• Title/Summary/Keyword: Software Types

Search Result 1,382, Processing Time 0.031 seconds

Drinking Pattern and Nonfatal Injuries of Adults in Korea (성인에서 AUDIT와 손상의 연관성)

  • Yoo, In-Sook;Choi, Eun-Mi;Kwon, Ho-Jang;Lee, Sang-Gyu
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.4
    • /
    • pp.1690-1698
    • /
    • 2012
  • As alcohol use is one of the most important risk factors for injuries, this study was intended to clarify and evaluate any relationship between drinking patterns and the incidence rates/specific characteristics of injuries in adult populations, using a widely accepted tool, the Alcohol Use Disorders Identification Test (chronic alcohol drinking behaviors measurement, hereinafter the AUDIT) developed by the World Health Organization to help to assess the behaviors in a more accurate and reliable manner. This study used the data collected from the 2009 Korea National Health and Nutrition Examination Survey (KNHANES), in which 7,511 of 7,893 adult participants aged ${\geq}19$ years answered the questions about injuries, and excluding 104 non-respondents, 6,258 of participants in the questionnaire survey of drinking patterns were finally analyzed. The incidence rates and specific characteristics of injuries as classified by the AUDIT categories (i.e., body regions, types and mechanisms) were assessed and estimated in terms of their relative risk using t-test, ANOVA, and logistic regression. SPSS 19.0 statistical package software was employed for statistical analyses. These analyses indicate that the incidence rates of overall injuries were significantly higher in male respondents than in female respondents. The risks of alcohol use related injuries were 8.3 times higher in male respondents than in female ones. Regarding educational background, high school graduates showed the highest rates in the AUDIT with significant difference from the other groups. The married group and the group of respondents having monthly income estimated at KRW 2.01 to 3 million also showed the highest rates in the AUDIT compared to the other groups, indicating statistically significant difference. Significantly increased in problematic drinkers and those with alcohol dependence, the incidence rate of injuries body regions was 0.0371 in the head/neck, and with respect to the AUDIT and the mechanisms of external causes of injuries, transport accidents ranked first, followed by slippage, others, crash and fall. In regard to the classified types of injuries, it was statistically significant in others (e.g., laceration, contusion, addiction, or penetrating wound). In conclusion, the mechanisms of external causes of injuries as well as injuries attributed to alcohol use are very important, and a strategy is required to reduce such the injuries in the manner of decreasing the frequency of drinking after motivation by professional counsellors.

Identifying Antecedents of Service Innovation: Based on Service-Dominant Logic and Resource-Advantage Theory (서비스 혁신의 선행요인에 관한 연구: 서비스 지배적 논리와 자원 우위 이론을 중심으로)

  • Ryu, Hyun-Sun;Han, Jin Young
    • Information Systems Review
    • /
    • v.18 no.2
    • /
    • pp.79-106
    • /
    • 2016
  • Service innovation is one means of gaining an advantage in a highly competitive environment. Although numerous studies have stressed the importance of service innovation, traditional good-dominant logic is still used in service innovation literature. Furthermore, few studies have been conducted on the link between service innovation and its antecedents in terms of service-oriented approach. To fill the gap, this article theoretically and empirically examines service innovation and its antecedents and consequences. Based on service-dominant logic and resource advantage theory, the current study aims to understand the effect of antecedents on service innovation as well as to identify the effect of service innovation on firm performance (i.e., non-financial and financial performance). Three service innovation activities, namely service creation-focused innovation, service delivery-focused innovation, and customer interaction-focused innovation, and four antecedents of service innovation, including human resource management capability, collaboration capability, marketing capability, and information technology capability, are identified based on Den Hertog (2000)'s service innovation framework. By using the empirical data collected from 189 service firms in Korea, this study explores the causal relationship among antecedents, service innovation and firm performance. Findings indicate that human resource management and marketing capabilities influence the three types of service innovation, whereas collaboration and information technology capabilities have a significant effect on both service creation-focused innovation and service delivery-focused innovation. In particular, human resource management capability is strongly related to customer interaction-focused innovation. The three types of service innovation have a positive influence on non-financial performance, whereas service delivery-focused innovation and customer interaction-focused innovation positively influence financial performance. These results support the crucial effects of antecedents, such as human resource management, collaboration, marketing and information technology capabilities, on service innovation.

Assessment of statistical errors of articles published in the Journal of the Korean Academy of Prosthodontics: 2006 - 2010 (대한치과보철학회지에서 볼 수 있는 통계적 오류의 고찰(2006 - 2010))

  • Kang, Dong-Wan;Seo, Yunam;Oh, Nam-Sik;Lim, Hoi-Jeong
    • The Journal of Korean Academy of Prosthodontics
    • /
    • v.50 no.4
    • /
    • pp.258-270
    • /
    • 2012
  • Purpose: Use of inappropriate statistical methods may lead to incorrect conclusions and a waste of valuable resources. The goal of this study was to assess the frequency and the types of several common statistical errors in the published articles of the Journal of the Korean Academy of Prosthodontics (JKAP) for a 5-year period. Materials and methods: Of 336 articles in the JKAP published from 2006 to 2010, 255 articles using statistics were reviewed and classified by statistical method and year. The frequency and types of the statistical methods were examined, and the statistical errors were evaluated by the appropriateness of the experimental design, assumption check, independent outcomes, proper sample size and suitable use of statistical method. Statistical guidelines were completed based on the appropriateness. Results: Of the 255 articles using statistics, 193 articles (75.9%) used inferential statistics and 153 articles used SPSS statistical software (60.0%). Of the articles using inferential statistics, the three most frequently used statistical methods were ANOVA (41.5%), t-test (20.0%), and the nonparametric method (16.9%). The average rate of statistical errors was 61.2 percent, similar to the rate reported by several studies completed for the medical journal. Conclusion: After the whole analysis of the difference among the groups, post-hoc tests for the pairwise comparisons are required. The optimal sample size calculation is an essential part of this study protocol. To minimize the occurrence of statistical errors, statistical guidelines were developed according to each statistical test procedure and will contribute to the academic improvement in the JKAP.

Comparison of the accuracy of intraoral scanner by three-dimensional analysis in single and 3-unit bridge abutment model: In vitro study (단일 수복물과 3본 고정성 수복물 지대치 모델에서 삼차원 분석을 통한 구강 스캐너의 정확도 비교)

  • Huang, Mei-Yang;Son, Keunbada;Lee, Wan-Sun;Lee, Kyu-Bok
    • The Journal of Korean Academy of Prosthodontics
    • /
    • v.57 no.2
    • /
    • pp.102-109
    • /
    • 2019
  • Purpose: The purpose of this study was to evaluate the accuracy of three types of intraoral scanners and the accuracy of the single abutment and bridge abutment model. Materials and methods: In this study, a single abutment, and a bridge abutment with missing first molar was fabricated and set as the reference model. The reference model was scanned with an industrial three-dimensional scanner and set as reference scan data. The reference model was scanned five times using the three intraoral scanners (CS3600, CS3500, and EZIS PO). This was set as the evaluation scan data. In the three-dimensional analysis (Geomagic control X), the divided abutment region was selected and analyzed to verify the scan accuracy of the abutment. Statistical analysis was performed using SPSS software (${\alpha}=.05$). The accuracy of intraoral scanners was compared using the Kruskal-Wallis test and post-test was performed using the Pairwise test. The accuracy difference between the single abutment model and the bridge abutment model was analyzed by the Mann-Whitney U test. Results: The accuracy according to the intraoral scanner was significantly different (P < .05). The trueness of the single abutment model and the bridge abutment model showed a statistically significant difference and showed better trueness in the single abutment (P < .05). There was no significant difference in the precision (P = .616). Conclusion: As a result of comparing the accuracy of single and bridge abutments, the error of abutment scan increased with increasing scan area, and the accuracy of bridge abutment model was clinically acceptable in three types of intraoral scanners.

Predicting Healthy Lifestyle Patterns in Older Community Dwelling Adults: A Latent Profile Analysis (잠재프로파일 분석을 활용한 한국 노인 라이프스타일 유형화와 영향요인 분석)

