• Title/Summary/Keyword: build

Search Result 9,123, Processing Time 0.041 seconds

A study on the prediction of korean NPL market return (한국 NPL시장 수익률 예측에 관한 연구)

  • Lee, Hyeon Su;Jeong, Seung Hwan;Oh, Kyong Joo
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.2
    • /
    • pp.123-139
    • /
    • 2019
  • The Korean NPL market was formed by the government and foreign capital shortly after the 1997 IMF crisis. However, this market is short-lived, as the bad debt has started to increase after the global financial crisis in 2009 due to the real economic recession. NPL has become a major investment in the market in recent years when the domestic capital market's investment capital began to enter the NPL market in earnest. Although the domestic NPL market has received considerable attention due to the overheating of the NPL market in recent years, research on the NPL market has been abrupt since the history of capital market investment in the domestic NPL market is short. In addition, decision-making through more scientific and systematic analysis is required due to the decline in profitability and the price fluctuation due to the fluctuation of the real estate business. In this study, we propose a prediction model that can determine the achievement of the benchmark yield by using the NPL market related data in accordance with the market demand. In order to build the model, we used Korean NPL data from December 2013 to December 2017 for about 4 years. The total number of things data was 2291. As independent variables, only the variables related to the dependent variable were selected for the 11 variables that indicate the characteristics of the real estate. In order to select the variables, one to one t-test and logistic regression stepwise and decision tree were performed. Seven independent variables (purchase year, SPC (Special Purpose Company), municipality, appraisal value, purchase cost, OPB (Outstanding Principle Balance), HP (Holding Period)). The dependent variable is a bivariate variable that indicates whether the benchmark rate is reached. This is because the accuracy of the model predicting the binomial variables is higher than the model predicting the continuous variables, and the accuracy of these models is directly related to the effectiveness of the model. In addition, in the case of a special purpose company, whether or not to purchase the property is the main concern. Therefore, whether or not to achieve a certain level of return is enough to make a decision. For the dependent variable, we constructed and compared the predictive model by calculating the dependent variable by adjusting the numerical value to ascertain whether 12%, which is the standard rate of return used in the industry, is a meaningful reference value. As a result, it was found that the hit ratio average of the predictive model constructed using the dependent variable calculated by the 12% standard rate of return was the best at 64.60%. In order to propose an optimal prediction model based on the determined dependent variables and 7 independent variables, we construct a prediction model by applying the five methodologies of discriminant analysis, logistic regression analysis, decision tree, artificial neural network, and genetic algorithm linear model we tried to compare them. To do this, 10 sets of training data and testing data were extracted using 10 fold validation method. After building the model using this data, the hit ratio of each set was averaged and the performance was compared. As a result, the hit ratio average of prediction models constructed by using discriminant analysis, logistic regression model, decision tree, artificial neural network, and genetic algorithm linear model were 64.40%, 65.12%, 63.54%, 67.40%, and 60.51%, respectively. It was confirmed that the model using the artificial neural network is the best. Through this study, it is proved that it is effective to utilize 7 independent variables and artificial neural network prediction model in the future NPL market. The proposed model predicts that the 12% return of new things will be achieved beforehand, which will help the special purpose companies make investment decisions. Furthermore, we anticipate that the NPL market will be liquidated as the transaction proceeds at an appropriate price.

A Study on the Use of GIS-based Time Series Spatial Data for Streamflow Depletion Assessment (하천 건천화 평가를 위한 GIS 기반의 시계열 공간자료 활용에 관한 연구)

