• Title/Summary/Keyword: Maturity of ICT use

Search Result 5, Processing Time 0.017 seconds

Measures for e-Learning Policy Effectiveness Improvement through Analysis of Maturity of Korean Policy Application (이러닝 지원정책 활용성숙도 분석을 통한 정책 효과성 제고 방안)

  • Noh, Kyoo-Sung;Park, Sanghwi
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.11-19
    • /
    • 2013
  • In this study, we analyze how the difficulties of e-learning firms' management affect to the maturity of the practical use of e-learning research & development (R&D) policies. And we explore the method that can enhance the effectiveness of policy. In the pursuit of this purpose, we use the 2012 South Korea e-learning industry survey data. Using variables of recognition of policy, experience of policy, and intention to use of policy, we find the maturity model of six stages. And we analyze the impact of the difficulties of operation, technology development, marketing to the maturity model. As a result, the more e-learning firms have problems of fund management and technology commercialization, they are located the higher maturity of the use of policy. Based on the results of these studies, we discuss the implication for how can enhance the effectiveness of policies.

A Study on Competence for Digital Literacy of an Elementary School Pupils (초등학생의 디지털 리터러시 역량에 관한 연구)

  • Kim, Seon-Tae;Nam, Young-Ho
    • Journal of The Korean Association of Information Education
    • /
    • v.12 no.2
    • /
    • pp.151-161
    • /
    • 2008
  • The use of ICT impacts positive effects on increasing scholarship achievement levels and on developing creativity, including teamworks, critical thinking skill, independence in learning and motivation of leaners. The purpose of this paper is to survey and analyze a competence for digital literacy of an elementary school pupils in Gyeongsangnam-do, and to compare the competence of the pupils with the competence of the pupils in Seoul. The results suggest that Gyeongsangnam-do's pupils have had the highest competence for social & cultural literacy and the lowest competence for information & technology literacy among three literacy. We also conclude that there is no a significant disparity between the competence of pupils in both regions.

  • PDF

Comparison of the ICT Adoption Pattern;In the Case of Korea and the U.S.

  • Yang, Kyung-Hoon;Lee, Sang-Gun
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.545-550
    • /
    • 2007
  • The aim of this paper is to find out whether there is a difference in adopting and/or diffusing the information and communication technology (ICT) between countries. If there is, what are the primary factors that keep some countries from adopting and diffusing ICT while others do? To analyze the above problem, we adopted the Unified Theory of Acceptance and Use of Technology (UTAUT) suggested by Venkatesh et al. (2003), which consists of effort expectancy, performance expectancy and social influence. We also use the innovation diffusion functions, which are known to have the S-shape and are made up of the introduction, growth, maturity and decline phases. We do not, however, consider the decline phase, because the ICT that we are considering is not believed to be in that phase. Therefore, we researched how the three factors affect adoption in the three phases. We selected the cellular phone as the ICT, because it is considered to be the most popularly used ICT and its technology has been developing rapidly. We surveyed the cellular phone adopters in Korea, and the U.S. for 15 years from 1989 to 2003. Korea, and the U.S. represent newly developed and developed countries, respectively. For the data analysis, a survival analysis was used, as it could explain the characteristics of the potential adopters or non-adopters. We found that the ICT diffusion patterns, as well as the ICT diffusion factors, of the two countries were different. Therefore, we believe that the results of our research can be used in building strategies on reducing the digital divide gaps between countries.

  • PDF

Development of VR Ship Environment for The Educational Training of Ship Survey (선박 검사 교육훈련을 위한 VR 선박 환경 구축)

  • Kil, WooSung;Son, Myeong-Jo;Lee, Jeong-Youl
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.55 no.4
    • /
    • pp.361-369
    • /
    • 2018
  • The ship surveyor makes a scheme of reasonable ship operation by examining whether the ship has been properly constructed in accordance with the rule of classification societies and international conventions or whether the facilities of the ship in operation meet the standard stipulated by law. Even though the ship surveyors of classification society generally consist of people who have the skill of design or operation of a ship, it takes a long time to train a surveyor to the maturity level. This paper describes the development of survey simulator based on virtual ship environment that enables the surveyor minimize trial and errors to survey the ships. By using VR(Virtual Reality) based survey simulator, surveyors possibly achieve improvement of competence in survey quality by means of safe and immersive training environment. In order to improve the usability and utility of the VR simulator, the ship 3D model has been generated using 3D CAD model for design and production in shipyard. Through this, we suggested the possibility of consistent use of 3D model as the digital twin of a ship.

Component Analysis of DevOps and DevSecOps (DevOps와 DevSecOps의 컴포넌트 분석)

  • Hong, Jin-Keun
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.9
    • /
    • pp.47-53
    • /
    • 2019
  • This paper is analyzed of the characteristics of development operations and development security operations of the software and product, and the use analysis tools from a software code perspective. Also, it is emphasized the importance of human factors and the need to strengthen them, when considering security design rules. In this paper, we consider a secure process for managing change, focusing on fast and accurate decision-making in terms of procedural factors, when considering development security operations. In addition, the paper discussed the need for maturity model analysis in relation to the development security operating characteristics, and analyzed the meaning of the analysis elements through detailed procedures for the strength and integration elements of the dynamic and static elements accordingly. The paper also analyzed factors such as scanning activity and code analysis for threat modeling and compliance and control.