• Title/Summary/Keyword: personal development

Search Result 2,895, Processing Time 0.033 seconds

A CASE STUDY: HOW TO ADDRESS THE CRITICAL ISSUE OF EMPLOYABILITY FOR CONSTRUCTION PROFESSION STUDENTS

  • Paul Watson;Richard Davis
    • International conference on construction engineering and project management
    • /
    • 2007.03a
    • /
    • pp.346-355
    • /
    • 2007
  • Employability is a critical issue in construction education. Employability is more than students obtaining employment upon graduation. The concept is far more ranging, and should encompass enabling students to acquire the knowledge, personal and professional skills and encouraging attitudes that will support their future development and employment. This paper describes two case studies relating to how the true concept of employability can be incorporated into the construction higher education curriculum. Case study 1 was a collaborative venture with contributions from a higher education provider, employers, students and a professional body (Association of Building Engineers). It outlines the whole process from course inception through to graduation and feedback. Thus it presents a valid model for other higher education providers of construction courses to adapt or adopt. Case study 2 outlines how the opportunity of a degree programme revalidation process was utilized to introduce modules which would enhance students' employability on graduation.

  • PDF

Organizational Design for New Product Architecture Development: Comparative Analysis of Sharp and Casio on PDA Development (신규 제품아키텍처 개발을 위한 기업조직의 설계: PDA 개발에 있어 샤프와 카시오의 개발조직 비교 분석)

  • Wi John-H.
    • Journal of Technology Innovation
    • /
    • v.14 no.1
    • /
    • pp.1-30
    • /
    • 2006
  • The purpose of this paper is to analyze the organizational design and management of product development in creating new product architecture by an established firm. For the purpose, the paper put up the organizational design in the process of PDA(Personal Digital Assistant) development of Sharp and Casio which were Japanese major PDA firms in 1990s. PDA is the product born through architectural change from Electronic Organizer. Prior research on the product architecture change and organizational adaptation emphasized that an established firm is difficult to adapt to new product architecture due to the restriction of prior technology or organizational inertia. For overcoming these problems and successful development of new product architecture, organizational design and management in the process of product development becomes essential. In case of Sharp, corporate development project team had been used to overcome the restrictions from architectural knowledge accumulated through previous product. After launching first new PDA by corporate development project team, Sharp created a new division and pushed an evolution of PDA, when new PDA market start to grow up rapidly toward a major market segmentation. As a result, Sharp was able to build up stable PDA project trajectory. However, Casio was late for three years in launching of new PDA architecture because previous division charging of Electronic Organizer tried to develop first new PDA. Casio's PDA development was prohibited by engineers of previous division because new PDA architecture was inferior on user interface and display definition. That is, Casio's first PDA development was restricted by architectural knowledge of previous product.

  • PDF

Composition and Use of Biosafety Level 3 Facility (생물안전 3등급 연구시설의 구성 및 이용)

  • Kim, Changhwan;Hur, Gyeunghaeng;Lee, Wangeol;Jung, Seongtae
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.18 no.3
    • /
    • pp.335-342
    • /
    • 2015
  • Laboratory facilities for biology are designed as biosafety level 1, biosafety level 2, biosafety level 3, and biosafety level 4. Biosafety level designations are based on a composite of the design features, construction, containment facilities, equipment, practice and operation procedures required for working with agents from the various risk groups. Generally, biosafety level 3 means the facility that is appropriate for the experiments using pathogens which can cause serious diseases by aerosol transmission. The biosafety level assigned for the specific work to be done is driven by professional judgement based on a risk assessment, rather than by automatic assignment according to the particular risk group designation of the pathogenic agents to be used. In this paper, we introduced the biosafety level 3 facility operated in ADD(Agency for defense development). It contains the overview of facility, microbiological experiment, animal experiment, decontamination and waste disposal. Biosafety level 3 laboratory in ADD has served the vital role in the research of biological agents and antidote development.

A Study of the Diagnosis of the Health of University Library Organizations (대학도서관 조직건강성 진단에 관한 연구)

  • Yoon Yung Dai
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.19
    • /
    • pp.63-112
    • /
    • 1990
  • The environment of the modern library is changing rapidly with advancements in information technology, massive increse in information, and with the changing needs of users for information in order to keep up with developments in science and technology. The library should also be in a constant state of change in accordance with the changing environment. But the current situation is that library organizations in Korea do not show any change. Here arises the need to diagnose the health of these organization. Organizational innovations can be achieved either by change in the organizational structure or administrative methods or in personal attitudes. In making organizational innovations, however, it is not sufficient only to change the organizational structure or the administrative methods without changing personal attitudes. The purpose of this thesis is to diagnose the health of university library organizations in Korea and to suggest prescriptions based on the results of this diagnosis, by means of organization development theory. In this study, the action research model and the diagnostic model were developed for the health of university library organization in Korea. The action research model consisted of 3 steps: diagnosis, intervention and evaluation. The diagnostic model comprised diagnostic criterion and diagnostic indicators. The health of an organization was selected as the diagnostic criterion. Diagnostic indicators were divided into 3 levels: personal job-satisfaction at the individual level, cohesiveness at the group level, and the organizational climate at the organizational level. Both the interview and the questionaire were used as diagnostic methods. The questionaire form was designed according to the Likert typle 5-point scale. For the investigation, 10 university libraries were selected from the private universities in Seoul, and questionaire sheets were sent to their 156 librarians and responses were received from 116 persons. An interview was carried out with a selected chief of departments of the library concerned. The results of the diagnosis show that the average personal job­satisfaction was 3.57, the group cohesiveness was 3.15 and organizational climate was 2.93, and accordingly the comprehensive health indicator was 3.22. The health of university library organizations in Korea was generally on the decline at all 3 levels. In particular, the organizational climate was in a very weak state. Most problems concern dissatisfaction with personnel policy, communications and non-professionally qualified directors. As the prescriptions, the following was suggested: institutionalization of the staff meeting for resolving problems with communication, appointement of professional directors, performance appraisal, conferring faculty status for librarians, and a suggest system. And for the improvement of the organizational climate, managerial grid training was suggested as one of the educational strategies for organizational development.

  • PDF

LIS Employment Prospects: LIS Students' Perspective (문헌정보학과 재학생의 취업전망에 대한 인식조사 연구)

  • Noh, Younghee;Ahn, In-Ja;Lee, Jongmoon;Oh, Se-Hoon
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.47 no.4
    • /
    • pp.143-167
    • /
    • 2013
  • The power of human capital in a library is the main resource that determines the level of library services, which in turn should play a pivotal role in forming the intellectual power of the country. This research conducted a survey on the employment perspectives of LIS undergraduates, which resulted as follows. First, among the LIS undergraduates, 40% of students responded that their desire was to be employed in the library as librarians. Although there were some negative opinions regarding the working environment of the industry, the undergraduates appreciated the developmental possibilities. Second, the most desired task was working with cultural programs. Third, the respondents were satisfied with the current curriculum overall, acknowledging the extra need for job search support programs, which include career support, employment-related mentoring, and internships. Fourth, the main requirements for their future employability were perceived as grade point average, language skills, obtaining licenses, internship and apprenticeship experience, and career management. Fifth, influential factors on employment decision making were divided into two aspects: environmental and personal factors. The environmental factors included salary, welfare, opportunities in personal development, workplace environment, organizational culture, and development possibilities of the organization. The personal factors included fitness with personal aptitude, the level of knowledge and technology in the job industry, social norms and acknowledgement, rewarding opportunities with their major, and location of job.

