Purpose This study aims to understand the role of digital knowledge in accepting the green technology. This study combined digital option theory with the second version of the Unified Theory of Acceptance and Use of Technology (UTAUT2). Contrary to other studies in which the UTAUT2 is used to explain IT adoption behavior, we look at the relationship between IT and the UTAUT2 from a new angle, incorporating an important aspect of IT, that is, digitized knowledge richness, as a determinant of the UTAUT2. Design/methodology/approach Grounded in the UTAUT2, a content analysis was conducted to investigate novel constructs dedicated to explaining green technology adoption. In this study, an amended version of the UTAUT2 specific to green technology is offered that better explains the green technology adoption behavior of consumers. Using the items identified by content analysis, we developed a questionnaire with 36 survey items. We measured all the items on a seven-point Likert-type scale. We randomly selected 402 survey respondents from a set of panel data. After a pilot study, we analyzed the main survey data by using PLS 2.0M3 and SPSS 20.0, and employed structural equation modeling to test the hypotheses. Findings The results suggest that the UTAUT2 was found to be extendable to technologies other than conventional IT. Social influence is more significant than conventional utilitarian and hedonic-based constructs such as those utilized in the UTAUT and UTAUT2 in explaining adoption behavior in the context of green technologies. The hypothesized connection between digitized knowledge richness and adoption intention was supported by the results of studies on the role of IT in formation of attitudes toward eco-friendly production. The results also indicate that digital knowledge can also encourage people to try green technology when they learn that their peers are already using the technology successfully.
Purpose: This study investigated the status of radiation exposure doses since the establishment of the "Regulations on Safety Management of Diagnostic Radiation Generation Device" in January 6, 1995. Method: The level of radiation exposure in people engaged or having been engaged in radiation-related industries of inspection organizations, educational organizations, military units, hospitals, public health centers, businesses, research organizations or clinics over a 5 year period from Jan. 1, 2000 to Dec. 31, 2004 was measured. The 149,205 measurement data of 57,136 workers registered in a measurement organization were analysed in this study. Frequency analysis, a Chi-square test, Chi-square trend test, and ANOVA was used for data analysis. Results: Among 57,136, men were 40,870(71.5%). 50.3% of them were radiologic technologists, otherwise medical doctors(22.7%), nurse(2.9%) and others(24.1%). The average of depth radiation and surface radiation during the 5-year period were found to decrease each year. Both the depth radiation and surface radiation exposure were significantly higher in males, in older age groups, in radiological technologists of occupation. The departments of nuclear medicine had the highest exposure of both depth and surface radiation of the divisions of labor. There were 1.98 and 2.57 per 1,000 person-year were exposed more than 20 mSv(limit recommended by International Commission on Radiological Protection) in depth and surface radiation consequently. Conclusion: The total exposure per worker was siginifcantly decreased by year. But Careful awareness is needed for the workers who exposed over 20 mSv per year. In order to minimize exposure to radiation, each person engaged in a radiation-related industry must adhere to the individual safety management guidelines more thoroughly. In addition, systematic education and continuous guidance aimed at increasing the awareness of safety must be provided.
Like to change to the information-oriented society, the guard service needs to be changed. The communication and hardware technology develop rapidly and according to the internet environment change from cable to wireless, modern person can approach every kinds of information service using wireless communication machinery which can be moved such as laptop, computer, PDA, mobile phone and so on, LBS field which presents the needing information and service at anytime, anywhere, and which kinds of device expands it's territory all the more together with the appearance of ubiquitous concept. LBS use the chip in the mobile phone and make to confirm the position of the joining member anytime within several tens centimeters to hundreds meters. LBS can be divided by the service method which use mobile communication base station and apply satellite. Also each service type can be divided by location chase service, public safe service, location based information service and so on, and it is the part which will plan with guard service development. It will be prospected 8.460 hundred million in 2005 years and 16.561 hundred million in 2007 years scale of market. Like this situation, it can be guessed that the guard service has to change rapidly according to the LBS application. Study method chooses documentary review basically, and at first theory method mainly uses the second documentary examination which depends on learned journal and independent volume which published in the inside and the outside of the country, internet searching, other kinds of all study report, statute book, thesis which published at public order research institute of the Regional Police Headquarter, police operation data, data which related with statute, documents and statistical data which depend on private guard company and so on. So the purpose of the study gropes in accordance with the LBS application, and present the problems and improvement method to analyze indirect of manager side of operate guard adaptation service of LBS, government side which has to activate LBS, systematical, operation management, manpower management and education training which related with guard course side which has to study and educate in accordance with application of the new guard service, as well as intents to excellent quality service of guard.
Personalized smart devices such as smartphones and smart pads are widely used. Unlike traditional feature phones, theses smart devices allow users to choose a variety of functions, which support not only daily experiences but also business operations. Actually, there exist a huge number of applications accessible by smart device users in online and mobile application markets. Users can choose apps that fit their own tastes and needs, which is impossible for conventional phone users. With the increase in app demand, the tastes and needs of app users are becoming more diverse. To meet these requirements, numerous apps with diverse functions are being released on the market, which leads to fierce competition. Unlike offline markets, online markets have a limitation in that purchasing decisions should be made without experiencing the items. Therefore, online customers rely more on item-related information that can be seen on the item page in which online markets commonly provide details about each item. Customers can feel confident about the quality of an item through the online information and decide whether to purchase it. The same is true of online app markets. To win the sales competition against other apps that perform similar functions, app developers need to focus on writing app descriptions to attract the attention of customers. If we can measure the effect of app descriptions on sales without regard to the app's price and quality, app descriptions that facilitate the sale of apps can be identified. This study intends to provide such a quantitative result for app developers who want to promote the sales of their apps. For this purpose, we collected app details including the descriptions written in Korean from one of the largest app markets in Korea, and then extracted keywords from the descriptions. Next, the impact of the keywords on sales performance was measured through our econometric model. Through this analysis, we were able to analyze the impact of each keyword itself, apart from that of the design or quality. The keywords, comprised of the attribute and evaluation of each app, are extracted by a morpheme analyzer. Our model with the keywords as its input variables was established to analyze their impact on sales performance. A regression analysis was conducted for each category in which apps are included. This analysis was required because we found the keywords, which are emphasized in app descriptions, different category-by-category. The analysis conducted not only for free apps but also for paid apps showed which keywords have more impact on sales performance for each type of app. In the analysis of paid apps in the education category, keywords such as 'search+easy' and 'words+abundant' showed higher effectiveness. In the same category, free apps whose keywords emphasize the quality of apps showed higher sales performance. One interesting fact is that keywords describing not only the app but also the need for the app have asignificant impact. Language learning apps, regardless of whether they are sold free or paid, showed higher sales performance by including the keywords 'foreign language study+important'. This result shows that motivation for the purchase affected sales. While item reviews are widely researched in online markets, item descriptions are not very actively studied. In the case of the mobile app markets, newly introduced apps may not have many item reviews because of the low quantity sold. In such cases, item descriptions can be regarded more important when customers make a decision about purchasing items. This study is the first trial to quantitatively analyze the relationship between an item description and its impact on sales performance. The results show that our research framework successfully provides a list of the most effective sales key terms with the estimates of their effectiveness. Although this study is performed for a specified type of item (i.e., mobile apps), our model can be applied to almost all of the items traded in online markets.
The purpose of this study is to improve the oral health after understanding the usage status of oral health items and to conduct active guidance for prohibition of smoking. The survey of 326 visitors for continuous oral health management in the dentist from April 2nd 2007 to May $20^{th}$ is accomplished. The data is handled from the SPSS 12.0 statistics program and we can get the results like below. 1. The number of people answering the usage of the smooth toothbrush is 64.5% which is higher in smoking peoples than in non-smoking ones (p < 0.001). Non-smoking people 61.4% answering '3 minutes more' per brushing their teeth is higher than smoking respondents. 2. The more used device is the interdental brush by non-smoking people 36.7% than smoking ones and the answer. 3. The percentage answering 'recommendation in the dentist' in the question about the motive using the oral health devices are nearly same in 69.6 % and 67.5% by non-smoking and smoking persons. The most reason not using these devices is 'don't know how to use this' and the number of smoking guys is 38.7% which is higher than that of non-smoking ones(p < 0.05). 4. The percentage of answering 'regular visiting the dentist', the method for oral health management is 28.3% in smoking parts and 35.3% in non-smoking ones which is slightly higher. From this study, the usage and the recognition of oral hygiene devices of the patient with smoking is a little bit lower than those of non-smoking patients and small difference is shown. So public relations of the effects and the necessity of the oral hygiene devices to all people have to be performed and the education and the activity prohibiting smoking are expanded by the dental hygienist based on the understanding of oral health when the patients are smoking or not.
