• Title/Summary/Keyword: Key sharing

Search Result 612, Processing Time 0.024 seconds

Effects of Network Positions of Organizational Members on Knowledge Sharing (조직구성원의 네트워크 위치가 지식공유에 미치는 영향)

  • Kim, Chang-Sik;Kwhak, Kee-Young
    • Knowledge Management Research
    • /
    • v.16 no.2
    • /
    • pp.67-89
    • /
    • 2015
  • Improving productivity of knowledge workers is an important issue in the 21st century referred as knowledge-based society. The core key word is knowledge sharing among constituents of an organization. The purpose of this study is to combine the social network position factors with attitude and behavior factors, and develop an integrated research model for the knowledge sharing among members of an organization. This study adopted the integrated theoretical framework based on social capital, self-efficacy, transactive memory, and knowledge sharing. Surveys were conducted to 42 organizational members from a department in a leading IT outsourcing company to empirically test the proposed research model. In order to validate the proposed research model, social network analysis tool, UCINET, a structural equation modeling tool, SmartPLS, were utilized. The empirical result showed that, first of all, organizational members' familiarity network position had significant influence on knowledge self-efficacy and transactive memory capability. Second, knowledge self-efficacy and transactive memory capability affected knowledge sharing intention. Third, knowledge sharing intention also had an impact on the job performance. However, organizational members' expertise network position had no significant influence on knowledge self-efficacy and transactive memory capability. This finding reveals the importance of the emotional approach rather than the rational approach in knowledge management. The theoretical and practical implications on the research findings were discussed along with limitations.

The Effect of SCQM Activities on the Business Performance of the Defense SMEs -Focused on the Moderating Effects of the Performance Sharing- (공급망 품질경영 활동이 방산중소기업의 경영성과에 미치는 영향에 관한 연구 - 성과공유의 조절효과를 중심으로 -)

  • Choi, Sukgu;Song, Gwangsuk;Yoo, Hanjoo
    • Journal of Korean Society for Quality Management
    • /
    • v.45 no.4
    • /
    • pp.867-888
    • /
    • 2017
  • Purpose: This study suggests a SCQM model for the national Defense field based on earlier studies on the Quality Management of supply chain and to identify critical activities factors of supply chain that makes effect on the business results. Also, this study analyzed moderating effects of performance sharing between businesses which is becoming the big issues with regard to the supply chain cooperation. Methods: A causality of qm activities factor of SCQM model affecting benefit sharing and business performance was analyzed by using structural equation model. A company used in analysis performed a survey by targeting 297 Defense SMEs(weapon-system/non-weapon system). Results: As a result of analyzing the influence relationship between key activity of SCQM on finance performance, it was identified that Management Infra(MI), Process Management(PM), Human Resource Management(HRM), Performance Sharing activity(PS) made significant effect on Financial Performance, and Human Resource Management(HRM) and Performance Sharing(PS) activity made effect on non-financial Performance. Conclusion: The four variables(MI, PM, HRM, PS) of Defense SCQM were significantly effecting Financial performance and two variables(HRM, PS) were significant effected non-Financial performance. We also proved the moderating effect of performance sharing.

Authentication and Trust Relationship Chaining for Resource Sharing Community (자원 공유 커뮤니티를 위한 인증 기술과 신뢰관계사슬)

  • Kim, Jeong Gon;Kim, Shin Kon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.2
    • /
    • pp.55-69
    • /
    • 2010
  • This article proposed the authentication protocol for peer-to-peer resource sharing community. The proposed protocol does not require a priori information for generating and exchanging authentication key. Also this protocol can provide the delicate access control by allowing the user(authenticator) to assign the trust level to the authentication supplicant, which can be used to decide if the resource providing node will accept the resource sharing request from a resource requesting node. Trust Relationship Chaining provides the environment where trust levels (included in the trust table) of nodes in the resource sharing community are propagated among nodes when trust tables are exchanged between two nodes engaged in mutual authentication process and authentication refresh so that any two nodes which are not directly mutual-authenticated can assign the trust level each other for the access control for resource sharing. In the proposed protocol a node can implements the authentication refresh continuously to verify the effectiveness of authentication after mutual authentication so that the authentication of new node or authentication revocation(effectiveness cancellation) of the departed node can be propagated to the all the nodes in RSC and eventually safe resource sharing community is configured.

An Efficient Lookup Mechanism for Unstructured Peer-to-Peer Considering IP Distribution (ISP별 IP분포를 고려한 비구조적 Peer-to-Peer에서의 Lookup 기법)

  • 김홍일;신판섭
    • Journal of the Korea Computer Industry Society
    • /
    • v.4 no.12
    • /
    • pp.873-886
    • /
    • 2003
  • Lookup Is one of important factors for network traffic on peer-to-peer network. Especially, large amount of network resources are required for lookup process in p2p file sharing system that clients use the dynamic If and they import to p2p network in random. In this paper, we employ efficient lookup mechanism which searches lookup with the combined information of ISP key values and the extracted key values from SHA-1 hashing function for shared contents id. The proposed mechanism efficiently searches files on the network because the mechanism processes P2P lookup with consideration the routing information of ISP. We suggest the adapted simulation environment based upon the famous file sharing system of emule P2P and experiment the proposed system.

  • PDF

Secure Data Management based on Proxy Re-Encryption in Mobile Cloud Environment (모바일 클라우드 환경에서 안전한 프록시 재암호화 기반의 데이터 관리 방식)

  • Song, You-Jin;Do, Jeong-Min
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.4B
    • /
    • pp.288-299
    • /
    • 2012
  • To ensure data confidentiality and fine-grained access control in business environment, system model using KP-ABE(Key Policy-Attribute Based Encryption) and PRE(Proxy Re-Encryption) has been proposed recently. However, in previous study, data confidentiality has been effected by decryption right concentrated on cloud server. Also, Yu's work does not consider a access privilege management, so existing work become dangerous to collusion attack between malicious user and cloud server. To resolve this problem, we propose secure system model against collusion attack through dividing data file into header which is sent to privilege manager group and body which is sent to cloud server and prevent modification attack for proxy re-encryption key using d Secret Sharing, We construct protocol model in medical environment.

A Novel IPT System Based on Dual Coupled Primary Tracks for High Power Applications

  • Li, Yong;Mai, Ruikun;Lu, Liwen;He, Zhengyou
    • Journal of Power Electronics
    • /
    • v.16 no.1
    • /
    • pp.111-120
    • /
    • 2016
  • Generally, a single phase H-bridge converter feeding a single primary track is employed in conventional inductive power transfer systems. However, these systems may not be suitable for some high power applications due to the constraints of the semiconductor switches and the cost. To resolve this problem, a novel dual coupled primary tracks IPT system consisting of two high frequency resonant inverters feeding the tracks is presented in this paper. The primary tracks are wound around an E-shape ferrite core in parallel which enhances the magnetic flux around the tracks. The mutual inductance of the coupled tracks is utilized to achieve adjustable power sharing between the inverters by configuring the additional resonant capacitors. The total transfer power can be continuously regulated by altering the pulse width of the inverters' output voltage with the phase shift control approach. In addition, the system's efficiency and the control strategy are provided to analyze the characteristic of the proposed IPT system. An experimental setup with total power of 1.4kW is employed to verify the proposed system under power ratios of 1:1 and 1:2 with a transfer efficiency up to 88.7%. The results verify the performance of the proposed system.

On the watermark insertion and extraction methods using the secret sharing method (비밀정보 분할 방식을 적용한 워터마크 삽입.추출 방법)

  • 서창호;김석우;성열욱
    • Convergence Security Journal
    • /
    • v.1 no.1
    • /
    • pp.47-55
    • /
    • 2001
  • This paper proposes a method which inserts watermark created by secret sharing method and then extracts it from watermarked image for the protection of copyrights of digital images. To do this, after image's DCT transform, once some values created by Key sharing method which used Lagrange interpolation are inserted into a frequency domain, one can recreate original watermark even if only k seeds are extracted among n of inserted seeds ($n{\geq}k$).

  • PDF

Profit Sharing Model in Product-Service System (제품-서비스 통합시스템(Product-Service System)에서의 수익분배모형)

  • Kim, Jin-Min;Park, Jin-Soo;Park, Kwang-Tae;Kim, Kwang-Jae;Hong, Yoo-Suk
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.36 no.4
    • /
    • pp.81-89
    • /
    • 2011
  • In recent business environments, the competition among firms is shifting from the competition based on individual firm only to the competition based on alliance of firms. This is because it is not easy for a firm to perform all functions which consumers want. Thus, it is more effective to combine core competencies of different firms based on a strategic partnership. It is essential to establish a strategic partnership and this strategic partnership is a key success factor in PSS(Product-Service System) which combines products and services. In this paper, we propose a profit sharing model for PSS partnership. We first analyze customer's utility using Cobb-Douglas utility function and then propose the PSS profit sharing ratio considering functionalities and cost structures based on the combination ratio of PSS. This paper helps firms to develop partnership strategies for PSS.

A κ-Span Secret Sharing Schem with Exposing Forged Shadows (참가자에게 노출되지 않은 κ-생성 비밀분산방식)

  • Park, Taek-Jin;Won, Dong-Ho
    • The KIPS Transactions:PartC
    • /
    • v.11C no.5
    • /
    • pp.563-568
    • /
    • 2004
  • In the secret sharing scheme, the reconstruction secret must to exposed to participants. In order to enforce the same secret sharing schemes, a new secret have to regenerate and redistribute for participants. Such a regeneration process is inefficient because of the overhead in the regeneration. In this paper, we proposed efficient secret regeneration scheme by eigenvalue. it can be also redistribution without revealing with other participants.

Knowledge Management Factors Affecting Cooperative Organizational Culture Regarding Knowledge Sharing of Members in the Hospital Organization (병원조직구성원들의 지식공유에 대한 협조적 조직문화에 영향을 주는 지식경영 요인)

  • Ha, Oh-Hyun;Jung, Yong-Mo
    • The Korean Journal of Health Service Management
    • /
    • v.7 no.4
    • /
    • pp.49-63
    • /
    • 2013
  • This study attempted to examine what effect knowledge management factors have on cooperative organizational culture regarding knowledge sharing depending on workplace types and occupations in order to seek for solution to increase efficiency and effects of knowledge management in the hospital organization. Key findings are as follows: For members of the hospital organization, the higher their recognition was in relation to 'concern and support of chief executive officer for knowledge management', and 'problem solution by specialists or superior in the organization and acquisition on the task knowledge', the more they worked as factors exerting positive effects on 'cooperative organizational culture regarding knowledge sharing'. And influence factors were different depending on workplace types and occupation.