• Title/Summary/Keyword: Evaluation of Collection

Search Result 958, Processing Time 0.028 seconds

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.

Legal Issues on the Collection and Utilization of Infectious Disease Data in the Infectious Disease Crisis (감염병 위기 상황에서 감염병 데이터의 수집 및 활용에 관한 법적 쟁점 -미국 감염병 데이터 수집 및 활용 절차를 참조 사례로 하여-)

  • Kim, Jae Sun
    • The Korean Society of Law and Medicine
    • /
    • v.23 no.4
    • /
    • pp.29-74
    • /
    • 2022
  • As social disasters occur under the Disaster Management Act, which can damage the people's "life, body, and property" due to the rapid spread and spread of unexpected COVID-19 infectious diseases in 2020, information collected through inspection and reporting of infectious disease pathogens (Article 11), epidemiological investigation (Article 18), epidemiological investigation for vaccination (Article 29), artificial technology, and prevention policy Decision), (3) It was used as an important basis for decision-making in the context of an infectious disease crisis, such as promoting vaccination and understanding the current status of damage. In addition, medical policy decisions using infectious disease data contribute to quarantine policy decisions, information provision, drug development, and research technology development, and interest in the legal scope and limitations of using infectious disease data has increased worldwide. The use of infectious disease data can be classified for the purpose of spreading and blocking infectious diseases, prevention, management, and treatment of infectious diseases, and the use of information will be more widely made in the context of an infectious disease crisis. In particular, as the serious stage of the Disaster Management Act continues, the processing of personal identification information and sensitive information becomes an important issue. Information on "medical records, vaccination drugs, vaccination, underlying diseases, health rankings, long-term care recognition grades, pregnancy, etc." needs to be interpreted. In the case of "prevention, management, and treatment of infectious diseases", it is difficult to clearly define the concept of medical practicesThe types of actions are judged based on "legislative purposes, academic principles, expertise, and social norms," but the balance of legal interests should be based on the need for data use in quarantine policies and urgent judgment in public health crises. Specifically, the speed and degree of transmission of infectious diseases in a crisis, whether the purpose can be achieved without processing sensitive information, whether it unfairly violates the interests of third parties or information subjects, and the effectiveness of introducing quarantine policies through processing sensitive information can be used as major evaluation factors. On the other hand, the collection, provision, and use of infectious disease data for research purposes will be used through pseudonym processing under the Personal Information Protection Act, consent under the Bioethics Act and deliberation by the Institutional Bioethics Committee, and data provision deliberation committee. Therefore, the use of research purposes is recognized as long as procedural validity is secured as it is reviewed by the pseudonym processing and data review committee, the consent of the information subject, and the institutional bioethics review committee. However, the burden on research managers should be reduced by clarifying the pseudonymization or anonymization procedures, the introduction or consent procedures of the comprehensive consent system and the opt-out system should be clearly prepared, and the procedure for re-identifying or securing security that may arise from technological development should be clearly defined.

