RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      • 좁혀본 항목

      • 좁혀본 항목 보기순서

        • 원문유무
        • 음성지원유무
          • 원문제공처
          • 등재정보
          • 학술지명
          • 주제분류
          • 발행연도
          • 작성언어
          • 저자

        오늘 본 자료

        • 오늘 본 자료가 없습니다.
        더보기
        • 무료
        • 기관 내 무료
        • 유료
        • KCI등재

          Influence of IS Planning and Change Management on ERP Implementation Success

          Moon, Tae-Soo The Society of Digital Policy and Management 2009 디지털융복합연구 Vol.7 No.1

          Enterprise Resource Planning (ERP) system is one of key information technology to shape doing business. ERP adoption characteristics like IS planning and change management before ERP implementation are rising in importance, because of gaining competitive advantage. The purpose of this study is to analyze the impact of the characteristics of ERP adoption on ERP implementation success. From previous researches on ERP adoption and implementation, two characteristics of ERP adoption such as IS planning and change management, and 2 dependent variables such as process innovation and business performance, are identified. From data collection processes, 122 samples are collected. The results of hypothesis testing show that organizations with IS plan have higher implementation performance than organizations without IS plan. Also, organizations with the process of change management have higher implementation performance than organizations without the process of change management. Also, The interaction effect between IS planning and change management shows bigger impact in ERP implementation success.

        • KCI등재

          A Study on the Types and Processes of Information Production In Online Communities

          Kim, Young-Mi,Koh, Chan The Society of Digital Policy and Management 2011 디지털융복합연구 Vol.9 No.1

          The power of the internet community as a social network exerts great influence on all areas of our society not only on knowledge creation and knowledge sharing but also on politics, economy, and culture. This study aims to investigate how the diffusion process of information evolves on the internet in the new environment. The focus of the study is particularly on aspects of using information and the process of information production and the types and methods of online communities. It is the goal of the study to clarify aspects of the online community as an important mediator among universal means of communication in our society. Ways of social communication are changing rapidly and thus the reasoning for this change is very important policy issues to form a social consensus.

        • KCI등재

          A Study on the Operation and Function Improvement for apparel warehouse Using Fuzzy-AHP

          권성준,차영두,여기태,Kwon, Sung-Joon,Cha, Young-Doo,Yeo, Gi-Tae The Society of Digital Policy and Management 2017 디지털융복합연구 Vol.15 No.9

          국가 간 다양한 상품 무역에서 파생되는 물류업무를 처리하기 위해 세계 물류시장은 성장하고 있는 추세이다. 특히 의류물류는 매년 처리량이 증가하고 있으며, 세계 산업 중 손꼽히는 매출 기록을 나타내고 있다. 현재 의류품목은 고가의 제품으로 성장하였으며, 정교하고 알맞은 물류서비스가 요청되고 있다. 본 논문은 3PL 서비스를 제공하는 회사들이 앞으로 성장하고 있는 의류시장에 대한 서비스 및 오퍼레이션에 대응할 수 있도록 효과적인 운영방안을 제시하는 것에 연구목적이 있다. Fuzzy AHP방법을 사용하여 의류창고 운영에 대한 중요요인의 가중치를 산출하였다. 분석결과, 1위로는 인력교육(0.17) 2위로는 화재관리(0.169), 3위로 입출고 관리(0.142)로 나타났으며, 4위와 5위는 각각 Warehouse management system 및 바코드 시스템으로 확인되었다. 즉 '의류' 특성을 정확히 이해하고 이를 바탕으로 인력교육, 화재관리 그리고 입출고관리를 수행해야하며, 이를 통하여 의류물류 서비스의 질을 제고할 수 있다. Given the expansion of globalization and international trade, the number of apparel consumers is growing every year, making it difficult to estimate the amount of handling needed from the logistics industry. To determine which management factors are important and which ones require improvement, fuzzy AHP was used. Using this method, the factors were ranked in the final analysis as follows: The first and most important factor was training employees (0.17), while the second was fire hazard management (0.169); the third-highest factor was inbound and outbound goods (0.142), and the fourth was the warehouse management system. Barcode management was ranked fifth. By these results, we were able to analyze the processes of clothing warehouses, noting that although the factors appear independent, they are actually connected while proceeding with full management control. Moreover, because of the special characteristics of garments, employee management is crucial. Due to the vulnerability of these goods to fire hazards, this factor must be well managed.

        • KCI등재

          A Study on Ways to Vitalize Digital Contents Business through IP Holding Company

          Jung, Jai-Jin The Society of Digital Policy and Management 2011 디지털융복합연구 Vol.9 No.1

          In order to have the highest level of a certain society's technology be evaluated as digital contents technology the value concept of such technology's social utilization must be established while active investment on the technology takes place and makes it the subject of social capitalization. This study wishes to discuss the strategies and methods of establishing and managing IP holding company which requires business activation with digital contents technology at its base, research ways of vitalizing IP holding company to expand social utility values of contents technology, suggest necessary systemic improvements and investment activation methods, management structure, and governance structure by investigating ways to stimulate the industrialization of contents technology through the establishment and management of this IP holding company, and finally come up with a realistic measure to establish and manage a IP holding company. Strategies on commercialization of digital contents technology and acceleration of technology development, as well as activation of venture business set-ups will be analyzed and suggested based on such suggestions while IP holding company's digital contents technology investment activation model will be established to produce means to realize discovering superior contents companies and activation of investment, and activating high quality contents production for the global market.

        • KCI등재

          The Review of the State Policy in the IT Industry and HRD in South Korea

          Park, In-Sub The Society of Digital Policy and Management 2009 디지털융복합연구 Vol.7 No.1

          This article is concerned to investigate the changing nature of the role of the state in relation to industrial policy to foster the IT industry in the Republic of Korea. In doing this, it has started with economic globalization introduced to the Korean political economy since the late 1980s. It has identified in what ways the state responded to the change, and to what extent the role of the state has fundamentally been changed in the context of policy mechanism in the process towards facilitating the IT industry in Korea. In addition, it presented how the state played a role in skill formation in relation to the industrial policy. In consequence, the role of the Korean state in fostering the IT industry has fundamentally changed from that as the developmental state in the industrialization process. In the process, that the strategic co-ordination role of the state and relations between the state and private capitals and societies are very significant to achieve the economic goal is presented as results, as well as some future tensions that would encounter in the way of charting the current policies.

        • KCI등재

          Blockchain Evaluation Indexes and Methods to Vitalize a Blockchain-based Digital Sharing Economy

          이일구,Lee, Il-Gu The Society of Digital Policy and Management 2018 디지털융복합연구 Vol.16 No.8

          최근 디지털 공유 경제가 사회에 가져다 줄 혜택에 대한 기대가 높다. 디지털 공유 경제가 정착되려면 신뢰할 수 있는 사회 구조가 우선 마련되어야 한다. 투명성은 정치나 경제 영역뿐 아니라 우리 삶의 모든 영역에서 가장 중요한 가치 척도로 인정받고 있고, 모든 국가가 '신용과 신뢰기반의 사회'를 지향하지만 현실 사회 곳곳에선 불투명과 부정 비리 비효율이 만연해 있다. 그러므로 신뢰하기 어려운 디지털 환경에 신뢰를 구축하기 위해 '제2의 인터넷 혁명'으로 불리는 블록체인 기술에 대한 관심이 고조되고 있다. 그러나 아직도 블록체인 기술을 평가하는 기준과 방법이 명확하지 않고 표준화되어 있지 않다. 본 연구에서는 디지털 공유 경제에 블록체인을 활용하기 위한 처리속도, 데이터량, 정확도 등의 블록체인 평가지표와 평가방법을 짚어보고, 블록체인 기반의 안전한 디지털 공유 경제 활성화 방안을 제시한다. Recently, there are high expectations of a society benefitting from a digital sharing economy. However, to establish a digital sharing economy, one needs to first create a reliable social structure. Transparency is recognized as the most important measure of value in not just politics or economics, but also in all domains of our lives. Although all nations strive to create "societies based on credit and trust," in truth, rigidity, irregularity, corruption, and inefficiency are widespread in all aspects of society. Thus, there is a growing interest in blockchain technology, also called the "second Internet revolution," seeking trust in digital environments, although it is difficult to obtain trust in such environments. However, the principles and methods of evaluating blockchain technologies are still unclear and not standardized. This study addresses the evaluation indexes such as transaction per second, maximum data size per one transaction, accuracy and blockchain technology application methods in the digital sharing economy and suggest ways to safely vitalize a blockchain-based digital sharing economy.

        • KCI등재

          Case Study On Knowledge Management Practices In Indian Manufacturing Organizations - Tata Motors, BHEL And Mahindra And Mahindra

          Rangnekar, Santosh The Society of Digital Policy and Management 2010 디지털융복합연구 Vol.8 No.1

          This case study covers the Knowledge Management research paper that explores the clear idea about the knowledge practicesthat are used in the corporate sector to achieve the strategic advantage over the competitors. The quoted example of the three manufacturing firms TATA MOTORS, BHEL, and M&M have tried to compare the Knowledge practices in these firms, which explores the concept clearer that the competitors can use the same or the different type of knowledge practices to achieve the competitor advantages. In order to help knowledge management goals, an integrated knowledge management system consisting of the knowledge management techniques and technologies are used. The knowledge Management is supported by different techniques and practices whichare knowledge content, people skills, technology and strategy based. The technology and techniques supports these factors of knowledge management. The paper discuss different techniques and processes adapted by three Indian organizations and a comparison is made to suggest the guidelines of KM practices to manufacturing Industries.

        • KCI등재

          Social Commerce and Consumer Protection Policies

          유승엽,Yu, Seung-Yeob The Society of Digital Policy and Management 2012 디지털융복합연구 Vol.10 No.7

          본 연구는 소셜커머스의 발전에 따른 운영상의 문제점을 제시하고 소비자 보호정책 방안을 제시하고자하는 목적에서 이루어졌다. 이를 위해 먼저, 소셜커머스의 개념을 살펴보고, 국내외 소셜커머스의 대표적인 유형을 살펴보았다. 또한, 소셜커머스 업체의 운영에 통해 발생한 문제점을 알아보았다. 이러한 소셜커머스 업체의 운영에 따른 문제점을 개선하는 방안으로 소비자의 보호정책 방안을 제시하였다. 궁극적으로 본 연구결과는 새로운 상거래의 형태인 소셜커머스에서 소비자를 보호할 최선의 방안을 찾고자 하였다. 이러한 연구결과는 향후 소셜커머스의 소비자 보호정책을 마련하는데 토대를 제공할 것이다. This study intends to investigate some practical problems that arise from the development of the social commerce market and propose a set of consumer protection policies. To that purpose, we discuss the concept of social commerce and analyze a few common types of social commerce in Korea. Then, we look into the problems of the social commerce industry and propose a set of consumer protection policies that can deal with those problems. The goal of the current paper is to suggest optimal policies that can protect consumers from this new trend of online transactions. We hope that the proposals can help establish the base of consumer protection from the social commerce business.

        • KCI등재

          Paper Evaluation of 'Application of AHP in Project Management' by K.M.A.S-S. Al-Harbi

          김민철,하태현,Kim, Min-Cheol,Ha, Tai-Hyun The Society of Digital Policy and Management 2010 디지털융복합연구 Vol.8 No.1

          본 연구는 프로젝트 경영 분야 중 Al-Harbi (2001)의 논문을 Pyrczak (2008)이 제시한 평가절차에 의하여 분석하였다. 분석 대상으로 선정된 Al-Harbi (2001)의 논문은 프로젝트 경영에서 의사결정방법론으로서의 AHP (Analytical Hierarchy Process) 적용 가능성을 제시하였다. 이러한 논문의 평가를 위해서 여러 절로 구분하여 Pyrczak (2008)에서 제시하는 분석표에 의해 논문을 세부적으로 평가하였다. 본 연구는 연구 논문의 평가 방법을 정량화된 수치에 의해 보여줄 수 있음을 제안했다는 점에의 의미를 갖고 있다. This study focuses on the evaluation of an article about the AHP methodology in project area at 2001 edition. It is titled, "Application of AHP in project management," by K.M.A.S-S. Al-Harbi. This paper presents the Analytical Hierarchy Process (AHP) as a decision making method in project management. The evaluation by each section is based on the model by Fred Pyrczak (2008) in Evaluating Research in Academic Journals. This paper has an implication that evaluation method can be shown by quantitative numerical value.

        • KCI등재

          Efficient Security Method Using Mobile Virtualization Technology And Trustzone of ARM

          최휘민,장창복,김주만,Choi, Hwi-Min,Jang, Chang-Bok,Kim, Joo-Man The Society of Digital Policy and Management 2014 디지털융복합연구 Vol.12 No.10

          최근, 스마트폰의 사용자 수는 스마트폰 성능 향상 및 다양한 서비스 제공으로 인해 매우 빠르게 증가하고 있다. 스마트폰 사용자들은 클라우드 서비스, 게임, 뱅킹 서비스, 모바일 서비스 등의 다양한 서비스를 사용한다. 오늘날의 모바일 보안 솔루션은 악성코드를 검출하거나 모바일 장치를 관리하는 수준에 그치고 있다. 이에 인증서, 법인 문서, 개인의 신용 카드 번호와 같은 보안에 민감한 정보에 대해 서비스 해킹 및 누설을 방지하는 기술이 필요하다. 모바일 보안 기술은 피해가 발생한 사례가 있었던 만큼 최근에 관심이 증가하고 있다. 이러한 문제를 해결하기 위해서 모바일 가상화, ARM Trustzone, Globalplatform과 같은 다양한 모바일 장치의 보안 기술이 연구되었다. 따라서 본 논문에서는 정보 유출 및 해킹을 방지하기 위한 인증, 보안 정책 및 액세스 제어, 암호/키 관리, 세이프 스토리지 등의 모바일 가상화 기술과 ARM의 Trustzone의 효율적인 방법을 제안한다. Today, a number of users using smartphone is very rapidly increasing by development of smartphone performance and providing various services. Also, they are using it for enjoying various services(cloud service, game, banking service, mobile office, etc.). today's mobile security solution is simply to detect malicious code or stay on the level of mobile device management. In particular, the services which use sensitive information, such as certificate, corporation document, personal credit card number, need the technology which are prevented from hacking and leaking it. Recently, interest of these mobile security problems are increasing, as the damage cases been occurred. To solve the problem, there is various security research such as mobile virtualization, ARM trustzone, GlobalPlatform for mobile device. Therefore, in this paper, I suggested efficient method that uses the mobile virtualization techniques of certification, security policy and access control, password/key management, safe storage, etc. and Trustzone of ARM for preventing information leakage and hacking.

        맨 위로 스크롤 이동