Kim, Kyo-Seong;Kim, Jong-Gun;An, Hyun-Mi;Kim, Seong-Wook
Korean Journal of Social Welfare
/
v.59
no.4
/
pp.319-346
/
2007
The main purpose of this research is to figure out systematically the total amount of social welfare resources in Korea. For the stated purpose, this research (1) defines the concept of social welfare resource, (2) develops basic framework for measuring total amount of resources, (3) estimates total amount of social welfare resources based on the year of 2004, and (4) presents some implications of findings. Social welfare resource is defined as any valuable things, material or immaterial, that one can put into instrumental use in order to meet social needs or to resolve problems in the interaction process between human and the environment. Institutional sectors of social welfare resource consist the following 5 major areas derived from resource providers: The government, enterprise, market, the third sector (religion & welfare institutions, fundraising agencies, and NPOs), and community (families, relatives, and neighborhoods). For the estimation of the total amount of social welfare resources, this research takes advantages of both the major methods of provider centered approach and the intermediary agent centered approach. Based on the compromised method estimation, the total amount of social welfare resources in Korea in the year of 2004 is 147 trillion won (approximately, 148 billion dollars and 19% of GDP). Among them, central and local governments provide 52 trillion won. The private sector expends a total of 109 trillion won, which contains 44 trillion from enterprise, 54.3 trillion from market, 3.0 trillion from the third sector, and 8.3 trillion from the community. The enterprise and market share of welfare resources exceeds 66% of the total expenditure, and the market is expected to increase gradually in the near future.
Rice (Oryza sativa L.) is one of the major cereal crops for consumption by the world’s population. Recently, various colored rice, such as white, red, brown, green, and black rice, have caught the attention of world consumers. The commercial name ‘black rice’ contains a high amount of anthocyanins in pericarp, which increases nutritional value. Moreover, anthocyanin in black rice possesses biomedical properties, including anti-oxidant, anti-cancer, and anti-inflammatory effects in humans. In genetics, black rice has a dominant PURPLE PERICARP (Prp) trait governed by two genes, Pb and Pp, which are involved in the synthesis of cyanidin-3-O-glucoside (C3G). Since the publication of a report by Nagai at 1921, the genetics and physiological studies of black rice driven by Prp traits are still unable to understand the relevant genes and their roles. However, with the increased demand for anthocyanin-rich black rice as a functional food for human health, it has become urgent to develop highyielding anthocyanin-rich varieties of rice. We explored many years in the genetics of purple pericarp trait, anthocyanin biosynthesis in pericarp during seed development, and, consequently, their products in relation to different physiological and agronomic traits. In this review, we summarized the anthocyanin biosynthesis in pericarp, emphasizing the inheritance pattern of the trait and functions of their products on different physiological and agronomic traits, including the yield of black rice.
Current mobile devices have surpassed its boundaries as a more communication tool to a smart device which provides additional features. These features have supported the smart life of its users, but have reached its limit from low-performance processors and short-battery time. These issues can be resolved b implementing higher performing hardware, but they come with a burden of high cost. This paper introduces a new way of managing computing resources in a mobile device by enhancing the quality of human-computer interaction. The real-speed felt by users are mainly influenced by the time it takes form a user's input to the device to display the completed result on the screen. Since the size of the screen for mobile devices are small, if the processor only fetch data to be used for displaying on screen, the time can be significantly reduced. MVC+Prefetch Controller pattern accomplished this goal by using the minimum amount of data from DB to fetch display and still manages to support high-speed data transfer to achieve seamless display. This idea has been realized by practice using Samsung mobile phone S8500, which demonstrated the superior performance on user's perspective.
The growth of the mobile device market has changed the education market and led to the quantitative growth of various media education. In particular, smart devices, which have better interaction than existing PCs or consoles, can develop more user-friendly content, allowing various types of educational content and inducing changes in traditional education methods for consumers. Although many researchers recently suggest viable development methods or marketing elements of contents, development companies, and developers, until now, merely rely on the human senses. Therefore, it is necessary to study the actual user's smart-device based usability and experience environment. This study aims to propose an intuitive statistical processing method for analyzing the usability of game-type educational contents in terms of form, for popular games that have been released as a basis for analyzing the user experience environment. In particular, because the game industry has a sufficient number of similar examples, it is possible to conduct research based on big data and to use them for immediate decision-making between multiple co-developers through the analysis method proposed by the research. It is expected to become an analytical model that can communicate with other industries because it is effective in securing data sources.
