• Title/Summary/Keyword: technical potential

Search Result 1,031, Processing Time 0.031 seconds

Research Trend Analysis Using Bibliographic Information and Citations of Cloud Computing Articles: Application of Social Network Analysis (클라우드 컴퓨팅 관련 논문의 서지정보 및 인용정보를 활용한 연구 동향 분석: 사회 네트워크 분석의 활용)

  • Kim, Dongsung;Kim, Jongwoo
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.1
    • /
    • pp.195-211
    • /
    • 2014
  • Cloud computing services provide IT resources as services on demand. This is considered a key concept, which will lead a shift from an ownership-based paradigm to a new pay-for-use paradigm, which can reduce the fixed cost for IT resources, and improve flexibility and scalability. As IT services, cloud services have evolved from early similar computing concepts such as network computing, utility computing, server-based computing, and grid computing. So research into cloud computing is highly related to and combined with various relevant computing research areas. To seek promising research issues and topics in cloud computing, it is necessary to understand the research trends in cloud computing more comprehensively. In this study, we collect bibliographic information and citation information for cloud computing related research papers published in major international journals from 1994 to 2012, and analyzes macroscopic trends and network changes to citation relationships among papers and the co-occurrence relationships of key words by utilizing social network analysis measures. Through the analysis, we can identify the relationships and connections among research topics in cloud computing related areas, and highlight new potential research topics. In addition, we visualize dynamic changes of research topics relating to cloud computing using a proposed cloud computing "research trend map." A research trend map visualizes positions of research topics in two-dimensional space. Frequencies of key words (X-axis) and the rates of increase in the degree centrality of key words (Y-axis) are used as the two dimensions of the research trend map. Based on the values of the two dimensions, the two dimensional space of a research map is divided into four areas: maturation, growth, promising, and decline. An area with high keyword frequency, but low rates of increase of degree centrality is defined as a mature technology area; the area where both keyword frequency and the increase rate of degree centrality are high is defined as a growth technology area; the area where the keyword frequency is low, but the rate of increase in the degree centrality is high is defined as a promising technology area; and the area where both keyword frequency and the rate of degree centrality are low is defined as a declining technology area. Based on this method, cloud computing research trend maps make it possible to easily grasp the main research trends in cloud computing, and to explain the evolution of research topics. According to the results of an analysis of citation relationships, research papers on security, distributed processing, and optical networking for cloud computing are on the top based on the page-rank measure. From the analysis of key words in research papers, cloud computing and grid computing showed high centrality in 2009, and key words dealing with main elemental technologies such as data outsourcing, error detection methods, and infrastructure construction showed high centrality in 2010~2011. In 2012, security, virtualization, and resource management showed high centrality. Moreover, it was found that the interest in the technical issues of cloud computing increases gradually. From annual cloud computing research trend maps, it was verified that security is located in the promising area, virtualization has moved from the promising area to the growth area, and grid computing and distributed system has moved to the declining area. The study results indicate that distributed systems and grid computing received a lot of attention as similar computing paradigms in the early stage of cloud computing research. The early stage of cloud computing was a period focused on understanding and investigating cloud computing as an emergent technology, linking to relevant established computing concepts. After the early stage, security and virtualization technologies became main issues in cloud computing, which is reflected in the movement of security and virtualization technologies from the promising area to the growth area in the cloud computing research trend maps. Moreover, this study revealed that current research in cloud computing has rapidly transferred from a focus on technical issues to for a focus on application issues, such as SLAs (Service Level Agreements).

Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives (사용자의 패스워드 인증 행위 분석 및 피싱 공격시 대응방안 - 사용자 경험 및 HCI의 관점에서)

  • Ryu, Hong Ryeol;Hong, Moses;Kwon, Taekyoung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.79-90
    • /
    • 2014
  • User authentication based on ID and PW has been widely used. As the Internet has become a growing part of people' lives, input times of ID/PW have been increased for a variety of services. People have already learned enough to perform the authentication procedure and have entered ID/PW while ones are unconscious. This is referred to as the adaptive unconscious, a set of mental processes incoming information and producing judgements and behaviors without our conscious awareness and within a second. Most people have joined up for various websites with a small number of IDs/PWs, because they relied on their memory for managing IDs/PWs. Human memory decays with the passing of time and knowledges in human memory tend to interfere with each other. For that reason, there is the potential for people to enter an invalid ID/PW. Therefore, these characteristics above mentioned regarding of user authentication with ID/PW can lead to human vulnerabilities: people use a few PWs for various websites, manage IDs/PWs depending on their memory, and enter ID/PW unconsciously. Based on the vulnerability of human factors, a variety of information leakage attacks such as phishing and pharming attacks have been increasing exponentially. In the past, information leakage attacks exploited vulnerabilities of hardware, operating system, software and so on. However, most of current attacks tend to exploit the vulnerabilities of the human factors. These attacks based on the vulnerability of the human factor are called social-engineering attacks. Recently, malicious social-engineering technique such as phishing and pharming attacks is one of the biggest security problems. Phishing is an attack of attempting to obtain valuable information such as ID/PW and pharming is an attack intended to steal personal data by redirecting a website's traffic to a fraudulent copy of a legitimate website. Screens of fraudulent copies used for both phishing and pharming attacks are almost identical to those of legitimate websites, and even the pharming can include the deceptive URL address. Therefore, without the supports of prevention and detection techniques such as vaccines and reputation system, it is difficult for users to determine intuitively whether the site is the phishing and pharming sites or legitimate site. The previous researches in terms of phishing and pharming attacks have mainly studied on technical solutions. In this paper, we focus on human behaviour when users are confronted by phishing and pharming attacks without knowing them. We conducted an attack experiment in order to find out how many IDs/PWs are leaked from pharming and phishing attack. We firstly configured the experimental settings in the same condition of phishing and pharming attacks and build a phishing site for the experiment. We then recruited 64 voluntary participants and asked them to log in our experimental site. For each participant, we conducted a questionnaire survey with regard to the experiment. Through the attack experiment and survey, we observed whether their password are leaked out when logging in the experimental phishing site, and how many different passwords are leaked among the total number of passwords of each participant. Consequently, we found out that most participants unconsciously logged in the site and the ID/PW management dependent on human memory caused the leakage of multiple passwords. The user should actively utilize repudiation systems and the service provider with online site should support prevention techniques that the user can intuitively determined whether the site is phishing.

Biological activity and analysis of α-glucosidase inhibitor from mulberry (Morus alba L.) wine (오디와인의 생리활성 및 α-glucosidase 저해제의 분석)

  • Son, Woo-Rim;Choi, Sang-Won
    • Food Science and Preservation
    • /
    • v.20 no.6
    • /
    • pp.877-885
    • /
    • 2013
  • Wine extracts of four different berry fruits, such as mulberry, blueberry, strawberry, and raspberry, were investigated for antioxidant, anti-tyrosinase, and ${\alpha}$-glucosidase activities by using in vitro assays. Additionally, quantitative changes of ${\alpha}$-glucosidase inhibitor in mulberry wine were determined by HPLC according to mulberry cultivars and fermentation process. Among four berry wines examined, mulberry wine showed the most potent ${\alpha}$-glucosidase inhibitory activity with 69.37% at 0.23 mg/mL, while blueberry and strawberry wines exhibited the strongest inhibition against DPPH radical and tyrosinase activity, respectively. Four compounds were isolated and purified from mulberry wine by a series of isolation procedures, such as solvent fractionation, and Diaion HP-20, ODS-A, and Sephadex LH-20 column chromatographies. Among them, Comp. 4 exerted the strongest ${\alpha}$-glucosidase inhibitory activity ($I_C_{50}=31.57{\mu}M$), and its chemical structure was identified as quercetin by UV and NMR spectral analysis. Finally, the "Daeseongppong" (16.83 ppm) muberry wine had larger amount of quercetin than the "Iksuppong" (14.85 ppm) and "Cheongilppong" (8.92 ppm) mulberry wines, but their contents of three mulberry wines decreased considerably with aging process. These results suggest that mulberry wine containing quercetin acted as ${\alpha}$-glucosidase inhibitor may be useful as a potential functional wine for improving diabetic disorder.

