• Title/Summary/Keyword: Network Evolution

Search Result 643, Processing Time 0.032 seconds

Organizational Buying Behavior in an Interdependent World (상호의존세계중적조직구매행위(相互依存世界中的组织购买行为))

  • Wind, Yoram;Thomas, Robert J.
    • Journal of Global Scholars of Marketing Science
    • /
    • v.20 no.2
    • /
    • pp.110-122
    • /
    • 2010
  • The emergence of the field of organizational buying behavior in the mid-1960’s with the publication of Industrial Buying and Creative Marketing (1967) set the stage for a new paradigm of thinking about how business was conducted in markets other than those serving ultimate consumers. Whether it is "industrial marketing" or "business-to-business marketing" (B-to-B), organizational buying behavior remains the core differentiating characteristic of this domain of marketing. This paper explores the impact of several dynamic factors that have influenced how organizations relate to one another in a rapidly increasing interdependence, which in turn can impact organizational buying behavior. The paper also raises the question of whether or not the major conceptual models of organizational buying behavior in an interdependent world are still relevant to guide research and managerial thinking, in this dynamic business environment. The paper is structured to explore three questions related to organizational interdependencies: 1. What are the factors and trends driving the emergence of organizational interdependencies? 2. Will the major conceptual models of organizational buying behavior that have developed over the past half century be applicable in a world of interdependent organizations? 3. What are the implications of organizational interdependencies on the research and practice of organizational buying behavior? Consideration of the factors and trends driving organizational interdependencies revealed five critical drivers in the relationships among organizations that can impact their purchasing behavior: Accelerating Globalization, Flattening Networks of Organizations, Disrupting Value Chains, Intensifying Government Involvement, and Continuously Fragmenting Customer Needs. These five interlinked drivers of interdependency and their underlying technological advances can alter the relationships within and among organizations that buy products and services to remain competitive in their markets. Viewed in the context of a customer driven marketing strategy, these forces affect three levels of strategy development: (1) evolving customer needs, (2) the resulting product/service/solution offerings to meet these needs, and (3) the organization competencies and processes required to develop and implement the offerings to meet needs. The five drivers of interdependency among organizations do not necessarily operate independently in their impact on how organizations buy. They can interact with each other and become even more potent in their impact on organizational buying behavior. For example, accelerating globalization may influence the emergence of additional networks that further disrupt traditional value chain relationships, thereby changing how organizations purchase products and services. Increased government involvement in business operations in one country may increase costs of doing business and therefore drive firms to seek low cost sources in emerging markets in other countries. This can reduce employment opportunitiesn one country and increase them in another, further accelerating the pace of globalization. The second major question in the paper is what impact these drivers of interdependencies have had on the core conceptual models of organizational buying behavior. Consider the three enduring conceptual models developed in the Industrial Buying and Creative Marketing and Organizational Buying Behavior books: the organizational buying process, the buying center, and the buying situation. A review of these core models of organizational buying behavior, as originally conceptualized, shows they are still valid and not likely to change with the increasingly intense drivers of interdependency among organizations. What will change however is the way in which buyers and sellers interact under conditions of interdependency. For example, increased interdependencies can lead to increased opportunities for collaboration as well as conflict between buying and selling organizations, thereby changing aspects of the buying process. In addition, the importance of communication processes between and among organizations will increase as the role of trust becomes an important criterion for a successful buying relationship. The third question in the paper explored consequences and implications of these interdependencies on organizational buying behavior for practice and research. The following are considered in the paper: the need to increase understanding of network influences on organizational buying behavior, the need to increase understanding of the role of trust and value among organizational participants, the need to improve understanding of how to manage organizational buying in networked environments, the need to increase understanding of customer needs in the value network, and the need to increase understanding of the impact of emerging new business models on organizational buying behavior. In many ways, these needs deriving from increased organizational interdependencies are an extension of the conceptual tradition in organizational buying behavior. In 1977, Nicosia and Wind suggested a focus on inter-organizational over intra-organizational perspectives, a trend that has received considerable momentum since the 1990's. Likewise for managers to survive in an increasingly interdependent world, they will need to better understand the complexities of how organizations relate to one another. The transition from an inter-organizational to an interdependent perspective has begun, and must continue so as to develop an improved understanding of these important relationships. A shift to such an interdependent network perspective may require many academicians and practitioners to fundamentally challenge and change the mental models underlying their business and organizational buying behavior models. The focus can no longer be only on the dyadic relations of the buying organization and the selling organization but should involve all the related members of the network, including the network of customers, developers, and other suppliers and intermediaries. Consider for example the numerous partner networks initiated by SAP which involves over 9000 companies and over a million participants. This evolving, complex, and uncertain reality of interdependencies and dynamic networks requires reconsideration of how purchase decisions are made; as a result they should be the focus of the next phase of research and theory building among academics and the focus of practical models and experiments undertaken by practitioners. The hope is that such research will take place, not in the isolation of the ivory tower, nor in the confines of the business world, but rather, by increased collaboration of academics and practitioners. In conclusion, the consideration of increased interdependence among organizations revealed the continued relevance of the fundamental models of organizational buying behavior. However to increase the value of these models in an interdependent world, academics and practitioners should improve their understanding of (1) network influences, (2) how to better manage these influences, (3) the role of trust and value among organizational participants, (4) the evolution of customer needs in the value network, and (5) the impact of emerging new business models on organizational buying behavior. To accomplish this, greater collaboration between industry and academia is needed to advance our understanding of organizational buying behavior in an interdependent world.

