• Title/Summary/Keyword: Science communication

Search Result 13,077, Processing Time 0.037 seconds

Structural Relationships Among Factors to Adoption of Telehealth Service (원격의료서비스 수용요인의 구조적 관계 실증연구)

  • Kim, Sung-Soo;Ryu, See-Won
    • Asia pacific journal of information systems
    • /
    • v.21 no.3
    • /
    • pp.71-96
    • /
    • 2011
  • Within the traditional medical delivery system, patients residing in medically vulnerable areas, those with body movement difficulties, and nursing facility residents have had limited access to good healthcare services. However, Information and Communication Technology (ICT) provides us with a convenient and useful means of overcoming distance and time constraints. ICT is integrated with biomedical science and technology in a way that offers a new high-quality medical service. As a result, rapid technological advancement is expected to play a pivotal role bringing about innovation in a wide range of medical service areas, such as medical management, testing, diagnosis, and treatment; offering new and improved healthcare services; and effecting dramatic changes in current medical services. The increase in aging population and chronic diseases has caused an increase in medical expenses. In response to the increasing demand for efficient healthcare services, a telehealth service based on ICT is being emphasized on a global level. Telehealth services have been implemented especially in pilot projects and system development and technological research. With the service about to be implemented in earnest, it is necessary to study its overall acceptance by consumers, which is expected to contribute to the development and activation of a variety of services. In this sense, the study aims at positively examining the structural relationship among the acceptance factors for telehealth services based on the Technology Acceptance Model (TAM). Data were collected by showing audiovisual material on telehealth services to online panels and requesting them to respond to a structured questionnaire sheet, which is known as the information acceleration method. Among the 1,165 adult respondents, 608 valid samples were finally chosen, while the remaining were excluded because of incomplete answers or allotted time overrun. In order to test the reliability and validity of the assessment scale items, we carried out reliability and factor analyses, and in order to explore the causal relation among potential variables, we conducted a structural equation modeling analysis using AMOS 7.0 and SPSS 17.0. The research outcomes are as follows. First, service quality, innovativeness of medical technology, and social influence were shown to affect perceived ease of use and perceived usefulness of the telehealth service, which was statistically significant, and the two factors had a positive impact on willingness to accept the telehealth service. In addition, social influence had a direct, significant effect on intention to use, which is paralleled by the TAM used in previous research on technology acceptance. This shows that the research model proposed in the study effectively explains the acceptance of the telehealth service. Second, the research model reveals that information privacy concerns had a insignificant impact on perceived ease of use of the telehealth service. From this, it can be gathered that the concerns over information protection and security are reduced further due to advancements in information technology compared to the initial period in the information technology industry, and thus the improvement in quality of medical services appeared to ensure that information privacy concerns did not act as a prohibiting factor in the acceptance of the telehealth service. Thus, if other factors have an enormous impact on ease of use and usefulness, concerns over these results in the initial period of technology acceptance may become irrelevant. However, it is clear that users' information privacy concerns, as other studies have revealed, is a major factor affecting technology acceptance. Thus, caution must be exercised while interpreting the result, and further study is required on the issue. Numerous information technologies with outstanding performance and innovativeness often attract few consumers. A revised bill for those urgently in need of telehealth services is about to be approved in the national assembly. As telemedicine is implemented between doctors and patients, a wide range of systems that will improve the quality of healthcare services will be designed. In this sense, the study on the consumer acceptance of telehealth services is meaningful and offers strong academic evidence. Based on the implications, it can be expected to contribute to the activation of telehealth services. Further study is needed to assess the acceptance factors for telehealth services, such as motivation to remain healthy, health care involvement, knowledge on health, and control of health-related behavior, in order to develop unique services according to the categorization of customers based on health factors. In addition, further study may focus on various theoretical cognitive behavior models other than the TAM, such as the health belief model.

The Knowledge and Needs of Hospice for Inpatients' Family (입원환자 가족의 호스피스 인지 및 요구도)

