• Title/Summary/Keyword: personal computer

Search Result 2,604, Processing Time 0.038 seconds

A Study on the Effective Controlling System of Radio-activity Ventilation (RI사용 의료기관의 효율적인 배기관리 방안)

  • Lee, Kyung-Jae;Lee, Jin-Hyung;Kim, Kyung-Hoon;Kwack, Dong-Woo;Jo, Hyun-Duck;Ko, Kil-Man;Park, Young-Jae;Lee, In-Won
    • The Korean Journal of Nuclear Medicine Technology
    • /
    • v.12 no.1
    • /
    • pp.91-98
    • /
    • 2008
  • Purpose: Radio-isotopes (RI) use has been steadily developing due to industrial and technical development in the modern medical society. Particularly, popularization of domestic cyclotrons dramatically enable hospitals to produce and use diagnostic radio-isotopes. Generally, only specific facilities such as hospitals, research institutes, nuclear power plants and universities can use radio-isotopes, they are also responsible for ventilation system. The strength of radioactivity in the air is strongly regulated and controlled by korea atomic energy law in Korea Institue of Nuclear Safety (KINS), so that air radioactivity exposure can lead to environmental pollution surrounding places. In this study, we'd like to find out the investigation and the present condition of the controlled ventilation system in domestic hospitals by an emission standard from KINS, and try to reach an agreement about how to use the ventilation system. Result: Definition of filters, features and structures of pre-filters, hepa-filters, charcol filters, filter exchange procedures and precautions are explained. RI deflation concentration and filter exchange cycle have been presented as a standard prescribed in the rules of KINS. The Radiation Control Management System (RCMS) introduced by Seoul National University Bundang Hospital linking to digital pressure gauge with computer controller in another medical facilities were described in details. Conclusions: The system of medical facilities using RI has been remarkably developing in 21 century. Especially, radiation safety control system has also been grown rapidly into the subdivision, specialization, advanced technology along with international technical improvement. However, As far as current RI ventilation system is concerned, it has nothing better than doing in the past. Preferentially, to reinforce this, more sophisticated system with strict periodic filter exchange and exhaust air control guidance should be introduced by applying brilliant domestic information technology for RCMS and digital gauge method. From personal point of view as a radiation safety manager, I have provide with present problems and improvements. Futhermore, more improved guidance should be conducted.

  • PDF

A Study on the Development of Multimedia CAI in Smoking Prevention for Adolescents (청소년 흡연예방을 위한 멀티미디어 CAI 개발)

  • Lee, Sook-Ja;Park, Tae-Jin;Joung, Young-Il;Cho, Hyun
    • Korean Journal of Health Education and Promotion
    • /
    • v.20 no.2
    • /
    • pp.35-61
    • /
    • 2003
  • Background: The purpose of this study was to develop a structured and individualized smoking prevention program for adolescents by utilizing a multimedia computer-assisted instruction model and to empirically assess its effect. Method: For the purpose of this study, a guide book of smoking prevention program for middle and high school students was developed as the first step. The contents of this book were summarized and developed into an actual multimedia CAI smoking prevention program according to the Gane & Briggs instructional design and Keller's ARCS motivation design models as the second step. At the final step, the short-tenn effects of this program were examined by an experiment. This experiment were made for middle school and high school students and the quasi experimental design was the pretest - intervention - posttest. The measured data was attitude, belief, and knowledge about smoking, interest in the program, and learning motivation. Result: The results of this study were as follows: First, the guide book of a smoking prevention program was developed and the existing literature on adolescent smoking was analyzed to develop the content of the guide book. Then the curriculum was divided into three main domains on tobacco and smoking history, smoking and health, adolescent smoking and each main domain was divided into sub-domains. Second, the contents of the guide book were translated into a multimedia CAI program of smoking prevention througn Powerpoint software according to the instructional design theory. The characteristics of this program were interactive, learner controllable, and structured The program contents consisted of entrance(5.6%), history of tobacco(30%), smoking and health(38.9%), adolescent smoking(22.2%), video(4.7%), and exit(1.6%). Multimedia materials consisted of text(121), sound and music, image(still 84, dynamic 32), and videogram(6). The program took about 40 minutes to complete. Third, the results on analysis of the program effects were as follows: 1) There was significant knowledge increase between the pre-test and post-test with total mean difference 3.44, and the highest increase was in the 1st grade students of high school(p<0.001). 2) There was significant decrease in general belief on smoking between the pre-test and post-test with total mean difference 0.28. In subgroup analysis, the difference was significantly higher in the 1st grade of high school (p<0.001), low income class (p<0.001), and daily smokers (p<0.01). 3) There was no significant difference in attitudes on his personal smoking between the pre-test and post-test. 4) The interest in the program seemed to lower as students got older. The score of motivation toward this prevention program was the highest in the middle school 3rd grade. Among sub-domains of motivation, the confidence score was the highest. Conclusion: To be most effective, the smoking prevention program for adolescents should utilize the most up-to-date and accurate information on smoking, and then instructional material should be developed so that the learners can approach the program with enjoyment. Through this study, a guide book with the most up-to-date information was developed and the multimedia CAI smoking prevention program was also developed based on the guide book. The program showed positive effect on the students' knowledge and belief in smoking.

ULTRASTRUCTURAL ANALYSIS OF TOOTH PULP AFFERENTS TERMINALS IN THE MEDULLARY DORSAL HORN OF THE RAT (치수유래 구심성 신경섬유의 삼차신경 감각핵군에서의 연접특성)

  • Bae, Yong-Chul;Lee, Eun-Hee;Choy, Min-Ki;Hong, Su-Hyung;Kim, Hyun-Jung;Na, Soon-Hyeun;Kim, Young-Jin
    • Journal of the korean academy of Pediatric Dentistry
    • /
    • v.28 no.2
    • /
    • pp.219-227
    • /
    • 2001
  • Little is known about processing mechanism of pain sensation of the oral cavity at the 1st synapse of trigeminal sensory nuclei. Serial ultrathin sections of tooth pulp afferent terminals, identified by the transganglionic transport of 1% wheatgerm agglutinin conjugated horseradish peroxidase, were investigated with electron microscope. Quantitative ultrastructural analysis was performed on digitizing tablet connected to Macintoshi personal computer (software; NIH Image 1.60, NIH, Bethesda, MD). Labeled boutons could be classified into two types by the shapes of containing vesicles : S bouton, which contained mainly spherical vesicles (Dia. 45-55 nm) and few large dense cored vesicles (Dia, 80-120nm), and LDCV bouton, which contained spherical vesicles as well as large number of large dense cored vesicles. Most of the parameters on the ultrastructural characteristic and synaptic organization of labeled boutons were similar between S and LDCV boutons, except shapes of containing vesicles. Majority of the labeled boutons showed simple synaptic arrangement. The labeled boutons were frequency presynaptic to dendritic spine, and to a lesser extent, dendritic shaft. They rarely synapsed with soma and adjacent proximal dendrite. A small proportion of labeled boutons made synaptic contacts with presynaptic, pleomorphic vesicles containing endings and synaptic triad. Morphometric parameters of labeled boutons including volume and surface area, total apposed area, mitochondrial volume, active zone area, vesicle number and density showed wide variation and these were not significantly different between S and LDCV boutons. The present study revealed characteristic features on ultrastructure and synaptic connection of pulpal afferents which may involved in transmission of oral pain sensation.

  • PDF

VKOSPI Forecasting and Option Trading Application Using SVM (SVM을 이용한 VKOSPI 일 중 변화 예측과 실제 옵션 매매에의 적용)

