• Title/Summary/Keyword: 흐름 정보

Search Result 3,313, Processing Time 0.03 seconds

Are you a Machine or Human?: The Effects of Human-likeness on Consumer Anthropomorphism Depending on Construal Level (Are you a Machine or Human?: 소셜 로봇의 인간 유사성과 소비자 해석수준이 의인화에 미치는 영향)

  • Lee, Junsik;Park, Do-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • v.27 no.1
    • /
    • pp.129-149
    • /
    • 2021
  • Recently, interest in social robots that can socially interact with humans is increasing. Thanks to the development of ICT technology, social robots have become easier to provide personalized services and emotional connection to individuals, and the role of social robots is drawing attention as a means to solve modern social problems and the resulting decline in the quality of individual lives. Along with the interest in social robots, the spread of social robots is also increasing significantly. Many companies are introducing robot products to the market to target various target markets, but so far there is no clear trend leading the market. Accordingly, there are more and more attempts to differentiate robots through the design of social robots. In particular, anthropomorphism has been studied importantly in social robot design, and many approaches have been attempted to anthropomorphize social robots to produce positive effects. However, there is a lack of research that systematically describes the mechanism by which anthropomorphism for social robots is formed. Most of the existing studies have focused on verifying the positive effects of the anthropomorphism of social robots on consumers. In addition, the formation of anthropomorphism of social robots may vary depending on the individual's motivation or temperament, but there are not many studies examining this. A vague understanding of anthropomorphism makes it difficult to derive design optimal points for shaping the anthropomorphism of social robots. The purpose of this study is to verify the mechanism by which the anthropomorphism of social robots is formed. This study confirmed the effect of the human-likeness of social robots(Within-subjects) and the construal level of consumers(Between-subjects) on the formation of anthropomorphism through an experimental study of 3×2 mixed design. Research hypotheses on the mechanism by which anthropomorphism is formed were presented, and the hypotheses were verified by analyzing data from a sample of 206 people. The first hypothesis in this study is that the higher the human-likeness of the robot, the higher the level of anthropomorphism for the robot. Hypothesis 1 was supported by a one-way repeated measures ANOVA and a post hoc test. The second hypothesis in this study is that depending on the construal level of consumers, the effect of human-likeness on the level of anthropomorphism will be different. First, this study predicts that the difference in the level of anthropomorphism as human-likeness increases will be greater under high construal condition than under low construal condition.Second, If the robot has no human-likeness, there will be no difference in the level of anthropomorphism according to the construal level. Thirdly,If the robot has low human-likeness, the low construal level condition will make the robot more anthropomorphic than the high construal level condition. Finally, If the robot has high human-likeness, the high construal levelcondition will make the robot more anthropomorphic than the low construal level condition. We performed two-way repeated measures ANOVA to test these hypotheses, and confirmed that the interaction effect of human-likeness and construal level was significant. Further analysis to specifically confirm interaction effect has also provided results in support of our hypotheses. The analysis shows that the human-likeness of the robot increases the level of anthropomorphism of social robots, and the effect of human-likeness on anthropomorphism varies depending on the construal level of consumers. This study has implications in that it explains the mechanism by which anthropomorphism is formed by considering the human-likeness, which is the design attribute of social robots, and the construal level of consumers, which is the way of thinking of individuals. We expect to use the findings of this study as the basis for design optimization for the formation of anthropomorphism in social robots.

