• Title/Summary/Keyword: corporate reputation

Search Result 107, Processing Time 0.022 seconds

Womenswear Collections based on Italian Fashion Market Trends-utilizing 1990's demographics data- (이태리 패션시장 트렌드 분석을 통한 여성복 컬렉션 기획-1990년대 통계자료를 중심으로-)

  • 김유경
    • Journal of the Korean Society of Costume
    • /
    • v.38
    • /
    • pp.193-211
    • /
    • 1998
  • Without a solid marketing system in placed, the fashion industry cannot flourish on out-standing design or technology alone. Even though the significance of collecting and analyzing information, merchandising, and retail distribution is recognized, these functions are not firmly rooted or prevalent in our industry. In contrast, Italy which possesses similar demographic traits such as the lack of natural resources and other physical factors has succeed-ed in globalizing its fashion market by responding swiftly and exercising flexiblity to its constantly changing consumer demand. This in turn has earned Italy the competitive edge in the global fashion arena. Italy's unique management skills and operation know-how, along with successful market strategies come into play in bringing competitiveness to Italy's fashion market. Firstly, smaller companies with ability to adopt swiftly to the ever changing market. Secondly, fashion friendly social environment. Thirdly, niche marketing through highly specialized system and differentiation. Fourthly, timeless innovation through intense corporate competition. Lastly, establishment of foundations to support the industry through diverse networking. The alone building blocks have formed a basis for erecting an unparalleled market with a reputation for excellence in design and quality in the global fashion world. This study has examined how Italy's fashion industry has evolved from an underdeveloped textile business into a cutting edge fashion in-dustry. Italy's unique business processes and practices were studied to come up with a collection and merchandising ideas in a niche market. By selecting this venue we are able to continuously grow and develop in a market with diverse consumer needs. To analyze the Italian fashion market, data from 3 institutions were utilized, namely, CIT-ER which has provided consumer trends and sales analysis, SITA,a data service provided statistics from the textile and apparel businesses, and NBI has also furnished valuable data. Italian consumer preference, buying behavior, consumer profile, retail channels and other related data from the above institutions has formed a backbone for market segmentation and target markets, and as a result, we were able to zero in on the type of consumer, produce, pricing and retail channels for our womenswear. Going forward the direction is to elevate product image and pretige, and create syn-ergy between related industries, and at the same note, in order to develop internationally recognized brands such as Max Mara and Benetton. Certain elements such as the specialization of the fashion industry, alon-g with fashion-related data base and systems support, and most importantly experts with acute fashion sense and capacity to analyze pertinent data are in need. I firmly believe that we can achieve Italy's level in the fashion market with support from the government and unrelenting effort within the industry itself, and hope that this report can prove to be useful.

  • PDF

A Study on the Construction of 3D Database and Application for Realization of "The Cyber City" ("사이버" 도시 실현을 위한 3차원 공간 데이터베이스 구축과 활용)

  • 김재윤
    • Spatial Information Research
    • /
    • v.9 no.2
    • /
    • pp.325-340
    • /
    • 2001
  • This research is to construct more useful Geo-spatial data by building spatial data to three dimensional and utilize the database effectively for development of application, maintenance and management program, and application technology, which is on going based on “Haeundae three dimensional database construction project”. Furthermore, the acquisition of geographic information data and the technological improvement of effective construction would be the important factors to judge the qualitative reputation of GIS. Above all, studies to create accurate data and overcome the error limitation are much more important than any other thing. Final form of Spatial Data to materialize efficient GIS(Geographic Information System) must be three dimensional spatial data which has attribute data, actual concept and numerical value of real world. In connection to that, development is on the move to improve building technique of useful spatial data and digitalize the entire country in cryberspace. $\ulcorner the cyber country lrcorner$is designed to mange the entire country systematically. This simulation would be able to cover administration of government institution, public service, corporate business and even the public life in the cyeberspace though the computer. Materialization of efficient GIS and establishment of condition as technically strong nation through the early realization of $\ulcorner the cyber country lrcorner$will provide a great opportunity to open up the global market with exportation of advanced technology.