  • YOO, Jae-Hyun;KIM, Kye-Hyun;PARK, Yong-Gil;LEE, Gi-Hun;KIM, Seong-Joon;JUNG, Chung-Gil
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.21 no.4
    • /
    • pp.50-63
    • /
    • 2018
  • The rapid urbanization had led to a distortion of natural hydrological cycle system. The change in hydrological cycle structure is causing streamflow depletion, changing the existing use tendency of water resources. To manage such phenomena, a streamflow depletion impact assessment technology to forecast depletion is required. For performing such technology, it is indispensable to build GIS-based spatial data as fundamental data, but there is a shortage of related research. Therefore, this study was conducted to use the use of GIS-based time series spatial data for streamflow depletion assessment. For this study, GIS data over decades of changes on a national scale were constructed, targeting 6 streamflow depletion impact factors (weather, soil depth, forest density, road network, groundwater usage and landuse) and the data were used as the basic data for the operation of continuous hydrologic model. Focusing on these impact factors, the causes for streamflow depletion were analyzed depending on time series. Then, using distributed continuous hydrologic model based DrySAT, annual runoff of each streamflow depletion impact factor was measured and depletion assessment was conducted. As a result, the default value of annual runoff was measured at 977.9mm under the given weather condition without considering other factors. When considering the decrease in soil depth, the increase in forest density, road development, and groundwater usage, along with the change in land use and development, and annual runoff were measured at 1,003.5mm, 942.1mm, 961.9mm, 915.5mm, and 1003.7mm, respectively. The results showed that the major causes of the streaflow depletion were lowered soil depth to decrease the infiltration volume and surface runoff thereby decreasing streamflow; the increased forest density to decrease surface runoff; the increased road network to decrease the sub-surface flow; the increased groundwater use from undiscriminated development to decrease the baseflow; increased impervious areas to increase surface runoff. Also, each standard watershed depending on the grade of depletion was indicated, based on the definition of streamflow depletion and the range of grade. Considering the weather, the decrease in soil depth, the increase in forest density, road development, and groundwater usage, and the change in land use and development, the grade of depletion were 2.1, 2.2, 2.5, 2.3, 2.8, 2.2, respectively. Among the five streamflow depletion impact factors except rainfall condition, the change in groundwater usage showed the biggest influence on depletion, followed by the change in forest density, road construction, land use, and soil depth. In conclusion, it is anticipated that a national streamflow depletion assessment system to be develop in the future would provide customized depletion management and prevention plans based on the system assessment results regarding future data changes of the six streamflow depletion impact factors and the prospect of depletion progress.

Development of Information Extraction System from Multi Source Unstructured Documents for Knowledge Base Expansion (지식베이스 확장을 위한 멀티소스 비정형 문서에서의 정보 추출 시스템의 개발)

  • Choi, Hyunseung;Kim, Mintae;Kim, Wooju;Shin, Dongwook;Lee, Yong Hun
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.4
    • /
    • pp.111-136
    • /
    • 2018
  • In this paper, we propose a methodology to extract answer information about queries from various types of unstructured documents collected from multi-sources existing on web in order to expand knowledge base. The proposed methodology is divided into the following steps. 1) Collect relevant documents from Wikipedia, Naver encyclopedia, and Naver news sources for "subject-predicate" separated queries and classify the proper documents. 2) Determine whether the sentence is suitable for extracting information and derive the confidence. 3) Based on the predicate feature, extract the information in the proper sentence and derive the overall confidence of the information extraction result. In order to evaluate the performance of the information extraction system, we selected 400 queries from the artificial intelligence speaker of SK-Telecom. Compared with the baseline model, it is confirmed that it shows higher performance index than the existing model. The contribution of this study is that we develop a sequence tagging model based on bi-directional LSTM-CRF using the predicate feature of the query, with this we developed a robust model that can maintain high recall performance even in various types of unstructured documents collected from multiple sources. The problem of information extraction for knowledge base extension should take into account heterogeneous characteristics of source-specific document types. The proposed methodology proved to extract information effectively from various types of unstructured documents compared to the baseline model. There is a limitation in previous research that the performance is poor when extracting information about the document type that is different from the training data. In addition, this study can prevent unnecessary information extraction attempts from the documents that do not include the answer information through the process for predicting the suitability of information extraction of documents and sentences before the information extraction step. It is meaningful that we provided a method that precision performance can be maintained even in actual web environment. The information extraction problem for the knowledge base expansion has the characteristic that it can not guarantee whether the document includes the correct answer because it is aimed at the unstructured document existing in the real web. When the question answering is performed on a real web, previous machine reading comprehension studies has a limitation that it shows a low level of precision because it frequently attempts to extract an answer even in a document in which there is no correct answer. The policy that predicts the suitability of document and sentence information extraction is meaningful in that it contributes to maintaining the performance of information extraction even in real web environment. The limitations of this study and future research directions are as follows. First, it is a problem related to data preprocessing. In this study, the unit of knowledge extraction is classified through the morphological analysis based on the open source Konlpy python package, and the information extraction result can be improperly performed because morphological analysis is not performed properly. To enhance the performance of information extraction results, it is necessary to develop an advanced morpheme analyzer. Second, it is a problem of entity ambiguity. The information extraction system of this study can not distinguish the same name that has different intention. If several people with the same name appear in the news, the system may not extract information about the intended query. In future research, it is necessary to take measures to identify the person with the same name. Third, it is a problem of evaluation query data. In this study, we selected 400 of user queries collected from SK Telecom 's interactive artificial intelligent speaker to evaluate the performance of the information extraction system. n this study, we developed evaluation data set using 800 documents (400 questions * 7 articles per question (1 Wikipedia, 3 Naver encyclopedia, 3 Naver news) by judging whether a correct answer is included or not. To ensure the external validity of the study, it is desirable to use more queries to determine the performance of the system. This is a costly activity that must be done manually. Future research needs to evaluate the system for more queries. It is also necessary to develop a Korean benchmark data set of information extraction system for queries from multi-source web documents to build an environment that can evaluate the results more objectively.

