Lee Joo Hoon;Lee Byong Sop;Kang Hee-Gyung;Hahn Hyewon;Lee Jun Ho;Ha Il Soo;Cheong Hae Il;Choi Yong;Kim Sang Joon
Childhood Kidney Diseases
/
v.4
no.1
/
pp.84-91
/
2000
Purpose: To improve the recovery of growth deficit after renal transplantation in children, we analysed the factors affecting height growth after renal transplantation. Methods: We reviewed medical records of fifty-six children in whom height data were available for three years after transplantation. All height data were converted into Z-scores. We analyzed the effects of sex, age at transplantation, cumulative mean steroid dose for 3 years, serum creatinine levels, height at transplantation, donor source and history of prior dialysis on patients' z-scores and delta Zs. Results: The Z-scores at transplantation were lower in patients of younger age (P=0.007). When baseline Z-scores were lower, the delta Zs were higher (P<0.01), but the Z-scores after transplantation were still lower (P<0.001). According to the analysis of the partial correlation coefficients, Z-scores and delta Zs at 1 year after transplantation were higher in groups of younger age and of lower steroid dosages (P<0.05). The delta Zs at 6 month and 1 year after transplantation were lower in the group with abnormally higher serum creatinine (P<0.05). There was no difference in Z-scores between groups of different genders, donor sources, and histories of previous dialysis. Conclusion: The children of younger age, on lower steroid dosage, with less growth retardation at transplantation, and with normal graft function had better height growth recoveries after renal transplantation.
Lee Chang-Jin;Cho Hee-Yeon;Kang Ju- Hyung;Shin Choong-Ho;Ha Il-Soo;Cheong Hae-Il;Yang Sei-Won;Choe Yong
Childhood Kidney Diseases
/
v.8
no.2
/
pp.195-204
/
2004
Purpose: Hypophosphatemic rickets is a hereditary disease, characterized by hypophosphatemia due to renal phosphate wasting, impaired renal production of 1,25-dihydroxyvitamin $D_3$, rachitic bone deformities and impaired growth. The purpose of this study is to provide clinical profiles of patients with hypophosphatemic rickets in our hospital. Methods: Between July 1983 and February 2004, 56 patients were diagnosed as having hypophosphatemic rickets. The medical records of these patients were reviewed retrospectively. Clinical manifestations, family histories, laboratory data, treatment outcomes were described. Results: Fifty six patients were enrolled in this study. The average age at symptom onset and diagnosis were 20 months and 5 years respectively. Fourteen patients had family histories. The main clinical manifestations were bow legs and short stature. There was a significant negative correlation between the ages and the height z-scores at the time of diagnosis(r=-0.47, P=0.005). Initial laboratory data showed normocalcemia, hypophosphatemia, elevated serum alkaline phosphatase, decreased tubular reabsorption of phosphate and a normal range of 1,25-dihydroxyvitamin $D_3$ Radiographic examinations of bone revealed fraying, widening and cupping of the metaphyseal ends. Treatment consisted of Joulie solution and vitamin D metabolites, and resulted in improved biochemical and radiographic findings. However, height z-scores remained essentially unchanged(P=0.224). Complications of treatment were frequently observed, including hyperparathyroidism, nephrocalcinosis, and hypercalciuria. Sixteen patients had corrective osteotomy and 4 of them underwent leg lengthening together. Conclusion: There was a gap of several years between the onset of symptoms and the diagnosis. Early treatment seems to be essential to growth. For the earlier treatment, the offsprings of affected parents should be followed up closely.
