• Title/Summary/Keyword: explosive

Search Result 1,591, Processing Time 0.035 seconds

The Impact of Perceived Risks Upon Consumer Trust and Purchase Intentions (인지된 위험의 유형이 소비자 신뢰 및 온라인 구매의도에 미치는 영향)

  • Hong, Il-Yoo B.;Kim, Woo-Sung;Lim, Byung-Ha
    • Asia pacific journal of information systems
    • /
    • v.21 no.4
    • /
    • pp.1-25
    • /
    • 2011
  • Internet-based commerce has undergone an explosive growth over the past decade as consumers today find it more economical as well as more convenient to shop online. Nevertheless, the shift in the common mode of shopping from offline to online commerce has caused consumers to have worries over such issues as private information leakage, online fraud, discrepancy in product quality and grade, unsuccessful delivery, and so forth, Numerous studies have been undertaken to examine the role of perceived risk as a chief barrier to online purchases and to understand the theoretical relationships among perceived risk, trust and purchase intentions, However, most studies focus on empirically investigating the effects of trust on perceived risk, with little attention devoted to the effects of perceived risk on trust, While the influence trust has on perceived risk is worth studying, the influence in the opposite direction is equally important, enabling insights into the potential of perceived risk as a prohibitor of trust, According to Pavlou (2003), the primary source of the perceived risk is either the technological uncertainty of the Internet environment or the behavioral uncertainty of the transaction partner. Due to such types of uncertainty, an increase in the worries over the perceived risk may negatively affect trust, For example, if a consumer who sends sensitive transaction data over Internet is concerned that his or her private information may leak out because of the lack of security, trust may decrease (Olivero and Lunt, 2004), By the same token, if the consumer feels that the online merchant has the potential to profit by behaving in an opportunistic manner taking advantage of the remote, impersonal nature of online commerce, then it is unlikely that the merchant will be trusted, That is, the more the probable danger is likely to occur, the less trust and the greater need to control the transaction (Olivero and Lunt, 2004), In summary, a review of the related studies indicates that while some researchers looked at the influence of overall perceived risk on trust level, not much attention has been given to the effects of different types of perceived risk, In this context the present research aims at addressing the need to study how trust is affected by different types of perceived risk, We classified perceived risk into six different types based on the literature, and empirically analyzed the impact of each type of perceived risk upon consumer trust in an online merchant and further its impact upon purchase intentions. To meet our research objectives, we developed a conceptual model depicting the nomological structure of the relationships among our research variables, and also formulated a total of seven hypotheses. The model and hypotheses were tested using an empirical analysis based on a questionnaire survey of 206 college students. The reliability was evaluated via Cronbach's alphas, the minimum of which was found to be 0.73, and therefore the questionnaire items are all deemed reliable. In addition, the results of confirmatory factor analysis (CFA) designed to check the validity of the measurement model indicate that the convergent, discriminate, and nomological validities of the model are all acceptable. The structural equation modeling analysis to test the hypotheses yielded the following results. Of the first six hypotheses (H1-1 through H1-6) designed to examine the relationships between each risk type and trust, three hypotheses including H1-1 (performance risk ${\rightarrow}$ trust), H1-2 (psychological risk ${\rightarrow}$ trust) and H1-5 (online payment risk ${\rightarrow}$ trust) were supported with path coefficients of -0.30, -0.27 and -0.16 respectively. Finally, H2 (trust ${\rightarrow}$ purchase intentions) was supported with relatively high path coefficients of 0.73. Results of the empirical study offer the following findings and implications. First. it was found that it was performance risk, psychological risk and online payment risk that have a statistically significant influence upon consumer trust in an online merchant. It implies that a consumer may find an online merchant untrustworthy if either the product quality or the product grade does not match his or her expectations. For that reason, online merchants including digital storefronts and e-marketplaces are suggested to pursue a strategy focusing on identifying the target customers and offering products that they feel best meet performance and psychological needs of those customers. Thus, they should do their best to make it widely known that their products are of as good quality and grade as those purchased from offline department stores. In addition, it may be inferred that today's online consumers remain concerned about the security of the online commerce environment due to the repeated occurrences of hacking or private information leakage. Online merchants should take steps to remove potential vulnerabilities and provide online notices to emphasize that their website is secure. Second, consumer's overall trust was found to have a statistically significant influence on purchase intentions. This finding, which is consistent with the results of numerous prior studies, suggests that increased sales will become a reality only with enhanced consumer trust.

