• Title/Summary/Keyword: negative influence

Search Result 3,326, Processing Time 0.031 seconds

A Study on the Critical Success Factors of Social Commerce through the Analysis of the Perception Gap between the Service Providers and the Users: Focused on Ticket Monster in Korea (서비스제공자와 사용자의 인식차이 분석을 통한 소셜커머스 핵심성공요인에 대한 연구: 한국의 티켓몬스터 중심으로)

  • Kim, Il Jung;Lee, Dae Chul;Lim, Gyoo Gun
    • Asia pacific journal of information systems
    • /
    • v.24 no.2
    • /
    • pp.211-232
    • /
    • 2014
  • Recently, there is a growing interest toward social commerce using SNS(Social Networking Service), and the size of its market is also expanding due to popularization of smart phones, tablet PCs and other smart devices. Accordingly, various studies have been attempted but it is shown that most of the previous studies have been conducted from perspectives of the users. The purpose of this study is to derive user-centered CSF(Critical Success Factor) of social commerce from the previous studies and analyze the CSF perception gap between social commerce service providers and users. The CSF perception gap between two groups shows that there is a difference between ideal images the service providers hope for and the actual image the service users have on social commerce companies. This study provides effective improvement directions for social commerce companies by presenting current business problems and its solution plans. For this, This study selected Korea's representative social commerce business Ticket Monster, which is dominant in sales and staff size together with its excellent funding power through M&A by stock exchange with the US social commerce business Living Social with Amazon.com as a shareholder in August, 2011, as a target group of social commerce service provider. we have gathered questionnaires from both service providers and the users from October 22, 2012 until October 31, 2012 to conduct an empirical analysis. We surveyed 160 service providers of Ticket Monster We also surveyed 160 social commerce users who have experienced in using Ticket Monster service. Out of 320 surveys, 20 questionaries which were unfit or undependable were discarded. Consequently the remaining 300(service provider 150, user 150)were used for this empirical study. The statistics were analyzed using SPSS 12.0. Implications of the empirical analysis result of this study are as follows: First of all, There are order differences in the importance of social commerce CSF between two groups. While service providers regard Price Economic as the most important CSF influencing purchasing intention, the users regard 'Trust' as the most important CSF influencing purchasing intention. This means that the service providers have to utilize the unique strong point of social commerce which make the customers be trusted rathe than just focusing on selling product at a discounted price. It means that service Providers need to enhance effective communication skills by using SNS and play a vital role as a trusted adviser who provides curation services and explains the value of products through information filtering. Also, they need to pay attention to preventing consumer damages from deceptive and false advertising. service providers have to create the detailed reward system in case of a consumer damages caused by above problems. It can make strong ties with customers. Second, both service providers and users tend to consider that social commerce CSF influencing purchasing intention are Price Economic, Utility, Trust, and Word of Mouth Effect. Accordingly, it can be learned that users are expecting the benefit from the aspect of prices and economy when using social commerce, and service providers should be able to suggest the individualized discount benefit through diverse methods using social network service. Looking into it from the aspect of usefulness, service providers are required to get users to be cognizant of time-saving, efficiency, and convenience when they are using social commerce. Therefore, it is necessary to increase the usefulness of social commerce through the introduction of a new management strategy, such as intensification of search engine of the Website, facilitation in payment through shopping basket, and package distribution. Trust, as mentioned before, is the most important variable in consumers' mind, so it should definitely be managed for sustainable management. If the trust in social commerce should fall due to consumers' damage case due to false and puffery advertising forgeries, it could have a negative influence on the image of the social commerce industry in general. Instead of advertising with famous celebrities and using a bombastic amount of money on marketing expenses, the social commerce industry should be able to use the word of mouth effect between users by making use of the social network service, the major marketing method of initial social commerce. The word of mouth effect occurring from consumers' spontaneous self-marketer's duty performance can bring not only reduction effect in advertising cost to a service provider but it can also prepare the basis of discounted price suggestion to consumers; in this context, the word of mouth effect should be managed as the CSF of social commerce. Third, Trade safety was not derived as one of the CSF. Recently, with e-commerce like social commerce and Internet shopping increasing in a variety of methods, the importance of trade safety on the Internet also increases, but in this study result, trade safety wasn't evaluated as CSF of social commerce by both groups. This study judges that it's because both service provider groups and user group are perceiving that there is a reliable PG(Payment Gateway) which acts for e-payment of Internet transaction. Accordingly, it is understood that both two groups feel that social commerce can have a corporate identity by website and differentiation in products and services in sales, but don't feel a big difference by business in case of e-payment system. In other words, trade safety should be perceived as natural, basic universal service. Fourth, it's necessary that service providers should intensify the communication with users by making use of social network service which is the major marketing method of social commerce and should be able to use the word of mouth effect between users. The word of mouth effect occurring from consumers' spontaneous self- marketer's duty performance can bring not only reduction effect in advertising cost to a service provider but it can also prepare the basis of discounted price suggestion to consumers. in this context, it is judged that the word of mouth effect should be managed as CSF of social commerce. In this paper, the characteristics of social commerce are limited as five independent variables, however, if an additional study is proceeded with more various independent variables, more in-depth study results will be derived. In addition, this research targets social commerce service providers and the users, however, in the consideration of the fact that social commerce is a two-sided market, drawing CSF through an analysis of perception gap between social commerce service providers and its advertisement clients would be worth to be dealt with in a follow-up study.

