• Title/Summary/Keyword: Research Data Sharing

Search Result 1,145, Processing Time 0.036 seconds

The Adoption and Diffusion of Semantic Web Technology Innovation: Qualitative Research Approach (시맨틱 웹 기술혁신의 채택과 확산: 질적연구접근법)

  • Joo, Jae-Hun
    • Asia pacific journal of information systems
    • /
    • v.19 no.1
    • /
    • pp.33-62
    • /
    • 2009
  • Internet computing is a disruptive IT innovation. Semantic Web can be considered as an IT innovation because the Semantic Web technology possesses the potential to reduce information overload and enable semantic integration, using capabilities such as semantics and machine-processability. How should organizations adopt the Semantic Web? What factors affect the adoption and diffusion of Semantic Web innovation? Most studies on adoption and diffusion of innovation use empirical analysis as a quantitative research methodology in the post-implementation stage. There is criticism that the positivist requiring theoretical rigor can sacrifice relevance to practice. Rapid advances in technology require studies relevant to practice. In particular, it is realistically impossible to conduct quantitative approach for factors affecting adoption of the Semantic Web because the Semantic Web is in its infancy. However, in an early stage of introduction of the Semantic Web, it is necessary to give a model and some guidelines and for adoption and diffusion of the technology innovation to practitioners and researchers. Thus, the purpose of this study is to present a model of adoption and diffusion of the Semantic Web and to offer propositions as guidelines for successful adoption through a qualitative research method including multiple case studies and in-depth interviews. The researcher conducted interviews with 15 people based on face-to face and 2 interviews by telephone and e-mail to collect data to saturate the categories. Nine interviews including 2 telephone interviews were from nine user organizations adopting the technology innovation and the others were from three supply organizations. Semi-structured interviews were used to collect data. The interviews were recorded on digital voice recorder memory and subsequently transcribed verbatim. 196 pages of transcripts were obtained from about 12 hours interviews. Triangulation of evidence was achieved by examining each organization website and various documents, such as brochures and white papers. The researcher read the transcripts several times and underlined core words, phrases, or sentences. Then, data analysis used the procedure of open coding, in which the researcher forms initial categories of information about the phenomenon being studied by segmenting information. QSR NVivo version 8.0 was used to categorize sentences including similar concepts. 47 categories derived from interview data were grouped into 21 categories from which six factors were named. Five factors affecting adoption of the Semantic Web were identified. The first factor is demand pull including requirements for improving search and integration services of the existing systems and for creating new services. Second, environmental conduciveness, reference models, uncertainty, technology maturity, potential business value, government sponsorship programs, promising prospects for technology demand, complexity and trialability affect the adoption of the Semantic Web from the perspective of technology push. Third, absorptive capacity is an important role of the adoption. Fourth, suppler's competence includes communication with and training for users, and absorptive capacity of supply organization. Fifth, over-expectance which results in the gap between user's expectation level and perceived benefits has a negative impact on the adoption of the Semantic Web. Finally, the factor including critical mass of ontology, budget. visible effects is identified as a determinant affecting routinization and infusion. The researcher suggested a model of adoption and diffusion of the Semantic Web, representing relationships between six factors and adoption/diffusion as dependent variables. Six propositions are derived from the adoption/diffusion model to offer some guidelines to practitioners and a research model to further studies. Proposition 1 : Demand pull has an influence on the adoption of the Semantic Web. Proposition 1-1 : The stronger the degree of requirements for improving existing services, the more successfully the Semantic Web is adopted. Proposition 1-2 : The stronger the degree of requirements for new services, the more successfully the Semantic Web is adopted. Proposition 2 : Technology push has an influence on the adoption of the Semantic Web. Proposition 2-1 : From the perceptive of user organizations, the technology push forces such as environmental conduciveness, reference models, potential business value, and government sponsorship programs have a positive impact on the adoption of the Semantic Web while uncertainty and lower technology maturity have a negative impact on its adoption. Proposition 2-2 : From the perceptive of suppliers, the technology push forces such as environmental conduciveness, reference models, potential business value, government sponsorship programs, and promising prospects for technology demand have a positive impact on the adoption of the Semantic Web while uncertainty, lower technology maturity, complexity and lower trialability have a negative impact on its adoption. Proposition 3 : The absorptive capacities such as organizational formal support systems, officer's or manager's competency analyzing technology characteristics, their passion or willingness, and top management support are positively associated with successful adoption of the Semantic Web innovation from the perceptive of user organizations. Proposition 4 : Supplier's competence has a positive impact on the absorptive capacities of user organizations and technology push forces. Proposition 5 : The greater the gap of expectation between users and suppliers, the later the Semantic Web is adopted. Proposition 6 : The post-adoption activities such as budget allocation, reaching critical mass, and sharing ontology to offer sustainable services are positively associated with successful routinization and infusion of the Semantic Web innovation from the perceptive of user organizations.

A architecture and control method of Streaming Packet Scheduler at 100bps for Guaranteed QoS of Internet and Broadcasting Services (인터넷 및 방송서비스의 QoS 보장을 위한 10Gbps급 스트리밍 패킷 스케줄러 구조 및 제어방법)

  • Kim Kwang-Ok;Park Wan-Ki;Choi Byeoun-Chul;Kwak Dong-Yong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.1
    • /
    • pp.23-34
    • /
    • 2004
  • This paper presents architecture and control method of packet scheduler to guarantee QoS of high quality streaming services in high-speed packet-switched networks. Since streaming services need far more stringent QoS requirements than the typical sort of burst data applications, they should be guaranteed minimum bandwidth and end-to-end delay bound to each flow, regardless of the behavior of other flows. To meet these requirements, a packet scheduler isolate a flow from the undesirable effects of other flows and provides end-to-end delay guarantees for individual flow and divides stringently the available link bandwidth among flows sharing the link. Until now, many vendors are developing traffic management chips running at 10Gbps, but most of chips have drawbacks to support high quality streaming services. In this paper, we investigate the drawbacks of commercial TM chips and traffic characteristic of streaming services and present implementation frameworks of the proposed packet scheduler. Finally, we analyze the simulation results of the proposed scheduler.

An Analysis Study on the Current Status and Integration Methods of the Domestic Early Warning System (국내 재난 예경보 시스템 현황 및 통합 방안에 대한 분석 연구)

  • Hwang, Woosuk;Pyo, Kyungsoo
    • Journal of Broadcast Engineering
    • /
    • v.27 no.1
    • /
    • pp.80-90
    • /
    • 2022
  • Currently, the domestic early warning system is issued differently for each disaster, and is operated independently by relevant organizations from central government to local governments. Representative domestic disaster warning systems include disaster broadcasting using CBS(Cell Broadcasting Service) and DMB(Digital Multimedia Broadcasting) Automatic Emergency Alert Service, DITS(Disaster Information Transform System) transmitted and displayed on TV screens, automatic response system, automated rainfall warning system, and disaster message board. However, due to the difference in the method of issuing each emergency alert at the site of an emergency disaster, the alerts are issued at different times for each media, and the delivered content is also not integrated. If these systems are integrated, it is expected that damage to people's property and lives will be minimized by sharing and integrated management of disaster information such as voice, video, and data to comprehensively judge and make decisions about disaster situations. Therefore, in this study, we present a plan for the integration of the disaster warning system along with the analysis of the operation status of the domestic early warning system.

Contactless Data Society and Reterritorialization of the Archive (비접촉 데이터 사회와 아카이브 재영토화)

  • Jo, Min-ji
    • The Korean Journal of Archival Studies
    • /
    • no.79
    • /
    • pp.5-32
    • /
    • 2024
  • The Korean government ranked 3rd among 193 UN member countries in the UN's 2022 e-Government Development Index. Korea, which has consistently been evaluated as a top country, can clearly be said to be a leading country in the world of e-government. The lubricant of e-government is data. Data itself is neither information nor a record, but it is a source of information and records and a resource of knowledge. Since administrative actions through electronic systems have become widespread, the production and technology of data-based records have naturally expanded and evolved. Technology may seem value-neutral, but in fact, technology itself reflects a specific worldview. The digital order of new technologies, armed with hyper-connectivity and super-intelligence, not only has a profound influence on traditional power structures, but also has an a similar influence on existing information and knowledge transmission media. Moreover, new technologies and media, including data-based generative artificial intelligence, are by far the hot topic. It can be seen that the all-round growth and spread of digital technology has led to the augmentation of human capabilities and the outsourcing of thinking. This also involves a variety of problems, ranging from deep fakes and other fake images, auto profiling, AI lies hallucination that creates them as if they were real, and copyright infringement of machine learning data. Moreover, radical connectivity capabilities enable the instantaneous sharing of vast amounts of data and rely on the technological unconscious to generate actions without awareness. Another irony of the digital world and online network, which is based on immaterial distribution and logical existence, is that access and contact can only be made through physical tools. Digital information is a logical object, but digital resources cannot be read or utilized without some type of device to relay it. In that respect, machines in today's technological society have gone beyond the level of simple assistance, and there are points at which it is difficult to say that the entry of machines into human society is a natural change pattern due to advanced technological development. This is because perspectives on machines will change over time. Important is the social and cultural implications of changes in the way records are produced as a result of communication and actions through machines. Even in the archive field, what problems will a data-based archive society face due to technological changes toward a hyper-intelligence and hyper-connected society, and who will prove the continuous activity of records and data and what will be the main drivers of media change? It is time to research whether this will happen. This study began with the need to recognize that archives are not only records that are the result of actions, but also data as strategic assets. Through this, author considered how to expand traditional boundaries and achieves reterritorialization in a data-driven society.

