• Title/Summary/Keyword: Lack of communication

Search Result 1,113, Processing Time 0.027 seconds

Knowledge Management and E-learning for Organizational Culture

  • Gupta, Omprakash K.;Lee, Yuan-Duen;Wang, Yuan-Ching;Tein, Shih-Chun
    • Journal of Information Technology Applications and Management
    • /
    • v.16 no.1
    • /
    • pp.137-148
    • /
    • 2009
  • Knowledge management becomes the key point for organizations to survive and maintain competitive advantages in the knowledge economy era. E-learning plays a vital role for the organizational learning. How to share the experience of knowledge and the success of the knowledge management has great connection with the organizational culture. This study focuses on the factors of effective E-learning as well as its relation to the organizational culture. A successful e-learning system should not only aim at different statistical variables but emphasize on : course contents, variety of teaching methods and establishes a stable network environment. A stable E-learning platform and speedy bandwidth is a must to achieve the non-barrier communication and built an interactive learning environment. To achieve success in E-learning, it is not necessary to divide the organizational culture to strengthen the course content multiplication and plans the E-learning supervisory work by the sole responsibility unit. It should establish an ample teaching frequency width and platform and also must establish the appropriate study network frequency width and hardware equipment to achieve the best E-learning effect. The interaction in different organizational culture in adapting E-learning, those Ad-hoc and Marketing Culture, are mostly influence by the external environment and have more interactive content. Those in Clan and Hierarchy Culture are affected by traditional conception and lack of interaction. Meanwhile, under the cost consideration, Clan and Ad-hoc Culture on the dynamic side prefer to spend more cost on E-Learning while the stable side, Hierarchy and Marketing culture are willing to pay more expenses on E-Learning.

  • PDF

Security-Reverse-Attack Engineering Life-cycle Model for Attack System and Attack Specification Models (공격시스템을 위한 보안-역-공격공학 생명주기 모델과 공격명세모델)

  • Kim, Nam-Jeong;Kong, Mun-Soo;Lee, Gang-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.6
    • /
    • pp.17-27
    • /
    • 2017
  • Recently, as cyber attacks have been activated, many such attacks have come into contact with various media. Research on security engineering and reverse engineering is active, but there is a lack of research that integrates them and applies attack systems through cost effective attack engineering. In this paper, security - enhanced information systems are developed by security engineering and reverse engineering is used to identify vulnerabilities. Using this vulnerability, we compare and analyze lifecycle models that construct or remodel attack system through attack engineering, and specify structure and behavior of each system, and propose more effective modeling. In addition, we extend the existing models and tools to propose graphical attack specification models that specify attack methods and scenarios in terms of models such as functional, static, and dynamic.

A Concept Analysis of Barriers to Sexual Health Nursing Care (성건강 간호 장애의 개념분석)

  • Han, Jeong-Won
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.12
    • /
    • pp.357-369
    • /
    • 2020
  • This study tries to identify and clarify the concept of barriers to sexual health nursing care. A hybrid model was used to perform a concept of barriers to sexual health nursing care. To accomplish this, we analyzed data collected from 4 participants as well as from available literature regarding. We categorized barriers to sexual health nursing care were identified to have five dimensions and six attributes. The definition of barriers to sexual health nursing care recognizes the need and necessity of sexual health nursing care, but due to difficulty in accessing sex, prejudice, stereotypes, difficulty in communication, and lack of knowledge related to sex, the subjects are provided with professional sexual health nursing education and it is found that the service was not provided. This study is a basic data for evaluating barriers to sexual health nursing care as a prerequisite for reducing barriers to sexual health nursing care experienced by nurses to provide sexual health nursing care. Besides, the results may serve as a basis for proposing the development of a program to reduce barriers to sexual health nursing care.

A Study on the Safety Management of Vulnerable Workers in the Construction Site by Importance Performance Analysis (IPA) (IPA분석을 통한 건설현장 취약근로자 안전관리에 관한 연구)

  • Lee, Munho;Yoon, Younggeun;Oh, Taekeun
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.5
    • /
    • pp.723-728
    • /
    • 2022
  • Most accidents at construction sites are occurring in vulnerable groups such as new workers, foreign workers, and elderly workers. These vulnerable workers often lead to accidents due to the lack of awareness of risks. Therefore, in order to reduce accidents, it is necessary to pay attention to and manage vulnerable workers. This study attempted to identify the level of safety awareness and safety management priorities for vulnerable workers through IPA analysis. New workers should be able to adapt to the field as soon as possible, and foreign workers were found to need frequent check-ups due to language communication problems. In the case of older workers, it was analyzed that it was necessary to check their health and to check whether they were performing other tasks than the prescribed ones.

Development of Korean UCS Architecture and Service Design for GCS Standardization (GCS 공통화를 위한 한국형 UCS 개발 및 서비스 설계)

  • Yoorim Choi;Sangyun Park;Chulhwan Kim;Gyeongrae Nam;So-Yeong Jeong
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.3
    • /
    • pp.314-322
    • /
    • 2023
  • The use of unmanned aerial vehicles is rapidly increasing in order to effectively utilize limited manpower and minimize casualties on the battlefield. The requirements for ground control equipment vary depending on the operating concept and environment of the unmanned aerial system, but there are still common requirements. However, the lack of standardized system configurations to meet these common requirements makes it difficult to reuse common functions, leading to continuous acquisition costs. To solve this problem, this paper develops a Korean version of the UCS model using the UCS architecture. Furthermore, after designing elements related to service development not specified in the architecture (such as framework, communication middleware, service structure, etc.), we develop a Boilerplate to enhance developers' work efficiency based on this. The results of this study will serve as a foundation for effectively and economically carrying out the development of ground control equipment for unmanned aerial systems.

Efficient Hangul Word Processor (HWP) Malware Detection Using Semi-Supervised Learning with Augmented Data Utility Valuation (효율적인 HWP 악성코드 탐지를 위한 데이터 유용성 검증 및 확보 기반 준지도학습 기법)

  • JinHyuk Son;Gihyuk Ko;Ho-Mook Cho;Young-Kuk Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.1
    • /
    • pp.71-82
    • /
    • 2024
  • With the advancement of information and communication technology (ICT), the use of electronic document types such as PDF, MS Office, and HWP files has increased. Such trend has led the cyber attackers increasingly try to spread malicious documents through e-mails and messengers. To counter such attacks, AI-based methodologies have been actively employed in order to detect malicious document files. The main challenge in detecting malicious HWP(Hangul Word Processor) files is the lack of quality dataset due to its usage is limited in Korea, compared to PDF and MS-Office files that are highly being utilized worldwide. To address this limitation, data augmentation have been proposed to diversify training data by transforming existing dataset, but as the usefulness of the augmented data is not evaluated, augmented data could end up harming model's performance. In this paper, we propose an effective semi-supervised learning technique in detecting malicious HWP document files, which improves overall AI model performance via quantifying the utility of augmented data and filtering out useless training data.

English Learning with the Tools of Flash Animation (플래시 애니메이션 도구를 활용한 영어 학습 환경 연구)

  • Lee, Il Suk
    • Journal of Digital Contents Society
    • /
    • v.14 no.4
    • /
    • pp.537-544
    • /
    • 2013
  • There has been many studies to explore what is the best multimedia tools for English learning by internet, but the students are still thirsty for the lack of practical and effective learning method which may lead them to stimulate their motivations to learn English with technological new media. The purpose of this study is to design Flash Animation as a new approach to learn language acquisition for those students who are learning English as a second language. This second is to show the validity for the introduction of Flash Animation into the English class. The third is to describe the effectiveness of the application of multimedia tools used in English communication such as java script programming and power point presentation.

Analysis of Internet Identity Management 2.0 and Perspective of 3.0 (인터넷 신원 관리 2.0에 대한 분석과 3.0에 대한 전망)

  • Park, Seung-Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.7
    • /
    • pp.1501-1509
    • /
    • 2011
  • Current identity management 1.0 model, which is service provider-centric and isolated, has several problems such as low usability, high cost structure, difficulty in privacy protection, and lack of trust infrastructure. Though various SSO-based identity management 2.0 models including Passport/Live ID, Liberty Alliance/SAML, CardSpace, and OpenID have been recently developed in order to overcome those problems, they are not widely accepted in real Internet environment so as to replace the existing identity management 1.0 model. This paper firstly analyzes the widely-known identity 2.0 models in a comparative way, and then presents a perspective on the development direction of identity management 3.0 model for future Internet.

Grid-based Energy Efficient Routing Protocol for Sensor Networks (센서 네트워크를 위한 그리드 기반의 에너지 효율절인 라우팅 프로토콜)

  • Jung, Sung-Young;Lee, Dong-Wook;Kim, Jai-Hoon
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.2
    • /
    • pp.216-220
    • /
    • 2008
  • Sensor nodes in wireless network have several limitations such as lack of energy resource and network bandwidth. There are many researches to extend lifetime of sensor network and enhance availability. However, most of the previous researches didn't consider the mobile sink node. Those researches aren't suitable in the environment having mobile sinks. In this paper. we propose a scheme that reduces communication overheads and energy consumptions and improves reliability in routing path setup. Proposed scheme has excellent scalability without degrading performance in environment where many sink nodes exist and/or the network size is huge. Proposed scheme saves the energy consumption up to 70% in comparison with the previous grid-based and cluster-based protocol. As a result, proposed scheme increases the lifetime of sensor network and enhances availability of wireless sensor network.

Danger Situations Alert System based U-Healthcare (유헬스케어 기반의 위험상황 알림 시스템)

  • Park, Byungdon;Yu, Donggyun;Jung, Hoekyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.1
    • /
    • pp.193-198
    • /
    • 2017
  • Recently, as interest in health increases, various wearable devices such as smart watch and smart band which can measure user's biometric information are being studied. Conventional wearable devices service the measured biometric information in a form that provides simple monitoring, disease prevention, and exercise amount. However, the user is Lack to deal with the dangerous situation. In this paper, we propose a hazard notification system to address these problems. The biometric information measured by the acceleration sensor and the heart rate sensor is transmitted to the application through the Arduino in real time. It identifies the risk situation through sensor priority measurement and risk situation identification algorithm. If a dangerous situation occurs, a notification message is sent to the guardian indicating the current location of the user. Therefore, it can be expected that if a dangerous situation occurs to a user who needs protection, he can respond promptly.