• Title/Summary/Keyword: Online review

Search Result 1,116, Processing Time 0.023 seconds

Evaluation of HbA1c Levels Via the Latex Immunoturbidimetric Method by Using Chemistry Autoanalyzer (자동화학분석기에서의 라텍스 면역비탁법의 Autolab HbA1c 평가)

  • Jo, Yongjun;Lee, So-young;Park, Hae-il;Kim, YeongSic;Lee, Jehoon;Kim, Yonggoo;Han, Kyungja
    • Laboratory Medicine Online
    • /
    • v.2 no.1
    • /
    • pp.10-14
    • /
    • 2012
  • Background: Measurement of HbA1c levels is widely used to diagnose diabetes mellitus and to evaluate and monitor plasma-glucose concentrations over 6-8 weeks. In this study, we evaluated the diagnostic performance of the newly developed latex immunoturbidimetric method by using Autolab HbA1c. Methods: We analyzed and compared the diagnostic performance of Autolab HbA1c with that of Toshiba 200FR between April 2009 and July 2009. According to guidelines (EP5-A2, EP6-P, EP9-A2) of the clinical and laboratory standards institute (CLSI), we compared linearity, precision and correlation of Autolab HbA1c with those of G7 (Tosoh Corp., Kyoto, Japan) by using high-performance liquid chromatography (HPLC) method. Results: Data obtained using Autolab HbA1c showed good linearity in mixtures of samples with low (3.1%) and high (15.1%) levels of HbA1c (r2=0.9997). In the analysis of within-run precision of the samples with HbA1c levels of 5.1% and 12.1%, the SDs were 0.04 and 0.06 and covariances of these samples were 0.8% and 0.5%, respectively. In the Deming regression model, the regression equation was as follows: Autolab HbA1c=1.0859×Tosoh HPLC-0.6957. Conclusions: In this study, Autolab HbA1c method showed better performance characteristics than Tosoh G7 did. In reference review, there was no interference of variant hemoglobin. The data acquisition time of Autolab HbA1c was lower than that of Tosoh G7. The advantages of Autolab HbA1c are that it can be used as an autoanlyzer in routine chemical analysis, it does not require pre-analytical treatment, and the samples are automatically treated with distilled water for hemolysis.

Characteristics of User's Behavior across Generations for space planing in General Hospital (종합병원 환경계획을 위한 세대별 종합병원 이용행태 특성분석)

  • Park, Hey Kyung;Oh, Ji Young
    • Korea Science and Art Forum
    • /
    • v.28
    • /
    • pp.105-116
    • /
    • 2017
  • This study is a basic research to suggest user-centered general hospital environmental design guidelines, which aims to analyze user's behavior characteristics across generation in general hospital. For this purpose, this study constructed an analysis tool through the literature review with regard to generation and behavior characteristics in general hospital. Besides, an online survey regarding user's behavior in general hospital was conducted targeting from 20s to 60s, 300 persons for each group, total 1,500 persons for about 3 weeks since September 1, 2016. The results of this study are as follows: (1) Based on the generation, there were significant differences in relevant categories of their visiting frequency, visiting purpose, visiting hour, transportation, companion, behavior during the wait and selection of a general hospital. (2) In all generation, they responded that they have visited once or twice per year. People in 20s and 30s responded that their visit for the hospital is to receive specific treatment, while other people in 40s, 50s and 60s visit the hospital majorly for routine check-ups. Therefore, it is imperative for a health check-up center to design an environmental plan that reflects the characteristics of elders in 40s, 50s and 60s. (3) People in 40s, 50s and 60s usually visit a general hospital in the mornings of weekdays, while generations in 20s and 30s responded that they mostly visit the hospital in the mornings of weekend. (4) When they visit a general hospital, people in their 20s are usually using public transportations, while people in their 30s to 60s are using their own vehicle. (5) People in their 20s majorly visited 'lobby'. In older generations, they tend to visit 'outpatient clinic'. Therefore, it is necessary to build an outpatient clinic environment that considers the elderly. (6) Patients majorly responded that they are using their cell phone, while waiting for their clinic call. In elder generations, they responded that they are more likely watching TVs, reading books/magazines or doing nothing. Therefore, it is essential to provide cell-phone related services and environmental supports. Visually attractive media can be utilized for this purpose.

