• Title/Summary/Keyword: View Evaluation

Search Result 1,718, Processing Time 0.028 seconds

A Study on Effects of Application of Nursing Process by Nursing Profess notes.(School of nursing) (간호기록지를 통해서 본 간호과정 적용효과에 관한 연구(간호전문대학을 중심으로))

  • 최상순;조희숙;백승남
    • Journal of Korean Academy of Nursing
    • /
    • v.11 no.2
    • /
    • pp.55-68
    • /
    • 1981
  • The prime object of the study is to evaluate how much all the students of the Nursing Schools throughout the nation are in comprehension toward the application of nursing process to clinical experience as means of systematic solution of nursing problems. An effort has been made to find out the actual state whether they are in practice of clinical experience in accordance with application of nursing process, over the period of four weeks managing from December 1st to 28th, 1980 and centering on 36 nursing schools, and meanwhile and evaluation, employing the assessment tool used by Bertuccietal, has been made on the nursing process notes recorded by 200 senions out of 21 nursing schools where application of nursing process to clinical experience being in practice. The assessment tool is composed of 5 different criteria in view of patient nursing and authors made an attempt to find out the result of clinical experience on application students in accordance with 5 different scoring criteria and further evaluating all the findings thereof. The findings were disposed of accordance with practice duration and criteria of the specific sudents subject to this finding as to verify the scoring difference in significance and of which the results are as follows: 1) as of now, in 21 (58.2%) out of 36 nursing Schools nursing process in being appliced in clinical experience. 2) Schools that started the application of nursing process to clinical experience amount to - for more than 4 yrs -6 (28.6%) - for 2 to 3 yrs-11s(52.4%) - for 1 yr -4 (19.0%) 3) As for the response upon application of nursing process. To clinical etperience, the largest voice (61.9%) heard was that it is rather difficult beyond the lecturing thereof, to practically apply it outs patients and the second voice (19.1%) turned out to be that it is hard to put in practice owing to uninformed nurses of the process serving in the clinical field. 4) The response. Of the processors assigned to instruction as to the most difficult problem in criteria of nursing process, the largest voice (38.2%) centered on the problem assessment while the second voice (17.7%) on the indirect nursing activity and the objective data respectively and considered to be the easiest was the indirect nursing activity (11.7%). 5) In order for a satisfactory. application of nursing process to clinical experience hence-forth, it has been pointed out that sufficient number of nurses should be supplemented in clinical field (44.1%) and at the same time supplementory education (35.3%) centered around professors be necessary. 6) Of the criteria that record result of nursing process, a significant difference in comprehension of subjective and objective data has been revealed according to the degree of the practice duration of application to clinical experience. For instance, while although poor it may seen, only 74.9% in subjective data and 71.1% in objective data represent the student group in practice for more than 4 years and only 56.3% in subjective data and 66.8% in objective data represent the student group in practice for 2 to 3 years but they still surpass in comprehension over the student group in practice for 1 year attaning only 19.6% in subjective data and 16.8% in objective data (P < 0.005). 7) As for problem assessment, the student group who started application of nursing process for 4 years stand for 37,7% the group for 2 to 3 years started for 25.3% and the group for 1 year started for 5.4%, revealing no significant difference according to duration (P < 0.5) and as poor as to indicate only 22.8% on an overage is in comprehension. 8) On direct and indirect nursing activity, the student group of for more than 4 years in appling nursing process (representing 49.5% in direct nursing activity, 21.4% in indirect nursing activity). Know more about it than the student group of for 2 to 3 years (representing 36.3% in direct nursing activity, 20.8% in indirect nursing activity) but revealed no significant difference. (P < 0.5) 9) The student group applying nursing process for more than 4 years subjective data (74.9%) comprehend were more than objective data (71.1%) but shown no significant difference (P < 0.5). 10) However, the student group applying nursing process for 2 to 3 years comprehend objective data (66.8%) well ever subjective data (55.5%) indicating that 40.9% in average is in comprehension, thereby revealing a significant difference (P < 0.005). 11) On the other hand, the student group applying nursing process to clinical experience for 1 year had revealed themselves as poorly as to comprehend only 11.7% are an average of it, revealing no significant difference (P < 0.5). In consequence of the fore going, I the conductor of the present study, hereby suggest the following points: 1) Application of nursing process to clinical experience be practiced in all the Nursing Schools all over the nation at the earliest possible date in order that scientific nursing be prevailed (as of now only 58.0%), 2) In teaching nursing process, it is desirable to teach specific method of applying to practical clinical situations. 3) In order to meet the end of satisfactory application of nursing process to clinical experience, sufgecient nursing man power be sysplemented in clinical field and at the save time supplementary education by professors is necessary. 4) Sinces the students whose application duration of nursing process to clinical experience is longer comprehend more about it, it is reguired that the schools not yet in practice of the application be promptlyurged to follow. 5) Of the criteria recording nursing process, since it is comparatively hard to comprehend“assessment”and“Direct and indirect nursing activity”, a concentrated instruction is desirable. 6) The students whose duration of application of nursing process to clinical experience falls short of 1 years be put in a concentrated guidance program on individual criterion.

