• Title/Summary/Keyword: Public Enterprises

Search Result 459, Processing Time 0.026 seconds

A Study on Required Competency for Each Field of Intellectual Property in the 4th Industrial Revolution Era (4차 산업혁명 시대의 지식재산 분야별 필요 역량 분석)

  • Park, Ki-Moon;Lee, Kyu-Nyo;Lee, Byung-Wook
    • 대한공업교육학회지
    • /
    • v.45 no.2
    • /
    • pp.108-130
    • /
    • 2020
  • In order to cope with the rapid changes in science and technology and various societies and complex economies with the advent of the 4th Industrial Revolution, intellectual property education is essential above all. In this study, therefore, intellectual property and the required competences were derived and verified for each field. As for the research method, Delphi technique was used twice for literature review and experts, and the conclusions of the research are as follows. First, the field of intellectual property required in the era of the 4th Industrial Revolution was classified, through literature review and Delphi technique, in eleven sections such as IP-R & D consulting, IP information search analysis, IP entitlement, IP strategic planning, IP transaction, IP finance, IP value evaluation, IP management, global IP management, IP commercialization, and IP disputes, of which validity was verified. Second, It was analyzed that the validity of required competencies derived from each field of intellectual property was reliable. Third, it is generally appropriate to nurture manpower in each field of intellectual property in universities or graduate schools. In addition, it is judged that regular job training of industries such as enterprises and public institutions is necessary regardless of the field.

Development Testing/Evaluating Methods about Security Functions based on Digital Printer (디지털 프린터의 보안기능 시험/평가방법론 개발)

  • Cho, Young-Jun;Lee, Kwang-Woo;Cho, Sung-Kyu;Park, Hyun-Sang;Lee, Hyoung-Seob;Lee, Hyun-Seung;Kim, Song-Yi;Cha, Wook-Jae;Jeon, Woong-Ryul;Won, Dong-Ho;Kim, Seung-Joo
    • The KIPS Transactions:PartC
    • /
    • v.16C no.4
    • /
    • pp.461-476
    • /
    • 2009
  • Digital Printers that are mainly used in enterprises and public institutions are compound machinery and tools which are combined into various functions such as printing, copying, scanning, and fax so on. Digital Printers has security functionality for protecting the important data related with confidential industry technology from leaking. According to the trends, CC(Common Criteria) evaluation and assurance about digital printer is on progress in Japan and USA. Domestically CC evaluation and assurance is started recently. However, the know-how about the digital printer evaluation is not enough and the developers and the evaluators have difficulty in CC evaluation of digital printer products in the country. Therefore, the testing method of digital printer security functionality and evaluation technology is essentially needed for increasing demand for the evaluation afterwards. In this study, we analyze the security functionality and developing trends of digital printer products from internal and external major digital printer companies. Moreover, we research the characters of each security functions and propose guideline for digital printer security functionality evaluation and vulnerability testing methods.

A Study on the Operation of Export Credit Policy preparing for possible WTO ASCM Disputes (WTO 보조금 분쟁을 대비한 수출신용제도 운영방안에 관한 연구)

  • Oh, Won Suk;Kim, Pil Joon;Baek, Seung Taek
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.57
    • /
    • pp.283-303
    • /
    • 2013
  • When a trade conflict arises related to an officially supported export credit programme, The World Trade Organization(WTO), decides on whether the programme is a forbidden subsidy stipulated in the Agreement on Subsidies and Countervailing Measures(the ASCM Agreement). Korea was taken to the WTO panel two times for the export credit programme. One is the semiconductor case in 2002 and the other was the shipbuilding disputes in 2004. And, In 2012, the U.S. Commerce Department ruled K-SURE's export insurance for Korean refrigerator manufacturers as a forbidden subsidy even if the case was not taken to the WTO. This paper examines the significance of export credit programmes on the WTO ASCM Agreement and discusses how to operate these programmes so they would not infringe upon the Agreement by analyzing the actual cases of WTO subsidy conflicts that involved Korean enterprises in relation to export credit programmes for the purpose of determining the related issues and impacts. From this research the results were as follows: First, on whether export credit is a prohibited subsidy, the deciding factor was whether a benefit has been conferred to the beneficiary. On the presence of a benefit, the WTO panel used market benchmarks as the main criteria. Thus, official export credit agencies(ECAs) should be careful not to provide export credit support which had been granted to the beneficiary at better than market terms. Second, in the case of export credit, the special status of ECA as a public body receiving government support itself does not constitute a subsidy. However, caution must be taken not to provide export credit that may lead to WTO ASCM subsidy conflicts involving a certain exporter or industry by setting up clear and valid regulations and fair work processes in the operation of export credit programmes. Third, item (j) of Annex I cannot be interpreted reversely as this item is for interpreting the presence of a prohibited subsidy, not the presence of a benefit. Thus, an export credit program that confers a financial contribution, a benefit and specificity, could qualify as a prohibited subsidy. Fourth, ECAs not only have to maintain long-term account balance but also introduce additional measures to meet this long-term balance such as a clear and systematic premium system. Finally, export credit programmes that are not defined in item (j) of Annex I of the ASCM Agreement would not deemed as an prohibited export subsidy as long as the continued support of the programmes are not being forced.

  • PDF

The Effect of Chinese MNC's Employer Brands on Employee Performance and Turnover Intention-The Mediating Effect of Organizational Commitment (중국 대기업 고용주브랜드가 종업원의 업무성과 및 이직의도에 미치는 영향 - 조직몰입의 매개효과를 중심으로)

  • Wang, Xue-Ting;Li, Yan-Nan
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.8
    • /
    • pp.211-222
    • /
    • 2020
  • In today's society, competition of talents is a critical factor of success in modern enterprises due to living in the era of knowledge economy. Also, success of a modern enterprise can be defined by the brand equity or value of the company name defined by general public (functional) and its employees (symbolic). Company brand equity is a subjectively defined by each employee. This article aims to link the relations between employee's perception of employer brand equity to employees' job performance and turnover intention. In order to empirically verify the effects of employer brand on employee's organizational commitment, performance, and turnover intention, study conducted the general employees working for MNC in the field of e-commerce, IT, and Networking business based in China. Total 235 questionnaires were used for the empirical analysis and SPSS 21.0 statistics package was used to analyze the collected data. The results can be summarized as follows: (1) Both the functional employer brand and the symbolic employer brand equity have a significantly positive impact on organizational commitment. (2) Both the functional employer brand equity and the symbolic employer brand equity have a significant positive impact on employee performance. (3) Neither the functional employer brand equity nor the symbolic employer brand equity confirmed the negative relationship between turnover intentions. (4) Organizational commitment play the intermediary role in the impact of employer brand equity on employees' work performance.

A Study on Quantitative Evaluation Method for STT Engine Accuracy based on Korean Characteristics (한국어 특성 기반의 STT 엔진 정확도를 위한 정량적 평가방법 연구)

  • Min, So-Yeon;Lee, Kwang-Hyong;Lee, Dong-Seon;Ryu, Dong-Yeop
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.7
    • /
    • pp.699-707
    • /
    • 2020
  • With the development of deep learning technology, voice processing-related technology is applied to various areas, such as STT (Speech To Text), TTS (Text To Speech), ChatBOT, and intelligent personal assistant. In particular, the STT is a voice-based, relevant service that changes human languages to text, so it can be applied to various IT related services. Recently, many places, such as general private enterprises and public institutions, are attempting to introduce the relevant technology. On the other hand, in contrast to the general IT solution that can be evaluated quantitatively, the standard and methods of evaluating the accuracy of the STT engine are ambiguous, and they do not consider the characteristics of the Korean language. Therefore, it is difficult to apply the quantitative evaluation standard. This study aims to provide a guide to an evaluation of the STT engine conversion performance based on the characteristics of the Korean language, so that engine manufacturers can perform the STT conversion based on the characteristics of the Korean language, while the market could perform a more accurate evaluation. In the experiment, a 35% more accurate evaluation could be performed compared to the existing methods.

Analysis Study on the Operation Status of the Hospital Library (병원도서관 운영실태 분석 연구)

  • Shin, Youngji;Noh, Younghee
    • Journal of the Korean Society for information Management
    • /
    • v.36 no.4
    • /
    • pp.21-52
    • /
    • 2019
  • This study focused on the domestic hospital libraries, the policies and support projects for them, and the current operation status of them. To this end, a list of hospital libraries was established and the operation status was investigated by conducting telephone interviews with 73 libraries collected. As a result, it was found that hospital libraries were established through support projects of other institutions (foundations, enterprises, etc.) rather than by the parent institutions, most of which were barely maintained except for certain actively operated ones. In terms of space, hospital libraries equipped with independent space were mostly operated on a small scale, and bookshelves were deployed in space for other purposes such as lounge and hallway. In terms of operation, a dedicated department or personnel for the library operation hardly existed, and more than half of them did not purchase additional books, simply maintaining the donated books at the time of the establishment. It was also shown that for services and programs, only booklending services are provided, except for a few libraries. Therefore, national policies and support will be needed to revitalize hospital libraries in the future, and the government needs to seek ways to continuously operate them through links with local representative libraries and public libraries.

Basic Direction for the South and North Korea's Aybitration Rules (남북중재규정 제정의 기본방향)

  • Kim Yeon-Ho
    • Journal of Arbitration Studies
    • /
    • v.15 no.1
    • /
    • pp.3-26
    • /
    • 2005
  • Since the Agreement on Commercial Arbitration was signed by the Governments of South and North Korea last year, there has been quite a few discussions on the way for implementing the Agreement in both public and private sectors. The Department of Justice of South Korea was quite active in making the draft of arbitration rules representing the South Korean views in alliance with the Department of Reunification of South Korea and recently held an informal seminar to preview their draft. On the other hand, the Korea Arbitration Association, a main body of commercial arbitration which are composed of professors and lawyers, were carefully watching the steps and the draft made by the Department of Justice. The reasons are to assure that not only shall the commercial arbitration rules comply with comment norms of international arbitration but shall it be made to meet the needs of enterprises investing in the Special Economic District of Kaesung City in North Korea. The concerns of the Korea Arbitration Association can be accomplished if the Department of Justice would modify the provisions pointed out in the seminars. Five general principles shall be brought into the attention in promulgating the commercial arbitration rules. First, it should comply with the Agreement on Commercial Arbitration signed by South and North Korea. Second, it should accept common rules contained in UNCITRAL arbitration rules. Third, it should boost the promptness of proceedings when a case was filed. Fourth, it should feature unique aspects of trade between South Korea and Korea by differentiating it from purely international trade between a country and a country. Lastly, it should combine the respective rules of both South and North Korea, currently in effect. With the above five principles accomplished, it should be noted that the Agreement on Commercial Arbitration the upper authority of arbitration rules, mandates the following features. It declared that arbitration be processed by three arbitrators. Single arbitrator is not permitted. Arbitration can be adopted even if an arbitration clause does not exist in an agreement by the parties, provided that the dispute arose out of the scope of the Agreement on investment Guarantee signed by South Korea and North Korea. It excluded quick and simplified procedures even if the amount of claim in arbitration is minimal. All the procedures should take a formal procedure. It let the double administration offices operate. One is to sit in Seoul of South Korea and the other is to sit in Pyongyang of North Korea. This would intimidate the fastness of procedures. With the above principles and the features considered, each provision in the draft by the Department of Justice should be reviewed and suggested for change.

  • PDF

A Study on Quality Evaluation Model of Mobile Device Management for BYOD (BYOD 환경의 MDM 보안솔루션의 품질평가모델에 관한 연구)

  • Rha, HyeonDae;Kang, SuKyoung;Kim, ChangJae;Lee, NamYong
    • The Journal of Korean Association of Computer Education
    • /
    • v.17 no.6
    • /
    • pp.93-102
    • /
    • 2014
  • A mobile office environment using mobile devices, such as tablet PC, mobile phone is gradually increased in enterprises, banking and public institutions etc which is no limitation on places. It occurs advanced and persist security threats that are required effective security management policy and technical solution to be secure. For BYOD (Bring Your Own Device) environment, technical security management solutions of network control based, MDM (Mobile Device Management), MAM (Mobile Application Management), MCM (Mobile Contents Management) were released, evolved and mixed used. In perspective of integrated security management solution, mobile security product should be selected to consider user experience and environment and correct quality evaluation model of product is needed which is provided standards and guidance on the selection criteria when it was introduced. In this paper, the most widely used MDM solution is selected to take a look at its features and it was reviewed the product attributes with related international standard ISO/IEC25010 software quality attributes. And then it was derived evaluation elements and calculated the related metrics based on the quality analysis model. For the verification of quality evaluation model, security checks list and testing procedures were established; it applied metrics and analyzed the testing result through scenario based case study.

  • PDF

Dual Process Linear Protection Switching Method Supporting Node Redundancy (노드 이중화를 위한 이중 프로세스 선형 보호 절체 방법)

  • Kim, Dae-Ub;Kim, Byung Chul;Lee, Jae Young
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.9
    • /
    • pp.26-37
    • /
    • 2016
  • The core technologies of the current transport network are OAM and protection switching to meet the sub-50ms protection switching time via a path redundancy when a link or node failure occurs. The transport networks owned by public network operators, central/local governments, and major enterprises are individually configured and managed with service resiliency in each own protected sub-network. When such networks are cascaded, it is also important to provide a node resiliency between two protected sub-networks. However, the linear protection switching in packet transport networks, such as MPLS-TP and Carrier Ethernet, does not define a solution of dual node interconnection. Although Ethernet ring protection switching covers the dual node interconnection scheme, a large amount of duplicated data frames may be flooded when a failure occurs on an adjacent (sub) ring. In this paper, we suggest a dual node interconnection scheme with linear protection switching technology in multiple protected sub-networks. And we investigate how various protected sub-network combinations with a proposed linear or ring protection process impact the service resiliency of multiple protected sub-networks through extensive experiments on link and interconnected node failures.

The Important Factors in Security for Introducing the Cloud Services (클라우드 서비스 도입을 위한 보안 중요도 인식에 대한 연구)

  • Yoon, Young Bae;Oh, Junseok;Lee, Bong Gyou
    • Journal of Internet Computing and Services
    • /
    • v.13 no.6
    • /
    • pp.33-40
    • /
    • 2012
  • The cloud service has become the significant factor to save the IT operation cost and to improve the productivities in companies. It was introduced to Korea for enterprise services of major companies in 2008. As the increase of recognition for its effect, more small businesses and public institutions plan to introduce the cloud computing services. The cloud computing researches have only focused on the security threats and response technologies to them. Therefore, this research analyzed the importances of responses to security threats in specific domains. The domains were divided into managerial, physical, and technical security. The specific factors in three domains were used for the analysis in this research as well. The ordered logit model was used for the analysis and the analysis results showed that physical security and managerial security are considered to be significantly important in the cloud computing security. The results also presented that the security policy, the control and surveillance to service infrastructure, and application security are highly important in the respect of specific factors. This research will contribute to enterprises or institutions in Korea, which want to introduce the cloud computing services, by aiding the establishment of effective security strategies.