• Title/Summary/Keyword: Traffic problems

Search Result 1,450, Processing Time 0.032 seconds

Open Innovation in Car-Sharing Industry: Focusing on the Cooperation Case between Gongcar and Rental Car Company (카셰어링 산업의 개방형 혁신: (주)공카와 렌터카 업체간 개방형 혁신 사례를 중심으로)

  • Kiyeon Hwang;Jaehong Park;Youngwoo Sohn;Woosung Nam;Yeonhwa Cho
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.19 no.1
    • /
    • pp.93-105
    • /
    • 2024
  • Car-sharing is a representative model of the sharing economy, and it is a service that rents or uses a car for the necessary time without owning a car. This industry is growing due to various factors such as technological advances, increasing awareness of environmental protection, and increasing demand for solving traffic congestion problems in cities. Accordingly, there is a need for a strategic approach for companies providing car-sharing services to respond quickly to market changes in order to expand market share and differentiate services. Accordingly, this study conducted a case study on open innovation activities between Gongcar and existing rental car companies, focusing on the research question "What effects do open innovation activities between car-sharing companies and existing rental car companies cause?" As a result of the study, it was confirmed that Gongcar have (1) the ability to actively respond to market fluctuations by establishing a flexible vehicle supply chain based on demand, (2) have significantly reduced growth capital expenditure (Growth Capex), and both cafe and rental car companies have (3) performed successful open innovation by improving key KPI indicators and recording financial performance. This study reveals how open innovation acts as a key business growth engine in the car-sharing industry, and its significance is found in that it empirically confirmed the successful implementation conditions of open innovation based on resource dependence theory.

  • PDF

Development of Robotic Inspection System over Bridge Superstructure (교량 상판 하부 안전점검 로봇개발)

  • Nam Soon-Sung;Jang Jung-Whan;Yang Kyung-Taek
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • autumn
    • /
    • pp.180-185
    • /
    • 2003
  • The increase of traffic over a bridge has been emerged as one of the most severe problems in view of bridge maintenance, since the load effect caused by the vehicle passage over the bridge has brought out a long-term damage to bridge structure, and it is nearly impossible to maintain operational serviceability of bridge to user's satisfactory level without any concern on bridge maintenance at the phase of completion. Moreover, bridge maintenance operation should be performed by regular inspection over the bridge to prevent structural malfunction or unexpected accidents front breaking out by monitoring on cracks or deformations during service. Therefore, technical breakthrough related to this uninterested field of bridge maintenance leading the public to the turning point of recognition is desperately needed. This study has the aim of development on automated inspection system to lower surface of bridge superstructures to replace the conventional system of bridge inspection with the naked eye, where the monitoring staff is directly on board to refractive or other type of maintenance .vehicles, with which it is expected that we can solve the problems essentially where the results of inspection are varied to change with subjective manlier from monitoring staff, increase stabilities in safety during the inspection, and make contribution to construct data base by providing objective and quantitative data and materials through image processing method over data captured by cameras. By this system it is also expected that objective estimation over the right time of maintenance and reinforcement work will lead enormous decrease in maintenance cost.

  • PDF

A Study on Effectiveness of the Hospital-based Home Nursing Care of the Early Discharged Surgical Patients and its Cost Analysis (조기퇴원 수술환자의 병원중심 가정간호 효과 및 비용분석에 관한 연구)

