• Title/Summary/Keyword: public research sector

Search Result 693, Processing Time 0.034 seconds

An Effect of Compassion, Moral Obligation on Social Entrepreneurial Intention: Examining the Moderating Role of Perceived Social Support (공감, 도덕적 의무감, 사회적 지지에 대한 인식이 사회적 기업가적 의도에 미치는 영향)

  • Lee, Chaewon;Oh, Hyemi
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.12 no.5
    • /
    • pp.127-139
    • /
    • 2017
  • In recent 10 years the attention to social entrepreneurship has raised increasing among scholars, public sector, and community development. However less research has been conducted on how social entrepreneurship intention create a social enterprise and what factors can be affected to the social entrepreneurial intentions. This paper aims at contributing to identify the antecedents of entrepreneurial behavior and intentions. Especially, we have had a strong interests in compassion factors which haven't been used as important variables to encourage for people to do social entrepreneurial activities. Also, we try to find the moral obligation and perceived social support as antecedents of social entrepreneurial intentions. Finding show that compassion and moral obligation affect to the social entrepreneurial intention. Especially this study identify the external factor of society with the variable, perceived social support. Once individuals recognize that the infrastructure and societal positive mood on social entrepreneurship is friendly to social entrepreneurship, people have a tendency to try to do some social entrepreneurial activities. Only few empirical studies exist in this research domain. A study of more than 271 Korean college students has studied which personal traits predict certain characteristics of social entrepreneurs (such as having social vision or looking for social innovational opportunities). In addition to those antecedents, students experience is the critical factor that enabled continued expansion of the social entrepreneurial activities. The results of this research show how we can nurture social entrepreneurs and how we can develop the social environment to promote social entrepreneurship.

  • PDF

Research on ITB Contract Terms Classification Model for Risk Management in EPC Projects: Deep Learning-Based PLM Ensemble Techniques (EPC 프로젝트의 위험 관리를 위한 ITB 문서 조항 분류 모델 연구: 딥러닝 기반 PLM 앙상블 기법 활용)

  • Hyunsang Lee;Wonseok Lee;Bogeun Jo;Heejun Lee;Sangjin Oh;Sangwoo You;Maru Nam;Hyunsik Lee
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.11
    • /
    • pp.471-480
    • /
    • 2023
  • The Korean construction order volume in South Korea grew significantly from 91.3 trillion won in public orders in 2013 to a total of 212 trillion won in 2021, particularly in the private sector. As the size of the domestic and overseas markets grew, the scale and complexity of EPC (Engineering, Procurement, Construction) projects increased, and risk management of project management and ITB (Invitation to Bid) documents became a critical issue. The time granted to actual construction companies in the bidding process following the EPC project award is not only limited, but also extremely challenging to review all the risk terms in the ITB document due to manpower and cost issues. Previous research attempted to categorize the risk terms in EPC contract documents and detect them based on AI, but there were limitations to practical use due to problems related to data, such as the limit of labeled data utilization and class imbalance. Therefore, this study aims to develop an AI model that can categorize the contract terms based on the FIDIC Yellow 2017(Federation Internationale Des Ingenieurs-Conseils Contract terms) standard in detail, rather than defining and classifying risk terms like previous research. A multi-text classification function is necessary because the contract terms that need to be reviewed in detail may vary depending on the scale and type of the project. To enhance the performance of the multi-text classification model, we developed the ELECTRA PLM (Pre-trained Language Model) capable of efficiently learning the context of text data from the pre-training stage, and conducted a four-step experiment to validate the performance of the model. As a result, the ensemble version of the self-developed ITB-ELECTRA model and Legal-BERT achieved the best performance with a weighted average F1-Score of 76% in the classification of 57 contract terms.

Social Tagging-based Recommendation Platform for Patented Technology Transfer (특허의 기술이전 활성화를 위한 소셜 태깅기반 지적재산권 추천플랫폼)

  • Park, Yoon-Joo
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.3
    • /
    • pp.53-77
    • /
    • 2015
  • Korea has witnessed an increasing number of domestic patent applications, but a majority of them are not utilized to their maximum potential but end up becoming obsolete. According to the 2012 National Congress' Inspection of Administration, about 73% of patents possessed by universities and public-funded research institutions failed to lead to creating social values, but remain latent. One of the main problem of this issue is that patent creators such as individual researcher, university, or research institution lack abilities to commercialize their patents into viable businesses with those enterprises that are in need of them. Also, for enterprises side, it is hard to find the appropriate patents by searching keywords on all such occasions. This system proposes a patent recommendation system that can identify and recommend intellectual rights appropriate to users' interested fields among a rapidly accumulating number of patent assets in a more easy and efficient manner. The proposed system extracts core contents and technology sectors from the existing pool of patents, and combines it with secondary social knowledge, which derives from tags information created by users, in order to find the best patents recommended for users. That is to say, in an early stage where there is no accumulated tag information, the recommendation is done by utilizing content characteristics, which are identified through an analysis of key words contained in such parameters as 'Title of Invention' and 'Claim' among the various patent attributes. In order to do this, the suggested system extracts only nouns from patents and assigns a weight to each noun according to the importance of it in all patents by performing TF-IDF analysis. After that, it finds patents which have similar weights with preferred patents by a user. In this paper, this similarity is called a "Domain Similarity". Next, the suggested system extract technology sector's characteristics from patent document by analyzing the international technology classification code (International Patent Classification, IPC). Every patents have more than one IPC, and each user can attach more than one tag to the patents they like. Thus, each user has a set of IPC codes included in tagged patents. The suggested system manages this IPC set to analyze technology preference of each user and find the well-fitted patents for them. In order to do this, the suggeted system calcuates a 'Technology_Similarity' between a set of IPC codes and IPC codes contained in all other patents. After that, when the tag information of multiple users are accumulated, the system expands the recommendations in consideration of other users' social tag information relating to the patent that is tagged by a concerned user. The similarity between tag information of perferred 'patents by user and other patents are called a 'Social Simialrity' in this paper. Lastly, a 'Total Similarity' are calculated by adding these three differenent similarites and patents having the highest 'Total Similarity' are recommended to each user. The suggested system are applied to a total of 1,638 korean patents obtained from the Korea Industrial Property Rights Information Service (KIPRIS) run by the Korea Intellectual Property Office. However, since this original dataset does not include tag information, we create virtual tag information and utilized this to construct the semi-virtual dataset. The proposed recommendation algorithm was implemented with JAVA, a computer programming language, and a prototype graphic user interface was also designed for this study. As the proposed system did not have dependent variables and uses virtual data, it is impossible to verify the recommendation system with a statistical method. Therefore, the study uses a scenario test method to verify the operational feasibility and recommendation effectiveness of the system. The results of this study are expected to improve the possibility of matching promising patents with the best suitable businesses. It is assumed that users' experiential knowledge can be accumulated, managed, and utilized in the As-Is patent system, which currently only manages standardized patent information.

Married Women's Economic Dependency and the Welfare State (기혼여성의 경제적 의존과 복지국가)

  • Kim, Young-mi
    • Korean Journal of Social Welfare Studies
    • /
    • no.36
    • /
    • pp.55-80
    • /
    • 2008
  • Research on the welfare state or income inequality has been concerned with variations in inequality between societies or families. These studies tend to view the family as a unit of shared interests where incomes are pooled and distributed equally. This study makes a theoretical and empirical case for why it is important to look at economic dependency within the family in comparative welfare state research. Using the Luxembourg Income Study data this study examined married women's dependency on their husbands' earnings in 16 western industrialized countries. The constructed measure for married women's level of economic dependency followed the procedure of Sørensen & McLanahan(1987), which stated : "her dependency is measured by the extent to which a woman's standard of living(as determined by her share of income) is derived from a transfer from her husband." The finding suggested that married women's economic dependence was lowest in Scandinavian countries. On the contrary, in Southern Europe countries most married women were dependent on husbands' earnings. In Netherlands, Austria, Germany where the share of part-time work among married women was high, married women's economic dependence was also high. This showed the women's labor force participation did not mean that the majority of couples were equal with respect to earnings, nor that a major shift in the sexual division of labour has taken place. This paper analysed the causal relationship between the married women's economic independence and the welfare state by using Ragin(2000)'s Fuzzy-Set Qualitative Comparative Analysis. This analysis considered the various conditions of the welfare state : namely, left power, union mobilization density, women's mobilization, public service sector employment and generous support on the family. The result showed that powerful union, high level of women's mobilization and the generous support on the family were necessary conditions for 'relatively high' level of married women's economic independence.

A Study on the Application of Block Chain Technology on EVMS (EVMS 업무의 블록체인 기술 적용 방안 연구)

  • Kim, Il-Han;Kwon, Sun-Dong
    • Management & Information Systems Review
    • /
    • v.39 no.2
    • /
    • pp.39-60
    • /
    • 2020
  • Block chain technology is one of the core elements for realizing the 4th industrial revolution, and many efforts have been made by government and companies to provide services based on block chain technology. In this study we analyzed the benefits of block chain technology for EVMS and designed EVMS block chain platform with increased data security and work efficiency for project management data, which are important assets in monitoring progress, foreseeing future events, and managing post-completion. We did the case studies on the benefits of block chain technology and then conducted the survey study on security, reliability, and efficiency of block chain technology, targeting 18 block chain experts and project developers. And then, we interviewed EVMS system operator on the compatibility between block chain technology and EVM Systems. The result of the case studies showed that block chain technology can be applied to financial, logistic, medical, and public services to simplify the insurance claim process and to improve reliability by distributing transaction data storage and applying security·encryption features. Also, our research on the characteristics and necessity of block chain technology in EVMS revealed the improvability of security, reliability, and efficiency of management and distribution of EVMS data. Finally, we designed a network model, a block structure, and a consensus algorithm model and combined them to construct a conceptual block chain model for EVM system. This study has the following contribution. First, we reviewed that the block chain technology is suitable for application in the defense sector and proposed a conceptual model. Second, the effect that can be obtained by applying block chain technology to EVMS was derived, and the possibility of improving the existing business process was derived.

Australian Case Study in Regulatory Techniques to the Security Industry Reform and Policy Implications (호주 민간경비산업 고품질 규제수단 검토 및 시사점)

  • Kim, Dae-Woon
    • Korean Security Journal
    • /
    • no.47
    • /
    • pp.7-36
    • /
    • 2016
  • The security providers industry, often referred to as an industry with unconfined growth ceiling, has entered a remarkable mass-growth phase since the 1980. In the modern era, private-sector security increasingly cover functions relating to general security awareness (including counter-terrorism) in partnership with State bodies, and the scale of operations continue to accelerate, relative to the expanding roles. In the era of pluralisation of policing, there has been widening efforts pursued to develop a range of regulatory strategies internationally in order to manage such growth and development. To date, in South Korea, a diverse set of industry review studies have been conducted. However, the analyses have been conventionally confined to North America, Britain, Germany and Japan, while developments in other world regions remain unassessed. This article is intended to inform the drivers and determinants of regulatory reforms in Australia, and examine the effectiveness of the main pillars of licensing innovations. Over the past decades, the Australian regime has undergone a wave of reforms in response to emerging issues, and in recognition of the industry as a 'public good' due to underpopulation density and the resulting security challenges. The focus of review in this study was on providing a detailed review of the regulatory approach taken by Australia that has expanded police-private security co-operation since the 1980s. The emphasis was on examining the core pillars of risk management strategies and oversight practices progressed to date and evaluating areas of possible improvement in regulation relative to South Korea. Overall, this study has identified three key features of Australian regime: (1) close checks on questionable close associates (including fingerprinting), (2) power of inspection and seizure without search warrant, (3) the 'three strikes' scheme. The rise of the private security presence in day-to-day policing operations means that industry warrant some intervening government-sponsored initiative. The overall lessons learnt from the Australian case was taken into account in determining the following checks and balances that would provide the ideal setting for the best-practice arrangement: (1) regulatory measure should be evaluated against a set of well-defined indicators, such as the merits of different enforcement tools for each given risk, (2) information about regulatory impacts should be analysed by a specialist research institute, (3) regulators should be innovative in applying a range of strategies available to them by employing a mixture of compliance promotional strategies, and adjust the mix as required.

  • PDF

Comparison of Innovation Efficiency of Pre-IPO and Post-IPO in Korea: Case of Pharmaceutical Industry (IPO 전후 혁신의 효율성 비교 연구: 의약산업 중심으로)

  • Kim, Eunhee
    • Journal of Technology Innovation
    • /
    • v.24 no.1
    • /
    • pp.143-167
    • /
    • 2016
  • The purpose of this study is to analyze changes of innovation activities and their performance in pre-IPO and post-IPO of KOSDAQ IPO listed companies in medical and pharmaceutical fields, which require high R&D investment, from 2000 to 2005 in Korea. The innovation efficiencies of the IPO companies were measured before and after three years based on the DEA model. The financial data and patent information of the listed company during total 6 years, which were 3 years before IPO and 3 years after IPO, were collected. The main results of this research are as follows. First, it took an average 12.86 years until IPO in the start-up of the IPO companies in the pharmaceutical sector, and innovation was on average more active than the IPO before. R&D investment was higher than the IPO before, and the number of the applied patent during 3 years after IPO was 16.67 which was increased from 8.43 during 3 years before IPO. In addition, the average scope of technology of the IPO companies was expanded from 11 to 22 technology fields during previous 3 year and after 3 year each, and financial growth after IPO was lower than the previous IPO. Second, the financial performance of R&D investment and the performance of patent activity were weakened in the efficiency after the IPO, and the integrated performance from the patenting activities and the R&D investment was decreased after the IPO. Finally, the efficiency of the financial performance of the patenting activity was lower than the efficiency of the financial performance of the patent and R&D investment and patent activities under the R&D investment. In particular, the inefficiency of the firms' patenting activities performance after the IPO was caused by the decreasing return to scale, according to the results of this study. This results implicate that the expansion of R&D investments through the IPO had not lead to the financial performance of the market, and that the overall inefficiency since the IPO is due to the inefficiencies at the stage for the outcome of innovation activity rather than the output obtained through the R&D investments that appear to lead the performance of the market.

Comparison of Models for Stock Price Prediction Based on Keyword Search Volume According to the Social Acceptance of Artificial Intelligence (인공지능의 사회적 수용도에 따른 키워드 검색량 기반 주가예측모형 비교연구)

  • Cho, Yujung;Sohn, Kwonsang;Kwon, Ohbyung
    • Journal of Intelligence and Information Systems
    • /
    • v.27 no.1
    • /
    • pp.103-128
    • /
    • 2021
  • Recently, investors' interest and the influence of stock-related information dissemination are being considered as significant factors that explain stock returns and volume. Besides, companies that develop, distribute, or utilize innovative new technologies such as artificial intelligence have a problem that it is difficult to accurately predict a company's future stock returns and volatility due to macro-environment and market uncertainty. Market uncertainty is recognized as an obstacle to the activation and spread of artificial intelligence technology, so research is needed to mitigate this. Hence, the purpose of this study is to propose a machine learning model that predicts the volatility of a company's stock price by using the internet search volume of artificial intelligence-related technology keywords as a measure of the interest of investors. To this end, for predicting the stock market, we using the VAR(Vector Auto Regression) and deep neural network LSTM (Long Short-Term Memory). And the stock price prediction performance using keyword search volume is compared according to the technology's social acceptance stage. In addition, we also conduct the analysis of sub-technology of artificial intelligence technology to examine the change in the search volume of detailed technology keywords according to the technology acceptance stage and the effect of interest in specific technology on the stock market forecast. To this end, in this study, the words artificial intelligence, deep learning, machine learning were selected as keywords. Next, we investigated how many keywords each week appeared in online documents for five years from January 1, 2015, to December 31, 2019. The stock price and transaction volume data of KOSDAQ listed companies were also collected and used for analysis. As a result, we found that the keyword search volume for artificial intelligence technology increased as the social acceptance of artificial intelligence technology increased. In particular, starting from AlphaGo Shock, the keyword search volume for artificial intelligence itself and detailed technologies such as machine learning and deep learning appeared to increase. Also, the keyword search volume for artificial intelligence technology increases as the social acceptance stage progresses. It showed high accuracy, and it was confirmed that the acceptance stages showing the best prediction performance were different for each keyword. As a result of stock price prediction based on keyword search volume for each social acceptance stage of artificial intelligence technologies classified in this study, the awareness stage's prediction accuracy was found to be the highest. The prediction accuracy was different according to the keywords used in the stock price prediction model for each social acceptance stage. Therefore, when constructing a stock price prediction model using technology keywords, it is necessary to consider social acceptance of the technology and sub-technology classification. The results of this study provide the following implications. First, to predict the return on investment for companies based on innovative technology, it is most important to capture the recognition stage in which public interest rapidly increases in social acceptance of the technology. Second, the change in keyword search volume and the accuracy of the prediction model varies according to the social acceptance of technology should be considered in developing a Decision Support System for investment such as the big data-based Robo-advisor recently introduced by the financial sector.

