• Title/Summary/Keyword: highlight

Search Result 1,934, Processing Time 0.03 seconds

Changes in Phytosterol Content in Cobs and Kernels During Physiological Maturity of Corn Ears (옥수수 이삭 등숙 기간 동안 속대와 종실의 Phytosterol 함량 변화)

  • Jun Young Ha;Young Sam Go;Jae Han Son;Mi-Hyang Kim;Kyeong Min Kang;Tae Wook Jung;Beom Young Son;Hwan Hee Bae
    • KOREAN JOURNAL OF CROP SCIENCE
    • /
    • v.68 no.4
    • /
    • pp.392-401
    • /
    • 2023
  • Corn (Zea mays L.) is one of the world's most important crops, along with wheat and rice, with a global corn production expected to reach 1,154.5 million tons in 2023. Considering this grain production, The generation of corn cob is expected to reach approximately 207.8 million tons in 2023. However, as an agricultural by-product, corn cobs are often considered waste and remain underutilized. Phytosterols, which are abundant in vegetable oils such as corn oil, provide a number of health benefits, including liver health, cholesterol reduction, and protection against chronic diseases such as diabetes. In this study, we investigated the potential of Kwangpyeongok ears, which are commonly used as grain and silage corn in Korea. We also examined the variation in phytosterol content with the maturity of corn ears to identify the optimal time for utilization. At the beginning of physiological maturity, corn cobs had 113.3 mg/100g DW of total phytosterols, which was highest phytosterol abundance during the growth stage. Corn kernels also had the highest phytosterol content at the beginning of physiological maturity. While previous studies on corn bioactive compounds have mainly focused on the kernels, the results of this study highlight that cobs are an excellent source of these compounds. Furthermore, phytosterol levels were influenced by genetic factors and developmental stages, suggesting the to increase the use of cobs as a source of bioactive compounds.

Multi-classification of Osteoporosis Grading Stages Using Abdominal Computed Tomography with Clinical Variables : Application of Deep Learning with a Convolutional Neural Network (멀티 모달리티 데이터 활용을 통한 골다공증 단계 다중 분류 시스템 개발: 합성곱 신경망 기반의 딥러닝 적용)

  • Tae Jun Ha;Hee Sang Kim;Seong Uk Kang;DooHee Lee;Woo Jin Kim;Ki Won Moon;Hyun-Soo Choi;Jeong Hyun Kim;Yoon Kim;So Hyeon Bak;Sang Won Park
    • Journal of the Korean Society of Radiology
    • /
    • v.18 no.3
    • /
    • pp.187-201
    • /
    • 2024
  • Osteoporosis is a major health issue globally, often remaining undetected until a fracture occurs. To facilitate early detection, deep learning (DL) models were developed to classify osteoporosis using abdominal computed tomography (CT) scans. This study was conducted using retrospectively collected data from 3,012 contrast-enhanced abdominal CT scans. The DL models developed in this study were constructed for using image data, demographic/clinical information, and multi-modality data, respectively. Patients were categorized into the normal, osteopenia, and osteoporosis groups based on their T-scores, obtained from dual-energy X-ray absorptiometry, into normal, osteopenia, and osteoporosis groups. The models showed high accuracy and effectiveness, with the combined data model performing the best, achieving an area under the receiver operating characteristic curve of 0.94 and an accuracy of 0.80. The image-based model also performed well, while the demographic data model had lower accuracy and effectiveness. In addition, the DL model was interpreted by gradient-weighted class activation mapping (Grad-CAM) to highlight clinically relevant features in the images, revealing the femoral neck as a common site for fractures. The study shows that DL can accurately identify osteoporosis stages from clinical data, indicating the potential of abdominal CT scans in early osteoporosis detection and reducing fracture risks with prompt treatment.

Perceptions of Married Women on Childbirth and Sex Preference and Related Factors in Gyeongju, Korea (도농복합지역 기혼여성들의 출산과 성 선호에 대한 인식 및 관련요인)

  • Youm, Seog-Heon;Kang, Pock-Soo;Kim, Chang-Yoon;Lee, Kyeong-Soo;Hwang, Tae-Yoon;Hwang, In-Sob
    • Journal of agricultural medicine and community health
    • /
    • v.35 no.3
    • /
    • pp.260-273
    • /
    • 2010
  • Objectives: The purpose of this study was to investigate the perceptions of married Korean women regarding marriage and childbirth, and their awareness of childbirth-related issues such as low birth rates, sex preferences and sex imbalances in Korea. Methods: A total of 453 married women aged 20 or older were randomly selected from four urban districts and five rural districts out of 25 districts in Gyeongju, a consolidated city located in Gyeongsangbuk-do Province, South Korea. The survey was conducted from December 2005 to February 2006. A total of 392 out of 453 questionnaires(86.5% response rate) were collected, and 44 incomplete questionnaires were excluded, leaving 348 completed questionnaires to be used for data analysis. Age was divided into three groups as below 49, 50-69, 70 or older. Results: Women's perceptions of marriage were associated with age(p<0.01). Perceptions about childbirth were also significantly related to age(p<0.01), type of residential area (p<0.01) and education level(p<0.05). Sex preferences were significantly related to age(p<0.05) and occupation(p<0.01). Of the respondents aged 49 or younger, 34.8% indicated that the ideal number of children is two, while 25.5% of respondents aged 50 to 69 and 15.3% of respondents aged 70 and 33.7% of respondents aged 70 or older considered four children to be the ideal number. Perceptions of sex imbalance were significantly related to socioeconomic status(p<0.01) and occupation(p<0.01). The largest number of respondents cited "economic burden" as the main reason for low birth rates. Multiple logistic regressions were performed for all three age groups using male sex preference as the dependent variable under the assumption that respondents can have only a single child. Socioeconomic status (p<0.01) and residential area (p<0.05) were significant variables for those aged 49 or below. Education level(p<0.05) and residential area (p<0.01) were statistically significant variables on preferring son in case of having only one child for respondents aged 50 to 69. We did not detect any significant independent variables in respondents who were 70 or older. Conclusions: Our results highlight the necessity of developing policies and public education programs to explain the consequences of low birth rates and sex imbalances in Korea. As increasing numbers of women work outside the home, it is important for the government and employers to provide social and working environments where women do not consider marriage and childbirth to be obstacles to social and business activities.

The Changing Aspects of North Korea's Terror Crimes and Countermeasures : Focused on Power Conflict of High Ranking Officials after Kim Jong-IL Era (북한 테러범죄의 변화양상에 따른 대응방안 -김정일 정권 이후 고위층 권력 갈등을 중심으로)

  • Byoun, Chan-Ho;Kim, Eun-Jung
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.185-215
    • /
    • 2014
  • Since North Korea has used terror crime as a means of unification under communism against South Korea, South Korea has been much damaged until now. And the occurrence possibility of terror crime by North Korean authority is now higher than any other time. The North Korean terror crimes of Kim Il Sung era had been committed by the dictator's instruction with the object of securing governing fund. However, looking at the terror crimes committed for decades during Kim Jung Il authority, it is revealed that these terror crimes are expressed as a criminal behavior because of the conflict to accomplish the power and economic advantage non powerful groups target. This study focused on the power conflict in various causes of terror crimes by applying George B. Vold(1958)'s theory which explained power conflict between groups became a factor of crime, and found the aspect by ages of terror crime behavior by North Korean authority and responding plan to future North Korean terror crime. North Korean authority high-ranking officials were the Labor Party focusing on Juche Idea for decades in Kim Il Sung time. Afterwards, high-ranking officials were formed focusing on military authorities following Military First Policy at the beginning of Kim Jung Il authority, rapid power change has been done for recent 10 years. To arrange the aspect by times of terror crime following this power change, alienated party executives following the support of positive military first authority by Kim Jung Il after 1995 could not object to forcible terror crime behavior of military authority, and 1st, 2nd Yeongpyeong maritime war which happened this time was propelled by military first authority to show the power of military authority. After 2006, conservative party union enforced censorship and inspection on the trade business and foreign currency-earning of military authority while executing drastic purge. The shooting on Keumkangsan tourists that happened this time was a forcible terror crime by military authority following the pressure of conservative party. After October, 2008, first military reign union executed the launch of Gwanmyungsung No.2 long-range missile, second nuclear test, Daechung marine war, and Cheonanham attacking terror in order to highlight the importance and role of military authority. After September 2010, new reign union went through severe competition between new military authority and new mainstream and new military authority at this time executed highly professionalized terror crime such as cyber/electronic terror unlike past military authority. After July 2012, ICBM test launch, third nuclear test, cyber terror on Cheongwadae homepage of new mainstream association was the intention of Km Jung Eun to display his ability and check and adjust the power of party/military/cabinet/ public security organ, and he can attempt the unexpected terror crime in the future. North Korean terror crime has continued since 1980s when Kim Jung Il's power succession was carried out, and the power aspect by times has rapidly changed since 1994 when Kim Il Sung died and the terror crime became intense following the power combat between high-ranking officials and power conflict for right robbery. Now South Korea should install the specialized department which synthesizes and analyzes the information on North Korean high-ranking officials and reinforce the comprehensive information-collecting system through the protection and management of North Korean defectors and secret agents in order to determine the cause of North Korean terror crime and respond to it. And South Korea should participate positively in the international collaboration related to North Korean terror and make direct efforts to attract the international agreement to build the international cooperation for the response to North Korean terror crime. Also, we should try more to arrange the realistic countermeasure against North Korean cyber/electronic terror which was more diversified with the expertise terror escaping from existing forcible terror through enactment/revision of law related to cyber terror crime, organizing relevant institute and budget, training professional manpower, and technical development.

