• Title/Summary/Keyword: Data collection standards

Search Result 124, Processing Time 0.791 seconds

Application of LCA Methodology on Lettuce Cropping Systems in Protected Cultivation (시설재배 상추에 대한 전과정평가 (LCA) 방법론 적용)

  • Ryu, Jong-Hee;Kim, Kye-Hoon
    • Korean Journal of Soil Science and Fertilizer
    • /
    • v.43 no.5
    • /
    • pp.705-715
    • /
    • 2010
  • The adoption of carbon foot print system is being activated mostly in the developed countries as one of the long-term response towards tightened up regulations and standards on carbon emission in the agricultural sector. The Korean Ministry of Environment excluded the primary agricultural products from the carbon foot print system due to lack of LCI (life cycle inventory) database in agriculture. Therefore, the research on and establishment of LCI database in the agriculture for adoption of carbon foot print system is urgent. Development of LCA (life cycle assessment) methodology for application of LCA to agricultural environment in Korea is also very important. Application of LCA methodology to agricultural environment in Korea is an early stage. Therefore, this study was carried out to find out the effect of lettuce cultivation on agricultural environment by establishing LCA methodology. Data collection of agricultural input and output for establishing LCI was carried out by collecting statistical data and documents on income from agro and livestock products prepared by RDA. LCA methodology for agriculture was reviewed by investigating LCA methodology and LCA applications of foreign countries. Results based on 1 kg of lettuce production showed that inputs including N, P, organic fertilizers, compound fertilizers and crop protectants were the main sources of major emission factor during lettuce cropping process. The amount of inputs considering the amount of active ingredients was required to estimate the actual quantity of the inputs used. Major emissions due to agricultural activities were $N_2O$ (emission to air) and ${NO_3}^-$/${PO_4}^-$ (emission to water) from fertilizers, organic compounds from pesticides and air pollutants from fossil fuel combustion in using agricultural machines. The softwares for LCIA (life cycle impact assessment) and LCA used in Korea are 'PASS' and 'TOTAL' which have been developed by the Ministry of Knowledge Economy and the Ministry of Environment. However, the models used for the softwares are the ones developed in foreign countries. In the future, development of models and optimization of factors for characterization, normalization and weighting suitable to Korean agricultural environment need to be done for more precise LCA analysis in the agricultural area.

A Study for Investigating of Predictors of Compliance for Preventive Health Behavior. -centered on early detection of cervical cancer- (예방적 건강행위 이행의 예측인자 발견을 위한 연구-자궁암 조기발견을 중심으로-)

  • 이종경
    • Journal of Korean Academy of Nursing
    • /
    • v.12 no.1
    • /
    • pp.25-38
    • /
    • 1982
  • As technological civilization and medical science has developed, standards of living have imp-roved and human life expectancy has been extended. But the incidence and mortality rate of cancer have been gradually increasing due to the pollution of the environment. Even though cancer is still a great threat to human beings, the etiology and appropriate cure forcancerhavenotyetbeendiscovered. The early detection and treatment of cancer is urgently needed. This study concentrates on the health behavior of woman regarding the papanicolau smear for early detection of cervical cancer. It was done in order to provide a direction for scientific health education materials by investigating predictors of preventive health behavior. The subjects for this study were made up of 54 woman, who comply with preventive health practices(compliant) who attended the Cervical Cancer Center of Y University Hospital in order to have tests for early detection of cervical cancer and 54 woman who did not comply with preventive health practices (noncompliant) selected from 100 housewives of I apartment, Kang Nam Ku, Seoul. The study method used, was a questionnaire for the compliance group and an interview for the noncompliance group. The period for data collection was from October 13th to October 24th. 1981. Analysis of the data was done using percentages, T-test, Pearson Correlation and Stepwise Multiple Regression. The results of study were as follows: 1. The hypotheses tested were based on the health belief model; 1) The first hypothesis,“The compliant may have more knowledge of the cervical cancer than the noncompliant”was rejected(T=-1.86, p>.05) 2) The second hypothesis,“The compliant may have a higher severity of cervical cancer than the noncompliant”was accepted (T=5.41, p<.001) 3) The third hypothesis, “The compliant may have a higher susceptability to cervical cancer than the noncompliant”was accepted(T=3.51, p<.01). 4) The fourth hypothesis,“The compliant may have more beneHt than cost'from the cervical cancer tests than the noncompliant" was accepted(T=7.46, p<.001). 5) The fifth hypothesis,“The compliant may have more health concern than the noncompliant”. was accepted(T=3.39, p<.01). These results show that severity, susceptability, benefit(over cost) and health concern influence the preventive health behavior in this Study. 2. In the correlation among variables, it was found that the knowledge of cervical cancer and the benefit(over cost) of preventive health behavior were negatively correlated(r=-2.75, p<.01), Severity of cervical cancer and benefit (over cost) of preventive health behavior were positively correlated(r=.280, p<.01), severity and susceptability of cervical cancer were positively correlated(r= .238, p<.01), benefit(over cost) and health concern were positively correlated(r= .299, p<.01). The benefit(over cost) may be raised by increasing the severity and health concern. Therefore the compliance rate of woman may be raised through health education by increasing the benefit(over cost) of the individual. 3. The Stepwise Multiple Regression between health behavior and predictors. 1) The factor“Benefit(over cost)”could account for preventive health behavior in 34.4% of the sample(F=55.6204 P<.01). 2) When the factor“Severity”is added to this, it accounts for 44.3% of preventive health behavior(F=41.679, p<.01). 3) When the factor“Susceptability”is also included, it accounts for 46.7% of preventive health behavior(F=30.373, p<.01). 4) When the factor “Health concern”is included, it accounts for 48.1% of preventive health behavior(F=23859, p<.05). This means that other factors appear to influence preventive health behavior, since the combination of variables explains only 48.1% of the Preventive health behavior. Therefore further study to investigate the predictors of preventive health behavior is necessary.

  • PDF

Permanent Preservation and Use of Historical Archives : Preservation Issues Digitization of Historical Collection (역사기록물(Archives)의 항구적인 보존화 이용 : 보존전략과 디지털정보화)

  • Lee, Sang-min
    • The Korean Journal of Archival Studies
    • /
    • no.1
    • /
    • pp.23-76
    • /
    • 2000
  • In this paper, I examined what have been researched and determined about preservation strategy and selection of preservation media in the western archival community. Archivists have primarily been concerned with 'preservation' and 'use' of archival materials worth of being preserved permanently. In the new information era, preservation and use of archival materials were faced with new challenge. Life expectancy of paper records was shortened due to acidification and brittleness of the modem papers. Also emergence of information technology affects the traditional way of preservation and use of archival materials. User expectations are becoming so high technology-oriented and so complicated as to make archivists act like information managers using computer technology rather than traditional archival handicraft. Preservation strategy plays an important role in archival management as well as information management. For a cost-effective management of archives and archival institutions, preservation strategy is a must. The preservation strategy encompasses all aspects of archival preservation process and practices, from selection of archives, appraisal, inventorying, arrangement, description, conservation, microfilming or digitization, archival buildings, and access service. Those archival functions should be considered in their relations to each other to ensure proper preservation of archival materials. In the integrated preservation strategy, 'preservation' and 'use' should be combined and fulfilled without sacrificing the other. Preservation strategy planning is essential to determine the policies of archives to preserve their holdings safe and provide people with a maximum access in most effective ways. Preservation microfilming is to ensure permanent preservation of information held in important archival materials. To do this, a detailed standardization has been developed to guarantee the permanence of microfilm as well as its product quality. Silver gelatin film can last up to 500 years in the optimum storage environment and the most viable option for permanent preservation media. ISO and ANIS developed such standards for the quality of microfilms and microfilming technology. Preservation microfilming guidelines was also developed to ensure effective archival management and picture quality of microfilms. It is essential to assess the need of preservation microfilming. Limit in resources always put a restraint on preservation management. Appraisal (and selection) of what to be preserved was the most important part of preservation microfilming. In addition, microfilms with standard quality can be scanned to produce quality digital images for instant use through internet. As information technology develops, archivists began to utilize information technology to make preservation easier and more economical, and to promote use of archival materials through computer communication network. Digitization was introduced to provide easy and universal access to unique archives, and its large capacity of preserving archival data seems very promising. However, digitization, i.e., transferring images of records to electronic codes, still, needs to be standardized. Digitized data are electronic records, and st present electronic records are very unstable and not to be preserved permanently. Digital media including optical disks materials have not been proved as reliable media for permanent preservation. Due to their chemical coating and physical character using light, they are not stable and can be preserved at best 100 years in the optimum storage environment. Most CD-R can last only 20 years. Furthermore, obsolescence of hardware and software makes hard to reproduce digital images made from earlier versions. Even if when reformatting is possible, the cost of refreshing or upgrading of digital images is very expensive and the very process has to be done at least every five to ten years. No standard for this obsolescence of hardware and software has come into being yet. In short, digital permanence is not a fact, but remains to be uncertain possibility. Archivists must consider in their preservation planning both risk of introducing new technology and promising possibility of new technology at the same time. In planning digitization of historical materials, archivists should incorporate planning for maintaining digitized images and reformatting them in the coming generations of new applications. Without the comprehensive planning, future use of the expensive digital images will become unavailable. And that is a loss of information, and a final failure of both 'preservation' and 'use' of archival materials. As peter Adelstein said, it is wise to be conservative when considerations of conservations are involved.

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF