• Title/Summary/Keyword: Universal Network

Search Result 349, Processing Time 0.029 seconds

A Critical Perspective on the Integration of Service Delivery Systems in Child-Youth Policy (아동청소년정책 전달체계의 통합방안에 대한 비판적 고찰)

  • Chung, Ick-joong
    • Korean Journal of Social Welfare Studies
    • /
    • v.40 no.1
    • /
    • pp.297-322
    • /
    • 2009
  • Child policy has focused on needy children with special emphasis on residual services but youth policy has implemented to promote capabilities of general adolescents by various activities. The fragmented implementation of child-youth policy by several ministries resulted in possible redundancy of target groups and insufficient service delivery system. Thus, the Ministry of Health, Welfare, and Family Affairs has pushed forward to integrate service delivery systems in child-youth policy after the former Ministry of Health and Welfare and the Government Youth Commission were integrated as part of a government reorganization plan. The purpose of this study is to review limitations of Lee Myung-bak government's plan to integrate child-youth policy and to make important suggestions for effective integration. Lee Myung-bak government's plan seeks to help children and adolescents prepare for the future and move forward with dreams and hope. However, this plan has fatal problems of overemphasizing the efficiency of finance without expansion of budget for children and adolescents. To achieve well-being tailored to one's life cycle, the full-scale expansion of budget is indispensible through the induction of the special fund or the special tax for children and adolescents. Fortunately, Lee Myung-bak government recognized child-youth policy as the social investment that would heighten national competitiveness in the long term, but there was insufficient child-youth policy infrastructure for new implementation. Therefore, Lee Myung-bak government needs a new design for integrated and universal child-youth policy that should take into account national human resource development plan and its economic development policy. The public responsibility for children and adolescents should be strengthened and, in addition, the network function in service delivery system should be complemented.

The Concept of Continuity in Confucianism through filial piety(孝) Ethics (효(孝) 윤리를 통해 본 유가(儒家)의 연속적 사유)

  • Lee, Cheon-Sung
    • The Journal of Korean Philosophical History
    • /
    • no.29
    • /
    • pp.179-202
    • /
    • 2010
  • In addition to the emphasis on filial piety ethics in everyday life, filial piety obtained a further significance in Confucianism which had the strong sense of ancestor worship. This paper focuses on filial piety as a mechanism of continuity within Confucianism and points out that it owed its development to its connection to agricultural culture. The sedentary life with less mobility forged a relative intimacy among people and filial piety was the actual expression of that kind of intimate affection. Yet, filial piety in Confucianism created a unique culture in terms that it not only stipulated material and emotional support for parents but also expected one's piety to the further ancestors through a memorial service and made its connection to the infinite posterity through sons. From the perspective of Confucianism that established filial piety at the turning point from life to death, the self existing in present was not an isolated self anymore. Yet, one can see another characteristic of Confucianism from that filial piety, based on blood bonds, could move beyond paternalism to broaden itself. It could be expanded to the care for strangers. The aged experience and wisdom through agricultural life begot the insight that the nature made its infinite connections with everything through circulation. As a stone thrown in a pond would enlarge its boundary by drawing larger and larger concentric circles, this thought enabled people to enlarge their affection to their parents to universal humanity. In this enlarged network, though it was natural to make distinctions between the closer and the farther, Confucianism sought to overcome it by establishing oneself upright. Confucianism emphasized the moral cultivation with its filial piety concept that contained the diachronic thought penetrating life and death and the broadened perspective relating everything around. In Confucianism, filial piety provided an important medium in forming a moral subject that penetrated life and death and related self and others. Inherent in it is the Confucius thought of continuity that searched for a paragon of a moral human being regardless of time and space.

Reflection on the Thinking System of Buddhist Philosophy and Daesoon Philosophy (불교철학과 대순사상의 사유체계에 대한 일고찰 - 우주관·인간관·이상사회관을 중심으로 -)

  • Lee, Duck-Jin
    • Journal of the Daesoon Academy of Sciences
    • /
    • v.20
    • /
    • pp.223-272
    • /
    • 2009
  • Both Daesoon philosophy and Buddhist philosophy have strong aspirations for establishing a world comprised of human-beings. In other words, Daesoon philosophy and Buddhist philosophy put human-beings in the place of 'subject character(主語的 人格)' instead of 'predicate character(述語的 人格).' This is because a human is the master rather than a guest of the universe and the world. In this regard, it is safe to say that both Daesoon philosophy and Buddhist philosophy have a common goal of reaching 'an infinitely open life managed by a human-being, the master.' Daesoon philosophy and Buddhist philosophy also share the idea that everything in the universe is an organistic world that is closely connected, like a network. In this aspect, the two philosophies consider the whole world rather than the individual, and seek ways for people to live together actively while expanding the scope of community to the world. Even if 'the morality of living together (相生)' and 'the realization of mercy(同體大悲)' are completely different languages on the surface, it is not difficult to understand the homogeneity inherent in such expressions. Daesoon philosophy and Buddhist philosophy show endless reliability towards all humans and are declarative and reasonable, but both herald human beings as eligible to become the main characters of the future world and lead to the birth of independent human beings while inducing them to the highest position in the universe by liberating humans from the limitations they find. 'Heaven on Earth' as stated in Daesoon philosophy refers to an ideal society where humans and God harmonize, and God and humans complement each other. Also, the world will achieve political stability and equality, realizing an economically prosperous world. Furthermore, social justice will be realized and cultural and religious conflicts resolved. As humans acknowledge there is a way to live together in a universal nature, the environmental issue no longer becomes the top priority for human beings and a world where the morals of human beings reach the highest level will be established. From the original Buddhist perspective, King Jeonrhyun, the proxy of Buddha, realizes the ideal of Buddhism in the mundane world. The world controlled by King Jeonrhyun can be described as having liberty, equality, peace, justice, prosperity, morality, order, legality, democracy, welfare, etc. Therefore, the ideal Buddhist world is materially prosperous, physically healthy and socially just, as well as a world where moral maturity and mental freedom are achieved.

  • PDF

A study on the Wonju Medical Equipment Industry Cluster (원주의료기기산업 클러스터의 형성과정에 관한 연구)

  • Lee, Woo-Chun;Yoon, Hyung-Ro
    • Journal of the Korean Academic Society of Industrial Cluster
    • /
    • v.1 no.1
    • /
    • pp.67-86
    • /
    • 2007
  • Wonju Medical Equipment Industry, despite of its short history, poor sales and weak manpower and so on, have shown remarkable outcomes in a relatively short period. At the end of 2007, totally 79 enterprises (only 4.6% of whole enterprises in Korea) made 10% of the nationwide production and 15% of the nationwide exports with an annual average growth rate of 66.7%, contributing domestic medical equipment industry tremendously. In addition, many leading medical equipment enterprises in various fields already moved or plan to move to Wonju, accelerating Wonju Medical Equipment Cluster. Wonju Medical Equipment Industry Cluster now enters into the growth stage, getting out of the initial business setup stage. Especially, the nomination of Wonju cluster project from the government accelerates networking (e.g. the development of the universal parts, the establishment of the mutual collaboration model among enterprises, and the mutual marketing), making a rapid growth in Wonju Medical Equipment Industry. Wonju Medical Equipment Industry Cluster revealed positive outcomes despite of the weakness in investment size and infra-structure comparing with the other medical industry cluster in the advanced country, while many domestic enterprises pursued their own growth models and thus failed to promote the international competitive power. Wonju Medical Equipment Industry has been developed rapidly. However, there are many challenging problems to support enterprises: small R&D investment and thus weak technology power, difficulties in recruiting R&D engineers, and poor marketing capabilities, financial infrastructure & policies, and network architecture. In order to develop a world-competitive medical equipment industry cluster at Wonju, the complement of infrastructures, the technology innovation, the mutual marketing, and the network expansion to support enterprises are further required. Wonju' s experiences in developing medical equipment industry so far suggest that our own flexible cluster model considering the industry structure and maturity for different regions should be developed, and specific action plans from the local and central governments based on their systematic strategies for industry development should be implemented in order to build world-competitive industry clusters in Korea.

  • PDF

A Study on the Critical Success Factors of Social Commerce through the Analysis of the Perception Gap between the Service Providers and the Users: Focused on Ticket Monster in Korea (서비스제공자와 사용자의 인식차이 분석을 통한 소셜커머스 핵심성공요인에 대한 연구: 한국의 티켓몬스터 중심으로)

  • Kim, Il Jung;Lee, Dae Chul;Lim, Gyoo Gun
    • Asia pacific journal of information systems
    • /
    • v.24 no.2
    • /
    • pp.211-232
    • /
    • 2014
  • Recently, there is a growing interest toward social commerce using SNS(Social Networking Service), and the size of its market is also expanding due to popularization of smart phones, tablet PCs and other smart devices. Accordingly, various studies have been attempted but it is shown that most of the previous studies have been conducted from perspectives of the users. The purpose of this study is to derive user-centered CSF(Critical Success Factor) of social commerce from the previous studies and analyze the CSF perception gap between social commerce service providers and users. The CSF perception gap between two groups shows that there is a difference between ideal images the service providers hope for and the actual image the service users have on social commerce companies. This study provides effective improvement directions for social commerce companies by presenting current business problems and its solution plans. For this, This study selected Korea's representative social commerce business Ticket Monster, which is dominant in sales and staff size together with its excellent funding power through M&A by stock exchange with the US social commerce business Living Social with Amazon.com as a shareholder in August, 2011, as a target group of social commerce service provider. we have gathered questionnaires from both service providers and the users from October 22, 2012 until October 31, 2012 to conduct an empirical analysis. We surveyed 160 service providers of Ticket Monster We also surveyed 160 social commerce users who have experienced in using Ticket Monster service. Out of 320 surveys, 20 questionaries which were unfit or undependable were discarded. Consequently the remaining 300(service provider 150, user 150)were used for this empirical study. The statistics were analyzed using SPSS 12.0. Implications of the empirical analysis result of this study are as follows: First of all, There are order differences in the importance of social commerce CSF between two groups. While service providers regard Price Economic as the most important CSF influencing purchasing intention, the users regard 'Trust' as the most important CSF influencing purchasing intention. This means that the service providers have to utilize the unique strong point of social commerce which make the customers be trusted rathe than just focusing on selling product at a discounted price. It means that service Providers need to enhance effective communication skills by using SNS and play a vital role as a trusted adviser who provides curation services and explains the value of products through information filtering. Also, they need to pay attention to preventing consumer damages from deceptive and false advertising. service providers have to create the detailed reward system in case of a consumer damages caused by above problems. It can make strong ties with customers. Second, both service providers and users tend to consider that social commerce CSF influencing purchasing intention are Price Economic, Utility, Trust, and Word of Mouth Effect. Accordingly, it can be learned that users are expecting the benefit from the aspect of prices and economy when using social commerce, and service providers should be able to suggest the individualized discount benefit through diverse methods using social network service. Looking into it from the aspect of usefulness, service providers are required to get users to be cognizant of time-saving, efficiency, and convenience when they are using social commerce. Therefore, it is necessary to increase the usefulness of social commerce through the introduction of a new management strategy, such as intensification of search engine of the Website, facilitation in payment through shopping basket, and package distribution. Trust, as mentioned before, is the most important variable in consumers' mind, so it should definitely be managed for sustainable management. If the trust in social commerce should fall due to consumers' damage case due to false and puffery advertising forgeries, it could have a negative influence on the image of the social commerce industry in general. Instead of advertising with famous celebrities and using a bombastic amount of money on marketing expenses, the social commerce industry should be able to use the word of mouth effect between users by making use of the social network service, the major marketing method of initial social commerce. The word of mouth effect occurring from consumers' spontaneous self-marketer's duty performance can bring not only reduction effect in advertising cost to a service provider but it can also prepare the basis of discounted price suggestion to consumers; in this context, the word of mouth effect should be managed as the CSF of social commerce. Third, Trade safety was not derived as one of the CSF. Recently, with e-commerce like social commerce and Internet shopping increasing in a variety of methods, the importance of trade safety on the Internet also increases, but in this study result, trade safety wasn't evaluated as CSF of social commerce by both groups. This study judges that it's because both service provider groups and user group are perceiving that there is a reliable PG(Payment Gateway) which acts for e-payment of Internet transaction. Accordingly, it is understood that both two groups feel that social commerce can have a corporate identity by website and differentiation in products and services in sales, but don't feel a big difference by business in case of e-payment system. In other words, trade safety should be perceived as natural, basic universal service. Fourth, it's necessary that service providers should intensify the communication with users by making use of social network service which is the major marketing method of social commerce and should be able to use the word of mouth effect between users. The word of mouth effect occurring from consumers' spontaneous self- marketer's duty performance can bring not only reduction effect in advertising cost to a service provider but it can also prepare the basis of discounted price suggestion to consumers. in this context, it is judged that the word of mouth effect should be managed as CSF of social commerce. In this paper, the characteristics of social commerce are limited as five independent variables, however, if an additional study is proceeded with more various independent variables, more in-depth study results will be derived. In addition, this research targets social commerce service providers and the users, however, in the consideration of the fact that social commerce is a two-sided market, drawing CSF through an analysis of perception gap between social commerce service providers and its advertisement clients would be worth to be dealt with in a follow-up study.

Some New Problems of International Aviation Security- Considerations Forcused on its Legal Aspects (최근국제항공보안대책(最近國際航空保安対策)의 제간제(諸間題) -특히 법적측면(法的測面)을 중심(中心)으로-)

  • Choi, Wan-Sik
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.5
    • /
    • pp.53-75
    • /
    • 1993
  • This article is concerned with the comment on "Some New Problems of International Aviation Security-Considerations Forcused on its Legal Aspects". Ever since 1970, in addition to the problem of failure to accept the Tokyo, Hague and Montreal Conventions, there has been also the problem of parties to them, failing to comply with their obligations under the respective treaties, in the form especially of nominal penalties or the lack of any effort to prosecute after blank refusals to extradite. There have also been cases of prolonged detention of aircraft, passengers and hostages. In this regard, all three conventions contain identical clauses which submit disputes between two or more contracting States concerning the interpretation or application of the respective conventions to arbitration or failing agreement on the organization of the arbitration, to the International Court of Justice. To the extent to which contracting States have not contracted out of this undertaking, as I fear they are expressly allowed to do, this promision can be used by contracting States to ensure compliance. But to date, this avenue does not appear to have been used. From this point of view, it may be worth mentioning that there appears to be an alarming trend towards the view that the defeat of terrorism is such an overriding imperative that all means of doing so become, in international law, automatically lawful. In addition, in as far as aviation security is concerned, as in fact it has long been suggested, what is required is the "application of the strictest security measures by all concerned."In this regard, mention should be made of Annex 17 to the Chicago Convention on Security-Safeguarding International Civil Aviation against Acts of Unlawful Intereference. ICAO has, moreover, compiled, for restricted distribution, a Security Manual for Safeguarding Civil Aviation Against Acts of Unlawful Interference, which is highly useful. In this regard, it may well be argued that, unless States members of ICAO notify the ICAO Council of their inability to comply with opecific standards in Annex 17 or any of the related Annexes in accordance with Article 38 of the 1944 Chicago Convention on International Civil Aviation, their failure to do so can involve State responsibility and, if damage were to insure, their liability. The same applies to breaches of any other treaty obligation. I hope to demonstrate that although modes of international violence may change, their underlying characteristics remain broadly similar, necessitating not simply the adoption of an adequate body of domestic legislation, firm in its content and fairly administered, but also an international network of communication, of cooperation and of coordination of policies. Afurther legal instrument is now being developed by the Legal Committee of ICAO with respect to unlawful acts at International airports. These instruments, however, are not very effective, because of the absence of universal acceptance and the deficiency I have already pointed out. Therefore, States, airports and international airlines have to concentrate on prevention. If the development of policies is important at the international level, it is equally important in the domestic setting. For example, the recent experiences of France have prompted many changes in the State's legislation and in its policies towards terrorism, with higher penalties for terrorist offences and incentives which encourage accused terrorists to pass informations to the authorities. And our government has to tighten furthermore security measures. Particularly, in the case an unarmed hijacker who boards having no instrument in his possession with which to promote the hoax, a plaintiff-passenger would be hard-pressed to show that the airline was negligent in screening the hijacker prior to