• 제목/요약/키워드: International input-output analysis

검색결과 146건 처리시간 0.02초

지역산업연관분석을 통한 한국 조선산업의 경제적 파급효과 분석: 전남지역을 중심으로 (An Analysis of the Regional Economic Impact of Korea Shipbuilding Industry by Use of the Regional Input-Output Model: Case in Jeonnam, Korea)

  • 채종훈
    • 국제지역연구
    • /
    • 제14권1호
    • /
    • pp.33-53
    • /
    • 2010
  • 본 연구는 조선산업이 전남지역의 지역경제에 미치는 파급효과를 분석하였으며, 분석 방법으로는 국내외적으로 경제적 파급효과를 측정하는데 가장 많이 사용되어온 지역산업연관분석을 이용하여 파급효과를 분석하였다. 분석결과 전남지역에서 조선산업의 최종수요 1,908,800백만 원이 발생 할 경우 전남지역에 미치는 산업별 생산유발효과는 약 3,038,624백만 원, 부가가치유발효과는 약 940,656백만 원, 고용창출효과는 약 13,361명, 소득유발효과는 약 702,056백만 원인 것으로 분석되었다. 또한 전남지역내 조선산업이 지역내 다른 산업에 미치는 생산파급효과를 살펴보면 제1차 금속제품 458,784백만 원, 화학제품 128,250백만 원, 금속제품 71,498백만 원, 석유 및 석탄제품 50,829백만 원 순으로 높게 나타났다. 이와 같이 전남지역에서 조선산업은 생산유발계수와 영향력계수는 29개 산업부문 중 6위로 매우 높은 수준으로 타산업에 미치는 경제적 파급효과와 산업견인효과가 높은 것으로 나타났다. 또한 소득유발효과와 부가가치유발효과, 고용유발효과, 전방산업 연관파급효과는 지역내에서 중상위 수준으로 나타나 전남지역의 향후 신규고용창출과 동부지역의 조선산업과 서부지역의 금속산업 및 화학산업간의 조화로운 발전을 위한 지역전략산업으로 육성이 필요하다고 할 수 있다.

퍼지근사추론을 이용한 유료도로의 적정요금 산정 - 거가대교를 중심으로 - (Optimal Toll Estimate of a Toll Road Using Fuzzy Approximate Reasoning - Forced on the Geoga Bridge -)

  • 하만복;김경환;김영
    • 한국도로학회논문집
    • /
    • 제8권3호
    • /
    • pp.63-76
    • /
    • 2006
  • 유료도로 건설계획시 적정 통행료의 산정은 사업의 경제성 분석에 매우 중요한 요소가 되며, 또한 어려운 일이다. 본 연구에서는 경남의 거제도와 부산의 가덕도를 연결하는 유료 거가대교를 대상으로 하여 SP(Stated Preference)자료를 이용하여 적정요금을 산정하고자 하였다. 이를 위해 거가대교의 잠재이용자인 국도 14호선을 이용하는 승용차 운전자들에 대해 거가대교가 개통된다는 가정하에서 다양한 절약시간 및 요금체계에 대해 설문조사를 하여 SP자료를 수집하였다. 이 SP자료를 이용하여 인간이 개략적인 추론을 통하여 결론에 도달하는 과정을 퍼지이론을 이용하여 모형화한 퍼지근사추론모형을 구축하였으며 이 모형을 이용하여 적정요금을 산정하고 조사대상 승용차 이용자들의 시간가치에 의해 검정하였다. 퍼지추론 모형 구축을 위해서는 통행절약시간과 요금이 입력변수로 선정되었으며 이용률이 출력변수로 선정되었다. 절약시간은 3개의 퍼지집합으로, 요금과 이용률은 각각 5개의 퍼지집합으로 구분되었다. 각 퍼지집합들은 triangular 형태와 trapezoidal 행태의 멤버쉽함수를 사용하였으며 총 12개의 퍼지규칙이 정립되었다. 구축된 퍼지근사추론 모형을 이용하여 각 요금수준에서의 이용률을 추정하고 수입을 최대로 하는 요금수준을 적정요금으로 산정하였다. 순위프로빗 모형에 의한 결과치와의 평균에 의해 추정된 절약 통행시간별 적정요금은 1시간30분 절약시는 요금수준 8,350원, 1시간 절약시는 6,250원, 30분절약시는 3,900원으로 산정되었다. 절약 통행시간 1시간에서의 적정요금 6.250은 승용차 운전자들의 시간가치의 50% 수준으로 과도한 요금은 아니므로 본 연구에서 적용한 기법이 타당성이 결여되지 않는 것으로 판단된다.

  • PDF

기업의 도제훈련 참여 및 투자 동기의 제도적 영향요인: 독일-한국 비교 연구 (A Comparative Study on Institutional Influence Factors of Firm's Motivation of Participating and Investing in Apprenticeship in Germany and Korea)

  • 이한별
    • 비교교육연구
    • /
    • 제27권1호
    • /
    • pp.247-284
    • /
    • 2017
  • 본 연구는 독일과 한국 기업의 도제훈련 참여 및 투자 동기가 어떻게 다르게 나타나는지, 기업의 참여 및 투자 동기에 영향을 미치는 양국의 도제훈련 제도적 요인은 어떠한지를 규명하는 것을 목적으로 한다. 그리고 두 국가의 제도적 요인을 비교하여 살펴봄으로써, 한국의 일학습병행제에 대한 정책적 시사점을 도출하고자 하였다. 독일과 한국 도제훈련의 제도적 특징 및 기업 참여 및 투자 현황을 파악하기 위해, 국제기구, 양국 정부와 연구기관의 정책자료, 연구자료, 보도자료 등을 중심으로 문헌분석을 실시하였다. 기업의 도제훈련 참여 및 투자 동기가 생산 지향적인지 투자 지향적인지 고려할 때, 독일은 훈련 기간 내 순비용이 발생함에 따라 투자 동기가, 한국은 훈련 기간 내 순편익이 발생함에 따라 생산 동기가 더 높은 것으로 나타나고 있다. 이렇듯 두 국가의 도제훈련 수익성 구조와 참여 및 투자 동기가 달라지는 원인을 본 연구는 제도적 요인에서 찾고 있다. 이에 두 국가의 제도적 요인을 (1) 맥락(노사정 관계, 법적 기반), (2) 투입(제도의 유연성, 정부지원금), (3) 과정(훈련 내용, 훈련 기간, 훈련의 질 보증), (4) 결과 요인(도제생의 이수율/잔류율, 도제생의 생산성)으로 구분하여 살펴보았다. 두 국가의 제도적 영향요인 비교 분석을 통해 도출한 핵심적인 시사점은 최소한의 필수 요건에 대한 기업의 "책무성" 부여와 그 나머지 부분에 대한 기업의 "자율성" 보장이라 할 수 있다.

글로벌 기업가정신과 공급사슬 내 사회적 자본이 수출성과에 미치는 영향 (The Effects of Global Entrepreneurship and Social Capital Within Supply Chain on the Export Performance)

  • 윤현덕;곽기영;서리빈
    • 벤처창업연구
    • /
    • 제7권3호
    • /
    • pp.1-16
    • /
    • 2012
  • 기업 간 경쟁이 기업군(群) 간 경쟁으로 전환되고 있는 경영환경 하에서 글로벌 공급사슬관리는 대기업에 비해 해외시장개척 능력과 자원이 상대적으로 부족한 중소기업에게 중요한 관리활동으로 인식되고 있다. 이에 본 연구는 중소기업과 글로벌 공급사슬파트너 간의 관계적 특성을 사회적 자본의 관점에서 파악하고 글로벌 기업가정신과 함께 수출성과에 미치는 구조적 영향관계를 검증하기 위해 수행되었다. 선행연구에 대한 이론적 배경을 토대로 사회적 자본과 글로벌 기업가정신을 조작적 정의, 측정문항을 개발하여 (사)글로벌 최고경영자클럽과 (사)한국중견기업연합회에 등록한 회원사 중 우수 해외진출 중소기업을 모집단으로 설문조사를 실시하였다. 그리고 수거된 총 192부의 개별응답을 표본집단으로 설정하여 통계분석에 적용하였다. 다중회귀분석 결과, 사회적 자본의 하위변수인 네트워크, 신뢰, 호혜적 규범과 글로벌 기업가정신의 하위변수인 혁신성, 진취성, 위험감수성은 주관적 재무적 수출성과에 모두 유의한 정(+)의 영향을 미치는 것으로 나타났다. 또한 중소기업의 글로벌 기업가정신은 공급사슬파트너와의 사회적 자본 형성에 긍정적인 영향을 미치며, 다시 사회적 자본은 글로벌 기업가정신과 수출성과의 영향관계에서 부분적으로 매개효과가 존재하는 것으로 나타났다. 이상의 연구결과는 글로벌 시장 확대와 고객욕구 다양화에 따라 해외시장의 불확실성이 높아지는 상황에서 수출성과를 창출하기 위해선 장기적 관점에서 공급사슬파트너와의 사회적 자본 요소의 개발을 위한 노력과 투자가 필요함을 의미한다. 또한 해외시장에서 자원의 생산적 이동과 사업적 기회의 발견을 위해 요구되는 글로벌 기업가정신의 함양이 공급사슬 내 사회적 자본의 형성에 도움을 주며 공동의 목표를 달성하는데 중요한 요인임을 시사한다.

