• Title/Summary/Keyword: research topic

Search Result 2,447, Processing Time 0.037 seconds

The Lean Startup: Korea's Case Study-Cardoc (린 스타트업 방법론의 적용: 한국 '카닥' 사례를 중심으로)

  • Na, Hee Kyung;Lee, Hee Woo
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.11 no.5
    • /
    • pp.29-43
    • /
    • 2016
  • The Lean Startup, a methodology for minimizing failure rate of startups, has been receiving attention since its publication in 2011. Although it has been receiving enormous attention as an effective methodology of startups' growth and the emergence of unicorn companies, it is undeniable that the theoretical research and cases on this topic have not been fully accumulated in Korea. Progress of management theory has been made when combining the theory and case studies. In this paper, we thus excavated the 'Cardoc' case, which has applied the lean startup concept to the entire process of service and customer development from the inception of its product design. The following are the findings of the case. First, for the successful application of lean startup, it is essential that all team members to understand the lean startup concept and are willing to apply it thoroughly to the business management. Second, the prompt launching of MVP(Minimum Viable Product) is more important than table discussion. Third, it is crucial to select the appropriate key metrics and analytic tools for effective learning. Fourth, startup must scale up promptly as soon as it verifies the product-market fit through the BML(Build-Measure-Learn) iteration cycle. Fifth, all new business expansion should be lean. Cardoc is currently testing new MVPs in order to move onto the next scale-up process with huge investments in newly added segments. This study is meaningful in that it elaborates the representative case of a Korean startup that has applied the lean startup strategy under the circumstance of insufficient discussion of Korean startup cases in comparison with growing attention both in concept development and case accumulation abroad. We hope that this paper can be a stepping stone for future relevant research on the implementation of lean startup methodology in Korea.

  • PDF

Role Formation by Interaction Function and Pattern for Group Discussion Activity using the case of Environmental Education Camp for Undergraduate Student (대학생 환경교육캠프 사례에서의 집단 토의 활동에 있어서 상호작용 기능과 양상에 따른 역할 형성 양상)

  • Jung, Won-Young;Lee, Go-Eun;Shin, Hyeon-Jeong;Cha, Hyun-Jung;Kim, Chan-Jong
    • Journal of The Korean Association For Science Education
    • /
    • v.32 no.4
    • /
    • pp.555-569
    • /
    • 2012
  • Many science education research and practices are recently emphasizing the importance of collaborative learning. This study also understands learning in aspects of socio-cultural context, and regarded the creation of meaning in a same-age group as an important learning process. This is most especially true in the premise that the formation of roles in a collaborative learning is important for successful interactive learning. This study aims to find out how roles form in a group. For this purpose, university students participating in a group discussion activity about energy flow and circulation of material were selected as research participants. Discussions among the nine students in one group consisted of cognitive conversations on the topic and operational conversations for preparing a presentation. Video-clips of the discussions were made and transcribed. For the analysis, we developed a framework that includes four interaction functions (cognitive, organizational, meta-cognitive, operational), four action elements (question, simple answer, providing opinion, response to opinion), and two to four intention elements by each action elements. As a result, a total of nine roles were revealed through the interaction function and element; cognitive questioner, operational questioner, simple answerer, operational suggester, organizational commander, operational commander, cognitive explainer, terminator, reflective thinker. These roles are re-classified into seven utterance patterns by the utterance order and object, and they were categorized into three role groups (facilitating interaction, sustaining interaction, finishing interaction). The result means that role formation and function can have influence on learning and interaction. This study is meaningful to the suggestion to collaborative learning including project-based learning, investigation, club activity, and for the re-illumination of the role in an aspect of the interaction.

A Study on the Meaning and Types of Banpo [斑布] during the Joseon Dynasty (조선시대 반포(斑布)의 의미와 형식 연구)

  • Ree, Jiwon
    • Korean Journal of Heritage: History & Science
    • /
    • v.53 no.3
    • /
    • pp.164-183
    • /
    • 2020
  • In the textile culture of the Joseon Dynasty, the historic record of Banpo is fragmentary and contains many missing details. The main reason is a lack of associated literature, and it is also significant that the actual substance used is not clear at present. Banpo is a kind of cotton, but this has not been confirmed in the traditional textiles that are currently handed down. The word Ban [斑] in Banpo means "stain", and the letter Po [布] means "fabric". At the border of white discourse, Banpo did not receive attention as a research topic. This study is an attempt to restore some of the textile culture of the Joseon Dynasty through Banpo. Banpo is not just limited to the Joseon Dynasty; it is an important material for examining the development of textile culture and exchange in East Asia. This study was broadly divided into three parts. First, the record and meaning of Banpo during the Joseon Dynasty were examined. Records of Banpo can be seen from the early Joseon period during King Sejo and Seongjong, and the production and actual use of Banpo have been confirmed. Banpo was maintained until the beginning of the 20th century, but is no longer observed. Banpo is a woven fabric made of cotton yarn dyed in many colors and has appeared in Southeast Asia since ancient times. In East Asia, there are other fabrics similar to Banpo, such as Ho [縞], Sum [纖], and Chim [綅]. In particular, the correlation between Banpo and Ho is an important link in understanding Banpo in the Joseon Dynasty. Second, the meaning of Banpo was examined from various angles through comprehensive analysis of Chinese and Japanese literature records and cases. The appearance and development of Banpo moved in sync with the period when cotton was introduced into East Asia. In East Asia, cotton was introduced and produced in earnest from the end of the Song Dynasty to the beginning of the Yuan Dynasty, and the meaning of Banpo was diversified. In China, the name of Banpo was changed to Hwapo [花布], Gizapo [碁子布], Gizahwapo [棋子花布], etc. Japan was late to introduce cotton and developed it in acceptance of the changed meaning. In Japan, use of the name Banpo is not on record, but a Ryujo [柳條] fabric of the same type as banpo has been identified. This Ryujo is the same concept as Ho and Hwapo, and later merged into Ho. Names such as Ho, Hwapo, Banpo, etc. were used differently in each country, but the form was shared across East Asia. Third, based on the meaning of Banpo shared in East Asia, the format of Banpo in the Joseon Dynasty was classified. The format of Banpo in the Joseon Dynasty can be divided into grid and striped versions. The name Banpo disappeared over time, but the form remained and was passed down until recently. I hope that this study will help restore Banpo in the future.

Ubiquitous Sensor Network Application Strategy of Security Companies (시큐리티업체의 유비쿼터스 센서네트워크(USN) 응용전략)

  • Jang, Ye-Jin;An, Byeong-Su;Ju, Choul-Hyun
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.75-94
    • /
    • 2009
  • Since mechanical security systems are mostly composed of electronic, information and communication devices, they have effects in the aspects of overall social environment and crime-oriented environment. Also, the importance is increasing for wireless recognition of RFID and tracing function, which will be usefully utilized in controlling the incomings and outgoings of people/vehicles or allowance, surveillance and control. This is resulting from the increase in the care for the elderly according to the overall social environment, namely, the aging society, and the number of women entering, as well as the increase in the number of heinous crimes. The purpose of this study is to examine the theoretical considerations on ubiquitous sensor network and present a direction for securities companies for their development by focusing on the technological and application areas. To present strategies of response to a new environment for security companies, First, a diversification strategy is needed for security companies. The survival of only high level of security companies in accordance with the principle of liberal market competition will bring forth qualitative growth and competitiveness of security market. Second, active promotion by security companies is needed. It is no exaggeration to say that we are living in the modern society in the sea of advertisements and propaganda. The promotional activities that emphasize the areas of activity or importance of security need to be actively carried out using the mass media to change the aware of people regarding security companies, and they need to come up with a plan to simultaneously carry out the promotional activities that emphasize the public aspect of security by well utilizing the recent trend that the activities of security agents are being used as a topic in movies or TV dramas. Third, technically complementary establishment of ubiquitous sensor network and electronic tag is needed. Since they are used in mobile electronic tag services such as U-Home and U-Health Care, they are used throughout our lives by forming electronic tag environment within safe ubiquitous sensor network based on the existing privacy guideline for the support of mobile electronic tag terminal commercialization, reduction in communication and information usage costs, continuous technical development and strengthening of privacy protection, and the system of cooperation of academic-industrial-research needs to be established among the academic world and private research institutes for these parts.

  • PDF

The Distribution and Diversity of Freshwater Fishes in Korean Peninsula (한반도 담수어류의 분포와 다양성)

  • Yoon, Ju-Duk;Kim, Jeong-Hui;Park, Sang-Hyeon;Jang, Min-Ho
    • Korean Journal of Ecology and Environment
    • /
    • v.51 no.1
    • /
    • pp.71-85
    • /
    • 2018
  • A recent topic of interest within ecology is ecosystem services that are importantly connected with biodiversity. Biodiversity is a fundamental component of ecological studies and has been the subject of many studies worldwide. However, studies on the diversity and distribution of freshwater fish were not undertaken in earnest until 2000, and the number of internationally available studies is therefore still limited. In this study, we used data from "The Survey and Evaluation of Aquatic Ecosystem Health (hereafter SEAEH)" within the framework of which whole water systems on the Korean peninsula are annually monitored to investigate and determine the current status of the diversity and distribution of freshwater fish, as well as to elucidate major factors impacting freshwater fish. A total of 130 species from 28 families were identified at around 953 sites in the SEAEH investigation of 2014. The species Zacco platypus (relative abundance: 28.2%) and Z. koreanus (19.3%) were identified as the most abundant species on the Korean peninsula, and besides these 20 endangered species, 51 endemic species and 4 exotic species were also collected. Highest (96 species) and lowest (72 species) diversity were identified in the Han River Watershed and the Yeongsan/Seomjin River Watershed, respectively. The mean endemic rate was 32.7%, which is higher than the previous rate determined in 1995. The exotic species Micropterus salmoides, Lepomis macrochirus and Carassius cuvieri were found in the whole river system except north Yeongdong, whereas Oreochromis niloticus occurred only at three sites due to the cold water temperatures in winter. Totally, 28 species were found to be translocated to different water systems not connected with known original habitats, most translocations occurring in the Nakdong River and the Yeongdong region. Among the translocated species, Opsariichthys uncirostris amurensis, and Erythroculter erythropterus were dominantly distributed in the mid- to lower reaches of Nakdong River where they may be harmful to the native fish assemblages due to their strong predation. The construction of weirs in connection with the "4 River Project" generated changes in fish assemblages before, during and after the project, resulting in altered habitat condition. Especially, a decrease in the number of endemic species and an increase in the abundance of lentic species were seen. Human-induced global warming will allow exotic species requiring high water temperatures to adapt to the environmental conditions of the Korean peninsula, which may enhance the diversity of native fishes and create changes in distribution. For the establishment of realistic and efficient management and protection strategies for Korean freshwater fish, SEAEH, which produces fundamental and quantitative data for Korean streams, is an important and necessary tool.

Development of Intelligent ATP System Using Genetic Algorithm (유전 알고리듬을 적용한 지능형 ATP 시스템 개발)

  • Kim, Tai-Young
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.4
    • /
    • pp.131-145
    • /
    • 2010
  • The framework for making a coordinated decision for large-scale facilities has become an important issue in supply chain(SC) management research. The competitive business environment requires companies to continuously search for the ways to achieve high efficiency and lower operational costs. In the areas of production/distribution planning, many researchers and practitioners have developedand evaluated the deterministic models to coordinate important and interrelated logistic decisions such as capacity management, inventory allocation, and vehicle routing. They initially have investigated the various process of SC separately and later become more interested in such problems encompassing the whole SC system. The accurate quotation of ATP(Available-To-Promise) plays a very important role in enhancing customer satisfaction and fill rate maximization. The complexity for intelligent manufacturing system, which includes all the linkages among procurement, production, and distribution, makes the accurate quotation of ATP be a quite difficult job. In addition to, many researchers assumed ATP model with integer time. However, in industry practices, integer times are very rare and the model developed using integer times is therefore approximating the real system. Various alternative models for an ATP system with time lags have been developed and evaluated. In most cases, these models have assumed that the time lags are integer multiples of a unit time grid. However, integer time lags are very rare in practices, and therefore models developed using integer time lags only approximate real systems. The differences occurring by this approximation frequently result in significant accuracy degradations. To introduce the ATP model with time lags, we first introduce the dynamic production function. Hackman and Leachman's dynamic production function in initiated research directly related to the topic of this paper. They propose a modeling framework for a system with non-integer time lags and show how to apply the framework to a variety of systems including continues time series, manufacturing resource planning and critical path method. Their formulation requires no additional variables or constraints and is capable of representing real world systems more accurately. Previously, to cope with non-integer time lags, they usually model a concerned system either by rounding lags to the nearest integers or by subdividing the time grid to make the lags become integer multiples of the grid. But each approach has a critical weakness: the first approach underestimates, potentially leading to infeasibilities or overestimates lead times, potentially resulting in excessive work-inprocesses. The second approach drastically inflates the problem size. We consider an optimized ATP system with non-integer time lag in supply chain management. We focus on a worldwide headquarter, distribution centers, and manufacturing facilities are globally networked. We develop a mixed integer programming(MIP) model for ATP process, which has the definition of required data flow. The illustrative ATP module shows the proposed system is largely affected inSCM. The system we are concerned is composed of a multiple production facility with multiple products, multiple distribution centers and multiple customers. For the system, we consider an ATP scheduling and capacity allocationproblem. In this study, we proposed the model for the ATP system in SCM using the dynamic production function considering the non-integer time lags. The model is developed under the framework suitable for the non-integer lags and, therefore, is more accurate than the models we usually encounter. We developed intelligent ATP System for this model using genetic algorithm. We focus on a capacitated production planning and capacity allocation problem, develop a mixed integer programming model, and propose an efficient heuristic procedure using an evolutionary system to solve it efficiently. This method makes it possible for the population to reach the approximate solution easily. Moreover, we designed and utilized a representation scheme that allows the proposed models to represent real variables. The proposed regeneration procedures, which evaluate each infeasible chromosome, makes the solutions converge to the optimum quickly.

Leaching of Chromium, Copper and Arsenic in Soils and Rapid Identification of CCA-Treated Woods Using Modified PAN Stain (CCA 목재방부제 설치지역 토양의 크롬.구리.비소 분포와 PAN 지시약을 이용한 CCA 방부목의 현장 검출방법 개발)

  • Abdelhafez, Ahmed A.;Awad, Yasser M.;El-Azeem, Samy A.M. Abd;Kim, Min-Su;Ham, Kwang-Joon;Lim, Kyoung-Jae;Yang, Jae-E;Ok, Yong-Sik
    • Korean Journal of Soil Science and Fertilizer
    • /
    • v.43 no.1
    • /
    • pp.60-67
    • /
    • 2010
  • Although several studies have reported that Cr, Cu and As can leach from CCA-treated woods, few studies have been conducted on this topic in Korea. Therefore, this study was conducted to monitor Cr, Cu and As leaching from CCA-treated wood products and to develop a rapid identification method for CCA-treated wood products by using indicators such as PAN stain. Soil samples were collected at depths of 0-70 cm and wood samples were collected by thickness of wood layer. The soil and wood samples were then digested and analyzed for Cr, Cu and As concentrations using an atomic absorption spectrometer. The As and Cu concentrations decreased sharply with depth from 34.38 and 33.65 mg $kg^{-1}$ at 0-1 cm to 1.72 and 7.84 mg $kg^{-1}$ at 70 cm, respectively. In general, As was more mobile than Cr and Cu in the soil. For wood samples, the Cr, Cu and As concentrations were higher in the outer layer (0-0.5cm) than the inner layers (0.6-4.5cm). Evaluation of rapid identification methods revealed that 100% acetone with 0.1% PAN indicator was the best combination for detection of CCA-treated wood in the field.