boarding. In light of the airline's duty to exercise a high degree of care to provide for the safety of all the passengers on board, an acquiescence to a hijacker's demands on the part of the air carrier could constitute a breach of duty only when it is clearly shown that the carrier's employees knew or plainly should have known that the hijacker was unarmed. The general opinion is that the legal oystem could be sufficient, provided that the political will is there to use and apply it effectively. All agreed that the main responsibility for security has to be borne by the governments. A state that supports aviation terrorism is responsible for violation of International Aviation Law. Generally speaking, terrorism is a violation of international law. It violates the sovereign rights of states, and the human rights of the individuals. We have to contribute more to the creation of a general consensus amongst all states about the need to combat the threat of aviation terrorism. I think that aviation terrorism as becoming an ever more serious issue, has to be solved by internationally agreed and closely co - ordinated measures.

  • PDF

The Excluded from Public Pension : Problem, Cause and Policy Measures (공적연금의 사각지대 : 실태, 원인과 정책방안)

  • Seok, Jae-Eun
    • Korean Journal of Social Welfare
    • /
    • v.53
    • /
    • pp.285-310
    • /
    • 2003
  • As National Pension Scheme for all nation complete in 1999 through expanding application in cities, the public pension including Public Occupational Pension became main axis of old-age income maintenance. After 4years since then, now, it is only half of total National Pension insured persons who have been qualified to receive pension through participate and contribution. The other half of National Pension insured is left the excluded from public pension. This paper is intended to identify scale and characteristics of the excluded from public pension and to analysis its cause, and to explore policy measures for solving the excluded's problem. for current recipients over 60 years old generation, the its excluded's scale is no less than 86% of the old over 60 years. The probability of getting in the excluded is high in case of old elderly and female for current elderly generation. For future recipients 18-59 years working generation, the its excluded's scale is no less than 61% of the 18-59 years total population. The probability of getting in the excluded is high in case of 18-29 years and female for current working generation. As logistic regression analysis determinant factor of paying or not pension contribution for future recipients, it appear that probability of getting in the excluded for current working generation is high in case of younger old, lower education attainment, irregular employee, working at agriculture forestry fishery sector, construction sector, wholesale retail trade restaurants hotels sector, financial institution and insurance real estate renting and leasing sector in comparison with manufacturing sector, occpaying at elementary occupation, professionals technicians and associate professionals, sale and service workers, plant machine operators and assemblers, legislators senior officials and managers in comparison with clerks. The Policy measures for the current recipient old generation have need to reinforce supplemental role of Senior's pension(non-contribution pension) until maturing of public pension, because of no having chance of public pension participants for them. And the Policy measures for the future recipient working generation have need to restructure social security fundamentally corresponding with social-economic change as labour market and family structure etc. The pension system has need to change from one earner one pension to one citizen one pension with citizenship rights. At this point, public pension have need to manage with combining insurance's contribution principle and citizenship principle financing by taxes. Then public pension will become substantially universal social network for old-age income maintenance and we can find real solution for the excluded from.

  • PDF

Permanent Preservation and Use of Historical Archives : Preservation Issues Digitization of Historical Collection (역사기록물(Archives)의 항구적인 보존화 이용 : 보존전략과 디지털정보화)

  • Lee, Sang-min
    • The Korean Journal of Archival Studies
    • /
    • no.1
    • /
    • pp.23-76
    • /
    • 2000
  • In this paper, I examined what have been researched and determined about preservation strategy and selection of preservation media in the western archival community. Archivists have primarily been concerned with 'preservation' and 'use' of archival materials worth of being preserved permanently. In the new information era, preservation and use of archival materials were faced with new challenge. Life expectancy of paper records was shortened due to acidification and brittleness of the modem papers. Also emergence of information technology affects the traditional way of preservation and use of archival materials. User expectations are becoming so high technology-oriented and so complicated as to make archivists act like information managers using computer technology rather than traditional archival handicraft. Preservation strategy plays an important role in archival management as well as information management. For a cost-effective management of archives and archival institutions, preservation strategy is a must. The preservation strategy encompasses all aspects of archival preservation process and practices, from selection of archives, appraisal, inventorying, arrangement, description, conservation, microfilming or digitization, archival buildings, and access service. Those archival functions should be considered in their relations to each other to ensure proper preservation of archival materials. In the integrated preservation strategy, 'preservation' and 'use' should be combined and fulfilled without sacrificing the other. Preservation strategy planning is essential to determine the policies of archives to preserve their holdings safe and provide people with a maximum access in most effective ways. Preservation microfilming is to ensure permanent preservation of information held in important archival materials. To do this, a detailed standardization has been developed to guarantee the permanence of microfilm as well as its product quality. Silver gelatin film can last up to 500 years in the optimum storage environment and the most viable option for permanent preservation media. ISO and ANIS developed such standards for the quality of microfilms and microfilming technology. Preservation microfilming guidelines was also developed to ensure effective archival management and picture quality of microfilms. It is essential to assess the need of preservation microfilming. Limit in resources always put a restraint on preservation management. Appraisal (and selection) of what to be preserved was the most important part of preservation microfilming. In addition, microfilms with standard quality can be scanned to produce quality digital images for instant use through internet. As information technology develops, archivists began to utilize information technology to make preservation easier and more economical, and to promote use of archival materials through computer communication network. Digitization was introduced to provide easy and universal access to unique archives, and its large capacity of preserving archival data seems very promising. However, digitization, i.e., transferring images of records to electronic codes, still, needs to be standardized. Digitized data are electronic records, and st present electronic records are very unstable and not to be preserved permanently. Digital media including optical disks materials have not been proved as reliable media for permanent preservation. Due to their chemical coating and physical character using light, they are not stable and can be preserved at best 100 years in the optimum storage environment. Most CD-R can last only 20 years. Furthermore, obsolescence of hardware and software makes hard to reproduce digital images made from earlier versions. Even if when reformatting is possible, the cost of refreshing or upgrading of digital images is very expensive and the very process has to be done at least every five to ten years. No standard for this obsolescence of hardware and software has come into being yet. In short, digital permanence is not a fact, but remains to be uncertain possibility. Archivists must consider in their preservation planning both risk of introducing new technology and promising possibility of new technology at the same time. In planning digitization of historical materials, archivists should incorporate planning for maintaining digitized images and reformatting them in the coming generations of new applications. Without the comprehensive planning, future use of the expensive digital images will become unavailable. And that is a loss of information, and a final failure of both 'preservation' and 'use' of archival materials. As peter Adelstein said, it is wise to be conservative when considerations of conservations are involved.

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.