Study on 3D Printer Suitable for Character Merchandise Production Training (캐릭터 상품 제작 교육에 적합한 3D프린터 연구)

  • Kwon, Dong-Hyun
    • Cartoon and Animation Studies
    • /
    • s.41
    • /
    • pp.455-486
    • /
    • 2015
  • The 3D printing technology, which started from the patent registration in 1986, was a technology that did not attract attention other than from some companies, due to the lack of awareness at the time. However, today, as expiring patents are appearing after the passage of 20 years, the price of 3D printers have decreased to the level of allowing purchase by individuals and the technology is attracting attention from industries, in addition to the general public, such as by naturally accepting 3D and to share 3D data, based on the generalization of online information exchange and improvement of computer performance. The production capability of 3D printers, which is based on digital data enabling digital transmission and revision and supplementation or production manufacturing not requiring molding, may provide a groundbreaking change to the process of manufacturing, and may attain the same effect in the character merchandise sector. Using a 3D printer is becoming a necessity in various figure merchandise productions which are in the forefront of the kidult culture that is recently gaining attention, and when predicting the demand by the industrial sites related to such character merchandise and when considering the more inexpensive price due to the expiration of patents and sharing of technology, expanding opportunities and sectors of employment and cultivating manpower that are able to engage in further creative work seems as a must, by introducing education courses cultivating manpower that can utilize 3D printers at the education field. However, there are limits in the information that can be obtained when seeking to introduce 3D printers in school education. Because the press or information media only mentions general information, such as the growth of the industrial size or prosperous future value of 3D printers, the research level of the academic world also remains at the level of organizing contents in an introductory level, such as by analyzing data on industrial size, analyzing the applicable scope in the industry, or introducing the printing technology. Such lack of information gives rise to problems at the education site. There would be no choice but to incur temporal and opportunity expenses, since the technology would only be able to be used after going through trials and errors, by first introducing the technology without examining the actual information, such as through comparing the strengths and weaknesses. In particular, if an expensive equipment introduced does not suit the features of school education, the loss costs would be significant. This research targeted general users without a technology-related basis, instead of specialists. By comparing the strengths and weaknesses and analyzing the problems and matters requiring notice upon use, pursuant to the representative technologies, instead of merely introducing the 3D printer technology as had been done previously, this research sought to explain the types of features that a 3D printer should have, in particular, when required in education relating to the development of figure merchandise as an optional cultural contents at cartoon-related departments, and sought to provide information that can be of practical help when seeking to provide education using 3D printers in the future. In the main body, the technologies were explained by making a classification based on a new perspective, such as the buttress method, types of materials, two-dimensional printing method, and three-dimensional printing method. The reason for selecting such different classification method was to easily allow mutual comparison of the practical problems upon use. In conclusion, the most suitable 3D printer was selected as the printer in the FDM method, which is comparatively cheap and requires low repair and maintenance cost and low materials expenses, although rather insufficient in the quality of outputs, and a recommendation was made, in addition, to select an entity that is supportive in providing technical support.

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF