• Title/Summary/Keyword: Online protection

Search Result 251, Processing Time 0.028 seconds

Structural Relationships Among Factors to Adoption of Telehealth Service (원격의료서비스 수용요인의 구조적 관계 실증연구)

  • Kim, Sung-Soo;Ryu, See-Won
    • Asia pacific journal of information systems
    • /
    • v.21 no.3
    • /
    • pp.71-96
    • /
    • 2011
  • Within the traditional medical delivery system, patients residing in medically vulnerable areas, those with body movement difficulties, and nursing facility residents have had limited access to good healthcare services. However, Information and Communication Technology (ICT) provides us with a convenient and useful means of overcoming distance and time constraints. ICT is integrated with biomedical science and technology in a way that offers a new high-quality medical service. As a result, rapid technological advancement is expected to play a pivotal role bringing about innovation in a wide range of medical service areas, such as medical management, testing, diagnosis, and treatment; offering new and improved healthcare services; and effecting dramatic changes in current medical services. The increase in aging population and chronic diseases has caused an increase in medical expenses. In response to the increasing demand for efficient healthcare services, a telehealth service based on ICT is being emphasized on a global level. Telehealth services have been implemented especially in pilot projects and system development and technological research. With the service about to be implemented in earnest, it is necessary to study its overall acceptance by consumers, which is expected to contribute to the development and activation of a variety of services. In this sense, the study aims at positively examining the structural relationship among the acceptance factors for telehealth services based on the Technology Acceptance Model (TAM). Data were collected by showing audiovisual material on telehealth services to online panels and requesting them to respond to a structured questionnaire sheet, which is known as the information acceleration method. Among the 1,165 adult respondents, 608 valid samples were finally chosen, while the remaining were excluded because of incomplete answers or allotted time overrun. In order to test the reliability and validity of the assessment scale items, we carried out reliability and factor analyses, and in order to explore the causal relation among potential variables, we conducted a structural equation modeling analysis using AMOS 7.0 and SPSS 17.0. The research outcomes are as follows. First, service quality, innovativeness of medical technology, and social influence were shown to affect perceived ease of use and perceived usefulness of the telehealth service, which was statistically significant, and the two factors had a positive impact on willingness to accept the telehealth service. In addition, social influence had a direct, significant effect on intention to use, which is paralleled by the TAM used in previous research on technology acceptance. This shows that the research model proposed in the study effectively explains the acceptance of the telehealth service. Second, the research model reveals that information privacy concerns had a insignificant impact on perceived ease of use of the telehealth service. From this, it can be gathered that the concerns over information protection and security are reduced further due to advancements in information technology compared to the initial period in the information technology industry, and thus the improvement in quality of medical services appeared to ensure that information privacy concerns did not act as a prohibiting factor in the acceptance of the telehealth service. Thus, if other factors have an enormous impact on ease of use and usefulness, concerns over these results in the initial period of technology acceptance may become irrelevant. However, it is clear that users' information privacy concerns, as other studies have revealed, is a major factor affecting technology acceptance. Thus, caution must be exercised while interpreting the result, and further study is required on the issue. Numerous information technologies with outstanding performance and innovativeness often attract few consumers. A revised bill for those urgently in need of telehealth services is about to be approved in the national assembly. As telemedicine is implemented between doctors and patients, a wide range of systems that will improve the quality of healthcare services will be designed. In this sense, the study on the consumer acceptance of telehealth services is meaningful and offers strong academic evidence. Based on the implications, it can be expected to contribute to the activation of telehealth services. Further study is needed to assess the acceptance factors for telehealth services, such as motivation to remain healthy, health care involvement, knowledge on health, and control of health-related behavior, in order to develop unique services according to the categorization of customers based on health factors. In addition, further study may focus on various theoretical cognitive behavior models other than the TAM, such as the health belief model.

A Study of Domain Name Disputes Resolution with the Korea-U.S. FTA Agreement (한미자유무역협정(FTA)에 따른 도메인이름 분쟁해결의 개선방안에 관한 연구)

  • Park, Yu-Sun
    • Journal of Arbitration Studies
    • /
    • v.17 no.2
    • /
    • pp.167-187
    • /
    • 2007
  • As Korea has reached a free trade agreement with the United States of America, it is required to provide an appropriate procedure to ".kr" domain name disputes based on the principles established in the Uniform Domain Name Dispute Resolution Policy(UDRP). Currently, Internet address Dispute Resolution Committee(IDRC) established under Article 16 of the Act on Internet Address Resources provides the dispute resolution proceedings to resolve ".kr" domain name disputes. While the IDRC's proceeding is similar to the UDRP administrative proceeding in procedural aspects, the Domain Name Dispute Mediation Policy that is established by the IDRC and that applies to disputes involving ".kr" domain names is very different from the UDRP for generic Top Level Domain (gTLD) in substantial aspects. Under the Korea-U.S. Free Trade Agreement(KORUS FTA), it is expected that either the Domain Name Dispute Mediation Policy to be amended to adopt the UDRP or the IDRC to examine the Domain Name Dispute Mediation Policy in order to harmonize it with the principles established in the UDRP. It is a common practice of cybersquatters to warehouse a number of domain names without any active use of these domain names after their registration. The Domain Name Dispute Mediation Policy provides that the complainant may request to transfer or delete the registration of the disputed domain name if the registrant registered, holds or uses the disputed domain name in bad faith. This provision lifts the complainant's burden of proof to show the respondent's bad faith because the complainant is only required to prove one of the three bad faiths which are registration in bad faith, holding in bad faith, or use in bad faith. The aforementioned resolution procedure is different from the UDRP regime which requires the complainant, in compliance with paragraph 4(b) of the UDRP, to prove that the disputed domain name has been registered in bad faith and is being used in bad faith. Therefore, the complainant carries heavy burden of proof under the UDRP. The IDRC should deny the complaint if the respondent has legitimate rights or interests in the domain names. Under the UDRP, the complainant must show that the respondent has no rights or legitimate interests in the disputed domain name. The UDRP sets out three illustrative circumstances, any one of which if proved by the respondent, shall be evidence of the respondent's rights to or legitimate interests in the domain name. As the Domain Name Dispute Mediation Policy provides only a general provision regarding the respondent's legitimate rights or interests, the respondent can be placed in a very week foundation to be protected under the Policy. It is therefore recommended for the IDRC to adopt the three UDRP circumstances to guide how the respondent can demonstrate his/her legitimate rights or interests in the disputed domain name. In accordance with the KORUS FTA, the Korean Government is required to provide online publication to a reliable and accurate database of contact information concerning domain name registrants. Cybersquatters often provide inaccurate contact information or willfully conceal their identity to avoid objection by trademark owners. It may cause unnecessary and unwarranted delay of the administrative proceedings. The respondent may loss the opportunity to assert his/her rights or legitimate interests in the domain name due to inability to submit the response effectively and timely. The respondent could breach a registration agreement with a registrar which requires the registrant to submit and update accurate contact information. The respondent who is reluctant to disclose his/her contact information on the Internet citing for privacy rights and protection. This is however debatable as the respondent may use the proxy registration service provided by the registrar to protect the respondent's privacy.

  • PDF

Limitations on Exclusive Rights of Authors for Library Reprography : A Comparative Examination of the Draft Revision of Korean Copyright Law with the New American Copyright Act of 1976 (저작권법에 준한 도서관봉사에 관한 연구 -미국과 한국의 저자재산권의 제한규정을 중시으로-)

  • 김향신
    • Journal of Korean Library and Information Science Society
    • /
    • v.11
    • /
    • pp.69-99
    • /
    • 1984
  • A dramatic development in the new technology of copying materials has presented us with massive problems on reconciling the conflicts between copyright owners and potential users of copyrighted materials. The adaptation to this changing condition led some countries to revise their copyright laws such as in the U. S. in 1976 and in Korea in 1984 for merging with the international or universal copyright conventions in the future. Copyright defined as exclusive rights given to copyright owners aims to secure a fair return for an author's creative labor and to stimulate artistic creativity for the general public good. The exclusive rights on copyrightable matters, generally for reproduction, preparation of derivative works, public distribution, public performance, and public display, are limited by fair use for scholarship and criticism and by library reproduction for its preservation and interlibrary loan. These limitations on the exclusive rights are concerned with all aspects of library services and cause a great burden on librarian's daily duty to provide balance between the rights of creators and the needs of library patrons. The fair use as one of the limitations on it has been coupled with enormous growth of a new technology and extended from xerography to online database systems. The implementation of the fair use and library reprography in Korean law to the local practices is examined on the basis of the new American copyright act of 1976. Under the draft revision of Korean law, librarians will face many potential problems as summarized below. 1. Because the new provision of 'life time plus 50 years' will tie up substantial bodies of material longer than the old law, until that date librarians would need permissions from the owners and should pay attention to the author's death date. 2. Because the copyright can be sold, distributed, given to the heirs, donated, as a whole or a part, librarians should chase down the heirs and other second owners. In case of a derivative work, this is a real problem. 3. Since a work has its protection from the moment of its creation, the coverage of copyrightable matter would be extended to the published or the unpublished works and librarian's work load would be heavier. Without copyright registration, no one can be certain that a work is in the public domain. Therefore, librarians will need to check with an authority. 4. For implementation of limitations on exclusive rights, fair use and library reproduction for interlibrary loan, there can be no substantial aggregate use and there can be no systematic distribution of multicopies. Therefore, librarians should not substitute reproductions for subscriptions or purchases. 5. For the interlibrary loan by photocopying, librarians should understand the procedure of royalty payment. 6. Compulsory licenses should be understood by librarians. 7. Because the draft revision of Korean law is a reciprocal treaty, librarians should take care of other countries' copyright law to protect foreign authors from Korean law. In order to solve the above problems, some suggestions are presented below. 1. That copyright clearinghouse or central agency as a centralized royalty payment mechanism be established. 2. That the Korean Library Association establish a committee on copyright. 3. That the Korean Library Association propose guidelines for each occasion, e.g. for interlibrary loan, books and periodicals and music, etc. 4. That the Korean government establish a copyright office or an official organization for copyright control other than the copyright committee already organized by the government. 5. That the Korean Library Association establish educational programs on copyright for librarians through seminars or articles written in its magazines. 6. That individual libraries provide librarian's copyright kits. 7. That school libraries distribute subject bibliographies on copyright law to teachers. However, librarians should keep in mind that limitations on exclusive rights are not for an exemption from library reprography but as a convenient access to library resources.

  • PDF

One Hundred Representative Fungi in Korea and Their Korean Names (한국의 대표 곰팡이 100종과 한국명)

  • Choi, Hyo-Won;Lim, Young Woon;Kim, Myoung-Dong;Kim, Jayoung;KIM, Changmu;Kim, Chang Sun;Do, Yun-Su;Back, Chang-Gi;Sang, Hyunkyu;Shin, Woo Chang;Lee, Seung-Yeol;Chung, Dawoon;Jung, Hee-Young;Choi, Young-Joon;Choi, In-Young;Han, Jae-Gu;Hong, Seung-Beom
    • The Korean Journal of Mycology
    • /
    • v.48 no.3
    • /
    • pp.355-367
    • /
    • 2020
  • One hundred representative species of fungi in Korea were selected and their Korean names were proposed to increase interest in fungi among Korean people. This task was performed under the supervision of the Committee of Mycological Terms, under the Korean Society of Mycology. First, the committee established the criteria for selecting 100 representative species of fungi in Korea and then selected the candidate fungal species accordingly. To ensure the uniformity and stability of Korean fungal names, the principle of naming fungi in Korean was established, and the candidate Korean fungal names were presented accordingly. Finally, the candidate Korean fungal names were posted online to collect opinions of the members of the Korean Society of Mycology. The candidate Korean names of the plant pathogenic fungi and mushrooms were reviewed by the Korean Society of Plant Pathology and the Korean Society of Mushroom Science, respectively. After their opinions were considered, the Korean names for 100 representative fungi in Korea were finally determined. The 100 fungi comprised 41 common molds and yeasts, 28 plant pathogenic fungi, and 31 mushrooms.

Personal Information Overload and User Resistance in the Big Data Age (빅데이터 시대의 개인정보 과잉이 사용자 저항에 미치는 영향)

