• Title/Summary/Keyword: Build

Search Result 9,112, Processing Time 0.039 seconds

The Impact of e-Store Personality on e-Store Loyalty-Focus on the Mediating Role of Identification, Trust, and Engagement (온라인에서 점포 개성이 점포 충성도에 미치는 영향-동일시, 신뢰, 인게이지먼트의 매개 역할을 중심으로)

  • Park, Hyo-Hyun;Jung, Gang-Ok;Lee, Seung-Chang
    • Journal of Distribution Research
    • /
    • v.16 no.2
    • /
    • pp.57-94
    • /
    • 2011
  • Nowadays, it is common that most consumers are purchasing goods in e-stores. The e-stores eager to attract, revisit, retain, and finally convert them into loyal customers. The e-store marketers have planned and executed numerous marketing efforts. As one of the marketing activities, e-store managers attempt to build web sites that meet customers' functional and psychological needs. A wide array of studies has been done to identify factors that could affect customers' response of web sites. Majority of studies were conducted to verify technology-related and functional variables of the website which facilitate transactions and enhance customer responses such as purchase intention and website loyalty. However, there has been little research on the external cues of website and psychological variables of consumer that could have positive influences on customer response. The purpose of this study is to investigate the influence of e-store personality on e-store loyalty through mediating variables such as e-store identification, e-store trust, and e-store engagement. The authors of this study develop the model and set up the six main hypotheses and a set of sub-hypotheses based on a literature review, shown in

    . This model is composed of four paths such as dimensions of e-store personality${\rightarrow}$e-store identification, e-store identification${\rightarrow}$e-store loyalty, e-store identification ${\rightarrow}$e-store trust${\rightarrow}$e-store loyalty, and e-store identification${\rightarrow}$e-store engagement${\rightarrow}$e-store loyalty. II. Research Method Ladies under 30s were the respondents of this survey. Data were collected from January 20th to February 26th in 2010. A total of 200 questionnaires were distributed and 169 respondents were analysed finally to test hypotheses because 31 questionnaires had incorrect or missing responses. SPSS 12.0 and LISREL 7.0 program were used to test frequency, reliability, factor, and structural equation modeling analysis. III. Result and Conclusion According to results from factor analysis, eigen value was over 1.0 and items which were below 0.6 were deleted. Consequently, 9 factors(% of total variance is 72.011%) were searched. All Cronbach's ${\alpha}$ values are over the recommended level(${\alpha}$ > 0.7). The overall fit indices are acceptable such as ${\chi}^2$=2028.36(p=0.00), GFI=0.87, AGFI=0.82, CFI=0.81, IFI=0.92, RMR=0.075. All factor loadings were over the recommended level. As the result of discriminant validity check with chi-square difference test between paired constructs, each construct has good discriminant validity. The overall fit indices of final model are acceptable such as ${\chi}^2$=340.73(df=36, p=0.00), GFI=0.92, AGFI=0.81, CFI=0.91, IFI=0.91, RMR=0.085. As test results, 5 out of 6 hypotheses are supported because there are statistically significant casual relationships in structural equation model, shown in . First of all, hypothesis 1 is partially supported because sub-hypothesis 1-1 and 1-2 are supported, whereas sub-hypothesis 1-3, 1-4, and 1-5 are rejected. Specifically, it reveals that warmth and sophistication dimensions in e-store personality have positive influence on e-store identification, however, activity, progressiveness, and strictness does not have any significant relationship on e-store identification. Secondly, hypothesis 2 was supported. Therefore, it can be said that e-store identification has a positive impact on e-store trust. Thirdly, hypothesis 3 is also supported. Hence, there is a positive relationship between e-store identification and e-store engagement. Fourthly, hypothesis 4 is supported too. e-store identification has a positive influence on e-store loyalty. Fifthly, hypothesis 5 is also accepted. This indicates that e-store trust is a precedent variable which positively affects e-store loyalty. Lastly, it reveals that e-store engagement has a positive impact on e-store loyalty. Therefore, hypothesis 6 is supported. The findings of the study imply that some dimensions of e-store personality have a positive influence on e-store identification, and that e-store identification has direct and indirect influence on e-store loyalty through e-store trust and e-store engagement positively. These results also suggest that the e-store identification in e-store personality is a precedent variable which positively affects e-store loyalty directly and indirectly through e-store trust and engagement as a mediating variable. Therefore, e-store marketers need to implement website strategy based on e-store personality, e-store identification, e-store trust, and e-store engagement to meet customers' psychological needs and enhance e-store loyalty. Finally, the limitations and future study directions based on this study are discussed.

