• Title/Summary/Keyword: Agency support

Search Result 1,304, Processing Time 0.033 seconds

Inhibitory Effects of Cinnamon, Clove and Lemongrass Essential Oils against Biofilm Formation by Food Poisoning Bacteria (식중독 미생물의 biofilm 형성에 대한 계피, 정향 및 레몬그래스 정유의 억제 효과)

  • Kim, Hyeong-Eun;Kim, Yong-Suk
    • Journal of Food Hygiene and Safety
    • /
    • v.36 no.5
    • /
    • pp.430-439
    • /
    • 2021
  • Essential oils with excellent antibacterial activity were used to study the inhibitory effect against the six types of food poisoning biofilms formed on the surfaces of polyethylene (PE) and stainless steel (SS) that are widely used for food processing instruments and containers. The antibacterial activity of 20 kinds of essential oils was tested using the disk diffusion method. The result showed the degree of antibacterial activity in the following order: cinnamon> clove> lemongrass> peppermint> pine needle (highest to lowest). The minimum inhibitory concentration (MIC) and minimum bactericidal concentration (MBC) of cinnamon and clove oil were in the range of 0.63-1.25 mg/mL and 1.25-2.50 mg/mL, respectively. The MIC and MBC of lemongrass oil were 1.25-2.50 mg/mL and 2.50-5.00 mg/mL, respectively, showing slightly less antibacterial activity. Although the preventive effect of three types of essential oils on the biofilm formation differed slightly depending on food poisoning bacteria, PE, and SS, it was found that the precoating of 0.5% cinnamon, clove, and lemongrass oil on the PE and SS affects the formation of biofilm. Increased essential oil concentration significantly inhibited the biofilm formation for all food poisoning bacteria (P<0.05), and biofilms of Listeria monocytogenes and Staphylococcus aureus were not formed when treated with 0.5% cinnamon and clove oil. The elimination effect of food poisoning bacteria biofilms formed on the surfaces of PE and SS differed depending on the type of food poisoning bacteria. Still, the biofilm elimination effect increased as the essential oil concentration increased, and the biofilm elimination rate of clove oil was generally high. Therefore, this study found that the cinnamon and clove essential oils (0.5%) are suitable natural materials that effectively prevent, inhibit, and remove the biofilms formed by the food poisoning bacteria on the surfaces of polyethylene and stainless steel.

Activation of Sports Talent Cultivation for Elderly Sports Promotion (노인체육진흥을 위한 체육인재양성 활성화 방안)

  • Cho, Kyoung-Hwan
    • Journal of Korea Entertainment Industry Association
    • /
    • v.15 no.4
    • /
    • pp.167-186
    • /
    • 2021
  • The purpose of this study was to present a new direction for sports talent cultivation, determine the sports talent cultivation status in various types of sports and relevant areas, and present specific plans for activating practical sports talent cultivation in the elderly population in an effort to cope with the rapid changes of times. For this purpose, literature review was performed to analyze the elderly sports and sports talent cultivation status, analyze the problems with elderly sports and sports talent cultivation and development tasks, and present the following comprehensive plan for cultivating elderly sports talent cultivation in pursuit of elderly sports promotion: First, it is necessary to become more competitive in education by developing various programs for convergent and combined elderly sports talent cultivation as well as by changing into a convergent and combined way of thinking in the organizational culture environment of sports. Second, it is necessary to build more career education infrastructures for elderly sports talent cultivation in the elderly sports and relevant departments. Career education may become an issue in every area, which means building comprehensive DBs for undergraduates and graduates. Third, it is necessary to give greater support to research and development in the entire area of elderly sports. This means implementing relevant projects efficiently through governance with the Ministry of Culture, Sports, and Tourism in charge of elderly sports policies, the Ministry of Health and Welfare, and professionals in the private sectors. Fourth, it is necessary to make comprehensive, systematic, and mid- and long-term strategies for cultivating sports talent at the governmental level. This means sports talent cultivation and search, career and employment, reeducation (competence reinforcement training), and job and employment stability in the areas of education, health, and welfare as well as sports. Fifth, it is necessary to operate a tentatively-called elderly health agency under the influence of the Office of the Prime Minister. This requires expansion and qualitative improvement of education on the basis of greater efficiency in preventing any overlapped task from wasting the budget through inter-department cooperation and positive partnership.

The Maritime Geography of Korea Strait: Suggested Nomenclature and Cartographic Boundaries Derived from a Review of Historical and Contemporary Maps (국제학술지, 지도, 문서에 나타난 대한해협 해양지명과 경계에 대한 인식 변화)

  • DO-SEONG BYUN;BYOUNG-JU CHOI
    • The Sea:JOURNAL OF THE KOREAN SOCIETY OF OCEANOGRAPHY
    • /
    • v.28 no.2
    • /
    • pp.63-93
    • /
    • 2023
  • This study aims to examine the history of naming the strait between the Yellow and East China Seas and the East Sea to suggest a consistent nomenclature and to demarcate the geographic region of the strait. Although the strait is internationally known as 'Korea Strait', it is commonly referred to as the 'South Sea' in Korean common usage. This review ultimately recommends the use of 'Korea Strait' as an appropriate geographical name for this area. To support this recommendation, the historical boundaries typically assigned to the Korea Strait were investigated. We also analyzed the evolution of geographical labels assigned to Korea Strait and to the Western and Eastern Channels (labels given to the two maritime areas surrounding Tsushima). Resources for this analysis included historic maps and charts, International Hydrographic Organization Special Publications (S-23), and maps published in the Ocean Science Journal (OSJ) and Journal of Oceanography (JO), which are two international journals representing Korean and Japanese sources, respectively, from 2005 to 2021. In these two international journals, the most frequently used names assigned to the strait of interest were Korea Strait (appearing 42.9% of OSJ maps, and 7.5% of JO maps), and Tsushima Strait (appearing 60.4% of JO maps, and 0% of OSJ maps). Other names were South Sea and Korea Strait/Tsushima Strait. On maps in the two reviewed journals, the boundaries of Korea Strait were defined explicitly or implicitly in five different ways: a broad region between the Yellow and East China Seas and Ulleung Basin (Type 1), the region between Ulleung Basin and Tsushima (Type 2), the western channel of the strait (Type 3-1), the eastern channel of the strait (Type 3-2), and both the western and eastern channels of the strait (Type 4). Overall, Type 1 was the most frequently used boundary, taking up 71.4% of OSJ and 60.4% of JO maps. Lastly, we suggest in this paper that the current flowing through Korea Strait from the East China Sea to the East Sea should be labeled the 'Korea Strait Warm Current' to indicate its full path through the strait. Currently, this current is internationally referred to as the 'Tsushima Warm Current', which does not link well to the commonly used geographic name of the strait.

Research on the Digital Twin Policy for the Utilization of Administrative Services (행정서비스 활용을 위한 디지털 트윈 정책 연구)

  • Jina Ok;Soonduck Yoo;Hyojin Jung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.3
    • /
    • pp.35-43
    • /
    • 2023
  • The purpose of this study is to research digital twin policies for the use of administrative services. The study was conducted through a mobile survey of 1,000 participants, and the results are as follows. First, in order to utilize digital twin technology, it is necessary to first identify appropriate services that can be applied from the perspective of Gyeonggi Province. Efforts to identify digital twin services that are suitable for Gyeonggi Province's field work should be prioritized, and this should lead to increased efficiency in the work. Second, Gyeonggi Province's digital twin administrative services should prevent duplication with central government projects and establish a model that can be connected and utilized. It should be driven around current issues in Gyeonggi Province and the demands of citizens for administrative services. Third, to develop Gyeonggi Province's digital twin administrative services, a standard model development plan through participation in pilot projects should be considered. Gyeonggi Province should lead the project as the main agency and promote it through a collaborative project agreement. It is suggested that a support system for the overall project be established through the Gyeonggi Province Digital Twin Advisory Committee. Fourth, relevant regulations and systems for the construction, operation, and management of dedicated departments and administrative services should be established. To achieve the realization of digital twins in Gyeonggi Province, a dedicated organization that can perform various roles in project promotion and operation, as well as legal and institutional improvements, is necessary. To designate a dedicated organization, it is necessary to consider expanding and reorganizing existing departments and evaluating the operation of newly established departments. The limitation of this study is that it only surveyed participants from Gyeonggi Province, and it is recommended that future research be conducted nationwide. The expected effect of this study is that it can serve as a foundational resource for applying digital twin services to public work.

A Study on the Digital Restoration Policy Implementation Process of Donuimun Gate (돈의문의 디지털 복원 정책집행 과정에 관한 연구)

  • CHOE Yoosun
    • Korean Journal of Heritage: History & Science
    • /
    • v.56 no.2
    • /
    • pp.246-262
    • /
    • 2023
  • This study analyzed policy implementation factors focusing on how Donuimun, a demolished cultural heritage, was digitally restored and the policy implementation process of Donuimun Gate restoration. Through this, the characteristics of the implementation process of the digital Donuimun Gate restoration policy promoted by public-private multilateral collaboration were examined and implications were sought for how institutions with different interests solved problems and collaborated in the implementation process. The research method was focused on policy implementation factors including policy executive factors, policy content factors, policy resource factors, and policy environment factors, and the process was analyzed for each detailed component. Along with literature analysis, in-depth interviews were conducted with participants in policy implementation. As a result of the study, first, it was found in the policy executive factor that the quick decision-making leadership of the policy manager and the flexible attitude of the person in charge of the government agency had a positive effect on preventing conflicts between different interest groups. Second, in terms of policy content, establishing a common goal that everyone can accept and moving forward consistently gave trust and created synergy. Third, in the policy implementation resource factor, the importance of the budget was emphasized. Finally, as an environmental factor for policy implementation, the opening of 5G mobile communication for the first time along with the emergence of the Fourth Industrial Revolution at the time of policy implementation acted as a timely factor. The digital Donuimun Gate was the first case of restoring a lost cultural heritage with AR and VR, and received attention and support from the mass media and the public. This also shows that digital restoration can be a model case that can be a solution without conflicts with local residents where cultural heritages are located or conflicts between stakeholders in the preservation and restoration of real objects.

A Study on the Types of Dispute and its Solution through the Analysis on the Disputes Case of Franchise (프랜차이즈 분쟁사례 분석을 통한 분쟁의 유형과 해결에 관한 연구)

  • Kim, Kyu Won;Lee, Jae Han;Lim, Hyun Cheol
    • The Korean Journal of Franchise Management
    • /
    • v.2 no.1
    • /
    • pp.173-199
    • /
    • 2011
  • A franchisee has to depend on the overall system, such as knowhow and management support, from a franchisor in the franchise system and the two parties do not start with the same position in economic or information power because the franchisor controls or supports through selling or management styles. For this, unfair trades the franchisor's over controlling and limiting the franchisee might occur and other side effects by the people who give the franchisee scam trades has negatively influenced on the development of franchise industry and national economy. So, the purpose of this study is preventing unfair trade for the franchisee from understanding the causes and problems of dispute between the franchisor and the franchisee focused on the dispute cases submitted the Korea Fair Trade Mediation Agency and seeking ways to secure the transparency of recruitment process and justice of franchise management process. The results of the case analysis are followed; first, affiliation contracts should run on the franchisor's exact public information statement and the surely understanding of the franchisee. Secondly, the franchisor needs to use their past experiences and investigated data for recruiting franchisees. Thirdly, in the case of making a contract with the franchisee, the franchisor has to make sure the business area by checking it with franchisee in person. Fourthly, the contracts are important in affiliation contracts, so enacting the possibility of disputes makes the disputes decreased. Fifthly, lots of investigation and interests are needed for protecting rights and interests between the franchisor and franchisee and preventing the disputes by catching the cause and more practical solutions of the disputes from the government.

Research for Space Activities of Korea Air Force - Political and Legal Perspective (우리나라 공군의 우주력 건설을 위한 정책적.법적고찰)

  • Shin, Sung-Hwan
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.18
    • /
    • pp.135-183
    • /
    • 2003
  • Aerospace force is a determining factor in a modem war. The combat field is expanding to space. Thus, the legitimacy of establishing aerospace force is no longer an debating issue, but "how should we establish aerospace force" has become an issue to the military. The standard limiting on the military use of space should be non-aggressive use as asserted by the U.S., rather than non-military use as asserted by the former Soviet Union. The former Soviet Union's argument is not even strongly supported by the current Russia government, and realistically is hard to be applied. Thus, the multi-purpose satellite used for military surveillance or a commercial satellite employed for military communication are allowed under the U.S. principle of peaceful use of space. In this regard, Air Force may be free to develop a military surveillance satellite and a communication satellite with civilian research institute. Although MTCR, entered into with the U.S., restricts the development of space-launching vehicle for the export purpose, the development of space-launching vehicle by the Korea Air Force or Korea Aerospace Research Institute is beyond the scope of application of MTCR, and Air Force may just operate a satellite in the orbit for the military purpose. The primary task for multi-purpose satellite is a remote sensing; SAR sensor with high resolution is mainly employed for military use. Therefore, a system that enables Air Force, the Korea Aerospace Research Institute, and Agency for Defense Development to conduct joint-research and development should be instituted. U.S. Air Force has dismantled its own space-launching vehicle step by step, and, instead, has increased using private space launching vehicle. In addition, Military communication has been operated separately from civil communication services or broadcasting services due to the special circumstances unique to the military setting. However, joint-operation of communication facility by the military and civil users is preferred because this reduces financial burden resulting from separate operation of military satellite. During the Gulf War, U.S. armed forces employed commercial satellites for its military communication. Korea's participation in space technology research is a little bit behind in time, considering its economic scale. In terms of budget, Korea is to spend 5 trillion won for 15 years for the space activities. However, Japan has 2 trillion won annul budget for the same activities. Because the development of space industry during initial fostering period does not apply to profit-making business, government supports are inevitable. All space development programs of other foreign countries are entirely supported by each government, and, only recently, private industry started participating in limited area such as a communication satellite and broadcasting satellite, Particularly, Korea's space industry is in an infant stage, which largely demands government supports. Government support should be in the form of investment or financial contribution, rather than in the form of loan or borrowing. Compared to other advanced countries in space industry, Korea needs more budget and professional research staff. Naturally, for the efficient and systemic space development and for the prevention of overlapping and distraction of power, it is necessary to enact space-related statutes, which would provide dear vision for the Korea space development. Furthermore, the fact that a variety of departments are running their own space development program requires a centralized and single space-industry development system. Prior to discussing how to coordinate or integrate space programs between Agency for Defense Development and the Korea Aerospace Research Institute, it is a prerequisite to establish, namely, "Space Operations Center"in the Air Force, which would determine policy and strategy in operating space forces. For the establishment of "Space Operations Center," policy determinations by the Ministry of National Defense and the Joint Chief of Staff are required. Especially, space surveillance system through using a military surveillance satellite and communication satellite, which would lay foundation for independent defense, shall be established with reference to Japan's space force plan. In order to resolve issues related to MTCR, Air Force would use space-launching vehicle of the Korea Aerospace Research Institute. Moreover, defense budge should be appropriated for using multi-purpose satellite and communication satellite. The Ministry of National Defense needs to appropriate 2.5 trillion won budget for space operations, which amounts to Japan's surveillance satellite operating budges.

  • PDF

A Study on Improvements on Legal Structure on Security of National Research and Development Projects (과학기술 및 학술 연구보고서 서비스 제공을 위한 국가연구개발사업 관련 법령 입법론 -저작권법상 공공저작물의 자유이용 제도와 연계를 중심으로-)

  • Kang, Sun Joon;Won, Yoo Hyung;Choi, San;Kim, Jun Huck;Kim, Seul Ki
    • Proceedings of the Korea Technology Innovation Society Conference
    • /
    • 2015.05a
    • /
    • pp.545-570
    • /
    • 2015
  • Korea is among the ten countries with the largest R&D budget and the highest R&D investment-to-GDP ratio, yet the subject of security and protection of R&D results remains relatively unexplored in the country. Countries have implemented in their legal systems measures to properly protect cutting-edge industrial technologies that would adversely affect national security and economy if leaked to other countries. While Korea has a generally stable legal framework as provided in the Regulation on the National R&D Program Management (the "Regulation") and the Act on Industrial Technology Protection, many difficulties follow in practice when determining details on security management and obligations and setting standards in carrying out national R&D projects. This paper proposes to modify and improve security level classification standards in the Regulation. The Regulation provides a dual security level decision-making system for R&D projects: the security level can be determined either by researcher or by the central agency in charge of the project. Unification of such a dual system can avoid unnecessary confusions. To prevent a leakage, it is crucial that research projects be carried out in compliance with their assigned security levels and standards and results be effectively managed. The paper examines from a practitioner's perspective relevant legal provisions on leakage of confidential R&D projects, infringement, injunction, punishment, attempt and conspiracy, dual liability, duty of report to the National Intelligence Service (the "NIS") of security management process and other security issues arising from national R&D projects, and manual drafting in case of a breach. The paper recommends to train security and technological experts such as industrial security experts to properly amend laws on security level classification standards and relevant technological contents. A quarterly policy development committee must also be set up by the NIS in cooperation with relevant organizations. The committee shall provide a project management manual that provides step-by-step guidance for organizations that carry out national R&D projects as a preventive measure against possible leakage. In the short term, the NIS National Industrial Security Center's duties should be expanded to incorporate national R&D projects' security. In the long term, a security task force must be set up to protect, support and manage the projects whose responsibilities should include research, policy development, PR and training of security-related issues. Through these means, a social consensus must be reached on the need for protecting national R&D projects. The most efficient way to implement these measures is to facilitate security training programs and meetings that provide opportunities for communication among industrial security experts and researchers. Furthermore, the Regulation's security provisions must be examined and improved.

  • PDF

Effects of firm strategies on customer acquisition of Software as a Service (SaaS) providers: A mediating and moderating role of SaaS technology maturity (SaaS 기업의 차별화 및 가격전략이 고객획득성과에 미치는 영향: SaaS 기술성숙도 수준의 매개효과 및 조절효과를 중심으로)

  • Chae, SeongWook;Park, Sungbum
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.3
    • /
    • pp.151-171
    • /
    • 2014
  • Firms today have sought management effectiveness and efficiency utilizing information technologies (IT). Numerous firms are outsourcing specific information systems functions to cope with their short of information resources or IT experts, or to reduce their capital cost. Recently, Software-as-a-Service (SaaS) as a new type of information system has become one of the powerful outsourcing alternatives. SaaS is software deployed as a hosted and accessed over the internet. It is regarded as the idea of on-demand, pay-per-use, and utility computing and is now being applied to support the core competencies of clients in areas ranging from the individual productivity area to the vertical industry and e-commerce area. In this study, therefore, we seek to quantify the value that SaaS has on business performance by examining the relationships among firm strategies, SaaS technology maturity, and business performance of SaaS providers. We begin by drawing from prior literature on SaaS, technology maturity and firm strategy. SaaS technology maturity is classified into three different phases such as application service providing (ASP), Web-native application, and Web-service application. Firm strategies are manipulated by the low-cost strategy and differentiation strategy. Finally, we considered customer acquisition as a business performance. In this sense, specific objectives of this study are as follows. First, we examine the relationships between customer acquisition performance and both low-cost strategy and differentiation strategy of SaaS providers. Secondly, we investigate the mediating and moderating effects of SaaS technology maturity on those relationships. For this purpose, study collects data from the SaaS providers, and their line of applications registered in the database in CNK (Commerce net Korea) in Korea using a questionnaire method by the professional research institution. The unit of analysis in this study is the SBUs (strategic business unit) in the software provider. A total of 199 SBUs is used for analyzing and testing our hypotheses. With regards to the measurement of firm strategy, we take three measurement items for differentiation strategy such as the application uniqueness (referring an application aims to differentiate within just one or a small number of target industry), supply channel diversification (regarding whether SaaS vendor had diversified supply chain) as well as the number of specialized expertise and take two items for low cost strategy like subscription fee and initial set-up fee. We employ a hierarchical regression analysis technique for testing moderation effects of SaaS technology maturity and follow the Baron and Kenny's procedure for determining if firm strategies affect customer acquisition through technology maturity. Empirical results revealed that, firstly, when differentiation strategy is applied to attain business performance like customer acquisition, the effects of the strategy is moderated by the technology maturity level of SaaS providers. In other words, securing higher level of SaaS technology maturity is essential for higher business performance. For instance, given that firms implement application uniqueness or a distribution channel diversification as a differentiation strategy, they can acquire more customers when their level of SaaS technology maturity is higher rather than lower. Secondly, results indicate that pursuing differentiation strategy or low cost strategy effectively works for SaaS providers' obtaining customer, which means that continuously differentiating their service from others or making their service fee (subscription fee or initial set-up fee) lower are helpful for their business success in terms of acquiring their customers. Lastly, results show that the level of SaaS technology maturity mediates the relationships between low cost strategy and customer acquisition. That is, based on our research design, customers usually perceive the real value of the low subscription fee or initial set-up fee only through the SaaS service provide by vender and, in turn, this will affect their decision making whether subscribe or not.

The Framework of Research Network and Performance Evaluation on Personal Information Security: Social Network Analysis Perspective (개인정보보호 분야의 연구자 네트워크와 성과 평가 프레임워크: 소셜 네트워크 분석을 중심으로)

  • Kim, Minsu;Choi, Jaewon;Kim, Hyun Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.1
    • /
    • pp.177-193
    • /
    • 2014
  • Over the past decade, there has been a rapid diffusion of electronic commerce and a rising number of interconnected networks, resulting in an escalation of security threats and privacy concerns. Electronic commerce has a built-in trade-off between the necessity of providing at least some personal information to consummate an online transaction, and the risk of negative consequences from providing such information. More recently, the frequent disclosure of private information has raised concerns about privacy and its impacts. This has motivated researchers in various fields to explore information privacy issues to address these concerns. Accordingly, the necessity for information privacy policies and technologies for collecting and storing data, and information privacy research in various fields such as medicine, computer science, business, and statistics has increased. The occurrence of various information security accidents have made finding experts in the information security field an important issue. Objective measures for finding such experts are required, as it is currently rather subjective. Based on social network analysis, this paper focused on a framework to evaluate the process of finding experts in the information security field. We collected data from the National Discovery for Science Leaders (NDSL) database, initially collecting about 2000 papers covering the period between 2005 and 2013. Outliers and the data of irrelevant papers were dropped, leaving 784 papers to test the suggested hypotheses. The co-authorship network data for co-author relationship, publisher, affiliation, and so on were analyzed using social network measures including centrality and structural hole. The results of our model estimation are as follows. With the exception of Hypothesis 3, which deals with the relationship between eigenvector centrality and performance, all of our hypotheses were supported. In line with our hypothesis, degree centrality (H1) was supported with its positive influence on the researchers' publishing performance (p<0.001). This finding indicates that as the degree of cooperation increased, the more the publishing performance of researchers increased. In addition, closeness centrality (H2) was also positively associated with researchers' publishing performance (p<0.001), suggesting that, as the efficiency of information acquisition increased, the more the researchers' publishing performance increased. This paper identified the difference in publishing performance among researchers. The analysis can be used to identify core experts and evaluate their performance in the information privacy research field. The co-authorship network for information privacy can aid in understanding the deep relationships among researchers. In addition, extracting characteristics of publishers and affiliations, this paper suggested an understanding of the social network measures and their potential for finding experts in the information privacy field. Social concerns about securing the objectivity of experts have increased, because experts in the information privacy field frequently participate in political consultation, and business education support and evaluation. In terms of practical implications, this research suggests an objective framework for experts in the information privacy field, and is useful for people who are in charge of managing research human resources. This study has some limitations, providing opportunities and suggestions for future research. Presenting the difference in information diffusion according to media and proximity presents difficulties for the generalization of the theory due to the small sample size. Therefore, further studies could consider an increased sample size and media diversity, the difference in information diffusion according to the media type, and information proximity could be explored in more detail. Moreover, previous network research has commonly observed a causal relationship between the independent and dependent variable (Kadushin, 2012). In this study, degree centrality as an independent variable might have causal relationship with performance as a dependent variable. However, in the case of network analysis research, network indices could be computed after the network relationship is created. An annual analysis could help mitigate this limitation.