• Title/Summary/Keyword: Trust Evaluation

Search Result 299, Processing Time 0.021 seconds

A Study on Influence of Knowledge Information Factors and Management Factors of the KMS on Business Performance - Moderating Effect of Evaluation and Compensation (지식관리시스템의 지식정보 요인 및 관리요인이 경영성과에 미치는 영향 - 평가와 보상의 조절효과)

  • Lee, Seung-Min;Yi, Seon-Gyu
    • Journal of Digital Convergence
    • /
    • v.16 no.6
    • /
    • pp.63-73
    • /
    • 2018
  • The purpose of this study is to investigate the influence of KMS(Knowledge Management System) on the performance of KMS by setting the factors affecting KMS 's management performance as knowledge information factor and management factor. And the moderating effect of evaluation and compensation on knowledge information factor, management factor and management performance. As a result of the analysis, it was analyzed that the knowledge information factor set by the knowledge adaptability, the reliability of knowledge information, and knowledge management process affects the definition of management performance. Among the management factors, organizationalization and cooperation factors influence definition Respectively. In the results of verifying whether assessment and compensation play a moderating role, it is found that knowledge compatibility of knowledge information factor, reliability of knowledge information, support of knowledge management process, knowledge sharing activity of management factor, cooperation has played a moderating role in business performance.

A study on content curriculum mapping of Korea in the OECD education 2030 project: Focused on mathematics (OECD Education 2030 교육과정 내용 맵핑 본검사 참여 연구 : 수학과를 중심으로)

  • Cho, Seongmin;Lee, Mee-Kyeong
    • The Mathematical Education
    • /
    • v.58 no.4
    • /
    • pp.507-518
    • /
    • 2019
  • The OECD launched the Education 2030 project to develop a learning framework and to conduct the international comparative study on curriculum. As a part of the OECD international curriculum analysis, Korea Institute for Curriculum and Evaluation(KICE) conducted a main study of Curriculum Content Mapping (hereafter, CCM) in the 7 learning areas/subject areas such as national languages, mathematics, humanities/social sciences, natural science, physical education/health, arts, and technologies. The CCM study aimed to identify how the competencies on CCM framework were reflected in the Korea curriculum. For this purpose, KICE identified the competencies on CCM framework, revised the coding framework, and undertook the mapping process. In this study, we gathered the CCM data as an evidence of how competencies on CCM framework were embedded in the 2015 revised mathematics curriculum. For this purpose, experts in mathematics education undertook the mapping process, we summarized the results of CCM main study in mathematics. As the results, numeracy, critical thinking, problem solving, anticipation, action, reflection were perfectly embedded in the 2015 revised mathematics curriculum. the competencies on CCM framework were embedded in the 2015 revised mathematics curriculum, and but literacy, physical/health literacy, trust, learning to learn, reconciling tension and dilemmas, literacy for sustainable development, financial literacy, and entrepreneurship/enterprising were not clearly related to mathematics curriculum. The mapping results should help the Korea Ministry of Education and KICE for preparing the future curriculum revision and development.

Analysis of Health Functional Foods Advertisements Effects according to the Delivery Tool for Efficacy Information and Consumers' Attitudes (기능성 정보 전달 방법 및 소비자 태도에 따른 건강기능식품 광고 효과 분석)

  • Lee, Yeonkyung;Kim, Ji Yeon;Kwon, Oran;Hwang, In-Kyeong
    • The Korean Journal of Food And Nutrition
    • /
    • v.29 no.6
    • /
    • pp.835-848
    • /
    • 2016
  • The purpose of this study was to find efficient and customized tools for delivering the benefit of health functional foods (HFFs). Delivery tools which could influence the impact of advertising were images, explanations of ingredients, diagrams of health benefit, patents, and comments from authority. Six advertisements were developed using these tools: "A": relevant image + explanation of ingredients + scientific diagram of efficacy; "B": relevant image + explanation of ingredients; "C": relevant image; "D": irrelevant image; "E": irrelevant image + explanation of ingredient + patent; "F": irrelevant image + explanation of ingredient + comments from authority. To analyze the consumer perceptions on HFFs and advertisement effects, 300 respondents were requested to answer a questionnaire comprising of the following questions: 5 questions of attitudes (necessity of HFFs, trust in HFFs, gathering information, watching advertisements and trust in advertisement claims) and 6 questions on the 6 developed advertisements (attention, understanding, sufficiency of information, sympathy, trust, and purchase). Scoring was done as per the 5 Likert scale. There was a higher proportion of females and the elderly, as compared to males and youngsters. The overall consumer attitudes were positive. Explanation of ingredients, scientific diagram of health benefit, patents and expert comments were helpful factors in increasing the advertisement evaluation by consumer, but the images were not. Advertisement evaluation of consumer did not differ with gender and age. However, differences were observed between some of the consumer attitudes (necessity of HFFs, trust in HFFs, gathering information and trust in advertisements claim) and advertisement evaluations (attention, understanding, sympathy and purchase). Our results indicate that for consumers utilizing the HFFs, advertisements with concrete tools such as diagrams, patent, and expert comments are more helpful. However, for consumers who do not have interest in HFFs, the scientific information was irrelevant. We believe that to maximize the effect of health information in advertisements, consumers should be segmented, and customized tools for each segment needs to be developed.

The Evaluation of the Various Update Conditions on the Performance of Gravity Gradient Referenced Navigation

  • Lee, Jisun;Kwon, Jay Hyoun
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.33 no.6
    • /
    • pp.569-577
    • /
    • 2015
  • The navigation algorithm developed based on the extended Kalman filter (EKF) sometimes diverges when the linearity between the measurements and the states is not preserved. In this study, new update conditions together with two conditions from previous study for gravity gradient referenced navigation (GGRN) were deduced for the filter performance. Also, the effect of each update conditions was evaluated imposing the various magnitudes of the database (DB) and the sensor errors. In case the DB and the sensor errors were supposed to 0.1 Eo and 0.01 Eo, the navigation performance was improved in the eight trajectories by using part of gravity gradient components that independently estimate states located within trust boundary. When applying only the components showing larger variation, around 200% of improvement was found. Even the DB and sensor error were supposed to 3 Eo, six update conditions improved performance in at least seven trajectories. More than five trajectories generated better results with 5 Eo error of the DB and the sensor. Especially, two update conditions successfully control divergence, and bounded the navigation error to the 1/10 level. However, these update conditions could not be generalized for all trajectories so that it is recommended to apply update conditions at the stage of planning, or as an index of precision of GGRN when combine with various types of geophysical data and algorithm.

A Study on Secure Routing Protocol using Multi-level Architecture in Mobile Ad Hoc Network (Multi-level 구조를 이용한 보안 라우팅 프로토콜에 관한 연구)

  • Yang, Hwan Seok
    • Convergence Security Journal
    • /
    • v.14 no.7
    • /
    • pp.17-22
    • /
    • 2014
  • Wireless Ad hoc Network is threatened from many types of attacks because of its open structure, dynamic topology and the absence of infrastructure. Attacks by malicious nodes inside the network destroy communication path and discard packet. The damage is quite large and detecting attacks are difficult. In this paper, we proposed attack detection technique using secure authentication infrastructure for efficient detection and prevention of internal attack nodes. Cluster structure is used in the proposed method so that each nodes act as a certificate authority and the public key is issued in cluster head through trust evaluation of nodes. Symmetric Key is shared for integrity of data between the nodes and the structure which adds authentication message to the RREQ packet is used. ns-2 simulator is used to evaluate performance of proposed method and excellent performance can be performed through the experiment.

A Case Study of English Teacher Development through Online Supervision

  • Chang, Kyungsuk;Jung, Kyutae
    • English Language & Literature Teaching
    • /
    • v.17 no.4
    • /
    • pp.1-22
    • /
    • 2011
  • Little has been known about the process of the language teacher professional development. The present study aims to investigate an assumption that anybody who has subject matter knowledge will be a good language teacher. A teacher with rich linguistic knowledge started to question the effectiveness of his online class. The teacher, in collaboration with a teacher trainer, became involved in the critical examination of his online class, seeking for more effective ways of teaching. The trainer provided the teacher with clinical supervision, which is characterized as developmental, collaborative, non-judgemental, interactive, and teacher-centered. The data collected at the multi-facets of the online teaching shows how the process of the teacher's decision-making became principled on the basis of recent developments in English language teaching, and how the teacher has gained pedagogical knowledge through reflection upon his teaching. The feedback from the students reveals that such teacher professional development is beneficial to student learning. These findings suggest that language teacher's professional development can take place when they are engaged in reflective teaching and classroom investigation. It is also suggested that the process of teacher development can be enhanced through collaborative supervision with trust, openness and congeniality between parties involved.

  • PDF

Development of the Certification System for Non-formal Environmental Education Educators (사회 환경교육 지도자의 자격 제도 개발)

  • Song Young-Eun
    • Hwankyungkyoyuk
    • /
    • v.19 no.2 s.30
    • /
    • pp.48-68
    • /
    • 2006
  • This study is designed to develop a certification system for non-formal environmental education educators as part of efforts to nurture non-formal environmental education educators, increase public trust in non-formal environmental education educators and secure structure and sustainability of non-formal environmental education. The job of non-formal environmental education educators-distant from technical expertise functions that are dealt with by existing certification system - belongs to education and service industry, And the certification system I try to develop is different from existing exclusive certification system based on written tests. It is rather an authentication system based on capability development. So its components are somewhat different from those of existing certification system. However, I also tried to ensure that the system should include components which were supposed to be part of basic certification system. The certification system for non-formal environmental education educators in the study is focused on developing a framework for basic certification system. Therefore, I believe that follow up studies may be needed to address execution, i.e., specific evaluation criteria to select organizations in charge of certification system and education course/program respectively, criteria to select instructors who will lead training course/program and decision on whether experiences as eco-guide or nature experience guide should be recognized as experiences for non-formal environmental education educator etc.

  • PDF

A Study on Consumer's Perception and Attitude to Care Labels of Textile Products (섬유제품의 취급방법과 관련된 레이블에 대한 연구 -소비자 인식 및 세탁 실태를 중심으로-)

  • 배순화;이미식
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.18 no.4
    • /
    • pp.480-489
    • /
    • 1994
  • The purpose of this study is to investigate consumer's perception and attitude on care labels using questionnaire. The major results are as follows: 1. Self-evaluation on consciousness and knowledge regarding on labels is higher than actual level. In other words, most consumers answered that they understood the care instructions on labels, but actually few consumers understand the exact meanings. Married women in their thirties to forties who do the laundry themselves, and more educated women showed higher level of consciousness to care labels. However, unmarried or career women are dissatisfied with the method of care instruction on labels. Many consumers take care of textile products without considering the proposed informations on core labels. The reasons are as follows: a. they think there is no problem even if they do not follow the proposed methods b. the method proposed on labels are complicated 4. There were some cases which happened some problems even though consumers followed the instructions on care labels. It may be due to the incorrect information or the omission of some specific instruction on labels. 5. For ideal care of clothing, it is necessary for manufacturers to suggest the realistic and clean instructions on labels and for consumers to trust and follow these instructions.

  • PDF

A Study on Secure Routing using Secure Zone and Nodes Authentication in Wireless Ad Hoc Network (Wireless Ad Hoc Network에서 보안 영역과 노드 인증을 이용한 보안 라우팅 기법에 관한 연구)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.161-169
    • /
    • 2014
  • Wireless Ad Hoc Network is suitable for emergency situations such as and emergency, disaster recovery and war. That is, it has a characteristic that can build a network and use without help of any infrastructure. However, this characteristic is providing a cause of many security threats. In particular, routing attack is not applied the existing routing methods as it is and it is difficult to determine accurately whether nodes that participate in routing is malicious or not. The appropriate measure for this is necessary. In this paper, we propose a secure routing technique through a zone architecture-based node authentication in order to provide efficient routing between nodes. ZH node is elected for trust evaluation of the member nodes within each zone. The elected ZH node issues a certification of the member nodes and stores the information in ZMTT. The routing involvement of malicious nodes is blocked by limiting the transfer of data in the nodes which are not issued the certification. The superior performance of the proposed technique is confirmed through experiments.

A Study on Routing Performance Improvement through Cooperation Authentication Technique (협력기반 인증 기법을 통한 라우팅 성능 개선에 관한 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.1
    • /
    • pp.71-79
    • /
    • 2016
  • The main security threats in MANET are integrity and non-repudiation. In the meantime, a lot of secure routing protocols have been designed in order to block these security threats. In this paper, partnership-based authentication technique is proposed in order to provide participation exclusion of network and non-repudiation for the nodes. The proposed technique is a technique that participates in data communication for only the nodes receiving the authentication through the authentication process for the nodes. For this, the proposed technique is largely consists of two steps. The first step is the process that issued the certificate after the reliability for the nodes participating in the network is evaluated. And in the second step, the key exchange agreement with the neighbor nodes is performed and data communication is made after setting security path with responding nodes. The level of security in data transmission is improved because the process of path setting is performed through cooperation with a neighboring nodes having high reliability during the course of these two steps. The superiority of proposed technique in this paper was confirmed through the comparative experiment.