A Study on the Choice of Export Payment Types by Applying the Characteristics of the New Trade & Logistics Environment (신(新)무역물류환경의 특성을 적용한 수출대금 결제유형 선택연구)

  • Chang-bong Kim;Dong-jun Lee
    • Korea Trade Review
    • /
    • v.48 no.4
    • /
    • pp.303-320
    • /
    • 2023
  • Recently, import and export companies have been using T/T remittance and Surrender B/L more frequently than L/C when selecting the process and method of trade payment settlement. The new trade and logistics environment is thriving in the era of the Fourth Industrial Revolution (4IR). Document-based trade transactions are undergoing a digitalization as bills of lading or smart contracts are being developed. The purpose of this study is to verify whether exporters choose export payment types based on negotiating factors. In addition, we would like to discuss the application of the characteristics of the new trade and logistics environment. Data for analysis was collected through surveys. The collection method consisted of direct visits to the company, e-mail, fax, and online surveys. The survey distribution period is from February 1, 2023, to April 30, 2023. The questionnaire was distributed in 2,000 copies, and 447 copies were collected. The final 336 copies were used for analysis, excluding 111 copies that were deemed inappropriate for the purpose of this study. The results of the study are shown below. First, among the negotiating factors, the product differentiation of exporters did not significantly affect the selection of export payment types. Second, among the negotiating factors, the greater the purchasing advantage recognized by exporters, the higher the possibility of using the post-transfer method. In addition to analyzing the results, this study suggests that exporters should consider adopting new payment methods, such as blockchain technology-based bills of lading and trade finance platforms, to adapt to the characteristics of the evolving trade and logistics environment. Therefore, exporters should continue to show interest in initiatives aimed at digitizing trade documents as a response to the challenges posed by bills of lading. In future studies, it is necessary to address the lack of social awareness in Korea by conducting advanced research abroad.

Importance and requirements for dental prosthesis order platform services: a survey of dental professionals (치과 보철물 거래 플랫폼 서비스의 중요성과 요구사항: 치과 전문가 설문조사)

  • Gyu-Ri Kim;Keunbada Son;Du-Hyeong Lee;So-Yeun Kim;Myoung-Uk Jin;Kyu-Bok Lee
    • Journal of Dental Rehabilitation and Applied Science
    • /
    • v.39 no.3
    • /
    • pp.105-118
    • /
    • 2023
  • Purpose: This study aimed to gain better understanding of the importance of dental prosthesis order platform services and to identify the essential elements for their enhancement and wider adoption among dental professionals. Materials and Methods: A survey was conducted to assess the perspectives of dentists, dental technicians, dental hygienists, and dental industry professionals toward dental prosthesis ordering and associated platform services (a total of 53 respondents). The questionnaire was devised after an expert review and assessed for reliability using Cronbach's alpha coefficient. Factor analysis revealed that 57 factors across five categories accounted for 88.417% of the total variance. The survey was administered through an online questionnaire platform, and data analysis was conducted using a statistical software, employing one-way analysis of variance and Tukey's honestly significant difference test (α = 0.05). Results: The essential elements identified were accurate information input, effective communication, delivery of distortion-free impressions, convenience in data transmission and storage, development of stable and affordable platform services (P < 0.05). Furthermore, significant differences were observed in the importance of these items based on age, dental profession, and career experience (P < 0.05). Conclusion: The dental prosthesis ordering platform services, the requirements of dental personnel were stability, economic efficiency, and ease of transmitting and storing prosthesis data. The findings can serve as important indicators for the development and improvement of dental prosthesis order platform services.