Prediction of Potential Risk Posed by a Military Gunnery Range after Flood Control Reservoir Construction (홍수조절지 건설 후 사격장 주변지역의 위해성예측 사례연구)

  • Ryu, Hye-Rim;Han, Joon-Kyoung;Nam, Kyoung-Phile;Bae, Bum-Han
    • Journal of Soil and Groundwater Environment
    • /
    • v.12 no.1
    • /
    • pp.87-96
    • /
    • 2007
  • Risk assessment was carried out in order to improve the remediation and management strategy on a contaminated gunnery site, where a flood control reservoir is under construction nearby. Six chemicals, including explosive chemicals and heavy metals, which were suspected to possess risk to humans by leaching events from the site were the target pollutants for the assessment. A site-specific conceptual site model was constructed based on effective, reasonable exposure pathways to avoid any overestimation of the risk. Also, conservative default values were adapted to prevent underestimation of the risk when site-specific values were not available. The risks of the six contaminants were calculated by API's Decision Support System for Exposure and Risk Assessment with several assumptions. In the crater-formed-area(Ac), the non-carcinogenic risks(i.e., HI values) of TNT(Tri-Nitro-Toluene) and Cd were slightly larger than 1, and for RDX(Royal Demolition Explosives), over 50. The total non-carcinogenic risk of the whole gunnery range calculated to a significantly high value of 62.5. Carcinogenicity of Cd was estimated to be about $10^{-3}$, while that of Pb was about $5\;{\times}\;10^{-4}$, which greatly exceeded the generally acceptable carcinogenic risk level of $10^{-4}{\sim}10^{-6}$. The risk assessment results suggest that an immediate remediation practice for both carcinogens and non-carcinogens are required before the reservoir construction. However, for more accurate risk assessment, more specific estimations on condition shifts due to the construction of the reservoir are required, and more over, the effects of the pollutants to the ecosystem is also necessary to be evaluated.

"Liability of Air Carriers for Injuries Resulting from International Aviation Terrorism" (국제항공(國際航空)테러리즘으로 인한 여객손해(旅客損害)에 대한 운송인(運送人)의 책임(責任))

  • Choi, Wan-Sik
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.1
    • /
    • pp.47-85
    • /
    • 1989
  • The Fundamental purpose of the Warsaw Convention was to establish uniform rules applicable to international air transportation. The emphasis on the benefits of uniformity was considered important in the beginning and continues to be important to the present. If the desire for uniformity is indeed the mortar which holds the Warsaw system together then it should be possible to agree on a worldwide liability limit. This liability limit would not be so unreasonable, that it would be impossible for nations to adhere to it. It would preclude any national supplemental compensation plan or Montreal Agreement type of requirement in any jurisdiction. The differentiation of liability limits by national requirement seems to be what is occurring. There is a plethora of mandated limits and Montreal Agreement type 'voluntary' limits. It is becoming difficult to find more than a few major States where an unmodified Warsaw Convention or Hague Protocol limitation is still in effect. If this is the real world in the 1980's, then let the treaty so reflect it. Upon reviewing the Warsaw Convention, its history and the several attempts to amend it, strengths become apparent. Hijackings of international flights have given rise to a number of lawsuits by passengers to recover damages for injuries suffered. This comment is concerned with the liability of an airline for injuries to its passengers resulting from aviation terrorism. In addition, analysis is focused on current airline security measures, particularly the pre-boarding screening system, and the duty of air carriers to prevent weapons from penetrating that system. An airline has a duty to exercise a high degree of care to protect its passengers from the threat of aviation terrorism. This duty would seemingly require the airline to exercise a high degree of care to prevent any passenger from smuggling a weapon or explosive device aboard its aircraft. In the case an unarmed hijacker who boards having no instrument in his possession with which to promote the hoax, a plaintiff-passenger would be hard-pressed to show that the airline was negligent in screening the hijacker prior to boarding. In light of the airline's duty to exercise a high degree of care to provide for the safety of all the passengers on board, an acquiescene to a hijacker's demands on the part of the air carrier could constitute a breach of duty only when it is clearly shown that the carrier's employees knew or plainly should have known that the hijacker was unarmed. A finding of willful misconduct on the part of an air carrier, which is a prerequisite to imposing unlimited liability, remains a question to be determined by a jury using the definition or standard of willful misconduct prevailing in the jurisdiction of the forum court. Through the willful misconduct provision of the Warsaw Convention, air carrier face the possibility of unlimited liability for failure to implement proper preventive precautions against terrorist. Courts, therefore, should broadly construe the willful misconduct provision of the Warsaw Convention in order to find unlimited liability for passenger injuries whenever air carrier security precautions are lacking. In this way, the courts can help ensure air carrier safety and prevention against terrorist attack. Air carriers, therefore, would have an incentive to increase, impose and maintain security precautions designed to thwart such potential terrorist attacks as in the case of Korean Air Lines Flight No.858 incident having a tremendous impact on the civil aviation community. The crash of a commercial airliner, with the attending tragic loss of life and massive destruction of property, always gives rise to shock and indignation. The general opinion is that the legal system could be sufficient, provided that the political will is there to use and apply it effectively. All agreed that the main responsibility for security has to be borne by the governments. I would like to remind all passengers that every discovery of the human spirit may be used for opposite ends; thus, aircraft can be used for air travel but also as targets of terrorism. A state that supports aviation terrorism is responsible for violation of International Aviation Law. Generally speaking, terrorism is a violation of international law. It violates the soverign rights of the states, and the human rights of the individuals. I think that aviation terrorism as becoming an ever more serious issue, has to be solved by internationally agreed and closely co-ordinated measures. We have to contribute more to the creation of a general consensus amongst all states about the need to combat the threat of aviation terrorism.

  • PDF

Story-based Information Retrieval (스토리 기반의 정보 검색 연구)

  • You, Eun-Soon;Park, Seung-Bo
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.4
    • /
    • pp.81-96
    • /
    • 2013
  • Video information retrieval has become a very important issue because of the explosive increase in video data from Web content development. Meanwhile, content-based video analysis using visual features has been the main source for video information retrieval and browsing. Content in video can be represented with content-based analysis techniques, which can extract various features from audio-visual data such as frames, shots, colors, texture, or shape. Moreover, similarity between videos can be measured through content-based analysis. However, a movie that is one of typical types of video data is organized by story as well as audio-visual data. This causes a semantic gap between significant information recognized by people and information resulting from content-based analysis, when content-based video analysis using only audio-visual data of low level is applied to information retrieval of movie. The reason for this semantic gap is that the story line for a movie is high level information, with relationships in the content that changes as the movie progresses. Information retrieval related to the story line of a movie cannot be executed by only content-based analysis techniques. A formal model is needed, which can determine relationships among movie contents, or track meaning changes, in order to accurately retrieve the story information. Recently, story-based video analysis techniques have emerged using a social network concept for story information retrieval. These approaches represent a story by using the relationships between characters in a movie, but these approaches have problems. First, they do not express dynamic changes in relationships between characters according to story development. Second, they miss profound information, such as emotions indicating the identities and psychological states of the characters. Emotion is essential to understanding a character's motivation, conflict, and resolution. Third, they do not take account of events and background that contribute to the story. As a result, this paper reviews the importance and weaknesses of previous video analysis methods ranging from content-based approaches to story analysis based on social network. Also, we suggest necessary elements, such as character, background, and events, based on narrative structures introduced in the literature. We extract characters' emotional words from the script of the movie Pretty Woman by using the hierarchical attribute of WordNet, which is an extensive English thesaurus. WordNet offers relationships between words (e.g., synonyms, hypernyms, hyponyms, antonyms). We present a method to visualize the emotional pattern of a character over time. Second, a character's inner nature must be predetermined in order to model a character arc that can depict the character's growth and development. To this end, we analyze the amount of the character's dialogue in the script and track the character's inner nature using social network concepts, such as in-degree (incoming links) and out-degree (outgoing links). Additionally, we propose a method that can track a character's inner nature by tracing indices such as degree, in-degree, and out-degree of the character network in a movie through its progression. Finally, the spatial background where characters meet and where events take place is an important element in the story. We take advantage of the movie script to extracting significant spatial background and suggest a scene map describing spatial arrangements and distances in the movie. Important places where main characters first meet or where they stay during long periods of time can be extracted through this scene map. In view of the aforementioned three elements (character, event, background), we extract a variety of information related to the story and evaluate the performance of the proposed method. We can track story information extracted over time and detect a change in the character's emotion or inner nature, spatial movement, and conflicts and resolutions in the story.

