• Title/Summary/Keyword: 문서지

Search Result 2,043, Processing Time 0.029 seconds

Job Analysis for Role Identification of General Hospice Palliative Nurse (호스피스 완화 간호사 역할규명을 위한 직무분석)

  • Kim, Boon-Han;Choe, Sang-Ok;Chung, Bok-Yae;Yoo, Yang-Sook;Kim, Hyun-Sook;Kang, Kyung-Ah;Yu, Su-Jeong;Jung, Yun
    • Journal of Hospice and Palliative Care
    • /
    • v.13 no.1
    • /
    • pp.13-23
    • /
    • 2010
  • Purpose: This study was to identify the role of general hospice palliative nurse through job analysis (duties, task, and task elements). Methods: The sample consisted of 136 nurses or professors who were performing duties related to hospice care areas in Korea. A survey method was used, and the questionnaire included frequencies, criticality, and difficulties of task elements in job description by the DACUM method. Descriptive statistics were performed by using SPSS WIN 17.0. Results: The job description of general hospice palliative nurse was identified 8 duties, 36 tasks, and 137 task elements. As for the 8 duties, the average scores of frequency, criticality, and difficulty were 2.94, 3.66, and 2.80, respectively. The role of ‘pain assessment’ was the most important task element among frequency and criticality. The lowest score at the frequency and criticality were ‘manage public finance’ and ‘collect datum through diagnostic test & lab', respectively. Furthermore, the role of 'identify spiritual needs of patients and family' was the most difficult task, whereas the role of 'manage documents and information' was the least. Conclusion: In this study, we could recognize the reality of general hospice palliative nurse's performances. For general hospice palliative nurse, therefore, concrete practice guide lines of psychosocial and spiritual care, communication skills, and bereavement care with qualifying system are critically needed.

Application of Patient Safety Indicators using Korean National Hospital Discharge In-depth Injury Survey (퇴원손상심층자료를 이용한 환자안전지표의 적용)

  • Kim, Yoo-Mi
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.5
    • /
    • pp.2293-2303
    • /
    • 2013
  • Objective: This study aims to determine whether national patient safety indicators (PSIs) can be calculated. Methods: Using PSI criteria from Organization for Economic Co-Operation and Development (OECD) Health Technical Papers 19 based on the Agency for Healthcare Research and Quality (AHRQ), PSIs were identified in the Korean National Hospital Discharge In-depth Injury Survey (KNHDIIS) database for 875,622 inpatient admissions between 2004 and 2008. Logistic regression was used to estimate factors of variations for PSIs. Results: From 2004 to 2008, 3,084 PSI events of 8 PSIs occurred for over 80 thousands discharges. Rates per 1,000 events for decubitus ulcer (PSI3, 4.88), foreign body left during procedure (PSI5, 0.05), postoperative sepsis (PSI13, 1.32), birth trauma-injury to neonate (PSI17, 7.92) and obstetric trauma-vaginal delivery (PSI18, 32.81) are all identified between ranges from maximum to minimum of OECD rates, respectively. However, rates per 1,000 events for selected infections due to medical care (PSI7, 0.22), postoperative pulmonary embolism or deep vein thrombosis (PSI12, 0.90) and accidental puncture or laceration (PSI15, 0.71) are below the minimum of OECD range. 7 PSIs except PSI 18 showed statistically significant relationship with number of secondary diagnoses. When adjusting patient characteristics, there are statistically significant different rates according to bed size or location of hospitals. Conclusion: This is the first empirical study to identify nationally number of adverse events and PSIs using administrative database. While many factors influencing these results such as quality of data, clinical data and so on are remain, the results indicate opportunities for estimate national statistics for patient safety. Furthermore outcome research such as mortality related to adverse events is needed based on results of this study.