  • Ra, Yun Seon;Choi, Heung Sik;Kim, Sun Woong
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.4
    • /
    • pp.177-192
    • /
    • 2016
  • Machine learning is a field of artificial intelligence. It refers to an area of computer science related to providing machines the ability to perform their own data analysis, decision making and forecasting. For example, one of the representative machine learning models is artificial neural network, which is a statistical learning algorithm inspired by the neural network structure of biology. In addition, there are other machine learning models such as decision tree model, naive bayes model and SVM(support vector machine) model. Among the machine learning models, we use SVM model in this study because it is mainly used for classification and regression analysis that fits well to our study. The core principle of SVM is to find a reasonable hyperplane that distinguishes different group in the data space. Given information about the data in any two groups, the SVM model judges to which group the new data belongs based on the hyperplane obtained from the given data set. Thus, the more the amount of meaningful data, the better the machine learning ability. In recent years, many financial experts have focused on machine learning, seeing the possibility of combining with machine learning and the financial field where vast amounts of financial data exist. Machine learning techniques have been proved to be powerful in describing the non-stationary and chaotic stock price dynamics. A lot of researches have been successfully conducted on forecasting of stock prices using machine learning algorithms. Recently, financial companies have begun to provide Robo-Advisor service, a compound word of Robot and Advisor, which can perform various financial tasks through advanced algorithms using rapidly changing huge amount of data. Robo-Adviser's main task is to advise the investors about the investor's personal investment propensity and to provide the service to manage the portfolio automatically. In this study, we propose a method of forecasting the Korean volatility index, VKOSPI, using the SVM model, which is one of the machine learning methods, and applying it to real option trading to increase the trading performance. VKOSPI is a measure of the future volatility of the KOSPI 200 index based on KOSPI 200 index option prices. VKOSPI is similar to the VIX index, which is based on S&P 500 option price in the United States. The Korea Exchange(KRX) calculates and announce the real-time VKOSPI index. VKOSPI is the same as the usual volatility and affects the option prices. The direction of VKOSPI and option prices show positive relation regardless of the option type (call and put options with various striking prices). If the volatility increases, all of the call and put option premium increases because the probability of the option's exercise possibility increases. The investor can know the rising value of the option price with respect to the volatility rising value in real time through Vega, a Black-Scholes's measurement index of an option's sensitivity to changes in the volatility. Therefore, accurate forecasting of VKOSPI movements is one of the important factors that can generate profit in option trading. In this study, we verified through real option data that the accurate forecast of VKOSPI is able to make a big profit in real option trading. To the best of our knowledge, there have been no studies on the idea of predicting the direction of VKOSPI based on machine learning and introducing the idea of applying it to actual option trading. In this study predicted daily VKOSPI changes through SVM model and then made intraday option strangle position, which gives profit as option prices reduce, only when VKOSPI is expected to decline during daytime. We analyzed the results and tested whether it is applicable to real option trading based on SVM's prediction. The results showed the prediction accuracy of VKOSPI was 57.83% on average, and the number of position entry times was 43.2 times, which is less than half of the benchmark (100 times). A small number of trading is an indicator of trading efficiency. In addition, the experiment proved that the trading performance was significantly higher than the benchmark.

Development of Program for Renal Function Study with Quantification Analysis of Nuclear Medicine Image (핵의학 영상의 정량적 분석을 통한 신장기능 평가 프로그램 개발)

  • Song, Ju-Young;Lee, Hyoung-Koo;Suh, Tae-Suk;Choe, Bo-Young;Shinn, Kyung-Sub;Chung, Yong-An;Kim, Sung-Hoon;Chung, Soo-Kyo
    • The Korean Journal of Nuclear Medicine
    • /
    • v.35 no.2
    • /
    • pp.89-99
    • /
    • 2001
  • Purpose: In this study, we developed a new software tool for the analysis of renal scintigraphy which can be modified more easily by a user who needs to study new clinical applications, and the appropriateness of the results from our program was studied. Materials and Methods: The analysis tool was programmed with IDL5.2 and designed for use on a personal computer running Windows. For testing the developed tool and studying the appropriateness of the calculated glomerular filtration rate (GFR), $^{99m}Tc$-DTPA was administered to 10 adults in normal condition. In order to study the appropriateness of the calculated mean transit time (MTT), $^{99m}Tc-DTPA\;and\;^{99m}Tc-MAG3$ were administered to 11 adults in normal condition and 22 kidneys were analyzed. All the images were acquired with ORBITOR. the Siemens gamma camera. Results: With the developed tool, we could show dynamic renal images and time activity curve (TAC) in each ROI and calculate clinical parameters of renal function. The results calculated by the developed tool were not different statistically from the results obtained by the Siemens application program (Tmax: p=0.68, Relative Renal Function: p:1.0, GFR: p=0.25) and the developed program proved reasonable. The MTT calculation tool proved to be reasonable by the evaluation of the influence of hydration status on MTT. Conclusion: We have obtained reasonable clinical parameters for the evaluation of renal function with the software tool developed in this study. The developed tool could prove more practical than conventional, commercial programs.

  • PDF

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.

Development of a High Heat Load Test Facility KoHLT-1 for a Testing of Nuclear Fusion Reactor Components (핵융합로부품 시험을 위한 고열부하 시험시설 KoHLT-1 구축)

  • Bae, Young-Dug;Kim, Suk-Kwon;Lee, Dong-Won;Shin, Hee-Yun;Hong, Bong-Guen
    • Journal of the Korean Vacuum Society
    • /
    • v.18 no.4
    • /
    • pp.318-330
    • /
    • 2009
  • A high heat flux test facility using a graphite heating panel was constructed and is presently in operation at Korea Atomic Energy Research Institute, which is called KoHLT-1. Its major purpose is to carry out a thermal cycle test to verify the integrity of a HIP (hot isostatic pressing) bonded Be mockups which were fabricated for developing HIP joining technology to bond different metals, i.e., Be-to-CuCrZr and CuCrZr-to-SS316L, for the ITER (International Thermonuclear Experimental Reactor) first wall. The KoHLT-1 consists of a graphite heating panel, a box-type test chamber with water-cooling jackets, an electrical DC power supply, a water-cooling system, an evacuation system, an He gas system, and some diagnostics, which are equipped in an authorized laboratory with a special ventilation system for the Be treatment. The graphite heater is placed between two mockups, and the gap distance between the heater and the mockup is adjusted to $2{\sim}3\;mm$. We designed and fabricated several graphite heating panels to have various heating areas depending on the tested mockups, and to have the electrical resistances of $0.2{\sim}0.5$ ohms during high temperature operation. The heater is connected to an electrical DC power supply of 100 V/400 A. The heat flux is easily controlled by the pre-programmed control system which consists of a personal computer and a multi function module. The heat fluxes on the two mockups are deduced from the flow rate and the coolant inlet/out temperatures by a calorimetric method. We have carried out the thermal cycle tests of various Be mockups, and the reliability of the KoHLT-1 for long time operation at a high heat flux was verified, and its broad applicability is promising.

Estimation of Paddy Rice Growth Parameters Using L, C, X-bands Polarimetric Scatterometer (L, C, X-밴드 다편파 레이더 산란계를 이용한 논 벼 생육인자 추정)

  • Kim, Yi-Hyun;Hong, Suk-Young;Lee, Hoon-Yol
    • Korean Journal of Remote Sensing
    • /
    • v.25 no.1
    • /
    • pp.31-44
    • /
    • 2009
  • The objective of this study was to measure backscattering coefficients of paddy rice using a L-, C-, and X-band scatterometer system with full polarization and various angles during the rice growth period and to relate backscattering coefficients to rice growth parameters. Radar backscattering measurements of paddy rice field using multifrequency (L, C, and X) and full polarization were conducted at an experimental field located in National Academy of Agricultural Science (NAAS), Suwon, Korea. The scatterometer system consists of dual-polarimetric square horn antennas, HP8720D vector network analyzer ($20\;MHz{\sim}20\;GHz$), RF cables, and a personal computer that controls frequency, polarization and data storage. The backscattering coefficients were calculated by applying radar equation for the measured at incidence angles between $20^{\circ}$ and $60^{\circ}$ with $5^{\circ}$ interval for four polarization (HH, VV, HV, VH), respectively. We measured the temporal variations of backscattering coefficients of the rice crop at L-, C-, X-band during a rice growth period. In three bands, VV-polarized backscattering coefficients were higher than hh-polarized backscattering coefficients during rooting stage (mid-June) and HH-polarized backscattering coefficients were higher than VV-, HV/VH-polarized backscattering coefficients after panicle initiation stage (mid-July). Cross polarized backscattering coefficients in X-band increased towards the heading stage (mid-Aug) and thereafter saturated, again increased near the harvesting season. Backscattering coefficients of range at X-band were lower than that of L-, C-band. HH-, VV-polarized ${\sigma}^{\circ}$ steadily increased toward panicle initiation stage and thereafter decreased, and again increased near the harvesting season. We plotted the relationship between backscattering coefficients with L-, C-, X-band and rice growth parameters. Biomass was correlated with L-band hh-polarization at a large incident angle. LAI (Leaf Area Index) was highly correlated with C-band HH- and cross-polarizations. Grain weight was correlated with backscattering coefficients of X-band VV-polarization at a large incidence angle. X-band was sensitive to grain maturity during the post heading stage.

Simulation and Post-representation: a study of Algorithmic Art (시뮬라시옹과 포스트-재현 - 알고리즘 아트를 중심으로)

