• Title/Summary/Keyword: responding

Search Result 1,553, Processing Time 0.026 seconds

Effects of Red-ginseng Extracts on the Activation of Dendritic Cells (고려홍삼의 수지상세포 활성화 효과)

  • Kim, Do-Soon;Park, Jueng-Eun;Seo, Kwon-Il;Ko, Sung-Ryong;Lee, Jong-Won;Do, Jae-Ho;Yee, Sung-Tae
    • Journal of Ginseng Research
    • /
    • v.30 no.3
    • /
    • pp.117-127
    • /
    • 2006
  • Ginseng is a medicinal herb widely used in Asian countries. Dendritic cells(DCs) play a pivotal role in the initiation of T cell-mediated immune responses, making them an attractive cellular adjuvant for use in cancer vaccines. In this study, we examined the effects of Red-ginseng(water extract, edible and fermented ethyl alcohol extract, crude saponin) on the DCs phenotypic and functional maturation. Immature DCs were cultured in the presence of GM-CSF and IL-4, and the generated immature DCs were stimulated by water extract, edible and fermented ethyl alcohol extract, crude saponin and LPS, respectively, for 24hours. The expression of surface co-stimulatory molecules, including MHC(major histocompatibility complex) class II, CD40, CD80 and CD86, was increased on DCs that were stimulated with crude saponin, but antigen-uptake capacity was decreased. The antigen-presenting capacity of Red-ginseng extracts-treated DCs as analyzed by allogeneic T cells proliferation and IL-2, $IFN-{\gamma}$ production was increased. Furthermore, $CD4^+$ and $CD8^+$ syngeneic T cell(OVA-specific) proliferation and $IFN-{\gamma}$ production was significantly increased. However, $CD4^+$ syngeneic T cell secreted higher levels of IL-2 in responding but not $CD8^+$ syngeneic T cell. These results indicate the immunomodulatory properties of Red-ginseng extracts, which might be therapeutically useful in the control of cancers and immunodeficient diseases through the up-regulation of DCs maturation.

Toward a Social Sciences Methodology for Electronic Survey Research on the Internet or Personal Computer check (사회과학 연구에 있어 인터넷 및 상업용 통신망을 이용한 전자설문 조사방법의 활용)

  • Hong Yong-Gee;Lee Hong-Gee;Chae Su-Kyung
    • Management & Information Systems Review
    • /
    • v.3
    • /
    • pp.287-316
    • /
    • 1999
  • Cyberspace permits us to more beyond traditional face-to-face, mail and telephone surveys, yet still to examine basic issues regarding the quality of data collection: sampling, questionnaire design, survey distribution, means of response, and database creation. This article address each of these issues by contrasting and comparing traditional survey methods(Paper-and-Pencil) with Internet or Personal Computer networks-mediated (Screen-and-Keyboard) survey methods also introduces researchers to this revolutionary and innovative tool and outlines a variety of practical methods for using the Internet or Personal Computer Networks. The revolution in telecommunications technology has fostered the rapid growth of the Internet all over the world. The Internet is a massive global network and comprising many national and international networks of interconnected computers. The Internet or Personal Computer Networks could be the comprehensive interactive tool that will facilitate the development of the skills. The Internet or Personal Computer Networks provides a virtual frontier to expand our access to information and to increase our knowledge and understanding of public opinion, political behavior, social trends and lifestyles through survey research. Comparable to other technological advancements, the Internet or Personal Computer Networks presents opportunities that will impact significantly on the process and quality of survey research now and in the twenty-first century. There are trade-offs between traditional and the Internet or Personal Computer Networks survey. The Internet or Personal Computer Networks is an important channel for obtaining information for target participants. The cost savings in time, efforts, and material were substantial. The use of the Internet or Personal Computer Networks survey tool will increase the quality of research environment. There are several limitations to the Internet or Personal Computer Network survey approach. It requires the researcher to be familiar with Internet navigation and E-mail, it is essential for this process. The use of Listserv and Newsgroup result in a biased sample of the population of corporate trainers. However, it is this group that participates in technology and is in the fore front of shaping the new organizations of interest, and therefore it consists of appropriate participants. If this survey method becomes popular and is too frequently used, potential respondents may become as annoyed with E-mail as the sometimes are with mail survey and junk mail. Being a member of the Listserv of Newsgroup may moderate that reaction. There is a need to determine efficient, effective ways for the researcher to strip identifiers from E-mail, so that respondents remain anonymous, while simultaneously blocking a respondent from responding to a particular survey instrument more than once. The optimum process would be on that is initiated by the researcher : simple, fast and inexpensive to administer and has credibility with respondents. This would protect the legitimacy of the sample and anonymity. Creating attractive Internet or Personal Computer Networks survey formats that build on the strengths of standardized structures but also capitalize on the dynamic and interactive capability of the medium. Without such innovations in survey design, it is difficult to imagine why potential survey respondents would use their time to answer questions. More must be done to create diverse and exciting ways of building an credibility between respondents and researchers on the Internet or Personal Computer Networks. We believe that the future of much exciting research is based in the Electronic survey research. The ability to communicate across distance, time, and national boundaries offers great possibilities for studying the ways in which technology and technological discourse are shaped. used, and disseminated ; the many recent doctoral dissertations that treat some aspect of electronic survey research testify to the increase focus on the Internet or Personal Computer Networks. Thus, scholars should begin a serious conversation about the methodological issues of conducting research In cyberspace. Of all the disciplines, Internet or Personal Computer Networks, emphasis on the relationship between technology and human communication, should take the lead in considering research in the cyberspace.

