• Title/Summary/Keyword: Privacy Knowledge

Search Result 159, Processing Time 0.028 seconds

Study of Patient Teaching in The Clinical Area (간호원의 환자교육 활동에 관한 연구)

  • 강규숙
    • Journal of Korean Academy of Nursing
    • /
    • v.2 no.1
    • /
    • pp.3-33
    • /
    • 1971
  • Nursing of today has as one of its objectives the solving of problems related to human needs arising from the demands of a rapidly changing society. This nursing objective, I believe, can he attained by the appropriate application of scientific principles in the giving of comprehensive nursing care. Comprehensive nursing care may be defined as nursing care which meets all of the patient's needs. the needs of patients are said to fall into five broad categories: physical needs, psychological needs, environmental needs, socio-economic needs, and teaching needs. Most people who become ill have adjustment problems related to their new situation. Because patient teaching is one of the most important functions of professional nursing, the success of this teaching may be used as a gauge for evaluating comprehensive nursing care. This represents a challenge foe the future. A questionnaire consisting of 67 items was distributed to 200 professional nurses working ill direct patient care at Yonsei University Medical Center in Seoul, Korea. 160 (80,0%) nurses of the total sample returned completed questionnaires 81 (50.6%) nurses were graduates of 3 fear diploma courser 79 (49.4%) nurses were graduates of 4 year collegiate nursing schools in Korea 141 (88,1%) nurses had under 5 years of clinical experience in a medical center, while 19 (11.9%) nurses had more than 5years of clinical experience. Three hypotheses were tested: 1. “Nurses had high levels of concept and knowledge toward patient teaching”-This was demonstrated by the use of a statistical method, the mean average. 2. “Nurses graduating from collegiate programs and diploma school programs of nursing show differences in concepts and knowledge toward patient teaching”-This was demonstrated by a statistical method, the mean average, although the results showed little difference between the two groups. 3. “Nurses having different amounts of clinical experience showed differences in concepts and knowledge toward patient teaching”-This was demonstrated by the use of a statistical method, the mean average. 2. “Nurses graduating from collegiate programs and diploma school programs of nursing show differences in concepts and knowledge toward patient teaching”-This was demonstrated by a statistical method, the mean average, although the results showed little difference between the two groups. 3. “Nurses having different amounts of clinical experience showed differences in concepts and knowledge toward patient teaching”-This was demonstrated by the use of the T-test. Conclusions of this study are as follow: Before attempting the explanation, of the results, the questionnaire will he explained. The questionnaire contained 67 questions divided into 9 sections. These sections were: concept, content, time, prior preparation, method, purpose, condition, evaluation, and recommendations for patient teaching. 1. The nurse's concept of patient teaching: Most of the nurses had high levels of concepts and knowledge toward patient teaching. Though nursing service was task-centered at the turn of the century, the emphasis today is put on patient-centered nursing. But we find some of the nurses (39.4%) still are task-centered. After, patient teaching, only a few of the nurses (14.4%) checked this as “normal teaching.”It seems therefore that patient teaching is often done unconsciously. Accordingly it would he desirable to have correct concepts and knowledge of teaching taught in schools of nursing. 2. Contents of patient teaching: Most nurses (97.5%) had good information about content of patient teaching. They teach their patients during admission about their diseases, tests, treatments, and before discharge give nurses instruction about simple nursing care, personal hygiene, special diets, rest and sleep, elimination etc. 3. Time of patient teaching: Teaching can be accomplished even if there is no time set aside specifically for it. -a large part of the nurse's teaching can be done while she is giving nursing care. If she believes she has to wait for time free from other activities, she may miss many teaching opportunities. But generally proper time for patient teaching is in the midmorning or midafternoon since one and a half or two hours required. Nurses meet their patients in all stages of health: often tile patient is in a condition in which learning is impossible-pain, mental confusion, debilitation, loss of sensory perception, fear and anxiety-any of these conditions may preclude the possibility of successful teaching. 4. Prior preparation for patient teaching: The teaching aids, nurses use are charts (53.1%), periodicals (23.8%), and books (7.0%) Some of the respondents (28.1%) reported that they had had good preparation for the teaching which they were doing, others (27.5%) reported adequate preparation, and others (43.8%) reported that their preparation for teaching was inadequate. If nurses have advance preparation for normal teaching and are aware of their objectives in teaching patients, they can do effective teaching. 5. Method of patient teaching: The methods of individual patient teaching, the nurses in this study used, were conversation (55.6%) and individual discussion (19.2%) . And the methods of group patient teaching they used were demonstration (42.3%) and lecture (26.2%) They should also he prepared to use pamphlet and simple audio-visual aids for their teaching. 6. Purposes of patient teaching: The purposes of patient teaching is to help the patient recover completely, but the majority of the respondents (40.6%) don't know this. So it is necessary for them to understand correctly the purpose of patient teaching and nursing care. 7. Condition of patient teaching: The majority of respondents (75.0%) reported there were some troubles in teaching uncooperative patients. It would seem that the nurse's leaching would be improved if, in her preparation, she was given a better understanding of the patient and communication skills. The majority of respondents in the total group, felt teaching is their responsibility and they should teach their patient's family as well as the patient. The place for teaching is most often at the patient's bedside (95.6%) but the conference room (3.1%) is also used. It is important that privacy be provided in learning situations with involve personal matters. 8. Evaluation of patient teaching: The majority of respondents (76.3%,) felt leaching is a highly systematic and organized function requiring special preparation in a college or university, they have the idea that teaching is a continuous and ever-present activity of all people throughout their lives. The suggestion mentioned the most frequently for improving preparation was a course in patient teaching included in the basic nursing program. 9. Recommendations: 1) It is recommended, that in clinical nursing, patient teaching be emphasized. 2) It is recommended, that insertive education the concepts and purposes of patient teaching he renewed for all nurses. In addition to this new knowledge, methods and materials which can be applied to patient teaching should be given also. 3) It is recommended, in group patient teaching, we try to embark on team teaching.

