• 제목/요약/키워드: Vague group

검색결과 46건 처리시간 0.024초

신기술 사용 과정에 관한 비교 사례 연구: 기술 전유 과정의 근거이론적 접근 (A Comparative Case Study on the Adaptation Process of Advanced Information Technology: A Grounded Theory Approach for the Appropriation Process)

  • 최희재;이준기
    • Asia pacific journal of information systems
    • /
    • 제19권3호
    • /
    • pp.99-124
    • /
    • 2009
  • Many firms in Korea have adopted and used advanced information technology in an effort to boost efficiency. The process of adapting to the new technology, at the same time, can vary from one firm to another. As such, this research focuses on several relevant factors, especially the roles of social interaction as a key variable that influences the technology adaptation process and the outcomes. Thus far, how a firm goes through the adaptation process to the new technology has not been yet fully explored. Previous studies on changes undergone by a firm or an organization due to information technology have been pursued from various theoretical points of views, evolved from technological and institutional views to an integrated social technology views. The technology adaptation process has been understood to be something that evolves over time and has been regarded as cycles between misalignments and alignments, gradually approaching the stable aligned state. The adaptation process of the new technology was defined as "appropriation" process according to Poole and DeSanctis (1994). They suggested that this process is not automatically determined by the technology design itself. Rather, people actively select how technology structures should be used; accordingly, adoption practices vary. But concepts of the appropriation process in these studies are not accurate while suggested propositions are not clear enough to apply in practice. Furthermore, these studies do not substantially suggest which factors are changed during the appropriation process and what should be done to bring about effective outcomes. Therefore, research objectives of this study lie in finding causes for the difference in ways in which advanced information technology has been used and adopted among organizations. The study also aims to explore how a firm's interaction with social as well as technological factors affects differently in resulting organizational changes. Detail objectives of this study are as follows. First, this paper primarily focuses on the appropriation process of advanced information technology in the long run, and we look into reasons for the diverse types of the usage. Second, this study is to categorize each phases in the appropriation process and make clear what changes occur and how they are evolved during each phase. Third, this study is to suggest the guidelines to determine which strategies are needed in an individual, group and organizational level. For this, a substantially grounded theory that can be applied to organizational practice has been developed from a longitudinal comparative case study. For these objectives, the technology appropriation process was explored based on Structuration Theory by Giddens (1984), Orlikoski and Robey (1991) and Adaptive Structuration Theory by Poole and DeSanctis (1994), which are examples of social technology views on organizational change by technology. Data have been obtained from interviews, observations of medical treatment task, and questionnaires administered to group members who use the technology. Data coding was executed in three steps following the grounded theory approach. First of all, concepts and categories were developed from interviews and observation data in open coding. Next, in axial coding, we related categories to subcategorize along the lines of their properties and dimensions through the paradigm model. Finally, the grounded theory about the appropriation process was developed through the conditional/consequential matrix in selective coding. In this study eight hypotheses about the adaptation process have been clearly articulated. Also, we found that the appropriation process involves through three phases, namely, "direct appropriation," "cooperate with related structures," and "interpret and make judgments." The higher phases of appropriation move, the more users represent various types of instrumental use and attitude. Moreover, the previous structures like "knowledge and experience," "belief that other members know and accept the use of technology," "horizontal communication," and "embodiment of opinion collection process" are evolved to higher degrees in their dimensions of property. Furthermore, users continuously create new spirits and structures, while removing some of the previous ones at the same time. Thus, from longitudinal view, faithful and unfaithful appropriation methods appear recursively, but gradually faithful appropriation takes over the other. In other words, the concept of spirits and structures has been changed in the adaptation process over time for the purpose of alignment between the task and other structures. These findings call for a revised or extended model of structural adaptation in IS (Information Systems) literature now that the vague adaptation process in previous studies has been clarified through the in-depth qualitative study, identifying each phrase with accuracy. In addition, based on these results some guidelines can be set up to help determine which strategies are needed in an individual, group, and organizational level for the purpose of effective technology appropriation. In practice, managers can focus on the changes of spirits and elevation of the structural dimension to achieve effective technology use.