  • 박경숙;정연강
    • Journal of Korean Academy of Nursing
    • /
    • v.24 no.4
    • /
    • pp.545-556
    • /
    • 1994
  • Medical insurance and health care delivery system enabled Korean people to get the necessary medical service, but it caused increased needs for medical service, and resulted in the occurence of some problems such as a lack of manpower and medical facilities. In order to solve these problems, many countries, which already had medical insurance system had developed home care system and it has been regarded effective both in reducing costs and in increasing the rates of turnover of bed. Recently, Korea has included home nursing care in its health care delivery system, and some models of the hospital based home nursing care had been tried and its effects had been evaluated. So, author tried to run a home nursing care for the Cesarean section mothers and evaluate Its effects both in the mother's health and costs. This study was designed as a Quasi-experimental study. Subjects were thirty mothers who got Cesarean section operation in hospital in Seoul. Experimental group consisted of 15 volunteers, and control group were selected by means of matching technique. Data were gathered from February 1st to March 26th by two assistants who were trained by author. Experimental group were discharged on the 4th day after their operation, and got nursing care and assessment about their home three times on the 5th, 6th, and 7th day. Control group stayed in the hospital until 7th day as usual and were checked on the same day as above mentioned To evaluate the state of physiological recovery, vital signs, H.O.F, presence of edema in the legs, bathing, appetite, sleep, presence of pain or discomfort in the breasts, amount of lochia, color of lochia, defecation urination. To compare incidence of complication in experimental group with that in control group, specific assessment was done such variables as smell of lochia, presence of inflammation of operation wound, dizziness, and presence of immobilization in the extremities. The activities of daily living were checked Satisfaction of nursing were checked To calculate costs, author asked subjects to specify expenditure including hospital charge, traffic enpenses, and food expenses. The results were as fellows. 1. On effectiveness of home nursing careThere were n significant differences between experimental and control group in incidence of abnormal symptoms and any complication. The number of taking a bath [POD #5 P=0.001, #6 P=0.0003, #7 P=0.001] and the degree of appetite [POD #5 P=0.03, #6 P=0.02, #7 P=0.013] were significantly higher in experimental group than in control group. Contrary to author's expectation, the degree of the activities of daily living in experimental group was not higher than that of control group. All of the experimental group said they were satisfied with the home nursing care. 2. Cost analysis 1) Hospital charge of experimental group was lower than that of control group. [P=0.009] By taking home nursing care, average period of hospitalization was shortened to 3.1 days, and family members could save 22.8 hours. Total amount of money saved by early discharge was 3,443,093 Won. It is estimated that total amount of money saved by early discharge in a year will be 40,398,956 Won. 2) Home nursing care charge of 15 mothers was 1,781,633 Won. It is estimated that total amount of money Saved by it in a year Will be 20,904,493 Won. It was lower altogether than hospital charge of the three days which is 5th, 6th, 7th day of operation. The average cost of single home visit was calculated 10,940 Won. It took 87 minutes per round and it costed 1,017.3 Won. The average hour of home care was 39.0 minutes. 3) It is expected that early discharge can bring forth the increase of hospital income. On the condition that the rate of running bed is 100%, the expected increase of hospital income will be 202,374, 026 Won in a year. Suggestions for further study and nursing practice are as follows : 1. For the welfare of patients and the increased rates of running bed, home nursing care system should be included in the hospital nursing care system. 2. Studies to test effect of home nursing care on the patients with other diseases are needed. 3. Establishment of law on the practice of home nursing care is strongly recommended.

  • PDF

The International Civil Aviation Organization and Recent Developments of Air Law in a Changing Environment (변환기(變換期)에 있어서의 국제민간항공기구(國際民間航空機構)(ICAD)와 항공법(航空法) 발전(發展)의 최근(最近) 동향(動向))