  • PDF

Research Trend Analysis Using Bibliographic Information and Citations of Cloud Computing Articles: Application of Social Network Analysis (클라우드 컴퓨팅 관련 논문의 서지정보 및 인용정보를 활용한 연구 동향 분석: 사회 네트워크 분석의 활용)

  • Kim, Dongsung;Kim, Jongwoo
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.1
    • /
    • pp.195-211
    • /
    • 2014
  • Cloud computing services provide IT resources as services on demand. This is considered a key concept, which will lead a shift from an ownership-based paradigm to a new pay-for-use paradigm, which can reduce the fixed cost for IT resources, and improve flexibility and scalability. As IT services, cloud services have evolved from early similar computing concepts such as network computing, utility computing, server-based computing, and grid computing. So research into cloud computing is highly related to and combined with various relevant computing research areas. To seek promising research issues and topics in cloud computing, it is necessary to understand the research trends in cloud computing more comprehensively. In this study, we collect bibliographic information and citation information for cloud computing related research papers published in major international journals from 1994 to 2012, and analyzes macroscopic trends and network changes to citation relationships among papers and the co-occurrence relationships of key words by utilizing social network analysis measures. Through the analysis, we can identify the relationships and connections among research topics in cloud computing related areas, and highlight new potential research topics. In addition, we visualize dynamic changes of research topics relating to cloud computing using a proposed cloud computing "research trend map." A research trend map visualizes positions of research topics in two-dimensional space. Frequencies of key words (X-axis) and the rates of increase in the degree centrality of key words (Y-axis) are used as the two dimensions of the research trend map. Based on the values of the two dimensions, the two dimensional space of a research map is divided into four areas: maturation, growth, promising, and decline. An area with high keyword frequency, but low rates of increase of degree centrality is defined as a mature technology area; the area where both keyword frequency and the increase rate of degree centrality are high is defined as a growth technology area; the area where the keyword frequency is low, but the rate of increase in the degree centrality is high is defined as a promising technology area; and the area where both keyword frequency and the rate of degree centrality are low is defined as a declining technology area. Based on this method, cloud computing research trend maps make it possible to easily grasp the main research trends in cloud computing, and to explain the evolution of research topics. According to the results of an analysis of citation relationships, research papers on security, distributed processing, and optical networking for cloud computing are on the top based on the page-rank measure. From the analysis of key words in research papers, cloud computing and grid computing showed high centrality in 2009, and key words dealing with main elemental technologies such as data outsourcing, error detection methods, and infrastructure construction showed high centrality in 2010~2011. In 2012, security, virtualization, and resource management showed high centrality. Moreover, it was found that the interest in the technical issues of cloud computing increases gradually. From annual cloud computing research trend maps, it was verified that security is located in the promising area, virtualization has moved from the promising area to the growth area, and grid computing and distributed system has moved to the declining area. The study results indicate that distributed systems and grid computing received a lot of attention as similar computing paradigms in the early stage of cloud computing research. The early stage of cloud computing was a period focused on understanding and investigating cloud computing as an emergent technology, linking to relevant established computing concepts. After the early stage, security and virtualization technologies became main issues in cloud computing, which is reflected in the movement of security and virtualization technologies from the promising area to the growth area in the cloud computing research trend maps. Moreover, this study revealed that current research in cloud computing has rapidly transferred from a focus on technical issues to for a focus on application issues, such as SLAs (Service Level Agreements).

