• Title/Summary/Keyword: Network Assets

Search Result 170, Processing Time 0.024 seconds

The roles of Subcontractors' Entrepreneurship on the Relationship Commitment towards the Parent Companies (수급사업자의 기업가정신이 관계몰입을 유도하는 경로)

  • Nak Hwan Choi;Cheol Seob Byeon;Yong Gyun Lee
    • Asia Marketing Journal
    • /
    • v.13 no.1
    • /
    • pp.51-84
    • /
    • 2011
  • It seems essential to examine the factors that may affect relationship commitment of subcontractors to parent companies in the industrial market in Korea in an effort to construct a win-win-type cooperative network among them. Lots of studies have been focusing on the consumer goods market. Relatively few studies have been focused on industrial market. In the industrial goods market subcontractors used to sell their parts or services only to a small number of parent companies in a large quantity, resulting in decisive control of subcontractors over the quality of parent companies' finished goods. This is why relationship between subcontractors and parent companies is extremely important. From this viewpoint, this study aims to survey and analyze empirically the paths leading to relationship commitment of subcontractors toward the parent companies which are required to incite them to build up a collaborative network by means of subcontractors' entrepreneurship. For this aim, market orientation effects of entrepreneurship as well as factors of performance and trust are particularly set forth as the bases of developing hypotheses in this study in order to explore the paths from entrepreneurship to relationship commitment as follows. First, the path of entrepreneurship-market orientation-communication-trust- relationship commitment; second, the path of entrepreneurship-market orientation-performance-relationship commitment; third, the path of entrepreneurship-market orientation-transaction specific asset investment -trust-relationship commitment; and fourth, the path in which the entrepreneurship is expected to promote direct transaction specific asset investment by parent companies to induce their trust and, eventually, relationship commitment of subcontractors. The outcomes of the empirical analysis in this study may be summed up as follows: First, the conclusions of preceding studies are also supported here by the fact that the entrepreneurship of subcontractors promotes their market orientation (hypothesis 9), indicating that the entrepreneurship can facilitate collection, proliferation of and response to market informations. On the contrary, however, the assumption that the entrepreneurship of subcontractors might directly accelerate transaction specific asset investment by parent companies (hypothesis 8) is rejected. Second, although the influence of subcontractors' entrepreneurship on parent companies' investment of assets peculiar to their transactions is not affirmed, the assumption is found to be supported that subcontractors' market orientation would expedite the parent companies' investment of assets peculiar to their transactions. Moreover, it is also confirmed that parent companies' investment of assets peculiar to transactions would promote subcontractors' trust toward the parent companies (hypothesis 6), signifying that parent companies may level up their trust in subcontractors when they make great amount of efforts to invest in the assets peculiar to transactions, not behaving opportunistically, Third, the hypotheses 4 and 5 also turn out to be supported by the analysis as the former assumes that market orientation could promote communication and the latter relates that the communication between subcontractors and parent companies would prompt trust, both results in affirming that market orientation could introduce open communication to speed up sharing of information and that sharing of information by way of communication might give an impetus to trust. Fourth, the assumption that subcontractors' market orientation would expedite performance (hypothesis 3) is also proved favorably to the significant level equivalent to that of preceding studies. Fifth, same as preceding studies, it is also verified in this study that the benefit (outcomes) awarded by parent companies to subcontractors will be a direct cause exercising a positive impact upon relationship commitment(hypothesis 2) and that the trust of subcontractors toward parent companies may have affirmative influence on the relationship commitment(hypothesis 1). Overall, the first, second and third paths are identified as being supported by the hypotheses among constituent factors, while the fourth path is deemed meaningless since it is shown that the entrepreneurship exercises no effects on parent companies' investment in the assets peculiar to transactions.