An Exploration on Public Perception of Social Welfare as a Discipline in Korea (사회복지학에 대한 한국인의 인식에 관한 연구)

  • Kang, Chul-Hee
    • Korean Journal of Social Welfare
    • /
    • v.57 no.4
    • /
    • pp.147-175
    • /
    • 2005
  • Efforts to identify the public's perception of social welfare as an academic discipline have never been conducted in Korea since the establishment of social welfare department in 1947 at Ewha Womans University. Such efforts are very meaningful in identifying directions and tasks to strengthen Korean social welfare as well as in clarifying and promoting our understanding concerning status of the academic discipline. This study attempts to explore and describe the degree of the public's perception in Korea with analyzing data surveyed in 2004 by our interdisciplinary research team. This study develops and uses a questionnaire having a Likert scale format that is composed of 8 points and measures the public's perception in the following dimensions: (1) personal interests on academic discipline; (2) contribution of academic discipline; (3) prospect of academic discipline; (4) importance of academic discipline; (5) expertise of academic discipline; and (6) personal knowledge on academic discipline. To avoid social desirability and promote objectivity with comparative measurement, this study selects ten representative academic disciplines as follows: medicine; physics; biology; social welfare; economics; psychology; sociology; political science; library science; and communication & journalism. This study attempts to identify (1) the degree of the public's perception on ten academic disciplines; (2) the position of social welfare by comparing it with each academic discipline and by comparing mean of social welfare with overall mean of six social science disciplines in the six dimensions; (3) the differences in the public's perceptions of social welfare on six dimensions by the respondents' status factor(high school students, college and graduate students, and citizens) and gender factor by using MANCOVA, and (4) the differences in the public's perceptions of social welfare on six dimensions by major factor(social welfare, social science majors, and natural science majors) and gender factor of college and graduate school students by using MANCOVA. The results of data analysis are as follows: (1) while the 3,319 respondents gave relatively high rating on natural sciences in the dimensions of contribution and expertise, they did the same on social sciences in the dimensions of personal interests and personal knowledge; (2) in overall comparisons, while the 3,319 respondents gave relatively high rating on social welfare in the dimensions of contribution, prospect and importance, they gave the lowest rating on the expertise of social welfare; (3) in the comparisons with social science disciplines, while the 3,319 respondents gave relatively high rating on social welfare in the dimensions of contribution, prospect and importance, they gave the lowest rating on the expertise of social welfare; (4) when analyzing all the respondents, there were differences in the vector of personal interests, contribution, prospect, importance, expertise, and personal knowledge by status factor, gender factor, and interaction effect factor; and (5) when analyzing only the respondents in college and graduate schools, there were differences in the vector of personal interests, contribution, prospect, importance, expertise, and personal knowledge by only major factor and gender factor. The results provide empirical backgrounds for discussing current image, status and major characteristics of social welfare as a discipline in Korea. Indeed, this study provides new meaningful and thoughtful guide for further investigation on the topic. In addition, contributing to clarifying and broadening our understandings about the public's perception on social welfare in Korea, this study discusses the tasks for dealing with expertise issue that is the most vulnerable issue of Korean social welfare discipline and research directions to strengthen and promote social welfare discipline in Korea.

