• Title/Summary/Keyword: 운영조직

Search Result 1,679, Processing Time 0.031 seconds

A Study on the International Transfer of Retail Know-how: A Case of 7-Eleven (소매 노하우의 국제이전에 관한 연구 : 7-Eleven 사례를 중심으로)

  • Kim, Hyun-Chul
    • Journal of Distribution Research
    • /
    • v.13 no.4
    • /
    • pp.1-19
    • /
    • 2008
  • This study investigated the international transfer of retail know-how via the prism of Learning Organizational Theory. As a case, 7-Eleven, a worldwide chain of convenience stores was examined. Its international transfer of retail know-how occurred when 7-Eleven, originally founded by Southland Corporation in Dallas, Texas, was introduced in Japan in 1973 in the form of 7-Eleven Japan. Our analysis shows that both strategic core learning and adaptive learning played a significant role during the international transfer of retail know-how. Our findings reveal the evidence of the following elements of strategic core learning such as the convenience store concept, the three principles of store management, the minimum profit guarantee system, and the margin-based royalty system. On the other hand, the retailing mix such as store type, store location, store size, and merchandising acted as the acting agents of adaptive learning. The hypothesis verification methods acted as the main methods for adaptive learning. Through the persistent adaptive learning, inimitable innovations could be brought forth. However, the elements of strategic core learning should provide the direction for the adaptive learning.

  • PDF

Relationship between Self-leadership, Psychological Empowerment and Job Satisfaction of Clinical Dental Hygienists (임상치과위생사의 셀프리더십과 심리적 임파워먼트 및 직무만족도와의 관련성)

  • Ji, Min-Gyeong
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.12
    • /
    • pp.198-207
    • /
    • 2019
  • The purpose of this study was to determine the relationship between self-leadership, psychological empowerment and job satisfaction in dental hygienists, who form major manpower directly affecting dental care service, and to develop a plan for good-quality intra-organizational personal improvement. To collect data, convenience sampling was performed from May 1 to June 10, 2017 among clinical dental hygienists working at dental hospitals and clinics in Chungcheong and Jeolla Provinces and a self-administered questionnaire was used. Self-leadership was positively correlated with psychological empowerment and job satisfaction; psychological empowerment was positively correlated with job satisfaction. The factors for job satisfaction included psychological empowerment, dental system and self-conformity, and self-leadership. It has been confirmed that there is correlation among self-leadership, psychological empowerment, and job satisfaction in clinical dental hygienists; therefore, it is necessary to use positive psychological empowerment, establish a proactive self-leadership convergence program, and pay attention to the good direction and management of dental organizations with the objective of improving job satisfaction in dental hygienists.

A Study on the Important Factors for Accounting Information Quality Impact on AIS Data Quality Outcomes (회계정보 품질에 영향을 미치는 요인이 회계정보시스템 데이터 품질에 미치는 영향)

  • Kim, Kyung-Ihl
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.12
    • /
    • pp.24-29
    • /
    • 2019
  • AIS is one of the most critical systems in any organization. Data quality plays a critical role in a knowledge-based economy. The objective of this study is to identify the most important factors for accounting information quality and their impact on AIS data quality outcomes. This study includes an extensive literature review to identify a set of CSF for data quality. The study uses empirical data to test the research hypothesis and resluts show that the top three most important factors that affect AIS's data quality are toop management commitmentm the nature of the AIS and input controls. The study further uses regression analysis to test the effect of those factors on AIS data quality, finding that there is a significant positive relationship between the perceived performance of the three factors and AIS data quality putcomes. To be develop to AIS data quality further study for CSF's control methodology is necessary.

