• Title/Summary/Keyword: Using internet

Search Result 12,724, Processing Time 0.04 seconds

Factors Affecting End-of-life Care Performance of Nurses in Hospice and Palliative Nursing Institutions (호스피스 완화의료 전문기관 간호사의 임종간호수행 영향요인)

  • Min-Gi Jun;Myoung-Jin Kwon
    • Journal of Industrial Convergence
    • /
    • v.22 no.5
    • /
    • pp.107-116
    • /
    • 2024
  • This study is a descriptive research study to determine the extent to which end-of-life care stress, death awareness, and prior decision-making attitudes of nurses at a hospice and palliative nursing institution have an impact on end-of-life care performance. The subjects of this study were 200 nurses working at a hospice and palliative nursing institution. Data collection for this study was conducted from August 9 to September 30, 2021, using two methods: written questionnaire and internet survey. The data analysis method used Pearson's correlation coefficient to analyze the relationship between the subjects' end-of-life care stress, death awareness, prior decision-making attitude, and end-of-life care performance. Hierarchical Regression was used to identify factors affecting the subject's end-of-life care performance. The results of this study showed a significant correlation between end-of-life care performance and death awareness (r=.22, p=.002), and end-of-life care performance and prior decision-making attitude (r=.20, p=.004). And prior decision-making attitude and death awareness had a significant impact on end-of-life care performance. As death awareness and prior decision-making attitudes increased, end-of-life care performance increased, and end-of-life care stress did not appear to be a statistically significant factor influencing end-of-life care performance. In order to improve hospice nurses' ability to provide end-of-life care, intervention that takes into account the influencing factors is required.

Factors Influencing Acceptance Resistance of Personal Health Record Apps: Focusing on the Privacy Calculus Model (개인건강기록 앱 수용저항에 영향을 미치는 요인: 프라이버시 계산모형을 중심으로)

  • Sang Ho Kim;Eunkyung Kang;Sung-Byung Yang
    • Information Systems Review
    • /
    • v.25 no.1
    • /
    • pp.165-187
    • /
    • 2023
  • The continuous increase in life expectancy and high interest in health has brought about significant changes in the use of health information by the public according to the development of information technology represented by the Internet and smartphones. As the medical market expands to the mobile health environment, many health-related apps have been created and distributed, but the acceptance rate is slow as it has become challenging to provide services due to various regulations. In this study, perceived value, perceived risk factors (psychological risk, risk of time-loss, legal risk), and perceived benefits (usefulness, interaction, autonomy) were derived and verified as factors that affect the acceptance resistance of personal health record apps based on the privacy calculation model. In addition, by analyzing the moderating effect of trust in the manufacturer, how the perceived risk and perceived benefit affect the perceived value was verified. A survey was conducted on Korean college students who recognized the personal health record apps but did not use them, and 127 samples were analyzed using structural equations. As a result of hypothesis verification, perceived value has a negative effect on acceptance resistance, perceived risk (risk of time-loss) has a negative effect on perceived value, and perceived benefits (usefulness, interaction, autonomy) were found to have a positive effect on perceived value. Trust in manufacturers has weakened the impact of perceived risks (legal risk) on perceived values. This study is expected to play an important role in maintaining a competitive advantage in the personal health record app market environment by identifying and proposing detailed criteria for reducing the acceptance resistance of personal health record apps.

The Value of Private Information based on Cost-Benefit Analysis Framework: Focusing on Individual Attributes, Dealer Traits, and Circumstantial Properties (비용편익분석 프레임워크를 통한 개인정보가치에 대한 연구: 개인적 특성, 거래 상대방 특성, 상황적 특성을 중심으로)

  • Jaehyun Park;Eunkyung Kweon;Minjung Park;Sangmi Chai
    • Information Systems Review
    • /
    • v.19 no.3
    • /
    • pp.155-177
    • /
    • 2017
  • The purpose of this study is to investigate those factors that are influenced when a user recognizes his/her private information value as an economic asset. The relationship among these factors will also be discussed. This research targets Internet users, and the value of their private information will be converted into economic figures. How economic value changes in relation with individual attributes, dealer's traits, and circumstantial properties will also be studied. The changes in the factors of private information value under different situations will be analyzed from an economic perspective. By using the cost-benefit analysis framework, this work hypothesizes that the user's private information value can be influenced by individual attributes and situational properties. in the business aspect, this study can help users recognize the true value of their personal information and minimize the cost resulting from private information security incidents. This work also highlights the necessity of estimating the scale of investments for protecting private information. Overall, this research will proceed under the hypothesis that the users' recognition of their private information value is influenced by the attributes of the individual, dealers, or situations.

The Effect of the Introduction Characteristics of Cloud Computing Services on the Performance Expectancy of Firms: Setting Up Innovativeness as the Moderator (클라우드 컴퓨팅 서비스의 도입특성이 기업의 인지된 기대성과에 미치는 영향: 기업의 혁신채택성향을 조절변수로)

  • Jae Su Lim;Jay In Oh
    • Information Systems Review
    • /
    • v.19 no.1
    • /
    • pp.75-100
    • /
    • 2017
  • Today, firms are constantly transforming and innovating to survive under the rapidly changing business environment. The introduction of cloud computing services has become popular throughout society as a whole and is expected to result in many changes and developments not only in firms and but also in the public sector subject to innovation. The purpose of this study is to investigate the effect of the characteristics of cloud computing services on the perceived expected performance according to innovativeness based on innovation diffusion theory. The results of the analysis of the data collected from this research are as follows. The convenience and understanding of individuals' work as well as the benefits of cloud computing services to them depend on the innovative trend of cloud computing services. Further, the expectations for personal benefit and those for organizational benefit of cloud computing services are different from each other. Leading firms in the global market have been actively engaged in the utilization of cloud computing services in the public sector as well as in private firms. In consideration of the importance of cloud computing services, using cloud computing services as the target of innovation diffusion research is important. The results of the study are expected to contribute to developing future research models for the diffusion of new technologies, such as big data, digital convergence, and Internet of Things.

Research on Usability of Mobile Food Delivery Application: Focusing on Korean Application and Chinese Application (모바일 배달 애플리케이션 사용성 평가 연구: 한국(배달의민족)과 중국(어러머)을 중심으로)

  • Yang Tian;Eunkyung Kweon;Sangmi Chai
    • Information Systems Review
    • /
    • v.20 no.1
    • /
    • pp.1-16
    • /
    • 2018
  • The development and generalization of the Internet increased the popularity of food delivery service applications in Korea. The food delivery market based on online-to-offline service is growing rapidly. This study compares the usability of Korean food delivery service application between that of Chinese food delivery service application. This study suggests improvement points for Korean food delivery service applications. To conduct this study, we explore the status of various food delivery service applications and conduct interviews and surveys based on the honeycomb model developed by Peter Morville. This study obtained the following results. First, all restaurants participating in the Korean food delivery service must be able to accept order through the application. Second, the shopping cart function must be able to accept order of all restaurants simultaneously. Third, when users look for menu recommendation, their purchase history and shopping cart functions should appear at the first page of the website. Users should be able to perceive the improved usability of the website using those functions. Fourth, when the search window is fixed on the top of each page, users should be able to find the information they need. Fifth, the application must allow users to find the exact location of the delivery person and the estimated delivery time. Finally, the restaurants'address should be disclosed and fast delivery time should be confirmed to enhance users'trust on the application. This study contributes to academia and industry by suggesting useful insight into food delivery service applications and improving the point of food delivery service application in Korea.

Enhancing Global Research Visibility of Faculty Staffs by the Academic libraries in Public Universities in South East, Nigeria

  • Francisca C. MBAGWU;Judith S. NSE;Jacintha EZE;Ijeoma Irene BERNARD
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.14 no.2
    • /
    • pp.29-46
    • /
    • 2024
  • Academic libraries are at the forefront of supporting their parent institutions in teaching and learning, research activities, and community services for the students and faculty members, but, the researchers observed that some of the research emanating from faculty members in academic institutions particularly universities remains largely unknown, unrecognized and invisible on the global scene. This present paper is therefore a modest attempt towards addressing the issue of enhancing the faculty research visibility in the institutions of higher learning by the academic libraries. It also examines the extent academic libraries in public universities in Nigeria use research visibility channels to increase the global visibility of their faculty members. Difficulties encountered by librarians and ways of tackling the visibility of the faculty were also examined. A descriptive survey research design was adopted and the population consisted of all the 162 librarians in public universities in South-East (S.E), Nigeria. Telephone calls and Online Questionnaire were used for data collection. The number of librarians was obtained through phone calls from the Heads of each of the Libraries. The Online Questionnaire was submitted to the WhatsApp platforms of librarians in Nigeria- Academic and Research Libraries (ARL) and Chartered Librarians in Nigeria Connect (CLN-Connect). The questionnaire was structured in such a way that only the Librarians in Public universities in the S.E. Nigeria will respond to it. At the end of the day only 120 librarians responded, at a response rate of 74%. The study was analysed using tables, percentages and charts. The study recommended that librarians who are unaware of RVCs and its utilization should go for training to acquire the knowledge that will enable them enhance the global visibility of faculty staff, Management of Public universities in S.E, Nigeria should in addition to addressing copyright issues by the use of disclaimer notices and creative common licensing and provision of infrastructural facilities e.g. steady power supply, High power brand Internet connectivity, establishment of an Institutional Repository, etc, also should mandate the faculty staff to release their productive work to the library for onward submission to the RVCs platforms for enhancement of their global visibility.

With Corona Era, exploring policy measures to prevent non-face-to-face lonely deaths - Focusing on Daegu Metropolitan City's AI and IOT cases of lonely death prevention (With 코로나 시대 비대면 고독사 예방정책 방안 모색 - 대구광역시 AI, IOT 고독사 예방 사례를 중심으로)

  • Ha-Yoon Kim;Tai-Hyun Ha
    • Journal of Digital Convergence
    • /
    • v.21 no.3
    • /
    • pp.49-62
    • /
    • 2023
  • Due to social and cultural changes and the growth of aging people living as a single because of aging, lonely deaths are steadily increasing, and each local government has begun to define them as a social problem. The legal basis began to be established. In order to explore policy measures to prevent lonely deaths, this study examined cases of lonely death prevention policies using smart digital information technology (AI, IOT), which is being promoted by Daegu Metropolitan City to promote non-face-to-face policies to prevent lonely deaths. Policies related to lonely deaths are divided into two axes: lonely death prevention projects and post-excavation support projects. In order to operate these businesses efficiently, the provision of non-face-to-face services through artificial intelligence and the Internet of Things is recognized as a new service delivery system, so the importance and necessity of non-face-to-face services is increasing. It is time that multifaceted changes and preparations are needed, such as establishing a system to expand the non-face-to-face industry at the national level. In order to respond to another national disaster situation in the future, the non-face-to-face smart care system is being expanded in various welfare policies such as preventing lonely deaths. It will have to be activated.

Pre-Evaluation for Prediction Accuracy by Using the Customer's Ratings in Collaborative Filtering (협업필터링에서 고객의 평가치를 이용한 선호도 예측의 사전평가에 관한 연구)

  • Lee, Seok-Jun;Kim, Sun-Ok
    • Asia pacific journal of information systems
    • /
    • v.17 no.4
    • /
    • pp.187-206
    • /
    • 2007
  • The development of computer and information technology has been combined with the information superhighway internet infrastructure, so information widely spreads not only in special fields but also in the daily lives of people. Information ubiquity influences the traditional way of transaction, and leads a new E-commerce which distinguishes from the existing E-commerce. Not only goods as physical but also service as non-physical come into E-commerce. As the scale of E-Commerce is being enlarged as well. It keeps people from finding information they want. Recommender systems are now becoming the main tools for E-Commerce to mitigate the information overload. Recommender systems can be defined as systems for suggesting some Items(goods or service) considering customers' interests or tastes. They are being used by E-commerce web sites to suggest products to their customers who want to find something for them and to provide them with information to help them decide which to purchase. There are several approaches of recommending goods to customer in recommender system but in this study, the main subject is focused on collaborative filtering technique. This study presents a possibility of pre-evaluation for the prediction performance of customer's preference in collaborative filtering before the process of customer's preference prediction. Pre-evaluation for the prediction performance of each customer having low performance is classified by using the statistical features of ratings rated by each customer is conducted before the prediction process. In this study, MovieLens 100K dataset is used to analyze the accuracy of classification. The classification criteria are set by using the training sets divided 80% from the 100K dataset. In the process of classification, the customers are divided into two groups, classified group and non classified group. To compare the prediction performance of classified group and non classified group, the prediction process runs the 20% test set through the Neighborhood Based Collaborative Filtering Algorithm and Correspondence Mean Algorithm. The prediction errors from those prediction algorithm are allocated to each customer and compared with each user's error. Research hypothesis : Two research hypotheses are formulated in this study to test the accuracy of the classification criterion as follows. Hypothesis 1: The estimation accuracy of groups classified according to the standard deviation of each user's ratings has significant difference. To test the Hypothesis 1, the standard deviation is calculated for each user in training set which is divided 80% from MovieLens 100K dataset. Four groups are classified according to the quartile of the each user's standard deviations. It is compared to test the estimation errors of each group which results from test set are significantly different. Hypothesis 2: The estimation accuracy of groups that are classified according to the distribution of each user's ratings have significant differences. To test the Hypothesis 2, the distributions of each user's ratings are compared with the distribution of ratings of all customers in training set which is divided 80% from MovieLens 100K dataset. It assumes that the customers whose ratings' distribution are different from that of all customers would have low performance, so six types of different distributions are set to be compared. The test groups are classified into fit group or non-fit group according to the each type of different distribution assumed. The degrees in accordance with each type of distribution and each customer's distributions are tested by the test of ${\chi}^2$ goodness-of-fit and classified two groups for testing the difference of the mean of errors. Also, the degree of goodness-of-fit with the distribution of each user's ratings and the average distribution of the ratings in the training set are closely related to the prediction errors from those prediction algorithms. Through this study, the customers who have lower performance of prediction than the rest in the system are classified by those two criteria, which are set by statistical features of customers ratings in the training set, before the prediction process.

The Influence of Online Social Networking on Individual Virtual Competence and Task Performance in Organizations (온라인 네트워킹 활동이 가상협업 역량 및 업무성과에 미치는 영향)

  • Suh, A-Young;Shin, Kyung-Shik
    • Asia pacific journal of information systems
    • /
    • v.22 no.2
    • /
    • pp.39-69
    • /
    • 2012
  • With the advent of communication technologies including electronic collaborative tools and conferencing systems provided over the Internet, virtual collaboration is becoming increasingly common in organizations. Virtual collaboration refers to an environment in which the people working together are interdependent in their tasks, share responsibility for outcomes, are geographically dispersed, and rely on mediated rather than face-to face, communication to produce an outcome. Research suggests that new sets of individual skill, knowledge, and ability (SKAs) are required to perform effectively in today's virtualized workplace, which is labeled as individual virtual competence. It is also argued that use of online social networking sites may influence not only individuals' daily lives but also their capability to manage their work-related relationships in organizations, which in turn leads to better performance. The existing research regarding (1) the relationship between virtual competence and task performance and (2) the relationship between online networking and task performance has been conducted based on different theoretical perspectives so that little is known about how online social networking and virtual competence interplay to predict individuals' task performance. To fill this gap, this study raises the following research questions: (1) What is the individual virtual competence required for better adjustment to the virtual collaboration environment? (2) How does online networking via diverse social network service sites influence individuals' task performance in organizations? (3) How do the joint effects of individual virtual competence and online networking influence task performance? To address these research questions, we first draw on the prior literature and derive four dimensions of individual virtual competence that are related with an individual's self-concept, knowledge and ability. Computer self-efficacy is defined as the extent to which an individual beliefs in his or her ability to use computer technology broadly. Remotework self-efficacy is defined as the extent to which an individual beliefs in his or her ability to work and perform joint tasks with others in virtual settings. Virtual media skill is defined as the degree of confidence of individuals to function in their work role without face-to-face interactions. Virtual social skill is an individual's skill level in using technologies to communicate in virtual settings to their full potential. It should be noted that the concept of virtual social skill is different from the self-efficacy and captures an individual's cognition-based ability to build social relationships with others in virtual settings. Next, we discuss how online networking influences both individual virtual competence and task performance based on the social network theory and the social learning theory. We argue that online networking may enhance individuals' capability in expanding their social networks with low costs. We also argue that online networking may enable individuals to learn the necessary skills regarding how they use technological functions, communicate with others, and share information and make social relations using the technical functions provided by electronic media, consequently increasing individual virtual competence. To examine the relationships among online networking, virtual competence, and task performance, we developed research models (the mediation, interaction, and additive models, respectively) by integrating the social network theory and the social learning theory. Using data from 112 employees of a virtualized company, we tested the proposed research models. The results of analysis partly support the mediation model in that online social networking positively influences individuals' computer self-efficacy, virtual social skill, and virtual media skill, which are key predictors of individuals' task performance. Furthermore, the results of the analysis partly support the interaction model in that the level of remotework self-efficacy moderates the relationship between online social networking and task performance. The results paint a picture of people adjusting to virtual collaboration that constrains and enables their task performance. This study contributes to research and practice. First, we suggest a shift of research focus to the individual level when examining virtual phenomena and theorize that online social networking can enhance individual virtual competence in some aspects. Second, we replicate and advance the prior competence literature by linking each component of virtual competence and objective task performance. The results of this study provide useful insights into how human resource responsibilities assess employees' weakness and strength when they organize virtualized groups or projects. Furthermore, it provides managers with insights into the kinds of development or training programs that they can engage in with their employees to advance their ability to undertake virtual work.

  • PDF

An Intelligent Intrusion Detection Model Based on Support Vector Machines and the Classification Threshold Optimization for Considering the Asymmetric Error Cost (비대칭 오류비용을 고려한 분류기준값 최적화와 SVM에 기반한 지능형 침입탐지모형)

  • Lee, Hyeon-Uk;Ahn, Hyun-Chul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.157-173
    • /
    • 2011
  • As the Internet use explodes recently, the malicious attacks and hacking for a system connected to network occur frequently. This means the fatal damage can be caused by these intrusions in the government agency, public office, and company operating various systems. For such reasons, there are growing interests and demand about the intrusion detection systems (IDS)-the security systems for detecting, identifying and responding to unauthorized or abnormal activities appropriately. The intrusion detection models that have been applied in conventional IDS are generally designed by modeling the experts' implicit knowledge on the network intrusions or the hackers' abnormal behaviors. These kinds of intrusion detection models perform well under the normal situations. However, they show poor performance when they meet a new or unknown pattern of the network attacks. For this reason, several recent studies try to adopt various artificial intelligence techniques, which can proactively respond to the unknown threats. Especially, artificial neural networks (ANNs) have popularly been applied in the prior studies because of its superior prediction accuracy. However, ANNs have some intrinsic limitations such as the risk of overfitting, the requirement of the large sample size, and the lack of understanding the prediction process (i.e. black box theory). As a result, the most recent studies on IDS have started to adopt support vector machine (SVM), the classification technique that is more stable and powerful compared to ANNs. SVM is known as a relatively high predictive power and generalization capability. Under this background, this study proposes a novel intelligent intrusion detection model that uses SVM as the classification model in order to improve the predictive ability of IDS. Also, our model is designed to consider the asymmetric error cost by optimizing the classification threshold. Generally, there are two common forms of errors in intrusion detection. The first error type is the False-Positive Error (FPE). In the case of FPE, the wrong judgment on it may result in the unnecessary fixation. The second error type is the False-Negative Error (FNE) that mainly misjudges the malware of the program as normal. Compared to FPE, FNE is more fatal. Thus, when considering total cost of misclassification in IDS, it is more reasonable to assign heavier weights on FNE rather than FPE. Therefore, we designed our proposed intrusion detection model to optimize the classification threshold in order to minimize the total misclassification cost. In this case, conventional SVM cannot be applied because it is designed to generate discrete output (i.e. a class). To resolve this problem, we used the revised SVM technique proposed by Platt(2000), which is able to generate the probability estimate. To validate the practical applicability of our model, we applied it to the real-world dataset for network intrusion detection. The experimental dataset was collected from the IDS sensor of an official institution in Korea from January to June 2010. We collected 15,000 log data in total, and selected 1,000 samples from them by using random sampling method. In addition, the SVM model was compared with the logistic regression (LOGIT), decision trees (DT), and ANN to confirm the superiority of the proposed model. LOGIT and DT was experimented using PASW Statistics v18.0, and ANN was experimented using Neuroshell 4.0. For SVM, LIBSVM v2.90-a freeware for training SVM classifier-was used. Empirical results showed that our proposed model based on SVM outperformed all the other comparative models in detecting network intrusions from the accuracy perspective. They also showed that our model reduced the total misclassification cost compared to the ANN-based intrusion detection model. As a result, it is expected that the intrusion detection model proposed in this paper would not only enhance the performance of IDS, but also lead to better management of FNE.