• Title/Summary/Keyword: Transaction needs

Search Result 165, Processing Time 0.029 seconds

The Relationship among Justice Recognition, Brand Asset Value, Trust, Relation Commitment and Long-Term Orientation (B2B 거래에서 공정성 인식, 브랜드자산 가치, 신뢰, 관계몰입과 장기지향성의 관계)

  • Yim, Duk-Soon
    • Journal of Distribution Science
    • /
    • v.15 no.1
    • /
    • pp.95-104
    • /
    • 2017
  • Purpose - This study focuses on long-term orientation that can lead long-term partnership. A long-term orientation needs a trust and relation commitment between company. So in this study, the researcher conducts a dependent variable as a justice recognition and brand asset value to research model to find out casual relationship among quoted factors. Research design, data, and methodology - The focus of this study was employees who work in a liquor distribution company to figure out factors that effect on long-term relationship in b2b transaction. The development of the research model is based on the literature of the preceding research analysis of justice recognition, brand asset value, trust, relation commitment and long-term orientation. This study have constructs that defined operationally by previous studies, research model design that to figuring casual relationships among the quoted factors. From 2016 Sep. 1st to Oct. 30th, a questionnaire survey was conducted targeting employees who work in liquor distribution company. 176 survey data were used for empirical analysis to prove the research hypotheses. Results - The main results of this study's empirical methodology were as follows. First, procedural justice and interactive justice has a positive significant effect on trust and relation commitment. Also brand image, brand awareness and perceived quality has a positive significant effect on trust and relation commitment. Second, trust and relation commitment has a positive significant effect on long-term orientation. Every hypothesis adopted as the researcher designed for empirical study. Conclusions - Based on empirical results, this study confirmed that trust and relation commitment has empirical relationship with long-term orientation. Based on the analysis, the researcher provided managerial implication by setting 2 way path for making long-term orientation with business company. First path is procedural justice to relation commitment. It contains that procedural justice recognised while business transaction execution, consideration intension and relation development will happen in b2b. Second path is perceived quality to trust. It contains that the perceived quality recognised while business transaction execution, trust will increase rapidly. So when a business company wants to make a partnership, they have to consider procedural justice and perceived quality to make a long-term relationship.

A Study on the Introduction of Electronic Commerce for Purchasing Section in Hospitals - Focused on the Understanding of Purchasing Managers - (병원구매업무에 있어서의 전자상거래 도입에 관한 연구 - 구매부서 관리자의 인식도를 중심으로 -)

  • Hwang, Eun-Bum;Nam, Sang-Yo;Ha, Ho-Uk;Lee, Chang-Eun
    • Korea Journal of Hospital Management
    • /
    • v.6 no.3
    • /
    • pp.69-89
    • /
    • 2001
  • This study is focused that the electronic commerce(EC) on the purchasing section may improve the efficiency and transparency of the hospitals management. After reviewing the purchasing activity of hospitals, I study the introduction, expected effects, and problems of EC. So, I am going to provide basic information for activating EC. The samples are managers of 170 hospitals, which are located on Seoul. As a result of collection this survey, I analyze 79 hospitals. For data analysis, I use $X^2$-test and ANOVA for purchasing management and the relevance of EC according to the level of care. The results of this study are 1. The problems on the management of purchasing section are: firstly, they don't have sufficient time to study market. Secondly, it is difficult to find competitive suppliers. And, lastly, they cannot gather a lot of information about the price of products. 2. There are many answers of the needs on the introduction of B2B. However, some hospitals think they don't need it. But, the most answers are that the EC will be settled within 4 years. So, we can realize that these hospitals are getting interested on the EC. On the other hand, I find that they prefer outside EC companies for the introduction of EC. 3. On the expected effects on EC, first is the effectiveness of the market survey. The next is to collect information of adequate price of products owing to clear transaction, find easier new suppliers and gather useful data. 4. On the external problems of the introduction of EC, there is low credibility related to the security and the weakness of suppliers' information system. Especially, on the Real Transaction Price Payment system, the bigger bed size, the higher understanding on these problems. On the internal problems of the introduction of EC, first is the burden of the introduction of EC and operating cost. Especially, on the burden of the disclosure of revenue source, the smaller bed size, the higher understanding on this problem So, this is a point which deserves my attention statistically. However, this shows relatively little understanding about incomplete the standard of product category and the weak information system of hospital. Through this study, I am going to suggest 3 points for the activation of the introduction of EC on hospitals. 1. The reform of the Real Transaction Price Payment System on medical supplies and materials for medical treatment 2. The establishment of the standard of product category 3. The promotion of information system based on network.