A Model for Health Promoting Behaviors in Late-middle Aged Woman (중년후기 여성의 건강증진행위 모형구축)

  • Park, Chai-Soon
    • Women's Health Nursing
    • /
    • v.2 no.2
    • /
    • pp.298-331
    • /
    • 1996
  • Recent improvements in living standard and development in medical care led to an increased interest in life expectancy and personal health, and also led to a more demand for higher quality of life. Thus, the problem of women's health draw a fresh interest nowadays. Since late-middle aged women experience various physical and socio-psychological changes and tend to have chronic illnesses, these women have to take initiatives for their health control by realizing their own responsibility. The basic elements for a healthy life of these women are understanding of their physical and psychological changes and acceptance of these changes. Health promoting behaviors of an individual or a group are actions toward increasing the level of well-being and self-actualization, and are affected by various variables. In Pender's health promoting model, variables are categorized into cognitive factors(individual perceptions), modifying factors, and variables affecting the likelihood for actions, and the model assumes the health promoting behaviors are affected by cognitive factors which are again affected by demographic factors. Since Pender's model was proposed based on a tool broad conceptual frame, many studies done afterwards have included only a limited number of variables of Pender's model. Furthermore, Pender's model did not precisely explain the possibilities of direct and indirect paths effects. The objectives of this study are to evaluate Pender's model and thus propose a model that explains health promoting behaviors among late-middle aged women in order to facilitate nursing intervention for this group of population. The hypothetical model was developed based on the Pender's health promoting model and the findings from past studies on women's health. Data were collected by self-reported questionnaires from 417 women living in Seoul, between July and November 1994. Questionnaires were developed based on instruments of Walker and others' health promotion lifestyle profile, Wallston and others' multidimensional health locus of control, Maoz's menopausal symptom check list and Speake and others' health self-rating scale. IN addition, items measuring self-efficacy were made by the present author based on past studies. In a pretest, the questionnaire items were reliable with Cronbach's alpha ranging from .786 to .934. The models for health promoting behaviors were tested by using structural equation modelling technique with LISREL 7.20. The results were summarized as follows : 1. The overall fit of the hypothetical model to the data was good (chi-square=4.42, df=5, p=.490, GFI=.995, AGFI=.962, RMSR=.024). 2. Paths of the model were modified by considering both its theoretical implication and statistical significance of the parameter estimates. Compared to the hypothetical model, the revised model has become parsimonious and had a better fit to the data (chi-square =4.55, df=6, p=.602, GFI=.995, AGFI=.967, RMSR=.024). 3. The results of statistical testing were as follows : 1) Family function internal health locus of control, self-efficacy, and education level exerted significant effects on health promoting behaviors(${\gamma}_{43}$=.272, T=3.714; ${\beta}_[41}$=.211, T=2.797; ${\beta}_{42}$=.199, T=2.717; ${\gamma}_{41}$=.136, T=1.986). The effect of economic status, physical menopausal symptoms, and perceived health status on health promoting behavior were insignificant(${\gamma}_{42}$=.095, T=1.456; ${\gamma}_{44}$=.101, T=1.143; ${\gamma}_{43}$=.082, T=.967). 2) Family function had a significance direct effect on internal health locus of control (${\gamma}_{13}$=.307, T=3.784). The direct effect of education level on internal health locus of control was insignificant(${\gamma}_{11}$=-.006, T=-.081). 3) The directs effects of family functions & internal health locus of control on self-efficacy were significant(${\gamma}_{23}$=.208, T=2.607; ${\beta}_{21}$=.191, T=2.2693). But education level and economic status did not exert a significant effect on self-efficacy(${\gamma}_{21}$=.137, T=1.814; ${\beta}_{22}$=.137, T=1.814; ${\gamma}_{22}$=.112, T=1.499). 4) Education level had a direct and positive effect on perceived health status, but physical menopausal symptoms had a negative effect on perceived health status and these effects were all significant(${\gamma}_{31}$=.171, T=2.496; ${\gamma}_{34}$=.524, T=-7.120). Internal health locus and self-efficacy had an insignificant direct effect on perceived health status(${\beta}_{31}$=.028, T=.363; ${\beta}_{32}$=.041, T=.557). 5) All predictive variables of health promoting behaviors explained 51.8% of the total variance in the model. The above findings show that health promoting behaviors are explained by personal, environmental and perceptual factors : family function, internal health locus of control, self-efficacy, and education level had stronger effects on health promoting behaviors than predictors in the model. A significant effect of family function on health promoting behaviors reflects an important role of the Korean late-middle aged women in family relationships. Therefore, health professionals first need to have a proper evaluation of family function in order to reflect the family function style into nursing interventions and development of strategies. These interventions and strategies will enhance internal health locus of control and self-efficacy for promoting health behaviors. Possible strategies include management of health promoting programs, use of a health information booklets, and individual health counseling, which will enhance internal health locus of control and self-efficacy of the late-middle aged women by making them aware of health responsibilities and value for oneself. In this study, an insignificant effect of physical menopausal symptoms and perceived health status on health promoting behaviors implies that they are not motive factors for health promoting behaviors. Further analytic researches are required to clarify the influence of physical menopausal symptoms and perceived health status on health promoting behaviors with-middle aged women.

  • PDF

Determinants of Consumer Responses to Retail Out-of-Stocks (점포내 품절상황에서 소비자 반응행동유형별 결정요인)

  • Chun, Dal-Young;Choi, Jong-Rae;Joo, Young-Jin
    • Journal of Distribution Research
    • /
    • v.16 no.4
    • /
    • pp.29-64
    • /
    • 2011
  • Overview of Research: Product availability is one of important competences of store to fulfill consumer needs. If stock-outs which means a product what consumer wants to buy is not available occurs, consumer will face decision-making uncertainty that leads to consumer's negative responses such as consumer dissatisfaction on store. Stockouts was much studied in the field of academia as well as practice in other countries. However, stock-outs has not been researched at all in Marketing and/or Distribution area in Korea. The main objectives of this study are to find out determinants of consumer responses such as Substitute, Delay, and Leave(SDL) when consumer encounters out-of-stock situation and then to examine the effects of these factors on consumer responses. Specifically, this study focuses on situational characteristics(e.g., purchase urgency and surprise), store characteristics (e.g., product assortment and store convenience), and consumer characteristics (e.g., brand loyalty and store loyalty). Then, this study empirically investigates relationships these factors with consumers behaviors such as product substitution, purchase delay, and store switching.

    shows the research model of this study. To accomplish above-mentioned research objectives, the following ten hypotheses were proposed and verified : ${\bullet}$ H 1 : When out-of-stock situation occurs, purchase urgency will increase product substitution but will decrease purchase delay and store switching among consumer responses. ${\bullet}$ H 2 When out-of-stock situation occurs, surprise will decrease product substitution and purchase delay but will Increase store switching among consumer responses. ${\bullet}$ H 3 : When out-of-stock situation occurs, purchase quantities will increase product substitution and store switching but will decrease purchase delay among consumer responses. ${\bullet}$ H 4 : When out-of-stock situation occurs, pre-purchase plan will decrease product substitution but will increase purchase delay and store switching among consumer responses. ${\bullet}$ H 5 : When out-of-stock situation occurs, product assortment will increase product substitution but will decrease purchase delay and store switching among consumer responses. ${\bullet}$ H 6 : When out-of-stock situation occurs, competitive store price image will increase product substitution and purchase delay but will decrease store switching among consumer responses. ${\bullet}$ H 7 : When out-of-stock situation occurs, store convenience will increase product substitution but will decrease purchase delay and store switching among consumer responses. ${\bullet}$ H 8 : When out-of-stock situation occurs, salesperson services will increase product substitution but will decrease purchase delay and store switching among consumer responses. ${\bullet}$ H 9 : When out-of-stock situation occurs, brand loyalty will decrease product substitution but will increase purchase delay and store switching among consumer responses. ${\bullet}$ H 10 When out-of-stock situation occurs, store loyalty will increase product substitution and purchase delay but will decrease store switching among consumer responses. Analysis: Data were collected from 353 respondents who experienced out-of-stock situations in various store types such as large discount stores, supermarkets, etc. Research model and hypotheses were verified using multinomial logit(MNL) analysis. Results and Implications: is the estimation results of l\1NL model, and
    shows the marginal effects for each determinant to consumer's responses(SDL). Significant statistical results were as follows. Purchase urgency, purchase quantities, pre-purchase plan, product assortment, store price image, brand loyalty, and store loyalty were turned out to be significant determinants to influence consumer alternative behaviors in case of out-of-stock situation. Specifically, first, product substitution behavior was triggered by purchase urgency, surprise, purchase quantities, pre-purchase plan, product assortment, store price image, brand loyalty, and store loyalty. Second, purchase delay behavior was led by purchase urgency, purchase quantities, and brand loyalty. Third, store switching behavior was influenced by purchase urgency, purchase quantities, pre-purchase plan, product assortment, store price image, brand loyalty, and store loyalty. Finally, when out-of-stock situation occurs, store convenience and salesperson service did not have significant effects on consumer alternative responses.

