• Title/Summary/Keyword: Analysis of transaction network

Search Result 124, Processing Time 0.022 seconds

A Transaction Cost Approach to Analysis on Determinants of Korean SMEs' Transformation into Direct Export (거래비용이론을 이용한 중소기업의 직접수출 전환 결정요인 분석)

  • HA, Sungheun;Jeong, Yoon-Say;Park, Hyun-Hee
    • International Commerce and Information Review
    • /
    • v.18 no.3
    • /
    • pp.181-201
    • /
    • 2016
  • In this study, transaction cost approach was applied to analysis on direct export determinants of SMEs by using key attributes of transactions, asset specificity, environmental uncertainty, frequency and marketing capability, with a parameter of opportunism. Typical Transaction Cost Analysis theory explains that when transaction cost with business channels(whether it is for buy or sell) increase, the firms integrate the channels. So it is a choice made by firms regarding direct versus indirect channels. The theory was extended to a model of choice of institutional form of direct or indirect export by a norm of opportunism in this empirical study. The survey result showed that lower level of asset specificity and marketing capability or higher level of environmental uncertainty were likely to expose indirect exporters to higher level of opportunism of direct exporter. And we also saw that indirect exporters were likely to choose direct export chanel when opportunism of exporters was higher. From the standpoint of theory, we can say that the basic propositions of the Transaction Cost Analysis, except the attribute of frequency, are supported. This study result could provide a profiling of target business areas and firms for government's policy on direct export promotion of SMEs.

  • PDF

Modeling and Analysis of a Reordering-based Optimistic Cache Consistency Protocol (재배열 기반의 낙관적 캐쉬 일관성 유지 기법의 모델링과 분석)

  • Cho, Sung-Ho;Hwang, Jeong-Hyon
    • Journal of KIISE:Databases
    • /
    • v.28 no.3
    • /
    • pp.458-467
    • /
    • 2001
  • Optimistic Two-Phase Locking(O2PL) performs as well as or better than the other approaches because it exploits client caching well and also has relatively lower network bandwidth requirements. However, O2PL leads to unnecessary waits, because, it can not be commit a transaction until the transaction obtains all requested locks. In addition, Optimistic Concurrency Control(OCC) tends to make needless aborts. This paper suggests an efficient optimistic cache consistency protocol that overcomes such shortcomings. Our scheme decides whether to commit or abort a transaction without wait and it adopts transaction re-ordering in order to minimize the abort rate. Our scheme needs only one version for each data item in spite of the re-ordering mechanism used. Finally, this paper presents a simulation-based analysis that shows superiority in performance of out scheme to O2PL and OCC.

  • PDF

A Load Flow Based Approach to Transaction Cost Allocation in Transmission Network (조류계산에 기초한 탁송요금 계산)

  • Park, Young-Moon;Lim, Jung-Uk;Won, Jong-Ryul;Park, Jong-Bae
    • Proceedings of the KIEE Conference
    • /
    • 1997.07c
    • /
    • pp.1149-1152
    • /
    • 1997
  • This paper describes a novel approach for allocating transmission costs among users of transmission services. In the suggested approach, the cost share of each participant is proportional to amount of its line flow. To develop individual user's impact, the line utilization factors of each participant are derived by power flow equations of all nodes (i.e., load-flow equations). To deal With the slack bus problem inherent in the conventional load-flow analysis more practically, a additional power supply/demand balance equation is incorporated. Although the developed allocation rule is basically similar to the existing MW-mile method in the aspect of embedded cost allocation, it does not require to get load flow solutions of each wheeling transaction when multiple transmission transactions are considered.

  • PDF

A Study On the Clusters In the Electronic Industry Using Social Network Analysis (사회적 네트워크 분석을 이용한 전자산업 클러스터 연구)

  • Jung, Jaeheon
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.5
    • /
    • pp.48-63
    • /
    • 2019
  • We tried new analysis including social network analysis(SNA) on the transaction network centered on electronic companies using more than 50 thousand company transaction data obtained from Korean enterprise data (KED) for the year of 2015. We found 97 clusters having more than 10 firms and remarkable 13 clusters having more than 90% sales of the electronic industry in Korea. Clusters are the groups of companies having most of their transactions in the clusters they belong to. We found 5 clusters have 83% of sales in the electronic industry. Most of clusters have main single firms having most of the sales in each clusters except a few clusters. However, we found a few firms to have high rear production linkage effect and found the firms with high linkage effect specially for the small and medium size enterprise (SME). The companies with high production linkage (specially on SMEs) should be managed in terms of (SME) growth policy. The last firm group consisting of the small clusters with less than 10 firms has high employment coefficients. The clusters or company having high production linkage effect on this last firm group should be noted in the terms of employment policy. We also note that there exist the firms with the high value of betweenness coefficients meaning high potential of technology development. They should be managed carefully in terms of technology development policy.

The fashion consumer purchase patterns and influencing factors through big data - Based on sequential pattern analysis -

  • Ki Yong Kwon
    • The Research Journal of the Costume Culture
    • /
    • v.31 no.5
    • /
    • pp.607-626
    • /
    • 2023
  • This study analyzes consumer fashion purchase patterns from a big data perspective. Transaction data from 1 million transactions at two Korean fashion brands were collected. To analyze the data, R, Python, the SPADE algorithm, and network analysis were used. Various consumer purchase patterns, including overall purchase patterns, seasonal purchase patterns, and age-specific purchase patterns, were analyzed. Overall pattern analysis found that a continuous purchase pattern was formed around the brands' popular items such as t-shirts and blouses. Network analysis also showed that t-shirts and blouses were highly centralized items. This suggests that there are items that make consumers loyal to a brand rather than the cachet of the brand name itself. These results help us better understand the process of brand equity construction. Additionally, buying patterns varied by season, and more items were purchased in a single shopping trip during the spring season compared to other seasons. Consumer age also affected purchase patterns; findings showed an increase in purchasing the same item repeatedly as age increased. This likely reflects the difference in purchasing power according to age, and it suggests that the decision-making process for pur- chasing products simplifies as age increases. These findings offer insight for fashion companies' establishment of item-specific marketing strategies.

Security Evaluation Criteria of Electronic Payment System (전자 지불 시스템의 보안 평가 기준)

  • 신장균;황재준
    • Proceedings of the CALSEC Conference
    • /
    • 1999.07b
    • /
    • pp.491-500
    • /
    • 1999
  • Recent increase of commercial network Integration to World Wide Web(WWW) shifts an ordinary commerce to electronic environment. This draws more people to examine re-assurance of their secure transaction. This study investigates current status of security methodology for Electronic Payment System and extracts important axis of security level for electronic payment. Using these axis as security evaluation criteria, the research proposes a security matrix which consists of four different level of security granularity, hence allowing evaluation of a nation-wide credit card based payment system. Feasible usage of this matrix contributes to security analysis of the electronic system as whole, hence providing better secured electronic environment.

  • PDF

Analysis of Text Mining of Consumer's Personality Implication Words in Review of Used Transaction Application (중고거래 어플리케이션 <당근마켓> 리뷰텍스트에 나타난 소비자의 인성 함축단어 텍스트마이닝 분석)

  • Jung, Yea-Rin;Ju, Young-Ae
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.11
    • /
    • pp.1-10
    • /
    • 2021
  • This study analyzes the use and meaning of consumer personality implication words in the review text of the Used Transaction Application . From of May 2021, the data were collected for the past six months by our Web crawler in Seoul and Gyeonggi Province, and a total of 1368 cases were collected first by random sampling, and finally 570 cases were preprocessed. The results are as follows. First, 48.2% of review texts were related to the personality of consumers even though it was a commercial platform of products. Second, the review text is mainly positive, which formed a text network structure based on the keyword 'gratitude'. Third, the review text, which implies consumer character, was divided into two groups: 'extrovert personality' and 'introvert personality' of consumers. And the individuality of the two groups worked together on the platform. In conclusion, we would like to suggest that consumer personality plays an important role in the platform transaction process, that consumer personality will play a role in the services of the platform in the future, and that consumer personality should be studied from various perspectives.

