• Title/Summary/Keyword: area concept

Search Result 2,302, Processing Time 0.03 seconds

A Study on the Objectives of Cultural Property Education for establish of the U.V.E.C.(Understand, Value, Enjoy, Create) Cultural Property Education (U.V.E.C.(Understand, Value, Enjoy, Create) 문화재교육 정립을 위한 문화재교육 목표 연구)

  • PARK Sanghye
    • Korean Journal of Heritage: History & Science
    • /
    • v.55 no.4
    • /
    • pp.278-294
    • /
    • 2022
  • To date, cultural property education has seen rapid quantitative growth due to national and personal needs. However, qualitative growth is lacking. The objectives of cultural property education have not been established, and therefore, even its identity is not clear. The most pressing issue at present in cultural property education is to first set objectives. This study aimed to analyze the objectives of current cultural property education, identify the problems, and set new objectives to meet significant national and personal needs in terms of education. The problems with the objectives of current cultural property education are that the persons interested in the education do not understand the concept of the education objectives clearly and that the objectives do not contain much actual content of the education. Also, the objectives of the education do not take into account the dynamic competencies and interests of the learners and do not satisfy the changes of the times. To solve these problems, new cultural property education, called 'U.V.E.C.,' was offerred. U.V.E.C. education is aimed at understanding cultural properties, recognizing their value, and enjoying them, and at creating culture. The objectives of U.V.E.C. cultural property education were set such that they can be modified flexibly in a learner-centric way with clear and practical format and contents. Based on this direction, stepwise objectives were set including overall objectives, detailed objectives, and practice objectives, and objective cases of each step were proposed. Considering the generality of the education and the distinct characteristics of the cultural properties, the U.V.E.C. education objectives took into account the diversity of behavioral objectives, clearness in statements, the objectives of problem solving, the initiative of learners and openness for expression outcomes. The U.V.E.C. objectives are clear and specific so that teachers can enhance their pedagogical efficiency and learners are able to develop interesting and diversified competencies. In addition, it is expected that the U.V.E.C. objectives will significantly affect objective setting for education on cultural properties which have not been studied widely. Further systemic and specific studies on the contents and methods of the U.V.E.C. education would help to change the overall education on cultural properties and position the field as a new academic area.

A study on the field tests and development of quantitative two-dimensional numerical analysis method for evaluation of effects of umbrella arch method (UAM 효과 평가를 위한 현장실험 및 정량적 2차원 수치해석기법 개발에 관한 연구)

  • Kim, Dae-Young;Lee, Hong-Sung;Chun, Byung-Sik;Jung, Jong-Ju
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.11 no.1
    • /
    • pp.57-70
    • /
    • 2009
  • Considerable advance has been made on research on effect of steel pipe Umbrella Arch Method (UAM) and mechanical reinforcement mechanism through numerical analyses and experiments. Due to long analysis time of three-dimensional analysis and its complexity, un-quantitative two-dimensional analysis is dominantly used in the design and application, where equivalent material properties of UAM reinforced area and ground are used, For this reason, development of reasonable, theoretical, quantitative and easy to use design and analysis method is required. In this study, both field UAM tests and laboratory tests were performed in the residual soil to highly weathered rock; field tests to observe the range of reinforcement, and laboratory tests to investigate the change of material properties between prior to and after UAM reinforcement. It has been observed that the increase in material property of neighboring ground is negligible, and that only stiffness of steel pipe and cement column formed inside the steel pipe and the gap between steel pipe and borehole contributes to ground reinforcement. Based on these results and concept of Convergence Confinement Method (CCM), two dimensional axisymmetric analyses have been performed to obtain the longitudinal displacement profile (LDP) corresponding to arching effect of tunnel face, UAM effect and effect of supports. In addition, modified load distribution method in two dimensional plane-strain analysis has been suggested, in which effect of UAM is transformed to internal pressure and modified load distribution ratios are suggested. Comparison between the modified method and conventional method shows that larger displacement occur in the conventional method than that in the modified method although it may be different depending on ground condition, depth and size of tunnel, types of steel pipe and initial stress state. Consequently, it can be concluded that the effect of UAM as a beam in a longitudinal direction is not considered properly in the conventional method.

Utilization of Smart Farms in Open-field Agriculture Based on Digital Twin (디지털 트윈 기반 노지스마트팜 활용방안)

  • Kim, Sukgu
    • Proceedings of the Korean Society of Crop Science Conference
    • /
    • 2023.04a
    • /
    • pp.7-7
    • /
    • 2023
  • Currently, the main technologies of various fourth industries are big data, the Internet of Things, artificial intelligence, blockchain, mixed reality (MR), and drones. In particular, "digital twin," which has recently become a global technological trend, is a concept of a virtual model that is expressed equally in physical objects and computers. By creating and simulating a Digital twin of software-virtualized assets instead of real physical assets, accurate information about the characteristics of real farming (current state, agricultural productivity, agricultural work scenarios, etc.) can be obtained. This study aims to streamline agricultural work through automatic water management, remote growth forecasting, drone control, and pest forecasting through the operation of an integrated control system by constructing digital twin data on the main production area of the nojinot industry and designing and building a smart farm complex. In addition, it aims to distribute digital environmental control agriculture in Korea that can reduce labor and improve crop productivity by minimizing environmental load through the use of appropriate amounts of fertilizers and pesticides through big data analysis. These open-field agricultural technologies can reduce labor through digital farming and cultivation management, optimize water use and prevent soil pollution in preparation for climate change, and quantitative growth management of open-field crops by securing digital data for the national cultivation environment. It is also a way to directly implement carbon-neutral RED++ activities by improving agricultural productivity. The analysis and prediction of growth status through the acquisition of the acquired high-precision and high-definition image-based crop growth data are very effective in digital farming work management. The Southern Crop Department of the National Institute of Food Science conducted research and development on various types of open-field agricultural smart farms such as underground point and underground drainage. In particular, from this year, commercialization is underway in earnest through the establishment of smart farm facilities and technology distribution for agricultural technology complexes across the country. In this study, we would like to describe the case of establishing the agricultural field that combines digital twin technology and open-field agricultural smart farm technology and future utilization plans.

  • PDF

A comprehensive analysis of temporal characteristics in independent rainstorm events in Seoul: focusing on changes in unit time and secondary peak constant (서울특별시 내 독립 호우사상의 시간분포 특성 분석: 분 단위와 차첨두 상수의 조건 변화를 중심으로)

  • Cha, Hoyoung;Lee, Jinwook;Jun, Changhyun;Byun, Jongyun;Baik, Jongjin
    • Journal of Korea Water Resources Association
    • /
    • v.56 no.11
    • /
    • pp.785-799
    • /
    • 2023
  • In this study, we proposed a new concept termed the Secondary Peak Constant (SPC) and discerned the temporal characteristics of independent rainstorm events based on unit time and SPC about 24 observation stations in Seoul. Utilizing rainfall observations from 2000 to 2022, independent rainstorm events discreted from rainfall data per unit time. The temporal characteristics of these events were derived according to unit time, and temporal characteristics of the peak rainfall were identified through the SPC. Finally, the temporal characteristics of independent rainstorm events were examined distinctively when analyzed by unit time and SPC. Independent rainstorm events with smaller unit time showed significantly larger total rainfall, rainfall duration, and rainfall intensity. The temporal characteristics of the largest peak rainfall (1st Peak) within independent rainstorm events followed a sequence of Q4>Q2>Q3>Q1. Additionally, the 2nd Peak rainfall predominantly occurred the location where the 1st Peak appeared. The proportion of independent rainstorm events with multiple peak rainfalls exceeded 50.0% when the SPC was 0.7 or lower. The average number of peak rainfalls within independent rainstorm events ranged from 1.5 to 3.4. This study identified the temporal characteristics of independent rainstorm events based on unit time. Then, the peak rainfall of temporal characteristics was quantified by SPC on this study. Hence, it is evident that the temporal characteristics of independent rainstorm events for specific area can be anlayzed and quantified based on unit time and SPC.

Service Quality, Customer Satisfaction and Customer Loyalty of Mobile Communication Industry in China (중국이동통신산업중적복무질량(中国移动通信产业中的服务质量), 고객만의도화고객충성도(顾客满意度和顾客忠诚度))

