• Title/Summary/Keyword: exchange of information

Search Result 3,563, Processing Time 0.032 seconds

Impact of Social Networking Service on the Team Cooperation, Quality of Decision Making and Job Performance (SNS의 사용이 팀의 협력과 의사결정의 질 및 업무성과에 미치는 영향)

  • Kim, Yoon-Mi;Chung, Dong-Seop
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.2
    • /
    • pp.180-190
    • /
    • 2014
  • Social network services are increasingly being used in organizational settings to improve relationships among employees and enhance prospects for information exchange and cooperative work. Social Networking Service(SNS) has deeply penetrated organizational job settings, influencing multiple aspects of employee's life. This study is designed to explore the impact of SNS engagement on the job performance mediated as team cooperation and decision making quality effects. Data were collected from 146 employees who use organizational SNS in there company. Factor analysis and structural equation method are employed. Results from a survey accompanied by the substantial impacts of organizational employee's social networking engagement on social learning processes and outcomes. SNS engagement not only directly influences organizational employee's job performance, but also helps their team cooperation and decision making quality from others and adapt to organizational culture, both of which play prominent roles in improving their job performance.

The Effect of the Supervisor's Transformational Leadership on Employees' Work Engagement : Focusing on the Mediating Effects of Psychological Contract Breach and Organizational Anomie (변혁적 리더십이 직무열의에 미치는 영향: 심리적 계약 위반과 조직아노미의 매개효과를 중심으로)

  • Bae, Chae-Yoon;Shin, Je-Goo
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.11
    • /
    • pp.281-307
    • /
    • 2016
  • The goal of this study was to verify that effectiveness of transformational leadership in impacting work engagement with the psychological contract breach among members of the organization and organizational anomie as mediating factors. The mediating effect of psychological contract breach and organizational anomie on the relationship between transformational leadership and work engagement was explored using a theoretical approach based on Social Exchange Theory, Social Information Processing Model and Job Demands- Resources Model. To avoid common method bias, the dependent variable was surveyed using employee peer review. 277 surveys were collected from 18 companies in diverse industries including manufacturing, distribution, and finance. The results of the analysis showed that transformational leadership has a significant positive effect on employees' work engagement, while having a significant negative effect on psychological contract breach and organizational anomie. In addition, psychological contract breach and organizational anomie were found to act as partial mediators in the relationship between transformational leadership and employees' work engagement. Overall, this study showed that if leaders at organizations can assist employees to overcome negative factors such as psychological contract breach and organizational anomie through transformational leadership, it is possible to improve employees' work engagement.

Message Interoperability in e-Logistics System (e-Logistics시스템의 메시지 상호운용성)

  • Seo Sungbo;Lee Young Joon;Hwang Jaegak;Ryu Keun Ho
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.5
    • /
    • pp.436-450
    • /
    • 2005
  • Existing B2B, B2C computer systems and applications that executed business trans-actions were the client- server based architecture which consists of heterogeneous hardware and software including personal computers and mainframes. Due to the active boom of electronic business, integration and compatibility of exchanged data, applications and hardwares have emerged as hot issue. This paper designs and implements a message transport system and a document transformation system in order to solve the interoperability problem of integrated logistics system in e-Business when doing electronic business. Message transport system integrated ebMS 2.0 which is standard business message exchange format of ebXML, the international standard electronic commerce framework, and JMS of J2EE enable to ensure reliable messaging. The document transformation system could convert non-standard XML documents into standard XML documents and provide the web services after integrating message system. Using suggested business scenario and various test data, our message oriented system preyed to be interoperable and stable. We participated ebXML messaging interoperability test organized by ebXML Asia Committee ITG in oder to evaluate and certify the suitability for message system.

Major Outcomes and Tasks for ICH Network Activities in Central Asia : Focusing on Case Studies and Experiences from the Recent Collaborative Work in the Region (중앙아시아 무형문화유산 네트워크 활동의 성과와 미래 - 최근 사례와 경험을 중심으로 -)

  • Park, Seong-Yong
    • Korean Journal of Heritage: History & Science
    • /
    • v.48 no.3
    • /
    • pp.204-219
    • /
    • 2015
  • International society, including the United Nations, has recently been making efforts to further promote a rapprochement of cultures in relation to alleviating military and political conflicts and other social clashes. In line with these efforts at the international level, there has been a growing interest on Central Asia and, in particular, on the Silk Road, which functioned as a trade route among ancient civilizations in the region and is also seen as a route that promoted cultural dialogue and exchanges. Given the amount of cross cultural dialogue and exchange, it is no surprise that intangible cultural heritage has historically been abundant and easily found in the region. However, this heritage was placed in considerable risk because heritage transmission critically weakened for seventy years under Soviet rule. Fortunately, since independence, there has been increasing interest in restoring community identity and reviving intangible heritage. Nevertheless, in spite of this interest, a lack of policies and cultural support in each country has made heritage safeguarding difficult. In this paper, I analyze the various phenomena that took place after the concept and international trends on ICH were introduced and speak about the experiences and outcomes obtained from collaborative network projects by ICHCAP and the Central Asian countries over the last six year. In addition, I would like take this opportunity to discuss how we can understand and develop collaboration in the intangible heritage field in Central Asia in a long-term perspective.

Development of an X3D Python Language Binding Viewer Providing a 3D Data Interface (3D 데이터 인터페이스를 제공하는 X3D Python 언어 바인딩 뷰어 개발)

  • Kim, Ha Seong;Lee, Myeong Won
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.6
    • /
    • pp.243-250
    • /
    • 2021
  • With the increased development of 3D VR applications augmented by recent VR/AR/MR technologies and by the advance of 3D devices, interchangeability and portability of 3D data have become essential. 3D files should be processed in a standard data format for common usage between applications. Providing standardized libraries and data structures along with the standard file format means that a more efficient system organization is possible and unnecessary processing due to the usage of different file formats and data structures depending on the applications can be omitted. In order to provide the function of using a common data file and data structure, this research is intended to provide a programming binding tool for generating and storing standardized data so that various services can be developed by accessing the common 3D files. To achieve this, this paper defines a common data structure including classes and functions to access X3D files with a standardized scheme using the Python programming language. It describes the implementation of a Python language binding viewer, which is an X3D VR viewer for rendering standard X3D data files based on the language binding interface. The VR viewer includes Python based 3D scene libraries and a data structure for creation, modification, exchange, and transfer of X3D objects. In addition, the viewer displays X3D objects and processes events using the libraries and data structure.

Design of Computer Science and Engineering Courses based on Flipped Learning through Integrating Lectures and Team Activities (강의와 팀 활동을 조합한 컴퓨터학 과목의 플립러닝 기반 설계)

  • Sihyung Lee
    • Journal of Internet Computing and Services
    • /
    • v.24 no.4
    • /
    • pp.117-125
    • /
    • 2023
  • Flipped learning is an instructional approach that reverses the traditional order of in-class and after-class activities. It entails students studying course materials before attending class, and then utilizing class time for completing homework tasks. Due to collaborative support available from teachers and peers, flipped learning has gained extensive adoption in computer science and engineering courses, enabling students to effectively engage in homework assignments. Nevertheless, students are responsible for studying class materials independently, which can limit their understanding of advanced topics. We propose an approach that combines both flipped learning and the traditional method, allowing them to mutually enhance each other. In the proposed approach, students acquire foundational concepts prior to attending class, and subsequently delve into advanced topics during classroom sessions through lectures and guidance provided by the teacher. Afterward, students collaborate with their peers to solve problems that involve the application of the concepts they have learned, and exchange a variety of solutions and perspectives. We implemented the proposed approach in four computer science and engineering classes, spanning one to four semesters and observed an enhancement in students' comprehension and satisfaction levels. We anticipate implementation of the proposed approach across various computer science and engineering courses, while enhancing their overall quality.

Building Transparency on the Total System Performance Assessment of Radioactive Repository through the Development of the FEAS Program (FEAS 프로그램 개발을 통한 방사성폐기물 처분장 종합 성능 평가(TSPA) 투명성 증진에 관한 연구)

  • 서은진;황용수;강철형
    • Tunnel and Underground Space
    • /
    • v.13 no.4
    • /
    • pp.270-278
    • /
    • 2003
  • Transparency on the Total System Performance Assessment (TSPA) is the key issue to enhance the public acceptance for a permanent high level radioactive repository. Traditionally, the study on features, events and processes (FEPs) and associated scenarios has been regarded as the starting point to open the communicative discussion on TSPA such as what to evaluate, how to evaluate and how to translate outcomes into more friendly language that many stakeholders can easily understand and react with. However, in most cases, it has been limited to one way communication, because it is difficult for stakeholders outside the performance assessment field to assess the details on the story of the safety assessment, scenario and technical background of it. Fortunately, the advent of the internet era opens up the possibility of two way communication from the beginning of the performance assessment so that every stakeholder can exchange their keen opinions on the safety issues. To achieve it, KAERI develops the systematic approach from the FEPs to Assessment methods flow chart. All information is integrated into the web based program named FEAS (FEp to Assessment through Scenario development) under development in KAERI. In parallel, two independent systems are also under development the web based QA(Quality Assurance) system and the PA(Performance Assessment) input database. It is ideal to integrate the input data base with the QA system so that every data in the system can checked whenever necessary. Throughout the next phase R&D starting from the year 2003, these three systems will be consolidated into one unified system.

A Study of the Actual Condition for Inducing Container Cargos to Gunsan Port (군산항 컨테이너화물 유치를 위한 실태조사연구)

  • Song, Yong-Zong;Park, Hyoung-Chang;Kim, Myoung-Ryong
    • Journal of Korea Port Economic Association
    • /
    • v.23 no.4
    • /
    • pp.71-90
    • /
    • 2007
  • To induce container cargos to Gunsan port, we should struggle on securing the quantity of goods transported from the competitive Jeonbuk and Chungcheong areas by reducing transportation expenses by land, and make an activating plan for the international exchange between Gunsan port and nearby ports in China. As a result, if the plan to induce container cargos to Gunsan port is activated, the regular liners will stop at Gusan port. So the new sea route will be opened so that consignors can ship cargos in the proper time. The consignors will use Gunsan port frequently because of the reduction of distribution expenses. To do so, for the first, many incentives should be implemented to attract container cargos. In addition, various facilities should be fully equipped and improved. This paper is to improve the problems for which consignors, the shipping lines and forwarders may feel uncomfortable when they use Gunsan port. According to the research on the actual condition, the biggest problem in Gunsan port is the depth of water. The management, relation system, infrastructure and information system of Gunsan port are also insufficient. Therefore, this paper will make an alternative plan to improve these problems and help the container cargos induce to Gunsan port.

  • PDF

Security Analysis and Implementation of Fast Inter-LMA domain Handover Scheme in Proxy Mobile IPv6 Networks (프록시 모바일 IPv6 네트워크에서 LMA도메인 간 핸드오버 기법의 보안성 분석 및 구현)

  • Chai, Hyun-Suk;Jeong, Jong-Pil
    • The KIPS Transactions:PartC
    • /
    • v.19C no.2
    • /
    • pp.99-118
    • /
    • 2012
  • In PMIPv6-based network, mobile nodes can be made smaller and lighter because the network nodes perform the mobility management-related functions on behalf of the mobile nodes. The one of the protocols, Fast Handovers for Proxy Mobile IPv6(FPMIPv6)[1] has studied by the Internet Engineering Task Force(IETF). Since FPMIPv6 adopts the entities and the concepts of Fast Handovers for Mobile IPv6(FMIPv6) in Proxy Mobile IPv6(PMIPv6), it reduces the packet loss. Conventional scheme has proposed that it cooperated with an Authentication, Authorization and Accounting(AAA) infrastructure for authentication of a mobile node in PMIPv6, Despite the best efficiency, without begin secured of signaling messages, PMIPv6 is vulnerable to various security threats such as the DoS or redirect attAcks and it can not support global mobility between PMIPv. In this paper, we analyze Kang-Park & ESS-FH scheme, and then propose an Enhanced Security scheme for FPMIPv6(ESS-FP). Based on the CGA method and the pubilc key Cryptography, ESS-FP provides the strong key exchange and the key independence in addition to improving the weaknesses for FPMIPv6. The proposed scheme is formally verified based on Ban-logic, and its handover latency is analyzed and compared with that of Kang-Park scheme[3] & ESS-FH and this paper propose inter-domain fast handover sheme for PMIPv6 using proxy-based FMIPv6(FPMIPv6).

LECSEN : Link Exchanged Chain in SEnsor Networks (링크 교환을 이용한 무선 센서 네트워크용 체인 토폴로지 : LECSEN)

  • Shin, Ji-Soo;Suh, Chang-Jin
    • The KIPS Transactions:PartC
    • /
    • v.15C no.4
    • /
    • pp.273-280
    • /
    • 2008
  • In WSN(Wireless Sensor Network) many routing algorithms such as LEACH, PEGASIS and PEDEP consisting of sensor nodes with limited energy have been proposed to extend WSN lifetime. Under the assumption of perfect fusion, these algorithms used convergecast that periodically collects sensed data from all sensor nodes to a base station. But because these schemes studied less energy consumption for a convergecast as well as fairly energy consumption altogether, the minimum energy consumption for a convergecast was not focused enough nor how topology influences to energy consumption. This paper deals with routing topology and energy consumption for a single convergecast in the following ways. We chose major WSN topology as MSC(Minimum Spanning Chain)s, MSTs, PEGASIS chains and proposed LECSEN chains. We solved the MSC length by Linear Programming(LP) and propose the LECSEN chain to compete with MST and MSC. As a result of simulation by Monte Carlo method for calculation of the topology length and standard deviation of link length, we learned that LECSEN is competitive with MST in terms of total energy consumption and shows the best with the view of even energy consumption at the sensor nodes. Thus, we concluded LECSEN is a very useful routing topology in WSN.