• Title/Summary/Keyword: 운영 효율

Search Result 6,736, Processing Time 0.035 seconds

An Empirical Study on the Success Factors of Implementing Product Life Cycle Management Systems (제품수명주기관리 시스템 도입의 성공요인에 관한 실증연구)

  • Kim, Jeong-Beom
    • Journal of KIISE:Software and Applications
    • /
    • v.37 no.12
    • /
    • pp.909-918
    • /
    • 2010
  • To analyze the national competitiveness of Korea leads to the conclusion that global high-tech enterprises have been playing leading and pulling roles in making Korea in line with advanced countries even though the country is lacking in various natural resources. The characteristics of these companies above are as follows; Firstly, these enterprises continue to accumulate core technologies and know-how with highly competent human resources and well-organized management. Secondly, they are well structured and equipped with information technology infrastructures which are, for example, ERP, SCM, CRM, and PLM. Among them PLM is considered to be the principal core information technology infra in manufacturing industry. The urgent task of manufacturing industry recently is to develop new products to accept various needs of consumers, and to launch the products in time to market, which requires the manufactures to be equipped with product development infra and system to upgrade product fulfillment and mass production system in a short period. The introduction of PLM System is a solution of core strategy as a manufacturer for collaboration, global development, reengineering of manufacturing system, the innovation and efficiency of manufacturing process, and product quality improvement. The purpose of this study is to analyze the success factors of introducing PLM System and its practicing effectiveness. And the results of empirical study are as follows; (1) Technical success factors positively impact system quality and user satisfaction, (2) Organizational success factors positively impact system quality, but does not impact user satisfaction, (3) Environmental success factors positively impact system quality and user satisfaction, (4) System quality positively impacts user satisfaction, (5) User satisfaction positively impacts the effectiveness of implementing PLM systems, but system quality does not impact it.

Comparative analysis on status of events and importance-performance analysis (IPA) between industry and school foodservices (사업체급식소와 학교급식소의 이벤트 실태 및 이벤트에 대한 중요도-수행도 분석 비교)

  • Song, Hyun Jin;Rho, Jeong Ok
    • Journal of Nutrition and Health
    • /
    • v.47 no.6
    • /
    • pp.452-462
    • /
    • 2014
  • Purpose: The purpose of the study was to evaluate the status of events and importance-performance analysis (IPA) between industry and school foodservices. Methods: The study subjects were dietitians in industry foodservices (n = 73) and nutrition teachers in school foodservices (n = 135) in the Jeonbuk area. Demographic characteristics, status of events, and problems of implementing events were assessed using a self-administered questionnaire. Results: Approximately 67% of industry foodservices had implemented an event a month, whereas 40.7% of school foodservices did not implement events for students. The type of events that industry and school foodservices had implemented most frequently were Sambok event, Dongji event, Daeboreum event, Spring-Namul event, and Chuseok event. The industry foodservices had significantly higher average scores for performance of events than those of the school foodservices (p < 0.001). In the Importance-Performance Analysis (IPA), high importance and high performance (A area: doing great) in industry foodservices were seasonal events, traditional festival day events, anniversary events, traditional seasonal events, and personal memory events, whereas in school foodservices were traditional festival day events, traditional seasonal events, school events, and environment events. Conclusion: These results showed that events are important for the increase in customer satisfaction. Therefore, it is necessary to consider educational programs on event implementation for dietitians and employees in industry and school foodservices.

The Study for the State of Nutrition & the Development of Physical Standard of Nursery School Children (보육원아(保育園兒)의 영양상태(營養狀態)와 체위(體位)의 발달도(發達度)에 관(關)한 연구(硏究))