  • PDF

Hardware Approach to Fuzzy Inference―ASIC and RISC―

  • Watanabe, Hiroyuki
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1993.06a
    • /
    • pp.975-976
    • /
    • 1993
  • This talk presents the overview of the author's research and development activities on fuzzy inference hardware. We involved it with two distinct approaches. The first approach is to use application specific integrated circuits (ASIC) technology. The fuzzy inference method is directly implemented in silicon. The second approach, which is in its preliminary stage, is to use more conventional microprocessor architecture. Here, we use a quantitative technique used by designer of reduced instruction set computer (RISC) to modify an architecture of a microprocessor. In the ASIC approach, we implemented the most widely used fuzzy inference mechanism directly on silicon. The mechanism is beaded on a max-min compositional rule of inference, and Mandami's method of fuzzy implication. The two VLSI fuzzy inference chips are designed, fabricated, and fully tested. Both used a full-custom CMOS technology. The second and more claborate chip was designed at the University of North Carolina(U C) in cooperation with MCNC. Both VLSI chips had muliple datapaths for rule digital fuzzy inference chips had multiple datapaths for rule evaluation, and they executed multiple fuzzy if-then rules in parallel. The AT & T chip is the first digital fuzzy inference chip in the world. It ran with a 20 MHz clock cycle and achieved an approximately 80.000 Fuzzy Logical inferences Per Second (FLIPS). It stored and executed 16 fuzzy if-then rules. Since it was designed as a proof of concept prototype chip, it had minimal amount of peripheral logic for system integration. UNC/MCNC chip consists of 688,131 transistors of which 476,160 are used for RAM memory. It ran with a 10 MHz clock cycle. The chip has a 3-staged pipeline and initiates a computation of new inference every 64 cycle. This chip achieved an approximately 160,000 FLIPS. The new architecture have the following important improvements from the AT & T chip: Programmable rule set memory (RAM). On-chip fuzzification operation by a table lookup method. On-chip defuzzification operation by a centroid method. Reconfigurable architecture for processing two rule formats. RAM/datapath redundancy for higher yield It can store and execute 51 if-then rule of the following format: IF A and B and C and D Then Do E, and Then Do F. With this format, the chip takes four inputs and produces two outputs. By software reconfiguration, it can store and execute 102 if-then rules of the following simpler format using the same datapath: IF A and B Then Do E. With this format the chip takes two inputs and produces one outputs. We have built two VME-bus board systems based on this chip for Oak Ridge National Laboratory (ORNL). The board is now installed in a robot at ORNL. Researchers uses this board for experiment in autonomous robot navigation. The Fuzzy Logic system board places the Fuzzy chip into a VMEbus environment. High level C language functions hide the operational details of the board from the applications programme . The programmer treats rule memories and fuzzification function memories as local structures passed as parameters to the C functions. ASIC fuzzy inference hardware is extremely fast, but they are limited in generality. Many aspects of the design are limited or fixed. We have proposed to designing a are limited or fixed. We have proposed to designing a fuzzy information processor as an application specific processor using a quantitative approach. The quantitative approach was developed by RISC designers. In effect, we are interested in evaluating the effectiveness of a specialized RISC processor for fuzzy information processing. As the first step, we measured the possible speed-up of a fuzzy inference program based on if-then rules by an introduction of specialized instructions, i.e., min and max instructions. The minimum and maximum operations are heavily used in fuzzy logic applications as fuzzy intersection and union. We performed measurements using a MIPS R3000 as a base micropro essor. The initial result is encouraging. We can achieve as high as a 2.5 increase in inference speed if the R3000 had min and max instructions. Also, they are useful for speeding up other fuzzy operations such as bounded product and bounded sum. The embedded processor's main task is to control some device or process. It usually runs a single or a embedded processer to create an embedded processor for fuzzy control is very effective. Table I shows the measured speed of the inference by a MIPS R3000 microprocessor, a fictitious MIPS R3000 microprocessor with min and max instructions, and a UNC/MCNC ASIC fuzzy inference chip. The software that used on microprocessors is a simulator of the ASIC chip. The first row is the computation time in seconds of 6000 inferences using 51 rules where each fuzzy set is represented by an array of 64 elements. The second row is the time required to perform a single inference. The last row is the fuzzy logical inferences per second (FLIPS) measured for ach device. There is a large gap in run time between the ASIC and software approaches even if we resort to a specialized fuzzy microprocessor. As for design time and cost, these two approaches represent two extremes. An ASIC approach is extremely expensive. It is, therefore, an important research topic to design a specialized computing architecture for fuzzy applications that falls between these two extremes both in run time and design time/cost. TABLEI INFERENCE TIME BY 51 RULES {{{{Time }}{{MIPS R3000 }}{{ASIC }}{{Regular }}{{With min/mix }}{{6000 inference 1 inference FLIPS }}{{125s 20.8ms 48 }}{{49s 8.2ms 122 }}{{0.0038s 6.4㎲ 156,250 }} }}