  • PDF

Effect of Relational Structure with Multiple Vendors on IT Outsourcing Performance: Transaction Cost Theory Perspective (복수 공급업체와의 관계구조가 정보기술 아웃소싱 성과에 미치는 영향: 거래비용 이론 관점)

  • Koo, Yunmo;Lee, Jae-Nam;Son, Insoo
    • Information Systems Review
    • /
    • v.18 no.1
    • /
    • pp.177-197
    • /
    • 2016
  • Information technology (IT) outsourcing is considered an effective strategy to manage and maintain organizational technologies in a rapidly changing business environment. In particular, to meet diverse market needs, many organizations that outsource their IT functions practice a multi-vendor approach as their main outsourcing strategy. Although a few studies have been conducted about the multi-vendor approach, most previous works primarily emphasized conceptual arguments and normative prescriptions. In addition, scant attention has been directed toward the relational structure between the client and multiple vendors in the multi-vendor approach and its implications for outsourcing success. This study proposes a model from the transaction cost perspective by conceptualizing two dominant relational structures of the multi-vendor approach, namely, single-vendor dominant model and the multi-vendor dominant model, and hypothesizing their relationships with two outsourcing outcomes, project success and user satisfaction. The proposed model is examined using the data collected from 246 companies that have implemented multi-vendor outsourcing. As expected, results indicate that the single-vendor dominant model has a more significant impact on project success, whereas the multi-vendor dominant model has a more significant impact on user satisfaction. The study concludes with the theoretical implications and directions for future research.

A Sequential Pattern Analysis for Dynamic Discovery of Customers' Preference (고객의 동적 선호 탐색을 위한 순차패턴 분석: (주)더페이스샵 사례)

  • Song, Ki-Ryong;Noh, Soeng-Ho;Lee, Jae-Kwang;Choi, Il-Young;Kim, Jae-Kyeong
    • Information Systems Review
    • /
    • v.10 no.2
    • /
    • pp.195-209
    • /
    • 2008
  • Customers' needs change every moment. Profitability of stores can't be increased anymore with an existing standardized chain store management. Accordingly, a personalized store management tool needs through prediction of customers' preference. In this study, we propose a recommending procedure using dynamic customers' preference by analyzing the transaction database. We utilize self-organizing map algorithm and association rule mining which are applied to cluster the chain stores and explore purchase sequence of customers. We demonstrate that the proposed methodology makes an effect on recommendation of products in the market which is characterized by a fast fashion and a short product life cycle.

A Study on Risk Analysis and Relevant Measures for the Successful Performance in Overseas Construction Projects - Including Case Analysis on A Overseas Construction Project - (해외건설 프로젝트의 성공적 수행을 위한 위험요소 및 대처방안에 대한 연구 - 해외건설 사례분석을 포함하여 -)

