• Title/Summary/Keyword: 통제

Search Result 7,101, Processing Time 0.032 seconds

A study on the effect of control among international joint venture partners on knowledge sharing and cooperation and joint venture performance (국제합작투자사업 파트너간 통제가 지식공유와 협력 및 합작사업성과에 미치는 영향에 관한 연구)

  • lee, Won-hee
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2022.07a
    • /
    • pp.371-372
    • /
    • 2022
  • 본 연구는 국제 합작투자사업 참여 기업들을 대상으로 국제합작투자 사업에서의 합작사업 파트너 기업 간 통제가 합작투자사업참여 파트너간 지식공유 및 협력과 합작사업성과에 어떠한 영향을 주는지를 살펴보고자 하는 실증연구이다. 본 연구에서는 국제합작사업 참여기업간 통제를 과정통제와 산출통제로 구분하여 통제유형별로 분석하고자 한다. 이를 위해 본 연구에서는 구조방정식을 이용하여 합작투자사업 참여 파트너간 통제유형별로 지식공유와 협력 및 합작사업성과에 어떠한 유의한 영향을 미치는지 실증분석을 통하여 알아보고자 한다.

  • PDF

A study on the Influence of Control on Tie Strength and joint venture Performance (국제합작사업 참여기업 간 통제가 유대강도 및 합작성과에 미치는 영향에 관한 연구)

  • Lee, Won-Hee;Yang, Dal-Nim
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.01a
    • /
    • pp.87-88
    • /
    • 2020
  • 본 연구는 국내 ICT산업에서 국제합작투자 기업들을 대상으로 합작사업 참여기업 간 통제유형에 따라 참여기업간 유대강도 및 합작 성과에 어떠한 영향을 주는지를 살펴보고자 하는 실증연구이다. 본 연구에서는 통제유형별(산출통제(Output Control), 과정통제(Process Control), 사회적통제(Social Control))로 국제합작사업 참여기업 간 유대강도에 및 합작성과에 어떠한 유의한 영향을 미치며 또한, 국내 ICT산업에서 국제합작사업에 참여하는 기업들의 특징을 실증분석을 통하여 알아보고자 한다.

  • PDF

A study for Internal Accounting Control Based on Computerized Accounting Information System (전산화된 회계정보시스템의 내부회계통제의 운영방안에 관한 연구)

  • 손명철
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.10
    • /
    • pp.1355-1364
    • /
    • 2001
  • Internal control comprises the plan of Organization and all of the coordinate methods and measure adopted within a business to safeguard its assets. check the accuracy and reliability of its accounting data, promote operation efficiency, and encourage adherence to prescribed managerial policies. Internal accounting control is classified into General Control and Application Control. Essential elements of internal accounting control as follows : 1. General Control $\circled1$ Organization and operation controls. $\circled2$ System development and Documentation controls. $\circled3$ Hardware controls. $\circled4$ Software and hardware Accessibility controls. $\circled5$ General systems security and protection 2. Application control $\circled1$Input control. $\circled2$ Processing control. $\circled3$ Output control. Internal accounting control can establish a total management information system by connecting with mana-gement control of a company, and enable decision makers to establish decision support system(DSS), is so vital today.

  • PDF

The Analysis of the Ability to Control Variables and the Types of Controlling Variables by Junior High School Students (중학생들의 변인 통제 논리력과 변인 통제 유형 분석)

  • Lee, Yoon-Ha;Kang, Soon-Hee
    • Journal of The Korean Association For Science Education
    • /
    • v.31 no.1
    • /
    • pp.32-47
    • /
    • 2011
  • The purpose of this study was to analyze the ability to control variables and the ways by which variables are controlled. First, the assessment criteria for evaluating the students' ability to control variables were developed for 8th grade students. Second, the ways variables are controlled were classified from student activity reports. These students' answers were categorized into six types (type A~ type F). Type A is defined as the group that excelled in recognizing the importance of controlling variables, eliminating unnecessary variables and identifying manipulated, dependent and controlled variables. Third, the scores of ability to control variables (CV score) and the classroom test of scientific reasoning (Lawson SRT) scores were measured. The results indicated that the CV score was highly correlated with Lawson SRT scores (r=.67, p<.01). Therefore, the assessment criteria developed in this study was used to evaluate the ability to control variables (CV score) and to measure the students' scientific reasoning.

Application of Control Variable with Routing Probability to Queueing Network Simulation (대기행렬 네트워크 시뮬레이션에서 분지확률 통제변수의 응용)

  • Kwon, Chi-Myung;Lim, Sang-Gyu
    • Journal of the Korea Society for Simulation
    • /
    • v.21 no.3
    • /
    • pp.71-78
    • /
    • 2012
  • This research discusses the application of the control variables to achieve a more precise estimation for the target response in queueing network simulation. The efficiency of control variable method in estimating the response depends upon how we choose a set of control variables strongly correlated with the response and how we construct a function of selected control variables. For a class of queuing network simulations, the random variables that drive the simulation are basically the service-time and routing probability random variables. Most of applications of control variable method focus on utilization of the service time random variables for constructing a controlled estimator. This research attempts to suggest a controlled estimator which uses these two kinds of random variables and explore the efficiency of these estimators in estimating the reponses for computer network system. Simulation experiments on this model show the promising results for application of routing probability control variables. We consider the applications of the routing probability control variables to various simulation models and combined control variables using information of service time and routing probability together in constructing a control variable as future researches.

An Access Control Security Architecture for Secure Operating System supporting Flexible Access Control (유연한 접근통제를 제공하는 보안 운영체제를 위한 접근통제 보안구조)

  • Kim Jung-Sun;Kim Min-Soo;No Bong-Nam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.2
    • /
    • pp.55-70
    • /
    • 2006
  • In this paper, we propose a new access control security architecture for supporting flexibility in Secure Operating Systems. By adding virtual access control system layer to the proposed security architecture, various access control models such as MAC, DAC, and RBAC can be applied to Secure Operating Systems easily. The proposed security architecture is designed to overcome the problem of Linux system's base access control system. A policy manager can compose various security models flexibly and apply them to Operating Systems dynamically. Also, the proposed architecture is composed of 3 modules such as access control enforcement, access control decision, and security control. And access control models are abstracted to hierarchy structure by virtual access control system. And, we present the notation of policy conflict and its resolution method by applying various access control model.

A Study on Development Proposals for Korea's Export Control System (우리나라 수출통제 법제의 발전방안에 관한 연구)

  • Kang, Ho
    • Korea Trade Review
    • /
    • v.43 no.3
    • /
    • pp.75-100
    • /
    • 2018
  • This study is designed to examine international export control norms, analyze current national export control system and identify the problems thereof, presenting several proposals for development in the system. The Republic of Korea, as a signatory of non-proliferation treaties and multilateral export control regimes, is obligated to comply with the international non-proliferation and export control norms, irregardless of hard or soft laws. Korea's export control system has been implemented in earnest since 2005; however, it contains serious problems in terms of the legal system and objectives of relevant laws and regulations, terms and definitions of the items subject to export controls, catch-all requirements, brokering license, response to the U.S. re-export controls, and so on. Proposals for development in the system include (i) enacting an independent law integrating the current dual-use items export control law and regulations, (ii) making use of the term of "strategic items" as a uniform terminology replacing 'goods etc.', 'strategic goods(inclusive of technology)', 'strategic goods, etc.', 'WMD, etc.' so as to preclude any possibility of misunderstanding, (iii) rewriting the catch-all control requirements, (iv) introducing registration system of brokering firms, (v) including provisions to comply with U.S. reexport controls, and (vi) providing stakeholder with correct and full information on export controls.

  • PDF