• Title/Summary/Keyword: Knowledge assets

Search Result 200, Processing Time 0.03 seconds

NCS proposal for industrial security (산업보안 분야에 대한 NCS 제안)

  • Park, Jong-Chan;Ahn, Jung-Hyun;Choi, Young-Pyul;Lee, Seung-Hoon;Baik, Nam-Kyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.358-360
    • /
    • 2022
  • Modern society is developing rapidly and technologies that provide convenience in living are developing day by day. On the other hand, the development of cyber attacks that threaten cybersecurity is developing faster, and it still adversely affects the industrial environment, and industrial damage is steadily occurring every year. Industrial security is an activity that safely protects major assets or technologies of companies and organizations from these attacks. Therefore, it is a situation that requires professional manpower for security. Currently, the manpower situation for security is staffed, but knowledge of the understanding and concept of industrial security jobs is insufficient. In other words, there is a lack of professional manpower for industrial security. It is the NCS that came out to solve this problem. NCS is the state standardized ability (knowledge, attitude, skills, etc.) necessary to perform duties in the industrial field. NCS can systematically design the curriculum using NCS as well as help in hiring personnel, and NCS can be applied to the national qualification system. However, in the field of industrial security, NCS has not yet been developed and is still having difficulties in hiring personnel and curriculum. Although the NCS system in the field of industrial security has not been developed, this paper proposes the industrial security NCS to solve the problem of hiring professionals later and to help the field of industrial security NCS to be established later.

  • PDF

A Study on the Impact of Employee's Person-Environment Fit and Information Systems Acceptance Factors on Performance: The Mediating Role of Social Capital (조직구성원의 개인-환경적합성과 정보시스템 수용요인이 성과에 미치는 영향에 관한 연구: 사회자본의 매개역할)

  • Heo, Myung-Sook;Cheon, Myun-Joong
    • Asia pacific journal of information systems
    • /
    • v.19 no.2
    • /
    • pp.1-42
    • /
    • 2009
  • In a knowledge-based society, a firm's intellectual capital represents the wealth of ideas and ability to innovate, which are indispensable elements for the future growth. Therefore, the intellectual capital is evidently recognized as the most valuable asset in the organization. Considered as intangible asset, intellectual capital is the basis based on which firms can foster their sustainable competitive advantage. One of the essential components of the intellectual capital is a social capital, indicating the firm's individual members' ability to build a firm's social networks. As such, social capital is a powerful concept necessary for understanding the emergence, growth, and functioning of network linkages. The more social capital a firm is equipped with, the more successfully it can establish new social networks. By providing a shared context for social interactions, social capital facilitates the creation of new linkages in the organizational setting. This concept of "person-environment fit" has long been prevalent in the management literature. The fit is grounded in the interaction theory of behavior. The interaction perspective has a fairly long theoretical tradition, beginning with proposition that behavior is a function of the person and environment. This view asserts that neither personal characteristics nor the situation alone adequately explains the variance in behavioral and attitudinal variables. Instead, the interaction of personal and situational variables accounts for the greatest variance. Accordingly, the person-environment fit is defined as the degree of congruence or match between personal and situational variables in producing significant selected outcomes. In addition, information systems acceptance factors enable organizations to build large electronic communities with huge knowledge resources. For example, the Intranet helps to build knowledge-based communities, which in turn increases employee communication and collaboration. It is vital since through active communication and collaborative efforts can employees build common basis for shared understandings that evolve into stronger relationships embedded with trust. To this aim, the electronic communication network allows the formation of social network to be more viable to rapid mobilization and assimilation of knowledge assets in the organizations. The purpose of this study is to investigate: (1) the impact of person-environment fit(person-job fit, person-person fit, person-group fit, person-organization fit) on social capital(network ties, trust, norm, shared language); (2) the impact of information systems acceptance factors(availability, perceived usefulness, perceived ease of use) on social capital; (3) the impact of social capital on personal performance(work performance, work satisfaction); and (4) the mediating role of social capital between person-environment fit and personal performance. In general, social capital is defined as the aggregated actual or collective potential resources which lead to the possession of a durable network. The concept of social capital was originally developed by sociologists for their analysis in social context. Recently, it has become an increasingly popular jargon used in the management literature in describing organizational phenomena outside the realm of transaction costs. Since both environmental factors and information systems acceptance factors affect the network of employee's relationships, this study proposes that these two factors have significant influence on the social capital of employees. The person-environment fit basically refers to the alignment between characteristics of people and their environments, thereby resulting in positive outcomes for both individuals and organizations. In addition, the information systems acceptance factors have rather direct influences on the social network of employees. Based on such theoretical framework, namely person-environment fit and social capital theory, we develop our research model and hypotheses. The results of data analysis, based on 458 employee cases are as follow: Firstly, both person-environment fit(person-job fit, person-person fit, person-group fit, person-organization fit) and information systems acceptance factors(availability perceived usefulness, perceived ease of use) significantly influence social capital(network ties, norm, shared language). In addition, person-environment fit is a stronger factor influencing social capital than information systems acceptance factors. Secondly, social capital is a significant factor in both work satisfaction and work performance. Finally, social capital partly plays a mediating role between person-environment fit and personal performance. Our findings suggest that it is vital for firms to understand the importance of environmental factors affecting social capital of employees and accordingly identify the importance of information systems acceptance factors in building formal and informal relationships of employees. Firms also need to reflect their recognition of the importance of social capital's mediating role in boosting personal performance. Some limitations arisen in the course of the research and suggestions for future research directions are also discussed.

