• Title/Summary/Keyword: Internet Health Information

Search Result 802, Processing Time 0.021 seconds

Comparison of Play Perception and Play Participation of Parents of Disabled Children and Non-disabled Children in Preschool Age (학령전기 장애 아동 부모와 비장애 아동 부모의 놀이 인식과 놀이 참여 비교 연구)

  • Park, DaSol;Lee, EunYoung;Lee, SunHee;Park, Hae Yean
    • Therapeutic Science for Rehabilitation
    • /
    • v.9 no.1
    • /
    • pp.69-78
    • /
    • 2020
  • Objective : The purpose of this study was to conduct a comprehensive survey of children's play in parents of disabled and non-disabled children prior to commencing school. This study aimed to further understanding play recognition and to present a specific direction of play necessary to each parent. Methods : A questionnaire based on prior studies was sent to 700 people who had previously agreed to the take part. A total of 596 questionnaires were analyzed. Uncollected and insincere surveys, of which 106 were questionnaires for parents of disabled children, were exclused from analysis. The SPSS Window 23 program was used for data analysis and frequency analysis and the independent sample T test were performed. Results : Disabled children's parents perceived playing with their children as more important than that of non-disabled children's parents(p<0.01). There was no statistical difference between disabled children and non-disabled children's parents, but there were some differences(p=0,053). Both disabled and non-disabled children had more time to participate with their mothers than with their fathers. Mothers with disabilities had more time to play however, fathers with no disabilities had more time. Both disabled and non-disabled children's parents had the most "ordinary" frequency of buying toys and there was very littele difference between the 2 groups. Both disabled and non-disabled children's parents primarily used the internet to acquire play information, and consideration when buying fun was followed by interest inducement, development level and safety. Conclusion : Through this study, it was possible to compare the status of play recognition and participation by parents of children with or without disabilities. Based on this study, parents will be able to find out what they really need to play and will be provided as a basis for future play studies for children.

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF