• Title/Summary/Keyword: Made-Public Information

Search Result 791, Processing Time 0.034 seconds

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF

Mediating Roles of Attachment for Information Sharing in Social Media: Social Capital Theory Perspective (소셜 미디어에서 정보공유를 위한 애착의 매개역할: 사회적 자본이론 관점)

  • Chung, Namho;Han, Hee Jeong;Koo, Chulmo
    • Asia pacific journal of information systems
    • /
    • v.22 no.4
    • /
    • pp.101-123
    • /
    • 2012
  • Currently, Social Media, it has widely a renown keyword and its related social trends and businesses have been fastly applied into various contexts. Social media has become an important research area for scholars interested in online technologies and cyber space and their social impacts. Social media is not only including web-based services but also mobile-based application services that allow people to share various style information and knowledge through online connection. Social media users have tendency to common identity- and bond-attachment through interactions such as 'thumbs up', 'reply note', 'forwarding', which may have driven from various factors and may result in delivering information, sharing knowledge, and specific experiences et al. Even further, almost of all social media sites provide and connect unknown strangers depending on shared interests, political views, or enjoyable activities, and other stuffs incorporating the creation of contents, which provides benefits to users. As fast developing digital devices including smartphone, tablet PC, internet based blogging, and photo and video clips, scholars desperately have began to study regarding diverse issues connecting human beings' motivations and the behavioral results which may be articulated by the format of antecedents as well as consequences related to contents that people create via social media. Social media such as Facebook, Twitter, or Cyworld users are more and more getting close each other and build up their relationships by a different style. In this sense, people use social media as tools for maintain pre-existing network, creating new people socially, and at the same time, explicitly find some business opportunities using personal and unlimited public networks. In terms of theory in explaining this phenomenon, social capital is a concept that describes the benefits one receives from one's relationship with others. Thereby, social media use is closely related to the form and connected of people, which is a bridge that can be able to achieve informational benefits of a heterogeneous network of people and common identity- and bonding-attachment which emphasizes emotional benefits from community members or friend group. Social capital would be resources accumulated through the relationships among people, which can be considered as an investment in social relations with expected returns and may achieve benefits from the greater access to and use of resources embedded in social networks. Social media using for their social capital has vastly been adopted in a cyber world, however, there has been little explaining the phenomenon theoretically how people may take advantages or opportunities through interaction among people, why people may interactively give willingness to help or their answers. The individual consciously express themselves in an online space, so called, common identity- or bonding-attachments. Common-identity attachment is the focus of the weak ties, which are loose connections between individuals who may provide useful information or new perspectives for one another but typically not emotional support, whereas common-bonding attachment is explained that between individuals in tightly-knit, emotionally close relationship such as family and close friends. The common identify- and bonding-attachment are mainly studying on-offline setting, which individual convey an impression to others that are expressed to own interest to others. Thus, individuals expect to meet other people and are trying to behave self-presentation engaging in opposite partners accordingly. As developing social media, individuals are motivated to disclose self-disclosures of open and honest using diverse cues such as verbal and nonverbal and pictorial and video files to their friends as well as passing strangers. Social media context, common identity- and bond-attachment for self-presentation seems different compared with face-to-face context. In the realm of social media, social users look for self-impression by posting text messages, pictures, video files. Under the digital environments, people interact to work, shop, learn, entertain, and be played. Social media provides increasingly the kinds of intention and behavior in online. Typically, identity and bond social capital through self-presentation is the intentional and tangible component of identity. At social media, people try to engage in others via a desired impression, which can maintain through performing coherent and complementary communications including displaying signs, symbols, brands made of digital stuffs(information, interest, pictures, etc,). In marketing area, consumers traditionally show common-identity as they select clothes, hairstyles, automobiles, logos, and so on, to impress others in any given context in a shopping mall or opera. To examine these social capital and attachment, we combined a social capital theory with an attachment theory into our research model. Our research model focuses on the common identity- and bond-attachment how they are formulated through social capitals: cognitive capital, structural capital, relational capital, and individual characteristics. Thus, we examined that individual online kindness, self-rated expertise, and social relation influence to build common identity- and bond-attachment, and the attachment effects make an impact on both the willingness to help, however, common bond seems not to show directly impact on information sharing. As a result, we discover that the social capital and attachment theories are mainly applicable to the context of social media and usage in the individual networks. We collected sample data of 256 who are using social media such as Facebook, Twitter, and Cyworld and analyzed the suggested hypotheses through the Structural Equation Model by AMOS. This study analyzes the direct and indirect relationship between the social network service usage and outcomes. Antecedents of kindness, confidence of knowledge, social relations are significantly affected to the mediators common identity-and bond attachments, however, interestingly, network externality does not impact, which we assumed that a size of network was a negative because group members would not significantly contribute if the members do not intend to actively interact with each other. The mediating variables had a positive effect on toward willingness to help. Further, common identity attachment has stronger significant on shared information.

  • PDF

Analysis of Twitter for 2012 South Korea Presidential Election by Text Mining Techniques (텍스트 마이닝을 이용한 2012년 한국대선 관련 트위터 분석)

  • Bae, Jung-Hwan;Son, Ji-Eun;Song, Min
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.141-156
    • /
    • 2013
  • Social media is a representative form of the Web 2.0 that shapes the change of a user's information behavior by allowing users to produce their own contents without any expert skills. In particular, as a new communication medium, it has a profound impact on the social change by enabling users to communicate with the masses and acquaintances their opinions and thoughts. Social media data plays a significant role in an emerging Big Data arena. A variety of research areas such as social network analysis, opinion mining, and so on, therefore, have paid attention to discover meaningful information from vast amounts of data buried in social media. Social media has recently become main foci to the field of Information Retrieval and Text Mining because not only it produces massive unstructured textual data in real-time but also it serves as an influential channel for opinion leading. But most of the previous studies have adopted broad-brush and limited approaches. These approaches have made it difficult to find and analyze new information. To overcome these limitations, we developed a real-time Twitter trend mining system to capture the trend in real-time processing big stream datasets of Twitter. The system offers the functions of term co-occurrence retrieval, visualization of Twitter users by query, similarity calculation between two users, topic modeling to keep track of changes of topical trend, and mention-based user network analysis. In addition, we conducted a case study on the 2012 Korean presidential election. We collected 1,737,969 tweets which contain candidates' name and election on Twitter in Korea (http://www.twitter.com/) for one month in 2012 (October 1 to October 31). The case study shows that the system provides useful information and detects the trend of society effectively. The system also retrieves the list of terms co-occurred by given query terms. We compare the results of term co-occurrence retrieval by giving influential candidates' name, 'Geun Hae Park', 'Jae In Moon', and 'Chul Su Ahn' as query terms. General terms which are related to presidential election such as 'Presidential Election', 'Proclamation in Support', Public opinion poll' appear frequently. Also the results show specific terms that differentiate each candidate's feature such as 'Park Jung Hee' and 'Yuk Young Su' from the query 'Guen Hae Park', 'a single candidacy agreement' and 'Time of voting extension' from the query 'Jae In Moon' and 'a single candidacy agreement' and 'down contract' from the query 'Chul Su Ahn'. Our system not only extracts 10 topics along with related terms but also shows topics' dynamic changes over time by employing the multinomial Latent Dirichlet Allocation technique. Each topic can show one of two types of patterns-Rising tendency and Falling tendencydepending on the change of the probability distribution. To determine the relationship between topic trends in Twitter and social issues in the real world, we compare topic trends with related news articles. We are able to identify that Twitter can track the issue faster than the other media, newspapers. The user network in Twitter is different from those of other social media because of distinctive characteristics of making relationships in Twitter. Twitter users can make their relationships by exchanging mentions. We visualize and analyze mention based networks of 136,754 users. We put three candidates' name as query terms-Geun Hae Park', 'Jae In Moon', and 'Chul Su Ahn'. The results show that Twitter users mention all candidates' name regardless of their political tendencies. This case study discloses that Twitter could be an effective tool to detect and predict dynamic changes of social issues, and mention-based user networks could show different aspects of user behavior as a unique network that is uniquely found in Twitter.

Analysis on the core factors in the successful importing of ERP system in Small & Medium Enterprises - Focusing on the Cooperation Model between Industry and Education in Chung-Buk province (중소기업 ERP 시스템 도입 핵심성공요인 분석 -충북지역 산학연계 모델을 중심으로-)

  • 김범년;김영렬
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.8 no.3
    • /
    • pp.51-60
    • /
    • 2003
  • In the radical char]go of the business environments that the existing facilities can not guarantee the business-frosts anymore, enterprises have been importing ERP system. In Korea, Sam-sung Electronics did it for the first tin in the latter half of 1994 and other enterprises succeeded. Currently, government and public enterprises as well as most of the large enterprises are employing ERP system to sharpen the competitiveness and to win the business transparency. On the other hand, it is harder for small and medium enterprises shaded by the large enterprises to be well-equipped with information system such as ERP, because they have already suffered from chronic financial difficulties and shortage of many resources. Most of all, they prefer the short-term project that does not need much tine for them to make decisions and to carry out fully. Grounded on the above factors, in this work, I suggest the suitable ERP model for the small and medium enterprises and the successful importing process of ERP, which is derived from the previous researches made by other masters' thesis. If necessary information and human resources are interchanged pertinently between local education institute and small and medium enterprise, the latter could not only deal with the confronted difficulties successfully inside and outside but attain the goal of being proficient in up-to-minute high technology. Besides, giving the students the opportunity of researching into the practice of the business they have not ever known, local universities could help their students accumulate knowledges and acquire ideas which could not be achieved in pure academic studies. When the above-mentioned procedure is over, the students might get the intellectual faculty to ponder on the future more concretely and enter a profession more carefully. In the result, we would raise up the percentage of the employment among the graduates. And active participation of university professors is the last important factor that assists the small and medium enterprises for introducing ERP system successfully. Their scholarly attainments play an important role in strengthening local economy and make the business competitiveness balanced between the capital and the local economy.

  • PDF

Development Process for User Needs-based Chatbot: Focusing on Design Thinking Methodology (사용자 니즈 기반의 챗봇 개발 프로세스: 디자인 사고방법론을 중심으로)

  • Kim, Museong;Seo, Bong-Goon;Park, Do-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.3
    • /
    • pp.221-238
    • /
    • 2019
  • Recently, companies and public institutions have been actively introducing chatbot services in the field of customer counseling and response. The introduction of the chatbot service not only brings labor cost savings to companies and organizations, but also enables rapid communication with customers. Advances in data analytics and artificial intelligence are driving the growth of these chatbot services. The current chatbot can understand users' questions and offer the most appropriate answers to questions through machine learning and deep learning. The advancement of chatbot core technologies such as NLP, NLU, and NLG has made it possible to understand words, understand paragraphs, understand meanings, and understand emotions. For this reason, the value of chatbots continues to rise. However, technology-oriented chatbots can be inconsistent with what users want inherently, so chatbots need to be addressed in the area of the user experience, not just in the area of technology. The Fourth Industrial Revolution represents the importance of the User Experience as well as the advancement of artificial intelligence, big data, cloud, and IoT technologies. The development of IT technology and the importance of user experience have provided people with a variety of environments and changed lifestyles. This means that experiences in interactions with people, services(products) and the environment become very important. Therefore, it is time to develop a user needs-based services(products) that can provide new experiences and values to people. This study proposes a chatbot development process based on user needs by applying the design thinking approach, a representative methodology in the field of user experience, to chatbot development. The process proposed in this study consists of four steps. The first step is 'setting up knowledge domain' to set up the chatbot's expertise. Accumulating the information corresponding to the configured domain and deriving the insight is the second step, 'Knowledge accumulation and Insight identification'. The third step is 'Opportunity Development and Prototyping'. It is going to start full-scale development at this stage. Finally, the 'User Feedback' step is to receive feedback from users on the developed prototype. This creates a "user needs-based service (product)" that meets the process's objectives. Beginning with the fact gathering through user observation, Perform the process of abstraction to derive insights and explore opportunities. Next, it is expected to develop a chatbot that meets the user's needs through the process of materializing to structure the desired information and providing the function that fits the user's mental model. In this study, we present the actual construction examples for the domestic cosmetics market to confirm the effectiveness of the proposed process. The reason why it chose the domestic cosmetics market as its case is because it shows strong characteristics of users' experiences, so it can quickly understand responses from users. This study has a theoretical implication in that it proposed a new chatbot development process by incorporating the design thinking methodology into the chatbot development process. This research is different from the existing chatbot development research in that it focuses on user experience, not technology. It also has practical implications in that companies or institutions propose realistic methods that can be applied immediately. In particular, the process proposed in this study can be accessed and utilized by anyone, since 'user needs-based chatbots' can be developed even if they are not experts. This study suggests that further studies are needed because only one field of study was conducted. In addition to the cosmetics market, additional research should be conducted in various fields in which the user experience appears, such as the smart phone and the automotive market. Through this, it will be able to be reborn as a general process necessary for 'development of chatbots centered on user experience, not technology centered'.

호스피스 전달체계 모형

  • Choe, Hwa-Suk
    • Korean Journal of Hospice Care
    • /
    • v.1 no.1
    • /
    • pp.46-69
    • /
    • 2001
  • Hospice Care is the best way to care for terminally ill patients and their family members. However most of them can not receive the appropriate hospice service because the Korean health delivery system is mainly be focussed on acutly ill patients. This study was carried out to clarify the situation of hospice in Korea and to develop a hospice care delivery system model which is appropriate in the Korean context. The theoretical framework of this study that hospice care delivery system is composed of hospice resources with personnel, facilities, etc., government and non-government hospice organization, hospice finances, hospice management and hospice delivery, was taken from the Health Delivery System of WHO(1984). Data was obtained through data analysis of litreature, interview, questionairs, visiting and Delphi Technique, from October 1998 to April 1999 involving 56 hospices, 1 hospice research center, 3 non-government hospice organizations, 20 experts who have had hospice experience for more than 3 years(mean is 9 years and 5 months) and officials or members of 3 non-government hospice organizations. There are 61 hospices in Korea. Even though hospice personnel have tried to study and to provide qualified hospice serices, there is nor any formal hospice linkage or network in Korea. This is the result of this survey made to clarify the situation of Korean hospice. Results of the study by Delphi Technique were as follows: 1.Hospice Resources: Key hospice personnel were found to be hospice coordinator, doctor, nurse, clergy, social worker, volunteers. Necessary qualifications for all personnel was that they conditions were resulted as have good health, receive hospice education and have communication skills. Education for hospice personnel is divided into (i)basic training and (ii)special education, e.g. palliative medicine course for hospice specialist or palliative care course in master degree for hospice nurse specialist. Hospice facilities could be developed by adding a living room, a space for family members, a prayer room, a church, an interview room, a kitchen, a dining room, a bath facility, a hall for music, art or work therapy, volunteers' room, garden, etc. to hospital facilities. 2.Hospice Organization: Whilst there are three non-government hospice organizations active at present, in the near future an hospice officer in the Health&Welfare Ministry plus a government Hospice body are necessary. However a non-government council to further integrate hospice development is also strongly recommended. 3.Hospice Finances: A New insurance standards, I.e. the charge for hospice care services, public information and tax reduction for donations were found suggested as methods to rise the hospice budget. 4.Hospice Management: Two divisions of hospice management/care were considered to be necessary in future. The role of the hospice officer in the Health & Welfare Ministry would be quality control of hospice teams and facilities involved/associated with hospice insurance standards. New non-government integrating councils role supporting the development of hospice care, not insurance covered. 5.Hospice delivery: Linkage&networking between hospice facilities and first, second, third level medical institutions are needed in order to provide varied and continous hospice care. Hospice Acts need to be established within the limits of medical law with regards to standards for professional staff members, educational programs, etc. The results of this study could be utilizes towards the development to two hospice care delivery system models, A and B. Model A is based on the hospital, especially the hospice unit, because in this setting is more easily available the new medical insurance for hospice care. Therefore a hospice team is organized in the hospital and may operate in the hospice unit and in the home hospice care service. After Model A is set up and operating, Model B will be the next stage, in which medical insurance cover will be extended to home hospice care service. This model(B) is also based on the hospital, but the focus of the hospital hospice unit will be moved to home hospice care which is connected by local physicians, national public health centers, community parties as like churches or volunteer groups. Model B will contribute to the care of terminally ill patients and their family members and also assist hospital administrators in cost-effectiveness.

  • PDF

The Vogue about Outwearization of Underwear in a Tendency to the Century-end (세기말 현상으로 본 속옷의 겉옷화 현상)

  • 이상례
    • Journal of the Korean Society of Costume
    • /
    • v.35
    • /
    • pp.325-341
    • /
    • 1997
  • One of the noticeable trends of female wear in 1990s is the Outwearization of Underwear as it is called 'Lingerie look' This trend meaned 'Exposure Fashion' raised splendidly its head to the whole stage of fashion destrying the tradional concept having divided the fashion between outwear and underwear by Madonna an Americal populer singer showed up in front of the audience wearing the corset-dress as a stage custome. This corset-dress which can not be recognised whether it is underwear or outwear has been diffused into the mass as a fashionable trend re-gardless of any reason; therefore discrimi-nation of wear by space by far that is underwear should have the sstandard telling between private and public sector has been gradually tumbled. By the way what has propelled desigers to introduce the style continuously having the underwear motive such as outwear almost as same as underwear or underwear worn on out-wear etc. and has made it a fashion trends? How do we accept this "Ligerie look'fashion" The rearch on vogue of outwearization of underwear started by the questions above can be summarized as the followings The division between the sprit and the ma-terial-economic shrinkage by the collapse of the bubble economy in the late of 20 century and expectation for the next century doubt by changes of international politics dynamics for the next century and increasement of psycho-logical tention by the environmental destruc-tion etc, has been extended to break the sense of value down These frustration of the tra-ditional values and dissatisfaction on the pres-ent have reflected on the fashion pursuing some more sensational style to increase the ex-posure of the body. The revolution of wearing bouncing the con-servatismhas outwardly expressed underwear of the private sector. Therefore the spatial concept of wear which for the public sec-tor has been fallen into pieces and has broken the wall of the concept fixed by outwear on underwear. in addition the stage costome for the popular people like Madonna has not been limited by the specularity any more and has been assimilated with the normal wear on the street to take the distinction for away. The circumstances of the late of 20 century pursuing sensation and making sex commer-cialized have accordance with the outweari-zation of underwear. there it is on the basis of Minimalist's dogmatism has been expressed the maximization of expoure in the pubric space to popularize bra pants(knickers) as outwear. The reaction on the attribute of hiding and shanding has brought 'See-Through fashion' with the transparent materials, The contemporary doubt recalling the mem-ory of the past has sublimated corset which was an instument of toture for women into Romanticism to introduce it to fashion with the development of a new material not to be a tool of any oppression and maltretment any longer. The popularization of outwear like underwear what's more has brought high quality of underwear. There it has called for the variety of materials such as knit demin and velvet etc, and has urged the famous designers to enlarge their working boundaries to underwear designs, Besides outwearization of underwear has been popular even in the Orient which has the con-servative opinions on exposure ; so changes of the thoughts can be seen among the establish-ment generation on exposure of the body. As the more high tech information publi-cized and the more technology and media digitalized the more expression being analog the pursue for the new in fashion with vision never been seen and even though it is imprac-tical the experimental designers have drived the freedom beyond the traditional roles of the previous century. Consequently outwearization of underwear may be viewd as a trial as an expression responded the contemporary background. This trend in my opinion will have been lasted for a while by being proliperlated among lasted for a while by being proliperlated among the pub-lic who has the century-end anxiety and doubt and expectation for the next century.

  • PDF

A Study on the Utilization for Oral Health Education Materials of Dental Hygienists (치과위생사의 구강보건교육매체 활용 실태)

  • Jung, Young-ran;Jung, You-Sun;Han, Ji-Hyung;Hwang, Yoon-Sook;Choi, Hye-Sook
    • Journal of dental hygiene science
    • /
    • v.11 no.1
    • /
    • pp.23-30
    • /
    • 2011
  • The purpose of this study was to examine the utilization of oral health education media among dental hygienists in charge of oral health education. The findings of the study were as follows. 1. In regard to the general utilization of educational media in possession by workplace, age and career, the dental hygienists who worked in public health clinics(42.4%), who were in their 40s and up(341.%) and whose career was six years or more(32.2%) made more use of the educational media. Those who didn't use the educational media cited time constraints as the most common reason(46.1%). 2. Models(53.2%) were highly preferred in most of the institutions where the dental hygienists worked, but the public health clinics(81.8%) and university hospitals(80.0%) were most fond of video clips. 3. Concerning preference for educational media by career, the dental hygienists whose career was between three and less than six years and who had a 10 years or more of career had the most liking for video clips, followed by models. Those whose career was between one to less than three years and between six and less than 10 years showed the most preference for models, followed by video clips. 4. As for their perception of the necessity of educational media, the majority felt the need for the media(87.5%). Regarding difficulties in purchasing necessary educational media, the biggest group pointed out a shortage of information(56.1%).

The Study about Role and Importance of Site Activity Stage in Safety Activity for the International Conference among Several Countries (다자간 국제회의 안전활동에 있어서 현장활동단계의 역할 및 중요성에 관한 연구 : 부산 APEC 행사를 중심으로)

  • Lee, Sun-Ki
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.105-138
    • /
    • 2009
  • This study's purpose is to present the improvement of effectiveness of security activity for international conference among Several Countries which can be held hereafter. On the basis of security activity problems originating in APEC that had been held in Busan in 2005. I made up questions three times to on the members of the police, military, fire figher and national intelligence service who had experienced in Busan APEC and recognition of possible problem and possibility of improvement on each item of questions was analyzed by Delphi Method. Also interviews with 4 security experts selected from each security agency were conducted to present improvement in each part of problem. The results obtained from the face to face interview with four experts of security-enforcement agency about the role and importance of site activity stage for international conference among several countries are as followings ; First, the system that experienced security-enforcement agents can be selected for the next national security event is needed, by data-basing the security-enforcement agents who were experienced in security event as man power management. Second, the middle-term plan for the introduction of high-tech equipment and joint inspection with relevant security agents are needed for the efficient explosive technical detection. Third, high-tech security equipment could be introduced through the international high-tech security equipment exhibition. Fourth, an anti-terrorism plan should be measured by sharing information through the cooperation with domestic and international intelligence agency. Fifth, public relations should be measured systematically by organization rather than agents' individual public relations. Sixth, political consideration to secure integrative coordination with other agency is needed for security activity, through normal cooperation with fire fighting related agency such as an electric, gas, elevator company. Seventh, a definite press guideline is needed for a convenient news coverage and safety during security event.

  • PDF

Which types of the strategies diffused to the public through company's announcement do contribute to the long-term performance? (공시된 경영전략의 유형별 장기실적 기여도 분석)

  • Kang, Won
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.4 no.4
    • /
    • pp.45-70
    • /
    • 2009
  • This article investigates which types of the strategies announced by the listed firms contribute to enhancing the long-term performance of the companies. Since 2002, Korean Exchange adopted the "faire disclosure policy" which mandates that all publicly traded companies must disclose material information to all investors at the same time. Thanks to the policy, Korean investors can, now, easily access the board's decision on management strategies on the same day the decision is made. If the companies trustfully carry out their announced strategies, we can decide which types of strategies actually enhance or deteriorate the long-term performance, simply by comparing the announced strategies and the firm's performance. The sample companies are confined to 60 firms that became listed in the KOSDAQ market through back-door listing from 2003 to 2005. Using only the newly listed companies, we can avoid the interference on the long-term performance of the strategies pursued before the event date. This often holds true, for many companies radically modify their strategies after the listing. Furthermore, the back-door listing companies serve our purpose better than IPO companies do, because the former tend to have a variety of announcement within a given period of time beginning the listing date. Using these sample companies, this article analyzes the effect on one year buy-and-hold returns and abnormal buy-and-hold returns after the listing of the various types of strategies announced during the same period of time. The results show that those evidences of restructuring such as 'reduction of capital' and 'resignation of incumbent board members', actually contribute to the increase in adjusted long-term stock returns. Those strategies which can be view as evidence of new investment such as 'increase in tangible assets', 'acquisition of other companies', do also helps the stockholders better off. On the contrary, 'increase in bank loans', 'changes of CEO' and 'merger' deteriorate the equity value. The last findings let us to presume that the back-door listing companies appear to use the bank loans for value-reducing activities; the change in CEO is not a sign of restructuring, but rather a sign of failure of the restructuring; another merger carried out after back-door listing itself is also value-reducing activity. This article's findings on reduction of capital, merger and bank loans oppose the results of the former empirical studies which analyze only the short-term effect on stock price. Therefore, more long-term performance studies on public disclosures are in order.

  • PDF