• Title/Summary/Keyword: lead-time

Search Result 3,655, Processing Time 0.035 seconds

A Study on Actual Usage of Information Systems: Focusing on System Quality of Mobile Service (정보시스템의 실제 이용에 대한 연구: 모바일 서비스 시스템 품질을 중심으로)

  • Cho, Woo-Chul;Kim, Kimin;Yang, Sung-Byung
    • Asia pacific journal of information systems
    • /
    • v.24 no.4
    • /
    • pp.611-635
    • /
    • 2014
  • Information systems (IS) have become ubiquitous and changed every aspect of how people live their lives. While some IS have been successfully adopted and widely used, others have failed to be adopted and crowded out in spite of remarkable progress in technologies. Both the technology acceptance model (TAM) and the IS Success Model (ISSM), among many others, have contributed to explain the reasons of success as well as failure in IS adoption and usage. While the TAM suggests that intention to use and perceived usefulness lead to actual IS usage, the ISSM indicates that information quality, system quality, and service quality affect IS usage and user satisfaction. Upon literature review, however, we found a significant void in theoretical development and its applications that employ either of the two models, and we raise research questions. First of all, in spite of the causal relationship between intention to use and actual usage, in most previous studies, only intention to use was employed as a dependent variable without overt explaining its relationship with actual usage. Moreover, even in a few studies that employed actual IS usage as a dependent variable, the degree of actual usage was measured based on users' perceptual responses to survey questionnaires. However, the measurement of actual usage based on survey responses might not be 'actual' usage in a strict sense that responders' perception may be distorted due to their selective perceptions or stereotypes. By the same token, the degree of system quality that IS users perceive might not be 'real' quality as well. This study seeks to fill this void by measuring the variables of actual usage and system quality using 'fact' data such as system logs and specifications of users' information and communications technology (ICT) devices. More specifically, we propose an integrated research model that bring together the TAM and the ISSM. The integrated model is composed of both the variables that are to be measured using fact as well as survey data. By employing the integrated model, we expect to reveal the difference between real and perceived degree of system quality, and to investigate the relationship between the perception-based measure of intention to use and the fact-based measure of actual usage. Furthermore, we also aim to add empirical findings on the general research question: what factors influence actual IS usage and how? In order to address the research question and to examine the research model, we selected a mobile campus application (MCA). We collected both fact data and survey data. For fact data, we retrieved them from the system logs such information as menu usage counts, user's device performance, display size, and operating system revision version number. At the same time, we conducted a survey among university students who use an MCA, and collected 180 valid responses. A partial least square (PLS) method was employed to validate our research model. Among nine hypotheses developed, we found five were supported while four were not. In detail, the relationships between (1) perceived system quality and perceived usefulness, (2) perceived system quality and perceived intention to use, (3) perceived usefulness and perceived intention to use, (4) quality of device platform and actual IS usage, and (5) perceived intention to use and actual IS usage were found to be significant. In comparison, the relationships between (1) quality of device platform and perceived system quality, (2) quality of device platform and perceived usefulness, (3) quality of device platform and perceived intention to use, and (4) perceived system quality and actual IS usage were not significant. The results of the study reveal notable differences from those of previous studies. First, although perceived intention to use shows a positive effect on actual IS usage, its explanatory power is very weak ($R^2$=0.064). Second, fact-based system quality (quality of user's device platform) shows a direct impact on actual IS usage without the mediating role of intention to use. Lastly, the relationships between perceived system quality (perception-based system quality) and other constructs show completely different results from those between quality of device platform (fact-based system quality) and other constructs. In the post-hoc analysis, IS users' past behavior was additionally included in the research model to further investigate the cause of such a low explanatory power of actual IS usage. The results show that past IS usage has a strong positive effect on current IS usage while intention to use does not have, implying that IS usage has already become a habitual behavior. This study provides the following several implications. First, we verify that fact-based data (i.e., system logs of real usage records) are more likely to reflect IS users' actual usage than perception-based data. In addition, by identifying the direct impact of quality of device platform on actual IS usage (without any mediating roles of attitude or intention), this study triggers further research on other potential factors that may directly influence actual IS usage. Furthermore, the results of the study provide practical strategic implications that organizations equipped with high-quality systems may directly expect high level of system usage.

Personal Information Overload and User Resistance in the Big Data Age (빅데이터 시대의 개인정보 과잉이 사용자 저항에 미치는 영향)

  • Lee, Hwansoo;Lim, Dongwon;Zo, Hangjung
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.1
    • /
    • pp.125-139
    • /
    • 2013
  • Big data refers to the data that cannot be processes with conventional contemporary data technologies. As smart devices and social network services produces vast amount of data, big data attracts much attention from researchers. There are strong demands form governments and industries for bib data as it can create new values by drawing business insights from data. Since various new technologies to process big data introduced, academic communities also show much interest to the big data domain. A notable advance related to the big data technology has been in various fields. Big data technology makes it possible to access, collect, and save individual's personal data. These technologies enable the analysis of huge amounts of data with lower cost and less time, which is impossible to achieve with traditional methods. It even detects personal information that people do not want to open. Therefore, people using information technology such as the Internet or online services have some level of privacy concerns, and such feelings can hinder continued use of information systems. For example, SNS offers various benefits, but users are sometimes highly exposed to privacy intrusions because they write too much personal information on it. Even though users post their personal information on the Internet by themselves, the data sometimes is not under control of the users. Once the private data is posed on the Internet, it can be transferred to anywhere by a few clicks, and can be abused to create fake identity. In this way, privacy intrusion happens. This study aims to investigate how perceived personal information overload in SNS affects user's risk perception and information privacy concerns. Also, it examines the relationship between the concerns and user resistance behavior. A survey approach and structural equation modeling method are employed for data collection and analysis. This study contributes meaningful insights for academic researchers and policy makers who are planning to develop guidelines for privacy protection. The study shows that information overload on the social network services can bring the significant increase of users' perceived level of privacy risks. In turn, the perceived privacy risks leads to the increased level of privacy concerns. IF privacy concerns increase, it can affect users to from a negative or resistant attitude toward system use. The resistance attitude may lead users to discontinue the use of social network services. Furthermore, information overload is mediated by perceived risks to affect privacy concerns rather than has direct influence on perceived risk. It implies that resistance to the system use can be diminished by reducing perceived risks of users. Given that users' resistant behavior become salient when they have high privacy concerns, the measures to alleviate users' privacy concerns should be conceived. This study makes academic contribution of integrating traditional information overload theory and user resistance theory to investigate perceived privacy concerns in current IS contexts. There is little big data research which examined the technology with empirical and behavioral approach, as the research topic has just emerged. It also makes practical contributions. Information overload connects to the increased level of perceived privacy risks, and discontinued use of the information system. To keep users from departing the system, organizations should develop a system in which private data is controlled and managed with ease. This study suggests that actions to lower the level of perceived risks and privacy concerns should be taken for information systems continuance.

Relationship between Access to Lewd Internet Contents by Middle School Students and Their Awareness of Sex (중학생의 인터넷음란물 접속과 성 의식의 관계)

  • Lim, Jong-In;Choi, In-Sook
    • The Journal of Korean Society for School & Community Health Education
    • /
    • v.4
    • /
    • pp.117-139
    • /
    • 2003
  • The purpose of this research lies in presenting logical viability for the measures that curtail access to lewd Internet contents by middle school students amidst the reality in which lewd contents are circulated freely through the Internet, a medium that the middle school students find most easy to access. In order to establish right form of awareness towards sex, this research identified the ways they access the lewd Internet contents, their reaction after the exposure to those contents, their knowledge of sex, their concerns regarding sex and their accessibility to sexual activities in order to conduct a comparative analysis on the relationship between lewd Internet contents and their awareness of sex. First, realities of accessing lewd Internet contents and reactions according to the demographics of middle school students There isa significant difference in the experience of accessing lewd Internet contents in terms of gender. Mostly, male students tend to access the contents more. As for the way they access the lewd Internet contents, both male and female students replied that they access through spam mail of lewd nature. Thus, measures to address this problem are needed urgently. As to when they first accessed the lewd contents, most of the research subjects replied that they accessed either in elementary school period or in the early middle school period. This shows that most of the students got exposed to lewd contents even before they could establish positive, correct awareness of sex. Thus, there is a risk that they may formulate wrong kind of sexual awareness. Accordingly, it is necessary to develop measures through focused sex education. Students are divided into two groups according to the time they spend on the contents averagely: those who spend over one hour and those who spend less than an hour on the lewd contents. If the students spending longer hours are not to be checked and properly guided, it may lead to increasing cases of sexual delinquencies due to their wrongly formed awareness of sex. When the question of existence(non-existence) of guardian was addressed, students with both parents tend to access the lewd Internet contents in a more diverse manner and tend to access more compared to those students from single parent or no-parent families. Accordingly, guardians need to pay attention to how their children are using the Internet. Second, awareness of sex depending on the middle school students' demographics In case of sexual knowledge, middle school students shows relatively high level of knowledge. In particular, female students are found more knowledgeable than male students, and the students in upper years are more knowledgeable as well. As a result, this research recommends that the students in lower years should be guided with more basc and detailed information, while those in upper years need to be taught to form and express their own thoughts and attitudes and to build up independence on this matter. In case of worries about sex, both male and female students don't worry too much about it. However, male students are more concerned about sex than female students in a more diverse ways. As for the differences by academic year, concerns for sex increase, as students get older. Accordingly, sex education that helps establish sound perception of the opposite sex and that focuses on the etiquettes that one must adhere to at the presence of the opposite sex need to be conducted against middle school students. In case of accessibility to sex, male students manifest higher tendency than female students. As for the differences by academic year, those in the first and second years show higher accessibility than those in their third year. In general, younger students tend to be more open-minded toward sex. Accordingly, students in lower academic years need to undergo basic knowledge oriented sex education, whereas those in upper academic years need to undergo discussion centered sex education where they subject to questions regarding their attitude and opinion. Third, relationship between the reactions after the exposure to the lewd Internet contents and their awareness of sex As the frequency of contact with lewd Internet contents increases, awareness of sex increases as well. Thus, the lewd Internet contents contribute to the increase in students' concern for sex as well as increase in accessibility to sex, which eventually become barriers to students' establishment of a healthy perception of sex. Reactions to sex after the exposure to lewd Internet contents and awareness of sex indicate a significant correlation. However, negative correlation is manifested with knowledge of sex. Thus, it is possible to know that the greater access to lewd Internet contents does not necessarily translate into increase in knowledge of sex. However, the study showed there is a correlation between concerns for sex and the level of accessibility to sex. In more detail, the more reactions to the contents they show, the more concerns for sex they have and the more positively they take acceptability to sex. Moreover, it is necessary to develop necessary measures since textbooks today do not include measures needed to address the lewd Internet contents. Given the above findings, it is necessary to continue to complement structural measures in order to prevent easy access of lewd Internet contents by middle school students. Moreover, it is necessary to be considerate of the students so that they themselves can form a healthy Internet culture and grow up within positive framework for the sex education.

  • PDF

Design of accelerated life test on temperature stress of piezoelectric sensor for monitoring high-level nuclear waste repository (고준위방사성폐기물 처분장 모니터링용 피에조센서의 온도 스트레스에 관한 가속수명시험 설계)

  • Hwang, Hyun-Joong;Park, Changhee;Hong, Chang-Ho;Kim, Jin-Seop;Cho, Gye-Chun
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.24 no.6
    • /
    • pp.451-464
    • /
    • 2022
  • The high-level nuclear waste repository is a deep geological disposal system exposed to complex environmental conditions such as high temperature, radiation, and ground-water due to handling spent nuclear fuel. Continuous exposure can lead to cracking and deterioration of the structure over time. On the other hand, the high-level nuclear waste repository requires an ultra-long life expectancy. Thus long-term structural health monitoring is essential. Various sensors such as an accelerometer, earth pressure gauge, and displacement meter can be used to monitor the health of a structure, and a piezoelectric sensor is generally used. Therefore, it is necessary to develop a highly durable sensor based on the durability assessment of the piezoelectric sensor. This study designed an accelerated life test for durability assessment and life prediction of the piezoelectric sensor. Based on the literature review, the number of accelerated stress levels for a single stress factor, and the number of samples for each level were selected. The failure mode and mechanism of the piezoelectric sensor that can occur in the environmental conditions of the high-level waste repository were analyzed. In addition, two methods were proposed to investigate the maximum harsh condition for the temperature stress factor. The reliable operating limit of the piezoelectric sensor was derived, and a reasonable accelerated stress level was set for the accelerated life test. The suggested methods contain economical and practical ideas and can be widely used in designing accelerated life tests of piezoelectric sensors.

A Study on Enhancing Personalization Recommendation Service Performance with CNN-based Review Helpfulness Score Prediction (CNN 기반 리뷰 유용성 점수 예측을 통한 개인화 추천 서비스 성능 향상에 관한 연구)

  • Li, Qinglong;Lee, Byunghyun;Li, Xinzhe;Kim, Jae Kyeong
    • Journal of Intelligence and Information Systems
    • /
    • v.27 no.3
    • /
    • pp.29-56
    • /
    • 2021
  • Recently, various types of products have been launched with the rapid growth of the e-commerce market. As a result, many users face information overload problems, which is time-consuming in the purchasing decision-making process. Therefore, the importance of a personalized recommendation service that can provide customized products and services to users is emerging. For example, global companies such as Netflix, Amazon, and Google have introduced personalized recommendation services to support users' purchasing decisions. Accordingly, the user's information search cost can reduce which can positively affect the company's sales increase. The existing personalized recommendation service research applied Collaborative Filtering (CF) technique predicts user preference mainly use quantified information. However, the recommendation performance may have decreased if only use quantitative information. To improve the problems of such existing studies, many studies using reviews to enhance recommendation performance. However, reviews contain factors that hinder purchasing decisions, such as advertising content, false comments, meaningless or irrelevant content. When providing recommendation service uses a review that includes these factors can lead to decrease recommendation performance. Therefore, we proposed a novel recommendation methodology through CNN-based review usefulness score prediction to improve these problems. The results show that the proposed methodology has better prediction performance than the recommendation method considering all existing preference ratings. In addition, the results suggest that can enhance the performance of traditional CF when the information on review usefulness reflects in the personalized recommendation service.

Analysis of Authority Control System in Collecting Repository -from the case of Archival Management System in Korea Democracy Foundation- (수집형 기록관의 전거제어시스템 분석 - 민주화운동기념사업회 사료관리시스템의 사례를 중심으로 -)

  • Lee, Hyun-Jeong
    • The Korean Journal of Archival Studies
    • /
    • no.13
    • /
    • pp.91-134
    • /
    • 2006
  • In general, personally collected archives, manuscripts, are physically badly conditioned and also contextual of the archives and information on the history of production is mostly collected partly in the manuscripts. Therefore they need to control the name of the producers on the archives collected in various ways effectively and accumulate provenance information which is the key element when understanding the production background in the collecting repository. Here, the authority control and provenance information management must be organized from the beginning of acquisition and this means to collect necessary information considering control process of acquisition as well. This thesis is for verifying the necessity of the authority control in collecting repository and accumulation of the provenance information and for suggesting the things to be considered as collecting Archival authority system. For all these, this thesis shows that it has checked out the necessity of the authority control in archival management and archival authority control and researched the standard of archival authority control, work process and accumulation process. Archival provenance information management and authority control in the archival authority control system are organized through the whole steps of the archival management starting from the lead file to the name of the producers at archival registration and archival description at acquisition. And a lot of information is registered and described at the proper point of time and finally all the information including authority control which controls the Heading in the authority management must be organized to use them as an intellectual management of archives and Finding Aids. The features of the Archival authority system are as follows; first of all, Authority file type which is necessary at the archival authority control of democracy movement is made up of the name of the group, person, affair and terminology(subject name). Second of all, basic record structures and description elements in authority collection of Korea Democracy Foundation Archives apply in the paragraph 1 of ISAAR(CPF) adding some necessary elements and details of description rule such as spacing words and using the periods apply in the paragraph 4 of KCR coping with the features of the archival management system. And also the way of input on the authority record is based on EAC(Encoded Archival Context). Third of all, it made users approach to the sources which they want more easily by connecting the authority terms systemically making it possible to connect the relative terms with up and down words, before and after words variously and concretely expanding the term relations rather than earlier traditional authority system which is usually expressed only with relative words (see also). So the authority control of archival management system can effectively collect and manage the function of various and multiple groups and information on main activities as well as its own function which is controlling the Heading and express the multiple and intermediary relationship between archives and producers or between producers and it also provides them with expanded Record information service which satisfies user's various requests through Indexing service. Finally applying in this international standard ISAAR(CPF) through the instance of the authority management like this, it can be referred to making Archival authority system in Collecting repository hereafter by reorganizing the description elements into appropriate formations and setting up the authority file type which is to be managed properly for every service.

