• Title/Summary/Keyword: interest theory

Search Result 801, Processing Time 0.028 seconds

Educational Needs Analysis on NCS-based Intellectual Property Education (국가직무능력표준(NCS) 기반 지식재산교육을 위한 교육요구 분석)

  • Park, Ki-Moon
    • 대한공업교육학회지
    • /
    • v.43 no.1
    • /
    • pp.134-157
    • /
    • 2018
  • This study surveyed and analyzed satisfaction and issues about an intellectual property education system, and educational needs for intellectual property NCS (intellectual property management, intellectual property information survey analysis, intellectual property assessment trade), in order to introduce and operate NCS-based education system that trains practical manpower in the field. The results of this study are as follows. First, satisfaction for intellectual property education system showed education contents (M=3.86), followed by lecture (M=3.79), teaching method and environment (M=3.66) and education assessment (M=3.50). The issues to be improved are low application in the current occupation due to no reflection of demands of industrial fields, as well as insufficient education contents system, lectures who fall short of education capability and interactions with students tend to stress theoretical knowledge more than practical ability, teaching method lacks application of educational medium, insufficient interest and motivation, assessment methods that fall short of theoretical knowledge and practical ability achievement, and that is theory-centered. Second, educational needs for intellectual property NCS showed intellectual property assessment trade (4.33), followed by intellectual property management (3.68), and intellectual property information survey analysis (2.99), which should be reviewed to reform or newly develop NCS-based education course. Conclusively, intellectual property education showed satisfaction above the average, but a job-centered education is demanded to elevate application in the industrial field, which puts emphasis more on practical ability than theory. For this, it is necessary to introduce intellectual property NCS reflecting demands of industrial field, and to reform or newly develop into NCS-based education course. In addition, intellectual property education needs to be operated by changed education paradigm, such as user-centered teaching method, not provided-centered, and performance and course-centered assessment method, not theoretical knowledge-centered.

A Study on the K-REITs of Characteristic Analysis by Investment Type (K-REITs(부동산투자회사)의 투자 유형별 특성 분석)

  • Kim, Sang-Jin;Lee, Myenog-Hun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.66-79
    • /
    • 2016
  • A discussion has recently emerged over the increase of approvals of K-REITs, which is concluded on the basis of how to raise funds for business activity, fulfill the expected rate of return and maximize the management of managing investment funds. In addition, corporations need to acknowledge the necessity of the capital structure reflected in the current economic environment and decision-making processes. This research analyzed the characteristics by investment types and influence factors about the debt ratio of K-REITs. The data were collected from general management about business state, investment, and finance from 2002 to 2015 in K-REITs (except for the GFC period of 2007~2009). The results of the research demonstrated the high ratios of the largest shareholder characteristics, which are corporation, pension funds, mutual funds, banks, securities, insurance, and, recently, the increasing ratio of the largest shareholder and major stockholder. The investment of K-REITs is increasing the role of institutional investors that take a leading development of K-REITs. The behaviors of simultaneous investment of institutional investors were analyzed to show that they received higher interest rates than other financial institutions and ran in parallel with attraction and compensation. The results of the multiple regressions analysis, utilizing variables about debt ratio were as follows. The debt ratio showed a negative (-) relation that profitability is increasing, which matches the pecking order theory and trade off theory. On the other hand, investment opportunities (growth potential) showed a negative (-) relation and assets scale that indicated a positive (+) relation. The research results are reflected as follows. K-REITs focused on private equity REITs more than public offering REITs, and in the case of financing the capital of others, loan capital is operated under the guarantee of tangible assets (most of real estate) more than financing of the stock market. Further, after the GFC, the capital of others was actively utilized in K-REITs business, and the debt ratio showed that the determinant factors by the ratio and characteristics of the largest shareholder and investment products.

Analysis on the Policy Network in the Defense Industry Exportation Support Policy: Focusing on the Success of the T-50 Exportation to Indonesia (방산수출 지원정책에 관한 정책네트워크 연구: T-50 인도네시아 수출 성공사례를 중심으로)

  • Jun, Jongho
    • Journal of Technology Innovation
    • /
    • v.24 no.1
    • /
    • pp.113-142
    • /
    • 2016
  • T-50 exportation to Indonesia embodied an objective of governmental policy and became a catalyst accelerating the exportation of domestic defense industries. Defense industry exportation is recognized as a new growth engine creating economic interests and it became an important policy of the government. This study will suggest an effective direction for the support policy of the defense industry exportation through analysis on factors behind the success of the T-50 exportation to indonesia in the view of policy network. Policy network theory has its efficacy and workability in analyzing what kind of results are yielded from each policy actor's attributes and their interaction during the execution and establishment of the support policy for the defense exportation. The type of policy network of the T-50 exportation to Indonesia was a policy community. Many governmental ministries, defense industry which is the group of interest, and experts from the research institutes have established the Korea Defense Trade Support Center(KODITS) for accomplishing common policy goal with mutually shared sentiment, and sought for a strategy for the success of the defense industry exportation having official and unofficial meeting centering around the KODITS. Although there were oppositions and conflicts among major actors, though forming a cooperative relationship among majority of the actors, policy-wise decision making for the exportation of the T-50 to Indonesia was efficiently carried out. The cooperative relationship was the key in the success of the T-50 exportation. Considering that the policy community from cooperative mutual interaction is efficient in reaching the goal of the defense industry exportation support policy, this study suggests operating government-wise temporary Task Force(TF) to succeed in big exportation projects such as the T-X exportation to the U.S. In addition, institutional and procedural supplementation such as regular meetings among the head of related governmental ministries and etc. are required in order to enhance the mutually cooperative relationship withing the TF.

Learning Material Bookmarking Service based on Collective Intelligence (집단지성 기반 학습자료 북마킹 서비스 시스템)

  • Jang, Jincheul;Jung, Sukhwan;Lee, Seulki;Jung, Chihoon;Yoon, Wan Chul;Yi, Mun Yong
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.2
    • /
    • pp.179-192
    • /
    • 2014
  • Keeping in line with the recent changes in the information technology environment, the online learning environment that supports multiple users' participation such as MOOC (Massive Open Online Courses) has become important. One of the largest professional associations in Information Technology, IEEE Computer Society, announced that "Supporting New Learning Styles" is a crucial trend in 2014. Popular MOOC services, CourseRa and edX, have continued to build active learning environment with a large number of lectures accessible anywhere using smart devices, and have been used by an increasing number of users. In addition, collaborative web services (e.g., blogs and Wikipedia) also support the creation of various user-uploaded learning materials, resulting in a vast amount of new lectures and learning materials being created every day in the online space. However, it is difficult for an online educational system to keep a learner' motivation as learning occurs remotely, with limited capability to share knowledge among the learners. Thus, it is essential to understand which materials are needed for each learner and how to motivate learners to actively participate in online learning system. To overcome these issues, leveraging the constructivism theory and collective intelligence, we have developed a social bookmarking system called WeStudy, which supports learning material sharing among the users and provides personalized learning material recommendations. Constructivism theory argues that knowledge is being constructed while learners interact with the world. Collective intelligence can be separated into two types: (1) collaborative collective intelligence, which can be built on the basis of direct collaboration among the participants (e.g., Wikipedia), and (2) integrative collective intelligence, which produces new forms of knowledge by combining independent and distributed information through highly advanced technologies and algorithms (e.g., Google PageRank, Recommender systems). Recommender system, one of the examples of integrative collective intelligence, is to utilize online activities of the users and recommend what users may be interested in. Our system included both collaborative collective intelligence functions and integrative collective intelligence functions. We analyzed well-known Web services based on collective intelligence such as Wikipedia, Slideshare, and Videolectures to identify main design factors that support collective intelligence. Based on this analysis, in addition to sharing online resources through social bookmarking, we selected three essential functions for our system: 1) multimodal visualization of learning materials through two forms (e.g., list and graph), 2) personalized recommendation of learning materials, and 3) explicit designation of learners of their interest. After developing web-based WeStudy system, we conducted usability testing through the heuristic evaluation method that included seven heuristic indices: features and functionality, cognitive page, navigation, search and filtering, control and feedback, forms, context and text. We recruited 10 experts who majored in Human Computer Interaction and worked in the same field, and requested both quantitative and qualitative evaluation of the system. The evaluation results show that, relative to the other functions evaluated, the list/graph page produced higher scores on all indices except for contexts & text. In case of contexts & text, learning material page produced the best score, compared with the other functions. In general, the explicit designation of learners of their interests, one of the distinctive functions, received lower scores on all usability indices because of its unfamiliar functionality to the users. In summary, the evaluation results show that our system has achieved high usability with good performance with some minor issues, which need to be fully addressed before the public release of the system to large-scale users. The study findings provide practical guidelines for the design and development of various systems that utilize collective intelligence.

Game Theoretic Optimization of Investment Portfolio Considering the Performance of Information Security Countermeasure (정보보호 대책의 성능을 고려한 투자 포트폴리오의 게임 이론적 최적화)

  • Lee, Sang-Hoon;Kim, Tae-Sung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.37-50
    • /
    • 2020
  • Information security has become an important issue in the world. Various information and communication technologies, such as the Internet of Things, big data, cloud, and artificial intelligence, are developing, and the need for information security is increasing. Although the necessity of information security is expanding according to the development of information and communication technology, interest in information security investment is insufficient. In general, measuring the effect of information security investment is difficult, so appropriate investment is not being practice, and organizations are decreasing their information security investment. In addition, since the types and specification of information security measures are diverse, it is difficult to compare and evaluate the information security countermeasures objectively, and there is a lack of decision-making methods about information security investment. To develop the organization, policies and decisions related to information security are essential, and measuring the effect of information security investment is necessary. Therefore, this study proposes a method of constructing an investment portfolio for information security measures using game theory and derives an optimal defence probability. Using the two-person game model, the information security manager and the attacker are assumed to be the game players, and the information security countermeasures and information security threats are assumed as the strategy of the players, respectively. A zero-sum game that the sum of the players' payoffs is zero is assumed, and we derive a solution of a mixed strategy game in which a strategy is selected according to probability distribution among strategies. In the real world, there are various types of information security threats exist, so multiple information security measures should be considered to maintain the appropriate information security level of information systems. We assume that the defence ratio of the information security countermeasures is known, and we derive the optimal solution of the mixed strategy game using linear programming. The contributions of this study are as follows. First, we conduct analysis using real performance data of information security measures. Information security managers of organizations can use the methodology suggested in this study to make practical decisions when establishing investment portfolio for information security countermeasures. Second, the investment weight of information security countermeasures is derived. Since we derive the weight of each information security measure, not just whether or not information security measures have been invested, it is easy to construct an information security investment portfolio in a situation where investment decisions need to be made in consideration of a number of information security countermeasures. Finally, it is possible to find the optimal defence probability after constructing an investment portfolio of information security countermeasures. The information security managers of organizations can measure the specific investment effect by drawing out information security countermeasures that fit the organization's information security investment budget. Also, numerical examples are presented and computational results are analyzed. Based on the performance of various information security countermeasures: Firewall, IPS, and Antivirus, data related to information security measures are collected to construct a portfolio of information security countermeasures. The defence ratio of the information security countermeasures is created using a uniform distribution, and a coverage of performance is derived based on the report of each information security countermeasure. According to numerical examples that considered Firewall, IPS, and Antivirus as information security countermeasures, the investment weights of Firewall, IPS, and Antivirus are optimized to 60.74%, 39.26%, and 0%, respectively. The result shows that the defence probability of the organization is maximized to 83.87%. When the methodology and examples of this study are used in practice, information security managers can consider various types of information security measures, and the appropriate investment level of each measure can be reflected in the organization's budget.

