Objectives: This study is designed to explore and understand what professional identity and professional development are like in family counselors. Method: This study to achieve its purpose, collected data through in-depth interview with fifteen(15) family counselors through grounded theory approach. Results: Major research findings can be summarized as follows. 176 concepts were drawn through open coding, again classified into 47 categories and finally into 18 subcategories. Through selective coding, 'growing as an expert in family counseling through continuous exertions for growth' appeared as core category. Through this process, the types of professional development in family counselors were classified into job pursuing type, self achieving type, self understanding type, and volunteering type. Through process analysis, family counselors' professional development could be divided into three steps with the course of time: step of immersion, self-understanding and acceptance, and integration. Based on this, the hypothetical relations in four areas: personal area, family area, interpersonal area, and vocational area were summarized in statements. Conclusion: This study is significant in that it attempted to establish a theory to explain the professional identity, development and influence factors shown in family counselors. It also provides those who hope to grow as expert in family counseling with long-term visions and implications for family counselor training and supervision. In this study, the suggestions on the tasks to check and solve the factors for improving and supporting the foundations of family counselors' professional identities by highlighting the family counselors own identify that is different from other counselors are expected to be used as primary data for preparing laws and regulations related to family counseling in the future.
The 2017 Pohang earthquake left us with issues related to long-term repair and restoration from massive earthquake damage. The existing Earthquake response manual was insufficient to consider the flow of earthquake disaster work and the characteristics of long-lasting earthquake disaster. Accordingly, It is important to analyze and record how to earthquake response work was carried out during the Pohang earthquake. The functions that require the most work and manpower in the event of an earthquake disaster were emergency life stabilization support, facility emergency recovery, and energy functional restoration. As a result of analyzing the difficulties and problems of disaster response by function, it was found that the prevention and preparation for damage in advance was insufficient for each function. In conclusion, we subdivided the response step applied with the concept of time and presented the overall work flow process for thirteen collaboration functions. It is expected that this result will help disaster managers to work effectively in the event of a large scale earthquake.
Coastal erosion has been a threat to coastal communities and emerged as an urgent problem. Among the coastal communities that are under perceived threat, Cotonou located in Benin, West Africa, is considered as one of the most dangerous area due to its high vulnerability. To address this problem, in 2013, the Benin authorities established seven groynes at east of Cotonou port, and two additional intermediate groynes have recently been integrated in April 2018. However, there is no quantitative analysis of groynes so far, so it is hard to know how effective they have been. To analyze effectiveness, we used optical satellite images from different time periods, especially 2004 and 2020, and then compared changes in length, width and area of shoreline in Cotonou. The study area is divided into two sectors based on the location of Cotonou port. The difference of two areas is that Sector 2 has groynes installed while Sector 1 hasn't. As result of this study, shoreline in Sector 1 showed accretion by recovering 1.20 km2 of area. In contrast, 3.67 km2 of Sector 2 disappeared due to coastal erosion, although it has groynes. This may imply that groynes helped to lessen the rate of average erosion, however, still could not perfectly stop the coastal erosion in the area. Therefore, for the next step, we assume it is recommended to study how to maximize effectiveness of groynes.
Recently, public participation in government policy design has been further expanded and public services perceived by users are expanding. At this time, the role of the digital government and the direction of the service to be pursued are user-centered, and above all, it is necessary to focus on the keywords of pre-emptive, preventive, and customized. In order to propose service quality improvement in the public sector, service user-centered classification and monitoring are integrated and the usability of government documents is improved. It is necessary to identify the needs of whether to provide a path for public participation. In the post-corona era, people are accessing quarantine information from the digital government every day. The government should proactively respond to the acceleration of digital transformation and the non-face-to-face demands of the people who experience non-face-to-face daily life. In order to evolve into a smart organization along with the innovation promotion plan and to provide customized services, it is necessary to use existing guides for institutional and technical improvement, along with new technology and data-based analysis, to strive for change management. The government should seek counter-measures that have advanced one step ahead by incorporating new high-tech IT with user-centered necessary services. This study aims to derive improvement plans to provide user-centered digital government service design when designing public services and collecting public opinions. Based on the e-government development model research and the existing research on user-centered service design in the public sector, institutional and technical measures are provided for the improvement of digital government service design.
