• Title/Summary/Keyword: IS/IT

Search Result 318,126, Processing Time 0.166 seconds

The Research in the Study Method of Fashion through Popular Culture Theory (대중문화 이론을 통해 본 복식 문화의 연구방법에 대한 연구)

  • 엄소희;김문숙
    • The Research Journal of the Costume Culture
    • /
    • v.5 no.1
    • /
    • pp.99-123
    • /
    • 1997
  • The purpose of this study is to present the study method in order to analysis the fashion phenomena in ppular culture by popular culture theory. The method of this study is showed the method fo fashion culture, after it was examined that the trends of popular cultural method, the type of Korean popular culture discussion, and the relationship of fashion and popular culture. The results of this study are following as ; 1. Analysis of this study are structuralism stand and culturalism stand, and the application of criticism about the cultural technology in a new stand by means of the composition of Gramscic, A and Foucault. 2. Application of the ethnographic access method as anthroppological approach method about C. Geertz'culture. This si to describe and interpret the practice of subject through directive observation and conduct on a spot, thus is likely to be useful in the fashion study. 3. It needs a historical access method for that purpose, If it applicate Weber's methodology, it will have the use of both meaning interpretation and explanation of cause and effect on the use of both meaning interpretation and explanation of cause and effect on the basis of realistic conditions (historical data), and would appear that the peculiar apportunity of mental (cultural) progressional process became definitive explanation. 4. It must be mad up of the discussion (which is) based on the durability of tradition and culture. It is undeniable that the discussion, which related to popular culture up to the present, showed the disconnectedness of the past tradition and culture, and naturally accepts it's connection to epistemology. The cultural study is a theory interested in what it brings about, what way it's organized and what way it's used. The research of the fashion's connection to popular culture is composed of such topic ; how fashion is produces, how it is consumed, and then, the proposition which is concerned in what meaning it produce is made up of. The regulation of the realm of this research will be to help a researcher explain where to begin and how to do it. Although this cultural study method is more or less quantitative, or despite the expense of the accuracy of statistical analysis, this means that such method of cultural research needs to give attention to both aspects of phenomena and basic problems.

  • PDF

Infra Service Model for Usage-based IT service in Public Sector (공공부문의 사용량기반 IT서비스를 위한 인프라서비스 모델에 관한 연구)

  • Ra, Jong-Hei;Lee, Sang-Hak;Moon, Sung-Jun;Han, In-Jong
    • Journal of Digital Convergence
    • /
    • v.7 no.4
    • /
    • pp.43-56
    • /
    • 2009
  • The concept causing all the fuss is "the utility computing or the usage-based IT service", which now represents the future for IT asset in all aspects of the way they work in business, the commercial and public sector. The core of "utility computing or usage-based IT service" is changing the IT assert from "ownership" to "borrowing", which enables managers to get greater utilization of data-centre resources at lower operating costs. This trend is spreaded in public sector centering the Governmental Internet data Center of Korea(NCIA). So, it has need to make an usage-based IT service model that is suitable for public sector. In this paper, we propose the usage-based IT service model that is composed of IT service framework, service pricing model and IT service architecture.

  • PDF

An Investigation of the Phenomenon of the Decentralization of the Asian Look and its Method (아시안 룩의 탈중심화 현상과 그 기법에 대한 연구)

  • Seo, Bong-Ha
    • Journal of the Korean Society of Costume
    • /
    • v.61 no.2
    • /
    • pp.20-31
    • /
    • 2011
  • Decentralization is an effort to liberalize people from its character of neutralizing or restraining people while indwelling in the previous thought system. Decentralization in fashion is one of the phenomenon of post-modernism fashion, and it is closely related to de-culturalism, crossover, abolition of rank, and etc, and it is in line with Asian look which includes orientalism fashion. The study intends to consider the Phenomenon of Decentralization of Asian Look and its Method depicted in the western fashion. The study focuses on documentary data, and the it is held with the basis of Asian look shown in western fashion. If ideology which influenced the formation of folk costume of Asia, Asian look is the dissolution of such ideology, and post-modern amusement is substituting it. The most conspicuous characteristic of decentralization phenomena of Asian look is pastiche which is a combination and reallocation of external style of many cultural zones and many folk costumes, and it shows mutual irrelevance, and it is a neutral imitation which has internal meaning and humor disappeared. Also, Asian look shows characteristics of parody and irony, which are reversal characteristics of aesthetic value which is expressed through methods of addition, modification, distortion, exaggeration, inversion, dissolution, and etc. Parody which is expressed through imitation regarding previous style shows effect of humor or satire, but its characteristics show that it expresses respect or admiration regarding the original The method of irony is showing sarcasm with ironical method regarding the peculiar style of Asian folk costume, and it pursues unexpected shock and joy, and it is closely related to orientalism fashion. Expansion and constancy of Asian look reflects the interest regarding folk of Asia and Asia, and it is a movement which intends new attempt by abolishing stereotype, and furthermore, it is expressing liberty of humans.

Development of a Framework for Estimating the Benefits of IT Projects : Focusing on Preliminary Feasibility Study (정보화 사업의 편익 추정 프레임워크 개발 : 정보화부문 예비타당성조사를 중심으로)

  • Lee, Chunghun
    • Journal of Information Technology Services
    • /
    • v.17 no.3
    • /
    • pp.101-115
    • /
    • 2018
  • In order to promote the IT business efficiently, the Preliminary Feasibility Study has been conducted since 2004. It is to verify the feasibility of a large-scale IT project in advance and to determine whether to reflect the budget. It is more difficult to analyze the benefits of the IT project than other projects, because the IT project is carried out by combining tangible and intangible assets and human resources. For this reason, the Standard Guideline for Preliminary Feasibility Study in the IT field suggests a framework to support in estimating the benefits of the IT project. However, it includes the following problems : 1) level discrepancy among the benefit categories, 2) lack of types of benefit items, 3) no consideration of benefit inducing factors. So the framework is facing a low utilization. This study develops a new framework through a three-step research process. The new framework can be used not only for preliminary feasibility studies but also for estimating the benefits of general IT projects.

Examination of the Current Situations of Security Dogs and it's Development Plans (경호탐지견의 운용실태 및 발전방안)

  • Park, Hyung-Kyu;Kim, Doo-Hyun
    • Korean Security Journal
    • /
    • no.14
    • /
    • pp.215-234
    • /
    • 2007
  • Our country security industry 1960's service expense of the beginning U.S. army unit it accomplishes the growth which is quick with start, currently about 2,500 triumph the security enterprises which it goes over are being active. But the majority in these enterprise about lower cotton can a forever characteristic with pressure and the manpower civil official ability insufficient back of faithlessness management and capital power. To sleep with afterwords it presents the security dogs deployment plan for an efficient security together from the research which it sees hereupon and it does. First, it cultivates the domestic mountain progress dog which is a breed which is suitable with the security dogs and the shovel flesh dog back with the security dogs. Specially the Jindo of the breed which is excellent training which is suitable in task of the security dogs it leads and if it uses appropriately, it industrializes our specific the Jindo and protection there is a possibility of getting the effect which falls to also the gist which it rears rightly. It cultivate the second, security dogs and it magnifies training. The security dogs consequently is it will be able to accomplish the task above 2 branches to training method. Namely, after finishing obedience training, it is to be in security activity it will execute guard or detection back special training which is suitable in task and it will be able to commit. Third, it uses the security dogs which is trained rightly in task. The security dogs the adult escorts, facility expense, the explosive and narcotic drug detection, it will be able to use with the other blind man guidance dogs back. The narcotic drug detection dogs which currently is used specially technique intelligence anger, when considering the tendency of the narcotic drug smuggling offense field which becomes diversification that the role very it is important is a possibility of saying at day. It cultivate a fourth, escort relation specialty manpower and it improves the breed of the security dogs. The hazard which cultivate the security dogs use necessary personnel the breed of security dogs, the security dogs training center it opens the security crane relation subject of the college which stands and (university) it improves it establishes and training which is suitable in task it is to do to execute letting in the training map company. Specially, the hazard which improves the breed of security dogs in the progress mind quality which stands against the portion where the breed improvement is demanded as the portion where the internal organs research and investment are necessary sees. The security dogs compares in labor cost and the expense holds few, if it uses the our specific domestic dogs it will be able to use efficiently in the task which is various it solves the multi branch plans for wisly with the security dogs industrial development security of course contemporary history sliced raw fish sees demands compared to being immediacy and the life which is happy business the place where it does it sees it will be able to contribute a lot as.

  • PDF

A Study of Light Train AFC System Planing (경전철에서 역무자동설비 설계 방안)

  • Lee, Jung-Ju;Lee, Soo-Young
    • Proceedings of the KSR Conference
    • /
    • 2007.11a
    • /
    • pp.1574-1585
    • /
    • 2007
  • In the more and more continues traffic difficulty which comes to be serious it is for solve, in order to like this used plan for new town light train automatic fare collection system, the city development which is balance and the passenger whom it uses, in consequence of the fact that recently believer instruction, the automatic fare collection system the reverse which is convenient is used in the scripture season which is embossed with means it introduces it operates and a manpower with the scientific service control which leads the electric computer anger of passenger service improvement and accounting and statistical business it reduces, the use is convenient and the possibility facility of operating efficiently in rational plan in order to be, description below for the service automation equipment where the efficiency improves it is. Service automation equipment uses a scripture season to be the first boundary gate of the passenger, there must be a place where it uses a service automation facility and in order to be convenient, it considers the moving area and a wait of the reverse station passenger moving area and the space where, must secure the automatic fare collection system which it follows in automation of facility and the service operation of the reverse station which is ticket sale, the collection of tickets back the passenger is convenient and in order it will be able to use, must do and must consider, must arrange the efficient characteristic of the maintenance civil official services.