  • PDF

A Design of Authentication Mechanism for Secure Communication in Smart Factory Environments (스마트 팩토리 환경에서 안전한 통신을 위한 인증 메커니즘 설계)

  • Joong-oh Park
    • Journal of Industrial Convergence
    • /
    • v.22 no.4
    • /
    • pp.1-9
    • /
    • 2024
  • Smart factories represent production facilities where cutting-edge information and communication technologies are fused with manufacturing processes, reflecting rapid advancements and changes in the global manufacturing sector. They capitalize on the integration of robotics and automation, the Internet of Things (IoT), and the convergence of artificial intelligence technologies to maximize production efficiency in various manufacturing environments. However, the smart factory environment is prone to security threats and vulnerabilities due to various attack techniques. When security threats occur in smart factories, they can lead to financial losses, damage to corporate reputation, and even human casualties, necessitating an appropriate security response. Therefore, this paper proposes a security authentication mechanism for safe communication in the smart factory environment. The components of the proposed authentication mechanism include smart devices, an internal operation management system, an authentication system, and a cloud storage server. The smart device registration process, authentication procedure, and the detailed design of anomaly detection and update procedures were meticulously developed. And the safety of the proposed authentication mechanism was analyzed, and through performance analysis with existing authentication mechanisms, we confirmed an efficiency improvement of approximately 8%. Additionally, this paper presents directions for future research on lightweight protocols and security strategies for the application of the proposed technology, aiming to enhance security.

Development on Early Warning System about Technology Leakage of Small and Medium Enterprises (중소기업 기술 유출에 대한 조기경보시스템 개발에 대한 연구)

  • Seo, Bong-Goon;Park, Do-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.1
    • /
    • pp.143-159
    • /
    • 2017
  • Due to the rapid development of IT in recent years, not only personal information but also the key technologies and information leakage that companies have are becoming important issues. For the enterprise, the core technology that the company possesses is a very important part for the survival of the enterprise and for the continuous competitive advantage. Recently, there have been many cases of technical infringement. Technology leaks not only cause tremendous financial losses such as falling stock prices for companies, but they also have a negative impact on corporate reputation and delays in corporate development. In the case of SMEs, where core technology is an important part of the enterprise, compared to large corporations, the preparation for technological leakage can be seen as an indispensable factor in the existence of the enterprise. As the necessity and importance of Information Security Management (ISM) is emerging, it is necessary to check and prepare for the threat of technology infringement early in the enterprise. Nevertheless, previous studies have shown that the majority of policy alternatives are represented by about 90%. As a research method, literature analysis accounted for 76% and empirical and statistical analysis accounted for a relatively low rate of 16%. For this reason, it is necessary to study the management model and prediction model to prevent leakage of technology to meet the characteristics of SMEs. In this study, before analyzing the empirical analysis, we divided the technical characteristics from the technology value perspective and the organizational factor from the technology control point based on many previous researches related to the factors affecting the technology leakage. A total of 12 related variables were selected for the two factors, and the analysis was performed with these variables. In this study, we use three - year data of "Small and Medium Enterprise Technical Statistics Survey" conducted by the Small and Medium Business Administration. Analysis data includes 30 industries based on KSIC-based 2-digit classification, and the number of companies affected by technology leakage is 415 over 3 years. Through this data, we conducted a randomized sampling in the same industry based on the KSIC in the same year, and compared with the companies (n = 415) and the unaffected firms (n = 415) 1:1 Corresponding samples were prepared and analyzed. In this research, we will conduct an empirical analysis to search for factors influencing technology leakage, and propose an early warning system through data mining. Specifically, in this study, based on the questionnaire survey of SMEs conducted by the Small and Medium Business Administration (SME), we classified the factors that affect the technology leakage of SMEs into two factors(Technology Characteristics, Organization Characteristics). And we propose a model that informs the possibility of technical infringement by using Support Vector Machine(SVM) which is one of the various techniques of data mining based on the proven factors through statistical analysis. Unlike previous studies, this study focused on the cases of various industries in many years, and it can be pointed out that the artificial intelligence model was developed through this study. In addition, since the factors are derived empirically according to the actual leakage of SME technology leakage, it will be possible to suggest to policy makers which companies should be managed from the viewpoint of technology protection. Finally, it is expected that the early warning model on the possibility of technology leakage proposed in this study will provide an opportunity to prevent technology Leakage from the viewpoint of enterprise and government in advance.

A Mutual P3P Methodology for Privacy Preserving Context-Aware Systems Development (프라이버시 보호 상황인식 시스템 개발을 위한 쌍방향 P3P 방법론)

  • Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.18 no.1
    • /
    • pp.145-162
    • /
    • 2008
  • One of the big concerns in e-society is privacy issue. In special, in developing robust ubiquitous smart space and corresponding services, user profile and preference are collected by the service providers. Privacy issue would be more critical in context-aware services simply because most of the context data themselves are private information: user's current location, current schedule, friends nearby and even her/his health data. To realize the potential of ubiquitous smart space, the systems embedded in the space should corporate personal privacy preferences. When the users invoke a set of services, they are asked to allow the service providers or smart space to make use of personal information which is related to privacy concerns. For this reason, the users unhappily provide the personal information or even deny to get served. On the other side, service provider needs personal information as rich as possible with minimal personal information to discern royal and trustworthy customers and those who are not. It would be desirable to enlarge the allowable personal information complying with the service provider's request, whereas minimizing service provider's requiring personal information which is not allowed to be submitted and user's submitting information which is of no value to the service provider. In special, if any personal information required by the service provider is not allowed, service will not be provided to the user. P3P (Platform for Privacy Preferences) has been regarded as one of the promising alternatives to preserve the personal information in the course of electronic transactions. However, P3P mainly focuses on preserving the buyers' personal information. From time to time, the service provider's business data should be protected from the unintended usage from the buyers. Moreover, even though the user's privacy preference could depend on the context happened to the user, legacy P3P does not handle the contextual change of privacy preferences. Hence, the purpose of this paper is to propose a mutual P3P-based negotiation mechanism. To do so, service provider's privacy concern is considered as well as the users'. User's privacy policy on the service provider's information also should be informed to the service providers before the service begins. Second, privacy policy is contextually designed according to the user's current context because the nomadic user's privacy concern structure may be altered contextually. Hence, the methodology includes mutual privacy policy and personalization. Overall framework of the mechanism and new code of ethics is described in section 2. Pervasive platform for mutual P3P considers user type and context field, which involves current activity, location, social context, objects nearby and physical environments. Our mutual P3P includes the privacy preference not only for the buyers but also the sellers, that is, service providers. Negotiation methodology for mutual P3P is proposed in section 3. Based on the fact that privacy concern occurs when there are needs for information access and at the same time those for information hiding. Our mechanism was implemented based on an actual shopping mall to increase the feasibility of the idea proposed in this paper. A shopping service is assumed as a context-aware service, and data groups for the service are enumerated. The privacy policy for each data group is represented as APPEL format. To examine the performance of the example service, in section 4, simulation approach is adopted in this paper. For the simulation, five data elements are considered: $\cdot$ UserID $\cdot$ User preference $\cdot$ Phone number $\cdot$ Home address $\cdot$ Product information $\cdot$ Service profile. For the negotiation, reputation is selected as a strategic value. Then the following cases are compared: $\cdot$ Legacy P3P is considered $\cdot$ Mutual P3P is considered without strategic value $\cdot$ Mutual P3P is considered with strategic value. The simulation results show that mutual P3P outperforms legacy P3P. Moreover, we could conclude that when mutual P3P is considered with strategic value, performance was better than that of mutual P3P is considered without strategic value in terms of service safety.

A Study on the Justification for Disciplinary by the reason for Whistle-blowing (근로자의 내부고발을 이유로 한 징계의 정당성)

  • Choi, Hong-Ki
    • Journal of Legislation Research
    • /
    • no.44
    • /
    • pp.611-653
    • /
    • 2013
  • An whistle-blowing is recognition of acts of misconduct or corruption by individuals(laborers) or party which belongs to a certain organization and it refers to the act of informing to the senior organization or to the outside public agency to avoid jeopardies that could be potentially lead against benefit of the public. These whistle-blowings can be a Ansatz that improve corporation's transparency and accountability by prevention of enterprise's misconduct as well, it has been recognized as an important role for the establishment of corporate ethics, moreover, social justice. What to be treated primarily as labor law problem is arousing some controversies of the possibility that the public announcement could be whether a disciplinary punishment or not because it brings some mischievous effects for the honor and the reputation to the company which conducted the illegal actions and the action of the contrary to the social value. And futhermore, recently, the matter of compensational responsibility according to the arrangement conversion, bullying followed by the informant has been brought up. The fundamental standpoint of precedent related with the judgement of justification for the punishment as reason of the whistle-blowing ought to do the sincere duty for the labor contract which is the employees are supposed to consider the employer's profits. For that reason, if the emploee release the inside fact to the public and give any damages to employer's secret or confidence or honor, it will be a causing reasong of the disciplinary punishment, but in specific cases, the relevant and level of punishment limitation can be judged by the contents of public announcement and the truth, the purpose of the acts and details and the way of announcement. Precisely, on the assumption that there are necessity of the characteristic profit or the freedom of expression for the informant, with overall consideration whether or the basis part of the informant is true or there is a fair reason which make the informant believe is true or the purpose of informant has the public profit or the contents of the whistle-blowing are important for relevant organization or the means and the way was suitable, if the whistle-blowing are approved to be resonable, the organization are not permitted the reprimand or dismiss Futhermore, to find the solution for the issues of the disciplinary punishment and the treatment of all sorts of disadvantages, for the reason of whistle-blowing, since the protection law for public declarer which was enacted in last 2011 have the position as the general law, the purport of the equal law has to be considered sytematically and also the judicial precedent which is related to the justification of whistle-blowing are needed to be considered as well.

