• Title/Summary/Keyword: Target Data

Search Result 5,794, Processing Time 0.049 seconds

The Impact of Perceived Risks Upon Consumer Trust and Purchase Intentions (인지된 위험의 유형이 소비자 신뢰 및 온라인 구매의도에 미치는 영향)

  • Hong, Il-Yoo B.;Kim, Woo-Sung;Lim, Byung-Ha
    • Asia pacific journal of information systems
    • /
    • v.21 no.4
    • /
    • pp.1-25
    • /
    • 2011
  • Internet-based commerce has undergone an explosive growth over the past decade as consumers today find it more economical as well as more convenient to shop online. Nevertheless, the shift in the common mode of shopping from offline to online commerce has caused consumers to have worries over such issues as private information leakage, online fraud, discrepancy in product quality and grade, unsuccessful delivery, and so forth, Numerous studies have been undertaken to examine the role of perceived risk as a chief barrier to online purchases and to understand the theoretical relationships among perceived risk, trust and purchase intentions, However, most studies focus on empirically investigating the effects of trust on perceived risk, with little attention devoted to the effects of perceived risk on trust, While the influence trust has on perceived risk is worth studying, the influence in the opposite direction is equally important, enabling insights into the potential of perceived risk as a prohibitor of trust, According to Pavlou (2003), the primary source of the perceived risk is either the technological uncertainty of the Internet environment or the behavioral uncertainty of the transaction partner. Due to such types of uncertainty, an increase in the worries over the perceived risk may negatively affect trust, For example, if a consumer who sends sensitive transaction data over Internet is concerned that his or her private information may leak out because of the lack of security, trust may decrease (Olivero and Lunt, 2004), By the same token, if the consumer feels that the online merchant has the potential to profit by behaving in an opportunistic manner taking advantage of the remote, impersonal nature of online commerce, then it is unlikely that the merchant will be trusted, That is, the more the probable danger is likely to occur, the less trust and the greater need to control the transaction (Olivero and Lunt, 2004), In summary, a review of the related studies indicates that while some researchers looked at the influence of overall perceived risk on trust level, not much attention has been given to the effects of different types of perceived risk, In this context the present research aims at addressing the need to study how trust is affected by different types of perceived risk, We classified perceived risk into six different types based on the literature, and empirically analyzed the impact of each type of perceived risk upon consumer trust in an online merchant and further its impact upon purchase intentions. To meet our research objectives, we developed a conceptual model depicting the nomological structure of the relationships among our research variables, and also formulated a total of seven hypotheses. The model and hypotheses were tested using an empirical analysis based on a questionnaire survey of 206 college students. The reliability was evaluated via Cronbach's alphas, the minimum of which was found to be 0.73, and therefore the questionnaire items are all deemed reliable. In addition, the results of confirmatory factor analysis (CFA) designed to check the validity of the measurement model indicate that the convergent, discriminate, and nomological validities of the model are all acceptable. The structural equation modeling analysis to test the hypotheses yielded the following results. Of the first six hypotheses (H1-1 through H1-6) designed to examine the relationships between each risk type and trust, three hypotheses including H1-1 (performance risk ${\rightarrow}$ trust), H1-2 (psychological risk ${\rightarrow}$ trust) and H1-5 (online payment risk ${\rightarrow}$ trust) were supported with path coefficients of -0.30, -0.27 and -0.16 respectively. Finally, H2 (trust ${\rightarrow}$ purchase intentions) was supported with relatively high path coefficients of 0.73. Results of the empirical study offer the following findings and implications. First. it was found that it was performance risk, psychological risk and online payment risk that have a statistically significant influence upon consumer trust in an online merchant. It implies that a consumer may find an online merchant untrustworthy if either the product quality or the product grade does not match his or her expectations. For that reason, online merchants including digital storefronts and e-marketplaces are suggested to pursue a strategy focusing on identifying the target customers and offering products that they feel best meet performance and psychological needs of those customers. Thus, they should do their best to make it widely known that their products are of as good quality and grade as those purchased from offline department stores. In addition, it may be inferred that today's online consumers remain concerned about the security of the online commerce environment due to the repeated occurrences of hacking or private information leakage. Online merchants should take steps to remove potential vulnerabilities and provide online notices to emphasize that their website is secure. Second, consumer's overall trust was found to have a statistically significant influence on purchase intentions. This finding, which is consistent with the results of numerous prior studies, suggests that increased sales will become a reality only with enhanced consumer trust.

Tissue Distribution of HuR Protein in Crohn's Disease and IBD Experimental Model (염증성 장질환 모델 및 크론병 환자에서의 점막상피 HuR 단백질의 변화 분석)

  • Choi, Hye Jin;Park, Jae-Hong;Park, Jiyeon;Kim, Juil;Park, Seong-Hwan;Oh, Chang Gyu;Do, Kee Hun;Song, Bo Gyoung;Lee, Seung Joon;Moon, Yuseok
    • Journal of Life Science
    • /
    • v.24 no.12
    • /
    • pp.1339-1344
    • /
    • 2014
  • Inflammatory bowel disease is an immune disorder associated with chronic mucosal inflammation and severe ulceration in the gastrointestinal tract. Antibodies against proinflammatory cytokines, including TNF${\alpha}$, are currently used as promising therapeutic agents against the disease. Stabilization of the transcript is a crucial post-transcriptional process in the expression of proinflammatory cytokines. In the present study, we assessed the expression and histological distribution of the HuR protein, an important transcript stabilizer, in tissues from experimental animals and patients with Crohn's disease. The total and cytosolic levels of the HuR protein were enhanced in the intestinal epithelia from dextran sodium sulfate (DSS)-treated mice compared to those in control tissues from normal mice. Moreover, the expression of HuR was very high only in the mucosal and glandular epithelium, and the relative localization of the protein was sequestered in the lower parts of the villus during the DSS insult. The expression of HuR was significantly higher in mucosal lesions than in normal-looking areas. Consistent with the data from the animal model, the expression of HuR was confined to the mucosal and glandular epithelium. These results suggest that HuR may contribute to the post-transcriptional regulation of proinflammatory genes during early mucosal insults. More mechanistic investigations are warranted to determine the potential use of HuR as a predictive biomarker or a promising target against IBD.

A Study on the Realities of Custom-made Clothing Production in Middle-aged Women's Clothing Firms (중년여성복업체(中年女性服業體)의 맞춤복(服) 생산실태(生産實態) 연구(硏究))

  • Park, Yu-Jeong;Sohn, Hee-Soon
    • Journal of Fashion Business
    • /
    • v.6 no.2
    • /
    • pp.1-16
    • /
    • 2002
  • The need for ready-to-wear clothing increases as the problem comes to arise from the fit of custommade clothing due to the characteristics of middle-aged women's somatotype. At this point of time, a study on the realities of production of custom-made clothing in middle-aged women's clothing business firms is of very greatly significance. Therefore, this study was intended to identify the problem and improvements through the survey research of production of custom-made clothing in middle-aged women's clothing business firms and further present the plan for development of custom-made clothing business. The questionnaire was framed based on the contents extracted from the preliminary questionnaire research for the pattern section chief of each business firm. Collected data were statistically processed using the SPSS 10.0 Windows program. As a result, the following findings were obtained: 1. The target age of the middle-aged women's clothing business firms ranged from more than 45 years to less than 50 years of age. Clothing business firms much made inroads into the ready-to-wear clothing market largely in the 1980s and the 1990s. Their active entry into the custom-made clothing market occurred in the 1970s and the 1980s. 2. In terms of the clothing production method of middle-aged women's clothing firms, some private boutique and designer brand clothing firms entered the clothing market with a focus on custom-made clothing in the beginning of its organization and introduced the production method of ready-to-wear clothing in accordance with changes in production methods and consumers' needs and wants. National brand clothing firms manufactured clothing with a focus on ready-to-wear clothing from the beginning of its organization, but at last they manufactured both partial custom-made and whole custom-made as the problem arose from ready-to-wear clothing. Seeing that their clothing production showed the ratio readyto-wear to custom-made clothing of 2.58:1. And it was found that the manufacture of ready-to-wear and custom-made clothing took into consideration the great difference in the pattern, size and design plan. The research of the clothing production process showed that whole custom-made and partial custommade were distinguished according to whether or not the sample was presented. 3. The ready-to-wear pattern of middle-aged women's clothing firms were used with a focus on the 'patternmaker-developed pattern' and company-developed pattern'. Most clothing businesses produced clothing in 4 to 5 basic sizes, which is found to be insufficient to complement the physical characteristics of middle-aged women with many specific somatotypes. In the pattern of custom-made clothing, the 'pattern of ready-to-wear were applied' or the 'customized pattern was developed'. Actual measurements were most used as the size of custom-made, and accordingly it is predicted that the level of satisfaction is higher with the fit of custom-made clothing than that of ready-to-wear. The selling place and the head office showed the similar percent as the place for measuring the size of custom-made clothing. Size measurers were mostly the shop master. And it was found that most clothing business firms had a problem when the measured size was applied to the pattern. Accordingly, it is necessary to provide education on size measurement for shop masters. 4. It was found that in the middle-aged women's clothing firms, the pattern correction of the length of sleeve, jacket and slacks occupied the highest percent. Accordingly, it is necessary to provide for the size system to complement the accurate somatotype characteristics of middle-aged women. 5. In custom-made clothing customer management, most firms engaged in customer somatotype management through size management. They provided customers with commodity information by informing them of the sales and event period and practiced human management for customers by maintaining the get-together and friendly relationship. 6. Middle-aged women's clothing businesses responded that it would be necessary to improve the fit of custom-made clothing and complement their pursuit for individuality as the plan to improve its quality. In consequence, it suggests that middle-aged women's clothing businesses should provide middle-aged women with the clothing of better-suited size and refined design. Middle-aged women's clothing businesses responded that it was the most urgent task to form the custom-made clothing manufacturing team as the plan to expand the custom-made clothing market, which is identified as their emphasis on the systematized production of custom-made clothing.

Professionalism raising of the escort which leads an instance analysis (사례분석을 통한 경호 전문성 제고)

  • Yu, Hyung-Chang
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.73-99
    • /
    • 2009
  • There are three assassination and treatening cases in this thesis introduced as analysis data. They are shooting accidents of the U.S.A's President Reagun (1981,3.30), and the President Park Jeong Hee of South Korea(1974.8.15), assassination of the Prime Minister Lavin of Israel (1995.11.4) In March 30, 1981, there was an accident where criminal, Hinckley, fired ball cartridges right before the President Reagan got into the car to move to White House after completing the announcement of Hilton Hotel of Washington. As a result, the chest of president was shot and public information secretary and safeguard were wounded. In August, 15, pm 10:23, where the 29th 8.15 independent anniversay event was being celebrated by the people at the National theater in Jangchungdong, Seoul, the criminal Moon Sekwang fired ball cartridges, he failed to assassinate the President Park Jeong Hee of Korea, but shot the First lady Yuk Young Soo. She was wounded right part of head and died. In November 4, Saturday, pm 22:00 the Prime Minster Lavin had finished the supporting event of Middle Asia's Peace project and was taking on the car when he was killed by the criminal Amir's shooting, The accidents left very important lesson from the aspect of security analysis and it has been frequently used as a material for the education and training of safeguard organization. In Korea, as well as Presidential Security Service, national security departments have selected it as an important model for the subjects such as 'Security Analysis, 'Security Practice' and 'Security Methodology'. In the performance of security duty, security skill is the most important matter. Moreover, it has a close relationship with politics, society and culture. The purpose of this study is to analyze and reevaluate the case, which has been treated as a usual model from the aspect of security analysis, beyond its introduction. Attempted assassination of President Reagan was evaluated as a positive success example because of its rapid response of adjacent guards to evacuate Reagan, who is a guard target, within 10 seconds after the shot. When comparing it to President Kennedy Assassination of 1963, it was evaluated that guards were significantly specialized. In the study, however, it was possible to found many problems such as carelessness of guard, who is in charge of external area of event place, idle attitude for frequently used event place, confusion of wireless communication, risk of wireless security disclose, insufficient provision of compulsory record file, insufficient profiling of dangerous person and unsecured hospital and first-aid room.

  • PDF

A Patterns of Care Study of the Various Radiation Therapies for Prostate Cancer among Korean Radiation Oncologists in 2006 (Patterns of Care Study를 위한 2006년 한국 방사선종양학과 전문의들의 전립선암 방사선치료원칙 조사연구)

  • Kim, Jin-Hee;Kim, Jae-Sung;Ha, Sung-Whan;Shin, Seong-Soo;Park, Won;Cho, Jae-Ho;Suh, Chang-Ok;Oh, Young-Taek;Shin, Sei-Won;Kim, Jae-Chul;Jang, Ji-Young;Nam, Taek-Keun;Choi, Young-Min;Kim, Il-Han
    • Radiation Oncology Journal
    • /
    • v.26 no.2
    • /
    • pp.96-103
    • /
    • 2008
  • Purpose: To conduct a nationwide academic hospital patterns of the practice status and principles of radiotherapy for prostate cancer. The survey will help develop the framework of a database of Korean in Patterns of Case Study. Materials and Methods: A questionnaire about radiation treatment status and principles was sent to radiation oncologists in charge of prostate cancer treatment at thirteen academic hospitals in Korea. The data was analyzed to find treatment principles among the radiation oncologists when treating prostate cancer. Results: The number of patients with prostate cancer and treated with radiation ranged from 60 to 150 per academic hospital in Seoul City and 10 to 15 outside of Seoul City in 2006. The primary diagnostic methods of prostate cancer included the ultrasound guided biopsy on 6 to 12 prostate sites(mean=9), followed by magnetic resonance imaging and a whole body bone scan. Internal and external immobilizations were used in 61.5% and 76.9%, respectively, with diverse radiation targets. Whole pelvis radiation therapy(dose ranging from 45.0 to 50.4 Gy) was performed in 76.9%, followed by the irradiation of seminal vesicles($54.0{\sim}73.8$ Gy) in 92.3%. The definitive radiotherapy doses were increased as a function of risk group, but the range of radiation doses was wide(60.0 to 78.5 Gy). Intensity modulated radiation therapy using doses greater than 70 Gy, were performed in 53.8% of academic hospitals. In addition, the simultaneous intra-factional boost(SIB) technique was used in three hospitals; however, the target volume and radiation dose were diverse. Radiation therapy to biochemical recurrence after a radical prostatectomy was performed in 84.6%; however, the radiation dose was variable and the radiation field ranged from whole pelvis to prostate bed. Conclusion: The results of this study suggest that a nationwide Korean Patterns of Care Study is necessary for the recommendation of radiation therapy guidelines of prostate cancer.

Impact Evaluation of Water Footprint on Stages of Drainage Works (배수공 각 작업 단계별 물발자국 영향평가)

  • Chen, Di;Kim, Joon-Soo;Batagalle, Vinuri;Kim, Byung-Soo
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.40 no.2
    • /
    • pp.225-231
    • /
    • 2020
  • Fresh water that can be used by a person of the total amount of water on the planet is increased because it is less than 0.01 % except underground water, ice and snow, etc. water management response need. In order to protect and efficiently utilize water resources, major countries are conducting water footprint studies that can quantitatively estimate the amount of water put into the operating phase of the resource harvesting phase, mainly agriculture. Korea has also recently developed a number of policies in order to cope with water shortages, and in the construction industry, as well as the need for basic research to support it has been emphasized. This study was constructed DB up to the raw material harvesting step, the transport step, the production stage in order to estimate the water consumption of resources to be put into the work process to target the drainage of the road. Water usage estimation method was utilized the method presented in the Water Footprint Manual and the environmental score card certification guide, unit water usage each drainage main method was calculated after estimating the water footprint considering the water character factor, indirect water and the direct water, the water consumption factor of material input to each process. Brown asphalt, rebar, remicon of the drainage material as a result of the water footprint calculation accounted for 97 % of the total. Drainage method is a culvert, a side channel, a culvert wing wall, reinforced concrete open channel accounted for 92.2 % of the total. Drainage total step-by-step calculated water consumption and water footprint was found in order of raw material harvesting step, transport stage, production stage. Water footprint each drainage method or total drainage material calculated in this study can be used as a base data in the agricultural and construction sectors. In order to increase the reliability of the analysis, it is believed that further overseas databases will be needed for continuous review and research.

Development of Dust Recycling System and Dust Cleaner in Pipe during Vitrification of Simulated Non-Radioactive Waste (모의 비방사성폐기물의 유리화시 발생 분진의 재순환처리장치 및 배관 내 침적분진에 의한 막힘 방지용 제진장치의 개발)

