• Title/Summary/Keyword: current sharing model

Search Result 133, Processing Time 0.026 seconds

Knowledge Production Function in South Korea : An Empirical Analysis (우리나라 지식생산함수 : 실증분석)

  • Cho, Sang-Sup;Jung, Dong-Jin
    • Journal of Korea Technology Innovation Society
    • /
    • v.10 no.3
    • /
    • pp.383-405
    • /
    • 2007
  • In this paper we estimate knowledge production function for 15 South Korean industry sectors using panel data. To accommodate the influence of inter-sectoral interactions on the creation of knowledge, we estimate parameters for related knowledge production functions using the Dynamic Seemingly Unrelated Regression(DSUR) model proposed by Mark et al. (2005). We find the elasticity of knowledge production with respect to the size of research staff to be 0.25 and that with respect to the existing stock of knowledge to be 0.35. The fact that the elasticity of new knowledge creation with regard to the existing knowledge stock is below 1 in South Korea corroborates the view that the rate of long-term growth of her economy is chiefly determined by the elasticity related to production functions of goods and services and the rate of population growth, and that her government policy, to ensure a continued growth for the Korean economy, must shift the focus of R&D policies from the current direct intervention-centered model to one consisting of indirect measures, namely supporting knowledge management and diffusion and the creation of a knowledge sharing system. In terms of R&D policy implications it could be consider that the national knowledge production system should strengthen the cumulative process of knowledge accumulation and population for research and development. Our country R&D policy, also, need to adopt a global approach to increase knowledge stock at the highest levels of a country.

  • PDF

Development of Mentoring Program Model for In-service Science Teacher Education (과학교사교육을 위한 멘토링 프로그램 모델 개발)

  • Nam, Jeonghee;Ko, Mire;Lee, Sunduck;Go, Munsuk;Sung, Hwamok
    • Journal of The Korean Association For Science Education
    • /
    • v.32 no.10
    • /
    • pp.1613-1626
    • /
    • 2012
  • The purpose of this study was to develop an effective mentoring program model. In order to develop an effective mentoring program, we identified four elements of mentoring program based on the analysis of secondary science teachers perceptions of in-service science teacher training program and mentoring. For the study, a questionnaire was developed by the authors and it was administrated to 114 secondary science teachers participated in science teacher training program. The interviews were conducted with 14 secondary science teachers. The results of this study are as follows: Most of the secondary science teachers recognized that in-service science teacher training program, which they had taken, positively affected their teaching. However, there are some aspects needed for improvements in the current teacher training program. They wanted to take the opportunities to interact with their colleagues and researchers, sharing their experiences on teaching within the teachers' community, and reflecting on their own teaching. Based on these analysis we suggest four elements for effective mentoring program. These are 'Communication,' 'Reflection for Mentor,' 'Reflection for Mentee,' and 'Evaluation.' In addition, the mentoring program is proposed to consist of four activities such as 'Feedback on teaching', 'Seminar and Workshop', 'Conference', and 'Self-evaluation'.

Comparison of Methods for Linkage Analysis of Affected Sibship Data (이환 형제 자료에 대한 유전적 연관성 분석 방법의 비교)

  • Go, Min-Jin;Lim, Kil-Seob;Lee, Hak-Bae;Song, Ki-Jun
    • The Korean Journal of Applied Statistics
    • /
    • v.22 no.2
    • /
    • pp.329-340
    • /
    • 2009
  • For complex diseases such as diabetes, hypertension, it is believed that model-free methods might work better because they do not require a precise knowledge of the mode of inheritance controlling the disease trait. This is done by estimating the sharing probabilities that a pair shares zero, one, or two alleles identical by descent(IBD) and has some specific branches of test procedure, i.e., the mean test, the proportion test, and the minmax test. Among them, the minmax test is known to be more robust than others regardless of genetic mode of inheritance in current use. In this study, we compared the power of the methods which are based on minmax test and considering weighting schemes for sib-pairs to analyze sibship data. In simulation result, we found that the method based on Suarez' was more powerful than any others without respect to marker allele frequency, genetic mode of inheritance, sibship size. Also, The power of both Suarez- and Hodge-based methods was higher when marker allele frequency and sibship size were higher, and this result was remarkable in dominant mode of inheritance especially.

