• Title/Summary/Keyword: 네트워크의사결정분석

Search Result 233, Processing Time 0.024 seconds

Relationship between Network Intensity of Top Managers and R&D Investment - Focus on Moderating Effects of the Corporate Division Type and System - (최고경영자와 이사회의 네트워크밀도와 R&D투자의 관계 - 기업분할 유형과 제도의 조절효과 분석 -)

  • Min, Ji-Hong;Yoo, Jae-Wook;Kim, Choo-Yeon
    • Management & Information Systems Review
    • /
    • v.38 no.1
    • /
    • pp.1-21
    • /
    • 2019
  • This study focuses on (1) the relationship between the network intensity of top managers and the R&D investment of Korean firms, and (2) the moderating effects of the type (related-division vs. unrelated-division) and system (physical division vs. spin-offs) of corporate division on this relationship. The sample of this study was all type and/or system of corporate division implemented by Korean firms during 18-years (1999-2016) study periods. The results of multiple regression analyses as follow. First, as was expected in hypothesis 1 the network intensity of top managers has a strong positive linear relation with the R&D investment of Korean firms. Second, regarding the moderating effect of division type the results show that related-divisions significantly intensify the positive relationship of the network intensity of top managers with the R&D of Korean firms although unrelated-divisions did not. Third, in the analysis of moderating effect of corporate division system the results present the stronger positive moderating effect of spin-offs rather than physical divisions. The findings of the study implies that strong network intensity of top managers can be beneficial to long-term decision such as R&D investment of Korean firms. They accords to network theory that emphasize the importance of strong network effect among top managers based on their trust. The findings also implies that researchers and practitioners should consider organizational-level factors such as organizational structure, culture, corporate governance, etc as well as individual-level factors such as the characteristics and relationships of organizational members when making the decision for firm.

A Study on the User's Behavior of the S&T Information - A Case study of KOSEN (과학기술정보의 이용행태에 관한 연구 -KOSEN 사례를 중심으로)

  • Kim, Sang-kuk
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2018.01a
    • /
    • pp.201-202
    • /
    • 2018
  • 본 논문에서는 국내에서는 처음으로 이용 고객의 변화를 3년간 추적하여 이용행태를 인지하고 대비하기 위해 적용한 방법으로서, 순고객추천지수(NPS : Net Promoter Score) 실사를 통한 고개의 심층 VOC(Voice of Customer)를 기반으로 분석한 방식이다. KISTI의 해외과학기술자네트워크(KOSEN : The Global Network of Korean Scientists & Engineers)의 서비스에 대한 고객만족도를 기반으로 하여 충성고객을 예측할 수 있는 프레임워크를 구축하는 것이다. 이를 위해 서비스를 경험한 500여명의 의사결정자를 대상으로 해외과학기술자네트워크 서비스에 대한 고객충성도를 분석하였다. 이와 같은 연구결과는 인터넷 등 정보의 발달로 고객의 긍정적 또는 부정적인 구전이 급속도로 노출되는 환경에서 고객의 만족도를 관리함으로써 충성고객을 확보하는데 사전 예측자료로 활용될 수 있다.

  • PDF

Determination of Optimal Location of Washlands Considering Design Frequency (설계빈도변화를 고려한 천변저류지 최적위치 선정)

  • Baek, Chun-Woo;Ahn, Tae-Jin
    • Journal of Korea Water Resources Association
    • /
    • v.42 no.7
    • /
    • pp.559-569
    • /
    • 2009
  • Due to environmental, economical and the other limitations, it has been more difficult to construct new large hydraulic structure such as dam. For this reason, it has been tried to use small hydraulic structure such as washland as alternative of hydraulic facility. Because the flood control effect of small hydraulic structure are affected by runoff volume, hydrograph, storage capacity and weir crest elevation, and design frequency must be predetermined for the design of the hydraulic structure. Multiple washlands will be required to satisfy enough peak reduction effect so that considering washlands as a network, rather than individually, are critical to analysis of flood reduction effect. In this study, new index for determination of optimal location for washlands is presented and the existing model for this determination is modified by adopting the new index. Developed new model is applied to Ansung river basin for examination and the new model shows its' applicability as a decision making criteria for the determination of optimal location for washlands.

