• Title/Summary/Keyword: time based strategy

Search Result 1,881, Processing Time 0.029 seconds

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

A Study on the Cost Reduction Strategy of Aviation Ammunition (항공탄약 구매 비용 절감 방안에 관한 연구)

  • Kim, Yu-Hyun;Eom, Jung-Ho
    • Journal of National Security and Military Science
    • /
    • s.15
    • /
    • pp.57-86
    • /
    • 2018
  • The ROKAF has been training for a number of exercise for victory in the war, but the lack of aviation ammunition has become a big issue every year. However, due to the limitation of defense resources, there are many difficulties in securing and stockpiling ammunition for the war readiness. Therefore, there is a need to find a way to secure aviation ammunition for war readiness in a more economical way, so In this study, we analyze the precedent research case and the case of the reduction of the purchase cost of weapon system of other countries, and then I have suggested a plan that is appropriate for our situation. As a result of examining previous research cases for this study, there were data that KIDA studied in 2012, Precision-guided weapons acquisition cost reduction measures pursued by US Air Force And the use of procurement agencies that are being implemented by NATO member countries. Based on this study, the following four measures were proposed to reduce the purchase cost of aviation ammunition. First, the mutual aid support agreement was developed to sign the ammunition joint operation agreement. Second, join the NATO Support & Procurement Agency (NSPA) Third, it builds a purchasing community centered on the countries operating the same ammunition Fourth, participating in the US Air Force's new purchase plan for ammunition and purchase it jointly. The main contents of these four measures are as follows. 1. the mutual aid support agreement was developed to sign the ammunition joint operation agreement. Korea has signed agreements on mutual logistics support with 14 countries including the United States, Israel, Indonesia, Singapore, Australia, and Taiwan. The main purpose of these agreements is mutual support of munitions and materials, also supporting the training of the peace time and promoting exchange and cooperation. However, it is expected that there will be many difficulties in requesting or supporting mutual support in actual situation because the target or scope of mutual aid of ammunition is not clearly specified. Thus, a separate agreement on the mutual co-operation of more specific and expanded concepts of aviation ammunition is needed based on the current mutual aid support agreements 2. join the NATO Support & Procurement Agency (NSPA) In the case of NATO, there is a system in which member countries purchase munitions at a low cost using munitions purchase agencies. It is the NATO Purchasing Agency (NSPA) whose mission is to receive the purchasing requirements of the Member Nations and to purchase them quickly and efficiently and effectively to the Member Nations. NSPA's business includes the Ammunition Support Partnership (ASP), which provides ammunition purchase and disarming services. Although Korea is not a member of NATO, NSPA is gradually expanding the scope of joint procurement of munitions, and it is expected that Korea will be able to join as a member. 3. it builds a purchasing community centered on the countries operating the same ammunition By benchmarking the NSPA system, this study suggested ways to build a purchasing community with countries such as Southeast Asia, Australia, and the Middle East. First, it is necessary to review prospectively how to purchase ammunition by constructing ammunition purchasing community centered on countries using same kind of ammunition. 4. participating in the US Air Force's new purchase plan for ammunition When developing or purchasing weapons systems, joint participation by several countries can reduce acquisition costs. Therefore, if the US Air Force is planning to acquire aviation ammunition by applying it to the purchase of aviation ammunition, we will be able to significantly reduce the purchase cost by participating in this plan. Finally, there are some limitations to the method presented in this study, but starting from this study, I hope that the research on these methods will be actively pursued in the future.