Study on the Painting of Gyeongwoo-gung Shrine (景祐宮圖) (국립문화재연구소 소장 '경우궁도(景祐宮圖)'에 관한 연구)

  • Kim, Kyung Mee
    • Korean Journal of Heritage: History & Science
    • /
    • v.44 no.1
    • /
    • pp.196-221
    • /
    • 2011
  • The Royal Private Shrines or the Samyo(私廟), were dedicated to members of Choseon's royal family who could not be enshrined at the (official) Royal Ancestral Shrine, the Jongmyo(宗廟). The Samyo were constructed at the national level and were systematically managed as such. Because these private Shrines were dedicated to those who couldn't belong to the Jongmyo but were still very important, such as the ruling king's biological father or mother. The details of all royal constructions were included in the State Event Manuals, and with them, the two-dimensional layouts of the Samyo also. From the remaining "Hyunsa-gung Private Tomb Construction Layout Record(顯思宮別廟營建都監儀軌)" of 1824, which is the construction record of Gyeongwoo-gung Shrine(景祐宮) dedicated to Subin, the mother of King Sunjo(純祖), it became possible to investigate the so far unknown "The Painting of Gyeongwoo-gung Shrine", in terms of the year produced, materials used and other situational contexts. The investigation revealed that the "The Painting of Gyeongwoo-gung Shrine" is actually the "Hyunsa-gung Private Tomb Layout" produced by the Royal Construction Bureau. The bureau painted this to build Hyunsa-gung Private Shrine in a separately prepared site outside the court in 1824, according to the royal verdict to close down and move the temporary shrine inside the courtyard dedicated to Subin who had passed away in 1822. As the Construction Bureau must have also produced the Gyeongwoo-gung Shrine Layout, the painter(s) of this layout should exist among the official artists listed in the State Event Manual, but sadly, as their paintings have not survived to this day, we cannot compare their painting styles. The biggest stylistic character of the Painting of Gyeongwoo-gung Shrine is its perfect diagonal composition method and detailed and neat portrayalof the many palace buildings, just as seen in Donggwoldo(東闕圖, Painting of a panoramic view for Changdeokgung and Changgyeonggung Palaces). A well-perceiving architectural painting employs a specific point of view chosen to fit the purpose of the painting, or it can opt to the multi-viewpoint. Korean traditional architectural paintings in early ages utilized the diagonal composition method, the bird-eye viewpoint, or the multi-viewpoint. By the 18th century, detailed but also artistic architectural paintings utilizing the diagonal method are observed. In the early 19th century, the peak of such techniques is exhibited in Donggwoldo(Painting of a panoramic view for Changdeokgung and Changgyeonggung Palaces). From the perfect diagonal composition method employed and the details of the palace buildings numbering almost two hundreds, we can determine that the Painting of Gyeongwoo-gung Shrine also belongs to the same category of the highly technical architectural paintings as Donggwoldo(Painting of a panoramic view for Changdeokgung and Changgyeonggung Palaces). We can also confirm this hypothesis by comparing the painting techniques employed in these two paintings in detailthe way trees and houses are depicted, and the way ground texture is expressed, etc. The unique characteristic of the Painting of Gyeongwoo-gung Shrine is, however, that the area surrounding the central shrine building(正堂), the most important area of the shrine, is drawn using not the diagonal method but the bird-eye viewpoint with the buildings lying flat on both the left and right sides, just as seen in the "Buildings Below the Central Shrine(正堂以下諸處)" in the State Event Manual's Painting Method section. The same viewpoint method is discovered in some other concurrent paintings of common residential buildings, so it is not certain that this particular viewpoint had been a distinctive feature for shrine paintings in general. On the other hand, when the diagonalmethod pointing to the left direction is chosen, the top-left and bottom-right sections of the painting become inevitably empty. This has been the case for the Painting of Gyeongwoo-gung Shrine, but in contrast, Donggwoldo shows perfect screen composition with these empty margins filled up with different types of trees and other objects. Such difference is consistent with the different situational contexts of these two paintings: the Painting of Gyeongwoo-gung Shrine is a simple single-sheet painting, while Donggwoldo is a perfected work of painting book given an official title. Therefore, if Donggwoldo was produced to fulfill the role of depiction and documentation as well as the aesthetic purpose, contrastingly, the Painting of Gyeongwoo-gung Shrine only served the purpose of copying the circumstances of the architecture and projecting them onto the painting.