  • Lee, Geum-Yeong
    • Journal of the Korean Society of Food Science and Nutrition
    • /
    • v.5 no.1
    • /
    • pp.31-37
    • /
    • 1976
  • 1. In order to increase our physical power through raising the amount of Hb to normal level and thus enrich our national power, it is earnestly required to improve the general eating habits in the direction of taking enough animal protein (nutrition food) that is required to form Hb and adequate administrative procedures of the nursery school are to be taken at the same time. 2. The genetic amentia's development of skeleton is generally under the normal level. And so their physical condition should be inferior to the standard growth rate of the same age. But the fact is that their physical growth is almost the same as the same age with only few exceptions. Besides, considering the fact that their amount of Hb is less than that of the normal level, I think we can conclude that the majority of the amentia in the nursery school were malnutrition during their prenatal period or during their infancy. We need continuous statistical study concerning many amentia that is scattered all part of our country, to make our amentia's hereditary transmission and the expression clear. And so the Intelligence Quotient of the amentia are from 26 to 80, we consider to need nourishing meal in ordinary times to make more efficient development of intellectual faculties. 3. As to the relation between blood type and disease, there are much debates going on in many countries. To get more apodictic results, however, continuous study is desired to be made in the future.

  • PDF

A study on an evaluation model for industrial information systems by industry sectors (업종별 특성을 고려한 기업정보화 성숙모형)

  • 진경수;임춘성;박찬권
    • Proceedings of the CALSEC Conference
    • /
    • 2002.01a
    • /
    • pp.86-106
    • /
    • 2002
  • Informatization is a process that corporation's external environmental factors and internal environmental factors influence as complex. is a phenomenon that appears via this process. To evaluate that informatization was propeled well or informatization level is high can be dangerous work extremely by only once-over-lightly some factors, organization information ability is superior or infrastructure is constructed well. Therefore, an evaluation for industrial information systems that consider corporation's external environment and internal environment configurationally and objective estimation through this is required in national dimension. This research sorted types of business using types of business classification of 2001 EIII(Evaluation Indices of Industrial Informatization) laying stress on corporation's product and product production process for reflecting various industrial classification. And we are dividing whole our country corporations by manufacture industry, the construction industry, distribution industry, service industry, banking industry 5 types of business. To see such classed types industry classification from consistent viewpoint, we saw them within new framework, purchase, operation, physical distribution, marketing and sale. service etc. laying stress on primary businesses except support businesses of planning, financial management etc. To draw special quality of business center from primary business of each types of business, we draw industry classification Key Capability that centers when plans corporation's corporate strategy and information strategy. And we deducted industrial classification key production business connected with industry classification Key Capability. After drawing an evaluation items for industrial information systems in informatization analysis viewpoint laying stress on drawn businesses. Finally we did Case Study by making out an evaluation for industrial information systems questionnaire that considers special quality of manufacturing industry. Through EIII that consider the industrial classification, we could know that it explains the corporation's purchase, production, distribution in general and detail.

  • PDF

Framework of Stock Market Platform for Fine Wine Investment Using Consortium Blockchain (공유경제 체제로서 컨소시엄 블록체인을 활용한 와인투자 주식플랫폼 프레임워크)

  • Chung, Yunkyeong;Ha, Yeyoung;Lee, Hyein;Yang, Hee-Dong
    • Knowledge Management Research
    • /
    • v.21 no.3
    • /
    • pp.45-65
    • /
    • 2020
  • It is desirable to invest in wine that increases its value, but wine investment itself is unfamiliar in Korea. Also, the process itself is unreasonable, and information is often forged, because pricing in the wine market is done by a small number of people. With the right solution, however, the wine market can be a desirable investment destination in that the longer one invests, the higher one can expect. Also, it is expected that the domestic wine consumption market will expand through the steady increase in domestic wine imports. This study presents the consortium block chain framework for revitalizing the wine market and enhancing transparency as the "right solution" of the nation's wine investment market. Blockchain governance can compensate for the shortcomings of the wine market because it guarantees desirable decision-making rights and accountability. Because the data stored in the block chain can be checked by consumers, it reduces the likelihood of counterfeit wine appearing and complements the process of unreasonably priced. In addition, digitization of assets resolves low cash liquidity and saves money and time throughout the supply chain through smart contracts, lowering entry barriers to wine investment. In particular, if the governance of the block chain is composed of 'chateau-distributor-investor' through consortium blockchains, it can create a desirable wine market. The production process is stored in the block chain to secure production costs, set a reasonable launch price, and efficiently operate the distribution system by storing the distribution process in the block chain, and forecast the amount of orders for futures trading. Finally, investors make rational decisions by viewing all of these data. The study presented a new perspective on alternative investment in that ownership can be treated like a share. We also look forward to the simplification of food import procedures and the formation of trust within the wine industry by presenting a framework for wine-owned sales. In future studies, we would like to expand the framework to study the areas to be applied.

Development of the evaluation tool for the food safety and nutrition management education projects targeting the middle class elderly: Application of the balanced score card and the structure-process-outcome concept (중산층 노인대상 식품안전·영양관리 교육 사업 평가를 위한 도구 개발: 균형성과표와 구조·과정·성과 개념 적용)

  • Chang, Hyeja;Yoo, Hyoi;Chung, Harim;Lee, Hyesang;Lee, Minjune;Lee, Kyungeun;Yoo, Changhee;Choi, Junghwa;Lee, Nayoung;Kwak, Tongkyung
    • Journal of Nutrition and Health
    • /
    • v.48 no.6
    • /
    • pp.542-557
    • /
    • 2015
  • Purpose: The aim of this study is to develop an evaluation tool for operation of food safety and nutrition education projects for middle class elderly using the concept of the balanced score card. Methods: After the draft of the evaluation tool for the elderly training projects was completed, it was revised into the questionnaire and the validity of the indicators was tested by the Delphi group. The validity of the indicators was rated using a 5-point scale. The Delphi group consisted of 26 experts in the education sector, 16 government officials, and 24 professionals of the related area in communities. The first round test was conducted from July 9 to July 17, 2012, and 45 persons responded. The second round test was conducted from July 18 to July 25 and 32 persons responded. Results: The indicators, which were answered by more than 75 percent of the experts as 'agree' (4 points), 'strongly agree' (5 point) were included as the final indicators for the evaluation tool: 28 items out of 36 in outcome perspectives, 9 items out of 12 in process perspectives, and 17 out of 20 items in structure perspectives. The score was allocated as 50 points for outcome indicators, 20 points for process indicators, and 30 points for structure indicators. Conclusion: Completion of the evaluation tool is a prerequisite to determine whether the program is effectively implemented. The monitoring tool developed in the study could be applied for identification of the most optimal delivery path for the food safety and nutrition education program, for the spread of the food safety and nutrition education program for middle class elderly.

Study on the Consequence Effect Analysis & Process Hazard Review at Gas Release from Hydrogen Fluoride Storage Tank (최근 불산 저장탱크에서의 가스 누출시 공정위험 및 결과영향 분석)

  • Ko, JaeSun
    • Journal of the Society of Disaster Information
    • /
    • v.9 no.4
    • /
    • pp.449-461
    • /
    • 2013
  • As the hydrofluoric acid leak in Gumi-si, Gyeongsangbuk-do or hydrochloric acid leak in Ulsan, Gyeongsangnam-do demonstrated, chemical related accidents are mostly caused by large amounts of volatile toxic substances leaking due to the damages of storage tank or pipe lines of transporter. Safety assessment is the most important concern because such toxic material accidents cause human and material damages to the environment and atmosphere of the surrounding area. Therefore, in this study, a hydrofluoric acid leaked from a storage tank was selected as the study example to simulate the leaked substance diffusing into the atmosphere and result analysis was performed through the numerical Analysis and diffusion simulation of ALOHA(Areal Location of Hazardous Atmospheres). the results of a qualitative evaluation of HAZOP (Hazard Operability)was looked at to find that the flange leak, operation delay due to leakage of the valve and the hose, and toxic gas leak were danger factors. Possibility of fire from temperature, pressure and corrosion, nitrogen supply overpressure and toxic leak from internal corrosion of tank or pipe joints were also found to be high. ALOHA resulting effects were a little different depending on the input data of Dense Gas Model, however, the wind direction and speed, rather than atmospheric stability, played bigger role. Higher wind speed affected the diffusion of contaminant. In term of the diffusion concentration, both liquid and gas leaks resulted in almost the same $LC_{50}$ and ALOHA AEGL-3(Acute Exposure Guidline Level) values. Each scenarios showed almost identical results in ALOHA model. Therefore, a buffer distance of toxic gas can be determined by comparing the numerical analysis and the diffusion concentration to the IDLH(Immediately Dangerous to Life and Health). Such study will help perform the risk assessment of toxic leak more efficiently and be utilized in establishing community emergency response system properly.