The Effect of Users' Individual characteristics and Social Influence on Cyberethics and Usage in Web 2.0 - Comparing South Korea and U.S.A. - (웹 2.0 환경에서 사용자의 개인특성과 사회적 영향이 사이버윤리성과 사용성에 미치는 영향 - 한국과 미국의 비교연구 -)

  • Moon, Yun-Ji
    • Management & Information Systems Review
    • /
    • v.33 no.2
    • /
    • pp.101-118
    • /
    • 2014
  • In the mid-2000s, Web 2.0 appears and is becoming a general cultural code with the keyword of participation, sharing, and openness. Web 2.0, in which consumption is being transformed by the participatory web culture, has evolved. However, associated with the evolution of Web 2.0, several significant concerns appears in a society. Among them, this study will focuses on the cyber-ethics issues. There are limitations to solve the cyber-ethics problems only in the technical and legal approaches. Therefore, the current article intends to consider comprehensively the antecedents of cyber-ethics such as individual characteristics, social influence, and cultural characteristics. Specifically, (1) Do individual characteristics(i.e., self-efficacy, locus of control) affect cyber-ethics in the Web 2.0 environment?, (2) Do social influence(i.e., subjective norm) have an effect on cyber-ethics?, (3) Do cyber -ethics have an impact on user participation in the Web 2.0 services(i.e., retrieval and creation)?, finally (4) Do international cultural difference have a moderation effect on the relationship between cyber-ethics and user participation? For testing empirically the hypothesized research model, this study collected questionnaires in South Korea as well as U.S.A. The results showed that individual characteristics and social influence affect cyber-ethics toward user's creative activities in Web 2.0 sites.

  • PDF

The Study of Response Model & Mechanism Against Windows Kernel Compromises (Windows 커널 공격기법의 대응 모델 및 메커니즘에 관한 연구)

  • Kim, Jae-Myong;Lee, Dong-Hwi;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.6 no.3
    • /
    • pp.1-12
    • /
    • 2006
  • Malicious codes have been widely documented and detected in information security breach occurrences of Microsoft Windows platform. Legacy information security systems are particularly vulnerable to breaches, due to Window kernel-based malicious codes, that penetrate existing protection and remain undetected. To date there has not been enough quality study into and information sharing about Windows kernel and inner code mechanisms, and this is the core reason for the success of these codes into entering systems and remaining undetected. This paper focus on classification and formalization of type target and mechanism of various Windows kernel-based attacks, and will present suggestions for effective response methodologies in the categories of, "Kernel memory protection", "Process & driver protection" and "File system & registry protection". An effective Windows kernel protection system will be presented through the collection and analysis of Windows kernel and inside mechanisms, and through suggestions for the implementation methodologies of unreleased and new Windows kernel protection skill. Results presented in this paper will explain that the suggested system be highly effective and has more accurate for intrusion detection ratios, then the current legacy security systems (i.e., virus vaccines and Windows IPS, etc) intrusion detection ratios. So, It is expected that the suggested system provides a good solution to prevent IT infrastructure from complicated and intelligent Windows kernel attacks.

  • PDF

A Study on Development of Common Criteria for Evaluation of Internet Ethics Index (인터넷윤리 지수의 평가를 위한 공통 기준 개발에 관한 연구)

  • Lee, Young-Han;Kim, Jeong-Dong;Park, Jeong-Ho
    • Journal of Internet Computing and Services
    • /
    • v.17 no.3
    • /
    • pp.75-85
    • /
    • 2016
  • Changes in the distribution and sharing information using the Internet is changing the most part in our daily life, Utilizing the Internet of our lives to the rapid development of IT technology, are living in the off-line (off-line) and online (on-line) a mix of life, We expect now online life specific gravity is further increased. However, do not systematically implement the education of Internet ethics awareness deficiencies of objective indicators to assess the current knowledge level of the Internet ethics is the actual situation. Therefore, in this paper, it provides a development process in order to establish a common standard for the evaluation of Internet ethics index. Development procedure of Internet ethics index in order to establish a common standard, "evaluation item (draft) derivation", "Creating a questionnaire", "the calculation of the analysis and item-by-item weight of the questionnaire", and a common reference determination of the stage having. Was also a questionnaire that target 46 people to calculate the weight of the common reference. Internet ethics index evaluation model through the establishment of the common standards developed in this paper, municipal road Office of Education, related organizations, high school, such as small, medium, can be utilized as an indicator to measure the Internet ethics education level.

