• Title/Summary/Keyword: cost risk management

Search Result 704, Processing Time 0.026 seconds

Portfolio Analysis on the New Power Generation Sources of the Sixth Basic Plan for Long Term Electricity Demand and Supply (포트폴리오 이론을 활용한 제6차 전력수급기본계획의 신규전원구성 비교 연구)

  • Kim, Juhan;Kim, Jinsoo
    • Environmental and Resource Economics Review
    • /
    • v.23 no.4
    • /
    • pp.583-615
    • /
    • 2014
  • Including the rolling black out in 2011, Korea has suffered from rapid increase of electricity consumption and demand forecasting failure for last five years. In addition, because of the Fukushima disaster, high fuel prices, and introduction of new generation sources such as renewables, the uncertainty on a power supply strategy increases. Consequently, a stable power supply becomes the new agenda and a revisino of strategy for new power generation sources is needed. In the light of this, we appraises the sixth basic plan for long term electricity demand and supply considering the changes of foreign and domestic conditions. We also simulate a strategy for the new power generation sources using a portfolio analysis method. As results, a diversity of power generation sources will increase and the share of renewable power generation will be surged on the assumptions of a cost reduction of renewable power sources and an increase of fuel costs. Particularly, on the range of a risk level(standard deviation) from 0.06 and 0.09, the efficient frontier has the most various power sources. Besides, the existing power plan is not efficient so that an improvement is needed. Lastly, the development of an electricity storage system and energy management system is necessary to make a stable and efficient power supply condition.

The Adoption of New Service-Deliverly Channel under the Multi-channel Usage (다채널 이용 상황에서 신규 서비스채널의 수용에 관한 연구)

  • Kim, Hyun-Cheol;Han, Jang-Hui;Choi, Ji-Ho
    • Journal of Distribution Research
    • /
    • v.12 no.2
    • /
    • pp.23-49
    • /
    • 2007
  • Recently, mobile marketing is becoming one of the major topics of interest to the marketing discipline. Emerging from rapid developments in mobile technology, it has created opportunities for new and innovative mobile services. Also, it is enabling to conduct always-on connections that consumers can interact anytime and anywhere. Especially, mobile devices place themselves to the core means of mobile-commerce which to execute a function as a distribution channel in mobile environments. Although the adoption researches about innovative services or technologies had executed in marketing areas over the past decades, most researches just expanded or modified existing theories and explanation models. There has been little study on the comprehensive and systematic review of adoption process. Therefore, it deserves to be considered prior usage experiences of the existing channels(CL) and attractiveness of the new channel(CLalt) based on social exchange theory. In order to address this void, this study unifies components of perceived attributes in the each dimensions (ie. benefit, cost, and risk dimensions) and explores prior usage experiences of the existing channels on adoption intention in electronic financial service channels through developing comprehensive model and employing empirical test for the hierarchy of effects model. Based on these empirical results, this study suggests managerial implications for new channel management in electronic financial service areas by focusing on the prior usage experiences of the existing objects on adoption intention and perceived attributes of ubiquitous-based mobile service channel.

  • PDF

Determinants of the Ownership Structure of Franchise Systems: Theory and Evidence (프랜차이즈 시스템의 소유구조 결정요인: 이론과 증거)

  • Lim, Young-Kyun;Byun, Sook-Eun;Oh, Seung-Su
    • Journal of Distribution Research
    • /
    • v.16 no.3
    • /
    • pp.33-75
    • /
    • 2011
  • The ownership structure of a franchise system is determined by the franchisor's strategic choice. A close look at the extant theories and perspectives in economics and management such as resource scarcity theory, agency theory, transaction cost analysis, and mixed ownership theory reveals that firms choose their ownership structure for the sake of economic efficiency, profit potentials, the chance of survival, and other strategic concerns. The present study, on the basis of strategic choice perspective, reviews the divergent theories of a franchise system's ownership structure and its determinants, thus providing a theoretical framework for comparing the contradictory arguments along the several critical dimensions. We also developed and tested the conflicting hypotheses regarding key determinants of ownership structure including firm's age, size, transaction-specific investments, uncertainty, and risk-sharing propensity. Using a FDD (Franchise Disclosure Document) data set of 543 Korean franchisors, we found that the years in business, the total number of employees, days of training, the inverse of the years of franchising, and the requirement of royalty payment have positive relationships with the proportion of company-owned outlets to total number of outlets. On the other hand, the proportion of company-owned outlets was found to have negative relationships with the total number of outlets and the extent of geographic dispersion of outlets, but to have no significant relationships with the initial investment required and the inverse of contract length. Based on the findings, we provide several theoretical and managerial implications for studying ownership structure of franchise systems.

  • PDF

Estimation of Road-Network Performance and Resilience According to the Strength of a Disaster (재난 강도에 따른 도로 네트워크의 성능 및 회복력 산정 방안)

  • Jung, Hoyong;Choi, Seunghyun;Do, Myungsik
    • International Journal of Highway Engineering
    • /
    • v.20 no.1
    • /
    • pp.35-45
    • /
    • 2018
  • PURPOSES : This study examines the performance changes of road networks according to the strength of a disaster, and proposes a method for estimating the quantitative resilience according to the road-network performance changes and damage scale. This study also selected high-influence road sections, according to disasters targeting the road network, and aimed to analyze their hazard resilience from the network aspect through a scenario analysis of the damage recovery after a disaster occurred. METHODS : The analysis was conducted targeting Sejong City in South Korea. The disaster situation was set up using the TransCAD and VISSIM traffic-simulation software. First, the study analyzed how road-network damage changed the user's travel pattern and travel time, and how it affected the complete network. Secondly, the functional aspects of the road networks were analyzed using quantitative resilience. Finally, based on the road-network performance change and resilience, priority-management road sections were selected. RESULTS : According to the analysis results, when a road section has relatively low connectivity and low traffic, its effect on the complete network is insignificant. Moreover, certain road sections with relatively high importance can suffer a performance loss from major damage, for e.g., sections where bridges, tunnels, or underground roads are located, roads where no bypasses exist or they exist far from the concerned road, including entrances and exits to suburban areas. Relatively important roads have the potential to significantly degrade the network performance when a disaster occurs. Because of the high risk of delays or isolation, they may lead to secondary damage. Thus, it is necessary to manage the roads to maintain their performance. CONCLUSIONS : As a baseline study to establish measures for traffic prevention, this study considered the performance of a road network, selected high-influence road sections within the road network, and analyzed the quantitative resilience of the road network according to scenarios. The road users' passage-pattern changes were analyzed through simulation analysis using the User Equilibrium model. Based on the analysis results, the resilience in each scenario was examined and compared. Sections where a road's performance loss had a significant influence on the network were targeted. The study results were judged to become basic research data for establishing response plans to restore the original functions and performance of the destroyed and damage road networks, and for selecting maintenance priorities.

The Relationship between Offline Trust and Online Transaction in Internet Banking (인터넷 뱅킹에서 오프라인 신뢰와 온라인 거래의 관계)

  • Lee, Woong-Kyu
    • Asia pacific journal of information systems
    • /
    • v.17 no.2
    • /
    • pp.29-47
    • /
    • 2007
  • Owing to the rapid growth of using the Internet, not only click-and-mortar companies but also brick-and-mortar ones have been expanding their distribution channels into online, Moreover, since online channels are more attractive than offline ones in control and maintenance, switching customers into online ones is emerged as one of very important managerial issues in a view of reduction of cost as well as expansion of services. However, the switched customers should be faced by uncertainties which could not have been experienced in offline. Specifically, in online channels, buyers and sellers are separated temporally and spacially and there are always so many kinds of threat for security as well as not enough systems and conventions for them yet. Therefore, trust has been considered as one of the most critical mechanisms for resolution of such uncertainties in online transactions. However, it is not easy to build and maintain the relationships in online since most of them are virtual and indirect generally. Therefore, in order to switch offline customers into online ones, it is very important to make strategies based on identification of the relationship between online transaction and offline trust which has been built in offline business. Generally offline trust, which has been built independent of online, could not include trust for online-dependent activities such as payment security during or after transactions, while most of online trust include it. Therefore, a customer with high offline trust does not always perceive high security and assure safe transactions. Accordingly, while online trust, where technical capabilities for online security is one of main bases, includes control trust implicitly or explicitly, offline trust does not. However. in spite of such clear discrimination and independence between offline trust and perceived security, there can be the significant dependency between these two beliefs. The customers with high offline trust believe that the company would do some activities for online security for customers' safe transactions since it has been believed of doing well for customers' trust. Theoretically, users' perception of security is interpreted as a kind of control trus, which is trust for company's technical control capacities in order to resolve technical uncertainties in online. Therefore, the relationship between two beliefs can be considered as transference from offline trust to another type trust. that is, control trust. The objective of this study is to analyze the effect of offline trust on online transaction uses mediated by perceived security. For this purpose, we suggest a research model based on technology acceptance model (TAM). Reuse intention is adopted as a dependent variable and TAM is modified by adding perceived risk (PR) as well as two beliefs of using Internet banking, perceived usefulness (PU) and perceived ease of use (PEOU). Moreover, perceive security (PS) is adopted as an external variable for PR and PU, while offline trust (OT) is an antecedent of PS. For an empirical test, sampling from 108 visitors to the banks in Daegu, Korea, we analyze our model by partial least square (PLS) approach. In result, our model is shown to explain 51.4% of the variance in reuse intention and all hypothesis are supported statistically. A theoretical implication of this study is to identify a role of PS between offline trust and reuse intention of using online transaction services. According to our result, PS can be considered as a mediation variable for bridging between two different concepts: trust that explains social aspects of customers and companies, and TAM that explains customers' reuse intention.

On the Use of SysML Models in the Conceptual Design of Unmanned Aerial Vehicles (무인항공기체계의 개념설계에서 SysML 모델의 활용에 관한 연구)

  • Kim, Young-Min;Lee, Jae-Chon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.2C
    • /
    • pp.206-216
    • /
    • 2012
  • Today's war fields can be characterized by net-centric wars where a variety of independent weapon systems are operated in connection with each other via networks. As such, weapon systems become dramatically advanced in terms of complexity, functionality, precision and so on. It is then obvious that the defense R&D of those requires systematic and efficient development tools enabling the effective management of the complexity, budget/cost, development time, and risk all together. One viable approach is known to be the development methods based on systems engineering, which is already proved to successful in U.S. In this paper, a systems engineering approach is studied to be used in the conceptual design of advanced weapon systems. The approach is utilizing some graphical models in the design phase. As a target system, an unmanned aerial vehicle system is considered and the standard SysML is also used as a modeling language to create models. The generated models have several known merits such as ease of understanding and communication. The interrelationships between the models and the design artifacts are identified, which should be useful in the generation of some design documents that are required in the defense R&D. The result reported here could be utilized in the further study that can eventually lead to a full-scale model-based systems engineering method.

A Study on Open Source Transition Strategy of Record System (기록시스템의 오픈소스화 전략 연구)

  • An, Dae-jin;Yim, Jin-hee
    • The Korean Journal of Archival Studies
    • /
    • no.52
    • /
    • pp.119-170
    • /
    • 2017
  • This study aims to analyze the environment for the open-source records system and to identify the risk and requirements for the success of the strategy in Korea. For this, Chapter 2 presented a review of the strategic benefits of open source to public organizations, developers, and users. It also discussed the process of cooperatively developing and releasing the source code and the technology infrastructure supporting open source. In Chapter 3, six representative open-source projects in the field of records management were selected, and case studies were conducted. To derive comprehensive implications, we have divided the main development body of open-source projects into international organizations, international cooperation systems, national archives, and software development companies. We also analyzed the background and purpose of each project, the agents of development and funding, the governance model, the development period and cost, the business model and software architecture, the community composition, and the licensing strategy. Through this, we have derived four critical success factors. In terms of technology, a component-based design was required; therefore, we proposed a microservice architecture and a model-view-controller design pattern. Next, it was necessary to reestablish system requirements of records center and archives. Moreover, we also proposed a dual licensing strategy to allow developers to easily participate in open-source projects. Lastly, we emphasized a strong governance structure and an effective cooperation framework to create a sustainable community. For a record system to be open-source successfully in an organization-centered market, the roles of software developers and end users should be exercised more in the community. To achieve this, it is important to build various collaborative tools and development infrastructure from a planning stage to a centralized one.

Study on Economic and Financial Education for the North Koreans after Unification: from the Perspective of Behavioral Economics (통일 후 북한 주민 대상 경제금융 교육에 관한 연구: 행태경제학 관점을 중심으로)

  • Son, Jeong-Kook;Kim, Young-Min
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.2
    • /
    • pp.239-246
    • /
    • 2021
  • Unification means the change of the economic system from 'Planned Economy' of the North Korea to 'Market Economy' of the South Korea. Therefore, it may cause confusions and difficulties for North Koreans who have been under planned economy for ages. So, we need to take the perspective of behavioral economics for the effective education. First of all, it is about overall finance, which contains the record of financial transactions, effect of inflation, investors' bounded rationality, and choice difficulty of financial products. Second, it is about borrowings, which includes the credit management, interest rate of difference among financial institutions. Third, it is about investment on financial products, which includes the effect of cost on returns, difference between compound interest and simple interest, trade-off between expected return and risk, market and non-market risks, the importance of diversification, and passive & aggressive investments.

A Study on Monitoring Surface Displacement Using SAR Data from Satellite to Aid Underground Construction in Urban Areas (위성 SAR 자료를 활용한 도심지 지하 교통 인프라 건설에 따른 지표 변위 모니터링 적용성 연구)

  • Woo-Seok Kim;Sung-Pil Hwang;Wan-Kyu Yoo;Norikazu Shimizu;Chang-Yong Kim
    • The Journal of Engineering Geology
    • /
    • v.34 no.1
    • /
    • pp.39-49
    • /
    • 2024
  • The construction of underground infrastructure is garnering growing increasing research attention owing to population concentration and infrastructure overcrowding in urban areas. An important associated task is establishing a monitoring system to evaluate stability during infrastructure construction and operation, which relies on developing techniques for ground investigation that can evaluate ground stability, verify design validity, predict risk, facilitate safe operation management, and reduce construction costs. The method proposed here uses satellite imaging in a cost-effective and accurate ground investigation technique that can be applied over a wide area during the construction and operation of infrastructure. In this study, analysis was performed using Synthetic Aperture Radar (SAR) data with the time-series radar interferometric technique to observe surface displacement during the construction of urban underground roads. As a result, it was confirmed that continuous surface displacement was occurring at some locations. In the future, comparing and analyzing on-site measurement data with the points of interest would aid in confirming whether displacement occurs due to tunnel excavation and assist in estimating the extent of excavation impact zones.

The Effects of Psychological Contract Violation on OS User's Betrayal Behaviors: Window XP Technical Support Ending Case (심리적 계약 위반이 OS이용자의 배신 행동에 미치는 영향: 윈도우 XP 기술적 지원서비스 중단 사례)

  • Lee, Un-Kon
    • Asia pacific journal of information systems
    • /
    • v.24 no.3
    • /
    • pp.325-344
    • /
    • 2014
  • Technical support of Window XP ended in March, 8, 2014, and it makes OS(Operating System) users fall in a state of confusion. Sudden decision making of OS upgrade and replacement is not a simple problem. Firms need to change the long term capacity plan in enterprise IS management, but they are pressed for time and cost to complete it. Individuals can not help selecting the second best plan, because the following OSs of Window XP are below expectations in performances, new PC sales as the opportunities of OS upgrade decrease, and the potential risk of OS technical support ending had not announced to OS users at the point of purchase. Microsoft as the OS vendors had not presented precaution or remedy for this confusion. Rather, Microsoft announced that the technical support of the other following OSs of Wndow XP such as Window 7 would ended in two years. This conflict between OS vendor and OS users could not happen in one time, but could recur in recent future. Although studies on the ways of OS user protection policy would be needed to escape from this conflict, few prior studies had conducted this issue. This study had challenge to cautiously investigate in such OS user's reactions as the confirmation with OS user's expectation in the point of purchase, three types of justice perception on the treatment of OS vendor, psychological contract violation, satisfaction and the other betrayal behavioral intention in the case of Window XP technical support ending. By adopting the justice perception on this research, and by empirically validating the impact on OS user's reactions, I could suggest the direction of establishing OS user protection policy of OS vendor. Based on the expectation-confirmation theory, the theory of justice, literatures about psychological contract violation, and studies about consumer betrayal behaviors in the perspective of Herzberg(1968)'s dual factor theory, I developed the research model and hypothesis. Expectation-confirmation theory explain that consumers had expectation on the performance of product in the point of sale, and they could satisfied with their purchase behaviors, when the expectation could have confirmed in the point of consumption. The theory of justice in social exchange argues that treatee could be willing to accept the treatment by treater when the three types of justice as distributive, procedural, and interactional justice could be established in treatment. Literatures about psychological contract violation in human behaviors explains that contracter in a side could have the implied contract (also called 'psychological contract') which the contracter in the other side would sincerely execute the contract, and that they are willing to do vengeance behaviors when their contract had unfairly been broken. When the psychological contract of consumers had been broken, consumers feel distrust with the vendors and are willing to decrease such beneficial attitude and behavior as satisfaction, loyalty and repurchase intention. At the same time, consumers feel betrayal and are willing to increase such retributive attitude and behavior as negative word-of-mouth, complain to the vendors, complain to the third parties for consumer protection. We conducted a scenario survey in order to validate our research model at March, 2013, when is the point of news released firstly and when is the point of one year before the acture Window XP technical support ending. We collected the valid data from 238 voluntary participants who are the OS users but had not yet exposed the news of Window OSs technical support ending schedule. The subject had been allocated into two groups and one of two groups had been exposed this news. The data had been analyzed by the MANOVA and PLS. MANOVA results indicate that the OSs technical support ending could significantly decrease all three types of justice perception. PLS results indicated that it could significantly increase psychological contract violation and that this increased psychological contract violation could significantly reduce the trust and increase the perceived betrayal. Then, it could significantly reduce satisfaction, loyalty, and repurchase intention, and it also could significantly increase negative word-of-month intention, complain to the vendor intention, and complain to the third party intention. All hypothesis had been significantly approved. Consequently, OS users feel that the OSs technical support ending is not natural value added service ending, but the violation of the core OS purchase contract, that it could be the posteriori prohibition of OS user's OS usage right, and that it could induce the psychological contract violation of OS users. This study would contributions to introduce the psychological contract violation of the OS users from the OSs technical support ending in IS field, to introduce three types of justice as the antecedents of psychological contract violation, and to empirically validate the impact of psychological contract violation both on the beneficial and retributive behavioral intentions of OS users. For practice, the results of this study could contribute to make more comprehensive OS user protection policy and consumer relationship management practices of OS vendor.