• 제목/요약/키워드: Delphi Survey Method

검색결과 240건 처리시간 0.027초

온톨로지 품질평가를 위한 평가항목 추출에 관한 연구 (Extracting Evaluation Criteria for Evaluating Ontology Quality)

  • 김성훈;오삼균
    • 정보관리학회지
    • /
    • 제32권2호
    • /
    • pp.193-219
    • /
    • 2015
  • 온톨로지의 평가는 잘 구축된 기존 온톨로지와 비교하는 방법, 활용될 애플리케이션에 적용해보는 방법, 원천데이터와의 적합성 관련성을 판단해보는 방법을 통해 이뤄지고 있다. 이와 같은 방법론은 온톨로지를 통해 얻게 된 결과에 치중되어 온톨로지의 체계, 의미표현, 상호운용성과 같은 내재적인 영역의 평가에 어려움이 있다. 본 연구는 온톨로지 전문가를 통해 온톨로지 품질평가를 위한 항목을 도출하였다. 문헌조사를 통해 온톨로지의 내재적 평가를 위한 범주를 추출하였고, 각 범주에 대한 평가항목을 델파이조사를 통해 전문가들에게 수집한 뒤, 수집된 평가항목을 재검증하였다. 그 결과, 처음 수집된 70개의 평가 항목에서 최종적으로 53개의 평가항목을 선정하였다. 또한 수집된 평가항목을 온톨로지 평가에 활용하여 봄으로써 평가항목의 신뢰도를 측정하였다.

공연예술상품 속성과 기대혜택에 대한 공연예술 전문가와 소비자의 인식 차이 비교 (Comparison of the Perceptions of Professionals and Consumers on the Product Attributes of and the Expected Benefits from Performing Arts)

  • 남정미;유소이
    • 한국콘텐츠학회논문지
    • /
    • 제15권5호
    • /
    • pp.66-77
    • /
    • 2015
  • 본 연구는 공연예술상품의 속성과 기대혜택에 대한 전문가와 소비자의 인식을 비교하고자 하였다. 우선 델파이기법을 활용하여 공연예술 작품을 제작하는데 직 간접적으로 연관되어 있는 전문가들을 대상으로 하여 소비자들이 공연예술상품을 선택하는데 있어서 중요하게 생각하는 속성과 상품을 통해 얻고자 하는 기대혜택에 대한 의견을 조사하였다. 이와 더불어 전문가 조사결과와 선행연구를 토대로 구성된 공연예술 상품의 속성과 기대혜택에 대한 설문항목에 대하여 일반 소비자를 대상으로 설문조사를 실시하였다. 조사결과 "공연작품의 내용", "공연장의 위치", "티켓 가격", "스트레스 해소", "삶의 질 향상" 등이 전문가와 소비자 모두에게 중요하다고 나타났다. 반면에 소비자와 비교하여 전문가들은 "출연진의 명성", "예술가의 기량", "공연장 인지도 및 공연단체 명성", "공연장의 위치", "대중매체 홍보", "자아실현"을 중요한 것으로 인식하고 있어 일부 항목들에 대하여 전문가들이 소비자들의 요구를 과대평가하고 있음을 알 수 있다.

TBM 터널 굴착 안정성에 영향을 미치는 위험요소 도출 및 중요도 결정 (Identification and importance analysis of hazards affecting the stability of TBM tunnelling works)

  • 성주현;윤준웅
    • 한국터널지하공간학회 논문집
    • /
    • 제19권6호
    • /
    • pp.973-984
    • /
    • 2017
  • 도심지에서 지하철, 공동구 등의 지하시설물 건설을 위해 TBM 터널 공법 적용의 필요성이 증가하고 있다. 터널공사는 지반의 변동성 및 불확실성으로 인하여 건설 중 다양한 사고 발생 위험요소를 내재하고 있고, 사고발생 시 인명 피해 유발 및 복구에 큰 비용이 소요되므로 계획 및 설계 단계에서 공사의 위험요소를 도출하고 저감 대책을 수립하는 리스크 관리가 매우 중요하다. 본 연구에서는 문헌 연구 및 전문가 의견 조사를 통하여 도심지 TBM 터널 공사 안정성에 영향을 미치는 총 31개의 위험요소를 도출하였고, 전문가 합의에 의한 의사결정 방법인 델파이 기법을 통해 위험요소별 중요도를 평가하였다. 최종적으로 내용타당도 기준을 만족하는 12개의 위험요소가 결정되었으며, TBM 터널공사 중 사고 예방을 위한 중점 관리요소로 활용 가능할 것이다.

사회적 평가 지표를 반영한 도시 홍수취약성 평가 (A Study on Urban Flood Vulnerability Assessment Considering Social Impact)

  • 이규민;최진원;전경수
    • 토지주택연구
    • /
    • 제11권1호
    • /
    • pp.109-116
    • /
    • 2020
  • This study aims to establish an approach to assess urban flood vulnerability by identifying social characteristics such as the road transportation and the vulnerable groups. Assessment procedures comprise three steps as: (1) composing the assessment criteria to reflect the urban characteristics; (2) calculating the weight; and (3) evaluating the vulnerability. The criteria were adopted by Delphi survey technique. Four criteria as land cover, residents, vulnerable areas, and disaster response were adopted in the current study. To determine the weight set of criteria, subjective and objective methods were combined. The weight set was determined using the combined method which reflects the Delphi method and Entropy analysis. In the process of data-based construction, GIS tools wwere used to extract administrative unit materials such as land cover, road status, and slope. Data on population and other social criteria were collected through the National Statistical Office and the Seoul Metropolitan statistical data. TOPSIS (Technique for Order of Preference by Similarity to Ideal Solution) technique, which uses materials from cell units in order to rank the closest distance to the best case and the farthest distance from the worst case by calculating the distances to the area of assessment, was applied to assess. The study area was the Dorimcheon basin, a flood special treatment area of Seoul city. The results from the current study indicates that the established urban flood vulnerability assessment approach is able to predict the inherent vulnerable factors in urban regions and to propose the area of priority control.

제4차 산업혁명관련 기업혁신활동 촉진·장애요인별 우선순위에 대한 탐색적 연구 (An Exploratory Study on Priorities of Facilitators and Impediments of Firm Innovation Activities Regarding the Fourth Industrial Revolution)

  • 김종석;강진원
    • 아태비즈니스연구
    • /
    • 제10권3호
    • /
    • pp.153-171
    • /
    • 2019
  • This is an exploratory study on facilitators, impediments and their priorities of firm innovation activities regarding the Fourth Industrial Revolution. This study adopted an inductive method to explore the properties and contents of the facilitators and impediments. 10 main factors and 30 sub-factors (15 facilitators, 15 impediments) were extracted through the Delphi survey. The highest priority goes to the factor of executive-level officers' minds and future strategies. By examining the properties and contents of 15 facilitators and 15 impediments of innovation activities, this study notices that the most factors are related to the prior stage of innovation. It indicates that each firms' innovation activities regarding the Fourth Industrial Revolution is not about the managing problems in (or of) innovation process, but closely associated with the degree of whether they are willing to be engaged with their innovation activities of the Fourth Industrial Revolution. In addition, this study proposes that the relationship between each firms' innovation activities on existing market/business and the new market/business regarding the Fourth Industrial Revolution can be predicted as a dynamic reverse one. 15 facilitators and 15 impediments can influence two types of innovation activities. Finally, this study suggests that through priorities of facilitators and impediments, leadership and future strategies, culture and organization, and (human) resource acquisition are the prioritized areas for a further study of innovation activities.

전문가집단을 통해 본 '농촌다움' 인식에 관한 기초연구: 델파이와 AHP분석을 중심으로 (A Basic Study on 'Ruralism' Perception through Expert Group: Focusing on Delphi and AHP Analysis)

  • 도지윤;서기춘;정명철;최진아
    • 환경영향평가
    • /
    • 제32권4호
    • /
    • pp.251-259
    • /
    • 2023
  • 본 연구는 새로운 시대에 변화하는 농촌다움의 새로운 규정과 범주를 위한 기초적 방향을 목적으로 수행되었다. 체계적 문헌고찰을 토대로 농촌다움의 정의, 기준, 범위, 구성요소 항목으로 구분하여 델파이 분석과 AHP분석을 실시한 결과는 다음과 같다. 첫째, 대부분의 농촌을 표상하는 연구를 통해 농촌다움이 가장 이슈가 된 키워드임을 파악할 수 있었으며, 농촌의 다양한 범위를 각각 연구하고 있어 이를 포괄하지 못하는 연구가 대다수임을 알 수 있었다. 둘째, 델파이 조사를 통하여 농촌다움의 규정 및 범주 설정을 위한 항목분류와 명확한 개념 정립을 위한 근거자료로 활용될 수 있는 키워드를 도출할 수 있었다. 셋째, 계층적 의사결정법을 통하여 항목별 기준선이 될 수 있는 우선순위 도출뿐만 아니라 경관적인 요인이 농촌다움을 형성하는 가장 중요한 것임을 파악할 수 있었다. 본 연구는 농촌다움 개념 정립을 위한 기초자료로 최소한의 기준선을 제공한 것에 의의가 있으며, 전문가 집단에 의존한 한계점을 극복하기 위하여 다양한 관점에서의 검토가 추가된다면 미래지향적인 농촌다움을 설정할 수 있을 것으로 판단된다.

델파이기법을 이용한 감리점검항목 도출 방안 - 하이퍼레저 패브릭 기반으로 (An Audit Method on Information System Audit using Delphi Method - Based on Hyperledger Fabric)

  • 이영주;박수용
    • 소프트웨어공학소사이어티 논문지
    • /
    • 제29권2호
    • /
    • pp.7-12
    • /
    • 2020
  • 국내 공공기관에서 사업비가 5억원 이상인정보시스템 구축사업은 정보시스템 감리대상이고 정보시스템 감리원은 감리기준에 따라 감리를 실시하여야 한다. 최근 금융산업을 넘어 제조, 헬스케어, 유통, 공공 부문 등 다양한 분야에 블록체인 기술이 적용되면서 블록체인 기술을 적용한 시스템 개발이 늘고 있다. 공공기관과 기업에서는 블록체인 기술을 적용하기 위해 프라이빗 블록체인인 하이퍼레저 패브릭을 사용이 증가 추세에 있다. 그러나, 새롭게 부상하고 있는 블록체인기반 시스템을 기존의 감리점검항목으로 감리를 수행하기에는 충분하지 않아 각 감리원들이 검증되지 않은 점검항목을 개별적으로 만들어 사용하고 있다. 따라서 블록체인을 적용한 시스템을 감리할때 검증된 감리점검 항목이 필요하다. 본 연구에서는 델파이 프로세스를 커스터마이징하여 블록체인 기술을 활용한 시스템 개발사업에 적합한 점검항목을 도출하고, 정보시스템 감리원의 설문조사를 통해 도출된 점검항목의 적정성을 검증받았다. 이번 연구는 정보시스템 감리원의 감리 수행에 직접적인 도움이 될 것이며, 블록체인 기반 시스템을 통해 서비스를 제공하는 사업자와 주관사도 시스템의 품질 향상에 기여할 것으로 기대된다.

한방병원의 침도 시술 동의서의 현황 조사와 델파이 기법을 활용한 표준 시술 동의서 개발 (Current Status of Informed Consent Form for Acupotomy in Korean Medicine Hospitals and Development of a Standard Informed Consent Form Using Delphi Method)

  • 김지훈;구본혁;김형준;서경숙;오명진;유명석;윤상훈;이광호;이현종;임정태;전형선;정인숙;최성운;이태욱;김연학;오유나;김건형;양기영;김은석
    • 대한한의학회지
    • /
    • 제45권1호
    • /
    • pp.182-201
    • /
    • 2024
  • Objectives: This study was conducted to develop a standard acupotomy consent form that takes into account the unique characteristics of Korean Medicine. The study was motivated by the increasing importance of patient autonomy and the growing number of legal disputes related to medical malpractice in the clinical field of Korean Medicine. Methods: The analysis phase of the study involved a survey of the current status of acupotomy consent forms in Korean Medicine hospitals nationwide. The items of each form were analyzed based on the contents of the Medical law and the standard contract for medical procedures of the Fair Trade Commission (FTC). In the development and evaluation phase, the items and contents of the acupotomy consent form were evaluated using a 5-point Likert scale and content validity was assessed through two rounds of Delphi surveys. In the improvement phase, the contents of the consent form were revised based on the results of a survey of inpatient and outpatient patients in the Department of Acupuncture and Moxibustion at Pusan National University Korean Medicine Hospital, and real-time online meeting. The final version of the standard acupotomy consent form was completed after undergoing proofreading and corrections by a linguistics expert. Results: Only 30% of Korean Medicine hospitals have implemented acupotomy consent forms. The items of the consent forms did not fully include the items presented in the Medical act and the standard contract for medical procedures of the FTC. To address this issue, two rounds of Delphi surveys and a real-time discussion were conducted with a panel of 12 experts on 27 preliminary items of consent forms. The items and contents that met the criteria for content validity ratio, convergence, and consensus were derived. Based on the derived items and content, a standard acupotomy consent form was developed. Conclusions: The standard consent form for acupotomy is anticipated to ensure patient autonomy and enhance transparency and liability in acupotomy. Furthermore, it is expected to serve as evidence in case of medical disputes related to acupotomy and contribute as a reference document for the development of standard consents forms for various procedures of Korean Medicine. However, the limitations of the study include that the survey of consent forms was limited to only training hospitals of Korean Medicine, and the standard consent form is only applicable to adults in Korea. Future studies are needed to address these limitations.

델파이 기법을 활용한 대학의 기술료 사용제도 개선방안 연구 (A Study of The Regulations on The Use of University Royalties using Delphi Technique)

  • 이재흥;신준우
    • 기술혁신학회지
    • /
    • 제16권1호
    • /
    • pp.323-345
    • /
    • 2013
  • 본 연구는 자체 연구재원 확보 및 연구역량 확충을 위해 기술료의 정부 반납제도 폐지(2008년)에 따라 기술료 사용의 재량권이 확대된 대학의 기술료 사용 현황을 진단하고, 기술료 제도의 의의라 할 수 있는 연구개발 선순환 관점에서 기술료 사용제도 개선방안을 모색해 보고자 각 대학 산학협력단에 근무하는 기술료 징수 관리 전문가 등을 대상으로 델파이 기법을 활용하여 조사하였다. 참여연구원 보상금 지급기준 미비 및 극히 소수(교수 중심)에 대한 보상금 지급, 연구개발 재투자 소홀, 각 부처 기술료 규정 상이 등이 문제점으로 조사되었는데, 이에 대해, (1) 과도한 수준의 참여연구원 보상금 사용비율 축소, (2) 기술이전 사업화 기여자에 대한 보상금 사용비율 확대 및 보상금 지급에 대한 교수 등 이해관계자들의 인식전환 노력, (3) 연구개발 재투자 규모 확대, (4) 각 부처의 기술료 사용기준 통일 및 대학 자체의 기술료 사용기준(학칙) 구체화, (5) 기술료 사용 우선순위 제도화 등 제도적 보완이 필요하다. 본 연구결과 도출된 기술료 사용 문제점 및 개선방안을 토대로 대학의 기술료 사용제도가 대학의 재정확충을 통해 자체 연구역량을 강화할 수 있는 방향으로 정착되기를 기대한다.

  • PDF

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • 제20권2호
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.