• 제목/요약/키워드: business effectiveness

검색결과 1,588건 처리시간 0.033초

보건교사의 역량모형 개발을 위한 델파이 연구 (A Delphi Study of Developing Competency Model for Korean Health Teachers)

  • 박경선;배을규
    • 한국학교보건학회지
    • /
    • 제25권1호
    • /
    • pp.1-13
    • /
    • 2012
  • Purpose: This study was intended to identify the competency model for korean health teachers. In order to enhance job effectiveness and talent development of health teachers in schools, this study would provide policy makers and school administrators with a competency model to be used as a valid and reliable tool for selection, development, and appraisal of health teachers. Methods: This study used three-round Delphi technique, which was a series of surveys to obtain a consensus of experts in school health and health education. 31 experts were finally involved in Delphi panel, which consisted of professors, administrators, and school teachers. Results: This study found that the competency model of health teachers was composed of fourteen competencies and 75 performance indicators. The fourteen competencies were as follows: consulting and teaching competency, students understanding competency, health problem solving competency, health assessment competency, relationship building competency, information management competency, curriculum management competency, teaching activity competency, writing competency, professional expertise competency, health business management competency, self control competency, school commitment competency, and achievement orientation competency. Conclusion: Based on the results of this study, policy makers and school administrators would be able to use the competency model as a tool of new health teachers selection, existing health teachers appraisal, and new and existing teachers training and education. Future research needs to classify the levels of each performance indicator as a kind of behavior indices.

  • PDF

상수도 관망시스템의 유지관리용 모니터링 프로그램을 위한 효율적 D/B 모델의 개발 (The Development of Effective Database Model for Pipe Network Management Monitoring Program)

  • 강병모;이현동;홍인식
    • 인터넷정보학회논문지
    • /
    • 제9권4호
    • /
    • pp.157-166
    • /
    • 2008
  • 지하 시설물인 상수도관망의 관리에 관한 몇몇 연구에서와 같이 최근 지하 시설물 관리에 대한 흥미가 대두되고 있다. 본 논문에서는 유비쿼터스 환경을 구현하기 위한 스마트태그를 적용한다. 또한 제안한 프로그램의 구현을 위하여 사용된 GPS 기술은 GPS와 RFID 혼합 비즈니스 모델을 사용하며 효과적으로 RFID 시스템으로 지하 매설물들의 데이터를 관리하고 GIS상에서 네트워크 통신과 GPS 수신모듈을 통하여 전체 시스템의 고품질의 실용적이고 효율적인 시스템을 제공한다. 본 논문에서 지역혼합 데이터베이스를 사용하는 관리 시스템을 제안하였고 제안한 데이터베이스와 인터페이스 기술은 시뮬레이션을 통하여 테스트 및 평가하였다.

  • PDF

정보보안 거버넌스 프레임워크에 관한 연구 (A Study on Information Security Governance Framework)

  • 김민준;김귀남
    • 융합보안논문지
    • /
    • 제10권4호
    • /
    • pp.13-19
    • /
    • 2010
  • 시대의 흐름에 따라 기업의 지속적인 비지니스 연계 보증을 위하여 IT의 비중이 높아지면서, IT가 조직의 하나의 부분으로서 작용하는 것이 아닌 전사적인 차원에서 정보화 사회의 경쟁 화두로서 인식되어가고 있다. 정보보안 거버넌스는 정보의 무결성, 서비스 연속성, 정보자산의 보호라는 3가지 목적으로 시작된다. 이는 기업 거버넌스에 필수적이며 투명한 부분이 되어야 하고, IT프레임워크와 연계되어야 한다. 기존의 정보보안 거버넌스 프레임워크는 그 범위가 넓어 소규모 기업 거버넌스와 이해관계를 가지지 못한 문제점이 있다. 따라서 본 논문은 단순화된 정보보안 거버넌스 프레임워크를 제안하여, 문제점을 해결하고, 제안하는 프레임워크의 안전성 분석과 효율성 분석을 통하여 제안 방법의 효율성에 관하여 알아보았다.

텍스트마이닝을 활용한 북한 지도자의 신년사 및 연설문 트렌드 연구 (Discovering Meaningful Trends in the Inaugural Addresses of North Korean Leader Via Text Mining)

  • 박철수
    • Journal of Information Technology Applications and Management
    • /
    • 제26권3호
    • /
    • pp.43-59
    • /
    • 2019
  • The goal of this paper is to investigate changes in North Korea's domestic and foreign policies through automated text analysis over North Korean new year addresses, one of most important and authoritative document publicly announced by North Korean government. Based on that data, we then analyze the status of text mining research, using a text mining technique to find the topics, methods, and trends of text mining research. We also investigate the characteristics and method of analysis of the text mining techniques, confirmed by analysis of the data. We propose a procedure to find meaningful tendencies based on a combination of text mining, cluster analysis, and co-occurrence networks. To demonstrate applicability and effectiveness of the proposed procedure, we analyzed the inaugural addresses of Kim Jung Un of the North Korea from 2017 to 2019. The main results of this study show that trends in the North Korean national policy agenda can be discovered based on clustering and visualization algorithms. We found that uncovered semantic structures of North Korean new year addresses closely follow major changes in North Korean government's positions toward their own people as well as outside audience such as USA and South Korea.

배전계통에 있어서 최적 손실산정 기법에 관한 연구 (A Study on the Optimal Method of Loss Calculation in Distribution System)

  • 김미영;노대석;황혜미;김광호;신성수;김재언
    • 대한전기학회논문지:전력기술부문A
    • /
    • 제53권6호
    • /
    • pp.340-349
    • /
    • 2004
  • Recently, the needs and concerns for the power loss are increasing according to the energy conservation at the level of the national policies and power utilities's business strategies. Especially, the issue of the power loss is the main factor for the determining the electric pricing rates in the circumstances of the deregulation of electrical industry. However, because of the lacking of management for power loss load factors (LLF), it is difficult to make a calculation for the power loss and to make a decision for the electric rates. And loss factor(k-factor), which is a most important factor for calculation of the distribution power loss, has been used as a fixed value of 0.32 since the fiscal year 1973. Therefore, This study presents the statistical calculation methods of the loss factors classified by load types and seasons by using the practical data of 65 primary feeders which are selected by proper procedures. Based on the above the algorithms and methods, the optimal method of the distribution loss management classified by facilities such as primary feeders, distribution transformers and secondary feeders is presented. The simulation results show the effectiveness and usefulness of the proposed methods.

Changing Perspectives of Managing Human Resources in Nepal

  • Gautam, Dhruba Kumar
    • 아태비즈니스연구
    • /
    • 제3권2호
    • /
    • pp.23-33
    • /
    • 2012
  • Sustainable competitive advantage depends on formulation and implementation of appropriate human resource management (HRM) strategies and deployment of their competencies effectively in dynamic and complex environment. Competencies deployment is an approach to make decisions on the intentions and plans of organization concerning employment relationship and its recruitment, training, development, performance appraisal, reward and employee relations policies and practice. The improvement of organizational effectiveness is an overall objective of people management in organizations. In light of these, this study explores the present practices of HRM like: HR departments, HR policies and strategies, HR planning, recruitment selection and placement, training and development, performance appraisal, compensation and benefit, employee relations and communications. Based on the survey in 204 Nepalese organizations as a unit of analysis, the study concludes that HR practices in few organizations have action program for minorities, ethnic group, older employees and people with disabilities. Due to centralized organizational structure, most of HR decisions are taken into central office and line managers being involved highly in planning and implementing HR policies. In a nutshell, though HRM practices are not developed like developed countries, Nepalese organizations are realizing the significance of people management at work and changing their practices in the present dynamic environment.

  • PDF

구매 종속적 수요에 대한 접근방법의 고찰 (A Systematic Approach to the Purchase Dependence)

  • 박창규
    • 산업경영시스템학회지
    • /
    • 제43권1호
    • /
    • pp.70-78
    • /
    • 2020
  • Under the situation which customer orders are cancelled unless all products in the order are delivered all at once, this paper concentrates on the purchase dependent demands and explores the systematic approach to implant the purchase dependence into the multi-product inventory model. First, by acknowledging that it is a challenging task to formulate a suitable inventory model for the purchase dependence, we derive the optimal solution condition using an EOQ model and extend the optimal solution condition to periodic review models. Then, through the comparison simulation of four inventory policies regarding several degrees of purchase dependence, we demonstrate that the inventory models which consider the purchase dependence generate less total cost than the inventory models which ignore the purchase dependence. In general, the inventory models which consider the purchase dependence reduce the loss of sales by maintaining more inventories, which results in reducing the total cost. Consequently, the simulation result supports the effectiveness of this paper's approach. In addition, this paper uses the individual order period and joint order period obtained from the EOQ model for the multi-product inventory model. Through the in-depth analysis of comparing the two models, we observe that the model of using the joint order period produces less total cost when the degree of purchase dependence is high, but the model of using the individual order period produces less total cost when the degree of purchase dependence is low.

공리설계를 이용한 eCRM 운영방안에 관한 연구 (A Study on Operating eCRM using Axiom Design)

  • 양광모;박재현;강경식
    • 대한안전경영과학회:학술대회논문집
    • /
    • 대한안전경영과학회 2001년도 추계학술대회
    • /
    • pp.65-71
    • /
    • 2001
  • With ever-change and increasingly competitive business environments, firms strive to employ a variety of marketing strategies and execution in order to survive in the market. Such effects would be paid off in the right way only when management of the firms perform marketing activities focusing on long term effectiveness, which would drive company profits up and keep them for long. Demands of customers are being changed and varied. And in this circumstance, it become a main issue of management that the company should produce and sell products according to the customer demands. With these trends, each company has been concentrating effects on generalization of product development technique and distinction of service lot customer In this result with the advantage of mass marketing and database marketing have been drawing attentions from company. Also the internet connected around the world completely diminished the limit of time and distance and company have enveloped keen competition out of each nation and continent in the world market. To fulfill these demands of customer, they need a concept of eCRM(Web based Customer Relationship Management), and go from selling products and services, or gathering customer requests, up to the phase of solving customer's problem by real time or Previous action. With the help of Internet, the frequency and speed of the problem solving has improved greatly.

  • PDF

e-비즈니스를 위한 ERP 구현에 관한 사례연구 - 중소기업을 중심으로 - (A Case Study on ERP Implementation for e-Business - Perspective of Medium & Small-sized Enterprise -)

  • 이영민;주상호
    • 한국컴퓨터정보학회논문지
    • /
    • 제7권2호
    • /
    • pp.187-195
    • /
    • 2002
  • 본 연구에서는 효과적인 e-비즈니스를 실현하기 위해서 기업의 기간시스템으로 간주되는 ERP의 구현사례를 중소기업을 중심으로 분석을 하였다. 특히 기업에서 ERP를 구현하기 위해서 현재의 경영환경 분석을 바탕으로 BPR의 활동을 집중적으로 분석하므로 ERP구현 효과와 시스템 활용실태 및 평가를 도출하게 되었다 즉 BPR활동을 수행한 본 연구의 CM콘크리트사의 ERP구현사례의 분석에서 알 수 있듯이, BPR활동은 성공적인 ERP구현의 필요충분 조건으로 향후 ERP도입을 계획하고 있는 중소기업에게 성공적 ERP시스템 구현은 물론 기업정보시스템의 실행성과를 높일 수 있는 중요한 지침을 제공할 수 있다고 판단된다.

  • PDF

의사결정트리와 인공 신경망 기법을 이용한 침입탐지 효율성 비교 연구 (A Comparative Study on the Performance of Intrusion Detection using Decision Tree and Artificial Neural Network Models)

  • 조성래;성행남;안병혁
    • 디지털산업정보학회논문지
    • /
    • 제11권4호
    • /
    • pp.33-45
    • /
    • 2015
  • Currently, Internet is used an essential tool in the business area. Despite this importance, there is a risk of network attacks attempting collection of fraudulence, private information, and cyber terrorism. Firewalls and IDS(Intrusion Detection System) are tools against those attacks. IDS is used to determine whether a network data is a network attack. IDS analyzes the network data using various techniques including expert system, data mining, and state transition analysis. This paper tries to compare the performance of two data mining models in detecting network attacks. They are decision tree (C4.5), and neural network (FANN model). I trained and tested these models with data and measured the effectiveness in terms of detection accuracy, detection rate, and false alarm rate. This paper tries to find out which model is effective in intrusion detection. In the analysis, I used KDD Cup 99 data which is a benchmark data in intrusion detection research. I used an open source Weka software for C4.5 model, and C++ code available for FANN model.