• Title/Summary/Keyword: reviews

Search Result 5,474, Processing Time 0.031 seconds

consumers' purchasing behavior of functional cosmetics and Inula based functional cosmetics merchandising research (국내 소비자의 기능성화장품 구매행태 및 선복화 활용 기능성화장품 상품화를 위한 연구)

  • Han, Do-Kyung;Lee, Hyun-Jun;Lee, Eun-Hee;Paik, Hyun-Dong;Shin, Dong-Kyoo;Park, Dae-Sub;Hwang, Hye-Seon;Hong, Wan-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.8
    • /
    • pp.236-250
    • /
    • 2016
  • This study was conducted to provide baseline data regarding functional cosmetics so that Inula. based cosmetics can increase its competitiveness in the market as well as to understand current trends to enable anticipation of demands for future product development. For this research, general consumers over the age of 20 residing in Seoul and the Gyeonggi district were surveyed. The results show consumers preferred serum-type products among various types of cosmetics, and that they purchased these once every 1-3 months. Consumers also preferred these products in less than 10-30ml capacity, and at costs of less than 30,000-50,000 KRW. For whitening, functional cosmetics consumers also preferred the serum type, in less than 30-50ml capacity and priced less than 30,000-50,000 KRW. Consumers preferred to purchase functional cosmetics in single units. The major purchasing location, with a high preference rate, was cosmetic stores, and the major sources of information, also with high preference rates, were 'experienced reviews from family, friends and acquaintances' and 'TV advertisements'. Respondents selected 'over 50,000 KRW' the most for all items when responding to 'Purchase Intent for Functional Cosmetics containing Inula', and responded that they were willing to pay 10%-30% more for functional cosmetics containing Inula compared to standard functional cosmetics. These results show that businesses in the cosmetics industry need to take consumer demand into account when developing new functional cosmetic products, as well as establish plans to create specialized spaces that provide better quality service and increase word of mouth effect through better utilization of various types of offline media, social media, and blogs. The study also shows a need for businesses to develop products fully utilizing the Inula flower, which has been shown to be effective as a natural skin whitener, wrinkle reducer and skin moisturizer, to appeal to the increasing number of customers interested in health and beauty.

An analysis of one-year experience of pediatric observation unit: The first report in Korea (소아 관찰병실 운영에 대한 분석)

  • Lee, Jee Young;Choi, Ui-Yoon;Lee, Soo Young;Lee, Ji-Young;Lee, Byong Chan;Hwang, Hui Sung;Mok, Hye Rin;Jeong, Dae Chul;Chung, Seung Yun;Kang, Jin Han
    • Clinical and Experimental Pediatrics
    • /
    • v.50 no.7
    • /
    • pp.622-628
    • /
    • 2007
  • Purpose : While pediatric observation units (POU) have become a common practice in hospitals throughout developed countries, there has been no report about POUs in Korea so far. The aims of this study were to analyze our one-year's experience of the POU and to decide which disease entities are suitable for the POU. Methods : All children admitted from March 2006 to February 2007 to the POU at the Department of Pediatrics in Our Lady of Mercy Hospital were included in this study. Data were collected from retrospective reviews of their medical records. Results : There were a total of 1,076 POU admissions. Median age of patients was 2.4 years and median length of hospital stay 14.0 hours. The most common diagnoses were gastroenteritis (42.7%), pharyngotonsillitis (19.1%), bronchiolitis (7.8%), pneumonia (5.5%) and febrile seizure (5.2%). Overall, 7.5% of the POU patients required subsequent inpatient admissions due to hospital stays of longer than 48 hours. The disease entities that were most likely to require inpatient admission were pneumonia (17.0%), febrile seizure (12.5%) and asthma (11.5%). Diseases that allowed successful discharge from the POU were gastroenteritis (4.6%), upper respiratory tract infection (5.8%), such as otitis media and pharygnotonsillitis and seizure disorder (6.4%). Compared with the previous year when the POU was not in operation, there was a statistically significant reduction in the average length of hospital stays (from 4.69 to 3.75 days), as well as a rise in the bed turnover rate (from 78.8 to 98.2 patients/bed). Conclusion : Our study shows that the POU is efficient for the management of children with certain acute illnesses. Based on this study, we suggest that the POU be used as a new modality which links between the outpatient, inpatient, and emergency departments in the field of pediatrics in Korea.

Nuclear Terrorism and Global Initiative to Combat Nuclear Terrorism(GICNT): Threats, Responses and Implications for Korea (핵테러리즘과 세계핵테러방지구상(GICNT): 위협, 대응 및 한국에 대한 함의)

  • Yoon, Tae-Young
    • Korean Security Journal
    • /
    • no.26
    • /
    • pp.29-58
    • /
    • 2011
  • Since 11 September 2001, warnings of risk in the nexus of terrorism and nuclear weapons and materials which poses one of the gravest threats to the international community have continued. The purpose of this study is to analyze the aim, principles, characteristics, activities, impediments to progress and developmental recommendation of the Global Initiative to Combat Nuclear Terrorism(GICNT). In addition, it suggests implications of the GICNT for the ROK policy. International community will need a comprehensive strategy with four key elements to accomplish the GICNT: (1) securing and reducing nuclear stockpiles around the world, (2) countering terrorist nuclear plots, (3) preventing and deterring state transfers of nuclear weapons or materials to terrorists, (4) interdicting nuclear smuggling. Moreover, other steps should be taken to build the needed sense of urgency, including: (1) analysis and assessment through joint threat briefing for real nuclear threat possibility, (2) nuclear terrorism exercises, (3) fast-paced nuclear security reviews, (4) realistic testing of nuclear security performance to defeat insider or outsider threats, (5) preparing shared database of threats and incidents. As for the ROK, main concerns are transfer of North Korea's nuclear weapons, materials and technology to international terror groups and attacks on nuclear facilities and uses of nuclear devices. As the 5th nuclear country, the ROK has strengthened systems of physical protection and nuclear counterterrorism based on the international conventions. In order to comprehensive and effective prevention of nuclear terrorism, the ROK has to strengthen nuclear detection instruments and mobile radiation monitoring system in airports, ports, road networks, and national critical infrastructures. Furthermore, it has to draw up effective crisis management manual and prepare nuclear counterterrorism exercises and operational postures. The fundamental key to the prevention, detection and response to nuclear terrorism which leads to catastrophic impacts is to establish not only domestic law, institution and systems, but also strengthen international cooperation.

  • PDF

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

The Study of the Use of 'Korean Traditional Paper' as An Object in Korean Ink Painting (한국화의 '한지(韓紙)' 오브제 사용에 대한 연구)

  • Oh Se-Kwon
    • Journal of Science of Art and Design
    • /
    • v.8
    • /
    • pp.161-184
    • /
    • 2005
  • Traditionally, Korean ink painting used paper as a background medium. This tradition has sought a new attempt to meet today's demands while its expressive techniques and mediums become more diverse. The attempt of Korean ink painting to explore new mediums could change both its structure and style when considering the significance of the medium in the work. These new attempts have encouraged a further study of 'Korean Traditional Paper'. Today, 'Korean Traditional Paper' is considered to be an object itself rather than just being a background. In other words, there is no implication of a separation between the medium 'Korean Traditional Paper' and the work. Instead, the medium itself becomes the work. Therefore, 'Korean Traditional Paper' is not only a 'background' that contains the artist's desire to express, but at the same time also an 'object'. This study focuses on the attributes of 'Korean Traditional Paper' as an object, examines how this is visually applied in contemporary Korean ink painting in the relation to 'Korean Beauty', and reviews the work of some artists that use Korean Traditional Paper. The use of Korean Traditional Paper as an object first began with the experimental techniques of Lee , Eung-Noh and Kwon, Young-Woo in the 1960s, Then it seemed to stop for a while in the 1970s and 1980s until there was a renewed interest in the material personality of Korean Traditional Paper with the birth of the 'Korean Traditional Paper Artists Association' in the 1990s. This interest increased and Korean Traditional Paper was earnestly adopted by artists like Yim, Hyo Lee, Ki-Sook Won, Moon-Ja and Choi, Moo-Young, who used the paper in Broussonetia, the previous fibered state of rice paper. Here, the expression of the object through the characteristics of Korean Traditional Paper is a visual experiment to discover Korea's traditional art mediums that were forgotten once, focusing on the manifestation of Korean Beauty through Korean Traditional Paper. In this respect, this attempt has a valuable meaning in its use with a contemporary visual sense , based on the Korean sense of beauty.

  • PDF

The Effect of Information Service Quality on Customer Loyalty: A Customer Relationship Management Perspective (정보서비스품질이 고객로열티에 미치는 영향에 관한 연구: 고객관계관리 관점)

  • Kim, Hyung-Su;Gim, Seung-Ha;Kim, Young-Gul
    • Asia pacific journal of information systems
    • /
    • v.18 no.1
    • /
    • pp.1-23
    • /
    • 2008
  • As managing customer relationship gets more important, companies are strengthening information service using multi-channels to their customers as a part of their customer relationship management (CRM) initiatives. It means companies are now accepting such information services not as simple information -delivering tools, but as strategic initiatives for acquiring and maintaining customer loyalty. In this paper, we attempt to validate whether or not such various information services would impact on organizational performance in terms of CRM strategy. More specifically, our research objective is to answer the next three questions: first, how to construct the instruments to measure not information quality but information service quality?; second, which attributes of information service quality can influence corporate image and customer loyalty?; finally, does each information service type have unique characteristics compared with others in terms of influencing corporate image and customer loyalty? With respect to providing answers to those questions, the previous studies had been limited in that those studies failed to consider the variety of types of information service or restricted the quality of information service to information quality. An appropriate research model answering the above questions should consider the fact that most companies are utilizing multi channels for their information services, and include the recent strategic information service such as customer online community. Moreover, since corporate information service could be regarded as a type of products or services delivered to customer, it is necessary to adopt the criteria for assessing customer's perceived value when to measure the quality of information service. Therefore, considering both multi-channels and multi-traits may enable us to tell the detailed causal routes showing which quality attributes of which information service would affect corporate image and customer loyalty. As information service channels, we include not only homepage and DM (direct mail), which are the most frequently applied information service channels, but also online community, which is getting more strategic importance in recent years. With respect to information service quality, we abstract information quality, convenience of information service, and timeliness of information service through a wide range of relevant literature reviews. As our dependant variables, we consider corporate image and customer loyalty that both of them are the critical determinants of organizational performance, and also attempt to grasp the relationship between the two constructs. We conducted a huge online survey at the homepage of one of representative dairy companies in Korea, and gathered 367 valid samples from 407 customers. The reliability and validity of our measurements were tested by using Cronbach's alpha coefficient and principal factor analysis respectively, and seven hypotheses were tested through performing correlation test and multiple regression analysis. The results from data analysis demonstrated that timeliness and convenience of homepage have positive effects on both corporate image and customer loyalty. In terms of DM, its' information quality was represented to influence both corporate image and customer loyalty, but we found its' convenience have a positive effect only on corporate image. With respect to online community, we found its timeliness contribute significantly both to corporate image and customer loyalty. Finally, as we expected, corporate image was revealed to provide a great influence to customer loyalty. This paper provides several academic and practical implications. Firstly, we think our research reinforces CRM literatures by developing the instruments for measuring information service quality. The previous relevant studies have mainly depended on the measurements of information quality or service quality which were developed independently. Secondly, the fact that we conducted our research in a real situation may enable academics and practitioners to understand the effects of information services more clearly. Finally, since our study involved three different types of information service which are most frequently applied in recent years, the results from our study might provide operational guidelines to the companies that are delivering their customers information by multi-channel. In other words, since we found that, in terms of customer loyalty, the key areas would be different from each other according to the types of information services, our analysis would help to make decisions such as selecting strengthening points or allocating resources by information service channels.

What happens after IT adoption?: Role of habits, confirmation, and computer self-efficacy formed by the experiences of use (정보기술 수용 후 주관적 지각 형성: 사용 경험에서 형성된 습관, 기대일치, 자기효능감의 역할)

  • Kim, Yong-Young;Oh, Sang-Jo;Ahn, Joong-Ho;Jahng, Jung-Joo
    • Asia pacific journal of information systems
    • /
    • v.18 no.1
    • /
    • pp.25-51
    • /
    • 2008
  • Researchers have been continuously interested in the adoption of information technology (IT) since it is of great importance to the information systems success and it is also an important stage to the success. Adoption alone, however, does not ensure information systems success because it does not necessarily lead to achieving organizational or individual objectives. When an organization or an individual decide to adopt certain information technologies, they have objectives to accomplish by using those technologies. Adoption itself is not the ultimate goal. The period after adoption is when users continue to use IT and intended objectives can be accomplished. Therefore, continued IT use in the post-adoption period accounts more for the accomplishment of the objectives and thus information systems success. Previous studies also suggest that continued IT use in the post-adoption period is one of the important factors to improve long-term productivity. Despite the importance there are few empirical studies focusing on the user behavior of continued IT use in the post-adoption period. User behavior in the post-adoption period is different from that in the pre-adoption period. According to the technology acceptance model, which explains well about the IT adoption, users decide to adopt IT assessing the usefulness and the ease of use. After adoption, users are exposed to new experiences and they shape new beliefs different from the thoughts they had before. Users come to make decisions based on their experiences of IT use whether they will continue to use it or not. Most theories about the user behaviors in the pre-adoption period are limited in describing them after adoption since they do not consider user's experiences of using the adopted IT and the beliefs formed by those experiences. Therefore, in this study, we explore user's experiences and beliefs in the post-adoption period and examine how they affect user's intention to continue to use IT. Through deep literature reviews on the construction of subjective beliefs by experiences, we draw three meaningful constructs which theoretically have great impacts on the continued use of IT: perceived habit, confirmation, and computer self-efficacy. Then, we examine the role of the subjective beliefs on the cognitive/affective attitudes and intention to continue to use that IT. We set up a research model and conducted survey research. Since IT use implies interactions among a user, IT, and a task, we carefully selected the sample of users using same/similar IT to perform same/similar tasks, to exclude unwanted influences of other factors than subjective beliefs on the IT use. We also considered that the sample of users were able to make decisions to continue to use IT volitionally or at least quasi-volitionally. For each construct, we used measurement items recognized for reliability and widely used in the previous research. We slightly modified some items proper to the research context and a pilot test was carried out for forty users of a portal service in a university. We performed a full-scale survey after verifying the reliability of the measurement. The results show that the intention to continue to use IT is strongly influenced by cognitive/affective attitudes, perceived habits, and computer self-efficacy. Confirmation affects the intention to continue indirectly through cognitive/affective attitudes. All the constructs representing the subjective beliefs built by the experiences of IT use have direct and/or indirect impacts on the intention of users. The results also show that the attitudes in the post-adoption period are formed, at least partly, by the experiences of IT use and newly shaped beliefs after adoption. The findings suggest that subjective beliefs built by the experiences have deep impacts on the continued use. The results of the study signify that while experiencing IT in the post-adoption period users form new beliefs, attitudes, and intentions which may be different from those of the pre-adoption period. The results of this study partly demonstrate that the beliefs shaped by the behaviors, those are the experiences of IT use, influence users' attitudes and intention. The results also suggest that behaviors (experiences) also change attitudes while attitudes shape behaviors. If we combine the findings of this study with the results of the previous research on IT adoption, we can propose a cycle of IT adoption and use where behavior shapes attitude, the attitude forms new behavior, and that behavior shapes new attitude. Different from the previous research, the study focused on the user experience after IT adoption and empirically demonstrated the strong influence of the subjective beliefs formed in the post-adoption period on the continued use. This partly confirms the differences between attitudes in the pre-adoption and in the post-adoption period. Users continuously change their attitudes and intentions while experiencing (using) IT. Therefore, to make users adopt IT and to make them use IT after adoption is a different problem. To encourage users to use IT after adoption, experiential variables such as perceived habit, confirmation, and computer self-efficacy should be managed properly.