Understanding User Motivations and Behavioral Process in Creating Video UGC: Focus on Theory of Implementation Intentions (Video UGC 제작 동기와 행위 과정에 관한 이해: 구현의도이론 (Theory of Implementation Intentions)의 적용을 중심으로)

  • Kim, Hyung-Jin;Song, Se-Min;Lee, Ho-Geun
    • Asia pacific journal of information systems
    • /
    • v.19 no.4
    • /
    • pp.125-148
    • /
    • 2009
  • UGC(User Generated Contents) is emerging as the center of e-business in the web 2.0 era. The trend reflects changing roles of users in production and consumption of contents on websites and helps us to understand new strategies of websites such as web portals and social network websites. Nowadays, we consume contents created by other non-professional users for both utilitarian (e.g., knowledge) and hedonic values (e.g., fun). Also, contents produced by ourselves (e.g., photo, video) are posted on websites so that our friends, family, and even the public can consume those contents. This means that non-professionals, who used to be passive audience in the past, are now creating contents and share their UGCs with others in the Web. Accessible media, tools, and applications have also reduced difficulty and complexity in the process of creating contents. Realizing that users create plenty of materials which are very interesting to other people, media companies (i.e., web portals and social networking websites) are adjusting their strategies and business models accordingly. Increased demand of UGC may lead to website visits which are the source of benefits from advertising. Therefore, they put more efforts into making their websites open platforms where UGCs can be created and shared among users without technical and methodological difficulties. Many websites have increasingly adopted new technologies such as RSS and openAPI. Some have even changed the structure of web pages so that UGC can be seen several times to more visitors. This mainstream of UGCs on websites indicates that acquiring more UGCs and supporting participating users have become important things to media companies. Although those companies need to understand why general users have shown increasing interest in creating and posting contents and what is important to them in the process of productions, few research results exist in this area to address these issues. Also, behavioral process in creating video UGCs has not been explored enough for the public to fully understand it. With a solid theoretical background (i.e., theory of implementation intentions), parts of our proposed research model mirror the process of user behaviors in creating video contents, which consist of intention to upload, intention to edit, edit, and upload. In addition, in order to explain how those behavioral intentions are developed, we investigated influences of antecedents from three motivational perspectives (i.e., intrinsic, editing software-oriented, and website's network effect-oriented). First, from the intrinsic motivation perspective, we studied the roles of self-expression, enjoyment, and social attention in forming intention to edit with preferred editing software or in forming intention to upload video contents to preferred websites. Second, we explored the roles of editing software for non-professionals to edit video contents, in terms of how it makes production process easier and how it is useful in the process. Finally, from the website characteristic-oriented perspective, we investigated the role of a website's network externality as an antecedent of users' intention to upload to preferred websites. The rationale is that posting UGCs on websites are basically social-oriented behaviors; thus, users prefer a website with the high level of network externality for contents uploading. This study adopted a longitudinal research design; we emailed recipients twice with different questionnaires. Guided by invitation email including a link to web survey page, respondents answered most of questions except edit and upload at the first survey. They were asked to provide information about UGC editing software they mainly used and preferred website to upload edited contents, and then asked to answer related questions. For example, before answering questions regarding network externality, they individually had to declare the name of the website to which they would be willing to upload. At the end of the first survey, we asked if they agreed to participate in the corresponding survey in a month. During twenty days, 333 complete responses were gathered in the first survey. One month later, we emailed those recipients to ask for participation in the second survey. 185 of the 333 recipients (about 56 percentages) answered in the second survey. Personalized questionnaires were provided for them to remind the names of editing software and website that they reported in the first survey. They answered the degree of editing with the software and the degree of uploading video contents to the website for the past one month. To all recipients of the two surveys, exchange tickets for books (about 5,000~10,000 Korean Won) were provided according to the frequency of participations. PLS analysis shows that user behaviors in creating video contents are well explained by the theory of implementation intentions. In fact, intention to upload significantly influences intention to edit in the process of accomplishing the goal behavior, upload. These relationships show the behavioral process that has been unclear in users' creating video contents for uploading and also highlight important roles of editing in the process. Regarding the intrinsic motivations, the results illustrated that users are likely to edit their own video contents in order to express their own intrinsic traits such as thoughts and feelings. Also, their intention to upload contents in preferred website is formed because they want to attract much attention from others through contents reflecting themselves. This result well corresponds to the roles of the website characteristic, namely, network externality. Based on the PLS results, the network effect of a website has significant influence on users' intention to upload to the preferred website. This indicates that users with social attention motivations are likely to upload their video UGCs to a website whose network size is big enough to realize their motivations easily. Finally, regarding editing software characteristic-oriented motivations, making exclusively-provided editing software more user-friendly (i.e., easy of use, usefulness) plays an important role in leading to users' intention to edit. Our research contributes to both academic scholars and professionals. For researchers, our results show that the theory of implementation intentions is well applied to the video UGC context and very useful to explain the relationship between implementation intentions and goal behaviors. With the theory, this study theoretically and empirically confirmed that editing is a different and important behavior from uploading behavior, and we tested the behavioral process of ordinary users in creating video UGCs, focusing on significant motivational factors in each step. In addition, parts of our research model are also rooted in the solid theoretical background such as the technology acceptance model and the theory of network externality to explain the effects of UGC-related motivations. For practitioners, our results suggest that media companies need to restructure their websites so that users' needs for social interaction through UGC (e.g., self-expression, social attention) are well met. Also, we emphasize strategic importance of the network size of websites in leading non-professionals to upload video contents to the websites. Those websites need to find a way to utilize the network effects for acquiring more UGCs. Finally, we suggest that some ways to improve editing software be considered as a way to increase edit behavior which is a very important process leading to UGC uploading.

