• Title/Summary/Keyword: Top Management

Search Result 1,740, Processing Time 0.029 seconds

An Analysis of the Fashion Brands Followed by a Recall Range (브랜드의 회상 범위에 따른 패션 브랜드 분석)

  • Yu, Ji-Hun
    • The Research Journal of the Costume Culture
    • /
    • v.15 no.6
    • /
    • pp.996-1007
    • /
    • 2007
  • This study was focused on recognitive reaction. The purposes of this study was to analyze the fashion brands through correlation analysis between top of mind, recall, recognition, impact index and consumer behavior, and to identify the graveyard brand, niche brand and core brand. 33 questions about 20 fashion brands were asked to 442 males and females from the middle school students to age of 40. Data were analyzed mean, standard deviation, frequency, and correlation by using SPSS 12.0. The results were as follows: 1. Top of mind, recall and recognition affected recognizing the brands and including evoked setting, but it didn't lead the customer to purchase the brand. 2. Although top of the mind and recall are high, the percentage of purchasing the brand is relatively low if a consumer doesn't own the brand. 3. Brands 'B', 'L', 'PF', 'D' and 'BM' were represented as niche Brands which had high recognition and memory. 4. Brands 'TB', 'I', 'EN', 'ML', 'E' could be Graveyard brands that need special management. 5. Brands with the high impact index were 'A', 'T', 'I', 'C' and 'B'. These brands were recognized as the core brands by consumers.

  • PDF

Design of P2P Server System to execute Dynamic Distribution Policy (동적 분배정책을 수행하는 P2P 서버 시스템의 설계)

  • 박정민;김홍일
    • Journal of Internet Computing and Services
    • /
    • v.3 no.6
    • /
    • pp.25-33
    • /
    • 2002
  • The efficiency of the data share service of P2P method is decided by the maintaining guard method of a sharing list, This paper suggests the data sharing system of the P2P base that it should retain a shared data list at a client, The Server at a proposed system guards inclusively client. divided into several groups and at each individual group, a client appointed the TopHost uses the method guarding a free share list of a applicating group, The TopHost designs to execute it relating with server in case of the mergence and the division of a group as well as a maintaining management of a data share list, The efficiency of the suggested system regard the maintaining guard of groups formed of a client of the appropriate level of a kernel and exams examination to measure it through a really executed data share service.

  • PDF

Top-executives Compensation: The Role of Corporate Ownership Structure in Japan

  • Mazumder, Mohammed Mehadi Masud
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.4 no.3
    • /
    • pp.35-43
    • /
    • 2017
  • This paper explores the impact of corporate control, measured by ownership structure, on top-executives' compensation in Japan. According to agency theory, the pay-performance link is expected to be affected by the firm's ownership structure. Using a sample of 4,411 firm-year observations (401 firms for the 11-years period from 2001 to 2011) for Japanese non-financial firms publicly traded on the first section and second section of the Tokyo Stock Exchange (TSE), this study demonstrates that institutional ownership (both financial and corporate) is negatively related to the level of executives' compensation. Such finding is in line with efficient monitoring hypothesis which claims that the presence of institutional shareholders provides direct monitoring over managers, limits managerial self-dealing and curves the increase in top-executives pay. On the other hand, the results also show that managerial ownership is positively related to their compensation which supports managerial power theory hypothesis, i.e. management-controlled firms are more likely to extract more compensation from the business than other firms. Overall, this study confirms that corporate control has significant impact on cash compensation paid to Japanese top-executives after controlling the conventional pay-performance relationship.

Sino-South Korean Scientific Collaboration Based On Co-Authored SCI Papers

  • Sun, Junwei;Jiang, Chunlin
    • Journal of Information Science Theory and Practice
    • /
    • v.2 no.1
    • /
    • pp.48-61
    • /
    • 2014
  • Using statistic and bibliometric methods to characterize scientific cooperation between China (excluding Hong Kong, Macao, and Taiwan) and South Korea through their bilateral co-authored papers covered by the Science Citation Index CD-ROM, 1991-2010, in our paper we exploit the feature of their cooperation in four levels: time sequence, academic community, key fields, and institution distribution. From the time sequence we know that collaboration between China and Korea starts in 1991, reaching the first peak during 2004-2007. As for the academic community, the number of Chinese corresponding authors (2414) is slightly lower than that of Korea (2700). Regarding the 27 high yield authors, there are only 4 coming from China. Korea has a higher active level than Chinese authors. China and Korea tend to cooperate with each other on strong disciplines such as physics, chemistry, material science, engineering, mathematics, pharmaceutical, computer science and biology. Furthermore, they also attach great importance to basic research and high-tech cooperation. Besides, Chinese Academy of Sciences ranks at the top 1 among the distribution of institutions. As a majority of the collaborative institutions are universities, the participation of non-university institutions is relatively low. There are 7 Korean universities among the top ten institutions, while Yanbian University and Tsinghua University in China rank respectively as third and fourth. Seoul National University, accompanied by Korea University and Yonsei University as the three top Korean universities, is also among the top among the cooperating institutions.

