• Title/Summary/Keyword: Delphi Survey Method

Search Result 245, Processing Time 0.038 seconds

An Audit Method on Information System Audit using Delphi Method - Based on Hyperledger Fabric (델파이기법을 이용한 감리점검항목 도출 방안 - 하이퍼레저 패브릭 기반으로)

  • Lee, Youngjoo;Park, Sooyong
    • Journal of Software Engineering Society
    • /
    • v.29 no.2
    • /
    • pp.7-12
    • /
    • 2020
  • A project to establish an information system with a project cost of more than 500 million won at a local public firm is subject to the Information System Audit (hereinafter referred to as IS Audit), and the IS Auditor shall conduct audit according to the audit criteria. Recently, as blockchain technology has been applied to various fields such as manufacturing, healthcare, distribution, and public sectors beyond the financial industry, the development of systems that apply blockchain technology is increasing. The use of Hyperledger Fabric, a private blockchain, is on the rise to utilize blockchain technology in public firms and private firms. However, the newly emerging blockchain-based system is not sufficient to carry out auditing with existing audit check items, so it has no choice but to make and use audit items individually. Therefore, a need for verified audit items for systems that base on blockchain technology has emerged. In this study, we customized the Delphi process to derive audit items suitable for the system development project using the blockchain technology, and verified the completeness and accuracy of the audit items derived through a survey by the IS Auditor. This research will be of direct help to the IS Auditor, and it is expected that operators and organizers who provide services through the blockchain-based system will also contribute to improving the quality of the system.

Current Status of Informed Consent Form for Acupotomy in Korean Medicine Hospitals and Development of a Standard Informed Consent Form Using Delphi Method (한방병원의 침도 시술 동의서의 현황 조사와 델파이 기법을 활용한 표준 시술 동의서 개발)

  • Jihun Kim;Bonhyuk Goo;Hyongjun Kim;Kyoungsuk Seo;Myungjin Oh;Myungseok Ryu;Sang-Hoon Yoon;Kwang Ho Lee;Hyun-Jong Lee;Jungtae Leem;Hyungsun Jun;Jeong Ihn Sook;Sung Woon Choi;Tae Wook Lee;Yeonhak Kim;Yoona Oh;Kunhyung Kim;Gi Young Yang;Eunseok Kim
    • The Journal of Korean Medicine
    • /
    • v.45 no.1
    • /
    • pp.182-201
    • /
    • 2024
  • Objectives: This study was conducted to develop a standard acupotomy consent form that takes into account the unique characteristics of Korean Medicine. The study was motivated by the increasing importance of patient autonomy and the growing number of legal disputes related to medical malpractice in the clinical field of Korean Medicine. Methods: The analysis phase of the study involved a survey of the current status of acupotomy consent forms in Korean Medicine hospitals nationwide. The items of each form were analyzed based on the contents of the Medical law and the standard contract for medical procedures of the Fair Trade Commission (FTC). In the development and evaluation phase, the items and contents of the acupotomy consent form were evaluated using a 5-point Likert scale and content validity was assessed through two rounds of Delphi surveys. In the improvement phase, the contents of the consent form were revised based on the results of a survey of inpatient and outpatient patients in the Department of Acupuncture and Moxibustion at Pusan National University Korean Medicine Hospital, and real-time online meeting. The final version of the standard acupotomy consent form was completed after undergoing proofreading and corrections by a linguistics expert. Results: Only 30% of Korean Medicine hospitals have implemented acupotomy consent forms. The items of the consent forms did not fully include the items presented in the Medical act and the standard contract for medical procedures of the FTC. To address this issue, two rounds of Delphi surveys and a real-time discussion were conducted with a panel of 12 experts on 27 preliminary items of consent forms. The items and contents that met the criteria for content validity ratio, convergence, and consensus were derived. Based on the derived items and content, a standard acupotomy consent form was developed. Conclusions: The standard consent form for acupotomy is anticipated to ensure patient autonomy and enhance transparency and liability in acupotomy. Furthermore, it is expected to serve as evidence in case of medical disputes related to acupotomy and contribute as a reference document for the development of standard consents forms for various procedures of Korean Medicine. However, the limitations of the study include that the survey of consent forms was limited to only training hospitals of Korean Medicine, and the standard consent form is only applicable to adults in Korea. Future studies are needed to address these limitations.

A Study of The Regulations on The Use of University Royalties using Delphi Technique (델파이 기법을 활용한 대학의 기술료 사용제도 개선방안 연구)

  • Lee, Jae-Heung;Shin, Jun-Woo
    • Journal of Korea Technology Innovation Society
    • /
    • v.16 no.1
    • /
    • pp.323-345
    • /
    • 2013
  • In this paper, problems with the Korean system regulating the use of university royalties are identified and investigated in order to suggest measures to improve the system in a way that provides a better R&D environment at universities. The Delphi technique was used to gather data from royalty specialists at universities and government ministries. The first Delphi survey conducted used open questions to identify problems in the use of university royalties. Then, closed questions were used for the second Delphi survey. The number of responses and the frequency of answers were analyzed after the first survey, and validity, stability, and reliability analyses were conducted for the second survey. The measures suggested to improve the system regulating the use of university royalties are as follows: First, bonuses for researchers, which are currently 50% or more of collected royalties, need to be decreased, as they are rather high compared to similar bonuses in developed countries, which are around 30% of collected royalties. The guideline for limiting the bonuses, which is explained as XX% or less of collected royalties, is suggested to prevent the excessive use of royalties. Second, rewards for those who contribute to technology transfer and commercialization should be increased. It is also important to build a consensus around the need to reward those who contribute to technology transfer and commercialization. Third, the scale of re-investment into R&D needs to increase. Regulations on royalties should be meaningfully applied to create a positive feedback structure for R&D, which can be described as the process of research, R&D outcomes, technology transfer, collecting royalties, rewarding researchers, and re-investing in R&D. To build a university's R&D capability, re-investment into R&D needs to be regularized as XX% or more of royalties. Fourth, regulations on the royalties of ministries and universities need to be unified. Each category for using royalties needs to be regularized, with detailed matters such as the guideline, process and method for using royalties specified. Also, universities need to make their own specific regulations. Fifth, specific priorities on the use of royalties need to be suggested. Regulation is necessary for the categories that do not have guideline and priorities for the use of royalties. It is hoped that the findings of this research will contribute to reinforcing the R&D capability of universities.

  • PDF

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.

A Study on the Experts' Agreement on the Patterns Classification of the Prescription for the Use of Menopausal Disorder (갱년기장애 사용처방과 변증분류에 관한 전문가 합의 연구)

  • Jeon, Soo-Hyung;Park, Young-Hee;Kim, Jong-Won;Chi, Gyoo-Yong;Lee, Ji-Yeon;Lee, In-Seon
    • The Journal of Korean Obstetrics and Gynecology
    • /
    • v.35 no.2
    • /
    • pp.70-86
    • /
    • 2022
  • Objectives: This study attempted to provide prescriptions that can be used according to the classification of menopausal disorders in order to increase the clinical utilization of CaPSPI (Diagnostic System for Climacteric and Postmenopausal Syndrome Pattern Identification). Methods: Delphi method survey was conducted for expert consensus on the Pattern Identification that could be used for each prescription by selecting frequent prescriptions based on the literature researched on the prescription of Korean medicine used for women with menopausal disorders. 11 experts participated in the questionnaire for posterity and 7 experts for sasang constitution. The survey was divided into the main prescription that can be mainly used for the patterns and the minor prescription that can be used although the suitability is somewhat low. Expert consensus was obtained through the second survey, and the pattern classification of prescriptions that were not confirmed here was confirmed through a face-to-face meeting. Results: There were 56 prescriptions mainly used for treatment for menopause, 45 for posterity and 11 for Sasang constitution. There were 69 identifications of 45 posterity prescriptions and 17 classifications of 11 Sasang constitutional prescriptions including major and minor patterns. By pattern identifications, the number of major/minor prescriptions was as follows. 肝鬱 14/5, 腎陰虛 8/2, 腎陽虛 4/1, 肝腎陰虛 2/7, 腎陰陽兩虛 3/1, 心腎不交 6/3, 心脾兩虛 15/2, 心火 7/6. Conclusions: In the future, by accumulating and analyzing the data on the diagnosis and treatment using CaPSPI, the clinical status of Korean medicine for menopausal disorders can be reviewed, and it can be used as the basis for the clinical practice guidelines for menopausal disorders. In addition, it is thought that analyzing the results of the diagnosis of pattern identifications and the prescription of Sasang constitution can be helpful in research on the posterity and Sasang constitution.

The Development of Beekeeping Farm Management and Marketing Standard Diagnostic Checklist (양봉농가 표준 경영과 마케팅 진단표 개발)

  • Lee, Cheol-Whi;Song, Jeon-Eui;Jang, Hyun-Dong;Choi, Chil-Gu;Kim, Woong;Choi, Jae-Hyuk;Huh, Moo-Yul;Kwon, Se-Hyug;Hwang, Su-Yeon
    • Journal of Distribution Science
    • /
    • v.13 no.10
    • /
    • pp.115-122
    • /
    • 2015
  • Purpose - This study was conducted to develop a beekeeping farm management standard checklist. This is essential to increase the competitive power of beekeeping farmers. Checklists in relation to crops and livestock were established by the Rural Development Administration in the 2000s. To date, 60 checklists have been created by crop and livestock experts. However, other farmers outside the 60 checklists are increasing. Therefore, extra development is required for these farmers. This study was conducted to meet farmers' requirements. The special farming dealt with in this study is beekeeping. Such checklists were not developed due to the small number of beekeeping farmers. However, these days, a number of such farmers are emerging. Research design, data, and methodology - Many related experts participated in this study. This study was conducted in four stages. First, a basic outline of beekeeping was created by surveying many kinds of beekeeping experts. The draft of the beekeeping checklist was created by a secondary advisory council. This draft was then sent to 14 beekeeping experts to confirm whether or not it was suitable as a management checklist. For collecting the experts' opinions, a direct visit survey was done through an arranged questionnaire. Additionally, a basic management checklist blueprint was reviewed by many experts. In the third stage, a Delphi survey method was utilized with a special Delphi questionnaire. In this stage, experts who participated in the first and second stages were excluded. As there were uncertain answers among them, a second Delphi survey was done. As a result of this survey, all answers were agreed among them. Results - From the results of this survey, four subjects in the management accomplishment index were determined. These are farming scale, average product per beehive, the sale price of honey (1kg), and the number of bee plates in the beehive. In the case of the management checklist content, five items were determined. These are beekeeping farming facilities, the environment around the farm land and general management, the product management of the beekeeping harvest, the management of the disease and pest, and farming management. This checklist will be utilized for beekeeping farmers to implement in a management situation. Conclusions - These days, the number of beekeeping farmers is increasing. The management checklist for beekeeping farmers will be used to improve their farming situation and marketing. Beekeeping farmers can understand their management by reviewing their checklist. After checking, the situation of management can be analyzed. Farmers can supplement weaknesses with expert advice. This checklist will be used by agricultural technique extension workers for farming management consulting. This checklist has to be complemented by a change in the management of the environment. This checklist will be delivered to beekeeping farmers after a verification survey is done. The result of the checklist score will be utilized for a benchmarking service to be implemented for beekeeping farmers to utilize.

An Empirical Study of Selection of Cruise Terminals Location by Using HFP (계층퍼지분석법(HFP)을 이용한 크루즈 터미널 입지 선정에 관한 연구)

  • CHOI DO-SUEK;LEE SANG-HWA
    • Journal of Ocean Engineering and Technology
    • /
    • v.19 no.4 s.65
    • /
    • pp.56-65
    • /
    • 2005
  • This study aims at selecting optimum locations for cruise terminal This study uses the HFP(Hierarchical Fuzzy Process) based on the fuzzy theory, which is known to be effective in evaluating a complicated system whose evaluation attribut are vague or overlapping with one another such as the elements in selecting cruise terminal location and in treating both qualitative and quantitative data.

A study on Program Development of Traditional Living Culture for Viable Rural Community (농촌지역 활성화를 위한 전통생활문화 프로그램 개발에 관한 연구)

  • Park, Un-Shik;Park, Duk-Byeong;Lee, Han-Ki
    • Journal of Korean Society of Rural Planning
    • /
    • v.9 no.1 s.18
    • /
    • pp.37-46
    • /
    • 2003
  • The purpose of this study was to develop the program of traditional living culture for people to sustain viable rural community in Korea. The study was conducted by literature review, survey, interview, and delphi method. The results of this study were as follows; First, the program was developed to response to educational roles and functions. Second, the program was developed to utilize elder people for viable community as programs practitioners. Third, the factors of traditional cultural program for endogenous development were human resources, community organization and community participation, and natural and cultural resources. Forth, the program was developed to view the community resources as a systems because the culture was communicated through relationship rather than heritage. The re-valorization of cultural resources by the programs will provide local people with strategic capacity for endogenous development and for the harnessing of extra-focal forces in a market economy.

The Development of Education Method and Model for Convergence Reading Education in School Library (학교도서관 융합독서교육을 위한 교육방법 및 모형개발)

  • Cho, Soo-Youn;Cho, Miah
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.56 no.2
    • /
    • pp.5-33
    • /
    • 2022
  • In this study, the direction and contents of public education to develop competencies that are in line with the 2022 revised curriculum and the paradigm of future education were sought, and a plan for reading education was prepared. A creative and cooperative problem-solving method and process as not only information literacy ability to read, select, and reconstruct information but also transformative competency to respond to uncertain future and diversified situations are important amid the complex, pluralistic and rapid development of information and communication technology It was intended to give an experience of exploring and communicating through reading in order to explore and derive it. Analyze the general outline and syllabus of the curriculum, international education project definitions and indicators, and organize academic theories and research to set the direction and goal of high school reading education, and organize creative and convergence class strategies and reading activities A library reading class model was developed. Accordingly, the class model was revised by applying the development research method, and the final model was developed by supplementing it through field application evaluation. In order to achieve the research purpose end, a two-round Delphi survey was conducted on 10 reading education and curriculum experts. The model modified through the Delphi survey was developed in the final school library convergence reading class model by demonstrating the class in the educational field and supplementing it through application evaluation.

An Analysis on the Problems of Design Competition Process of Landscape Architecture by the Delphi Analysis Method (델파이 분석을 통한 조경설계공모 과정의 문제점 분석)

  • Lee, Joo-Hee;Cho, Se-Hwan
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.41 no.3
    • /
    • pp.83-93
    • /
    • 2013
  • This study has been performed to analyze and consider the problems after 30 years in terms of landscape design competition process in Korea, so that it can provide the basic data, which can improve the future landscape design competition. We have used Delphi Investigation to carry out a survey that targets professionals and identifies problems. The results are summarized as follows. Firstly, the results of the analysis of Landscape Design Competition for institution theory and case studies showed that there is an issue from four perspectives which are 'method of design competition', 'guidelines for design competition', 'winner selection process', and 'design changes after winning' Secondly, the process by professional Delphi performed expert analysis, and agree with expert opinion. As a result, we derived the problems of a landscape design competition system with the 12 items. Third, in the 'design competition style', two items, the 'design competition style' and 'problem of design public offering period' had become a problem. Fourth, the 'Guidelines for design competition', 'non-hierarchical excess of the amount of instructions', 'directive determined the guidelines', and the 'provision of confusion' three items had also become a problem. Fifth, 'sex expert committee review selection process winning work', 'Problems of participation', 'examination scoring system experts lack', and 'non-landscaping' had become a problem. Sixth, 'The design of the original order' as much as possible 'design changes after the winning work' Four 'order to Comments to reduce the creativity of the design of the climate', 'original extension', 'contractor feedback of excess without the promise of frequent personnel changes', design period of the person in charge is reflected in excess item has become a problem. I considered that a continuous research on the improvement of the problems of the landscape design competition system based on the results must be performed.