• Title/Summary/Keyword: Accept

Search Result 1,686, Processing Time 0.04 seconds

Technical Efficiency in Korea: Interindustry Determinants and Dynamic Stability (기술적(技術的) 효율성(效率性)의 결정요인(決定要因)과 동태적(動態的) 변화(變化))

  • Yoo, Seong-min
    • KDI Journal of Economic Policy
    • /
    • v.12 no.4
    • /
    • pp.21-46
    • /
    • 1990
  • This paper, a sequel to Yoo and Lee (1990), attempts to investigate the interindustry determinants of technical efficiency in Korea's manufacturing industries, and also to conduct an exploratory analysis on the stability of technical efficiency over time. The hypotheses set forth in this paper are most found in the existing literature on technical efficiency. They are, however, revised and shed a new light upon, whenever possible, to accommodate any Korea-specific conditions. The set of regressors used in the cross-sectional analysis are chosen and the hypotheses are posed in such a way that our result can be made comparable to those of similar studies conducted for the U.S. and Japan by Caves and Barton (1990) and Uekusa and Torii (1987), respectively. It is interesting to observe a certain degree of similarity as well as differentiation between the cross-section evidence on Korea's manufacturing industries and that on the U.S. and Japanese industries. As for the similarities, we can find positive and significant effects on technical efficiency of relative size of production and the extent of specialization in production, and negative and significant effect of the variations in capital-labor ratio within industries. The curvature influence of concentration ratio on technical efficiency is also confirmed in the Korean case. There are differences, too. We cannot find any significant effects of capital vintage, R&D and foreign competition on technical efficiency, all of which were shown to be robust determinants of technical efficiency in the U.S. case. We note, however, that the variables measuring capital vintage effect, R&D and the degree of foreign competition in Korean markets are suspected to suffer from serious measurement errors incurred in data collection and/or conversion of industrial classification system into the KSIC (Korea Standard Industrial Classification) system. Thus, we are reluctant to accept the findings on the effects of these variables as definitive conclusions on Korea's industrial organization. Another finding that interests us is that the cross-industry evidence becomes consistently strong when we use the efficiency estimates based on gross output instead of value added, which provides us with an ex post empirical criterion to choose an output measure between the two in estimating the production frontier. We also conduct exploratory analyses on the stability of the estimates of technical efficiency in Korea's manufacturing industries. Though the method of testing stability employed in this paper is never a complete one, we cannot find strong evidence that our efficiency estimates are stable over time. The outcome is both surprising and disappointing. We can also show that the instability of technical efficiency over time is partly explained by the way we constructed our measures of technical efficiency. To the extent that our efficiency estimates depend on the shape of the empirical distribution of plants in the input-output space, any movements of the production frontier over time are not reflected in the estimates, and possibilities exist of associating a higher level of technical efficiency with a downward movement of the production frontier over time, and so on. Thus, we find that efficiency measures that take into account not only the distributional changes, but also the shifts of the production frontier over time, increase the extent of stability, and are more appropriate for use in a dynamic context. The remaining portion of the instability of technical efficiency over time is not explained satisfactorily in this paper, and future research should address this question.

  • PDF

Recognition and Enforcement of Foreign Arbitral Awards in Korea (한국에서의 외국중재판정의 승인과 집행)

  • Kim, Sang-Ho
    • Journal of Arbitration Studies
    • /
    • v.17 no.3
    • /
    • pp.3-30
    • /
    • 2007
  • The New York Convention(formally called "United Nations Convention on the Recognition and Enforcement of Foreign Arbitral Awards") done in New York on June 10, 1958 has been adhered to by more than 140 States at the time of this writing, including almost all important trading nations from the Capitalist and Socialist World as well as many developing countries. The Convention can be considered as the most important Convention in the field of arbitration and as the cornerstone of current international commercial arbitration. Korea has acceded to the New York Convention since 1973. When acceding to the Convention, Korea declared that it will apply the Convention to the recognition and enforcement of awards made only in the territory of another Contracting State on the basis of reciprocity. Also, Korea declared that it will apply the Convention only to differences arising out of legal relationships, whether contractual or not, which are considered as commercial under the national law of Korea. The provisions relating to the enforcement of arbitral awards falling under the New York Convention begin at Article III. The Article III contains the general obligation for the Contracting States to recognize Convention awards as binding and to enforce them in accordance with their rules of procedure. The Convention requires a minimum of conditions to be fulfilled by the party seeking enforcement. According to Article IV(1), that party has only to supply (1) the duly authenticated original award or a duly certified copy thereof, and (2) the original arbitration agreement or a duly certified copy thereof. In fulfilling these conditions, the party seeking enforcement produces prima facie evidence entitling it to obtain enforcement of the award. It is then up to the other party to prove that enforcement should not be granted on the basis of the grounds for refusal of enforcement enumerated in the subsequent Article V(1). Grounds for refusal of enforcement are stipulated in Article V is divided into two parts. Firstly, listed in the first Para. of Article V are the grounds for refusal of enforcement which are to be asserted and proven by the respondent. Secondly, listed in Para. 2 of Article V, are the grounds on which a court may refuse enforcement on its own motion. These grounds are non-arbitrability of the subject matter and violation of the public policy of the enforcement country. The three main features of the grounds for refusal of enforcement of an award under Article V, which are almost unanimously affirmed by the courts, are the following. Firstly, The grounds for refusal of enforcement mentioned in Article V are exhaustive. No other grounds can be invoked. Secondly, and this feature follows from the first one, the court before which enforcement of the award is sought may not review the merits of the award because a mistake in fact or law by the arbitrators is not included in the list of grounds for refusal of enforcement set forth in Article V. Thirdly, the party against whom enforcement is sought has the burden of proving the existence of one or more of the grounds for refusal of enforcement. The grounds for refusal of enforcement by a court on its own motion, listed in the second Para. of Article V, are non-arbitrability of the subject matter and public policy of the enforcement country. From the court decisions reported so far at home and abroad, it appears that courts accept a violation of public policy in extreme cases only, and frequently justify their decision by distinguishing between domestic and international public policy. The Dec. 31, 1999 amendment to the Arbitration Act of Korea admits the basis for enforcement of foreign arbitral awards rendered under the New York Convention. In Korea, a holder of a foreign arbitral award is obliged to request from the court a judgment ordering enforcement of the award.

  • PDF

ANC Caching Technique for Replacement of Execution Code on Active Network Environment (액티브 네트워크 환경에서 실행 코드 교체를 위한 ANC 캐싱 기법)

  • Jang Chang-bok;Lee Moo-Hun;Cho Sung-Hoon;Choi Eui-In
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.9B
    • /
    • pp.610-618
    • /
    • 2005
  • As developed Internet and Computer Capability, Many Users take the many information through the network. So requirement of User that use to network was rapidly increased and become various. But it spend much time to accept user requirement on current network, so studied such as Active network for solved it. This Active node on Active network have the capability that stored and processed execution code aside from capability of forwarding packet on current network. So required execution code for executed packet arrived in active node, if execution code should not be in active node, have to take by request previous Action node and Code Server to it. But if this execution code take from previous active node and Code Server, bring to time delay by transport execution code and increased traffic of network and execution time. So, As used execution code stored in cache on active node, it need to increase execution time and decreased number of request. So, our paper suggest ANC caching technique that able to decrease number of execution code request and time of execution code by efficiently store execution code to active node. ANC caching technique may decrease the network traffic and execution time of code, to decrease request of execution code from previous active node.

