• Title/Summary/Keyword: 확대모형

Search Result 1,061, Processing Time 0.029 seconds

Effect of Capital Market Return On Insurance Coverage : A Financial Economic Approach (투자수익(投資收益)이 보험수요(保險需要)에 미치는 영향(影響)에 관한 이론적(理論的) 고찰(考察))

  • Hong, Soon-Koo
    • The Korean Journal of Financial Management
    • /
    • v.10 no.1
    • /
    • pp.249-280
    • /
    • 1993
  • Recent financial theory views insurance policies as financial instruments that are traded in markets and whose prices reflect the forces of supply and demand. This article analyzes individual's insurance purchasing behavior along with capital market investment activities, which will provide a more realistic look at the tradeoff between insurance and investment in the individual's budget constraint. It is shown that the financial economic concept of insurance cost should reflect the opportunity cost of insurance premium. The author demonstrates the importance of riskless and risky financial assets in reaching an equilibrium insurance premium. In addition, the paper also investigates how the investment income could affect the four established theorems on traditional insurance literature. At the present time in Korea, the price deregulation is being debated as the most important current issue in insurance industry. In view of the results of this paper, insurance companies should recognize investment income in pricing their coverage if insurance prices are deregulated. Otherwise. price competition may force insurance companies to restrict coverage or to leave the market.

  • PDF

A Study of the Evolving Process of Wealthy Major Donors' Sharing Lives in Korea (부유층의 기부과정에 관한 연구)

  • Kang, Chul-Hee;Kim, Mi-Ok
    • Korean Journal of Social Welfare
    • /
    • v.59 no.2
    • /
    • pp.5-38
    • /
    • 2007
  • This study attempts to develop a theory on the evolving process of wealthy major donors' sharing lives in Korea through a grounded theory approach. To conduct this study, the researchers have in-depth interviews with 11 exemplary wealthy major donors who have more than one million US dollars in his or her own asset and donate more than ten thousand US dollars annually. In data analysis, this study identifies 161 concepts on the evolving process of wealthy major donors' sharing lives; and the concepts are categorized with 33 sub-categories and 14 categories. In the paradigm model on the evolving process of wealthy major donors' sharing lives, it is identified that the central phenomenon, 'practicing sharing lives as noblesse oblige', is related with the causal conditions such as 'learning through memories and observation', 'realizing my duties', and 'emphasizing'; and the central phenomenon is related with the contingent conditions such as 'being sensitive to external evaluation', 'having limited information on giving', 'distrusting donation related environments'. The action/interactional sequences such as 'utilizing relationships' and 'strengthening active participation' are accomplished by moderating conditions such as 'having internal and external supports' and 'guiding by firm conviction'. It reveals that as a result, wealthy major donors enjoy the feeling of becoming a ideal and true wealthy person, establish sharing lives as firm and major parts of overall lives, and experience strong desires for better future and society. In this study, 'generous sharing that shares personal heritages and social benefits' is analyzed as a core category; it shows that sharing of wealthy major donors is related to the characteristics of generosity practice based on moral self-benefiting rather than complete altruistic characteristics or self-sacrificial characteristics. The process analysis reveals that it has the following stages: first, initial giving by exposure to causes or requests; second, routine practice of giving; third, evolution of practice of giving with gradual expansion in quantities and qualities; and fourth, living with giving. In the process, the following four types are identified: devoted wealthy donors for sharing, wealthy donors practicing sharing in daily life, wealthy donors practicing sharing with learning on external stimulus, and wealthy donors practicing sharing on empathy. Finally, this study discusses both meanings of identifying and developing a theory on the evolving process of wealthy major donors' sharing lives and implications of the research results in cultivating and developing potential wealthy major donors in Korea.

  • PDF

Construction of Retrovirus Vector System for the Regulation of Recombinant hTPO Gene Expression (재조합 hTPO 유전자의 발현 조절을 위한 Retrovirus Vector System의 구축)

  • Kwon, Mo-Sun;Koo, Bon-Chul;Kim, Do-Hyang;Kim, Te-Oan
    • Reproductive and Developmental Biology
    • /
    • v.31 no.3
    • /
    • pp.161-167
    • /
    • 2007
  • In this study, we constructed and tested retrovirus vectors designed to express the human thrombopoietin gene under the control of the tetracycline-inducible promoters. To increase the hTPO gene expression at him-on state, WPRE sequence was also introduced into retrovirus vector at downstream region of either the hTPO gene or the sequence encoding reverse tetracycline-controlled transactivator (rtTA). Primary culture cells (PFF, porcine fetal fibroblast; CEF, chicken embryonic fibroblast) infected with the recombinant retrovirus were cultured in the medium supplemented with or without doxycycline for 48hr, and induction efficiency was measured by comparing the hTPO gene expression level using RT-PCR, western blot and ELISA. Higher hPTO expression and tighter expression control were observed from the vector in which the WPRE sequence was placed at downstream of the hTPO (in CEF) or rtTA(in PFF) gene. This resulting tetracycline inducible vector system may be helpful in solving serious physiological disturbance problems which have been a major obstacle in successful production of transgenic animals.

A Study on the Effect of Donors' Utility on Their Intention for Donation Continuity Focusing on Private Contribution to Social Welfare Organizations (사회복지기관 개인기부자들의 기부효용감이 기부지속의도에 미치는 영향 -기관신뢰감과 자기수용감의 매개효과와 경제수준의 조절효과를 중심으로-)

  • Lee, Wonjune
    • Korean Journal of Social Welfare
    • /
    • v.66 no.1
    • /
    • pp.333-361
    • /
    • 2014
  • By viewing donors for social welfare organization as both givers and beneficiaries, this study aims to address the correlations between the continuity of donors' contributions and enhanced sense of satisfaction as a consequence of participating in donation activities. The predominant concern of this study centers on: (1) the direct effects of individuals' emotional utility, demonstrable utility, trust toward donee organization, self acceptance on the continuation of their donation; (2) the direct effects of individuals' emotional utility, demonstrable utility, trust toward donee organizations on individuals' self-acceptance; (3) the direct effects of individuals' emotional utility, demonstrable utility on their trust toward a donee organization; (4) the indirect effects of individuals' self acceptance on two paths i.e. emotional utility${\rightarrow}$trust${\rightarrow}$self acceptance, and demonstrable utility${\rightarrow}$trust${\rightarrow}$self acceptance; (5) the indirect effects of individuals' individuals' trust toward donee organization on self acceptance on four paths i.e. emotional utility${\rightarrow}$trust${\rightarrow}$continuity of donation; demonstrable utility${\rightarrow}$trust${\rightarrow}$continuity of donation; emotional utility${\rightarrow}$trust${\rightarrow}$self-acceptance, and demonstrable utility${\rightarrow}$trust${\rightarrow}$self-acceptance; (6) the moderating effects of 'financial status' on the causal relationships in the prescribed structural equation model(SEM). In order to verify the moderating effect of 'financial status', multi-group analysis between each of the two groups were conducted. Research is based on a survey among 1116 donors who had made charitable, monetary contributions to social welfare organizations in Daegu and Kyungpook province. Data was collected from 29 organizations. In order to address the research questions, structural equation were employed. A variety of tests are conducted(metric invariance, critical ratio for difference, structural invariance, multi-group analysis, bias-corrected boot-strapping, latent mean analysis including Cohen's effect test).