  • PDF

CComparative evaluation of the methods of producing planar image results by using Q-Metrix method of SPECT/CT in Lung Perfusion Scan (Lung Perfusion scan에서 SPECT-CT의 Q-Metrix방법과 평면영상 결과 산출방법에 대한 비교평가)

  • Ha, Tae Hwan;Lim, Jung Jin;Do, Yong Ho;Cho, Sung Wook;Noh, Gyeong Woon
    • The Korean Journal of Nuclear Medicine Technology
    • /
    • v.22 no.1
    • /
    • pp.90-97
    • /
    • 2018
  • Purpose The lung segment ratio which is obtained through quantitative analyses of lung perfusion scan images is calculated to evaluate the lung function pre and post surgery. In this Study, the planar image production methods by using Q-Metrix (GE Healthcare, USA) program capable of not only quantitative analysis but also computation of the segment ratio after having performed SPECT/CT are comparatively evaluated. Materials and Methods Lung perfusion scan and SPECT/CT were performed on 50 lung cancer patients prior to surgery who visited our hospital from May 1, 2015 to September 13, 2016 by using Discovery 670(GE Healthcare, USA) equipment. AP(Anterior Posterior)method that uses planar image divided the frontal and rear images into three rectangular portions by means of ROI tool while PO(Posterior Oblique)method computed the segment ratio by dividing the right lobe into three parts and the left lobe into two parts on the oblique image. Segment ratio was computed by setting the ROI and VOI in the CT image by using Q-Metrix program and statistically analysis was performed with SPSS Ver. 23. Results Regarding the correlation concordance rate of Q-Metrix and AP methods, RUL(Right upper lobe), RML(Right middle lobe) and RLL(Right lower lobe) were 0.224, 0.035 and 0.447. LUL(Left upper lobe) and LLL(Left lower lobe) were found to be 0.643 and 0.456, respectively. In the PO method, the right lobe were 0.663, 0.623 and 0.702, respectively, while the left lobe were 0.754 and 0.823. When comparison was made by using the Paired sample T-test, Right lobe were $11.6{\pm}4.5$, $26.9{\pm}6.2$ and $17.8{\pm}4.2$, respectively in the AP method. Left lobe were $28.4{\pm}4.8$ and $15.4{\pm}5.6$. The right lobe of PO had values of $17.4{\pm}5.0$, $10.5{\pm}3.6$ and $27.3{\pm}6.0$, while the left lobe had values of $21.6{\pm}4.8$ and $23.1{\pm}6.6$, thereby having statistically significant difference in comparison to the Q-Metrix method for each of the lobes (P<0.05). However, there was no statistically significant difference in Right middle lobe (P>0.05). Conclusion The AP method showed low concordance rate in correlation with the Q-Metrix method. However, PO method displayed high concordance rate overall. although AP method had significant differences in all lobes, there was no significant difference in Right middle lobe of PO method. Therefore, at the time of production of lung perfusion scan results, utilization of Q-Metrix method of SPECT/CT would be useful in computation of accurate resultant values. Moreover, it is deemed possible to expect obtain more practical sectional computation result values by using PO method at the time of planar image acquisition.

STUDIES ON THE UTILIZATION OF ANTARCTIC KRILL 2. Processing of Paste Food, Protein Concentrate, Seasoned Dried Product, Powdered Seasoning, Meat Ball, and Snack (남대양산 크릴의 이용에 관한 연구)

  • PARK Yeung-Ho;LEE Eung-Ho;LEE Kang-Ho;PYEUN Jae-Hyeung;KIM Se-Kweun;KIM Dong-Soo
    • Korean Journal of Fisheries and Aquatic Sciences
    • /
    • v.13 no.2
    • /
    • pp.65-80
    • /
    • 1980
  • Processing conditions of the krill products such as paste food, krill protein concentrate, seasoned dried krill, powdered seasoning, meat ball, and snack have been examined and the quality was evaluated chemically and organoleptically. In the processing of paste food, krill juice was yielded $71\%$ and krill scrap $29\%$. The yields of paste and broth from the krill juice showed $53\%$ and $43\%$, respectively. In amino acid composition of the krill paste, proline, glutamic acid, aspartic acid, lysine, and leucine were abundant, while histidine, methionine, tyrosine, serine and threonine were poor. The optimum condition for solvent extraction in the processing of krill protein concentrate was the 5 times repetitive extraction using isopropyl alcohol at $80^{\circ}C$ for 5 mins. The yield of krill protein concentrate when used fresh frozen materials was $10.2\%$ in isopropyl alcohol solvent and $8.8\% in ethyl alcohol, and when used preboiled frozen materials, the yield was $13.0\%$ in isopropyl alcohol and $11.8\%$ in ethyl alcohol. Amino acid composition of krill protein concentrate showed a resemblance to that of fresh frozen krill meat. In quality comparison of the seasoned dried krill, hot air dried krill was excellent as raw materials and sun dried krill was slightly inferior to hot air dried krill, but preboiled frozen krill showed the poorest quality. The result of quality evaluation for seasoning made by combination of dried powdered krill, parched powdered sesame, salt, powdered beef extract, monosodium glutamate, powdered red pepper and ground pepper showed that the hot air dried krill was good in color and sundried krill was favorable in flavor. When krill meat ball was prepared using wheat flour, monosodium glutamate and salt as side materials, the quality of the products added up to $52\%$ of krill meat was good and the difference in quality upon the results of the organoleptic test for raw materials was not recognizable between fresh frozen and preboiled frozen krill. In the experiment for determining the proper amount of materials such as dried Powdered krill, $\alpha-starch$, sweet potato starch, sugar, salt, monosodium glutamate, glycine, potassium tartarate, ammonium bicarbonate, and sodium bicarbonate in processing krill snack, sample B(containing $7.7\%$ of dried powdered krill) and sampleC (containing $10.8\%$ of dried powdered krill) showed the most palatable taste from the view point of organoleptic test. Sweet potato starch in testing side materials was good in the comparison of suitability for processing krill snack. Corn starch and kudzu starch were slightly inferior to sweet potato starch, while wheat flour was not proper for processing the snack. In the experiment on frying method, oil frying showed better effect than salt frying and the suitable range of frying temperature was $210-215^{\circ}C$.

  • PDF

Chinese Communist Party's Management of Records & Archives during the Chinese Revolution Period (혁명시기 중국공산당의 문서당안관리)

  • Lee, Won-Kyu
    • The Korean Journal of Archival Studies
    • /
    • no.22
    • /
    • pp.157-199
    • /
    • 2009
  • The organization for managing records and archives did not emerge together with the founding of the Chinese Communist Party. Such management became active with the establishment of the Department of Documents (文書科) and its affiliated offices overseeing reading and safekeeping of official papers, after the formation of the Central Secretariat(中央秘書處) in 1926. Improving the work of the Secretariat's organization became the focus of critical discussions in the early 1930s. The main criticism was that the Secretariat had failed to be cognizant of its political role and degenerated into a mere "functional organization." The solution to this was the "politicization of the Secretariat's work." Moreover, influenced by the "Rectification Movement" in the 1940s, the party emphasized the responsibility of the Resources Department (材料科) that extended beyond managing documents to collecting, organizing and providing various kinds of important information data. In the mean time, maintaining security with regard to composing documents continued to be emphasized through such methods as using different names for figures and organizations or employing special inks for document production. In addition, communications between the central political organs and regional offices were emphasized through regular reports on work activities and situations of the local areas. The General Secretary not only composed the drafts of the major official documents but also handled the reading and examination of all documents, and thus played a central role in record processing. The records, called archives after undergoing document processing, were placed in safekeeping. This function was handled by the "Document Safekeeping Office(文件保管處)" of the Central Secretariat's Department of Documents. Although the Document Safekeeping Office, also called the "Central Repository(中央文庫)", could no longer accept, beginning in the early 1930s, additional archive transfers, the Resources Department continued to strengthen throughout the 1940s its role of safekeeping and providing documents and publication materials. In particular, collections of materials for research and study were carried out, and with the recovery of regions which had been under the Japanese rule, massive amounts of archive and document materials were collected. After being stipulated by rules in 1931, the archive classification and cataloguing methods became actively systematized, especially in the 1940s. Basically, "subject" classification methods and fundamental cataloguing techniques were adopted. The principle of assuming "importance" and "confidentiality" as the criteria of management emerged from a relatively early period, but the concept or process of evaluation that differentiated preservation and discarding of documents was not clear. While implementing a system of secure management and restricted access for confidential information, the critical view on providing use of archive materials was very strong, as can be seen in the slogan, "the unification of preservation and use." Even during the revolutionary movement and wars, the Chinese Communist Party continued their efforts to strengthen management and preservation of records & archives. The results were not always desirable nor were there any reasons for such experiences to lead to stable development. The historical conditions in which the Chinese Communist Party found itself probably made it inevitable. The most pronounced characteristics of this process can be found in the fact that they not only pursued efficiency of records & archives management at the functional level but, while strengthening their self-awareness of the political significance impacting the Chinese Communist Party's revolution movement, they also paid attention to the value possessed by archive materials as actual evidence for revolutionary policy research and as historical evidence of the Chinese Communist Party.

Evaluation of the Usefulness of Exactrac in Image-guided Radiation Therapy for Head and Neck Cancer (두경부암의 영상유도방사선치료에서 ExacTrac의 유용성 평가)

  • Baek, Min Gyu;Kim, Min Woo;Ha, Se Min;Chae, Jong Pyo;Jo, Guang Sub;Lee, Sang Bong
    • The Journal of Korean Society for Radiation Therapy
    • /
    • v.32
    • /
    • pp.7-15
    • /
    • 2020
  • Purpose: In modern radiotherapy technology, several methods of image guided radiation therapy (IGRT) are used to deliver accurate doses to tumor target locations and normal organs, including CBCT (Cone Beam Computed Tomography) and other devices, ExacTrac System, other than CBCT equipped with linear accelerators. In previous studies comparing the two systems, positional errors were analysed rearwards using Offline-view or evaluated only with a Yaw rotation with the X, Y, and Z axes. In this study, when using CBCT and ExacTrac to perform 6 Degree of the Freedom(DoF) Online IGRT in a treatment center with two equipment, the difference between the set-up calibration values seen in each system, the time taken for patient set-up, and the radiation usefulness of the imaging device is evaluated. Materials and Methods: In order to evaluate the difference between mobile calibrations and exposure radiation dose, the glass dosimetry and Rando Phantom were used for 11 cancer patients with head circumference from March to October 2017 in order to assess the difference between mobile calibrations and the time taken from Set-up to shortly before IGRT. CBCT and ExacTrac System were used for IGRT of all patients. An average of 10 CBCT and ExacTrac images were obtained per patient during the total treatment period, and the difference in 6D Online Automation values between the two systems was calculated within the ROI setting. In this case, the area of interest designation in the image obtained from CBCT was fixed to the same anatomical structure as the image obtained through ExacTrac. The difference in positional values for the six axes (SI, AP, LR; Rotation group: Pitch, Roll, Rtn) between the two systems, the total time taken from patient set-up to just before IGRT, and exposure dose were measured and compared respectively with the RandoPhantom. Results: the set-up error in the phantom and patient was less than 1mm in the translation group and less than 1.5° in the rotation group, and the RMS values of all axes except the Rtn value were less than 1mm and 1°. The time taken to correct the set-up error in each system was an average of 256±47.6sec for IGRT using CBCT and 84±3.5sec for ExacTrac, respectively. Radiation exposure dose by IGRT per treatment was measured at 37 times higher than ExacTrac in CBCT and ExacTrac at 2.468mGy and 0.066mGy at Oral Mucosa among the 7 measurement locations in the head and neck area. Conclusion: Through 6D online automatic positioning between the CBCT and ExacTrac systems, the set-up error was found to be less than 1mm, 1.02°, including the patient's movement (random error), as well as the systematic error of the two systems. This error range is considered to be reasonable when considering that the PTV Margin is 3mm during the head and neck IMRT treatment in the present study. However, considering the changes in target and risk organs due to changes in patient weight during the treatment period, it is considered to be appropriately used in combination with CBCT.

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.

A Study on Intelligent Value Chain Network System based on Firms' Information (기업정보 기반 지능형 밸류체인 네트워크 시스템에 관한 연구)

  • Sung, Tae-Eung;Kim, Kang-Hoe;Moon, Young-Su;Lee, Ho-Shin
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.3
    • /
    • pp.67-88
    • /
    • 2018
  • Until recently, as we recognize the significance of sustainable growth and competitiveness of small-and-medium sized enterprises (SMEs), governmental support for tangible resources such as R&D, manpower, funds, etc. has been mainly provided. However, it is also true that the inefficiency of support systems such as underestimated or redundant support has been raised because there exist conflicting policies in terms of appropriateness, effectiveness and efficiency of business support. From the perspective of the government or a company, we believe that due to limited resources of SMEs technology development and capacity enhancement through collaboration with external sources is the basis for creating competitive advantage for companies, and also emphasize value creation activities for it. This is why value chain network analysis is necessary in order to analyze inter-company deal relationships from a series of value chains and visualize results through establishing knowledge ecosystems at the corporate level. There exist Technology Opportunity Discovery (TOD) system that provides information on relevant products or technology status of companies with patents through retrievals over patent, product, or company name, CRETOP and KISLINE which both allow to view company (financial) information and credit information, but there exists no online system that provides a list of similar (competitive) companies based on the analysis of value chain network or information on potential clients or demanders that can have business deals in future. Therefore, we focus on the "Value Chain Network System (VCNS)", a support partner for planning the corporate business strategy developed and managed by KISTI, and investigate the types of embedded network-based analysis modules, databases (D/Bs) to support them, and how to utilize the system efficiently. Further we explore the function of network visualization in intelligent value chain analysis system which becomes the core information to understand industrial structure ystem and to develop a company's new product development. In order for a company to have the competitive superiority over other companies, it is necessary to identify who are the competitors with patents or products currently being produced, and searching for similar companies or competitors by each type of industry is the key to securing competitiveness in the commercialization of the target company. In addition, transaction information, which becomes business activity between companies, plays an important role in providing information regarding potential customers when both parties enter similar fields together. Identifying a competitor at the enterprise or industry level by using a network map based on such inter-company sales information can be implemented as a core module of value chain analysis. The Value Chain Network System (VCNS) combines the concepts of value chain and industrial structure analysis with corporate information simply collected to date, so that it can grasp not only the market competition situation of individual companies but also the value chain relationship of a specific industry. Especially, it can be useful as an information analysis tool at the corporate level such as identification of industry structure, identification of competitor trends, analysis of competitors, locating suppliers (sellers) and demanders (buyers), industry trends by item, finding promising items, finding new entrants, finding core companies and items by value chain, and recognizing the patents with corresponding companies, etc. In addition, based on the objectivity and reliability of the analysis results from transaction deals information and financial data, it is expected that value chain network system will be utilized for various purposes such as information support for business evaluation, R&D decision support and mid-term or short-term demand forecasting, in particular to more than 15,000 member companies in Korea, employees in R&D service sectors government-funded research institutes and public organizations. In order to strengthen business competitiveness of companies, technology, patent and market information have been provided so far mainly by government agencies and private research-and-development service companies. This service has been presented in frames of patent analysis (mainly for rating, quantitative analysis) or market analysis (for market prediction and demand forecasting based on market reports). However, there was a limitation to solving the lack of information, which is one of the difficulties that firms in Korea often face in the stage of commercialization. In particular, it is much more difficult to obtain information about competitors and potential candidates. In this study, the real-time value chain analysis and visualization service module based on the proposed network map and the data in hands is compared with the expected market share, estimated sales volume, contact information (which implies potential suppliers for raw material / parts, and potential demanders for complete products / modules). In future research, we intend to carry out the in-depth research for further investigating the indices of competitive factors through participation of research subjects and newly developing competitive indices for competitors or substitute items, and to additively promoting with data mining techniques and algorithms for improving the performance of VCNS.

The Effect of Mutual Trust on Relational Performance in Supplier-Buyer Relationships for Business Services Transactions (재상업복무교역중적매매관계중상호신임대관계적효적영향(在商业服务交易中的买卖关系中相互信任对关系绩效的影响))

  • Noh, Jeon-Pyo
    • Journal of Global Scholars of Marketing Science
    • /
    • v.19 no.4
    • /
    • pp.32-43
    • /
    • 2009
  • Trust has been studied extensively in psychology, economics, and sociology, and its importance has been emphasized not only in marketing, but also in business disciplines in general. Unlike past relationships between suppliers and buyers, which take considerable advantage of private networks and may involve unethical business practices, partnerships between suppliers and buyers are at the core of success for industrial marketing amid intense global competition in the 21st century. A high level of mutual cooperation occurs through an exchange relationship based on trust, which brings long-term benefits, competitive enhancements, and transaction cost reductions, among other benefits, for both buyers and suppliers. In spite of the important role of trust, existing studies in buy-supply situations overlook the role of trust and do not systematically analyze the effect of trust on relational performance. Consequently, an in-depth study that determines the relation of trust to the relational performance between buyers and suppliers of business services is absolutely needed. Business services in this study, which include those supporting the manufacturing industry, are drawing attention as the economic growth engine for the next generation. The Korean government has selected business services as a strategic area for the development of manufacturing sectors. Since the demands for opening business services markets are becoming fiercer, the competitiveness of the business service industry must be promoted now more than ever. The purpose of this study is to investigate the effect of the mutual trust between buyers and suppliers on relational performance. Specifically, this study proposed a theoretical model of trust-relational performance in the transactions of business services and empirically tested the hypotheses delineated from the framework. The study suggests strategic implications based on research findings. Empirical data were collected via multiple methods, including via telephone, mail, and in-person interviews. Sample companies were knowledge-based companies supplying and purchasing business services in Korea. The present study collected data on a dyadic basis. Each pair of sample companies includes a buying company and its corresponding supplying company. Mutual trust was traced for each pair of companies. This study proposes a model of trust-relational performance of buying-supplying for business services. The model consists of trust and its antecedents and consequences. The trust of buyers is classified into trust toward the supplying company and trust toward salespersons. Viewing trust both at the individual level and the organizational level is based on the research of Doney and Cannon (1997). Normally, buyers are the subject of trust, but this study supposes that suppliers are the subjects. Hence, it uniquely focused on the bilateral perspective of perceived risk. In other words, suppliers, like buyers, are the subject of trust since transactions are normally bilateral. From this point of view, suppliers' trust in buyers is as important as buyers' trust in suppliers. The suppliers' trust is influenced by the extent to which it trusts the buying companies and the buyers. This classification of trust using an individual level and an organization level is based on the suggestion of Doney and Cannon (1997). Trust affects the process of supplier selection, which works in a bilateral manner. Suppliers are actively involved in the supplier selection process, working very closely with buyers. In addition, the process is affected by the extent to which each party trusts its partners. The selection process consists of certain steps: recognition, information search, supplier selection, and performance evaluation. As a result of the process, both buyers and suppliers evaluate the performance and take corrective actions on the basis of such outcomes as tangible, intangible, and/or side effects. The measurement of trust used for the present study was developed on the basis of the studies of Mayer, Davis and Schoorman (1995) and Mayer and Davis (1999). Based on their recommendations, the three dimensions of trust used for the study include ability, benevolence, and integrity. The original questions were adjusted to the context of the transactions of business services. For example, a question such as "He/she has professional capabilities" has been changed to "The salesperson showed professional capabilities while we talked about our products." The measurement used for this study differs from those used in previous studies (Rotter 1967; Sullivan and Peterson 1982; Dwyer and Oh 1987). The measurements of the antecedents and consequences of trust used for this study were developed on the basis of Doney and Cannon (1997). The original questions were adjusted to the context of transactions in business services. In particular, questions were developed for both buyers and suppliers to address the following factors: reputation (integrity, customer care, good-will), market standing (company size, market share, positioning in the industry), willingness to customize (product, process, delivery), information sharing (proprietary information, private information), willingness to maintain relationships, perceived professionalism, authority empowerment, buyer-seller similarity, and contact frequency. As a consequential variable of trust, relational performance was measured. Relational performance is classified into tangible effects, intangible effects, and side effects. Tangible effects include financial performance; intangible effects include improvements in relations, network developing, and internal employee satisfaction; side effects include those not included either in the tangible or intangible effects. Three hundred fifty pairs of companies were contacted, and one hundred five pairs of companies responded. After deleting five company pairs because of incomplete responses, one hundred five pairs of companies were used for data analysis. The response ratio of the companies used for data analysis is 30% (105/350), which is above the average response ratio in industrial marketing research. As for the characteristics of the respondent companies, the majority of the companies operate service businesses for both buyers (85.4%) and suppliers (81.8%). The majority of buyers (76%) deal with consumer goods, while the majority of suppliers (70%) deal with industrial goods. This may imply that buyers process the incoming material, parts, and components to produce the finished consumer goods. As indicated by their report of the length of acquaintance with their partners, suppliers appear to have longer business relationships than do buyers. Hypothesis 1 tested the effects of buyer-supplier characteristics on trust. The salesperson's professionalism (t=2.070, p<0.05) and authority empowerment (t=2.328, p<0.05) positively affected buyers' trust toward suppliers. On the other hand, authority empowerment (t=2.192, p<0.05) positively affected supplier trust toward buyers. For both buyers and suppliers, the degree of authority empowerment plays a crucial role in the maintenance of their trust in each other. Hypothesis 2 tested the effects of buyerseller relational characteristics on trust. Buyers tend to trust suppliers, as suppliers make every effort to contact buyers (t=2.212, p<0.05). This tendency has also been shown to be much stronger for suppliers (t=2.591, p<0.01). On the other hand suppliers trust buyers because suppliers perceive buyers as being similar to themselves (t=2.702, p<0.01). This finding confirmed the results of Crosby, Evans, and Cowles (1990), which reported that suppliers and buyers build relationships through regular meetings, either for business or personal matters. Hypothesis 3 tested the effects of trust on perceived risk. It has been found that for both suppliers and buyers the lower is the trust, the higher is the perceived risk (t=-6.621, p<0.01 for buyers; t=-2.437, p<0.05). Interestingly, this tendency has been shown to be much stronger for buyers than for suppliers. One possible explanation for this higher level of perceived risk is that buyers normally perceive higher risks than do suppliers in transactions involving business services. For this reason, it is necessary for suppliers to implement risk reduction strategies for buyers. Hypothesis 4 tested the effects of trust on information searching. It has been found that for both suppliers and buyers, contrary to expectation, trust depends on their partner's reputation (t=2.929, p<0.01 for buyers; t=2.711, p<0.05 for suppliers). This finding shows that suppliers with good reputations tend to be trusted. Prior experience did not show any significant relationship with trust for either buyers or suppliers. Hypothesis 5 tested the effects of trust on supplier/buyer selection. Unlike buyers, suppliers tend to trust buyers when they think that previous transactions with buyers were important (t=2.913 p<0.01). However, this study did not show any significant relationship between source loyalty and the trust of buyers in suppliers. Hypothesis 6 tested the effects of trust on relational performances. For buyers and suppliers, financial performance reportedly improved when they trusted their partners (t=2.301, p<0.05 for buyers; t=3.692, p<0.01 for suppliers). It is interesting that this tendency was much stronger for suppliers than it was for buyers. Similarly, competitiveness was reported to improve when buyers and suppliers trusted their partners (t=3.563, p<0.01 for buyers; t=3.042, p<0.01 for suppliers). For suppliers, efficiency and productivity were reportedly improved when they trusted buyers (t=2.673, p<0.01). Other performance indices showed insignificant relationships with trust. The findings of this study have some strategic implications. First and most importantly, trust-based transactions are beneficial for both suppliers and buyers. As verified in the study, financial performance can be improved through efforts to build and maintain mutual trust. Similarly, competitiveness can be increased through the same kinds of effort. Second, trust-based transactions can facilitate the reduction of perceived risks inherent in the purchasing situation. This finding has implications for both suppliers and buyers. It is generally believed that buyers perceive higher risks in a highly involved purchasing situation. To reduce risks, previous studies have recommended that suppliers devise risk-reducing tactics. Moving beyond these recommendations, the present study uniquely focused on the bilateral perspective of perceived risk. In other words, suppliers are also susceptible to perceived risks, especially when they supply services that require very technical and sophisticated manipulations and maintenance. Consequently, buyers and suppliers must solve problems together in close collaboration. Hence, mutual trust plays a crucial role in the problem-solving process. Third, as found in this study, the more authority a salesperson has, the more he or she can be trusted. This finding is very important with regard to tactics. Building trust is a long-term assignment; however, when mutual trust has not been developed, suppliers can overcome the problems they encounter by empowering a salesperson with the authority to make certain decisions. This finding applies to suppliers as well.

  • PDF