• Title/Summary/Keyword: 경영전략유형

Search Result 346, Processing Time 0.029 seconds

Effect of Suggested Price Discount on Brand Image and Purchase Intention -Focusing on Beauty Service Industry- (가격할인제시 방식에 따른 브랜드 이미지와 구매 의도에 미치는 영향 -미용 산업을 중심으로-)

  • Heo, Jeong-Rok;Cho, Jeong-Hwa
    • Management & Information Systems Review
    • /
    • v.36 no.1
    • /
    • pp.21-40
    • /
    • 2017
  • This study is to examine the effects of marketing communications strategies which are also buying brand image and beauty services supplier discount information on consumer attitudes. Beauty service providers will have to consider that price discounts are worried impact on the brand image and purchase intentions. In this study, an empirical analysis demonstrated the impact on the brand image, price discount and discounts way. Discount in this study was shown to negatively affect the brand image, there is also a purchased showed a positive impact. Therefore, the proposed price reductions only way to save off the asking price was lower this distinction and professionalism. On the other hand, intent-upon price discount were positive. If such a price discount if the discount just present attitude towards the use of low discount rates but suggested it was found that the intent is absolutely high.

  • PDF

Prioritize Security Strategy based on Enterprise Type Classification Using Pair Comparison (쌍대비교를 활용한 기업 유형 분류에 따른 보안 전략 우선순위 결정)

  • Kim, Hee-Ohl;Baek, Dong-Hyun
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.39 no.4
    • /
    • pp.97-105
    • /
    • 2016
  • As information system is getting higher and amount of information assets is increasing, skills of threatening subjects are more advanced, so that it threatens precious information assets of ours. The purpose of this study is to present a strategic direction for the types of companies seeking access to information security. The framework classifies companies into eight types so company can receive help in making decisions for the development of information security strategy depending on the type of company it belongs to. Paired comparison method survey conducted by a group of information security experts to determine the priority and the relative importance of information security management elements. The factors used in the security response strategy are the combination of the information security international certification standard ISO 27001, domestic information protection management system certification K-ISMS, and personal information security management system certification PIMS. Paired comparison method was then used to determine strategy alternative priorities for each type. Paired comparisons were conducted to select the most applicable factors among the 12 strategic factors. Paired comparison method questionnaire was conducted through e-mail and direct questionnaire survey of 18 experts who were engaged in security related tasks such as security control, architect, security consulting. This study is based on the idea that it is important not to use a consistent approach for effective implementation of information security but to change security strategy alternatives according to the type of company. The results of this study are expected to help the decision makers to produce results that will serve as the basis for companies seeking access to information security first or companies seeking to establish new information security strategies.

The Effect of Corporate Strategy and IT Role on the Intent for IT Outsourcing Decision (조직의 전략 유형과 IT 역할이 아웃소싱 의도결정에 미치는 영향)

  • Jo, Dong-Hwan
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2007.11a
    • /
    • pp.256-263
    • /
    • 2007
  • Corporate managers look at IT outsourcing as long-term strategic choices not as short-term tactical ones, and maximizing the effect that IT outsourcing brings about is the main concern to them. Emerging different types of IT outsourcing and their effects on the corporate business decisions necessitate the research on this subject. According to previous researches, the Intent for IT outsourcing is categorized as IS Improvement, Business Impact, and Commercial Exploitation. The decison factors for these IT outsourcing include corporate strategy types, IT role, and interaction between these two. Firm size and IT maturity are selected as moderating factors to add the credibility to the research of the effect of IT outsourcing decision making. Analyzing IT outsourcing data collected from 61 large-size and mid-size domestic firms revealed that corporate strategy rather than IT role is more significant factor affecting the intent for IT outsourcing decision. That means the decision of outsourcing intent is affected by corporate strategy types. Defenders(as in corporate strategy types) tend to use IT outsourcing more as a means to improve information systems, compared to analyzers and reactors. Prospectors tend to use IT outsourcing more as a commercial exploitation, compared to analyzers and reactors. These outcomes prove that corporate strategy characteristics reflect outsourcing intent. There were previous researches that showed outsourcing decision depends on IT role however the hypothesis was rejected that IT role determines outsourcing intent. It was also rejected that the interaction between corporate strategy types and IT role determines outsourcing intent. Corporate decision makers should first analyze corporate strategy, and reflect it on the outsourcing intent when they make IT outsourcing decisions. Only the precise defining of IT outsourcing intent will lower the risk and increase the possibility of success.

