• Title/Summary/Keyword: Diffusion of Issues

Search Result 150, Processing Time 0.027 seconds

Italian Pension Reform Politics and Labor Unions since 1990's - Social Dialogue, or Mass Struggle? - (이탈리아 연금개혁의 정치와 노동조합의 역할 - 코포라티즘적 협의와 대중적 저항, 두 개의 경로를 중심으로 -)

  • Joo, Eun-sun;Jung, Hae-sik
    • Korean Journal of Social Welfare Studies
    • /
    • no.39
    • /
    • pp.365-393
    • /
    • 2008
  • This research examnied the roles, the strategies and the influence of labor unions on the pension reform. In Italia labor unions were important actors in pension reform politics during 1990s, but in 2004 labor union was excluded from the pension reform. This difference is not only related with diffusion of the leftist party but also the experience of pension benefit retrenchment of the pension reform in 1995 in which labor unions had initiatives. Labor unions choose their strategies, social dialogue or mass struggle, depending on the attitudes of government. After change of government following the failure of the pension reform in 1994 Italian government tried social dialogue. In Dini reform in 1995, laborunions had initiative in making pension reform plan. Labor unions obtained member's approval using membership vote. It had repressed opposition from militant sectors effectively. However Labor unions concentrated on the issues of transition measures and protecting vested rights in seniority pension ignoring problems of contribution evasion of small-firm workers and benefit adequacy of young workers. Even when labor unions leaded social concertation processes and pursued union democracy, labor unions' influences on the pension reform had fundamental limitations.

The Framework of Research Network and Performance Evaluation on Personal Information Security: Social Network Analysis Perspective (개인정보보호 분야의 연구자 네트워크와 성과 평가 프레임워크: 소셜 네트워크 분석을 중심으로)

  • Kim, Minsu;Choi, Jaewon;Kim, Hyun Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.1
    • /
    • pp.177-193
    • /
    • 2014
  • Over the past decade, there has been a rapid diffusion of electronic commerce and a rising number of interconnected networks, resulting in an escalation of security threats and privacy concerns. Electronic commerce has a built-in trade-off between the necessity of providing at least some personal information to consummate an online transaction, and the risk of negative consequences from providing such information. More recently, the frequent disclosure of private information has raised concerns about privacy and its impacts. This has motivated researchers in various fields to explore information privacy issues to address these concerns. Accordingly, the necessity for information privacy policies and technologies for collecting and storing data, and information privacy research in various fields such as medicine, computer science, business, and statistics has increased. The occurrence of various information security accidents have made finding experts in the information security field an important issue. Objective measures for finding such experts are required, as it is currently rather subjective. Based on social network analysis, this paper focused on a framework to evaluate the process of finding experts in the information security field. We collected data from the National Discovery for Science Leaders (NDSL) database, initially collecting about 2000 papers covering the period between 2005 and 2013. Outliers and the data of irrelevant papers were dropped, leaving 784 papers to test the suggested hypotheses. The co-authorship network data for co-author relationship, publisher, affiliation, and so on were analyzed using social network measures including centrality and structural hole. The results of our model estimation are as follows. With the exception of Hypothesis 3, which deals with the relationship between eigenvector centrality and performance, all of our hypotheses were supported. In line with our hypothesis, degree centrality (H1) was supported with its positive influence on the researchers' publishing performance (p<0.001). This finding indicates that as the degree of cooperation increased, the more the publishing performance of researchers increased. In addition, closeness centrality (H2) was also positively associated with researchers' publishing performance (p<0.001), suggesting that, as the efficiency of information acquisition increased, the more the researchers' publishing performance increased. This paper identified the difference in publishing performance among researchers. The analysis can be used to identify core experts and evaluate their performance in the information privacy research field. The co-authorship network for information privacy can aid in understanding the deep relationships among researchers. In addition, extracting characteristics of publishers and affiliations, this paper suggested an understanding of the social network measures and their potential for finding experts in the information privacy field. Social concerns about securing the objectivity of experts have increased, because experts in the information privacy field frequently participate in political consultation, and business education support and evaluation. In terms of practical implications, this research suggests an objective framework for experts in the information privacy field, and is useful for people who are in charge of managing research human resources. This study has some limitations, providing opportunities and suggestions for future research. Presenting the difference in information diffusion according to media and proximity presents difficulties for the generalization of the theory due to the small sample size. Therefore, further studies could consider an increased sample size and media diversity, the difference in information diffusion according to the media type, and information proximity could be explored in more detail. Moreover, previous network research has commonly observed a causal relationship between the independent and dependent variable (Kadushin, 2012). In this study, degree centrality as an independent variable might have causal relationship with performance as a dependent variable. However, in the case of network analysis research, network indices could be computed after the network relationship is created. An annual analysis could help mitigate this limitation.

