• Title/Summary/Keyword: 이해당사자

Search Result 346, Processing Time 0.026 seconds

An Empirical Study on the Adoption of Technology Acceptance Model in The Port Logistics Service (항만 물류서비스의 기술수용모델(TAM) 적용에 관한 실증적 연구)

  • Lee, Je-Hong
    • Journal of Korea Port Economic Association
    • /
    • v.27 no.4
    • /
    • pp.13-35
    • /
    • 2011
  • The advancement of the information technology provides a wide range of corporate to cope with new business environments that are different in size, life and operation conditions. The Research methodology used in this study is Technology Acceptance Model. The Study Method are mainly survey and questionnaire. The major result of article can be summarized. Its are as the follows: This paper ware investigated the determinants of 'port service quality', 'perceived usefulness', 'perceived ease of use', 'utilization intention', 'practice use'. There are 400 sended samples and 150 returns, 173 of them are analyzed on a port utilization using TAM model. 1. The Port service quality are found to have a positive effect to 'perceived usefulness', 'perceived ease of use', 'utilization intention' 2. The perceived ease of use are found to have a positive effect to 'perceived usefulness', 'utilization intention' 3. The perceived usefulness is found to be positively related to 'utilization intention' 4. The utilization intention is found to have a positive effect to ''practice use' we hove to provide useful contribution to increase the Korea ports' competitiveness in introduction of port information system. In addition, in order to port development offer some insight in further research.

Analyzing the Negotiation Process for the Adoption of Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing Arising from their Utilization using the Conflict Management Process (갈등 관리 프로세스에 의한 ABS협상의 갈등 사례 분석)

  • Min, Seo-Jeong;Lee, Gwan-Gyu;Kim, Joon-Soon
    • Journal of Environmental Policy
    • /
    • v.10 no.2
    • /
    • pp.3-19
    • /
    • 2011
  • Nagoya Protocol designed to establish criteria about material trade of biological genetic resources(ABS) was adopted in the 10th conference of the Parties to the Convention on Biological Diversity. In the course of the negotiation for adoption of the protocol, there was conflict between developed and developing countries, resource-rich and poor countries, and multinational corporations and environmentalists. This study investigates conflict process, subjects, issues and major factors in the negotiation case, and analyzes the negotiation by using the Conflict Management Process. To develope conflict management strategies for various conflict cases, we examine previous studies and analyze the intersectional conflict factors of this case and general cases, such as Fundamental side, Resource-allocation side, and Communication/Information-sharing side. These analyses of conflict prevention/resolution of the ABS negotiation show the importance of building mutual trust among stakeholders, enhancing mediator training, and constructing appropriate legislative/policy systems for successful conflict management.

  • PDF

A Study on the Policy Proposal and Model B2B2C for Safe Open Banking (안전한 오픈뱅킹 구축을 위한 정책 및 B2B2C 모델에 관한 연구)

  • Choi, Dae-Hyun;Kim, In-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1271-1283
    • /
    • 2019
  • The fourth industrial revolution and digital transformation are also bringing major changes to the financial ecosystem in Korea. Already, global financial firms overseas are opening their financial markets and exploring new financial businesses by seeking ways to co-prosperity with fintech firms. However, it is also true that the domestic financial environment has failed to respond to the changes due to its monopolistic and closed structure. In response, the government began pushing for the introduction of open banking in December 2019 with the aim of fully opening the financial settlement system. However, unlike the existing simple financial transaction structure, open banking still has an unresolved part due to the unclear relationship of responsibilities between interested parties in the event of financial accidents due to the complex linkage structure of transactions such as financial firms, fintech firms and customers. This study analyzed the security threat of open banking in depth. By doing so, the government and financial firms want to present policy proposals that need to be improved to enhance the safety of open banking in korea and protect financial consumers, as well as new financial models that have improved the vulnerable parts of existing models.

Periodic Characteristics and Implications of Programs and Policies for Brownfield Management in the U.S.A. (미국 브라운필드 관리 프로그램과 정책의 시기별 특성과 함의)

  • Kim, Eujin Julia;Miller, Patrick
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.43 no.1
    • /
    • pp.96-107
    • /
    • 2015
  • Brownfield sites are beginning to be considered as potentially useful areas for landscape design and planning, with post-industrial areas such as water treatment facilities and military training bases being converted into useful landscapes such as parks and recreation areas. These redevelopments bring broad benefits through revitalizing communities and increasing property values, thus, increasing the demand for comprehensive management and planning policies. This study examines changes in U.S. brownfield policies and programs and, identifies their periodic characteristics over the thirty years since the Superfund program was introduced in 1980. A descriptive and interpretive approach was utilized, focusing specifically on a time sequential analysis of the data gathered from the overview of the Environmental Protection Agency's web-based documents and related literature. The primary changes in and characteristics of programs and policies were analyzed and divided into three periods : environmental protection, remediation and reuse, and comprehensive planning. Four major features were identified: relaxation and readjustment of regulation, diversification of support programs, a mix of top-down and bottom-up approaches, and database system building. The study examines how common brownfield problems such as site identification difficulties and assessment and remediation cost have been dealt with in the regulatory context and has implications for future policies and programs for effective brownfield planning and management in Korea.

A Study on System Construction to the Product Liability Law-with focus on a small & medium business (제조물책임법에 대응하기 위한 시스템 구축에 관한 연구 -중소기업을 중심으로-)

  • Han, Min-Suk
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.6
    • /
    • pp.596-608
    • /
    • 2017
  • In 2002, the government arranged an institutional strategy to make it possible for a consumers to make a claim for damages caused by product defects against a business that produces and sells a product by enforcing the Product Liability Law(hereinafter referred to as 'PL'). On the other hand, due to the recent humidifier sterilizer accident, approximately 12 cases of related bills, such as a revised bill for the product liability law, have been proposed to the National Assembly at present in an effort to introduce the group action system and punitive compensation system for the purpose of the strengthening of the corporate product liability, and consumer damage relief. Ironically, as much as 62.6% of small & medium businesses, which are actual interested parties to this bill, are unaware of this. Many companies are responding to PL with the rationalization of document preparation & storage, clarification of responsibility relations with related business operators, and PL insurance policy purchase, or securing compensation funds as a means of Product Liability Defense(PLD), but the methods of preparation such as this leave much room for limits on the considerations of product design and product safety. This paper presents the individual management system model with more focus on product safety by looking into the clear concept of PL and the countermeasures against it, grasping the relevance between the PL system and individual management system, and integrating the PL response system in preparation for the PL. It is hoped that the result of this research objective will be evaluated as a rational countermeasure for small & medium businesses to respond effectively to the PL.

Develpment of Analysis and Evaluation Model for a bus Transit Route Network Design (버스 노선망 설계를 위한 평가모형 개발)

  • Han, Jong-Hak;Lee, Seung-Jae;Kim, Jong-Hyeong
    • Journal of Korean Society of Transportation
    • /
    • v.23 no.2
    • /
    • pp.161-172
    • /
    • 2005
  • This study is to develop Bus Transit Route Analysis and Evaluation Model that can product the quantitative performance measures for Bus Transit Route Network Design. So far, in Korea, there are no so many models that evaluate a variety of other performance measures or service quality that are of concern to both the transit users and operator because of lower-level bus database system and transit route network analysis algorithm's limit. The BTRAEM in this research differ from the previous approach in that the BTRAEM employs a multiple path transit trip assignment model that explicitly considers the transfer and different travel time after boarding. And we develop input-output data structure and quantitative performance measure for the BTRAEM. In the numerical experimental applying BTRAEM to Mandl transit network, We got the meaningful results on performance measure of bus transit route network. In the future, we expect BTRAEM to give a good solution in real transit network.

The Historical Status of "Cheonmyeong-Doseol" by Jeong Ji-wun (추만(秋巒) 정지운(鄭之雲) 저술(著述) 『천명도설(天命圖說)』의 사상사적(思想史的) 위상(位相))

  • Park, Sung-soon
    • (The)Study of the Eastern Classic
    • /
    • no.54
    • /
    • pp.253-288
    • /
    • 2014
  • A pen name Chuman(秋巒; a mountain of Fall), Jeong Ji-wun(1509-1561) is a famous person wrote "Cheonmyeong-Doseol" which made two men, Yi Hwang and Ki Dae-$s{\breve{u}}ng$ dispute Sachil-Nobyeon(traditional argument about heart/mind). But except this point, few people of nowadays know who Jeong Ji-wun was. Therefore this paper is made for understanding Jeong Ji-wun in the point of view in history of thought. "Cheonmyeong-Doseol" by Jeong Ji-wun had systemized traditional theory of Cheonil-Habil(sky and human are an organic body), through this theory, Jeong Ji-wun had taken an important role who developed the Neo-Confucian theory in the field of political thought at that time. All Neo-Confucian literati used the theory of heart/mind as a sole useful method in political field from after King Myeonjong and Seonjo. "Cheonmyeong-Doseol" by Jeong Ji-wun was a first step to this scene. Especially "Cheonmyeong-Doseol" was got famous by arguments of Yi Hwang and Ki $Dae-s{\breve{u}}ng$, great scholars in the history of Chosun Dynasty. They firstly developed Sachil-Nobyeon, Sandan(pure morality) comes from li, Chiljeong(emotions) comes from Ch'i, is it right or not? This argument with "Cheonmyeong-Doseol" raised up the level of Neo-Confucian theory at that time. Like this, "Cheonmyeong-Doseol" was on the first step for Neo-Confucian literati to study and develop their theory of political thought which covered politics in Chosun Dynasty.

A Study of Social Workers' Reflections on the Supportive Practice for Community Welfare Center Single Parent Self-Help Groups based on Participatory Action Research (지역사회복지관 한부모 자조집단 실천에 대한 사회복지사의 성찰 연구 -참여실행연구 자료를 중심으로)

  • Yang, Haewon;Choi, Jung Sook;Kim, Heesoo
    • Korean Journal of Family Social Work
    • /
    • no.62
    • /
    • pp.103-139
    • /
    • 2018
  • The purpose of this study was to explore the social workers' reflections developed during the participatory action research seeking practice methods in the community welfare center single parent self-help groups. Nine social workers and researchers sharing difficulties in the community welfare center single parent self-help group practice were involved in the participatory action research. We performed a circulatory research repeating 'plan-action-reflection-replan' cycles through ten sessions of research meetings including peer supervision in parallel with 4 self-help group practices. Multiple practice methods were derived as the result among which change in the social workers' perception was the key. We focused on the result that the social workers' perception was changed by reflections from participatory action research and the contents of the reflections were qualitatively analyzed using materials acquired during the study. As a result the following 5 themes were derived; 'recognition and worry on the lack of appropriate practice for the self-help group', 'specification of the social workers' role based on the changed perspective on the member-social worker relation', 'confirmation of the possibility of the concerned person initiated practice', 'detailed understanding of the single parent self-help group in the community welfare center', and 'renewed recognition of the development of the single parent self-help group in the community welfare center'. Based on these results, empowerment and reflection/reflective practice for single parent self-help group in the community welfare center were discussed.

A Phenomenological Study on Performance of Cultural Welfare Services (문화복지서비스 성과에 관한 현상학적 연구 - 서비스 이용자의 인식을 중심으로 -)

  • Yu, Young Ju
    • Korean Journal of Social Welfare Studies
    • /
    • v.44 no.3
    • /
    • pp.271-300
    • /
    • 2013
  • The objective of this study is to discover how the performance of service is perceived by those who receive the services. For the purpose of this study, perception on service performance is defined as "the perception of the changes in daily life as a result or in the course of using Cultural Welfare Services, i.e., the users' own perception of the tangible changes made through the community experience, the perception of others arising from interaction within the community, and the perception of future social relations or vision of the future." The study was conducted by using the qualitative research method of phenomenological approach aimed at understanding the essential aspects of interpersonal phenomena as they occur in a sociocultural context. The outcomes of the study that users' perception on performance of Cultural Welfare Services is principally "a process of enabling users who have hitherto led a life devoid of meaning and values to explore the opportunities of changing the course of life by awakening their cultural sensitivity." With regard to the essence of performance, which is a higher category, the analyses have led to the following findings: "perception of 'me' within the community", "emotional stability acquired in the course of task performance", "perception of a new 'me' through community activities", "perception of 'others' face to face with me", and "exploration of opportunities for a new life".

A Macro Attacks Detection Model Based on Trace Back Information (트레이스 백 정보에 기반한 매크로 공격 탐지 모델)

  • Baek, Yong Jin;Hong, Suk Won;Park, Jae Heung;Kang, Gyeong Won;Kim, Sang Bok
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.113-120
    • /
    • 2018
  • Today, the development of information and communication technology is rapidly increasing the number of users of network-based service, and enables real-time information sharing among users on the Internet. There are various methods in the information sharing process, and information sharing based on portal service is generally used. However, the process of information sharing serves as a cause of illegal activities in order to amplify the social interest of the relevant stakeholders. Public opinion attack using macro function can distort normal public opinion, so security measures are urgent. Therefore, security measures are urgently needed. Macro attacks are generally defined as attacks in which illegal users acquire multiple IP or ID to manipulate public opinion on the content of a particular web page. In this paper, we analyze network path information based on traceback for macro attack of a specific user, and then detect multiple access of the user. This is a macro attack when the access path information for a specific web page and the user information are matched more than once. In addition, when multiple ID is accessed for a specific web page in the same region, it is not possible to distort the overall public opinion on a specific web page by analyzing the threshold count value.

  • PDF