• Title/Summary/Keyword: collection time

Search Result 2,300, Processing Time 0.032 seconds

A Study on Sijo Poem's Subject of Gagok (가곡의 시조시 주제 연구)

  • Shin Woong-Soon
    • Sijohaknonchong
    • /
    • v.22
    • /
    • pp.85-113
    • /
    • 2005
  • This paper's target is two music books, 100 man's Gagok songs and 88 woman's Gagok songs compiled by Kim Kee-soo. The next is an interpretation on 9 subject classifications. 1. There is a similiarity in subject between $\lceil$kyobonyukdaesijo's collection$\rfloor$ and man's Gagok song. 2. There is a wide difference in man and woman's love subject between man's Gagok songs and woman's Gagok songs. 3. The subject changes as Gagok progreasses. 4. There are many nameless writers in the prograss of Nong$\cdot$Na k$\cdot$Peon. 5. Taepeongga, whose theme is to enjoy pleasure, forms the last beauty. Sijo poem's subjects, which belongs to the noble class, shows the mode of scholar's elegant life at that time.

  • PDF

Investigation of False Positive Rates Newborn Screening using Tandem Mass Spectrometry (TMS) Technology in Single Center (단일기관에서 이중 질량 분석법(tandem mass spectrometry technology)을 이용한 선천성 대사이상 검사의 위양성율에 대한 연구)

  • Kim, Hyunsoo;Shin, Son Moon;Ko, Sun Young;Lee, Yeon Kyung;Park, Sung Won
    • Journal of The Korean Society of Inherited Metabolic disease
    • /
    • v.16 no.1
    • /
    • pp.18-23
    • /
    • 2016
  • Objective: Newborn screening leads to improved treatment and disease outcomes, but false-positive newborn screening results may impact include parental stress and anxiety, perception of child as unhealthy, parent-child relationship dysfunction, and increased infant hospitalizations. The purpose of this study was to investigate of the false positive rates and the causative factors of false positive results in Tandem Mass Spectrometry (TMS) in single center. Methods: Records were reviewed for all 18,872 subjects who were born in Cheill General Hospital, during January 1st, 2012 to December 31st, 2014. 17,292 neonates (91.62%) were tested for tandem mass screening almost in 2-5th day of life. Newborn babies whose first results were abnormal had been tested repeatedly by same methods in 7-14 day. If the results were abnormal again, further evaluation was performed. TMS analysis included data for the 43 disorders screened for using TMS broken down into three categories: fatty acid oxidation disorders, organic acidurias, and aminoacidopathies. The impact of several factors on increased false positive rates was analyzed using a multivariate analysis: time from birth to sample collection, birth weight, birth height, BMI, gender, gestational age, delivery type. Results: Males of the subjects were 8942 (51.7%), female 8350 (48.3%), the mean gestational age was $38.6{\pm}1.7$ weeks, the average birth weight $3,155.6{\pm}502.4g$, the average birth height $49.1{\pm}2.9cm$, and the average BMI $13.0{\pm}3.8(kg/m^2)$. Vaginal delivery cases were 9713 (56.2%), caesarean section 7,579 (43.8%). The average date of the inspection was $2.8{\pm}1.1$ days. 224 cases were identified as TMS positive. All the subjects were false positive (222/17,292, 1.30%) except 2 cases (1 male; benign phenylketonuria and 1 female; Short chain acyl-CoA dehydrogenase deficiency). The false positive rates were 0.61% in fatty acid oxidation disorders, 0.25% in organic acidurias, and 0.45% in aminoacidopathies. In our study, the date of inspection got late, the false positive rates got higher. Because almost the cases of late test date were in treatment in neonatal intensive care unit so their test date was affected by their medical conditions. False positive rate was higher in extreme immaturity${\leq}27$ weeks than newborns of gestational age >27 weeks [OR=6.957 (CI=1.273-38.008), p<0.025] and extremely low birth weight<1,000 g than newborns of birthweight ${\geq}1,000g$ [OR=5.616 (CI=1.134-27.820), p<0.035]. Conclusion: False positive rate of TMS was 1.30% in Cheil General Hospital. Lower gestational age and birth weight impacted on increased false positive rates. Better understanding of factors that influence the reporting of screening tests, and the ability to modify these important factors, may improve the screening process and reduce the need for retesting. of screening tests, and the ability to modify these important factors, may improve the screening process and reduce the need for retesting.

  • PDF

DEVELOPMENT OF SAFETY-BASED LEVEL-OF-SERVICE CRITERIA FOR ISOLATED SIGNALIZED INTERSECTIONS (독립신호 교차로에서의 교통안전을 위한 서비스수준 결정방법의 개발)

  • Dr. Tae-Jun Ha
    • Proceedings of the KOR-KST Conference
    • /
    • 1995.02a
    • /
    • pp.3-32
    • /
    • 1995
  • The Highway Capacity Manual specifies procedures for evaluating intersection performance in terms of delay per vehicle. What is lacking in the current methodology is a comparable quantitative procedure for ass~ssing the safety-based level of service provided to motorists. The objective of the research described herein was to develop a computational procedure for evaluating the safety-based level of service of signalized intersections based on the relative hazard of alternative intersection designs and signal timing plans. Conflict opportunity models were developed for those crossing, diverging, and stopping maneuvers which are associated with left-turn and rear-end accidents. Safety¬based level-of-service criteria were then developed based on the distribution of conflict opportunities computed from the developed models. A case study evaluation of the level of service analysis methodology revealed that the developed safety-based criteria were not as sensitive to changes in prevailing traffic, roadway, and signal timing conditions as the traditional delay-based measure. However, the methodology did permit a quantitative assessment of the trade-off between delay reduction and safety improvement. The Highway Capacity Manual (HCM) specifies procedures for evaluating intersection performance in terms of a wide variety of prevailing conditions such as traffic composition, intersection geometry, traffic volumes, and signal timing (1). At the present time, however, performance is only measured in terms of delay per vehicle. This is a parameter which is widely accepted as a meaningful and useful indicator of the efficiency with which an intersection is serving traffic needs. What is lacking in the current methodology is a comparable quantitative procedure for assessing the safety-based level of service provided to motorists. For example, it is well¬known that the change from permissive to protected left-turn phasing can reduce left-turn accident frequency. However, the HCM only permits a quantitative assessment of the impact of this alternative phasing arrangement on vehicle delay. It is left to the engineer or planner to subjectively judge the level of safety benefits, and to evaluate the trade-off between the efficiency and safety consequences of the alternative phasing plans. Numerous examples of other geometric design and signal timing improvements could also be given. At present, the principal methods available to the practitioner for evaluating the relative safety at signalized intersections are: a) the application of engineering judgement, b) accident analyses, and c) traffic conflicts analysis. Reliance on engineering judgement has obvious limitations, especially when placed in the context of the elaborate HCM procedures for calculating delay. Accident analyses generally require some type of before-after comparison, either for the case study intersection or for a large set of similar intersections. In e.ither situation, there are problems associated with compensating for regression-to-the-mean phenomena (2), as well as obtaining an adequate sample size. Research has also pointed to potential bias caused by the way in which exposure to accidents is measured (3, 4). Because of the problems associated with traditional accident analyses, some have promoted the use of tqe traffic conflicts technique (5). However, this procedure also has shortcomings in that it.requires extensive field data collection and trained observers to identify the different types of conflicts occurring in the field. The objective of the research described herein was to develop a computational procedure for evaluating the safety-based level of service of signalized intersections that would be compatible and consistent with that presently found in the HCM for evaluating efficiency-based level of service as measured by delay per vehicle (6). The intent was not to develop a new set of accident prediction models, but to design a methodology to quantitatively predict the relative hazard of alternative intersection designs and signal timing plans.

  • PDF

A Study on Milk Quality and Dairy Hygiene Management in Gyunggi Area (경기 일부지역의 유질 및 낙농위생 관리에 관한 조사연구)

  • 이용욱;박명섭
    • Journal of Food Hygiene and Safety
    • /
    • v.2 no.3
    • /
    • pp.109-119
    • /
    • 1987
  • This Study was conducted to provide fundamental data necessary for the improvement of milk quality. Milk quality was evaluated by 3 methods; milk fat percent measurement, methylene blue reduction test (MBRT), and somatic cell count measurement. At the same time, condition of hygienic management of dairy facilities and cows was investigated in each of 234 dairy farms located in Gyunggi area from May, 1986 to April, 1987. The results were as follows 1. Average milk fat percents among farms were 3.67%, 3.64%, 3.43%, 3.48% in January, April, July and October, respectively. The diUerences of milk fat percent from month to month were statistically significant (p<0.005). and the seasonal average was 3.56%. 2. Numbers of farms which produced bulk milk of first grade by MBRT were 153(65.4%), 157(67.1%), 76(32.5%) and 141(60.2%) in January, April, July and October, respectively. The diUerences among months were statistically significant (p<0.005). Also, significant diUerences of grade by milking quantity (p<0.05), presence of milk cooler (p<0.01), and collection means (p<0.05) were demonstrated. 3. Number8 of farms which produced bulk milk of fir8t grade in somatic cell count measurement were 227(97.0%), 226(96.6%), 218(93.2%) and 223(95.3%) in January, April, July and October, respectively. And diUerences of grade by the pratice of teat dipping, dry cow therapy and manner in which udder washing towel was used statisticaJJy 8ignificant (p<0.01).

  • PDF

Factors Influencing the Adoption of Location-Based Smartphone Applications: An Application of the Privacy Calculus Model (스마트폰 위치기반 어플리케이션의 이용의도에 영향을 미치는 요인: 프라이버시 계산 모형의 적용)

  • Cha, Hoon S.
    • Asia pacific journal of information systems
    • /
    • v.22 no.4
    • /
    • pp.7-29
    • /
    • 2012
  • Smartphone and its applications (i.e. apps) are increasingly penetrating consumer markets. According to a recent report from Korea Communications Commission, nearly 50% of mobile subscribers in South Korea are smartphone users that accounts for over 25 million people. In particular, the importance of smartphone has risen as a geospatially-aware device that provides various location-based services (LBS) equipped with GPS capability. The popular LBS include map and navigation, traffic and transportation updates, shopping and coupon services, and location-sensitive social network services. Overall, the emerging location-based smartphone apps (LBA) offer significant value by providing greater connectivity, personalization, and information and entertainment in a location-specific context. Conversely, the rapid growth of LBA and their benefits have been accompanied by concerns over the collection and dissemination of individual users' personal information through ongoing tracking of their location, identity, preferences, and social behaviors. The majority of LBA users tend to agree and consent to the LBA provider's terms and privacy policy on use of location data to get the immediate services. This tendency further increases the potential risks of unprotected exposure of personal information and serious invasion and breaches of individual privacy. To address the complex issues surrounding LBA particularly from the user's behavioral perspective, this study applied the privacy calculus model (PCM) to explore the factors that influence the adoption of LBA. According to PCM, consumers are engaged in a dynamic adjustment process in which privacy risks are weighted against benefits of information disclosure. Consistent with the principal notion of PCM, we investigated how individual users make a risk-benefit assessment under which personalized service and locatability act as benefit-side factors and information privacy risks act as a risk-side factor accompanying LBA adoption. In addition, we consider the moderating role of trust on the service providers in the prohibiting effects of privacy risks on user intention to adopt LBA. Further we include perceived ease of use and usefulness as additional constructs to examine whether the technology acceptance model (TAM) can be applied in the context of LBA adoption. The research model with ten (10) hypotheses was tested using data gathered from 98 respondents through a quasi-experimental survey method. During the survey, each participant was asked to navigate the website where the experimental simulation of a LBA allows the participant to purchase time-and-location sensitive discounted tickets for nearby stores. Structural equations modeling using partial least square validated the instrument and the proposed model. The results showed that six (6) out of ten (10) hypotheses were supported. On the subject of the core PCM, H2 (locatability ${\rightarrow}$ intention to use LBA) and H3 (privacy risks ${\rightarrow}$ intention to use LBA) were supported, while H1 (personalization ${\rightarrow}$ intention to use LBA) was not supported. Further, we could not any interaction effects (personalization X privacy risks, H4 & locatability X privacy risks, H5) on the intention to use LBA. In terms of privacy risks and trust, as mentioned above we found the significant negative influence from privacy risks on intention to use (H3), but positive influence from trust, which supported H6 (trust ${\rightarrow}$ intention to use LBA). The moderating effect of trust on the negative relationship between privacy risks and intention to use LBA was tested and confirmed by supporting H7 (privacy risks X trust ${\rightarrow}$ intention to use LBA). The two hypotheses regarding to the TAM, including H8 (perceived ease of use ${\rightarrow}$ perceived usefulness) and H9 (perceived ease of use ${\rightarrow}$ intention to use LBA) were supported; however, H10 (perceived effectiveness ${\rightarrow}$ intention to use LBA) was not supported. Results of this study offer the following key findings and implications. First the application of PCM was found to be a good analysis framework in the context of LBA adoption. Many of the hypotheses in the model were confirmed and the high value of $R^2$ (i.,e., 51%) indicated a good fit of the model. In particular, locatability and privacy risks are found to be the appropriate PCM-based antecedent variables. Second, the existence of moderating effect of trust on service provider suggests that the same marginal change in the level of privacy risks may differentially influence the intention to use LBA. That is, while the privacy risks increasingly become important social issues and will negatively influence the intention to use LBA, it is critical for LBA providers to build consumer trust and confidence to successfully mitigate this negative impact. Lastly, we could not find sufficient evidence that the intention to use LBA is influenced by perceived usefulness, which has been very well supported in most previous TAM research. This may suggest that more future research should examine the validity of applying TAM and further extend or modify it in the context of LBA or other similar smartphone apps.