  • PDF

Korea's Terrorist Environment and Crisis Management Plan (한국의 테러환경과 위기관리 방안)

  • Jang, Sung Jin;Kim, Young-Hyun;Shin, Seung-Cheol
    • Korean Security Journal
    • /
    • no.52
    • /
    • pp.73-91
    • /
    • 2017
  • This study is based on the political and economic standpoint of each country, Use advanced equipment to prevent new terrorism from causing widespread damage, In order to establish a countermeasures against terrorism in accordance with the reality of Korea, which is effective in responding to terrorist attacks, Korea conducted a SWOT analysis of the terrorist environment and terrorist environment through specialists. First, internal strengths of Korea 's terrorist environment include stable security situation, weakness of religious and ethnic conflicts, strong regulation and control of firearms, and counter terrorism capabilities and know - how accumulated during major international events. Second, the internal weaknesses of the terrorist environment in Korea include the insecurity of the people, the instability caused by the military confrontation with North Korea, the absence of anti-terrorism law system, the difficulty of terrorism control and management by the development of the Internet and IT technology. Third, the external opportunities for Korea 's terrorist environment are as follows: ease of supplementation and learning through cases of foreign terrorism failure, ease of increase of terrorist budget and support with higher terrorism issues, strengthening of counterterrorism through military cooperation with allied nationsRespectively. Fourth, the external threats to the terrorist environment in Korea are the increase of social dissatisfaction due to the continuous influx of defectors and foreign workers, the goal of terrorism from international terrorist organizations through alliance with the United States,Increased frequency of incidents, and increased IS coverage of terrorism around the world. In addition, the SWOT in - depth interviews on the terrorist environment of the expert group were conducted to diagnose and analyze the problems, terrorism awareness and legal system in the Korean terror environment. The results of the study are summarized as follows.First, the basic law on terrorism should be enacted.Second, the establishment of an integrated anti-terrorism organization.Third, securing and nurturing specialized personnel in response to terrorism.

