• Title/Summary/Keyword: enabling technology

Search Result 859, Processing Time 0.031 seconds

Statistical Optimization of Solid Growth-medium for Rapid and Large Screening of Polysaccharides High-yielding Mycelial Cells of Inonotus obliquus (단백다당체 고생산성의 Inonotus obliquus 균주의 신속 개량을 위한 고체 성장배지의 통계적 최적화)

  • Hong, Hyung-Pyo;Jeong, Yong-Seob;Chun, Gie-Taek
    • KSBB Journal
    • /
    • v.25 no.2
    • /
    • pp.142-154
    • /
    • 2010
  • The protein-bound innerpolysaccharides (IPS) produced by suspended mycelial cultures of Inonotus obliquus have promising potentials as an effective antidiabetic as well as an immunostimulating agents. To enhance IPS production, intensive strain improvement process should be carried out using large amount of UV-mutated protoplasts. During the whole strain-screening process, the stage of solid growth-culture was found to be the most time-requiring step, thus preventing rapid screening of high-yielding producers. In order to reduce the cell growth period in the solid growth-stage, therefore, solid growth-medium was optimized using the statistical methods such as (i) Plackett-Burman and fractional factorial designs (FFD) for selecting positive medium components, and (ii) steepest ascent (SAM) and response surface (RSM) methods for determining optimum concentrations of the selected components. By adopting the medium composition recommended by the SAM experiment, significantly higher growth rate was obtained in the solid growth-cultures, as represented by about 41% larger diameter of the cell growth circle and higher mycelial density. Sequential optimization process performed using the RSM experiments finally recommended the medium composition as follows: glucose 25.61g/L, brown rice 12.53 g/L, soytone peptone 12.53 g/L, $MgSO_4$ 5.53 g/L, and agar 20 g/L. It should be noted that this composition was almost similar to the medium combinations determined by the SAM experiment, demonstrating that the SAM was very helpful in finding out the final optimum concentrations. Through the use of this optimized medium, the period for the solid growth-culture could be successfully reduced to about 8 days from the previous 15~20 days, thus enabling large and mass screening of high producers in a relatively short period.

A study on the developing and implementation of the Cyber University (가상대학 구현에 관한 연구)

  • Choi, Sung;Yoo, Gab-Sang
    • Proceedings of the Technology Innovation Conference
    • /
    • 1998.06a
    • /
    • pp.116-127
    • /
    • 1998
  • The Necessity of Cyber University. Within the rapidly changing environment of global economics, the environment of higher education in the universities, also, has been, encountering various changes. Popularization on higher education related to 1lifetime education system, putting emphasis on the productivity of education services and the acquisition of competitiveness through the market of open education, the breakdown of the ivory tower and the Multiversitization of universities, importance of obtaining information in the universities, and cooperation between domestic and oversea universities, industry and educational system must be acquired. Therefore, in order to adequately cope wi th these kinds of rapid changes in the education environment, operating Cyber University by utilizing various information technologies and its fixations such as Internet, E-mail, CD-ROMs, Interact ive Video Networks (Video Conferencing, Video on Demand), TV, Cable etc., which has no time or location limitation, is needed. Using informal ion and telecommunication technologies, especially the Internet is expected to Or ing about many changes in the social, economics and educational area. Among the many changes scholars have predicted, the development and fixations of Distant Learning or Cyber University was the most dominant factor. In the case of U. S. A., Cyber University has already been established and in under operation by the Federate Governments of 13 states. Any other universities (around 500 universities has been opened until1 now), with the help of the government and private citizens have been able to partly operate the Cyber University and is planning on enlarging step-by-step in the future. It could be seen not only as U. S. A. trying to elevate its higher education through their leading information technologies, but also could be seen as their objective in putting efforts on subordinating the culture of the education worldwide. UTRA University in U. S. A., for example, is already exporting its class lectures to China, and Indonesia regions. Influenced by the Cyber University current in the U.S., the Universities in Korea is willing .to arrange various forms of Cyber Universities. In line with this, at JUNAM National University, internet based Cyber University, which has set about its work on July of 1997, is in the state of operating about 100 Cyber Universities. Also, in the case of Hanam University, the Distant Learning classes are at its final stage of being established; this is a link in the rapid speed project of setting an example by the Korean Government. In addition, the department of education has selected 5 universities, including Seoul Cyber Design University for experimentation and is in the stage of strategic operation. Over 100 universities in Korea are speeding up its preparation for operating Cyber University. This form of Distant Learning goes beyond the walls of universities and is in the trend of being diffused in business areas or in various training programs of financial organizations and more. Here, in the hope that this material would some what be of help to other Universities which are preparing for Cyber University, I would 1ike to introduce some general concepts of the components forming Cyber University and Open Education System which has been established by JUNAM University. System of Cyber University could be seen as a general solution offered by tile computer technologies for the management on the students, Lectures On Demand, real hour based and satellite classes, media product ion lab for the production of the multimedia Contents, electronic library, the Groupware enabling exchange of information between students and professors. Arranging general concepts of components in the aspect of Cyber University and Open Education, it would be expressed in the form of the establishment of Cyber University and the service of Open Education as can be seen in the diagram below.

  • PDF

A Study on the Design and Development of Interactive Non-Face-to-Face Real-Time Classes using EduTech : A Case Study of Christian Education Class (에듀테크를 활용한 상호작용적 비대면 실시간 수업 설계 및 개발 연구 : 기독교교육과 수업 사례를 중심으로)

  • Nam, Sunwoo
    • Journal of Christian Education in Korea
    • /
    • v.66
    • /
    • pp.343-382
    • /
    • 2021
  • This study is a case study in which the interactive non-face-to-face classes using Edutech were applied to the Department of Christian Education. The subjects were 20 students from the Christian education department of A University located in the metropolitan area. The course was 'Instructional Methods and Educational Technology' in the first semester of 2020. In theory, I studied non-face-to-face classes and interaction, and edutech and interaction. Afterward, it designed and developed interactive non-face-to-face classes using edutech. The interactive non-face-to-face classes using edutech were developed as a process of applying Flipped-PBL based interactive edutech. In addition, Edutech was selected for active interaction according to the Flipped-PBL process to be carried out in a non-face-to-face situation. In particular, in the process of developing the problem of PBL, it was built around the situation of the church. As a result of applying the class, first, learners showed high satisfaction and interest in the class. Second, positive transference appeared in the space of learning and the space of living. Third, interactive non-face-to-face classes using Edutech have generated active interaction. In particular, interactive edutech and learning methods have become the main factors enabling active interaction. Through this, learners have improved learning efficiency, immersion, and satisfaction. Also, as an alternative to face-to-face classes, I was able to experience online classes. In other words, the satisfaction and interest of learning, and the transference of learning space, were also possible through active interactions generated through learning methods using interactive Edutech used in class. Furthermore, disabilities in the online communication(Internet) environment and learners' unfamiliarity with the online environment have been found as factors that hinder learning satisfaction and interaction. During learning, obstacles to the online communication environment hinder the utilization of interactive Edutech, preventing active interactions from occurring. This results in diminishing satisfaction and interest in learning. Therefore, we find that designing interactive non-face-to-face classes using Edutech requires sufficient learner learning and checking of the online communication(Internet) environment in advance for Edutech and learning methods. In response, this study confirmed the possibility by applying interactive non-face-to-face classes using Edutech to Christian education classes as an alternative method of education that allows active interaction and consistent transference of learning and life. Although it is a case study with limited duration and limitations of the number of people, I would like to present the possibility as an alternative Christian education method of an era where the direction of online classes should be presented as an alternative to a face-to-face class.

INTENSIVE MONITORING SURVEY OF NEARBY GALAXIES (IMSNG)

  • Im, Myungshin;Choi, Changsu;Hwang, Sungyong;Lim, Gu;Kim, Joonho;Kim, Sophia;Paek, Gregory S.H.;Lee, Sang-Yun;Yoon, Sung-Chul;Jung, Hyunjin;Sung, Hyun-Il;Jeon, Yeong-beom;Ehgamberdiev, Shuhrat;Burhonov, Otabek;Milzaqulov, Davron;Parmonov, Omon;Lee, Sang Gak;Kang, Wonseok;Kim, Taewoo;Kwon, Sun-gill;Pak, Soojong;Ji, Tae-Geun;Lee, Hye-In;Park, Woojin;Ahn, Hojae;Byeon, Seoyeon;Han, Jimin;Gibson, Coyne;Wheeler, J. Craig;Kuehne, John;Johns-Krull, Chris;Marshall, Jennifer;Hyun, Minhee;Lee, Seong-Kook J.;Kim, Yongjung;Yoon, Yongmin;Paek, Insu;Shin, Suhyun;Taak, Yoon Chan;Kang, Juhyung;Choi, Seoyeon;Jeong, Mankeun;Jung, Moo-Keon;Kim, Hwara;Kim, Jisu;Lee, Dayae;Park, Bomi;Park, Keunwoo;O, Seong A
    • Journal of The Korean Astronomical Society
    • /
    • v.52 no.1
    • /
    • pp.11-21
    • /
    • 2019
  • Intensive Monitoring Survey of Nearby Galaxies (IMSNG) is a high cadence observation program monitoring nearby galaxies with high probabilities of hosting supernovae (SNe). IMSNG aims to constrain the SN explosion mechanism by inferring sizes of SN progenitor systems through the detection of the shock-heated emission that lasts less than a few days after the SN explosion. To catch the signal, IMSNG utilizes a network of 0.5-m to 1-m class telescopes around the world and monitors the images of 60 nearby galaxies at distances D < 50 Mpc to a cadence as short as a few hours. The target galaxies are bright in near-ultraviolet (NUV) with $M_{NUV}$ < -18.4 AB mag and have high probabilities of hosting SNe ($0.06SN\;yr^{-1}$ per galaxy). With this strategy, we expect to detect the early light curves of 3.4 SNe per year to a depth of R ~ 19.5 mag, enabling us to detect the shock-heated emission from a progenitor star with a radius as small as $0.1R_{\odot}$. The accumulated data will be also useful for studying faint features around the target galaxies and other science projects. So far, 18 SNe have occurred in our target fields (16 in IMSNG galaxies) over 5 years, confirming our SN rate estimate of $0.06SN\;yr^{-1}$ per galaxy.

A Proposal for Korean armed forces preparing toward Future war: Examine the U.S. 'Mosaic Warfare' Concept (미래전을 대비한 한국군 발전방향 제언: 미국의 모자이크전 수행개념 고찰을 통하여)

  • Chang, Jin O;Jung, Jae-young
    • Maritime Security
    • /
    • v.1 no.1
    • /
    • pp.215-240
    • /
    • 2020
  • In 2017, the U.S. DARPA coined 'mosaic warfare' as a new way of warfighting. According to the Timothy Grayson, director of DARPA's Strategic Technologies Office, mosaic warfare is a "system of system" approach to warfghting designed around compatible "tiles" of capabilities, rather than uniquely shaped "puzzle pieces" that must be fitted into a specific slot in a battle plan in order for it to work. Prior to cover mosaic warfare theory and recent development, it deals analyze its background and several premises for better understanding. The U.S. DoD officials might acknowledge the current its forces vulnerability to the China's A2/AD assets. Furthermore, the U.S. seeks to complete military superiority even in other nation's territorial domains including sea and air. Given its rapid combat restoration capability and less manpower casualty, the U.S. would be able to ready to endure war of attrition that requires massive resources. The core concept of mosaic warfare is a "decision centric warfare". To embody this idea, it create adaptability for U.S. forces and complexity or uncertainty for the enemy through the rapid composition and recomposition of a more disag g reg ated U.S. military force using human command and machine control. This allows providing more options to friendly forces and collapse adversary's OODA loop eventually. Adaptable kill web, composable force packages, A.I., and context-centric C3 architecture are crucial elements to implement and carry out mosaic warfare. Recently, CSBA showed an compelling assessment of mosaic warfare simulation. In this wargame, there was a significant differences between traditional and mosaic teams. Mosaic team was able to mount more simultaneous actions, creating additional complexity to adversaries and overwhelming their decision-making with less friendly force's human casualty. It increase the speed of the U.S. force's decision-making, enabling commanders to better employ tempo. Consequently, this article finds out and suggests implications for Korea armed forces. First of all, it needs to examine and develop 'mosaic warfare' in terms of our security circumstance. In response to future warfare, reviewing overall force structure and architecture is required which is able to compose force element regardless domain. In regards to insufficient defense resources and budget, "choice" and "concentration" are also essential. It needs to have eyes on the neighboring countries' development of future war concept carefully.

  • PDF

Feasibility Assessment on the Application of X-ray Computed Tomography on the Characterization of Bentonite under Hydration (벤토나이트 수화반응 특성화를 위한 X선 단층촬영 기술 적용성 평가)

  • Melvin B., Diaz;Gyung Won, Lee;Seohyeon, Yun;Kwang Yeom, Kim;Chang-soo, Lee;Minseop, Kim;Jin-Seop, Kim
    • Tunnel and Underground Space
    • /
    • v.32 no.6
    • /
    • pp.491-501
    • /
    • 2022
  • Bentonite has been proposed as a buffer and backfill material for high-level radioactive waste repository. Under such repository environment conditions, bentonite is subjected to combined thermal, hydrological, mechanical, and chemical processes. This study evaluates the feasibility of applying X-ray CT technology on the characterization of bentonite under hydration conditions using a newly developed testing cell. The cylindrical cell is made of platic material, with a removable cap to place the sample, enabling to apply vertical pressure on the sample and to measure swelling pressure. The hydration test was carried out with a sample made of Gyeonju bentonite, with a dry density of 1.4 g/cm3, and a water content of 20%. The sample had a diameter of 27.5 mm and a height of 34 mm. During the test, water was injected at a constant pressure of 0.207 MPa, and lasted for 7 days. After one day of hydration, bentonite swelled and filled out the space inside the cell. Moreover, CT histograms showed how the hydration process induced an initial increase and later progressive decrease on the density of the sample. Detailed profiles of the mean CT value, CT standard deviation, and CT gradient provided more details on the hydration process of the sample and showed how the bottom and top regions exhibited a decrease on density while the middle region showed an increase, especially during the first two days of hydration. Later, the differences in CT values with respect to the initial state decreased, and were small at the end of testing. The formation and later reduction of cracks was also characterized through CT scanning.

Methods for Integration of Documents using Hierarchical Structure based on the Formal Concept Analysis (FCA 기반 계층적 구조를 이용한 문서 통합 기법)

  • Kim, Tae-Hwan;Jeon, Ho-Cheol;Choi, Joong-Min
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.3
    • /
    • pp.63-77
    • /
    • 2011
  • The World Wide Web is a very large distributed digital information space. From its origins in 1991, the web has grown to encompass diverse information resources as personal home pasges, online digital libraries and virtual museums. Some estimates suggest that the web currently includes over 500 billion pages in the deep web. The ability to search and retrieve information from the web efficiently and effectively is an enabling technology for realizing its full potential. With powerful workstations and parallel processing technology, efficiency is not a bottleneck. In fact, some existing search tools sift through gigabyte.syze precompiled web indexes in a fraction of a second. But retrieval effectiveness is a different matter. Current search tools retrieve too many documents, of which only a small fraction are relevant to the user query. Furthermore, the most relevant documents do not nessarily appear at the top of the query output order. Also, current search tools can not retrieve the documents related with retrieved document from gigantic amount of documents. The most important problem for lots of current searching systems is to increase the quality of search. It means to provide related documents or decrease the number of unrelated documents as low as possible in the results of search. For this problem, CiteSeer proposed the ACI (Autonomous Citation Indexing) of the articles on the World Wide Web. A "citation index" indexes the links between articles that researchers make when they cite other articles. Citation indexes are very useful for a number of purposes, including literature search and analysis of the academic literature. For details of this work, references contained in academic articles are used to give credit to previous work in the literature and provide a link between the "citing" and "cited" articles. A citation index indexes the citations that an article makes, linking the articleswith the cited works. Citation indexes were originally designed mainly for information retrieval. The citation links allow navigating the literature in unique ways. Papers can be located independent of language, and words in thetitle, keywords or document. A citation index allows navigation backward in time (the list of cited articles) and forwardin time (which subsequent articles cite the current article?) But CiteSeer can not indexes the links between articles that researchers doesn't make. Because it indexes the links between articles that only researchers make when they cite other articles. Also, CiteSeer is not easy to scalability. Because CiteSeer can not indexes the links between articles that researchers doesn't make. All these problems make us orient for designing more effective search system. This paper shows a method that extracts subject and predicate per each sentence in documents. A document will be changed into the tabular form that extracted predicate checked value of possible subject and object. We make a hierarchical graph of a document using the table and then integrate graphs of documents. The graph of entire documents calculates the area of document as compared with integrated documents. We mark relation among the documents as compared with the area of documents. Also it proposes a method for structural integration of documents that retrieves documents from the graph. It makes that the user can find information easier. We compared the performance of the proposed approaches with lucene search engine using the formulas for ranking. As a result, the F.measure is about 60% and it is better as about 15%.