Enhancing Technology Learning Capabilities for Catch-up and Post Catch-up Innovations (기술학습역량 강화를 통한 추격 및 탈추격 혁신 촉진)

  • Bae, Zong-Tae;Lee, Jong-Seon;Koo, Bonjin
    • The Journal of Small Business Innovation
    • /
    • v.19 no.2
    • /
    • pp.53-68
    • /
    • 2016
  • Motivation and activities for technological learning, entrepreneurship, innovation, and creativity are driving forces of economic development in Asian countries. In the early stages of technological development, technological learning and entrepreneurship are efficient ways in which to catch up with advanced countries because firms can accumulate skills and knowledge quickly at relatively low risk. In the later stages of technological development, however, innovation and creativity become more important. This study aims to identify a) the factors (learning capabilities) that influence technological learning performance and b) barriers to enhancing innovation capabilities for the creative economy and organizations. The major part of this study is related to learning capabilities in the post-catch-up era. Based on a literature review and observations from Korean experiences, this study proposes a technological learning model composed of various influencing factors on technological learning. Three hypotheses are derived, and data are collected from Korean machine tool manufacturers. Intense interviews with CEOs and R&D directors are conducted using structured questionnaires. Statistical analysis, such as correlation and ANOVA are then carried out. Furthermore, this study addresses how to enhance innovation capabilities to move forward. Innovation enablers and barriers are identified by case studies and policy analysis. The results of the empirical study identify several levels of firms' learning capabilities and activities such as a) stock of technology, b) potential of technical labor, c) explicit technological efforts, d) readiness to learn, e) top management support, f) a formal technological learning system, g) high learning motivation, h) appropriate technology choice, and i) specific goal setting. These learning capabilities determine firms' learning performance, especially in the early stages of development. Furthermore, it is found that the critical factors for successful technological learning vary along the stages of technology development. Throughout the statistical and policy analyses, this study confirms that technological learning can be understood as an intrinsic principle of the technology development process. Firms perform proactive and creative learning in the late stages, while reactive and imitative learning prevails in the early stages. In addition, this study identifies the driving forces or facilitating factors enhancing innovation performance in the post catch-up era. The results of the preliminary case studies and policy analysis show some facilitating factors such as a) the strategic intent of the CEO and corporate culture, b) leadership and change agents, c) design principles and routines, d) ecosystem and collaboration with partners, and e) intensive R&D investment.

  • PDF

Research of z-axis geometric dose efficiency in multi-detector computed tomography (MDCT 장치의 z-축 기하학적 선량효율에 관한 연구)

