• Title/Summary/Keyword: 컨설팅 적용

Search Result 161, Processing Time 0.026 seconds

A Study on the Development of PMM Algorithms for a Product Development Innovation (제품 개발 혁신을 위한 PPM 알고리즘에 관한 연구)

  • Lee, Jae-Myung;Lee, Hong-Chul
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.7
    • /
    • pp.1750-1759
    • /
    • 2009
  • Recently from the enterprise when about reduction the product of numerous type to develop does not produce simultaneously with Life Cycle shortening and JIT productions of the product, is confronting in the environment which will not become. In order to confront in like this environment, developing the good product importance but, the product researches what kind of direction and developing with core subject of technical innovation is recognized. For the development method and an investment direction of the product proposed PPM (Product Portfolio Management) algorithms from the research which sees from like this viewpoint. With PPM algorithms which are proposed, divided the product in 6 kind groups of standardization type, discrimination type, material cost investigation type, processing cost investigation type and sale promotion type and abolition type and presented tyresearch and development direction..Research approach portfolio investigation of existing research and consulting experience of research and development field with background, presented the analytical model of algorithm, is applied of the instance which composed.

Log Analysis Method of Separate Security Solution using Single Data Leakage Scenario (단일 정보유출 시나리오를 이용한 개별 보안솔루션 로그 분석 방법)

  • Park, Jang-Su;Lee, Im-Yeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.2
    • /
    • pp.65-72
    • /
    • 2015
  • According to recent statistics published by the National Industrial Security Center, former and current employees are responsible for 80.4% of companies' technology leakages, and employees of cooperative firms are responsible for another 9.6%. This means that 90% of technology leakages are intentionally or mistakenly caused by insiders. In a recent incident, a credit card company leaked private information, and the person responsible was an employee of a cooperative firm. These types of incidents have an adverse effect not only on a company's assets but also on its reputation. Therefore, most institutions implement various security solutions to prevent information from being leaked. However, security solutions are difficult to analyze and distinguish from one another because their logs are independently operated and managed. A large number of logs are created from various security solutions. This thesis investigates how to prevent internal data leakage by setting up individual scenarios for each security solution, analyzing each scenario's logs, and applying a monitoring system to each scenario.

Analysis of the Importance and Priority of HRM Factors in Private Security (민간경비 인사업무의 중요도 및 우선순위에 대한 고찰)

  • Kwon, Jung-Eon
    • Korean Security Journal
    • /
    • no.56
    • /
    • pp.55-81
    • /
    • 2018
  • The purpose of this study is to find significant activities in human resource management (HRM) to solve growing-pains caused by the rapid external growth in private security business. To this end, we applied the HRM factors suggested by the National Job Capability Standard (NCS) to the private security and investigated the relative importance using the Analytic Hierarchy Process (AHP). The results were as follows. First, the importance of 4 HRM criteria in the private security was ranked in order of recruitment, operation, benefit, and retirement. Particularly, the relative importance of recruitment reached 63.8%. Second, the composite importance was calculated by dividing the 4 HRM criteria into 14 capability sub-criteria and 46 capability alternatives. As a result, personnel planning and hiring at the recruitment turned out as the areas that needed the most improvement. In addition, the operating and planning of education involved in the highest rank, 8th and 10th respectively. Based on these results, we suggested critical HRM factors for developing the private security business as well as proposed research directions and methods for further studies.

The Effect of the Program to Improve Low-achievers' Academic Achievement : Focused on 'Running High' Program of G University (저성취 대학생 대상 성적향상 프로그램 효과 연구: G대학교의 '러닝하이'를 중심으로)

  • Seo, Eun Hee
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.11
    • /
    • pp.250-257
    • /
    • 2018
  • The program for low-achievers, named 'Running high' is to provide college students whose GPA was lower than 2.5 with 1:1 learning consultation and special lectures of high achievers. Especially, it supports scholarship only for students who attain the target record of a certain course which they choose. The purpose of this study was to examine whether or not academic achievement, grit, ego-resilience of participants in 'Running high' would be more advanced than before. This study also compared academic achievement, grit, ego-resilience between participants who attain the goal of the program and participants who can not attain it. 110 college students joining in 'Running high' responded pre and post surveys of grit and ego-resilience. Their data of academic achievement also were gathered. The result of this study showed that the academic achievement and grit of participants in 'Running high' were advanced more than before, but not ego-resilience. The differences of academic achievement and grit between participants who attained the goal of the program and participants who could not attain it were significant, but not ego-resilience.

A case-study suggests government-supported startup mentoring service -Focused on public service design methodology- (사례연구를 통한 정부지원중심 스타트업 멘토링서비스 제안 -공공서비스디자인 방법론을 중심으로-)

  • Lee, Yun-Ju;Kim, Sun-Ah
    • Journal of Digital Convergence
    • /
    • v.17 no.1
    • /
    • pp.63-71
    • /
    • 2019
  • The purpose of this study is to reduce the barriers to entry into the government- supported startups and to contribute to the improvement of public policy services of the government. To do this, we identify the difficulties and problems that pre-founders are experiencing through startup cases of young entrepreneurs established in 2018, and provide practical help for pre-founders to experience their utility in preparation for government-supported startups, the need for public services to do so. And to propose a mentoring service to help the successful startup of policy-oriented user. This study is effective to adopt and apply the public service design process and methodology to the development of public policy service for the pre-founder who is preparing for government support centered startup. This study is meaningful that it presents one approach that can be considered when the government wants to develop and improve public policy services.