Collision of New and Old Control Ideologies, Witnessed through the Moving of Jeong-regun (Tomb of Queen Sindeok) and Repair of Gwangtong-gyo (정릉(貞陵) 이장과 광통교(廣通橋) 개수를 통해 본 조선 초기 지배 이데올로기의 대립)

  • Nam, Hohyun
    • Korean Journal of Heritage: History & Science
    • /
    • v.53 no.4
    • /
    • pp.234-249
    • /
    • 2020
  • The dispute involving the construction of the Tomb of Queen Sindeok (hereinafter "Jeongreung"), King Taejo's wife in Seoul, and the moving of that tomb, represents the most clearly demonstrated case for the collision of new and old ideologies between political powers in the early period of Joseon. Jeongreung, the tomb of Queen Sindeok from the Kang Clan, was built inside the capital fortress, but in 1409, King Taejong forced the tomb to be moved outside the capital, and the stone relics remaining at the original location were used to build the stone bridge, Gwangtong-gyo. In an unofficial story, King Taejong moved the tomb outside the capital and used the stone items there to make the Cheonggyecheon Gwang-gyo so that the people would step upon the area in order to curse Lady Kang. In the final year of King Taejo, Lady Kang and King Taejong were in a politically conflictual relationship, but they were close to being political partners until King Taejo became the king. Sillok records pertaining to the establishment of Jeongreung or Gwangtong-gyo in fact state things more plainly, indicating that the moving of Jeongreung was a result of following the sangeon (a written statement to the king) of Uijeongbu (the highest administrative agency in Joseon), which stated that having the tomb of a king or queen in the capital was inappropriate, and since it was close to the official quarter of envoys, it had to be moved. The assertion that it was aimed at degrading Jeongreung in order to repair Gwangtong-gyo thus does not reflect the factual relationship. This article presents the possibility that the use of stone items from Jeongreung to repair Gwangtong-gyo reflected an emerging need for efficient material procurement that accompanied a drastic increase in demand for materials required in civil works both in- and outside the capital. The cause for constructing Jeongreung within the capital and the cause of moving the tomb outside the capital would therefore be attributable to the heterogeneity of the ideological backgrounds of King Taejo and King Taejong. King Taejo was the ruler of the Confucius state, as he reigned through the Yeokseong Revolution, but he constructed the tomb and Hongcheon-sa, the temple in the capital for his wife Queen Sindeok. In this respect, it is considered that, with the power of Buddhism, there was an attempt to rally supporters and gather the force needed to establish the authority of Queen Sindeok. Yi Seong-gye, who was raised in the Dorugachi clan of Yuan, lived as a military man in the border area, and so he would not have had a high level of understanding in Confucian scholarship. Rather, he was a man of the old system with its 'Buddhist" tendency. On the other hand, King Taejong Yi Bang-won was an elite Confucian student who passed the national examination at the end of the Goryeo era, and he is also known to have held a profound understanding of Neo-Confucianism. To state it differently, it would be reasonable to say that the understanding of symbolic implications for the capital would be more profound in a Confucian state. Since the national system that was ruled by laws had been established following the Three-Kingdom era, the principle of burial outside of the capital that would have seen a grave constructed on the outskirts of the capital was not upheld, without exception. Jeongreung was built inside the capital due to the strong individual desire of King Taejo, but since he was a Confucian scholar prior to becoming king, it would not have been accepted as desirable. After taking the throne, King Taejong took the initiative to begin overhauling the capital in order to reflect his intent to clearly realize Confucian ideology emphasizing 'Yechi' ("ruling with good manners") with the scenic view of the Capital's Hanyang river. It would be reasonable to conclude accordingly that the moving of Jeongreung was undertaken in the context of such a historic background.

A Study on Practical Curriculum Development of the Education for Love based on the Understanding of Psychoanalytic 'Desire of Subject' (정신분석학적 '욕망의 주체' 이해에 기초한 사랑의 교육 교육과정 개발)

  • Kim, Sun Ah
    • Journal of Christian Education in Korea
    • /
    • v.68
    • /
    • pp.77-112
    • /
    • 2021
  • This study is based on the research of the first year, which is the National Research Foundation of Korea's R&D subject for middle-grade researchers. In this study, the practical curriculum development of the education for love - an according to the psychoanalytic perspectives of F. Dolto(1908-1988) - is suggested as follows. The first is 'the reconstruction of the directions of curriculum and its specific aims in accordance with such directions.' The reconstruction of the directions of curriculum aims at leading our future generation to live as a subject of desire through the mutual-communication of love. The second is 'the reconstruction of the tasks of curriculum and its specific contents in accordance with such tasks.' The reconstruction of the tasks of curriculum pursuit to help our future generation through the converting the education for love into the paradigm of desire of Agape to live as a subject of desire forming a whole personality and practicing the desire of Agape in daily life. as a source of desire. According to these aims, the reconstruction of directions of curriculum are presented as following: firstly, 'curriculum for the mutual-communication between subjects of love' and secondly, 'curriculum for the subject of desire'. The reconstruction of tasks of curriculum are like these: firstly, 'converting the education for love into the paradigm of desire of Agape', and secondly, 'forming a whole personality through the education for love'. Thus, with respect to two specific aims in accordance with the reconstruction of directions are suggested like these: Firstly, 'constructing a subject as a speaking existence' and secondly, 'realizing the subject as the autonomous source of desire'. In the two specific contents in accordance with the reconstruction of tasks are presented as following: Firstly, 'realizing the truth of the desire of Agape'.' Secondly, 'practicing the desire of Agape in daily life.' The third is 'the reconstruction of curriculum by life cycle' are suggested. They include the fetal life, infants and preschool children life, and childhood life. In further study, it is required to contain adolescent period. It will be useful to help them to recover their self-esteem with the experience of true love, especially, out-of-school young generation overcome negative perspectives and prejudice in the society, and challenges to their dreams and future through proper utilization of the study outcome. The outcome of this study, which presented practical curriculum development of the education for love based on the understanding of psychoanalytic 'desire of subject' can be used as basic teaching materials for our future generations. Furthermore, the results can be used as a resource for educating ministers and lay leaders in the religious world to build capabilities to heal their inner side as well as the society that is tainted with various forms of conflict. These include general conflicts, anger, pleasure and addiction, depression and suicide, violence and murder, etc. The study outcome can contribute to the prevention of antisocial incidents against humanity that have recently been occurring in our free-semester system implemented in all middle schools across the country to be operated effectively. For example, it is possible to provide the study results as lecture and teaching materials for 'character camp' (self-examination and self-esteem improvement training) and 'family healing camp' (solution of a communication gap between family members and love communication training), which help students participate in field trip activities and career exploration activities voluntarily, independently, and creatively. Ultimately, it can visibly present the convergent research performance by providing the study outcome as preliminary data for the development of lecture videos and materials including infant care and preschool education, parental education, family consultation education, and holistic healing education. Support from the religious world, including the central government and local governments, are urgently required in order for such educational possibilities to be fulfilled both in the society and the fields of church education and to be actively linked to follow-up studies.

Basic Research on the Possibility of Developing a Landscape Perceptual Response Prediction Model Using Artificial Intelligence - Focusing on Machine Learning Techniques - (인공지능을 활용한 경관 지각반응 예측모델 개발 가능성 기초연구 - 머신러닝 기법을 중심으로 -)

  • Kim, Jin-Pyo;Suh, Joo-Hwan
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.51 no.3
    • /
    • pp.70-82
    • /
    • 2023
  • The recent surge of IT and data acquisition is shifting the paradigm in all aspects of life, and these advances are also affecting academic fields. Research topics and methods are being improved through academic exchange and connections. In particular, data-based research methods are employed in various academic fields, including landscape architecture, where continuous research is needed. Therefore, this study aims to investigate the possibility of developing a landscape preference evaluation and prediction model using machine learning, a branch of Artificial Intelligence, reflecting the current situation. To achieve the goal of this study, machine learning techniques were applied to the landscaping field to build a landscape preference evaluation and prediction model to verify the simulation accuracy of the model. For this, wind power facility landscape images, recently attracting attention as a renewable energy source, were selected as the research objects. For analysis, images of the wind power facility landscapes were collected using web crawling techniques, and an analysis dataset was built. Orange version 3.33, a program from the University of Ljubljana was used for machine learning analysis to derive a prediction model with excellent performance. IA model that integrates the evaluation criteria of machine learning and a separate model structure for the evaluation criteria were used to generate a model using kNN, SVM, Random Forest, Logistic Regression, and Neural Network algorithms suitable for machine learning classification models. The performance evaluation of the generated models was conducted to derive the most suitable prediction model. The prediction model derived in this study separately evaluates three evaluation criteria, including classification by type of landscape, classification by distance between landscape and target, and classification by preference, and then synthesizes and predicts results. As a result of the study, a prediction model with a high accuracy of 0.986 for the evaluation criterion according to the type of landscape, 0.973 for the evaluation criterion according to the distance, and 0.952 for the evaluation criterion according to the preference was developed, and it can be seen that the verification process through the evaluation of data prediction results exceeds the required performance value of the model. As an experimental attempt to investigate the possibility of developing a prediction model using machine learning in landscape-related research, this study was able to confirm the possibility of creating a high-performance prediction model by building a data set through the collection and refinement of image data and subsequently utilizing it in landscape-related research fields. Based on the results, implications, and limitations of this study, it is believed that it is possible to develop various types of landscape prediction models, including wind power facility natural, and cultural landscapes. Machine learning techniques can be more useful and valuable in the field of landscape architecture by exploring and applying research methods appropriate to the topic, reducing the time of data classification through the study of a model that classifies images according to landscape types or analyzing the importance of landscape planning factors through the analysis of landscape prediction factors using machine learning.

An Exploratory Study on the Competition Patterns Between Internet Sites in Korea (한국 인터넷사이트들의 산업별 경쟁유형에 대한 탐색적 연구)

