• Title/Summary/Keyword: key for identification

Search Result 936, Processing Time 0.028 seconds

A taxonomic study on six section subgenus Vigena Nees of Carex L. (Cyperaceae) in Korea (한국산 괭이사초아속(subgen. Vignea Nees) 6절의 분류 형질에 관한 연구)

  • Oh, Yong Cha;Jo, Mi Jung
    • Korean Journal of Plant Taxonomy
    • /
    • v.33 no.3
    • /
    • pp.227-253
    • /
    • 2003
  • Morphological characters of C. kobomugi, C. gibba, C. echinata. C. remotiuscula. C. maakii. C. curta, and C. loliacea of genus Carex were rexamined. The epidermal patterns of perigynium, achene and leaf were investigated using by a scanning electron microscope(SEM) and a light microscope(LM). Morphological characters. such as length and width of stem and leaf, sheath, bract, spike, scale, perigynium, beak of perigynium, length of spike peduncle, size, and frequency of stomatal complex of leaf, number of bract, shape of stem transection, scale and apex of scale, beak and base of perigynium, achene, epidermal cell and cell wall of perigynium, achene, leaf epidermal patterns (fundamental epidermal cell and cell wall, silica body, subsidiary cell), hair, papillae, prickle present/absent of perigynium and leaf were useful for the identification of observed seven taxa. Examined six taxa of section Macrocephalae, Gibbae, Stellulatae, Elongatae, Ovales, and Heleonates were distint from each other with respect of length and width stem, leaf, bract, perigynium, perigynium beak, lenght of spike peduncle, perigynium, and leaf. A key based on data was presented here.

A taxanomic study on sections Foetidae, Arenariae, and Multiflorae of Carex L. in Korea(Cyperaceae) (한국산 사초속 진퍼리사초절, 까락사초절과 괭이사초절에 관한 분류학적 연구)

  • Oh, Yong Cha;Kim, Ji Hye
    • Korean Journal of Plant Taxonomy
    • /
    • v.32 no.3
    • /
    • pp.257-292
    • /
    • 2002
  • Morphological characters of sections Foetidae(one taxon), Arenariae(one taxon) and Multiflorae(six taxa) of genus Carex(Cyperaceae) were reexamined. The epidermal patterns of perigynium, achene and leaf were investigated using by a scanning electron microscope(SEM) and a light microscope(LM). Morphological characters, such as length and width of stem, leaf, leaf sheath, bract, spike, scale, perigynium and beak of perigynium, length of spike peduncle, size and frequency of stomatal complex of leaf, number of bract, shape of stem transection, scale and apex of scale, beak and base of perigynuim, achene, epidermal cell and cell wall of perigynium, achene, leaf epidermal patterns(fundamental epidermal cell and cell wall, silica body, subsidiary cell), hair, papillae present/absent of perigynium, and leaf were useful for the identification of observed eight taxa. According to the current study, examined eight taxa of sections Foetidae, Arenariae and Multiflorae were distinct from each other with respect to length and width of stem, leaf, bract, perigynium, perigynium beak, length of spike peduncle, shape of bract, scale and apex of scale, perigynium, perigynium beak, hair presence/absence of perigynium and leaf. A key based on data was presented here.

Identification of C4orf32 as a Novel Type I Endoplasmic Reticulum Resident Membrane Protein (Type I 소포체 목표화 막단백질에 속하는 새로운 C4orf32 막단백질의 동정)

  • Lee, Seung-Hwan;Park, Sang-Won;Lee, Jin-A;Jang, Deok-Jin
    • Journal of Life Science
    • /
    • v.29 no.9
    • /
    • pp.949-954
    • /
    • 2019
  • Membrane topology is a key characteristic of membrane proteins. We previously reported the cloning of the chromosome 4 open-reading frame 32 (C4orf32) gene as a potential membrane protein; however, the cellular localization and membrane topology of C4orf32 was as yet unknown. In this study, we found that green fluorescent protein (GFP) fused to the C-terminus of C4orf32 (C4orf32-GFP) was localized to the endoplasmic reticulum (ER). We applied three tools to identify determinants of C4orf32 topology: protease protection, fluorescence protease protection (FPP), and an inducible system using the ternary complex between FK506 binding protein 12 (FKBP), rapamycin, and the rapamycin-binding domain of mTOR (FRB) (the FRB-rapamycin-FKBP system). Using protease protection and FPP assays, we found that the GFP tag in C4orf32-GFP was localized to the cytoplasmic surface of the ER membrane of HeLa cells. Protease protection and FPP assays are useful and complimentary tools for identifying the topology of GFP fusion membrane proteins. The FRB-rapamycin-FKBP system was also used to study the topology of C4orf32. In the absence of rapamycin, a monomeric red fluorescent protein-FKBP fusion (mRFP-FKBP) and C4orf32-GFP-FRB were localized to the cytoplasm and the ER membrane, respectively. However, in the presence of rapamycin, the mRFP-FKBP was shifted from the cytoplasm to the ER and colocalized with the C4orf32-GFP-FRB. These results indicate that the FRB moiety is facing the cytoplasmic surface of ER membrane. Overall, our results clearly suggest that C4orf32 belongs to the family of type I ER resident membrane proteins.

A Placeness and Identification on the Place Names of Geomorphological Landscape in Jukdo, Yangyang (양양 죽도의 장소성과 지형경관의 지명 고찰 및 비정)

  • Rho, Jae-hyun
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.37 no.3
    • /
    • pp.37-48
    • /
    • 2019
  • This study, which starting from Yangyang Jukdo's topography formation and questioning revealed in landscape guide and landscape commentary board, is to sort out the characteristics of Jukdo natural landscape through literature research, field observation research and stakeholder interview as part of the proper recognition of Jokdo landscape and search for landscape resources, and pursued a review of nominations and criticism. The results of this study are summarized as follows. Yangyang Jukdo is an island named because it was full of blue bamboo. From before the first half of the 14th Century. to the middle of the 18th Century., there was a Gwanlan-pavilion to see the sea and the bamboo in the west. The time when the original island, the Jukdo, have been a land-tied island connected with the land by the tombolo formed by the erosion of the sand. It is located at the end of the 14th Century. and before the middle of the 18th Century. In Jukdo, colorful weathered terrains, coastal terrain, and structural terrain formed by long-time weathering are found. Among them, the type of weathering, the tafoni style and the gnamma style are the scenic landscapes with the key stories of legend and poetry that are brought to Jukdo. In addition, there are seven kinds of letters caved in the rocks in Jukdo. The rocks found on the coast, basketball cannons, shrines, and sutras are seen as shrouds based on a Taoist hermit motifs and style. In addition, it can be interred from the photography of "jeongssisejeog" that the souvenir of Jukdo was the family of Chogyejeong of mid 18th Century. In terms of observational geography and poetry, Jukdo has been handed down a great deal of missionary color with key motifs such as 'Jukdo-seongoo', 'Jukdo-Dolgooyoo', or 'Stone mortar of Taoist hermit' It is proved that the pearl which is called 'The stone of the Taoist hermit' is a porthole formed in a separate space rather than the topography of the geomorphology in terms of shape, size and function. Currently named Shun-tang is a product of the ridiculous 'naming' of interest. The present landscape guide and commentary is not only incompatible with the place of Jukdo, but also does not match the traditional cultural landscape. Future scenery information such as guide signs and commentary boards should be improved in the direction of positively highlighting the stories and motifs related to the present that are present in order to enhance the landscape identity of Yangyang Jukdo.

Electronic Word-of-Mouth in B2C Virtual Communities: An Empirical Study from CTrip.com (B2C허의사구중적전자구비(B2C虚拟社区中的电子口碑): 관우휴정려유망적실증연구(关于携程旅游网的实证研究))

  • Li, Guoxin;Elliot, Statia;Choi, Chris
    • Journal of Global Scholars of Marketing Science
    • /
    • v.20 no.3
    • /
    • pp.262-268
    • /
    • 2010
  • Virtual communities (VCs) have developed rapidly, with more and more people participating in them to exchange information and opinions. A virtual community is a group of people who may or may not meet one another face to face, and who exchange words and ideas through the mediation of computer bulletin boards and networks. A business-to-consumer virtual community (B2CVC) is a commercial group that creates a trustworthy environment intended to motivate consumers to be more willing to buy from an online store. B2CVCs create a social atmosphere through information contribution such as recommendations, reviews, and ratings of buyers and sellers. Although the importance of B2CVCs has been recognized, few studies have been conducted to examine members' word-of-mouth behavior within these communities. This study proposes a model of involvement, statistics, trust, "stickiness," and word-of-mouth in a B2CVC and explores the relationships among these elements based on empirical data. The objectives are threefold: (i) to empirically test a B2CVC model that integrates measures of beliefs, attitudes, and behaviors; (ii) to better understand the nature of these relationships, specifically through word-of-mouth as a measure of revenue generation; and (iii) to better understand the role of stickiness of B2CVC in CRM marketing. The model incorporates three key elements concerning community members: (i) their beliefs, measured in terms of their involvement assessment; (ii) their attitudes, measured in terms of their satisfaction and trust; and, (iii) their behavior, measured in terms of site stickiness and their word-of-mouth. Involvement is considered the motivation for consumers to participate in a virtual community. For B2CVC members, information searching and posting have been proposed as the main purpose for their involvement. Satisfaction has been reviewed as an important indicator of a member's overall community evaluation, and conceptualized by different levels of member interactions with their VC. The formation and expansion of a VC depends on the willingness of members to share information and services. Researchers have found that trust is a core component facilitating the anonymous interaction in VCs and e-commerce, and therefore trust-building in VCs has been a common research topic. It is clear that the success of a B2CVC depends on the stickiness of its members to enhance purchasing potential. Opinions communicated and information exchanged between members may represent a type of written word-of-mouth. Therefore, word-of-mouth is one of the primary factors driving the diffusion of B2CVCs across the Internet. Figure 1 presents the research model and hypotheses. The model was tested through the implementation of an online survey of CTrip Travel VC members. A total of 243 collected questionnaires was reduced to 204 usable questionnaires through an empirical process of data cleaning. The study's hypotheses examined the extent to which involvement, satisfaction, and trust influence B2CVC stickiness and members' word-of-mouth. Structural Equation Modeling tested the hypotheses in the analysis, and the structural model fit indices were within accepted thresholds: ${\chi}^2^$/df was 2.76, NFI was .904, IFI was .931, CFI was .930, and RMSEA was .017. Results indicated that involvement has a significant influence on satisfaction (p<0.001, ${\beta}$=0.809). The proportion of variance in satisfaction explained by members' involvement was over half (adjusted $R^2$=0.654), reflecting a strong association. The effect of involvement on trust was also statistically significant (p<0.001, ${\beta}$=0.751), with 57 percent of the variance in trust explained by involvement (adjusted $R^2$=0.563). When the construct "stickiness" was treated as a dependent variable, the proportion of variance explained by the variables of trust and satisfaction was relatively low (adjusted $R^2$=0.331). Satisfaction did have a significant influence on stickiness, with ${\beta}$=0.514. However, unexpectedly, the influence of trust was not even significant (p=0.231, t=1.197), rejecting that proposed hypothesis. The importance of stickiness in the model was more significant because of its effect on e-WOM with ${\beta}$=0.920 (p<0.001). Here, the measures of Stickiness explain over eighty of the variance in e-WOM (Adjusted $R^2$=0.846). Overall, the results of the study supported the hypothesized relationships between members' involvement in a B2CVC and their satisfaction with and trust of it. However, trust, as a traditional measure in behavioral models, has no significant influence on stickiness in the B2CVC environment. This study contributes to the growing body of literature on B2CVCs, specifically addressing gaps in the academic research by integrating measures of beliefs, attitudes, and behaviors in one model. The results provide additional insights to behavioral factors in a B2CVC environment, helping to sort out relationships between traditional measures and relatively new measures. For practitioners, the identification of factors, such as member involvement, that strongly influence B2CVC member satisfaction can help focus technological resources in key areas. Global e-marketers can develop marketing strategies directly targeting B2CVC members. In the global tourism business, they can target Chinese members of a B2CVC by providing special discounts for active community members or developing early adopter programs to encourage stickiness in the community. Future studies are called for, and more sophisticated modeling, to expand the measurement of B2CVC member behavior and to conduct experiments across industries, communities, and cultures.