  • PDF

Study on Analysis of the Proper Ratio and the Effects of Low Impact Development Application to Sewage Treatment District (하수처리구역 내 LID 적용에 대한 적정비율 및 효과분석 연구)

  • Shin, Hyun Suk;Kim, Mi Eun;Kim, Jae Moon;Jang, Jong Kyung
    • Journal of Korea Water Resources Association
    • /
    • v.46 no.12
    • /
    • pp.1193-1207
    • /
    • 2013
  • Increase of impervious area caused by overdevelopment has led to increase of runoff and then the problem of flooding and NPS were brought up. In addition, as decrease of base flow made groundwater level to decline, a stream that dries up is issued. low impact development (LID) method which is possible to mimic hydrological water cycle, minimize the effect of development, and improve water cycle structure is proposed as an alternative. As introduction of LID in domestic increases, the study on small watershed is in process mainly. Also, analysis of property of hydrological runoff and load on midsize watershed, like sewage treatment district, is required, the study on it is still insufficient. So, area applying LID practices from watershed of Dongrae stream is pinpointed and made the ratio and then expand it to watershed of Oncheon stream. Among low impact development practices, Green Roof, Porous Pavement, and Bio- retention are selected for the application considering domestic situations and simulated with SWMM-LID model of each watershed and improvement of water cycle and reduction of non-point pollution loads was analysed. Improvement of water cycle and reduction of non-point pollution loads were analyzed including the property of rainfall and soil over long term simulation. The model was executed according to scenario based on combination of LID as changing conductivity in accordance with soil type of the watershed. Also, this study evaluated area of LID application that meets the efficiency of conventional management as a criteria for area of LID practices applying to sewer treatment district by comparing the efficiency of LID application with that of conventional method.

Preliminary Result of Uncertainty on Variation of Flowering Date of Kiwifruit: Case Study of Kiwifruit Growing Area of Jeonlanam-do (기후변화에 따른 국내 키위 품종 '해금'의 개화시기 변동과 전망에 대한 불확실성: 전남 키위 주산지역을 중심으로)

  • Kim, Kwang-Hyung;Jeong, Yeo Min;Cho, Youn-Sup;Chung, Uran
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.18 no.1
    • /
    • pp.42-54
    • /
    • 2016
  • It is highly anticipated that warming temperature resulting from global climate change will affect the phenological pattern of kiwifruit, which has been commercially grown in Korea since the early 1980s. Here, we present the potential impacts of climate change on the variations of flowering day of a gold kiwifruit cultivar, Haegeum, in the Jeonnam Province, Korea. By running six global climate models (GCM), the results from this study emphasize the uncertainty in climate change scenarios. To predict the flowering day of kiwifruit, we obtained three parameters of the 'Chill-day' model for the simulation of Haegeum: $6.3^{\circ}C$ for the base temperature (Tb), 102.5 for chill requirement (Rc), and 575 for heat requirement (Rh). Two separate validations of the resulting 'Chill-day' model were conducted. First, direct comparisons were made between the observed flowering days collected from 25 kiwifruit orchards for two years (2014-15) and the simulated flowering days from the 'Chill-day' model using weather data from four weather stations near the 25 orchards. The estimation error between the observed and simulated flowering days was 5.2 days. Second, the model was simulated using temperature data extracted, for the 25 orchards, from a high-resolution digital temperature map, resulting in the error of 3.4 days. Using the RCP 4.5 and 8.5 climate change scenarios from six GCMs for the period of 2021-40, the future flowering days were simulated with the 'Chill-day' model. The predicted flowering days of Haegeum in Jeonnam were advanced more than 10 days compared to the present ones from multi-model ensemble, while some individual models resulted in quite different magnitudes of impacts, indicating the multi-model ensemble accounts for uncertainty better than individual climate models. In addition, the current flowering period of Haegeum in Jeonnam Province was predicted to expand northward, reaching over Jeonbuk and Chungnam Provinces. This preliminary result will provide a basis for the local impact assessment of climate change as more phenology models are developed for other fruit trees.

Comparison of screw-in effect of three NiTi file systems used by undergraduates (학생들이 사용한 세 종류 NiTi file systems의 screw-in effect 비교)

  • Oh, Seung-Hei;Park, Jeong-Kil;Hur, Bock;Kim, Hyeon-Cheol
    • Restorative Dentistry and Endodontics
    • /
    • v.31 no.6
    • /
    • pp.477-484
    • /
    • 2006
  • The purposes of this study were to compare the apical terminus width of simulated curved root canal prepared with three NiTi file systems used by undergraduates for evaluation the effects of flute angle and pitch or radial land on reducing screw-in effect and to determine more safe NiTi file system for inexperienced operators. Fifty inexperienced undergraduate students prepared 150 simulated curved root canals in resin blocks with three NiTi file systems ; ProFile$^{(R)}$, Hero Shaper$^{(R)}$, K3$^{TM}$. The electric motor set at a speed of 300 rpm and torque of 30 in a 16 : 1 reduction handpiece was used. The simulated root canal was prepared to ISO #25 sizes with each file system. The scanned images of pre- and post-instrumented canal of resin block were superimposed. To evaluate the screw-in effect of three NiTi file systems, apical terminus width of root canal was measured from superimposed images and statistical analysis was performed. There were significant differences in three NiTi flle systems. ProFile$^{(R)}$ had significantly smaller width than Hero Shaper$^{(R)}$ and K3$^{TM}$"" (P < 0.05), but no significant difference was observed between K3$^{TM}$ and Hero Shaper$^{(R)}$. Under the condition of this study, active file system (Hero SHaper$^{(R)}$, K3$^{TM}$) with variable pitch and helical angle had more screw-in effect than passive file system (ProFile$^{(R)}$) with constant pitch and helical angle. It seems that the radial lands play more important role in reducing screw-in effect.

Study on Personal Information Protection Behavior in Social Network Service Using Health Belief Model (건강신념모델을 이용한 소셜네트워크서비스에서의 개인정보보호행위에 관한 연구)

  • Shin, Se-mi;Kim, Seong-jun;Kwon, Do-soon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1619-1637
    • /
    • 2016
  • With wide distribution of smart phones and development of mobile network, social network service (SNS) is displaying remarkable growth rates. Users build new social relations by sharing their interests, which brings surging growth to the SNS based on the combination between the strength of expanding the place for communication and distribution of smart phones featured with easy portability. This study is designed to understand impact factors of SNS on users in Korea and to conduct empirical research on casual relationship between the factors above and the factors affecting personal information behavior through the privacy protection and self-efficacy. In order to accomplish the objective above, the study presented a research model applied with key variables of the Health Belief Model (HBM) predicting behaviors capable of recognizing and preventing individual diseases in the field of health communication. To perform empirical verification on the research model of this study, a survey was conducted upon college students at N university located in Chungcheongnam-do and K university in rural area, who have experiences using the SNS. Through this survey, a total of 186 samples were collected, and path analysis was performed in order to analyze the relationship between the factors. Based on the findings from the survey, first, variables Perceived probability, Perceived severity, Perceived impairment of the HBM, key factors of personal information protection behavior on the SNS, were found to exhibit negative relationship with self-efficacy, and Perceived probability, Perceived benefit, Perceived impairment were found to exhibit negative relationship with privacy protection. But the above, Perceived severity showed positive relationship with privacy protection, and Perceived benefit and self-efficacy also displayed positive relationship. Second, although self-efficacy, a parameter, showed positive relationship with privacy protection, it demonstrated negative relationship with personal information protection behavior. Lastly, privacy protection exhibited positive relationship with personal information protection behavior. By presenting theoretical model reflected with characteristics of prevention based on these findings above unlike previous studies on personal information protection using technologies threatening personal information, this study is to provide theoretical and operational foundation capable of offering explanations how to predict personal information protection behavior on the SNS in the future.