  • PDF

The Importance and Performance Analysis of Service Encounter Quality by Types of Restaurants (레스토랑 유형별 서비스 인카운터 품질의 중요도 및 수행도 분석)

  • Jo, Mi-Na
    • Journal of the Korean Society of Food Science and Nutrition
    • /
    • v.35 no.8
    • /
    • pp.1076-1087
    • /
    • 2006
  • The purpose of this study was to identify critical control points of service encounter by types of restaurants in order to manage moment of truth when customers encounter services. Questionnaires were collected from 812 customers (aged 15 years or older) who had used restaurants in Seoul, from October 24, 2005 to November 6, 2005. The main results of this study were as follows: Statistically significant differences were shown between importance and performance of interaction quality, physical environment quality and outcome quality. Significant differences were also shown in importance and performance of interaction and physical environment quality, and performance of outcome quality by restaurant types but no significant difference was indicated in importance of outcome quality by restaurant types. That is, the importance of outcome quality, which means the quality of food, was regarded as important by customers who use restaurants regardless of types of restaurants. The result of examining interaction quality showed that family restaurants managed waiting customers quite well and provided information on the Internet homepage. Performance of responding to customers with complaints was rated the highest in family restaurants. Regarding physical environment quality, importance and performance scores significantly differed by types of restaurants in order of fine-dining restaurants, family restaurants, and fast-food restaurants. In terms of service encounter quality, items whose importance scores were high but performance scores were low in importance-performance analysis matrix were 'quality of provided food is always uniform' and 'the space between other tables is enough' for fine-dining restaurants. In family restaurants, 'size of chairs or tables is enough', and 'the space between other tables is enough' were included in the items, while 'interior facilities are attractive', 'size of chairs and tables is enough', and 'the space between other tables is enough' were included in the items in case of fast-food restaurants. A difference was indicated depending on types of restaurants.

An Legal-doctrine Investigation into the Application of ADR to Administrative Cases (행정사건에 대한 ADR의 적용에 관한 법이론적 고찰)

  • 이용우
    • Journal of Arbitration Studies
    • /
    • v.13 no.2
    • /
    • pp.459-488
    • /
    • 2004
  • General interest in the out-of-court dispute resolution system are mounting in Korea, and the spread of ADR(alternative dispute resolution) is the worldwide trend. In addition, it was confirmed that the resolution of disputes by ADR such as the decision based on arbitration made by the Prime Ministerial Administrative Decision Committee is no longer in exclusive possession of the civil case. The activation of ADR could lead to the smooth agreement between parties by getting away from the once-for-all mode of decision such as the dismissal of the application or the cancellation of disposal and the like in relation to administrative cases for the years. In consequence, it is anticipated that the administrative litigation that applicants have filed by not responding to the administrative decision would greatly reduce in the future. But, it would be urgent to provide for the legal ground of the ADR system through the revision of related laws to take root in our society because ADR has no legal binding power relating to the administrative case due to the absence of its legal grounds. The fundamental reason for having hesitated to introduce ADR in relation to the administrative case for the years is the protective interest of the third party as well as the public interest that would follow in case the agreement on the dispute resolution between parties brings the dispute to a termination in the domain of the public law. The disputes related to the contract based on the public law and the like that take on a judicial character as the administrative act have been settled within the province of ADR by applying the current laws such as the Civil Arbitration Law, Mediation Law, but their application to the administrative act of the administrative agency that takes on a character of the public law has been hesitated. But as discussed earlier, there are laws and regulations that has the obscure distinction between public and private laws. But there is no significant advantage in relation to the distinction between public and private laws. To supplement and cure these defects it is necessary to include the institutional arrangement for protection of the rights and benefits of the third party, for example the provision of the imposition of the binding power on the result of ADR between parties, in enacting its related law. It can be said that the right reorganization of the out-of-court dispute resolution system in relation to the administrative case corresponds with the ideology of public administration for cooperaton in the Administrative Law. It is high time to discuss within what realm the out-of-court dispute resolution system, alternative dispute resolution system, can be accepted and what binding power is imposed on its result, not whether it is entirely introduced into the administrative case. It is thought that the current Civil Mediation Law or Arbitration Law provides the possibility of applying arbitration or mediation only to the civil case, thereby opening the possibility of arbitration in the field of the intellectual property right law. For instance, the act of the state is not required in establishing the rights related to the secret of business or copyrights. Nevertheless, the disputes arising from or in connection with the intellectual property rights law is seen as the administrative case, and they are excluded from the object of arbitration or mediation, which is thought to be improper. This is not an argument for unconditionally importing ADR into the resolution of administrative cases. Most of the Korean people are aware that the administrative litigation system is of paramount importance as the legal relief for administrative cases. Seeing that there is an independent administrative decision system based on the Administrative Decision Law other than administrative litigation in relation to administrative cases, the first and foremost task is the necessity for the shift in thinking of people, followed by consideration of the plan for relief of the rights through the improvement of the administrative decision system. Then, it is necessary to formulate the plan for the formal introduction and activation of ADR. In this process, energetic efforts should be devoted to introducing diverse forms of ADR procedures such as settlement conference, case evaluation, mini-trial, summary jury trial, early neutral evaluation adopted in the US as the method of dispute resolution other than compromise, conciliation, arbitration and mediation

  • PDF

The Multi-door Courthouse: Origin, Extension, and Case Studies (멀티도어코트하우스제도: 기원, 확장과 사례분석)

  • Chung, Yongkyun
    • Journal of Arbitration Studies
    • /
    • v.28 no.2
    • /
    • pp.3-43
    • /
    • 2018
  • The emergence of a multi-door courthouse is related with a couple of reasons as follows: First, a multi-door courthouse was originally initiated by the United States government that increasingly became impatient with the pace and cost of protracted litigation clogging the courts. Second, dockets of courts are overcrowded with legal suits, making it difficult for judges to handle those legal suits in time and causing delays in responding to citizens' complaints. Third, litigation is not suitable for the disputant that has an ongoing relationship with the other party. In this case, even if winning is achieved in the short run, it may not be all that was hoped for in the long run. Fourth, international organizations such as the World Bank, UNDP, and Asia Development Bank urge to provide an increased access to women, residents, and the poor in local communities. The generic model of a multi-door courthouse consists of three stages: The first stage includes a center offering intake services, along with an array of dispute resolution services under one roof. At the second stage, the screening unit at the center would diagnose citizen disputes, then refer the disputants to the appropriate door for handling the case. At the third stage, the multi-door courthouse provides diverse kinds of dispute resolution programs such as mediation, arbitration, mediation-arbitration (med-arb), litigation, and early neutral evaluation. This study suggests the extended model of multi-door courthouse comprised of five layers: intake process, diagnosis and door-selection process, neutral-selection process, implementation process of dispute resolution, and process of training and education. One of the major characteristics of extended multi-door courthouse model is the detailed specification of individual department corresponding to each process within a multi-door courthouse. The intake department takes care of the intake process. The screening department plays the role of screening disputes, diagnosing the nature of disputes, and determining a suitable door to handle disputes. The human resources department manages experts through the construction and management of the data base of mediators, arbitrators, and judges. The administration bureau manages the implementation of each process of dispute resolution. The education and training department builds long-term planning to procure neutrals and experts dealing with various kinds of disputes within a multi-door courthouse. For this purpose, it is necessary to establish networks among courts, law schools, and associations of scholars in order to facilitate the supply of manpower in ADR neutrals, as well as judges in the long run. This study also provides six case studies of multi-door courthouses across continents in order to grasp the worldwide picture and wide spread phenomena of multi-door courthouse. For this purpose, the United States and Latin American countries including Argentina and Brazil, Middle Eastern countries, and Southeast Asian countries (such as Malaysia and Myanmar), Australia, and Nigeria were chosen. It was found that three kinds of patterns are discernible during the evolution of a multi-door courthouse model. First, the federal courts of the United States, land and environment court in Australia, and Lagos multi-door courthouse in Nigeria may maintain the prototype of a multi-door courthouse model. Second, the judicial systems in Latin American countries tend to show heterogenous patterns in terms of the adaptation of a multi-door courthouse model to their own environments. Some court systems of Latin American countries including those of Argentina and Brazil resemble the generic model of a multi-door courthouse, while other countries show their distinctive pattern of judicial system and ADR systems. Third, it was found that legal pluralism is prevalent in Middle Eastern countries and Southeast Asian countries. For example, Middle Eastern countries such as Saudi Arabia have developed various kinds of dispute resolution methods, such as sulh (mediation), tahkim (arbitration), and med-arb for many centuries, since they have been situated at the state of tribe or clan instead of nation. Accordingly, they have no unified code within the territory. In case of Southeast Asian countries such as Myanmar and Malaysia, they have preserved a strong tradition of customary laws such as Dhammthat in Burma, and Shriah and the Islamic law in Malaysia for a long time. On the other hand, they incorporated a common law system into a secular judicial system in Myanmar and Malaysia during the colonial period. Finally, this article proposes a couple of factors to strengthen or weaken a multi-door courthouse model. The first factor to strengthen a multi-door courthouse model is the maintenance of flexibility and core value of alternative dispute resolution. We also find that fund raising is important to build and maintain the multi-door courthouse model, reflecting the fact that there has been a competition surrounding the allocation of funds within the judicial system.

A Research Study on the Sexual Awareness of Teenagers. Their Parents and Teachers in an Urban Area (일부 시 지역 고교생.학부모.교사들의 성의식 조사)

  • Lim, Mi-Lim;Yang, Soon-Ok;Lee, Kwang-Ok
    • Research in Community and Public Health Nursing
    • /
    • v.12 no.3
    • /
    • pp.755-772
    • /
    • 2001
  • The specific purpose of this study was as follows: 1) To identify the level of sexual awareness and demand for sex education of teenagers, their parents and teachers. 2) To investigate the attitude toward and acceptance of heterosexual friendships by teenagers, their parents and teachers. 3) To identify the experience and direction of sex education of parents and teachers. For this purpose, this study selected 341 male and female teenagers at three high schools located in a city, 119 parents with high school students and 243 elementary/middle/high school teachers. The structured questionnaire was distributed to each of them and returned by them. This study was conducted over the period between June 1. 2001 and Aug 31. 2001. A total of 720 questionnaires were distributed to them and 703 were returned. Data analysis was conducted to obtain percentage and frequency using the SAS program. As a result, the following findings were obtained: Parents and teachers showed a similar attitude about sexual awareness, but teenagers showed a different attitude. In terms of the level of feeling of and interest in 'sex', teenagers, parents and teachers were comfortable in accepting it. As for sexual curiosity in puberty, 84.8% of the parents and 95.5% of the teachers responded that it was natural, whereas only 14.7% of teenagers responded that it was natural. But As for the item that 'sex is natural as one of human needs', 3.6% of the teenagers, 16.8% of the parents and only 1.2% of the teachers responded that it was not. As for the item that 'A man has a stronger sexual impulse than a woman', 6.1% of the teenagers, 16.8% of the parents and 17.3% of the teachers responded that it was not. 64.2% of the teenagers and 90.2% of the teachers responded that it was impossible to overcome the sexual impulse, whereas only 8.4% of the parents responded that it was possible. As for the item of masturbation, 64.5% of the teenagers responded that it was possible for male students and not possible for female students. 67.2% of the parents and 91.1% of the teachers responded that it was possible regardless of sex. As for the item of an attitude toward virginal purity, both the parents and teachers showed that virginal purity was important for both man and woman, but teenagers showed a weak awareness of virginal purity. As for the item, 'It is possible to have sexual intercourse with a lover during adolescence', 20.2% of the teenagers, 79% of the parents and 87.7% of the teachers responded that it was impossible. As for the item 'It is necessary to keep premarital virginal purity for a happy married life', 21.1% of the teenagers, 74.8% of the parents and 55.1% of the teachers responded that it was necessary, which shows that teenagers had a different opinion than parents and teachers. In case of pregnancy in adolescence, most of the responding teenagers, parents and teachers chose abortion. As for the item 'female refusal on male sexual approach', respondents accepted female refusal as they did for orders of teachers, parents and adolescents. As for item 'An assaulter is entirely to blame for sexual assault', all of three groups responded in the affirmative.

  • PDF

Effect Assessment and Derivation of Ecological Effect Guideline on CO2-Induced Acidification for Marine Organisms (이산화탄소 증가로 인한 해수 산성화가 해양생물에 미치는 영향평가 및 생태영향기준 도출)

  • Gim, Byeong-Mo;Choi, Tae Seob;Lee, Jung-Suk;Park, Young-Gyu;Kang, Seong-Gil;Jeon, Ei-Chan
    • Journal of the Korean Society for Marine Environment & Energy
    • /
    • v.17 no.2
    • /
    • pp.153-165
    • /
    • 2014
  • Carbon dioxide capture and storage (CCS) technology is recognizing one of method responding the climate change with reduction of carbon dioxide in atmosphere. In Korea, due to its geological characteristics, sub-seabed geological $CO_2$ storage is regarded as more practical approach than on-land storage under the goal of its deployment. However, concerns on potential $CO_2$ leakage and relevant acidification issue in the marine environment can be an important subject in recently increasing sub-seabed geological $CO_2$ storage sites. In the present study effect data from literatures were collected in order to conduct an effect assessment of elevated $CO_2$ levels in marine environments using a species sensitivity distribution (SSD) various marine organisms such as microbe, crustacean, echinoderm, mollusc and fish. Results from literatures using domestic species were compared to those from foreign literatures to evaluate the reliability of the effect levels of each biological group and end-point. Ecological effect guidelines through estimating level of pH variation (${\delta}pH$) to adversely affect 5 and 50% of tested organisms, HC5 and HC50, were determined using SSD of marine organisms exposed to the $CO_2$-induced acidification. Estimated HC5 as ${\delta}pH$ of 0.137 can be used as only interim quality guideline possibly with adequate assessment factor. In the future, the current interim guideline as HC5 of ${\delta}pH$ in this study will look forward to compensate with supplement of ecotoxicological data reflecting various trophic levels and indigenous species.

A Study on the Determination of Tramp Freight Rates (부정기선 운임율의 결정에 관한 이론적 고찰)

  • 이종인
    • Journal of the Korean Institute of Navigation
    • /
    • v.4 no.2
    • /
    • pp.45-79
    • /
    • 1980
  • The aim of this paper is to analyze the mechanics of price formation in the tramp shipping. For the purpose of this study, the main characteristics of tramp freight rates and the market is examined, and a brief examination of the nature ofthe costs of operation is given which are essential for the understanding of the functioning of shipping firms as well as for the understanding of developments in the tramp freight market. The demand and supply relationships in the market is also analysed in detail. Tramp shipping is an industry that has a market which functions under conditions that are not dissimilar to the theoretical model of perfect competition. However, it does notmean that tramp shipping market is a perfectly competitive market. It is apparent that this realworld competitive system has its imperfections, which means that the market for tramp shipping is near to being a perfectly competitive market on an internaitonal scale and it is freight are therefore subjext to the laws of supply and demand. In theory, the minimum freight rate in the short term is that at which the lowest cost vessels will lay-up in preference to operating, and is equal to the variable costs minus lay-up costs; and this would imply that in all times except those of full employment for ships there is a tendency for newer low-cost, and, probably, faster vessels to be driving the older high-cost vessels in the breaker's yards. In this case, shipowners may be reluctant to lay-up their ships becasue of obligations to crews, or because they would lose credibility with shippers or financiers, or simply because of lost prestige. Mainly, however, the decision is made on strictly economic grounds. When, for example, the total operating costs minus the likely freight earnings are greater than the cost of taking the ship out of service, maintaining it, and recommissioning it, then a ship may be considered for laying-up; shipowners will, in other words, run the ships at freight earnings below operating costs by as much as the cost of laying them up. As described above, the freight rates fixed on the tramp shipping market are subject to the laws of supply and demand. In other words, the basic properties of supply and demand are of significance so far as price or rate fluctuations in the tramp freight market are concerned. In connection with the same of the demand for tramp shipping services, the following points should be brone in mind: (a) That the magnitude of demand for sea transport of dry cargoes in general and for tramp shipping services in particular is increasing in the long run. (b) That owning to external factors, the demand for tramp shipping services is capable of varying sharphy at a given going of time. (c) The demad for the industry's services tends to be price inelastic in the short run. On the other hand the demand for the services offered by the individual shipping firm tends as a rule to be infinitely price elastic. In the meantime, the properties of the supply of the tramp shipping facilities are that it cannot expand or contract in the short run. Also, that in the long run there is a time-lag between entrepreneurs' decision to expand their fleets and the actual time of delivery of the new vessels. Thus, supply is inelastic and not capable of responding to demand and price changes at a given period of time. In conclusion, it can be safely stated that short-run changes in freight rates are a direct result of variations in the magnitude of demand for tramp shipping facilities, whilest the average level of freight rates is brought down to relatively low levels over prolonged periods of time.

  • PDF

An Integrated Model based on Genetic Algorithms for Implementing Cost-Effective Intelligent Intrusion Detection Systems (비용효율적 지능형 침입탐지시스템 구현을 위한 유전자 알고리즘 기반 통합 모형)

  • Lee, Hyeon-Uk;Kim, Ji-Hun;Ahn, Hyun-Chul
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.1
    • /
    • pp.125-141
    • /
    • 2012
  • These days, the malicious attacks and hacks on the networked systems are dramatically increasing, and the patterns of them are changing rapidly. Consequently, it becomes more important to appropriately handle these malicious attacks and hacks, and there exist sufficient interests and demand in effective network security systems just like intrusion detection systems. Intrusion detection systems are the network security systems for detecting, identifying and responding to unauthorized or abnormal activities appropriately. Conventional intrusion detection systems have generally been designed using the experts' implicit knowledge on the network intrusions or the hackers' abnormal behaviors. However, they cannot handle new or unknown patterns of the network attacks, although they perform very well under the normal situation. As a result, recent studies on intrusion detection systems use artificial intelligence techniques, which can proactively respond to the unknown threats. For a long time, researchers have adopted and tested various kinds of artificial intelligence techniques such as artificial neural networks, decision trees, and support vector machines to detect intrusions on the network. However, most of them have just applied these techniques singularly, even though combining the techniques may lead to better detection. With this reason, we propose a new integrated model for intrusion detection. Our model is designed to combine prediction results of four different binary classification models-logistic regression (LOGIT), decision trees (DT), artificial neural networks (ANN), and support vector machines (SVM), which may be complementary to each other. As a tool for finding optimal combining weights, genetic algorithms (GA) are used. Our proposed model is designed to be built in two steps. At the first step, the optimal integration model whose prediction error (i.e. erroneous classification rate) is the least is generated. After that, in the second step, it explores the optimal classification threshold for determining intrusions, which minimizes the total misclassification cost. To calculate the total misclassification cost of intrusion detection system, we need to understand its asymmetric error cost scheme. Generally, there are two common forms of errors in intrusion detection. The first error type is the False-Positive Error (FPE). In the case of FPE, the wrong judgment on it may result in the unnecessary fixation. The second error type is the False-Negative Error (FNE) that mainly misjudges the malware of the program as normal. Compared to FPE, FNE is more fatal. Thus, total misclassification cost is more affected by FNE rather than FPE. To validate the practical applicability of our model, we applied it to the real-world dataset for network intrusion detection. The experimental dataset was collected from the IDS sensor of an official institution in Korea from January to June 2010. We collected 15,000 log data in total, and selected 10,000 samples from them by using random sampling method. Also, we compared the results from our model with the results from single techniques to confirm the superiority of the proposed model. LOGIT and DT was experimented using PASW Statistics v18.0, and ANN was experimented using Neuroshell R4.0. For SVM, LIBSVM v2.90-a freeware for training SVM classifier-was used. Empirical results showed that our proposed model based on GA outperformed all the other comparative models in detecting network intrusions from the accuracy perspective. They also showed that the proposed model outperformed all the other comparative models in the total misclassification cost perspective. Consequently, it is expected that our study may contribute to build cost-effective intelligent intrusion detection systems.