  • PDF

다분류 SVM을 이용한 DEA기반 벤처기업 효율성등급 예측모형 (The Prediction of DEA based Efficiency Rating for Venture Business Using Multi-class SVM)

  • 박지영;홍태호
    • Asia pacific journal of information systems
    • /
    • 제19권2호
    • /
    • pp.139-155
    • /
    • 2009
  • For the last few decades, many studies have tried to explore and unveil venture companies' success factors and unique features in order to identify the sources of such companies' competitive advantages over their rivals. Such venture companies have shown tendency to give high returns for investors generally making the best use of information technology. For this reason, many venture companies are keen on attracting avid investors' attention. Investors generally make their investment decisions by carefully examining the evaluation criteria of the alternatives. To them, credit rating information provided by international rating agencies, such as Standard and Poor's, Moody's and Fitch is crucial source as to such pivotal concerns as companies stability, growth, and risk status. But these types of information are generated only for the companies issuing corporate bonds, not venture companies. Therefore, this study proposes a method for evaluating venture businesses by presenting our recent empirical results using financial data of Korean venture companies listed on KOSDAQ in Korea exchange. In addition, this paper used multi-class SVM for the prediction of DEA-based efficiency rating for venture businesses, which was derived from our proposed method. Our approach sheds light on ways to locate efficient companies generating high level of profits. Above all, in determining effective ways to evaluate a venture firm's efficiency, it is important to understand the major contributing factors of such efficiency. Therefore, this paper is constructed on the basis of following two ideas to classify which companies are more efficient venture companies: i) making DEA based multi-class rating for sample companies and ii) developing multi-class SVM-based efficiency prediction model for classifying all companies. First, the Data Envelopment Analysis(DEA) is a non-parametric multiple input-output efficiency technique that measures the relative efficiency of decision making units(DMUs) using a linear programming based model. It is non-parametric because it requires no assumption on the shape or parameters of the underlying production function. DEA has been already widely applied for evaluating the relative efficiency of DMUs. Recently, a number of DEA based studies have evaluated the efficiency of various types of companies, such as internet companies and venture companies. It has been also applied to corporate credit ratings. In this study we utilized DEA for sorting venture companies by efficiency based ratings. The Support Vector Machine(SVM), on the other hand, is a popular technique for solving data classification problems. In this paper, we employed SVM to classify the efficiency ratings in IT venture companies according to the results of DEA. The SVM method was first developed by Vapnik (1995). As one of many machine learning techniques, SVM is based on a statistical theory. Thus far, the method has shown good performances especially in generalizing capacity in classification tasks, resulting in numerous applications in many areas of business, SVM is basically the algorithm that finds the maximum margin hyperplane, which is the maximum separation between classes. According to this method, support vectors are the closest to the maximum margin hyperplane. If it is impossible to classify, we can use the kernel function. In the case of nonlinear class boundaries, we can transform the inputs into a high-dimensional feature space, This is the original input space and is mapped into a high-dimensional dot-product space. Many studies applied SVM to the prediction of bankruptcy, the forecast a financial time series, and the problem of estimating credit rating, In this study we employed SVM for developing data mining-based efficiency prediction model. We used the Gaussian radial function as a kernel function of SVM. In multi-class SVM, we adopted one-against-one approach between binary classification method and two all-together methods, proposed by Weston and Watkins(1999) and Crammer and Singer(2000), respectively. In this research, we used corporate information of 154 companies listed on KOSDAQ market in Korea exchange. We obtained companies' financial information of 2005 from the KIS(Korea Information Service, Inc.). Using this data, we made multi-class rating with DEA efficiency and built multi-class prediction model based data mining. Among three manners of multi-classification, the hit ratio of the Weston and Watkins method is the best in the test data set. In multi classification problems as efficiency ratings of venture business, it is very useful for investors to know the class with errors, one class difference, when it is difficult to find out the accurate class in the actual market. So we presented accuracy results within 1-class errors, and the Weston and Watkins method showed 85.7% accuracy in our test samples. We conclude that the DEA based multi-class approach in venture business generates more information than the binary classification problem, notwithstanding its efficiency level. We believe this model can help investors in decision making as it provides a reliably tool to evaluate venture companies in the financial domain. For the future research, we perceive the need to enhance such areas as the variable selection process, the parameter selection of kernel function, the generalization, and the sample size of multi-class.

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • 제20권2호
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.