• Title/Summary/Keyword: personal information collection

Search Result 237, Processing Time 0.028 seconds

119 Emergency Medical Technicians' Infection Control Education Status, Stress, and Needs related to Emerging Infectious Diseases

  • Dong-Min Shin;Byung-Jun Cho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.12
    • /
    • pp.201-209
    • /
    • 2023
  • This study investigated to provide basic data for infection control education on new infectious diseases by confirming the level of knowledge, training status, stress, and need for training on new infectious diseases for 119 emergency medical technicians (EMT). This data collection period was a total of 39 days from August 10 to September 18, 2022, and a total of 105 copies were collected. The analysis of this study used the SPSS 25.0 program. As a result of the study, among the 119 paramedics, the gender of the EMT was 54 men (51.4%) and 51 women (48.6%), with more men than women, with 47 people in their 20s (44.8%) and those in their 30s or older. There were 58 people (55.2%), most of whom were in their 30s or older. The highest total work experience was 3 to 5 years (37 people (35.2%)). In the pandemic situation, an attempt was made to check the education status of 119 paramedics on COVID-19 and the need for education on new infectious diseases. As a result of the study, the status of education on COVID-19 was insufficient. The demand for education on new infectious diseases was found to be high. Among 119 emergency responders who are frequently exposed to new infectious diseases, theoretical and practical training in personal protective equipment, stress, including theoretical training, is needed. A theoretical and practical education program on new infectious diseases and personal protective equipment should be developed as a subject for college students before becoming EMT.

Awareness and Practice of Patients' Health Information Protection of Nursing Students (간호대학생의 의료정보보호에 대한 인식도와 실천도)

  • Kim, Eun-Young;Lim, Kyoung-Suk
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.121-132
    • /
    • 2017
  • This study is a narrative research study to understand the degree of awareness and practice of nursing college students' patients' health information protection and to grasp the relationship between them.. The subjects of this study were 122 nursing college students who experienced clinical practice in two nursing colleges in GwangJu city. Data collection was done from October 13 to 28, 2017. Using SPSS/WIN 21.0 Program, descriptive statistics, t-test, one-way ANOVA and Pearson correlation analysis were performed. As a result of the study, the degree of awareness and practicability of patient' health information protection were 4.44(SD=0.44) and 4.28(SD=0.62), respectively. There was a difference in the awareness of health information protection when they were educated about patients' health information protection at school (t=5.094, p<.001) and hospital (t=2.028, p=.045) in the case of having experience in patients' health information protection in hospitals(t=2.551, p=.012). There was a significant positive(+)correlation between patient's health information protection perception and practicing degree, and the degree of health information protection practitioner's communication domain (r=.420, p<.001). There was a significant positive correlation with the domain (r=.368, p<.001) and the referral domain (r=.304, p=.001). Based on these results, we sought to protect the personal information of patients and to provide necessary basic data to develop for standardized education program.

Legal Issues on the Collection and Utilization of Infectious Disease Data in the Infectious Disease Crisis (감염병 위기 상황에서 감염병 데이터의 수집 및 활용에 관한 법적 쟁점 -미국 감염병 데이터 수집 및 활용 절차를 참조 사례로 하여-)

  • Kim, Jae Sun
    • The Korean Society of Law and Medicine
    • /
    • v.23 no.4
    • /
    • pp.29-74
    • /
    • 2022
  • As social disasters occur under the Disaster Management Act, which can damage the people's "life, body, and property" due to the rapid spread and spread of unexpected COVID-19 infectious diseases in 2020, information collected through inspection and reporting of infectious disease pathogens (Article 11), epidemiological investigation (Article 18), epidemiological investigation for vaccination (Article 29), artificial technology, and prevention policy Decision), (3) It was used as an important basis for decision-making in the context of an infectious disease crisis, such as promoting vaccination and understanding the current status of damage. In addition, medical policy decisions using infectious disease data contribute to quarantine policy decisions, information provision, drug development, and research technology development, and interest in the legal scope and limitations of using infectious disease data has increased worldwide. The use of infectious disease data can be classified for the purpose of spreading and blocking infectious diseases, prevention, management, and treatment of infectious diseases, and the use of information will be more widely made in the context of an infectious disease crisis. In particular, as the serious stage of the Disaster Management Act continues, the processing of personal identification information and sensitive information becomes an important issue. Information on "medical records, vaccination drugs, vaccination, underlying diseases, health rankings, long-term care recognition grades, pregnancy, etc." needs to be interpreted. In the case of "prevention, management, and treatment of infectious diseases", it is difficult to clearly define the concept of medical practicesThe types of actions are judged based on "legislative purposes, academic principles, expertise, and social norms," but the balance of legal interests should be based on the need for data use in quarantine policies and urgent judgment in public health crises. Specifically, the speed and degree of transmission of infectious diseases in a crisis, whether the purpose can be achieved without processing sensitive information, whether it unfairly violates the interests of third parties or information subjects, and the effectiveness of introducing quarantine policies through processing sensitive information can be used as major evaluation factors. On the other hand, the collection, provision, and use of infectious disease data for research purposes will be used through pseudonym processing under the Personal Information Protection Act, consent under the Bioethics Act and deliberation by the Institutional Bioethics Committee, and data provision deliberation committee. Therefore, the use of research purposes is recognized as long as procedural validity is secured as it is reviewed by the pseudonym processing and data review committee, the consent of the information subject, and the institutional bioethics review committee. However, the burden on research managers should be reduced by clarifying the pseudonymization or anonymization procedures, the introduction or consent procedures of the comprehensive consent system and the opt-out system should be clearly prepared, and the procedure for re-identifying or securing security that may arise from technological development should be clearly defined.

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.

A Survey on the Public Awareness of the Bioinformation Utilization (바이오정보 활용에 대한 시민 인식 조사 연구)

  • Choi, Kyujin;Kim, Byoungsoo;Oh, Byoung-il;Chang, Yeo-Kyung;Lee, Eun-woo;Byeon, Hyejin;Lee, Sangyun
    • Journal of Science and Technology Studies
    • /
    • v.17 no.1
    • /
    • pp.117-144
    • /
    • 2017
  • In Korea, currently, only the growth possibility of bioinformation industry has received the public attention, and social discussion on bioinformation management is meager. Based on this critical perspective, this study investigates the current status of public awareness of the bioinformation which can be a basis for the social discussion for bioinformation management. The most significant characteristics identified in the survey is that many citizens, while expressing their agreement on the use of biometric technology by purpose and taking an open stance on national fingerprint information collection, have considerable concern for the identity authentication system using the current biometric technology. In particular, the survey pointed out that it is hard to trust the institutions that collect the bioinformation. Also, the public expressed the particular concern for the health data including the body information and showed overwhelming consent for the necessity of more stringent regulation compared with other personal information. In regards to the medical information gathered from medical institutions, nearly 80% of the survey respondents did not agree on providing the information to commercial enterprises, and even 60% of them disagreed on using it for academic and statistical research. This result well demonstrates that thorough management of the bioinformation is required for its utilization.

Data issue and Improvement Direction for Marine Spatial Planning (해양공간계획 지원을 위한 정보 현안 및 개선 방향 연구)

  • CHANG, Min-Chol;PARK, Byung-Moon;CHOI, Yun-Soo;CHOI, Hee-Jung;KIM, Tae-Hoon;LEE, Bang-Hee
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.21 no.4
    • /
    • pp.175-190
    • /
    • 2018
  • Recently, policy of the marine advanced countries were switched from the preemption using ocean to post-project development. In this study, we suggest improvement and the pending issues when are deducted to the database of the marine spatial information is constructed over the GIS system for the Korean Marine Spatial Planning (KMSP). More than 250 spatial information in the seas of Korea were processed in order of data collection, GIS transformation, data analysis and processing, data grouping, and space mapping. It's process had some problem occurred to error of coordinate system, digitizing process for lack of the spatial information, performed by overlapping for the original marine spatial information, and so on. Moreover, solution is needed to data processing methods excluding personal information which is necessary when produce the spatial data for analysis of the used marine status and minimized method for different between the spatial information based GIS system and the based real information. Therefore, collection and securing system of lacking marine spatial information is enhanced for marine spatial planning. it is necessary to link and expand marine fisheries survey system. It is needed to the marine spatial planning. The marine spatial planning is required to the evaluation index of marine spatial and detailed marine spatial map. In addition, Marine spatial planning is needed to standard guideline and system of quality management. This standard guideline generate to phase for production, processing, analysis, and utilization. Also, the quality management system improve for the information quality of marine spatial information. Finally, we suggest necessity need for the depths study which is considered as opening extension of the marine spatial information and deduction on application model.

Study on Compliance in Sleep Life Log: Observational Cohort Study (수면 라이프로그 순응도에 대한 연구)

  • Su-Min Seo;Young-Hwa Baek;Si-Woo Lee;Hyun-Chul Jang
    • Journal of Society of Preventive Korean Medicine
    • /
    • v.27 no.1
    • /
    • pp.89-98
    • /
    • 2023
  • Objectives : This study collected sleep information by wearable device in the Korean medicine Daejeon citizen cohort (KDCC). It was measured based on the sleep record information measured by wearing a Fitbit, and the possibility of clinical use was examined for compliance with objective sleep collection. Based on compliance, the possibility of clinical use was examined. Methods : After surveying personal information and PSQI(Pittsburgh Sleep Quality Index), sleep information was collected by Fitbit for 14 days. Compliance was measured based on sleep record information by Fitbit. Compliance was analyzed by sex, age, BMI(Body Mass Index), and sleep group(deep/poor). Results : The number of participants was 730, and the compliance was 94.3%, and the compliance group was 675(92.5%). The age of the participants varied from 30 to 60 years old, and the average age was 46±6.7 years. There were 218 males and 512 females. Young people have high compliance. Males are more compliance than females. As the BMI score decreased in the 30s, the compliance was higher. The underweight group in all age groups had 100 compliance. The underweight group was all female. The low compliance groups were that 30 years males (obesity level2), 50 years females (overweight group), and 50 years females (obesity level2). There was no significant difference in compliance between deep sleep group and poor sleep group. In deep sleep group, females showed higher compliance. In poor sleep group, males showed higher compliance. The average duration of Fitbit usage among participants was 20.1 days. The compliant group wore the device for an average of 21.3 days, while the non-compliant group wore it for only 5.2 days. Of the compliant group, 86.9% (73.8% of all participants) continued to wear the Fitbit after the recommended 14-day period, and 50.8% wore it for more than 20 days. Conclusions : This study showed the possibility of adaptation for wearing a Fitbit for collecting objective sleep information. It is judged that the compliance is high because it was worn for more than 13.2 days out of the 14 days required. It is considered meaningful because the compliance was measured based on the sleep information by Fitbit, not the questionnaire. As the data on objective sleep time is collected automatically, we believe that the burden on participants after the study period is not significant for a certain period. Compliance may be even higher for cohorts related to illnesses and with doctor's orders, rather than for the general population.

A Study on Role and Function of the Medical Representatives (의약정보담당자(MR)의 기능 및 역할에 관한 연구)

  • Lee, Dong-Il;Je, Hae-Kwan;Yoon, Seok-Jun;Ahn, Hyeong-Sik;Mun, Yeoung-Bae
    • Quality Improvement in Health Care
    • /
    • v.10 no.1
    • /
    • pp.58-76
    • /
    • 2003
  • Background : Aim of this study is focused on the analysis of the needed abilities of medical representatives resulting in building up the market and increasing sales. It is to propose methods to increase this ability ensuring continuous growth in market share and profit. Methods : A survey was conducted between January 6 and May 31, 2003. Using SPSS(Version 10.0), the collected data was analyzed by Hotelling T2, factor analysis. Some hypotheses were selected to include the conclusion. Some questionnaires for physicians working in hospitals or clinics and the medical representatives working in a pharmaceutical company were created and asked to them to either prove or reject those hypotheses. The results were analyzed to find the primary factors that effect the interactions between physician and the medical representatives. These factors were also studied along with the theoretical research based on published references. Results : The results were as follows. The main reasons for the physician to meet with a medical representatives were collection of product informations needed for patient treatment and collection of informations on current medical issue and as well as personal interests. The main parameters by which physicians evaluate the medical representatives are human relationship including sincerity and manners and supply of accurate and unbiased information on products. Overall, the medical representatives' perception on the importance of medical knowledge and ability to deliver it are lower than that expected by physicians. Conclusion : Medical and pharmaceutical companies' environment are changed rapidly. And those changes forced medical representatives to set new roles and competency. In order to drive away from the past 'rule of thumb' and 'adaptation to circumstance', optimal method and systemic development to train and support the medical representatives should be quipped. They will help medical representatives to be specialists in medical knowledge and to understand the exact need of health care professions. Product competitiveness will be increased and eventually successful business can be achieved through it.

  • PDF

A Convergence study the Effect of the social capital discovery program on empowerment and career preparation activity of female college students (사회적자본찾기 프로그램이 여대생의 임파워먼트와 진로준비행동에 미치는 영향에 관한 융합연구)

  • Heo, Jeoung-Cheoul
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.6
    • /
    • pp.219-228
    • /
    • 2016
  • This research was convergence study conducted to understand the effect that a recovery program for social capital has on empowerment and career preparation activity in female college students. The subjects were female college students located in K city, and Experimental Group 30, Control Group 30 questionnaires were used as the data for analysis. As a result of this study, it was discovered that there was a statistically significant difference in personally-internal, political and social areas in the sub-areas of empowerment in female college students while there was no significant difference in personal relationships. Also, in the sub-area of career preparation activity in female college students in the recovery program for social capital, information collection activity and practice activity were different and the differences were statistically significant. It is suggested that further studies are needed on recovery programs for social capital for improved empowerment, career preparation behavior and usability.

Design and Implementation of Malicious URL Prediction System based on Multiple Machine Learning Algorithms (다중 머신러닝 알고리즘을 이용한 악성 URL 예측 시스템 설계 및 구현)

  • Kang, Hong Koo;Shin, Sam Shin;Kim, Dae Yeob;Park, Soon Tai
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.11
    • /
    • pp.1396-1405
    • /
    • 2020
  • Cyber threats such as forced personal information collection and distribution of malicious codes using malicious URLs continue to occur. In order to cope with such cyber threats, a security technologies that quickly detects malicious URLs and prevents damage are required. In a web environment, malicious URLs have various forms and are created and deleted from time to time, so there is a limit to the response as a method of detecting or filtering by signature matching. Recently, researches on detecting and predicting malicious URLs using machine learning techniques have been actively conducted. Existing studies have proposed various features and machine learning algorithms for predicting malicious URLs, but most of them are only suggesting specialized algorithms by supplementing features and preprocessing, so it is difficult to sufficiently reflect the strengths of various machine learning algorithms. In this paper, a system for predicting malicious URLs using multiple machine learning algorithms was proposed, and an experiment was performed to combine the prediction results of multiple machine learning models to increase the accuracy of predicting malicious URLs. Through experiments, it was proved that the combination of multiple models is useful in improving the prediction performance compared to a single model.