A Study on the Verification of an Indoor Test of a Portable Penetration Meter Using the Cone Penetration Test Method (자유낙하 콘관입시험법을 활용한 휴대용 다짐도 측정기의 실내시험을 통한 검증 연구)

  • Park, Geoun Hyun;Yang, An Seung
    • Journal of the Korean GEO-environmental Society
    • /
    • v.20 no.2
    • /
    • pp.41-48
    • /
    • 2019
  • Soil compaction is one of the most important activities in the area of civil works, including road construction, airport construction, port construction and backfilling construction of structures. Soil compaction, particularly in road construction, can be categorized into subgrade compaction and roadbed compaction, and is significant work that when done poorly can serve as a factor causing poor construction due to a lack of compaction. Currently, there are many different types of compaction tests, and the plate bearing test and the unit weight of soil test based on the sand cone method are commonly used to measure the degree of compaction, but many other methods are under development as it is difficult to secure economic efficiency. For the purpose of this research, a portable penetration meter called the Free-Fall Penetration Test (FFPT) was developed and manufactured. In this study, a homogeneous sample was obtained from the construction site and soil was classified through a sieve analysis test in order to perform grain size analysis and a specific gravity test for an indoor test. The principle of FFPT is that the penetration needle installed at the tip of an object put into free fall using gravity is used to measure the depth of penetration into the road surface after subgrade or roadbed compaction has been completed; the degree of compaction is obtained through the unit weight of soil test according to the sand cone method and the relationship between the degree of compaction and the depth of the penetration needle is verified. The maximum allowable grain size of soil is 2.36 mm. For $A_1$ compaction, a trend line was developed using the result of the test performed from a drop height of 10 cm, and coefficient of determination of the trend line was $R^2=0.8677$, while for $D_2$ compaction, coefficient of determination of the trend line was $R^2=0.9815$ when testing at a drop height of 20 cm. Free fall test was carried out with the drop height adjusted from 10 cm to 50 cm at increments of 10 cm. This study intends to compare and analyze the correlation between the degree of compaction obtained from the unit weight of soil test based on the sand cone method and the depth of penetration of the penetration needle obtained from the FFPT meter. As such, it is expected that a portable penetration tester will make it easy to test the degree of compaction at many construction sites, and will lead to a reduction in time, equipment, and manpower which are the disadvantages of the current degree of compaction test, ultimately contributing to accurate and simple measurements of the degree of compaction as well as greater economic feasibility.

A Study on Characteristics and Management of Records of Architectural Cultural Properties (건축문화재 기록의 특성과 관리 방안 연구)

  • Kang, Soo-Na;Kim, Ik-Han
    • The Korean Journal of Archival Studies
    • /
    • no.19
    • /
    • pp.3-55
    • /
    • 2009
  • Records of architectural cultural properties, in case of accidents, show who are to blame, present what evidences are to establish the cause, and also are used for checking if there were any problem in policies and regulations in preserving and caring architectural cultural properties. These records are of great importance in their roles and are of essential use regardless of time and space. Considering its significance, In that architectural cultural properties requires setting clear goals and directions and as well, criteria, for management, we need methods of systematical control and consideration for its characteristics. This research started with the sense of purpose that managing architectural cultural properties are in need of systematic and concrete control, based on the perception that they need protecting and transmitting. The goal of this thesis is to work on the current archiving status of architectural cultural properties by monitoring patterns and processes in archival administration, to diagnose problems by looking into the records creation and management, and to present the improvement plan which would lead to the architectural cultural properties' more efficient management and better use in the future. The management of architectural cultural properties begins with registering and assigning. Cultural Heritage Administration is in charge of control, supervision, and budget and local governments deal with direct management. Accordingly, records are by the hands of each local governmental body. Currently, each cultural property has its management depending on every different working environment in each governmental body. Architectural cultural properties needs managing in one body through the synthetic and unified, concrete and systematic manual and guide for management. Archiving architectural cultural properties have need of unitive management through a professional system, considering the physical characteristics and history of archiving. Unified management system will enhance efficiency and actual use of architectural cultural property records if one governmental body undertakes uniting records through standardization and professional supervision, and data-based unified search engine would enhance efficiency and actual use. Therefore, I suggest that Archives for Architectural Cultural Properties should be established as a professional Archives and wholly responsible body for the purpose of systematically and unifiedly managing architectural cultural property records with professional personnel and facility and transmitting their historical, cultural, and academic value. In Korea, studies up to the present have mainly focused on managing architectural records and records of drawing while few efforts were made to directly deal with managing architectural cultural properties themselves. The focus of this thesis is to study the current status and establish problems of the management of architectural cultural properties in administrative process, and as a result, to propose to establish Archives for Architectural Cultural Properties as a professional archives.

Conflicts and Compromises due to Legal Limitations among the Residents of Folk Villages With a focus on the residents of old houses in Y village of K (민속마을 거주자의 법적 제약으로 인한 충돌과 절충 K지역의 Y마을 고가옥 거주자를 중심으로)

  • Son, Dae Won
    • Korean Journal of Heritage: History & Science
    • /
    • v.42 no.4
    • /
    • pp.74-95
    • /
    • 2009
  • Folk villages have higher historic and cultural values than other villages and contain considerably many traditional elements today. In Korea, there are seven folk villages that are under the protection of the Cultural Properties Protection Act. Unlike other kinds of tangible cultural assets individually appointed according to the act, those folk villages are protected by the act in entirety including the houses and auxiliary structures inhabited and used by the villagers. Since the act covers the entire villages, the residents are not allowed to repair or renovate their structures and accordingly suffer from huge limitations in everyday life with housing life under the biggest restrictions. Being appointed as a folk village is positive from the perspective of preserving the village. However, it is negative to the villagers because of the limitations to their housing lives. While common people lead a convenient life by the introduction of high technologies in modern society, they do not get to benefit from such technologies for the cause of preserving the traditional culture. Upon the appointment, they are subject to all sorts of building regulations and under huge direct and indirect influences of those regulations across many different aspects of life including housing life. Thus the residents of folk villages do have many complaints about the act. It is only natural that there occur conflicts between the state, which tries to preserve the traditional culture according to the act, and the residents, who pursue convenience in life. At the same time, it is natural too that the residents have the desire to pursue convenience in daily life. Thus they renovate their houses illegally. The government agencies are aware of that, however, it is not right for them to enforce the act and restrict their daily lives. Their tacit approval of such illegal renovations is the product of compromises between the residents' right to their private property and the state's policies of cultural asset protection. The residents try to renovate their houses within the limit that will not call for legal restrictions from the government agencies. The government allows for renovations as long as they are within the minimum limit. It is the result of efforts for the state and the residents to stitch up and compromise their own complaints.

The political implication of Malaysia's electoral authoritarian regime collapse: Focusing on the analysis of the 14th general election (말레이시아 선거권위주의 체제 붕괴의 정치적 함의 : 2018년 14대 총선을 중심으로)

  • HWANG, Inwon
    • The Southeast Asian review
    • /
    • v.28 no.3
    • /
    • pp.213-261
    • /
    • 2018
  • On May 9, 2018, regime change took place in Malaysia. It was the first regime change that took place in 61 years after independence in 1957. The regime change was an unexpected result not only in Malaysian experts but also in political circles. Moreover, the outcome of the election was more shocking because the opposition party was divided in this general election. The regime change in Malaysia was enough to attract worldwide attention because it meant the collapse of the oldest regime in the modern political system that exists, except North Korea and China. How could this have happened? In particular, how could the regime change, which had not been accomplished despite opposition parties' cooperation for almost 20 years, could be achieved with the divided opposition forces? What political implications does the 2018 general election result have for political change and democratization in Malaysia? How will the Malaysian politics be developed in the aftermath of the regime change? It is worth noting that during the process of finding answers, a series of general elections since the start of reformasi in 1998 tended to be likened to a series of "tsunami" in the Malaysian electoral history. This phenomenon of tsunami means that, even though very few predicted the possibility of regime change among academia, civil society and political circles, the regime change was not sudden. In other words, the regime in 2018 was the result of the desire and expectation of political change through a series of elections of Malaysian voters last 20 years. In this context, this study, in analyzing the results of the election in 2018, shows that the activation of electoral politics triggered by the reform movement in 1998, along with the specific situational factors in 2018, could lead to collapse of the ruling government for the first time since independence.