This paper is designed to report the results of development and validation procedures in relation to the Freeway Incident Management System (FIMS) prototype development as part of Intelligent Transportation Systems Research and Development program. The central core of the FIMS is an integration of the component parts and the modular, but the integrated system for freeway management. The whole approach has been component-orientated, with a secondary emphasis being placed on the traffic characteristics at the sites. The first action taken during the development process was the selection of the required data for each components within the existing infrastructure of Korean freeway system. After through review and analysis of vehicle detection data, the pilot site led to the utilization of different technologies in relation to the specific needs and character of the implementation. This meant that the existing system was tested in a different configuration at different sections of freeway, thereby increasing the validity and scope of the overall findings. The incident detection module has been performed according to predefined system validation specifications. The system validation specifications have identified two component data collection and analysis patterns which were outlined in the validation specifications; the on-line and off-line testing procedural frameworks. The off-line testing was achieved using asynchronous analysis, commonly in conjunction with simulation of device input data to take full advantage of the opportunity to test and calibrate the incident detection algorithms focused on APID, DES, DELOS and McMaster. The simulation was done with the use of synchronous analysis, thereby providing a means for testing the incident detection module.
Electronic security system is composed mainly of electronic-information-communication device, so system technology, configuration and management of the electronic security system could be affected by the change of information-communication environment. This study is to propose the future prospect on the development of technique for electronic security system through the analysis of the trend and the actual condition on the development of technique. This study is based on literature study and interview with user and provider of electronic security system, also survey was carried out by system provider and members of security integration company to come up with more practical result. Hybrid DVR technology that has multi-function such as motion detection, target tracking and image identification is expected to be developed. And 'Embedded IP camera' technology that internet server and image identification software are built in. Those technologies could change the configuration and management of CCTV system. Fingerprint identification technology and face identification technology are continually developed to get more reliability, but continual development of surveillance and three-dimension identification technology for more efficient face identification system is needed. As radio identification and tracking function of RFID is appreciated as very useful for access control system, hardware and software of RFID technology is expected to be developed, but government's support for market revitalization is necessary. Behavior pattern identification sensor technology is expected to be developed and could replace passive infrared sensor that cause system error, giving security guard firm confidence for response. The principle of behavior pattern identification is similar to image identification, so those two technology could be integrated with tracking technology and radio identification technology of RFID for total monitoring system. For more efficient electronic security system, middle-ware's role is very important to integrate the technology of electronic security system, this could make possible of installing the integrated security system.
The purpose of this study was to analyze the number of visitors to the top of Seoseokdae in Mudeungsan National Park, in which visitors are concentrated, and their visiting patterns, thereby suggesting measures to manage the visitors. The number of annual visitors and the numbers of regional and seasonal visitors to Mudeungsan National Park, which affect the concentration of visits to Seoseokdae were analyzed using the data produced by an automatic digitizing device. A field study was conducted to examine the number of seasonal and periodic visitors to Seoseokdae and their visiting patterns. In 2015, the number of visitors was 2,563,651 and 83.9% of the visitors visited via the Jeungsimsa and Wonhyosa area that is near Gwangju City. This area is close to the Seoseokdae area and it is easy to hike between the areas. Therefore, there was an influx of most visitors to Seoseokdae into the Jeungsimsa and Wonhyosa area. In terms of seasonal visitors, the largest number of visitors came in the fall, followed by the summer, spring, and winter in order. However, the seasonal differences were not notable. There was no statistically significant correlation between the number of visitors and meteorological factors. This result may have been because Gwangju citizens frequently visit Mudeungsan regardless of period and weather. Visitors can get to Seoseokdae via the trails into Wonhyosa and Jangbuljae. A slightly larger number of visitors used the trail into Jangbuljae in the fall and winter, whereas a larger number of visitors used the trail into Wonhyosa in the summer. In general, there is a large influx of visitors into Jangbuljae, a strategic visiting point. However, a slightly larger number of visitors may have chosen the trail into Wonhyosa in the summer because they could hike under the shade of trees. In the summer, visitors stayed in Seoseokdae for a short time with a low level of crowdedness. On the other hand, in the fall and winter, visitors stayed in the area longer because they had lunch and rested. During the time, the number of momentary maximum visitors peaked, causing extreme crowdedness. Therefore, some visitors showed the visiting pattern of entering the grassland outside the designate zone. Because this behavior can damage the grassland on the top of Seoseokdae, which can lead to soil erosion, intensive visitor management may be necessary.