  • Kim, You-Hyun;Kim, Moon-Chan
    • Journal of radiological science and technology
    • /
    • v.29 no.3
    • /
    • pp.167-175
    • /
    • 2006
  • With the recent prevalence of helical CT and multi-slice CT, which deliver higher radiation dose than conventional CT due to overbeaming effect in X-ray exposure and interpolation technique in image reconstruction. Although multi-detector and helical CT scanner provide a variety of opportunities for patient dose reduction, the potential risk for high radiation levels in CT examination can't be overemphasized in spite of acquiring more diagnostic information. So much more concerns is necessary about dose characteristics of CT scanner, especially dose efficient design as well as dose modulation software, because dose efficiency built into the scanner's design is probably the most important aspect of successful low dose clinical performance. This study was conducted to evaluate z-axis geometric dose efficiency in single detector CT and each level multi-detector CT, as well as to compare z-axis dose efficiency with change of technical scan parameters such as focal spot size of tube, beam collimation, detector combination, scan mode, pitch size, slice width and interval. The results obtained were as follows ; 1. SDCT was most highest and 4 MDCT was most lowest in z-axis geometric dose efficiency among SDCT, 4, 8, 16, 64 slice MDCT made by GE manufacture. 2. Small focal spot was 0.67-13.62% higher than large focal spot in z-axis geometric dose efficiency at MDCT. 3. Large beam collimation was 3.13-51.52% higher than small beam collimation in z-axis geometric dose efficiency at MDCT. 4. Z-axis geometric dose efficiency was same at 4 slice MDCT in all condition and 8 slice MDCT of large beam collimation with change of detector combination, but was changed irregularly at 8 slice MDCT of small beam collimation and 16 slice MDCT in all condition with change of detector combination. 5. There was no significant difference for z-axis geometric dose efficiency between conventional scan and helical scan, and with change of pitch factor, as well as change of slice width or interval for image reconstruction. As a conclusion, for reduction of patient radiation dose delivered from CT examination we are particularly concerned with dose efficiency of equipment and have to select proper scanning parameters which increase z-axis geometric dose efficiency within the range of preserving optimum clinical information in MDCT examination.

  • PDF

The Influence of Online Social Networking on Individual Virtual Competence and Task Performance in Organizations (온라인 네트워킹 활동이 가상협업 역량 및 업무성과에 미치는 영향)

  • Suh, A-Young;Shin, Kyung-Shik
    • Asia pacific journal of information systems
    • /
    • v.22 no.2
    • /
    • pp.39-69
    • /
    • 2012
  • With the advent of communication technologies including electronic collaborative tools and conferencing systems provided over the Internet, virtual collaboration is becoming increasingly common in organizations. Virtual collaboration refers to an environment in which the people working together are interdependent in their tasks, share responsibility for outcomes, are geographically dispersed, and rely on mediated rather than face-to face, communication to produce an outcome. Research suggests that new sets of individual skill, knowledge, and ability (SKAs) are required to perform effectively in today's virtualized workplace, which is labeled as individual virtual competence. It is also argued that use of online social networking sites may influence not only individuals' daily lives but also their capability to manage their work-related relationships in organizations, which in turn leads to better performance. The existing research regarding (1) the relationship between virtual competence and task performance and (2) the relationship between online networking and task performance has been conducted based on different theoretical perspectives so that little is known about how online social networking and virtual competence interplay to predict individuals' task performance. To fill this gap, this study raises the following research questions: (1) What is the individual virtual competence required for better adjustment to the virtual collaboration environment? (2) How does online networking via diverse social network service sites influence individuals' task performance in organizations? (3) How do the joint effects of individual virtual competence and online networking influence task performance? To address these research questions, we first draw on the prior literature and derive four dimensions of individual virtual competence that are related with an individual's self-concept, knowledge and ability. Computer self-efficacy is defined as the extent to which an individual beliefs in his or her ability to use computer technology broadly. Remotework self-efficacy is defined as the extent to which an individual beliefs in his or her ability to work and perform joint tasks with others in virtual settings. Virtual media skill is defined as the degree of confidence of individuals to function in their work role without face-to-face interactions. Virtual social skill is an individual's skill level in using technologies to communicate in virtual settings to their full potential. It should be noted that the concept of virtual social skill is different from the self-efficacy and captures an individual's cognition-based ability to build social relationships with others in virtual settings. Next, we discuss how online networking influences both individual virtual competence and task performance based on the social network theory and the social learning theory. We argue that online networking may enhance individuals' capability in expanding their social networks with low costs. We also argue that online networking may enable individuals to learn the necessary skills regarding how they use technological functions, communicate with others, and share information and make social relations using the technical functions provided by electronic media, consequently increasing individual virtual competence. To examine the relationships among online networking, virtual competence, and task performance, we developed research models (the mediation, interaction, and additive models, respectively) by integrating the social network theory and the social learning theory. Using data from 112 employees of a virtualized company, we tested the proposed research models. The results of analysis partly support the mediation model in that online social networking positively influences individuals' computer self-efficacy, virtual social skill, and virtual media skill, which are key predictors of individuals' task performance. Furthermore, the results of the analysis partly support the interaction model in that the level of remotework self-efficacy moderates the relationship between online social networking and task performance. The results paint a picture of people adjusting to virtual collaboration that constrains and enables their task performance. This study contributes to research and practice. First, we suggest a shift of research focus to the individual level when examining virtual phenomena and theorize that online social networking can enhance individual virtual competence in some aspects. Second, we replicate and advance the prior competence literature by linking each component of virtual competence and objective task performance. The results of this study provide useful insights into how human resource responsibilities assess employees' weakness and strength when they organize virtualized groups or projects. Furthermore, it provides managers with insights into the kinds of development or training programs that they can engage in with their employees to advance their ability to undertake virtual work.