  • Lee, Hwansoo;Lim, Dongwon;Zo, Hangjung
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.1
    • /
    • pp.125-139
    • /
    • 2013
  • Big data refers to the data that cannot be processes with conventional contemporary data technologies. As smart devices and social network services produces vast amount of data, big data attracts much attention from researchers. There are strong demands form governments and industries for bib data as it can create new values by drawing business insights from data. Since various new technologies to process big data introduced, academic communities also show much interest to the big data domain. A notable advance related to the big data technology has been in various fields. Big data technology makes it possible to access, collect, and save individual's personal data. These technologies enable the analysis of huge amounts of data with lower cost and less time, which is impossible to achieve with traditional methods. It even detects personal information that people do not want to open. Therefore, people using information technology such as the Internet or online services have some level of privacy concerns, and such feelings can hinder continued use of information systems. For example, SNS offers various benefits, but users are sometimes highly exposed to privacy intrusions because they write too much personal information on it. Even though users post their personal information on the Internet by themselves, the data sometimes is not under control of the users. Once the private data is posed on the Internet, it can be transferred to anywhere by a few clicks, and can be abused to create fake identity. In this way, privacy intrusion happens. This study aims to investigate how perceived personal information overload in SNS affects user's risk perception and information privacy concerns. Also, it examines the relationship between the concerns and user resistance behavior. A survey approach and structural equation modeling method are employed for data collection and analysis. This study contributes meaningful insights for academic researchers and policy makers who are planning to develop guidelines for privacy protection. The study shows that information overload on the social network services can bring the significant increase of users' perceived level of privacy risks. In turn, the perceived privacy risks leads to the increased level of privacy concerns. IF privacy concerns increase, it can affect users to from a negative or resistant attitude toward system use. The resistance attitude may lead users to discontinue the use of social network services. Furthermore, information overload is mediated by perceived risks to affect privacy concerns rather than has direct influence on perceived risk. It implies that resistance to the system use can be diminished by reducing perceived risks of users. Given that users' resistant behavior become salient when they have high privacy concerns, the measures to alleviate users' privacy concerns should be conceived. This study makes academic contribution of integrating traditional information overload theory and user resistance theory to investigate perceived privacy concerns in current IS contexts. There is little big data research which examined the technology with empirical and behavioral approach, as the research topic has just emerged. It also makes practical contributions. Information overload connects to the increased level of perceived privacy risks, and discontinued use of the information system. To keep users from departing the system, organizations should develop a system in which private data is controlled and managed with ease. This study suggests that actions to lower the level of perceived risks and privacy concerns should be taken for information systems continuance.

Demand for the Radiological Technologist Independent Act for the Performance of the Duties of a Radiological Technologist (방사선사 직무수행을 위한 방사선사 단독법 제정에 대한 요구도)

  • Kim, Eun-Hye;Lim, Cheong-Hwan;Lim, Woo-Taek;Joo, Young-Cheol;Hong, Dong-Hee;Jung, Hong-Ryang;Moon, Young-Ju;Kim, Hoon;Jung, Young-Jin;Choi, Ji-Won;Yoon, Yong-Su;Cho, Pyong-Kon;Park, Myeong-Hwan;Yang, Oh-Nam;Jeong, Bong-Jae
    • Journal of radiological science and technology
    • /
    • v.44 no.5
    • /
    • pp.525-534
    • /
    • 2021
  • In order to provide high-quality medical services to the public and contribute to the improvement of public health, it is necessary to enact an independent law according to the work of radiological technologists. Therefore, this study intends to review the regulations related to radiographers in the Medical Service Technologists, etc. Act. and to present opinions and directions for enactment of individual laws for radiological technologists. An online survey was conducted to 15,000 radiological technologists working in medical institutions and education sites in Korea; 1,027 people (6.85%) responded. The questionnaire consisted of 3 questions on demographic characteristics, 5 questions on the scope of work, and 12 questions on the revision of the Medical Service Technologists, etc. Act. and the establishment of the Radiological Technologist Independent Act. Reliability and factor analysis were performed on 9 questions measured on a Likert 5-point scale in "Revision of the Medical Service Technologists, etc. Act. and the establishment of the Radiological echnologist Independent Act" among the questionnaire items. Reliability for the total 9 questions was Chronbach α=0.728. There was a high perception that the regulations related to radiological technologists were insufficient in the current Medical Service Technologists, etc. Act., and the perception that examinations performed by radiological technologists at medical institutions were included in medical practice was high. If the Radiological Technologist Independent Act is enforced, a high percentage of respondents said that they could receive legal protection through the institutionalization of the scope of work, that the status of radiological technologists would be improved, and the scope of work would be expanded. The response that the scope of work of radiological technologists should be included was the highest at 96.6%. In the analysis according to demographic characteristics, it was found that 96.7% of the respondents were agreed regardless of the factors. Radiological technologists will have to work hard to secure the public health by coping with new radiology devices, procedures and treatment methods. Therefore, as the results of this study, it is expected that the enactment and implementation of the Radiological Technologist Independent Act will contribute to the improvement of the quality of treatment for patients and to the public health.

Sexual Trauma Survivors and Their Mental Health: Assessing Based on Types of the Traumatic Event (성적 트라우마 경험자의 정신건강: 트라우마 사건유형에 따른 비교 분석)

  • Soyoung Choi;Hyeyun Kim;Sumi Chae
    • Health Policy and Management
    • /
    • v.34 no.2
    • /
    • pp.129-140
    • /
    • 2024
  • Background: The mental health issues caused by trauma can manifest differently depending on the characteristics of the traumatic event. Particularly, individuals who have experienced sexual trauma are known to have more negative mental health outcomes compared to those who have experienced non-sexual trauma. The mental health issues of individuals who have experienced sexual trauma are severe, and new forms of threats, such as digital sexual crimes, are emerging. This study aimed to investigate whether the type of traumatic event, particularly focusing on sexual trauma events, contributes to differences in mental health outcomes and to identify factors influencing suicidal ideation and potential post-traumatic stress disorder (PTSD) risk. Methods: Based on an online survey conducted nationwide among adults aged 20 to 50, participants were categorized based on the type of trauma they experienced (sexual trauma events and non-sexual trauma events). The study conducted propensity score matching (PSM) using demographic factors (sex, age group, subjective economic status, and marital status) and resilience protective factors (cognition of recoverability, social support, and protection experiences in childhood) as control variables, excluding the experience of sexual trauma events, to investigate their potential impact on mental health (suicidal ideation and potential PTSD risk). Subsequently, binary logistic regression analysis was conducted to identify factors influencing mental health. Results: Even after PSM, individuals who experienced sexual trauma exhibited more negative outcomes in terms of suicidal ideation and potential PTSD risk compared to those who experienced non-sexual trauma. The results of binary logistic regression analysis showed that sexual trauma survivors were 1.9 times more likely to have suicidal thoughts (odds ratio [OR], 1.911) and 2.5 times more likely to have a potential PTSD risk (OR, 2.472). Furthermore, as resilience protective factors became more negative, the likelihood of suicidal ideation and potential PTSD risk increased. Conclusion: This study emphasizes the importance of understanding and supporting individuals who have experienced sexual trauma, highlighting the necessity for strategies aimed at mitigating suicidal ideation and potential PTSD risk among sexual trauma survivors, while also facilitating recovery through the promotion of resilience protective factors.

Research to Establish a Common Standard for Assent by Assessing the Current State of the Assent Process and Conducting Interviews with Pediatrician/Pediatric Neurologist (소아승낙 현황조사와 소아청소년과/소아신경과 전문의를 대상으로 면담조사를 통한 소아승낙서 공통기준 수립 연구)

  • Yoon Jin Lee;Sun Ju Lee;Su Jin Kang;Dae Ho Lee;Kyun-Seop Bae;Jong Woo Chung;Byung Soo Kim;Jin Seok Kim;Myung Ah Lee
    • The Journal of KAIRB
    • /
    • v.6 no.1
    • /
    • pp.5-16
    • /
    • 2024
  • Purpose: The purpose of this study is to investigate the current status of pediatric assent in nationwide hospitals and to assess the children's comprehension for pediatric assent by interviewing pediatricians/pediatric neurologists to determine whether children of the age (elementary and middle school students) can understand the purpose, risks, benefits, and concepts of voluntary participation in clinical research described in the assent form, and to help improve the administrative efficiency of multicenter clinical trials. Methods: The status of pediatric assent was surveyed online using Google Forms at 141 university hospitals with administrative staff who are members of the Institutional Review Board (IRB) administrative staff subcommittee with in Korean Association of Institutional Review Boards (KAIRB). Additionally, face-to-face interviews were conducted with 7 pediatricians/pediatric neurologists. Survey and interview responses were summarized using descriptive statistics. Results: Out of the 141 institutions surveyed, 35 institutions (24.8%) responded. Among them, 30 institutions (85.7%) reported having age criteria for acquiring pediatric assent forms in the case of children. The age range for pediatric assent acquisition have been from 7 years old to 12 years old (15 institutions, 50%), and from 7 years old to 15 years old (7 institutions, 23.3%). Nine institutions (25.7%) have had criteria for obtaining both parents' consent in cases involving the participation of children. Nineteen institutions (54.3%) have had checklists or guidelines available for use by IRB members in study protocols involving vulnerable research subjects. Three pediatricians/pediatric neurologists have believed that upper-grade elementary school students (5th-6th grade) could comprehensively understand informed consent forms. Two have believed that middle school students would be able to understand them if they included personal information. Two pediatricians/pediatric neurologists have believed that even lower-grade elementary school students (1st-4th grade) could understand the explanations if they were made simpler. Conclusion: It is suggested that not only elementary school students (7-12 years old) but also middle school students (13-15 years old) should receive pediatric assent forms, as it would facilitate a comprehensive understanding of the forms. To enhance the comprehension of assent form content, it is necessary to use age-appropriate words, language, and expressions in the forms hospital. It is also recommended to create comics or videos to make the content of the assent forms more accessible for children.

  • PDF

Privacy Intrusion Intention on SNS: From Perspective of Intruders (SNS상에서 프라이버시 침해의도: 가해자 관점으로)

  • Eden Lee;Sanghui Kim;DongBack Seo
    • Information Systems Review
    • /
    • v.20 no.1
    • /
    • pp.17-39
    • /
    • 2018
  • SNS enables people to easily connect and communicate with each other. People share information, including personal information, through SNS. Users are concerned about their privacies, but they unconsciously or consciously disclose their personal information on SNS to interact with others. The privacy of a self-disclosed person can be intruded by others. A person can write, fabricate, or distribute a story using the disclosed information of another even without obtaining consent from the information owner. Many studies focused on privacy intrusion, especially from the perspective of a victim. However, only a few studies examined privacy intrusion from the perspective of an intruder on SNS. This study focuses on the intention of privacy intrusion from the perspective of an intruder on SNS and the factors that affect intention. Privacy intrusion intentions are categorized into two types. The first type is intrusion of privacy by writing one's personal information without obtaining consent from the information owner;, whereas the other type pertains to intrusion of privacy by distributing one's personal information without obtaining consent from the information owner. A research model is developed based on motivation theory to identify how these factors affect these two types of privacy intrusion intentions on SNS. From the perspective of motivation theory, we draw one extrinsic motivational factor (response cost) and four intrinsic motivational factors, namely, perceived enjoyment, experience of being intruded on privacy, experience of invading someone's privacy, and punishment behavior. After analyzing 202survey data, we conclude that different factors affect these two types of privacy intrusion intention. However, no relationship was found between the two types of privacy intrusion intentions. One of the most interesting findings is that the experience of privacy intrusion is the most significant factor related to the two types of privacy intrusion intentions. The findings contribute to the literature on privacy by suggesting two types of privacy intrusion intentions on SNS and identifying their antecedents from the perspective of an intruder. Practitioners can also use the findings to develop SNS applications that can improve protection of user privacies and legitimize proper regulations relevant to online privacy.

Analysis of Surveys to Determine the Real Prices of Ingredients used in School Foodservice (학교급식 식재료별 시장가격 조사 실태 분석)

  • Lee, Seo-Hyun;Lee, Min A;Ryoo, Jae-Yoon;Kim, Sanghyo;Kim, Soo-Youn;Lee, Hojin
    • Korean Journal of Community Nutrition
    • /
    • v.26 no.3
    • /
    • pp.188-199
    • /
    • 2021
  • Objectives: The purpose was to identify the ingredients that are usually surveyed for assessing real prices and to present the demand for such surveys by nutrition teachers and dietitians for ingredients used by school foodservice. Methods: A survey was conducted online from December 2019 to January 2020. The survey questionnaire was distributed to 1,158 nutrition teachers and dietitians from elementary, middle, and high schools nationwide, and 439 (37.9% return rate) of the 1,158 were collected and used for data analysis. Results: The ingredients which were investigated for price realities directly by schools were industrial products in 228 schools (51.8%), fruits in 169 schools (38.4%), and specialty crops in 166 schools (37.7%). Moreover, nutrition teachers and dietitians in elementary, middle, and high schools searched in different ways for the real prices of ingredients. In elementary schools, there was a high demand for price information about grains, vegetables or root and tuber crops, special crops, fruits, eggs, fishes, and organic and locally grown ingredients by the School Foodservice Support Centers. Real price information about meats, industrial products, and pickled processed products were sought from the external specialized institutions. In addition, nutrition teachers and dietitians in middle and high schools wanted to obtain prices of all of the ingredients from the Offices of Education or the District Office of Education. Conclusions: Schools want to efficiently use the time or money spent on research for the real prices of ingredients through reputable organizations or to co-work with other nutrition teachers and dietitians. The results of this study will be useful in understanding the current status of the surveys carried out to determine the real price information for ingredients used by the school foodservice.