• Title/Summary/Keyword: Generic terms

Search Result 108, Processing Time 0.028 seconds

Assessing bioequivalence in 2×3 dual designs (2×3 이중 설계에서 생물학적 동등성 평가)

  • Woo, Hwa Hyoung;Jeong, Gyu Jin;Park, Sang-Gue
    • Journal of the Korean Data and Information Science Society
    • /
    • v.28 no.4
    • /
    • pp.743-754
    • /
    • 2017
  • Assessing bioequivalence between original drug and generic drug is traditionally based on $2{\times}2$ crossover design. As bioequivalence trials for highly variable drugs are getting popular, the required sample size based on $2{\times}2$ crossover design would be very large, which might cause the ethical concerns. Regulatory agencies like EMA and MFDS recommended higher order crossover designs such as $2{\times}4$, $4{\times}2$ and $4{\times}4$ crossover designs. Alternatively, a $2{\times}3$ dual design may be recommended in terms of economical and ethical points of view in comparison with the $2{\times}4$ crossover design for highly variable drug. In this study, we consider some statistical characteristics of $2{\times}3$ dual design and propose statistical procedures for calculating sample size and assessing bioequivalence based on $2{\times}3$ dual design. We also discuss the proposed procedures from the perspective of newly revised bioequivalence guidance issued by MFDS.

VENGEANCE, VIOLENCE, VAMPIRES: Dark Humour in the Films of Park Chan-wook

  • Hughes, Jessica
    • Cross-Cultural Studies
    • /
    • v.28
    • /
    • pp.17-36
    • /
    • 2012
  • This essay places the South Korean film Thirst (2009) within Park Chan-wook's oeuvre as a filmmaker notorious for graphic depictions of violence and revenge. Park's use of dark humour in his films, which is emphasized in Thirst perhaps more than ever, allows for a more self-aware depiction of violence, where both the viewer and the protagonist are awakened to the futility of revenge. This ultimately paints his characters as fascinatingly crazy - simultaneously heroes, villains, and victims. Film theorist Wes D. Gehring's three themes of dark humour ('man as beast,' 'the absurdity of the world,' and 'the omnipresence of death') become most obvious in Park's most recent film, which pays closer attention to character development through narrative detail. Rather than portraying the characters as sentimental, dark humour depicts their misfortunes in an alternative way, allowing for consideration of such taboo subjects as religion, adultery, and death/suicide. These issues are further tackled through Thirst's portrayal of its vampire protagonist, which ultimately de-mystifies the traditional vampire figure. While this character has more often been associated with romance, exoticism and the mystical powers of the supernatural, Thirst takes relatively little from the demons of Nosferatu (Murnau, 1922) and various other Dracula adaptations, nor the romantic figures of Interview with the Vampire (Jordan, 1994), and Twilight (Hardwicke, 2008). Instead, it is part of a much smaller group of contemporary vampire films, which are rather informed by a postmodern reconfiguration of the monster. Thus, this paper examines Thirst as an important contribution to the global and hybrid nature of those films in which postmodern vampires are sympathetic and de-mystified, exhibiting symptoms stemming from a natural illness or misfortune. Park's undertaking of a vampire film allows for a complex balance between narrative and visuals through his focus on the Western implications of this myth within Korean cinema. This combination of international references and traditional Korean culture marks it as highly conscious of New Korean Cinema's focus on globalization. With Thirst, Park successfully unites familiar images of the vampire hunting and feeding, with more stylistically distinct, grotesque images of violence and revenge. In this sense, dark humour highlights the less charming aspects of the vampire struggling to survive, most effective in scenes depicting the protagonist feeding from his friend's IV in the hospital, and sitting in the sunlight, slowly turning to ash, in the final minutes of the film. The international appeal of Park's style, combining conventions of the horror/thriller genre with his own mixture of dark humour and non-linear narrative, is epitomized in Thirst, which underscores South Korea's growing global interest with its overt international framework. Furthermore, he portrayal of the vampire as a sympathetic figure allows for a shift away from the conventional focus on myth and the exotic, toward a renewed construction of the vampire in terms of its contribution to generic hybridization and cultural adaptation.

A Study of Communication Factor in the Chinese augury bone (은상(殷商)시기 갑골문(甲骨文)에 나타난 커뮤니케이션 속성(屬性))

  • Lee, Bum-Soo
    • (The)Study of the Eastern Classic
    • /
    • no.43
    • /
    • pp.305-328
    • /
    • 2011
  • This study examines a study of communication factor in the Chinese augury bone, as a communication text, a communication history text and a communication thought text, in terms of sender message channel audience effects, interdisciplinary research. In many respects, it is generally accepted that the Chinese augury bone have been the generic references of the Oriental culture. Based on various research results about The Chinese augury boney as a communication text, this paper explores factors of communication text related with meta-communication as the definition of communication and a structure of communication, a method of communication. The Chinese augury bone consider graphic element as communication tool, its manager as sender or communicator, the record as message, the bone as channel, its reader as audience, text understanding and behavior as effects, the augury bone producer as journalist, the tying bone in a bundle as old style book. In the Chinese augury bone, one property of communication thought is that the political ideology, which is related to the strong and weak of the graphic style and determines the naming method of kings.

Allometric equation for estimating aboveground biomass of Acacia-Commiphora forest, southern Ethiopia

  • Wondimagegn Amanuel;Chala Tadesse;Moges Molla;Desalegn Getinet;Zenebe Mekonnen
    • Journal of Ecology and Environment
    • /
    • v.48 no.2
    • /
    • pp.196-206
    • /
    • 2024
  • Background: Most of the biomass equations were developed using sample trees collected mainly from pan-tropical and tropical regions that may over- or underestimate biomass. Site-specific models would improve the accuracy of the biomass estimates and enhance the country's measurement, reporting, and verification activities. The aim of the study is to develop site-specific biomass estimation models and validate and evaluate the existing generic models developed for pan-tropical forest and newly developed allometric models. Total of 140 trees was harvested from each diameter class biomass model development. Data was analyzed using SAS procedures. All relevant statistical tests (normality, multicollinearity, and heteroscedasticity) were performed. Data was transformed to logarithmic functions and multiple linear regression techniques were used to develop model to estimate aboveground biomass (AGB). The root mean square error (RMSE) was used for measuring model bias, precision, and accuracy. The coefficient of determination (R2 and adjusted [adj]-R2), the Akaike Information Criterion (AIC) and the Schwarz Bayesian information Criterion was employed to select most appropriate models. Results: For the general total AGB models, adj-R2 ranged from 0.71 to 0.85, and model 9 with diameter at stump height at 10 cm (DSH10), ρ and crown width (CW) as predictor variables, performed best according to RMSE and AIC. For the merchantable stem models, adj-R2 varied from 0.73 to 0.82, and model 8) with combination of ρ, diameter at breast height and height (H), CW and DSH10 as predictor variables, was best in terms of RMSE and AIC. The results showed that a best-fit model for above-ground biomass of tree components was developed. AGBStem = exp {-1.8296 + 0.4814 natural logarithm (Ln) (ρD2H) + 0.1751 Ln (CW) + 0.4059 Ln (DSH30)} AGBBranch = exp {-131.6 + 15.0013 Ln (ρD2H) + 13.176 Ln (CW) + 21.8506 Ln (DSH30)} AGBFoliage = exp {-0.9496 + 0.5282 Ln (DSH30) + 2.3492 Ln (ρ) + 0.4286 Ln (CW)} AGBTotal = exp {-1.8245 + 1.4358 Ln (DSH30) + 1.9921 Ln (ρ) + 0.6154 Ln (CW)} Conclusions: The results demonstrated that the development of local models derived from an appropriate sample of representative species can greatly improve the estimation of total AGB.

In Search of "Excess Competition" (과당경쟁(過當競爭)과 정부규제(政府規制))

  • Nam, II-chong;Kim, Jong-seok
    • KDI Journal of Economic Policy
    • /
    • v.13 no.4
    • /
    • pp.31-57
    • /
    • 1991
  • Korean firms of all sizes, from virtually every industry, have used and are using the term "excessive competition" to describe the state of their industry and to call for government interventions. Moreover, the Korean government has frequently responded to such calls in various ways favorable to the firms, such as controlling entry, curbing capacity investments, or allowing collusion. Despite such interventions' impact on the overall efficiency on the Korean economy as well as on the wealth distribution among diverse groups of economic agents, the term "excessive competition", the basis for the interventions, has so far escaped rigorous scrutiny. The objective of this paper is to clarify the notion of "excessive competition" and "over-investment" which usually accompanies "excessive competition", and to examine the circumstances under which they might occur. We first survey the cases where the terms are most widely used and proceed to examine those cases to determine if competition is indeed excessive, and if so, what causes "excessive competition". Our main concern deals with the case in which the firms must make investment decisions that involve large sunk costs while facing uncertain demand. In order to analyze this case, we developed a two period model of capacity precommitment and the ensuing competition. In the first period, oligopolistic firms make capacity investments that are irreversible. Demand is uncertain in period 1 and only the distribution is known. Thus, firms must make investment decisions under uncertainty. In the second period, demand is realized, and the firms compete with quantity under realized demand and capacity constraints. In the above setting, we find that there is "no over-investment," en ante, and there is "no excessive competition," ex post. As measured by the information available in period 1, expected return from investment of a firm is non-negative, overall industry capacity does not exceed the socially optimal level, and competition in the second period yields an outcome that gives each operating firm a non-negative second period profit. Thus, neither "excessive competition" nor "over-investment" is possible. This result will generally hold true if there is no externality and if the industry is not a natural monopoly. We also extend this result by examining a model in which the government is an active participant in the game with a well defined preference. Analysis of this model shows that over-investment arises if the government cannot credibly precommit itself to non-intervention when ex post idle capacity occurs, due to socio-political reasons. Firms invest in capacities that exceed socially optimal levels in this case because they correctly expect that the government will find it optimal for itself to intervene once over-investment and ensuing financial problems for the firms occur. Such planned over-investment and ensuing government intervention are the generic problems under the current system. These problems are expected to be repeated in many industries in years to come, causing a significant loss of welfare in the long run. As a remedy to this problem, we recommend a non-intervention policy by the government which creates and utilizes uncertainty. Based upon an argument which is essentially the same as that of Kreps and Wilson in the context of a chain-store game, we show that maintaining a consistent non-intervention policy will deter a planned over-investment by firms in the long run. We believe that the results obtained in this paper has a direct bearing on the public policies relating to many industries including the petrochemical industry that is currently in the center of heated debates.

  • PDF

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.

Antecedents of Manufacturer's Private Label Program Engagement : A Focus on Strategic Market Management Perspective (제조업체 Private Labels 도입의 선행요인 : 전략적 시장관리 관점을 중심으로)

  • Lim, Chae-Un;Yi, Ho-Taek
    • Journal of Distribution Research
    • /
    • v.17 no.1
    • /
    • pp.65-86
    • /
    • 2012
  • The $20^{th}$ century was the era of manufacturer brands which built higher brand equity for consumers. Consumers moved from generic products of inconsistent quality produced by local factories in the $19^{th}$ century to branded products from global manufacturers and manufacturer brands reached consumers through distributors and retailers. Retailers were relatively small compared to their largest suppliers. However, sometime in the 1970s, things began to slowly change as retailers started to develop their own national chains and began international expansion, and consolidation of the retail industry from mom-and-pop stores to global players was well under way (Kumar and Steenkamp 2007, p.2) In South Korea, since the middle of the 1990s, the bulking up of retailers that started then has changed the balance of power between manufacturers and retailers. Retailer private labels, generally referred to as own labels, store brands, distributors own private-label, home brand or own label brand have also been performing strongly in every single local market (Bushman 1993; De Wulf et al. 2005). Private labels now account for one out of every five items sold every day in U.S. supermarkets, drug chains, and mass merchandisers (Kumar and Steenkamp 2007), and the market share in Western Europe is even larger (Euromonitor 2007). In the UK, grocery market share of private labels grew from 39% of sales in 2008 to 41% in 2010 (Marian 2010). Planet Retail (2007, p.1) recently concluded that "[PLs] are set for accelerated growth, with the majority of the world's leading grocers increasing their own label penetration." Private labels have gained wide attention both in the academic literature and popular business press and there is a glowing academic research to the perspective of manufacturers and retailers. Empirical research on private labels has mainly studies the factors explaining private labels market shares across product categories and/or retail chains (Dahr and Hoch 1997; Hoch and Banerji, 1993), factors influencing the private labels proneness of consumers (Baltas and Doyle 1998; Burton et al. 1998; Richardson et al. 1996) and factors how to react brand manufacturers towards PLs (Dunne and Narasimhan 1999; Hoch 1996; Quelch and Harding 1996; Verhoef et al. 2000). Nevertheless, empirical research on factors influencing the production in terms of a manufacturer-retailer is rather anecdotal than theory-based. The objective of this paper is to bridge the gap in these two types of research and explore the factors which influence on manufacturer's private label production based on two competing theories: S-C-P (Structure - Conduct - Performance) paradigm and resource-based theory. In order to do so, the authors used in-depth interview with marketing managers, reviewed retail press and research and presents the conceptual framework that integrates the major determinants of private labels production. From a manufacturer's perspective, supplying private labels often starts on a strategic basis. When a manufacturer engages in private labels, the manufacturer does not have to spend on advertising, retailer promotions or maintain a dedicated sales force. Moreover, if a manufacturer has weak marketing capabilities, the manufacturer can make use of retailer's marketing capability to produce private labels and lessen its marketing cost and increases its profit margin. Figure 1. is the theoretical framework based on a strategic market management perspective, integrated concept of both S-C-P paradigm and resource-based theory. The model includes one mediate variable, marketing capabilities, and the other moderate variable, competitive intensity. Manufacturer's national brand reputation, firm's marketing investment, and product portfolio, which are hypothesized to positively affected manufacturer's marketing capabilities. Then, marketing capabilities has negatively effected on private label production. Moderating effects of competitive intensity are hypothesized on the relationship between marketing capabilities and private label production. To verify the proposed research model and hypotheses, data were collected from 192 manufacturers (212 responses) who are producing private labels in South Korea. Cronbach's alpha test, explanatory / comfirmatory factor analysis, and correlation analysis were employed to validate hypotheses. The following results were drawing using structural equation modeling and all hypotheses are supported. Findings indicate that manufacturer's private label production is strongly related to its marketing capabilities. Consumer marketing capabilities, in turn, is directly connected with the 3 strategic factors (e.g., marketing investment, manufacturer's national brand reputation, and product portfolio). It is moderated by competitive intensity between marketing capabilities and private label production. In conclusion, this research may be the first study to investigate the reasons manufacturers engage in private labels based on two competing theoretic views, S-C-P paradigm and resource-based theory. The private label phenomenon has received growing attention by marketing scholars. In many industries, private labels represent formidable competition to manufacturer brands and manufacturers have a dilemma with selling to as well as competing with their retailers. The current study suggests key factors when manufacturers consider engaging in private label production.

  • PDF

A Study on the Meaning and Strategy of Keyword Advertising Marketing

  • Park, Nam Goo
    • Journal of Distribution Science
    • /
    • v.8 no.3
    • /
    • pp.49-56
    • /
    • 2010
  • At the initial stage of Internet advertising, banner advertising came into fashion. As the Internet developed into a central part of daily lives and the competition in the on-line advertising market was getting fierce, there was not enough space for banner advertising, which rushed to portal sites only. All these factors was responsible for an upsurge in advertising prices. Consequently, the high-cost and low-efficiency problems with banner advertising were raised, which led to an emergence of keyword advertising as a new type of Internet advertising to replace its predecessor. In the beginning of 2000s, when Internet advertising came to be activated, display advertisement including banner advertising dominated the Net. However, display advertising showed signs of gradual decline, and registered minus growth in the year 2009, whereas keyword advertising showed rapid growth and started to outdo display advertising as of the year 2005. Keyword advertising refers to the advertising technique that exposes relevant advertisements on the top of research sites when one searches for a keyword. Instead of exposing advertisements to unspecified individuals like banner advertising, keyword advertising, or targeted advertising technique, shows advertisements only when customers search for a desired keyword so that only highly prospective customers are given a chance to see them. In this context, it is also referred to as search advertising. It is regarded as more aggressive advertising with a high hit rate than previous advertising in that, instead of the seller discovering customers and running an advertisement for them like TV, radios or banner advertising, it exposes advertisements to visiting customers. Keyword advertising makes it possible for a company to seek publicity on line simply by making use of a single word and to achieve a maximum of efficiency at a minimum cost. The strong point of keyword advertising is that customers are allowed to directly contact the products in question through its more efficient advertising when compared to the advertisements of mass media such as TV and radio, etc. The weak point of keyword advertising is that a company should have its advertisement registered on each and every portal site and finds it hard to exercise substantial supervision over its advertisement, there being a possibility of its advertising expenses exceeding its profits. Keyword advertising severs as the most appropriate methods of advertising for the sales and publicity of small and medium enterprises which are in need of a maximum of advertising effect at a low advertising cost. At present, keyword advertising is divided into CPC advertising and CPM advertising. The former is known as the most efficient technique, which is also referred to as advertising based on the meter rate system; A company is supposed to pay for the number of clicks on a searched keyword which users have searched. This is representatively adopted by Overture, Google's Adwords, Naver's Clickchoice, and Daum's Clicks, etc. CPM advertising is dependent upon the flat rate payment system, making a company pay for its advertisement on the basis of the number of exposure, not on the basis of the number of clicks. This method fixes a price for advertisement on the basis of 1,000-time exposure, and is mainly adopted by Naver's Timechoice, Daum's Speciallink, and Nate's Speedup, etc, At present, the CPC method is most frequently adopted. The weak point of the CPC method is that advertising cost can rise through constant clicks from the same IP. If a company makes good use of strategies for maximizing the strong points of keyword advertising and complementing its weak points, it is highly likely to turn its visitors into prospective customers. Accordingly, an advertiser should make an analysis of customers' behavior and approach them in a variety of ways, trying hard to find out what they want. With this in mind, her or she has to put multiple keywords into use when running for ads. When he or she first runs an ad, he or she should first give priority to which keyword to select. The advertiser should consider how many individuals using a search engine will click the keyword in question and how much money he or she has to pay for the advertisement. As the popular keywords that the users of search engines are frequently using are expensive in terms of a unit cost per click, the advertisers without much money for advertising at the initial phrase should pay attention to detailed keywords suitable to their budget. Detailed keywords are also referred to as peripheral keywords or extension keywords, which can be called a combination of major keywords. Most keywords are in the form of texts. The biggest strong point of text-based advertising is that it looks like search results, causing little antipathy to it. But it fails to attract much attention because of the fact that most keyword advertising is in the form of texts. Image-embedded advertising is easy to notice due to images, but it is exposed on the lower part of a web page and regarded as an advertisement, which leads to a low click through rate. However, its strong point is that its prices are lower than those of text-based advertising. If a company owns a logo or a product that is easy enough for people to recognize, the company is well advised to make good use of image-embedded advertising so as to attract Internet users' attention. Advertisers should make an analysis of their logos and examine customers' responses based on the events of sites in question and the composition of products as a vehicle for monitoring their behavior in detail. Besides, keyword advertising allows them to analyze the advertising effects of exposed keywords through the analysis of logos. The logo analysis refers to a close analysis of the current situation of a site by making an analysis of information about visitors on the basis of the analysis of the number of visitors and page view, and that of cookie values. It is in the log files generated through each Web server that a user's IP, used pages, the time when he or she uses it, and cookie values are stored. The log files contain a huge amount of data. As it is almost impossible to make a direct analysis of these log files, one is supposed to make an analysis of them by using solutions for a log analysis. The generic information that can be extracted from tools for each logo analysis includes the number of viewing the total pages, the number of average page view per day, the number of basic page view, the number of page view per visit, the total number of hits, the number of average hits per day, the number of hits per visit, the number of visits, the number of average visits per day, the net number of visitors, average visitors per day, one-time visitors, visitors who have come more than twice, and average using hours, etc. These sites are deemed to be useful for utilizing data for the analysis of the situation and current status of rival companies as well as benchmarking. As keyword advertising exposes advertisements exclusively on search-result pages, competition among advertisers attempting to preoccupy popular keywords is very fierce. Some portal sites keep on giving priority to the existing advertisers, whereas others provide chances to purchase keywords in question to all the advertisers after the advertising contract is over. If an advertiser tries to rely on keywords sensitive to seasons and timeliness in case of sites providing priority to the established advertisers, he or she may as well make a purchase of a vacant place for advertising lest he or she should miss appropriate timing for advertising. However, Naver doesn't provide priority to the existing advertisers as far as all the keyword advertisements are concerned. In this case, one can preoccupy keywords if he or she enters into a contract after confirming the contract period for advertising. This study is designed to take a look at marketing for keyword advertising and to present effective strategies for keyword advertising marketing. At present, the Korean CPC advertising market is virtually monopolized by Overture. Its strong points are that Overture is based on the CPC charging model and that advertisements are registered on the top of the most representative portal sites in Korea. These advantages serve as the most appropriate medium for small and medium enterprises to use. However, the CPC method of Overture has its weak points, too. That is, the CPC method is not the only perfect advertising model among the search advertisements in the on-line market. So it is absolutely necessary that small and medium enterprises including independent shopping malls should complement the weaknesses of the CPC method and make good use of strategies for maximizing its strengths so as to increase their sales and to create a point of contact with customers.

  • PDF