The purpose of this study is to contribute to the revitalization of the 6th industry by presenting suggestions on how to utilize agricultural food mobile SNS and how to purchase intention. In this study, the mobile SNS, which is rapidly emerging as a new marketing channel, was applied to the agricultural and food sector to conduct a empirical analysis. First of all, the characteristics of agricultural food-related mobile SNS that affect the purchasing intent of agricultural food were derived, and the indirect effects of consumer attitudes were analyzed in relation to the perceived characteristics of the mobile SNS for the agricultural food and the purchase intention. First, information quality and ease of access have a significant effect on cognitive attitude (+), and playfulness, information quality, ease of access have a significant effect on emotional attitude (+), and playfulness, interactivity have a significant effect on an acting attitude (+). Second, information quality, accessibility, and playfulness have a significant effect on purchase intention (+), and the quality of information has the greatest influence. Third, it was analyzed that information quality, interactivity, ease of accessibility, and playfulness have an indirect effect of consumer attitude in the path of purchase through consumer attitude. From the results of this study, it was confirmed that efforts to improve the quality of information in the case of mobile SNS related to agricultural and food products are needed first, that to improve the purchasing intent, we need to establish a mobile SNS operating strategy and marketing strategy for enhance consumer attitudes in a favorable. On the other hand, related education and system cooperation methods should be prepared to enable agricultural and food companies to use mobile SNS as a marketing tool.
Journal of the Korea Institute of Information Security & Cryptology
/
v.29
no.3
/
pp.519-529
/
2019
Nowadays, intelligent Android malware applies anti-analysis techniques to hide malicious behaviors and make it difficult for anti-virus vendors to detect its presence. Malware can use background components to hide harmful operations, use activity-alias to get around with automation script, or wipe the logcat to avoid forensics. During our study, several static analysis tools can not extract these hidden components like main activity, and dynamic analysis tools also have problem with code coverage due to partial execution of android malware. In this paper, we design and implement a system to analyze intelligent malware that uses anti-analysis techniques to improve detection rate of evasive malware. It extracts the hidden components of malware, runs background components like service, and generates all the intent events defined in the app. We also implemented a real-time logging system that uses modified logcat to block deleting logs from malware. As a result, we improve detection rate from 70.9% to 89.6% comparing other container based dynamic analysis platform with proposed system.
Journal of the Korea Fashion and Costume Design Association
/
v.22
no.2
/
pp.167-180
/
2020
The purpose of this study is to present the use of traditional culture and the direction of various fashion designs by developing and producing contemporary fashion designs on the Muslim costumes of the Chinese Hui minority. Based on research methods, the cultural background was investigated and the design characteristics were summarized. Based on the results of this survey, 4 sets of women's fashion were designed. The design intent was to feature Muslim traditional costumes and to adopt a functional contemporary design. The conclusions of this study are as follows. First, simple and indecisive clothing shows the innocent and good side of the congregation. In this study, traditional dresses were used to make use of the simple silhouette and color, and to create a contemporary atmosphere, various materials, such as wool, glossy industrial complex, lace, and fur were used to create a modern sense design by adding diversity to the simple silhouette. Second, the biggest feature of the regimented Muslim costume focuses on a head cover and suggests a contemporary sense of hood improvement, and a design that can be used with two sides. These hooded head covers can provide fashion and diversity and can be proposed as functional. Third, contemporary Muslim fashion is gaining global attention and it is possible to develop various fashion designs based on traditional motifs. This study was able to increase the feminine image by changing the solemnity of the communal dress without discarding the foundation of the traditional religious culture based on the daily dress of the people.
