• Title/Summary/Keyword: University information public

Search Result 5,915, Processing Time 0.035 seconds

Formation of Anti-Corruption Consciousness of Citizens as a Direction of Interaction of Public Authorities and Institutions of Civil Society

  • Shpak, Yurii;Bandura, Ivan;Primush, Roman;Dokalenko, Varvara;Abdullayev, Vagif
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.17-22
    • /
    • 2022
  • This article defines the process of formation of anti-corruption consciousness as one of the areas of interaction between public authorities and civil society institutions. It is concluded that the implementation of the state anti-corruption policy in Ukraine may be more promising if the institutions of civil society are actively involved. The degree of citizen engagement can be increased by increasing social trust, as well as by increasing the level of political and legal education and culture. Particular attention should be paid to the organization of public control and monitoring of the activities of public authorities, impartial coverage of information on the fight against corruption in the media, as well as the joint conduct of an information and educational campaign and the promotion of the formation of anti-corruption consciousness among a large number of citizens.

A Study for Identifying Current Drug Shortages of Public Hospitals and Improving Drug Shortage Information Delivery System (국공립병원 의약품 공급중단 현황 및 정보 전달체계 개선연구)

  • Kim, Daejin;Kwon, Kyenghee
    • YAKHAK HOEJI
    • /
    • v.57 no.2
    • /
    • pp.150-159
    • /
    • 2013
  • A study was performed to identify current drug shortages, assess impact of drug shortages on public hospitals and patients, and investigate needs of pharmacists for a drug shortage list. An e-mail survey was sent to the pharmacists of 13 national public hospitals. Total 61.5% of public hospitals has 10 or fewer drugs a year in short supply. Shortages involved mood drugs, anti-tumor drugs, analgesics, antibiotics and etc. in 2012. Among them 75.0% was prescription drugs and the other 25.0% was non-prescription drugs. 79.2% was domestic products and 20.8% was imported drugs. Only 12.5% was injections. Less than 3 pharmacists usually spent within 3 hours managing one drug shortage. Since a single item for a certain medicine may raise risk of drug shortages, it's needed to consider developing manuals, laying up medicine stocks and holding plural medicines for drug shortages in public hospitals. Main information resources of drug shortages are wholesalers or manufacturers. But the information appeared to be not only inadequate but also too late for appropriate activities. A survey of pharmacists revealed that overall 84.6% of respondents were in need of the drug shortage list. They expected it to be conducted to take proper measures for the drug shortage and to improve patient healthcare outcome and convenience. This study will contribute to improving public health by promoting stable supply of drugs and repairing the information delivery system.

Problems of Applying Information Technologies in Public Governance

  • Goshovska, Valentyna;Danylenko, Lydiia;Hachkov, Andrii;Paladiiichuk, Sergii;Dzeha, Volodymyr
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.71-78
    • /
    • 2021
  • The relevance of research provides the necessity to identify the basic problems in the public governance sphere and information technology relations, forasmuch as understanding such interconnections can indicate the consequences of the development and spreading information technologies. The purpose of the research is to outline the issues of applying information technologies in public governance sphere. 500 civil servants took part in the survey (Ukraine). A two-stage study was conducted in order to obtain practical results of the research. The first stage involved collecting and analyzing the responses of civil servants on the Mentimeter online platform. In the second stage, the administrator used the SWOT-analysis system. The tendencies in using information technologies have been determined as follows: the institutional support development; creation of analytical portals for ensuring public control; level of accountability, transparency, activity of civil servants; implementation of e-government projects; changing the philosophy of electronic services development. Considering the threats and risks to the public governance system in the context of applying information technologies, the following aspects generated by societal requirements have been identified, namely: creation of the digital bureaucracy system; preservation of information and digital inequality; insufficient level of knowledge and skills in the field of digital technologies, reducing the publicity of the state and municipal governance system. Weaknesses of modern public governance in the context of IT implementation have been highlighted, namely: "digitization for digitalization"; lack of necessary legal regulation; inefficiency of electronic document management (issues caused by the imperfection of the interface of reporting interactive forms, frequent changes in the composition of indicators in reporting forms, the desire of higher authorities to solve the problem of their introduction); lack of data analysis infrastructure (due to imperfections in the organization of interaction between departments and poor capacity of information resources; lack of analytical databases), lack of necessary digital competencies for civil servants. Based on the results of SWOT-analysis, the strengths have been identified as follows: (possibility of continuous communication; constant self-learning); weaknesses (age restrictions for civil servants; insufficient acquisition of knowledge); threats (system errors in the provision of services through automation); opportunities for the introduction of IT in the public governance system (broad global trends; facilitation of the document management system). The practical significance of the research lies in providing recommendations for eliminating the problems of IT implementation in the public governance sphere outlined by civil servants..

