• Title/Summary/Keyword: group network

Search Result 2,535, Processing Time 0.027 seconds

Effect of food-related lifestyle, and SNS use and recommended information utilization on dining out (혼밥 및 외식소비 관련 식생활라이프스타일과 SNS 이용 및 추천정보활용의 영향)

  • Jin A Jang
    • Journal of Nutrition and Health
    • /
    • v.56 no.5
    • /
    • pp.573-588
    • /
    • 2023
  • Purpose: This study aimed to examine social networking service (SNS) use and recommended information utilization (SURU) according to the food-related lifestyles (FRLs) of consumers and analyze how the interaction between the FRL and SURU affects the practice of eating alone and visiting restaurants. Methods: Data on 4,624 adults in their 20s to 50s were collected from the 2021 Consumer Behavior Survey for Food. Statistical methods included factor analysis, K-means cluster analysis, the complex samples general linear model, the complex samples Rao-Scott χ2 test, and the general linear model. Results: The following three factors were extracted from the FRL data: Convenience pursuit, rational consumption pursuit, and gastronomy pursuit, and the subjects were classified into three groups, namely the rational consumption, convenient gastronomy, and smart gourmet groups. An examination of the difference in SURU according to the FRL showed that the smart gourmet group had the highest score. The result of analyzing the effects of the FRL and SURU on eating alone revealed that both the main effect and the interaction effect were significant (p < 0.01, p < 0.001). The higher the SURU, the higher the frequency of eating alone in the convenience pursuit, and gastronomy pursuit groups. The main and interaction effects of the FRL and SURU on the frequency of eating out were also significant (p < 0.01, p < 0.001). In all the FRL groups, the higher the SURU level, the higher the frequency of visiting restaurants. Specifically, the two groups with convenience and gastronomic tendencies showed a steeper increase. Conclusion: This study provides important basic data for research on consumer behavior related to food SNS, market segmentation of restaurant consumers, and development of marketing strategies using SNS in the future.

National Survey of Sarcoidosis in Korea (유육종증 전국실태조사)

  • 대한결핵 및 호흡기학회 학술위원회
    • Tuberculosis and Respiratory Diseases
    • /
    • v.39 no.6
    • /
    • pp.453-473
    • /
    • 1992
  • Background: National survey was performed to estimate the incidence of sarcoidosis in Korea. The clinical data of confirmed cases were analysed for the practice of primary care physicians and pulmonary specialists. Methods: The period of study was from January 1991 to December 1992. Data were retrospectively collected by correspondence with physicians in departments of internal medicine, dermatology, ophthalmology and neurology of the hospitals having more than 100 beds using returning postcards. In confirmed and suspicious cases of sardoidosis, case record chart for clinical and laboratory findings were obtained in detail. Results: 1) Postcards were sent to 523 departments in 213 hospitals. Internal medicine composed 41%, dermatology 20%, ophthalmology 20% and neurology 19%. 2) Postcards were returned from 241 departments (replying rates was 48%). 3) There were 113 confirmed cases from 50 departments and 10 cases. The cases were composed from internal medicine (81%), dermatology (13%), ophthalmology (3%) and neurology (3%). 78 confirmed cases were analysed, which were composed from department of internal medicine (92%), dermatology (5%), and neurology (3%). 4) The time span for analysed cases was 1980 to 1992. one case was analysed in 1980 and the number gradually increased to 18 cases in 1991. 5) The majority of patients (84.4%) were in the age group of 20 to 49 years. 6) The ratio of male to female was 1 : 1.5. 7) The most common chief complains were respiratory symptoms, dermatologic symptoms, generalized discomforts, visual changes, arthralgia, abdominal pains, and swallowing difficulties in order. 16% of the patients were asymptomatic. 8) Mean duration between symptom onset and diagnosis was 2 months. 9) The most common symptoms were respiratory, general, dermatologic, ophthalmologic, neurologic and cardiac origin in order. 10) Hemoglobin, hematocrits and platelet were in normal range. 58% of the patients had lymphopenia measuring less than 30% of white cell count. The ratio of CD4 to CD8 lymphocytes was $1.73{\pm}1.16$ with range of 0.43 to 4.62. ESR was elevated in 43% of the cases. 11) Blood chemistry was normal in most cases. Serum angiotensin converting enzyme (S-ACE) was $66.8{\pm}58.6\;U/L$ with the range of 8.79 to 265 U /L. Proteinuria of more than 150 mg was found in 42. 9% of the patients. 12) Serum IgG was elevated in 43.5%, IgA in 45.5%, IgM in 59.1% and IgE in 46.7%. The levels of complement C3 and C4 were in the normal range. Anti-nuclear antibody was detected in 11% of the cases. Kweim test was performed in 3 cases, and in all cases the result was positive. 13) FVC was decreased in 17.3%, FEV1 in 11.5%, FEV1/FVC in 10%, TLC in 15.2%, and DLco in 64.7%. 14) PaO2 was decreased below 90 mmHg in 48.6% and PaCO2 was increased above 45 mmHg in 5.7%. 15) The percentage of macrophages in BAL fluid was $51.4{\pm}19.2%$, lymphocytes $44.4{\pm}21.1%$, and the ratio of CD4 to CD8 lymphocytes was $3.41{\pm}2.07$. 16) There was no difference in laboratory findings between male and female. 17) Hilar enlargement on chest PA was present in 87.9% (bilaterally in 78.8% and unilaterally in 9.1%). 18) According to Siltzbach's classification, stage 0 was 5%, stage 158.3%, stage 228.3%, and stage 38.3%. 19) Hilart enlargement on chest CT was present in 92.6% (bilaterally 76.4% and unilaterally in 16.2%). 20) HRCT was done in 16 cases. The most common findings were nodules, interlobular thickening, focal patchy infiltrations in order. Two cases was normal finding. 21) Other radiologic examinations showed bone change in one case and splenomegaly in two cases. 22) Gallium scan was done in 12 cases. Radioactivity was increased in hilar and mediastinal lymph nodes in 8 cases and in parenchyme in 2 cases. 23) The pathologic diagnosis was commonly performed by transbrochial lung biopsy (TBLB, 47.3%), skin and mediastinal lymph nodes biopsy (34.5%), peripheral lymph nodes biopsy (23.6%), open lung biopsy (18.2%) and bronchial biopsy in order. 24) The most common findings in pathology were non·caseating granuloma (100%), multi-nucleated giant cell (47.3%), hyalinized acellular scar (34.5%), reticulin fibrin network (20%), inclusion body (10.9%), necrosis (9.1%), and lymphangitic distribution of granuloma (1.8%) in order. Conclusion: Clinical, laboratory, radiologic and pathologic findings were summarized. This collected data will assist in finding a test for detection and staging of sarcoidosis in Korea in near future.

