Purpose: The growth of online commerce is now becoming a major threat and a new opportunity for retailers. Existing offline retailers struggle to cope with new online retailers' threats by utilizing offline infrastructure. Besides, online retailers expand their online strengths to offline sales by opening their offline stores. Many retailers are paying close attention to the O2O business and the resulting changes. Thus, this research focuses on the O2O business model and process that retailers can adopt. Research design, data and methodology: Considering the features of products that retailers sell, this paper divides O2O business process with the following criteria: delivery lead-time and delivery area. And This research uses the business model canvas to define the features of O2O commerce business process. This paper also uses nine key elements in the business model canvas for analyzing the structure of O2O commerce business. Results: This paper suggests the delivery model of retailers respond to offline customer orders and summarizes the following results. (1) Considering characteristics such as logistics process, delivery area, and product type, we define the features of O2O business models: wide-area (warehouse) based O2O business model, regional area (store) based O2O business model and time-separated O2O business model. (2) This study checks the availability of the business model through the business cases of O2O business models. (3) This study also analyzes the O2O business model of domestic retail companies by the factors defined in the business model canvas. Conclusions: Retailers can adopt the O2O business process to fit their business requirements and strategy. The online retailers who deal with normal consumer products mainly have the wide-area based O2O business model. The wide-area based O2O business model can be suitable for retailers who manage inventory centrally. The time-separated O2O business model can be a good solution for fresh food retailers to operate the logistics process efficiently. And to shorten the delivery lead-time of fresh foods, the regional area based O2O business model can be fit to the retailer that utilizes its offline logistics or sales infrastructure. It may be much more important for retailers to share the inventory information with other branches and to change the role of offline stores.
Korean traditional markets have been struggling of late as big-sized superstores and SSM(Super Supermarkets) are thriving in the market. They have therefore upgraded their facilities and undertaken management modernization actively to overcome the threat to traditional markets and ensure their competitiveness; however, the effect does not appear to be verifiable. The purpose of this study is to analyze the impact of the organizational characteristics of the traditional market merchant association on social capital and organizational performance. In other words, this paper investigates a merchant association's organizational characteristics in terms of the modernization of business activities of the traditional markets and the influence on their social capital and organizational performance. This study analyzes the traditional market by evaluating the impact of these factors. This study consists of four hypotheses: The first hypothesis relates to the causal relationship between the characteristics of a merchant association and social capital. The second and third hypotheses, respectively, relate to the causal relationships between the social capital of a merchant association and the merchant's satisfaction and that between the social capital of a merchant association and organizational commitment. The last hypothesis relates to the relationship between the organizational commitment of a merchant association and the merchant's satisfaction. This study conducts a reliability and validity analysis of the above factors and analyzes the causal relationships between them by using the PLS(Partial Least Squares) path model as one of the structural equation models. The results of the empirical analysis are summarized as follows: First, the organizational characteristics of the traditional market merchant association have a significant influence on social capital. However, only two sub-hypotheses are not significant; these insignificant hypotheses relate to the relationship between a merchant's entrepreneurship and structural capital and that between a merchant's entrepreneurship and cognitive capital. Second, the social capital of a merchant association influences organizational commitment significantly. Third, the relationship between the social capital of a merchant association and the merchant's satisfaction is mostly significant. However, one of the sub-hypotheses, that is, the relationship between relational capital and a merchant's satisfaction is not exceptionally significant. Lastly, the organizational commitment of a merchant association affect the merchant's satisfaction significantly. Through our extensive study, this paper found that a merchant association's organizational characteristics of the traditional market significantly affect social capital, organizational commitment, and satisfaction through the mediation of social capital. Therefore, in order to activate the key traditional market, an understanding of organizational characteristics and social capital is primarily required. Systematic management and investment pertaining to these two factors will be the first consideration for revitalizing traditional markets.
