• Title, Summary, Keyword: Policy Model

Search Result 5,364, Processing Time 0.069 seconds

A Study on the Differentiation Strategies of Policy Process in governance Using the Case of Gumi City (거버넌스 시대 정책프로세스 차별화 전략 - 구미시 혁신사례를 중심으로 -)

  • Lee, Hong-Hui;Lee, Seung-Hui
    • 한국디지털정책학회:학술대회논문집
    • /
    • /
    • pp.197-204
    • /
    • 2006
  • This paper tried to develop differentiation strategies of policy process in governance. Firstly, we reviewed model of policy making(output-oriented model and process-oriented model, normative or idealistic approach and realistic or empirical approach, rational model and cognitive model etc). Now gumi city is making the policy based on the process-oriented model, realistic or empirical approach, cognitive model. So gumi city was winner the test of provinces innovation in 2005. Therefore, when we make the policy, consider these factor: citizen and public service personnel participate policy making process and control policy quality.

  • PDF

A Study of the Effect of Aviation·Tourism Industry Employees' Airport Service Policy Acceptance on Creating Customer's Value (항공관광종사원의 공항서비스 정책수용성 인식이 고객가치에 미치는 영향)

  • Choi, Seong-Soo;Kim, Kwang-Ok;Choi, Jin-Young;Kim, Hyun-Deuk
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.25 no.1
    • /
    • pp.11-22
    • /
    • 2017
  • Aviation/tourism industry has a unique characteristic of high inter-dependance between customer and service-provider. It is the mental condition of service-provider that could influence on the attitude of the service-provider. Thus, it is important to manage the mental condition of the service employees to enhance a company's financial performance. This paper tries to analyze the combined model of both policy acceptance and service profit chain(SPC) models. First, service policy acceptance model tells how the service policy acceptance, which consists of policy compliance, trust, participation and policy failure, would influence on SPC model. According to empirical research, it was found that both the employees' policy compliance and the policy trust have a positive significant impact on their participation on service policy. In the policy acceptance model, the employee's voluntary participation based on their trust and compliance of the policy was proven to have a positive effect on increasing job satisfaction and customer orientation. Regarding SPC model, their participation in the policy had the strongest impact among variables on customer orientation. Such results implies the employees' participation on the policy could become the starting point to enhance the customer value.

The Implementation of Policy Management Tool Based on Network Security Policy Information Model (네트워크 보안 정책 정보 모델에 기반한 정책 관리 도구의 구현)

  • Kim, Geon-Lyang;Jang, Jong-Soo;Sohn, Sung-Won
    • The KIPS Transactions:PartC
    • /
    • v.9C no.5
    • /
    • pp.775-782
    • /
    • 2002
  • This paper introduces Policy Management Tool which was implemented based on Policy Information Model in network suity system. Network security system consists of policy terror managing and sending policies to keep a specific domain from attackers and policy clients detecting and responding intrusion by using policies that policy server sends. Policies exchanged between policy server and policy client are saved in database in the form of directory through LDAP by using Policy Management Tool based on network security policy information model. NSPIM is an extended policy information model of IETF's PCIM and PCIMe, which enables network administrator to describe network security policies. Policy Management Tool based on NSPIM provides not only policy management function but also editing function using reusable object, automatic generation function of object name and blocking policy, and other convenient functions to user.

A Study on Development of Conceptual Model in Consumer Product Safety Policy(CPSPcon) using the SSM approach (SSM을 활용한 공산품 안전정책분야의 개념모델(CPSPcon) 개발에 관한 연구)

  • Lee, Jun-Soo;Bea, Jin-Han;Kim, Hong-Won;Song, Jae-Bin
    • Journal of the Korea Safety Management and Science
    • /
    • v.14 no.1
    • /
    • pp.33-42
    • /
    • 2012
  • This paper dealt with developing conceptual model for making public policy on consumer product safety. The matters of consumer safety, public health and environmental protection are essential parts of making policy for consumer products. Moreover, policy authority should consider all measures based on consumer safety. In the process making regulations, policy authority has to have some methods to prevent errors on treating eligible persons as persons disqualified under uncertainty decision making of public policy. To recognize and ensure fairness on public policy, policy authority needs to establish basic policy making and fundamental concepts. Therefore, we developed conceptual model for consumer products safety, CPSPcon in this paper. The conceptual model is one part of SSM(Soft System Methodology) and can support specific policy target. The CPSPcon model can assist in evaluation of responses to an adapting or considering model.

A Study on the Implementation of ROK Army Records Management Policy : Limitations of the Street-Level Bureaucracy Model and Proposal of the Policy Network Model (육군 기록관리정책의 집행맥락에 관한 연구 일선관료제 모형의 한계와 정책네트워크 모형의 제안)

  • Lim, Jisu;Kim, Giyeong
    • The Korean Journal of Archival Studies
    • /
    • no.49
    • /
    • pp.175-212
    • /
    • 2016
  • The purpose of this study is to propose a model that can polish and improve the ROK (Republic of Korea) Army's records management policy in a new records management environment by analyzing the context of policy implementation. In this study, two distinct and different policy cases were analyzed using different models for policy analysis such as the case of the records management system of the ROK Army with the street-level bureaucracy model and the case of the archives personnel within the ROK Army with a Policy Network model. The results from the comparative analysis with both cases state that the street-level bureaucracy model has limitations in analyzing even a policy implementation case when multiple actors are involved. At the same time, a network policy model is useful in identifying the problematic points that need improvement in the case. Based on these results, some improvements for effective records management in the ROK Army were proposed. This study follows the approach of the two distinctive case studies from the perspective of policy science-a view that no archive researcher has ever explored before.

An Evaluation Method for Security Policy Model Based on Common Criteria (공통평가기준에 의한 보안정책모델 평가방법)

  • 김상호;임춘성
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.5
    • /
    • pp.57-67
    • /
    • 2003
  • Security Policy Model is a structured representation using informal, semiformal or formal method of security policy to be enforced by TOE. It provides TOE to get an assurance to mitigate security flaws resulted from inconsistency between security functional requirements and functional specifications. Therefore, Security Policy Model has been required under an hish evaluation assurance level on an evaluation criteria such as ISO/IEC 15408(Common Criteria, CC). In this paper, we present an evaluation method for security policy model based on assurance requirements for security policy model in Common Criteria through an analysis of concepts, related researches and assurance requirements for security policy model.

An Analysis on Electric Power Policy through ACMS Model : Focused on the Power Generation Subsidiary Company of the Korea Electric Power Corporation (ACMS 모형을 적용한 전력정책의 변동 분석 : 한국전력공사의 발전자회사를 중심으로)

  • Ji, Byoung-Seog;Kang, Seung-Jin
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.65 no.1
    • /
    • pp.31-40
    • /
    • 2016
  • The purpose of this study is to dimensionally examine the factors of policy changes by applying the ACMS model to KEPCO's structural reorganization privatization policies and study its implications. As a result of the analysis, among the external variables that affect as a financial source or restriction to advocates, all areas except for the difference in opinion of the people as well as policy decision and effects of other subordinate systems were shown to be in an advantageous condition acting as a financial source to advocates of structural reorganization privatization. On the other hand, advocates affected by the external variables share a certain belief system in which the advocates of privatization share the justification of profitability while the advocates of collectivization share the justification of publicness. In these flows, the announcement of the privatization plan of public enterprises of the committee of planning and budgeting acts as a matter of contact which opens the windows for policy changes, and this window goes through ignition, explosion, and fixation which causes fierce interactions among advocates of both sides. Eventually, in accordance with the contents of excluding electricity(KEPCO) from the list for privatization the window for policy changes has closed and things have changed to a transitional KEPCO privatization policy. Based on this, the first implication is that non-official participants such as the people, social organizations, labor unions, etc. influence policy changes more than they did before. Secondly, in the process of policy changes, there is an order of boundary even in the fierce interactions between each advocate. Thirdly, specific variables can play various roles in complex policy phenomenon. Fourthly, a logical analysis using the ACMS model is possible in Korea as well. Fifthly, as a result of analyzing the change process of the KEPCO structural reorganization privatization policy through the ACMS model, not all matched with the main research results implied by the ACMS model.

Detection and Recovery of Policy Conflicts in Policy-based Network Management Systems (정책기반 네트워크 관리 시스템의 정책 충돌 탐지 및 복구)

  • Lee, Kyu-Woong
    • Journal of Information Technology Services
    • /
    • v.6 no.2
    • /
    • pp.177-188
    • /
    • 2007
  • Policy-based Network Management (PBNM) has been presented as a paradigm for efficient and customizable management systems. The approach chosen is based on PBNM systems, which are a promising and novel approach to network management. These systems have the potential to improve the automation of network management processes. The Internet Engineering Task Force (IETF) has also used policy concepts and provided a framework to describe the concept as the Policy Core Information Model (PCIM) and its extensions. There are policy conflicts among the policies that are defined as the policy information model and they are not easily and effectively detected and resolved. In this paper, we present the brief description of PBNM and illustrate the concepts of policy core information model and its policy implementation for a network security. Especially we describe our framework for detecting and resolving the policy conflicts for network security.

Analysis of School-based Mental Health Policy Stream based on Kingdon's Policy Stream Model (학교기반 정신건강정책의 흐름 분석: Kingdon의 정책흐름모형을 중심으로)

  • Min, Hea Young;Kang, Kyung Seok
    • Journal of the Korean Society of School Health
    • /
    • v.28 no.3
    • /
    • pp.139-149
    • /
    • 2015
  • Purpose: This study aims to analyze the factors affecting the agenda-setting process and the formation process of school-based mental health policies by applying a policy stream model. Methods: For this purpose, Kingdon's policy stream model was used as the analytical framework. Results: First, when establishing a school-based mental health policy, the agenda was set going through unpredictable and nonlinear changes. Second, for the school-based mental health policy to be selected onto the agenda and to be developed and implemented as an actual policy, the role of policy makers was considered most important in the process. Third, the policy window for school-based mental health policy was closed around the year 2013. Finally, an analysis of the school-based mental health policy stream identified two key features. One is that the school-based mental health policy first emerged when school violence prevention policy expanded its scope into relevant neighboring policies. The other is that the school-based mental health policy has taken shape through a linear decision-making process (being put on the government's agenda, searching for an alternative, selection, and implementation) during the policy implementation period after it has been selected as an alternative policy. Conclusion: Conclusions can be summed up as follows. The school-based mental health policy needs continuous development and improvement in case the window for the policy may open in the coming future. The government's support is needed to draw policy makers' interest and participation who play the biggest role in establishing policies.

A Policy-driven RFID Device Management Model (정책기반 RFID 장치 관리 모델)

  • Lee, Woo-Sik;Kim, Nam-Gi
    • Journal of Internet Computing and Services
    • /
    • v.13 no.1
    • /
    • pp.75-81
    • /
    • 2012
  • Previous RFID systems exclusively manage the tags and readers for each company in individual manner. Thus, RFID system manager should understand and design specifications such as tag events, data format, and etc, based on individual companies. But it is very difficult to know all statements. To resolve theses problems, there has been conceptual research about policy-based RFID service management model that is not restrained from standards of typical RFID systems, including EPCglobal standard, and ISO/IEC standard. However, previous proposed service management model only aimed event management without including device management. Therefore, in this paper, we propose extended device management policy model for giving shape to the proposed policy-based RFID service management model. If the proposing device management policy model is used for device management, we can integrate control management for heterogeneous middleware, diverse RFID devices, and applications for each company. Moreover, we show that the RFID device management policy is translated and processed as an example using the proposing policy model in real-time RFID system.