• Title/Summary/Keyword: Consensus of Information

Search Result 539, Processing Time 0.028 seconds

A study on factors causing legislative failure of bills related to democratic citizenship education (민주시민교육 관련 법안의 입법 실패 요인에 관한 연구)

  • Sang-Ho Jeong
    • Analyses & Alternatives
    • /
    • v.8 no.1
    • /
    • pp.137-167
    • /
    • 2024
  • This study sought to explain the reasons why the civic education bill failed to be enacted as many as 13 times. What we discovered as a result of our research is, first, the absence of a legislative strategy by the minority member of the national assembly on this bills. The Citizenship Education Bill was a controversial bill with great potential for ideological conflict, and after the 19th National Assembly, this bill was promoted by a minority of a specific political party. The Democratic Party's sponsoring lawmakers did not use active legislative strategies, such as exerting influence within the party to have these bills adopted as the party's platform, or developing them into major pledges for the general and presidential elections. Second, there is a consistent passive response from civic groups as well as lawmakers who signed the bill in an unfavorable public opinion environment. During the legislative process, opposing opinions were overwhelming, including concerns about the spread of leftist ideology, waste of budget and organization, and violation of neutrality and fairness in education. In addition, the passive attitude of field teachers and civic groups, who should be in charge of civic education, also served as a background for the legislative failure. Third, due to a lack of sharing of reliable information on recent theoretical research and global policy trends among stakeholders, legislation through an agreement between the ruling and opposition parties failed.

Correlation between Ethical Factors and Their Competitiveness of Small and Medium Enterprises (중소기업의 윤리적 특성요인과 기업경쟁력 간의 관계)

  • Lee, Byeong-Seop;Jeon, In-Oh
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.6
    • /
    • pp.175-185
    • /
    • 2008
  • This study would be research for correlations between ethical factors and company's competitiveness of small and medium enterprises thorough recognizing of important company ethic and approaching to them theoretically. This study has collected all information which small and medium enterprises around Seoul and Kyounggi province and employing more than 5, which 134- survey are used totally. Study reveals that firstly customer and social responsibility provide Positive effects on the organization Dust, secondly CEO's views serve those positive effects as well, thirdly it is not preyed that ethical capacity of company have a positive effect on organization trust. Fourthly, organization trust has good effects on competitiveness of product and price. This results lead to some suggestions as follows. First of all, company should serves systemized value to customers and their societies. For that, it is necessary to analyse their needs and to reflect them into corporate management to build close relationship with customers and reliable marketing activities, efforts to enhance corporate images. This chain of work can make employees feel proud themselves. Secondly, supervisors including CEO should set the pace with high-consensus for ethical behaviour. Thirdly, ethical factors should be improved for improving organization trust simultaneously. Every customer, no matter they are inner or outer, should have highly required ethical understandings for their networks. Furthermore, they have to enhance organization trust and to strengthen company competitiveness through stimulating employee's courages and contribution.

Defining, Measuring, and Forecasting Telecommuting (원격근무의 정의, 현황, 그리고 전망)

  • Kim, Seungnam;Ju, Jongwng
    • Informatization Policy
    • /
    • v.21 no.2
    • /
    • pp.89-110
    • /
    • 2014
  • As a travel demand management and environmental policy, the government actively promotes alternative work arrangements such as telecommuting. Against this backdrop, several empirical studies, which aim to verify the benefits of telecommuting, have been recently conducted. Little consensus, however, exists with respect to the defining, measuring, and forecasting telecommuting, although these are fundamental basis of policy evaluation and academic research. As a fundamental research for analyzing telecommuting impacts, this paper reviews various definitions regarding telecommuting, examines telecommuting penetration and level of telecommuting through review of available survey data in Korea, and forecasts future penetration. The result suggests that current home-based telecommuting penetration and level of telecommuting is approximately 0.5 to 1.1% and 0.2 to 0.5%, respectively, and is approximately 0.2% and 0.1%, respectively, for the center-based telecommuting. In addition, shift-share analysis shows that home-based telecommuting penetration in the Seoul Metropolitan Area in 2020 will be 1.3%, not much different with the current value. Consequently, current telecommuting penetration is much lower than the value that is fed to us by the media (10~20%), and the future prospect is also much lower than the goal of government (30~45%); thus, we can conclude that government's goal of telecommuting promotion is difficult to meet if active encouragement policy will not be introduced.

Influences of Well-being Trend on Color of Packaged Food Products (웰빙트랜드가 식품포장디자인의 색채에 끼친 영향)

  • Shin, Seong-Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.5
    • /
    • pp.184-192
    • /
    • 2007
  • A social trend can change market trend because it influences on consumer's lifestyle. Therefore the trend has been considered as an important factor for planning and producing new items. If a new trend occurred, its impact on market needs to be examined. Recently, well-being became top global issue and it caused many changes on packaged food products. This study focuses on measuring the impact of well-being trend on package design. The range of products for this research is limited to packaged food product selling in discount stores because it is main category to show well-being trend. Generally, good package design generates impulsive buying at the point of purchase. Colors on packages are critical point for good product design and they are also reflecting social trend to meet their consumers' psychological desires. After gathering basic information from market research, several colors had been selected and classified. For providing specific evidences result from the trend, the role of four major colors have been compared and analyzed. Finally, questionnaire had been handed out to trendy consumers to reach consensus on well-being color.

Explication and Rational Conceptualization of Metaverse (메타버스 해석과 합리적 개념화)

  • Song, Stephen W.;Chung, Dong-Hun
    • Informatization Policy
    • /
    • v.28 no.3
    • /
    • pp.3-22
    • /
    • 2021
  • This article reviews previous literature on the metaverse and attempts to provide a refined definition for this phenomenon. Metaverse has recently been in the spotlight among discussions by the industry and the media while a consensus on the exact definition of metaverse is yet to be determined. Since Neal Stephenson first coined the term metaverse in his novel "Snow Crash" in 1992, the Acceleration Studies Foundation (ASF) was the first to analyze the concept of metaverse in 2007. While ASF's effort did not receive much spotlight it may have deserved, metaverse gained much attention in the fall of 2020 when NVIDIA announced its real-time simulation and collaboration platform for 3D production named "Omniverse" as a next-generation alternative for the Internet along with Roblox defining its service as metaverse during its IPO. Since then, metaverse has been commonly recognized as a world where we can cross over reality and virtuality. Based on the two axes and four scenarios proposed by the ASF, we review the literature across four realms as follows - virtual reality, mirror world, augmented reality, and lifelogging. Then, we examine the issues with the existing definition of metaverse and propose an alternative explanation by focusing on human behavior and user experience. Finally, we reassess the concept of metaverse and incorporate human communication, reality-based and virtual-based activities, and eXtended reality as elements to properly define metaverse.

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.

A Study on Users' Resistance toward ERP in the Pre-adoption Context (ERP 도입 전 구성원의 저항)

  • Park, Jae-Sung;Cho, Yong-Soo;Koh, Joon
    • Asia pacific journal of information systems
    • /
    • v.19 no.4
    • /
    • pp.77-100
    • /
    • 2009
  • Information Systems (IS) is an essential tool for any organizations. The last decade has seen an increasing body of knowledge on IS usage. Yet, IS often fails because of its misuse or non-use. In general, decisions regarding the selection of a system, which involve the evaluation of many IS vendors and an enormous initial investment, are made not through the consensus of employees but through the top-down decision making by top managers. In situations where the selected system does not satisfy the needs of the employees, the forced use of the selected IS will only result in their resistance to it. Many organizations have been either integrating dispersed legacy systems such as archipelago or adopting a new ERP (Enterprise Resource Planning) system to enhance employee efficiency. This study examines user resistance prior to the adoption of the selected IS or ERP system. As such, this study identifies the importance of managing organizational resistance that may appear in the pre-adoption context of an integrated IS or ERP system, explores key factors influencing user resistance, and investigates how prior experience with other integrated IS or ERP systems may change the relationship between the affecting factors and user resistance. This study focuses on organizational members' resistance and the affecting factors in the pre-adoption context of an integrated IS or ERP system rather than in the context of an ERP adoption itself or ERP post-adoption. Based on prior literature, this study proposes a research model that considers six key variables, including perceived benefit, system complexity, fitness with existing tasks, attitude toward change, the psychological reactance trait, and perceived IT competence. They are considered as independent variables affecting user resistance toward an integrated IS or ERP system. This study also introduces the concept of prior experience (i.e., whether a user has prior experience with an integrated IS or ERP system) as a moderating variable to examine the impact of perceived benefit and attitude toward change in user resistance. As such, we propose eight hypotheses with respect to the model. For the empirical validation of the hypotheses, we developed relevant instruments for each research variable based on prior literature and surveyed 95 professional researchers and the administrative staff of the Korea Photonics Technology Institute (KOPTI). We examined the organizational characteristics of KOPTI, the reasons behind their adoption of an ERP system, process changes caused by the introduction of the system, and employees' resistance/attitude toward the system at the time of the introduction. The results of the multiple regression analysis suggest that, among the six variables, perceived benefit, complexity, attitude toward change, and the psychological reactance trait significantly influence user resistance. These results further suggest that top management should manage the psychological states of their employees in order to minimize their resistance to the forced IS, even in the new system pre-adoption context. In addition, the moderating variable-prior experience was found to change the strength of the relationship between attitude toward change and system resistance. That is, the effect of attitude toward change in user resistance was significantly stronger in those with prior experience than those with no prior experience. This result implies that those with prior experience should be identified and provided with some type of attitude training or change management programs to minimize their resistance to the adoption of a system. This study contributes to the IS field by providing practical implications for IS practitioners. This study identifies system resistance stimuli of users, focusing on the pre-adoption context in a forced ERP system environment. We have empirically validated the proposed research model by examining several significant factors affecting user resistance against the adoption of an ERP system. In particular, we find a clear and significant role of the moderating variable, prior ERP usage experience, in the relationship between the affecting factors and user resistance. The results of the study suggest the importance of appropriately managing the factors that affect user resistance in organizations that plan to introduce a new ERP system or integrate legacy systems. Moreover, this study offers to practitioners several specific strategies (in particular, the categorization of users by their prior usage experience) for alleviating the resistant behaviors of users in the process of the ERP adoption before a system becomes available to them. Despite the valuable contributions of this study, there are also some limitations which will be discussed in this paper to make the study more complete and consistent.

Effective Management of Invasive Nutria (Myocastor coypus) in the UK and the USA (영국과 미국에서 침입성 뉴트리아 (Myocastor coypus)의 효과적 관리)

  • Kil, Jihyon;Lee, Do-hun;Kim, Young-chae
    • Ecology and Resilient Infrastructure
    • /
    • v.2 no.4
    • /
    • pp.265-273
    • /
    • 2015
  • It is the better to take preventative measures against the natural intrusion in advance from invasive alien species that reduce biodiversity and cause economic loss to humans. If the prevention of intrusion and spread fails, we need to make active control and eradication. This study aims to introduce nutria (Myocastor coypus) control cases performed in the United Kingdom and the United States and to provide information for the contribution of nutria management measure improvements. The nutria eradication campaign in the United Kingdom was developed as a long-term plan based on sufficient understanding on the management target and objective and suitable support. Sufficient information on nutria was accumulated and the management strategy was flexibly modified according to the changes in management that were proactively reflected in the field. Regarding the eradication project at Chesapeake Bay in the United States, based on long-term ecological information, more advanced capture technology than in the United Kingdom were introduced and the eradication plan, strategy and implementation were configured by analyzing the strengths and weaknesses of the eradication campaign in the United Kingdom. The successful cases in the United Kingdom and the United State provide an information on how to improv the nutria management measure. For the eradication of nutria, it is necessary to reach a consensus between stakeholders and to form a consultative group between related organizations for periodic communication. Opinions on the field must be actively accepted in the consultation process for strategy and policy decision, and the eradication plan needs to be developed based on a management index. The eradication plan is required to be managed, evaluated and adjusted in a systematic way. Scientific management must be introduced and the management performance must be evaluated objectively so that a practical plan can be flexibly adjusted. It is also required to secure a long-term budget support and a stable organization and to input a concentrated budget at the proper period when there is high efficiency of eradication.

Suggested Protocol for Efficient Medical Image Information Exchange in Korea: Breast MRI (효율적 의료영상정보교류를 위한 프로토콜 제안: 유방자기공명영상)

  • Park, Ji Hee;Choi, Seon-Hyeong;Kim, Sungjun;Yong, Hwan Seok;Woo, Hyunsik;Jin, Kwang Nam;Jeong, Woo Kyoung;Shin, Na-Young;Choi, Moon Hyung;Jung, Seung Eun
    • Journal of the Korean Society of Radiology
    • /
    • v.79 no.5
    • /
    • pp.254-258
    • /
    • 2018
  • Purpose: Establishment of an appropriate protocol for breast magnetic resonance imaging (MRI) in the study of image quality standards to enhance the effectiveness of medical image information exchange, which is part of the construction and activation of clinical information exchange for healthcare informatization. Materials and Methods: The recommended protocols of breast and MRI scans were reviewed and the questionnaire was prepared by a responsible researcher. Then, a panel of 9 breast dedicated radiologists was set up in Korea. The expert panel conducted a total of three Delphi agreements to draw up a consensus on the breast MRI protocol. Results: The agreed breast MRI recommendation protocol is a 1.5 Tesla or higher device that acquires images with prone position using a breast dedicated coil and includes T2-weighted and pre-contrast T1-weighted images. Contrast enhancement images are acquired at least two times, and include 60-120 seconds between images and after 4 minutes. The contrast enhancement T1-weighted image should be less than 3 mm in thickness, less than 120 seconds in temporal resolution, and less than $1.5mm^2$ in-plane pixel resolution. Conclusion: The Delphi agreement of the domestic breast imaging specialist group has established the recommendation protocol of the effective breast MRI.

A Study on the System of Private Investigation

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.1
    • /
    • pp.167-174
    • /
    • 2022
  • Since the Promotion Committee was established on March 25, 2021, urging the enactment of the Detective Business Act, many opinions and attention from all walks of life have been gathered. The Detective Business system, which is also one of the presidential pledges of the current 19th President Moon Jae In, is expected to be significant in that it can promote the development of a welfare state as well as efficient parts such as meeting the demand for security reinforcement services, improving the judicial system, and enhancing internationalization. In accordance with the consensus of the nine judges of the Constitutional Court that the lower part of Article 40 of the "Act on the Use and Protection of Credit Information" which prohibits the use of similar names such as investigating the general life of certain people does not violate the Constitution, detective work became possible regardless of the general life investigation. In particular, the detective job officially appeared on August 5, 2020, and it will be able to provide effective work services to the public by competing with prosecutors, police, and lawyers who have occupied exclusive positions in the field of a criminal investigations. However, although the role of detectives is gradually expanding and society is rapidly changing, illegal activities are prevalent throughout society, and more than 1,600 companies are currently operating suspiciously using the only name of "detectives", but the police are virtually letting go of the situation saying that they are "unauthorized.", and the damage is only going to the people, so at this point, the most worrisome thing is the absence of the law. Meanwhile, amid concerns over institutions overseeing illegal activities caused by the emergence of the detective industry, private security and detectives are similar to each other as in the United States, and it is expected to be able to gain public trust by entrusting the police in charge of managing and supervising private security companies. Therefore, at this time when most OECD countries except Korea legislate the Detective Business Act, prematurely allowing only the detective industry without enacting industry-related laws and systems can further fuel social confusion and hinder the detective industry along with the new fourth industry.