  • PDF

The Pattern Analysis of Financial Distress for Non-audited Firms using Data Mining (데이터마이닝 기법을 활용한 비외감기업의 부실화 유형 분석)

  • Lee, Su Hyun;Park, Jung Min;Lee, Hyoung Yong
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.4
    • /
    • pp.111-131
    • /
    • 2015
  • There are only a handful number of research conducted on pattern analysis of corporate distress as compared with research for bankruptcy prediction. The few that exists mainly focus on audited firms because financial data collection is easier for these firms. But in reality, corporate financial distress is a far more common and critical phenomenon for non-audited firms which are mainly comprised of small and medium sized firms. The purpose of this paper is to classify non-audited firms under distress according to their financial ratio using data mining; Self-Organizing Map (SOM). SOM is a type of artificial neural network that is trained using unsupervised learning to produce a lower dimensional discretized representation of the input space of the training samples, called a map. SOM is different from other artificial neural networks as it applies competitive learning as opposed to error-correction learning such as backpropagation with gradient descent, and in the sense that it uses a neighborhood function to preserve the topological properties of the input space. It is one of the popular and successful clustering algorithm. In this study, we classify types of financial distress firms, specially, non-audited firms. In the empirical test, we collect 10 financial ratios of 100 non-audited firms under distress in 2004 for the previous two years (2002 and 2003). Using these financial ratios and the SOM algorithm, five distinct patterns were distinguished. In pattern 1, financial distress was very serious in almost all financial ratios. 12% of the firms are included in these patterns. In pattern 2, financial distress was weak in almost financial ratios. 14% of the firms are included in pattern 2. In pattern 3, growth ratio was the worst among all patterns. It is speculated that the firms of this pattern may be under distress due to severe competition in their industries. Approximately 30% of the firms fell into this group. In pattern 4, the growth ratio was higher than any other pattern but the cash ratio and profitability ratio were not at the level of the growth ratio. It is concluded that the firms of this pattern were under distress in pursuit of expanding their business. About 25% of the firms were in this pattern. Last, pattern 5 encompassed very solvent firms. Perhaps firms of this pattern were distressed due to a bad short-term strategic decision or due to problems with the enterpriser of the firms. Approximately 18% of the firms were under this pattern. This study has the academic and empirical contribution. In the perspectives of the academic contribution, non-audited companies that tend to be easily bankrupt and have the unstructured or easily manipulated financial data are classified by the data mining technology (Self-Organizing Map) rather than big sized audited firms that have the well prepared and reliable financial data. In the perspectives of the empirical one, even though the financial data of the non-audited firms are conducted to analyze, it is useful for find out the first order symptom of financial distress, which makes us to forecast the prediction of bankruptcy of the firms and to manage the early warning and alert signal. These are the academic and empirical contribution of this study. The limitation of this research is to analyze only 100 corporates due to the difficulty of collecting the financial data of the non-audited firms, which make us to be hard to proceed to the analysis by the category or size difference. Also, non-financial qualitative data is crucial for the analysis of bankruptcy. Thus, the non-financial qualitative factor is taken into account for the next study. This study sheds some light on the non-audited small and medium sized firms' distress prediction in the future.

