• 제목/요약/키워드: Service Review

검색결과 3,826건 처리시간 0.03초

A Study on the Recognition of Hotel Customer on outside restaurants open a business at Super Deluxe Hotel in Seoul (특급호텔 식음료부 활성화를 위한 체인레스토랑 입점에 대한 호텔고객의 인식에 관한 연구)

  • Kim, Kwan-Sik
    • Management & Information Systems Review
    • /
    • 제26권
    • /
    • pp.205-230
    • /
    • 2008
  • The purpose of this study is to research the recognition of hotel customers when the outside special restaurants opens at hotel instead of restaurant owned by hotel in Seoul City. The major factors are showed up factor analysis as specialty and reliability of hotel and outside restaurant image. They are consisted of 5 categorizes and the results of this study are as follows; First, it is proved that the expectation of customers after opening restaurant will be increased in terms of the lower price and more variety of food & beverage products. Also, the food & beverage will be increased. However, the quality and specialty of products will not be improved as much as customers expected. Considering that the results, hotel guests expect the effect of opening restaurant at hotel for variety products and service. So, Hotel management should understand the changing attitude of customer' needs and expectation.

  • PDF

A Study of the Effectiveness of Anti-smoking Advertising : Based upon Interation of Involvement and Knowledge (금연광고 효과에 관한 연구 -관여도와 지식의 상호관련성을 중심으로-)

  • Lee, Chong-Min;Lee, Soo-Hyun
    • Management & Information Systems Review
    • /
    • 제26권
    • /
    • pp.61-90
    • /
    • 2008
  • The purpose of this paper is to investigate the effects of anti-smoking advertising on attitude toward anti-smoking and behavioral intention to quit smoking in terms of audience's involvement with anti-smoking and knowledge on smoking. For this, a total of 10 hypothesis were established and statistically tested. According to the results, all but hypothesis 1-1(attitude toward anti-smoking is more favorable in the high involvement condition than in the low involvement condition) were unfortunately rejected. These results can be justified by theoretical explanations such as Hierarchy Effects Model or Elaboration Likelihood Model. In addition, some methodological reasons were provided as well.

  • PDF

Analysis of the Common Safety Performance Management Method for the Application to the Korea Railway (국제 공통의 안전성능관리방법 국내 적용성 검토)

  • Park, Chan-Woo;Wang, Jong-Bae;Kwak, Sang-Log;Choi, Don-Bum;Kim, Min-Su
    • Proceedings of the KSR Conference
    • /
    • 한국철도학회 2009년도 춘계학술대회 논문집
    • /
    • pp.795-800
    • /
    • 2009
  • Railway safety is one aspect of the transport service quality delivered to passengers, employees and third parties. To improve safety by a cultural shift from a deterministic to a risk based approach, European Railway Agency (ERA) introduces common and transparent methods to monitor safety performance and set targets and establishes safety management systems. The objective of this study is to review the common safety performance management method of the ERA(European Railway Agency) for it's application to the Korea railway. For this end, the risk assessment models were developed based on the accident scenarios and domestic railway accidents had been investigated and quantitative and qualitative analyses was performed using the developed information system.

  • PDF

A Study of Authentication Algorithm in Electronic Commerce (전자상거래에서의 인증 알고리즘에 관한 연구)

  • Kim Young-Sun
    • Management & Information Systems Review
    • /
    • 제6권
    • /
    • pp.1-19
    • /
    • 2001
  • Partial transactions which use computer networks are formed in the cyberspace due to rapid progress of communication and computer technology. Electronic business transactions have security problems according to the special quality of opening networks, while it can be approached easily by anyone without being tied to time and places through Internets. To revitalize the electronic business transactions, security technology which can establish its security and trust is the prior task and both safe information communication and better information security service offer are essential factors. The method to exchange information through Internets must be made after confirming one another's exact connection in the mutual identity certification to prevent a lot of threat which can occur in the use of password techniques. To satisfy these electronic business transactions, we intend to increase understanding of authentication algorithm provided with authentication function of messages and users as well to plan safety and trust of business information and contents in the electronic business transactions.

  • PDF

Evolution of Wireless Technologies: Exploring the Technology Trajectory in Competitive Wireless Industry (무선통신기술의 진화: 무선통신산업 경쟁하의 기술 경로 탐색)

  • Kim, Hak-J.
    • Information Systems Review
    • /
    • 제13권2호
    • /
    • pp.43-54
    • /
    • 2011
  • The paper presents the technology trajectory of competitive wireless technologies in wireless industry. We attempt to trace the trajectory of wireless technologies with historical data, and then analyze its pattern. As a preliminary result, we find that there exists network effect and substitution effect in the trajectory. Our result can provide insight to wireless service providers where best to focus its efforts for maximizing overall gain in their networks as well as when to establish the transition strategy towards the next generation wireless network technologies.

A Study on the Risk Management in International Transaction of Digital Goods (디지털물(物) 국제법래(國際去來)의 리스크관리방안(管理方案)에 관한 연구(硏究))

  • Ahn, Byung-Soo
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • 제29권
    • /
    • pp.143-172
    • /
    • 2006
  • This study focuses on the risk management of "Digital Goods" appeared with the progress of information technology(IT) in international transaction. As a result of that digital goods have a lot of uncertainty between the general goods or service which have been deal with object of international transaction broadly because digital goods hold uniqueness. In this study, the author give a definition of "Digital Goods" and make an examination of uniqueness of that in international transaction. Next, six risks are defined base on risk theory and risk analysis matrix applying risk mapping model is made. Conclusionally, risk transfer as insurance is adequate to manage business risk, security risk, credit risk and legal risk. Meanwhile, risk avoidance is adequate to manage reputation risk and market risk. But, this study have following three limits. Firstly, concerning definition of the risk, real case is not applied owing to lack of transaction data. Secondly, measuring of the risk is not based on absolute data but relative data. Lastly, suggesting way of risk management is not concrete and practical to international trader of digital goods.

  • PDF

An Exploratory Study on the Relationship between Firm Capabilities, Competitive Strategies and Competitive Advantage of Mobile Telecommunication Services (이동통신서비스의 기업능력, 경쟁전략 및 경쟁우위의 영향관계에 관한 탐색적 연구)

  • Kim Moon-Koo;Park Jong-Hyun;Park Myeong-Cheol
    • Korean Management Science Review
    • /
    • 제21권2호
    • /
    • pp.235-252
    • /
    • 2004
  • Recently domestic mobile carriers have been engaged in heated battles for survival as the market is now rapidly approaching its maturity phase. and the launch of 3G service combined with the introduction of mobile number portability is dramatically reshaping the market landscape. The mobile carriers may have to create and maintain their competitive advantage based on their core capabilities and differentiated strategies. which will lead continuous survival and profits of the firm. This paper investigated competitiveness factors among mobile carriers. and analyzed the relationships of firm capabilities. competitive strategies and competitive advantage. We found that core capabilities and competitive strategies affecting competitive advantage are different from each carrier. Finally. we discussed strategic implications for carriers to increase their competitiveness.

Traffic carring capacity of the ISDN switching system (ISDN 교환기의 트래픽 용량 분석)

  • 이강원
    • Korean Management Science Review
    • /
    • 제10권1호
    • /
    • pp.107-125
    • /
    • 1993
  • Modern telecommunication switching systems are SPC(Stored Program Control) machines handling voice, data and other kinds of traffic, in an environment which tends to be fully digital switching and transmission. The throughput of such systems is determined by the real time capacity of its centralized or distributed control processors and by the traffic capacity of the switching network. Designers must verify the traffic and call processing capacity of the switching system and check its performance under traffic load before it is put into service. Verification of traffic and call processing capacity of switching systems is one of the problems treated by teletraffic studies ; teletraffic studies are based on stochastic process, queueing theory, simulations and other quantitative methods of decision making. This study suggests the general methodology to evaluate the throughput and performance of the ISDN switching system. TDX-10 ISDN switching system are employed to give illustrative examples of the methodologies discussed in this study.

  • PDF

The Effect of the Strategical Factors Towards the Assimilation of the Web-Technology (웹기술의 흡수에 전략적 요인이 미치는 영향)

  • Son Dal-Ho
    • Korean Management Science Review
    • /
    • 제21권2호
    • /
    • pp.27-42
    • /
    • 2004
  • Assimilation is defined as the extent to which the use of a technology diffuses across organizational work processes and becomes routinized in the activities associated with those processes. Assimilation is an important construct in the casual chain of influence from the organizational adoption of an information technology to the evidence of its impacts on business performance. Given a wide range of experiences with the effective assimilation of Web technologies. there is a need to discover how firms can institutionally encourage the managerial activities that will result in greater levels of technology assimilation. This study analyzes or shows which organizational and strategical factors like management belief. management participation. strategic investment rationale and coordination mechanism have impact on the assimilation of web technologies. Moreover. this research is tried under the different types of firms. manufacturing and service firms. The result shows that the management belief among the determinants had a significant effect on the assimilation of web technology. However. the result would be generalized with the inclusion of the psychological factors to the current model.

Determining the Optimal Buffer Sizes in Poisson Driven 3-node Tandem Queues using (Max, +)-algebra ((Max, +)-대수를 이용한 3-노드 유한 버퍼 일렬대기행렬 망에서 최적 버퍼 크기 결정)

  • Seo, Dong-Won;Hwang, Seung-June
    • Korean Management Science Review
    • /
    • 제24권1호
    • /
    • pp.25-34
    • /
    • 2007
  • In this study, we consider stationary waiting times in finite-buffer 3-node single-server queues in series with a Poisson arrival process and with either constant or non-overlapping service times. We assume that each node has a finite buffer except for the first node. The explicit expressions of waiting times in all areas of the stochastic system were driven as functions of finite buffer capacities. These explicit forms show that a system sojourn time does not depend on the finite buffer sizes, and also allow one to compute and compare characteristics of stationary waiting times at all areas under two blocking rules communication and manufacturing blocking. The goal of this study is to apply these results to an optimization problem which determines the smallest buffer capacities satisfying predetermined probabilistic constraints on stationary waiting times at all nodes. Numerical examples are also provided.