• Title/Summary/Keyword: Data-science

Search Result 56,455, Processing Time 0.085 seconds

FAMILY DYNAMICS OF INCEST PERCEIVED BY ADOLESECENTS (청소년이 지각한 근친상간의 가족역동)

  • Kim, Hun-Soo;Shin, Hwa-Sik
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • v.6 no.1
    • /
    • pp.56-64
    • /
    • 1995
  • Family is a primary unit of the major socialization processing for children. Parents among the family members are one of the most important figures from whom the child and adolescent acquire a wide variety of behavior patterns, attitudes, values and norms. An organization of family members product family structural functioning. Abnormal family structure is one of the most important reference models in the learning of antisocial patterns of behavior. Therefore incest and child sexual abuse including spouse abuse, elderly abuse, and neglect occurs in the abnormal family structural setting. In particular, incest, a specific form of sexual abuse, was once thought to be a phenomenon of great rarity, but our clinical experiences, especially over the past decade, have made us aware that incest and child sexual abuse is not rare case and on the increasing trend. Therefore, the aim of this study was to determine the family problem and dynamics of incest family, and character pattern of post-incest adolescent victim in Korea. A total of 1,838 adolescents from middle and high school(1,237) and juvenile correctional institute(601) were studied, sampled from Korean student population and adolescent delinquent population confined in juvenile correctional institutes, using proportional stratified random sampling method. The subjects' ages ranged from 12 to 21 years. Data were collected through questionnaire survey. Data analysis was done by IBM PC of Behavior Science Center at the Korea university, using SAS program. Statistical methods employed were Chi-square, principal component analysis and t-test etc. The results of this study were as follows ; 1) Of 1,071 subjects, 40(3.7%) reported incest experiences(sibling incest : 1.6% ; another type of incest : 2.1%) in their family setting. 2) The character pattern of post-incest adolescent victim was more socially maladjusted, immature, impulsive, rigid, anxious and dependent than non-incest adolescent. Also they showed some problem in academic performance and their assertiveness. 3) The other family members of incest family revealed more psychological and behavioral problem such as depression, alcoholism, psychotic disorder and criminal act than the non-incest family, even though there is no evidence of the context between them. 4) The family dynamics of incest family tended to be dysfunctional trend, as compared with non-incest family. It showed that the psychological instability of family member, parental rejection toward their children, coldness and indifference among family member and marital discordance between the parents had significant correlation with incest.

  • PDF

A Study of Factors Associated with Software Developers Job Turnover (데이터마이닝을 활용한 소프트웨어 개발인력의 업무 지속수행의도 결정요인 분석)

