Hong, Joon Ki;Song, Na Rae;Kim, Du Wan;Kim, Si Dong;Kim, Young Hwa;Choi, Jae Gwan;Mun, Hyo Sik;Cho, Kyu Ho
Korean Journal of Agricultural Science
/
v.41
no.1
/
pp.41-46
/
2014
The pedigree data of 86,639 heads from six major swine breeding farms were investigated to check levels of inbreeding and effective population size of breeding stocks. The average rate of inbreeding was 1.04%, 0.87%, 3.17%, 1.05%, 3.23% and 3.33% for farms A, B, C, D, E and F, respectively. The average inbreeding rate was highest for F farm and lowest for B farm. In farms D and E, there were quite large numbers of immigrant animals per generation compared to other farms. The effective population sizes calculated from the average rate of inbreeding were distributed between 83.0 and 814.8. Specific values were 282.3, 225.5, 83.0, 814.8, 302.9 and 175.7 for farms A, B, C, D, E and F, respectively. The results showed that there was no cause for concern over the current inbreeding level of major swine breeding farm populations and the inbreeding level was within an acceptable range. In addition, internal sharing rather than importing pig is necessary to strengthen seed sovereignty.
Virtual community is a social aggregation to attain some goals in an IT-supported virtual space (Lee et al., 2002). As lots of virtual communities generate robust and reliable outputs with low control and low incentive, previous researchers was interested in the questions, "why do they participate?" or "how are they controlled?". But. as Katz (1964) said, the most important part of the high-performing organization is the behaviors of members in the organization. Therefore, this research is to examine the relationship between the performance and the behaviors of participants in the virtual community. First, we propose 6 types of behaviors related to high performance in the virtual community: 'Continuous Attendance', 'Complying with the organizational value, policies, and regulations', 'Protection', 'Suggestion for the improving', 'Self-training', and 'Favorable behavior'. The six types of behaviors are extracted from the framework of Katz (1964) and Brief and Motowidlo (1986). The reason why each behavior is positively related with high-performance is that those who continuously attend have more responsibility than temporary participants do; complying with the rules of a virtual community means that they may make more reliable outcome; 'Protection' is one of the prosocial-behaviors and those who protect the community may concern the benefit of the virtual community when they participate: those who suggest some ideas for improvement may contribute to the virtual community; 'Self-training' behavior means that participants really want to have high quality in their contribution: those who have 'Favorable attitude' consider other members in the virtual community when they participate. Then, we perform an empirical analysis with the survey from participants in the Knowledge service of Naver.com, to show those behaviors are associated with the high-performance. To make the measurement for the six behaviors, we use CVR (content validity ratio) method (Lawshe, 1975), interviewing 12 experts. The dependent variable, performance of participation, is measured by 'ratio of selected answer' given by the Naver.com. We use email survey. We sent 1200 emails to randomly selected participants in the knowledge service and received 282 responses. The results of our empirical analysis show that 4('Continuous Attendance', 'Suggestion for the improving', 'Self-training', 'Favorable attitude') are positively related to the performance, but 2('Complying with the organizational value, policies, and regulations' and 'Protection') are not significant. In line with Fitzgerald (2006), we expect that participants in the virtual community may behave similarly to employees in the off-line firms for the high performance. But 2 behaviors have different results. The reason that the 'Complying with the organizational value' behavior is not sufficiently related to performance is that the motivation of participants is more related to intrinsic pleasure or altruism than external reward. Also, the 'Protection' behavior has no significant relationship with performance, which means that the high-performing participants have little concern about the problems in the community.
Park, Seong-Taek;Lee, Han-Chul;Kim, Tae-Ung;Choi, Soo-Myung
Journal of Digital Convergence
/
v.10
no.2
/
pp.109-119
/
2012
MMORPG online game business has emerged as the most lucrative entertainment industry, with over 10 million gamers in South Korea. It appears that in this extremely attractive and growing services segment, academics, as well as practitioners, would benefit from investigating the relationships among the players' attachment or affection, game contents-related and social interaction-related construct. We assume that game contents-related construct consists of storytelling, game-play method, contents-diversity and the sense of identification, and that social interaction-related construct includes information-sharing, gamers' empowerment and the word-of-mouth. Based on data collected from online questionnaire survey, the validity of the research model has been tested. The results show that contents-related construct influences the players' attachment, and that social interaction-related construct has no direct impact on the attachment. But social interaction-related construct has been shown to influence contents-related construct, implying the indirect impact on the players' attachment.
The purpose of this study is to present foundational data to promote the cultural welfare status of youth. The actual condition of the youth's cultural welfare was investigated by investigating the degree of youth's cultural welfare satisfaction and needs by regional groups. A total of 1486 questionnaires were used for the final data analysis. The analysis revealed the following results. 1. Actual conditions of adolescents cultural welfare. 1) Among various cultural activities, adolescents find leisure and social activity, artistic, mass media and video-media activities very boring and one-sided, Instead, they have greater interest in computer- and Internet-related activities, such as getting and sharing information and communication. 2) While adolescents living in urban areas benefit from well developed social infra-structure, those living in rural areas seldom take advantage of it. 3) The obstacles against cultural welfare of the youth can be categorized as: 'lack of money,' 'lack of time,' and 'lack of cultural facilities. ' In urban areas 'lack of time' becomes an issue, whereas in rural areas 'lack of money' and 'lack of cultual facilities' are important. 2. Degree of cultural welfare satisfaction of the youths. Youths generally appear either 'unsatisfied' or 'neutral' concerning their satisfaction degree about leisure and social activity parts, and art and play-activity paris. On the other hand, they appear 'neutral' concerning their satisfaction degree about computer- and Internet-related information and communication parts, and mass- and video-media activity parts. In addition, urban youths show a higher degree of satisfaction than rural youths. 3. What the youths need To improve their culture welfare status, they need a lot of supplements for cultural activity in the form of cultural infra-structure. Regarding the cultural infra-structure, rural youths need more than urban youths.
This research aims to analyze the usefulness of biological resources from the perspective of the users from various angles and after taking these factors into consideration, provide policy implication and scientific criteria for judging and choosing useful biological resources. Among biological resources defined in CBD, the subject of the research was confined to the biological resource as a unit which can be actually used in benefit sharing and trade. Also, among diverse values of biological resources, the usefulness was assessed focusing on the utility value and scarcity. Usefulness was rated on a scale of 1 to 5 (5 grades). The rating was adjusted for the biological resources that need to be managed as a part of the management policy. It is expected that the criteria of this study will be useful for the following: (1) the procurement of biological resources in the need for primary protection and management (2) the utilization of secured biological resources by analyzing their utility value and using them in biological resources industry (3) securement of sovereignty over biological resources, such as prior access permit under the Nagoya protocol, through management and protection of biological resources in Korea.
This paper attempts to extend such analysis to the rather more difficult problem of optimal management of transnational fish stocks jointly owned by two countries. Transboundary fish such as Mackerel creates an incentive to harvest fish before a competitor does and leads to over-exploitation. This tendency is especially poignant for transnational stocks since, in the absence of an enforceable, international agreement, there is little or no reason for either government or the fishing industry to promote resource conservation and economic efficiency. In the current paper I examine a game theoretic setting in which cooperative management can provide more benefits than noncooperative management. A dynamic model of Mackerel fishery is combined with Nash's theory of two countries cooperative games. A characteristic function game approach is applied to describe the sharing of the surplus benefits from cooperation and noncooperation. A bioeconomic model was used to compare the economic yield of the optimal strategies for two countries, under joint maximization of net benefits in joint ocean. The results suggest as follows. First, the threat points represent the net benefits for two countries in absence of cooperation. The net benefits to Korea and China in threat points are 2,000 billion won(${\pi}^0_{KO}$) and 1,130 billion won(${\pi}^0_{CH}$). Total benefits are 3,130 billion won. Second, if two countries cooperate one with another, they reach the solution payoffs such as Pareto efficient. The net benefits to Korea and China in Pareto efficient are 2,785 billion won(${\pi}^0_{KO}$) and 1,605 billion won(${\pi}^0_{CH}$) or total benefits of 4,390 billion won : a gain of 1,260 billion won. Third, the different price effects under the two scenarios show that total benefit rise as price increases.
We need to seek after new direction and order of design that puts more value on the spirits and culture of human beings in the 21st century, creating a new, all-inclusive value in which individual human being, the society and the environment can co-exist in a peaceful relationship by overcoming the materialistic, analytical, competitive, and differentiated values of traditional industrial society. The aim of this study, then, is to present a new method of design that can meet the demands of the 21st century in a civic age of information, knowledge and culture, by focusing on Monistic ideals derived from a deeply rooted Oriental philosophy. The concept of Monism is embodied by a mind set that treasures the benefit to others over rewards to the self, puts more importance on the spiritual life hidden behind physical phenomena, thinks more of what lacks than what exceeds, elevates the mind over the body, and seeks after beauty via a total harmony of balance and development that can be feasible only by combining all these elements. Ultimately, the new design principle based on the Monism consists of three basic elements: (1) identification of the subject and the object between things under the perception that all things are one (Unification); (2) the ability that helps things exist with appropriate beauty maintaining balance and stability (Harmony); and (3) the attitude of sharing to maintain sustainable vitality by filling up what lacks or is missing in a whole(Change).
With the development and widespread application of online shopping, the number of online consumers has increased. With one click of a mouse, people can buy anything they want without going out and have it sent right to the doors. As consumers benefit from online shopping, people are becoming more concerned about protecting their privacy. In the group buying scenario described in our paper, online shopping was regarded as intra-group communication. To protect the sensitive information of consumers, the polynomial-based encryption key sharing method (Piao et al., 2013; Piao and Kim, 2018) can be applied to online shopping communication. In this paper, we analyze security problems by using a polynomial-based scheme in the following ways : First, in Kamal's attack, they said it does not provide perfect forward and backward secrecy when the members leave or join the group because the secret key can be broken in polynomial time. Second, for simultaneous equations, the leaving node will compute the new secret key if it can be confirmed that the updated new polynomial is recomputed. Third, using Newton's method, attackers can successively find better approximations to the roots of a function. Fourth, the Berlekamp Algorithm can factor polynomials over finite fields and solve the root of the polynomial. Fifth, for a brute-force attack, if the key size is small, brute force can be used to find the root of the polynomial, we need to make a key with appropriately large size to prevent brute force attacks. According to these analyses, we finally recommend the use of a relatively reasonable hash-based mechanism that solves all of the possible security problems and is the most suitable mechanism for our application. The study of adequate and suitable protective methods of consumer security will have academic significance and provide the practical implications.
Opening of trade relationships through an increasing number of international free trade agreements and the now defunct General Agreement on Tariffs and Trade has resulted in an increase the number of the species being exchanged in the world. In the last 20 years, international environmental laws have multiplied and a number of treaties address harmful non-indigenous species (NIS) directly with specific provisions, while other treaties deal with related environmental issues and indirectly affect international regulation of NIS; however, such treaties are weak due to lack of enforceability. From the stand point of national law, many countries including the USA, Australia and New Zealand enforce national laws and regulations to protect biological resources. Typical strategies include : 1) strengthening quarantines to prevent unintentional and illegal introduction of harmful NIS, and 2) developing technologies for managing harmful NIS. However, the recent international trend for managing NIS has shifted. In 2002, the Bonn Guidelines on Access to Genetic Resources and Fair and Equitable Sharing of the Benefit Arising out of their Utilization was adopted at the 6th Conference of the Parties to the Convention on Biodiversity. One major issue highlighted in the document is that "there is no more free of charge to get a biological resource from other countries". The Bonn guidelines will affect international and national NIS regulatory systems because the NIS is a potentially disrupts ecosystems as well as native species. A number of impacts are expected including the revamping of national biodiversity policy regimes in many countries in the world. In particular, the ROK, which is not very biologically diverse, has to evolve national laws to protect valuable ecosystems from NIS. In the meanwhile, national rights of using beneficial indigenous and non-indigenous species as biological resources should be considered through the investigation and national registration of NIS around the world for the promotion of the biotech industry.
In this paper the Partnership's Influence on the Success of IT-Outsourcing is studied. Especially the role of "Partnership" as Intermediate is mainly researched. As the result we can see the fact that the economic factor does not affect the Partnership and the success of IT-Outsourcing, because the IT-Outsourcing can cause sometimes the increase of the cost. On the other hand strategic factor and technical factor affect directly the Success of IT-Outsourcing. This means that the Success of IT-Outsourcing depends on the close cooperation between customer and service provider, rather than on the following the contents of the Service Level Agreement(SLA). In consequences the Partnership based on the steady and fluent communication and the feeling of sharing the risk and benefit between two parties is the key factor for the Success of IT-Outsourcing.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.