• Title/Summary/Keyword: Place Experience

Search Result 986, Processing Time 0.03 seconds

The Study of the Identity of Christian Educators in Autobiographical Writing of Christian Educational Books: Focusing on the books of Palmer, Harris, and Moore. (기독교교육학 저서의 자전적 글쓰기에 나타난 기독교교육학자의 정체성 연구: 파머, 해리스, 무어를 중심으로)

  • Kim, Eun Joo
    • Journal of Christian Education in Korea
    • /
    • v.68
    • /
    • pp.345-374
    • /
    • 2021
  • This study is a paper which studies the fact that autobiographical writing in Christian educational books is an important channel for studying the identity of Christian educators. The identity of Christian educators is the background and foundation of the study of Christian education theory. It was found through research that the scholar's identity is more evident in autobiographical writing from a first-person perspective experienced by the author than in argumentative writing with objective and cognitive limitations. This study examined the concept and characteristics of autobiographical writing research, the relationship of autobiographical writing research and self-identity, the relationship between autobiographical writing and Christian education, and discovered autobiographical writing in Christian educational scholars' books. Through the autobiographical writing of Maria Harris' Teaching and Religious Imagination, Parker Palmer's The Courage to Teach, and Elizabeth Moore's Teaching as a Sacrament Act, we studied that the identity of Christian educators can meet, transform, and expand learners' identity as well. Through research, it has been confirmed that autobiographical writing takes the form of a story, but as a story distinct from the story, it becomes a place where the authors' identity and readers' identity can meet, wrestle and expand. Autobiographical writing has a relationship with story and self-identity. These characteristics are also linked to Christian educational goals that focus on the formation and transformation of self-identity. The autobiographical writing in Harris, Palmer, and Moore's writings shows the identity of a teacher, including scholars' theological perspectives and views on education. As the writing of Christian education books so far has become argumentative and objective writing, readers has felt a sense of disparity and disconnection. If autobiographical writing becomes educational books' style, it can invite readers to empathize with who the author is. Christian education will experience more fundamental changes with autobiographical writing.

The Study of the Two-Dimensional Suicidal Type Based on Psychological Autopsy: A Focus on Suicidal Behaviors and Suicidal Risk Factors (한국형 심리부검 기반 이차원적 자살유형 연구: 자살행동과 자살위험요인을 중심으로)

  • Sung-pil Yook;Jonghan Sea
    • Korean Journal of Culture and Social Issue
    • /
    • v.29 no.1
    • /
    • pp.75-99
    • /
    • 2023
  • The current study aimed to explore the suicidal behaviors and risk factors of completed suicides using psychological autopsy and use them as index variables to classify suicidal types. In addition, this study looked into the influential factors that affect each suicidal type. related to suicidal behaviors and suicidal risk factors by psychological autopsy. In addiction, the distinctions among the classes were analyzed. For this, psychological autopsies were conducted on the families and the close ones of 128 completed suicides. Then, the index variables were finally chosen for classifying suicidal types. The selected index variables for suicidal risk factors were mental disorders, suicide/self-harm, significant changes in physical appearance, marital conflict, adjustment and relationship issues at work/school, unemployment/layoff, jobless status and serious financial problems. The selected index variables for suicidal behaviors were expressing their suicidal attempts, writing suicidal notes, asking for help, the time/place/method of suicidal behavior, past suicidal/self-harm experience and the first person who witnessed the suicide. The Latent Class Analysis(LCA) and the 3-step method were used for classifying suicidal types. Then external variables(financial changes, cohabitation, existence of stressors, changes in stress level or relationships and family members with mental disorder/alchohol problems/ physical disorders, and work/school stisfaction) were applied for distinguishing classes. As a result, 5 classes(financial problems, adjustment problems, complex problems, psychiatric problems, and response to event[s]) were revealed on suicidal behaviors and 3 classes(residence- suicidal attempt- found by family, nonresidence- nonsuicidal attempt- found by acquaintances, residence- nonsuicidal attempt- found by family) were presented on suicidal risk factors. External variables such as gender, marital status, cohabitation, changes in relationships significantly differentiated among the 3 classes. Especially, class 3(residence- nonsuicidal attempt- found by family) tended to cohabit with others, were married, and had a significantly high level of interpersonal conflicts. When comparing the 5 classes of suicidal risk factors, auxiliary variables such as economic changes, cohabitation, stress, relationship changes, and family-related problems, and school/work satisfaction significantly differentiated the 5 classes. Especially class 3 (complex problems) experienced comparatively less family-related problems, but showed an aggravating level of personal stress. Suicial prevention strategies should be provided considering the characteristics of each class and the influential factors.