We evaluated the potential of 20 herbal medications (HMs), commonly used in Korea, to inhibit the catalytic activities of several cytochrome P450 (CYP) isoforms. The abilities of 500 ${\mu}g/ml$ of aqueous extracts of 20 HMs to inhibit phenacetin O-deethylation (CYP1A2), coumarin 6-hydroxylation (CYP2A6), bupropion hydroxylation (CYP2B6), rosiglitazone hydroxylation (CYP2C8), tolbutamide 4-methylhydroxylation (CYP2C9), S-mephenytoin 4'-hydroxylation (CYP2C19), dextromethorphan O-demethylation (CYP2D6), chlorzoxazone 6-hydroxylation (CYP2E1), and midazolam 1'-hydroxylation (CYP3A) were tested using human liver microsomes. The HMs Woohwangcheongsimwon suspension and Hwanglyeonhaedok-Tang strongly inhibited CYP2B6 and CYP2D6 isoform activity, respectively. These results suggest that some of the HMs used in Korea have potential to inhibit CYP isoforms in vitro. Although the plasma concentrations of the active constituents of the HMs were not determined, some herbs could cause clinically significant interactions because the usual doses of those individual herbs are several grams of freeze-dried extracts.
According to the development of new Information Technologies, firms consistently invest a significant amount of money in IT activities, such as establishing internal and external information systems. However, several anti-Information activities-such as hacking, leakage of information and system destruction-are also rapidly increasing, thus many firms are exposed to direct and indirect threats. Therefore, firms try to establish information security systems and manage these systems more effectively via an enterprise perspective. However, stakeholders or some managers have negative opinions about information security systems. Therefore, in this research, we study the relationship between multibusiness firms' performance and information security systems. Information security indicates physical and logical correspondence of information system department against threats and disaster. Studies on information security systems suggested frameworks such as IT Governance Cube and COBIT Framework to identify information security systems. Thus, this study define that information security systems is a controlled system on enterprise IT process and resource on IT Governance perspective rather than independent domain of IT. Thus, Information Security Systems should be understood as a subordinate concept of IT and business processes. In addition, this study incorporates information capability to information security system literature to show the positive relationship between Information Security Systems and Corporate Performance. The concept of information capability suggested that an interaction of human, information, technical and an effect on corporate performance using three types of capability (IT Practice, Information Management Practice, Information Behaviors and Values). Information capability is about firms' capability to manage IT infrastructure and information as well as individual employees who use IT infrastructure and information. Thus, this study uses information capability as a mediating variable for the relationship between information security systems and firms' performance. To investigate the relationship between Information Security Systems and multibusiness firms' performance, this study extends the IT relatedness concept into Information Security Systems. IT relatedness provides understanding of how corporations cope with conflicts between headquarters and business units to create a synergy effect and achieve high performance using IT resources. Based on the previous literature, this study develops the IT Security Relatedness model. IT Security Relatedness is our main independent variable, while Information Capability and Information Security Performance are mediating variables. To control for the common method bias, we collect each multibusiness firm's financial performance and use it as our dependent variable. We find that Information Security Systems influence Information Capability and Information Security Performance positively, and these two variables consequently influence Corporate Performance positively. In addition, this result indirectly shows that corporations under a multibusiness environment can obtain synergy effects using the integrated Information Security Systems. This positive impact of Information Security Systems on multibusiness firms' performance has an important implication to various stakeholders. Therefore, multibusiness firms need to establish Information Security Systems to achieve better financial performance.
The purpose of this work is to develope sodium-containing nonstoichiometric apatitic coatings on solid substrate. The apatitic coatings prepared at different concentrations of sodium salt indicated that the presence of sodium ions exerted significant effects on the physicochemical properties of the apatitic coating including surface morphology, chemical state, and Ca/P ratio. The variation of these properties was sustained up to 0.01 mM of sodium ion concentration. The ratio of calcium to phosphorus was varied from 2.18 to 2.03 which indicated the apatitic coating prepared in this study was calcium-rich nonstoichiometric apatite. The structure of all the samples appeared to be low crystalline. In the presence of sodium ion within the apaptitic coating, the adhesion of human osteoblast-like SaOS-2 cells was significantly promoted. On the other hand, the proliferation of the cells on the apatitic coatings was decreased with the increase of sodium ions. This reverse response of SaOS-2 cells indicates that the interaction between SaOS-2 and apatitic surface triggered considerable changes in intracellular mechanisms including cellular signal transductions.
DNA methylation is a regulatory mechanism in epigenetics that is frequently altered during human carcinogenesis. To detect critical methylation events associated with gastric cancer (GC), we compared three DNA methylomes from gastric mucosa (GM), intestinal metaplasia (IM), and gastric tumor (GT) cells that were microscopically dissected from an intestinal-type early gastric cancer (EGC) using methylated DNA binding domain sequencing (MBD-seq) and reduced representation bisulfite sequencing (RRBS) analysis. In this study, we focused on differentially methylated promoters (DMPs) that could be directly associated with gene expression. We detected 2,761 and 677 DMPs between the GT and GM by MBD-seq and RRBS, respectively, and for a total of 3,035 DMPs. Then, 514 (17%) of all DMPs were detected in the IM genome, which is a precancer of GC, supporting that some DMPs might represent an early event in gastric carcinogenesis. A pathway analysis of all DMPs demonstrated that 59 G protein-coupled receptor (GPCR) genes linked to the hypermethylated DMPs were significantly enriched in a neuroactive ligand-receptor interaction pathway. Furthermore, among the 59 GPCRs, six GI hormone receptor genes (NPY1R, PPYR1, PTGDR, PTGER2, PTGER3, and SSTR2) that play an inhibitory role in the secretion of gastrin or gastric acid were selected and validated as potential biomarkers for the diagnosis or prognosis of GC patients in two cohorts. These data suggest that the loss of function of gastrointestinal (GI) hormone receptors by promoter methylation may lead to gastric carcinogenesis because gastrin and gastric acid have been known to play a role in cell differentiation and carcinogenesis in the GI tract.
The main purpose of this paper is to make a case for the availability of pragmatist ethics by showing the differences between utilitarianism and pragmatism. In this paper, drawing on Dewey's view, I show that Bentham and Mill were doomed to failure because they both regarded moral conduct not as a process but as a fixed act, the remarkable differences between their views notwithstanding. Besides, I also show that pragmatism distinguishes itself from utilitarianism by its focus on the aspect of the amendment of a conduct rather than its attainment. Pragmatist ethics works on the assumption that moral conduct arises only in conscious experience. What pragmatists mean by consciousness is not an ability just given to haman, but a function emerging from the human interaction with his environment. Therefore, morality is extended from and restricted by experience, because it is grounded in concrete experience, but not in the transcendental nor a priori realm. Since pragmatism suggests the possibility of "ethics without principles" in that it works through the way which successfully rejects the traditional absolutist ethics, while avoiding the downslide to a nihilistic form of skepticism. Thus, it may serve as a third view that overcomes a seriously divergent situation of the current ethical arguments. In other words, starting from the very nature of experience, pragmatist ethics offers a 'bottom-up' ethics, instead of a 'top-down' one. This reconstructive reading of pragmatism away from utilitarianism is expected to offer a more comprehensive account of our moral experience in the pluralistic world of diverged values.
The aim of this study is to reveal development processes of mothers with disabled children as active human agents utilizing social welfare institutions. Many social welfare studies have generally described welfare service users as passive subjects alienated from welfare information and subordinate to dominant welfare system. However, this investigation indicates that they do not merely remain as passive policy targets. They also perform as active actors who seek for useful information, strategically acquire profits in the given system despite institutional constraints, and create new welfare institutions. Through in-depth interviews with 11 mothers of disabled children with brain lesions, this study has derived a grounded theory on the mothers' maturation processes in interaction with social welfare institutions, which consist 6 stages(entering, awakening, exploring, struggling, resigning and utilizing period). This substantive analysis on the survival processes of mothers with disabled children in the social welfare system provides empirical knowledge and evidence about relationship between the structure and agents. It also suggests a practical policy proposal for disabled people and their families based on these stages.
이메일무단수집거부
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.