• Title/Summary/Keyword: Qualitative case Study

Search Result 1,160, Processing Time 0.864 seconds

Case Study on Expert-type Director of Presidential Security Service (전문형 대통령경호실장에 대한 사례연구)

  • Cho, Kwang-Rae
    • Korean Security Journal
    • /
    • no.37
    • /
    • pp.221-246
    • /
    • 2013
  • The purpose of this research is to analyze authority and expertise of internally-selected Director of Presidential Security Service (PSS) through case-studies of the 9th Director of PSS Sang-Bum Park and the 13th Director of PSS Sang-Kuk Yeom, and to provide suggestions as to how to improve the expertise of PSS director and how to make PSS more trusted by the president and citizens. To do so, this study employs qualitative research on various references while acquiring testimonies from an expert group. The result of the research is as follows. First, the 9th Director of PSS Sang-Bum Park and the 13th Director of PSS Sang-Kuk Yeom are categorized as non-authoritative Director of Presidential Security Service. Second the 9th Director of PSS Sang-Bum Park and the 13th Director of PSS Sang-Kuk Yeom are categorized as expert-type Director of Presidential Security Service. It must be acknowledged that the authority of PSS directors does not come from close relationship with president or physical distance, but from legality and professionalism. Therefore, when appointing a person who is in charge of his/her own safety, the president must consider national security and professionalism in order to succeed as a ready president.

  • PDF

Estimation of Safety in Railway Tunnel by Using Quantitative Risk Assessment (QRA를 이용한 철도터널 방재 안전성 평가)

  • Kim, Do-Sik;Kim, Do-Hyung;Kim, Woo-Sung;Lee, Du-Hwa;Lee, Ho-Seok
    • Tunnel and Underground Space
    • /
    • v.16 no.5 s.64
    • /
    • pp.357-367
    • /
    • 2006
  • Recently, as the construction of new railway and the relocation of existing line increase, tunnel structures grow longer. The railway fire accidents in long tunnel bring large damages of human life and disaster. The interest of safety in long tunnel have a growing and the safety standard of long tunnel is tightening. For that reason, at the planning of long tunnel, the optimum design of safety facility in long tunnel for minimizing the risks and satisfying the safety standard is needed. For the reasonable design of long railway tunnel considering high safety, qualitative estimation for tunnel safety is required. In this study, QRA (Quantitative Risk Assessment) technique is applied to design of long railway tunnel for assuring the safety function and estimating the risk of safety. The case study for safety design in long railway tunnel is tarried out to verifying the QRA technique for two railway tunnels. Thus, the inclined and vertical shaft for escape way and safety facilities in long tunnel are planned, and the risks of tunnel safety for each case are estimated quantitatively.

A Study on the Direction of Funeral service focused on Thick Data Analysis (Thick데이터 분석에 기반한 장례서비스 방향성 연구)

  • Ahn, Jinho;Lee, Jeungsun
    • Journal of Service Research and Studies
    • /
    • v.10 no.1
    • /
    • pp.85-96
    • /
    • 2020
  • In Asia, where the aging population is growing rapidly, as the funeral service industry develops and the market grows. The economic value and interest of funeral services is increasing. However, Korea's funeral services are being developed in a biased direction, focusing only on funeral services, after death. Compared to the case of advanced funeral services in the United States, the United Kingdom, and Japan, not only the funeral but also the care of the deceased's family and acquaintances around us are developing. It is appropriate to use a method based on ethnography and User eXperience. For this purpose, the method of collecting and analyzing the ethnography and user experience data of actual resident and visitor was deduced in persona method in the next ten years, and funeral service centered on resident and visitor. In this study, qualitative data centered on the future direction of funeral services, focusing on the resident (family) and the guest who are the principals of services from the perspective of service science. It is difficult to derive meaningful results from the process of collecting, processing, and interpreting big data in general, and in this case, the data analysis method is based on ethnography and user eXperience.) Is appropriate. For this purpose, the method of collecting and analyzing the ethnography and user experience data of the actual resident and the visitor was deduced in the persona method in detail after 10 years. In addition, the future direction of funeral services centered on residence and visitor was presented.

A Study on Fire Explosion Characteristics via Physico-chemical Analysis of Petroleum Residues (석유 부산물의 물리화학적 분석을 통한 화재폭발 특성연구)

  • Kim, Hyeonggi;Lee, Young-Seak
    • Applied Chemistry for Engineering
    • /
    • v.30 no.5
    • /
    • pp.556-561
    • /
    • 2019
  • In this study, the physical and chemical analyses of petroleum residues (pyrolized fuel oil, PFO) were conducted and major components were selected to investigate their fire and explosion characteristics. Major component distribution areas of the PFO were identified via the GC-SIMDIS and MALDI-TOF analyses. In addition, the qualitative analysis of major component distribution areas was performed by GC-MS analysis. Major components of pyrolysis residue were selected based on the results of various analyses such as EA, SARA and TGA. As a result, benzene, toluene and xylene were selected as major components. Finally, the process hazard analysis software tool (PHAST) analysis was performed to investigate the range of maximum damage effect in case of fire and explosion. Toluene presented the highest risk due to the radiation effect of $227kW/m^2$ and 118 m in the case of jet fire. Xylene and benzene showed the maximum radiant heat values of 114 and $151kW/m^2$, respectively. It was also confirmed from the analysis of pasquill stability and wind speed that the radiant heat increased up to 55% according to wind speed in benzene, which was considered to be a main factor increasing the influence range.

Analyzing Typology and Factor Combinations for Regional Innovation in Korea Using fs/QCA (퍼지셋 질적비교분석을 이용한 우리나라 지역혁신의 유형 및 요인 분석)

  • Kim, Gyu-hwan;Park, In Kwon
    • Journal of the Korean Regional Science Association
    • /
    • v.34 no.4
    • /
    • pp.3-18
    • /
    • 2018
  • These days, regional innovation draws more attention than ever as a growth engine for regional economies, and governments put a variety of efforts to establish Regional Innovation systems(RISs). In this circumstance, this study aims to analyze types of RISs and the combinations of the factors influencing innovation performance as measured by patent application. Most of previous works have depended on case-oriented or variable-oriented strategy to classify types of RISs or to analyze the effects on performance of innovation factors, having some limitations: Variable-oriented approaches fail to capture complex combinatory effects of factors, while case-oriented approaches tend to depend on subjective interpretation. This study made use of the recently proposed fs/QCA(Fuzzy-set Qualitative Comparative Analysis) to overcome the limitations of those strategies. Based on the theory of RIS, three factors for regional innovation-input, infrastructure, and network-are used to classify 16 Korean Provinces. The results show that eight types of regional innovation types are identified, and that most of the regions are classified into either IN-type, equipped with high levels of Input and Network, or F-type, with high levels of infrastructure. In addition, applying seven sub-variables of the three factors to the fussy-set combination factor analysis, we examine a combination of factors influencing patent application. The results show that regions with high levels of R&D expense, valid patent, industry-academia cooperation, IP budget, and TLO values, and low IP capital almost always have a high level of patent application. Therefore, for regional innovation, the public sector needs to provide institutional support for R & D personnel training. It is also important to for both the public and the private sectors to make efforts to stimulate IP financing.

Case Study on Physical Activity Guidance Experience to Maintain Balance in Adults with Cerebellar Ataxia (소뇌성 운동실조증 성인의 균형 유지를 위한 신체활동 지도 경험 사례 연구)

  • Jeonghyeon Kim
    • Journal of Industrial Convergence
    • /
    • v.22 no.3
    • /
    • pp.51-65
    • /
    • 2024
  • This study aims to understand positive changes in balance and gait function and difficulties in the instructor's guidance process through repetitive basic motor skill-based physical activities targeting people with cerebellar ataxia. For this purpose, five adults with cerebellar ataxia were selected as research subjects, and their three instructors participated as research participants. To collect quantitative data, the average and standard deviation were examined through pre-and post-evaluation of the research participants' physical activity classes for 16 weeks. The mean and standard deviation of the collected data were calculated using the Shapiro-Wilk test in the SAS 9.1 statistical program (p<.05). As a qualitative data collection method, the cultural description method of developmental research(DSR) proposed by Spradley(1980) was adopted, and the collected data were analyzed inductively according to the analysis method of Mertens(1990). Through this, 31 concepts, 10 subcategories, and 4 categories were discovered. As a result, the difficulties experienced by the research participants included insufficient guidance environment, dissatisfaction of consumers, difficulty in guidance, and non-cooperation of colleagues. Based on these research results, it was found that institutional, legal, and policy support should be provided not only to public institutions but also to private physical activity institutions that can use vouchers in order to maintain the balance of adults with cerebellar ataxia as well as to guide their physical activities.

Improved Image Quality and Radiation Dose Reduction in Liver Dynamic CT Scan with the Protocol Change (Liver CT 검사에서 프로토콜 변화에 따른 선량 감소와 영상의 질 개선에 관한 연구)

  • Cho, Yu-Jin;Cho, Pyong-Kon
    • Journal of radiological science and technology
    • /
    • v.38 no.2
    • /
    • pp.107-114
    • /
    • 2015
  • The purpose is reducing radiation dose while maintaining of image quality in liver dynamic CT(LDCT) scan, by protocols generally used and the tube voltage set at a low level protocol compared to the radiation dose and image quality. The target is body mass index, 18.5~24 patients out of 40 patients who underwent the ACT(abdominal CT). Group A(tube voltage : 120kVp, SAFIRE strength 1) of 20 people among 40 people, to apply the general abdominal CT scan protocol, group B(tube voltage : 100kVp, apply SAFIRE strength 0~5) was 20 people, set a lower tube voltage. Image quality evaluation was setting a region of interest(ROI) in the liver parenchyma, aorta, superior mesenteric artery (SMA), celiac trunk, visceral fat of arterial phase. In the ROI were compared by measuring the noise, signal to noise ratio(SNR), contrast to noise ratio(CNR), CT number. In addition, qualitative assessments to evaluate two people in the rich professional experience in Radiology by 0-3 points. We compared the total radiation dose, dose length product(DLP) and effective dose, volume computed tomography dose index(CTDIvol). The higher SAFIRE in the tube voltage 100 kVp, noise is reduced, CT number was increased. Thus, SNR and CNR was increased higher the SAFIRE step. Compared with the tube voltage 120kVp, noise, SNR, CNR was most similar in SAFIRE strength 2 and 3. Qualitative assessment SAFIRE strength 2 is the most common SAFIRE strength 2 the most common qualitative assessment, if the tube voltage of 100kVp when the quality of the images better evaluated was SAFIRE strength 1. Dose was reduced from 21.69%, in 100kVp than 120kVp. In the case of a relatively high BMI is not LDCT scan, When it is shipped from the factory tube voltage is set higher, unnecessary radiation exposure when considering the reality that is concerned, when according to the results of this study, set a lower tube voltage and adjust the SAFIRE strength to 1 or 2, the radiation without compromising image quality amount also is thought to be able to be reduced.

The Adoption and Diffusion of Semantic Web Technology Innovation: Qualitative Research Approach (시맨틱 웹 기술혁신의 채택과 확산: 질적연구접근법)

  • Joo, Jae-Hun
    • Asia pacific journal of information systems
    • /
    • v.19 no.1
    • /
    • pp.33-62
    • /
    • 2009
  • Internet computing is a disruptive IT innovation. Semantic Web can be considered as an IT innovation because the Semantic Web technology possesses the potential to reduce information overload and enable semantic integration, using capabilities such as semantics and machine-processability. How should organizations adopt the Semantic Web? What factors affect the adoption and diffusion of Semantic Web innovation? Most studies on adoption and diffusion of innovation use empirical analysis as a quantitative research methodology in the post-implementation stage. There is criticism that the positivist requiring theoretical rigor can sacrifice relevance to practice. Rapid advances in technology require studies relevant to practice. In particular, it is realistically impossible to conduct quantitative approach for factors affecting adoption of the Semantic Web because the Semantic Web is in its infancy. However, in an early stage of introduction of the Semantic Web, it is necessary to give a model and some guidelines and for adoption and diffusion of the technology innovation to practitioners and researchers. Thus, the purpose of this study is to present a model of adoption and diffusion of the Semantic Web and to offer propositions as guidelines for successful adoption through a qualitative research method including multiple case studies and in-depth interviews. The researcher conducted interviews with 15 people based on face-to face and 2 interviews by telephone and e-mail to collect data to saturate the categories. Nine interviews including 2 telephone interviews were from nine user organizations adopting the technology innovation and the others were from three supply organizations. Semi-structured interviews were used to collect data. The interviews were recorded on digital voice recorder memory and subsequently transcribed verbatim. 196 pages of transcripts were obtained from about 12 hours interviews. Triangulation of evidence was achieved by examining each organization website and various documents, such as brochures and white papers. The researcher read the transcripts several times and underlined core words, phrases, or sentences. Then, data analysis used the procedure of open coding, in which the researcher forms initial categories of information about the phenomenon being studied by segmenting information. QSR NVivo version 8.0 was used to categorize sentences including similar concepts. 47 categories derived from interview data were grouped into 21 categories from which six factors were named. Five factors affecting adoption of the Semantic Web were identified. The first factor is demand pull including requirements for improving search and integration services of the existing systems and for creating new services. Second, environmental conduciveness, reference models, uncertainty, technology maturity, potential business value, government sponsorship programs, promising prospects for technology demand, complexity and trialability affect the adoption of the Semantic Web from the perspective of technology push. Third, absorptive capacity is an important role of the adoption. Fourth, suppler's competence includes communication with and training for users, and absorptive capacity of supply organization. Fifth, over-expectance which results in the gap between user's expectation level and perceived benefits has a negative impact on the adoption of the Semantic Web. Finally, the factor including critical mass of ontology, budget. visible effects is identified as a determinant affecting routinization and infusion. The researcher suggested a model of adoption and diffusion of the Semantic Web, representing relationships between six factors and adoption/diffusion as dependent variables. Six propositions are derived from the adoption/diffusion model to offer some guidelines to practitioners and a research model to further studies. Proposition 1 : Demand pull has an influence on the adoption of the Semantic Web. Proposition 1-1 : The stronger the degree of requirements for improving existing services, the more successfully the Semantic Web is adopted. Proposition 1-2 : The stronger the degree of requirements for new services, the more successfully the Semantic Web is adopted. Proposition 2 : Technology push has an influence on the adoption of the Semantic Web. Proposition 2-1 : From the perceptive of user organizations, the technology push forces such as environmental conduciveness, reference models, potential business value, and government sponsorship programs have a positive impact on the adoption of the Semantic Web while uncertainty and lower technology maturity have a negative impact on its adoption. Proposition 2-2 : From the perceptive of suppliers, the technology push forces such as environmental conduciveness, reference models, potential business value, government sponsorship programs, and promising prospects for technology demand have a positive impact on the adoption of the Semantic Web while uncertainty, lower technology maturity, complexity and lower trialability have a negative impact on its adoption. Proposition 3 : The absorptive capacities such as organizational formal support systems, officer's or manager's competency analyzing technology characteristics, their passion or willingness, and top management support are positively associated with successful adoption of the Semantic Web innovation from the perceptive of user organizations. Proposition 4 : Supplier's competence has a positive impact on the absorptive capacities of user organizations and technology push forces. Proposition 5 : The greater the gap of expectation between users and suppliers, the later the Semantic Web is adopted. Proposition 6 : The post-adoption activities such as budget allocation, reaching critical mass, and sharing ontology to offer sustainable services are positively associated with successful routinization and infusion of the Semantic Web innovation from the perceptive of user organizations.

Recommender Systems using Structural Hole and Collaborative Filtering (구조적 공백과 협업필터링을 이용한 추천시스템)

  • Kim, Mingun;Kim, Kyoung-Jae
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.4
    • /
    • pp.107-120
    • /
    • 2014
  • This study proposes a novel recommender system using the structural hole analysis to reflect qualitative and emotional information in recommendation process. Although collaborative filtering (CF) is known as the most popular recommendation algorithm, it has some limitations including scalability and sparsity problems. The scalability problem arises when the volume of users and items become quite large. It means that CF cannot scale up due to large computation time for finding neighbors from the user-item matrix as the number of users and items increases in real-world e-commerce sites. Sparsity is a common problem of most recommender systems due to the fact that users generally evaluate only a small portion of the whole items. In addition, the cold-start problem is the special case of the sparsity problem when users or items newly added to the system with no ratings at all. When the user's preference evaluation data is sparse, two users or items are unlikely to have common ratings, and finally, CF will predict ratings using a very limited number of similar users. Moreover, it may produces biased recommendations because similarity weights may be estimated using only a small portion of rating data. In this study, we suggest a novel limitation of the conventional CF. The limitation is that CF does not consider qualitative and emotional information about users in the recommendation process because it only utilizes user's preference scores of the user-item matrix. To address this novel limitation, this study proposes cluster-indexing CF model with the structural hole analysis for recommendations. In general, the structural hole means a location which connects two separate actors without any redundant connections in the network. The actor who occupies the structural hole can easily access to non-redundant, various and fresh information. Therefore, the actor who occupies the structural hole may be a important person in the focal network and he or she may be the representative person in the focal subgroup in the network. Thus, his or her characteristics may represent the general characteristics of the users in the focal subgroup. In this sense, we can distinguish friends and strangers of the focal user utilizing the structural hole analysis. This study uses the structural hole analysis to select structural holes in subgroups as an initial seeds for a cluster analysis. First, we gather data about users' preference ratings for items and their social network information. For gathering research data, we develop a data collection system. Then, we perform structural hole analysis and find structural holes of social network. Next, we use these structural holes as cluster centroids for the clustering algorithm. Finally, this study makes recommendations using CF within user's cluster, and compare the recommendation performances of comparative models. For implementing experiments of the proposed model, we composite the experimental results from two experiments. The first experiment is the structural hole analysis. For the first one, this study employs a software package for the analysis of social network data - UCINET version 6. The second one is for performing modified clustering, and CF using the result of the cluster analysis. We develop an experimental system using VBA (Visual Basic for Application) of Microsoft Excel 2007 for the second one. This study designs to analyzing clustering based on a novel similarity measure - Pearson correlation between user preference rating vectors for the modified clustering experiment. In addition, this study uses 'all-but-one' approach for the CF experiment. In order to validate the effectiveness of our proposed model, we apply three comparative types of CF models to the same dataset. The experimental results show that the proposed model outperforms the other comparative models. In especial, the proposed model significantly performs better than two comparative modes with the cluster analysis from the statistical significance test. However, the difference between the proposed model and the naive model does not have statistical significance.