The influence of Social Norm and Critical Mass on Online Game User's Word of Mouth (사회규범과 크리티컬 매스가 온라인 게임 이용자의 구전의도에 미치는 영향에 관한 연구)

  • Bae, Jungho;Kim, Moon Seop
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.4
    • /
    • pp.355-367
    • /
    • 2014
  • The purpose of this research is to find the specific structure with factors that affect online game users' positive word of mouth(WOM) for online game companies to maintain existing and new users. In previous studies the influence of characteristics of online games and attributes of users on intention to play online games is mainly focused on. However online games are products with communication on network, so that critical mass through diffusion as well as the use of product by individual consumers is important issues. Therefore, it is necessary to consider network externality effect that the more value can be obtained by more game users. The authors verified that the influence of the variables like social mass and critical mass, affecting consumers' attitude and WOM. According to the research results, social norm and critical mass have significant influence on positive attitude and WOM intention for online games. Another results verified that social norm and users' attitude affect positive WOM intention directly. These results suggest managerial implication regarding social norm and critical mass to online game companies that desire for WOM to get more online game users.

Development of A Model for Estimating ITS Market Size in Korea (지능형교통체계(ITS)의 시장예측모형 개발에 관한 연구)

  • 배상훈
    • Journal of Korean Society of Transportation
    • /
    • v.19 no.5
    • /
    • pp.21-33
    • /
    • 2001
  • Intelligent Transport Systems (ITS) was first introduced in Korea early 1990's, and Korean government has put a lot of efforts for flourishing it in the entire nation. Regardless of these efforts, private participation is not active enough to accelerate ITS implementation in Korea. Expert group made every endeavor to analyze the current situation, and found out some phenomena. It may be summarized as two folds. Firstly, private sector has a lack of confidence on the future ITS market. Budget in the strategic plan is the only publication and guide that private sector can refer to, and it merely indicates deployment costs. Secondly, direction and procedure of R&D are not well defined. It implies that private sector takes too much risk when they invest for R&D. This research, therefore, focuses on the first issues. Concretely, the goal of the project was to establish and analyze the model for estimation the future ITS market side. Author reviewed both quantitative and qualitative models, and concluded that diffusion model in qualitative model was suitable for ITS market estimation. According to model calibration. it is estimated that 14 trillion Won was the market size in 2020 under normal condition. Impact of this result may seduce Information Technology(IT) related private companies into ITS market. Although this research couldn't cover various topics, it nay dedicate in boosting ITS in Korea. Also, it will be a good starting point for further study for the advancement of ITS.

  • PDF

New Approaches for Overcoming Current Issues of Plasma Sputtering Process During Organic-electronics Device Fabrication: Plasma Damage Free and Room Temperature Process for High Quality Metal Oxide Thin Film

  • Hong, Mun-Pyo
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2012.02a
    • /
    • pp.100-101
    • /
    • 2012
  • The plasma damage free and room temperature processedthin film deposition technology is essential for realization of various next generation organic microelectronic devices such as flexible AMOLED display, flexible OLED lighting, and organic photovoltaic cells because characteristics of fragile organic materials in the plasma process and low glass transition temperatures (Tg) of polymer substrate. In case of directly deposition of metal oxide thin films (including transparent conductive oxide (TCO) and amorphous oxide semiconductor (AOS)) on the organic layers, plasma damages against to the organic materials is fatal. This damage is believed to be originated mainly from high energy energetic particles during the sputtering process such as negative oxygen ions, reflected neutrals by reflection of plasma background gas at the target surface, sputtered atoms, bulk plasma ions, and secondary electrons. To solve this problem, we developed the NBAS (Neutral Beam Assisted Sputtering) process as a plasma damage free and room temperature processed sputtering technology. As a result, electro-optical properties of NBAS processed ITO thin film showed resistivity of $4.0{\times}10^{-4}{\Omega}{\cdot}m$ and high transmittance (>90% at 550 nm) with nano- crystalline structure at room temperature process. Furthermore, in the experiment result of directly deposition of TCO top anode on the inverted structure OLED cell, it is verified that NBAS TCO deposition process does not damages to the underlying organic layers. In case of deposition of transparent conductive oxide (TCO) thin film on the plastic polymer substrate, the room temperature processed sputtering coating of high quality TCO thin film is required. During the sputtering process with higher density plasma, the energetic particles contribute self supplying of activation & crystallization energy without any additional heating and post-annealing and forminga high quality TCO thin film. However, negative oxygen ions which generated from sputteringtarget surface by electron attachment are accelerated to high energy by induced cathode self-bias. Thus the high energy negative oxygen ions can lead to critical physical bombardment damages to forming oxide thin film and this effect does not recover in room temperature process without post thermal annealing. To salve the inherent limitation of plasma sputtering, we have been developed the Magnetic Field Shielded Sputtering (MFSS) process as the high quality oxide thin film deposition process at room temperature. The MFSS process is effectively eliminate or suppress the negative oxygen ions bombardment damage by the plasma limiter which composed permanent magnet array. As a result, electro-optical properties of MFSS processed ITO thin film (resistivity $3.9{\times}10^{-4}{\Omega}{\cdot}cm$, transmittance 95% at 550 nm) have approachedthose of a high temperature DC magnetron sputtering (DMS) ITO thin film were. Also, AOS (a-IGZO) TFTs fabricated by MFSS process without higher temperature post annealing showed very comparable electrical performance with those by DMS process with $400^{\circ}C$ post annealing. They are important to note that the bombardment of a negative oxygen ion which is accelerated by dc self-bias during rf sputtering could degrade the electrical performance of ITO electrodes and a-IGZO TFTs. Finally, we found that reduction of damage from the high energy negative oxygen ions bombardment drives improvement of crystalline structure in the ITO thin film and suppression of the sub-gab states in a-IGZO semiconductor thin film. For realization of organic flexible electronic devices based on plastic substrates, gas barrier coatings are required to prevent the permeation of water and oxygen because organic materials are highly susceptible to water and oxygen. In particular, high efficiency flexible AMOLEDs needs an extremely low water vapor transition rate (WVTR) of $1{\times}10^{-6}gm^{-2}day^{-1}$. The key factor in high quality inorganic gas barrier formation for achieving the very low WVTR required (under ${\sim}10^{-6}gm^{-2}day^{-1}$) is the suppression of nano-sized defect sites and gas diffusion pathways among the grain boundaries. For formation of high quality single inorganic gas barrier layer, we developed high density nano-structured Al2O3 single gas barrier layer usinga NBAS process. The NBAS process can continuously change crystalline structures from an amorphous phase to a nano- crystalline phase with various grain sizes in a single inorganic thin film. As a result, the water vapor transmission rates (WVTR) of the NBAS processed $Al_2O_3$ gas barrier film have improved order of magnitude compared with that of conventional $Al_2O_3$ layers made by the RF magnetron sputteringprocess under the same sputtering conditions; the WVTR of the NBAS processed $Al_2O_3$ gas barrier film was about $5{\times}10^{-6}g/m^2/day$ by just single layer.

  • PDF

Chronopolitics in the Cinematic Representations of "Comfort Women" (일본군 '위안부'의 영화적 기억과 크로노폴리틱스)

  • Park, Hyun-Seon
    • Journal of Popular Narrative
    • /
    • v.26 no.1
    • /
    • pp.175-209
    • /
    • 2020
  • This paper examines how the cinematic representation of the Japanese military "comfort women" stimulates 'imagination' in the realm of everyday life and in the memory of the masses, creating a common awareness and affect. The history of the Japanese military "comfort women" was hidden for a long time, and it was not until the 1990s that it entered the field of public recognition. Such a transition can be attributed to the external and internal chronopolitics that made possible the testimony of the victims and the discourse of the "comfort women" issue. It shows the peculiar status of the comfort women history as 'politics of time'. In the same vein, the cinematic representations of the Japanese military "comfort women" can be found in similar chronopolitics. The 'comfort women' films have shown the dual time frame of the continuity and discontinuity of the 'silence'. In Korean film history, the chronotope of the reproduction of "comfort women" can be divided into four phases: 1) the fictional representations of "comfort women" before the 1990s 2) documentaries in the late 1990s as the work of testimony and history writing, 3) melodramatic transformation in the feature films in the 2000s, and 4) the diffusion of media and categories. The purpose of this article is to focus on the first phase and the third phase in which the issue of 'comfort women' is represented in the category of popular fiction films. While the "comfort women" representations before 1990 were strictly adhering to the framework of commercial movies and pursued the sexual exploitation of "comfort women" history, the recent films since the 2000s are experimenting with various attempts in the style of popular imagination. Especially, the emergence of 'comfort women' feature films in the 2000s, such as Spirit's Homecoming, I Can Speak, and Herstory, raise various questions as to whether we are "properly" aware of issues and how to remember and present the "cultural memory" of comfort women. Also, focusing on the cinematic representation strategies of the 2000s "comfort women", this article discusses the popular politics of melodrama, the representation of victims and violence, and the feature of 'comfort women' as meta-memory. As a melodramatic imagination and meta-memory for the historical trauma, the "comfort women" drama shows the historical, political, and aesthetic gateways to which the "comfort women" problem must pass. As we have seen in recent fiction films, the issue of "comfort women" goes beyond transnational relations between Korea and Japan; it demands a postcolonial task to dismantle the old colonial structure and explores a transnational project in which women's movements and human rights movements are linked internationally.

Comparative Analysis of ViSCa Platform-based Mobile Payment Service with other Cases (스마트카드 가상화(ViSCa) 플랫폼 기반 모바일 결제 서비스 제안 및 타 사례와의 비교분석)

  • Lee, June-Yeop;Lee, Kyoung-Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.2
    • /
    • pp.163-178
    • /
    • 2014
  • Following research proposes "Virtualization of Smart Cards (ViSCa)" which is a security system that aims to provide a multi-device platform for the deployment of services that require a strong security protocol, both for the access & authentication and execution of its applications and focuses on analyzing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service by comparing with other similar cases. At the present day, the appearance of new ICT, the diffusion of new user devices (such as smartphones, tablet PC, and so on) and the growth of internet penetration rate are creating many world-shaking services yet in the most of these applications' private information has to be shared, which means that security breaches and illegal access to that information are real threats that have to be solved. Also mobile payment service is, one of the innovative services, has same issues which are real threats for users because mobile payment service sometimes requires user identification, an authentication procedure and confidential data sharing. Thus, an extra layer of security is needed in their communication and execution protocols. The Virtualization of Smart Cards (ViSCa), concept is a holistic approach and centralized management for a security system that pursues to provide a ubiquitous multi-device platform for the arrangement of mobile payment services that demand a powerful security protocol, both for the access & authentication and execution of its applications. In this sense, Virtualization of Smart Cards (ViSCa) offers full interoperability and full access from any user device without any loss of security. The concept prevents possible attacks by third parties, guaranteeing the confidentiality of personal data, bank accounts or private financial information. The Virtualization of Smart Cards (ViSCa) concept is split in two different phases: the execution of the user authentication protocol on the user device and the cloud architecture that executes the secure application. Thus, the secure service access is guaranteed at anytime, anywhere and through any device supporting previously required security mechanisms. The security level is improved by using virtualization technology in the cloud. This virtualization technology is used terminal virtualization to virtualize smart card hardware and thrive to manage virtualized smart cards as a whole, through mobile cloud technology in Virtualization of Smart Cards (ViSCa) platform-based mobile payment service. This entire process is referred to as Smart Card as a Service (SCaaS). Virtualization of Smart Cards (ViSCa) platform-based mobile payment service virtualizes smart card, which is used as payment mean, and loads it in to the mobile cloud. Authentication takes place through application and helps log on to mobile cloud and chooses one of virtualized smart card as a payment method. To decide the scope of the research, which is comparing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service with other similar cases, we categorized the prior researches' mobile payment service groups into distinct feature and service type. Both groups store credit card's data in the mobile device and settle the payment process at the offline market. By the location where the electronic financial transaction information (data) is stored, the groups can be categorized into two main service types. First is "App Method" which loads the data in the server connected to the application. Second "Mobile Card Method" stores its data in the Integrated Circuit (IC) chip, which holds financial transaction data, which is inbuilt in the mobile device secure element (SE). Through prior researches on accept factors of mobile payment service and its market environment, we came up with six key factors of comparative analysis which are economic, generality, security, convenience(ease of use), applicability and efficiency. Within the chosen group, we compared and analyzed the selected cases and Virtualization of Smart Cards (ViSCa) platform-based mobile payment service.

A qualitative study on the process of maintaining the 'eating alone'(honbob) lifestyle (직장인의 '혼밥' 유지 과정에 대한 질적 연구)

  • Hye Jin Kwon;Younga Ju
    • Korean Journal of Culture and Social Issue
    • /
    • v.24 no.4
    • /
    • pp.657-689
    • /
    • 2018
  • The purpose of this study is to develop a substantive theory on 'eating alone'(honbob)and the process of maintaining the lifestyle of eating alone for the need of a non-judgmental understanding on the new 'honbob' lifestyle. Data were collected through in-depth interviews with 10 male and female workers in Seoul and Gyeonggi-do, who voluntarily eat alone over 70% of their meals per week with the minimum duration of 5 years. Data analysis was performed using grounded theory proposed by Strauss & Corbin (1998) in the qualitative research method. As a result, a paradigm model on the process of maintaining 'honbob' was derived. Based on categorical analysis, the causal condition was 'not trying to tune' and the central phenomenon was 'following the desire to set efficiency as the top priority. Contextual conditions were 'the atmosphere of fierce competition', 'weakening of organizational culture', 'diffusion of individualistic culture'. The intervening conditions were 'personal trait and emotional experience', 'job characteristics of less organization culture'. The action/interaction strategies were 'accepting internal conflicts', 'acting in autonomy', 'finding relationship through media', and 'distancing from superficial relationship'. The consequences were 'enjoying time for self-exploration', 'valuing self-care', 'becoming a epicurean conventionalist', and 'becoming aware of the need for balance'. The core category has been shown as 'self-oriented in accordance to priority of efficiency and being able to appreciate the importance of social group'. The Such phenomenon passes through four different stages - first, the stage of weighing time efficiency while beginning hon-bob; second, the stage of conflict when one feels nervous and not free from others' view; third, the stage of adjustment to justify his/her 'hon-bob'; and the final stage of balance to perceive the importance of social group while going on 'honbob'. The study had the aim of increasing the understanding and acceptance of the new 'honbob' lifestyle through an in-depth exploration of office worker's 'honbob' experience and the process of maintaining 'honbob' so the society can better accept it and, further, to embrace co-existence of various cultures.