Analysis of Geographic Network Structure by Business Relationship between Companies of the Korean Automobile Industry (한국 자동차산업의 기업간 거래관계에 의한 지리적 네트워크 구조 분석)

  • KIM, Hye-Lim;MOON, Tae-Heon
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.24 no.3
    • /
    • pp.58-72
    • /
    • 2021
  • In July 2021, UNCTAD classified Korea as a developed country. After the Korean War in the 1950s, economic development was promoted despite difficult conditions, resulting in epoch-making national growth. However, in order to respond to the rapidly changing global economy, it is necessary to continuously study the domestic industrial ecosystem and prepare strategies for continuous change and growth. This study analyzed the industrial ecosystem of the automobile industry where it is possible to obtain transaction data between companies by applying complexity spatial network analysis. For data, 295 corporate data(node data) and 607 transaction data (link data) were used. As a result of checking the spatial distribution by geocoding the address of the company, the automobile industry-related companies were concentrated in the Seoul metropolitan area and the Southeastern(Dongnam) region. The node importance was measured through degree centrality, betweenness centrality, closeness centrality, and eigenvector centrality, and the network structure was confirmed by identifying density, distance, community detection, and assortativity and disassortivity. As a result, among the automakers, Hyundai Motor, Kia Motors, and GM Korea were included in the top 15 in 4 indicators of node centrality. In terms of company location, companies located in the Seoul metropolitan area were included in the top 15. In terms of company size, most of the large companies with more than 1,000 employees were included in the top 15 for degree centrality and betweenness centrality. Regarding closeness centrality and eigenvector centrality, most of the companies with 500 or less employees were included in the top 15, except for automakers. In the structure of the network, the density was 0.01390522 and the average distance was 3.422481. As a result of community detection using the fast greedy algorithm, 11 communities were finally derived.

Source Localization Techniques for Magnetoencephalography (MEG)

  • Kwang-Ok An;Chang-Hwan Im;Hyun-Kyo Jung;Yong-Ho Lee;Hyuk-Chan Kwon
    • KIEE International Transaction on Systems and Control
    • /
    • v.2D no.2
    • /
    • pp.53-58
    • /
    • 2002
  • In this paper, various aspects in magnetoencephalography (MEG) source localization are studied. To minimize the errors in experimental data, an approximation technique using a polynomial function is proposed. The simulation shows that the proposed technique yields more accurate results. To improve the convergence characteristics in the optimization algorithm, a hybrid algorithm of evolution strategy and sensitivity analysis is applied to the neuromagnetic inverse problem. The effectiveness of the hybrid algorithm is verified by comparison with conventional algorithms. In addition, an artificial neural network (ANN) is applied to find an initial source location quickly and accurately. The simulation indicates that the proposed technique yields more accurate results effectively.

  • PDF

A Secure Credit Card Transaction Method Based on Kerberos

  • Kim, Jung-Eun;Kim, Yoo-Hwan
    • Journal of Computing Science and Engineering
    • /
    • v.5 no.1
    • /
    • pp.51-70
    • /
    • 2011
  • This paper introduces a new credit card payment scheme called No Number Credit Card that can significantly reduce the possibility of credit card fraud. The proposed payment system is loosely based on Kerberos, a cryptographic framework that has stood the test of time. In No Number Credit Card, instead of card numbers, only payment tokens are exchanged between the customers and merchants. The tokens are generated based on the payment amount, payment type, client information, and merchant information. However, it does not contain the credit card number, so the merchant or a database hacker cannot acquire and illegally use any credit card numbers. The No Number Credit Card system is ideal for online e-commerce transactions and can be used with any credit card that users possess. It can be used with minor modifications to the current card payment system. We provide the principles of its operation through scenario analysis, a sample implementation, and a security analysis