• Title/Summary/Keyword: disclosure system

Search Result 279, Processing Time 0.025 seconds

The Study on the Influence of Capstone Design & Field Training on Employment Rate: Focused on Leaders in INdustry-university Cooperation(LINC) (캡스톤디자인 및 현장실습이 취업률에 미치는 영향: 산학협력선도대학(LINC)을 중심으로)

  • Park Namgue
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.18 no.4
    • /
    • pp.207-222
    • /
    • 2023
  • In order to improve employment rates, most universities operate programs to strengthen students' employment and entrepreneurship, regardless of whether they are selected as the Leading Industry-Innovative University (LINC) or not. In particular, in the case of non-metropolitan universities are risking their lives to improve employment rates. In order to overcome the limitations of university establishment type and university location, which absolutely affect the employment rate, we are operating a startup education & startup support program in order to strengthen employment and entrepreneurship, and capstone design & field training as industry-academia-linked education programs are always available. Although there are studies on effectiveness verification centered on LINC (Leaders in Industry-University Cooperation) in previous studies, but a longitudinal study was conducted on all factors of university factors, startup education & startup support, and capstone design & field training as industry-university-linked education programs as factors affecting the employment rate based on public disclosure indicators. No cases of longitudinal studies were reported. This study targets 116 universities that satisfy the conditions based on university disclosure indicators from 2018 to 2020 that were recently released on university factors, startup education & startup support, and capstone design & field training as industry-academia-linked education programs as factors affecting the employment rate. We analyzed the differences between the LINC (Leaders in Industry-University Cooperation) 51 participating universities and 64 non-participating universities. In addition, considering that there is no historical information on the overlapping participation of participating students due to the limitations of public indicators, the Exposure Effect theory states that long-term exposure to employment and entrepreneurship competency enhancement programs will affect the employment rate through competency enhancement. Based on this, the effectiveness of the 2nd LINC+ (socially customized Leaders in Industry-University Cooperation) was verified from 2017 to 2021 through a longitudinal causal relationship analysis. As a result of the study, it was found that the startup education & startup support and capstone design & field training as industry-academia-linked education programs of the 2nd LINC+ (socially customized Leaders in Industry-University Cooperation) did not affect the employment rate. As a result of the longitudinal causal relationship analysis, it was reconfirmed that universities in metropolitan areas still have higher employment rates than universities in non-metropolitan areas due to existing university factors, and that private universities have higher employment rates than national universities. Among employment and entrepreneurship competency strengthening programs, the number of people who complete entrepreneurship courses, the number of people who complete capstone design, the amount of capstone design payment, and the number of dedicated faculty members partially affect the employment rate by year, while field training has no effect at all by year. It was confirmed that long-term exposure to the entrepreneurship capacity building program did not affect the employment rate. Therefore, it was reconfirmed that in order to improve the employment rate of universities, the limitations of non-metropolitan areas and national and public universities must be overcome. To overcome this, as a program to strengthen employment and entrepreneurship capabilities, it is important to strengthen entrepreneurship through participation in entrepreneurship lectures and actively introduce and be confident in the capstone design program that strengthens the concept of PBL (Problem Based Learning), and the field training program improves the employment rate. In order for actually field training affect of the employment rate, it is necessary to proceed with a substantial program through reorganization of the overall academic system and organization.

