• Title/Summary/Keyword: IS Capability

Search Result 9,655, Processing Time 0.036 seconds

The NACUFOK Business Consulting's Influence on the Management Performance of the Primary Credit Unions (신협중앙회 경영컨설팅이 단위신협의 경영성과에 미치는 영향)

  • Kang, Seong Moo;Ryu, Duk Wi
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.7 no.4
    • /
    • pp.101-112
    • /
    • 2012
  • Business consulting which aims at advising overall management, comparative advantage in competitive environment, administration and so forth is deemed to be significant so that a credit union may flexibly respond to rapid and complicated financial environment. Accordingly, business consulting has been initiated and implemented in credit union since 2002, which seemingly leads to positive outcome to enhance its competitiveness. However, very few research exists which analyze the credit union's competitiveness and business performance after the business consulting. Thus, the research intends to verify how consulting influences on management performance by its various factors. With the above studies in mind, hypothesis is formed that the characteristics of a consulting comsumer and the characteristics of supplier will give a meaningful impact on management performance. The test shows the result as followings: Firstly, a primary credit union's trust and NACUFOK's expertise demonstrate that they are closely relevant to financial and non financial management performance. Secondly, support and willingness to apply states that they influences on non financial performance, while no direct impact is found to financial performance. Thirdly, NACUFOK's capability is rarely interrelated to financial and non financial performance. The present study implies that the credit union as a consulting beneficiary should participate in the consulting, accept the result, and make effort to solve the management problems. In addition, NACUFOK as a consulting supplier should initiate the organization in exclusive charge, perform the professional group, and foster the professional consultant for the development of consulting method, the improvement of consulting process, and the specialization of consultant including the enhancement of core competencies. When these perspectives are sufficient, it will be connected to the management outcomes, further, it will be boosted up the competitiveness of the Credit Union. Hopefully the present study helps to motivate the consulting of primary credit union, boost up the effectiveness of consulting, further, providing the perspective on consulting the credit union. And these may result in the indication of consulting development direction and the competitiveness of Credit Union.

  • PDF

When Robots Meet the Elderly: The Contexts of Interaction and the Role of Mediators (노인과 로봇은 어떻게 만나는가: 상호작용의 조건과 매개자의 역할)

  • Shin, Heesun;Jeon, Chihyung
    • Journal of Science and Technology Studies
    • /
    • v.18 no.2
    • /
    • pp.135-179
    • /
    • 2018
  • How do robots interact with the elderly? In this paper, we analyze the contexts of interaction between robots and the elderly and the role of mediators in initiating, facilitating, and maintaining the interaction. We do not attempt to evaluate the robot's performance or measure the impact of robots on the elderly. Instead, we focus on the circumstances and contexts within which a robot is situated as it interacts with the elderly. Our premise is that the success of human-robot interaction does not depend solely on the robot's technical capability, but also on the pre-arranged settings and local contingencies at the site of interaction. We select three television shows that feature robots for the elderly and one "dementia-prevention" robot in a regional healthcare center as our sites for observing robot-elderly interaction: "Grandma's Robot"(tvN), "Co-existence Experiment''(JTBC), "Future Diary"(MBC), and the Silbot class in Suwon. By analyzing verbal and non-verbal interactions between the elderly and the robots in these programs, we point out that in most cases the robots and the elderly do not meet one-to-one; the interaction is usually mediated by an actor who is not an old person. These mediators are not temporary or secondary components in the robot-elderly interaction; they play a key role in the relationship by arranging the first meeting, triggering initial interactions, and carefully observing unfolding interactions. At critical moments, the mediators prevent the interaction from falling apart by intervening verbally or physically. Based on our observation of the robot-elderly interaction, we argue that we can better understand and evaluate the human-robot interaction in general by paying attention to the existence and role of the mediators. We suggest that researchers in human-robot interaction should expand their analytical focus from one-to-one interactions between humans and robots to human-robot-human interactions in diverse real-world situations.

Factors Influencing the Adoption of Location-Based Smartphone Applications: An Application of the Privacy Calculus Model (스마트폰 위치기반 어플리케이션의 이용의도에 영향을 미치는 요인: 프라이버시 계산 모형의 적용)

  • Cha, Hoon S.
    • Asia pacific journal of information systems
    • /
    • v.22 no.4
    • /
    • pp.7-29
    • /
    • 2012
  • Smartphone and its applications (i.e. apps) are increasingly penetrating consumer markets. According to a recent report from Korea Communications Commission, nearly 50% of mobile subscribers in South Korea are smartphone users that accounts for over 25 million people. In particular, the importance of smartphone has risen as a geospatially-aware device that provides various location-based services (LBS) equipped with GPS capability. The popular LBS include map and navigation, traffic and transportation updates, shopping and coupon services, and location-sensitive social network services. Overall, the emerging location-based smartphone apps (LBA) offer significant value by providing greater connectivity, personalization, and information and entertainment in a location-specific context. Conversely, the rapid growth of LBA and their benefits have been accompanied by concerns over the collection and dissemination of individual users' personal information through ongoing tracking of their location, identity, preferences, and social behaviors. The majority of LBA users tend to agree and consent to the LBA provider's terms and privacy policy on use of location data to get the immediate services. This tendency further increases the potential risks of unprotected exposure of personal information and serious invasion and breaches of individual privacy. To address the complex issues surrounding LBA particularly from the user's behavioral perspective, this study applied the privacy calculus model (PCM) to explore the factors that influence the adoption of LBA. According to PCM, consumers are engaged in a dynamic adjustment process in which privacy risks are weighted against benefits of information disclosure. Consistent with the principal notion of PCM, we investigated how individual users make a risk-benefit assessment under which personalized service and locatability act as benefit-side factors and information privacy risks act as a risk-side factor accompanying LBA adoption. In addition, we consider the moderating role of trust on the service providers in the prohibiting effects of privacy risks on user intention to adopt LBA. Further we include perceived ease of use and usefulness as additional constructs to examine whether the technology acceptance model (TAM) can be applied in the context of LBA adoption. The research model with ten (10) hypotheses was tested using data gathered from 98 respondents through a quasi-experimental survey method. During the survey, each participant was asked to navigate the website where the experimental simulation of a LBA allows the participant to purchase time-and-location sensitive discounted tickets for nearby stores. Structural equations modeling using partial least square validated the instrument and the proposed model. The results showed that six (6) out of ten (10) hypotheses were supported. On the subject of the core PCM, H2 (locatability ${\rightarrow}$ intention to use LBA) and H3 (privacy risks ${\rightarrow}$ intention to use LBA) were supported, while H1 (personalization ${\rightarrow}$ intention to use LBA) was not supported. Further, we could not any interaction effects (personalization X privacy risks, H4 & locatability X privacy risks, H5) on the intention to use LBA. In terms of privacy risks and trust, as mentioned above we found the significant negative influence from privacy risks on intention to use (H3), but positive influence from trust, which supported H6 (trust ${\rightarrow}$ intention to use LBA). The moderating effect of trust on the negative relationship between privacy risks and intention to use LBA was tested and confirmed by supporting H7 (privacy risks X trust ${\rightarrow}$ intention to use LBA). The two hypotheses regarding to the TAM, including H8 (perceived ease of use ${\rightarrow}$ perceived usefulness) and H9 (perceived ease of use ${\rightarrow}$ intention to use LBA) were supported; however, H10 (perceived effectiveness ${\rightarrow}$ intention to use LBA) was not supported. Results of this study offer the following key findings and implications. First the application of PCM was found to be a good analysis framework in the context of LBA adoption. Many of the hypotheses in the model were confirmed and the high value of $R^2$ (i.,e., 51%) indicated a good fit of the model. In particular, locatability and privacy risks are found to be the appropriate PCM-based antecedent variables. Second, the existence of moderating effect of trust on service provider suggests that the same marginal change in the level of privacy risks may differentially influence the intention to use LBA. That is, while the privacy risks increasingly become important social issues and will negatively influence the intention to use LBA, it is critical for LBA providers to build consumer trust and confidence to successfully mitigate this negative impact. Lastly, we could not find sufficient evidence that the intention to use LBA is influenced by perceived usefulness, which has been very well supported in most previous TAM research. This may suggest that more future research should examine the validity of applying TAM and further extend or modify it in the context of LBA or other similar smartphone apps.

  • PDF

Analysis and countermeasure of causes of inducing violence of private security companies on the actual sites of administrative execution by proxy (행정대집행 현장에서 민간경비업체의 폭력 유발 원인 분석과 대책)

  • Choi, Kee-Nam
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.119-141
    • /
    • 2009
  • Administrative execution by proxy is one of forced executions of administration and is also called as "enforced execution by proxy" in which administration institutions or the third party executes by proxy on behalf of parties who did not execute obligations under administration law and files claims to compensate expenses required in the proxy execution. Despite the actual site of administrative execution by law, social problems are generated because various violence and behaviors of infringement of human rights between executer and obligator are rampant and thus causing human damages since forced execution by physical force is carried out and cases of police indictments and petition to human rights committee are gradually increasing. Majority of people mobilized in this actual site of violence are supplied by private security companies which provide service contract and mobilization of people without qualification of guards or security service and irrational execution by proxy and violent actions by so-called service hooligans connected to violence organizations are now becoming social issues. In these actual sites of violence, structurally very complicated problems such as economic rights, right of residence, struggle for living, and intervention by outsiders are contained. This thesis has analyzed causes of outbreaks of violence and discussed about improvement countermeasure by paying attention to mobilization of people by private security companies. As the result, through revision and improvement of laws and systems, execution institution and policemen must be present at actual sites of execution by proxy to control physical execution of private security companies to be carried out legally and when violent collisions are occurring, it shall be stipulated that police should immediately intervene. Practices of execution by proxy of execution administration institutions shall be avoided and causes of occurrences of violence shall be eliminated by discrete decisions of execution by proxy, elimination of service contract conditions focused on accomplishments, and stipulation of responsibility of execution institutions when problems occur. Practices of solving petitions through collective actions of obligators shall be eliminated and strict enforcement of laws such as disturbance of official execution or compensation claims for expenses of execution by proxy must be carried out and intervention by the third parties must be intercepted. Mobilization of manpower by security companies shall be limited to people with prior registration who have acquired and finished qualification and education by security business law and before putting them on actual sites, it shall be obliged that execution plan with clear written records of working location, mission, and work rules must be submitted in advance to police station in charge and also they must be controlled to follow laws and statutes such as uniform and equipments. In addition, personal criminal responsibility for violent actions must be clearly stipulated and advanced securing soundness of security companies such as limits of service contracts with records of accidents is required. Order placement behaviors of special organizations under the pretext of rehabilitation business must be eradicated and companies with capability and strong intention of observation of laws must be able to receive orders by intercepting chains of contracts and sub-contracts. Issues of improvement countermeasure of social problem, living, and compensation including rights of residence and environment are excluded from the discussion.

  • PDF

Socio-Medical Approach to the Welfare of Rural Residents Through the Education of Community Health Personnel (농촌지역사회 보건요원의 교육을 통한 주민의 보건복지향상에 관한 사회의학적 연구)

  • Yum, Yong-Tae;Lee, Myung-Sook;Cho, Byung-Hee
    • Journal of agricultural medicine and community health
    • /
    • v.17 no.1
    • /
    • pp.34-45
    • /
    • 1992
  • In this county, the gap between the urban 'haves' and the rural 'have-nots' continues to be an increasing problem. WHO and UNICEF see primary health care(PHC) as the key to achieving an acceptable level of health throughout the world as a community development. PHC is essential health care made accessible to individuals and families in the community by means acceptable to them. It is the first level of contact of individual, the family, and community with the national health system. It includes at least education on health system. It includes at least education on health problems, promotion of food supply, MCH including family planning, immunization against infectious diseases, control of endemic diseases, treatment of common diseases and injuries, promotion of mental health, and provision of essential drugs. However, of the aboves, education concerning of mental health problems and the methods to identify, prevent, and control them is the principal step of establishment. In Korea, the category of PHC worker includes the physician as public doctor and nurse as primary health care practitioner and community health leader as village health worker. PHC workers of the aboves will thus function best if they are appropriately trained to respond to the health needs of the community. However in this country, since the national PHC service project launched in 1980, the government has not developed and performed appropriate and enough education and training activities. In light of above reasons, several categories of health education activities had been planned and performed being aimed at above specific target groups and the main focus was on the village health workers for about one year from July 1991 to July 1992 in Yeoju Kun of Kyonki Province. At the end of the period, evaluation of education input was carried out to measure the improvement of healthful life of people in terms of awareness, attitude, and practice. At the end of the period, evaluation of education input was carried out to measure the improvement of healthful life of people in terms of awareness, attitude, and practice. The totals of 80 village health workers, 13 public health practitioners and 9 public docters took in the course of health education for a few hours at every month and the evaluation works of educational effect were taken. The results the study were as follows. 1) Number of persons who realized the maxim "health care of the people is a duty of the government" increased after the education course, On the other hand, the rate of satisfaction on the effort of government for health promotion of the people decreased. 2) Public doctors and primary health care practitioners(nurses) liked and enjoyed the education schedule as a meeting of peer group. It provided chances of communication with staffs of Korea University Hospital. It was said that lectures covered great deal of knowledge and technic they urgently needed in the field. 3) After finishing the education course, more of village health workers(VHW) thought they adapted themselves to their roles and functions showing increased number of home visit and contact with primary health care practitioners by month. 4) In case of patient refer, VHW preferred primary health care practitioners to public doctors. 5) Capability of VHWs in most of their functions increased dramatically after when the education course finished except tuberculosis control.

  • PDF

A Study on UAV and The Issue of Law of War (무인항공기의 발전과 국제법적 쟁점)

  • Lee, Young-Jin
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.26 no.2
    • /
    • pp.3-39
    • /
    • 2011
  • People may operate unmanned aerial vehicles (UAVs or drones) thousands of miles from the drone's location. Drones were first used (like balloons) for surveillance. By 2001, the United States began arming drones with missiles and using them to strike targets during combat in Afghanistan. By mid-2010, over forty states and other entities possessed drones, many with the capability of launching missiles and dropping bombs. Each new development in military weapons technology invites assessment of the relevant international law. This Insight surveys the international law applicable to the recent innovation of weaponizing drones. In determining what international law rules govern drone use, the most salient feature is not the fact that drones are unmanned. The fact drones carry no human operator may be the most important new technological breakthrough, but the key feature for international law purposes is the type of weaponry drones carry. Whether law enforcement rules govern drone use depends on the situation and not necessarily who is operating the drone. Battlefield weapons may also be lawfully used before an armed conflict in the following situations: when initiating self-defense under Article 51 of the United Nations Charter; when authorized by the UN Security Council; when a government seeks to suppress internal armed conflict; and, perhaps, when a state is invited to assist a government in suppressing internal armed conflict. The rules governing resort to force in self-defense are found in Article 51 of the UN Charter and a number of decisions by international courts and tribunals. Commentators continue to debate whether drone technology represents the next revolution in military affairs. Regardless of the answer to that question, drones have not created a revolution in legal affairs. The current rules governing battlefield launch vehicles are adequate for regulating resort to drones. More research must be undertaken, however, to understand the psychological effects of deploying unmanned vehicles and the effects on drone operators of sustained, close visual contact with the aftermath of drone attacks.

  • PDF

The GOCI-II Early Mission Ocean Color Products in Comparison with the GOCI Toward the Continuity of Chollian Multi-satellite Ocean Color Data (천리안해양위성 연속자료 구축을 위한 GOCI-II 임무 초기 주요 해색산출물의 GOCI 자료와 비교 분석)

  • Park, Myung-Sook;Jung, Hahn Chul;Lee, Seonju;Ahn, Jae-Hyun;Bae, Sujung;Choi, Jong-Kuk
    • Korean Journal of Remote Sensing
    • /
    • v.37 no.5_2
    • /
    • pp.1281-1293
    • /
    • 2021
  • The recent launch of the GOCI-II enables South Korea to have the world's first capability in deriving the ocean color data at geostationary satellite orbit for about 20 years. It is necessary to develop a consistent long-term ocean color time-series spanning GOCI to GOCI-II mission and improve the accuracy through validation using in situ data. To assess the GOCI-II's early mission performance, the objective of this study is to compare the GOCI-II Chlorophyll-a concentration (Chl-a), Colored Dissolved Organic Matter (CDOM), and remote sensing reflectances (Rrs) through comparison with the GOCI data. Overall, the distribution of GOCI-II Chl-a corresponds with that of the GOCI over the Yellow Sea, Korea Strait, and the Ulleung Basin. In particular, a smaller RMSE value (0.07) between GOCI and GOCI-II over the summer Ulleung Basin confirms the GOCI-II data's reliability. However, despite the excellent correlation, the GOCI-II tends to overestimate Chl-a than the GOCI over the Yellow Sea and Korea Strait. The similar over-estimation bias of the GOCI-II is also notable in CDOM. Whereas no significant bias or error is found for Rrs at 490 nm and 550 nm (RMSE~0), the underestimation of Rrs at 443 nm contributes to the overestimation of GOCI-II Chl-a and CDOM over the Yellow Sea and the Korea Strait. Also, we show over-estimation of GOCI-II Rrs at 660 nm relative to GOCI to cause a possible bias in Total suspended sediment. In conclusion, this study confirms the initial reliability of the GOCI-II ocean color products, and upcoming update of GOCI-II radiometric calibration will lessen the inconsistency between GOCI and GOCI-II ocean color products.

Distributional Characteristics and Population Substantiality of Viola mirabilis L.; Rear edge Population in Korea (한국이 후방가장자리 개체군인 넓은잎제비꽃(Viola mirabilis L.)의 분포특성과 지속가능성)

  • Chae, Hyun-Hee;Kim, Young-Chul;An, Won-Gyeong;Kwak, Myoung-Hai;Nam, Gi-Heum;Lee, Kyu-Song
    • Korean Journal of Environment and Ecology
    • /
    • v.33 no.4
    • /
    • pp.422-439
    • /
    • 2019
  • The rear edge population is considered to have low genetic diversity and high risk of extinction according to a highly isolated distribution. However, the rear edge population is observed to have persisted for an extended period despite the low genetic diversity. As such, it is necessary to understand the ecological process involved in the persistence of the population. Viola mirabilis L. in Korea is considered the rear edge population from the perspective of the worldwide distribution. We surveyed the distribution range of V. mirabilis, which shows the isolated distribution in the central area of Korea, to find out the factors of its persistence. Next, we investigated and accessed the vegetational pattern of habitats, soil environment, phenology, self-compatibility, population structure, and extinction risk factors observed in the distribution area. V. mirabilis was distributed in the understory of the deciduous forest, planted forest of the deciduous conifer and deciduous broad-leaved trees, shrubland, and grassland in the limestone area. We also observed the re-establishment of seedlings in the population, and most of them showed a stable population structure. For chasmogamous flowers, the visit by pollinators has a significantly positive relationship with the production of fruits. However, we found that the production of the cleistogamous flowers was more numerous in all studied populations and that only the cleistogamous flowers were produced despite a more substantial plant size in some populations. The plant size was more related to the production of the cleistogamous flowers than that of the chasmogamous flowers. Accordingly, the cleistogamous flowers significantly contributed to seedling recruitment in the population. We found that the production of the chasmogamous flowers and the cleistogamous flowers did not have a correlation with the factors of the soil analysis except for phosphoric acid. V. mirabilis showed the self-incompatibility characteristics most likely due to the production capability of the cleistogamous flowers. Potential extinction risk factors observed in the distribution area was included the development of limestone mine, the expansion of agricultural fields, and the construction of houses. Although V. mirabilis showed an isolated distribution in the limestone area in the Korean peninsula, it showed a diverse distribution in a wide habitat environment ranging from the grassland to the understory of the trees with relatively low canopy closure rate. Moreover, we concluded that the persistence of the population was possible if we can maintain the current state of multiple populations and stable population structure.

A Proposal for Korean armed forces preparing toward Future war: Examine the U.S. 'Mosaic Warfare' Concept (미래전을 대비한 한국군 발전방향 제언: 미국의 모자이크전 수행개념 고찰을 통하여)

  • Chang, Jin O;Jung, Jae-young
    • Maritime Security
    • /
    • v.1 no.1
    • /
    • pp.215-240
    • /
    • 2020
  • In 2017, the U.S. DARPA coined 'mosaic warfare' as a new way of warfighting. According to the Timothy Grayson, director of DARPA's Strategic Technologies Office, mosaic warfare is a "system of system" approach to warfghting designed around compatible "tiles" of capabilities, rather than uniquely shaped "puzzle pieces" that must be fitted into a specific slot in a battle plan in order for it to work. Prior to cover mosaic warfare theory and recent development, it deals analyze its background and several premises for better understanding. The U.S. DoD officials might acknowledge the current its forces vulnerability to the China's A2/AD assets. Furthermore, the U.S. seeks to complete military superiority even in other nation's territorial domains including sea and air. Given its rapid combat restoration capability and less manpower casualty, the U.S. would be able to ready to endure war of attrition that requires massive resources. The core concept of mosaic warfare is a "decision centric warfare". To embody this idea, it create adaptability for U.S. forces and complexity or uncertainty for the enemy through the rapid composition and recomposition of a more disag g reg ated U.S. military force using human command and machine control. This allows providing more options to friendly forces and collapse adversary's OODA loop eventually. Adaptable kill web, composable force packages, A.I., and context-centric C3 architecture are crucial elements to implement and carry out mosaic warfare. Recently, CSBA showed an compelling assessment of mosaic warfare simulation. In this wargame, there was a significant differences between traditional and mosaic teams. Mosaic team was able to mount more simultaneous actions, creating additional complexity to adversaries and overwhelming their decision-making with less friendly force's human casualty. It increase the speed of the U.S. force's decision-making, enabling commanders to better employ tempo. Consequently, this article finds out and suggests implications for Korea armed forces. First of all, it needs to examine and develop 'mosaic warfare' in terms of our security circumstance. In response to future warfare, reviewing overall force structure and architecture is required which is able to compose force element regardless domain. In regards to insufficient defense resources and budget, "choice" and "concentration" are also essential. It needs to have eyes on the neighboring countries' development of future war concept carefully.

  • PDF

Design and Implementation of a Web Application Firewall with Multi-layered Web Filter (다중 계층 웹 필터를 사용하는 웹 애플리케이션 방화벽의 설계 및 구현)

  • Jang, Sung-Min;Won, Yoo-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.12
    • /
    • pp.157-167
    • /
    • 2009
  • Recently, the leakage of confidential information and personal information is taking place on the Internet more frequently than ever before. Most of such online security incidents are caused by attacks on vulnerabilities in web applications developed carelessly. It is impossible to detect an attack on a web application with existing firewalls and intrusion detection systems. Besides, the signature-based detection has a limited capability in detecting new threats. Therefore, many researches concerning the method to detect attacks on web applications are employing anomaly-based detection methods that use the web traffic analysis. Much research about anomaly-based detection through the normal web traffic analysis focus on three problems - the method to accurately analyze given web traffic, system performance needed for inspecting application payload of the packet required to detect attack on application layer and the maintenance and costs of lots of network security devices newly installed. The UTM(Unified Threat Management) system, a suggested solution for the problem, had a goal of resolving all of security problems at a time, but is not being widely used due to its low efficiency and high costs. Besides, the web filter that performs one of the functions of the UTM system, can not adequately detect a variety of recent sophisticated attacks on web applications. In order to resolve such problems, studies are being carried out on the web application firewall to introduce a new network security system. As such studies focus on speeding up packet processing by depending on high-priced hardware, the costs to deploy a web application firewall are rising. In addition, the current anomaly-based detection technologies that do not take into account the characteristics of the web application is causing lots of false positives and false negatives. In order to reduce false positives and false negatives, this study suggested a realtime anomaly detection method based on the analysis of the length of parameter value contained in the web client's request. In addition, it designed and suggested a WAF(Web Application Firewall) that can be applied to a low-priced system or legacy system to process application data without the help of an exclusive hardware. Furthermore, it suggested a method to resolve sluggish performance attributed to copying packets into application area for application data processing, Consequently, this study provide to deploy an effective web application firewall at a low cost at the moment when the deployment of an additional security system was considered burdened due to lots of network security systems currently used.