A Study on Improvement of Cyber Security Framework for Security Operations Center (보안관제 조직을 위한 사이버보안 프레임워크 개선에 관한 연구)

  • Cho, Changseob;Shin, Yongtae
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.111-120
    • /
    • 2019
  • As cyber-attacks become more intelligent and sophisticated, the importance of Security Operations Center(SOC) has increased and the number of SOC has been increasing. In order to cope with cyber threats, institutions and organizations use a variety of cyber security standards to create business procedures. However, SOC often need to be improved in accordance with the SOC environment because they collaborate with managed security service specialists rather than their own personnel. The NIST cyber security framework, information security management system, and managed security service companies were compared and analyzed. As a result, it was found that the NIST CSF is a framework that is easy to apply to managed security service, The content was judged to be insufficient. Therefore, in this study, NIST CSF was used as a reference model to derive the management items required for SOC environment, and the necessity, importance and ease of each item were confirmed through an Delphi technique and an improved cyber security framework was proposed.

Record, Information, Knowledge : A Preliminary Study for Knowledge & Information Resources of Records (기록과 지식·정보 기록의 지식·정보 자원화를 위한 시론적 분석)

  • Kim, Myoung-hun
    • The Korean Journal of Archival Studies
    • /
    • no.54
    • /
    • pp.45-79
    • /
    • 2017
  • This paper examines the significance of records as knowledge information resources that are illuminated by the electronic record environment nowadays based on existing research results and examples. As the production mode of records changes, it is possible to avoid the tendency to prioritize historical and cultural values when keeping records. In addition, according to the change of the operating mode and the work pattern of an organization, the value of knowledge information resource is also important. For this purpose, this paper reviews the recent changes in the work environment in Chapter 2 and then examines attributes not only as evidence but also as information. Based on these discussions, the paper explores the relationship between the records and the information that has been discussed in western academic circles since the 1980s in Chapter 3. With this, it also analyzes the correlation between record management and knowledge management. In Chapter 4, it reviews recent trends to link records management and knowledge management in Australia, the United Kingdom, and the United States. In addition to the current state of public records management in Korea, this paper presents the direction of institutional improvement in three aspects.

Information Security Management System on Cloud Computing Service (클라우드 컴퓨팅 서비스에 관한 정보보호관리체계)

  • Shin, Kyoung-A;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.155-167
    • /
    • 2012
  • Cloud computing service is a next generation IT service which has pay-per-use billing model and supports elastically provisioning IT infra according to user demand. However it has many potential threats originating from outsourcing/supporting service structure that customers 'outsource' their own data and provider 'supports' infra, platform, application services, the complexity of applied technology, resource sharing and compliance with a law, etc. In activation of Cloud service, we need objective assessment standard to ensure safety and reliability which is one of the biggest obstacles to adopt cloud service. So far information security management system has been used as a security standard for a security management and IT operation within an organization. As for Cloud computing service it needs new security management and assessment different from those of the existing in-house IT environment. In this paper, to make a Information Security Management System considering cloud characteristics key components from threat management system are drawn and all control domain of existing information security management system as a control components are included. Especially we designed service security management to support service usage in an on-line self service environment and service contract and business status.

The Effect of Telecommuting Characteristics Perception on Job Creativity, Job Satisfaction and Job Performance (재택근무 특성 인식이 직무창의성, 직무만족 및 직무성과에 미치는 영향)

  • Lee, Jeen-Gee;Kwon, Hyeok-Gi;Choo, Seung-Woo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.27 no.5
    • /
    • pp.129-144
    • /
    • 2022
  • Until now, research related to telecommuting has been mainly conducted in information and communication fields such as smart work, and the need for this study emerges in that there are insufficient cases or studies confirming visible job productivity or organizational performance for companies to grasp. The purpose of this study is to investigate how telecommuting affects job performance through job creativity and job satisfaction of members of the organization. As a result of the analysis, it was found that the perception of telecommuting characteristics (communication collaboration, job productivity, work-life balance) had a significant positive (+) effect on both job creativity and job satisfaction. Second, job creativity and job satisfaction were also found to have a positive effect on job performance. Based on the analysis results of this study, it is expected to provide usefulness evaluation indicators for telecommuting to managers and policymakers of companies or institutions that want to introduce and operate telecommuting in the future in the post-COVID-19 era.

The Effect of Korean FK(Futsal Korea) CUP Tournament Identity on Value and Participation Intention (한국 FK(Futsal Korea) CUP 대회 아이덴티티가 가치와 참가의도에 미치는 영향)

  • Shin, Jin-Ho
    • Journal of the Korean Applied Science and Technology
    • /
    • v.39 no.4
    • /
    • pp.560-567
    • /
    • 2022
  • This study attempted to provide basic data on efficient competition operation plans by identifying how the identity of the Korean FK CUP competition affects value and participation intention. Therefore, among those who are aware of the FK CUP competition organized by the Korea Futsal League, those who have participated in the futsal competition were selected as samples. The survey was conducted face-to-face and non-face-to-face from April 1 to June 17, 2022, and a total of 299 data were used for the final analysis. Data processing used the SPSS (ver.21.0) program to conduct frequency analysis, exploratory factor analysis, internal consistency, correlation analysis, simple and multiple regression analysis. The main results of this study are as follows. First, the identity of the Korean FK CUP competition has been shown to influence the value in the order of organization, human and symbol. Second, the value has been shown to influence the participation intention. Third, the identity of the Korean FK CUP competition has been shown to influence the participation intention in the order of organization, human.

Desirable Personality Required of Nurses in Clinical Nursing Field: Focus Group Interviews Centered On (임상 간호현장에서 간호사에게 요구되는 바람직한 인성: 포커스그룹 인터뷰를 중심으로)

  • Mi-Ran Kim
    • Journal of Industrial Convergence
    • /
    • v.20 no.12
    • /
    • pp.27-37
    • /
    • 2022
  • This study aims to identify the nature and content of the desired nursing personality of clinical nurses and provide basic data for securing nursing competencies and providing quality nursing as clinical nurses. This is a qualitative study with a focused group analysis to comprehensively explore the desirable nurse personality expected in clinical nursing settings. From November 30, 2019 to Jan 20, 2020, 6 nurses with more than 5 years of clinical experiences and working in a regional university hospital participated in the four focus group interviews. The collected qualitative data was analyzed by the content analysis method. The personality required of clinical nurses is 'process of self-regulation and effort for patient care', 'components for human-centered nursing', 'influence to create healthy interpersonal relationships', and 'nursing'. Configure and operate the organization. It was analyzed into a total of five main themes and 17 sub-themes: "Influence to make changes" and "Influence to bring about organizational change and results." This study confirms the desirable elements of personality in nursing practice, and proposes the application and effect verification research of clinical nursing education programs for nurses in order to secure the nursing competence of professionals and provide high-quality nursing care in the future.

Security Frameworks for Industrial Technology Leakage Prevention (산업기술 유출 방지를 위한 보안 프레임워크 연구)

  • YangKyu Lim;WonHyung Park;Hwansoo Lee
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.33-41
    • /
    • 2023
  • In recent years, advanced persistent threat (APT) attack organizations have exploited various vulnerabilities and attack techniques to target companies and institutions with national core technologies, distributing ransomware and demanding payment, stealing nationally important industrial secrets and distributing them on the black market (dark web), selling them to third countries, or using them to close the technology gap, requiring national-level security preparations. In this paper, we analyze the attack methods of attack organizations such as Kimsuky and Lazarus that caused industrial secrets leakage damage through APT attacks in Korea using the MITRE ATT&CK framework, and derive 26 cybersecurity-related administrative, physical, and technical security requirements that a company's security system should be equipped with. We also proposed a security framework and system configuration plan to utilize the security requirements in actual field. The security requirements presented in this paper provide practical methods and frameworks for security system developers and operators to utilize in security work to prevent leakage of corporate industrial secrets. In the future, it is necessary to analyze the advanced and intelligent attacks of various APT attack groups based on this paper and further research on related security measures.