• Title/Summary/Keyword: Information Protection Policy

Search Result 532, Processing Time 0.024 seconds

A Data-Driven Approach and Network Analysis of Technological Innovation Resources in SMEs (데이터 기반 접근법을 활용한 중소기업 기술혁신자원의 네트워크 분석)

  • Kyung Min An;Young-Chan Lee
    • Knowledge Management Research
    • /
    • v.24 no.4
    • /
    • pp.103-129
    • /
    • 2023
  • This study aims to analyze the network structure of technological innovation resources in SMEs, especially manufacturing firms, and reveal the differences between innovative and non-innovative firms. The study first analyzes connection centrality, flow-mediated centrality, and power centrality for all firms, and derives structural equivalence through CONCOR analysis. Then, the network structure of innovative and non-innovative firms was compared and analyzed according to innovation performance and creation. The results show that entrepreneurship and corporate innovation strategy have a significant impact on the analysis of technological innovation resources of all firms. According to the CONCOR analysis, the innovation resources of SMEs are organized into seven clusters, which can be defined as intrinsic product innovation resources, competitive advantage promotion resources, cooperative activities resources, information system resources, and innovation protection resources. The network analysis of innovative and non-innovative firms showed that innovative firms focused on enhancing competitiveness and improving quality, while non-innovative firms tended to focus more on existing products and customers. In addition, innovative firms had eight clusters, while non-innovative firms had six clusters, suggesting that innovative firms utilize resources diversely to pursue structural change and new value creation, while non-innovative firms operate technological innovation resources in a more stable form. This study emphasizes the importance of entrepreneurship and corporate innovation strategy in SMEs' technological innovation, and suggests that strong internal efforts are needed to increase innovativeness. These findings have important implications for strategy formulation and policy development for technological innovation in SMEs.

A Study Security Measures for Protection of VIP in the G20 Summit (G20 정상회의 시 주(主)행사장에서의 VIP 안전대책 방안에 관한 연구)

  • Lee, Sun-Ki;Lee, Choong-Soo
    • Korean Security Journal
    • /
    • no.24
    • /
    • pp.91-123
    • /
    • 2010
  • The threat factors available for occurrence given G20 Summit Meeting are expected leader terrorism, hostage terrorism, bomb terrorism, public facilities terrorism, and aircraft terrorism. As for the threat groups, which are expected in Korea, the North Korea, Islam extremist group, and the group such as NGO organization of being opposed to international meeting are regarded as having possibility of causing hazard. Thus, the purpose of this study is to suggest VIP Security-measure plans in the main site in preparation for G20 Summit Meeting. Accordingly, each country in the world is adopting 'the principle of Triple Ring' in common. Thus, it elicited a coping plan by 1st line(inner ring) 2nd line(middle ring) 3rd line(outer ring) based on this principle, and proposed even an opinion together that will need to be reflected in light of policy for the VIP security measures. In conclusion, as for the VIP Security-measure plans in the main site in preparation for G20 Summit Meeting, In the inner ring(safety sector), first, an intercepting measure needs to be devised for a spot of getting into and out of vehicles given the Straight Street. Second, the Walking Formation needs to be reinforced boldly in the exposed area. In the middle ring(security sector), first, the control plan needs to be devised by considering particularity of the main site. Second, there is necessity for adopting the efficient security badge operation plan that is included RFID function within security badge. In the outer ring(aid protective sector), first, there is necessity of preparing for several VIP terrorisms, of collecting information and intelligence, and of reinforcing the information collection system against terrorism under the cooperation with the overseas information agency. Second, the urgent measure training in time of emergency needs to be carried out toward security agent event manpower. Third, to maintain the certain pace in VIP motorcade, the efficient traffic control system needs to be operated. Finally, as for what will need to be reflected in light of policy for VIP security measures, first, there is necessity for allowing VIP residence to be efficiently dispersed to be distributed and controlled. Second, there is necessity for allowing impure element to misjudge or attack to be failed by utilizing diverse deception operations. Third, according to the reorganization in North Korea's Organization of the South Directed Operations, the powerful 'military-support measure' needs to be driven from this G20 Summit Meeting. For this, the necessity was proposed for further reinforcing the front back defense posture under the supervision of the Ministry of National Defense and for positively coping even with detecting and removing poison in preparation for CBR (chemical, biological, and radio-logical) terrorism.

