• Title/Summary/Keyword: least-scale

Search Result 833, Processing Time 0.035 seconds

Development and Testing of the Model of Health Promotion Behavior in Predicting Exercise Behavior

  • O'Donnell, Michael P.
    • Korean Journal of Health Education and Promotion
    • /
    • v.2 no.1
    • /
    • pp.31-61
    • /
    • 2000
  • Introduction. Despite the fact that half of premature deaths are caused by unhealthy lifestyles such as smoking tobacco, sedentary lifestyle, alcohol and drug abuse and poor nutrition, there are no theoretical models which accurately explain these health promotion related behaviors. This study tests a new model of health behavior called the Model of Health Promotion Behavior. This model draws on elements and frameworks suggested by the Health Belief Model, Social Cognitive Theory, the Theory of Planned Action and the Health Promotion Model. This model is intended as a general model of behavior but this first test of the model uses amount of exercise as the outcome behavior. Design. This study utilized a cross sectional mail-out, mail-back survey design to determine the elements within the model that best explained intentions to exercise and those that best explained amount of exercise. A follow-up questionnaire was mailed to all respondents to the first questionnaire about 10 months after the initial survey. A pretest was conducted to refine the questionnaire and a pilot study to test the protocols and assumptions used to calculate the required sample size. Sample. The sample was drawn from 2000 eligible participants at two blue collar (utility company and part of a hospital) and two white collar (bank and pharmaceutical) companies located in Southeastern Michigan. Both white collar site had employee fitness centers and all four sites offered health promotion programs. In the first survey, 982 responses were received (49.1%) after two mailings to non-respondents and one additional mailing to secure answers to missing data, with 845 usable cases for the analyzing current intentions and 918 usable cases for the explaining of amount of current exercise analysis. In the follow-up survey, questionnaires were mailed to the 982 employees who responded to the initial survey. After one follow-up mailing to non-respondents, and one mailing to secure answers to missing data, 697 (71.0%) responses were received, with 627 (63.8%) usable cases to predict intentions and 673 (68.5%) usable cases to predict amount of exercise. Measures. The questionnaire in the initial survey had 15 scales and 134 items; these scales measured each of the variables in the model. Thirteen of the scales were drawn from the literature, all had Cronbach's alpha scores above .74 and all but three had scores above .80. The questionnaire in the second mailing had only 10 items, and measured only outcome variables. Analysis. The analysis included calculation of scale scores, Cronbach's alpha, zero order correlations, and factor analysis, ordinary least square analysis, hierarchical tests of interaction terms and path analysis, and comparisons of results based on a random split of the data and splits based on gender and employer site. The power of the regression analysis was .99 at the .01 significance level for the model as a whole. Results. Self efficacy and Non-Health Benefits emerged as the most powerful predictors of Intentions to exercise, together explaining approximately 19% of the variance in future Intentions. Intentions, and the interaction of Intentions with Barriers, with Support of Friends, and with Self Efficacy were the most consistent predictors of amount of future exercise, together explaining 38% of the variance. With the inclusion of Prior Exercise History the model explained 52% of the variance in amount of exercise 10 months later. There were very few differences in the variables that emerged as important predictors of intentions or exercise in the different employer sites or between males and females. Discussion. This new model is viable in predicting intentions to exercise and amount of exercise, both in absolute terms and when compared to existing models.

  • PDF

A Study on Changes of Symptoms and Signs Diagnosised by Differentiation of the Pattern Identification in Acute Ischemic Stroke Patients with Collaborative Treatment (한·양방 병행치료를 시행한급성기 뇌경색 환자에게 변증(辨證)별 평가항목 호전도에 대한 연구)

