• Title/Summary/Keyword: Policy Information Resources

Search Result 832, Processing Time 0.025 seconds

Structural Relationships between the Variables of Coaching Leadership, Job Characteristics and Organizational Effectiveness in Convergence Environment (기업의 융복합 환경에서 코칭리더십, 직무특성, 조직효과성 변인 간의 구조적 관계)

  • Kwon, Kee-Chang;Yang, Hae-Sool
    • Journal of Digital Convergence
    • /
    • v.14 no.5
    • /
    • pp.247-262
    • /
    • 2016
  • The importance of coaching leadership has been highlighted to enhance creativity and competence of human resources in convergence environment. This paper was validated through a structural relationships model, the impact of coaching leadership on behavioral dimensions of organizational effectiveness by focusing on mediating role of job characteristics. Coaching leadership activities showed a significant positive effect on job characteristics and turnover intentions. Job characteristics appear to have a mediating effect on the relationship between coaching leadership and organizational effectiveness, especially the coaching leadership itself not necessarily to improve organizational citizenship behavior, can increase organizational citizenship behavior when formed into a positive awareness of the job characteristics of organizational members.

Structural Relationships between the Variables of Person-Environment Fit, Positive Psychological Capital and Innovative Work Behavior (개인-환경 적합성, 긍정심리자본, 혁신 행동 간의 구조적 관계)

  • Han, Jee-Hoon;Yang, Hae-Sool
    • Journal of Digital Convergence
    • /
    • v.14 no.10
    • /
    • pp.225-240
    • /
    • 2016
  • The importance of person-environment fit has been highlighted for human resources management in convergence environment. This paper was validated through a structural relationships model, the impact of person-environment fit on innovative work behavior by focusing on mediating role of positive psychological capital. Person-environment fit showed a significant effect on positive psychological capital and turnover intentions. Innovative work behavior appeared to have a mediating effect on the relationship between person-environment fit and innovative work behavior. Especially the person-environment fit itself has no direct effect on innovative work behavior, and when the awareness of the positive psychological capital is firstly formed into a person, it can increase innovative work behavior.

Research and Analysis of Enactment of China's Old and Rare Books Management (중국의 고문헌 관리 법제화의 조사 분석)

  • Han, Mikyung
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.52 no.3
    • /
    • pp.193-214
    • /
    • 2018
  • This study aims to analyze enactment of China's old and rare books management. For the purpose, the review on China's legal system and management related to old and rare books were studied. And this study investigated 4 laws, 6 administrative regulations, 4 sector regulations, and 13 administrative normativity papers. Among those, 5 major sources for old and rare books management were identified as follows : 1) China's National Civilization Protection Law in 2013, 2) China's Old and Rare Book Organization Directive in 1989, 3) Regulation on Management of Research, Organization, and Publication of Old and Rare Books in 1986, 4) Standards on Grading Classification of Civilization Collections in 2001, and 5) Provisional Regulation on Civilization Auctioning in 2003. Based on the analysis of these sources, this study deduced implications in terms of Chinese old and rare books management such as the necessity to give considerations to 1) the importance of old and rare books management policy, 2) nationwide old and rare books management, 3) expansion of eduction and training of human resources, 4) establishment of institution specializing in old and rare books, and 5) special management of science of Chinese medicine.

Development of Estimation Functions for Strong Winds Damage Reflecting Regional Characteristics Based on Disaster Annual Reports : Focused on Gyeongsang Area (재해연보 기반 지역특성을 반영한 강풍피해예측함수 개발 : 경상지역을 중심으로)

  • Rho, Jung-Lae;Song, Chang-young
    • Journal of the Society of Disaster Information
    • /
    • v.16 no.2
    • /
    • pp.223-236
    • /
    • 2020
  • Purpose: In this study, a strong wind damage prediction function was developed in order to be used as a contingency during disaster management (preventive-preventive-response-recovery). Method: The predicted strong wind damage function proposed in this study took into account the re-enactment boy power, weather data and local characteristics at the time of damage. The meteorological data utilized the wind speed, temperature, and damage history observed by the Korea Meteorological Administration, the disaster year, and the recovery costs, population, vinyl house area, and farm water contained in the disaster report as factors to reflect the regional characteristics. Result: The function developed in this study reflected the predicted weather factors and local characteristics based on the history of strong wind damage in the past, and the extent of damage can be predicted in a short time. Conclusion: Strong wind damage prediction functions developed in this study are believed to be available for effective disaster management, such as decision making by policy-makers, deployment of emergency personnel and disaster prevention resources.

A study for the reduction of network traffic through an efficient processing of the trend analysis information (경향분석 정보의 효율적인 처리를 통한 네트워크 트래픽 감소 방안에 대한 연구)

  • Youn, Chun-Kyun
    • Journal of Digital Convergence
    • /
    • v.10 no.1
    • /
    • pp.323-333
    • /
    • 2012
  • Network traffic demand is increasing explosively because of various smart equipment and services on smart era. It causes of traffic overload for wireless and wired network. Network management system is very important to control the explosion of data traffic. It uses SNMP to communicate with various network resources for management functions and creates lots of management traffic. Those are can be serious traffic congestion on a network. I propose an improving function of SNMP to minimize unnecessary traffics between manager and agent for collecting the Trend Analysis Information which is mainly used to monitor and accumulate for a specific time period in this paper. The results of test show it has compatibility with the existing SNMP and greatly decreases the amount of network traffic and response time.

Load Distribution Method based on Transcoding Time Estimation on Distributed Transcoding Environments (분산 트랜스코딩 환경에서 트랜스코딩 시간 예측 기반 부하 분산 기법)

  • Kim, Jong-Woo;Seo, Dong-Mahn;Jung, In-Bum
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.37 no.4
    • /
    • pp.195-204
    • /
    • 2010
  • Due to improved wireless communication technologies, it is possible to provide multimedia streaming service for mobile device clients like PDAs and cellphones. Wireless networks are serviced on low bandwidth channels and mobile devices work on limited hardware specifications. In these conditions, transcoding technologies are needed to adapt the media for streaming services to given mobile environments. To transcode from the source media to the target media for corresponding grades, transcoding servers perform transcoding jobs as exhausting their resources. Since various transcoding loads occur according to the target transconding grades, an effective transcoding load balancing policy is required among transcoding servers. In addition to transcoding process, servers should maintain QoS streams for mobile clients for total serviced times. It requires real-time requirements to support QoS for various mobile clients. In this paper, a new transcoding load distribution method is proposed. The proposed method can be driven for fair load balance between distributed transcoding servers. Based on estimated transcoding time, movie information and target transcoding bit-rate, it provides fair transcoding load distribution and also performs admission control to support QoS streams for mobile clients.

Design & Implementation of Secure Mobile Agent Gateway (안전한 이동 에이전트 게이트웨이의 설계 및 구현)

  • Park, Jae-Kyoung;Won, Yoo-Hun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.2
    • /
    • pp.240-249
    • /
    • 2002
  • In the course of Internet proliferation, many network-related technologies are examined for possible growth and evolution. The use of Internet-based technologies in private networks has further fuelled the demand for network-based applications. The most promising among the new paradigms is use of mobile agents. The mobile agent is capable of migrating autonomously from node to node in the network, to perform some computation on behalf of the user. The mobile agent paradigm is attractive alternative to traditional client-server programming for a significant class of network-centric applications. It also however, suffers from a major drawback, namely, the potential for malicious attacks, abuse of resources pilfering of information, and other security issues. These issues are significantly hampering the acceptance of the mobile-agent paradigm. This paper describe the design & implementation of secure mobile agent gateway that split and merge the agent cede with security policy database. This mechanism will promote the security in mobile agent systems and mobile agent itself.

QoS-Constrained Resource Reconfiguration Scheme based on Temporal Quorum Status Estimation in Computational Grids (계산 그리드에서의 시변 쿼럼 상태 예측을 기반으로 한 QoS 제약 자원 재구성 방법)

  • Byungsang, Kim;Dong Su, Nam;Bong Hwan, Lee
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.5
    • /
    • pp.460-468
    • /
    • 2004
  • Quality of Service (QoS)-constrained policy has an advantage to guarantee QoS requirements requested by users. Quorum systems can ensure the consistency and availability of replicated data despite the benign failure of data repositories. We propose a Quorum based resource management scheme, which includes a system resource and network resource, both of which can satisfy the requirements of application QoS. We also propose the resource reconfiguration algorithm based on temporal execution time estimation method. Resource reconfiguration means that reshuffling the current available resource set for maintaining the quality level of the resources. We evaluate the effectiveness of resource reconfiguration mechanism with a Heart Hemodynamics analysis. Our approach shows the increase of the stability of execution environment as well as decrease the completion time compare to the method that is not adapted the resource reconfiguration.

A Study on the Sustainable Tourism Destination Management Plan using LBS (LBS를 이용한 지속가능한 관광지 관리방안에 관한 연구)

  • Park, Jae-Wan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.3
    • /
    • pp.447-451
    • /
    • 2017
  • This study proposes a new model of tourism destination management based on the tourism management program using information and communication technology provided by LBS. The personalized tourist information service can enhance the satisfaction of tourists. Sustainability can be expanded through management based on the capacity of the tourism destination. Increased satisfaction leads to more diverse tourism activities. Various tourism activities increase the consumption expenditure, which satisfies the local tourism destination management purpose. The tourism destination management plan of the central and local governments is a comprehensive system in which detailed policy support plans are formulated from the perspective of the three requirements for sustainability-economic, socio-cultural, and environmental-and concerned parties are connected and resources are supported through detailed processes in which the sources of disparities in accessibility are identified and the roles are delegated at the national, community, and regional levels.

Efficient Techniques to Secure User Data in the Secure OS for a Multi-user Environment (다중 사용자 환경을 위한 보안운영체제의 효율적인 사용자 자원 보호 방법)

  • Ahn, Sun-Il;Han, Sang-Yong
    • The KIPS Transactions:PartC
    • /
    • v.12C no.7 s.103
    • /
    • pp.999-1006
    • /
    • 2005
  • The Secure OS is an operating system which adds security functions to the existing operating system, in order to secure a system from sorority problems originated from inherent frailty of applications or operating systems. With the existing Secure Oses for it is difficult to set an effective security policy securing personal resources in a multi-user environment system. To solve this problem in this paper we present two Techniques to secure user data efficiently in the RBAC-based Secure OS for a multi-user environment. Firstly we utilizes object's owner information in addition to object's filename. Secondly we make use of meta symbol('$\ast$'), which is able to describe multiple access targets. In addition this paper gives some examples to show advantages from these techniques. And these features are implemented in an solaris-based Secure OS called Secusys.