Consumer's Negative Brand Rumor Acceptance and Rumor Diffusion (소비자의 부정적 브랜드 루머의 수용과 확산)

  • Lee, Won-jun;Lee, Han-Suk
    • Asia Marketing Journal
    • /
    • v.14 no.2
    • /
    • pp.65-96
    • /
    • 2012
  • Brand has received much attention from considerable marketing research. When consumers consume product or services, they are exposed to a lot of brand related stimuli. These contain brand personality, brand experience, brand identity, brand communications and so on. A special kind of new crisis occasionally confronting companies' brand management today is the brand related rumor. An important influence on consumers' purchase decision making is the word-of-mouth spread by other consumers and most decisions are influenced by other's recommendations. In light of this influence, firms have reasonable reason to study and understand consumer-to-consumer communication such as brand rumor. The importance of brand rumor to marketers is increasing as the number of internet user and SNS(social network service) site grows. Due to the development of internet technology, people can spread rumors without the limitation of time, space and place. However relatively few studies have been published in marketing journals and little is known about brand rumors in the marketplace. The study of rumor has a long history in all major social science. But very few studies have dealt with the antecedents and consequences of any kind of brand rumor. Rumor has been generally described as a story or statement in general circulation without proper confirmation or certainty as to fact. And it also can be defined as an unconfirmed proposition, passed along from people to people. Rosnow(1991) claimed that rumors were transmitted because people needed to explain ambiguous and uncertain events and talking about them reduced associated anxiety. Especially negative rumors are believed to have the potential to devastate a company's reputation and relations with customers. From the perspective of marketer, negative rumors are considered harmful and extremely difficult to control in general. It is becoming a threat to a company's sustainability and sometimes leads to negative brand image and loss of customers. Thus there is a growing concern that these negative rumors can damage brands' reputations and lead them to financial disaster too. In this study we aimed to distinguish antecedents of brand rumor transmission and investigate the effects of brand rumor characteristics on rumor spread intention. We also found key components in personal acceptance of brand rumor. In contextualist perspective, we tried to unify the traditional psychological and sociological views. In this unified research approach we defined brand rumor's characteristics based on five major variables that had been found to influence the process of rumor spread intention. The five factors of usefulness, source credibility, message credibility, worry, and vividness, encompass multi level elements of brand rumor. We also selected product involvement as a control variable. To perform the empirical research, imaginary Korean 'Kimch' brand and related contamination rumor was created and proposed. Questionnaires were collected from 178 Korean samples. Data were collected from college students who have been experienced the focal product. College students were regarded as good subjects because they have a tendency to express their opinions in detail. PLS(partial least square) method was adopted to analyze the relations between variables in the equation model. The most widely adopted causal modeling method is LISREL. However it is poorly suited to deal with relatively small data samples and can yield not proper solutions in some cases. PLS has been developed to avoid some of these limitations and provide more reliable results. To test the reliability using SPSS 16 s/w, Cronbach alpha was examined and all the values were appropriate showing alpha values between .802 and .953. Subsequently, confirmatory factor analysis was conducted successfully. And structural equation modeling has been used to analyze the research model using smartPLS(ver. 2.0) s/w. Overall, R2 of adoption of rumor is .476 and R2 of intention of rumor transmission is .218. The overall model showed a satisfactory fit. The empirical results can be summarized as follows. According to the results, the variables of brand rumor characteristic such as source credibility, message credibility, worry, and vividness affect argument strength of rumor. And argument strength of rumor also affects rumor intention. On the other hand, the relationship between perceived usefulness and argument strength of rumor is not significant. The moderating effect of product involvement on the relations between argument strength of rumor and rumor W.O.M intention is not supported neither. Consequently this study suggests some managerial and academic implications. We consider some implications for corporate crisis management planning, PR and brand management. This results show marketers that rumor is a critical factor for managing strong brand assets. Also for researchers, brand rumor should become an important thesis of their interests to understand the relationship between consumer and brand. Recently many brand managers and marketers have focused on the short-term view. They just focused on strengthen the positive brand image. According to this study we suggested that effective brand management requires managing negative brand rumors with a long-term view of marketing decisions.

  • PDF