  • PDF

Methods of Record Management for Head of Local Government (광역자치단체장의 기록 관리 방안 연구)

  • Lee, Young-eun
    • The Korean Journal of Archival Studies
    • /
    • no.27
    • /
    • pp.35-88
    • /
    • 2011
  • This study suggested the methods of record management for the heads of local government, which would be the most valuable among local records. In order to conduct a systematic record management for the heads of local government, this study suggested the methods of establishing a record management system regarding regulation arrangement, production registration, preservation, utilization and services. First of all, in order to estimate the record category of the heads of local government, the study examined the duties of the offices of the deputy heads of local government, secretary's offices and information offices, which have been subsidiary & assistance branches in charge of producing the record. In addition, it investigated the present conditions of record management for the heads of local government through the interviews with secretary offices and information offices belonging to 16 cities and provinces and the claims for information disclosure and found out the following problems. They included incomplete record production, non-registration of produced records, abolition of records and taking them out of designated places with due notice, record preservation period regardless of the term of the heads of local government, varied preservation period for the records of the heads of local government by local self-government, short preservation period of primary records and non-management of home pages after the term of the heads of local government. To solve such problems, the study suggested the regulation arrangement for record management and a record management system. The regulation arrangement could be obtained through the establishment of the administrative organization setup condolence etiquette enforcement regulation and the recorders in local government and the revision of operation rules and through the revision of the reference plan for operation rules enactment of recorders from National Archives of Korea. As for the record management system, the study suggested the establishment of production, registration and preservation system of records for the heads of local government and the utilization and services of their records. In order to produce and register the records, the unit assignments should be founded by department in charge of the duties related to the records of the heads of local government on record management criteria, thus letting the staff surely produce and register the records. In terms of utilization and services of the records, the study suggested the use of websites and drawing up the record list, through which each record viewer would be able to figure out which records have been managed through the list services and which services could be given to the residents, thus letting the residents and the heads of local government who finished their term of duties use the records.

Management and Use of Oral History Archives on Forced Mobilization -Centering on oral history archives collected by the Truth Commission on Forced Mobilization under the Japanese Imperialism Republic of Korea- (강제동원 구술자료의 관리와 활용 -일제강점하강제동원피해진상규명위원회 소장 구술자료를 중심으로-)

  • Kwon, Mi-Hyun
    • The Korean Journal of Archival Studies
    • /
    • no.16
    • /
    • pp.303-339
    • /
    • 2007
  • "The damage incurred from forced mobilization under the Japanese Imperialism" means the life, physical, and property damage suffered by those who were forced to lead a life as soldiers, civilians attached to the military, laborers, and comfort women forcibly mobilized by the Japanese Imperialists during the period between the Manchurian Incident and the Pacific War. Up to the present time, every effort to restore the history on such a compulsory mobilization-borne damage has been made by the damaged parties, bereaved families, civil organizations, and academic circles concerned; as a result, on March 5, 2004, Disclosure act of Forced Mobilization under the Japanese Imperialism[part of it was partially revised on May 17, 2007]was officially established and proclaimed. On the basis of this law, the Truth Commission on Forced Mobilization under the Japanese Imperialism Republic of Korea[Compulsory Mobilization Commission hence after] was launched under the jurisdiction of the Prime Minister on November 10, 2004. Since February 1, 2005, this organ has begun its work with the aim of looking into the real aspects of damage incurred from compulsory mobilization under the Japanese Imperialism, by which making the historical truth open to the world. The major business of this organ is to receive the damage report and investigation of the reported damage[examination of the alleged victims and bereaved families, and decision-making], receipt of the application for the fact-finding & fact finding; fact finding and matters impossible to make judgment; correction of a family register subsequent to the damage judgement; collection & analysis of data concerning compulsory mobilization at home and from abroad and writing up of a report; exhumation of the remains, remains saving, their repatriation, and building project for historical records hall and museum & memorial place, etc. The Truth Commission on Compulsory Mobilization has dug out and collected a variety of records to meet the examination of the damage and fact finding business. As is often the case with other history of damage, the records which had already been made open to the public or have been newly dug out usually have their limits to ascertaining of the diverse historical context involved in compulsory mobilization in their quantity or quality. Of course, there may happen a case where the interested parties' story can fill the vacancy of records or has its foundational value more than its related record itself. The Truth Commission on Compulsory mobilization generated a variety of oral history records through oral interviews with the alleged damage-suffered survivors and puts those data to use for examination business, attempting to make use of those data for public use while managing those on a systematic method. The Truth Commission on compulsory mobilization-possessed oral history archives were generated based on a drastic planning from the beginning of their generation, and induced digital medium-based production of those data while bearing the conveniences of their management and usage in mind from the stage of production. In addition, in order to surpass the limits of the oral history archives produced in the process of the investigating process, this organ conducted several special training sessions for the interviewees and let the interviewees leave their real context in time of their oral testimony in an interview journal. The Truth Commission on compulsory mobilization isn't equipped with an extra records management system for the management of the collected archives. The digital archives are generated through the management system of the real aspects of damage and electronic approval system, and they plays a role in registering and searching the produced, collected, and contributed records. The oral history archives are registered at the digital archive and preserved together with real records. The collected oral history archives are technically classified at the same time of their registration and given a proper number for registration, classification, and keeping. The Truth Commission on compulsory mobilization has continued its publication of oral history archives collection for the positive use of them and is also planning on producing an image-based matters. The oral history archives collected by this organ are produced, managed and used in as positive a way as possible surpassing the limits produced in the process of investigation business and budgetary deficits as well as the absence of records management system, etc. as the form of time-limit structure. The accumulated oral history archives, if a historical records hall and museum should be built as regulated in Disclosure act of forced mobilization, would be more systematically managed and used for the public users.

Current Trend of European Competition Damage Actions (유럽 경쟁법상 손해배상 청구제도의 개편 동향과 그 시사점)

  • Lee, Se-In
    • Journal of Legislation Research
    • /
    • no.53
    • /
    • pp.525-551
    • /
    • 2017
  • This Article discusses the current trend of European competition damage actions focused on the recent Damage Directive and its transposition by the United Kingdom and Germany. The relevant Directive was signed into law in November 2014, and it requires the EU Member States to adopt certain measures to support competition damage actions. The required measures and principles by the Directive include right to full compensation, rebuttable presumption of harm, extensive disclosure of evidence, use of pass-on for defense and indirect purchaser suits. Although many Member States did not meet the deadline to transpose the Directive, the end of 2016, it is reported that 23 Member States have now, as of September 2017, made enactments according to the Directive. When we look at the transposition done by the United Kingdom and Germany, the revisions on their competition laws closely follow the contents of the Directive. However, it will take quite a long time before the amended provisions apply to actual cases since most of the new provisions apply to the infringement that take place after the date of the amendment. A similar situation regarding application time may happen in some other Member States. Furthermore, even if the terms of the competition laws of the Member States become similar following the Directive, the interpretations of the laws may differ by the courts of different countries. EU also does not have a tool to coordinate the litigations that are brought in different Member States under the same facts. It is true that the EU made a big step to enhance competition damage actions by enacting Damage Directive. However, it needs to take more time and resources to have settled system of competition private litigation throughout the Member States. Korea has also experienced increase in competition damage actions during the last fifteen years, and there have been some revisions of the relevant fair trade law as well as development of relevant legal principles by court decisions. Although there are some suggestions that Korea should have more enactments similar to the EU Directive, its seems wiser for Korea to take time to observe how EU countries actually operate competition damage actions after they transposed the Directive. Then, it will be able to gain some wisdom to adopt competition action measures that are suitable for Korean legal system and culture.

Analysis of a Cross-cutting Issue, 'Access to Genetic Resources and Benefit-sharing' of the Conference of the Parties to the Convention on Biological Diversity (생물다양성협약 당사국회의의 핵심논제인 '유전자원에 대한 접근과 이익의 공유'에 관한 고찰)

  • Park, Yong-Ha
    • Journal of Environmental Policy
    • /
    • v.6 no.1
    • /
    • pp.41-60
    • /
    • 2007
  • Attempts were made to define the elements of debates, impact of decisions of the Access to Genetic Resources and Benefit-sharing(ABS) of the Conference of the Parties(COP) to the Convention on Biological Diversity(CBD) In Korea. Providing policy suggestions to cope with ABS, a cross-cutting issue of the meetings of the COP, was also undertaken. Meetings concerning ABS deal with several key matters such as an international regime, which is a legally binding implementation tool of the Bonn Guidelines, an international certificate of genetic resources' origin/source/legal provenance, and disclosure of origin of genetic resources, compliance measures with prior informed consent of the Contracting Parties providing such resources and with mutually agreed terms on which access was granted. Developing countries, rich in biodiversity and genetic resources, use the CBD as a major tool to maximize their national profits. They demand for national sovereign rights for the genetic resources and indigenous communities providing associated traditional knowledge. At the meetings of the COP, in addition, they requested that developed countries should transfer technologies and provide a financial mechanism for resource conservation to them. On the contrary, the developed countries argue that facilitating access to genetic resources is essential for scientific research and development, and that both Intellectual Property Rights and biotechnology using genetic resources should be protected to maximize their national benefits. Decisions of the COP concerning the Bonn Guidelines and compliance measures with ABS will affect on various socioeconomic fields of Korea, a country which is short of genetic resources. Especially, the importation of genetic resources and land development which might damage genetic resources will be limited seriously. Consequently, overall expenses will increase for the securing genetic resources from the foreign countries and developing biotechnology for conservation and sustainable uses of genetic resources. To minimize the adverse impacts, we endeavor to establish our clear standpoint and to lead the international trends, which are favorable for us. In order to achieve these objectives, government needs i) to proceed researches to lead the international ABS debates actively and to prepare the expected decisions of the future meetings of the COP, ii) to establish a national implementation plan to cope with the ABS and its related decisions, iii) to examine and improve the efficiencies of the national implementation plan with a proper monitoring system, and iv) cope with the other international meetings including the meetings of Trade Related Intellectual Properly Rights and International Treaty on Plant Genetic Resources for Food and Agriculture actively.

  • PDF

A Study on Development of Education Program Using Presidential Archives for the Free Learning Semester (자유학기제에 적용가능한 대통령기록물 활용 교육프로그램 개발)

  • Song, Na-Ra;Lee, Sung Min;Kim, Yong;Oh, Hyo-Jung
    • The Korean Journal of Archival Studies
    • /
    • no.51
    • /
    • pp.89-132
    • /
    • 2017
  • The presidential records reflect the era of the times, and it has valuable evidence to support the administrative transparency and accountability of government operations. People's interest in the presidential records increased in response to its recent leak. The presidential archives were moved to Sejong in line with its desire to provide public-friendly services. This study will help users access the archives and utilize archiving information. The Ministry of Education introduced the free learning semester, which all middle schools have began conducting since 2016. The free learning semester provides an environment where education can be provided by external organizations. As middle school students are still unfamiliar with archives, the free learning semester provides a good environment for accessing archives and records. Although it serves as an opportunity to publicize archives, existing related studies are insufficient. This study aims to develop the free learning semester program using the presidential archives and records for middle school students during the free learning semester based on the analysis of the domestic and foreign archives education program. This study shows a development of the education program using presidential archives and records through literature research, domestic and foreign case analysis, and expert interview. First, through literature research, this research understood the definition of the free learning semester as well as its types. In addition, this research identified the four types of the free learning semester education program that can be linked to the presidential archives. Second, through website analysis and the information disclosure system, this research investigated domestic and foreign cases of the education program. A total of 46 education programs of institutions were analyzed, focusing on student-led education programs in the foreign archives as well as the education programs of the free learning semester in domestic libraries and archives. Third, based on these results, This study proposed four types of free learning semester education programs using the presidential archives and records, and provided concrete examples.

