• Title/Summary/Keyword: total scope

Search Result 452, Processing Time 0.028 seconds

A Study on the Application of Outlier Analysis for Fraud Detection: Focused on Transactions of Auction Exception Agricultural Products (부정 탐지를 위한 이상치 분석 활용방안 연구 : 농수산 상장예외품목 거래를 대상으로)

  • Kim, Dongsung;Kim, Kitae;Kim, Jongwoo;Park, Steve
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.3
    • /
    • pp.93-108
    • /
    • 2014
  • To support business decision making, interests and efforts to analyze and use transaction data in different perspectives are increasing. Such efforts are not only limited to customer management or marketing, but also used for monitoring and detecting fraud transactions. Fraud transactions are evolving into various patterns by taking advantage of information technology. To reflect the evolution of fraud transactions, there are many efforts on fraud detection methods and advanced application systems in order to improve the accuracy and ease of fraud detection. As a case of fraud detection, this study aims to provide effective fraud detection methods for auction exception agricultural products in the largest Korean agricultural wholesale market. Auction exception products policy exists to complement auction-based trades in agricultural wholesale market. That is, most trades on agricultural products are performed by auction; however, specific products are assigned as auction exception products when total volumes of products are relatively small, the number of wholesalers is small, or there are difficulties for wholesalers to purchase the products. However, auction exception products policy makes several problems on fairness and transparency of transaction, which requires help of fraud detection. In this study, to generate fraud detection rules, real huge agricultural products trade transaction data from 2008 to 2010 in the market are analyzed, which increase more than 1 million transactions and 1 billion US dollar in transaction volume. Agricultural transaction data has unique characteristics such as frequent changes in supply volumes and turbulent time-dependent changes in price. Since this was the first trial to identify fraud transactions in this domain, there was no training data set for supervised learning. So, fraud detection rules are generated using outlier detection approach. We assume that outlier transactions have more possibility of fraud transactions than normal transactions. The outlier transactions are identified to compare daily average unit price, weekly average unit price, and quarterly average unit price of product items. Also quarterly averages unit price of product items of the specific wholesalers are used to identify outlier transactions. The reliability of generated fraud detection rules are confirmed by domain experts. To determine whether a transaction is fraudulent or not, normal distribution and normalized Z-value concept are applied. That is, a unit price of a transaction is transformed to Z-value to calculate the occurrence probability when we approximate the distribution of unit prices to normal distribution. The modified Z-value of the unit price in the transaction is used rather than using the original Z-value of it. The reason is that in the case of auction exception agricultural products, Z-values are influenced by outlier fraud transactions themselves because the number of wholesalers is small. The modified Z-values are called Self-Eliminated Z-scores because they are calculated excluding the unit price of the specific transaction which is subject to check whether it is fraud transaction or not. To show the usefulness of the proposed approach, a prototype of fraud transaction detection system is developed using Delphi. The system consists of five main menus and related submenus. First functionalities of the system is to import transaction databases. Next important functions are to set up fraud detection parameters. By changing fraud detection parameters, system users can control the number of potential fraud transactions. Execution functions provide fraud detection results which are found based on fraud detection parameters. The potential fraud transactions can be viewed on screen or exported as files. The study is an initial trial to identify fraud transactions in Auction Exception Agricultural Products. There are still many remained research topics of the issue. First, the scope of analysis data was limited due to the availability of data. It is necessary to include more data on transactions, wholesalers, and producers to detect fraud transactions more accurately. Next, we need to extend the scope of fraud transaction detection to fishery products. Also there are many possibilities to apply different data mining techniques for fraud detection. For example, time series approach is a potential technique to apply the problem. Even though outlier transactions are detected based on unit prices of transactions, however it is possible to derive fraud detection rules based on transaction volumes.

APICAL FITNESS OF NON-STANDARDIZED GUTTA-PERCHA CONES IN SIMULATED ROOT CANALS PREPARED WITH ROTARY ROOT CANAL INSTRUMENTS (전동화일로 형성된 근관에서 비표준화 Gutta-percha Cone의 적합성)

  • Kwon, O-Sang;Kim, Sung-Kyo
    • Restorative Dentistry and Endodontics
    • /
    • v.25 no.3
    • /
    • pp.390-398
    • /
    • 2000
  • The purpose of this study was to evaluate the apical fitness of non-standardized gutta-percha cones in root canals prepared with rotary Ni-Ti root canal instruments of various tapers and apical tip sizes. Simulated sixty curved root canals of plastic blocks were prepared with crown-down technique using rotary root canal instruments of Maillefer ProFile$^{(R)}$ .04 and .06 taper (Maillefer Instrument SA, Switzerland). Specimens were divided into six groups and prepared as follows: Group 1, prepared up to size 25 of .04 taper ; Group 2, prepared up to size 30 of .04 taper ; Group 3, prepared up to size 35 of .04 taper ; Group 4, prepared up to size 25 of .06 taper ; Group 5, prepared up to size 30 of .06 taper ; Group 6 ; prepared up to size 35 of .06 taper. After cutting off the coronal portion of plastic, blocks perpendicular to the long axis of the canal with the use of a diamond saw, apical 5mm of canal space was analyzed. Prepared apical canal spaces were duplicated using rubber base impression material to evaluate two dimensional total area of apical canal space. Various sized gutta-percha cones were applied in the 5mm-apical canal space, which were size 25, size 30 and size 35 standardized gutta-percha cone, Diadent Dia-Pro ISO-.04$^{TM}$ and .06$^{TM}$(Diadent, Korea), and medium-fine (MF), fine (F), fine-medium (FM) and medium (M) sized non-standardized gutta-percha cones (Diadent, Korea). Coronal excess gutta-percha were cut off with a sharp blade. Photographs of impressed apical canal spaces and gutta-percha cones were taken with a CCD camera under a stereomicroscope and stored in a computer. Areas of the total canal space and gutta-percha cones were calculated using a digitalized image analysing program, CompuScope (Sungjin Multimedia Co., Korea). Ratio of apical fitness was obtained by calculating the area of gutta-percha cone to the total area of the canal space. The data were analysed statistically using One-way Analysis of Variance and Duncan's Multiple Range Test. The results were as follows: 1. In canals prepared up to size 25 ProFile$^{(R)}$ of .04 taper, non-standardized MF and F cones occupied significantly more canal space than Dia-Pro ISO-.04$^{TM}$ or size 25 standardized ones (p<0.05). 2. In canals prepared up to size 30 ProFile$^{(R)}$ of .04 taper, non-standardized F cones occupied significantly more canal space than Dia-Pro ISO-.04$^{TM}$ or size 30 standardized ones (p<0.05), and non-standardized MF cones occupied more canal space than size 30 standardized ones (p<0.05). 3. In canals prepared up to size 35 ProFile$^{(R)}$ of .04 taper, there was no significant difference in canal space occupation among non-standardized MF and F, size 35 standardized, and Dia-Pro ISO-.04$^{TM}$ cones (p>0.05). 4. In canals prepared up to size 25 ProFile$^{(R)}$ of .06 taper, non-standardized MF and F cones occupied significantly more canal space than Dia-Pro ISO-.06$^{TM}$, or size 25 standardized ones (p<0.05), and Dia-Pro ISO-.06$^{TM}$, cones occupied significantly more space than size 25 standardized ones (p<0.05). 5. In canals prepared up to size 30 ProFile$^{(R)}$ of .06 taper, non-standardized FM cones occupied significantly more canal space than Dia-Pro ISO-.06$^{TM}$ or size 30 standardized ones (p<0.05), and non-standardized F cones occupied significantly more canal space than size 30 standardized ones (p<0.05). 6. In canals prepared up to size 35 ProFile$^{(R)}$ of .06 taper, non-standardized M and FM, Dia-Pro ISO-.06$^{TM}$ occupied significantly more canal space than size 35 standardized ones (p<0.05). In summary, in both canals prepared with .04 or .06 taper ProFile$^{(R)}$, non-standardized cones showed better fitness than Dia-Pro ISO$^{TM}$ or standardized ones, which was more characteristic in smaller canals.

  • PDF

A Study on Knowledge Entity Extraction Method for Individual Stocks Based on Neural Tensor Network (뉴럴 텐서 네트워크 기반 주식 개별종목 지식개체명 추출 방법에 관한 연구)

  • Yang, Yunseok;Lee, Hyun Jun;Oh, Kyong Joo
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.2
    • /
    • pp.25-38
    • /
    • 2019
  • Selecting high-quality information that meets the interests and needs of users among the overflowing contents is becoming more important as the generation continues. In the flood of information, efforts to reflect the intention of the user in the search result better are being tried, rather than recognizing the information request as a simple string. Also, large IT companies such as Google and Microsoft focus on developing knowledge-based technologies including search engines which provide users with satisfaction and convenience. Especially, the finance is one of the fields expected to have the usefulness and potential of text data analysis because it's constantly generating new information, and the earlier the information is, the more valuable it is. Automatic knowledge extraction can be effective in areas where information flow is vast, such as financial sector, and new information continues to emerge. However, there are several practical difficulties faced by automatic knowledge extraction. First, there are difficulties in making corpus from different fields with same algorithm, and it is difficult to extract good quality triple. Second, it becomes more difficult to produce labeled text data by people if the extent and scope of knowledge increases and patterns are constantly updated. Third, performance evaluation is difficult due to the characteristics of unsupervised learning. Finally, problem definition for automatic knowledge extraction is not easy because of ambiguous conceptual characteristics of knowledge. So, in order to overcome limits described above and improve the semantic performance of stock-related information searching, this study attempts to extract the knowledge entity by using neural tensor network and evaluate the performance of them. Different from other references, the purpose of this study is to extract knowledge entity which is related to individual stock items. Various but relatively simple data processing methods are applied in the presented model to solve the problems of previous researches and to enhance the effectiveness of the model. From these processes, this study has the following three significances. First, A practical and simple automatic knowledge extraction method that can be applied. Second, the possibility of performance evaluation is presented through simple problem definition. Finally, the expressiveness of the knowledge increased by generating input data on a sentence basis without complex morphological analysis. The results of the empirical analysis and objective performance evaluation method are also presented. The empirical study to confirm the usefulness of the presented model, experts' reports about individual 30 stocks which are top 30 items based on frequency of publication from May 30, 2017 to May 21, 2018 are used. the total number of reports are 5,600, and 3,074 reports, which accounts about 55% of the total, is designated as a training set, and other 45% of reports are designated as a testing set. Before constructing the model, all reports of a training set are classified by stocks, and their entities are extracted using named entity recognition tool which is the KKMA. for each stocks, top 100 entities based on appearance frequency are selected, and become vectorized using one-hot encoding. After that, by using neural tensor network, the same number of score functions as stocks are trained. Thus, if a new entity from a testing set appears, we can try to calculate the score by putting it into every single score function, and the stock of the function with the highest score is predicted as the related item with the entity. To evaluate presented models, we confirm prediction power and determining whether the score functions are well constructed by calculating hit ratio for all reports of testing set. As a result of the empirical study, the presented model shows 69.3% hit accuracy for testing set which consists of 2,526 reports. this hit ratio is meaningfully high despite of some constraints for conducting research. Looking at the prediction performance of the model for each stocks, only 3 stocks, which are LG ELECTRONICS, KiaMtr, and Mando, show extremely low performance than average. this result maybe due to the interference effect with other similar items and generation of new knowledge. In this paper, we propose a methodology to find out key entities or their combinations which are necessary to search related information in accordance with the user's investment intention. Graph data is generated by using only the named entity recognition tool and applied to the neural tensor network without learning corpus or word vectors for the field. From the empirical test, we confirm the effectiveness of the presented model as described above. However, there also exist some limits and things to complement. Representatively, the phenomenon that the model performance is especially bad for only some stocks shows the need for further researches. Finally, through the empirical study, we confirmed that the learning method presented in this study can be used for the purpose of matching the new text information semantically with the related stocks.

Trends and Interpretation of Life Cycle Assessment (LCA) for Carbon Footprinting of Fruit Products: Focused on Kiwifruits in Gyeongnam Region (과수의 탄소발자국 표지를 위한 LCA 동향 및 해석: 경남지역 참다래를 중심으로)