Deep Learning Framework with Convolutional Sequential Semantic Embedding for Mining High-Utility Itemsets and Top-N Recommendations

  • Siva S;Shilpa Chaudhari
    • Journal of information and communication convergence engineering
    • /
    • v.22 no.1
    • /
    • pp.44-55
    • /
    • 2024
  • High-utility itemset mining (HUIM) is a dominant technology that enables enterprises to make real-time decisions, including supply chain management, customer segmentation, and business analytics. However, classical support value-driven Apriori solutions are confined and unable to meet real-time enterprise demands, especially for large amounts of input data. This study introduces a groundbreaking model for top-N high utility itemset mining in real-time enterprise applications. Unlike traditional Apriori-based solutions, the proposed convolutional sequential embedding metrics-driven cosine-similarity-based multilayer perception learning model leverages global and contextual features, including semantic attributes, for enhanced top-N recommendations over sequential transactions. The MATLAB-based simulations of the model on diverse datasets, demonstrated an impressive precision (0.5632), mean absolute error (MAE) (0.7610), hit rate (HR)@K (0.5720), and normalized discounted cumulative gain (NDCG)@K (0.4268). The average MAE across different datasets and latent dimensions was 0.608. Additionally, the model achieved remarkable cumulative accuracy and precision of 97.94% and 97.04% in performance, respectively, surpassing existing state-of-the-art models. This affirms the robustness and effectiveness of the proposed model in real-time enterprise scenarios.

Evaluation of responses of semi-rigid frames at target displacements predicted by the nonlinear static analysis

  • Sharma, Vijay;Shrimali, Mahendra K.;Bharti, Shiv D.;Datt, Tushar K.
    • Steel and Composite Structures
    • /
    • v.36 no.4
    • /
    • pp.399-415
    • /
    • 2020
  • Responses of semi-rigid frames having different degrees of semi-rigidity obtained by the nonlinear static analysis (NSA) are evaluated at specific target displacements by comparing them with those obtained by the nonlinear time-history analysis (NTHA) for scaled earthquakes. The peak ground accelerations (PGA) of the earthquakes are scaled such that the obtained peak top story displacements match with the target displacements. Three different types of earthquakes are considered, namely, far-field and near-field earthquakes with directivity and fling-step effects. In order to make the study a comprehensive one, three degrees of semi-rigidity (one fully rigid and the other two semi-rigid), and two frames having different heights are considered. An ensemble of five-time histories of ground motion is included in each type of earthquake. A large number of responses are considered in the study. They include the peak top-story displacement, maximum inter-story drift ratio, peak base shear, total number of plastic hinges, and square root of sum of the squares (SRSS) of the maximum plastic hinge rotations. Results of the study indicate that the nonlinear static analysis provides a fairly good estimate of the peak values of top-story displacements, inter-story drift ratio (for shorter frame), peak base shear and number of plastic hinges; however, the SRSS of maximum plastic hinge rotations in semi-rigid frames are considerably more in the nonlinear static analysis as compared to the nonlinear time history analysis.

A study on effects of implementing information security governance by information security committee activities (정보보호 위원회 활동에 따른 정보보호 거버넌스 구현 효과에 관한 연구)

  • Kim, Kunwoo;Kim, Jungduk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.915-920
    • /
    • 2015
  • The commitment of top management is still insufficient for information security even the core of information security governance is dependent on the leadership of top management. In this situation, information security committee can be a good way to vitalize the commitment of top management and its activities are essential for implementing information security governance. The purpose of this study is to test that information security committee affects implementing information security governance and security effect. For a empirical analysis, questionnaire survey was conducted and the PLS(Partial Least Square) was used to analyze the measurement and structural model. The study result shows that a hypothesis related value delivery is not accepted and it is required to study various methods about how the information security provides positive value to business.

Contingent Analysis of the Relationship between Evaluation type and MIS Performance (MIS 평가 유형과 MIS 성과 간의 상황적 관계에 관한 연구)

  • Chung, Moon-Sang
    • The Journal of Information Systems
    • /
    • v.13 no.2
    • /
    • pp.225-240
    • /
    • 2004
  • The most critical problem of MIS evaluation is the lack of the systematic framework to cover various factors and viewpoints. To solve this problem, this study takes the multi-level and contingent approach to performance evaluation, composed of three levels: evaluating the contribution of MIS to an organization [strategy level]; evaluating the activities of MIS department or MIS function as an organizational sub-function through the overall MIS lifecycle [function level]; and evaluating the quality or productivity of the application systems as MIS outputs [system level]. Ideal MIS evaluation should include all three levels of the hierarchy with balanced importance. However, MIS evaluationcanbedividedintothreetypes,suchasstrategy-oriented, function-oriented and system-oriented evaluation, depending on the focus and emphasis of evaluation. The usage pattern of each evaluation type is analyzed according to contingent variables of MIS evaluation such as MIS maturity, information intensity and firm size, and top management's intent. It is also found that the firms of higher MIS maturity and top management's intent use the strategy-oriented evaluation type, and the firms with strategy-oriented evaluation type show a higher MIS performance. Further, MIS maturity and top management's intent show contingent effects between evaluation type and MIS performance. Some managerial implications can be drawn based on the results of the study. First, strategy-oriented evaluation of MIS is more important as many firms more often use information technology as a strategic weapon. Second, MIS performance varies with evaluation type. Therefore, the design of MIS evaluation framework should be done carefully in the strategic and managerial contexts. Third, firms are recommend to use a different evaluation type according to organizational characteristics such as MIS maturity and information intensity.

  • PDF

Benchmarking of Strategic Performance of Global Top Construction Firms (사업구조 전략 분석을 통한 세계 선진기업 선정 및 특성분석)

  • Woo, Jung-Suk;Jang, Hyoun-Seung;Choi, Seok-In;Park, Chan-Sik
    • Korean Journal of Construction Engineering and Management
    • /
    • v.10 no.3
    • /
    • pp.122-129
    • /
    • 2009
  • Strategic planning is an essential function of senior management in any business firm. Planning involves the firm's behavior in an competitive market and adaptation of the company's resources towards the selected market strategy. This study presents a methodological procedure for strategic planning in global top-tier construction firms. This procedure consists of the following stages. First, analyzed growth of revenue in which weight of total construction firms' revenue shown in Global Top 225 Contractors(ENR). Second, analyzed specialty of construction products. The products are General Building, Power, Water Supply, Industrial/Petroleum Process, and Transportation. Third, analyzed business the portfolio plan. The business portfolio plan includes both local/overseas market and specification/diversification of construction products. It affects the subsequent choice of a benchmarking for development of each construction company. The choice of the benchmarking firm, among several available alternatives, should follow a careful analysis of the characteristics and benefits inherent in the implementation of each.

An Empirical Study on Factors and Degrees of EDI Diffusion (EDI의 확산 요인과 확산 정도에 관한 연구)

  • Choe, Do-Won;Shin, Seong-Yoon;Kim, Nam-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.9
    • /
    • pp.155-164
    • /
    • 2010
  • Until now, most of studies on Electronic Data Interchange(EDI) have been focused on the introduction of EDI and the performance of EDI. But recently, there have been increasing researches on diffusion of Electronic Data Interchange. The aims of this study are twofold. First, to find the impacts of various factors on EDI diffusion, second, to examine the relationship between EDI diffusion factors and EDI diffusion degree. To accomplish those aims of study, two kinds of methodologies are adopted in the studies, First, model building by wide investigation on previous papers, Second, empirical research for finding the determinants of diffusion of EDI. The results of testing the hypotheses of this research are summarized as follows. First, The important EDI diffusion variables influencing internal diffusion of EDI consist of top management support, scope for EDI, IS sophistication, compatibility, complexity, relative advantages, competition intensity and external pressure. Second, Top management support, scope for EDI, IS sophistication, compatibility, relative advantages, competition intensity and external pressure are associated with external diffusion of EDI. We are aware of the important fact that top management support, scope for EDI, IS sophistication, compatibility, relative advantage, competition intensity and external pressure were simultaneously associated with internal and external diffusion of EDI.