A Literature Review and Classification of Recommender Systems on Academic Journals (추천시스템관련 학술논문 분석 및 분류)

  • Park, Deuk-Hee;Kim, Hyea-Kyeong;Choi, Il-Young;Kim, Jae-Kyeong
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.1
    • /
    • pp.139-152
    • /
    • 2011
  • Recommender systems have become an important research field since the emergence of the first paper on collaborative filtering in the mid-1990s. In general, recommender systems are defined as the supporting systems which help users to find information, products, or services (such as books, movies, music, digital products, web sites, and TV programs) by aggregating and analyzing suggestions from other users, which mean reviews from various authorities, and user attributes. However, as academic researches on recommender systems have increased significantly over the last ten years, more researches are required to be applicable in the real world situation. Because research field on recommender systems is still wide and less mature than other research fields. Accordingly, the existing articles on recommender systems need to be reviewed toward the next generation of recommender systems. However, it would be not easy to confine the recommender system researches to specific disciplines, considering the nature of the recommender system researches. So, we reviewed all articles on recommender systems from 37 journals which were published from 2001 to 2010. The 37 journals are selected from top 125 journals of the MIS Journal Rankings. Also, the literature search was based on the descriptors "Recommender system", "Recommendation system", "Personalization system", "Collaborative filtering" and "Contents filtering". The full text of each article was reviewed to eliminate the article that was not actually related to recommender systems. Many of articles were excluded because the articles such as Conference papers, master's and doctoral dissertations, textbook, unpublished working papers, non-English publication papers and news were unfit for our research. We classified articles by year of publication, journals, recommendation fields, and data mining techniques. The recommendation fields and data mining techniques of 187 articles are reviewed and classified into eight recommendation fields (book, document, image, movie, music, shopping, TV program, and others) and eight data mining techniques (association rule, clustering, decision tree, k-nearest neighbor, link analysis, neural network, regression, and other heuristic methods). The results represented in this paper have several significant implications. First, based on previous publication rates, the interest in the recommender system related research will grow significantly in the future. Second, 49 articles are related to movie recommendation whereas image and TV program recommendation are identified in only 6 articles. This result has been caused by the easy use of MovieLens data set. So, it is necessary to prepare data set of other fields. Third, recently social network analysis has been used in the various applications. However studies on recommender systems using social network analysis are deficient. Henceforth, we expect that new recommendation approaches using social network analysis will be developed in the recommender systems. So, it will be an interesting and further research area to evaluate the recommendation system researches using social method analysis. This result provides trend of recommender system researches by examining the published literature, and provides practitioners and researchers with insight and future direction on recommender systems. We hope that this research helps anyone who is interested in recommender systems research to gain insight for future research.

Development of test for Korean functional health literacy in dentistry (국내거주 외국인을 위한 한국형 치과정보 이해능력 평가도구의 개발)

  • Kim, Hyun-Kyung;Noh, Hie-Jin;Jung, Im-Hee;Chung, Won-Gyun;Lee, Yun;Mun, So-Jung;Jeon, Hyun-Sun;Han, Sun-Young;Choi, Eun-Hee;Ki, Jun-Sung;Koo, Min-Ji;Jeong, Ju-Hui
    • Journal of Korean society of Dental Hygiene
    • /
    • v.16 no.3
    • /
    • pp.355-362
    • /
    • 2016
  • Objectives: This study aimed to develop a tool for assessing foreigners' understanding of oral health information in Korea called the Test of Korean Functional Health Literacy in Dentistry(TOKFHLiD) and examined validity and reliability of the tool. The TOKFHLiD consists of two literacy assessment parts: Dental Information Sentence(DIS) aims to assess one's literacy of sentences containing oral health information. Dental Information Document(DID) aims to assess one's numeracy and literacy of documents containing oral health information. Methods: Twenty eight preliminary questions were developed based on various medical care literature such as the agreement to diagnosis and treatment and the treatment precautions. DID using 14 preliminary questions was developed based on the appointment card, the treatment schedule, and labels on oral care products. The 42 preliminary questions in the DIS and the DID were subsequently put through four separate expert reviews, in which questions with content validity score of less than 0.8(13/15 points) were corrected and modified by five dental experts and then were corrected for language errors by two Korean language experts. The preliminary assessment tool was tested on 153 Koreans, and ${\chi}^2$ test was performed on the ratio of respondents who comprehended each question, the ratio of respondents who chose the correct answer for each question with a significance level of 0.05. Results: Of the 42 preliminary questions, 1 question in DIS and 1 question in DID, for which the ratio of Korean respondents who chose the correct answers did not exceed the acceptable level of 80%, were excluded and a final assessment tool was completed with 40 questions. Conclusions: Following the development and application of the tool, examination of the TOKHLiD for validity and reliability revealed that this assessment tool is adequate for assessing oral health information literacy of foreigners who are using oral hygiene medical services in Korea.

A Convergence Analysis of the Ethnographic Method for Doctoral Dissertations in Korea : Focused on Research Participants, Data Collection Methods, and Trustworthiness Criteria (국내 박사학위 논문의 문화 기술적 연구방법에 대한 융복합적 분석 -연구 참여자, 자료 수집방법, 신뢰성 준거를 중심으로-)

  • Oh, Ho-young;Cho, Hong-Joong
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.10
    • /
    • pp.333-338
    • /
    • 2017
  • Ethnography is concerned about specifically-based behavior and belief and the learned pattern of language and aims to describe and interpret them. Therefore, it is a classical form of qualitative research that was developed by anthropologists who spent for long time in conducting fieldworks within the cultural group. The results of analyzing ethnographic research methods of doctoral dissertations in Korea are as follows. First, the number of research participants in data collection methods was 1-10(32 dissertations, 44.4%), 11-20(18, 25%), 21-30(13, 18.1%), 31-40(2, 2.7%), and others(7, 9.8%). Second, data collection methods were in-depth interview(71, 98.6%), participant observation(70, 97.2%), document data(38, 52.7%), engineering device(12, 16.6%), and others(8, 11.1%). Data collection periods were 3-5 months(7 dissertation, 9.8%), 6-8 months(15, 20.8%), 9-11 months(14, 19.6%), 12-14 months(13, 18.1%), more than 15 months(17, 23.6%), and unpresented(4, 5.4%). Third, trustworthiness criteria were triangulation(46 dissertation, 63.9%), research participants' evaluation of study results 44(61.1%), peer researchers' advice and indication(33, 45.8%), follow-up(25, 34.7%), use of reference(20, 27.8%), reflexive subjectivity(17, 23.6%), intensive observation for a sufficient period(10, 13.9%), in-depth description(7, 9.8%), and others(7, 9.8%).

Methodology for Issue-related R&D Keywords Packaging Using Text Mining (텍스트 마이닝 기반의 이슈 관련 R&D 키워드 패키징 방법론)

  • Hyun, Yoonjin;Shun, William Wong Xiu;Kim, Namgyu
    • Journal of Internet Computing and Services
    • /
    • v.16 no.2
    • /
    • pp.57-66
    • /
    • 2015
  • Considerable research efforts are being directed towards analyzing unstructured data such as text files and log files using commercial and noncommercial analytical tools. In particular, researchers are trying to extract meaningful knowledge through text mining in not only business but also many other areas such as politics, economics, and cultural studies. For instance, several studies have examined national pending issues by analyzing large volumes of text on various social issues. However, it is difficult to provide successful information services that can identify R&D documents on specific national pending issues. While users may specify certain keywords relating to national pending issues, they usually fail to retrieve appropriate R&D information primarily due to discrepancies between these terms and the corresponding terms actually used in the R&D documents. Thus, we need an intermediate logic to overcome these discrepancies, also to identify and package appropriate R&D information on specific national pending issues. To address this requirement, three methodologies are proposed in this study-a hybrid methodology for extracting and integrating keywords pertaining to national pending issues, a methodology for packaging R&D information that corresponds to national pending issues, and a methodology for constructing an associative issue network based on relevant R&D information. Data analysis techniques such as text mining, social network analysis, and association rules mining are utilized for establishing these methodologies. As the experiment result, the keyword enhancement rate by the proposed integration methodology reveals to be about 42.8%. For the second objective, three key analyses were conducted and a number of association rules between national pending issue keywords and R&D keywords were derived. The experiment regarding to the third objective, which is issue clustering based on R&D keywords is still in progress and expected to give tangible results in the future.

