• Title/Summary/Keyword: Personal mobility

Search Result 272, Processing Time 0.027 seconds

Structural Model of Nurses' Career Commitment (간호사의 경력몰입에 관한 구조모형)

  • Lee, Mi Young;Im, Sook Bin
    • Journal of Korean Clinical Nursing Research
    • /
    • v.18 no.3
    • /
    • pp.341-353
    • /
    • 2012
  • Purpose: This study was done to construct a hypothetical model to explain the factors influencing career commitment of nurses. Methods: Three factors (individual internal-, job- and career-characteristics) and 8 sub-factors were measured with Likert scales. Data collection was conducted from Jan. 11 to 31, 2011 using self-report questionnaires. Participants(738 nurses) were selected from 6 hospitals in 2 metropolitan cities of South Korea. Collected data were analyzed using SPSS Window 16.0 and Amos 19.0. Results: 1) Among the 3 factors, career commitment was most strongly influenced by career-characteristics. 2) Career commitment wasinfluenced by organizational-career-management but not by personal-career-management. 3) Career commitment was influenced by individual internal-characteristics but not by job-characteristics. 4) Of the 8 sub-factors, career commitment was most strongly influenced by desire-for-growth but not by self-efficiency. Conclusion: The results of this study indicate that in order to improve career commitment of nurses it is necessary to implement custom-made career development policies considering individual characteristics in the organizational level.

Privacy Protection from Unmanned Aerial Vehicle (무인항공기 사생활 보호 방안)

  • Lee, Bosung;Lee, Joongyeup;Park, Yujin;Kim, Beomsoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.1057-1071
    • /
    • 2016
  • Privacy-right infringement using unmanned aerial vehicle (UAV) usually occurs due to the unregistered small UAV with the image data processing equipment. In this paper we propose that privacy protection acts, Personal Information Protection Act, Information and Communications Network Act, are complemented to consider the mobility of image data processing equipment installed on UAV. Furthermore, we suggest the regulations for classification of small UAVs causing the biggest concern of privacy-right infringement are included in aviation legislations. In addition, technological countermeasures such as recognition of UAV photographing and masking of identifying information photographed by UAV are proposed.

A Study of PDAs Icon Design Guideline Considered User's Cognitive Human Factor (사용자 인지특성을 고려한 PDA아이콘 설계지침에 관한 연구)

  • Kim, Sang-hwan;Myung, Rohae
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.30 no.4
    • /
    • pp.338-345
    • /
    • 2004
  • Personal Digital Assistants (PDAs) have become ubiquitous and continued to gain popularity. Since PDAs have some special contexts such as mobility and limited screen size, icons are utilized frequently because icons allow us to do tasks more rapidly and effectively on PDAs like another information appliances. The study presents a cognitive approach to study human factors affecting icon design with multidimensional Scaling (MDS) analysis. In the experiment, a real PDA was used to investigate 29 attributes and2 preference ratings for 22 PDA icons by 20 Korean subjects. As a result, cognitive positioning about icons, attributes, and preference data were arranged on the two dimensional perceptual map. Attributes were grouped by simplicity, universality, activity, complexity, abstraction, static, and alphanumeric time. Subjects preferences were highly related with simplicity attributes group and positive to universality and activity attributes groups. It was also confirmed that there are some icons unfitted to the mental model of Korean. However, when icons are designed for PDAs or similar information appliances to Korean, it should be designed simply and actively with universal image fitted on target users mental model.

Application of Multi-Purposed Emotional Space for Renewing Idle Spaces around Core Cultural Facilities - Focused on the National Asian Culture Complex - (거점 문화시설 인근 유휴공간의 재생을 위한 다목적 감성공간 적용 - 국립 아시아문화전당을 대상으로 -)

  • Kim, Seulki;Han, Seung-Hoon
    • KIEAE Journal
    • /
    • v.16 no.1
    • /
    • pp.103-110
    • /
    • 2016
  • Purpose: This study suggests the multi-purposed emotional space that is one of the alternatives to reuse idle spaces in the city. Because human who is living in modern society begins pursue new contents and leisurely life all the time and live toward the period of high emotion with personal characteristics, architectural industry also need to change its planning and design to satisfy contemporary man and to adjust rapid social mobility. Method: For this study, the buildings where are located near Asia Cultural Complex (ACC) and leaved as idle spaces now that is used for important facilities are used to apply the multi-purposed emotional Space. Essential methodology and terminology were examined to estimate and construct the multi-purposed emotional space. Result: The multi-purposed emotional space provides that people aggressively request subjects to satisfy their emotional attractiveness as well as comforts and pleasures beyond the functional basic requirements in space. On the other words, it can be regarded as limited context to physical space responsive to social and environmental changes for the surrounding, and may maximize user experiences. Since emotions tend to be abstract and subjective while architectural space has pretty physical properties, this study attempts to integrate contrastive properties between emotional and architectural spaces to make a real object.

A Study on Wireless Network Management for Security Enhancement (보안강화를 위한 무선 네트워크 관리 방안에 관한 연구)

  • Lee, Eun-Sub;Kim, Young-Kon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.3
    • /
    • pp.195-200
    • /
    • 2020
  • Wireless LANs are being used in many fields due to their ease of use. The biggest advantage of the WLAN can be said above all mobility. Domestic wired internet service has been saturated since 2006, but wireless internet users have been steadily increasing. However, WLAN has many advantages and characteristics of wireless service. It has a number of security vulnerabilities, and various security related technologies have been developed and applied to solve these problems. On the other hand, security awareness of WLAN users is still insufficient, and security accidents such as personal information leakage occur repeatedly every year. We will study the main weaknesses that can occur in WLAN and suggest security measures from the management level.

Relay Communication Scheme for Conflict Avoidance in Wireless USB System (무선 USB 통신 시스템에서 충돌 회피를 위한 릴레이 통신 기법)

  • Kim, Jin-Woo;Kim, Kyung-Ho;Lee, Seong Ro
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.8
    • /
    • pp.696-707
    • /
    • 2014
  • In this paper, firstly, performance degradation due to the Private Distributed Reservation Protocol (DRP) conflict problem caused by devices' mobility is analyzed. And a novel relay transmission protocol combined with Private DRP conflict resolution is proposed to overcome the performance degradation at Private DRP conflicts. In order to give the loser device due to Private DRP conflicts another chance to maintain resources, the proposed relay transmission protocol executed at each device helps the loser device reserve another indirect link maintaining the required resources via a relay node.

Transnational Life of Korean 'Wild Geese Family': Coping Strategies and Family Paths Across Time (기러기가족의 초국적 적응전략 및 가족 경로)

  • Kang, Yoo-Jean
    • The Korean Journal of Community Living Science
    • /
    • v.20 no.2
    • /
    • pp.205-221
    • /
    • 2009
  • My concern was to explore how the Korean 'wild geese families' functioned to maintain 'familyhood' in spite of spatial separation by using a qualitative approach. I used personal narratives from eleven 'geese mothers' living in the United States. Family paths across time were analyzed to understand their complicated nature. Respondents adopted some coping strategies to obtain the flexibility and the stability for relocating their transnational lives. These were 1) communications, 2) relocation of household work, and 3) reinterpretation of 'sacrifice.' It seemed that their family paths become either the continuous type (prolong their stay) or the discontinuous type (not prolong their stay). These were shaped by complex individual, familial, and social forces which affected differently according to the steps of family life cycles. Therefore, this study showed that the Korean 'wild geese family' did not move toward the uni-direction with the same experiences and nature. More importantly, it is noteworthy to acknowledge that the prevalence of 'wild geese family' reveals the dynamic interactive nature of the family, i.e., actively responding to the changes and challenges from the diverse circumstances. It is inferred that the social and cultural factors such as the class mobility, the education system, and the values may influence the family life style.

  • PDF

Dynamic QoS Mechanism for supporting VoIP Service in Tactical Communication Environment (전술환경에서의 VoIP 서비스를 위한 Dynamic QoS 기법 연구)

  • Shin, Dong-Yun;Kim, Young-Gil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.367-370
    • /
    • 2011
  • Tactical communication environment evolving for the purpose of providing services such as voice, video and text based on ALL-IP. Therefore, To be able to guarantee QoS level which meets the required level of subscriber for these services in the constrained tactical communication infrastructure, it is required to take the characteristics such as wireless transmission link, mobility of troops or personal into service quality scheme. In this paper, to support differentiated QoS for each individual or mission in the tactical communication environment, we presents a technique that can provide same QoS level which was served originally regardless of the situation to user's move through dynamically determining the QoS level to be provided at the time of the service request on VoIP-Switch.

  • PDF

Nursing, Robotics, Technological Revolution: Robotics to Support Nursing Work (간호, 로봇, 과학기술 혁명: 간호업무 지원을 위한 로봇 시스템)

  • Song, Young Ae;Kim, Hyun Jeong;Lee, Hyun Kyong
    • Journal of Korean Gerontological Nursing
    • /
    • v.20 no.sup1
    • /
    • pp.144-153
    • /
    • 2018
  • Purpose: The purpose of this study was to review the influence of robot systems on nursing and robotics technology. Methods: The research design was a review article. The literature was done to help understand the current status and effects of robotic technology in the healthcare field, both domestic and overseas. The keywords searched were 'Nursing', 'Robot', and 'Patient safety' in Pubmed, CINAHL etc, and 'Nursing Activity', 'Nursing Care Integration Service' in RISS and KISS. Results: In healthcare, robotics is used in five areas; personal care robots, mobility and transfer robots, cognitive and emotional robots, nursing assist robots and care robots in palliative home care settings. Nurses' demands for utilization of robotic systems are high. Especially, if robotics is used for indirect and non-value-added nursing activities, efficiency may increase. Therefore, robotics should be used to help nurses focus on bedside care and perform better nursing care. Conclusion: Future robots and technology can help nurse to provide optimal nursing to patients, and will improve the quality life of patients. It is suggested that nursing research should be actively pursued in the future. Especially, it is an urgent field to improve nursing quality and reduce the burden of nurses.

Analyses of Security Issues for Internet of Things in Healthcare Application (헬스캐어 시스템에서의 사물 인터넷 통신을 위한 보안 문제 분석)

  • Shin, Yoon-gu;Kim, Hankyu;Kim, Sujin;Kim, Jung Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.699-700
    • /
    • 2014
  • The use of Radio Frequency Identification technology (RFID) in medical context enables not only drug identification, but also a rapid and precise identification of patients, physicians, nurses or any other healthcare giver. The combination of RFID tag identification with structured and secured Internet of Things (IoT) solutions enables ubiquitous and easy access to medical related records, while providing control and security to all interactions. This paper defines a basic security architecture, easily deployable on mobile platforms, which would allow to establish and manage a medication prescription service in mobility context making use of electronic Personal Health Records. This security architecture is aimed to be used with a mobile e-health application (m-health) through a simple and intuitive interface, supported by RFID technology. This architecture, able to support secured and authenticated interactions, will enable an easy deployment of m-health applications. The special case of drug administration and ubiquitous medication control system, along with the corresponding Internet of Things context, is presented.

  • PDF