• Title/Summary/Keyword: line search

Search Result 631, Processing Time 0.031 seconds

Learning Material Bookmarking Service based on Collective Intelligence (집단지성 기반 학습자료 북마킹 서비스 시스템)

  • Jang, Jincheul;Jung, Sukhwan;Lee, Seulki;Jung, Chihoon;Yoon, Wan Chul;Yi, Mun Yong
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.2
    • /
    • pp.179-192
    • /
    • 2014
  • Keeping in line with the recent changes in the information technology environment, the online learning environment that supports multiple users' participation such as MOOC (Massive Open Online Courses) has become important. One of the largest professional associations in Information Technology, IEEE Computer Society, announced that "Supporting New Learning Styles" is a crucial trend in 2014. Popular MOOC services, CourseRa and edX, have continued to build active learning environment with a large number of lectures accessible anywhere using smart devices, and have been used by an increasing number of users. In addition, collaborative web services (e.g., blogs and Wikipedia) also support the creation of various user-uploaded learning materials, resulting in a vast amount of new lectures and learning materials being created every day in the online space. However, it is difficult for an online educational system to keep a learner' motivation as learning occurs remotely, with limited capability to share knowledge among the learners. Thus, it is essential to understand which materials are needed for each learner and how to motivate learners to actively participate in online learning system. To overcome these issues, leveraging the constructivism theory and collective intelligence, we have developed a social bookmarking system called WeStudy, which supports learning material sharing among the users and provides personalized learning material recommendations. Constructivism theory argues that knowledge is being constructed while learners interact with the world. Collective intelligence can be separated into two types: (1) collaborative collective intelligence, which can be built on the basis of direct collaboration among the participants (e.g., Wikipedia), and (2) integrative collective intelligence, which produces new forms of knowledge by combining independent and distributed information through highly advanced technologies and algorithms (e.g., Google PageRank, Recommender systems). Recommender system, one of the examples of integrative collective intelligence, is to utilize online activities of the users and recommend what users may be interested in. Our system included both collaborative collective intelligence functions and integrative collective intelligence functions. We analyzed well-known Web services based on collective intelligence such as Wikipedia, Slideshare, and Videolectures to identify main design factors that support collective intelligence. Based on this analysis, in addition to sharing online resources through social bookmarking, we selected three essential functions for our system: 1) multimodal visualization of learning materials through two forms (e.g., list and graph), 2) personalized recommendation of learning materials, and 3) explicit designation of learners of their interest. After developing web-based WeStudy system, we conducted usability testing through the heuristic evaluation method that included seven heuristic indices: features and functionality, cognitive page, navigation, search and filtering, control and feedback, forms, context and text. We recruited 10 experts who majored in Human Computer Interaction and worked in the same field, and requested both quantitative and qualitative evaluation of the system. The evaluation results show that, relative to the other functions evaluated, the list/graph page produced higher scores on all indices except for contexts & text. In case of contexts & text, learning material page produced the best score, compared with the other functions. In general, the explicit designation of learners of their interests, one of the distinctive functions, received lower scores on all usability indices because of its unfamiliar functionality to the users. In summary, the evaluation results show that our system has achieved high usability with good performance with some minor issues, which need to be fully addressed before the public release of the system to large-scale users. The study findings provide practical guidelines for the design and development of various systems that utilize collective intelligence.

A Study on the Performance Evaluation of G2B Procurement Process Innovation by Using MAS: Korea G2B KONEPS Case (멀티에이전트시스템(MAS)을 이용한 G2B 조달 프로세스 혁신의 효과평가에 관한 연구 : 나라장터 G2B사례)

  • Seo, Won-Jun;Lee, Dae-Cheor;Lim, Gyoo-Gun
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.2
    • /
    • pp.157-175
    • /
    • 2012
  • It is difficult to evaluate the performance of process innovation of e-procurement which has large scale and complex processes. The existing evaluation methods for measuring the effects of process innovation have been mainly done with statistically quantitative methods by analyzing operational data or with qualitative methods by conducting surveys and interviews. However, these methods have some limitations to evaluate the effects because the performance evaluation of e-procurement process innovation should consider the interactions among participants who are active either directly or indirectly through the processes. This study considers the e-procurement process as a complex system and develops a simulation model based on MAS(Multi-Agent System) to evaluate the effects of e-procurement process innovation. Multi-agent based simulation allows observing interaction patterns of objects in virtual world through relationship among objects and their behavioral mechanism. Agent-based simulation is suitable especially for complex business problems. In this study, we used Netlogo Version 4.1.3 as a MAS simulation tool which was developed in Northwestern University. To do this, we developed a interaction model of agents in MAS environment. We defined process agents and task agents, and assigned their behavioral characteristics. The developed simulation model was applied to G2B system (KONEPS: Korea ON-line E-Procurement System) of Public Procurement Service (PPS) in Korea and used to evaluate the innovation effects of the G2B system. KONEPS is a successfully established e-procurement system started in the year 2002. KONEPS is a representative e-Procurement system which integrates characteristics of e-commerce into government for business procurement activities. KONEPS deserves the international recognition considering the annual transaction volume of 56 billion dollars, daily exchanges of electronic documents, users consisted of 121,000 suppliers and 37,000 public organizations, and the 4.5 billion dollars of cost saving. For the simulation, we analyzed the e-procurement of process of KONEPS into eight sub processes such as 'process 1: search products and acquisition of proposal', 'process 2 : review the methods of contracts and item features', 'process 3 : a notice of bid', 'process 4 : registration and confirmation of qualification', 'process 5 : bidding', 'process 6 : a screening test', 'process 7 : contracts', and 'process 8 : invoice and payment'. For the parameter settings of the agents behavior, we collected some data from the transactional database of PPS and some information by conducting a survey. The used data for the simulation are 'participants (government organizations, local government organizations and public institutions)', 'the number of bidding per year', 'the number of total contracts', 'the number of shopping mall transactions', 'the rate of contracts between bidding and shopping mall', 'the successful bidding ratio', and the estimated time for each process. The comparison was done for the difference of time consumption between 'before the innovation (As-was)' and 'after the innovation (As-is).' The results showed that there were productivity improvements in every eight sub processes. The decrease ratio of 'average number of task processing' was 92.7% and the decrease ratio of 'average time of task processing' was 95.4% in entire processes when we use G2B system comparing to the conventional method. Also, this study found that the process innovation effect will be enhanced if the task process related to the 'contract' can be improved. This study shows the usability and possibility of using MAS in process innovation evaluation and its modeling.

Development of a Probabilistic Model for the Estimation of Yearly Workable Wave Condition Period for Offshore Operations - Centering on the Sea off the Ulsan Harbor (해상작업 가능기간 산정을 위한 확률모형 개발 - 울산항 전면 해역을 중심으로)

  • Choi, Se Ho;Cho, Yong Jun
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.31 no.3
    • /
    • pp.115-128
    • /
    • 2019
  • In this study, a probabilistic model for the estimation of yearly workable wave condition period for offshore operations is developed. In doing so, we first hindcast the significant wave heights and peak periods off the Ulsan every hour from 2003.1.1 to 2017.12.31 based on the meteorological data by JMA (Japan Meterological Agency) and NOAA (National Oceanic and Atmospheric Administration), and SWAN. Then, we proceed to derive the long term significant wave height distribution from the simulated time series using a least square method. It was shown that the agreements are more remarkable in the distribution in line with the Modified Glukhovskiy Distribution than in the three parameters Weibull distribution which has been preferred in the literature. In an effort to develop a more comprehensive probabilistic model for the estimation of yearly workable wave condition period for offshore operations, wave height distribution over the 15 years with individual waves occurring within the unit simulation period (1 hour) being fully taken into account is also derived based on the Borgman Convolution Integral. It is shown that the coefficients of the Modified Glukhovskiy distribution are $A_p=15.92$, $H_p=4.374m$, ${\kappa}_p=1.824$, and the yearly workable wave condition period for offshore work is estimated to be 319 days when a threshold wave height for offshore work is $H_S=1.5m$. In search of a way to validate the probabilistic model derived in this study, we also carry out the wave by wave analysis of the entire time series of numerically simulated significant wave heights over the 15 years to collect every duration periods of waves the height of which are surpassing the threshold height which has been reported to be $H_S=1.5m$ in the field practice in South Korea. It turns out that the average duration period is 45.5 days from 2003 to 2017, which is very close to 46 days from the probabilistic model derived in this study.

The Definition and Regulations of Drone in Korea (韓国におけるドロ?ンの定義と法規制)

  • Kim, Young-Ju
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.34 no.1
    • /
    • pp.235-268
    • /
    • 2019
  • Under the Aviation Safety Act of Korea, any person who intends to operate a drone is required to follow the operational conditions listed below, unless approved by the Minister of Land, Infrastructure, Transport and Tourism; (i) Operation of drones in the daytime, (ii) Operation of drones within Visual Line of Sight, (iii) Maintenance of a certain operating distance between drones and persons or properties on the ground/ water surface, (iv) Do not operate drones over event sites where many people gather, (v) Do not transport hazardous materials such as explosives by drone, (vi) Do not drop any objects from drones. Requirements stated in "Airspace in which Flights are Prohibited" and "Operational Limitations" are not applied to flights for search and rescue operations by public organizations in case of accidents and disasters. This paper analyzes legal issues as to definition and regulations of drones in Korean Aviation Safety Act. This paper, also, offers some implications and suggestions for regulations of drones under Korean Aviation Safety Act by comparing the regulations of drones in Japanese Civil Aeronautics Act.

The Acceptance and Transition of Confucian Gamsil in Joseon period (조선시대 유교식 감실(龕室)의 수용과 변용)

  • Park, Jong Min
    • Korean Journal of Heritage: History & Science
    • /
    • v.44 no.4
    • /
    • pp.56-69
    • /
    • 2011
  • A Gamsil is an ritual instrument which enshrine the ancestral tablets of four lines from late great-great-grandfather and grandmother to late father and mother. This has their soul. Juja's "Garye" informs its structure pattern. It is placed in Sadang and takes the form of a perfectly square box. It partitions four rooms and enshrine an ancestral tablet room by room. They get the ancestral tablets line up from west to east. And they also enshrine the ancestral tablets without his descendant together in Gamsil. A Gamsil is a space to enshrine the ancestral tablets and to place an order within a family. A social status and A family economic power become a standard in making and managing Sadang. Kingdom in Joseon period limited the ancestral tablets considering of his degree of official rank which descendant enshrined. A official servant can be stable economically in getting a stipend and build sadang in the house. While household a little in economic enshrine the ancestral tablets at a Gamsil placed at the a space of private home. His personal circumstances make size and pattern, place change in relation to Gamsil. A Gamsil looks like house in structure and pattern. It has the immortality of the soul. And it changed from a table size to a ancestral tablet size. This Gamsil is comfortable to move and is made considering of the width and height of household. The transition of Gamsil means institutions is in close to a family economic power in social change. Kingdom in Joseon early period makes a policy of a Gamyo's build and an ancestral enshrine in basement of Juja's "Garye". The transition of Gamsil gave a common people limitted socially and institutionally the service of late four lines. Most of people enshrine the ancestral tablets of their four lines in approaching of in the late of Joseon Dinasty. They compromise on their reality and cause. The transition of Gamsil implied many different things in social ; the authenticity search and a dignity expression of his family, the foundation for the diffusion of an ancestral service, a space sharing with ancestor and descendent, the increment of a family economic power etc.

Nomad Thinking Implied in Duchamp's Readymades (뒤샹의 레디메이드에 함의된 노마드적 사유)

  • Song, Hayoung
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.3
    • /
    • pp.215-222
    • /
    • 2021
  • Duchamp chose readymades mainly for his denial of retinal painting and his desire and fluid thinking for changes inside him. His thinking is well presented in his readymade works. One of his early readymades, Bicycle Wheel, expresses correlations between beings and capital. Its essence is capital and the desire of beings. It is connected to Desire or Desire-Machine proposed as a social reform and creation model by Gilles Deleuze and Félix Guattari. Bicycle Wheel does not simply end in desire relations between capital and beings, though. When the desire of beings is converted into positive desire, it can keep inventing and creating something that is repetitive, fluid, and new. Duchamp tried to convey this positive desire through his readymade Fountain. Duchamp created a ready-made article toilet into a work of art in Fountain, being driven by desire flowing inside him. This is connected to the attributes of nomads that refused to settle down and continue to flow in search of new landscapes. This way of his thinking is clearly reflected in his Box in a Valise. He was motivated to create this work by his fluid thinking. In this work, various situations can unfold often according to the directions of two elements, place and arrangement. Here, place guarantees fluidity, and arrangement variability or desire. According to Gilles Deleuze and Félix Guattari, fluidity represents nomads with the characteristics of flow and variation, and desire represents productivity or production or creation. Box in a Valise represents nomads themselves. The nomads defined by Gilles Deleuze and Félix Guattari keep flowing and create a new world. They are in line with the thinking of Duchamp that refused to settle down at one place and escape from the old order to create a new artistic world. This type of nomads can be called revolutionists or creators that acknowledge differences and create. Nomads also contain the concept of resistance to the old order. Deleuze and Guattari proposed a war machine as a model of this resistance. Duchamp and his readymades can thus be called war machines.

The Status of North Korean Airspace after Reunification (북한 공역의 통일 후 지위)

  • Kwon, Chang-Young
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.32 no.1
    • /
    • pp.287-325
    • /
    • 2017
  • Considering the development of aerospace, military science and technology since the 20th century, the sky is very important for the nation's existence and prosperity. The proverb "Whosoever commands the space commands the world itself!" emphasizes the need for the command of the air. This essay is the first study on the status of airspace after reunification. First, the territorial airspace is over the territory and territorial sea, and its horizontal extent is determined by the territorial boundary lines. Acceptance of the present order is most reasonable, rather than attempting to reconfigure through historical truths about border issues, and it could be supported by neighboring countries in the reunification period. For peace in Northeast Asia, the reunified Korea needs to respect the existing border agreement between North Korea and China or Russia. However, the North Korean straight baselines established in the East Sea and the Yellow Sea should be discarded because they are not available under United Nations Convention on the Law of the Sea. It is desirable for the reunified Korea to redefine the straight baselines that comply with international law and determine the territorial waters up to and including the 12-nautical mile outside it. Second, the Flight Information Region (hereinafter "FIR") is a region defined by the International Civil Aviation Organization (hereinafter "ICAO") in order to provide information necessary for the safe and efficient flight of aircraft and the search and rescue of aircraft. At present, Korea is divided into Incheon FIR which is under the jurisdiction of South Korea and Pyongyang FIR which is under the jurisdiction of North Korea. If North Korea can not temporarily exercise control of Pyongyang FIR due to a sudden change of circumstances, it is desirable for South Korea to exercise control of Pyongyang FIR, and if it is unavoidable, ICAO should temporarily exercise it. In reunified Korea, it is desirable to abolish Pyongyang FIR and integrate it into Incheon FIR with the approval of ICAO, considering systematic management and control of FIR, establishment of route, and efficiency of management. Third, the Air Defense Identification Zone (hereinafter "ADIZ") is a zone that requires easy identification, positioning, and control of aircraft for national security purposes, and is set up unilaterally by the country concerned. The US unilaterally established the Korea Air Defense Identification Area (KADIZ) by the Declaration of Commitment on March 22, 1951. The Ministry of Defense proclaimed a new KADIZ which extended to the area including IEODO on December 13, 2013. At present, North Korea's military warning zone is set only at maritime boundaries such as the East Sea and the Yellow Sea. But in view of its lack of function as ADIZ in relations with China and Russia, the reunified Korea has no obligation to succeed it. Since the depth of the Korean peninsula is short, it is necessary to set ADIZ boundary on the outskirts of the territorial airspace to achieve the original purpose of ADIZ. Therefore, KADIZ of the reunified Korea should be newly established by the boundary line that coincides with the Incheon FIR of the reunified Korea. However, if there is no buffer zone overlapping with or adjacent to the ADIZs of neighboring countries, military tensions may rise. Therefore, through bilateral negotiations for peace in Northeast Asia, a buffer zone is established between adjacent ADIZs.

  • PDF

A New Approach to Automatic Keyword Generation Using Inverse Vector Space Model (키워드 자동 생성에 대한 새로운 접근법: 역 벡터공간모델을 이용한 키워드 할당 방법)

  • Cho, Won-Chin;Rho, Sang-Kyu;Yun, Ji-Young Agnes;Park, Jin-Soo
    • Asia pacific journal of information systems
    • /
    • v.21 no.1
    • /
    • pp.103-122
    • /
    • 2011
  • Recently, numerous documents have been made available electronically. Internet search engines and digital libraries commonly return query results containing hundreds or even thousands of documents. In this situation, it is virtually impossible for users to examine complete documents to determine whether they might be useful for them. For this reason, some on-line documents are accompanied by a list of keywords specified by the authors in an effort to guide the users by facilitating the filtering process. In this way, a set of keywords is often considered a condensed version of the whole document and therefore plays an important role for document retrieval, Web page retrieval, document clustering, summarization, text mining, and so on. Since many academic journals ask the authors to provide a list of five or six keywords on the first page of an article, keywords are most familiar in the context of journal articles. However, many other types of documents could not benefit from the use of keywords, including Web pages, email messages, news reports, magazine articles, and business papers. Although the potential benefit is large, the implementation itself is the obstacle; manually assigning keywords to all documents is a daunting task, or even impractical in that it is extremely tedious and time-consuming requiring a certain level of domain knowledge. Therefore, it is highly desirable to automate the keyword generation process. There are mainly two approaches to achieving this aim: keyword assignment approach and keyword extraction approach. Both approaches use machine learning methods and require, for training purposes, a set of documents with keywords already attached. In the former approach, there is a given set of vocabulary, and the aim is to match them to the texts. In other words, the keywords assignment approach seeks to select the words from a controlled vocabulary that best describes a document. Although this approach is domain dependent and is not easy to transfer and expand, it can generate implicit keywords that do not appear in a document. On the other hand, in the latter approach, the aim is to extract keywords with respect to their relevance in the text without prior vocabulary. In this approach, automatic keyword generation is treated as a classification task, and keywords are commonly extracted based on supervised learning techniques. Thus, keyword extraction algorithms classify candidate keywords in a document into positive or negative examples. Several systems such as Extractor and Kea were developed using keyword extraction approach. Most indicative words in a document are selected as keywords for that document and as a result, keywords extraction is limited to terms that appear in the document. Therefore, keywords extraction cannot generate implicit keywords that are not included in a document. According to the experiment results of Turney, about 64% to 90% of keywords assigned by the authors can be found in the full text of an article. Inversely, it also means that 10% to 36% of the keywords assigned by the authors do not appear in the article, which cannot be generated through keyword extraction algorithms. Our preliminary experiment result also shows that 37% of keywords assigned by the authors are not included in the full text. This is the reason why we have decided to adopt the keyword assignment approach. In this paper, we propose a new approach for automatic keyword assignment namely IVSM(Inverse Vector Space Model). The model is based on a vector space model. which is a conventional information retrieval model that represents documents and queries by vectors in a multidimensional space. IVSM generates an appropriate keyword set for a specific document by measuring the distance between the document and the keyword sets. The keyword assignment process of IVSM is as follows: (1) calculating the vector length of each keyword set based on each keyword weight; (2) preprocessing and parsing a target document that does not have keywords; (3) calculating the vector length of the target document based on the term frequency; (4) measuring the cosine similarity between each keyword set and the target document; and (5) generating keywords that have high similarity scores. Two keyword generation systems were implemented applying IVSM: IVSM system for Web-based community service and stand-alone IVSM system. Firstly, the IVSM system is implemented in a community service for sharing knowledge and opinions on current trends such as fashion, movies, social problems, and health information. The stand-alone IVSM system is dedicated to generating keywords for academic papers, and, indeed, it has been tested through a number of academic papers including those published by the Korean Association of Shipping and Logistics, the Korea Research Academy of Distribution Information, the Korea Logistics Society, the Korea Logistics Research Association, and the Korea Port Economic Association. We measured the performance of IVSM by the number of matches between the IVSM-generated keywords and the author-assigned keywords. According to our experiment, the precisions of IVSM applied to Web-based community service and academic journals were 0.75 and 0.71, respectively. The performance of both systems is much better than that of baseline systems that generate keywords based on simple probability. Also, IVSM shows comparable performance to Extractor that is a representative system of keyword extraction approach developed by Turney. As electronic documents increase, we expect that IVSM proposed in this paper can be applied to many electronic documents in Web-based community and digital library.

How Enduring Product Involvement and Perceived Risk Affect Consumers' Online Merchant Selection Process: The 'Required Trust Level' Perspective (지속적 관여도 및 인지된 위험이 소비자의 온라인 상인선택 프로세스에 미치는 영향에 관한 연구: 요구신뢰 수준 개념을 중심으로)

  • Hong, Il-Yoo B.;Lee, Jung-Min;Cho, Hwi-Hyung
    • Asia pacific journal of information systems
    • /
    • v.22 no.1
    • /
    • pp.29-52
    • /
    • 2012
  • Consumers differ in the way they make a purchase. An audio mania would willingly make a bold, yet serious, decision to buy a top-of-the-line home theater system, while he is not interested in replacing his two-decade-old shabby car. On the contrary, an automobile enthusiast wouldn't mind spending forty thousand dollars to buy a new Jaguar convertible, yet cares little about his junky component system. It is product involvement that helps us explain such differences among individuals in the purchase style. Product involvement refers to the extent to which a product is perceived to be important to a consumer (Zaichkowsky, 2001). Product involvement is an important factor that strongly influences consumer's purchase decision-making process, and thus has been of prime interest to consumer behavior researchers. Furthermore, researchers found that involvement is closely related to perceived risk (Dholakia, 2001). While abundant research exists addressing how product involvement relates to overall perceived risk, little attention has been paid to the relationship between involvement and different types of perceived risk in an electronic commerce setting. Given that perceived risk can be a substantial barrier to the online purchase (Jarvenpaa, 2000), research addressing such an issue will offer useful implications on what specific types of perceived risk an online firm should focus on mitigating if it is to increase sales to a fullest potential. Meanwhile, past research has focused on such consumer responses as information search and dissemination as a consequence of involvement, neglecting other behavioral responses like online merchant selection. For one example, will a consumer seriously considering the purchase of a pricey Guzzi bag perceive a great degree of risk associated with online buying and therefore choose to buy it from a digital storefront rather than from an online marketplace to mitigate risk? Will a consumer require greater trust on the part of the online merchant when the perceived risk of online buying is rather high? We intend to find answers to these research questions through an empirical study. This paper explores the impact of enduring product involvement and perceived risks on required trust level, and further on online merchant choice. For the purpose of the research, five types or components of perceived risk are taken into consideration, including financial, performance, delivery, psychological, and social risks. A research model has been built around the constructs under consideration, and 12 hypotheses have been developed based on the research model to examine the relationships between enduring involvement and five components of perceived risk, between five components of perceived risk and required trust level, between enduring involvement and required trust level, and finally between required trust level and preference toward an e-tailer. To attain our research objectives, we conducted an empirical analysis consisting of two phases of data collection: a pilot test and main survey. The pilot test was conducted using 25 college students to ensure that the questionnaire items are clear and straightforward. Then the main survey was conducted using 295 college students at a major university for nine days between December 13, 2010 and December 21, 2010. The measures employed to test the model included eight constructs: (1) enduring involvement, (2) financial risk, (3) performance risk, (4) delivery risk, (5) psychological risk, (6) social risk, (7) required trust level, (8) preference toward an e-tailer. The statistical package, SPSS 17.0, was used to test the internal consistency among the items within the individual measures. Based on the Cronbach's ${\alpha}$ coefficients of the individual measure, the reliability of all the variables is supported. Meanwhile, the Amos 18.0 package was employed to perform a confirmatory factor analysis designed to assess the unidimensionality of the measures. The goodness of fit for the measurement model was satisfied. Unidimensionality was tested using convergent, discriminant, and nomological validity. The statistical evidences proved that the three types of validity were all satisfied. Now the structured equation modeling technique was used to analyze the individual paths along the relationships among the research constructs. The results indicated that enduring involvement has significant positive relationships with all the five components of perceived risk, while only performance risk is significantly related to trust level required by consumers for purchase. It can be inferred from the findings that product performance problems are mostly likely to occur when a merchant behaves in an opportunistic manner. Positive relationships were also found between involvement and required trust level and between required trust level and online merchant choice. Enduring involvement is concerned with the pleasure a consumer derives from a product class and/or with the desire for knowledge for the product class, and thus is likely to motivate the consumer to look for ways of mitigating perceived risk by requiring a higher level of trust on the part of the online merchant. Likewise, a consumer requiring a high level of trust on the merchant will choose a digital storefront rather than an e-marketplace, since a digital storefront is believed to be trustworthier than an e-marketplace, as it fulfills orders by itself rather than acting as an intermediary. The findings of the present research provide both academic and practical implications. The first academic implication is that enduring product involvement is a strong motivator of consumer responses, especially the selection of a merchant, in the context of electronic shopping. Secondly, academicians are advised to pay attention to the finding that an individual component or type of perceived risk can be used as an important research construct, since it would allow one to pinpoint the specific types of risk that are influenced by antecedents or that influence consequents. Meanwhile, our research provides implications useful for online merchants (both online storefronts and e-marketplaces). Merchants may develop strategies to attract consumers by managing perceived performance risk involved in purchase decisions, since it was found to have significant positive relationship with the level of trust required by a consumer on the part of the merchant. One way to manage performance risk would be to thoroughly examine the product before shipping to ensure that it has no deficiencies or flaws. Secondly, digital storefronts are advised to focus on symbolic goods (e.g., cars, cell phones, fashion outfits, and handbags) in which consumers are relatively more involved than others, whereas e- marketplaces should put their emphasis on non-symbolic goods (e.g., drinks, books, MP3 players, and bike accessories).

  • PDF

The Definition of Outer Space and the Air/Outer Space Boundary Question (우주의 법적 지위와 경계획정 문제)

  • Lee, Young-Jin
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.30 no.2
    • /
    • pp.427-468
    • /
    • 2015
  • To date, we have considered the theoretical views, the standpoint of states and the discourse within the international community such as the UN Committee on the Peaceful Uses of Outer Space(COPUOS) regarding the Air/Outer Space Boundary Question which is one of the first issues of UN COPUOS established in line with marking the starting point of Outer Space Area. As above mentioned, discussions in the United Nations and among scholars of within each state regarding the delimitation issue often saw a division between those in favor of a functional approach (the functionalists) and those seeking the delineation of a boundary (the spatialists). The spatialists emphasize that the boundary between air and outer space should be delimited because the status of outer space is a type of public domain from which sovereign jurisdiction is excluded, as stated in Article 2 of Outer Space Treaty. On the contrary art. I of Chicago Convention is evidence of the acknowledgement of sovereignty over airspace existing as an international customary law, has the binding force of which exists independently of the Convention. The functionalists, backed initially by the major space powers, which viewed any boundary demarcation as possibly restricting their access to space, whether for peaceful or non-military purposes, considered it insufficient or inadequate to delimit a boundary of outer space without obvious scientific and technological evidences. Last more than 50 years there were large development in the exploration and use of outer space. But a large number states including those taking the view of a functionalist have taken on a negative attitude. As the element of location is a decisive factor for the choice of the legal regime to be applied, a purely functional approach to the regulation of activities in the space above the Earth does not offer a solution. It seems therefore to welcome the arrival of clear evidence of a growing recognition of and national practices concerning a spatial approach to the problem is gaining support both by a large number of States as well as by publicists. The search for a solution to the problem of demarcating the two different legal regimes governing the space above Earth has undoubtedly been facilitated and a number of countries including Russia have already advocated the acceptance of the lowest perigee boundary of outer space at a height of 100km. As a matter of fact the lowest perigee where space objects are still able to continue in their orbiting around the earth has already been imposed as a natural criterion for the delimitation of outer space. This delimitation of outer space has also been evidenced by the constant practice of a large number of States and their tacit consent to space activities accomplished so far at this distance and beyond it. Of course there are still numerous opposing views on the delineation of a outer space boundary by space powers like U.S.A., England, France and so on. Therefore, first of all to solve the legal issues faced by the international community in outer space activities like delimitation problem, there needs a positive and peaceful will of international cooperation. From this viewpoint, President John F. Kennedy once described the rationale behind the outer space activities in his famous "Moon speech" given at Rice University in 1962. He called upon Americans and all mankind to strive for peaceful cooperation and coexistence in our future outer space activities. And Kennedy explained, "There is no strife, ${\ldots}$ nor any international conflict in outer space as yet. But its hazards are hostile to us all: Its conquest deserves the best of all mankind, and its opportunity for peaceful cooperation may never come again." This speech seems to even present us in the contemporary era with ample suggestions for further peaceful cooperation in outer space activities including the delimitation of outer space.