This study surveyed on the actual conditions of using sanitizers and disinfectants for improvements of sanitization on food utensils at 105 school and 20 industry foodservice operations. The questionnaire which was administered to 125 foodservices was used as a mail or visitation method. The answers of asking "Perception on temporary authorization system of sanitizers and disinfectants on food utensils" were 75% in contract managed school foodservices, 81.8% in self operated school foodservices, and 50% in industry. Main factors to choose sanitizers were sterilizing power (38.6%, 28.6%, 38.9%) and safety (32.6%, 46.1%, 33.3%) at every foodservices. Keeping ratio of sanitizers and disinfectants guidelines in contract managed school, self operated school and industry foodservices were 64.8%, 52% and 73.7%, respectively. If easy and practical guideline is developed, most foodservices replied to use if for disinfection of foodservices. Most of the foodservices were not only knowing sanitizers and disinfectants but also possessing a guideline. However, they didn't perform disinfection according to the guideline due to its complexity. Consequently, we suggest that it is necessary to provide an easy and practical "sanitizers and disinfectants guideline" and useful information.
Thromboelastography(TEG) is the unique measure that gives rapid information about the whole clotting process. Simplifying the diagnosis of coagulopathy during operations, TEG can provide an adequate therapy for postoperative bleeding. Remarkable improvement in hemostasis after cardiopulmonary bypass(CPB) has been achieved by the treatment with proteinase inhibitor aprotinin, but the hemostatic mechanism of aprotinin during CPB is still unclear. This study was designed to evaluate the effects of aprotinin on coagulation system during CPB by using TEG. Forty patients who underwent CPB were divided into two groups: aprotinin(2u 106 kallikrein inhibition units, as a single dose into the cardiopulmonary bypass priming solution) treatment group(male 14, female 8, mean age=50.Byears) and no aprotinin treatment(control) group(male 10, female 8, mean age=53.4 years). TEG, activated clotting time, prothrombin time, activated partial thromboplastin time, platelet counts, fibrinogen an (ibrinogen degradation product(FDP) concentrations were checked before and after CPB(30 minutes after neutralization of heparin effect by protamine sulfate). There was no significant difference in other conventional coagulation tests of two groups except postcardiopulmonary bypass FDP concentration in control group, which was significantly increased compared to that in aprotinin group(p<0.05). In TEG variables of both groups, clot formation time(K) and alpha $angle(\alpha^{\circ})$ were significantly increased and decreased, respectively, after CPB(p<0.05), but fibrinolytic index(LYS60) was not changed during CPB. In aprotinin group, reaction time(R) was decreased significantly after CPB(p<0.05) but maximum amplitude(MA) was not changed(p>0.05). On the contrary, R was not changed markedly but MA was decreased significantly in control group after CPB(p<0.05). This result shows that main change in coagulation system during CPB is not hyperfibrinolysis but cecrease in clot strength by platelet dys unction, and the main effect of aprotinin during cardiopulmonary bypass is the maintenance of clot strength to the pre-CPB level by the preservation of platelet function.
A new Farmland Expansion and Development Promotion Law was enacted in 1975. This law authorizes the Government to undertake development within a declared "reclamation area", wherever the land owners are unable to do so. In order to give additional impetus to conversion of waste hilly land into productive farmland, these hilly land development projects were conducted as large scale scheme which include soil fertility improvements such as the application of lime and phosphate. Farmland Expansion and Development Promotion Corps has attempted to undertake annual farm surveys in order to obtain some information about hilly land agriculture and farming operations within the reclamation project areas since 1976. As survey data accumulates, more and more clear picture of hilly land farming come to appear and enable us to conduct in-depth study. Effects of such upland reclamation include converting of previously unproductive slopeland into cultivable farmland for lucrative and commercial farming or food production. Furthermore, idle or marginal resources such as farm labor, equipment and compost would be fully employed. Socio-economic effects would include increases in land value and attitude change of farmers. On the other hand the preservation of natural environments might be damaged to the some extend by the projects. As shown in Table 7, the average farm size increased from 3,156 pyeong($3.3m^2$) to 5,562 pyeong, a 76.2% increase. The proportion of small farms with less than I ha dropped from 59.8% to 34.4%, but that of the large farms over 2 ha rose from 13.1% to 32.0% (See Table 8). The survey results indicate that as the farming on reclaimed uplands become time-honored, the acreage devoted for food crop production decreases against the economic crop growing acreage (see Table 6). For example, in the case of uplands reclaimed in 1972, the ratio of food crop acreages decreased from 99.7% in 1972 to 62.5% in 1977, whereas that of economic crop acreages increased from 0.3% in 1972 to 37.5% in 1977. The government used to actively encourage the farmers to carry out food crop production in the reclaimed upland targting toward the realization of self-sufficiency in food grains. It is, however, apparent that the farmers did hardly take the government advises as far as their economic interest were concerned. Yield per 10a. of various crops from the reclaimed uplands by year were surveyed as seen in Table 12. On the average, barley production in the reclaimed areas achieved 83.3% of the average unit yield from the existing upland in its 5 th year. Soybean yields showed a modest increase from 64% in the first year to 95%, in the 5 th year. In contrast, economic crops such as red pepper, totacco and radish achieved their maximum target yields in 3 years from starting to cultivate on the reclaimed farms. In order to test the post economic viability, an economic analysis was performed for each of selected subprojects on the basis of the data obtained through survey. The average actual internal economic rate of return on upland reclamation investments was found to be 20.3% which exceeded other types of projects of land and water development such as tidal land reclamation, irrigation or paddy rearrangement. The actual IRRs of subcategories of upland reclamation projects varied from 17.9% to 21.4% depending upon the kinds of cropping system adopted in each reclaimed areas such as food, economic, fruit or forage crops.
Mazaheri, Ebrahim;Richard, Marie-Odile;Laroche, Michel
Journal of Global Scholars of Marketing Science
/
v.20
no.2
/
pp.123-134
/
2010
Considering the benefits for both consumers and suppliers, firms are taking advantage of the Internet as a medium to communicate with and sell products to their consumers. This trend makes the online shopping environment a growing field for both researchers and practitioners. This paper contributes by testing a model of online consumer behavior with websites varying in levels of hedonism. Unlike past studies, we included all three types of emotions (arousal, pleasure, and dominance) and flow into the model. In this study, we assumed that website interfaces, such as background colors, music, and fonts impact the three types of emotions at the initial exposure to the site (Mazaheri, Richard, and Laroche, 2011). In turn, these emotions influence flow and consumers' perceptions of the site atmospherics-perception of site informativeness, effectiveness, and entertainment. This assumption is consistent with Zajonc (1980) who argued that affective reactions are independent of perceptual and cognitive operations and can influence responses. We, then, propose that the perceptions of site atmospherics along with flow, influence customers' attitudes toward the website and toward the product, site involvement, and purchase intentions. In addition, we studied the moderating impact of the level of hedonism of websites on all the relationship in the model. Thus, the path coefficients were compared between "high" and "low" hedonic websites. We used 39 real websites from 12 product categories (8 services and 4 physical goods) to test the model. Among them, 20 were perceived as high hedonic and 19 as low hedonic by the respondents. The result of EQS 6.1 support the overall model: $\chi^2$=1787 (df=504), CFI=.994; RMSEA=.031. All the hypotheses were significant. In addition, the results of multi-groups analyses reveal several non-invariant structural paths between high and low hedonic website groups. The findings supported the model regarding the influence of the three types of emotions on customers' perceptions of site atmospherics, flow, and other customer behavior variables. It was found that pleasure strongly influenced site attitudes and perceptions of site entertainment. Arousal positively impacted the other two types of emotions, perceptions of site informativeness, and site involvement. Additionally, the influence of arousal on flow was found to be highly significant. The results suggested a strong association between dominance and customers' perceptions of site effectiveness. Dominance was also found to be associated with site attitudes and flow. Moreover, the findings suggested that site involvement and attitudes toward the product are the most important antecedents of purchase intentions. Site informativeness and flow also significantly influenced purchase intentions. The results of multi-group analysis supported the moderating impacts of hedonism of the websites. Compared to low (high) hedonic sites, the impacts of utilitarian (hedonic) attributes on other variables were stronger in high (low) hedonic websites. Among the three types of emotions, dominance (controlling feelings) effects were stronger in high hedonic sites and pleasure effects were stronger in low hedonic sites. Moreover, the impact of site informativeness was stronger for high hedonic websites compared to their low-hedonic counterparts. On the other hand, the influence of effectiveness of information on perceptions of site informativeness and the impact of site involvement on product attitudes were stronger for low hedonic websites than for high hedonic ones.
