• Title/Summary/Keyword: Design Decision Review

Search Result 193, Processing Time 0.023 seconds

Design and Implementation of Mobile Medical Information System Based Radio Frequency IDentification (RFID 기반의 모바일 의료정보시스템의 설계 및 구현)

  • Kim, Chang-Soo;Kim, Hwa-Gon
    • Journal of radiological science and technology
    • /
    • v.28 no.4
    • /
    • pp.317-325
    • /
    • 2005
  • The recent medical treatment guidelines and the development of information technology make hospitals reduce the expense in surrounding environment and it requires improving the quality of medical treatment of the hospital. That is, with the new guidelines and technology, hospital business escapes simple fee calculation and insurance claim center. Moreover, MIS(Medical Information System), PACS(Picture Archiving and Communications System), OCS(Order Communicating System), EMR(Electronic Medical Record), DSS(Decision Support System) are also developing. Medical Information System is evolved toward integration of medical IT and situation si changing with increasing high speed in the ICT convergence. These changes and development of ubiquitous environment require fundamental change of medical information system. Mobile medical information system refers to construct wireless system of hospital which has constructed in existing environment. Through RFID development in existing system, anyone can log on easily to Internet whenever and wherever. RFID is one of the technologies for Automatic Identification and Data Capture(AIDC). It is the core technology to implement Automatic processing system. This paper provides a comprehensive basic review of RFID model in Korea and suggests the evolution direction for further advanced RFID application services. In addition, designed and implemented DB server's agent program and Client program of Mobile application that recognized RFID tag and patient data in the ubiquitous environments. This system implemented medical information system that performed patient data based EMR, HIS, PACS DB environments, and so reduced delay time of requisition, medical treatment, lab.

  • PDF

Cases of Ethical Violation in Research Publications: Through Editorial Decision Making Process (편집심사업무 관점에서 학술지 윤리강화를 위한 표절 검증사례)

  • Hwang, Hee-Joong;Lee, Jung-Wan;Kim, Dong-Ho;Shin, Dong-Jin;Kim, Byoung-Goo;Kim, Tae-Joong;Lee, Yong-Ki;Kim, Wan-Ki;Youn, Myoung-Kil
    • Journal of Distribution Science
    • /
    • v.15 no.5
    • /
    • pp.49-52
    • /
    • 2017
  • Purpose - To improve and strengthen existing publication and research ethics, KODISA has identified and presented various cases which have violated publication and research ethics and principles in recent years. The editorial office of KODISA has been providing and continues to provide advice and feedback on publication ethics to researchers during peer review and editorial decision making process. Providing advice and feedback on publication ethics will ensure researchers to have an opportunity to correct their mistakes or make appropriate decisions and avoid any violations in research ethics. The purpose of this paper is to identify different cases of ethical violation in research and inform and educate researchers to avoid any violations in publication and research ethics. Furthermore, this article will demonstrate how KODISA journals identify and penalize ethical violations and strengthens its publication ethics and practices. Research design, data and methodology - This paper examines different types of ethical violation in publication and research ethics. The paper identifies and analyzes all ethical violations in research and combines them into five general categories. Those five general types of ethical violations are thoroughly examined and discussed. Results - Ethical violations of research occur in various forms at regular intervals; in other words, unethical researchers tend to commit different types of ethical violations repeatedly at same time. The five categories of ethical violation in research are as follows: (1) Arbitrary changes or additions in author(s) happen frequently in thesis/dissertation related publications. (2) Self plagiarism, submitting same work or mixture of previous works with or without using proper citations, also occurs frequently, but the most common type of plagiarism is changing the statistical results and using them to present as the results of the empirical analysis; (3) Translation plagiarism, another ethical violation in publication, is difficult to detect but occurs frequently; (4) Fabrication of data or statistical analysis also occurs frequently. KODISA requires authors to submit the results of the empirical analysis of the paper (the output of the statistical program) to prevent this type of ethical violation; (5) Mashup or aggregator plagiarism, submitting a mix of several different works with or without proper citations without alterations, is very difficult to detect, and KODISA journals consider this type of plagiarism as the worst ethical violation. Conclusions - There are some individual cases of ethical violation in research and publication that could not be included in the five categories presented throughout the paper. KODISA and its editorial office should continue to develop, revise, and strengthen their publication ethics, to learn and share different ways to detect any ethical violations in research and publication, to train and educate its editorial members and researchers, and to analyze and share different cases of ethical violations with the scholarly community.

Critical Review about the Character of Communication among Participating Stakeholders in the Improving Alley Landscapes in Residential Neighborhoods Project (주거지골목길 경관개선사업에서 참여 이해관계자의 의사소통 특성)

  • Kim, Yun-Geum;Lee, Ai-Ran
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.44 no.2
    • /
    • pp.25-36
    • /
    • 2016
  • This paper discusses the character of communication among participating stakeholders in the Improving Alley Landscapes in Residential Neighborhoods project. The participation of diverse stakeholders in conventional urban redevelopment is considered to delay and complicate the progress of a project. However, in urban regeneration, a field-oriented operating system and collaboration between diverse stakeholders is considered critical to building a sustainable community. A stakeholder is defined as "a person or organization that can influence decision-making or be influenced by it." This paper uses a case study to examine what types of stakeholders participate and what communicative processes and ideas are shared among them. Six neighborhoods were selected out of a total of 26 of Seoul's 2014 Improving Alley Landscapes project. This research was developed through interviews and a review of the literature. The character of communication among stakeholders in the case study is as follows. Firstly, the administration initiated the project but did not show leadership. This was caused by a gap in understanding about the project between city and borough administrations, Further, the city administration lacked experience with projects that placed an emphasis on fieldwork. Tongjand and Banjang, at ancillary institutions, acted as spokespersons and helped people in the community to understand the administrative process. However, because they led communication and used personal relationships to ensure they communicated effectively, the communication process had limits from the perspective of democratic process. Diverse stakeholders expressed their opinions in the public sphere and communicated about them using diverse media. Finally, experts produced the output, facilitated communication, and mediated in conflicts. Because new experts acted as facilitators and mediators, there was a great deal of trial and error. This project has particular significance: Seoul's city government deals with urban space rather than parks and green space, which are limited by boundaries; and whether "green" can be used for urban renovation was tested by several landscape architects, who sought to identify a new role in urban renovation, namely, the role of landscape and landscape architecture. However, the project has some limitations, including an insufficiently detailed project plan, a lack of common understanding among stakeholders, and a short timeframe. A number of stakeholders overcame these limitations to a certain degree. Officials of the Borough and the Dong managed the project and resolved civil complaints. Experts provided special information, and contributed to the design and construction of improvements.

A Conceptual Review of the Transaction Costs within a Distribution Channel (유통경로내의 거래비용에 대한 개념적 고찰)

