• Title/Summary/Keyword: Support of Knowledge Management

Search Result 894, Processing Time 0.027 seconds

The Development and Validation of a Core Competency Scale for Startup Talent : Focusing on ICT Sector Employees (스타트업 핵심인재 역량 척도 개발 및 타당화 : 정보통신기술(ICT)분야 종사자를 대상으로)

  • Han, Chae-yeon;Ha, Gyu-young
    • Journal of Venture Innovation
    • /
    • v.7 no.3
    • /
    • pp.183-228
    • /
    • 2024
  • This study aimed to develop a competency evaluation scale tailored to the specific needs of key talent in the ICT startup sector. Existing competency assessment tools are mostly designed for environments in large corporations or traditional small and medium-sized enterprises, failing to adequately reflect the dynamic requirements of rapidly evolving startups. For startups, where a small number of individuals directly impact company success, key talent is a critical asset. Accordingly, this study sought to create a scale that measures the competencies suited to the challenges and opportunities faced by startups, helping domestic startups establish more effective talent management strategies. The research initially selected 71 items through a literature review and in-depth interviews. Based on expert feedback that emphasized the need for more precise and clear descriptions, the item descriptions were revised, and a total of 65 items were developed through four rounds of content validation. Following preliminary and main surveys, a final set of 58 items was developed. The main survey conducted further factor analysis based on the three broad competency factors?knowledge, skills, and attitude?identified in the preliminary survey. As a result, 10 latent factors emerged: 6 items for task comprehension, 6 items for practical experience (tacit knowledge), 6 items for collaboration, 9 items for management and problem-solving, 9 items for practical skills, 4 items for self-direction, 5 items for goal orientation, 5 items for adaptability, 5 items for relationship orientation, and 3 items for organizational loyalty. The developed scale comprehensively covers the multifaceted nature of competencies, allowing for a thorough evaluation of essential skills such as technical ability, teamwork, innovation, and leadership, which are critical for startups. Therefore, the scale provides a tool that helps startup managers objectively and accurately assess candidates' competencies. It also supports the growth of employees within startups, maximizing the overall organizational performance. By utilizing this tool, startups can build a strong internal talent pool and continuously enhance employees' competencies, thereby strengthening organizational competitiveness. In conclusion, the competency evaluation scale developed in this study is a customized tool that aligns with the characteristics of startups and plays a crucial role in securing sustainable competitiveness in rapidly changing market environments. Additionally, it offers practical guidance to support the successful growth of domestic startups and help them maintain their competitive edge in the market, contributing to the development of the startup ecosystem and the growth of the national economy.

An Empirical Study on the Influencing Factors of Perceived Job Performance in the Context of Enterprise Mobile Applications (업무성과에 영향을 주는 업무용 모바일 어플리케이션의 주요 요인에 관한 연구)

