• Title/Summary/Keyword: Critical Condition

Search Result 2,005, Processing Time 0.032 seconds

Inhibitory Effort of the N-terminal GST on the Tautomerase Activity of Macrophage Migration Inhibitory Factor (GST 융합 시스템에서 나타나는 macrophage migration inhibitory factor의 tautomerase 활성 저해에 관한 연구)

  • Kim Sang-Soo;Kim Kyung-Hee;Park Hyo-Jin;Hur Eun-hye;Rhim Hyangshuk
    • Journal of Life Science
    • /
    • v.15 no.6 s.73
    • /
    • pp.961-967
    • /
    • 2005
  • Macrophage migration inhibitory fartor (MIF), known as a cytokine, is a multifunctional protein that is ubiquitously expressed in a variety of cells and tissues; however, enzymatic function of MIF still remains elusive in cells. In this study, we assessed details of the tautomerase activity of MIF. We established rapid purification condition for MIF by using pGEX system and compared the L-dopachrome tautomerase activity of GST-MIF, tMIF, and MIF. The results show that GST (glutathione S-transferase)-epitope tag or N-terminal amino acids flanking the essential $P^{2}$ almost completely abrogated L-dopachrome tautomerase activity of MIF. Subsequently, to determine whether the N-terminal tags have effects on oligomerization of MIF, protein cross-linking products were analyzed on $15\%$ SDS-PACE. The result demonstrates that N-terminal tags are dispensable for the formation of MIF's homooligomers. Thus, the results imply that exposure of If containing hydrophobic pocket in the active site is critical for L-dopachrome tautomerase activity of MIF. In addition, our study suggest that the MIF's tautomerase activity might be influenced by interacting with cellular partners.

Study on Preparation of High Purity Lithium Hydroxide Powder with 2-step Precipitation Process Using Lithium Carbonate Recovered from Waste LIB Battery (폐리튬이차전지에서 회수한 탄산리튬으로부터 2-step 침전공정을 이용한 고순도 수산화리튬 분말 제조 연구)

  • Joo, Soyeong;Kang, Yubin;Shim, Hyun-Woo;Byun, Suk-Hyun;Kim, Yong Hwan;Lee, Chan-Gi;Kim, Dae-Guen
    • Resources Recycling
    • /
    • v.28 no.5
    • /
    • pp.60-67
    • /
    • 2019
  • A valuable metal recovery from waste resources such as spent rechargeable secondary batteries is of critical issues because of a sharp increase in the amount of waste resources. In this context, it is necessary to research not only recycling waste lithium-ion batteries (LIBs), but also reusing valuable metals (e.g., Li, Co, Ni, Mn etc.) recovered from waste LIBs. In particular, the lithium hydroxide ($LiOH{\cdot}xH_2O$), which is of precursors that can be prepared by the recovery of Li in waste LIBs, can be reused as a catalyst, a carbon dioxide absorbent, and again as a precursor for cathode materials of LIB. However, most studies of recycling the waste LIBs have been focused on the preparation of lithium carbonate with a recovery of Li. Herein, we show the preparation of high purity lithium hydroxide powder along with the precipitation process, and the systematic study to find an optimum condition is also carried out. The lithium carbonate, which is recovered from waste LIBs, was used as starting materials for synthesis of lithium hydroxide. The optimum precipitation conditions for the preparation of LiOH were found as follows: based on stirring, reaction temperature $90^{\circ}C$, reaction time 3 hr, precursor ratio 1:1. To synthesize uniform and high purity lithium hydroxide, 2-step precipitation process was additionally performed, and consequently, high purity $LiOH{\cdot}xH_2O$ powder was obtained.

An Analysis of Changes in Rice Growth and Growth Period Using Climatic Tables of 1960s (1931~1960) and 2000s (1971~2000) (우리나라 1960년대 (1931~'60)와 2000년대 (1971~2000) 기후표를 이용한 벼 생육 및 재배기간 변화 분석)

  • Lee, Jeong-Taek;Shim, Kyo-Moon;Bang, Hea-Son;Kim, Myung-Hyun;Kang, Kee-Kyung;Na, Young-Eun;Han, Min-Su;Lee, Deog-Bae
    • Korean Journal of Soil Science and Fertilizer
    • /
    • v.43 no.6
    • /
    • pp.1018-1023
    • /
    • 2010
  • Climatic change was observed and analyzed in view of impacts on agricultural ecosystem, inter alia on rice cropping. The changed climate gave rise to earlier transplanting of rice seedling and later harvest after 40 years. Also phenological change and prolonged growth duration was observed. The meteorological data was selected from the standardized climatological data of 30 year normals of 1960s and 2000s, which were published by Korea Meteorological Administration. Development stages and growing periods of rice crop were compared by analyzing critical and optimum temperatures of each growth stage during these two periods. The first appearance date of $15^{\circ}C$ was ranged from Apr. 29 to May 23 in the year-normals of 1960s and it varied from Apr. 24 to May 16 in the normals of 2000s. The difference of the first appearance date of $15^{\circ}C$ was 0~10 days earlier in the year-normals of 2000s than the 1960s. The last harvesting date was determined to be the last appearance date of mean air temperature $15^{\circ}C$. The difference in the last appearance date of $15^{\circ}C$ was 1 to 13 days later in the year-normals of 2000s than in 1960s. The plant height of a rice variety, Hwayoung-byeo was 101~109 cm in 4 local areas, Seoul, Kangneung, Kwangju and Daegu. The plant height became 1~4 cm taller under warm condition. Rice grain yields estimated with daily weather data for the year-normals of 1960s and 2000s were 453~580 kg $10a^{-1}$ and 409~484 kg $10a^{-1}$ respectively. Rice grain yield of the former period was 50~100 kg $10a^{-1}$ higher than that hat in the later period.

Economic Analysis, Growth and Pests of Wheat (Triticum aestivum L.) in Gelatin·Chitin Microorganisms-treated Organic Culture (젤라틴·키틴분해미생물을 이용한 밀 유기재배와 관행재배의 생육, 병해충 발생조사 및 경제성 분석)

  • Ahn, Philip;Lee, Jiho;Cha, Kwang-Hong;Seo, Dong-Jun;An, Kyu-Nam;Yoon, Chang-Yong;Kim, Kil-Yong;Jung, Woo-Jin
    • Korean Journal of Organic Agriculture
    • /
    • v.29 no.2
    • /
    • pp.223-240
    • /
    • 2021
  • This study was carried out to investigate the economic value of organic wheat production using gelatin·chitin microorganisms in Gwangsan-gu, Gwangju city. The soil condition of experiment field was clay loam Jisan series. The organically cultivated fields were sprayed gelatin and chitin degrading bacteria. The test was performed at conventionally cultivated field and organically cultivated field. Emergence of weed on organically cultivated field was significantly higher than conventionally cultivated field which sprayed herbicide before seeding. Weed emergence have a critical impact on grain yield. Occurrence of diseases and insect pests were higher than conventionally cultivated fields. In 2019, the amount of lodging in conventionally cultivated field were higher than conventionally cultivated field. In 2020, lodging and wet injury were occur in both field. Comparing yield element between organically and conventionally cultivated experimental area, grain yield in organically cultivated field was shown slightly higher amount than conventionally cultivated field. However in the actual yield of 2019, organically cultivated field shows 20% deceased yield because of overgrown weed. In 2020, weed emergence and yellow mosaic virus by wet injury cause 30% decease in the grain yield in organically cultivated field. Content of protein, carbohydrates, ash, water and fat in the grain were not different significance. In 2019, net incomes of conventionally cultivated wheat was 461,031 won/0.1 ha while organically cultivated wheat was 443,437 won/0.1 ha. In the rate of income, conventionally cultivated field was 83.0% as against organically cultivated field (73.3%). In 2020, net incomes of organically cultivated wheat was 437,812 won/0.1 ha while conventionally cultivated wheat was 418,281 won/0.1 ha. In the rate of income, conventionally cultivated field was 81.6% as against organically cultivated field (73.0%).