Derivation and Empirical Analysis of Critical Factors that Facilitate Technology Transfer and Commercialization of Research Outcome (연구성과의 기술이전 및 사업화 촉진요인 도출 및 실증분석)

  • Ku, Bon Chul
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.9 no.5
    • /
    • pp.69-81
    • /
    • 2014
  • There is a growing interest in the technology transfer and commercialization both at home and abroad. Accordingly, this study looked at the concept of technology transfer and commercialization, identified the factors that should be taken into account in order to facilitate technology transfer and commercialization, and then performed a empirical analysis. As for the conventional technology transfer and commercialization, there was a tendency to limit its scope to the exploration, transfer and commercialization of technology itself. Here in this research, technology transfer and commercialization is defined the category to expand as various activities implemented in order to make sure that intellectual properties such as intangible technological developments, know-how, and knowledge are transferred between the relevant parties through a contract or negotiation, and the party to which the transfer is made can then further develop and exploit the technology into tangible products and other activities to obtain economic benefit out of that. In addition, the findings of the positive analysis of technology transfer and commercialization revealed that the focus of facilitating technology transfer has been on the technology itself, its management and securing efficiency of the systems and institutions involved in the technology transfer and commercialization. So there was lack of recognition as to the importance of financial support given to the phase of technology commercialization. This indicates that when it comes to the technology transfer and commercialization, quantitative performance has been the focus of interest such as patent application, registration, number of technology transfers, royalty, etc. So there was not enough understanding as to the issues of starting up a business, creating quality jobs through technology transfer and commercialization, which are directly related to the realization of the creative economy. In this regard, this research is expected to be used for the development for the future policies to boost technology transfer and commercialization as it suggests not only simply ensuring quantitative performance but also necessary to create the environment for the creation of the stable ecosystem for the parties involved in the technology transfer and commercialization and then to build circumstances in which creative economy can be realized.

  • PDF

A Study on Environmental Impact Assessment Guidelines for Marine Environments in Harbor Construction Projects (항만건설사업의 해양환경 환경영향평가 가이드라인 개발 연구)

  • Maeng, Junho;Kim, Taeyun;Lee, Haemi
    • Journal of Environmental Impact Assessment
    • /
    • v.31 no.3
    • /
    • pp.141-160
    • /
    • 2022
  • The harbor construction projects can lead to various marine environmental problems including habitat degradation and loss, marine water pollution, change of flow patterns, erosion, scour, sedimentation, and so on. The EIA is a measure to prevent various environmental problems in advance from examining and minimizing the environmental impacts before the proposed developments are implemented. In addition, institutions reviewing EIA reports have made efforts to conduct scientific and standardized EIA by applying EIA guidelines for each project. This study aims to create a EIA guideline focusing on the harbor construction projects. Based on the review comments of the harbor construction EIA reports for the past 13 years (2009-2021) and the EIA guidelines of different types of projects, we identified the marine environmental problems and provided the appropriate guideline. This guideline summarizes and presents the contents which must be reviewed in the baseline condition survey, impact assessment, mitigation, and post-environmental impact investigation in the fields of marine fauna and flora, marine physics, and marine water and sediment quality. In the case of a baseline condition survey of marine fauna and flora, a method for selecting survey points considering the characteristics of sea area and project was presented. When estimating the impact of marine fauna and flora, we presented methods for predicting the impact on them due to the spread of suspended sediments and the damage to benthic habitats due to dredging and reclamation. In consideration of the characteristics of the sea area, we divided the survey items of the marine physics into essential items and supplementary items. In predicting the impact of marine physics, various methods for major issues such as seawater circulation, suspended sediment and bottom sediment transport, water temperature and salinity diffusion, seawater exchange, wave transformation, harbor tranquility, and shoreline change were presented. The research results will contribute to protect the marine environment by inducing more systematic and scientific surveys, impact assessments, and mitigation in the EIA process.