  • Lee, Soojin
    • 기호학연구
    • /
    • no.56
    • /
    • pp.45-70
    • /
    • 2018
  • Criticism of the postmodern philosophy of the system of representation, which has continued since the Renaissance, is based on a critique of the dichotomy that separates the subjects and objects and the environment from the human being. Interactivity, highlighted in a series of works emerging as postmodern trends in the 1960s, was transmitted to an interactive aspect of digital art in the late 1990s. The key feature of digital art is the possibility of infinite variations reflecting unpredictable changes based on public participation on the spot. In this process, the importance of computer programs is highlighted. Instead of using the existing program as it is, more and more artists are creating and programming their own algorithms or creating unique algorithms through collaborations with programmers. We live in an era of paradigm shift in which programming itself must be considered as a creative act. Simulation technology and VR technology draw attention as a technique to represent the meaning of reality. Simulation technology helps artists create experimental works. In fact, Baudrillard's concept of Simulation defines the other reality that has nothing to do with our reality, rather than a reality that is extremely representative of our reality. His book Simulacra and Simulation refers to the existence of a reality entirely different from the traditional concept of reality. His argument does not concern the problems of right and wrong. There is no metaphysical meaning. Applying the concept of simulation to algorithmic art, the artist models the complex attributes of reality in the digital system. And it aims to build and integrate internal laws that structure and activate the world (specific or individual), that is to say, simulate the world. If the images of the traditional order correspond to the reproduction of the real world, the synthesized images of algorithmic art and simulated space-time are the forms of art that facilitate the experience. The moment of seeing and listening to the work of Ian Cheng presented in this article is a moment of personal experience and the perception is made at that time. It is not a complete and closed process, but a continuous and changing process. It is this active and situational awareness that is required to the audience for the comprehension of post-representation's forms.

Real-time CRM Strategy of Big Data and Smart Offering System: KB Kookmin Card Case (KB국민카드의 빅데이터를 활용한 실시간 CRM 전략: 스마트 오퍼링 시스템)

  • Choi, Jaewon;Sohn, Bongjin;Lim, Hyuna
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.2
    • /
    • pp.1-23
    • /
    • 2019
  • Big data refers to data that is difficult to store, manage, and analyze by existing software. As the lifestyle changes of consumers increase the size and types of needs that consumers desire, they are investing a lot of time and money to understand the needs of consumers. Companies in various industries utilize Big Data to improve their products and services to meet their needs, analyze unstructured data, and respond to real-time responses to products and services. The financial industry operates a decision support system that uses financial data to develop financial products and manage customer risks. The use of big data by financial institutions can effectively create added value of the value chain, and it is possible to develop a more advanced customer relationship management strategy. Financial institutions can utilize the purchase data and unstructured data generated by the credit card, and it becomes possible to confirm and satisfy the customer's desire. CRM has a granular process that can be measured in real time as it grows with information knowledge systems. With the development of information service and CRM, the platform has change and it has become possible to meet consumer needs in various environments. Recently, as the needs of consumers have diversified, more companies are providing systematic marketing services using data mining and advanced CRM (Customer Relationship Management) techniques. KB Kookmin Card, which started as a credit card business in 1980, introduced early stabilization of processes and computer systems, and actively participated in introducing new technologies and systems. In 2011, the bank and credit card companies separated, leading the 'Hye-dam Card' and 'One Card' markets, which were deviated from the existing concept. In 2017, the total use of domestic credit cards and check cards grew by 5.6% year-on-year to 886 trillion won. In 2018, we received a long-term rating of AA + as a result of our credit card evaluation. We confirmed that our credit rating was at the top of the list through effective marketing strategies and services. At present, Kookmin Card emphasizes strategies to meet the individual needs of customers and to maximize the lifetime value of consumers by utilizing payment data of customers. KB Kookmin Card combines internal and external big data and conducts marketing in real time or builds a system for monitoring. KB Kookmin Card has built a marketing system that detects realtime behavior using big data such as visiting the homepage and purchasing history by using the customer card information. It is designed to enable customers to capture action events in real time and execute marketing by utilizing the stores, locations, amounts, usage pattern, etc. of the card transactions. We have created more than 280 different scenarios based on the customer's life cycle and are conducting marketing plans to accommodate various customer groups in real time. We operate a smart offering system, which is a highly efficient marketing management system that detects customers' card usage, customer behavior, and location information in real time, and provides further refinement services by combining with various apps. This study aims to identify the traditional CRM to the current CRM strategy through the process of changing the CRM strategy. Finally, I will confirm the current CRM strategy through KB Kookmin card's big data utilization strategy and marketing activities and propose a marketing plan for KB Kookmin card's future CRM strategy. KB Kookmin Card should invest in securing ICT technology and human resources, which are becoming more sophisticated for the success and continuous growth of smart offering system. It is necessary to establish a strategy for securing profit from a long-term perspective and systematically proceed. Especially, in the current situation where privacy violation and personal information leakage issues are being addressed, efforts should be made to induce customers' recognition of marketing using customer information and to form corporate image emphasizing security.