Variation of Hospital Costs and Product Heterogeneity

  • Shin, Young-Soo
    • Journal of Preventive Medicine and Public Health
    • /
    • v.11 no.1
    • /
    • pp.123-127
    • /
    • 1978
  • The major objective of this research is to identify those hospital characteristics that best explain cost variation among hospitals and to formulate linear models that can predict hospital costs. Specific emphasis is placed on hospital output, that is, the identification of diagnosis related patient groups (DRGs) which are medically meaningful and demonstrate similar patterns of hospital resource consumption. A casemix index is developed based on the DRGs identified. Considering the common problems encountered in previous hospital cost research, the following study requirements are estab-lished for fulfilling the objectives of this research: 1. Selection of hospitals that exercise similar medical and fiscal practices. 2. Identification of an appropriate data collection mechanism in which demographic and medical characteristics of individual patients as well as accurate and comparable cost information can be derived. 3. Development of a patient classification system in which all the patients treated in hospitals are able to be split into mutually exclusive categories with consistent and stable patterns of resource consumption. 4. Development of a cost finding mechanism through which patient groups' costs can be made comparable across hospitals. A data set of Medicare patients prepared by the Social Security Administration was selected for the study analysis. The data set contained 27,229 record abstracts of Medicare patients discharged from all but one short-term general hospital in Connecticut during the period from January 1, 1971, to December 31, 1972. Each record abstract contained demographic and diagnostic information, as well as charges for specific medical services received. The 'AUT-OGRP System' was used to generate 198 DRGs in which the entire range of Medicare patients were split into mutually exclusive categories, each of which shows a consistent and stable pattern of resource consumption. The 'Departmental Method' was used to generate cost information for the groups of Medicare patients that would be comparable across hospitals. To fulfill the study objectives, an extensive analysis was conducted in the following areas: 1. Analysis of DRGs: in which the level of resource use of each DRG was determined, the length of stay or death rate of each DRG in relation to resource use was characterized, and underlying patterns of the relationships among DRG costs were explained. 2. Exploration of resource use profiles of hospitals; in which the magnitude of differences in the resource uses or death rates incurred in the treatment of Medicare patients among the study hospitals was explored. 3. Casemix analysis; in which four types of casemix-related indices were generated, and the significance of these indices in the explanation of hospital costs was examined. 4. Formulation of linear models to predict hospital costs of Medicare patients; in which nine independent variables (i. e., casemix index, hospital size, complexity of service, teaching activity, location, casemix-adjusted death. rate index, occupancy rate, and casemix-adjusted length of stay index) were used for determining factors in hospital costs. Results from the study analysis indicated that: 1. The system of 198 DRGs for Medicare patient classification was demonstrated not only as a strong tool for determining the pattern of hospital resource utilization of Medicare patients, but also for categorizing patients by their severity of illness. 2. The wei틴fed mean total case cost (TOTC) of the study hospitals for Medicare patients during the study years was $11,27.02 with a standard deviation of $117.20. The hospital with the highest average TOTC ($1538.15) was 2.08 times more expensive than the hospital with the lowest average TOTC ($743.45). The weighted mean per diem total cost (DTOC) of the study hospitals for Medicare patients during the sutdy years was $107.98 with a standard deviation of $15.18. The hospital with the highest average DTOC ($147.23) was 1.87 times more expensive than the hospital with the lowest average DTOC ($78.49). 3. The linear models for each of the six types of hospital costs were formulated using the casemix index and the eight other hospital variables as the determinants. These models explained variance to the extent of 68.7 percent of total case cost (TOTC), 63.5 percent of room and board cost (RMC), 66.2 percent of total ancillary service cost (TANC), 66.3 percent of per diem total cost (DTOC), 56.9 percent of per diem room and board cost (DRMC), and 65.5 percent of per diem ancillary service cost (DTANC). The casemix index alone explained approximately one half of interhospital cost variation: 59.1 percent for TOTC and 44.3 percent for DTOC. Thsee results demonstrate that the casemix index is the most importand determinant of interhospital cost variation Future research and policy implications in regard to the results of this study is envisioned in the following three areas: 1. Utilization of casemix related indices in the Medicare data systems. 2. Refinement of data for hospital cost evaluation. 3. Development of a system for reimbursement and cost control in hospitals.

  • PDF

Relationship of Maternal Perception of the Infant Temperament and Confidence and Satisfaction of Maternal Role (어머니가 지각한 영아기질과 어머니 역할수행에 대한 자신감 및 만족도의 관계)

  • Lee Young-Eun;Kang Yang-Hee;Park Hae-Sun;Hwang Eun-Ju;Mun Mi-Young
    • Child Health Nursing Research
    • /
    • v.9 no.2
    • /
    • pp.206-220
    • /
    • 2003
  • Purpose: this study was intended to search the relationship between perception of the infant temperament in mother of infant at the age of 1~12 months and maternal confidence and satisfaction in performing maternal role, and to submit a basic data to establish a nursing intervention program which is helpful for determination of infant development and performing maternal role promotion by identify variables associated with infant temperament. Method: The subjects of this study were 300 mothers of infant at the age of 1~12 months who visited well baby clinic in 4 hospitals in Busan city and Kyoung-Nam province. Final analysis was performed in 293 cases. Seven cases was excluded in this study because of its inappropriate data collection. The data was collected from 1st July to 15th August 2002. The questionaries which were fill-up by mother were collected. Infant temperament was measured by using the tool of 'what my baby is like'(WBL) which was developed by Priham et. al.(1994) and translated by Bang(1999). The scale of postpartum self evaluation which was developed by Lederman et al(1981) and translated by Lee(1992) was used for the confidence and satisfaction of maternal role. All statistical analyses were performed using SPSS-PC for window, version 10.0: frequency, percentage, minimum, maximum, mean, SD, t-test, ANOVA, Post-hoc test(Scheffe's test), Pearson Correlation Coefficients. Result: The mean score of maternal perception of the infant temperament was 6.17±1.04, and mother recognized her infant as positive. The mean score of confidence of maternal role was 2.89± .41 and this revealed in an average level. The mean score of satisfaction of maternal role was 3.29± .51 and this revealed in a higher level. There was a weak significant positive correlation between the score of maternal perception of infant temperament and confidence of maternal role(r=0.176, P= .003), but there was no significant correlation between satisfaction of maternal role(P> .05). It revealed the more maternal perception of the infant temperament as positive, the higher confidence of maternal role. There was a moderate significant positive correlation between confidence of maternal role and satisfaction of maternal role(r=0.410, P= .000). It revealed the more confidence of maternal role, the higher satisfaction of maternal role. The variables related with the score of maternal perception of infant temperament were the type of delivery (t=-2.600, P= .010), experience of learning baby care(t=2.382, P= .018), maternal perception on baby's health status(F=3.467, P= .033), maternal perception on her health status(F=3.467, P= .027), baby's age(F=3.080, P= .028). Conclusion: Our result showed the confidence of maternal role was increased as the maternal perception of infant temperament was positive, and conformed that the confidence of maternal role was also related with satisfaction of maternal role. Prenatal education, type of delivery, baby's age were also related with the maternal perception of infant temperament. So, nursing intervention program of developmental stage maybe necessary in order to help maternal perception of infant temperament as positive, and it will be increased the confidence of maternal role and satisfaction of performing maternal role which was considered as real indicate of achievement of maternal role.

  • PDF

DEVELOPMENT OF SAFETY-BASED LEVEL-OF-SERVICE CRITERIA FOR ISOLATED SIGNALIZED INTERSECTIONS (독립신호 교차로에서의 교통안전을 위한 서비스수준 결정방법의 개발)

  • Dr. Tae-Jun Ha
    • Proceedings of the KOR-KST Conference
    • /
    • 1995.02a
    • /
    • pp.3-32
    • /
    • 1995
  • The Highway Capacity Manual specifies procedures for evaluating intersection performance in terms of delay per vehicle. What is lacking in the current methodology is a comparable quantitative procedure for ass~ssing the safety-based level of service provided to motorists. The objective of the research described herein was to develop a computational procedure for evaluating the safety-based level of service of signalized intersections based on the relative hazard of alternative intersection designs and signal timing plans. Conflict opportunity models were developed for those crossing, diverging, and stopping maneuvers which are associated with left-turn and rear-end accidents. Safety¬based level-of-service criteria were then developed based on the distribution of conflict opportunities computed from the developed models. A case study evaluation of the level of service analysis methodology revealed that the developed safety-based criteria were not as sensitive to changes in prevailing traffic, roadway, and signal timing conditions as the traditional delay-based measure. However, the methodology did permit a quantitative assessment of the trade-off between delay reduction and safety improvement. The Highway Capacity Manual (HCM) specifies procedures for evaluating intersection performance in terms of a wide variety of prevailing conditions such as traffic composition, intersection geometry, traffic volumes, and signal timing (1). At the present time, however, performance is only measured in terms of delay per vehicle. This is a parameter which is widely accepted as a meaningful and useful indicator of the efficiency with which an intersection is serving traffic needs. What is lacking in the current methodology is a comparable quantitative procedure for assessing the safety-based level of service provided to motorists. For example, it is well¬known that the change from permissive to protected left-turn phasing can reduce left-turn accident frequency. However, the HCM only permits a quantitative assessment of the impact of this alternative phasing arrangement on vehicle delay. It is left to the engineer or planner to subjectively judge the level of safety benefits, and to evaluate the trade-off between the efficiency and safety consequences of the alternative phasing plans. Numerous examples of other geometric design and signal timing improvements could also be given. At present, the principal methods available to the practitioner for evaluating the relative safety at signalized intersections are: a) the application of engineering judgement, b) accident analyses, and c) traffic conflicts analysis. Reliance on engineering judgement has obvious limitations, especially when placed in the context of the elaborate HCM procedures for calculating delay. Accident analyses generally require some type of before-after comparison, either for the case study intersection or for a large set of similar intersections. In e.ither situation, there are problems associated with compensating for regression-to-the-mean phenomena (2), as well as obtaining an adequate sample size. Research has also pointed to potential bias caused by the way in which exposure to accidents is measured (3, 4). Because of the problems associated with traditional accident analyses, some have promoted the use of tqe traffic conflicts technique (5). However, this procedure also has shortcomings in that it.requires extensive field data collection and trained observers to identify the different types of conflicts occurring in the field. The objective of the research described herein was to develop a computational procedure for evaluating the safety-based level of service of signalized intersections that would be compatible and consistent with that presently found in the HCM for evaluating efficiency-based level of service as measured by delay per vehicle (6). The intent was not to develop a new set of accident prediction models, but to design a methodology to quantitatively predict the relative hazard of alternative intersection designs and signal timing plans.