  • Lu, Hsu-yuan;Kim, Soo-kyung;Shim, So-ra;Kim, Hye-mi;Park, Joo-young;Cho, Seung-yeon;Park, Seong-uk;Jung, Woo-sang;Moon, Sang-kwan;Park, Jung-mi;Ko, Chang-nam;Cho, Ki-ho;Kim, Young-suk;Bae, Hyung-sup
    • The Journal of the Society of Stroke on Korean Medicine
    • /
    • v.12 no.1
    • /
    • pp.16-23
    • /
    • 2011
  • Object : The purpose of this study is to observe the changes of symptoms and signs diagnosised by differentiation of the pattern identification in stroke patients. Methods : Seventy subjects were recruited from patients with stroke within ten days of onset. We chose twenty-nine subjects diagnosised as same differentiation of the pattern identification, and who had at least on follow up session. We had investigated change of symptoms and signs diagnosised by differentiation of the pattern identification. Results : There were five symptoms and signs (thick fur, dry fur, difficult defecation, heat vexation and aversion to heat, normal pulse) and ten (heavy-headedness, frequency of defecation, hard defecation, feel heavy, slippery pulsem, dry mouth, bitter taste in the mouth, feel lazy, look lazy) symptoms and signs that were statistically significant improved in fire-heat patterns and dampness-phlegm pattern, respectively. Conclusions : This study provides evidence that collaborative treatment is effective in improving some symptoms and signs in acute ischemic stroke patients diagnosised by fire-heat pattern and dampness-phlegm pattern. Further studies with larger scale, longer observation period would be required.

  • PDF

The Composition and Performance of Suryukjae (수륙재의 구성과 연행 -진관사 수륙재를 중심으로)

  • Hong, Teahan
    • (The) Research of the performance art and culture
    • /
    • no.23
    • /
    • pp.347-368
    • /
    • 2011
  • This article is a review of the composition pattern of Suryukjae, which is one of the Buddhist ceremonies, and a consideration of the performance process. As one of the ceremonies leading the dead to heaven performed in the Buddhist circle, Suryukjae had been performed in Buddhist temples nationwide, but currently, it remains only in several Buddhist temples. Suryukjae is composed as follows. First, the early part of Suryukjae is a stage of preparing Suryukjae and ensuring legitimacy; thus, it has no detailed Jaecha except for Gwanyok. It is made up of Onghoge and Dage, has no Somun, and is centered on Yojabbara. The middle part of Suryukjae is a part in which Suryukjae is performed on a full-scale, which wishes the achievement of the goal of Suryukjae. It is made up of Geobul, Dage, and Somun, and is centered on Sadaranibara. Furthermore, this part delineates the flow of the Jaecha concerned as it contains detailed Jaecha. Meanwhile, in the middle part of Suryukjae, there is only detailed Jaecha called Sajadanman Bongsong (sending off), and the rest parts including Orodan, upper part, middle part, and lower part, in which there is no detailed Jaecha called Bongsong. The fact that there is no Bongsong in this part means all Bongsong is made in Heuihyang Bongsong, which is the last Jaecha. This implies that Saja, which is enshrined in Sajadan, is the essence of the achievement of the goal of Suryukjae. Only when there is Saja, Muju, Yuju, and Gohon (the meaning of all spirits) can be led to heaven. Also, from a rough perspective, this part is connected to other Chundojae (ceremony for sending off the dead to heaven) in Korea. There is a geori(Jaecha) that calls in Saja also in Jinogigut (exorcism) of Seoul. Then, although various gods from the otherworld are coming in in succession, to which Saja enters clearly shows a process in that Saja returns to the next world with the dead through . Just as demonstrates a process in that Saja returns to the next world with the dead in Jinogigut, also in Suryukjae, Saja needs to return to the next world with Gohon; therefore, at least Sajadan has detailed Jaecha called Bongsong. That is, this means that although Suryukjae of Buddhism is different from other Chundojae in terms of the composition of Jaecha, its notion about Saja is the same.

Radiomics Analysis of Gray-Scale Ultrasonographic Images of Papillary Thyroid Carcinoma > 1 cm: Potential Biomarker for the Prediction of Lymph Node Metastasis (Radiomics를 이용한 1 cm 이상의 갑상선 유두암의 초음파 영상 분석: 림프절 전이 예측을 위한 잠재적인 바이오마커)

  • Hyun Jung Chung;Kyunghwa Han;Eunjung Lee;Jung Hyun Yoon;Vivian Youngjean Park;Minah Lee;Eun Cho;Jin Young Kwak
    • Journal of the Korean Society of Radiology
    • /
    • v.84 no.1
    • /
    • pp.185-196
    • /
    • 2023
  • Purpose This study aimed to investigate radiomics analysis of ultrasonographic images to develop a potential biomarker for predicting lymph node metastasis in papillary thyroid carcinoma (PTC) patients. Materials and Methods This study included 431 PTC patients from August 2013 to May 2014 and classified them into the training and validation sets. A total of 730 radiomics features, including texture matrices of gray-level co-occurrence matrix and gray-level run-length matrix and single-level discrete two-dimensional wavelet transform and other functions, were obtained. The least absolute shrinkage and selection operator method was used for selecting the most predictive features in the training data set. Results Lymph node metastasis was associated with the radiomics score (p < 0.001). It was also associated with other clinical variables such as young age (p = 0.007) and large tumor size (p = 0.007). The area under the receiver operating characteristic curve was 0.687 (95% confidence interval: 0.616-0.759) for the training set and 0.650 (95% confidence interval: 0.575-0.726) for the validation set. Conclusion This study showed the potential of ultrasonography-based radiomics to predict cervical lymph node metastasis in patients with PTC; thus, ultrasonography-based radiomics can act as a biomarker for PTC.