A Study on the Influence of Workers' Aspiration for Academic Needs on Participation in University Education (근로자의 학업욕구 열망이 대학교육 참여에 미치는 영향에 관한 연구)

  • Lee, Ji-Hun;Mun, Bok-Hyun
    • Journal of Korea Entertainment Industry Association
    • /
    • v.15 no.3
    • /
    • pp.231-241
    • /
    • 2021
  • This study intended to present strategies and implications for attracting new students and customized education to university officials through research on the participation of workers' academic aspirations in university education. Thus, variables were derived by analyzing prior data, and causal settings between variables and questionnaires were developed. Subject to the survey, 331 workers interested in participating in university education were collected through interpersonal interviews. The collected data were dataized, and reliability and feasibility verification and frequency analysis were conducted. Finally, we validate the fit of the structural equation model and the causal relationship for each concept. Therefore, the results of the validation show the following implications. First, university officials should be motivated by a mentor and mentee system with experienced people who have switched to a suitable vocational group through university education. It will also be necessary to develop and disseminate programs so that they can continue to develop themselves for the future. To this end, it will be necessary to help them understand their aptitude and strengths through consultation with experts. Second, university officials should strengthen public relations so that prospective students can know the cases and information of the job transformation of the admitted workers through recommendations. It will also be necessary to develop university education programs that can self-develop, accept various ideas through "public contest", and provide accurate information about university education to workers through re-processing. Third, university officials should provide workers with a program that allows them to catch two rabbits: job transformation and self-improvement through university education. In other words, it is necessary to stimulate the motivation of workers by providing various information such as visiting advanced overseas companies, obtaining various certificates, moving between departments of blue-collar and white-collar, and transfer opportunities. Fourth, university officials should actively promote university education programs related to this by participating in university education and receiving systematic education and the flow of social environment. Finally, university officials will need to consult and promote workers so that they can self-develop when they participate in college education, and they will have to figure out what they need for self-development through demand surveys and analysis.

A The Visualization of Semantic Context in the Film (영화 <이다>에 나타난 의미적 맥락의 시각화)

  • Kim, Tae-Kyue;Kim, Kyu-Nam
    • Journal of Korea Entertainment Industry Association
    • /
    • v.15 no.8
    • /
    • pp.145-159
    • /
    • 2021
  • is a contemporary experimental film that forms ambiguity in the narrative and the psychological motivation of the characters, destroys linear temporality, and reminds of manipulation possibilities in digital images through varied techniques, and it carries implication by the fact that the transformation process of human subjects and self-awareness are connected to social trauma and makes way to infer by comparing it to the historical contexts of other nations or societies. centers on the space outside the screen, absent space, and the intrinsic meaning within the space and the frame and shares the information in the visible space and the space outside the screen and arouses an active perceptual process so that the audience can deduce the information that is not presented. The film visualized the historical meaning without describing the background of the times in detail and aimed to express the conflicts and worries between the god, a transcendental existence, with humans, which are marginal beings, within the conflicting structure among humans. Moreover, attempted to resolve the sadness of loss and absence through the spatial aesthetics and the film presented the progression of the situation through the contrast of the characters and also the comparison between light and darkness. This study intends to make an attempt of interpreting the realm involving personal (characters) stories and the social and historical backgrounds together with the religious sphere and discuss the visualization of the semantic context. In addition, this study analyzed the sequence of the scenes in , which reconstructs identity and historical cases and religious values to observe the meaning and characteristics and closely analyze the general meaning pursued by the film. discussed the issues of trauma that individuals, regions, and nations confront as a representation and interpretation of the trauma connoted in the film, and consideration can be provided about the implication concerning the situation and context in South Korea. Furthermore, the film placidly discusses the growth and agony in humans and the society without expressing it excessively, so it will be a valuable research result to inspire the trend of creating films that incorporate new imaging technology and original visualization techniques.