NO2 and SO2 Reduction Capacities and Their Relation to Leaf Physiological and Morphological Traits in Ten Landscaping Tree Species (조경수 10개 수종에 있어 NO2, SO2 저감 능력과 잎의 생리적, 형태적 특성과의 관계)

  • Kim, Kunhyo;Jeon, Jihyeon;Yun, Chan Ju;Kim, Tae Kyung;Hong, Jeonghyun;Jeon, Gi-Seong;Kim, Hyun Seok
    • Journal of Korean Society of Forest Science
    • /
    • v.110 no.3
    • /
    • pp.393-405
    • /
    • 2021
  • With increasing anthropogenic emission sources, air pollutants are emerging as a severe environmental problem worldwide. Accordingly, the importance of landscape trees is emerging as a potential solution to reduce air pollutants, especially in urban areas. This study quantified and compared NO2 and SO2 reduction abilities of ten major landscape tree species and analyzed the relationship between reduction ability and physiological and morphological characteristics. The results showed NO2 reduction per leaf area was greatest in Cornus officinalis (19.81 ± 3.84 ng cm-2 hr-1) and lowest in Pinus strobus (1.51 ± 0.81 ng cm-2 hr-1). In addition, NO2 reduction by broadleaf species (14.72 ± 1.32 ng cm-2 hr-1) was 3.1-times greater than needleleaf species (4.68 ± 1.26 ng cm-2hr-1; P < 0.001). Further, SO2 reduction per leaf area was greatest in Zelkova serrata (70.04 ± 7.74 ng cm-2 hr-1) and lowest in Pinus strobus (4.79 ± 1.02 ng cm-2 hr-1). Similarly, SO2 reduction by broadleaf species (44.21 ± 5.01 ng cm-2 hr-1) was 3.9-times greater than needleleaf species (11.47 ± 3.03 ng cm-2 hr-1; P < 0.001). Correlation analysis revealed differences in NO2 reduction was best explained by chlorophyll b content (R2 = 0.671, P = 0.003) and SO2 reduction was best described by SLA and length of margin per leaf area (R2 = 0.456, P = 0.032 and R2 = 0.437, P = 0.001, R2 = 0.872, P < 0.001, respectively). In summary, the ability of trees to reduce air pollutants was related to photosynthesis, evapotranspiration, stomatal conductance, and leaf thickness. These findings highlight effective reduction of air pollutants by landscaping trees requires comprehensively analyzing physiological and morphological species characteristics.

Eurasian Naval Power on Display: Sino-Russian Naval Exercises under Presidents Xi and Putin (유라시아 지역의 해군 전력 과시: 시진핑 주석과 푸틴 대통령 체제 하에 펼쳐지는 중러 해상합동훈련)

  • Richard Weitz
    • Maritime Security
    • /
    • v.5 no.1
    • /
    • pp.1-53
    • /
    • 2022
  • One manifestation of the contemporary era of renewed great power competition has been the deepening relationship between China and Russia. Their strengthening military ties, notwithstanding their lack of a formal defense alliance, have been especially striking. Since China and Russia deploy two of the world's most powerful navies, their growing maritime cooperation has been one of the most significant international security developments of recent years. The Sino-Russian naval exercises, involving varying platforms and locations, have built on years of high-level personnel exchanges, large Russian weapons sales to China, the Sino-Russia Treaty of Friendship, and other forms of cooperation. Though the joint Sino-Russian naval drills began soon after Beijing and Moscow ended their Cold War confrontation, these exercises have become much more important during the last decade, essentially becoming a core pillar of their expanding defense partnership. China and Russia now conduct more naval exercises in more places and with more types of weapons systems than ever before. In the future, Chinese and Russian maritime drills will likely encompass new locations, capabilities, and partners-including possibly the Arctic, hypersonic delivery systems, and novel African, Asian, and Middle East partners-as well as continue such recent innovations as conducting joint naval patrols and combined arms maritime drills. China and Russia pursue several objectives through their bilateral naval cooperation. The Treaty of Good-Neighborliness and Friendly Cooperation Between the People's Republic of China and the Russian Federation lacks a mutual defense clause, but does provide for consultations about common threats. The naval exercises, which rehearse non-traditional along with traditional missions (e.g., counter-piracy and humanitarian relief as well as with high-end warfighting), provide a means to enhance their response to such mutual challenges through coordinated military activities. Though the exercises may not realize substantial interoperability gains regarding combat capabilities, the drills do highlight to foreign audiences the Sino-Russian capacity to project coordinated naval power globally. This messaging is important given the reliance of China and Russia on the world's oceans for trade and the two countries' maritime territorial disputes with other countries. The exercises can also improve their national military capabilities as well as help them learn more about the tactics, techniques, and procedures of each other. The rising Chinese Navy especially benefits from working with the Russian armed forces, which have more experience conducting maritime missions, particularly in combat operations involving multiple combat arms, than the People's Liberation Army (PLA). On the negative side, these exercises, by enhancing their combat capabilities, may make Chinese and Russian policymakers more willing to employ military force or run escalatory risks in confrontations with other states. All these impacts are amplified in Northeast Asia, where the Chinese and Russian navies conduct most of their joint exercises. Northeast Asia has become an area of intensifying maritime confrontations involving China and Russia against the United States and Japan, with South Korea situated uneasily between them. The growing ties between the Chinese and Russian navies have complicated South Korean-U.S. military planning, diverted resources from concentrating against North Korea, and worsened the regional security environment. Naval planners in the United States, South Korea, and Japan will increasingly need to consider scenarios involving both the Chinese and Russian navies. For example, South Korean and U.S. policymakers need to prepare for situations in which coordinated Chinese and Russian military aggression overtaxes the Pentagon, obligating the South Korean Navy to rapidly backfill for any U.S.-allied security gaps that arise on the Korean Peninsula. Potentially reinforcing Chinese and Russian naval support to North Korea in a maritime confrontation with South Korea and its allies would present another serious challenge. Building on the commitment of Japan and South Korea to strengthen security ties, future exercises involving Japan, South Korea, and the United States should expand to consider these potential contingencies.