  • Deurer, Markus;Clothier, Brent;Huh, Keun-Young;Jun, Gee-Ill;Kim, In-Hea;Kim, Dae-Il
    • Horticultural Science & Technology
    • /
    • v.29 no.5
    • /
    • pp.389-406
    • /
    • 2011
  • As part of a feasibility study for introducing carbon labeling of fruit products in Korea, we explore the use of carbon footprints for Korean kiwifruit from Gyeongnam region as a case study. In Korea, the Korean Environmental Industry and Technology Institute (KEITI) is responsible for the carbon footprint labeling certification, and has two types of certification programs: one program focuses on climate change response (carbon footprint labeling analysis) and the other on low-carbon products (reduction of carbon footprints analysis). Currently agricultural products have not yet been included in the program. Carbon labeling could soon be a prerequisite for the international trading of agricultural products. In general the carbon footprints of various agricultural products from New Zealand followed the methodology described in the ISO standards and conformed to the PAS 2050. The carbon footprint assessment focuses on a supply chain, and considers the foreground and the background systems. The basic scheme consists of four phases, which are the 'goal', 'scope', 'inventory analysis', and 'interpretation' phases. In the case of the carbon footprint of New Zealand kiwifruit the study tried to understand each phase's contribution to total GHG emissions. According to the results, shipping, orchard, and coolstore operation are the main life cycle stages that contribute to the carbon footprint of the kiwifruit supply chain stretching from the orchard in New Zealand to the consumer in the UK. The carbon emission of long-distance transportation such as shipping can be a hot-spot of GHG emissions, but can be balanced out by minimizing the carbon footprint of other life cycle phases. For this reason it is important that orchard and coolstore operations reduce the GHG-intensive inputs such as fuel or electricity to minimize GHG emissions and consequently facilitate the industry to compete in international markets. The carbon footprint labeling guided by international standards should be introduced for fruit products in Korea as soon as possible. The already established LCA methodology of NZ kiwifruit can be applied for fruit products as a case study.

A Study on Health Seeking Behavior - Focused on Shopping-Around Phenomenon in Banwol-Eup Residents (일부(一部) 지역사회(地域社會) 주민(住民)의 의료(醫療) 행태(行態)에 관(關)한 연구(硏究) - 반월읍(半月邑) 주민(住民)의 Shopping-around 현상(現象)을 중심(中心)으로 -)

  • Choi, Young-Teak;Lee, Eun-Il;Kim, Hyo-Joong
    • Journal of agricultural medicine and community health
    • /
    • v.11 no.1
    • /
    • pp.44-54
    • /
    • 1986
  • This study was aimed at investigating the health seeking behaviors of patients; For the purpose of analyzing the research theme we classified the study into two phase. First, the types of patients' health seeking behavior were categorized into a scheme according to what medical care resources were utilized in patients' coping process. Second, from patients' first visits to third visits to medical resources, we analyzed variations of factors which noted as crucial elements in constituting the patients' sickness career. To grasp the generalized characteristics from complicated empirical data, we limited the scope of our analysis to third stage of health seeking. A total of 121 persons who had beer suffering from chronic diseases more than 3 months was sampled among the residents of Banwol-Eup, the target Area of Korea University Health Project. The findings are as follows ; 1) In the course of visiting medical care resources, 34 different types of health seeking Behavior were found. From this result we inferred the idea that patients in Banwol-Eup had not any stable norms to cope with their pains. Clinics, hospital, pharmacy, Herb-doctors', folkways (self-treatment) were accessed by patients in orders. But more than half of patients who had utilized clinics or hospitals from their first to third visits, changed medical care resources to others, for example herb doctors or folkways, which had fundamentally different treatment models. Upon these two facts, the diversified types and capricious patterns in the health seeking behavior of Banwol patients, we observed a typical Shopping-Around phenomenon. 2) Factors which influenced patients' to their sickness career were changed along the courses of health seeking, from first to third visits as follows ; $\cdot$ Perceived seriousness of diseases were tended to decrease. $\cdot$ Professional medical personnel tended to be influencial in the patients' sickness career, (5.0%, 25.0% and 65.7%). The influence of the primary interaction groups such as parents, friends, neighbours, tended to decrease ; (90.9%, 71.2% and 30.0%). $\cdot$ The subjective reasons why to choose such a medical care resource were related to economic affordability and disease-itself as main motives. Credibility of health resources tended to increase 14.9%, 24.0% and 31.4 sequently. $\cdot$ Geographic accessibility factors did not change significantly. Most of patients had utilized health resources in Banwol and Anyang area. 3) Cultural inclination in the shopping-around phenomenon has shown difference among age groups. The age group' over 50 years' preferred traditional health resources to modern health resources. 4) Consistency of health seeking behavior on the shopping around phenomenon has shown difference according to the degrees of patients' economic affordability and those of psychological satisfaction toward modern health services. However, there were some restrictions in this thesis ; a) the study was limited to the 3rd health seeking career so it did not allow us to collect more informations after that, b) the study was not able to carry out causal analysis on patients health behavior determinated by explanatory model of health resources, and c) the study was not able to take into consideration of factors connected with social structural circumstances. Despite of restrictions described above, we are sure that this thesis would promote health providers' understanding toward patients' inclinations, through which they could provide efficient and accurate medical service.

