• Title/Summary/Keyword: Tasks and roles

Search Result 214, Processing Time 0.028 seconds

Factors That Enable Reintermediation

  • Kwon, Sun-Ok;Lee, Hong-Kyu
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.378-381
    • /
    • 2007
  • Traditional intermediaries refer to service providers such as travel agents, real estate brokers, job agencies and insurance agents which matching services for buyers and suppliers in a traditional market. The introduction of Electronic commerce resulted in the automation of many tasks provided by intermediaries and seemed to eliminate the role of many traditional intermediaries, which is called disintermediation. However, depending on their market power, traditional intermediaries either will be disintermediated or fill new roles by providing added value and assistance, which is called reintermediation. According to the research of Alina M. Chircu et al. there are three conditions for reintermediation for traditional intermediaries. Three conditions are weak appropriability of EC innovations, ownership of co-specialized assets for both market intermediation and EC innovations and economies of scale. Besides these three reintermediation conditions, we hypothesize that leveraging BPO can be a suitable strategy for traditional intermediaries to be transformed into reintermediaries. Business Process Outsourcing (BPO) is the leveraging of technology or specialist process vendors to provide and manage an organization's critical and/or non-critical enterprise processes and applications. This paper will investigate the relationship between above reintermediation conditions including BPO and reintermediation.

  • PDF

Application and Functional Requirements of Simulator in Harbor and Waterway Design (항만 및 항로 설계에 있어서 시뮬레이터의 응용과 필요성)

  • Shi, Chaojian
    • Journal of Navigation and Port Research
    • /
    • v.26 no.1
    • /
    • pp.35-42
    • /
    • 2002
  • The roles and importance of the application of simulator in harbor and waterway design are emphasized. On this paper Different methods of simulation and their application are described. A large-scale simulation concept, group simulation, is proposed. Requirements of the simulation for accomplishing the tasks properly and effectively are suggested. Some points on modeling of ship hydrodynamics and environmental factors. which are critical especially in waterway desing simulation, are discussed and algorisms presented.

Legal System and Regulation Analysis by S/W Development Security (S/W 개발 분석 단계에서 접근 통제)

  • Shin, Seong-Yoon;Jin, Dong-Soo;Shin, Kwong-Seong;Lee, Hyun-Chang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.215-216
    • /
    • 2014
  • This paper emphasizes the control of access and authorization based on the roles and the data using activities of users as task performers. Also, it requires to gain the necessary approval in advance for important tasks such as mass inquiry and change on important information to influence the very existence of the whole organization.

  • PDF

Process Model for development of EVMS in Nuclear Power Plant Project (원전건설 성과관리시스템(EVMS) 개발을 위한 프로세스 모델 연구)

  • Kim, Yun-Myung;Won, Seo-Kyung;Shin, Il-Sub
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2014.05a
    • /
    • pp.58-59
    • /
    • 2014
  • EVM(Earned Value Management) is a management methodology for integrating scope, schedule and resources, and for objectively measuring project performance and progress. EVMS(Earned Value Management System) has been used for the performance measurement of R&D and construction projects in developed countries such as United States, United Kingdom and Australia. The nuclear power plant (NPP) projects in Korea have not applied EVMS. However, EVMS has come into request for overall schedule and cost risk management and performance measurement in overseas project of the nuclear power plant as a contractor. In this paper, based on the global EVMS guidelines, EVMS per unit processes have been developed for NPP projects. Moreover, using Business Process Management (BPM), it proposes an integrated process model with tasks, roles, and procedures for EVMS for NPP construction projects.

  • PDF

Science Gifted Learning Program: Research & Education Model

  • Shim, Kew-Cheol;Kim, Yeo-Sang
    • Journal of The Korean Association For Science Education
    • /
    • v.25 no.6
    • /
    • pp.635-641
    • /
    • 2005
  • This paper suggests a research & education (R&E) model for the gifted in science education. The model has been developed under three assumptions. The first is that using the sequences of a gifted educational program designed to facilitate the process will assist in gifted students' construction of scientific knowledge and comprehension of laboratory practice through concrete experimental experience. The second is that gifted students will be able to apply this learning to further study using and extending scientific knowledge and experience. The third is that challenging tasks and feedback at the requisite stage of development will improve instructional effectiveness. The R&E Model has five phases: engaging, exploring, planning, performing and elaborating; furthermore, it suggests roles for the mentee and mentor. The R&E model has two functions for gifted education. The first is providing guidance for gifted curriculum developers as they design a mentor program, and the second is helping a mentor improve instructional effectiveness through use of strategies. This model has potentials to educate the gifted students in the Science Education Institute for the Gifted.

Social Construction of Mathematics Understanding among Student Peers in Small Group Settings

  • Cho, Cheong-Soo
    • Research in Mathematical Education
    • /
    • v.3 no.2
    • /
    • pp.89-98
    • /
    • 1999
  • The purpose of this review of literature is to investigate what kinds of research have been done on social construction of mathematics understanding among elementary students in small groups. Only empirical studies were reviewed, and then grouping was done in terms of the purpose of the study. This grouping identified three categories: 1) Social and mathematical norms in mathematics classroom, 2) Teaching productive communication behaviors for active learning in small group, and 3) Participation roles and communication behaviors in different group structure. To enhance social construction of mathematics understanding in small group settings two suggestions are made: the importance of the selection of collaborative tasks or problems and teachers' beliefs about mathematics and the teaching an learning of mathematics.

  • PDF

Enhanced Role-Based Access Control Administration Tool

  • Yenmunkong, Burin;Sathitwiriyawong, Chanboon
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.1360-1364
    • /
    • 2004
  • This paper propose an extended model for role-permission assignment based on locations called "Enhanced Role-Based Access Control (ERBAC03)". The proposed model is built upon the well-known RBAC model. Assigning permissions to role is considered too complex activity to accomplish directly. Instead we advocate breaking down this process into a number of steps. The concept of jobs and tasks is specifically introduced to facilitate role-permission assignment into a series of smaller steps. This model is suitable for any large organization that has many branches. Each branch consists of many users who work in difference roles. An administration tool has been developed to assist administrators with the administration of separation of duty requirements. It demonstrates how the specification of static requirements can be done based on "conflicting entities" paradigm. Static separation of duty requirements must be enforced in the administration environment. Finally, we illustrate how the ERBAC03 prototype is used to administer the separation of duty requirements.

  • PDF

Standing Issues and Policy Tasks of the Korean Dental Community; The improvement of the dental specialist program (치료의료계의 현안과 정책과제; 의료전달체계 확립과 전문의 진료 영역 명확화를 위한 의료법 개정 추진 방향)

  • Lee, Soo-Ku
    • The Journal of the Korean dental association
    • /
    • v.48 no.2
    • /
    • pp.91-94
    • /
    • 2010
  • Regarding the improvement of the dental specialist program, two related issues were reviewed extensively: (a) bill amending portions of the Medical Service Act as proposed by national assemblywomen Choi Yeong-hui (Democratic Party) and Chung Mi-gyeong (Grand National Party), and; (b) Plans to supplement the submitted bill. Although the existing bill's prospects in the assembly are unclear at this point, both the existing and planned supplementary bills zero in on two points: (a) specialists must focus on providing care only in their respective expertise, and; (b) a distinction between the roles played by the primary, secondary, and tertiary medical institutions must be made to help establish clearly the country's overall health care system. In addition, proposals were made for medical license renewal among specialists so that professionals can offer better health care to customers.

Advanced insider threat detection model to apply periodic work atmosphere

  • Oh, Junhyoung;Kim, Tae Ho;Lee, Kyung Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1722-1737
    • /
    • 2019
  • We developed an insider threat detection model to be used by organizations that repeat tasks at regular intervals. The model identifies the best combination of different feature selection algorithms, unsupervised learning algorithms, and standard scores. We derive a model specifically optimized for the organization by evaluating each combination in terms of accuracy, AUC (Area Under the Curve), and TPR (True Positive Rate). In order to validate this model, a four-year log was applied to the system handling sensitive information from public institutions. In the research target system, the user log was analyzed monthly based on the fact that the business process is processed at a cycle of one year, and the roles are determined for each person in charge. In order to classify the behavior of a user as abnormal, the standard scores of each organization were calculated and classified as abnormal when they exceeded certain thresholds. Using this method, we proposed an optimized model for the organization and verified it.

A Survey on Face-based Cryptographic Key Generation

  • Dang, Thao;Choi, Deokjai
    • Smart Media Journal
    • /
    • v.9 no.2
    • /
    • pp.39-50
    • /
    • 2020
  • Derivation cryptographic keys from human biometrics opens a new promising research area when it can be used efficiently for not only verification or recognition tasks, but also symmetric-key based applications. Among existing biometric traits, face is considered as the most popular biometrics since facial features are informative and discriminative. In this paper, we present a comprehensive survey of Face-based key generation (FKGS). First, we summarize the trend of FKGS researches and sum up the methods which play important roles in the proposed key generation systems. Then we present the evaluation and the general performance analysis; from that, we give a discussion about the advantages and disadvantages of surveyed studies to clarify the fundamental requirements and the main challenges when implementing FKGS in practice. Finally, an outlook on future prospects is given.