• Title/Summary/Keyword: Social vulnerability

Search Result 203, Processing Time 0.032 seconds

Influencing Factors for Nurses' Problem Solving Ability Related to Dysfunctional Beliefs and Emotion Regulation Strategy (역기능적 신념과 정서조절 양식이 간호사의 문제해결 능력에 미치는 영향)

  • Shin, Yeon Hee
    • Journal of Korean Clinical Nursing Research
    • /
    • v.18 no.3
    • /
    • pp.402-412
    • /
    • 2012
  • Purpose: The purpose of this study was to explore influencing factors of dysfunctional beliefs and emotion regulation strategy for nurses' problem solving ability. Methods: This study was a cross-sectional design with a sample of 745 nurses from 1 university hospital located in Gyeonggido. The scales were Dysfunctional Beliefs Test (70 items), Emotion Regulation Strategy Questionnaire (25 items) and Social Problem Solving Inventory (52 items). The data were analyzed using SPSS 17.0 employing ANOVA, pearson correlation coefficients and multiple regression analysis. Results: The mean score for problem solving ability was 11.26 points. Influencing factors for nurses' problem solving ability were identified as 'active regulation style' in emotion regulation strategy and 'negative concept of social self' in dysfunctional beliefs. Conclusion: It is plausible to assume that dysfunctional beliefs which are vulnerability factors in cognitive variables and emotion regulation strategy affect nurses' problem solving ability.

Factors Affecting Intention to Use Security Functions in SNS (소셜 네트워크 서비스의 보안기능 사용의도에 영향을 미치는 요인 : Facebook을 중심으로)

  • Kim, Hyeob;Kim, Kyung Kyu;Lee, Ho
    • Journal of Information Technology Services
    • /
    • v.13 no.2
    • /
    • pp.1-17
    • /
    • 2014
  • Social networking service (SNS) is a service that allows people to share information, manage relationships with others, and express themselves on the Internet. The number of SNS users have increased explosively with the growth of mobile devices such as smartphones. As the influence of SNS has grown extensively, potential threats to privacy have also become pervasive. The purpose of this study is to empirically examine the main factors that affect users' intentions to use security functions provided by their SNS. The main theories for this study include the rational choice theory and the theory of planned behavior. This study has identified the factors that affect intention to use security functions. In addition, security function awareness and information security awareness are found to be important antecedents for intention to use security functions. The results of this study implies that when SNS providers develop security policies, they should consider the ways to improve users information security awareness and security function awareness simultaneously.

The Development and Application Of Cyber Counseling System for the Gifted Class (영재 학급을 위한 사이버 상담 시스템 개발 및 적용)

  • Chung, Hyun-Nam;Kim, Dong-Hyu;Goh, Byung-Oh
    • Journal of The Korean Association of Information Education
    • /
    • v.8 no.2
    • /
    • pp.177-187
    • /
    • 2004
  • It soaks but from 2003 the gifted child whom it is propelling as the enterprise of real national dimension oneself will know and it will do well the case which with the thought which goes wrong it lets to let alone is many but about lower social unsuitable Eung and melancholia, nervous characteristic anorexia cung with the back the same multi branch problem point occurs with emotional vulnerability of the gifted person. From the gifted people it grasps the emotional vulnerability which occurs from the dissertation which it sees consequently and the gifted person cyber counseling system which does the hazard web which solves a problem point in base plan and it embodies. One side, it applied the gifted child and the parents who are participating to an Dae-jeon 6th area joint the gifted person class in the gifted person cyber counseling system which it develops the result and it analyzed. Emotional vulnerability of the analysis result the gifted child considerable portion there is a possibility the fact that it overcomes, if facing each other it will be able to complement the portion which is insufficient from consultation.