Study on Building Smart Home Testbed for Collecting Daily Health Condition based on Internet of Things (사물인터넷 기반의 일상 건강정보 수집을 위한 스마트 홈 테스트베드 구축)

  • Chae, Myungsu;Kim, Yongrok;Kim, Sangsik;Kim, Sangtae;Jung, Sungkwan
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.5
    • /
    • pp.284-292
    • /
    • 2017
  • With the development of Internet of Things (IoT) technology, the combination of ICT and medical services has been increasing to improve the quality of medical services. Using the IoTs, we can collect personal health information continuously in a patient's everyday life. We expect that this will improve the quality of medical service through analysis. However, the problem of ensuring the protection of personal information within the personal health information has been hampering the research, development, and application of such services. Other problems include lack of IoT devices and lack of user convenience for collecting health information about a patient's everyday life. Therefore, in this study, we construct a daily health information management service that can collect the health related information at any time and store this data in personal storage. This data is then only provided to the healthcare worker when necessary. We built a test bed for an IoT-based smart home platform and are currently conducting user experiments. Based on the results of this study, we are attempting to provide a high quality medical trial service based on daily health information through linkage with medical device manufacturers, medical clinics, insurance companies, etc. We expect the proposed health information management service will contribute to the revitalization of smart health care services via activating various health related IoT devices and analyzing daily health information.

A Mutual P3P Methodology for Privacy Preserving Context-Aware Systems Development (프라이버시 보호 상황인식 시스템 개발을 위한 쌍방향 P3P 방법론)

  • Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.18 no.1
    • /
    • pp.145-162
    • /
    • 2008
  • One of the big concerns in e-society is privacy issue. In special, in developing robust ubiquitous smart space and corresponding services, user profile and preference are collected by the service providers. Privacy issue would be more critical in context-aware services simply because most of the context data themselves are private information: user's current location, current schedule, friends nearby and even her/his health data. To realize the potential of ubiquitous smart space, the systems embedded in the space should corporate personal privacy preferences. When the users invoke a set of services, they are asked to allow the service providers or smart space to make use of personal information which is related to privacy concerns. For this reason, the users unhappily provide the personal information or even deny to get served. On the other side, service provider needs personal information as rich as possible with minimal personal information to discern royal and trustworthy customers and those who are not. It would be desirable to enlarge the allowable personal information complying with the service provider's request, whereas minimizing service provider's requiring personal information which is not allowed to be submitted and user's submitting information which is of no value to the service provider. In special, if any personal information required by the service provider is not allowed, service will not be provided to the user. P3P (Platform for Privacy Preferences) has been regarded as one of the promising alternatives to preserve the personal information in the course of electronic transactions. However, P3P mainly focuses on preserving the buyers' personal information. From time to time, the service provider's business data should be protected from the unintended usage from the buyers. Moreover, even though the user's privacy preference could depend on the context happened to the user, legacy P3P does not handle the contextual change of privacy preferences. Hence, the purpose of this paper is to propose a mutual P3P-based negotiation mechanism. To do so, service provider's privacy concern is considered as well as the users'. User's privacy policy on the service provider's information also should be informed to the service providers before the service begins. Second, privacy policy is contextually designed according to the user's current context because the nomadic user's privacy concern structure may be altered contextually. Hence, the methodology includes mutual privacy policy and personalization. Overall framework of the mechanism and new code of ethics is described in section 2. Pervasive platform for mutual P3P considers user type and context field, which involves current activity, location, social context, objects nearby and physical environments. Our mutual P3P includes the privacy preference not only for the buyers but also the sellers, that is, service providers. Negotiation methodology for mutual P3P is proposed in section 3. Based on the fact that privacy concern occurs when there are needs for information access and at the same time those for information hiding. Our mechanism was implemented based on an actual shopping mall to increase the feasibility of the idea proposed in this paper. A shopping service is assumed as a context-aware service, and data groups for the service are enumerated. The privacy policy for each data group is represented as APPEL format. To examine the performance of the example service, in section 4, simulation approach is adopted in this paper. For the simulation, five data elements are considered: $\cdot$ UserID $\cdot$ User preference $\cdot$ Phone number $\cdot$ Home address $\cdot$ Product information $\cdot$ Service profile. For the negotiation, reputation is selected as a strategic value. Then the following cases are compared: $\cdot$ Legacy P3P is considered $\cdot$ Mutual P3P is considered without strategic value $\cdot$ Mutual P3P is considered with strategic value. The simulation results show that mutual P3P outperforms legacy P3P. Moreover, we could conclude that when mutual P3P is considered with strategic value, performance was better than that of mutual P3P is considered without strategic value in terms of service safety.

The Effects of Personal Psychological Variables, Family Variables, and Job Satisfaction on the Psychological Well-being of Middle-aged Men (중년기 남성의 개인내적 변인, 가족 변인 및 직무만족이 심리적 안녕감에 미치는 영향)

  • Woo, Seon Hye;Kim, Jung Min;Jo, Han Sol
    • Journal of Families and Better Life
    • /
    • v.34 no.6
    • /
    • pp.15-26
    • /
    • 2016
  • The purpose of this study is to examine the effect of personal psychological variables(cognitive flexibility, emotion dysregulation, subjective health condition), family variables(marital satisfaction, father-adolescent communication) and job satisfaction on the psychological well-being of middle-aged men. For this research, questionnaires were administered to 550 middle-aged men residing in Seoul, Gyeonggi and Incheon. Among 352 questionnaires collected, 327 were selected and statistically analyzed by average, standard deviation, frequency analysis, t-test, one-way ANOVA, and hierarchical regression analysis using SPSS Win 21.0. The main results of the study are as follows: First, according to middle-aged men's social-demographic variables, the level of their psychological well-being differed significantly. Second, cognitive flexibility was the most significant predictor of their psychological well-being. In addition, emotion dysregulation, job satisfaction, father-adolescent communication, and subjective health condition were significant predictors. These results suggest that cognitive reconstruction training or problem-solving intervention could be useful for the psychological well-being of middle-aged men.

A study of the content Analysis on the Sexual knowledge and Attitude for the adolescence in Korea (성지식 . 성태도에 관한 우리 나라 연구내용 분석 -중.고.대학생을 중심으로-)

  • 김현경;최수정;김미영;양경미;임미림
    • Korean Journal of Health Education and Promotion
    • /
    • v.16 no.1
    • /
    • pp.167-185
    • /
    • 1999
  • The purpose of this study was to analyze the content of the sexual knowledge and sexual attitude of the results of 39 previous studies for the adolescence in Korea, 1976-1997. The basis for analysis was the Guidelines for Comprehensive Sexuality Education developed by the Sex Information and Education Council of the U. S.(SIECUS). SIECUS is consisted of six key concepts; Human development, Relationships, Personal skills, Sexual behaviour, Sexual health, Society and Health. The research consisted of 39 articles that met definitional criteria of content analysis. The results of the study were summarized as follows: 1. Knowledge: It was conducted 96.7% of human development, 90.0% of sexual health, 70.0% of sexual behaviour, 23.3% of society and culture. 2. Attitude: It was conducted 94.1% of sexual behaviour, 73.5% of relationships, 55.9% of sexual health, 41.1% of human development, 26.5% of society and culture, 11.8% of personal skills. 3. General characteristics: With regard to sexual knowledge, 50.0% of research were published 1980s, 43.3% were 1990s, and 6.7%were 1970s. As regard to sexual attitude, 50% of research were published 1980s, 45.5% were 1990s, and 2.9% were 1970s. In sample size, 23.1% of 600 over, 401-500 were 20.5%. In the research tool, it was developed by researcher mainly 66.7%, modified tool by researcher was 5.1%. The tested reliability of the research tool was only 27.9%. And 78.9% of the research was not tested in validity of tool.

  • PDF

SNS disclosure of personal information in M2M environment threats and countermeasures (M2M 환경에서의 SNS 개인정보 유출 위협 및 대응방안)

  • Go, Jun-Young;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.5 no.1
    • /
    • pp.29-34
    • /
    • 2014
  • It appeared with the development of IT skills to help the social network SNS(Social Network Service) on the online form. Many people around the world and in the business environment changes is the emergence of social networks are bringing. And the rapid development of the idea, but are insignificant for the security threats that are used by many people in many companies, and social network services. In addition, although it is true that this connection is increased from the number of mobile machines to the development of M2M, that is not recognized for that vulnerability. To evaluate and identify vulnerabilities against security threats and countermeasures for the SNS access the social network on the M2M After looking for privacy and in the present.