Analysis of Munitions Contract Work Using Process Mining (프로세스 마이닝을 이용한 군수품 계약업무 분석 : 공군 군수사 계약업무를 중심으로)

  • Joo, Yong Seon;Kim, Su Hwan
    • Journal of Intelligence and Information Systems
    • /
    • v.28 no.4
    • /
    • pp.41-59
    • /
    • 2022
  • The timely procurement of military supplies is essential to maintain the military's operational capabilities, and contract work is the first step toward timely procurement. In addition, rapid signing of a contract enables consumers to set a leisurely delivery date and increases the possibility of budget execution, so it is essential to improve the contract process to prevent early execution of the budget and transfer or disuse. Recently, research using big data has been actively conducted in various fields, and process analysis using big data and process mining, an improvement technique, are also widely used in the private sector. However, the analysis of contract work in the military is limited to the level of individual analysis such as identifying the cause of each problem case of budget transfer and disuse contracts using the experience and fragmentary information of the person in charge. In order to improve the contract process, this study analyzed using the process mining technique with data on a total of 560 contract tasks directly contracted by the Department of Finance of the Air Force Logistics Command for about one year from November 2019. Process maps were derived by synthesizing distributed data, and process flow, execution time analysis, bottleneck analysis, and additional detailed analysis were conducted. As a result of the analysis, it was found that review/modification occurred repeatedly after request in a number of contracts. Repeated reviews/modifications have a significant impact on the delay in the number of days to complete the cost calculation, which has also been clearly revealed through bottleneck visualization. Review/modification occurs in more than 60% of the top 5 departments with many contract requests, and it usually occurs in the first half of the year when requests are concentrated, which means that a thorough review is required before requesting contracts from the required departments. In addition, the contract work of the Department of Finance was carried out in accordance with the procedures according to laws and regulations, but it was found that it was necessary to adjust the order of some tasks. This study is the first case of using process mining for the analysis of contract work in the military. Based on this, if further research is conducted to apply process mining to various tasks in the military, it is expected that the efficiency of various tasks can be derived.

Study of Animation 3-Dimensional Motion Picture (애니메이션 입체 영화에 대한 연구)

  • Min, Kyung-Mi
    • Cartoon and Animation Studies
    • /
    • s.9
    • /
    • pp.127-142
    • /
    • 2005
  • Not only in Korea but throughout the entire world millions of people are in contact with images. Images have become a medium through which to transmit anything from simple visualizations of moving images to knowledge and information. The age of the internet has arisen thanks to scientific development, and the internet generation's acquisition of information is continuously becoming faster. The spectators, ufo must choose amongst the excessive amount of available information, are changing along with it just as quickly. The method of visual transmission has changed to match the demands of the fast-changing pace of the new generation. In order to receive an instantaneous selection amongst much information, the primary requisite is attracting one's attention, and then presenting a corresponding feeling of satisfaction. The early stages of film arose from the desire to capture one's actual situation as it realty is. Unsatisfied with the still picture, people developed the motion picture. Research has succeeded in reproducing 3-dimensional images more realistic than the actual image we perceive as a result of the difference in visual perspective of both eyes and their response to rays of light From color film to 3-dimensional pictures, people enjoy the magnificent results of this. All fields within the category of film are continuously studying the human desire to pursue their visual side, namely the pursuit of visual images with a maximum sense of reality. The images that millions of people around the world see now are flat. The screen's depth and optical illusions effectively give a sense of reality while conveying information. However, although the flat screen is able to create a sense of depth using the different visual perspective of each eye for the realization of a cubic effect, there are limitations. Entering the 21s1 century, there is a quickly-arising branch within the field of image media which seeks to overcome these limitations Although 3-dimensional images began in films, entering the latter half of the 20th century, due to development of 3-dimensional images using the mediums of the animation field, cellular phones, advertisement screens, television etc., without restriction is designated as 'image.'. With research having started around 1900 and continuing for over 100 years, we are now able to witness the popularization of 3-dimensional films happening before our very eyes. Within our own country, we can frequently see them at amusement parks and museums. In the future, through the popularization of HDTV etc., there is a good outlook for practical use of 3-dimensional images in televisions with advanced picture qualify as well as in other areas. Together with the international current, research on 3-dimensional films has been activated in Korea and is rising as a main current in the film industry. Within this context, the contents and understanding of 3-dimensional images must keep in step with the pace of technical advancements. In order to accelerate of development of film contents to keep in pace with technical developments, this dissertation presents the techniques and technical aspects of future developments, and shows the need to prepare in advance to make the field grow- and thereby avoid having a lack of experts and being conquered by other nations in the field - rather than only advancing the technical aspects and importing the contents. This dissertation aims to stimulate interest and continual research by progressive-thinking people related to the film industry. Part II looks into the definition and types of 3-dimensional motion pictures, the terminology, the fundamentals of image formation, current market fluctuations, and looks into 3-dimensional techniques which can be borrowed and introduced in 3-dimensional animations. Part III concerns 3-dimensional animated films. It analyzes 3-dimensional production techniques while using the introduction of specific animation techniques in the 2004 production Lee Sun Shin and Nelson - Naval Heroes 3-dimensional animation produced in 2004 by Clay & Puppet Stop-Motion Animation & Computer Graphic. Original Korean title: 해전영웅 이순신과 넬슨. as an example, and it also looks into how current film techniques used in animations can be applied in 3-dimensional films. Additionally, the actual stages of the various fields of 3-dimensional animations are presented. Given the current direction and advancement of 3-dimensional films making use of animations and the possible realization of this field, the author plans to weigh the development of this yet unexploited new market Not looking at the current progress of the field, but rather the direction of the hypothetical types of animation techniques, the author predicts the marketability and possibility of development of each area.

