes According to the Spread of Infectious Diseases: Application of Text Mining Techniques (감염병 확산에 따른 레스토랑 선택속성 변화 분석: 텍스트마이닝 기법 적용)

  • Joonil Yoo;Eunji Lee;Chulmo Koo
    • Information Systems Review
    • /
    • v.25 no.4
    • /
    • pp.89-112
    • /
    • 2023
  • In March 2020, as it was declared a COVID-19 pandemic, various quarantine measures were taken. Accordingly, many changes have occurred in the tourism and hospitality industries. In particular, quarantine guidelines, such as the introduction of non-face-to-face services and social distancing, were implemented in the restaurant industry. For decades, research on restaurant attributes has emphasized the importance of three attributes: atmosphere, service quality, and food quality. Nevertheless, to the best of our knowledge, research on restaurant attributes considering the COVID-19 situation is insufficient. To respond to this call, this study attempted an exploratory approach to classify new restaurant attributes based on understanding environmental changes. This study considered 31,115 online reviews registered in Naverplace as an analysis unit, with 475 general restaurants located in Euljiro, Seoul. Further, we attempted to classify restaurant attributes by clustering words within online reviews through TF-IDF and LDA topic modeling techniques. As a result of the analysis, the factors of "prevention of infectious diseases" were derived as new attributes of restaurants in the context of COVID-19 situations, along with the atmosphere, service quality, and food quality. This study is of academic significance by expanding the literature of existing restaurant attributes in that it categorized the three attributes presented by existing restaurant attributes and further presented new attributes. Moreover, the analysis results have led to the formulation of practical recommendations, considering both the operational aspects of restaurants and policy implications.

A Case Study on the Smart Tourism City Using Big Data: Focusing on Tourists Visiting Jeju Province (빅 데이터를 활용한 스마트 관광 도시 사례 분석 연구: 제주특별자치도 관광객 데이터를 중심으로)

  • Junhwan Moon;Sunghyun Kim;Hesub Rho;Chulmo Koo
    • Information Systems Review
    • /
    • v.21 no.2
    • /
    • pp.1-27
    • /
    • 2019
  • It is possible to provide Smart Tourism Service through the development of information technology. It is necessary for the tourism industry to understand and utilize Big Data that has tourists' consumption patterns and service usage patterns in order to continuously create a new business model by converging with other industries. This study suggests to activate Jeju Smart Tourism by analyzing Big Data based on credit card usage records and location of tourists in Jeju. The results of the study show that First, the percentage of Chinese tourists visiting Jeju has decreased because of the effect of THAAD. Second, Consumption pattern of Chinese tourists is mostly occurring in the northern areas where airports and duty-free shops are located, while one in other regions is very low. The regional economy of Jeju City and Seogwipo City shows a overall stagnation, without changes in policy, existing consumption trends and growth rates will continue in line with regional characteristics. Third, we need a policy that young people flow into by building Jeju Multi-complex Mall where they can eat, drink, and go shopping at once because the number of young tourists and the price they spend are increasing. Furthermore, it is necessary to provide services for life-support related to weather, shopping, traffic, and facilities etc. through analyzing Wi-Fi usage location. Based on the results, we suggests the marketing strategies and public policies for understanding Jeju tourists' patterns and stimulating Jeju tourism industry.

The Effects of Social Media on Traveler's Autobiographical Memory and Intention to Revisit Travel Destination (소셜 미디어가 관광객의 자서전적 기억과 관광지 재방문 의도에 미치는 영향)

  • Hyunae Lee;Namho Chung;Chulmo Koo
    • Information Systems Review
    • /
    • v.18 no.3
    • /
    • pp.51-71
    • /
    • 2016
  • Tourism products are intangible goods. Given this nature, tourist experience should be recorded and visualized through media, such as pictures, videos, and souvenir. Online platforms played the role of media given the growth of information and communication technology. Tourists post their travels for real-time documentation of their experiences, but they also tend to reminisce about past experiences that they posted on social media. Social media is not only a channel of self-presentation or a means of communication with other people, but it also serves as an archive of electronic records to bring back memories. Given this finding, we investigated the impact of social media on the autobiographical memory (recollection and vividness) of tourists and their intention to revisit a certain destination. The results showed social media interface and the impact of display quality on the recollection and vivid memory. The predictor of memory recollection of tourists is intention to revisit a destination. Social media is considered an archive of travel memory that indulges people to reminisce. Theoretical and practical implications were provided based on these results.

