• Title/Summary/Keyword: Web 2.0 Tools

Search Result 66, Processing Time 0.027 seconds

Development and Evaluation of a Web-based Simulation Program on Patient Rights Education using Integrated Decision Making Model for Nurse Students (가치통합 의사결정모델을 이용한 간호학생 대상 웹기반 환자권리교육 시뮬레이션 프로그램 개발 및 평가)

  • Kim, Ki-Kyong
    • Journal of Korean Academy of Nursing Administration
    • /
    • v.20 no.2
    • /
    • pp.227-236
    • /
    • 2014
  • Purpose: This study was designed to develop and evaluate the a web-based simulation program on patient rights education using integrated decision making model into values clarification for nurse students. Methods: The program was designed based on the Aless & Trollip model and Ford, Trygstad-Durland & Nelms's decision model. Focus groups interviews, surveys on learning needs for patient rights, and specialist interviews were used to develop for simulation scenarios and decision making modules. The simulation program was evaluated between May, 2011 and April, 2012 by 30 student nurses using an application of the web-based program evaluation tools by Chung. Results: Simulation content was composed of two scenarios on patient rights: the rights of patients with HIV and the rights of psychiatric patients. It was composed of two decision making modules which were established for value clarifications, behavioral objective formations, problems identifications, option generations, alternatives analysis, and decision evaluations. The simulation program was composed of screens for teacher and learner. The program was positively evaluated with a mean score of $3.14{\pm}0.33$. Conclusion: These study results make an important contribution to the application of educational simulation programs for nurse students' behavior and their decision making ability in protecting the patient rights.

Word-of-Mouth Redefined: A Profile of Influencers in the Travel and Tourism Industry

  • George, Richard;Stainton, Hayley;Adu-Ampong, Emmanuel
    • Journal of Smart Tourism
    • /
    • v.1 no.3
    • /
    • pp.31-44
    • /
    • 2021
  • The emergence of the digital economy and easy accessibility to Web 2.0 tools has seen an expansion of the influencer ecosystem within the travel and tourism industry. Founded on the principles of reference groups and peer reference there is a growing trend amongst industry practitioners who are now opting to move away from many of the traditional approaches used to market their products and services and are instead taking advantage of the concept of e-word-of-mouth (eWOM). Whilst there is a growing body of academic literature addressing the notion of influencer marketing, there is little understanding of influencer marketers themselves. Consequentially, this study addresses this gap in the literature through the quantitative examination of those who promote products, services, or companies by distributing eWOM through their online digital channels and presence; otherwise known as travel influencers. A quantitative research approach involving an online survey yielded 255 responses from travel influencers. The research findings indicate that those who work in this field prefer not to be awarded the label "travel influencer," focusing instead on their specific method of influencing, such as blogging and vlogging or sharing Instagram updates. The research also demonstrates how the new influencers have a strong role in generating travel urge and desire. The research contributes to the wider body of academic literature and travel industry practitioners by establishing the general profile of influencers and their increasingly specialized role in tourism and hospitality marketing.

Development 2.0: Principles and Warnings for Leveraging Advances in Information Communication Technologies for Improved Development Efforts

  • Kang, Christina Soyeon;Lal, Bhavya
    • STI Policy Review
    • /
    • v.1 no.3
    • /
    • pp.25-37
    • /
    • 2010
  • Advances in Information Communication Technologies (ICT) have demonstrated tremendous potential for solving development challenges and improving development processes, culminating in the new Development 2.0. Many development practitioners have embraced ICT (particularly on Web 2.0 and mobile phone technologies and applications), which have become hot topics in both the development community and the policy community as they engage in development practice and dialogue. Despite this excitement, there lacks among the policy community a robust understanding of the powers and pitfalls of ICT in development, executed actions to back the excited chatter, and dissemination of this understanding to practitioners and policymakers alike. We conducted a literature review, interviewed experts, and engaged in discussion with leaders in international development and science and technology policy to provide an operational framework base in which to view ICT in development. This framework regards ICT as tools that support more effective and efficient community development actions and appropriate consideration of general guidelines, which enable better engagement across and within sectors and individuals. Flexibility and accountability are critical requirements pervading throughout the various actions and guidelines, which promote transparent, partnership-based, and sustainable development. We highlight the strengths and weaknesses of ICT to focus on the cautions to keep ICT access and distribution in context, understand the various levels of technologies and services, and dig below the surface as excitement about ICT increases and threatens to become a short-term solution. We offer ideas for specific programs that policymakers can implement to contribute to a more efficient and effective development process to ultimately support global human development, but stress the endless possibilities that can be explored with creativity and flexibility beyond what is proposed here.