  • Ko, Sung-Hee;Kim, Hyun-Kyung
    • Journal of Hospice and Palliative Care
    • /
    • v.8 no.2
    • /
    • pp.131-142
    • /
    • 2005
  • Purpose: The purpose of this study was to survey the knowledge and needs of hospice for inpatients' family. Methods: This study was carried out with 277 inpatients' families at J General Hospital located in J city, Korea during the period from March to May, 2004. The data were collected through a self-reporting questionnaire constructed by the authors. The data were analyzed by descriptive statistics and $x^2-test$ with SPSSWIN 10.0. Results: 83.8% of the respondents heard about hospice mostly through mass communication. 76.9% of the respondents recognized hospice to be helpful and to provide comfort during the remainder of life and to confront the moment of death. Most of the respondents responded positively to the necessity of hospice service, and would receive hospice if necessary. 76.5% of them would consider arranging preparation for death if he/she were to be diagnosed with a terminal illness. 63.9% of the respondents wanted only to be with their family members, 31.4% wanted both the family and hospice members at the moment of death. They named the best helper among the hospice members to be the nurse. 81.6% of the respondents wanted a hospice institution to be established, 23.8% of them report that the most adequate hospice management institution would be the hospice ward in hospital. Conclusion: Consequently, most respondents wanted hospice services. So Korean society is in need of developing adequate teaching and care programs for hospice according to local needs.

  • PDF

An Analysis of Efficiency of Security Services : A Comparative Determinants Analysis of Public and Private Security (경호업무 효율성에 관한 연구 : 공공경호와 민간경호의 효율성 영향요인의 비교분석)

  • Park, Moon-Sun
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.67-103
    • /
    • 2009
  • Objectives of this study is develop security services through determinants analysis on the efficiency of security works regarding security and guarding business in Korea because nowadays the modern society like Korea let alone all over the world faces the increase of dangerous factors in every security field of the human societies, and also it is the very present situation that an individual's life even the national security itself can be at the risk without guaranteeing the efficiency of the security services. For this purpose, this study reviewed related documents, surveyed and interviewed security personnels to identify what the potentially influential factors are in both the public and private security organizations regarding the efficiency of present security services and organizations, and what differences are. Also, comparing the public and private security sectors, this study intended to suggest policy agendas how to enhance the efficiency of security services in the future. This study surveyed the 177 agents and former agents of the Presidential Security Service(PSS) for the public security sector, and also surveyed, interviewed, and internet-based polled 821 randomly selected personnels for the private security sector. This research showed that regarding the efficiency of the security services number of independent variables which had positive responses in the public security sector was more than that in the private security sector. Among the 21 questions regarding this issue, there were all of 21 positive responses in the public security sector while there were 18 negative responses in the private security sector. As a result of synthesizing all the answers of the both sides, it is possible to understand that mostly the ratio of the positive response was much higher. In the public security service, statistically significant variables were budget support for events, prior access of information, an integrated teamwork training, organizational atmosphere, morale of organization personnel. However, practical training of the security service and mutual communication showed unexpectedly negative(-) signs. In the private security service, statistically significant variables were budget support for events, integrated teamwork training, socially friendly atmosphere, compensation for the personnels, bullet-proof equipments and vehicles, mood of organization, personnel recruit and disposition, unexpected incidents and basic attitude for security services. In sum, while organizational personnel variables and organizational management variables were significant in the public security service, some organizational management variables and all socio-environment variables were statistically significant at 5% significance level.

  • PDF

A Study on the Analysis and Efficiency of Police Budget (경찰의 예산분석 및 효율화 방안에 관한 연구)

  • Park, Jong-Seung;Kim, Chang-Yun
    • Korean Security Journal
    • /
    • no.38
    • /
    • pp.7-32
    • /
    • 2014
  • This study is aimed to analyze problems of police budgetary execution and to suggest better ways for establishing effective budget implementation as well as legitimacy of securing budget in the field of police work. For this purpose, this paper analyzed the annual reports on police budgetary execution, from 2009 to 2012, conducted by National Assembly Budget Office. In result, most parts of the police budgetary execution were not satisfied with the audit standard, and especially in terms of management of budgetary execution, it showed 40% in inappropriateness. In addition, excessive and underestimate appropriation in the police budgetary execution, which happened frequently in other offices, was recorded on the second place. 10% of the amount of budget was executed for ordinance violence. Given results analyzed from each division, Transportation Division occupied 40% of the amount of related problems and all of types in the field did not meet the audit standard, thus it is required to manage budgetary execution effectively. In terms of Public Safety Division, the problem was related to budgetary allocation prior to execution, such as overlap in other works, excessive and underestimate appropriation, and inappropriate business plans. Director General for Planning and Coordination did not meet the standard of law system maintenance, Given the light of the result of analyzing programs, traffic safety and securing communication was the most problematic and support for police administration, crime prevention and protecting the disadvantaged, educating professional police officers, and establishment of policing infrastructure were required to be reformed in sequence. In order to resolve these problems, it is demanded to check budgetary execution and the process in business plans on a regular basis. Additionally, in case of using budget in inappropriate parts, tough penality including reduction of budget in related to the local police should be implemented to increase the importance of budgetary execution. Moreover, because of the fact that a part of problem of budgetary execution was originally caused by the budgetary allocation, it is advised to allocate police budget using the budget proposal of National Finance Act and Ministry of Strategy and Finance.

  • PDF

Research about a structure system of the bus information system which is applied to the bus stop - Around a problem and preference of Pusan bus information system investigation - (버스정류장에 적용된 버스정보시스템의 구성 체계에 관한 연구 - 부산시 버스정보시스템의 문제점 및 선호도 조사를 중심으로 -)

  • Cha Min-Jun;Hong Kwan-Seon
    • Archives of design research
    • /
    • v.19 no.4 s.66
    • /
    • pp.61-70
    • /
    • 2006
  • The functions and roles in the various fields of modern society are changing into the unified and multiplex structure, which is simultaneous and virtual communication environments beyond physical space and time, by the digital IT technology. The urban traffic system is also being intellectualized in order to solve urban traffic problems and convenient services by using digital IT technology. The bus, which is the one of the most common public transportation, are suffering in the decrease of bus service quality and the bus passengers rate because of the development of other public transportation systems such as the subway and electric railway and by rapidly increasing private cars. By recognizing these problems, many domestic and overseas cities are promoting to introduce the Bus Information System (BIS) to improve service quality of buses through the intelligent traffic system. According to the construction of this new information system called the Bus Information System (BIS), the new bus stop configuration system and design plans are being required to solve the existing bus stop information system. Therefore, this research was conducted to suggest an effective BIS configuration system plan and synthetic design goals based on the investigation the problems of the information system and the BIS configuration system for Busan city. Also, this research are conducted the below actions as follows: First, the literature survey was conducted, such as theoretical documents on the bus stop and the Bus Information System(BIS), Also, the design trend of the BIS was examined through domestic and overseas BIS cases studies. Scondly, the problems related to the information system in Busan city bus stops were investigated to investigate the present state and problems of the Bus Information System (BIS). Finally, as a result of this research, the effective BIS configuration system plan and design approach methods of bus stops were proposed for by Busan city based on the above investigation results.

  • PDF

Characterizing Strategy of Emotional sympathetic Robots in Animation and Movie - Focused on Appearance and Behavior tendency Analysis - (애니메이션 및 영화에 등장하는 정서교감형 로봇의 캐릭터라이징 전략 - 외형과 행동 경향성 분석을 중심으로 -)

  • Ryu, Beom-Yeol;Yang, Se-Hyeok
    • Cartoon and Animation Studies
    • /
    • s.48
    • /
    • pp.85-116
    • /
    • 2017
  • The purpose of this study is to analyze conditions that robots depicted in cinematographic works like animations or movies sympathize with and form an attachment with the nuclear person and organize characterizing strategies for emotional sympathetic robots. Along with the development of technology, the areas of artificial intelligence and robots are no longer considered to belong to science fiction but as realistic issues. Therefore, this author assumes that the expressive characteristics of emotional sympathetic robots created by cinematographic works should be used as meaningful factors in expressively embodying human-friendly service robots to be distributed widely afterwards, that is, in establishing the features of characters. To lay the grounds for it, this research has begun. As the subjects of analysis, this researcher has chosen robot characters whose emotional intimacy with the main person is clearly observed among those found in movies and animations produced after the 1920 when robot's contemporary concept was declared. Also, to understand robots' appearance and behavioral tendency, this study (1) has classified robots' external impressions into five types (human-like, cartoon, tool-like, artificial bring, pet or creature) and (2) has classified behavioral tendencies considered to be the outer embodiment of personality by using DiSC, the tool to diagnose behavioral patterns. Meanwhile, it has been observed that robots equipped with high emotional intimacy are all strongly independent about their duties and indicate great emotional acceptance. Therefore, 'influence' and 'Steadiness' types show great emotional acceptance, the influencing type tends to be highly independent, and the 'Conscientiousness' type tends to indicate less emotional acceptance and independency in general. Yet, according to the analysis on external impressions, appearance factors hardly have any significant relationship with emotional sympathy. It implies that regarding the conditions of robots equipped with great emotional sympathy, emotional sympathy grounded on communication exerts more crucial effects than first impression similarly to the process of forming interpersonal relationship in reality. Lastly, to study the characters of robots, it is absolutely needed to have consilient competence embracing different areas widely. This author also has felt that only with design factors or personality factors, it is hard to estimate robot characters and also analyze a vast amount of information demanded in sympathy with humans entirely. However, this researcher will end this thesis as the foundation for it expecting that the general artistic value of animations can be used preciously afterwards in developing robots that have to be studied interdisciplinarily.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

Performance of Drip Irrigation System in Banana Cultuivation - Data Envelopment Analysis Approach

  • Kumar, K. Nirmal Ravi;Kumar, M. Suresh
    • Agribusiness and Information Management
    • /
    • v.8 no.1
    • /
    • pp.17-26
    • /
    • 2016
  • India is largest producer of banana in the world producing 29.72 million tonnes from an area of 0.803 million ha with a productivity of 35.7 MT ha-1 and accounted for 15.48 and 27.01 per cent of the world's area and production respectively (www.nhb.gov.in). In India, Tamil Nadu leads other states both in terms of area and production followed by Maharashtra, Gujarat and Andhra Pradesh. In Rayalaseema region of Andhra Pradesh, Kurnool district had special reputation in the cultivation of banana in an area of 5765 hectares with an annual production of 2.01 lakh tonnes in the year 2012-13 and hence, it was purposively chosen for the study. On $23^{rd}$ November 2003, the Government of Andhra Pradesh has commenced a comprehensive project called 'Andhra Pradesh Micro Irrigation Project (APMIP)', first of its kind in the world so as to promote water use efficiency. APMIP is offering 100 per cent of subsidy in case of SC, ST and 90 per cent in case of other categories of farmers up to 5.0 acres of land. In case of acreage between 5-10 acres, 70 per cent subsidy and acreage above 10, 50 per cent of subsidy is given to the farmer beneficiaries. The sampling frame consists of Kurnool district, two mandals, four villages and 180 sample farmers comprising of 60 farmers each from Marginal (<1ha), Small (1-2ha) and Other (>2ha) categories. A well structured pre-tested schedule was employed to collect the requisite information pertaining to the performance of drip irrigation among the sample farmers and Data Envelopment Analysis (DEA) model was employed to analyze the performance of drip irrigation in banana farms. The performance of drip irrigation was assessed based on the parameters like: Land Development Works (LDW), Fertigation costs (FC), Volume of water supplied (VWS), Annual maintenance costs of drip irrigation (AMC), Economic Status of the farmer (ES), Crop Productivity (CP) etc. The first four parameters are considered as inputs and last two as outputs for DEA modelling purposes. The findings revealed that, the number of farms operating at CRS are more in number in other farms (46.66%) followed by marginal (45%) and small farms (28.33%). Similarly, regarding the number of farmers operating at VRS, the other farms are again more in number with 61.66 per cent followed by marginal (53.33%) and small farms (35%). With reference to scale efficiency, marginal farms dominate the scenario with 57 per cent followed by others (55%) and small farms (50%). At pooled level, 26.11 per cent of the farms are being operated at CRS with an average technical efficiency score of 0.6138 i.e., 47 out of 180 farms. Nearly 40 per cent of the farmers at pooled level are being operated at VRS with an average technical efficiency score of 0.7241. As regards to scale efficiency, nearly 52 per cent of the farmers (94 out of 180 farmers) at pooled level, either performed at the optimum scale or were close to the optimum scale (farms having scale efficiency values equal to or more than 0.90). Majority of the farms (39.44%) are operating at IRS and only 29 per cent of the farmers are operating at DRS. This signifies that, more resources should be provided to these farms operating at IRS and the same should be decreased towards the farms operating at DRS. Nearly 32 per cent of the farms are operating at CRS indicating efficient utilization of resources. Log linear regression model was used to analyze the major determinants of input use efficiency in banana farms. The input variables considered under DEA model were again considered as influential factors for the CRS obtained for the three categories of farmers. Volume of water supplied ($X_1$) and fertigation cost ($X_2$) are the major determinants of banana farms across all the farmer categories and even at pooled level. In view of their positive influence on the CRS, it is essential to strengthen modern irrigation infrastructure like drip irrigation and offer more fertilizer subsidies to the farmer to enhance the crop production on cost-effective basis in Kurnool district of Andhra Pradesh, India. This study further suggests that, the present era of Information Technology will help the irrigation management in the context of generating new techniques, extension, adoption and information. It will also guide the farmers in irrigation scheduling and quantifying the irrigation water requirements in accordance with the water availability in a particular season. So, it is high time for the Government of India to pay adequate attention towards the applications of 'Information and Communication Technology (ICT) and its applications in irrigation water management' for facilitating the deployment of Decision Supports Systems (DSSs) at various levels of planning and management of water resources in the country.