The Effect of Deodeok Contents on the Quality of Deodeok Wine (더덕 함량이 더덕 침출주의 품질에 미치는 영향)

  • Kwon, Dong-Jin;Choi, Shin-Yang
    • Food Science and Preservation
    • /
    • v.14 no.4
    • /
    • pp.414-418
    • /
    • 2007
  • The physicochemical characteristics and sensory properties of Deodeok wine, formed by leaching of Deodeok at room temperature for 180 days, were investigated over the following range of Deodeok levels: 10, 15 and 20% (all w/v). The higher the level of Deodeok, the greater were the final values of total sugars, reducing sugars, total polyphenols, and crude saponins. The Hunter's b-value (yellowness) of Deodeok wine varied markedly with Deodeok levels, and yellowness was highest in Deodeok wine containing 20% (w/v) Deodeok. Non-volatile compounds, that form the basis of the liquor tax law, were 0.64, 1.38 and 2.11% (all w/v), respectively, at day 160. Of these values, that of 2.11% (w/v), the level of non-volatile compounds in Deodeok wine containing 20% (w/v) Deodeok, was in accord with the liquor tax law (that requires this figure to be 2.0%). Sensory evaluation showed that Deodeok wine containing 20% (w/v) Deodeok was superior to the other wines tested.

Game Theoretic Optimization of Investment Portfolio Considering the Performance of Information Security Countermeasure (정보보호 대책의 성능을 고려한 투자 포트폴리오의 게임 이론적 최적화)

  • Lee, Sang-Hoon;Kim, Tae-Sung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.37-50
    • /
    • 2020
  • Information security has become an important issue in the world. Various information and communication technologies, such as the Internet of Things, big data, cloud, and artificial intelligence, are developing, and the need for information security is increasing. Although the necessity of information security is expanding according to the development of information and communication technology, interest in information security investment is insufficient. In general, measuring the effect of information security investment is difficult, so appropriate investment is not being practice, and organizations are decreasing their information security investment. In addition, since the types and specification of information security measures are diverse, it is difficult to compare and evaluate the information security countermeasures objectively, and there is a lack of decision-making methods about information security investment. To develop the organization, policies and decisions related to information security are essential, and measuring the effect of information security investment is necessary. Therefore, this study proposes a method of constructing an investment portfolio for information security measures using game theory and derives an optimal defence probability. Using the two-person game model, the information security manager and the attacker are assumed to be the game players, and the information security countermeasures and information security threats are assumed as the strategy of the players, respectively. A zero-sum game that the sum of the players' payoffs is zero is assumed, and we derive a solution of a mixed strategy game in which a strategy is selected according to probability distribution among strategies. In the real world, there are various types of information security threats exist, so multiple information security measures should be considered to maintain the appropriate information security level of information systems. We assume that the defence ratio of the information security countermeasures is known, and we derive the optimal solution of the mixed strategy game using linear programming. The contributions of this study are as follows. First, we conduct analysis using real performance data of information security measures. Information security managers of organizations can use the methodology suggested in this study to make practical decisions when establishing investment portfolio for information security countermeasures. Second, the investment weight of information security countermeasures is derived. Since we derive the weight of each information security measure, not just whether or not information security measures have been invested, it is easy to construct an information security investment portfolio in a situation where investment decisions need to be made in consideration of a number of information security countermeasures. Finally, it is possible to find the optimal defence probability after constructing an investment portfolio of information security countermeasures. The information security managers of organizations can measure the specific investment effect by drawing out information security countermeasures that fit the organization's information security investment budget. Also, numerical examples are presented and computational results are analyzed. Based on the performance of various information security countermeasures: Firewall, IPS, and Antivirus, data related to information security measures are collected to construct a portfolio of information security countermeasures. The defence ratio of the information security countermeasures is created using a uniform distribution, and a coverage of performance is derived based on the report of each information security countermeasure. According to numerical examples that considered Firewall, IPS, and Antivirus as information security countermeasures, the investment weights of Firewall, IPS, and Antivirus are optimized to 60.74%, 39.26%, and 0%, respectively. The result shows that the defence probability of the organization is maximized to 83.87%. When the methodology and examples of this study are used in practice, information security managers can consider various types of information security measures, and the appropriate investment level of each measure can be reflected in the organization's budget.