  • Park, Kang-Hyun;Yang, Min Ah;Won, Kyung-A;Park, Ji-Hyuk
    • Therapeutic Science for Rehabilitation
    • /
    • v.10 no.2
    • /
    • pp.75-93
    • /
    • 2021
  • Objective : The aim of this study was to identify subgroups of older adults with respect to their lifestyle patterns and examine the characteristics of each subgroup in order to provide a basic evidence for improving the health and quality of life. Methods : This cross-sectional study was conducted in South Korea. Community-dwelling older adults (n=184) above the age of 65 years were surveyed from April 2019 to May 2019. This study used latent profile analysis to examine the subgroups. Chi-squared (χ2) and multinomial logistic regression measures were then used to analyze individual characteristics and influencing factors. Results : The pattern of physical activity which is one of the lifestyle domains in elderly was categorized into three types: 'passive exercise type (31.1%)', 'low intensity exercise type (54.5%)', and 'balanced exercise type(14.5%)'. Activity participation was divided into three patterns: 'inactive type (12%)', 'self-management type (61%)', and 'balanced activity participation type (27%)'. In terms of nutrition, there were only two groups: 'overall malnutrition type (13.5%)' and 'balanced nutrition type (86.5%)'. Furthermore, as a result of the multinomial logistic regression analysis to understand the effects of lifestyle types on the health and quality of life of the elderly, it was confirmed that the health and quality of life were higher in those following an active and balanced lifestyle. In addition, gender, education level and residential area were analyzed as predictive factors. Conclusion : The health and quality of life of the elderly can be improved when they have balanced lifestyle. Therefore, an empirical and policy intervention strategy should be developed and implemented to enhance the health and quality of life of the elderly.

End to End Model and Delay Performance for V2X in 5G (5G에서 V2X를 위한 End to End 모델 및 지연 성능 평가)

  • Bae, Kyoung Yul;Lee, Hong Woo
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.1
    • /
    • pp.107-118
    • /
    • 2016
  • The advent of 5G mobile communications, which is expected in 2020, will provide many services such as Internet of Things (IoT) and vehicle-to-infra/vehicle/nomadic (V2X) communication. There are many requirements to realizing these services: reduced latency, high data rate and reliability, and real-time service. In particular, a high level of reliability and delay sensitivity with an increased data rate are very important for M2M, IoT, and Factory 4.0. Around the world, 5G standardization organizations have considered these services and grouped them to finally derive the technical requirements and service scenarios. The first scenario is broadcast services that use a high data rate for multiple cases of sporting events or emergencies. The second scenario is as support for e-Health, car reliability, etc.; the third scenario is related to VR games with delay sensitivity and real-time techniques. Recently, these groups have been forming agreements on the requirements for such scenarios and the target level. Various techniques are being studied to satisfy such requirements and are being discussed in the context of software-defined networking (SDN) as the next-generation network architecture. SDN is being used to standardize ONF and basically refers to a structure that separates signals for the control plane from the packets for the data plane. One of the best examples for low latency and high reliability is an intelligent traffic system (ITS) using V2X. Because a car passes a small cell of the 5G network very rapidly, the messages to be delivered in the event of an emergency have to be transported in a very short time. This is a typical example requiring high delay sensitivity. 5G has to support a high reliability and delay sensitivity requirements for V2X in the field of traffic control. For these reasons, V2X is a major application of critical delay. V2X (vehicle-to-infra/vehicle/nomadic) represents all types of communication methods applicable to road and vehicles. It refers to a connected or networked vehicle. V2X can be divided into three kinds of communications. First is the communication between a vehicle and infrastructure (vehicle-to-infrastructure; V2I). Second is the communication between a vehicle and another vehicle (vehicle-to-vehicle; V2V). Third is the communication between a vehicle and mobile equipment (vehicle-to-nomadic devices; V2N). This will be added in the future in various fields. Because the SDN structure is under consideration as the next-generation network architecture, the SDN architecture is significant. However, the centralized architecture of SDN can be considered as an unfavorable structure for delay-sensitive services because a centralized architecture is needed to communicate with many nodes and provide processing power. Therefore, in the case of emergency V2X communications, delay-related control functions require a tree supporting structure. For such a scenario, the architecture of the network processing the vehicle information is a major variable affecting delay. Because it is difficult to meet the desired level of delay sensitivity with a typical fully centralized SDN structure, research on the optimal size of an SDN for processing information is needed. This study examined the SDN architecture considering the V2X emergency delay requirements of a 5G network in the worst-case scenario and performed a system-level simulation on the speed of the car, radius, and cell tier to derive a range of cells for information transfer in SDN network. In the simulation, because 5G provides a sufficiently high data rate, the information for neighboring vehicle support to the car was assumed to be without errors. Furthermore, the 5G small cell was assumed to have a cell radius of 50-100 m, and the maximum speed of the vehicle was considered to be 30-200 km/h in order to examine the network architecture to minimize the delay.

Visualizing the Results of Opinion Mining from Social Media Contents: Case Study of a Noodle Company (소셜미디어 콘텐츠의 오피니언 마이닝결과 시각화: N라면 사례 분석 연구)

  • Kim, Yoosin;Kwon, Do Young;Jeong, Seung Ryul
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.4
    • /
    • pp.89-105
    • /
    • 2014
  • After emergence of Internet, social media with highly interactive Web 2.0 applications has provided very user friendly means for consumers and companies to communicate with each other. Users have routinely published contents involving their opinions and interests in social media such as blogs, forums, chatting rooms, and discussion boards, and the contents are released real-time in the Internet. For that reason, many researchers and marketers regard social media contents as the source of information for business analytics to develop business insights, and many studies have reported results on mining business intelligence from Social media content. In particular, opinion mining and sentiment analysis, as a technique to extract, classify, understand, and assess the opinions implicit in text contents, are frequently applied into social media content analysis because it emphasizes determining sentiment polarity and extracting authors' opinions. A number of frameworks, methods, techniques and tools have been presented by these researchers. However, we have found some weaknesses from their methods which are often technically complicated and are not sufficiently user-friendly for helping business decisions and planning. In this study, we attempted to formulate a more comprehensive and practical approach to conduct opinion mining with visual deliverables. First, we described the entire cycle of practical opinion mining using Social media content from the initial data gathering stage to the final presentation session. Our proposed approach to opinion mining consists of four phases: collecting, qualifying, analyzing, and visualizing. In the first phase, analysts have to choose target social media. Each target media requires different ways for analysts to gain access. There are open-API, searching tools, DB2DB interface, purchasing contents, and so son. Second phase is pre-processing to generate useful materials for meaningful analysis. If we do not remove garbage data, results of social media analysis will not provide meaningful and useful business insights. To clean social media data, natural language processing techniques should be applied. The next step is the opinion mining phase where the cleansed social media content set is to be analyzed. The qualified data set includes not only user-generated contents but also content identification information such as creation date, author name, user id, content id, hit counts, review or reply, favorite, etc. Depending on the purpose of the analysis, researchers or data analysts can select a suitable mining tool. Topic extraction and buzz analysis are usually related to market trends analysis, while sentiment analysis is utilized to conduct reputation analysis. There are also various applications, such as stock prediction, product recommendation, sales forecasting, and so on. The last phase is visualization and presentation of analysis results. The major focus and purpose of this phase are to explain results of analysis and help users to comprehend its meaning. Therefore, to the extent possible, deliverables from this phase should be made simple, clear and easy to understand, rather than complex and flashy. To illustrate our approach, we conducted a case study on a leading Korean instant noodle company. We targeted the leading company, NS Food, with 66.5% of market share; the firm has kept No. 1 position in the Korean "Ramen" business for several decades. We collected a total of 11,869 pieces of contents including blogs, forum contents and news articles. After collecting social media content data, we generated instant noodle business specific language resources for data manipulation and analysis using natural language processing. In addition, we tried to classify contents in more detail categories such as marketing features, environment, reputation, etc. In those phase, we used free ware software programs such as TM, KoNLP, ggplot2 and plyr packages in R project. As the result, we presented several useful visualization outputs like domain specific lexicons, volume and sentiment graphs, topic word cloud, heat maps, valence tree map, and other visualized images to provide vivid, full-colored examples using open library software packages of the R project. Business actors can quickly detect areas by a swift glance that are weak, strong, positive, negative, quiet or loud. Heat map is able to explain movement of sentiment or volume in categories and time matrix which shows density of color on time periods. Valence tree map, one of the most comprehensive and holistic visualization models, should be very helpful for analysts and decision makers to quickly understand the "big picture" business situation with a hierarchical structure since tree-map can present buzz volume and sentiment with a visualized result in a certain period. This case study offers real-world business insights from market sensing which would demonstrate to practical-minded business users how they can use these types of results for timely decision making in response to on-going changes in the market. We believe our approach can provide practical and reliable guide to opinion mining with visualized results that are immediately useful, not just in food industry but in other industries as well.

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.

Wavelet Transform-based Face Detection for Real-time Applications (실시간 응용을 위한 웨이블릿 변환 기반의 얼굴 검출)

  • 송해진;고병철;변혜란
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.9
    • /
    • pp.829-842
    • /
    • 2003
  • In this Paper, we propose the new face detection and tracking method based on template matching for real-time applications such as, teleconference, telecommunication, front stage of surveillance system using face recognition, and video-phone applications. Since the main purpose of paper is to track a face regardless of various environments, we use template-based face tracking method. To generate robust face templates, we apply wavelet transform to the average face image and extract three types of wavelet template from transformed low-resolution average face. However template matching is generally sensitive to the change of illumination conditions, we apply Min-max normalization with histogram equalization according to the variation of intensity. Tracking method is also applied to reduce the computation time and predict precise face candidate region. Finally, facial components are also detected and from the relative distance of two eyes, we estimate the size of facial ellipse.