The study of the relationship of the defense industry-specific factors effect the innovation of manufacturing technology and the market share. (방위산업의 시장구조 결정요인이 기술혁신과 시장지배에 미치는 영향)

  • Chung, Young-Hyun
    • Journal of National Security and Military Science
    • /
    • s.5
    • /
    • pp.241-280
    • /
    • 2007
  • This study examines the relationship of the industry-specific factors that effect innovation of manufacturing technology and the market share within the defense industry. Since the establishment of the basic defense industry framework in 1973, there were numerous interactions of the industry-specific factors of the defense industry structure with the technological innovation and market organization of the defense industry. During last three decades, the domestic defense industry has achieved the considerable level but the framework of the basic system has not developed much in areas of the military science and the defense manufacturing technology. Industry-specific factors were formed in the process and appeared in a variety of behavioral characteristics as subsystems. Currently, there IS a growing trend where the management of defense industry is gradually deteriorating due to limitation of the domestic industry-specific factor (e.g. defense technologies, amount of demand, etc.). If there is a prominent imbalance of the industry-specific factors. it can trigger the potential problem of conflict, lack of cooperation and control, slowing the growth of the manufacturing technology thereby diminishing the market and deteriorating the defense supply/demand relationship. In a research conducted by Joe S. Bain, Bain analyzed the relationship of the traditional industrial organization where industry-specific factor(S) not only impacts the conductor(C). And, conductor(C) influences the shaping of the performance(P) of relationship of the traditional industrial organization. Consequently, the researcher has identified the demand monopoly, barriers to entry, and market competition with comparison of defense industry issues. These defense issues were three industry-specific factors identified, which are 1) The demand monopoly and The entry barriers to new market competition, 2) the industrial technical factor to a production technical competitiveness and a market sharing competitiveness, 3) the probability factor to revolution for military affairs(RMA) and a R&D production. According to baseline with these factors, the following research model is established from the special companies group(Group A), the systematization companies group(Group B), and the general companies group(Group 0. The hypothesis is that if there are more industry-specific factors, then there will be more relationships of defense industry relation statutes. This research is an empirical study on the relationship that the industry specific factors effects the innovation of manufacturing technology and the shaping of the market in the defense industry. Moreover, the existing models to evaluate the industry specific factors of the defense industry IS much to be desired with the controlled statistical analysis of the result. It is vital to study on current situation with suggesting alternative strategy to the efficient strategy. The descriptive analysis approach analysis is conducted with SPSSWIN to conduct reliability test, factor analysis, correlation analysis, cross-tabulation analysis, one-way ANOVA, and multiple regression analysis. However, there were some limitations of the survey such as the rigidity of concept about the technical factors and various market management factors. The wishes is that the decision-maker could be utilized these defence industrial factors to formulate efficient defence policy and strategy in the future.

  • PDF

Introduction of Security Certification System for Shared Growth and Co-prosperity of Small and Medium Businesses (대·중소기업 동반성장과 상생을 위한 중소 협력업체의 보안인증 제도 도입 방안)

  • Shin, Hyungoo
    • Korean Security Journal
    • /
    • no.61
    • /
    • pp.203-234
    • /
    • 2019
  • The damages from security accidents continue to increase as technology leaks from suppliers cause risks to the management of large companies, which are their customers, and their image and reliability to fall. However, the current industrial structure is practically impossible for large companies to form their own businesses and strategic alliances with business partners are essential, but it is changing into an industrial structure where the exchange of information is increased and the dependence of the information system is maximized, as well as legal demands and demands from stakeholders are increasing due to the complexity of the work process and the strengthening of security-related laws. The status of technology protection of small and medium-sized enterprises shows that they are not equipped with a security system due to relatively poor environment and financial difficulties compared to large enterprises, whereas the industrial structure between large and small business partners is indispensable for sharing the IT system, and the security system of large business, which is a customer company, should be improved by considering the fact that it is impossible to maintain security system between large businesses. Thus, the government intends to examine the system for shared growth of small businesses and the model for evaluating the capabilities of various agencies for information protection, and propose measures to introduce the certification system for small business partners.

A Study on Postconventional Christian Education for Intercultural Conflict Resolution (문화 간 갈등해소를 위한 탈인습적 기독교교육에 관한 연구)

  • Kim, Jinyoung
    • Journal of Christian Education in Korea
    • /
    • v.62
    • /
    • pp.257-283
    • /
    • 2020
  • Our current society is experiencing a mass upheaval through globalization: mobility, hybridity, and cultural diversity are part of this world phenomenon. We can say that these changes are a result of people crossing borders due to international travel, immigration, emigration, studying abroad, labor, international marriages, fast and comfortable transportation, and the Internet. According to 2018 UNPD(Untied Nations Population Division)'s data, the international migrants have exceeded 258 million as of 2017. The increased number of migrants signifies that people with various backgrounds move from their own culture to a drastically different one. Interacting with different cultures can give people the chance to experience abundant lifestyles and improve life qualities. During that process, however, the differences between cultures can cause not only misunderstandings, conflicts, and violent collisions, but also xenophobia or radical nationalism. The current society is confronted with a problem: the people cannot stubbornly cling to a homogenous ethnicity anymore, which makes the coexistence between the citizens and immigrants necessary. Through these circumstances, I aim to suggest an educational model and a practical curriculum from a Christian perspective as the aim of this study. It seeks to encourage Christians to flexibly respond to these conflicts and collisions, and to fulfill their social responsibilities faithfully. For this reason, I will explore and seek sharing practical values through both shalom's communality as a theological approach and postconventionality in mature adults as a social-scientific approach. Consequently, I have few requests for the readers. First, approach with openness, understanding, and respect for other culture. Second, see this study as one step of confronting the global problem for coexistence and coprosperity of all social agents in the earth, a limited space. Third, notice that this study uses the interdisciplinary approach (theological and social scientific view) for a shareable, practical value that consistently leads the curriculum of my thesis, and a scientific method to eliminate bias. Lastly, understand that this study will eventually be used in educational practice, and as a result it prioritizes giving thought to the Christian educational environment. This study begins by exploring the conflicts and collisions between diverse cultures of our current society in international and national cases. Afterwards, I will reflect on how we can manage these conflicts and collisions by exploring the social-scientific view, postconventionality in mature adults, the theological view, and shalom's communality as a complement for the postconventionality's personal dimension. In conclusion, I suggest a curriculum that achieves peace as a practical value based on postventionality and shalom's communality for this study's goal.

A Store Recommendation Procedure in Ubiquitous Market for User Privacy (U-마켓에서의 사용자 정보보호를 위한 매장 추천방법)

  • Kim, Jae-Kyeong;Chae, Kyung-Hee;Gu, Ja-Chul
    • Asia pacific journal of information systems
    • /
    • v.18 no.3
    • /
    • pp.123-145
    • /
    • 2008
  • Recently, as the information communication technology develops, the discussion regarding the ubiquitous environment is occurring in diverse perspectives. Ubiquitous environment is an environment that could transfer data through networks regardless of the physical space, virtual space, time or location. In order to realize the ubiquitous environment, the Pervasive Sensing technology that enables the recognition of users' data without the border between physical and virtual space is required. In addition, the latest and diversified technologies such as Context-Awareness technology are necessary to construct the context around the user by sharing the data accessed through the Pervasive Sensing technology and linkage technology that is to prevent information loss through the wired, wireless networking and database. Especially, Pervasive Sensing technology is taken as an essential technology that enables user oriented services by recognizing the needs of the users even before the users inquire. There are lots of characteristics of ubiquitous environment through the technologies mentioned above such as ubiquity, abundance of data, mutuality, high information density, individualization and customization. Among them, information density directs the accessible amount and quality of the information and it is stored in bulk with ensured quality through Pervasive Sensing technology. Using this, in the companies, the personalized contents(or information) providing became possible for a target customer. Most of all, there are an increasing number of researches with respect to recommender systems that provide what customers need even when the customers do not explicitly ask something for their needs. Recommender systems are well renowned for its affirmative effect that enlarges the selling opportunities and reduces the searching cost of customers since it finds and provides information according to the customers' traits and preference in advance, in a commerce environment. Recommender systems have proved its usability through several methodologies and experiments conducted upon many different fields from the mid-1990s. Most of the researches related with the recommender systems until now take the products or information of internet or mobile context as its object, but there is not enough research concerned with recommending adequate store to customers in a ubiquitous environment. It is possible to track customers' behaviors in a ubiquitous environment, the same way it is implemented in an online market space even when customers are purchasing in an offline marketplace. Unlike existing internet space, in ubiquitous environment, the interest toward the stores is increasing that provides information according to the traffic line of the customers. In other words, the same product can be purchased in several different stores and the preferred store can be different from the customers by personal preference such as traffic line between stores, location, atmosphere, quality, and price. Krulwich(1997) has developed Lifestyle Finder which recommends a product and a store by using the demographical information and purchasing information generated in the internet commerce. Also, Fano(1998) has created a Shopper's Eye which is an information proving system. The information regarding the closest store from the customers' present location is shown when the customer has sent a to-buy list, Sadeh(2003) developed MyCampus that recommends appropriate information and a store in accordance with the schedule saved in a customers' mobile. Moreover, Keegan and O'Hare(2004) came up with EasiShop that provides the suitable tore information including price, after service, and accessibility after analyzing the to-buy list and the current location of customers. However, Krulwich(1997) does not indicate the characteristics of physical space based on the online commerce context and Keegan and O'Hare(2004) only provides information about store related to a product, while Fano(1998) does not fully consider the relationship between the preference toward the stores and the store itself. The most recent research by Sedah(2003), experimented on campus by suggesting recommender systems that reflect situation and preference information besides the characteristics of the physical space. Yet, there is a potential problem since the researches are based on location and preference information of customers which is connected to the invasion of privacy. The primary beginning point of controversy is an invasion of privacy and individual information in a ubiquitous environment according to researches conducted by Al-Muhtadi(2002), Beresford and Stajano(2003), and Ren(2006). Additionally, individuals want to be left anonymous to protect their own personal information, mentioned in Srivastava(2000). Therefore, in this paper, we suggest a methodology to recommend stores in U-market on the basis of ubiquitous environment not using personal information in order to protect individual information and privacy. The main idea behind our suggested methodology is based on Feature Matrices model (FM model, Shahabi and Banaei-Kashani, 2003) that uses clusters of customers' similar transaction data, which is similar to the Collaborative Filtering. However unlike Collaborative Filtering, this methodology overcomes the problems of personal information and privacy since it is not aware of the customer, exactly who they are, The methodology is compared with single trait model(vector model) such as visitor logs, while looking at the actual improvements of the recommendation when the context information is used. It is not easy to find real U-market data, so we experimented with factual data from a real department store with context information. The recommendation procedure of U-market proposed in this paper is divided into four major phases. First phase is collecting and preprocessing data for analysis of shopping patterns of customers. The traits of shopping patterns are expressed as feature matrices of N dimension. On second phase, the similar shopping patterns are grouped into clusters and the representative pattern of each cluster is derived. The distance between shopping patterns is calculated by Projected Pure Euclidean Distance (Shahabi and Banaei-Kashani, 2003). Third phase finds a representative pattern that is similar to a target customer, and at the same time, the shopping information of the customer is traced and saved dynamically. Fourth, the next store is recommended based on the physical distance between stores of representative patterns and the present location of target customer. In this research, we have evaluated the accuracy of recommendation method based on a factual data derived from a department store. There are technological difficulties of tracking on a real-time basis so we extracted purchasing related information and we added on context information on each transaction. As a result, recommendation based on FM model that applies purchasing and context information is more stable and accurate compared to that of vector model. Additionally, we could find more precise recommendation result as more shopping information is accumulated. Realistically, because of the limitation of ubiquitous environment realization, we were not able to reflect on all different kinds of context but more explicit analysis is expected to be attainable in the future after practical system is embodied.