The Role of Social Capital and Identity in Knowledge Contribution in Virtual Communities: An Empirical Investigation (가상 커뮤니티에서 사회적 자본과 정체성이 지식기여에 미치는 역할: 실증적 분석)

  • Shin, Ho Kyoung;Kim, Kyung Kyu;Lee, Un-Kon
    • Asia pacific journal of information systems
    • /
    • v.22 no.3
    • /
    • pp.53-74
    • /
    • 2012
  • A challenge in fostering virtual communities is the continuous supply of knowledge, namely members' willingness to contribute knowledge to their communities. Previous research argues that giving away knowledge eventually causes the possessors of that knowledge to lose their unique value to others, benefiting all except the contributor. Furthermore, communication within virtual communities involves a large number of participants with different social backgrounds and perspectives. The establishment of mutual understanding to comprehend conversations and foster knowledge contribution in virtual communities is inevitably more difficult than face-to-face communication in a small group. In spite of these arguments, evidence suggests that individuals in virtual communities do engage in social behaviors such as knowledge contribution. It is important to understand why individuals provide their valuable knowledge to other community members without a guarantee of returns. In virtual communities, knowledge is inherently rooted in individual members' experiences and expertise. This personal nature of knowledge requires social interactions between virtual community members for knowledge transfer. This study employs the social capital theory in order to account for interpersonal relationship factors and identity theory for individual and group factors that may affect knowledge contribution. First, social capital is the relationship capital which is embedded within the relationships among the participants in a network and available for use when it is needed. Social capital is a productive resource, facilitating individuals' actions for attainment. Nahapiet and Ghoshal (1997) identify three dimensions of social capital and explain theoretically how these dimensions affect the exchange of knowledge. Thus, social capital would be relevant to knowledge contribution in virtual communities. Second, existing research has addressed the importance of identity in facilitating knowledge contribution in a virtual context. Identity in virtual communities has been described as playing a vital role in the establishment of personal reputations and in the recognition of others. For instance, reputation systems that rate participants in terms of the quality of their contributions provide a readily available inventory of experts to knowledge seekers. Despite the growing interest in identities, however, there is little empirical research about how identities in the communities influence knowledge contribution. Therefore, the goal of this study is to better understand knowledge contribution by examining the roles of social capital and identity in virtual communities. Based on a theoretical framework of social capital and identity theory, we develop and test a theoretical model and evaluate our hypotheses. Specifically, we propose three variables such as cohesiveness, reciprocity, and commitment, referring to the social capital theory, as antecedents of knowledge contribution in virtual communities. We further posit that members with a strong identity (self-presentation and group identification) contribute more knowledge to virtual communities. We conducted a field study in order to validate our research model. We collected data from 192 members of virtual communities and used the PLS method to analyse the data. The tests of the measurement model confirm that our data set has appropriate discriminant and convergent validity. The results of testing the structural model show that cohesion, reciprocity, and self-presentation significantly influence knowledge contribution, while commitment and group identification do not significantly influence knowledge contribution. Our findings on cohesion and reciprocity are consistent with the previous literature. Contrary to our expectations, commitment did not significantly affect knowledge contribution in virtual communities. This result may be due to the fact that knowledge contribution was voluntary in the virtual communities in our sample. Another plausible explanation for this result may be the self-selection bias for the survey respondents, who are more likely to contribute their knowledge to virtual communities. The relationship between self-presentation and knowledge contribution was found to be significant in virtual communities, supporting the results of prior literature. Group identification did not significantly affect knowledge contribution in this study, inconsistent with the wealth of research that identifies group identification as an important factor for knowledge sharing. This conflicting result calls for future research that examines the role of group identification in knowledge contribution in virtual communities. This study makes a contribution to theory development in the area of knowledge management in general and virtual communities in particular. For practice, the results of this study identify the circumstances under which individual factors would be effective for motivating knowledge contribution to virtual communities.

