• Title/Summary/Keyword: 개인화 서비스

Search Result 1,444, Processing Time 0.034 seconds

Characterization and Detection of Opinion Manipulation on Common Interest Groups in Online Communities (온라인 공간에서 관심집단 대상 비정상 정보의 특징 분석과 탐지)

  • Lee, Sihyung
    • Journal of Internet Computing and Services
    • /
    • v.21 no.6
    • /
    • pp.57-69
    • /
    • 2020
  • As more people share their opinions in online communities, such as Internet portals and social networking services, more opinions are manipulated for the benefit of particular individuals and groups. In particular, when manipulations occur for political purposes, they influence election results as well as government policies and the quality of life. This type of manipulation has targeted the general public, and their analysis and detection has also focused on such manipulation. However, to more efficiently spread propaganda, recent manipulations have targeted common interest groups(e.g., a group of those interested in real estate) and propagated information whose content and style are customized to those groups. This work characterizes such manipulations on common interest groups and proposes method to detect manipulations. To this end, we collected and analyzed opinions posted on 10 common interest groups before and after an election. As a result, we found that manipulations on common interest groups indeed occurred and were gradually increasing toward the election date. We also proposed a detection system that examines individual opinions, their authors, and their collaborators. Using the collected opinions, we demonstrated that the proposed system can accurately classify more than 90% of manipulated opinions and that many of these opinions were posted by multiple collaborators. We believe that regular audits of opinions using the proposed system can quickly isolate manipulations and decrease their impact. Moreover, the proposed features can be used to identify manipulations in domains other than politics.

Development of User Customized Path Finding Algorithm for Public Transportation Information (대중교통 정보제공을 위한 맞춤형 경로탐색 알고리즘 개발)

  • Shin, Sung Il;Park, Je Jin;Lee, Jong Chul;Ha, Tae Jun
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.28 no.3D
    • /
    • pp.317-323
    • /
    • 2008
  • Mass transit information can contribute many benefits to users. Especially, transportation information technology is developing highly with information technology in Korea recently. Hereafter, it is expected to give customized transportation information to users individually with the advent of ubiquitous age in earnest. This public transportation information service can be realized by path finding algorithm in public transportation networks including travel and transfer attributes. In this research, constraints are constructed with the primary facts influencing users. Moreover, the method reducing user's path finding condition arbitrarily is proposed by making the maximum value as variables. In this study, transfer frequency, total travel time, seat confirmation, transfer time and travel time become constraint condition based on k path finding algorithm considering service time constraint condition. Moreover, case study about user customized transfer information is performed in Seoul and metropolitan subway networks.

The Influence of the satisfaction of the elderly with their participation in fitness on the expectation of support and family function (노인의 체육활동 참여 만족이 부양기대감 및 가족기능에 미치는 영향)

  • Lim, Shin-Ja;Lee, Sun-Hee
    • 한국노년학
    • /
    • v.29 no.1
    • /
    • pp.89-99
    • /
    • 2009
  • This study aims to identify the influence of the satisfaction of the elderly with their participation in fitness on the expectation of support and family function. First, overall satisfaction and satisfaction with service quality out of satisfaction factors with the participation in fitness significantly affected family cohesion and family adaptability, and they significantly affected family adaptability in psychological satisfaction factors. Second, all of the sub-factors of the satisfaction with the participation in fitness significantly affected the expectation of support. Third, the satisfaction with fitness of the elderly directly affected family cohesion and family adaptability, which posted .162 and .239 respectively. Plus, the satisfaction with the participation in fitness indirectly affected the expectation of support, which posted .032 and directly affected the expectation of support, which posted .722. Also, family cohesion directly affected the expectation of support, which posted -.101, and family adaptability directly affected the expectation of support, which posted .201.

The Relationship between Trust, Trustworthiness, and Repeat Purchase Intentions: A Multidimensional Approach (신뢰대상의 다차원적 접근법에 의한 신뢰와 재구매 의도와의 관계)

  • Lee, Soo-Hyung;Park, Mi-Ryong
    • Journal of Global Scholars of Marketing Science
    • /
    • v.18 no.1
    • /
    • pp.1-31
    • /
    • 2008
  • Trust is central to human relationships, at all times and places. The importance of trust is fundamental in all areas of human life, not only in the area of business administration. 2,500 years ago in China, Confucius taught that the foundation of politics was the trust of the people, more important even than military strength or the supply of food. Shakespeare's play, "Much Ado about Nothing' is about trust and deception. These days, trust and transparency in a commercial organization's business culture form the basis of the 'social capital' by which that organization increases its productivity. A successful company raises productivity by the accumulation of social capital, derived from a trust relationship between business partners, and between the company and consumers. Trust is the crucial factor. At the national level, building trust determines a nation's competitiveness. For a company, long term trust relationships with customers are essential for its survival in a business environment of rapid change. Such relationships, based on trust, are important assets to ensure a company's competitive advantage, and need to be organic to that company's business culture. Because of this importance, trust relationships have been studied in diverse areas within business administration, and especially within marketing, where they form the basis of a successful relationship between producer and consumer. However, what has been lacking is a unified definition of trust. Research has been conducted on the basis of various definitions and models. The majority of researchers have not considered the multidimensional character of the concept of trust until now. Approaches based on a one dimensional model have undermined the value of research results. Furthermore, researchers have only considered trust and trustworthiness as a single component. The majority of research has explored the consequences of perceived trust for outcomes such as loyalty or cooperation, but has neglected the effects of trustworthiness upon the mechanisms of consumer trust. This study focuses on the dimension of trust from such a perspective. It seeks to verify the effect of trust on customer intentions by breaking it down into three separate components: 1) the salesperson, 2) the product/service, and 3) the company. The purposes of this paper are as follows: Firstly, we review the multidimensional nature of trust objects: the salesperson, the product/service, and the company. Secondly, we analyze the relationship between multidimensional trust and trustworthiness. Thirdly, we analyze the connection between trust and repeat purchase intentions for the maintenance of long term relationships. For these purposes the author has developed several hypotheses as follows: H1-1: The competence of a salesperson is positively associated with the trust given by the consumer to the salesperson. H1-2: The benevolence of a salesperson is positively associated with the trust given by the consumer to the salesperson. H2-1: The competence of product/service is positively associated with the trust given by the consumer to the product/service. H2-2: The benevolence of product/service is positively associated with the trust given by the consumer to the product/service. H3-1: The reputation of a company is positively associated with the trust given by the consumer to the company. H3-2: The physical environment of a company is positively associated with the trust given by the consumer to the company. H4-1: Trust in a salesperson is positively associated with repeat purchase intentions. H4-2: Trust in a product/service is positively associated with repeat purchase intentions. H4-3: Trust in a company is positively associated with repeat purchase intentions. The data was compiled from 366 questionnaires. 500 questionnaires were collected, but some of the data was considered unsuitable and inappropriate. The subjects of the survey were male and female customers purchasing products at department stores in Seoul, Daegu and Gyeongbuk. It was carried out between Oct. 25 and 29, 2007. The data was analyzed by frequency analysis using SPSS 12.0 and structural equation modeling using LISREL 8.7. The result of the overall model analysis is as follows: Chi-Square=445.497, d.f.=185, p-value=0.0, GFI=.901, RMSEA=.0617, NNFI=.986, NFI=.981, CFI=.989, AGFI=.864, RMR=.0872. The results of the overall model analysis were coherent. It was found that trust is a multi-dimensional construct, that each of the dimensions of trust are meaningful influences on customer's repurchase intention. Trust in a company may be the most relevant, while trust in a product/service and a salesperson may be less relevant to repurchase intentions. The effective factors in determining trust in a salesperson and a company's product/service were found to be competence and benevolence. Factors in determining trust in a company were its reputation and physical environment, and the relationship of each effective trust factor has been verified in this research. As a result, it was found that competence and benevolence have a meaningful influence on trust in a salesperson and in product/service. It was also found that a company's reputation influences the overall trust in the company significantly but a company's physical environment does not have much effect.

  • PDF

A Study on the Effect of Booth Recommendation System on Exhibition Visitors Unplanned Visit Behavior (전시장 참관객의 계획되지 않은 방문행동에 있어서 부스추천시스템의 영향에 대한 연구)

  • Chung, Nam-Ho;Kim, Jae-Kyung
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.175-191
    • /
    • 2011
  • With the MICE(Meeting, Incentive travel, Convention, Exhibition) industry coming into the spotlight, there has been a growing interest in the domestic exhibition industry. Accordingly, in Korea, various studies of the industry are being conducted to enhance exhibition performance as in the United States or Europe. Some studies are focusing particularly on analyzing visiting patterns of exhibition visitors using intelligent information technology in consideration of the variations in effects of watching exhibitions according to the exhibitory environment or technique, thereby understanding visitors and, furthermore, drawing the correlations between exhibiting businesses and improving exhibition performance. However, previous studies related to booth recommendation systems only discussed the accuracy of recommendation in the aspect of a system rather than determining changes in visitors' behavior or perception by recommendation. A booth recommendation system enables visitors to visit unplanned exhibition booths by recommending visitors suitable ones based on information about visitors' visits. Meanwhile, some visitors may be satisfied with their unplanned visits, while others may consider the recommending process to be cumbersome or obstructive to their free observation. In the latter case, the exhibition is likely to produce worse results compared to when visitors are allowed to freely observe the exhibition. Thus, in order to apply a booth recommendation system to exhibition halls, the factors affecting the performance of the system should be generally examined, and the effects of the system on visitors' unplanned visiting behavior should be carefully studied. As such, this study aims to determine the factors that affect the performance of a booth recommendation system by reviewing theories and literature and to examine the effects of visitors' perceived performance of the system on their satisfaction of unplanned behavior and intention to reuse the system. Toward this end, the unplanned behavior theory was adopted as the theoretical framework. Unplanned behavior can be defined as "behavior that is done by consumers without any prearranged plan". Thus far, consumers' unplanned behavior has been studied in various fields. The field of marketing, in particular, has focused on unplanned purchasing among various types of unplanned behavior, which has been often confused with impulsive purchasing. Nevertheless, the two are different from each other; while impulsive purchasing means strong, continuous urges to purchase things, unplanned purchasing is behavior with purchasing decisions that are made inside a store, not before going into one. In other words, all impulsive purchases are unplanned, but not all unplanned purchases are impulsive. Then why do consumers engage in unplanned behavior? Regarding this question, many scholars have made many suggestions, but there has been a consensus that it is because consumers have enough flexibility to change their plans in the middle instead of developing plans thoroughly. In other words, if unplanned behavior costs much, it will be difficult for consumers to change their prearranged plans. In the case of the exhibition hall examined in this study, visitors learn the programs of the hall and plan which booth to visit in advance. This is because it is practically impossible for visitors to visit all of the various booths that an exhibition operates due to their limited time. Therefore, if the booth recommendation system proposed in this study recommends visitors booths that they may like, they can change their plans and visit the recommended booths. Such visiting behavior can be regarded similarly to consumers' visit to a store or tourists' unplanned behavior in a tourist spot and can be understand in the same context as the recent increase in tourism consumers' unplanned behavior influenced by information devices. Thus, the following research model was established. This research model uses visitors' perceived performance of a booth recommendation system as the parameter, and the factors affecting the performance include trust in the system, exhibition visitors' knowledge levels, expected personalization of the system, and the system's threat to freedom. In addition, the causal relation between visitors' satisfaction of their perceived performance of the system and unplanned behavior and their intention to reuse the system was determined. While doing so, trust in the booth recommendation system consisted of 2nd order factors such as competence, benevolence, and integrity, while the other factors consisted of 1st order factors. In order to verify this model, a booth recommendation system was developed to be tested in 2011 DMC Culture Open, and 101 visitors were empirically studied and analyzed. The results are as follows. First, visitors' trust was the most important factor in the booth recommendation system, and the visitors who used the system perceived its performance as a success based on their trust. Second, visitors' knowledge levels also had significant effects on the performance of the system, which indicates that the performance of a recommendation system requires an advance understanding. In other words, visitors with higher levels of understanding of the exhibition hall learned better the usefulness of the booth recommendation system. Third, expected personalization did not have significant effects, which is a different result from previous studies' results. This is presumably because the booth recommendation system used in this study did not provide enough personalized services. Fourth, the recommendation information provided by the booth recommendation system was not considered to threaten or restrict one's freedom, which means it is valuable in terms of usefulness. Lastly, high performance of the booth recommendation system led to visitors' high satisfaction levels of unplanned behavior and intention to reuse the system. To sum up, in order to analyze the effects of a booth recommendation system on visitors' unplanned visits to a booth, empirical data were examined based on the unplanned behavior theory and, accordingly, useful suggestions for the establishment and design of future booth recommendation systems were made. In the future, further examination should be conducted through elaborate survey questions and survey objects.

Adaptive Data Hiding Techniques for Secure Communication of Images (영상 보안통신을 위한 적응적인 데이터 은닉 기술)

  • 서영호;김수민;김동욱
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.5C
    • /
    • pp.664-672
    • /
    • 2004
  • Widespread popularity of wireless data communication devices, coupled with the availability of higher bandwidths, has led to an increased user demand for content-rich media such as images and videos. Since such content often tends to be private, sensitive, or paid for, there exists a requirement for securing such communication. However, solutions that rely only on traditional compute-intensive security mechanisms are unsuitable for resource-constrained wireless and embedded devices. In this paper, we propose a selective partial image encryption scheme for image data hiding , which enables highly efficient secure communication of image data to and from resource constrained wireless devices. The encryption scheme is invoked during the image compression process, with the encryption being performed between the quantizer and the entropy coder stages. Three data selection schemes are proposed: subband selection, data bit selection and random selection. We show that these schemes make secure communication of images feasible for constrained embed-ded devices. In addition we demonstrate how these schemes can be dynamically configured to trade-off the amount of ded devices. In addition we demonstrate how these schemes can be dynamically configured to trade-off the amount of data hiding achieved with the computation requirements imposed on the wireless devices. Experiments conducted on over 500 test images reveal that, by using our techniques, the fraction of data to be encrypted with our scheme varies between 0.0244% and 0.39% of the original image size. The peak signal to noise ratios (PSNR) of the encrypted image were observed to vary between about 9.5㏈ to 7.5㏈. In addition, visual test indicate that our schemes are capable of providing a high degree of data hiding with much lower computational costs.

Emoticon by Emotions: The Development of an Emoticon Recommendation System Based on Consumer Emotions (Emoticon by Emotions: 소비자 감성 기반 이모티콘 추천 시스템 개발)

  • Kim, Keon-Woo;Park, Do-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.1
    • /
    • pp.227-252
    • /
    • 2018
  • The evolution of instant communication has mirrored the development of the Internet and messenger applications are among the most representative manifestations of instant communication technologies. In messenger applications, senders use emoticons to supplement the emotions conveyed in the text of their messages. The fact that communication via messenger applications is not face-to-face makes it difficult for senders to communicate their emotions to message recipients. Emoticons have long been used as symbols that indicate the moods of speakers. However, at present, emoticon-use is evolving into a means of conveying the psychological states of consumers who want to express individual characteristics and personality quirks while communicating their emotions to others. The fact that companies like KakaoTalk, Line, Apple, etc. have begun conducting emoticon business and sales of related content are expected to gradually increase testifies to the significance of this phenomenon. Nevertheless, despite the development of emoticons themselves and the growth of the emoticon market, no suitable emoticon recommendation system has yet been developed. Even KakaoTalk, a messenger application that commands more than 90% of domestic market share in South Korea, just grouped in to popularity, most recent, or brief category. This means consumers face the inconvenience of constantly scrolling around to locate the emoticons they want. The creation of an emoticon recommendation system would improve consumer convenience and satisfaction and increase the sales revenue of companies the sell emoticons. To recommend appropriate emoticons, it is necessary to quantify the emotions that the consumer sees and emotions. Such quantification will enable us to analyze the characteristics and emotions felt by consumers who used similar emoticons, which, in turn, will facilitate our emoticon recommendations for consumers. One way to quantify emoticons use is metadata-ization. Metadata-ization is a means of structuring or organizing unstructured and semi-structured data to extract meaning. By structuring unstructured emoticon data through metadata-ization, we can easily classify emoticons based on the emotions consumers want to express. To determine emoticons' precise emotions, we had to consider sub-detail expressions-not only the seven common emotional adjectives but also the metaphorical expressions that appear only in South Korean proved by previous studies related to emotion focusing on the emoticon's characteristics. We therefore collected the sub-detail expressions of emotion based on the "Shape", "Color" and "Adumbration". Moreover, to design a highly accurate recommendation system, we considered both emotion-technical indexes and emoticon-emotional indexes. We then identified 14 features of emoticon-technical indexes and selected 36 emotional adjectives. The 36 emotional adjectives consisted of contrasting adjectives, which we reduced to 18, and we measured the 18 emotional adjectives using 40 emoticon sets randomly selected from the top-ranked emoticons in the KakaoTalk shop. We surveyed 277 consumers in their mid-twenties who had experience purchasing emoticons; we recruited them online and asked them to evaluate five different emoticon sets. After data acquisition, we conducted a factor analysis of emoticon-emotional factors. We extracted four factors that we named "Comic", Softness", "Modernity" and "Transparency". We analyzed both the relationship between indexes and consumer attitude and the relationship between emoticon-technical indexes and emoticon-emotional factors. Through this process, we confirmed that the emoticon-technical indexes did not directly affect consumer attitudes but had a mediating effect on consumer attitudes through emoticon-emotional factors. The results of the analysis revealed the mechanism consumers use to evaluate emoticons; the results also showed that consumers' emoticon-technical indexes affected emoticon-emotional factors and that the emoticon-emotional factors affected consumer satisfaction. We therefore designed the emoticon recommendation system using only four emoticon-emotional factors; we created a recommendation method to calculate the Euclidean distance from each factors' emotion. In an attempt to increase the accuracy of the emoticon recommendation system, we compared the emotional patterns of selected emoticons with the recommended emoticons. The emotional patterns corresponded in principle. We verified the emoticon recommendation system by testing prediction accuracy; the predictions were 81.02% accurate in the first result, 76.64% accurate in the second, and 81.63% accurate in the third. This study developed a methodology that can be used in various fields academically and practically. We expect that the novel emoticon recommendation system we designed will increase emoticon sales for companies who conduct business in this domain and make consumer experiences more convenient. In addition, this study served as an important first step in the development of an intelligent emoticon recommendation system. The emotional factors proposed in this study could be collected in an emotional library that could serve as an emotion index for evaluation when new emoticons are released. Moreover, by combining the accumulated emotional library with company sales data, sales information, and consumer data, companies could develop hybrid recommendation systems that would bolster convenience for consumers and serve as intellectual assets that companies could strategically deploy.

Implementation of An Automatic Authentication System Based on Patient's Situations and Its Performance Evaluation (환자상황 기반의 자동인증시스템 구축 및 성능평가)

  • Ham, Gyu-Sung;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.21 no.4
    • /
    • pp.25-34
    • /
    • 2020
  • In the current medical information system, a system environment is constructed in which Biometric data generated by using IoT or medical equipment connected to a patient can be stored in a medical information server and monitored at the same time. Also, the patient's biometric data, medical information, and personal information after simple authentication using only the ID / PW via the mobile terminal of the medical staff are easily accessible. However, the method of accessing these medical information needs to be improved in the dimension of protecting patient's personal information, and provides a quick authentication system for first aid. In this paper, we implemented an automatic authentication system based on the patient's situation and evaluated its performance. Patient's situation was graded into normal and emergency situation, and the situation of the patient was determined in real time using incoming patient biometric data from the ward. If the patient's situation is an emergency, an emergency message including an emergency code is send to the mobile terminal of the medical staff, and they attempted automatic authentication to access the upper medical information of the patient. Automatic authentication is a combination of user authentication(ID/PW, emergency code) and mobile terminal authentication(medical staff's role, working hours, work location). After user authentication, mobile terminal authentication is proceeded automatically without additional intervention by medical staff. After completing all authentications, medical staffs get authorization according to the role of medical staffs and patient's situations, and can access to the patient's graded medical information and personal information through the mobile terminal. We protected the patient's medical information through limited medical information access by the medical staff according to the patient's situation, and provided an automatic authentication without additional intervention in an emergency situation. We performed performance evaluation to verify the performance of the implemented automatic authentication system.

Managing Duplicate Memberships of Websites : An Approach of Social Network Analysis (웹사이트 중복회원 관리 : 소셜 네트워크 분석 접근)