Comparison of a Joint Operation effect between Dams using Reservoir Balancing Method (Reservoir Balancing 방법을 이용한 연계운영효과 비교)

  • Kang, Shin-Uk;Shin, Hyeon-Ho;Hawng, Man-Ha;Lee, Sang-Jin
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2009.05a
    • /
    • pp.1621-1626
    • /
    • 2009
  • 유역 내 수문학적 조건은 변화하게 되고 이러한 변화에 대처해야만 하는 유역관리자는 적절한 수자원의 운용에 어려움을 느끼게 된다. 이러한 수문학적 조건 변화는 갑작스런 인구증가, 산업발전 등에 의해서도 발생될 수 있으며, 이 경우 용수공급, 수력발전, 그리고 환경용수 등 서로 상충되는 이해관계를 조정하여 물이용의 효율성 극대화하는 범 유역 단위의 수자원 평가 및 배분이 고려되어야 한다. 더불어 정치적, 경제적, 그리고 환경목적에 부합된 새로운 수자원 개발을 위해서도 지속적인 수자원 통합관리를 위한 의사결정지원시스템은 매우 중요하다. 복잡하고 다양한 요구를 만족하기 위해서는 유역관리 대상을 통합 관리할 수 있는 효과적인 운영 도구가 필요하다. 본 연구에서는 장기 수자원계획시 댐군의 연계운영을 위한 물수지분석 모형으로 KModSim 모형을 선정하고, 이에 대한 댐군의 연계운영 효과를 비교 및 평가를 수행하고자 한다. KModSim 모형은 수자원배분에 관련된 물리적, 수문학적, 제도적, 그리고 행정적인 요구들을 동시에 만족하도록 디자인된 범용 우선순위 목적 선형최적화 모형으로, 조절점 및 저수지조작에 대한 우선순위를 지정할 수 있을 뿐만 아니라 reservoir balancing 방법을 통하여 저수지별로 용수공급 분담률을 지정할 수 있어 보다 현실에 가까운 연계운영이 가능하다. 따라서 본 연구에서는 의사결정 지원 모형들 중 네트워크 알고리즘을 이용하는 KModSim 모형을 이용하여 낙동강권역에 대한 수자원평가시 댐간 연계운영을 하였을 경우와 하지 않았을 경우를 모두 수행하여 비교 분석함으로써 급속히 변화하고 있는 수자원 이용환경에서 보다 합리적인 댐군의 연계운영 방안을 제시하고자 한다.

  • PDF

A Study on the Spatial Distribution Patterns of Co-authoring Activities in the Korean Cadastral Research Field (한국 지적학 연구분야 공동저술활동의 공간분포패턴연구)

  • Kim, Yun-Ki
    • Journal of Cadastre & Land InformatiX
    • /
    • v.50 no.2
    • /
    • pp.203-219
    • /
    • 2020
  • The primary purpose of this study is to identify spatial distribution patterns of co-authoring activities in Korean cadastral science. The analysis showed that a small number of researchers played an essential role in the Korean cadastral co-authorship network. In particular, some authors not only had a significant influence on other nodes in the network but also served as intermediaries between researchers. Moreover, the distance between researchers influenced co-authorship decisions to a limited extent. This study differs considerably from previous studies in that it used spatial analysis techniques to identify spatial distribution patterns of co-authoring activities. However, this research is limited in that it applied only 2019 data to determine the spatial distribution pattern of co-authoring activities. We can overcome this limitation if we analyze the spatial distribution patterns of co-authoring activities using multi-year data in future studies.

Product Family Design based on Analytic Network Process (Analytic Network Process에 기초한 제품가족 디자인)

  • Kim, Tai-Oun
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.1-17
    • /
    • 2011
  • In order to maintain customer satisfaction and to remain productive and efficient in today's global competition, mass customization is adopted in many leading companies. Mass customization through product family and product platform enables companies to develop new products with flexibility, efficiency and quick responsiveness. Thus, product family strategy based on product platform is well suited to realize the mass customization. Product family is defined as a group of related products that share common features, components, and subsystems; and satisfy a variety of market niches. The objective is to propose a product family design strategy that provides priority weights among product components by satisfying customer requirements. The decision making process for a new product development requires a multiple criteria decision making technique with feedback. An analytical network process is adopted for the decision making modeling and procedure. For the implementation, a netbook product known as a small PC which is appropriate for the product family model is adopted. According to the proposed architecture, the priority weight of each component for each product family is derived. The relationship between the customer requirement and product component is analyzed and evaluated using QFD model.

Decision Making for the Industrial Security Management Measures' Importance in Operation Level (운영 수준에서의 산업보안 관리대책 중요도 결정)

  • Chae, Jeong-Woo;Jeong, Jin-Hong
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.4
    • /
    • pp.389-398
    • /
    • 2013
  • This study aims to support rational security investment decision making through prioritizing on operational level of management measures strategically, in carrying out industrial security activities. For this, AHP survey is conducted against industrial security professionals and analyzed. Thereafter, the importance and the priority of industrial security management measures are determined. As a result, in a comparison evaluation among the criteria, 'ICT service management' represents the highest weight (0.54). And the sub-criteria could be divided into three groups (Group I, II, III), depending on their importance. The sensitivity analysis results show that if the weight of the criterion, 'ICT systems/networks access control' is doubled, the sub-criteria, 'O/S access control', 'application access control', and 'wired/wireless network access control' are enter into top rank group. In case of the criterion, 'physical/environmental security' is doubled, the sub-criteria, 'protection zoning/access control' and 'disaster prevention on business equipment/counter-terrorism' are enter into the top rank group, 'securing utilities' is enter into the mid rank group.

Air Threat Evaluation System using Fuzzy-Bayesian Network based on Information Fusion (정보 융합 기반 퍼지-베이지안 네트워크 공중 위협평가 방법)

  • Yun, Jongmin;Choi, Bomin;Han, Myung-Mook;Kim, Su-Hyun
    • Journal of Internet Computing and Services
    • /
    • v.13 no.5
    • /
    • pp.21-31
    • /
    • 2012
  • Threat Evaluation(TE) which has air intelligence attained by identifying friend or foe evaluates the target's threat degree, so it provides information to Weapon Assignment(WA) step. Most of TE data are passed by sensor measured values, but existing techniques(fuzzy, bayesian network, and so on) have many weaknesses that erroneous linkages and missing data may fall into confusion in decision making. Therefore we need to efficient Threat Evaluation system that can refine various sensor data's linkages and calculate reliable threat values under unpredictable war situations. In this paper, we suggest new threat evaluation system based on information fusion JDL model, and it is principle that combine fuzzy which is favorable to refine ambiguous relationships with bayesian network useful to inference battled situation having insufficient evidence and to use learning algorithm. Finally, the system's performance by getting threat evaluation on an air defense scenario is presented.

Ubiquitous Data Mining Using Hybrid Support Vector Machine (변형된 Support Vector Machine을 이용한 유비쿼터스 데이터 마이닝)

  • Jun Sung-Hae
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.3
    • /
    • pp.312-317
    • /
    • 2005
  • Ubiquitous computing has had an effect to politics, economics, society, culture, education and so forth. For effective management of huge Ubiquitous networks environment, various computers which are connected to networks has to decide automatic optimum with intelligence. Currently in many areas, data mining has been used effectively to construct intelligent systems. We proposed a hybrid support vector machine for Ubiquitous data mining which realized intelligent Ubiquitous computing environment. Many data were collected by sensor networks in Ubiquitous computing environment. There are many noises in these data. The aim of proposed method was to eliminate noises from stream data according to sensor networks. In experiment, we verified the performance of our proposed method by simulation data for Ubiquitous sensor networks.

A Method for Malware Similarity Analysis based on Behavior Pattern Graph (행위 그래프를 이용한 악성코드 유사도 판별법)

  • Kim, Ji-Hun;Son, Kang-Won;Cho, Doosan;Youn, JongHee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.04a
    • /
    • pp.501-503
    • /
    • 2015
  • Malicious(악의적인) + Code 즉, 악의적인코드를 포함한 소프트웨어라는 의미로 줄여 Malware(Malicious + Software) 라고 불리는 악성코드는 최근 네트워크와 컴퓨터의 급속한 발전에 따라 기하급수적으로 증가하고 있는 추세이다. 폭발적인 증가율 추세를 보이고 있는 악성코드의 위협을 대비하기 위해 악성코드에 대한 분석이 필요한데 그 분석의 종류로는 초기분석, 동적 분석, 정적분석으로 나누고 장, 단점을 정리하였다. 또한 악성코드 대량화에 따른 효율적인 분석과 빠른 의사결정을 위한 악성코드 유사도에 대한 연구를 소개하고 API Call Sequence와 분류된 API를 이용한 악성행위 유사도 판별법을 제시하고 실험하였다.