• Title/Summary/Keyword: 기술-정책적 프로세스

Search Result 208, Processing Time 0.026 seconds

Smart Factory Policy Measures for Promoting Manufacturing Innovation (제조혁신 촉진을 위한 스마트공장 정책방안)

  • Park, Jaesung James;Kang, Jae Won
    • Korean small business review
    • /
    • v.42 no.2
    • /
    • pp.117-137
    • /
    • 2020
  • We examine the current status of smart factory deployment and diffusion programs in Korea, and seek to promote manufacturing innovation from the perspective of SMEs. The main conclusions of this paper are as follows. First, without additional market creation and supply chain improvement, smart factories are unlikely to raise profitability leading to overinvestment. Second, new business models need to connect "manufacturing process efficiency" with "R&D" and "marketing" in value chain in smart factories. Third, when introducing smart factories, we need to focus on the areas where process-embedded technology is directly linked to corporate competitiveness. Based on the modularity-maturity matrix (Pisano and Shih, 2012) and the examples of U.S. Manufacturing Innovation Institute (MII), we establish the new smart factory deployment policy measures as follows. First, we shift our smart factory strategy from quantitative expansion to qualitative upgrading. Second, we promote by each sector the formation of industrial commons that help SMEs to jointly develop R&D, exchange standardized data and practices, and facilitate supplier-led procurement system. Third, to implement new technology and business models, we encourage partnerships, collaborations, and M&As between conventional SMEs and start-ups and business ventures. Fourth, the whole deployment process of smart factories is indexed in detail to identify the problems and provide appropriate solutions.

The SOC Building Strategy Planning of North Korea through Analysis of Domestic and Foreign Case (국내·외 사례분석을 통한 북한 SOC 구축 지원 전략)

  • Jung, In-Su
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.12
    • /
    • pp.692-700
    • /
    • 2016
  • The study proposed a strategy for supporting North Korea's SOC construction in the future by reviewing domestic and foreign cases. According to the literatureanalysis, we developed a candidate list of technology for SOC of North Korea in terms of Construction Management / economy sectors. The category is North Korea SOC construction support, and the sub-category is North Korea SOC construction support program. The implementation procedures included the following six steps: Preparation, Support for Establishing Construction Industry Base, Support for Establishing Business Management Base, Support for HR Management Base, Business Model Establishment/Expansion, and Monitoring of Management Result. Lastly, we developed twenty-five candidates of detailed technology. In the future, it is necessary to decide a methodology for project implementation by each scenario after selecting a study area, and to develop a more specified scenario.

Analysis of Technology Opportunity Discovery Activities in the Korean SMEs (국내 중소기업의 기술기회 발굴 활동 현황 연구)

  • Cho, Chanwoo;Lee, Sungjoo;Park, Young-Wook
    • Journal of Korea Technology Innovation Society
    • /
    • v.14 no.spc
    • /
    • pp.1128-1151
    • /
    • 2011
  • With the rapid change in technology, it is important to create business opportunities from technology. Many leading companies have tried to improve their competence from capturing those opportunities, which is called TOD (Technology Opportunity Discovery) activities in this research, by identifying emerging technologies or assessing economic and market potential of technologies. Academics have also been interested in the TOD activities but most of the previous studies have focused on developing methodologies or guidelines for TOD. Little effort was given to understanding the current status of TOD activities, which is indispensible to develop effective methodologies for TOD. Therefore, this study aims to investigate the current states of TOD activities, particularly focusing on SMEs, which are the main actors of national innovation system. For the purpose of investigation, firstly, TOD process was defined, and then, based on the process, three main activities of TOD, which include identifying the motivation of TOD, collecting information for TOD, and analyzing the collected information activities for TOD, were examined using a survey method. Finally, the analysis results were used to understand the SMEs' needs and difficulties on TOD activities. Research findings are expected to provide useful information for the future studies on TOD and also can be used to develop a policy for SMEs.