Personal Information Overload and User Resistance in the Big Data Age (빅데이터 시대의 개인정보 과잉이 사용자 저항에 미치는 영향)

  • Lee, Hwansoo;Lim, Dongwon;Zo, Hangjung
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.1
    • /
    • pp.125-139
    • /
    • 2013
  • Big data refers to the data that cannot be processes with conventional contemporary data technologies. As smart devices and social network services produces vast amount of data, big data attracts much attention from researchers. There are strong demands form governments and industries for bib data as it can create new values by drawing business insights from data. Since various new technologies to process big data introduced, academic communities also show much interest to the big data domain. A notable advance related to the big data technology has been in various fields. Big data technology makes it possible to access, collect, and save individual's personal data. These technologies enable the analysis of huge amounts of data with lower cost and less time, which is impossible to achieve with traditional methods. It even detects personal information that people do not want to open. Therefore, people using information technology such as the Internet or online services have some level of privacy concerns, and such feelings can hinder continued use of information systems. For example, SNS offers various benefits, but users are sometimes highly exposed to privacy intrusions because they write too much personal information on it. Even though users post their personal information on the Internet by themselves, the data sometimes is not under control of the users. Once the private data is posed on the Internet, it can be transferred to anywhere by a few clicks, and can be abused to create fake identity. In this way, privacy intrusion happens. This study aims to investigate how perceived personal information overload in SNS affects user's risk perception and information privacy concerns. Also, it examines the relationship between the concerns and user resistance behavior. A survey approach and structural equation modeling method are employed for data collection and analysis. This study contributes meaningful insights for academic researchers and policy makers who are planning to develop guidelines for privacy protection. The study shows that information overload on the social network services can bring the significant increase of users' perceived level of privacy risks. In turn, the perceived privacy risks leads to the increased level of privacy concerns. IF privacy concerns increase, it can affect users to from a negative or resistant attitude toward system use. The resistance attitude may lead users to discontinue the use of social network services. Furthermore, information overload is mediated by perceived risks to affect privacy concerns rather than has direct influence on perceived risk. It implies that resistance to the system use can be diminished by reducing perceived risks of users. Given that users' resistant behavior become salient when they have high privacy concerns, the measures to alleviate users' privacy concerns should be conceived. This study makes academic contribution of integrating traditional information overload theory and user resistance theory to investigate perceived privacy concerns in current IS contexts. There is little big data research which examined the technology with empirical and behavioral approach, as the research topic has just emerged. It also makes practical contributions. Information overload connects to the increased level of perceived privacy risks, and discontinued use of the information system. To keep users from departing the system, organizations should develop a system in which private data is controlled and managed with ease. This study suggests that actions to lower the level of perceived risks and privacy concerns should be taken for information systems continuance.

Literature Review and Analysis on Research Trends of Sociology in the Journal of Korean Gerontological Society (한국노년학의 사회학 분야 연구동향)

  • Kim, Ju-Hyun;Yeom, Jihye;Kim, Tae-il
    • 한국노년학
    • /
    • v.38 no.3
    • /
    • pp.745-766
    • /
    • 2018
  • The purpose of this study is to examine the research trends regarding the published articles in the Journal of Korean Gerongological Society within the past 10 years. This study is based on the article written by Won and Mo (2008). This article classified previously published studies into themes, methods, and application of theory. Out of the total of 187 articles published in the past 10 years, 11 articles were about social change and institution, 94 articles were about social issues, 12 articles were about social problems and deviation, 42 articles were about social culture, 14 papers were about gerontological theory and 13 papers were about residence/architecture. In the last 10 years, the most popular topic was around the various ways aging. New topic that emerged was the effect of IT and technology on the quality of life among the older adults. Other topics that gained interest were age discrimination and prejudice on aging. Trends in research methods showed increased use of qualitative methods. In the future, more research needs to be completed to theorize the results of quantitative research. Furthermore, the use of qualitative research methods needs to be increased in order to understand the lives of older adults in depth. Through more meta analysis, the results of past research articles should be synthesized to get a bigger picture of the Korean older adults.

Kobong(高峯)'s Philophy and the theory of Self-cultivation(修養) (고봉(高峯)의 성리학(性理學)과 수양론(修養論))

  • Kang, Heui Bok
    • The Journal of Korean Philosophical History
    • /
    • no.31
    • /
    • pp.33-52
    • /
    • 2011
  • This study intends to understand Kobong's thought, especially the problem of Self-cultivation. Kobong, along with Toegye(退溪), is a major figure to understand Confucian ideas of Chosun in the 16th century. There has been a lot of research centered on Kobong's Four-beginnings(四端) and Seven-emotions(七情), but not much on the Self-cultivation of Kobong. Confucianism is basically to seek after actualization of Perfect Virtue(仁) and the way to be a sage, through the pursuit of self-discipline(修己 明明德) and social practice(安人 新民). The problems of Confucianism might be summarized as follows: interest and appreciation for the source of existence(知天/事天); harmony in relationships and practices(愛人/愛物); both of the above together. Therefore, Self-cultivation is to change the self, the subject of one's life, through the relationship between man and heaven. Kobong and Toegye had debated for about eight years(1559-1566) over the problem of human nature, especially emotion(情), and virtue and vice(善惡) fundamental position of Toegye is that the difference between Four-beginnings(四端) and Seven-emotions(七情) can be understood as emotion with qualitative distinction. By contrast, Kobong sees the relationship between Four-beginnings(四端) and Seven-emotions(七情) as that of total and partial. Discussion on the Four-beginnings(四端) and Seven-emotions(七情) is not restricted within the problem of logical analysis of concepts or theoretical validity, but come to a conclusion with the problem of Self-cultivation(修養). In this sense, Kobong tried to follow Neo-Confucian theory of human nature and self-cultivation, on the assumption of Confucian self-discipline and social practice.

Seongdam Song Hwan-gi's Understanding of Buddhism (성담(性潭) 송환기(宋煥箕)의 불교인식)

  • Kim, Jong-soo
    • Journal of the Daesoon Academy of Sciences
    • /
    • v.38
    • /
    • pp.209-242
    • /
    • 2021
  • This manuscript started with the purpose of producing research that investigated and verified how Buddhism was understood by Seongdam (性潭) Song Hwan-gi (宋煥箕), the founder (宗匠) of Horon (湖論) who was active around the early 19 th century. Song Hwan-gi, Uam (尤菴) Song Si-yeol (宋時烈)'s fifth generation, was a scholar who had a deep sense of duty to inherit the Theory of Uam (尤菴學), and he adhered to the Confucian theory of genealogy (道統論) and Anti-Heresy Discourses. Thus, this manuscript expressed curiosity about Song Hwan-gi's understanding of Buddhism, which was the representative heresy. This manuscript examined the naming method of Buddhist clergy (僧侶), degree of pedagogical knowledge, and critical statements that were made concerning Buddhist tales (說話). Meanwhile, it is noticeable that the terms of address for Buddhist clergy were composed of four categories: general terms, honorific forms, palanquins [輿], and miscellaneous terms of address. This scheme conforms to the Buddhist-friendly aspects of Song Hwan-gi. Examples of these terms of address include Danseung (擔僧) and Yeoseung (輿僧), both of which were Buddhist clergy who carried palanquins. Naturally, Song Hwan-gi was helped by Buddhist clergy when he went sightseeing on famous mountains. In the meantime, Song Hwan-gi's pedagogical knowledge can be shown to be not especially profound based on his understanding of The Diamond Sutra, The Avatamska Sutra, and The Shurangama Sutra. Cheongnyansan Travel Records (淸凉山遊覽錄) and Dongyu Diary (東遊日記) make it clear that Song Hwan-gi had no interest in taking refuge in the three treasures of Buddhism (佛法僧 三寶). It is rather the case that he was deeply critical of Buddhism. On the other hand, Song Hwan-gi expressed profound sadness when he encountered the dilapidated remains (古蹟) of Buddhist temples and hermitages. Consequentially, it can be concluded that Song Hwan-gi's understanding of Buddhism contained examples of affirmation, acceptance, denial, and exclusion.

Pareto Ratio and Inequality Level of Knowledge Sharing in Virtual Knowledge Collaboration: Analysis of Behaviors on Wikipedia (지식 공유의 파레토 비율 및 불평등 정도와 가상 지식 협업: 위키피디아 행위 데이터 분석)

  • Park, Hyun-Jung;Shin, Kyung-Shik
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.3
    • /
    • pp.19-43
    • /
    • 2014
  • The Pareto principle, also known as the 80-20 rule, states that roughly 80% of the effects come from 20% of the causes for many events including natural phenomena. It has been recognized as a golden rule in business with a wide application of such discovery like 20 percent of customers resulting in 80 percent of total sales. On the other hand, the Long Tail theory, pointing out that "the trivial many" produces more value than "the vital few," has gained popularity in recent times with a tremendous reduction of distribution and inventory costs through the development of ICT(Information and Communication Technology). This study started with a view to illuminating how these two primary business paradigms-Pareto principle and Long Tail theory-relates to the success of virtual knowledge collaboration. The importance of virtual knowledge collaboration is soaring in this era of globalization and virtualization transcending geographical and temporal constraints. Many previous studies on knowledge sharing have focused on the factors to affect knowledge sharing, seeking to boost individual knowledge sharing and resolve the social dilemma caused from the fact that rational individuals are likely to rather consume than contribute knowledge. Knowledge collaboration can be defined as the creation of knowledge by not only sharing knowledge, but also by transforming and integrating such knowledge. In this perspective of knowledge collaboration, the relative distribution of knowledge sharing among participants can count as much as the absolute amounts of individual knowledge sharing. In particular, whether the more contribution of the upper 20 percent of participants in knowledge sharing will enhance the efficiency of overall knowledge collaboration is an issue of interest. This study deals with the effect of this sort of knowledge sharing distribution on the efficiency of knowledge collaboration and is extended to reflect the work characteristics. All analyses were conducted based on actual data instead of self-reported questionnaire surveys. More specifically, we analyzed the collaborative behaviors of editors of 2,978 English Wikipedia featured articles, which are the best quality grade of articles in English Wikipedia. We adopted Pareto ratio, the ratio of the number of knowledge contribution of the upper 20 percent of participants to the total number of knowledge contribution made by the total participants of an article group, to examine the effect of Pareto principle. In addition, Gini coefficient, which represents the inequality of income among a group of people, was applied to reveal the effect of inequality of knowledge contribution. Hypotheses were set up based on the assumption that the higher ratio of knowledge contribution by more highly motivated participants will lead to the higher collaboration efficiency, but if the ratio gets too high, the collaboration efficiency will be exacerbated because overall informational diversity is threatened and knowledge contribution of less motivated participants is intimidated. Cox regression models were formulated for each of the focal variables-Pareto ratio and Gini coefficient-with seven control variables such as the number of editors involved in an article, the average time length between successive edits of an article, the number of sections a featured article has, etc. The dependent variable of the Cox models is the time spent from article initiation to promotion to the featured article level, indicating the efficiency of knowledge collaboration. To examine whether the effects of the focal variables vary depending on the characteristics of a group task, we classified 2,978 featured articles into two categories: Academic and Non-academic. Academic articles refer to at least one paper published at an SCI, SSCI, A&HCI, or SCIE journal. We assumed that academic articles are more complex, entail more information processing and problem solving, and thus require more skill variety and expertise. The analysis results indicate the followings; First, Pareto ratio and inequality of knowledge sharing relates in a curvilinear fashion to the collaboration efficiency in an online community, promoting it to an optimal point and undermining it thereafter. Second, the curvilinear effect of Pareto ratio and inequality of knowledge sharing on the collaboration efficiency is more sensitive with a more academic task in an online community.