Research Trend Analysis Using Bibliographic Information and Citations of Cloud Computing Articles: Application of Social Network Analysis (클라우드 컴퓨팅 관련 논문의 서지정보 및 인용정보를 활용한 연구 동향 분석: 사회 네트워크 분석의 활용)

  • Kim, Dongsung;Kim, Jongwoo
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.1
    • /
    • pp.195-211
    • /
    • 2014
  • Cloud computing services provide IT resources as services on demand. This is considered a key concept, which will lead a shift from an ownership-based paradigm to a new pay-for-use paradigm, which can reduce the fixed cost for IT resources, and improve flexibility and scalability. As IT services, cloud services have evolved from early similar computing concepts such as network computing, utility computing, server-based computing, and grid computing. So research into cloud computing is highly related to and combined with various relevant computing research areas. To seek promising research issues and topics in cloud computing, it is necessary to understand the research trends in cloud computing more comprehensively. In this study, we collect bibliographic information and citation information for cloud computing related research papers published in major international journals from 1994 to 2012, and analyzes macroscopic trends and network changes to citation relationships among papers and the co-occurrence relationships of key words by utilizing social network analysis measures. Through the analysis, we can identify the relationships and connections among research topics in cloud computing related areas, and highlight new potential research topics. In addition, we visualize dynamic changes of research topics relating to cloud computing using a proposed cloud computing "research trend map." A research trend map visualizes positions of research topics in two-dimensional space. Frequencies of key words (X-axis) and the rates of increase in the degree centrality of key words (Y-axis) are used as the two dimensions of the research trend map. Based on the values of the two dimensions, the two dimensional space of a research map is divided into four areas: maturation, growth, promising, and decline. An area with high keyword frequency, but low rates of increase of degree centrality is defined as a mature technology area; the area where both keyword frequency and the increase rate of degree centrality are high is defined as a growth technology area; the area where the keyword frequency is low, but the rate of increase in the degree centrality is high is defined as a promising technology area; and the area where both keyword frequency and the rate of degree centrality are low is defined as a declining technology area. Based on this method, cloud computing research trend maps make it possible to easily grasp the main research trends in cloud computing, and to explain the evolution of research topics. According to the results of an analysis of citation relationships, research papers on security, distributed processing, and optical networking for cloud computing are on the top based on the page-rank measure. From the analysis of key words in research papers, cloud computing and grid computing showed high centrality in 2009, and key words dealing with main elemental technologies such as data outsourcing, error detection methods, and infrastructure construction showed high centrality in 2010~2011. In 2012, security, virtualization, and resource management showed high centrality. Moreover, it was found that the interest in the technical issues of cloud computing increases gradually. From annual cloud computing research trend maps, it was verified that security is located in the promising area, virtualization has moved from the promising area to the growth area, and grid computing and distributed system has moved to the declining area. The study results indicate that distributed systems and grid computing received a lot of attention as similar computing paradigms in the early stage of cloud computing research. The early stage of cloud computing was a period focused on understanding and investigating cloud computing as an emergent technology, linking to relevant established computing concepts. After the early stage, security and virtualization technologies became main issues in cloud computing, which is reflected in the movement of security and virtualization technologies from the promising area to the growth area in the cloud computing research trend maps. Moreover, this study revealed that current research in cloud computing has rapidly transferred from a focus on technical issues to for a focus on application issues, such as SLAs (Service Level Agreements).

Effect of Lead Content on Atomic Structures of Pb-bearing Sodium Silicate Glasses: A View from 29Si NMR Spectroscopy (납 함량에 따른 비정질 Pb-Na 규산염의 원자 구조에 대한 고상 핵자기 공명 분광분석 연구)

  • Lee, Seoyoung;Lee, Sung Keun
    • Korean Journal of Mineralogy and Petrology
    • /
    • v.34 no.3
    • /
    • pp.157-167
    • /
    • 2021
  • Lead (Pb) is one of the key trace elements, exhibiting a peculiar partitioning behavior into silicate melts in contact with minerals. Partitioning behaviors of Pb between silicate mineral and melt have been known to depend on melt composition and thus, the atomic structures of corresponding silicate liquids. Despite the importance, detailed structural studies of Pb-bearing silicate melts are still lacking due to experimental difficulties. Here, we explored the effect of lead content on the atomic structures, particularly the evolution of silicate networks in Pb-bearing sodium metasilicate ([(PbO)x(Na2O)1-x]·SiO2) glasses as a model system for trace metal bearing natural silicate melts, using 29Si solid-state nuclear magnetic resonance (NMR) spectroscopy. As the PbO content increases, the 29Si peak widths increase, and the maximum peak positions shift from -76.2, -77.8, -80.3, -81.5, -84.6, to -87.7 ppm with increasing PbO contents of 0, 0.25, 0.5, 0.67, 0.86, and 1, respectively. The 29Si MAS NMR spectra for the glasses were simulated with Gaussian functions for Qn species (SiO4 tetrahedra with n BOs) for providing quantitative resolution. The simulation results reveal the evolution of each Qn species with varying PbO content. Na-endmember Na2SiO3 glass consists of predominant Q2 species together with equal proportions of Q1 and Q3. As Pb replaces Na, the fraction of Q2 species tends to decrease, while those for Q1 and Q3 species increase indicating an increase in disproportionation among Qn species. Simulation results on the 29Si NMR spectrum showed increases in structural disorder and chemical disorder as evidenced by an increase in disproportionation factor with an increase in average cation field strengths of the network modifying cations. Changes in the topological and configurational disorder of the model silicate melt by Pb imply an intrinsic origin of macroscopic properties such as element partitioning behavior.

A study of Artificial Intelligence (AI) Speaker's Development Process in Terms of Social Constructivism: Focused on the Products and Periodic Co-revolution Process (인공지능(AI) 스피커에 대한 사회구성 차원의 발달과정 연구: 제품과 시기별 공진화 과정을 중심으로)

  • Cha, Hyeon-ju;Kweon, Sang-hee
    • Journal of Internet Computing and Services
    • /
    • v.22 no.1
    • /
    • pp.109-135
    • /
    • 2021
  • his study classified the development process of artificial intelligence (AI) speakers through analysis of the news text of artificial intelligence (AI) speakers shown in traditional news reports, and identified the characteristics of each product by period. The theoretical background used in the analysis are news frames and topic frames. As analysis methods, topic modeling and semantic network analysis using the LDA method were used. The research method was a content analysis method. From 2014 to 2019, 2710 news related to AI speakers were first collected, and secondly, topic frames were analyzed using Nodexl algorithm. The result of this study is that, first, the trend of topic frames by AI speaker provider type was different according to the characteristics of the four operators (communication service provider, online platform, OS provider, and IT device manufacturer). Specifically, online platform operators (Google, Naver, Amazon, Kakao) appeared as a frame that uses AI speakers as'search or input devices'. On the other hand, telecommunications operators (SKT, KT) showed prominent frames for IPTV, which is the parent company's flagship business, and 'auxiliary device' of the telecommunication business. Furthermore, the frame of "personalization of products and voice service" was remarkable for OS operators (MS, Apple), and the frame for IT device manufacturers (Samsung) was "Internet of Things (IoT) Integrated Intelligence System". The econd, result id that the trend of the topic frame by AI speaker development period (by year) showed a tendency to develop around AI technology in the first phase (2014-2016), and in the second phase (2017-2018), the social relationship between AI technology and users It was related to interaction, and in the third phase (2019), there was a trend of shifting from AI technology-centered to user-centered. As a result of QAP analysis, it was found that news frames by business operator and development period in AI speaker development are socially constituted by determinants of media discourse. The implication of this study was that the evolution of AI speakers was found by the characteristics of the parent company and the process of co-evolution due to interactions between users by business operator and development period. The implications of this study are that the results of this study are important indicators for predicting the future prospects of AI speakers and presenting directions accordingly.

Characterization of a Monoclonal Antibody Specific to Human Siah-1 Interacting Protein (인체 SIP 단백질에 특이적인 단일클론 항체의 특성)

  • Yoon, Sun Young;Joo, Jong Hyuck;Kim, Joo Heon;Kang, Ho Bum;Kim, Jin Sook;Lee, Younghee;Kwon, Do Hwan;Kim, Chang Nam;Choe, In Seong;Kim, Jae Wha
    • IMMUNE NETWORK
    • /
    • v.4 no.1
    • /
    • pp.23-30
    • /
    • 2004
  • Background: A human orthologue of mouse S100A6-binding protein (CacyBP), Siah-1-interacting protein (SIP) had been shown to be a component of novel ubiquitinylation pathway regulating $\beta$-catenin degradation. The role of the protein seems to be important in cell proliferation and cancer evolution but the expression pattern of SIP in actively dividing cancer tissues has not been known. For the elucidation of the role of SIP protein in carcinogenesis, it is essential to produce monoclonal antibodies specific to the protein. Methods: cDNA sequence coding for ORF region of human SIP gene was amplified and cloned into an expression vector to produce His-tag fusion protein. Recombinant SIP protein and monoclonal antibody to the protein were produced. The N-terminal specificity of anti-SIP monoclonal antibody was conformed by immunoblot analysis and enzyme linked immunosorbent assay (ELISA). To study the relation between SIP and colon carcinogenesis, the presence of SIP protein in colon carcinoma tissues was visualized by immunostaining using the monoclonal antibody produced in this study. Results: His-tag-SIP (NSIP) recombinant protein was produced and purified. A monoclonal antibody (Korea patent pending; #2003-45296) to the protein was produced and employed to analyze the expression pattern of SIP in colon carcinoma tissues. Conclusion: The data suggested that anti-SIP monoclonal antibody produced here was valuable for the diagnosis of colon carcinoma and elucidation of the mechanism of colon carcinogenesis.

The risk of the Information-oriented society and the role of private security (정보화 사회의 위험적 요소와 민간시큐리티의 역할)

  • Gong, Bae Wan
    • Journal of the Society of Disaster Information
    • /
    • v.8 no.1
    • /
    • pp.1-9
    • /
    • 2012
  • Informatization of society through the computer and the Internet, because large amounts of information production and exchange and new way of communicating is born. Passive way past the one-sided information flows actively interact to evolve in a manner of information producers and information consumers distinction and personal relationships that enhance the online Social Networking Service (SNS) has developed into the social structure of. Thus, the spread of information work closely with the social network structure spark social conflict may act as a factor, and systems and the environment, personal and cultural adaptation of speed to keep up with the rapid development of science and technology as the inability conflict and confusion should lead to even. This paper the characteristics of the information society, with a look at the evolution of social risk factors as the wavelength of information about this look at the role of private security sought to evaluate. Information Society in time and space by shrinking the area of human life that has brought the convenience and simplicity, whereas the non-performance due to the nature of anonymous raises many social side-effects are. This made the preparation of national regulatory measures, but for the protection of personal protection devices in the private sector has not yet been discussed. Way of life and property of the purchaser to protect an individual's private security will have to charge it.

Log Management System of Web Server Based on Blockchain in Cloud Environment (클라우드 환경에서 블록체인 기반의 웹서버 로그 관리 시스템)

  • Son, Yong-Bum;Kim, Young-Hak
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.7
    • /
    • pp.143-148
    • /
    • 2020
  • Recently, web services have been expanded to various areas with the evolution of cloud environment. Whenever a user accesses a web service, the user's log information is stored in the web server. This log information is used as data to analyze the user's web service tendencies and is also used as important data to track the user's system access when a security problem in the system occurs. Currently, most web servers manage user log information in a centralized manner. When user log information is managed in a centralized manner, it is simple in the side of operation, but has a disadvantage of being very vulnerable to external malicious attacks. In the case of centralized management, user log information stored in the web server can be arbitrarily manipulated by external attacks, and in severe cases, the manipulated information can be leaked. In this case, it not only decreases the trust of the web service, but also makes it difficult to trace the source and cause of the attack on the web server. In order to solve these problems, this paper proposes a new method of managing user log information in a cloud environment by applying blockchain technology as an alternative to the existing centralized log management method. The proposed method can manage log information safely from external attacks because user log information is distributed and stored in blockchain on a private network with cloud environment.

Decentralization from Al-Qaida central among Salafi-jihadist groups, Boko Haram and the Islamic States (살라피 지하디스트의 탈-알카에다 중심화와 보코하람, IS에 대한 분석연구)

  • Kim, Eun-Young
    • Korean Security Journal
    • /
    • no.41
    • /
    • pp.185-212
    • /
    • 2014
  • This research examines the decentralization of al-Qaida and other Salafi-jihadist terrorist groups, which is a subject of intense debate in the West. Especially, this study focused on investigating the status and evolution of al Qa'ida and other two Salafi-jihadist groups, Boko Haram and the Islamic States. These terrorist groups are currently considered as the most active Salafi-jihadist terrorist groups leading today's decentralization from Al-Qaida central terrorism network. This study also aims to examine the contemporary threats posed by the two extremely violent jihadist terrorist groups and these groups's terrorist networks. In order to achieve the purpose of this study, this study conducted content analyses with a wide range of documents reporting about Salafi-jihadist terrorists groups. Also this study utilized GTD data set drwan from START centner to provide descriptive analyses regarding IS and Boko Haram's activities and threats. On the basis of analyses, this study argues that recently the threats posed by core al Qaida has been severely weakened. Further, the broader Salafi-jihadist movement has become more decentralized among four tiers: first, core al Qaida in Pakistan; second, formal al Qa'ida affiliated groups that have sworn allegiance to core al Qaida; a number of Salafi-jihadist groups that have committed to establishing an extremist Islamic emirate without sworn allegiance to al Qaida; third, individual followers and networks inspired by al Qaida and other Salafi-jihadist groups. In concusion and discussion, this study highlights the need for a long-term engagement counter terrorism strategy against Salifi-jihadist terrorists groups on behalf of the peace and security of the world society.

  • PDF

Performance Evaluation of LTE-VPN based Disaster Investigation System for Sharing Disaster Field Information (재난사고 정보공유를 위한 LTE-VPN기반 현장조사시스템 성능평가)

  • Kim, Seong Sam;Shin, Dong Yoon;Nho, Hyun Ju
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.11
    • /
    • pp.602-609
    • /
    • 2020
  • In the event of a large-scale disaster such as an earthquake, typhoon, landslide, and building collapse, the disaster situation awareness and timely disaster information sharing play a key role in the disaster response and decision-making stages for disaster management, such as disaster site control and evacuation of residents. In this paper, an exited field investigation system of NDMI (National Disaster Management Research Institute) was enhanced with an LTE-VPN- based wireless communication system to provide an effective on-site response in an urgent disaster situation and share observation data or analysis information acquired at the disaster fields in real-time. The required performance of wireless communication for the disaster field investigation system was then analyzed and evaluated. The experimental result for field data transmission performance of an advanced wireless communication investigation system showed that the UDP transmission performance of at least 4.1Mbps is required to ensure a seamless video conference system between disaster sites. In addition, a wireless communication bandwidth of approximately 10 Mbps should be guaranteed to smoothly share the communication and field data between the survey equipment currently mounted on the survey vehicle.

Determining the Rotation Periods of an Inactive LEO Satellite and the First Korean Space Debris on GEO, KOREASAT 1

  • Choi, Jin;Jo, Jung Hyun;Kim, Myung-Jin;Roh, Dong-Goo;Park, Sun-Youp;Lee, Hee-Jae;Park, Maru;Choi, Young-Jun;Yim, Hong-Suh;Bae, Young-Ho;Park, Young-Sik;Cho, Sungki;Moon, Hong-Kyu;Choi, Eun-Jung;Jang, Hyun-Jung;Park, Jang-Hyun
    • Journal of Astronomy and Space Sciences
    • /
    • v.33 no.2
    • /
    • pp.127-135
    • /
    • 2016
  • Inactive space objects are usually rotating and tumbling as a result of internal or external forces. KOREASAT 1 has been inactive since 2005, and its drift trajectory has been monitored with the optical wide-field patrol network (OWL-Net). However, a quantitative analysis of KOREASAT 1 in regard to the attitude evolution has never been performed. Here, two optical tracking systems were used to acquire raw measurements to analyze the rotation period of two inactive satellites. During the optical campaign in 2013, KOREASAT 1 was observed by a 0.6 m class optical telescope operated by the Korea Astronomy and Space Science Institute (KASI). The rotation period of KOREASAT 1 was analyzed with the light curves from the photometry results. The rotation periods of the low Earth orbit (LEO) satellite ASTRO-H after break-up were detected by OWL-Net on April 7, 2016. We analyzed the magnitude variation of each satellite by differential photometry and made comparisons with the star catalog. The illumination effect caused by the phase angle between the Sun and the target satellite was corrected with the system tool kit (STK) and two line element (TLE) technique. Finally, we determined the rotation period of two inactive satellites on LEO and geostationary Earth orbit (GEO) with light curves from the photometry. The main rotation periods were determined to be 5.2 sec for ASTRO-H and 74 sec for KOREASAT 1.