  • Choi Jong-Seo;You Young-Hwan;Park Seung-Chul;Choi Seok-Mo;Hwang Tae-Won;Shin Sang-Woon
    • Proceedings of the Korean Radioactive Waste Society Conference
    • /
    • 2005.06a
    • /
    • pp.110-120
    • /
    • 2005
  • For utilizing vitrification to treat low and intermediate level waste, industrial pilot plant was designed and constructed in October 1999 at Daejon, Korea through the joint research program among NETEC, MOBIS and SGN. More than 70 tests were performed on simulated IER, DAW etc. including key nuclide surrogate(Cs, Co); this plant has been shown to vitrify the target waste effectively and safely, however, some dust are generated from the HTF(High Temperature Filter) as a secondary waste. In case of long term operation, it is also concerned that pipe plugging can be occurred due to deposited dust in cooling pipe namely, connecting pipe between CCM(Cold Crucible Melter) and HTF. In this regard, we have developed the special complementary system of the off-gas treatment system to recycle the dust from HTF to CCM and to remove the interior dust of cooling pipe. Main concept of the dust recycling is to feed the dust to the CCM as a slurry state; this system is regarded as of an important position in the viewpoint of volume reduction, waste disposal cost and glass melt control in CCM. The role of DRS(Dust Recycling System) is to recycle the major glass components and key nuclides; this system is served to lower glass viscosity and increase waste solubility by recycling B, Na, Li components into glass melt and also to re-entrain and incorporate into glass melt like Cs, Co. Therefore dust recycling is helpful to control the molten glass; it is unnecessary to consider a separate dust treatment system like a cementation equipment. The effects of Dust Cleaner are to prevent the pipe plugging due to dust and to treat the deposited dust by raking the dust into CCM. During the pilot vitrification test, overall performance assessment was successfully performed; DRS and Dust Cleaner are found to be useful and effective for recycling the dust from HTF and also removing the dust in cooling pipe. The obtained operational data and operational experiences will be used as a basis of the commercial facility.

  • PDF

Active Aging: Roles of Physical Activity and Immunity (건강한 노후 : 운동활동과 면역반응을 중심으로)

  • Park, Chan Ho;Kim, Ji-Seok;Kwak, Yi Sub
    • Journal of Life Science
    • /
    • v.28 no.5
    • /
    • pp.621-626
    • /
    • 2018
  • We introduced the physiological responses of aging, active aging and also suggest the impact of physical exercise on body health status and elderly immunity. In this purpose, we searched the Pub Med data base for the articles (include our experimental papers) and review papers having the terms 'Aging', 'Active aging' and 'Physical activity and elderly' in the title, published from 1999 until 2018. The results were as follows: Exercise training has been extensively studied about the reduction of inflammation, oxidative stress, disease, and aging in syndrome X patients and elderly. Combined and aerobic or resistance exercise training could reduce obesity, insulin resistance, type 2 diabetes and hypertension. Exercise training has been extensively studied in cancer settings as part of prevention or treatment strategies. From this research, regular exercise has the potential to target tumor growth through regulation of inflammation and immune responses such as lactate clearance, NK cell activation (innate immunity), activation of cytotoxic immune cells, T cell activation (adaptive immunity), and immune surveillance. However, Endurance physical activity not only induces thermogenesis and diverse sports injuries but also elicits mobilization and functional enhancement of monocytes, neutrophils (which is caused by the cytokine changes such as TNF-alpha, IL-1) whereas it suppresses cell mediated immunity causing to increased susceptibility to inflammation and infections like cough and URTIs (upper respiratory track infections) in young and especially in elderly people. Therefore, Strategies to prevent physical fatigue, sports injuries include avoid overtraining, Adequate recovery and various type of rest during and after physical activity and assuring adequate nutrition supplementation such as glutamine, vitamin B, vitamin C, carbohydrate, ion or berry-contain sports beverages is helpful in physically active elderly.

Toward a Social Sciences Methodology for Electronic Survey Research on the Internet or Personal Computer check (사회과학 연구에 있어 인터넷 및 상업용 통신망을 이용한 전자설문 조사방법의 활용)