A study on the CRM strategy for medium and small industry of distribution (중소유통업체의 CRM 도입방안에 관한 연구)

  • Kim, Gi-Pyoung
    • Journal of Distribution Science
    • /
    • v.8 no.3
    • /
    • pp.37-47
    • /
    • 2010
  • CRM refers to the operating activities that always maintain and promote good relationship with customers to ultimately maximize the company's profits by understanding the value of customers to meet their demands, establishing a strategy which may maximize the Life Time Value and successfully operating the business by integrating the customer management processes. In our country, many big businesses are introducing CRM initiatively to use it in marketing strategy however, most medium and small sized companies do not understand CRM clearly or they feel difficult to introduce it due to huge investment needed. This study is intended to present CRM promotion strategy and activities plan fit for the medium and small sized companies by analyzing the success factors of the leading companies those have already executed CRM by surveying the precedents to make the distributors out of the industries have close relation with consumers to overcome their weakness in scale and strengthen their competitiveness in such a rapidly changing and fiercely competing market. There are 5 stages to build CRM such as the recognition of the needs of CRM establishment, the establishment of CRM integrated database, the establishment of customer analysis and marketing strategy through data mining, the practical use of customer analysis through data mining and the implementation of response analysis and close loop process. Through the case study of leading companies, CRM is needed in types of businesses where the companies constantly contact their customers. To meet their needs, they assertively analyze their customer information. Through this, they develop their own CRM programs personalized for their customers to provide high quality service products. For customers helping them make profits, the VIP marketing strategy is conducted to keep the customers from breaking their relationships with the companies. Through continuous management, CRM should be executed. In other words, through customer segmentation, the profitability for the customers should be maximized. The maximization of the profitability for the customers is the key to CRM. These are the success factors of the CRM of the distributors in Korea. Firstly, the top management's will power for CS management is needed. Secondly, the culture across the company should be made to respect the customers. Thirdly, specialized customer management and CRM workers should be trained. Fourthly, CRM behaviors should be developed for the whole staff members. Fifthly, CRM should be carried out through systematic cooperation between related departments. To make use of the case study for CRM, the company should understand the customer and establish customer management programs to set the optimal CRM strategy and continuously pursue it according to a long-term plan. For this, according to collected information and customer data, customers should be segmented and the responsive customer system should be designed according to the differentiated strategy according to the class of the customers. In terms of the future CRM, integrated CRM is essential where the customer information gathers together in one place. As the degree of customers' expectation increases a lot, the effective way to meet the customers' expectation should be pursued. As the IT technology improved rapidly, RFID (Radio Frequency Identification) appears. On a real-time basis, information about products and customers is obtained massively in a very short time. A strategy for successful CRM promotion should be improving the organizations in charge of contacting customers, re-planning the customer management processes and establishing the integrated system with the marketing strategy to keep good relation with the customers according to a long-term plan and a proper method suitable to the market conditions and run a company-wide program. In addition, a CRM program should be continuously improved and complemented to meet the company's characteristics. Especially, a strategy for successful CRM for the medium and small sized distributors should be as follows. First, they should change their existing recognition in CRM and keep in-depth care for the customers. Second, they should benchmark the techniques of CRM from the leading companies and find out success points to use. Third, they should seek some methods best suited for their particular conditions by achieving the ideas combining their own strong points with marketing. Fourth, a CRM model should be developed that will promote relationship with individual customers just like the precedents of small sized businesses in Switzerland through small but noticeable events.

  • PDF

An Examination of Knowledge Sourcing Strategies Effects on Corporate Performance in Small Enterprises (소규모 기업에 있어서 지식소싱 전략이 기업성과에 미치는 영향 고찰)