  • Kim, Sang-Man
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.50
    • /
    • pp.215-250
    • /
    • 2011
  • Korean won overseas construction projects worth 71.6 billion US Dollars in 2010, which exceeded that of 2009 by 45.6%. An overseas construction project is a transaction of large scale, long term project, many parties participating, deferred payment, and of high-technology. It contributes to foreign currency earning, and also leads the nation's export restructuring work towards high value-added one. There are various kinds of risks towards the relevant parties respectively, which are key elements in successfully performing the overseas construction project. There are completion risk, financing risk, operating risk, revenue risk etc, in an employer's place. A contractor may be confronted with payment risk, issuance risk of performance bond, financing risk, performance risk of sub-contractors, and exchange rate risk. In lenders place there are repayment risk, completion risk, and political risk in the host country. In order to mitigate risks, the parties shall take relevant measures or require relevant securities. A contractor needs to evaluate the credibility of an employer in respect of payment risk, and can also request export insurance cover by the Korea Trade Insurance Corporation(the former 'Korea Export Insurance Corporation"). An employer can require a contractor to provide performance bond in respect of completion risk, and employ a well-known first class bank as a mandated arranger to arrange financing with regard to completion risk. Lenders needs to evaluate the credibility of an employer and accomplish feasibility study of the project. Lenders can request insurance cover from export credit agency. Once the parties assess the respective risks and obtain relevant securities, the project will be successfully completed. The success of the project will be sure to bring the parties involved enormous profits and another opportunity to participate in overseas construction project afterwards.

  • PDF

The Design of Process-Engine for Distributed Workflow Management System based on Web (웹기반 분산워크플로우 관리시스템의 프로세스 엔진 설계)

  • Lee, Heon;Park, Kyoo-Seok
    • Journal of Korea Multimedia Society
    • /
    • v.4 no.5
    • /
    • pp.377-389
    • /
    • 2001
  • It has a tendency to build Workflow Systems based on the web with the spread of web environment. The important function in Workflow Systems are to automatize job flow according to the predefined regulations, procedures or conditions. Hence, there needs to consider excluding passive jobs, supporting GUI and a migratory information processing for information flow. Distributed Workflow System for workflow of a distributed service system should perform transfer control and Fault-Tolerance between tasks based on process logic, and real time processing. However, the existing mail systems being used are just for transmission and it doesn't fit to automatize job flow. To solve the matter, there needs a Distributed Workflow Engine to design workflow and automatize its control. In this paper, we design a web browser with graphic interface using web mail, a browser creating a script code for a procedural performance. Also, we design a Process-engine has a Preprocessor which tolerates process scheduler for task transaction or server node's faults on distributed environment. The proposed system enhances the reliability and usability of a system reduces the cost rather than a workflow system based on database, for they execute as proxy for a server's fault or suers' absence.

  • PDF

A Case Study for the Resolution of Cadastral Inconsistency

  • Kam Lae, Kim;Won Jun, Choi;Gun Hyuk, Lim
    • Proceedings of the Korean Society of Surveying, Geodesy, Photogrammetry, and Cartography Conference
    • /
    • 2004.11a
    • /
    • pp.557-563
    • /
    • 2004
  • Korean cadastral system keeps graphical maps made by the plane table method from 1910's. The fact is that the graphical maps grafted on paper cover about 95% of the whole land (MOGAHA, 1999). The needs are arising to transform the graphical cadastre to a digital one in compliance with modem technologies. Korean government has already digitise the old maps until last year. A nation-wide land information system, Parcel-based Land Information System, was established upon the digitised map database. However, the accuracy of the digitised coordinates hardly meet the citizens' needs because it cannot exceed that of the paper maps. The definite solution will be surveying all the parcels again and making new digital maps. However, commencing a project for resurveying 34 million parcels will require enormous amount of time and manpower. The strategy should be dividing the country into county-wise or grid-wise pieces and surveying one piece by one piece. Municipal governments of counties, cities or urban districts will be the propelling bodies of the project but the costs will hardly be affordable at a time. For the purpose of resolving the financial problem, each municipality can split its own project into smaller pieces by year base. There is accordingly a great possibility to create inconsistency over the divided project areas caused by different techniques applied, different equipments used and/or mismatches between the project borders. It provides some merits at the same time. The people in project completion areas will be satisfied with the enhanced accuracy and feel safe in land transaction and, in turn, soundly improves overall nation-wide economic situation. Therefore, the main issue of the thesis shows how to make the cadastral re-survey project scalable. Guidelines for how to perform the projects will be derived from a experienced case.

