• Title/Summary/Keyword: Information Barriers

Search Result 624, Processing Time 0.029 seconds

The geography of external control in Korean manufacturing industry (한국제조업에서의 외부통제에 관한 공간적 분석)

  • ;Beck, Yeong-Ki
    • Journal of the Korean Geographical Society
    • /
    • v.30 no.2
    • /
    • pp.146-168
    • /
    • 1995
  • problems involved in defining and identifying it. However, data on ownership of business establishments may be useful and one of the best alternatives for this empirical research because of use of limited information about control This study examines the spatial patterns of external control in the Korean manufacturing activities between 1986 and 1992. Using the data on ownership iinkages of multilocational firms between 15 administrative areas, it was possible to construct a matrix of organizational control in terms of the number of establishments. The control matrix was disaggregated by three types of manufacturing industries according to the capital and labor requirements of production processes used in. On the basis of the disaggregated control matrix, a series of measures were calculated for investigating the magnitude and direction of control as well as the external dependency. In the past decades Korean industrialization development has risen at a rapid pace, deepening integration into the world economy, together with the continuing growth of the large industrial firms. The expanded scale of large firms led to a spatial separation of production from control, Increasing branch plants in the nation. But recent important changes have occurred in the spatial organization of production by technological development, increasing international competition, and changing local labor markets. These changes have forced firms to reorganize their production structures, resulting in changes of the organizational structures in certain industries and regions. In this context the empirical analysis revealed the following principal trends. In general term, the geography of corporate control in Korea is marked by a twofold pattern of concentration and dispersion. The dominance of Seoul as a major command and control center has been evident over the period, though its overall share of allexternally controlled establishments has decreased from 88% to 79%. And the substantial amount of external control from Seoul has concentrated to the Kyongki and Southeast regions which are well-developed industrial areas. But Seoul's corporate ownership links tend to streteh across the country to the less-developed regions, most of which have shown a significant increase of external dependency during the period 1986-1992. At the same time, a geographic dispersion of corporate control is taking place as Kyongki province and Pusan are developing as new increasingly important command and control reaions. Though these two resions contain a number of branch plants controlled from other locations, they may be increasingly attractive as a headquarters location with increasing locally owned establishments. The geographical patterns of external control observable in each of three types of manufacturing industries were examined in order to distinguish the changing spatial structures of organizational control with respect to the characteristics of the production processes. Labor intensive manufacturing with unskilled iabor experienced the strongest external pressure from foreign competition and a lack of low cost labor. The high pressure expected not only to disinte-grate the production process but also led to location of production facilities in areas of cheap labor. The linkages of control between Seoul and the less-developed regions have slightly increased, while the external dependency of the industrialized regions might be reduced from the tendency of organizational disintegration. Capita1 intensive manufacturing operates under high entry and exit barriers due to capital intensity. The need to increase scale economies ied to an even stronger economic and spatial oncentration of control. The strong geographical oncentration of control might be influenced by orporate and organizational scale economies rather than by locational advantages. Other sectors experience with respect to branch plants of multilocational firms. The policy implications of the increase of external dependency in less-developed regions may be negative because of the very share of unskilled workers and lack of autonomy in decision making. The strong growth of the national economy and a scarcity of labor in core areas have been important factors in this regional decentralization of industries to less-developed regions. But the rather gloomy prospects of the economic growth in the near future could prevent the further industrialization of less-developed areas. A major rethinking of regional policy would have to take place towards a need for a regional policy actively favoring indigenous establishments.

  • PDF

A Study on the Necessity of Making Online Marketplace for the Korean Animation Industry (국내 애니메이션 산업의 온라인 마켓플레이스 구축 필요성 연구)

  • Han, Sang-Gyun
    • Cartoon and Animation Studies
    • /
    • s.24
    • /
    • pp.223-246
    • /
    • 2011
  • Today, cultural content industry could be defined to service business rather than manufacturing business because of its own trait. Also, it has the realistic restriction that it can't hold the dominant position in the market competition when it can't provide consumers satisfaction regardless of its quality or degree of completion. In other word, it can only expect great success when the business plan and the activities get the perfect balance with its best quality and perfect of completion. As the result, it emphasizes the importance of business competition in the global market. In briefly, there is no doubt that the creativeness of content is very important in the cultural content industry but in the future, making system to maintain the distribution process and share the profits fairly will be taken more important role. Especially, animation genre has the feature, which compares to other genres, such as film or TV drama, would be free from cultural barriers, and it is a great advantage. So to speak, animation can get little influence from cultural discount. However, Korean animation can't use the advantage properly for the foreign distribution because of its poor infrastructure and short of professional human resources. For those reasons, it has been needed to set up the realistic and specific action plan to overcome the situation. Therefore, considering those needs and the situations of Korean animation facing, making B2B online marketplace could be a great solution. The online marketplace stands for taking more efficient and broad distribution channel instead of the passive way, which we have now. If we have the B2B online marketplace, we can share all the information about the Korean animation with the potential customers whom live outside of Korea at real time. It also could be use to the windows of multiple distribution, which can make additional profits and activate the optional markets for the Korean animation. Through the method, Korean animation would be expected to get the higher international competitiveness, and it would be developed in quality and quantity of the business. Finally, it would be a great chance to Korean animation, which can get the unique brand power by improving the backward distribution circumstances.

A study on Teacher Perception and Classroom Practice of Practical Problem-Focused Home Economics Instruction (실천적 문제 중심 가정과 수업에 대한 교사의 인식과 실행에 관한 연구)

  • Go, Mi-Young;Yu, Nan-Sook
    • Journal of Korean Home Economics Education Association
    • /
    • v.23 no.1
    • /
    • pp.159-176
    • /
    • 2011
  • The purpose of this study was to investigate 1) how the middle school Home Economics teachers perceive the importance of the practical problem-focused instruction, 2) how often they perform the instruction, and 3) what they require for the implementation the instruction. Data were collected from 150 Home Economics teachers via e-mail survey and from 6 Home Economics teachers' face-to-face interviews. Descriptive statistics including frequency, percentage, average, and standard deviation, and the results of such analyses as ANOVA, T-test, and correlation were reported using SPSS/win 10.1. The results of this research were as follows: First, even though the majority of the respondents recognized the high need for practical problem-focused instruction, only a small portion of the respondents reported that they performed that instruction in the classroom. There was no correlation between the perception of the need for practical problem-focused instruction and the degree of performance of practical problem-focused instruction. Secondly, the of performance of practical problem-focused instruction was significantly different depending on the years of teaching experience and the subject that the teachers majored in. Job satisfaction had positive correlations with the perception of the need for practical problem-focused instruction and the degree of performance of practical problem-focused instruction. Thirdly, the more teachers shared information and materials with colleagues, the better they tended to be at practical problem-focused instruction. On the other hand, insufficient time for their instruction and a deficiency in understanding the rationale of the instruction were pointed out as barriers to classroom practice. The respondents answered that long-term training programs on the philosophical foundation of practical problem-focused instruction, materials related to the instruction as well as additional credits for Home Economics are most critical to reduce the discrepancy between the teacher perception and the classroom practice of practical problem-focused instruction.

  • PDF

Demands for Health Education through Internet in Middle and High School Students (중.고등학교 학생들의 인터넷을 이용한 보건교육 요구도)

  • Kang, Pock-Soo;Choi, Yeun-Hwa;Lee, Kyeong-Soo;Hwang, Tae-Yoon
    • Journal of Yeungnam Medical Science
    • /
    • v.21 no.1
    • /
    • pp.23-39
    • /
    • 2004
  • Background: It is important to provide health education to students to ensure a healthy life. Using the internet for health education may be a way to overcome the practical barriers to health education such as time and content. This study was conducted to investigate the demands for health education using the internet. Subjects and methods: Six hundreds and twenty-four and male female students in middle and high schools, who lived on Gyeongju-si and Seongju-gun in Gyeongsangbuk-do province, were interviewed by means of structured questionnaires, from March 5 to March 28, 2003. Results: More than 90% of the subjects had their own computers, and nearly 38% of those possessing their own computers had accessed internet sites related to health and medicine. Middle school students and in particular, female students were more desirous for health education through e-mail. Regarding content, the three major topics which the respondents wanted to learn about were healthy lifestyles, growth and development, and disease prevention. In terms of the interval for providing educational materials, over half of the students wanted information once a week. Most of the students wanted to have the quantity of the material be one page. In addition, there were numerous additional topics requested by the students such as sleep and health, contraception and family planning, safety education, cancer prevention, emotional instability of juveniles, the utilization of medical care facilities, stress management, etc. Conclusion: The students had a desire for health education through the use of e-mail, and methods and materials should be developed for appropriate health education using the internet.

  • PDF

A Study of Sales Changes of Convenience Stores and Ratio Changes in the Composition of Business Types within Trading Areas of SSM (SSM 상권내의 업종 비율 변화와 편의점 매출액 변화에 대한 연구)

  • Cho, Chun-Han;Ahn, Seung-Ho
    • Journal of Distribution Research
    • /
    • v.16 no.5
    • /
    • pp.193-209
    • /
    • 2011
  • The fast expansion of super supermarket(SSM) in Korean retail industries has attracted serious social attentions and some types of regulations to slow down its growth are prepared. However, the regulations are hardly justified because they attempt to establish entry barriers which are not recommendable economic policy. Accordingly, the regulations should be justified at least on the basis of social and political causes. The study interprets the social and political causes as the effects of entry of SSM on trading ares where SSM is located. The study is distinguished from the past studies which focused only on intertype and intratype competition between retailers Another goal of the study is to complement the weakness of past studies and provide additional information to settle the issues. More closely, the study investigates the relationships between the changes in sales of convenience stores, which may be a surrogate measure of the viability of a local economy, and the changes in the composition of business types within 500m radius of a SSM. Further, the study investigates the effects of the establishment of SSM and the retail sales index on the sales of convenience stores. The study analyzed the panel data and adopts Swamy's random coefficient models. The results show that the effects of the establishment of SSM on the sales of convenience stores are not statistically significant. The relationship between the change in the portion of restaurants among the local business and the change in the sales of convenience stores is positive. On the other hand the relationship between the change in the portion of retailers in the composition of local businesses and the change in the sales of convenience stores is negative. In conclusion, even though any negative effects of the establishments of SSM on local economies are expected, as long as other types business especially restaurant businesses fill the space left by retailers, the net effect on the local economy may not be signification or even positive.

  • PDF

Framework of Stock Market Platform for Fine Wine Investment Using Consortium Blockchain (공유경제 체제로서 컨소시엄 블록체인을 활용한 와인투자 주식플랫폼 프레임워크)

  • Chung, Yunkyeong;Ha, Yeyoung;Lee, Hyein;Yang, Hee-Dong
    • Knowledge Management Research
    • /
    • v.21 no.3
    • /
    • pp.45-65
    • /
    • 2020
  • It is desirable to invest in wine that increases its value, but wine investment itself is unfamiliar in Korea. Also, the process itself is unreasonable, and information is often forged, because pricing in the wine market is done by a small number of people. With the right solution, however, the wine market can be a desirable investment destination in that the longer one invests, the higher one can expect. Also, it is expected that the domestic wine consumption market will expand through the steady increase in domestic wine imports. This study presents the consortium block chain framework for revitalizing the wine market and enhancing transparency as the "right solution" of the nation's wine investment market. Blockchain governance can compensate for the shortcomings of the wine market because it guarantees desirable decision-making rights and accountability. Because the data stored in the block chain can be checked by consumers, it reduces the likelihood of counterfeit wine appearing and complements the process of unreasonably priced. In addition, digitization of assets resolves low cash liquidity and saves money and time throughout the supply chain through smart contracts, lowering entry barriers to wine investment. In particular, if the governance of the block chain is composed of 'chateau-distributor-investor' through consortium blockchains, it can create a desirable wine market. The production process is stored in the block chain to secure production costs, set a reasonable launch price, and efficiently operate the distribution system by storing the distribution process in the block chain, and forecast the amount of orders for futures trading. Finally, investors make rational decisions by viewing all of these data. The study presented a new perspective on alternative investment in that ownership can be treated like a share. We also look forward to the simplification of food import procedures and the formation of trust within the wine industry by presenting a framework for wine-owned sales. In future studies, we would like to expand the framework to study the areas to be applied.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

A study on the impact of online contents characteristics on customer loyalty - Mediated effect of flow perspective - (고객충성도에 영향을 미치는 온라인 콘텐츠 특성에 관한연구 -몰입(Flow)의 매개효과를 중심으로 -)

