• Title/Summary/Keyword: 내부 인력

Search Result 232, Processing Time 0.022 seconds

The Effect of an Internal Marketing Strategy on the Causes of Conflicts in the Foodservice Industry (외식업체 내부 마케팅 전략이 갈등 원인에 미치는 영향)

  • Lee, Jin-Ha
    • Culinary science and hospitality research
    • /
    • v.16 no.3
    • /
    • pp.161-173
    • /
    • 2010
  • The foodservice industry should be customer-oriented and service-oriented because production and consumption occur simultaneously and sales depend on customers' participation in the foodservice industry. In this respect, it is faced with maintaining minimum human resources with efficient management systems and policies which employees can offer quality services. This study, therefore, aims to find out how internal marketing strategies affect conflict perception. The result of the study is as follows. Communication, service training, employee benefits and a reward system are generally important in the internal marketing. In particular, it is considered that employee benefits and a reward system based on finance are more important to employees than any other factor. Accordingly, companies should consider facilities offered to the employees, vacation and employee benefits. Also, it is shown that communication-obstacles take high proportion in the cause of conflicts and employee benefits in the internal marketing. This study showed the possibility of internal marketing used as a management method of human resources and a solution for resolving conflicts.

  • PDF

Efficient Operation Model for Effective APT Defense (효율적인 APT 대응 시스템 운영 모델)

  • Han, Eun-hye;Kim, In-seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.501-519
    • /
    • 2017
  • With the revolution of IT technology, cyber threats and crimes are also increasing. In the recent years, many large-scale APT attack executed domestically and internationally. Specially, many of the APT incidents were not recognized by internal organizations, were noticed by external entities. With fourth industrial revolution(4IR), advancement of IT technology produce large scale of sensitive data more than ever before; thus, organizations invest a mount of budget for various methods such as encrypting data, access control and even SIEM for analyzing any little sign of risks. However, enhanced intelligent APT it's getting hard to aware or detect. These APT threats are too much burden for SMB, Enterprise and Government Agencies to respond effectively and efficiently. This paper will research what's the limitation and weakness of current defense countermeasure base on Cyber Kill Chain process and will suggest effective and efficient APT defense operation model with considering of organization structure and human resources for operation.

Analysis of the Productivity Changes in Government-funded Research Institute for Economies & Humanities and Social Sciences (경제인문사회분야 정부출연연구기관의 생산성 변화 분석)

  • Jeon, Seong-Wook;Kim, Seong-Jong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.10
    • /
    • pp.6066-6075
    • /
    • 2014
  • The aim of this study was to analyze the productivity changes in government-funded research institutes for Economics & Humanities and Social Sciences. From Malmquist total factor productivity index analysis, the average productivity decreased 6.5% between 2006 and 2010. Further analysis showed that technical efficiency increased 4.7% annually while the technology change rate decreased 10.8% on average. Under pressure for innovation from the outside, research institutes responded to managerial efficiency improvement, which lead to increases in technical efficiency. On the other hand, for productivity improvement of government funded research institutes, they must pursue technological advances by securing an outstanding research workforce, expanding the R&D budget, and changing the R&D method. Each institute must perceive the cause of an individual institute's productivity change, and establish strategies for increasing productivity.

Cyber threat Detection and Response Time Modeling (사이버 위협 탐지대응시간 모델링)

  • Han, Choong-Hee;Han, ChangHee
    • Journal of Internet Computing and Services
    • /
    • v.22 no.3
    • /
    • pp.53-58
    • /
    • 2021
  • There is little research on actual business activities in the field of security control. Therefore, in this paper, we intend to present a practical research methodology that can contribute to the calculation of the size of the appropriate input personnel through the modeling of the threat information detection response time of the security control and to analyze the effectiveness of the latest security solutions. The total threat information detection response time performed by the security control center is defined as TIDRT (Total Intelligence Detection & Response Time). The total threat information detection response time (TIDRT) is composed of the sum of the internal intelligence detection & response time (IIDRT) and the external intelligence detection & response time (EIDRT). The internal threat information detection response time (IIDRT) can be calculated as the sum of the five steps required. The ultimate goal of this study is to model the major business activities of the security control center with an equation to calculate the cyber threat information detection response time calculation formula of the security control center. In Chapter 2, previous studies are examined, and in Chapter 3, the calculation formula of the total threat information detection response time is modeled. Chapter 4 concludes with a conclusion.

Introduction to Research Trend of Real-Time Measurement for Wear of TBM Disc Cutter (TBM 디스크커터의 마모량 실시간 계측을 위한 연구현황)

  • Min-Sung, Park;Min-Seok, Ju;Min-Sung, Cho;Jun, Lee;Jung-Joo, Kim;Hoyoung, Jeong
    • Tunnel and Underground Space
    • /
    • v.32 no.6
    • /
    • pp.478-490
    • /
    • 2022
  • TBM disc cutter, which is the main cutting tool of tunnel boring machine (TBM), is replaced when it is excessively worn during the boring process. Disc cutters are usually monitored by workers at cutterhead chamber, and they check the status and wear amount of cutters. Because cutterhead chamber is usually in dangerous circumstance due to high pressure and instability of excavation surface, the measurement by manpower occasionally results in inaccuracy of measurement result. In order to overcome the limitations, the real-time disc cutter monitoring techniques have been developed in some foreign countries. This paper collected the current status of disc cutter monitoring system from the literature. Several types of sensors are used to measure the cutter wear, and it is believed that the collected information can be useful reference when similar domestic technologies are developed in the future.

Study of Accounting Ethical Level of Treasurers in the Undertaking (기업체 회계담당자의 회계윤리수준에 관한 연구)

  • Park, Joong-Ho;Byun, Sang-Hae;Park, Cha-Kyu
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.3 no.4
    • /
    • pp.43-57
    • /
    • 2008
  • This study investigates the ethical standards of treasurers in the defense industry and explores ways to improve them in order to contribute to businesses' ethical managements. Also, this research examines how the ethical standards of the treasures have an influence on accounting transparency and accounting fraud. This paper deals with two fields, namely, ethical judgment and ethics in different cultures. The former focuses on actions that can occur in various ethical situations of accounting area. The latter shows that the development level of certified accountants’ ethical thinking depends on cultural difference.

  • PDF

A Code Banking-based High-speed Concurrent Software Update Method for Single Hop Wireless Sensor Networks (단일 홉 무선 센서 네트워크를 위한 코드 뱅킹 기반의 고속 병렬 소프트웨어 업데이트 기법)

  • Park, Young-Kyun;Nam, Young-Jin
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.7
    • /
    • pp.949-963
    • /
    • 2011
  • Generally, It is indispensible to use an ISP(In System Programming) tool for upgrading, patching, or changing the system software of the each sensor nodes in wireless sensor networks. While under a small number of nodes, the upgrading task is not a serious burden, however if there are a large number of nodes to be updated, the task is almost impossible to do for the given constrains such as limited budgets and resources. Based on this observation, in this paper we have proposed a novel upgrading scheme based on a single hop in IEEE 802.15.4 PAN(Personal Area Network)s. Simulation results have shown the scheme outcomes the conventional methods in the performance measures.

Effect of Surfactant Molecules on the Aqueous Solubility of two PAHs (새로운 계면활성제들에 의한 두 PAH의 수중 용해도 증가)

  • 이진희;박재우
    • Journal of Korea Soil Environment Society
    • /
    • v.5 no.1
    • /
    • pp.65-73
    • /
    • 2000
  • Surfactants have been extensively considered for decontamination of the subsurface polluted with hydrophobic organic compounds. In order to investigate the effect of molecular structures on the solubilization of hydrophobic organic compounds, solubility enhancement of two PAHs in solutions of three different surfactants-conventional, dianionic, and gemini. The batch experimental results showed that the gemini was the most effective and the dianionic was the least, indicating that organic carbon content of the surfactants was the major factor which determines the sorption capacity of surfactant aggregates in water, unlike some of the previous reports.

  • PDF

A Study on the Book Purchases in Public Libraries (공공도서관의 자료구입에 관한 연구)

  • Kang, Eun-Yeong
    • Journal of Korean Library and Information Science Society
    • /
    • v.44 no.3
    • /
    • pp.153-182
    • /
    • 2013
  • This study intends to analyze the acquisition process in public libraries. It specifically attempts to survey the collection development policy, staff structure of acquisition departments, overall process of book purchasing, conclusion of contract for book purchasing and discount rate of book. Data are drawn from a survey with 315 public libraries in the country. As a conclusion, this study discusses such as current situation in book purchases in public libraries and possible impetus toward a better collection development process.

A study on the development of military qualification system (직무전문성 향상과 인적 자원의 효율적 활용을 위한 국방자격제도 발전에 관한 연구)

  • Kim, Oh-Hyun;Roh, Myoung-Hwa;Lee, Gang-Sung
    • Journal of the military operations research society of Korea
    • /
    • v.34 no.2
    • /
    • pp.103-122
    • /
    • 2008
  • In this study, we proposed that Military Qualification System(MQS) should be reshaped for enhancement of the professional and efficient management of human resource in the military sector. It should be also prepared that Military Qualification Law and Organization to operate the MQS. By doing that, we can expect several benefits. Firstly, military professionalism is systemically managed and enhanced, secondly military qualification for military personnel will be innovatively developed, thirdly supplement of skilled personnel are secured with stabilities in the military sectors, and finally outplacement of retired personnel are also qualified with military career and training.