A Study on the Effect of Location-based Service Users' Perceived Value and Risk on their Intention for Security Enhancement and Continuous Use: With an Emphasis on Perceived Benefits and Risks (위치기반서비스 사용자의 지각된 가치와 위험이 보안강화의도와 지속이용의도에 미치는 영향에 관한 연구: 지각된 혜택과 위험을 중심으로)

  • Park, Kyung Ah;Lee, Dae Yong;Koo, Chulmo
    • Asia pacific journal of information systems
    • /
    • v.24 no.3
    • /
    • pp.299-323
    • /
    • 2014
  • The reason location based service is drawing attention recently is because smart phones are being supplied increasingly. Smart phone, basically equipped with GPS that can identify location information, has the advantage that it can provide contents and services suitable for the user by identifying user location accurately. Offering such diverse advantages, location based services are increasingly used. In addition, for use of location based services, release of user's personal information and location data is essentially required. Regarding personal information and location data, in addition to IT companies, general companies also are conducting various profitable businesses and sales activities based on personal information, and in particular, personal location data, comprehending high value of use among personal information, are drawing high attentions. Increase in demand of personal information is raising the risk of personal information infringement, and infringements of personal location data also are increasing in frequency and degree. Therefore, infringements of personal information should be minimized through user's action and efforts to reinforce security along with Act on the Protection of Personal Information and Act on the Protection of Location Information. This study aimed to improve the importance of personal information privacy by empirically analyzing the effect of perceived values on the intention to strengthen location information security and continuously use location information for users who received location-based services (LBS) in mobile environments with the privacy calculation model of benefits and risks as a theoretical background. This study regarded situation-based provision, the benefit which users perceived while using location-based services, and the risk related to personal location information, a risk which occurs while using services, as independent variables and investigated the perceived values of the two variables. It also examined whether there were efforts to reduce risks related to personal location information according to the values of location- based services, which consumers perceived through the intention to strengthen security. Furthermore, it presented a study model which intended to investigate the effect of perceived values and intention of strengthening security on the continuous use of location-based services. A survey was conducted for three hundred ten users who had received location-based services via their smartphones to verify study hypotheses. Three hundred four questionnaires except problematic ones were collected. The hypotheses were verified, using a statistical method and a logical basis was presented. An empirical analysis was made on the data collected through the survey with SPSS 12.0 and SmartPLS 2.0 to verify respondents' demographic characteristics, an exploratory factor analysis and the appropriateness of the study model. As a result, it was shown that the users who had received location-based services were significantly influenced by the perceived value of their benefits, but risk related to location information did not have an effect on consumers' perceived values. Even though users perceived the risk related to personal location information while using services, it was viewed that users' perceived value had nothing to do with the use of location-based services. However, it was shown that users significantly responded to the intention of strengthening security in relation to location information risks and tended to use services continuously, strengthening positive efforts for security when their perceived values were high.

Mediating Roles of Attachment for Information Sharing in Social Media: Social Capital Theory Perspective (소셜 미디어에서 정보공유를 위한 애착의 매개역할: 사회적 자본이론 관점)

  • Chung, Namho;Han, Hee Jeong;Koo, Chulmo
    • Asia pacific journal of information systems
    • /
    • v.22 no.4
    • /
    • pp.101-123
    • /
    • 2012
  • Currently, Social Media, it has widely a renown keyword and its related social trends and businesses have been fastly applied into various contexts. Social media has become an important research area for scholars interested in online technologies and cyber space and their social impacts. Social media is not only including web-based services but also mobile-based application services that allow people to share various style information and knowledge through online connection. Social media users have tendency to common identity- and bond-attachment through interactions such as 'thumbs up', 'reply note', 'forwarding', which may have driven from various factors and may result in delivering information, sharing knowledge, and specific experiences et al. Even further, almost of all social media sites provide and connect unknown strangers depending on shared interests, political views, or enjoyable activities, and other stuffs incorporating the creation of contents, which provides benefits to users. As fast developing digital devices including smartphone, tablet PC, internet based blogging, and photo and video clips, scholars desperately have began to study regarding diverse issues connecting human beings' motivations and the behavioral results which may be articulated by the format of antecedents as well as consequences related to contents that people create via social media. Social media such as Facebook, Twitter, or Cyworld users are more and more getting close each other and build up their relationships by a different style. In this sense, people use social media as tools for maintain pre-existing network, creating new people socially, and at the same time, explicitly find some business opportunities using personal and unlimited public networks. In terms of theory in explaining this phenomenon, social capital is a concept that describes the benefits one receives from one's relationship with others. Thereby, social media use is closely related to the form and connected of people, which is a bridge that can be able to achieve informational benefits of a heterogeneous network of people and common identity- and bonding-attachment which emphasizes emotional benefits from community members or friend group. Social capital would be resources accumulated through the relationships among people, which can be considered as an investment in social relations with expected returns and may achieve benefits from the greater access to and use of resources embedded in social networks. Social media using for their social capital has vastly been adopted in a cyber world, however, there has been little explaining the phenomenon theoretically how people may take advantages or opportunities through interaction among people, why people may interactively give willingness to help or their answers. The individual consciously express themselves in an online space, so called, common identity- or bonding-attachments. Common-identity attachment is the focus of the weak ties, which are loose connections between individuals who may provide useful information or new perspectives for one another but typically not emotional support, whereas common-bonding attachment is explained that between individuals in tightly-knit, emotionally close relationship such as family and close friends. The common identify- and bonding-attachment are mainly studying on-offline setting, which individual convey an impression to others that are expressed to own interest to others. Thus, individuals expect to meet other people and are trying to behave self-presentation engaging in opposite partners accordingly. As developing social media, individuals are motivated to disclose self-disclosures of open and honest using diverse cues such as verbal and nonverbal and pictorial and video files to their friends as well as passing strangers. Social media context, common identity- and bond-attachment for self-presentation seems different compared with face-to-face context. In the realm of social media, social users look for self-impression by posting text messages, pictures, video files. Under the digital environments, people interact to work, shop, learn, entertain, and be played. Social media provides increasingly the kinds of intention and behavior in online. Typically, identity and bond social capital through self-presentation is the intentional and tangible component of identity. At social media, people try to engage in others via a desired impression, which can maintain through performing coherent and complementary communications including displaying signs, symbols, brands made of digital stuffs(information, interest, pictures, etc,). In marketing area, consumers traditionally show common-identity as they select clothes, hairstyles, automobiles, logos, and so on, to impress others in any given context in a shopping mall or opera. To examine these social capital and attachment, we combined a social capital theory with an attachment theory into our research model. Our research model focuses on the common identity- and bond-attachment how they are formulated through social capitals: cognitive capital, structural capital, relational capital, and individual characteristics. Thus, we examined that individual online kindness, self-rated expertise, and social relation influence to build common identity- and bond-attachment, and the attachment effects make an impact on both the willingness to help, however, common bond seems not to show directly impact on information sharing. As a result, we discover that the social capital and attachment theories are mainly applicable to the context of social media and usage in the individual networks. We collected sample data of 256 who are using social media such as Facebook, Twitter, and Cyworld and analyzed the suggested hypotheses through the Structural Equation Model by AMOS. This study analyzes the direct and indirect relationship between the social network service usage and outcomes. Antecedents of kindness, confidence of knowledge, social relations are significantly affected to the mediators common identity-and bond attachments, however, interestingly, network externality does not impact, which we assumed that a size of network was a negative because group members would not significantly contribute if the members do not intend to actively interact with each other. The mediating variables had a positive effect on toward willingness to help. Further, common identity attachment has stronger significant on shared information.

  • PDF