  • PDF

Herbal Medicine for the Treatment of Rosacea: A Systematic Review and Meta-analysis of Randomized Controlled Trials (주사(Rosacea)의 한약 치료에 대한 체계적 문헌고찰 및 메타분석)

  • Kang, Eun-Jeong;Kam, Eun-Young;Kim, Seo-Hee;Yoon, Seok-Yeong;Jeon, Seok-Hee;Choi, Jung-Wha;Kim, Jong-Han;Park, Soo-Yeon;Jung, Min-Yeong
    • The Journal of Korean Medicine Ophthalmology and Otolaryngology and Dermatology
    • /
    • v.34 no.3
    • /
    • pp.27-54
    • /
    • 2021
  • Objectives : This review was conducted to validate the effectiveness and safety of herbal medicine combined with conventional therapy for rosacea. Methods : Randomized controlled trials(RCTs) reporting the effects of herbal medicine treatment on rosacea were searched through eight electronic databases from 2016 to March 17, 2020. This study collection and data extraction were performed by two independent reviews. The Cochrane risk-of-bias tool was used for the evaluation of the risk of bias in all included RCTs. Mean differences(MD) and Risk ratio(RR) of 95% Confidence intervals(Cls) were calculated and data synthesis was conducted using Review Manager(RevMan, ver.5.4) Results : Eighteen RCTs were included and all trials compared the combined therapy of herbal medicine with conventional western therapy to conventional therapy alone. The effective rate of the combination of herbal medicine with western medicine(RR 1.20, 95% CI : 1.13-1.28, p<0.00001, I2=0%), the effective rate of the combination of herbal medicine with laser-based therapy(RR 1.12, 95% CI : 1.04-1.21, p=0.004, I2=18%) and the effective rate of the combination treatment group using herbal medicine, western medicine and external drugs were all statistically higher that of the control group(RR 1.19, 95% CI : 1.11-1.28, p<0.00001, I2=0%). The score of non transient erythema(MD -0.36, 95% CI : -1.01 0.29, p=0.27, I2=93%), flushing(MD -0.69, 95% CI : -0.97, 0.41, p<0.00001, I2=32%), papules or pustules(MD 0.10, 95% CI : -0.15, 0.35 p=0.44, I2=0%) were also seen in the herbal medicine and western medicine combination group. The overall risk of bias of the included studies was some concerns. No serious adverse effects were observed. Conclusions : This review found the safety and effectiveness of the combined therapy of herbal medicine with conventional western therapy for rosacea.

