• Title/Summary/Keyword: Direct application

Search Result 2,313, Processing Time 0.033 seconds

Non-invasive Brain Stimulation and its Legal Regulation - Devices using Techniques of TMS and tDCS - (비침습적 뇌자극기술과 법적 규제 - TMS와 tDCS기술을 이용한 기기를 중심으로 -)

  • Choi, Min-Young
    • The Korean Society of Law and Medicine
    • /
    • v.21 no.2
    • /
    • pp.209-244
    • /
    • 2020
  • TMS and tDCS are non-invasive devices that treat the diseases of patients or individual users, and manage or improve their health by applying stimulation to a brain through magnetism and electricity. The effect and safety of these devices have proved to be valid in several diseases, but research in this area is still much going on. Despite increasing cases of their application, legislations directly regulating TMS and tDCS are hard to find. Legal regulation regarding TMS and tDCS in the United States, Germany and Japan reveals that while TMS has been approved as a medical device with a moderate risk, tDCS has not yet earned approval as a medical device. However, the recent FDA guidance, European MDR changes, recalls in the US, and relevant legal provisions of Germany and Japan, as well as recommendations from expert groups all show signs of tDCS growing closer to getting approved as a medical device. Of course, safety and efficacy of tDCS can still be regulated as a general product instead of as a medical device. Considering multiple potential impacts on a human brain, however, the need for independent regulation is urgent. South Korea also lacks legal provisions explicitly regulating TMS and tDCS, but they fall into the category of the grade 3 medical devices according to the notifications of the Korean Ministry of Food and Drug Safety. And safety and efficacy of TMS are to be evaluated in compliance with the US FDA guidance. But no specific guidelines exist for tDCS yet. Given that tDCS devices are used in some hospitals in reality, and also at home by individual buyers, such a regulatory gap must quickly be addressed. In a longer term, legal system needs to be in place capable of independently regulating non-invasive brain stimulating devices.

A Study on Verifying the Morality behind 'Mutual Beneficence': A Phenomenological Investigation on the 'Propensity towards Sympathy' (상생적 관계형성을 위한 도덕성 확인에 관한 연구 - '공감적 성향'에 대한 현상학적 고찰 -)

  • Chung, Byung-hwa
    • Journal of the Daesoon Academy of Sciences
    • /
    • v.28
    • /
    • pp.103-131
    • /
    • 2017
  • As the establishment of self-identity is based on 'Relationships of Mutual Beneficence,' the formation of 'Relationships of Mutual Beneficence' is the only road to the security and confirmation of self-existence. But given that our ordinary life almost entirely consists of actions objectifying others, the formation of 'Relationships of Mutual Beneficence' is by no means easy. The formation of 'Relationships of Mutual Beneficence' should be based on morality, controlling self-desire, and not objectifying others. Philosophy based on a priori reasoning describes self-control over selfdesire as the domination of the body through a priori reasoning. But this practical philosophy cannot present a self-evidential internal motivation behind moral actions. Due to this, the application of moral order given by a priori reasoning in response to reality is likely to be reinterpreted on basis of self-interest. With regards to this, the 'propensity towards sympathy' is given as new moral norm. The 'propensity towards sympathy' as emotion is direct and consistent given that feeling occurs prior to thinking. The 'propensity towards sympathy' is intuitive in the sense that it is an instinctual response preceeding a reasoned judgment. The 'propensity towards sympathy,' as a natural moral emotion, is self-validating given that all human beings know it and practice it. But previous studies on the 'propensity towards sympathy' have an obvious limitation because they adopt phenomenological approaches to the 'propensity towards sympathy' which eschew the investigation of morality. Though they present the 'propensity towards sympathy' as a natural emotion based on body rather than reason, they do not philosophically explain the 'propensity towards sympathy.' Thus the 'propensity towards sympathy' as a natural moral emotion is likely to be interpreted as a subjective and relative moral norm. This paper philosophically explains that the 'propensity towards sympathy' is a universal moral norm on the basis of Merleau-Ponty's 'flesh.' 'Flesh' is formed as the entanglement between oneself and others and presents the 'propensity towards sympathy' as its philosophical basis. In other words, 'flesh' formed as the mixture or entanglement between oneself and others is the material foundation upon which one can activate the 'propensity towards sympathy.' This paper's approach to the 'propensity of sympathy' can be desribed as a phenomenological approach to the 'propensity towards sympathy' as a universal moral norm.

A Study on the Choice of Export Payment Types by Applying the Characteristics of the New Trade & Logistics Environment (신(新)무역물류환경의 특성을 적용한 수출대금 결제유형 선택연구)

  • Chang-bong Kim;Dong-jun Lee
    • Korea Trade Review
    • /
    • v.48 no.4
    • /
    • pp.303-320
    • /
    • 2023
  • Recently, import and export companies have been using T/T remittance and Surrender B/L more frequently than L/C when selecting the process and method of trade payment settlement. The new trade and logistics environment is thriving in the era of the Fourth Industrial Revolution (4IR). Document-based trade transactions are undergoing a digitalization as bills of lading or smart contracts are being developed. The purpose of this study is to verify whether exporters choose export payment types based on negotiating factors. In addition, we would like to discuss the application of the characteristics of the new trade and logistics environment. Data for analysis was collected through surveys. The collection method consisted of direct visits to the company, e-mail, fax, and online surveys. The survey distribution period is from February 1, 2023, to April 30, 2023. The questionnaire was distributed in 2,000 copies, and 447 copies were collected. The final 336 copies were used for analysis, excluding 111 copies that were deemed inappropriate for the purpose of this study. The results of the study are shown below. First, among the negotiating factors, the product differentiation of exporters did not significantly affect the selection of export payment types. Second, among the negotiating factors, the greater the purchasing advantage recognized by exporters, the higher the possibility of using the post-transfer method. In addition to analyzing the results, this study suggests that exporters should consider adopting new payment methods, such as blockchain technology-based bills of lading and trade finance platforms, to adapt to the characteristics of the evolving trade and logistics environment. Therefore, exporters should continue to show interest in initiatives aimed at digitizing trade documents as a response to the challenges posed by bills of lading. In future studies, it is necessary to address the lack of social awareness in Korea by conducting advanced research abroad.

A Legal Analysis on the Absence of Provisions Regarding Non-relative Patients in the Act of Decisions-Making in Life-Sustaining Medicine (연명의료결정법에서 무연고자 규정미비 등에 관한 법적 고찰)

  • Moon, Sang Hyuk
    • The Korean Society of Law and Medicine
    • /
    • v.24 no.4
    • /
    • pp.103-128
    • /
    • 2023
  • According to the current act of Decision-Marking in Life-Sustaining Medicine, the decision to withhold or discontinue life-sustaining treatment is primarily based on the wishes of a patient in the dying process. Decision-making regarding life-sustaining treatment for these patients is made by the patient, if he or she is conscious, directly expressing his/her intention for life-sustaining treatment in writing or verbally or by writing an advance medical directive and physician orders for life-sustaining treatment. It can be exercised. On the other hand, if the patient has not written an advance medical directive or physician orders for life-sustaining treatment, the patient's intention can be confirmed with a statement from the patient's family, or a decision to discontinue life-sustaining treatment can be made with the consent of all members of the patient's family. However, in the case of an unrelated patient who has no family or whose family is unknown, if an advance medical directive or physician orders for life-sustaining treatment are not written before hospitalization and a medical condition prevents the patient from expressing his or her opinion, the patient's will cannot be known and the patient cannot be informed. A situation arises where a decision must be made as to whether to continue or discontinue life-sustaining treatment. This study reviewed discussions and measures for unbefriended patients under the current law in order to suggest policy measures for deciding on life-sustaining treatment in the case of unbefriended patients. First, we looked at the application of the adult guardian system, but although an adult guardian can replace consent for medical treatment that infringes on the body, permission from the family court is required in cases where death may occur as a direct result of medical treatment. It cannot be said to be an appropriate solution for patients in the process of dying. Second, in accordance with Article 14 of the Life-Sustaining Treatment Decision Act, we looked at the deliberation of medical institution ethics committees on decisions to discontinue life-sustaining treatment for patients without family ties.Under the current law, the medical institution ethics committee cannot make decisions on discontinuation of life-sustaining treatment for unbefriended patients, so through revision, matters regarding decisions on discontinuation of life-sustaining treatment for unbefriended patients are reflected in Article 14 of the same Act or separate provisions for unbefriended patients are made. It is necessary to establish and amend new provisions. In addition, the medical institution ethics committee must make a decision on unbefriended patients, but if the medical institution cannot make such a decision, there is a need to revise the law so that the public ethics committee can make decisions, such as discontinuing life-sustaining treatment for unbefriended patients.