The Role of the Soft Law for Space Debris Mitigation in International Law (국제법상 우주폐기물감축 연성법의 역할에 관한 연구)

  • Kim, Han-Taek
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.30 no.2
    • /
    • pp.469-497
    • /
    • 2015
  • In 2009 Iridium 33, a satellite owned by the American Iridium Communications Inc. and Kosmos-2251, a satellite owned by the Russian Space Forces, collided at a speed of 42,120 km/h and an altitude of 789 kilometers above the Taymyr Peninsula in Siberia. NASA estimated that the satellite collision had created approximately 1,000 pieces of debris larger than 10 centimeters, in addition to many smaller ones. By July 2011, the U.S. Space Surveillance Network(SSN) had catalogued over 2,000 large debris fragments. On January 11, 2007 China conducted a test on its anti-satellite missile. A Chinese weather satellite, the FY-1C polar orbit satellite, was destroyed by the missile that was launched using a multistage solid-fuel. The test was unprecedented for having created a record amount of debris. At least 2,317 pieces of trackable size (i.e. of golf ball size or larger) and an estimated 150,000 particles were generated as a result. As far as the Space Treaties such as 1967 Outer Space Treaty, 1968 Rescue Agreement, 1972 Liability Convention, 1975 Registration Convention and 1979 Moon Agreement are concerned, few provisions addressing the space environment and debris in space can be found. In the early years of space exploration dating back to the late 1950s, the focus of international law was on the establishment of a basic set of rules on the activities undertaken by various states in outer space.. Consequently environmental issues, including those of space debris, did not receive the priority they deserve when international space law was originally drafted. As shown in the case of the 1978 "Cosmos 954 Incident" between Canada and USSR, the two parties settled it by the memorandum between two nations not by the Space Treaties to which they are parties. In 1994 the 66th conference of International Law Association(ILA) adopted "International Instrument on the Protection of the Environment from Damage Caused by Space Debris". The Inter-Agency Space Debris Coordination Committee(IADC) issued some guidelines for the space debris which were the basis of "the UN Space Debris Mitigation Guidelines" which had been approved by the Committee on the Peaceful Uses of Outer Space(COPUOS) in its 527th meeting. On December 21 2007 this guideline was approved by UNGA Resolution 62/217. The EU has proposed an "International Code of Conduct for Outer Space Activities" as a transparency and confidence-building measure. It was only in 2010 that the Scientific and Technical Subcommittee began considering as an agenda item the long-term sustainability of outer space. A Working Group on the Long-term Sustainability of Outer Space Activities was established, the objectives of which include identifying areas of concern for the long-term sustainability of outer space activities, proposing measures that could enhance sustainability, and producing voluntary guidelines to reduce risks to long-term sustainability. By this effort "Guidelines on the Long-term Sustainability of Outer Space Activities" are being under consideration. In the case of "Declaration of Legal Principles Governing the Activities of States in the Exp1oration and Use of Outer Space" adopted by UNGA Resolution 1962(XVIII), December 13 1963, the 9 principles proclaimed in that Declaration, although all of them incorporated in the Space Treaties, could be regarded as customary international law binding all states considering the time and opinio juris by the responses of the world. Although the soft law such as resolutions, guidelines are not binding law, there are some provisions which have a fundamentally norm-creating character and customary international law. In November 12 1974 UN General Assembly recalled through a Resolution 3232(XXIX) "Review of the role of International Court of Justice" that the development of international law may be reflected, inter alia, by the declarations and resolutions of the General Assembly which may to that extend be taken into consideration by the judgements of the International Court of Justice. We are expecting COPUOS which gave birth 5 Space Treaties that it could give us binding space debris mitigation measures to be implemented based on space debris mitigation soft law in the near future.

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.