Social Welfare Policy Expansion and Generational Equity: Generational Accounting Approach (복지지출 확대가 세대 간 형평성에 미치는 효과 분석: 세대 간 회계를 이용한 접근)

  • Chun, Young Jun
    • KDI Journal of Economic Policy
    • /
    • v.34 no.3
    • /
    • pp.31-65
    • /
    • 2012
  • We study the sustainability of the current fiscal policy of Korea, and the effects of the social welfare policy expansion, which has been recently discussed among the political circles, on the government budget and the generational equity, using generational accounting. We follow the generational accounting approach, considering the fact that most of the social welfare policies are the entitlement programs, which imposes the limitation of the policy maker's discretion to control the cost of their provision. The social welfare expenditure will change due to the change in the policy environments of the future, such as population aging. Therefore, we need to take into account the government cash flow of the future as well as of the present to investigate its effects on the fiscal sustainability, which implies that the national debt or the budget balance is not a proper index for the investigation. Our findings are as follows. The current fiscal policies are not sustainable, and the long-term budgetary imbalance is shown very serious. The required tax adjustment, which is defined as the percentage change of tax burden required to attain the long-term budgetary balance, is very large. Unless the level of the government expenditure is properly controlled, the tax burden and the social contribution level will rise to the untolerable level. Moreover, the expansion of the social welfare policies, which has been discussed among the political circles, will substantially increase the fiscal burden of the future generations. Even though the provision of the free lunch to the primary and the secondary school students, the free child care, and the discounted college tuition do not increase the fiscal burden much, because their magnitude at present is not large and will decrease due to the decrease in the number of the newborns and the students resulting from the fall in the fertility rate, that of the free health care service will increase tax burden of the future generations very much, because the magnitude of the government expenditure needed at present is very large and the population aging will further increase the magnitude of the health care expenditure. The findings indicate that the structural reforms, to prevent the explosive increase in the social welfare expenditure in the future, are necessary before the implementation of the welfare policy expansion. In particular, the cost control of the social transfers to the elderly needs to be made, because the speed of the population aging of Korea is among the highest in the world. The findings also indicate that the budget balance or the national debt can cause the fiscal illusion, which makes the Korean government budget look sound, even though the fiscal policy will rapidly increase the social welfare expenditure in the future, as the population ages. The generational accounting, which takes into account the cash flow of the future as well as of the present, unlike the budgetary balance and the national debt, which shows the results of the government financial activities of the past and the present, is a useful method to overcome the fiscal illusion.

  • PDF

Predictive Clustering-based Collaborative Filtering Technique for Performance-Stability of Recommendation System (추천 시스템의 성능 안정성을 위한 예측적 군집화 기반 협업 필터링 기법)

  • Lee, O-Joun;You, Eun-Soon
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.1
    • /
    • pp.119-142
    • /
    • 2015
  • With the explosive growth in the volume of information, Internet users are experiencing considerable difficulties in obtaining necessary information online. Against this backdrop, ever-greater importance is being placed on a recommender system that provides information catered to user preferences and tastes in an attempt to address issues associated with information overload. To this end, a number of techniques have been proposed, including content-based filtering (CBF), demographic filtering (DF) and collaborative filtering (CF). Among them, CBF and DF require external information and thus cannot be applied to a variety of domains. CF, on the other hand, is widely used since it is relatively free from the domain constraint. The CF technique is broadly classified into memory-based CF, model-based CF and hybrid CF. Model-based CF addresses the drawbacks of CF by considering the Bayesian model, clustering model or dependency network model. This filtering technique not only improves the sparsity and scalability issues but also boosts predictive performance. However, it involves expensive model-building and results in a tradeoff between performance and scalability. Such tradeoff is attributed to reduced coverage, which is a type of sparsity issues. In addition, expensive model-building may lead to performance instability since changes in the domain environment cannot be immediately incorporated into the model due to high costs involved. Cumulative changes in the domain environment that have failed to be reflected eventually undermine system performance. This study incorporates the Markov model of transition probabilities and the concept of fuzzy clustering with CBCF to propose predictive clustering-based CF (PCCF) that solves the issues of reduced coverage and of unstable performance. The method improves performance instability by tracking the changes in user preferences and bridging the gap between the static model and dynamic users. Furthermore, the issue of reduced coverage also improves by expanding the coverage based on transition probabilities and clustering probabilities. The proposed method consists of four processes. First, user preferences are normalized in preference clustering. Second, changes in user preferences are detected from review score entries during preference transition detection. Third, user propensities are normalized using patterns of changes (propensities) in user preferences in propensity clustering. Lastly, the preference prediction model is developed to predict user preferences for items during preference prediction. The proposed method has been validated by testing the robustness of performance instability and scalability-performance tradeoff. The initial test compared and analyzed the performance of individual recommender systems each enabled by IBCF, CBCF, ICFEC and PCCF under an environment where data sparsity had been minimized. The following test adjusted the optimal number of clusters in CBCF, ICFEC and PCCF for a comparative analysis of subsequent changes in the system performance. The test results revealed that the suggested method produced insignificant improvement in performance in comparison with the existing techniques. In addition, it failed to achieve significant improvement in the standard deviation that indicates the degree of data fluctuation. Notwithstanding, it resulted in marked improvement over the existing techniques in terms of range that indicates the level of performance fluctuation. The level of performance fluctuation before and after the model generation improved by 51.31% in the initial test. Then in the following test, there has been 36.05% improvement in the level of performance fluctuation driven by the changes in the number of clusters. This signifies that the proposed method, despite the slight performance improvement, clearly offers better performance stability compared to the existing techniques. Further research on this study will be directed toward enhancing the recommendation performance that failed to demonstrate significant improvement over the existing techniques. The future research will consider the introduction of a high-dimensional parameter-free clustering algorithm or deep learning-based model in order to improve performance in recommendations.

Product Recommender Systems using Multi-Model Ensemble Techniques (다중모형조합기법을 이용한 상품추천시스템)

  • Lee, Yeonjeong;Kim, Kyoung-Jae
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.2
    • /
    • pp.39-54
    • /
    • 2013
  • Recent explosive increase of electronic commerce provides many advantageous purchase opportunities to customers. In this situation, customers who do not have enough knowledge about their purchases, may accept product recommendations. Product recommender systems automatically reflect user's preference and provide recommendation list to the users. Thus, product recommender system in online shopping store has been known as one of the most popular tools for one-to-one marketing. However, recommender systems which do not properly reflect user's preference cause user's disappointment and waste of time. In this study, we propose a novel recommender system which uses data mining and multi-model ensemble techniques to enhance the recommendation performance through reflecting the precise user's preference. The research data is collected from the real-world online shopping store, which deals products from famous art galleries and museums in Korea. The data initially contain 5759 transaction data, but finally remain 3167 transaction data after deletion of null data. In this study, we transform the categorical variables into dummy variables and exclude outlier data. The proposed model consists of two steps. The first step predicts customers who have high likelihood to purchase products in the online shopping store. In this step, we first use logistic regression, decision trees, and artificial neural networks to predict customers who have high likelihood to purchase products in each product group. We perform above data mining techniques using SAS E-Miner software. In this study, we partition datasets into two sets as modeling and validation sets for the logistic regression and decision trees. We also partition datasets into three sets as training, test, and validation sets for the artificial neural network model. The validation dataset is equal for the all experiments. Then we composite the results of each predictor using the multi-model ensemble techniques such as bagging and bumping. Bagging is the abbreviation of "Bootstrap Aggregation" and it composite outputs from several machine learning techniques for raising the performance and stability of prediction or classification. This technique is special form of the averaging method. Bumping is the abbreviation of "Bootstrap Umbrella of Model Parameter," and it only considers the model which has the lowest error value. The results show that bumping outperforms bagging and the other predictors except for "Poster" product group. For the "Poster" product group, artificial neural network model performs better than the other models. In the second step, we use the market basket analysis to extract association rules for co-purchased products. We can extract thirty one association rules according to values of Lift, Support, and Confidence measure. We set the minimum transaction frequency to support associations as 5%, maximum number of items in an association as 4, and minimum confidence for rule generation as 10%. This study also excludes the extracted association rules below 1 of lift value. We finally get fifteen association rules by excluding duplicate rules. Among the fifteen association rules, eleven rules contain association between products in "Office Supplies" product group, one rules include the association between "Office Supplies" and "Fashion" product groups, and other three rules contain association between "Office Supplies" and "Home Decoration" product groups. Finally, the proposed product recommender systems provides list of recommendations to the proper customers. We test the usability of the proposed system by using prototype and real-world transaction and profile data. For this end, we construct the prototype system by using the ASP, Java Script and Microsoft Access. In addition, we survey about user satisfaction for the recommended product list from the proposed system and the randomly selected product lists. The participants for the survey are 173 persons who use MSN Messenger, Daum Caf$\acute{e}$, and P2P services. We evaluate the user satisfaction using five-scale Likert measure. This study also performs "Paired Sample T-test" for the results of the survey. The results show that the proposed model outperforms the random selection model with 1% statistical significance level. It means that the users satisfied the recommended product list significantly. The results also show that the proposed system may be useful in real-world online shopping store.

Effects of Transaction Characteristics on Distributive Justice and Purchase Intention in the Social Commerce (소셜커머스에서 거래의 특성이 분배적 정의와 거래 의도에 미치는 영향)

  • Bang, Youngsok;Lee, Dong-Joo
    • Asia pacific journal of information systems
    • /
    • v.23 no.2
    • /
    • pp.1-20
    • /
    • 2013
  • Social commerce has been gaining explosive popularity, with typical examples of the model such as Groupon and Level Up. Both local business owners and consumers can benefit from this new e-commerce model. Local business owners have a chance to access potential customers and promote their products in a way that could not have otherwise been easily possible, and consumers can enjoy discounted offerings. However, questions have been increasingly raised about the value and future of the social commerce model. A recent survey shows that about a third of 324 business owners who ran a daily-deal promotion in Groupon went behind. Furthermore, more than half of the surveyed merchants did not express enthusiasm about running the promotion again. The same goes for the case in Korea, where more than half of the surveyed clients reported no significant change or even decrease in profits compared to before the use of social commerce model. Why do local business owners fail to exploit the benefits from the promotions and advertisements through the social commerce model and to make profits? Without answering this question, the model would fall under suspicion and even its sustainability might be challenged. This study aims to look into problems in the current social commerce transactions and provide implications for the social commerce model, so that the model would get a foothold for next growth. Drawing on justice theory, this study develops theoretical arguments for the effects of transaction characteristics on consumers' distributive justice and purchase intention in the social commerce. Specifically, this study focuses on two characteristics of social commerce transactions-the discount rate and the purchase rate of products-and investigates their effects on consumers' perception of distributive justice for discounted transactions in the social commerce and their perception of distributive justice for regular-priced transactions. This study also examines the relationship between distributive justice and purchase intention. We conducted an online experiment and gathered data from 115 participants to test the hypotheses. Each participant was randomly assigned to one of nine manipulated scenarios of social commerce transactions, which were generated based on the combination of three levels of purchase rate (high, medium, and low) and three levels of discount rate (high, medium, and low). We conducted MANOVA and post-hoc ANOVA to test hypotheses about the relationships between the transaction characteristics (purchase rate and discount rate) and distributive justice for each of the discounted transaction and the regular-priced transaction. We also employed a PLS analysis to test relations between distributive justice and purchase intentions. Analysis results show that a higher discount rate increases distributive justice for the discounted transaction but decreases distributive justice for the regular-priced transaction. This, coupled with the result that distributive justice for each type of transaction has a positive effect on the corresponding purchase intention, implies that a large discount in the social commerce may be helpful for attracting consumers, but harmful to the business after the promotion. However, further examination reveals curvilinear effects of the discount rate on both types of distributive justice. Specifically, we find distributive justice for the discounted transaction increases concavely as the discount rate increases while distributive justice for the regular-priced transaction decreases concavely with the dscount rate. This implies that there exists an appropriate discount rate which could promote the discounted transaction while not hurting future business of regular-priced transactions. Next, the purchase rate is found to be a critical factor that facilitates the regular-priced transaction. It has a convexly positive influence on distributive justice for the transaction. Therefore, an increase of the rate beyond some threshold would lead to a substantial level of distributive justice for the regular-priced transaction, threrby boosting future transactions. This implies that social commerce firms and sellers should employ various non-price stimuli to promote the purchase rate. Finally, we find no significant relationship between the purchase rate and distributive justice for the discounted transaction. Based on the above results, we provide several implications with future research directions.

  • PDF

The Fourth Industrial Revolution and Labor Relations : Labor-management Conflict Issues and Union Strategies in Western Advanced Countries (4차 산업혁명과 노사관계 : 노사갈등 이슈와 서구 노조들의 대응전략을 중심으로)

  • Lee, Byoung-Hoon
    • 한국사회정책
    • /
    • v.25 no.2
    • /
    • pp.429-446
    • /
    • 2018
  • The $4^{th}$ Industrial Revolution, symbolizing the explosive innovation of digital technologies, is expected to have a great impact on labor relations and produce a lot of contested issues. The labor-management issues, created by the $4^{th}$ Industrial Revolution, are as follows: (1) employment restructuring, job re-allocation, and skill-reformation, driven by the technological displacement, resetting of worker-machine relationship, and negotiation on labor intensity and autonomy, (2) the legislation of institutional protection for the digital dependent self-employed, derived from the proliferation of platform-mediated labor, and the statutory recognition of their 'workerness', (3) unemployment safety net, income guarantee, and skill formation assistance for precarious workeforce, (4) the protection of worker privacy from workplace surveillance, (5) protecting labor rights of the digital dependent self-employed and prcarious workers and guaranteeing their unionization and collective bargaining. In comparing how labor unions in Western countries have responded to the $4^{th}$ Industrial Revolution, German unions have showed a strategic approach of policy formation toward digital technological innovations by effectively building and utilizing diverse channel of social dialogue and collective bargaining, while those in the US and UK have adopted the traditional approach of organizing and protesting in attempting to protect the interest of platform-mediated workers (i.e. Uber drivers). In light of the best practice demonstrated by German unions, it is necessary to build the process of productive policy consultation among three parties- the government, employers, and labor unions - at multi levels (i.e. workplace, sectoral and national levels), in order to prevent the destructive damage as well as labor-management confrotation, caused by digital technological innovations. In such policy consultation procesess, moreover, the inclusive and integrated approach is required to tackle with diverse problems, derived from the $4^{th}$ Industrial Revolution, in a holistic manner.

A Hierarchical Cluster Tree Based Fast Searching Algorithm for Raman Spectroscopic Identification (계층 클러스터 트리 기반 라만 스펙트럼 식별 고속 검색 알고리즘)

  • Kim, Sun-Keum;Ko, Dae-Young;Park, Jun-Kyu;Park, Aa-Ron;Baek, Sung-June
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.3
    • /
    • pp.562-569
    • /
    • 2019
  • Raman spectroscopy has been receiving increased attention as a standoff explosive detection technique. In addition, there is a growing need for a fast search method that can identify raman spectrum for measured chemical substances compared to known raman spectra in large database. By far the most simple and widely used method is to calculate and compare the Euclidean distance between the given spectrum and the spectra in a database. But it is non-trivial problem because of the inherent high dimensionality of the data. One of the most serious problems is the high computational complexity of searching for the closet spectra. To overcome this problem, we presented the MPS Sort with Sorted Variance+PDS method for the fast algorithm to search for the closet spectra in the last paper. the proposed algorithm uses two significant features of a vector, mean values and variance, to reject many unlikely spectra and save a great deal of computation time. In this paper, we present two new methods for the fast algorithm to search for the closet spectra. the PCA+PDS algorithm reduces the amount of computation by reducing the dimension of the data through PCA transformation with the same result as the distance calculation using the whole data. the Hierarchical Cluster Tree algorithm makes a binary hierarchical tree using PCA transformed spectra data. then it start searching from the clusters closest to the input spectrum and do not calculate many spectra that can not be candidates, which save a great deal of computation time. As the Experiment results, PCA+PDS shows about 60.06% performance improvement for the MPS Sort with Sorted Variance+PDS. also, Hierarchical Tree shows about 17.74% performance improvement for the PCA+PDS. The results obtained confirm the effectiveness of the proposed algorithm.