The Establishment of the Third Medium and Long Term Development Plan of the Comics Industry and the Policy of Training Professional Manpower (3차 만화산업중장기발전계획 수립과 전문인력양성 정책)

  • Kim, Byoung Soo;Lee, Won Seok
    • Cartoon and Animation Studies
    • /
    • s.32
    • /
    • pp.189-220
    • /
    • 2013
  • It is expected that interests and supports for 'the creative economy' will increase considerably since the establishment of the Park Geun Hye Administration. According to a report with respect to its cultural policy handed in by the Minister of Culture to the president on March 28, 2013, the administration will set up a basic plan of establishing regional fusion-typed laboratories including such genres as story telling, animations, games, cartoons, performances, etc. in May this year, and opening contents Korea laboratories across the country by the first quarter in 2014 as part of its core task. Furthermore, it will focus on implementing such policies for training professional manpower as creative mentoring programs, expansion of education for field employees and expansion of a creative education for young students, including a plan to train 1,000 creative contents talents by 2017 as described in the report. Since the Comics Promotional Law took effect in August 2012, the Korea Culture and Content Agency and the Comics Industry have been establishing the third plan for medium and long term development of the comics industry together. One of the most important policy is about training professional manpower. "Joint Business with Creative Talents," in which the amount of 4.5 billion won was invested, has already been implemented, and "Support Business for Field Employees of Comics Creating Enterprises," in which the amount of 0.6 billion won was invested, has been performed so far through the Korea Comics Contents Agency upon the request of the Comics Industry. The government's plan to train professional manpower is interlocked with its foundation and employment policies, and thus, this will be a good opportunity for colleges and universities that have comics related majors, especially for those that need proper measures for bring their graduates a chance to get a job. Accordingly, it seems that if the government develops more aggressive policies, reflects this on the third medium and long term development plan of the comics industry, and then organizes policy and study meetings led by the learned societies to implement this, it will be able to generate a significant synergy effect. This Article will concentrate on first examining the flow and patterns of the policy to train special manpower by the comics industry, the Ministry of Culture and related institutions since the establishment of the Comics Promotional Law, analyzing some problems in the first and second medium and long term development plan of the comics industry to be implemented from 2003 through 2013 and the third medium and long term development plan to be announced in June 2013 to train professional manpower, and then suggesting an effective direction and some alternatives to train professional manpower in universities in a medium and long term way.

A Study on the RFID's Application Environment and Application Measure for Security (RFID의 보안업무 적용환경과 적용방안에 관한 연구)

  • Chung, Tae-Hwang
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.155-175
    • /
    • 2009
  • RFID that provide automatic identification by reading a tag attached to material through radio frequency without direct touch has some specification, such as rapid identification, long distance identification and penetration, so it is being used for distribution, transportation and safety by using the frequency of 125KHz, 134KHz, 13.56MHz, 433.92MHz, 900MHz, and 2.45GHz. Also it is one of main part of Ubiquitous that means connecting to net-work any time and any place they want. RFID is expected to be new growth industry worldwide, so Korean government think it as prospective field and promote research project and exhibition business program to linked with industry effectively. RFID could be used for access control of person and vehicle according to section and for personal certify with password. RFID can provide more confident security than magnetic card, so it could be used to prevent forgery of register card, passport and the others. Active RFID could be used for protecting operation service using it's long distance date transmission by application with positioning system. And RFID's identification and tracking function can provide effective visitor management through visitor's register, personal identification, position check and can control visitor's movement in the secure area without their approval. Also RFID can make possible of the efficient management and prevention of loss of carrying equipments and others. RFID could be applied to copying machine to manager and control it's user, copying quantity and It could provide some function such as observation of copy content, access control of user. RFID tag adhered to small storage device prevent carrying out of item using the position tracking function and control carrying-in and carrying-out of material efficiently. magnetic card and smart card have been doing good job in identification and control of person, but RFID can do above functions. RFID is very useful device but we should consider the prevention of privacy during its application.

  • PDF

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF