• Title/Summary/Keyword: Organizational context

Search Result 309, Processing Time 0.028 seconds

A Study on a Effect of Product Design and a Primary factor of Qualify Competitiveness (제품 디자인의 파급효과와 품질경쟁력의 결정요인에 관한 연구)

  • Lim, Chae-Suk;Yoon, Jong-Young
    • Archives of design research
    • /
    • v.18 no.4 s.62
    • /
    • pp.95-104
    • /
    • 2005
  • The purpose of this study is to estimate the determinants of product design and analyze the impacts of product design on quality competitiveness, product reliability, and consumer satisfaction in an attempt to provide a foundation for the theory of design management. For this empirical analysis, this study has derived the relevant measurement variables from a survey on 400 Korean manufacturing firms during the period of $August{\sim}October$ 2003. The empirical findings are summarized as follows: First, the determinants of product design are very significantly (at p<0.001) estimated to be the R&D capability, the level of R&D expenditure, the level of innovative activities(5S, TQM, 6Sigma, QC, etc.). This empirical result can support Pawar and Driva(1999)'s two principles by which the performance of product design and product development can be simultaneously evaluated in the context of CE(concurrent engineering) of NPD(newly product development) activities. Second, the hypothesis on the causality: product design${\rightarrow}$quality competitiveness${\rightarrow}$customer satisfaction${\rightarrow}$customer loyalty is very significantly (at p<0.001) accepted. This implies that product design positively affects consumer satisfaction, not directly but indirectly, by influencing quality competitiveness. This empirical result of this study can also support the studies of for example Flynn et al.(1994), Ahire et at.(1996), Afire and Dreyfus(2000) which conclude that design management is a significant determinant of product quality. The aforementioned empirical results are important in the following sense: the empirical result that quality competitiveness plays a bridging role between product design and consumer satisfaction can reconcile the traditional debate between QFD(quality function development) approach asserted by product developers and conjoint analysis maintained by marketers. The first empirical result is related to QFD approach whereas the second empirical result is related to conjoint analysis. At the same time, the empirical results of this study can support the rationale of design integration(DI) of Ettlie(1997), i.e., the coordination of the timing and substance of product development activities performed by the various disciplines and organizational functions of a product's life cycle. Finally, the policy implication (at the corporate level) from the empirical results is that successful design management(DM) requires not only the support of top management but also the removal of communication barriers, (i.e. the adoption of cross-functional teams) so that concurrent engineering(CE), the simultaneous development of product and process designs can assure product development speed, design quality, and market success.

  • PDF

A Study on the Effects of the Institutional Pressure on the Process of Implementation and Appropriation of System: M-EMRS in Hospital Organization (시스템의 도입과 전유 과정에 영향을 미치는 제도적 압력에 관한 연구: 병원조직의 모바일 전자의무기록 시스템을 대상으로)

  • Lee, Zoon-Ky;Shin, Ho-Kyoung;Choi, Hee-Jae
    • Asia pacific journal of information systems
    • /
    • v.19 no.2
    • /
    • pp.95-116
    • /
    • 2009
  • Increasingly the institutional theory has been an important theoretical view of decision making process and IT adoption in many academic researches. This study used the institutional theory as a lens through which we can understand the factors that enable the effective appropriation of advanced information technology. It posits that mimetic, coercive, and normative pressures existing in an institutionalized environment could influence the participation of top managers or decision makers and the involvement of users toward an effective use of IT in their tasks. Since the introduction of IT, organizational members have been using IT in their daily tasks, creating and recreating rules and resources according to their own methods and needs. That is to say, the adaptation process of the IT and outcomes are different among organizations. The previous studies on a diverse use of IT refer to the appropriation of technology from the social technology view. Users appropriate IT through not only technology itself, but also in terms of how they use it or how they make the social practice in their use of it. In this study, the concepts of institutional pressure, appropriation, participation of decision makers, and involvement of users toward the appropriation are explored in the context of the appropriation of the mobile electronic medical record system (M-EMRS) in particularly a hospital setting. Based on the conceptual definition of institutional pressure, participation and involvement, operational measures are reconstructed. Furthermore, the concept of appropriation is measured in the aspect of three sub-constructs-consensus on appropriation, faithful appropriation, and attitude of use. Grounded in the relevant theories to appropriation of IT, we developed a research framework in which the effects of institutional pressure, participation and involvement on the appropriation of IT are analyzed. Within this theoretical framework, we formulated several hypotheses. We developed a second order institutional pressure and appropriation construct. After establishing its validity and reliability, we tested the hypotheses with empirical data from 101 users in 3 hospitals which had adopted and used the M-EMRS. We examined the mediating effect of the participation of decision makers and the involvement of users on the appropriation and empirically validated their relationships. The results show that the mimetic, coercive, and normative institutional pressure has an effect on the participation of decision makers and the involvement of users in the appropriation of IT while the participation of decision makers and the involvement of users have an effect on the appropriation of IT. The results also suggest that the institutional pressure and the participation of decision makers influence the involvement of users toward an appropriation of IT. Our results emphasize the mediating effect of the institutional pressure on the appropriation of IT. Namely, the higher degree of the participation of decision makers and the involvement of users, the more effective appropriation users will represent. These results provide strong support for institutional-based variables as predictors of appropriation. These findings also indicate that organizations should focus on the role of participation of decision makers and the involvement of users for the purpose of effective appropriation, and these are the practical implications of our study. The theoretical contribution of this study is lies in the integrated model of the effect of institutional pressure on the appropriation of IT. The results are consistent with the institutional theory and support previous studies on adaptive structuration theory.

What happens after IT adoption?: Role of habits, confirmation, and computer self-efficacy formed by the experiences of use (정보기술 수용 후 주관적 지각 형성: 사용 경험에서 형성된 습관, 기대일치, 자기효능감의 역할)

  • Kim, Yong-Young;Oh, Sang-Jo;Ahn, Joong-Ho;Jahng, Jung-Joo
    • Asia pacific journal of information systems
    • /
    • v.18 no.1
    • /
    • pp.25-51
    • /
    • 2008
  • Researchers have been continuously interested in the adoption of information technology (IT) since it is of great importance to the information systems success and it is also an important stage to the success. Adoption alone, however, does not ensure information systems success because it does not necessarily lead to achieving organizational or individual objectives. When an organization or an individual decide to adopt certain information technologies, they have objectives to accomplish by using those technologies. Adoption itself is not the ultimate goal. The period after adoption is when users continue to use IT and intended objectives can be accomplished. Therefore, continued IT use in the post-adoption period accounts more for the accomplishment of the objectives and thus information systems success. Previous studies also suggest that continued IT use in the post-adoption period is one of the important factors to improve long-term productivity. Despite the importance there are few empirical studies focusing on the user behavior of continued IT use in the post-adoption period. User behavior in the post-adoption period is different from that in the pre-adoption period. According to the technology acceptance model, which explains well about the IT adoption, users decide to adopt IT assessing the usefulness and the ease of use. After adoption, users are exposed to new experiences and they shape new beliefs different from the thoughts they had before. Users come to make decisions based on their experiences of IT use whether they will continue to use it or not. Most theories about the user behaviors in the pre-adoption period are limited in describing them after adoption since they do not consider user's experiences of using the adopted IT and the beliefs formed by those experiences. Therefore, in this study, we explore user's experiences and beliefs in the post-adoption period and examine how they affect user's intention to continue to use IT. Through deep literature reviews on the construction of subjective beliefs by experiences, we draw three meaningful constructs which theoretically have great impacts on the continued use of IT: perceived habit, confirmation, and computer self-efficacy. Then, we examine the role of the subjective beliefs on the cognitive/affective attitudes and intention to continue to use that IT. We set up a research model and conducted survey research. Since IT use implies interactions among a user, IT, and a task, we carefully selected the sample of users using same/similar IT to perform same/similar tasks, to exclude unwanted influences of other factors than subjective beliefs on the IT use. We also considered that the sample of users were able to make decisions to continue to use IT volitionally or at least quasi-volitionally. For each construct, we used measurement items recognized for reliability and widely used in the previous research. We slightly modified some items proper to the research context and a pilot test was carried out for forty users of a portal service in a university. We performed a full-scale survey after verifying the reliability of the measurement. The results show that the intention to continue to use IT is strongly influenced by cognitive/affective attitudes, perceived habits, and computer self-efficacy. Confirmation affects the intention to continue indirectly through cognitive/affective attitudes. All the constructs representing the subjective beliefs built by the experiences of IT use have direct and/or indirect impacts on the intention of users. The results also show that the attitudes in the post-adoption period are formed, at least partly, by the experiences of IT use and newly shaped beliefs after adoption. The findings suggest that subjective beliefs built by the experiences have deep impacts on the continued use. The results of the study signify that while experiencing IT in the post-adoption period users form new beliefs, attitudes, and intentions which may be different from those of the pre-adoption period. The results of this study partly demonstrate that the beliefs shaped by the behaviors, those are the experiences of IT use, influence users' attitudes and intention. The results also suggest that behaviors (experiences) also change attitudes while attitudes shape behaviors. If we combine the findings of this study with the results of the previous research on IT adoption, we can propose a cycle of IT adoption and use where behavior shapes attitude, the attitude forms new behavior, and that behavior shapes new attitude. Different from the previous research, the study focused on the user experience after IT adoption and empirically demonstrated the strong influence of the subjective beliefs formed in the post-adoption period on the continued use. This partly confirms the differences between attitudes in the pre-adoption and in the post-adoption period. Users continuously change their attitudes and intentions while experiencing (using) IT. Therefore, to make users adopt IT and to make them use IT after adoption is a different problem. To encourage users to use IT after adoption, experiential variables such as perceived habit, confirmation, and computer self-efficacy should be managed properly.

Learning from the USA's Single Emergency Number 911: Policy Implications for Korea (미국 긴급번호 911 운영시스템에 관한 연구: 긴급번호 실질적 통합을 위한 정책 시사점 제시 중심으로)

  • Kim, Hak-Kyong;Lee, Sung-Yong
    • Korean Security Journal
    • /
    • no.43
    • /
    • pp.67-97
    • /
    • 2015
  • In Korea, a single emergency number, such as 911 of the USA and 999 of the UK, does not exist. This issue became highly controversial, when the Sewol Ferry Sinking disaster occurred last year. So, the Korean government has planned to adopt a single emergency number, integrating 112 of the Police, 119 of the Fire and Ambulance, 122 of the Korean Coast Guard, and many other emergency numbers. However, the integration plan recently proposed by the Ministry of Public Safety Security seems to be, what is called, a "partial integration model" which repeals the 122 number, but still maintains 112, 119, and 110 respectively. In this context, the study looks into USA's (diverse) 911 operating system, and subsequently tries to draw general features or characteristics. Further, the research attempts to derive policy implication from the general features. If the proposed partial integration model reflects the policy implications, the model can virtually operate like the 911 system -i.e. a single emergency number system - creating inter-operability between responding agencies such as police, fire, and ambulance, even though it is not a perfect integration model. The features drawn are (1) integration of emergency call-taking, (2) functional separation of call-taking and dispatching, (3) integration of physical facilities for call-taking and dispatching, and (4) professional call-takers and dispatchers. Moreover, the policy implications derived from the characteristics are (1) a user-friendly system - fast but accurate responses, (2) integrated responses to accidents, (3) professional call-taking and dispatching & objective and comprehensive risk assessment, and finally (4) active organizational learning in emergency call centers. Considering the policy implications, the following suggestions need to be applied to the current proposed plan: 1. Emergency services' systems should be tightly linked and connected in a systemic way so that they can communicate and exchange intelligence with one another. 2. Public safety answering points (call centers) of each emergency service should share their education and training modules, manuals, etc. Common training and manuals are also needed for inter-operability. 3. Personal management to enable-long term service in public safety answering points (call centers) should be established as one of the ways to promote professionalism.

  • PDF

India's Maritime-Security Strategy: Pretext, Context and Subtext (인도의 해상 안보 전략: 구실, 맥락 및 숨은 의미)

  • Khurana, Gurpreet S
    • Maritime Security
    • /
    • v.4 no.1
    • /
    • pp.1-56
    • /
    • 2022
  • Why has India become a key actor in the maritime-configured Indo-Pacific region? There are some external factors, but for India, its geo-strategic frontier encompassing its geopolitical and maritime interests is expanding rapidly beyond its territorial space across both the Indian and Pacific oceans amidst an increasingly arduous geopolitical and security environment. India must, therefore, acquire the ability to influence events within this strategic arena using all facets of national power, including maritime-military power. Lately, therefore, New Delhi has invested much intellectual capital to review its maritime-security strategy. India's new strategy is premised on the concept of holistic security involving the 'softer' aspects of maritime-security, and a rekindling of maritime consciousness in India, a nation that has traditionally been beset by 'sea-blindness'. The strategy adopts a region-wide, inclusive, and a more proactive approach than hitherto, as is evident in its title 'Ensuring Secure Seas: Indian Maritime Security Strategy'. While it deals with the growing concern of new non-traditional threats in the Indian littoral and the need for military deterrence and preparedness, it also addresses the imperatives for India to seek a favorable and rules-based benign environment in its immediate and extended maritime periphery, including through multi-vectored strategic partnerships dictated by its enduring principle of strategic autonomy. For a more profound and comprehensive understanding of India's maritime-security strategy, this paper examines the key unstated and implicit factors that underpin the strategy. These include India's historical and cultural evolution as a nation; its strategic geography; its geopolitical and security perceptions; and the political directions to its security forces. The paper deals specifically with India's response to maritime threats ranging from natural disasters, crime and state-sponsored terrorism to those posed by Pakistan and China, as well as the Indian Navy's envisaged security role East of the Malacca Straits. It also analyzes the aspects of organizational restructuring and force planning of India's maritime-security forces.

  • PDF

A Study on the Discourse Regarding the Lineage Transmission to Haewol in the Eastern Learning: Focused on Document Verification (해월의 동학 도통전수 담론 연구 - 문헌 고증을 중심으로 -)

  • Park Sang-kyu
    • Journal of the Daesoon Academy of Sciences
    • /
    • v.48
    • /
    • pp.41-155
    • /
    • 2024
  • Among the records that attest to the period from July to August of 1863, when Suwun was believed to have transmitted the orthodox lineage to Haewol, the oldest documents are The Collection of Suwun's Literary Works (水雲文集), The Collection of Great Master Lord's Literary Works (大先生主文集), and The Records of Dao Origin of Master Choe's Literary Collection (崔先生文集道源記書, hereafter referred to as The Records of Dao Origin). The records regarding Suwun in these three documents are considered to have originated from the same context. The variances embedded in the three documents have led to arguments about which documents accurately reflect the fact of orthodox lineage transmission. Additionally, these variances highlight the necessity of a review regarding the characteristics of early Eastern Learning, such as its faith and organizational systems. Accordingly, by thoroughly examining these three documents, it is possible to elucidate the chronological order, establishment-date, accuracy, descriptive direction, and characteristics of the faith system of early Eastern Learning as these are reflected in each document. If successful, this examination would provide a clearer description of the developmental process of Eastern Learning from 1860 to 1880, facilitating a more in-depth analysis of the significance embedded in various forms of discourse on the movement's orthodox lineage transmission. In comparing the three documents and contrasting them with related sources, the results of the textual examination assert that the documents within the lineage of The Collection of Suwun's Literary Works, given they lack a clear record of the event regarding Haewol's orthodox lineage succession, may be the first draft of The Collection of Great Master Lord's Literary Works and The Records of Dao Origin, as these texts distinctly include that record. This reflects that Haewol's succession was not precisely recognized within and outside of the Eastern Learning order until the time when The Collection of Great Master Lord's Literary Works and The Records of Dao Origin were published. This is further attested to by the fact that during the late 1870s, when various Yeonwon (fountainhead) factions of Eastern Learning began to converge around Haewol, and his Yeonwon became the largest organization within Eastern Learning. At that point, the order's doctrine was reinterpreted, and its organization was reestablished. In this regard, it is necessary to view Eastern Learning after Suwun-especially the orthodox lineage transmission to Haewol-from a perspective that considers it more as competing forms of discourse than as a historical fact. This view enables a new perspective on Haewol's Eastern Learning, which forms a distinct layer from Suwun's, shedding light on the relationship between Haewol and the new religious movements in modern-day Korea.

A Study on Hoslital Nurses' Preferred Duty Shift and Duty Hours (병원 간호사의 선호근무시간대에 관한 연구)

  • Lee, Gyeong-Sik;Jeong, Geum-Hui
    • The Korean Nurse
    • /
    • v.36 no.1
    • /
    • pp.77-96
    • /
    • 1997
  • The duty shifts of hospital nurses not only affect nurses' physical and mental health but also present various personnel management problems which often result in high turnover rates. In this context a study was carried out from October to November 1995 for a period of two months to find out the status of hospital nurses' duty shift patterns, and preferred duty hours and fixed duty shifts. The study population was 867 RNs working in five general hospitals located in Seoul and its vicinity. The questionnaire developed by the writer was used for data collection. The response rate was 85.9 percent or 745 returns. The SAS program was used for data analysis with the computation of frequencies, percentages and Chi square test. The findings of the study are as follows: 1. General characteristics of the study population: 56 percent of respondents was (25 years group and 76.5 percent were "single": the predominant proportion of respondents was junior nursing college graduates(92.2%) and have less than 5 years nursing experience in hospitals(65.5%). For their future working plan in nursing profession, nearly 50% responded as uncertain The reasons given for their career plan was predominantly 'personal growth and development' rather than financial reasons. 2. The interval for rotations of duty stations was found to be mostly irregular(56.4%) while others reported as weekly(16.1%), monthly(12.9%), and fixed terms(4.6%). 3. The main problems related to duty shifts particularly the evening and night duty nurses reported were "not enough time for the family, " "afraid of security problems after the work when returning home late at night." and "lack of leisure time". "problems in physical and physiological adjustment." "problems in family life." "lack of time for interactions with fellow nurses" etc. 4. The forty percent of respondents reported to have '1-2 times' of duty shift rotations while all others reported that '0 time'. '2-3 times'. 'more than 3 times' etc. which suggest the irregularity in duty shift rotations. 5. The majority(62.8%) of study population found to favor the rotating system of duty stations. The reasons for favoring the rotation system were: the opportunity for "learning new things and personal development." "better human relations are possible. "better understanding in various duty stations." "changes in monotonous routine job" etc. The proportion of those disfavor the rotating 'system was 34.7 percent. giving the reasons of"it impedes development of specialization." "poor job performances." "stress factors" etc. Furthermore. respondents made the following comments in relation to the rotation of duty stations: the nurses should be given the opportunity to participate in the. decision making process: personal interest and aptitudes should be considered: regular intervals for the rotations or it should be planned in advance. etc. 6. For the future career plan. the older. married group with longer nursing experiences appeared to think the nursing as their lifetime career more likely than the younger. single group with shorter nursing experiences ($x^2=61.19.{\;}p=.000;{\;}x^2=41.55.{\;}p=.000$). The reason given for their future career plan regardless of length of future service, was predominantly "personal growth and development" rather than financial reasons. For further analysis, the group those with the shorter career plan appeared to claim "financial reasons" for their future career more readily than the group who consider the nursing job as their lifetime career$(x^2$= 11.73, p=.003) did. This finding suggests the need for careful .considerations in personnel management of nursing administration particularly when dealing with the nurses' career development. The majority of respondents preferred the fixed day shift. However, further analysis of those preferred evening shift by age and civil status, "< 25 years group"(15.1%) and "single group"(13.2) were more likely to favor the fixed evening shift than > 25 years(6.4%) and married(4.8%)groups. This differences were statistically significant ($x^2=14.54, {\;}p=.000;{\;}x^2=8.75, {\;}p=.003$). 7. A great majority of respondents(86.9% or n=647) found to prefer the day shifts. When the four different types of duty shifts(Types A. B. C, D) were presented, 55.0 percent of total respondents preferred the A type or the existing one followed by D type(22.7%). B type(12.4%) and C type(8.2%). 8. When the condition of monetary incentives for the evening(20% of salary) and night shifts(40% of. salary) of the existing duty type was presented. again the day shift appeared to be the most preferred one although the rate was slightly lower(66.4% against 86.9%). In the case of evening shift, with the same incentive, the preference rates for evening and night shifts increased from 11.0 to 22.4 percent and from 0.5 to 3.0 percent respectively. When the age variable was controlled. < 25 yrs group showed higher rates(31.6%. 4.8%) than those of > 25 yrs group(15.5%. 1.3%) respectively preferring the evening and night shifts(p=.000). The civil status also seemed to operate on the preferences of the duty shifts as the single group showed lower rate(69.0%) for day duty against 83. 6% of the married group. and higher rates for evening and night duties(27.2%. 15.1%) respectively against those of the married group(3.8%. 1.8%) while a higher proportion of the married group(83. 6%) preferred the day duties than the single group(69.0%). These differences were found to be statistically all significant(p=.001). 9. The findings on preferences of three different types of fixed duty hours namely, B, C. and D(with additional monetary incentives) are as follows in order of preference: B type(12hrs a day, 3days a wk): day shift(64.1%), evening shift(26.1%). night shift(6.5%) C type(12hrs a day. 4days a wk) : evening shift(49.2%). day shift(32.8%), night shift(11.5%) D type(10hrs a day. 4days a wk): showed the similar trend as B type. The findings of higher preferences on the evening and night duties when the incentives are given. as shown above, suggest the need for the introductions of different patterns of duty hours and incentive measures in order to overcome the difficulties in rostering the nursing duties. However, the interpretation of the above data, particularly the C type, needs cautions as the total number of respondents is very small(n=61). It requires further in-depth study. In conclusion. it seemed to suggest that the patterns of nurses duty hours and shifts in the most hospitals in the country have neither been tried for different duty types nor been flexible. The stereotype rostering system of three shifts and insensitiveness for personal life aspect of nurses seemed to be prevailing. This study seems to support that irregular and frequent rotations of duty shifts may be contributing factors for most nurses' maladjustment problems in physical and mental health. personal and family life which eventually may result in high turnover rates. In order to overcome the increasing problems in personnel management of hospital nurses particularly in rostering of evening and night duty shifts, which may related to eventual high turnover rates, the findings of this study strongly suggest the need for an introduction of new rostering systems including fixed duties and appropriate incentive measures for evenings and nights which the most nurses want to avoid, In considering the nursing care of inpatients is the round-the clock business. the practice of the nursing duty shift system is inevitable. In this context, based on the findings of this study. the following are recommended: 1. The further in-depth studies on duty shifts and hours need to be undertaken for the development of appropriate and effective rostering systems for hospital nurses. 2. An introduction of appropriate incentive measures for evening and night duty shifts along with organizational considerations such as the trials for preferred duty time bands, duty hours, and fixed duty shifts should be considered if good quality of care for the patients be maintained for the round the clock. This may require an initiation of systematic research and development activities in the field of hospital nursing administration as a part of permanent system in the hospital. 3. Planned and regular intervals, orientation and training, and professional and personal growth should be considered for the rotation of different duty stations or units. 4. In considering the higher degree of preferences in the duty type of "10hours a day, 4days a week" shown in this study, it would be worthwhile to undertake the R&D type studies in large hospital settings.

  • PDF

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF

The Effect of Mutual Trust on Relational Performance in Supplier-Buyer Relationships for Business Services Transactions (재상업복무교역중적매매관계중상호신임대관계적효적영향(在商业服务交易中的买卖关系中相互信任对关系绩效的影响))

  • Noh, Jeon-Pyo
    • Journal of Global Scholars of Marketing Science
    • /
    • v.19 no.4
    • /
    • pp.32-43
    • /
    • 2009
  • Trust has been studied extensively in psychology, economics, and sociology, and its importance has been emphasized not only in marketing, but also in business disciplines in general. Unlike past relationships between suppliers and buyers, which take considerable advantage of private networks and may involve unethical business practices, partnerships between suppliers and buyers are at the core of success for industrial marketing amid intense global competition in the 21st century. A high level of mutual cooperation occurs through an exchange relationship based on trust, which brings long-term benefits, competitive enhancements, and transaction cost reductions, among other benefits, for both buyers and suppliers. In spite of the important role of trust, existing studies in buy-supply situations overlook the role of trust and do not systematically analyze the effect of trust on relational performance. Consequently, an in-depth study that determines the relation of trust to the relational performance between buyers and suppliers of business services is absolutely needed. Business services in this study, which include those supporting the manufacturing industry, are drawing attention as the economic growth engine for the next generation. The Korean government has selected business services as a strategic area for the development of manufacturing sectors. Since the demands for opening business services markets are becoming fiercer, the competitiveness of the business service industry must be promoted now more than ever. The purpose of this study is to investigate the effect of the mutual trust between buyers and suppliers on relational performance. Specifically, this study proposed a theoretical model of trust-relational performance in the transactions of business services and empirically tested the hypotheses delineated from the framework. The study suggests strategic implications based on research findings. Empirical data were collected via multiple methods, including via telephone, mail, and in-person interviews. Sample companies were knowledge-based companies supplying and purchasing business services in Korea. The present study collected data on a dyadic basis. Each pair of sample companies includes a buying company and its corresponding supplying company. Mutual trust was traced for each pair of companies. This study proposes a model of trust-relational performance of buying-supplying for business services. The model consists of trust and its antecedents and consequences. The trust of buyers is classified into trust toward the supplying company and trust toward salespersons. Viewing trust both at the individual level and the organizational level is based on the research of Doney and Cannon (1997). Normally, buyers are the subject of trust, but this study supposes that suppliers are the subjects. Hence, it uniquely focused on the bilateral perspective of perceived risk. In other words, suppliers, like buyers, are the subject of trust since transactions are normally bilateral. From this point of view, suppliers' trust in buyers is as important as buyers' trust in suppliers. The suppliers' trust is influenced by the extent to which it trusts the buying companies and the buyers. This classification of trust using an individual level and an organization level is based on the suggestion of Doney and Cannon (1997). Trust affects the process of supplier selection, which works in a bilateral manner. Suppliers are actively involved in the supplier selection process, working very closely with buyers. In addition, the process is affected by the extent to which each party trusts its partners. The selection process consists of certain steps: recognition, information search, supplier selection, and performance evaluation. As a result of the process, both buyers and suppliers evaluate the performance and take corrective actions on the basis of such outcomes as tangible, intangible, and/or side effects. The measurement of trust used for the present study was developed on the basis of the studies of Mayer, Davis and Schoorman (1995) and Mayer and Davis (1999). Based on their recommendations, the three dimensions of trust used for the study include ability, benevolence, and integrity. The original questions were adjusted to the context of the transactions of business services. For example, a question such as "He/she has professional capabilities" has been changed to "The salesperson showed professional capabilities while we talked about our products." The measurement used for this study differs from those used in previous studies (Rotter 1967; Sullivan and Peterson 1982; Dwyer and Oh 1987). The measurements of the antecedents and consequences of trust used for this study were developed on the basis of Doney and Cannon (1997). The original questions were adjusted to the context of transactions in business services. In particular, questions were developed for both buyers and suppliers to address the following factors: reputation (integrity, customer care, good-will), market standing (company size, market share, positioning in the industry), willingness to customize (product, process, delivery), information sharing (proprietary information, private information), willingness to maintain relationships, perceived professionalism, authority empowerment, buyer-seller similarity, and contact frequency. As a consequential variable of trust, relational performance was measured. Relational performance is classified into tangible effects, intangible effects, and side effects. Tangible effects include financial performance; intangible effects include improvements in relations, network developing, and internal employee satisfaction; side effects include those not included either in the tangible or intangible effects. Three hundred fifty pairs of companies were contacted, and one hundred five pairs of companies responded. After deleting five company pairs because of incomplete responses, one hundred five pairs of companies were used for data analysis. The response ratio of the companies used for data analysis is 30% (105/350), which is above the average response ratio in industrial marketing research. As for the characteristics of the respondent companies, the majority of the companies operate service businesses for both buyers (85.4%) and suppliers (81.8%). The majority of buyers (76%) deal with consumer goods, while the majority of suppliers (70%) deal with industrial goods. This may imply that buyers process the incoming material, parts, and components to produce the finished consumer goods. As indicated by their report of the length of acquaintance with their partners, suppliers appear to have longer business relationships than do buyers. Hypothesis 1 tested the effects of buyer-supplier characteristics on trust. The salesperson's professionalism (t=2.070, p<0.05) and authority empowerment (t=2.328, p<0.05) positively affected buyers' trust toward suppliers. On the other hand, authority empowerment (t=2.192, p<0.05) positively affected supplier trust toward buyers. For both buyers and suppliers, the degree of authority empowerment plays a crucial role in the maintenance of their trust in each other. Hypothesis 2 tested the effects of buyerseller relational characteristics on trust. Buyers tend to trust suppliers, as suppliers make every effort to contact buyers (t=2.212, p<0.05). This tendency has also been shown to be much stronger for suppliers (t=2.591, p<0.01). On the other hand suppliers trust buyers because suppliers perceive buyers as being similar to themselves (t=2.702, p<0.01). This finding confirmed the results of Crosby, Evans, and Cowles (1990), which reported that suppliers and buyers build relationships through regular meetings, either for business or personal matters. Hypothesis 3 tested the effects of trust on perceived risk. It has been found that for both suppliers and buyers the lower is the trust, the higher is the perceived risk (t=-6.621, p<0.01 for buyers; t=-2.437, p<0.05). Interestingly, this tendency has been shown to be much stronger for buyers than for suppliers. One possible explanation for this higher level of perceived risk is that buyers normally perceive higher risks than do suppliers in transactions involving business services. For this reason, it is necessary for suppliers to implement risk reduction strategies for buyers. Hypothesis 4 tested the effects of trust on information searching. It has been found that for both suppliers and buyers, contrary to expectation, trust depends on their partner's reputation (t=2.929, p<0.01 for buyers; t=2.711, p<0.05 for suppliers). This finding shows that suppliers with good reputations tend to be trusted. Prior experience did not show any significant relationship with trust for either buyers or suppliers. Hypothesis 5 tested the effects of trust on supplier/buyer selection. Unlike buyers, suppliers tend to trust buyers when they think that previous transactions with buyers were important (t=2.913 p<0.01). However, this study did not show any significant relationship between source loyalty and the trust of buyers in suppliers. Hypothesis 6 tested the effects of trust on relational performances. For buyers and suppliers, financial performance reportedly improved when they trusted their partners (t=2.301, p<0.05 for buyers; t=3.692, p<0.01 for suppliers). It is interesting that this tendency was much stronger for suppliers than it was for buyers. Similarly, competitiveness was reported to improve when buyers and suppliers trusted their partners (t=3.563, p<0.01 for buyers; t=3.042, p<0.01 for suppliers). For suppliers, efficiency and productivity were reportedly improved when they trusted buyers (t=2.673, p<0.01). Other performance indices showed insignificant relationships with trust. The findings of this study have some strategic implications. First and most importantly, trust-based transactions are beneficial for both suppliers and buyers. As verified in the study, financial performance can be improved through efforts to build and maintain mutual trust. Similarly, competitiveness can be increased through the same kinds of effort. Second, trust-based transactions can facilitate the reduction of perceived risks inherent in the purchasing situation. This finding has implications for both suppliers and buyers. It is generally believed that buyers perceive higher risks in a highly involved purchasing situation. To reduce risks, previous studies have recommended that suppliers devise risk-reducing tactics. Moving beyond these recommendations, the present study uniquely focused on the bilateral perspective of perceived risk. In other words, suppliers are also susceptible to perceived risks, especially when they supply services that require very technical and sophisticated manipulations and maintenance. Consequently, buyers and suppliers must solve problems together in close collaboration. Hence, mutual trust plays a crucial role in the problem-solving process. Third, as found in this study, the more authority a salesperson has, the more he or she can be trusted. This finding is very important with regard to tactics. Building trust is a long-term assignment; however, when mutual trust has not been developed, suppliers can overcome the problems they encounter by empowering a salesperson with the authority to make certain decisions. This finding applies to suppliers as well.

  • PDF