  • PDF

A Study on the Costs Factors of an being additional Budget by the Security System (보안시스템으로 인해 추가되는 예산 외 비용의 요인에 관한 연구)

  • Jeon, Jeong-Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.12B
    • /
    • pp.1481-1488
    • /
    • 2011
  • Recently, Hacking Attacks are appearing as a various Attack techniques with evolution of the Network. and most of the network through a Various Security Systems are responding to an attack. In addition, it should be placed adding the Security Systems to protect the Internal Network's Information assets from External attacks. But, The use of Security Systems inside the network makes a significant impact on Security and Performance, as well as a result causes Economic Additional Costs. Therefore, In this paper, it will be to analyze by associated a case study and experimental results about the Additional Costs Factors(Variable situations difficult to predict and Information Security Recognition levels, Security Systems, Information Asset Assessment). This is expected to serve as a valuable Information for the Reduction of an Costs in a Network deployment and Design in a future.

A Study on Evaluation Criteria for M&S Analysis of Command and Control Effectiveness in Joint Operations (합동작전 지휘통제 효과도 모의분석을 위한 평가기준 연구)

  • Sohn, Young-Hwan;Kim, Weon-Bae
    • Journal of the Korea Society for Simulation
    • /
    • v.20 no.4
    • /
    • pp.167-175
    • /
    • 2011
  • Concerning the effectiveness of command and control is increasing worldwide as future warfare is changing into Network Centric Warfare (NCW). Unlike the old attrition warfare that depends mainly on mobility and strike assets, the modern warfare is based on information and network which regards acquisition and circulation of information as important. Therefore, there's no room for rediscussion that C4ISR (Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance) system will play an important role in warfare. In spite of this fact, there isn't any way to explain clearly how to measure the effectiveness of command and control system in a battle and to reflect it systematically in a system effectiveness. In this study, we examined NCO-CF (Network Centric Operations-Conceptual Framework), developed by the Department of Defense (DOD), which can conceptually explain the increment of effectiveness of C4ISR system that is the basis of NCO. And we suggested methodology based on NCO-CF to establish the evaluation criteria for M&S analysis of command and control effectiveness. As a case study we derived the evaluation criteria for the command and control system in joint operations by applying the suggested methodology.

Management of Infrastructure(Road) Based On Asset Value (자산가치 기반의 교통인프라 유지관리)

  • Dong-Joo Kim;Woo-Seok Kim;Yong-Kang Lee;Hoon Yoo
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.28 no.3
    • /
    • pp.100-107
    • /
    • 2024
  • Currently, in Korea, due to the rapid aging and deterioration of facilities, the minimum Maintenance Level and Performance Level' of facilities are required by the 'Facility Safety Act' or 'Infrastructure Management Act'. Since infrastructure assets have a long lifespan and the pattern of deterioration over time is complex, it is very difficult to maintain infrastructure as 'minimum maintenance state' or 'minimum performance state' by the current way of management. 'Asset Management' shall be performed not only by a technical perspective, but also by an accounting perspective such as cost and asset value. However, due to lack of awareness of 'asset management' among stakeholder, only technical perspective management is being carried out in practice. In order to effectively manage infrastructure assets, complex consideration of various asset value factors such as budget and service as well as safety and durability are required. In this paper, we presented a theory to evaluate and quantify the road network value for efficient asset management of the road network. We also presented a method of simulation to apply the theory presented in this paper. Through simulation and the results derived from this study, it is possible to specify the budget for the future national asset management, and to optimize the strategy for the management of old road facilities.

A Study on Innovation and Competitive Strategy in Network-Based Economy: Case Analysis on Network Effects, Incremental Innovation in Korean Mobile Telecommunication Industry (네트워크 경제 하에서 혁신과 경쟁 전략에 대한 기반 연구: 한국 이동통신 산업 사례를 중심으로)

  • An, Kwang-Jun;Shin, Dong-Hyung
    • Journal of Korea Technology Innovation Society
    • /
    • v.11 no.2
    • /
    • pp.145-170
    • /
    • 2008
  • The existence of network is indeed the single most important factor that brings about new business phenomena in the new digital economy, especially in the IT industry. Network effect refers to a phenomenon that the increase in size of the network leads to increased network value and user utility. It determines the competitive structure of an industry and the performances of industry competitors (Shapiro and Varian, 1999). The phenomenon of increasing returns and winner-take-all enjoyed by the early winner in the competition can be attributed to the existence of positive feedback which increases the value of network and induces more users into join the network (Arthur, 1996; Shapiro and Varian, 1999; Song and Lee, 2003). This research attempts to shed light on the topic of innovation and competitive strategy of network-based industries. We analyze the case of the Korean mobile communications industry, in which a shift in technological paradigm from 2G to 3G brought new changes to the competitive structure of the industry. The Korean mobile communications industry makes an ideal case for analysis since it is an industry whose value is inherently dependent upon its user network. It is characterized by the typical increasing returns, in which a monopolizing player is enjoying firstmover's network effects. Because of the existence of network in the mobile communications industry, latecomers' disruptive innovations could not outcompete the incumbent's sustaining innovations. The contribution of this research lies in laying a groundwork for future studies by introducing a numerical simulation model to analyze the complexity theory and network effect.

  • PDF

Bankruptcy Type Prediction Using A Hybrid Artificial Neural Networks Model (하이브리드 인공신경망 모형을 이용한 부도 유형 예측)

  • Jo, Nam-ok;Kim, Hyun-jung;Shin, Kyung-shik
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.3
    • /
    • pp.79-99
    • /
    • 2015
  • The prediction of bankruptcy has been extensively studied in the accounting and finance field. It can have an important impact on lending decisions and the profitability of financial institutions in terms of risk management. Many researchers have focused on constructing a more robust bankruptcy prediction model. Early studies primarily used statistical techniques such as multiple discriminant analysis (MDA) and logit analysis for bankruptcy prediction. However, many studies have demonstrated that artificial intelligence (AI) approaches, such as artificial neural networks (ANN), decision trees, case-based reasoning (CBR), and support vector machine (SVM), have been outperforming statistical techniques since 1990s for business classification problems because statistical methods have some rigid assumptions in their application. In previous studies on corporate bankruptcy, many researchers have focused on developing a bankruptcy prediction model using financial ratios. However, there are few studies that suggest the specific types of bankruptcy. Previous bankruptcy prediction models have generally been interested in predicting whether or not firms will become bankrupt. Most of the studies on bankruptcy types have focused on reviewing the previous literature or performing a case study. Thus, this study develops a model using data mining techniques for predicting the specific types of bankruptcy as well as the occurrence of bankruptcy in Korean small- and medium-sized construction firms in terms of profitability, stability, and activity index. Thus, firms will be able to prevent it from occurring in advance. We propose a hybrid approach using two artificial neural networks (ANNs) for the prediction of bankruptcy types. The first is a back-propagation neural network (BPN) model using supervised learning for bankruptcy prediction and the second is a self-organizing map (SOM) model using unsupervised learning to classify bankruptcy data into several types. Based on the constructed model, we predict the bankruptcy of companies by applying the BPN model to a validation set that was not utilized in the development of the model. This allows for identifying the specific types of bankruptcy by using bankruptcy data predicted by the BPN model. We calculated the average of selected input variables through statistical test for each cluster to interpret characteristics of the derived clusters in the SOM model. Each cluster represents bankruptcy type classified through data of bankruptcy firms, and input variables indicate financial ratios in interpreting the meaning of each cluster. The experimental result shows that each of five bankruptcy types has different characteristics according to financial ratios. Type 1 (severe bankruptcy) has inferior financial statements except for EBITDA (earnings before interest, taxes, depreciation, and amortization) to sales based on the clustering results. Type 2 (lack of stability) has a low quick ratio, low stockholder's equity to total assets, and high total borrowings to total assets. Type 3 (lack of activity) has a slightly low total asset turnover and fixed asset turnover. Type 4 (lack of profitability) has low retained earnings to total assets and EBITDA to sales which represent the indices of profitability. Type 5 (recoverable bankruptcy) includes firms that have a relatively good financial condition as compared to other bankruptcy types even though they are bankrupt. Based on the findings, researchers and practitioners engaged in the credit evaluation field can obtain more useful information about the types of corporate bankruptcy. In this paper, we utilized the financial ratios of firms to classify bankruptcy types. It is important to select the input variables that correctly predict bankruptcy and meaningfully classify the type of bankruptcy. In a further study, we will include non-financial factors such as size, industry, and age of the firms. Thus, we can obtain realistic clustering results for bankruptcy types by combining qualitative factors and reflecting the domain knowledge of experts.

