• Title/Summary/Keyword: Personal Area Network

Search Result 368, Processing Time 0.033 seconds

A Deep Learning Based Approach to Recognizing Accompanying Status of Smartphone Users Using Multimodal Data (스마트폰 다종 데이터를 활용한 딥러닝 기반의 사용자 동행 상태 인식)

  • Kim, Kilho;Choi, Sangwoo;Chae, Moon-jung;Park, Heewoong;Lee, Jaehong;Park, Jonghun
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.1
    • /
    • pp.163-177
    • /
    • 2019
  • As smartphones are getting widely used, human activity recognition (HAR) tasks for recognizing personal activities of smartphone users with multimodal data have been actively studied recently. The research area is expanding from the recognition of the simple body movement of an individual user to the recognition of low-level behavior and high-level behavior. However, HAR tasks for recognizing interaction behavior with other people, such as whether the user is accompanying or communicating with someone else, have gotten less attention so far. And previous research for recognizing interaction behavior has usually depended on audio, Bluetooth, and Wi-Fi sensors, which are vulnerable to privacy issues and require much time to collect enough data. Whereas physical sensors including accelerometer, magnetic field and gyroscope sensors are less vulnerable to privacy issues and can collect a large amount of data within a short time. In this paper, a method for detecting accompanying status based on deep learning model by only using multimodal physical sensor data, such as an accelerometer, magnetic field and gyroscope, was proposed. The accompanying status was defined as a redefinition of a part of the user interaction behavior, including whether the user is accompanying with an acquaintance at a close distance and the user is actively communicating with the acquaintance. A framework based on convolutional neural networks (CNN) and long short-term memory (LSTM) recurrent networks for classifying accompanying and conversation was proposed. First, a data preprocessing method which consists of time synchronization of multimodal data from different physical sensors, data normalization and sequence data generation was introduced. We applied the nearest interpolation to synchronize the time of collected data from different sensors. Normalization was performed for each x, y, z axis value of the sensor data, and the sequence data was generated according to the sliding window method. Then, the sequence data became the input for CNN, where feature maps representing local dependencies of the original sequence are extracted. The CNN consisted of 3 convolutional layers and did not have a pooling layer to maintain the temporal information of the sequence data. Next, LSTM recurrent networks received the feature maps, learned long-term dependencies from them and extracted features. The LSTM recurrent networks consisted of two layers, each with 128 cells. Finally, the extracted features were used for classification by softmax classifier. The loss function of the model was cross entropy function and the weights of the model were randomly initialized on a normal distribution with an average of 0 and a standard deviation of 0.1. The model was trained using adaptive moment estimation (ADAM) optimization algorithm and the mini batch size was set to 128. We applied dropout to input values of the LSTM recurrent networks to prevent overfitting. The initial learning rate was set to 0.001, and it decreased exponentially by 0.99 at the end of each epoch training. An Android smartphone application was developed and released to collect data. We collected smartphone data for a total of 18 subjects. Using the data, the model classified accompanying and conversation by 98.74% and 98.83% accuracy each. Both the F1 score and accuracy of the model were higher than the F1 score and accuracy of the majority vote classifier, support vector machine, and deep recurrent neural network. In the future research, we will focus on more rigorous multimodal sensor data synchronization methods that minimize the time stamp differences. In addition, we will further study transfer learning method that enables transfer of trained models tailored to the training data to the evaluation data that follows a different distribution. It is expected that a model capable of exhibiting robust recognition performance against changes in data that is not considered in the model learning stage will be obtained.

Construction of X-band automatic radar scatterometer measurement system and monitoring of rice growth (X-밴드 레이더 산란계 자동 측정시스템 구축과 벼 생육 모니터링)

  • Kim, Yi-Hyun;Hong, Suk-Young;Lee, Hoon-Yol
    • Korean Journal of Soil Science and Fertilizer
    • /
    • v.43 no.3
    • /
    • pp.374-383
    • /
    • 2010
  • Microwave radar can penetrate cloud cover regardless of weather conditions and can be used day and night. Especially a ground-based polarimetric scatterometer has advantages of monitoring crop conditions continuously with full polarization and different frequencies. Kim et al. (2009) have measured backscattering coefficients of paddy rice using L-, C-, X-band scatterometer system with full polarization and various angles during the rice growth period and have revealed the necessity of near-continuous automatic measurement to eliminate the difficulties, inaccuracy and sparseness of data acquisitions arising from manual operation of the system. In this study, we constructed an X-band automatic scatterometer system, analyzed scattering characteristics of paddy rice from X-band scatterometer data and estimated rice growth parameter using backscattering coefficients in X-band. The system was installed inside a shelter in an experimental paddy field at the National Academy of Agricultural Science (NAAS) before rice transplanting. The scatterometer system consists of X-band antennas, HP8720D vector network analyzer, RF cables and personal computer that controls frequency, polarization and data storage. This system using automatically measures fully-polarimetric backscattering coefficients of rice crop every 10 minutes. The backscattering coefficients were calculated from the measured data at a fixed incidence angle of $45^{\circ}$ and with full polarization (HH, VV, HV, VH) by applying the radar equation and compared with rice growth data such as plant height, stem number, fresh dry weight and Leaf Area Index (LAI) that were collected at the same time of each rice growth parameter. We examined the temporal behaviour of the backscattering coefficients of the rice crop at X-band during rice growth period. The HH-, VV-polarization backscattering coefficients steadily increased toward panicle initiation stage, thereafter decreased and again increased in early-September. We analyzed the relationships between backscattering coefficients in X-band and plant parameters and predicted the rice growth parameters using backscattering coefficients. It was confirmed that X-band is sensitive to grain maturity at near harvesting season.

A Study in an Effective Programs for Emergency Care Delivery System (응급의료 전달체계의 충실 방안)

  • Kwon Sook Hee
    • Journal of Korean Public Health Nursing
    • /
    • v.9 no.1
    • /
    • pp.83-102
    • /
    • 1995
  • As the society is being industrialized, the fast-paced economic development that has caused substantial increase in cerebrovascular and coronary artery diseases and the industrial development and increased use of means of transportation have resulted in the rapid rise of incidents in external injuries as well. So the pubic has become acutely aware of the need for fast and effective emergency care delivery system. The goal of emergency care delivery system is to meet the emergency care needs of patients. The emergency care delivery system is seeking to efficiently satisfy the care needs of people. Therefore the purpose of this study is designed to develop an effective programs for emergency care delivery system in Korea. The following specific objectives were investigated. This emergency care delivery system must have the necessary man power, for transfering the patients, communication net work, and emergency care facilities. 1) Man power Emergency care requires n0t only specialized traning in the emergency treatment but also knowledge and experience i11 other related area, so emergency care personnel traning program should be designed in order to adapt to the specific need of emergency patients. It will be necessary to ensure professional personnel who aquires the sufficient traning and experience for emergency care and to look for legal basis. We have to develop re-educational programs for emergency nurse specialist. They should be received speciality of emergency nursing care so that they will work actively and positively in emergency part. Emergency medical doctor and nurse specialist should be given an education which is related in emergency and critical care. Emergency care personnel will continue to provide both acute and continuing care as partner with other medical team. 2) Transfering the patients. Successful management of pre-hospital care requires adequate traning for the emergency medical technician. Traning program should be required to participate in a actual first aids activites in order to have apportunities to acquire practical skills as well as theoretical knowledge. The system of emergency medical technician should be remarkablly successful with first responder firefighters. Establishing this system must add necessary ambulances operating at any given time. It will be necessary to standardize the ambulance size and equipment. Ambulance should be arranged with each and every fire station. 3) Communication net work. The head office of emergency commumication network should be arranged with the head office of fire station in community. It is proposed that Hot-line system for emergency care should be introduce. High controlled ambulance and thirtial emergency center should simultaneously equip critical-line in order to communication with each other. Ordinary ambulance and secondary emergency facility should also simultaneously equip emergency-line in order to communication with each other. 4) Emergency care facilities. Primary emergency care facilities should be covered with the ambulatory emergency patients-minor illness and injuires. Secondary emergency care facilities should be covered with the emergency admission patients. Third emergency care center should be covered with the critical patients who need special treatments and operation. Secondary and third emergency care facilities should employ emergency medical doctor and emergency nurse specialist to treat in-patients with severe and acute illness and multiple injuires. It should be fashioned for a system of emergency facilities that meets emergency patients needs. Provide incentives for increased number of emergency care facilities with traning in personal/clinical emergency care. 5) Finance It is recommended to put the finance of a emergency care on a firm basis. The emergency care delivery system should be managed by the government or accreditted organizations. In order to facilitate this relevant program the fund is needed for more efficient and effective emergency researchs, service, programs, and policy. 6) Gaining understanding and co-operation of pubic It is also important to undertake pubic education to improve understanding of first aids and C. P. R of individuals, communities and business. It is proposed that teachers and health officers be certified in C. P. R. The C. P. R education can be powerful influence save lives. Lastly appropriate emergency care information must be provided to the pubic for assisting them in choosing emergency care.

  • PDF

Monitoring soybean growth using L, C, and X-bands automatic radar scatterometer measurement system (L, C, X-밴드 레이더 산란계 자동측정시스템을 이용한 콩 생육 모니터링)

  • Kim, Yi-Hyun;Hong, Suk-Young;Lee, Hoon-Yol;Lee, Jae-Eun
    • Korean Journal of Remote Sensing
    • /
    • v.27 no.2
    • /
    • pp.191-201
    • /
    • 2011
  • Soybean has widely grown for its edible bean which has numerous uses. Microwave remote sensing has a great potential over the conventional remote sensing with the visible and infrared spectra due to its all-weather day-and-night imaging capabilities. In this investigation, a ground-based polarimetric scatterometer operating at multiple frequencies was used to continuously monitor the crop conditions of a soybean field. Polarimetric backscatter data at L, C, and X-bands were acquired every 10 minutes on the microwave observations at various soybean stages. The polarimetric scatterometer consists of a vector network analyzer, a microwave switch, radio frequency cables, power unit and a personal computer. The polarimetric scatterometer components were installed inside an air-conditioned shelter to maintain constant temperature and humidity during the data acquisition period. The backscattering coefficients were calculated from the measured data at incidence angle $40^{\circ}$ and full polarization (HH, VV, HV, VH) by applying the radar equation. The soybean growth data such as leaf area index (LAI), plant height, fresh and dry weight, vegetation water content and pod weight were measured periodically throughout the growth season. We measured the temporal variations of backscattering coefficients of the soybean crop at L, C, and X-bands during a soybean growth period. In the three bands, VV-polarized backscattering coefficients were higher than HH-polarized backscattering coefficients until mid-June, and thereafter HH-polarized backscattering coefficients were higher than VV-, HV-polarized back scattering coefficients. However, the cross-over stage (HH > VV) was different for each frequency: DOY 200 for L-band and DOY 210 for both C and X-bands. The temporal trend of the backscattering coefficients for all bands agreed with the soybean growth data such as LAI, dry weight and plant height; i.e., increased until about DOY 271 and decreased afterward. We plotted the relationship between the backscattering coefficients with three bands and soybean growth parameters. The growth parameters were highly correlated with HH-polarization at L-band (over r=0.92).

Factors Affecting the Satisfaction for Medical Service and Reuse Intention of Patients at Dental Clinic in Gyeongnam Province (경남 일부지역 치과의원 내원 환자들의 치과 의료서비스 질 만족도와 재이용 의사에 미치는 영향 요인)

