• Title/Summary/Keyword: 관리프로세스

Search Result 2,759, Processing Time 0.027 seconds

A Study on the Effect of Business Consulting Performance on Organizational Performance - Focusing on Moderating Effect by Organizational Support - (조직성과에 영향을 미치는 컨설팅성과에 관한 연구 - 조직지원의 조절효과 중심으로 -)

  • Kim, Moon-Jun;Chang, Sug-In
    • Management & Information Systems Review
    • /
    • v.35 no.2
    • /
    • pp.185-203
    • /
    • 2016
  • This study set up a study model through a previous study and aims to determine the control effect by organizational support in the effect relationship between consulting performance which is an independent variable and organizational performance which is a dependent variable. To do that, the hypothesis was verified by using statistical programs such as SPSS 20.0 and AMOS 20.0 which can be statistically useful with 511 copies except for the copies which cannot be utilized, over 4 weeks from February $25^{th}$ to March $24^{th}$, 2015, focusing companies located in Seoul, Gyeonggi, Incheon. The hypothesis testing result of the study model set by this study shows that firstly, this study has contributed to establishing an additional theory in the research between consulting performance and organizational performance while it has not been enough for consulting performance and organizational performance in previous studies. Second, although the moderating variable of organizational support in the effect relationship between consulting performance and organizational performance didn't show a partial positive (+) role in the hypothesis testing, more detailed analysis in the survey process and the variety on questionnaire configuration were provided in the variable selection. Third, as consulting performance shows a positive effect on organizational performance, a higher consulting performance gives a direct impact on organizational performance so that a realistic action plan on internalizing and enhancing consulting execution result into organizational performance is aggressively required.

  • PDF

A Case Study of Children's Emotional Care Program in Combining Analysis between Children's drawings and Parenting Stress based on Web System (웹 시스템에 기반한 아동 그림과 양육스트레스 분석을 통한 정서 관리 프로그램 적용 사례 연구)

  • Lee, Seong-Oak;Kim, Byung-Chul
    • Journal of Digital Convergence
    • /
    • v.18 no.4
    • /
    • pp.201-209
    • /
    • 2020
  • In this paper, we perform a case study of children's emotional care program that analyzes the emotional status through the drawings of children based on web system. In order to overcome spatial and temporal environment constraints, we have developed based on web system that performs to support the whole process from the request of analysis of children 's drawings to the feedback of the final result step by step. The online platform is designed to conduct observations for the purpose of primary screening using a smartphone, and then proceed to the offline secondary care linkage process based on the results. Then according to the results of the analysis, children and parents who need deep examination are figured out and professional institutions are linked to them for help. Parental stress had been analyzed to improve the accuracy of the test and to figure out the cause of the problem. The study was conducted on 2,532 children and their parents between the ages of 3 and 5 years attending a day care center. As a result, 564 children and 223 parents were figured out to be in need of secondary institutional care, and 311 parents were educated and counseled from the professional institutions.

Hash-chain-based IoT authentication scheme suitable for small and medium enterprises (중소기업 환경에 적합한 해쉬 체인 기반의 IoT 인증 기법)

  • Jeong, Yoon-Su;Yon, Yong-Ho;Ku, Jin-Hee
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.4
    • /
    • pp.105-111
    • /
    • 2017
  • With the emergence of the fourth industrial revolution, more and more attempts have been made to apply IoT technology to the manufacturing process and launch the product. In this paper, we propose IoT authentication scheme based on hash chain which can easily apply IoT device to small and medium enterprises in Korea. In the proposed method, the companies that installed IoT devices suitable for the manufacturing environment are selected to maintain the linkage between IoT devices so that product information and release information can be efficiently collected and managed during the entire manufacturing process. In addition, the proposed scheme is characterized in that it does not require an additional encryption / decryption algorithm because the authentication information of the IoT device is constructed based on a hash chain. As a result of the performance evaluation, the efficiency of the manufacturing process was improved by 18.5% and the processing of the manufacturing process with the IoT device was shortened by 20.1% on the average according to the application of the IoT device. In addition, the labor cost reduction costs in the manufacturing process decreased by an average of 30.7%.