Journal of Information Technology Applications and Management
/
v.26
no.4
/
pp.51-69
/
2019
One of the most considerate phenomena of the era of the Fourth Industrial Revolution is the use of digital devices. Digitalization is rapidly advancing through all areas of industry and life. Customer journey with digitalization is looking totally different from previous customer journey. The research targets were users of fashion, automobiles, cosmetics and online shopping malls. We analyzed 300 people for each valid questionnaire. The results of the study are as follows. First, it has been proven that digital experience affects positive (+) impact on purchasing intention and positive (+) impact on recommending intention and negative impact (-) on switching intent and subsequently affects positive impact (+) to purchase and incase of switching intent, negative impact (-) to purchase. Unlike traditional methods such as SPC(Service Profit Chain), the Digital experience to Purchase process Chain (DPC) has been identified to be suitable in the digital age. Second, the digital satisfied group (5 score-very satisfaction) has shown same result as above. However the digital neutral group (even though 4 score- satisfaction in five-point scale), specially in a highly competitive industry, has different from the satisfied group and 3 score-normal is same as dissatisfied group. It means that this group is that If there is a high level of attractiveness of substitute goods, there is a high possibility of switching them. It has supported Jones and Sasser [1995] that there have been two types of loyalty of true long-term loyalty and what we call false loyalty in the highly competitive industry zone which is commoditization or low differentiation, many substitutes, low cost of switching. Identifying true loyalty and false loyalty is crucial to establishing a customer experience strategy. it is necessary to actively utilize long-term digital experiences strategy to increase the total satisfaction of digital experience through all of customer purchasing journey in order to enhance the digital customer experience. It is difficult to see the effect as a one-time event. It should be scaled over the entire customer purchase process over a long period of time, which can positively affect purchase intention, recommendation intention, and conversion intention. This is also why it is difficult for second-runners to overtake first-runners in a short period.
Journal of Korean Library and Information Science Society
/
v.45
no.1
/
pp.149-171
/
2014
This study makes some suggestions to cluster works from the search result of library databases. Specifically, the author suggests modifying the current practices and rules of KORMARC 24X field based on intent of RDA, which is the new cataloging standard. After identifying some problems in entering bibliographic data into 24X field, the author proposes solutions to such problems. The solutions include improvements in (1) Goanje description (관제기술), (2) use of uniform title, and (3) processing of marks, etc. The study demonstrates that users can conduct a fronted keyword searching effectively and identify the relevant bibliographic records easily from the clustered search results.
Proceedings of the Korean Institute of Information and Commucation Sciences Conference
/
2004.05b
/
pp.776-779
/
2004
With the rapid progress of information technique, it is getting more difficult to protect information systems from cyber terrorism, because of bugs and vulnerabilities of software and the properties of cyberspace such as anonymity. furthermore cyber terror techniques are highly developed and complicated and their use for a malicious intent and a military purpose are increasing recently. Therefore a study of warfare attack technology on the cyber space is necessary for establishing trusted society and further national security. Specially, worms/viruses are becoming a more common occurrence on the cyber space. Also, The worm caused a great deal of damage to the large number of networks around the world in a very short period of time. Therefore, we will describe worms/viruses in the warfare attack technique in this paper.
Objectives: Among many new drugs that are under investigation with intent to treat cancer, oral kinase inhibitors are proven to be effective in numerous clinical trials and easy to administer. Due to these advantages the use of oral kinase inhibitors is increasing. Oral kinase inhibitors are metabolized by CYP450 which can result either increase of adverse effect or decrease of drug effect by drug interaction when used concurrently with other agents. In this research, the medication records of patients on oral kinase inhibitors from Oct. 2010 to Nov. 2011 were reviewed to investigate potential drug interactions. Methods: From Oct. 2010 to Nov. 2011, cancer patients in Inha University Hospital who took oral kinase inhibitors more than once were included. The patients' medication records were reviewed to list out concurrent medications that have interaction potential with oral kinase inhibitors, the frequency of concurrent use, and the severity of interaction result using Micromedex$^{(R)}$ and Lexicomp-online$^{(R)}$ as references. Results: As a result, 90 cases of drug with interaction potential were prescribed by Micromedex$^{(R)}$ and 179 cases by Lexicomp-online$^{(R)}$ data. In case of severity, 33.3% by Micromedex$^{(R)}$ and 26.3% by Lexicomp-online$^{(R)}$ were categorized as Major and 65.6% by Micromedex$^{(R)}$ and 72.6% by Lexicomp-online$^{(R)}$ as Moderate. The number of adverse events was 92 cases which 58.7% were on skin and 19.6% on Gastro-intestinal tract. Conclusions: Considerable number of drug with interaction potential was used though each oral kinase inhibitors showed differences in extent. Hence there exists the risk of drug interaction in patients taking oral kinase inhibitors with other drugs.