  • PDF

Universal Ethics and Pragmatic Pluralism (보편윤리학과 실용주의적 다원론)

  • Kwon, Su-Hyeon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.446-453
    • /
    • 2021
  • This paper deals with two methods regarding fact and value. One is the method of H. Putnam, which is to break the boundary between fact and value and to make a world where the two have an inherent connection. The other is the method of J. Habermas, which regards fact and value as the product of an intersubjective agreement based on argumentation. Putnam, through his position of internal realism, moves from realism to pragmatism, especially by combining the rationalist tradition of Kant and Dewey's pragmatic views. Habermas also stands in the tradition of rationalism and universalism in Kant, at the same time emphasizing the practicability of truth in Hegel's tradition of historical reason. The significance of the strategy of Putnam and Habermas is that they have attempted to revive the realm of value against the strict dichotomy of facts and values and the subsequent devaluation of rationality in the realm of value. The starting point of this attempt is that the practical foundation of rationality is laid on life and practice. This could provide the room for escaping from rationality, which prioritizes only truths that reveal facts, that is, instrument-reduced rationality, the room for the revival of practical rationality through reflection on what is the purpose of life, and, in turn, the room for resisting to pass the realm of values and norms to the logic of habitual routines or customs. However, despite such common goal, there are clear limitations to Putnam's approach due to the differences in the strategies taken on facts and values. Putnam's method can demolish the whole universal framework that is the foundation where pragmatic pluralism will be fostered, eliminating the difference between the specificity of values and the universality of norms and shaking up the status of universal ethics. Therefore, Habermas' ethical theory is proposed as an alternative to establish a basis for universal ethics by relying on communication rationality and to secure the coercion of norms and blossom cultural pluralism as a diverse lifestyle based on this coercion.

Extension of Platforms and Return of High-Teen Romance Drama (플랫폼의 확장과 하이틴 로맨스 드라마의 귀환)

  • Moon, Sun-Young
    • Journal of Popular Narrative
    • /
    • v.25 no.4
    • /
    • pp.45-71
    • /
    • 2019
  • Through the expansion of platforms in the media era, this paper notes the phenomenon in which 'high-teen romance drama,' a genre which had been marginalized in the past, began to re-emerge. It analyzes the 'high-teen romance drama,' which is moving from TV to the Web and being produced in various ways, while successfully returning to the TV drama format. This study sums up the latest trends in TV and web-based high-teen romance dramas, and as a case study, this paper examines the characteristics of the 'high-teen romance drama' in relation to the platform's environment through the web drama A-Teen, TV drama 18 Moment. Due to the restriction of ratings, high-teen romance dramas have been one of the largely marginalized genres on television. But in the web space, high-teen romance dramas are no longer non-mainstream. The high-teen romance drama has been solidifying its position through the Web, with absolute support from young viewers. Web dramas are gradually expanding their influence on the genre and subject of TV dramas. The high-teen romance drama is one of the most prominent examples of this trend. The popular interest and success of the high-teen romance web drama has brought the forgotten high-teen romance drama back to TV. The web drama A-Teen is a high-teen romance drama about everyday life and love of high school students, and became one of the most popular and popular web dramas, leading to a Season 2. A-Teen actively utilizes teenage culture and expression, and a strategy that leads to empathy among teenage viewers. In A-Teen, love is recreated in a way that relieves the depth of overconsumption emotions. Instead of dealing in depth with the inner conflict over love, it takes an approach ofpresenting the emotional change of love in real time and forming a consensus with the acceptor. The TV drama 18 Moment is one of the programs that has helped refocus attention to TV-hitting romance dramas. 18 Moment underlines the growth of the characters, with the main characters reaching maturity through love as fresh and innocent teenagers. The TV drama 18 Moment is a high-teen romance drama that has been transformed into a way to apply the web-fadding high-times grammar while retaining the typicality of existing TV hagwons to suit the TV broadcasting environment. As the Internet becomes more ubiquitous, video content is changing based on the newly emerging platforms. Dramas no longer mean just traditional television media. While considering the limitations of TV, this paper analyzed the background of the rebirth of the high-teen romance drama, which had been marginalized, through the web platform. This is meaningful in that it identifies and considers the increasing popularity of this genre of drama.

The Roles of Service Failure and Recovery Satisfaction in Customer-Firm Relationship Restoration : Focusing on Carry-over effect and Dynamics among Customer Affection, Customer Trust and Loyalty Intention Before and After the Events (서비스실패의 심각성과 복구만족이 고객-기업 관계회복에 미치는 영향 : 실패이전과 복구이후 고객애정, 고객신뢰, 충성의도의 이월효과 및 역학관계 비교를 중심으로)

  • La, Sun-A
    • Journal of Distribution Research
    • /
    • v.17 no.1
    • /
    • pp.1-36
    • /
    • 2012
  • Service failure is one of the major reasons for customer defection. As the business environment gets tougher and more competitive, a single service failure might bring about fatal consequences to a service provider or a firm. Sometimes a failure won't end up with an unsatisfied customer's simple complaining but with a wide-spread animosity against the service provider or the firm, leading to a threat to the firm's survival itself in the society. Therefore, we are in need of comprehensive understandings of complainants' attitudes and behaviors toward service failures and firm's recovery efforts. Even though a failure itself couldn't be fixed completely, marketers should repair the mind and heart of unsatisfied customers, which can be regarded as an successful recovery strategy in the end. As the outcome of recovery efforts exerted by service providers or firms, recovery of the relationship between customer and service provider need to put on the top in the recovery goal list. With these motivations, the study investigates how service failure and recovery makes the changes in dynamics of fundamental elements of customer-firm relationship, such as customer affection, customer trust and loyalty intention by comparing two time points, before the service failure and after the recovery, focusing on the effects of recovery satisfaction and the failure severity. We adopted La & Choi (2012)'s framework for development of the research model that was based on the previous research stream like Yim et al. (2008) and Thomson et al. (2005). The pivotal background theories of the model are mainly from relationship marketing and social relationships of social psychology. For example, Love, Emotional attachment, Intimacy, and Equity theories regarding human relationships were reviewed. As the results, when recovery satisfaction is high, customer affection and customer trust that were established before the service failure are carried over to the future after the recovery. However, when recovery satisfaction is low, customer-firm relationship that had already established in the past are not carried over but broken up. Regardless of the degree of recovery satisfaction, once a failure occurs loyalty intention is not carried over to the future and the impact of customer trust on loyalty intention becomes stronger. Such changes imply that customers become more prudent and more risk-aversive than the time prior to service failure. The impact of severity of failure on customer affection and customer trust matters only when recovery satisfaction is low. When recovery satisfaction is high, customer affection and customer trust become severity-proof. Interestingly, regardless of the degree of recovery satisfaction, failure severity has a significant negative influence on loyalty intention. Loyalty intention is the most fragile target when a service failure occurs no matter how severe the failure criticality is. Consequently, the ultimate goal of service recovery should be the restoration of customer-firm relationship and recovery of customer trust should be the primary objective to accomplish for a successful recovery performance. Especially when failure severity is high, service recovery should be perceived highly satisfied by the complainants because failure severity matters more when recovery satisfaction is low. Marketers can implement recovery strategies to enhance emotional appeals as well as fair treatments since the both impacts of affection and trust on loyalty intention are significant. In the case of high severity of failure, recovery efforts should be exerted to overreach customer expectation, designed to directly repair customer trust and elaborately designed in the focus of customer-firm communications during the interactional recovery process to affect customer trust rebuilding indirectly. Because it is a longer and harder way to rebuild customer-firm relationship for high severity cases, low recovery satisfaction cannot guarantee customer retention. To prevent customer defection due to service failure of high severity, unexpected rewards as a recovery will be likely to be useful since those will lead to customer delight or customer gratitude toward the service firm. Based on the results of analyses, theoretical and managerial implications are presented. Limitations and future research ideas are also discussed.

