• Title/Summary/Keyword: IT 기술 격차

Search Result 225, Processing Time 0.02 seconds

The Government's Supporting Strategies to the Productive Prosumer Economy for the Successful Transition to the Fourth Industrial Revolution Era: Human Resource Development Perspectives for Solving Job problems (4차 산업혁명시대, 생산적인 프로슈머 이코노미로의 전환을 위한 정책제언: 일자리문제 해결을 위한 인적자원개발의 관점에서)

  • Lim, Ji-Sun
    • Informatization Policy
    • /
    • v.24 no.2
    • /
    • pp.87-104
    • /
    • 2017
  • The Fourth Industrial Revolution, which is based on the development of information and communication technology (ICT), is expected to replace human knowledge work, which will cause problems of mass unemployment and wide income gap from job polarization. Furthermore, the change is expected to be rapid and wide, demanding proactive measures to respond to such abrupt social changes. However, previous literatures assume that the traditional form of employment will continue and provide limited solutions only. On the other hand, the Fourth Industrial Revolution will enable transition to the Prosumer Economy, which will ultimately lead consumers to become producers through increased job flexibility. If the prosumer economy arrives and the consumers become producers, it will no longer be the matter of finding workplace but rather, the matter of finding the work itself. In this regard, the new technologies of the Fourth Industrial Revolution can be the fundamental solution to such job issues. This paper suggests stable transition to the Prosumer Economy in order to solve the job issues in the age of the Fourth Industrial Revolution. In order to effectively support the process, this paper suggests first, ensuring the amount of education by shortening labor time; second, facilitating life-time education through free online education service; and third, closing the digital divide through mandatory use of the e-government system.

Security Frameworks for Industrial Technology Leakage Prevention (산업기술 유출 방지를 위한 보안 프레임워크 연구)

  • YangKyu Lim;WonHyung Park;Hwansoo Lee
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.33-41
    • /
    • 2023
  • In recent years, advanced persistent threat (APT) attack organizations have exploited various vulnerabilities and attack techniques to target companies and institutions with national core technologies, distributing ransomware and demanding payment, stealing nationally important industrial secrets and distributing them on the black market (dark web), selling them to third countries, or using them to close the technology gap, requiring national-level security preparations. In this paper, we analyze the attack methods of attack organizations such as Kimsuky and Lazarus that caused industrial secrets leakage damage through APT attacks in Korea using the MITRE ATT&CK framework, and derive 26 cybersecurity-related administrative, physical, and technical security requirements that a company's security system should be equipped with. We also proposed a security framework and system configuration plan to utilize the security requirements in actual field. The security requirements presented in this paper provide practical methods and frameworks for security system developers and operators to utilize in security work to prevent leakage of corporate industrial secrets. In the future, it is necessary to analyze the advanced and intelligent attacks of various APT attack groups based on this paper and further research on related security measures.

A Qualitative Analytic Study on Job Skill Elements and its Training Demand of the Display Industry (디스플레이 산업의 직무기술요소에 대한 정성적 훈련수요 분석 연구)

  • Lee, Jae-Won;Yoon, Seock-Chun
    • The Journal of Korean Institute for Practical Engineering Education
    • /
    • v.3 no.1
    • /
    • pp.127-135
    • /
    • 2011
  • The past quantitative analysis of the demand for job skill training had mainly focused on personnel shortage and oversupply, so it has the problems of the qualitative discrepancies called skill mismatch. As a supplementary study relating to specific industries and occupations, a discussion to improve the job skills training programs through a qualitative analysis is needed. This study provide the analysis of urgency evaluation using the relative importance and gap of the job skill elements in the display industry. And renewal possibilities of the training program based on this qualitative bottom-up approach will be discussed. We carried out a job skill demand survey in the display industry as research methods. Industry related jobs and each job task, the qualitative demand for each job skills, and procurement methods for each job skills were analyzed. Adequate supply of vocational training programs have tried to find ways by illustrating some related training courses.

  • PDF

Differences in Perception of Information Security Knowledge and Skills Between Academia and Industry (정보보호 전문인력의 소요 지식 및 기술에 대한 산업체와 교육기관의 관점 비교)

  • Yoo, Hye-Won;Kim, Tae-Sung
    • Information Systems Review
    • /
    • v.11 no.2
    • /
    • pp.113-129
    • /
    • 2009
  • With increasing interest in information security, many studies have been conducted on cultivation and management of information security manpower. The widespread application of information security made the activity of information security professionals more diverse. Therefore, it is essential to analyze the knowledge and skills that are necessary for information security professionals to carry out their job and we also need to take these into considerations for the development and operation of education programs. In this study, for analyzing the perception gaps of information security knowledge and skills level between academia and industry, we have derived 58 knowledge and skills by conducting the literature review and Delphi method and we also conducted a survey of information security knowledge and skills requirements for information security professionals who are now working in industries and educational organizations. As a result, we analyze the perception gaps between two groups of information security professionals and suggest some guidelines for establishing the demand-based curriculum for training information security professionals.

An Analysis of the Public Access to the Internet at Public Libraries in Busan and Kyungnam Province (공공도서관 인터넷 접속 서비스의 이용 현황 분석: 부산 . 경남지역을 중심으로)

  • 서혜란
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.13 no.2
    • /
    • pp.75-96
    • /
    • 2002
  • This is a user study of the public access to the Internet at public libraries in Busan and Kyungnam province. The mainstream of users was identified as a typical 'information rich'. It was found that public libraries were not successful in leading the traditional non-users into the libraries with public access to the Internet in libraries. For users the most attractive feature of the service was the fact that it was given for free, while they were not value the professional guidance of librarians. Upgrade of hardwares and telecommunication infrastructure was at the highest priority of the users want list, Some strategies for the public access to the Internet at public libraries were proposed.

  • PDF

An Exploratory Study on the Factors of Assimilation Gap in Information Technology at the Individual Level (개인의 정보기술 수용격차 요인에 대한 탐색적 연구)

  • Baek, Sang-Yong
    • The Journal of Information Systems
    • /
    • v.16 no.3
    • /
    • pp.45-68
    • /
    • 2007
  • This study aims to explore factors of Assimilation Gap(AG) which is proposed and illustrated by Fichman and Kemerer(1997). AG is defined as the time delay between adoption and deployment and mainly studied at the organizational level. This study derives the factor affecting AG through a review of technology acceptance models and agency theory. The research model consists of three groups of independent variables(IT knowledge burden, Individual characteristics, and organization characteristics) and a moderator, which is goal incongruence. Using multiple regression analyses, four groups of hypotheses are tested with data of 221 knowledge workers from various organizations through e-mail survey. The result shows that radicalness(a dimension of knowledge burden), personal innovativeness, self-efficacy, and organizational support are statistically significant factors while complexity, experience, and perceived critical mass are not supported. The moderator effects of goal incongruence are found in personal innovativeness and organizational support. The results of this study demonstrate that agency theory is a useful perspective to deal with AG, especially in radical innovation. In addition, IT practitioners should consider not only user training but also incentives and possible organizational controls in implementing a new information technology.

  • PDF

Transferring Innovation Capacities to Developing Countries: A KIST-based Strategy (기술혁신역량의 개도국 전수를 위한 전략 연구: KIST사례를 중심으로)

  • Lee, Chang G.;Kim, Jong Joo;Chung, Sun Yang
    • Journal of Korea Technology Innovation Society
    • /
    • v.20 no.3
    • /
    • pp.709-731
    • /
    • 2017
  • Great attention has been paid to absorptive capacity (AC) as a means of technological innovation. However, few developing countries have demonstrated real success in the development of their technologies and economies. Global issues such as climate change, contagious disease, etc. require more active cooperation between developing and developed countries. This paper makes the novel argument that the donor's transplanting capacity (TC) should be developed and coevolved in concert with the recipient country's AC. Review of the literature shows that AC depends on a prior knowledge base and an intensity of effort. In this article, we analysed the case of KIST and suggest that codification of development experience, localization of innovation capacity, and donor committment comprise the core elements of TC. Nonaka (1994) argued that interaction between tacit knowledge and explicit knowledge can synergize to increase the overall store of available knowledge. Development experience, which leans heavily toward tacit knowledge, should be transformed into explicit knowledge for more efficient technology diffusion. The technological environments of recipient countries vary from those of their donors, which is why innovation capacity should conform to local conditions in order to make transplantation smoother. Donor committment is also critical for successfully transmitting valuable experience.

The Process of Changes and Challenges of Regional Science & Technology Policy in Korea (한국 지역과학기술정책의 변화와 발전 방향)

  • Ho Kim;Dongbok Kim;Yoonsik Chae
    • Journal of Technology Innovation
    • /
    • v.31 no.1
    • /
    • pp.29-63
    • /
    • 2023
  • The purpose of this study is to analyze the process of changes in regional science and technology policies in Korea and to seek future development directions. In Korea, regional science and technology policies have been implemented since the introduction of the local autonomy system. Since then, it has been implemented in earnest with the establishment of a central government-level plan. The regional science and technology policies have been developed to this day by interacting with national science and technology policies and regional development policies. Nevertheless, due to the path dependence and lock-in effect in the accumulated process, the regional science and technology policies are still subordinate to central government policies. Thus, the establishment of an independent ecosystem for local science and technology is still insufficient. Furthermore, the gap between regions is deepening, such as the growing of aging population, population decline due to low birth rates, job losses due to the recession of local key industry, and the concentration of the youth population in the metropolitan area. The transformation path such as digital transformation and carbon neutrality paradigm is expected to further widen regional disparities. In order to address a comprehensive problem, the implementing system of regional science and technology policies need to be newly established. A framework for reinvention of regional science and technology policy needed in the era of grand societal challenges have to be developed.

Kiosk Use Among Seniors: An Empirical Investigation of the Effects of Technostress and Subjective Norms on Awareness of Shadow Work (고령층의 키오스크 사용에서의 기술스트레스와 주관적 규범이 그림자노동 지각에 미치는 영향: 실증 분석)

  • Ji, Do-Sung;Koh, Joon
    • Informatization Policy
    • /
    • v.30 no.4
    • /
    • pp.62-88
    • /
    • 2023
  • While the introduction of kiosk has become an essential element, enjoying the effect of labor cost reduction, it has not been able to embrace the senior population due to the digital divide. This study investigated which factors have relationships with conflict over use for kiosk from the viewpoint of shadow work that appears during self-service kiosk use. An analysis of 159 seniors through survey revealed that both technostress and subjective norms had significant relationships with conflict over use for kiosk, and that the perception of shadow work had a partial mediating effect on these relationships. Further, user experience showed a moderating effect on the relationship between technostress and perception of shadow work. These results suggest theoretical and practical implications related to digital shadow work, providing the relevant policy regarding digital inclusion for seniors.

A Study of the Effect of Learning Processes on Decision Making Performance of IT Consultants (학습프로세스가 IT 컨설턴트의 의사결정 성과에 미치는 영향에 관한 연구)

  • Nah, Jung-Ok;Yim, Myung-Seong
    • Journal of Digital Convergence
    • /
    • v.11 no.2
    • /
    • pp.127-135
    • /
    • 2013
  • For the successful implementation of IT projects, individual consultant's competency in the project is very important. Especially, 3 key factors which are 1) Learning-by-Doing, 2) Learning-from-Others, and 3) Learning-by-Investment with individual consultant's competency, are required for solving various critical issues which can be occurred during implementing IT project. The objective of this research is to examine the effects of these learning processes on decision performance of consultants. Prior to setup the research model, we conducted 3 times in-depth interviews with IT consultants who have over 20 years IT project experiences. Through interviews with IT project expert, we tried to validate our research model and develop survey questionnaires. Over 100 consultants, who are working at SI companies those of Samsung SDS, LG CNS, SK C&C and other small SI companies, were participated to survey. In the contrary of our thoughts before conducted experiment, we got the interesting result from pilot experiment. Most influenced learning process was Learning-by-Doing and less influenced learning process was Learning-from-Others.