• Title/Summary/Keyword: critical review

Search Result 2,135, Processing Time 0.029 seconds

New Perspective for Performance Measurement of Digital Supply Chain Management (디지털 공급-수요 사슬 관리의 성과를 측정하기 위한 새로운 관점)

  • Ronja Rasche;DongBack Seo
    • Information Systems Review
    • /
    • v.25 no.3
    • /
    • pp.139-162
    • /
    • 2023
  • With the emergence of new digital technologies into a supply chain, it is essential for companies to incorporate these technologies in managing their supply chains. However, various challenges have been identified in digital supply chain management, especially when it comes to its assessment. There are no universally agreed measurements for the performance of digital supply chain management within the research community so far. This paper explores an option of using user experience as one of possible measurements. Therefore, three different focus-group discussions were held and later analyzed with a qualitative content analysis. The subscription-based video on demand service, Netflix was used as an example in those discussions. Due to the fact that Netflix provides a digital product as a streamline service, user experience is critical for the company. Especially, user experience with a recommender system and related privacy issues have become significant for a company to retain existing customers and attract new customers in many fields. Since the recommender system and related privacy issues are parts of a digital supply chain, user experience can be one of appropriate measurements for digital supply chain management. This study opens a new perspective for research on performance measurements of digital supply chain management.

Online Host and Its Impact on Live Streaming Commerce Performance: The Moderating Role of Product Type (온라인 호스트가 라이브 스트리밍 커머스 성과에 미치는 영향: 제품 유형의 조절 역할을 중심으로)

  • Xuanting Jin;Minghao Huang;Dongwon Lee
    • Information Systems Review
    • /
    • v.25 no.1
    • /
    • pp.213-231
    • /
    • 2023
  • With the rapid development of live streaming commerce, online host as an information source plays a critical role in affecting live streaming performance. However, the impact of different product types on the relationship between online hosts and live streaming has been less studied. Based on the elaboration likelihood model (ELM) and information source theory, this study aims to empirically investigate what factors influence the sales of live streaming commerce and how product type moderates the relationship between them. The analysis of 11,422 live streaming commerce data collected for four months from October 10, 2021 to February 10, 2022 shows that, among the factors related to source credibility and attractiveness, multi-channel networks (MCN) and the number of followers positively affect the sales volume of live streaming commerce, whereas the reputation score harms the sales. Moreover, the moderating effect of the product type (i.e., ratio of involvement products) on the relationships is confirmed. The findings enrich the literature on live streaming commerce performance. The limitations and future research directions are also discussed.

A Study on the Types and Determinants of Young Farmers: Focusing on Young Farmers in Muan-gun, Jeollanam-do (청년농업인 유형화 및 결정요인 분석: 전남 무안군 청년농업인 중심으로)

  • Hyangmi Yi;Jongha Kim
    • Land and Housing Review
    • /
    • v.15 no.2
    • /
    • pp.107-124
    • /
    • 2024
  • Based on Muan-gun, Jeollanam-do, this study explores how to mitigate the disappearance of rual areas. The study surveyed 95 young farmers in Muan-gun to assess their farming practices and the challenges they face. We further employ factor analysis and cluster analysis classify young farmers in Muan-gun, facilitating the identification of tailored policies or initiatives aimed at fostering and supporting young farmers. The results are summarized as follows. First, Muan County does not have any ordinances or original projects specifically designed to support young farmers. Second, the succession rate of farmland among young farmers in Muan County is 41.1%, which is comparable to the national rate of 43.7%. This indicates that approximately 40% of young farmers in Korea have inherited farmland, a critical foundation for agricultural activities. Third, despite accumulating farming experience, young farmers have not seen any improvement in local living conditions, and rather their difficulties have intensified. Fourth, this study conducted a factor analysis using 21 variables, resulting in the selection of seven common factors for cluster analysis. Consequently, young farmers in Muan County were categorized into three groups. The multinomial logit analysis revealed that the typology of young farmers is influenced by indicators such as cultivated area, farming experience, demand for smart farms, farm income, and farming type (rice cultivation or other). Therefore, to attract young farmers and prevent the decline of rural areas, policy efforts should focus on minimizing entry barriers to farming infrastructure, such as access to farmland, and improving local settlement conditions.

Workflow Procedures and Applications in BIM-based Design for Safety (DfS) (BIM 기반 설계안전성검토의 업무 절차와 활용 방안에 관한 연구)

  • Jaewoong Hwang;Heetaek Yoon;Junhyun Bae;Youngkon Park
    • Land and Housing Review
    • /
    • v.15 no.2
    • /
    • pp.125-137
    • /
    • 2024
  • A conventional Design for Safety (DfS), introduced to eliminate potential hazards in the design phase proactively, has encountered persistent challenges, such as perfunctory risk assessments and hazard identifications based on 2D drawings and inefficient workflow processes. This study proposes a BIM-based approach to Design for Safety (DfS) to address the limitations of conventional methods, aiming to enhance efficiency and achieve practical safety management benefits. The proposed workflow process for BIM-based DfS has been refined and validated for on-site applicability through various case studies, including risk assessments during the design phase and field applications for safety management activities during the construction phase. Specifically, the critical process of risk assessment within the DfS methodology has also been transitioned to a BIM-based approach. This BIM-based risk assessment process has been evaluated through case studies, encompassing safety reviews for structural design, construction equipment operation, and construction methodology with sequence in design projects. Additionally, the proposed BIM-based DfS has demonstrated exceptional on-site applicability and efficiency, as validated by the application of a BIM deliverable embedded in DfS information for CDE-based daily activity briefing, VR-based safety training, AR-based mitigation measures inspections, and other safety management activities in the construction phase.

2021 Korean Society of Gastrointestinal Endoscopy Clinical Practice Guidelines for Endoscopic Sedation

  • Hong Jun Park;Byung-Wook Kim;Jun Kyu Lee;Yehyun Park;Jin Myung Park;Jun Yong Bae;Seung Young Seo;Jae Min Lee;Jee Hyun Lee;Hyung Ku Chon;Jun-Won Chung;Hyun Ho Choi;Myung Ha Kim;Dong Ah Park;Jae Hung Jung;Joo Young Cho;Endoscopic Sedation Committee of Korean Society of Gastrointestinal Endoscopy
    • Clinical Endoscopy
    • /
    • v.55 no.2
    • /
    • pp.167-182
    • /
    • 2022
  • Sedation can resolve anxiety and fear in patients undergoing endoscopy. The use of sedatives has increased in Korea. Appropriate sedation is a state in which the patient feels subjectively comfortable while maintaining the airway reflex for stable spontaneous breathing. The patient should maintain a state of consciousness to the extent that he or she can cooperate with the needs of the medical staff. Despite its benefits, endoscopic sedation has been associated with cardiopulmonary complications. Cardiopulmonary complications are usually temporary. Most patients recover without sequelae. However, they may progress to serious complications, such as cardiovascular collapse. Therefore, it is essential to screen high-risk patients before sedation and reduce complications by meticulous monitoring. Additionally, physicians should be familiar with the management of emergencies. The first Korean clinical practice guideline for endoscopic sedation was developed based on previous worldwide guidelines for endoscopic sedation using an adaptation process. The guideline consists of nine recommendations based on a critical review of currently available data and expert consensus when the guideline was drafted. These guidelines should provide clinicians, nurses, medical school students, and policy makers with information on how to perform endoscopic sedation with minimal risk.

A Recent Insight into the Diagnosis and Screening of Patients with Fabry Disease (파브리병 환자의 진단과 선별검사의 최신지견)

  • Hye-Ran Yoon;Jihun Jo
    • Journal of The Korean Society of Inherited Metabolic disease
    • /
    • v.24 no.1
    • /
    • pp.17-25
    • /
    • 2024
  • Fabry disease (FD) is an X-linked lysosomal storage disorder. It is caused by mutations in the α-galactosidase A gene, which results in deficient or absent activity of α-galactosidase A (α-Gal A). This leads to a progressive accumulation of globotriaosylceramide (Gb3) in various tissues. Manifestations of Fabry disease include serious and progressive impairment of renal and cardiac function. In addition, patients experience pain, gastrointestinal disturbance, transient ischaemic attacks, and strokes. Additional effects on the skin, eyes, ears, lungs, and bones are often seen. Reduced life expectancy and deadly consequences are being caused by cardiac involvement. Chaperone therapy or enzyme replacement therapy (ERT) are two disease-specific treatments for FD. Thus, early detection of FD is critical for decreasing morbidity and mortality. Globotriaosysphingosine (lyso-Gb3) for identifying atypical FD variants and highly sensitive troponin T (hsTNT) for detecting cardiac involvement are both significant diagnostic indicators. This review aimed to offer a basic resource for the early diagnosis and update on the diagnosis of having FD. We will also provide a general diagnostic algorithm and information on ERT and its accompanying treatments.

  • PDF

The Effects of Metaphors in the Interface of Smartphone Applications on Users' Intention to Use (사용자환경의 메타포가 스마트폰 애플리케이션 사용의도에 미치는 영향)

  • Jung, Wonjin;Hong, Suk-Ki
    • Asia pacific journal of information systems
    • /
    • v.24 no.3
    • /
    • pp.255-279
    • /
    • 2014
  • It is not too much to say that smartphones have become an essential part of our lives due to their versatility. Nevertheless, they still have less overall capabilities than their desktop counterparts. Specifically, they have small screens and low resolutions, which make their applications difficult to have a usable interface. To account for these limitations, the interface of smartphone applications should be designed carefully and properly. Good interface design to any application is critical. However, a comprehensive information systems (IS) literature review found that there has been little research on the user interface design of smartphone applications. More specifically, there has been little empirical evidence and understanding about how metaphors, an imaginative way of describing objects and concepts, in the user interface of smartphone applications affect users' intention to use the applications. Thereby, the research goals of this study are to examine 1) the effects of the metaphors in the user interface of smartphone applications on the interaction between users and applications and 2) the effects of mediating variables including the interaction between users and applications, users' beliefs and attitudes, on users' intention to use the applications. A survey was conducted to collect data. University students and practitioners participated in the survey. A 24-item questionnaire was developed on a 5-point Likert-type scale. The measurement items were mostly adapted from the previous studies in the IS literature and modified to fit the context of this study. First, a principal component factor analysis was performed to explore the inter-relationships among a set of variables. The analysis showed that most of the items loaded quite strongly on the six components. The analysis also revealed the six components with eigenvalues exceeding 1, explaining a total of 70.7 per cent of the variance. The reliabilities of the items were also checked. Most Cronbach alpha values were above 0.8, so the scales were considered reliable. In sum, the results of the analysis support the decision to retain the six factors for further investigation. Next, the structural model was analyzed with AMOS structural equation modeling. The values of GFI, AGFI, NFI, TLI, CFI, and RMSEA were checked. The values showed that the research model considerably have a good fit in general. Next, the convergent and discriminant validities of all constructs were examined. The values for the standardized regression weights and critical ration (CR) indicated sufficient convergent validity for all constructs. In addition, the square root of the average variance extracted (AVE) of each construct was compared with its correlations with all other constructs. The results supported discriminant validity for all constructs. In sum, the results of analysis demonstrated adequate convergent and discriminant validities for all constructs. Finally, path coefficients between the variables were examined. Methphor was found to have an impact on interaction (${\beta}$ = .457, p = .000). There were also significant effects of the interaction on perceived usefulness (${\beta}$ = .273, p = .000) and ease of use (${\beta}$ = .405, p = .000). User attitude was significantly influenced by these two beliefs, perceived usefulness (${\beta}$ = .386, p = .000) and ease of use (${\beta}$ = .347, p = .000) respectively. Further, the results of analysis found that users' intention to use smartphone applications was significantly influenced by user attitude (${\beta}$ = .567, p = .000). Based upon the analyses, all hypotheses were supported. This study found that the metaphors used in the interface of smartphone applications affect not only the interaction between users and applications, but also users' intention to use the applications through the mediating variables, perceived usefulness and ease of use. These findings imply that if the metaphors used in the user interface of application are easy enough to understand for smartphone users, then the application can be perceived useful and easy to use, which in turn make users to have an intention to use the application. In conclusion, this study contributed not only to validate and extend Technology Acceptance Model (TAM) partially, but also to develop the construct of metaphor in smartphone settings. However, since a single empirical study cannot be enough to validate the findings, some limitations should be considered.

Interpretation of the Umbrella Clause in Investment Treaties (국제투자조약상 포괄적 보호조항(Umbrella Clauses)의 해석에 관한 연구)

  • Jo, Hee-Moon
    • Journal of Arbitration Studies
    • /
    • v.19 no.2
    • /
    • pp.95-126
    • /
    • 2009
  • One of the controversial issues in investor-state investment arbitration is the interpretation of "umbrella clause" that is found in most BIT and FTAs. This treaty clause requires on Contracting State of treaty to observe all investment obligations entered into with foreign investors from the other Contracting State. This clause did not receive in-depth attention until SGS v. Pakistan and SGS v. Philippines cases produced starkly different conclusions on the relations about treaty-based jurisdiction and contract-based jurisdiction. More recent decisions by other arbitral tribunals continue to show different approaches in their interpretation of umbrella clauses. Following the SGS v. Philippines decision, some recent decisions understand that all contracts are covered by umbrella clause, for example, in Siemens A.G. v. Argentina, LG&E Energy Corp. v. Argentina, Sempra Energy Int'l v. Argentina and Enron Corp. V. Argentina. However, other recent decisions have found a different approach that only certain kinds of public contracts are covered by umbrella clauses, for example, in El Paso Energy Int'l Co. v. Argentina, Pan American Energy LLC v. Argentina and CMS Gas Transmission Co. v. Argentina. With relation to the exhaustion of domestic remedies, most of tribunals have the position that the contractual remedy should not affect the jurisdiction of BIT tribunal. Even some tribunals considered that there is no need to exhaust contract remedies before bringing BIT arbitration, provoking suspicion of the validity of sanctity of contract in front of treaty obligation. The decision of the Annulment Committee In CMS case in 2007 was an extraordinarily surprising one and poured oil on the debate. The Committee composed of the three respected international lawyers, Gilbert Guillaume and Nabil Elaraby, both from the ICJ, and professor James Crawford, the Rapportuer of the International Law Commission on the Draft Articles on the Responsibility of States for Internationally Wrongful Acts, observed that the arbitral tribunal made critical errors of law, however, noting that it has limited power to review and overturn the award. The position of the Committee was a direct attack on ICSID system showing as an internal recognition of ICSID itself that the current system of investor-state arbitration is problematic. States are coming to limit the scope of umbrella clauses. For example, the 2004 U.S. Model BIT detailed definition of the type of contracts for which breach of contract claims may be submitted to arbitration, to increase certainty and predictability. Latin American countries, in particular, Argentina, are feeling collectively victims of these pro-investor interpretations of the ICSID tribunals. In fact, BIT between developed and developing countries are negotiated to protect foreign investment from developing countries. This general characteristic of BIT reflects naturally on the provisions making them extremely protective for foreign investors. Naturally, developing countries seek to interpret restrictively BIT provisions, whereas developed countries try to interpret more expansively. As most of cases arising out of alleged violation of BIT are administered in the ICSID, a forum under the auspices of the World Bank, these Latin American countries have been raising the legitimacy deficit of the ICSID. The Argentine cases have been provoking many legal issues of international law, predicting crisis almost coming in actual investor-state arbitration system. Some Latin American countries, such as Bolivia, Venezuela, Ecuador, Argentina, already showed their dissatisfaction with the ICSID system considering withdrawing from it to minimize the eventual investor-state dispute. Thus the disagreement over umbrella clauses in their interpretation is becoming interpreted as an historical reflection on the continued tension between developing and developed countries on foreign investment. There is an academic and political discussion on the possible return of the Calvo Doctrine in Latin America. The paper will comment on these problems related to the interpretation of umbrella clause. The paper analyses ICSID cases involving principally Latin American countries to identify the critical legal issues arising between developing and developed countries. And the paper discusses alternatives in improving actual investor-State investment arbitration; inter alia, the introduction of an appellate system and treaty interpretation rules.

  • PDF

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

Research on Science, Technology & Society in Korea: A Critical Review (과학기술과 사회 연구의 현황과 과제)

  • Bak, Hee-Je
    • Journal of Technology Innovation
    • /
    • v.25 no.3
    • /
    • pp.155-195
    • /
    • 2017
  • The goal of the present study is reviewing the literature on the scientific community and also on science, technology & society to increase interactions between innovation studies and social studies of science and technology. Up until now, various empirical studies on Korean scientists and engineers have been concentrated on researchers at universities, while they have paid inadequate attention to researchers at state-funded research institutes and private companies. In addition, these studies have tended to use concepts in Western academia to elucidate Korean cases. On the other hand, recent empirical researches on the effects of the evaluation systems in universities, PBS system, and the network of school ties suggest that these topics may reveal the unique characteristics of Korean scientific community. Empirical studies on the scientific community have also shown that Korean research institutes and researchers who are in charge of innovation in Korea have demonstrated a tendency to conform to the government's guidance due to long experiences of state-led R&D and nationalism. Research on science, technology and society has viewed the participation of citizens in science and technology as a way toward science and technology democracy, and tended to have a strong practical orientation. However, there has been a relatively small amount of research on how citizen participation influences the direction and content of technological innovation. Also, although, from the viewpoint of technological innovation, how participation of citizens in science and technology can contribute to knowledge production and innovation is a critical issue, relatively small numbers of case studies on this subject have been conducted. Therefore, as the scholars who have emphasized the democracy of science and technology have actually experimented with various ways of citizen participation, innovation researchers may have to design and implement citizen participation through which citizens' local knowledge can contribute to technological innovation.