  • PDF

LINAC-based Stereotactic Radiosurgery for Meningiomas (수막종에 대한 선형가속기형 정위방사선수술)

  • Shin Seong Soo;Kim Dae Yong;Ahn Yong Chan;Lee Jung Il;Nam Do-Hyun;Lim Do Hoon;Huh Seung Jae;Yeo Inhwan J;Shin Hyung Jin;Park Kwan;Kim BoKyoung;Kim Jong Hyun
    • Radiation Oncology Journal
    • /
    • v.19 no.2
    • /
    • pp.87-94
    • /
    • 2001
  • Purpose : To evaluate the role of LINAC-based stereotactic radiosurgery (SRS) in the management of meningiomas, we reviewed clinical response, image response, neurological deficits for patients treated at our institution. Methods and materials : Between February 1995 and December 1999, twenty-six patients were treated with SRS. Seven patients had undergone prior resection. Nineteen patients received SRS as the initial treatment. There were 7 male and 19 female patients. The median age was 51 years (range, $14\~67\;years$). At least one clinical symptom presented at the time of SRS in 17 patients and cranial neuropathy was seen in 7 patients. The median tumor volume was $4.7\;cm^3\;(range,\;0.7\~16.5\;m^3)$. The mean marginal dose was 15 Gy (range, $10\~20\;Gy$), delivered to the $80\%$ isodose surface (range, $46\~90\%$). The median clinical and imaging follow-up periods were 27 months (range, 1-71 months) and 25 months (range, $1\~52\;months$), respectively. Results : Of 14 patients who had clinical follow-up of one year or longer, thirteen patients $(93\%)$ were improved clinically at follow-up examination. Clinical symptom worsened in one patient at 4 months after SRS as a result of intratumoral edema, who underwent surgical resection at 7 months. OF 14 patients who had radiologic follow-up of one year or longer, tumor volume decreased in 7 patients $(50\%)$ at a median of 11 months (range, $6\~25\;months$), remained stable in 6 patients $(43\%)$, and increased in one patient $(7\%)$, who underwent surgical resection at 44 months. New radiation-induced neurological deficits developed in six patients $(23\%)$. Five patients $(19\%)$ had transient neurological deficits, completely resolved by conservative treatment including steroid therapy. Radiation-induced brain necrosis developed in one patient $(3.8\%)$ at 9 months after SRS who followed by surgical resection of tumor and necrotic tissue. Conclusions : LINAC-based SRS proves to be an effective and safe management strategy for small to moderate sized meningiomas, inoperable, residual, and recurrent, but long-term follow-up will be necessary to fully evaluate its efficacy. To reduce the radiation-induced neurological deficit for large size meningioma and/or in the proximity of critical and neural structure, more delicate treatment planning and optimal decision of radiation dose will be necessary.

  • PDF

A Study of the Effect of Model Characteristics on Purchasing intentions and Brand Attitudes (광고모델 특성이 구매의도와 브랜드태도에 미치는 영향)

