• Title/Summary/Keyword: resources-based theory

Search Result 575, Processing Time 0.027 seconds

Optimization of fractionation efficiency (FE) and throughput (TP) in a large scale splitter less full-feed depletion SPLITT fractionation (Large scale FFD-SF) (대용량 splitter less full-feed depletion SPLITT 분획법 (Large scale FFD-SF)에서의 분획효율(FE)및 시료처리량(TP)의 최적화)

  • Eum, Chul Hun;Noh, Ahrahm;Choi, Jaeyeong;Yoo, Yeongsuk;Kim, Woon Jung;Lee, Seungho
    • Analytical Science and Technology
    • /
    • v.28 no.6
    • /
    • pp.453-459
    • /
    • 2015
  • Split-flow thin cell fractionation (SPLITT fractionation, SF) is a particle separation technique that allows continuous (and thus a preparative scale) separation into two subpopulations based on the particle size or the density. In SF, there are two basic performance parameters. One is the throughput (TP), which was defined as the amount of sample that can be processed in a unit time period. Another is the fractionation efficiency (FE), which was defined as the number % of particles that have the size predicted by theory. Full-feed depletion mode (FFD-SF) have only one inlet for the sample feed, and the channel is equipped with a flow stream splitter only at the outlet in SF mode. In conventional FFD-mode, it was difficult to extend channel due to splitter in channel. So, we use large scale splitter-less FFD-SF to increase TP from increase channel scale. In this study, a FFD-SF channel was developed for a large-scale fractionation, which has no flow stream splitters (‘splitter less’), and then was tested for optimum TP and FE by varying the sample concentration and the flow rates at the inlet and outlet of the channel. Polyurethane (PU) latex beads having two different size distribution (about 3~7 µm, and about 2~30 µm) were used for the test. The sample concentration was varied from 0.2 to 0.8% (wt/vol). The channel flow rate was varied from 70, 100, 120 and 160 mL/min. The fractionated particles were monitored by optical microscopy (OM). The sample recovery was determined by collecting the particles on a 0.1 µm membrane filter. Accumulation of relatively large micron sized particles in channel could be prevented by feeding carrier liquid. It was found that, in order to achieve effective TP, the concentration of sample should be at higher than 0.4%.

A PLS Path Modeling Approach on the Cause-and-Effect Relationships among BSC Critical Success Factors for IT Organizations (PLS 경로모형을 이용한 IT 조직의 BSC 성공요인간의 인과관계 분석)

  • Lee, Jung-Hoon;Shin, Taek-Soo;Lim, Jong-Ho
    • Asia pacific journal of information systems
    • /
    • v.17 no.4
    • /
    • pp.207-228
    • /
    • 2007
  • Measuring Information Technology(IT) organizations' activities have been limited to mainly measure financial indicators for a long time. However, according to the multifarious functions of Information System, a number of researches have been done for the new trends on measurement methodologies that come with financial measurement as well as new measurement methods. Especially, the researches on IT Balanced Scorecard(BSC), concept from BSC measuring IT activities have been done as well in recent years. BSC provides more advantages than only integration of non-financial measures in a performance measurement system. The core of BSC rests on the cause-and-effect relationships between measures to allow prediction of value chain performance measures to allow prediction of value chain performance measures, communication, and realization of the corporate strategy and incentive controlled actions. More recently, BSC proponents have focused on the need to tie measures together into a causal chain of performance, and to test the validity of these hypothesized effects to guide the development of strategy. Kaplan and Norton[2001] argue that one of the primary benefits of the balanced scorecard is its use in gauging the success of strategy. Norreklit[2000] insist that the cause-and-effect chain is central to the balanced scorecard. The cause-and-effect chain is also central to the IT BSC. However, prior researches on relationship between information system and enterprise strategies as well as connection between various IT performance measurement indicators are not so much studied. Ittner et al.[2003] report that 77% of all surveyed companies with an implemented BSC place no or only little interest on soundly modeled cause-and-effect relationships despite of the importance of cause-and-effect chains as an integral part of BSC. This shortcoming can be explained with one theoretical and one practical reason[Blumenberg and Hinz, 2006]. From a theoretical point of view, causalities within the BSC method and their application are only vaguely described by Kaplan and Norton. From a practical consideration, modeling corporate causalities is a complex task due to tedious data acquisition and following reliability maintenance. However, cause-and effect relationships are an essential part of BSCs because they differentiate performance measurement systems like BSCs from simple key performance indicator(KPI) lists. KPI lists present an ad-hoc collection of measures to managers but do not allow for a comprehensive view on corporate performance. Instead, performance measurement system like BSCs tries to model the relationships of the underlying value chain in cause-and-effect relationships. Therefore, to overcome the deficiencies of causal modeling in IT BSC, sound and robust causal modeling approaches are required in theory as well as in practice for offering a solution. The propose of this study is to suggest critical success factors(CSFs) and KPIs for measuring performance for IT organizations and empirically validate the casual relationships between those CSFs. For this purpose, we define four perspectives of BSC for IT organizations according to Van Grembergen's study[2000] as follows. The Future Orientation perspective represents the human and technology resources needed by IT to deliver its services. The Operational Excellence perspective represents the IT processes employed to develop and deliver the applications. The User Orientation perspective represents the user evaluation of IT. The Business Contribution perspective captures the business value of the IT investments. Each of these perspectives has to be translated into corresponding metrics and measures that assess the current situations. This study suggests 12 CSFs for IT BSC based on the previous IT BSC's studies and COBIT 4.1. These CSFs consist of 51 KPIs. We defines the cause-and-effect relationships among BSC CSFs for IT Organizations as follows. The Future Orientation perspective will have positive effects on the Operational Excellence perspective. Then the Operational Excellence perspective will have positive effects on the User Orientation perspective. Finally, the User Orientation perspective will have positive effects on the Business Contribution perspective. This research tests the validity of these hypothesized casual effects and the sub-hypothesized causal relationships. For the purpose, we used the Partial Least Squares approach to Structural Equation Modeling(or PLS Path Modeling) for analyzing multiple IT BSC CSFs. The PLS path modeling has special abilities that make it more appropriate than other techniques, such as multiple regression and LISREL, when analyzing small sample sizes. Recently the use of PLS path modeling has been gaining interests and use among IS researchers in recent years because of its ability to model latent constructs under conditions of nonormality and with small to medium sample sizes(Chin et al., 2003). The empirical results of our study using PLS path modeling show that the casual effects in IT BSC significantly exist partially in our hypotheses.

A Study on Establishment for Archival Management and Training of Archivists (기록관리학의 정립과 기록전문가 양성교육에 관한 연구)

  • Choe, Jung-Tai;Yoon, Song-Won
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.1 no.1
    • /
    • pp.95-129
    • /
    • 2001
  • The treatise is a follow-up thesis of "The Archival Management : destination of its education" published by The Research Institute for Korean Archives and Records in June 17, 2000, and it was written to secure its original temper of the "Archival Management" which has established at first as the domestic collegiate educational course. Presently, we are mixed up for interpretation of terminology by facing unfamiliar words: such as, Archives, Documents, Manuscripts, Records / Archival Management, Archival Preservation / Archivist, Archival Conservator, Manuscripts Curator and Record Manager. Also, tile treatise has confirmed scholars' various opinion about its education and curriculum not only domestic but overseas scholars, and examined realities and course of studies of 4 overseas countries, and also have purpose to pursue domestic universities' actual condition of curriculum and its reform measure. And since dispositon of Archivist and the professional organization of the Archivist was based on the Laws, therefore, establishment of an educational institution for Archival Management from now on will be expanded more and need to be accelerated. Accordingly, the universities that already established or to be established from now on, shall be needed educational quality and its contents to be ascended. Its concrete plan is as follows : (1) Now, disarranged archive and record words, and to make publish 'Glossary of Archives & Records' as soon as possible. (2) Remind the substance of the Record and Archival Management and its sphere again and need to be considered alteration of the studies' name. (3) There needs to establish the role and establishment of conception of Archivists. (4) Refer to the theory and practical educational method of overseas professional Archivist Scholars, but to be needed to develop the curriculum which is accorded with am tradition and way of thinking. (5) Confer for development of teaching materials and educational method jointly through 'Academic Society', and there needs reorganize the subject which is fit for each university's characteristics. (6) Recently, "Cultural Resources Studies" for research specialization which has established in Graduate School of Tokyo University was very useful to us. We also need to be considered such establishment of process.

Blended IT/STEM Education for Students in Developing Countries: Experiences in Tanzania (개발도상국 학생들을 위한 블랜디드 IT/STEM교육: 탄자니아에서의 경험 및 시사점)

  • Yoon Rhee, Ji-Young;Ayo, Heriel;Rhee, Herb S.
    • Journal of Appropriate Technology
    • /
    • v.6 no.2
    • /
    • pp.151-162
    • /
    • 2020
  • Education is one of the priority sectors specified in Tanzania, and it has committed to provide 11 years of compulsory free basic education for all from pre-primary to lower secondary level. Despite the Government's efforts to provide free basic education to all children, there are 2.0 million (23.2 per cent) out of 8.5 million children at the primary school age of 7-13, who are out of school in Tanzania. The ICT class should be offered as a regular class in all secondary schools in Tanzania, recommended by the ministry of education. However, many schools are struggling to implement this mandate. Most of schools offer the ICT class with theory without any real hardware. Some schools were given with computers but they were not maintained for operation. There is a huge task to make ICT education universal. Main issues include: remoteness (off-grid area), lack of ICT teachers, lack of resources such as hardware, infrastructure, and lack of practical lessons or projects to be used at schools. An innovative blended ICT/STEM education program is being conducted not only for Tanzanian public and private/international schools, but also for out-of-school adolescents through institutions, NGO centers, home visits and at the E3 Empower academy center. For effective STEM education to take place and remain sustainable, more practical curriculum, and close-up teacher support need to be accompanied concurrently. Practical, project-based simple coding lessons have been developed and employed that students experience true learning. The effectiveness of the curriculum has been demonstrated in various project centers, and it showed that students are showing new interests in exploring new discovery, even though this was a totally new area for them. It has been designed for an easy replication, thus students who learned can repeat the lessons themselves to other students. The ultimate purpose of this project is to have IT education offered as universally as possible throughout the whole Tanzania. Quality education for all children is a key for better future for all. Previously it was hoped that education with discipline will improve the active learning. But now more than ever, we believe that children have the ability to learn on their own with given proper STEM education tools, guidelines and environment. This gives promising hope to all of us, including those in the developing countries.

The Framework of Research Network and Performance Evaluation on Personal Information Security: Social Network Analysis Perspective (개인정보보호 분야의 연구자 네트워크와 성과 평가 프레임워크: 소셜 네트워크 분석을 중심으로)

  • Kim, Minsu;Choi, Jaewon;Kim, Hyun Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.1
    • /
    • pp.177-193
    • /
    • 2014
  • Over the past decade, there has been a rapid diffusion of electronic commerce and a rising number of interconnected networks, resulting in an escalation of security threats and privacy concerns. Electronic commerce has a built-in trade-off between the necessity of providing at least some personal information to consummate an online transaction, and the risk of negative consequences from providing such information. More recently, the frequent disclosure of private information has raised concerns about privacy and its impacts. This has motivated researchers in various fields to explore information privacy issues to address these concerns. Accordingly, the necessity for information privacy policies and technologies for collecting and storing data, and information privacy research in various fields such as medicine, computer science, business, and statistics has increased. The occurrence of various information security accidents have made finding experts in the information security field an important issue. Objective measures for finding such experts are required, as it is currently rather subjective. Based on social network analysis, this paper focused on a framework to evaluate the process of finding experts in the information security field. We collected data from the National Discovery for Science Leaders (NDSL) database, initially collecting about 2000 papers covering the period between 2005 and 2013. Outliers and the data of irrelevant papers were dropped, leaving 784 papers to test the suggested hypotheses. The co-authorship network data for co-author relationship, publisher, affiliation, and so on were analyzed using social network measures including centrality and structural hole. The results of our model estimation are as follows. With the exception of Hypothesis 3, which deals with the relationship between eigenvector centrality and performance, all of our hypotheses were supported. In line with our hypothesis, degree centrality (H1) was supported with its positive influence on the researchers' publishing performance (p<0.001). This finding indicates that as the degree of cooperation increased, the more the publishing performance of researchers increased. In addition, closeness centrality (H2) was also positively associated with researchers' publishing performance (p<0.001), suggesting that, as the efficiency of information acquisition increased, the more the researchers' publishing performance increased. This paper identified the difference in publishing performance among researchers. The analysis can be used to identify core experts and evaluate their performance in the information privacy research field. The co-authorship network for information privacy can aid in understanding the deep relationships among researchers. In addition, extracting characteristics of publishers and affiliations, this paper suggested an understanding of the social network measures and their potential for finding experts in the information privacy field. Social concerns about securing the objectivity of experts have increased, because experts in the information privacy field frequently participate in political consultation, and business education support and evaluation. In terms of practical implications, this research suggests an objective framework for experts in the information privacy field, and is useful for people who are in charge of managing research human resources. This study has some limitations, providing opportunities and suggestions for future research. Presenting the difference in information diffusion according to media and proximity presents difficulties for the generalization of the theory due to the small sample size. Therefore, further studies could consider an increased sample size and media diversity, the difference in information diffusion according to the media type, and information proximity could be explored in more detail. Moreover, previous network research has commonly observed a causal relationship between the independent and dependent variable (Kadushin, 2012). In this study, degree centrality as an independent variable might have causal relationship with performance as a dependent variable. However, in the case of network analysis research, network indices could be computed after the network relationship is created. An annual analysis could help mitigate this limitation.