• Title/Summary/Keyword: ICT convergence

Search Result 1,395, Processing Time 0.034 seconds

The Influence of Transformational Leadership on Unethical Pro-Organizational Behavior-Mediating Effect of Organizational Identification (변혁적 리더십이 비윤리적 친조직 행동에 미치는 영향 -조직 동일시의 매개 효과)

  • Lee, Kang-Min;Choo, Shi-Gak;Jeon, Sang-Gil
    • Journal of Digital Convergence
    • /
    • v.14 no.2
    • /
    • pp.83-98
    • /
    • 2016
  • This study attempted to test not only the influence of transformational leadership(TFL) on employees' unethical pro-organizational behavior(UPB), but also the mediating effect of organizational identification(OID) between TFL and employees' UPB. This study employed two research methods: literature review and empirical testing of the developed hypotheses. Data were collected through online questionnaire instruments from 229 employees working at companies in Korea. To test the hypotheses, structural equation modeling was employed. The model is shown as adequately fitting to the data. The results showed that there was not a positive and statistically significant relationship between TFL and employees' UPB, and OID played as a mediator in the relationship between TFL and employees' UPB. These findings provide a meaningful implication that the positive impact of TFL is linked to employees' UPB through OID.

How Does Communication Structure Influence Team Performance in Complex Tasks (커뮤니케이션 구조가 팀 성과에 미치는 영향에 관한 연구)

  • TANG, WEI;Jeon, Sang-Gil;Choo, Shi-Gak
    • Journal of Digital Convergence
    • /
    • v.14 no.4
    • /
    • pp.221-230
    • /
    • 2016
  • This is an experimental study which is designed to identify the joint relationship between communication density and centrality as independent factors to team performance, discovering how they would jointly affect work team performance. Specially different from existing studies, separating team performance into team efficiency and team effectiveness, we identified differential influences to the two independent factors. Findings suggest a competing relationship between communication density and centrality. A framework was proposed to help managers understand the joint effect of density and centrality on performance. Work team has high communication density and low centrality is "Innovating", which is likely to have a great extent of ideas, knowledge and information sharing, and reach high effectiveness. Team with high centrality and low density is characterized as "centralized". Such communication structure may reduce diversity of perspectives and accelerate team decision making. When both density and centrality are low, the team is "Autonomous". To increase external validity, other factors such as leadership, organizational climate influencing on team performance should be reflected in the future research.

A Study on Improvement Plans of SMEs Support Policy for Information Security in Korea (국내 중소기업 정보보호 지원 정책 개선 방안에 관한 연구)

  • Jang, Sang-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.332-339
    • /
    • 2020
  • This study aims to analyze problems and deduce improvement plans for information security support policies for SMEs in Korea. To this end, an effective support policy necessary for reinforcing cyber safety nets to enhance the level of information security of domestic SMEs based on the analysis results by analyzing the status and problems of the previous research review and analysis, the current status of information security of SMEs and the information security support policies of major SMEs at home and abroad. I would like to suggest improvement measures. Reinforcement of awareness, legal basis, voluntary capacity building, joint response system, professional manpower and budget support, cyber security construction, untact era support, and regional strategic industry security internalization were suggested. This can be used as the government's information security support policy to raise the level of information security of SMEs in preparation for the post Covid19.

A Study on Establishing of the Future Development Strategy for National Cyber Terror Response (국가 사이버테러대응 미래 발전전략 수립에 관한 연구)

  • Kim, MinSu;Yang, Jeongmo
    • Convergence Security Journal
    • /
    • v.20 no.1
    • /
    • pp.15-24
    • /
    • 2020
  • Cyber terror and cyberwarfare are no longer virtual, but real, and as an actual security situation, it is necessary to have new understanding through expanding the concept of war to neutralize not only the other country's military command system, but also the country's main functions such as telecommunications, energy, finance, and transport systems, and it also needs to establish the future development strategy of cyber terror response at the national level. Through analysis of cyberwarfare trends in each country and current status of cyberwarfare in Korea, it will systematically explore the demand of new policy based on laws and systems, including the strategies of cyber security technology development, industry promotion, and manpower training and existing information protection policies. through this, it effectively manages a sustainable national crisis, and it suggests to establish a future strategy for the medium and long term cyber security that can effectively and actively respond to cyberwarfare.

A Study on Measures to Reduce Traffic Accidents caused by Using Smartphones While Driving (운전 중 스마트폰 사용으로 인한 교통사고 저감대책 연구)

  • You, Seung-Hee
    • Journal of Digital Convergence
    • /
    • v.14 no.7
    • /
    • pp.175-184
    • /
    • 2016
  • The purpose of the study focuses on increasing dangers of using smartphones while driving recently, and then is to come up with measures to reduce traffic accidents caused by using devices like a smartphone. This study conducted a survey of drivers using their smartphones while driving to understand risks caused by using a smartphones while operating vehicles. Results showed that a lot of activities may lead to distracted driving, such as texting, making phone calls, using GPS or road maps, game, etc. In this paper, we presented that functions of smartphone should be controlled partially while driving for safe driving performance. These results suggest that using IoT-based smart devices like a beacon and a smartphone application implemented, tentatively called "Safe driving solution", while driving can reduce traffic accidents. Thus, in order to effectively prevent dangerous driving due to the use of smartphones, a "Safe driving solution" which restricts all functions except for calls and driver assistance functions is suggested.

Realization of user-centered smart factory system using motion recognition (모션인식을 이용한 사용자 편의 중심의 스마트팩토리 시스템 구현)

  • Park, Jun-Hyung;Lee, Kyu-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.6
    • /
    • pp.153-158
    • /
    • 2017
  • Due to the rapid development of information and communication, we live in the smart age of information society. Smart Factory, which integrates Information and communication technology, is being hailed as the technology of the $4^{th}$ industrial revolution. As a result of entering the information society, the factory has made a lot of progress in automation. In this thesis, we used kinetization to research and implement the leisure system of the factory through motion. Kinect provides users with various convenience because they can take advantage of the user's actions and control the system through information. This study is expected to produce a smart factory with video processing, and it is expected to affect the efficiency of the production by providing various conveniences for people working in factories.

A Basic Study for the implementation of 3D unit space objects in the pre-design phase for decision making support (프로젝트 기획 단계의 의사결정 지원을 위한 3D 단위 공간 객체 적용 방안에 관한 기초 연구)

  • Ham, Nam-Hyuk;Kim, Ju-Hyung;Lee, Yoon-Sun;Kim, Jae-Jun
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2007.11a
    • /
    • pp.864-867
    • /
    • 2007
  • Recent advancement in ICT and IT infrastructure drives the construction industry towards a IT-based industry. Accordingly, the importance of the planning phase of a project is significantly highlighted due to recent large-scale national development projects such as U-city and multifunctional administration city. various development and studies are conducted on the convergence of 3D CAD and GIS in order to support the decision making by simulation of each phase of construction prior to the actual construction of a building. However there has been limits to the implementation of the IT technology in the planning phase due to its characteristics such as high reliability on the experts knowledge and the compliance of the administration work. In this study, a trendy issue of the convergence of the GIS technology with the 3D CAD design data is suggested to improve the efficiency of a decision support in the planning phase.

  • PDF

Development of CAN network intrusion detection algorithm to prevent external hacking (외부 해킹 방지를 위한 CAN 네트워크 침입 검출 알고리즘 개발)

  • Kim, Hyun-Hee;Shin, Eun Hye;Lee, Kyung-Chang;Hwang, Yeong-Yeun
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.20 no.2
    • /
    • pp.177-186
    • /
    • 2017
  • With the latest developments in ICT(Information Communication Technology) technology, research on Intelligent Car, Connected Car that support autonomous driving or services is actively underway. It is true that the number of inputs linked to external connections is likely to be exposed to a malicious intrusion. I studied possible security issues that may occur within the Connected Car. A variety of security issues may arise in the use of CAN, the most typical internal network of vehicles. The data can be encrypted by encrypting the entire data within the CAN network system to resolve the security issues, but can be time-consuming and time-consuming, and can cause the authentication process to be carried out in the event of a certification procedure. To resolve this problem, CAN network system can be used to authenticate nodes in the network to perform a unique authentication of nodes using nodes in the network to authenticate nodes in the nodes and By encoding the ID, identifying the identity of the data, changing the identity of the ID and decryption algorithm, and identifying the cipher and certification techniques of the external invader, the encryption and authentication techniques could be detected by detecting and verifying the external intruder. Add a monitoring node to the CAN network to resolve this. Share a unique ID that can be authenticated using the server that performs the initial certification of nodes within the network and encrypt IDs to secure data. By detecting external invaders, designing encryption and authentication techniques was designed to detect external intrusion and certification techniques, enabling them to detect external intrusions.

Application of Verification & Validation for deepsea mining robot technology development (심해저 채광로봇 기술개발을 위한 Verification & Validation의 적용)

  • Sung, Ki-Young;Cho, Su-Gil;Oh, Jae-Won;Yeu, Tae-kyeong;Hong, Sup;Kim, Hyungwoo
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.22 no.6
    • /
    • pp.689-702
    • /
    • 2019
  • This paper deals with the verification of the functions about mining robot, which is the system for developing deep seabed resources by applying V&V(verification and validation). In order to overcome water pressure of 500 bar and to travel on soft ground, and to operate in deep sea environment with bad conditions, it is necessary to develop a robot that can satisfy various deepsea conditions. A mining robot has been developed based on simulation based design and Multidisciplinary design optimization. In order to verify the developed robot, lab test and real sea test should be performed for various marine environment conditions. There are too many requirements to consider, such as space, time, cost, personnel, and environment to do performance test. So it is costly and time consuming for developing robot. In order to solve this problems, V&V technique was applied to mining robot. The stages of mining robot design, fabrication and commission were verified.

A Study on Interest Factors of Game-based Metaverse : focused on the topic analysis of user community (게임 기반 메타버스의 사용자 흥미 요인 연구 : <동물의 숲> 사용자 커뮤니티의 토픽 분석을 중심으로)

  • Ahn, Jin-Kyoung;Kwak, Chanhee
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.10
    • /
    • pp.1-9
    • /
    • 2021
  • Although interest in the metaverse increases due to the pandemic, the understanding of the metaverse interest factor, which is an essential element for the sustainability of any metaverse platform, is lacking. This study aims to reveal the interest factors of metaverse services by analyzing user community discourse. We collected user community discourses from and applied LDA to extract topics. Further, we categorize the factors into growth and verifiable indicators, various levels of interaction, self-expression and freedom, and connection with the real world. The content planning direction of the game-based metaverse of utilization was derived. This study is meaningful in that it analyzes the interest factors of the metaverse based on the empirical evidence of user discourse data.