  • PDF
  • Mediating Roles of Attachment for Information Sharing in Social Media: Social Capital Theory Perspective (소셜 미디어에서 정보공유를 위한 애착의 매개역할: 사회적 자본이론 관점)

    • Chung, Namho;Han, Hee Jeong;Koo, Chulmo
      • Asia pacific journal of information systems
      • /
      • v.22 no.4
      • /
      • pp.101-123
      • /
      • 2012
    • Currently, Social Media, it has widely a renown keyword and its related social trends and businesses have been fastly applied into various contexts. Social media has become an important research area for scholars interested in online technologies and cyber space and their social impacts. Social media is not only including web-based services but also mobile-based application services that allow people to share various style information and knowledge through online connection. Social media users have tendency to common identity- and bond-attachment through interactions such as 'thumbs up', 'reply note', 'forwarding', which may have driven from various factors and may result in delivering information, sharing knowledge, and specific experiences et al. Even further, almost of all social media sites provide and connect unknown strangers depending on shared interests, political views, or enjoyable activities, and other stuffs incorporating the creation of contents, which provides benefits to users. As fast developing digital devices including smartphone, tablet PC, internet based blogging, and photo and video clips, scholars desperately have began to study regarding diverse issues connecting human beings' motivations and the behavioral results which may be articulated by the format of antecedents as well as consequences related to contents that people create via social media. Social media such as Facebook, Twitter, or Cyworld users are more and more getting close each other and build up their relationships by a different style. In this sense, people use social media as tools for maintain pre-existing network, creating new people socially, and at the same time, explicitly find some business opportunities using personal and unlimited public networks. In terms of theory in explaining this phenomenon, social capital is a concept that describes the benefits one receives from one's relationship with others. Thereby, social media use is closely related to the form and connected of people, which is a bridge that can be able to achieve informational benefits of a heterogeneous network of people and common identity- and bonding-attachment which emphasizes emotional benefits from community members or friend group. Social capital would be resources accumulated through the relationships among people, which can be considered as an investment in social relations with expected returns and may achieve benefits from the greater access to and use of resources embedded in social networks. Social media using for their social capital has vastly been adopted in a cyber world, however, there has been little explaining the phenomenon theoretically how people may take advantages or opportunities through interaction among people, why people may interactively give willingness to help or their answers. The individual consciously express themselves in an online space, so called, common identity- or bonding-attachments. Common-identity attachment is the focus of the weak ties, which are loose connections between individuals who may provide useful information or new perspectives for one another but typically not emotional support, whereas common-bonding attachment is explained that between individuals in tightly-knit, emotionally close relationship such as family and close friends. The common identify- and bonding-attachment are mainly studying on-offline setting, which individual convey an impression to others that are expressed to own interest to others. Thus, individuals expect to meet other people and are trying to behave self-presentation engaging in opposite partners accordingly. As developing social media, individuals are motivated to disclose self-disclosures of open and honest using diverse cues such as verbal and nonverbal and pictorial and video files to their friends as well as passing strangers. Social media context, common identity- and bond-attachment for self-presentation seems different compared with face-to-face context. In the realm of social media, social users look for self-impression by posting text messages, pictures, video files. Under the digital environments, people interact to work, shop, learn, entertain, and be played. Social media provides increasingly the kinds of intention and behavior in online. Typically, identity and bond social capital through self-presentation is the intentional and tangible component of identity. At social media, people try to engage in others via a desired impression, which can maintain through performing coherent and complementary communications including displaying signs, symbols, brands made of digital stuffs(information, interest, pictures, etc,). In marketing area, consumers traditionally show common-identity as they select clothes, hairstyles, automobiles, logos, and so on, to impress others in any given context in a shopping mall or opera. To examine these social capital and attachment, we combined a social capital theory with an attachment theory into our research model. Our research model focuses on the common identity- and bond-attachment how they are formulated through social capitals: cognitive capital, structural capital, relational capital, and individual characteristics. Thus, we examined that individual online kindness, self-rated expertise, and social relation influence to build common identity- and bond-attachment, and the attachment effects make an impact on both the willingness to help, however, common bond seems not to show directly impact on information sharing. As a result, we discover that the social capital and attachment theories are mainly applicable to the context of social media and usage in the individual networks. We collected sample data of 256 who are using social media such as Facebook, Twitter, and Cyworld and analyzed the suggested hypotheses through the Structural Equation Model by AMOS. This study analyzes the direct and indirect relationship between the social network service usage and outcomes. Antecedents of kindness, confidence of knowledge, social relations are significantly affected to the mediators common identity-and bond attachments, however, interestingly, network externality does not impact, which we assumed that a size of network was a negative because group members would not significantly contribute if the members do not intend to actively interact with each other. The mediating variables had a positive effect on toward willingness to help. Further, common identity attachment has stronger significant on shared information.

    • PDF

    The Roles of Service Failure and Recovery Satisfaction in Customer-Firm Relationship Restoration : Focusing on Carry-over effect and Dynamics among Customer Affection, Customer Trust and Loyalty Intention Before and After the Events (서비스실패의 심각성과 복구만족이 고객-기업 관계회복에 미치는 영향 : 실패이전과 복구이후 고객애정, 고객신뢰, 충성의도의 이월효과 및 역학관계 비교를 중심으로)

    • La, Sun-A
      • Journal of Distribution Research
      • /
      • v.17 no.1
      • /
      • pp.1-36
      • /
      • 2012
    • Service failure is one of the major reasons for customer defection. As the business environment gets tougher and more competitive, a single service failure might bring about fatal consequences to a service provider or a firm. Sometimes a failure won't end up with an unsatisfied customer's simple complaining but with a wide-spread animosity against the service provider or the firm, leading to a threat to the firm's survival itself in the society. Therefore, we are in need of comprehensive understandings of complainants' attitudes and behaviors toward service failures and firm's recovery efforts. Even though a failure itself couldn't be fixed completely, marketers should repair the mind and heart of unsatisfied customers, which can be regarded as an successful recovery strategy in the end. As the outcome of recovery efforts exerted by service providers or firms, recovery of the relationship between customer and service provider need to put on the top in the recovery goal list. With these motivations, the study investigates how service failure and recovery makes the changes in dynamics of fundamental elements of customer-firm relationship, such as customer affection, customer trust and loyalty intention by comparing two time points, before the service failure and after the recovery, focusing on the effects of recovery satisfaction and the failure severity. We adopted La & Choi (2012)'s framework for development of the research model that was based on the previous research stream like Yim et al. (2008) and Thomson et al. (2005). The pivotal background theories of the model are mainly from relationship marketing and social relationships of social psychology. For example, Love, Emotional attachment, Intimacy, and Equity theories regarding human relationships were reviewed. As the results, when recovery satisfaction is high, customer affection and customer trust that were established before the service failure are carried over to the future after the recovery. However, when recovery satisfaction is low, customer-firm relationship that had already established in the past are not carried over but broken up. Regardless of the degree of recovery satisfaction, once a failure occurs loyalty intention is not carried over to the future and the impact of customer trust on loyalty intention becomes stronger. Such changes imply that customers become more prudent and more risk-aversive than the time prior to service failure. The impact of severity of failure on customer affection and customer trust matters only when recovery satisfaction is low. When recovery satisfaction is high, customer affection and customer trust become severity-proof. Interestingly, regardless of the degree of recovery satisfaction, failure severity has a significant negative influence on loyalty intention. Loyalty intention is the most fragile target when a service failure occurs no matter how severe the failure criticality is. Consequently, the ultimate goal of service recovery should be the restoration of customer-firm relationship and recovery of customer trust should be the primary objective to accomplish for a successful recovery performance. Especially when failure severity is high, service recovery should be perceived highly satisfied by the complainants because failure severity matters more when recovery satisfaction is low. Marketers can implement recovery strategies to enhance emotional appeals as well as fair treatments since the both impacts of affection and trust on loyalty intention are significant. In the case of high severity of failure, recovery efforts should be exerted to overreach customer expectation, designed to directly repair customer trust and elaborately designed in the focus of customer-firm communications during the interactional recovery process to affect customer trust rebuilding indirectly. Because it is a longer and harder way to rebuild customer-firm relationship for high severity cases, low recovery satisfaction cannot guarantee customer retention. To prevent customer defection due to service failure of high severity, unexpected rewards as a recovery will be likely to be useful since those will lead to customer delight or customer gratitude toward the service firm. Based on the results of analyses, theoretical and managerial implications are presented. Limitations and future research ideas are also discussed.

    • PDF

    Corporate Governance and Managerial Performance in Public Enterprises: Focusing on CEOs and Internal Auditors (공기업의 지배구조와 경영성과: CEO와 내부감사인을 중심으로)

    • Yu, Seung-Won
      • KDI Journal of Economic Policy
      • /
      • v.31 no.1
      • /
      • pp.71-103
      • /
      • 2009
    • Considering the expenditure size of public institutions centering on public enterprises, about 28% of Korea's GDP in 2007, public institutions have significant influence on the Korean economy. However, still in the new government, there are voices of criticism about the need of constant reform on public enterprises due to their irresponsible management impeding national competitiveness. Especially, political controversy over appointment of executives such as CEOs of public enterprises has caused the distrust of the people. As one of various reform measures for public enterprises, this study analyzes the effect of internal governance structure of public enterprises on their managerial performance, since, regardless of privatization of public enterprises, improving the governance structure of public enterprises is a matter of great importance. There are only a few prior researches focusing on the governance structure and managerial performance of public enterprises compared to those of private enterprises. Most of prior researches studied the relationship between parachuting employment of CEO and managerial performance, and concluded that parachuting produces negative effect on managerial performance. However, different from the results of such researches, recent studies suggest that there is no relationship between employment type of CEOs and managerial performance in public enterprises. This study is distinguished from prior researches in view of following. First, prior researches focused on the relationship between employment type of public enterprises' CEOs and managerial performance. However, in addition to this, this study analyzes the relationship of internal auditors and managerial performance. Second, unlike prior researches studying the relationship between employment type of public corporations' CEOs and managerial performance with an emphasis on parachuting employment, this study researches impact of employment type as well as expertise of CEOs and internal auditors on managerial performance. Third, prior researchers mainly used non-financial indicators from various samples. However, this study eliminated subjectivity of researchers by analyzing public enterprises designated by the government and their financial statements, which were externally audited and inspected. In this study, regression analysis is applied in analyzing the relationship of independence and expertise of public enterprises' CEOs and internal auditors and managerial performance in the same year. Financial information from 2003 to 2007 of 24 public enterprises, which are designated by the government, and their personnel information from the board of directors are used as samples. Independence of CEOs is identified by dividing CEOs into persons from the same public enterprise and persons from other organization, and independence of internal auditors is determined by classifying them into two groups, people from academic field, economic world, and civic groups, and people from political community, government ministries, and military. Also, expertise of CEOs and internal auditors is divided into business expertise and financial expertise. As control variables, this study applied foundation year, asset size, government subsidies as a proportion to corporate earnings, and dummy variables by year. Analysis showed that there is significantly positive relationship between independence and financial expertise of internal auditors and managerial performance. In addition, although business expertise and financial expertise of CEOs were not statistically significant, they have positive relationship with managerial performance. However, unlike a general idea, independence of CEOs is not statistically significant, but it is negatively related to managerial performance. Contrary to general concerns, it seems that the impact of independence of public enterprises' CEOs on managerial performance has slightly decreased. Instead, it explains that expertise of public enterprises' CEOs and internal auditors plays more important role in managerial performance rather than their independence. Meanwhile, there are limitations in this study as follows. First, in contrast to private enterprises, public enterprises simultaneously pursue publicness and entrepreneurship. However, this study focuses on entrepreneurship, excluding considerations on publicness of public enterprises. Second, public enterprises in this study are limited to those in the central government. Accordingly, it should be carefully considered when the result of this study is applied to public enterprises in local governments. Finally, this study excludes factors related to transparency and democracy issues which are raised in appointment process of executives of public enterprises, as it may cause the issue of subjectivity of researchers.

    • PDF

    A study on Operation Rules of Korean Air Defence Identification Zone (한국 방공식별구역 운영규칙에 관한 고찰)

    • Kwon, Jong-Pil;Lee, Yeong H.
      • The Korean Journal of Air & Space Law and Policy
      • /
      • v.32 no.2
      • /
      • pp.189-217
      • /
      • 2017
    • Declaration of Air Defense and Identification Zones started with the United States in 1950, which was followed by declaration of KADIZ by the Republic of Korea in 1951. Initial ADIZ were solely linked with air defense missions, but their roles have changed as nations around the globe manifested a tendency to expand their influence over maritime resources and rights. In particular, China declared ADIZ over the East China Sea in October 2013 and forced all passing aircraft to submit flight plan to ATC or military authority, saying failure of submission will be followed by armed engagement. China announced it would declare another zone over the South China Sea despite the ongoing conflict in the area, clearly showing ADIZ's direct connection with territorial claim and EEZ and that it serves as a zone within which a nation can execute its rights. The expanded KADIZ, which was expanded in Dec 15, 2013 in response to Chinese actions, overlaps with the Chinese ADIZ over the East China Sea and the Japanese ADIZ. The overlapping zone is an airspace over waters where not only the Republic of Korea but also of China and Japan argue to be covering their continental shelf and EEZ. Military conventions were signed to prevent contingencies among the neighboring nations while conducting identifications in KADIZ, including the overlapping zone. If such military conventions and practice of air defense identification continue to be respected among states, it is under the process of turning into a regional customary law, although ADIZ is not yet recognized by international law or customary law. Moreover, identification within ADIZ is carried out by military authorities of states, and misguided customary procedures may cause serious negative consequences for national security since it may negatively impact neighboring countries in marking the maritime border, which calls for formulation of operation rules that account for other state activities and military talks among regional stake holders. Legal frameworks need to be in place to guarantee freedom of flights over international seas which UN Maritime Law protects, and laws regarding military aircraft operation need to be supplemented to not make it a requirement to submit flight plan if the aircraft does not invade sovereign airspace. Organizational instructions that require approval of Chairman of Joint Chiefs of Staff for entrance and exit of ADIZ for military aircraft need to be amended to change the authority to Minister of National Defense or be promoted to a law to be applicable for commercial aircraft. Moreover, in regards to operation and management of ADIZ, transfer of authority should be prohibited to account for its evolution into a regional customary law in South East Asia. In particular, since ADIZ is set over EEZ, military conventions that yield authority related to national security should never be condoned. Among Korea, China, Japan and Russia, there are military conventions that discuss operation and management of ADIZ in place or under negotiation, meaning that ADIZ is becoming a regional customary law in North East Asia region.

    • PDF

    The Framework of Research Network and Performance Evaluation on Personal Information Security: Social Network Analysis Perspective (개인정보보호 분야의 연구자 네트워크와 성과 평가 프레임워크: 소셜 네트워크 분석을 중심으로)

    • Kim, Minsu;Choi, Jaewon;Kim, Hyun Jin
      • Journal of Intelligence and Information Systems
      • /
      • v.20 no.1
      • /
      • pp.177-193
      • /
      • 2014
    • Over the past decade, there has been a rapid diffusion of electronic commerce and a rising number of interconnected networks, resulting in an escalation of security threats and privacy concerns. Electronic commerce has a built-in trade-off between the necessity of providing at least some personal information to consummate an online transaction, and the risk of negative consequences from providing such information. More recently, the frequent disclosure of private information has raised concerns about privacy and its impacts. This has motivated researchers in various fields to explore information privacy issues to address these concerns. Accordingly, the necessity for information privacy policies and technologies for collecting and storing data, and information privacy research in various fields such as medicine, computer science, business, and statistics has increased. The occurrence of various information security accidents have made finding experts in the information security field an important issue. Objective measures for finding such experts are required, as it is currently rather subjective. Based on social network analysis, this paper focused on a framework to evaluate the process of finding experts in the information security field. We collected data from the National Discovery for Science Leaders (NDSL) database, initially collecting about 2000 papers covering the period between 2005 and 2013. Outliers and the data of irrelevant papers were dropped, leaving 784 papers to test the suggested hypotheses. The co-authorship network data for co-author relationship, publisher, affiliation, and so on were analyzed using social network measures including centrality and structural hole. The results of our model estimation are as follows. With the exception of Hypothesis 3, which deals with the relationship between eigenvector centrality and performance, all of our hypotheses were supported. In line with our hypothesis, degree centrality (H1) was supported with its positive influence on the researchers' publishing performance (p<0.001). This finding indicates that as the degree of cooperation increased, the more the publishing performance of researchers increased. In addition, closeness centrality (H2) was also positively associated with researchers' publishing performance (p<0.001), suggesting that, as the efficiency of information acquisition increased, the more the researchers' publishing performance increased. This paper identified the difference in publishing performance among researchers. The analysis can be used to identify core experts and evaluate their performance in the information privacy research field. The co-authorship network for information privacy can aid in understanding the deep relationships among researchers. In addition, extracting characteristics of publishers and affiliations, this paper suggested an understanding of the social network measures and their potential for finding experts in the information privacy field. Social concerns about securing the objectivity of experts have increased, because experts in the information privacy field frequently participate in political consultation, and business education support and evaluation. In terms of practical implications, this research suggests an objective framework for experts in the information privacy field, and is useful for people who are in charge of managing research human resources. This study has some limitations, providing opportunities and suggestions for future research. Presenting the difference in information diffusion according to media and proximity presents difficulties for the generalization of the theory due to the small sample size. Therefore, further studies could consider an increased sample size and media diversity, the difference in information diffusion according to the media type, and information proximity could be explored in more detail. Moreover, previous network research has commonly observed a causal relationship between the independent and dependent variable (Kadushin, 2012). In this study, degree centrality as an independent variable might have causal relationship with performance as a dependent variable. However, in the case of network analysis research, network indices could be computed after the network relationship is created. An annual analysis could help mitigate this limitation.

    Self-optimizing feature selection algorithm for enhancing campaign effectiveness (캠페인 효과 제고를 위한 자기 최적화 변수 선택 알고리즘)

    • Seo, Jeoung-soo;Ahn, Hyunchul
      • Journal of Intelligence and Information Systems
      • /
      • v.26 no.4
      • /
      • pp.173-198
      • /
      • 2020
    • For a long time, many studies have been conducted on predicting the success of campaigns for customers in academia, and prediction models applying various techniques are still being studied. Recently, as campaign channels have been expanded in various ways due to the rapid revitalization of online, various types of campaigns are being carried out by companies at a level that cannot be compared to the past. However, customers tend to perceive it as spam as the fatigue of campaigns due to duplicate exposure increases. Also, from a corporate standpoint, there is a problem that the effectiveness of the campaign itself is decreasing, such as increasing the cost of investing in the campaign, which leads to the low actual campaign success rate. Accordingly, various studies are ongoing to improve the effectiveness of the campaign in practice. This campaign system has the ultimate purpose to increase the success rate of various campaigns by collecting and analyzing various data related to customers and using them for campaigns. In particular, recent attempts to make various predictions related to the response of campaigns using machine learning have been made. It is very important to select appropriate features due to the various features of campaign data. If all of the input data are used in the process of classifying a large amount of data, it takes a lot of learning time as the classification class expands, so the minimum input data set must be extracted and used from the entire data. In addition, when a trained model is generated by using too many features, prediction accuracy may be degraded due to overfitting or correlation between features. Therefore, in order to improve accuracy, a feature selection technique that removes features close to noise should be applied, and feature selection is a necessary process in order to analyze a high-dimensional data set. Among the greedy algorithms, SFS (Sequential Forward Selection), SBS (Sequential Backward Selection), SFFS (Sequential Floating Forward Selection), etc. are widely used as traditional feature selection techniques. It is also true that if there are many risks and many features, there is a limitation in that the performance for classification prediction is poor and it takes a lot of learning time. Therefore, in this study, we propose an improved feature selection algorithm to enhance the effectiveness of the existing campaign. The purpose of this study is to improve the existing SFFS sequential method in the process of searching for feature subsets that are the basis for improving machine learning model performance using statistical characteristics of the data to be processed in the campaign system. Through this, features that have a lot of influence on performance are first derived, features that have a negative effect are removed, and then the sequential method is applied to increase the efficiency for search performance and to apply an improved algorithm to enable generalized prediction. Through this, it was confirmed that the proposed model showed better search and prediction performance than the traditional greed algorithm. Compared with the original data set, greed algorithm, genetic algorithm (GA), and recursive feature elimination (RFE), the campaign success prediction was higher. In addition, when performing campaign success prediction, the improved feature selection algorithm was found to be helpful in analyzing and interpreting the prediction results by providing the importance of the derived features. This is important features such as age, customer rating, and sales, which were previously known statistically. Unlike the previous campaign planners, features such as the combined product name, average 3-month data consumption rate, and the last 3-month wireless data usage were unexpectedly selected as important features for the campaign response, which they rarely used to select campaign targets. It was confirmed that base attributes can also be very important features depending on the type of campaign. Through this, it is possible to analyze and understand the important characteristics of each campaign type.

    Influence of Microcrack on Brazilian Tensile Strength of Jurassic Granite in Hapcheon (미세균열이 합천지역 쥬라기 화강암의 압열인장강도에 미치는 영향)

    • Park, Deok-Won;Kim, Kyeong-Su
      • Korean Journal of Mineralogy and Petrology
      • /
      • v.34 no.1
      • /
      • pp.41-56
      • /
      • 2021
    • The characteristics of the six rock cleavages(R1~H2) in Jurassic Hapcheon granite were analyzed using the distribution of ① microcrack lengths(N=230), ② microcrack spacings(N=150) and ③ Brazilian tensile strengths(N=30). The 18 cumulative graphs for these three factors measured in the directions parallel to the six rock cleavages were mutually contrasted. The main results of the analysis are summarized as follows. First, the frequency ratio(%) of Brazilian tensile strength values(kg/㎠) divided into nine class intervals increases in the order of 60~70(3.3) < 140~150(6.7) < 100~110·110~120(10.0) < 90~100(13.3) < 80~90(16.7) < 120~130·130~140(20.0). The distribution curve of strength according to the frequency of each class interval shows a bimodal distribution. Second, the graphs for the length, spacing and tensile strength were arranged in the order of H2 < H1 < G2 < G1 < R2 < R1. Exponent difference(λS-λL, Δλ) between the two graphs for the spacing and length increases in the order of H2(-1.59) < H1(-0.02) < G2(0.25) < G1(0.63) < R2(1.59) < R1(1.96)(2 < 1). From the related chart, the six graphs for the tensile strength move gradually to the left direction with the increase of the above exponent difference. The negative slope(a) of the graphs for the tensile strength, suggesting a degree of uniformity of the texture, increases in the order of H((H1+H2)/2, 0.116) < G((G1+G2)/2, 0.125) < R((R1+R2)/2, 0.191). Third, the order of arrangement between the two graphs for the two directions that make up each rock cleavage(R1·R2(R), G1·G2(G), H1·H2(H)) were compared. The order of arrangement of the two graphs for the length and spacing is reverse order with each other. The two graphs for the spacing and tensile strength is mutually consistent in the order of arrangement. The exponent differences(ΔλL and ΔλS) for the length and spacing increase in the order of rift(R, -0.08) < grain(G, 0.14) < hardway(H, 0.75) and hardway(H, 0.16) < grain(G, 0.23) < rift(R, 0.45), respectively. Fourth, the general chart for the six graphs showing the distribution characteristics of the microcrack lengths, microcrack spacings and Brazilian tensile strengths were made. According to the range of length, the six graphs show orders of G2 < H2 < H1 < R2 < G1 < R1(< 7 mm) and G2 < H1 < H2 < R2 < G1 < R1(≦2.38 mm). The six graphs for the spacing intersect each other by forming a bottleneck near the point corresponding to the cumulative frequency of 12 and the spacing of 0.53 mm. Fifth, the six values of each parameter representing the six rock cleavages were arranged in the order of increasing and decreasing. Among the 8 parameters related to the length, the total length(Lt) and the graph(≦2.38 mm) are mutually congruent in order of arrangement. Among the 7 parameters related to the spacing, the frequency of spacing(N), the mean spacing(Sm) and the graph (≦5 mm) are mutually consistent in order of arrangement. In terms of order of arrangement, the values of the above three parameters for the spacing are consistent with the maximum tensile strengths belonging to group E. As shown in Table 8, the order of arrangement of these parameter values is useful for prior recognition of the six rock cleavages and the three quarrying planes.


    (34141) Korea Institute of Science and Technology Information, 245, Daehak-ro, Yuseong-gu, Daejeon
    Copyright (C) KISTI. All Rights Reserved.