• Title/Summary/Keyword: Security efficiency

Search Result 1,656, Processing Time 0.027 seconds

The Association Between Working Overtime and Job Performance for Dental Hygienists (치과위생사의 야간진료와 직무성과의 관련성)

  • Mi-Sook Yoon;Young-Eun Kim;Han-A Cho
    • Journal of Korean Dental Hygiene Science
    • /
    • v.7 no.1
    • /
    • pp.39-52
    • /
    • 2024
  • Background: Dental hygienists provide direct dental care in the closest proximity to the patient, and each practice requires a high level of focus and concentration. These skills are an important human resource that can impact the quality of dental care services. Since more than half of dental clinics provide as overtime work in addition to regular hours, this study aims to determine the association between working overtime and job performance for dental hygienists. Methods: The study was conducted using a combination of online and in-person surveys via Google Forms among 131 employed dental hygienists. The survey consisted of 7 questions on demographic and work characteristics, 16 questions on characteristics related to overtime and the effect of overtime on job security, health, and life, and 10 questions on job performance, for a total of 33 questions. Chi-square analysis and independent samples t-test were used to identify the characteristics of demographic and work characteristics, and descriptive statistics analysis was used for the characteristics of overtime. Independent samples t-test was used to test the difference in the mean of job performance according to whether or not they worked overtime, and linear regression analysis was used to show the association of working overtime and job performance. Results: The study found that 71% of dental clinics worked overtime. The average number of overtime per week was once (78.5%), and the most common problems with overtime were fatigue (52.7%) and lack of personal and leisure time (41.9%). The appropriate number of overtime per week considered by dental hygienists was once a week, which was confirmed to be 94.6%. When comparing job performance by overtime status, those who worked overtime were 3.38 points higher than those who did not (35.45 vs. 32.07). Multiple linear regression analysis of the association of working overtime night and job performance showed that a one-unit increase in worked overtime was associated with a statistically significant increase in job performance of about 3.1 (p<0.01). Conclusion: Working overtime was found to have a positive effect on job performance among dental hygienists. Therefore, as a way to improve the working environment, providing appropriate compensation or welfare for overtime can reduce the negative aspects of overtime and turn it into a positive influence on job performance. This could ultimately raise awareness of the dental hygienist as a professional and effect the efficiency of dental care services.

The Status of North Korean Airspace after Reunification (북한 공역의 통일 후 지위)

  • Kwon, Chang-Young
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.32 no.1
    • /
    • pp.287-325
    • /
    • 2017
  • Considering the development of aerospace, military science and technology since the 20th century, the sky is very important for the nation's existence and prosperity. The proverb "Whosoever commands the space commands the world itself!" emphasizes the need for the command of the air. This essay is the first study on the status of airspace after reunification. First, the territorial airspace is over the territory and territorial sea, and its horizontal extent is determined by the territorial boundary lines. Acceptance of the present order is most reasonable, rather than attempting to reconfigure through historical truths about border issues, and it could be supported by neighboring countries in the reunification period. For peace in Northeast Asia, the reunified Korea needs to respect the existing border agreement between North Korea and China or Russia. However, the North Korean straight baselines established in the East Sea and the Yellow Sea should be discarded because they are not available under United Nations Convention on the Law of the Sea. It is desirable for the reunified Korea to redefine the straight baselines that comply with international law and determine the territorial waters up to and including the 12-nautical mile outside it. Second, the Flight Information Region (hereinafter "FIR") is a region defined by the International Civil Aviation Organization (hereinafter "ICAO") in order to provide information necessary for the safe and efficient flight of aircraft and the search and rescue of aircraft. At present, Korea is divided into Incheon FIR which is under the jurisdiction of South Korea and Pyongyang FIR which is under the jurisdiction of North Korea. If North Korea can not temporarily exercise control of Pyongyang FIR due to a sudden change of circumstances, it is desirable for South Korea to exercise control of Pyongyang FIR, and if it is unavoidable, ICAO should temporarily exercise it. In reunified Korea, it is desirable to abolish Pyongyang FIR and integrate it into Incheon FIR with the approval of ICAO, considering systematic management and control of FIR, establishment of route, and efficiency of management. Third, the Air Defense Identification Zone (hereinafter "ADIZ") is a zone that requires easy identification, positioning, and control of aircraft for national security purposes, and is set up unilaterally by the country concerned. The US unilaterally established the Korea Air Defense Identification Area (KADIZ) by the Declaration of Commitment on March 22, 1951. The Ministry of Defense proclaimed a new KADIZ which extended to the area including IEODO on December 13, 2013. At present, North Korea's military warning zone is set only at maritime boundaries such as the East Sea and the Yellow Sea. But in view of its lack of function as ADIZ in relations with China and Russia, the reunified Korea has no obligation to succeed it. Since the depth of the Korean peninsula is short, it is necessary to set ADIZ boundary on the outskirts of the territorial airspace to achieve the original purpose of ADIZ. Therefore, KADIZ of the reunified Korea should be newly established by the boundary line that coincides with the Incheon FIR of the reunified Korea. However, if there is no buffer zone overlapping with or adjacent to the ADIZs of neighboring countries, military tensions may rise. Therefore, through bilateral negotiations for peace in Northeast Asia, a buffer zone is established between adjacent ADIZs.

  • PDF

A Study on the Influence of IT Education Service Quality on Educational Satisfaction, Work Application Intention, and Recommendation Intention: Focusing on the Moderating Effects of Learner Position and Participation Motivation (IT교육 서비스품질이 교육만족도, 현업적용의도 및 추천의도에 미치는 영향에 관한 연구: 학습자 직위 및 참여동기의 조절효과를 중심으로)

  • Kang, Ryeo-Eun;Yang, Sung-Byung
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.4
    • /
    • pp.169-196
    • /
    • 2017
  • The fourth industrial revolution represents a revolutionary change in the business environment and its ecosystem, which is a fusion of Information Technology (IT) and other industries. In line with these recent changes, the Ministry of Employment and Labor of South Korea announced 'the Fourth Industrial Revolution Leader Training Program,' which includes five key support areas such as (1) smart manufacturing, (2) Internet of Things (IoT), (3) big data including Artificial Intelligence (AI), (4) information security, and (5) bio innovation. Based on this program, we can get a glimpse of the South Korean government's efforts and willingness to emit leading human resource with advanced IT knowledge in various fusion technology-related and newly emerging industries. On the other hand, in order to nurture excellent IT manpower in preparation for the fourth industrial revolution, the role of educational institutions capable of providing high quality IT education services is most of importance. However, these days, most IT educational institutions have had difficulties in providing customized IT education services that meet the needs of consumers (i.e., learners), without breaking away from the traditional framework of providing supplier-oriented education services. From previous studies, it has been found that the provision of customized education services centered on learners leads to high satisfaction of learners, and that higher satisfaction increases not only task performance and the possibility of business application but also learners' recommendation intention. However, since research has not yet been conducted in a comprehensive way that consider both antecedent and consequent factors of the learner's satisfaction, more empirical research on this is highly desirable. With the advent of the fourth industrial revolution, a rising interest in various convergence technologies utilizing information technology (IT) has brought with the growing realization of the important role played by IT-related education services. However, research on the role of IT education service quality in the context of IT education is relatively scarce in spite of the fact that research on general education service quality and satisfaction has been actively conducted in various contexts. In this study, therefore, the five dimensions of IT education service quality (i.e., tangibles, reliability, responsiveness, assurance, and empathy) are derived from the context of IT education, based on the SERVPERF model and related previous studies. In addition, the effects of these detailed IT education service quality factors on learners' educational satisfaction and their work application/recommendation intentions are examined. Furthermore, the moderating roles of learner position (i.e., practitioner group vs. manager group) and participation motivation (i.e., voluntary participation vs. involuntary participation) in relationships between IT education service quality factors and learners' educational satisfaction, work application intention, and recommendation intention are also investigated. In an analysis using the structural equation model (SEM) technique based on a questionnaire given to 203 participants of IT education programs in an 'M' IT educational institution in Seoul, South Korea, tangibles, reliability, and assurance were found to have a significant effect on educational satisfaction. This educational satisfaction was found to have a significant effect on both work application intention and recommendation intention. Moreover, it was discovered that learner position and participation motivation have a partial moderating impact on the relationship between IT education service quality factors and educational satisfaction. This study holds academic implications in that it is one of the first studies to apply the SERVPERF model (rather than the SERVQUAL model, which has been widely adopted by prior studies) is to demonstrate the influence of IT education service quality on learners' educational satisfaction, work application intention, and recommendation intention in an IT education environment. The results of this study are expected to provide practical guidance for IT education service providers who wish to enhance learners' educational satisfaction and service management efficiency.

Adaptive RFID anti-collision scheme using collision information and m-bit identification (충돌 정보와 m-bit인식을 이용한 적응형 RFID 충돌 방지 기법)

  • Lee, Je-Yul;Shin, Jongmin;Yang, Dongmin
    • Journal of Internet Computing and Services
    • /
    • v.14 no.5
    • /
    • pp.1-10
    • /
    • 2013
  • RFID(Radio Frequency Identification) system is non-contact identification technology. A basic RFID system consists of a reader, and a set of tags. RFID tags can be divided into active and passive tags. Active tags with power source allows their own operation execution and passive tags are small and low-cost. So passive tags are more suitable for distribution industry than active tags. A reader processes the information receiving from tags. RFID system achieves a fast identification of multiple tags using radio frequency. RFID systems has been applied into a variety of fields such as distribution, logistics, transportation, inventory management, access control, finance and etc. To encourage the introduction of RFID systems, several problems (price, size, power consumption, security) should be resolved. In this paper, we proposed an algorithm to significantly alleviate the collision problem caused by simultaneous responses of multiple tags. In the RFID systems, in anti-collision schemes, there are three methods: probabilistic, deterministic, and hybrid. In this paper, we introduce ALOHA-based protocol as a probabilistic method, and Tree-based protocol as a deterministic one. In Aloha-based protocols, time is divided into multiple slots. Tags randomly select their own IDs and transmit it. But Aloha-based protocol cannot guarantee that all tags are identified because they are probabilistic methods. In contrast, Tree-based protocols guarantee that a reader identifies all tags within the transmission range of the reader. In Tree-based protocols, a reader sends a query, and tags respond it with their own IDs. When a reader sends a query and two or more tags respond, a collision occurs. Then the reader makes and sends a new query. Frequent collisions make the identification performance degrade. Therefore, to identify tags quickly, it is necessary to reduce collisions efficiently. Each RFID tag has an ID of 96bit EPC(Electronic Product Code). The tags in a company or manufacturer have similar tag IDs with the same prefix. Unnecessary collisions occur while identifying multiple tags using Query Tree protocol. It results in growth of query-responses and idle time, which the identification time significantly increases. To solve this problem, Collision Tree protocol and M-ary Query Tree protocol have been proposed. However, in Collision Tree protocol and Query Tree protocol, only one bit is identified during one query-response. And, when similar tag IDs exist, M-ary Query Tree Protocol generates unnecessary query-responses. In this paper, we propose Adaptive M-ary Query Tree protocol that improves the identification performance using m-bit recognition, collision information of tag IDs, and prediction technique. We compare our proposed scheme with other Tree-based protocols under the same conditions. We show that our proposed scheme outperforms others in terms of identification time and identification efficiency.

Chinese Communist Party's Management of Records & Archives during the Chinese Revolution Period (혁명시기 중국공산당의 문서당안관리)

  • Lee, Won-Kyu
    • The Korean Journal of Archival Studies
    • /
    • no.22
    • /
    • pp.157-199
    • /
    • 2009
  • The organization for managing records and archives did not emerge together with the founding of the Chinese Communist Party. Such management became active with the establishment of the Department of Documents (文書科) and its affiliated offices overseeing reading and safekeeping of official papers, after the formation of the Central Secretariat(中央秘書處) in 1926. Improving the work of the Secretariat's organization became the focus of critical discussions in the early 1930s. The main criticism was that the Secretariat had failed to be cognizant of its political role and degenerated into a mere "functional organization." The solution to this was the "politicization of the Secretariat's work." Moreover, influenced by the "Rectification Movement" in the 1940s, the party emphasized the responsibility of the Resources Department (材料科) that extended beyond managing documents to collecting, organizing and providing various kinds of important information data. In the mean time, maintaining security with regard to composing documents continued to be emphasized through such methods as using different names for figures and organizations or employing special inks for document production. In addition, communications between the central political organs and regional offices were emphasized through regular reports on work activities and situations of the local areas. The General Secretary not only composed the drafts of the major official documents but also handled the reading and examination of all documents, and thus played a central role in record processing. The records, called archives after undergoing document processing, were placed in safekeeping. This function was handled by the "Document Safekeeping Office(文件保管處)" of the Central Secretariat's Department of Documents. Although the Document Safekeeping Office, also called the "Central Repository(中央文庫)", could no longer accept, beginning in the early 1930s, additional archive transfers, the Resources Department continued to strengthen throughout the 1940s its role of safekeeping and providing documents and publication materials. In particular, collections of materials for research and study were carried out, and with the recovery of regions which had been under the Japanese rule, massive amounts of archive and document materials were collected. After being stipulated by rules in 1931, the archive classification and cataloguing methods became actively systematized, especially in the 1940s. Basically, "subject" classification methods and fundamental cataloguing techniques were adopted. The principle of assuming "importance" and "confidentiality" as the criteria of management emerged from a relatively early period, but the concept or process of evaluation that differentiated preservation and discarding of documents was not clear. While implementing a system of secure management and restricted access for confidential information, the critical view on providing use of archive materials was very strong, as can be seen in the slogan, "the unification of preservation and use." Even during the revolutionary movement and wars, the Chinese Communist Party continued their efforts to strengthen management and preservation of records & archives. The results were not always desirable nor were there any reasons for such experiences to lead to stable development. The historical conditions in which the Chinese Communist Party found itself probably made it inevitable. The most pronounced characteristics of this process can be found in the fact that they not only pursued efficiency of records & archives management at the functional level but, while strengthening their self-awareness of the political significance impacting the Chinese Communist Party's revolution movement, they also paid attention to the value possessed by archive materials as actual evidence for revolutionary policy research and as historical evidence of the Chinese Communist Party.

Shopping Value, Shopping Goal and WOM - Focused on Electronic-goods Buyers (쇼핑 가치 추구 성향에 따른 쇼핑 목표와 공유 의도 차이에 관한 연구 - 전자제품 구매고객을 중심으로)

  • Park, Kyoung-Won;Park, Ju-Young
    • Journal of Global Scholars of Marketing Science
    • /
    • v.19 no.2
    • /
    • pp.68-79
    • /
    • 2009
  • The interplay between hedonic and utilitarian attributes has assumed special significance in recent years; it has been proposed that consumption offerings should be viewed as experiences that stimulate both cognitions and feelings rather than as mere products or services. This research builds on previous work on hedonic versus utilitarian benefits, regulatory focus theory, customer satisfaction to address two question: (1) Is the shopping goal at the point of purchase different from the shopping value? and (2) Is the customer loyalty after the use different from the shopping value and shopping goal? We surveyed 345 peoples those who have bought the electronic-goods within 6 months. This research dealt with the shopping value which is consisted of 2 types, hedonic and utilitarian. Those who pursue the hedonic shopping value may prefer the pleasure of purchasing experience to the product itself. They tend to prefer atmosphere, arousal of the shopping experience. Consistent with previous research, we use the term "hedonic" to refer to their aesthetic, experiential and enjoyment-related value. On the contrary, Those who pursue the utilitarian shopping value may prefer the reasonable buying. It may be more functional. Consistent with previous research, we use the term "utilitarian" to refer to the functional, instrumental, and practical value of consumption offerings. Holbrook(1999) notes that consumer value is an experience that results from the consumption of such benefits. In the context of cell phones for example, the phone's battery life and sound volume are utilitarian benefits, whereas aesthetic appeal from its shape and color are hedonic benefits. Likewise, in the case of a car, fuel economics and safety are utilitarian benefits whereas the sunroof and the luxurious interior are hedonic benefits. The shopping goals are consisted of the promotion focus goal and the prevention focus goal, based on the self-regulatory focus theory. The promotion focus is characterized into focusing ideal self because they are oriented to wishes and vision. The promotion focused individuals are tend to be more risk taking. They are more sensitive to hope and achievement. On the contrary, the prevention focused individuals are characterized into focusing the responsibilities because they are oriented to safety. The prevention focused individuals are tend to be more risk avoiding. We wanted to test the relation among the shopping value, shopping goal and customer loyalty. Customers show the positive or negative feelings comparing with the expectation level which customers have at the point of the purchase. If the result were bigger than the expectation, customers may feel positive feeling such as delight or satisfaction and they would want to share their feelings with other people. And they want to buy those products again in the future time. There is converging evidence that the types of goals consumers expect to be fulfilled by the utilitarian dimension of a product are different from those they seek from the hedonic dimension (Chernev 2004). Specifically, whereas consumers expect the fulfillment of product prevention goals on the utilitarian dimension, they expect the fulfillment of promotion goals on the hedonic dimension (Chernev 2004; Chitturi, Raghunathan, and Majahan 2007; Higgins 1997, 2001) According to the regulatory focus theory, prevention goals are those that ought to be met. Fulfillment of prevention goals in the context of product consumption eliminates or significantly reduces the probability of a painful experience, thus making consumers experience emotions that result from fulfillment of prevention goals such as confidence and securities. On the contrary, fulfillment of promotion goals are those that a person aspires to meet, such as "looking cool" or "being sophisticated." Fulfillment of promotion goals in the context of product consumption significantly increases the probability of a pleasurable experience, thus enabling consumers to experience emotions that result from the fulfillment of promotion goals. The proposed conceptual framework captures that the relationships among hedonic versus utilitarian shopping values and promotion versus prevention shopping goals respectively. An analysis of the consequence of the fulfillment and frustration of utilitarian and hedonic value is theoretically worthwhile. It is also substantively relevant because it helps predict post-consumption behavior such as the promotion versus prevention shopping goals orientation. Because our primary goal is to understand how the post consumption feelings influence the variable customer loyalty: word of mouth (Jacoby and Chestnut 1978). This research result is that the utilitarian shopping value gives the positive influence to both of the promotion and prevention goal. However the influence to the prevention goal is stronger. On the contrary, hedonic shopping value gives influence to the promotion focus goal only. Additionally, both of the promotion and prevention goal show the positive relation with customer loyalty. However, the positive relation with promotion goal and customer loyalty is much stronger. The promotion focus goal gives the influence to the customer loyalty. On the contrary, the prevention focus goal relates at the low level of relation with customer loyalty than that of the promotion goal. It could be explained that it is apt to get framed the compliment of people into 'gain-non gain' situation. As the result, for those who have the promotion focus are motivated to deliver their own feeling to other people eagerly. Conversely the prevention focused individual are more sensitive to the 'loss-non loss' situation. The research result is consistent with pre-existent researches. There is a conceptual parallel between necessities-needs-utilitarian benefits and luxuries-wants-hedonic benefits (Chernev 2004; Chitturi, Raghunathan and Majaha 2007; Higginns 1997; Kivetz and Simonson 2002b). In addition, Maslow's hierarchy of needs and the precedence principle contends luxuries-wants-hedonic benefits higher than necessities-needs-utilitarian benefits. Chitturi, Raghunathan and Majaha (2007) show that consumers are focused more on the utilitarian benefits than on the hedonic benefits of a product until their minimum expectation of fulfilling prevention goals are met. Furthermore, a utilitarian benefit is a promise of a certain level of functionality by the manufacturer or the retailer. When the promise is not fulfilled, customers blame the retailer and/or the manufacturer. When negative feelings are attributable to an entity, customers feel angry. However in the case of hedonic benefit, the customer, not the manufacturer, determines at the time of purchase whether the product is stylish and attractive. Under such circumstances, customers are more likely to blame themselves than the manufacturer if their friends do not find the product stylish and attractive. Therefore, not meeting minimum utilitarian expectations of functionality generates a much more intense negative feelings, such as anger than a less intense feeling such as disappointment or dissatisfactions. The additional multi group analysis of this research shows the same result. Those who are unsatisfactory customers who have the prevention focused goal shows higher relation with WOM, comparing with satisfactory customers. The research findings in this article could have significant implication for the personal selling fields to increase the effectiveness and the efficiency of the sales such that they can develop the sales presentation strategy for the customers. For those who are the hedonic customers may be apt to show more interest to the promotion goal. Therefore it may work to strengthen the design, style or new technology of the products to the hedonic customers. On the contrary for the utilitarian customers, it may work to strengthen the price competitiveness. On the basis of the result from our studies, we demonstrated a correspondence among hedonic versus utilitarian and promotion versus prevention goal, WOM. Similarly, we also found evidence of the moderator effects of satisfaction after use, between the prevention goal and WOM. Even though the prevention goal has the low level of relation to WOM, those who are not satisfied show higher relation to WOM. The relation between the prevention goal and WOM is significantly different according to the satisfaction versus unsatisfaction. In addition, improving the promotion emotions of cheerfulness and excitement and the prevention emotion of confidence and security will further improve customer loyalty. A related potential further research could be to examine whether hedonic versus utilitarian, promotion versus prevention goals improve customer loyalty for services as well. Under the budget and time constraints, designers and managers are often compelling to choose among various attributes. If there is no budget or time constraints, perhaps the best solution is to maximize both hedonic and utilitarian dimension of benefits. However, they have to make trad-off process between various attributes. For the designers and managers have to keep in mind that without hedonic benefit satisfaction of the product it may hard to lead the customers to the customer loyalty.

  • PDF