• Title/Summary/Keyword: cooperation evaluation system

Search Result 612, Processing Time 0.03 seconds

Current Wheat Quality Criteria and Inspection Systems of Major Wheat Producing Countries (밀 품질평가 현황과 검사제도)

  • 이춘기;남중현;강문석;구본철;김재철;박광근;박문웅;김용호
    • KOREAN JOURNAL OF CROP SCIENCE
    • /
    • v.47
    • /
    • pp.63-94
    • /
    • 2002
  • On the purpose to suggest an advanced scheme in assessing the domestic wheat quality, this paper reviewed the inspection systems of wheat in major wheat producing countries as well as the quality criteria which are being used in wheat grading and classification. Most wheat producing countries are adopting both classifications of class and grade to provide an objective evaluation and an official certification to their wheat. There are two main purposes in the wheat classification. The first objectives of classification is to match the wheat with market requirements to maximize market opportunities and returns to growers. The second is to ensure that payments to glowers aye made on the basis of the quality and condition of the grain delivered. Wheat classes has been assigned based on the combination of cultivation area, seed-coat color, kernel and varietal characteristics that are distinctive. Most reputable wheat marketers also employ a similar approach, whereby varieties of a particular type are grouped together, designed by seed coat colour, grain hardness, physical dough properties, and sometimes more precise specification such as starch quality, all of which are genetically inherited characteristics. This classification in simplistic terms is the categorization of a wheat variety into a commercial type or style of wheat that is recognizable for its end use capabilities. All varieties registered in a class are required to have a similar end-use performance that the shipment be consistent in processing quality, cargo to cargo and year to year, Grain inspectors have historically determined wheat classes according to visual kernel characteristics associated with traditional wheat varieties. As well, any new wheat variety must not conflict with the visual distinguishability rule that is used to separate wheats of different classes. Some varieties may possess characteristics of two or more classes. Therefore, knowledge of distinct varietal characteristics is necessary in making class determinations. The grading system sets maximum tolerance levels for a range of characteristics that ensure functionality and freedom from deleterious factors. Tests for the grading of wheat include such factors as plumpness, soundness, cleanliness, purity of type and general condition. Plumpness is measured by test weight. Soundness is indicated by the absence or presence of musty, sour or commercially objectionable foreign odors and by the percentage of damaged kernels that ave present in the wheat. Cleanliness is measured by determining the presence of foreign material after dockage has been removed. Purity of class is measured by classification of wheats in the test sample and by limitation for admixtures of different classes of wheat. Moisture does not influence the numerical grade. However, it is determined on all shipments and reported on the official certificate. U.S. wheat is divided into eight classes based on color, kernel Hardness and varietal characteristics. The classes are Durum, Hard Red Spring, Hard Red Winter, Soft Red Winter, Hard White, soft White, Unclassed and Mixed. Among them, Hard Red Spring wheat, Durum wheat, and Soft White wheat are further divided into three subclasses, respectively. Each class or subclass is divided into five U.S. numerical grades and U.S. Sample grade. Special grades are provided to emphasize special qualities or conditions affecting the value of wheat and are added to and made a part of the grade designation. Canadian wheat is also divided into fourteen classes based on cultivation area, color, kernel hardness and varietal characteristics. The classes have 2-5 numerical grades, a feed grade and sample grades depending on class and grading tolerance. The Canadian grading system is based mainly on visual evaluation, and it works based on the kernel visual distinguishability concept. The Australian wheat is classified based on geographical and quality differentiation. The wheat grown in Australia is predominantly white grained. There are commonly up to 20 different segregations of wheat in a given season. Each variety grown is assigned a category and a growing areas. The state governments in Australia, in cooperation with the Australian Wheat Board(AWB), issue receival standards and dockage schedules annually that list grade specifications and tolerances for Australian wheat. AWB is managing "Golden Rewards" which is designed to provide pricing accuracy and market signals for Australia's grain growers. Continuous payment scales for protein content from 6 to 16% and screenings levels from 0 to 10% based on varietal classification are presented by the Golden Rewards, and the active payment scales and prices can change with market movements.movements.

Analysis of the Perceptions of Teachers about Effective Application of National Competency Standards Based Vocational Education Curriculum in Technical Specialized High Schools and Meister High Schools (공업계 특성화고·마이스터고에서의 NCS 기반 직업교육과정의 효과적인 적용에 대한 전문교과 교원의 인식 및 요구 분석 연구)

  • Lee, Byung-Wook;Ahn, Jae-Yeong;Kang, Chol-Min
    • 대한공업교육학회지
    • /
    • v.40 no.2
    • /
    • pp.111-129
    • /
    • 2015
  • This study tried to investigate the possibility and expectation effect to organize and operate NCS(national competency standards)-based vocational education curriculum in technical specialized high schools and meister high schools and the perceptions of specialty subject teachers about support plans for effective operation of the NCS-based curriculum. For this, the survey was conducted targeting 286 specialty subject teachers in technical specialized high schools and meister high schools. And the results are as follow: First, the specialty subject teachers in the technical specialized high schools and meister high schools recognized that the positive expectation effect can be obtained through the NCS-based vocational education curriculum and the NCS-based vocational education curriculum should very much be applied to the school curriculum but it is impractical to organize and operate the NCS-based vocational education curriculum as the school curriculum from 2016. Second, the specialty subject teachers in the technical specialized high schools and meister high schools recognized that industrial education needs can be analyzed, industry duties-based educational objectives and contents can be set up, industrial duties-based education can be done, the capability to develop and operate teachers' curriculum can be improved, and the NCS-based curriculum will be effective for industrial and academic cooperation and connection with communities by applying it but the realistic possibility will relatively be low. Third, the specialty subject teachers in the technical specialized high schools and meister high schools recognized that tools for practice should be reorganized and expanded, the number of students targeting practical classes should be reduced by 15 to 20 persons, teachers' field education capability should be strengthened, supply and demand of teachers should be supported, industrial and academic cooperation-based field-centered education should be reinforced, and support of the NCS-based teaching materials to be textbooks should be required in terms of operating schools to operate the NCS-based vocational curriculum effectively. Support of finding jobs and field education which correspond with the NCS-based vocational curriculum should be provided, field instruction by ability of the national competency standards should be supported, field practice education projects about the NCS-based vocational curriculum should be provided and introduction and operation of the industrial employee performance evaluation system should be required in terms of the support plans of relevant organizations.

NFC-based Smartwork Service Model Design (NFC 기반의 스마트워크 서비스 모델 설계)

  • Park, Arum;Kang, Min Su;Jun, Jungho;Lee, Kyoung Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.2
    • /
    • pp.157-175
    • /
    • 2013
  • Since Korean government announced 'Smartwork promotion strategy' in 2010, Korean firms and government organizations have started to adopt smartwork. However, the smartwork has been implemented only in a few of large enterprises and government organizations rather than SMEs (small and medium enterprises). In USA, both Yahoo! and Best Buy have stopped their flexible work because of its reported low productivity and job loafing problems. In addition, according to the literature on smartwork, we could draw obstacles of smartwork adoption and categorize them into the three types: institutional, organizational, and technological. The first category of smartwork adoption obstacles, institutional, include the difficulties of smartwork performance evaluation metrics, the lack of readiness of organizational processes, limitation of smartwork types and models, lack of employee participation in smartwork adoption procedure, high cost of building smartwork system, and insufficiency of government support. The second category, organizational, includes limitation of the organization hierarchy, wrong perception of employees and employers, a difficulty in close collaboration, low productivity with remote coworkers, insufficient understanding on remote working, and lack of training about smartwork. The third category, technological, obstacles include security concern of mobile work, lack of specialized solution, and lack of adoption and operation know-how. To overcome the current problems of smartwork in reality and the reported obstacles in literature, we suggest a novel smartwork service model based on NFC(Near Field Communication). This paper suggests NFC-based Smartwork Service Model composed of NFC-based Smartworker networking service and NFC-based Smartwork space management service. NFC-based smartworker networking service is comprised of NFC-based communication/SNS service and NFC-based recruiting/job seeking service. NFC-based communication/SNS Service Model supplements the key shortcomings that existing smartwork service model has. By connecting to existing legacy system of a company through NFC tags and systems, the low productivity and the difficulty of collaboration and attendance management can be overcome since managers can get work processing information, work time information and work space information of employees and employees can do real-time communication with coworkers and get location information of coworkers. Shortly, this service model has features such as affordable system cost, provision of location-based information, and possibility of knowledge accumulation. NFC-based recruiting/job-seeking service provides new value by linking NFC tag service and sharing economy sites. This service model has features such as easiness of service attachment and removal, efficient space-based work provision, easy search of location-based recruiting/job-seeking information, and system flexibility. This service model combines advantages of sharing economy sites with the advantages of NFC. By cooperation with sharing economy sites, the model can provide recruiters with human resource who finds not only long-term works but also short-term works. Additionally, SMEs (Small Medium-sized Enterprises) can easily find job seeker by attaching NFC tags to any spaces at which human resource with qualification may be located. In short, this service model helps efficient human resource distribution by providing location of job hunters and job applicants. NFC-based smartwork space management service can promote smartwork by linking NFC tags attached to the work space and existing smartwork system. This service has features such as low cost, provision of indoor and outdoor location information, and customized service. In particular, this model can help small company adopt smartwork system because it is light-weight system and cost-effective compared to existing smartwork system. This paper proposes the scenarios of the service models, the roles and incentives of the participants, and the comparative analysis. The superiority of NFC-based smartwork service model is shown by comparing and analyzing the new service models and the existing service models. The service model can expand scope of enterprises and organizations that adopt smartwork and expand the scope of employees that take advantages of smartwork.

