In order to protect Rescue 119 workers exposed on the spot from potential infection, this study identified their awareness and practices of infection control so that it could help preventing them from infection and also provide basic materials necessary for pre-hospital infection control. This study applied questionnaire survey to total 215 Rescue 119 workers at fire stations in Jeonbuk province, Jeonnam province and Gwangju city from July 14 to Sept. 14, 2006 for the benefit of data collection. The questionnaire about possible associations between awareness and practices of infection control consisted of total 46 times across 6 categories such as washing hands during emergency activities ; fluid therapy and injection ; respirator maintenance; individual hygienics ; disinfectant supplies and equipments maintenance ; and control of infectious wastes. And collected data were processed using SPSS statistic program to analyze frequency and percentage, mean and standard deviation, Pearson's correlation coefficient, t-test and one-way ANOVA. As a result, this study came to the following conclusions : In terms of awareness about infection control, our respondents showed highest awareness about infectious waste control, and also showed highest level of practices in washing hands during emergency activities. Throughout all domains, awareness means were higher than practice means. In particular, infectious waste control was the domain of significant differences between awareness and practices. In terms of associations between awareness and individual characteristics, it was found that female rescue worker group and hospital/general hospital career group (before joining the Rescue 119) showed significantly higher awareness on statistic level. In regard to associations between individual characteristics and practices, it was found that female rescue worker group showed higher level of practices than male group on statistic level. This study also analyzed correlations between rescue workers' awareness and practice of infection control. As a result, it was found that the higher awareness was in correlations with the higher practices across all 6 domains including washing hands. In addition, the higher awareness of a questionnaire item was in significantly positive correlations with the higher practice of other items. However, our respondents showed high awareness about anti-infection, but low practices in reality. This indicates necessity of devising possible solutions to improve the practices as much as awareness. Especially, it was noted that major reasons for insufficient practices of infection control guideline come from unhabituated practices and lack of supports for infection-preventing supplies and protective device (mask, etc). Hence, it is necessary to provide more infection-preventing supplies for local rescue workers sufficiently, in parallel with steady habituation of infection control. Furthermore, it is required to manage and study infection control policies even at pre-hospital step in efforts for effective infection control, education and activities.
The so called Antarctic Treaty System, started from the Antarctic Treaty in 1959, has gradually been enlarged into the concept of an international environmental regime, which has been included in not a few international institutions, treaties, conventions, and international non-governmental organizations (INGO). This kind of movement, as in the role of an international environmental regime, has recently been highlighted in the Protocol on Environmental Protection to the Antarctic Treaty. This Protocol is taking appropriate measures as an international environmental regime in regulating its member nations by enforcing principles in protecting Antarctic resources and environment, regulating member nations' Antarctic activities, establishing norms in the adoption of international and domestic laws, and devising regulations for deciding administrative actions through the member nations' collective decision-making procedures. h this context, this paper is to test a few questions; firstly, how the Antarctic Treaty System can be related with the role of international environmental regime; secondly, how the theories of international environmental regime, such as the hegemony theory, rational choice theory, and international morality theory, can be tested in the role of Antarctic Treaty System as an international environmental regime. Finally, this paper provides a solution for the future problems of the Antarctic Treaty System as an international environmental regime regarding the regime's principle (conflict between the environmental principle and the right of nation-state), norms and regulations (the conflict between the developed and underdeveloped nations in terms of the concept of 'common but differentiated environmental responsibility'), cooperation directions (the leadership problems between hegemonic nation and multilateral leading groups), and management methods (cooperation and arrangement problems among expert institutions, observer groups, and INGO).
Journal of Korea Society of Digital Industry and Information Management
/
v.20
no.3
/
pp.37-59
/
2024
The current application of Generative AI in education requires enhancing skills and competencies for both instructors and students in the Age of Digital Formation. The knowledge, skills, and attitudes necessary for individualized education should be cultivated in schools, along with the ability to develop AI-compatible learning resources. Today's educational environment aligns with the demands of the Generative AI Era. Consequently, there is a need for an educational system that promotes critical thinking and creativity while connecting students to the global context. This study examined the teaching and learning processes, along with educational exploration, to understand the properties of light particles and waves within a competency-based science curriculum. The analysis and research findings aimed at devising a competency-based teaching-learning method for students' understanding of light particles and waves are as follows: First, unit analysis confirmed the significance of competency-oriented education and facilitated the structuring of units on light and waves. Second, qualitative content analysis outlined the procedures for applying conceptual knowledge and functions in experiential learning, as well as the process of feedback delivery. Third, the study highlighted the need for a meticulous approach to inducing problem recognition through inquiry and discussion activities, ensuring that students, when exploring and recognizing problems independently, do not develop misconceptions.
