The purpose of this study is to analyze the effect of policy boosting fertility and labor participation rate on potential GDP growth rate. To do this, we employ a growth accounting approach, which decomposes per capita GDP into two parts. The first one is the change of dependency ratio and the other is the change of labor input. The labor input is again decomposed into the qualitative and quantitative parts. The quantitative part considers the change of labor participation rate and working time. The qualitative aspects is based on the trend of productivity of labor. From the scenarios of NSO(National Statistics Office), the effect of the fertility-raising policy on per capita potential GDP growth rate is calculated and projected to the year of 2050. We also forecast the policy effect inducing high labor participating rate of female labor and beyond 55-year old labor. The baseline results show that the per capita GDP growth rate will show mid 4% to the year of 2010, gradually declining to 3.94% by 2020, 3.03% by 2030, 2.41% by 2040. The high fertility rate scenario will not have effects on the potential growth by 2030, but show 0.10%p higher per capita GDP growth rate than that of baseline scenario result. By the high female labor participation policy, the per capita GDP growth rate will reach 0.04%p higher per capita GDP growth rate than that of baseline scenario. Based on the results of this paper, we conclude that the quantitative labor input cannot solely account for the trend decline of potential GDP, and the qualitative aspect, like labor productivity, is much more important element to sustain and boots the economic growth.
Lim, Sam Jin;Park, Jun Tae;Kim, Young Il;Kim, Tae Ho
Journal of Korean Society of Transportation
/
v.30
no.6
/
pp.37-46
/
2012
The number of traffic accidents caused by elderly drivers over the age of 65 has surged over the past ten years from 37,000 to 274,000 cases. The proportion of elderly drivers' accidents has jumped 3.1 times from 1.2% to 3.7% out of all traffic accidents, and traffic safety organizations are pursuing diverse measures to address the situation. Above all, connecting safety measures with an in-depth research on behavioral and physical characteristics of elderly drivers will prove vital. This study conducted an empirical research linking the driving characteristics and traffic accidents by elderly drivers based on the Driving Aptitude Test items and traffic accident data, which enabled the measurement of behavioral characteristics of elderly drivers. In developing the Influence Model, we applied the zero-inflated Poisson (ZIP) regression model and selected an accident prediction model based on the Bayesian Influence in regards to the ZIP regression model and the zero-inflated negative binomial (ZINB) regression model. According to the results of the AAE analysis, the ZIP regression model was more appropriate and it was found that three variables? prediction of velocity, diversion, and cognitive ability? had a relation of influence with traffic accidents caused by elderly drivers.
Increasingly the information technology (IT) outsourcing phenomenon has been a subject of much academic research. Scholars have argued that knowledge complementarities playa crucial role in forming successful IT outsourcing relationships. However, notwithstanding the fast growth of IT outsourcing, prior studies on IT outsourcing have not included knowledge complementarities in their research design as a determining factor for IT outsourcing effectiveness. Further, the understanding of knowledge complementarities itself remains ambiguous. In this study, the concept of knowledge complementarities is explored in the IT outsourcing context at the firm level. Specifically, it addresses the following questions: what is knowledge complementarities? How does it affect IT outsourcing effectiveness? Is the relationship between knowledge complementarities and IT outsourcing effectiveness influenced by organizational trust between the client and the vendor? Grounded in the relevant theories to knowledge management and IT outsourcing, we develop a research model in which both the main effects of knowledge complementarities and organizational trust and the moderating effect of organizational trust on the relationships between knowledge complementarities and IT outsourcing effectiveness are tested. Within this research model, we develop a second order construct of knowledge complementarities, consisting of complementary business knowledge and complementary IT knowledge as the first order constructs. We have used data from a field study of 103 firms in Korea to test the proposed model. Controlling the effects of conflict resolution efforts, our empirical analysis found significant main effects of knowledge complementarities and organizational trust on IT outsourcing effectiveness. The results suggest that knowledge complementarities between the client and vendor positively contribute to IT outsourcing effectiveness. Specifically, the client needs to have enough IT knowledge to assess the quality of IT outsourcing services provided by the vendor. Meanwhile, the vendor should understand the client's business well enough to provide IT services, Contrary to our expectations, the moderating effect of trust on the relationship between knowledge complementarities and IT outsourcing effectiveness was not supported in this study. The results also show that organizational trust between client and vendor significantly influences IT outsourcing effectiveness. As for contributions of this study, we have not only clarified the concept of knowledge complementarities, but also developed an instrument to measure the concept and empirically validated it. Further, we have tested the idea that knowledge complementarities and trust directly influence IT outsourcing effectiveness and trust moderates the relationship between knowledge complementarities and IT outsourcing effectiveness. Out results prescribe the knowledge complementarities of client and vendor as a useful path to IT outsourcing effectiveness. These findings have important theoretical and practical implications, which are discussed in the paper.
As information and information technology become more important in competitive corporate environments, the risk of information security breaches has increased accordingly. Although organizations establish security measures to manage information security risks, members of organizations do not comply with them well, and their information security behavior intention is unclear. Therefore, to understand the information security risk management intention of the members of organizations, the present study developed a research model using Protection Motivation Theory, Supervisory Authority Pressure, and Background factors. This study presents empirical research findings based on the analysis of survey data from 201 members of financial institutions. Perceived Severity, Self-efficacy, and Supervisory Authority Pressure had a positive effect on intention; however, Perceived Vulnerability and Response Efficacy did not affect intention. Security Avoidance Habit, which was considered a background factor, had a negative effect on all parameters, and did not have an effect on intention. Security Awareness Training, another background factor, had a positive effect on information security risk management intention and perceived vulnerability, self-efficacy, response efficacy, and supervisory authority pressure, and had no effect on perceived severity. This study used supervisory authority pressure and background factors in the field of information security, and provided a basis to use supervisory authority pressure in future studies on behavior of organizations and members of an organization. In addition, the use of various background factors presented the groundwork for the expansion of protection motivation theory. Furthermore, practitioners can use the study findings as a foundation for organization's security activities, and to improve regulations.
This study first provides a stylized model that captures the essential features of the SC (Social Commerce) business and the competition process. The model focuses on the relationship between key decision issues such as marketing inputs and market value. As more SCs join the industry, they are inevitably faced with fierce competition, which may lead to sharp increase in the total marketing and advertising expenditure. This type of competition may lead the industry away from its optimal development path, and at worst, toward a disruption of the entire industry ecosystem. Such being the case, another goal of this study is to examine the possibility that the ToC (Tragedy of the Commons) may occur in the SC industry. We build game models, each of which assumes homogeneity and heterogeneity of SC providers, respectively, and derive explicit equilibrium solutions from both models. Our basic analysis presents Nash equilibria in both models and shows that SC providers are inevitably faced with fierce competition, which may lead to sharp increase in the total marketing expenses. We also compare the game outcomes with one with a hypothetical social planner who determines the total marketing level that optimizes the entire market value. Then, ToC can be defined to describe the situation where the total marketing efforts exceed the socially optimal level of marketing efforts. In both models, we examine the possibility of the ecosystem disruption and specify the conditions under which ToC may occur. However, the chance of avoiding ToC is higher with heterogeneous players than with homogeneous players. To supplement our analytical results, we develop a simulation model which incorporates a market dynamics based on the gap between actual marketing efforts and socially optimal marketing level. Simulation experiments present some lessons and insights which also confirm out findings from equilibrium analysis. For example, heterogeneity in SC providers alleviates the severity of ToC and makes it faster for survivors to escape from the ToC trap. As a result, the degree of industrial concentration tends to increase, which also explains the 'rich-get-richer' phenomenon observed in some empirical studies on the SC industry. Lastly, based on our analytical and experimental results, we come up with some measures to avoid ToC and overcome the shortcomings intrinsic to the current business model. And further discussions provide strategic implications and policy directions to overcome the possible trap of ToC in this ecosystem, and eventually help the industry to sustainably develop itself toward the next level. To name a few examples of policy measures, regulations on the marketing activities so that the overall marketing expenses cannot go beyond the socially optimal level; institutional guidelines and rules to straightening up the distortions in the way that SC providers view the marketing costs (the current marketing costs are underestimated, thereby encouraging SC providers to increase marketing expenditure); and so on.
Journal of the Korea Academia-Industrial cooperation Society
/
v.17
no.9
/
pp.74-82
/
2016
The term research institute spin-offs refers to new firms created by public research institutes. These spin-offs are different from other start-ups in two respects: on the one hand, they should be located in the Special Research and Development Zones and, on the other hand, these firms are supposed to commercialize the results of public R&D activities. These spin-off firms show higher rates of survival and job creation than general new firms, which means that their contribution to economic growth is not negligible. The present study analyzes the factors affecting research institute spin-offs using a random effect panel logit model and negative binomial model. From previous studies, four elements are identified as playing an important role in the commercialization of public R&D through spin-offs, namely their organizational character, research capability, technological character, and geographical location. The empirical results demonstrate that government research institutes with more researchers and patents are more likely to create new firms. In addition, the location of the institutes significantly affects the probability of their creating spin-offs and their number. When the technological stage and TLO size are considered, however, it turns out that the number of researchers and technological stage play important roles in the spin-offs.
In Mobile IP-enabled wireless LAN (WLAN), packet flows are corrupted due to the handoff of a mobile node (MN) at the link and network layers, which results in burst packet losses and can cause temporary buffer underflow in a streaming client at the MN. This transient behavior hurts time-sensitive streaming media applications severely. Among many suggestions to address this handoff problem, few studies are concerned with empirical issues regarding the practical validation of handoff options on the time-sensitive streaming media applications. In this paper, targeting seamless streaming over Mobile IP-enabled WLAN, we introduce a seamless media streaming framework that estimates accurate pre-buffering level to compensate the handoff latency. In addition, we propose a link-layer (L2) assisted seamless media streaming system as a preliminary version of this framework. The proposed system is designed to reduce the handoff latency and to overcome the playback disruption from an implementation viewpoint. A packet buffering and forwarding mechanism with L2 trigger is implemented to reduce the handoff latency and to eliminate burst packet losses generated during the handoff. A pre-buffering adjustment is also performed to compensate the handoff latency. The experimental results show that the proposed approach eliminates packet losses during the handoff and thus verify the feasibility of seamless media streaming over Mobile IP-enabled WLAN.
In this paper, we outline the user interface problems that the text messaging users face to provide empirical basis for developing better improved mobile text messaging system. Our initial hypothesis was that the majority of the problems that the text messaging users face, namely, 1) difficulty in correctly understanding the intent of the incoming messages and 2) problem with frequently mis-addressing the recipient of the outgoing messages, can be accounted for by the poor usability of the text messaging user interface. Our analysis is based on the text message-based communication diaries, which were recorded for one week by each and every one of 75 college students, and survey taken from the same subjects. The data was collected in 2004. The students listed various difficulties including the limited message length, obscure input method, lack of mean to express emotional content, lack of receipt confirmation, lack of auto save feature when preparing messages to send, and lack of means to permanently save messages. Some of these problems were also identified in the previous studies. However, we were able to gather additional problems that the users face and also elicit potential solutions to remedy the problems. From these findings and analysis, we attempted to provide ways to improve the text messaging user interface.
The research is focused on planning the politic direction and on establishing an activating planning for retailer shops such as traditional market, super supermarket, discount store in Daejeon. The empirical study shows that the consumers most satisfied with discount store, meanwhile least with traditional market. Especially, it is proved that parking facility is the most important factor affecting consumer's satisfaction. This study also suggests some important strategic implications through IPA (important- performance analysis). Those are, first, the traditional market needs to improve for six categories of IPA factors, however the super supermarket for four, and the discount store for three. Second, the discount store has eight prominent advantages of the factors, however the super supermarket has seven, and the traditional market has five. Finally, the traditional market has to concentrate facility improvement for consumer's convenience in the long term.
The purpose of this study is to provide a comparative evaluation of container port criteria at four major container ports in the Bay of Bengal, including Colombo Port in Sri Lanka, Chennai Port in India, Chittagong Port in Bangladesh and Yangon Port in Myanmar. Important container port selection criteria are identified and comparisons among container ports are made using previous studies, personal interviews and questionnaires, completed by top shipping companies, freight forwarders, logistics service providers, and experts in Myanmar. The AHP method is used to verify the research model and hypothesis. This study identified five main criteria and eleven sub-criteria when choosing potential regional hub ports among the four ports in the Bay of Bengal. The main findings from the five main criteria suggest that port efficiency is the highest priority criteria, and the second priority is port costs. The criteria of geographical location and available port facilities are the third and fourth most important, respectively, and the last priority is port's hinterland. Regarding the relative competition among these ports, Colombo Port obtained the highest priority among the four influential factors except for port hinterland. This study has certain limitations that will require future research. First, the sample group for the population size is relatively small. Second, interviewees had limited experience answering questionnaires using this methodology and a limited amount of time was available for respondents for the interviews.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.