A PLS Path Modeling Approach on the Cause-and-Effect Relationships among BSC Critical Success Factors for IT Organizations (PLS 경로모형을 이용한 IT 조직의 BSC 성공요인간의 인과관계 분석)

  • Lee, Jung-Hoon;Shin, Taek-Soo;Lim, Jong-Ho
    • Asia pacific journal of information systems
    • /
    • v.17 no.4
    • /
    • pp.207-228
    • /
    • 2007
  • Measuring Information Technology(IT) organizations' activities have been limited to mainly measure financial indicators for a long time. However, according to the multifarious functions of Information System, a number of researches have been done for the new trends on measurement methodologies that come with financial measurement as well as new measurement methods. Especially, the researches on IT Balanced Scorecard(BSC), concept from BSC measuring IT activities have been done as well in recent years. BSC provides more advantages than only integration of non-financial measures in a performance measurement system. The core of BSC rests on the cause-and-effect relationships between measures to allow prediction of value chain performance measures to allow prediction of value chain performance measures, communication, and realization of the corporate strategy and incentive controlled actions. More recently, BSC proponents have focused on the need to tie measures together into a causal chain of performance, and to test the validity of these hypothesized effects to guide the development of strategy. Kaplan and Norton[2001] argue that one of the primary benefits of the balanced scorecard is its use in gauging the success of strategy. Norreklit[2000] insist that the cause-and-effect chain is central to the balanced scorecard. The cause-and-effect chain is also central to the IT BSC. However, prior researches on relationship between information system and enterprise strategies as well as connection between various IT performance measurement indicators are not so much studied. Ittner et al.[2003] report that 77% of all surveyed companies with an implemented BSC place no or only little interest on soundly modeled cause-and-effect relationships despite of the importance of cause-and-effect chains as an integral part of BSC. This shortcoming can be explained with one theoretical and one practical reason[Blumenberg and Hinz, 2006]. From a theoretical point of view, causalities within the BSC method and their application are only vaguely described by Kaplan and Norton. From a practical consideration, modeling corporate causalities is a complex task due to tedious data acquisition and following reliability maintenance. However, cause-and effect relationships are an essential part of BSCs because they differentiate performance measurement systems like BSCs from simple key performance indicator(KPI) lists. KPI lists present an ad-hoc collection of measures to managers but do not allow for a comprehensive view on corporate performance. Instead, performance measurement system like BSCs tries to model the relationships of the underlying value chain in cause-and-effect relationships. Therefore, to overcome the deficiencies of causal modeling in IT BSC, sound and robust causal modeling approaches are required in theory as well as in practice for offering a solution. The propose of this study is to suggest critical success factors(CSFs) and KPIs for measuring performance for IT organizations and empirically validate the casual relationships between those CSFs. For this purpose, we define four perspectives of BSC for IT organizations according to Van Grembergen's study[2000] as follows. The Future Orientation perspective represents the human and technology resources needed by IT to deliver its services. The Operational Excellence perspective represents the IT processes employed to develop and deliver the applications. The User Orientation perspective represents the user evaluation of IT. The Business Contribution perspective captures the business value of the IT investments. Each of these perspectives has to be translated into corresponding metrics and measures that assess the current situations. This study suggests 12 CSFs for IT BSC based on the previous IT BSC's studies and COBIT 4.1. These CSFs consist of 51 KPIs. We defines the cause-and-effect relationships among BSC CSFs for IT Organizations as follows. The Future Orientation perspective will have positive effects on the Operational Excellence perspective. Then the Operational Excellence perspective will have positive effects on the User Orientation perspective. Finally, the User Orientation perspective will have positive effects on the Business Contribution perspective. This research tests the validity of these hypothesized casual effects and the sub-hypothesized causal relationships. For the purpose, we used the Partial Least Squares approach to Structural Equation Modeling(or PLS Path Modeling) for analyzing multiple IT BSC CSFs. The PLS path modeling has special abilities that make it more appropriate than other techniques, such as multiple regression and LISREL, when analyzing small sample sizes. Recently the use of PLS path modeling has been gaining interests and use among IS researchers in recent years because of its ability to model latent constructs under conditions of nonormality and with small to medium sample sizes(Chin et al., 2003). The empirical results of our study using PLS path modeling show that the casual effects in IT BSC significantly exist partially in our hypotheses.

"Critical Application of Witness Commentaries: The Case of Guerrilla Warfare in the Korean War" ("증언자료의 비판적 활용 - 6.25전쟁 시기 유격대의 경우")

  • Cho, Sung Hun
    • The Korean Journal of Archival Studies
    • /
    • no.12
    • /
    • pp.137-178
    • /
    • 2005
  • The anticommunist guerrillas' activities that aretheconcern of this article took place largely in North Korea or behind the enemy-held lines. Verifying their history is accordingly difficult and requires careful attention, but despite their active operations the military as well as the scholarly community have been lax in studying them. The Korean War came to be perceived as a traditional, limited war with regular battles, so that the studies addressed mostly the regular operations, and guerrilla warfare is remembered as an almost 'exclusive property' of the communist invaders; a small wonder that the anticommunist guerrillas have not been studied much and the collection of materials neglected. Therefore, in contrast with the witness accounts concerning regular battles, witness resources were of a small volume about these "patriots without the service numbers." For the above reasons the guerrilla participants and their later-organized fellowships took to the task of leaving records and compiling the histories of their units. They became active preservers of history in order to inform later generations of their works and also to secure deserved benefits from the government, in a world where none recognized their achievements. For instance, 4th Donkey Unit published witness accounts in addition to a unit history, and left video-recordings of guerrilla witnesses before any institute systematized the oral history of the guerrillas. In the case of Kyulsa ("Resolved to Die") Guerrilla Unit, the unit history was 10 times revised and expanded upon for publication, contributing substantially to the recovery of anticommunist guerrilla history which had almost totally lacked documented resources. Now because the guerrilla-related witness accounts were produced through fellowship societies and not individually, it often took the form of 'collective memory.' As a result, though thousands of former guerrillas remain surviving, the scarcity of numerous versions of, or perspectives upon, an event renders difficult an objective approach to the historical truth. Even requests to verify the service of a guerrilla member or to apply for decoration or government benefits for those killed in action, the process is taken care of not at the hands of the first party but the veteran society, so that a variety of opinions are not available for consideration. Moreover, some accounts were taken by American military personnel, and since some historians, unaware of official documents or evaluation of achievements, tended to center the records around their own units and especially to exaggerate the units' performances, they often featured factual errors. Thefollowing is the means to utilize positively the aforementioned type of witness accounts in military history research. It involves the active use of military historical detachments (MHD). As in the examples of those dispatched by the American forces during the Korean War, experts should be dispatched during, and not just after, wartimes. By considering and investigating the differences among various perspectives on the same historical event, even without extra documented resources it is possibleto arrive at theerrors or questionable points of the oral accounts, supplementing the additional accounts. Therefore any time lapses between witness accounts must be kept in consideration. Moreover when the oral accounts come from a group such as participants in the same guerrilla unit or operation, a standardized list of items ought to be put to use. Education in oral history is necessary not just for the training of experts. In America wherethefield sees much activity, it is used not only in college or graduate programs but also in elementary and lifetime educational processes. In comparison in our nation, and especially in historical disciplines, methodological insistence upon documented evidences prevails in the main, and in the fields of nationalist movement or modern history, oral accounts do not receive adequate attention. Like ancient documents and monuments, oral history also needs to be made a regular part of diverse resource materials at our academic institutes for history. Courses in memory and history, such as those in American colleges, are available possibilities.

The Survey on Actual Condition Depending on Type of Degraded area and Suggestion for Restoration Species Based on Vegetation Information in the Mt. Jirisan Section of Baekdudaegan (식생정보에 기초한 백두대간 지리산권역 내 훼손지 유형별 실태조사)

  • Lee, Hye-Jeong;Kim, Ju-Young;Nam, Kyeong-Bae;An, Ji-Hong
    • Korean Journal of Environment and Ecology
    • /
    • v.34 no.6
    • /
    • pp.558-572
    • /
    • 2020
  • The purpose of this study was to classify the types of degraded areas of Mt. Jirisan section in Baekdudaegan and survey the actual condition of each damage type to use it as basic data for the direction of the restoration of damaged areas according to damage type based on the vegetation information of reference ecosystem. The analysis of the Mt. Jirisan section's actual degraded conditions showed that the total number of patches of degraded areas was 57, and the number of patches and size of degraded areas was higher at the low average altitude and gentle slope. Grasslands (deserted lands) and cultivated areas accounted for a high portion of the damage types, indicating that agricultural land use was a major damage factor. The survey on the conditions of 14 degraded areas showed that the types of damage were classified into the grassland, cultivated area, restoration area, logged-off land, and bare ground. The analysis of the degree of disturbance (the ratio of annual and biennial herb, urbanized index, and disturbance index) by each type showed that the simple single-layer vegetation structure mostly composed of the herbaceous and the degree of disturbance were high in the grassland and cultivated land. The double-layer vegetation structure appeared in the restoration area where the pine seedlings were planted, and the inflow of naturalized plants was especially high compared to other degraded areas due to disturbances caused by the restoration project and the nearby hiking trails. Although the inflow of naturalized plants was low because of high altitude in bare ground, the proportion of annual and biennial herb was high, indicating that all surveyed degraded areas were in early succession stages. The stand ordination by type of damage showed the restoration area on the I-axis, cultivated area, grassland, logged-off land, and bare ground in that order, indicating the arrangement by the damage type. Moreover, the stand ordination of the degraded areas and reference ecosystem based on floristic variation showed a clear difference in species composition. This study diagnosed the status of each damage type based on the reference ecosystem information according to the ecological restoration procedure and confirmed the difference in species composition between the diagnosis result and the reference ecosystem. These findings can be useful basic data for establishing the restoration goal and direction in the future.

Ex vivo Morphometric Analysis of Coronary Stent using Micro-Computed Tomography (미세단층촬영기법을 이용한 관상동맥 스텐트의 동물 모델 분석)

  • Bae, In-Ho;Koh, Jeong-Tae;Lim, Kyung-Seob;Park, Dae-Sung;Kim, Jong-Min;Jeong, Myung-Ho
    • Journal of the Korean Society of Radiology
    • /
    • v.6 no.2
    • /
    • pp.93-98
    • /
    • 2012
  • Micro-computed tomography (microCT) is an important tool for preclinical vascular imaging, with micron-level resolution. This non-destructive means of imaging allows for rapid collection of 2D and 3D reconstructions to visualize specimens prior to destructive analysis such as pathological analysis. Objectives. The aim of this study was to suggest a method for ex vivo, postmortem examination of stented arterial segments with microCT. And ex vivo evaluation of stents such as bare metal or drug eluting stents on in-stent restenosis (ISR) in rabbit model was performed. The bare metal stent (BMS) and drug eluting stent (DES, paclitaxel) were implanted in the left or right iliac arteries alternatively in eight New Zealand white rabbits. After 4 weeks of post-implantation, the part of iliac arteries surrounding the stent were removed carefully and processed for microCT. Prior to microCT analysis, a contrast medium was loaded to lumen of stents. All samples were subjected to an X-ray source operating at 50 kV and 200 ${\mu}A$ by using a 3D isotropic resolution. The region of interest was traced and measured by CTAN analytical software. Objects being exposed to radiation had different Hounsfield unit each other with values of approximately 1.2 at stent area, 0.12 ~ 0.17 at a contrast medium and 0 ~ 0.06 at outer area of stent. Based on above, further analyses were performed. As a result, the difference of lengths and volumes between expanded stents, which may relate to injury score in pathological analysis, was not different significantly. Moreover, ISR area of BMS was 1.6 times higher than that of DES, indicating that paclitaxel has inhibitory effect on cell proliferation and prevent infiltration of restenosis into lumen of stent. And ISR area of BMS was higher ($1.52{\pm}0.48mm^2$) than that of DES ($0.94{\pm}0.42mm^2$), indicating that paclitaxel has inhibitory effect on cell proliferation and prevent infiltration of restenosis into lumen of stent. Though it was not statistically significant, it showed that the extent of neointema of mid-region of stents was relatively higher than that of anterior and posterior region in parts of BMS as showing cross-sectional 2-D image. suggest that microCT can be utilized as an accessorial tool for pathological analysis.