Franchising is one of the fastest growing types of business. It is already popular and well-known in the U.S., and has been growing in many other countries including Korea. Furthermore, many Korean franchising companies have expanded their business overseas actively. According to the data by the Ministry of Industry and Resource, 82 companies out of a sample of 500 franchising companies are already operating in many foreign countries and 48% of them have started their foreign business since 2006. This clearly indicates the fast growing current trend of foreign operation by Korean franchising companies. In spite of the fast growing trend of foreign expansion in the industry, academic research on internationalization of franchising companies is extremely difficult to find. Accordingly, academic research on the issue is necessary and urgent in Korea. Among the various research questions on internationalization of franchising business, this study intends to investigate the difference in organizational factors between the franchising companies doing foreign operation and those doing business only domestically. More specifically, this research has the following purposes. First, considering the lack of theoretical basis of previous studies, resource-based theory and agency theory are employed as the theoretical bases. Second, this study explains the difference in internationalization based on organizational factors such as company size, history and growth rate. Third, the five hypotheses regarding the difference in organizational factors are presented and tested empirically, which is the first attempt in the area of this topic. Finally, the study attempts to clarify the conflicting implications among theories regarding some organizational factos such as growth rate. As the theoretical background, resource-based theory and agency theory are discussed. According to resource-based theory, a firm can grow continuously when it has competence and resource, and also the ability to develop them. The competence and resource can include capital, human resource, management skill, market information, ability to manage risk, etc. Meanwhile, agency theory views the relationship between franchisor and franchisee as an agency relationship. In agency theory, bonding capability and monitoring capability are the two key factors which promote internationalization of franchising companies. Based on the two theories, a conceptual model is designed. The model consists of two groups of variables. One is organizational factors including size, history, growth rate, price bonding and geographic dispersion. The other is whether a franchising company is operating overseas or not. We developed the following five research hypotheses basically describing the relationship between organizational factors and internationalization of franchising companies. H1: The size of franchising companies operating overseas is larger than that of franchising companies operating domestically. H2: The history of franchising companies operating overseas is longer than that of franchising companies operating domestically. H3: The growth rate of franchising companies operating overseas is higher than that of franchising companies operating domestically. H4: The price bonding of franchising companies operating overseas is higher than that of franchising companies operating domestically. H5: The geographic dispersion of franchising companies operating overseas is wider than that of franchising companies operating domestically. Data for the analyses are obtained from 2005 Korea Franchise Survey data co-generated by Ministry of Industry and Resource, GS1 Korea, and Korea Franchise Association. Out of 2,804 population companies, 2,489 companies are excluded for various reasons and 315 companies are selected as the final sample. Prior to hypotheses tests, validity and reliability of the measures of size, history, growth rate and price bonding are examined for further analyses. Geographic dispersion is not validated since it is measured using nominal data. A series of independent sample T-tests is used to find out whether there exists any significant difference between the companies internationalized and those operating only domestically for each organizational factor. Among the five factors, size and geographic dispersion show significant difference, growth rate and price bonding do not reveal any difference and, finally, history factor shows conflicting results in the difference depending on how to measure it.
shows the summary statistics for hypotheses testing. In conclusion, the results show that the size and history, which are the key variables in resource-based theory, have a significant relationship with internationalization and that geographic area, which belongs to agency theory, also has a strong relationship with internationalization. The results support the findings of extant research and, therefore, prove the usefulness of resource-based theory and agency theory in explaining internationalization of franchising companies. However, growth rate and price-bonding do not show a clear difference between the two types of companies. Accordingly, these two factors need further attention in the future research. Although this study shows meaningful findings theoretically and practically, it has several limitations. First, only organizational factors are considered even if there are various environmental factors influencing franchising firm's internationalization. Second, only being internationalized or not is considered. That is, modes of entry and the size of foreign operations are not included in the study. Third, internationalization strategy is often determined based on the desire for business expansion and higher profitability and egoistical reasons of the CEOs. However, this type of factors belonging to behavioral science is not discussed in the study. Finally, organizational ecology perspective is usefully applicable in explaining the survival and performance of internationally operating companies. Accordingly, research propositions based on this perspective need to be developed and tested.