A Study on the Crime Prevention Design and Consumer Perception (CPTED) of Multi-Family Housing in China (중국 공동주택의 범죄 예방을 위한 디자인과 소비자의 인식에 관한 연구)

  • Kong, De Xin;Lee, Dong Hun;Park, Hae Rim
    • Journal of Service Research and Studies
    • /
    • v.14 no.1
    • /
    • pp.63-76
    • /
    • 2024
  • Multi-family housing plays a crucial role as a living and experiencing space, and its environment has a direct impact on the well-being and stability of its residents. Therefore, Crime Prevention Design (CPTED) for multi-family housing is of utmost importance. However, crime-related data in China is not disclosed to the public because of its specificity, making it difficult for researchers to conduct further in-depth studies based on accurate crime data. As a result, the establishment and application of CPTED theory in terms of crime prevention is limited and delayed. This study aims to explore three aspects of CPTED in multi-family housing as perceived by home-buying consumers. It investigated consumer perception of the CPTED, the importance of each element and ways to increase awareness of CPTED in multifamily housing in order to effectively improve multifamily crime prevention design principles and further enhance public safety. This study examined the current state and future trends of CPTED in China by analyzing relevant research reports and literature, aiming to gain insights into the crime prevention awareness of Chinese homeowners. In addition, a survey was conducted on Chinese consumers to unravel the importance of CPTED and increase awareness of its various elements in multifamily-family. This study used a Likert scale and SPSS reliability analysis to determine the cognitive status of multi-family CPTED, the importance of each element, and proposed an improvement plan based on the analysis results. As this study was limited by the difficulty of implementation and the lack of validation of its practical effectiveness, it is recommended that future research needs to validate the effectiveness of crime prevention designs and produce more practical results. Furthermore, it is crucial to utilize this study to inform the implementation of security solutions that are tailored to the unique characteristics of each district. Additionally, it is important to offer guidance on how to enhance community safety by increasing residents' awareness of security through education and information dissemination. The author hopes that the representative multi-family CPTED awareness, the importance of each element, and plans for improvement shall be summarized from this study, and provide foundational data for the future development of CPTED based on the Chinese region.

Conflicts and Tasks of the Right of Legal Interpretation of National People's Congress of China and the Basic Law System of Hong Kong (중국 전국인민대표대회의 법률해석권과 홍콩 보통법체계의 충돌과 과제)

  • 김준영
    • Journal of Sinology and China Studies
    • /
    • v.81
    • /
    • pp.227-256
    • /
    • 2019
  • Hong Kong's protests, which began in June 2019 with Anti-Extradition Bill Protests, have already lasted for months, and the demonstrations have a significant impact on China and Hong Kong as a whole. The protests began in opposition to the Hong Kong government's revision of the extradition bill, but in substance, it has a strong nature as a test of China's "One Country Two Systems" policy. Since the establishment of the Hong Kong Special Administrative District on July 1, 1997, the primary legal norm between China and Hong Kong is the Basic Law of Hong Kong. However, conflicts of legal standards have occurred frequently due to the difference between socialism and the capitalist legal system, and there has been a continuous controversy over the interpretation of the Basic Law of Hong Kong. Moreover, the core of the legal conflict between China and Hong Kong has always been China's "One Country Two Systems" policy. This paper examined the issues related to the "Right of Legal Interpretation" of Standing Committee of the National People's Congress, the characteristics and interpretation rights of the Basic Law of Hong Kong, the direct election system of the administrative minister, the implementation of the universal suffrage, and the legislative issues of the application of Article 23 of the Hong Kong Basic Law. Furthermore, this paper also investigated the laws and systems newly introduced by China to solve these legal conflicts. The integration of the legal system of the divided state is a complicated process beyond the combination of the legal system by integrating the multiple legal systems that have separated for a long time under heterogeneous political, economic, and social networks. Moreover, the adjustment and integration of various legal systems under the premise of a single Constitution is the starting point for the actual inclusion of various fields after the unification as well as unification process and provides a basis for achieving full integration. Therefore, the unification of the divided countries should be the first step in a long journey toward becoming a practical one, not a goal itself. It is crucial to reduce trial and error and cost, and achieve stable unification in our unification process in Korea, by learning lessons from the contradictions and conflicts that appear in the "One Country Two Systems" unification between China and Hong Kong.

A Study on the Effect of the Introduction Characteristics of Cloud Computing Services on the Performance Expectancy and the Intention to Use: From the Perspective of the Innovation Diffusion Theory (클라우드 컴퓨팅 서비스의 도입특성이 조직의 성과기대 및 사용의도에 미치는 영향에 관한 연구: 혁신확산 이론 관점)

  • Lim, Jae Su;Oh, Jay In
    • Asia pacific journal of information systems
    • /
    • v.22 no.3
    • /
    • pp.99-124
    • /
    • 2012
  • Our society has long been talking about necessity for innovation. Since companies in particular need to carry out business innovation in their overall processes, they have attempted to apply many innovation factors on sites and become to pay more attention to their innovation. In order to achieve this goal, companies has applied various information technologies (IT) on sites as a means of innovation, and consequently IT have been greatly developed. It is natural for the field of IT to have faced another revolution which is called cloud computing, which is expected to result in innovative changes in software application via the Internet, data storing, the use of devices, and their operations. As a vehicle of innovation, cloud computing is expected to lead the changes and advancement of our society and the business world. Although many scholars have researched on a variety of topics regarding the innovation via IT, few studies have dealt with the issue of could computing as IT. Thus, the purpose of this paper is to set the variables of innovation attributes based on the previous articles as the characteristic variables and clarify how these variables affect "Performance Expectancy" of companies and the intention of using cloud computing. The result from the analysis of data collected in this study is as follows. The study utilized a research model developed on the innovation diffusion theory to identify influences on the adaptation and spreading IT for cloud computing services. Second, this study summarized the characteristics of cloud computing services as a new concept that introduces innovation at its early stage of adaptation for companies. Third, a theoretical model is provided that relates to the future innovation by suggesting variables for innovation characteristics to adopt cloud computing services. Finally, this study