Kim, Myung Chul;Lee, Mi Jeong;Lee, Dong Geon;Baek, Jong-Bae
Korean Chemical Engineering Research
/
v.60
no.3
/
pp.347-355
/
2022
The safety valve (PSV) is a safety device that automatically releases a spring when the pressure generated by various causes reaches the set pressure, and is restored to a normal state when the pressure falls below a certain level. Periodic inspection and monitoring of safety valves are essential so that they can operate normally in abnormal conditions such as pressure rise. However, as the current safety inspection is performed only at a set period, it is difficult to ensure the safety of normal operation. Therefore, evaluation items were developed by finding failure modes and causative factors of safety valves required for safety management. In addition, it is intended to provide decision-making information for securing safety by deriving the priority of items. To this end, a Delphi survey was conducted three times to derive evaluation factors that were judged to be important in relation to the Failure Mode Cause Factor (FMCFs) of the safety valve (PSV) targeting 15 experts. As a result, 6 failure modes of the safety valve and 22 evaluation factors of its sub-factors were selected. In order to analyze the priorities of the evaluation factors selected in this way, the hierarchical structure was schematized, and the hierarchical decision-making method (AHP) was applied to the priority calculation. As a result of the analysis, the failure mode priorities of FMCFs were 'Leakage' (0.226), 'Fail to open' (0.201), 'Fail to relieve req'd capacity' (0.152), 'Open above set pressure' (0.149), 'Spuriously' 'open' (0.146) and 'Stuck open' (0.127) were confirmed in the order. The lower priority of FMCFs is 'PSV component rupture' (0.109), 'Fail to PSV size calculation' (0.068), 'PSV Spring aging' (0.065), 'Erratic opening' (0.059), 'Damage caused by improper installation and handling' (0.058), 'Fail to spring' (0.053), etc. were checked in the order. It is expected that through efficient management of FMCFs that have been prioritized, it will be possible to identify vulnerabilities of safety valves and contribute to improving safety.
This study utilized the non-invasive MyotonPRO® device to analyze the stiffness in breast muscles of commercial broilers (Ross 308 and Arbor Acres) and compared these findings with data reported for Ross 708, where Woody Breast (WB) symptoms had been previously documented. The research revealed that Ross 308 and Arbor Acres displayed relatively lower stiffness values compared to Ross 708, suggesting a lack of WB expression. These results indicate differentiation in breast muscle traits across strains and underscore the necessity for further research into factors influencing WB manifestation. The study also measured additional muscle tone characteristics such as Frequency, Decrement, Relaxation, and Creep across various growth stages (2, 4, 6, and 8 weeks), finding significant variations with pronounced severity at weeks 2 and 8. An increase in stiffness was observed as the broilers aged, pointing to potential growth-related or stress-induced changes affecting WB severity. A strong positive correlation was established between increased breast meat weight and WB severity, highlighting that heavier breast meat could exacerbate the condition. This correlation is vital for the poultry industry, suggesting that weight management could help mitigate WB effects. Moreover, the potential for genetic selection and breeding strategies to reduce WB occurrence was emphasized, which could aid in enhancing management practices in commercial poultry production. Collectively, these insights contribute to a deeper understanding of WB in broilers and propose avenues for future research and practical strategies to minimize its impact.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.