  • Choi, Wan-Sik
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.4
    • /
    • pp.7-35
    • /
    • 1992
  • The expansion of air transport on a global scale with ever increasing traffic densities has brought about problems that must be solved through new multilateral mechanisms. Looking to the immediate future, air transport will require new forms of international cooperation in technical and economic areas. Air transport by its very nature should have been a counterforce to nationalism. Yet, the regulatory system in civil aviation is still as firmly rooted in the principle of national sovereignty as when it was first proclaimed at t-11e Paris Convention of 1919 and reaffirmed in the Chicago Convention. Sovereignty over the airspace has remained the cornerstone of relations between states in all respects of air transport. The importance of sovereignty over air space embodied in article 1 of the Chicago Conrenton also is responsible for restricting the authority of ICAO as an intergovernmental regulatory agency. The Orgenization, for all its extensive efforts, has only limited authority. ICAO sets standards but cannot enforce them; it devises solutions but cannot impose them. To implement its rules ICAO most rely not so much on legal requirements as on the goodwill of states. It has been forty-eight years since international community set the foundations of the international system in civil aviation action. Profound political, economic and technological changes have taken place in air transport. The Chicago Convention is living proof that staes can work together to make air transport a safe mode of travel. The law governing international civil auiation is principally based on international treaties and on other regulation agreed to by governments, for the most part through the mechanism of ICAO. The role of ICAO international standards and recommended practices and procedures dealing with a broad range of technical matters could hardly be overestimated. The organization's ability to develop these standards and procedures, to adapt them continuously to the rapid sate of change and development of air transport, should be particularly stressed. The role of ICAO in the area of the development of multilateral conventions on international air law has been successful but to a certain degree. From the modest starting-point of the Tokyo Convention, we have seen more adequate international instruments prepared within the scope of ICAO activities, adopted: the Hague Convention of 1970 for the suppression of Unlawful Seizure of Aircraft and the Montreal Convention of 1971 for the Suppression of Unlawful Acts against the Safety of Civil Aviation. The work of ICAO in the new domain of international law conventions concerning what has been loosely termed above as the criminal problems connected with international air transport, in particular the problem of armed aggression against aircraft, should be positively appreciated. But ICAO records in the domain of developing a uniform legal system of international carriage by air are rather disappointing. The problem of maintaining and developing the uniformity of this regulation exceeds the scope of interest and competence of governmental transport agencies. The expectations of mankind linked to it are too great to give up trying to restore the uniform legal system of international air carriage that would create proper conditions for its further growth. It appears that ICAO has, at present, a good opportunity for doing this. The hasty preparation of ICAO draft conventions should be definitely excluded. Every Preliminary draft convention ought to be sent to Governments of all member-States for consideration, So that they could in form ICAO in due time of their observation. The problom of harmonizing a uniform law of international air carriage with that of other branches of international transport should demand more and more of its attention. ICAO cooperation with other international arganization, especially these working in the field of international transport, should be strengthened. ICAO is supposed to act as a link and a mediator among, at times the conflicting interests of member States, serving the happiness and peace of all of the world. The transformation of the contemporary world of developing international relations, stimulated by steadily growing international cooperation in its various dimensions, political, economic, scientific, technological, social and cultural, continuously confronts ICAO with new task.

  • PDF

Experimental Study on Structural Behavior of Precast PSC Curved Girder Bridge (프리캐스트 PSC 곡선 거더교의 구조거동에 대한 실험적 연구)

  • Kim, Sung Jae;Kim, Sung Bae;Uhm, Ki Ha;Kim, Jang Ho Jay
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.34 no.6
    • /
    • pp.1731-1741
    • /
    • 2014
  • Recently, many overpasses, highway, and advanced transit systems have been constructed to distribute the traffic congestion, thus small size of curved bridges with small curvature such as ramp structures have been increasing. Many of early curved bridges had been constructed by using straight beams with curved slabs, but curved steel beams have replaced them due to the cost, aesthetic and the advantage in building the section form and manipulating the curvature of beams, thereby large portion of curved bridges were applied with steel box girders. However, steel box girder bridges needs comparatively high initial costs and continuous maintenance such as repainting, which is the one of the reason for increasing the cost. Moreover, I-type steel plate girder which is being studied by many researchers recently, seem to have problems in stability due to the low torsional stiffness, resulting from the section characteristics with thin plate used for web and open section forms. Therefore, in recent studies, researchers have proposed curved precast PSC girders with low cost and could secured safety which could replace the curved steel girder type bridges. Hence, this study developed a Smart Mold system to manufacture efficient curved precast PSC girders. And by using this mold system a 40 m 2-girder bridge was constructed for a static flexural test, to evaluate the safety and performance under ultimate load. At the manufacturing stage, each single girder showed problems in the stability due to the torsional moment, but after the girders were connected by cross beams and decks, the bridge successfully distributed the stress, thereby the stability was confirmed. The static loading test results show that the initial crack was observed at 1,400 kN when the design load was 450 kN, and the load at the allowable deflection by code was 1,800 kN, which shows that the safety and usability of the curved precast PSC bridge manufactured by Smart Mold system is secured.

EU Integration and Its Aviation Relationship with Third Countries (유럽연합(EU) 통합과 제3국과의 항공관계)

  • Lee, Jong-Sik
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.21 no.1
    • /
    • pp.135-167
    • /
    • 2006
  • Air service agreements between EU Member States and third countries concluded by Sweden, Finland, Belgium, Luxembourg, Austria, the Netherlands, Denmark and the United Kingdom after the Second World War infringe EU law. They authorize the third countries to withdraw, suspend or limit the traffic rights of air carriers designated by the signatory States. According to the Court of Justice of the European Communities (CJEC), these agreements infringe EU law in two respects. On the one hand, the presence of nationality clauses infringes the right of European airlines to non-discriminatory market access to routes between all Member States and third countries. On the other hand, only the EU has the authority to sign up to this type of commitment where agreements affect the exercise of EU competence, i.e. involve an area covered by EU legislation. The Court held that since the third countries have the right to refuse a carrier, these agreements therefore constitute an obstacle to the freedom of establishment and freedom to provide services, as the opening of European skies to third countries' companies is not reciprocal for all EU airlines. In the conclusion, in order to reconstruct these public international air law, The new negotiations between EU member states and third countries, especially the US, must be designed to ensure an adequate set of principles, so that Member States, in their bilateral relations with third countries in the area of air service, should consider following three models. The 1st, to develop a new model of public international air law such as a new Bermuda III. The 2nd, to reconstruct new freedoms of the air, for example, the 7th, 8th, and 9th freedoms. The 3rd, to explore new approaching models, such as complex system theory explored in the recent social sciences, to make access world-wide global problems instead of bilateral problems between EU member states and United States. The example will show any lessons to air talks between European Union and ROK.

  • PDF

A Store Recommendation Procedure in Ubiquitous Market for User Privacy (U-마켓에서의 사용자 정보보호를 위한 매장 추천방법)