Some New Problems of International Aviation Security- Considerations Forcused on its Legal Aspects (최근국제항공보안대책(最近國際航空保安対策)의 제간제(諸間題) -특히 법적측면(法的測面)을 중심(中心)으로-)

  • Choi, Wan-Sik
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.5
    • /
    • pp.53-75
    • /
    • 1993
  • This article is concerned with the comment on "Some New Problems of International Aviation Security-Considerations Forcused on its Legal Aspects". Ever since 1970, in addition to the problem of failure to accept the Tokyo, Hague and Montreal Conventions, there has been also the problem of parties to them, failing to comply with their obligations under the respective treaties, in the form especially of nominal penalties or the lack of any effort to prosecute after blank refusals to extradite. There have also been cases of prolonged detention of aircraft, passengers and hostages. In this regard, all three conventions contain identical clauses which submit disputes between two or more contracting States concerning the interpretation or application of the respective conventions to arbitration or failing agreement on the organization of the arbitration, to the International Court of Justice. To the extent to which contracting States have not contracted out of this undertaking, as I fear they are expressly allowed to do, this promision can be used by contracting States to ensure compliance. But to date, this avenue does not appear to have been used. From this point of view, it may be worth mentioning that there appears to be an alarming trend towards the view that the defeat of terrorism is such an overriding imperative that all means of doing so become, in international law, automatically lawful. In addition, in as far as aviation security is concerned, as in fact it has long been suggested, what is required is the "application of the strictest security measures by all concerned."In this regard, mention should be made of Annex 17 to the Chicago Convention on Security-Safeguarding International Civil Aviation against Acts of Unlawful Intereference. ICAO has, moreover, compiled, for restricted distribution, a Security Manual for Safeguarding Civil Aviation Against Acts of Unlawful Interference, which is highly useful. In this regard, it may well be argued that, unless States members of ICAO notify the ICAO Council of their inability to comply with opecific standards in Annex 17 or any of the related Annexes in accordance with Article 38 of the 1944 Chicago Convention on International Civil Aviation, their failure to do so can involve State responsibility and, if damage were to insure, their liability. The same applies to breaches of any other treaty obligation. I hope to demonstrate that although modes of international violence may change, their underlying characteristics remain broadly similar, necessitating not simply the adoption of an adequate body of domestic legislation, firm in its content and fairly administered, but also an international network of communication, of cooperation and of coordination of policies. Afurther legal instrument is now being developed by the Legal Committee of ICAO with respect to unlawful acts at International airports. These instruments, however, are not very effective, because of the absence of universal acceptance and the deficiency I have already pointed out. Therefore, States, airports and international airlines have to concentrate on prevention. If the development of policies is important at the international level, it is equally important in the domestic setting. For example, the recent experiences of France have prompted many changes in the State's legislation and in its policies towards terrorism, with higher penalties for terrorist offences and incentives which encourage accused terrorists to pass informations to the authorities. And our government has to tighten furthermore security measures. Particularly, in the case an unarmed hijacker who boards having no instrument in his possession with which to promote the hoax, a plaintiff-passenger would be hard-pressed to show that the airline was negligent in screening the hijacker prior to boarding. In light of the airline's duty to exercise a high degree of care to provide for the safety of all the passengers on board, an acquiescence to a hijacker's demands on the part of the air carrier could constitute a breach of duty only when it is clearly shown that the carrier's employees knew or plainly should have known that the hijacker was unarmed. The general opinion is that the legal oystem could be sufficient, provided that the political will is there to use and apply it effectively. All agreed that the main responsibility for security has to be borne by the governments. A state that supports aviation terrorism is responsible for violation of International Aviation Law. Generally speaking, terrorism is a violation of international law. It violates the sovereign rights of states, and the human rights of the individuals. We have to contribute more to the creation of a general consensus amongst all states about the need to combat the threat of aviation terrorism. I think that aviation terrorism as becoming an ever more serious issue, has to be solved by internationally agreed and closely co - ordinated measures.

