• Title/Summary/Keyword: 입원시설

Search Result 84, Processing Time 0.021 seconds

Causes of Childhood Injuries Observed at the Emergency Rooms of Five Hospitals in Taegu (대구시내 종합병원 응급실에 찾아온 소아사고 환아의 사고원인)

  • Park, Jung-Han;Bae, Yeong-Sook
    • Journal of Preventive Medicine and Public Health
    • /
    • v.21 no.2 s.24
    • /
    • pp.224-237
    • /
    • 1988
  • To determine the causes of and related factors to childhood injuries, the emergency room records and inpatient medical records were reviewed for 4,849 injured children out of 15,790 pediatric patients(<15 years old) who visited the emergency rooms of 3 university hospitals and 2 general hospitals in Taegu from 1 January to 31 December 1987. Out of total injured children, 54.675 were 3-8 years old and the male to female ratio of the total injured children was about 2:1. The leading causes of injury were falls and slips (29.1%) and traffic accident(28.2%). The frequency of injury was higher in May-October than the rest of months and 51.6% of the injuries occurred between 15 and 20 o'clock. Falls and slips took place most frequently at the stairway(25.7%). The most common interpersonal violence was inflicted injuries(85.6%) and there were 11 child rapes. Dog bites accounted for 67.6% of all biting injuries and it occured 2.9 times more in male than in female. CO intoxication was the most common cause of poisoning (45.3%) and scalding accounted for 85.2% of all burns. Common places of drownings were river (32.2%), swimming pool (22.6%) and construction site(19.3%). To prevent childhood injuries, it is recommended to eliminate the hazardous environmental factors, to provide safe playgrounds, to educate the children for safety from kindergarten and the general public through mass communication, to establish a strict safety standard for houses, public buildings and facilities, and playgrounds.

  • PDF

Database for Hospice Nursing in Electronic Medical Record (호스피스 전자기록을 위한 데이터베이스 개발)

  • Kim, Young-Soon;Lee, Chang-Geol;Lee, Kyoung-Ok;Kim, Ok-Kyum;Kim, In-Hye;Kim, Mi-Jeong;Hwang, Ae-Ran;Lee, Won-Hee
    • Journal of Hospice and Palliative Care
    • /
    • v.7 no.2
    • /
    • pp.200-213
    • /
    • 2004
  • Purpose: The purpose of this study was to create an electronic nursing record form to build a hospice nursing process database to be used in the u-hospital EMR system. Specific aims of the study were: 1. To generate a complete, accurate, and simple electronic nursing record form. 2. To verify its appropriateness following documentation with the standardized hospice protocol. 3. To verify its validity and finalize the hospice nursing process database through discussion among hospice professionals. Methods: Nursing records from three independent hospice organizations were collected and analyzed by five expert hospice nurses with more than 10 years of experience, and a nursing record database was developed. This database was applied to 81 hospice patients at three hospice organizations to verify its completeness. Results: 1. An electronic nursing record form with completeness, accuracy, and simplicity was developed. 2. The completeness of the standardized home hospice service protocol was 95.86 percent. 3. The hospice nursing process database contains 18 items on health problems, 79 items on related causes and major symptoms, and 229 items on nursing interventions. Conclusion: The new nursing record form and database will reduce documentation time and articulate and streamline the working process among team members. They can also improve the quality of hospice services, and ultimately enable us to estimate hospice service costs.

  • PDF

Developing a Tool to Assess Competency to Consent to Treatment in the Mentally Ill Patient: Reliability and Validity (정신장애인의 치료동의능력 평가 도구 개발 : 신뢰도와 타당화)

  • Seo, Mi-Kyoung;Rhee, MinKyu;Kim, Seung-Hyun;Cho, Sung-Nam;Ko, Young-hun;Lee, Hyuk;Lee, Moon-Soo
    • Korean Journal of Health Psychology
    • /
    • v.14 no.3
    • /
    • pp.579-596
    • /
    • 2009
  • This study aimed to develop the Korean tool of competency to consent to psychiatric treatment and to analyze the reliability and validity of this tool. Also the developed tool's efficiency in determining whether a patient possesses treatment consent competence was checked using the Receiver Operating Characteristic curve and the relevant indices. A total of 193 patients with mental illness, who were hospitalized in a mental hospital or were in community mental health center, participated in this study. We administered a questionnaire consisting of 14 questions concerning understanding, appreciation, reasoning ability, and expression of a choice to the subjects. To investigate the validity of the tool, we conducted the K-MMSE, insight test, estimated IQ, and BPRS. The tool's reliability and usefulness were examined via Cronbach's alpha, ICC, and ROC analysis, and criterion related validation was performed. This tool showed that internal consistency and agreement between raters was relatively high(ICC .80~.98, Cronbach's alpha .56~.83)and the confirmatory factor analysis for constructive validation showed that the tool was valid. Also, estimated IQ, and MMSE were significantly correlated to understanding, appreciation, expression of a choice, and reasoning ability. However, the BPRS did not show significant correlation with any subcompetences. In ROC analysis, full scale cutoff score 18.5 was suggested. Subscale cutoff scores were understanding 4.5, appreciation 8.5, reasoning ability 3.5, and expression of a choice 0.5. These results suggest that this assessment tool is reliable, valid and efficient diagnostically. Finally, limitations and implications of this study were discussed.

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF