• Title/Summary/Keyword: exchange theory

Search Result 482, Processing Time 0.03 seconds

The Social meaning and the Adaptable Effects on Marriage Life of the Honsu: A social Exchange View (혼수의 사회적 의미 및 혼수가 결혼생활에 미치는 영향 : 사회교환이론적 접근)

  • 정용선
    • Journal of the Korean Home Economics Association
    • /
    • v.33 no.6
    • /
    • pp.115-136
    • /
    • 1995
  • The exploratory purpose of this study was to investigate the Honsu trend and to examine the relationships between the Honsu, marriage exchange resources and marital satisfaction from general group and also explore the differences in Honsu expenditure between the general group and the aimed group. the explanatory purpose of this study was to prove the social meaning of the Honsu as a 'productive exchange resources' using Emerson's exchange network theory. The data was collected from 800 men and women of general group and 72 men and women of aimed group within 5 years of marital duration through the questionnaire method. Major findings of the study from the general group were as follows : in general group 1. The bridegroom group expended more Honsu than bride group. Bridegroom's primary expenditure item was house expenditure, and bride's primary one was newlywed life goods. 2. The bridegroom's Honsu were influenced positively by parents'SES, bridegroom & bride's education level and bride's parents'SES. Bride's Honsu were influenced positively by parents' SES and bridegroom & bride's education level. 3. Bridegroom's marital satisfaction were influenced positively by bride's marriage need, bridegroom's marriage need, bride's physical attraction and bridegroom & bride's education level. Bride's marital satisfaction were influenced positively by bride's marriage need, bridegroom's physical attraction, bridegroom & bride's education level, bridegroom's marriage need, bridegroom's future possibilities and bridegroom's Honsu. 4. The social meaning of the Honsu was a 'productive exchange resource'. 1. The bridegrooms of aimed group expended more housing expenditure and also Honsu than the brides but there's no statistically significant differences in Honsu expenditure between the bridegrooms and the brides of aimed group. 2. The bridegrooms of aimed group expended about 3 times more money for wedding present for spouse and abut 1.2 times more for Honsu than the bridegrooms of general group. The bride of aimed group expended about 4.6 times more money for general group. the bride of aimed group expended abut 4.6 times more money about 4 times more for housing expenditure and about 3 times more for total Honsu than the brides of general group.

  • PDF

Coastal Water Circulation Modeling with Water Exchange through Permeable Dike (투수성 호안제체을 통한 해수교환을 고려한 해수유동 모의)

  • Jung, Tae-Sung
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.18 no.4
    • /
    • pp.301-307
    • /
    • 2006
  • In coastal zones with high tidal ranges like Korean western coast, port construction and reclamation projects have been increased. Most of the projects include sea-dyke construction. In the sea-dykes constructed to protect sea water intrusion, sea water was exchanged through the permeable dykes. The water level inside the area enclosed by the dykes changes with time due to tidal action of outer sea, but the tidal range is smaller than that of outside because of strong friction. In numerical modeling of coastal circulation the water exchange through the dykes has been neglected, which has produced inaccurate estimation neglecting the water exchange. In this study a method, which can consider water exchange through sea-dyke, was suggested and the modeling accuracy was improved. A groundwater theory was utilized to explain the phenomena.

Efficient All-to-All Personalized Communication Algorithms in Wormhole Networks (웜홀 방식 망에서의 효율적인 완전교환 통신 알고리즘)

  • Kim, Si-Gwan;Maeng, Seung-Ryoul;Cho, Jung-Wan
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.27 no.5
    • /
    • pp.464-474
    • /
    • 2000
  • All-to-all personalized communication, or complete exchange, is at the heart of numerous applications, such as matrix transposition, fast Fourier Transform(FFT), and distributed table lookup.We present an efficient all-to-all personalized communication algorithm for a 2D torus inwormhole-routed networks. Our complete exchange algorithm adopts divide-and-conquer approach toreduce the number of start-up latency significantly, which is a good metric for network performancein wormhole networks. First, we divide the whole network into 2x2 basic cells, After speciallydesignated nodes called master nodes have collected messages to transmit to the rest of the basic cell,only master nodes perform complete exchange with reduced network size, N/2 x N/2. When finishedwith this complete exchange in master nodes, these nodes distribute messages to the rest of the masternode, which results in the desired complete exchange communication. After we present our algorithms,we analyze time complexities and compare our algorithms with several previous algorithms. And weshow that our algorithm is efficient by a factor of 2 in the required start-up time which means thatour algorithm is suitable for wormhole-routed networks.

  • PDF

One-round Protocols for Two-Party Authenticated Key Exchange (1-라운드 양자간 키 교환 프로토콜)

  • Jeong, Ik-Rae;Lee, Dong-Hoon
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.1_2
    • /
    • pp.110-118
    • /
    • 2006
  • Cryptographic protocol design in a two-party setting has of tel ignored the possibility of simultaneous message transmission by each of the two parties (i.e., using a duplex channel). In particular, most protocols for two-party key exchange have been designed assuming that parties alternate sending their messages (i.e., assuming a bidirectional half-duplex channel). However, by taking advantage of the communication characteristics of the network it may be possible to design protocols with improved latency. This is the focus of the present work. We present three provably-secure protocols for two-party authenticated key exchange (AKE) which require only a single round. Our first, most efficient protocol provides key independence but not forward secrecy. Our second scheme additionally provides forward secrecy but requires some additional computation. Security of these two protocols is analyzed in the random oracle model. Our final protocol provides the same strong security guarantees as our second protocol, but is proven secure in the standard model. This scheme is only slightly less efficient (from a computational perspective) than the previous ones. Our work provides the first provably- secure one-round protocols for two-party AKE which achieve forward secrecy.

Efficient All-to-All Personalized Communication Algorithms in Wormhole-Routed Networks (웜홀 방식의 네트워크에서 효율적인 다대다 개별적 통신 알고리즘)

  • 김시관;강오한;정종인
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.7_8
    • /
    • pp.359-369
    • /
    • 2003
  • We present efficient generalized algorithms for all-to-all personalized communication operations in a 2D torus. All-to-all personalized communication, or complete exchange, is at the heart of numerous applications, such as matrix transposition, Fast Fourier Transform(FFT), and distributed table lookup. Some algorithms have been Presented when the number of nodes is power-of-2 or multiple-of-four form, but there has been no result for general cases yet. We first present complete exchange algorithm called multiple-Hop-2D when the number of nodes is in the form of multiple-of-two. Then by extending this algorithm, we present two algorithms for an arbitrary number of nodes. Split-and-Merge algorithm first splits the whole network into zones. After each zone performs complete exchange, merge is applied to finish the desired complete exchange. By handling extra steps in Double-Hop-2D algorithm, Modified Double-Hop-2D algorithm performs complete exchange operation for general cases. Finally, we compare the required start-up time for these algorithms.

The Long-Run Relation of Public Debt and Fiscal Balance to Government Bond Rates: An Empirical Study on the Validity of Modern Monetary Theory (국가부채 및 재정수지와 국채이자율의 장기적 관계: 현대화폐이론 검증을 중심으로)

  • Kangwoo Park
    • Analyses & Alternatives
    • /
    • v.7 no.3
    • /
    • pp.181-230
    • /
    • 2023
  • Evaluating the empirical validity of Modern Monetary Theory, this study implements panel cointegration analysis on annual panel data (2000-2022) of OECD countries. Specifically, the sample countries are divided into groups based on the presence of their own sovereign currencies, and for each group, the long-run equilibrium relation (cointegration) between the ratio of public debt or fiscal deficit and government bond rates is tested and estimated. Main findings are as follows: applying the pooled mean-group estimation for panel cointegration, it is found that both the ratios of public debt and fiscal deficit have significantly positive long-run correlation with government bond rates in countries without sovereign currency such as the Euro-zone or fixed exchange rate regime countries. However, in countries with sovereign currency such as non-Euro-zone or floating exchange rate regime countries, the long-run correlation is either negative or not statistically significant. Particularly, in countries without sovereign currency, the ratio of public debt has significantly positive correlation with the real government bond rates in the short run as well as the long run. These results are consistent with the prediction of Modern Monetary Theory, thus providing a supporting evidence for the empirical validity of the theory.

Factors Influencing IS Outsourcing Implementation : an Empirical Study from the Interorganizational Relationship Perspective (정보시스템 아웃소싱의 성공요인 분석 : 조직간 관계 관점에서의 실증적 연구)

  • 정영수
    • Proceedings of the Korea Association of Information Systems Conference
    • /
    • 1997.10a
    • /
    • pp.503-525
    • /
    • 1997
  • 정보시스템 아웃소싱(outsourcing)의 적용 범위와 그 규모가 증대함에 따라, 아웃 소싱은 정보시스템의 관리에서 근본적인 이슈로 등장하게 되었다. 정보시스템 아웃소싱의 중요성이 인식되었으나, 그에 대한 실증적 연구는 매우 미흡한 설정이다. 본 연구의 주요 목적은 정보시스템 아웃소싱에 있어 고객회사(client firm)와 서비스 제공업자(vendor)간의 관계의 성공 및 실패에 영향을 미치는 요인을 조사하는 것이다. 본 연구의 연구 모델은 관 계적거래이론(relational exchange theory), 커뮤니케이션 행동(communication behavior), 거래비용분석(transaction cost analysis) 등의 조직간관계(interorganizational relationship) 이론에 기반을 두고 작성되었다. 미국의 207개 회사의 정보시스템 아웃소싱 설문조사에 의 하여 다음과 같은 연구결과가 도출되었다. (1) 서비스 제공업자의 능력(vendor capability), 관계결속성(solidarity), 관계지속성(continuity expectation), 유연성(flexibility), 서비스업자의 활동에 대한 모니터링(monitoring of the vendor), 참여도(participation) 등이 아웃소싱 관 계의 성공과 양의 상관관계를 가지고 있으며, (2) 역할연합도(role integrity), 자산특이성 (asset specificity) 등은 아웃소싱 관계의 성공과 음의 관계를 가지고 있는 것으로 나타났 다. 이 결과에 의하면, 비관계적 거래(discrete exchange) 보다는, 관계적 거래(relational exchange)에 기반을 두어 아웃소싱 관계를 운영하는 것이 아웃소싱의 성공적인 구현을 필 수적으로 보여진다. 이 연구 결과를 기초로 하여 아웃소싱 대상 업무의 선택, 서비스 제공 업자의 선택, 그리고 아웃소싱 관계의 지속적인 관리를 위한 지침을 제시하였다.

  • PDF

Moderating effects of leader-member exchange (LMX) on job burnout in dietitians and chefs of institutional foodservice

  • Lee, Kyung-Eun
    • Nutrition Research and Practice
    • /
    • v.5 no.1
    • /
    • pp.80-87
    • /
    • 2011
  • The objectives of the study were to investigate job burnout and leader-member exchange (LMX) levels as well as to evaluate buffering effects of LMX on burnout among dietitians and chefs at institutional foodservices. Hypotheses were proposed based on the Job Demands-Resources model and LMX theory. The study population consisted of dietitians and chefs who were in charge of managing unit operations in a nationwide contract management company. Positive/negative affectivity, workload, job burnout, and LMX scales that bad been validated in previous research were adopted A total of 552 questionnaires were distributed and 154 responses were returned. Results indicated that respondents' burnout levels were moderate and emotional exhaustion was greater than cynicism. In terms of LMX, the surveyed dietitians and chefs showed higher respect toward their supervisors than loyalty. When positive affectivity and negative affectivity were controlled, workload influenced emotional exhaustion and professional efficacy significantly. With affectivity and workload controlled, however, LMX did not influence any dimensions of burnout. The moderating effect of LMX on the relationship between workload and cynicism was significant. That is, the effect of workload on cynicism was weak if the dietitians and chefs perceived the relationship with their supervisor positively. Based on the findings and literature reviewed, how to mitigate job burnout among foodservice managers is discussed.

