• Title/Summary/Keyword: Analysis application

Search Result 20,431, Processing Time 0.05 seconds

The Effect of Information Technology Application on Knowledge Management Process in Clinical Nurses (간호사의 정보기술(IT)활용이 지식관리활동에 미치는 영향)

  • Jeong, Seok-Hee
    • Journal of Korean Academy of Nursing Administration
    • /
    • v.10 no.1
    • /
    • pp.141-159
    • /
    • 2004
  • Purpose: The purpose of this study was to investigate the degree of information technology application, and to identify the effect of information technology application en knowledge management process in clinical nurses. Method: Participants were 629 regular clinical nurses who had worked for over 1 year in general units of 9 tertiary medical hospitals including 2 national university hospitals, 5 university hospitals, and 2 hospitals founded by business enterprises. Data were collected from March to May 2003 through questionnaires. Thee structured instruments were used to collect the data: Information Technology Application scale, Knowledge Management Process Scale(Jeong, Lee, Lee, & Kim, 2003), and one for general characteristics. The data were analyzed using reliability analysis, descriptive analysis, one-way ANOVA, $Scheff{\acute{e}$ test, correlation analysis, partial correlation analysis, and multiple regression analysis with the SPSS for Windows 10,0 program. Result: 1) The HIS application degree, IT application ability, and IT application frequency were significantly correlated with the degree of knowledge management process activation and 4 elements of knowledge management process, Knowledge Creation, Knowledge Storage, Knowledge Sharing, and Knowledge Utilization(p=.000). 2) The 3 variables, HIS application degree, IT application ability, and IT application frequency explained 47.2% of the total variance of the degree of knowledge management process activation, and 352% of me total variance of Knowledge Storage. And 2 variables, HIS application degree and IT application frequency explained 17.6% of the total variance of Knowledge Creation, 39.9% of the total variance of Knowledge sharing, and 33.8% of the total variance of Knowledge utilization(p=.000). 3) As a result of multiple regression analysis, the key determinant of the degree of knowledge management process activation for nurses was HIS application degree The HIS application degree, IT application frequency, position, IT application ability, and continuous total numbers of years working at the present hospital explained 51.1% of the total variance of the degree of knowledge management process activation(p=.000). Conclusions: These results suggest that the information technology application positively affects the nurses' knowledge management process. From the above findings, information technology application is empirically verified as a useful and effective method to activate knowledge management process, and knowledge management.

  • PDF

Development of Efficient System for Collection-Analysis-Application of Information Using System for Technology and Information in the Field of RI-Biomics (RI-Biomics 기술정보시스템을 활용한 효율적인 정보 수집-분석-활용 체계 수립에 관한 연구)

  • Jang, Sol-Ah;Kim, Joo Yeon;Park, Tai-Jin
    • Journal of Radiation Industry
    • /
    • v.9 no.3
    • /
    • pp.161-166
    • /
    • 2015
  • RI-Biomics is the new radiation fusion technology of which, such as the characteristics of radioisotope, is applied to the biomics. In order to sharing and overall analysis of data between the institutions through total management of information in the field of RI-Biomics, RI-Biomics Information portal 'RIBio-Info' was constructed by KARA (Korean Association for Radiation Application) in February 2015. For systematic operation of this 'RIBio-Info' system, it is required to develop system of collection-analysis-application of information. So, in this paper, we summarized development of document forms at each processes of collection-analysis-application of information and systematization of collection methods of information, establishment of characteristically analysis methods of reports such as issue paper, policy report, global market report and watch report. Therefore, these are expected to improving the practical applicability in this field through the vitalization of technology development of users by achieving the circular structure of collectionanalysis-application of information.

A Research on Mobile Malware Model propagated Update Attacks (변조 업데이트를 통해 전파되는 모바일 악성어플리케이션 모델 연구)

  • Ju, Seunghwan;Seo, Heesuk
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.2
    • /
    • pp.47-54
    • /
    • 2015
  • The popularity and adoption of smart-phones has greatly stimulated the spread of mobile malware, especially on the popular platforms such as Android. The fluidity of application markets complicate smart-phone security. There is a pressing need to develop effective solutions. Although recent efforts have shed light on particular security issues, there remains little insight into broader security characteristics of smart-phone application. Now, the analytical methods used mainly are the reverse engineering-based analysis and the sandbox-based analysis. Such methods are can be analyzed in detail. but, they take a lot of time and have a one-time payout. In this study, we develop a system to monitor that mobile application permissions at application update. We had to overcome a one-time analysis. This study is a service-based malware analysis, It will be based will be based on the mobile security study.

A Study on the Mobile Application Security Threats and Vulnerability Analysis Cases

  • Kim, Hee Wan
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.4
    • /
    • pp.180-187
    • /
    • 2020
  • Security threats are increasing with interest due to the mass spread of smart devices, and vulnerabilities in developed applications are being exposed while mobile malicious codes are spreading. The government and companies provide various applications for the public, and for reliability and security of applications, security checks are required during application development. In this paper, among the security threats that can occur in the mobile service environment, we set up the vulnerability analysis items to respond to security threats when developing Android-based applications. Based on the set analysis items, vulnerability analysis was performed by examining three applications of public institutions and private companies currently operating as mobile applications. As a result of application security checks used by three public institutions and companies, authority management and open module stability management were well managed. However, it was confirmed that many security vulnerabilities were found in input value verification, outside transmit data management, and data management. It is believed that it will contribute to improving the safety of mobile applications through the case of vulnerability analysis for Android application security.

