• Title/Summary/Keyword: communicating with society

Search Result 510, Processing Time 0.028 seconds

An Exploratory Research for the Conceptualization Failure knowledge (실패지식의 개념화를 위한 탐색적 연구)

  • Shim, Hyungseok
    • Knowledge Management Research
    • /
    • v.12 no.4
    • /
    • pp.121-132
    • /
    • 2011
  • Failure, the research object, means situations when goals and their results are different, which has developed presenting various aspects from ancient times and modern times. Failure is a complex concept which essentially requires judgement, and also a relative concept which can be changed depending on how you set up time base and standard. There are four stages for failure study to have been developed from studying failure through historical facts to the approach of organizational theory and it has been studied by looking at the failure of an organization according to different categories such as a developmental stage, a type of business, a period and a course. Compared with success science, failure study has not been studied sufficiently and also the level of its analysis is low. Thus, since lessons of failure tend to repeat themselves instead of being didactically accumulated, there need more studies on this. This thesis identified the main cause of the failure through various studies regarding failure which have been conducted at home and abroad. What the main cause of the failure that more than three studies mentioned have in common was that it occurred because organizations concentrated on the inside without communicating with external environment. The key point of failure study is to analyze failure, utilize it as assets, and create a frame of failure management. This thesis focused on delivering fragmentary knowledge on failure study, but case studies regarding this subject should be done in the future.

  • PDF

A Provable One-way Authentication Key Agreement Scheme with User Anonymity for Multi-server Environment

  • Zhu, Hongfeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.2
    • /
    • pp.811-829
    • /
    • 2015
  • One-way authenticated key agreement protocols, aiming at solving the problems to establish secure communications over public insecure networks, can achieve one-way authentication of communicating entities for giving a specific user strong anonymity and confidentiality of transmitted data. Public Key Infrastructure can design one-way authenticated key agreement protocols, but it will consume a large amount of computation. Because one-way authenticated key agreement protocols mainly concern on authentication and key agreement, we adopt multi-server architecture to realize these goals. About multi-server architecture, which allow the user to register at the registration center (RC) once and can access all the permitted services provided by the eligible servers. The combination of above-mentioned ideas can lead to a high-practical scheme in the universal client/server architecture. Based on these motivations, the paper firstly proposed a new one-way authenticated key agreement scheme based on multi-server architecture. Compared with the related literatures recently, our proposed scheme can not only own high efficiency and unique functionality, but is also robust to various attacks and achieves perfect forward secrecy. Finally, we give the security proof and the efficiency analysis of our proposed scheme.

Institutional Applications of Eclipse Scripting Programming Interface to Clinical Workflows in Radiation Oncology

  • Kim, Hojin;Kwak, Jungwon;Jeong, Chiyoung;Cho, Byungchul
    • Progress in Medical Physics
    • /
    • v.28 no.3
    • /
    • pp.122-128
    • /
    • 2017
  • Eclipse Scripting Application Programming Interface (ESAPI) was devised to enhance the efficiency in such treatment related workflows as contouring, treatment planning, plan quality measure, and data-mining by communicating with the treatment planning system (TPS). It is provided in the form of C# programming based toolbox, which could be modified to fit into the clinical applications. The Scripting program, however, does not offer all potential functionalities that the users intend to develop. The shortcomings can be overcome by combining the Scripting programming with user-executable program on Windows or Linux. The executed program has greater freedom in implementation, which could strengthen the ability and availability of the Scripting on the clinical applications. This work shows the use of the Scripting programming throughout the simple modification of the given toolbox. Besides, it presents the implementation of combining both Scripting and user-executed programming based on MATLAB, applied to automated dynamic MLC wedge and FIF treatment planning procedure for promoting the planning efficiency.

정보 시스템 최종 사용자의 피드백 탐색 행위와 합목적적 정보 시스템 활용;중소기업을 대상으로 한 실증적 연구

  • Sin, Yeong-Mi;Lee, Ju-Ryang;Lee, Ho-Geun
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.527-535
    • /
    • 2007
  • The number of SMEs taking up information systems such as Enterprise Resource Planning has been growing rapidly, and many of those organizations have stepped into the stage of ongoing use at this point. Thus, research which takes into account idiosyncratic nature of SME environment is more important than before. Through an empirical study using survey method, we tried to examine the importance of end user's feedback seeking behavior in SMEs and how environmental factors affecting such behavior reinforce and interact with the feedback seeking behavior itself. The result shows that end user's active role as a voluntary feedback seeker is important in utilizing information systems in accordance with the initial design intention in ongoing use environment. Furthermore, in order to facilitate such feedback seeking behavior in SME environment, it is essential that management's involvement and communicating to its employees the importance of effectively utilizing the information systems as well as the support of peer IT champ.

  • PDF

Analysis of Personal Information Protection System in Korea - Focus on Certification & Evauation System and Personal Identification Number - (우리나라의 개인정보 보호제도 분석 - 인증 및 평가제도와 개인식별번호를 중심으로 -)

  • Kim, Min-Chen
    • Informatization Policy
    • /
    • v.23 no.4
    • /
    • pp.38-58
    • /
    • 2016
  • The ever-evolving Internet environment along with changes in the mass media has been creating a new way of communicating in the virtual cyber world. The Internet users have more services at their disposal to communicate with ease. Such a new way of communication styles, however, makes them vulnerable to personal information leakage, increasing the concerns of cyber security. A thorny issue is how we can control the disclosure of personal information. Lately, the Korean government implemented privacy policies to resolve and prevent personal information leakage incidents that incur social problems. Here, we seek to identify problems in the privacy policies for better solutions.

Risk and culture: variations in dioxin risk perceptions, behavioral preferences among social groups in South Korea

  • Park, Seohyun;Kim, Jong Guk
    • Environmental Analysis Health and Toxicology
    • /
    • v.29
    • /
    • pp.13.1-13.11
    • /
    • 2014
  • Objectives This study examined variations in the perceptions of dioxin risk among social groups defined by geographical living location, environmental education, and occupation. Dioxin risk perceptions were analyzed according to values, risk awareness, knowledge, and behavioral preferences. Methods A quasi-experimental survey was designed and conducted on individuals from seven experimental groups in Jeonju city, South Korea, including: people living near incineration facilities; people living far from incineration facilities; governmental experts; non-governmental organization members; office workers in developmental institutes or banks; students who were enrolled in environmental-related classes; and students who were enrolled in business-related classes. Results The results show variations among groups in values, awareness and behavioral preferences. Particular attention should be given to the result that groups with higher connectedness-to-nature values show higher willingness-to-act (WTA) for risk reduction. Result s can be summarized as follows. First, awareness is associated with one's geographical setting. Second, values and WTA behaviors are related to one's environmental-related education and occupation. Third, values are significantly related to WTA behaviors. Conclusions Different cultures, in terms of values or worldview, among groups influence their perceptions of dioxin risk and choices of risk reduction behaviors. It is important to consider values in communicating complicated long-term risk management involving public participation. Further research should be continuously conducted on the effects of multiple dimensions of values on one's WTA for risk reduction behaviors.

Advances in Cyber-Physical Systems Research

  • Wan, Jiafu;Yan, Hehua;Suo, Hui;Li, Fang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.11
    • /
    • pp.1891-1908
    • /
    • 2011
  • Cyber-physical systems (CPSs) are an emerging discipline that involves engineered computing and communicating systems interfacing the physical world. The widespread applications of CPSs still face enormous challenges because of the lack of theoretical foundations. In this technical survey, we review state-of-the-art design techniques from various angles. The aim of this work is to provide a better understanding of this emerging multidisciplinary methodology. The features of CPSs are described, and the research progress is analyzed using the following aspects: energy management, network security, data transmission and management, model-based design, control technique, and system resource allocation. We focus on CPS resource optimization, and propose a system performance optimization model with resource constraints. In addition, some classic applications (e.g., integrating intelligent road with unmanned vehicle) are provided to show that the prospects of CPSs are promising. Furthermore, research challenges and suggestions for future work are outlined in brief.

HC-06 Bluetooth based driver module for emergency LED Multi-Directional Indicator

  • Jung, Joonseok;Kwon, Jongman;Mfitumukiza, Joseph;Jung, Soonho;Lee, Minwoo;Cha, Jaesang
    • Journal of Satellite, Information and Communications
    • /
    • v.12 no.1
    • /
    • pp.114-119
    • /
    • 2017
  • In this paper we present the search on HC-06 Bluetooth based driver module for emergency LED Multi-Directional Indicator. Nowadays, a growing trends in which electronic displays such as LED, LCD or plasma monitors are being installed in public places like bars, stores, entertainment areas, restaurants, lobbies, etc. In this paper, the study is curried out on efficiency of HC-06 Bluetooth module based controller driver that relates generally to the field of emergency signage management systems for displaying various indicator contents remotely on electronic displays in public and privates venues. It allows user smart devices interaction remotely with digital signage by providing content for displaying on at least one display in a venue. Depending on the emergency case, HC-06 Bluetooth based driver module proves the high efficiency as well as good performance of processing and communicating remotely the indicator based message that is displayed from a venue management control system by using smart devices. The system combines smart device that linked to HC-06 Bluetooth module with ATmega168/328 embedded micro controller which result by switching the displayer containing the digital signage indicator based message.

Twitter Crawling System

  • Ganiev, Saydiolim;Nasridinov, Aziz;Byun, Jeong-Yong
    • Journal of Multimedia Information System
    • /
    • v.2 no.3
    • /
    • pp.287-294
    • /
    • 2015
  • We are living in epoch of information when Internet touches all aspects of our lives. Therefore, it provides a plenty of services each of which benefits people in different ways. Electronic Mail (E-mail), File Transfer Protocol (FTP), Voice/Video Communication, Search Engines are bright examples of Internet services. Between them Social Network Services (SNS) continuously gain its popularity over the past years. Most popular SNSs like Facebook, Weibo and Twitter generate millions of data every minute. Twitter is one of SNS which allows its users post short instant messages. They, 100 million, posted 340 million tweets per day (2012)[1]. Often big amount of data contains lots of noisy data which can be defined as uninteresting and unclassifiable data. However, researchers can take advantage of such huge information in order to analyze and extract meaningful and interesting features. The way to collect SNS data as well as tweets is handled by crawlers. Twitter crawler has recently emerged as a great tool to crawl Twitter data as well as tweets. In this project, we develop Twitter Crawler system which enables us to extract Twitter data. We implemented our system in Java language along with MySQL. We use Twitter4J which is a java library for communicating with Twitter API. The application, first, connects to Twitter API, then retrieves tweets, and stores them into database. We also develop crawling strategies to efficiently extract tweets in terms of time and amount.

A Study on Protecting Patients' Privacy of Obstetric and Gynecologic Nurses (산부인과 간호사의 환자 프라이버시 보호행동에 관한 연구)

  • Kim, Miok
    • Women's Health Nursing
    • /
    • v.18 no.4
    • /
    • pp.268-278
    • /
    • 2012
  • Purpose: This study aims to determine obstetric and gynecologic (OBGY) nurses' perception and performance propecting patients' privacy, and to contribute to develop educational program and improve the quality of nursing care. Methods: 206 OBGY nurses in 6 hospitals using an electronic medical record or an order communicating system were chosen by convenience sampling and agreed to participate in the study. The questionnaire, explored 4 domains of privacy: direct nursing, linked business, patient information management, communication with relatives. Results: Perception and performance of protecting patient privacy averaged 4.29 (of 5) and 3.55 (of 5), respectively. Most nurses (94.2%) recognized the importance of protecting patient privacy, 80.1% received patient privacy education. There was a distinct difference between the perception and performance of protecting patient privacy of nurses. Performance of protecting patient privacy had a positive correlation with perception. Conclusion: Proper performance of protecting privacy protection requires improving perception of each nurse on the patient privacy, and various efforts should be made to minimize the affect from external factors such as hospital environment. It is needed to educate nurses for patient privacy. It is also needed for medical organizations to improve their policies and facilities to ease the performance for privacy protection.