Kim, Youngaee;Song, Sanghoon;Lee, Hyunjin;Kim, Taeyun
Journal of The Korea Institute of Healthcare Architecture
/
v.28
no.4
/
pp.31-39
/
2022
The purpose of this study is to analyse the hazard risk by examining the magnitude and severity of each type of hazard in order to mitigate and prepare for disasters in medical facilities. Methods: The hazard risk analysis for hazard types was surveyed for team leaders of medical facilities. The questionnaire analyzed data from 27 facilities, which were returned from 41 Local Medical Centers. Results: When looking at the 'Risk' by category type of hazard, the influence of health safety and fire/energy safety comes first, followed by natural disaster, facility safety, and crime safety. On the other hand, as for 'Magnitude', facility safety and crime safety come first, followed by health safety, fire/energy safety, and natural disasters. Most of the top types of disaster judged to have high hazard in medical facilities are health types. The top five priorities of hazard in medical facilities, they are affected by the geographical and industrial conditions of the treatment area. In the case of cities, the hazard was found to be high in the order of infectious disease, patient surge, and wind and flood damage. On the other hand, in rural areas, livestock diseases and infectious diseases showed the highest hazard. In the case of forest areas, the hazard was high in the order of wildfire, fire accident, lightning, tide, earthquake, and landslide, whereas in coastal areas of industrial complexes, the hazard was high due to fire, landslide, water pollution, marine pollution, and chemical spill accident. Implications: Through the research, standards will be established for the design of hospitals with disaster preparedness, and will contribute to the preparation of preemptive measures in terms of maintenance.
This paper explores critically and historically some of the popular academic views concerning the development of the study of Southeast Asia through the lens of the contributions of particular scholars and institutions. Within the broad field of Southeast Asian Studies the focus is on the disciplines of geography, history and ethnology. There are certain views concerning the development of scholarship on Southeast Asia which continue to surface and have acquired, or are in the process of acquiring "mythical" status. Among the most enduring is the claim that the region is a post-Second World War construction primarily arising from Western politico-strategic and economic preoccupations. More specifically, it is said that Southeast Asian Studies for a considerable period of time has been subject to the American domination of this field of scholarship, located in programs of study in such institutions as Cornell, Yale and California, Berkeley, and, within those institutions, focused on particular scholars who have exerted considerable influence on the directions which research has taken. Another is that, based on the model or template of Southeast Asian Studies (and other area studies projects) developed primarily in the USA, it has distinctive characteristics as a scholarly enterprise in that it is multidisciplinary, requires command of the vernacular, and assigns special importance to what has been termed 'groundedness' and historical, geographical and cultural contextualization; in other words, a Southeast Asian Studies approach as distinct from disciplinarybased studies addresses local concerns, interests, perspectives and priorities through in-depth, on-the-ground, engaged scholarship. Finally, views have emerged that argue that a truly Southeast Asian Studies project can only be achieved if it is based on a set of locally-generated concepts, methods and approaches to replace Western ethnocentrism and intellectual hegemony.
Journal of Korean Society of Industrial and Systems Engineering
/
v.45
no.3
/
pp.31-39
/
2022
The Army, Navy, and Air Force are currently making various efforts to apply defense IoT technology by reflecting the characteristics of each military. However, there are concerns that comprehensive collection, management, and analysis may be limited because each military has no overlapping system or guaranteed interoperability of data, and there are inefficient aspects in terms of using and investing a limited defense budget. In this study, evaluation items and priorities for pilot projects were selected by applying Delphi technique and AHP method to determine which projects are preferentially effective when commonly applied in terms of Army, Navy, and Air force. As a result of the analysis, the project basis and driving force, project feasibility, performance and ripple effect, redundancy and connection were identified in the order of IoT-based small detachment units and unmanned base construction, intelligent smart unit, smart ground ammunition depot, and smart training management system. According to the comprehensive results reflecting the weights of each evaluation item, the fact that small detachment units and unmanned base construction project are recognized as the first project to be applied to the Army, Navy, and Air Force is a valid approach to be effective while each military is burdened with personnel management because of the reduction of manpower. Through the research results, it is expected that the direction of application to the policy of the defense IoT project can be confirmed in terms of efficient use of limited budgets.
The Journal of The Korea Institute of Intelligent Transport Systems
/
v.22
no.4
/
pp.179-193
/
2023
research on user-friendly experience design is crucial to reduce resistance and enhance acceptance of robotaxis. This study analyzes the prioritization of design factors in robotaxi systems and provides design guidelines based on user experience. Using the AHP(Analytic Hierarchy Process) technique, users' perceived importance of four primary design factors and sixteen 16 sub-design elements were assessed, and comfort and safety were top priorities. The results showed that the artificial intelligence agent was the most critical design factor, followed by driving guidance information, interior design, and exterior design. These findings offer valuable insights for robotaxi professionals, and could assist in informed decision-making and creating user-centered design guidelines.
Purpose: Although the term "transition to motherhood" is commonly used in research, the concept is not clear. This study, hence, was conducted to clarify the concept of "transition to motherhood." Methods: The concept analysis framework developed by Walker and Avant is used to analyze the concept of transition to motherhood. Results: Transition to motherhood is defined as the physical, psychological, social, and relational (mother-baby relationship/interpersonal relationship) changes that happen to a woman after pregnancy and delivery of a baby. The attributes of the transition to motherhood include: 1) adapting to physical changes after pregnancy and childbirth; 2) experiencing various psychological changes; 3) changing of her social perception from being a woman to someone's mother; and 4) forming and developing a relationship with the newborn, adjusting priorities, and redefining the relationship between family and others. Meeting the newborn is regarded as an antecedent of the transition to motherhood. Redefining identity and physical image, ensuring mother's well-being, maternal attachment, and confidence in the maternal role are regarded as consequences of the transition to motherhood. The concept was clarified by the presentation of model, borderline, and contrary cases. Conclusion: The significance of this study lies in the clarification of the concept of transition to motherhood and defining its attributes. It is recommended that tools be developed to measure transition to motherhood based on the results of this study. Furthermore, nurses and midwives can use study findings to better understand the concept of transition to motherhood in providing care and support to mothers who experience it.
By applying the AHP(Analytic Hierarchy Process), we have analyzed the importance and the order for priorities to the management risk factors of Korean SMEs & Venture companies in China. The major management risk factors of manufacturing companies were the rise in labor costs followed by fierce competition in the marketplace, problems involved with human resource management and the rise in the cost of materials. In the case of companies manufacturing electronic products, the rise of labor costs and alteration in government's tax policy were seen as the main risk factors. In the case of chemical product manufacturing companies, the reinforcement of environmental protection law and in automobile component manufacturing companies, apart from the rise in labor cost, the increase in raw materials costs were analyzed as the main risk factors. While considering the time period, the main risk factors of the companies that entered China in the 1990's were fierce competition and alteration in government's tax policy and for the companies that entered China in the 2000's, increase in raw material cost, the rise in labor cost etc were analyzed to be the main risk management factors.
Purpose: Nowadays, the risk assessment system is widely used in many industrial and public areas to reduce the possible risks. The system is used to determine the priorities of the government quality assurance works in Defense Agency for Technology and Quality. However, as the risk assessment system is used for other purposes, there are some items that need improvement, and in this study, we propose improvement plans by benchmarking the risk assessment systems of other institutions. Methods: In this paper, first, the procedures of risk assessment system used in many industrial sites were reviewed, and how each institution specialized and applied the system. Afterwards, by benchmarking various risk assessment systems, an improvement plan on how to operate the risk assessment system in the case of government quality assurance for centrally procured military supplies was presented, and practical application cases were presented to prove the usefulness of the improvement plan. Results: The proposed risk assessment system differs from the existing system in five major aspects. First, inputs, outputs, and key performance indicators were specified from the systematic point of view. Second, risk analysis was analyzed in four dimensions: probability of occurrence, impact, detection difficulty. Third, risk mitigation measures were classified, control, transfer, and sharing. Fourth, the risk mitigation measures were realized through document verification, product verification, process verification, and quality system evaluation. Finally, risk mitigation measures were implemented and the effectiveness of the risk mitigation measures was evaluated through effectiveness evaluation. Conclusions: In order for the risk assessment procedure proposed in this study to be applied to actual work, it is necessary to obtain the consent of the person involved in the work due to the increased time for risk identification and preparation of the government quality assurance log, and a change in the information system that performs the actual work is required. Therefore, the authors of this study plan to actively perform internal seminar presentations and work improvement suggestions to apply these research outputs to actual work.
KSCE Journal of Civil and Environmental Engineering Research
/
v.26
no.5D
/
pp.747-754
/
2006
Real-time traffic information disseminated through VMS is known to have effects not only on driver to plan a route choice, detour the congestion, and cope with incident, but also on VMS operator to manage the traffic volume indirectly. But, the dissemination of traffic information is operated in the side of provider, not of user. Importance-Performance analysis (IPA) offers a simple, useful method for simultaneously considering both the importance and performance dimensions when evaluating or improving strategy. This technique has been successfully used in a variety of settings to define priorities and guide resource optimization decisions. This study uses IPA to evaluate traffic information strategies through VMS to make resource improvement recommendations. It gained 760 samples by field surveys, which are conducted in Korean Thanksgiving Day, weekday and weekend at the service areas of expressways. The results indicate that the motivations in quadrant I (concentrate here) are dissemination of exactly information and quick transmission, while distance of VMS, most drivers are not satisfied with that is located in quadrant III (low priority).
The principal objective of this study was to categorize service attributes on the basis of the asymmetric and non-linear relationship existing between service attributes and customer satisfaction. Researchers generally assume that service attribute performances and customer satisfaction are both symmetrical and linear. That is to say, improvements in attribute performance will inevitably result in increased customer satisfaction. However, this is not always the case. Certain attributes have been shown not to create satisfaction even when improved, and others do not create dissatisfaction even when their performance ratings become negative. Understanding this relationship is crucial not only to researchers, but also to service managers. Service managers can arrange their priorities with regard to which attributes must be improved or promoted first, in an environment of limited technical, financial, and human resources. Many studies into this asymmetric and non-linear relationship have recently been conducted, beginning with Herzberg's motivation-hygiene theory (1976) and the disconfirmation theory, which was eventually developed into Kano's model (1984). This study attempted to determine the impact level of service attributes on incidents of satisfaction or dissatisfaction. It used 30 service attributes generated by Park (2008) in the CIT research into family restaurants. The data were collected from 600 participants, 300 incidences of satisfaction and 300 incidents of dissatisfaction, via an online survey. The t-test was used to confirm the difference between the satisfaction group's and dissatisfaction group's attributes. 11 attributes were found to be significant at a level of p>0.05. This indicates that the 11 attributes exerted different impacts on satisfaction and dissatisfaction, which confirmed the asymmetric and non-linear relationship. 14 attributes were categorized into the core service, 1 attribute into the quality service, 7 attributes into the basic service, and 8 attributes into the neutral service. Strategic customer service management was recommended for the 'A' family restaurant as an example, on the basis of the asymmetric and non-linear relationship and the characteristics of the four service factors.
International conference on construction engineering and project management
/
2020.12a
/
pp.188-197
/
2020
Due to hazardous working environments at complex, unstructured, and dynamic construction sites, workers frequently face potential safety and health risks throughout the construction process. In this regard, addressing safety challenges remains one of the top priorities. Construction workers' ability to identify and assess risks is acquired through training, which is one of the primary key factors to determine their safety and wellbeing in hazardous working environments. As such, safety managers constantly focus on the effectiveness of the training materials provided to the workers. However, the construction workers are considerably at greater risk of injuries and fatalities compared to the workers in other industries. In this regard, further studies are required to build up a body of knowledge on the conventional safety training approaches as well as their evaluation techniques in order to boost up the adoption by the practitioners in a widespread manner. This paper provides a systematic review of the current safety training approaches and the various techniques for measuring their effectiveness. The attributes of the current safety training methods for construction workers and their evaluation techniques are identified and analyzed. Results indicated that: 1) immersive environment-based training methods are effective than the traditional safety training methods; 2) this effectiveness can be empirically supported by evaluation strategies, but the current techniques are subjective, intrusive, and error-prone. This research offers fresh opportunities to investigate the training strategies by objectively monitoring the physiological responses of construction crews. The results of this study can be used by researchers and practitioners to identify and determine optimal safety training programs that could potentially become ubiquitous in the construction industry.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.