• Title/Summary/Keyword: 기업인 네트워크 활동

Search Result 286, Processing Time 0.024 seconds

Forecasting Market trends of technologies using Bigdata (빅데이터를 이용한 기술 시장동향 예측)

  • Mi-Seon Choi;Yong-Hwack Cho;Jin-Hwa Kim
    • Journal of Industrial Convergence
    • /
    • v.21 no.10
    • /
    • pp.21-28
    • /
    • 2023
  • As the need for the use of big data increases, various analysis activities using big data, including SNS data, are being carried out in individuals, companies, and countries. However, existing research on predicting technology market trends has been mainly conducted using expert-dependent or patent or literature research-based data, and objective technology prediction using big data is needed. Therefore, this study aims to present a model for predicting future technologies through decision tree analysis, visualization analysis, and percentage analysis with data from social network services (SNS). As a result of the study, percentage analysis was better able to predict positive techniques compared to other analysis results, and visualization analysis was better able to predict negative techniques compared to other analysis results. The decision tree analysis was also able to make meaningful predictions.

Establishing a Business Model for Social Enterprises in the Fields of Culture, Performance, and the Arts Associated with the Tourism Industry: Gwangju Metropolitan City (관광분야와 연계된 문화·공연·예술 사회적기업 비즈니스모델 구축: 광주광역시를 중심으로)

  • Kim, Chang-Beom;Byeon, Jang-Seop;Na, Ju-Mong
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.9
    • /
    • pp.236-246
    • /
    • 2016
  • Social enterprise is an organization which use business activities as a means to achieve of social purposes. It has grown sharply since 2007 in Korea. However, now it is time had to pursue qualitative growth through the development of specialized business model. This study aims to identify business components using the Analytic Hierarchy Process (AHP) with experts and to develop a tailored business model for social enterprises in the fields of culture, performance, and the arts associated with the tourism based on regional demand within Gwangju. The analysis shows that job creation should be set as the main objectives to create value, and programs that offer hands-on experience with that fields can be the core competency. Cooperation among private corporations, local governments and agencies related to that fields is essential, as are programs provided through on- and off-line platforms. To develop a value proposition, customers must be segmented among a variety of the market participants.

A Case Study on Entrepreneurial Motivations of Independent Creative Firms (1인 창조기업의 창업동기에 관한 사례연구)

  • Shim, Jae-Hu;Choi, Myeong-Gil
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.11
    • /
    • pp.3363-3372
    • /
    • 2009
  • Continued jobless growth in economy, coupled with the current economic recession, is aggravating the situation of job market. In order to create more jobs and reduce the economic gap in a society, an independent creative firm of a sole entrepreneurs is suggested as an alternative mean. Understanding entrepreneurial motivations of a sole entrepreneur will be helpful in developing educational programs on starting an independent creative firm and in establishing a relevant government policy. This study, therefore, proposes a new model on entrepreneurial motivations in the independent creative firm and performs case study. The results of the study show that the personal environment and the personal characteristics of entrepreneurs have much effects on motivation of starting the independent creative firms. Among the personal environments, entrepreneurs' educational backgrounds, work experiences, and personal networks have great influences on entrepreneurial motivations. The processes of sustained entrepreneurship involve: (a) the determination of business ideas and goals, (b) the inception of a new business and managerial activities, (c) the entrepreneur's assessment of both intrinsic and extrinsic rewards of business performances, and (d) the adjustment of business ideas and goals in accordance with the results of the assessment. The results of the study could be applied in developing educational programs and consulting guidelines on independent creative firms and in establishing government's supportive policies on the firm.

An Empirical Study on the Participatory Use of K-Pop Video Contents (케이팝 콘텐츠의 참여적 이용에 관한 연구 : 유튜브 콘텐츠 관계망분석(SNA)을 중심으로)

  • Kim, H. Jin;Ahn, Minho
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.12
    • /
    • pp.28-37
    • /
    • 2019
  • It is apparently clear that K-pop has been expanding its influence overseas, with its high growth rate. As a result, attempts have been made to analyze the characteristics of K-Pop in various academic fields. This research quantitatively used the participatory use process of K-Pop contents in voluntary participation and dissemination of the audience in the Trans-Media environment. The author examined the use of participatory K-Pop contents from the view point of reparability through big data content analysis. It has been revealed that K-Pop is spreading globally through social media, fans of various countries like to play K-Pop, and they make up their own content and form a participatory culture. In addition, we looked at when the moments of momentum in which participatory use is soaring were popular content and who was the publisher.

Process Governance Meta Model and Framework (프로세스 거버넌스 메타모델과 프레임워크)

  • Lee, JungGyu;Jeong, Seung Ryul
    • Journal of Internet Computing and Services
    • /
    • v.20 no.4
    • /
    • pp.63-72
    • /
    • 2019
  • As a sub-concept of corporate or organization governance, business governance and IT governance have become major research topics in academia. However, despite the importance of process as a construct for mediating the domain between business and information technology, research on process governance is relatively inadequate. Process Governance focuses on activities that link business strategy with IT system implementation and explains the creation of corporate core values. The researcher studied the basic conceptual governance models of political science, sociology, public administration, and classified governance styles into six categories. The researcher focused on the series of metamodels. For examples, the traditional Strategy Alignment Model(SAM) by Henderson and Venkatraman which is replaced by the neo-SAM model, organizational governance network model, sequential organization governance model, organization governance meta model, process governance CUBE model, COSO and process governance CUBE comparison model, and finally Process Governance Framework and etc. The Major difference between SAM and neo-SAM model is Process Governance domain inserted between Business Governance and IT Governance. Among several metamodels, Process Governance framework, the core conceptual model consists of four activity dimensions: strategic aligning, human empowering, competency enhancing, and autonomous organizing. The researcher designed five variables for each activity dimensions, totally twenty variables. Besides four activity dimensions, there are six driving forces for Process Governance cycle: De-normalizing power, micro-power, vitalizing power, self-organizing power, normalizing power and sense-making. With four activity dimensions and six driving powers, an organization can maintain the flexibility of process governance cycle to cope with internal and external environmental changes. This study aims to propose the Process Governance competency model and Process Governance variables. The situation of the industry is changing from the function-oriented organization management to the process-oriented perspective. Process Governance framework proposed by the researcher will be the contextual reference models for the further diffusion of the research on Process Governance domain and the operational definition for the development of Process Governance measurement tools in detail.

The Study on the Network Targeting Using the Non-financial Value of Customer (고객의 비재무적 가치를 이용한 네트워크 타겟팅에 관한 연구)

  • Kim, Jin;Oh, Yoon-Jo;Park, Joo-Seok;Kim, Kyung-Hee;Lee, Jung-Hyun
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.2
    • /
    • pp.109-128
    • /
    • 2010
  • The purpose of our research is to figure out the 'non-financial value' of consumers applying networks amongst consumer groups, the data-based marketing strategy to the analysis and delve into the ways for enhancing effectives in marketing activities by adapting the value to the marketing. To verify the authenticity of the points, we did the empirical test on the consumer group using 'the Essence Cosmetics Products' of high involvement that is deeply affected by consumer perceptions and the word-of-mouth activities. 1) The empirical analysis reveals the following features. First, the segmented market for 'Essence Consumer' is composed of several independent networks, each network shows to have the consumers that is high degree centrality and closeness centrality. Second, the result proves the authenticity of the non-financial value for boosting corporate profits by the high degree centrality and closeness centrality consumer's word-of-mouth activities. Lastly, we verify that there lies a difference in the network structure of 'Essence Cosmetics Market'per each product origin(domestic, foreign) and demographic characteristics. It does, therefore, indicate the need to consider the features applying mutually complementary for the network targeting.

암호$\cdot$정보시큐리티의 동향

  • KOREA ELECTRIC ASSOCIATION KOREA ELECTRIC ASSOCIATION
    • JOURNAL OF ELECTRICAL WORLD
    • /
    • s.306
    • /
    • pp.73-80
    • /
    • 2002
  • 인터넷으로 대표되는 네트워크와 휴대전화의 결합으로 문자 그대로 지구규모의 디지털사회가 출연하게 되었고 사회제도와 공공의 정보기반도 그것을 반영한 형태로 변화하고 있다. 차후 디지털사회를 얼마나 안전한 것으로 만들어 가는가는 국가$\cdot$사회의 기반으로서 그 존속에 관계되는 중대한 문제이며, 기업 비즈니스에서는 사활(死活)을 건 비즈니스 문제가 되었다. 이들을 지탱하는 정보기반의 핵이 바로 암호를 중심으로 하는 정보시큐리티이다. 여기서는 현대 사회에서는 왜 암호$\cdot$정보시큐리티가 필요한가, 그 역할과 의미는 무엇인가, 어떠한 응용분야, 과제가 있는가를 전망해본다. 또한 암호란 무엇인가, 그 안전성의 의미란 무엇인가, 컴퓨터나 통신의 디지털기술과는 어떤 관련이 있는가를 역사적 배경과 최근의 동향을 바탕으로 언급하고, 현대암호의 성립, 정보시큐리티의 적용형태, 미쓰비시(삼릉)전기의 기술적 활동에 대하여 언급한다. 앞으로 전개되는 디지털 사회의 동향으로는 두 가지의 특징을 들 수 있다. 우선 휴대전화의 세계적 보급, 인터넷접속기능 장비의 발달로 현재 인터넷 유저(사용자)의 규모를 훨씬 능가하는 음성교신이 가능한 모바일인터넷의 출현이 예상된다. 모바일인터넷이 잠재적으로 갖는 안전상의 취약성을 극복하기 위해서는 암호$\cdot$정보시큐리티 기술은 보다 고도의 것이 요구된다. 또한 장래의 양자(量子)컴퓨터이 출현 등 분자레벨로 육박해 오고 있는 반도체$\cdot$광소자$\cdot$통신기술에 앞서 현재의 디지털암호에 의한 시큐리티기반의 안전성에 대한 한계가 거론되고 있다. 디지털사회의 안전성을 확보하기 위해서는 장래를 내다본 기술의 추구가 요청되고 있으며 그 대표적인 것으로 양자역학의 원리, 광기술, 디지털기술을 통합한 양자암호가 있다. 미쓰시비전기는 2000년 9월에 일본 최초로 양자암호의 실증실험에 성공하여 조기 실현화를 지향하고 있다.

  • PDF

Regional Office System of Car Rental Industries (승용 자동차 임대업 사업소의 지역적 체계)

  • Han Ju-Seong
    • Journal of the Korean Geographical Society
    • /
    • v.40 no.4 s.109
    • /
    • pp.373-386
    • /
    • 2005
  • This paper aims to analyze the regional system of car rental offices by investigating the location of headquarter and branch offices. Spatial characteristics of car rental industries attempts to emerge from local markets. Car rental industries try to reconstruct their organizations by establishing corporation and limited partnership companies. Also, in various reasons, they divided space extensively by placing business offices in the areas within and out of headquarter. The formation of network by offering short period car rental services between offices, to meet the increasing demand of leisure activities etc., causes the economies of scale.

Application Plan of Document Databases in the Big Data Environment (빅데이터환경에서의 문서데이터베이스 활용방안)

  • Park, Sungbum;Lee, Sangwon;Ahn, Hyunsup;Jung, In-Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.230-232
    • /
    • 2013
  • For Many enterprises are creating and handling huge amount of data in their business administration. However, it would be impossible for general databases such as Relational Databases, hierarchical databases, and network databases to manage and analyze this large amount of document data efficiently and effectively. So, in this paper, we define document databases and check out their characteristics such as consistency and transaction. And we propose appropriate or inappropriate subjects for application of document databases.

  • PDF

Traceback System based on ICMP for Network Intruder Response (네트워크 침입자 대응을 위한 ICMP 기반의 역추적 시스템)

  • Lee, Jik-Su;Lee, Seoung-Hyeon;Lee, Jae-Kwang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.893-897
    • /
    • 2005
  • 최근의 정보보호 환경에서는 자신의 관리 도메인 내로 침입하게 되는 공격을 어떻게 잘 탐지 할 것인가와 탐지된 공격을 어떻게 효율적으로 차단하여 자신의 도메인을 잘 보호할 것인가에 초점이 맞추어 있다. 따라서 탐지된 침입의 공격자에 대한 대응도 자신의 도메인 경계에서 해당 트래픽을 차단하는 수동적인 방법 이외에는 별다른 방법이 없는 상태이고, 이 경우 자신의 도메인에서 파악한 침입자정보를 바탕으로 자신의 도메인 입구에서만 해당 트래픽을 차단함으로써 침입자는 자유로이 인터넷을 이용할 수 있을 뿐만 아니라 다른 공격 기술이나 공격 루트를 이용한 제2, 제3의 공격이 이루어 질수 있다. 반면 인터넷을 이용한 경제 활동 및 그 액수가 점차 증가함에 따라 사이버 공격으로 입게 되는 피해는 점차 기업의 생존을 위협하는 수준에 도달하고 있다. 따라서 해킹에 능동적으로 대응할 수 있는 기술이 요구된다고 할 수 있으며, 능동적인 해킹 방어를 위한 가장 기본적인 기술로 해커의 실제 위치를 추적하는 역추적 기술을 활용할 수 있어야 한다. 그러나 현재까지 제안된 역추적 기술들은 인터넷이 보유한 다양성을 극복하지 못하여 현재의 인터넷 환경에 적용하는데 어려움이 따른다. 이에 본 논문에서는 해킹으로 판단되는 침입에 대하여 라우터의 구조적 변경 없이 효율적으로 역추적 하기 위해서 ICMP 역추적 메시지(ICMP Traceback Message)를 이용한 ICMP 기반의 역추적 시스템을 설계한다.

  • PDF