A Study on the New Manager Model in Service Economy Era (서비스경제시대의 신경영자 모델 연구)

  • Kim, Hyunsoo
    • Journal of Service Research and Studies
    • /
    • v.10 no.3
    • /
    • pp.1-22
    • /
    • 2020
  • This study was conducted to derive the new manager model in service economy era. It was logically explained that the modern economic society is different from the existing economic society, the modern organization that is the subject of management is different from the existing organization, and the tasks required by management are different from the existing tasks. It suggested the managerial model required for new managers. According to the proposed manager's model, the tasks required of new managers and essential qualities as managers to perform the tasks were presented. It suggested the role model that managers with required qualities should play. The role of a manager who becomes one with customers, the role of a manager who controls even his irrationality, the role of a manager who combines discernment and indiscriminateness, a flexible leadership role that combines charisma and tenderness, an administrator role that embraces regulations and non-regulations, and vision and non-vision. We derived the role of a manager who manages management, and a manager role model that utilizes both competition and non-competition. The managers engage in two opposing roles and perform management activities in a spiral dialectical cycle that develops while resolving the contradictions of each role. The method of embracing the two opposing parties internally and externally and the dialectical management execution process according to the change of the space-time axis were presented by borrowing the models of The Book of Change. Future research needs an empirical analytical study on this new Model. There is a need for studies that expand this study and develop it into a practical model and verify it in an analytical way.

A Successful Implementation Strategy Of ERP System For University Information System (대학 정보화를 위한 ERP 시스템 구축전략)

  • 김현준;정정회;김영렬;이상식
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2003.11a
    • /
    • pp.577-588
    • /
    • 2003
  • 정보기술의 급진적인 발달로 경쟁이 점점 심화되어져 가고 있는 환경 속에서 경쟁적 우위를 갖기 위한 기업들의 끊임없는 노력은 계속 되고 있다 이러한 시점에 ERP(Enterprise Resource Planning: 전사적 자원관리) 시스템은 기업의 경쟁력을 재고하고 변화하는 비즈니스 환경을 예측하여 신속하고 현명하게 대처하기 위한 수단으로서의 역할을 수행하고 있으며 최근 기업뿐만 아니라 대학에서도 이에 대한 관심이 확산되고 있다. 이미 국외의 많은 대학들이 ERP 시스템을 도입한 실정이고, 국내에서는 정보화 사업의 일환으로 연세대학교가 일반 행정 업무의 효율화를 위해 SAP R/3를 도입했고 향후 학사 행정 시스템과의 통합을 모색 중이다. 정부에서도 국·공립 대학들의 행정업무효율성 제고를 위해 차세대 행정업무시스템으로 ERP 시스템 도입을 본격화하고 있다. 따라서 본 논문에서는 정보화를 추진하고자 하는 국내 대학에 ERP 시스템의 도입을 제안하였고, 기존에 선행 연구된 연구자료를 비교·분석하여 기업의 ERP 시스템 구축 성공요인을 정리하였다. 국내 대학은 ERP 시스템 도입 시 제시된 주요성공요인 등을 고려하고 지속적인 관심으로 프로젝트를 수행함으로써 보다 효과적으로 구축을 완료해야 할 것이며, 아직 국내의 사례가 충분하지 않기 때문에 본 논문에서 제시한 국내외의 사례를 살펴봄으로써 대학의 ERP 시스템 도입에 관해 빠른 이해를 할 수 있을 것이다. 끝으로 본 논문은 초기단계에 있는 국내 대학의 ERP 시스템 도입에 대학이 나가야 할 방향을 제시하였고, 앞으로 국내 대학의 ERP 시스템 도입이 증가할수록 이에 대한 연구도 계속 되어야 할 것이다.보다 더 높게 나타난 반면에, 실무계 전문가 집단은 비용이 정보시스템 보다 더 높게 나타났다는 것이다.리적 특성이론과 사용자 수용이론으로 구분하여 이 특성에 따라서 향후 개발될 3D 핸드폰 아바타의 수용도의 관계를 파악하고자 한다. 본 연구에 대한 자료 수집방법은 D대학교의 교양과목인 “사이버문화의 이해와 활용”을 수강하는 학생들을 대상으로 총 170부를 설문 조사하였으며, 수집된 설문지 중에서 불성실하게 응답한 설문지 6부를 제외한 총 164부를 유효한 설문으로 확보하였다. SPSSWIN 10.0 패키지를 이용하였으며, Cronbach's Alpha값을 통한 신뢰도 분석과 요인분석을 통한 타당성 분석을 하고, 연구변수로 선정한 각 요소들의 아바타 수용도에 미치는 영향력 정도를 파악하기 위해 회귀분석을 실시하였다. 그 결과 심리적 특성과 사용자 수용 특성은 아바타 수용도에 부분적으로 영향을 미친다는 것 결과가 나타났다.웨어 프로세스 평가와 개선 모델의 개발을 위한 기초적인 자료를 제공할 것으로 예상된다 또한, 본 연구 결과는, 우리나라 소프트웨어 조직들이 실제로 무엇을 필요로 하는지를 밝힘으로써, 우리나라의 소프트웨어 산업을 육성하기 위한 실효성 있는 정책 입안을 위한 기초 자료를 제공할 것으로 예상된다.다.를 검증하려고 한다. 협력체계 확립, ${\circled}3$ 전문인력 확보 및 인력구성 조정, 그리고 ${\circled}4$ 방문보건사업의 강화 등이다., 대사(代謝)와 관계(關係)있음을 시사(示唆)해 주고 있다.ble nutrient (TDN) was highest in booting stage (59.7%);