A Study of Postural Control Characteristics in Schoolchild with Intellectual Disability (초등학교 지적장애아동의 자세조절 특성)

  • Lee, Hyoung Soo
    • 재활복지
    • /
    • v.14 no.3
    • /
    • pp.225-256
    • /
    • 2010
  • This study aims to provide the basic data of the rehabilitation program for the schoolchild with intellectual disability by designing new framework of the features of postural control for the schoolchild with intellectual disability. For this, the study investigated what sensations the schoolchild are using to maintain posture by selectively or synthetically applying vision, vestibular sensation and somato-sensation, and how the coordinative sensory system of the schoolchild is responding to any sway referenced sensory stimulus. The study intended to prove the limitation of motor system in estimating the postural stability by providing the cognitive motor task, and provided the features of postural control of the schoolchild with intellectual disability by measuring the onset times and orders of muscle contraction of neuron-muscle when there is a postural control taking place due to the exterior disturbance. Furthermore, by comparatively analyzing the difference between the normal schoolchild and the intellectually disabled schoolchild, this study provided an optimal direction for treatment planning when the rehabilitation program is applied in the postural control ability training program for the schoolchild with intellectual disability. Taking gender and age into consideration, 52 schoolchild including 26 normal schoolchild and 26 intellectually disabled schoolchild were selected. To measure the features of postural control, CTSIB test, and postural control strategy test were conducted. The result of experiment is as followed. First, the schoolchild with intellectual disability showed different feature in using sensory system to control posture. The normal schoolchild tended to depend on somato-sensory or vision, and showed a stable postural control toward a sway referenced stimulus on somato-sensory system. The schoolchild with intellectual disability tended to use somato-sensory or vision, and showed a very instable postural control toward a sway referenced vision or a sway referenced stimulus on somato-sensory system. In sensory analysis, the schoolchild with intellectual disability showed lower level of proficiency in somato-sensation percentile, vision percentile and vestibular sensation percentile compare to the normal schoolchild. Second, as for the onset times and orders of muscle contraction for strategies of postural control when there is an exterior physical stimulus, the schoolchild with intellectual disability showed a relatively delayed onset time of muscle control, and it was specially greater when the perturbation is from backward. As for the onset orders of muscle contraction, it started from muscles near coax then moved to the muscles near ankle joint, and the numbers and kinds of muscles involved were greater than the normal schoolchild. The normal schoolchild showed a fast muscle contracting reaction from every direction after the perturbation stimulus, and the contraction started from the muscles near the ankle joint and expanded to the muscles near coax. From the results of the experiments, the special feature of the postural control of the schoolchild with intellectual disability is that they have a higher dependence on vision in sensory system, and there was no appropriate integration of swayed sensation observed in upper level of central nerve system. In the motor system, the onset time of muscle contraction for postural control was delayed, and it proceeded in reversed order of the normal schoolchild. Therefore, when use the clinical physical therapy to improve the postural control ability, various sensations should be provided and should train the schoolchild to efficiently use the provided sensations and use the sensory experience recorded in upper level of central nerve system to improve postural control ability. At the same time, a treatment program that can improve the processing ability of central nerve system through meaningful activities with organizing and planning adapting reaction should be provided. Also, a proprioceptive motor control training program that can induce faster muscle contraction reaction and more efficient onset orders from muscularskeletal system is need to be provided as well.