  • PDF

Mobility Change around Neighborhood Parks and Green Spaces before and after the Outbreak of the COVID-19 Pandemic (COVID-19 발생 전·후 생활권 공원녹지 모빌리티 변화 분석)

  • Choi, Ga yoon;Kim, Yong gook;Kwon, Oh kyu;Yoo, Ye seul
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.51 no.4
    • /
    • pp.101-118
    • /
    • 2023
  • During the COVID-19 pandemic, the utilization rate of neighborhood parks and green spaces increased significantly, and the outbreak served as an opportunity to highlight the values and functions of neighborhood parks and green spaces for urban residents. This study aims to empirically analyze how citizens' movement and the use of neighborhood parks and green spaces changed before and after COVID-19 and examine the social and spatial characteristics that affected these changes. As a research method, first, people's mobility around neighborhood parks and green spaces before and after the COVID-19 pandemic were compared using signal data from telecommunication carriers. Through the analysis of changes in residence time and movement volume, the movement characteristics of citizens after COVID-19 and changes in walking-based park visits were examined. Second, the factors affecting the mobility change in neighborhood parks and green spaces were analyzed. The social and spatial characteristics that affect citizens' visits to neighborhood parks and green spaces before and after COVID-19 were examined through correlation and multiple regression analysis. Subsequently, through cluster analysis, the types of living areas for the post-COVID era were classified from the perspective of the supply and management of neighborhood parks and green spaces services, and directions for improving neighborhood parks and green spaces by type were presented. Major research findings are as follows: First, since the outbreak of COVID-19, activities within 500m of the residence have increased. The amount of stay and walking movement increased in both 2020 and 2021, which means that the need to review the quantitative standards and attractions of neighborhood parks and green spaces has increased considering the changed scope of the walking and living area. Second, the overall number of visits to neighborhood parks and green spaces by walking has increased since the outbreak of COVID-19. The number of visits to neighborhood parks and green spaces centered on the house and the workplace increased significantly. The park green policy in the post-COVID era should be promoted by discovering underprivileged areas, focusing on areas where residential, commercial, and business facilities are concentrated, and improving neighborhood parks and green services in quantitative and qualitative terms. Third, it was found that the higher the level of park green service, the higher the amount of walking movement. It is necessary to use indicators that contribute to improving citizens' actual park green services, such as walking accessibility, rather than looking at the criteria for securing green areas. Fourth, as a result of cluster analysis, five types of neighborhood parks and green spaces were derived in response to the post-COVID era. This suggests that it is necessary to consider the socioeconomic status and characteristics of living areas and the level of park green services required in future park green policies. This study has academic and policy significance in that it has laid the basis for establishing neighborhood parks and green spaces policy in response to the post-COVID era by using various analysis methodologies such as carrier signal data analysis, GIS analysis, and statistical analysis.

An Exploratory Study on the Effects of Relational Benefits and Brand Identity : mediating effect of brand identity (관계혜택과 브랜드 동일시의 역할에 관한 탐색적 연구: 브랜드 동일시의 매개역할을 중심으로)

  • Bang, Jounghae;Jung, Jiyeon;Lee, Eunhyung;Kang, Hyunmo
    • Asia Marketing Journal
    • /
    • v.12 no.2
    • /
    • pp.155-175
    • /
    • 2010
  • Most of the service industries including finance and telecommunications have become matured and saturated. The competitions have become severe while the differences among brands become smaller. Therefore maintaining good relationships with customers has been critical for the service providers. In case of credit card and debit card, the similar patterns are shown. It is important for them to maintain good relationships with customers, and therefore, they have used marketing program which provides customized services to customers and utilizes the membership programs. Not only do they build and maintain good relationships, but also highlight their brands from the emotional aspects. For example, KB Card or Hyundai Card uses well-known designers' works for their credit card design. As well, they differentiate the designs of credit cards to stress on their brand personalities. BC Card introduced the credit card with perfume that a customer would like. Even though the credit card is small and not shown to public easily, it becomes more important for those companies to touch the customers' feelings with the brand personalities and their images. This is partly because of changes in consumers' lifestyles. Y-generations becomes highly likely to express themselves in many different ways and more emotional than X-generations. For the Y-generations, therefore, even credit cards in the wallet should be personalized and well-designed. In line with it, credit cards with good design can be seen as an example of brand identity, where different design for each customer can be used to recognize the membership groups that customers want to belong. On the other hand, these credit card companies offer the special treatment benefits for those customers who are heavy users for the cards. For example, those customers who love sports will receive some special discounts when they use their credit cards for sports related products. Therefore this study attempted to explore the relationships between relational benefits, brand identification and loyalty. It has been well known that relational benefits and brand identification lead to loyalty independently from many other studies, but there has been few study to review all the three variables all together in a research model. Furthermore, as reviewed above, in the card industry, many companies attempt to associate the brand image with their products to fit their customers' lifestyles while relational benefits are still playing an important role for their business. Therefore in our research model, relational benefits, brand identification, and loyalty are all included. We focus on the mediating effect of brand identification. From the relational benefits perspective, only special treatment benefit and confidence benefit are included. Social benefit is not applicable for this credit card industry because not many cases of face-to-face interaction can be found. From the brand identification perspective, personal brand identity and social brand identity are reviewed and included in the model. Overall, the research model emphasizes that the relationships between relational benefits and loyalty will be mediated by the effect of brand identification. The effects of relational benefits which are confidence benefit and special treatment benefits on loyalty will be realized when they fit to the personal brand identity and social brand identity. In the research model, therefore, the relationships between confidence benefit and social brand identity, and between confidence benefit and personal identity are hypothesized while the effects of special treatment benefit on social brand identity and personal brand identity are hypothesized. Loyalty, then, is hypothesized to have positive relationships with personal brand identity and social brand identity. In addition, confidence benefit among the relational benefits is expected to have a direct, positive relationship with loyalty because confidence benefit has been recognized as a critical factor for good relationships and satisfaction. Data were collected from college students who have been using either credit cards or debit cards. College students were regarded good subjects because they are in Y-generation cohorts and have tendency to express themselves more. Total sample size was two hundred three at the beginning, but after deleting those data with many missing values, one hundred ninety-seven data points were remained and used for the model testing. Measurement items were brought from the previous literatures and modified for this research. To test the reliability, using SPSS 14, chronbach's α was examined and all the values were from .874 to .928 exceeding over .7. Using AMOS 7.0, confirmatory factor analysis was conducted to investigate the measurement model. The measurement model was found good fit with χ2(67)=188.388 (p= .000), GFI=.886, AGFI=.821, CFI=.941, RMSEA=.096. Using AMOS 7.0, structural equation modeling has been used to analyze the research model. Overall, the research model fit were χ2(68)=188.670 (p= .000), GFI=.886, AGFI=,824 CFI=.942, RMSEA=.095 indicating good fit. In details, all the paths hypothesized in the research model were found significant except for the path from social brand identity to loyalty. Personal brand identity leads to loyalty while both confidence benefit and special treatment benefit have a positive relationships with personal and social identities. As well, confidence benefit has a direct positive effect on loyalty. The results indicates the followings. First, personal brand identity plays an important role for credit/debit card usage. Therefore even for the products which are not shown to public easy, design and emotional aspect can be important to fit the customers' lifestyles. Second, confidence benefit and special treatment benefit have a positive effects on personal brand identity. Therefore it will be needed for marketers to associate the special treatment and trust and confidence benefits with personal image, personality and personal identity. Third, this study found again the importance of confidence and trust. However interestingly enough, social brand identity was not found to be significantly related to loyalty. It can be explained that the main sample of this study consists of college students. Those strategies to facilitate social brand identity are focused on high social status groups while college students have not been established their status yet.

  • PDF