The purpose of this study is a exploratory study for understanding the process of the social isolation of the socially isolated elderly through the approach to their life history. The research was analyzed by one of the methods of qualitative research on life history, the conceptual framework of 'Dimensions, turning, and adaptation' of Mandelbaum(1973). According to the results of this study, the socially isolated elderly people were found to be socially isolated by experiencing complex difficulties such as family disconnection, poverty, poor job and health deterioration. Specifically, in the area of life, there was experience of poor relationship with parent, absence of family, poverty of family and unfavorable relationship with surrounding people in life with original family before isolation. They had bad jobs in the labor market, such as hard labor, delivery, business, and chores. In the area of turning point, we experienced family break due to the separation of the original family and the spouse due to various reasons such as financial crisis, parental divorce and death, spouse affair, economic difficulty. In a transitional stage in the life, many reasons such as the financial crisis, the death of parents, the extramarital affair and economic difficulties led to the disconnection from their original family and their spouses. In an adaptive phase, participants accepted the changed life at each turning point in their lives, carrying out their roles, compromising and trying to adapt properly. He said that their current life, which has entered the social safety net system of the people's basic recipients, has led him to live a more stable life and is adapting to personal hobbies and vicarious satisfaction through networks. This result is somewhat different from previous studies in which isolated elderly people were severely exposed to the risk of depression and loneliness. However, we should also consider the characteristics of this study that interviewed elderly people with relatively low isolation. Based on the results of this research, he presented various practical policy implications.
This study investigates the effect of market orientation of knowledge-based service suppliers on the sourcing process of service recipients. Focusing on a dyadic relationship between a supplier and a buyer, this study proposed a conceptual model of market orientation incorporating the antecedents and consequences of market orientation. This study empirically tested research hypotheses delineated from the conceptual framework. The present study revealed that the impact on the buyer's performance of the supplier's customer and competitor orientation turned out to be more influential than that of inter-departmental cooperation. Also these two dimensions of customer and competitor orientation played a positive role in reducing buyer's perceived risk and uncertainty related to the evaluation of services out-sourced. Interestingly enough, the supplier's perceived importance on the distance between the buyer and supplier remains important especially when the degree of buyer's market orientation is high. This finding is somewhat contrary to the fact that the geographic location of the buyer becomes less important for the internet-based B2B service providers. Based on the findings, this study suggested managerial implications and broadened the scope of academic research in the field of business services. Future research directions and the limitations of this study are also discussed.
This study examines the characteristics of traffic accidents involving elderly pedestrians by analyzing relevant data vis-à-vis fatal pedestrian accidents and proposes solutions to reduce such accidents. We analyzed 3,853 cases of fatal accidents involving elderly pedestrians and 1,786 cases involving younger pedestrian (these cases reflect accidents that occurred from 2005 to 2008). The results show that accidents involving the elderly occur more frequently in rural areas than urban areas, especially in autumn; this condition applies even in situations where the elderly exhibit compensation behaviors such as walking on safer roads. We found that elderly pedestrians exhibit a defective behavior in crossing roads, especially in complicated road conditions where intersections and turning/reversing vehicles represent a menacing threat. These characteristics could be explained by the degenerated physical/mental ability of the elderly and by psychological factors such as reduced level of self-confidence.
This paper explored the differences in university students' e-Sports patterns(e-Sports behaviors, its meaning and personalities) based on the types of game-lifestyle. The results of this study could be summarized as follows. First, game-lifestyle was categorized into 5 groups, that is, 'game with someone', 'game alone', 'addicted to game', 'novice for game' and 'flow in game'. Second, there were remarkable differences in e-Sports behaviors, its meaning and personalities(altruism, sociality and aggression) among these 5 groups. Specifically, The group of 'addicted to game' was similar to the group of 'flow in game' in the amount of time/money for game. Moreover they were highly likely to regard e-Sports game defeat as the reflection of their self-esteem and as the tool of gaining popularity/superiority to peers. Even though these similarities, the group of 'flow in game' was inclined not to permit deviant words/deeds and to keep the good manner in the cyber space as well as the real space, while the group of 'addicted to game' was permissible wrong and aggressive behaviors in the both cyber space and real space. Third, the group of 'novice for game' was less likely to participate in e-Sports activities(playing e-Sports game and watching TV) and to be less attracted to e-Sports than other groups. Moreover they had negative perspectives on e-Sports. In specific, they regarded it as a dangerous and addictive leisure activity hindering everyday life(study, relationship with peers/family etc) and health. These results would be used to develop game/e-Sports education program
It is known that change in the bone strength of cortical bone constituting the outer shell of long bones such as the tibia or radius due to aging and osteoporosis is a risk factor for fracture. In this study, the group velocity of time-reversed Lamb waves generated in tibial cortical bone in vivo was measured using a time reversal method, and the correlations of the group velocity with the cortical bone thickness (cTh) and cortical bone mineral density (cBMD) closely related to the bone strength were investigated. It was found that the group velocity of time-reversed Lamb waves measured in the right tibia of 7 subjects showed a very high correlation, r = 0.90 (p < 0.0001), with the cTh and a relatively low correlation, r = 0.69 (p < 0.0001), with the cBMD. A limitation of this in vivo study is that the group velocity of time-reversed Lamb waves was measured for a normal group consisting of only 7 healthy adults. In the future, if the clinical usefulness of the time-reversed Lamb wave is demonstrated by follow-up studies on normal and osteoporotic groups consisting of a large number of healthy adults and osteoporotic patients, respectively, it is expected to improve the reliability of quantitative ultrasound technology for osteoporosis diagnosis. In addition, it is necessary to expand the skeletal site for measuring the group velocity of time-reversed Lamb waves not only to the tibia but also to the femur or radius.