A Comparative Case Study on the Adaptation Process of Advanced Information Technology: A Grounded Theory Approach for the Appropriation Process (신기술 사용 과정에 관한 비교 사례 연구: 기술 전유 과정의 근거이론적 접근)

  • Choi, Hee-Jae;Lee, Zoon-Ky
    • Asia pacific journal of information systems
    • /
    • v.19 no.3
    • /
    • pp.99-124
    • /
    • 2009
  • Many firms in Korea have adopted and used advanced information technology in an effort to boost efficiency. The process of adapting to the new technology, at the same time, can vary from one firm to another. As such, this research focuses on several relevant factors, especially the roles of social interaction as a key variable that influences the technology adaptation process and the outcomes. Thus far, how a firm goes through the adaptation process to the new technology has not been yet fully explored. Previous studies on changes undergone by a firm or an organization due to information technology have been pursued from various theoretical points of views, evolved from technological and institutional views to an integrated social technology views. The technology adaptation process has been understood to be something that evolves over time and has been regarded as cycles between misalignments and alignments, gradually approaching the stable aligned state. The adaptation process of the new technology was defined as "appropriation" process according to Poole and DeSanctis (1994). They suggested that this process is not automatically determined by the technology design itself. Rather, people actively select how technology structures should be used; accordingly, adoption practices vary. But concepts of the appropriation process in these studies are not accurate while suggested propositions are not clear enough to apply in practice. Furthermore, these studies do not substantially suggest which factors are changed during the appropriation process and what should be done to bring about effective outcomes. Therefore, research objectives of this study lie in finding causes for the difference in ways in which advanced information technology has been used and adopted among organizations. The study also aims to explore how a firm's interaction with social as well as technological factors affects differently in resulting organizational changes. Detail objectives of this study are as follows. First, this paper primarily focuses on the appropriation process of advanced information technology in the long run, and we look into reasons for the diverse types of the usage. Second, this study is to categorize each phases in the appropriation process and make clear what changes occur and how they are evolved during each phase. Third, this study is to suggest the guidelines to determine which strategies are needed in an individual, group and organizational level. For this, a substantially grounded theory that can be applied to organizational practice has been developed from a longitudinal comparative case study. For these objectives, the technology appropriation process was explored based on Structuration Theory by Giddens (1984), Orlikoski and Robey (1991) and Adaptive Structuration Theory by Poole and DeSanctis (1994), which are examples of social technology views on organizational change by technology. Data have been obtained from interviews, observations of medical treatment task, and questionnaires administered to group members who use the technology. Data coding was executed in three steps following the grounded theory approach. First of all, concepts and categories were developed from interviews and observation data in open coding. Next, in axial coding, we related categories to subcategorize along the lines of their properties and dimensions through the paradigm model. Finally, the grounded theory about the appropriation process was developed through the conditional/consequential matrix in selective coding. In this study eight hypotheses about the adaptation process have been clearly articulated. Also, we found that the appropriation process involves through three phases, namely, "direct appropriation," "cooperate with related structures," and "interpret and make judgments." The higher phases of appropriation move, the more users represent various types of instrumental use and attitude. Moreover, the previous structures like "knowledge and experience," "belief that other members know and accept the use of technology," "horizontal communication," and "embodiment of opinion collection process" are evolved to higher degrees in their dimensions of property. Furthermore, users continuously create new spirits and structures, while removing some of the previous ones at the same time. Thus, from longitudinal view, faithful and unfaithful appropriation methods appear recursively, but gradually faithful appropriation takes over the other. In other words, the concept of spirits and structures has been changed in the adaptation process over time for the purpose of alignment between the task and other structures. These findings call for a revised or extended model of structural adaptation in IS (Information Systems) literature now that the vague adaptation process in previous studies has been clarified through the in-depth qualitative study, identifying each phrase with accuracy. In addition, based on these results some guidelines can be set up to help determine which strategies are needed in an individual, group, and organizational level for the purpose of effective technology appropriation. In practice, managers can focus on the changes of spirits and elevation of the structural dimension to achieve effective technology use.