  • Park, Yoonseo;Kim, Yongsik
    • Asia Marketing Journal
    • /
    • v.12 no.4
    • /
    • pp.79-111
    • /
    • 2011
  • Digital economy has grown rapidly so that the new business area called 'Internet business' has been dramatically extended as time goes on. However, in the case of Internet business, market shares of individual companies seem to fluctuate very extremely. Thus marketing managers who operate the Internet sites have seriously observed the competition structure of the Internet business market and carefully analyzed the competitors' behavior in order to achieve their own business goals in the market. The newly created Internet business might differ from the offline ones in management styles, because it has totally different business circumstances when compared with the existing offline businesses. Thus, there should be a lot of researches for finding the solutions about what the features of Internet business are and how the management style of those Internet business companies should be changed. Most marketing literatures related to the Internet business have focused on individual business markets. Specifically, many researchers have studied the Internet portal sites and the Internet shopping mall sites, which are the most general forms of Internet business. On the other hand, this study focuses on the entire Internet business industry to understand the competitive circumstance of online market. This approach makes it possible not only to have a broader view to comprehend overall e-business industry, but also to understand the differences in competition structures among Internet business markets. We used time-series data of Internet connection rates by consumers as the basic data to figure out the competition patterns in the Internet business markets. Specifically, the data for this research was obtained from one of Internet ranking sites, 'Fian'. The Internet business ranking data is obtained based on web surfing record of some pre-selected sample group where the possibility of double-count for page-views is controlled by method of same IP check. The ranking site offers several data which are very useful for comparison and analysis of competitive sites. The Fian site divides the Internet business areas into 34 area and offers market shares of big 5 sites which are on high rank in each category daily. We collected the daily market share data about Internet sites on each area from April 22, 2008 to August 5, 2008, where some errors of data was found and 30 business area data were finally used for our research after the data purification. This study performed several empirical analyses in focusing on market shares of each site to understand the competition among sites in Internet business of Korea. We tried to perform more statistically precise analysis for looking into business fields with similar competitive structures by applying the cluster analysis to the data. The research results are as follows. First, the leading sites in each area were classified into three groups based on averages and standard deviations of daily market shares. The first group includes the sites with the lowest market shares, which give more increased convenience to consumers by offering the Internet sites as complimentary services for existing offline services. The second group includes sites with medium level of market shares, where the site users are limited to specific small group. The third group includes sites with the highest market shares, which usually require online registration in advance and have difficulty in switching to another site. Second, we analyzed the second place sites in each business area because it may help us understand the competitive power of the strongest competitor against the leading site. The second place sites in each business area were classified into four groups based on averages and standard deviations of daily market shares. The four groups are the sites showing consistent inferiority compared to the leading sites, the sites with relatively high volatility and medium level of shares, the sites with relatively low volatility and medium level of shares, the sites with relatively low volatility and high level of shares whose gaps are not big compared to the leading sites. Except 'web agency' area, these second place sites show relatively stable shares below 0.1 point of standard deviation. Third, we also classified the types of relative strength between leading sites and the second place sites by applying the cluster analysis to the gap values of market shares between two sites. They were also classified into four groups, the sites with the relatively lowest gaps even though the values of standard deviation are various, the sites with under the average level of gaps, the sites with over the average level of gaps, the sites with the relatively higher gaps and lower volatility. Then we also found that while the areas with relatively bigger gap values usually have smaller standard deviation values, the areas with very small differences between the first and the second sites have a wider range of standard deviation values. The practical and theoretical implications of this study are as follows. First, the result of this study might provide the current market participants with the useful information to understand the competitive circumstance of the market and build the effective new business strategy for the market success. Also it might be useful to help new potential companies find a new business area and set up successful competitive strategies. Second, it might help Internet marketing researchers take a macro view of the overall Internet market so that make possible to begin the new studies on overall Internet market beyond individual Internet market studies.

  • PDF

An Exploratory Study on the Effects of Relational Benefits and Brand Identity : mediating effect of brand identity (관계혜택과 브랜드 동일시의 역할에 관한 탐색적 연구: 브랜드 동일시의 매개역할을 중심으로)

