Earticle

현재 위치 Home

Issues

JITAM [Journal of Information Technology Applications and Management]

간행물 정보
  • 자료유형
    학술지
  • 발행기관
    한국정보기술응용학회 [The Korea Society of Information Technology Applications]
  • pISSN
    1598-6284
  • eISSN
    2508-1209
  • 간기
    격월간
  • 수록기간
    1999 ~ 2026
  • 주제분류
    사회과학 > 경영학
  • 십진분류
    KDC 005 DDC 005
Vol.30 No.6 (9건)
No
1

AHP를 이용한 스마트 공급망 구축을 위한 주요 성공요인 분석

박철수

한국정보기술응용학회 JITAM Vol.30 No.6 2023.12 pp.1-15

※ 기관로그인 시 무료 이용이 가능합니다.

4,800원

With the advent of the Fourth Industrial Revolution, propelled by digital technology, we are transitioning into an era of hyperconnectivity, where everything and objects are becoming interconnected. A smart supply chain refers to a supply chain system where various sensors and RFID tags are attached to objects such as machinery and products used in the manufacturing and transportation of goods. These sensors and tags collect and analyze process data related to the products, providing meaningful information for operational use and decision-making in the supply chain. Before the spread of COVID-19, the fundamental principles of supply chain management were centered around ‘cost minimization’ and ‘high efficiency.’ A smart supply chain overcomes the linear delayed action-reaction processes of traditional supply chains by adopting real-time data for better decision-making based on information, providing greater transparency, and enabling enhanced collaboration across the entire supply chain. Therefore, in this study, a hierarchical model for building a smart supply chain was constructed to systematically derive the importance of key factors that should be strategically considered in the construction of a smart supply chain, based on the major factors identified in previous research. We applied AHP (Analytical Hierarchy Process) techniques to identify urgent improvement areas in smart SCM initiatives. The analysis results showed that the external supply chain integration is the most urgent area to be improved in smart SCM initiatives.

2

UAM 항공교통관리 인프라의 사이버보안 고려사항 및 대응방안

김경욱

한국정보기술응용학회 JITAM Vol.30 No.6 2023.12 pp.17-29

※ 기관로그인 시 무료 이용이 가능합니다.

4,500원

In this paper, we aim to propose cyber security considerations and countermeasures for infrastructure and services in the UAM(Urban Air Mobility) Air Traffic Management field, which is one of the key elements of the UAM market that has not yet bloomed. Air traffic management is an important factor for safe navigation and social acceptance of UAM. In order to realize air traffic management, infrastructure and services based on solid network connectivity must be established. And for industries where connectivity is the core component, it can become an infiltration route for cyber threats. Therefore, cyber security is essential for the infrastructure and services. In detail, we will look into the definition of the existing air traffic management field and the cyber threats. In addition, we intend to identify cyber security threat scenarios that may occur in the newly designed UAM air traffic management infrastructure. Moreover, in order to study the cyber security countermeasures of the UAM air traffic management infrastructure, there will be analysis of the UAM operation concept. As a result, countermeasures applicable to the infrastructure and service fields will be suggested by referring to the cyber security frameworks.

3

5,800원

The government’s various support policies have helped Korea’s SMEs and startups to grow from the beginning to the end, from domestic companies to exporters. In particular, direct business support policies such as financial support, R&D projects, and export support have been effective in helping a large number of entrepreneurs and startup companies to establish themselves in the market and have achieved tangible results every year since the establishment of the Ministry of SMEs and Startups. As such, the government is making significant efforts to create and promote various types of support policies and to help companies utilize them in their business. However, this study aims to analyze the factors that affect the satisfaction of government policies and the achievement of managerial performance from the companies’ perspective and to suggest the purpose of government support policies and the direction companies should take. Specifically, this study categorizes entrepreneurial self-efficacy into marketing, innovation, management, risk-taking, and financial management, using the relationship model of self-efficacy and collective efficacy to ultimately lead to practical results for SMEs and startups support policies. It uses perceived firm efficacy as a variable to reveal the influence relationship. In addition, the direct and mediating effects of entrepreneurial self-efficacy and policy satisfaction on managerial performance were analyzed to determine what SMEs and startups support policies should do. The results showed that, first, among the five components of entrepreneurial self-efficacy, innovation, and risk-taking efficacy positively affected perceived firm efficacy. Second, the specific components of entrepreneurial self-efficacy, marketing, and financial management efficacy positively influenced policy satisfaction. Third, we found that perceived firm efficacy positively influenced policy satisfaction and managerial performance, which are factors of SMEs and startups’ policy performance. Specifically, perceived firm efficacy positively influenced policy satisfaction managerial performance. Fourth, we found that policy satisfaction positively influenced managerial performance.

4

4,900원

Through the COVID-19 pandemic, the demand for non-face-to-face communication systems has surged, leading to an increased prevalence of virtual interactions across various domains, such as tasks, meetings, orders and deliveries, and even student education. Against this backdrop, interest in the metaverse platform has been on the rise, with metaverse services like Zepeto, Roblox, and Minecraft expanding beyond gaming to encompass educational fields as well. This study aims to identify authenticity factors influencing metaverse platform-based educational services and examine their impact. The authenticity components are defined as integrity, empathy, interactivity, presence, and uniqueness. The study investigates the effects of these authenticity components on both service value and service satisfaction. To achieve this, a survey involving 320 metaverse users was conducted, and the model was subjected to statistical validation. The findings of this research underscore that perceiving metaverse education services, still in the early stages of introduction, as authentic educational methods for learners positively influences satisfaction with the educational service.This study holds significance as it lays the theoretical groundwork for enhancing the authenticity of educational services in virtual space. It defines and proposes authenticity elements for customer satisfaction in metaverse educational services, which are still in their nascent stages. Moving forward, it is anticipated that various studies will be conducted to enhance the value of metaverse education services and achieve higher customer satisfaction as customer experiences evolve and deepen.

5

해상교통 상황인지 향상을 위한 합성 데이터셋 구축방안 연구

이영채, 박세길

한국정보기술응용학회 JITAM Vol.30 No.6 2023.12 pp.69-80

※ 기관로그인 시 무료 이용이 가능합니다.

4,300원

Ship collision accidents not only cause loss of life and property damage, but also cause marine pollution and can become national disasters, so prevention is very important. Most of these ship collision accidents are caused by human factors due to the navigation officer's lack of vigilance and carelessness, and in many cases, they can be prevented through the support of a system that helps with situation awareness. Recently, artificial intelligence has been used to develop systems that help navigators recognize the situation, but the sea is very wide and deep, so it is difficult to secure maritime traffic datasets, which also makes it difficult to develop artificial intelligence models. In this paper, to solve these difficulties, we propose a method to build a dataset with characteristics similar to actual maritime traffic datasets. The proposed method uses segmentation and inpainting technologies to build a foreground and background dataset, and then applies compositing technology to create a synthetic dataset. Through prototype implementation and result analysis of the proposed method, it was confirmed that the proposed method is effective in overcoming the difficulties of dataset construction and complementing various scenes similar to reality.

6

UAM 교통관제시스템 개발 동향 및 설계 개념 연구

허창환, 강광천, 윤형근

한국정보기술응용학회 JITAM Vol.30 No.6 2023.12 pp.81-90

※ 기관로그인 시 무료 이용이 가능합니다.

4,000원

In aviation, with the rapid transformation of the mobility industry, UAMs are emerging to operate green low-altitude airspace in urban environments. In order for UAM aircraft to fly safely transporting passengers and cargo in low-altitude urban airspace, a traffic control system that supports the safe operation of the aircraft is essential. In particular, traffic control systems that reflect the characteristics of the flight environment, such as operating at low altitude in urban environments for a short period of time, are required. In this study, we define the definition of UATM and its main services that perform traffic control for the safe operation of UAMs. In addition, we analyzed the development trends of UATM systems based on domestic and overseas cases. Based on these analyses, we present the results of the concept design of the UATM system. After analyzing UATM development cases, we found that there is no commercialized UATM system, but overseas development is focused on systems that can integrate ATM and UTM. And we identified key stakeholders and interface data, and performed UATM system architecture and functional design based on the identified data. Finally, as a necessary element for the future development of UATM systems, we propose the establishment and advancement of UAM traffic flow management systems, the establishment of integrated control systems, and the development of interface with aircraft operation systems in preparation for the unmanned UAM aircraft.

7

5,700원

This study aims to identify the influencing factors of intention to use cloud services using the SEM-ANN two-step approach. In previous studies of SEM-ANN, SEM presented R² and ANN presented MSE(mean squared error), so analysis performance could not be compared. In this study, R² and MSE were calculated and presented by SEM and ANN, respectively. Then, analysis performance was compared and feature importances were compared by sensitivity analysis. As a result, the ANN default model improved R² by 2.87 compared to the PLS model, showing a small Cohen's effect size. The ANN optimization model improved R² by 7.86 compared to the PLS model, showing a medium Cohen effect size. In normalized feature importances, the order of importances was the same for PLS and ANN. The contribution of this study, which links structural equation modeling to artificial intelligence, is that it verified the effect of improving the explanatory power of the research model while maintaining the order of importance of independent variables.

8

포렌식 전문가의 양성을 위한 교과과정 설계에 관한 연구

최명길

한국정보기술응용학회 JITAM Vol.30 No.6 2023.12 pp.113-142

※ 기관로그인 시 무료 이용이 가능합니다.

7,000원

As society becomes more digital, the need for digital forensics experts are gradually increasing. It is necessary to establish a training policy that reflects the special characteristics of digital forensics personnel. Although there are fragmented policies for digital forensics-related systems and human resources training in academia, it is an urgently necessary to establish a systematic and long-term policy to foster digital forensics experts. This study suggests curriculum of digital forensic based on the importance ranking among forensic subjects. The importance ranking can be decided by forensic experts. This study can be used as policy data to foster diverse talent that can effectively meet the increasing demand for digital forensics talent. The systematic curriculum proposed in this study is a practical curriculum at the undergraduate level and can be suitable for university level

9

4,500원

Procedural generation methods based on physical-based materials generate data by algorithms rather than manual through combinations with artist-generated assets based on computer-generated randomness algorithms. For this reason, the procedural generation method is mainly used to produce textures of 3D models in the field of computer graphics because it is easy to obtain the desired quality with little data. This study is a study on physical-based materials and procedural generation methods based on them. Physical-based materials are divided into Metallic/Roughness workflows and Specific/Glossiness workflows. These two methods produce the same results, which are more accurate based on the law of conservation of energy. The procedural generation method allows a natural texture to be obtained very quickly by texturing through a combination of a computer-generated random algorithm and an artist-generated asset based on various maps.

 
페이지 저장