Design of Client-Server Model For Effective Processing and Utilization of Bigdata (빅데이터의 효과적인 처리 및 활용을 위한 클라이언트-서버 모델 설계)

  • Park, Dae Seo;Kim, Hwa Jong
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.4
    • /
    • pp.109-122
    • /
    • 2016
  • Recently, big data analysis has developed into a field of interest to individuals and non-experts as well as companies and professionals. Accordingly, it is utilized for marketing and social problem solving by analyzing the data currently opened or collected directly. In Korea, various companies and individuals are challenging big data analysis, but it is difficult from the initial stage of analysis due to limitation of big data disclosure and collection difficulties. Nowadays, the system improvement for big data activation and big data disclosure services are variously carried out in Korea and abroad, and services for opening public data such as domestic government 3.0 (data.go.kr) are mainly implemented. In addition to the efforts made by the government, services that share data held by corporations or individuals are running, but it is difficult to find useful data because of the lack of shared data. In addition, big data traffic problems can occur because it is necessary to download and examine the entire data in order to grasp the attributes and simple information about the shared data. Therefore, We need for a new system for big data processing and utilization. First, big data pre-analysis technology is needed as a way to solve big data sharing problem. Pre-analysis is a concept proposed in this paper in order to solve the problem of sharing big data, and it means to provide users with the results generated by pre-analyzing the data in advance. Through preliminary analysis, it is possible to improve the usability of big data by providing information that can grasp the properties and characteristics of big data when the data user searches for big data. In addition, by sharing the summary data or sample data generated through the pre-analysis, it is possible to solve the security problem that may occur when the original data is disclosed, thereby enabling the big data sharing between the data provider and the data user. Second, it is necessary to quickly generate appropriate preprocessing results according to the level of disclosure or network status of raw data and to provide the results to users through big data distribution processing using spark. Third, in order to solve the problem of big traffic, the system monitors the traffic of the network in real time. When preprocessing the data requested by the user, preprocessing to a size available in the current network and transmitting it to the user is required so that no big traffic occurs. In this paper, we present various data sizes according to the level of disclosure through pre - analysis. This method is expected to show a low traffic volume when compared with the conventional method of sharing only raw data in a large number of systems. In this paper, we describe how to solve problems that occur when big data is released and used, and to help facilitate sharing and analysis. The client-server model uses SPARK for fast analysis and processing of user requests. Server Agent and a Client Agent, each of which is deployed on the Server and Client side. The Server Agent is a necessary agent for the data provider and performs preliminary analysis of big data to generate Data Descriptor with information of Sample Data, Summary Data, and Raw Data. In addition, it performs fast and efficient big data preprocessing through big data distribution processing and continuously monitors network traffic. The Client Agent is an agent placed on the data user side. It can search the big data through the Data Descriptor which is the result of the pre-analysis and can quickly search the data. The desired data can be requested from the server to download the big data according to the level of disclosure. It separates the Server Agent and the client agent when the data provider publishes the data for data to be used by the user. In particular, we focus on the Big Data Sharing, Distributed Big Data Processing, Big Traffic problem, and construct the detailed module of the client - server model and present the design method of each module. The system designed on the basis of the proposed model, the user who acquires the data analyzes the data in the desired direction or preprocesses the new data. By analyzing the newly processed data through the server agent, the data user changes its role as the data provider. The data provider can also obtain useful statistical information from the Data Descriptor of the data it discloses and become a data user to perform new analysis using the sample data. In this way, raw data is processed and processed big data is utilized by the user, thereby forming a natural shared environment. The role of data provider and data user is not distinguished, and provides an ideal shared service that enables everyone to be a provider and a user. The client-server model solves the problem of sharing big data and provides a free sharing environment to securely big data disclosure and provides an ideal shared service to easily find big data.

