• Title/Summary/Keyword: Organization evaluation

Search Result 1,277, Processing Time 0.026 seconds

Influence of Goal Ambiguity in Institutional Evaluation of Government-funded Research Institutes (정부출연연구기관의 기관평가에서 목표 모호성의 영향에 관한 연구)

  • Koo, Hoonyoung
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.43 no.4
    • /
    • pp.84-92
    • /
    • 2020
  • In order to analyze the organizational performance of government-funded research institutes, four independent variables (organization size, organization age, evaluation system, organization location) and goal ambiguity were empirically analyzed. Although there are existing studies on institutional evaluation, which is the organizational performance of government-funded research institutes, there are differences in research in that it is an empirical analysis analyzed from the perspective of goal ambiguity and that the evaluation system, which is the specificity of institutional evaluation, is included in the analysis. As a result of the analysis, organizational location was the only independent variable that had a direct significant effect on organizational performance, and goal ambiguity showed a significant mediating effect for all independent variables. This indicates that goal ambiguity plays an important role in the organizational performance of government-funded research institutes, and to reduce this, increase the size of the organization, pay attention to establishment of the organization for organizational age, and that it is desirable to have an independent research group in the government department for the organization location. In addition, it was supported that the improvement effect of the evaluation system is proceeding in a desirable direction in terms of goal ambiguity.

The Evaluation Model for Interior Design Organizational Technology Integration: The quality of the design aid and economic evidence and factors

  • Choi, Seung-Pok
    • International Journal of Contents
    • /
    • v.8 no.2
    • /
    • pp.67-74
    • /
    • 2012
  • Technological substitution is the process by which a radical technology replaces the dominant technology in an industry. The processes of diffusion and substitution have been modeled extensively (Technology & innovation, 2010). However, the formulation of classical quantitative models encompasses only part of the theoretical space. These models impose many simplified constraints to the achievement of analytical resolution. The interior design organization needs to establish a set of technical system requirements by describing the scope of the accessibility needs of the organization against current technology use. Because of complicated design resources and ongoing advances in design technologies, design systems face the challenge of prioritizing new technologies for supporting. The problem is small design organization administration often displays a lack of concern toward the evaluation of technology integration. In this paper, I will identify the influence of a design organization's technology, and predict how future technology will inform, support, and potentially hinder productivity, culture, and work satisfaction within a design organization in the industry. In addition, I will use current design organizational behavior and leadership models to support my predictions. Finally, I will examine a proven approach to assist designers with evaluating technology integration in interior design organization. The goal is to develop a high quality, professional development scorecards for the evaluation. I will conduct both the evaluation of technology integration and CRM performance evaluation is recommended to assess the effectiveness of technology integration. Therefore, the evaluation of integration technologies oriented design hold the promise of solving the organization application integration challenge. The evaluation of integration technology is a significant pattern for processing such a vision. The careful selection of an integration technology for this purpose is crucial in contributing toward the success of such an interior design organization endeavor.

Advanced Information Security Management Evaluation System

  • Jo, Hea-Suk;Kim, Seung-Joo;Won, Dong-Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.6
    • /
    • pp.1192-1213
    • /
    • 2011
  • Information security management systems (ISMSs) are used to manage information about their customers and themselves by governments or business organizations following advances in e-commerce, open networks, mobile networks, and Internet banking. This paper explains the existing ISMSs and presents a comparative analysis. The discussion deals with different types of ISMSs. We addressed issues within the existing ISMSs via analysis. Based on these analyses, then we proposes the development of an information security management evaluation system (ISMES). The method can be applied by a self-evaluation of the organization and an evaluation of the organization by the evaluation committee. The contribution of this study enables an organization to refer to and improve its information security levels. The case study can also provide a business organization with an easy method to build ISMS and the reduce cost of information security evaluation.

A Quantitative Evaluation on Developmental Organization of Technical Proposals (기술제안서의 개발조직 부문에 관한 정량적 평가)

  • Choo, Kyung-Kyun;Kwon, Young-Kap;Rhew, Sung-Yul
    • Journal of Information Technology Services
    • /
    • v.3 no.1
    • /
    • pp.21-41
    • /
    • 2004
  • The technical proposal suggested and published by MIC(Ministry of Information and Communication, henceforth MIC) contains too general assessment elements, which causes qualitative and subjective assessment of technical proposals. Thus, in terms of the technical proposal assessment. It lacks In fairness, validity and accuracy. Furthermore, it has a great deal of difficulty in assessment caused by the inconsistency between proposal planning and assessment methods. Also, each company has different writing format, so it is impossible to make use of its maneuvering data for the assessment. To overcome these weaknesses, our research focused on a quantitative evaluation on development organization, which is a part of organizational and administrative part of the technical proposal suggested and published by MIC. In this research, we divided development organization for the technical proposal into organization, teams, and team members, and then studied addition, deletion and merging for the assessment criteria. For the related study, we chose especially CMM(Capability Maturity Model) from a lot of international and national references, which is a model measuring the maturity of organization, and then we focused on Small-CMM which is available in the small-sized organization. We also suggested input form, description method, assessment elements for the quantitative assessment in the chosen developmental organization, and finally we proposed standard referencing criteria for the assessment. Our study concludes that our assessment method are valid and available in comparison with the previous Delphi method through a validity evaluation test.

Development of the Information Security Methodology for Defense Organization (국방조직의 정보보호 평가 방법론 개발)

  • Cho, Sung Rim;Choi, In Soo;Park, Ji Hoon;Shin, Woo Chang
    • Journal of Information Technology Services
    • /
    • v.12 no.4
    • /
    • pp.77-90
    • /
    • 2013
  • As Cyber threats are rising, the scope of information Security (IS) is extending from technical protection of a single information system to organizational comprehensive IS capability. The ministry of National Defense (MND) has established the IS evaluation for defense organization in 'the Directive for Defense Informatization Affairs.' However, no information about an evaluation method, process and organization is provided. We surveyed information security management system (ISMS) and related best practices in public sector and other countries, and analysed the military information security affairs. Thus, this paper recommends the IS evaluation method and process. The trial IS evaluation is in progress this year and the MND will expand this IS evaluation to the entire organization.

Teams Operation Performance Evaluation based on BSC (BSC에 근거한 팀제 운영 성과측정)

  • Yoo, Jin-Seong;Yoon, Seong-Pil;Cho, Tae-Yeon;Kim, Chang-Soo
    • Journal of the Korea Safety Management & Science
    • /
    • v.8 no.4
    • /
    • pp.219-238
    • /
    • 2006
  • Many corporations are accepting various kinds of business reform techniques to be adapted and overcome in this e-Business period. Among these techniques, team-organization is selected most in person/organization field. The introduction of team-organization is more needed and spread, so many corporations actually constructed team-organization formation form. But the result has not been active. Therefore after team-organization is introduced to improve the performance evaluation of team management, the result of team management performance should be correctly measured to find out and settle the problems of team-organization. The purpose of this research presents the development of the model of team-management performance evaluation and the method of the proper measurement based on BSC.

A study on the function analysis of disaster related organizations for provision of a valuation basis for disaster management system (재난관리책임기관의 재난관리업무평가를 위한 기초연구)

  • Kim, Hyun-Joo;Park, Sang-Hyun;Jung, Tae-Ho
    • 한국방재학회:학술대회논문집
    • /
    • 2007.02a
    • /
    • pp.363-366
    • /
    • 2007
  • The characteristics of every organization is going to be under investigation should be previously analyzed and reviewed in details for senior disaster management organization In this research, disaster management organizations above mentioned are investigated and arranged respectively. And the guidelines for evaluation is suggested and the results offers foundations for the development of evaluation index.

  • PDF

A Study on Content Organization and Assigning Score of Evaluation Elements of Clinical Practice of Dept. of Dental Technology - Centering on the undergraduates - (치기공과 임상실습 평가항목의 내용구성과 배점에 관한 연구 - 재학생 중심으로 -)

  • Lee, Hwa-Sik;Bae, Bong-Jin;Park, Myoung-Ho
    • Journal of Technologic Dentistry
    • /
    • v.30 no.1
    • /
    • pp.73-82
    • /
    • 2008
  • This study has been analyzed to write an ideal training evaluation table after analyzing validity of content organization and assigning score of evaluating elements of clinical practice of Dept. of dental technology. 220 junior students who are studying dental technology in D university in Daegu were questioned to analyze the relationship of content organization and score of clinical practice evaluation table. The corrected material has been inspected by SAS V8 for Windows. The results are as following. 1. The validity of content organization of clinical practice evaluation table has a result which can be reliable over than 70% but the validity of score shows low reliance. c 2. The validity of content organization of detail elements of clinical practice evaluation shows that overuse of material and attentiveness(3.78) and responsibility (3.60) are high response but in score organization, the validity shows that safety measure(2.36) when controling machines, arrangement(2.98) after use and ability (2.98) of solving problems are very low. 3. In the elements without interpersonal relation, it shows that those are related to each other. its grading is p < 0.01 so it appears to be meaningful. 4. In result of analyzing the effect to 'studying amount' mark in clinical practice evaluation mark, it appears the element of attitude for job to affect it. And in result of analyzing the effect to 'training attitude' mark, it appears the element of 'controling machines' to affect it. For these results, to be a better evaluation tool, it should be modified by continuous research with arranging evaluation elements to be marked differently in between elements.

  • PDF

Evaluation of a Consumer Organization Site (소비자단체 사이트의 평가)

  • Nam, Su-Jung;Yoo, Hyun-Jung;Kim, Kee-Ok
    • Journal of the Korean Home Economics Association
    • /
    • v.44 no.8
    • /
    • pp.127-142
    • /
    • 2006
  • This study, systematically evaluated the services provided by consumer organization site in order to improve the possessing problems or deficient aspects and present a desirable direction for instituting the planning of a new consumer group site. An evaluation of the level with respect to contents of consumer organization site showed that communication had the lowest grade while design had the highest. There were some technical errors related to accessibility of the site. An examination of the quality of consultation showed that success rate was low and the contents of the consultation were inadequate. However, compared with service quality of the consumer organization site estimated in the year of 2000, the current service showed significant improvements in terms of the overall quantity of information.

A Study on the Evaluation Indices for Evaluation of the Information Security Level on the Enterprise Organization (기업의 정보보호 수준 평가를 위한 평가지표)

  • Na, Yun-Ji;Ko, Il-Seok;Cho, Young-Suk
    • Convergence Security Journal
    • /
    • v.6 no.3
    • /
    • pp.135-144
    • /
    • 2006
  • Until now, most of the evaluation systems have performed evaluation with an emphasis on in-formation security products. However, evaluating information security level for an enterprise needs analysis of the whole enterprise organization, and a synthetic and systematic evaluation system based on it. In this study we subdivided the information security elements of the whole enterprise such as planning, environment, support, technology, and management; developed indices based on them; finally, made the information security level of the whole enterprise organization possible to be measured. And we tried to grasp the information security level of the whole enterprise organization and develop an evaluation system of information security level for suggesting a more developing direction of information security.

  • PDF