The use of agent paradigm in today's applications is hampered by the security concerns of agents and hosts alike. The agents require the presence of a secure and trusted execution environment; while hosts aim at preventing the execution of potentially malicious code. In general, hosts support the migration of agents through the provision of an agent server and managing the activities of arriving agents on the host. Numerous studies have been conducted to address the security concerns present in the mobile agent paradigm with a strong focus on the theoretical aspect of the problem. Various proposals in Intrusion Detection Systems aim at securing hosts in traditional client-server execution environments. The use of such proposals to address the security of agent hosts is not desirable since migrating agents typically execute on hosts as a separate thread of the agent server process. Agent servers are open to the execution of virtually any migrating agent; thus the intent or tasks of such agents cannot be known a priori. It is also conceivable that migrating agents may wish to hide their intentions from agent servers. In light of these observations, this work attempts to bridge the gap from theory to practice by analyzing the security mechanisms available in Aglet. We lay the foundation for implementation of application specific protocols dotted with access control, secured communication and ability to detect tampering of agent data. As agents exists in a distributed environment, our proposal also introduces a novel security framework to address the security concerns of hosts through collaboration and pattern matching even in the presence of differing views of the system. The introduced framework has been implemented on the Aglet platform and evaluated in terms of accuracy, false positive, and false negative rates along with its performance strain on the system.
Proceedings of the Korean Institute of Information and Commucation Sciences Conference
/
2019.05a
/
pp.163-164
/
2019
In this study, we compared the differences between groups in a model that investigates the effect of smartphone users on the intent to use continuously. There are various methodologies for group difference analysis, but in this study, we try to verify the size comparison of regression analysis $R^2$. In order to analyze the difference between groups, we try to prove through hypothesis test whether there is a meaningful difference in the intention of continuous use of Korean and Chinese smartphone users collected through previous research. The results of the analysis are useful as a method to determine whether smartphone users in China and Korea are aware of differences or not. According to this procedure, first, the formula for calculating Z-transformation of Fisher and Z-score test statistic calculation formula were used. However, this methodology is also used in the verification of control effect using correlation coefficient. Also, the theoretical implications are presented based on the analysis results.
Background and objective: This study was conducted to obtain empirical data for deriving necessary items for the creation and management of gardens in urban agricultural parks while maintaining the publicness of the place by examining the difference in perception among park visitors about the gardens in the public parks. Methods: A survey was conducted on users of urban agricultural parks in 6 locations and 113 copies of the questionnaire were collected. After understanding the demographic characteristics and the current use of the garden, we identified the importance of the necessary items for the public gardens. Results: 108 subjects(95.6%) responded that gardens are needed in urban parks, for psychological and emotional health (26.2%) and for interaction and friendship with family and neighbors(23.2%). For use of garden crops, most were private sales(96 subjects, 64.4%), and both sales preferred to partially donate their crops. Most used communal gardens operated by public institutions(30.1%). It was found that 96.4% of the respondents were satisfied with gardening activities, and 107(94.7%) of them showed their intention to participate in the gardening in the future. The Kaiser Meyer Olkin value was .848 and the significance level was .001, proving the validity of factor analysis. The factors were named composition elements(Factor 1), management items(Factor 2), convenience elements(Factor 3), and operational facilities(Factor 4). In the survey on the creation and management of gardens in urban agricultural parks, there were no statistically significant differences, but all items had correlations. Conclusion: The results have reflected the needs of actual users in establishing the plans to operate urban gardens, thereby having great utility value as the basic data for continuous garden management. Further research can be conducted to derive detailed elements that can guarantee sustainability of urban gardens and suggest high-quality data for management of gardens in urban agricultural parks.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.