Debates about introducing nuclear submarines have been a main issue in Korea. The highest officials and the government has started to think seriously about the issue. Yet there were no certain decision to this issue or any agreements with US but it is still necessary to review about introducing nuclear submarines, the technologies and about the business. The reason for such issues are the highest officials of Korea to build nuclear submarine, nK's nuclear development and SLBM launching. ROKN's nuclear submarine's necessity will be to attack(capacity to revenge), defend(anti-SSBN Operation) and to respond against neighboring nation's threat(Russia, Japan, China). Among these nations, US, Russia (Soviet Union), Britain, France had built their submarines in a short term of time due to their industrial foundation regarding with nuclear propulsion submarines. However China and India have started their business without their industrial foundation prepared and took a long time to build their submarines. Current technology level of Korea have reached almost up to US, Russia, Britain and France when they first built their nuclear propulsion submarines since we have almost completed the business for the Changbogo-I,II and almost up to complete building the Changbogo-III which Korea have self designed/developed. Furthermore Korea have reached the level where we can self design large nuclear reactors and the integrated SMART reactor which we can call ourselves a nation with worldwide technologies. If introducing the nuclear submarine to the Korea gets decided, first of all we would have to review the technological problems and also introduce the foreign technologies when needed. The methods for the introduction will be developments after loans from the foreign, productions with technological cooperations, and individual production. The most significant thing will be that changes are continuous and new instances are keep showing up so that it is important to only have a simple reference to a current instances and have a review on every methods with many possibilities. Also developing all of the technologies for the nuclear propulsion submarines may be not possible and give financial damages so there may be a need to partially introduce foreign technologies. For the introduction of nuclear propulsion submarines, there must be a resolution of the international regulations together with the international/domestics resistances and the technological problems to work out for. Also there may be problem for the requirement fees to solve for and other tough problems to solve for. However nuclear submarines are powerful weapon system to risk everything above. This is an international/domestically a serious agenda. Therefore rather than having debates based on false facts, there must be a need to have an investigations and debates regarding the nation's benefits and national security.
Despite the fact that South Korea, one of peninsula countries, has been already a middle power in an international arena, it still tends to get stuck in continental-driven inertia and be reluctant to become a consolidated maritime power. In its efforts to deal with the parable of South Korea, designing a tailored-made strategy needs to be initiated in detail. Its design is centered around two variables: classification of waters and prestige. First of all, the domain of waters confronted to South Korea ranges from the greatest threat to scattered national interest. Second, South Korea is prestigiously regarded as the middle power which is equipped with the capability to see beyond its sovereign waters. The Maritime Access Strategy(MAS) can be more clearly explained by three-axis factors: ends, ways, and means. Ends need to be oriented to achieving three types of classified objectives-Deterrence, Engagement around the world to maximize remotely-scattered interest and Check of neighboring countries' seapower expansion, called DEC. Ways is mainly driven by the closer access to three different types of waters: waters of security, check, and interest. The active access and closer approach to the domain of waters need to be maintained with a high degree of willingness and capability. Means is attainable by guiding naval forces to be armed with multiple platforms and functionally-balanced assets. These platforms and assets will allow the naval forces to attain and maintain cost effective means, leading to making MAS feasible. This strategy allows the middle-power Korea to make the best of its maritime assets at various seas, contributing to international stability as well as national security and interest.
Staphylococcus intermedius is a common cause of otitis externa, pyoderma, and wound infections in companion animals. Although S. intermedius infections are rare in humans, it is zoonotic, with several case reports describing fatal human infections. Presently, we sought to isolate S. intermedius strains from various sources at animal hospitals nationwide in Korea, examine their antibiotic susceptibilities, and determine the possibility of horizontal transmission between animals and humans. Pulsed-field gel electrophoresis (pFGE) was used to compare the mecA gene in S. intermedius strains from humans, animals, and the environment in animal hospitals. A total of 119 S. intermedius strains were isolated from 529 samples. Using the disk diffusion method, over 90% of the isolates were found to be susceptible to cephalothin, amoxicillin-clavulanic acid, vancomycin, imipenem, nitroflurantoin, and amikacin, whereas 97.5% and 98.3% of the isolates were resistant to penicillin and ampicillin, respectively. Among the 39 S. intermedius strains harboring mecA, similar PFGE patterns were observed between seven isolates from an animal, two isolates from veterinary staff, and the environment in one animal hospital, and single isolates from an animal and a veterinarian at another hospital. This result suggests the possibility of horizontal transmission of S. intermedius containing mecA between humans, animals, and the environment in animal hospitals and also emphasizes on the importance of S. intermedius with mecA as a possible emerging threat to public health.
Journal of the Korea Academia-Industrial cooperation Society
/
v.18
no.3
/
pp.374-380
/
2017
The Internet of Things (IoT) refers to intelligent technologies and services that connect all things to the internet so they can interactively communicate with people, other things, and other systems. The development of the IoT environment accompanies advances in network protocols applicable to more lightweight and intelligent sensors, and lightweight and diverse environments. The development of those elemental technologies is promoting the rapid progress in smart car environments that provide safety features and user convenience. These developments in smart car services will bring a positive effect, but can also lead to a catastrophe for a person's life if security issues with the services are not resolved. Although smart cars have various features with different types of communications functions to control the vehicles under the existing platforms, insecure features and functions may bring various security threats, such as bypassing authentication, malfunctions through illegitimate control of the vehicle via data forgery, and leaking of private information. In this paper, we look at types of smart car services in the IoT, deriving the security threats from smart car services based on various scenarios, suggesting countermeasures against them, and we finally propose a safe smart car application plan.
Nowadays, Terrorism has become bloodier. Unlike the past, the recent terrorism has been indiscriminate in the purpose of mass- killing. Given this aspect, the threat of a CBRN attack is the biggest one to modern society. Notably, the possibility of terrorist attacks in Korea by international terrorist groups such as ISIL is higher than ever in consideration of its allusion; crusades and the devil's allied forces. To overcome these circumstances, various measures have been taken for counter terrorism at the state level including anti-terrorist legislation. Under the anti-terrorist act, police have to lead relevant inter agencies when it comes to the CBRN terror. At first glance, current countermeasures would work well. However, in order to respond quickly, the standing cooperations system of related departments need to be set up. In this sense, this article proposed a coagulatory body that could not only consider institutional-oriented organizational restructuring and response but also integrate and operate functions of various specialized institutions. It also stressed that the council should move toward a consultative body of information gathering, distribution and working- level consultation. With this cooperation system, counter-terrorism agencies can respond rapidly, stop wasting their effort and assets by about 30%. Also, they could design the atypical aspect of terrorism into standardized.
Journal of the Korean Association of Geographic Information Studies
/
v.19
no.1
/
pp.167-179
/
2016
The safety of SOC facilities is constantly under threat by the globally increasing abnormal climate. Responding to disasters requires prompt decision-making such as suggesting evacuation paths. For doing so, spatio-temporal information with convergence of disaster information and SOC facility information must be utilized. Such information is being collected separately by the government or related organizations, but not collectively. The collective control of the separately collected disaster information and the generation of SOC facility safety and damage information are required for prompt disaster response. Also, as disaster information requires spatio-temporal convergence in its nature, the construction of an inventory that integrates related information and assists disaster response decision-making is required. A plan to construct a facility importance, risk, and damage estimation inventory for assisting prompt disaster response decision-making is suggested in this study. Through this study, the disaster and SOC facility-related data, which are being managed separately, can be collected and standardized. The integrated information required for the estimation of facility importance, risk, and damage can be provided. The suggested system is expected to be used as a decision-making tool for proactive disaster response.
In April 2009, in the wake of President Obama's Prague speech, the international community held four nuclear sec urity summits from 2010 to 2016 to promote nuclear security and prevent nuclear terrorism. The Nuclear Security S ummit has made significant progress in preventing terrorists from attempting to acquire nuclear weapons or fissile materials, but it still has limitations and problems. To solve this problem, the international community should resume the joint efforts for strengthening bilateral cooperation and multilateral nuclear security regime, and the participating countries should strive to protect their own nuclear materials and fulfill their commitments to secure nuclear facilitie s. Second, the United Nations(UN), the IAEA(International Atomic Energy Agency), International Criminal Police Or ganization(INTERPOL), the Global Initiative to Combat Nuclear Terrorism(GICNT), and the Global Partnership(G P) must continue their missions to promote nuclear security in accordance with the five action plans adopted at the Fourth Nuclear Security Summit. Third, the participating countries should begin discussions on the management and protection of military nuclear materials that could not be covered by the Nuclear Security Summit. Fourth, the intern ational community must strive to strengthen the implementation of the Convention on the Physical Protection of Nuc lear Material(CPPNM) Amendment and International Convention for the Suppression of Acts of Nuclear Terrori sm(ICSANT), prepare for cyber attacks against nuclear facilities, and prevent theft, illegal trading and sabotage invo lving nuclear materials.
The purpose of this study is to examine how the workplace bullying recognition level of an employee in Korean foodservice industry, which more strongly depends on human services than other industries, influences on job satisfaction and turnover intention. To this end, we collected 250 samples of employees working in the kitchen of family restaurants. Among the collected 250 sample, 241 samples were usable for the analysis excluding 9. The result is as follows. Firstly, there is a difference in average of satisfaction in work according to each group of causes to recognize workplace bullying. That is, the group which vaguely recognizes bullying as for threat to professional status and isolation, and psychological harassment shows higher satisfaction in work than the group which recognizes the bullying well, which is statistically significant. The latter demonstrates more turnover intention than the former. Secondly, the research examining the effects of the causes of workplace bullying over the employees' satisfaction in work and turnover intention shows the following result. The causes to recognize workplace bullying of the employees have a negative effect(-) on job satisfaction on the whole. The causes to recognize workplace bullying of the employees have a positive influence(+) on turnover intention. In conclusion, manager in foodservice industry will need to provide employees with the environment which can help staff improve cooperation, unity and solidarity within the organization.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.