Poxvirus 감염(感染)에 있어서의 Virus-숙주세포(宿主細胞)의 상호관계(相互關係) 1. Cowpox Virus-FL 세포계(細胞系)의 세포화학적(細胞化學的) Autoradiography 및 세포면역학적해석(細胞免疫學的解析) (Studies on Host-Virus Interaction of Poxviruses 1. Cytochemical, Autoradiographic and Immunocytological Analysis in Cowpox Virus-FL Cell System)

  • 김우호
    • 대한수의학회지
    • /
    • 제15권1호
    • /
    • pp.57-67
    • /
    • 1975
  • The poxvirus group is considered to be a typical cytoplasmic inclusion forming virus. Every poxvirus has been reported to produce only one kind of inclusion in the infected tissues. A vague concept that inclusions of poxviruses are eosinophilic or acidophilic has prevailed. Although many papers and theories about the nature of the inclusion have been presented, most of them are not quite convincing on the point of the relations with virus multiplication, and an analysis of papers published showed that there seem to be many discrepancies in the descriptions of the nature of the poxvirus inclusions. Comparative studies on host-virus interaction with cowpox, orf, swinepox and fowlpox viruses which selected from each Group (I-IV) of poxviruses were performed from the morphological and virological standpoints. At first, in cowpox virus-FL cell system, as a comparative model, cytoplasmic inclusion, nucleic acid metabolism by autoradiography and detection of viral antigen by immunofluorescence were studied and obtained the results as follows: 1. The focus-like cytopathic effect (CPE) at early stage developed to entire culture at terminal stage of infection, and also the developing status of CPE was correlated to viral doses for inoculation. Two kinds of cytoplasmic inclusions which named A and B type were easily observed by Giemsa, hematoxylin-eosin (H & E) and May-Greenwald Giemsa (MGG) stainings in the infected cells. The B type inclusions were formed at early stage of infection and the A type inclusions were produced subsequently the B type formation. The B type which common type inclusion in poxviruses was a small compact or aggregate at early stage and developed to a large diffuse body at terminal stage of infection. On the other hand, the A type inclusion which depend upon the kind of virus was appeared as round and discrete shape, and its size and number was increased gradually during the culture period. It was characteristic to form distinct halos around the both types of inclusions in acid fixed, H & E stained preparations of infected cultures. The B type inclusion was always positive in Feulgen reaction and showed as DNA containing body but the A type inclusion was not. 2. In the relationship between inclusion and DNA metabolism of infected cells by the qualitative autoradiography using 3H-thymidine, the appearance of silver grains was coincided with B type inclusion but not with A type inclusion. This showed that the DNA synthesis was proceeded in all B type inclusions except those in the terminal stage with a diffuse form. This suggested that the B type inclusions are only sites of DNA synthesis and this was proceeded after the cell infection independently. The activity of DNA synthesis of the inclusions was nearly the same as that of the nucleic of normal cells and non-inclusion bearing cells. and non-inclusion bearing cells. Regardless of the size of the degree of DNA synthesis of the B type inclusion, inclusion bearing cells all showed remarkable suppression of nuclear DNA synthesis. 3. By the direct fluorescent antibody technique viral antigen in infected cells was detected. The B type inclusions have been proved to contain a great deal of viral antigen, whereas the basic substance of A type inclusion did not show antigenicity except the round edge. It was suggested that the round edge fluorescence might be caused by the glare of cytoplasmic viral antigen which pushed out and concentrated by the A type inclusion development. 4. Hemorrhagic red pock formations on chorioallantoic membrane of embryonated chicken egg had proved the characteristic of used viral strain. 5. By the above studies on the nature of two types of inclusions and the role they play in virus multiplication, it was concluded that the B type inclusion must be the site of the synthesis of viral DNA and protein as well as the site of the virus.

