• Title/Summary/Keyword: 프로그램설계

Search Result 7,074, Processing Time 0.036 seconds

Analysis of the Influence of Role Models on College Students' Entrepreneurial Intentions: Exploring the Multiple Mediating Effects of Growth Mindset and Entrepreneurial Self-Efficacy (대학생 창업의지에 대한 롤모델의 영향 분석: 성장마인드셋과 창업자기효능감의 다중매개효과를 중심으로)

  • Jin Soo Maing;Sun Hyuk Kim
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.18 no.5
    • /
    • pp.17-32
    • /
    • 2023
  • The entrepreneurial activities of college students play a significant role in modern economic and social development, particularly as a solution to the changing economic landscape and youth unemployment issues. Introducing innovative ideas and technologies into the market through entrepreneurship can contribute to sustainable economic growth and social value. Additionally, the entrepreneurial intentions of college students are shaped by various factors, making it crucial to deeply understand and appropriately support these elements. To this end, this study systematically explores the importance and impact of role models through a multiple serial mediation analysis. Through a survey of 300 college students, the study analyzed how two psychological variables, growth mindset and entrepreneurial self-efficacy, mediate the influence of role models on entrepreneurial intentions. The presence and success stories of role models were found to enhance the growth mindset of college students, which in turn boosts their entrepreneurial self-efficacy and ultimately strengthens their entrepreneurial intentions. The analysis revealed that exposure to role models significantly influences the formation of a growth mindset among college students. This mindset fosters a positive attitude towards viewing challenges and failures in entrepreneurship as learning opportunities. Such a mindset further enhances entrepreneurial self-efficacy, thereby strengthening the intention to engage in entrepreneurial activities. This research offers insights by integrating various theories, such as mindset theory and social learning theory, to deeply understand the complex process of forming entrepreneurial intentions. Practically, this study provides important guidelines for the design and implementation of college entrepreneurship education. Utilizing role models can significantly enhance students' entrepreneurial intentions, and educational programs can strengthen students' growth mindset and entrepreneurial self-efficacy by sharing entrepreneurial experiences and knowledge through role models. In conclusion, this study provides a systematic and empirical analysis of the various factors and their complex interactions that impact the entrepreneurial intentions of college students. It confirms that psychological factors like growth mindset and entrepreneurial self-efficacy play a significant role in shaping entrepreneurial intentions, beyond mere information or technical education. This research emphasizes that these psychological factors should be comprehensively considered when developing and implementing policies and programs related to college entrepreneurship education.

  • PDF

The Influence of Self-Leadership of Research and Development Practitioners on Innovative Behavior via Job Satisfaction : A Comparison between Manufacturing and ICT Industries (국내 기업 연구개발 종사자의 셀프리더십이 직무만족을 매개로 혁신행동에 미치는 영향 : 제조업과 정보통신업 비교)

  • Choi, Min-seog;Hwang, Chan-gyu
    • Journal of Venture Innovation
    • /
    • v.7 no.1
    • /
    • pp.91-110
    • /
    • 2024
  • In this study, we compared and analyzed the influence of self-leadership on innovative behavior and the mediating effect of job satisfaction among R&D practitioners in manufacturing and information communication technology (ICT) industries. To accomplish this, we conducted an online survey using random sampling methods and collected data from 209 respondents. We employed exploratory factor analysis, reliability analysis, correlation analysis, multiple regression analysis, and mediation analysis using SPSS 20.0 software to analyze the data and to compare differences between the manufacturing and ICT sectors. The research findings are as follows: Firstly, both in manufacturing and ICT sectors, self-leadership showed significant positive correlations with job satisfaction and innovative behavior. Secondly, in the analysis of the impact of self-leadership on innovative behavior, in the manufacturing sector, only natural reward strategy and constructive thought strategy showed significant positive effects, while in the ICT sector, behavioral-oriented strategy, natural reward strategy, and constructive thought strategy all showed significant positive effects. Thirdly, in the analysis of the impact of self-leadership on job satisfaction, in the manufacturing sector, only natural reward strategy and constructive thought strategy showed significant positive effects, while in the ICT sector, behavioral-oriented strategy and natural reward strategy showed significant positive effects. Fourthly, in the analysis of the impact of job satisfaction on innovative behavior, significant positive effects were observed in both manufacturing and ICT sectors, with manufacturing sector having relatively greater impact than ICT sector. Lastly, the results of the analysis on the mediating effect of job satisfaction indicate that in the manufacturing sector, only a constructive thinking strategy significantly influences, showing partial mediating effects. However, in the ICT sector, no mediating effects of job satisfaction were observed for any sub-factors of self-leadership. These research findings highlight differences in the mechanisms of action of self-leadership on innovative behavior and its mediating effects between the manufacturing and ICT sectors. Furthermore, the results suggest the importance of improving organizational strategies and culture towards promoting leadership, job design, and job satisfaction, considering the characteristics of each industry and research and development organization.

Association between adolescents lifestyle habits and smoking experience: Focusing on comparison between experienced and non-experienced smokers (청소년의 생활습관과 흡연경험의 연관성: 흡연경험자와 비경험자의 비교 중심으로)

  • Seri Kang;Kyunghee Lee;Sangok Cho
    • The Journal of Korean Society for School & Community Health Education
    • /
    • v.25 no.2
    • /
    • pp.27-44
    • /
    • 2024
  • Objectives: This study aimed to provide foundational data for preventing adolescents smoking by analyzing the relationship between adolescents' lifestyles and smoking experiences and identifying influencing factors. Methods: Secondary data analysis was conducted using the 17th (2021) Youth Health Behavior Survey data, encompassing 54,848 students from 796 schools. Variables included general characteristics, smoking status, lifestyle habits, physical activity, sleep patterns, and stress perception. Frequency analysis was used to examine general characteristics, while further analysis employed frequency analysis and the Pearson Chi-square test to compare lifestyle differences based on smoking presence. Multinomial logistic regression analysis was employed to determine factors influencing smoking experience, with IBM SPSS Statistics 28 used for all analyses at a significance level of p<.05. Results: Analysis revealed with general characteristics that the group with smoking experience exhibited a higher proportion of male students (67.4%) compared to the non-smoking group (50.1%) (p<.001). Analysis revealed that the smoking group was more likely to skip breakfast (27.7%), not consume fruit (17.8%), and consume fast food more than three times daily (0.9%). Furthermore, a higher percentage of smokers engaged in 60 minutes or more of breathless physical activity (8.4%) seven times a week, reported insufficient fatigue recovery through sleep (21.6%), and experienced very severe normal stress (17.2%) (p<.001). Analysis of the relationship between lifestyle and smoking indicated increased likelihood of smoking with zero breakfast consumption (OR=1.759, p<.001) and increased fruit consumption (OR=1.921, p<.001), while zero fast food consumption decreased smoking likelihood (OR=0.206, p<.001). Adequate sleep-related fatigue recovery reduced smoking likelihood (OR=0.458, p<.001), whereas increased stress elevated it (OR=1.260, p<.05). Conclusion: Adolescents' lifestyle habits significantly correlated with their smoking experiences, highlighting the necessity of considering lifestyle factors in smoking prevention strategies. This study provides crucial insights for promoting healthy lifestyle changes to prevent smoking among youth.

The Effect of SBAR based Simulation Practice on Reporting Confidence, Communicative Competence, Nursing Competence, and Debriefing Satisfaction in Nursing Students (SBAR 기반 시뮬레이션실습이 간호대학생의 보고자신감, 의사소통능력, 간호역량 및 디브리핑 만족도에 미치는 효과)

  • Mi-Ma Park;Eun-Sun Shin
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.703-711
    • /
    • 2024
  • This study attempted to verify the effect of SBAR-based simulation practice on reporting confidence, communicative competence, nursing competence and debriefing satisfaction of nursing students. This study included 46 students who took the simulation practice course for third-year nursing students at one universities located in one region, The data were collected from October 30 to December 22, 2023 using a self-report questionnaire before and after simulation practice, and is a one group pretest-posttest design study. Data analysis was performed using SPSS/WIN version 26.0 program using frequency analysis, descriptive statistics, Shapiro-Wilk test, and Paired t-test. As a result of the study, the average of the reporting confidence was 5.79±1.47 before the training and 7.13±1.56 after the training, the communicative competence was 3.62±0.44 before the training and the average after the training was 4.34±0.67, the nursing competence was 2.64±0.39 before the training and 3.26±0.51 after the training, and the debriefing satisfaction was 3.57±0.51 before the training and 4.18±0.58 after the training. There was a statistically significant difference in reporting confidence(t=2.84, p=.006), communicative competence(t=-3.28, p=.001), nursing competence(t=-8.16, p<.001), debriefing satisfaction(t=2.72, p<.001) before and after SBAR-based simulation practice. Based on the results of this study, it is thought that communication education using SBAR to nursing students should be systematically carried out from the lower grade curriculum, and it is necessary to strengthen and expand reporting education using SBAR communication in various practice situations as well as simulation practical education to improve nursing competency.

Analyzing the Socio-Ecological System of Bees to Suggest Strategies for Green Space Planning to Promote Urban Beekeeping (꿀벌의 사회생태시스템 분석을 통한 도시 양봉 활성화 녹지 계획 전략 제시)

  • Choi, Hojun;Kim, Min;Chon, Jinhyung
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.52 no.1
    • /
    • pp.46-58
    • /
    • 2024
  • Pollinators are organisms that carry out the pollination process of plants and include Hymenoptera, Lepidoptera, Diptera, and Coleoptera. Among them, bees not only pollinate plants but also improve urban green spaces damaged by land use changes, providing a habitat and food for birds and insects. Today, however, the number of pollinating plants is decreasing due to issues such as early flowering due to climate change, fragmentation of green spaces due to urbanization, and pesticide use, which in turn leads to a decline in bee populations. The decline of bee populations directly translates into problems, such as reduced biodiversity in cities and decreased food production. Urban beekeeping has been proposed as a strategy to address the decline of bee populations. However, there is a problem asurban beekeeping strategies are proposed without considering the complex structure of the socio-ecological system consisting of bees foraging and pollination activities and are therefore unsustainable. Therefore, this study aims to analyze the socio-ecological system of honeybees, which are pollinators, structurally using system thinking and propose a green space planning strategy to revitalize urban beekeeping. For this study, previous studies that centered on the social and ecological system of bees in cities were collected and reviewed to establish the system area and derive the main variables for creating a causal loop diagram. Second, the ecological structure of bees' foraging and pollination activities and the structure of bees' ecological system in the city were analyzed, as was the social-ecological system structure of urban beekeeping by creating an individual causal loop diagram. Finally, the socio-ecological system structure of honey bees was analyzed from a holistic perspective through the creation of an integrated causal loop diagram. Citizen participation programs, local government investment, and the creation of urban parks and green spaces in idle spaces were suggestedas green space planning strategies to revitalize urban beekeeping. The results of this study differ from previous studies in that the ecological structure of bees and the social structure of urban beekeeping were analyzed from a holistic perspective using systems thinking to propose strategies, policy recommendations, and implications for introducing sustainable urban beekeeping.

Implementing RPA for Digital to Intelligent(D2I) (디지털에서 인텔리전트(D2I)달성을 위한 RPA의 구현)

  • Dong-Jin Choi
    • Information Systems Review
    • /
    • v.21 no.4
    • /
    • pp.143-156
    • /
    • 2019
  • Types of innovation can be categorized into simplification, information, automation, and intelligence. Intelligence is the highest level of innovation, and RPA can be seen as one of intelligence. Robotic Process Automation(RPA), a software robot with artificial intelligence, is an example of intelligence that is suited for simple, repetitive, large-scale transaction processing tasks. The RPA, which is already in operation in many companies in Korea, shows what needs to be done to naturally focus on the core tasks in a situation where the need for a strong organizational culture is increasing and the emphasis is on voluntary leadership, strong teamwork and execution, and a professional working culture. The introduction was considered naturally according to the need to find. Robotic Process Automation, or RPA, is a technology that replaces human tasks with the goal of quickly and efficiently handling structural tasks. RPA is implemented through software robots that mimic humans using software such as ERP systems or productivity tools. RPA robots are software installed on a computer and are called robots by the principle of operation. RPA is integrated throughout the IT system through the front end, unlike traditional software that communicates with other IT systems through the back end. In practice, this means that software robots use IT systems in the same way as humans, repeat the correct steps, and respond to events on the computer screen instead of communicating with the system's application programming interface(API). Designing software that mimics humans to communicate with other software can be less intuitive, but there are many advantages to this approach. First, you can integrate RPA with virtually any software you use, regardless of your openness to third-party applications. Many enterprise IT systems are proprietary because they do not have many common APIs, and their ability to communicate with other systems is severely limited, but RPA solves this problem. Second, RPA can be implemented in a very short time. Traditional software development methods, such as enterprise software integration, are relatively time consuming, but RPAs can be implemented in a relatively short period of two to four weeks. Third, automated processes through software robots can be easily modified by system users. While traditional approaches require advanced coding techniques to drastically modify how they work, RPA can be instructed by modifying relatively simple logical statements, or by modifying screen captures or graphical process charts of human-run processes. This makes RPA very versatile and flexible. This RPA is a good example of the application of digital to intelligence(D2I).

Violations of Information Security Policy in a Financial Firm: The Difference between the Own Employees and Outsourced Contractors (금융회사의 정보보안정책 위반요인에 관한 연구: 내부직원과 외주직원의 차이)

  • Jeong-Ha Lee;Sang-Yong Tom Lee
    • Information Systems Review
    • /
    • v.18 no.4
    • /
    • pp.17-42
    • /
    • 2016
  • Information security incidents caused by authorized insiders are increasing in financial firms, and this increase is particularly increased by outsourced contractors. With the increase in outsourcing in financial firms, outsourced contractors having authorized right has become a threat and could violate an organization's information security policy. This study aims to analyze the differences between own employees and outsourced contractors and to determine the factors affecting the violation of information security policy to mitigate information security incidents. This study examines the factors driving employees to violate information security policy in financial firms based on the theory of planned behavior, general deterrence theory, and information security awareness, and the moderating effects of employee type between own employees and outsourced contractors. We used 363 samples that were collected through both online and offline surveys and conducted partial least square-structural equation modeling and multiple group analysis to determine the differences between own employees (246 samples, 68%) and outsourced contractors (117 samples, 32%). We found that the perceived sanction and information security awareness support the information security policy violation attitude and subjective norm, and the perceived sanction does not support the information security policy behavior control. The moderating effects of employee type in the research model were also supported. According to the t-test result between own employees and outsourced contractors, outsourced contractors' behavior control supported information security violation intention but not subject norms. The academic implications of this study is expected to be the basis for future research on outsourced contractors' violation of information security policy and a guide to develop information security awareness programs for outsourced contractors to control these incidents. Financial firms need to develop an information security awareness program for outsourced contractors to increase the knowledge and understanding of information security policy. Moreover, this program is effective for outsourced contractors.

The Benefit of Individualized Custom Bolus in the Postmastectomy Radiation Therapy : Numerical Analysis with 3-D Treatment Planning (유방전절제술 후 방사선치료를 위한 조직보상체 개발 및 3차원 치료계획을 통한 유용성 분석)

  • Cho Jae Ho;Cho Kwang Hwan;Keum Kichang;Han Yongyih;Kim Yong Bae;Chu Sung Sil;Suh Chang Ok
    • Radiation Oncology Journal
    • /
    • v.21 no.1
    • /
    • pp.82-93
    • /
    • 2003
  • Purpose : To reduce the Irradiation dose to the lungs and heart in the case of chest wail irradiation using an oppositional electron beam, we used an Individualized custom bolus, which was precisely designed to compensate for the differences In chest wall thickness. The benefits were evaluated by comparing the normal tissue complication probablilties (NTCPS) and dose statistics both with and without boluses. Materials and Methods : Boluses were made, and their effects evaluated in ten patients treated using the reverse hockey-stick technique. The electron beam energy was determined so as to administer 80% of the irradiation prescription dose to the deepest lung-chest wall border, which was usually located at the internal mammary lymph node chain. An individualized custom bolus was prepared to compensate for a chest wall thinner than the prescription depth by meticulously measuring the chest wall thickness at 1 emf intervals on the planning CT Images. A second planning CT was obtained overlying the individuailzed custom bolus for each patient's chest wall. 3-D treatment planning was peformed using ADAC-Pinnacle$^{3}$ for all patients with and without bolus. NTCPS based on 'the Lyman-Kutcher' model were analyzed and the mean, maximum, minimum doses, V$_{50}$ and V$_{95}$ for 4he heari and lungs were computed. Results .The average NTCPS in the ipsliateral lung showed a statistically significant reduction (p<0.01), from 80.2${\pm}$3.43% to 47.7${\pm}$4.61%, with the use of the individualized custom boluses. The mean lung irradiation dose to the ipsilateral iung was also significantly reduced by about 430 cGy, Trom 2757 cGy to 2,327 cGy (p<0.01). The V$_{50}$ and V$_{95}$ in the ipsilateral lung markedly decreased from the averages of 54.5 and 17.4% to 45.3 and 11.0%, respectively. The V$_{50}$ and V$_{95}$ In the heart also decreased from the averages of 16.8 and 6.1% to 9.8% and 2.2%, respectively. The NTCP In the contralateral lung and the heart were 0%, even for the cases with no bolus because of the small effective mean radiation volume values of 4.4 and 7.1%, respectively Conclusion : The use of an Individualized custom bolus in the radiotherapy of postrnastectorny chest wall reduced the NTCP of the ipsilateral lung by about 24.5 to 40.5%, which can improve the complication free cure probability of breast cancer patients.

Medical Information Dynamic Access System in Smart Mobile Environments (스마트 모바일 환경에서 의료정보 동적접근 시스템)

  • Jeong, Chang Won;Kim, Woo Hong;Yoon, Kwon Ha;Joo, Su Chong
    • Journal of Internet Computing and Services
    • /
    • v.16 no.1
    • /
    • pp.47-55
    • /
    • 2015
  • Recently, the environment of a hospital information system is a trend to combine various SMART technologies. Accordingly, various smart devices, such as a smart phone, Tablet PC is utilized in the medical information system. Also, these environments consist of various applications executing on heterogeneous sensors, devices, systems and networks. In these hospital information system environment, applying a security service by traditional access control method cause a problems. Most of the existing security system uses the access control list structure. It is only permitted access defined by an access control matrix such as client name, service object method name. The major problem with the static approach cannot quickly adapt to changed situations. Hence, we needs to new security mechanisms which provides more flexible and can be easily adapted to various environments with very different security requirements. In addition, for addressing the changing of service medical treatment of the patient, the researching is needed. In this paper, we suggest a dynamic approach to medical information systems in smart mobile environments. We focus on how to access medical information systems according to dynamic access control methods based on the existence of the hospital's information system environments. The physical environments consist of a mobile x-ray imaging devices, dedicated mobile/general smart devices, PACS, EMR server and authorization server. The software environment was developed based on the .Net Framework for synchronization and monitoring services based on mobile X-ray imaging equipment Windows7 OS. And dedicated a smart device application, we implemented a dynamic access services through JSP and Java SDK is based on the Android OS. PACS and mobile X-ray image devices in hospital, medical information between the dedicated smart devices are based on the DICOM medical image standard information. In addition, EMR information is based on H7. In order to providing dynamic access control service, we classify the context of the patients according to conditions of bio-information such as oxygen saturation, heart rate, BP and body temperature etc. It shows event trace diagrams which divided into two parts like general situation, emergency situation. And, we designed the dynamic approach of the medical care information by authentication method. The authentication Information are contained ID/PWD, the roles, position and working hours, emergency certification codes for emergency patients. General situations of dynamic access control method may have access to medical information by the value of the authentication information. In the case of an emergency, was to have access to medical information by an emergency code, without the authentication information. And, we constructed the medical information integration database scheme that is consist medical information, patient, medical staff and medical image information according to medical information standards.y Finally, we show the usefulness of the dynamic access application service based on the smart devices for execution results of the proposed system according to patient contexts such as general and emergency situation. Especially, the proposed systems are providing effective medical information services with smart devices in emergency situation by dynamic access control methods. As results, we expect the proposed systems to be useful for u-hospital information systems and services.

An Ontology Model for Public Service Export Platform (공공 서비스 수출 플랫폼을 위한 온톨로지 모형)

  • Lee, Gang-Won;Park, Sei-Kwon;Ryu, Seung-Wan;Shin, Dong-Cheon
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.1
    • /
    • pp.149-161
    • /
    • 2014
  • The export of domestic public services to overseas markets contains many potential obstacles, stemming from different export procedures, the target services, and socio-economic environments. In order to alleviate these problems, the business incubation platform as an open business ecosystem can be a powerful instrument to support the decisions taken by participants and stakeholders. In this paper, we propose an ontology model and its implementation processes for the business incubation platform with an open and pervasive architecture to support public service exports. For the conceptual model of platform ontology, export case studies are used for requirements analysis. The conceptual model shows the basic structure, with vocabulary and its meaning, the relationship between ontologies, and key attributes. For the implementation and test of the ontology model, the logical structure is edited using Prot$\acute{e}$g$\acute{e}$ editor. The core engine of the business incubation platform is the simulator module, where the various contexts of export businesses should be captured, defined, and shared with other modules through ontologies. It is well-known that an ontology, with which concepts and their relationships are represented using a shared vocabulary, is an efficient and effective tool for organizing meta-information to develop structural frameworks in a particular domain. The proposed model consists of five ontologies derived from a requirements survey of major stakeholders and their operational scenarios: service, requirements, environment, enterprise, and county. The service ontology contains several components that can find and categorize public services through a case analysis of the public service export. Key attributes of the service ontology are composed of categories including objective, requirements, activity, and service. The objective category, which has sub-attributes including operational body (organization) and user, acts as a reference to search and classify public services. The requirements category relates to the functional needs at a particular phase of system (service) design or operation. Sub-attributes of requirements are user, application, platform, architecture, and social overhead. The activity category represents business processes during the operation and maintenance phase. The activity category also has sub-attributes including facility, software, and project unit. The service category, with sub-attributes such as target, time, and place, acts as a reference to sort and classify the public services. The requirements ontology is derived from the basic and common components of public services and target countries. The key attributes of the requirements ontology are business, technology, and constraints. Business requirements represent the needs of processes and activities for public service export; technology represents the technological requirements for the operation of public services; and constraints represent the business law, regulations, or cultural characteristics of the target country. The environment ontology is derived from case studies of target countries for public service operation. Key attributes of the environment ontology are user, requirements, and activity. A user includes stakeholders in public services, from citizens to operators and managers; the requirements attribute represents the managerial and physical needs during operation; the activity attribute represents business processes in detail. The enterprise ontology is introduced from a previous study, and its attributes are activity, organization, strategy, marketing, and time. The country ontology is derived from the demographic and geopolitical analysis of the target country, and its key attributes are economy, social infrastructure, law, regulation, customs, population, location, and development strategies. The priority list for target services for a certain country and/or the priority list for target countries for a certain public services are generated by a matching algorithm. These lists are used as input seeds to simulate the consortium partners, and government's policies and programs. In the simulation, the environmental differences between Korea and the target country can be customized through a gap analysis and work-flow optimization process. When the process gap between Korea and the target country is too large for a single corporation to cover, a consortium is considered an alternative choice, and various alternatives are derived from the capability index of enterprises. For financial packages, a mix of various foreign aid funds can be simulated during this stage. It is expected that the proposed ontology model and the business incubation platform can be used by various participants in the public service export market. It could be especially beneficial to small and medium businesses that have relatively fewer resources and experience with public service export. We also expect that the open and pervasive service architecture in a digital business ecosystem will help stakeholders find new opportunities through information sharing and collaboration on business processes.