검색결과

검색조건
좁혀보기
검색필터
결과 내 재검색

간행물

    분야

      발행연도

      -

        검색결과 16

        1.
        2023.12 KCI 등재 구독 인증기관 무료, 개인회원 유료
        The computer system validation consulting industry is growing as domestic GMP companies' overseas exports or advancements increase, and computer system validation has been mandatory in Korea since the 2010s, but domestic CSV consulting companies are small in size and have a short history, revealing many shortcomings in terms of service quality and customer satisfaction when conducting consulting. Research related to consulting has been mainly focused on management consulting and IT consulting, and research related to computer system validation is very insufficient. This study confirmed the effect of consultant competency and service quality on consulting performance, customer satisfaction, and intention to renew contract when performing computer system validation through empirical research on food, pharmaceutical, cosmetics, and medical device companies, which are representative companies in the GMP industry. As a result, it was confirmed that consultant competency and service quality had a significant effect on consulting performance, customer satisfaction, and intention to renew contract. In addition, it was confirmed that the reputation and expertise of consulting companies had a moderating effect on the relationship between consultant competency and consulting performance.
        5,400원
        2.
        2017.06 KCI 등재 구독 인증기관 무료, 개인회원 유료
        The competition to acquire customers with repurchase intention is getting more and more intense in the saturated smartphone market. That is why the aim of this study is to investigate the difference in purchasing determinants between various age groups and gender. Furthermore we aimed to analyze which of the purchasing determinants influence repurchase intention. In order to gather information we conducted a survey on 252 respondents. We selected 5 purchasing determinants (A/S, H/W, switching cost, network effect and design) by conducting factor analysis and validity analysis. Then we analyzed how respondents of different age groups and gender perceived different purchasing determinants and analyzed the influence purchasing determinants have on repurchase intention. As for analyzing the difference of purchasing determinants throughout various age groups, the H/W, A/S, network effect showed a notable difference. The older respondents tended to consider H/W, A/S , network effect more importantly than younger respondents. When it came to comparing the results depending on the gender, male respondents tended to consider H/W factor more importantly compared to female respondents and the opposite was true for other factors such as A/S, switching cost, design, and network effect but there weren’t any significant differences. Finally, out of various determinant factors, network effect and design turned out to have a considerable influence on repurchase intention. That is why it would be highly appropriate to say that if a company intends to boost repurchase intention, enhancing network effect and developing an effective design would be crucial. This study differs from other existing researches in that we analyzed respondents from different age groups and gender separately. Also unlike other researches we directly analyzed the influence purchasing determinants have on repurchase intention not customer satisfaction. This study is expected to serve as basic information that can be used to establish strategies both in an academic and practical level, allowing companies to boost the repurchase intention of the smartphone market.
        4,300원
        3.
        2017.03 KCI 등재 구독 인증기관 무료, 개인회원 유료
        The purpose of this study is to investigate the influence of determinants of Smartphone purchasing such as A/S, brand, H/W, switching cost, design on customer satisfaction and verify the accordance of the results of existing researches and our research with customers’ actual experience. The study also sought to confirm if moderating effects exist between determinants of Smartphone purchasing and customer satisfaction by age, gender. Data for this study was gathered by analyzing the results of a survey we conducted on 252 respondents. By taking into account the results of antecedent researches, we determined A/S, brand, H/W, switching cost, design as the 5 main factors that influence Smartphone purchasing behavior. We focused on analyzing the effect determinants of Smartphone purchasing has on consumer satisfaction and whether there exist any moderating effects between the determinants of Smartphone purchasing and consumer satisfaction by age and gender. As a result, we found out that design, brand, H/W had a significant influence on consumer satisfaction in the descending order. Switching cost and A/S turned out to have very little influence on consumer satisfaction. Also as a result of analyzing the moderating effects between determinants of Smartphone purchasing and consumer satisfaction by age and gender, the study verified that that A/S had the most significant influence as a moderating effect on age. And as for gender, switching cost was turned out to have a significant influence. The result of this study indicates several academic and practical implications for customer satisfaction of Smartphone business. Therefore, this result is expected to contribute to verifying influential factors of customer satisfaction improvement both academically and practically.
        4,500원
        4.
        2016.12 KCI 등재 구독 인증기관 무료, 개인회원 유료
        As information system is getting higher and amount of information assets is increasing, skills of threatening subjects are more advanced, so that it threatens precious information assets of ours. The purpose of this study is to present a strategic direction for the types of companies seeking access to information security. The framework classifies companies into eight types so company can receive help in making decisions for the development of information security strategy depending on the type of company it belongs to. Paired comparison method survey conducted by a group of information security experts to determine the priority and the relative importance of information security management elements. The factors used in the security response strategy are the combination of the information security international certification standard ISO 27001, domestic information protection management system certification K-ISMS, and personal information security management system certification PIMS. Paired comparison method was then used to determine strategy alternative priorities for each type. Paired comparisons were conducted to select the most applicable factors among the 12 strategic factors. Paired comparison method questionnaire was conducted through e-mail and direct questionnaire survey of 18 experts who were engaged in security related tasks such as security control, architect, security consulting. This study is based on the idea that it is important not to use a consistent approach for effective implementation of information security but to change security strategy alternatives according to the type of company. The results of this study are expected to help the decision makers to produce results that will serve as the basis for companies seeking access to information security first or companies seeking to establish new information security strategies.
        4,000원
        5.
        2016.09 KCI 등재 구독 인증기관 무료, 개인회원 유료
        For most organizations, a security infrastructure to protect company’s core information and their technology is becoming increasingly important. So various approaches to information security have been made but many security accidents are still taking place. In fact, for many Korean companies, information security is perceived as an expense, not an asset. In order to change this perception, it is very important to recognize the need for information security and to find a rational approach for information security. The purpose of this study is to present a framework for information security strategies of companies. The framework classifies companies into eight types so company can receive help in making decisions for the development of information security strategy depending on the type of company it belongs to. To develope measures to classify the types of companies, 12 information security professionals have done brainstorming, and based on previous studies, among the factors that have been demonstrated to be able to influence the information security of the enterprise, three factors have been selected. Delphi method was applied to 29 security experts in order to determine sub items for each factor, and then final items for evaluation was determined by verifying the content validity and reliability of the components through the SPSS analysis. Then, this study identified characteristics of each type of eight companies from a security perspective by utilizing the developed sub items, and summarized what kind of actual security accidents happened in the past.
        4,300원
        6.
        2016.06 KCI 등재 구독 인증기관 무료, 개인회원 유료
        As technology has developed and cost for data processing has reduced, big data market has grown bigger. Developed countries such as the United States have constantly invested in big data industry and achieved some remarkable results like improving advertisement effects and getting patents for customer service. Every company aims to achieve long-term survival and profit maximization, but it needs to establish a good strategy, considering current industrial conditions so that it can accomplish its goal in big data industry. However, since domestic big data industry is at its initial stage, local companies lack systematic method to establish competitive strategy. Therefore, this research aims to help local companies diagnose their big data capabilities through a reference model and big data capability assessment system. Big data reference model consists of five maturity levels such as Ad hoc, Repeatable, Defined, Managed and Optimizing and five key dimensions such as Organization, Resources, Infrastructure, People, and Analytics. Big data assessment system is planned based on the reference model’s key factors. In the Organization area, there are 4 key diagnosis factors, big data leadership, big data strategy, analytical culture and data governance. In Resource area, there are 3 factors, data management, data integrity and data security/privacy. In Infrastructure area, there are 2 factors, big data platform and data management technology. In People area, there are 3 factors, training, big data skills and business-IT alignment. In Analytics area, there are 2 factors, data analysis and data visualization. These reference model and assessment system would be a useful guideline for local companies.
        4,000원
        7.
        2015.12 KCI 등재 구독 인증기관 무료, 개인회원 유료
        Corporation’s valuable intelligent asset is being threatened from the skills of threatening subject that has been evolved along with the growth of the information system and the amount of the information asset. Domestically, attempts of various private information attacks, important information extortion, and information damage have been detected, and some of them have abused the vulnerability of security of information system, and have become a severe social problem that generates security incident. When accessing to the security, most of companies used to establish a strategy with a consistent manner and a solution plan. However, this is not a proper way. The order of priorities vary depending on the types of business. Also, the scale of damage varies significantly depending on the types of security incidents. And method of reaction and critical control point vary depending on the types of business and security incidents. In this study, I will define the security incidents by their types and preponderantly examine how one should react to those security incidents. In this study, analyzed many types of security accidents that can occur within a corporation and an organization considering various factors. Through this analysis, thought about factors that has to be considered by corporations and organizations when they intend to access to the information security. This study focuses on the response methodology based on the analysis of the case analysis of the leakage of industrial secret and private secret other than the conceptual response methodology that examines the way to prevent the leakage of the industry security systems and the industry information activities. And based on these factors, want to be of help for corporations to apply a reasonable approach when they establish a strategy to information security.
        4,000원
        8.
        2014.12 KCI 등재 구독 인증기관 무료, 개인회원 유료
        This study aims to observe effects of global R&D cooperation outcomes and global business abilities of small businesses by a national aid program. This study selected a program, Industry Technical Global Cooperation Project launched from Korea Institute for Advancement of Technology (KIAT). Also, small businesses CEOs’ roll and efficiency are very important to increase outcomes and improve abilities of their companies. In this study, CEO’s global level or ability is regarded of small businesses’ global level. Then, this study shows positive effects between a national aid program and global R&D cooperation outcome and between global R&D cooperation outcome and global business abilities.
        4,000원
        9.
        2014.09 KCI 등재 구독 인증기관 무료, 개인회원 유료
        The government expands its investment on R&D programs for economic growth, thus there is growing attention on the result of R&D Programs. This study proposes more improved measuring method for efficiency when the number of R&D programs is not enough to be for measuring efficiency analysis. It provides more various application method of factors on efficiency analysis. This study analyzes the influence of each input factor on efficiency by using partial efficiency concept. And it also determines input factors in similar influence throughout Spearman correlation coefficient. Finally, it suggests new method to improve discriminatory power of efficiency analysis by determining representative factors. Also, the proposed method can be practiced not only for national R&D programs, but also for other fields of research.
        4,000원
        10.
        2014.05 구독 인증기관 무료, 개인회원 유료
        The government expands its investment on R&D programs for economic growth, thus there are growing attention on the result of R&D programs. However, our existing research is in the circumstance of only measuring efficiency, but not reflecting unique characteristics of R&D programs. In this study, it provides more developed method for efficiency analysis in national R&D programs by using partial efficiency concept and measuring influence of input factors. It analyzes the influence of each input factor on efficiency by using partial efficiency concept. And it also determines input factors in similar influence throughout Spearman correlation coefficient. Finally, it suggests new method to improve discriminatory power of efficiency analysis by determining representative factors.
        3,000원
        11.
        2008.03 KCI 등재 구독 인증기관 무료, 개인회원 유료
          Enhanced machine reliability has dramatically reduced the rate and number of railway accidents but for further reduction human error should be considered together that accounts for about 20% of the accidents. Therefore, the objective of this study was t
        4,000원
        12.
        2006.06 KCI 등재 구독 인증기관 무료, 개인회원 유료
          Internet shopping mall has become a huge distribution channel with dramatic growth in recent years. The number of consumers has exponentially increased as the scale of shopping mall has been large so that shopping malls with thousands or millions of con
        4,000원
        13.
        2005.06 KCI 등재 구독 인증기관 무료, 개인회원 유료
        The main purpose of this paper is to develop the Management Resource Analysis System for KOTRA which is based on Activity Based Costing(ABC), Because the products and services of KOTRA are exclusive and include a government subsidy, we need develop a diff
        4,500원
        14.
        2007.04 KCI 등재 서비스 종료(열람 제한)
        From the EtOAc fraction of Eugenia caryophyllata, four compounds were isolated through activity-guided silica gel column chromatography, From the result of spectroscopic data including NMR, MS and IR, the chemical structures of the compounds were determined as 1-allyl-4-hydroxy-3-methoxybezene acetate (eugenol acetate, 1), 1-allyl-4-hydroxy-3-methoxybezene (eugenol, 2), 3β-hydroxyolean-12-en-28-oic acid (oleanolic acid, 3) and 2α, 3β-dihydroxyolean-12-en-28-oic acid (maslinic acid, 4). Compounds 3 and 4 were isolated for the first time from this plant. Also, compounds 1, 2 and 3 exhibited relatively high platelet aggregation inhibitory activity with the IC50 values of 0.24, 0.09 and 0.07 mM, respectively. Compound 2 significantly prolonged activated partial thromboplastin time (aPTT) with the value of 124±11.2 seconds as compared to the control with the value of 37.5±2.2 seconds at the concentration of 50 μg/ml. Compounds 1 and 3 revealed inhibitory activity on farnesyl protein transferase (FPTase) with the IC50 values of 0.49 and 0.24 mM and compounds 1 and 2 highly inhibited the growth of rat-H-ras cells with the Gl50 values of 6.63 and 5.70 μm, respectively.
        15.
        2006.10 KCI 등재 서비스 종료(열람 제한)
        Three stigmastane-type sterols and one ergostane-type sterol were isolated from the ethyl acetate soluble fraction of the aerial parts of Artemisia princeps Pampanini (Sajuarissuk). From the results of physico-chemical data including NMR, MS and IR, the chemical structures of the compounds were determined as stigmasta-5,22-dien-3,β-ol (stigmasterol, 1),stigmast-5-en-3β-ol(β-sitosterol,2), 5β,8β-epidioxy-5β,8β-ergosta-6,22-dien-3β-ol(ergosterol peroxide, 3), and β-sitosterol 3-O-βD-glucopyranoside(daucosterol,4).
        16.
        2005.10 KCI 등재 서비스 종료(열람 제한)
        The flowers of Chrysanthemum boreale Makino were extracted with 80% aqueous MeOH, and the concentrated extract was partitioned with n-hexane, EtOAc, n-BuOH and H2O. Two compounds from the n-hexane fraction and one glucoside from the n-BuOH fraction were isolated through the repeated silica gel and ODS column chromatographies. From the result of physico-chemical data including NMR, MS and IR, the chemical structures of the compounds were determined as β-sitosterol (1), phytol (2) and zingerone 4-O-β-D-glucopyranoside (3). Compounds 2 and 3 were isolated for the first time from this plant.