  • Choi, Byoung-Gu
    • Asia pacific journal of information systems
    • /
    • v.18 no.4
    • /
    • pp.57-81
    • /
    • 2008
  • Knowledge is an essential strategic weapon for sustaining competitive advantage and is the key determinant for organizational growth. When knowledge is shared and disseminated throughout the organization, it increases an organization's value by providing the ability to respond to new and unusual situations. The growing importance of knowledge as a critical resource has forced executives to pay attention to their organizational knowledge. Organizations are increasingly undertaking knowledge management initiatives and making significant investments. Knowledge sourcing is considered as the first important step in effective knowledge management. Most firms continue to make an effort to realize the benefits of knowledge management by using various knowledge sources effectively. Appropriate knowledge sourcing strategies enable organizations to create, acquire, and access knowledge in a timely manner by reducing search and transfer costs, which result in better firm performance. In response, the knowledge management literature has devoted substantial attention to the analysis of knowledge sourcing strategies. Many studies have categorized knowledge sourcing strategies into intemal- and external-oriented. Internal-oriented sourcing strategy attempts to increase firm performance by integrating knowledge within the boundary of the firm. On the contrary, external-oriented strategy attempts to bring knowledge in from outside sources via either acquisition or imitation, and then to transfer that knowledge across to the organization. However, the extant literature on knowledge sourcing strategies focuses primarily on large organizations. Although many studies have clearly highlighted major differences between large and small firms and the need to adopt different strategies for different firm sizes, scant attention has been given to analyzing how knowledge sourcing strategies affect firm performance in small firms and what are the differences between small and large firms in the patterns of knowledge sourcing strategies adoption. This study attempts to advance the current literature by examining the impact of knowledge sourcing strategies on small firm performance from a holistic perspective. By drawing on knowledge based theory from organization science and complementarity theory from the economics literature, this paper is motivated by the following questions: (1) what are the adoption patterns of different knowledge sourcing strategies in small firms (i,e., what sourcing strategies should be adopted and which sourcing strategies work well together in small firms)?; and (2) what are the performance implications of these adoption patterns? In order to answer the questions, this study developed three hypotheses. First hypothesis based on knowledge based theory is that internal-oriented knowledge sourcing is positively associated with small firm performance. Second hypothesis developed on the basis of knowledge based theory is that external-oriented knowledge sourcing is positively associated with small firm performance. The third one based on complementarity theory is that pursuing both internal- and external-oriented knowledge sourcing simultaneously is negatively or less positively associated with small firm performance. As a sampling frame, 700 firms were identified from the Annual Corporation Report in Korea. Survey questionnaires were mailed to owners or executives who were most erudite about the firm s knowledge sourcing strategies and performance. A total of 188 companies replied, yielding a response rate of 26.8%. Due to incomplete data, 12 responses were eliminated, leaving 176 responses for the final analysis. Since all independent variables were measured using continuous variables, supermodularity function was used to test the hypotheses based on the cross partial derivative of payoff function. The results indicated no significant impact of internal-oriented sourcing strategies while positive impact of external-oriented sourcing strategy on small firm performance. This intriguing result could be explained on the basis of various resource and capital constraints of small firms. Small firms typically have restricted financial and human resources. They do not have enough assets to always develop knowledge internally. Another possible explanation is competency traps or core rigidities. Building up a knowledge base based on internal knowledge creates core competences, but at the same time, excessive internal focused knowledge exploration leads to behaviors blind to other knowledge. Interestingly, this study found that Internal- and external-oriented knowledge sourcing strategies had a substitutive relationship, which was inconsistent with previous studies that suggested complementary relationship between them. This result might be explained using organizational identification theory. Internal organizational members may perceive external knowledge as a threat, and tend to ignore knowledge from external sources because they prefer to maintain their own knowledge, legitimacy, and homogeneous attitudes. Therefore, integrating knowledge from internal and external sources might not be effective, resulting in failure of improvements of firm performance. Another possible explanation is small firms resource and capital constraints and lack of management expertise and absorptive capacity. Although the integration of different knowledge sources is critical, high levels of knowledge sourcing in many areas are quite expensive and so are often unrealistic for small enterprises. This study provides several implications for research as well as practice. First this study extends the existing knowledge by examining the substitutability (and complementarity) of knowledge sourcing strategies. Most prior studies have tended to investigate the independent effects of these strategies on performance without considering their combined impacts. Furthermore, this study tests complementarity based on the productivity approach that has been considered as a definitive test method for complementarity. Second, this study sheds new light on knowledge management research by identifying the relationship between knowledge sourcing strategies and small firm performance. Most current literature has insisted complementary relationship between knowledge sourcing strategies on the basis of data from large firms. Contrary to the conventional wisdom, this study identifies substitutive relationship between knowledge sourcing strategies using data from small firms. Third, implications for practice highlight that managers of small firms should focus on knowledge sourcing from external-oriented strategies. Moreover, adoption of both sourcing strategies simultaneousiy impedes small firm performance.

Criminal Law Issues in Epidemiological Investigations Under the INFECTIOUS DISEASE CONTROL AND PREVENTION ACT (감염병의 예방 및 관리에 관한 법률상 역학조사와 관련된 형사법적 쟁점)

  • Jang, Junhyuk
    • The Korean Society of Law and Medicine
    • /
    • v.23 no.3
    • /
    • pp.3-44
    • /
    • 2022
  • As a result of a close review focusing on the case of obstruction of epidemiological investigation by a religious group A in Daegu, which was a problem when the pandemic of Covid-19 infection began in Korea around February 2, 2020, when an epidemiological investigator requested a specific group to submit a list, While there have been cases where an act of not responding or submitting an edited omission list was sentenced to the effect that the act did not fall under an epidemiological investigation, in the case of non-submission of the visitor list for the B Center, even though a 'list of visitors' was requested. Regarding the fact of refusal without a justifiable reason, 'providing a list of persons entering the building is a key factual act that forms a link between epidemiological investigations accompanying an epidemiological investigation, and refusing to do so is also an act of refusal and obstruction of an epidemiological investigation. There are cases where it is possible to demand criminal punishment. Regardless of whether the request for submission of the membership list falls under the epidemiological investigation, there are cases in which the someones' actions correspond to the refusal or obstruction of the epidemiological investigation. A lower court ruling that if an epidemiological investigation is rejected or obstructed as a result of interfering with factual acts accompanying an epidemiological investigation, comprehensively considering whether or not the list has been diverted for purposes other than epidemiological investigation, the logic is persuasive. Epidemiological investigations such as surveys and human specimen collection and testing are conducted for each infectious disease patient or contact confirmed as a result of the epidemiological investigation, but epidemiological investigations conducted on individual individuals cannot exist independently of each other, and the This is because the process of identification and tracking is essential to an epidemiological investigation, and if someone intentionally interferes with or rejects the process of confirming this link, it will result in direct, realistic, and widespread interference with the epidemiological investigation. In this article, ① there are differences between an epidemiological investigation and a request for information provision under the Infectious Disease Control and Prevention Act, but there are areas that fall under the epidemiological investigation even in the case of a request for information, ② Considering the medical characteristics of COVID-19 and the continuity of the epidemiological investigation, the epidemiological investigator the fact that the act of requesting a list may fall under the epidemiological investigation, ③ that the offense of obstructing the epidemiological investigation in certain cases may constitute 'obstruction of Performance of Official Duties by Fraudulent Means', and ④ rejecting the request for information provision under the Infectious Disease Control and Prevention Act from September 29, 2020 In this case, it is intended to be helpful in the application of the Infectious Disease control and Prevention Act and the practical operation of epidemiological investigations in the future by pointing out the fact that a new punishment regulation of imprisonment or fine is being implemented.

A Trend of Research in Community Health Nursing (지역사회간호학 관련 논문 연구동향 분석 -학회지 발표 논문을 중심으로-)

  • Lee, In-Sook;Kim, Yu-Na;Choi, Key-Won;Chin, Young-Ran
    • Research in Community and Public Health Nursing
    • /
    • v.12 no.1
    • /
    • pp.288-298
    • /
    • 2001
  • This article makes an attempt to evaluate the extent of developing community health nursing knowledge and to suggest the direction of developing a body of knowledge henceforth through the results of analysis for contents and outcomes of all literatures. which have been published in the Journal related to community health nursing. Refer to the following for the result of this article. 1. The total number of literatures analyzed amounted to 100 pieces in Journal of community health nursing society. 78 in Journal of industrial nursing society, 134 in Journal of school health society. 40 in Journal of home care nursing society. 2. Journal of community health nursing society Health needs and educational-behavioral diagnoses, which are more concrete nursing assessments and diagnoses. formed the main current(54%) of articles published in Journal of community health nursing society since 1992. There was a quantitative growth as well as a qualitative advance. Through a classification by the type of a body of knowledge. It was found that the knowledge providing nursing practice with bases, commanded an overwhelming majority(71.8%). Also, Researches on systemic supports for nursing practice are showing a tendency to increase. 3. Journal of industrial nursing society 52.6% of research papers presented in Journal of industrial nursing society dealt with health problem of workers. assessment of risk factors, diagnosis of health behaviors. Because of the beginning of an industrial nursing, the domain of nursing management to establish the role and task, work condition, training. documentary system made up 23 percent of research, subjects. A knowledge providing nursing practice with bases have a majority, 69.2%. In addition. the subject concerning a systemic support and quality assurance was scarce but continuously presented. 4. Journal of school health society The major point of this journal is the identification of health problems and risk factors which belong to assessment and diagnosis domain(56.8%) regardless of year, Because of the interdisciplinary characteristic. The knowledge on quality assurance of nursing practice is relatively rare. But, articles related to a systemic support is plentiful. 5. Journal of home care nursing society In its infancy, there was a large number of papers concerning need assessment and diagnosis, Comparing others, this journal has introduced a good many of articles related to program management. delivery system. service fee, etc that belong to domain of systemic support for nursing practice. 6. It is showing definitely that quantity and extent of research have grown for a short period. See the analysis in terms of nursing process, studies related to the domain of assessment and diagnosis command an absolute majority regardless of kinds of journal. Although articles referring to program management and implementation is increasing in number, it is scarce to evaluate a nursing program and grope for an improvement. Also, program development based on a theoretical framework is little. Therefore much more scientific effort to ensure profession should be executed. 7. In the methodological aspect, longitudinal study needs to be carried out so that we could show the evidence based nursing theory. To develop a more general theory, we have to conduct a study of various subjects and improve a validity of tools through a repeat test. In addition, the effort for interdisciplinary cooperation is needed.

  • PDF

Comparative Analysis of ViSCa Platform-based Mobile Payment Service with other Cases (스마트카드 가상화(ViSCa) 플랫폼 기반 모바일 결제 서비스 제안 및 타 사례와의 비교분석)

  • Lee, June-Yeop;Lee, Kyoung-Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.2
    • /
    • pp.163-178
    • /
    • 2014
  • Following research proposes "Virtualization of Smart Cards (ViSCa)" which is a security system that aims to provide a multi-device platform for the deployment of services that require a strong security protocol, both for the access & authentication and execution of its applications and focuses on analyzing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service by comparing with other similar cases. At the present day, the appearance of new ICT, the diffusion of new user devices (such as smartphones, tablet PC, and so on) and the growth of internet penetration rate are creating many world-shaking services yet in the most of these applications' private information has to be shared, which means that security breaches and illegal access to that information are real threats that have to be solved. Also mobile payment service is, one of the innovative services, has same issues which are real threats for users because mobile payment service sometimes requires user identification, an authentication procedure and confidential data sharing. Thus, an extra layer of security is needed in their communication and execution protocols. The Virtualization of Smart Cards (ViSCa), concept is a holistic approach and centralized management for a security system that pursues to provide a ubiquitous multi-device platform for the arrangement of mobile payment services that demand a powerful security protocol, both for the access & authentication and execution of its applications. In this sense, Virtualization of Smart Cards (ViSCa) offers full interoperability and full access from any user device without any loss of security. The concept prevents possible attacks by third parties, guaranteeing the confidentiality of personal data, bank accounts or private financial information. The Virtualization of Smart Cards (ViSCa) concept is split in two different phases: the execution of the user authentication protocol on the user device and the cloud architecture that executes the secure application. Thus, the secure service access is guaranteed at anytime, anywhere and through any device supporting previously required security mechanisms. The security level is improved by using virtualization technology in the cloud. This virtualization technology is used terminal virtualization to virtualize smart card hardware and thrive to manage virtualized smart cards as a whole, through mobile cloud technology in Virtualization of Smart Cards (ViSCa) platform-based mobile payment service. This entire process is referred to as Smart Card as a Service (SCaaS). Virtualization of Smart Cards (ViSCa) platform-based mobile payment service virtualizes smart card, which is used as payment mean, and loads it in to the mobile cloud. Authentication takes place through application and helps log on to mobile cloud and chooses one of virtualized smart card as a payment method. To decide the scope of the research, which is comparing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service with other similar cases, we categorized the prior researches' mobile payment service groups into distinct feature and service type. Both groups store credit card's data in the mobile device and settle the payment process at the offline market. By the location where the electronic financial transaction information (data) is stored, the groups can be categorized into two main service types. First is "App Method" which loads the data in the server connected to the application. Second "Mobile Card Method" stores its data in the Integrated Circuit (IC) chip, which holds financial transaction data, which is inbuilt in the mobile device secure element (SE). Through prior researches on accept factors of mobile payment service and its market environment, we came up with six key factors of comparative analysis which are economic, generality, security, convenience(ease of use), applicability and efficiency. Within the chosen group, we compared and analyzed the selected cases and Virtualization of Smart Cards (ViSCa) platform-based mobile payment service.