Priority Order of Decisional Factors and Conceptual Construct of Security Martial Arts' Spirit (경호무도 정신특성 요인의 상대적 중요도 평가)

  • Kim, Dong-Hyun
    • Korean Security Journal
    • /
    • no.32
    • /
    • pp.7-32
    • /
    • 2012
  • This study aimed to evaluate the relative status using Analytic Hierarchy Process(AHP) on the spiritual factors of the security martial arts for the guards to perform the best security service. There were 540 participants who were students majored in security martial arts, workers for security and specialists of practical and theoretical security martial arts for this study. The exploratory and confirmatory factor analysis were carried out using the selecting data through literature reviews in the level of the factor-extraction about the spiritual characteristics. The specialists' survey was conducted on the relative status among factors using the spiritual concept structure based on the studied above. Selected data was calculated with SPSS 18.0 for windows, AMOS 5.0, and Expert Choice 2000 software. The conclusion can be made through those process above. First, 4 general factors and 20 detailed factors were found as the result of the factor exploration related to the spiritual characteristics of the security martial arts. The result which was verified on Construction validity of searched factors had stable figures on every standard. In other words, the participants for survey on this study "Spiritual characteristic concepts of the security martial arts" can be evaluated it is valid. The general factors of security martial arts' spirit were conceptualized with Psychological spirit, ethical spirit, martial art spirit, practical spirit through the naming process on the general factors of the security martial arts' spiritual characteristic concepts. The detailed factors of security martial arts' spirit were concentration, self-confidence, self-management, immersion, self-esteem in psychological spirit and sacrifice, justice, royalty, peace, sense of duty in ethical spirit and courtesy, toughness, defense, balance of mind and body, bravery in martial arts and responsibility, cooperation, modesty, determination, professionalism in practical spirit of security martial arts. That is, the conceptualization of security martial arts' spirit was verified that it had validity. Second, the hierarchical model of the security martial arts was composed with 4 superordinate concepts and 20 subordinate concepts. As the result of evaluating relative status based on Spiritual characteristics-hierarchy model, the impotance was proven in order of ethical spirit(.482), martial art spirit(.248), practical spirit(.188), psychological spirit(.083). Also the importance related to spiritual characteristics of security martial arts on subordinate concepts was proven in order of sacrifice(.252), courtesy(.110), sense of duty(.108), responsibility(. 073), royalty(.053), toughness(.052), justice(.049), defense(.038), professionalism(.038), determination(.035), cooperation(.029), self-confidence (.026), bravery(.025), self-esteem(.024), balance of mind and body(.023), peace(.019), concentration(.014), modesty(.013), self-management(.011), flow (.007). To sum up, the spiritual factor related to ethics such as sacrifice, justice, royalty, peace, sense of duty was the most important for the security martial arts.

  • PDF

Review of Responsibility in Case of Medical Tour Disputes (의료관광 분쟁시 책임주체에 대한 검토)

  • Moon, Sang hyuk
    • The Korean Society of Law and Medicine
    • /
    • v.17 no.1
    • /
    • pp.107-135
    • /
    • 2016
  • Medical tour can be said to be a new high added-value tour industry of 21st century. The development of varied and distinguished medical tour products by each country will further vitalize the medical tour industry. As the interest in such medical tour increases, it is necessary to analyze the demand and interests of tourists accurately and prepare medical tour products to be provided in order to develop and promote medical tour products. The government considers the medical tour industry as an industry with high expected effects in job creation through promotion of experts in global healthcare industry and national economy development through high added-value creation, and has expanded aid policies in medical tour field with improvement of medical tour immigration system, one-stop service system for medical tourists, and medical tour labor force promotion system. Nevertheless, there are disputes between foreign patients and medical tour inviting businesses, along with medical accident disputes between foreign patients and medical staff and disputes with those working in the tourism industry. This article reviews the types of disputes occurring around the inviting businesses related to medical tours and tried to review the resolutions. Through this, it was found that medical tour inviting businesses have the responsibility to connect the mediated benefits and risks and also the responsibility to process the tasks. Thus, in case dispute occurs due to passive actions from establishing agency agreement to active mediation results, it is difficult to escape the liabilities. Also, in a medical tour agency contract, the inviting business must be aware that it bears the responsibility to explain and advise the details on benefits and risks to foreign patients. The "Guide to arbitration system for resolution of medical disputes with foreign patients" by Korea Health Industry Development Institute Act presents a method to resolve disputes according to the [laws on medical accident damage relief and medical dispute arbitration] in case a dispute due to medical accidents occurs to foreign patients when the foreign patients prepare diagnosis agreement, Whether such method is sufficient to protect foreign patients, however, is thought to require discussions from more diverse perspectives. In order to vitalize medical tourism, the development of diverse products is also important, but the countermeasures against related disputes should also be prepared. Such is expected to contribute to a greater advancement based on trust of foreign medical tourists alongside excellent medical technologies.

  • PDF

A review of factors that regulate extracellular enzyme activity in wetland soils (습지 토양 내 체외효소 활성도를 조절하는 인자에 대한 고찰)

  • Kim, Haryun
    • Korean Journal of Microbiology
    • /
    • v.51 no.2
    • /
    • pp.97-107
    • /
    • 2015
  • Wetlands constitute a transitional zone between terrestrial and aquatic ecosystems and have unique characteristics such as frequent inundation, inflow of nutrients from terrestrial ecosystems, presence of plants adapted to grow in water, and soil that is occasionally oxygen deficient due to saturation. These characteristics and the presence of vegetation determine physical and chemical properties that affect decomposition rates of organic matter (OM). Decomposition of OM is associated with activities of various extracellular enzymes (EE) produced by bacteria and fungi. Extracellular enzymes convert macromolecules to simple compounds such as labile organic carbon (C), nitrogen (N), phosphorus (P), and sulfur (S) that can be easily taken up by microbes and plants. Therefore, the enzymatic approach is helpful to understand the decomposition rates of OM and nutrient cycling in wetland soils. This paper reviews the physical and biogeochemical factors that regulate extracellular enzyme activities (EEa) in wetland soils, including those of ${\beta}$-glucosidase, ${\beta}$-N-acetylglucosaminidase, phosphatase, arylsulfatase, and phenol oxidase that decompose organic matter and release C, N, P, and S nutrients for microbial and plant growths. Effects of pH, water table, and particle size of OM on EEa were not significantly different among sites, whereas the influence of temperature on EEa varied depending on microbial acclimation to extreme temperatures. Addition of C, N, or P affected EEa differently depending on the nutrient state, C:N ratio, limiting factors, and types of enzymes of wetland soils. Substrate quality influenced EEa more significantly than did other factors. Also, drainage of wetland and increased temperature due to global climate change can stimulate phenol oxidase activity, and anthropogenic N deposition can enhance the hydrolytic EEa; these effects increase OM decomposition rates and emissions of $CO_2$ and $CH_4$ from wetland systems. The researches on the relationship between microbial structures and EE functions, and environmental factors controlling EEa can be helpful to manipulate wetland ecosystems for treating pollutants and to monitor wetland ecosystem services.