CIA-Level Driven Secure SDLC Framework for Integrating Security into SDLC Process (CIA-Level 기반 보안내재화 개발 프레임워크)

  • Kang, Sooyoung;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.909-928
    • /
    • 2020
  • From the early 1970s, the US government began to recognize that penetration testing could not assure the security quality of products. Results of penetration testing such as identified vulnerabilities and faults can be varied depending on the capabilities of the team. In other words none of penetration team can assure that "vulnerabilities are not found" is not equal to "product does not have any vulnerabilities". So the U.S. government realized that in order to improve the security quality of products, the development process itself should be managed systematically and strictly. Therefore, the US government began to publish various standards related to the development methodology and evaluation procurement system embedding "security-by-design" concept from the 1980s. Security-by-design means reducing product's complexity by considering security from the initial phase of development lifecycle such as the product requirements analysis and design phase to achieve trustworthiness of product ultimately. Since then, the security-by-design concept has been spread to the private sector since 2002 in the name of Secure SDLC by Microsoft and IBM, and is currently being used in various fields such as automotive and advanced weapon systems. However, the problem is that it is not easy to implement in the actual field because the standard or guidelines related to Secure SDLC contain only abstract and declarative contents. Therefore, in this paper, we present the new framework in order to specify the level of Secure SDLC desired by enterprises. Our proposed CIA (functional Correctness, safety Integrity, security Assurance)-level-based security-by-design framework combines the evidence-based security approach with the existing Secure SDLC. Using our methodology, first we can quantitatively show gap of Secure SDLC process level between competitor and the company. Second, it is very useful when you want to build Secure SDLC in the actual field because you can easily derive detailed activities and documents to build the desired level of Secure SDLC.

High-Speed Implementation and Efficient Memory Usage of Min-Entropy Estimation Algorithms in NIST SP 800-90B (NIST SP 800-90B의 최소 엔트로피 추정 알고리즘에 대한 고속 구현 및 효율적인 메모리 사용 기법)

  • Kim, Wontae;Yeom, Yongjin;Kang, Ju-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.25-39
    • /
    • 2018
  • NIST(National Institute of Standards and Technology) has recently published SP 800-90B second draft which is the document for evaluating security of entropy source, a key element of a cryptographic random number generator(RNG), and provided a tool implemented on Python code. In SP 800-90B, the security evaluation of the entropy sources is a process of estimating min-entropy by several estimators. The process of estimating min-entropy is divided into IID track and non-IID track. In IID track, the entropy sources are estimated only from MCV estimator. In non-IID Track, the entropy sources are estimated from 10 estimators including MCV estimator. The running time of the NIST's tool in non-IID track is approximately 20 minutes and the memory usage is over 5.5 GB. For evaluation agencies that have to perform repeatedly evaluations on various samples, and developers or researchers who have to perform experiments in various environments, it may be inconvenient to estimate entropy using the tool and depending on the environment, it may be impossible to execute. In this paper, we propose high-speed implementations and an efficient memory usage technique for min-entropy estimation algorithm of SP 800-90B. Our major achievements are the three improved speed and efficient memory usage reduction methods which are the method applying advantages of C++ code for improving speed of MultiMCW estimator, the method effectively reducing the memory and improving speed of MultiMMC by rebuilding the data storage structure, and the method improving the speed of LZ78Y by rebuilding the data structure. The tool applied our proposed methods is 14 times faster and saves 13 times more memory usage than NIST's tool.

Discourse Analysis of Business Chinese and the Comparison of Negotiation Culture between Korea and China - Focused on Business Emails Related to 'Napkin Holder' Imports - (무역 중국어 담화 고찰과 한중 협상문화 비교 - '냅킨꽂이' 수입 관련 비즈니스 이메일을 중심으로 -)

  • Choi, Tae-Hoon
    • Cross-Cultural Studies
    • /
    • v.50
    • /
    • pp.103-130
    • /
    • 2018
  • This research aims to explore the associated linguistic features and functions of Chinese as used for business trading purposes, and which is based on a discourse analysis through a case in which a Korean buyer and a Chinese supplier have exchanged Internet based e-mails. The research questions include first, the linguistic functions and characteristics of Chinese shown as identified in this trade case through e-mails, second, the use of Chinese trade specific terms, and third, the apparent and dynamic negotiation strategies that are identified as followed by the cultural value systems which are used for resolving interest conflicts and issues between the buyer and supplier in the course of negotiating business contracts between two parties. The participants of this research pertain to a Korean buyer, James and a Chinese supplier, Sonya. The associated data consists of 74 e-mails exchanged between the two parties, initiated in an effort to begin and complete a trade item, in this case namely the product of napkin holders. The research for the study is based on the discourse analysis and empirically analyses models of Chinese linguistic functions and features. The findings are the following. First, as identified, the specific Chinese functions used and sequenced in this trade case are of a procedure, request, informing, negotiation and persuasion. Second, the essential trade terms used in this business interaction involve the relevant issues of 1) ordering and price negotiating, 2) marking the origin of the products, 3) the arrangement of the product examination and customs declaration for the anticipated import items, 4) preparation of the necessary legal documents, and 5) the package and transport of the product in the final instance. Third, the impact of the similarities and differences in the cultural value systems between Korea and China on the negotiations and conflict resolution during a negotiated contract between two parties are speculated in terms of the use of culturally based techniques such as face-saving and the utilization of uncertainty-avoiding strategies as meant to prevent misunderstandings from developing between the parties. The concluding part of the study discusses the implications for a practical Chinese language education utilizing the linguistic functions and features of the Chinese culture and language strategies as useful in business associations for trading purposes, and the importance of intercultural communication styles based on similar of different identified cultural values as noted between two parties.

The Maritime Geography of Korea Strait: Suggested Nomenclature and Cartographic Boundaries Derived from a Review of Historical and Contemporary Maps (국제학술지, 지도, 문서에 나타난 대한해협 해양지명과 경계에 대한 인식 변화)

  • DO-SEONG BYUN;BYOUNG-JU CHOI
    • The Sea:JOURNAL OF THE KOREAN SOCIETY OF OCEANOGRAPHY
    • /
    • v.28 no.2
    • /
    • pp.63-93
    • /
    • 2023
  • This study aims to examine the history of naming the strait between the Yellow and East China Seas and the East Sea to suggest a consistent nomenclature and to demarcate the geographic region of the strait. Although the strait is internationally known as 'Korea Strait', it is commonly referred to as the 'South Sea' in Korean common usage. This review ultimately recommends the use of 'Korea Strait' as an appropriate geographical name for this area. To support this recommendation, the historical boundaries typically assigned to the Korea Strait were investigated. We also analyzed the evolution of geographical labels assigned to Korea Strait and to the Western and Eastern Channels (labels given to the two maritime areas surrounding Tsushima). Resources for this analysis included historic maps and charts, International Hydrographic Organization Special Publications (S-23), and maps published in the Ocean Science Journal (OSJ) and Journal of Oceanography (JO), which are two international journals representing Korean and Japanese sources, respectively, from 2005 to 2021. In these two international journals, the most frequently used names assigned to the strait of interest were Korea Strait (appearing 42.9% of OSJ maps, and 7.5% of JO maps), and Tsushima Strait (appearing 60.4% of JO maps, and 0% of OSJ maps). Other names were South Sea and Korea Strait/Tsushima Strait. On maps in the two reviewed journals, the boundaries of Korea Strait were defined explicitly or implicitly in five different ways: a broad region between the Yellow and East China Seas and Ulleung Basin (Type 1), the region between Ulleung Basin and Tsushima (Type 2), the western channel of the strait (Type 3-1), the eastern channel of the strait (Type 3-2), and both the western and eastern channels of the strait (Type 4). Overall, Type 1 was the most frequently used boundary, taking up 71.4% of OSJ and 60.4% of JO maps. Lastly, we suggest in this paper that the current flowing through Korea Strait from the East China Sea to the East Sea should be labeled the 'Korea Strait Warm Current' to indicate its full path through the strait. Currently, this current is internationally referred to as the 'Tsushima Warm Current', which does not link well to the commonly used geographic name of the strait.