• Title/Summary/Keyword: delphi research

Search Result 640, Processing Time 0.03 seconds

A Study of the Evaluating Method for the Survivability of Aircraft during Mission Completion (임무수행 경과에 따른 항공기 생존성 평가기법 연구)

  • 윤봉수
    • Journal of the military operations research society of Korea
    • /
    • v.22 no.2
    • /
    • pp.166-181
    • /
    • 1996
  • Aircraft survivability is determined by the susceptibility and the vulnerability. The aircraft susceptibility and vulnerability depend upon the hardware and software factors. Each of the hardware and software factors consisted of the qualitative and quantitative attributes varies according to the time of the mission. In order to establish the mathermatical model to analyze and evaluate the aircraft survivability, qualitative factors have to be transformed into quantitative factors. Even if many researches in the area of dynamic concept analysis and conversion of qualitative factors into the quantitative factors has been insufficient. This research enhances these insufficient area by developing a reliable aircarft survivability analysis method. The major areas of this research are as follows. First, a method for the conversion of the qualitative factors into the quantitative factors is developed by combining the Fuzzy Set Theory concept and the Delphi Technique. Second, by using the stochastic network diagram for the dynamic survivability analysis, the aircraft survivability and the probability of kill are calculated from the state probability for the situation during mission. The advantage of the analysis technique developed in this research includes ease of use and flexibility. In other words, in any given aircraft's mission execution under any variable probability density function, the developed computer program is able to analyze and evaluate the aircraft survivability.

  • PDF

Policy Measures to Promote Eco-Friendly Vehicle Industry in Korea (우리나라 친환경자동차산업 활성화를 위한 정책방안)

  • Kim, Hyejung;Park, Sun Kyoung
    • Journal of Climate Change Research
    • /
    • v.8 no.1
    • /
    • pp.41-50
    • /
    • 2017
  • As serious consequences of climate change became indisputable, vehicles based on fossil fuel has to be shifted toward more sustainable way to drastically reduce carbon emissions. Eco-friendly vehicles contribute mitigating climate change through reducing the greenhouse gas emissions. The goal of this research is to find ways to promote the eco-friendly vehicle industry in Korea. In order to achieve this goal, surveys are collected from the professionals of eco-friendly vehicle industry, and analyzed through Delphi method. Results show that the first thing is to promote the eco-friendly vehicle market by introducing the economic incentives. The second thing is to allow more emission credit for eco-friendly vehicle manufacturers. The third thing is to build more concrete infrastructure for the eco-friendly vehicles. The increase of the number of the electric or hydrogen charging system would be one of the good examples of the infrastructure. The fourth thing is that the government supports the research & development of eco-friendly vehicles. The fifth is to regulate that the government agency is mandatory to use the eco-friendly vehicles. The sixth thing is to provide the low-carbon certification for eco-friendly vehicles. The seventh thing is to support advertising the eco-friendly vehicles. The results from this research can be used as a guideline to make policies to stimulate the eco-friendly vehicle industry in Korea.

A Study on the GUI Design of Fashion Customizing Web : Centered on Custom Knitware (패션 커스터마이징 웹 GUI디자인연구 : 커스텀 니트웨어를 중심으로)

  • Jang, Hui-Su;Nam, Won-Suk
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.4
    • /
    • pp.124-137
    • /
    • 2020
  • The need for customized products has also been increasing as more active consumers consume according to their values in recent years. Accordingly, fashion customizing web is becoming popular, but because custom freedom is low, we want to increase custom freedom by applying knitwear. To this end, a theoretical review was conducted through prior research and literature research on customization, knit design, and GUI, and based on this, a case analysis was conducted focusing on knit-making programs and fashion customizing web. Knit designs have more considerations than other fashion design process, resulting in more UIs, so users should use visual elements that are easily recognizable. Therefore, a draft assessment item was derived based on the preceding survey and three Delphi surveys were conducted on experts based on the draft. Each item was modified and deleted during the Delphi research process to produce the Custom Knitware Web GUI Design Guide. Through this study, we were able to identify the need for intuitive understanding and application of knit custom functions in GUI design of custom knitwear web. Through this research, it is expected that this data will be used to improve the usability of custom knitwear websites and to refer to knit design fields that utilize knit machines.

Water Management Vulnerability Assessment Considering Climate Change in Korea (기후변화에 따른 우리나라 물 관리의 취약성 평가)

  • Kim, Yeon-Kyu;Yoo, Jeong-A;Chung, Eun-Sung
    • Journal of Climate Change Research
    • /
    • v.3 no.1
    • /
    • pp.1-12
    • /
    • 2012
  • In order to use as basic data of adaptation, this study focused on a 'Water management vulnerability estimation' in Korea. Vulnerability is estimated dividing into flood mitigation and water resource management. Temporal resolution is 2000 year and the future 2020 year, 2050 year, 2100 year via A1B scenario. Time series data was normalized. Then weight that is gotten through delphi investigation was multiplied. Vulnerability is calculated through this process. In flood mitigation vulnerability, it was estimated to adaptation ability affect relatively biggest influence. In future, some area of Gangwon-do was analyzed that the flood mitigation vulnerability increases. In water resource management, it was estimated to climate exposure affect relatively biggest influence. At 2020 yr, there is a trend toward increased in the Chungcheongbuk-do and DaeJeon, Daegu, some area of Gyeongsangnamdo. Because this study evaluate relative vulnerability of whole country and analyzed spatial distribution, when local government establishes climate change adaptation details enforcement countermeasure, this study can give help to grasp whether should invest more in some field.

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.

A Quantitative Assessment Model for Data Governance (Data Governance 정량평가 모델 개발방법의 제안)

  • Jang, Kyoung-Ae;Kim, Woo-Je
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.42 no.1
    • /
    • pp.53-63
    • /
    • 2017
  • Managing the quantitative measurement of the data control activities in enterprise wide is important to secure management of data governance. However, research on data governance is limited to concept definitions and components, and data governance research on evaluation models is lacking. In this study, we developed a model of quantitative assessment for data governance including the assessment area, evaluation index and evaluation matrix. We also, proposed a method of developing the model of quantitative assessment for data governance. For this purpose, we used previous studies and expert opinion analysis such as the Delphi technique, KJ method in this paper. This study contributes to literature by developing a quantitative evaluation model for data governance at the early stage of the study. This paper can be used for the base line data in objective evidence of performance in the companies and agencies of operating data governance.

Current and Future R&D Manpower Requirements and Policy Recommendations in the Korean Oriental Medicine Research Area (한의학 분야 연구개발 인력의 수급전망 및 정책제안)

  • Suh, Chang-Jin;Chang, Dong-Min
    • Journal of Society of Preventive Korean Medicine
    • /
    • v.13 no.1
    • /
    • pp.1-11
    • /
    • 2009
  • To strengthen the R&D capability and the competitiveness of the Korean oriental medicine industry, an adequate supply of qualified R&D personnel including medical doctors of Korean oriental medicine is an important precondition. This study analyze current and future R&D manpower requirements including medical doctors in the Korean oriental medicine research area. Our analyses can be utilized for developing the government R&D manpower planning including the adequate supply of medical doctors for the Korean oriental medicine research. For the study, we conducted and analyzed a delphi survey of the experts, the principal investigators, with expertise in Korean oriental medicine research areas. The results of this study can be summarized as follows; First, in 2007 the Korean oriental medicine R&D personnel is currently under-supplied as many as 302 people including 111 medical doctors of Korean oriental medicine. The rate of under-supplied is 28.2%. Second, in 2017 the forecast shows that the R&D personnel in this area will be more severely under-supplied as many as 539 people including 185 medical doctor of Korean oriental medicine. The rate of under-supplied will be 32.6%. As a result, the confrontation of demand and supply forecasts shows that, in general, severe shortages of R&D manpower in the areas of Korean oriental medicine will result if there are not adequate manpower policy adjustment.

