• Title/Summary/Keyword: invasion theory

Search Result 47, Processing Time 0.026 seconds

Ethan Frome: The 'Americanized' Narrative of the Invasion Theory (『이선 프롬』: 침범이론의 '미국적' 변형의 서사)

  • Kim, Meeyeon
    • Cross-Cultural Studies
    • /
    • v.52
    • /
    • pp.313-339
    • /
    • 2018
  • The purpose of this study is to explore the manner in which Edith Wharton's Ethan Frome conveys contemporary, (culturally) imperialistic ideology. Especially by focusing on the difference between the European germ (or invasion) theory and the 'Americanized' invasion theory, this paper elucidates how the American $20^{th}$ century fiction represents contemporary 'fear' of the immigration of non-whites, that generated anti-immigration public sentiment in early $20^{th}$ century America. Also, this study investigates how racial or gendered biases contribute to attributing all (societal or individual) evils or illnesses to minorities such as (non-Nordic or non-white) immigrants, including women. Wharton's Ethan Frome isn't short of reflecting cultural imperialism.

Availability of the metapopulation theory in research of biological invasion: Focusing on the invasion success (침입생물 연구에 대한 메타개체군 이론의 활용 가능성: 침입 성공을 중심으로)

  • Jaejun Song;Jinsol Hong;Kijong Cho
    • Korean Journal of Environmental Biology
    • /
    • v.40 no.4
    • /
    • pp.525-549
    • /
    • 2022
  • The process of biological invasion is led by the dynamics of a population as a demographic and evolutionary unit. Spatial structure can affect the population dynamics, and it is worth being considered in research on biological invasion which is always accompanied by dispersal. Metapopulation theory is a representative approach to spatially structured populations, which is chiefly applied in the field of ecology and evolutionary biology despite the controversy about its definition. In this study, metapopulation was considered as a spatially structured population that includes at least one subpopulation with significant extinction probability. The early phase of the invasion is suitable to be analyzed in aspects of the metapopulation concept because the introduced population usually has a high extinction probability, and their ecological·genetic traits determining the invasiveness can be affected by the metapopulation structure. Although it is important in the explanation of the prediction of the invasion probability, the metapopulation concept is rarely used in ecological research about biological invasion in Korea. It is expected that applying the metapopulation theory can supply a more detailed investigation of the invasion process at the population level, which is relatively inadequate in Korea. In this study, a framework dividing the invasive metapopulation into long- and middle-distance scales by the relative distance of movement to the natural dispersal range of species is proposed to easily analyze the effect of a metapopulation in real cases. Increased understanding of the mechanisms underlying invasions and improved prediction of future invasion risk are expected with the metapopulation concept and this framework.

The Impact of Information-Centric Force Improvements on Deterrence of Invasion: A Game-Theoretic Analysis (정보중심 전력증강의 전쟁억제 효과: 게임이론적 분석)

  • Cho, Jea-Yeong;Kim, Seung-Kwon
    • Journal of the military operations research society of Korea
    • /
    • v.31 no.1
    • /
    • pp.1-13
    • /
    • 2005
  • Due to the rapid developments in information and computer technology, the warfare paradigm is being transformed into information-centric and knowledge-based warfare. This atmosphere may have significant impact on the ROK armed forces' Force Improvement Plans (FIP) which is documented in 'Defense White Paper 2004'. We focus here on the relationship of information-centric force and deterrence of invasion. Particularly, we are interested in understanding the level of information superiority that might be required to deter the invasion. In order to solve this problem, we employed two-sided, zero-sum strategic game to simulate the outcome with six hypothetical cases devised by varying the level of information superiority.

Developing the online reviews based recommender models for multi-attributes using deep learning (딥러닝을 이용한 온라인 리뷰 기반 다속성별 추천 모형 개발)

  • Lee, Ryun-Kyoung;Chung, Namho;Hong, Taeho
    • The Journal of Information Systems
    • /
    • v.28 no.1
    • /
    • pp.97-114
    • /
    • 2019
  • Purpose The purpose of this study is to deduct the factors for explaining the economic behavior of an Internet user who provides personal information notwithstanding the concern about an invasion of privacy based on the Information Privacy Calculus Theory and Communication Privacy Management Theory. Design/methodology/approach This study made a design of the research model by integrating the factors deducted from the computation theory of information privacy with the factors deducted from the management theory of communication privacy on the basis of the Dual-Process Theory. Findings According to the empirical analysis result, this study confirmed that the Privacy Concern about forms through the Perceived Privacy Risk derived from the Disposition to value Privacy. In addition, this study confirmed that the behavior of an Internet user involved in personal information offering occurs due to the Perceived Benefits contradicting the Privacy Concern.

The Behavioral Attitude of Financial Firms' Employees on the Customer Information Security in Korea (금융회사의 고객정보보호에 대한 내부직원의 태도 연구)

  • Jung, Woo-Jin;Shin, Yu-Hyung;Lee, Sang-Yong Tom
    • Asia pacific journal of information systems
    • /
    • v.22 no.1
    • /
    • pp.53-77
    • /
    • 2012
  • Financial firms, especially large scaled firms such as KB bank, NH bank, Samsung Card, Hana SK Card, Hyundai Capital, Shinhan Card, etc. should be securely dealing with the personal financial information. Indeed, people have tended to believe that those big financial companies are relatively safer in terms of information security than typical small and medium sized firms in other industries. However, the recent incidents of personal information privacy invasion showed that this may not be true. Financial firms have increased the investment of information protection and security, and they are trying to prevent the information privacy invasion accidents by doing all the necessary efforts. This paper studies how effectively a financial firm will be able to avoid personal financial information privacy invasion that may be deliberately caused by internal staffs. Although there are several literatures relating to information security, to our knowledge, this is the first study to focus on the behavior of internal staffs. The big financial firms are doing variety of information security activities to protect personal information. This study is to confirm what types of such activities actually work well. The primary research model of this paper is based on Theory of Planned Behavior (TPB) that describes the rational choice of human behavior. Also, a variety of activities to protect the personal information of financial firms, especially credit card companies with the most customer information, were modeled by the four-step process Security Action Cycle (SAC) that Straub and Welke (1998) claimed. Through this proposed conceptual research model, we study whether information security activities of each step could suppress personal information abuse. Also, by measuring the morality of internal staffs, we checked whether the act of information privacy invasion caused by internal staff is in fact a serious criminal behavior or just a kind of unethical behavior. In addition, we also checked whether there was the cognition difference of the moral level between internal staffs and the customers. Research subjects were customer call center operators in one of the big credit card company. We have used multiple regression analysis. Our results showed that the punishment of the remedy activities, among the firm's information security activities, had the most obvious effects of preventing the information abuse (or privacy invasion) by internal staff. Somewhat effective tools were the prevention activities that limited the physical accessibility of non-authorities to the system of customers' personal information database. Some examples of the prevention activities are to make the procedure of access rights complex and to enhance security instrument. We also found that 'the unnecessary information searches out of work' as the behavior of information abuse occurred frequently by internal staffs. They perceived these behaviors somewhat minor criminal or just unethical action rather than a serious criminal behavior. Also, there existed the big cognition difference of the moral level between internal staffs and the public (customers). Based on the findings of our research, we should expect that this paper help practically to prevent privacy invasion and to protect personal information properly by raising the effectiveness of information security activities of finance firms. Also, we expect that our suggestions can be utilized to effectively improve personnel management and to cope with internal security threats in the overall information security management system.

  • PDF

A Study on the Internet User's Economic Behavior of Provision of Personal Information: Focused on the Privacy Calculus, CPM Theory (개인정보 제공에 대한 인터넷 사용자의 경제적 행동에 관한 연구: Privacy Calculus, CPM 이론을 중심으로)

  • Kim, Jinsung;Kim, Jongki
    • The Journal of Information Systems
    • /
    • v.26 no.1
    • /
    • pp.93-123
    • /
    • 2017
  • Purpose The purpose of this study is to deduct the factors for explaining the economic behavior of an Internet user who provides personal information notwithstanding the concern about an invasion of privacy based on the Information Privacy Calculus Theory and Communication Privacy Management Theory. Design/methodology/approach This study made a design of the research model by integrating the factors deducted from the computation theory of information privacy with the factors deducted from the management theory of communication privacy on the basis of the Dual-Process Theory. In addition, this study, did empirical analysis of the path difference between groups by dividing Internet users into a group having experience in personal information spill and another group having no experience. Findings According to the empirical analysis result, this study confirmed that the Privacy Concern about forms through the Perceived Privacy Risk derived from the Disposition to value Privacy. In addition, this study confirmed that the behavior of an Internet user involved in personal information offering occurs due to the Perceived Benefits contradicting the Privacy Concern.

A Study of Huatuo's Shang-han (Cold Damage) Theory (화타상한(華佗傷寒)에 관(關)한 소고(小考))

  • Kang, Min-Whee;Lee, Byung-Wook;Kim, Ki-Wook
    • The Journal of Korean Medical History
    • /
    • v.31 no.1
    • /
    • pp.71-87
    • /
    • 2018
  • This study investigated Hua Tuo's Shang-han theory, which precedes the period of Zhang Zhong Jing's Shang-han theory, and considers the relationship between the two approaches. Researchers compared terminology and language of Hua Tuo's Shang-han theory as published in Theory in Qian Jin Yao Fang and Wai Tai Mi Yao, with Zhang Zhong Jing's Shang-han theory. In Hua Tuo's theory, Shang-han involves pathogenic invasion of the body surface, where the pathogen transforms to 6 different stages, Pi (皮), Fu (膚), Ji (肌), Xiong (胸), Fu (腹), Wei (胃). Among these, the stage sof Pi (皮), Fu (膚), Ji (肌) can be considered as exterior syndrome (表證). Those that invade the lower chest can be considered as lower chest disease, and those that violate the abdomen or stomach can be considered as Interior heat excess syndrome (裏熱實證). Stomach heat excess syndrome (胃中實熱證) is the most severe and is similar to septicaemia or bubonic plague. Hua Tuo's treatment used three methods which are 汗 (perspiration), 吐 (emesis), 下 (purgation). In the case of Phlegm syndrome (痰?證), HuoTuo's theory was similar to Zhang Zhong Jing's Shang-han exterior syndrome (傷寒表證) and therefore used Zhuling-powder (猪?散). In the case of deficiency hot flush Syndrome (虛煩證) in Shang-han disease, HuoTuo uses ZhuYe-decoction (竹葉湯), of which the drug contents is the same as Zhang Zhong Jing's ZhuYeShiGao-decoction (竹葉石膏湯), which was used for the same condition.

Ultrastructure of the tympanic mucosa in experimentally produced serous otitis media (고양이에서 유발된 장액성중이염시 중이점막의 미세구조에 관한 연구)

  • Park, Soon-Il;Yoon, Kang-Mook;Shim, Sang-Yul
    • Applied Microscopy
    • /
    • v.12 no.1
    • /
    • pp.1-10
    • /
    • 1982
  • Serous otitis media is closely related with auditory tube function, but its etiology and pathogenesis are not clearly defined yet. So we tried to prove the theory of hydrops ex vacuo via the experimental study with cats by means of obstructing the pharyngeal orfice of the auditory tube and observe the serial changes in tympanic mucosa through light and electron microscopy. The results are as follows; 1. We confirmed the production of serous otitis media with auditory tube obstruction and have a new understanding of auditory tube function in middle ear aeration. 2. The effusion in serous otitis media was produced from the next day of experiment and increased till the fourteenth day, but decreased after the spontaneous perforation of ear drum. 3. Through the light microscopy, we observed the increasement of the sercretory cells including goblet cells, epithelial hyperplasia, capillary proliferation and invasion of inflammatory cells. 4. Through the elctron microscopy, we observed the protrusion of secretory cells, blobs in cilia, loss of cilia, increasement of vesicles, vacuoles and dense bodies in ciliated cells and Invasion of inflammatory cells. With above results, we concluded that aeration through auditory tube is the most important factor in serous otitis media and presumed the effusion was secreted by secretory cells.

  • PDF

A Case report of acute stroke patients treated with Chungyoung-tang (청영탕(淸營湯)으로 신진장애를 가진 중풍 초기 환자 치험례)

  • Cho, Yoon-Seong;Jung, Eun-Woo;Kim, So-Yeon;Kim, Hyun-Sik;Lee, Sang-Kwan
    • Herbal Formula Science
    • /
    • v.15 no.2
    • /
    • pp.171-178
    • /
    • 2007
  • This study is clinical report for a acute stroke patient who was improved by treatment of a herbal medication. Stroke patients often shows spirit disorder in early stage. However, the cases which applied Onbyung theory are rare. This paper aims to show that Onbyung theory can be effective to acute stroke. We diagnosed the patient as invasion of the yong system by heat(熱入營分), which showed confusion, insomnia, delirium, anxiety, reddened tongue and dry mouth with cracked lip. After administration of Chungyung-tang(淸營湯) in Wen bing Tiao (溫病條辨), the patient showed those symptoms were highly improved. Thus, we concluded that Onbyung Theory can the patient be adapted to improve the symptom of acute stroke.

  • PDF

A study on the mutual relation between logic of Simjuriseol and the movement to "reject heterodoxy" of Yi, Hang-no (화서(華西) 이항로(李恒老)의 심설(心說)과 척사논리(斥邪論理)의 상관(相關) 관계(關係))

  • Park, Sung-soon
    • (The)Study of the Eastern Classic
    • /
    • no.34
    • /
    • pp.257-286
    • /
    • 2009
  • Yi, Hang-no said that taiji(=li) was Myeong-deok(illustrious virtue), the core of mind and heart, emphasizing the sides of superintendent and mysterious ability of li. It seems that he aimed to stress the upper status of li than qi, out of earlier general theory on mind and heart recognizing both li and qi consisted in the mind and heart. Through it, he wanted to say that only human being had moral mind like taiji and upper moral status than animals which human being should keep. The reason that Yi, Hang-no emphasized the difference between li and qi was because of a critical mind that the upper value of li than qi should not be changed and it would be the most dangerous situation if the value collapsed. Like this, Yi, Hang-no's attitude emphasizing li in his theory of mind and heart eventually aimed to explain the theory of Insim(Desire to be) and Dosim(Moral Mind). Yi, Hang-no's disciples testified that their teacher, Yi, Hang-no had cost his whole life to study the theory of Insim and Dosim. This means that Yi, Hang-no had tried to discriminate between Insim and Dosim, and to block private desires in Insim. The fact that Yi, Hang-no stressed the importance of the theory of Insim and Dosim had to do with the special situation that Western Power approached Joseon dynasty. Because Yi, Hang-no opposed the Westerner's moral consciousness for individual desires, against heavenly orders. To overcome the Western challenge, Yi, Hang-no strived to notice that taiji was the core of human mind. The point that Yi, Hang-no wanted to say was that Dosim(Moral Mind) was just the heavenly orders which human being couldn't disobey. Yi, Hang-no thought that Joseon couldn't defence Western flow without this theory of Insim and Dosim. Just after French invasion(1866), Yi, Hang-no was selected as a high-leveled bureaucrat, so he insisted his opinions for rejecting heterodoxy by the letters to the throne several times. The letters also contained his theory of Insim and Dosim mainly. Insisting fight against Western Power and prohibition of trade with Western Power, Yi, Hang-no eventually emphasized the king's right mind(Dosim) as a main and sole means to achieve all the goals he said. In conclusion, Yi, Hang-no's theory on mind and heart was as it is reflected in his letters to the throne. Therefore we can see that Yi, Hang-no's theory on mind and heart had harmonized with his movement to "Rejecting Heterodoxy".