• Title/Summary/Keyword: user's right

Search Result 222, Processing Time 0.029 seconds

The Relationship of a Social Workers's Professionalism and User Advocacy - Focusing on the Mediating Effects of a Social Worker's Right Perception and Performance at Service Processes- (사회복지사의 전문성과 이용자 옹호의 관계 -서비스과정에서의 이용자 권리에 대한 사회복지사의 인식 및 실행의 이중매개효과-)

  • Kim, Miok;Jeong, Hana
    • Korean Journal of Social Welfare
    • /
    • v.65 no.4
    • /
    • pp.115-136
    • /
    • 2013
  • This research purports to examine the mediating effects of right perception and performance at service processes in relationship to the social worker's professionalism and user advocacy. As the research method, 198 social workers were surveyed, and structural equation was used for analysis. The research findings showed that the professionalism of social workers had a direct influence on right perception, right performances at service processes and user-advocacy. However, right perception at service processes do not have a direct influence on user advocacy. In addition to this right perception and performances at service processes was proven to be an important mediator between a social worker's professionalism and user advocacy. As a result, this research has implied the necessity for social work practice to promote user-advocacy.

  • PDF

Study on strength of user's right in service delivery process - abolishing classification of disability and introducing direct payments - (서비스 전달과정에서의 이용자 권한 강화 방안에 대한 고찰 - 장애등급제 폐지 및 직접지불제도를 중심으로 -)

  • Lee, Seung-Ki
    • Korean Journal of Social Welfare Studies
    • /
    • v.45 no.2
    • /
    • pp.327-347
    • /
    • 2014
  • The purpose of this article is to explore the strength of user's right in service delivery process, and focuses on two areas. First one is to discuss the necessity which the process of service delivery will be changed from supplier-oriented system to user-oriented one, in order to strengthen user's right, especially in terms of choice and control. It can be facilitated by the abolishing of classification of disability. Second one is to introduce direct payments which money is directly given to user, instead of being given to supplier. This article also stresses that there is possibility of setting up direct payments because voucher system, a precursor of direct payments, is widely settled down for social service area in Korea.

A Context-aware Recommender System Architecture for Mobile Healthcare in a Grid Environment (모바일 헬스케어를 위한 그리드 기반의 컨텍스트 추천 시스템)

  • Hassan, Mohammad Mehedi;Han, Seung-Min;Huh, Eui-Nam
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.05a
    • /
    • pp.40-43
    • /
    • 2008
  • This paper describes a Grid-based context-aware doctor recommender system which recommends appropriate doctors for a patient or user at the right time in the right place. The core of the system is a recommendation mechanism that analyzes a user's demographic profile, user's current context information (i.e., location, time, and weather), and user's position so that doctor information can be ranked according to the match with the preferences of a user. The performance of our architecture is evaluated compare to centralized recommender system.

A Study on the Ethical Issues and Sharing Behavior of User's Information in the Era of Big Data

  • Lee, Myung-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.10
    • /
    • pp.43-48
    • /
    • 2016
  • This study is to examine how big data collects user's information and is used; the status quo of exposures of user's information, and various measures of self-control by the user. This study is also to look their ethical issues and discuss problems of privacy concerning big data. As a way for users to self-control their information, they need to check the log-in state of web portal sites and set up their account so that customized advertisement and location information cannot be tracked. When posting a blog, the value of posting should be controlled. When becoming a member of a web site, users must check the access terms before agreement and beware of chained agreements and/or membership joins in order to control the exposure of their personal information. To prevent information abuse through big data through which user's information is collected and analyzed, all users must have the right to control, block or allow personal information. For an individual to have the right to control over his information, users must understand the concept of user's information and practice ethics accompanied by newly given roles in the Internet space, which will lead to the establishment of the sound and mature information society on the Internet.

Object Extraction and Modeling Method from the User Requirements with Fillmore's Case Grammar (Fillmore의 Case Grammar를 통한 사용자 요구사항으로부터 객체 추출 및 모델링 방법)

  • Ahn, Sung-Bin;Kim, Dong-Ho;Seo, Chae-Yun;Kim, R.Young-Chul
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.10
    • /
    • pp.985-989
    • /
    • 2010
  • The near future smart ubiquitous computing oriented system will have to provide the optimal (right) service through interactions between users and the system. To provide the right services what the user needs, we should choose the user-centered development for reflecting the user needs, but not the developer-centered development. To do this, we proposed User Behavior Analysis Based Needs Extraction Method [1]. In this paper, we propose Object Extraction and Modeling Method from the user requirements with Fillmore's Case Grammar.

EUCAS : Development of the User Interface for Dynamic Context-aware Service Definition (EUCAS : 동적인 상황인식서비스 정의를 위한 사용자인터페이스 개발)

  • Kang, Ki-Bong;Park, Jeong-Kyu;Lee, Keung-Hae
    • 한국HCI학회:학술대회논문집
    • /
    • 2009.02a
    • /
    • pp.346-350
    • /
    • 2009
  • According to the development of information technology, there are many services in our life. These services make our life safe and convenient. However, the increment of the services also causes the increment of human concern and effort to control these services. The context-aware service is the service that provided their functionality at the right time and to the right place by analysis user's current situation. The most previous studies about context-aware service regard that context-aware services are defined by the developer who has expertise in information technology. The definition of the context-aware services by the developer makes difficult to reflect user's personal preferences and life pattern to the services. In this paper, we propose an user interface EUCAS(by End-User, Context-Aware Service development) that make the user can define and manage their own context-aware service according to their preferences. We expect EUCAS can be effective user interface technology for providing personalized context-aware service.

  • PDF

Flexible Video Authentication based on Aggregate Signature

  • Shin, Weon;Hong, Young-Jin;Lee, Won-Young;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.6
    • /
    • pp.833-841
    • /
    • 2009
  • In this paper we propose a flexible video authentication scheme based on aggregate signature, which provides authenticity of a digital video by means of cryptographic signature to guarantee right of users. In contrast to previous works, the proposed scheme provides flexible usages on content distribution system, and it allows addition of new contents to the signed contents and deletion of some parts of the signed contents. A modification can be done by content owner or others. Although contents are modified by one or more users, our scheme can guarantee each user's right by aggregation of the each user's signatures. Moreover, proposed scheme has half size of Digital Signature Algorithm (DSA) with comparable security.

  • PDF

A Study on Invasion of Privacy and Right to be forgotten by Internet Cookie Technology (인터넷 쿠키로 인한 프라이버시 침해와 잊혀질 권리에 관한 연구)

  • Choi, Younsung;Kwon, Oh-Geol;Won, Dongho
    • Journal of Internet Computing and Services
    • /
    • v.17 no.2
    • /
    • pp.77-85
    • /
    • 2016
  • Internet cookie technology is designed for solving unreliable problem of HTTP's inherent property and notifying user's previous activity to web site's server, so it is useful to provide suitable service for individual user. However, the cookie techniques are becoming more sophisticated such as the third cookie and super cookie. And its included information is applied for advertisement and target marketing strategy, so the problem occurs that user's personal information is collected excessively. However, our law does not recognize the internet cookie as personal information so user cannot know where own internet cookie is stored and applicable. Therefore, in this paper, we explain the internet cookie technology, the privacy invasion and right to be forgotten for solving problem due to the internet cookie. And we analysis the relationship between the information of internet cookie and personal information, and then present the improvement requirement on the law and technology to use internet cookie securely and conveniently.

Identification of user's Motion Patterns using Motion Capture System

  • Jung, Kwang Tae;Lee, Jaein
    • Journal of the Ergonomics Society of Korea
    • /
    • v.33 no.6
    • /
    • pp.453-463
    • /
    • 2014
  • Objective:The purpose of this study is to identify motion patterns for cellular phone and propose a method to identify motion patterns using a motion capture system. Background: In a smart device, the introduction of tangible interaction that can provide new experience to user plays an important role for improving user's emotional satisfaction. Firstly, user's motion patterns have to be identified to provide an interaction type using user's gesture or motion. Method: In this study, a method to identify motion patterns using a motion capture system and user's motion patterns for using cellular phone was studied. Twenty-two subjects participated in this study. User's motion patterns were identified through motion analysis. Results: Typical motion patterns for shaking, shaking left and right, shaking up and down, and turning for using cellular phone were identified. Velocity and acceleration for each typical motion pattern were identified, too. Conclusion: A motion capture system could be effectively used to identify user's motion patterns for using cellular phone. Application: Typical motion patterns can be used to develop a tangible user interface for handheld device such as smart phone and a method to identify motion patterns using motion analysis can be applied in motion patterns identification of smart device.

User Behavior of Mobile Enterprise Applications

  • Lee, Sangmin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.8
    • /
    • pp.3972-3985
    • /
    • 2016
  • Organizations have been implementing mobile applications that actually connect to their backend enterprise applications (e.g. ERP, SCM, etc.) in order to increase the enterprise mobility. However, most of the organizations are still struggling to fully satisfy their mobile application users with the enterprise mobility. Even though it has been regarded as the right direction that the traditional enterprise system should move on, the studies on the success model for mobile enterprise applications in user's acceptance perspective can hardly be found. Thus, this study focused not only to redefine the success of the mobile enterprise application in user's acceptance persepective, but also to find the impacts of the factors on user's usage behavior of the mobile enterprise applications. In order to achieve this, we adopted the Technology Acceptance Model 2 (TAM2) as a model to figure out the user's behavior on mobile applications. Among various mobile enterprise applications, this study chose mobile ERP since it is the most representing enterprise applications that many organizations have implemented in their backend. This study found that not all the constructs defined by Davis in TAM2 have a significant influence on user's behavior of the mobile-ERP applications. However, it is also found that most social influence processes of TAM2 influence user's perception of the degree of interaction by mobile-ERP applications.