• 제목/요약/키워드: Threatened

검색결과 534건 처리시간 0.026초

전자상거래 환경에서의 무역마케팅 전략에 관한 연구 (A Study on the Global Marketing Strategies in EC Environment)

  • 강영구;황상규
    • 경영과정보연구
    • /
    • 제13권
    • /
    • pp.1-26
    • /
    • 2003
  • As a very rapid diffusion of internet business in these days, the marketing mix strategies become more important matters. In addition, because of changes in international trade patterns, and an increase of internet users, new marketing strategies are needs. There's not a business in the world that shouldn't feel threatened by the internet, but companies willing to become engaged should find big opportunities. Becoming engaged with the internet, for matters, means understanding the unique nature of the internet market and using that understanding to execute dynamic strategies. This paper is focusing the analysing the difference between the internet marketing and traditional marketing and proposing the new strategical marketing mix. In the traditional marketing environment, 4P(Product, Price, Promotion, Place) is very important, but in the internet business environment 6C(Community, Connection, Commerce, Communication, Customization, Contents) is more important.

  • PDF

위험 작업에 대한 하도급 근로자 보호방안 연구 (The Subcontract Workers Protection Plan Research against a Dangerous Work)

  • 김대호;김병석
    • 대한안전경영과학회:학술대회논문집
    • /
    • 대한안전경영과학회 2007년도 추계학술대회
    • /
    • pp.85-95
    • /
    • 2007
  • It compared subcontractor with contractor that are wages, the labor hour and labor condition of the work environment back are inferior relative. The subcontractor which basically the contract workers evade the dangerous process or the difficult work, the dirty work back what is called 3D the case which does to keep a business is many. so With life it will be threatened consequent health directly. The possibility where the subcontractor will be exposed to danger work came to be high. Together the reason of subcontract at managing the big business the case which becomes accomplished in objective, about lower the immediacy safety&health problem, subcontractor assigned workers is the actual condition only it could not be deteriorated more in public finance of the supply and enterprise and technical ability insufficiency. Consequently it prevents the subcontract which danger work is insensitive from this research and immediacy of the subcontract workers who is weak hygiene circumstance complement the plan it will be able to secure the immediacy safety&health subcontract workers, substantially to prepare in the hazard subcontract proprietor.

  • PDF

SP기법을 이용한 철도물류서비스의 고객 선호도 분석 (Customer Stated Preference Analysis On Railroad Logistics Service by SP Method)

  • 박찬익;이재원;유승열;권용장;유재균
    • 한국철도학회:학술대회논문집
    • /
    • 한국철도학회 2005년도 춘계학술대회 논문집
    • /
    • pp.985-990
    • /
    • 2005
  • The success of road transportation, in dominating the surface movement of freight, is now threatened by increased traffic congestion, falling average motorway speed and rising in logistics costs, oil price. Due to the necessity for an effective transport system, we need to improve domestic transport infrastructure to reduce logistics cost by shifting to rail system. To analysis the demand characteristics in advance against these hypothetical circumstances, Stated Preference, which is called SP, approaches have been adopted to analysis the shipper's mode choice behaviors as RP(Revealed Preference) approaches are not appropriate. The results also indicate that the most effective policy to divert the freight volume from road to railway is to reduce freight rates for the railway with improved reliability.

  • PDF

교애사물탕의 변이원성 및 간독성에 관한 연구 (Mutagenicity and Hepato-Toxicity of Kyoaesamultang)

  • 우덕안;홍희탁;문진영;이태균;김철호;김준기;최미정;남경수
    • Toxicological Research
    • /
    • 제13권3호
    • /
    • pp.197-202
    • /
    • 1997
  • Kyoaesamultang(KAT) has been used as an important prescription for various diseases including threatened abortion, associated with pregnancy in traditional medicine. In oder to identify the safety of KAT, this study was designed to determine mutagenicity and hepato-toxicity. In Rec-assay, Bacillus subtills H-17($Rec{^+}$) and M-45($Rec{^-}$) strains were used to clarify the DNA damage property. In Ames test, Salmonella typhimurium TA98 and TA100 were used for mutagenicity testing. In SOS umu test, Salmonella typhimurium TA1535 containing plasmid pSK1002 was used as a tester strain, and the levels of umu operon expression were monitored by measuring the $\beta$-galactosidase activity. From tested results, KAT did not show DNA damage and mutagenicity. On the other hand, hepato-toxicity of KAT to female ICR mice was monitored by the measurements of s-GOT, s-GPT and LDH activities after oral feeding for 15days. KAT showed 34% increase of s-GOT and s-GPT activities, also exhibited 35% increase of LDH activity in mice sera.

  • PDF

삼차원 스캐너를 이용한 구조물의 역설계 기법 (A Technology on Reverse Engineering of Structure Using 3D Scanner)

  • 양인태;신문승;아차르야 트리데브
    • 산업기술연구
    • /
    • 제35권
    • /
    • pp.47-53
    • /
    • 2015
  • Recent extreme weather events and natural disasters are causing rapid aging of the ancient structures with cultural value. It has threatened the safety and management. The construction design documents are not kept for such long time. Even if they are, they seem to be mismatched with the design structures due to corrosive effects. For these reasons, Korea has been facing difficulties in maintenance, reengineering and safety evaluation. In this study, three dimensional point cloud surface of bobsleigh is obtained using 3D LiDAR scanner. The obtained structure is compared with the original design and found to be highly accurate. The study shows the application of reverse engineering technique and its potential use for other civil structures.