  • PDF

Analysis on the noise standards of high-speed trains (국내외 고속철도차량 소음기준 분석)

  • Lee Chan-Woo;Kim Jae-Chul;Choi Sung-Hoon
    • Proceedings of the KSR Conference
    • /
    • 2004.10a
    • /
    • pp.393-398
    • /
    • 2004
  • From the research which it sees the noise of the high-speed railroad use nation it gave and the vehicle sound arresting tile masturbation which is a sound arresting unit standard it slept and in an environment noise standard side from it classified. The case foreign nation vehicle of the KTX vehicle where vehicle sound arresting from the side the high speed railroad use nations from the open ground with 64-68 dBA are used first of all from domestic and it compares and the efficiency almost is a possibility of knowing the beginning of history box from the interior sound arresting side. Also it will be developed from domestic and to case of the position KHST vehicle the speed 50 km/h is more speed up the KTX vehicle than in spite of the standard which is equal will pay with 350 km/h and it will be having and the possibility the strong point is knowing very from the interior sound arresting side it was. For railroad area along resident at the comfort improvement of the second the environment noise standard which it presents from the nation of most the patronage standard inland conforms in the law standard and the case high speed railroad of the place comparing domestic which is presented is not in spite of still prepared 2004 April commerce is operated standard easily not to be, it appeared with the fact that the speed governing one standard establishment by law is necessary.

  • PDF

A Case Study on the Testing of Middleware software (미들웨어 소프트웨어의 시험사례 연구)

  • Yang, Hae-Sool;Lee, Ha-Yong;Park, Ju-Seok
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.7
    • /
    • pp.110-120
    • /
    • 2009
  • Recently raising the recognition and it joins in about software quality evaluation and authentication and the recognition is augmented in about importance of the high quality security which leads a quality investment from the software development enterprise. The quality investor do to become accomplished but substantially from which degree level, quality investment it leads and the verification of software quality improvement does not become accomplished substantially and with without being it does and wants the enterprises where are clear the quality improvement which leads a quality investment does not set the direction where the problem occurs. From the research which it sees international ISO/IEC 9126 where it is standard and in about software test ISO/IEC 12119 where it is a guide it constructed the metric in base and software tentative instance it led and is accumulated and the defect data which it analyzed. result escape it investigated/to analyze quality level and it analyzed is weak from development process part and a defect level and the quality rating instance of Middleware] software and escape a disposal plan it investigated. The research which it sees it leads and it induces it is quantitative/that there is a possibility of being sufficient it sees the quality increase of Middleware software and the demand which is qualitative.

Court's Criteria for Judging Research Misconduct and JRPE Goals

  • HWANG, Hee-Joong
    • Journal of Research and Publication Ethics
    • /
    • v.1 no.1
    • /
    • pp.23-28
    • /
    • 2020
  • Purpose: Focusing on Supreme Court precedents, we intend to establish criteria for judging research misconduct. Research design, data and methodology: In addition, I would like to propose the criteria for judging research misconduct by the KODISA, which applies the court's standards well in practice, and guidelines for preventing research misconduct. Research design, data and methodology: After classifying the case of research misconduct into six cases, the court's judgment and practical application will be reviewed. Results: First, research misconduct that has passed the disciplinary prescription can be punished. This is because the state of illegality continues to this day. Second, even if there were no punishment regulations at the time of research misconduct, it can be retroactively punished with the current punishment regulations. This is because research ethics is a universal and common standard and does not change. Third, if there is a fact that infringes on intellectual property rights, it is presumed unwritten intentions. Therefore, the act of taking and using the work of another person without permission or proper citation procedure, even if it is unintentional and for the public interest, is a research misconduct. Fourth, if there is an inappropriate citation notation, the intention of research misconduct is presumed. It is the judgment of the court that even if a quotation is marked, if it is incomplete, it is recognized as plagiarism. Fifth, if the author uses the work of another person without proper source indication, it is plagiarism even if the other person who owns the copyright agrees to it. The understanding or consent of some parties does not justify research misconduct in violation of public trust. Sixth, it is a research misconduct to create a new work without citations for one's previous work. In addition, even if there is a citation, if the subsequent writing is not original, it is a research misconduct. Conclusions: Academia should clarify the scope of research misconduct by referring to the Research Ethics Regulations of KODISA, and deal with research results that lack the value as creative works similar to those of research misconduct.

Value Relevance of Development Cost in IT Firms of KOSDAQ (코스닥 IT기업의 개발비의 가치관련성)

  • Kym, Moon-Hyun
    • Journal of Information Technology Services
    • /
    • v.8 no.3
    • /
    • pp.67-81
    • /
    • 2009
  • This study aims to test the valur relevance of development cost particularly focusing on IT firms of KOSDAQ. Test period is from 2005 to 2007 and the samples are 2,271 year-firms including 1,692 firms that reported development cost in financial statements. The basic test model is a modified Ohlson(1995)'s linear model. The empirical results show that there is the negative relation between stock price and development cost reported as asset. It means that development costs reported as asset is considered as expense in the market. It implies that development activities of KOSDAQ IT firms is not related to market-leading technologies or goods. Otherwise it might reflect the conservative valuation of market on the unstability of KOSDAQ market itself.