  • PDF

A Study on the Development of Core Competency Diagnostic Tools for Professors at A' University

  • Soo-Min PARK;Tae-Chang RYU
    • The Journal of Economics, Marketing and Management
    • /
    • v.11 no.4
    • /
    • pp.31-39
    • /
    • 2023
  • Purpose: This study attempted to systematize a support system that can enhance teaching core competencies by establishing a scale for diagnosing teaching core competencies at University A. Research design, data and methodology : To this end, the first Delphi was conducted With six experts related to university core competency modeling research by extracting factors and designing structured questionnaires through a literature review process that collects and analyzes prior research related to domestic and foreign university teaching competency. The derived questions were diagnosed on 27 professors, and independent sample t-verification and ANOVA were conducted using SPSS 24.0 for analysis by key teaching competency factors. Result: What is the standard suitability of KMO. It was shown as 929 (KMO standard conformity value is close to 1), and Barlett's sphericity verification showed χ2=5773.295, df=1081, p<.It appeared as 001 and confirmed that it was suitable for conducting factor analysis. Conclusions: The core competencies of A University teachers were set based on the educational goals of A University, such as basic teaching competency, creative teaching competency, practical teaching competency, and communication teaching competency. This means that the concept and factors of the core competency of professors are likely to change, and in the end, continuous efforts to upgrade and apply research on core competency of professors are essential to quickly and organically respond to changes in competency required to increase the competitiveness of universities.

A Delphi Study of Standardization Strategies for Disruptive Technologies (파괴적 기술 분야에 대한 표준화 전략 연구: 전문가 델파이 조사를 중심으로)

  • Eom, Doyoung;Kim, Dong-hyu;Lee, Heejin
    • Journal of Korea Technology Innovation Society
    • /
    • v.19 no.3
    • /
    • pp.483-510
    • /
    • 2016
  • Disruptive technology is increasingly gaining attention by industries, standards development organizations (SDOs), academia, government and regulatory bodies due to its massive scope of impact on the incumbents and consumers. Companies that take a lead in new technologies intend to dominate the global market by making their technologies into an international standard. However, they tend to seek ways of by-passing the slow procedures of formal SDOs that often hinder prompt action in response to rapid changes in technology and market situations. In the area of disruptive technologies, there is a need to harmonize standardization efforts in formal SDOs for various companies and stakeholders to reap the benefits of technological development and diffusion of innovation. This paper examines the reasons why standardization is more active using market-based mechanisms than through formal SDOs for disruptive technologies. We conducted a Delphi study to investigate standardization strategies in the area of disruptive technologies. This research found that experts understood the core element of disruptive technologies as creating new markets and changing the competition basis in existing industries through the transformation of consumers' behavior. Based on these core characteristics, experts agreed that flexibility and speed are the most important factors for standardization. Results also show that the perception that standardization activities are not directly connected to companies' profit-making is the key barrier to links between research and companies' participation in standardization. This research provides implications for formal SDOs and policymakers.

Strategy for Improving Forestland Classification System in Korea (산지이용구분제도의 개선방안 연구)

  • Park, Young-Kyu;Jeon, Jun-Heon;Roh, Hye-Jung
    • Journal of Korean Society of Forest Science
    • /
    • v.98 no.6
    • /
    • pp.780-790
    • /
    • 2009
  • The objective of this study was to analyze 'Forestland Classification System' in Korea and to develop a strategy for its improvement. A survey was conducted in this study based on the Delphi technique, one of the interactive survey method relying on a panel of experts. The result indicated that the existing 'Forestland Classification System' was initiated for reasonable management of forestland, but now it turned into one of the most strict management restrictions. To improve forestland management in Korea, it was suggested to adopt 'Forest Function System' in this study. Moreover, to avoid indiscreet landuse conversion that might be occurred by substituting the 'Forest Function System' for the 'Forestland Classification System', it was suggested to adopt 'Forestland Conversion Propriety Assessment System'. In fact, landuse conversion has been regulated by the 'Environmental Impact Assessment System', but this system appeared inadequate to be applied to the forested area. Illegal acts for having permission of landuse conversion for reserved forests was another big issue in the forestland management. For example, alteration of the reserved status of forests or partition into patches smaller than the size limit has been attempted. Thus in this study, it was strongly recommended to take sanction against such illegal acts. In order to enhance the efficiency of forestland management, it was also suggested to integrate administrative agencies related to the landuse conversion or to take over the charge to local governments.