  • PDF

Examining the Formation of Entrepreneurial Activities through Cognitive Approach (기업가적 활동 형성에 미치는 영향요인: 인지론적 접근)

  • Lee, Chaewon
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.12 no.3
    • /
    • pp.65-74
    • /
    • 2017
  • There have been questions how entrepreneurs think, act and why individuals become entrepreneurs. The trait-based explanation of entrepreneurial activities has been main stream. However, the trait-based theory has been criticized because it assumes that entrepreneurial traits are inherited, stable and enduring over time. This research accepts the cognitive theory to see how entrepreneurs learn or accept others' values, how entrepreneurial perceptions of opportunity impact entrepreneurial actions and how individuals acquire the social legitimation of the formation of entrepreneurial activities. In order to capture the attitudes, activities and motivations of people who are involved in entrepreneurial activities, the author uses the GEM Korea 2016 data. The data from the Global Entrepreneurship Monitor(GEM) has been well known for the data to capture individuals early-stage entrepreneurial activities. This paper used the sample from the APS(Adult Population Survey) of the GEM which was completed by a representative sample of two thousand adults in Korea by the qualified survey vendor, with strict procedures and oversight by the GEM central data team. The hypotheses are tested with logit regression analysis to estimate the probability of the influence of perceptual variables such as individual perception in social learning, the opportunity recognition in the environment, and social legitimation in the entrepreneurial activities. Based on the results, individuals tend to have high entrepreneurial activities if individuals have high self-efficacy. Also, the existence of role models around the entrepreneurs encourages the individuals involve in entrepreneurial activities more however the perception of opportunity in the environment is not strongly associated with entrepreneurial activities. The media exposure of successful entrepreneurs is more important than others' perception of entrepreneurs on the desirable career option or respect from communities. This paper can contribute to the cognitive processes, particular perception about oneself, as well as perception which is impacted by a community or a society.

  • PDF

A Study on Soviet Constructive Fashion in 1920s (1920년대 소비에트 구성주의 패션에 관한 연구)

  • 조윤경;금기숙
    • Journal of the Korean Society of Costume
    • /
    • v.36
    • /
    • pp.183-203
    • /
    • 1998
  • The wave of Avant-garde swept away all in the unique social background so called 'October Revolution' and the early 1900 Russian society which was able to absorb and accept anything. The Russian avant-garde has been affected by the Cubism and the Futurism those had peculiarly appeared in the early twentieth century, spreaded out to three spheres: the Suprematism, the Rayonism and the Constructivism. The Russian Constructivism has appeared in this background, concretely and ideally ex-pressed the ideology of the revolution into the artistic form and made an huge influence to the whole Russian society. The Constructivist like Tatlin, naum Gabo, Pevaner, Rodchenko, Stepanova, Popova and Exter gave great effect on the Soviet Constructive fashion design in 1920's after the Revolution. The Soviet costume in 1920s hold in common the characteristicss of the Constructive graphic as it is, geometrical and abstractive form, energetic and motility. In fashion design, these graphic qualities have been showed as the application of geometrical form and architectural image, physical distortion and transformation. And in textile design, the simple, dynamical presentation has been appeared. We can classify the Soviet costume at this time into three occasions. The first term is from late 1910 th mid 1920, and it is altered from folk costume design to modern one. With Lamanova as the first on the list, using the folk mitif, the Constructive expression of simple form has been gradually revealed in design. Designers like Makarova, Pribylskaia and Mukhina produced the plane, simple chemise style with the decoration of the Russian traditional motif. From early to late 1920 is the second term, and it is at the pick of the most active processing of the Constructive design. Not only at the costume in daily life but also at the theatrical costume and textile, the con-structive design has been represented all avail-able fields. Many Constructivists including Stepanova, Popova, Exter and Rodchenko took part in the textile design and costume design so as to evlvo their aesthetic concept. The third term is from late 1920 to early 1930. The socialistic realism has dominated over the whole culture and art, the revolutionary dynamic motif has been presented also in textile design. The formative features of Soviet Constructive fashion design are; silhouette, from, motif, color and fabric. The first, the silhouette : a straight rectangular silhouetted has been expressed through the whole period and a volumed one with distorted human body shape has introduced in the theatrical costume design. The second, the form: many lengthened rectangular forms have been made at beginnings, but to the middle period, geometrical, architectural forms have been more showed and there are energy and movement in design. At the last period, only a partial feature-division has been seen. The third, the motif; no pattern or ethnic motif has been partly used at beginnings, a figure like circle, tri-angle has gradually appeared in textile design. At latter period, a real-existent motif like an airplane has been represented with graphing and simplicity. The fourth, the color ; because of insufficient dyeing, neutral color like black or grey color has been mainly covered, but after middle term, a primary color or pastel tone has been seen, contrast of the fabric; without much development of textile industry after the Revolution, thick and durable fabrics have been the main stream, but as time had going to the last period, fabrics such as linen, cotton, velvet and silk have been varously choesn. At the theatrical costume, new materials like plastics and metals that were able to accentuate the form. The pursuit of popularity, simplicity and functionalism that the basic concept of Constructive fashion is one of the "beauty" which has been searching in modern fashion. And now we can appreciate how innovative and epochal this Soviet Constructive fashion movement was.ement was.

