• Title/Summary/Keyword: Management Information

Search Result 41,805, Processing Time 0.056 seconds

A Review of Ecological and Natural Map Grades and Public Appeals in Korea

  • Wooseok Oh;Jangsam Cho;Kihyun Park;Hyosun Leem;Eui-Jeong Ko;Changhoon You;Jeong-Cheol Kim;Hye-Yeon Yoon
    • Proceedings of the National Institute of Ecology of the Republic of Korea
    • /
    • v.4 no.4
    • /
    • pp.141-145
    • /
    • 2023
  • This study surveyed the changes in the proportion of Ecological and Natural Map (ENM) grades in Korea, the distribution ratio of ENM 1st-grade areas by region, and the current status of regional public appeals for the five-year period from 2017 to 2021. The nationwide changes in ENM grades revealed an increase in 1st-grade, 3rd-grade, and separately managed areas but a decrease in the ratio of 2nd-grade areas. Nationwide, Gangwon had the highest distribution ratio of 1st-grade areas, at 46.77%, while Gwangju had the lowest, at 0.05%. In the five-year study period, 383 appeals concerning ENM grades were received and processed. Gangwon had the greatest number of appeals, with 96, while Sejong had the fewest, with 1. A significant correlation was observed between the distribution ratio of 1st-grade areas and public appeals.

A Study on the Method of Checking the Level of Information Security Management Using Security Maturity Model (보안성숙도 모델을 활용한 정보보호 관리수준 점검방법에 관한 연구)

  • Lee, Sang-kyu;Kim, In-seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1585-1594
    • /
    • 2018
  • In recent years The importance of information security management for securing information collection and analysis, production and distribution is increasing. Companies are assured of confidence in information security through authentication of information Security Management System. However, level assessment and use of domains that make up the management system is limited. On the other hand, the security maturity model is able to diagnose the level of information protection of the enterprise step by step. It is also possible to judge the area to be improved urgently. It is a tool to support goal setting according to the characteristics and level of company. In this paper, C2M2, which is an example of security maturity model, is compared and analyzed with Korea Information Security Management System certification. Benchmark the model to check the level of information security management and derive the priority among the items that constitute the detailed area of information security measures of ISMS certification. It also look at ways to check the level of information security management step by step.

Relationship of the Big Five Personality Traits and Risk Aversion with Investment Intention of Individual Investors

  • SARWAR, Danish;SARWAR, Bilal;RAZ, Muhammad Asif;KHAN, Hadi Hassan;MUHAMMAD, Noor;AZHAR, Usman;ZAMAN, Nadeem uz;KASI, Mumraiz Khan
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.12
    • /
    • pp.819-829
    • /
    • 2020
  • This empirical research is aimed at testing the relationship of the big five personality traits namely openness to experience, extraversion, consciousness, agreeableness, neuroticism, and risk aversion with the investment intention of individual investors belonging to Balochistan, Pakistan. The primary data is collected through a self-administered questionnaire (a structured form that consists of a series of closed-ended and open-ended questions) from a sample of 397 active individual investors belonging to different districts of the province. The data is empirically analyzed by applying the Partial Least Square (PLS) path modeling technique by using the estimation package available in Smart-PLS. The findings of this study suggest that all the variables are statistically significant with investors' investment intention with risk aversion as the strongest predictor. Moreover, openness to experience, extraversion, consciousness, agreeableness, and risk are significantly and positively related to an investor's investment intention, whereas neuroticism is negatively related to an investor's investment intention. The results extended by this study can be used by financial planners and investment bankers to channelize the available financial resources in diversified portfolios. The results will help financial planners to make available diverse investment alternatives for investors in Balochistan, thus catering to their unique needs. Academia must offer courses on contemporary finance paradigm based on behavioral finance to enable future business graduates to make wise financial decisions.

A Study for the Determination of Key Issues in Information Systems Management of Financial Institutions in Korea (우리나라 금융기관 정보시스템 관리에 있어서 핵심과제분야의 파악을 위한 연구)

  • Seo, Gil-Su
    • Asia pacific journal of information systems
    • /
    • v.2 no.2
    • /
    • pp.55-69
    • /
    • 1992
  • There have been several studies on the key issues in information systems (IS) management. This study replicates the Society for Information Management (SIM) survey done in U.S.A. to investigate the key issues in IS management in Korea. This survey focused especially on the professions in financial institutions. A three-round Delphi method was employed to collect the opinions of participants and obtain a reasonable level of consensus about the key IS management issues of financial institutions in Korea. The number one issue identified was top management support, followed by recruitment and development of IS human resources. This article also compares the key IS management issues of financial institutions and those of manufacturing industries in Korea.

  • PDF

Clinical Practice Ability and Satisfaction of Clinical Training of Health-Medical Information Management Major Students (보건의료정보관리 전공 학생의 임상실습 수행능력과 실습 만족도)

  • Song, Ae-Rang
    • The Korean Journal of Health Service Management
    • /
    • v.12 no.4
    • /
    • pp.203-217
    • /
    • 2018
  • Objectives : This study aimed to investigate the clinical practice ability and satisfaction of clinical training of health-medical information management major students. Methods : The data were collected from 68 persons from students finished clinical training at medical record (information) team using self administered questionnaires. The data were analyzed using t-test, ANOVA and correlation with SPSS 22.0 version. Results: Performance of data collection, data management, and data analysis were analyzed in three areas of the job area. In terms of academic characteristics and correlation, they were not related to the level of satisfaction with the practical experience. Conclusions : Research on a virtuous cycle clinical practice program that analyzes the factors by assessing the satisfaction level of clinical practice in each area of health care information management will be conducted continuously.