Study on the Legal Policy for Restitution of Illegally Exported Cultural Properties in Foreign Countries (해외 소재 불법 문화재의 환수를 위한 법정책적 연구)

  • Song, Ho-Young
    • Korean Journal of Heritage: History & Science
    • /
    • v.48 no.4
    • /
    • pp.24-43
    • /
    • 2015
  • Since 2011, when Oegyujanggak Uigwe(Records of the State Rites of the Joseon Dynasty) were returned from France, which were looted in 1866 by the French Navy, national attention to our cultural properties abroad was explosively increased and public pressure has been mounting that those cultural properties should be returned in Korea. According to the statistics of "Overseas Korean Cultural Heritage Foundation" Korean cultural Properties, which exist in foreign countries, amounts 160,342 in total 20 countries. Among them about half of them are estimated to be illegally exported cultural property, these are to be restituted. However, in reality it is not so easy to restitute illegally exported cultural properties. For this, it needs to be established a long-term and systematic plan for return of cultural properties from other countries. This paper starts from such a critical mind and tries to find legal policy measures for the return of illegally exported cultural properties. To this end, the author first describes motive and aim of this research in chapter I. and overviews basic understanding and current situation of export of cultural property as well as means and methods of return of cultural property in chapter II. and then deals with international and national norms that are involved in the dispute concerned return of cultural properties in chapter III. Based on this research, in chapter IV., which can be considered as a key part of this paper, the author proposed nine legal policy measures for restitution of cultural properties from foreign countries. That is, actual condition survey of cultural properties in foreign countries, unified management and implement of export ID on cultural properties, fund-raising for the diversification of means of return of cultural properties. local utilization of cultural properties, joining in the multilateral conventions and expansion of the bilateral agreements, restitution and cooperation through international organizations, restitution through lawsuit and arbitration, training experts on restitution of cultural property and networking with foreign experts. Finally, the author summarized his opinion in chapter V. which comprehended researching the above.

Case Analysis on Platform Business Models for IT Service Planning (IT서비스 기획을 위한 플랫폼 비즈니스 모델 사례 분석연구)

  • Kim, Hyun Ji;Cha, yun so;Kim, Kyung Hoon
    • Korea Science and Art Forum
    • /
    • v.25
    • /
    • pp.103-118
    • /
    • 2016
  • Due to the rapid development of ICT, corporate business models quickly changed and because of the radical growth of IT technology, sequential or gradual survival has become difficult. Internet-based new businesses such as IT service companies are seeking for new convergence business models that have not existed before to create business models that are more competitive, but the economic efficiency of business models that were successful in the past is wearing off. Yet, as reaching the critical point where the platform value becomes extremely high for platforms via the Internet is happening at a much higher speed than before, platform-ization has become a very important condition for rapid business expansion for all kinds of businesses. This study analyzes the necessity of establishing platform business models in IT service planning and identifies their characteristics through case analyses of platform business models. The results derived features First, there is a need to ensure sufficient buyers and sellers, and second, platform business model should provide customers with distinctive value of the only platforms are generating. third, the common interests between platform-driven company and a partner, participants Should be existing. Fourthly, by expanding base of participants and upgrades, expansion of adjacent areas we must have a continuous scalability and evolution must be sustainable. While it is expected that the identified characteristics will cause tremendous impacts to the establishment of platform business models and to the graphing of service planning, we also look forward to this study serving as the starting point for the establishment of theories of profit models for platform businesses, which were not mentioned in the study, so that planners responsible for platform-based IT service planning will spend less time and draw bigger schemes in building planning drafts.

A Critical Evaluation of the Correlation Between Biomarkers of Folate and Vitamin $B_{12}$ in Nutritional Homocysteinemia (엽산과 비타민 $B_{12}$ 결핍에 의한 호모시스테인혈증 흰쥐의 조직내 비타민 지표간의 상관관계 분석)