The Prediction of Export Credit Guarantee Accident using Machine Learning (기계학습을 이용한 수출신용보증 사고예측)

  • Cho, Jaeyoung;Joo, Jihwan;Han, Ingoo
    • Journal of Intelligence and Information Systems
    • /
    • v.27 no.1
    • /
    • pp.83-102
    • /
    • 2021
  • The government recently announced various policies for developing big-data and artificial intelligence fields to provide a great opportunity to the public with respect to disclosure of high-quality data within public institutions. KSURE(Korea Trade Insurance Corporation) is a major public institution for financial policy in Korea, and thus the company is strongly committed to backing export companies with various systems. Nevertheless, there are still fewer cases of realized business model based on big-data analyses. In this situation, this paper aims to develop a new business model which can be applied to an ex-ante prediction for the likelihood of the insurance accident of credit guarantee. We utilize internal data from KSURE which supports export companies in Korea and apply machine learning models. Then, we conduct performance comparison among the predictive models including Logistic Regression, Random Forest, XGBoost, LightGBM, and DNN(Deep Neural Network). For decades, many researchers have tried to find better models which can help to predict bankruptcy since the ex-ante prediction is crucial for corporate managers, investors, creditors, and other stakeholders. The development of the prediction for financial distress or bankruptcy was originated from Smith(1930), Fitzpatrick(1932), or Merwin(1942). One of the most famous models is the Altman's Z-score model(Altman, 1968) which was based on the multiple discriminant analysis. This model is widely used in both research and practice by this time. The author suggests the score model that utilizes five key financial ratios to predict the probability of bankruptcy in the next two years. Ohlson(1980) introduces logit model to complement some limitations of previous models. Furthermore, Elmer and Borowski(1988) develop and examine a rule-based, automated system which conducts the financial analysis of savings and loans. Since the 1980s, researchers in Korea have started to examine analyses on the prediction of financial distress or bankruptcy. Kim(1987) analyzes financial ratios and develops the prediction model. Also, Han et al.(1995, 1996, 1997, 2003, 2005, 2006) construct the prediction model using various techniques including artificial neural network. Yang(1996) introduces multiple discriminant analysis and logit model. Besides, Kim and Kim(2001) utilize artificial neural network techniques for ex-ante prediction of insolvent enterprises. After that, many scholars have been trying to predict financial distress or bankruptcy more precisely based on diverse models such as Random Forest or SVM. One major distinction of our research from the previous research is that we focus on examining the predicted probability of default for each sample case, not only on investigating the classification accuracy of each model for the entire sample. Most predictive models in this paper show that the level of the accuracy of classification is about 70% based on the entire sample. To be specific, LightGBM model shows the highest accuracy of 71.1% and Logit model indicates the lowest accuracy of 69%. However, we confirm that there are open to multiple interpretations. In the context of the business, we have to put more emphasis on efforts to minimize type 2 error which causes more harmful operating losses for the guaranty company. Thus, we also compare the classification accuracy by splitting predicted probability of the default into ten equal intervals. When we examine the classification accuracy for each interval, Logit model has the highest accuracy of 100% for 0~10% of the predicted probability of the default, however, Logit model has a relatively lower accuracy of 61.5% for 90~100% of the predicted probability of the default. On the other hand, Random Forest, XGBoost, LightGBM, and DNN indicate more desirable results since they indicate a higher level of accuracy for both 0~10% and 90~100% of the predicted probability of the default but have a lower level of accuracy around 50% of the predicted probability of the default. When it comes to the distribution of samples for each predicted probability of the default, both LightGBM and XGBoost models have a relatively large number of samples for both 0~10% and 90~100% of the predicted probability of the default. Although Random Forest model has an advantage with regard to the perspective of classification accuracy with small number of cases, LightGBM or XGBoost could become a more desirable model since they classify large number of cases into the two extreme intervals of the predicted probability of the default, even allowing for their relatively low classification accuracy. Considering the importance of type 2 error and total prediction accuracy, XGBoost and DNN show superior performance. Next, Random Forest and LightGBM show good results, but logistic regression shows the worst performance. However, each predictive model has a comparative advantage in terms of various evaluation standards. For instance, Random Forest model shows almost 100% accuracy for samples which are expected to have a high level of the probability of default. Collectively, we can construct more comprehensive ensemble models which contain multiple classification machine learning models and conduct majority voting for maximizing its overall performance.

A New Exploratory Research on Franchisor's Provision of Exclusive Territories (가맹본부의 배타적 영업지역보호에 대한 탐색적 연구)

  • Lim, Young-Kyun;Lee, Su-Dong;Kim, Ju-Young
    • Journal of Distribution Research
    • /
    • v.17 no.1
    • /
    • pp.37-63
    • /
    • 2012
  • In franchise business, exclusive sales territory (sometimes EST in table) protection is a very important issue from an economic, social and political point of view. It affects the growth and survival of both franchisor and franchisee and often raises issues of social and political conflicts. When franchisee is not familiar with related laws and regulations, franchisor has high chance to utilize it. Exclusive sales territory protection by the manufacturer and distributors (wholesalers or retailers) means sales area restriction by which only certain distributors have right to sell products or services. The distributor, who has been granted exclusive sales territories, can protect its own territory, whereas he may be prohibited from entering in other regions. Even though exclusive sales territory is a quite critical problem in franchise business, there is not much rigorous research about the reason, results, evaluation, and future direction based on empirical data. This paper tries to address this problem not only from logical and nomological validity, but from empirical validation. While we purse an empirical analysis, we take into account the difficulties of real data collection and statistical analysis techniques. We use a set of disclosure document data collected by Korea Fair Trade Commission, instead of conventional survey method which is usually criticized for its measurement error. Existing theories about exclusive sales territory can be summarized into two groups as shown in the table below. The first one is about the effectiveness of exclusive sales territory from both franchisor and franchisee point of view. In fact, output of exclusive sales territory can be positive for franchisors but negative for franchisees. Also, it can be positive in terms of sales but negative in terms of profit. Therefore, variables and viewpoints should be set properly. The other one is about the motive or reason why exclusive sales territory is protected. The reasons can be classified into four groups - industry characteristics, franchise systems characteristics, capability to maintain exclusive sales territory, and strategic decision. Within four groups of reasons, there are more specific variables and theories as below. Based on these theories, we develop nine hypotheses which are briefly shown in the last table below with the results. In order to validate the hypothesis, data is collected from government (FTC) homepage which is open source. The sample consists of 1,896 franchisors and it contains about three year operation data, from 2006 to 2008. Within the samples, 627 have exclusive sales territory protection policy and the one with exclusive sales territory policy is not evenly distributed over 19 representative industries. Additional data are also collected from another government agency homepage, like Statistics Korea. Also, we combine data from various secondary sources to create meaningful variables as shown in the table below. All variables are dichotomized by mean or median split if they are not inherently dichotomized by its definition, since each hypothesis is composed by multiple variables and there is no solid statistical technique to incorporate all these conditions to test the hypotheses. This paper uses a simple chi-square test because hypotheses and theories are built upon quite specific conditions such as industry type, economic condition, company history and various strategic purposes. It is almost impossible to find all those samples to satisfy them and it can't be manipulated in experimental settings. However, more advanced statistical techniques are very good on clean data without exogenous variables, but not good with real complex data. The chi-square test is applied in a way that samples are grouped into four with two criteria, whether they use exclusive sales territory protection or not, and whether they satisfy conditions of each hypothesis. So the proportion of sample franchisors which satisfy conditions and protect exclusive sales territory, does significantly exceed the proportion of samples that satisfy condition and do not protect. In fact, chi-square test is equivalent with the Poisson regression which allows more flexible application. As results, only three hypotheses are accepted. When attitude toward the risk is high so loyalty fee is determined according to sales performance, EST protection makes poor results as expected. And when franchisor protects EST in order to recruit franchisee easily, EST protection makes better results. Also, when EST protection is to improve the efficiency of franchise system as a whole, it shows better performances. High efficiency is achieved as EST prohibits the free riding of franchisee who exploits other's marketing efforts, and it encourages proper investments and distributes franchisee into multiple regions evenly. Other hypotheses are not supported in the results of significance testing. Exclusive sales territory should be protected from proper motives and administered for mutual benefits. Legal restrictions driven by the government agency like FTC could be misused and cause mis-understandings. So there need more careful monitoring on real practices and more rigorous studies by both academicians and practitioners.