  • Jeon, In-Ho;Park, Sun W.;Park, Yoon-Joo
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.2
    • /
    • pp.191-204
    • /
    • 2015
  • According to the '2013 Performance Assessment Report on the Financial Program' from the National Assembly Budget Office, the unfilled recruitment ratio of Software(SW) Developers in South Korea was 25% in the 2012 fiscal year. Moreover, the unfilled recruitment ratio of highly-qualified SW developers reaches almost 80%. This phenomenon is intensified in small and medium enterprises consisting of less than 300 employees. Young job-seekers in South Korea are increasingly avoiding becoming a SW developer and even the current SW developers want to change careers, which hinders the national development of IT industries. The Korean government has recently realized the problem and implemented policies to foster young SW developers. Due to this effort, it has become easier to find young SW developers at the beginning-level. However, it is still hard to recruit highly-qualified SW developers for many IT companies. This is because in order to become a SW developing expert, having a long term experiences are important. Thus, improving job continuity intentions of current SW developers is more important than fostering new SW developers. Therefore, this study surveyed the job continuity intentions of SW developers and analyzed the factors associated with them. As a method, we carried out a survey from September 2014 to October 2014, which was targeted on 130 SW developers who were working in IT industries in South Korea. We gathered the demographic information and characteristics of the respondents, work environments of a SW industry, and social positions for SW developers. Afterward, a regression analysis and a decision tree method were performed to analyze the data. These two methods are widely used data mining techniques, which have explanation ability and are mutually complementary. We first performed a linear regression method to find the important factors assaociated with a job continuity intension of SW developers. The result showed that an 'expected age' to work as a SW developer were the most significant factor associated with the job continuity intention. We supposed that the major cause of this phenomenon is the structural problem of IT industries in South Korea, which requires SW developers to change the work field from developing area to management as they are promoted. Also, a 'motivation' to become a SW developer and a 'personality (introverted tendency)' of a SW developer are highly importantly factors associated with the job continuity intention. Next, the decision tree method was performed to extract the characteristics of highly motivated developers and the low motivated ones. We used well-known C4.5 algorithm for decision tree analysis. The results showed that 'motivation', 'personality', and 'expected age' were also important factors influencing the job continuity intentions, which was similar to the results of the regression analysis. In addition to that, the 'ability to learn' new technology was a crucial factor for the decision rules of job continuity. In other words, a person with high ability to learn new technology tends to work as a SW developer for a longer period of time. The decision rule also showed that a 'social position' of SW developers and a 'prospect' of SW industry were minor factors influencing job continuity intensions. On the other hand, 'type of an employment (regular position/ non-regular position)' and 'type of company (ordering company/ service providing company)' did not affect the job continuity intension in both methods. In this research, we demonstrated the job continuity intentions of SW developers, who were actually working at IT companies in South Korea, and we analyzed the factors associated with them. These results can be used for human resource management in many IT companies when recruiting or fostering highly-qualified SW experts. It can also help to build SW developer fostering policy and to solve the problem of unfilled recruitment of SW Developers in South Korea.

Developmental Plans and Research on Private Security in Korea (한국 민간경비 실태 및 발전방안)

  • Kim, Tea-Hwan;Park, Ok-Cheol
    • Korean Security Journal
    • /
    • no.9
    • /
    • pp.69-98
    • /
    • 2005
  • The security industry for civilians (Private Security), was first introduced to Korea via the US army's security system in the early 1960's. Shortly after then, official police laws were enforced in 1973, and private security finally started to develop with the passing of the 'service security industry' law in 1976. Korea's Private Security industry grew rapidly in the 1980's with the support of foreign funds and products, and now there are thought to be approximately 2000 private security enterprises currently running in Korea. However, nowadays the majority of these enterprises are experiencing difficulties such as lack of funds, insufficient management, and lack of control over employees, as a result, it seems difficult for some enterprises to avoid the low production output and bankruptcy. As a result of this these enterprises often settle these matters illegally, such as excessive dumping or avoiding problems by hiring inappropriate employees who don't have the right skills or qualifications for the jobs. The main problem with the establishment of this kind of security service is that it is so easy to make inroads into this private service market. All these hindering factors inhibit the market growth and impede qualitative development. Based on these main reasons, I researched this area, and will analyze and criticize the present condition of Korea's private security. I will present a possible development plan for the private security of Korea by referring to cases from the US and Japan. My method of researching was to investigate any related documentary records and articles and to interview people for necessary evidence. The theoretical study, involves investigation books and dissertations which are published from inside and outside of the country, and studying the complete collection of laws and regulations, internet data, various study reports, and the documentary records and the statistical data of many institutions such as the National Police Office, judicial training institute, and the enterprises of private security. Also, in addition, the contents of professionals who are in charge of practical affairs on the spot in order to overcomes the critical points of documentary records when investigating dissertation. I tried to get a firm grasp of the problems and difficulties which people in these work enterprises experience, this I thought would be most effective by interviewing the workers, for example: how they feel in the work places and what are the elements which inpede development? And I also interviewed policemen who are in charge of supervising the private escort enterprises, in an effort to figure out the problems and differences in opinion between domestic private security service and the police. From this investigation and research I will try to pin point the major problems of the private security and present a developmental plan. Firstly-Companies should unify the private police law and private security service law. Secondly-It is essential to introduce the 'specialty certificate' system for the quality improvement of private security service. Thirdly-must open up a new private security market by improving old system. Fourth-must build up the competitive power of the security service enterprises which is based on an efficient management. Fifth-needs special marketing strategy to hold customers Sixth-needs positive research based on theoretical studies. Seventh-needs the consistent and even training according to effective market demand. Eighth-Must maintain interrelationship with the police department. Ninth-must reinforce the system of Korean private security service association. Tenth-must establish private security laboratory. Based on these suggestions there should be improvement of private security service.

  • PDF

A survey of foodservice satisfaction and menu preference of high school boarding students in Jeju (제주지역 고등학생의 기숙사급식 만족도 및 급식메뉴 기호도 조사)

  • Kim, Kyung-Ja;Chae, In-Sook
    • Journal of Nutrition and Health
    • /
    • v.47 no.1
    • /
    • pp.77-88
    • /
    • 2014
  • Purpose: This study analyzed the foodservice satisfaction and menu preference of 506 high school boarding students in Jeju surveyed from July 2-30, 2012 with the aim of providing basic data for improving the quality of boarding food-service management. Methods: The data were analyzed using descriptive analysis, t-test, and Pearson's correlation coefficients, using the SPSS Win program (version 12.0). Results: Regarding satisfaction with dormitory foodservice, the satisfaction scores for service and hygiene were 3.46 (out of 5 scales), whereas the score for menu quality was 3.26 points. In terms of satisfaction by meal, dinner showed the highest score, at 3.70 (out of 5 scales). The satisfaction scores for breakfast were significantly higher in girls (3.36) than boys (2.93). Regarding intake of meals provided, dinner showed the highest score, at 3.96 (out of 5 scales), whereas breakfast showed the lowest score, at 3.63 points. Intake of lunch and dinner was significantly higher in boys (4.12, 4.17, respectively) than girls (3.72, 3.76, respectively). Regarding the requirements of subjects for dormitory foodservice, 43.4% of subjects selected improvement of food taste and 36.6% of girls chose menu diversity. In terms of menu preferences for main dishes, the students preferred noodles (4.06) and one-dish cooked rice (3.92) to cooked rice (3.66). The subjects preferred beef rib soup (4.10) and Kimchi stew (3.99) in soups and stews. With regard to the menu preferences for side dishes, steamed foods showed the highest score, at 3.95 (out of 5 scales), whereas seasoned foods showed the lowest score, at 2.89 points. The students preferred beef, pork, and chicken to fish and vegetables. The students preferred dessert the most with fruit juices (4.52). Bread and rice cake were more favored by girls, showing significant differences between boys and girls (p < 0.05, p < 0.01, respectively). Conclusion: Development of a systematic nutrition education program that can encourage practice of proper eating habits is needed. In addition improvement of the quality of boarding school meals through the service of various menus is needed.

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF

The Analysis of the School Foodservice Employees' Knowledge and Performance Degree of HACCP System in Jeju (제주지역 학교급식 조리종사자의 HACCP 관련 지식 및 수행도 분석)

  • Song, Im-Sook;Chae, In-Sook
    • Journal of Nutrition and Health
    • /
    • v.41 no.8
    • /
    • pp.870-886
    • /
    • 2008
  • The purposes of this study were to (a) analyze school foodservice employees' knowledge and performance degree of HACCP system and (b) provide the basic data for planning the strategies which can be performed for systematic HACCP system in school foodservice. For these purposes, the subjects included 91 dieticians (a response rate 98.9%) and 270 foodservice employees (a response rate 98.2%) at school in Jeju city and they were surveyed from October 21 to November 4, 2006. The data were analyzed by descriptive analysis, reliability analysis, t-test, ANOVA (Duncan multiple range test) and Pearson's correlation coefficients using the SPSS Win Program (version 12.0). In terms of the number of training practice, the result of sanitary training indicated that the dieticians who trained the employees more than once per a week (48.6%) or everyday (36.3%) were 84.7%. And the dieticians who were higher age, full-time job, and working at middle school implemented significantly more training the employees. In the training methods, 40.7% of dieticians used the oral presentation and 37.4 % utilized the printed matters. Also, most of employees (98.1%) have experienced for the training, 39.6% of them did not have regular training experience and 40.7% of them responded that they were understanding the HACCP system well. The result of employees' knowledge level of HACCP system reported that the items of the personal hygiene scored the highest (92.3 points) whereas the items of CCP3 scored the lowest (58.3 points) as the average being 84.2 points (out of 100 scale). In terms of the performance degree of HACCP system, the average was 4.40 (out of 5 scale), the items of the personal hygiene scored the highest as 4.51 whereas the items of CCP2 scored the lowest as 4.31 points. The dieticians' perception degree of employees' performance degree in HACCP system showed that the average was 4.13 (out of 5 scale), so it was significantly lower than actual performance degree as average 4.40 (out of 5 scale). Additionally the employees' knowledge level was positively correlated to performance degree and employees' knowledge level of CCP3, CCP4, and the personal hygiene significantly influenced to the HACCP performance degree. Finally, the dieticians have to recognize correctly the employees' performance degree and on the basis of it must plan the sanitary training which has a proper contents and methods to enhance the employees' knowledge level and achieve more systematic HACCP system in school foodservice.

A Study on the Meaning and Strategy of Keyword Advertising Marketing

  • Park, Nam Goo
    • Journal of Distribution Science
    • /
    • v.8 no.3
    • /
    • pp.49-56
    • /
    • 2010
  • At the initial stage of Internet advertising, banner advertising came into fashion. As the Internet developed into a central part of daily lives and the competition in the on-line advertising market was getting fierce, there was not enough space for banner advertising, which rushed to portal sites only. All these factors was responsible for an upsurge in advertising prices. Consequently, the high-cost and low-efficiency problems with banner advertising were raised, which led to an emergence of keyword advertising as a new type of Internet advertising to replace its predecessor. In the beginning of 2000s, when Internet advertising came to be activated, display advertisement including banner advertising dominated the Net. However, display advertising showed signs of gradual decline, and registered minus growth in the year 2009, whereas keyword advertising showed rapid growth and started to outdo display advertising as of the year 2005. Keyword advertising refers to the advertising technique that exposes relevant advertisements on the top of research sites when one searches for a keyword. Instead of exposing advertisements to unspecified individuals like banner advertising, keyword advertising, or targeted advertising technique, shows advertisements only when customers search for a desired keyword so that only highly prospective customers are given a chance to see them. In this context, it is also referred to as search advertising. It is regarded as more aggressive advertising with a high hit rate than previous advertising in that, instead of the seller discovering customers and running an advertisement for them like TV, radios or banner advertising, it exposes advertisements to visiting customers. Keyword advertising makes it possible for a company to seek publicity on line simply by making use of a single word and to achieve a maximum of efficiency at a minimum cost. The strong point of keyword advertising is that customers are allowed to directly contact the products in question through its more efficient advertising when compared to the advertisements of mass media such as TV and radio, etc. The weak point of keyword advertising is that a company should have its advertisement registered on each and every portal site and finds it hard to exercise substantial supervision over its advertisement, there being a possibility of its advertising expenses exceeding its profits. Keyword advertising severs as the most appropriate methods of advertising for the sales and publicity of small and medium enterprises which are in need of a maximum of advertising effect at a low advertising cost. At present, keyword advertising is divided into CPC advertising and CPM advertising. The former is known as the most efficient technique, which is also referred to as advertising based on the meter rate system; A company is supposed to pay for the number of clicks on a searched keyword which users have searched. This is representatively adopted by Overture, Google's Adwords, Naver's Clickchoice, and Daum's Clicks, etc. CPM advertising is dependent upon the flat rate payment system, making a company pay for its advertisement on the basis of the number of exposure, not on the basis of the number of clicks. This method fixes a price for advertisement on the basis of 1,000-time exposure, and is mainly adopted by Naver's Timechoice, Daum's Speciallink, and Nate's Speedup, etc, At present, the CPC method is most frequently adopted. The weak point of the CPC method is that advertising cost can rise through constant clicks from the same IP. If a company makes good use of strategies for maximizing the strong points of keyword advertising and complementing its weak points, it is highly likely to turn its visitors into prospective customers. Accordingly, an advertiser should make an analysis of customers' behavior and approach them in a variety of ways, trying hard to find out what they want. With this in mind, her or she has to put multiple keywords into use when running for ads. When he or she first runs an ad, he or she should first give priority to which keyword to select. The advertiser should consider how many individuals using a search engine will click the keyword in question and how much money he or she has to pay for the advertisement. As the popular keywords that the users of search engines are frequently using are expensive in terms of a unit cost per click, the advertisers without much money for advertising at the initial phrase should pay attention to detailed keywords suitable to their budget. Detailed keywords are also referred to as peripheral keywords or extension keywords, which can be called a combination of major keywords. Most keywords are in the form of texts. The biggest strong point of text-based advertising is that it looks like search results, causing little antipathy to it. But it fails to attract much attention because of the fact that most keyword advertising is in the form of texts. Image-embedded advertising is easy to notice due to images, but it is exposed on the lower part of a web page and regarded as an advertisement, which leads to a low click through rate. However, its strong point is that its prices are lower than those of text-based advertising. If a company owns a logo or a product that is easy enough for people to recognize, the company is well advised to make good use of image-embedded advertising so as to attract Internet users' attention. Advertisers should make an analysis of their logos and examine customers' responses based on the events of sites in question and the composition of products as a vehicle for monitoring their behavior in detail. Besides, keyword advertising allows them to analyze the advertising effects of exposed keywords through the analysis of logos. The logo analysis refers to a close analysis of the current situation of a site by making an analysis of information about visitors on the basis of the analysis of the number of visitors and page view, and that of cookie values. It is in the log files generated through each Web server that a user's IP, used pages, the time when he or she uses it, and cookie values are stored. The log files contain a huge amount of data. As it is almost impossible to make a direct analysis of these log files, one is supposed to make an analysis of them by using solutions for a log analysis. The generic information that can be extracted from tools for each logo analysis includes the number of viewing the total pages, the number of average page view per day, the number of basic page view, the number of page view per visit, the total number of hits, the number of average hits per day, the number of hits per visit, the number of visits, the number of average visits per day, the net number of visitors, average visitors per day, one-time visitors, visitors who have come more than twice, and average using hours, etc. These sites are deemed to be useful for utilizing data for the analysis of the situation and current status of rival companies as well as benchmarking. As keyword advertising exposes advertisements exclusively on search-result pages, competition among advertisers attempting to preoccupy popular keywords is very fierce. Some portal sites keep on giving priority to the existing advertisers, whereas others provide chances to purchase keywords in question to all the advertisers after the advertising contract is over. If an advertiser tries to rely on keywords sensitive to seasons and timeliness in case of sites providing priority to the established advertisers, he or she may as well make a purchase of a vacant place for advertising lest he or she should miss appropriate timing for advertising. However, Naver doesn't provide priority to the existing advertisers as far as all the keyword advertisements are concerned. In this case, one can preoccupy keywords if he or she enters into a contract after confirming the contract period for advertising. This study is designed to take a look at marketing for keyword advertising and to present effective strategies for keyword advertising marketing. At present, the Korean CPC advertising market is virtually monopolized by Overture. Its strong points are that Overture is based on the CPC charging model and that advertisements are registered on the top of the most representative portal sites in Korea. These advantages serve as the most appropriate medium for small and medium enterprises to use. However, the CPC method of Overture has its weak points, too. That is, the CPC method is not the only perfect advertising model among the search advertisements in the on-line market. So it is absolutely necessary that small and medium enterprises including independent shopping malls should complement the weaknesses of the CPC method and make good use of strategies for maximizing its strengths so as to increase their sales and to create a point of contact with customers.

  • PDF

Modeling of Estimating Soil Moisture, Evapotranspiration and Yield of Chinese Cabbages from Meteorological Data at Different Growth Stages (기상자료(氣象資料)에 의(依)한 배추 생육시기별(生育時期別) 토양수분(土壤水分), 증발산량(蒸發散量) 및 수량(收量)의 추정모형(推定模型))

  • Im, Jeong-Nam;Yoo, Soon-Ho
    • Korean Journal of Soil Science and Fertilizer
    • /
    • v.21 no.4
    • /
    • pp.386-408
    • /
    • 1988
  • A study was conducted to develop a model for estimating evapotranspiration and yield of Chinese cabbages from meteorological factors from 1981 to 1986 in Suweon, Korea. Lysimeters with water table maintained at 50cm depth were used to measure the potential evapotranspiration and the maximum evapotranspiration in situ. The actual evapotranspiration and the yield were measured in the field plots irrigated with different soil moisture regimes of -0.2, -0.5, and -1.0 bars, respectively. The soil water content throughout the profile was monitored by a neutron moisture depth gauge and the soil water potentials were measured using gypsum block and tensiometer. The fresh weight of Chinese cabbages at harvest was measured as yield. The data collected in situ were analyzed to obtain parameters related to modeling. The results were summarized as followings: 1. The 5-year mean of potential evapotranspiration (PET) gradually increased from 2.38 mm/day in early April to 3.98 mm/day in mid-June, and thereafter, decreased to 1.06 mm/day in mid-November. The estimated PET by Penman, Radiation or Blanney-Criddle methods were overestimated in comparison with the measured PET, while those by Pan-evaporation method were underestimated. The correlation between the estimated and the measured PET, however, showed high significance except for July and August by Blanney-Criddle method, which implied that the coefficients should be adjusted to the Korean conditions. 2. The meteorological factors which showed hgih correlation with the measured PET were temperature, vapour pressure deficit, sunshine hours, solar radiation and pan-evaporation. Several multiple regression equations using meteorological factors were formulated to estimate PET. The equation with pan-evaporation (Eo) was the simplest but highly accurate. PET = 0.712 + 0.705Eo 3. The crop coefficient of Chinese cabbages (Kc), the ratio of the maximum evapotranspiration (ETm) to PET, ranged from 0.5 to 0.7 at early growth stage and from 0.9 to 1.2 at mid and late growth stages. The regression equation with respect to the growth progress degree (G), ranging from 0.0 at transplanting day to 1.0 at the harvesting day, were: $$Kc=0.598+0.959G-0.501G^2$$ for spring cabbages $$Kc=0.402+1.887G-1.432G^2$$ for autumn cabbages 4. The soil factor (Kf), the ratio of the actual evapotranspiration to the maximum evapotranspiration, showed 1.0 when the available soil water fraction (f) was higher than a threshold value (fp) and decreased linearly with decreasing f below fp. The relationships were: Kf=1.0 for $$f{\geq}fp$$ Kf=a+bf for f$$I{\leq}Esm$$ Es = Esm for I > Esm 6. The model for estimating actual evapotranspiration (ETa) was based on the water balance neglecting capillary rise as: ETa=PET. Kc. Kf+Es 7. The model for estimating relative yield (Y/Ym) was selected among the regression equations with the measured ETa as: Y/Ym=a+bln(ETa) The coefficients and b were 0.07 and 0.73 for spring Chinese cabbages and 0.37 and 0.66 for autumn Chinese cabbages, respectively. 8. The estimated ETa and Y/Ym were compared with the measured values to verify the model established above. The estimated ETa showed disparities within 0.29mm/day for spring Chinese cabbages and 0.19mm/day for autumn Chinese cabbages. The average deviation of the estimated relative yield were 0.14 and 0.09, respectively. 9. The deviations between the estimated values by the model and the actual values obtained from three cropping field experiments after the completion of the model calibration were within reasonable confidence range. Therefore, this model was validated to be used in practical purpose.

