• Title/Summary/Keyword: Knowledge of performance

Search Result 3,677, Processing Time 0.038 seconds

Factors which Influence Customers' Intention to Switch from Call-Based Driver-for-hire Services to App-Based Driver-for-hire Services Based on Online to Offline (O2O) Business Model: Focusing on Kakao Driver service (콜 대리업체 서비스에서 O2O 방식이 적용된 대리운전 사업 모델로의 소비자 전환 의도에 관한 연구: 카카오 드라이버를 중심으로)

  • Kim, Daewon;Jeong, Hye Seung
    • The Journal of Society for e-Business Studies
    • /
    • v.21 no.3
    • /
    • pp.51-78
    • /
    • 2016
  • Online-to-offline (O2O) commerce is the new trend that merges online commerce with traditional industries in various fields. The primary purpose of this paper is to find out which factors influence customers' intention to switch from call-based driver-for-hire services to O2O app-based services. This study used variables and factors based on Theory of Switching Intention, and Extended Unified Theory of Acceptance and Use of Technology in order to design research questions. We surveyed 500 users of call-based driver-for-hire services. According to the result of this study, dissatisfaction with the current call-based driver-for-hire services is estimated to be a significant factor that strengthens customers' intention to switch from the call-based driver-for-hire services to the app-based services. Loyalty to the previous call-based driver-for-hire services was not seen as a crucial motivator that causes customers to switch to the new O2O driver service. Switching cost also did not play a key role in explaining the relationship between dissatisfaction with the current call-based service and the intention to use the new app-based service. Performance expectancy, easiness in use, the level of user's knowledge or available assistance in relation to the use of app-based services, and expectancy for reasonable price was found to have meaningful impacts on customers' intention to switch from the call-based driver-for-hire services to the app-based services. Age, gender and user experience on the new service were found incapable of moderating the relationship between aforementioned factors which influence customers' choice of the app-based driver-for-hire service, and customers' intent to switch to the app-based service.

An Analysis of Swimming Injuries and Their Rehabilitation (근육 골격계의 질환 및 재활분석(수영선수를 중심으로))

  • Kim, Kwi-Baek;Ji, Jin-Gu;Kwak, Yi-Sub
    • Journal of Life Science
    • /
    • v.32 no.4
    • /
    • pp.325-330
    • /
    • 2022
  • While swimming is a very popular competitive sports activity, swimming injuries are unique due to the repetitive nature of the swimming stroke and demanding training programs that can result in upper limb overuse. Therefore, the primary objective of this review was to analyze swimmers' injury areas, injury types by stroke type, and swimming rehabilitation, as well as to discuss safety management for improving swimming performance. In this study, the injuries incurred in swimming events were discussed in the order of upper limb injuries (neck, shoulder, arm, and wrist), lower limb injuries (knee and ankle), and waist injuries. An analysis by stroke type found that shoulder injuries occurred most often with freestyle, backstroke, and butterfly strokes, followed by rotator cuff injury, impingement syndrome, and SLAP (superior labral tear from anterior to posterior) lesions. Knee injuries were associated with the breaststroke, whereas spinal cord injuries occurred with the breaststroke and butterfly stroke. Finally, back injuries were associated with the butterfly stroke. During the freestyle stroke, the shoulder undergoes repetitive overhead movement; hence, shoulder and musculoskeletal pain are the most common and well-documented complaints of swimmers. For safety management, coaches and instructors must ensure that athletes do sufficient warm-up and cool-down exercises to avoid injuries. In case of an injury, they should be familiar with first aid measures so that secondary damage can be prevented with its quick application. In addition, coaches and instructors need to be trained in injury prevention and treatment so that they can provide appropriate rehabilitation treatment for athletes. Although swimming-related injuries cannot be completely eliminated, to reduce them to a minimum, leaders need the knowledge to apply scientific and systematic training principles and methods individualized for each athlete.

Electrochemical Characteristics of Cu3Si as Negative Electrode for Lithium Secondary Batteries at Elevated Temperatures (리튬 이차전지 음극용 Cu3Si의 고온에서의 전기화학적 특성)

  • Kwon, Ji-Y.;Ryu, Ji-Heon;Kim, Jun-Ho;Chae, Oh-B.;Oh, Seung-M.
    • Journal of the Korean Electrochemical Society
    • /
    • v.13 no.2
    • /
    • pp.116-122
    • /
    • 2010
  • A $Cu_3Si$ film electrode is obtained by Si deposition on a Cu foil using DC magnetron sputtering, which is followed by annealing at $800^{\circ}C$ for 10 h. The Si component in $Cu_3Si$ is inactive for lithiation at ambient temperature. The linear sweep thermammetry (LSTA) and galvano-static charge/discharge cycling, however, consistently illustrate that $Cu_3Si$ becomes active for the conversion-type lithiation reaction at elevated temperatures (> $85^{\circ}C$). The $Cu_3Si$ electrode that is short-circuited with Li metal for one week is converted to a mixture of $Li_{21}Si_5$ and metallic Cu, implying that the Li-Si alloy phase generated at 0.0 V (vs. Li/$Li^+$) at the quasi-equilibrium condition is the most Li-rich $Li_{21}Si_5$. However, the lithiation is not extended to this phase in the constant-current charging (transient or dynamic condition). Upon de-lithiation, the metallic Cu and Si react to be restored back to $Cu_3Si$. The $Cu_3Si$ electrode shows a better cycle performance than an amorphous Si electrode at $120^{\circ}C$, which can be ascribed to the favorable roles provided by the Cu component in $Cu_3Si$. The inactive element (Cu) plays as a buffer against the volume change of Si component, which can minimize the electrode failure by suppressing the detachment of Si from the Cu substrate.

Business Strategies for Korean Private Security-Guard Companies Utilizing Resource-based Theory and AHP Method (자원기반 이론과 AHP 방법을 활용한 민간 경호경비 기업의 전략 연구)

  • Kim, Heung-Ki;Lee, Jong-Won
    • Korean Security Journal
    • /
    • no.36
    • /
    • pp.177-200
    • /
    • 2013
  • As we enter a high industrial society that widens the gap between the rich and poor, demand for the security services has grown explosively. With the growth in quantitative expansion of security services, people have also placed increased requirements on more sophisticated and diversified security services. Consequently, market outlook for private security services industry is positive. However, Korea's private security services companies are experiencing difficulties in finding a direction to capture this new market opportunity due to their small sizes and lack of management-strategic thinking skills. Therefore, we intend to offer a direction of development for our private security services industry using a management-strategy theory and the Analytic Hierarchy Process(AHP), a structured decision-making method. A resource-based theory is one of the important management strategy theories. It explains that a company's overall performance is primarily determined by its competitive resources. Using this theory, we could analyze a company's unique resources and core competencies and set a strategic direction for the company accordingly. The usefulness and validity of this theory has been demonstrated as it has often been subject to empirical verification since 1990s. Based on this theory, we outlined a set of basic procedures to establish a management strategy for the private security services companies. We also used the AHP method to identify competitive resources, core competencies, and strategies from private security services companies in contrast with public companies. The AHP method is a technique that can be used in the decision making process by quantifying experts' knowledge and unstructured problems. This is a verified method that has been used in the management decision making in the corporate environment as well as for the various academic studies. In order to perform this method, we gathered data from 11 experts from academic, industrial, and research sectors and drew distinctive resources, competencies, and strategic direction for private security services companies vis-a-vis public organizations. Through this process, we came to the conclusion that private security services companies generally have intangible resources as their distinctive resources compared with public organization. Among those intangible resources, relational resources, customer information, and technologies were analyzed as important. In contrast, tangible resources such as equipment, funds, distribution channels are found to be relatively scarce. We also found the competencies in sales and marketing and new product development as core competencies. We chose a concentration strategy focusing on a particular market segment as a strategic direction considering these resources and competencies of private security services companies. A concentration strategy is the right fit for smaller companies as a strategy to allow them to focus all of their efforts on target customers in a single segment. Thus, private security services companies would face the important tasks such as developing a new market and appropriate products for such market segment and continuing marketing activities to manage their customers. Additionally, continuous recruitment is required to facilitate the effective use of human resources in order to strengthen their marketing competency in a long term.

  • PDF

Policy Change and Innovation of Textile Industry in Daegu·Kyungbuk Region (대구·경북지역 섬유산업의 정책변화와 혁신과제)

  • Shin, Jin-Kyo;Kim, Yo-Han
    • Management & Information Systems Review
    • /
    • v.31 no.3
    • /
    • pp.223-248
    • /
    • 2012
  • This study analyses support policy and structural change of textile industry in Daegu Kyungbuk region, and suggests major issues for textile industry's innovation. In Daegu Kyungbuk, it was 1999 that a policy, so called Milano Project, in order to promote a textile industry was devised. In 2004, the Regional Industrial Promotion Plan was devised. The plan was born from a view point of establishing a regional innovation system and of promoting the innovative clusters under a knowledge based economy. After then, the Regional Industry Promotion Project or Regional Strategic Industry Promotion Project became a core of regional textile industrial policy. Research results indicated that the first stage Milano project (1999-2003) showed both positive and negative effects. There were no long-term development plan, clear vision and strategy. But, core industrial infrastructure for differentiated product development, such as New product Development Support Center and Dyeing Design Practical Application Center, was constructed. The second stage Daegu Textile Industry Promotion Plan (2004-2008) displayed a significant technological performance and new product sales with the assistance of Kyungbuk province. Also, textile industry revealed positive fruits such as financial structure, productivity, and profitability as a result of strong restructuring. In industrial structure, there was a important change from clothe textile material to industry textile material. Most of textile companies did not showed high capability in CEO's technology innovation intention, entrepreneurship, R&D and human resource competency in compare with other industry. We suggested that Daegu Kyungbuk has to select and concentrate on the high-tech textile material and living textile for sustainable development and competitiveness. We also proposed a confidence and cooperation based innovation network and company oriented innovation cluster.

  • PDF

T-Cache: a Fast Cache Manager for Pipeline Time-Series Data (T-Cache: 시계열 배관 데이타를 위한 고성능 캐시 관리자)

  • Shin, Je-Yong;Lee, Jin-Soo;Kim, Won-Sik;Kim, Seon-Hyo;Yoon, Min-A;Han, Wook-Shin;Jung, Soon-Ki;Park, Se-Young
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.5
    • /
    • pp.293-299
    • /
    • 2007
  • Intelligent pipeline inspection gauges (PIGs) are inspection vehicles that move along within a (gas or oil) pipeline and acquire signals (also called sensor data) from their surrounding rings of sensors. By analyzing the signals captured in intelligent PIGs, we can detect pipeline defects, such as holes and curvatures and other potential causes of gas explosions. There are two major data access patterns apparent when an analyzer accesses the pipeline signal data. The first is a sequential pattern where an analyst reads the sensor data one time only in a sequential fashion. The second is the repetitive pattern where an analyzer repeatedly reads the signal data within a fixed range; this is the dominant pattern in analyzing the signal data. The existing PIG software reads signal data directly from the server at every user#s request, requiring network transfer and disk access cost. It works well only for the sequential pattern, but not for the more dominant repetitive pattern. This problem becomes very serious in a client/server environment where several analysts analyze the signal data concurrently. To tackle this problem, we devise a fast in-memory cache manager, called T-Cache, by considering pipeline sensor data as multiple time-series data and by efficiently caching the time-series data at T-Cache. To the best of the authors# knowledge, this is the first research on caching pipeline signals on the client-side. We propose a new concept of the signal cache line as a caching unit, which is a set of time-series signal data for a fixed distance. We also provide the various data structures including smart cursors and algorithms used in T-Cache. Experimental results show that T-Cache performs much better for the repetitive pattern in terms of disk I/Os and the elapsed time. Even with the sequential pattern, T-Cache shows almost the same performance as a system that does not use any caching, indicating the caching overhead in T-Cache is negligible.

Research about feature selection that use heuristic function (휴리스틱 함수를 이용한 feature selection에 관한 연구)

  • Hong, Seok-Mi;Jung, Kyung-Sook;Chung, Tae-Choong
    • The KIPS Transactions:PartB
    • /
    • v.10B no.3
    • /
    • pp.281-286
    • /
    • 2003
  • A large number of features are collected for problem solving in real life, but to utilize ail the features collected would be difficult. It is not so easy to collect of correct data about all features. In case it takes advantage of all collected data to learn, complicated learning model is created and good performance result can't get. Also exist interrelationships or hierarchical relations among the features. We can reduce feature's number analyzing relation among the features using heuristic knowledge or statistical method. Heuristic technique refers to learning through repetitive trial and errors and experience. Experts can approach to relevant problem domain through opinion collection process by experience. These properties can be utilized to reduce the number of feature used in learning. Experts generate a new feature (highly abstract) using raw data. This paper describes machine learning model that reduce the number of features used in learning using heuristic function and use abstracted feature by neural network's input value. We have applied this model to the win/lose prediction in pro-baseball games. The result shows the model mixing two techniques not only reduces the complexity of the neural network model but also significantly improves the classification accuracy than when neural network and heuristic model are used separately.

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.

A Study on Perceived Quality affecting the Service Personal Value in the On-off line Channel - Focusing on the moderate effect of the need for cognition - (온.오프라인 채널에서 지각된 품질이 서비스의 개인가치에 미치는 영향에 관한 연구 -인지욕구의 조정효과를 중심으로-)

  • Sung, Hyung-Suk
    • Journal of Distribution Research
    • /
    • v.15 no.3
    • /
    • pp.111-137
    • /
    • 2010
  • The basic purpose of this study is to investigate perceived quality and service personal value affecting the result of long-term relationship between service buyers and suppliers. This research presented a constructive model(perceived quality affecting the service personal value and the moderate effect of NFC) in the on off line and then propose the research model base on prior researches and studies about relationships among components of service. Data were gathered from respondents who visit at the education service market. For this study, Data were analyzed by AMOS 7.0. We integrate the literature on services marketing with researches on personal values and perceived quality. The SERPVAL scale presented here allows for the creation of a common ground for assessing service personal values, giving a clear understanding of the key value dimensions behind service choice and usage. It will lead to a focus of future research in services marketing, extending knowledge in the field and stimulating further empirical research on service personal values. At the managerial level, as a tool the SERPVAL scale should allow practitioners to evaluate and improve the value of a service, and consequently, to define strategies and actions to address services for customers based on their fundamental personal values. Through qualitative and empirical research, we find that the service quality construct conforms to the structure of a second-order factor model that ties service quality perceptions to distinct and actionable dimensions: outcome, interaction, and environmental quality. In turn, each has two subdimensions that define the basis of service quality perceptions. The authors further suggest that for each of these subdimensions to contribute to improved service quality perceptions, the quality received by consumers must be perceived to be reliable, responsive, and empathetic. Although the service personal value may be found in researches that explore individual values and their consequences for consumer behavior, there is no established operationalization of a SERPVAL scale. The inexistence of an established scale, duly adapted in order to understand and analyze personal values behind services usage, exposes the need of a measurement scale with such a purpose. This need has to be rooted, however, in a conceptualization of the construct being scaled. Service personal values can be defined as a customer's overall assessment of the use of a service based on the perception of what is achieved in terms of his own personal values. As consumer behaviors serve to show an individual's values, the use of a service can also be a way to fulfill and demonstrate consumers'personal values. In this sense, a service can provide more to the customer than its concrete and abstract attributes at both the attribute and the quality levels, and more than its functional consequences at the value level. Both values and services literatures agree, that personal value is the highest-level concept, followed by instrumental values, attitudes and finally by product attributes. Purchasing behaviors are agreed to be the end result of these concepts' interaction, with personal values taking a major role in the final decision process. From both consumers' and practitioners' perspectives, values are extremely relevant, as they are desirable goals that serve as guiding principles in people's lives. While building on previous research, we propose to assess service personal values through three broad groups of individual dimensions; at the self-oriented level, we use (1) service value to peaceful life (SVPL) and, at the social-oriented level, we use (2) service value to social recognition (SVSR), and (3) service value to social integration (SVSI). Service value to peaceful life is our first dimension. This dimension emerged as a combination of values coming from the RVS scale, a scale built specifically to assess general individual values. If a service promotes a pleasurable life, brings or improves tranquility, safety and harmony, then its user recognizes the value of this service. Generally, this service can improve the user's pleasure of life, since it protects or defends the consumer from threats to life or pressures on it. While building upon both the LOV scale, a scale built specifically to assess consumer values, and the RVS scale for individual values, we develop the other two dimensions: SVSR and SVSI. The roles of social recognition and social integration to improve service personal value have been seriously neglected. Social recognition derives its outcome utility from its predictive utility. When applying this underlying belief to our second dimension, SVSR, we assume that people use a service while taking into consideration the content of what is delivered. Individuals consider whether the service aids in gaining respect from others, social recognition and status, as well as whether it allows achieving a more fulfilled and stimulating life, which might then be revealed to others. People also tend to engage in behavior that receives social recognition and to avoid behavior that leads to social disapproval, and this contributes to an individual's social integration. This leads us to the third dimension, SVSI, which is based on the fact that if the consumer perceives that a service strengthens friendships, provides the possibility of becoming more integrated in the group, or promotes better relationships at the social, professional or family levels, then the service will contribute to social integration, and naturally the individual will recognize personal value in the service. Most of the research in business values deals with individual values. However, to our knowledge, no study has dealt with assessing overall personal values as well as their dimensions in a service context. Our final results show that the scales adapted from the Schwartz list were excluded. A possible explanation is that although Schwartz builds on Rokeach work in order to explore individual values, its dimensions might be especially focused on analyzing societal values. As we are looking for individual dimensions, this might explain why the values inspired by the Schwartz list were excluded from the model. The hierarchical structure of the final scale presented in this paper also presents theoretical implications. Although we cannot claim to definitively capture the dimensions of service personal values, we believe that we come close to capturing these overall evaluations because the second-order factor extracts the underlying commonality among dimensions. In addition to obtaining respondents' evaluations of the dimensions, the second-order factor model captures the common variance among these dimensions, reflecting the respondents' overall assessment of service personal values. Towards this fact, we expect that the service personal values conceptualization and measurement scale presented here contributes to both business values literature and the service marketing field, allowing for the delineation of strategies for adding value to services. This new scale also presents managerial implications. The SERPVAL dimensions give some guidance on how to better pursue a highly service-oriented business strategy. Indeed, the SERPVAL scale can be used for benchmarking purposes, as this scale can be used to identify whether or not a firms' marketing strategies are consistent with consumers' expectations. Managerial assessment of the personal values of a service might be extremely important because it allows managers to better understand what customers want or value. Thus, this scale allows us to identify what services are really valuable to the final consumer; providing knowledge for making choices regarding which services to include. Traditional approaches have focused their attention on service attributes (as quality) and service consequences(as service value), but personal values may be an important set of variables to be considered in understanding what attracts consumers to a certain service. By using the SERPVAL scale to assess the personal values associated with a services usage, managers may better understand the reasons behind services' usage, so that they may handle them more efficiently. While testing nomological validity, our empirical findings demonstrate that the three SERPVAL dimensions are positively and significantly associated with satisfaction. Additionally, while service value to social integration is related only with loyalty, service value to peaceful life is associated with both loyalty and repurchase intent. It is also interesting and surprising that service value to social recognition appears not to be significantly linked with loyalty and repurchase intent. A possible explanation is that no mobile service provider has yet emerged in the market as a luxury provider. All of the Portuguese providers are still trying to capture market share by means of low-end pricing. This research has implications for consumers as well. As more companies seek to build relationships with their customers, consumers are easily able to examine whether these relationships provide real value or not to their own lives. The selection of a strategy for a particular service depends on its customers' personal values. Being highly customer-oriented means having a strong commitment to customers, trying to create customer value and understanding customer needs. Enhancing service distinctiveness in order to provide a peaceful life, increase social recognition and gain a better social integration are all possible strategies that companies may pursue, but the one to pursue depends on the outstanding personal values held by the service customers. Data were gathered from 284 respondents in the korean discount store and online shopping mall market. This research proposed 3 hypotheses on 6 latent variables and tested through structural equation modeling. 6 alternative measurements were compared through statistical significance test of the 6 paths of research model and the overall fitting level of structural equation model. and the result was successful. and Perceived quality more positively influences service personal value when NFC is high than when no NFC is low in the off-line market. The results of the study indicate that service quality is properly modeled as an antecedent of service personal value. We consider the research and managerial implications of the study and its limitations. In sum, by knowing the dimensions a consumer takes into account when choosing a service, a better understanding of purchasing behaviors may be realized, guiding managers toward customers expectations. By defining strategies and actions that address potential problems with the service personal values, managers might ultimately influence their firm's performance. we expect to contribute to both business values and service marketing literatures through the development of the service personal value. At a time when marketing researchers are challenged to provide research with practical implications, it is also believed that this framework may be used by managers to pursue service-oriented business strategies while taking into consideration what customers value.

