• Title/Summary/Keyword: 데이터베이스 관리시스템

Search Result 2,298, Processing Time 0.03 seconds

The Effects on CRM Performance and Relationship Quality of Successful Elements in the Establishment of Customer Relationship Management: Focused on Marketing Approach (CRM구축과정에서 마케팅요인이 관계품질과 CRM성과에 미치는 영향)

  • Jang, Hyeong-Yu
    • Journal of Global Scholars of Marketing Science
    • /
    • v.18 no.4
    • /
    • pp.119-155
    • /
    • 2008
  • Customer Relationship Management(CRM) has been a sustainable competitive edge of many companies. CRM analyzes customer data for designing and executing targeted marketing analysing customer behavior in order to make decisions relating to products and services including management information system. It is critical for companies to get and maintain profitable customers. How to manage relationships with customers effectively has become an important issue for both academicians and practitioners in recent years. However, the existing academic literature and the practical applications of customer relationship management(CRM) strategies have been focused on the technical process and organizational structure about the implementation of CRM. These limited focus on CRM lead to the result of numerous reports of failed implementations of various types of CRM projects. Many of these failures are also related to the absence of marketing approach. Identifying successful factors and outcomes focused on marketing concept before introducing a CRM project are a pre-implementation requirements. Many researchers have attempted to find the factors that contribute to the success of CRM. However, these research have some limitations in terms of marketing approach without explaining how the marketing based factors contribute to the CRM success. An understanding of how to manage relationship with crucial customers effectively based marketing approach has become an important topic for both academicians and practitioners. However, the existing papers did not provide a clear antecedent and outcomes factors focused on marketing approach. This paper attempt to validate whether or not such various marketing factors would impact on relational quality and CRM performance in terms of marketing oriented perceptivity. More specifically, marketing oriented factors involving market orientation, customer orientation, customer information orientation, and core customer orientation can influence relationship quality(satisfaction and trust) and CRM outcome(customer retention and customer share). Another major goals of this research are to identify the effect of relationship quality on CRM outcomes consisted of customer retention and share to show the relationship strength between two factors. Based on meta analysis for conventional studies, I can construct the following research model. An empirical study was undertaken to test the hypotheses with data from various companies. Multiple regression analysis and t-test were employed to test the hypotheses. The reliability and validity of our measurements were tested by using Cronbach's alpha coefficient and principal factor analysis respectively, and seven hypotheses were tested through performing correlation test and multiple regression analysis. The first key outcome is a theoretically and empirically sound CRM factors(marketing orientation, customer orientation, customer information orientation, and core customer orientation.) in the perceptive of marketing. The intensification of ${\beta}$coefficient among antecedents factors in terms of marketing was not same. In particular, The effects on customer trust of marketing based CRM antecedents were significantly confirmed excluding core customer orientation. It was notable that the direct effects of core customer orientation on customer trust were not exist. This means that customer trust which is firmly formed by long term tasks will not be directly linked to the core customer orientation. the enduring management concerned with this interactions is probably more important for the successful implementation of CRM. The second key result is that the implementation and operation of successful CRM process in terms of marketing approach have a strong positive association with both relationship quality(customer trust/customer satisfaction) and CRM performance(customer retention and customer possession). The final key fact that relationship quality has a strong positive effect on customer retention and customer share confirms that improvements in customer satisfaction and trust improve accessibility to customers, provide more consistent service and ensure value-for-money within the front office which result in growth of customer retention and customer share. Particularly, customer satisfaction and trust which is main components of relationship quality are found to be positively related to the customer retention and customer share. Interactive managements of these main variables play key roles in connecting the successful antecedent of CRM with final outcome involving customer retention and share. Based on research results, This paper suggest managerial implications concerned with constructions and executions of CRM focusing on the marketing perceptivity. I can conclude in general the CRM can be achieved by the recognition of antecedents and outcomes based on marketing concept. The implementation of marketing concept oriented CRM will be connected with finding out about customers' purchasing habits, opinions and preferences profiling individuals and groups to market more effectively and increase sales changing the way you operate to improve customer service and marketing. Benefiting from CRM is not just a question of investing the right software, but adapt CRM users to the concept of marketing including marketing orientation, customer orientation, and customer information orientation. No one deny that CRM is a process or methodology used to develop stronger relationships being composed of many technological components, but thinking about CRM in primarily technological terms is a big mistake. We can infer from this paper that the more useful way to think and implement about CRM is as a process that will help bring together lots of pieces of marketing concept about customers, marketing effectiveness, and market trends. Finally, a real situation we conducted our research may enable academics and practitioners to understand the antecedents and outcomes in the perceptive of marketing more clearly.

  • PDF

Index-based Searching on Timestamped Event Sequences (타임스탬프를 갖는 이벤트 시퀀스의 인덱스 기반 검색)

  • 박상현;원정임;윤지희;김상욱
    • Journal of KIISE:Databases
    • /
    • v.31 no.5
    • /
    • pp.468-478
    • /
    • 2004
  • It is essential in various application areas of data mining and bioinformatics to effectively retrieve the occurrences of interesting patterns from sequence databases. For example, let's consider a network event management system that records the types and timestamp values of events occurred in a specific network component(ex. router). The typical query to find out the temporal casual relationships among the network events is as fellows: 'Find all occurrences of CiscoDCDLinkUp that are fellowed by MLMStatusUP that are subsequently followed by TCPConnectionClose, under the constraint that the interval between the first two events is not larger than 20 seconds, and the interval between the first and third events is not larger than 40 secondsTCPConnectionClose. This paper proposes an indexing method that enables to efficiently answer such a query. Unlike the previous methods that rely on inefficient sequential scan methods or data structures not easily supported by DBMSs, the proposed method uses a multi-dimensional spatial index, which is proven to be efficient both in storage and search, to find the answers quickly without false dismissals. Given a sliding window W, the input to a multi-dimensional spatial index is a n-dimensional vector whose i-th element is the interval between the first event of W and the first occurrence of the event type Ei in W. Here, n is the number of event types that can be occurred in the system of interest. The problem of‘dimensionality curse’may happen when n is large. Therefore, we use the dimension selection or event type grouping to avoid this problem. The experimental results reveal that our proposed technique can be a few orders of magnitude faster than the sequential scan and ISO-Depth index methods.hods.

The Factors Influencing Intention to Use Bit Coin of Domestic Consumers (국내 소비자들의 비트코인 사용 의도에 영향을 미치는 요인 연구)

  • Shin, Dong-Hee;Kim, Yong-Moon
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.1
    • /
    • pp.24-41
    • /
    • 2016
  • Study is about Bit Coin that is electronic cash that is received attention globally in recent. It is increasing domestically that uses bit coin for convenience of micro payment, and also bit coin is possible to exchange each countries' currency. In this point, we searched understanding degree and acceptance of bit coin. Also we applied transformed TAM(Technology Acceptance Model) to search factors that have an effect on consumers' intention to use it. In advance, we analyze features of bit coin, and extract factors through preceding researches for existing electronic cash, because studies for intention to use bit coin are weak in internal and external. First of results is that 'economic efficiency' which is a characteristic variable of bit coin influences 'intention to use,' a dependent variable through 'perceived usefulness,' a parameter. It was investigated that monetary and mental costs that was costed when we use bit coin were less than using other cash. Secondly, 'payment convenience' that is a characteristic variable affects 'intention to use', a dependent variable through 'perceived usefulness,' a parameter. It was measured that problems of inconvenience that include transaction process, cash management time shortage and exchange changes will be solved by using bit coin. Thirdly, 'reliability' that is a perceived risk variable of bit coin has a direct effect on 'intention to use,' a dependent variable. It was investigated that we could achieve purpose of payment because we weren't influenced by breakdown on system by processing distributed database in some computers. Fourthly, 'perceived usefulness,' a parameter of bit coin directly affects 'intention to use,' a dependent variable. Then consumers who want to use bit coin are fascinated bit coin for various usability. Moreover, we want to provide implications to all of finance corporations, companies related electronic cash and bit coin users based on these results.

Nuclear Terrorism and Global Initiative to Combat Nuclear Terrorism(GICNT): Threats, Responses and Implications for Korea (핵테러리즘과 세계핵테러방지구상(GICNT): 위협, 대응 및 한국에 대한 함의)

  • Yoon, Tae-Young
    • Korean Security Journal
    • /
    • no.26
    • /
    • pp.29-58
    • /
    • 2011
  • Since 11 September 2001, warnings of risk in the nexus of terrorism and nuclear weapons and materials which poses one of the gravest threats to the international community have continued. The purpose of this study is to analyze the aim, principles, characteristics, activities, impediments to progress and developmental recommendation of the Global Initiative to Combat Nuclear Terrorism(GICNT). In addition, it suggests implications of the GICNT for the ROK policy. International community will need a comprehensive strategy with four key elements to accomplish the GICNT: (1) securing and reducing nuclear stockpiles around the world, (2) countering terrorist nuclear plots, (3) preventing and deterring state transfers of nuclear weapons or materials to terrorists, (4) interdicting nuclear smuggling. Moreover, other steps should be taken to build the needed sense of urgency, including: (1) analysis and assessment through joint threat briefing for real nuclear threat possibility, (2) nuclear terrorism exercises, (3) fast-paced nuclear security reviews, (4) realistic testing of nuclear security performance to defeat insider or outsider threats, (5) preparing shared database of threats and incidents. As for the ROK, main concerns are transfer of North Korea's nuclear weapons, materials and technology to international terror groups and attacks on nuclear facilities and uses of nuclear devices. As the 5th nuclear country, the ROK has strengthened systems of physical protection and nuclear counterterrorism based on the international conventions. In order to comprehensive and effective prevention of nuclear terrorism, the ROK has to strengthen nuclear detection instruments and mobile radiation monitoring system in airports, ports, road networks, and national critical infrastructures. Furthermore, it has to draw up effective crisis management manual and prepare nuclear counterterrorism exercises and operational postures. The fundamental key to the prevention, detection and response to nuclear terrorism which leads to catastrophic impacts is to establish not only domestic law, institution and systems, but also strengthen international cooperation.

  • PDF

Usability Assessment of Plan Transfer between TOMO HAD and Radixact : Planning Study (TOMO HDA와 Radixact 치료 계획 간 Transfer에 대한 유용성 평가 : Planning Study)

  • An, Ye Chan;Kim, Jong Sik;Kwon, Dong Yeol;Kim, Jin Man;Choi, Byeong Ki
    • The Journal of Korean Society for Radiation Therapy
    • /
    • v.30 no.1_2
    • /
    • pp.117-128
    • /
    • 2018
  • Purpose : To evaluate the usability of plan transfer between TOMO HD and Radixact, we compared the differences of dose in transferred plans by evaluating the dose of normal organ and target. TOMO HDA and Radixact. The completed plans were transferred each other and we compared the differences of dose by evaluating the DVH of each plans. Materials and Methods : We planned 4 different plans assuming the treatment of 2 cases in Head and Neck Cancer and 2 cases Prostate cancer. Each plan was designed so that 95 % of the prescription dose was irradiated over 99 % of the target volume, and the normal organ constraints dose was based on the SMC tolerance dose protocol. Each plan was transferred to each equipment and DVH(dose volume histogram) analysis of the transferred plans was compared and evaluated. Results : The Mean dose of CTV and GTV was increased and decreased in the transferred plans, but there was no significant differences. The target coverage of CTV and GTV was decreased in all cases of transferred plans from TOMO HAD to Radixact, and the change of CI and HI in CTV was within 0.1. Normal organ dose was increased in most cases when transferring from HAD to Radixact in both treatment plans. Conclusion : According to the results of this experiment, the target coverage was above the standard and the normal organ dose was almost same or decreased when transferring the plans from Radixact to HDA equipment. However the target coverage was reduced when transferring the plans from HDA to Radixact and there was an increase in dose in normal organs that could cause sever side effects such as Optic Chiasm ($D_{max}$1.38 Gy), Bladder ($D_{max}$3.07 Gy), Penile Bulb ($D_{max}$1.14 Gy). Therefore, it is necessary to pay attention to the dose change when transferring the plan and one-time transfer due to equipment inspection will be useful for efficient radiation therapy, but if the transferred treatment plans continue for several consecutive days, the treatment plan should be resumed.

  • PDF

Analysis of Reentry Test for the Donors Showing Reactivity or Grey Zone in a HBV Surface Antigen Assay by a Chemiluminescent Immunoassay (화학발광면역법에 의한 HBV 항원선별검사에서 양성 및 Grey Zone 결과를 보인 헌혈자의 헌혈 보류 해제 검사 결과 분석)

  • Shin, Sunmi;Kang, Jungwon;Lee, Kyeong Rak;Shin, Geon Sik;Kang, Jae-won;Seo, Young Ik;Min, Hyukki
    • The Korean Journal of Blood Transfusion
    • /
    • v.29 no.3
    • /
    • pp.301-309
    • /
    • 2018
  • Background: If donors who were deferred due to the reactivity or grey zone in HBV surface antigen (HBsAg) assay want to donate blood again, they need to pass reentry tests. On the other hand, approximately half of the donors who are subject to the reentry tests cannot be reentered. This study examined the association between the sample to cutoff (S/Co) value of the HBsAg assay and the final results of the reentry test. Methods: This study analyzed the S/Co values of the HBsAg assay and the final results of the reentry tests for the 3,947 donors from January 2008 to December 2017 using the database of Blood Information Management System of the Korean Red Cross. Results: 1,767 donors (44.8%) were not reentered among 3,947 deferred donors. Among 1,585 donors showing ${\geq}10$ of the S/Co value in the HBsAg screening test, 1,542 donors (97.3%) were not reentered. The additional reentry tests were performed on 120 donors who were not reentered in the first reentry test; 98 donors (81.7%) were still not reentered. Overall, 4.6% of the donors showing a grey zone in the HBsAg assay were not reentered. Conclusion: The reentry test needs to be restricted for the deferred donors showing a more than 10 S/Co value. The application of the grey zone of current HBsAg assay will need to be continued to enhance the HBV-related blood safety.

Analysis of Patient Effective Dose in PET/CT; Using CT Dosimetry Programs (CT 선량 측정 프로그램을 이용한 PET/CT 검사 환자의 예측 유효 선량의 분석)

  • Kim, Jung-Sun;Jung, Woo-Young;Park, Seung-Yong
    • The Korean Journal of Nuclear Medicine Technology
    • /
    • v.14 no.2
    • /
    • pp.77-82
    • /
    • 2010
  • Purpose: As PET/CT come into wide use, it caused increasing of expose in clinical use. Therefore, Korea Food and Drug Administration issued Patient DRL (Diagnostic Reference Level) in CT scan. In this study, to build the basis of patient dose reduction, we analyzed effective dose in transmission scan with CT scan. Materials and Methods: From February, 2010 to March 180 patients (age: $55{\pm}16$, weight: $61.0{\pm}10.4$ kg) who examined $^{18}F$-FDG PET/CT in Asan Medical Center. Biograph Truepoint 40 (SIEMENS, GERMANY), Biograph Sensation 16 (SIEMENS, GERMANY) and Discovery STe8 (GE healthcare, USA) were used in this study. Per each male and female average of 30 patients doses were analyzed by one. Automatic exposure control system for controlling the dose can affect the largest by a patient's body weight less than 50 kg, 50-60 kg less, 60 kg more than the average of the three groups were divided doses. We compared that measured value of CT-expo v1.7 and ImPACT v1.0. The relationship between body weight and the effective dose were analyzed. Results: When using CT-Expo V1.7, effective dose with BIO40, BIO16 and DSTe8 respectably were $6.46{\pm}1.18$ mSv, $9.36{\pm}1.96 $mSv and $9.36{\pm}1.96$ mSv for 30 male patients respectably $6.29{\pm}0.97$ mSv, $10.02{\pm}2.42$ mSv and $9.05{\pm}2.27$ mSv for 30 female patients respectably. When using ImPACT v1.0, effective dose with BIO40, BIO16 and DSTe8 respectably were $6.54{\pm}1.21$ mSv, $8.36{\pm}1.69$ mSv and $9.74{\pm}2.55$Sv for 30 male patients respectably $5.87{\pm}1.09$ mSv, $8.43{\pm}1.89$ mSv and $9.19{\pm}2.29$ mSv for female patients respectably. When divided three groups which were under 50 kg, 50~60 kg and over 60 kg respectably were 6.27 mSv, 7.67 mSv and 9.33 mSv respectably using CT-Expo V1.7, 5.62 mSv, 7.22 mSv and 8.91 mSv respectably using ImPACT v1.0. Weight and the effective dose coefficient analysis showed a very strong positive correlation(r=743, r=0.693). Conclusion: Using such a dose evaluation programs, easier to predict and evaluate the effective dose possible without performing phantom study and such dose evaluation programs could be used to collect basic data for CT dose management.

