• Title/Summary/Keyword: communication behaviors

Search Result 662, Processing Time 0.03 seconds

Clinical Characteristics According to the Presence of Restricted, Repetitive Behaviors and Interests in Children with High Functioning Autism Spectrum Disorder (고기능 자폐스펙트럼장애에서 제한된 관심과 반복적인 행동 유무에 따른 임상 양상의 차이)

  • Lee, Sumin;Lee, Kyung-Mi;Yoo, Hee Jeong
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • v.25 no.4
    • /
    • pp.187-195
    • /
    • 2014
  • Objectives : The objective of this study was to investigate the relationship between restricted, repetitive behaviors and interests (RRBI) and autistic symptoms in Korean high functioning autism spectrum disorder (ASD) children and to examine the structure of RRBI. Methods : Participants included 147 high functioning ASD subjects and 181 unaffected siblings. ASD subjects were divided into two groups based on the presence of RRBI. The domain scores of the Korean version of Autism Diagnostic Interview-Revised (K-ADI-R), Korean version of Asperger Syndrome Diagnostic Scale and total scores of Korean translated version of Social Responsiveness Scale, Korean version of Social Communication Scale were used for comparison of ASD symptoms between the groups. Eleven items from the RRBI domain of the K-ADI-R were used in principal axis factor analysis (PAF). Results : A statistically lower nonverbal IQ score was observed for ASD with RRBI than for ASD without RRBIs, and more social deficit, communication deficit, and behavioral and emotional problems were observed for ASD with RRBI compared to ASD without RRBI. Using PAF, two distinct factors were identified. 'Resistance to trivial changes in environment', 'Difficulty with minor changes in personal routine & environment', and 'Compulsion/ritual' were included as one factor. Conclusion : Analysis of the data suggests that the presence of RRBI in high functioning ASD is associated with a more severe presentation of autistic disorder. In addition, there appears to be heterogeneity within RRBI in autism except insistence on sameness.

The Exploratory Study on the Impact of User's Characteristics and Use Behaviors on Personal Cloud Service Use (이용자 특성과 이용행태가 개인형 클라우드 서비스 이용에 미치는 영향에 관한 탐색적 연구)

  • Kim, Dong-Woo;Pyo, Si-Young;Joung, Won-Jo
    • Journal of Broadcast Engineering
    • /
    • v.19 no.1
    • /
    • pp.3-13
    • /
    • 2014
  • This study as an exploratory study, investigates personal cloud service use which has been developed and distributed rapidly. Focusing on the user's characteristics and use behaviors, the influences of connected uses of platform and contents are empirically figured out. The results show that the contents which need small-data capacity like pictures and musics have been used very frequently in a cloud service. Second, 'platform-connected use' has been found out as the most influential factor in cloud service. SNS, e-mail, and personal innovativeness are also proved as significant factors. As a leading study analyzing theoretically the personal cloud service, it implies that it is necessary to consider the user's characteristics and use behaviors in developing cloud service in the market and making policy for promoting relevant industry.

Effects of Women's SNS Uses on Alternative Health Management Behaviors: Application of Health Belief Model on the Adoption of Alternative Menstrual Products (여성의 SNS 이용이 대안 건강 행동에 미치는 영향: 건강신념모델에 기초한 대안 생리대 사용 의도를 중심으로)

  • Kim, Chong-Hye;Cho, Jaehee
    • Journal of Internet Computing and Services
    • /
    • v.19 no.4
    • /
    • pp.83-93
    • /
    • 2018
  • This study analyzed the effects of women's SNS use on their alternative behaviors of managing health. This study paid attention to how women's behaviors of seeking information about poisonous menstrual products and alternative menstrual products would impact their intention to use alternative menstrual products. Mainly based on health belief model, 11 hypotheses were created and tested through a path analysis of survey data. Results from the path analysis indicated that SNS information about menstrual products were significantly associated with perceived advantage of alternative menstrual products and perceived sensitivity of poisonous menstrual products. In addition, four main factors-self-efficacy, perceived sensitivity, perceived advantage, and perceived disadvantage-were significantly associated with women's intention to use alternative menstrual products.

Factors that Affect the Suicidal Thoughts of High School Students in Korea: Focusing on the Socio-demographic Characteristics and Delinquent Behaviors (한국 고등학생의 자살 생각에 영향을 미치는 요인에 관한 연구 : 인구사회학적 특성 요인과 일탈행동 요인을 중심으로)

  • Lee, Hong-Jik;Kim, Kwang-Sun;Kim, Kwang-Hoi;Nam, Gil-Woo;Min, Kyeong-Won;Lee, Sam-Soon;Jeong, Chan-Hee;Lee, Hyun-Sook;Park, Ji-Hyun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.7
    • /
    • pp.1025-1032
    • /
    • 2013
  • The purpose of this study was to examine how socio-demographic characteristics and delinquent behaviors affect the suicidal ideation among the Korean high school students. Using the 35,668 senior high school student cases of 2009 Korean Youth Health Risk Behavior On-line Survey data, it conducted a secondary data analysis. Frequency analysis, chi-square test and logistic regression analysis was done. Being female, living without parents, low economic status, poor academic record, technical school students, young students, poor academic record, internet addition, problem drinking, smoking cigarettes and experience of drug use significantly increased probability of their suicidal thoughts. Findings may be used for tackle the issues of suicidal thoughts among the Korean senior high school students.

Implementation of a Classification System for Dog Behaviors using YOLI-based Object Detection and a Node.js Server (YOLO 기반 개체 검출과 Node.js 서버를 이용한 반려견 행동 분류 시스템 구현)

  • Jo, Yong-Hwa;Lee, Hyuek-Jae;Kim, Young-Hun
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.21 no.1
    • /
    • pp.29-37
    • /
    • 2020
  • This paper implements a method of extracting an object about a dog through real-time image analysis and classifying dog behaviors from the extracted images. The Darknet YOLO was used to detect dog objects, and the Teachable Machine provided by Google was used to classify behavior patterns from the extracted images. The trained Teachable Machine is saved in Google Drive and can be used by ml5.js implemented on a node.js server. By implementing an interactive web server using a socket.io module on the node.js server, the classified results are transmitted to the user's smart phone or PC in real time so that it can be checked anytime, anywhere.

An Exploratory Factor Analysis on the Collaborative Information Behaviors of an Online Community Responding to the MV Sewol Tragedy (세월호 비극에 대한 온라인 커뮤니티의 협력적 정보행동에 관한 탐색적 요인 분석 연구)

  • Jisue Lee
    • Journal of Korean Library and Information Science Society
    • /
    • v.54 no.1
    • /
    • pp.191-220
    • /
    • 2023
  • This research attempts to identify how members of an online community collaboratively engaged with particular social information behaviors and accomplished a defined collective action. While responding to the Sewol Ferry tragedy, MissyUSA members quickly communicated and mobilized a collective action, a full-page ad campaign in The New York Times. As a follow up study, this secondary analysis quantitatively analyzes the primary data from a previous study to explore potential relationships or underlying factors among the various identified information behaviors. In this study, nineteen of the previously identified information behaviors were analyzed using exploratory factor analysis, yielding a total of eight factors. The two major factors of shared representation/collective identification and mobilizing resources verified the findings of the previous study and are in line with the findings typical of political science. The three factors of collaborative decision-making, reaction to tension, and brainstorming were factors that maximized communication and mobilization online, without any face-to-face communication or physical organization. Three emergent factors of outburst of dissent, boycott, and planning explained how members used negative emotions of anger, referential information for boycott, and incubated next collective actions. Through exploratory factor analysis, this study verifies and expands on the findings of the previous study by identifying several emergent factors that relate to the collaborative information behaviors of an online community engaged in a collective action.

Clinical Implications of Social Communication Disorder (사회적 의사소통장애의 임상적 이해)

  • Shin, Suk-Ho
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • v.28 no.4
    • /
    • pp.192-196
    • /
    • 2017
  • Social (pragmatic) communication disorder (SCD) is a new diagnosis included under communication disorders in the neurodevelopmental disorders section of Diagnostic and Statistical Manual of Mental Disorders-5. SCD is defined as a primary deficit in the social use of nonverbal and verbal communication. SCD has very much in common with pragmatic language impairment, which is characterized by difficulties in understanding and using language in context and following the social rules of language, despite relative strengths in word knowledge and grammar. SCD and Autism Spectrum Disorder (ASD) are similar in that they both involve deficits in social communication skills, however individuals with SCD do not demonstrate restricted interests, repetitive behaviors, insistence on sameness, or sensory abnormalities. It is essential to rule out a diagnosis of ASD by verifying the lack of these additional symptoms, current or past. The criteria for SCD are qualitatively different from those of ASD and are not equivalent to those of mild ASD. It is clinically important that SCD should be differentiated from high-functioning ASD (such as Asperger syndrome) and nonverbal learning disabilities. The ultimate goals are the refinement of the conceptualization, development and validation of assessment tools and interventions, and obtaining a comprehensive understanding of the shared and unique etiologic factors for SCD in relation to those of other neurodevelopmental disorders.

Enhancing VANET Security: Efficient Communication and Wormhole Attack Detection using VDTN Protocol and TD3 Algorithm

  • Vamshi Krishna. K;Ganesh Reddy K
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.1
    • /
    • pp.233-262
    • /
    • 2024
  • Due to the rapid evolution of vehicular ad hoc networks (VANETs), effective communication and security are now essential components in providing secure and reliable vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication. However, due to their dynamic nature and potential threats, VANETs need to have strong security mechanisms. This paper presents a novel approach to improve VANET security by combining the Vehicular Delay-Tolerant Network (VDTN) protocol with the Deep Reinforcement Learning (DRL) technique known as the Twin Delayed Deep Deterministic Policy Gradient (TD3) algorithm. A store-carry-forward method is used by the VDTN protocol to resolve the problems caused by inconsistent connectivity and disturbances in VANETs. The TD3 algorithm is employed for capturing and detecting Worm Hole Attack (WHA) behaviors in VANETs, thereby enhancing security measures. By combining these components, it is possible to create trustworthy and effective communication channels as well as successfully detect and stop rushing attacks inside the VANET. Extensive evaluations and simulations demonstrate the effectiveness of the proposed approach, enhancing both security and communication efficiency.

Using Design to Make Doffing of Personal Protective Equipment Safer for Healthcare Workers (의료종사자의 안전한 개인보호장비 탈의를 위한 공간 설계에 관한 연구)

  • Matic, Zorana;Oh, Yeinn;Lim, Lisa
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.26 no.3
    • /
    • pp.17-26
    • /
    • 2020
  • Purpose: This paper presents research evidence that the environmental design of the doffing area in a biocontainment unit (BCU) can have a measurable impact on increasing the safety of frontline healthcare workers (HCW) during doffing of high-level personal protective equipment (PPE), and proposes optimized biocontainment unit design. Methods: From 2016 to 2019, The SimTigrate Design Lab conducted 3 consecutive studies, focusing on ways in which the built environment may support or hinder safe doffing. In the first study, to identify the risky behaviors, we observed 56 simulation exercises with HCWs in 4 BCUs and 1 high-fidelity BCU mockup. In the second study, we tested the effectiveness of a redesigned doffing area on improving the HCWs performance and used simulation, observation, and rapid prototyping in 1 high-fidelity mockup of a doffing area. In a follow-up study, we used simulation and co-design with HCWs to optimize the design of a safer doffing area in a full-size pediatric BCU mock-up. Results: We identified 11 specific risky behaviors potentially leading to occupational injury, or contamination of the PPE, or of the environment. We developed design strategies to create a space for safer doffing. In the second study, in a redesigned doffing area, the overall performance of HCW improved, and we observed a significant decrease in the number of risky behaviors; some risky behaviors were eliminated. There was a significant decrease in physical and cognitive load for the HCWs. Finally, we propose an optimized layout of a BCU for a safer process of PPE doffing. Implications: The proposed BCU design supports better staff communication, efficiency, and automates safer behaviors. Our findings can be used to develop design guidelines for spaces where patients with other highly infectious diseases are treated when the safety of the patient-facing HCWs is of critical importance.

The Defense Strategies against Consumer Unethical Behaviors (소비자의 비윤리적 행동에 대한 방어전략)

  • Lee, Un-Kon;Park, Jong Pil;Choi, Young Eun;Oh, Yonghui
    • The Journal of Society for e-Business Studies
    • /
    • v.17 no.4
    • /
    • pp.17-37
    • /
    • 2012
  • The evolution of the IT facilitated the social actions of the consumers by supporting social communication of the online users. At the same time it help for the consumer to post malicious comments on the Internet or to spread the unproven news for distorting the public opinion in the SNSs. Although the number of the consumer unethical behaviors and the estimated damage of the innocent companies have been increased, a few studies had investigate on this issue. Based on the Literature on the consumer unethical behaviors and the institution based trust, we had developed the defense strategies against the consumer unethical behaviors. This study would introduce the new perspective that the consumer could always not be innocent. Also, the defense strategy developed in this study could contribute to make the guideline for consumer service manual.