• Title/Summary/Keyword: 업무효율성

Search Result 2,084, Processing Time 0.029 seconds

Korean Ocean Forecasting System: Present and Future (한국의 해양예측, 오늘과 내일)

  • Kim, Young Ho;Choi, Byoung-Ju;Lee, Jun-Soo;Byun, Do-Seong;Kang, Kiryong;Kim, Young-Gyu;Cho, Yang-Ki
    • The Sea:JOURNAL OF THE KOREAN SOCIETY OF OCEANOGRAPHY
    • /
    • v.18 no.2
    • /
    • pp.89-103
    • /
    • 2013
  • National demands for the ocean forecasting system have been increased to support economic activity and national safety including search and rescue, maritime defense, fisheries, port management, leisure activities and marine transportation. Further, the ocean forecasting has been regarded as one of the key components to improve the weather and climate forecasting. Due to the national demands as well as improvement of the technology, the ocean forecasting systems have been established among advanced countries since late 1990. Global Ocean Data Assimilation Experiment (GODAE) significantly contributed to the achievement and world-wide spreading of ocean forecasting systems. Four stages of GODAE were summarized. Goal, vision, development history and research on ocean forecasting system of the advanced countries such as USA, France, UK, Italy, Norway, Australia, Japan, China, who operationally use the systems, were examined and compared. Strategies of the successfully established ocean forecasting systems can be summarized as follows: First, concentration of the national ability is required to establish successful operational ocean forecasting system. Second, newly developed technologies were shared with other countries and they achieved mutual and cooperative development through the international program. Third, each participating organization has devoted to its own task according to its role. In Korean society, demands on the ocean forecasting system have been also extended. Present status on development of the ocean forecasting system and long-term plan of KMA (Korea Meteorological Administration), KHOA (Korea Hydrographic and Oceanographic Administration), NFRDI (National Fisheries Research & Development Institute), ADD (Agency for Defense Development) were surveyed. From the history of the pre-established systems in other countries, the cooperation among the relevant Korean organizations is essential to establish the accurate and successful ocean forecasting system, and they can form a consortium. Through the cooperation, we can (1) set up high-quality ocean forecasting models and systems, (2) efficiently invest and distribute financial resources without duplicate investment, (3) overcome lack of manpower for the development. At present stage, it is strongly requested to concentrate national resources on developing a large-scale operational Korea Ocean Forecasting System which can produce open boundary and initial conditions for local ocean and climate forecasting models. Once the system is established, each organization can modify the system for its own specialized purpose. In addition, we can contribute to the international ocean prediction community.

A Study for the Certified Security Certification in Private Security Industry in Korea (민간경비 자격제도에 관한 연구)

  • Ahn, Hwang-Kwon
    • Korean Security Journal
    • /
    • no.11
    • /
    • pp.159-181
    • /
    • 2006
  • This study is concerned on Why The Certified Security certification is needed and How to control the security quality to get better service to the clients. Theses days are required The Certified Certificate in all the industry. And in this point of view, the certified certificate is a kind of confirmation by an authority to the person who has how much special knowledge and practice in a certain field. Moreover, in the functionalism society the certified certificate system would be very positive effect to the related industry and society as official measurement by an authority. The security is freedom from fear and anxiety. Which means the security can not be operated in isolation from citizen's safe-living expectation, and which is also dealing with valuable human being's life. For getting the better purpose the security industry employees should have more organized special training and education. As my understanding the certified certificate exam system is the confirmation by an authority, the certified certificate is only neutral evidence to get the confidence and credit from the clients. In this point of view the core point is How to control The Certified Certificate by a credied authority.

  • PDF

A practical analysis approach to the functional requirements standards for electronic records management system (기록관리시스템 기능요건 표준의 실무적 해석)

  • Yim, Jin-Hee
    • The Korean Journal of Archival Studies
    • /
    • no.18
    • /
    • pp.139-178
    • /
    • 2008
  • The functional requirements standards for electronic records management systems which have been published recently describe the specifications very precisely including not only core functions of records management but also the function of system management and optional modules. The fact that these functional requirements standards seem to be similar to each other in terms of the content of functions described in the standards is linked to the global standardization trends in the practical area of electronic records. In addition, these functional requirements standards which have been built upon with collaboration of archivists from many national archives, IT specialists, consultants and records management applications vendors result in not only obtaining high quality but also establishing the condition that the standards could be the certificate criteria easily. Though there might be a lot of different ways and approaches to benchmark the functional requirements standards developed from advanced electronic records management practice, this paper is showing the possibility and meaningful business cases of gaining useful practical ideas learned from imaging electronic records management practices related to the functional requirements standards. The business cases are explored central functions of records management and the intellectual control of the records such as classification scheme or disposal schedules. The first example is related to the classification scheme. Should the records classification be fixed at same number of level? Should a record item be filed only at the last node of classification scheme? The second example addresses a precise disposition schedule which is able to impose the event-driven chronological retention period to records and which could be operated using a inheritance concept between the parent nodes and child nodes in classification scheme. The third example shows the usage of the function which holds or freeze and release the records required to keep as evidence to comply with compliance like e-Discovery or the risk management of organizations under the premise that the records management should be the basis for the legal compliance. The last case shows some cases for bulk batch operation required if the records manager can use the ERMS as their useful tool. It is needed that the records managers are able to understand and interpret the specifications of functional requirements standards for ERMS in the practical view point, and to review the standards and extract required specifications for upgrading their own ERMS. The National Archives of Korea should provide various stakeholders with a sound basis for them to implement effective and efficient electronic records management practices through expanding the usage scope of the functional requirements standard for ERMS and making the common understanding about its implications.

Chinese Communist Party's Management of Records & Archives during the Chinese Revolution Period (혁명시기 중국공산당의 문서당안관리)

  • Lee, Won-Kyu
    • The Korean Journal of Archival Studies
    • /
    • no.22
    • /
    • pp.157-199
    • /
    • 2009
  • The organization for managing records and archives did not emerge together with the founding of the Chinese Communist Party. Such management became active with the establishment of the Department of Documents (文書科) and its affiliated offices overseeing reading and safekeeping of official papers, after the formation of the Central Secretariat(中央秘書處) in 1926. Improving the work of the Secretariat's organization became the focus of critical discussions in the early 1930s. The main criticism was that the Secretariat had failed to be cognizant of its political role and degenerated into a mere "functional organization." The solution to this was the "politicization of the Secretariat's work." Moreover, influenced by the "Rectification Movement" in the 1940s, the party emphasized the responsibility of the Resources Department (材料科) that extended beyond managing documents to collecting, organizing and providing various kinds of important information data. In the mean time, maintaining security with regard to composing documents continued to be emphasized through such methods as using different names for figures and organizations or employing special inks for document production. In addition, communications between the central political organs and regional offices were emphasized through regular reports on work activities and situations of the local areas. The General Secretary not only composed the drafts of the major official documents but also handled the reading and examination of all documents, and thus played a central role in record processing. The records, called archives after undergoing document processing, were placed in safekeeping. This function was handled by the "Document Safekeeping Office(文件保管處)" of the Central Secretariat's Department of Documents. Although the Document Safekeeping Office, also called the "Central Repository(中央文庫)", could no longer accept, beginning in the early 1930s, additional archive transfers, the Resources Department continued to strengthen throughout the 1940s its role of safekeeping and providing documents and publication materials. In particular, collections of materials for research and study were carried out, and with the recovery of regions which had been under the Japanese rule, massive amounts of archive and document materials were collected. After being stipulated by rules in 1931, the archive classification and cataloguing methods became actively systematized, especially in the 1940s. Basically, "subject" classification methods and fundamental cataloguing techniques were adopted. The principle of assuming "importance" and "confidentiality" as the criteria of management emerged from a relatively early period, but the concept or process of evaluation that differentiated preservation and discarding of documents was not clear. While implementing a system of secure management and restricted access for confidential information, the critical view on providing use of archive materials was very strong, as can be seen in the slogan, "the unification of preservation and use." Even during the revolutionary movement and wars, the Chinese Communist Party continued their efforts to strengthen management and preservation of records & archives. The results were not always desirable nor were there any reasons for such experiences to lead to stable development. The historical conditions in which the Chinese Communist Party found itself probably made it inevitable. The most pronounced characteristics of this process can be found in the fact that they not only pursued efficiency of records & archives management at the functional level but, while strengthening their self-awareness of the political significance impacting the Chinese Communist Party's revolution movement, they also paid attention to the value possessed by archive materials as actual evidence for revolutionary policy research and as historical evidence of the Chinese Communist Party.

Evaluation of an Automated Liquid-Handling System with Fixed Pipetting Tips in Radioimmunoassay (고정용 팁을 사용하는 Automated Liquid-Handling System의 RIA적용의 평가)

  • Shin, Sun-Young;Kim, Hee-Sun;Lee, Hyun-Ju;Jang, Hyun-Young;Woo, Jae-Ryong;Lee, Ho-Young
    • The Korean Journal of Nuclear Medicine Technology
    • /
    • v.14 no.2
    • /
    • pp.190-196
    • /
    • 2010
  • Purpose: This study was undertaken to investigate the feasibility of using automated liquid-handling systems equipped with reusable fixed tips in Radioimmunoassays and to demonstrate that the use of an automated pipetting instrument can decrease in the typical daily workload. Materials and Methods: The precisions of the automated pipettor and the manual pipettor were determined gravimetrically (n=30). A total of 30 specimens for HBs Ag were repeatedly pipetted (three replicates) with the automated pipettor and then retested. PSA samples were simultaneously pipetted with either the automated pipettor or the manual pipettor and then analyzed (n=40). Sample carryover test assessed for CA19-9, AFP and HCG when the automated pipettor was used. Pipetting speed of the automated pipettor and the manual pipettor were compared by evaluation of each workload. Results: The precisions coefficients of variation (CV) were 2.1% for the automated pipettor and 1.6% for manual pipettor. The mean cpm and CV for each group of replicates were 41,203 cpm and 3.7% for HBs Ag positive specimens, and 99 cpm and 7.9% for HBs Ag negative specimens, respectively. PSA results showed no significant differences between automated pipettor and manual pipettor (p=0.15, r=0.999). Carryover for CA19-9, AFP and HCG analytes was <0.1 ppm or below the assay limit of detection. Pipetting speed was significantly improved by using the automated instrument. Conclusion: There was no evidence that the use of an automated pipettor adversely affected any of the performance characteristics of the assay. Indeed, routine use of the Tecan automated pipettor has resulted in a decrease in the typical daily workload.

  • PDF

A Case Study of Software Architecture Design by Applying the Quality Attribute-Driven Design Method (품질속성 기반 설계방법을 적용한 소프트웨어 아키텍처 설계 사례연구)

  • Suh, Yong-Suk;Hong, Seok-Boong;Kim, Hyeon-Soo
    • The KIPS Transactions:PartD
    • /
    • v.14D no.1 s.111
    • /
    • pp.121-130
    • /
    • 2007
  • in a software development, the design or architecture prior to implementing the software is essential for the success. This paper presents a case that we successfully designed a software architecture of radiation monitoring system (RMS) for HANARO research reactor currently operating in KAERI by applying the quality attribute-driven design method which is modified from the attribute-driven design (ADD) introduced by Bass[1]. The quality attribute-driven design method consists of following procedures: eliciting functionality and quality requirements of system as architecture drivers, selecting tactics to satisfy the drivers, determining architectures based on the tactics, and implementing and validating the architectures. The availability, maintainability, and interchangeability were elicited as duality requirements, hot-standby dual servers and weak-coupled modulization were selected as tactics, and client-server structure and object-oriented data processing structure were determined at architectures for the RMS. The architecture was implemented using Adroit which is a commercial off-the-shelf software tool and was validated based on performing the function-oriented testing. We found that the design method in this paper is an efficient method for a project which has constraints such as low budget and short period of development time. The architecture will be reused for the development of other RMS in KAERI. Further works are necessary to quantitatively evaluate the architecture.

Opportunity Tree Framework Design For Optimization of Software Development Project Performance (소프트웨어 개발 프로젝트 성능의 최적화를 위한 Opportunity Tree 모델 설계)

  • Song Ki-Won;Lee Kyung-Whan
    • The KIPS Transactions:PartD
    • /
    • v.12D no.3 s.99
    • /
    • pp.417-428
    • /
    • 2005
  • Today, IT organizations perform projects with vision related to marketing and financial profit. The objective of realizing the vision is to improve the project performing ability in terms of QCD. Organizations have made a lot of efforts to achieve this objective through process improvement. Large companies such as IBM, Ford, and GE have made over $80\%$ of success through business process re-engineering using information technology instead of business improvement effect by computers. It is important to collect, analyze and manage the data on performed projects to achieve the objective, but quantitative measurement is difficult as software is invisible and the effect and efficiency caused by process change are not visibly identified. Therefore, it is not easy to extract the strategy of improvement. This paper measures and analyzes the project performance, focusing on organizations' external effectiveness and internal efficiency (Qualify, Delivery, Cycle time, and Waste). Based on the measured project performance scores, an OT (Opportunity Tree) model was designed for optimizing the project performance. The process of design is as follows. First, meta data are derived from projects and analyzed by quantitative GQM(Goal-Question-Metric) questionnaire. Then, the project performance model is designed with the data obtained from the quantitative GQM questionnaire and organization's performance score for each area is calculated. The value is revised by integrating the measured scores by area vision weights from all stakeholders (CEO, middle-class managers, developer, investor, and custom). Through this, routes for improvement are presented and an optimized improvement method is suggested. Existing methods to improve software process have been highly effective in division of processes' but somewhat unsatisfactory in structural function to develop and systemically manage strategies by applying the processes to Projects. The proposed OT model provides a solution to this problem. The OT model is useful to provide an optimal improvement method in line with organization's goals and can reduce risks which may occur in the course of improving process if it is applied with proposed methods. In addition, satisfaction about the improvement strategy can be improved by obtaining input about vision weight from all stakeholders through the qualitative questionnaire and by reflecting it to the calculation. The OT is also useful to optimize the expansion of market and financial performance by controlling the ability of Quality, Delivery, Cycle time, and Waste.

The Efficiency of Bank Underwriting of Corporate Securities in Korea (국내 자본시장 증권인수기능의 효율성에 관한 연구 : 은행계열과 비은행계열 금융기관 비교 분석)

  • Baek, Jae-Seung;Lim, Chan-Woo
    • The Korean Journal of Financial Management
    • /
    • v.27 no.1
    • /
    • pp.181-208
    • /
    • 2010
  • In July 2007, Korean government has passed "The Capital Market and Financial Investment Services Act" to further develop the capital markets and the Act was to become effective in February 2009. Using a large sample of Korean firms, we have examined (i) the effect of underwriting activities on the firm value (bond spread) comparing commercial bank and investment bank, and (ii) the determinants of the firm value changes following underwriting activities of bank. To test our goal, we collected a wide range of samples of data for bond issuing activities executed by Korean firms listed on the Korea Stock Exchange (KSE) between 2000 and 2003. Our paper is distinguished from previous studies on this subject in a way that we analyzed the effect of corporate bond underwriting activities with regard to commercial banking and investment banking. Initially, we set up a hypothesis that "Certification View" and "Conflict-of-interest View" are major driving forces behind cross-firm differences in performance following bond issuance. We find that, in general, underwriting by investment bank (securities company) brings a positive effect on the firm value (spread between bench mark rate and bond issuing rate). This result indicates that firm value has been negatively affected by the bank underwriting and provides the evidence for "Conflict-of-interest View" in Korea. Our studies have also revealed that any change in firm value following bond issuance is positively related with the firm size (total asset), operating performance, liquidity (cashflow), and equity ownership by foreign investors. Overall, our results support the view that bank underwriting activities can play an important role in determining firm value and financial strategies under "The Capital Market and Financial Investment Services Act" of 2007.

  • PDF

The Effect of Entrepreneurship Education on the Career Path of University Students (창업교육이 대학생의 진로에 미치는 효과성 연구)

  • Ahn, Tae-Uk;Park, Jae-Whan
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.13 no.2
    • /
    • pp.177-192
    • /
    • 2018
  • The mission of the university is to grow young people who will be responsible for the next generation nation to mature society. In particular, the role of universities in the 4th Industrial Revolution era is to foster creative talents. Therefore, innovative changes are required for existing infusion education and employment-oriented college education contents and teaching methodology. In the high youth unemployment rate, entrepreneurship education is spreading to universities to innovate existing organizations and create new jobs. Until now, however, the effects of university entrepreneurship education have been studied mainly in the field of start-up. Therefore, it is very difficult to study various effects on entrepreneurship education. In this study, empirical analysis of the effect of entrepreneurship training on career preparation behaviors of university students who are about to enter the society is verified. The sample of this study was surveyed from August, 2016, and the questionnaire was applied to 393 university students who selected 5 universities and entrepreneurship education. As a result of the analysis, the ability of communicative communication and creative problem solving cultivated through entrepreneurship education had a positive effect on entrepreneurship and self - efficacy, Entrepreneurship and self - efficacy had a positive (+) positive effect on career preparation behavior. However, cooperative communication ability, creative problem solving ability, and effective work behavior ability by entrepreneurship education were not directly related to career preparation behavior. On the other hand, in verifying the mediating effect of entrepreneurship and self - efficacy, it proved that mediating role of positive communication between collaborative communication ability, creative problem solving ability and career preparation behavior. The implications of this study are as follows This study examines the effects of university entrepreneurship education on career preparedness behaviors.In other words, the university proved the direct effect and the mediating effect that affects positively (+) effect on career preparation behaviors by encouraging entrepreneurship and self - efficacy, rather than quantitative extension based on competency. Also, the implication of the parameters (entrepreneurship, self - efficacy) as a key variable for the effect and performance of career preparation behavior was derived.It also suggests that it is necessary to improve the creativity ability of entrepreneurship education so that it can have a direct and meaningful influence on career preparation behavior. First of all, it is urgent to develop a qualitative evaluation index for entrepreneurship education in order to measure these effects. Therefore, further study is required to verify the various implications for future entrepreneurship education, as well as the implications that entrepreneurship education is indispensable for the preparation of university students' careers.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF