• Title/Summary/Keyword: Internet access

Search Result 2,645, Processing Time 0.029 seconds

Relationship between Brand Personality and the Personality of Consumers, and its Application to Corporate Branding Strategy

  • Kim, Young-Ei;Lee, Jung-Wan;Lee, Yong-Ki
    • Journal of Global Scholars of Marketing Science
    • /
    • v.18 no.3
    • /
    • pp.27-57
    • /
    • 2008
  • Many consumers enjoy the challenge of purchasing a brand that matches well with their own values and personalities (for example, Ko et al., 2008; Ko et al., 2006). Therefore, the personalities of consumers can impact on the final selection of a brand and its brand personality in two ways: first, the consumers may incline to purchase a brand or a product that reflects their own personalities; second, consumers tend to choose a company that has similar brand personalities to those brands that are being promoted. Therefore, the objectives of this study are following: 1. Is there any empirical relationship between a consumer's personality and the personality of a brand that he or she chooses? 2. Can a corporate brand be differentiated by the brand personality? In short, consumers are more likely to hold favorable attitudes towards those brands that match their own personality and will most probably purchase those brands matching well with their personality. For example, Matzler et al. (2006) found that extraversion and openness were positively related to hedonic product value; and that the personality traits directly (openness) and indirectly (extraversion, via hedonic value) influenced brand effects, which in turn droved attitudinal and purchase loyalty. Based on the above discussion, the following hypotheses are proposed: Hypothesis 1: the personality of a consumer is related to the brand personality of a product/corporate that he/she purchases. Kuksov (2007) and Wernerfelt (1990) argued that brands as a symbolic language allowed consumers to communicate their types to each other and postulated that consumers had a certain value of communicating their types to each other. Therefore, how brand meanings are established, and how a firm communicate with consumers about the meanings of the brand are interesting topics for research (for example, Escalas and Bettman, 2005; McCracken, 1989; Moon, 2007). Hence, the following hypothesis is proposed: Hypothesis 2: A corporate brand identity is differentiated by the brand personality. And there are significant differences among companies. A questionnaire was developed for collecting empirical measures of the Big-Five personality traits and brand personality variables. A survey was conducted to the online access panel members through the Internet during December 2007 in Korea. In total, 500 respondents completed the questionnaire, and considered as useable. Personality constructs were measured using the Five-factor Inventory (NEO-FFI) scale and a total of 30 items were actually utilized. Brand personality was measured using the five-dimension scale developed by Aaker (1997). A total of 17 items were actually utilized. The seven-point Likert-type scale was the format of responses, for example, from 1 indicating strongly disagreed to 7 for strongly agreed. The Analysis of Moment Structures (AMOS) was used for an empirical testing of the model, and the Maximum Likelihood Estimation (MLE) was applied to estimate numerical values for the components in the model. To diagnose the presence of distribution problems in the data and to gauge their effects on the parameter estimates, bootstapping method was used. The results of the hypothesis-1 test empirically show that there exit certain causality relationship between a consumer's personality and the brand personality of the consumer's choice. Thus, the consumer's personality has an impact on consumer's final selection of a brand that has a brand personality matches well with their own personalities. In other words, the consumers are inclined to purchase a brand that reflects their own personalities and tend to choose a company that has similar brand personalities to those of the brand being promoted. The results of this study further suggest that certain dimensions of the brand personality cause consumers to have preference to certain (corporate) brands. For example, the conscientiousness, neuroticism, and extraversion of the consumer personality have positively related to a selection of "ruggedness" characteristics of the brand personality. Consumers who possess that personality dimension seek for matching with certain brand personality dimensions. Results of the hypothesis-2 test show that the average "ruggedness" attributes of the brand personality differ significantly among Korean automobile manufacturers. However, the result of ANOVA also indicates that there are no significant differences in the mean values among manufacturers for the "sophistication," "excitement," "competence" and "sincerity" attributes of the corporate brand personality. The tight link between what a firm is and its corporate brand means that there is far less room for marketing communications than there is with products and brands. Consequently, successful corporate brand strategies must position the organization within the boundaries of what is acceptable, while at the same time differentiating the organization from its competitors.