Shopping Value, Shopping Goal and WOM - Focused on Electronic-goods Buyers (쇼핑 가치 추구 성향에 따른 쇼핑 목표와 공유 의도 차이에 관한 연구 - 전자제품 구매고객을 중심으로)

  • Park, Kyoung-Won;Park, Ju-Young
    • Journal of Global Scholars of Marketing Science
    • /
    • v.19 no.2
    • /
    • pp.68-79
    • /
    • 2009
  • The interplay between hedonic and utilitarian attributes has assumed special significance in recent years; it has been proposed that consumption offerings should be viewed as experiences that stimulate both cognitions and feelings rather than as mere products or services. This research builds on previous work on hedonic versus utilitarian benefits, regulatory focus theory, customer satisfaction to address two question: (1) Is the shopping goal at the point of purchase different from the shopping value? and (2) Is the customer loyalty after the use different from the shopping value and shopping goal? We surveyed 345 peoples those who have bought the electronic-goods within 6 months. This research dealt with the shopping value which is consisted of 2 types, hedonic and utilitarian. Those who pursue the hedonic shopping value may prefer the pleasure of purchasing experience to the product itself. They tend to prefer atmosphere, arousal of the shopping experience. Consistent with previous research, we use the term "hedonic" to refer to their aesthetic, experiential and enjoyment-related value. On the contrary, Those who pursue the utilitarian shopping value may prefer the reasonable buying. It may be more functional. Consistent with previous research, we use the term "utilitarian" to refer to the functional, instrumental, and practical value of consumption offerings. Holbrook(1999) notes that consumer value is an experience that results from the consumption of such benefits. In the context of cell phones for example, the phone's battery life and sound volume are utilitarian benefits, whereas aesthetic appeal from its shape and color are hedonic benefits. Likewise, in the case of a car, fuel economics and safety are utilitarian benefits whereas the sunroof and the luxurious interior are hedonic benefits. The shopping goals are consisted of the promotion focus goal and the prevention focus goal, based on the self-regulatory focus theory. The promotion focus is characterized into focusing ideal self because they are oriented to wishes and vision. The promotion focused individuals are tend to be more risk taking. They are more sensitive to hope and achievement. On the contrary, the prevention focused individuals are characterized into focusing the responsibilities because they are oriented to safety. The prevention focused individuals are tend to be more risk avoiding. We wanted to test the relation among the shopping value, shopping goal and customer loyalty. Customers show the positive or negative feelings comparing with the expectation level which customers have at the point of the purchase. If the result were bigger than the expectation, customers may feel positive feeling such as delight or satisfaction and they would want to share their feelings with other people. And they want to buy those products again in the future time. There is converging evidence that the types of goals consumers expect to be fulfilled by the utilitarian dimension of a product are different from those they seek from the hedonic dimension (Chernev 2004). Specifically, whereas consumers expect the fulfillment of product prevention goals on the utilitarian dimension, they expect the fulfillment of promotion goals on the hedonic dimension (Chernev 2004; Chitturi, Raghunathan, and Majahan 2007; Higgins 1997, 2001) According to the regulatory focus theory, prevention goals are those that ought to be met. Fulfillment of prevention goals in the context of product consumption eliminates or significantly reduces the probability of a painful experience, thus making consumers experience emotions that result from fulfillment of prevention goals such as confidence and securities. On the contrary, fulfillment of promotion goals are those that a person aspires to meet, such as "looking cool" or "being sophisticated." Fulfillment of promotion goals in the context of product consumption significantly increases the probability of a pleasurable experience, thus enabling consumers to experience emotions that result from the fulfillment of promotion goals. The proposed conceptual framework captures that the relationships among hedonic versus utilitarian shopping values and promotion versus prevention shopping goals respectively. An analysis of the consequence of the fulfillment and frustration of utilitarian and hedonic value is theoretically worthwhile. It is also substantively relevant because it helps predict post-consumption behavior such as the promotion versus prevention shopping goals orientation. Because our primary goal is to understand how the post consumption feelings influence the variable customer loyalty: word of mouth (Jacoby and Chestnut 1978). This research result is that the utilitarian shopping value gives the positive influence to both of the promotion and prevention goal. However the influence to the prevention goal is stronger. On the contrary, hedonic shopping value gives influence to the promotion focus goal only. Additionally, both of the promotion and prevention goal show the positive relation with customer loyalty. However, the positive relation with promotion goal and customer loyalty is much stronger. The promotion focus goal gives the influence to the customer loyalty. On the contrary, the prevention focus goal relates at the low level of relation with customer loyalty than that of the promotion goal. It could be explained that it is apt to get framed the compliment of people into 'gain-non gain' situation. As the result, for those who have the promotion focus are motivated to deliver their own feeling to other people eagerly. Conversely the prevention focused individual are more sensitive to the 'loss-non loss' situation. The research result is consistent with pre-existent researches. There is a conceptual parallel between necessities-needs-utilitarian benefits and luxuries-wants-hedonic benefits (Chernev 2004; Chitturi, Raghunathan and Majaha 2007; Higginns 1997; Kivetz and Simonson 2002b). In addition, Maslow's hierarchy of needs and the precedence principle contends luxuries-wants-hedonic benefits higher than necessities-needs-utilitarian benefits. Chitturi, Raghunathan and Majaha (2007) show that consumers are focused more on the utilitarian benefits than on the hedonic benefits of a product until their minimum expectation of fulfilling prevention goals are met. Furthermore, a utilitarian benefit is a promise of a certain level of functionality by the manufacturer or the retailer. When the promise is not fulfilled, customers blame the retailer and/or the manufacturer. When negative feelings are attributable to an entity, customers feel angry. However in the case of hedonic benefit, the customer, not the manufacturer, determines at the time of purchase whether the product is stylish and attractive. Under such circumstances, customers are more likely to blame themselves than the manufacturer if their friends do not find the product stylish and attractive. Therefore, not meeting minimum utilitarian expectations of functionality generates a much more intense negative feelings, such as anger than a less intense feeling such as disappointment or dissatisfactions. The additional multi group analysis of this research shows the same result. Those who are unsatisfactory customers who have the prevention focused goal shows higher relation with WOM, comparing with satisfactory customers. The research findings in this article could have significant implication for the personal selling fields to increase the effectiveness and the efficiency of the sales such that they can develop the sales presentation strategy for the customers. For those who are the hedonic customers may be apt to show more interest to the promotion goal. Therefore it may work to strengthen the design, style or new technology of the products to the hedonic customers. On the contrary for the utilitarian customers, it may work to strengthen the price competitiveness. On the basis of the result from our studies, we demonstrated a correspondence among hedonic versus utilitarian and promotion versus prevention goal, WOM. Similarly, we also found evidence of the moderator effects of satisfaction after use, between the prevention goal and WOM. Even though the prevention goal has the low level of relation to WOM, those who are not satisfied show higher relation to WOM. The relation between the prevention goal and WOM is significantly different according to the satisfaction versus unsatisfaction. In addition, improving the promotion emotions of cheerfulness and excitement and the prevention emotion of confidence and security will further improve customer loyalty. A related potential further research could be to examine whether hedonic versus utilitarian, promotion versus prevention goals improve customer loyalty for services as well. Under the budget and time constraints, designers and managers are often compelling to choose among various attributes. If there is no budget or time constraints, perhaps the best solution is to maximize both hedonic and utilitarian dimension of benefits. However, they have to make trad-off process between various attributes. For the designers and managers have to keep in mind that without hedonic benefit satisfaction of the product it may hard to lead the customers to the customer loyalty.

  • PDF