  • PDF

Research Trends of Health Recommender Systems (HRS): Applying Citation Network Analysis and GraphSAGE (건강추천시스템(HRS) 연구 동향: 인용네트워크 분석과 GraphSAGE를 활용하여)

  • Haryeom Jang;Jeesoo You;Sung-Byung Yang
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.2
    • /
    • pp.57-84
    • /
    • 2023
  • With the development of information and communications technology (ICT) and big data technology, anyone can easily obtain and utilize vast amounts of data through the Internet. Therefore, the capability of selecting high-quality data from a large amount of information is becoming more important than the capability of just collecting them. This trend continues in academia; literature reviews, such as systematic and non-systematic reviews, have been conducted in various research fields to construct a healthy knowledge structure by selecting high-quality research from accumulated research materials. Meanwhile, after the COVID-19 pandemic, remote healthcare services, which have not been agreed upon, are allowed to a limited extent, and new healthcare services such as health recommender systems (HRS) equipped with artificial intelligence (AI) and big data technologies are in the spotlight. Although, in practice, HRS are considered one of the most important technologies to lead the future healthcare industry, literature review on HRS is relatively rare compared to other fields. In addition, although HRS are fields of convergence with a strong interdisciplinary nature, prior literature review studies have mainly applied either systematic or non-systematic review methods; hence, there are limitations in analyzing interactions or dynamic relationships with other research fields. Therefore, in this study, the overall network structure of HRS and surrounding research fields were identified using citation network analysis (CNA). Additionally, in this process, in order to address the problem that the latest papers are underestimated in their citation relationships, the GraphSAGE algorithm was applied. As a result, this study identified 'recommender system', 'wireless & IoT', 'computer vision', and 'text mining' as increasingly important research fields related to HRS research, and confirmed that 'personalization' and 'privacy' are emerging issues in HRS research. The study findings would provide both academic and practical insights into identifying the structure of the HRS research community, examining related research trends, and designing future HRS research directions.

The effects of the degree of education related to information systems on online transaction intention and security concerns - Comparative analysis of the use of the Internet and smartphone (정보시스템 관련 교육의 정도가 보안 우려 및 온라인 거래 의도에 미치는 영향 - 인터넷 이용과 스마트 폰 이용의 비교 분석)

  • Jung, Seung-Min
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.8
    • /
    • pp.145-161
    • /
    • 2012
  • This study aims to explore how the degree of education related to information systems and the Internet literacy affect perceived security risk and how these three variables affect online transaction intention based on the Technology Acceptance Model (TAM). Since using smartphone to purchase necessary products is increasing, the study provided two different cases of using the existing Internet and smartphone to buy products. As a result of an empirical test, the degree of information system education, internet literacy, and perceived security risk had significant effects on online transaction intention mediating perceived usefulness and perceived ease of use. Unlike the expectation, the more people have education related to information systems, the more they have knowledge about hacking or cases of privacy infringement, leading to even more concerns about security, thereby believing the Internet transactions require much effort. The more the education about information system, the more we have concerns about security; therefore, perceived security risk have a positive(+) effect on perceived usefulness not a negative(-) effect. Lastly, while the degree of education related to information systems has relations with the recognition of the usefulness of the Internet transaction, the study showed that there are no relations of recognizing the usefulness and the ease of use of smartphone.

How Do People Evaluate a Web Site's Credibility (이용자들의 웹 사이트 신뢰성 평가 방법에 관한 연구)

  • Kim, Young-Ki
    • Journal of Korean Library and Information Science Society
    • /
    • v.38 no.3
    • /
    • pp.53-72
    • /
    • 2007
  • The Internet is now an integral part of the everyday lives of a majority of people. They are demanding web sites that offer credible information - Just as much as they want sites that are easy to navigate. But the online reality today is that few Internet users say they can trust the web sites that have products for sale or the sites that offer advice about which products and services to buy. Users want the web sites they visit to provide clear information to allow them to judge the site's credibility. Users want to know who runs the site; how to reach those people; the site's privacy policy; and how the site deals with mistakes. In the eyes of users all sites ate not equal. Users have different credibility standards for different types of sites. For news and information sites users want advertising clearly labeled as advertising. And users want the site to provide a list of the editors responsible for the site's contents, including the editor's email address. For e-commerce sites, user expectations and demands are just about as high as they can be. They say that it is very important that these sites provide specific, accurate information about the site's policies and practices.

  • PDF

Requirement for Amendment of the Law on the Phrase 'Instruction of Physicians or Dentists' in Medical Service Technologist, etc Act (의료기사 등에 관한 법률에서 '의사 또는 치과의사의 지도' 문구에 대한 법률 개정 요구도)

  • Lim, Woo-Taek;Lim, Cheong-Hwan;Joo, Young-Cheol;Hong, Dong-Hee;Jung, Hong-Ryang;Kim, Eun-Hye;Yoon, Yong-Su;Jung, Young-Jin;Choi, Ji-Won
    • Journal of radiological science and technology
    • /
    • v.44 no.5
    • /
    • pp.503-512
    • /
    • 2021
  • The purpose of this study is to check the extent to which "instruction of physician or dentist" defined in the Medical Service Technologists, etc. Act is applied in relation to radiography examination procedures for radiological technologists. In addition, it is intended to present basic data on the requirement to revise the Medical Service Technologists, etc. Act in the radiological technologist's duty area and scope of work, The subjects of this study were radiological technologists with license, and the response data were collected after sending the questionnaire link written on the online questionnaire form. The final number of respondents were 1,018, and the response rate was 6.8%. Most of the negative responses were "I have never received 'instruction' for radiologic examination by a physician or dentist, including a radiologist in a medical environment." There were a high perception that "the professionalism in radiation examination on radiological technologists are higher than that of a physician or dentist." They answered that the current continuing education has a great impact on maintaining and continuing professionalism and learning new knowledge in the radiology field. In addition, the radiological technologists provide a very high level of education in areas related to radiography procedure ethics such as patient care, patient safety, and patient privacy protection, as well as specialized fields such as radiation-related examination methods, radiography examination dose, and patient exposure dose. Radiological technologists replied that they were receiving it consistently. In conclusion, in the current medical environment, the 'instruction' of a physician or dentist cannot be seen as being realistically performed. The phrase 'instruction' of a physician or dentist as defined in the Medical Service Technologists, etc. Act is considered inappropriate in respect of the fact that the state recognizes the qualifications of the medical service technologist through a license. It is thought that revision to a new term suitable for the current medical environment is necessary.

A Study on the Method of Minimizing the Bit-Rate Overhead of H.264 Video when Encrypting the Region of Interest (관심영역 암호화 시 발생하는 H.264 영상의 비트레이트 오버헤드 최소화 방법 연구)

  • Son, Dongyeol;Kim, Jimin;Ji, Cheongmin;Kim, Kangseok;Kim, Kihyung;Hong, Manpyo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.311-326
    • /
    • 2018
  • This paper has experimented using News sample video with QCIF ($176{\times}144$) resolution in JM v10.2 code of H.264/AVC-MPEG. The region of interest (ROI) to be encrypted occurred the drift by unnecessarily referring to each frame continuously in accordance with the characteristics of the motion prediction and compensation of the H.264 standard. In order to mitigate the drift, the latest related research method of re-inserting encrypted I-picture into a certain period leads to an increase in the amount of additional computation that becomes the factor increasing the bit-rate overhead of the entire video. Therefore, the reference search range of the block and the frame in the ROI to be encrypted is restricted in the motion prediction and compensation for each frame, and the reference search range in the non-ROI not to be encrypted is not restricted to maintain the normal encoding efficiency. In this way, after encoding the video with restricted reference search range, this article proposes a method of RC4 bit-stream encryption for the ROI such as the face to be able to identify in order to protect personal information in the video. Also, it is compared and analyzed the experimental results after implementing the unencrypted original video, the latest related research method, and the proposed method in the condition of the same environment. In contrast to the latest related research method, the bit-rate overhead of the proposed method is 2.35% higher than that of the original video and 14.93% lower than that of the latest related method, while mitigating temporal drift through the proposed method. These improved results have verified by experiments of this study.

Usefulness of Data Mining in Criminal Investigation (데이터 마이닝의 범죄수사 적용 가능성)

  • Kim, Joon-Woo;Sohn, Joong-Kweon;Lee, Sang-Han
    • Journal of forensic and investigative science
    • /
    • v.1 no.2
    • /
    • pp.5-19
    • /
    • 2006
  • Data mining is an information extraction activity to discover hidden facts contained in databases. Using a combination of machine learning, statistical analysis, modeling techniques and database technology, data mining finds patterns and subtle relationships in data and infers rules that allow the prediction of future results. Typical applications include market segmentation, customer profiling, fraud detection, evaluation of retail promotions, and credit risk analysis. Law enforcement agencies deal with mass data to investigate the crime and its amount is increasing due to the development of processing the data by using computer. Now new challenge to discover knowledge in that data is confronted to us. It can be applied in criminal investigation to find offenders by analysis of complex and relational data structures and free texts using their criminal records or statement texts. This study was aimed to evaluate possibile application of data mining and its limitation in practical criminal investigation. Clustering of the criminal cases will be possible in habitual crimes such as fraud and burglary when using data mining to identify the crime pattern. Neural network modelling, one of tools in data mining, can be applied to differentiating suspect's photograph or handwriting with that of convict or criminal profiling. A case study of in practical insurance fraud showed that data mining was useful in organized crimes such as gang, terrorism and money laundering. But the products of data mining in criminal investigation should be cautious for evaluating because data mining just offer a clue instead of conclusion. The legal regulation is needed to control the abuse of law enforcement agencies and to protect personal privacy or human rights.

