• Title/Summary/Keyword: Corporate Social Media

Search Result 95, Processing Time 0.023 seconds

Possibility of Intergenerational Exchange in Corporations: A Case Study of Reverse Mentoring on its Purpose and Success Factors (기업 내 세대 교류의 가능성: 국내외 리버스멘토링 (Reverse Mentoring)프로그램 도입 및 성공요소 사례연구)

  • Kim, Ju Hyun;Lee, Ahyoung;Chung, Soondool
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.10
    • /
    • pp.457-475
    • /
    • 2021
  • As Korean society enters an aged society, there is an increasing situation in which various generations coexist in the workplace. This study aimed to analyze corporate reverse mentoring in light of generational exchange. Through the case study methods using literature research and interviews, we categorized the objectives of starting reverse mentoring programs in domestic and foreign companies, and analyzed the possibility of generational exchange with the cases of company A in the US and B in Korea extracted by purposive sampling. Based on social exchange theory, organizational age theory, and generational solidarity theory, the analysis framework presented three propositions: 1) mutual benefit 2) balanced contribution, and 3) sustainability. As a result of the case analyses, there were three main objectives of introducing reverse mentoring: learning IT/social media, promoting corporate diversity, and understanding new trends in the younger generation. In the case of A company in the US and B company in Korea, there was a similarity in mutual benefit and balanced contribution. However, regarding sustainability, there was room for improvement in company B in Korea unlike company A in the US. We expect that reverse mentoring will provide important criteria for success in terms of generational exchange within organizations where various generations coexist in the future.

Modern Enterprise & ESG Management philosophy of Gaeseong Ginseng Merchant (개성 인삼상인의 근대기업화와 ESG 경영이념)

  • Ock, Soon Jong
    • Journal of Ginseng Culture
    • /
    • v.3
    • /
    • pp.90-118
    • /
    • 2021
  • Gaeseong fostered the conditions necessary for modern capitalism, as huge capital was accumulated through the cultivation and trade of ginseng, which were activities that flourished in the 18th century. During the Japanese colonial era, ginseng merchants were not simply limited to acquiring landowner capital from ginseng trade but actively converted such resource to productive and financial capital, thereby becoming modern entrepreneurs. Ginseng merchants led the joint management and investment of Gaeseong Electric Co., Ltd., Daehan Cheonil Bank, Gaeseong Brewing Co., Ltd., and Songgo Textile Company, founded in the early 20th century. They pursued corporate profits and, as leading individuals of society, spearheaded regional development by supporting educational and cultural projects in Gaeseong. These projects included the establishment of the Gaeseong Commercial School, the publication of Goryeo Times, and the operation of the Gaeseong Jwa Theater. Although liberal economics prioritized shareholder interest, the 21st century witnessed an emphasis on social responsibility among stakeholders asthe major purpose of enterprises. A trend that emerged was ESG (environment, social, governance) management, in which non-financial factors are valued more highly than financial performance. A successful business, which was denoted only by high profits in the past, is now defined by whether a company fulfills its social responsibility. In the early 20th century, the corporate activities of ginseng merchants in Gaeseong reflected entrepreneurship and stakeholder-centered ESG management, which later emerged as essential elements of modern business management. The modern management philosophy ahead of its times stemmed from the regionality of Gaeseong. The political discrimination against Gaeseong residents in the Joseon Dynasty precluded them from becoming government officers, and under a strict social hierarchy, yangban ("noblemen"), the intellectuals of the Joseon Dynasty, were forced to serve as merchants. Son Bong-sang and Kong Seong-hak, aside from being representative ginseng merchants, were both Confucian scholars and writers. The second and third generations of ginseng merchant families who had received higher education abroad returned to Gaeseong to carry on with their family businesses, then established modern companies with capital accrued from the ginseng industry. An analysis of the commercial activities of ginseng merchants in the early 20th century confirmed that these individuals were pioneering entrepreneurs who adopted the ESG management philosophy. In ginseng merchants, one sees a dimension of capitalism with a human face, as with ginseng thatsaves human life.

Analysis of Research Trends of 'Word of Mouth (WoM)' through Main Path and Word Co-occurrence Network (주경로 분석과 연관어 네트워크 분석을 통한 '구전(WoM)' 관련 연구동향 분석)

  • Shin, Hyunbo;Kim, Hea-Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.3
    • /
    • pp.179-200
    • /
    • 2019
  • Word-of-mouth (WoM) is defined by consumer activities that share information concerning consumption. WoM activities have long been recognized as important in corporate marketing processes and have received much attention, especially in the marketing field. Recently, according to the development of the Internet, the way in which people exchange information in online news and online communities has been expanded, and WoM is diversified in terms of word of mouth, score, rating, and liking. Social media makes online users easy access to information and online WoM is considered a key source of information. Although various studies on WoM have been preceded by this phenomenon, there is no meta-analysis study that comprehensively analyzes them. This study proposed a method to extract major researches by applying text mining techniques and to grasp the main issues of researches in order to find the trend of WoM research using scholarly big data. To this end, a total of 4389 documents were collected by the keyword 'Word-of-mouth' from 1941 to 2018 in Scopus (www.scopus.com), a citation database, and the data were refined through preprocessing such as English morphological analysis, stopwords removal, and noun extraction. To carry out this study, we adopted main path analysis (MPA) and word co-occurrence network analysis. MPA detects key researches and is used to track the development trajectory of academic field, and presents the research trend from a macro perspective. For this, we constructed a citation network based on the collected data. The node means a document and the link means a citation relation in citation network. We then detected the key-route main path by applying SPC (Search Path Count) weights. As a result, the main path composed of 30 documents extracted from a citation network. The main path was able to confirm the change of the academic area which was developing along with the change of the times reflecting the industrial change such as various industrial groups. The results of MPA revealed that WoM research was distinguished by five periods: (1) establishment of aspects and critical elements of WoM, (2) relationship analysis between WoM variables, (3) beginning of researches of online WoM, (4) relationship analysis between WoM and purchase, and (5) broadening of topics. It was found that changes within the industry was reflected in the results such as online development and social media. Very recent studies showed that the topics and approaches related WoM were being diversified to circumstantial changes. However, the results showed that even though WoM was used in diverse fields, the main stream of the researches of WoM from the start to the end, was related to marketing and figuring out the influential factors that proliferate WoM. By applying word co-occurrence network analysis, the research trend is presented from a microscopic point of view. Word co-occurrence network was constructed to analyze the relationship between keywords and social network analysis (SNA) was utilized. We divided the data into three periods to investigate the periodic changes and trends in discussion of WoM. SNA showed that Period 1 (1941~2008) consisted of clusters regarding relationship, source, and consumers. Period 2 (2009~2013) contained clusters of satisfaction, community, social networks, review, and internet. Clusters of period 3 (2014~2018) involved satisfaction, medium, review, and interview. The periodic changes of clusters showed transition from offline to online WoM. Media of WoM have become an important factor in spreading the words. This study conducted a quantitative meta-analysis based on scholarly big data regarding WoM. The main contribution of this study is that it provides a micro perspective on the research trend of WoM as well as the macro perspective. The limitation of this study is that the citation network constructed in this study is a network based on the direct citation relation of the collected documents for MPA.

User Perception of Personal Information Security: An Analytic Hierarch Process (AHP) Approach and Cross-Industry Analysis (기업의 개인정보 보호에 대한 사용자 인식 연구: 다차원 접근법(Analytic Hierarch Process)을 활용한 정보보안 속성 평가 및 업종별 비교)

  • Jonghwa Park;Seoungmin Han;Yoonhyuk Jung
    • Information Systems Review
    • /
    • v.25 no.4
    • /
    • pp.233-248
    • /
    • 2023
  • The increasing integration of intelligent information technologies within organizational systems has amplified the risk to personal information security. This escalation, in turn, has fueled growing apprehension about an organization's capabilities in safeguarding user data. While Internet users adopt a multifaceted approach in assessing a company's information security, existing research on the multiple dimensions of information security is decidedly sparse. Moreover, there is a conspicuous gap in investigations exploring whether users' evaluations of organizational information security differ across industry types. With an aim to bridge these gaps, our study strives to identify which information security attributes users perceive as most critical and to delve deeper into potential variations in these attributes across different industry sectors. To this end, we conducted a structured survey involving 498 users and utilized the analytic hierarchy process (AHP) to determine the relative significance of various information security attributes. Our results indicate that users place the greatest importance on the technological dimension of information security, followed closely by transparency. In the technological arena, banks and domestic portal providers earned high ratings, while for transparency, banks and governmental agencies stood out. Contrarily, social media providers received the lowest evaluations in both domains. By introducing a multidimensional model of information security attributes and highlighting the relative importance of each in the realm of information security research, this study provides a significant theoretical contribution. Moreover, the practical implications are noteworthy: our findings serve as a foundational resource for Internet service companies to discern the security attributes that demand their attention, thereby facilitating an enhancement of their information security measures.

Public Service Broadcasting and Accountability: Case Study on NHK (공영방송의 '설명책임'에 관한 연구: NHK의 '개혁재생사업'을 중심으로)

  • Ahn, Chang-Hyun
    • Korean journal of communication and information
    • /
    • v.41
    • /
    • pp.268-302
    • /
    • 2008
  • This paper analyzes an NHK's 'Performances of Reform and Revival'. As a result of analysis, it was focused on reinforcement of the management such as audit, corporate governance, compliance, and thus the accountability was insufficient. Generally speaking, public service broadcasting is the form of organization of mass media that is most directly accountable to society. Therefore, the efforts is required for public service broadcasting to figure out to endow the social roles and responsibilities to themselves differentiated from other commercial broadcasters. And it is necessary that the concrete systems and activities based on an answerability model so that public broadcasters fulfill the accountability. Answerability means that broadcasting organizations and journalists both take account of and are accountable to the public. In such a process, the positive and voluntary civic participation is indispensable.

  • PDF

An Asian Airline Implementation of Smartphone Collaboration: From Training to Operations (스마트폰을 활용한 항공사의 협업 사례 연구: 훈련 기간과 운영 기간의 차이 분석)

  • Dionne, Dante;Schutz, Douglas M.;Kim, Yong-Young
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.10
    • /
    • pp.303-313
    • /
    • 2018
  • In order to provide quality services across international airports, airline personnel must rapidly and effectively develop and share knowledge. Combining components of adaptive structuration theory (AST) and media synchronicity theory (MST), a research framework was developed to convey three distinct stages of knowledge sharing. We use the grounded theory research method for the qualitative data collected from audio transcripts of employees learning how to use and work with company issued smartphones with push-to-talk functionalities. Data was collected from 33 operations personnel. The results of the content analysis are recorded for the elements of each of the three concepts of our research framework. During the social interaction stage, the content of the audio conversations shifts mainly from conflict management to task management; for media synchronicity, from quality to quantity; for productive outcomes, from efficiency to commitment. New insights are uncovered from our analysis of data from the field as users advance from learning how to use the mobile devices, to using the devices for managing knowledge for their work in the airline industry.