Social Tagging-based Recommendation Platform for Patented Technology Transfer (특허의 기술이전 활성화를 위한 소셜 태깅기반 지적재산권 추천플랫폼)

  • Park, Yoon-Joo
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.3
    • /
    • pp.53-77
    • /
    • 2015
  • Korea has witnessed an increasing number of domestic patent applications, but a majority of them are not utilized to their maximum potential but end up becoming obsolete. According to the 2012 National Congress' Inspection of Administration, about 73% of patents possessed by universities and public-funded research institutions failed to lead to creating social values, but remain latent. One of the main problem of this issue is that patent creators such as individual researcher, university, or research institution lack abilities to commercialize their patents into viable businesses with those enterprises that are in need of them. Also, for enterprises side, it is hard to find the appropriate patents by searching keywords on all such occasions. This system proposes a patent recommendation system that can identify and recommend intellectual rights appropriate to users' interested fields among a rapidly accumulating number of patent assets in a more easy and efficient manner. The proposed system extracts core contents and technology sectors from the existing pool of patents, and combines it with secondary social knowledge, which derives from tags information created by users, in order to find the best patents recommended for users. That is to say, in an early stage where there is no accumulated tag information, the recommendation is done by utilizing content characteristics, which are identified through an analysis of key words contained in such parameters as 'Title of Invention' and 'Claim' among the various patent attributes. In order to do this, the suggested system extracts only nouns from patents and assigns a weight to each noun according to the importance of it in all patents by performing TF-IDF analysis. After that, it finds patents which have similar weights with preferred patents by a user. In this paper, this similarity is called a "Domain Similarity". Next, the suggested system extract technology sector's characteristics from patent document by analyzing the international technology classification code (International Patent Classification, IPC). Every patents have more than one IPC, and each user can attach more than one tag to the patents they like. Thus, each user has a set of IPC codes included in tagged patents. The suggested system manages this IPC set to analyze technology preference of each user and find the well-fitted patents for them. In order to do this, the suggeted system calcuates a 'Technology_Similarity' between a set of IPC codes and IPC codes contained in all other patents. After that, when the tag information of multiple users are accumulated, the system expands the recommendations in consideration of other users' social tag information relating to the patent that is tagged by a concerned user. The similarity between tag information of perferred 'patents by user and other patents are called a 'Social Simialrity' in this paper. Lastly, a 'Total Similarity' are calculated by adding these three differenent similarites and patents having the highest 'Total Similarity' are recommended to each user. The suggested system are applied to a total of 1,638 korean patents obtained from the Korea Industrial Property Rights Information Service (KIPRIS) run by the Korea Intellectual Property Office. However, since this original dataset does not include tag information, we create virtual tag information and utilized this to construct the semi-virtual dataset. The proposed recommendation algorithm was implemented with JAVA, a computer programming language, and a prototype graphic user interface was also designed for this study. As the proposed system did not have dependent variables and uses virtual data, it is impossible to verify the recommendation system with a statistical method. Therefore, the study uses a scenario test method to verify the operational feasibility and recommendation effectiveness of the system. The results of this study are expected to improve the possibility of matching promising patents with the best suitable businesses. It is assumed that users' experiential knowledge can be accumulated, managed, and utilized in the As-Is patent system, which currently only manages standardized patent information.

Present Status and Prospect of Valuation for Tangible Fixed Asset in South Korea (유형고정자산 가치평가 현황: 우리나라 사례를 중심으로)

  • Jin-Hyung Cho;Hyun-Seung O;Sae-Jae Lee
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.46 no.1
    • /
    • pp.91-104
    • /
    • 2023
  • The records system is believed to have started in Italy in the 14th century in line with trade developments in Europe. In 1491, Luca Pacioli, a mathematician, and an Italian Franciscan monk wrote the first book that described double-entry accounting processes. In many countries, including Korea, the government accounting standards used single-entry bookkeeping rather than double-entry bookkeeping that can be aggregated by account subject. The cash-based and single-entry bookkeeping used by the government in the past had limitations in providing clear information on financial status and establishing a performance-oriented financial management system. Accordingly, the National Accounting Act (promulgated in October 2007) stipulated the introduction of double-entry bookkeeping and accrual accounting systems in the government sector from January 1, 2009. Furthermore, the Korean government has also introduced International Financial Reporting Standards (IFRS), and the System of National Accounts (SNA). Since 2014, Korea owned five national accounts. In Korea, valuation began with the 1968 National Wealth Statistics Survey. The academic origins of the valuation of national wealth statistics which had been investigated by due diligence every 10 years since 1968 are based on the 'Engineering Valuation' of professor Marston in the Department of Industrial Engineering at Iowa State University in the 1930s. This field has spread to economics, etc. In economics, it became the basis of capital stock estimation for positive economics such as econometrics. The valuation by the National Wealth Statistics Survey contributed greatly to converting the book value of accounting data into vintage data. And in 2000 National Statistical Office collected actual disposal data for the 1-digit asset class and obtained the ASL(average service life) by Iowa curve. Then, with the data on fixed capital formation centered on the National B/S Team of the Bank of Korea, the national wealth statistics were prepared by the Permanent Inventory Method(PIM). The asset classification was also classified into 59 types, including 2 types of residential buildings, 4 types of non-residential buildings, 14 types of structures, 9 types of transportation equipment, 28 types of machinery, and 2 types of intangible fixed assets. Tables of useful lives of tangible fixed assets published by the Korea Appraisal Board in 1999 and 2013 were made by the Iowa curve method. In Korea, the Iowa curve method has been adopted as a method of ASL estimation. There are three types of the Iowa curve method. The retirement rate method of the three types is the best because it is based on the collection and compilation of the data of all properties in service during a period of recent years, both properties retired and that are still in service. We hope the retirement rate method instead of the individual unit method is used in the estimation of ASL. Recently Korean government's accounting system has been developed. When revenue expenditure and capital expenditure were mixed in the past single-entry bookkeeping we would like to suggest that BOK and National Statistical Office have accumulated knowledge of a rational difference between revenue expenditure and capital expenditure. In particular, it is important when it is estimated capital stock by PIM. Korea also needs an empirical study on economic depreciation like Hulten & Wykoff Catalog A of the US BEA.

A Study on the Determinants of Patent Citation Relationships among Companies : MR-QAP Analysis (기업 간 특허인용 관계 결정요인에 관한 연구 : MR-QAP분석)

  • Park, Jun Hyung;Kwahk, Kee-Young;Han, Heejun;Kim, Yunjeong
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.4
    • /
    • pp.21-37
    • /
    • 2013
  • Recently, as the advent of the knowledge-based society, there are more people getting interested in the intellectual property. Especially, the ICT companies leading the high-tech industry are working hard to strive for systematic management of intellectual property. As we know, the patent information represents the intellectual capital of the company. Also now the quantitative analysis on the continuously accumulated patent information becomes possible. The analysis at various levels becomes also possible by utilizing the patent information, ranging from the patent level to the enterprise level, industrial level and country level. Through the patent information, we can identify the technology status and analyze the impact of the performance. We are also able to find out the flow of the knowledge through the network analysis. By that, we can not only identify the changes in technology, but also predict the direction of the future research. In the field using the network analysis there are two important analyses which utilize the patent citation information; citation indicator analysis utilizing the frequency of the citation and network analysis based on the citation relationships. Furthermore, this study analyzes whether there are any impacts between the size of the company and patent citation relationships. 74 S&P 500 registered companies that provide IT and communication services are selected for this study. In order to determine the relationship of patent citation between the companies, the patent citation in 2009 and 2010 is collected and sociomatrices which show the patent citation relationship between the companies are created. In addition, the companies' total assets are collected as an index of company size. The distance between companies is defined as the absolute value of the difference between the total assets. And simple differences are considered to be described as the hierarchy of the company. The QAP Correlation analysis and MR-QAP analysis is carried out by using the distance and hierarchy between companies, and also the sociomatrices that shows the patent citation in 2009 and 2010. Through the result of QAP Correlation analysis, the patent citation relationship between companies in the 2009's company's patent citation network and the 2010's company's patent citation network shows the highest correlation. In addition, positive correlation is shown in the patent citation relationships between companies and the distance between companies. This is because the patent citation relationship is increased when there is a difference of size between companies. Not only that, negative correlation is found through the analysis using the patent citation relationship between companies and the hierarchy between companies. Relatively it is indicated that there is a high evaluation about the patent of the higher tier companies influenced toward the lower tier companies. MR-QAP analysis is carried out as follow. The sociomatrix that is generated by using the year 2010 patent citation relationship is used as the dependent variable. Additionally the 2009's company's patent citation network and the distance and hierarchy networks between the companies are used as the independent variables. This study performed MR-QAP analysis to find the main factors influencing the patent citation relationship between the companies in 2010. The analysis results show that all independent variables have positively influenced the 2010's patent citation relationship between the companies. In particular, the 2009's patent citation relationship between the companies has the most significant impact on the 2010's, which means that there is consecutiveness regarding the patent citation relationships. Through the result of QAP correlation analysis and MR-QAP analysis, the patent citation relationship between companies is affected by the size of the companies. But the most significant impact is the patent citation relationships that had been done in the past. The reason why we need to maintain the patent citation relationship between companies is it might be important in the use of strategic aspect of the companies to look into relationships to share intellectual property between each other, also seen as an important auxiliary of the partner companies to cooperate with.

An Exploratory Study on the Globalization of Korean Cuisine through the Application of Multicultural Cuisine (다문화적 조리 접근법을 통한 한식 세계화에 대한 탐색적 연구)

  • Jung, Yung-Woo
    • Culinary science and hospitality research
    • /
    • v.16 no.2
    • /
    • pp.170-184
    • /
    • 2010
  • As Korean cuisine is one of our cultural assets and has global potential, it needs to be better marketed and known to the world. However, there is a lack of research examining what to and how to globalize Korean cuisine practically. Therefore, the purpose of this study is to suggest fundamental reasons and ways to globalize Korean cuisine from a multicultural point of view. A Delphi method was selected because the study is suitable for a structured group of experts instead of unstructured groups or individuals. A panel of experts were selected from two groups, Korean experts and international experts. This research established the characteristics of Korean foods, the difficulties of Korean cooking methods and the incorporation or substitution of Western ingredients in two rounds. A panel of experts suggested strategies for globalizing Korean cuisine in the third round. As a result, meaningful solutions were suggested such as increasing the global profile and knowledge of Korean cuisine from 18 experts out of 23, developing various cooking methods for Korean-cuisine having distinctively Korean characteristics from 17 experts out of 23, developing recipes that are compatible with equipment and appliances in a western kitchen, and considering the differences in taste and texture(mouth-feeling) between Korean and the Western people.

  • PDF

An Analysis of Relationship between Industry Security Education and Capability: Case Centric on Insider Leakage (보안교육과 보안관리 역량의 상관관계 분석: 인가된 내부자 기밀유출사례를 중심으로)

  • Lee, Chi-Seok;Kim, Yanghoon
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.2
    • /
    • pp.27-36
    • /
    • 2015
  • Current leakage of industrial technologies with revealing state secret against nation is gradually increasing and scope of the spill is diversified from technology-oriented leakage to new economic security sector like information and communication, electrical and electronic, defense industry, illegal export of strategic material, economic order disturbance by foreign country, infringement of intellectual property, etc. So the spill damage can affect not only leaked company but also national interests and entire domestic industry. According to statistics from National Industrial Security Center of National Intelligence Service, a major cause of technology leakage is not only by external things about hacking and malignant code, but internal leakage of former and current employees account for about 80%. And technology leakage due to temptation of money and personal interests followed by technology leakage of subcontractor is steadily increased. Most studies in the field of security have tended to focus on measuring security capability of company in order to prevent leakage core assets or developing measurement Indicators for management rather than security activities of the company members that is most important. Therefore, this study analyzes the effect of most underlying security education in security activities on security capabilities of enterprise. As a result, it indicates that security education have a positive(+) correlation with security capabilities.

The Development of RFID Utility Statistical Analysis Tool (RUSAT) in Comparison to Barcode for Logistics Activities (물류활동에서 RFID와 바코드 시스템의 효용성 비교를 위한 통계분석 도구(RUSAT) 개발)

  • Ha, Heon-Cheol;Park, Heung-Sun;Kim, Hyun-Soo;Choi, Yong-Jung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.5
    • /
    • pp.137-146
    • /
    • 2012
  • In SCM(Supply Chain Management), a management paradigm where the customer satisfaction is to be achieved by minimizing the cost, reducing the uncertainty, and obtaining the overall optimization. As it performs the integrated operation of the paths of information, assets, and knowledge from the raw material providers to the retailers, the adoption of RFID(Radio Frequency Identification) in SCM could be expected to magnify the effectiveness of the system. However, there is a huge risk by deciding whether or not RFID system is adopted without the objective analysis under the uncertain circumstances. This research paper presents the statistical analysis methodologies for the comparison of RFID with Barcode on the aspect of utility and the statistical analysis tool, RUSAT, which was programmed for nonstatisticians' convenience. Assuming a pharmaceutical industry, this paper illustrates how the data were entered and analyzed in RUSAT. The results of this research are expected to be used not only for the pharmaceutical related company but also for the manufacturer, the whole-saler, and the retailer in the other logistic industries.

Development of a Model of a Day Care Center for Rural Elderly People (농촌형 노인 주간보호시설 모형개발)

  • Kang, Kyung-Sook
    • Research in Community and Public Health Nursing
    • /
    • v.15 no.4
    • /
    • pp.551-565
    • /
    • 2004
  • Purpose: The purpose of this study is to develop a day care center model focused on public health institutions for the elderly residing in their homes. Method: Research design for this study was a mult-level research, which consisted of a related literature review, an Internet search for knowledge of the current situation at home and abroad, on-site interviews, questionnaires collected from a sample of residents in a rural area, and a key-informants approach. Results: 1) The subjects of service - Generalized service should be provided to the elderly, 65 years and older, regardless of their assets. 2) The contents of service - Providing pre-health oriented and post-social welfare service that can integrate and satisfy a wide variety of public health and welfare needs of the elderly would strengthen the health care service of a day care center for the elderly. 3) Delivery system - Basic-level local self-governments should become a central operating body, and establishing a properly adjusted delivery system to a rural area after considering the efficiency and the access of vulnerable rural areas is needed based on modification of 'a Special Law for Agricultural and Fishery Areas' (rural public health center>rural health sub-center ${\rightarrow}$ unified health sub-center ${\rightarrow}$ public health hospital (public health center) ${\rightarrow}$ public welfare office). 4) Facility - Public health facilities such as public health centers and sub-centers should be located in areas that can easily access the facilities. 5) Funding - For day care center for the elderly in local self-government, the central government should modify a relevant implementation of subsidy in and provide some facilities and service regardless of the degree of self reliance of local self-government. 6) Human resources - It is needed to guarantee the period of workers of a day care center for the elderly, at least 3 to 5 years, with considering their specialty on aged care and avoiding circulation based positions. Furthermore, appropriate specially trained personnel such as medical workers and social workers should be placed to take care of both health service and welfare through strengthening of 'rules of law of elderly welfare,' Conclusion: future research is needed to test the model through a demonstration study using a model which may be developed in the future and to standardize the appraisal criteria of people hoping to enter a day care center for the elderly.

  • PDF

A Use-case based Component Mining Approach for the Modernization of Legacy Systems (레거시 시스템을 현대화하기 위한 유스케이스 기반의 컴포넌트 추출 방법)

  • Kim, Hyeon-Soo;Chae, Heung-Seok;Kim, Chul-Hong
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.7
    • /
    • pp.601-611
    • /
    • 2005
  • Due to not only proven stability and reliability but a significant investment and years of accumulated -experience and knowledge, legacy systems have supported the core business applications of a number of organizations over many years. While the emergence of Web-based e-business environments requires externalizing core business processes to the Web. This is a competitive advantage in the new economy. Consequently, organizations now need to mine the business value buried in the legacy systems for reuse in new e-business applications. In this paper we suggest a systematic approach to mining components that perform specific business services and that consist of the legacy system's assets to be leveraged on the modem platform. The proposed activities are divided into several tasks. First, use cases that realize the business processes are captured. Secondly, a design model is constructed for each identified use case in order to integrate the use cases with the similar functionalities. Thirdly, we identify component candidates from the design model and then adjust the component candidates by considering common elements among the candidate components. And also business components are divided into three more fine-grained components to deploy them onto J2EE/EJB environments. finally, we define the interfaces of components which provide functionalities of the components as operations.