  • PDF

The development and application of the descriptive evaluation questionnaire on the Clothing and Textiles section of the middle school Technology & Home Economics textbook (중학교 기술.가정 의생활영역의 서술형 평가문항 개발 및 적용)

  • Lee, Soo-Kyung;Lee, Hye-Ja
    • Journal of Korean Home Economics Education Association
    • /
    • v.23 no.3
    • /
    • pp.69-90
    • /
    • 2011
  • To develop the descriptive evaluation questionnaire with high validity and reliability on the Clothing and Textiles section of the middle school Technology & Hone Economics textbook, apply it to students and analyze its results. We made out a draft for descriptive evaluation questionnaire that was based upon the concrete establishment of the goal and the range of evaluation. We also made a rubric for scoring as well as sample answer-sheets. Finally, we completed a total of twenty three descriptive evaluation questions and we applied it to sixty five 2nd-grade students in two classes in a middle school. Descriptive evaluation questionnaire exhibited the relative high validity on each question. Moreover, three graders gave the same score on each question of descriptive evaluation, suggesting that descriptive evaluation questionnaire has the high inter-grader reliability and the strong correlation. But, low academic achievement was generally observed in the subjects. They had difficulty in describing their knowledge via their own language and drawing up accurate and detailed answers. They recognized the positive aspects of descriptive evaluation questionnaire, but they felt it uncomfortable due to study-burden and description itself. To overcome these limitations, it is required that students should experience various materials related to subject contents in classes as well as textbooks, concentrate themselves on finding solutions for problems, expand their scope, and practice describe them in advance. Therefore, the additional training for description evaluation questionnaire will be necessary for the more efficient and discriminative questionnaire. Also the questionnaire with high validity and reliability should be developed and the aggressive and voluntary participation of teachers will be needed.

  • PDF

Comparison of Innovation Efficiency of Pre-IPO and Post-IPO in Korea: Case of Pharmaceutical Industry (IPO 전후 혁신의 효율성 비교 연구: 의약산업 중심으로)

  • Kim, Eunhee
    • Journal of Technology Innovation
    • /
    • v.24 no.1
    • /
    • pp.143-167
    • /
    • 2016
  • The purpose of this study is to analyze changes of innovation activities and their performance in pre-IPO and post-IPO of KOSDAQ IPO listed companies in medical and pharmaceutical fields, which require high R&D investment, from 2000 to 2005 in Korea. The innovation efficiencies of the IPO companies were measured before and after three years based on the DEA model. The financial data and patent information of the listed company during total 6 years, which were 3 years before IPO and 3 years after IPO, were collected. The main results of this research are as follows. First, it took an average 12.86 years until IPO in the start-up of the IPO companies in the pharmaceutical sector, and innovation was on average more active than the IPO before. R&D investment was higher than the IPO before, and the number of the applied patent during 3 years after IPO was 16.67 which was increased from 8.43 during 3 years before IPO. In addition, the average scope of technology of the IPO companies was expanded from 11 to 22 technology fields during previous 3 year and after 3 year each, and financial growth after IPO was lower than the previous IPO. Second, the financial performance of R&D investment and the performance of patent activity were weakened in the efficiency after the IPO, and the integrated performance from the patenting activities and the R&D investment was decreased after the IPO. Finally, the efficiency of the financial performance of the patenting activity was lower than the efficiency of the financial performance of the patent and R&D investment and patent activities under the R&D investment. In particular, the inefficiency of the firms' patenting activities performance after the IPO was caused by the decreasing return to scale, according to the results of this study. This results implicate that the expansion of R&D investments through the IPO had not lead to the financial performance of the market, and that the overall inefficiency since the IPO is due to the inefficiencies at the stage for the outcome of innovation activity rather than the output obtained through the R&D investments that appear to lead the performance of the market.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

A Review on Constitutional Discordance Adjudication of the Constitutional Court to Total Ban on Abortion ('낙태죄' 헌법재판소 헌법불합치 결정의 취지와 법률개정 방향 - 헌법재판소 2019. 4. 11. 선고 2017헌바127 전원재판부 결정에 따라 -)

  • Lee, Seok-Bae
    • The Korean Society of Law and Medicine
    • /
    • v.20 no.2
    • /
    • pp.3-39
    • /
    • 2019
  • Even after the Constitutional Court decided on August 23, 2012 that the provisions of abortion were constitutional, discussions on the abolition of abortion continued. The controversy about abortion is not only happening recently, but it has already existed since the time when the Penal Code was enacted, and it shares the history of modern legislation with the Republic of Korea. Legislators whom submitted amendment while insisting upon the eradication of abortion in the process of enacting criminal law at that time, presented social and economic adaptation reasons as the core reason. From then on, the abolition of abortion has been discussed during the development dictatorship, but this was not intended to guarantee women's human rights, but it was closely connected to the national policy projects of "Contraception" and "Family Planning" of the Park's dictatorship. Since then, the enactment of the Mother and Child Health Law, which restrictively allow artificial abortion, was held on February 8, 1973, in an emergency cabinet meeting that replaced the legislative power after the National Assembly was disbanded. It became effected May 10th. The reason behind the Mother and Child Health Law that included legalization of abortion in part was that the Revitalizing Reform at that time did not allow any opinion, so it seem to be it was difficult for the religious to express opposition. The "Maternal and Child Health Law" enacted in this way has been maintained through several amendments. It can be seen that the question of maintenance of abortion has been running on parallel lines without any significant difference from the time when the Penal Code was enacted. On August 23, 2012, the Constitutional Court decided that the Constitutional Opinion and the unonstitutional Opinion were 4: 4. However, it was decided by the Constitution without satisfying the quorum for unconstitutional decision of the Constitutional Court. This argument about abolition of abortion is settled for the the time being with the decision of the constitutional inconsistency of the Constitutional Court, and now, the National Assembly bears the issue of new legislation. In other words, the improved legislation must be executed until December 31, 2020, and if the previous improved legislation is not implemented, the crime of abortion (Article 269, Paragraph 1, Article 270 of the Criminal Code) Article 1 (1) will cease to be effective from 1 January 2021. Therefore, in the following, we will look into the reason of the Constitutional Court's constitutional discordance adjudication on criminal abortion(II), and how it structurally differs from the previous Constitutional Court and the Supreme Court. After considering key issues arised from the constitutional discordance adjudication(III), the legislative direction and within the scope of legislative discretion in accordance with the criteria presented by the Constitutional Court We reviewed the proposed revisions to the Penal Code and the Mather and Child Health Act of Korea(IV).

ICU nurses' ethical attitudes about DNR (중환자실 간호사들의 DNR에 대한 윤리적 태도)

  • Yu, Eun-Yeong;Yang, Yu-Jeong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.4
    • /
    • pp.2691-2703
    • /
    • 2015
  • This research aims to provide basic materials for assisting DNR patient cares by understanding ICU nurses' awareness and ethical attitude regarding DNR. A total of 154 results were analyzed which were collected from Aug. 1st to Sep. 5th in 2014 by surveying nurses working in ICU (from 1 advanced general hospital in G metropolitan city and other general hospitals of more than 700 beds in Cheolla provinces). (1) For the decision attitudes of DNR, there were both consent and objection. Consent for the patient's opinion of rejecting further treatment and life extension despite of bad prognosis. And objection for no conducting DNR in the case of the patient's wish, treatment requested by the guardian, and CPR for the patient who has no chance. (2) Objection for artificial respirator and other treatment requested by the patient's family and the entrance of guardians into ICU. Consent for the passive use of artificial respirator by the doctor and the decrease of basic care to stabilize patients physically and mentally. No specific opinion for treatment not following aseptic techniques. Objection for frequent reports to primary care physician requested by the family. (3) Acknowledging less interest by the doctor, while supporting the health care team in the case of the guardian's complaint, objection for the DNR decision mede by the primary care physician. Objection for the DNR decision by the guideline. Objection or neutrality for straightforward explanation to the patient of bad prognosis. Objection for straightforward explanation of the patient's status (even near to death) to the patient him/herself or the guardian. In conclusion, the subject of DNR is the patient and the patient's opinion should be fully reflected. The conflict arising from the scope of medical practice and decision processes should be minimized. The standard and guideline for DNR decision is required for the ethical decision making for the patient along with agreements based on full explanations.