Earthquake Monitoring : Future Strategy (지진관측 : 미래 발전 전략)

  • Chi, Heon-Cheol;Park, Jung-Ho;Kim, Geun-Young;Shin, Jin-Soo;Shin, In-Cheul;Lim, In-Seub;Jeong, Byung-Sun;Sheen, Dong-Hoon
    • Geophysics and Geophysical Exploration
    • /
    • v.13 no.3
    • /
    • pp.268-276
    • /
    • 2010
  • Earthquake Hazard Mitigation Law was activated into force on March 2009. By the law, the obligation to monitor the effect of earthquake on the facilities was extended to many organizations such as gas company and local governments. Based on the estimation of National Emergency Management Agency (NEMA), the number of free-surface acceleration stations would be expanded to more than 400. The advent of internet protocol and the more simplified operation have allowed the quick and easy installation of seismic stations. In addition, the dynamic range of seismic instruments has been continuously improved enough to evaluate damage intensity and to alert alarm directly for earthquake hazard mitigation. For direct visualization of damage intensity and area, Real Time Intensity COlor Mapping (RTICOM) is explained in detail. RTICOM would be used to retrieve the essential information for damage evaluation, Peak Ground Acceleration (PGA). Destructive earthquake damage is usually due to surface waves which just follow S wave. The peak amplitude of surface wave would be pre-estimated from the amplitude and frequency content of first arrival P wave. Earthquake Early Warning (EEW) system is conventionally defined to estimate local magnitude from P wave. The status of EEW is reviewed and the application of EEW to Odesan earthquake is exampled with ShakeMap in order to make clear its appearance. In the sense of rapidity, the earthquake announcement of Korea Meteorological Agency (KMA) might be dramatically improved by the adaption of EEW. In order to realize hazard mitigation, EEW should be applied to the local crucial facilities such as nuclear power plants and fragile semi-conduct plant. The distributed EEW is introduced with the application example of Uljin earthquake. Not only Nation-wide but also locally distributed EEW applications, all relevant information is needed to be shared in real time. The plan of extension of Korea Integrated Seismic System (KISS) is briefly explained in order to future cooperation of data sharing and utilization.

Hardware Approach to Fuzzy Inference―ASIC and RISC―

  • Watanabe, Hiroyuki
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1993.06a
    • /
    • pp.975-976
    • /
    • 1993
  • This talk presents the overview of the author's research and development activities on fuzzy inference hardware. We involved it with two distinct approaches. The first approach is to use application specific integrated circuits (ASIC) technology. The fuzzy inference method is directly implemented in silicon. The second approach, which is in its preliminary stage, is to use more conventional microprocessor architecture. Here, we use a quantitative technique used by designer of reduced instruction set computer (RISC) to modify an architecture of a microprocessor. In the ASIC approach, we implemented the most widely used fuzzy inference mechanism directly on silicon. The mechanism is beaded on a max-min compositional rule of inference, and Mandami's method of fuzzy implication. The two VLSI fuzzy inference chips are designed, fabricated, and fully tested. Both used a full-custom CMOS technology. The second and more claborate chip was designed at the University of North Carolina(U C) in cooperation with MCNC. Both VLSI chips had muliple datapaths for rule digital fuzzy inference chips had multiple datapaths for rule evaluation, and they executed multiple fuzzy if-then rules in parallel. The AT & T chip is the first digital fuzzy inference chip in the world. It ran with a 20 MHz clock cycle and achieved an approximately 80.000 Fuzzy Logical inferences Per Second (FLIPS). It stored and executed 16 fuzzy if-then rules. Since it was designed as a proof of concept prototype chip, it had minimal amount of peripheral logic for system integration. UNC/MCNC chip consists of 688,131 transistors of which 476,160 are used for RAM memory. It ran with a 10 MHz clock cycle. The chip has a 3-staged pipeline and initiates a computation of new inference every 64 cycle. This chip achieved an approximately 160,000 FLIPS. The new architecture have the following important improvements from the AT & T chip: Programmable rule set memory (RAM). On-chip fuzzification operation by a table lookup method. On-chip defuzzification operation by a centroid method. Reconfigurable architecture for processing two rule formats. RAM/datapath redundancy for higher yield It can store and execute 51 if-then rule of the following format: IF A and B and C and D Then Do E, and Then Do F. With this format, the chip takes four inputs and produces two outputs. By software reconfiguration, it can store and execute 102 if-then rules of the following simpler format using the same datapath: IF A and B Then Do E. With this format the chip takes two inputs and produces one outputs. We have built two VME-bus board systems based on this chip for Oak Ridge National Laboratory (ORNL). The board is now installed in a robot at ORNL. Researchers uses this board for experiment in autonomous robot navigation. The Fuzzy Logic system board places the Fuzzy chip into a VMEbus environment. High level C language functions hide the operational details of the board from the applications programme . The programmer treats rule memories and fuzzification function memories as local structures passed as parameters to the C functions. ASIC fuzzy inference hardware is extremely fast, but they are limited in generality. Many aspects of the design are limited or fixed. We have proposed to designing a are limited or fixed. We have proposed to designing a fuzzy information processor as an application specific processor using a quantitative approach. The quantitative approach was developed by RISC designers. In effect, we are interested in evaluating the effectiveness of a specialized RISC processor for fuzzy information processing. As the first step, we measured the possible speed-up of a fuzzy inference program based on if-then rules by an introduction of specialized instructions, i.e., min and max instructions. The minimum and maximum operations are heavily used in fuzzy logic applications as fuzzy intersection and union. We performed measurements using a MIPS R3000 as a base micropro essor. The initial result is encouraging. We can achieve as high as a 2.5 increase in inference speed if the R3000 had min and max instructions. Also, they are useful for speeding up other fuzzy operations such as bounded product and bounded sum. The embedded processor's main task is to control some device or process. It usually runs a single or a embedded processer to create an embedded processor for fuzzy control is very effective. Table I shows the measured speed of the inference by a MIPS R3000 microprocessor, a fictitious MIPS R3000 microprocessor with min and max instructions, and a UNC/MCNC ASIC fuzzy inference chip. The software that used on microprocessors is a simulator of the ASIC chip. The first row is the computation time in seconds of 6000 inferences using 51 rules where each fuzzy set is represented by an array of 64 elements. The second row is the time required to perform a single inference. The last row is the fuzzy logical inferences per second (FLIPS) measured for ach device. There is a large gap in run time between the ASIC and software approaches even if we resort to a specialized fuzzy microprocessor. As for design time and cost, these two approaches represent two extremes. An ASIC approach is extremely expensive. It is, therefore, an important research topic to design a specialized computing architecture for fuzzy applications that falls between these two extremes both in run time and design time/cost. TABLEI INFERENCE TIME BY 51 RULES {{{{Time }}{{MIPS R3000 }}{{ASIC }}{{Regular }}{{With min/mix }}{{6000 inference 1 inference FLIPS }}{{125s 20.8ms 48 }}{{49s 8.2ms 122 }}{{0.0038s 6.4㎲ 156,250 }} }}

  • PDF

The Development of Education Model for CA-RP(Cognitive Apprenticeship-Based Research Paper) to Improve the Research Capabilities for Majors Students of Radiological Technology (방사선 전공학생의 연구역량 증진을 위한 인지적 도제기반 논문작성 교육 모형 개발)

  • Park, Hoon-Hee;Chung, Hyun-Suk;Lee, Yun-Hee;Kim, Hyun-Soo;Kang, Byung-Sam;Son, Jin-Hyun;Min, Jung-Hwan;Lyu, Kwang-Yeul
    • Journal of radiological science and technology
    • /
    • v.36 no.2
    • /
    • pp.99-110
    • /
    • 2013
  • In the medical field, the necessity of education growth for the professional Radiation Technologists has been emphasized to become experts on radiation and the radiation field is important of the society. Also, in hospitals and companies, important on thesis is getting higher in order to active and cope with rapidly changing internal and external environment and a more in-depth expert training, the necessity of new teaching and learning model that can cope with changes in a more proactive has become. Thesis writing classes brought limits to the in-depth learning as to start a semester and rely on only specific programs besides, inevitable on passive participation. In addition, it does not have a variety opportunity to present, an actual opportunity that can be written and discussed does not provide much caused by instructor-led classes. As well as, it has had a direct impact on the quality of the thesis, furthermore, having the opportunity to participate in various conferences showed the limitations. In order to solve these problems, in this study, writing thesis has organized training operations as a consistent gradual deepening of learning, at the same time, the operational idea was proposed based on the connectivity integrated operating and effective training program & instructional tool for improving the ability to perform the written actual thesis. The development of teaching and learning model consisted of 4 system modeling, scaffolding, articulation, exploration. Depending on the nature of the course, consisting team following the personal interest and the topic allow for connection subject, based on this, promote research capacity through a step-by-step evaluation and feedback and, fundamentally strengthen problem-solving skills through the journal studies, help not only solving the real-time problem by taking wiki-space but also efficient use of time, increase the quality of the thesis by activating cooperation through mentoring, as a result, it was to promote a positive partnership with the academic. Support system in three stages planning subject, progress & writing, writing thesis & presentation and based on cognitive apprenticeship. The ongoing Coaching and Reflection of professor and expert was applied in order to maintain these activities smoothly. The results of this study will introduce actively, voluntarily and substantially join to learners, by doing so, culture the enhancement of creativity, originality and the ability to co-work and by enhance the expertise of based-knowledge, it is considered to be help to improve the comprehensive ability.

The Framework of Research Network and Performance Evaluation on Personal Information Security: Social Network Analysis Perspective (개인정보보호 분야의 연구자 네트워크와 성과 평가 프레임워크: 소셜 네트워크 분석을 중심으로)

  • Kim, Minsu;Choi, Jaewon;Kim, Hyun Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.1
    • /
    • pp.177-193
    • /
    • 2014
  • Over the past decade, there has been a rapid diffusion of electronic commerce and a rising number of interconnected networks, resulting in an escalation of security threats and privacy concerns. Electronic commerce has a built-in trade-off between the necessity of providing at least some personal information to consummate an online transaction, and the risk of negative consequences from providing such information. More recently, the frequent disclosure of private information has raised concerns about privacy and its impacts. This has motivated researchers in various fields to explore information privacy issues to address these concerns. Accordingly, the necessity for information privacy policies and technologies for collecting and storing data, and information privacy research in various fields such as medicine, computer science, business, and statistics has increased. The occurrence of various information security accidents have made finding experts in the information security field an important issue. Objective measures for finding such experts are required, as it is currently rather subjective. Based on social network analysis, this paper focused on a framework to evaluate the process of finding experts in the information security field. We collected data from the National Discovery for Science Leaders (NDSL) database, initially collecting about 2000 papers covering the period between 2005 and 2013. Outliers and the data of irrelevant papers were dropped, leaving 784 papers to test the suggested hypotheses. The co-authorship network data for co-author relationship, publisher, affiliation, and so on were analyzed using social network measures including centrality and structural hole. The results of our model estimation are as follows. With the exception of Hypothesis 3, which deals with the relationship between eigenvector centrality and performance, all of our hypotheses were supported. In line with our hypothesis, degree centrality (H1) was supported with its positive influence on the researchers' publishing performance (p<0.001). This finding indicates that as the degree of cooperation increased, the more the publishing performance of researchers increased. In addition, closeness centrality (H2) was also positively associated with researchers' publishing performance (p<0.001), suggesting that, as the efficiency of information acquisition increased, the more the researchers' publishing performance increased. This paper identified the difference in publishing performance among researchers. The analysis can be used to identify core experts and evaluate their performance in the information privacy research field. The co-authorship network for information privacy can aid in understanding the deep relationships among researchers. In addition, extracting characteristics of publishers and affiliations, this paper suggested an understanding of the social network measures and their potential for finding experts in the information privacy field. Social concerns about securing the objectivity of experts have increased, because experts in the information privacy field frequently participate in political consultation, and business education support and evaluation. In terms of practical implications, this research suggests an objective framework for experts in the information privacy field, and is useful for people who are in charge of managing research human resources. This study has some limitations, providing opportunities and suggestions for future research. Presenting the difference in information diffusion according to media and proximity presents difficulties for the generalization of the theory due to the small sample size. Therefore, further studies could consider an increased sample size and media diversity, the difference in information diffusion according to the media type, and information proximity could be explored in more detail. Moreover, previous network research has commonly observed a causal relationship between the independent and dependent variable (Kadushin, 2012). In this study, degree centrality as an independent variable might have causal relationship with performance as a dependent variable. However, in the case of network analysis research, network indices could be computed after the network relationship is created. An annual analysis could help mitigate this limitation.

Domestic and International Experts' Perception of Policy and Direction on STEAM Education (융합인재교육(STEAM)의 정책과 실행 방향에 대한 국내외 전문가들의 인식)

  • Jung, Jaehwa;Jeon, Jaedon;Lee, Hyonyong
    • Journal of Science Education
    • /
    • v.39 no.3
    • /
    • pp.358-375
    • /
    • 2015
  • The purposes of this study were to investigate the value, necessity and legitimacy of STEAM Education and to propose practical approaching methods for STEAM Education to be applicable in Korea through a variety of literature review, case studies and collecting suggestions from domestic and international educational experts. The research questions are as follows: (1) To investigate the perception, understanding and recognitions of domestic and foreign professionals in STEAM education. (2) To analyze policy implications for an improvement in STEAM. The following aspects of STEAM were found to be challenges in our current STEAM policy after analyzing multiple questionnaires with the professionals and case studies including their experiences, understanding, supports and directions of the policy from the governments. The results indicate that (1) there was a lack of precise and conceptual understanding of STEAM in respect to experience. Training sessions for teachers in this field to help transform their perception is necessary. Development of practical programs with an easy access is also required. It is important to get the aims of related educational activities recognized by the professionals and established standards for an evaluation. The experts perceived that a theme-based learning is the most preferred and effective approaching method and the programs that develop creative thinking and learning applicable to practice are required to promote. (2) The results indicate that there was a lack of programs and inducements for supporting outstanding STEAM educators. It is shown that making an appropriate environment for STEAM education takes the first priority before training numbers of teachers unilaterally, thus securing enough budget seems critical. The professionals also emphasize on developing specialized teaching materials that include diverse inter-related subjects such as science technology, engineering, arts and humanities and social science with diverse viewpoints and advanced technology. This work requires a STEAM network for teachers to link up and share their materials, documents and experiences. It is necessary to get corporations, universities, and research centers participated in the network. (3) With respect to direction, it is necessary to propose policy that makes STEAM education ordinary and more practical in the present education system. The professionals have recommended training sessions that help develop creative thinking and amalgamative problem-solving techniques. They require reducing the workload of teachers and changing teachers' perspectives towards STEAM. They further urge a tight cooperation between departments of the government related with STEAM.

  • PDF

A Study on the Real Condition and the Improvement Directions for the Protection of Industrial Technology (산업기술 보호 관리실태 및 발전방안에 관한 연구)

  • Chung, Tae-Hwang;Chang, Hang-Bae
    • Korean Security Journal
    • /
    • no.24
    • /
    • pp.147-170
    • /
    • 2010
  • This study is to present a improvement directions for the protection of industrial key technology. For the purpose of the study, the survey was carried out on the administrative security activity of 68 enterprises including Large companies, small-midium companies and public corporations. survey result on the 10 items of security policy, 10 items of personal management and 7 items of the assets management are as follows; First, stable foundation for the efficient implement of security policy is needed. Carrying a security policy into practice and continuous upgrade should be fulfilled with drawing-up of the policy. Also for the vitalization of security activity, arrangement of security organization and security manager are needed with mutual assistance in the company. Periodic security inspection should be practiced for the improvement of security level and security understanding. Second, the increase of investment for security job is needed for security invigoration. Securing cooperation channel with professional security facility such as National Intelligence Service, Korea internet & security agency, Information security consulting company, security research institute is needed, also security outsourcing could be considered as the method of above investment. Especially small-midium company is very vulnerable compared with Large company and public corporation in security management, so increase of government's budget for security support system is necessary. Third, human resource management is important, because the main cause of leak of confidential information is person. Regular education rate for new employee and staff members is relatively high, but the vitalization of security oath for staff members and the third party who access to key technology is necessary. Also access right to key information should be changed whenever access right changes. Reinforcement of management of resigned person such as security oath, the elimination of access right to key information and the deletion of account. is needed. Forth, the control and management of important asset including patent and design should be tightened. Classification of importance of asset and periodic inspection are necessary with the effects evaluation of leak of asset.

  • PDF

A Study on Constituents of the New Apprenticeship Concept for the Promotion of Industrial Growth Potential (산업 성장잠재력 제고를 위한 신도제제도의 개념 요소에 대한 연구)

  • Yin, Zi Long;Rho, Tae Chun;Choi, Won Sik
    • 대한공업교육학회지
    • /
    • v.38 no.1
    • /
    • pp.1-27
    • /
    • 2013
  • The purpose of this study was to find out the areas and their constitute elements of new apprenticeship through the expert of vocational education to improve the growth potential in the field of industry. Through the three times Delphi research process final composing areas and elements(total 6 areas and 41 sub-elements) of new apprenticeship were extracted. Followings are specific study results of 41 sub-elements for the 6 areas. In area A(Technology Skill aspect) total nine sub-elements were deducted as follows. Technology skill's field appling ability, new technology skill's acquisition, quality assurance ability, research development ability, material management using ability, problem solving ability, core technology skill understanding ability, idea's imagery expressing ability, creative design ability. In area B(Institutional aspect) total five sub-elements were deducted as follows. Flexible human material support, precise division of works, objective result assessment, institutionalization of responsibilities and liabilities between teacher and student, institutionalization of duty invention reward. In area C(Affective aspect) total eight sub-elements were deducted as follows. Manners and cooperation between teacher & student and peer, values for job, basic attitude for technology, job ethic sense, respect of other organization, active action to organization change, attitude of technology successor, service mind. In area D(Self-improvement aspect) total nine sub-elements were deducted as follows. Self evaluation and reflection, cultivate of organization understanding, career planning and developing ability, sound philosophy of life, communication ability, decision making ability, prepare of individual competence enhance system, self-control ability improvement, reaction of unexpected situation. In area E(Knowledge aspect) total four sub-elements were deducted as follows. Basic knowledge of relevant area, knowledge of new technology & preceding technology, fusion and relocation of knowledge, practical knowledge. In area F(Environmental aspect) total six sub-elements were deducted as follows. Awareness of business environment, understanding of education and practice environment, understanding of apprenticeship's business demand, connectivity of region community, adapt ability of labor market's change, awareness of society environment change.