Knowledge Graph of Administrative Codes in Korea: The Case for Improving Data Quality and Interlinking of Public Data

  • Haklae Kim
    • Journal of Information Science Theory and Practice
    • /
    • v.11 no.3
    • /
    • pp.43-57
    • /
    • 2023
  • Government codes are created and utilized to streamline and standardize government administrative procedures. They are generally employed in government information systems. Because they are included in open datasets of public data, users must be able to understand them. However, information that can be used to comprehend administrative code is lost during the process of releasing data in the government system, making it difficult for data consumers to grasp the code and limiting the connection or convergence of different datasets that use the same code.This study proposes a way to employ the administrative code produced by the Korean government as a standard in a public data environment on a regular basis. Because consumers of public data are barred from accessing government systems, a means of universal access to administrative code is required. An ontology model is used to represent the administrative code's data structure and meaning, and the full administrative code is built as a knowledge graph. The knowledge graph thus created is used to assess the accuracy and connection of administrative codes in public data. The method proposed in this study has the potential to increase the quality of coded information in public data as well as data connectivity.

A Study on the Establishment of Integrated Health Information Service Model of Public Libraries

  • Noh, Younghee;Baek, Min-Kyung;Ro, Ji-Yoon
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.12 no.2
    • /
    • pp.57-75
    • /
    • 2022
  • Currently, it is not easy for most domestic public libraries to collect and provide reliable health information services on their own. Health information is distributed or professional, making it inconvenient for users to use. Based on the implications derived from the case study, the Library Health Information Integration Service Model was proposed as a specialized information service. The model consists of a composition shared by librarians, health and medical experts, and users, focusing on library websites that provide integrated health information integration services, and has the following features. First, it provides health and medical information on a specialized subject. Second, it provides integrated health and medical information services provided in various ways. Third, librarians and health and medical experts work together to provide information services. Fourth, users can freely use health information integration services online and offline. The model presented in this study means that libraries can play a leading role in health information integration services to increase the utilization rate of public libraries and further contribute to librarians serving as experts in health information services.

Perceived Relevance of Educative Information on Public (Skin) Health: A Cross-sectional Questionnaire Survey

  • Haluza, Daniela;Cervinka, Renate
    • Journal of Preventive Medicine and Public Health
    • /
    • v.46 no.2
    • /
    • pp.82-88
    • /
    • 2013
  • Objectives: Unprotected leisure time exposure to ultraviolet radiation from the sun or artificial tanning beds is the most important environmental risk factor for melanoma, a malignant skin cancer with increasing incidences over the past decades. The aim of the present study was to assess the impact of skin health information provided by several sources and different publishing issues on knowledge, risk perception, and sun protective behavior of sunbathers. Methods: A cross-sectional questionnaire survey was conducted among Austrian residents (n=563) spending leisure time outdoors in August 2010. Results: Print media, television, and family were perceived as the most relevant sources of information on skin health, whereas the source physician was only ranked as fourth important source. Compared to other sources, information provided by doctors positively influenced participants' knowledge on skin risk and sun protective behavior resulting in higher scores in the knowledge test (p=0.009), higher risk perception (p<0.001), and more sun protection (p<0.001). Regarding gender differences, internet was more often used by males as health information source, whereas females were more familiar with printed information material in general. Conclusions: The results of this survey put emphasis on the demand for information provided by medical professionals in order to attain effective, long-lasting promotion of photoprotective habits.

IS Quality, Practical Use and Performance in Public Sector

  • Lee, Young-Hee;Kim, Gi-Baek;Lee, Jun-Young;Lee, Jung-Woo
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.851-856
    • /
    • 2007
  • Continuously monitoring and improving information system (IS) performance is a major concern in organizations. Thanks to invisible characteristics of IS performance, this is still enduring research question. The purpose of this study is to examine and analyze factors influencing IS Performance in public sector. Influencing factors of IS performance include IS quality such as System Quality, Information Quality and IS Use. The data for analysis was collected from local official in Korea. We used PLS 3.00 Version for an analysis. Analysis revealed that Information Quality has directly influenced IS Use. But there were not Significant in relations between System Quality and IS Performance, System Quality and IS Use, System Quality and IS Performance, and IS Use and IS Performance.

