• Title/Summary/Keyword: Work Centrality

Search Result 52, Processing Time 0.025 seconds

The Effect of Synchronous CMC Technology by Task Network: A Perspective of Media Synchronicity Theory (개인의 업무 네트워크 특성에 따른 동시적 CMC의 영향 : 매체 동시성 이론 관점)

  • Kim, Min-Soo;Park, Chul-Woo;Yang, Hee-Dong
    • Asia pacific journal of information systems
    • /
    • v.18 no.3
    • /
    • pp.21-43
    • /
    • 2008
  • The task network which is formed of different individuals can be recognized as a social network. Therefore, the way to communicate with people inside or outside the network has considerable influence on their outcome. Moreover, the position on which a member stands in a network shows the different effects of the information systems supporting communication with others. In this paper, it is to be studied how personal CMC (computer-mediated communication) tools affect the mission that those who work for a network perform through diverse task networks. Especially, we focused on synchronicity of CMC. On this score, the perspective of Media Synchronicity Theory was taken that had been suggested by criticizing Media Richness Theory. It is the objective, from this perspective, to find which characteristics of networks make the value of IT supporting synchronicity high. In the research trends of social networks, there have been two traditional perspectives to explain the effect of network: embeddedness and diversity ones. These differ from the aspect which type of social network can provide much more economic benefits. As similar studies have been reported by various researchers, these are also divided into the bonding and bridging views which are based on internal and external tie, respectively, Size, density, and centrality were measured as the characteristics of personal task networks. Size means the level of relationship between members. It is the total number of other colleagues who work with a specific member for a certain project. It means, the larger the size of task network, the more the number of coworkers who interact each other through the job. Density is the ratio of the number of relationships arranged actually to the total number of available ones. In an ego-centered network, it is defined as the ratio of the number of relationship made really to the total number of possible ones between members who are actually involved each other. The higher the level of density, the larger the number of projects on which the members collaborate. Centrality means that his/her position is on the exact center of whole network. There are several methods to measure it. In this research, betweenness centrality was adopted among them. It is measured by the position on which one member stands between others in a network. The determinant to raise its level is the shortest geodesic that represents the shortest distance between members. Centrality also indicates the level of role as a broker among others. To verify the hypotheses, we interviewed and surveyed a group of employees of a nationwide financial organization in which a groupware system is used. They were questioned about two CMC applications: MSN with a higher level of synchronicity and email with a lower one. As a result, the larger the size of his/her own task network, the smaller its density and the higher the level of his/her centrality, the higher the level of the effect using the task network with CMC tools. Above all, this positive effect is verified to be much more produced while using CMC applications with higher-level synchronicity. Among the a variety of situations under which the use of CMC gives more benefits, this research is considered as one of rare cases regarding the characteristics of task network as moderators by focusing ITs for the operation of his/her own task network. It is another contribution of this research to prove empirically that the values of information system depend on the social, or comparative, characteristic of time. Though the same amount of time is shared, the social characteristics of users change its value. In addition, it is significant to examine empirically that the ITs with higher-level synchronicity have the positive effect on productivity. Many businesses are worried about the negative effect of synchronous ITs, for their employees are likely to use them for personal social activities. However. this research can help to dismiss the concern against CMC tools.

A Study on the Inter-organizational Network of the School Social Work for the Children in Low-income Families (학교사회복지 관련 조직간 네트워크의 특성에 관한 연구 I : 서울시 강서구 교육복지투자우선지역 지원사업을 중심으로)

  • Lee, Hye-Won;Woo, Soo-Myoung
    • Korean Journal of Social Welfare
    • /
    • v.57 no.4
    • /
    • pp.119-146
    • /
    • 2005
  • The purpose of this study is to find out the structural and developmental characteristics of inter-organizational community network of the school social work and the characteristics of direct workers and the school social work organizations delivering services to the children in low-income families, and to identify the magnitude of efficient structure for networking for the children living in Kayang-dong. By searching out the central organization and block modeling, this study attempted to show the characteristics of inter-organizational community network for the children. The research sample was 18 organizations, and the data were collected by a survey questionnaire and analyzed by SPSSWIN 12.0 and UCINET 6.29. The main results show that the social welfare organization is the central organization in almost every dimensions(information exchange, client referral, cooperation, resource exchange) and education organizations play an important role in betweenness centrality. Also it can be evaluated that the present developmental stage of the network is collaboration. Based on the research results, implications for the future practice are discussed.

  • PDF

A Trend Analysis and Policy proposal for the Work Permit System through Text Mining: Focusing on Text Mining and Social Network analysis (텍스트마이닝을 통한 고용허가제 트렌드 분석과 정책 제안 : 텍스트마이닝과 소셜네트워크 분석을 중심으로)

  • Ha, Jae-Been;Lee, Do-Eun
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.9
    • /
    • pp.17-27
    • /
    • 2021
  • The aim of this research was to identify the issue of the work permit system and consciousness of the people on the system, and to suggest some ideas on the government policies on it. To achieve the aim of research, this research used text mining based on social data. This research collected 1,453,272 texts from 6,217 units of online documents which contained 'work permit system' from January to December, 2020 using Textom, and did text-mining and social network analysis. This research extracted 100 key words frequently mentioned from the analyses of data top-level key word frequency, and degree centrality analysis, and constituted job problem, importance of policy process, competitiveness in the respect of industries, and improvement of living conditions of foreign workers as major key words. In addition, through semantic network analysis, this research figured out major awareness like 'employment policy', and various kinds of ambient awareness like 'international cooperation', 'workers' human rights', 'law', 'recruitment of foreigners', 'corporate competitiveness', 'immigrant culture' and 'foreign workforce management'. Finally, this research suggested some ideas worth considering in establishing government policies on the work permit system and doing related researches.

A Study on the e-Learning Communities Interaction Under the CSCL by Using Network Mining (컴퓨터지원협동학습 환경 하에서 네트워크 마이닝을 통한 학습자 상호작용연구)

  • Chung, Nam-Ho
    • Journal of Intelligence and Information Systems
    • /
    • v.11 no.2
    • /
    • pp.17-29
    • /
    • 2005
  • The purpose of the study was to explore the potential of the Social Network Analysis as an analytical tool for scientific investigation of learner-learner, or learner-tutor interaction within a Computer Supported Corporative Learning (CSCL) environment. Theoretical and methodological implication of the Social Network Analysis had been discussed. Following theoretical analysis, an exploratory empirical study was conducted to test statistical correlation between traditional performance measures such as achievement and team contribution index, and the centrality measure, one of the many quantitative measures the Social Network Analysis provides. Results indicate the centrality measure was correlated with the higher order teaming performance and the peer-evaluated contribution indices. An interpretation of the results and their implication to instructional design theory and practices were provided along with some suggestions for future research.

  • PDF

A Study on the Research Trend in the Dyslexia and Learning Disability Trough a Keyword Network Analysis (키워드 네트워크 분석을 통한 난독증과 학습장애 관련 연구 동향 분석)

  • Lee, Woo-Jin;Kim, Tae-Gang
    • Journal of Digital Convergence
    • /
    • v.17 no.1
    • /
    • pp.91-98
    • /
    • 2019
  • The present study was performed to investigate the general research trends of dyslexia and learning disability to explore the centrality of related variables though analysis of keyword networks. Data were collected from ten years articles research information sharing service(RISS) which is provided by korea education and research information service(KERIS). The research subjects selected for the analysis were keyword cleansing work, extraction major keyword using KrKwic program and using NodeXL program to Visualize the center of connection between keyword. The results of this were as follows. First, totally 72 of keyword were extracted from keyword cleansing process and among those keyword. major keywords included learning disability, dyslexia, RTI. Second, analysis of the betweenness centrality of dyslexia and learing disabilities shows that learning disabilities are a key word that has been addressed in the study of dyslexia and learning disabilities in korea. The results of these studies suggest a method of analyzing trends in qualitative and qualitative analysis in relation to dyslexia and learning disorder.

Study on Visualization of Multi-domain Network Topology (멀티 도메인 네트워크 토폴로지 시각화 연구)

  • Beom-Hwan Chang
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.169-178
    • /
    • 2022
  • In general, organizations operating multi-domain networks find it difficult to represent and manage multiple domain net works on a single screen space. Instead, most of them are managed with multiple screens visualizing network topology by domain or partitioning one screen area into multiple domains. We propose an efficient method to visualize the topology using only minimal connection information between domain-agnostic nodes in this work. This method visualizes the topology by utilizing centrality indices representing the influence of nodes in the network. Furthermore, the method dynamically segments the entire node's display area using virtual Root nodes to auto-separate domains and weights of child nodes and placing nodes in 3D space. Thus, although it is a straightforward method, the multi-domain network topology can be visualized with only minimal connection information between nodes.

Analysis of Seasonal Importance of Construction Hazards Using Text Mining (텍스트마이닝을 이용한 건설공사 위험요소의 계절별 중요도 분석)

  • Park, Kichang;Kim, Hyoungkwan
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.41 no.3
    • /
    • pp.305-316
    • /
    • 2021
  • Construction accidents occur due to a number of reasons-worker carelessness, non-adoption of safety equipment, and failure to comply with safety rules are some examples. Because much construction work is done outdoors, weather conditions can also be a factor in accidents. Past construction accident data are useful for accident prevention, but since construction accident data are often in a text format consisting of natural language, extracting construction hazards from construction accident data can take a lot of time and that entails extra cost. Therefore, in this study, we extracted construction hazards from 2,026 domestic construction accident reports using text mining and performed a seasonal analysis of construction hazards through frequency analysis and centrality analysis. Of the 254 construction hazards defined by Korea's Ministry of Land, Infrastructure, and Transport, we extracted 51 risk factors from the construction accident data. The results showed that a significant hazard was "Formwork" in spring and autumn, "Scaffold" in summer, and "Crane" in winter. The proposed method would enable construction safety managers to prepare better safety measures against outdoor construction accidents according to weather, season, and climate.

Long-term Driving Data Analysis of Hybrid Electric Vehicle

  • Woo, Ji-Young;Yang, In-Beom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.3
    • /
    • pp.63-70
    • /
    • 2018
  • In this work, we analyze the relationship between the accumulated mileage of hybrid electric vehicle(HEV) and the data provided from vehicle parts. Data were collected while traveling over 70,000 Km in various paths. The data collected in seconds are aggregated for 10 minutes and characterized in terms of centrality, variability, normality, and so on. We examined whether the statistical properties of vehicle parts are different for each cumulative mileage interval of a hybrid car. When the cumulative mileage interval is categorized into =< 30,000, <= 50,000, and >50,000, the statistical properties are classified by the mileage interval as 82.3% accuracy. This indicates that if the data of the vehicle parts is collected by operating the hybrid vehicle for 10 minutes, the cumulative mileage interval of the vehicle can be estimated. This makes it possible to detect the abnormality of the vehicle part relative to the accumulated mileage. It can be used to detect abnormal aging of vehicle parts and to inform maintenance necessity.

REBUILDING RAIL INFRASTRUCTURE IN NIGERIA: POLICY, PROBLEMS AND PROSPECTS

  • Oyefuga, Ben;Egbetokun, Abiodun
    • Proceedings of the KSR Conference
    • /
    • 2007.11a
    • /
    • pp.1883-1895
    • /
    • 2007
  • With a land area of 910,768 sq. km, population estimate of 150 million people and GDP-growth rate of 6.9% per annum (2006 est), the centrality of effective public transportation in Nigeria is readily seen. In this regard, rail transportation offers much potential because of its relative safety, reliability, lower cost to the users and being singularly capable of transforming the national economy through mass movement of people, goods and services. Within this context, the demand for an effective railway system, and the enormous potentials for profitable investment in rail infrastructure in Nigeria, is indisputable. Beginning with the history, the paper discusses the main problems of Nigeria's railway transport system; and then makes policy suggestions, after considering the potentials of rebuilding the rail infrastructure. The necessity of this work is premised on the fact that there is a significant gap in critical knowledge about Nigeria's railway transport system.

  • PDF

Identifying the leaders and main conspirators of the attacks in terrorist networks

  • Abhay Kumar Rai;Sumit Kumar
    • ETRI Journal
    • /
    • v.44 no.6
    • /
    • pp.977-990
    • /
    • 2022
  • This study proposes a novel method for identifying the primary conspirators involved in terrorist activities. To map the information related to terrorist activities, we gathered information from different sources of real cases involving terrorist attacks. We extracted useful information from available sources and then mapped them in the form of terrorist networks, and this mapping provided us with insights in these networks. Furthermore, we came up with a novel centrality measure for identifying the primary conspirators of a terrorist attack. Because the leaders of terrorist attacks usually direct conspirators to conduct terrorist activities, we designed a novel algorithm that can identify such leaders. This algorithm can identify terrorist attack leaders even if they have less connectivity in networks. We tested the effectiveness of the proposed algorithms on four real-world datasets and conducted an experimental evaluation, and the proposed algorithms could correctly identify the primary conspirators and leaders of the attacks in the four cases. To summarize, this work may provide information support for security agencies and can be helpful during the trials of the cases related to terrorist attacks.