  • PDF

Real-time CRM Strategy of Big Data and Smart Offering System: KB Kookmin Card Case (KB국민카드의 빅데이터를 활용한 실시간 CRM 전략: 스마트 오퍼링 시스템)

  • Choi, Jaewon;Sohn, Bongjin;Lim, Hyuna
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.2
    • /
    • pp.1-23
    • /
    • 2019
  • Big data refers to data that is difficult to store, manage, and analyze by existing software. As the lifestyle changes of consumers increase the size and types of needs that consumers desire, they are investing a lot of time and money to understand the needs of consumers. Companies in various industries utilize Big Data to improve their products and services to meet their needs, analyze unstructured data, and respond to real-time responses to products and services. The financial industry operates a decision support system that uses financial data to develop financial products and manage customer risks. The use of big data by financial institutions can effectively create added value of the value chain, and it is possible to develop a more advanced customer relationship management strategy. Financial institutions can utilize the purchase data and unstructured data generated by the credit card, and it becomes possible to confirm and satisfy the customer's desire. CRM has a granular process that can be measured in real time as it grows with information knowledge systems. With the development of information service and CRM, the platform has change and it has become possible to meet consumer needs in various environments. Recently, as the needs of consumers have diversified, more companies are providing systematic marketing services using data mining and advanced CRM (Customer Relationship Management) techniques. KB Kookmin Card, which started as a credit card business in 1980, introduced early stabilization of processes and computer systems, and actively participated in introducing new technologies and systems. In 2011, the bank and credit card companies separated, leading the 'Hye-dam Card' and 'One Card' markets, which were deviated from the existing concept. In 2017, the total use of domestic credit cards and check cards grew by 5.6% year-on-year to 886 trillion won. In 2018, we received a long-term rating of AA + as a result of our credit card evaluation. We confirmed that our credit rating was at the top of the list through effective marketing strategies and services. At present, Kookmin Card emphasizes strategies to meet the individual needs of customers and to maximize the lifetime value of consumers by utilizing payment data of customers. KB Kookmin Card combines internal and external big data and conducts marketing in real time or builds a system for monitoring. KB Kookmin Card has built a marketing system that detects realtime behavior using big data such as visiting the homepage and purchasing history by using the customer card information. It is designed to enable customers to capture action events in real time and execute marketing by utilizing the stores, locations, amounts, usage pattern, etc. of the card transactions. We have created more than 280 different scenarios based on the customer's life cycle and are conducting marketing plans to accommodate various customer groups in real time. We operate a smart offering system, which is a highly efficient marketing management system that detects customers' card usage, customer behavior, and location information in real time, and provides further refinement services by combining with various apps. This study aims to identify the traditional CRM to the current CRM strategy through the process of changing the CRM strategy. Finally, I will confirm the current CRM strategy through KB Kookmin card's big data utilization strategy and marketing activities and propose a marketing plan for KB Kookmin card's future CRM strategy. KB Kookmin Card should invest in securing ICT technology and human resources, which are becoming more sophisticated for the success and continuous growth of smart offering system. It is necessary to establish a strategy for securing profit from a long-term perspective and systematically proceed. Especially, in the current situation where privacy violation and personal information leakage issues are being addressed, efforts should be made to induce customers' recognition of marketing using customer information and to form corporate image emphasizing security.

An Analysis of the Moderating Effects of User Ability on the Acceptance of an Internet Shopping Mall (인터넷 쇼핑몰 수용에 있어 사용자 능력의 조절효과 분석)