  • PDF

The Comparative Study of Costume and Ornaments between Shilla and Uighur (신라복식과 위구르복식의 관계 연구)

  • 한윤숙
    • Journal of the Korean Society of Costume
    • /
    • v.24
    • /
    • pp.15-28
    • /
    • 1995
  • This thesis focuses on the study of costume and ornaments of Shilla which had been severely affected by Uighur, and those of Uighur in Uighur self-governing district located in Shin Kang. East Turkestan, in Centrals Asia. This study aims to identifty the way of intergration of Uighur's costume and ornaments into Shilla, and orgins of Shill's costume and ornaments which had amix of internationl elelemnts thoursh cross exchanges, by comparing the differences between the two, and at the same time to clarify the pedigree of Korean costume and ornaments which are said to be udner a severe Chinese influence, by highlingting its uniqueness and originality . The result of the study demonstrates and originality of SHilla by melting foreign cultures into its own style in the process of accepting them. This means that the Shilla has recreated them in t도 form of simplification, and added naturalistic abstratness which is an element of Norther culture. The costume and ornaments are divided into coronets men's costuem, women's costume, and accessories 1. Coroncts A horse-riding man, and the costume type of 유고제 착유지체형 tell the Northern culture's influence on 백화수피기마인물채화담립 and patterns of a lotus flowr and arabesque show the 백화수피기마인물채색답립 has an influence of Buddhism with cluture of bordering countries of Western China , The origin of 뱍회수피제안형건(원정형, 방정형) lies in Northern cultures which can be found in ancient tombs of the Huns in noin-Ila , and stone caves of Jizil in Kochang. The wall paintings in Alexandropol, Murutuk and 돈황 No. 409 cave show that 초화형입식계금관 is under the influence of Northern culture, and Bezerkrick No, 25 cave and 회 번 in Kocho also show 수목녹각형입식관 is under the influence of Northern culture, with its origin in Novecherkaask. In this regard, the transformed coroncts of Shilla has shows a blended culture of Shilla with Nothern, Chinese, and Western cultures. 2. Men's Costume 반령포 derives from cultures of bordering countries of Western China centering around Uighur and Turkey. 연주문 in Uighur prince's costume and in Uighur paintings of Central Asia were reflected into the arts of Shilla in a direct way, and the motive of Uighur was deviatelly expressed at Shilla's arts in the form of simplicity , and naturalistic abstract paintings as in shown at 입수쌍조문 in tiles and brick. Along with this , 고착지체형 costume originates from Eurasia's Northern horseriding costumes as was shown in a golden man in B.C.4-5C which is now possessed by Kazakstan Republic Academy Archelogy Center Museum, and a golden figure from Skitai ancient caves, an the origin is carried away into wall paintings of Kizil No.14. cave in 8c and Astana's early period ancient tomb. No.6. 3. Women's Costume The hair styles of Shilla people are either 변발 or up -style with a lot of hair around it whose origin can be seen in Astana No.216 and No.187 caves of Kochang and Uighur's wall paintings of royal princess's hair style. Astana's middle period No. 206 and No.230 tombs reveal the its origin of 고착장군 while Astana early period No. 6 tomb shows that of 광유풍만형. 4. Accessories The earrings with small golden beads is seen at earring of figure holding a sword in wall painting of figure holding a sword in wall painting of Kizil in about 5 C. and those of a offering people in Sorchuk wall paintings. The earrings with small golden beads originates from a golden pendant of Shivargan, Afganistan, and golden pendants and other golden and metal accessories from Chrioba ancient tombs in Skiti Critia peninsula. Shilla's costume derives from the costume style of horse-ridding man, which proves the fact that Shilla people are horse-ridding peoplewith excellent horse-ridding techniques, and traditions. The people of Shilla are from horse-ridding people of local mounted momads in Northern part of Siberia steppe and this origin of Northern culture had been carried into Uighur in East Turkestan. At the same time , Shilla has a wealth and power since it was rich in gold and iron , thus producing lots of materials made of them. The results of this study emphasizes Shilla's identity and self-control by creating an independent an innovative heterogeneous culture since Shill's active exchanges with East Asia allowed it to accept the most civilized Uighur culture in East Turkestan among Altai languate which had frequent cross contacts with India and Europe.

  • PDF

Structural Relationships Among Factors to Adoption of Telehealth Service (원격의료서비스 수용요인의 구조적 관계 실증연구)

  • Kim, Sung-Soo;Ryu, See-Won
    • Asia pacific journal of information systems
    • /
    • v.21 no.3
    • /
    • pp.71-96
    • /
    • 2011
  • Within the traditional medical delivery system, patients residing in medically vulnerable areas, those with body movement difficulties, and nursing facility residents have had limited access to good healthcare services. However, Information and Communication Technology (ICT) provides us with a convenient and useful means of overcoming distance and time constraints. ICT is integrated with biomedical science and technology in a way that offers a new high-quality medical service. As a result, rapid technological advancement is expected to play a pivotal role bringing about innovation in a wide range of medical service areas, such as medical management, testing, diagnosis, and treatment; offering new and improved healthcare services; and effecting dramatic changes in current medical services. The increase in aging population and chronic diseases has caused an increase in medical expenses. In response to the increasing demand for efficient healthcare services, a telehealth service based on ICT is being emphasized on a global level. Telehealth services have been implemented especially in pilot projects and system development and technological research. With the service about to be implemented in earnest, it is necessary to study its overall acceptance by consumers, which is expected to contribute to the development and activation of a variety of services. In this sense, the study aims at positively examining the structural relationship among the acceptance factors for telehealth services based on the Technology Acceptance Model (TAM). Data were collected by showing audiovisual material on telehealth services to online panels and requesting them to respond to a structured questionnaire sheet, which is known as the information acceleration method. Among the 1,165 adult respondents, 608 valid samples were finally chosen, while the remaining were excluded because of incomplete answers or allotted time overrun. In order to test the reliability and validity of the assessment scale items, we carried out reliability and factor analyses, and in order to explore the causal relation among potential variables, we conducted a structural equation modeling analysis using AMOS 7.0 and SPSS 17.0. The research outcomes are as follows. First, service quality, innovativeness of medical technology, and social influence were shown to affect perceived ease of use and perceived usefulness of the telehealth service, which was statistically significant, and the two factors had a positive impact on willingness to accept the telehealth service. In addition, social influence had a direct, significant effect on intention to use, which is paralleled by the TAM used in previous research on technology acceptance. This shows that the research model proposed in the study effectively explains the acceptance of the telehealth service. Second, the research model reveals that information privacy concerns had a insignificant impact on perceived ease of use of the telehealth service. From this, it can be gathered that the concerns over information protection and security are reduced further due to advancements in information technology compared to the initial period in the information technology industry, and thus the improvement in quality of medical services appeared to ensure that information privacy concerns did not act as a prohibiting factor in the acceptance of the telehealth service. Thus, if other factors have an enormous impact on ease of use and usefulness, concerns over these results in the initial period of technology acceptance may become irrelevant. However, it is clear that users' information privacy concerns, as other studies have revealed, is a major factor affecting technology acceptance. Thus, caution must be exercised while interpreting the result, and further study is required on the issue. Numerous information technologies with outstanding performance and innovativeness often attract few consumers. A revised bill for those urgently in need of telehealth services is about to be approved in the national assembly. As telemedicine is implemented between doctors and patients, a wide range of systems that will improve the quality of healthcare services will be designed. In this sense, the study on the consumer acceptance of telehealth services is meaningful and offers strong academic evidence. Based on the implications, it can be expected to contribute to the activation of telehealth services. Further study is needed to assess the acceptance factors for telehealth services, such as motivation to remain healthy, health care involvement, knowledge on health, and control of health-related behavior, in order to develop unique services according to the categorization of customers based on health factors. In addition, further study may focus on various theoretical cognitive behavior models other than the TAM, such as the health belief model.