As we enter a high industrial society that widens the gap between the rich and poor, demand for the security services has grown explosively. With the growth in quantitative expansion of security services, people have also placed increased requirements on more sophisticated and diversified security services. Consequently, market outlook for private security services industry is positive. However, Korea's private security services companies are experiencing difficulties in finding a direction to capture this new market opportunity due to their small sizes and lack of management-strategic thinking skills. Therefore, we intend to offer a direction of development for our private security services industry using a management-strategy theory and the Analytic Hierarchy Process(AHP), a structured decision-making method. A resource-based theory is one of the important management strategy theories. It explains that a company's overall performance is primarily determined by its competitive resources. Using this theory, we could analyze a company's unique resources and core competencies and set a strategic direction for the company accordingly. The usefulness and validity of this theory has been demonstrated as it has often been subject to empirical verification since 1990s. Based on this theory, we outlined a set of basic procedures to establish a management strategy for the private security services companies. We also used the AHP method to identify competitive resources, core competencies, and strategies from private security services companies in contrast with public companies. The AHP method is a technique that can be used in the decision making process by quantifying experts' knowledge and unstructured problems. This is a verified method that has been used in the management decision making in the corporate environment as well as for the various academic studies. In order to perform this method, we gathered data from 11 experts from academic, industrial, and research sectors and drew distinctive resources, competencies, and strategic direction for private security services companies vis-a-vis public organizations. Through this process, we came to the conclusion that private security services companies generally have intangible resources as their distinctive resources compared with public organization. Among those intangible resources, relational resources, customer information, and technologies were analyzed as important. In contrast, tangible resources such as equipment, funds, distribution channels are found to be relatively scarce. We also found the competencies in sales and marketing and new product development as core competencies. We chose a concentration strategy focusing on a particular market segment as a strategic direction considering these resources and competencies of private security services companies. A concentration strategy is the right fit for smaller companies as a strategy to allow them to focus all of their efforts on target customers in a single segment. Thus, private security services companies would face the important tasks such as developing a new market and appropriate products for such market segment and continuing marketing activities to manage their customers. Additionally, continuous recruitment is required to facilitate the effective use of human resources in order to strengthen their marketing competency in a long term.
For many rears, traffic accident statistics are the most direct measure of safety for a signalized intersection. However it takes more than 2 or 3 yearn to collect certain accident data for adequate sample sizes. And the accident data itself is unreliable because of the difference between accident data recorded and accident that is actually occurred. Therefore, it is rather difficult to evaluate safety for a intersection by using accident data. For these reasons, traffic conflict technique(TCT) was developed as a buick and accurate counter-measure of safety for a intersection. However, the collected conflict data is not always reliable because there is absence of clear criteria for conflict. This study developed objective and accurate conflict criteria, which is shown below based on traffic engineering theory. Frist, the rear-end conflict is regarded, when the following vehicle takes evasive maneuver against the first vehicle within a certain distance, according to car-following theory. Second, lane-change conflict is regarded when the following vehicle takes evasive maneuver against first vehicle which is changing its lane within the minimum stopping distance of the following vehicle. Third, cross and opposing-left turn conflicts are regarded when the vehicle which receives green sign takes evasive maneuver against the vehicle which lost its right-of-way crossing a intersection. As a result of correlation analysis between conflict and accident, it is verified that the suggested conflict criteria in this study ave applicable. And it is proven that estimating safety evaluation for a intersection with conflict data is possible, according to the regression analysis preformed between accident and conflict, EPDO accident and conflict. Adopting the conflict criteria suggested in this study would be both quick and accurate method for diagnosing safety and operational deficiencies and for evaluation improvements at intersections. Further research is required to refine the suggested conflict criteria to extend its application. In addition, it is necessary to develope other types of conflict criteria, not included in this study, in later study.
Measuring Information Technology(IT) organizations' activities have been limited to mainly measure financial indicators for a long time. However, according to the multifarious functions of Information System, a number of researches have been done for the new trends on measurement methodologies that come with financial measurement as well as new measurement methods. Especially, the researches on IT Balanced Scorecard(BSC), concept from BSC measuring IT activities have been done as well in recent years. BSC provides more advantages than only integration of non-financial measures in a performance measurement system. The core of BSC rests on the cause-and-effect relationships between measures to allow prediction of value chain performance measures to allow prediction of value chain performance measures, communication, and realization of the corporate strategy and incentive controlled actions. More recently, BSC proponents have focused on the need to tie measures together into a causal chain of performance, and to test the validity of these hypothesized effects to guide the development of strategy. Kaplan and Norton[2001] argue that one of the primary benefits of the balanced scorecard is its use in gauging the success of strategy. Norreklit[2000] insist that the cause-and-effect chain is central to the balanced scorecard. The cause-and-effect chain is also central to the IT BSC. However, prior researches on relationship between information system and enterprise strategies as well as connection between various IT performance measurement indicators are not so much studied. Ittner et al.[2003] report that 77% of all surveyed companies with an implemented BSC place no or only little interest on soundly modeled cause-and-effect relationships despite of the importance of cause-and-effect chains as an integral part of BSC. This shortcoming can be explained with one theoretical and one practical reason[Blumenberg and Hinz, 2006]. From a theoretical point of view, causalities within the BSC method and their application are only vaguely described by Kaplan and Norton. From a practical consideration, modeling corporate causalities is a complex task due to tedious data acquisition and following reliability maintenance. However, cause-and effect relationships are an essential part of BSCs because they differentiate performance measurement systems like BSCs from simple key performance indicator(KPI) lists. KPI lists present an ad-hoc collection of measures to managers but do not allow for a comprehensive view on corporate performance. Instead, performance measurement system like BSCs tries to model the relationships of the underlying value chain in cause-and-effect relationships. Therefore, to overcome the deficiencies of causal modeling in IT BSC, sound and robust causal modeling approaches are required in theory as well as in practice for offering a solution. The propose of this study is to suggest critical success factors(CSFs) and KPIs for measuring performance for IT organizations and empirically validate the casual relationships between those CSFs. For this purpose, we define four perspectives of BSC for IT organizations according to Van Grembergen's study[2000] as follows. The Future Orientation perspective represents the human and technology resources needed by IT to deliver its services. The Operational Excellence perspective represents the IT processes employed to develop and deliver the applications. The User Orientation perspective represents the user evaluation of IT. The Business Contribution perspective captures the business value of the IT investments. Each of these perspectives has to be translated into corresponding metrics and measures that assess the current situations. This study suggests 12 CSFs for IT BSC based on the previous IT BSC's studies and COBIT 4.1. These CSFs consist of 51 KPIs. We defines the cause-and-effect relationships among BSC CSFs for IT Organizations as follows. The Future Orientation perspective will have positive effects on the Operational Excellence perspective. Then the Operational Excellence perspective will have positive effects on the User Orientation perspective. Finally, the User Orientation perspective will have positive effects on the Business Contribution perspective. This research tests the validity of these hypothesized casual effects and the sub-hypothesized causal relationships. For the purpose, we used the Partial Least Squares approach to Structural Equation Modeling(or PLS Path Modeling) for analyzing multiple IT BSC CSFs. The PLS path modeling has special abilities that make it more appropriate than other techniques, such as multiple regression and LISREL, when analyzing small sample sizes. Recently the use of PLS path modeling has been gaining interests and use among IS researchers in recent years because of its ability to model latent constructs under conditions of nonormality and with small to medium sample sizes(Chin et al., 2003). The empirical results of our study using PLS path modeling show that the casual effects in IT BSC significantly exist partially in our hypotheses.
Chinese yam (Dioscorea Opposita Thanb) has been cultivated as medicinal crop and food. The experiment was carried out to determine the effect of tuber head origin and fertilizer application method on its agronomic characters of shoot and root tuber to get some imformation on its cultivation. The tuber head cultivated were cut from normal or branched root tuber. 37-28-32-2000 : N-P-K-Humus(Kg/10a) by dispersal but 30% N reduction of Con(RN) or strip application on the two-side of hill(SRN), were applied but N and K were given by the above method with the rate of 40% in March, 30% in June and 30% in July. Agronomic characteristics related to shoot and root tuber were measured and their relationship was analyzed. Tuber head origin had no effect on emergence rate, vine length, branch and node of vine, while emergence date of the tuber head from the normal root which showed the greatest emergence rate, vine length and node in Con treatment was earlier than the others. The tuber head from the normal root, furthermore, had greater length and diameter of root tuber harvested from the field and fresh weight per plant of per 10a compared to the tuber head from the branched root, whereas in both the normal and the branched tuber head RN had the worst result in the characters related to tuber yield except tuber diameter. The tuber head from the normal root produced heavier root tuber than that from the branched tuber and SRN had the best economic yield among the application methods, which resulted from production of less branched root tubers and their rate. In both the normal and the branched tuber head, moreover, yield per plant and economic yield were positively correlated to tuber length but negatively done to number. of branch of vine.
Although the main geology of Korea consists of granite and gneiss, it Is not uncommon to encounter anisotropy Phenomena in crosshole radar tomography even when the basement is crystalline rock. To solve the anisotropy Problem, we have developed and continuously upgraded an anisotropic inversion algorithm assuming a heterogeneous elliptic anisotropy to reconstruct three kinds of tomograms: tomograms of maximum and minimum velocities, and of the direction of the symmetry axis. In this paper, we discuss the developed algorithm and introduce some case histories on the application of anisotropic radar tomography in Korea. The first two case histories were conducted for the construction of infrastructure, and their main objective was to locate cavities in limestone. The last two were performed In a granite and gneiss area. The anisotropy in the granite area was caused by fine fissures aligned in the same direction, while that in the gneiss and limestone area by the alignment of the constituent minerals. Through these case histories we showed that the anisotropic characteristic itself gives us additional important information for understanding the internal status of basement rock. In particular, the anisotropy ratio defined by the normalized difference between maximum and minimum velocities as well as the direction of maximum velocity are helpful to interpret the borehole radar tomogram.
