• Title/Summary/Keyword: Employee Redistribution

Search Result 2, Processing Time 0.016 seconds

The Importance of Employees Redistribution in South Sulawesi Higher Educations, Indonesia

  • SALEH, Haeruddin;HAMKA, Husain;MAIDIN, Rusdi;MANDA, Darmawati
    • Journal of Distribution Science
    • /
    • v.20 no.2
    • /
    • pp.43-53
    • /
    • 2022
  • Purpose: This research aims to provide solutions for human resource problems in public educational institutions to improve employee performance. Research design, data, and methods: The study used a quantitative approach with a survey method. Data were obtained through questionnaires and documentation. Meanwhile, the model used path analysis using Analysis Moment Structure (AMOS) software. Results: Results showed that there was a significant relationship between locus of control and redistribution variables on employee empowerment as well as on employee performance. This result implied that good management through the locus of control and employee redistribution in public organizations could be better to serve the community and organizations. Public change to be superior and demanded by the community to make it a good place to learn. Employees' good behavior and increasing competence can satisfy users of educational and sustainable institutions. Conclusion: To sum up, research on management development of locus of control and employee redistribution is needed to make public organizations, especially those engaged in education. This study provides academic implications by revealing that the locus of control factor and employee redistribution in public organizations are needed to improve institutional services.

An Anonymous Fingerprinting Scheme with a Robust Asymmetry

  • Park, Jae-Gwi;Park, Ji-Hwan;Kouichi Sakurai
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.4
    • /
    • pp.620-629
    • /
    • 2003
  • Fingerprinting schemes are techniques applied to protect the copyright on digital goods. These enable the merchants to identify the source of illegal redistribution. Let us assume the following situations connectedly happen: As a beginning, buyer who bought digital goods illegally distributed it, next the merchant who found it revealed identity of the buyer/traitor, then the goods is illegally distributed again. After this, we describe it as“The second illegal redistribution”. In most of anonymous fingerprinting, upon finding a redistributed copy, a merchant extracts the buyer's secret information from the copy and identifies a traitor using it. Thus the merchant can know the traitor's secret information (digital fingerprints) after identification step. The problem of the second illegal distribution is that there is a possibility of the merchant's fraud and the buyer's abuse: that is a dishonest employee of the merchant might just as well have redistributed the copy as by the buyer, or the merchant as such may want to gain money by wrongly claiming that the buyer illegally distributed it once more. The buyer also can illegally redistribute the copy again. Thus if the copy turns up, one cannot really assign responsibility to one of them. In this paper, we suggest solution of this problem using two-level fingerprinting. As a result, our scheme protects the buyer and the merchant under any conditions in sense that (1) the merchant can obtain means to prove to a third party that the buyer redistributed the copy. (2) the buyer cannot worry about being branded with infamy as a traitor again later if he never distribute it.

  • PDF