  • PDF

Current and Future Operation of Menu Management in the School Foodservices of Chungbuk (1) - Menu Planning - (충북지역 학교급식 영양(교)사의 식단관리 운영실태 및 개선방안(1) - 식단계획 -)

  • Ahn, Yoon-Ju;Lee, Young-Eun
    • Journal of the Korean Society of Food Science and Nutrition
    • /
    • v.41 no.8
    • /
    • pp.1118-1133
    • /
    • 2012
  • This research aimed to suggest an efficient improvement plan for school food services by investigating the operating situation and recognition of menu management in school food services for school food service dietitians (and nutrition teachers) in Chungbuk. A total of 328 questionnaires were distributed to school food service dietitians (and nutrition teachers) in Chungbuk by e-mail in September, 2010. A total of 265 questionnaires (80.8%) were used for the analysis. The highest allocation of nutrients and calories per day in school food services was 1:1.5:1.5 (breakfast : lunch : dinner) (38.5%). The reasoning for applying a flexible allocation of nutrients and calories per day was 'considering the ratio of students who do not eat breakfast' (59.2%). And the way to apply the flexible allocation for nutrients and calories per day was 'by agreement from the school operating committee in arbitrary data without situation surveys' (86 respondents, 49.4%), and 'by agreement from the school operating committee in analysis data through situation surveys' (80 respondents, 46.0%). The operational method of standardized recipes was 'cooking management site of national education information systems' (87.5%) and the items included in standardized recipes were menu name, food material name, portion size, cooking method, nutrition analysis, and critical control point in HACCP. The main reason for not utilizing all items of a cooking management site of the national education information system was 'no big trouble in menu management even though it is used partly (29.1%). In addition, the highest use of standardized recipe was for 'maintaining consistency of food production quantity' (74.0%).

An Exploratory Study on the Components of Visual Merchandising of Internet Shopping Mall (인터넷쇼핑몰의 VMD 구성요인에 대한 탐색적 연구)