Intermediate-Representation Translation Techniques to Improve Vulnerability Analysis Efficiency for Binary Files in Embedded Devices (임베디드 기기 바이너리 취약점 분석 효율성 제고를 위한 중간어 변환 기술)

  • Jeoung, Byeoung Ho;Kim, Yong Hyuk;Bae, Sung il;Im, Eul Gyu
    • Smart Media Journal
    • /
    • v.7 no.1
    • /
    • pp.37-44
    • /
    • 2018
  • Utilizing sequence control and numerical computing, embedded devices are used in a variety of automated systems, including those at industrial sites, in accordance with their control program. Since embedded devices are used as a control system in corporate industrial complexes, nuclear power plants and public transport infrastructure nowadays, deliberate attacks on them can cause significant economic and social damages. Most attacks aimed at embedded devices are data-coded, code-modulated, and control-programmed. The control programs for industry-automated embedded devices are designed to represent circuit structures, unlike common programming languages, and most industrial automation control programs are designed with a graphical language, LAD, which is difficult to process static analysis. Because of these characteristics, the vulnerability analysis and security related studies for industry automation control programs have only progressed up to the formal verification, real-time monitoring levels. Furthermore, the static analysis of industrial automation control programs, which can detect vulnerabilities in advance and prepare for attacks, stays poorly researched. Therefore, this study suggests a method to present a discussion on an industry automation control program designed to represent the circuit structure to increase the efficiency of static analysis of embedded industrial automation programs. It also proposes a medium term translation technology exploiting LLVM IR to comprehensively analyze the industrial automation control programs of various manufacturers. By using LLVM IR, it is possible to perform integrated analysis on dynamic analysis. In this study, a prototype program that converts to a logical expression type of medium language was developed with regards to the S company's control program in order to verify our method.

CYBERCRIME AS A THREAT TO UKRAINE'S NATIONAL SECURITY

  • Varenia, Nataliia;Avdoshyn, Ihor;Strelbytska, Lilia;Strelbytskyy, Mykola;Palchyk, Maksym
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.73-83
    • /
    • 2021
  • The information space, the main components of which are information resources, means of information interaction, and information infrastructure, is a sphere of modern social life in which information communications play a leading role. The objective process is the gradual but stable entry of the national information space into the European and world information sphere, in the context of which there is a legitimate question of its protection as one of the components of the national security of Ukraine. However, the implementation of this issue in practice immediately faces the need to respect the rights and fundamental freedoms guaranteed by international regulations and the Constitution of Ukraine, especially in the field of cybersecurity. The peculiarity of the modern economy is related to its informational nature, which affects the sharp increase in cyber incidents in the field of information security, which is widespread and threatening and affects a wide range of private, corporate, and public interests. The problem of forming an effective information security system is exacerbated by the spread of cybercrime as a leading threat to information security both in Ukraine and around the world. The purpose of this study is to analyze the state of cybersecurity and on this basis to identify new areas of the fight against cybercrime in Ukraine. Methods: the study is based on an extensive regulatory framework, which primarily consists of regulatory acts of Ukraine. The main methods were inductions and deductions, generalizations, statistical, comparative, and system-structural analysis, grouping, descriptive statistics, interstate comparisons, and graphical methods. Results. It is noted that a very important component of Ukraine's national security is the concept of "information terrorism", which includes cyberterrorism and media terrorism that will require its introduction into the law. An assessment of the state of cybersecurity in Ukraine is given. Based on the trend analysis, further growth of cybercrimes was predicted, and ABC analysis showed the existence of problems in the field of security of payment systems. Insufficient accounting of cybercrime and the absence in the current legislation of all relevant components of cybersecurity does not allow the definition of a holistic system of counteraction. Therefore, the proposed new legal norms in the field of information security take into account modern research in the field of promising areas of information technology development and the latest algorithms for creating media content.

A Study on the Competition Strategy for Private Super Market against Super Super Market (슈퍼슈퍼마켓(SSM)에 대한 개인 슈퍼마켓의 경쟁전략에 관한 연구)

