• Title/Summary/Keyword: exploitation

Search Result 814, Processing Time 0.032 seconds

The Study on the Balance of Ambidextrous Strategy of Exploration and Exploitation for Startup Performance (조직의 탐색과 활용에 대한 양손잡이 전략의 균형이 스타트업 성과에 미치는 영향)

  • Choi, Sung Chul;Lee, Woo Jin
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.16 no.6
    • /
    • pp.131-144
    • /
    • 2021
  • The organizational ambidexterity is an organizational strategy designed to pursue exploration activities to seize new opportunities and exploitation activities to efficiently use resources. Most of these ambidextrous structures have been studied for large corporations with slack resources, and there are still not many studies on the necessity of an ambidextrous structure for startups with relatively low-level resources. However, recently, the startup ecosystem is being advanced globally, and the amount of VC investment is rapidly increasing. This is a time when a lot of venture fund is invested in startups and a startup-friendly environment for rapid growth is created. This is the time to discuss the necessity and applicability of an ambidextrous organizational structure for startups. Therefore, this study conducted a hypothesis test whether the importance and necessity of balance that startups solving market problems with new ideas and utilizing accumulated resources have. To conduct this study, we analyzed 140 startups data gathered from the survey and the moderation effect was also analyzed. As a result of the study, it was verified that the balance of startup exploration and exploitation had a significant effect on startup performance, and the moderating effect of environmental dynamics was found to have a significant effect on the relationship with non-financial performance. Therefore, for startups with insufficient resources, it was concluded that the surplus resources generated in the process of a firm's growth should be effectively utilized and the balance between exploration and exploitation should be balanced from the initial stage of searching for a new business. In other words, it was confirmed that it is important for continuous growth and survival to seek the structure of an ambidextrous organization in order to internalize a mechanism that enables startups to pursue both effectiveness and efficiency in the long term. This study suggests a strategic direction for the growth of startups from the perspective of organizational structure. We expect that this meaningful results on the relationship between the ambidextrous capabilities of startups and performance contribute to the growth of startups in the rapidly growing startup venture environment.

A Study on the Proposal of Spiral Evolution Model of IPTV, M-IPTV, OTT & Smart Media focusing on Exploration & Exploitation Theory (IPTV, M-IPTV, OTT, 스마트미디어 진화단계에 관한 탐색과 활용관점의 Spiral 모형 연구)

  • Lee, Sang-Ho;Kim, Jai-Beom;Kim, Young-Berm
    • Journal of Digital Contents Society
    • /
    • v.15 no.3
    • /
    • pp.327-338
    • /
    • 2014
  • This study proposes the evolution model of emerging media platform including smart media (M-IPTV, Smart TV) and IPTV, through a spiral evolution model based on the theory of the exploration & the exploitation. Authors suppose that the IP media evolved from IPTV technology, evolution of which has come through the development model of serial circular process. For explanation of this evolution, we propose the research model integrating the spiral model and the exploration & exploitation theory. Researchers define the smart media as the evolved media from IPTV, through this proposed model. We expect this model to be the theoretical base of media regulation and setting direction of future media service. Thus, this research are summed up as follows. To begin with, we classify the evolutionary stage of IPTV from the view points of service feature, regulation frame and technological characters. Secondly, we organize and confirm the research model of IPTV evolution through case analysis of the 3 cycles of each evolutionary stage. As a result, discussion of this study helps understanding mobile IP media and smart media as a post IPTV and leads the solution of various regulation issues and the development of the innovative media service and content. In addition, it can guide the government for the evolutionary direction to promote the media and the content industry.

The moderating effects of organizational culture on the relationship among open information innovation, strategic alliance and export performance of SMEs (중소 수출기업의 개방형 정보 혁신, 전략적 제휴, 수출성과의 관계에서 조직문화의 조절효과)

  • Cho, Yeon-Sung;Khoe, Kyung-Il
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.2
    • /
    • pp.219-225
    • /
    • 2018
  • The objectives of this study is to analyze the impact of open information innovation which consisted of external technology acquisition and external technology exploitation on export performance by integrating with strategic alliance factors. This study empirically analyzed six hypotheses in 201 sample using the PLS (Partial Least Square) of the structural equation model to verify the moderating effects of organizational culture on the relationship among open information innovation, strategic alliance and export performance. As a result, external technology acquisition dose not affect strategic alliances. On the other hand, external technology exploitation has a positive impact on strategic alliances. Strategic alliances also have a positive impact on export performance. As a result of the moderating effect analysis, the interaction between organizational culture and external technology acquisition has positively influenced strategic alliances. In addition, the moderating effect of organizational culture and external technology exploitation has a significant effect on strategic alliances. However, moderating effect of organizational culture and strategic alliance dose not affect export performance. This study has a contribution to the analysis of the moderating effects of organizational culture. In the future, integrated analysis of open information innovation and external factors is needed.

Current Status of Response to Digital Child Sexual Slavery and Comparative Analysis of Overseas Crime Prediction System Using Artificial Intelligence (디지털 아동 성착취 대응현황과 해외 인공지능 범죄 예측 시스템 비교분석)

  • Kim, Hyejin
    • Journal of Digital Convergence
    • /
    • v.18 no.7
    • /
    • pp.357-368
    • /
    • 2020
  • This study identifies the aspects and characteristics of 'Digital Sexual Crimes' that changed rapidly in recent years. It has identified the so-called "Telegram sexual harassment and exploitation" incident on the front page. We also want to analyze this and draw up policy suggestions that can help prepare social measures. In the wake of the Telegram sexual exploitation scandal, The National Assembly is quickly proposing related bills. However, the reality is that even a clear concept and definition of "Digital sexual Crimes" have not been made yet. The effective support system for victims is also insufficient. Therefore, this paper examines the definition and concept of child sexual exploitation and harassment. We will look at the features, causes, and conditions. In addition, it will examine the current status of Digital Sexual Crimes distribution and deletion of domestic, foreign platforms. Major foreign countries, including the U. S. A. refer to cases in which big data and artificial intelligence technologies are actively used to protect victims and track perpetrators.

Biochemical Performance and Quantitative Assessment of F1 Hybrid of Two Ecoraces of Tropical Tasar Silkworm Antheraea Mylitta Drury (Lepidoptera: Saturniidae)

  • Lokesh, Gangadharaiah;Tirkey, Sushma Rani;Srivastava, Ashok Kumar;Kar, Prasant Kumar;Sinha, Manoj Kumar
    • International Journal of Industrial Entomology and Biomaterials
    • /
    • v.26 no.2
    • /
    • pp.67-73
    • /
    • 2013
  • Antheraea mylitta Drury is basically a crossbreeding species, as such it seems to be potentially a good material for the exploitation of heterosis. In the present study F1 hybrid of wild ecorace Laria (L) and semi-domestic Daba (D) was raised and evaluated for various quantitative traits and biochemical parameters during larval stage. Improved fecundity ($+18{\pm}1.8%$ and higher egg hatching rate ($+10.96{\pm}1.3%$) was recorded in the F1hybrid ($L{\times}D$). Biochemical parameters studied in the hemolymph, midgut and fatbody of the larva showed significantly higher (P<0.05) total proteins and carbohydrate concentration besides digestive enzyme activity. Correspondingly SDS-PAGE revealed more number of protein bands in the hemolymph sample of F1s, ranging between 29 kDa to 66 kDa compared to parental lines. The present study demonstrates the positive heterosis effect in the F1 hybrid of Laria ${\times}$ Daba. Biochemical analysis indicates that, there is possibilities of exploitation of hybrids with specific parents targeted for desirable commercial traits (silk yield and fecundity). Moreover, most of these biochemical parameters can be used as markers to analyze the genetic improvement in the tasar silkworms.

Improving Malicious Web Code Classification with Sequence by Machine Learning

  • Paik, Incheon
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.3 no.5
    • /
    • pp.319-324
    • /
    • 2014
  • Web applications make life more convenient. Many web applications have several kinds of user input (e.g. personal information, a user's comment of commercial goods, etc.) for the activities. On the other hand, there are a range of vulnerabilities in the input functions of Web applications. Malicious actions can be attempted using the free accessibility of many web applications. Attacks by the exploitation of these input vulnerabilities can be achieved by injecting malicious web code; it enables one to perform a variety of illegal actions, such as SQL Injection Attacks (SQLIAs) and Cross Site Scripting (XSS). These actions come down to theft, replacing personal information, or phishing. The existing solutions use a parser for the code, are limited to fixed and very small patterns, and are difficult to adapt to variations. A machine learning method can give leverage to cover a far broader range of malicious web code and is easy to adapt to variations and changes. Therefore, this paper suggests the adaptable classification of malicious web code by machine learning approaches for detecting the exploitation user inputs. The approach usually identifies the "looks-like malicious" code for real malicious code. More detailed classification using sequence information is also introduced. The precision for the "looks-like malicious code" is 99% and for the precise classification with sequence is 90%.

Multipath Ghosts in Through-the-Wall Radar Imaging: Challenges and Solutions

  • Abdalla, Abdi T.;Alkhodary, Mohammad T.;Muqaibel, Ali H.
    • ETRI Journal
    • /
    • v.40 no.3
    • /
    • pp.376-388
    • /
    • 2018
  • In through-the-wall radar imaging (TWRI), the presence of front and side walls causes multipath propagation, which creates fake targets called multipath ghosts. They populate the scene and reduce the probability of correct target detection, classification, and localization. In modern TWRI, specular multipath exploitation has received considerable attention for reducing the effects of multipath ghosts. However, this exploitation is challenged by the requirements of the reflecting geometry, which is not always available. Currently, the demand for a high radar image resolution dictates the use of a large aperture and wide bandwidth. This results in a large amount of data. To tackle this problem, compressive sensing (CS) is applied to TWRI. With CS, only a fraction of the data are used to produce a high-quality image, provided that the scene is sparse. However, owing to multipath ghosts, the scene sparsity is highly deteriorated; hence, the performance of the CS algorithms is compromised. This paper presents and discusses the adverse effects of multipath ghosts in TWRI. It describes the physical formation of ghosts, their challenges, and existing suppression techniques.

The Empirical Study on the Relationship between Innovation Type and Network Configuration of IT SMEs (중소 IT기업의 혁신유형별 네트워크 형태에 대한 실증 연구)

  • Kim, Sun-Woo;Lee, Jang-Jae;Lee, Chul-Woo
    • Journal of the Korean association of regional geographers
    • /
    • v.12 no.6
    • /
    • pp.693-703
    • /
    • 2006
  • Keeping the balance between exploration of new possibilities and exploitation of existing certainties in organizational innovation is getting its significance as business environments become more turbulent This paper focused on the relationship between two different types of innovation and network configuration. For this purpose, we conducted the empirical studies of 168 IT SMEs located in Gyeongbuk. For this analysis, we defined two innovation types as exploratory innovation and exploitative innovation. Also, we considered network scope and strength of tie as network configuration. The results showed that the exploratory innovation had sparse network of network scope and weak tie of strength. On the contrary the exploitative innovation had dense network and strong tie.

  • PDF