  • Chung, Sunghun;Kim, Kimin
    • Asia pacific journal of information systems
    • /
    • v.24 no.1
    • /
    • pp.31-50
    • /
    • 2014
  • The ubiquitous accessibility of information through mobile devices has led to an increased mobility of workers from their fixed workplaces. Market researchers estimate that by 2016, 350 million workers will be using their smartphones for business purposes, and the use of smartphones will offer new business benefits. Enterprises are now adopting mobile technologies for numerous applications to increase their operational efficiency, improve their responsiveness and competitiveness, and cultivate their innovativeness. For these reasons, various organizational aspects concerning "mobile work" have received a great deal of recent attention. Moreover, many CIOs plan to allocate a considerable amount of their budgets mobile work environments. In particular, with the consumerization of information technology, enterprise mobile applications (EMA) have played a significant role in the explosive growth of mobile computing in the workplace, and even in improving sales for firms in this field. EMA can be defined as mobile technologies and role-based applications, as companies design them for specific roles and functions in organizations. Technically, EMA can be defined as business enterprise systems, including critical business functions that enable users to access enterprise systems via wireless mobile devices, such as smartphones or tablets. Specifically, EMA enables employees to have greater access to real-time information, and provides them with simple features and functionalities that are easy for them to complete specific tasks. While the impact of EMA on organizational workers' productivity has been given considerable attention in various literatures, relatively little research effort has been made to examine how EMA actually lead to users' job performance. In particular, we have a limited understanding of what the key antecedents are of such an EMA usage outcome. In this paper, we focus on employees' perceived job performance as the outcome of EMA use, which indicates the successful role of EMA with regard to employees' tasks. Thus, to develop a deeper understanding of the relationship among EMA, its environment, and employees' perceived job performance, we develop a comprehensive model that considers the perceived-fit between EMA and employees' tasks, satisfaction on EMA, and the organizational environment. With this model, we try to examine EMA to explain how job performance through EMA is revealed from both the task-technology fit for EMA and satisfaction on EMA, while also considering the antecedent factors for these constructs. The objectives of this study are to address the following research questions: (1) How can employees successfully manage EMA in order to enhance their perceived job performance? (2) What internal and/or external factors are important antecedents in increasing EMA users' satisfaction on MES and task-technology fit for EMA? (3) What are the impacts of organizational (e.g. organizational agility), and task-related antecedents (e.g., task mobility) on task-technology fit for EMA? (4) What are the impacts of internal (e.g., self-efficacy) and external antecedents (e.g., system reputation) for the habitual use of EMA? Based on a survey from 254 actual employees who use EMA in their workplace across industries, our results indicate that task-technology fit for EMA and satisfaction on EMA are positively associated with job performance. We also identify task mobility, organizational agility, and system accessibility that are found to be positively associated with task-technology fit for EMA. Further, we find that external factor, such as the reputation of EMA, and internal factor, such as self-efficacy for EMA that are found to be positively associated with the satisfaction of EMA. The present findings enable researchers and practitioners to understand the role of EMA, which facilitates organizational workers' efficient work processes, as well as the importance of task-technology fit for EMA. Our model provides a new set of antecedents and consequence variables for a TAM involving mobile applications. The research model also provides empirical evidence that EMA are important mobile services that positively influence individuals' performance. Our findings suggest that perceived organizational agility and task mobility do have a significant influence on task-technology fit for EMA usage through positive beliefs about EMA, that self-efficacy and system reputation can also influence individuals' satisfaction on EMA, and that these factors are important contingent factors for the impact of system satisfaction and perceived job performance. Our findings can help managers gauge the impact of EMA in terms of its contribution to job performance. Our results provide an explanation as to why many firms have recently adopted EMA for efficient business processes and productivity support. Our findings additionally suggest that the cognitive fit between task and technology can be an important requirement for the productivity support of EMA. Further, our study findings can help managers in formulating their strategies and building organizational culture that can affect employees perceived job performance. Managers, thus, can tailor their dependence on EMA as high or low, depending on their task's characteristics, to maximize the job performance in the workplace. Overall, this study strengthens our knowledge regarding the impact of mobile applications in organizational contexts, technology acceptance and the role of task characteristics. To conclude, we hope that our research inspires future studies exploring digital productivity in the workplace and/or taking the role of EMA into account for employee job performance.

Chronic pain control in patients with rheumatoid arthritis (만성통증 환자의 통증 조절)

  • Eun, Young
    • Journal of muscle and joint health
    • /
    • v.2 no.1
    • /
    • pp.17-40
    • /
    • 1995
  • Rheumatoid arthritis is the one of the chronic diseases, one of its major symptoms is a chronic pain. Despite developing medical treatment and surgical techniques, it is suggested that to control the pain is the goal of the treatment. But pain is an inner experience and even those closest to the patient cannot truly observe its progress or share in its suffering. The National Academy of Sciences Institute of Medicine's report on Pain and Disability concluded that there is no objective measure of pain-(exactly) no pain thermometer-nor can there ever be one, because the experience of pain is inseparable from personal perception and social influence such as culture. To explore chronic pain experience is to understand the process and property of the patient's perception of pain through the response to pain, the coping with pain, and the adaptation to pain. Therefore a qualitative study was conducted in order to gain an understanding of pain experience of patients with RA in korea. I used naturalistic inquiry as a research methodology, which had 5 axioms, the first is that realities are multiple, constructed, and holistic, the second is that knower and known are interactive, inseparable, the third is only time and context bound working hypotheses(idiographic statements) are possible, the forth is all entities are in a state of mutual simultaneous shaping, so that it is impossible to distinguish causes from effects and the last is that inquiry is value-bound. Purposive sampling was conducted as a sampling. 20 subjects who experienced pain over 10 years, lived in middle-sized city and big city in Korea, and 17 women and 3 men. The subject's age was from 32 to 62 (average 48.8), all were married, living with their spouse and children, except two-one divorced and the other widow before they became ill. I collected data using In depth structured interview. I had interviews two or three times with each subject, and the interviews were conducted at each subject's home. Each interview lasted about two hours an average. A recording was taken with the consent of the subject. I used inductive data analysis-such as unitizing and categorizing. unitizing is a process of coding, whereby raw data are systematically transformed and aggregated into units. Categorizing is a process wherby previously unitized data are organized into categories that provide descriptive or inferential information about the context or setting from which the units were derived. This process is used constant comparative method. The pain controlling process is composed of behavior of pain control. The behaviors of pain control are rearranging of ADL, hiddening role conflict, balancing treatment, and changing social relation. Rearranging of ADL includes diet management, sleep management, and the adjustment of daily life activities. The subjects try to rearrange their daily activities by modified style of motions, rearranging time span & range of activities, using auxillary facilities, and getting help in order to keep on the pace of daily life. Hiddening role conflict means to reduce conflicts between sick role and their role as a family member. In this process, the subjects use two modes, one is to control the pain complaints, and the other is to internalize the value which is to stay home is good for caring her children and being a good mother. To control pain complaints is done by 'enduring', 'understanding' the other family members, or making them undersood in order to reduce pain. Balancing treatment is composed of two aspects. One is to keep the pain within the endurable level, the other is to keep in touch with medical personnel in order to get the information of treatment and emotional support. Changing social relation is made by information seeking and sharing, formation of mutual support relation, and finally simplification of social relationships. The subjects simplify their social relationships by refraining from relations with someone who makes them physically and psychologically strained. In particular the subjects are apt to avoid contact with in-laws, and the change of relation to in-laws results in lessening the family boundary. In the course of this process, they confront the crisis of family confict result in family dissolution. This crisis is related to the threat of self-existence. Findings from this study contribute to understanding the chronic pain experience. To advance this study, we should compare this result with other cases in different cultural contexts. I think to interpret these results, korean cultural background should be considered. Especially the different family concept, more broader family members and kinship network, and the traditional medical knowledge influences patients' behavior.

  • PDF

An Integrated Model based on Genetic Algorithms for Implementing Cost-Effective Intelligent Intrusion Detection Systems (비용효율적 지능형 침입탐지시스템 구현을 위한 유전자 알고리즘 기반 통합 모형)

  • Lee, Hyeon-Uk;Kim, Ji-Hun;Ahn, Hyun-Chul
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.1
    • /
    • pp.125-141
    • /
    • 2012
  • These days, the malicious attacks and hacks on the networked systems are dramatically increasing, and the patterns of them are changing rapidly. Consequently, it becomes more important to appropriately handle these malicious attacks and hacks, and there exist sufficient interests and demand in effective network security systems just like intrusion detection systems. Intrusion detection systems are the network security systems for detecting, identifying and responding to unauthorized or abnormal activities appropriately. Conventional intrusion detection systems have generally been designed using the experts' implicit knowledge on the network intrusions or the hackers' abnormal behaviors. However, they cannot handle new or unknown patterns of the network attacks, although they perform very well under the normal situation. As a result, recent studies on intrusion detection systems use artificial intelligence techniques, which can proactively respond to the unknown threats. For a long time, researchers have adopted and tested various kinds of artificial intelligence techniques such as artificial neural networks, decision trees, and support vector machines to detect intrusions on the network. However, most of them have just applied these techniques singularly, even though combining the techniques may lead to better detection. With this reason, we propose a new integrated model for intrusion detection. Our model is designed to combine prediction results of four different binary classification models-logistic regression (LOGIT), decision trees (DT), artificial neural networks (ANN), and support vector machines (SVM), which may be complementary to each other. As a tool for finding optimal combining weights, genetic algorithms (GA) are used. Our proposed model is designed to be built in two steps. At the first step, the optimal integration model whose prediction error (i.e. erroneous classification rate) is the least is generated. After that, in the second step, it explores the optimal classification threshold for determining intrusions, which minimizes the total misclassification cost. To calculate the total misclassification cost of intrusion detection system, we need to understand its asymmetric error cost scheme. Generally, there are two common forms of errors in intrusion detection. The first error type is the False-Positive Error (FPE). In the case of FPE, the wrong judgment on it may result in the unnecessary fixation. The second error type is the False-Negative Error (FNE) that mainly misjudges the malware of the program as normal. Compared to FPE, FNE is more fatal. Thus, total misclassification cost is more affected by FNE rather than FPE. To validate the practical applicability of our model, we applied it to the real-world dataset for network intrusion detection. The experimental dataset was collected from the IDS sensor of an official institution in Korea from January to June 2010. We collected 15,000 log data in total, and selected 10,000 samples from them by using random sampling method. Also, we compared the results from our model with the results from single techniques to confirm the superiority of the proposed model. LOGIT and DT was experimented using PASW Statistics v18.0, and ANN was experimented using Neuroshell R4.0. For SVM, LIBSVM v2.90-a freeware for training SVM classifier-was used. Empirical results showed that our proposed model based on GA outperformed all the other comparative models in detecting network intrusions from the accuracy perspective. They also showed that the proposed model outperformed all the other comparative models in the total misclassification cost perspective. Consequently, it is expected that our study may contribute to build cost-effective intelligent intrusion detection systems.

Violations of Information Security Policy in a Financial Firm: The Difference between the Own Employees and Outsourced Contractors (금융회사의 정보보안정책 위반요인에 관한 연구: 내부직원과 외주직원의 차이)

  • Jeong-Ha Lee;Sang-Yong Tom Lee
    • Information Systems Review
    • /
    • v.18 no.4
    • /
    • pp.17-42
    • /
    • 2016
  • Information security incidents caused by authorized insiders are increasing in financial firms, and this increase is particularly increased by outsourced contractors. With the increase in outsourcing in financial firms, outsourced contractors having authorized right has become a threat and could violate an organization's information security policy. This study aims to analyze the differences between own employees and outsourced contractors and to determine the factors affecting the violation of information security policy to mitigate information security incidents. This study examines the factors driving employees to violate information security policy in financial firms based on the theory of planned behavior, general deterrence theory, and information security awareness, and the moderating effects of employee type between own employees and outsourced contractors. We used 363 samples that were collected through both online and offline surveys and conducted partial least square-structural equation modeling and multiple group analysis to determine the differences between own employees (246 samples, 68%) and outsourced contractors (117 samples, 32%). We found that the perceived sanction and information security awareness support the information security policy violation attitude and subjective norm, and the perceived sanction does not support the information security policy behavior control. The moderating effects of employee type in the research model were also supported. According to the t-test result between own employees and outsourced contractors, outsourced contractors' behavior control supported information security violation intention but not subject norms. The academic implications of this study is expected to be the basis for future research on outsourced contractors' violation of information security policy and a guide to develop information security awareness programs for outsourced contractors to control these incidents. Financial firms need to develop an information security awareness program for outsourced contractors to increase the knowledge and understanding of information security policy. Moreover, this program is effective for outsourced contractors.

Policy Change and Innovation of Textile Industry in Daegu·Kyungbuk Region (대구·경북지역 섬유산업의 정책변화와 혁신과제)

  • Shin, Jin-Kyo;Kim, Yo-Han
    • Management & Information Systems Review
    • /
    • v.31 no.3
    • /
    • pp.223-248
    • /
    • 2012
  • This study analyses support policy and structural change of textile industry in Daegu Kyungbuk region, and suggests major issues for textile industry's innovation. In Daegu Kyungbuk, it was 1999 that a policy, so called Milano Project, in order to promote a textile industry was devised. In 2004, the Regional Industrial Promotion Plan was devised. The plan was born from a view point of establishing a regional innovation system and of promoting the innovative clusters under a knowledge based economy. After then, the Regional Industry Promotion Project or Regional Strategic Industry Promotion Project became a core of regional textile industrial policy. Research results indicated that the first stage Milano project (1999-2003) showed both positive and negative effects. There were no long-term development plan, clear vision and strategy. But, core industrial infrastructure for differentiated product development, such as New product Development Support Center and Dyeing Design Practical Application Center, was constructed. The second stage Daegu Textile Industry Promotion Plan (2004-2008) displayed a significant technological performance and new product sales with the assistance of Kyungbuk province. Also, textile industry revealed positive fruits such as financial structure, productivity, and profitability as a result of strong restructuring. In industrial structure, there was a important change from clothe textile material to industry textile material. Most of textile companies did not showed high capability in CEO's technology innovation intention, entrepreneurship, R&D and human resource competency in compare with other industry. We suggested that Daegu Kyungbuk has to select and concentrate on the high-tech textile material and living textile for sustainable development and competitiveness. We also proposed a confidence and cooperation based innovation network and company oriented innovation cluster.

  • PDF

Use of Multimedia Technologies in Extra-Curricular Works in Order to Improve the Quality of Training of Future Specialists

  • Tverezovska, Nina;Kovbasa, Tetiana;Pryhalinska, Tetiana;Mykhniuk, Serhii;Lopushan, Tetiana;Radionova, Olena;Kuchai, Tetiana
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.35-42
    • /
    • 2022
  • The article deals with the role of extra-curricular work by means of multimedia technologies in order to improve the quality of training of future specialists. An important condition for achieving high results in training specialists is the optimal combination of classroom and independent extra-curricular work of students by means of multimedia technologies. Very significant is the development of student independence, the formation of skills of independent search activity, the ability to take responsibility, independently solve a problem, find constructive solutions, a way out of a crisis situation, and so on. Extra-curricular work forms students' ability to master the techniques of analysis, synthesis, generalization, comparison; develops flexibility of thinking; opens up opportunities for the development and stabilization of positive learning motives to activate the process of mastering knowledge by means of multimedia technologies as a means of forming the personality of a highly qualified specialist. The concept of multimedia as one of the priority areas of Information Technology, which plays a particularly important role in the process of informatization of education, is revealed, and its advantages in education are shown. The advent of multimedia systems optimizes transformations in education, in many areas of professional activity, science, art, etc. The necessity of distance learning to improve the quality of training of future specialists using multimedia technologies in extra-curricular work is justified. The effectiveness of pedagogical support in the process of distance learning is achieved by the following conditions, which is revealed in the article. Various forms and types of extra-curricular work of students that are used in the modern practice of the educational environment of a higher education institution are described. Scientific and informational activity is considered a key area of information activity. The analysis of scientific and information activities in the field of education allows us to identify its main functions, which emphasize the growing role of scientific information in the education system, in particular, extra-curricular work using multimedia technologies. Operational, complete, accurate, targeted information that meets objective and subjective needs becomes an important link between the field of management, science and practice.

Conceptual Model for Women s Health (여성건강을 위한 개념적 모형)

  • 이경혜
    • Journal of Korean Academy of Nursing
    • /
    • v.27 no.4
    • /
    • pp.933-942
    • /
    • 1997
  • There has recently been an increased interest in women's health from, various disciplines, with different perspectives presented according to each profession's academic background. This has led to many instances of incorrectly defining, or misinterpretation, of the issues even among professionals. Nurse scholars as well as practitioners who work in women's health care need to have a clear conceptual understanding of women's health in order to build a body of knowledge, delineate curricular activities, and set directions for professional nursing interventions. In addition, a conceptual model that may be directly utilized in practice is needed to maintain and promote women's health issues. The purpose of this study was to apply a Hybrid model, analyzing conceptual definitions and discussions related to women's health gathered from review of the literature. Further to compare analyticals the concepts and properties observed from field work, so as to present a final definition of women's health and, build a conceptual framework for a united comprehensive perspective on the concept as well as on nursing practice. Data collection and analysis consisted of a theoretical stage, field work stage, and final analysis. A heterogeneous group of professionals and lay persons, 39 in all, participated in the field work. Study findings Include several subconcepts under the concept of women's health : a woman's whole life, holistic health, quality of life, awareness of being a woman, individual nursing, self care ability, reproductive health, and family health. Thus, a comprehensive definition was built, 1. e., "Women's health care be defined as improvement in the quality of life of women through attainment of holistic health throughout the life span. With reproductive health at the core, the concept is directly related to family and national health, and includes taking care of one's own health based on awareness of being a woman and utilizing self care activities. Women's health care issues are unique and allow various responses, therefore women's health professionals need to apply individual approaches to reach solutions in attaining holistic health and improving quality of life." The constructual factors of women's health were found to be reproductive functions, diseases more common in woman, self actualization, mental health, women's health policies, sexuality, midlife changes, and marital relations, with each factor having more than three properties. Positive factors affecting women's health were found to be a normal childbearing process, a healthy lifestyle, active health management, health information, support, and resources, and interpersonal relationships. Negative factors were found to be overwhelming role stress, cultural oppression, gender inequality, distorted sexual identity, economic difficulties, misuse and/or abuse of substances, and stress. The model of women's health may be visualized as a balance scale set upon a woman's life, supporting 4 concentric circles. The innermost circle and second circle incorporate conceptual definitions of women's health, and the outer two circles represent the constructional factors and properties of women's health. Each circle has its own color that symbolizes the conceptual meaning. Positive and negative factors are represented as weights at either end of the scale, and are affected by nursing intervention, i. e., health and wellness increase when positive factors are stronger, whereas disease and illness increase when negative factors are stronger. This model is only a preliminary effort and requires much discussion and testing to be further developed. Continuous research is also required.

  • PDF

A Comparative Study of The Health laws in North Korea and South Korea. (남북한 보건의료관계법규 비교분석;보건의료자원 중 시설과 인력을 중심으로)

  • Kim, Joo-Hee
    • Journal of Korean Academy of Nursing Administration
    • /
    • v.4 no.2
    • /
    • pp.321-349
    • /
    • 1998
  • Since 1990 the effort for unification has been active in each department of our society. But the study for health policy in Unified Korea has been scarce. Unified Korea should be a democracy and a constitutional state. So we should have lively discussion on the health law as well as unified general laws. The purpose of this study is to compare the health law of South Korea and North Korea and to understand the differences in them. We guess both Korea are considerably different each other. But this study found out that there are many health related laws that have same goals and contents. The reason for this is that both health laws have its root in Korea Law. And the right to health is the social basic right. whose characteristic can not be compatible with market economy and demands state intervention for securing the right to health. The health related laws are divided into 4 fileds. 1. There is a field A which is affected by unified political and economic system and differs little from the law system: the license system of medical personnel. 2. There is a field B which is seldom affected by unified political and economic system and differs little from the law system: the right and duty of medical personnel. quarantine law. 3. There is a field C which is affected by unified political and economic system and differs greatly from the law system: health institution law(exclusive of quarantine law), the laws of medical personnel category, of research center(especially per-mission, registration and establishment). of the role of basic health in private and public area. 4. There is a field D which is seldom affected by unified political and economic system and differs greatly from the law system: health equipment law(the laws of drugs, of cosmetics and of medical instrument. of blood management). the laws of health knowledge. of cooperation in chinese medicine and western medicine. the health promotion law. the rules of first-aid. the law of separation of dispensary from medical practice. The laws which are seldom affected by political and economic system can be consolidated. which in turn can be revised and enacted before unification of Korea through the interchange between North Korea and South Korea and the support to North Korea health system.

  • PDF

The Study of the Increase of Entrepreneurship and Entrepreneurial Competency Thru Win-Win Type Field Study: New Store Movement Case (상생형 현장실습교육을 통한 기업가정신과 창업가 역량 향상에 관한 연구: 새가게운동 사례)

  • Lee, You-Tay;Jung, Dae Sung;Oh, Youn Seok
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.11 no.1
    • /
    • pp.121-130
    • /
    • 2016
  • There is a growing interest in the technology transfer and commercialization both at home and abroad. Accordingly, this study looked at the concept of technology transfer and commercialization, identified the factors that should be taken into account in order to facilitate technology transfer and commercialization, and then performed a empirical analysis. As for the conventional technology transfer and commercialization, there was a tendency to limit its scope to the exploration, transfer and commercialization of technology itself. Here in this research, technology transfer and commercialization is defined the category to expand as various activities implemented in order to make sure that intellectual properties such as intangible technological developments, know-how, and knowledge are transferred between the relevant parties through a contract or negotiation, and the party to which the transfer is made can then further develop and exploit the technology into tangible products and other activities to obtain economic benefit out of that. In addition, the findings of the positive analysis of technology transfer and commercialization revealed that the focus of facilitating technology transfer has been on the technology itself, its management and securing efficiency of the systems and institutions involved in the technology transfer and commercialization. So there was lack of recognition as to the importance of financial support given to the phase of technology commercialization. This indicates that when it comes to the technology transfer and commercialization, quantitative performance has been the focus of interest such as patent application, registration, number of technology transfers, royalty, etc. So there was not enough understanding as to the issues of starting up a business, creating quality jobs through technology transfer and commercialization, which are directly related to the realization of the creative economy. In this regard, this research is expected to be used for the development for the future policies to boost technology transfer and commercialization as it suggests not only simply ensuring quantitative performance but also necessary to create the environment for the creation of the stable ecosystem for the parties involved in the technology transfer and commercialization and then to build circumstances in which creative economy can be realized.

  • PDF