  • PDF

WHICH INFORMATION MOVES PRICES: EVIDENCE FROM DAYS WITH DIVIDEND AND EARNINGS ANNOUNCEMENTS AND INSIDER TRADING

  • Kim, Chan-Wung;Lee, Jae-Ha
    • The Korean Journal of Financial Studies
    • /
    • v.3 no.1
    • /
    • pp.233-265
    • /
    • 1996
  • We examine the impact of public and private information on price movements using the thirty DJIA stocks and twenty-one NASDAQ stocks. We find that the standard deviation of daily returns on information days (dividend announcement, earnings announcement, insider purchase, or insider sale) is much higher than on no-information days. Both public information matters at the NYSE, probably due to masked identification of insiders. Earnings announcement has the greatest impact for both DJIA and NASDAQ stocks, and there is some evidence of positive impact of insider asle on return volatility of NASDAQ stocks. There has been considerable debate, e.g., French and Roll (1986), over whether market volatility is due to public information or private information-the latter gathered through costly search and only revealed through trading. Public information is composed of (1) marketwide public information such as regularly scheduled federal economic announcements (e.g., employment, GNP, leading indicators) and (2) company-specific public information such as dividend and earnings announcements. Policy makers and corporate insiders have a better access to marketwide private information (e.g., a new monetary policy decision made in the Federal Reserve Board meeting) and company-specific private information, respectively, compated to the general public. Ederington and Lee (1993) show that marketwide public information accounts for most of the observed volatility patterns in interest rate and foreign exchange futures markets. Company-specific public information is explored by Patell and Wolfson (1984) and Jennings and Starks (1985). They show that dividend and earnings announcements induce higher than normal volatility in equity prices. Kyle (1985), Admati and Pfleiderer (1988), Barclay, Litzenberger and Warner (1990), Foster and Viswanathan (1990), Back (1992), and Barclay and Warner (1993) show that the private information help by informed traders and revealed through trading influences market volatility. Cornell and Sirri (1992)' and Meulbroek (1992) investigate the actual insider trading activities in a tender offer case and the prosecuted illegal trading cased, respectively. This paper examines the aggregate and individual impact of marketwide information, company-specific public information, and company-specific private information on equity prices. Specifically, we use the thirty common stocks in the Dow Jones Industrial Average (DJIA) and twenty one National Association of Securities Dealers Automated Quotations (NASDAQ) common stocks to examine how their prices react to information. Marketwide information (public and private) is estimated by the movement in the Standard and Poors (S & P) 500 Index price for the DJIA stocks and the movement in the NASDAQ Composite Index price for the NASDAQ stocks. Divedend and earnings announcements are used as a subset of company-specific public information. The trading activity of corporate insiders (major corporate officers, members of the board of directors, and owners of at least 10 percent of any equity class) with an access to private information can be cannot legally trade on private information. Therefore, most insider transactions are not necessarily based on private information. Nevertheless, we hypothesize that market participants observe how insiders trade in order to infer any information that they cannot possess because insiders tend to buy (sell) when they have good (bad) information about their company. For example, Damodaran and Liu (1993) show that insiders of real estate investment trusts buy (sell) after they receive favorable (unfavorable) appraisal news before the information in these appraisals is released to the public. Price discovery in a competitive multiple-dealership market (NASDAQ) would be different from that in a monopolistic specialist system (NYSE). Consequently, we hypothesize that NASDAQ stocks are affected more by private information (or more precisely, insider trading) than the DJIA stocks. In the next section, we describe our choices of the fifty-one stocks and the public and private information set. We also discuss institutional differences between the NYSE and the NASDAQ market. In Section II, we examine the implications of public and private information for the volatility of daily returns of each stock. In Section III, we turn to the question of the relative importance of individual elements of our information set. Further analysis of the five DJIA stocks and the four NASDAQ stocks that are most sensitive to earnings announcements is given in Section IV, and our results are summarized in Section V.

  • PDF

Certificateless Public Key Encryption Revisited: Security Model and Construction (무인증서 공개키 암호 기법의 재고: 안전성 모델 및 설계)

  • Kim, Songyi;Park, Seunghwan;Lee, Kwangsu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.6
    • /
    • pp.1109-1122
    • /
    • 2016
  • Certificateless public key cryptography is a technique that can solve the certificate management problem of a public key cryptosystem and clear the key escrow issue of ID-based cryptography using the public key in user ID. Although the studies were actively in progress, many existing schemes have been designed without taking into account the safety of the secret value with the decryption key exposure attacks. If previous secret values and decryption keys are exposed after replacing public key, a valid private key can be calculated by obtaining the partial private key corresponding to user's ID. In this paper, we propose a new security model which ensures the security against the key exposure attacks and show that several certificateless public key encryption schemes are insecure in the proposed security model. In addition, we design a certificateless public key encryption scheme to be secure in the proposed security model and prove it based on the DBDH(Decisional Bilinear Diffie-Hellman) assumption.

Public Key Encryption with Equality Test with Designated Tester (고정된 검사자를 고려한 메시지 동일성 검사 공개키 암호시스템)

  • Lee, Young-Min;Koo, Woo-Kwon;Rhee, Hyun-Sook;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.3-13
    • /
    • 2011
  • In 2004, Boneh et.al. proposed a public key encryption with keyword search (PEKS) scheme which enables a server to test whether a keyword used in generating a ciphertext by a sender is identical to a keyword used in generating a query by a receiver or not. Yang et. al. proposed a probabilistic public key encryption with equality test (PEET) scheme which enables to test whether one message of ciphertext generated by one public key is identical to the other message generated by the other public key or not. If the message is replaced to a keyword, PEET is not secure against keyword guessing attacks and does not satisfy IND-CP A security which is generally considered in searchable encryption schemes. In this paper, we propose a public key encryption with equality test with designated tester (dPEET) which is secure against keyword guessing attacks and achieves IND-CPA security.