  • Bang, Jounghae;Jung, Jiyeon;Lee, Eunhyung;Kang, Hyunmo
    • Asia Marketing Journal
    • /
    • v.12 no.2
    • /
    • pp.155-175
    • /
    • 2010
  • Most of the service industries including finance and telecommunications have become matured and saturated. The competitions have become severe while the differences among brands become smaller. Therefore maintaining good relationships with customers has been critical for the service providers. In case of credit card and debit card, the similar patterns are shown. It is important for them to maintain good relationships with customers, and therefore, they have used marketing program which provides customized services to customers and utilizes the membership programs. Not only do they build and maintain good relationships, but also highlight their brands from the emotional aspects. For example, KB Card or Hyundai Card uses well-known designers' works for their credit card design. As well, they differentiate the designs of credit cards to stress on their brand personalities. BC Card introduced the credit card with perfume that a customer would like. Even though the credit card is small and not shown to public easily, it becomes more important for those companies to touch the customers' feelings with the brand personalities and their images. This is partly because of changes in consumers' lifestyles. Y-generations becomes highly likely to express themselves in many different ways and more emotional than X-generations. For the Y-generations, therefore, even credit cards in the wallet should be personalized and well-designed. In line with it, credit cards with good design can be seen as an example of brand identity, where different design for each customer can be used to recognize the membership groups that customers want to belong. On the other hand, these credit card companies offer the special treatment benefits for those customers who are heavy users for the cards. For example, those customers who love sports will receive some special discounts when they use their credit cards for sports related products. Therefore this study attempted to explore the relationships between relational benefits, brand identification and loyalty. It has been well known that relational benefits and brand identification lead to loyalty independently from many other studies, but there has been few study to review all the three variables all together in a research model. Furthermore, as reviewed above, in the card industry, many companies attempt to associate the brand image with their products to fit their customers' lifestyles while relational benefits are still playing an important role for their business. Therefore in our research model, relational benefits, brand identification, and loyalty are all included. We focus on the mediating effect of brand identification. From the relational benefits perspective, only special treatment benefit and confidence benefit are included. Social benefit is not applicable for this credit card industry because not many cases of face-to-face interaction can be found. From the brand identification perspective, personal brand identity and social brand identity are reviewed and included in the model. Overall, the research model emphasizes that the relationships between relational benefits and loyalty will be mediated by the effect of brand identification. The effects of relational benefits which are confidence benefit and special treatment benefits on loyalty will be realized when they fit to the personal brand identity and social brand identity. In the research model, therefore, the relationships between confidence benefit and social brand identity, and between confidence benefit and personal identity are hypothesized while the effects of special treatment benefit on social brand identity and personal brand identity are hypothesized. Loyalty, then, is hypothesized to have positive relationships with personal brand identity and social brand identity. In addition, confidence benefit among the relational benefits is expected to have a direct, positive relationship with loyalty because confidence benefit has been recognized as a critical factor for good relationships and satisfaction. Data were collected from college students who have been using either credit cards or debit cards. College students were regarded good subjects because they are in Y-generation cohorts and have tendency to express themselves more. Total sample size was two hundred three at the beginning, but after deleting those data with many missing values, one hundred ninety-seven data points were remained and used for the model testing. Measurement items were brought from the previous literatures and modified for this research. To test the reliability, using SPSS 14, chronbach's α was examined and all the values were from .874 to .928 exceeding over .7. Using AMOS 7.0, confirmatory factor analysis was conducted to investigate the measurement model. The measurement model was found good fit with χ2(67)=188.388 (p= .000), GFI=.886, AGFI=.821, CFI=.941, RMSEA=.096. Using AMOS 7.0, structural equation modeling has been used to analyze the research model. Overall, the research model fit were χ2(68)=188.670 (p= .000), GFI=.886, AGFI=,824 CFI=.942, RMSEA=.095 indicating good fit. In details, all the paths hypothesized in the research model were found significant except for the path from social brand identity to loyalty. Personal brand identity leads to loyalty while both confidence benefit and special treatment benefit have a positive relationships with personal and social identities. As well, confidence benefit has a direct positive effect on loyalty. The results indicates the followings. First, personal brand identity plays an important role for credit/debit card usage. Therefore even for the products which are not shown to public easy, design and emotional aspect can be important to fit the customers' lifestyles. Second, confidence benefit and special treatment benefit have a positive effects on personal brand identity. Therefore it will be needed for marketers to associate the special treatment and trust and confidence benefits with personal image, personality and personal identity. Third, this study found again the importance of confidence and trust. However interestingly enough, social brand identity was not found to be significantly related to loyalty. It can be explained that the main sample of this study consists of college students. Those strategies to facilitate social brand identity are focused on high social status groups while college students have not been established their status yet.

  • PDF

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.