Flow-based Anomaly Detection Using Access Behavior Profiling and Time-sequenced Relation Mining

  • Liu, Weixin;Zheng, Kangfeng;Wu, Bin;Wu, Chunhua;Niu, Xinxin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.6
    • /
    • pp.2781-2800
    • /
    • 2016
  • Emerging attacks aim to access proprietary assets and steal data for business or political motives, such as Operation Aurora and Operation Shady RAT. Skilled Intruders would likely remove their traces on targeted hosts, but their network movements, which are continuously recorded by network devices, cannot be easily eliminated by themselves. However, without complete knowledge about both inbound/outbound and internal traffic, it is difficult for security team to unveil hidden traces of intruders. In this paper, we propose an autonomous anomaly detection system based on behavior profiling and relation mining. The single-hop access profiling model employ a novel linear grouping algorithm PSOLGA to create behavior profiles for each individual server application discovered automatically in historical flow analysis. Besides that, the double-hop access relation model utilizes in-memory graph to mine time-sequenced access relations between different server applications. Using the behavior profiles and relation rules, this approach is able to detect possible anomalies and violations in real-time detection. Finally, the experimental results demonstrate that the designed models are promising in terms of accuracy and computational efficiency.

A Methodology for Hedging Equity Linked Warrant Using Artificial Neural Network (인공신경망을 이용한 주식워런트증권(ELW)의 헤징 방안)

  • Ryu, Jae-Pil;Shin, Hyun-Joon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.3
    • /
    • pp.1091-1098
    • /
    • 2012
  • From the perspective of risk management, financial organization that have issued ELW require an efficient hedging methodology due to recently increased trade volume of ELW. This study presents an ELW hedging methodology using artificial neural network(ANN) to minimize hedging costs. The performance of the presented methodology in this study is examined by analysis utilizing the prices and volatilities of underlying assets, risk free interest rates, and maturities and computational experiments show that the proposed method is superior to existing dynamic delta hedging(DDH) technique in terms of hedging costs ranged from 25% to 250%.

The Self-esteem of the Elderly and Relative Influence of Variables (노인의 자아존중감과 변수들의 상대적 영향력)

  • Jin, Yean-Ju
    • Journal of Family Resource Management and Policy Review
    • /
    • v.14 no.4
    • /
    • pp.263-277
    • /
    • 2010
  • The purpose of this study was to investigate levels of self-esteem and related variables among the elderly. The data is from the Korea Welfare Panel Study conducted in 2007. The data was gathered from 2077 elderly, over 65 years old, and was analyzed by Step multiple regression analysis. The major results were as follows. First, the overall level of self-esteem was in the middle range, with an average of 28.18 points. Second, self-esteem levels showed significant differences in terms of gender, age, education level, health, spouse, health insurance, job, monthly household expenses, national pension, assets, home ownership, satisfaction with spouse, satisfaction with leisure, satisfaction with social network, economic services, medical services, and other services. Finally, Model 1 showed meaningful influences from gender, age, education level, health, spouse, and health insurance. Model 2 showed meaningful influences from education level, health, spouse, health insurance, job, and national pension. Models 3 and 4 showed meaningful influences from education level, health, job, satisfaction of spouse, satisfaction with leisure, and satisfaction with social network. In other words, the factors that had the most significant impact on self-esteem were satisfaction.

  • PDF

Design and Implimentation of Intrusion Detection System on Contents Security (컨텐츠 보안 침입 탐지 시스템 설계 및 구현)

  • Kim, Young Sun;Seo, Choon Weon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.11
    • /
    • pp.164-168
    • /
    • 2015
  • As Internet use is widespread advertising through the Web, shopping, banking, etc. As the various services offered by the network, the need for Web security is increasing. A security system for the protection of information assets and systems against various types of external hacking threats and unlawful intrusion will require. Intrusion Detection Tool of the paper web will have is to increase the security level, to prevent the loss of resources and labor spent by the individual monitoring of the web. Security intrusion detection system analyzes the cause of the problem of the security vulnerability and exposure of the information on the Web. Using a monitor to determine a fast support of security is to design a security system for the purpose of protecting the information security vulnerability and exposure information.