• Title/Summary/Keyword: Online Trade

Search Result 252, Processing Time 0.021 seconds

Current Status of Informed Consent Form for Acupotomy in Korean Medicine Hospitals and Development of a Standard Informed Consent Form Using Delphi Method (한방병원의 침도 시술 동의서의 현황 조사와 델파이 기법을 활용한 표준 시술 동의서 개발)

  • Jihun Kim;Bonhyuk Goo;Hyongjun Kim;Kyoungsuk Seo;Myungjin Oh;Myungseok Ryu;Sang-Hoon Yoon;Kwang Ho Lee;Hyun-Jong Lee;Jungtae Leem;Hyungsun Jun;Jeong Ihn Sook;Sung Woon Choi;Tae Wook Lee;Yeonhak Kim;Yoona Oh;Kunhyung Kim;Gi Young Yang;Eunseok Kim
    • The Journal of Korean Medicine
    • /
    • v.45 no.1
    • /
    • pp.182-201
    • /
    • 2024
  • Objectives: This study was conducted to develop a standard acupotomy consent form that takes into account the unique characteristics of Korean Medicine. The study was motivated by the increasing importance of patient autonomy and the growing number of legal disputes related to medical malpractice in the clinical field of Korean Medicine. Methods: The analysis phase of the study involved a survey of the current status of acupotomy consent forms in Korean Medicine hospitals nationwide. The items of each form were analyzed based on the contents of the Medical law and the standard contract for medical procedures of the Fair Trade Commission (FTC). In the development and evaluation phase, the items and contents of the acupotomy consent form were evaluated using a 5-point Likert scale and content validity was assessed through two rounds of Delphi surveys. In the improvement phase, the contents of the consent form were revised based on the results of a survey of inpatient and outpatient patients in the Department of Acupuncture and Moxibustion at Pusan National University Korean Medicine Hospital, and real-time online meeting. The final version of the standard acupotomy consent form was completed after undergoing proofreading and corrections by a linguistics expert. Results: Only 30% of Korean Medicine hospitals have implemented acupotomy consent forms. The items of the consent forms did not fully include the items presented in the Medical act and the standard contract for medical procedures of the FTC. To address this issue, two rounds of Delphi surveys and a real-time discussion were conducted with a panel of 12 experts on 27 preliminary items of consent forms. The items and contents that met the criteria for content validity ratio, convergence, and consensus were derived. Based on the derived items and content, a standard acupotomy consent form was developed. Conclusions: The standard consent form for acupotomy is anticipated to ensure patient autonomy and enhance transparency and liability in acupotomy. Furthermore, it is expected to serve as evidence in case of medical disputes related to acupotomy and contribute as a reference document for the development of standard consents forms for various procedures of Korean Medicine. However, the limitations of the study include that the survey of consent forms was limited to only training hospitals of Korean Medicine, and the standard consent form is only applicable to adults in Korea. Future studies are needed to address these limitations.

The Framework of Research Network and Performance Evaluation on Personal Information Security: Social Network Analysis Perspective (개인정보보호 분야의 연구자 네트워크와 성과 평가 프레임워크: 소셜 네트워크 분석을 중심으로)

  • Kim, Minsu;Choi, Jaewon;Kim, Hyun Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.1
    • /
    • pp.177-193
    • /
    • 2014
  • Over the past decade, there has been a rapid diffusion of electronic commerce and a rising number of interconnected networks, resulting in an escalation of security threats and privacy concerns. Electronic commerce has a built-in trade-off between the necessity of providing at least some personal information to consummate an online transaction, and the risk of negative consequences from providing such information. More recently, the frequent disclosure of private information has raised concerns about privacy and its impacts. This has motivated researchers in various fields to explore information privacy issues to address these concerns. Accordingly, the necessity for information privacy policies and technologies for collecting and storing data, and information privacy research in various fields such as medicine, computer science, business, and statistics has increased. The occurrence of various information security accidents have made finding experts in the information security field an important issue. Objective measures for finding such experts are required, as it is currently rather subjective. Based on social network analysis, this paper focused on a framework to evaluate the process of finding experts in the information security field. We collected data from the National Discovery for Science Leaders (NDSL) database, initially collecting about 2000 papers covering the period between 2005 and 2013. Outliers and the data of irrelevant papers were dropped, leaving 784 papers to test the suggested hypotheses. The co-authorship network data for co-author relationship, publisher, affiliation, and so on were analyzed using social network measures including centrality and structural hole. The results of our model estimation are as follows. With the exception of Hypothesis 3, which deals with the relationship between eigenvector centrality and performance, all of our hypotheses were supported. In line with our hypothesis, degree centrality (H1) was supported with its positive influence on the researchers' publishing performance (p<0.001). This finding indicates that as the degree of cooperation increased, the more the publishing performance of researchers increased. In addition, closeness centrality (H2) was also positively associated with researchers' publishing performance (p<0.001), suggesting that, as the efficiency of information acquisition increased, the more the researchers' publishing performance increased. This paper identified the difference in publishing performance among researchers. The analysis can be used to identify core experts and evaluate their performance in the information privacy research field. The co-authorship network for information privacy can aid in understanding the deep relationships among researchers. In addition, extracting characteristics of publishers and affiliations, this paper suggested an understanding of the social network measures and their potential for finding experts in the information privacy field. Social concerns about securing the objectivity of experts have increased, because experts in the information privacy field frequently participate in political consultation, and business education support and evaluation. In terms of practical implications, this research suggests an objective framework for experts in the information privacy field, and is useful for people who are in charge of managing research human resources. This study has some limitations, providing opportunities and suggestions for future research. Presenting the difference in information diffusion according to media and proximity presents difficulties for the generalization of the theory due to the small sample size. Therefore, further studies could consider an increased sample size and media diversity, the difference in information diffusion according to the media type, and information proximity could be explored in more detail. Moreover, previous network research has commonly observed a causal relationship between the independent and dependent variable (Kadushin, 2012). In this study, degree centrality as an independent variable might have causal relationship with performance as a dependent variable. However, in the case of network analysis research, network indices could be computed after the network relationship is created. An annual analysis could help mitigate this limitation.