  • PDF

A Study on Conversion Security Control System for Industrial Security (산업보안을 위한 융합보안관제시스템에 관한 연구)

  • Ha, Ok-Hyun
    • Convergence Security Journal
    • /
    • v.9 no.4
    • /
    • pp.1-6
    • /
    • 2009
  • Current paradigm of industrial security is changing into the effective operation and management from simple establishment of security equipments. If the physical security system(entry control system, video security system, etc.) and the IT integrated security control system are conversed, it makes us possible to prevent, disrupt and track afterwards the insider's information leakage through the risk and security management of enterprise. That is, Without the additional expansion of the existing physical security and IT security manpower, the establishment of systematic conversion security management process in a short time is possible and can be expected the effective operation of professional organization system at all times. Now it is needed to build up integrated security management system as an individual technique including the security event collection and integrated management, the post connected tracking management in the case of security accident, the pattern definition and real time observation of information leakage and security violation, the rapid judgement and response/measure to the attempt of information leakage and security violation, the establishment of security policy by stages and systematically and conversion security.

  • PDF

An Exploratory Study on Healthcare Supply Chain Management of Large Hospitals (대형종합병원의 헬스케어 공급망관리 도입에 관한 탐색적 연구)

  • Park, Seong Taek;Kim, Tae Ung;Kim, Mi Ryang
    • Journal of Digital Convergence
    • /
    • v.17 no.5
    • /
    • pp.145-155
    • /
    • 2019
  • The Healthcare supply chain management has recently attracted attention as a critical tool to improve service quality and reduce healthcare operational cost. Improving large hospital supply chain performance has become increasingly important as healthcare organizations strive to improve the service quality, while reducing the ever-increasing healthcare cost. This paper explores the strategic areas where the traditional supply chain management may enhance the overall performance of the large hospitals. Based on the literature review and relevant case analysis, this paper argues that the visibility, information sharing and standardization are the critical factors for deploying the supply chain principles, and also proposes the supply chain framework for efficient planning and execution, the use of RFID-enabled system for the end-to-end traceability of medical products, and cross-docking system for minimizing the inventory level in the hospital supply chain. Implications of the study findings are discussed.

A Design of N-Tiers Platform for Building Enterprise Framework with Development Productivity (개발 생산성 있는 엔터프라이즈 프레임워크 구축을 위한 N-Tiers 플랫폼의 설계)

  • Lee, Myeong-Ho
    • Journal of Digital Convergence
    • /
    • v.11 no.10
    • /
    • pp.411-417
    • /
    • 2013
  • Enterprises utilize software development strategically within digital convergence of information technology. Software development direction of IT takes advantage of new technology through integration of across-the-board data and business process standardization and integration. But, software development environment of enterprises which globalization is accelerated gradually is doing cost-cutting effort with controls and administration about various reform activity. Nevertheless, have not normalized in customer's requirement according to project, there is visual point that excessive software development integration work and administration are necessary according as connection is not harmonious with new system. Therefore, in this study, to construct these real-time integration environment, do to propose database implementation that have productivity by deent,ing N-Tiers platform for building enterprise framework with development productivity presentation, middle(business) and data(EIS) tier that take advantage of MVC design pattern.

An Empirical Study on Defense Future Technology in Artificial Intelligence (인공지능 분야 국방 미래기술에 관한 실증연구)

  • Ahn, Jin-Woo;Noh, Sang-Woo;Kim, Tae-Hwan;Yun, Il-Woong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.5
    • /
    • pp.409-416
    • /
    • 2020
  • Artificial intelligence, which is in the spotlight as the core driving force of the 4th industrial revolution, is expanding its scope to various industrial fields such as smart factories and autonomous driving with the development of high-performance hardware, big data, data processing technology, learning methods and algorithms. In the field of defense, as the security environment has changed due to decreasing defense budget, reducing military service resources, and universalizing unmanned combat systems, advanced countries are also conducting technical and policy research to incorporate artificial intelligence into their work by including recognition systems, decision support, simplification of the work processes, and efficient resource utilization. For this reason, the importance of technology-driven planning and investigation is also increasing to discover and research potential defense future technologies. In this study, based on the research data that was collected to derive future defense technologies, we analyzed the characteristic evaluation indicators for future technologies in the field of artificial intelligence and conducted empirical studies. The study results confirmed that in the future technologies of the defense AI field, the applicability of the weapon system and the economic ripple effect will show a significant relationship with the prospect.

How Should We Respond to the Collapse of the Global Value Chain? An In-Depth Investigation of Disruptive Events and Risk Management Strategies in SMEs (글로벌 가치사슬의 붕괴에 어떻게 대응해야 하는가? 분열적 상황의 심층규명과 중소기업의 위험관리 전략에 관한 연구)

  • Kwon, Se-In;Yang, Jong-Gon
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.5
    • /
    • pp.107-115
    • /
    • 2022
  • The purpose of this study is to identify the drivers of supply chain vulnerability and internal/external disruptive events and to verify the moderating effect of SCRM to mitigate negative disruption impacts. The analysis results of 182 SMEs are as follows. First, SC vulnerability proceeded from excessive efficiency. Second, the probability and severity of internal factors were higher than that of external factors. In particular, the priority of responding to risks arising from the supply chain process was higher than the value chain within the firm. Finally, the higher the level of risk management in the supply chain, the more positively the negative disruption impact was mitigated. This study is valuable in providing practical clues to the decision-making of a firm's managers and policymakers responding to supply chain risks.

An Exploratory Study on the Business Failure Recovery Factors of Serial Entrepreneurs: Focusing on Small Business (연속 기업가의 사업 실패 회복요인에 관한 탐색적 연구: 소상공인을 중심으로)

  • Lee, Kyung Suk;Park, Joo Yeon;Sung, Chang Soo
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.16 no.6
    • /
    • pp.17-29
    • /
    • 2021
  • Recently, as social distancing have been raised due to the re-spread of COVID-19, the number of serial entrepreneurs who are closing their business is rapidly increasing. Learning from failure is a source of success, but business failure can result in psychological and economic losses and negative emotions of the serial entrepreneur. At this point, it is very important to find a way to recover the negative emotions caused by business failures of serial entrepreneurs. Recently, a strategic model has emerged to deal with the negative emotions of grief caused by business failures of serial entrepreneurs. This study identified the recovery factors from the grief of business failures of serial entrepreneurs and analyzed Shepherd's(2003) three areas: loss orientation, restoration orientation, and dual process. To this end, individual in-depth interviews were conducted with 12 small business serial entrepreneurs who challenged re-startup to identify the attributes of recovery factors that were not identified with quantitative data. As a result of the study, first, recovery factors were investigated in three areas: individual orientation, family orientation, and network orientation. It was found to help improve recovery in nine categories: self-esteem, persistence, personal competence, hobbies, self-confidence, family support, networks, religion, and social support. Second, recovery obstacle factors were investigated in three areas: psychological, economic, and environmental factors. Nine categories including family, health, social network, business partner, competitor, partner, fund, external environment, and government policy were found to persist negative emotions. Third, the emotional processing process for grief was investigated in three areas: loss orientation, restoration orientation, and dual process. Ten categories such as family, partner support, social member support, government support, hobbies, networks, change of business field, moving, third-party perspective, and meditation were confirmed to enhance rapid recovery in the emotional processing process for grief. The implications of this study are as follows. The process of recovering from the grief caused by business failures of serial entrepreneurs was attempted by a qualitative study. By extending the theory of Shepherd(2003), This study can be applied to help with recovery research. In addition, conceptual models and propositions for future empirical research were presented, which can be discussed in carious academic ways.

u-Healthcare Service Authentication Protocol based on RFID Technology (RFID 기술을 이용한 u-헬스케어 서비스 인증 프로토콜)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of Digital Convergence
    • /
    • v.10 no.2
    • /
    • pp.153-159
    • /
    • 2012
  • Now a days, U-healthcare comes into the spotlight as a new business model which combines RFID technology with medical service in the well-being era and IT popularization. U-healthcare service needs a method that can deals with hand-writing, overlap data, forgery and falsification of data, difference between information version that happen in medical process because of graft between RFID technology and u-healthcare. This paper proposes RFID based user certification protocol to protect user's privacy who gets medical service through U-healthcare. In the protocol, secret information of patient does the XOR with the secret key that is created in the hospital to reconsider the stability of security system of U-healthcare and user's data forgery and falsification and privacy and then saves it in the secret key field of patient in DB table. Also, it informs the case of illegal access to certification server and make it approved the access of u-healthcare service by differentiating whether u-healthcare is illegal or not.