DEVELOPMENT OF MOBILE APPLICATION BASED RFID AND BIM FOR DEFECT MANAGEMENT ON CONSTRUCTION FIELD

  • Oh-Seong Kwon;Hwi-Gyoung Ko;Hee-Taek Park;Chan-Sik Park
    • International conference on construction engineering and project management
    • /
    • 2013.01a
    • /
    • pp.7-13
    • /
    • 2013
  • Recently, defect management have been considered as one of the major issues for more large-sized and complicated in domestic construction industry. However, the defect management have not been performed systematically because of special manpower, excessive amount of documents, 2D based inspection work, unclear traditional checklists, complicated work process and difficulty in communicating construction information. Therefore, the construction field manager could not performed the quality inspection and defect management work on time as well as the reliability of recorded quality and defect factors was decreased. The primary objective of this study is develop a Construction Defect Management Application CDMA) using a mobile (smartphone). The application can be sharing a huge information and communication technology based on RFID (Radio-Frequency Identification), BIM (Building Information Modeling) which enables field mangers to efficiently gather the information of defection in construction on-site.

  • PDF

A Study on the Relation between Record and Information Management and Knowledge Management from the Perspective of Knowledge Management : Focused on the Definition and Management Process (지식경영 관점에서 본 기록관리와 지식경영의 연관 관계 - 지식의 정의와 지식관리 프로세스를 중심으로 -)

  • Roh Jeong-Ran
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.39 no.4
    • /
    • pp.5-24
    • /
    • 2005
  • The various concepts of knowledge such as Knowledge Management(KM). Intellectual assets and digital knowledge asset management are currently important issues among many organizations. To the country like Korea that has professed Itself for a great power of knowledge Information and adopted KM and Record and Information Management (RIM) as the country's main polity, the study on the theoretical basis and best practices of KM and RIM from the perspective of Library & Information science is very urgent. However, many studies on knowledge including KM were mainly done at the business administrative field. and the consolidated study basis on knowledge even in the Library & Information Sciences was quite in deficiency, furthermore any discussion on knowledge, correlation among related systems and the possibilities of cooperation as the development of Information communication has not been done. Therefore, this study is to present the alternative plan of the consolidated management on knowledge through comparative analysis on the definition, main function and trend of KM & RIM. Especially, this study would be the theoretical basis to the public organizations that plan to introduce KM & RIM.

A Latent Factor (PLS-SEM) Approach: Assessing the Determinants of Effective Knowledge Transfer

  • ANJUM, Reham;KHAN, Hadi Hassan;BANO, Safia;NAZIR, Sidra;GULRAIZ, Hira;AHMED, Wahab
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.2
    • /
    • pp.851-860
    • /
    • 2021
  • The Knowledge Transfer (KT) for higher education institutions (HEIs) is boundless. Still and all, the members of the staff affiliated with these institutions do recognize an array of hitches in relation to KT practices. The study in question underscores social interactions, training, and Information and Communication Technology (ICT) as the primary barriers and treats them as the independent variables of the study. The study posits that inadequate management of the above-mentioned barriers would impact effective KT unfavorably. Besides, putting forth some striking solutions needed to fix the obstructions that hamper the adequate management of the KT exercises is another aim of the study. For data collection purposes, the study picks out higher education institutions (public) of the Quetta district. The reckoned sample size is 317 subjects. The research type that has been used is cross-sectional research and, in this context, the cross-sectional explanatory sequential design has been used. Concerning the findings of the paper, the results of PLS-SEM show positive and significant relationships of social interaction and training with knowledge transfer, while ICT shows an insignificant positive relationship with the knowledge transfer. The most influencing factor for the knowledge transfer is social interaction as suggested by social interaction theory.

A Study on the Design of the Knowledge Management System for Medical Information Services in a Public Library (공공도서관 의학정보서비스를 위한 지식관리시스템 설계에 관한 연구)

  • 이란주
    • Journal of the Korean Society for information Management
    • /
    • v.18 no.3
    • /
    • pp.63-86
    • /
    • 2001
  • Consumer health information is receiving more attention than ever before. This growing attention can be linked to the Internet and to people seeking more information on health topics. The purpose of this study is to suggest a design of the Knowledge management system for medical information services in a public library. As theoretical backgrounds, it discusses the issues regarding to the medical information services in a public library, knowledge management and knowledge management system. After that, 12 medical information sites are analyzed then the planning and the main menu of a medical information site for a public library are described. Finally, the model of the knowledge management system for a public library with 5 sub-systems are suggested: 1) knowledge creation system, 2) technology support system, 3) training system, 4) community service system, 5) knowledge sharing and network system. This system based on knowledge management will help provide the users high quality of medical information.

  • PDF

Study on Plans to Improve Small and Medium Corporations' Technological Protections Using Information Security Management System (ISMS) (정보보호관리체계(ISMS)를 이용한 중소기업 기술보호 개선방안 연구)

  • Kim, Jungeun;Kim, Seongjun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.3
    • /
    • pp.33-54
    • /
    • 2016
  • In the modern society based on information and communication, which is exposed to the risks of a lot of information security breaches, corporate information assets may be an economical scale in a country. Most of damages derived from corporate technological information leak often occur in small and medium corporations. Although many information security managers in corporations have focused on certification systems such as information security management system, small and medium corporations are poorly aware of the information security, and their environments surrounding it should be also improved. In addition, it is difficult to expect spontaneous participations in it, since the sustainable information security management systems are often not forced to be certified. Thus, the purpose of this study is to examine plans to improve small and medium corporations' technological protections by using some component of the information security management system. On the basis of this examination, it also attempts to discuss some methods for effective and efficient information security in the small and medium corporations' technological protections.