  • PDF

Comparative Analysis of ViSCa Platform-based Mobile Payment Service with other Cases (스마트카드 가상화(ViSCa) 플랫폼 기반 모바일 결제 서비스 제안 및 타 사례와의 비교분석)

  • Lee, June-Yeop;Lee, Kyoung-Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.2
    • /
    • pp.163-178
    • /
    • 2014
  • Following research proposes "Virtualization of Smart Cards (ViSCa)" which is a security system that aims to provide a multi-device platform for the deployment of services that require a strong security protocol, both for the access & authentication and execution of its applications and focuses on analyzing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service by comparing with other similar cases. At the present day, the appearance of new ICT, the diffusion of new user devices (such as smartphones, tablet PC, and so on) and the growth of internet penetration rate are creating many world-shaking services yet in the most of these applications' private information has to be shared, which means that security breaches and illegal access to that information are real threats that have to be solved. Also mobile payment service is, one of the innovative services, has same issues which are real threats for users because mobile payment service sometimes requires user identification, an authentication procedure and confidential data sharing. Thus, an extra layer of security is needed in their communication and execution protocols. The Virtualization of Smart Cards (ViSCa), concept is a holistic approach and centralized management for a security system that pursues to provide a ubiquitous multi-device platform for the arrangement of mobile payment services that demand a powerful security protocol, both for the access & authentication and execution of its applications. In this sense, Virtualization of Smart Cards (ViSCa) offers full interoperability and full access from any user device without any loss of security. The concept prevents possible attacks by third parties, guaranteeing the confidentiality of personal data, bank accounts or private financial information. The Virtualization of Smart Cards (ViSCa) concept is split in two different phases: the execution of the user authentication protocol on the user device and the cloud architecture that executes the secure application. Thus, the secure service access is guaranteed at anytime, anywhere and through any device supporting previously required security mechanisms. The security level is improved by using virtualization technology in the cloud. This virtualization technology is used terminal virtualization to virtualize smart card hardware and thrive to manage virtualized smart cards as a whole, through mobile cloud technology in Virtualization of Smart Cards (ViSCa) platform-based mobile payment service. This entire process is referred to as Smart Card as a Service (SCaaS). Virtualization of Smart Cards (ViSCa) platform-based mobile payment service virtualizes smart card, which is used as payment mean, and loads it in to the mobile cloud. Authentication takes place through application and helps log on to mobile cloud and chooses one of virtualized smart card as a payment method. To decide the scope of the research, which is comparing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service with other similar cases, we categorized the prior researches' mobile payment service groups into distinct feature and service type. Both groups store credit card's data in the mobile device and settle the payment process at the offline market. By the location where the electronic financial transaction information (data) is stored, the groups can be categorized into two main service types. First is "App Method" which loads the data in the server connected to the application. Second "Mobile Card Method" stores its data in the Integrated Circuit (IC) chip, which holds financial transaction data, which is inbuilt in the mobile device secure element (SE). Through prior researches on accept factors of mobile payment service and its market environment, we came up with six key factors of comparative analysis which are economic, generality, security, convenience(ease of use), applicability and efficiency. Within the chosen group, we compared and analyzed the selected cases and Virtualization of Smart Cards (ViSCa) platform-based mobile payment service.

The Effects of Near Miss and Accident Prevention Activities and the Culture of Patient Safety Management for the Patient Safety (Near Miss 사고 예방 활동과 환자안전관리 문화형성이 환자안전에 미치는 영향)

