• Title/Summary/Keyword: Product Opportunity

Search Result 222, Processing Time 0.025 seconds

A Study on Intelligent Value Chain Network System based on Firms' Information (기업정보 기반 지능형 밸류체인 네트워크 시스템에 관한 연구)

  • Sung, Tae-Eung;Kim, Kang-Hoe;Moon, Young-Su;Lee, Ho-Shin
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.3
    • /
    • pp.67-88
    • /
    • 2018
  • Until recently, as we recognize the significance of sustainable growth and competitiveness of small-and-medium sized enterprises (SMEs), governmental support for tangible resources such as R&D, manpower, funds, etc. has been mainly provided. However, it is also true that the inefficiency of support systems such as underestimated or redundant support has been raised because there exist conflicting policies in terms of appropriateness, effectiveness and efficiency of business support. From the perspective of the government or a company, we believe that due to limited resources of SMEs technology development and capacity enhancement through collaboration with external sources is the basis for creating competitive advantage for companies, and also emphasize value creation activities for it. This is why value chain network analysis is necessary in order to analyze inter-company deal relationships from a series of value chains and visualize results through establishing knowledge ecosystems at the corporate level. There exist Technology Opportunity Discovery (TOD) system that provides information on relevant products or technology status of companies with patents through retrievals over patent, product, or company name, CRETOP and KISLINE which both allow to view company (financial) information and credit information, but there exists no online system that provides a list of similar (competitive) companies based on the analysis of value chain network or information on potential clients or demanders that can have business deals in future. Therefore, we focus on the "Value Chain Network System (VCNS)", a support partner for planning the corporate business strategy developed and managed by KISTI, and investigate the types of embedded network-based analysis modules, databases (D/Bs) to support them, and how to utilize the system efficiently. Further we explore the function of network visualization in intelligent value chain analysis system which becomes the core information to understand industrial structure ystem and to develop a company's new product development. In order for a company to have the competitive superiority over other companies, it is necessary to identify who are the competitors with patents or products currently being produced, and searching for similar companies or competitors by each type of industry is the key to securing competitiveness in the commercialization of the target company. In addition, transaction information, which becomes business activity between companies, plays an important role in providing information regarding potential customers when both parties enter similar fields together. Identifying a competitor at the enterprise or industry level by using a network map based on such inter-company sales information can be implemented as a core module of value chain analysis. The Value Chain Network System (VCNS) combines the concepts of value chain and industrial structure analysis with corporate information simply collected to date, so that it can grasp not only the market competition situation of individual companies but also the value chain relationship of a specific industry. Especially, it can be useful as an information analysis tool at the corporate level such as identification of industry structure, identification of competitor trends, analysis of competitors, locating suppliers (sellers) and demanders (buyers), industry trends by item, finding promising items, finding new entrants, finding core companies and items by value chain, and recognizing the patents with corresponding companies, etc. In addition, based on the objectivity and reliability of the analysis results from transaction deals information and financial data, it is expected that value chain network system will be utilized for various purposes such as information support for business evaluation, R&D decision support and mid-term or short-term demand forecasting, in particular to more than 15,000 member companies in Korea, employees in R&D service sectors government-funded research institutes and public organizations. In order to strengthen business competitiveness of companies, technology, patent and market information have been provided so far mainly by government agencies and private research-and-development service companies. This service has been presented in frames of patent analysis (mainly for rating, quantitative analysis) or market analysis (for market prediction and demand forecasting based on market reports). However, there was a limitation to solving the lack of information, which is one of the difficulties that firms in Korea often face in the stage of commercialization. In particular, it is much more difficult to obtain information about competitors and potential candidates. In this study, the real-time value chain analysis and visualization service module based on the proposed network map and the data in hands is compared with the expected market share, estimated sales volume, contact information (which implies potential suppliers for raw material / parts, and potential demanders for complete products / modules). In future research, we intend to carry out the in-depth research for further investigating the indices of competitive factors through participation of research subjects and newly developing competitive indices for competitors or substitute items, and to additively promoting with data mining techniques and algorithms for improving the performance of VCNS.

An Exploratory Study of Purchasing Decision Making and Adoption on the RFID Purchasing Customer (RFID 구매고객의 구매 의사결정과 수용에 대한 탐색적 연구)

  • Seo, Pil-Su;Jang, Jang-Yi;Shim, Kyeng-Su
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.3 no.4
    • /
    • pp.89-116
    • /
    • 2008
  • RFID (Radio Frequency Identification) is regarded as a core technology of ubiquitous computing. Although it has some technical limitations such as technological standardization of RFID tags as well as economical limitations, many companies around the world have already accepted RFID to improve their management efficiency. In this regard, this study is to meet with results that the adoption of RFID technology willbring opportunities that companies' operational process are improved and customer satisfaction is highly strengthened. This research focuses on providing more understanding for building RFID marketing strategy to suppliers who want to sell their RFID products to customers through analyzing purchasing process. The findings are as follows; First, the study shows that buying center members usually take product reliability and precision of technical specification in the case of new-task buying situation while they put their first purchasing priority on prices in the straight rebuy. Second, the finding presents that in new-task buying situation and the straight rebuy purchasing personnel get information about new products through product performance test, organizational engineers, opinions from other companies' purchasing personnel, and checking out samples. Third, this research demonstrates when it comes to purchasing risk in their first purchasing, the persons who are in charge of material purchasing are inclined to be aware of the risk most in technical problems, followed by financial problems and time delay problems in order. And in addition to those risks are mentioned above, once-again-purchasers take the risk like an opportunity loss for better products into consideration. Fourth, the study shows that the role of concerning departments makes no difference in each purchasing stage. Accordingly marketers need to beef up the differentiated strategy to persuade their customers Fifth, the findings of this study demonstrate that purchasing decision making is much influenced by the final users. So suppliers are supposed to perform the most active marketing strategy at the first stage of purchasing through various resources. Finally, the study presents that the suppliers who will have had close relationships with their customers need to give consistent information to them so that their customers can have lower motive in purchasing products from competitors.

  • PDF

Critical Analyses of '2nd Science Inquiry Experiment Contest' (과학탐구 실험대회의 문제점 분석)

  • Paik, Seoung-Hey
    • Journal of The Korean Association For Science Education
    • /
    • v.15 no.2
    • /
    • pp.173-184
    • /
    • 1995
  • The purpose of this study was to analyse the problems of 'Science Inquiry Experiment Contest(SIEC)' which was one of 8 programs of 'The 2nd Student Science Inquiry Olympic Meet(SSIOM)'. The results and conclusions of this study were as follows: 1. It needs to reconsider the role of practical work within science experiment because practical work skills form one of the mainstays in current science. But the assessment of students' laboratory skills in the contest was made little account of. It is necessary to remind of what it means to be 'good at science'. There are two aspects: knowing and doing. Both are important and, in certain respects, quite distinct. Doing science is more of a craft activity, relying more on craft skill and tacit knowledge than on the conscious application of explicit knowledge. Doing science is also divided into two aspects, 'process' and 'skill' by many science educators. 2. The report's and checklist's assessment items were overlapped. Therefore it was suggested that the checklist assessment items were set limit to the students' acts which can't be found in reports. It is important to identify those activities which produce a permanent assessable product, and those which do not. Skills connected with recording and reporting are likely to produce permanent evidence which can be evaluated after the experiment. Those connected with manipulative skills involving processes are more ephemeral and need to be assessed as they occur. The division of student's experimental skills will contribute to the accurate assess of student's scientific inquiry experimental ability. 3. There was a wide difference among the scores of one participant recorded by three evaluators. This means that there was no concrete discussion among the evaluators before the contest. Despite the items of the checklists were set by preparers of the contest experiments, the concrete discussions before the contest were necessary because students' experimental acts were very diverse. There is a variety of scientific skills. So it is necessary to assess the performance of individual students in a range of skills. But the most of the difficulties in the assessment of skills arise from the interaction between measurement and the use. To overcome the difficulties, not only must the mark needed for each skill be recorded, something which all examination groups obviously need, but also a description of the work that the student did when the skill was assessed must also be given, and not all groups need this. Fuller details must also be available for the purposes of moderation. This is a requirement for all students that there must be provision for samples of any end-product or other tangible form of evidence of candidates' work to be submitted for inspection. This is rather important if one is to be as fair as possible to students because, not only can this work be made available to moderators if necessary, but also it can be used to help in arriving at common standards among several evaluators, and in ensuring consistent standards from one evaluator over the assessment period. This need arises because there are problems associated with assessing different students on the same skill in different activities. 4. Most of the students' reports were assessed intuitively by the evaluators despite the assessment items were established concretely by preparers of the experiment. This result means that the evaluators were new to grasp the essence of the established assessment items of the experiment report and that the students' assessment scores were short of objectivity. Lastly, there are suggestions from the results and the conclusions. The students' experimental acts which were difficult to observe because they occur in a flash and which can be easily imitated should be excluded from the assessment items. Evaluators are likely to miss the time to observe the acts, and the students who are assessed later have more opportunity to practise the skill which is being assessed. It is necessary to be aware of these problems and try to reduce their influence or remove them. The skills and processes analysis has made a very useful checklist for scientific inquiry experiment assessment. But in itself it is of little value. It must be seen alongside the other vital attributes needed in the making of a good scientist, the affective aspects of commitment and confidence, the personal insights which come both through formal and informal learning, and the tacit knowledge that comes through experience, both structured and acquired in play. These four aspects must be continually interacting, in a flexible and individualistic way, throughout the scientific education of students. An increasing ability to be good at science, to be good at doing investigational practical work, will be gained through continually, successively, but often unpredictably, developing more experience, developing more insights, developing more skills, and producing more confidence and commitment.

  • PDF

A Study on Purchasing Decision Making and Adoption : Focused on the RFID Purchasing Customer (구매의사 결정과 수용에 대한 연구 : RFID 구매고객 중심으로)

  • Seo, Pil-Su;Jang, Jang-Yi;Shim, Kyeng-Su
    • 한국벤처창업학회:학술대회논문집
    • /
    • 2008.11a
    • /
    • pp.257-282
    • /
    • 2008
  • RFID (Radio Frequency Identification) is regarded as a core technology of ubiquitous computing. Although it has some technical limitations such as technological standardization of RFID tags as well as economical limitations, many companies around the world have already accepted RFID to improve their management efficiency. In this regard, this study is to meet with results that the adoption of RFID technology willbring opportunities that companies' operational process are improved and customer satisfaction is highly strengthened. This research focuses on providing more understanding for building RFID marketing strategy to suppliers who want to sell their RFID products to customers through analyzing purchasing process. The findings are as follows; First, the study shows that buying center members usually take product reliability and precision of technical specification in the case of new-task buying situation while they put their first purchasing priority on prices in the straight rebuy. Second, the finding presents that in new-task buying situation and the straight rebuy purchasing personnel get information about new products through product performance test, organizational engineers, opinions from other companies' purchasing personnel, and checking out samples. Third, this research demonstrates when it comes to purchasing risk in their first purchasing, the persons who are in charge of material purchasing are inclined to be aware of the risk most in technical problems, followed by financial problems and time delay problems in order. And in addition to those risks are mentioned above, once-again-purchasers take the risk like an opportunity loss for better products into consideration. Fourth, the study shows that the role of concerning departments makes no difference in each purchasing stage. Accordingly marketers need to beef up the differentiated strategy to persuade their customers. Fifth, the findings of this study demonstrate that purchasing decision making is much influenced by the final users. So suppliers are supposed to perform the most active marketing strategy at the first stage of purchasing through various resources. Finally, the study presents that the suppliers who will have had close relationships with their customers need to give consistent information to them so that their customers can have lower motive in purchasing products from competitors.

  • PDF

Extension Method of Association Rules Using Social Network Analysis (사회연결망 분석을 활용한 연관규칙 확장기법)

  • Lee, Dongwon
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.4
    • /
    • pp.111-126
    • /
    • 2017
  • Recommender systems based on association rule mining significantly contribute to seller's sales by reducing consumers' time to search for products that they want. Recommendations based on the frequency of transactions such as orders can effectively screen out the products that are statistically marketable among multiple products. A product with a high possibility of sales, however, can be omitted from the recommendation if it records insufficient number of transactions at the beginning of the sale. Products missing from the associated recommendations may lose the chance of exposure to consumers, which leads to a decline in the number of transactions. In turn, diminished transactions may create a vicious circle of lost opportunity to be recommended. Thus, initial sales are likely to remain stagnant for a certain period of time. Products that are susceptible to fashion or seasonality, such as clothing, may be greatly affected. This study was aimed at expanding association rules to include into the list of recommendations those products whose initial trading frequency of transactions is low despite the possibility of high sales. The particular purpose is to predict the strength of the direct connection of two unconnected items through the properties of the paths located between them. An association between two items revealed in transactions can be interpreted as the interaction between them, which can be expressed as a link in a social network whose nodes are items. The first step calculates the centralities of the nodes in the middle of the paths that indirectly connect the two nodes without direct connection. The next step identifies the number of the paths and the shortest among them. These extracts are used as independent variables in the regression analysis to predict future connection strength between the nodes. The strength of the connection between the two nodes of the model, which is defined by the number of nodes between the two nodes, is measured after a certain period of time. The regression analysis results confirm that the number of paths between the two products, the distance of the shortest path, and the number of neighboring items connected to the products are significantly related to their potential strength. This study used actual order transaction data collected for three months from February to April in 2016 from an online commerce company. To reduce the complexity of analytics as the scale of the network grows, the analysis was performed only on miscellaneous goods. Two consecutively purchased items were chosen from each customer's transactions to obtain a pair of antecedent and consequent, which secures a link needed for constituting a social network. The direction of the link was determined in the order in which the goods were purchased. Except for the last ten days of the data collection period, the social network of associated items was built for the extraction of independent variables. The model predicts the number of links to be connected in the next ten days from the explanatory variables. Of the 5,711 previously unconnected links, 611 were newly connected for the last ten days. Through experiments, the proposed model demonstrated excellent predictions. Of the 571 links that the proposed model predicts, 269 were confirmed to have been connected. This is 4.4 times more than the average of 61, which can be found without any prediction model. This study is expected to be useful regarding industries whose new products launch quickly with short life cycles, since their exposure time is critical. Also, it can be used to detect diseases that are rarely found in the early stages of medical treatment because of the low incidence of outbreaks. Since the complexity of the social networking analysis is sensitive to the number of nodes and links that make up the network, this study was conducted in a particular category of miscellaneous goods. Future research should consider that this condition may limit the opportunity to detect unexpected associations between products belonging to different categories of classification.

Business Strategies for Korean Private Security-Guard Companies Utilizing Resource-based Theory and AHP Method (자원기반 이론과 AHP 방법을 활용한 민간 경호경비 기업의 전략 연구)

  • Kim, Heung-Ki;Lee, Jong-Won
    • Korean Security Journal
    • /
    • no.36
    • /
    • pp.177-200
    • /
    • 2013
  • As we enter a high industrial society that widens the gap between the rich and poor, demand for the security services has grown explosively. With the growth in quantitative expansion of security services, people have also placed increased requirements on more sophisticated and diversified security services. Consequently, market outlook for private security services industry is positive. However, Korea's private security services companies are experiencing difficulties in finding a direction to capture this new market opportunity due to their small sizes and lack of management-strategic thinking skills. Therefore, we intend to offer a direction of development for our private security services industry using a management-strategy theory and the Analytic Hierarchy Process(AHP), a structured decision-making method. A resource-based theory is one of the important management strategy theories. It explains that a company's overall performance is primarily determined by its competitive resources. Using this theory, we could analyze a company's unique resources and core competencies and set a strategic direction for the company accordingly. The usefulness and validity of this theory has been demonstrated as it has often been subject to empirical verification since 1990s. Based on this theory, we outlined a set of basic procedures to establish a management strategy for the private security services companies. We also used the AHP method to identify competitive resources, core competencies, and strategies from private security services companies in contrast with public companies. The AHP method is a technique that can be used in the decision making process by quantifying experts' knowledge and unstructured problems. This is a verified method that has been used in the management decision making in the corporate environment as well as for the various academic studies. In order to perform this method, we gathered data from 11 experts from academic, industrial, and research sectors and drew distinctive resources, competencies, and strategic direction for private security services companies vis-a-vis public organizations. Through this process, we came to the conclusion that private security services companies generally have intangible resources as their distinctive resources compared with public organization. Among those intangible resources, relational resources, customer information, and technologies were analyzed as important. In contrast, tangible resources such as equipment, funds, distribution channels are found to be relatively scarce. We also found the competencies in sales and marketing and new product development as core competencies. We chose a concentration strategy focusing on a particular market segment as a strategic direction considering these resources and competencies of private security services companies. A concentration strategy is the right fit for smaller companies as a strategy to allow them to focus all of their efforts on target customers in a single segment. Thus, private security services companies would face the important tasks such as developing a new market and appropriate products for such market segment and continuing marketing activities to manage their customers. Additionally, continuous recruitment is required to facilitate the effective use of human resources in order to strengthen their marketing competency in a long term.

  • PDF

A Comparison of Gene Extraction Methods for the Identification of Raw Materials from Processed Meat Products (식육추출가공품의 사용원료 확인을 위한 유전자추출 방법의 비교 및 검토)

  • Park, Yong-Chjun;Kim, Mi-Ra;Lim, Ji-Young;Park, Young-Eun;Shin, Jun-Ho;Hwang, Cho-Rong;Lim, Jan-Di;Kim, Kyu-Heon;Lee, Jae-Hwang;Cho, Tae-Yong;Lee, Hwa-Jung;Han, Sang-Bae
    • Journal of Food Hygiene and Safety
    • /
    • v.27 no.2
    • /
    • pp.146-151
    • /
    • 2012
  • In this study, effective gene extraction methods were compared to identify raw materials of processed meat products through molecular biological methods. Species specific primers were used to identify ingredients of processed foods and, as a sample, 13 kinds of processed meat products including beef, pork and chicken. According to the type of sample, 13 kinds of samples were classified into liquid type, source type and powder type. The samples were pre-treated (centrifugation) and (or) performed Whole Gene Amplification (WGA) kit for amplification of the extracted DNA. As a result, it was possible to identify the raw material of products through the centrifugation of sample 1 ml for liquid type of processed meat products. For source type of products after gene extraction, it was required to perform WGA for the identification of ingredients. For powder type products did not required any further pre-treatment and WGA. In this study, it was an opportunity to confirm the possibility of identification of raw material from the gene extraction of processed meat products and this method could be used to examine the authenticity of raw material of products.

An Empirical Study on Successful Factor of Local Mobile App One-Person Creating Company : The Moderating Effects of Social Capital (지역 모바일 앱 1인 창조기업의 성공요인에 관한 실증분석 : 사회적 자본의 조절효과를 중심으로)

  • Cheon, Phyeong Uk;Chung, Dong Seop;Ock, Young Seok
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.9 no.2
    • /
    • pp.201-219
    • /
    • 2014
  • The Republic of Korea in the real economy to a knowledge economy, and a center of creativity and imagination in the creative economy is changing the paradigm. As the core of creating economic, creative industries with the technology and information play an important role in the industry individuals. In order to solve the problem of the polarization of the economy and high youth unemployment rate of Korea, to recognize the role of the creative industries, as objection part, dimensions pan-national and one creative companies in industries of Mobile Apps various policies that support has been promoted. Support these policies to be able to contribute to the establishment of the success of mobile apps one-person creating company, we performed this study targeting one-person company that creates mobile apps area, we conducted a demonstration study of success factors, and thus more effective and efficient in an attempt to seek out support measures. In this study, we derive a research 4 hypothesis about the success factors of one creative enterprise through literature discussion, a study was made on the basis of empirical data of one-person company that creates mobile apps. The results of the analysis, first, if the development rate of the mobile application technology is fast and a new competition associated product is appeared, it was possible to find a tendency to be higher at the performance quantitative companies. Second, if the founder is a founding for the benefit and rewarding work and come to terms with the risk, it was possible to discover tends to be higher achievement quantitative. Third, if one-person company select a target market with capture intensively, it was possible to find a tendency for higher qualitative results. Fourth, it could be found that the reliability of the contact frequency of the network related performance business environment these characteristics enterprise management strategy and act as a significant modulatory effect. Provision of information relating to management and entrepreneurship education to be one creative enterprise is required, these results suggest that there is a provision continuing need for the opportunity to be able to meet and network and reliable variety have. In this study, to take advantage to promote the elimination measures that can increase the likelihood of success of the company of institutions to support one company that creates knowledge-based, such as in the field of mobile application.

  • PDF

Value of Information Technology Outsourcing: An Empirical Analysis of Korean Industries (IT 아웃소싱의 가치에 관한 연구: 한국 산업에 대한 실증분석)

  • Han, Kun-Soo;Lee, Kang-Bae
    • Asia pacific journal of information systems
    • /
    • v.20 no.3
    • /
    • pp.115-137
    • /
    • 2010
  • Information technology (IT) outsourcing, the use of a third-party vendor to provide IT services, started in the late 1980s and early 1990s in Korea, and has increased rapidly since 2000. Recently, firms have increased their efforts to capture greater value from IT outsourcing. To date, there have been a large number of studies on IT outsourcing. Most prior studies on IT outsourcing have focused on outsourcing practices and decisions, and little attention has been paid to objectively measuring the value of IT outsourcing. In addition, studies that examined the performance of IT outsourcing have mainly relied on anecdotal evidence or practitioners' perceptions. Our study examines the contribution of IT outsourcing to economic growth in Korean industries over the 1990 to 2007 period, using a production function framework and a panel data set for 54 industries constructed from input-output tables, fixed-capital formation tables, and employment tables. Based on the framework and estimation procedures that Han, Kauffman and Nault (2010) used to examine the economic impact of IT outsourcing in U.S. industries, we evaluate the impact of IT outsourcing on output and productivity in Korean industries. Because IT outsourcing started to grow at a significantly more rapid pace in 2000, we compare the impact of IT outsourcing in pre- and post-2000 periods. Our industry-level panel data cover a large proportion of Korean economy-54 out of 58 Korean industries. This allows us greater opportunity to assess the impacts of IT outsourcing on objective performance measures, such as output and productivity. Using IT outsourcing and IT capital as our primary independent variables, we employ an extended Cobb-Douglas production function in which both variables are treated as factor inputs. We also derive and estimate a labor productivity equation to assess the impact of our IT variables on labor productivity. We use data from seven years (1990, 1993, 2000, 2003, 2005, 2006, and 2007) for which both input-output tables and fixed-capital formation tables are available. Combining the input-output tables and fixed-capital formation tables resulted in 54 industries. IT outsourcing is measured as the value of computer-related services purchased by each industry in a given year. All the variables have been converted to 2000 Korean Won using GDP deflators. To calculate labor hours, we use the average work hours for each sector provided by the OECD. To effectively control for heteroskedasticity and autocorrelation present in our dataset, we use the feasible generalized least squares (FGLS) procedures. Because the AR1 process may be industry-specific (i.e., panel-specific), we consider both common AR1 and panel-specific AR1 (PSAR1) processes in our estimations. We also include year dummies to control for year-specific effects common across industries, and sector dummies (as defined in the GDP deflator) to control for time-invariant sector-specific effects. Based on the full sample of 378 observations, we find that a 1% increase in IT outsourcing is associated with a 0.012~0.014% increase in gross output and a 1% increase in IT capital is associated with a 0.024~0.027% increase in gross output. To compare the contribution of IT outsourcing relative to that of IT capital, we examined gross marginal product (GMP). The average GMP of IT outsourcing was 6.423, which is substantially greater than that of IT capital at 2.093. This indicates that on average if an industry invests KRW 1 millon, it can increase its output by KRW 6.4 million. In terms of the contribution to labor productivity, we find that a 1% increase in IT outsourcing is associated with a 0.009~0.01% increase in labor productivity while a 1% increase in IT capital is associated with a 0.024~0.025% increase in labor productivity. Overall, our results indicate that IT outsourcing has made positive and economically meaningful contributions to output and productivity in Korean industries over the 1990 to 2007 period. The average GMP of IT outsourcing we report about Korean industries is 1.44 times greater than that in U.S. industries reported in Han et al. (2010). Further, we find that the contribution of IT outsourcing has been significantly greater in the 2000~2007 period during which the growth of IT outsourcing accelerated. Our study provides implication for policymakers and managers. First, our results suggest that Korean industries can capture further benefits by increasing investments in IT outsourcing. Second, our analyses and results provide a basis for managers to assess the impact of investments in IT outsourcing and IT capital in an objective and quantitative manner. Building on our study, future research should examine the impact of IT outsourcing at a more detailed industry level and the firm level.

A Study on Employment Analysis of Graduates Majoring Library and Information Science: the case of K University (문헌정보학전공 졸업자의 취업실태 분석 연구 - K대학교를 중심으로 -)

  • Lee, Jongmoon
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.23 no.4
    • /
    • pp.125-139
    • /
    • 2012
  • This paper aims to analyze the employment of graduates majoring in Library and Information Science(LIS) in K University, to identify problems in the employment of those graduates, and to propose approaches to improve employment. Among 178 graduates getting a job for five years from August 2006 to February 2011, 65% of them was employed, 32% was not employed, and 3% continued further study, The 116 graduates employed were analyzed. The results revealed that 40% are full-time employees and 60% are part-time workers. For workplace types, 29% worked in general companies and 16% worked in public libraries. 10% worked in school libraries and college libraries. Those who worked in administrative divisions in colleges or schools comprised 9%. Those who worked in public organizations and publishing companies/bookstores were 6% each. 5% worked in specialized libraries. In the case of duties, 38% were librarians. 30% were engaged in office work. Those in sales/administration were 7%. Tellers/salesperson comprised 7%. 5% worked as teaching assistants and 3% worked in the web or in IT related businesses. Those who worked in private institutes and product planning/design comprised 2% each. Teacher librarians, day care center teachers, secretaries, company newsletter reporters, soldiers and self-employed workers were 1% for each. As a result, the major congruence was around 40%. For the career which the (56) unemployed desired, 57% prepared themselves for employment and 21% prepared for Civil Service Examination. Those who prepared for teacher recruit examination and who weren't confirmed were 11% for each. The problems identified were high unemployment to 32%, higher employment as part-time workers than full-time workers, and major congruence of just around 40%. As the results, the study proposes that the national and local authorities should actively create jobs, make the students majoring in LIS have the opportunity to understand and experience jobs related to information science, develop jobs related to LIS on the academic level and provide guidance to graduates.