  • PDF

The Fitness and Organizational performance Analysis of Hospital Specialization Strategy Types (병원전문화 전략유형의 적합성과 조직성과 분석)

  • Kim, Han-Sung;Kim, Young-Hoon;Woo, Jung-Sik;Lee, Hae-Jong;Yoon, Byoung-Jun;Han, Whiejong;Choi, Young-Jin
    • Korea Journal of Hospital Management
    • /
    • v.17 no.4
    • /
    • pp.87-115
    • /
    • 2012
  • This research classified hospital specialization strategy types through cluster analysis, analyzed fitness of hospital specialization strategy types for external environment or organizational structure, and examined relation between hospital specialization strategy types and organizational performance. This research surveyed 1,437 hospitals which have more than 30 patient's bed and practice national health service in Korea. Specifically, this research divided into two part : external fit - analysis of relation between external environment and specialization strategy, internal fit-analysis of relation between organizational structure factors and specialization strategy. also, as the organizational performance for achieving specialization strategic purpose, not only the productivity, efficiency, profit but also the medical quality was considered. In case of external fit, many hospitals chose integration type if there are a lot of competitive hospitals and regional population. Particularly, if there are many competitive hospitals, concentration type is chosen. In contrast, if there are many doctors in the region, differentiation type is chosen. In case of internal fit, according to organization type and patient's bed number, hospitals chose different types. If it is a general hospital and has a few bed number, generalization or concentration type is chosen. Tertiary hospital or the hospital with many patient's bed chose differentiation type. According to the number of specialists, if there are a few specialists, generalization or concentration type is chosen. If there are many specialists, differentiation type has high fitness for the hospital. In relation to strategy types and organizational performance, differentiation type has best result. Differentiation type has a good result in 7 items out of 11.

  • PDF

The Effective Risk Management of Academic Entrepreneurs' R&D Technology Transfer (학술적 기업가의 R&D 성과이전 위험의 효과적 관리)

  • Kim, Jai-Myung
    • Korean Business Review
    • /
    • v.16
    • /
    • pp.123-144
    • /
    • 2003
  • The transfer of R&D performance is the technology transfer in a narrow sense. This study aimed at fanning the effective managerial systems of the transfer of the academic entrepreneur's R&D performance. For this purpose, this study analysed the characteristics and success factors of R&D performance transfer based on the theory of project life cycle. This research classified the life cycle of academic entrepreneurs' R&D projects into six stages. And the risks associated with the transfer process was categorized using the case study about the establishing processes the mineral-related small finns. Especially, the risk of the technology transfer was investigated by the R&D project implementation stages. Based on this results, this paper suggested the strategic system such as the marketing-oriented thinking, the clear-cut statement of the role among the stake-holders of the R&D and commercialization processes, the dynamic system of the academic entrepreneurs' leadership, the formation of the transfer management system, and the usage of project risk management techniques.

  • PDF

Classifying and Implementing Different Types of Contradiction Resolution Strategies in TRIZ (TRIZ에서 모순해결전략의 유형 및 적용)

  • Choi, Sungwoon
    • Journal of the Korea Safety Management & Science
    • /
    • v.17 no.4
    • /
    • pp.381-396
    • /
    • 2015
  • The study proposes multiple TRIZ contradiction solution strategies for addressing PC (Physical Contradiction) and TC (Technical Contradiction) by implementing TRIZ cause-and-effect tree. The problem associated with TC of the ends is solved by PC of means which employs a causal relationship between causes and effects. The TRIZ contradiction solution strategies demonstrated in this research are classified into 3 types of combined strategy as follows: 1. To-Be PC and AS-Is PC, 2.To-Be PC and As-Is TC, 3.As-Is PC and To-Be TC. The combined strategy of To-Be PC and As-Is PC is similar to a divide-and-conquer technique. This strategy adopts parallel strategies using 4 separation principles in time, in space, between parts and the whole, and upon condition of two reversed-PCs. Moreover, its application elucidates the conflict relationship of two TCs from the study. The integrated 4 separation principles and 40 inventive principles present an effective synergy effect from the combination, and further addresses the problems in the TRIZ contradiction resolution strategies. Combined strategy of To-Be PC and As-Is TC implements the 40 inventive principles that To-Be PC of the means resolves the As-Is TC of the ends. Combined strategy of As-Is PC and To-Be TC also uses inventive principles to the As-Is PC of the means to solve the To-Be TC of the ends. In addition, propositional and logical relationship of necessary and sufficient conditions between TC and PC is used to support the validity of 3 TRIZ contradiction solution strategies. In addition, 3 other strategies of necessary and sufficient conditions validate the contraposition relationship of the truth table. This study discusses TRIZ case studies from National Quality Circle Contest from the years between 2011 and 2014 to provide the usage guidelines of TRIZ contradiction solutions for quality purposes. Examining analysis from the case studies and investigating combined strategies allows the users to obtain comprehensive understanding.

A Study on Categorization of Accident Pattern for Organization's Information Security Strategy Establish (기업 정보보안 전략 수립을 위한 보안 사고 유형 분류에 관한 연구)

  • Kim, Hee-Ohl;Baek, Dong-Hyun
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.38 no.4
    • /
    • pp.193-201
    • /
    • 2015
  • Corporation's valuable intelligent asset is being threatened from the skills of threatening subject that has been evolved along with the growth of the information system and the amount of the information asset. Domestically, attempts of various private information attacks, important information extortion, and information damage have been detected, and some of them have abused the vulnerability of security of information system, and have become a severe social problem that generates security incident. When accessing to the security, most of companies used to establish a strategy with a consistent manner and a solution plan. However, this is not a proper way. The order of priorities vary depending on the types of business. Also, the scale of damage varies significantly depending on the types of security incidents. And method of reaction and critical control point vary depending on the types of business and security incidents. In this study, I will define the security incidents by their types and preponderantly examine how one should react to those security incidents. In this study, analyzed many types of security accidents that can occur within a corporation and an organization considering various factors. Through this analysis, thought about factors that has to be considered by corporations and organizations when they intend to access to the information security. This study focuses on the response methodology based on the analysis of the case analysis of the leakage of industrial secret and private secret other than the conceptual response methodology that examines the way to prevent the leakage of the industry security systems and the industry information activities. And based on these factors, want to be of help for corporations to apply a reasonable approach when they establish a strategy to information security.

Development of Deep Learning-Based Damage Detection Prototype for Concrete Bridge Condition Evaluation (콘크리트 교량 상태평가를 위한 딥러닝 기반 손상 탐지 프로토타입 개발)

  • Nam, Woo-Suk;Jung, Hyunjun;Park, Kyung-Han;Kim, Cheol-Min;Kim, Gyu-Seon
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.42 no.1
    • /
    • pp.107-116
    • /
    • 2022
  • Recently, research has been actively conducted on the technology of inspection facilities through image-based analysis assessment of human-inaccessible facilities. This research was conducted to study the conditions of deep learning-based imaging data on bridges and to develop an evaluation prototype program for bridges. To develop a deep learning-based bridge damage detection prototype, the Semantic Segmentation model, which enables damage detection and quantification among deep learning models, applied Mask-RCNN and constructed learning data 5,140 (including open-data) and labeling suitable for damage types. As a result of performance modeling verification, precision and reproduction rate analysis of concrete cracks, stripping/slapping, rebar exposure and paint stripping showed that the precision was 95.2 %, and the recall was 93.8 %. A 2nd performance verification was performed on onsite data of crack concrete using damage rate of bridge members.

A Study on the Strategy of Content Marketing Using YouTube -Focused on Domestic Standalone Beauty Brands- (유튜브를 활용한 콘텐츠 마케팅 전략 연구 -국내 로드숍 화장품 브랜드를 중심으로-)

  • Nam, Seung Yoon;Park, Bo Ram
    • Design Convergence Study
    • /
    • v.16 no.2
    • /
    • pp.63-81
    • /
    • 2017
  • Environmental change of consuming contents has led corporates to acknowledge the possibility of social media as being marketing platform. And as the importance of 'contents' is growing bigger at the same time, 'Content Marketing' is getting attention because 'Content' plays the key role in current marketing since it can deliver meaningful values to the companies and the customers both. Many companies are practicing contents marketing employing YouTube by not only creating their own YouTube channels and YouTube contents but also collaborating with YouTube creators. Purpose of this study is to figure out how domestic standalone beauty brands that are actively practicing content marketing, are exploiting the YouTube and to suggest design direction for future YouTube content marketing. 'Etude', 'Innisfree', 'Misha', 'The Face Shop' were selected for analyzing the content marketing cases using YouTube. As a result, this study could conclude that if the brand has inadequate number of subscribers, it is better to collaborate with the creators. Also, clarifying contents' purpose and distinguishing the way of delivering it is important.

Analysis of shopping website visit types and shopping pattern (쇼핑 웹사이트 탐색 유형과 방문 패턴 분석)

  • Choi, Kyungbin;Nam, Kihwan
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.1
    • /
    • pp.85-107
    • /
    • 2019
  • Online consumers browse products belonging to a particular product line or brand for purchase, or simply leave a wide range of navigation without making purchase. The research on the behavior and purchase of online consumers has been steadily progressed, and related services and applications based on behavior data of consumers have been developed in practice. In recent years, customization strategies and recommendation systems of consumers have been utilized due to the development of big data technology, and attempts are being made to optimize users' shopping experience. However, even in such an attempt, it is very unlikely that online consumers will actually be able to visit the website and switch to the purchase stage. This is because online consumers do not just visit the website to purchase products but use and browse the websites differently according to their shopping motives and purposes. Therefore, it is important to analyze various types of visits as well as visits to purchase, which is important for understanding the behaviors of online consumers. In this study, we explored the clustering analysis of session based on click stream data of e-commerce company in order to explain diversity and complexity of search behavior of online consumers and typified search behavior. For the analysis, we converted data points of more than 8 million pages units into visit units' sessions, resulting in a total of over 500,000 website visit sessions. For each visit session, 12 characteristics such as page view, duration, search diversity, and page type concentration were extracted for clustering analysis. Considering the size of the data set, we performed the analysis using the Mini-Batch K-means algorithm, which has advantages in terms of learning speed and efficiency while maintaining the clustering performance similar to that of the clustering algorithm K-means. The most optimized number of clusters was derived from four, and the differences in session unit characteristics and purchasing rates were identified for each cluster. The online consumer visits the website several times and learns about the product and decides the purchase. In order to analyze the purchasing process over several visits of the online consumer, we constructed the visiting sequence data of the consumer based on the navigation patterns in the web site derived clustering analysis. The visit sequence data includes a series of visiting sequences until one purchase is made, and the items constituting one sequence become cluster labels derived from the foregoing. We have separately established a sequence data for consumers who have made purchases and data on visits for consumers who have only explored products without making purchases during the same period of time. And then sequential pattern mining was applied to extract frequent patterns from each sequence data. The minimum support is set to 10%, and frequent patterns consist of a sequence of cluster labels. While there are common derived patterns in both sequence data, there are also frequent patterns derived only from one side of sequence data. We found that the consumers who made purchases through the comparative analysis of the extracted frequent patterns showed the visiting pattern to decide to purchase the product repeatedly while searching for the specific product. The implication of this study is that we analyze the search type of online consumers by using large - scale click stream data and analyze the patterns of them to explain the behavior of purchasing process with data-driven point. Most studies that typology of online consumers have focused on the characteristics of the type and what factors are key in distinguishing that type. In this study, we carried out an analysis to type the behavior of online consumers, and further analyzed what order the types could be organized into one another and become a series of search patterns. In addition, online retailers will be able to try to improve their purchasing conversion through marketing strategies and recommendations for various types of visit and will be able to evaluate the effect of the strategy through changes in consumers' visit patterns.