  • PDF

Trend and future prospect on the development of technology for electronic security system (기계경비시스템의 기술 변화추세와 개발전망)

  • Chung, Tae-Hwang;So, Sung-Young
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.225-244
    • /
    • 2009
  • Electronic security system is composed mainly of electronic-information-communication device, so system technology, configuration and management of the electronic security system could be affected by the change of information-communication environment. This study is to propose the future prospect on the development of technique for electronic security system through the analysis of the trend and the actual condition on the development of technique. This study is based on literature study and interview with user and provider of electronic security system, also survey was carried out by system provider and members of security integration company to come up with more practical result. Hybrid DVR technology that has multi-function such as motion detection, target tracking and image identification is expected to be developed. And 'Embedded IP camera' technology that internet server and image identification software are built in. Those technologies could change the configuration and management of CCTV system. Fingerprint identification technology and face identification technology are continually developed to get more reliability, but continual development of surveillance and three-dimension identification technology for more efficient face identification system is needed. As radio identification and tracking function of RFID is appreciated as very useful for access control system, hardware and software of RFID technology is expected to be developed, but government's support for market revitalization is necessary. Behavior pattern identification sensor technology is expected to be developed and could replace passive infrared sensor that cause system error, giving security guard firm confidence for response. The principle of behavior pattern identification is similar to image identification, so those two technology could be integrated with tracking technology and radio identification technology of RFID for total monitoring system. For more efficient electronic security system, middle-ware's role is very important to integrate the technology of electronic security system, this could make possible of installing the integrated security system.

  • PDF

An Analysis of Efficiency of Security Services : A Comparative Determinants Analysis of Public and Private Security (경호업무 효율성에 관한 연구 : 공공경호와 민간경호의 효율성 영향요인의 비교분석)

  • Park, Moon-Sun
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.67-103
    • /
    • 2009
  • Objectives of this study is develop security services through determinants analysis on the efficiency of security works regarding security and guarding business in Korea because nowadays the modern society like Korea let alone all over the world faces the increase of dangerous factors in every security field of the human societies, and also it is the very present situation that an individual's life even the national security itself can be at the risk without guaranteeing the efficiency of the security services. For this purpose, this study reviewed related documents, surveyed and interviewed security personnels to identify what the potentially influential factors are in both the public and private security organizations regarding the efficiency of present security services and organizations, and what differences are. Also, comparing the public and private security sectors, this study intended to suggest policy agendas how to enhance the efficiency of security services in the future. This study surveyed the 177 agents and former agents of the Presidential Security Service(PSS) for the public security sector, and also surveyed, interviewed, and internet-based polled 821 randomly selected personnels for the private security sector. This research showed that regarding the efficiency of the security services number of independent variables which had positive responses in the public security sector was more than that in the private security sector. Among the 21 questions regarding this issue, there were all of 21 positive responses in the public security sector while there were 18 negative responses in the private security sector. As a result of synthesizing all the answers of the both sides, it is possible to understand that mostly the ratio of the positive response was much higher. In the public security service, statistically significant variables were budget support for events, prior access of information, an integrated teamwork training, organizational atmosphere, morale of organization personnel. However, practical training of the security service and mutual communication showed unexpectedly negative(-) signs. In the private security service, statistically significant variables were budget support for events, integrated teamwork training, socially friendly atmosphere, compensation for the personnels, bullet-proof equipments and vehicles, mood of organization, personnel recruit and disposition, unexpected incidents and basic attitude for security services. In sum, while organizational personnel variables and organizational management variables were significant in the public security service, some organizational management variables and all socio-environment variables were statistically significant at 5% significance level.

  • PDF

Development of Education Materials for Healthy Consumption of Milk in a Card News Format for Korean Adults (성인의 바른 우유 섭취를 위한 카드뉴스 형식의 교육자료 개발)

  • Kim, Sun Hyo
    • Journal of Korean Home Economics Education Association
    • /
    • v.32 no.3
    • /
    • pp.97-110
    • /
    • 2020
  • The purpose of this study is to develop milk education materials for adults based on the scientific basis of right milk consumption in the format of card news that can be easily accessed on a mobile phone or the internet and has high impact. The topics to be included in the card news were selected based on the findings from literature analysis and focus group interviews with 10 adults(32.0±6.4 years). For the eight selected topics, effective communication was made by suggesting some information that users want to know while reflecting adult eating habits, lifestyle habits, and nutrition and health interests. The card news draft was reviewed by researcher and consulting experts, and then questionnaire survey was conducted using Likert 5-point scales by 50 adults(42.7±10.2 years). Based on the results of the review, consultation and questionnaire survey, a final draft of the card news consisting of 11 cuts was completed. Card news proposal is expected to produce educational effects, since the respondents showed high satisfaction with the card news (higher than 4 on the 5-point scales) according to the questionnaire survey. Adults can easily access and use the card news developed in this study, and thus this card news is expected to increase milk consumption in adulthood and improve nutrition and health through friendly and systematic milk education.

A digital Audio Watermarking Algorithm using 2D Barcode (2차원 바코드를 이용한 오디오 워터마킹 알고리즘)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.2
    • /
    • pp.97-107
    • /
    • 2011
  • Nowadays there are a lot of issues about copyright infringement in the Internet world because the digital content on the network can be copied and delivered easily. Indeed the copied version has same quality with the original one. So, copyright owners and content provider want a powerful solution to protect their content. The popular one of the solutions was DRM (digital rights management) that is based on encryption technology and rights control. However, DRM-free service was launched after Steve Jobs who is CEO of Apple proposed a new music service paradigm without DRM, and the DRM is disappeared at the online music market. Even though the online music service decided to not equip the DRM solution, copyright owners and content providers are still searching a solution to protect their content. A solution to replace the DRM technology is digital audio watermarking technology which can embed copyright information into the music. In this paper, the author proposed a new audio watermarking algorithm with two approaches. First, the watermark information is generated by two dimensional barcode which has error correction code. So, the information can be recovered by itself if the errors fall into the range of the error tolerance. The other one is to use chirp sequence of CDMA (code division multiple access). These make the algorithm robust to the several malicious attacks. There are many 2D barcodes. Especially, QR code which is one of the matrix barcodes can express the information and the expression is freer than that of the other matrix barcodes. QR code has the square patterns with double at the three corners and these indicate the boundary of the symbol. This feature of the QR code is proper to express the watermark information. That is, because the QR code is 2D barcodes, nonlinear code and matrix code, it can be modulated to the spread spectrum and can be used for the watermarking algorithm. The proposed algorithm assigns the different spread spectrum sequences to the individual users respectively. In the case that the assigned code sequences are orthogonal, we can identify the watermark information of the individual user from an audio content. The algorithm used the Walsh code as an orthogonal code. The watermark information is rearranged to the 1D sequence from 2D barcode and modulated by the Walsh code. The modulated watermark information is embedded into the DCT (discrete cosine transform) domain of the original audio content. For the performance evaluation, I used 3 audio samples, "Amazing Grace", "Oh! Carol" and "Take me home country roads", The attacks for the robustness test were MP3 compression, echo attack, and sub woofer boost. The MP3 compression was performed by a tool of Cool Edit Pro 2.0. The specification of MP3 was CBR(Constant Bit Rate) 128kbps, 44,100Hz, and stereo. The echo attack had the echo with initial volume 70%, decay 75%, and delay 100msec. The sub woofer boost attack was a modification attack of low frequency part in the Fourier coefficients. The test results showed the proposed algorithm is robust to the attacks. In the MP3 attack, the strength of the watermark information is not affected, and then the watermark can be detected from all of the sample audios. In the sub woofer boost attack, the watermark was detected when the strength is 0.3. Also, in the case of echo attack, the watermark can be identified if the strength is greater and equal than 0.5.

Location Service Modeling of Distributed GIS for Replication Geospatial Information Object Management (중복 지리정보 객체 관리를 위한 분산 지리정보 시스템의 위치 서비스 모델링)

  • Jeong, Chang-Won;Lee, Won-Jung;Lee, Jae-Wan;Joo, Su-Chong
    • The KIPS Transactions:PartD
    • /
    • v.13D no.7 s.110
    • /
    • pp.985-996
    • /
    • 2006
  • As the internet technologies develop, the geographic information system environment is changing to the web-based service. Since geospatial information of the existing Web-GIS services were developed independently, there is no interoperability to support diverse map formats. In spite of the same geospatial information object it can be used for various proposes that is duplicated in GIS separately. It needs intelligent strategies for optimal replica selection, which is identification of replication geospatial information objects. And for management of replication objects, OMG, GLOBE and GRID computing suggested related frameworks. But these researches are not thorough going enough in case of geospatial information object. This paper presents a model of location service, which is supported for optimal selection among replication and management of replication objects. It is consist of tree main services. The first is binding service which can save names and properties of object defined by users according to service offers and enable clients to search them on the service of offers. The second is location service which can manage location information with contact records. And obtains performance information by the Load Sharing Facility on system independently with contact address. The third is intelligent selection service which can obtain basic/performance information from the binding service/location service and provide both faster access and better performance characteristics by rules as intelligent model based on rough sets. For the validity of location service model, this research presents the processes of location service execution with Graphic User Interface.

A Model to Measure the Success of a Web-based Information System at a Government Agency - the Chungwadae Case (공공기관 업무관리시스템 성과평가 모형 개발에 관한 연구: 청와대 업무관리시스템(e지원시스템)을 중심으로)

  • Bae, Lee-Chul;Hong, Il-Yoo
    • Asia pacific journal of information systems
    • /
    • v.18 no.1
    • /
    • pp.97-115
    • /
    • 2008
  • Introduction The e-government is concerned with using Internet and Web technologies to exchange information and services with citizens, businesses and other related organizations, and it centers on three functions, namely informational, interactive, and transactional [UN, 2001]. Many developed countries like the U.S. have been actively involved in e-government projects, since they enable both more effective public services for citizens and more efficient internal operations. Korea is among these leading countries that are planning to leverage computer and communication technologies to provide for integration of work processes and information as well as convenient access to information and services. For this reason, evaluating e-government projects is becoming a crucial issue for both researchers and policy-makers. However, most research to date has primarily focused on a model of success of an e-government system designed for citizens, overlooking internal systems specifically created for employees working in a public organization. This paper is intended to propose a model to measure the success of a Web-based information system designed for use by internal users at Chungwadae, the executive branch of Korea's central government. The paper is also aimed at applying the model to the assessment of the present system being used at Chungwadae in comparison with the preceding system. Evaluating an e-Government System The most widely cited model of information systems success today is that of DeLone and McLean[1992, 2003, 2004]. The original model states that the success of an information system can be measured using six dimensions, including system quality, information quality, use, user satisfaction, individual impact, and organizational impact. Although the ultimate success of an information system may be reflected in the impact that the system has upon individuals as well as an organization, aspects of using the system such as system use and user satisfaction can play an important role in determining the system success, because the system would be a sheer failure if users don't like and use the system. As a response to criticisms given by numerous researchers, the authors adapted their model to fit the emerging Web-based environment. The revised model[DeLone and McLean, 2003] they offered included an additional quality dimension, namely service quality, and combined individual and organizational impacts into net benefits which can also influence user satisfaction. The e-government system success model can be built around this updated model. Our model incorporates information quality, system quality, and service quality as in the DeLone and McLean model. However, the 'system use' dimension has been replaced by perceived usefulness, as suggested by Seddon[1998]. In addition, because the e-government systems that this paper focuses on are internal public systems used in government agencies, the 'net benefits' dimension has been replaced by perceived work efficiency. Based on the proposed model, a total of nine hypotheses have been formulated which we tested using an empirical analysis. Methods A questionnaire form has been created with items that are designed to examine the relationships among the variables in the model. The questionnaire has been handed over, in person, to 65 members of Chungwadae staff who are now actively using the E-Support System, the present information system created to support internal work at Chungwadae. We made arrangements to meet with each individual who agreed to participate in our survey, and helped to fill out the survey form with explanations. Of the 65 copies that were delivered, only 33 were returned, and 30 responses of these have been adopted for our analysis, since three were not valid. The extremely small sample size was due to the limited number of staff members who had adequate experience required of this study. Results We gathered data from the questionnaire survey and analyzed them using a regression analysis to test the hypotheses. As shown in the table below, the results indicated that all three dimensions of an information system’s quality are positively related to user satisfaction. However, information quality and system quality were found to be positively related to perceived usefulness, while service quality was not. In addition, perceived usefulness is not positively related to user satisfaction, implying that a user may find a system useful, but may not be satisfied with it. Finally, user satisfaction and perceived usefulness both are positively related to perceived work efficiency. This suggests that workers' positive experience with the system is important to guarantee favorable work efficiency. Conclusions We conclude that the proposed model proved useful in measuring the success of an internal information system used by a government agency. To demonstrate the applicability and usefulness of the model in the paper, we applied the model to the assessment of the present internal system used at Chungwadae in comparison with the preceding system. The results showed that the present system outperforms the preceding one in a statistically significant way. Future research will have to focus on applying the model to Korea's governmental agencies other than Chungwadae and examine whether it proves applicable in different types of governmental organizations.

An Exploratory Study on Measuring Brand Image from a Network Perspective (네트워크 관점에서 바라본 브랜드 이미지 측정에 대한 탐색적 연구)

  • Jung, Sangyoon;Chang, Jung Ah;Rho, Sangkyu
    • The Journal of Society for e-Business Studies
    • /
    • v.25 no.4
    • /
    • pp.33-60
    • /
    • 2020
  • Along with the rapid advance in internet technologies, ubiquitous mobile device usage has enabled consumers to access real-time information and increased interaction with others through various social media. Consumers can now get information more easily when making purchase decisions, and these changes are affecting the brand landscape. In a digitally connected world, brand image is not communicated to the consumers one-sidedly. Rather, with consumers' growing influence, it is a result of co-creation where consumers have an active role in building brand image. This explains a reality where people no longer purchase products just because they know the brand or because it is a famous brand. However, there has been little discussion on the matter, and many practitioners still rely on the traditional measures of brand indicators. The goal of this research is to present the limitations of traditional definition and measurement of brand and brand image, and propose a more direct and adequate measure that reflects the nature of a connected world. Inspired by the proverb, "A man is known by the company he keeps," the proposed measurement offers insight to the position of brand (or brand image) through co-purchased product networks. This paper suggests a framework of network analysis that clusters brands of cosmetics by the frequency of other products purchased together. This is done by analyzing product networks of a brand extracted from actual purchase data on Amazon.com. This is a more direct approach, compared to past measures where consumers' intention or cognitive aspects are examined through survey. The practical implication is that our research attempts to close the gap between brand indicators and actual purchase behavior. From a theoretical standpoint, this paper extends the traditional conceptualization of brand image to a network perspective that reflects the nature of a digitally connected society.

The Recognition and Utilization of Middle School Technology.Home Economics Teacher's Guidebook (중학교 "기술.가정" 교과 교사용 지도서에 대한 가정 교사의 인식 및 활용)

  • Kang, Eun-Yeong;Shin, Hye-Won
    • Journal of Korean Home Economics Education Association
    • /
    • v.19 no.2
    • /
    • pp.1-12
    • /
    • 2007
  • This study analyzed the recognition and utilization regarding teacher's guidebook for middle school technology-home economics class in the 7th Educational Curriculum. The data were collected via e-mail to teachers teaching home economics in middle schools. These e-mail addresses were acquired from middle school web pages registered on the Educational Board. The 355 data were analyzed using the SPSS program. The results were as follows: First, teachers recognized highly the necessity of teacher's guidebook. However, as the actual guidebook was not adequately helpful, the overall degree of satisfaction was relatively low. Teachers utilizing guidebook had more positive recognition on teacher's guidebook than teachers who did not. And teachers majored in technology education thought teacher's guidebook more helpful compared with teachers majored in home economics education. Second, teachers referenced teacher's guidebook mostly for field practice guidance. Third, teachers who did not utilize teacher's guidebook used other reference materials such as Internet Web sites and audiovisual materials. They were most commonly used for the reason that the contents were ample and easy to access. Fourth, the followings were suggested to improve teacher's guidebook. The provision of learning contents that can be practically used in class, the various samples of teaching-learning method, the specified methods of planning and criteria for performance assessment, the adequate supplementations regarding textbook contents, and the improvement of the outward layout format of the guidebook.

  • PDF

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.