• Title/Summary/Keyword: IT Manager

Search Result 1,648, Processing Time 0.027 seconds

The Effect of Management Earnings Forecasts on Future Earnings Quality (경영자의 이익예측정보공시가 미래 이익의 질에 미치는 영향)

  • Kim, Seon-Gu
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.11
    • /
    • pp.363-372
    • /
    • 2017
  • This study analyzed how management earnings forecasts would have an effect on future earnings quality. The analysis period of study was from 2003 till 2009 (ofrom 2004 till 2011) based on variables of interest (dependent variables) and the annual data from a total of 475 companies that publicly announced manager's operating earnings forecasts among securities listing companies were used for analysis. As a result, first, it appeared that the more optimistic the manager's earnings forecasts were for the current term, the lower the future earnings quality was. Second, it was found that the lower the accuracy of the manager's earnings forecasts was for the current term, the lower the future earnings quality was. Such findings suggest that management earnings forecasts will be used for determining future earnings quality.

An IPIMS Design for Efficient Personal Information Management (효율적인 개인정보 관리를 위한 IPIMS 설계)

  • Jeon, Byung-Jin;Shin, Seung-Soo;Lee, Jun-Yeon
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.3
    • /
    • pp.83-90
    • /
    • 2017
  • The purpose of this study is to solve the limitations that the information security manager of company should recognize the personal information of all employees. In this study, we propose efficient personal information retention status management system to minimize information retention status of personal information and department by information security manager and departmental information security officer. To do this, we study the method of transferring the check result from the PVA system to the efficient personal information retention management system, also study ways to minimize the amount of personal information we hold. It is possible to minimize the possession of personal information by changing the one channel method managed by the information security administrator of the existing PVA system to the two channel method so that the information security manager and the information security officer can manage it.

Nursing Managemant, Strategies for its success (간호관리자 역할의 성공적 수행을 위한 연구)

  • Kim, So-In
    • The Korean Nurse
    • /
    • v.29 no.5
    • /
    • pp.46-53
    • /
    • 1991
  • In the past, management had been done over nurses rather than nursing and this brought the existence of general manager and as a result, nurse-manager's position and role are being threatend. For the up-bringing of nursing to firm professional recognition in the 21st century, it is firmly believed that nursing managers are to be in the position to play the role of general manager with professional qualifications; personal qualities and exact understandings on the role and function of each tier group under her/his management. 124 top(3 nursing superintendents), middle-range(23 supervisors) and unit managers(98 head-nurses) from 3 university hospitals in Seoul were interviewed in order to investigate their belief in the role, professional qualifications, personal qualities as well as the strategy for the development of their leadership qualities. The frame of reference for the interview were developed by the researcher in reference to relevant literatures. It was the common belief that qualifications o[ top-managers and mid-managers require an educational background of master's preparation or higher and clinical career for at least 15 years for top-managers and 5 -10 years for mid-managers. The personal qualities required by nurse managers include; leadership, initiative, judgement, self-confidence, flexibility, open-mindedness and strong motivation. Achievment-orientedness would greatly help them become excellent managers. On the other hand, [or more effective management, managers of each teir group are to fully understand their role and perform "their job responsibilities ie. Top managers are supposed to study with emphasis on organization, function and conceptual s~ill while mid-managers concentrate their effort on the development of skills for direction, guidance and human relationship. Unit managers also supposed to have abilities to manage their function with emphasis on development of clinical performance skill, for direction on operative aspects. The strategies for the development of leadership qualities include program-planning at individual instutional level as well as local, national and international level. Nurse-managers are to be motivated and encouraged to participate in the programs in order to effectively communicate within tier groups.oups.

  • PDF

A Study on Introduction of Fire Prevention Sub-Manager for Efficient Fire Safety Management (효율적 소방안전관리를 위한 소방안전관리 보조자의 도입에 관한 연구)

  • Han, Sang-Pil;Jeong, Mu-Heon
    • Fire Science and Engineering
    • /
    • v.27 no.3
    • /
    • pp.80-84
    • /
    • 2013
  • In modern society, buildings has become larger, more complex and high-rise by the influences of locational and environmental characteristics from the changes of human lifestyles. Such features of the buildings, however, make building management and maintenance more difficult, especially in the aspects of health, security, and safety, etc. In order to secure safety and comfort in dwelling, housing, and working condition, it is essential to establish systematic plans and practices. Thus with the aim of investigating general status of fire safety management on specific buildings, this study mainly analyzed fire prevention manager's awareness on their works by conducting a survey, and suggested required systematic improvements for efficient fire safety management. As a result of the survey, it is concluded that introducing the system to appoint fire prevention sub-managers will promote more professional and classified management conditions.

A Mapping Method for a Logical Volume Manager in SAN Environment (SAN 논리볼륨 관리자를 위한 매핑 기법)

  • 남상수;송석일;유재수;김창수;김명준
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.6
    • /
    • pp.718-731
    • /
    • 2003
  • SAN(Storage Area Network) was developed in response to the requirements of high availability of data, scalable growth, and system performance. In order to use the SAN more efficiently, most of the SAN operating software supports storage virtualization concepts that allow users to view physical storage devices of the SAN as a large volume. A logical volume manager plays a key role in storage virtualization. It realizes the storage virtualization by mapping logical addresses to physical addresses. In this paper, we design and implement an efficient and flexible mapping method for the logical volume manager. Additionally we also design and implement a free space management method for flexible mapping. Our mapping method supports a snapshot that preserves a volume image at certain time and on-line reorganization to allow users to add or remove storage devices to and from the SAN even while the system is running. To justify our mapping method, we compare it with the mapping method of the GFS (Global File System) through various experiments.

A Study on Improving the Migration Performance of Mobile Agent using Integrated Security Manager (통합 보안 관리자를 이용한 이동 에이전트 이주 성능 향상 연구)

  • You, Eung-Gu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.5
    • /
    • pp.57-64
    • /
    • 2007
  • Mobile Agent has been known that it is an efficient communication paradigm for distributed applications and that a mobile agent provides higher flexibility and performance than existing communication paradigms. Despite these benefits, mobile agent is not used widely in the market because it is very vulnerable to a variety of attacks. To be applied to develop distributed applications, a mobile agent paradigm must consider both security and performance. In this paper, we propose and evaluate an improving method of a migration performance for a mobile agent model using ISM(Integrated Security Manager), which provides high-level security services and travel plan guide. In the proposed method. ISM offers the travel plan guide service which replies the accumulated results when a mobile agent has executed all migration plans related the trusted domain to be managed by ISM. Our method improved about $33{\sim}82%$ of total execution time than the existing method.

  • PDF

Design of Application Sharing System for Collaborative Works in 3D Virtual Environment supporting Multi-Participants (다중 참여자를 지원하는 3차원 가상환경에서 공동작업을 위한 어플리케이션 공유 시스템 설계)

  • Tak, Jin-Hyun;Lee, Sei-Hoon;Wang, Chang-Jong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.2
    • /
    • pp.355-364
    • /
    • 2000
  • Application sharing for collaborative works make multiple participants to be capable of collaborative developments through sharing development tools and applications which is distributed to various system without spatial restriction. However, applying legacy application sharing to CSCW based virtual environment has a problem because it dont consider 3D space and it disturbs the harmonic interaction of participants. In this study, we designed application sharing system for collaborative works in 3D virtual environment to share application effectively on collaborative virtual environment. The designed application sharing system for collaborative works in 3D virtual environment consist of application sharing manager, group manager and communication manager. This system is able to perceive event of 3D space about application of participant on 3D virtual environment by agent which moves to participant sites and get an ordered events and conflict among participants through scheduling. Therefore, designed application sharing system for collaborative work in 3D virtual environment can support efficient collaborative works and improve reusability of legacy application through using easily legacy application in 3D virtual environment when CSCW application development for virtual environments.

  • PDF

Implementation and Performance Analysis of the EVM's Java Dynamic Memory Manager and Garbage Collector (EVM에서의 자바 동적 메모리 관리기 및 쓰레기 수집기의 구현 및 성능 분석)

  • Lee Sang-Yun;Won Hee-Sun;Choi Byung-Uk
    • The KIPS Transactions:PartA
    • /
    • v.13A no.4 s.101
    • /
    • pp.295-304
    • /
    • 2006
  • Java has been established as one of the most widely-used languages owing to its support of object-oriented concepts, safety, and flexibility. Garbage collection in the Java virtual machine is a core component that relieves application programmers of difficulties related to memory management. In this paper, we propose a memory manager and a garbage collector that is implemented on a embedded java virtual machine. The memory manager divide a heap into various-sized cells and manages it as blocks of same-sized cells. So it is possible to allocate and free memory fast. We adopted the 3-color based Mark & Sweep garbage collector as our base algorithm and we propose 4-color based Mark & Sweep garbage collector for supporting multi-threaded program. The proposed garbage collector occurs memory fragmentation but we show through a experiment that the fragmentation ratio is almost fixed according as we create objects continuously.

Differences in the Perceptions of PMs and PMOs on the Importance of the Role of PMO (PMO의 제반 역할의 중요성에 대한 PM과 PMO의 인식 차이)

  • Yoon, Tae-Ho;Choi, Sung-Wook;Kim, Soo-Yeon;Kim, Daecheol
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.44 no.3
    • /
    • pp.207-213
    • /
    • 2021
  • Recently, the number and scale of projects being carried out within the enterprise are increasing. Accordingly, many companies are competitively introducing a Project Management Office (PMO) to efficiently manage these projects, allocate resources, and effectively link the projects and corporate strategies. However, the project manager who directly manages the project wants to receive support from the PMO in many areas for successful project management, but the project manager does not like to be interfered with by the PMO. On the other hand, the PMO may not be able to satisfy all the requirements of each PM as PMO oversees the entire project with limited resources. In addition, since the PMO must monitor and control the project and support the project according to the priorities of each project, conflicts with each PM can be formed. Therefore, in this study, based on the case of a company, the difference between the perceptions of PMs and PMOs about the importance of the required roles of PMOs is to be examined. As a result of the study, it was confirmed that the core functions and sub-functions of PMO, which PMO members and PMs consider important, are different. It was identified that the PMs valued the PMO function that would be helpful for their successful project execution. On the other hand, PMO members revealed that they had a relatively high priority for the roles to monitor and control project performance for which they were directly responsible.

A Study on Architecture of Access Control System with Enforced Security Control for Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경을 위한 보안통제가 강화된 접근제어 시스템 설계에 관한 연구)

  • Eom, Jung-Ho;Park, Seon-Ho;Chung, Tai-Myoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.71-81
    • /
    • 2008
  • In the paper, we designed a context aware task-role based access control system(CAT-RACS) which can control access and prevent illegal access efficiently for various information systems in ubiquitous computing environment. CAT-RACS applied CA-TRBAC, which adds context-role concept for achieve policy composition by context information and security level attribute to be kept confidentiality of information. CA-TRBAC doesn't permit access when context isn't coincident with access control conditions, or role and task's security level aren't accord with object's security level or their level is a lower level, even if user's role and task are coincident with access control conditions. It provides security services of user authentication and access control, etc. by a context-aware security manager, and provides context-aware security services and manages context information needed in security policy configuration by a context information fusion manager. Also, it manages CA-TRBAC policy, user authentication policy, and security domain management policy by a security policy manager.