  • Kim, Jae-Kyeong;Chae, Kyung-Hee;Gu, Ja-Chul
    • Asia pacific journal of information systems
    • /
    • v.18 no.3
    • /
    • pp.123-145
    • /
    • 2008
  • Recently, as the information communication technology develops, the discussion regarding the ubiquitous environment is occurring in diverse perspectives. Ubiquitous environment is an environment that could transfer data through networks regardless of the physical space, virtual space, time or location. In order to realize the ubiquitous environment, the Pervasive Sensing technology that enables the recognition of users' data without the border between physical and virtual space is required. In addition, the latest and diversified technologies such as Context-Awareness technology are necessary to construct the context around the user by sharing the data accessed through the Pervasive Sensing technology and linkage technology that is to prevent information loss through the wired, wireless networking and database. Especially, Pervasive Sensing technology is taken as an essential technology that enables user oriented services by recognizing the needs of the users even before the users inquire. There are lots of characteristics of ubiquitous environment through the technologies mentioned above such as ubiquity, abundance of data, mutuality, high information density, individualization and customization. Among them, information density directs the accessible amount and quality of the information and it is stored in bulk with ensured quality through Pervasive Sensing technology. Using this, in the companies, the personalized contents(or information) providing became possible for a target customer. Most of all, there are an increasing number of researches with respect to recommender systems that provide what customers need even when the customers do not explicitly ask something for their needs. Recommender systems are well renowned for its affirmative effect that enlarges the selling opportunities and reduces the searching cost of customers since it finds and provides information according to the customers' traits and preference in advance, in a commerce environment. Recommender systems have proved its usability through several methodologies and experiments conducted upon many different fields from the mid-1990s. Most of the researches related with the recommender systems until now take the products or information of internet or mobile context as its object, but there is not enough research concerned with recommending adequate store to customers in a ubiquitous environment. It is possible to track customers' behaviors in a ubiquitous environment, the same way it is implemented in an online market space even when customers are purchasing in an offline marketplace. Unlike existing internet space, in ubiquitous environment, the interest toward the stores is increasing that provides information according to the traffic line of the customers. In other words, the same product can be purchased in several different stores and the preferred store can be different from the customers by personal preference such as traffic line between stores, location, atmosphere, quality, and price. Krulwich(1997) has developed Lifestyle Finder which recommends a product and a store by using the demographical information and purchasing information generated in the internet commerce. Also, Fano(1998) has created a Shopper's Eye which is an information proving system. The information regarding the closest store from the customers' present location is shown when the customer has sent a to-buy list, Sadeh(2003) developed MyCampus that recommends appropriate information and a store in accordance with the schedule saved in a customers' mobile. Moreover, Keegan and O'Hare(2004) came up with EasiShop that provides the suitable tore information including price, after service, and accessibility after analyzing the to-buy list and the current location of customers. However, Krulwich(1997) does not indicate the characteristics of physical space based on the online commerce context and Keegan and O'Hare(2004) only provides information about store related to a product, while Fano(1998) does not fully consider the relationship between the preference toward the stores and the store itself. The most recent research by Sedah(2003), experimented on campus by suggesting recommender systems that reflect situation and preference information besides the characteristics of the physical space. Yet, there is a potential problem since the researches are based on location and preference information of customers which is connected to the invasion of privacy. The primary beginning point of controversy is an invasion of privacy and individual information in a ubiquitous environment according to researches conducted by Al-Muhtadi(2002), Beresford and Stajano(2003), and Ren(2006). Additionally, individuals want to be left anonymous to protect their own personal information, mentioned in Srivastava(2000). Therefore, in this paper, we suggest a methodology to recommend stores in U-market on the basis of ubiquitous environment not using personal information in order to protect individual information and privacy. The main idea behind our suggested methodology is based on Feature Matrices model (FM model, Shahabi and Banaei-Kashani, 2003) that uses clusters of customers' similar transaction data, which is similar to the Collaborative Filtering. However unlike Collaborative Filtering, this methodology overcomes the problems of personal information and privacy since it is not aware of the customer, exactly who they are, The methodology is compared with single trait model(vector model) such as visitor logs, while looking at the actual improvements of the recommendation when the context information is used. It is not easy to find real U-market data, so we experimented with factual data from a real department store with context information. The recommendation procedure of U-market proposed in this paper is divided into four major phases. First phase is collecting and preprocessing data for analysis of shopping patterns of customers. The traits of shopping patterns are expressed as feature matrices of N dimension. On second phase, the similar shopping patterns are grouped into clusters and the representative pattern of each cluster is derived. The distance between shopping patterns is calculated by Projected Pure Euclidean Distance (Shahabi and Banaei-Kashani, 2003). Third phase finds a representative pattern that is similar to a target customer, and at the same time, the shopping information of the customer is traced and saved dynamically. Fourth, the next store is recommended based on the physical distance between stores of representative patterns and the present location of target customer. In this research, we have evaluated the accuracy of recommendation method based on a factual data derived from a department store. There are technological difficulties of tracking on a real-time basis so we extracted purchasing related information and we added on context information on each transaction. As a result, recommendation based on FM model that applies purchasing and context information is more stable and accurate compared to that of vector model. Additionally, we could find more precise recommendation result as more shopping information is accumulated. Realistically, because of the limitation of ubiquitous environment realization, we were not able to reflect on all different kinds of context but more explicit analysis is expected to be attainable in the future after practical system is embodied.

Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives (사용자의 패스워드 인증 행위 분석 및 피싱 공격시 대응방안 - 사용자 경험 및 HCI의 관점에서)

  • Ryu, Hong Ryeol;Hong, Moses;Kwon, Taekyoung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.79-90
    • /
    • 2014
  • User authentication based on ID and PW has been widely used. As the Internet has become a growing part of people' lives, input times of ID/PW have been increased for a variety of services. People have already learned enough to perform the authentication procedure and have entered ID/PW while ones are unconscious. This is referred to as the adaptive unconscious, a set of mental processes incoming information and producing judgements and behaviors without our conscious awareness and within a second. Most people have joined up for various websites with a small number of IDs/PWs, because they relied on their memory for managing IDs/PWs. Human memory decays with the passing of time and knowledges in human memory tend to interfere with each other. For that reason, there is the potential for people to enter an invalid ID/PW. Therefore, these characteristics above mentioned regarding of user authentication with ID/PW can lead to human vulnerabilities: people use a few PWs for various websites, manage IDs/PWs depending on their memory, and enter ID/PW unconsciously. Based on the vulnerability of human factors, a variety of information leakage attacks such as phishing and pharming attacks have been increasing exponentially. In the past, information leakage attacks exploited vulnerabilities of hardware, operating system, software and so on. However, most of current attacks tend to exploit the vulnerabilities of the human factors. These attacks based on the vulnerability of the human factor are called social-engineering attacks. Recently, malicious social-engineering technique such as phishing and pharming attacks is one of the biggest security problems. Phishing is an attack of attempting to obtain valuable information such as ID/PW and pharming is an attack intended to steal personal data by redirecting a website's traffic to a fraudulent copy of a legitimate website. Screens of fraudulent copies used for both phishing and pharming attacks are almost identical to those of legitimate websites, and even the pharming can include the deceptive URL address. Therefore, without the supports of prevention and detection techniques such as vaccines and reputation system, it is difficult for users to determine intuitively whether the site is the phishing and pharming sites or legitimate site. The previous researches in terms of phishing and pharming attacks have mainly studied on technical solutions. In this paper, we focus on human behaviour when users are confronted by phishing and pharming attacks without knowing them. We conducted an attack experiment in order to find out how many IDs/PWs are leaked from pharming and phishing attack. We firstly configured the experimental settings in the same condition of phishing and pharming attacks and build a phishing site for the experiment. We then recruited 64 voluntary participants and asked them to log in our experimental site. For each participant, we conducted a questionnaire survey with regard to the experiment. Through the attack experiment and survey, we observed whether their password are leaked out when logging in the experimental phishing site, and how many different passwords are leaked among the total number of passwords of each participant. Consequently, we found out that most participants unconsciously logged in the site and the ID/PW management dependent on human memory caused the leakage of multiple passwords. The user should actively utilize repudiation systems and the service provider with online site should support prevention techniques that the user can intuitively determined whether the site is phishing.

Spatial Distribution of Urban Heat and Pollution Islands using Remote Sensing and Private Automated Meteorological Observation System Data -Focused on Busan Metropolitan City, Korea- (위성영상과 민간자동관측시스템 자료를 활용한 도시열섬과 도시오염섬의 공간 분포 특성 - 부산광역시를 대상으로 -)

  • HWANG, Hee-Soo;KANG, Jung Eun
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.23 no.3
    • /
    • pp.100-119
    • /
    • 2020
  • During recent years, the heat environment and particulate matter (PM10) have become serious environmental problems, as increases in heat waves due to rising global temperature interact with weakening atmospheric wind speeds. There exist urban heat islands and urban pollution islands with higher temperatures and air pollution concentrations than other areas. However, few studies have examined these issues together because of a lack of micro-scale data, which can be constructed from spatial data. Today, with the help of satellite images and big data collected by private telecommunication companies, detailed spatial distribution analyses are possible. Therefore, this study aimed to examine the spatial distribution patterns of urban heat islands and urban pollution islands within Busan Metropolitan City and to compare the distributions of the two phenomena. In this study, the land surface temperature of Landsat 8 satellite images, air temperature and particulate matter concentration data derived from a private automated meteorological observation system were gridded in 30m × 30m units, and spatial analysis was performed. Analysis showed that simultaneous zones of urban heat islands and urban pollution islands included some vulnerable residential areas and industrial areas. The political migration areas such as Seo-dong and Bansong-dong, representative vulnerable residential areas in Busan, were included in the co-occurring areas. The areas have a high density of buildings and poor ventilation, most of whose residents are vulnerable to heat waves and air pollution; thus, these areas must be considered first when establishing related policies. In the industrial areas included in the co-occurring areas, concrete or asphalt concrete-based impervious surfaces accounted for an absolute majority, and not only was the proportion of vegetation insufficient, there was also considerable vehicular traffic. A hot-spot analysis examining the reliability of the analysis confirmed that more than 99.96% of the regions corresponded to hot-spot areas at a 99% confidence level.

The Hospital Life of the Patient with Femoral Neck Fracture (대퇴경부 골절 환자의 입원 생활)

  • Kim, Kyung-Ja;Chi, Sung-Ai
    • Journal of Korean Academy of Nursing Administration
    • /
    • v.2 no.1
    • /
    • pp.35-56
    • /
    • 1996
  • Nowerdays, the increase of traffic accidents and old age population make the Femoral Neck Fracture(FNF) patients increase. By the improvement of education and standard of living the patients demand better medical service than before. This study is designed to give practical help for the FNF patients by observing their hospital life and establish practical nursing strategies for the FNF patients. For these purposes the Ethnographic Participant Observation was adopted. By this study is focused on the hospital life patient's view. For this end, the field study adopted orthopedic ward in the C University Hospital with 400 beds in Seoul. The object patients of the study were twelve patients. The patients experienced five stages : Embarrassment, Conflict, Stability, Independent, and Extension Stage. The findings and prepared nursing strategies are stated as follows. First, in the Embarrassment Stage they suffered embarrassment, anxiety, pain, they could not do ordinary things. The patients who accidental fractures had anxiety from unfamiliar tests and from hospitalization itself. They lamented that they could not ordinary things, and do nothing but obeying the hospital, and endure the pain. They recognized the changed environment and resigned themselves to life in the ward. In this stage, full openness by the nurses is needed. Second, the attribute of the Conflict Stage were conflict, fear, curiosity, belief, reflection. When they sign the consentment form, they experience conflicts about the possibility of complication, fear of recovery from anesthesia, curiosity about the operation procedure, post - operation state, reflection on their past life, and promise to care for their family members after discharge and keep their religious life faithfully. And they accepted the operation depending on God, believing in modern medicine, and the surgeon. Asking for their changed informations, they expected positive results from the operation. In this stage, an empathic attitude by the nurses is needed. Third, the attribute of the Stability Stage were relief, gratitude, difficulty with excretion, and pain. When they awoke from anesthesia, they felt relief because of a the end of the operation, but they experienced extreme pain, difficulty of excretion in bed. They accepted the changed environment and expected recovery. In this stage, support by the nurses is needed. Fourth, the attributes of the Independence Stage were freedom, exercise, nurturing, anxiety, and discomfort. When they ambulated and exercised, they experienced freedom. They showed exhibited weakness of the digestive organs and discomfort hospital's space, structure, and facilities, the delay of medical certificate issue the lack of prompt response by the medical agents. They ate nurturious food and felt anxiety on the end of hospital life and returning to their ordinary life. They showed the independence of overcoming their environment by increasing exercise and expected their discharges. In this stage, respect by the nurses is needed for the patients to, overcome their environment and prepare for their independence. Fifth, the attributes of the Extension Stage were pessimism, isolation, dissatisfaction, and pain. Accompanied injury and old age made their ward life extend to over seven weeks. They exhibited weariness, melancholy, skeptisis, general pessimistic feeling, and desperation caused by their isolated life. They experienced the digestive discomfort caused by the prolonged medication and psycological pain caused by long-time hospitalization. As a, result, their dissatisfaction on the human, physical, and systematic environments had been increased. They acquired critical power and sought for something to do spending their time. They expected vaguely about the returning of their ordinary life. In this stage, counseling is needed by the nurse to overcome positively their psychological, social, and physical problems. The process of the FNF patient's ward life starts from the dependent state, when they are hospitalized, and gradually progresses to self-fulfillment in order to keep independent life. As a result, the FNF patients showed "Response in Challenge" or "Adaptation in Conflict" through their experiences of social, physical, and psychological difficulties.

  • PDF