  • Yoo, Seung-Woo;Lee, Sang-Youn
    • The Journal of Industrial Distribution & Business
    • /
    • v.2 no.2
    • /
    • pp.39-45
    • /
    • 2011
  • The Korean distribution industry is gearing up for an endless competition. Greeting low growth era, less competitive parties will be challanged seriously for their survival. But for large discount stores, they have shown steady annual growth for years. However, because of the saturation for numbers of stores, the difficulty of gaining new sites, and the changes in the consumer's consumption behavior caused by the recession, now they are seeking for a new customers-based business formats. Accordingly, a large corporate comopanies made supermarkets which are belonged to affiliated companies of large corporate comopanies. They based on the strong buying power, focused on SSM(Super Super Market) ave been aggressively develop nationwide multi-stores. The point is that these stores are threatening at small and medium-sized, community-based private supermarkets. Private supermarkets and retailers, who are using existing old operation systems and their dilapidated facilities, are losing a competitive edge in business. Recent the social effects of large series of corporate supermarkets for traditional markets has been very controversial, and commercial media, academia, and industry associated with it have been held many seminars and public hearings. This may slow down the speed in accordance with the regulations, but will not be the crucial alternative. The reason for this recent surge of enterprise-class SSM up, one of the reasons is a stagnation in their offline discount mart, so they are finding new growth areas. Already in the form of large supermarkets across the country got most of the geographical centre point and is saturated with stages. Targeting small businesses that do not cover discount Mart, in order to expand business in the form of SSM is urgent. By contrast, private supermarkets are going to lose their competitiveness. The vulnerability of individual supermarkets, one of the vulnerabilities is price which economies of scale can not be realized so they are purchasing a small amount of products and difficult to get a quantity discount. The lack of organization and collaboration, and education which is not practical, caused the absencer of service-oriented situations. As a first solution, making specialty shops which are handling agricultures, fruits and vegetables and manufactured goods is recommended. Second, private supermarkets franchisees join the organization for the organization and collaboration is recomaned. It can be meet the scale of economy and can be formed a alternative business formats to a government. Third, the education is needed as a good service will get consumer's awareness. In addition, a psychological stores operating is also one way to stimulate consumer sentiment as SSM can't operate. Japan already has a better conditions of their lives through small chain expression. This study includes the vulnerabilities of private supermarkets, and suggests a competitiveness reinforcement strategies.

  • PDF

Developed an output device for high-frequency cosmetic medical equipment using micro multi-needle (마이크로 멀티니들을 이용한 고주파 피부미용 의료기기를 위한 출력 장치 개발)

  • Kim, Jun-tae;Joo, Kyu-tai;Cha, Eun Jong;Kim, Myung-mi;Jeong, Jin-hyoung
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.5
    • /
    • pp.394-402
    • /
    • 2021
  • The entry of an aging society and the extension of human life expectancy, the increasing interest in women's social advancement and men's appearance, and the natural interest in K-culture through media media, while receiving worldwide attention, Focus on K-Bueaty. Recently, looking at the occupation of the medical tourism field, in the case of aesthetic medicine tourism such as molding and dermatology, it has gained popularity not only in Asia such as China and Japan, but also in North America and Europe. The first external confirmation of human aging is the wrinkles on the skin of the face. Clean, wrinkle-free, elastic and healthy skin is a desire of most people. Skin condition and condition such as focused ultrasonic stimulation (HIFU: High Intensity Focused Utrasound) and low frequency, high frequency (RF: Radio Frequency), galvanic therapy using microcurrent, cryotherapy using rapid cooling, etc. Depending on the method of management, the effect of the treatment differs depending on the output and the stimulation site, etc., even in the treatment of medical equipment and beauty equipment using the same mechanism. In this research, in order to develop invasive high-frequency dermatological devices using a large number of beauty medical devices and microneedles of beauty devices, the international standards IEC 60601-2 (standards for individual medical devices) and MFDS (Ministry of) We designed and developed a high-frequency output device in compliance with the high-frequency stimulation standard announced in the Food and Drug Safety (Ministry of Food and Drug Safety). The circuit design consists of an amplifier (AMP: Amplifier) using Class-A Topology and a power supply device using Half-Bridge Topology. As a result of measuring the developed high-frequency output device, an average efficiency of 63.86% was obtained, and the maximum output was measured at 116.7W and 50.67dBm.