• Title/Summary/Keyword: 네트워크 조직

Search Result 689, Processing Time 0.026 seconds

An Analysis on the Safety Networks in Construction Site and Its Improvement Measures (건설현장의 안전 네트워크 분석 및 개선방안)

  • Shin, WonSang;Son, ChangBaek
    • Korean Journal of Construction Engineering and Management
    • /
    • v.19 no.5
    • /
    • pp.101-110
    • /
    • 2018
  • Safety-related accidents are continuously increasing in the construction field. In order to prevent or minimize such accidents, a systematic and active safety activities of on-site managers and workers are required. However, preexisting advance research is lacking on how the safety organization systems are built in construction sites varying in sizes, and how well-trained the related personnel are in safety knowledge and task performances. Especially, a research on the analysis of the formation of their safety knowledge sharing and safety performance cooperation and their visualization is virtually nonexistent. In this regard, this research was conducted with a purpose to study the generalized safety organization method of domestic construction sites, analyze the safety knowledge and cooperation system of the members based on the SNA method and ultimately provide a hands-on data that could be effectively utilized in building an effective safety management system in the future.

A Study on Mentoring Network According to Development Stages of Teachers (교사발달단계에 따른 멘토링 연결망에 관한 연구)

  • Lee, Kyu-Man;Lee, Sang-Jin
    • Korean Business Review
    • /
    • v.19 no.2
    • /
    • pp.141-154
    • /
    • 2006
  • Mentoring as a human resources development program is being reconceptualized because of the rapidly shifting work environment which has been recently focused on the necessity of knowledge management. That is, new mentoring network theory as a reconceptualization of mentoring is structured by researchers who have related social network theory and mentoring and they have discovered that the development of individual and organizational is built by the relationships of multiple selves. In their paper, they have asserted that an individual's developmental stage is an important antecedent to the nature of mentoring and developmental networks that are possible. Further, they are suggesting that mentoring developmental network is a key tool for learning, development, and successful performance outcomes in challenging assignments. This paper aims to describe the next empirical research plan that will investigate the developmental stage of teachers as an antecedent of mentoring network. An introduction and background to the research will be explained to provide a conceptual framework for the next study.

  • PDF

Automated Attack Path Enumeration Method based on System Vulnerabilities Analysis (시스템 취약점 분석을 통한 침투 경로 예측 자동화 기법)

  • Kim, Ji Hong;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1079-1090
    • /
    • 2012
  • As the number of information asset and their vulnerabilities are increasing, it becomes more difficult for network security administrators to assess security vulnerability of their system and network. There are several researches for vulnerability analysis based on quantitative approach. However, most of them are based on experts' subjective evaluation or they require a lot of manual input for deriving quantitative assessment results. In this paper, we propose HRMS(Hacking and Response Measurement System) for enumerating attack path using automated vulnerability measurement automatically. HRMS can estimate exploitability of systems or applications based on their known vulnerability assessment metric, and enumerate attack path even though system, network and application's information are not fully given for vulnerability assessment. With this proposed method, system administrators can do proactive security vulnerability assessment.

Understanding Collaborative Working Processes within Construction Project Teams Using Agent-Based Modeling and Simulation (에이전트기반 시뮬레이션을 활용한 건설프로젝트 조직 내 협업과정의 이해)

  • Son, JeongWook;Shin, Seung-Woo;Yi, June-Seong
    • Korean Journal of Construction Engineering and Management
    • /
    • v.15 no.1
    • /
    • pp.70-77
    • /
    • 2014
  • Collaborative processes among team members including communication, coordination, and information-handling processes either during pre-construction or project execution are required in order to accomplish the objectives of construction projects. However, current construction management practice does not explicitly take the effect of organizational aspects on project performance into account. This paper introduces a method to understand collaborative processes in an explicit and systematic fashion. An agent-based simulation of collaborative working processes within construction project teams was designed from game theory perspective and implemented. The simulation produced both individual behavior and network dynamics. Individuals represented as agents made efforts to improve performance by communication and coordinating with other members, and overall team network was emerged as a result of interactions among members. Interestingly, it was found that the tendency of forming cohesive subgroups increased when sustaining relations with between-group partners incurs higher cost. The primary contribution of this paper is that it presented an explicit approach to examining collaborative working processes in construction project teams and it extended existing computational organization and network studies by integrating individual behavior models and network models.

Development of Wire-Wireless Integrated Web Messenger for Communication of users in a Multi-Organization (복수조직 구성원들의 상호통신을 위한 유무선 통합 웹 메신저 개발)

  • Cho, Migyung;Kim, Jungin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.5
    • /
    • pp.1181-1186
    • /
    • 2013
  • Mobile network has become an essential tool for mutual communications, so a survey research published that most of the smartphone users use Mobile Instant Messenger every day. In this paper, we developed a wire-wireless integrated web messenger that can be used in various platform of mobile devices and desktop computer for communicating between users of some companies. We defined a multi-organization as several independent companies. Our web messenger was developed for communicating of users of a multi-organization. So one of functions of our web messenger is to restrict access to some particular departments in each company for the security of their company. Developed web messenger worked reliably from variety of web browsers on most of platforms such as android, iOs and desktop computers.

