• Title/Summary/Keyword: Personal Data Control

Search Result 678, Processing Time 0.036 seconds

The Assessment Method for the Strategic Potential of Personnel with the Example of JTI Kazakhstan

  • Tazhiyeva, Samal;Otarbayeva, Aigul
    • The Journal of Industrial Distribution & Business
    • /
    • v.7 no.2
    • /
    • pp.5-12
    • /
    • 2016
  • Purpose - The purpose of this article is to review the key features and benefits with different methods which is suitable for a particular organization (in this article JTI Kazakhstan) as well as for assessing the capacity of a staff and identification. Research design, data and methodology - Current approaches were used to assess a staff capacity and classify groups. By comparing each other and marked different application methods, this article developed the method for the employment of personal potential and control management process. Results - Through this analysis, assessing labor capacity functioned as an evaluation and assessment for employee competence. Examples suggested practical recommendations for assessing employees' labor potential. Conclusions - It is important not just to bring together several techniques but adapt the conditions with existing organization with the professionalism and experience of specialists in managing the evaluation process. In terms of the implementation of this task, it is necessary to have knowledge in the field of psychology as well as business processes, objectives, and specificities of companies including the relevant personal qualities.

Fashion Designer Competency Modeling (패션디자이너 역량모델링 구축)

  • Jang, Namkyung
    • Fashion & Textile Research Journal
    • /
    • v.20 no.4
    • /
    • pp.369-378
    • /
    • 2018
  • This study started with the need for transition to competency-based education as well as the witness of fast changes in fashion industry's job environment. The goals of this study were (1) to explore fashion designers' competencies that are necessary for a successful careers in global fashion industry, and (2) to establish fashion designer competency model. In-depth individual interviews were conducted with 15 participants who have charged for design department and moreover have shown high performance in national, licence or designer brands in Korea fashion industry. Grounded theory was adopted to analyze data. As a result of analysis, the 4 core competencies emerged: problem-solving, research, inter-personal, and self-development. Each core competency has sub-competencies. Creativity, commerciality, control, decision making were sub-competencies for the problem-solving competency. Information management, innovation understanding & application, trend analysis & forecasting were sub-competencies for the research competency. Consumer, inside company, and outside company relationships were sub-competencies for the inter-personal competency. Self-awareness, self-management, expertise were sub-competencies for the self-development competency. In order to acquire these competencies, knowledge (academic, practical, multi-discipline), skills (sense, analysis, synthesis, communication), and attitude (interest, enjoyment, perseverance, personality) were essential. Based on these findings, implications for university fashion design education and further research areas were suggested.

A Study on Access Authorization Inference Modes for Information Security of Specialized Private Networks (특성화 사설 네트워크 정보보호를 위한 접근권한 추론모드에 관한 연구)

  • Seo, Woo Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.99-106
    • /
    • 2014
  • The most significant change and trend in the information security market in the year of 2014 is in relation to the issue and incidents of personal information security, which leads the area of information security to a new phase. With the year of 2011 as the turning point, the security technology advanced based on the policies and conditions that combine personal information and information security in the same category. Such technical changes in information security involve various types of information, rapidly changing security policies in response to emerging illegal techniques, and embracing consistent changes in the network configuration accordingly. This study presents the result of standardization and quantification of external access inference by utilizing the measurements to fathom the access authorization performance in advance for information security in specialized networks designed to carry out certain tasks for a group of clients in the easiest and most simple manner. The findings will provide the realistic data available with the access authorization inference modes to control illegal access to the edge of a client network.

Exploring the Distribution of Organizational Risk and Assessing Internal Audit Effectiveness: A Systematic Review

  • Arum ARDIANINGSIH;Doddy SETIAWAN;Wahyu WIDARJO;Payamta PAYAMTA
    • Journal of Distribution Science
    • /
    • v.22 no.4
    • /
    • pp.59-68
    • /
    • 2024
  • Purpose: The function of internal audit is to help achieve company goals and targets by minimizing the impact of business risks. The distribution of internal audit activities in carrying out control and supervision covers all aspects or activities at all levels of management. The aim of the research is to determine the distribution of risk-based internal audit effectiveness assessments in companies. Data and Research Design Methodology: Researchers examined research trends regarding things that could influence the distribution of the effectiveness of the internal audit function from 2007 to 2023.This research used a systematic literature review (SLR) research method. This research used 23 papers sourced from the Scopus database. Results: The distribution of the effectiveness of audit services provided by internal auditors is more influenced by the personal characteristics of internal auditors and has little to do with the leadership of the chief internal auditor, technology, and risk management. Conclusion: The distribution of monitoring services provided by internal auditors covers all levels of departments or divisions of the organization. The assessment of internal audit effectiveness is more influenced by the auditor's personal attributes such as independence, competence, and management support.

A Study on the Performance of MAC Protocols for High-Speed Mobile Data Services (이동 고속데이타 서비스용 MAC계층 프로토콜의 성능연구)

  • 김태규;조동호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.9
    • /
    • pp.1730-1738
    • /
    • 1994
  • Broadband code division multiple access(B-CDMA)previously proposed for personal communication services(PCS) is not suitable for high-speed data services with large variations in speed, because it is designed only for low-speed voice calls with small variations in speed. Meanwhile, hybrid intra-cell TDMA/inter-cell CDMA(Hybrid TDMA/CDMA) recently proposed could accomodate high-speed services easily because of its internal use of the TDMA scheme, but there would be much inefficiency in treating variable bit rate services due to the intrinsic properties of TDMA transmission scheme, In this paper, a media access control(MAC) protocol, called Resevation TDMA/CDMA, which uses a reservation scheme similar to the one in the packet reservation multiple access(PRMA) protocol to compensate for these shortcomings is proposed. In addition, the performance of this protocol is analyzed and compared with conventional protocols by computer simulation. According to the simulation results, it has been shown that the proposed Reservation TDMA/CDMA scheme could support various transmission rates of user data traffics easily, and it could utilize the variations of the treansmission rates in each active call more efficiently.

  • PDF

Smart Station Operating System Using Station Based Network (정거장 기반 네트워크를 활용한 스마트 정거장 운영시스템)

  • Lee, Kang-Won;Yoon, Hee-Taek;Kim, Young-Min
    • Proceedings of the KSR Conference
    • /
    • 2011.10a
    • /
    • pp.2422-2429
    • /
    • 2011
  • The main function of station is supplying the convenient environment to the passengers as a vehicle waiting place. Smart station is networked based on the station which has been combined with additional functions like effective operation and real time monitoring and power control. Smart station network for the operation has been concerning about the communication security and the data transmission distance between vehicle and station. Smart station can be useful for the ubiquitous data communication place where the people can use their personal communication instruments very easily and quickly. This is the smart station.

  • PDF

A Study of Nurse Manager's Decision-making on Human Resource Management (인적자원관리 상황에 대한 간호 관리자의 의사결정에 관한 연구)

  • Yu, Mi
    • Journal of Korean Academy of Nursing Administration
    • /
    • v.13 no.1
    • /
    • pp.82-97
    • /
    • 2007
  • Purpose: This study was to investigate the relationships among nurse managers' participation in decision-making process relation to human resource management and the influencing factors. Method: The subjects were 198 nurse managers who were in general hospitals over 900 beds. The data were collected from January 13 to March 13, 2006. The SPSS PC+ 12.0 program was used to analyze the data. Result: The nurse managers had greater participation in the identification phase of decision making than selection phase. The mean scores of three phases were significantly different. The satisfaction of decision making was evaluated. The higher participation in decision making, the higher satisfaction of decision making. Nurse managers' decision style tended to be more participative than autocratic. Personal and organizational factors(age and decentralization) influenced positively on participation in decision making. Decentralization and span of control influenced positively on satisfaction in decision making. Conclusion: It is necessary to permit the participation in decision making for nurse managers.

  • PDF

Construction or Speech Editing System for Speech Recognition. (음성 인식을 위한 편집시스템의 구성)

  • Song, D.S.;Lee, C.W.;Shin, C.W.;Jeong, J.S.;LEE, H.S.
    • Proceedings of the KIEE Conference
    • /
    • 1987.07b
    • /
    • pp.1583-1586
    • /
    • 1987
  • In the study for effective speech control we designed a personal computer system with A/D converter in which the speech signal is transformed by digital data displayed graphically on the moniter and with a D/A converter in which the digital data is transformed into speech signal which people can hear. We analyzed the character of the speech signal produced by the system. We designed the adaptive noise cancel algorithm so that noise and Interference are cancelled whenever the speech signal is recognized by the computer system. This is a basic system for artificial Intelligence.

  • PDF

Trust-based business model in trust economy: External interaction, data orchestration and ecosystem value

  • Minzheong, Song
    • International Journal of Advanced Culture Technology
    • /
    • v.6 no.1
    • /
    • pp.32-41
    • /
    • 2018
  • The aim of this study is to formulate a trust-based business model of Internet services in so called the "trust economy." For it, firstly concepts of trust and trust economy are discussed. Then, we present previous literatures' review of trust in social science prism and trust economy in economic prism. This study classified the literatures' stances with two viewpoints of the 'system' and the 'user'. With this backdrop, we discuss three contradictory stances: Internal optimization vs. external interaction, personal data control vs. orchestration, and end-user vs. ecosystem value. In the result, we formulate a trust-based business model framework with three trust issues in user perspective and suggests three strategic directions related three issues along with representative use cases.

A Study on Development of Interlocking Inspection System for Electronic Interlocking System (전자연동장치의 연동검사시스템 개발)

  • 박영수;이기서
    • Journal of the Korean Society for Railway
    • /
    • v.5 no.2
    • /
    • pp.104-111
    • /
    • 2002
  • The purpose of interlocking system was to prevent the route for a train being set up and its protecting signal cleared if there was already another, conflicting route set up and the protecting signal for that route cleared. This paper proposed Interlocking Inspection System(IIS) consisting of interlocking simulator and field simulator to operate interlocking test of computer based Electronic Interlocking System(EIS) in this paper. Interlocking simulator consists of Design Edit System(DES), Logical Database Management Tool(LDMT) and real-time confirming system, field simulator is a equipment to simulate a control object of EIS and constitutes configuration operated in 19 inch standard rack. As a result of test to prove capacity of this IIS, the efficiency was shown as excellent. Therefore by using inspection system, we obtain every advantages. It has the functions for test data generation and automatic test execution based on personal computer. Time and cost for test work can be reduced more efficiently by using this developed inspection system