• 제목/요약/키워드: evidence reliability

Search Result 318, Processing Time 0.027 seconds

Validity and Reliability of the Korean Version of Student Evidence-Based Practice Questionnairs(S-EBPQ) (한국어판 간호대학생의 근거기반실무 측정도구(S-EBPQ)의 타당도 및 신뢰도 검증)

  • Kim, Sun Kyung
    • Journal of Industrial Convergence
    • /
    • v.18 no.1
    • /
    • pp.35-43
    • /
    • 2020
  • This study aimed to evaluate the reliability and validity of the Korean version of Student Evidence-Based Practice Questionnaire (S-EBPQ) which developed by Upton, Scurlock-Evans, and Upton. Data were collected from 209 nursing students with previous experience of education in evidence-based practice and clinical placement. Using SPSS 25.0, construct validity, concurrent validity and reliability were evaluated. The Korean version of S-EBPQ consisted of 21 items in four domains. The measurement explained 67.0% and the reliability using Cronbach's alpha was .927. The Korean version of S-EBPQ can be used to evaluate the ability of evidence-based practice among nursing students. The tool could be also used to examine the effectiveness of educational programs for evidence-based practice which would contribute to improving the quality of nursing education in Korea.

Reliability Metrics Design and Verification for the Acquisition of Small and Mid-Sized Web Application (중소규모 웹어플리케이션 개발업체 신뢰성평가를 위한 신뢰도 메트릭의 설계 및 유효성 검증)

  • Choi, Kwoung-Hee;Rhew, Sung-Yul
    • Asia pacific journal of information systems
    • /
    • v.16 no.3
    • /
    • pp.193-203
    • /
    • 2006
  • Software reliability prediction is a statistical method to put in place a timely software development practice useful for objective assessment of bidders. The current study suggests one research method that enables reliability assessment of such previous projects by studying user satisfaction and project management history. If incorporated into the existing acquisition process, the reliability assessment method will further enhance objectivity and accuracy in bidder selection process. The GQM(Goal Question Metric) paradigm was used to identify assessment metrics for bidder evaluation and questionnaires were collected from users to create user satisfaction indexes. In addition, 'weight of evidence', the most appropriate categorical method, was used to isolate attributes of each variable that may contribute to reliability assessment.

Reliability Analysis of Underwater Mobile Robot for Automated Reactor Inspection using Bayesian Belief Nets

  • Eom, Heung-Seop;Kim, Jae-Hee
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.137.5-137
    • /
    • 2001
  • This paper proposes a method that combines diverse evidence relevant to the reliability to evaluate the reliability of complicated systems such as robots. In practice, reliability experts combine diverse evidences relevant to the reliability and infer the answers by using their own way that are mostly informal. The proposed method also combines diverse evidence and performs inferences but informal and quantitative way by using the benefits of Bayesian Belief Nets (BBN). Diverse evidences could be those from dassical analysis techniques, test results, quality assurance about the process of manufacturing, and the quality of the company or development team, etc. Some of these evidences are qualitative and others are quantitative. Both are ...

  • PDF

Forensic Study about Hair Analysis as Legal Evidence of Drug Abuse Crime (모발에서 마약류 분석의 법과학적 고찰 - 마약류 범죄수사에서 모발 감정결과의 증거사용에 대해서 -)

  • Park, Yong-Hoon;Han, Eun-Young;Lee, Soo-Yeun
    • YAKHAK HOEJI
    • /
    • v.52 no.6
    • /
    • pp.452-465
    • /
    • 2008
  • Hair analysis for drugs of abuse offers the crucial potential advantage when compared to urine, such as the longer time window of drug intake, which makes retrospective investigation of chronic and/or past consumption. This paper reviews the physiological basis of hair growth, mechanism of drug incorporation, analytical methods, result interpretation and practical application of hair analysis. Moreover, to facilitate the court's decision regarding specific circumstances surrounding the crime, this review demonstrated that the results of hair analysis not only should be admitted as scientific evidence of drug use but also could legally improve reliability of the evidence.

A novel evidence theory model and combination rule for reliability estimation of structures

  • Tao, Y.R.;Wang, Q.;Cao, L.;Duan, S.Y.;Huang, Z.H.H.;Cheng, G.Q.
    • Structural Engineering and Mechanics
    • /
    • v.62 no.4
    • /
    • pp.507-517
    • /
    • 2017
  • Due to the discontinuous nature of uncertainty quantification in conventional evidence theory(ET), the computational cost of reliability analysis based on ET model is very high. A novel ET model based on fuzzy distribution and the corresponding combination rule to synthesize the judgments of experts are put forward in this paper. The intersection and union of membership functions are defined as belief and plausible membership function respectively, and the Murfhy's average combination rule is adopted to combine the basic probability assignment for focal elements. Then the combined membership functions are transformed to the equivalent probability density function by a normalizing factor. Finally, a reliability analysis procedure for structures with the mixture of epistemic and aleatory uncertainties is presented, in which the equivalent normalization method is adopted to solve the upper and lower bound of reliability. The effectiveness of the procedure is demonstrated by a numerical example and an engineering example. The results also show that the reliability interval calculated by the suggested method is almost identical to that solved by conventional method. Moreover, the results indicate that the computational cost of the suggested procedure is much less than that of conventional method. The suggested ET model provides a new way to flexibly represent epistemic uncertainty, and provides an efficiency method to estimate the reliability of structures with the mixture of epistemic and aleatory uncertainties.

Reliability Verification of Evidence Analysis Tools for Digital Forensics (디지털 포렌식을 위한 증거 분석 도구의 신뢰성 검증)

  • Lee, Tae-Rim;Shin, Sang-Uk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.165-176
    • /
    • 2011
  • In this paper, we examine the reliability verification procedure of evidence analysis tools for computer forensics and test the famous tools for their functional requirements using the verification items proposed by standard document, TIAK.KO-12.0112. Also, we carry out performance evaluation based on test results and suggest the way of performance improvement for evidence analysis tools. To achieve this, we first investigate functions that test subjects can perform, and then we set up a specific test plan and create evidence image files which contain the contents of a verification items. We finally verify and analyze the test results. In this process, we can discover some weaknesses of most of analysis tools, such as the restoration for deleted & fragmented files, the identification of the file format which is widely used in the country and the processing of the strings composed of Korean alphabet.

Digital Forensics: Review of Issues in Scientific Validation of Digital Evidence

  • Arshad, Humaira;Jantan, Aman Bin;Abiodun, Oludare Isaac
    • Journal of Information Processing Systems
    • /
    • v.14 no.2
    • /
    • pp.346-376
    • /
    • 2018
  • Digital forensics is a vital part of almost every criminal investigation given the amount of information available and the opportunities offered by electronic data to investigate and evidence a crime. However, in criminal justice proceedings, these electronic pieces of evidence are often considered with the utmost suspicion and uncertainty, although, on occasions are justifiable. Presently, the use of scientifically unproven forensic techniques are highly criticized in legal proceedings. Nevertheless, the exceedingly distinct and dynamic characteristics of electronic data, in addition to the current legislation and privacy laws remain as challenging aspects for systematically attesting evidence in a court of law. This article presents a comprehensive study to examine the issues that are considered essential to discuss and resolve, for the proper acceptance of evidence based on scientific grounds. Moreover, the article explains the state of forensics in emerging sub-fields of digital technology such as, cloud computing, social media, and the Internet of Things (IoT), and reviewing the challenges which may complicate the process of systematic validation of electronic evidence. The study further explores various solutions previously proposed, by researchers and academics, regarding their appropriateness based on their experimental evaluation. Additionally, this article suggests open research areas, highlighting many of the issues and problems associated with the empirical evaluation of these solutions for immediate attention by researchers and practitioners. Notably, academics must react to these challenges with appropriate emphasis on methodical verification. Therefore, for this purpose, the issues in the experiential validation of practices currently available are reviewed in this study. The review also discusses the struggle involved in demonstrating the reliability and validity of these approaches with contemporary evaluation methods. Furthermore, the development of best practices, reliable tools and the formulation of formal testing methods for digital forensic techniques are highlighted which could be extremely useful and of immense value to improve the trustworthiness of electronic evidence in legal proceedings.

A Study on Securing the Quality of Trusted Digital Records as Evidence: Focusing on Analysis of Quality Concept and Requirements for Records and Evidence Respectively Covered in Records Management and Judicial Domain (증거로서 신뢰할 수 있는 전자기록의 품질 확보방안 연구 - 기록관리영역과 사법영역에서 다루는 기록과 증거의 품질 개념과 요건 분석을 중심으로 -)

  • Lee, Gemma;Oh, Kyung-Mook
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.32 no.3
    • /
    • pp.217-246
    • /
    • 2021
  • This study aimed to analyze the quality concepts and requirements of digital records as evidence and to find an implication to develop requirements for trusted digital records with securing authoritative qualities. To this end, this study compared requirements of records domain linking records process, records metadata and records systems with judicial domain on digital evidence, and identified the records requirements to secure the legal admissibility linking records and judicial domain. This study analyzed the relationship of quality concepts between digital records and digital evidence, found the legal admissibility is highly related to the reliability, and derived that it needs the measure to secure the reliability at the stage of records creation and capture. To prove authenticity of digital evidence, this study identified importance of records process, records metadata and records system, and proposed the necessity of measurement to secure records' evidence.

Dependence assessment in human reliability analysis under uncertain and dynamic situations

  • Gao, Xianghao;Su, Xiaoyan;Qian, Hong;Pan, Xiaolei
    • Nuclear Engineering and Technology
    • /
    • v.54 no.3
    • /
    • pp.948-958
    • /
    • 2022
  • Since reliability and security of man-machine system increasingly depend on reliability of human, human reliability analysis (HRA) has attracted a lot of attention in many fields especially in nuclear engineering. Dependence assessment among human tasks is a important part in HRA which contributes to an appropriate evaluation result. Most of methods in HRA are based on experts' opinions which are subjective and uncertain. Also, the dependence influencing factors are usually considered to be constant, which is unrealistic. In this paper, a new model based on Dempster-Shafer evidence theory (DSET) and fuzzy number is proposed to handle the dependence between two tasks in HRA under uncertain and dynamic situations. First, the dependence influencing factors are identified and the judgments on the factors are represented as basic belief assignments (BBAs). Second, the BBAs of the factors that varying with time are reconstructed based on the correction BBA derived from time value. Then, BBAs of all factors are combined to gain the fused BBA. Finally, conditional human error probability (CHEP) is derived based on the fused BBA. The proposed method can deal with uncertainties in the judgments and dynamics of the dependence influencing factors. A case study is illustrated to show the effectiveness and the flexibility of the proposed method.

A Mechanism for Securing Digital Evidences of Computer Forensics in Smart Home Environment (스마트홈 환경에서 컴퓨터 포렌식스의 디지털 증거 무결성 보증 메커니즘)

  • Lee, Jong-Sup;Park, Myung-Chan;Jang, Eun-Gyeom;Choi, Yong-Rak;Lee, Bum-Suk
    • The Journal of Information Technology
    • /
    • v.10 no.3
    • /
    • pp.93-120
    • /
    • 2007
  • A Smart Home is a technically expanded from home network that gives us a comfortable life. But still there is a problem such as mal function of devices and intrusions by malicious parties since it is based on home network. The intrusion by malicious parties causes a critical problem to the individual's privacy. Therefore to take legal actions against to the intruders, the intrusion evidence collecting and managing technology are widely researched in the world. The evidence collecting technology uses the system which was damaged by intruders and that system is used as evidence materials in the court of justice. However the collected evidences are easily modified and damaged in the gathering evidence process, the evidence analysis process and in the court. That's why we have to prove the evidence's integrity to be valuably used in the court. In this paper, we propose a mechanism for securing the reliability and the integrity of digital evidence that can properly support the Computer Forensics. The proposed mechanism shares and manages the digital evidence through mutual authenticating the damaged system, evidence collecting system, evidence managing system and the court(TTP: Trusted Third Party) and provides a secure access control model to establish the secure evidence management policy which assures that the collected evidence has the corresponded legal effect.

  • PDF