  • Zhang, Ruijin;Li, Xiangyang;Zhang, Yunchang
    • Journal of Global Scholars of Marketing Science
    • /
    • v.20 no.3
    • /
    • pp.269-277
    • /
    • 2010
  • Previous studies have shown that the most important factor affecting customer loyalty in the service industry is service quality. However, on the subject of whether service quality has a direct or indirect effect on customer loyalty, scholars' views apparently vary. Some studies suggest that service quality has a direct and fundamental influence on customer loyalty (Bai and Liu, 2002). However, others have shown that service quality not only directly affects customer loyalty, it also has an indirect impact on customer loyalty by influencing customer satisfaction and perceived value (Cronin, Brady, and Hult, 2000). Currently, there are few domestic articles that specifically address the relationship between service quality and customer loyalty in the mobile communication industry. Moreover, research has studied customer loyalty as a whole variable, rather than breaking it down further into multiple dimensions. Based on this analysis, this paper summarizes previous study results, establishes an effect mechanism model among service quality, customer satisfaction, and customer loyalty in the mobile communication industry, and presents a statistical test on model assumptions by using customer investigation data from Heilongjiang Mobile Company. It provides theoretical guidance for mobile service management based on the discussion of the hypothesis test results. For data collection, the sample comprised mobile users in Harbin city, and the survey was taken by random sampling. Out of a total of 300 questionnaires, 276 (92.9%) were recovered. After excluding invalid questionnaires, 249 remained, for an effective rate of 82.6 percent for the study. Cronbach's ${\alpha}$ coefficient was adapted to assess the scale reliability, and validity testing was conducted on the questionnaire from three aspects: content validity, construct validity. and convergent validity. The study tested for goodness of fit mainly from the absolute and relative fit indexes. From the hypothesis testing results, overall, four assumptions have not been supported. The ultimate affective relationship of service quality, customer satisfaction, and customer loyalty is demonstrated in Figure 2. On the whole, the service quality of the communication industry not only has a direct positive significant effect on customer loyalty, it also has an indirect positive significant effect on customer loyalty through service quality; the affective mechanism and extent of customer loyalty are different, and are influenced by each dimension of service quality. This study used the questionnaires of existing literature from home and abroad and tested them in empirical research, with all questions adapted to seven-point Likert scales. With the SERVQUAL scale of Parasuraman, Zeithaml, and Berry (1988), or PZB, as a reference point, service quality was divided into five dimensions-tangibility, reliability, responsiveness, assurance, and empathy-and the questions were simplified down to nineteen. The measurement of customer satisfaction was based mainly on Fornell (1992) and Wang and Han (2003), ending up with four questions. Based on the study’s three indicators of price tolerance, first choice, and complaint reaction were used to measure attitudinal loyalty, while repurchase intention, recommendation, and reputation measured behavioral loyalty. The collection and collation of literature data produced a model of the relationship among service quality, customer satisfaction, and customer loyalty in mobile communications, and China Mobile in the city of Harbin in Heilongjiang province was used for conducting an empirical test of the model and obtaining some useful conclusions. First, service quality in mobile communication is formed by the five factors mentioned earlier: tangibility, reliability, responsiveness, assurance, and empathy. On the basis of PZB SERVQUAL, the study designed a measurement scale of service quality for the mobile communications industry, and obtained these five factors through exploratory factor analysis. The factors fit basically with the five elements, indicating the concept of five elements of service quality for the mobile communications industry. Second, service quality in mobile communications has both direct and indirect positive effects on attitudinal loyalty, with the indirect effect being produced through the intermediary variable, customer satisfaction. There are also both direct and indirect positive effects on behavioral loyalty, with the indirect effect produced through two intermediary variables: customer satisfaction and attitudinal loyalty. This shows that better service quality and higher customer satisfaction will activate the attitudinal to service providers more active and show loyalty to service providers much easier. In addition, the effect mechanism of all dimensions of service quality on all dimensions of customer loyalty is different. Third, customer satisfaction plays a significant intermediary role among service quality and attitudinal and behavioral loyalty, indicating that improving service quality can boost customer satisfaction and make it easier for satisfied customers to become loyal customers. Moreover, attitudinal loyalty plays a significant intermediary role between service quality and behavioral loyalty, indicating that only attitudinally and behaviorally loyal customers are truly loyal customers. The research conclusions have some indications for Chinese telecom operators and others to upgrade their service quality. Two limitations to the study are also mentioned. First, all data were collected in the Heilongjiang area, so there might be a common method bias that skews the results. Second, the discussion addresses the relationship between service quality and customer loyalty, setting customer satisfaction as mediator, but does not consider other factors, like customer value and consumer features, This research will be continued in the future.