Managing Scheme for 3-dimensional Geo-features using XML

  • Kim, Kyong-Ho;Choe, Seung-Keol;Lee, Jong-Hun;Yang, Young-Kyu
    • Proceedings of the Korean Association of Geographic Inforamtion Studies Conference
    • /
    • 1999.12a
    • /
    • pp.47-51
    • /
    • 1999
  • Geo-features play a key role in object-oriented or feature-based geo-processing system. So the strategy for how-to-model and how-to-manage the geo-features builds the main architecture of the entire system and also supports the efficiency and functionality of the system. Unlike the conventional 2D geo-processing system, geo-features in 3D GIS have lots to be considered to model regarding the efficient manipulation and analysis and visualization. When the system is running on the Web, it should also be considered that how to leverage the level of detail and the level of automation of modeling in addition to the support for client side data interoperability. We built a set of 3D geo-features, and each geo-feature contains a set of aspatial data and 3D geo-primitives. The 3D geo-primitives contain the fundamental modeling data such as the height of building and the burial depth of gas pipeline. We separated the additional modeling data on the geometry and appearance of the model from the fundamental modeling data to make the table in database more concise and to allow the users more freedom to represent the geo-object. To get the users to build and exchange their own data, we devised a fie format called VGFF 2.0 which stands for Virtual GIS File Format. It is to describe the three dimensional geo-information in XML(extensible Markup Language). The DTD(Document Type Definition) of VGFF 2.0 is parsed using the DOM(Document Object Model). We also developed the authoring tools for users can make their own 3D geo-features and model and save the data to VGFF 2.0 format. We are now expecting the VGFF 2.0 evolve to the 3D version of SVG(Scalable Vector Graphics) especially for 3D GIS on the Web.

  • PDF

Participatory Web Users’ Information Activities and Credibility Assessment

  • Rieh, Soo-Young
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.44 no.4
    • /
    • pp.155-178
    • /
    • 2010
  • Assessment of information credibility is a ubiquitous human activity given that people constantly make decisions and selections based on the value of information in a variety of information seeking and use contexts. Today, people are increasingly engaging in diverse online activities beyond searching for and reading information, including activities such as creating, tagging and rating content, shopping, and listening to and watching multimedia content. The Web 2.0 environment presents new challenges for people because the burden of information evaluation is shifted from professional gatekeepers to individual information consumers. At the same time, however, it also provides unprecedented opportunities for people to use tools and features that help them to make informed credibility judgments by relying on other people's ratings and recommendations. This paper introduces fundamental notions and dimensions of credibility, and contends that credibility assessment can be best understood with respect to human information behavior because it encompasses both the level of effort people exert as well as the heuristics they employ to evaluate information. The paper reports on a survey study investigating people's credibility judgments with respect to online information, focusing on the constructs, heuristics, and interactions involved in people's credibility assessment processes within the context of their everyday life information activities. Using an online activity diary method, empirical data about people's online activities and their associated credibility assessments were collected at multiple points throughout the day for three days. The results indicate that distinct credibility assessment heuristics are emerging as people engage in diverse online activities involving more user-generated and multimedia content. A heuristic approach suggests that people apply mental shortcuts or rules of thumb in order to minimize the amount of cognitive effort and time required to make credibility judgments. The paper discusses why a heuristic approach is key to reaching a more comprehensive understanding of people's credibility assessments within the information-abundant online environment.

Meta-analysis of the Application Effect of AI Educational Robots in Teaching in the New Period (새로운 시대의 교육에서 AI 교육 로봇의 응용 효과에 대한 메타 분석)

  • Cui, Jian-Dong;Song, Seung-keun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.52-54
    • /
    • 2021
  • With the advent of the era of artificial intelligence, robot education and teaching under its empowerment have been widely concerned and applied worldwide. The purpose of this study: systematically evaluate the application effect of AI educational robots in student education and teaching; the method of this study: use the computer to search for relevant education in the search tools such as "Web of Science", "CNKI", "ERIC", "IEEE" A comparative study of the effects of robot teaching and traditional teaching. The retrieval time is from January 2000 to January 2020. Comprehensive MetaAnalysis 2.0 was used for Meta analysis. The results of this study: A quantitative analysis of the 31 valid research literatures included, and an objective evaluation of the effect of the meta-analysis on AI educational robots. The analysis results show that the combined effect of AI educational robots on student learning effects is 0.465 This indicates that educational robots have a moderately positive effect on students 'learning effectiveness. The conclusion of this study: The application effect of AI educational robots in student education and teaching is better than traditional education methods, which can better promote student learning.

  • PDF

LoGos: Internet-Explorer-Based Malicious Webpage Detection

  • Kim, Sungjin;Kim, Sungkyu;Kim, Dohoon
    • ETRI Journal
    • /
    • v.39 no.3
    • /
    • pp.406-416
    • /
    • 2017
  • Malware propagated via the World Wide Web is one of the most dangerous tools in the realm of cyber-attacks. Its methodologies are effective, relatively easy to use, and are developing constantly in an unexpected manner. As a result, rapidly detecting malware propagation websites from a myriad of webpages is a difficult task. In this paper, we present LoGos, an automated high-interaction dynamic analyzer optimized for a browser-based Windows virtual machine environment. LoGos utilizes Internet Explorer injection and API hooks, and scrutinizes malicious behaviors such as new network connections, unused open ports, registry modifications, and file creation. Based on the obtained results, LoGos can determine the maliciousness level. This model forms a very lightweight system. Thus, it is approximately 10 to 18 times faster than systems proposed in previous work. In addition, it provides high detection rates that are equal to those of state-of-the-art tools. LoGos is a closed tool that can detect an extensive array of malicious webpages. We prove the efficiency and effectiveness of the tool by analyzing almost 0.36 M domains and 3.2 M webpages on a daily basis.

Government Website Accessibility: Comparison between Korea and the United States (한국과 미국 정부기관의 웹사이트 접근성 평가)

  • Hong, Soon-Goo;Cho, Jae-Hyung;Lee, Dae-Hyung
    • Information Systems Review
    • /
    • v.7 no.1
    • /
    • pp.81-96
    • /
    • 2005
  • Because the web sites are in common today, the access to the web for disabled people and old aging people, what we call accessibility, becomes more important. Even though efforts to reduce the informational gap resulted from the lack of the accessibility have been carried out, the studies in this field in Korea are not still in popular. In this study, previous research on the measurements for the accessibility is reviewed and then a new model measuring accessibility is suggested. To increase the validity of the measurement, both an automated tool and a manual test are employed. First we used the 'A-Prompt', one of the popular automated validation tools and analyzed web sources, and applied manual tests by HPR Screen Reader. With the error rates calculated, the accessibility of the government web sites between Korea and the United States was compared and finally the conclusions were drawn.

Text Mining and Visualization of Papers Reviews Using R Language

  • Li, Jiapei;Shin, Seong Yoon;Lee, Hyun Chang
    • Journal of information and communication convergence engineering
    • /
    • v.15 no.3
    • /
    • pp.170-174
    • /
    • 2017
  • Nowadays, people share and discuss scientific papers on social media such as the Web 2.0, big data, online forums, blogs, Twitter, Facebook and scholar community, etc. In addition to a variety of metrics such as numbers of citation, download, recommendation, etc., paper review text is also one of the effective resources for the study of scientific impact. The social media tools improve the research process: recording a series online scholarly behaviors. This paper aims to research the huge amount of paper reviews which have generated in the social media platforms to explore the implicit information about research papers. We implemented and shown the result of text mining on review texts using R language. And we found that Zika virus was the research hotspot and association research methods were widely used in 2016. We also mined the news review about one paper and derived the public opinion.

A bioinformatics approach to characterize a hypothetical protein Q6S8D9_SARS of SARS-CoV

  • Md Foyzur Rahman;Rubait Hasan;Mohammad Shahangir Biswas;Jamiatul Husna Shathi;Md Faruk Hossain;Aoulia Yeasmin;Mohammad Zakerin Abedin;Md Tofazzal Hossain
    • Genomics & Informatics
    • /
    • v.21 no.1
    • /
    • pp.3.1-3.10
    • /
    • 2023
  • Characterization as well as prediction of the secondary and tertiary structure of hypothetical proteins from their amino acid sequences uploaded in databases by in silico approach are the critical issues in computational biology. Severe acute respiratory syndrome-associated coronavirus (SARS-CoV), which is responsible for pneumonia alike diseases, possesses a wide range of proteins of which many are still uncharacterized. The current study was conducted to reveal the physicochemical characteristics and structures of an uncharacterized protein Q6S8D9_SARS of SARS-CoV. Following the common flowchart of characterizing a hypothetical protein, several sophisticated computerized tools e.g., ExPASy Protparam, CD Search, SOPMA, PSIPRED, HHpred, etc. were employed to discover the functions and structures of Q6S8D9_SARS. After delineating the secondary and tertiary structures of the protein, some quality evaluating tools e.g., PROCHECK, ProSA-web etc. were performed to assess the structures and later the active site was identified also by CASTp v.3.0. The protein contains more negatively charged residues than positively charged residues and a high aliphatic index value which make the protein more stable. The 2D and 3D structures modeled by several bioinformatics tools ensured that the proteins had domain in it which indicated it was functional protein having the ability to trouble host antiviral inflammatory cytokine and interferon production pathways. Moreover, active site was found in the protein where ligand could bind. The study was aimed to unveil the features and structures of an uncharacterized protein of SARS-CoV which can be a therapeutic target for development of vaccines against the virus. Further research are needed to accomplish the task.