The increasing integration of intelligent information technologies within organizational systems has amplified the risk to personal information security. This escalation, in turn, has fueled growing apprehension about an organization's capabilities in safeguarding user data. While Internet users adopt a multifaceted approach in assessing a company's information security, existing research on the multiple dimensions of information security is decidedly sparse. Moreover, there is a conspicuous gap in investigations exploring whether users' evaluations of organizational information security differ across industry types. With an aim to bridge these gaps, our study strives to identify which information security attributes users perceive as most critical and to delve deeper into potential variations in these attributes across different industry sectors. To this end, we conducted a structured survey involving 498 users and utilized the analytic hierarchy process (AHP) to determine the relative significance of various information security attributes. Our results indicate that users place the greatest importance on the technological dimension of information security, followed closely by transparency. In the technological arena, banks and domestic portal providers earned high ratings, while for transparency, banks and governmental agencies stood out. Contrarily, social media providers received the lowest evaluations in both domains. By introducing a multidimensional model of information security attributes and highlighting the relative importance of each in the realm of information security research, this study provides a significant theoretical contribution. Moreover, the practical implications are noteworthy: our findings serve as a foundational resource for Internet service companies to discern the security attributes that demand their attention, thereby facilitating an enhancement of their information security measures.
Purpose: This study aimed to verify the impact of Habitat for Humanity Korea's disaster risk reduction intervention on the mental health and satisfaction with life among residents of southern Bangladesh who had constantly suffered from disaster stress due to perennial flooding. Method: The target group was 138 residents who were pre-surveyed in August 2020 and post-surveyed in November 2021. The interventions consisted of individual incremental housing, public facilities for evacuation, and disaster response training for capacity development. The data were analysed using paired sample t-tests for pre-post changes and one-way analysis of variance to identify differences between treatment groups. Result: The results showed significant improvements in residents' depression, anxiety, somatisation and satisfaction with life after the intervention, with significant differences in mental health levels between the intervention treatments. Specifically, relatively higher disaster mitigation effects were found for individual infrastructure improvements and employment facilities compared to disaster response drills. Conclusion: These results demonstrate the positive role of Habitat for Humanity Korea's disaster risk reduction interventions on the mental health recovery of disaster victims and suggest practical approaches that can be applied in disaster risk areas.
This research investigated the influences of excessively careful driving as well as chronic disease and medications on dangerousness of traffic accident in elderly drivers. Ninety-one drivers aged 65 years and older participated in the research. To evaluate the driving behavior, we used the self-rating on driving ability questionnaire asking driving speed, the amount of driving and driving situation adaptability' and surveyed the drive career, the number of violations and accidents experience(crash, crashed) for last three years. A review of the driving patterns of elderly drivers showed that the speed and amount of driving were decreased by increasing age. 'Driving- Situational Adaptability (DSA)' consisted of 2 factors such as 'Social Environment(SE)' and 'Physical Environment(PE)'. Elderly drivers reported that their confidence level was lower in PE than in SE. Moreover they had higher difficulty and stress in PE than in SE. DSA of elderly drivers had significant correlations with 'crash' and 'crashed'. This implies that excessively careful driving of elderly drivers directly associated with accidents. Elderly drivers who have nervous system disease or gastritis had more crash accidents. The majority of elderly drivers which take medicine by chronic disease don't think that medications give don't difficulty or inconvenience in driving and constantly drives during a term of taking medicine.
Oh, Mi Ju;Hong, Dahee;Lim, Kyung Jin;Kwon, Hyun-Han;Kim, Tae-Woong
Journal of Korea Water Resources Association
/
v.57
no.4
/
pp.237-248
/
2024
Watershed runoff that is an important component of the hydrological processes has been significantly altered by climate variability and human activities in many watersheds around the world. It is important to investigate the impacts of climate variability and human activities on watershed runoff change for water resource management. In this study, using watershed runoff data for 109 middle-sized watersheds in Korea, the impacts of climate variability and human activities on watershed runoff change were quantitatively evaluated. Using the Pittitt test, the analysis period was divided into two sub-periods, and the impacts of climate variability and human activities on the watershed runoff change were quantified using the Budyko hypothesis-based climate elasticity method. The overall results indicated that the relative contribution of climate variability and human activities to the watershed runoff change varied by middle-sized watersheds, and the dominant factors on the watershed runoff change were identified for each watershed among climate variability and human activities. The results of this study enable us to predict the watershed runoff change considering climate variability and watershed development plans, which provides useful information for establishing a water resource management plan to reduce the risk of hydrological disasters such as drought or flood.
With the advent of 4th industrial revolution, the manufacturing industry is converging with ICT and changing into the era of smart manufacturing. In the smart factory, all machines and facilities are connected based on ICT, and thus security should be further strengthened as it is exposed to complex security threats that were not previously recognized. To reduce the risk of security incidents and successfully implement smart factories, it is necessary to identify key security factors to be applied, taking into account the characteristics of the industrial environment of smart factories utilizing ICT. In this study, we propose a 'hierarchical classification model of security factors in smart factory' that includes terminal, network, platform/service categories and analyze the importance of security factors to be applied when developing smart factories. We conducted an assessment of importance of security factors to the groups of smart factories and security experts. In this study, the relative importance of security factors of smart factory was derived by using AHP technique, and the priority among the security factors is presented. Based on the results of this research, it contributes to building the smart factory more securely and establishing information security required in the era of smart manufacturing.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.