• Title/Summary/Keyword: internet control

Search Result 3,608, Processing Time 0.034 seconds

Relationships Among Employees' IT Personnel Competency, Personal Work Satisfaction, and Personal Work Performance: A Goal Orientation Perspective (조직구성원의 정보기술 인적역량과 개인 업무만족 및 업무성과 간의 관계: 목표지향성 관점)

  • Heo, Myung-Sook;Cheon, Myun-Joong
    • Asia pacific journal of information systems
    • /
    • v.21 no.4
    • /
    • pp.63-104
    • /
    • 2011
  • The study examines the relationships among employee's goal orientation, IT personnel competency, personal effectiveness. The goal orientation includes learning goal orientation, performance approach goal orientation, and performance avoid goal orientation. Personal effectiveness consists of personal work satisfaction and personal work performance. In general, IT personnel competency refers to IT expert's skills, expertise, and knowledge required to perform IT activities in organizations. However, due to the advent of the internet and the generalization of IT, IT personnel competency turns out to be an important competency of technological experts as well as employees in organizations. While the competency of IT itself is important, the appropriate harmony between IT personnel's business capability and technological capability enhances the value of human resources and thus provides organizations with sustainable competitive advantages. The rapid pace of organization change places increased pressure on employees to continually update their skills and adapt their behavior to new organizational realities. This challenge raises a number of important questions concerning organizational behavior? Why do some employees display remarkable flexibility in their behavioral responses to changes in the organization, whereas others firmly resist change or experience great stress when faced with the need to alter behavior? Why do some employees continually strive to improve themselves over their life span, whereas others are content to forge through life using the same basic knowledge and skills? Why do some employees throw themselves enthusiastically into challenging tasks, whereas others avoid challenging tasks? The goal orientation proposed by organizational psychology provides at least a partial answer to these questions. Goal orientations refer to stable personally characteristics fostered by "self-theories" about the nature and development of attributes (such as intelligence, personality, abilities, and skills) people have. Self-theories are one's beliefs and goal orientations are achievement motivation revealed in seeking goals in accordance with one's beliefs. The goal orientations include learning goal orientation, performance approach goal orientation, and performance avoid goal orientation. Specifically, a learning goal orientation refers to a preference to develop the self by acquiring new skills, mastering new situations, and improving one's competence. A performance approach goal orientation refers to a preference to demonstrate and validate the adequacy of one's competence by seeking favorable judgments and avoiding negative judgments. A performance avoid goal orientation refers to a preference to avoid the disproving of one's competence and to avoid negative judgements about it, while focusing on performance. And the study also examines the moderating role of work career of employees to investigate the difference in the relationship between IT personnel competency and personal effectiveness. The study analyzes the collected data using PASW 18.0 and and PLS(Partial Least Square). The study also uses PLS bootstrapping algorithm (sample size: 500) to test research hypotheses. The result shows that the influences of both a learning goal orientation (${\beta}$ = 0.301, t = 3.822, P < 0.000) and a performance approach goal orientation (${\beta}$ = 0.224, t = 2.710, P < 0.01) on IT personnel competency are positively significant, while the influence of a performance avoid goal orientation(${\beta}$ = -0.142, t = 2.398, p < 0.05) on IT personnel competency is negatively significant. The result indicates that employees differ in their psychological and behavioral responses according to the goal orientation of employees. The result also shows that the impact of a IT personnel competency on both personal work satisfaction(${\beta}$ = 0.395, t = 4.897, P < 0.000) and personal work performance(${\beta}$ = 0.575, t = 12.800, P < 0.000) is positively significant. And the impact of personal work satisfaction(${\beta}$ = 0.148, t = 2.432, p < 0.05) on personal work performance is positively significant. Finally, the impacts of control variables (gender, age, type of industry, position, work career) on the relationships between IT personnel competency and personal effectiveness(personal work satisfaction work performance) are partly significant. In addition, the study uses PLS algorithm to find out a GoF(global criterion of goodness of fit) of the exploratory research model which includes a mediating variable, IT personnel competency. The result of analysis shows that the value of GoF is 0.45 above GoFlarge(0.36). Therefore, the research model turns out be good. In addition, the study performs a Sobel Test to find out the statistical significance of the mediating variable, IT personnel competency, which is already turned out to have the mediating effect in the research model using PLS. The result of a Sobel Test shows that the values of Z are all significant statistically (above 1.96 and below -1.96) and indicates that IT personnel competency plays a mediating role in the research model. At the present day, most employees are universally afraid of organizational changes and resistant to them in organizations in which the acceptance and learning of a new information technology or information system is particularly required. The problem is due' to increasing a feeling of uneasiness and uncertainty in improving past practices in accordance with new organizational changes. It is not always possible for employees with positive attitudes to perform their works suitable to organizational goals. Therefore, organizations need to identify what kinds of goal-oriented minds employees have, motivate them to do self-directed learning, and provide them with organizational environment to enhance positive aspects in their works. Thus, the study provides researchers and practitioners with a matter of primary interest in goal orientation and IT personnel competency, of which they have been unaware until very recently. Some academic and practical implications and limitations arisen in the course of the research, and suggestions for future research directions are also discussed.

The effect of reading strategies developing through reciprocal teaching on reading comprehension, metacognition, self efficacy (상보적 수업을 활용한 읽기전략 훈련이 독해력, 초인지, 자기효능감에 미치는 효과)

  • Kim, Mi-Jeong;Eun, Hyuk-Gi
    • The Korean Journal of Elementary Counseling
    • /
    • v.11 no.2
    • /
    • pp.299-320
    • /
    • 2012
  • We have information through a variety of media such as language, pictures and internet. Since we get information through texts mostly, we can say that reading ability which enables a person to read a text and understand its meaning basically is the most essential for people to possess. Taking the advantage of the fact that a school is a place where learning and daily-life guidance can be made at the same time, we need to try encouraging students to involve in learning process and feel a sense of accomplishment by adding consultation between a teacher and a student or between a student and a student in Korean subject. This study selected two fifth grade classes of an elementary school of small and medium-sized city as an experimental group and a control group respectively and applied reading strategy program by using interaction of complementary lesson as the number of ten times during five weeks. It focused on making students interested in complementary class and encouraging them to become active participants. This study's goal is to see if the reading strategy program affects students' reading comprehension, metacognition and a sense of self-efficacy The results of the study are as in the following: first, the reading strategy program of complementary lesson is effective in students' reading comprehension and a range of factual understanding and sentimental understanding. Second, the reading strategy program of complementary lesson is effective in adjustment area as a subordinate factor of metacognition. Third, the reading strategy program of complementary lessonis effective in students' sense of self-efficacy. It is shown that experience of using new reading strategy and successful experience and help in peer-group members have a positive effects on a student's sense of self-efficacy. Forth, as the result of satisfaction evaluation over the program with the students' activity report and researchers' observation results, the study shows that the organization and operation of the program influences on students' effort and participation to reach the goal together positively. Through the results as above, we can say that the reading strategy program of complementary lesson have a positive effect on a student's reading comprehension, metacognition and a sense of self-efficacy.

  • PDF

A Study on the Real Condition and the Improvement Directions for the Protection of Industrial Technology (산업기술 보호 관리실태 및 발전방안에 관한 연구)

  • Chung, Tae-Hwang;Chang, Hang-Bae
    • Korean Security Journal
    • /
    • no.24
    • /
    • pp.147-170
    • /
    • 2010
  • This study is to present a improvement directions for the protection of industrial key technology. For the purpose of the study, the survey was carried out on the administrative security activity of 68 enterprises including Large companies, small-midium companies and public corporations. survey result on the 10 items of security policy, 10 items of personal management and 7 items of the assets management are as follows; First, stable foundation for the efficient implement of security policy is needed. Carrying a security policy into practice and continuous upgrade should be fulfilled with drawing-up of the policy. Also for the vitalization of security activity, arrangement of security organization and security manager are needed with mutual assistance in the company. Periodic security inspection should be practiced for the improvement of security level and security understanding. Second, the increase of investment for security job is needed for security invigoration. Securing cooperation channel with professional security facility such as National Intelligence Service, Korea internet & security agency, Information security consulting company, security research institute is needed, also security outsourcing could be considered as the method of above investment. Especially small-midium company is very vulnerable compared with Large company and public corporation in security management, so increase of government's budget for security support system is necessary. Third, human resource management is important, because the main cause of leak of confidential information is person. Regular education rate for new employee and staff members is relatively high, but the vitalization of security oath for staff members and the third party who access to key technology is necessary. Also access right to key information should be changed whenever access right changes. Reinforcement of management of resigned person such as security oath, the elimination of access right to key information and the deletion of account. is needed. Forth, the control and management of important asset including patent and design should be tightened. Classification of importance of asset and periodic inspection are necessary with the effects evaluation of leak of asset.

  • PDF

Interaction Between TCP and MAC-layer to Improve TCP Flow Performance over WLANs (유무선랜 환경에서 TCP Flow의 성능향상을 위한 MAC 계층과 TCP 계층의 연동기법)

  • Kim, Jae-Hoon;Chung, Kwang-Sue
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.2
    • /
    • pp.99-111
    • /
    • 2008
  • In recent years, the needs for WLANs(Wireless Local Area Networks) technology which can access to Internet anywhere have been dramatically increased particularly in SOHO(Small Office Home Office) and Hot Spot. However, unlike wired networks, there are some unique characteristics of wireless networks. These characteristics include the burst packet losses due to unreliable wireless channel. Note that burst packet losses, which occur when the distance between the wireless station and the AP(Access Point) increase or when obstacles move temporarily between the station and AP, are very frequent in 802.11 networks. Conversely, due to burst packet losses, the performance of 802.11 networks are not always as sufficient as the current application require, particularly when they use TCP at the transport layer. The high packet loss rate over wireless links can trigger unnecessary execution of TCP congestion control algorithm, resulting in performance degradation. In order to overcome the limitations of WLANs environment, MAC-layer LDA(Loss Differentiation Algorithm)has been proposed. MAC-layer LDA prevents TCP's timeout by increasing CRD(Consecutive Retry Duration) higher than burst packet loss duration. However, in the wireless channel with high packet loss rate, MAC-layer LDA does not work well because of two reason: (a) If the CRD is lower than burst packet loss duration due to the limited increase of retry limit, end-to-end performance is degraded. (b) energy of mobile device and bandwidth utilization in the wireless link are wasted unnecessarily by Reducing the drainage speed of the network buffer due to the increase of CRD. In this paper, we propose a new retransmission module based on Cross-layer approach, called BLD(Burst Loss Detection) module, to solve the limitation of previous link layer retransmission schemes. BLD module's algorithm is retransmission mechanism at IEEE 802.11 networks and performs retransmission based on the interaction between retransmission mechanisms of the MAC layer and TCP. From the simulation by using ns-2(Network Simulator), we could see more improved TCP throughput and energy efficiency with the proposed scheme than previous mechanisms.

Study of Motion-induced Dose Error Caused by Irregular Tumor Motion in Helical Tomotherapy (나선형 토모테라피에서 불규칙적인 호흡으로 발생되는 움직임에 의한 선량 오차에 대한 연구)

  • Cho, Min-Seok;Kim, Tae-Ho;Kang, Seong-Hee;Kim, Dong-Su;Kim, Kyeong-Hyeon;Cheon, Geum Seong;Suh, Tae Suk
    • Progress in Medical Physics
    • /
    • v.26 no.3
    • /
    • pp.119-126
    • /
    • 2015
  • The purpose of this study is to analyze motion-induced dose error generated by each tumor motion parameters of irregular tumor motion in helical tomotherapy. To understand the effect of the irregular tumor motion, a simple analytical model was simulated. Moving cases that has tumor motion were divided into a slightly irregular tumor motion case, a large irregular tumor motion case and a patient case. The slightly irregular tumor motion case was simulated with a variability of 10% in the tumor motion parameters of amplitude (amplitude case), period (period case), and baseline (baseline case), while the large irregular tumor motion case was simulated with a variability of 40%. In the phase case, the initial phase of the tumor motion was divided into end inhale, mid exhale, end exhale, and mid inhale; the simulated dose profiles for each case were compared. The patient case was also investigated to verify the motion-induced dose error in 'clinical-like' conditions. According to the simulation process, the dose profile was calculated. The moving case was compared with the static case that has no tumor motion. In the amplitude, period, baseline cases, the results show that the motion-induced dose error in the large irregular tumor motion case was larger than that in the slightly irregular tumor motion case or regular tumor motion case. Because the offset effect was inversely proportion to irregularity of tumor motion, offset effect was smaller in the large irregular tumor motion case than the slightly irregular tumor motion case or regular tumor motion case. In the phase case, the larger dose discrepancy was observed in the irregular tumor motion case than regular tumor motion case. A larger motion-induced dose error was also observed in the patient case than in the regular tumor motion case. This study analyzed motion-induced dose error as a function of each tumor motion parameters of irregular tumor motion during helical tomotherapy. The analysis showed that variability control of irregular tumor motion is important. We believe that the variability of irregular tumor motion can be reduced by using abdominal compression and respiratory training.

Trend and future prospect on the development of technology for electronic security system (기계경비시스템의 기술 변화추세와 개발전망)

  • Chung, Tae-Hwang;So, Sung-Young
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.225-244
    • /
    • 2009
  • Electronic security system is composed mainly of electronic-information-communication device, so system technology, configuration and management of the electronic security system could be affected by the change of information-communication environment. This study is to propose the future prospect on the development of technique for electronic security system through the analysis of the trend and the actual condition on the development of technique. This study is based on literature study and interview with user and provider of electronic security system, also survey was carried out by system provider and members of security integration company to come up with more practical result. Hybrid DVR technology that has multi-function such as motion detection, target tracking and image identification is expected to be developed. And 'Embedded IP camera' technology that internet server and image identification software are built in. Those technologies could change the configuration and management of CCTV system. Fingerprint identification technology and face identification technology are continually developed to get more reliability, but continual development of surveillance and three-dimension identification technology for more efficient face identification system is needed. As radio identification and tracking function of RFID is appreciated as very useful for access control system, hardware and software of RFID technology is expected to be developed, but government's support for market revitalization is necessary. Behavior pattern identification sensor technology is expected to be developed and could replace passive infrared sensor that cause system error, giving security guard firm confidence for response. The principle of behavior pattern identification is similar to image identification, so those two technology could be integrated with tracking technology and radio identification technology of RFID for total monitoring system. For more efficient electronic security system, middle-ware's role is very important to integrate the technology of electronic security system, this could make possible of installing the integrated security system.

  • PDF

A digital Audio Watermarking Algorithm using 2D Barcode (2차원 바코드를 이용한 오디오 워터마킹 알고리즘)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.2
    • /
    • pp.97-107
    • /
    • 2011
  • Nowadays there are a lot of issues about copyright infringement in the Internet world because the digital content on the network can be copied and delivered easily. Indeed the copied version has same quality with the original one. So, copyright owners and content provider want a powerful solution to protect their content. The popular one of the solutions was DRM (digital rights management) that is based on encryption technology and rights control. However, DRM-free service was launched after Steve Jobs who is CEO of Apple proposed a new music service paradigm without DRM, and the DRM is disappeared at the online music market. Even though the online music service decided to not equip the DRM solution, copyright owners and content providers are still searching a solution to protect their content. A solution to replace the DRM technology is digital audio watermarking technology which can embed copyright information into the music. In this paper, the author proposed a new audio watermarking algorithm with two approaches. First, the watermark information is generated by two dimensional barcode which has error correction code. So, the information can be recovered by itself if the errors fall into the range of the error tolerance. The other one is to use chirp sequence of CDMA (code division multiple access). These make the algorithm robust to the several malicious attacks. There are many 2D barcodes. Especially, QR code which is one of the matrix barcodes can express the information and the expression is freer than that of the other matrix barcodes. QR code has the square patterns with double at the three corners and these indicate the boundary of the symbol. This feature of the QR code is proper to express the watermark information. That is, because the QR code is 2D barcodes, nonlinear code and matrix code, it can be modulated to the spread spectrum and can be used for the watermarking algorithm. The proposed algorithm assigns the different spread spectrum sequences to the individual users respectively. In the case that the assigned code sequences are orthogonal, we can identify the watermark information of the individual user from an audio content. The algorithm used the Walsh code as an orthogonal code. The watermark information is rearranged to the 1D sequence from 2D barcode and modulated by the Walsh code. The modulated watermark information is embedded into the DCT (discrete cosine transform) domain of the original audio content. For the performance evaluation, I used 3 audio samples, "Amazing Grace", "Oh! Carol" and "Take me home country roads", The attacks for the robustness test were MP3 compression, echo attack, and sub woofer boost. The MP3 compression was performed by a tool of Cool Edit Pro 2.0. The specification of MP3 was CBR(Constant Bit Rate) 128kbps, 44,100Hz, and stereo. The echo attack had the echo with initial volume 70%, decay 75%, and delay 100msec. The sub woofer boost attack was a modification attack of low frequency part in the Fourier coefficients. The test results showed the proposed algorithm is robust to the attacks. In the MP3 attack, the strength of the watermark information is not affected, and then the watermark can be detected from all of the sample audios. In the sub woofer boost attack, the watermark was detected when the strength is 0.3. Also, in the case of echo attack, the watermark can be identified if the strength is greater and equal than 0.5.

The Effect of Traditional Market Attributes and Service Quality on Visiting Intention: Focusing on Hygiene Factor Moderating Effect (전통시장 속성 및 서비스품질이 방문의도에 미치는 영향: 위생요인조절효과를 중심으로)

  • Jeon, Gye Hwa;Ha, Kyu Soo
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.13 no.5
    • /
    • pp.29-39
    • /
    • 2018
  • Recently, In traditional markets, visitors are declining. The reason is the growth of large stores and Internet shopping malls. The government continues to support and policy to revitalize traditional markets. Government support has been focused on the selective attributes of traditional markets. However, the purchase intention of users in traditional markets is lowered. The reason is that it is in the hygiene of the traditional market. This study analyzed whether the optional attributes of traditional markets and service quality increase the intention of visit, In addition, the users of the traditional market analyzed the hygiene factor as an important factor in the intention of the visit. The results of the analysis is First, convenience, accessibility, transparency, attractiveness, and economic feasibility of selective attributes of traditional markets were analyzed to affect the intention to visit. Second, the merchant efficiency, the display efficiency, the product efficiency, and the transaction efficiency of the service quality of the traditional market influence on the visit intention. However, facility efficiency was not found to have any effect. Third, merchant hygiene factors, facility hygiene factors, and commodity hygiene factors were found to affect the intention to visit. These traditional market hygiene factors were analyzed to control the intention to visit. Therefore, it can be said that the hygiene factor of the traditional market plays a role in raising the intention of visiting the traditional market in activating the traditional market. The conclusion is that merchants and support groups should be prioritized in order to revitalize traditional markets. The importance of environmental hygiene is introduced and implications for research results are suggested.

Success Factors of the Supdari(A Wooden Bridge) Restoration in Jeonju-River through Citizens' Initiative (적극적 주민참여를 통한 전통문화시설 복원 성공요인 분석 - 전주천 섶다리 놓기 사업을 중심으로 -)

  • Kim, Sang-Wook;Kim, Gil-Joong
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.28 no.1
    • /
    • pp.93-101
    • /
    • 2010
  • This paper aims to analyze success factors for the construction of Supdari(a traditional wooden bridge to connect small streams temporarily), which is a citizens' initiative project to revitalize local community in Jeonju-River, Jeonju City. Recently Supdari has been restored for the use of belongings in local festivals. But Jeonju-River Supdari was designed and built to unite local citizens and connect river-divided villages. This project shows how investing social capital like Supdari makes the community vitalize through citizen's active participation. As a citizen leading project, there were several critical factors for sucess. At first, there were some noticeable ways to encourage local citizen's participation in online and offline. In the online, the Supdari internet cafe introduced what is a Supdari, how to make it and where we build using various media of UCCs and photos. In the offline, the small scaled model of Supdari was made and exhibited in the entrance of the village and related several seminars were hosted to discuss how to construct Supdari with citizens, local assembly men and public officials together. The Second is the movement to restore traditional and cultural resources for the community recovery triggered the supports from local councils and many civic groups. Civic groups supported ecological and structural expertise to guarantee environment friendly and stable construction. And local councils mediated citizen's and administrative office's opinions. The third is flexible administrative management to help citizen's ideas to be realized. Officials extended setting period of Supdari on the condition with the civic-control safety management.

Nutrition Knowledge and Utilization of Information on Fast Food of Secondary School Students (대도시 중.고등학생의 패스트푸드에 대한 영양지식 및 정보 활용)

  • Lyu, Eun-Soon;Bae, Eun-Young;Her, Eun-Sil;Lee, Kyung-Hea
    • Journal of the Korean Society of Food Science and Nutrition
    • /
    • v.36 no.6
    • /
    • pp.727-734
    • /
    • 2007
  • The purpose of this study was to evaluate nutrition knowledge and utilization of information on fast food of secondary school students in the two biggest cities, Seoul and Busan. Questionnaires were distributed to a total of 1,265 students (645 at 10 middle schools, 620 at 10 high schools). An average rate of correct answers on nutrition knowledge of fast food was 73.4%. General nutrition knowledge on fast food showed high percentage of correct answers, but the knowledge of vitamin and fiber on fast food was of low percentage. The scores of nutrition knowledge, the fast food (ie. chicken, pizza, gimbab, dukbokki, and ramyon) intake group with $'{\geq}1$ time/week' showed significantly (p<0.01) lower scores than those of the group with $'{\leq}1$ time/month'. The groups with higher interest in health and weight control had significantly (p<0.05) higher scores on nutrition knowledge than those of lower interest groups. Only 19.6% of the subjects had the experience of using the nutrition information for selecting fast food, but 66% of them wanted the developments of the internet-sites to provide information on fast food and on the relationship between fast food and health.