http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
외식환경, 호텔 조리부서의 6시그마기법, 및 업무몰입간의 관계
김현묵(Hyeon-Muk Kim),유영진(Young-Jin Yoo) 한국콘텐츠학회 2008 한국콘텐츠학회논문지 Vol.8 No.8
본 연구는 역동성, 우호성, 및 복잡성을 포함하는 외식환경이 고객지향성, '지속적인 개선', 및 팀웍으로 구성되는 호텔기업 조리부서의 6시그마 품질경영활동에 미치는 영향과, 이 6시그마 품질경영활동이 호텔기업 조리부서 종사원의 업무몰입에 미치는 영향을 연구하였다. 분석 결과, 첫째, 외식환경의 역동성, 우호성, 및 복잡성은 조리부서의 고객지향성, ‘지속적인 개선’, 및 팀웤의 6시그마 품질경영활동에 영향을 미쳤고, 둘째, 이 6시그마 품질경영활동 중 ‘지속적인 개선’과 팀웍은 호텔기업 조리부서 종사원의 업무몰입에 영향을 미쳤다. 이상과 같은 실증분석의 결과를 종합해 볼 때 6시그마는 호텔기업의 조리부서에 도입될 필요성이 있으며, 조리부서의 종사원의 업무몰입에 도움이 되는 것으로 판단된다. 따라서 조리 상품의 특성을 고려하여 사전에 충분한 준비과정을 거쳐서 6시그마기법을 조리부서 경영에 도입한다면 프로세스 개선, 결함제거, 종사원의 업무몰입이 실현되어 경영성과를 높이는 계기가 될 것이다. One recurrent theme within the literature on 6 sigma was the study of its effect on organizational performance. Nonetheless, most research were focused on analyzing the relationships between the implementation of different elements and several types of performance. This research incorporated the effect of organizational environment as a variable for explaining the impact of 6 sigma on business results. The model was tested using regression analyses, employing a survey of employees of hotels' cuisine departments involved in 6 sigma. The causal analysis results showed that dynamism, munificence and complexity influenced the degree of implementation of the main 6 sigma principles. Similarly, the dimensions of 6 sigma had an impact on employees' work commitment. The model could be used by hotels to assess their level of 6 sigma success depending on specific environmental characteristics.
Sung-Hyeon Lee,Jae-Bok Park,Hong-Ju Park,Soo-Muk Cho,Young-Ja Park,Jeong-Im Sin 한국식품영양과학회 2005 Preventive Nutrition and Food Science Vol.10 No.2
Dandelions have been reported to have medicinal properties and bioactive components that impact human health. However, the precise biological properties of dandelions and the parts of the plants possessing bioactive components remain uncertain. In this study, we evaluated 3 different types of dandelions based on their cultivation origin (Songpa, Uiryung, and native Uiryung types) as well as their 4 different plant parts (leaf, flower, root, skin). Each sample was extracted with 80% methanol and then compared for the biological activities (anti-oxidative, immune cell proliferative and tumor cell growth inhibitory activities). All 3 types of dandelions possessed a degree of biological functions including the hydroxyl radical scavenger activity, immune cell proliferative activity and tumor cell growth inhibitory activity. However, there was no significant difference in these activities between the 3 dandelion types. Leaves of all three dandelion types showed the highest levels of all biological activities. To a lesser degree, the flower and root parts displayed biological activities. In the skin parts, anti-oxidative activity was also detected only at higher doses of dandelion extracts. Heating the dandelion leaf extract did not affect the biological activity, suggesting a heat-stable nature of the biological compounds. Taken together, these collective data suggest that dandelions, in particular their leaves, possess a high concentration of heat-resistant biological compounds, which are responsible for anti-oxidative, immune cell proliferative and tumor cell growth-inhibitory activities.
A Study of Effective Defense-In-Depth Strategy of Cyber Security on ICS
Seong-Muk Choi,Rae-Hyung Kim,Ga-Ye Kim,Hyeon-Kyung Lee,GwangYong Gim,Jong-Bae Kim 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.5
The system of SCADA(Supervisory Control and Data Acquisition Security) used in electricity, water, petroleum and gas, transportation as well as manufacturing, is to collect scattered data and to monitor assets related as a centralized suppression system. ICS system, including current SCADA, is not isolated from outside, being connected with IT solution, and can operate equipment through broadband network, instead of accessing physically. Accordingly, the security accident of suppressing system can occur in the fields of antagonistic nations, terrorists, foundational facility invaders, natural disasters and ill-will or accidental actions. The security control examined in this study provides a defense-in-depth strategy which is applicable to the effective cyber security strategy regarding ICS to protect the confidentiality of information, zero defect, availability through the classification of control, operational control and technological control.