  • PDF

Development of Korean Green Business/IT Strategies Based on Priority Analysis (한국의 그린 비즈니스/IT 실태분석을 통한 추진전략 우선순위 도출에 관한 연구)

  • Kim, Jae-Kyeong;Choi, Ju-Choel;Choi, Il-Young
    • Asia pacific journal of information systems
    • /
    • v.20 no.3
    • /
    • pp.191-204
    • /
    • 2010
  • Recently, the CO2 emission and energy consumption have become critical global issues to decide the future of nations. Especially, the spread of IT products and the increased use of internet and web applications result in the energy consumption and CO2 emission of IT industry though information technologies drive global economic growth. EU, the United States, Japan and other developed countries are using IT related environmental regulations such as WEEE(Waste Electrical and Electronic Equipment), RoHS(Restriction of the use of Certain Hazardous Substance), REACH(Registration, Evaluation, Authorization and Restriction of CHemicals) and EuP(Energy using Product), and have established systematic green business/IT strategies to enhance the competitiveness of IT industry. For example, the Japan government proposed the "Green IT initiative" for being compatible with economic growth and environmental protection. Not only energy saving technologies but energy saving systems have been developed for accomplishing sustainable development. Korea's CO2 emission and energy consumption continuously have grown at comparatively high rates. They are related to its industrial structure depending on high energy-consuming industries such as iron and steel Industry, automotive industry, shipbuilding industry, semiconductor industry, and so on. In particular, export proportion of IT manufacturing is quite high in Korea. For example, the global market share of the semiconductor such as DRAM was about 80% in 2008. Accordingly, Korea needs to establish a systematic strategy to respond to the global environmental regulations and to maintain competitiveness in the IT industry. However, green competitiveness of Korea ranked 11th among 15 major countries and R&D budget for green technology is not large enough to develop energy-saving technologies for infrastructure and value chain of low-carbon society though that grows at high rates. Moreover, there are no concrete action plans in Korea. This research aims to deduce the priorities of the Korean green business/IT strategies to use multi attribute weighted average method. We selected a panel of 19 experts who work at the green business related firms such as HP, IBM, Fujitsu and so on, and selected six assessment indices such as the urgency of the technology development, the technology gap between Korea and the developed countries, the effect of import substitution, the spillover effect of technology, the market growth, and the export potential of the package or stand-alone products by existing literature review. We submitted questionnaires at approximately weekly intervals to them for priorities of the green business/IT strategies. The strategies broadly classify as follows. The first strategy which consists of the green business/IT policy and standardization, process and performance management and IT industry and legislative alignment relates to government's role in the green economy. The second strategy relates to IT to support environment sustainability such as the travel and ways of working management, printer output and recycling, intelligent building, printer rationalization and collaboration and connectivity. The last strategy relates to green IT systems, services and usage such as the data center consolidation and energy management, hardware recycle decommission, server and storage virtualization, device power management, and service supplier management. All the questionnaires were assessed via a five-point Likert scale ranging from "very little" to "very large." Our findings show that the IT to support environment sustainability is prior to the other strategies. In detail, the green business /IT policy and standardization is the most important in the government's role. The strategies of intelligent building and the travel and ways of working management are prior to the others for supporting environment sustainability. Finally, the strategies for the data center consolidation and energy management and server and storage virtualization have the huge influence for green IT systems, services and usage This research results the following implications. The amount of energy consumption and CO2 emissions of IT equipment including electrical business equipment will need to be clearly indicated in order to manage the effect of green business/IT strategy. And it is necessary to develop tools that measure the performance of green business/IT by each step. Additionally, intelligent building could grow up in energy-saving, growth of low carbon and related industries together. It is necessary to expand the affect of virtualization though adjusting and controlling the relationship between the management teams.

Transition of Occupational Health Nursing Education in Korea (한국 산업간호교육의 변화추세 분석)

  • Cho, Tong Ran;June, Kyung Ja;Kim, So Yeon
    • Korean Journal of Occupational Health Nursing
    • /
    • v.6 no.2
    • /
    • pp.144-155
    • /
    • 1997
  • In December 1990, Occupational Safety and Health Law was amended to reinforce employer's responsibilities on employees' health and safety. Among the amended law it was important to expand the role of an occupational health nurse to the role of an occupational health manager. An occupational health manager should take charge of coordinating periodic health examination and environmental hazard evaluation, providing primary care, monitoring employees' health status, giving the workplace walk-through, selecting safe protection equipment, providing health information, counseling and health education, independently. This position of occupational health nurse is equivalent to the role of doctors or occupational hygienists. In 1991, government made a master plan to prevent occupational disease and injury. Under the plan, Korea Industrial Nursing Association (KINA) was established in 1994 with the purpose of improving health services and upgrading career opportunities for members. Therefore, this study was designed to analyze the transition of occupational health nursing education with the changes of law and policy in Korea between 1991 and 1996. In details, it was to analyze the rate of school providing occupational health nursing practice based lecture, lecture hours, lecture contents in undergraduate curriculum, program contents of graduate school, kinds of continuing education, etc. For this purpose, we conducted survey two times. In February 1991, baseline study was conducted with all nursing programs in Korea (19 BSN programs and 43 nursing departments of junior college). From April to May in 1996, the second survey was conducted with all nursing programs (38 BSN programs and 69 junior colleges). The first response rate was 66.1% and the second was 40.6%. Structured questionnaires were mailed to the deans or the community health nursing faculties. In the case of graduate school, telephone survey was conducted with 10 school of public health or environmental health area. Data from the yearbook of Industrial Safety Training Institute (ISTI), the history of Korea Industrial Health Association, and the journals of KINA were also included in the analysis. As the results, we found that there were remarkable improvement in undergraduate and graduate programs, obligatory as well as voluntary continuing education in terms of occupational health nursing expertise between 1991 and 1996. 1) The number of school providing occupational health nursing practice-based lecture was increased with the rate from 7.3% to 25.6%. The rate of school giving over 15 class-hours was increased from 33.3% to 46.6%. 2) Content areas were composed of introduction of occupational health, occupational epidemiology, industrial hygiene, occupational disease and injury, law and policy, health education, concept of occupational health nursing, role of occupational health nurse, occupational health nursing process, etc. Of content areas, occupational health nursing process was more emphasized with the increased rate from 43.9% to 88.4%. 3) In the case of graduate school, occupational health programs were increased from 4 to 10. One of them has developed occupational health nursing program as an independent course since 1991. 4) The law increased educational hours from 28 hours to 36 hours for introductory course at the time of appointment, and from 14 hours to 24 hours every 2 years for continuing education. Course contents were Occupational safety and health law, introduction of occupational health, health education methodology, planning and evaluation, periodic health exam, occupational disease care, primary care, emergency care, management, industrial environment evaluation, etc. In 1996, Korea Industrial Nursing Association has begun to provide continuing education after Industrial Safety Training Institute. 5) Various educational programs in voluntary base were developed such as monthly seminar, CE articles, annual academic symposium, etc. It was shown that changes of law and policy led rapid growth of occupational health nursing education in various levels. From this trend, it is expected that occupational health nurse expertise be continuously to be enhanced in Korea. Legal and political supports should proceed for the development of occupational health nursing in early stage.

  • PDF

Factors Affecting the Intention to Invade Privacy on Social Network Service (SNS에서 프라이버시 침해의도에 영향을 미치는 요인)

  • Ahn, Soomi;Jang, Jaeyoung;Kim, Jidong;Kim, Beomsoo
    • Information Systems Review
    • /
    • v.16 no.2
    • /
    • pp.1-23
    • /
    • 2014
  • With side effects such as Phishing and Spam using personal information in Social Network Service, there is a growing need for studies related to harmful behaviors such as the reason for privacy violation. As such, this study assumed privacy violation to be ethical decision, making behavior and used the Theory of Planned Behavior and Motivation Theory, which are mostly used in social science to identify the factors affecting privacy violation. The results suggested that the Perceived Enjoyment and Punishment used in motivation studies affected privacy violation behaviors, and that the factors of the Theory of Planned Behavior such as Attitude toward Privacy Violation, Subjective Norms of Privacy Violation, and Perceived Behavioral Control with regard to Privacy Violation significantly influenced the Intention to Privacy Violation. On the other hand, Perceived Curiosity and Subjective Norms of Privacy Violation did not affect the Intention to Privacy Violation. Therefore, this study confirmed that the Theory of Planned Behavior was appropriate to explain the Intention to Privacy Violation, and that the variables of the Motivation Theory generally influenced the Attitude toward Privacy Violation. This study was significant since it extended the scope of theoretical privacy study from users and victims centered to inflictor and applied the Extended Theory of Planned Behavior using the variables of the Motivation Theory in the study of Intention to Privacy Violation. From the practical aspect, it provided the ground for privacy education based on the fact that the Attitude toward Privacy Violation can be curbed when education on the Privacy Concerns, Perceived Enjoyment, and Punishment with regard to privacy is strengthened. It also cited the need for the punishment of privacy violation and the practical ground to amend the terms and conditions of user license and Personal Information Protection Act to provide policy support.

Conflict of Interests and Analysts' Forecast (이해상충과 애널리스트 예측)

  • Park, Chang-Gyun;Youn, Taehoon
    • KDI Journal of Economic Policy
    • /
    • v.31 no.1
    • /
    • pp.239-276
    • /
    • 2009
  • The paper investigates the possible relationship between earnings prediction by security analysts and special ownership ties that link security companies those analysts belong to and firms under analysis. "Security analysts" are known best for their role as information producers in stock markets where imperfect information is prevalent and transaction costs are high. In such a market, changes in the fundamental value of a company are not spontaneously reflected in the stock price, and the security analysts actively produce and distribute the relevant information crucial for the price mechanism to operate efficiently. Therefore, securing the fairness and accuracy of information they provide is very important for efficiencyof resource allocation as well as protection of investors who are excluded from the special relationship. Evidence of systematic distortion of information by the special tie naturally calls for regulatory intervention, if found. However, one cannot presuppose the existence of distorted information based on the common ownership between the appraiser and the appraisee. Reputation effect is especially cherished by security firms and among analysts as indispensable intangible asset in the industry, and the incentive to maintain good reputation by providing accurate earnings prediction may overweigh the incentive to offer favorable rating or stock recommendation for the firms that are affiliated by common ownership. This study shares the theme of existing literature concerning the effect of conflict of interests on the accuracy of analyst's predictions. This study, however, focuses on the potential conflict of interest situation that may originate from the Korea-specific ownership structure of large conglomerates. Utilizing an extensive database of analysts' reports provided by WiseFn(R) in Korea, we perform empirical analysis of potential relationship between earnings prediction and common ownership. We first analyzed the prediction bias index which tells how optimistic or friendly the analyst's prediction is compared to the realized earnings. It is shown that there exists no statistically significant relationship between the prediction bias and common ownership. This is a rather surprising result since it is observed that the frequency of positive prediction bias is higher with such ownership tie. Next, we analyzed the prediction accuracy index which shows how accurate the analyst's prediction is compared to the realized earnings regardless of its sign. It is also concluded that there is no significant association between the accuracy ofearnings prediction and special relationship. We interpret the results implying that market discipline based on reputation effect is working in Korean stock market in the sense that security companies do not seem to be influenced by an incentive to offer distorted information on affiliated firms. While many of the existing studies confirm the relationship between the ability of the analystand the accuracy of the analyst's prediction, these factors cannot be controlled in the above analysis due to the lack of relevant data. As an indirect way to examine the possibility that such relationship might have distorted the result, we perform an additional but identical analysis based on a sub-sample consisting only of reports by best analysts. The result also confirms the earlier conclusion that the common ownership structure does not affect the accuracy and bias of earnings prediction by the analyst.

  • PDF

The Perception and Attitude of Pre-service Childcare Teachers on Child Abuse - Preparation with other Major Students - (예비보육교사의 아동학대 신고에 관한 인식과 태도: 타전공 대학생과의 비교)

  • Kim, Tae Yeon;Jung, Hyun Sim
    • Korean Journal of Child Education & Care
    • /
    • v.18 no.3
    • /
    • pp.65-75
    • /
    • 2018
  • Objective: The purpose of this study is to find out the perception on childe abuse of pre-service childcare teachers who will become the closest witnesses to child abuse, and also whether they have the proper knowledge and attitude to report abuse. Methods: Surveys were conducted at five universities in Seoul and Kyonggi-province. We investigated students from child development major, and additionally students from other majors as a comparative group. Results: The results of this study are as follows: First, pre-service childcare teachers' level of abuse severity was significantly higher than other major students. They were more aware of child abuse reporting system and reporting obligations than other major students. Second, pre-service teachers had higher intention of reporting then other major students. However, both groups barely know about child protection institution, and have negative perception on the effect of reporting. Conclusion/Implications: In conclusion, this study suggests that pre-service teachers are more aware of child abuse and willing to report than other major students, however it is necessary to increase the reliability of report effectiveness. Also, it provide implications for future policy-making related to child abuse by suggesting that information transmission and promotion through mass media is necessary and efforts should be made to reduce the risk of disclosure of the identity of the complainant in reporting abuse.

A Study on the Expanding Protected Areas through Identifying Potential Protected Areas - focusing on the experts' recognition with regard to protected area - (잠재 보호지역 발굴을 통한 국가 보호지역 확대 방안 - 보호지역 부합성에 대한 전문가 인식을 중심으로 -)

  • Heo, Hag Young;Cho, Dong-Gil;Shim, Yun-Jin;Ryu, Yun-Jin;Hong, Jin Pyo;Shim, Gyu-won
    • Korean Journal of Environment and Ecology
    • /
    • v.31 no.6
    • /
    • pp.586-594
    • /
    • 2017
  • This study was carried out to identify the potential protected areas recognized by experts to conform to the international definition of protected areas for effective implementation of CBD Aichi Target-11. A policy forum of 13 experts on the protected area was formed and conducted four forums, two surveys, and examination in the context of international perspective to identify four potential protected areas including the water source protection area, riparian buffer zone, fishery resources protected area, and urban natural park area. Excluding the existing protected areas, the total size of the potential protected areas was about $5,643.9km^2$ composed of the terrestrial areas of $3,117.9km^2$ and the marine areas of $2,526km^2$. As such, we can expect the expansion of coverage of national protected areas by up to 3.11% of the terrestrial land and up to 0.67% of the terrestrial marine area. This study is meaningful in that it provides the fundamental information to achieve the national target of protected areas in response to CBD Aichi Target-11. Further research on improving the protected areas qualitatively and quantitatively and identifying and linking with other effective regional OECM are required to enhance the national protected area system.

In about Factor of the Crime, According to Industry Recognized Security Increase of Efficiency (민간경비 산업의 범죄성장요인에 따른 효율성 제고방안)

  • Kang, Min-Wan;Ham, Ju-il
    • Korean Security Journal
    • /
    • no.25
    • /
    • pp.1-25
    • /
    • 2010
  • This research aims to provide a solution for the improvement of private security according to the change in criminal environment. The main cause of crime can be found in the anti-functional dimensions including value set disorder, social phenomenon variation, information-based, globalization and urbanization. In this environment, the private security sector has dramatically increased in a quantitative viewpoint, but it is insufficient in a qualitative viewpoint. This paper recognized this problem and demonstrates a solution for improvement through classifying elements of private security into relevant legislation, education institutions, security companies and security associations. The analysis result is a follows: First, motivation and satisfaction rate of escort and security related major has shown to be high. However, respondents evaluated the guard educational institution negatively. Second, the motivation of entering into the private security sector for internal staffs has shown to be positive and sound. However, the job satisfaction rate has shown to be low due to excessive competition, negative perception of occupation and low earning. Third, respondents gave an average mark to the Security Association's management and operation. In addition, the mutual-aid project received the same mark. Negative feedbacks were given to the protection of member's interest and to association operation and policy, while positive feedbacks were given to the degree of member's cooperation towards association policies.

  • PDF

PM2.5 Simulations for the Seoul Metropolitan Area: (III) Application of the Modeled and Observed PM2.5 Ratio on the Contribution Estimation (수도권 초미세먼지 농도모사: (III) 관측농도 대비 모사농도 비율 적용에 따른 기여도 변화 검토)

  • Bae, Changhan;Yoo, Chul;Kim, Byeong-Uk;Kim, Hyun Cheol;Kim, Soontae
    • Journal of Korean Society for Atmospheric Environment
    • /
    • v.33 no.5
    • /
    • pp.445-457
    • /
    • 2017
  • In this study, we developed an approach to better account for uncertainties in estimated contributions from fine particulate matter ($PM_{2.5}$) modeling. Our approach computes a Concentration Correction Factor (CCF) which is a ratio of observed concentrations to baseline model concentrations. We multiply modeled direct contribution estimates with CCF to obtain revised contributions. Overall, the modeling system showed reasonably good performance, correlation coefficient R of 0.82 and normalized mean bias of 2%, although the model underestimated some PM species concentrations. We also noticed that model biases vary seasonally. We compared contribution estimates of major source sectors before and after applying CCFs. We observed that different source sectors showed variable magnitudes of sensitivities to the CCF application. For example, the total primary $PM_{2.5}$ contribution was increased $2.4{\mu}g/m^3$ or 63% after the CCF application. Out of a $2.4{\mu}g/m^3$ increment, line sources and area source made up $1.3{\mu}g/m^3$ and $0.9{\mu}g/m^3$ which is 92% of the total contribution changes. We postulated two major reasons for variations in estimated contributions after the CCF application: (1) monthly variability of unadjusted contributions due to emission source characteristics and (2) physico-chemical differences in environmental conditions that emitted precursors undergo. Since emissions-to-$PM_{2.5}$ concentration conversion rate is an important piece of information to prioritize control strategy, we examined the effects of CCF application on the estimated conversion rates. We found that the application of CCFs can alter the rank of conversion efficiencies of source sectors. Finally, we discussed caveats of our current approach such as no consideration of ion neutralization which warrants further studies.