The eastern coast of South Korea is expected to be damaged by volcanic ash when Mt. Baekdusan volcano erupts. Even if the amount of volcanic ash is small, it can be fatal on the agricultural sector withering many plants and causing soil acidification. Thus, in this paper, we aim to estimate agricultural losses caused by the volcanic ash and to visualize them with Google map. To estimate the volcanic ash losses, a damage assessment model is needed. As the volcanic ash hazard depends on the kind of a crops and the ash thickness, the fragility function of damage assessment model should represent the relation between ash thickness and damage rate of crops. Thus, we model the fragility function using the damage rate for each crop of RiskScape. The volcanic ash losses can be calculated with the agricultural output and the price of each crop using the fragility function. This paper also represents the estimated result of the losses in Gangwon province, which is most likely to get damaged by volcanic ashes in Korea. According to the result with gross agricultural output of Gangwon province in 2010, the amount of volcanic ash losses runs nearly 635,124 million wons in Korean currency if volcanic ash is accumulated over four millimeters. This amount represents about 50% of the gross agricultural output of Gangwon province. We consider the damage only for the crops in this paper. However, a volcanic ash fall has the potential to damage the assets for a farm, including the soil fertility and installations. Thus, to estimate the total amount of volcanic ash damage for the whole agricultural sectors, these collateral damages should also be considered.
Asia-Pacific Journal of Business Venturing and Entrepreneurship
/
v.15
no.4
/
pp.161-173
/
2020
As ICT convergence technology has spread and applied to various industrial fields and society in general, interest in rural entrepreneurship using smart farm as a means for solving many pending problems in agriculture is increasing. In this context, this study is to look at the influential factors in terms of perceived usefulness associated with the rural entrepreneurial intention using smart farm and suggest a proposal for spreading smart farms. The subjects were 296 general adults over 20 years old who were selected by simple random sampling method. The research method was exploratory factor analysis and multiple regression analysis using IBM SPSS 22.0. The perceived usefulness of smart farm, which are availability, reliability and economic efficiency were selected as independent variables to analyze the influential factors on rural entrepreneurial intention using smart farm and the moderating effect of personal innovation was observed. As a result, reliability and economic efficiency have a positive(+) influence on rural entrepreneurial intention using smart farm. And personal innovation moderates the relationship between the availability, reliability of smart farm and rural entrepreneurial intention using smart farm. The results of this study have significance in that we devised and empirically revealed factors affecting rural entrepreneurship intentions from the perspective of perceived usefulness of smart farms, away from studies of general entrepreneurship intention factors such as internal personal characteristics and external environmental factors. The implications of the study are expected to be utilized at the seeking direction of policy for potential entrepreneur using smart farm, the training and consulting in actual field of smart farm.
Purpose : Thymus is a lymphoproliferative organ that changes size in various physiological states in addition to some pathological conditions. Thymus is susceptible to involution, and shows a dramatic response to severe stress. Thymic measurements may be helpful in various diseases. UTI (urinary tract infection) is most common bacterial infection in infants and VUR (vesicoureteral reflux) is a common abnormality associated with UTI. In our study, the size of thymus was compared on the premise that a greater stress is exerted on the body when UTI is accompanied by VUR, than when occurs on its own. Methods : Thymic size was measured on standard chest anteroposterior radiographs and expressed as the ratio between the transverse diameter of the cardiothymic image at the level of the carina and that of the thorax (CT/T). The medical records of 99 febrile urinary tract infection infants without other genitourinary anomalies except VUR were reviewed retrospectively. Results : Among 99 patients with febrile UTIs, 25 were febrile UTI without VUR and 74 with VUR. For the UTI with VUR group, there was a significant decrease in the thymic size compared to the those without VUR group ($0.382{\pm}0.048$ vs $0.439{\pm}0.079$, P<0.05). However, there were no differences in the duration of fever and WBC, CRP between the UTI with VUR and UTI without VUR. In addition, there were no differences in the cardiothymic/thoracic ratios between renal defects and renal scars in febrile UTI patients. Conclusion : The results of this study show that the shirinkage of thymus was more frequently found in the UTI patients with VUR. Therefore, awareness of the risks associated with thymic size is important for the appropriate work up and management of UTI patients.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.