• Title/Summary/Keyword: CoP of Experts

Search Result 8, Processing Time 0.024 seconds

A Study about Building a Community of Practice of Experts for Sharing and Using Research Data (연구데이터 공유 및 활용을 위한 전문가 실천공동체 구축에 관한 연구)

  • Na-eun, Han
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.56 no.4
    • /
    • pp.181-203
    • /
    • 2022
  • This study analyzed domestic and foreign literature and examined cases of foreign Community of Practice(CoP) of experts to find out what benefits researchers can gain from participating in their CoP, how the CoP was established, and how data is shared within the CoP. In addition, this study discussed on how to establish a CoP of experts in Korea for sharing and using research data. By participating in the CoP of experts, members can be provided with the opportunity to build an experts' network and have a chance to meet with various experts, to acquire and share their expertise and information, to receive help from other experts, to learn about their expertise, and to have opportunities for professional experiences. In addition, this study discussed 4 factors such as operation method and management system, memberships and number of members, activities, and management of data and repository for establishing a CoP of experts for sharing and using research data. This study provides a knowledge base for building a CoP of experts in Korea.

The Perception of Corporate Management Experts on Corporate Counseling A Study on Marketing Mix for Revitalization (기업상담에 대한 기업경영 전문가의 인식과 활성화를 위한 마케팅믹스 연구)

  • Na, Sang-Hun;Shin, Dong-Yeol
    • Industry Promotion Research
    • /
    • v.7 no.3
    • /
    • pp.1-8
    • /
    • 2022
  • Many companies are operating and introducing the research results that corporate counseling contributes to corporate profits and improves the effective welfare of workers. This study was conducted targeting business management experts. As a research question, first, is there a difference in perception among business management experts about business counseling? Second, what is an important marketing 7P mix for revitalizing corporate counseling? Third, there will be differences in the importance of the 7P mix for marketing among business management experts. The results of the quantitative study are as follows. First, business management experts had a positive perception about the intention and necessity of corporate counseling, and marketing was higher than production management by field. The consultation model prefers an external model, and medium-sized enterprises and small and medium-sized enterprises are selected as target companies, and service and manufacturing industries are selected as target industries. The topics are recognized as interpersonal relationships and job stress. Second, price mix, product mix, people mix, and process mix are recognized as important marketing mixes, but companies consider the price mix the most important. Third, there was a difference between corporate management experts in the promotion mix and process, and marketing recognized the promotion mix as important and the process mix was important for financial management. However, there is no difference in the mixes by field except for this, so it can be said that the perception of the marketing mix is similar. Through this study, it is meaningful to present the implications of the marketing mix for awareness and activation of corporate counseling from the corporate point of view.

Educational UCC Development and Knowledge Creation Strategy in Web 2.0 (Web2.0환경의 교육적 UCC 개발과 지식창출방안에 관한 연구)

  • JUNG, Ju-Young;Ahn, Young-Sik
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.21 no.4
    • /
    • pp.543-555
    • /
    • 2009
  • The characteristic of Web 2.0 is openness, participation, share, cooperation and creation. The purpose of this article was to identify learner based knowledge creation strategy through UCC in Web 2.0, to develop UCC by university students and to make systematic UCC process. This article suggested knowledge creation strategy with UCC learning Community of Practice(CoP). UCC was developed by 25 students who registered e-learning in "P" university and conducted interview with students and experts to analyze the contents which related with research questions. Systematic process for developing educational UCC was consisted of sectors such as idea creation, design, development, implementation and evaluation. Main developing process steps were as follows: making subject$\rightarrow$seeking information$\rightarrow$selecting data$\rightarrow$designing contents$\rightarrow$making story board$\rightarrow$planning of filming$\rightarrow$filming$\rightarrow$digitalizing$\rightarrow$editing$\rightarrow$reviewing final product$\rightarrow$implementing$\rightarrow$evaluating. For learner based knowledge creation through UCC, educational institutions have to provide platform for learners' need, and learners create diverse ideas with UCC CoP. This article suggested knowledge creation strategy with sharing collective intelligence through process of UCC design, development, implement and evaluation.

The Framework of Research Network and Performance Evaluation on Personal Information Security: Social Network Analysis Perspective (개인정보보호 분야의 연구자 네트워크와 성과 평가 프레임워크: 소셜 네트워크 분석을 중심으로)

  • Kim, Minsu;Choi, Jaewon;Kim, Hyun Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.1
    • /
    • pp.177-193
    • /
    • 2014
  • Over the past decade, there has been a rapid diffusion of electronic commerce and a rising number of interconnected networks, resulting in an escalation of security threats and privacy concerns. Electronic commerce has a built-in trade-off between the necessity of providing at least some personal information to consummate an online transaction, and the risk of negative consequences from providing such information. More recently, the frequent disclosure of private information has raised concerns about privacy and its impacts. This has motivated researchers in various fields to explore information privacy issues to address these concerns. Accordingly, the necessity for information privacy policies and technologies for collecting and storing data, and information privacy research in various fields such as medicine, computer science, business, and statistics has increased. The occurrence of various information security accidents have made finding experts in the information security field an important issue. Objective measures for finding such experts are required, as it is currently rather subjective. Based on social network analysis, this paper focused on a framework to evaluate the process of finding experts in the information security field. We collected data from the National Discovery for Science Leaders (NDSL) database, initially collecting about 2000 papers covering the period between 2005 and 2013. Outliers and the data of irrelevant papers were dropped, leaving 784 papers to test the suggested hypotheses. The co-authorship network data for co-author relationship, publisher, affiliation, and so on were analyzed using social network measures including centrality and structural hole. The results of our model estimation are as follows. With the exception of Hypothesis 3, which deals with the relationship between eigenvector centrality and performance, all of our hypotheses were supported. In line with our hypothesis, degree centrality (H1) was supported with its positive influence on the researchers' publishing performance (p<0.001). This finding indicates that as the degree of cooperation increased, the more the publishing performance of researchers increased. In addition, closeness centrality (H2) was also positively associated with researchers' publishing performance (p<0.001), suggesting that, as the efficiency of information acquisition increased, the more the researchers' publishing performance increased. This paper identified the difference in publishing performance among researchers. The analysis can be used to identify core experts and evaluate their performance in the information privacy research field. The co-authorship network for information privacy can aid in understanding the deep relationships among researchers. In addition, extracting characteristics of publishers and affiliations, this paper suggested an understanding of the social network measures and their potential for finding experts in the information privacy field. Social concerns about securing the objectivity of experts have increased, because experts in the information privacy field frequently participate in political consultation, and business education support and evaluation. In terms of practical implications, this research suggests an objective framework for experts in the information privacy field, and is useful for people who are in charge of managing research human resources. This study has some limitations, providing opportunities and suggestions for future research. Presenting the difference in information diffusion according to media and proximity presents difficulties for the generalization of the theory due to the small sample size. Therefore, further studies could consider an increased sample size and media diversity, the difference in information diffusion according to the media type, and information proximity could be explored in more detail. Moreover, previous network research has commonly observed a causal relationship between the independent and dependent variable (Kadushin, 2012). In this study, degree centrality as an independent variable might have causal relationship with performance as a dependent variable. However, in the case of network analysis research, network indices could be computed after the network relationship is created. An annual analysis could help mitigate this limitation.

Generation of Collaboration Network and Analysis of Researcher's Role in National Cancer Center (협업네트워크 구축과 연구자 역할 분석 -국립암센터 사례 중심으로-)

  • Jang, Hae-Lan
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.10
    • /
    • pp.387-399
    • /
    • 2015
  • Recently collaboration network is generated to find out experts in their field as potential collaborators in health care sector. In this paper, the co-author network of a National Cancer Center researcher was generated for identifying each researcher's role and collaborative research pattern. The co-author network of 2,437 authors was extracted from 1,194 SCI(E) publications from 2000 to 2010 and author's role was analyzed by author's centrality value. Centrality reflecting only the number of papers and centrality weighted by the paper number, impact factor, and authorship contribution was evaluated. On the comparison with simple degree centrality value and the weighted degree centrality, difference of value was statistically significant(t=11.66, p=0.00). Co-author network considering various variables of the paper provides more objective figure of researcher's role. This suggests that co-author network could be more effective in identifying potential collaborators.

Encryption Scheme for MPEG-4 Media Transmission Exploiting Frame Dropping

  • Shin, Dong-Kyoo;Shin, Dong-Il;Shin, Jae-Wan;Kim, Soo-Han;Kim, Seung-Dong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.5
    • /
    • pp.925-938
    • /
    • 2010
  • Depending on network conditions, a communication network could be overloaded when media are transmitted. Research has been carried out to lessen network overloading, such as by filtering, load distribution, frame dropping, and other methods. Among these methods, one of the most effective is frame dropping, which reduces specified video frames for bandwidth diminution. In frame dropping, B-frames are dropped and then I- and P-frames are dropped, based on the dependency among the frames. This paper proposes a scheme for protecting copyrights by encryption, when frame dropping is applied to reduce the bandwidth of media based on the MPEG-4 file format. We designed two kinds of frame dropping: the first stores and then sends the dropped files and the other drops frames in real time when transmitting. We designed three kinds of encryption methods using the DES algorithm to encrypt MPEG-4 data: macro block encryption in I-VOP, macro block and motion vector encryption in P-VOP, and macro block and motion vector encryption in I-, P-VOP. Based on these three methods, we implemented a digital rights management solution for MPEG-4 data streaming. We compared the results of dropping, encryption, decryption, and the quality of the video sequences to select an optimal method, and found that there was no noticeable difference between the video sequences recovered after frame dropping and the ones recovered without frame dropping. The best performance in the encryption and decryption of frames was obtained when we applied the macro block and motion vector encryption in I-, P-VOP.

A Study on the Recharge Characteristics of Groundwater in Subcatchment including Spring Water Wells (샘물 취수정이 위치한 소유역의 지하수함양 특성에 관한 연구)

  • Son, Doo Gie;Jeong, Gyo-Cheol
    • The Journal of Engineering Geology
    • /
    • v.30 no.3
    • /
    • pp.303-314
    • /
    • 2020
  • Bottled water companies submit monthly hydrologic data including periodical environmental effects investigation, daily water production capacity, water production, water level, water chemistry (pH, EC, temperature) per hour and strictly manage groundwater by periodical analyses. Thus few problems concerning drawdown due to excess intake of groundwater take place. Nevertheless, bottled water companies are imprinted as a contribution to civil affairs resulted regarding groundwater near the companies. Therefore, a new method is required during water balance analysis in environmental effects evaluation, which should be compatible with the evaluation by hydrologic experts as well more accessible to non-experts. In this study, water level of surface water and recharge rate in subcatchment where water production wells are located were measured and monthly baseflow rates were separated from normal streams. Besides, recharge properties of groundwater and surface water in the same catchment area were estimated using analyses of oxygen and hydrogen isotopes in groundwater (production well), surface water, and rainfall.

Development of Korean Green Business/IT Strategies Based on Priority Analysis (한국의 그린 비즈니스/IT 실태분석을 통한 추진전략 우선순위 도출에 관한 연구)

  • Kim, Jae-Kyeong;Choi, Ju-Choel;Choi, Il-Young
    • Asia pacific journal of information systems
    • /
    • v.20 no.3
    • /
    • pp.191-204
    • /
    • 2010
  • Recently, the CO2 emission and energy consumption have become critical global issues to decide the future of nations. Especially, the spread of IT products and the increased use of internet and web applications result in the energy consumption and CO2 emission of IT industry though information technologies drive global economic growth. EU, the United States, Japan and other developed countries are using IT related environmental regulations such as WEEE(Waste Electrical and Electronic Equipment), RoHS(Restriction of the use of Certain Hazardous Substance), REACH(Registration, Evaluation, Authorization and Restriction of CHemicals) and EuP(Energy using Product), and have established systematic green business/IT strategies to enhance the competitiveness of IT industry. For example, the Japan government proposed the "Green IT initiative" for being compatible with economic growth and environmental protection. Not only energy saving technologies but energy saving systems have been developed for accomplishing sustainable development. Korea's CO2 emission and energy consumption continuously have grown at comparatively high rates. They are related to its industrial structure depending on high energy-consuming industries such as iron and steel Industry, automotive industry, shipbuilding industry, semiconductor industry, and so on. In particular, export proportion of IT manufacturing is quite high in Korea. For example, the global market share of the semiconductor such as DRAM was about 80% in 2008. Accordingly, Korea needs to establish a systematic strategy to respond to the global environmental regulations and to maintain competitiveness in the IT industry. However, green competitiveness of Korea ranked 11th among 15 major countries and R&D budget for green technology is not large enough to develop energy-saving technologies for infrastructure and value chain of low-carbon society though that grows at high rates. Moreover, there are no concrete action plans in Korea. This research aims to deduce the priorities of the Korean green business/IT strategies to use multi attribute weighted average method. We selected a panel of 19 experts who work at the green business related firms such as HP, IBM, Fujitsu and so on, and selected six assessment indices such as the urgency of the technology development, the technology gap between Korea and the developed countries, the effect of import substitution, the spillover effect of technology, the market growth, and the export potential of the package or stand-alone products by existing literature review. We submitted questionnaires at approximately weekly intervals to them for priorities of the green business/IT strategies. The strategies broadly classify as follows. The first strategy which consists of the green business/IT policy and standardization, process and performance management and IT industry and legislative alignment relates to government's role in the green economy. The second strategy relates to IT to support environment sustainability such as the travel and ways of working management, printer output and recycling, intelligent building, printer rationalization and collaboration and connectivity. The last strategy relates to green IT systems, services and usage such as the data center consolidation and energy management, hardware recycle decommission, server and storage virtualization, device power management, and service supplier management. All the questionnaires were assessed via a five-point Likert scale ranging from "very little" to "very large." Our findings show that the IT to support environment sustainability is prior to the other strategies. In detail, the green business /IT policy and standardization is the most important in the government's role. The strategies of intelligent building and the travel and ways of working management are prior to the others for supporting environment sustainability. Finally, the strategies for the data center consolidation and energy management and server and storage virtualization have the huge influence for green IT systems, services and usage This research results the following implications. The amount of energy consumption and CO2 emissions of IT equipment including electrical business equipment will need to be clearly indicated in order to manage the effect of green business/IT strategy. And it is necessary to develop tools that measure the performance of green business/IT by each step. Additionally, intelligent building could grow up in energy-saving, growth of low carbon and related industries together. It is necessary to expand the affect of virtualization though adjusting and controlling the relationship between the management teams.