• Title/Summary/Keyword: Delegation

Search Result 264, Processing Time 0.028 seconds

Effects of Preparedness towards Delegation, Critical Thinking Disposition, and Communicative Competence on Job Satisfaction: A Comparison of Comprehensive Nursing Care Service Ward Nurses and General Ward Nurses (간호·간병통합서비스 병동 간호사와 일반 병동 간호사의 위임 준비성, 비판적 사고성향, 의사소통 능력이 직무만족에 미치는 영향)

  • Wi, Da Hye;Kim, Younkyoung
    • Journal of Korean Clinical Nursing Research
    • /
    • v.28 no.3
    • /
    • pp.211-222
    • /
    • 2022
  • Purpose: This study aimed to identify the effects of preparedness towards delegation, critical thinking disposition, and communicative competence on job satisfaction among comprehensive nursing care service ward nurses and general ward nurses. Methods: The participants in this study were 218 nurses from two university hospitals. Data were collected using self-administered questionnaires and were analyzed using SPSS Statistics/WIN 21.0, including descriptive statistics, x2 test, Fisher's exact test, t-test, ANOVA, Scheffeé test, Pearson's correlation coefficient, and multiple linear regression analysis. Results: For comprehensive nursing care service ward nurses, the significant influencing factors on job satisfaction were age (β=-.37, p=.041), marital status (β=.35, p=.001), critical thinking disposition (β=.29, p=.003), and communicative competence (β=.28, p=.002) with the explanatory power was 39.0% (F=12.00, p<.001). On the other hand, for general ward nurses, the significant influencing factors on job satisfaction were advanced degree (β=.29, p=.047), critical thinking disposition (β=.23, p=.040), and communicative competence (β=.42, p<.001) with the explanatory power was 33.0% (F=11.78, p<.001). Conclusion: The results of this study suggest the importance of developing and applying education programs to improve critical thinking disposition and communicative competence of nurses. This would enhance the comprehensive nursing service and increase overall nursing manpower resources. In addition, further studies are needed to improve nursing work environments and to develop strategies for enhancing preparedness towards delegation, which would increase the job satisfaction of nurses in the comprehensive nursing care service wards.

Improved Hierarchical Prefix Delegation Protocol for route optimization in nested NEMO (중첩된 NEMO에서의 경로 최적화를 위한 개선된 계층적 프리픽스 할당 프로토콜)

  • Rho Toung-Taeg
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.5 s.37
    • /
    • pp.227-236
    • /
    • 2005
  • Hierarchical Prefix Delegation (HPD) protocol refers to a type of solution to problems inherent in non-optimal routing which occurs with Network Mobility (NEMO) basic solution. However, because HPD cannot improve the micro-mobility Problems, Problem surfaces each time Mobile Network Node (MNN) changes the attachment point; as happens also in a Mobile IPv6 (MIPv6) protocol in sen야ng Binding Update (BU) messages to Home Agent (HA) / Correspondent Nodes(CNs) By applying Hierarchical Mobile IPv6 protocol concept to HPD, this study Proposes an algorithm for effectively handling micro-mobility problems which occur with HPD in a nested NEMO environment. By sending BU only to nearby Mobility Anchor Point(MAP) during MNN location change within a MAP's domain, the proposed protocol will alleviate service disruption delays and signaling loads during the handover process, overcoming the limitations of HPD.

  • PDF

Permission-Based Separation of Duty Model on Role-Based Access Control (역할기반 접근제어 환경에서 접근권한 기반의 임무분리 모델)

  • Oh Se-Jong
    • The KIPS Transactions:PartC
    • /
    • v.11C no.6 s.95
    • /
    • pp.725-730
    • /
    • 2004
  • Separation of Duty(SOD), with delegation, is one of important security principles in access control area. The role-based access control model adopts SOD principle, but it has some problems; SOD concept is inconsistent with role hierarchy, permissions that have no relation with SOD may be restricted, and delegation may violate SOD. We propose permission-based SOD model on role-based access control. We establishes SOD as a set of permissions instead of role level SOD. Furthermore we propose a principle of role activation. It solves SOD problems of RBAC and supports easy implementation of SOD policy.

Incentive Structures in the Compensation for Public Expropriation (공공수용 보상에 관한 유인체계 분석)

  • Lee, Hojun
    • KDI Journal of Economic Policy
    • /
    • v.33 no.3
    • /
    • pp.121-161
    • /
    • 2011
  • We study incentive structures of public developers and land owners in the process of public expropriations using a sequential game model. In the model, we show that there is an incentive for the public developer to give more compensation than just compensation that are defined by law. Also the model shows that there is an incentive for the land owners to revolt strategically against the public expropriation. Then an ideal authority delegation model is introduced to resolve the problems, where an independent appraiser determines the compensation for the expropriation. In the real world, improving the independence of appraisal process is critical to make the system closer to the ideal authority delegation model. So this paper concludes by making a few policy suggestions to improve the current appraisal system.

  • PDF

Design and Implementation of Admission Control System in Smart Space (스마트 공간을 위한 참여 제어 시스템의 설계 및 구현)

  • Yang Jong-Phil;Shim Mi-Sun;Shin Weon;Rhee Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.3
    • /
    • pp.342-352
    • /
    • 2006
  • Nowadays, Computing environment is changing to ubiquitous. In such ubiquitous computing environments, entities expect to access resources and services at any time from anywhere. Therefore, tile wily how to establish trust relationship among previously unknown devices or resources is needed under such environments. In this paper, we firstly review a model to delegate the trust to communicating entities in ubiquitous environment and its security problems(e.g., malicious right-delegation and revocation of right-delegation). Then, we design a new model for secure delegation over communication entities which is based on two-party signature scheme, and implement it.

  • PDF

Improved Hierarchical Prefix Delegation Protocol for route optimization in nested NEMO (중첩된 NEMO에서의 경로 최적화를 위한 개선된 계층적 프리픽스 할당 프로토콜)

  • Rho, Kyung-Taeg
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.1 s.39
    • /
    • pp.147-155
    • /
    • 2006
  • Hierarchical Prefix Delegation (HPD) protocol refers to a type of solution to problems inherent in non-optimal routing which occurs with Network Mobility (NEMO) basic solution. However, because HPD cannot improve the micro-mobility problems, problem surfaces each time Mobile Network Node (MNN) changes the attachment point; as happens also in a Mobile IPv6 (MIPv6) protocol in sending Binding Update (BU) messages to Home Agent (HA) / Correspondent Nodes(CNs). By applying Hierarchical Mobile IPv6 protocol concept to HPD, this study proposes an algorithm for effectively handling micro-mobility problems which occur with HPD in a nested NEMO environment. By sending BU only to nearby Mobility Anchor Point(MAP) during MNN location change within a MAP's domain, the proposed protocol will alleviate service disruption delays and signaling loads during the handover process, overcoming the limitations of HPD.

  • PDF

Remote Healthcare Monitoring System Using Attribute based Encryption (속성기반 암호화를 이용한 원격 헬스케어 모니터링 시스템)

  • Song, You-Jin;Do, Jeong-Min
    • The KIPS Transactions:PartC
    • /
    • v.19C no.1
    • /
    • pp.63-70
    • /
    • 2012
  • To ensure privacy of individual information in remote healthcare service, health data should be protected through a secure technology such as encryption scheme. Only user who delegated decryption right can access to sensitive health data and delegator needs capability for revocating access privilege. Recently, in ubiquitous environment, CP-ABTD(Ciphertext-Policy Attribute-Based Threshold Decryption with Flexible Delegation and Revocation of User Attributes) which extends CP-ABE(Ciphertext-Policy Attribute-Based Encryption) has been proposed for these requirements. In this paper, we construct remote healthcare monitoring system with delegation and revocation capability for attribute in CP-ABTD. Finally, we analyze collusion attack between users in our system.

The EU's Public Diplomacy in Asia and the World through Social Media: Sentiment and Semantic Network Analyses of Official Facebook Pages of European External Action Service and EU Delegation to the Republic of Korea

  • Yoon, Sung-Won;Chung, Sae Won
    • Journal of Contemporary Eastern Asia
    • /
    • v.19 no.2
    • /
    • pp.234-263
    • /
    • 2020
  • This study aims to assess the quality of the EU's public diplomacy efforts through social media. Specifically, this research explores the headquarters of European public diplomacy (European External Action Service, EEAS) and its subordinate agent (EU Delegation to South Korea, EUDK). The main research question is "how coherently and effectively does the EU execute public diplomacy strategies in the third countries?'' This study employs both quantitative and qualitative approaches―the former for the results presentation and the latter for the results interpretation. The results are summarized in two points. First, both the EEAS and the EUDK maintained an objective position by posting only neutral perspectives on their social media. Second, the narratives of the main actors were the same, but the main themes were different according to their contexts. The analysis discusses the effectiveness of the EU's strategic narratives by focusing on measuring message reception. Its limited findings were that social media postings could not induce the audiences' active discussion of the EU's diplomatic performances. The conclusion suggests that the EU should identify the expectations from its global counterparts and use these to forge the Union's strategic narratives.

Compatibility-Guaranteeing Software Component Evolution based on Composition Rules (안정적 확장이 보장되는 소프트웨어를 위한 정형적 조합 법칙)

  • Lee, Sunae;Lee, Joon-Sang;Bae, Doo-Hwan
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04c
    • /
    • pp.10-12
    • /
    • 2003
  • Since building large-scale software is usually bi9 burden to most developers, it has been an important issue for many researchers. In this paper, we suggest a mechanism that can be used to support such large-scale development. Through composition rules via subtyping within Statecharts, incremental construction of software can be achieved. Among the composition rules (i.e. delegation rule and mixin rule), we mainly focus on the delegation rule in our work. Not only we can check the subtype property. but also can verify the behavior compatibility of composite results that are available by composition rules. This new mechanism is helpful for analysts as well as designers, and it can be used as a guideline for incremental and compatible construction of component based software.

  • PDF

The Authentication Structure Based Mobile PKI (모바일 PKI 기반한 인증 구조)

  • 김미혜;서세영
    • The Journal of the Korea Contents Association
    • /
    • v.4 no.1
    • /
    • pp.67-75
    • /
    • 2004
  • In this paper, we design an authentication model based mobile PKI (Public Key Infrastructure). The authentication mood consists of Root-CA Home-network agent and Foreign-network agent. CA will going to gave the delegation ticket to Home-Agent or Foreign-Agent when they request. The authentication mode information security is various characteristic more then high speed, mobile network and low cost more then previous structure of assure information security.

  • PDF