• Title/Summary/Keyword: 정보기술 활동

Search Result 2,745, Processing Time 0.034 seconds

A Study on the Characteristics of Enterprise R&D Capabilities Using Data Mining (데이터마이닝을 활용한 기업 R&D역량 특성에 관한 탐색 연구)

  • Kim, Sang-Gook;Lim, Jung-Sun;Park, Wan
    • Journal of Intelligence and Information Systems
    • /
    • v.27 no.1
    • /
    • pp.1-21
    • /
    • 2021
  • As the global business environment changes, uncertainties in technology development and market needs increase, and competition among companies intensifies, interests and demands for R&D activities of individual companies are increasing. In order to cope with these environmental changes, R&D companies are strengthening R&D investment as one of the means to enhance the qualitative competitiveness of R&D while paying more attention to facility investment. As a result, facilities or R&D investment elements are inevitably a burden for R&D companies to bear future uncertainties. It is true that the management strategy of increasing investment in R&D as a means of enhancing R&D capability is highly uncertain in terms of corporate performance. In this study, the structural factors that influence the R&D capabilities of companies are explored in terms of technology management capabilities, R&D capabilities, and corporate classification attributes by utilizing data mining techniques, and the characteristics these individual factors present according to the level of R&D capabilities are analyzed. This study also showed cluster analysis and experimental results based on evidence data for all domestic R&D companies, and is expected to provide important implications for corporate management strategies to enhance R&D capabilities of individual companies. For each of the three viewpoints, detailed evaluation indexes were composed of 7, 2, and 4, respectively, to quantitatively measure individual levels in the corresponding area. In the case of technology management capability and R&D capability, the sub-item evaluation indexes that are being used by current domestic technology evaluation agencies were referenced, and the final detailed evaluation index was newly constructed in consideration of whether data could be obtained quantitatively. In the case of corporate classification attributes, the most basic corporate classification profile information is considered. In particular, in order to grasp the homogeneity of the R&D competency level, a comprehensive score for each company was given using detailed evaluation indicators of technology management capability and R&D capability, and the competency level was classified into five grades and compared with the cluster analysis results. In order to give the meaning according to the comparative evaluation between the analyzed cluster and the competency level grade, the clusters with high and low trends in R&D competency level were searched for each cluster. Afterwards, characteristics according to detailed evaluation indicators were analyzed in the cluster. Through this method of conducting research, two groups with high R&D competency and one with low level of R&D competency were analyzed, and the remaining two clusters were similar with almost high incidence. As a result, in this study, individual characteristics according to detailed evaluation indexes were analyzed for two clusters with high competency level and one cluster with low competency level. The implications of the results of this study are that the faster the replacement cycle of professional managers who can effectively respond to changes in technology and market demand, the more likely they will contribute to enhancing R&D capabilities. In the case of a private company, it is necessary to increase the intensity of input of R&D capabilities by enhancing the sense of belonging of R&D personnel to the company through conversion to a corporate company, and to provide the accuracy of responsibility and authority through the organization of the team unit. Since the number of technical commercialization achievements and technology certifications are occurring both in the case of contributing to capacity improvement and in case of not, it was confirmed that there is a limit in reviewing it as an important factor for enhancing R&D capacity from the perspective of management. Lastly, the experience of utility model filing was identified as a factor that has an important influence on R&D capability, and it was confirmed the need to provide motivation to encourage utility model filings in order to enhance R&D capability. As such, the results of this study are expected to provide important implications for corporate management strategies to enhance individual companies' R&D capabilities.

동서간 중소기업 협력체제 구축 방안

  • Han, Jang-Hui
    • Journal of Global Scholars of Marketing Science
    • /
    • v.2
    • /
    • pp.17-37
    • /
    • 1998
  • 중소기업간 협력 활동은 사업의 전체 혹은 일정 부분에 대하여 분업이나 협업의 관계를 맺는 공동사업의 형태로 나타난다. 기업간 연결의 강도에 따라 기업들간에 형성되는 분업과 협업의 관계를 시장형, 중간조직형, 위계조직형으로 구분할 때, 중소기업간 공동사업은 중간조직형에 속하는 일종의 기업간 네트워크라고 볼 수 있다. 물론 네트워크형의 협력관계를 추진하는 방식도 업무제휴, 지분제휴, 합작투자, 컨소시엄 등으로 다양하다. 그러나 완전한 자본적 통합에 따른 위계적 조직과는 달리 참여기업들이 독립성을 유지하면서, 네트워크 밖의 기업에 대해 경쟁우위를 확보하기 위해 형성한다는 공통점을 가지고 있다. 기업간 협력관계를 통해 참여 기업들이 얻을 수 있는 혜택에 관한 기존연구들은 크게 두 가지로 나누어 볼 수 있다. 하나는 기업의 생산함수를 중심으로 그 이점을 파악하는 것이고 다른 하나는 관계의 종류에 따라 기업간 거래관계를 관리하는 소위 거래비용의 효율성을 중심으로 혜택을 파악하는 접근방법이다. 전자의 접근방법을 따를 때, 기업간 협력의 근본 유인은 규모의 경제(혹은 비경제), 범위의 경제, 집적의 경제, 구도의 경제 등이 협력관계에서 발생하는 혜택의 근본 원천이다. 기술과 제도의 발전, 시장과 경쟁환경의 변화에 따른 기업간 협력의 필요성은 갈수록 증대되고 있다. 소비자들의 요구는 매우 개성화 다양화되고 종합화되는 추세이다. 더불어 기술개발의 비용이 큰 폭으로 증가하고 있으며, 경쟁의 격화로 기술 및 제품의 진부화도 급속도로 이루어지고 있다. 세계화 상품고도화 서비스산업화 정보화 등으로 특징지워지는 새로운 경쟁환경 아래에서 장기적으로 기업의 경쟁력을 향상시키기 위해서는 시장중심적인 관점에서 형성된 기업간 전략적 연계를 바탕으로, 정보의 집적을 통해 다양한 생산성 향상 혹은 관계효율성 향상의 경제를 추구하는 것이 필연적 전제 조건이 되었다. 기업간 경쟁보다는 최종제품의 생산과 판매를 위해 형성된 기업네트워크간의 경쟁이 중시되는 시대인 것이다. 동서간(東西間) 중소기업(中小企業)의 협력(協力)을 새삼스럽게 논의하는 것은 다분히 정치적이라는 느낌을 준다. 경제적인 관점에서 실익이 있음에도 불구하고 동서간 중소기업의 협력이 이루어지지 못하고 있다면, 그 이유는 기업정보의 수집과 유통상의 문제이거나 문화나 기업관행에 대한 잘못된 선입관에서 비롯된 관계 관리비용 계산상의 문제일 것이다. 현실적으로 이 가능성은 매우 낮다. 산업의 발전 정도나 연관성에 있어서 동서축보다는 남북축을 따라 기업간 협력이 이루어질 수 밖에 없는 우리나라의 현재 상황이 동서간보다는 남북간 경제교류를 유도하고 있는 것이다. 동서간 중서기업 협력체제의 구축에 대한 논의가 본질적으로 정치적 관심에서 비롯되었다는 전제 하에, 구축의 방안을 논의하고자 한다. 경제적으로도 타당하면서 정치적으로 관심을 유발할 수 있는 협력체제 구축방안으로, 기업간 네트워크의 조직 주체로서 최근에 논의되고 있는 새로운 형태의 마케팅회사를 동서간에 공동으로 설립할 것을 제안한다. 영구 지속적 공동사업관계보다는 프로젝트별 공동사업을 전제로 기업들 사이의 효과적인 네트워크를 형성함으로써 일종의 가상적 기업을 결성할 필요가 있다. 이러한 기업간 네트워크 형성의 실행주체가 될 수 있는 새로운 마케팅 전문기업의 형태로는 공동회사(空洞會社)(hollow company), 종합상사(綜合商社)(General Trading Company), 거래형 마케팅회사(Marketing Exchange Company), 변환형 마케팅회사(Marketing Coalition Company) 등을 들 수 있다. 양 지역에서는 소비자환경과 기술환경의 특성 및 양 지역의 경제에 대한 파급효과를 고려하여 가장 적합한 마케팅회사의 유형은 선택하여 육성하고, 이를 중심으로 강력한 양 지역 및 다른 지역에 입지한 기업간의 네트워크를 구축하여야 한다. 마케팅회사를 설립하고 완전한 마케팅 서비스를 제공할 수 있도록 육성하기 위해서는 많은 투자가 필요하다. 마케팅회사의 핵심기능 분야인 금융부문, 정보부문, 영업조직 등은 모두 막대한 투자를 필요로하는 기능영역이다. 정보부문은 기술의 발전과 범세계적인 정보관련기관과의 제휴를 통해 독자적인 구축이 어느 정도 가능하나, 영업조직의 구축을 위해서는 기존업체와의 연대가 필수적인 것으로 판단된다. 지속적으로 효과적인 기업간 네트워크를 형성하고 유지하기 위해서는 또한 기업간 관계를 관리하는 방식과 제도 및 수단에 대한 연구가 필요하다. 양 지역 산 학 관의 공동노력을 통해서 새로운 경제 환경에 가장 적합한 기업 형태로 제시된 바 있는 마케팅 전문회사 중심의 기업간 네트워크를 성공적으로 구축한다면, 양 지역 및 국가 경제의 지속적인 동력원이 될 수 있을 것이다

  • PDF

A Study Covering the Comparative Analysis of Educational Systems in Major Countries for Regular Cybersecurity Education (사이버보안 정규교육화를 위한 주요국 교육체계 비교분석 연구)

  • YOO, Jiyeon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.397-405
    • /
    • 2021
  • With the recent phenomenon of the Intelligence Information Society, the cyber security paradigm has begun to change. In particular, the increase of the interconnectedness of the hyperlinked society has extended the scope of damage that can be caused by cyber threats to the real world. In addition to that, it can also be a risk to any given individual who could accompany a crisis that has to do with public safety or national security. Adolescents who are digital natives are more likely to be exposed to cyber threats, which is mainly due to the fact that they are significantly more involved in cyber activities and they also possess insufficient security comprehension and safety awareness. Therefore, it is necessary to strengthen cyber security capabilities of every young individual, so that they can effectively protect themselves against cyber threats and better manage their cyber activities. It examines the changes of the security paradigm and the necessity for cyber security education, which is in direct accordance to the characteristics of a connected society that further suggests directions and a basic system of cyber security education, through a detailed analysis of the current state of Domestic and Overseas Cyber Security Education. The purpose of this study was to define cybersecurity competencies that are necessary within an intelligent information society, and to propose a regular curriculum for strengthening cybersecurity competencies, through the comparison and meticulous analysis of both domestic and overseas educational systems that are pertinent to cybersecurity competencies. Accordingly, a cybersecurity competency system was constructed, by reflecting C3-Matrix, which is a cyber competency system model of digital citizens. The cybersecurity competency system consists of cyber ethics awareness, cyber ethics behavior, cyber security and cyber safety. In addition to this, based on the basic framework of the cybersecurity competency system, the relevant education that is currently being implemented in the United States, Australia, Japan and Korea were all compared and analyzed. From the insight gained through the analysis, the domestic curriculum was finally presented. The main objective of this new unified understanding, was to create a comprehensive and effective cyber security competency curriculum.

Operation Status of Chinese Security Service Industry and Institutional Settlement Methods (중국 보안서비스산업의 운영실태 및 제도정착 방안)

  • Lee, Sangchul
    • Journal of the Society of Disaster Information
    • /
    • v.10 no.4
    • /
    • pp.536-547
    • /
    • 2014
  • With the changing safety services and social order systems accompanied by the economic development and changing public security environment since the Chinese economic reform, the security service industry in China is growing daily and related problems are increasing. For the Chinese security service market to be activated, the monopoly of security services by the public security agencies must be removed. In addition, the research and development, expansion, and applications of safety and crime prevention technologies regarding the safety and protection of exhibition, sales, culture, sports, commerce activities, combinations of safety technologies and crime prevention processes, the provision of relevant technical operations, and the expansion of security service areas are required. Furthermore, the administration rights, property rights, and business management rights of security companies must be separated, the security headquarters must be integrated and coordinated for optimization of various resources solely by market needs, and their rights and affiliation relations must be clear. Besides, the competitiveness of security companies in the security service market must be enhanced by unifying the business management, and optimizing and sharing their resources. The security service ordinances of China that have been implemented now must be applied realistically, methods to activate the true market economy for security services must be researched, and various ordinances related to security services must be realigned in line with the characteristics of security services. Finally, for the mutual cooperation system between public and private security services, the public security agencies must acknowledge the importance of private security services and the status of security service providers in crime prevention and social order maintenance. They must establish partnership relations with each other beyond the unilateral direction and management system for security services and drive with positive attitudes the security service industry which is still in its infancy.

A Comparative Study on Similarity Measure Techniques for Cross-Project Defect Prediction (교차 프로젝트 결함 예측을 위한 유사도 측정 기법 비교 연구)

  • Ryu, Duksan;Baik, Jongmoon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.7 no.6
    • /
    • pp.205-220
    • /
    • 2018
  • Software defect prediction is helpful for allocating valuable project resources effectively for software quality assurance activities thanks to focusing on the identified fault-prone modules. If historical data collected within a company is sufficient, a Within-Project Defect Prediction (WPDP) can be utilized for accurate fault-prone module prediction. In case a company does not maintain historical data, it may be helpful to build a classifier towards predicting comprehensible fault prediction based on Cross-Project Defect Prediction (CPDP). Since CPDP employs different project data collected from other organization to build a classifier, the main obstacle to build an accurate classifier is that distributions between source and target projects are not similar. To address the problem, because it is crucial to identify effective similarity measure techniques to obtain high performance for CPDP, In this paper, we aim to identify them. We compare various similarity measure techniques. The effectiveness of similarity weights calculated by those similarity measure techniques are evaluated. The results are verified using the statistical significance test and the effect size test. The results show k-Nearest Neighbor (k-NN), LOcal Correlation Integral (LOCI), and Range methods are the top three performers. The experimental results show that predictive performances using the three methods are comparable to those of WPDP.

Design of Multi-agent System for Course Scheduling of Learner-oriented using Weakness Analysis Algorithm (취약성 분석 알고리즘을 이용한 학습자 중심의 코스 스케쥴링 멀티 에이전트 시스템의 설계)

  • Kim, Tae-Seog;Lee, Jong-Hee;Lee, Keun-Wang;Oh, Hae-Seok
    • The KIPS Transactions:PartA
    • /
    • v.8A no.4
    • /
    • pp.517-522
    • /
    • 2001
  • The appearance of web technology has accelerated a role of the development of the multimedia technology, the computer communication technology and the multimedia application contents. And serveral researches of WBI (Web-based Instruction) system have combined the technology of the digital library and LOD. Recently WBI (Web-based Instruction) model which is based on web has been proposed in the part of the new activity model of teaching-learning. And the demand of the customized coursewares which is required from the learners is increased, the needs of the efficient and automated education agents in the web-based instruction are recognized. But many education systems that had been studied recently did not service fluently the courses which learners had been wanting and could not provide the way for the learners to study the learning weakness which is observed in the continuous feedback of the course. In this paper we propose "Design of Multi-agent System for Course Scheduling of Learner-oriented using Weakness Analysis Algorithm". First proposed system monitors learner's behaviors constantly, evaluates them, and calculates his accomplishment. From this accomplishment the multi-agent schedules the suitable course for the learner. And the learner achieves a active and complete learning from the repeated and suitable course.le course.

  • PDF

The Influence of Experience of Non-contact Lectures on Learning Flow in College Students Majoring in Cosmetology (미용 전공 대학생의 비대면 수업 경험이 학습몰입에 미치는 영향)

  • Yu-Ra, Kim;Ji-Young, Jung
    • Journal of the Korean Applied Science and Technology
    • /
    • v.40 no.1
    • /
    • pp.113-122
    • /
    • 2023
  • This study attempted to investigate the effects of experience of non-contact lectures on learning flow against college students majoring in cosmetology and provide basic data to beauty education industry in the with-COVID-19 era. For this, a self-administered questionnaire survey was performed against 300 college students majoring in cosmetology from June 7 to 21, 2022. A total of 286 copies were collected and used for final analysis. The collected data were analyzed by frequency analysis, factor analysis, exploratory factor analysis, descriptive statistics, correlation analysis and multiple regression analysis, using SPSS 21.0, and the results found the followings: According to analysis of non-contact lecture experience factors, two course satisfaction factors were obtained. In learning flow, learning pleasure and learning flow were found. Specifically, class activities had a positive influence on 'learning pleasure (𝛽=.279, p<.007)' and 'learning flow (𝛽=.221, p<.031)' with statistical significance (p<.05). In addition, course satisfaction revealed a positive effect on 'learning flow (𝛽=.223, p<.041)' with statistical significance (p<.05). The above results confirm that experience of non-contact lectures affects learning flow. Therefore, it is anticipated that there would be more efforts to seek an efficient non-contact learning plan in this new era.

