• Title/Summary/Keyword: Work Centrality

Search Result 55, Processing Time 0.022 seconds

Social Network Analysis on Research Keywords of Child-Occupation Studies (아동의 작업 연구주제어의 사회연결망 분석)

  • Ha, Seong-Kyu;Park, Kang-Hyun
    • Therapeutic Science for Rehabilitation
    • /
    • v.12 no.4
    • /
    • pp.39-51
    • /
    • 2023
  • Objective : This study seeks to unveil the intellectual framework of research surrounding children's occupations by utilizing social network analysis of keywords from studies focused on childhood. Methods : From August 2003 to August 2023, we analyzed 3,364 keywords extracted from 270 research articles in the Korean Citation Index with the keyword "Child and Occupation" using the NetMiner program. Results : Research on children's work has increased quantitatively over the past decade. Keywords exhibiting a high degree of centrality in the realm of child occupation research included Task (0.055), Group therapy (0.040), Working memory (0.037), Intervention (0.033), Performance (0.030), Language (0.026), Ability (0.026), Skill (0.024), and Program (0.023). Notably, the weighted terms in the Word Network included Evaluation-Tool (30), School-Student (15), and Activity-Participation (15). The primary keywords from each topic in topic modeling were Activity (0.295), Disability (0.604), Education (0.356), Skill (0.478), School (0.317), Function (0.462), Disorder (0.324), Language (0.310), Comprehension (0.412), and Training (0.511). Conclusion : This study describes the trends in the domestic field of pediatric occupational research. These efforts provided valuable insights into pediatric occupational therapy in South Korea.

An Evaluation of the Necessity of Security Management of Personal Information Consignees : using Privacy Policy and ISMS data (개인정보 수탁사의 보안관리 대상 식별 방안 연구 : 개인정보처리방침 및 정보보호인증 데이터 이용)

  • Choi, Won-Nyeong;Kook, Kwang-Ho
    • Convergence Security Journal
    • /
    • v.20 no.3
    • /
    • pp.79-88
    • /
    • 2020
  • Business consignment using personal information is increasing for the operating profit and work efficiency of Internet companies. If the personal information leakage accident occurs at the consignee, the consigner who provided personal information will be damaged greatly. The purpose of this study is to analyze the business attributes of consignee using consigned personal information and present a model that can be used to select companies with high risk of personal information leakage by considering the importance of the involved personal information. For this, personal information consignment relations, consignment services, and personal information items used were analyzed. Social network analysis and cluster analysis were applied to select companies with high network centrality that are advisable to obtain information security certification. The results of this study could be used to establish information protection strategies for private or public enterprises that manage companies using personal information.

Evaluation of Coordination of Emergency Response Team through the Social Network Analysis. Case Study: Oil and Gas Refinery

  • Mohammadfam, Iraj;Bastani, Susan;Esaghi, Mahbobeh;Golmohamadi, Rostam;Saee, Ali
    • Safety and Health at Work
    • /
    • v.6 no.1
    • /
    • pp.30-34
    • /
    • 2015
  • Background: The purpose of this study was to examine the cohesions status of the coordination within response teams in the emergency response team (ERT) in a refinery. Methods: For this study, cohesion indicators of social network analysis (SNA; density, degree centrality, reciprocity, and transitivity) were utilized to examine the coordination of the response teams as a whole network. The ERT of this research, which was a case study, included seven teams consisting of 152 members. The required data were collected through structured interviews and were analyzed using the UCINET 6.0 Social Network Analysis Program. Results: The results reported a relatively low number of triple connections, poor coordination with key members, and a high level of mutual relations in the network with low density, all implying that there were low cohesions of coordination in the ERT. Conclusion: The results showed that SNA provided a quantitative and logical approach for the examination of the coordination status among response teams and it also provided a main opportunity for managers and planners to have a clear understanding of the presented status. The research concluded that fundamental efforts were needed to improve the presented situations.

Social Network Approach for Sharing Knowledge: How Can the Structure and Characteristics of Social Networks Support for Sharing Knowledge? (지식 공유에 대한 소셜 네트워크 접근법 : 어떻게 소셜 네트워크의 구조와 특징이 지식 공유를 지원하는가?)

  • Lee, Jeong-Soo
    • Journal of the Korean Society for information Management
    • /
    • v.27 no.2
    • /
    • pp.61-74
    • /
    • 2010
  • The knowledge sharing in a knowledge management process is much affecting generation and distribution of knowledge. Especially, the knowledge distribution is being revitalized with the center of social media service like twitter and library service 2.0 in the knowledge-based IT (Information Technology) environment. The present research analyzed the structure and characteristics of a social network inside an organization that is growing like an organism through self-organization through tools for SNA (Social Network Analysis) and multiple regression analysis of independent variables such as 1) a relationship between social network's structure and knowledge sharing, 2) a relationship between structural holes and knowledge sharing influence of centrality, 3) a relationship between individual ability and knowledge sharing of information technology and work recognition.

Development of BSKT For Cultivating Tacit Knowledge Transfer (암묵지전이 활성화를 위한 BSKT(Brokering Systems for tacit Knowledge Transfer)개발)

  • Hong, Jong-Yi
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.1
    • /
    • pp.39-48
    • /
    • 2016
  • The tacit knowledge transfer cultivate the value and mount of tacit knowledge. The tacit knowledge transfer plays the most important role for improving the competitiveness of the organization. Despite the tacit knowledge transfer is very important, the research related with tacit knowledge transfer has not been actively carried out. The barriers to tacit knowledge transfer interfere with the tacit knowledge transfer. The barriers to tacit knowledge transfer are lack of understanding knowledge experts, heavy over-work, insufficient compensation, trust shortage and knowledge stickiness. In order to overcome the barrier of the tacit knowledge transfer, it is necessary to promote knowledge broker. The knowledge broker is the foundation for the tacit knowledge transfer and the critical success factor for efficient tacit knowledge transfer. However, most research related on the knowledge broker had focused on the degree, centrality and density of the knowledge network. The framework is needed to performance indicator for diagnosing the tacit knowledge transfer. Therefore, we suggest the knowledge broker framework based on the social network analysis.

Faith Formation Through Guided Participation in Practice (신앙형성과 원칙에 따르는 실천의 참여)

  • Joyce Ann Mercer
    • Journal of Christian Education in Korea
    • /
    • v.73
    • /
    • pp.39-54
    • /
    • 2023
  • In this study I want to explore faith formation through the framework of practice. First, I will describe discipleship as a lifelong process of identity formation, defining Christian religious education as a faith community's intentional work of equipping people to walk in the way of Jesus through apprenticeship in faith practices. I will argue that this process is more about the teaching of practices and engaging in theological reflection on practices than it is about dispensing correct information. This idea is not original with me, but has been expounded by many others particularly in the past decade in the U.S., as part of a larger movement within theological discourse emphasizing the centrality of practice. Second, I will describe some resources from educational theorists that can help us to understand what it means to educate through practices toward an identity as Christians. And finally, I will suggest that in our complex, broken and wounded world, as Christian religious educators we especially have a calling to equip disciples in two urgent faith practices: earth-care, and dealing with conflict.

Characteristics of Plastic Concept of Minimalism in Comtemporary Landscape Design (현대조경설계에서 미니멀리즘의 조형개념 특성)

  • Ahn, Seung-Hong
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.37 no.5
    • /
    • pp.64-77
    • /
    • 2009
  • In landscape architecture, the pursuit of pluralism requires diverse expression based on cultural and philosophical differences. Landscape architects impart social purposes and spatial relationships to the contemporary generation by providing particular environments that reflect the culture of the day. Particularly, landscape architects reflect contemporary art in their design works and express the characteristics of the arts of the day in real spaces. Historically they have sought motives from all fields of art. The plastic concept in landscape design is based specifically on paintings that directly influence spatial composition. Minimalism in landscape architecture contributes to the formation of artistic characteristics that can be explained to improve artistry in landscapes as aesthetic objects, which were eliminated in the modernist era, and to realize contemporary art. By interpretively studying design works, therefore, this study reveals plastic concepts' influence on landscape design affected by minimalist art. The characteristics of plastic concepts in minimalist landscape design can be summarized as follows. First, the reduction of Minimalist Landscape is meant for viewers to immediately understand a work's identity and to easily perceive its intention by using design language implied by the pure geometric forms such as circles, triangles and squares. Second, the extension intends to seek internal order by connecting design elements mutually and externally to provide visual direction by adopting linear expression. Third, the flatness that defines meaningless space tends to overlay additional elements on a flattened site to induce the perception of a sequence of landscapes and to patternize pavement to improve its visual image. Finally, seriality has two characteristics: to make centrality in space and to compose by repeating formative elements and materials based on the pursuit of a site's totality, rather than an individual space's originality.

Features of Science Classes in Science Core Schools Identified through Semantic Network Analysis (언어네트워크분석을 통해 본 과학중점학교 과학수업의 특징)

  • Kim, Jinhee;Na, Jiyeon;Song, Jinwoong
    • Journal of The Korean Association For Science Education
    • /
    • v.38 no.4
    • /
    • pp.565-574
    • /
    • 2018
  • The purpose of this study is to investigate the features of science classes of Science Core Schools (SCSs) perceived by students. 654 students from 14 SCSs were surveyed with two open-ended questions on the features of science classes. The students' responses were analyzed with NetMiner 4.5, in terms of the centrality (of betweenness and of degree) analysis and the community analysis. The results of the research are as follows: (1) the science classes of SCSs were perceived by students to be of the environment of free questioning, active participation and communication, caring teacher, more science experiments and advanced contents, and knowledge sharing; (2) science classes in SCSs were perceived to be different from those of ordinary high schools because SCSs provide more opportunities for science-related special courses (like project work, advanced science subjects), extra-curricular activities, inquiry and research activities, school supports, hard-working classroom environment, longer studying hours, R&E and club activities. The students' perceptions of SCS science classes appear to be in line with the characteristics of 'good' science lessons from previous studies. The SCS project itself and the features of SCS science classes would help us to see how we introduce educational innovations into actual schools.

A Network Analysis of the Research Trends in Fingerprints in Korea (네트워크 분석을 활용한 국내 지문인식연구의 동향분석)

  • Jung, Jinhyo;Lee, Chang-Moo
    • Convergence Security Journal
    • /
    • v.17 no.1
    • /
    • pp.15-30
    • /
    • 2017
  • Since the 1990s, fingerprint recognition has attracted much attention among scholars. There have been numerous studies on fingerprint recognition. However, most of the academic papers have focused mainly on how to make a technical advance of fingerprint recognition. there has been no significant output in the analysis of the research trends in fingerprint recognition. It's essential part to describe the overall structure of fingerprint recognition to make further studies much more efficient and effective. To this end, the primary purpose of this article is to deliver an overview of the research trends on fingerprint recognition based on network analysis. This study analyzed abstracts of the 122 academic journals ranging from 1990 to 2015. For gathering those data, the author took advantage of an academic searchable data base-RISS. After collecting abstracts, cleaning process was carried out and key words were selected by using Krwords and R; co-occurrence symmetric matrix made up of key words was created by Ktitle; and Netminer was employed to analyze closeness centrality. The result achieved from this work included followings: research trends in fingerprint recognition from 1990 to 2000, 2001 to 2005, 2006 to 2010, and 2011 to 2015.

Hierarchy in Signed Networks

  • Jamal Maktoubian
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.9
    • /
    • pp.111-118
    • /
    • 2024
  • The concept of social stratification and hierarchy among human dates back to the origin of human race. Presently, the growing reputation of social networks has given us with an opportunity to analyze these well-studied phenomena over different networks at different scales. Generally, a social network could be defined as a collection of actors and their interactions. In this work, we concern ourselves with a particular type of social networks, known as trust networks. In this type of networks, there is an explicit show of trust (positive interaction) or distrust (negative interaction) among the actors. In other words, an actor can designate others as friends or foes. Trust networks are typically modeled as signed networks. A signed network is a directed graph in which the edges carry an edge weight of +1 (indicating trust) or -1 (indicating distrust). Examples of signed networks include the Slashdot Zoo network, the Epinions network and the Wikipedia adminship election network. In a social network, actors tend to connect with each other on the basis of their perceived social hierarchy. The emergence of such a hierarchy within a social community shows the manner in which authority manifests in the community. In the case of signed networks, the concept of social hierarchy can be interpreted as the emergence of a tree-like structure comprising of actors in a top-down fashion in the order of their ranks, describing a specific parent-child relationship, viz. child trusts parent. However, owing to the presence of positive as well as negative interactions in signed networks, deriving such "trust hierarchies" is a non-trivial challenge. We argue that traditional notions (of unsigned networks) are insufficient to derive hierarchies that are latent within signed networks In order to build hierarchies in signed networks, we look at two interpretations of trust namely presence of trust (or "good") and lack of distrust (or "not bad"). In order to develop a hierarchy signifying both trust and distrust effectively, the above interpretations are combined together for calculating the overall trustworthiness (termed as deserve) of actors. The actors are then arranged in a hierarchical fashion based on these aggregate deserve values, according to the following hypothesis: actor v is assigned as a child of actor u if: (i) v trusts u, and (ii) u has a higher deserve value than v. We describe this hypothesis with additional qualifiers in this thesis.