A Study on the Women's Voice in Oral Narratives of Social Memory of National Violence ('5.18') ('5.18'의 기억 서사와 '여성'의 목소리)

  • Kim, Young-hee
    • Issues in Feminism
    • /
    • v.18 no.2
    • /
    • pp.149-206
    • /
    • 2018
  • This essay is focused on finding women's voice in oral narratives of social memory of national violence and resistance. The books of oral narratives of women who had experienced the national violence and participated in the resistance through historic events such as 5.18, have been published recently. This study is based on the materials that have interviewed women experienced the historic event '5.18' in Gwangju. In this study, there are analyses of the materials of the memory of violence and resistance of '5.18', which have contained the texts written by intellectual males and the oral narratives of females directly involved. So far, the memory and experience of women have not been presented in its entirety in the field of social discourse of '5.18'. In the field women's words were translated in men's words, so the real words disappeared and in the end remained unspoken words. And besides, the existence of women are substituted with the limited images (for example women's body destroyed) presented by men's words in memorial materials. In narratives of '5.18', women are reduced to the images of bodies destroyed by national violence. The destroyed bodies are places for exhibition and disclosure of national violence. Women are not presented as the subjects of the social resistance in oral or written narratives of '5.18'. The images of females are only vehicles to urge the male subjects to resist against unjust violence. In this context, men are interpreted for the protectors of sisters, daughters, wives. Since 1980s, the symbol of '5.18 Gwangju' has represented the most ideal community in Korean society. But women have been on the borderline or outside of the community in fact. However, women intend to construct themselves as the subjects of resistance through the spoken words. They have tried to make the politic places for themselves in the social field by speaking and speaking constantly. The desire to speak out is becoming stronger for women, so these days more words are spoken by more women and more oral narratives made by women are revealed in social discoursive field. So the place for women's voice is expanding in social memorial field of '5.18'.

The Effect of Consumers' Value Motives on the Perception of Blog Reviews Credibility: the Moderation Effect of Tie Strength (소비자의 가치 추구 동인이 블로그 리뷰의 신뢰성 지각에 미치는 영향: 유대강도에 따른 조절효과를 중심으로)

  • Chu, Wujin;Roh, Min Jung
    • Asia Marketing Journal
    • /
    • v.13 no.4
    • /
    • pp.159-189
    • /
    • 2012
  • What attracts consumers to bloggers' reviews? Consumers would be attracted both by the Bloggers' expertise (i.e., knowledge and experience) and by his/her unbiased manner of delivering information. Expertise and trustworthiness are both virtues of information sources, particularly when there is uncertainty in decision-making. Noting this point, we postulate that consumers' motives determine the relative weights they place on expertise and trustworthiness. In addition, our hypotheses assume that tie strength moderates consumers' expectation on bloggers' expertise and trustworthiness: with expectation on expertise enhanced for power-blog user-group (weak-ties), and an expectation on trustworthiness elevated for personal-blog user-group (strong-ties). Finally, we theorize that the effect of credibility on willingness to accept a review is moderated by tie strength; the predictive power of credibility is more prominent for the personal-blog user-groups than for the power-blog user groups. To support these assumptions, we conducted a field survey with blog users, collecting retrospective self-report data. The "gourmet shop" was chosen as a target product category, and obtained data analyzed by structural equations modeling. Findings from these data provide empirical support for our theoretical predictions. First, we found that the purposive motive aimed at satisfying instrumental information needs increases reliance on bloggers' expertise, but interpersonal connectivity value for alleviating loneliness elevates reliance on bloggers' trustworthiness. Second, expertise-based credibility is more prominent for power-blog user-groups than for personal-blog user-groups. While strong ties attract consumers with trustworthiness based on close emotional bonds, weak ties gain consumers' attention with new, non-redundant information (Levin & Cross, 2004). Thus, when the existing knowledge system, used in strong ties, does not work as smoothly for addressing an impending problem, the weak-tie source can be utilized as a handy reference. Thus, we can anticipate that power bloggers secure credibility by virtue of their expertise while personal bloggers trade off on their trustworthiness. Our analysis demonstrates that power bloggers appeal more strongly to consumers than do personal bloggers in the area of expertise-based credibility. Finally, the effect of review credibility on willingness to accept a review is higher for the personal-blog user-group than for the power-blog user-group. Actually, the inference that review credibility is a potent predictor of assessing willingness to accept a review is grounded on the analogy that attitude is an effective indicator of purchase intention. However, if memory about established attitudes is blocked, the predictive power of attitude on purchase intention is considerably diminished. Likewise, the effect of credibility on willingness to accept a review can be affected by certain moderators. Inspired by this analogy, we introduced tie strength as a possible moderator and demonstrated that tie strength moderated the effect of credibility on willingness to accept a review. Previously, Levin and Cross (2004) showed that credibility mediates strong-ties through receipt of knowledge, but this credibility mediation is not observed for weak-ties, where a direct path to it is activated. Thus, the predictive power of credibility on behavioral intention - that is, willingness to accept a review - is expected to be higher for strong-ties.