  • PDF

Personal Information Overload and User Resistance in the Big Data Age (빅데이터 시대의 개인정보 과잉이 사용자 저항에 미치는 영향)

  • Lee, Hwansoo;Lim, Dongwon;Zo, Hangjung
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.1
    • /
    • pp.125-139
    • /
    • 2013
  • Big data refers to the data that cannot be processes with conventional contemporary data technologies. As smart devices and social network services produces vast amount of data, big data attracts much attention from researchers. There are strong demands form governments and industries for bib data as it can create new values by drawing business insights from data. Since various new technologies to process big data introduced, academic communities also show much interest to the big data domain. A notable advance related to the big data technology has been in various fields. Big data technology makes it possible to access, collect, and save individual's personal data. These technologies enable the analysis of huge amounts of data with lower cost and less time, which is impossible to achieve with traditional methods. It even detects personal information that people do not want to open. Therefore, people using information technology such as the Internet or online services have some level of privacy concerns, and such feelings can hinder continued use of information systems. For example, SNS offers various benefits, but users are sometimes highly exposed to privacy intrusions because they write too much personal information on it. Even though users post their personal information on the Internet by themselves, the data sometimes is not under control of the users. Once the private data is posed on the Internet, it can be transferred to anywhere by a few clicks, and can be abused to create fake identity. In this way, privacy intrusion happens. This study aims to investigate how perceived personal information overload in SNS affects user's risk perception and information privacy concerns. Also, it examines the relationship between the concerns and user resistance behavior. A survey approach and structural equation modeling method are employed for data collection and analysis. This study contributes meaningful insights for academic researchers and policy makers who are planning to develop guidelines for privacy protection. The study shows that information overload on the social network services can bring the significant increase of users' perceived level of privacy risks. In turn, the perceived privacy risks leads to the increased level of privacy concerns. IF privacy concerns increase, it can affect users to from a negative or resistant attitude toward system use. The resistance attitude may lead users to discontinue the use of social network services. Furthermore, information overload is mediated by perceived risks to affect privacy concerns rather than has direct influence on perceived risk. It implies that resistance to the system use can be diminished by reducing perceived risks of users. Given that users' resistant behavior become salient when they have high privacy concerns, the measures to alleviate users' privacy concerns should be conceived. This study makes academic contribution of integrating traditional information overload theory and user resistance theory to investigate perceived privacy concerns in current IS contexts. There is little big data research which examined the technology with empirical and behavioral approach, as the research topic has just emerged. It also makes practical contributions. Information overload connects to the increased level of perceived privacy risks, and discontinued use of the information system. To keep users from departing the system, organizations should develop a system in which private data is controlled and managed with ease. This study suggests that actions to lower the level of perceived risks and privacy concerns should be taken for information systems continuance.