  • Kim, Sung-Duck;Youn, Myoung-Kil;Kim, Ki-Soo
    • Journal of Distribution Science
    • /
    • v.10 no.4
    • /
    • pp.47-53
    • /
    • 2012
  • Businesses make use of advertising strategy using models to give consumers efficient product information. Modern advertisements often make use of models for greater reminiscence to create messages and remind viewers of the product. The purpose of this study was to examine the characteristics of each type of model. The subjects were 230 college students in their twenties or older, and the material was collected from October 20, 2011 to November 5, 2011 to examine the effects of model characteristics on buying intention as well as attitude toward a brand. A questionnaire survey was used; investigators gave one copy to each interviewee. The study investigated the characteristics of each model using a questionnaire of each 40 copies with five kinds of photographs. The characteristics of models had great influence on buying intention and attitude toward the brand: First, factor 2 (being honest and virtuous and having good credit and a good press assessment) and factor 3 (being interesting and a good communicator and creating good memories) had great influence on buying intention. Factor 2 was explained by reliability, and factor 3 by the efficiency of the model in creating a feeling. Second, factors 1 (being attractive, smart, unique, friendly, loved by others, and popular), 2, and 3 influenced attitude toward brand. Factor 1 encapsulated the outgoing characteristics of a model, factor 2 was based on reliability, and factor 3 was based on the efficiency of the model in creating a feeling. The model's positive effects on buying intention and attitudes toward brand shall be examined. For their positive influence on buying intention, reliability and efficiency shall be given attention. For their positive influence on attitude toward brand, creating a good impression, having outgoing characteristics, being reliable, and efficiency shall be given attention. The findings were as follows: Model characteristics influencing buying intention were similar to those influencing attitude toward brand. The differences were as follows. First, reliability and efficiency influenced buying intention. When customers were asked to consider the influence on buying intention of an advertisement, regardless of the strength of the buying intention, they considered these two characteristics. Customers decided to buy based not only on the credibility of the product as presented in the advertisement but also the transmission of the contents of the advertisement. Second, outgoing characteristics, reliability, and efficiency influenced attitude toward a brand. The attitude toward a brand was said to be the attitude toward the business. The attitude is produced even after buying, so businesses view it as very important. The attitude might vary depending upon the model used rather than the brand. Therefore, a model with outgoing characteristics was thought to be important. Therefore, attitude toward a brand whose model influenced buying intention as well as attitude toward brand had outgoing characteristics. The result is that an image the model was related to attitude toward the brand. As such, customers would buy the goods advertised. However, an outgoing image of a model was also important to create a positive attitude toward a business brand. For instance, talent Park Gyeong-Rim's photo was used to promote cosmetics about 10 years ago. When she worked as a model of cosmetics products, she had to make compensation for losses and damages because she made a mistake on a talk show program. At that time, customers who had bought the cosmetics product asked for refunds of several billion won. As such, models who are said to be the face of the businesses they represent can play an important role. To advertise in the most attractive and effective way, the current image of a model should be investigated by examining current activities and news articles after selecting the model, and the model's efficiency and attitude toward the brand should be examined. Factors that stimulate customers' buying decisions can be used to plan advertisement that have positive influence on a brand. This study had the limitation of investigating mainly college students and there were insufficient copies of the questionnaire. The investigation was not done widely but in detail so that a concrete investigation could not be done. Further studies shall supplement these shortcomings and discuss new directions.

  • PDF

Analysis of shopping website visit types and shopping pattern (쇼핑 웹사이트 탐색 유형과 방문 패턴 분석)

  • Choi, Kyungbin;Nam, Kihwan
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.1
    • /
    • pp.85-107
    • /
    • 2019
  • Online consumers browse products belonging to a particular product line or brand for purchase, or simply leave a wide range of navigation without making purchase. The research on the behavior and purchase of online consumers has been steadily progressed, and related services and applications based on behavior data of consumers have been developed in practice. In recent years, customization strategies and recommendation systems of consumers have been utilized due to the development of big data technology, and attempts are being made to optimize users' shopping experience. However, even in such an attempt, it is very unlikely that online consumers will actually be able to visit the website and switch to the purchase stage. This is because online consumers do not just visit the website to purchase products but use and browse the websites differently according to their shopping motives and purposes. Therefore, it is important to analyze various types of visits as well as visits to purchase, which is important for understanding the behaviors of online consumers. In this study, we explored the clustering analysis of session based on click stream data of e-commerce company in order to explain diversity and complexity of search behavior of online consumers and typified search behavior. For the analysis, we converted data points of more than 8 million pages units into visit units' sessions, resulting in a total of over 500,000 website visit sessions. For each visit session, 12 characteristics such as page view, duration, search diversity, and page type concentration were extracted for clustering analysis. Considering the size of the data set, we performed the analysis using the Mini-Batch K-means algorithm, which has advantages in terms of learning speed and efficiency while maintaining the clustering performance similar to that of the clustering algorithm K-means. The most optimized number of clusters was derived from four, and the differences in session unit characteristics and purchasing rates were identified for each cluster. The online consumer visits the website several times and learns about the product and decides the purchase. In order to analyze the purchasing process over several visits of the online consumer, we constructed the visiting sequence data of the consumer based on the navigation patterns in the web site derived clustering analysis. The visit sequence data includes a series of visiting sequences until one purchase is made, and the items constituting one sequence become cluster labels derived from the foregoing. We have separately established a sequence data for consumers who have made purchases and data on visits for consumers who have only explored products without making purchases during the same period of time. And then sequential pattern mining was applied to extract frequent patterns from each sequence data. The minimum support is set to 10%, and frequent patterns consist of a sequence of cluster labels. While there are common derived patterns in both sequence data, there are also frequent patterns derived only from one side of sequence data. We found that the consumers who made purchases through the comparative analysis of the extracted frequent patterns showed the visiting pattern to decide to purchase the product repeatedly while searching for the specific product. The implication of this study is that we analyze the search type of online consumers by using large - scale click stream data and analyze the patterns of them to explain the behavior of purchasing process with data-driven point. Most studies that typology of online consumers have focused on the characteristics of the type and what factors are key in distinguishing that type. In this study, we carried out an analysis to type the behavior of online consumers, and further analyzed what order the types could be organized into one another and become a series of search patterns. In addition, online retailers will be able to try to improve their purchasing conversion through marketing strategies and recommendations for various types of visit and will be able to evaluate the effect of the strategy through changes in consumers' visit patterns.

A Study on Intelligent Value Chain Network System based on Firms' Information (기업정보 기반 지능형 밸류체인 네트워크 시스템에 관한 연구)

  • Sung, Tae-Eung;Kim, Kang-Hoe;Moon, Young-Su;Lee, Ho-Shin
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.3
    • /
    • pp.67-88
    • /
    • 2018
  • Until recently, as we recognize the significance of sustainable growth and competitiveness of small-and-medium sized enterprises (SMEs), governmental support for tangible resources such as R&D, manpower, funds, etc. has been mainly provided. However, it is also true that the inefficiency of support systems such as underestimated or redundant support has been raised because there exist conflicting policies in terms of appropriateness, effectiveness and efficiency of business support. From the perspective of the government or a company, we believe that due to limited resources of SMEs technology development and capacity enhancement through collaboration with external sources is the basis for creating competitive advantage for companies, and also emphasize value creation activities for it. This is why value chain network analysis is necessary in order to analyze inter-company deal relationships from a series of value chains and visualize results through establishing knowledge ecosystems at the corporate level. There exist Technology Opportunity Discovery (TOD) system that provides information on relevant products or technology status of companies with patents through retrievals over patent, product, or company name, CRETOP and KISLINE which both allow to view company (financial) information and credit information, but there exists no online system that provides a list of similar (competitive) companies based on the analysis of value chain network or information on potential clients or demanders that can have business deals in future. Therefore, we focus on the "Value Chain Network System (VCNS)", a support partner for planning the corporate business strategy developed and managed by KISTI, and investigate the types of embedded network-based analysis modules, databases (D/Bs) to support them, and how to utilize the system efficiently. Further we explore the function of network visualization in intelligent value chain analysis system which becomes the core information to understand industrial structure ystem and to develop a company's new product development. In order for a company to have the competitive superiority over other companies, it is necessary to identify who are the competitors with patents or products currently being produced, and searching for similar companies or competitors by each type of industry is the key to securing competitiveness in the commercialization of the target company. In addition, transaction information, which becomes business activity between companies, plays an important role in providing information regarding potential customers when both parties enter similar fields together. Identifying a competitor at the enterprise or industry level by using a network map based on such inter-company sales information can be implemented as a core module of value chain analysis. The Value Chain Network System (VCNS) combines the concepts of value chain and industrial structure analysis with corporate information simply collected to date, so that it can grasp not only the market competition situation of individual companies but also the value chain relationship of a specific industry. Especially, it can be useful as an information analysis tool at the corporate level such as identification of industry structure, identification of competitor trends, analysis of competitors, locating suppliers (sellers) and demanders (buyers), industry trends by item, finding promising items, finding new entrants, finding core companies and items by value chain, and recognizing the patents with corresponding companies, etc. In addition, based on the objectivity and reliability of the analysis results from transaction deals information and financial data, it is expected that value chain network system will be utilized for various purposes such as information support for business evaluation, R&D decision support and mid-term or short-term demand forecasting, in particular to more than 15,000 member companies in Korea, employees in R&D service sectors government-funded research institutes and public organizations. In order to strengthen business competitiveness of companies, technology, patent and market information have been provided so far mainly by government agencies and private research-and-development service companies. This service has been presented in frames of patent analysis (mainly for rating, quantitative analysis) or market analysis (for market prediction and demand forecasting based on market reports). However, there was a limitation to solving the lack of information, which is one of the difficulties that firms in Korea often face in the stage of commercialization. In particular, it is much more difficult to obtain information about competitors and potential candidates. In this study, the real-time value chain analysis and visualization service module based on the proposed network map and the data in hands is compared with the expected market share, estimated sales volume, contact information (which implies potential suppliers for raw material / parts, and potential demanders for complete products / modules). In future research, we intend to carry out the in-depth research for further investigating the indices of competitive factors through participation of research subjects and newly developing competitive indices for competitors or substitute items, and to additively promoting with data mining techniques and algorithms for improving the performance of VCNS.

