• 제목/요약/키워드: Knowledge Information Resource

검색결과 418건 처리시간 0.021초

커뮤니케이션 구조가 팀 성과에 미치는 영향에 관한 연구 (How Does Communication Structure Influence Team Performance in Complex Tasks)

  • 탕위;전상길;주시각
    • 디지털융복합연구
    • /
    • 제14권4호
    • /
    • pp.221-230
    • /
    • 2016
  • 본 연구는 커뮤니케이션 밀도와 및 커뮤니케이션 집중성이 어떻게 팀 성과에 영향을 미치는지 그 관련성을 파악하고자 진행된 실험실연구이다. 특히 기존 연구들과는 달리 팀성과를 팀효과성과 팀효율성으로 구분하여 이들 독립변수들이 어떤 차별적인 영향을 미치는지를 탐구하였다. 연구결과 커뮤니케이션 밀도가 높고, 커뮤니케이션 집중도가 낮은 팀은, 혁신적이며, 정보공유와 지식 아이디어가 많고, 업무의 효율성이 높은 것으로 나타났다. 반면 커뮤니케이션 집중성이 높고, 밀도가 낮은 팀은 신속한 의사결정을 하는 것으로 나타났다. 또한 집중성과 밀도가 동시에 낮은 팀은 보다 자율적인 팀으로 나타났다. 향후 연구에서는 실험실상황이 가져오는 외적 타당성의 문제를 해결하기 위하여 보다 현실적인 리더십, 조직풍토 등의 변수가 포함되어야 한다.

자료포락분석 기법을 이용한 지역산업 기술개발 사업의 파급효과 분석 (Ripple Effect Analysis of Regional Industry Technology Development Using DEA)

  • 이상현;김상영;이상준
    • 디지털융복합연구
    • /
    • 제9권6호
    • /
    • pp.1-11
    • /
    • 2011
  • 지식정보화 시대에 변화의 원천이 되는 기술개발에 대한 투자 방향에 대한 검토가 필요한 시점이다. 자료포락분석(DEA) 기법은 투입요소와 산출요소의 비율을 기준으로 효율성을 분석하는 기법이다. 본 논문에서는 국내 지역산업기술개발사업의 파급효과 분석을 위해 산업연관성과 효율성을 DEA를 사용하여 분석하였다. 분석 결과에 의하면, 사업의 성과에 영향을 마치는 주요인은 기술개발 참여인력이고, 매출액의 변화는 가시적으로 실현되지 못하고 있었다. 사업 유형별로는 공통기술 개발사업에 비해 중점기술 개발사업의 효율성 지수가 높게 나타났는데, 이는 사업 기간이나 사업비의 규모가 사업성과에 중요한 영향을 미치는 것으로 분석되었다. 앞으로 지역산업 기술 개발 사업은 기술 개발인력과 사업기간이나 사업비 규모의 확충이 요구되며 기술개발의 결과가 매출이나 고용 증가와 같은 성과로 나타날 수 있게 하는 노력이 필요하다.

최종사용자 컴퓨팅의 실태와 최종사용자 개인적 특성에 관한 연구 (A Study on the Current Status of EUC andindividual Characteristicsofend-users in Korean Firms)

  • 김상수
    • 한국산업정보학회:학술대회논문집
    • /
    • 한국산업정보학회 1996년도 추계 학술 발표회 발표논문집
    • /
    • pp.5-26
    • /
    • 1996
  • This study has two research objectives related to end-user computing (EUC) . One of the research objectives was to investigate the current status of EUC of Korean firms. Another research objective was to examine the relationship between individual difference of end-users and EUC success. Using survey data from 752 end-users of 23 firms, the surrent status of EUC and the relationship between individualdifferences of end-users and EUC success were investigated. The current status of EUC was examined from six perspectives : 1) what is the characteristics of EC strategy of Korean firms , 2) what are the individual characteristics of end-users in Korean firms, 3) what are the characteristics of tasks performed by end-users using computer 4) what are the application a areas of EUC 5) How end-users are satisfied with the support of firms, 6) what are system usage and satisfaction of end-users. It was also found that individual differences of endf-users are related to EUC success.More specifically , it was shown that the male gender, younger age, higher level of education , higher ran아 and organizational tenure, higher math ability , thinking type of cognitive style, positive and optimistic attitudes toward computer, more experience with computer, more computer education and knowledge are individual differences variables associated with EUC success. The results of stepwise regression analysis suggested that the individuaal difference variables accounted for 14%, 25% 39% and 30% of the variances of four EUC success variables, satisfaction for outcome , satisfaction for ability , frequency of computer use, and thenuber of tasks, respectively. These empirical findings suggest that EUC managers should consider individual differences of end-users in managing EUC , such as education, training, support, and human resource management , to maximize potential benefits of EUC.

국방분야 품질정책 고도화를 위한 군수품 생산업체 품질경영수준 조사 및 분석 (A Survey and Analysis of Defense Industry Quality Management Level for Advancement of Defense Quality Policy)

  • 노태주;서상원
    • 산업경영시스템학회지
    • /
    • 제40권3호
    • /
    • pp.18-26
    • /
    • 2017
  • Defense industries which require high reliability need an optimized quality management system with well-planned implementation. And the government should examine the overall status of defense industries, then establish practical policies with a proper support plan in required areas to upgrade the quality management level of manufacturers. Thus, DTaQ developed the model for 2 years from 2014, which specialized in quality management level analysis for defense industries. And a survey has been undertaken with that model by DTaQ and Korea Research Center in 2016. The surveyed companies randomly sampled among those which have more than 30 employees and delivery history over past 3 years, and finally 106 defense industries were selected. This paper present survey method and indexes for survey of defense industry quality management level. The survey was conducted in the order of planning, data collection and data processing, and the validity and reliability of the data were verified to increase objectivity of survey results. The survey contents mainly consist of system quality and management quality. System quality includes Product Development Management, Production Operation Management, supply chain quality management, Safety & Environment Management and Reliability Management, on the other hand, management quality includes Strategic Leadership, Human Resource Management, Customer Market Management and Information & Knowledge Management. Thus this proposes the current overall quality management status of the 106 defense industries and shows level differences by company sizes and manufacturing sectors based on the result of survey. Specifically, this paper enables to track the areas which need prompt government support with the policy directions to make quality management level higher. Therefore, it is expected that this can be used as reference data in establishing quality policies for military supplies in the future.

국회 라키비움의 전망에 관한 연구 - 기억기관 협력 정책에 관한 논의를 중심으로 - (A Study on Perspectives of the National Assembly Larchiveum: Focused on Discussion about Collaborative Strategies of Memory Institutions)

  • 김유승
    • 한국기록관리학회지
    • /
    • 제12권2호
    • /
    • pp.93-115
    • /
    • 2012
  • 국가적 책무를 부여받은 국회와 그 소속 기관들이 맡은 바 기능과 역할을 수행하는 과정에서 생산, 접수, 관리하는 지식정보자원들은 우리의 역사이자 민주주의의 증거로서 큰 가치를 지니며, 이에 대한 관리 및 보존활동은 국가적 과업이다. 그러나 국회 지식정보자원을 책임지고 있는 국회도서관, 국회기록보존소, 헌정기념관 등의 모습은 그 막중한 책무에 부합하고 있지 못하다. 이러한 맥락에서, 본 연구는 국회 문화유산과 지식정보를 공히 다루는 세 기관들의 통합적 발전 전략으로서 '국회 라키비움' 수립에 대한 필요충분조건을 분석하고 그 전망을 모색하는 데 목적을 둔다. 이를 위해 협력정책의 필요성, 절차, 성공요인에 대한 다양한 문헌을 살피고, 협력 사례들을 그 수준과 지리적 범주를 기준으로 유형화 한다. 이를 바탕으로 국회 기억기관의 연혁과 협력의 장애요인을 논의하고, 통합을 위한 대안을 모색한다. 결론에 갈음하여, 국회 기억기관 간의 비전 공유와 신뢰구축 활동으로부터 국회 라키비움의 내용적 완성에 이르는 단계적 전략을 제시한다.

한국 전자정부와 클라우드 컴퓨팅 기술개발연구 - 시나리오플래닝을 적용하여 - (The Study on Development of Technology for Electronic Government of S. Korea with Cloud Computing analysed by the Application of Scenario Planning)

  • 이상윤;윤홍주
    • 한국전자통신학회논문지
    • /
    • 제7권6호
    • /
    • pp.1245-1258
    • /
    • 2012
  • 본 연구는 미래예측방법으로 많이 활용되고 있는 시나리오플래닝 방법론을 적용하여 한국 전자정부 기술개발의 바람직한 미래상을 도출하였다. 최근 웹에서 유비쿼터스로의 지식정보화사회의 급속한 진행으로 IT와 컴퓨팅기술에 있어, 전 세계적으로 클라우드 컴퓨팅이라는 새로운 패러다임이 불고 있다. 따라서 이는 한국 정부 및 각국 정부에 있어, 전자정부 구축과 추진에 있어서의 주목할 만한 전환점이 되고 있다. 본 연구는 클라우드 컴퓨팅 기술과 함께하는 한국 전자정부의 상대적 미래우위전략을 찾고자, 기술개발 방향을 고찰하였으며, 그 결과 한국의 전자정부에 부합하는 -서비스 수준관리(SLA)나 자원제공과 같은- 하드웨어 및 인터넷 데이터센터 관련 기술과 함께, -오픈API나 자원가상화 같은- 소프트웨어 (응용)솔루션 기술에 관련된 클라우드 컴퓨팅 기술의 중점적 개발이 그 추진할 전략이었다.

문화와 과학의 융합적 관점에서 본 전통음식의 역사 및 미래 (Traditional Foods: Historical Perspectives and Future Prospects)

  • 김희섭
    • 한국식생활문화학회지
    • /
    • 제30권1호
    • /
    • pp.1-7
    • /
    • 2015
  • Traditional cuisine reflects cooking traditions shaped by political, economic, social, cultural, and environmental conditions characterized by authenticity and uniqueness. Traditional food is not only a part of our cultural heritage but also a knowledge resource. Application of food science and technology in Korean traditional foods was reviewed from six points of view, including food preservation, fermentation, changes in food materials, utilization of food functionality, and packaging and development of cooking appliances. Books from disparate times were chosen in order to cover a wide range of materials from the past to the present. Food preservation and fermentation techniques were applied to various food materials. Combination of science and skills contributes to the accessibility of diverse food materials and better quality foods. Koreans use assorted and resilient plants, which have an abundance of functional substances such as food materials. Among cooking appliances, microwave oven and refrigerator are the most innovative products with huge influences on food eating patterns as well as lifestyle. Packaging effectively reduces post-harvest preservation losses, and better packaging has technical improvements for storage and distribution. Kimchi was chosen as an example in order to study technology from the past to the present. Availability of Kimchi cabbage, enrichment of functional ingredients, identification of useful microbial species, standardization of recipe for commercialization, prevention of texture softening, introduction of salted Kimchi cabbage and Kimchi refrigerators, and packaging were reviewed. The future of traditional foods in the market will be competitive. First, traditional foods market should be maintained to protect the diversity of food materials. Secondly, tailored foods for individuals should be considered using foods with functional properties. Information on health benefits would provide insights into health and traditional food products. Third, speedy transfer of new technology to the traditional food industry is needed to ensure food quality production and new opportunities in the market. Fourth, safety of traditional foods should be ensured without sacrificing the essential characteristics of culturally important foods. Improvement of logistics, distribution, and facility should be carried out. As demand for convenience foods increases, traditional foods should be developed into products.

원자력발전소 관할 소방관의 위험인식 개념도 연구 (Risk Perception of Fire Fighters Responsible for Nuclear Power Plants : A Concept Mapping Approach)

  • 최해연;이상규;김미경;최종안
    • 한국화재소방학회논문지
    • /
    • 제32권6호
    • /
    • pp.141-149
    • /
    • 2018
  • 원전 관할 소방관의 위험인식은 업무 수행과 관련을 가지며, 재난대응의 준비 현황을 반영하기 때문에 체계적인 이해가 필요하다. 이에 본 연구는 원전 관할 소방관들의 고유한 위험인식의 구조와 내용을 개념도 방법으로 연구하였다. 원전 관할 소방관 18명이 아이디어 산출 단계에서 참여하였고, 원전 관할 소방관 15명이 진술문 구조화 단계에 참가하였다. 분석 결과, 원전 화재 대응에 대한 소방관들의 위험인식은 '두려움과 통제'와 '대응 자원' 두 차원을 중심으로 구조화되었다. 피폭에 대한 두려움과 낮은 통제, 통제와 권한 부족에 따른 불안, 공조와 신뢰의 부족, 권한제약 및 인력부족, 장비, 매뉴얼, 정보의 미비, 지식과 교육의 부족의 6개 범주가 위험인식의 주요 내용으로 도출되었다. 원전 화재에 대한 재난적 결과 기대와 대응자원의 부족에 따른 낮은 통제감이 위험인식을 높이는 주요 요소들로 확인되었다. 소방관들의 위험인식이 지니는 주요 특징들, 대응 역량과 대응자원을 포괄하는 복잡한 지식구조와 두려움과 신뢰 간의 밀접한 관련성 등에 관해 논의하였다.