  • PDF
  • A Contemplation on Measures to Advance Logistics Centers (물류센터 선진화를 위한 발전 방안에 대한 소고)

    • Sun, Il-Suck;Lee, Won-Dong
      • Journal of Distribution Science
      • /
      • v.9 no.1
      • /
      • pp.17-27
      • /
      • 2011
    • As the world becomes more globalized, business competition becomes fiercer, while consumers' needs for less expensive quality products are on the increase. Business operations make an effort to secure a competitive edge in costs and services, and the logistics industry, that is, the industry operating the storing and transporting of goods, once thought to be an expense, begins to be considered as the third cash cow, a source of new income. Logistics centers are central to storage, loading and unloading of deliveries, packaging operations, and dispensing goods' information. As hubs for various deliveries, they also serve as a core infrastructure to smoothly coordinate manufacturing and selling, using varied information and operation systems. Logistics centers are increasingly on the rise as centers of business supply activities, growing beyond their previous role of primarily storing goods. They are no longer just facilities; they have become logistics strongholds that encompass various features from demand forecast to the regulation of supply, manufacturing, and sales by realizing SCM, taking into account marketability and the operation of service and products. However, despite these changes in logistics operations, some centers have been unable to shed their past roles as warehouses. For the continuous development of logistics centers, various measures would be needed, including a revision of current supporting policies, formulating effective management plans, and establishing systematic standards for founding, managing, and controlling logistics centers. To this end, the research explored previous studies on the use and effectiveness of logistics centers. From a theoretical perspective, an evaluation of the overall introduction, purposes, and transitions in the use of logistics centers found issues to ponder and suggested measures to promote and further advance logistics centers. First, a fact-finding survey to establish demand forecast and standardization is needed. As logistics newspapers predicted that after 2012 supply would exceed demand, causing rents to fall, the business environment for logistics centers has faltered. However, since there is a shortage of fact-finding surveys regarding actual demand for domestic logistic centers, it is hard to predict what the future holds for this industry. Accordingly, the first priority should be to get to the essence of the current market situation by conducting accurate domestic and international fact-finding surveys. Based on those, management and evaluation indicators should be developed to build the foundation for the consistent advancement of logistics centers. Second, many policies for logistics centers should be revised or developed. Above all, a guideline for fair trade between a shipper and a commercial logistics center should be enacted. Since there are no standards for fair trade between them, rampant unfair trades according to market practices have brought chaos to market orders, and now the logistics industry is confronting its own difficulties. Therefore, unfair trade cases that currently plague logistics centers should be gathered by the industry and fair trade guidelines should be established and implemented. In addition, restrictive employment regulations for foreign workers should be eased, and logistics centers should be charged industry rates for the use of electricity. Third, various measures should be taken to improve the management environment. First, we need to find out how to activate value-added logistics. Because the traditional purpose of logistics centers was storage and loading/unloading of goods, their profitability had a limit, and the need arose to find a new angle to create a value added service. Logistic centers have been perceived as support for a company's storage, manufacturing, and sales needs, not as creators of profits. The center's role in the company's economics has been lowering costs. However, as the logistics' management environment spiraled, along with its storage purpose, developing a new feature of profit creation should be a desirable goal, and to achieve that, value added logistics should be promoted. Logistics centers can also be improved through cost estimation. In the meantime, they have achieved some strides in facility development but have still fallen behind in others, particularly in management functioning. Lax management has been rampant because the industry has not developed a concept of cost estimation. The centers have since made an effort toward unification, standardization, and informatization while realizing cost reductions by establishing systems for effective management, but it has been hard to produce profits. Thus, there is an urgent need to estimate costs by determining a basic cost range for each division of work at logistics centers. This undertaking can be the first step to improving the ineffective aspects of how they operate. Ongoing research and constant efforts have been made to improve the level of effectiveness in the manufacturing industry, but studies on resource management in logistics centers are hardly enough. Thus, a plan to calculate the optimal level of resources necessary to operate a logistics center should be developed and implemented in management behavior, for example, by standardizing the hours of operation. If logistics centers, shippers, related trade groups, academic figures, and other experts could launch a committee to work with the government and maintain an ongoing relationship, the constraint and cooperation among members would help lead to coherent development plans for logistics centers. If the government continues its efforts to provide financial support, nurture professional workers, and maintain safety management, we can anticipate the continuous advancement of logistics centers.

    • PDF

    Analysis of the Korea Traditional Colors within the Spatial Arrangement and Form of the Traditional Garden of Seyeonjeong (보길도 세연정(洗然庭)의 공간구조 형식에 내재한 전통색채 분석)

    • Han, Hee-Jeong;Cho, Se-Hwan
      • Journal of the Korean Institute of Traditional Landscape Architecture
      • /
      • v.32 no.4
      • /
      • pp.14-23
      • /
      • 2014
    • The purpose of this study is to contribute in building credibility of the methodology of the appearance of the traditional colors and the interpretation of the meaning of those appearances by analyzing the spatial construction and configuration and the traditional colors that appear in spatial elements about the scenery component that appear in Seyeonjeong. We conducted a literature research about the traditional colors, the background of the creation of Seyeonjeong, and etc. For the contents for the empirical analysis, we took the scenery and space elements in the poems, such as Eobusasisa and O-u-ga, and the contents of poems related to ojeongsaek (five Korean traditional colors) based on the Yin-Yang and the Five Elements ideology Particularly, after dividing the spatial elements appearing in Seyoenjeong into visual, synesthetic, symbolic/cognitive spatial element, we further distinguished the visual space into positions and directions of the of the spaces and the scenery of the season; the synesthetic space into seasons, time and five senses; and the symbolic/cognitive space into chiljeong (or the seven passions) and sadan (or the four clues). Then we carried out the study by analyzing the correlation between the intention of the garden creation and the meaning of the spaces, through the analysis of ojeongsaek system for each spatial element. Firstly, spatial structure and format that appear in Seyeonjeong can be divided into two directional axes of southeast and northwest according to the flat form of the Seyeongjeong's rectangular palace, with Seyeongjoeng as the center. Secondly, in spatial component element, the frequencies of appearance of the traditional colors of Seyoenjeong are 33.2% for white, 20.8% for blue, 20.8% for black, 18.7% for red and 6.3% for yellow. Thirdly, based on the analysis of the traditional colors the most frequent appearance of 'white' left a room for interpretation like the creation of Seyeonjeong was to enjoy secular living without lingering political feelings so that the high mountains remain clear and clean. Also, the predominant frequency of appearance of blue, similar frequency of appearance of black and red, and the least frequent appearance of yellow is in agreement with or can be at least interpreted related to Yun Seon-do's intention for creating Seyeonjeong not for political rank or power but as a place to enjoy nature, through which he can build on his knowledge, and to lead rest of his life as a noble being through plays, like dancing and writing poems. Fourthly, these interpretations of the analysis of the frequency of appearance of the traditional colors of Seyeongjong shows the reliability, validity, and consistency of the methodology of the analysis of the frequency of appearance of the traditional colors and the interpretation of the meanings in the context that the color white appears most frequently in Soswewon as well and that the background life of the Soswewon's creator Yangsanbo can be interpreted in a similarly way. Above all, this study is significant from the fact that we proposed a theory about the method of analysis and interpretation of the traditional colors in a traditional landscape space. Moreover, there is a great significance of discovering that traditional colors appear in traditional spaces and this can be used as a methodological framework to interpret things like, intention for creation of (buildings/architectures).

    The Changing Aspects of North Korea's Terror Crimes and Countermeasures : Focused on Power Conflict of High Ranking Officials after Kim Jong-IL Era (북한 테러범죄의 변화양상에 따른 대응방안 -김정일 정권 이후 고위층 권력 갈등을 중심으로)

    • Byoun, Chan-Ho;Kim, Eun-Jung
      • Korean Security Journal
      • /
      • no.39
      • /
      • pp.185-215
      • /
      • 2014
    • Since North Korea has used terror crime as a means of unification under communism against South Korea, South Korea has been much damaged until now. And the occurrence possibility of terror crime by North Korean authority is now higher than any other time. The North Korean terror crimes of Kim Il Sung era had been committed by the dictator's instruction with the object of securing governing fund. However, looking at the terror crimes committed for decades during Kim Jung Il authority, it is revealed that these terror crimes are expressed as a criminal behavior because of the conflict to accomplish the power and economic advantage non powerful groups target. This study focused on the power conflict in various causes of terror crimes by applying George B. Vold(1958)'s theory which explained power conflict between groups became a factor of crime, and found the aspect by ages of terror crime behavior by North Korean authority and responding plan to future North Korean terror crime. North Korean authority high-ranking officials were the Labor Party focusing on Juche Idea for decades in Kim Il Sung time. Afterwards, high-ranking officials were formed focusing on military authorities following Military First Policy at the beginning of Kim Jung Il authority, rapid power change has been done for recent 10 years. To arrange the aspect by times of terror crime following this power change, alienated party executives following the support of positive military first authority by Kim Jung Il after 1995 could not object to forcible terror crime behavior of military authority, and 1st, 2nd Yeongpyeong maritime war which happened this time was propelled by military first authority to show the power of military authority. After 2006, conservative party union enforced censorship and inspection on the trade business and foreign currency-earning of military authority while executing drastic purge. The shooting on Keumkangsan tourists that happened this time was a forcible terror crime by military authority following the pressure of conservative party. After October, 2008, first military reign union executed the launch of Gwanmyungsung No.2 long-range missile, second nuclear test, Daechung marine war, and Cheonanham attacking terror in order to highlight the importance and role of military authority. After September 2010, new reign union went through severe competition between new military authority and new mainstream and new military authority at this time executed highly professionalized terror crime such as cyber/electronic terror unlike past military authority. After July 2012, ICBM test launch, third nuclear test, cyber terror on Cheongwadae homepage of new mainstream association was the intention of Km Jung Eun to display his ability and check and adjust the power of party/military/cabinet/ public security organ, and he can attempt the unexpected terror crime in the future. North Korean terror crime has continued since 1980s when Kim Jung Il's power succession was carried out, and the power aspect by times has rapidly changed since 1994 when Kim Il Sung died and the terror crime became intense following the power combat between high-ranking officials and power conflict for right robbery. Now South Korea should install the specialized department which synthesizes and analyzes the information on North Korean high-ranking officials and reinforce the comprehensive information-collecting system through the protection and management of North Korean defectors and secret agents in order to determine the cause of North Korean terror crime and respond to it. And South Korea should participate positively in the international collaboration related to North Korean terror and make direct efforts to attract the international agreement to build the international cooperation for the response to North Korean terror crime. Also, we should try more to arrange the realistic countermeasure against North Korean cyber/electronic terror which was more diversified with the expertise terror escaping from existing forcible terror through enactment/revision of law related to cyber terror crime, organizing relevant institute and budget, training professional manpower, and technical development.

    • PDF

    Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

    • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
      • Korean Security Journal
      • /
      • no.18
      • /
      • pp.169-190
      • /
      • 2009
    • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

    • PDF

    Paleomagnetism, Stratigraphy and Geologic Structure of the Tertiary Pohang and Changgi Basins; K-Ar Ages for the Volcanic Rocks (포항(浦項) 및 장기분지(盆地)에 대한 고지자기(古地磁氣), 층서(層序) 및 구조연구(構造硏究); 화산암류(火山岩類)의 K-Ar 연대(年代))

    • Lee, Hyun Koo;Moon, Hi-Soo;Min, Kyung Duck;Kim, In-Soo;Yun, Hyesu;Itaya, Tetsumaru
      • Economic and Environmental Geology
      • /
      • v.25 no.3
      • /
      • pp.337-349
      • /
      • 1992
    • The Tertiary basins in Korea have widely been studied by numerous researchers producing individual results in sedimentology, paleontology, stratigraphy, volcanic petrology and structural geology, but interdisciplinary studies, inter-basin analysis and basin-forming process have not been carried out yet. Major work of this study is to elucidate evidences obtained from different parts of a basin as well as different Tertiary basins (Pohang, Changgi, Eoil, Haseo and Ulsan basins) in order to build up the correlation between the basins, and an overall picture of the basin architecture and evolution in Korea. According to the paleontologic evidences the geologic age of the Pohang marine basin is dated to be late Lower Miocence to Middle Miocene, whereas other non-marine basins are older as being either Early Miocene or Oligocene(Lee, 1975, 1978: Bong, 1984: Chun, 1982: Choi et al., 1984: Yun et al., 1990: Yoon, 1982). However, detailed ages of the Tertiary sediments, and their correlations in a basin and between basins are still controversial, since the basins are separated from each other, sedimentary sequence is disturbed and intruded by voncanic rocks, and non-marine sediments are not fossiliferous to be correlated. Therefore, in this work radiometric, magnetostratigraphic, and biostratigraphic data was integrated for the refinement of chronostratigraphy and synopsis of stratigraphy of Tertiary basins of Korea. A total of 21 samples including 10 basaltic, 2 porphyritic, and 9 andesitic rocks from 4 basins were collected for the K-Ar dating of whole rock method. The obtained age can be grouped as follows: $14.8{\pm}0.4{\sim}15.2{\pm}0.4Ma$, $19.9{\pm}0.5{\sim}22.1{\pm}0.7Ma$, $18.0{\pm}1.1{\sim}20.4+0.5Ma$, and $14.6{\pm}0.7{\sim}21.1{\pm}0.5Ma$. Stratigraphically they mostly fall into the range of Lower Miocene to Mid Miocene. The oldest volcanic rock recorded is a basalt (911213-6) with the age of $22.05{\pm}0.67Ma$ near Sangjeong-ri in the Changgi (or Janggi) basin and presumed to be formed in the Early Miocene, when Changgi Conglomerate began to deposit. The youngest one (911214-9) is a basalt of $14.64{\pm}0.66Ma$ in the Haseo basin. This means the intrusive and extrusive rocks are not a product of sudden voncanic activity of short duration as previously accepted but of successive processes lasting relatively long period of 8 or 9 Ma. The radiometric age of the volcanic rocks is not randomly distributed but varies systematically with basins and localities. It becomes generlly younger to the south, namely from the Changgi basin to the Haseo basin. The rocks in the Changgi basin are dated to be from $19.92{\pm}0.47$ to $22.05{\pm}0.67Ma$. With exception of only one locality in the Geumgwangdong they all formed before 20 Ma B.P. The Eoil basalt by Tateiwa in the Eoil basin are dated to be from $20.44{\pm}0.47$ to $18.35{\pm}0.62Ma$ and they are younger than those in the Changgi basin by 2~4 Ma. Specifically, basaltic rocks in the sedimentary and voncanic sequences of the Eoil basin can be well compared to the sequence of associated sedimentary rocks. Generally they become younger to the stratigraphically upper part. Among the basin, the Haseo basin is characterized by the youngest volcanic rocks. The basalt (911214-7) which crops out in Jeongja-ri, Gangdong-myon, Ulsan-gun is $16.22{\pm}0.75Ma$ and the other one (911214-9) in coastal area, Jujon-dong, Ulsan is $14.64{\pm}0.66Ma$ old. The radiometric data are positively collaborated with the results of paleomagnetic study, pull-apart basin model and East Sea spreading theory. Especially, the successively changing age of Eoil basalts are in accordance with successively changing degree of rotation. In detail, following results are discussed. Firstly, the porphyritic rocks previously known as Cretaceous basement (911213-2, 911214-1) show the age of $43.73{\pm}1.05$$49.58{\pm}1.13Ma$(Eocene) confirms the results of Jin et al. (1988). This means sequential volcanic activity from Cretaceous up to Lower Tertiary. Secondly, intrusive andesitic rocks in the Pohang basin, which are dated to be $21.8{\pm}2.8Ma$ (Jin et al., 1988) are found out to be 15 Ma old in coincindence with the age of host strata of 16.5 Ma. Thirdly, The Quaternary basalt (911213-5 and 911213-6) of Tateiwa(1924) is not homogeneous regarding formation age and petrological characteristics. The basalt in the Changgi basin show the age of $19.92{\pm}0.47$ and $22.05{\pm}0.67$ (Miocene). The basalt (911213-8) in Sangjond-ri, which intruded Nultaeri Trachytic Tuff is dated to be $20.55{\pm}0.50Ma$, which means Changgi Group is older than this age. The Yeonil Basalt, which Tateiwa described as Quaternary one shows different age ranging from Lower Miocene to Upper Miocene(cf. Jin et al., 1988: sample no. 93-33: $10.20{\pm}0.30Ma$). Therefore, the Yeonil Quarterary basalt should be revised and divided into different geologic epochs. Fourthly, Yeonil basalt of Tateiwa (1926) in the Eoil basin is correlated to the Yeonil basalt in the Changgi basin. Yoon (1989) intergrated both basalts as Eoil basaltic andesitic volcanic rocks or Eoil basalt (Yoon et al., 1991), and placed uppermost unit of the Changgi Group. As mentioned above the so-called Quarternary basalt in the Eoil basin are not extruded or intruaed simultaneously, but differentiatedly (14 Ma~25 Ma) so that they can not be classified as one unit. Fifthly, the Yongdong-ri formation of the Pomgogri Group is intruded by the Eoil basalt (911214-3) of 18.35~0.62 Ma age. Therefore, the deposition of the Pomgogri Group is completed before this age. Referring petrological characteristics, occurences, paleomagnetic data, and relationship to other Eoil basalts, it is most provable that this basalt is younger than two others. That means the Pomgogri Group is underlain by the Changgi Group. Sixthly, mineral composition of the basalts and andesitic rocks from the 4 basins show different ground mass and phenocryst. In volcanic rocks in the Pohang basin, phenocrysts are pyroxene and a small amount of biotite. Those of the Changgi basin is predominant by Labradorite, in the Eoil by bytownite-anorthite and a small amount pyroxene.

    • PDF

    A Study of the Health Service Computerization State and the Occupational Nurses's Satisfaction Level on Computerization (산업간호현장의 보건업무 전산화시스템 활용현황과 산업간호사의 전산화 직무만족도 연구)

    • Jung, Hee Young;Park, Hyoung-Sook
      • Korean Journal of Occupational Health Nursing
      • /
      • v.13 no.1
      • /
      • pp.5-18
      • /
      • 2004
    • This study aims to investigate the use state of the health service computerization system in the occupational nursing field and the occupational nursers' satisfaction level, and provide basic data to promote the development of the health service computerization system for the nursing field. For this study, a questionnaire was provided to 118 occupational nurses who belong to Busan and Gyeongnam branches of KAOHN(Korean Association of Occupational Health Nurses) for 2 months (from Dec. 1, 2002 to Jan. 31, 2003). A tool of Choi Yong-Heui(2000) was used to investigate the satisfaction level of using the health service computerization system. The collected materials were analyzed in real number and percentage, average and standard deviation, t-test and ANOVA by using the SPSS WIN 10.0 program. This study is summarized as follows: 1. The average age was $31.99{\pm}5.58$ old in this study. The married were 54.2%. Participants who graduated from a junior college was 76.9%. The average service period was $4.48{\pm}4.68$ years. In service types, 79.7% of participants served in a health care center. The average service period was $3.22{\pm}2.89$ years. The service place which had 1000 workers or more was 35.6%. 2. Only 20.3% of participants in this study had a computer use education. 3. The field who participants used mostly was communication/internet, $3.29{\pm}.85$ hours in average. 4. 97.1% of occupational fields had computers and peripheral devices: 71.4% in pentium computer, 42.8% in the hard disk capacity of 20-29GB, 60.0% in 15 inch monitors, 86.2% in printers, 18.1% in digital cameras, 12.4% in LAN, and 9.5% in scanners. 80.1% of the occupational fields which were objects of study could use communication. 5. The occupational fields which did not introduced the health service computerization system were 62.8%. The main cause was attributable to entrepreneurs' insufficient recognition 66.6%. 51.5% of the entrepreneurs did not have an introduction plan. 37.2% of participating companies had the health service computerization system. 56.4% of them introduced it since the year 2000. 81.6% of the introduction motivation aimed to the efficiency of health service. The most issue upon introduction was insufficient understanding of a person in charge - 25.6%. The in-house development of the system covered 56.4%. 61.5% of the participants accepted their demands from the first stage of development. The direct effect of computerization showed the increase of 25.9% in the quickness and continuity of service treatment, and 25.9% in the serviceability of statistical treatment. 6. 22.0% of the participants had a computerization system use education. 69.2% of them had a in-house education. An educational method by nurses who used the computerization system was 76.9%. 92.3% of the education was helpful for practical duties. 7. An analysis of the computer use by health service fields showed that the medicine management in a health management field was 15.9%. the work environment measuring management in a work environment filed was 32.9%. the employment. general and special examination management in a heal th management field was 61.1 %. the various reports management in an administrative field was 64%. the health education data preparation management in an educational field was 58.0%. and the medicine and expendables management in an equipment management field was 51.6%. An analysis of the computerization system use showed that the various statistical data manage in a health management field was 13.0%. the work environment measuring management in a health management field was 34.8%. the personal disease management in a health management field was 51.9%. the heal education data preparation management in an educational field was 54.5%. and the equipment management of health care centers in an equipment management field was 52.6%. 8. 31.6% of the participants wanted that health service computerization system would include the generals of health services. 42.4% of the participants thought that first of all. the aggressive interest and investment of employers were required to build the health service computerization system. 9. The participants' satisfaction level on the computerization system use was $3.51{\pm}.57$ points. An analysis by each factor showed $3.62{\pm}.68$ points in a service change factor. $3.15{\pm}.63$ points in a computer program use factor, and $3.45{\pm}.71$ points in a continuous computerization use factor. 10. An analysis of the computerization system use by general characteristics of participants showed that the married (p = .022) had the satisfaction level higher than the unmarried. 11. The satisfaction level of the computerization system use by participants' computer use ability tended to be higher in proportion to the increase of computer use abilities in spreadsheet (F=2.606. p=.048). presentation (F=3.62. p=.012) and communication/internet(F=2.885. p=.0321. Based on the study results mentioned above. I will suggest as follows : The nationwide enlargement and repetition study is required for occupational nurses who serve in occupational nursing fields. The computerization system in a health service field is inferior comparing with other fields. The computerization system standard by business types and characteristics should be prepared through employers's aggressive participation and national support. Therefore various statistical data which occurs in occupational fields will be managed systematically and efficiently. A regular and systematic computer education plan for occupational nurses in charge of health services in the filed is urgently required to efficiently manage and improve the health of on-site workers.

    • PDF

    Case Analysis of the Promotion Methodologies in the Smart Exhibition Environment (스마트 전시 환경에서 프로모션 적용 사례 및 분석)

    • Moon, Hyun Sil;Kim, Nam Hee;Kim, Jae Kyeong
      • Journal of Intelligence and Information Systems
      • /
      • v.18 no.3
      • /
      • pp.171-183
      • /
      • 2012
    • In the development of technologies, the exhibition industry has received much attention from governments and companies as an important way of marketing activities. Also, the exhibitors have considered the exhibition as new channels of marketing activities. However, the growing size of exhibitions for net square feet and the number of visitors naturally creates the competitive environment for them. Therefore, to make use of the effective marketing tools in these environments, they have planned and implemented many promotion technics. Especially, through smart environment which makes them provide real-time information for visitors, they can implement various kinds of promotion. However, promotions ignoring visitors' various needs and preferences can lose the original purposes and functions of them. That is, as indiscriminate promotions make visitors feel like spam, they can't achieve their purposes. Therefore, they need an approach using STP strategy which segments visitors through right evidences (Segmentation), selects the target visitors (Targeting), and give proper services to them (Positioning). For using STP Strategy in the smart exhibition environment, we consider these characteristics of it. First, an exhibition is defined as market events of a specific duration, which are held at intervals. According to this, exhibitors who plan some promotions should different events and promotions in each exhibition. Therefore, when they adopt traditional STP strategies, a system can provide services using insufficient information and of existing visitors, and should guarantee the performance of it. Second, to segment automatically, cluster analysis which is generally used as data mining technology can be adopted. In the smart exhibition environment, information of visitors can be acquired in real-time. At the same time, services using this information should be also provided in real-time. However, many clustering algorithms have scalability problem which they hardly work on a large database and require for domain knowledge to determine input parameters. Therefore, through selecting a suitable methodology and fitting, it should provide real-time services. Finally, it is needed to make use of data in the smart exhibition environment. As there are useful data such as booth visit records and participation records for events, the STP strategy for the smart exhibition is based on not only demographical segmentation but also behavioral segmentation. Therefore, in this study, we analyze a case of the promotion methodology which exhibitors can provide a differentiated service to segmented visitors in the smart exhibition environment. First, considering characteristics of the smart exhibition environment, we draw evidences of segmentation and fit the clustering methodology for providing real-time services. There are many studies for classify visitors, but we adopt a segmentation methodology based on visitors' behavioral traits. Through the direct observation, Veron and Levasseur classify visitors into four groups to liken visitors' traits to animals (Butterfly, fish, grasshopper, and ant). Especially, because variables of their classification like the number of visits and the average time of a visit can estimate in the smart exhibition environment, it can provide theoretical and practical background for our system. Next, we construct a pilot system which automatically selects suitable visitors along the objectives of promotions and instantly provide promotion messages to them. That is, based on the segmentation of our methodology, our system automatically selects suitable visitors along the characteristics of promotions. We adopt this system to real exhibition environment, and analyze data from results of adaptation. As a result, as we classify visitors into four types through their behavioral pattern in the exhibition, we provide some insights for researchers who build the smart exhibition environment and can gain promotion strategies fitting each cluster. First, visitors of ANT type show high response rate for promotion messages except experience promotion. So they are fascinated by actual profits in exhibition area, and dislike promotions requiring a long time. Contrastively, visitors of GRASSHOPPER type show high response rate only for experience promotion. Second, visitors of FISH type appear favors to coupon and contents promotions. That is, although they don't look in detail, they prefer to obtain further information such as brochure. Especially, exhibitors that want to give much information for limited time should give attention to visitors of this type. Consequently, these promotion strategies are expected to give exhibitors some insights when they plan and organize their activities, and grow the performance of them.

    Twitter Issue Tracking System by Topic Modeling Techniques (토픽 모델링을 이용한 트위터 이슈 트래킹 시스템)

    • Bae, Jung-Hwan;Han, Nam-Gi;Song, Min
      • Journal of Intelligence and Information Systems
      • /
      • v.20 no.2
      • /
      • pp.109-122
      • /
      • 2014
    • People are nowadays creating a tremendous amount of data on Social Network Service (SNS). In particular, the incorporation of SNS into mobile devices has resulted in massive amounts of data generation, thereby greatly influencing society. This is an unmatched phenomenon in history, and now we live in the Age of Big Data. SNS Data is defined as a condition of Big Data where the amount of data (volume), data input and output speeds (velocity), and the variety of data types (variety) are satisfied. If someone intends to discover the trend of an issue in SNS Big Data, this information can be used as a new important source for the creation of new values because this information covers the whole of society. In this study, a Twitter Issue Tracking System (TITS) is designed and established to meet the needs of analyzing SNS Big Data. TITS extracts issues from Twitter texts and visualizes them on the web. The proposed system provides the following four functions: (1) Provide the topic keyword set that corresponds to daily ranking; (2) Visualize the daily time series graph of a topic for the duration of a month; (3) Provide the importance of a topic through a treemap based on the score system and frequency; (4) Visualize the daily time-series graph of keywords by searching the keyword; The present study analyzes the Big Data generated by SNS in real time. SNS Big Data analysis requires various natural language processing techniques, including the removal of stop words, and noun extraction for processing various unrefined forms of unstructured data. In addition, such analysis requires the latest big data technology to process rapidly a large amount of real-time data, such as the Hadoop distributed system or NoSQL, which is an alternative to relational database. We built TITS based on Hadoop to optimize the processing of big data because Hadoop is designed to scale up from single node computing to thousands of machines. Furthermore, we use MongoDB, which is classified as a NoSQL database. In addition, MongoDB is an open source platform, document-oriented database that provides high performance, high availability, and automatic scaling. Unlike existing relational database, there are no schema or tables with MongoDB, and its most important goal is that of data accessibility and data processing performance. In the Age of Big Data, the visualization of Big Data is more attractive to the Big Data community because it helps analysts to examine such data easily and clearly. Therefore, TITS uses the d3.js library as a visualization tool. This library is designed for the purpose of creating Data Driven Documents that bind document object model (DOM) and any data; the interaction between data is easy and useful for managing real-time data stream with smooth animation. In addition, TITS uses a bootstrap made of pre-configured plug-in style sheets and JavaScript libraries to build a web system. The TITS Graphical User Interface (GUI) is designed using these libraries, and it is capable of detecting issues on Twitter in an easy and intuitive manner. The proposed work demonstrates the superiority of our issue detection techniques by matching detected issues with corresponding online news articles. The contributions of the present study are threefold. First, we suggest an alternative approach to real-time big data analysis, which has become an extremely important issue. Second, we apply a topic modeling technique that is used in various research areas, including Library and Information Science (LIS). Based on this, we can confirm the utility of storytelling and time series analysis. Third, we develop a web-based system, and make the system available for the real-time discovery of topics. The present study conducted experiments with nearly 150 million tweets in Korea during March 2013.

    A Study on Legal and Institutional Improvement Measures for the Effective Implementation of SMS -Focusing on Aircraft Accident Investigation-

    • Yoo, Kyung-In
      • The Korean Journal of Air & Space Law and Policy
      • /
      • v.32 no.2
      • /
      • pp.101-127
      • /
      • 2017
    • Even with the most advanced aviation technology benefits, aircraft accidents are constantly occurring while air passenger transportation volume is expected to double in the next 15 years. Since it is not possible to secure aviation safety only by the post aircraft accident safety action of accident investigations, it has been recognized and consensus has been formed that proactive and predictive prevention measures are necessary. In this sense, the aviation safety management system (SMS) was introduced in 2008 and has been carried out in earnest since 2011. SMS is a proactive and predictive aircraft accident preventive measure, which is a mechanism to eliminate the fundamental risk factors by approaching organizational factors beyond technological factors and human factors related to aviation safety. The methodology is to collect hazards in all the sites required for aircraft operations, to build a database, to analyze the risks, and through managing risks, to keep the risks acceptable or below. Therefore, the improper implementation of SMS indicates that the aircraft accident prevention is insufficient and it is to be directly connected with the aircraft accident. Reports of duty performance related hazards including their own errors are essential and most important in SMS. Under the policy of just culture for voluntary reporting, the guarantee of information providers' anonymity, non-punishment and non-blame should be basically secured, but to this end, under-reporting is stagnant due to lack of trust in their own organizations. It is necessary for the accountable executive(CEO) and senior management to take a leading role to foster the safety culture initiating from just culture with the safety consciousness, balancing between safety and profit for the organization. Though a Ministry of Land, Infrastructure and Transport's order, "Guidance on SMS Implementation" states the training required for the accountable executive(CEO) and senior management, it is not legally binding. Thus it is suggested that the SMS training completion certificates of accountable executive(CEO) and senior management be included in SMS approval application form that is legally required by "Korea Aviation Safety Program" in addition to other required documents such as a copy of SMS manual. Also, SMS related items are missing in the aircraft accident investigation, so that organizational factors in association with safety culture and risk management are not being investigated. This hinders from preventing future accidents, as the root cause cannot be identified. The Aircraft Accident Investigation Manuals issued by ICAO contain the SMS investigation wheres it is not included in the final report form of Annex 13 to the Convention on International Civil Aviation. In addition, the US National Transportation Safety Board(NTSB) that has been a substantial example of the aircraft accident investigation for the other accident investigation agencies worldwide does not appear to expand the scope of investigation activities further to SMS. For these reasons, it is believed that investigation agencies conducting their investigations under Annex 13 do not include SMS in the investigation items, and the aircraft accident investigators are hardly exposed to SMS investigation methods or techniques. In this respect, it is necessary to include the SMS investigation in the organization and management information of the final report format of Annex 13. In Korea as well, in the same manner, SMS item should be added to the final report format of the Operating Regulation of the Aircraft and Railway Accident Investigation Board. If such legal and institutional improvement methods are complemented, SMS will serve the purpose of aircraft accident prevention effectively and contribute to the improvement of aviation safety in the future.

    • PDF

    (34141) Korea Institute of Science and Technology Information, 245, Daehak-ro, Yuseong-gu, Daejeon
    Copyright (C) KISTI. All Rights Reserved.