Violations of Information Security Policy in a Financial Firm: The Difference between the Own Employees and Outsourced Contractors (금융회사의 정보보안정책 위반요인에 관한 연구: 내부직원과 외주직원의 차이)

  • Jeong-Ha Lee;Sang-Yong Tom Lee
    • Information Systems Review
    • /
    • v.18 no.4
    • /
    • pp.17-42
    • /
    • 2016
  • Information security incidents caused by authorized insiders are increasing in financial firms, and this increase is particularly increased by outsourced contractors. With the increase in outsourcing in financial firms, outsourced contractors having authorized right has become a threat and could violate an organization's information security policy. This study aims to analyze the differences between own employees and outsourced contractors and to determine the factors affecting the violation of information security policy to mitigate information security incidents. This study examines the factors driving employees to violate information security policy in financial firms based on the theory of planned behavior, general deterrence theory, and information security awareness, and the moderating effects of employee type between own employees and outsourced contractors. We used 363 samples that were collected through both online and offline surveys and conducted partial least square-structural equation modeling and multiple group analysis to determine the differences between own employees (246 samples, 68%) and outsourced contractors (117 samples, 32%). We found that the perceived sanction and information security awareness support the information security policy violation attitude and subjective norm, and the perceived sanction does not support the information security policy behavior control. The moderating effects of employee type in the research model were also supported. According to the t-test result between own employees and outsourced contractors, outsourced contractors' behavior control supported information security violation intention but not subject norms. The academic implications of this study is expected to be the basis for future research on outsourced contractors' violation of information security policy and a guide to develop information security awareness programs for outsourced contractors to control these incidents. Financial firms need to develop an information security awareness program for outsourced contractors to increase the knowledge and understanding of information security policy. Moreover, this program is effective for outsourced contractors.

Privacy Intrusion Intention on SNS: From Perspective of Intruders (SNS상에서 프라이버시 침해의도: 가해자 관점으로)

  • Eden Lee;Sanghui Kim;DongBack Seo
    • Information Systems Review
    • /
    • v.20 no.1
    • /
    • pp.17-39
    • /
    • 2018
  • SNS enables people to easily connect and communicate with each other. People share information, including personal information, through SNS. Users are concerned about their privacies, but they unconsciously or consciously disclose their personal information on SNS to interact with others. The privacy of a self-disclosed person can be intruded by others. A person can write, fabricate, or distribute a story using the disclosed information of another even without obtaining consent from the information owner. Many studies focused on privacy intrusion, especially from the perspective of a victim. However, only a few studies examined privacy intrusion from the perspective of an intruder on SNS. This study focuses on the intention of privacy intrusion from the perspective of an intruder on SNS and the factors that affect intention. Privacy intrusion intentions are categorized into two types. The first type is intrusion of privacy by writing one's personal information without obtaining consent from the information owner;, whereas the other type pertains to intrusion of privacy by distributing one's personal information without obtaining consent from the information owner. A research model is developed based on motivation theory to identify how these factors affect these two types of privacy intrusion intentions on SNS. From the perspective of motivation theory, we draw one extrinsic motivational factor (response cost) and four intrinsic motivational factors, namely, perceived enjoyment, experience of being intruded on privacy, experience of invading someone's privacy, and punishment behavior. After analyzing 202survey data, we conclude that different factors affect these two types of privacy intrusion intention. However, no relationship was found between the two types of privacy intrusion intentions. One of the most interesting findings is that the experience of privacy intrusion is the most significant factor related to the two types of privacy intrusion intentions. The findings contribute to the literature on privacy by suggesting two types of privacy intrusion intentions on SNS and identifying their antecedents from the perspective of an intruder. Practitioners can also use the findings to develop SNS applications that can improve protection of user privacies and legitimize proper regulations relevant to online privacy.