As facilities and equipments for learning activities in college campuses are handled by mass public, their contact surfaces may function as major routes of cross-infection of microbial pathogens. However, unlike items in cafeteria which is the typical target for campus hygiene, those surfaces are not under regular surveillance or sanitary maintenance. In this study, I made a quantitative comparison of the risk of being exposed to microbial pathogens from use of learning facilities such as classrooms and library to the risk from use of cafeteria, for about 1,500 students in a college. Regarding total coliforms as surrogate model of bacterial pathogens, exposure rates were estimated for each item in learning facilities and cafeterias by devising deterministic exposure algorithms based on bacterial abundance, contract rates and transfer rates. The exposure rate in cafeterias was 1.0 CFU/day while learning facilities imposed the rate of 0.5 CFU/day, which reaches a half of the exposure rate in cafeterias. However, 70% of students were exposed more in learning facilities than cafeteria because individuals had different frequencies in using cafeteria. Based on the results, some human-contact surfaces of learning facilities, including elevator buttons, may require regular sanitary maintenance. An efficient sanitary maintenance considering seasonality in diversity of pathogens involved with cross-infections is suggested besides improvement of personal hygiene among students.
Journal of the Korean Institute of Landscape Architecture
/
v.39
no.3
/
pp.74-82
/
2011
This study was intended to devise means to encourage participation for organizations taking part in "resident participation parks.", "Resident participation" has become increasingly recognized as an effective means of park management in Korea. To this end, this study analyzed the current status of social networks for civic organizations participating in park management with respect to their degree of participation, credibility and trust, and exchange of information. Among resident participation parks, "Seoul Forest Park" has been widely recognized as a model example; accordingly this study designated Seoul Forest Park as its primary research focus. Thirty core members of resident participation organizations were selected as test subjects. Members of the resident participation organizations under review came from various backgrounds, including government administrative organizations, citizens' groups, residents' groups, and private businesses. Surveys were used to provide data on credibility and trust between organizations, levels of participation, and exchange of information, as well as statistics on demographic affiliation. Results were examined through UCINET, a program designed to analyze social networks. Survey results indicated that 1) The "Seoul Forest Park Conservancy" and the "Seoul Forest Park Management Office" constituted a hub within their social networks that maintained significantly more relationships than other organizations with regard to levels of credibility and trust, participation, and exchange of information; 2) Social networks for organizations wishing to work together, or desiring active participation in the future tended to center on citizens' organizations in the environmental and arts fields; and 3) Women's associations and meetings of neighborhood("tong") leaders had very little significance as a center in the social networks of local residents groups, and indeed very few connections amongst themselves. The results of this research can be applied in the devising of proposals for encouraging participation in resident participation parks in consideration of the social networks between organizations engaging in park management activities for a diverse array of urban parks and other areas.
Journal of the Korea Academia-Industrial cooperation Society
/
v.19
no.10
/
pp.569-577
/
2018
This study was conducted to determine the effects of middle-aged women's social support and self-efficacy on their aging anxiety, with the ultimate goal of providing basic information for devising educational and interventive programs to help reduce aging anxiety. Participants of this study were 210 middle-aged women living in B Metropolitan City. Data were collected from May 10 to 28, 2018, and statistically processed using t-tests, ANOVA, Pearson's correlation coefficient and stepwise multiple regression analysis. Participants showed significant differences in aging anxiety depending on age, education, monthly income, marital life satisfaction, leisure time activities, and number of friends. In addition, aging anxiety had significant negative correlations with social support and self-efficacy, and the main factors affecting middle-aged women's aging anxiety were found to be self-efficacy, marital satisfaction and social support. Of these, self-efficacy had the greatest effect, explaining 42.7% of the participants' aging anxiety. To help middle-aged women reduce their aging anxiety, it is necessary to provide them with programs that improve social activity participation, raise self-efficacy and promote relationships with family and communities. It is also recommended that these women be provided with educational and interventive programs that help them adjust to aging and develop a positive awareness of it.
Purpose - There are common factors both in Technology Readiness and Acceptance Model and Technology Paradox Theory which can be put together and made in one unified model. The unified model can provide the following merits. First, the unified model is simple but contains factors of the models. Second, the unified model can clarify the process of technology acceptance of common consumers. Third, the unified model can provide the opportunities to analyze the negative sides of new technology, thus find ways to improve the level of acceptance by general consumers. Research design, data, and methodology - The 450 questionnaires were handed out to people around Seoul and 421 were collected. Except insincere and wrong-marked ones, 402 were used to analyze. SPSS program was used to analyze. Factor analysis, regression analysis was conducted to test the hypotheses. Results - By analyzing sub-factors of both models and binding the common factors in one category, we accomplish one model. And we tested the model by empirical method. The results show that the results from the unified model are almost same as the results from the two models. In other words, the unified model works. Conclusions - Explaining one state of affair by two different method is in some sense distracting attention. By devising a new model including factors of both models, we can explain the affair more straightforward and efficiently. At first the technology acceptance model was devised to explain the technology users in an organization and the following tests and revised models were for the similar purposes. However, as on-lone activities including contracts have been expanded and become important, consumers as the technology uses have emerged as first factor to consider. In accordance models to explain this situation has been suggested. The model suggested in this research is one of the models but it has the following merits. That is, it is simple but has strong explanation power, it can clarify the process of technology acceptance of common consumers by containing negative sides of consumer conception, and thus, it can provide the opportunities to analyze the negative sides of new technology, also find ways to improve the level of acceptance by general consumers.
We are witnessing the growing maritime tension on the East Asian sea these days. Each naval powers in the region are competing each other to acquire more advanced naval capabilities. Based upon the rapid economic development, China is actively beefing up its naval capabilities and expand its boundary of naval activities all over the East Asian region. Chinese Navy already unveiled its expansive naval strategy replacing the traditional concept of 'Near-Sea Defense' with the new concept of 'Far-Sea Defense' strategy. In response to potential rival's naval build up, the U.S. is redeploying its naval forces focusing on the Asia-Pacific region. The U.S. enhances its joint naval exercises with the countries in the region, such as Japan, India, Australia and so on. In addition, Washington is devising new naval strategy under the concept of 'Air-Sea Battle' to deter Peking's so-called 'Anti-Access/ Area Denial(A2AD)' strategy. As a close ally of the U.S., Japan also disclosed its clear intention to strengthen the Maritime Self Defense Force(MSDF)'s capabilities by introducing the new concept of 'Dynamic Defense Force' in 2011. Under the new concept, JMSDF is pursuing the additional acquisition of submarines, quasi-aircraft carriers, Aegis-equipped destroyers, etc. Under the new president's strong leadership, Russia is also invigorating the naval build-up. Especially, Russia is fortifying the Pacific Fleet's naval assets by deploying new-type of naval ships such as the Mistral which was imported from France. In the midst of competitive naval build-up among the major naval powers in the region, we are observing the growing maritime conflicts on the East China Sea as well as South China Sea. Those naval conflicts can pose severe threats to our national interests. Maritime conflicts on the East or South China Sea can imperil our sea lanes which will be indispensible for national economic development. Neighboring countries' maritime conflicts also will cast an uncertainty on the path to mobilize international cooperation to resolve the North Korean issues. We should contribute to ease the maritime tension in the region by various ways. First, we should actively galvanize the bilateral maritime dialogue among the major naval powers in the region. Second, we also should take the lead to form a multilateral maritime cooperation mechanism in the region. Above all, we should set the aim to be a peaceful maritime power who can contribute to a building of stable maritime order in the region with a considerable naval power.
In the mordern society, the reliance on the cyber domain and the cyber connectivity has been increasingly strengthened. Due to this phenomenon, the cyberterror against critical infrastructures and state organs might lead to fatal consequences. Lately, North Korea's cyberattacks against South Korea's national organizations and financial computer networks are becoming more and more intelligent and sophisticated. The cyberattacks against such critical infrastructures have caused enormous economic loss and social disorder. This paper is designed to examine comparatively the cyberterror related laws and organizations of the advanced countries such as U.S. and U.K. and to draw implications. Although those countries are under different institutional and cultural backgrounds with varying security envrionments, they are identically pursuing measures by establishing government-wide counterterror system for coordination and cooperation. They are also commonly focusing upon creating new organizations equipped with new system and upon enhancing intelligence performance and devising punishment regulations. Korea is lack of framework laws regulating cyber security, having only scattered individual laws. Since such legal base is far from efficient counterterror activities, it is necessary that the legal and policy response of the advanced countries should be closely studied for selective introduction. That will eventually lead to legislation of cyber security law. With such legislation on hand, it is subsequently required to strengthen crisis management for prevention of cyberterror and to create joint response team, cooperating with private organizations.
Journal of the Korean Association of Geographic Information Studies
/
v.22
no.4
/
pp.72-85
/
2019
The goal of this study is to predict sexual violence crimes, which is an routine risk. The study used to the Weight of Evidence on sexual violence crimes that occurred in partly Cheongju-si for five years from 2011 to 2015. The results are as follows. First, application and analysis of the Weight of Evidence that considers the weight of evidence characteristics showed 8 out of total 26 evidences that are used for a sexual violence crimes risk prediction. The evidences were residential area, date of use permission for building, individual housing price, floor area ratio, number of basement floor, lot area, security light and recreational facility; which satisfied credibility in the process of calculating weight. Second, The weight calculated 8 evidences were combined to create the prediction map in the end. The map showed that 16.5% of sexual violence crimes probability occurs in 0.3㎢, which is 3.3% of the map. The area of probability of 34.5% is 1.8㎢, which is 19.0% of the map and the area of probability of 75.5% is 2.0㎢, which is 20.7% of the map. This study derived the probability of occurrence of sexual violence crime risk and environmental factors or conditions that could reduce it. Such results could be used as basic data for devising preemptive measures to minimize sexual violence, such as police activities to prevent crimes.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.