  • PDF

The Framework of Research Network and Performance Evaluation on Personal Information Security: Social Network Analysis Perspective (개인정보보호 분야의 연구자 네트워크와 성과 평가 프레임워크: 소셜 네트워크 분석을 중심으로)

  • Kim, Minsu;Choi, Jaewon;Kim, Hyun Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.1
    • /
    • pp.177-193
    • /
    • 2014
  • Over the past decade, there has been a rapid diffusion of electronic commerce and a rising number of interconnected networks, resulting in an escalation of security threats and privacy concerns. Electronic commerce has a built-in trade-off between the necessity of providing at least some personal information to consummate an online transaction, and the risk of negative consequences from providing such information. More recently, the frequent disclosure of private information has raised concerns about privacy and its impacts. This has motivated researchers in various fields to explore information privacy issues to address these concerns. Accordingly, the necessity for information privacy policies and technologies for collecting and storing data, and information privacy research in various fields such as medicine, computer science, business, and statistics has increased. The occurrence of various information security accidents have made finding experts in the information security field an important issue. Objective measures for finding such experts are required, as it is currently rather subjective. Based on social network analysis, this paper focused on a framework to evaluate the process of finding experts in the information security field. We collected data from the National Discovery for Science Leaders (NDSL) database, initially collecting about 2000 papers covering the period between 2005 and 2013. Outliers and the data of irrelevant papers were dropped, leaving 784 papers to test the suggested hypotheses. The co-authorship network data for co-author relationship, publisher, affiliation, and so on were analyzed using social network measures including centrality and structural hole. The results of our model estimation are as follows. With the exception of Hypothesis 3, which deals with the relationship between eigenvector centrality and performance, all of our hypotheses were supported. In line with our hypothesis, degree centrality (H1) was supported with its positive influence on the researchers' publishing performance (p<0.001). This finding indicates that as the degree of cooperation increased, the more the publishing performance of researchers increased. In addition, closeness centrality (H2) was also positively associated with researchers' publishing performance (p<0.001), suggesting that, as the efficiency of information acquisition increased, the more the researchers' publishing performance increased. This paper identified the difference in publishing performance among researchers. The analysis can be used to identify core experts and evaluate their performance in the information privacy research field. The co-authorship network for information privacy can aid in understanding the deep relationships among researchers. In addition, extracting characteristics of publishers and affiliations, this paper suggested an understanding of the social network measures and their potential for finding experts in the information privacy field. Social concerns about securing the objectivity of experts have increased, because experts in the information privacy field frequently participate in political consultation, and business education support and evaluation. In terms of practical implications, this research suggests an objective framework for experts in the information privacy field, and is useful for people who are in charge of managing research human resources. This study has some limitations, providing opportunities and suggestions for future research. Presenting the difference in information diffusion according to media and proximity presents difficulties for the generalization of the theory due to the small sample size. Therefore, further studies could consider an increased sample size and media diversity, the difference in information diffusion according to the media type, and information proximity could be explored in more detail. Moreover, previous network research has commonly observed a causal relationship between the independent and dependent variable (Kadushin, 2012). In this study, degree centrality as an independent variable might have causal relationship with performance as a dependent variable. However, in the case of network analysis research, network indices could be computed after the network relationship is created. An annual analysis could help mitigate this limitation.