  • PDF

The Framework of Research Network and Performance Evaluation on Personal Information Security: Social Network Analysis Perspective (개인정보보호 분야의 연구자 네트워크와 성과 평가 프레임워크: 소셜 네트워크 분석을 중심으로)

  • Kim, Minsu;Choi, Jaewon;Kim, Hyun Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.1
    • /
    • pp.177-193
    • /
    • 2014
  • Over the past decade, there has been a rapid diffusion of electronic commerce and a rising number of interconnected networks, resulting in an escalation of security threats and privacy concerns. Electronic commerce has a built-in trade-off between the necessity of providing at least some personal information to consummate an online transaction, and the risk of negative consequences from providing such information. More recently, the frequent disclosure of private information has raised concerns about privacy and its impacts. This has motivated researchers in various fields to explore information privacy issues to address these concerns. Accordingly, the necessity for information privacy policies and technologies for collecting and storing data, and information privacy research in various fields such as medicine, computer science, business, and statistics has increased. The occurrence of various information security accidents have made finding experts in the information security field an important issue. Objective measures for finding such experts are required, as it is currently rather subjective. Based on social network analysis, this paper focused on a framework to evaluate the process of finding experts in the information security field. We collected data from the National Discovery for Science Leaders (NDSL) database, initially collecting about 2000 papers covering the period between 2005 and 2013. Outliers and the data of irrelevant papers were dropped, leaving 784 papers to test the suggested hypotheses. The co-authorship network data for co-author relationship, publisher, affiliation, and so on were analyzed using social network measures including centrality and structural hole. The results of our model estimation are as follows. With the exception of Hypothesis 3, which deals with the relationship between eigenvector centrality and performance, all of our hypotheses were supported. In line with our hypothesis, degree centrality (H1) was supported with its positive influence on the researchers' publishing performance (p<0.001). This finding indicates that as the degree of cooperation increased, the more the publishing performance of researchers increased. In addition, closeness centrality (H2) was also positively associated with researchers' publishing performance (p<0.001), suggesting that, as the efficiency of information acquisition increased, the more the researchers' publishing performance increased. This paper identified the difference in publishing performance among researchers. The analysis can be used to identify core experts and evaluate their performance in the information privacy research field. The co-authorship network for information privacy can aid in understanding the deep relationships among researchers. In addition, extracting characteristics of publishers and affiliations, this paper suggested an understanding of the social network measures and their potential for finding experts in the information privacy field. Social concerns about securing the objectivity of experts have increased, because experts in the information privacy field frequently participate in political consultation, and business education support and evaluation. In terms of practical implications, this research suggests an objective framework for experts in the information privacy field, and is useful for people who are in charge of managing research human resources. This study has some limitations, providing opportunities and suggestions for future research. Presenting the difference in information diffusion according to media and proximity presents difficulties for the generalization of the theory due to the small sample size. Therefore, further studies could consider an increased sample size and media diversity, the difference in information diffusion according to the media type, and information proximity could be explored in more detail. Moreover, previous network research has commonly observed a causal relationship between the independent and dependent variable (Kadushin, 2012). In this study, degree centrality as an independent variable might have causal relationship with performance as a dependent variable. However, in the case of network analysis research, network indices could be computed after the network relationship is created. An annual analysis could help mitigate this limitation.