• Title/Summary/Keyword: role model

Search Result 7,187, Processing Time 0.037 seconds

Inspecting Driving Forces of Business Cycles in Korea

  • Jung, Yongseung
    • East Asian Economic Review
    • /
    • v.23 no.4
    • /
    • pp.409-427
    • /
    • 2019
  • This paper sets up a new Keynesian model with external habit to explore the role of each shock over business cycles in Korea. The estimated model via maximum likelihood shows that the productivity shock plays a pivotal role in explaining the output variations before and after the financial crisis since mid-1970s. It also shows that the model with external habit is more successful in explaining the business cycles in Korea after the Asian financial crisis than the model without habit. The monetary policy shock which dominates by accounting for more than 70 percent of the unconditional variance of the inflation rate before the financial crisis is less important in the inflation rate fluctuations after the financial crisis. This partly reflects the regime change of the monetary policy to the inflation targeting rule after the financial crisis.

Development and Application of Web-Based Shopping Systems Configuration Model for the Activation of Electronic Commerce: Concerning both the Business and Technical Issues (전자상거래 확산을 위한 웹기반 쇼핑시스템의 상황모형의 개발 및 적용: 경영과 기술의 조화로운 연구관점)

  • Kim, Chang-Su
    • International Commerce and Information Review
    • /
    • v.6 no.3
    • /
    • pp.81-99
    • /
    • 2004
  • Research relevant to the electronic commerce tends to either overestimate or underrate the role of Information and Communication Technology (lCT). There is both technological skepticism within the social science circles and technical optimism within the engineering and computing field. Each perspective seems to have a limitation in adequately explaining the phenomenon of electronic commerce diffusion. Therefore, this research attempts to explore major characteristics of Web-based shopping systems as enablers of new business, concerning both the technical and business aspects in contemporary electronic commerce settings. On this basis, this paper addresses a configuration model of WBSS on the harmonious perspective concerning both the technical and business issues. It is our hope that both technical perspective and business perspective for exploring WBSS's configuration model presented in this paper can be an initial step towards a more balanced debate of ICT role, for electronic commerce.

  • PDF

A MATHEMATICAL MODEL FOR HISTORY-BASED ACCESS CONTROL

  • Kim, Hee-Young
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • v.8 no.1
    • /
    • pp.11-30
    • /
    • 2004
  • Access Control is one of essential branches to provide system's security. Depending on what standards we apply, in general, there are Role-based access control, History-based access control. The first is based on subject's role, The later is based on subject's history. In fact, RBAC has been implemented, we are using it by purchasing some orders through the internet. But, HBAC is so complex that there will occur some errors on the system. This is more and more when HBAC is used with other access controls. So HBAC's formalization and model which are general enough to encompass a range of policies in using more than one access control model within a given system are important. To simplify these, we design the mathematical model called non-access structure. This Non-access structure contains to historical access list. If it is given subjects and objects, we look into subject grouping and object relation, and then we design Non-access structure. Then we can determine the permission based on history without conflict.

  • PDF

Antecedents of Corporate Adoption of Social Media and the Role of the Technology Acceptance Model in the Path

  • Lee, Jung Wan;Becker, Kip;Potluri, Rajasekhara Mouly
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.3 no.2
    • /
    • pp.67-76
    • /
    • 2016
  • The paper explores determinants of corporate adoption of social media and the role of technology acceptance model in the path. This paper assimilates some components of the technology acceptance dimension and social expectation theories to determine corporate intentions to use social media. Six hundred and forty-eight samples collected from hotel staff in Korea are analyzed using factor analysis, structural equation model techniques and one-way analysis of variance. The results show that corporate needs, social expectations, ease of use and usefulness should be viewed as important antecedents explaining the firm's behavioral intention to use social media. The study also finds that the ease of use and usefulness of the technology acceptance model have positive directional mediation effects in the path diagram.

A Job Stress Model of Workers in Fashion and Textile Industries (섬유패션기업 종사자의 직무스트레스 모델)

  • Park, Kwang-Hee;Yoo, Hwa-Sook
    • Fashion & Textile Research Journal
    • /
    • v.7 no.1
    • /
    • pp.33-40
    • /
    • 2005
  • This study is to develope the job stress model for workers in fashion and textile industries and to investigate the effect of job stressors on stress symptom and its effect on job performance. The structural equation model analysis was performed for examining the relationship among job stressors, stress symptom and job performance. Environmental factors, task factors, role factors and organizational climate factors were identified as job stressors. Task characteristics and role characteristics were positively related to job stress symptom. Environmental factors and organizational climate factors were negatively related to job stress symptom. Also, job stress symptom was negatively related to job performance. The findings suggest some implications on how to improve job performance or to reduce job stress.

The Role and Outcome of the Korea-Indonesia e-Government Cooperation Center (한-인도네시아 전자정부 협력센터 역할과 성과)

  • Lee, Kiyoung
    • Journal of Appropriate Technology
    • /
    • v.5 no.1
    • /
    • pp.2-7
    • /
    • 2019
  • This article explains the background of the Korea Indonesia e-Government Cooperation Center established in 2016 as a new intergovernmental cooperation model of the ODA (Official Development Assistance) project in Indonesia, one of the developing countries in Southeast Asia, and shares the center's role and achievements. Through this, we show that it can be a new cooperation model for ODA field that needs expertise in the future.

A Study on the Effect of Reading Role Model, Reading Effectiveness on Academic Achievement of Middle School Student (독서역할모델 및 독서유효성이 중학생의 학업성취에 미치는 영향 연구)

  • Jeong, Dae-Keun
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.51 no.4
    • /
    • pp.139-160
    • /
    • 2017
  • The purpose of this study is to find out the influence of reading role model (parents, teachers, and friends) and reading effectiveness (reading satisfaction, willingness to persistent reading, immersed reading) reflected on middle school students' academic achievement (Korean Language performance and middle school record). As a result of the analysis, the factors affecting the performance of Korean Language were father (1.9%) and mother (3.4%) among reading role models. Among reading effectiveness factors, willingness to persistent reading (8%) was the only effective factor. In the case of the middle school record, the mother (3.4%) had the only effect among the reading role models, and reading effectiveness was influenced all factors such willingness to persistent reading (10.4%), immersed reading (4.0%) and reading satisfaction (1.9%). However, except for the factor willingness to persistent reading, the it found the influence was insignificant.

Context Conflicts of Role-Based Access Control in Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경의 역할 기반 접근제어에서 발생하는 상황 충돌)

  • Nam Seung-Jwa;Park Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.2
    • /
    • pp.37-52
    • /
    • 2005
  • Traditional access control models like role-based access control model are insufficient in security needs in ubiquitous computing environment because they take no thought of access control based on user's context or environment condition. In these days, although researches on context-aware access control using user's context or environment conditions based on role-based access control are emerged, they are on the primary stage. We present context definitions md an access control model to provide more flexible and dynamic context-aware access control based on role-based access control. Specially, we describe the conflict problems occurred in the middle of making an access decision. After classifying the conflict problems, we show some resolutions to solve them. In conclusion, we will lay the foundations of the development of security policy and model assuring right user of right object(or resource) and application service through pre-defined context and context classification in ubiquitous computing environments. Beyond the simplicity of access to objects by authorized users, we assure that user can access to the object, resource, or service anywhere and anytime according to right context.

P-RBACML : Privacy Enhancing Role-Based Access Control Policy Language Model (P-RBACML : 프라이버시 강화형 역할기반접근통제 정책 언어 모델)

  • Lee, Young-Lok;Park, Jun-Hyung;Noh, Bong-Nam;Park, Hae-Ryong;Chun, Kil-Su
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.149-160
    • /
    • 2008
  • As individual users have to provide more information than the minimum for using information communication service, the invasion of privacy of Individual users is increasing. That is why client/server based personal information security platform technologies are being developed such as P3P, EPAL and XACML. By the way enterprises and organizations using primarily role based access control can not use these technologies. because those technologies apply access control policies to individual subjects. In this paper, we suggest an expression language for privacy enhancing role-based access control policy. Suggested privacy enhancing role-based access control policy language model is a variation of XACML which uses matching method and condition, and separately contains elements of role, purpose, and obligation. We suggest policy language model for permission assignment in this paper, shows not only privacy policy scenario with policy document instance, but also request context and response context for helping understanding.

An Architecture of Access Control Model for Preventing Illegal Information Leakage by Insider (내부자의 불법적 정보 유출 차단을 위한 접근통제 모델 설계)

  • Eom, Jung-Ho;Park, Seon-Ho;Chung, Tai-M.
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.5
    • /
    • pp.59-67
    • /
    • 2010
  • In the paper, we proposed an IM-ACM(Insider Misuse-Access Control Model) for preventing illegal information leakage by insider who exploits his legal rights in the ubiquitous computing environment. The IM-ACM can monitor whether insider uses data rightly using misuse monitor add to CA-TRBAC(Context Aware-Task Role Based Access Control) which permits access authorization according to user role, context role, task and entity's security attributes. It is difficult to prevent information leakage by insider because of access to legal rights, a wealth of knowledge about the system. The IM-ACM can prevent the information flow between objects which have the different security levels using context role and security attributes and prevent an insider misuse by misuse monitor which comparing an insider actual processing behavior to an insider possible work process pattern drawing on the current defined profile of insider's process.