  • Shin, Young-Chul;Jeong, Seung-Ryul
    • Journal of Internet Computing and Services
    • /
    • v.14 no.5
    • /
    • pp.101-117
    • /
    • 2013
  • As the number of online game user has been rapidly increased thanks to the recent vitalization of online contents market, not only new business opportunity but also the opportunity to create high profits have been provided as well. However, the increase of the number of online game user and the rapid expansion of the market evoke a cutthroat completion among online game service providers, and also high barriers to entry to online game market have been erected. Thus, what kinds of efforts need for the business success and sales increase in online game market? In lots of researches regarding online contents business, the deepening of loyalty was considered as a critical factor for the business success. According to the study on user's behavior in online environment, users would experience the Flow while using online service, and then, if they were in state of the Flow, they would use the service constantly. High customer loyalty to online game means high will to use the online game too. The purpose of this research was i) to examine what factors enable users to be naturally immersed in online game while playing it, ii) to examine what properties of online game can make game more interesting and exciting, iii) to verify that such factors are critical in deepening customer loyalty, and iv) to suggest some essential factors to be fun and exciting games, on where the focus should be put, and the directionality for the development for sales expansion of online game developer or online game service provider. The research results are as below: First, the involvement and the perceived quality which were characteristics of brand appeared to be factors most affecting Flow. This shows that once game user get interested in online game that user has played frequently, even though new games are released, user will continuously flow the game not moving to new games, and also shows that users not only get more interested but also put more trust in games in the site to where users are frequently going than games in other sites, and consequently user can increasingly flow the game. Second, the compensation and graphics which are the characteristics of contents appeared to be factors affecting Flow. Proper compensation which is given to game users triggers fun and interests in game and makes them flow more and more. And graphics make users to feel game space as if real space and let them flow in game with more reality. Third, challenges, support, and the stability which are technical characteristics appeared to be factors affecting Flow. Challenges enable users to not only experience new virtual world but also solve various difficulties and obstacles. Once users feel fun and interests through this challenge, they can naturally flow games. In addition, the stability of network provides reliability in security and hacking. By doing so, it can induce users to flow more and more. Lastly, when aforementioned characteristics including contents characteristics, technical characteristics, and brand characteristics are organically combined each other, game users feel fun and total minutes are naturally increased, so that game users experience Flow, and consequently the customer loyalty will be deepened as well.

A Study on the construction of physical security system by using security design (보안디자인을 활용한 시설보안시스템 구축 방안)

  • Choi, Sun-Tae
    • Korean Security Journal
    • /
    • no.27
    • /
    • pp.129-159
    • /
    • 2011
  • Physical security has always been an extremely important facet within the security arena. A comprehensive security plan consists of three components of physical security, personal security and information security. These elements are interrelated and may exist in varying degrees defending on the type of enterprise or facility being protected. The physical security component of a comprehensive security program is usually composed of policies and procedures, personal, barriers, equipment and records. Human beings kept restless struggle to preserve their and tribal lives. However, humans in prehistoric ages did not learn how to build strong house and how to fortify their residence, so they relied on their protection to the nature and use caves as protection and refuge in cold days. Through the history of man, human has been establishing various protection methods to protect himself and his tribe's life and assets. Physical security methods are set in the base of these security methods. Those caves that primitive men resided was rounded with rock wall except entrance, so safety was guaranteed especially by protection for tribes in all directions. The Great Wall of China that is considered as the longest building in the history was built over one hundred years from about B.C. 400 to prevent the invasion of northern tribes, but this wall enhanced its protection function to small invasions only, and Mongolian army captured the most part of China across this wall by about 1200 A.D. European lords in the Middle Ages built a moat by digging around of castle or reinforced around of the castle by making bascule bridge, and provided these protections to the resident and received agricultural products cultivated. Edwin Holmes of USA in 20 centuries started to provide innovative electric alarm service to the development of the security industry in USA. This is the first of today's electrical security system, and with developments, the security system that combined various electrical security system to the relevant facilities takes charging most parts of today's security market. Like above, humankind established various protection methods to keep life in the beginning and its development continues. Today, modern people installed CCTV to the most facilities all over the country to cope with various social pathological phenomenon and to protect life and assets, so daily life of people are protected and observed. Most of these physical security systems are installed to guarantee our safety but we pay all expenses for these also. Therefore, establishing effective physical security system is very important and urgent problem. On this study, it is suggested methods of establishing effective physical security system by using system integration on the principle of security design about effective security system's effective establishing method of physical security system that is increasing rapidly by needs of modern society.

  • PDF

Relationship between Access to Lewd Internet Contents by Middle School Students and Their Awareness of Sex (중학생의 인터넷음란물 접속과 성 의식의 관계)

  • Lim, Jong-In;Choi, In-Sook
    • The Journal of Korean Society for School & Community Health Education
    • /
    • v.4
    • /
    • pp.117-139
    • /
    • 2003
  • The purpose of this research lies in presenting logical viability for the measures that curtail access to lewd Internet contents by middle school students amidst the reality in which lewd contents are circulated freely through the Internet, a medium that the middle school students find most easy to access. In order to establish right form of awareness towards sex, this research identified the ways they access the lewd Internet contents, their reaction after the exposure to those contents, their knowledge of sex, their concerns regarding sex and their accessibility to sexual activities in order to conduct a comparative analysis on the relationship between lewd Internet contents and their awareness of sex. First, realities of accessing lewd Internet contents and reactions according to the demographics of middle school students There isa significant difference in the experience of accessing lewd Internet contents in terms of gender. Mostly, male students tend to access the contents more. As for the way they access the lewd Internet contents, both male and female students replied that they access through spam mail of lewd nature. Thus, measures to address this problem are needed urgently. As to when they first accessed the lewd contents, most of the research subjects replied that they accessed either in elementary school period or in the early middle school period. This shows that most of the students got exposed to lewd contents even before they could establish positive, correct awareness of sex. Thus, there is a risk that they may formulate wrong kind of sexual awareness. Accordingly, it is necessary to develop measures through focused sex education. Students are divided into two groups according to the time they spend on the contents averagely: those who spend over one hour and those who spend less than an hour on the lewd contents. If the students spending longer hours are not to be checked and properly guided, it may lead to increasing cases of sexual delinquencies due to their wrongly formed awareness of sex. When the question of existence(non-existence) of guardian was addressed, students with both parents tend to access the lewd Internet contents in a more diverse manner and tend to access more compared to those students from single parent or no-parent families. Accordingly, guardians need to pay attention to how their children are using the Internet. Second, awareness of sex depending on the middle school students' demographics In case of sexual knowledge, middle school students shows relatively high level of knowledge. In particular, female students are found more knowledgeable than male students, and the students in upper years are more knowledgeable as well. As a result, this research recommends that the students in lower years should be guided with more basc and detailed information, while those in upper years need to be taught to form and express their own thoughts and attitudes and to build up independence on this matter. In case of worries about sex, both male and female students don't worry too much about it. However, male students are more concerned about sex than female students in a more diverse ways. As for the differences by academic year, concerns for sex increase, as students get older. Accordingly, sex education that helps establish sound perception of the opposite sex and that focuses on the etiquettes that one must adhere to at the presence of the opposite sex need to be conducted against middle school students. In case of accessibility to sex, male students manifest higher tendency than female students. As for the differences by academic year, those in the first and second years show higher accessibility than those in their third year. In general, younger students tend to be more open-minded toward sex. Accordingly, students in lower academic years need to undergo basic knowledge oriented sex education, whereas those in upper academic years need to undergo discussion centered sex education where they subject to questions regarding their attitude and opinion. Third, relationship between the reactions after the exposure to the lewd Internet contents and their awareness of sex As the frequency of contact with lewd Internet contents increases, awareness of sex increases as well. Thus, the lewd Internet contents contribute to the increase in students' concern for sex as well as increase in accessibility to sex, which eventually become barriers to students' establishment of a healthy perception of sex. Reactions to sex after the exposure to lewd Internet contents and awareness of sex indicate a significant correlation. However, negative correlation is manifested with knowledge of sex. Thus, it is possible to know that the greater access to lewd Internet contents does not necessarily translate into increase in knowledge of sex. However, the study showed there is a correlation between concerns for sex and the level of accessibility to sex. In more detail, the more reactions to the contents they show, the more concerns for sex they have and the more positively they take acceptability to sex. Moreover, it is necessary to develop necessary measures since textbooks today do not include measures needed to address the lewd Internet contents. Given the above findings, it is necessary to continue to complement structural measures in order to prevent easy access of lewd Internet contents by middle school students. Moreover, it is necessary to be considerate of the students so that they themselves can form a healthy Internet culture and grow up within positive framework for the sex education.

  • PDF