Territorial Expansion the King Võ (Võ Vương, 1738-1765) in the Mekong Delta: Variation of Tám Thực Chi Kế (strategy of silkworm nibbling) and Dĩ Man Công Man (to strike barbarians by barbarians) in the Way to Build a New World Order (무왕(武王, 1738-1765) 시기 메콩 델타에서의 영토 확장 추이: 제국으로 가는 길, '잠식지계(蠶食之計)'와 '이만공만(以蠻攻蠻)'의 변주)

  • CHOI, Byung Wook
    • The Southeast Asian review
    • /
    • v.27 no.2
    • /
    • pp.37-76
    • /
    • 2017
  • $Nguy{\tilde{\hat{e}}}n$ Cư Trinh has two faces in the history of territorial expansion of Vietnam into the Mekong delta. One is his heroic contribution to the $Nguy{\tilde{\hat{e}}}n$ family gaining control over the large part of the Mekong delta. The other is his role to make the eyes of readers of Vietnamese history be fixed only to the present territory of Vietnam. To the readers, $Nguy{\tilde{\hat{e}}}n$ Cư Trinh's achievement of territorial expansion was the final stage of the nam $ti{\acute{\hat{e}}n$ of Vietnam. In fact, however, his achievement was partial. This study pays attention to the King $V{\tilde{o}}$ instead of $Nguy{\tilde{\hat{e}}}n$ Cư Trinh in the history of the territorial expansion in the Mekong delta. King's goal was more ambitious. And the ambition was propelled by his dream to build a new world, and its order, in which his new capital, $Ph{\acute{u}}$ $Xu{\hat{a}}n$ was to be the center with his status as an emperor. To improve my assertion, three elements were examined in this article. First is the nature of $V{\tilde{o}}$ Vương's new kingship. Second is the preparation and the background of the military operation in the Mekong Delta. The nature of the new territory is the third element of the discussion. In 1744, six years after this ascending to the throne, $V{\tilde{o}}$ Vương declared he was a king. Author points out this event as the departure of the southern kingdom from the traditional dynasties based on the Red River delta. Besides, the government system, northern custom and way of dressings were abandoned and new southern modes were adopted. $V{\tilde{o}}$ Vương had enough tributary kingdoms such as Cambodia, Champa, Thủy $X{\tilde{a}}$, Hoả $X{\tilde{a}}$, Vạn Tượng, and Nam Chưởng. Compared with the $L{\hat{e}}$ empire, the number of the tributary kingdoms was higher and the number was equivalent to that of the Đại Nam empire of the 19th century. In reality, author claims, the King $V{\tilde{o}}^{\prime}s$ real intention was to become an emperor. Though he failed in using the title of emperor, he distinguished himself by claiming himself as the Heaven King, $Thi{\hat{e}}n$ Vương. Cambodian king's attack on the thousands of Cham ethnics in Cambodian territory was an enough reason to the King $V{\tilde{o}}^{\prime}s$ military intervention. He considered these Cham men and women as his amicable subjects, and he saw them a branch of the Cham communities in his realm. He declared war against Cambodia in 1750. At the same time he sent a lengthy letter to the Siamese king claiming that the Cambodia was his exclusive tributary kingdom. Before he launched a fatal strike on the Mekong delta which had been the southern part of Cambodia, $V{\tilde{o}}$ Vương renovated his capital $Ph{\acute{u}}$ $Xu{\hat{a}}n$ to the level of the new center of power equivalent to that of empire for his sake. Inflation, famine, economic distortion were also the features of this time. But this study pays attention more to the active policy of the King $V{\tilde{o}}$ as an empire builder than to the economic situation that has been told as the main reason for King $V{\tilde{o}}^{\prime}s$ annexation of the large part of the Mekong delta. From the year of 1754, by the initiative of $Nguy{\tilde{\hat{e}}}n$ Cư Trinh, almost whole region of the Mekong delta within the current border line was incorporated into the territory of $V{\tilde{o}}$ Vương within three years, though the intention of the king was to extend his land to the right side of the Mekong Basin beyond the current border such as Kampong Cham, Prey Vieng, and Svai Rieng. The main reason was $V{\tilde{o}}$ Vương's need to expand his territory to be matched with that of his potential empire with the large number of the tributary kingdoms. King $V{\tilde{o}}^{\prime}s$ strategy was the variation of 'silkworm nibbling' and 'to strike barbarians by barbarians.' He ate the land of Lower Cambodia, the region of the Mekong delta step by step as silkworm nibbles mulberry leave(general meaning of $t{\acute{a}}m$ thực), but his final goal was to eat all(another meaning of $t{\acute{a}}m$ thực) the part of the Mekong delta including the three provinces of Cambodia mentioned above. He used Cham to strike Cambodian in the process of getting land from Long An area to $Ch{\hat{a}}u$ Đốc. This is a faithful application of the Dĩ Man $C{\hat{o}}ng$ Man (to strike barbarians by barbarians). In addition he used Chinese refugees led by the Mạc family or their quasi kingdom to gain land in the region of $H{\grave{a}}$ $Ti{\hat{e}}n$ and its environs from the hand of Cambodian king. This is another application of Dĩ Man $C{\hat{o}}ng$ Man. In sum, author claims a new way of looking at the origin of the imperial world order which emerged during the first half of the 19th century. It was not the result of the long history of Đại Việt empires based on the Red River delta, but the succession of the King $V{\tilde{o}}^{\prime}s$ new world based on $Ph{\acute{u}}$ $Xu{\hat{a}}n$. The same ways of Dĩ Man $C{\hat{o}}ng$ Man and $T{\acute{a}}m$ Thực Chi $K{\acute{\hat{e}}}$ were still used by $V{\tilde{o}}^{\prime}s$ descendents. His grandson Gia Long used man such as Thai, Khmer, Lao, Chinese, and European to win another man the '$T{\hat{a}}y$ Sơn bandits' that included many of Chinese pirates, Cham, and other mountain peoples. His great grand son Minh Mạng constructed a splendid empire. At the same time, however, Minh Mạng kept expanding the size of his empire by eating all the part of Cambodia and Cham territories.