NCS proposal for industrial security (산업보안 분야에 대한 NCS 제안)

  • Park, Jong-Chan;Ahn, Jung-Hyun;Choi, Young-Pyul;Lee, Seung-Hoon;Baik, Nam-Kyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.358-360
    • /
    • 2022
  • Modern society is developing rapidly and technologies that provide convenience in living are developing day by day. On the other hand, the development of cyber attacks that threaten cybersecurity is developing faster, and it still adversely affects the industrial environment, and industrial damage is steadily occurring every year. Industrial security is an activity that safely protects major assets or technologies of companies and organizations from these attacks. Therefore, it is a situation that requires professional manpower for security. Currently, the manpower situation for security is staffed, but knowledge of the understanding and concept of industrial security jobs is insufficient. In other words, there is a lack of professional manpower for industrial security. It is the NCS that came out to solve this problem. NCS is the state standardized ability (knowledge, attitude, skills, etc.) necessary to perform duties in the industrial field. NCS can systematically design the curriculum using NCS as well as help in hiring personnel, and NCS can be applied to the national qualification system. However, in the field of industrial security, NCS has not yet been developed and is still having difficulties in hiring personnel and curriculum. Although the NCS system in the field of industrial security has not been developed, this paper proposes the industrial security NCS to solve the problem of hiring professionals later and to help the field of industrial security NCS to be established later.

  • PDF

The Techno-mediated Rebirth of Young Precariat's Working Conditions Today (동시대 청년 알바노동의 테크노미디어적 재구성)

  • Lee, Kwang-Suk
    • Korean journal of communication and information
    • /
    • v.83
    • /
    • pp.157-185
    • /
    • 2017
  • The present study examines the dialectic tensions arising within the ICT-mediated labor culture between the dominant power of conglomerates and the precarious labor subjects in the labor practices, as smartphones and tablet PCs have grown in popularity. The present study explores how much young precarious workers named 'Cheongyeon Alba' (young precariat in S Korea) suffers from continually precarious job positions as temporary staff or contract workers, being trapped at the bottom of the pay scale, and also being electronically connected to the workplace in a seamless way. Concretely, this study investigates how the mobile phone becomes deeply entangled with the 'precarious' labor culture in the metropolitan city of Seoul. The mobile precariat has been in a disadvantaged position, in terms not only of the moral issue of exploitation in business but also of social injustice. Labor exploitation of young workers has been reinforced by the mobile labor culture, in which they are remotely monitored by live surveillance mobile apps, and mobile instant messaging from a boss can intrude incessantly into their private life. This study depicts the extension of the business's surveillant power by mobilizing the mobile phone in the working practices.

  • PDF

An Analysis on the Characteristics of Problem-Finding and the Aspects of Using Science and Technology of Undergraduate Students' Convergence Problem Solving Activity (대학생들의 융합형 문제 해결 활동에서 문제발견 및 과학기술 분야 활용 양상 분석)

  • Baek, Jongho
    • Journal of The Korean Association For Science Education
    • /
    • v.36 no.6
    • /
    • pp.867-876
    • /
    • 2016
  • In accordance with the changing of society, remarkable increase in knowledge and information, the competencies to choose and use proper information in various domains are considered as an important skill. As one of the methods in developing these competencies, it is emphasized that a problem-based learning can make student understand and use knowledge by solving the contextualized problem. However, it is skeptical of learner's development of competencies to use knowledge by solving well-defined given problem. Therefore it is required that students be allowed to develop the competency to find problem through experiences to determine and evaluate the purpose of the problem and method. The purpose of this study is to understand how undergraduate students use science or technology in finding a problem. In this line, this study articulated four cases conducted by participants who engaged in convergence teaching-learning program. And this study investigated the participants' process of problem-finding, method and reason to apply science or technology. The results were drawn by analyzing interviews and written data, including their proposal, a poster, and final reports. Participants changed the form of problem from initial ill-structured one into a concrete one, where the participant could derive a detailed solution. Science or technology applied as the detailed example to convert problem into a concrete form, or as the analyzing tool or theoretical background of problem to make a link with other domain. Their reason of applying science or technology could be summarized in 'personal interest based on prior experience' and 'alternatives to resolve a dissatisfaction.' Based on the result, this study suggests holistic approach that is included in both intuitive thinking and logical thinking and metacognitive regulation to stimulate problem-finding in problem-based learning program.