  • PDF

A Study on the Re-establishment of Commercial Arbitration's Role Based on the Difference between e-Trade and e-Commerce (전자무역과 전자상거래의 경계 확인 및 중재 역할의 재정립 방안)

  • Park, Moon-Suh
    • Journal of Arbitration Studies
    • /
    • v.20 no.1
    • /
    • pp.87-107
    • /
    • 2010
  • This paper reviews the distinctive characteristics between e-Trade and e-Commerce in view of commercial arbitration in Korea and explores several improvements for the role of commercial arbitration. As the volume of e-Trade and e-Commerce has expanded day by day, there will be more disputes between traders no matter where the commerce may occur. But despite increasing of the disputes relating to e-Commerce transaction, it seems that the role of commercial arbitration has been shrunk instead. Korea needs to improve the role of commercial arbitration in order to meet and lead the age of u-Trade Hub(u-TH) service and to adopt an offensive or active attitude when arbitration used. Moreover, it is suggested that the competence of arbitration should not only be intensified more precisely but also be redesigned more systematically. Korea should take advantage of arbitration resources actively such as arbitrators as human resource and experiences as knowledge assets and also prepare the policy for sharing those arbitration resources between arbitrators more effectively.

  • PDF

A Recovery Technique Using Client-based Logging in Client/Server Environment

  • Park, Yong-Mun;Lee, Chan-Seob;Kim, Dong-Hyuk;Park, Eui-In
    • Proceedings of the IEEK Conference
    • /
    • 2002.07a
    • /
    • pp.429-432
    • /
    • 2002
  • The existing recovery technique using the logging technique in the client/sewer database system only administers the log as a whole in a server. This contains the logging record transmission cost on the transaction that is executed in each client potentially and increases network traffic. In this paper, the logging technique for redo-only log is suggested, which removes the redundant before-image and supports the client-based logging to eliminate the transmission cost of the logging record. Also, in case of a client crash, redo recovery through a backward client analysis log is performed in a self-recovering way. In case of a server crash, the after-image of the pages which needs recovery through simultaneous backward analysis log is only transmitted and redo recovery is done through the received after-image and backward analysis log. Also, we select the comparing model to estimate the performance about the proposed recovery technique. And we analyzed the redo and recovery time about the change of the number of client and the rate of updating operation.

  • PDF

Meeting Real Challenges in Eliciting Security Attributes for Mobile Application Development

  • Yusop, Noorrezam;Kamalrudin, Massila;Yusof, Mokhtar Mohd;Sidek, Safiah
    • Journal of Internet Computing and Services
    • /
    • v.17 no.5
    • /
    • pp.25-32
    • /
    • 2016
  • There has been a rapid growth in the development of mobile application resulting from its wide usage for online transaction, data storage and exchange of information. However, an important issue that has been overlooked is the lack of emphasis on the security issues at the early stage of the development. In fact, security issues have been kept until the later stage of the implementation of mobile apps. Requirements engineers frequently ignore and incorrectly elicit security related requirements at the early stage of mobile application development. This scenario has led to the failure of developing secure and safe mobile application based on the needs of the users. As such, this paper intends to provide further understanding of the real challenges in extracting security attributes for mobile application faced by novice requirements engineers. For this purpose, two experiments on eliciting security attributes requirements of textual requirements scenario were conducted. The performance related to the correctness and time taken to elicit the security attributes were measured and recorded. It was found that the process of eliciting correct security attributes for mobile application requires effort, knowledge and skills. The findings indicate that an automated tool for correct elicitation security attributes requirement could help to overcome the challenges in eliciting security attributes requirements, especially among novice requirements engineers.