The National Defense Reformation bill of "National Defense Reformation 2020" which have been constantly disputed and reformed by the government went through various levels of complementary measures after the North Korean sinking on the Republic of Korea (ROK) Naval Vessel "Cheonan". The final outcome of this reform is also known as the 307 Plan and this was announced on the 8th March. The reformed National Defense Reformation is to reduce the number of units and military personnel under the military structure reformation. However, in order for us to undertake successful National Defense Reformation, the use of privatized civilian resources are essential. Therefore according to this theory, the ROK Ministry of National Defense (MND) have selected the usage of privatized resources as one of the main core agenda for the National Defense Reformation management procedures, and under this agenda the MND plans to further expand the usage of private Especially the MND plans to minimize the personnel resources applied in non-combat areas and in turn use these supplemented personnel with optimization. In order to do this, the MND have initiated necessary appropriate analysis over the whole national defense section by understanding various projects and acquisition requests required by each militaries and civilian research institutions. However for efficient management of privatized civilian resources, first of all, those possible efficient private resources which can achieve optimization will need to be identified, and secondly continuous systematic reinforcements will need to be made in private resource usage legislations. Furthermore, we would need to consider the possibility of labor disputes because of privatization expansion. Therefore, full legal and systematic complementary measures are required in all possible issue arising areas which can affect the combat readiness posture. There is another problem of huge increase in operational expenses as reduction of standby forces are only reducing the number of soldiers and filling these numbers with more cost expensive commissioned officers. However, to overcome this problem, we would need to reduce the number of positions available for active officers and fill these positions with military reserve personnel who previously had working experiences with the related positions (thereby guaranteeing active officers re-employment after completing active service). This would in tum maintain the standards of combat readiness posture and reduce necessary financial budgets which may newly arise. The area of maintenance, supply, transportation, training & education duties which are highly efficient when using privatized resources, will need to be transformed from military management based to civilian management based system. For maintenance, this can be processed by integrating National Maintenance Support System. In order for us to undertake this procedure, we would need to develop maintenance units which are possible to be privatized and this will in turn reduce the military personnel executing job duties, improve service quality and prevent duplicate investments etc. For supply area, we will need to establish Integrated Military Logistics Center in-connection with national and civilian logistics system. This will in turn reduce the logistics time frame as well as required personnel and equipments. In terms of transportation, we will need to further expand the renting and leasing system. This will need to be executed by integrating the National Defense Transportation Information System which will in turn reduce the required personnel and financial budgets. Finally for training and education, retired military personnel can be employed as training instructors and at the military academy, further expansion in the number of civilian professors can be employed in-connection with National Defense Reformation. In other words, more active privatized civilian resources will need to be managed and used for National Defense Reformation.
The Newton-Raphson iterative algorithm for finding a floating point reciprocal square mot calculates it by performing a fixed number of multiplications. In this paper, a variable latency Newton-Raphson's reciprocal square root algorithm is proposed that performs multiplications a variable number of times until the error becomes smaller than a given value. To find the rediprocal square root of a floating point number F, the algorithm repeats the following operations: '$X_{i+1}=\frac{{X_i}(3-e_r-{FX_i}^2)}{2}$, $i\in{0,1,2,{\ldots}n-1}$' with the initial value is '$X_0=\frac{1}{\sqrt{F}}{\pm}e_0$'. The bits to the right of p fractional bits in intermediate multiplication results are truncated and this truncation error is less than '$e_r=2^{-p}$'. The value of p is 28 for the single precision floating point, and 58 for the double precision floating point. Let '$X_i=\frac{1}{\sqrt{F}}{\pm}e_i$, there is '$X_{i+1}=\frac{1}{\sqrt{F}}-e_{i+1}$, where '$e_{i+1}{<}\frac{3{\sqrt{F}}{{e_i}^2}}{2}{\mp}\frac{{Fe_i}^3}{2}+2e_r$'. If '$|\frac{\sqrt{3-e_r-{FX_i}^2}}{2}-1|<2^{\frac{\sqrt{-p}{2}}}$' is true, '$e_{i+1}<8e_r$' is less than the smallest number which is representable by floating point number. So, $X_{i+1}$ is approximate to '$\frac{1}{\sqrt{F}}$. Since the number of multiplications performed by the proposed algorithm is dependent on the input values, the average number of multiplications Per an operation is derived from many reciprocal square root tables ($X_0=\frac{1}{\sqrt{F}}{\pm}e_0$) with varying sizes. The superiority of this algorithm is proved by comparing this average number with the fixed number of multiplications of the conventional algorithm. Since the proposed algorithm only performs the multiplications until the error gets smaller than a given value, it can be used to improve the performance of a reciprocal square root unit. Also, it can be used to construct optimized approximate reciprocal square root tables. The results of this paper can be applied to many areas that utilize floating point numbers, such as digital signal processing, computer graphics, multimedia, scientific computing, etc.
Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.
The longing for submarine manufacture and the fear of her power had exited for a long time, but submarine that could submerge and attack was built from 20th century by science technology development. The question, 'Submarine can exercise her power in naval warfare?' had exited before World War I, but the effective value of submarine was shown in the procedure of a chain of naval warfare during World War I and World War II. Germany and the United States made the best use of submarines at that time. The submarines of these nations mounted fierce attack on the enemy's battleships and merchant ships and blocked the sea lanes for war material. These fierce attack on ships became impossible After World War II, and the major powers reduced and coordinated the defence budget, so they considered the role of submarine. However, submarine is still powerful weapon system because she can secretly navigate under the water, and one of the most important force in the navy. The aim of this thesis is analyzing submarine roles in each naval warfare and integrating maritime strategy and weapon system technology into her roles. First, the research about represent submarine roles like anti-surfaceship warfare, anti-submarine warfare, intelligence gathering, land attack, supporting special operation and mine landing warfare will be presented, then the major naval warfare where submarine participated(during ex-World War I, World War I, World War II, The Cold War Era and post Cold War) and the analyzing of submarine roles by time will be presented. Submarine was developed for anti-surfaceship warfare during ex-World War I but could not make remarkable military gain in naval warfare because her performance and weapon was inadequate. However, the effective value of submarine in the procedure of a chain of naval warfare was shown during World War I and World War II. The major powers put battleships into naval warfare undiscriminatingly to command the sea power and submarines did massive damage to enemy navy power, so put a restraint the maritime power of enemy, and blocked the sea lanes for war material. After World War II, the battlefield situation changed rapidly and the concept of preemption became difficult to apply in naval warfare. Therefore, the submarine was unable to concentrate on anti-surfaceship mission. Especially during the Cold War era, nuclear submarine came to appear and her weapon system developed rapidly. These development gave submarines special missions: anti-submarine warfare and intelligence gathering. At that time, United States and Soviet submarines tracked other nation's submarines loaded with nuclear weapons and departing from naval their base. The submarines also collected information on the volume of ships and a coastal missile launching site in company with this mission. After Cold War, the major powers despatched forces to major troubled regions to maintain world peace, their submarines approached the shores of these regions and attacked key enemy installations with cruise missiles. At that time, the United States eased the concept of preemption and made the concept of Bush doctrine because of possible 911 terrorism. The missiles fired from submarines and surface battleships accurately attacked key enemy installations. Many nations be strategically successful depending on what kind of mission a submarine is assigned. The patterns of future naval warfare that my country will provide against will be military power projection and coalition/joint operations. These suggest much more about what future missions we should assign to submarines.
Purpose: We analyzed the clinicopathologic features, including treatment and outcome, and the survival rates between young and elderly patients with gastric cancer. Materials and Methods: Clinical information was reviewed for 1086 patients who had undergone a gastrectomy for gastric cancer during a 10-year period from 1990 to 1999, and the patients were assigned to one of two groups: the A group (<40 years of age, 91 patients) and the B group (${\geq}70\;years\;of\;age,\;85\;patients)$). Results: Compared to the B group, the A group had more females (47.3% vs 32.9%), a greater frequency of family history of cancer (15.4% vs 3.5%), and greater proportions of histologically poorly differentiated tumors (84.5% vs 40.2%) and Lauren diffuse-type tumors (69.1% vs 35.1%)(P<0.05). There was no difference in TNM stage. Cardiopulmonary co-morbidities were more in the B group, respectively, 1.1% (A group) and 11.8% (B group)(P<0.01), but the morbidity and the mortality were similar. Although there was no difference in curability, the B group underwent less aggressive operations in lymph-node dissection above D3 and had a shorter operation time, a smaller number of retrieved lymph nodes, and less adjuvant chemotherapy (P<0.001). However, there were no differences in the disease-specific 5-year survival rates, 67.6% and 67.0% respectively. Conclusion: Young and elderly patients with gastric cancer had different clinicopathological features. Especially, elderly patients underwent relatively less aggressive treatment. In spite of these facts, the outcome of treatment and the disease-specific survival rates were not different.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.