identified the factors affecting expectation and the intention to use the cloud computing service for the companies that consider adopting the cloud computing service. As the parameter and dependent variable respectively, the study deploys the independent variables that are aligned with the characteristics of the cloud computing services based on the innovation diffusion model, and utilizes the expectation for performance and Intention to Use based on the UTAUT theory. Independent variables for the research model include Relative Advantage, Complexity, Compatibility, Cost Saving, Trialability, and Observability. In addition, 'Acceptance for Adaptation' is applied as an adjustment variable to verify the influences on the expected performances from the cloud computing service. The validity of the research model was secured by performing factor analysis and reliability analysis. After confirmatory factor analysis is conducted using AMOS 7.0, the 20 hypotheses are verified through the analysis of the structural equation model, accepting 12 hypotheses among 20. For example, Relative Advantage turned out to have the positive effect both on Individual Performance and on Strategic Performance from the verification of hypothesis, while it showed meaningful correlation to affect Intention to Use directly. This indicates that many articles on the diffusion related Relative Advantage as the most important factor to predict the rate to accept innovation. From the viewpoint of the influence on Performance Expectancy among Compatibility and Cost Saving, Compatibility has the positive effect on both Individual Performance and on Strategic Performance, while it showed meaningful correlation with Intention to Use. However, the topic of the cloud computing service has become a strategic issue for adoption in companies, Cost Saving turns out to affect Individual Performance without a significant influence on Intention to Use. This indicates that companies expect practical performances such as time and cost saving and financial improvements through the adoption of the cloud computing service in the environment of the budget squeezing from the global economic crisis from 2008. Likewise, this positively affects the strategic performance in companies. In terms of effects, Trialability is proved to give no effects on Performance Expectancy. This indicates that the participants of the survey are willing to afford the risk from the high uncertainty caused by innovation, because they positively pursue information about new ideas as innovators and early adopter. In addition, they believe it is unnecessary to test the cloud computing service before the adoption, because there are various types of the cloud computing service. However, Observability positively affected both Individual Performance and Strategic Performance. It also showed meaningful correlation with Intention to Use. From the analysis of the direct effects on Intention to Use by innovative characteristics for the cloud computing service except the parameters, the innovative characteristics for the cloud computing service showed the positive influence on Relative Advantage, Compatibility and Observability while Complexity, Cost saving and the likelihood for the attempt did not affect Intention to Use. While the practical verification that was believed to be the most important factor on Performance Expectancy by characteristics for cloud computing service, Relative Advantage, Compatibility and Observability showed significant correlation with the various causes and effect analysis. Cost Saving showed a significant relation with Strategic Performance in companies, which indicates that the cost to build and operate IT is the burden of the management. Thus, the cloud computing service reflected the expectation as an alternative to reduce the investment and operational cost for IT infrastructure due to the recent economic crisis. The cloud computing service is not pervasive in the business world, but it is rapidly spreading all over the world, because of its inherited merits and benefits. Moreover, results of this research regarding the diffusion innovation are more or less different from those of the existing articles. This seems to be caused by the fact that the cloud computing service has a strong innovative factor that results in a new paradigm shift while most IT that are based on the theory of innovation diffusion are limited to companies and organizations. In addition, the participants in this study are believed to play an important role as innovators and early adapters to introduce the cloud computing service and to have competency to afford higher uncertainty for innovation. In conclusion, the introduction of the cloud computing service is a critical issue in the business world.

  • PDF

Stock Identification of Todarodes pacificus in Northwest Pacific (북서태평양에 서식하는 살오징어(Todarodes pacificus) 계군 분석에 대한 고찰)

  • Kim, Jeong-Yun;Moon, Chang-Ho;Yoon, Moon-Geun;Kang, Chang-Keun;Kim, Kyung-Ryul;Na, Taehee;Choy, Eun Jung;Lee, Chung Il
    • The Sea:JOURNAL OF THE KOREAN SOCIETY OF OCEANOGRAPHY
    • /
    • v.17 no.4
    • /
    • pp.292-302
    • /
    • 2012
  • This paper reviews comparison analysis of current and latest application for stock identification methods of Todarodes pacificus, and the pros and cons of each method and consideration of how to compensate for each other. Todarodes pacificus which migrates wide areas in western North Pacific is important fishery resource ecologically and commercially. Todarodes pacificus is also considered as 'biological indicator' of ocean environmental changes. And changes in its short and long term catch and distribution area occur along with environmental changes. For example, while the catch of pollack, a cold water fish, has dramatically decreased until today after the climate regime shift in 1987/1988, the catch of Todarodes pacificus has been dramatically increased. Regarding the decrease in pollack catch, overfishing and climate changes were considered as the main causes, but there has been no definite reason until today. One of the reasons why there is no definite answer is related with no proper analysis about ecological and environmental aspects based on stock identification. Subpopulation is a group sharing the same gene pool through sexual reproduction process within limited boundaries having similar ecological characteristics. Each individual with same stock might be affected by different environment in temporal and spatial during the process of spawning, recruitment and then reproduction. Thereby, accurate stock analysis about the species can play an efficient alternative to comply with effective resource management and rapid changes. Four main stock analysis were applied to Todarodes pacificus: Morphologic Method, Ecological Method, Tagging Method, Genetic Method. Ecological method is studies for analysis of differences in spawning grounds by analysing the individual ecological change, distribution, migration status, parasitic state of parasite, kinds of parasite and parasite infection rate etc. Currently the method has been studying lively can identify the group in the similar environment. However It is difficult to know to identify the same genetic group in each other. Tagging Method is direct method. It can analyse cohort's migration, distribution and location of spawning, but it is very difficult to recapture tagged squids and hard to tag juveniles. Genetic method, which is for useful fishery resource stock analysis has provided the basic information regarding resource management study. Genetic method for stock analysis is determined according to markers' sensitivity and need to select high multiform of genetic markers. For stock identification, isozyme multiform has been used for genetic markers. Recently there is increase in use of makers with high range variability among DNA sequencing like mitochondria, microsatellite. Even the current morphologic method, tagging method and ecological method played important rolls through finding Todarodes pacificus' life cycle, migration route and changes in spawning grounds, it is still difficult to analyze the stock of Todarodes pacificus as those are distributed in difference seas. Lately, by taking advantages of each stock analysis method, more complicated method is being applied. If based on such analysis and genetic method for improvement are played, there will be much advance in management system for the resource fluctuation of Todarodes pacificus.

Study of Patient Teaching in The Clinical Area (간호원의 환자교육 활동에 관한 연구)

  • 강규숙
    • Journal of Korean Academy of Nursing
    • /
    • v.2 no.1
    • /
    • pp.3-33
    • /
    • 1971
  • Nursing of today has as one of its objectives the solving of problems related to human needs arising from the demands of a rapidly changing society. This nursing objective, I believe, can he attained by the appropriate application of scientific principles in the giving of comprehensive nursing care. Comprehensive nursing care may be defined as nursing care which meets all of the patient's needs. the needs of patients are said to fall into five broad categories: physical needs, psychological needs, environmental needs, socio-economic needs, and teaching needs. Most people who become ill have adjustment problems related to their new situation. Because patient teaching is one of the most important functions of professional nursing, the success of this teaching may be used as a gauge for evaluating comprehensive nursing care. This represents a challenge foe the future. A questionnaire consisting of 67 items was distributed to 200 professional nurses working ill direct patient care at Yonsei University Medical Center in Seoul, Korea. 160 (80,0%) nurses of the total sample returned completed questionnaires 81 (50.6%) nurses were graduates of 3 fear diploma courser 79 (49.4%) nurses were graduates of 4 year collegiate nursing schools in Korea 141 (88,1%) nurses had under 5 years of clinical experience in a medical center, while 19 (11.9%) nurses had more than 5years of clinical experience. Three hypotheses were tested: 1. “Nurses had high levels of concept and knowledge toward patient teaching”-This was demonstrated by the use of a statistical method, the mean average. 2. “Nurses graduating from collegiate programs and diploma school programs of nursing show differences in concepts and knowledge toward patient teaching”-This was demonstrated by a statistical method, the mean average, although the results showed little difference between the two groups. 3. “Nurses having different amounts of clinical experience showed differences in concepts and knowledge toward patient teaching”-This was demonstrated by the use of a statistical method, the mean average. 2. “Nurses graduating from collegiate programs and diploma school programs of nursing show differences in concepts and knowledge toward patient teaching”-This was demonstrated by a statistical method, the mean average, although the results showed little difference between the two groups. 3. “Nurses having different amounts of clinical experience showed differences in concepts and knowledge toward patient teaching”-This was demonstrated by the use of the T-test. Conclusions of this study are as follow: Before attempting the explanation, of the results, the questionnaire will he explained. The questionnaire contained 67 questions divided into 9 sections. These sections were: concept, content, time, prior preparation, method, purpose, condition, evaluation, and recommendations for patient teaching. 1. The nurse's concept of patient teaching: Most of the nurses had high levels of concepts and knowledge toward patient teaching. Though nursing service was task-centered at the turn of the century, the emphasis today is put on patient-centered nursing. But we find some of the nurses (39.4%) still are task-centered. After, patient teaching, only a few of the nurses (14.4%) checked this as “normal teaching.”It seems therefore that patient teaching is often done unconsciously. Accordingly it would he desirable to have correct concepts and knowledge of teaching taught in schools of nursing. 2. Contents of patient teaching: Most nurses (97.5%) had good information about content of patient teaching. They teach their patients during admission about their diseases, tests, treatments, and before discharge give nurses instruction about simple nursing care, personal hygiene, special diets, rest and sleep, elimination etc. 3. Time of patient teaching: Teaching can be accomplished even if there is no time set aside specifically for it. -a large part of the nurse's teaching can be done while she is giving nursing care. If she believes she has to wait for time free from other activities, she may miss many teaching opportunities. But generally proper time for patient teaching is in the midmorning or midafternoon since one and a half or two hours required. Nurses meet their patients in all stages of health: often tile patient is in a condition in which learning is impossible-pain, mental confusion, debilitation, loss of sensory perception, fear and anxiety-any of these conditions may preclude the possibility of successful teaching. 4. Prior preparation for patient teaching: The teaching aids, nurses use are charts (53.1%), periodicals (23.8%), and books (7.0%) Some of the respondents (28.1%) reported that they had had good preparation for the teaching which they were doing, others (27.5%) reported adequate preparation, and others (43.8%) reported that their preparation for teaching was inadequate. If nurses have advance preparation for normal teaching and are aware of their objectives in teaching patients, they can do effective teaching. 5. Method of patient teaching: The methods of individual patient teaching, the nurses in this study used, were conversation (55.6%) and individual discussion (19.2%) . And the methods of group patient teaching they used were demonstration (42.3%) and lecture (26.2%) They should also he prepared to use pamphlet and simple audio-visual aids for their teaching. 6. Purposes of patient teaching: The purposes of patient teaching is to help the patient recover completely, but the majority of the respondents (40.6%) don't know this. So it is necessary for them to understand correctly the purpose of patient teaching and nursing care. 7. Condition of patient teaching: The majority of respondents (75.0%) reported there were some troubles in teaching uncooperative patients. It would seem that the nurse's leaching would be improved if, in her preparation, she was given a better understanding of the patient and communication skills. The majority of respondents in the total group, felt teaching is their responsibility and they should teach their patient's family as well as the patient. The place for teaching is most often at the patient's bedside (95.6%) but the conference room (3.1%) is also used. It is important that privacy be provided in learning situations with involve personal matters. 8. Evaluation of patient teaching: The majority of respondents (76.3%,) felt leaching is a highly systematic and organized function requiring special preparation in a college or university, they have the idea that teaching is a continuous and ever-present activity of all people throughout their lives. The suggestion mentioned the most frequently for improving preparation was a course in patient teaching included in the basic nursing program. 9. Recommendations: 1) It is recommended, that in clinical nursing, patient teaching be emphasized. 2) It is recommended, that insertive education the concepts and purposes of patient teaching he renewed for all nurses. In addition to this new knowledge, methods and materials which can be applied to patient teaching should be given also. 3) It is recommended, in group patient teaching, we try to embark on team teaching.

  • PDF

Mediating Roles of Attachment for Information Sharing in Social Media: Social Capital Theory Perspective (소셜 미디어에서 정보공유를 위한 애착의 매개역할: 사회적 자본이론 관점)

  • Chung, Namho;Han, Hee Jeong;Koo, Chulmo
    • Asia pacific journal of information systems
    • /
    • v.22 no.4
    • /
    • pp.101-123
    • /
    • 2012
  • Currently, Social Media, it has widely a renown keyword and its related social trends and businesses have been fastly applied into various contexts. Social media has become an important research area for scholars interested in online technologies and cyber space and their social impacts. Social media is not only including web-based services but also mobile-based application services that allow people to share various style information and knowledge through online connection. Social media users have tendency to common identity- and bond-attachment through interactions such as 'thumbs up', 'reply note', 'forwarding', which may have driven from various factors and may result in delivering information, sharing knowledge, and specific experiences et al. Even further, almost of all social media sites provide and connect unknown strangers depending on shared interests, political views, or enjoyable activities, and other stuffs incorporating the creation of contents, which provides benefits to users. As fast developing digital devices including smartphone, tablet PC, internet based blogging, and photo and video clips, scholars desperately have began to study regarding diverse issues connecting human beings' motivations and the behavioral results which may be articulated by the format of antecedents as well as consequences related to contents that people create via social media. Social media such as Facebook, Twitter, or Cyworld users are more and more getting close each other and build up their relationships by a different style. In this sense, people use social media as tools for maintain pre-existing network, creating new people socially, and at the same time, explicitly find some business opportunities using personal and unlimited public networks. In terms of theory in explaining this phenomenon, social capital is a concept that describes the benefits one receives from one's relationship with others. Thereby, social media use is closely related to the form and connected of people, which is a bridge that can be able to achieve informational benefits of a heterogeneous network of people and common identity- and bonding-attachment which emphasizes emotional benefits from community members or friend group. Social capital would be resources accumulated through the relationships among people, which can be considered as an investment in social relations with expected returns and may achieve benefits from the greater access to and use of resources embedded in social networks. Social media using for their social capital has vastly been adopted in a cyber world, however, there has been little explaining the phenomenon theoretically how people may take advantages or opportunities through interaction among people, why people may interactively give willingness to help or their answers. The individual consciously express themselves in an online space, so called, common identity- or bonding-attachments. Common-identity attachment is the focus of the weak ties, which are loose connections between individuals who may provide useful information or new perspectives for one another but typically not emotional support, whereas common-bonding attachment is explained that between individuals in tightly-knit, emotionally close relationship such as family and close friends. The common identify- and bonding-attachment are mainly studying on-offline setting, which individual convey an impression to others that are expressed to own interest to others. Thus, individuals expect to meet other people and are trying to behave self-presentation engaging in opposite partners accordingly. As developing social media, individuals are motivated to disclose self-disclosures of open and honest using diverse cues such as verbal and nonverbal and pictorial and video files to their friends as well as passing strangers. Social media context, common identity- and bond-attachment for self-presentation seems different compared with face-to-face context. In the realm of social media, social users look for self-impression by posting text messages, pictures, video files. Under the digital environments, people interact to work, shop, learn, entertain, and be played. Social media provides increasingly the kinds of intention and behavior in online. Typically, identity and bond social capital through self-presentation is the intentional and tangible component of identity. At social media, people try to engage in others via a desired impression, which can maintain through performing coherent and complementary communications including displaying signs, symbols, brands made of digital stuffs(information, interest, pictures, etc,). In marketing area, consumers traditionally show common-identity as they select clothes, hairstyles, automobiles, logos, and so on, to impress others in any given context in a shopping mall or opera. To examine these social capital and attachment, we combined a social capital theory with an attachment theory into our research model. Our research model focuses on the common identity- and bond-attachment how they are formulated through social capitals: cognitive capital, structural capital, relational capital, and individual characteristics. Thus, we examined that individual online kindness, self-rated expertise, and social relation influence to build common identity- and bond-attachment, and the attachment effects make an impact on both the willingness to help, however, common bond seems not to show directly impact on information sharing. As a result, we discover that the social capital and attachment theories are mainly applicable to the context of social media and usage in the individual networks. We collected sample data of 256 who are using social media such as Facebook, Twitter, and Cyworld and analyzed the suggested hypotheses through the Structural Equation Model by AMOS. This study analyzes the direct and indirect relationship between the social network service usage and outcomes. Antecedents of kindness, confidence of knowledge, social relations are significantly affected to the mediators common identity-and bond attachments, however, interestingly, network externality does not impact, which we assumed that a size of network was a negative because group members would not significantly contribute if the members do not intend to actively interact with each other. The mediating variables had a positive effect on toward willingness to help. Further, common identity attachment has stronger significant on shared information.

  • PDF