• Title/Summary/Keyword: 국가과학기술정보

Search Result 897, Processing Time 0.027 seconds

Enhancing the ICT Policies in Korea: Focusing on the Integration and Mediation of Organization and Function (ICT정책 활성화 방안 연구: 조직과 기능의 통합 및 조정을 중심으로)

  • Yoon, Kwang-Seok;Park, Kyoung-Don
    • Informatization Policy
    • /
    • v.25 no.1
    • /
    • pp.30-59
    • /
    • 2018
  • The ICT policy domain is one of the most important policy domains in terms of national development and continuity. It is primarily because the contemporary society has been continuously developed and changed based upon the advanced information technologies. Recently, the Moon Jae-in Administration reorganized the Ministry of Science and ICT, and transferred a few of the key ICT related functions to other ministries as an attempt to develop the national ICT policies. However, critics in this domain argue that various problems still exist in the ICT policies in Korea. Therefore, the purpose of this research is to verify the empirical validity of the existing problems in the ICT policies in Korea, and develop alternatives to solve those problems. In order to serve the research purpose, this study employs multiple methods; a quantitative method which is a survey involving experts in ICT policies, and a social network analysis involving public officials in ICT related ministries. Research results show that the Korean government needs to enhance its capacity to make adjustments in ICT-related policies as the current decentralized system continuously creates various types of problems. The second possible solution to the problem is to change the national ICT policy system to a centralized one. However, this requires various efforts such as cooperation among ICT related government agencies, separation of ICT policies from science and technology policies, and increased government capacity to implement the ICT policies.

A Servicism Model of the New Technology Industry Enterprise System (서비스주의 기술 산업 기업 연구)

  • Hyunsoo Kim
    • Journal of Service Research and Studies
    • /
    • v.12 no.3
    • /
    • pp.1-25
    • /
    • 2022
  • This study was conducted for technology development and industrial and enterprise system design for the sustainable life of mankind. Human society is facing a crisis. As the power of mankind has increased due to the development of nuclear weapons and information and communication technologies, the risk of human society has greatly increased. The value of growth and freedom is increasing due to capitalism and democratic systems, so technological innovation is accelerating, and industries and companies are growing significantly. New technologies and industries can greatly develop human society and put it at risk. This study was conducted with the aim of redesigning technology, industry, and enterprise systems so that humans who live on Earth can be more sustainable for a longer time. It presented a practical alternative for a long-term sustainable human society. It suggested alternatives for what philosophy and methodology should be developed for the whole of humanity and in each individual national society, for developing technologies, fostering industries, and operating corporate systems. First of all, the problems of the technology development system, industrial system, and enterprise system of human society were analyzed. The characteristics and problems were analyzed in terms of sustainability of human society. The necessary and sufficient conditions for an alternative system to solve the raised problems were derived. A system that satisfies these conditions was designed and presented. The alternative system was named as a servicism system as a system based on the service philosophy. The structure, operation model, and implementation plan of the new technology industry enterprise system were presented. In the future, follow-up studies are needed to be concreted at the level of individual countries and human society as a whole.

Empirical Analysis of the Influence of ICT SMEs' R&D Resources on Corporate Performance (ICT 중소기업의 연구개발 자원이 기업성과에 미치는 영향에 관한 실증연구)

  • Jong Yoon Won;Kun Chang Lee
    • Information Systems Review
    • /
    • v.23 no.3
    • /
    • pp.1-23
    • /
    • 2021
  • The national economic policy paradigm is constantly changing according to the global business environment. Among them, fostering SMEs is a core policy of many developed countries. The growth of SMEs contributes to the creation of jobs and the development of local communities in the era of employment-free growth. In particular, the growth of SMEs is the foundation for growth into mid-sized and large enterprises. Therefore, the growth of SMEs plays an important role in the national economy. Information and communication technology (ICT) became important much more with the emergence of the 4th industrial revolution. Among them, the growth of ICT SMEs is the nation's future asset. Therefore, this study examines and verifies the main factors affecting the performance of ICT SMEs from the view of their R&D resources. On the basis of 1,999 SMEs dataset, empirical analysis was performed to investigate the influence of R&D resources on their corporate performance. Its results are as follows. First, based on theresource-based theory, ICT SMEs' R&D investment, R&D manpower, and government support policies were found to have a positive effect on securing a company's competitive advantage. Second, it was found that the level of product has a positive effect on the company's performance. Finally, it was found that M&A and technology acquisition method strategies differ according to the growth stage of the company. Therefore, in order to achieve technological innovation and corporate performance of ICT SMEs, the government support policy and investment into internal R&D personnel play as main factors. In addition, it was found that technology acquisition strategies differ depending on the growth stage of the company.

A Study on plans for paid digital contents within a public information service institution (공공정보서비스기관의 디지털콘텐츠 유료화방안에 관한 연구)

  • 신기정;문영수
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2003.05a
    • /
    • pp.277-290
    • /
    • 2003
  • Recently, digital contents have become increasingly perceived as a core aspect of national development, and as such their generation and widespread promotion is being now pursued on a global basis, as federal governments move to assist corporations in the realization ofconsistent industrial development. Efforts are also being made to seek avenues for the paid use of qualitatively excellent contents, instead of relying upon traditional methods of free-of-charge provision. International corporations as well as governments are committing themselves to the search for a more developed approach to paid contents. In this report, the role of public institutions in executing plans and promotional strategies for the charging and development of the contents industry is examined. In particular, the case of paid contents is analyzed in relation to the Korea Institute of Science and Technology Information (KISTI), which is assigned the task of contents distribution to the general public in its capacity as a public information service institution, not as a profit-oriented general corporation.

  • PDF

An Implications of Computer Education in Korea from the U.S., U.K. and Germany Computer Curriculums (미국 영국 독일 컴퓨터 교육과정에서 한국 컴퓨터 교육의 시사점)

  • Kim, Kapsu
    • Journal of The Korean Association of Information Education
    • /
    • v.20 no.4
    • /
    • pp.421-432
    • /
    • 2016
  • The 21st century computer education is very important for the future generations in the knowledge and information society. Therefore, developed countries that are the US, UK, and Germany, it is very important to find out how the computer education. In the US, the NETS and ACM K12 curriculum are investigated, In the UK and Germany national level computer curriculums are looked out. USA, UK, and Germany's curriculum includes computer science, information technology, digital literacy, and computer curriculum is independent, at least in the elementary schools computer education can be seen that more than 17 hours. After the revised national curriculum at 2015 is amended in korea. compared to the developed countries to derive the problems of the Korean revised national curriculum 2015. The revised 2015 Korean elementary school computer education, has no identity because it is not operated as an independent subject. Software will include education only. A very limited time of 17 hours may be a problem.

A Study on the Functional User Interface of the Korean Hisory Information System in the Knowledge Information Resource Management (지식정보자원관리사업 역사분야 정보시스템의 기능적 사용자 인터페이스에 대한 연구)

  • Lee, Keon-Sik
    • Journal of the Korean Society for information Management
    • /
    • v.23 no.1 s.59
    • /
    • pp.335-352
    • /
    • 2006
  • Since 2000, the Ministry of Information and Communication has spearhead the so-called Knowledge Information Resource Management Project to turn South Korea into an information-knowledge powerhouse. With the project, the ministry has digitalized major information content in various fields such as history, education, culture and science, enabling many people to benefit through the Internet. During the period,12 institutions have participated in the history fields, The participants are as follows: Muncheongak at Gyeongsang National University, Ministry of Patriots and Veterans Affairs, National Institute of Korean History, Independence Hall of Korea, Korean Classics Research Insitute, Korea Democracy Foundation, Gyujanggak Archives, Seoul National University, Jongyeonggak, Sungkyunkwan University, The War Memorial of Korea, Korean Studies Advancement Center, Korean Women's Development Institute, and The Academy of Korean Studies. Because the 12 information systems have different functional user interfaces, it is confusing for people to utilize them effectively That requires us to standardize the interfaces, which would improve the overall improvement in effectiveness. This paper compares each user interface of the 12 information systems to determine their similarities and differences in terms of how to search information and present results. This work will pave the way to build a standardized user interface .

Research on technical protection measures through risk analysis of pseudonym information for life-cycle (가명정보 Life-Cycle에 대한 위험 분석을 통한 관리적/기술적 보호조치 방안에 대한 연구)

  • Cha, Gun-Sang
    • Convergence Security Journal
    • /
    • v.20 no.5
    • /
    • pp.53-63
    • /
    • 2020
  • In accordance with the revision of the Data 3 Act, such as the Personal Information Protection Act, it is possible to process pseudonym information without the consent of the information subject for statistical creation, scientific research, and preservation of public records, and unlike personal information, it is legal for personal information leakage notification and personal information destruction There are exceptions. It is necessary to revise the pseudonym information in that the standard for the pseudonym processing differs by country and the identification guidelines and anonymization are identified in the guidelines for non-identification of personal information in Korea. In this paper, we focus on the use of personal information in accordance with the 4th Industrial Revolution, examine the concept of pseudonym information for safe use of newly introduced pseudonym information, and generate / use / provide / destroy domestic and foreign non-identification measures standards and pseudonym information. At this stage, through the review of the main contents of the law or the enforcement ordinance (draft), I would like to make suggestions on future management / technical protection measures.

A Survey for the Development of Professional Industrial Technology Protection : Focusing on key status and job path analysis (국내 산업기술보호 전문인력 육성을 위한 실태조사 : 주요 현황 및 직무 경로 분석을 중심으로)

  • Kim Mi Hee;Jung Yu Han
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.107-116
    • /
    • 2023
  • The management of professional manpower with expertise in performing specific tasks can be said to be a very important issue at the national level. Recently, interest in industrial technology protection experts continues to expand, but difficulties are growing due to the lack of policy evidence. Considering these points, this study conducted a fact-finding survey on personnel in charge of industrial technology protection, and through this, quantitative, qualitative, and job path analysis were performed for related job performers. These results are considered to be significant in that they can be used as basic information for fostering industrial technology protection experts in the future.

Setting Priorities by Computer Science Area Through Quantification of CS2013 Knowledge Area (CS2013 지식영역의 계량화를 통한 컴퓨터과학 영역별 우선순위 설정)

  • Yu, ByeongGeon;Kim, JaMee;Lee, WonGyu
    • The Journal of Korean Association of Computer Education
    • /
    • v.20 no.3
    • /
    • pp.25-33
    • /
    • 2017
  • Countries that considered importance of the quality management of higher education are strengthening through various systems and methods. Field of computer science also, they have constantly made efforts, such as constituting standards of curriculum for the management of the quality of higher education. If we know the priorities of the knowledge area mentioned in the standard of curriculum of computer science, we can give implications to the composition of the content system. Therefore, we derive the ranking based on base on CS2013 the lesson time number of Tier 1, Tier 2, Elective, and detail areas for content elements. As a result, the knowledge area with the highest priority was Software Development Fundamentals. The knowledge area is recommended as a beginner course in CS2013 because it is a basic element. The priorities of these areas may provide implications for future elementary and secondary informatics curriculum, higher liberal arts informatics curriculum, Informatics curriculum of teacher training agency.

Classification of Trusted Boot Technology Components based on Hardware Dependency (하드웨어 종속/독립성에 따른 신뢰성 부팅 기술 구성 요소 분류)

  • Park, Keon-Ho;Kim, Sieun;Lee, Yangjae;Lee, SeongKee;Kang, Tae In;Kim, Hoon Kyu;Park, Ki-woong
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.14 no.6
    • /
    • pp.44-56
    • /
    • 2018
  • Researches on military weapons are actively studied to improve national defense power of each country. The military weapon system is being used not only as a weapon but also as a reconnaissance and surveillance device for places where it is difficult for people to access. If such a weapon system becomes an object of attack, military data that is important to national security can be leaked. Furthermore, if a device is taken, it can be used as a terrorist tool to threaten its own country. So, security of military devices is necessarily required. In order to enhance the security of a weapon system such as drone, it is necessary to form a chain of trust(CoT) that gives trustworthiness to the overall process of the system from the power on until application is executed. In this paper, by analyzing the trusted computing-based boot technology, we derive trusted boot technology components and classify them based on hardware dependence/independence. We expect our classification of hardware dependence/independence to be applied to the trusted boot technology of our self-development ultraprecision weapon system to improve the defense capability in our military.