Information Security of Organization and Employees in Social Exchange Perspective : Using Structure-Conduct-Outcome Framework (SCO Framework을 적용한 조직과 조직원의 정보보안 준수 관계 연구)

  • Hwang, In-Ho;Kim, Sanghyun
    • The Journal of Information Systems
    • /
    • v.28 no.4
    • /
    • pp.105-129
    • /
    • 2019
  • Purpose Issues related to information security have been a crucial topic of interest to researchers and practitioners in the IT/IS field. This study develops a research model based on a Structure-Conduct-Outcome (SCO) framework for the social exchange relationship between employees and organizations regarding information security. Design/methodology/approach In applying an SCO framework to information security, structure and conduct are activities imposed on employees within an organizational context; outcomes are activities that protect information security from an employee. Data were collected from 438 employees working in manufacturing and service firms currently implementing an information security policy in South Korea. Structural equation modeling (SEM) with AMOS 22.0 is used to test the validation of the measurement model and the proposed casual relationships in the research model. Findings The results demonstrate support for the relationships between predicting variables in organization structure (security policy and physical security system) and the outcome variables in organization conduct (top management support, security education program, and security visibility). Results confirm that the three variables in organization conduct had a positive effect on individual outcome (security knowledge and compliance intention).

Factors Influencing Is Outsourcing Implementation : An Empirical Study from the Interorganizational Relationship Perspective (정보시스템 아웃소싱의 성공요인 분석 : 조직간 관계 관점에서의 실증적 연구)

  • Chung, Young-Soo
    • The Journal of Information Systems
    • /
    • v.6 no.2
    • /
    • pp.51-83
    • /
    • 1997
  • 정보시스템 아웃소싱(outsourcing)의 적용 범위와 그 규모가 증대함에 따라, 아웃 소시은 정보시스템의 관리에서 근본적인 이슈로 등장하게 되었다. 정보시스템 아웃소시의 중요성이 인식되었으나, 그에 대한 실증적 연구는 매우 미흡한 실정이다. 본 연구의 주요 목적은 정보시스템 아웃소싱에 있어 고객회사(client firm)와 서비스 제공업자(vendor)간의 관계의 성공 및 실패에 영향을 미치는 요인을 조사하는 것이다. 본 연구의 연구 모델은 관 계적 거래이론(relational exchange theory), 커뮤티케이션 행동(communication behavior), 거래비용분석(transaction cost analysis) 등의 조직간 관계(interorganizational relationship) 이론에 기반을 두고 작성되었다. 미국의 207개 회사의 정보시스템 아웃소싱 설문조사에 의 하여 다음과 같은 연구결과가 도출되었다. (1) 서비스 제공업자의 능력(vendor capability), 관계결속성(solidarity), 터링(monitoring of the vendor), 참여도(participation) 등이 아웃소 싱 관계의 성공과 양의 상관관계를 가지고 있으며, (2) 역할참여도(role integrity), 자산특이 성(asset specificity) 등은 아웃소싱 관계의 성공과 음의 관계를 가지고 있는 것으로 나타났 다. 이 결과에 의하면, 비관계적 거래(discrete exchange) 보다는, 관계적거래(relational exchange)에 기반을 두어 아웃소싱 관계를 운영하는 것이 아웃소싱의 성공적인 구현을 위 하여 필수적으로 보여진다. 이 연구 결과를 기초로 하여 아웃소싱 대상 업무의 선택, 서비 스 제공업자의 선택, 그리고 아웃소싱 관계의 지속적인 관리를 위한 지침을 제시하였다.

  • PDF