  • PDF

'Open Skies' Agreements and Access to the 'Single' European Sky;Legal and Economic Problems with the European Court of Justice's Judgment in 'Commission v. Germany'(2002) Striking Down the 'Nationality Clause' in the U.S.-German Agreement (항공(航空) 자유화(自由化)와 '단일(單一)' 유럽항공시장(航空市場) 접근(接近);유럽사법재판소(司法裁判所)의 미(美) ${\cdot}$ 독(獨) 항공운수협정(航空運輸協定)상 '국적요건(國籍要件)' 조항(條項)의 공동체법(共同體法)상 '내국민대우(內國民待遇)' 규정 위반(違反) 관련 '집행위원회(執行委員會) 대(對) 독일연방(獨逸聯邦)' 사건 판결(判決)(2002)의 문제점을 중심으로)

  • Park, Hyun-Jin
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.15 no.1
    • /
    • pp.38-53
    • /
    • 2007
  • In a seminal judgment of November 2002 (Case C-476/98) relating to the compatibility with Community laws of the 'nationality clause' in the 1996 amending protocol to the 1955 U.S.-German Air Services Agreement, the European Court of Justice(ECJ) decided that the provision constituted a measure of an intrinsically discriminatory nature and was thus contrary to the principle of national treatment established under Art. 52 of the EC Treaty. The Court, rejecting bluntly the German government' submissions relying on public policy grounds(Art. 56, EC Treaty), seemed content to declare and rule that the protocol provision requiring a contracting state party to ensure substantial ownership and effective control by its nationals of its designated airlines had violated the requirement of national treatment reserved for other Community Members under the salient Treaty provision. The German counterclaims against the Commission, although tantalizing not only from the perusal of the judgment but from the perspective of international air law, were nonetheless invariably correct and to the point. For such a clause has been justified to defend the 'fundamental interests of society from a serious threat' that may result from granting operating licenses or necessary technical authorizations to an airline company of a third country. Indeed, the nationality clause has been inserted in most of the liberal bilaterals to allow the parties to enforce their own national laws and regulations governing aviation safety and security. Such a clause is not targeted as a device for discriminating against the nationals of any third State. It simply acts as the minimum legal safeguards against aviation risk empowering a party to take legal control of the designated airlines. Unfortunately, the German call for the review of such a foremost objective and rationale underlying the nationality clause landed on the deaf ears of the Court which appeared quite happy not to take stock of the potential implications and consequences in its absence and of the legality under international law of the 'national treatment' requirement of Community laws. Again, while US law limits foreign shareholders to 24.9% of its airlines, the European Community limits non-EC ownership to 49%, precluding any ownership and effective control by foreign nationals of EC airlines, let alone any foreign takeover and merger. Given this, it appears inconsistent and unreasonable for the EC to demand, $vis-{\grave{a}}-vis$ a non-EC third State, national treatment for all of its Member States. The ECJ's decision was also wrongly premised on the precedence of Community laws over international law, and in particular, international air law. It simply is another form of asserting and enforcing de facto extraterritorial application of Community laws to a non-EC third country. Again, the ruling runs counter to an established rule of international law that a treaty does not, as a matter of principle, create either obligations or rights for a third State. Aside from the legal problems, the 'national treatment' may not be economically justified either, in light of the free-rider problem and resulting externalities or inefficiency. On the strength of international law and economics, therefore, airlines of Community Members other than the designated German and U.S. air carriers are neither eligible for traffic rights, nor entitled to operate between or 'free-ride' on the U.S. and German points. All in all and in all fairness, the European Court's ruling was nothing short of an outright condemnation of established rules and principles of international law and international air law. Nor is the national treatment requirement justified by the economic logic of deregulation or liberalization of aviation markets. Nor has the requirement much to do with fair competition and increased efficiency.

  • PDF

Effect of Heating Temperature and Time of Coffee Waste on The Adsorptivity of Formaldehyde (폼알데하이드 흡착능에 대한 커피부산물의 열처리 조건 영향)

  • Ahn, Sye Hee
    • Journal of the Korean Wood Science and Technology
    • /
    • v.43 no.3
    • /
    • pp.390-399
    • /
    • 2015
  • This study was conducted to examine the potential use of coffee waste (CW) as an adsorbent of HCHO by adding into fiberboard. For the purpose, CW treated with various temperatures and times was placed in desiccator with a HCHO solution and then the HCHO adsorptivity of the CW was measured by acetylacetone (ATAN) and DNPH methods. In the results of ATAN analysis, amount of HCHO adsorbed in distilled water was the lowest on the non-treated CW and steadily increased to $100^{\circ}C$-treated temperature. However, over the $100^{\circ}C$, heating temperature (H-Temp) had not an effect on the HCHO adsorptivity of CW. Amount of HCHO adsorbed on CW itself was the highest at $100^{\circ}C$ H-Temp, following by $50^{\circ}C$, $150^{\circ}C$, $0^{\circ}C$, $250^{\circ}C$ and $200^{\circ}C$. For the HCHO adsorptivity of CW measured by DNPH methods, HCHO was not detected in the distilled water stirred with non-treated CW, but detected from the distilled water stirred with heating-treated CW. The content was the highest in the CW heating-treated at $100^{\circ}C$ for 10 min. In addition, HCHO adsorbed on CW itself increased to the H-Temp of $100^{\circ}C$ regardless of heating time, but decreased or reduced greatly degree of the increase over $100^{\circ}C$ H-Temp. In conclusion, optimal heating conditions of CW for the HCHO adsorption might be H-Temp between 100 and $150^{\circ}C$ with 10 min according as technical and economical reasons. Heating-treated CW manufactured with above the conditions can be used as an adsorbent in conventional fiberboard production for reducing HCHO emssion.

Technical Review of Target Volume Delineation on the Posterior Fossa Tumor : An Optimal Head and Neck Position (후두와 종양의 방사선치료 시 표적용적의 결정을 위한 적절한 치료자세 연구)

  • Yoon Sang Min;Lee Sang-wook;Ahn Seung Do;Kim Jong Hoon;YE Byong Yong;Ra Young Shin;Kim Tae Hyung;Choi Eun Kyung
    • Radiation Oncology Journal
    • /
    • v.21 no.1
    • /
    • pp.94-99
    • /
    • 2003
  • Purpose : To explore a 3D conformal radiotherapy technique for a posterior fossa boost, and the potential advantages of a prone position for such radiotherapy. Materials and Methods :A CT simulator and 3D conformal radiotherapy Planning system was used for the posterior fossa boost treatment on a 13-year-old medulloblastoma patient. He was placed In the prone position and Immobilized with an aquaplast mask and immobilization mold. CT scans were obtained of the brain from the top of the skull to the lower neck, with IV contrast enhancement. The target volume and normal structures were delineated on each slice, with treatment planning peformed using non-coplanar conformal beams. Results : The CT scans, and treatment In the prone position, were peformed successfully. In the prone position, the definition of the target volume was made easier due to the well enhanced tentorium, In audition, the posterior fossa was located anteriorly, and with the greater choice of beam arrangements, more accurate treatment planning was possible as the primary beams were not obstructed by the treatment table. Conclusion : .A posterior fossa boost, in the prone position, Is feasible in cooperating patients, but further evaluation is needed to define the optimal and most comfortable treatment positions.

A STUDY ON THE CLINICAL ANALYSIS AND PERFORMANCE IN COMPREHENSIVE NURSING CARE (전인간호의 임상학적 분석과 실행에 관한 연구)

  • 전산초
    • Journal of Korean Academy of Nursing
    • /
    • v.4 no.1
    • /
    • pp.1-21
    • /
    • 1974
  • A considerable change of the Korean nursing system has been made during the last decade not only in its philosophy but also in its function and structure to meet political and scientific need of the modern society. The main purpose of this study is to develope the new concept of comprehensive nursing care, both its Philosophy and ethics, as the basic of modern clinical nursing theory and practice. Comprehensive nursing care is the concept of human centered nursing care, and it helps a man to meet the basic physical, psychological, environmental, socioeconomic and teaching needs. It also helps him to help himself to meet these needs. This concept starts from the individualized nursing care and its ultimate goal is to improve a man to have a better position in his own community so that he may able to have a meaningful life. To accomplish this goal, an individualized nursing care plan as a nursing diagnosis and problem solving method should be set up for different patients with similar diagnosis to meet their needs, because each patient has a different social background. from this viewpoint, nursing is a science as well as abstruse humanity. The performance of comprehensive nursing care is a goal and issue of modern clinical nursing care. If nursing is a science and a profession for man, it should have ethics which recognize the dignity of man and offers infinite service voluntarily, and should be able to show leadership in carrying out the nursing responsibility. This leadership finds a person's potential and encourages him to utilize it. Such concepts should develop into a nursing ideology and this ideology should become a priority in comprehensive nursing care. The following statements are the conclusion of this study. 1) Modern nursing has been developed from disease centered nursing care to comprehensive nursing care based on humanity. The primary principle of nursing was to assist in the treatment of disease, but it has been changed to the professional nursing system independently. 2) The concept of nursing is one of continuous or endless scope of dispersion. It proves that nursing is grasping the professional responsibility to be able to coordinate scientific principles Patient health problems are according to scientific principles rather than adhering to nursing technical discipline as a daily work. 3) In chapter I and Ⅱ, the philosophy and ideology of nursing have been discussed and the flow of concept of clinical nursing and the rate of progress which emerges from naturalizing performance of the concept of comprehensive nursing in clinical nursing studied. The discussion developed the theory that a nurse should be to embody nursing ideas and objectives by establishing definite conviction of professions and study. 4) In chapter lil, nursing planning based on nursing diagnosis as a method to attain ideal nursing care for humanity with a definite idea of establishing philosophy of nursing was presented. 5) From the result of survey on patient needs about treatment and nursing, it was observed that all patient had emotional stress from unknown factors. Therefore it was concluded that nurses should not only educate the patient but also give them the opportunity to communicate freely their needs and anxieties. Furthermore complaints and doubts of the patient should be carefully noted and must be considered to meet these needs. 6) Patient teaching is the most important part of comprehensive nursing care. In chapter, Ⅲ, the important of patient teaching was emphasized by demonstrating the effect of patient teaching for diabetic patient. 7) In Chapter Ⅳ, from the result of the study on nurses attitudes to comprehensive nursing care, it was pointed that the evolution of nursing education and the establishment of a complete concept and value of comprehensive nursing was necessary.

  • PDF