  • Hong Yong-Gee;Lee Hong-Gee;Chae Su-Kyung
    • Management & Information Systems Review
    • /
    • v.3
    • /
    • pp.287-316
    • /
    • 1999
  • Cyberspace permits us to more beyond traditional face-to-face, mail and telephone surveys, yet still to examine basic issues regarding the quality of data collection: sampling, questionnaire design, survey distribution, means of response, and database creation. This article address each of these issues by contrasting and comparing traditional survey methods(Paper-and-Pencil) with Internet or Personal Computer networks-mediated (Screen-and-Keyboard) survey methods also introduces researchers to this revolutionary and innovative tool and outlines a variety of practical methods for using the Internet or Personal Computer Networks. The revolution in telecommunications technology has fostered the rapid growth of the Internet all over the world. The Internet is a massive global network and comprising many national and international networks of interconnected computers. The Internet or Personal Computer Networks could be the comprehensive interactive tool that will facilitate the development of the skills. The Internet or Personal Computer Networks provides a virtual frontier to expand our access to information and to increase our knowledge and understanding of public opinion, political behavior, social trends and lifestyles through survey research. Comparable to other technological advancements, the Internet or Personal Computer Networks presents opportunities that will impact significantly on the process and quality of survey research now and in the twenty-first century. There are trade-offs between traditional and the Internet or Personal Computer Networks survey. The Internet or Personal Computer Networks is an important channel for obtaining information for target participants. The cost savings in time, efforts, and material were substantial. The use of the Internet or Personal Computer Networks survey tool will increase the quality of research environment. There are several limitations to the Internet or Personal Computer Network survey approach. It requires the researcher to be familiar with Internet navigation and E-mail, it is essential for this process. The use of Listserv and Newsgroup result in a biased sample of the population of corporate trainers. However, it is this group that participates in technology and is in the fore front of shaping the new organizations of interest, and therefore it consists of appropriate participants. If this survey method becomes popular and is too frequently used, potential respondents may become as annoyed with E-mail as the sometimes are with mail survey and junk mail. Being a member of the Listserv of Newsgroup may moderate that reaction. There is a need to determine efficient, effective ways for the researcher to strip identifiers from E-mail, so that respondents remain anonymous, while simultaneously blocking a respondent from responding to a particular survey instrument more than once. The optimum process would be on that is initiated by the researcher : simple, fast and inexpensive to administer and has credibility with respondents. This would protect the legitimacy of the sample and anonymity. Creating attractive Internet or Personal Computer Networks survey formats that build on the strengths of standardized structures but also capitalize on the dynamic and interactive capability of the medium. Without such innovations in survey design, it is difficult to imagine why potential survey respondents would use their time to answer questions. More must be done to create diverse and exciting ways of building an credibility between respondents and researchers on the Internet or Personal Computer Networks. We believe that the future of much exciting research is based in the Electronic survey research. The ability to communicate across distance, time, and national boundaries offers great possibilities for studying the ways in which technology and technological discourse are shaped. used, and disseminated ; the many recent doctoral dissertations that treat some aspect of electronic survey research testify to the increase focus on the Internet or Personal Computer Networks. Thus, scholars should begin a serious conversation about the methodological issues of conducting research In cyberspace. Of all the disciplines, Internet or Personal Computer Networks, emphasis on the relationship between technology and human communication, should take the lead in considering research in the cyberspace.

  • PDF

A Study on Intuitive IoT Interface System using 3D Depth Camera (3D 깊이 카메라를 활용한 직관적인 사물인터넷 인터페이스 시스템에 관한 연구)

  • Park, Jongsub;Hong, June Seok;Kim, Wooju
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.2
    • /
    • pp.137-152
    • /
    • 2017
  • The decline in the price of IT devices and the development of the Internet have created a new field called Internet of Things (IoT). IoT, which creates new services by connecting all the objects that are in everyday life to the Internet, is pioneering new forms of business that have not been seen before in combination with Big Data. The prospect of IoT can be said to be unlimited in its utilization. In addition, studies of standardization organizations for smooth connection of these IoT devices are also active. However, there is a part of this study that we overlook. In order to control IoT equipment or acquire information, it is necessary to separately develop interworking issues (IP address, Wi-Fi, Bluetooth, NFC, etc.) and related application software or apps. In order to solve these problems, existing research methods have been conducted on augmented reality using GPS or markers. However, there is a disadvantage in that a separate marker is required and the marker is recognized only in the vicinity. In addition, in the case of a study using a GPS address using a 2D-based camera, it was difficult to implement an active interface because the distance to the target device could not be recognized. In this study, we use 3D Depth recognition camera to be installed on smartphone and calculate the space coordinates automatically by linking the distance measurement and the sensor information of the mobile phone without a separate marker. Coordination inquiry finds equipment of IoT and enables information acquisition and control of corresponding IoT equipment. Therefore, from the user's point of view, it is possible to reduce the burden on the problem of interworking of the IoT equipment and the installation of the app. Furthermore, if this technology is used in the field of public services and smart glasses, it will reduce duplication of investment in software development and increase in public services.