How Can Non.Chaebol Companies Thrive in the Chaebol Economy? (비재벌공사여하재재벌경제중생존((非财阀公司如何在财阀经济中生存)? ‐공사층면영소전략적분석(公司层面营销战略的分析)‐)

  • Kim, Nam-Kuk;Sengupta, Sanjit;Kim, Dong-Jae
    • Journal of Global Scholars of Marketing Science
    • /
    • v.19 no.3
    • /
    • pp.28-36
    • /
    • 2009
  • While existing literature has focused extensively on the strengths and weaknesses of the Chaebol and their ownership and governance, there have been few studies of Korean non-Chaebol firms. However, Lee, Lee and Pennings (2001) did not specifically investigate the competitive strategies that non-Chaebol firms use to survive against the Chaebol in the domestic Korean market. The motivation of this paper is to document, through four exploratory case studies, the successful competitive strategies of non-Chaebol Korean companies against the Chaebol and then offer some propositions that may be useful to other entrepreneurial firms as well as public policy makers. Competition and cooperation as conceptualized by product similarity and cooperative inter.firm relationship respectively, are major dimensions of firm.level marketing strategy. From these two dimensions, we develop the following $2{\times}2$ matrix, with 4 types of competitive strategies for non-Chaebol companies against the Chaebol (Fig. 1.). The non-Chaebol firm in Cell 1 has a "me-too" product for the low-end market while conceding the high-end market to a Chaebol. In Cell 2, the non-Chaebol firm partners with a Chaebol company, either as a supplier or complementor. In Cell 3, the non-Chaebol firm engages in direct competition with a Chaebol. In Cell 4, the non-Chaebol firm targets an unserved part of the market with an innovative product or service. The four selected cases such as E.Rae Electronics Industry Company (Co-exister), Intops (Supplier), Pantech (Competitor) and Humax (Niche Player) are analyzed to provide each strategy with richer insights. Following propositions are generated based upon our conceptual framework: Proposition 1: Non-Chaebol firms that have a cooperative relationship with a Chaebol will perform better than firms that do not. Proposition 1a; Co-existers will perform better than Competitors. Proposition 1b: Partners (suppliers or complementors) will perform better than Niche players. Proposition 2: Firms that have no product similarity with a Chaebol will perform better than firms that have product similarity. Proposition 2a: Partners (suppliers or complementors) will perform better than Co.existers. Proposition 2b: Niche players will perform better than Competitors. Proposition 3: Niche players should perform better than Co-existers. Proposition 4: Performance can be rank.ordered in descending order as Partners, Niche Players, Co.existers, Competitors. A team of experts was constituted to categorize each of these 216 non-Chaebol companies into one of the 4 cells in our typology. Simple Analysis of Variance (ANOVA) in SPSS statistical software was used to test our propositions. Overall findings are that it is better to have a cooperative relationship with a Chaebol and to offer products or services differentiated from a Chaebol. It is clear that the only profitable strategy, on average, to compete against the Chaebol is to be a partner (supplier or complementor). Competing head on with a Chaebol company is a costly strategy not likely to pay off for a non-Chaebol firm. Strategies to avoid head on competition with the Chaebol by serving niche markets with differentiated products or by serving the low-end of the market ignored by the Chaebol are better survival strategies. This paper illustrates that there are ways in which small and medium Korean non-Chaebol firms can thrive in a Chaebol environment, though not without risks. Using different combinations of competition and cooperation firms may choose particular positions along the product similarity and cooperative relationship dimensions to develop their competitive strategies-co-exister, competitor, partner, niche player. Based on our exploratory case-study analysis, partner seems to be the best strategy for non-Chaebol firms while competitor appears to be the most risky one. Niche players and co-existers have intermediate performance, though the former do better than the latter. It is often the case with managers of small and medium size companies that they tend to view market leaders, typically the Chaebol, with rather simplistic assumptions of either competition or collaboration. Consequently, many non-Chaebol firms turn out to be either passive collaborators or overwhelmed competitors of the Chaebol. In fact, competition and collaboration are not mutually exclusive, and can be pursued at the same time. As suggested in this paper, non-Chaebol firms can actively choose to compete and collaborate, depending on their environment, internal resources and capabilities.

  • PDF