  • Kwon, Young-Sik;Mun, Jang-Sil
    • Journal of Distribution Science
    • /
    • v.10 no.2
    • /
    • pp.29-41
    • /
    • 2012
  • This paper undertakes a conceptual review of transaction cost to broaden the understanding of the transaction cost analysis (TCA) approach. More than 40 years have passed since Coase's fundamental insight that transaction, coordination, and contracting costs must be considered explicitly in explaining the extent of vertical integration. Coase (1937) forced economists to identify previously neglected constraints on the trading process to foster efficient intrafirm, rather than interfirm, transactions. The transaction cost approach to economic organization study regards transactions as the basic units of analysis and holds that understanding transaction cost economy is central to organizational study. The approach applies to determining efficient boundaries, as between firms and markets, and to internal transaction organization, including employment relations design. TCA, developed principally by Oliver Williamson (1975,1979,1981a) blends institutional economics, organizational theory, and contract law. Further progress in transaction costs research awaits the identification of critical dimensions in which transaction costs differ and an examination of the economizing properties of alternative institutional modes for organizing transactions. The crucial investment distinction is: To what degree are transaction-specific (non-marketable) expenses incurred? Unspecialized items pose few hazards, since buyers can turn toalternative sources, and suppliers can sell output intended for one order to other buyers. Non-marketability problems arise when specific parties' identities have important cost-bearing consequences. Transactions of this kind are labeled idiosyncratic. The summarized results of the review are as follows. First, firms' distribution decisions often prompt examination of the make-or-buy question: Should a marketing activity be performed within the organization by company employees or contracted to an external agent? Second, manufacturers introducing an industrial product to a foreign market face a difficult decision. Should the product be marketed primarily by captive agents (the company sales force and distribution division) or independent intermediaries (outside sales agents and distribution)? Third, the authors develop a theoretical extension to the basic transaction cost model by combining insights from various theories with the TCA approach. Fourth, other such extensions are likely required for the general model to be applied to different channel situations. It is naive to assume the basic model appliesacross markedly different channel contexts without modifications and extensions. Although this study contributes to scholastic research, it is limited by several factors. First, the theoretical perspective of TCA has attracted considerable recent interest in the area of marketing channels. The analysis aims to match the properties of efficient governance structures with the attributes of the transaction. Second, empirical evidence about TCA's basic propositions is sketchy. Apart from Anderson's (1985) study of the vertical integration of the selling function and John's (1984) study of opportunism by franchised dealers, virtually no marketing studies involving the constructs implicated in the analysis have been reported. We hope, therefore, that further research will clarify distinctions between the different aspects of specific assets. Another important line of future research is the integration of efficiency-oriented TCA with organizational approaches that emphasize specific assets' conceptual definition and industry structure. Finally, research of transaction costs, uncertainty, opportunism, and switching costs is critical to future study.

  • PDF

Multi-Dimensional Analysis Method of Product Reviews for Market Insight (마켓 인사이트를 위한 상품 리뷰의 다차원 분석 방안)

  • Park, Jeong Hyun;Lee, Seo Ho;Lim, Gyu Jin;Yeo, Un Yeong;Kim, Jong Woo
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.2
    • /
    • pp.57-78
    • /
    • 2020
  • With the development of the Internet, consumers have had an opportunity to check product information easily through E-Commerce. Product reviews used in the process of purchasing goods are based on user experience, allowing consumers to engage as producers of information as well as refer to information. This can be a way to increase the efficiency of purchasing decisions from the perspective of consumers, and from the seller's point of view, it can help develop products and strengthen their competitiveness. However, it takes a lot of time and effort to understand the overall assessment and assessment dimensions of the products that I think are important in reading the vast amount of product reviews offered by E-Commerce for the products consumers want to compare. This is because product reviews are unstructured information and it is difficult to read sentiment of reviews and assessment dimension immediately. For example, consumers who want to purchase a laptop would like to check the assessment of comparative products at each dimension, such as performance, weight, delivery, speed, and design. Therefore, in this paper, we would like to propose a method to automatically generate multi-dimensional product assessment scores in product reviews that we would like to compare. The methods presented in this study consist largely of two phases. One is the pre-preparation phase and the second is the individual product scoring phase. In the pre-preparation phase, a dimensioned classification model and a sentiment analysis model are created based on a review of the large category product group review. By combining word embedding and association analysis, the dimensioned classification model complements the limitation that word embedding methods for finding relevance between dimensions and words in existing studies see only the distance of words in sentences. Sentiment analysis models generate CNN models by organizing learning data tagged with positives and negatives on a phrase unit for accurate polarity detection. Through this, the individual product scoring phase applies the models pre-prepared for the phrase unit review. Multi-dimensional assessment scores can be obtained by aggregating them by assessment dimension according to the proportion of reviews organized like this, which are grouped among those that are judged to describe a specific dimension for each phrase. In the experiment of this paper, approximately 260,000 reviews of the large category product group are collected to form a dimensioned classification model and a sentiment analysis model. In addition, reviews of the laptops of S and L companies selling at E-Commerce are collected and used as experimental data, respectively. The dimensioned classification model classified individual product reviews broken down into phrases into six assessment dimensions and combined the existing word embedding method with an association analysis indicating frequency between words and dimensions. As a result of combining word embedding and association analysis, the accuracy of the model increased by 13.7%. The sentiment analysis models could be seen to closely analyze the assessment when they were taught in a phrase unit rather than in sentences. As a result, it was confirmed that the accuracy was 29.4% higher than the sentence-based model. Through this study, both sellers and consumers can expect efficient decision making in purchasing and product development, given that they can make multi-dimensional comparisons of products. In addition, text reviews, which are unstructured data, were transformed into objective values such as frequency and morpheme, and they were analysed together using word embedding and association analysis to improve the objectivity aspects of more precise multi-dimensional analysis and research. This will be an attractive analysis model in terms of not only enabling more effective service deployment during the evolving E-Commerce market and fierce competition, but also satisfying both customers.

A Survey of the Current Information Activities in the Advanced Developing Countries (중진국의 정보유통체제 연구)

  • Choi Sung-jin
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.7
    • /
    • pp.89-195
    • /
    • 1980
  • The advanced developing countries including Korea are assumed to have reached a developmental stage which necessitates them to formulate and implement a plan for a national information network. Most of the governments in the advanced developing countries are well aware of the necessity for such a plan and some of them have actually commenced their studies on the feasibility of a national network of their own hoping to achieve maximum utility of their limited information resources. Two urgent problems facing planners in the design of a national information network are identified. One is lack of an optimum organisational model to enable them to meet their own situations, and the other is lack of a guideline to help designers evaluate the alternative structures and models when they are available. In resolving these two problems, network planners in the advanced developing countries would benefit from the achievement of the objectives of the present study. The major objective is to elicit and describe common information needs, desires and value of the people using information, and other common factors which are responsible for the present information services in the advanced developing countries and which have implications for the basic structure of the national information network. The value of this study is to aid administrators in Korea and those in the other advanced developing countries who are responsible for making national policies and who are now beginning to recognise the need for information services with the planning of economic and social development so as to enable all the groups in the community to have access to the information which are essential for decision making, research work, studies and even for recreational reading. This recognition will hopefully give them a rational basis for formulating right policies on information services. The methodology utlised for collecting the required data in this study falls under the category of observation and largely consists of the two techniques: literature review and postal questionnaire. Background information on the individual advanced developing: countries was gathered from monographic and periodical literature. and country reports presented at the various international conferences were analysed for other relevant data. For most of the data needed for the present study, a questionnaire on 'Library and Information Services as They Are Available in the Selected Countries' was formulated. This questionnaire was designed to be completed without help, by an expert who was well informed of the library and information services in his or her country. The questionnaire was intended to look in details at what information services in the advanced developing countries were doing-whom they were serving, in what way, and how well and establish to what extent they were meeting the nation's information requirements. It was also intended to ascertain the respondents' ideas on possible future developments in information provision in their countries, that is, in the advanced devanced developing countries. The questionnaire was posted to a total of 63 natinal librarians, directors of national information centres and those of other major libraries or information centres in 21 selected countries. Complete usable responses were received from 34 persons in 14 countries. In order to identify common characteristics of the information needs and desires in the advanced developing countries and the present situation of the information services to meet them, and the requirements and constraints peculiar to those countries which bought to be considered in the design of a national information network for advanced developing countries, an individual report on the current status of information activities for each of the fourteen countries chosen for this study, was presented. The procedure used was to arrange the data acquired in the questionnaire responses and other sources, in the form of fifteen country reports to be summarised by cross-section characteristics later.

  • PDF

The Effects of Metaphors in the Interface of Smartphone Applications on Users' Intention to Use (사용자환경의 메타포가 스마트폰 애플리케이션 사용의도에 미치는 영향)

  • Jung, Wonjin;Hong, Suk-Ki
    • Asia pacific journal of information systems
    • /
    • v.24 no.3
    • /
    • pp.255-279
    • /
    • 2014
  • It is not too much to say that smartphones have become an essential part of our lives due to their versatility. Nevertheless, they still have less overall capabilities than their desktop counterparts. Specifically, they have small screens and low resolutions, which make their applications difficult to have a usable interface. To account for these limitations, the interface of smartphone applications should be designed carefully and properly. Good interface design to any application is critical. However, a comprehensive information systems (IS) literature review found that there has been little research on the user interface design of smartphone applications. More specifically, there has been little empirical evidence and understanding about how metaphors, an imaginative way of describing objects and concepts, in the user interface of smartphone applications affect users' intention to use the applications. Thereby, the research goals of this study are to examine 1) the effects of the metaphors in the user interface of smartphone applications on the interaction between users and applications and 2) the effects of mediating variables including the interaction between users and applications, users' beliefs and attitudes, on users' intention to use the applications. A survey was conducted to collect data. University students and practitioners participated in the survey. A 24-item questionnaire was developed on a 5-point Likert-type scale. The measurement items were mostly adapted from the previous studies in the IS literature and modified to fit the context of this study. First, a principal component factor analysis was performed to explore the inter-relationships among a set of variables. The analysis showed that most of the items loaded quite strongly on the six components. The analysis also revealed the six components with eigenvalues exceeding 1, explaining a total of 70.7 per cent of the variance. The reliabilities of the items were also checked. Most Cronbach alpha values were above 0.8, so the scales were considered reliable. In sum, the results of the analysis support the decision to retain the six factors for further investigation. Next, the structural model was analyzed with AMOS structural equation modeling. The values of GFI, AGFI, NFI, TLI, CFI, and RMSEA were checked. The values showed that the research model considerably have a good fit in general. Next, the convergent and discriminant validities of all constructs were examined. The values for the standardized regression weights and critical ration (CR) indicated sufficient convergent validity for all constructs. In addition, the square root of the average variance extracted (AVE) of each construct was compared with its correlations with all other constructs. The results supported discriminant validity for all constructs. In sum, the results of analysis demonstrated adequate convergent and discriminant validities for all constructs. Finally, path coefficients between the variables were examined. Methphor was found to have an impact on interaction (${\beta}$ = .457, p = .000). There were also significant effects of the interaction on perceived usefulness (${\beta}$ = .273, p = .000) and ease of use (${\beta}$ = .405, p = .000). User attitude was significantly influenced by these two beliefs, perceived usefulness (${\beta}$ = .386, p = .000) and ease of use (${\beta}$ = .347, p = .000) respectively. Further, the results of analysis found that users' intention to use smartphone applications was significantly influenced by user attitude (${\beta}$ = .567, p = .000). Based upon the analyses, all hypotheses were supported. This study found that the metaphors used in the interface of smartphone applications affect not only the interaction between users and applications, but also users' intention to use the applications through the mediating variables, perceived usefulness and ease of use. These findings imply that if the metaphors used in the user interface of application are easy enough to understand for smartphone users, then the application can be perceived useful and easy to use, which in turn make users to have an intention to use the application. In conclusion, this study contributed not only to validate and extend Technology Acceptance Model (TAM) partially, but also to develop the construct of metaphor in smartphone settings. However, since a single empirical study cannot be enough to validate the findings, some limitations should be considered.

A Case Study on Implementation of Mobile Information Security (모바일 정보보안을 위한 실시간 모바일 기기 제어 및 관리 시스템 설계.구현 사례연구)

  • Kang, Yong-Sik;Kwon, Sun-Dong;Lee, Kang-Hyun
    • Information Systems Review
    • /
    • v.15 no.2
    • /
    • pp.1-19
    • /
    • 2013
  • Smart working sparked by iPhone3 opens a revolution in smart ways of working at any time, regardless of location and environment. Also, It provide real-time information processing and analysis, rapid decision-making and the productivity of businesses, including through the timely response and the opportunity to increase the efficiency. As a result, every company are developing mobile information systems. But company data is accessed from the outside, it has problems to solve like security, hacking and information leakage. Also, Mobile devices such as smart phones belonging to the privately-owned asset can't be always controlled to archive company security policy. In the meantime, public smart phones owned by company was always applied security policy. But it can't not apply to privately-owned smart phones. Thus, this paper is focused to archive company security policy, but also enable the individual's free to use of smart phones when we use mobile information systems. So, when we use smart phone as individual purpose, the normal operation of all smart phone functions. But, when we use smart phone as company purpose like mobile information systems, the smart phone functions are blocked like screen capture, Wi-Fi, camera to protect company data. In this study, we suggest the design and implementation of real time control and management of mobile device using MDM(Mobile Device Management) solution. As a result, we can archive company security policy and individual using of smart phone and it is the optimal solution in the BYOD(Bring Your Own Device) era.

  • PDF

Analysis of Evaluator's Role and Capability for Institution Accreditation Evaluation of NCS-based Vocational Competency Development Training (NCS 기반 직업능력개발훈련 기관인증평가를 위한 평가자의 역할과 역량 분석)

  • Park, Ji-Young;Lee, Hee-Su
    • Journal of vocational education research
    • /
    • v.35 no.4
    • /
    • pp.131-153
    • /
    • 2016
  • The purpose of this study was to derive evaluator's role and capability for institution accreditation evaluation of NCS-based vocational competency development training. This study attempted to explore in various ways evaluator's minute roles using Delphi method, and to derive knowledge, skill, attitude and integrity needed to verify the validity. To the end, this study conducted the Delphi research for over three rounds by selecting education training professionals and review evaluation professions as professional panels. From the results, roles of evaluators were defined as the total eight items including operator, moderator-mediator, cooperator, analyzer, verifier, institution evaluator, institution consultant, and learner, and the derived capabilities with respect to each role were 25 items in total. The area of knowledge included four items of capabilities such as HRD knowledge, NCS knowledge, knowledge of vocational competency development training, and knowledge of training institution accreditation evaluation, and the area of skill comprised fourteen items of capabilities such as conflict management ability, interpersonal relation ability, word processing ability, problem-solving ability, analysis ability, pre-preparation ability, time management ability, decision making ability, information comprehension and utilization ability, comprehensive thinking ability, understanding ability of vocational competency development training institutions, communication ability, feedback ability, and core understanding ability. The area of attitude was summarized with the seven items in total including subjectivity and fairness, service mind, sense of calling, ethics, self-development, responsibility, and teamwork. The knowledge, skill and attitude derived from the results of this study may be utilized to design and provide education programs conducive to qualitative and systematic accreditation and assessment to evaluators equipped with essential prerequisites. It is finally expected that this study will be helpful for designing module education programs by ability and for managing evaluator's quality in order to perform pre-service education and in-service education according to evaluator's experience and role.

Establishment of Safety Factors for Determining Use-by-Date for Foods (식품의 소비기한 참고치 설정을 위한 안전계수)

  • Byoung Hu Kim;Soo-Jin Jung;June Gu Kang;Yohan Yoon;Jae-Wook Shin;Cheol-Soo Lee;Sang-Do Ha
    • Journal of Food Hygiene and Safety
    • /
    • v.38 no.6
    • /
    • pp.528-536
    • /
    • 2023
  • In Korea, from January 2023, the Act on Labeling and Advertising of Food was revised to reflect the use-by-date rather than the sell-by-date. Hence, the purpose of this study was to establish a system for calculating the safety factor and determining the recommended use-by-date for each food type, thereby providing a scientific basis for the recommended use-by-date labels. A safety factor calculation technique based on scientific principles was designed through literature review and simulation, and opinions were collected by conducting surveys and discussions including industry and academia, among others. The main considerations in this study were pH, Aw, sterilization, preservatives, packaging for storage improvement, storage temperature, and other external factors. A safety factor of 0.97 was exceptionally applied for frozen products and 1.0 for sterilized products. In addition, a between-sample error value of 0.08 was applied to factors related to product and experimental design. This study suggests that clearly providing a safe use-by-date will help reduce food waste and contribute to carbon neutrality.