A Comparative Case Study on the Adaptation Process of Advanced Information Technology: A Grounded Theory Approach for the Appropriation Process (신기술 사용 과정에 관한 비교 사례 연구: 기술 전유 과정의 근거이론적 접근)

  • Choi, Hee-Jae;Lee, Zoon-Ky
    • Asia pacific journal of information systems
    • /
    • v.19 no.3
    • /
    • pp.99-124
    • /
    • 2009
  • Many firms in Korea have adopted and used advanced information technology in an effort to boost efficiency. The process of adapting to the new technology, at the same time, can vary from one firm to another. As such, this research focuses on several relevant factors, especially the roles of social interaction as a key variable that influences the technology adaptation process and the outcomes. Thus far, how a firm goes through the adaptation process to the new technology has not been yet fully explored. Previous studies on changes undergone by a firm or an organization due to information technology have been pursued from various theoretical points of views, evolved from technological and institutional views to an integrated social technology views. The technology adaptation process has been understood to be something that evolves over time and has been regarded as cycles between misalignments and alignments, gradually approaching the stable aligned state. The adaptation process of the new technology was defined as "appropriation" process according to Poole and DeSanctis (1994). They suggested that this process is not automatically determined by the technology design itself. Rather, people actively select how technology structures should be used; accordingly, adoption practices vary. But concepts of the appropriation process in these studies are not accurate while suggested propositions are not clear enough to apply in practice. Furthermore, these studies do not substantially suggest which factors are changed during the appropriation process and what should be done to bring about effective outcomes. Therefore, research objectives of this study lie in finding causes for the difference in ways in which advanced information technology has been used and adopted among organizations. The study also aims to explore how a firm's interaction with social as well as technological factors affects differently in resulting organizational changes. Detail objectives of this study are as follows. First, this paper primarily focuses on the appropriation process of advanced information technology in the long run, and we look into reasons for the diverse types of the usage. Second, this study is to categorize each phases in the appropriation process and make clear what changes occur and how they are evolved during each phase. Third, this study is to suggest the guidelines to determine which strategies are needed in an individual, group and organizational level. For this, a substantially grounded theory that can be applied to organizational practice has been developed from a longitudinal comparative case study. For these objectives, the technology appropriation process was explored based on Structuration Theory by Giddens (1984), Orlikoski and Robey (1991) and Adaptive Structuration Theory by Poole and DeSanctis (1994), which are examples of social technology views on organizational change by technology. Data have been obtained from interviews, observations of medical treatment task, and questionnaires administered to group members who use the technology. Data coding was executed in three steps following the grounded theory approach. First of all, concepts and categories were developed from interviews and observation data in open coding. Next, in axial coding, we related categories to subcategorize along the lines of their properties and dimensions through the paradigm model. Finally, the grounded theory about the appropriation process was developed through the conditional/consequential matrix in selective coding. In this study eight hypotheses about the adaptation process have been clearly articulated. Also, we found that the appropriation process involves through three phases, namely, "direct appropriation," "cooperate with related structures," and "interpret and make judgments." The higher phases of appropriation move, the more users represent various types of instrumental use and attitude. Moreover, the previous structures like "knowledge and experience," "belief that other members know and accept the use of technology," "horizontal communication," and "embodiment of opinion collection process" are evolved to higher degrees in their dimensions of property. Furthermore, users continuously create new spirits and structures, while removing some of the previous ones at the same time. Thus, from longitudinal view, faithful and unfaithful appropriation methods appear recursively, but gradually faithful appropriation takes over the other. In other words, the concept of spirits and structures has been changed in the adaptation process over time for the purpose of alignment between the task and other structures. These findings call for a revised or extended model of structural adaptation in IS (Information Systems) literature now that the vague adaptation process in previous studies has been clarified through the in-depth qualitative study, identifying each phrase with accuracy. In addition, based on these results some guidelines can be set up to help determine which strategies are needed in an individual, group, and organizational level for the purpose of effective technology appropriation. In practice, managers can focus on the changes of spirits and elevation of the structural dimension to achieve effective technology use.