  • Chang, Ho-Suk;Lee, Gui-Won
    • The Korean Journal of Nuclear Medicine Technology
    • /
    • v.14 no.2
    • /
    • pp.138-144
    • /
    • 2010
  • Purpose: Despite the rapidly changing healthcare environment, healthcare organizations have recognized the importance of patient safety management. But patient safety management has the problem of the lack of participation of members due to the process of focusing on the follow-up service and punishment. The department of nuclear medicine in Uijeongbu St. Mary's Hospital started this research to reduce the near miss and prevent patient safety accidents by both initiating the participatory near-miss-proof activities as an advance management and constructing a system without disadvantages of reporting. In addition, this research aims to establish a differentiated patient safety management system in the department of nuclear medicine. Materials and Methods: 1. Colleting cases of team members' past and present near miss and accidents(First data collection). 2. Quantifying the cases of near miss and accidents after identifying the degree of importance and urgency through surveys(Second data collection). 3. Quantifying cases and indentifying important points of contact through data analysis. 4. Making and standardizing a manual for important points of contact, and initiating participatory activities to prevent errors. 5. Activating web-based community for establishing the report system of near miss. 6. Estimating the result of before and after activities through surveys and focus group interviews. Results: 1) Quantified safety accidents and near miss in the department of nuclear medicine. About 50 near misses a month and one safety accident a year. 2) Establishing improvement measurements based on quantified data. About 11 participatory activities, the improvement of process, a manual for standardization. 3) Creating a system of safety culture and high participation rate of team members. Constructing a report system, making a check list and a slogan for safety culture, and establishing assessment index. 4) Activating communities for sharing the information of cases of near misses and accidents. 5) As the result of activities, the rate of near miss occurrence declined by 50% and the safety accident did not happen. Conclusion: The best service in the department of nuclear medicine is to provide patients with safety-guaranteed high-quality examination and cure. This research started from the question, 'what is the most faithful-to-the-basics way to provide the best service for patients?' and team members' common answer for this question was building a system with participation of all members. Building a system through the participatory improvement activities for preventing near miss and creating safety culture resulted in the 50% decline of near miss occurrence and no accident. This is a meaningful result from the perspective of advance management for patient safety. Moreover, this research paved the way for creating a culture to report and admit near miss or accidents by establishing a report system with no disadvantage of reporting. The system which sticks to the basics is the best service for patients and will form a patient safety culture system, which will lead to the customer satisfaction. Therefore, all members of the department of nuclear medicine will develop a differentiated patient safety culture with stabilizing the established system.

  • PDF

Establishing a marketing strategy model for academic-industrial cooperation between companies and universities (기업과 대학간의 산학협력마케팅 전략모델 구축에 관한 연구)

  • Yun, Jeong-Keun
    • Journal of Distribution Science
    • /
    • v.12 no.4
    • /
    • pp.65-72
    • /
    • 2014
  • Purpose - Because of the emphasis on the necessity of academic-industrial cooperation between companies and universities, there are various ongoing academic-industrial cooperation programs led by the government. As government actively supports such cooperation as policy,and universities vitalize new technology development, academic-industrial cooperation between companies and universities is being recognized as an important growth engine for companies the competitiveness of academic-industrial cooperation is also attracting more interest. The government has vitalized human resource fostering, practical R&D, and technology transfer to companies since 2012 by executing a "leading university fostering project for academic-industrial cooperation." Based on an organic interlink among universities, industry, and research institutes, the government also created and is promoting several models of such cooperation between companies and universities to support shared growth of industry and local universities. The purpose of academic-industrial cooperation is growth and benefit fromtechnology development, technical cooperation, and technology transfer between companies and universities. Research design, data, and methodology - As more academic-industrial cooperation efforts are ledby companies due to the limitation in technology-focused commercialization cooperation, the academic-industrial cooperation system became fragmented and it is losing the potential for future advancement. Specifically, as differences between universities grow, academic-industrial cooperation between companies and universities based on new technology from universities is finding difficulty advancing,while systematic support from companies to enhance the performance of businesses created by academic-industrial cooperation is also insufficient. Accordingly, this study established a growth model for the advancement of academic-industrial cooperation between companies and universities and suggested a plan to strengthen the competitiveness and promote the future advancementof academic-industrial cooperation between companies and universities by analyzing the current situation of such cooperation and diagnosing its issues. Results - This study explored the concept and current status of academic-industrial cooperation relationships and analyzed related issues. For such cooperative organizations to be competitive, the employment environment of professional human resources for academic-industrial cooperation should be improved and measures to secure professional resources should be taken as early as possible. Though the academic-industrial cooperation now is being led by government, there is a limitation based on business models, which require creation of profit; however, an academic-industrial cooperation model still cannot stand alone without the support of government. This study also pointed out that a having only a plan to build competitiveness of companies and universities for academic-industrial cooperation is not sufficient. Conclusions - In order to increase the competitiveness of academic-industrial cooperation, a detailed growth-sharing model for academic-industrial cooperation should be developed, and there should be more joint development processes for the advancement of such cooperation in which the need for technology development can be verified in advance. In addition, beyond focusing on technology-focused academic-industrial cooperation, a network between companies and universities searching for ideas for academic-industrial cooperation in the fields of human and social aspects should be created. A new academic-industrial model linking current cooperation between companies and universities to the local area should be built based on such academic-industrial cooperation in human and social fields.

A Study on the Development and Measurement of Logistics Partners Cooperation Index(LPCI): Focused on the Joint Logistics (물류협력지수의 개발 및 측정에 관한 연구: 공동물류사업을 중심으로)

  • Suh, Sang-Sok;Song, Gwang-Suk;Park, Jong-Woo
    • Journal of Distribution Science
    • /
    • v.14 no.6
    • /
    • pp.107-118
    • /
    • 2016
  • Purpose - Over 90% of Domestic logistics industry is small enterprise and they are experiencing growth stagnation due to price-based competition structure rather than constructing logistics service of high added value. In order to get over this situation and pursue the development of logistics industry, strengthening its competitiveness, through inter-enterprise cooperative network build-up, would be a key alternative. Therefore, in this study, an index for measuring inter-enterprise cooperation level of Joint logistics business will be developed as a typical collaborative business model in logistics industry. Moreover, a strengthening competitiveness method suggests a developmental step and a key management index to mature in logistics industry. Research Design, Data, Methodology - This study is an index development research for measuring inter-enterprise cooperation level of logistics industry. Such a level was measured by performing a survey by targeting enterprises that participated in Joint logistics business. The targeting enterprises are typical cooperative models in logistics industry. Measurement items were developed which were based on the presented items in existing research. Question items were composed of selection type questions as answering Yes/No. They measures implementation status of corporate activity and detailed activity items measuring qualitative level. Total samples were based on 116 enterprise samples including 90 logistics enterprises and 26 shippers. In addition, by evaluating the importance for Joint logistics business recognition with personnel working level, the weight of measuring variable was extracted. This study has built an assessment tools (LPCI) on Joint logistics business cooperation level in a situation where there are no previous studies on joint logistics business, this study is meaningful for other studies. Results - As a result of analyzing LPCI presented in this study, the score of logistics enterprise was represented as 59.9 points based on full score of 100 points and that of shippers as 47.2 points and cooperation level among enterprises participated in Joint logistics business was revealed to be very low. In particular, as a result of measuring the importance between logistics enterprise and shippers, the difference by each measurement standard was represented among those enterprises. This difference is considered to be a key factor that cooperative operational conformity between logistics enterprises and shippers is represented to be low. Conclusions - As most joint logistics business, being promoted at present, is sharing facility and information with joint logistics business, it is hard to find such a joint logistics business in reality based on cooperative business model in main cooperation agents. Therefore, competitiveness of logistics industry could be strengthened by promoting joint logistics business based on their mutual cooperation among enterprises. In other words, it is to secure sustainable competitiveness of joint logistics business together with creation of new market by inter-enterprise cooperation based on integration of basic logistics business.

The Use of Analogy in Teaching and Learning Geography (효과적인 지리 교수.학습을 위한 유추의 이해와 활용)

  • Lee, Jong-Won;Harm, Kyung-Rim
    • Journal of the Korean Geographical Society
    • /
    • v.46 no.4
    • /
    • pp.534-553
    • /
    • 2011
  • Analogical thinking is a problem-solving strategy to use a familiar problem (or base analog) to solve a novel problem of the same type (the target problem). The purpose of this study is to provide new insight into geography teaching and learning by connecting cognitive science research on analogical thinking with issues of geography education and suggest that teaching with analogies can be a productive instructional strategy for geography. In this study, using the various examples of analogical thinking used in geography we defined analogical thinking, addressed the theoretical models on analogical transfer, and discussed conditions that make an effective analogical transfer. The major research findings include the following: a) the spatial analogy, indicating skills to find places that may be far apart but have similar locations, and therefore have other similar conditions and/or connections, can provide a useful way to design contents for place learning; b) representational transfer, specifying a common representation for two problems, can play a key role in solving geographic problems requiring data visualization and spatialization processes; and c) either asking learners to compare/analyze similar examples sharing common structure or providing them examples bridging the gap between concrete, real-life phenomena and the ideas and models can contribute to learning in geographic concepts and skills. The spatial analogy requiring both geographic content knowledge and visual/spatial thinking has the potential to become a content-specific problem-solving strategy. We ended with recommendations for future research on analogy that is important in geography education.