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.

Analysis of Dietary Habits by MDA(Mini Dietary Assessment) Scores and Physical Development and Blood Parameters in Female College Students in Seoul Area (서울 지역 여대생의 식생활 평가에 따른 식습관, 신체 발달 및 혈액 인자 비교 연구)

  • Choi, Kyung-Soon;Shin, Kyung-Ok;Huh, Seon-Min;Chung, Keun-Hee
    • Journal of the East Asian Society of Dietary Life
    • /
    • v.19 no.6
    • /
    • pp.856-868
    • /
    • 2009
  • This study was conducted to investigate causes for health problems among college women by analyzing factors related to their dietary habits, physical development, health habits, and blood parameters. The subjects were ages 20 to 24 years, lived in the Seoul area and were randomly selected during March, 2008 to August, 2009. The average height and weight of the overall subjects were $162.02{\pm}4.89\;cm$ and $53.96{\pm}7.00\;kg$, respectively. According to a 3-point assessment scale for the subjects' dietary habits, the average point value was 21.2. The percentage of subjects that ate breakfast daily was only 30.5%, and they omitted regular meals at least once a week. Approximately 83.5% of the subjects reported eating out often or frequently, and preferred Korean foods when they ate out. The subjects had interim meals (snacks) one or two times daily, and 40.4% of them preferred unbalanced meals. As their interim meals, among the 'good' group, ate breaded potatoes (39.3%), carbonated beverages, and ice cream (36.8%), whereas the 'poor' group, drank milk and ate dairy products (38.0%) as well as fast food and fried food (22.8%). Intakes of energy, fat, vitamins $B_2$ and $B_6$, niacin, folic acid, calcium, iron, zinc, and phosphorus were higher in the 'poor' group. The average hemoglobin level ($13.77{\pm}1.00\;g/dL$) among the subjects was within normal range; while 2.7% of subjects had hemoglobin levels under 11.1 g/dL (standard value) and were examined as anemic. The degree of interest in health was 24.5% higher among the subjects who had poor dietary habits. In contrast, among those who had good dietary habits, 49.6% reported they had no interest in regular exercise. The subjects reported that regular meals, nutrient intake, sufficient rest, and sleep as necessary to maintain health. The average amount of sleep obtained by the subjects was 6~8 hours. Among the 'poor' group, 36.2% reported that they exercised regularly, whereas 18.5% of the subjects in the 'good' group reported regular exercise (p<0.05). In conclusion, it appears necessary to provide nutrition education through teaching and to promote nutrition and health to college women so they can control their individual health status and create practicable dietary plans.

  • PDF

The Effects of Environmental Dynamism on Supply Chain Commitment in the High-tech Industry: The Roles of Flexibility and Dependence (첨단산업의 환경동태성이 공급체인의 결속에 미치는 영향: 유연성과 의존성의 역할)

