• Title/Summary/Keyword: 개인성과

Search Result 2,299, Processing Time 0.025 seconds

Maintaining Professional Dignity in the Age of Social Media (소셜미디어 시대에서 의료전문직으로서의 품위 유지)

  • KIM, Claire Junga;BHAN, Yoo Wha
    • Korean Journal of Medical Ethics
    • /
    • v.21 no.4
    • /
    • pp.316-329
    • /
    • 2018
  • Although the use of social media by doctors raises important issues concerning medical professionalism, the relevant professional bodies in South Korea have failed to issue clear guidelines on social media usage. The Korean Medical Association's newly revised ethics guidelines do require members to maintain dignity while using social media, but the idea of "maintaining dignity" is far from clear, and its premodern connotation prevents it from being reliably used in professional codes of conduct. The authors of this article examine the concept of maintaining dignity and conclude that once it is clarified and redefined it can and should be used as a viable ethical standard in a variety of contexts, including the use of social media. Social media's unpredictability and uncontrollability, and the blurred distinction between professional/public and personal/private can be a threat to medical professionalism. In order to deal with this threat, the concept of dignity is important. We present three examples in which the dignity of medical professionals is undermined and explain why these jeopardize public trust. We conclude that in order to maintain public trust the Korean Medical Association should provide more detailed guidelines on the use of social media by its members.

Development and Validation of Authenticity Scale (진정성 척도 개발과 타당화)

  • Kim, Youngjun;Kim, Young-il;Lee, Heungchul;Kim, Kyungil
    • Korean Journal of Cognitive Science
    • /
    • v.32 no.3
    • /
    • pp.141-167
    • /
    • 2021
  • Authenticity is the opposite of hypocrisy or deceitful living in philosophy. While various positive factors that humans experience in life based on authenticity have been studied abroad, most of the studies in Korea that tried to measure authenticity did not take into account the characteristics of Korean culture or were developed only for the purpose of use in a limited domain or specific purpose. In this study, based on the specificity of Korean culture, we developed a measure of authenticity that researchers can use universally. To this end, the items constituting the existing authenticity scale and the items reflecting the cultural value of Korean society, which value social relationships, are integrated. The results of exploratory factor analysis and confirmatory factor analysis indicated that authenticity consists of three factors: self-awareness, behavioral authenticity, and relationship authenticity. In addition, criterion validity was verified based on correlations with life satisfaction, mindfulness, self-esteem, HEXACO, social desirability, self-regulation focus, and emotional diversity. These results suggest that the authenticity scale of this study is a reliable and valid measure, and is expected to be an important tool for empirical individual differences research on authenticity in everyday life in Korean population.

Possibility of Risk Accidents and Response Strategies for Participants in Agencies in Charge of Employment for the Elderly: Focusing on occupational risk accidents and COVID-19 risk accidents (노인일자리 전담기관 참여자의 위험사고 발생가능성과 대응 전략: 업무상 위험사고와 코로나-19 위험사고를 중심으로)

  • Park, Jae-Young;Youn, Ki-Hyok;Lee, Jin-Yeol
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.6
    • /
    • pp.65-73
    • /
    • 2022
  • This study identified the level of awareness of dangerous accidents by empirically analyzing the possibility of hazardous accidents at work and the possibility of dangerous accidents due to COVID-19 targeting the participating seniors who are active in the Senior Club, an organization dedicated to job placement for the elderly. The purpose of this study is to provide basic data for preparing measures to improve risk accidents that may occur in organizations in charge of job placement for the elderly and to suggest countermeasures to prevent dangerous accidents. For this purpose, data were collected from the elderly participating in 16 senior clubs in Busan, and 425 of the collected 430 were ultimately used. As a result of this study, first, it was found that the elderly who participated in a job-dedicated institution for the elderly generally perceived the possibility of occupational risk accidents and risk factors due to COVID-19 to be low. Second, it was found that there was a statistically significant difference in the probability of occurrence of hazardous accidents at work according to demographic characteristics during the participation period, and the probability of occurrence of dangerous accidents with COVID-19 was found to have statistically significant differences in the classification and age of the participating elderly. Based on the results of this study, the project manager suggested creating a safety accident management record sheet, preparing a risk management manual, and establishing a risk management system reflecting the individual characteristics of the participants.