  • PDF

Context Sharing Framework Based on Time Dependent Metadata for Social News Service (소셜 뉴스를 위한 시간 종속적인 메타데이터 기반의 컨텍스트 공유 프레임워크)

  • Ga, Myung-Hyun;Oh, Kyeong-Jin;Hong, Myung-Duk;Jo, Geun-Sik
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.4
    • /
    • pp.39-53
    • /
    • 2013
  • The emergence of the internet technology and SNS has increased the information flow and has changed the way people to communicate from one-way to two-way communication. Users not only consume and share the information, they also can create and share it among their friends across the social network service. It also changes the Social Media behavior to become one of the most important communication tools which also includes Social TV. Social TV is a form which people can watch a TV program and at the same share any information or its content with friends through Social media. Social News is getting popular and also known as a Participatory Social Media. It creates influences on user interest through Internet to represent society issues and creates news credibility based on user's reputation. However, the conventional platforms in news services only focus on the news recommendation domain. Recent development in SNS has changed this landscape to allow user to share and disseminate the news. Conventional platform does not provide any special way for news to be share. Currently, Social News Service only allows user to access the entire news. Nonetheless, they cannot access partial of the contents which related to users interest. For example user only have interested to a partial of the news and share the content, it is still hard for them to do so. In worst cases users might understand the news in different context. To solve this, Social News Service must provide a method to provide additional information. For example, Yovisto known as an academic video searching service provided time dependent metadata from the video. User can search and watch partial of video content according to time dependent metadata. They also can share content with a friend in social media. Yovisto applies a method to divide or synchronize a video based whenever the slides presentation is changed to another page. However, we are not able to employs this method on news video since the news video is not incorporating with any power point slides presentation. Segmentation method is required to separate the news video and to creating time dependent metadata. In this work, In this paper, a time dependent metadata-based framework is proposed to segment news contents and to provide time dependent metadata so that user can use context information to communicate with their friends. The transcript of the news is divided by using the proposed story segmentation method. We provide a tag to represent the entire content of the news. And provide the sub tag to indicate the segmented news which includes the starting time of the news. The time dependent metadata helps user to track the news information. It also allows them to leave a comment on each segment of the news. User also may share the news based on time metadata as segmented news or as a whole. Therefore, it helps the user to understand the shared news. To demonstrate the performance, we evaluate the story segmentation accuracy and also the tag generation. For this purpose, we measured accuracy of the story segmentation through semantic similarity and compared to the benchmark algorithm. Experimental results show that the proposed method outperforms benchmark algorithms in terms of the accuracy of story segmentation. It is important to note that sub tag accuracy is the most important as a part of the proposed framework to share the specific news context with others. To extract a more accurate sub tags, we have created stop word list that is not related to the content of the news such as name of the anchor or reporter. And we applied to framework. We have analyzed the accuracy of tags and sub tags which represent the context of news. From the analysis, it seems that proposed framework is helpful to users for sharing their opinions with context information in Social media and Social news.

A Study of Intangible Cultural Heritage Communities through a Social Network Analysis - Focused on the Item of Jeongseon Arirang - (소셜 네트워크 분석을 통한 무형문화유산 공동체 지식연결망 연구 - 정선아리랑을 중심으로 -)

  • Oh, Jung-shim
    • Korean Journal of Heritage: History & Science
    • /
    • v.52 no.3
    • /
    • pp.172-187
    • /
    • 2019
  • Knowledge of intangible cultural heritage is usually disseminated through word-of-mouth and actions rather than written records. Thus, people assemble to teach others about it and form communities. Accordingly, to understand and spread information about intangible cultural heritage properly, it is necessary to understand not only their attributes but also a community's relational characteristics. Community members include specialized transmitters who work under the auspices of institutions, and general transmitters who enjoy intangible cultural heritage in their daily lives. They converse about intangible cultural heritage in close relationships. However, to date, research has focused only on professionals. Thus, this study focused on the roles of general transmitters of intangible cultural heritage information by investigating intangible cultural heritage communities centering around Jeongseon Arirang; a social network analysis was performed. Regarding the research objectives presented in the introduction, the main findings of the study are summarized as follows. First, there were 197 links between 74 members of the Jeongseon Arirang Transmission Community. One individual had connections with 2.7 persons on average, and all were connected through two steps in the community. However, the density and the clustering coefficient were low, 0.036 and 0.32, respectively; therefore, the cohesiveness of this community was low, and the relationships between the members were not strong. Second, 'Young-ran Yu', 'Nam-gi Kim' and 'Gil-ja Kim' were found to be the prominent figures of the Jeongseon Arirang Transmission Community, and the central structure of the network was concentrated around these three individuals. Being located in the central structure of the network indicates that a person is popular and ranked high. Also, it means that a person has an advantage in terms of the speed and quantity of the acquisition of information and resources, and is in a relatively superior position in terms of bargaining power. Third, to understand the replaceability of the roles of Young-ran Yu, Nam-gi Kim, and Gil-ja Kim, who were found to be the major figures through an analysis of the central structure, structural equivalence was profiled. The results of the analysis showed that the positions and roles of Young-ran Yu, Nam-gi Kim, and Gil-ja Kim were unrivaled and irreplaceable in the Jeongseon Arirang Transmission Community. However, considering that these three members were in their 60s and 70s, it seemed that it would be necessary to prepare measures for the smooth maintenance and operation of the community. Fourth, to examine the subgroup hidden in the network of the Jeongseon Arirang Transmission Community, an analysis of communities was conducted. A community refers to a subgroup clearly differentiated based on modularity. The results of the analysis identified the existence of four communities. Furthermore, the results of an analysis of the central structure showed that the communities were formed and centered around Young-ran Yu, Hyung-jo Kim, Nam-gi Kim, and Gil-ja Kim. Most of the transmission TAs recommended by those members, students who completed a course, transmission scholarship holders, and the general members taught in the transmission classes of the Jeongseon Arirang Preservation Society were included as members of the communities. Through these findings, it was discovered that it is possible to maintain the transmission genealogy, making an exchange with the general members by employing the present method for the transmission of Jeongseon Arirang, the joint transmission method. It is worth paying attention to the joint transmission method as it overcomes the demerits of the existing closed one-on-one apprentice method and provides members with an opportunity to learn their masters' various singing styles. This study is significant for the following reasons: First, by collecting and examining data using a social network analysis method, this study analyzed phenomena that had been difficult to investigate using existing statistical analyses. Second, by adopting a different approach to the previous method in which the genealogy was understood, looking at oral data, this study analyzed the structures of the transmitters' relationships with objective and quantitative data. Third, this study visualized and presented the abstract structures of the relationships among the transmitters of intangible cultural heritage information on a 2D spring map. The results of this study can be utilized as a baseline for the development of community-centered policies for the protection of intangible cultural heritage specified in the UNESCO Convention for the Safeguarding of Intangible Cultural Heritage. To achieve this, it would be necessary to supplement this study through case studies and follow-up studies on more aspects in the future.

End to End Model and Delay Performance for V2X in 5G (5G에서 V2X를 위한 End to End 모델 및 지연 성능 평가)

  • Bae, Kyoung Yul;Lee, Hong Woo
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.1
    • /
    • pp.107-118
    • /
    • 2016
  • The advent of 5G mobile communications, which is expected in 2020, will provide many services such as Internet of Things (IoT) and vehicle-to-infra/vehicle/nomadic (V2X) communication. There are many requirements to realizing these services: reduced latency, high data rate and reliability, and real-time service. In particular, a high level of reliability and delay sensitivity with an increased data rate are very important for M2M, IoT, and Factory 4.0. Around the world, 5G standardization organizations have considered these services and grouped them to finally derive the technical requirements and service scenarios. The first scenario is broadcast services that use a high data rate for multiple cases of sporting events or emergencies. The second scenario is as support for e-Health, car reliability, etc.; the third scenario is related to VR games with delay sensitivity and real-time techniques. Recently, these groups have been forming agreements on the requirements for such scenarios and the target level. Various techniques are being studied to satisfy such requirements and are being discussed in the context of software-defined networking (SDN) as the next-generation network architecture. SDN is being used to standardize ONF and basically refers to a structure that separates signals for the control plane from the packets for the data plane. One of the best examples for low latency and high reliability is an intelligent traffic system (ITS) using V2X. Because a car passes a small cell of the 5G network very rapidly, the messages to be delivered in the event of an emergency have to be transported in a very short time. This is a typical example requiring high delay sensitivity. 5G has to support a high reliability and delay sensitivity requirements for V2X in the field of traffic control. For these reasons, V2X is a major application of critical delay. V2X (vehicle-to-infra/vehicle/nomadic) represents all types of communication methods applicable to road and vehicles. It refers to a connected or networked vehicle. V2X can be divided into three kinds of communications. First is the communication between a vehicle and infrastructure (vehicle-to-infrastructure; V2I). Second is the communication between a vehicle and another vehicle (vehicle-to-vehicle; V2V). Third is the communication between a vehicle and mobile equipment (vehicle-to-nomadic devices; V2N). This will be added in the future in various fields. Because the SDN structure is under consideration as the next-generation network architecture, the SDN architecture is significant. However, the centralized architecture of SDN can be considered as an unfavorable structure for delay-sensitive services because a centralized architecture is needed to communicate with many nodes and provide processing power. Therefore, in the case of emergency V2X communications, delay-related control functions require a tree supporting structure. For such a scenario, the architecture of the network processing the vehicle information is a major variable affecting delay. Because it is difficult to meet the desired level of delay sensitivity with a typical fully centralized SDN structure, research on the optimal size of an SDN for processing information is needed. This study examined the SDN architecture considering the V2X emergency delay requirements of a 5G network in the worst-case scenario and performed a system-level simulation on the speed of the car, radius, and cell tier to derive a range of cells for information transfer in SDN network. In the simulation, because 5G provides a sufficiently high data rate, the information for neighboring vehicle support to the car was assumed to be without errors. Furthermore, the 5G small cell was assumed to have a cell radius of 50-100 m, and the maximum speed of the vehicle was considered to be 30-200 km/h in order to examine the network architecture to minimize the delay.

A Study on the Real Condition and the Improvement Directions for the Protection of Industrial Technology (산업기술 보호 관리실태 및 발전방안에 관한 연구)

  • Chung, Tae-Hwang;Chang, Hang-Bae
    • Korean Security Journal
    • /
    • no.24
    • /
    • pp.147-170
    • /
    • 2010
  • This study is to present a improvement directions for the protection of industrial key technology. For the purpose of the study, the survey was carried out on the administrative security activity of 68 enterprises including Large companies, small-midium companies and public corporations. survey result on the 10 items of security policy, 10 items of personal management and 7 items of the assets management are as follows; First, stable foundation for the efficient implement of security policy is needed. Carrying a security policy into practice and continuous upgrade should be fulfilled with drawing-up of the policy. Also for the vitalization of security activity, arrangement of security organization and security manager are needed with mutual assistance in the company. Periodic security inspection should be practiced for the improvement of security level and security understanding. Second, the increase of investment for security job is needed for security invigoration. Securing cooperation channel with professional security facility such as National Intelligence Service, Korea internet & security agency, Information security consulting company, security research institute is needed, also security outsourcing could be considered as the method of above investment. Especially small-midium company is very vulnerable compared with Large company and public corporation in security management, so increase of government's budget for security support system is necessary. Third, human resource management is important, because the main cause of leak of confidential information is person. Regular education rate for new employee and staff members is relatively high, but the vitalization of security oath for staff members and the third party who access to key technology is necessary. Also access right to key information should be changed whenever access right changes. Reinforcement of management of resigned person such as security oath, the elimination of access right to key information and the deletion of account. is needed. Forth, the control and management of important asset including patent and design should be tightened. Classification of importance of asset and periodic inspection are necessary with the effects evaluation of leak of asset.

  • PDF

A study on the operation realities of the teenager internet shopping malls and the entrepreneurship education (청소년들의 인터넷 쇼핑몰 운영 실태 및 창업교육에 관한 연구)

  • Yi, Bo-Young;Oh, Kyung-Wha
    • Journal of Korean Home Economics Education Association
    • /
    • v.22 no.2
    • /
    • pp.115-131
    • /
    • 2010
  • The object of this study is to compare the cognitive differences between teenagers who are operating the internet shopping mall and those who are not operating to analyze the effect of the enterprise experience on the career maturity of teenager. And we are to present the operation methods of teenager entrepreneurship education at school by identifying the difficulties of teenager internet shopping malls and investigating demands of teenagers for the entrepreneurship education. The results of this study are as following. First, the internet shopping malls established by teenagers were mostly operated with small scale and capital dealt with clothing and fashion accessories. It is difficult for most of teenagers to inform the shopping malls and understand the flow of fashion and demands of consumers. They acquired the informations on enterprise using internet or acquaintances. This is because there are no professional teenager entrepreneurship education. And they chose the confidence and spirit of challenge which are mostly needed for success of the internet shopping malls. Therefore, they can acquire the confidence and spirit of challenge by effective entrepreneurship education on resource management, team management, business plan and marketing. Second, teenagers who are operating the internet shopping malls got higher scores on career maturity and degree of need in the entrepreneurship education than those who are not. Thus the expansion of the systemed and diversified entrepreneurship education at school is needed to increase business practice and entrepreneurship. Third, most teenagers wanted the entrepreneurship education at school. They preferred external lectures who can teach them with professional experiences and practical knowledges using discretional activity classes or club activity classes. Dividend classes of creative experience activities including career, voluntary and club activities are increased in 2009 revised education curriculum. Using these classes, it requires to operate the entrepreneurship education which make students decide their career themselves through concrete education and experience. Consequently, the expansion of the systemed and diversified teenager entrepreneurship education at school is needed using development of practical entrepreneurship education program, professional teacher training and revitalization of entrepreneurship club activities.

  • PDF