  • PDF

Visual Media Education in Visual Arts Education (미술교육에 있어서 시각적 미디어를 통한 조형교육에 관한 연구)

  • Park Ji-Sook
    • Journal of Science of Art and Design
    • /
    • v.7
    • /
    • pp.64-104
    • /
    • 2005
  • Visual media transmits image and information reproduced in large quantities, such as a photography, film, television, video, advertisement, or computer image. Correspondence to the students' reception and recognition of culture in the future. arrangements for the field of studies of visual culture. 'Visual Culture' implies cultural phenomena of visual images via visual media, which includes not only the categories of traditional arts like a painting, sculpture, print, or design, but the performance arts including a fashion show or parade of carnival, and the mass and electronic media like a photography, film, television, video, advertisement, cartoon, animation, or computer image. In the world of visual media, Image' functions as an essential medium of communication. Therefore, people call the culture of today fra of Image Culture', which has been converted from an alphabet convergence era to an image convergence one. Image, via visual media, has become a dominant means for communication in large part of human life, so we can designate an Image' as a typical aspect of visual culture today. Image, as an essential medium of communication, plays an important role in contemporary society. The one way is the conversion of analogue image like an actual picture, photograph, or film into digital one through the digitalization of digital camera or scanner as 'an analogue/digital commutator'. The other is a way of process with a computer drawing, or modeling of objects. It is appropriate to the production of pictorial and surreal images. Digital images, produced by the other, can be divided into the form of Pixel' and form of Vector'. Vector is a line linking the point of departure to the point of end, which organizes informations. Computer stores each line's standard location and correlative locations to one another Digital image shows for more 'Perfectness' than any other visual media. Digital image has been evolving in the diverse aspects, such as a production of geometrical or organic image compositing, interactive art, multimedia art, or web art, which has been applied a computer as an extended trot of painting. Someone often interprets digitalized copy with endless reproduction of original even as an extension of a print. Visual af is no longer a simple activity of representation by a painter or sculptor, but now is intimately associated with a matter of application of media. There is some problem in images via visual media. First, the image via media doesn't reflect a reality as it is, but reflects an artificial manipulated world, that is, a virtual reality. Second, the introduction of digital effect and the development of image processing technology have enhanced a spectacle of destructive and violent scenes. Third, a child intends to recognize the interactive images of computer game and virtual reality as a reality, or truth. Education needs not only to point out an ill effect of mass media and prevent the younger generation from being damaged by it, but also to offer a knowledge and know-how to cope actively with social, cultural circumstances. Visual media education is one of these essential methods for the contemporary and future human being in the overflowing of image informations. The fosterage of 'Visual Literacy' can be considered as a very purpose of visual media education. This is a way to lead an individual to the discerning, active consumer and producer of visual media in life as far as possible. The elements of 'Visual Literacy' can be divided into a faculty of recognition related to the visual media, a faculty of critical reception, a faculty of appropriate application, a faculty of active work and a faculty of creative modeling, which are promoted at the same time by the education of 'visual literacy'. In conclusion, the education of 'Visual Literacy' guides students to comprehend and discriminate the visual image media carefully, or receive them critically, apply them properly, or produce them creatively and voluntarily. Moreover, it leads to an artistic activity by means of new media. This education can be approached and enhanced by the connection and integration with real life. Visual arts and education of them play an important role in the digital era depended on visual communications via image information. Visual me야a of day functions as an essential element both in daily life and in arts. Students can soundly understand visual phenomena of today by means of visual media, and apply it as an expression tool of life culture as well. A new recognition and valuation visual image and media education is required to cultivate the capability of active, upright dealing with the changes of history of civilization. 1) Visual media education helps to cultivate a sensibility for images, which reacts to and deals with the circumstances. 2) It helps students to comprehend the contemporary arts and culture via new media. 3) It supplies a chance of students' experiencing a visual modeling by means of new media. 4) There are educational opportunities of images with temporality and spaciality, and therefore a discerning person becomes to increase. 5) The modeling activity via new media leads students to be continuously interested in the school and production of plastic arts. 6) It raises the ability of visual communications dealing with image information society. 7) An education of digital image is significant in respect of cultivation of man of talent for the future society of image information as well. To correspond to the changing and developing social, cultural circumstances, and the form and recognition of students' reception of them, visual arts education must arrange the field of studying on a new visual culture. Besides, a program needs to be developed, which is in more systematic and active level in relation to visual media education. Educational contents should be extended to the media for visual images, that is, photography, film, television, video, computer graphic, animation, music video, computer game and multimedia. Every media must be separately approached, because they maintain the modes and peculiarities of their own according to the conveyance form of message. The concrete and systematic method of teaching and the quality of education must be researched and developed, centering around the development of a course of study. Teacher's foundational capability of teaching should be cultivated for the visual media education. In this case, it must be paid attention to the fact that a technological level of media is considered as a secondary. Because school education doesn't intend to train expert and skillful producers, but intends to lay stress on the essential aesthetic one with visual media under the social and cultural context, in respect of a consumer including a man of culture.

  • PDF