  • Min, Hye-Sun;Kim, Mi-Sook
    • Journal of Nutrition and Health
    • /
    • v.42 no.5
    • /
    • pp.423-433
    • /
    • 2009
  • Folate and vitamin $B_{12}$ are essential cofactors for homocysteine (Hcy) metabolism. Homocysteinemia has been related with cardiovascular and neurodegenerative disease. We examined the effect of folate and/or vitamin $B_{12}$ deficiency on biomarkers of one carbon metabolism in blood, liver and brain, and analyzed the correlation between vitamin biomarkers in mild and moderate homocysteinemia. In this study, Sprague-Dawley male rats (5 groups, n = 10) were fed folatesufficient diet (FS), folate-deficient diet (FD) with 0 or 3 g homocystine (FSH and FDH), and folate-/vitamin $B_{12}$-deficient diet with 3 g homocystine (FDHCD) for 8 weeks. The FDH diet induced mild homocysteinemia (plasma Hcy 17.41 ${\pm}$ 1.94 nmol/mL) and the FDHCD diet induced moderate homocysteinemia (plasma Hcy 44.13 ${\pm}$ 2.65 nmol/mL), respectively. Although liver and brain folate levels were significantly lower compared with those values of rats fed FS or FSH (p < 0.001, p < 0.01 respectively), there were no significant differences in folate levels in liver and brain among the rats fed FD, FDH and FDHCD diet. However, rats fed FDHCD showed higher plasma folate levels (126.5 ${\pm}$ 9.6 nmol/L) compared with rats fed FD and FDH (21.1 ${\pm}$ 1.4 nmol/L, 22.0 ${\pm}$ 2.2 nmol/L)(p < 0.001), which is the feature of "ethyl-folate trap"by vitamin $B_{12}$ deficiency. Plasma Hcy was correlated with hepatic folate (r = -0.641, p < 0.01) but not with plasma folate or brain folate in this experimental condition. However, as we eliminated FDHCD group during correlation test, plasma Hcy was correlated with plasma folate (r = -0.581, p < 0.01), hepatic folate (r = -0.684, p < 0.01) and brain folate (r = -0.321, p < 0.05). Hepatic S-adenosylmethionine (SAM) level was lower in rats fed FD, FDH and FDHCD than in rats fed FS and FSH (p < 0.001, p < 0.001 respectively) and hepatic S-adenosylhomocysteine (SAH) level was significantly higher in those groups. The SAH level in brain was also significantly increased in rats fed FDHCD (p < 0.05). However, brain SAM level was not affected by folate and/or vitamin $B_{12}$ deficiency. This result suggests that dietary folate- and vitamin B12-deficiency may inhibit methylation in brain by increasing SAH rather than decreasing SAM level, which may be closely associated with impaired cognitive function in nutritional homocysteinemia.

Developmental Plans and Research on Private Security in Korea (한국 민간경비 실태 및 발전방안)

  • Kim, Tea-Hwan;Park, Ok-Cheol
    • Korean Security Journal
    • /
    • no.9
    • /
    • pp.69-98
    • /
    • 2005
  • The security industry for civilians (Private Security), was first introduced to Korea via the US army's security system in the early 1960's. Shortly after then, official police laws were enforced in 1973, and private security finally started to develop with the passing of the 'service security industry' law in 1976. Korea's Private Security industry grew rapidly in the 1980's with the support of foreign funds and products, and now there are thought to be approximately 2000 private security enterprises currently running in Korea. However, nowadays the majority of these enterprises are experiencing difficulties such as lack of funds, insufficient management, and lack of control over employees, as a result, it seems difficult for some enterprises to avoid the low production output and bankruptcy. As a result of this these enterprises often settle these matters illegally, such as excessive dumping or avoiding problems by hiring inappropriate employees who don't have the right skills or qualifications for the jobs. The main problem with the establishment of this kind of security service is that it is so easy to make inroads into this private service market. All these hindering factors inhibit the market growth and impede qualitative development. Based on these main reasons, I researched this area, and will analyze and criticize the present condition of Korea's private security. I will present a possible development plan for the private security of Korea by referring to cases from the US and Japan. My method of researching was to investigate any related documentary records and articles and to interview people for necessary evidence. The theoretical study, involves investigation books and dissertations which are published from inside and outside of the country, and studying the complete collection of laws and regulations, internet data, various study reports, and the documentary records and the statistical data of many institutions such as the National Police Office, judicial training institute, and the enterprises of private security. Also, in addition, the contents of professionals who are in charge of practical affairs on the spot in order to overcomes the critical points of documentary records when investigating dissertation. I tried to get a firm grasp of the problems and difficulties which people in these work enterprises experience, this I thought would be most effective by interviewing the workers, for example: how they feel in the work places and what are the elements which inpede development? And I also interviewed policemen who are in charge of supervising the private escort enterprises, in an effort to figure out the problems and differences in opinion between domestic private security service and the police. From this investigation and research I will try to pin point the major problems of the private security and present a developmental plan. Firstly-Companies should unify the private police law and private security service law. Secondly-It is essential to introduce the 'specialty certificate' system for the quality improvement of private security service. Thirdly-must open up a new private security market by improving old system. Fourth-must build up the competitive power of the security service enterprises which is based on an efficient management. Fifth-needs special marketing strategy to hold customers Sixth-needs positive research based on theoretical studies. Seventh-needs the consistent and even training according to effective market demand. Eighth-Must maintain interrelationship with the police department. Ninth-must reinforce the system of Korean private security service association. Tenth-must establish private security laboratory. Based on these suggestions there should be improvement of private security service.

  • PDF

Extension Method of Association Rules Using Social Network Analysis (사회연결망 분석을 활용한 연관규칙 확장기법)

  • Lee, Dongwon
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.4
    • /
    • pp.111-126
    • /
    • 2017
  • Recommender systems based on association rule mining significantly contribute to seller's sales by reducing consumers' time to search for products that they want. Recommendations based on the frequency of transactions such as orders can effectively screen out the products that are statistically marketable among multiple products. A product with a high possibility of sales, however, can be omitted from the recommendation if it records insufficient number of transactions at the beginning of the sale. Products missing from the associated recommendations may lose the chance of exposure to consumers, which leads to a decline in the number of transactions. In turn, diminished transactions may create a vicious circle of lost opportunity to be recommended. Thus, initial sales are likely to remain stagnant for a certain period of time. Products that are susceptible to fashion or seasonality, such as clothing, may be greatly affected. This study was aimed at expanding association rules to include into the list of recommendations those products whose initial trading frequency of transactions is low despite the possibility of high sales. The particular purpose is to predict the strength of the direct connection of two unconnected items through the properties of the paths located between them. An association between two items revealed in transactions can be interpreted as the interaction between them, which can be expressed as a link in a social network whose nodes are items. The first step calculates the centralities of the nodes in the middle of the paths that indirectly connect the two nodes without direct connection. The next step identifies the number of the paths and the shortest among them. These extracts are used as independent variables in the regression analysis to predict future connection strength between the nodes. The strength of the connection between the two nodes of the model, which is defined by the number of nodes between the two nodes, is measured after a certain period of time. The regression analysis results confirm that the number of paths between the two products, the distance of the shortest path, and the number of neighboring items connected to the products are significantly related to their potential strength. This study used actual order transaction data collected for three months from February to April in 2016 from an online commerce company. To reduce the complexity of analytics as the scale of the network grows, the analysis was performed only on miscellaneous goods. Two consecutively purchased items were chosen from each customer's transactions to obtain a pair of antecedent and consequent, which secures a link needed for constituting a social network. The direction of the link was determined in the order in which the goods were purchased. Except for the last ten days of the data collection period, the social network of associated items was built for the extraction of independent variables. The model predicts the number of links to be connected in the next ten days from the explanatory variables. Of the 5,711 previously unconnected links, 611 were newly connected for the last ten days. Through experiments, the proposed model demonstrated excellent predictions. Of the 571 links that the proposed model predicts, 269 were confirmed to have been connected. This is 4.4 times more than the average of 61, which can be found without any prediction model. This study is expected to be useful regarding industries whose new products launch quickly with short life cycles, since their exposure time is critical. Also, it can be used to detect diseases that are rarely found in the early stages of medical treatment because of the low incidence of outbreaks. Since the complexity of the social networking analysis is sensitive to the number of nodes and links that make up the network, this study was conducted in a particular category of miscellaneous goods. Future research should consider that this condition may limit the opportunity to detect unexpected associations between products belonging to different categories of classification.

An Analysis of the Moderating Effects of User Ability on the Acceptance of an Internet Shopping Mall (인터넷 쇼핑몰 수용에 있어 사용자 능력의 조절효과 분석)

  • Suh, Kun-Soo
    • Asia pacific journal of information systems
    • /
    • v.18 no.4
    • /
    • pp.27-55
    • /
    • 2008
  • Due to the increasing and intensifying competition in the Internet shopping market, it has been recognized as very important to develop an effective policy and strategy for acquiring loyal customers. For this reason, web site designers need to know if a new Internet shopping mall(ISM) will be accepted. Researchers have been working on identifying factors for explaining and predicting user acceptance of an ISM. Some studies, however, revealed inconsistent findings on the antecedents of user acceptance of a website. Lack of consideration for individual differences in user ability is believed to be one of the key reasons for the mixed findings. The elaboration likelihood model (ELM) and several studies have suggested that individual differences in ability plays an moderating role on the relationship between the antecedents and user acceptance. Despite the critical role of user ability, little research has examined the role of user ability in the Internet shopping mall context. The purpose of this study is to develop a user acceptance model that consider the moderating role of user ability in the context of Internet shopping. This study was initiated to see the ability of the technology acceptance model(TAM) to explain the acceptance of a specific ISM. According to TAM. which is one of the most influential models for explaining user acceptance of IT, an intention to use IT is determined by usefulness and ease of use. Given that interaction between user and website takes place through web interface, the decisions to accept and continue using an ISM depend on these beliefs. However, TAM neglects to consider the fact that many users would not stick to an ISM until they trust it although they may think it useful and easy to use. The importance of trust for user acceptance of ISM has been raised by the relational views. The relational view emphasizes the trust-building process between the user and ISM, and user's trust on the website is a major determinant of user acceptance. The proposed model extends and integrates the TAM and relational views on user acceptance of ISM by incorporating usefulness, ease of use, and trust. User acceptance is defined as a user's intention to reuse a specific ISM. And user ability is introduced into the model as moderating variable. Here, the user ability is defined as a degree of experiences, knowledge and skills regarding Internet shopping sites. The research model proposes that the ease of use, usefulness and trust of ISM are key determinants of user acceptance. In addition, this paper hypothesizes that the effects of the antecedents(i.e., ease of use, usefulness, and trust) on user acceptance may differ among users. In particular, this paper proposes a moderating effect of a user's ability on the relationship between antecedents with user's intention to reuse. The research model with eleven hypotheses was derived and tested through a survey that involved 470 university students. For each research variable, this paper used measurement items recognized for reliability and widely used in previous research. We slightly modified some items proper to the research context. The reliability and validity of the research variables were tested using the Crobnach's alpha and internal consistency reliability (ICR) values, standard factor loadings of the confirmative factor analysis, and average variance extracted (AVE) values. A LISREL method was used to test the suitability of the research model and its relating six hypotheses. Key findings of the results are summarized in the following. First, TAM's two constructs, ease of use and usefulness directly affect user acceptance. In addition, ease of use indirectly influences user acceptance by affecting trust. This implies that users tend to trust a shopping site and visit repeatedly when they perceive a specific ISM easy to use. Accordingly, designing a shopping site that allows users to navigate with heuristic and minimal clicks for finding information and products within the site is important for improving the site's trust and acceptance. Usefulness, however, was not found to influence trust. Second, among the three belief constructs(ease of use, usefulness, and trust), trust was empirically supported as the most important determinants of user acceptance. This implies that users require trustworthiness from an Internet shopping site to be repeat visitors of an ISM. Providing a sense of safety and eliminating the anxiety of online shoppers in relation to privacy, security, delivery, and product returns are critically important conditions for acquiring repeat visitors. Hence, in addition to usefulness and ease of use as in TAM, trust should be a fundamental determinants of user acceptance in the context of internet shopping. Third, the user's ability on using an Internet shopping site played a moderating role. For users with low ability, ease of use was found to be a more important factors in deciding to reuse the shopping mall, whereas usefulness and trust had more effects on users with high ability. Applying the EML theory to these findings, we can suggest that experienced and knowledgeable ISM users tend to elaborate on such usefulness aspects as efficient and effective shopping performance and trust factors as ability, benevolence, integrity, and predictability of a shopping site before they become repeat visitors of the site. In contrast, novice users tend to rely on the low elaborating features, such as the perceived ease of use. The existence of moderating effects suggests the fact that different individuals evaluate an ISM from different perspectives. The expert users are more interested in the outcome of the visit(usefulness) and trustworthiness(trust) than those novice visitors. The latter evaluate the ISM in a more superficial manner focusing on the novelty of the site and on other instrumental beliefs(ease of use). This is consistent with the insights proposed by the Heuristic-Systematic model. According to the Heuristic-Systematic model. a users act on the principle of minimum effort. Thus, the user considers an ISM heuristically, focusing on those aspects that are easy to process and evaluate(ease of use). When the user has sufficient experience and skills, the user will change to systematic processing, where they will evaluate more complex aspects of the site(its usefulness and trustworthiness). This implies that an ISM has to provide a minimum level of ease of use to make it possible for a user to evaluate its usefulness and trustworthiness. Ease of use is a necessary but not sufficient condition for the acceptance and use of an ISM. Overall, the empirical results generally support the proposed model and identify the moderating effect of the effects of user ability. More detailed interpretations and implications of the findings are discussed. The limitations of this study are also discussed to provide directions for future research.