  • PDF

A Study of Quality Metrics Process Design Methodology for Field Application Encryption under Network Security Environment (네트워크 보안 환경에서의 현장적용 중심 암호품질 만족도 평가 메트릭스 설계 프로세스)

  • Noh, SiChoon;Kim, Jeom goo
    • Convergence Security Journal
    • /
    • v.15 no.5
    • /
    • pp.29-35
    • /
    • 2015
  • The network security encryption type is divided into two, one is point-to-point, second method is link type. The level of security quality attributes are a system security quality requirements in a networked environment. Quality attributes can be observed and should be able to be measured. If the quality requirements can be presented as exact figures, quality requirements are defined specifically setting quality objectives. Functional requirements in the quality attribute is a requirement for a service function which can be obtained through the encryption. Non-functional requirements are requirements of the service quality that can be obtained through the encryption. Encryption quality evaluation system proposed in this study is to derive functional requirements and non-functional requirements 2 groups. Of the calculating measure of the evaluation index in the same category, the associated indication of the quality measure of each surface should be created. The quality matrix uses 2-factor analysis of the evaluation for the associated surface quality measurements. The quality requirements are calculated based on two different functional requirements and non-functional requirements. The results are calculated by analyzing the trend of the average value assessment. When used this way, it is possible to configure the network security encryption based on quality management.

Optimal Release Problems based on a Stochastic Differential Equation Model Under the Distributed Software Development Environments (분산 소프트웨어 개발환경에 대한 확률 미분 방정식 모델을 이용한 최적 배포 문제)

  • Lee Jae-Ki;Nam Sang-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.7A
    • /
    • pp.649-658
    • /
    • 2006
  • Recently, Software Development was applied to new-approach methods as a various form : client-server system and web-programing, object-orient concept, distributed development with a network environments. On the other hand, it be concerned about the distributed development technology and increasing of object-oriented methodology. These technology is spread out the software quality and improve of software production, reduction of the software develop working. Futures, we considered about the distributed software development technique with a many workstation. In this paper, we discussed optimal release problem based on a stochastic differential equation model for the distributed Software development environments. In the past, the software reliability applied to quality a rough guess with a software development process and approach by the estimation of reliability for a test progress. But, in this paper, we decided to optimal release times two method: first, SRGM with an error counting model in fault detection phase by NHPP. Second, fault detection is change of continuous random variable by SDE(stochastic differential equation). Here, we decide to optimal release time as a minimum cost form the detected failure data and debugging fault data during the system test phase and operational phase. Especially, we discussed to limitation of reliability considering of total software cost probability distribution.

Reinforcement Mining Method for Anomaly Detection and Misuse Detection using Post-processing and Training Method (이상탐지(Anomaly Detection) 및 오용탐지(Misuse Detection) 분석의 정확도 향상을 위한 개선된 데이터마이닝 방법 연구)

  • Choi Yun-Jeong;Park Seung-Soo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06b
    • /
    • pp.238-240
    • /
    • 2006
  • 네트워크상에서 발생하는 다양한 형태의 대량의 데이터를 정확하고 효율적으로 분석하기 위해 설계되고 있는 마이닝 시스템들은 목표지향적으로 훈련데이터들을 어떻게 구축하여 다룰 것인지에 대한 문제보다는 대부분 얼마나 많은 데이터 마이닝 기법을 지원하고 이를 적용할 수 있는지 등의 기법에 초점을 두고 있다. 따라서, 점점 더 에이전트화, 분산화, 자동화 및 은닉화 되는 최근의 보안공격기법을 정확하게 탐지하기 위한 방법은 미흡한 실정이다. 본 연구에서는 유비쿼터스 환경 내에서 발생 가능한 문제 중 복잡하고 지능화된 침입패턴의 탐지를 위해 데이터 마이닝 기법과 결함허용방법을 이용하는 개선된 학습알고리즘과 후처리 방법에 의한 RTPID(Refinement Training and Post-processing for Intrusion Detection)시스템을 제안한다. 본 논문에서의 RTPID 시스템은 active learning과 post-processing을 이용하여, 네트워크 내에서 발생 가능한 침입형태들을 정확하고 효율적으로 다루어 분석하고 있다. 이는 기법에만 초점을 맞춘 기존의 데이터마이닝 분석을 개선하고 있으며, 특히 제안된 분석 프로세스를 진행하는 동안 능동학습방법의 장점을 수용하여 학습효과는 높이며 비용을 감소시킬 수 있는 자가학습방법(self learning)방법의 효과를 기대할 수 있다. 이는 관리자의 개입을 최소화하는 학습방법이면서 동시에 False Positive와 False Negative 의 오류를 매우 효율적으로 개선하는 방법으로 기대된다. 본 논문의 제안방법은 분석도구나 시스템에 의존하지 않기 때문에, 유사한 문제를 안고 있는 여러 분야의 네트웍 환경에 적용될 수 있다.더욱 높은성능을 가짐을 알 수 있다.의 각 노드의 전력이 위험할 때 에러 패킷을 발생하는 기법을 추가하였다. NS-2 시뮬레이터를 이용하여 실험을 한 결과, 제안한 기법이 AOMDV에 비해 경로 탐색 횟수가 최대 36.57% 까지 감소되었음을 알 수 있었다.의 작용보다 더 강력함을 시사하고 있다.TEX>로 최고값을 나타내었으며 그 후 감소하여 담금 10일에는 $1.61{\sim}2.34%$였다. 시험구간에는 KKR, SKR이 비교적 높은 값을 나타내었다. 무기질 함량은 발효기간이 경과할수록 증하였고 Ca는 $2.95{\sim}36.76$, Cu는 $0.01{\sim}0.14$, Fe는 $0.71{\sim}3.23$, K는 $110.89{\sim}517.33$, Mg는 $34.78{\sim}122.40$, Mn은 $0.56{\sim}5.98$, Na는 $0.19{\sim}14.36$, Zn은 $0.90{\sim}5.71ppm$을 나타내었으며, 시험구별로 보면 WNR, BNR구가 Na만 제외한 다른 무기성분 함량이 가장 높았다.O to reduce I/O cost by reusing data already present in the memory of other nodes. Finally, chunking and on-line compression mechanisms are included in both models. We demonstrate that we can obtain significantly high-performanc

  • PDF

A Study on the Importances, Usages, and Contributions of IT system between Line and Project base processes (정보시스템의 중요도, 활용도, 기여도에 관한 제조업 현장인식에 관한 연구 - 공정간 차이에 대한 IPA 분석을 중심으로)

  • Hyun, Mincheol;Cho, BooYun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.9
    • /
    • pp.5942-5954
    • /
    • 2015
  • IT system in supply chain management(hereafter, SCM) has been regarded as one of competitive advantage to win over competing supply chain. SCM participants rush to adopt IT system to be agile for changing environment. Companies expect the improvement of the process integration over the supply chain, which enhance the overall SCM performance. IT system has been considered to influence on effective communication over the wall of firm boundaries. But, the profitability or the effectiveness of IT investment are controversial. This study try to reemphasize the importance of IT system considering the differences of processes, and the influences on the collaboration of supply chain participants. We want to know the perception level of functional managers for the importances, usages, and contributions of IT system in manufacturing sector. Also, we compare the different perception for collaborative SCM among supplier, buyer, and employees of buyer, and try to understand the context in which the IT investment acceptance occurs. We collected 297 responses(199 from line process and 98 from project process respectively). Results show that the importances, usages, and contributions of IT system are higher in the line process than in the project process.

Introduction of Security Certification System for Shared Growth and Co-prosperity of Small and Medium Businesses (대·중소기업 동반성장과 상생을 위한 중소 협력업체의 보안인증 제도 도입 방안)

  • Shin, Hyungoo
    • Korean Security Journal
    • /
    • no.61
    • /
    • pp.203-234
    • /
    • 2019
  • The damages from security accidents continue to increase as technology leaks from suppliers cause risks to the management of large companies, which are their customers, and their image and reliability to fall. However, the current industrial structure is practically impossible for large companies to form their own businesses and strategic alliances with business partners are essential, but it is changing into an industrial structure where the exchange of information is increased and the dependence of the information system is maximized, as well as legal demands and demands from stakeholders are increasing due to the complexity of the work process and the strengthening of security-related laws. The status of technology protection of small and medium-sized enterprises shows that they are not equipped with a security system due to relatively poor environment and financial difficulties compared to large enterprises, whereas the industrial structure between large and small business partners is indispensable for sharing the IT system, and the security system of large business, which is a customer company, should be improved by considering the fact that it is impossible to maintain security system between large businesses. Thus, the government intends to examine the system for shared growth of small businesses and the model for evaluating the capabilities of various agencies for information protection, and propose measures to introduce the certification system for small business partners.