• Title/Summary/Keyword: 기획방법

Search Result 788, Processing Time 0.026 seconds

Efficient use of artificial intelligence ChatGPT in educational ministry (인공지능 챗GPT의 교육목회에 효율적인 활용방안)

  • Jang Heum Ok
    • Journal of Christian Education in Korea
    • /
    • v.78
    • /
    • pp.57-85
    • /
    • 2024
  • Purpose of the study: In order to utilize artificial intelligence-generated AI in educational ministry, this study analyzes the concept of artificial intelligence and generative AI and the educational theological aspects of educational ministry to find ways to efficiently utilize artificial intelligence ChatGPT in educational ministry. Contents and methods of the study: The contents of this study are. First, the contents of this study were analyzed by dividing the concepts of artificial intelligence and generative AI into the concept of artificial intelligence, types of artificial intelligence, and generative language model AI ChatGPT. Second, the educational theological analysis of educational ministry was divided into the concept of educational ministry, the goals of educational ministry, the content of educational ministry, and the direction of educational ministry in the era of artificial intelligence. Third, the plan to use artificial intelligence ChatGPT in educational ministry is to provide tools for writing sermon manuscripts, preparation tools for worship and prayer, and church education, focusing on the five functions of the early church community. It was analyzed by dividing it into tools for teaching, tools for teaching materials for believers, and tools for serving and volunteering. Conclusion and Recommendation: The conclusion of this study is that, first, when writing sermon manuscripts through artificial intelligence ChatGPT, high-quality sermon manuscripts can be written through the preacher's spirituality, faith, and insight. Second, through artificial intelligence ChatGPT, you can efficiently design and plan worship services and prepare services that serve the congregation objectively through various scenarios. Third, by using artificial intelligence ChatGPT in church education, it can be used while maintaining a complementary relationship with teachers through collaboration with human and artificial intelligence teachers. Fourth, through artificial intelligence ChatGPT, we provide a program that allows members of the church community to share spiritual fellowship, a plan to meet the needs of church members and strengthen interdependence, and an attitude of actively welcoming new people and respecting diversity. It provides useful materials that can play an important role in giving, loving, serving, and growing together in the love of Christ. Lastly, through artificial intelligence ChatGPT, we are seeking ways to provide various information about volunteer activities, learning support for children and youth in the community, mentoring-related programs, and playing a leading role in forming a village community in the local community.

Application of Digital Content Technology for Veterans Diplomacy (디지털 콘텐츠 기술을 활용한 보훈외교의 발전 방향)

  • So, Byungsoo;Park, Hyungi
    • Journal of Public Diplomacy
    • /
    • v.3 no.2
    • /
    • pp.35-52
    • /
    • 2023
  • Korea has developed as an influential country over Asia and all over the world based on remarkable economic development. And the background of this development was possible due to the existence of those who sacrificed precious lives and contributed to the nation's existence in the past crisis. Every year, Korea holds an annual commemorative event with people of national merit, Korean War veterans, and their families, expressing gratitude for sacrifices and contributions at home and abroad, and providing economic support. The tragedy of the Korean War and the pro-democracy movement in Korea over the past half century will one day become a history of the distant past over time. As generations change and the purpose and method of exchange by region change, the tragic situation that occurred earlier and the way people sacrificed for the country are expected to be different from before. In particular, it is true that the number of Korean War veterans and their families is gradually decreasing as they are now old. In addition, due to the outbreak of global infectious diseases such as COVID-19, it is difficult to plan and conduct face to face events as well as before. Currently, Korea's digital technology is introducing various methods. 5G communication networks, smart-phones, tablet PCs, and smart devices that can experience virtual reality are already used in our real lives. Business meetings are held in a metaverse environment, and concerts by famous singers are held in an online environment. Artificial intelligence technology has also been introduced in the field of human resource recruitment and customer response services, improving the work efficiency of companies. And it seems that this technology can be used in the field of veterans. In particular, there is a metaverse technology that can vividly show the situation during the Korean War, and a way to digitalize the voices and facial expressions of currently surviving veterans to convey their memories and lessons to future generations in the long run. If this digital technology method is realized on an online platform to hold a veterans' celebration event, veterans and their families on the other side of the world will be able to participate in the event more conveniently.

Critical Success Factor of Noble Payment System: Multiple Case Studies (새로운 결제서비스의 성공요인: 다중사례연구)

  • Park, Arum;Lee, Kyoung Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.4
    • /
    • pp.59-87
    • /
    • 2014
  • In MIS field, the researches on payment services are focused on adoption factors of payment service using behavior theories such as TRA(Theory of Reasoned Action), TAM(Technology Acceptance Model), and TPB (Theory of Planned Behavior). The previous researches presented various adoption factors according to types of payment service, nations, culture and so on even though adoption factors of identical payment service were presented differently by researchers. The payment service industry relatively has strong path dependency to the existing payment methods so that the research results on the identical payment service are different due to payment culture of nation. This paper aims to suggest a successful adoption factor of noble payment service regardless of nation's culture and characteristics of payment and prove it. In previous researches, common adoption factors of payment service are convenience, ease of use, security, convenience, speed etc. But real cases prove the fact that adoption factors that the previous researches present are not always critical to success to penetrate a market. For example, PayByPhone, NFC based parking payment service, successfully has penetrated to early market and grown. In contrast, Google Wallet service failed to be adopted to users despite NFC based payment method which provides convenience, security, ease of use. As shown in upper case, there remains an unexplained aspect. Therefore, the present research question emerged from the question: "What is the more essential and fundamental factor that should takes precedence over factors such as provides convenience, security, ease of use for successful penetration to market". With these cases, this paper analyzes four cases predicted on the following hypothesis and demonstrates it. "To successfully penetrate a market and sustainably grow, new payment service should find non-customer of the existing payment service and provide noble payment method so that they can use payment method". We give plausible explanations for the hypothesis using multiple case studies. Diners club, Danal, PayPal, Square were selected as a typical and successful cases in each category of payment service. The discussion on cases is primarily non-customer analysis that noble payment service targets on to find the most crucial factor in the early market, we does not attempt to consider factors for business growth. We clarified three-tier non-customer of the payment method that new payment service targets on and elaborated how new payment service satisfy them. In case of credit card, this payment service target first tier of non-customer who can't pay for because they don't have any cash temporarily but they have regular income. So credit card provides an opportunity which they can do economic activities by delaying the date of payment. In a result of wireless phone payment's case study, this service targets on second of non-customer who can't use online payment because they concern about security or have to take a complex process and learn how to use online payment method. Therefore, wireless phone payment provides very convenient payment method. Especially, it made group of young pay for a little money without a credit card. Case study result of PayPal, online payment service, shows that it targets on second tier of non-customer who reject to use online payment service because of concern about sensitive information leaks such as passwords and credit card details. Accordingly, PayPal service allows users to pay online without a provision of sensitive information. Final Square case result, Mobile POS -based payment service, also shows that it targets on second tier of non-customer who can't individually transact offline because of cash's shortness. Hence, Square provides dongle which function as POS by putting dongle in earphone terminal. As a result, four cases made non-customer their customer so that they could penetrate early market and had been extended their market share. Consequently, all cases supported the hypothesis and it is highly probable according to 'analytic generation' that case study methodology suggests. We present for judging the quality of research designs the following. Construct validity, internal validity, external validity, reliability are common to all social science methods, these have been summarized in numerous textbooks(Yin, 2014). In case study methodology, these also have served as a framework for assessing a large group of case studies (Gibbert, Ruigrok & Wicki, 2008). Construct validity is to identify correct operational measures for the concepts being studied. To satisfy construct validity, we use multiple sources of evidence such as the academic journals, magazine and articles etc. Internal validity is to seek to establish a causal relationship, whereby certain conditions are believed to lead to other conditions, as distinguished from spurious relationships. To satisfy internal validity, we do explanation building through four cases analysis. External validity is to define the domain to which a study's findings can be generalized. To satisfy this, replication logic in multiple case studies is used. Reliability is to demonstrate that the operations of a study -such as the data collection procedures- can be repeated, with the same results. To satisfy this, we use case study protocol. In Korea, the competition among stakeholders over mobile payment industry is intensifying. Not only main three Telecom Companies but also Smartphone companies and service provider like KakaoTalk announced that they would enter into mobile payment industry. Mobile payment industry is getting competitive. But it doesn't still have momentum effect notwithstanding positive presumptions that will grow very fast. Mobile payment services are categorized into various technology based payment service such as IC mobile card and Application payment service of cloud based, NFC, sound wave, BLE(Bluetooth Low Energy), Biometric recognition technology etc. Especially, mobile payment service is discontinuous innovations that users should change their behavior and noble infrastructure should be installed. These require users to learn how to use it and cause infra-installation cost to shopkeepers. Additionally, payment industry has the strong path dependency. In spite of these obstacles, mobile payment service which should provide dramatically improved value as a products and service of discontinuous innovations is focusing on convenience and security, convenience and so on. We suggest the following to success mobile payment service. First, non-customers of the existing payment service need to be identified. Second, needs of them should be taken. Then, noble payment service provides non-customer who can't pay by the previous payment method to payment method. In conclusion, mobile payment service can create new market and will result in extension of payment market.

A Study on Interactions of Competitive Promotions Between the New and Used Cars (신차와 중고차간 프로모션의 상호작용에 대한 연구)

  • Chang, Kwangpil
    • Asia Marketing Journal
    • /
    • v.14 no.1
    • /
    • pp.83-98
    • /
    • 2012
  • In a market where new and used cars are competing with each other, we would run the risk of obtaining biased estimates of cross elasticity between them if we focus on only new cars or on only used cars. Unfortunately, most of previous studies on the automobile industry have focused on only new car models without taking into account the effect of used cars' pricing policy on new cars' market shares and vice versa, resulting in inadequate prediction of reactive pricing in response to competitors' rebate or price discount. However, there are some exceptions. Purohit (1992) and Sullivan (1990) looked into both new and used car markets at the same time to examine the effect of new car model launching on the used car prices. But their studies have some limitations in that they employed the average used car prices reported in NADA Used Car Guide instead of actual transaction prices. Some of the conflicting results may be due to this problem in the data. Park (1998) recognized this problem and used the actual prices in his study. His work is notable in that he investigated the qualitative effect of new car model launching on the pricing policy of the used car in terms of reinforcement of brand equity. The current work also used the actual price like Park (1998) but the quantitative aspect of competitive price promotion between new and used cars of the same model was explored. In this study, I develop a model that assumes that the cross elasticity between new and used cars of the same model is higher than those amongst new cars and used cars of the different model. Specifically, I apply the nested logit model that assumes the car model choice at the first stage and the choice between new and used cars at the second stage. This proposed model is compared to the IIA (Independence of Irrelevant Alternatives) model that assumes that there is no decision hierarchy but that new and used cars of the different model are all substitutable at the first stage. The data for this study are drawn from Power Information Network (PIN), an affiliate of J.D. Power and Associates. PIN collects sales transaction data from a sample of dealerships in the major metropolitan areas in the U.S. These are retail transactions, i.e., sales or leases to final consumers, excluding fleet sales and including both new car and used car sales. Each observation in the PIN database contains the transaction date, the manufacturer, model year, make, model, trim and other car information, the transaction price, consumer rebates, the interest rate, term, amount financed (when the vehicle is financed or leased), etc. I used data for the compact cars sold during the period January 2009- June 2009. The new and used cars of the top nine selling models are included in the study: Mazda 3, Honda Civic, Chevrolet Cobalt, Toyota Corolla, Hyundai Elantra, Ford Focus, Volkswagen Jetta, Nissan Sentra, and Kia Spectra. These models in the study accounted for 87% of category unit sales. Empirical application of the nested logit model showed that the proposed model outperformed the IIA (Independence of Irrelevant Alternatives) model in both calibration and holdout samples. The other comparison model that assumes choice between new and used cars at the first stage and car model choice at the second stage turned out to be mis-specfied since the dissimilarity parameter (i.e., inclusive or categroy value parameter) was estimated to be greater than 1. Post hoc analysis based on estimated parameters was conducted employing the modified Lanczo's iterative method. This method is intuitively appealing. For example, suppose a new car offers a certain amount of rebate and gains market share at first. In response to this rebate, a used car of the same model keeps decreasing price until it regains the lost market share to maintain the status quo. The new car settle down to a lowered market share due to the used car's reaction. The method enables us to find the amount of price discount to main the status quo and equilibrium market shares of the new and used cars. In the first simulation, I used Jetta as a focal brand to see how its new and used cars set prices, rebates or APR interactively assuming that reactive cars respond to price promotion to maintain the status quo. The simulation results showed that the IIA model underestimates cross elasticities, resulting in suggesting less aggressive used car price discount in response to new cars' rebate than the proposed nested logit model. In the second simulation, I used Elantra to reconfirm the result for Jetta and came to the same conclusion. In the third simulation, I had Corolla offer $1,000 rebate to see what could be the best response for Elantra's new and used cars. Interestingly, Elantra's used car could maintain the status quo by offering lower price discount ($160) than the new car ($205). In the future research, we might want to explore the plausibility of the alternative nested logit model. For example, the NUB model that assumes choice between new and used cars at the first stage and brand choice at the second stage could be a possibility even though it was rejected in the current study because of mis-specification (A dissimilarity parameter turned out to be higher than 1). The NUB model may have been rejected due to true mis-specification or data structure transmitted from a typical car dealership. In a typical car dealership, both new and used cars of the same model are displayed. Because of this fact, the BNU model that assumes brand choice at the first stage and choice between new and used cars at the second stage may have been favored in the current study since customers first choose a dealership (brand) then choose between new and used cars given this market environment. However, suppose there are dealerships that carry both new and used cars of various models, then the NUB model might fit the data as well as the BNU model. Which model is a better description of the data is an empirical question. In addition, it would be interesting to test a probabilistic mixture model of the BNU and NUB on a new data set.

  • PDF

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF

The State Hermitage Museum·Northwest University for Nationalities·Shanghai Chinese Classics Publishing House Kuche Art Relics Collected in Russia Shanghai Chinese Classics Publishing House, 2018 (아라사국립애이미탑십박물관(俄羅斯國立艾爾米塔什博物館)·서북민족대학(西北民族大學)·상해고적출판사(上海古籍出版社) 편(編) 『아장구자예술품(俄藏龜玆藝術品)』, 상해고적출판사(上海古籍出版社), 2018 (『러시아 소장 쿠차 예술품』))

  • Min, Byung-Hoon
    • MISULJARYO - National Museum of Korea Art Journal
    • /
    • v.98
    • /
    • pp.226-241
    • /
    • 2020
  • Located on the right side of the third floor of the State Hermitage Museum in St. Petersburg, the "Art of Central Asia" exhibition boasts the world's finest collection of artworks and artifacts from the Silk Road. Every item in the collection has been classified by region, and many of them were collected in the early twentieth century through archaeological surveys led by Russia's Pyotr Kozlov, Mikhail Berezovsky, and Sergey Oldenburg. Some of these artifacts have been presented around the world through special exhibitions held in Germany, France, the United Kingdom, the Netherlands, Korea, Japan, and elsewhere. The fruits of Russia's Silk Road expeditions were also on full display in the 2008 exhibition The Caves of One Thousand Buddhas - Russian Expeditions on the Silk Route on the Occasion of 190 Years of the Asiatic Museum, held at the Hermitage Museum. Published in 2018 by the Shanghai Chinese Classics Publishing House in collaboration with the Hermitage Museum, Kuche Art Relics Collected in Russia introduces the Hermitage's collection of artifacts from the Kuche (or Kucha) region. While the book focuses exclusively on artifacts excavated from the Kuche area, it also includes valuable on-site photos and sketches from the Russian expeditions, thus helping to enhance readers' overall understanding of the characteristics of Kuche art within the Buddhist art of Central Asia. The book was compiled by Dr. Kira Samosyuk, senior curator of the Oriental Department of the Hermitage Museum, who also wrote the main article and the artifact descriptions. Dr. Samosyuk is an internationally renowned scholar of Central Asian Buddhist art, with a particular expertise in the art of Khara-Khoto and Xi-yu. In her article "The Art of the Kuche Buddhist Temples," Dr. Samosyuk provides an overview of Russia's Silk Road expeditions, before introducing the historical development of Kuche in the Buddhist era and the aspects of Buddhism transmitted to Kuche. She describes the murals and clay sculptures in the Buddhist grottoes, giving important details on their themes and issues with estimating their dates, and also explains how the temples operated as places of worship. In conclusion, Dr. Samosyuk argues that the Kuche region, while continuously engaging with various peoples in China and the nomadic world, developed its own independent Buddhist culture incorporating elements of Gandara, Hellenistic, Persian, and Chinese art and culture. Finally, she states that the culture of the Kuche region had a profound influence not only on the Tarim Basin, but also on the Buddhist grottoes of Dunhuang and the central region of China. A considerable portion of Dr. Samosyuk's article addresses efforts to estimate the date of the grottoes in the Kuche region. After citing various scholars' views on the dates of the murals, she argues that the Kizil grottoes likely began prior to the fifth century, which is at least 100 years earlier than most current estimates. This conclusion is reached by comparing the iconography of the armor depicted in the murals with related materials excavated from the surrounding area (such as items of Sogdian art). However, efforts to date the Buddhist grottoes of Kuche must take many factors into consideration, such as the geological characteristics of the caves, the themes and styles of the Buddhist paintings, the types of pigments used, and the clothing, hairstyles, and ornamentation of the depicted figures. Moreover, such interdisciplinary data must be studied within the context of Kuche's relations with nearby cultures. Scientific methods such as radiocarbon dating could also be applied for supplementary materials. The preface of Kuche Art Relics Collected in Russia reveals that the catalog is the first volume covering the Hermitage Museum's collection of Kuche art, and that the next volume in the series will cover a large collection of mural fragments that were taken from Berlin during World War II. For many years, the whereabouts of these mural fragments were unknown to both the public and academia, but after restoration, the fragments were recently re-introduced to the public as part of the museum's permanent exhibition. We look forward to the next publication that focuses on these mural fragments, and also to future catalogs introducing the artifacts of Turpan and Khotan. Currently, fragments of the murals from the Kuche grottoes are scattered among various countries, including Russia, Germany, and Korea. With the publication of this catalog, it seems like an opportune time to publish a comprehensive catalog on the murals of the Kuche region, which represent a compelling mixture of East-West culture that reflects the overall characteristics of the region. A catalog that includes both the remaining murals of the Kizil grottoes and the fragments from different parts of the world could greatly enhance our understanding of the murals' original state. Such a book would hopefully include a more detailed and interdisciplinary discussion of the artifacts and murals, including scientific analyses of the pigments and other materials from the perspective of conservation science. With the ongoing rapid development in western China, the grotto murals are facing a serious crisis related to climate change and overcrowding in the oasis city of Xinjiang. To overcome this challenge, the cultural communities of China and other countries that possess advanced technology for conservation and restoration must begin working together to protect and restore the murals of the Silk Road grottoes. Moreover, centers for conservation science should be established to foster human resources and collect information. Compiling the data of Russian expeditions related to the grottoes of Kuche (among the results of Western archaeological surveys of the Silk Road in the early twentieth century), Kuche Art Relics Collected in Russia represents an important contribution to research on Kuche's Buddhist art and the Silk Road, which will only be enhanced by a future volume introducing the mural fragments from Germany. As the new authoritative source for academic research on the artworks and artifacts of the Kuche region, the book also lays the groundwork for new directions for future studies on the Silk Road. Finally, the book is also quite significant for employing a new editing system that improves its academic clarity and convenience. In conclusion, Dr. Kira Samosyuk, who planned the publication, deserves tremendous praise for taking the research of Silk Road art to new heights.

A Study of the Reactive Movement Synchronization for Analysis of Group Flow (그룹 몰입도 판단을 위한 움직임 동기화 연구)

  • Ryu, Joon Mo;Park, Seung-Bo;Kim, Jae Kyeong
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.1
    • /
    • pp.79-94
    • /
    • 2013
  • Recently, the high value added business is steadily growing in the culture and art area. To generated high value from a performance, the satisfaction of audience is necessary. The flow in a critical factor for satisfaction, and it should be induced from audience and measures. To evaluate interest and emotion of audience on contents, producers or investors need a kind of index for the measurement of the flow. But it is neither easy to define the flow quantitatively, nor to collect audience's reaction immediately. The previous studies of the group flow were evaluated by the sum of the average value of each person's reaction. The flow or "good feeling" from each audience was extracted from his face, especially, the change of his (or her) expression and body movement. But it was not easy to handle the large amount of real-time data from each sensor signals. And also it was difficult to set experimental devices, in terms of economic and environmental problems. Because, all participants should have their own personal sensor to check their physical signal. Also each camera should be located in front of their head to catch their looks. Therefore we need more simple system to analyze group flow. This study provides the method for measurement of audiences flow with group synchronization at same time and place. To measure the synchronization, we made real-time processing system using the Differential Image and Group Emotion Analysis (GEA) system. Differential Image was obtained from camera and by the previous frame was subtracted from present frame. So the movement variation on audience's reaction was obtained. And then we developed a program, GEX(Group Emotion Analysis), for flow judgment model. After the measurement of the audience's reaction, the synchronization is divided as Dynamic State Synchronization and Static State Synchronization. The Dynamic State Synchronization accompanies audience's active reaction, while the Static State Synchronization means to movement of audience. The Dynamic State Synchronization can be caused by the audience's surprise action such as scary, creepy or reversal scene. And the Static State Synchronization was triggered by impressed or sad scene. Therefore we showed them several short movies containing various scenes mentioned previously. And these kind of scenes made them sad, clap, and creepy, etc. To check the movement of audience, we defined the critical point, ${\alpha}$and ${\beta}$. Dynamic State Synchronization was meaningful when the movement value was over critical point ${\beta}$, while Static State Synchronization was effective under critical point ${\alpha}$. ${\beta}$ is made by audience' clapping movement of 10 teams in stead of using average number of movement. After checking the reactive movement of audience, the percentage(%) ratio was calculated from the division of "people having reaction" by "total people". Total 37 teams were made in "2012 Seoul DMC Culture Open" and they involved the experiments. First, they followed induction to clap by staff. Second, basic scene for neutralize emotion of audience. Third, flow scene was displayed to audience. Forth, the reversal scene was introduced. And then 24 teams of them were provided with amuse and creepy scenes. And the other 10 teams were exposed with the sad scene. There were clapping and laughing action of audience on the amuse scene with shaking their head or hid with closing eyes. And also the sad or touching scene made them silent. If the results were over about 80%, the group could be judged as the synchronization and the flow were achieved. As a result, the audience showed similar reactions about similar stimulation at same time and place. Once we get an additional normalization and experiment, we can obtain find the flow factor through the synchronization on a much bigger group and this should be useful for planning contents.

Management and Use of Oral History Archives on Forced Mobilization -Centering on oral history archives collected by the Truth Commission on Forced Mobilization under the Japanese Imperialism Republic of Korea- (강제동원 구술자료의 관리와 활용 -일제강점하강제동원피해진상규명위원회 소장 구술자료를 중심으로-)

  • Kwon, Mi-Hyun
    • The Korean Journal of Archival Studies
    • /
    • no.16
    • /
    • pp.303-339
    • /
    • 2007
  • "The damage incurred from forced mobilization under the Japanese Imperialism" means the life, physical, and property damage suffered by those who were forced to lead a life as soldiers, civilians attached to the military, laborers, and comfort women forcibly mobilized by the Japanese Imperialists during the period between the Manchurian Incident and the Pacific War. Up to the present time, every effort to restore the history on such a compulsory mobilization-borne damage has been made by the damaged parties, bereaved families, civil organizations, and academic circles concerned; as a result, on March 5, 2004, Disclosure act of Forced Mobilization under the Japanese Imperialism[part of it was partially revised on May 17, 2007]was officially established and proclaimed. On the basis of this law, the Truth Commission on Forced Mobilization under the Japanese Imperialism Republic of Korea[Compulsory Mobilization Commission hence after] was launched under the jurisdiction of the Prime Minister on November 10, 2004. Since February 1, 2005, this organ has begun its work with the aim of looking into the real aspects of damage incurred from compulsory mobilization under the Japanese Imperialism, by which making the historical truth open to the world. The major business of this organ is to receive the damage report and investigation of the reported damage[examination of the alleged victims and bereaved families, and decision-making], receipt of the application for the fact-finding & fact finding; fact finding and matters impossible to make judgment; correction of a family register subsequent to the damage judgement; collection & analysis of data concerning compulsory mobilization at home and from abroad and writing up of a report; exhumation of the remains, remains saving, their repatriation, and building project for historical records hall and museum & memorial place, etc. The Truth Commission on Compulsory Mobilization has dug out and collected a variety of records to meet the examination of the damage and fact finding business. As is often the case with other history of damage, the records which had already been made open to the public or have been newly dug out usually have their limits to ascertaining of the diverse historical context involved in compulsory mobilization in their quantity or quality. Of course, there may happen a case where the interested parties' story can fill the vacancy of records or has its foundational value more than its related record itself. The Truth Commission on Compulsory mobilization generated a variety of oral history records through oral interviews with the alleged damage-suffered survivors and puts those data to use for examination business, attempting to make use of those data for public use while managing those on a systematic method. The Truth Commission on compulsory mobilization-possessed oral history archives were generated based on a drastic planning from the beginning of their generation, and induced digital medium-based production of those data while bearing the conveniences of their management and usage in mind from the stage of production. In addition, in order to surpass the limits of the oral history archives produced in the process of the investigating process, this organ conducted several special training sessions for the interviewees and let the interviewees leave their real context in time of their oral testimony in an interview journal. The Truth Commission on compulsory mobilization isn't equipped with an extra records management system for the management of the collected archives. The digital archives are generated through the management system of the real aspects of damage and electronic approval system, and they plays a role in registering and searching the produced, collected, and contributed records. The oral history archives are registered at the digital archive and preserved together with real records. The collected oral history archives are technically classified at the same time of their registration and given a proper number for registration, classification, and keeping. The Truth Commission on compulsory mobilization has continued its publication of oral history archives collection for the positive use of them and is also planning on producing an image-based matters. The oral history archives collected by this organ are produced, managed and used in as positive a way as possible surpassing the limits produced in the process of investigation business and budgetary deficits as well as the absence of records management system, etc. as the form of time-limit structure. The accumulated oral history archives, if a historical records hall and museum should be built as regulated in Disclosure act of forced mobilization, would be more systematically managed and used for the public users.