Intelligent & Predictive Security Deployment in IOT Environments

  • Abdul ghani, ansari;Irfana, Memon;Fayyaz, Ahmed;Majid Hussain, Memon;Kelash, Kanwar;fareed, Jokhio
    • International Journal of Computer Science & Network Security
    • /
    • 제22권12호
    • /
    • pp.185-196
    • /
    • 2022
  • The Internet of Things (IoT) has become more and more widespread in recent years, thus attackers are placing greater emphasis on IoT environments. The IoT connects a large number of smart devices via wired and wireless networks that incorporate sensors or actuators in order to produce and share meaningful information. Attackers employed IoT devices as bots to assault the target server; however, because of their resource limitations, these devices are easily infected with IoT malware. The Distributed Denial of Service (DDoS) is one of the many security problems that might arise in an IoT context. DDOS attempt involves flooding a target server with irrelevant requests in an effort to disrupt it fully or partially. This worst practice blocks the legitimate user requests from being processed. We explored an intelligent intrusion detection system (IIDS) using a particular sort of machine learning, such as Artificial Neural Networks, (ANN) in order to handle and mitigate this type of cyber-attacks. In this research paper Feed-Forward Neural Network (FNN) is tested for detecting the DDOS attacks using a modified version of the KDD Cup 99 dataset. The aim of this paper is to determine the performance of the most effective and efficient Back-propagation algorithms among several algorithms and check the potential capability of ANN- based network model as a classifier to counteract the cyber-attacks in IoT environments. We have found that except Gradient Descent with Momentum Algorithm, the success rate obtained by the other three optimized and effective Back- Propagation algorithms is above 99.00%. The experimental findings showed that the accuracy rate of the proposed method using ANN is satisfactory.

Efforts against Cybersecurity Attack of Space Systems

  • Jin-Keun Hong
    • Journal of Positioning, Navigation, and Timing
    • /
    • 제12권4호
    • /
    • pp.437-445
    • /
    • 2023
  • A space system refers to a network of sensors, ground systems, and space-craft operating in space. The security of space systems relies on information systems and networks that support the design, launch, and operation of space missions. Characteristics of space operations, including command and control (C2) between space-craft (including satellites) and ground communication, also depend on wireless frequency and communication channels. Attackers can potentially engage in malicious activities such as destruction, disruption, and degradation of systems, networks, communication channels, and space operations. These malicious cyber activities include sensor spoofing, system damage, denial of service attacks, jamming of unauthorized commands, and injection of malicious code. Such activities ultimately lead to a decrease in the lifespan and functionality of space systems, and may result in damage to space-craft and, lead to loss of control. The Cybersecurity Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) matrix, proposed by Massachusetts Institute of Technology Research and Engineering (MITRE), consists of the following stages: Reconnaissance, Resource Development, Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Command & Control, Exfiltration, and Impact. This paper identifies cybersecurity activities in space systems and satellite navigation systems through the National Institute of Standards and Technology (NIST)'s standard documents, former U.S. President Trump's executive orders, and presents risk management activities. This paper also explores cybersecurity's tactics attack techniques within the context of space systems (space-craft) by referencing the Sparta ATT&CK Matrix. In this paper, security threats in space systems analyzed, focusing on the cybersecurity attack tactics, techniques, and countermeasures of space-craft presented by Space Attack Research and Tactic Analysis (SPARTA). Through this study, cybersecurity attack tactics, techniques, and countermeasures existing in space-craft are identified, and an understanding of the direction of application in the design and implementation of safe small satellites is provided.