  • Kim, Kwang-Seok;Shin, Jong-Kuk;Koo, Dong-Mo
    • Journal of Global Scholars of Marketing Science
    • /
    • v.18 no.2
    • /
    • pp.19-45
    • /
    • 2008
  • This study is to empirically examine the primary dimensions of visual merchandising (VMD) of internet shopping mall, namely store design, merchandise, and merchandising cues, to be a attractive virtual store to the shoppers. The authors reviewed the literature related to the major components of VMD from the perspective of the AIDA model, which has been mainly applied to the offline store settings. The major purposes of the study are as follows; first, tries to derive the variables related with the components of visual merchandising through reviewing the existing literatures, establish the hypotheses, and test it empirically. Second, examines the relationships between the components of VMD and the attitude toward the VMD, however, putting more emphasis on finding out the component structure of the VMD. VMD needs to be examined with the perspective that an online shopping mall is a virtual self-service or clerkless store, which could reduce the number of employees, help the shoppers search, evaluate and purchase for themselves, and to be explored in terms of the in-store persuasion processes of customers. This study reviewed the literatures related to store design, merchandise, and merchandising cues which might be relevant to the store, product, and promotion respectively. VMD is a total communication tool, and AIDA model could explain the in-store consumer behavior of online shopping. Store design has to do with triggering a consumer attention to the online mall, merchandise with a product related interest, and merchandising cues with promotions such as recommendation and links that induce the desire to pruchase. These three steps might be seen as the processes for purchase actions. The theoretical rationale for the relationship between VMD and AIDA could be found in Tyagi(2005) that the three steps of consumer-oriented merchandising are a store, a product assortment, and placement, in Omar(1999) that three types of interior display are a architectural design display, commodity display, and point-of-sales(POS) display, and in Davies and Ward(2005) that the retail store interior image is related to an atmosphere, merchandise, and in-store promotion. Lee et al(2000) suggested as the web merchandising components a merchandising cues, a shopping metaphor which is an assistant tool for search, a store design, a layout(web design), and a product assortment. The store design which includes differentiation, simplicity and navigation is supposed to be related to the attention to the virtual store. Second, the merchandise dimensions comprising product assortments, visual information and product reputation have to do with the interest in the product offerings. Finally, the merchandising cues that refer to merchandiser(MD)'s recommendation of products and providing the hyperlinks to relevant goods for the shopper is concerned with attempt to induce the desire to purchase. The questionnaire survey was carried out to collect the data about the consumers who would shop at internet shopping malls frequently. To select the subject malls, the mall ranking data announced by a mall rating agency was used to differentiate the most popular and least popular five mall each. The subjects was instructed to answer the questions after navigating the designated mall for five minutes. The 300 questionnaire was distributed to the consumers, 166 samples were used in the final analysis. The empirical testing focused on identifying and confirming the dimensionality of VMD and its subdimensions using a structural equation modeling method. The confirmatory factor analysis for the endogeneous and exogeneous variables was carried out in four parts. The second-order factor analysis was done for a store design, a merchandise, and a merchandising cues, and first-order confirmatory factor analysis for the attitude toward the VMD. The model test results shows that the chi-square value of structural equation is 144.39(d.f 49), significant at 0.01 level which means the proposed model was rejected. But, judging from the ratio of chi-square value vs. degree of freedom, the ratio was 2.94 which smaller than an acceptable level of 3.0, RMR is 0.087 which is higher than a generally acceptable level of 0.08. GFI and AGFI is turned out to be 0.90 and 0.84 respectively. Both NFI and NNFI is 0.94, and CFI 0.95. The major test results are as follows; first, the second-order factor analysis and structural equational modeling reveals that the differentiation, simplicity and ease of identifying current status of the transaction are confirmed to be subdimensions of store design and to be a significant predictors of the dependent variable. This result implies that when designing an online shopping mall, it is necessary to differentiate visually from other malls to improve the effectiveness of the communications of store design. That is, the differentiated store design raise the contrast stimulus to sensory organs to promote the memory of the store and to have a favorable attitude toward the VMD of a store. The results that navigation which means the easiness of identifying current status of shopping affects the attitude to VMD could be interpreted that the navigating processes via the hyperlinks which is characteristics of an internet shopping is a complex and cognitive process and shoppers are likely to lack the sense of overall structure of the store. Consequently, shoppers are likely to be alost amid shopping not knowing where to go. The orientation tool enhance the accessibility of information to raise the perceptive power about the store environment.(Titus & Everett 1995) Second, the primary dimension of merchandise and its subdimensions was confirmed to be unidimensional respectively, have a construct validity, and nomological validity which the VMD dimensions supposed to have a positive correlation with the dependent variable. The subdimensions of product assortment, brand fame and information provision proved to have a positive effect on the attitude toward the VMD. It could be interpreted that the more plentiful the product and brand assortment of the mall is, the more likely the shoppers to favor it. Brand fame and information provision as well affect the VMD attitude, which means that the more famous the brand, the more likely the shoppers would trust and feel familiar with the mall, and the plentifully and visually presented information could have the shopper have a favorable attitude toward the store VMD. Third, it turned out to be that merchandising cue of product recommendation and hyperlinks affect the VMD attitude. This could be interpreted that recommended products could reduce the uncertainty related with the purchase decision, and the hyperlinks to relevant products would help the shopper save the cognitive effort exerted into the information search and gathering, which could lead to a favorable attitude to the VMD. This study tried to sheds some new light on the VMD of online store by reviewing the variables mentioned to be relevant with offline VMD in the existing literatures, and tried to link the VMD components from the perspective of AIDA model. The effect size of the VMD dimensions on the attitude was in the order of the merchandise, the store design and the merchandising cues.It is said that an internet has an unlimited place for display, however, the virtual store is not unlimited since the consumer has a limited amount of cognitive ability to process the external information and internal memory. Particularly, the shoppers are likely to face some difficulties in decision making on account of too many alternative and information overloads. Therefore, the internet shopping mall manager should take into consideration the cost of information search on the part of the consumer, to establish the optimal product placements and search routes. An efficient store composition would be possible by reducing the psychological burdens and cognitive efforts exerted to information search and alternatives evaluation. The store image is in most part determined by the product category and its brand it deals in. The results of this study support this proposition that the merchandise is most important to the VMD attitude than other components, the manager is required to take a strategic approach to VMD. The internet users are getting more accustomed and more knowledgeable about the internet media and more likely to accept the internet as a shopping channel as the period of time during which they use the internet to shop become longer. The web merchandiser should be aware that the product introduction using a moving pictures and a bulletin board become more important in order to present the interactive product information visually and communicate with customers more actively, therefore leading to making the quantity and quality of product information more rich.

  • PDF