  • Kim, Sang-Deok;Ji, Seong-Goo
    • Journal of Global Scholars of Marketing Science
    • /
    • v.17 no.2
    • /
    • pp.31-54
    • /
    • 2007
  • The exchange between buyers and sellers in the industrial market is changing from short-term to long-term relationships. Long-term relationships are governed mainly by formal contracts or informal agreements, but many scholars are now asserting that controlling relationship by using formal contracts under environmental dynamism is inappropriate. In this case, partners will depend on each other's flexibility or interdependence. The former, flexibility, provides a general frame of reference, order, and standards against which to guide and assess appropriate behavior in dynamic and ambiguous situations, thus motivating the value-oriented performance goals shared between partners. It is based on social sacrifices, which can potentially minimize any opportunistic behaviors. The later, interdependence, means that each firm possesses a high level of dependence in an dynamic channel relationship. When interdependence is high in magnitude and symmetric, each firm enjoys a high level of power and the bonds between the firms should be reasonably strong. Strong shared power is likely to promote commitment because of the common interests, attention, and support found in such channel relationships. This study deals with environmental dynamism in high-tech industry. Firms in the high-tech industry regard it as a key success factor to successfully cope with environmental changes. However, due to the lack of studies dealing with environmental dynamism and supply chain commitment in the high-tech industry, it is very difficult to find effective strategies to cope with them. This paper presents the results of an empirical study on the relationship between environmental dynamism and supply chain commitment in the high-tech industry. We examined the effects of consumer, competitor, and technological dynamism on supply chain commitment. Additionally, we examined the moderating effects of flexibility and dependence of supply chains. This study was confined to the type of high-tech industry which has the characteristics of rapid technology change and short product lifecycle. Flexibility among the firms of this industry, having the characteristic of hard and fast growth, is more important here than among any other industry. Thus, a variety of environmental dynamism can affect a supply chain relationship. The industries targeted industries were electronic parts, metal product, computer, electric machine, automobile, and medical precision manufacturing industries. Data was collected as follows. During the survey, the researchers managed to obtain the list of parts suppliers of 2 companies, N and L, with an international competitiveness in the mobile phone manufacturing industry; and of the suppliers in a business relationship with S company, a semiconductor manufacturing company. They were asked to respond to the survey via telephone and e-mail. During the two month period of February-April 2006, we were able to collect data from 44 companies. The respondents were restricted to direct dealing authorities and subcontractor company (the supplier) staff with at least three months of dealing experience with a manufacture (an industrial material buyer). The measurement validation procedures included scale reliability; discriminant and convergent validity were used to validate measures. Also, the reliability measurements traditionally employed, such as the Cronbach's alpha, were used. All the reliabilities were greater than.70. A series of exploratory factor analyses was conducted. We conducted confirmatory factor analyses to assess the validity of our measurements. A series of chi-square difference tests were conducted so that the discriminant validity could be ensured. For each pair, we estimated two models-an unconstrained model and a constrained model-and compared the two model fits. All these tests supported discriminant validity. Also, all items loaded significantly on their respective constructs, providing support for convergent validity. We then examined composite reliability and average variance extracted (AVE). The composite reliability of each construct was greater than.70. The AVE of each construct was greater than.50. According to the multiple regression analysis, customer dynamism had a negative effect and competitor dynamism had a positive effect on a supplier's commitment. In addition, flexibility and dependence had significant moderating effects on customer and competitor dynamism. On the other hand, all hypotheses about technological dynamism had no significant effects on commitment. In other words, technological dynamism had no direct effect on supplier's commitment and was not moderated by the flexibility and dependence of the supply chain. This study makes its contribution in the point of view that this is a rare study on environmental dynamism and supply chain commitment in the field of high-tech industry. Especially, this study verified the effects of three sectors of environmental dynamism on supplier's commitment. Also, it empirically tested how the effects were moderated by flexibility and dependence. The results showed that flexibility and interdependence had a role to strengthen supplier's commitment under environmental dynamism in high-tech industry. Thus relationship managers in high-tech industry should make supply chain relationship flexible and interdependent. The limitations of the study are as follows; First, about the research setting, the study was conducted with high-tech industry, in which the direction of the change in the power balance of supply chain dyads is usually determined by manufacturers. So we have a difficulty with generalization. We need to control the power structure between partners in a future study. Secondly, about flexibility, we treated it throughout the paper as positive, but it can also be negative, i.e. violating an agreement or moving, but in the wrong direction, etc. Therefore we need to investigate the multi-dimensionality of flexibility in future research.

  • PDF

A study on the second edition of Koryo Dae-Jang-Mock-Lock (고려재조대장목록고)

  • Jeong Pil-mo
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.17
    • /
    • pp.11-47
    • /
    • 1989
  • This study intends to examine the background and the procedure of the carving of the tablets of the second edition of Dae-Jang-Mock­Lock(재조대장목록). the time and the route of the moving of the tablets. into Haein-sa, and the contents and the system of it. This study is mainly based on the second edition of Dae-Jang-Mock-Lock. But the other closely related materials such as restored first. edition of the Dae- Jang-Mock-Lock, Koryo Sin-Jo-Dae-Jang-Byeol-Lock (고려신조대장교정별록). Kae-Won-Seok-Kyo-Lock (개원석교록). Sok-Kae­Won-Seok-Kyo-Lock (속개원석교록). Jeong-Won-Sin-Jeong-Seok-Kyo­Lock(정원신정석교록), Sok-Jeong-Won-Seok-Kyo-Lock(속정원석교록), Dea-Jung-Sang-Bu-Beob-Bo-Lock(대중상부법보록), and Kyeong-Woo-Sin-Su-Beob-Bo-Lock(경우신수법보록), are also analysed and closely examined. The results of this study can be summarized as follows: 1. The second edition of Tripitaka Koreana(고려대장경) was carved for the purpose of defending the country from Mongolia with the power of Buddhism, after the tablets of the first edition in Buin-sa(부이사) was destroyed by fire. 2. In 1236. Dae-Jang-Do-Gam(대장도감) was established, and the preparation for the recarving of the tablets such as comparison between the content, of the first edition of Tripitalk Koreana, Gal-Bo-Chik-Pan-Dae­Jang-Kyeong and Kitan Dae- Jang-Kyeong, transcription of the original copy and the preparation of the wood, etc. was started. 3. In 1237 after the announcement of Dae-Jang-Gyeong-Gak-Pan-Gun­Sin-Gi-Go-Mun(대장경핵판군신석고문), the carving was started on a full scale. And seven years later (1243), Bun-Sa-Dae-Jang-Do-Gam(분사대장도감) was established in the area of the South to expand and hasten the work. And a large number of the tablets were carved in there. 4. It took 16 years to carve the main text and the supplements of the second edition of Tripitaka Koreana, the main text being carved from 1237 to 1248 and the supplement from 1244 to 1251. 5. It can be supposed that the tablets of the second edition of Tripitaka Koreana, stored in Seon-Won-Sa(선원사), Kang-Wha(강화), for about 140 years, was moved to Ji-Cheon-Sa(지천사), Yong-San(용산), and to Hae-In-Sa(해인사) again, through the west and the south sea and Jang-Gyeong-Po(장경포), Go-Ryeong(고령), in the autumn of the same year. 6. The second edition of Tripitaka Koreana was carved mainly based on the first edition, comparing with Gae-Bo-Chik-Pan-Dae-Jang-Kyeong(개보판대장경) and Kitan Dae-Jang-Kyeong(계단대장경). And the second edition of Dae-Jang-Mock-Lock also compiled mainly based on the first edition with the reference to Kae-Won-Seok-Kyo-Lock and Sok-Jeong-Won-Seok-Kyo-Lock. 7. Comparing with the first edition of Dae-Jang-Mock-Lock, in the second edition 7 items of 9 volumes of Kitan text such as Weol-Deung­Sam-Mae-Gyeong-Ron(월증삼매경론) are added and 3 items of 60 volumes such as Dae-Jong-Ji-Hyeon-Mun-Ron(대종지현문논) are substituted into others from Cheon chest(천함) to Kaeng chest(경함), and 92 items of 601 volumes such as Beob-Won-Ju-Rim-Jeon(법원주임전) are added after Kaeng chest. And 4 items of 50 volumes such as Yuk-Ja-Sin-Ju-Wang-Kyeong(육자신주왕경) are ommitted in the second edition. 8. Comparing with Kae-Won-Seok-Kyo-Lock, Cheon chest to Young chest (영함) of the second edition is compiled according to Ib-Jang-Lock(입장록) of Kae-Won-Seok-Kyo-Lock. But 15 items of 43 vol­umes such as Bul-Seol-Ban-Ju-Sam-Mae-Kyeong(불설반주삼매경) are ;added and 7 items of 35 volumes such as Dae-Bang-Deung-Dae-Jib-Il­Jang-Kyeong(대방등대집일장경) are ommitted. 9. Comparing with Sok-Jeong-Won-Seok-Kyo-Lock, 3 items of the 47 volumes (or 49 volumes) are ommitted and 4 items of 96 volumes are ;added in Caek chest(책함) to Mil chest(밀함) of the second edition. But the items are arranged in the same order. 10. Comparing with Dae- Jung-Sang-Bo-Beob-Bo-Lock, the arrangement of the second edition is entirely different from it. But 170 items of 329 volumes are also included in Doo chest(두함) to Kyeong chest(경함) of the second edition, and 53 items of 125 volumes in Jun chest(존함) to Jeong chest(정함). And 10 items of 108 volumes in the last part of Dae-Jung-Sang-Bo-Beob-Bo-Lock are ommitted and 3 items of 131 volumes such as Beob-Won-Ju-Rim-Jeon(법원주임전) are added in the second edition. 11. Comparing with Kyeong-Woo-Sin-Su-Beob-Bo-Lock, all of the items (21 items of 161 volumes) are included in the second edition without ;any classificatory system. And 22 items of 172 volumes in the Seong­Hyeon-Jib-Jeon(성현집전) part such as Myo-Gak-Bi-Cheon(묘각비전) are ommitted. 12. The last part of the second edition, Joo chest(주함) to Dong chest (동함), includes 14 items of 237 volumes. But these items cannot be found in any other former Buddhist catalog. So it might be supposed as the Kitan texts. 13. Besides including almost all items in Kae-Won-Seok-Kyo-Lock and all items in Sok-Jeong-Won-Seok-Kyo-Lock, Dae-Jung-Sang-Bo­Beob-Bo-Lock, and Kyeong-Woo-Sin-Su-Beob-Bo-Lock, the second edition of Dae-Jang-Mock-Lock includes more items, at least 20 items of about 300 volumes of Kitan Tripitaka and 15 items of 43 volumes of traditional Korean Tripitake that cannot be found any others. Therefore, Tripitaka Koreana can be said as a comprehensive Tripitaka covering all items of Tripitakas translated in Chinese character.

  • PDF

A Study on the Architecture of the Original Nine-Story Wooden Pagoda at Hwangnyongsa Temple (황룡사 창건 구층목탑 단상)

  • Lee, Ju-heun
    • Korean Journal of Heritage: History & Science
    • /
    • v.52 no.2
    • /
    • pp.196-219
    • /
    • 2019
  • According to the Samguk Yusa, the nine-story wooden pagoda at Hwangnyongsa Temple was built by a Baekje artisan named Abiji in 645. Until the temple was burnt down completely during the Mongol invasion of Korea in 1238, it was the greatest symbol of the spiritual culture of the Korean people at that time and played an important role in the development of Buddhist thought in the country for about 700 years. At present, the only remaining features of Hwangnyongsa Temple, which is now in ruins, are the pagoda's stylobate and several foundation stones. In the past, many researchers made diverse inferences concerning the restoration of the original structure and the overall architecture of the wooden pagoda at Hwangnyongsa Temple, based on written records and excavation data. However, this information, together with the remaining external structure of the pagoda site and the assumption that it was a simple wooden structure, actually suggest that it was a rectangular-shaped nine-story pagoda. It is assumed that such ideas were suggested at a time when there was a lack of relevant data and limited knowledge on the subject, as well as insufficient information about the technical lineage of the wooden pagoda at Hwangnyongsa Temple; therefore, these ideas should be revised in respect of the discovery of new data and an improved level of awareness about the structural features of large ancient Buddhist pagodas. This study focused on the necessity of raising awareness of the lineage and structure of the wooden pagoda at Hwangnyongsa Temple and gaining a broader understanding of the structural system of ancient Buddhist pagodas in East Asia. The study is based on a reanalysis of data about the site of the wooden pagoda obtained through research on the restoration of Hwangnyongsa Temple, which has been ongoing since 2005. It is estimated that the wooden pagoda underwent at least two large-scale repairs between the Unified Silla and Goryeo periods, during which the size of the stylobate and the floor plan were changed and, accordingly, the upper structure was modified to a significant degree. Judging by the features discovered during excavation and investigation, traces relating to the nine-story wooden pagoda built during the Three Kingdoms Period include the earth on which the stylobate was built and the central pillar's supporting stone, which had been reinstalled using the rammed earth technique, as well as other foundation stones and stylobate stone materials that most probably date back to the ninth century or earlier. It seems that the foundation stones and stylobate stone materials were new when the reliquaries were enshrined again in the pagoda after the Unified Silla period, so the first story and upper structure would have been of a markedly different size to those of the original wooden pagoda. In addition, during the Goryeo period, these foundation stones were rearranged, and the cover stone was newly installed; therefore, the pagoda would seem to have undergone significant changes in size and structure compared to previous periods. Consequently, the actual structure of the original wooden pagoda at Hwangnyongsa Temple should be understood in terms of the changes in large Buddhist pagodas built in East Asia at that time, and the technical lineage should start with the large Buddhist pagodas of the Baekje dynasty, which were influenced by the Northern dynasty of China. Furthermore, based on the archeological data obtained from the analysis of the images of the nine-story rock-carved pagoda depicted on the Rock-carved Buddhas in Tapgok Valley at Namsan Mountain in Gyeongju, and the gilt-bronze rail fragments excavated from the lecture hall at the site of Hwangnyongsa Temple, the wooden pagoda would appear to have originally been an octagonal nine-story pagoda with a dual structure, rather than a simple rectangular wooden structure.

The Effects of Switching-Frustrated Situation on Negative Psychological Response (전환 좌절상황에서 소비자의 부정적 심리반응에 관한 연구)

  • Jeong, Yun Hee
    • Asia Marketing Journal
    • /
    • v.14 no.1
    • /
    • pp.131-157
    • /
    • 2012
  • Despite the voluminous research on switching barriers, the notion that they can generate negative responses has not been investigated. Further, a critical question is what determines the strength of such negative responses. To address this question, the classic theory of psychological reactance is briefly reviewed, and the idea of switching barrier is advanced. This study attempts to suggest a model on the negative effects of switching- frustrated situation, based on the studies on psychological reactance. According to psychological reactance theory(Brehm 1966), whenever a freedom is threatened or removed, individuals are motivated, at least temporarily, to restore their freedom. For example, if individuals think they are free to engage in behaviors .v, y, or z, then threatening their freedom to engage in x would cause psychological reactance. This reactance could be reduced by an increase in the perceived attractiveness of engaging in, the threatened behavior(Kivetz 2005). This investigation seeks to extend existing switching barrier research in three important ways. First, while the past research has emphasized only positive role of switching barrier, this study address negative role of it by applying psychological reactance theory. Second, to find negative results of switching barrier, I suggest negative psychological response including regret to the past choice, resentment to the present provider, and strong desire to the alternative provider. Third, I suggest the perceived severity of the switching barriers, the attractiveness of the alternative as switching-frustrated situation which can lead to negative results. And, in addition to these relationships, I added moderated effects of perceived justice for better explanation. So this study includes the following hypotheses. H1-1 ~ H1-3: The attractiveness of the alternative has a positive effect regret to the past choice (h1-1), resentment to the present provider (h1-2), and strong desire to the alternative provider (h1-3). H2-1 ~ H2-3 : The perceived severity of the switching barrier has a positive effect regret to the past choice (h2-1), resentment to the present provider (h2-2), and strong desire to the alternative provider (h2-3). H3-1 ~ H3-3 : The positive relationships between the attractiveness of the alternative and consumer' negative responses will be stronger at low level of perceived justice than at high level of perceived justice. H4-1 ~ H4-3 : The positive relationships between the perceived severity of the switching barrier and consumer' negative responses will be stronger at low level of perceived justice than at high level of perceived justice. Survey research is employed to test hypotheses involving perceived severity of the switching barrier(Hess 2008), attractiveness of the alternative(Anderson and Narus 1990; Ohanian 1990),regret(Glovich and Medvec 1995), resentment, strong desire(Alcohol Urge Questionaire: Bohn et al. 1995), perceived justice(Bies and Moag 1986; Clemmer 1993; Lind and Tyler 1998). Previous researches, such as reactance theory, emotion and service failure, have been referenced to measure constructs. All items were measured on a 7-point Likert scale ranging from "strongly disagree" to "strongly agree". We collected data involving various service field, and used 249 respondents to analyze these data using the moderated regression. The results of our analysis suggest, as expected, that the perceived severity of the switching barrier had positive effects on regret to the past choice(b = .197, p< .01), resentment to the present provider(b = .214, p< .01), and strong desire to the alternative provider(b = .254, p< .001). And the attractiveness of the alternative had positive effects on regret to the past choice(b = .353, p<.001), resentment to the present provider(b = .174, p< .01), and strong desire to the alternative provider(b = .265, p< .001). However, our findings indicate perceived justice partly moderates relationship between switching-frustrated situation and psychological negative response. The study has brought to light a number of insights between switching barriers and consumer' negative responses that have been subject to little prior research. In particular, this study adds to the existing understanding of the psychological responses to switching barriers in switching- frustrated situation. This research therefore has significance to marketers for strategic marketing programs, particularly in terms of customer retention and switching barrier strategies. Since consumers could exhibit negative responses to switching barrier, companies would be able to lose their customer when they thoughtlessly use switching barrier for remaining customer. Although the study has these contributions, there are several limitations including unsupported hypotheses and research method. So, we need to make up for these limitations in the future researches.

  • PDF