Development of Panel-Based Rapid Aerodynamic Analysis Method Considering Propeller Effect (프로펠러 효과를 반영 가능한 패널 기반 신속 공력 해석 기법 개발)

  • Tai, Myungsik;Lee, Yebin;Oh, Sejong;Shin, Jeongwoo;Lim, Joosup;Park, Donghun
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.49 no.2
    • /
    • pp.107-120
    • /
    • 2021
  • Electric-powered distributed propulsion aircraft possess a complex wake flow and mutual interference with the airframe, due to the use of many propellers. Accordingly, in the early design stage, rapid aerodynamic and load analysis considering the effect of propellers for various configurations and flight conditions are required. In this study, an efficient panel-based aerodynamic analysis method that can take into account the propeller effects is developed and validated. The induced velocity field in the region of propeller wake is calculated based on Actuator Disk Theory (ADT) and is considered as the boundary condition at the vehicle's surface in the three-dimensional steady source-doublet panel method. Analyses are carried out by selecting an isolated propeller of the Korea Aerospace Research Institute (KARI)'s Quad Tilt Propeller (QTP) aircraft and the propeller-wing configuration of the former experimental study as benchmark problems. Through comparisons with the results of computational fluid dynamics (CFD) based on actuator methods, the wake velocity of propeller and the changes in the aerodynamic load distribution of the wing due to the propeller operation are validated. The method is applied to the analysis of the Optional Piloted Personal Aerial Vehicle (OPPAV) and QTP, and the practicality and validity of the method are confirmed through comparison and analysis of the computational time and results with CFD.

Current Trends in the U.S. Cybersecurity Laws (미국 사이버보안법의 최근 동향 - 「사이버보안 정보공유법」을 중심으로 하여 -)

  • Yang, Chun-Soo;Jee, Yu-Mi
    • Journal of Legislation Research
    • /
    • no.54
    • /
    • pp.155-192
    • /
    • 2018
  • As the 'hyper-connected society' has emerged through the 'Fourth Industrial Revolution, public interests as well as social dangers have increased. Above all, the risk of infringement of information, including confidential personal information, is dramatically increasing. As the hyper-connected society has been realized, even if only one of the internet devices is hacked, there would be a danger that the ripple effect of such a hacking spreads to the whole network. Therefore, the necessity and importance of information security, including cybersecurity, has been increasing. In other words, the stability of cyberspace and internet space is becoming more important. As a result, the Korean government is seeking to build a legal system related to information security, which would be able to cope with the information infringement problem in the hyper-connected society. However, it seems that the government is still struggling with the direction of building such a legal system. In this context, a comparative review examining the legal systems of advanced foreign countries will provide meaningful implications as to what kinds of legal policies we should devise and implement for information security. In particular, the U.S. legislative act that actively responds to the cybersecurity violations is worthy of reference. For this reason, this article systematically analyzes the current status of the U.S. cybersecurity laws. Especially, this article focuses on the "Cybersecurity Information Sharing Act of 2015"(hereinafter "CISA"), that was recently enacted by the U.S. congress. The CISA prescribes the systemic and detailed information-sharing between national and private entities. The CISA, that actively promotes information-sharing, is full of suggestions for us, in that information-sharing is an effective way to properly realize information security in today's hyper-connected society.

The Impacts of Education and Non-Labor Income on Employment Among the Elderly: An Estimation with a Panel Logit Model to Address the Problem of Endogenous Predictors (교육수준과 비근로소득이 고령자 취업에 미치는 영향: 내생성을 고려한 패널로짓 모형 추정)

  • Kim, Cheoljoo
    • 한국사회정책
    • /
    • v.23 no.1
    • /
    • pp.95-123
    • /
    • 2016
  • As Korean society grows rapidly older, a systematic analysis of the determinants of labor supply behavior among the elderly becomes a prerequisite for designing more effective senior employment policies and income security regime for the elderly. Literatures review shows that a majority of previous researches have been ignoring the problem of "endogenous predictor" especially when it comes to the estimation of the effects of the two key variables, education and non-labor income, on labor supply decisions among older people. They have failed to take into consideration the unobserved heterogeneities which might affect both labor supply decisions of the elderly and their levels of education and non-labor income, which means, according to some econometric literatures, that the estimated coefficients of the two predictors can be inconsistent. The paper tries to redress the endogeneity problem by employing a panel logit model with data from the 1st. to 4th. wave of the KLoSA(Korean Longitudinal Survey of Ageing) to estimate the effects of key predictors on the probability of getting jobs among older people(ages of 60 or older). Both a random effects and a fixed effects model reaffirms that non-labor income has a negative effect on the chances of being employed. And a random effects model shows that the effect of education is also negative, as has frequently been reported by previous studies. That means the effects of education and non-labor income on elderly employment remain negative after the effect of unobserved heterogeneities is controled for and the problem of endogenous predictors is redressed through an appropriate panel data analysis. These findings mean, in turn, that when Korean baby-boomers, who had acquired an unprecedentedly higher level of education and were expected to enjoy ever-larger amount of non-labor income than their preceding generations, retires in near future, their incentives to work will become much weaker and the lack of labor-force and the burden of financing increased public pension expenditure will become more troublesome. The paper concludes with recommending some policy initiatives helpful to solve these expected problems.

Park je sang' political position in the Shila nulgi king period (신라(新羅) 눌지왕대(訥祗王代) 박제상(朴堤上)의 정치적(政治的) 위상(位相))

  • Cho, lee ok
    • (The)Study of the Eastern Classic
    • /
    • no.33
    • /
    • pp.231-252
    • /
    • 2008
  • This study is to investigate on focus of his political position change to build up his the real form about Park je sang(朴堤上) who had taken an active part within Shila nulgi king(訥祗王) period on base of previous park je sang' study results. that is, this study took attention about excellent capability by diplomat who had shown his diplomatic ability in complicated and international fields of three countries, and about process of entrance on central political fields by private capability in sap lang(?良) district in relation with building up the real form of park je sang. As result, by means of few investigations about park je sang who had taken an active part, we looked into process how local power man in sap lang(?良) district had built up his position to jin-gol(眞骨) status with strategic location of sap lang(?良) district on shila history within Shila nulgi king period. I think that we found valuable means from figures of a district society in process how Shila had grown with a country of centralizing power.

Efficient Mutual Authentication Protocol Suitable to Passive RFID System (수동형 RFID 시스템에 적합한 효율적인 상호 인증 프로토콜 설계)

  • Won, Tae-Youn;Chun, Ji-Young;Park, Choon-Sik;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.63-73
    • /
    • 2008
  • RFID(Radio Frequency IDentification) system is an automated identification system that basically consists of tags and readers and Back-End-Databases. Tags and Readers communicate with each other by RF signal. As a reader can identify many tags in contactless manner using RF signal, RFID system is expected to do a new technology to replace a bar-code system in supply-chain management and payment system and access control and medical record and so on. However, RFID system creates new threats to the security of systems and privacy of individuals, Because tags and readers communicate with each other in insecure channel using RF signal. So many people are trying to study various manners to solve these problems against attacks, But they are difficult to apply to RFID system based on EPCglobal UHF Class-1 Generation-2 tags. Recently, Chien and Chen proposed a mutual Authentication protocol for RFID conforming to EPCglobal UHF Class-1 Generation-2 tags. we discover vulnerabilities of security and inefficiency about their protocol. Therefore, We analyze vulnerabilities of their protocol and propose an efficient mutual authentication protocol that improves security and efficiency.

A Study on the Copyright Protection Liability of Online Service Provider and Filtering Measure (온라인서비스제공자(OSP)의 저작권보호 책임과 필터링)

  • Oh, Yeong-Woo;Jang, Gye-Hyun;Kwon, Hun-Yeong;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.97-109
    • /
    • 2010
  • Although the primary liability for online copyright infringement may fall on the individual who illegally copies, transfers, and/or distributes the copyrighted content, the issue of indirect liability for Online Service Providers (OSPS) that provide a channel for the distribution of illegal content has recently come under the spotlight. Currently, in an effort to avoid liability for indirect copyright infringement and improve their reputation, most OSPs have voluntarily applied filtering technology. Under the Copyright Act of Korea, special types of OSPS including P2P and Web-based Hard Drive (WebHard) are required to incorporate filtering technology, and may be charged with penalties if found without one. However, despite the clear need for filtering mechanisms, several arguments have been set forth that question the efficacy and appropriateness of the system. As such, this paper discusses the liability theory adopted in the US. -a leader in internet technology development-and analyzes the scope of liability and filtering related regulations in our copyright law. In addition, this paper considers the current applications of filtering as well as limits of the applied filtering technology in OSPS today. Finally, we make four suggestions to improve filtering in Korea, addressing issues such as clarifying the limits and responsibilities of OSPS, searching for cooperative solutions between copyright holders and OSPS, standardizing the filtering technology to enable compatibility among different filtering techniques, and others.

Exploration of Knowledge Hiding Research Trends Using Keyword Network Analysis (키워드 네트워크 분석을 활용한 지식은폐 연구동향 분석)

  • Joo, Jaehong;Song, Ji Hoon
    • Knowledge Management Research
    • /
    • v.22 no.1
    • /
    • pp.217-242
    • /
    • 2021
  • The purpose of this study is to examine the research trends in the filed of individual knowledge hiding through keyword network analysis. As individuals intentionally hide their knowledge beyond not sharing their knowledge in organizations and the research on knowledge hiding steadily spreads, it is necessary to examine the research trends regarding knowledge hiding behaviors. For keyword network analyses, we collected 346 kinds of 578 keywords from 120 articles associated with knowledge hiding behaviors. We also transformed the keywords to 86 nodes and 667 links by data standardizing criteria and finally analyzed the keyword network among them. Moreover, this study scrutinized knowledge hiding trends by comparing the conceptual model for knowledge hiding based on literature review and the network structure based on keyword network analysis. As results, first, the network centrality degree, knowledge sharing, creativity, and performance was higher than others in Degree, Betweenness, Closeness centrality. Second, this study analyzed ego networks about psychological ownership and individual emotion theoretically associated with knowledge hiding and explored the relationship between variables through comparing with the conceptual model for knowledge hiding. Finally, the study suggested theoretical and practical implications and provided the limitations and suggestions for future research based on study findings.