  • Kang, Eun-Young;Kwahk, Kee-Young
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.1
    • /
    • pp.153-169
    • /
    • 2011
  • Today using Internet environment is considered absolutely essential for establishing corporate marketing strategy. Companies have promoted their products and services through various ways of on-line marketing activities such as providing gifts and points to customers in exchange for participating in events, which is based on customers' membership data. Since companies can use these membership data to enhance their marketing efforts through various data analysis, appropriate website membership management may play an important role in increasing the effectiveness of on-line marketing campaign. Despite the growing interests in proper membership management, however, there have been difficulties in identifying inappropriate members who can weaken on-line marketing effectiveness. In on-line environment, customers tend to not reveal themselves clearly compared to off-line market. Customers who have malicious intent are able to create duplicate IDs by using others' names illegally or faking login information during joining membership. Since the duplicate members are likely to intercept gifts and points that should be sent to appropriate customers who deserve them, this can result in ineffective marketing efforts. Considering that the number of website members and its related marketing costs are significantly increasing, it is necessary for companies to find efficient ways to screen and exclude unfavorable troublemakers who are duplicate members. With this motivation, this study proposes an approach for managing duplicate membership based on the social network analysis and verifies its effectiveness using membership data gathered from real websites. A social network is a social structure made up of actors called nodes, which are tied by one or more specific types of interdependency. Social networks represent the relationship between the nodes and show the direction and strength of the relationship. Various analytical techniques have been proposed based on the social relationships, such as centrality analysis, structural holes analysis, structural equivalents analysis, and so on. Component analysis, one of the social network analysis techniques, deals with the sub-networks that form meaningful information in the group connection. We propose a method for managing duplicate memberships using component analysis. The procedure is as follows. First step is to identify membership attributes that will be used for analyzing relationship patterns among memberships. Membership attributes include ID, telephone number, address, posting time, IP address, and so on. Second step is to compose social matrices based on the identified membership attributes and aggregate the values of each social matrix into a combined social matrix. The combined social matrix represents how strong pairs of nodes are connected together. When a pair of nodes is strongly connected, we expect that those nodes are likely to be duplicate memberships. The combined social matrix is transformed into a binary matrix with '0' or '1' of cell values using a relationship criterion that determines whether the membership is duplicate or not. Third step is to conduct a component analysis for the combined social matrix in order to identify component nodes and isolated nodes. Fourth, identify the number of real memberships and calculate the reliability of website membership based on the component analysis results. The proposed procedure was applied to three real websites operated by a pharmaceutical company. The empirical results showed that the proposed method was superior to the traditional database approach using simple address comparison. In conclusion, this study is expected to shed some light on how social network analysis can enhance a reliable on-line marketing performance by efficiently and effectively identifying duplicate memberships of websites.

Evaluation of Worker's Health and Occupational Exposure to Perchloroethylene in Laundries (Perchlotoethylene을 사용하는 세탁소 작업자들의 직업성 폭로와 건강에 관한 연구)

  • An, Sun-Hee;Lee, Jong-Hwoa;Park, Jong-An
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.4 no.2
    • /
    • pp.224-239
    • /
    • 1994
  • In this study we examined several subjective symptoms in an exposed group and an unexposed group to perchloroethylene. The exposed group consists to 30 workers employed in 23 dry-cleaning establishments located in Chung Cheung Do, whereas the unexposed group consists of 42 officers employed in a certain university. This study was conducted from October, 1993 to March, 1994. Also we investigated personal exposure levels and area concentration of PCE, and performed hematological and biochemical examination in blood and urine samples from the exposed group. The results are : 1. The exposed group highly complains several subjective symptoms, particularly in neuropsychiatry, eye, respiratory system and digestive system, compared with the unexposed group. But complaint rates in the exposed group are not related with PCE exposure levels. 2. PCE exposure levels for all dry-cleaning establishment varied widely, from 0.18 to 37.58ppm. The mean exposure level for centers of chain was 16.85ppm, and for local laundries was 8.83ppm, while for self-service establishment it was 3.07ppm. Eighty three percent of the workers were exposed less than the half-level(25.0ppm) of the Korea 50.0ppm standard for eight-hour PCE exposure. Seventeen percent of them exceeded the half-level of the Korea TLV. 3. Statistical correlation exists between the work load(number of operation cycles of equipment and the mass of processed textiles) and the personal exposure levels to be observed. 4. In hematological examination the values of WBC, RBC, Hgb, Hct, MCV, MCH, MCHC and PLT in the exposed group were within normal ranges. In biochemical examination(GOT, GPT, ALP, U-A and LDH) most of the items were within normal ranges. From this surveys conducted on 23 dry-cleaning establishments, the complaint rates of the exposed group to PCE in several subjective symptoms were higher than those of the unexposed group, and PCE exposure levels in all dry-cleaning establishment were below the Koera standard 50.0ppm. In hematological and biochemical examination the significant abnormalities by occupational exposure to PCE were not observed. However, the workers employed in dry-cleaning establishments are always faced with risk, becauses they are also exposed to several organic solvents used to remove stains. Therefore, various measures to improve occupational environment in dry-cleaning establishment should be considered.

  • PDF