  • PDF

대학도서관 이용자의 저작권인식에 관한 연구 (A Study of User Recognition of the Copyright in Academic Libraries)

  • 유양근
    • 한국도서관정보학회지
    • /
    • 제39권1호
    • /
    • pp.355-375
    • /
    • 2008
  • 디지털기술의 발달로 정보유통 방법이 다양해지고 신속하게 이루어지는 반면 저작권과 관련된 행위가 무분별 하게 발생되고 있어 교육적 사회적 논쟁이 되고 있다. 본 연구에서는 대학도서관을 이용하는 대학생을 대상으로 논쟁의 대상인 불법적 행위 발생 정도를 조사분석하여 문제 해결 및 교육방안을 모색하는데 있다. 우선 저작권에 대한 일반적 개념을 이해하고 저작권침해와 관련하여 실제사례를 조사하고 이중 연구자료로 활용할 수 있다고 판단되는 사례를 선택하여 인식정도를 분석한 결과 불법적 행위라는 사실을 알면서 복제 및 전송 행위가 무분별하게 발생하고 있음이 밝혀졌다.

  • PDF

요양보호사의 직장폭력 경험실태 (Workplace Violence Experiences among Care Helpers)

  • 서은주;김숙영
    • 성인간호학회지
    • /
    • 제24권6호
    • /
    • pp.607-614
    • /
    • 2012
  • Purpose: This is a descriptive research that reports incidents of workplace violence among care helpers. Methods: The subjects were 181 care helpers from elderly care facilities and domiciliary elderly welfare centers in Daejeon. Data were collected through self-administered questionnaires from July to November 2011. Subjects were asked to report incidents of violence within the previous six months. Data analysis included one-way ANOVA, and logistic regression analysis. Results: Forty-seven percent of care helpers reported verbal violence, 16% reported being physically threatened, more than 21 % reported sustaining a physical injury with 2% reporting severe physical injuries. Further, 18.8% of the care givers reported being sexually harassed by client. There were differences in reported workplace violence based on service types, service hours and whether there were policies about workplace violence. Conclusion: To prevent workplace violence for carehelpers, it is necessary to make a policy for preventing violence and develop a violence prevention program to meet service characteristics of facility-based and domiciliary care helpers.

불규칙해면에서 선수부의 상대운동에 관한 연구 (A Study on the Relative Bow Motion in Irrugular Sea)

  • 윤점동;김종훈;김기윤
    • 한국항해학회지
    • /
    • 제13권2호
    • /
    • pp.37-55
    • /
    • 1989
  • When a ship is sailing on the sea, she has the six-degrees of freedom of motion. It means that she meets a lot of dangerous situations. Especially, when the VLCC is travelling in irregular sea, the slamming, the deck-wetness and the propeller racing are occured with the sea state she is on. These are the representative steps that a heave-to and a scudding are used for a ship building , but for a predominance in both. The author intends to clarify this problem theoretically. The methods of statistical calculation are based with the ITTC spectral formulation and with the assumption that the wave height histogram follows the Rayleigh distribution. In this study, the author gives an attention on the relative bow motion to a wave in the irregular sea. It is verified that the relative diplacement at the bow to sea level in the following sea is less than that in the head sea. It is confirmed that, therefore, one have to sail with scudding when he is threatened to heave-to at a rough sea. But he must bear the propeller racing in mind in the cases.

  • PDF

적응신호처리를 이용한 음질 개선 (Enhancement of Speech Using the Adaptive Signal Processing)

  • 신윤기
    • 음성과학
    • /
    • 제9권4호
    • /
    • pp.275-287
    • /
    • 2002
  • In man-machine communication by speech under the noisy environment, the quality of speech may be degraded severely for the machine to recognize correctly. Especially when the corrupting noise occupies the same band as the speech, the conventional fixed filters cannot filter out the noise effectively. In recent, to resolve such a problem adaptive noise canceller (ANC) is frequently used, which is based upon adaptive filters. The Adaptive recursive filters perform better than adaptive nonrecursive filters due to the added poles, but the stability may be severely threatened. In this paper an ANC system employing the adaptive recursive filter is proposed to enhance the speech corrupted by noise. And the stability of the adaptive recursive filter is guaranteed by employing the adaptive compensator.

  • PDF

VoIP-RBL을 이용한 SIP기반 VoIP스팸 차단 방법 (A Study on Countering SIP-based VoIP Spam using VoIP-RBL)

  • 윤석웅;정현철;박해룡;원유재;유형선
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2011년도 한국컴퓨터종합학술대회논문집 Vol.38 No.1(D)
    • /
    • pp.135-136
    • /
    • 2011
  • The more VoIP service is widely used, the more VoIP spam becomes threatened. Both VoIP spam violates the user's privacy and VoIP spam can cause money trouble. Therefore, it is important to reduce the VoIP spam but it is not easy to adopt some useful techniques to counter e-mail spam due to VoIP characteristics. We propose a technique using VoIP-RBL for countering SIP-based VoIP spam.