Professionalism raising of the escort which leads an instance analysis (사례분석을 통한 경호 전문성 제고)

  • Yu, Hyung-Chang
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.73-99
    • /
    • 2009
  • There are three assassination and treatening cases in this thesis introduced as analysis data. They are shooting accidents of the U.S.A's President Reagun (1981,3.30), and the President Park Jeong Hee of South Korea(1974.8.15), assassination of the Prime Minister Lavin of Israel (1995.11.4) In March 30, 1981, there was an accident where criminal, Hinckley, fired ball cartridges right before the President Reagan got into the car to move to White House after completing the announcement of Hilton Hotel of Washington. As a result, the chest of president was shot and public information secretary and safeguard were wounded. In August, 15, pm 10:23, where the 29th 8.15 independent anniversay event was being celebrated by the people at the National theater in Jangchungdong, Seoul, the criminal Moon Sekwang fired ball cartridges, he failed to assassinate the President Park Jeong Hee of Korea, but shot the First lady Yuk Young Soo. She was wounded right part of head and died. In November 4, Saturday, pm 22:00 the Prime Minster Lavin had finished the supporting event of Middle Asia's Peace project and was taking on the car when he was killed by the criminal Amir's shooting, The accidents left very important lesson from the aspect of security analysis and it has been frequently used as a material for the education and training of safeguard organization. In Korea, as well as Presidential Security Service, national security departments have selected it as an important model for the subjects such as 'Security Analysis, 'Security Practice' and 'Security Methodology'. In the performance of security duty, security skill is the most important matter. Moreover, it has a close relationship with politics, society and culture. The purpose of this study is to analyze and reevaluate the case, which has been treated as a usual model from the aspect of security analysis, beyond its introduction. Attempted assassination of President Reagan was evaluated as a positive success example because of its rapid response of adjacent guards to evacuate Reagan, who is a guard target, within 10 seconds after the shot. When comparing it to President Kennedy Assassination of 1963, it was evaluated that guards were significantly specialized. In the study, however, it was possible to found many problems such as carelessness of guard, who is in charge of external area of event place, idle attitude for frequently used event place, confusion of wireless communication, risk of wireless security disclose, insufficient provision of compulsory record file, insufficient profiling of dangerous person and unsecured hospital and first-aid room.

  • PDF

Analysis of the growth environment and fruiting body quality of Pleurotus eryngii cultivated by Smart Farming (큰느타리(새송이)버섯 스마트팜 재배를 통한 생육환경 분석 및 자실체 품질 특성)

  • Kim, Kil-Ja;Kim, Da-Mi;An, Ho-Sub;Choi, Jin-Kyung;Kim, Seon-Gon
    • Journal of Mushroom
    • /
    • v.17 no.4
    • /
    • pp.211-217
    • /
    • 2019
  • Currently, cultivation of mushrooms using the Information and Communication Technology (ICT)-based smart farming technique is increasing rapidly. The main environmental factors for growth of mushrooms are temperature, humidity, carbon dioxide (CO2), and light. Among all the mentioned factors, currently, only temperature has been maintained under automatic control. However, humidity and ventilation are controlled using a timer, based on technical experience.Therefore, in this study, a Pleurotus eryngii first-generation smart farm model was set up that can automatically control temperature, humidity, and ventilation. After installing the environmental control system and the monitoring device, the environmental condition of the mushroom cultivation room and the growth of the fruiting bodies were studied. The data thus obtained was compared to that obtained using the conventional cultivation method.In farm A, the temperature during the primordia formation stage was about 17℃, and was maintained at approximately 16℃ during the fruiting stage. The humidity was initially maintained at 95%, and the farm was not humidified after the primordia formation stage. There was no sensor for CO2 management, and the system was ventilated as required by observing the shape of the pileus and the stipe. It was observed that, the concentration of CO2 was between 700 and 2,500 ppm during the growth period. The average weight of the mushrooms produced in farm A was 125 g, and the quality was between that of the premium and the first grade.In farm B. The CO2 sensor was in use for measurement purposes only; the system was ventilated as required by observing the shape of the pileus and the stipe. During the growth period, the CO2 concentration was observed to be between 640 and 4,500 ppm. The average weight of the mushrooms produced in farm B was 102 g.These results indicate that the quality of the king oyster mushroom is determined by the environmental conditions, especially by the concentration of CO2. Thus, the data obtained in this study can be used as an optimal smart farm model, where, by improving the environmental control method of farm A, better quality mushrooms were obtained.