The Effect of Managerial Information Security Intelligence on the Employee's Information Security Countermeasure Awareness (경영진의 정보보안 지능이 조직원의 보안대책 인식에 미치는 영향)

  • Jin Young Han;Hyun-Sun Ryu
    • Information Systems Review
    • /
    • v.18 no.3
    • /
    • pp.137-153
    • /
    • 2016
  • Organizations depend on smart working environments, such as mobile networks. This development motivates companies to focus on information security. Information leakage negatively affects companies. To address this issue, management and information security researchers focus on compliance of employees with information security policies. Countermeasures in information security are known antecedents of intention to comply information security policies. Despite the importance of this topic, research on the antecedents of information security countermeasures is scarce. The present study proposes information security intelligence as an antecedent of information security countermeasures. Information security intelligence adapted the concept of safety intelligence provided by Kirwan (2008). Information security intelligence consists of problem solving skills, social skills, and information security knowledge related to information security. Results show that problem solving skills and information security knowledge have positive effects on the awareness of employees of information security countermeasures.

A Global Korean Networking Strategy for Tourism-related Firms' Internationalization (관광관련기업의 국제화를 위한 글로벌 코리안 네트워킹 전략)

  • Kim, Min-Sook;Bang, Ho-Yeol
    • International Commerce and Information Review
    • /
    • v.14 no.2
    • /
    • pp.55-79
    • /
    • 2012
  • The previous studies based on a resource-based view of firm highlighted the role of resources within a firm in creating and sustaining competitive advantage. Recent research, however, the relational view points to the importance of inter-firm sources(or relational capital) in creating firm competitiveness. In international business field, the studies on born-global firms also states that when firms are lack of ownership-specific advantages in their internationalization process, they resort to the external partners and social networks to complement their resource scarcity. By adopting the relational view and born-global firms concept, a network-based approach needs to be applied to explain the international strategy of Korean service firms. This is because most of Korean service firms own less ownership-specific advantages than global competitors. This study proposes Korean firms' global network building and exploiting strategy to enhance their international stages of development. The network, for example, Global Korean Tourism Network, enables network members access to the valuable resources and capabilities they are lack of when undergoing internationalization process. This study's contribution is along two dimension. First, even global Korean network is emerging as a major issue in recent years, we could not figure out how to build global Korean network for service firms. This studies gives an answer. Second, we derived what benefits can be gained from the network if Global Korean Tourism Network is developed for hotel, tourism, convention firms' internationalization.

  • PDF

Numerical Analysis of Authentication Algorithm using Randomized CA Groups in Mobile Ad Hoc Networks (모바일 애드혹 네트워크에서 랜덤 CA 그룹을 이용한 인증 알고리즘에 대한 성능 분석)

  • Lee, Yong;Lee, Goo-Yeon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.8
    • /
    • pp.22-33
    • /
    • 2009
  • Mobile Ad Hoc Networks (MANETs) are self-organized networks that do not rely in their operation on wired infrastructure. As in any networking technology, security is an essential element in MANET as well, for proliferation of this type of networks. But supporting secure communication in MANETs proved to be a significant challenge, mainly due to the fact that the set of nodes in the network can change frequently and rapidly and due to the lack of access to the wired infrastructure. In particular, the trust model and the authentication protocols, which were developed for wired and infrastructure-based networks, cannot be used in MANETs. In [1], we addressed the problem of efficient authentication of distributed mobile users in geographically large networks and proposed a new authentication scheme for this case of MANETs. The proposed scheme exploits randomized groups to efficiently share authentication information among nodes that together implement the function of a distributive Certification Authority(CA). In this paper, we analyze numerically the performance of authentication method using randomized groups and compare with the simulation result.

Service System of Social Network with CRM Application (CRM 어플리케이션에서의 소셜 네트웍의 서비스 시스템)

  • Mohan, Subaji;Upadhyaya, Bipin;Choi, Eun-Mi
    • Information Systems Review
    • /
    • v.12 no.1
    • /
    • pp.1-22
    • /
    • 2010
  • Demands onenterprise applications are changing drastically in terms of service and value. Currently enterprises have started to view these applications as service systems, as they combine technology with organizational networks designed to deliver services that satisfy the needs of customers and marketing operations. Social networking is playing a crucial role in this direction and provides organizations with the critical data that enable to build strong relationships with their customers and partners. Enterprises have started using this concept, by integrating social networking services with their enterprise applications such as CRM. In this paper, we combine an open source social networking engine with a CRM (Customer Relationship Management) application to constitute a social CRM system. This can bring the customers closer to the enterprise and facilitate better communication with them. Social Networking Analysis constructs were used to analyze the effectiveness of service system. In the current competitive and economically challenging conditions, salespeople needs to quickly and effectively establish meaningful communication with customers. Our approach can address this issue, by handling the changing customer demands in minimal time, and increases service quality and business value.

The Characteristics of Informal Networks of Venture Companies in Daegu Region (대구지역 벤처기업의 비공식 네트워크)

  • Lee, Chul-Woo;Kim, Myeong-Yeob
    • Journal of the Korean association of regional geographers
    • /
    • v.10 no.4
    • /
    • pp.713-726
    • /
    • 2004
  • This paper aims to investigate the characteristics of innovation activities and informal networks of venture companies in Daegu region. The most important knowledge source of them for innovation is in house. The next are customers, competitors, and public supporters. And it was investigated that regional venture companies have participated in 1-5 informal network organizations. They primarily achieve such knowledges as, technologies, new business opportunities, and marketing information, through participation in informal networks. The reasons why they have taken part in informal networks are to get new informations and acquire new business opportunities. Particularly The informal networks between ventures companies and other regional economic actors have helped the regional venture companies to obtain more economic performance and to establish social capital, such as faith, with other economic actors.

  • PDF