  • PDF

Intelligent Optimal Route Planning Based on Context Awareness (상황인식 기반 지능형 최적 경로계획)

  • Lee, Hyun-Jung;Chang, Yong-Sik
    • Asia pacific journal of information systems
    • /
    • v.19 no.2
    • /
    • pp.117-137
    • /
    • 2009
  • Recently, intelligent traffic information systems have enabled people to forecast traffic conditions before hitting the road. These convenient systems operate on the basis of data reflecting current road and traffic conditions as well as distance-based data between locations. Thanks to the rapid development of ubiquitous computing, tremendous context data have become readily available making vehicle route planning easier than ever. Previous research in relation to optimization of vehicle route planning merely focused on finding the optimal distance between locations. Contexts reflecting the road and traffic conditions were then not seriously treated as a way to resolve the optimal routing problems based on distance-based route planning, because this kind of information does not have much significant impact on traffic routing until a a complex traffic situation arises. Further, it was also not easy to take into full account the traffic contexts for resolving optimal routing problems because predicting the dynamic traffic situations was regarded a daunting task. However, with rapid increase in traffic complexity the importance of developing contexts reflecting data related to moving costs has emerged. Hence, this research proposes a framework designed to resolve an optimal route planning problem by taking full account of additional moving cost such as road traffic cost and weather cost, among others. Recent technological development particularly in the ubiquitous computing environment has facilitated the collection of such data. This framework is based on the contexts of time, traffic, and environment, which addresses the following issues. First, we clarify and classify the diverse contexts that affect a vehicle's velocity and estimates the optimization of moving cost based on dynamic programming that accounts for the context cost according to the variance of contexts. Second, the velocity reduction rate is applied to find the optimal route (shortest path) using the context data on the current traffic condition. The velocity reduction rate infers to the degree of possible velocity including moving vehicles' considerable road and traffic contexts, indicating the statistical or experimental data. Knowledge generated in this papercan be referenced by several organizations which deal with road and traffic data. Third, in experimentation, we evaluate the effectiveness of the proposed context-based optimal route (shortest path) between locations by comparing it to the previously used distance-based shortest path. A vehicles' optimal route might change due to its diverse velocity caused by unexpected but potential dynamic situations depending on the road condition. This study includes such context variables as 'road congestion', 'work', 'accident', and 'weather' which can alter the traffic condition. The contexts can affect moving vehicle's velocity on the road. Since these context variables except for 'weather' are related to road conditions, relevant data were provided by the Korea Expressway Corporation. The 'weather'-related data were attained from the Korea Meteorological Administration. The aware contexts are classified contexts causing reduction of vehicles' velocity which determines the velocity reduction rate. To find the optimal route (shortest path), we introduced the velocity reduction rate in the context for calculating a vehicle's velocity reflecting composite contexts when one event synchronizes with another. We then proposed a context-based optimal route (shortest path) algorithm based on the dynamic programming. The algorithm is composed of three steps. In the first initialization step, departure and destination locations are given, and the path step is initialized as 0. In the second step, moving costs including composite contexts into account between locations on path are estimated using the velocity reduction rate by context as increasing path steps. In the third step, the optimal route (shortest path) is retrieved through back-tracking. In the provided research model, we designed a framework to account for context awareness, moving cost estimation (taking both composite and single contexts into account), and optimal route (shortest path) algorithm (based on dynamic programming). Through illustrative experimentation using the Wilcoxon signed rank test, we proved that context-based route planning is much more effective than distance-based route planning., In addition, we found that the optimal solution (shortest paths) through the distance-based route planning might not be optimized in real situation because road condition is very dynamic and unpredictable while affecting most vehicles' moving costs. For further study, while more information is needed for a more accurate estimation of moving vehicles' costs, this study still stands viable in the applications to reduce moving costs by effective route planning. For instance, it could be applied to deliverers' decision making to enhance their decision satisfaction when they meet unpredictable dynamic situations in moving vehicles on the road. Overall, we conclude that taking into account the contexts as a part of costs is a meaningful and sensible approach to in resolving the optimal route problem.