The Relationship between Trust, Trustworthiness, and Repeat Purchase Intentions: A Multidimensional Approach (신뢰대상의 다차원적 접근법에 의한 신뢰와 재구매 의도와의 관계)

  • Lee, Soo-Hyung;Park, Mi-Ryong
    • Journal of Global Scholars of Marketing Science
    • /
    • v.18 no.1
    • /
    • pp.1-31
    • /
    • 2008
  • Trust is central to human relationships, at all times and places. The importance of trust is fundamental in all areas of human life, not only in the area of business administration. 2,500 years ago in China, Confucius taught that the foundation of politics was the trust of the people, more important even than military strength or the supply of food. Shakespeare's play, "Much Ado about Nothing' is about trust and deception. These days, trust and transparency in a commercial organization's business culture form the basis of the 'social capital' by which that organization increases its productivity. A successful company raises productivity by the accumulation of social capital, derived from a trust relationship between business partners, and between the company and consumers. Trust is the crucial factor. At the national level, building trust determines a nation's competitiveness. For a company, long term trust relationships with customers are essential for its survival in a business environment of rapid change. Such relationships, based on trust, are important assets to ensure a company's competitive advantage, and need to be organic to that company's business culture. Because of this importance, trust relationships have been studied in diverse areas within business administration, and especially within marketing, where they form the basis of a successful relationship between producer and consumer. However, what has been lacking is a unified definition of trust. Research has been conducted on the basis of various definitions and models. The majority of researchers have not considered the multidimensional character of the concept of trust until now. Approaches based on a one dimensional model have undermined the value of research results. Furthermore, researchers have only considered trust and trustworthiness as a single component. The majority of research has explored the consequences of perceived trust for outcomes such as loyalty or cooperation, but has neglected the effects of trustworthiness upon the mechanisms of consumer trust. This study focuses on the dimension of trust from such a perspective. It seeks to verify the effect of trust on customer intentions by breaking it down into three separate components: 1) the salesperson, 2) the product/service, and 3) the company. The purposes of this paper are as follows: Firstly, we review the multidimensional nature of trust objects: the salesperson, the product/service, and the company. Secondly, we analyze the relationship between multidimensional trust and trustworthiness. Thirdly, we analyze the connection between trust and repeat purchase intentions for the maintenance of long term relationships. For these purposes the author has developed several hypotheses as follows: H1-1: The competence of a salesperson is positively associated with the trust given by the consumer to the salesperson. H1-2: The benevolence of a salesperson is positively associated with the trust given by the consumer to the salesperson. H2-1: The competence of product/service is positively associated with the trust given by the consumer to the product/service. H2-2: The benevolence of product/service is positively associated with the trust given by the consumer to the product/service. H3-1: The reputation of a company is positively associated with the trust given by the consumer to the company. H3-2: The physical environment of a company is positively associated with the trust given by the consumer to the company. H4-1: Trust in a salesperson is positively associated with repeat purchase intentions. H4-2: Trust in a product/service is positively associated with repeat purchase intentions. H4-3: Trust in a company is positively associated with repeat purchase intentions. The data was compiled from 366 questionnaires. 500 questionnaires were collected, but some of the data was considered unsuitable and inappropriate. The subjects of the survey were male and female customers purchasing products at department stores in Seoul, Daegu and Gyeongbuk. It was carried out between Oct. 25 and 29, 2007. The data was analyzed by frequency analysis using SPSS 12.0 and structural equation modeling using LISREL 8.7. The result of the overall model analysis is as follows: Chi-Square=445.497, d.f.=185, p-value=0.0, GFI=.901, RMSEA=.0617, NNFI=.986, NFI=.981, CFI=.989, AGFI=.864, RMR=.0872. The results of the overall model analysis were coherent. It was found that trust is a multi-dimensional construct, that each of the dimensions of trust are meaningful influences on customer's repurchase intention. Trust in a company may be the most relevant, while trust in a product/service and a salesperson may be less relevant to repurchase intentions. The effective factors in determining trust in a salesperson and a company's product/service were found to be competence and benevolence. Factors in determining trust in a company were its reputation and physical environment, and the relationship of each effective trust factor has been verified in this research. As a result, it was found that competence and benevolence have a meaningful influence on trust in a salesperson and in product/service. It was also found that a company's reputation influences the overall trust in the company significantly but a company's physical environment does not have much effect.

  • PDF

Characteristics of Everyday Movement Represented in Steve Paxton's Works: Focused on Satisfyin' Lover, Bound, Contact at 10th & 2nd- (스티브 팩스톤(Steve Paxton)의 작품에서 나타난 일상적 움직임의 특성에 관한 연구: , , 를 중심으로)

  • KIM, Hyunhee
    • Trans-
    • /
    • v.3
    • /
    • pp.109-135
    • /
    • 2017
  • The purpose of this thesis is to analyze characteristics of everyday movement showed in performances of Steve Paxton. A work of art has been realized as a special object enjoyed by high class people as high culture for a long time. Therefore, a gap between everyday life and art has been greatly existed, and the emergence of everyday elements in a work of art means that public awareness involving social change is changed. The postmodernism as the period when a boundary between art and everyday life is uncertain was a postwar society after the Second World War and a social situation that rapidly changes into a capitalistic society. Changes in this time made scholars gain access academically concepts related to everyday life, and affected artists as the spirit of the times of pluralistic postmodernism refusing totality. At the same period of the time, modern dance also faced a turning point as post-modern dance. After the Second World War, modern dance started to be evaluated as it reaches the limit, and at this juncture, headed by dancers including the Judson Dance Theatre. Acting as a dancer in a dance company of Merce Cunningham, Steve Paxton, one of founders of the Judson Dance Theatre, had a critical mind of the conditions of dance company with the social structure and the process that movement is made. This thinking is showed in early performances as an at tempt to realize everyday motion it self in performances. His early activity represented by a walking motion attracted attention as a simple motion that excludes all artful elements of existing dance performances and is possible to conduct by a person who is not a dancer. Although starting the use of everyday movement is regarded as an open characteristic of post-modern dance, advanced researches on this were rare, so this study started. In addition, studies related to Steve Paxton are skewed towards Contact Improvisation that he rose as an active practician. As the use of ordinary movement before he focused on Contact Improvisation, this study examines other attempts including Contact Improvisation as attempts after the beginning of his performances. Therefore, the study analyzes Satisfyin' Lover, Contact at 10th & 2nd and Bound that are performances of Steve Paxton, and based on this, draws everyday characteristics. In addition, related books, academic essays, dance articles and reviews are consulted to consider a concept related to everyday life and understand dance historical movement of post-modern dance. Paxton attracted attention because of his activity starting at critical approach of movement of existing modern dance. As walking of performers who are not dancers, a walking motion showed in Satisfyin' Lover gave esthetic meaning to everyday movement. After that, he was affected by Eastern ideas, so developed Contact Improvisation making a motion through energy of the natural laws. In addition, he had everyday things on his performances, and used a method to deliver various images by using mundane movement and impromptu gestures originating from relaxed body. Everyday movement of his performances represents change in awareness of performances of the art of dancing that are traditionally maintained including change of dance genre of an area. His activity with unprecedented attempt and experimentation should be highly evaluated as efforts to overcome the limit of modern dance.

  • PDF

Application and Expansion of the Harm Principle to the Restrictions of Liberty in the COVID-19 Public Health Crisis: Focusing on the Revised Bill of the March 2020 「Infectious Disease Control and Prevention Act」 (코로나19 공중보건 위기 상황에서의 자유권 제한에 대한 '해악의 원리'의 적용과 확장 - 2020년 3월 개정 「감염병의 예방 및 관리에 관한 법률」을 중심으로 -)

  • You, Kihoon;Kim, Dokyun;Kim, Ock-Joo
    • The Korean Society of Law and Medicine
    • /
    • v.21 no.2
    • /
    • pp.105-162
    • /
    • 2020
  • In the pandemic of infectious disease, restrictions of individual liberty have been justified in the name of public health and public interest. In March 2020, the National Assembly of the Republic of Korea passed the revised bill of the 「Infectious Disease Control and Prevention Act.」 The revised bill newly established the legal basis for forced testing and disclosure of the information of confirmed cases, and also raised the penalties for violation of self-isolation and treatment refusal. This paper examines whether and how these individual liberty limiting clauses be justified, and if so on what ethical and philosophical grounds. The authors propose the theories of the philosophy of law related to the justifiability of liberty-limiting measures by the state and conceptualized the dual-aspect of applying the liberty-limiting principle to the infected patient. In COVID-19 pandemic crisis, the infected person became the 'Patient as Victim and Vector (PVV)' that posits itself on the overlapping area of 'harm to self' and 'harm to others.' In order to apply the liberty-limiting principle proposed by Joel Feinberg to a pandemic with uncertainties, it is necessary to extend the harm principle from 'harm' to 'risk'. Under the crisis with many uncertainties like COVID-19 pandemic, this shift from 'harm' to 'risk' justifies the state's preemptive limitation on individual liberty based on the precautionary principle. This, at the same time, raises concerns of overcriminalization, i.e., too much limitation of individual liberty without sufficient grounds. In this article, we aim to propose principles regarding how to balance between the precautionary principle for preemptive restrictions of liberty and the concerns of overcriminalization. Public health crisis such as the COVID-19 pandemic requires a population approach where the 'population' rather than an 'individual' works as a unit of analysis. We propose the second expansion of the harm principle to be applied to 'population' in order to deal with the public interest and public health. The new concept 'risk to population,' derived from the two arguments stated above, should be introduced to explain the public health crisis like COVID-19 pandemic. We theorize 'the extended harm principle' to include the 'risk to population' as a third liberty-limiting principle following 'harm to others' and 'harm to self.' Lastly, we examine whether the restriction of liberty of the revised 「Infectious Disease Control and Prevention Act」 can be justified under the extended harm principle. First, we conclude that forced isolation of the infected patient could be justified in a pandemic situation by satisfying the 'risk to the population.' Secondly, the forced examination of COVID-19 does not violate the extended harm principle either, based on the high infectivity of asymptomatic infected people to others. Thirdly, however, the provision of forced treatment can not be justified, not only under the traditional harm principle but also under the extended harm principle. Therefore it is necessary to include additional clauses in the provision in order to justify the punishment of treatment refusal even in a pandemic.

A Study on the Creation and Use of Nokgakseong and Underwater Wooden Fence (조선시대 녹각성과 수중목책의 조성 및 활용에 관한 연구)

  • SHIM Sunhui;KIM Choongsik
    • Korean Journal of Heritage: History & Science
    • /
    • v.56 no.4
    • /
    • pp.230-246
    • /
    • 2023
  • The wooden fence(木柵), which began to appear in the Bronze Age and is presumed to be the oldest defense facility in human history, was used as a fortress for the purpose of further strengthening military defense functions until after the Japanese Invasion of Korea in 1592 in the Joseon Dynasty(壬辰倭亂). As it was established as the concept of a fortress or a fence installed outside a fence castle(城柵) or barracks fence(營柵), its importance as an essential facility for defense was further highlighted. This study is the result of exploring wooden fence that were used as official facilities during the Joseon Dynasty, focusing on literature surveys such as 『Annals of the Joseon Dynasty』 and 『New Jeungdonggukyeojiseungram』 In this study, in particular, the conclusion of this study is as follows, focusing on the use and function of Nokgakseong(鹿角城), underwater wooden fence, installation methods, and materials of wooden fences, is as follows. The conclusions of this study, which focused on the materials of the wooden fence, are as follows. First, as invasions by foreign enemies became more frequent in the late Goryeo and early Joseon Dynasty, wooden fences played a major role as a major out-of-castle defense facility((防禦施設). In addition, wooden fences were modified and installed into various types such as wooden fences(木柵城), Nokgakseong, a fence made up of large branches in the shape of a deer antler, and underwater wooden fences(水中木柵) according to the circumstances of the times, government policy, and location environment. Second, wooden fences were installed in strategic locations in defense facilities for military purposes, such as mountain fortress(山城), fortresses(營), camps(鎭), forts(堡), and castles(邑城) in strategic locations, and were used for defense in case of emergency. According to the urgency of farming, it was installed in accordance with the non-farming season, when it is easy to mobilize manpower to avoid the busy farming season. The size of the wooden fence of the Joseon Dynasty, which are confirmed through literature records, was converted into Pobaekchuk(布帛尺), and the circumference was very diverse from 4,428chuk(2,066m) to 55chuk(25m). Third, Nokgakseong is an efficient combat support facility that is more aggressive than a general wooden fence, and the records of Nokgakseong in the Annals of the Joseon Dynasty appeared during the King Sejong period the record was 20 times, the most. By region, it was found that it was mainly installed in coastal rugged areas such as Pyeongan and Hamgildo(12), which are the 6-jin areas of the 4th Army. Fourth, in the early 15th century, as the royal court established a maritime defense strategy for the coastal area of the southern coast, after the Sampo Invasion(三浦倭亂), riots by Japanese settlers in Sampo in 1510, major military posts including eupseong(邑城), camps, and forts were established. The installation of underwater barriers around various government facilities rapidly increased as a defense facility to block the warships of Japanese pirates around various government facilities. Fifth, between the 15th and 17th centuries before and after the Japanese Invasion of Korea in Sampo, underwater fences were installed in the Southern coast and Ganghwa Island. In particular, in the 15th century, underwater fences were intensively installed in coastal areas of Gyeongsangnam-do, such as Jepo. Pine trees and Oaks are the main materials used for underwater fences, but other materials such as Oldham's meliosma, Loose-flower hornbeam and The vines of arrowroots were also used as materials for wooden fences.

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.