  • Suh, Kun-Soo
    • Asia pacific journal of information systems
    • /
    • v.18 no.4
    • /
    • pp.27-55
    • /
    • 2008
  • Due to the increasing and intensifying competition in the Internet shopping market, it has been recognized as very important to develop an effective policy and strategy for acquiring loyal customers. For this reason, web site designers need to know if a new Internet shopping mall(ISM) will be accepted. Researchers have been working on identifying factors for explaining and predicting user acceptance of an ISM. Some studies, however, revealed inconsistent findings on the antecedents of user acceptance of a website. Lack of consideration for individual differences in user ability is believed to be one of the key reasons for the mixed findings. The elaboration likelihood model (ELM) and several studies have suggested that individual differences in ability plays an moderating role on the relationship between the antecedents and user acceptance. Despite the critical role of user ability, little research has examined the role of user ability in the Internet shopping mall context. The purpose of this study is to develop a user acceptance model that consider the moderating role of user ability in the context of Internet shopping. This study was initiated to see the ability of the technology acceptance model(TAM) to explain the acceptance of a specific ISM. According to TAM. which is one of the most influential models for explaining user acceptance of IT, an intention to use IT is determined by usefulness and ease of use. Given that interaction between user and website takes place through web interface, the decisions to accept and continue using an ISM depend on these beliefs. However, TAM neglects to consider the fact that many users would not stick to an ISM until they trust it although they may think it useful and easy to use. The importance of trust for user acceptance of ISM has been raised by the relational views. The relational view emphasizes the trust-building process between the user and ISM, and user's trust on the website is a major determinant of user acceptance. The proposed model extends and integrates the TAM and relational views on user acceptance of ISM by incorporating usefulness, ease of use, and trust. User acceptance is defined as a user's intention to reuse a specific ISM. And user ability is introduced into the model as moderating variable. Here, the user ability is defined as a degree of experiences, knowledge and skills regarding Internet shopping sites. The research model proposes that the ease of use, usefulness and trust of ISM are key determinants of user acceptance. In addition, this paper hypothesizes that the effects of the antecedents(i.e., ease of use, usefulness, and trust) on user acceptance may differ among users. In particular, this paper proposes a moderating effect of a user's ability on the relationship between antecedents with user's intention to reuse. The research model with eleven hypotheses was derived and tested through a survey that involved 470 university students. For each research variable, this paper used measurement items recognized for reliability and widely used in previous research. We slightly modified some items proper to the research context. The reliability and validity of the research variables were tested using the Crobnach's alpha and internal consistency reliability (ICR) values, standard factor loadings of the confirmative factor analysis, and average variance extracted (AVE) values. A LISREL method was used to test the suitability of the research model and its relating six hypotheses. Key findings of the results are summarized in the following. First, TAM's two constructs, ease of use and usefulness directly affect user acceptance. In addition, ease of use indirectly influences user acceptance by affecting trust. This implies that users tend to trust a shopping site and visit repeatedly when they perceive a specific ISM easy to use. Accordingly, designing a shopping site that allows users to navigate with heuristic and minimal clicks for finding information and products within the site is important for improving the site's trust and acceptance. Usefulness, however, was not found to influence trust. Second, among the three belief constructs(ease of use, usefulness, and trust), trust was empirically supported as the most important determinants of user acceptance. This implies that users require trustworthiness from an Internet shopping site to be repeat visitors of an ISM. Providing a sense of safety and eliminating the anxiety of online shoppers in relation to privacy, security, delivery, and product returns are critically important conditions for acquiring repeat visitors. Hence, in addition to usefulness and ease of use as in TAM, trust should be a fundamental determinants of user acceptance in the context of internet shopping. Third, the user's ability on using an Internet shopping site played a moderating role. For users with low ability, ease of use was found to be a more important factors in deciding to reuse the shopping mall, whereas usefulness and trust had more effects on users with high ability. Applying the EML theory to these findings, we can suggest that experienced and knowledgeable ISM users tend to elaborate on such usefulness aspects as efficient and effective shopping performance and trust factors as ability, benevolence, integrity, and predictability of a shopping site before they become repeat visitors of the site. In contrast, novice users tend to rely on the low elaborating features, such as the perceived ease of use. The existence of moderating effects suggests the fact that different individuals evaluate an ISM from different perspectives. The expert users are more interested in the outcome of the visit(usefulness) and trustworthiness(trust) than those novice visitors. The latter evaluate the ISM in a more superficial manner focusing on the novelty of the site and on other instrumental beliefs(ease of use). This is consistent with the insights proposed by the Heuristic-Systematic model. According to the Heuristic-Systematic model. a users act on the principle of minimum effort. Thus, the user considers an ISM heuristically, focusing on those aspects that are easy to process and evaluate(ease of use). When the user has sufficient experience and skills, the user will change to systematic processing, where they will evaluate more complex aspects of the site(its usefulness and trustworthiness). This implies that an ISM has to provide a minimum level of ease of use to make it possible for a user to evaluate its usefulness and trustworthiness. Ease of use is a necessary but not sufficient condition for the acceptance and use of an ISM. Overall, the empirical results generally support the proposed model and identify the moderating effect of the effects of user ability. More detailed interpretations and implications of the findings are discussed. The limitations of this study are also discussed to provide directions for future research.