Improvement of existing drainage system for leakage treatment in exiting underground structures (운영중인 지하구조물의 누수처리를 위한 유도배수공법의 개선)

  • Kim, Dong-Gyou;Yim, Min-Jin
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.19 no.4
    • /
    • pp.669-683
    • /
    • 2017
  • The objective of this study is to propose a modification of the previously proposed drainage system for catching the partial leakage of underground concrete structures. Two techniques were proposed for applying the drainage system only to the leaking parts. One was for conveying leaking groundwater to the collection point in the drainage system and the other was for conveying the collected groundwater to the primary drainage system of the underground concrete structure. Four waterproofing materials for conveying leaking groundwater to the catchment point of the drainage system, Durkflex made of porous rubber material, KE-45 silicone adhesive with super strong adhesion, Hotty-gel made of polymeric materials and general silicone adhesive were evaluated for waterproofing performance. Hotty-gel only showed perfect waterproof performance and the other three waterproof materials leaked. The modified drainage system with Hotty-gel and drainage pipe with fixed saddle to convey the leaking groundwater from the catchment point to the primary drainage system were tested on the concrete retaining wall. The waterproof performance and the drainage performance were evaluated by injecting 1,000 ml of water in the back of the modified drainage system at the 7-day, 14-day, 21-day, 28-day, 2-month and 3-month. There was no problem in waterproof performance and drainage performance of the modified drainage system during 3 months. In order to evaluate the construction period and construction cost of the modified drainage system, it was compared with the existing leaching repair method in surface cleaning stage, leakage treatment stage, and protective barrier stage. Total construction period and construction cost were compared in considering the contents of work, repair material, construction equipment, working time, and total number of workers. As a result of comparing and analyzing in each construction stage, it was concluded that the modified drainage system could save construction period and construction cost compared to the existing leaching repair method.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

An Empirical Study on the Importance of Psychological Contract Commitment in Information Systems Outsourcing (정보시스템 아웃소싱에서 심리적 계약 커미트먼트의 중요성에 대한 연구)

  • Kim, Hyung-Jin;Lee, Sang-Hoon;Lee, Ho-Geun
    • Asia pacific journal of information systems
    • /
    • v.17 no.2
    • /
    • pp.49-81
    • /
    • 2007
  • Research in the IS (Information Systems) outsourcing has focused on the importance of legal contracts and partnerships between vendors and clients. Without detailed legal contracts, there is no guarantee that an outsourcing vendor would not indulge in self-serving behavior. In addition, partnerships can supplement legal contracts in managing the relationship between clients and vendors legal contracts by itself cannot deal with all the complexity and ambiguity involved with IS outsourcing relationships. In this paper, we introduce a psychological contract (between client and vendor) as an important variable for IS outsourcing success. A psychological contract refers to individual's mental beliefs about his or her mutual obligations in a contractual relationship (Rousseau, 1995). A psychological contract emerges when one party believes that a promise of future returns has been made, a contribution has been given, and thus, an obligation has been created to provide future benefits (Rousseau, 1989). An employmentpsychological contract, which is a widespread concept in psychology, refers to employer and employee expectations of the employment relationship, i.e. mutual obligations, values, expectations and aspirations that operate over and above the formal contract of employment (Smithson and Lewis, 2003). Similar to the psychological contract between an employer and employee, IS outsourcing involves a contract and a set of mutual obligations between client and vendor (Ho et al., 2003). Given the lack of prior research on psychological contracts in the IS outsourcing context, we extend such studies and give insights through investigating the role of psychological contracts between client and vendor. Psychological contract theory offers highly relevant and sound theoretical lens for studying IS outsourcing management because of its six distinctive principles: (1) it focuses on mutual (rather than one-sided) obligations between contractual parties, (2) it's more comprehensive than the concept of legal contract, (3) it's an individual-level construct, (4) it changes over time, (5) it affects organizational behaviors, and (6) it's susceptible to organizational factors (Koh et al., 2004; Rousseau, 1996; Coyle-Shapiro, 2000). The aim of this paper is to put the concept, psychological contract commitment (PCC), under the spotlight, by finding out its mediating effects between legal contracts/partnerships and IS outsourcing success. Our interest is in the psychological contract commitment (PCC) or commitment to psychological contracts, which is the extent to which a partner consistently and deeply concerns with what the counter-party believes as obligations during the IS project. The basic premise for the hypothesized relationship between PCC and success is that for outsourcing success, client and vendor should continually commit to mutual obligations in which both parties believe, rather than to only explicit obligations. The psychological contract commitment playsa pivotal role in evaluating a counter-party because it reflects what one party really expects from the other. If one party consistently shows high commitment to psychological contracts, the other party would evaluate it positively. This will increase positive reciprocation efforts of the other party, thus leading to successful outsourcing outcomes (McNeeley and Meglino, 1994). We have used matched sample data for this research. We have collected three responses from each set of a client and a vendor firm: a project manager of the client firm, a project member from the vendor firm with whom the project manager cooperated, and an end-user of the client company who actually used the outsourced information systems. Special caution was given to the data collection process to avoid any bias in responses. We first sent three types of questionnaires (A, Band C) to each project manager of the client firm, asking him/her to answer the first type of questionnaires (A).

Growth of the Korean Public Library from the Point View of Acculturation (문화변용이론의 시각에서 본 우리나라 공공도서관의 발전과정)

  • Chun Myung Sook
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.10
    • /
    • pp.39-70
    • /
    • 1983
  • The concept of the public library defined by the Korean Library Association does not describe the current state of the Korean public library but describes the public libraries in the western society. Korean public library was formed after the western public library but it was modified and reconciled with the tradition of Korea. The difference between the concepts occured in the acculturation process of the Korean public library. According to the International Encyclopeadia of the Social Sciences, acculturation comprehends those phenomena which result when groups of individuals having different cultures come into continuous firsthand contact, with subsequent changes in the original cultural patterns of either of both groups. Korea opened its door to western world in 1876, and it began to contact with the western world. As the consequence, the concept of the public library of the West diffused to Lee Dynasty which were characterized by the confucianism and the extended family system. These two characteristics were against the public library concept and it could not function as it was and it had to be modified to fit to Korean society. The American public library was formed by the diffusion of English public library. The concept fitted in the colonial American society which was characterized by the Christianity and nuclear family system. Religion and family life were closely knitted together and they contributed much to the formation of the American public library. Also the society needed various information to form their new nation. The need of the public library grew and the public library repidly developed as the American society was urbanized and industrialized. The changes of Korean public library has passed the following process of acculturation. 1. The Korean culture contacted with Western world. 2. The public library concept diffused to Korea, but the people were illiterate and the need of the public library was for the preservation of the old books. The collection was not for people. 3. The function of the public library in Korea was altered slightly as several intellectuals who formed the first modern public library tried to literate Koreans as a means of liberation :from Japan through the library service. 4. The traditional libraries such as sodandg and hyangyo disorganized and finally disappeared as the traditional elements of the culture disappeared and the new cultural elements prevailed in Korea. 5. When the traditional elements of culture were disorganized, a reinterpretation of the diffused culture appeared. With the appearance of the vouth group which was not existed in the traditional society, cultural facilities for them were needed. They began to use public library as their reading rooms. This pattern has been institutionalized ever since in Korean public library. 6. When the new element of the culture spread, the traditional cultural elements react against this element. As the new public libraries sprung out, there were movements to restore the old Korean tradition of the family libraries and Hyangyo to counteract to the new libraries. This movements were not successful and they all disappeared as they could not keep up the rapid social change occurred in the Korean society. 7. In the process of the cultral change, cultural lag occurred between the public library and the users who could not adopt to the new library. This has been continued to the present time. 8. This diffused concept of the public library was modified and became native to Korean society. However, the acculturation of the public library concept has not changed the traditional ideas of Korean people and their behavior. The Korean society recently has been changing rapidly and the function of the Korean public library is improving accordingly; 1. The extended Korean family system is disorganizing. As the consequence, the public library could substitute the family system offering information and recreation service, etc. 2. The growth of educated population is requiring a variety of library materials. An individual library can not meet the needs of them and cooperative library service will be needed to share resources. The public library will become the center of the cooperative service. 3. The Koreans are watching TV more hours than they read printed materials. For them, the public library needs to collect audiovisual materials. Especially the teaching materials should be all audiovisualized for the effective teaching. 4. Technology is developing rapidly in Korea, especially computer technology is applied in many parts of the society. This will also influence library service. The public library will be developing as the centralized library computer system. When the Korean public library functions as the extended family system and the center of the cooperative library system, the Korean public library will be functioning as the public library defined by the Korean Library Association.

  • PDF