  • PDF

공간분석을 위한 퍼지분류의 이론적 배경과 적용에 관한 연구 - 경상남도 邑級以上 도시의 기능분류를 중심으로 - (The aplication of fuzzy classification methods to spatial analysis)

  • 정인철
    • 대한지리학회지
    • /
    • 제30권3호
    • /
    • pp.296-310
    • /
    • 1995
  • 본 연구는 퍼지이론을 공간분석에 적용하기 위한 이론적인 배경을 고찰하고, 퍼지 분류법의 특성에 대해 살펴본 것이다. 이를 위해 필자는 공간정보의 모호성에 대해 살펴보 고, 퍼지공간분석의 전제를 설정한 다음 퍼지분류법을 소개하였다. 그리고 퍼지분류법의 특 성을 명확히 하기 위해 경상남도 읍급이상 도시의 산업별 고용비율을 대상으로 퍼지분류를 행한 후, 퍼지분류와 전통적인 군집분석의 결과를 비교하였다. 그 결과, 공간정보의 모호성 은 구체성의 부족, 인간행태, 인내치문제, 분류기준의 부족 등에 의해 발생하는데 기존의 공 간분석기법으로는 공간의 모호성을 반영할 수 없으므로 퍼지기법을 도입한 퍼지공간분석의 필요성이 있음을 확인하였다. 퍼지분류법 중, 퍼지이산분류는 계산절차는 상대적으로 간단하 나 분류결과가 집단간의 점이성을 고려하지 못하며, 퍼지중첩분류는 분류집단간의 점이성은 고려하나 분류결과가 지나치게 많아 적절한 분류수준을 선택하기 어렵고 결과해석이 상대적 으로 난해하다는 문제점이 있음이 밝혀졌다, 또 경남의 도시기능분류는 분류기법에 따라 다 르게 이루어졌지만 창원, 울산, 마산, 진해, 김해, 양산, 웅상, 장승포, 신현으로 구성된 제조 업 군집과 단독군집 충무의 존재가 세 가지 분류 모두에서 공통적으로 확인되었다.

  • PDF

현대 한국미술과 민족주의란 두 개의 얼굴 (Dual Faces of Nationalism reflected in Contemporary Korean Art and Society)

  • 최태만
    • 미술이론과 현장
    • /
    • 제4호
    • /
    • pp.145-180
    • /
    • 2006
  • In Korea, nation and nationalism are undeniable justice, absolute virtue and moreover system of desire. From the late Chosun Dynasty when the Korean Peninsula had to survive from the critical situation of being the arena of competition, and through the colonial period under Japanese imperialism, nationalism became stronger as a logic of survival. The policy of seclusion under closed and exclusive nationalism that didn't recognize the world situation well enough, eventually gave more pain to the nation. Nationalism in colonial Korea which was as reformed nationalism and on the other hand, as intransigent, resisting nationalism. Since the purpose of this writing is not for clarifying the argument raised on Korean nationalism, there is no use mentioning how it went with the change of time. But we have to focus on the fact that the word 'nation' which appeared under the influence of popular revolution and capitalism meaning 'a group of people', was translated and understood as a racial concept for strengthening the unity of 'single-race nation with five thousand years' history. First of all, there is nationalism used to fortify the system. 'The Charter of National Education' and 'The Pledge of Allegiance' were ornaments to intensify the ruling ideology and dictatorship to militarize entire South Korea for 'settling Korean democracy' professed nationalism. Also, another ruling ideology armed with 'self-reliance' put North Korea into the state of hypnosis called nationalism. Nationalism, claiming 'nation' outwardly, but in reality, being an illuminating, instructing ideology isolating each other was indeed a body with two faces. This made 'nation' in Korea mysterious and objective through work such as. The statue commemorating patriotic forefathers' and picture of national records' in South Korea art. Nationalism used to strengthening the system encountered the magical 'single-race' and made 'ghost' being an extreme exclusion to other nations. We can find pedigreed pureness not allowing any mixed breeds from the attitude accepting western art -via Japan or directly- and making it vague by using the word Korean and Asia. There's nationalism as a resistant ideology to solidify the system on the other side. It came out as a way of survival among the Great Power and grew with the task of national liberation to became as a powerful force facing against the dictatorship dominating South Korea after the liberation. This discussion of nationalism as a resistance ideology was active in 1980s. In 1980, democracy movement against the dictatorship of 5th Republic originated from military power which came out suppressing the democratic movement in Gwangju, spread out from the intellects and the students to the labors, farmers and the civilians. It is well known that the 'Nation-People(Minjoong)'s Art Movement could come out under this social condition. Our attitude toward nationalism is still dual in this opening part of 21st century. On one hand, they are opposing to the ultra-nationalism but are not able to separate it from nationalism, and on the other, they have much confusion using it. In fact, in a single-race nation like Korea, the situation of being nationalism and jus sanguinis together can cause dual nationalism. Though nationalism is included in the globalization order, it is evidence that it's effective in Korea where there are still modern fetters like division and separation. In particular, in the world where Japan makes East Asia Coalition but exposed in front of nationalism, and China not being free from Sinocentrism, and American nationalism taking the world order, and Russia fortifying nationalism suppressing the minority race after the dissolution of socialism, Korean nationalism is at the point to find an alternative plan superior to the ruling and resisting ideology.

  • PDF

시력, 폰트, 굵기, 성별에 따른 2음절 및 3음절 농약 제품 표시글자의 가독성 평가 (Legibility Evaluation of Two and Three Syllable Words Used in Pesticides According to Font, Thickness, Gender, and Visual Acuity)

  • 황해영;송영웅
    • 한국산학기술학회논문지
    • /
    • 제13권8호
    • /
    • pp.3444-3451
    • /
    • 2012
  • 농약의 안전보건 정보 표시는 보통 농약병의 표면에 인쇄되어 있다. 그러나 농약의 적절한 표시를 위한 가이드라인이나 기준은 대부분 애매하거나 실용적이지 못하다. 본 연구의 목적은 시력에 따른 가독성 실험을 통하여 적절한 글자 크기의 가이드라인을 설정하는 것이다. 실험은 20대의 20명을 대상으로 근거리시력(0.6, ${\geq}0.8$), 성별, 글자체(세고딕, 중고딕), 글자의 굵기(plain, bold), 음절수(2음절, 3음절)가 농약 표시 글자의 가독성에 미치는 영향을 평가하였다. 가독성 평가를 위한 종속변수로는 정답률이 0%가 되는 최대글자크기, 정답률 100%가 되는 최소 글자크기, 주관적 불편도를 사용하였다. 실험 결과 가독성은 근거리 시력에 의해서만 유의한 차이를 나타냈다. 정답률이 0%가 되는 최대 글자크기는 근거리 시력 ${\geq}0.8$에서는 2pt, 0.6에서는 2~3pt로 나타났다. 정답률 100%의 최소가독 글자크기는 근거리 시력 0.6에서는 9pt, ${\geq}0.8$에서는 5.3pt로 나타났다. 근거리 시력 0.6과 ${\geq}0.8$의 시력에 따른 글자 크기별 불편도는 0.6에서는 남,녀 모두 평균 15.5 pt에서 불편도 1(읽는데 전혀 불편함이 없음)에 도달하였으나 ${\geq}0.8$에서는 남자의 경우 평균 8.5 pt, 여자는 평균 10 pt에서 불편도 1에 도달하였다. 농약 표시 글자 크기에 대한 가이드라인은 중요성이 떨어지는 정보의 경우는 9 pt 이상, '농약' 표시나 독성 표시와 같은 안전상 중요한 내용의 경우는 16 pt 이상이 적절한 것으로 생각된다.

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • 제20권2호
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.