A Study on the Acceptance of Convergence System of Broadcasting, and Telecommunication, and Their Relative Efficiency Focusing on IPFV (방송과 통신 융합시스템의 수용 및 상대적 효능에 관한 연구: IPTV를 중심으로)

  • Um, Myoung-Yong;Lee, Sang-Ho;Kim, Jai-Beam
    • Asia pacific journal of information systems
    • /
    • v.19 no.3
    • /
    • pp.25-49
    • /
    • 2009
  • Advances in technology have resulted in the emergence of new information systems. The convergence of IT and manufacturing sectors has blurred the boundaries among industries. Also, such convergence has become established as a paradigm to build a new area. Especially the convergence of broadcasting and telecommunication, notably in the case of IPTV (Internet Protocol Television), is among the most salient examples of its kind in recent years as a major case of disruptive technology innovation. Despite its much fanfare, such convergence, however, has not fulfilled the expectation; it has not produced positive economic effects while negatively affecting the growth of IPIV. Stakeholders in and around IPIV including telecommunication companies, broadcasting corporations, and government bodies wish to gain control of IPTV under their wings. IPTV has drifted in the midst of conflicts among the stakeholders in and around IPTV, particularly telecommunication and broadcasting organizations in a broad sense. Our empirical research intends to deal with how audiences accept IPTV and how firms provide IPTV services to utilize their resources. Three research questions in this paper include, first, whether Technology Acceptance Model (TAM) can sufficiently explain the acceptance of IPTV as an information system. The second question concerns with empirically testing the playful aspect of IPTV to increase its audience acceptance. Last, but not least, this paper deals with how firms can efficiently and effectively allocate their limited resources to increase IPTV viewers. To answer those three main questions of our study, we collect data from 197 current subscribers of high speed internet service and/or cable/satellite television. Empirical results show that 'perceived usefulness (PU) $\rightarrow$ Intention to use' and 'perceived ease of use (PEU) $\rightarrow$ Intention to use' are significant. Also, 'perceived ease of use' is significantly related to 'perceived usefulness.' Perceived ease of handling IPTV without much effort can positively influence the perceived value of IPTV. In this regard, engineers and designers of IPTV should pay more attention to the user-friendly interface of IPTV. In addition, 'perceived playfulness (PP)' of IPTV is positively related to 'intention to use'. Flow, fun and entertainment have recently gained greater attention in the research concerned with information systems. Such attention is due to the changing features of information systems in recent years that combine the functional and leisure attributes. These results give practical implications to the design of IPTV that reflects not just leisure but also functional elements. This paper also investigates the relationship between 'perceived ease of use (PEU)' and 'perceived playfulness (PP).' PEU is positively related to pp. Audiences without fear can be attracted more easily to the user-friendly IPTV, thereby perceiving the fun and entertainment with ease. Practical implications from this finding are that, to attract more interest and involvement from the audience, IPTV needs to be designed with similar or even more user friendly interface. Of the factors related to 'intention to use', 'perceived usefulness (PU)' and 'perceived ease of use (PEU)' have greater impacts than 'perceived playfulness (PP).' Between PU and PEU, their impacts on 'intention to use' are not significantly different statistically. Managerial implications of this finding are that firms in preparation for the launch of IPTV service should prioritize the functions and interface of IPTV. This empirical paper also provides further insight into the ways in which firms can strategically allocate their limited resources so as to appeal to viewers, both current and potential, of IPTV.