The Process of Identifying the Responsibility Party of Caused Delay Claim by Ambiguity of the Conditions of the Contract (계약 조항의 애매모호성에 의해서 발생되는 공기지연 클레임의 책임 당사자 확인 프로세스)

  • Lee, Chijoo;Kwan, Taewook;Koh, Hoonsuk
    • Journal of the Korea Institute of Building Construction
    • /
    • v.20 no.6
    • /
    • pp.527-535
    • /
    • 2020
  • This study analyzed main causes of claims in EPC/Turnkey projects. For this purpose, this study referred to the FIDIC silver book, which lists the international standard contract conditions for EPC/Turnkey projects. The most frequent cause of claim was delay. A process was then proposed to determine whether the owner or contractor was the responsible party when the delay claim occurred. The proposed process was for damages for delay which is the conditions of contract for indemnities against delay claim. The process was based on conditions of the contract of two previous EPC/Turnkey projects that were constructed in 2010, the FIDIC silver book, as well as the obligations of owner and contactors. The proposed process is applicable depending on the conditions of the contract and the owner's meaning. Furthermore, by identifying the responsible party, this study will contribute in identifying the possible claim types before concluding a contract and writing the specific contract.

An Effective Control Method for Improving Integrity of Mobile Phone Forensics (모바일 포렌식의 무결성 보장을 위한 효과적인 통제방법)

  • Kim, Dong-Guk;Jang, Seong-Yong;Lee, Won-Young;Kim, Yong-Ho;Park, Chang-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.151-166
    • /
    • 2009
  • To prove the integrity of digital evidence on the investigation procedure, the data which is using the MD 5(Message Digest 5) hash-function algorithm has to be discarded, if the integrity was damaged on the investigation. Even though a proof restoration of the deleted area is essential for securing the proof regarding a main phase of a case, it was difficult to secure the decisive evidence because of the damaged evidence data due to the difference between the overall hash value and the first value. From this viewpoint, this paper proposes the novel model for the mobile forensic procedure, named as "E-Finder(Evidence Finder)", to ,solve the existing problem. The E-Finder has 5 main phases and 15 procedures. We compared E-Finder with NIST(National Institute of Standards and Technology) and Tata Elxsi Security Group. This paper thus achieved the development and standardization of the investigation methodology for the mobile forensics.

The Technology Application of Fourth Industrial Revolution in Organization (조직 내 4차 산업혁명의 기술 적용에 관한 연구)

  • Jung, Byoung-Ho;Joo, Hyung-Kun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.4
    • /
    • pp.95-110
    • /
    • 2020
  • The purpose of this study is to empirically examine organizational change for a technological application of the fourth industrial revolution. The theoretical background of this study utilized organizational change management, the fourth industrial revolution, technological innovation, and voluntary acceptance. This research method used structural equations, cluster analysis, and analysis of variance. According to the results of the study, the organizational implement system, organizational leadership, and organizational operating system provided a positive effect on the voluntary technology acceptance of organization members. The voluntary technology acceptance provided a positive effect on the effectiveness of individual task innovation. However, organizational institutionalization among the independent variables did not affect voluntary acceptance. All independent variables except the organizational institutionalization had a partial mediating effect in the mediating effect verification. Meanwhile, The three groups by the cluster analysis were classified as new technology apathy, preference, and anxiety groups, and differences appeared among groups in the importance of organizational change variables. The organizational implement system in the technology apathy group and the organizational operating system in the technology anxiety group have a positive effect on voluntary technology acceptance. The technology preference group shows that a positive effect on organizational leadership and a negative effect on organizational institutionalization for voluntary technology acceptance. This study analyzed the technology application of the fourth industrial revolution in the organization based on the theory of organizational change. There has been reexamined the organizational change theory based on the new technology acceptance by the change of external environment in the fourth industrial revolution and the importance of technology innovation. As a practical implication, firms that are interested in a new technology of the fourth industrial revolution should prioritize preparing an implementation system when designing organizational changes.

Experimental, Theoretical and Numerical Studies for Concentrations and Velocities of Gas Jets (가스 제트 누출의 농도 및 속도에 대한 실험, 이론 및 수치해석 연구)

  • Bang, Boo-Hyoung;Kim, Hong-Min;Kim, Sung-Hoon;Lee, Keun-Won
    • Journal of the Korean Institute of Gas
    • /
    • v.26 no.1
    • /
    • pp.20-26
    • /
    • 2022
  • The results of experimental, theoretical, and numerical analysis were compared regarding the concentrations and velocities of flammable gas jets generated by pressurized leakage of methane gas. The concentration was measured through experiments for the jet dispersion process, and the velocities was calculated by applying the self-similarity theory. And the velocities and concentrations were calculated using CFD tools - FLACS and CFX- compared with the results. The difference between self-similarity model and CFD is due to the buoyancy term, which increases as the distance from a leak source increases. The results are compared with dimensionless parameters using the leak source radius and velocity components along the leak axis.

A Study on the Improvement Model of Administrative Information Dataset Records Management Environment: Focused on the Dataset of Picture Archiving and Communication System (행정정보 데이터세트 기록관리 환경개선 모델 연구: 의료영상저장전송시스템(PACS)의 데이터세트를 중심으로)

  • Lee, Sun-kyung
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.22 no.2
    • /
    • pp.51-73
    • /
    • 2022
  • Currently, an implementation plan of administrative information dataset record management has been prepared; however, analyzing the specificity of various administrative information systems and preparing a reasonable level of management reference table by applying about 1.3% (EA portal registration system: 16,199, consulting system: 214) has its limitations. This study started by recognizing the importance of the records management environment in administrative information datasets. Based on the described information, the current records management environment was analyzed by dividing the six areas of the management reference table of the picture archiving and communication system (PACS) into three groups. Thus, a systematic environmental improvement model was proposed, enhancing the effectiveness of dataset records management in the field. Although there is a limitation in analyzing one of the dataset records management environments of various institutions, it is intended to help broaden the horizons of records management research.