An Empirical Study on Contract Model for IT Outsourcing Application Operation (IT 아웃소싱 어플리케이션 운영 계약모델에 대한 실증적 연구)

  • Kim, Heungshik;Park, Soah
    • Journal of Information Technology Services
    • /
    • v.16 no.2
    • /
    • pp.45-60
    • /
    • 2017
  • The study suggests a contract model of application operation through case study of A bank's IT outsourcing application contract based on workload. The IT outsourcing order form has a problem in that the scope of work is ambiguous due to the integration of operation and maintenance. In this study, application operation and maintenance were separated by referring to application operation history provided in ISO/IEC15504-5 standard. The scope of the IT outsourcing service was clarified by organizing the definition and detail activities of the application operation business. Application operation contract method has generally applied estimation method by the number of input manpower and period by agreement between buyer and client. As there is no activity to calculate the number of input manpower based on the operational work history and based on the standard workload per activity. In this case is not guaranteed due to the simple agreement between the contractors. In this paper, we propose an application operating cost estimation model that measures the size of the operating software using function point analysis that is the basis of application operation tasks. In order to verify the validity of the application operation cost model, we verified the correlation between the application size and the labor cost through regression analysis using SPSS.

Design and Implementation of Smart Device Application for Instructional Analysis (스마트 디바이스 기반 수업분석 프로그램 설계 및 구현 -한국어 특성 반영과 교사활용도 증진을 위한 UI설계를 적용하여-)

  • Kang, Doo Bong;Jeong, Ju Hun;Kim, Young Hwan
    • The Journal of Korean Association of Computer Education
    • /
    • v.18 no.4
    • /
    • pp.31-40
    • /
    • 2015
  • The objective of this study is to develop and implement a smart device based instructional analysis application to enhance the efficiency of teaching in class. The main design features for this application are as follows: first, User Interface(UI) has been simplified to provide teachers a clear and easy-to-understand way to utilize the application. Second, the characteristics of Korean language were considered, such as sentence structure. Third, multi-aspect analysis is possible through adopting three analysis types - Flanders' interaction analysis, Tuckman's analysis, Mcgraw's concentration of instruction analysis. The practical instructional analysis application has been developed through this study, and this user-oriented application will be able to help teachers improve the quality of teaching in class. Also, this study can be a starting point for further researches on design principles of instructional analysis, especially with the recent technology and theories, such as a voice-recognition system, an edutainment applied instruction and an experiential learning.

ISO 900G Quality System Application Status of Small & Medium Size Industrial Companies (중소기업체의 ISO 9000품질시스템 운영실태)

  • 김복만;박종화
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.24 no.66
    • /
    • pp.59-67
    • /
    • 2001
  • This thesis is to research for analysis of ISO 9000 Quality Management System application status of small & medium-sized Industrial Companies. For this research, 10 companies certified by ISO 9000 standard were selected. By using an evaluation method and a software for analysis of application, this thesis compared, analyzed and evaluated the application status before and after certificate of ISO 9000, and identified the performance and difficulty of QMS application, and then proposed improvement methodology for ISO 9000 effective application.

  • PDF

Differential die-away technology applied to detect special nuclear materials

  • Lianjun Zhang;Mengjiao Tang;Chen Zhang;Yulai Zheng;Yong Li;Chao Liu;Qiang Wang;Guobao Wang
    • Nuclear Engineering and Technology
    • /
    • v.55 no.7
    • /
    • pp.2483-2488
    • /
    • 2023
  • Differential die-away analysis (DDAA) technology is a special nuclear material (SNM) active detection analysis technology. Be a nuclear material shielded or not, the technology can reveal the existence of nuclear materials by inducing fission from an external pulsed neutron source. In this paper, a detection model based on DDAA analysis technology was established by geant4 Monte Carlo simulation software, and the optimal sensitivity of the detection system is achieved by optimizing different configurations. After the geant4 simulation and optimization, a prototype was established, and experimental research was carried out. The result shows that the prototype can detect 200 g of 235U in a steel cylinder shield that's of 1.5 cm in inner diameter, 10 cm in thickness and 280 kg in weight.

A Modeling Tool for X-Window Application Software Development

  • Lee, Joon-Seok;Lee, Sang-Bum;Chi, Dong-Hae
    • ETRI Journal
    • /
    • v.15 no.2
    • /
    • pp.75-84
    • /
    • 1993
  • This paper presents a modeling tool, so-called X-ADD (X-window application Analysis & Design Diagram), which is useful for the understanding of existing X-window application program and the development of new X-window application software. This X-ADD tool is available for the X-window applications maintenance activities such as program understanding, and program analysis by the concept of reverse engineering. In addition, it supports the analysis and design for the new X-window application system development. Therefore, by the use of this tool, the visibility of the existing X-window application programs can be enhanced and modeling for the design of new X-window application systems can be easily made.

  • PDF

Investigation and Analysis of Mathematics Application Ability of Student of Senior One

  • Dan Qi
    • Research in Mathematical Education
    • /
    • v.9 no.3 s.23
    • /
    • pp.295-303
    • /
    • 2005
  • Students' mathematics application ability is a hot spot which mathematics education pays attention. So, I have carried on the test of mathematics application and the questionnaire survey to student of Senior One of the two middle schools. Through the test and the investigation, I discover that the level of the students' mathematics application ability is not high. To the simple application question, the difference of the male and the female is not big, but to the difficult application question, the male and the female has the remarkable difference. The students' lack of flexible and the original cognition monitoring ability in mathematics application process are afraid of studying mathematics application since childhood and lack of the training of this aspect. They thought mathematics foundation and reading understood ability is the key of mathematics application. Through analysis result of investigation, this paper proposed the way to raise mathematics application ability of students.

  • PDF