  • PDF

Development of Seawater Intrusion Vulnerability Index Using AHP (계층화 분석기법을 이용한 해수침투 취약성지수 개발)

  • Yang, Jeong-Seok;Kim, Il-Hwan
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.35 no.3
    • /
    • pp.557-565
    • /
    • 2015
  • Sea level rise due to global warming causes seawater intrusion into aquifers in coastal areas. Seawater intrusion vulnerability index was developed using PSR (Pressure, State, Response) model and analysis hierarchy process (AHP). Coastal regions in Korea, Gangwon-do Sokcho-si, Incheon-si Ganghwa-gun, Chungcheongnam-do Taean-gun, Jeollanam-do Yeosu-si, Jindo-gun were chosen and 14 indicators were selected by considering the humanities, economic, social, environmental aspects. Re-scaling method was used for the standardization of indices and questionnaire survey was performed to calculate weight values for each index. The results showed that Yeosu-si was selected as the most vulnerable region to seawater intrusion. The seawater intrusion index developed in this research can be used to analyze the vulnerable regions to seawater intrusion and to establish a policy to minimize the seawater intrusion problems in coastal regions.

Suggestion of Priority Decision Method for Performance Evaluation Based on Risk Index for Small and Medium Sized Bridges (위험도 지수 기반 중소규모 교량 성능평가 우선순위 결정 방안 제안)

  • Lee, Hee-Hyun;Shin, Byoung-Gil;Lee, Yeong-Il;Kim, Young-Min
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.23 no.6
    • /
    • pp.70-76
    • /
    • 2019
  • This paper presents a methodology for priority decision of performance evaluation of small-and-medium-sized highway bridges. This methodology could be used for establishing a maintenance strategy of those bridges which are not liable to the law of the Special Act on the Safety Control and Maintenance of Establishments and are thought laid under blind spot. The risk index are calculated considering vulnerability and social influence, then the bridges are classified as three types, one requiring immediate evaluation, the other one requiring evaluation within next year, and the third one observing, according to the index. The suggested method was applied to a small bridge under service and its field applicability verified. From this study, it was judged that this methodology could be used appropriately for establishing maintenance strategy and saving the maintenance budget.

Application of GIS to Typhoon Risk Assessment (지리정보시스템을 이용한 태풍 위험 평가)

  • Lee, Sung-Su;Chang, Eun-Mi
    • Spatial Information Research
    • /
    • v.17 no.2
    • /
    • pp.243-249
    • /
    • 2009
  • Damages from typhoon events have contributed more than 60 percent of total economic and social loss and the size of loss have been increased up to 800 million dollars per year in Korea, It is therefore necessary to make an effort to mitigate the loss of natural disasters. To facilitate the evaluation of damages in advance and to support the decision making to recover the damages, scientific methods have been adopted. With the effort, GIS data can provide various tools. Three components of hazard mapping are estimation of hazard, inventory for vulnerable features, and fragility of each feature. Vulnerability of natural disaster can be obtained by relation between loss and meteorological data such as precipitation and wind speed. Features can be categorized from other GIS data of public facilities and private properties, and then social and economic loss can be estimated. At this point, GIS data conversions for each model are required. In this study, we build a method to estimate typhoon risk based on GIS data such as DEM, land cover and land use map, facilities.

  • PDF

Multidimensional body image, self-esteem, clothing benefits sought, and body image after breast cancer by the surgical subgroups among breast cancer survivors (유방암 생존자의 수술방법에 따른 다차원적 신체이미지, 자아존중감, 의복추구혜택과 수술 후 신체이미지에 관한 연구)

  • Lee, Eun Ok;Rhee, YoungJu
    • The Research Journal of the Costume Culture
    • /
    • v.24 no.6
    • /
    • pp.886-902
    • /
    • 2016
  • This study investigated multidimensional body image, self-esteem, clothing benefits sought, and Body Image After Breast Cancer (BIABC) within surgical subgroups among breast cancer survivors. The study applied the questionnaire survey method and the main research was conducted through an online survey. The respondents included 207 breast cancer survivors between the ages of 30 and 59, each of whom received the Multidimensional Body-Self Relations Questionnaire (MBSRQ). Self-esteem, clothing benefits sought, examination, and demographic variables were measured using a 5-point Likert scale. The main results of this study are outlined below. For clothing benefit sought, six factors were formulated-pursuit of self-expression/social approval, function/health, compensation, femininity, fashion, and camouflage-and BIABC was defined by the four factors of body stigma/vulnerability, transparency, limitation and cancer concern. While MBSRQ and self-esteem did not show a statistically significant difference between groups differentiated by the surgical methods experienced, those who underwent mastectomies scored slightly lower than members of the other groups. Moreover, the reconstruction after mastectomy group showed the highest mean on self-expression/social approval, compensation, femininity and entire clothing benefits sought, followed by the lumpectomy group and mastectomy group. The lumpectomy group was found to have more positive BIABC than the mastectomy group. In particular, the mastectomy group showed a lower body stigma/vulnerability mean than the other groups. This study is meaningful in that it improves our understanding of the body image of breast cancer survivors and provides basic knowledge for developing products and marketing strategies for breast cancer survivors as consumers.

Post-Intensive Care Syndrome Experience among Critical Care Survivors: A Meta-synthesis of Qualitative Research (집중치료 후 증후군 경험에 관한 질적 통합 연구)

  • Kang, Jiyeon;Jeong, Yeon Jin;Yun, Sun Young;Lee, Min Ju;Baek, Min Jung;Shin, So Yeung;Hong, Hee Jin;Kim, Soo Kyung;Cho, Young Shin
    • Journal of Korean Critical Care Nursing
    • /
    • v.10 no.1
    • /
    • pp.13-30
    • /
    • 2017
  • Purpose: The purpose of this study was to integrate the results of qualitative studies to understand critical care survivors' experience of the post-intensive care syndrome (PICS). Methods: This was a meta-synthesis of primary studies that used qualitative methods. We reviewed 26 qualitative studies on PICS selected from 8 international and Korean databases and from a manual search. Thomas and Harden's 3 stages (free coding, development of descriptive themes, generation of analytical themes) for thematic synthesis were utilized to analyze the collected qualitative data. Results: Four descriptive themes emerged from the thematic synthesis: weak physical conditions, psycho-emotional changes, the painful-memory of intensive care units, and social vulnerability. The analytical theme for the current study was "unfamiliarity with the vulnerable self." Critical care survivors had to confront entirely different "selves" after discharge from intensive care units. They had become physically weak, psychologically unstable, and the critical memories continued to create distress. These changes increased their social vulnerability by making them dependent on others, causing family conflicts, and changing interpersonal relationships. Conclusions: Finding from this qualitative synthesis and other related literature highlight the severity of PICS and the importance of rehabilitative intervention for critical care survivors.

  • PDF

Risk Factors for Sudden Infant Death Syndrome and Sleeping Practices in Korea

  • Ahn, Young Mee;Yang, Kyung-moo;Ha, Hong Il;Cho, Jung Ae
    • Child Health Nursing Research
    • /
    • v.26 no.1
    • /
    • pp.82-89
    • /
    • 2020
  • Sudden infant death syndrome (SIDS) in Korea remains a poorly-understood subject for both professionals and the public. Recent reports have emphasized ethnic differences in SIDS rates, suggesting that making adjustments in child-rearing practices may contribute substantially to SIDS reduction. Two of the three major risk factors for SIDS-vulnerability of the infant and exogenous factors-need to be understood in particular depth due to their broad scope and sociocultural grounding. This paper presents substantial issues regarding preterm birth and male gender on infants' vulnerability to SIDS in Korea. Practices of caring for healthy infants are addressed in the context of sleeping practices, including sleeping position, bedding arrangements, sleeping on the floor, the back-to-sleep position, high indoor temperatures and ondol floor heating, and swaddling. Professional and social awareness about how to reduce SIDS should be raised by promoting a better understanding of risk factors in the context of ethnic and cultural variations in child-rearing practices.

Intrusion Prevention Using Harmful Traffic Analysis (유해 트래픽 분석을 이용한 침입 방지)

  • Chang, Moon-Soo;Koo, Hyang-Ohk;Oh, Chang-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.4 s.36
    • /
    • pp.173-179
    • /
    • 2005
  • The continuous development of computing technique and network technology bring the explosive growth of the Internet, it accomplished the role which is import changes the base facility in the social whole and public infra, industrial infrastructure, culture on society-wide to Internet based environment. Recently the rapid development of information and technology environment is quick repeated the growth and a development which is really unexampled in the history but it has a be latent vulnerability, Therefore the damage from this vulnerability like worm, hacking increases continually. In this paper, in order to resolve this problem, implement the analysis system for harmful traffic for defending new types of attack and analyzing the traffic takes a real-time action against intrusion and harmful information packet.

  • PDF