  • Seong, Mi-Gyung;Kim, Jae-Hwa;Jang, Kyeung-Ae
    • Journal of dental hygiene science
    • /
    • v.15 no.2
    • /
    • pp.106-112
    • /
    • 2015
  • This study was conducted to provide with baseline data with the purpose of increasing the values of medical services. Self-administered questionnaire survey was conducted on 236 patients at a dental clinic follow-up visit in dentist clinic Gyeongnam area from June 2013 to August 2013. All statistical analyses were performed using SPSS. The motivation visiting the dental clinic is that the first one is introduction from the family and friends, the second is accessibility, the third is conspicuity and the last one is awareness of the dentist. The main variables in the process of treatment are service system, kindness, satisfaction of service, efficient of re-call system. The relief of discomfort at revisit show the highest score in the process of implant treatment and intention of revisit hereafter do in the prostheses process. In the correlation between main variables, service system and relief of discomfort at revisit (r=0.440, p<0.001), kindness and satisfaction of medical service (r=0.675, p<0.001), revisit hereafter and satisfaction of service (r=0.387, p<0.001) and efficiency of re-call system and revisit showed the highest correlation. The influence on satisfaction of dental service show meaningful level in kindness (p<0.001) and efficiency of re-call system (p<0.05). The intention of revisit is affected meaningfully by relief of uncomfort (p<0.05), service system (p<0.05), kindness (p<0.01) and efficiency of re-call system (p<0.01). In summary, the personal network of patients is most important variable at intention for revisit of dental clinic. As satisfaction of kindness and efficiency of re-call system is higher, satisfaction of medical service and intention for revisit are shown higher. Therefore further research for improvement of satisfaction for medical service and of intention of revisit at the dental clinic should be carried out.

Estimation of Paddy Rice Growth Parameters Using L, C, X-bands Polarimetric Scatterometer (L, C, X-밴드 다편파 레이더 산란계를 이용한 논 벼 생육인자 추정)

  • Kim, Yi-Hyun;Hong, Suk-Young;Lee, Hoon-Yol
    • Korean Journal of Remote Sensing
    • /
    • v.25 no.1
    • /
    • pp.31-44
    • /
    • 2009
  • The objective of this study was to measure backscattering coefficients of paddy rice using a L-, C-, and X-band scatterometer system with full polarization and various angles during the rice growth period and to relate backscattering coefficients to rice growth parameters. Radar backscattering measurements of paddy rice field using multifrequency (L, C, and X) and full polarization were conducted at an experimental field located in National Academy of Agricultural Science (NAAS), Suwon, Korea. The scatterometer system consists of dual-polarimetric square horn antennas, HP8720D vector network analyzer ($20\;MHz{\sim}20\;GHz$), RF cables, and a personal computer that controls frequency, polarization and data storage. The backscattering coefficients were calculated by applying radar equation for the measured at incidence angles between $20^{\circ}$ and $60^{\circ}$ with $5^{\circ}$ interval for four polarization (HH, VV, HV, VH), respectively. We measured the temporal variations of backscattering coefficients of the rice crop at L-, C-, X-band during a rice growth period. In three bands, VV-polarized backscattering coefficients were higher than hh-polarized backscattering coefficients during rooting stage (mid-June) and HH-polarized backscattering coefficients were higher than VV-, HV/VH-polarized backscattering coefficients after panicle initiation stage (mid-July). Cross polarized backscattering coefficients in X-band increased towards the heading stage (mid-Aug) and thereafter saturated, again increased near the harvesting season. Backscattering coefficients of range at X-band were lower than that of L-, C-band. HH-, VV-polarized ${\sigma}^{\circ}$ steadily increased toward panicle initiation stage and thereafter decreased, and again increased near the harvesting season. We plotted the relationship between backscattering coefficients with L-, C-, X-band and rice growth parameters. Biomass was correlated with L-band hh-polarization at a large incident angle. LAI (Leaf Area Index) was highly correlated with C-band HH- and cross-polarizations. Grain weight was correlated with backscattering coefficients of X-band VV-polarization at a large incidence angle. X-band was sensitive to grain maturity during the post heading stage.

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.

The Effect of Mutual Trust on Relational Performance in Supplier-Buyer Relationships for Business Services Transactions (재상업복무교역중적매매관계중상호신임대관계적효적영향(在商业服务交易中的买卖关系中相互信任对关系绩效的影响))

  • Noh, Jeon-Pyo
    • Journal of Global Scholars of Marketing Science
    • /
    • v.19 no.4
    • /
    • pp.32-43
    • /
    • 2009
  • Trust has been studied extensively in psychology, economics, and sociology, and its importance has been emphasized not only in marketing, but also in business disciplines in general. Unlike past relationships between suppliers and buyers, which take considerable advantage of private networks and may involve unethical business practices, partnerships between suppliers and buyers are at the core of success for industrial marketing amid intense global competition in the 21st century. A high level of mutual cooperation occurs through an exchange relationship based on trust, which brings long-term benefits, competitive enhancements, and transaction cost reductions, among other benefits, for both buyers and suppliers. In spite of the important role of trust, existing studies in buy-supply situations overlook the role of trust and do not systematically analyze the effect of trust on relational performance. Consequently, an in-depth study that determines the relation of trust to the relational performance between buyers and suppliers of business services is absolutely needed. Business services in this study, which include those supporting the manufacturing industry, are drawing attention as the economic growth engine for the next generation. The Korean government has selected business services as a strategic area for the development of manufacturing sectors. Since the demands for opening business services markets are becoming fiercer, the competitiveness of the business service industry must be promoted now more than ever. The purpose of this study is to investigate the effect of the mutual trust between buyers and suppliers on relational performance. Specifically, this study proposed a theoretical model of trust-relational performance in the transactions of business services and empirically tested the hypotheses delineated from the framework. The study suggests strategic implications based on research findings. Empirical data were collected via multiple methods, including via telephone, mail, and in-person interviews. Sample companies were knowledge-based companies supplying and purchasing business services in Korea. The present study collected data on a dyadic basis. Each pair of sample companies includes a buying company and its corresponding supplying company. Mutual trust was traced for each pair of companies. This study proposes a model of trust-relational performance of buying-supplying for business services. The model consists of trust and its antecedents and consequences. The trust of buyers is classified into trust toward the supplying company and trust toward salespersons. Viewing trust both at the individual level and the organizational level is based on the research of Doney and Cannon (1997). Normally, buyers are the subject of trust, but this study supposes that suppliers are the subjects. Hence, it uniquely focused on the bilateral perspective of perceived risk. In other words, suppliers, like buyers, are the subject of trust since transactions are normally bilateral. From this point of view, suppliers' trust in buyers is as important as buyers' trust in suppliers. The suppliers' trust is influenced by the extent to which it trusts the buying companies and the buyers. This classification of trust using an individual level and an organization level is based on the suggestion of Doney and Cannon (1997). Trust affects the process of supplier selection, which works in a bilateral manner. Suppliers are actively involved in the supplier selection process, working very closely with buyers. In addition, the process is affected by the extent to which each party trusts its partners. The selection process consists of certain steps: recognition, information search, supplier selection, and performance evaluation. As a result of the process, both buyers and suppliers evaluate the performance and take corrective actions on the basis of such outcomes as tangible, intangible, and/or side effects. The measurement of trust used for the present study was developed on the basis of the studies of Mayer, Davis and Schoorman (1995) and Mayer and Davis (1999). Based on their recommendations, the three dimensions of trust used for the study include ability, benevolence, and integrity. The original questions were adjusted to the context of the transactions of business services. For example, a question such as "He/she has professional capabilities" has been changed to "The salesperson showed professional capabilities while we talked about our products." The measurement used for this study differs from those used in previous studies (Rotter 1967; Sullivan and Peterson 1982; Dwyer and Oh 1987). The measurements of the antecedents and consequences of trust used for this study were developed on the basis of Doney and Cannon (1997). The original questions were adjusted to the context of transactions in business services. In particular, questions were developed for both buyers and suppliers to address the following factors: reputation (integrity, customer care, good-will), market standing (company size, market share, positioning in the industry), willingness to customize (product, process, delivery), information sharing (proprietary information, private information), willingness to maintain relationships, perceived professionalism, authority empowerment, buyer-seller similarity, and contact frequency. As a consequential variable of trust, relational performance was measured. Relational performance is classified into tangible effects, intangible effects, and side effects. Tangible effects include financial performance; intangible effects include improvements in relations, network developing, and internal employee satisfaction; side effects include those not included either in the tangible or intangible effects. Three hundred fifty pairs of companies were contacted, and one hundred five pairs of companies responded. After deleting five company pairs because of incomplete responses, one hundred five pairs of companies were used for data analysis. The response ratio of the companies used for data analysis is 30% (105/350), which is above the average response ratio in industrial marketing research. As for the characteristics of the respondent companies, the majority of the companies operate service businesses for both buyers (85.4%) and suppliers (81.8%). The majority of buyers (76%) deal with consumer goods, while the majority of suppliers (70%) deal with industrial goods. This may imply that buyers process the incoming material, parts, and components to produce the finished consumer goods. As indicated by their report of the length of acquaintance with their partners, suppliers appear to have longer business relationships than do buyers. Hypothesis 1 tested the effects of buyer-supplier characteristics on trust. The salesperson's professionalism (t=2.070, p<0.05) and authority empowerment (t=2.328, p<0.05) positively affected buyers' trust toward suppliers. On the other hand, authority empowerment (t=2.192, p<0.05) positively affected supplier trust toward buyers. For both buyers and suppliers, the degree of authority empowerment plays a crucial role in the maintenance of their trust in each other. Hypothesis 2 tested the effects of buyerseller relational characteristics on trust. Buyers tend to trust suppliers, as suppliers make every effort to contact buyers (t=2.212, p<0.05). This tendency has also been shown to be much stronger for suppliers (t=2.591, p<0.01). On the other hand suppliers trust buyers because suppliers perceive buyers as being similar to themselves (t=2.702, p<0.01). This finding confirmed the results of Crosby, Evans, and Cowles (1990), which reported that suppliers and buyers build relationships through regular meetings, either for business or personal matters. Hypothesis 3 tested the effects of trust on perceived risk. It has been found that for both suppliers and buyers the lower is the trust, the higher is the perceived risk (t=-6.621, p<0.01 for buyers; t=-2.437, p<0.05). Interestingly, this tendency has been shown to be much stronger for buyers than for suppliers. One possible explanation for this higher level of perceived risk is that buyers normally perceive higher risks than do suppliers in transactions involving business services. For this reason, it is necessary for suppliers to implement risk reduction strategies for buyers. Hypothesis 4 tested the effects of trust on information searching. It has been found that for both suppliers and buyers, contrary to expectation, trust depends on their partner's reputation (t=2.929, p<0.01 for buyers; t=2.711, p<0.05 for suppliers). This finding shows that suppliers with good reputations tend to be trusted. Prior experience did not show any significant relationship with trust for either buyers or suppliers. Hypothesis 5 tested the effects of trust on supplier/buyer selection. Unlike buyers, suppliers tend to trust buyers when they think that previous transactions with buyers were important (t=2.913 p<0.01). However, this study did not show any significant relationship between source loyalty and the trust of buyers in suppliers. Hypothesis 6 tested the effects of trust on relational performances. For buyers and suppliers, financial performance reportedly improved when they trusted their partners (t=2.301, p<0.05 for buyers; t=3.692, p<0.01 for suppliers). It is interesting that this tendency was much stronger for suppliers than it was for buyers. Similarly, competitiveness was reported to improve when buyers and suppliers trusted their partners (t=3.563, p<0.01 for buyers; t=3.042, p<0.01 for suppliers). For suppliers, efficiency and productivity were reportedly improved when they trusted buyers (t=2.673, p<0.01). Other performance indices showed insignificant relationships with trust. The findings of this study have some strategic implications. First and most importantly, trust-based transactions are beneficial for both suppliers and buyers. As verified in the study, financial performance can be improved through efforts to build and maintain mutual trust. Similarly, competitiveness can be increased through the same kinds of effort. Second, trust-based transactions can facilitate the reduction of perceived risks inherent in the purchasing situation. This finding has implications for both suppliers and buyers. It is generally believed that buyers perceive higher risks in a highly involved purchasing situation. To reduce risks, previous studies have recommended that suppliers devise risk-reducing tactics. Moving beyond these recommendations, the present study uniquely focused on the bilateral perspective of perceived risk. In other words, suppliers are also susceptible to perceived risks, especially when they supply services that require very technical and sophisticated manipulations and maintenance. Consequently, buyers and suppliers must solve problems together in close collaboration. Hence, mutual trust plays a crucial role in the problem-solving process. Third, as found in this study, the more authority a salesperson has, the more he or she can be trusted. This finding is very important with regard to tactics. Building trust is a long-term assignment; however, when mutual trust has not been developed, suppliers can overcome the problems they encounter by empowering a salesperson with the authority to make certain decisions. This finding applies to suppliers as well.

  • PDF