Journal of Korean Society of Occupational and Environmental Hygiene
/
v.32
no.2
/
pp.182-194
/
2022
Objectives: This study evaluates and recommends the priority of policy implementation to improve the fire protection clothing management system used by firefighters and the reduction of cross-contamination from contaminated clothing at the scene of a fire. Methods: It consisted of 7 experts and conducted three interviews and two modified Delphi surveys. Through the results of previous research and interviews with experts, a plan to reduce cross-contamination of fire suits and improve the management system was first derived. An improvement plan was presented in the four areas including resources, management, fire protection related work, and laws and regulations, and the priority of policy implementation was derived by analyzing the importance and practicality of the policy at the same time. Results: As a result of the analysis, the first priority was education on the health effects of pollutants at the disaster scene for firefighters, and the second priority was the addition of SOP for the primary decontamination of on-scene personal protective equipment in preparation for the health effects of the disaster scene, and education for fire suppression and rescue workers. The next step was to improve the management system of personal protective equipment such as fire suits and develop a training course for systematic operation. Conclusions: This findings could be used in the implementation of mid- to long-term firefighting policies for the systematic operation and establishment of a systematic management system for personal protective equipment such as fire protective suits.
Time effect on the deformation and strength characteristics of geogrid reinforced sand retaining wall has become an important issue in geotechnical and transportation engineering. Three physical model tests on geogrid reinforced sand retaining walls performed under various loading conditions were simulated to study their rate-dependent behaviors, using the presented nonlinear finite element method (FEM) analysis procedure. This FEM was based on the dynamic relaxation method and return mapping scheme, in which the combined effects of the rate-dependent behaviors of both the backfill soil and the geosynthetic reinforcement have been included. The rate-dependent behaviors of sands and geogrids should be attributed to the viscous property of materials, which can be described by the unified three-component elasto-viscoplastic constitutive model. By comparing the FEM simulations and the test results, it can be found that the present FEM was able to be successfully extended to the boundary value problems of geosynthetic reinforced soil retaining walls. The deformation and strength characteristics of the geogrid reinforced sand retaining walls can be well reproduced. Loading rate effect, the trends of jump in footing pressure upon the step-changes in the loading rate, occurred not only on sands and geogrids but also on geogrid reinforced sands retaining walls. The lateral earth pressure distributions against the back of retaining wall, the local tensile force in the geogrid arranged in the retaining wall and the local stresses beneath the footing under various loading conditions can also be predicted well in the FEM simulations.
Purpose - This paper aims to investigate the properties of crude oil based derivative security (DLS) focusing on step-down type for comprehensive understanding of its risk. Design/methodology/approach - Kernel estimation is conducted to figure out statistical feature of the process of oil price. We simulate oil price paths based on kernel estimation results and derive probabilities of hitting the barrier and early redemption. Findings - The amount of issuance for crude oil based DLS is relatively low when base prices are below $40 while it is high when base prices are around $60 or $100, which is not consistent with kernel estimation results showing that oil futures prices tend to revert toward $46.14 and the mean-reverting speed is faster as oil price is lower. The analysis based on simulated oil price paths reveals that probability of early redemption is below 50% for DLS with high base prices and the ratio of the probability of early redemption to the probability of hitting barrier is remarkably low compared to the case for DLS with low base prices, as the chance of early redemption is deferred. Research implications or Originality - Empirical results imply that the level of the base price is a crucial factor of the risk for DLS, thus introducing a time-varying knock-in barrier, which is similar to adjust the base price, merits consideration to enhance protection for DLS investors.
This article presents a modeling method for the uncorrelated measurement error of the ultra-short baseline (USBL) acoustic positioning system for aiding navigation of underwater vehicles. The Mahalanobis distance (MD) and principal component analysis are applied to decorrelate the errors of USBL measurements, which are correlated in the x- and y-directions and vary according to the relative direction and distance between a reference station and the underwater vehicles. The proposed method can decouple the radial-direction error and angular direction error from each USBL measurement, where the former and latter are independent and dependent, respectively, of the distance between the reference station and the vehicle. With the decorrelation of the USBL errors along the trajectory of the vehicles in every time step, the proposed method can reduce the threshold of the outlier decision level. To demonstrate the effectiveness of the proposed method, simulation studies were performed with motion data obtained from a field experiment involving an autonomous underwater vehicle and USBL signals generated numerically by matching the specifications of a specific USBL with the data of a global positioning system. The simulations indicated that the navigation system is more robust in rejecting outliers of the USBL measurements than conventional ones. In addition, it was shown that the erroneous estimation of the navigation system after a long USBL blackout can converge to the true states using the MD of the USBL measurements. The navigation systems using the uncorrelated error model of the USBL, therefore, can effectively eliminate USBL outliers without loss of uncontaminated signals.
The purpose of this study was to establish a model for constructing longitudinal data for medical school, and to structure cohort and longitudinal data using data from Yonsei University College of Medicine (YUCM) according to the established input-environment-output (I-E-O) model. The study was conducted according to the following procedure. First, the data that YUCM has collected was reviewed through data analysis and interviews with the person in charge of each questionnaire. Second, the opinions of experts on the validity of the I-E-O model were collected through the first expert consultation, and as a result, a model was established for each stage of medical education based on the I-E-O model. Finally, in order to further materialize and refine the previously established model for each stage of medical education, secondary expert consultation was conducted. As a result, the survey areas and time period for collecting longitudinal data were organized according to the model for each stage of medical education, and an example of the YUCM cohort constructed according to the established model for each stage of medical education was presented. The results derived from this study constitute a basic step toward building data from universities in longitudinal form, and if longitudinal data are actually constructed through this method, they could be used as an important basis for determining major policies or reorganizing the curricula of universities. These research results have implications in terms of the management and utilization of existing survey data, the composition of cohorts, and longitudinal studies for many medical schools that are conducting surveys in various areas targeting students, such as lecture evaluation and satisfaction surveys.
Sojung, Oh;Eunjin, Kim;Eunji, Lee;Yeongseong, Kim;Gibum, Kim
KSII Transactions on Internet and Information Systems (TIIS)
/
v.17
no.2
/
pp.626-643
/
2023
As mobile forensics has emerged as an essential technique, the demand for technology development, education and training is increasing, wherein images are used. Academic societies in South Korea and national institutions in the US and the UK are leading the Mobile Forensic Image development. However, compared with disks, images developed in a mobile environment are few cases and have less active research, causing a waste of time, money, and manpower. Mobile Forensic Images are also difficult to trust owing to insufficient verification processes. Additionally, in South Korea, there are legal issues involving the Telecommunications Business Act and the Act on the Protection and Use of Location Information. Therefore, in this study, we requested a review of a standard model for the development of Mobile Forensic Image from experts and designed an 11-step development model. The steps of the model are as follows: a. setting of design directions, b. scenario design, c. selection of analysis techniques, d. review of legal issues, e. creation of virtual information, f. configuring system settings, g. performing imaging as per scenarios, h. Developing a checklist, i. internal verification, j. external verification, and k. confirmation of validity. Finally, we identified the differences between the mobile and disk environments and discussed the institutional efforts of South Korea. This study will also provide a guideline for the development of professional quality verification and proficiency tests as well as technology and talent-nurturing tools. We propose a method that can be used as a guide to secure pan-national trust in forensic examiners and tools. We expect this study to strengthen the mobile forensics capabilities of forensic examiners and researchers. This research will be used for the verification and evaluation of individuals and institutions, contributing to national security, eventually.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.