  • PDF

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.

Considerable Aspects for Technical and Vocational Training in Forestry (임업기술(林業技術) 및 직업훈련(職業訓練)에 고려(考慮)되어야 할 사항(事項))

  • Ma, Sang Kyu
    • Journal of Korean Society of Forest Science
    • /
    • v.51 no.1
    • /
    • pp.56-65
    • /
    • 1981
  • The training of forest ranger level and forest worker level to push the sound forest management and to increase the employment effects in forestry will be done without delay as soon as possible. So several opinions to be considered are here discussed. 1. The ranger level will be at first completely trained with the technics developed and modernized, to process really the sound forest management based on the concept of ecological and economical technic. 2. The organization of vocational training and it's systematical training method will be newly adopted to increase the labour efficiency in forestry. The case of fulltime worker level should be more intensively trained and part-time worker or forest famer level should be trained by the forest ranger and skilled worker with visiting circularly their working place. And the daily employed workers and village people for working should be done by the skilled workers. 3. The training subjects for them at the beginning step will be exploited by the instructors and concerned experts with studying their current conditions. Their practical training is more reasonable to do in the practically managing forest and to carry out under the responsible of leader of this forest. 4. The instructors included rangers of training forest will get specially certain intensive training through the aids of outside experts or through the group instruction with them. 5. The training fields and their reasons to be learned by them are discussed in this paper from the basic knowledge to the skill technics. 6. In oder to systematize and mordernize more rapidly our forest technics that need for training them and also applying directly in the forest management, a total effort of certain type by scientists and technicians scattered individually all over the country is now earnestly demanded to synthesize their knowledge, technic and experience. So to do like this, the establishment of certain organization through which can do their total efforts together will be considered and assisted by the concerned authority. 7. For better lieving of full-time workers, the whole-round year working amount have to be supplied though the work technic-and working plan development. And under the conditions that the timber harvesting work is still not so enough and it has a bad climatic season, the in-side working system and side - job aids will be developed for their sound lieving. 8. The organization of labour management will be soon introduced in the concerning administrativ authority to solve the forest labour problems and to increase the employing effects in forestry in future. 9. The supply programm of improved and trained tools and maschines for forest work is also considered to use by the trained persons. If not to do so, the training results will return to the original condition and will get nothing any more.

  • PDF

An Analysis of the Moderating Effects of User Ability on the Acceptance of an Internet Shopping Mall (인터넷 쇼핑몰 수용에 있어 사용자 능력의 조절효과 분석)

  • Suh, Kun-Soo
    • Asia pacific journal of information systems
    • /
    • v.18 no.4
    • /
    • pp.27-55
    • /
    • 2008
  • Due to the increasing and intensifying competition in the Internet shopping market, it has been recognized as very important to develop an effective policy and strategy for acquiring loyal customers. For this reason, web site designers need to know if a new Internet shopping mall(ISM) will be accepted. Researchers have been working on identifying factors for explaining and predicting user acceptance of an ISM. Some studies, however, revealed inconsistent findings on the antecedents of user acceptance of a website. Lack of consideration for individual differences in user ability is believed to be one of the key reasons for the mixed findings. The elaboration likelihood model (ELM) and several studies have suggested that individual differences in ability plays an moderating role on the relationship between the antecedents and user acceptance. Despite the critical role of user ability, little research has examined the role of user ability in the Internet shopping mall context. The purpose of this study is to develop a user acceptance model that consider the moderating role of user ability in the context of Internet shopping. This study was initiated to see the ability of the technology acceptance model(TAM) to explain the acceptance of a specific ISM. According to TAM. which is one of the most influential models for explaining user acceptance of IT, an intention to use IT is determined by usefulness and ease of use. Given that interaction between user and website takes place through web interface, the decisions to accept and continue using an ISM depend on these beliefs. However, TAM neglects to consider the fact that many users would not stick to an ISM until they trust it although they may think it useful and easy to use. The importance of trust for user acceptance of ISM has been raised by the relational views. The relational view emphasizes the trust-building process between the user and ISM, and user's trust on the website is a major determinant of user acceptance. The proposed model extends and integrates the TAM and relational views on user acceptance of ISM by incorporating usefulness, ease of use, and trust. User acceptance is defined as a user's intention to reuse a specific ISM. And user ability is introduced into the model as moderating variable. Here, the user ability is defined as a degree of experiences, knowledge and skills regarding Internet shopping sites. The research model proposes that the ease of use, usefulness and trust of ISM are key determinants of user acceptance. In addition, this paper hypothesizes that the effects of the antecedents(i.e., ease of use, usefulness, and trust) on user acceptance may differ among users. In particular, this paper proposes a moderating effect of a user's ability on the relationship between antecedents with user's intention to reuse. The research model with eleven hypotheses was derived and tested through a survey that involved 470 university students. For each research variable, this paper used measurement items recognized for reliability and widely used in previous research. We slightly modified some items proper to the research context. The reliability and validity of the research variables were tested using the Crobnach's alpha and internal consistency reliability (ICR) values, standard factor loadings of the confirmative factor analysis, and average variance extracted (AVE) values. A LISREL method was used to test the suitability of the research model and its relating six hypotheses. Key findings of the results are summarized in the following. First, TAM's two constructs, ease of use and usefulness directly affect user acceptance. In addition, ease of use indirectly influences user acceptance by affecting trust. This implies that users tend to trust a shopping site and visit repeatedly when they perceive a specific ISM easy to use. Accordingly, designing a shopping site that allows users to navigate with heuristic and minimal clicks for finding information and products within the site is important for improving the site's trust and acceptance. Usefulness, however, was not found to influence trust. Second, among the three belief constructs(ease of use, usefulness, and trust), trust was empirically supported as the most important determinants of user acceptance. This implies that users require trustworthiness from an Internet shopping site to be repeat visitors of an ISM. Providing a sense of safety and eliminating the anxiety of online shoppers in relation to privacy, security, delivery, and product returns are critically important conditions for acquiring repeat visitors. Hence, in addition to usefulness and ease of use as in TAM, trust should be a fundamental determinants of user acceptance in the context of internet shopping. Third, the user's ability on using an Internet shopping site played a moderating role. For users with low ability, ease of use was found to be a more important factors in deciding to reuse the shopping mall, whereas usefulness and trust had more effects on users with high ability. Applying the EML theory to these findings, we can suggest that experienced and knowledgeable ISM users tend to elaborate on such usefulness aspects as efficient and effective shopping performance and trust factors as ability, benevolence, integrity, and predictability of a shopping site before they become repeat visitors of the site. In contrast, novice users tend to rely on the low elaborating features, such as the perceived ease of use. The existence of moderating effects suggests the fact that different individuals evaluate an ISM from different perspectives. The expert users are more interested in the outcome of the visit(usefulness) and trustworthiness(trust) than those novice visitors. The latter evaluate the ISM in a more superficial manner focusing on the novelty of the site and on other instrumental beliefs(ease of use). This is consistent with the insights proposed by the Heuristic-Systematic model. According to the Heuristic-Systematic model. a users act on the principle of minimum effort. Thus, the user considers an ISM heuristically, focusing on those aspects that are easy to process and evaluate(ease of use). When the user has sufficient experience and skills, the user will change to systematic processing, where they will evaluate more complex aspects of the site(its usefulness and trustworthiness). This implies that an ISM has to provide a minimum level of ease of use to make it possible for a user to evaluate its usefulness and trustworthiness. Ease of use is a necessary but not sufficient condition for the acceptance and use of an ISM. Overall, the empirical results generally support the proposed model and identify the moderating effect of the effects of user ability. More detailed interpretations and implications of the findings are discussed. The limitations of this study are also discussed to provide directions for future research.

A Study on the Improvement Plans of Police Fire Investigation (경찰화재조사의 개선방안에 관한 연구)

  • SeoMoon, Su-Cheol
    • Journal of Korean Institute of Fire Investigation
    • /
    • v.9 no.1
    • /
    • pp.103-121
    • /
    • 2006
  • We are living in more comfortable circumstances with the social developments and the improvement of the standard of living, but, on the other hand, we are exposed to an increase of the occurrences of tires on account of large-sized, higher stories, deeper underground building and the use of various energy resources. The materials of the floor in a residence modern society have been going through various alterations in accordance with the uses of a residence and are now used as final goods in interioring the bottom of apartments, houses and shops. There are so many kinds of materials you usually come in contact with, but in the first place, we need to make an experiment on the spread of the fire with the hypocaust used as the floors of apartments, etc. and the floor covers you usually can get easily. We, scientific investigators, can get in contact with the accidents caused by incendiarism or an accidental fire closely connected with petroleum stuffs on the floor materials that give rise to lots of problems. on this account, I'd like to propose that we conduct an experiment on fire shapes by each petroleum stuff and that discriminate an accidental tire from incendiarism. In an investigation, it seems that finding a live coal could be an essential part of clearing up the cause of a tire but it could not be the cause of a fire itself. And besides, all sorts of tire cases or fire accidents have some kind of legislation and standard to minimize and at an early stage cope with the damage by tires. That is to say, we are supposed to install each kind of electric apparatus, automatic alarm equipment, automatic fire extinguisher in order to protect ourselves from the danger of fires and check them at any time and also escape urgently in case of fire-outbreaking or build a tire-proof construction to prevent flames from proliferating to the neighboring areas. Namely, you should take several factors into consideration to investigate a cause of a case or an accident related to fire. That means it's not in reason for one investigator or one investigative team to make clear of the starting part and the cause of a tire. accordingly, in this thesis, explanations would be given set limits to the judgement and verification on the cause of a fire and the concrete tire-spreading part through investigation on the very spot that a fire broke out. The fire-discernment would also be focused on the early stage fire-spreading part fire-outbreaking resources, and I think the realities of police tire investigations and the problems are still a matter of debate. The cause of a fire must be examined into by logical judgement on the basis of abundant scientific knowledge and experience covering the whole of fire phenomena. The judgement of the cause should be made with fire-spreading situation at the spot as the central figure and in case of verifying, you are supposed to prove by the situational proof from the traces of the tire-spreading to the fire-outbreaking sources. The causal relation on a fire-outbreak should not be proved by arbitrary opinion far from concrete facts, and also there is much chance of making mistakes if you draw deduction from a coincidence. It is absolutely necessary you observe in an objective attitude and grasp the situation of a tire in the investigation of the cause. Having a look at the spot with a prejudice is not allowed. The source of tire-outbreak itself is likely to be considered as the cause of a tire and that makes us doubt about the results according to interests of the independent investigators. So to speak, they set about investigations, the police investigation in the hope of it not being incendiarism, the fire department in the hope of it not being problems in installments or equipments, insurance companies in the hope of it being any incendiarism, electric fields in the hope of it not being electric defects, the gas-related in the hope of it not being gas problems. You could not look forward to more fair investigation and break off their misgivings. It is because the firing source itself is known as the cause of a fire and civil or criminal responsibilities are respected to the firing source itself. On this occasion, investigating the cause of a fire should be conducted with research, investigation, emotion independent, and finally you should clear up the cause with the results put together.

  • PDF

An Ontology Model for Public Service Export Platform (공공 서비스 수출 플랫폼을 위한 온톨로지 모형)

  • Lee, Gang-Won;Park, Sei-Kwon;Ryu, Seung-Wan;Shin, Dong-Cheon
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.1
    • /
    • pp.149-161
    • /
    • 2014
  • The export of domestic public services to overseas markets contains many potential obstacles, stemming from different export procedures, the target services, and socio-economic environments. In order to alleviate these problems, the business incubation platform as an open business ecosystem can be a powerful instrument to support the decisions taken by participants and stakeholders. In this paper, we propose an ontology model and its implementation processes for the business incubation platform with an open and pervasive architecture to support public service exports. For the conceptual model of platform ontology, export case studies are used for requirements analysis. The conceptual model shows the basic structure, with vocabulary and its meaning, the relationship between ontologies, and key attributes. For the implementation and test of the ontology model, the logical structure is edited using Prot$\acute{e}$g$\acute{e}$ editor. The core engine of the business incubation platform is the simulator module, where the various contexts of export businesses should be captured, defined, and shared with other modules through ontologies. It is well-known that an ontology, with which concepts and their relationships are represented using a shared vocabulary, is an efficient and effective tool for organizing meta-information to develop structural frameworks in a particular domain. The proposed model consists of five ontologies derived from a requirements survey of major stakeholders and their operational scenarios: service, requirements, environment, enterprise, and county. The service ontology contains several components that can find and categorize public services through a case analysis of the public service export. Key attributes of the service ontology are composed of categories including objective, requirements, activity, and service. The objective category, which has sub-attributes including operational body (organization) and user, acts as a reference to search and classify public services. The requirements category relates to the functional needs at a particular phase of system (service) design or operation. Sub-attributes of requirements are user, application, platform, architecture, and social overhead. The activity category represents business processes during the operation and maintenance phase. The activity category also has sub-attributes including facility, software, and project unit. The service category, with sub-attributes such as target, time, and place, acts as a reference to sort and classify the public services. The requirements ontology is derived from the basic and common components of public services and target countries. The key attributes of the requirements ontology are business, technology, and constraints. Business requirements represent the needs of processes and activities for public service export; technology represents the technological requirements for the operation of public services; and constraints represent the business law, regulations, or cultural characteristics of the target country. The environment ontology is derived from case studies of target countries for public service operation. Key attributes of the environment ontology are user, requirements, and activity. A user includes stakeholders in public services, from citizens to operators and managers; the requirements attribute represents the managerial and physical needs during operation; the activity attribute represents business processes in detail. The enterprise ontology is introduced from a previous study, and its attributes are activity, organization, strategy, marketing, and time. The country ontology is derived from the demographic and geopolitical analysis of the target country, and its key attributes are economy, social infrastructure, law, regulation, customs, population, location, and development strategies. The priority list for target services for a certain country and/or the priority list for target countries for a certain public services are generated by a matching algorithm. These lists are used as input seeds to simulate the consortium partners, and government's policies and programs. In the simulation, the environmental differences between Korea and the target country can be customized through a gap analysis and work-flow optimization process. When the process gap between Korea and the target country is too large for a single corporation to cover, a consortium is considered an alternative choice, and various alternatives are derived from the capability index of enterprises. For financial packages, a mix of various foreign aid funds can be simulated during this stage. It is expected that the proposed ontology model and the business incubation platform can be used by various participants in the public service export market. It could be especially beneficial to small and medium businesses that have relatively fewer resources and experience with public service export. We also expect that the open and pervasive service architecture in a digital business ecosystem will help stakeholders find new opportunities through information sharing and collaboration on business processes.