- All
- Vol.1 (No.1) 2016
- Vol.1 (No.2) 2016
- Vol.2 (No.1) 2017
- Vol.2 (No.2) 2017
- Vol.3 (No.1) 2018
- Vol.3 (No.2) 2018
- Vol.4 (No.1) 2019
- Vol.4 (No.2) 2019
- Vol.5 (No.1) 2020
- Vol.5 (No.2) 2020
- Vol.6 (No.1) 2021
- Vol.6 (No.2) 2021
- Vol.6 (No.3) 2021
- Vol.6 (No.4) 2021
- Vol.7 (No.1) 2022
- Vol.7 (No.2) 2022
- Vol.8 (No.1) 2023
- Vol.8 (No.2) 2023
- Vol.9 (No.1) 2024
- Vol.9 (No.2) 2024
- Vol.10 (No.1) 2025
- Vol.10 (No.2) 2025
-
Singi-Hwan(SH) is a widely used prescription for treating kidney inflammation in Korea. However, the protective effect of SH on maximal exercise performance(MEP) is not well studied. Fatigue is the physiological phenomena after working and exercise to improve physical strength. The purpose of this study was to evaluate the MEP effect of SH using the FST model. To study the protective effect of SH on endurance maximal exercise performance by in vivo experiment. The mouse is largely divided into three groups; Non-swimming group, saline treatment - swimming load test group and SH processing swimming group. The swimming load test group was subdivided into the swimming control group(Control) and the Singi-Hwan supply group(SH). SH was orally administered 2 weeks before FST administration. After FST, immobility time, oxygen consumption was measured by physiological test, and serum was collected for biochemical analysis. Immobility, oxygen consumption and biochemical factors were increased FST - induced MEP. Immobility time was significantly decreased in SH treatment group compared to control group. Oxygen consumption was also significantly decreased by SH treatment. The increase of lactic acid and lactate dehydrogenase after FST was inhibited by SH treatment. Consumption of energy sources(free fatty acid and triglyceride) and energy recovery were improved by SH treatment after FST. In conclusion, SH suppressed the increase of immobility time, oxygen consumption and biochemical factors after FST. All the results suggest SH might be a potentially protective ingredient for the anti-fatigue functional food. In conclusion, SH can be used as a beneficial medium to improve maximal exercise performance and the ability to protect the body from fatigue. This study indicates that SH protects mice from physical fatigue and improves exercise performance. Therefore, it has a potential for the pharmacological effect of anti-fatigue. Our study provides new sight into the protective effects of SH on the fatigue status of mice. Additional studies are needed to find the mechanism of association between each single herb.Keyword:Protection, Singi-Hwan, Maximal Exercise Performance(MEP), Forced Swimming Test(FST), Lactic Acid
-
The key point of problem-based learning is that students solve the given problem situation on their own. This study was to develop a stroke case and learning module by applying problem-based learning after selecting second-year nursing students who were taking a health assessment course. This study attempted to analyze and conceptualize learning content for stroke in the area of health assessment to develop a case and module based on clinical cases by applying problem-based learning. A module is a kind of teaching and learning process that is developed to systematically organize learner activities and evaluation methods geared toward checking the activities in accordance with several clearly stated learning objectives in order for learners to attain their learning objectives. The PBL packages that were used in this study were developed based on PBL-related literatures of domestic and foreign nursing science, medicine and educational technology, on this researcher's own PBL experience, on released PBL package development procedures, and on earlier studies related to package development. The results Is problem-based learning introduction, introduction of learning objectives, expected learner role, introduction of role of teacher, team composition are presented. Next, it presents the problem of the situation, presenting the learning task, and feedback of individual learning and cooperative learning. To make it happen, clinical settings should be considered when various modules are developed by applying PBL, and specific learning objectives should be set up to develop more effective modules. In future nursing education, the opportunity should be provided for learners to gain secondhand experience of real clinical settings to critically reflect on themselves, and the kind of PBL strategies that could further autonomous learning capabilities should gradually be increased.Keyword:Investigation, Problem-Based Learning, Stroke, Patients, Health Assessment
-
At the present, South Korea 's security is as urgent as North Korea's denuclearization because North Korea's espionage is very active. The core to espionage in Korea is that, since the Korean War following the invasion of North Korea, most terrorist activities and espionage activities have been executed by North Korea, anti communist investigation has targeted the North Korean regime. However, while South Korea underwent a democratic regime transfer, some regimes have been friendly to North Korea according, and counter intelligence agency dealing with intelligence on North Korea caused rapid changes to power transfer, reduction of organization, and personnel, so it is not possible to pursue the policy of counter intelligence activities coherently. Therefore, in this study, I have examined the security strategy of the Korean counter intelligence agency against North Korean espionage activities for college students majoring in security at Korean universities at the present time starting with the incident of a North Korean female spy, who was disguised as an employee for a cafe located in Gyeongsan-shi, Gyeongbuk and who was arrested after handing over the intelligence gathered on North Korean defectors to North Korea in 2014. First, South Korea's counter intelligence manpower should be increased. Second, the legal grounds for South Korea's counter intelligence activities should be further expanded. Third, it is necessary to develop various techniques of counter intelligence activities in South Korea. Fourth, the scope of counter intelligence activities should be expanded in Korea. Fifth, South Korea’s counter intelligence education should be expanded. Sixth, South Korea's counter intelligence agencies should expand investigative cooperation. As a result of the study, I was able to derive such results and have presented directions for North Korea’s espionage activities based on the political environment in Korea.Keyword:Korea’s Counter Intelligence Agency, National Security, North Korean Spy, Anti-Communist Investigation, Terrorism
-
Purpose; The purpose of this study was to analyze domestic trends in research on medical technologists and to suggest some of the right directions for future research on the same. Methods; As for paper retrieval, literatures were selected from the databases of Korean Education and Research Information Service(KERIS), the National Assembly Library, Koreanstudies Information Service System(KISS) and the National Digital Science Library of Korea Institute of Science and Technology Information(KISTI/NDSL) and from the Journal of the Korean Association of Medical Technologists by inputting the following words: medical technology, clinical pathology, laboratory medicine tests and clinical pathology student. Out of them, 20 papers that weren't related to medical technologists were excluded, and 19 overlapped papers and two conference materials were additionally ruled out. Thus, 13 papers were selected. Results; Papers related to medical technologists started to increase in number in 2001. Six papers(46%) were written to receive a degree, and seven(54%) weren't. Seven papers(54%) that were neither theses nor dissertations were published in journals registered with the National Research Foundation of Korea, which is a renowned domestic journal, and in candidate journals for registration with it, and three(23%) that were the largest in number were published in the Journal of the Korean Association of Medical Technologists. In terms of theme, job satisfaction was covered in four(31%), and quantitative studies numbered 13(100%). Non- experimental studies numbered 13(100%). Conclusion; The effort by this study to analyze studies related to medical technologists made it possible to determine the trends in research on medical technologists and variables affecting them, and it's found that there was some room for improvement as well. In the future, ceaseless efforts should be made to produce outstanding research papers.Keyword:Medical technologist, Research, Trend, Health and Medical Treatment, Job Satisfaction
-
This study aimed to review discourses on child abuse that are formed in online communities related to child care information and examine interactions that contribute to the formation, criticizing violent environments against the growth of the social week or children and providing how to cope better with the harmful conditions. For this aim, the study selected some credible online communities that provide child care information and collected data from them for this research. More specifically, the research reviewed materials and replies regarding child abuse that are posted in those online communities. And then, this study analyzed the posts by using Fairclough’s Method of Critical Discourse Analysis in order to determine the superficial and social meanings of dis-course on child abuse and socio-cultural implications of that abuse. The analysis found that superficially, information about domestic violence and trustless early childhood education institutions brings the mass media-based formation of discourse on child abuse which focuses its lenses on the traditional notions of corporal punishment and discipline and puts child abusers under intense criticism and hatred. Socially, discourse on child abuse is formed in conjunction with social factors including images from mass media that show abusive parents, family discord, poor domestic environment and excessive child protection involving corporal punishment or discipline. Socio-culturally,, finally, discourse on child abuse has practical implications for the need to take measures for children’s human rights and against child abuse, increase child protection agencies and provide parent education. This study is significant in that it tried to help raise social attention to child abuse and provide social or institutional solutions to the problem by investigating discourse on child abuse that is formed in the online child care communities and discussing problems like poor domestic environment that my contribute to child abuse.Keyword:Investigation, Child Abuse, Theory of Critical Discourse, Fairclough, Community Discourse
-
Password is needed to create an account in most of the websites. Each website has different password and authentication policy when making an account. In addition, each country has different trend of policy in making the passwords. There are many researches about strong password and usable password. However, when it comes to practical, real world cannot adapt strong and usable password policy. South Korea is known for IT(Information Technology) and assumed to be secured in cyber space as well. However, South Korea has many problems regarding the leakage of accounts due to the password hacking. Countries beside Korea also may have analogous situation, but they may have different policies compare to Korea. Therefore, this study generally compares Korean websites’ password and authentication policies and other 5 countries’ policies by gathering policies from Alexa website and suggests recommendations.Keyword:Private Security, Password Policy, Authentication Policy, Korean Password Policy, Password Strength
-
Purpose; To prepare gluten free noodles, tapioca starch added to dry rice flour to prepare noodles, and color, texture and sensory evaluation were performed to determine the optimum amount of starch added. As a result of measuring the color value of rice noodle, TS10(10% of tapioca starch, 90% of dry rice flour) was the most similar in lightness. As a result of texture measurement of rice noodles, the hardness of rice noodle added with tapioca starch increased with the addition of starch, and the chewiness and cohesiveness were significantly higher than that of rice noodles. The addition of 5% and 10% of tapioca starch added to dry rice flour showed similar results to that of commercially available rice flour noodles. Therefore, the amount of starch added to dry rice flour is thought to be 5% and 10% of tapioca starch.Keyword:Investigation, Gluten Free Noodles, Dry Rice Flour, Texture, Sensory Evaluation
-
As the number of North Korean defectors entering South Korea has dramatically increased, various efforts have been made to settle them as members of the society. These days, the military is also positively considering military duties for North Korean defectors in line with current social movements. However, prejudice and a sense of distance towards North Korean defectors may act as negative factors in military operations. To solve this problem, the military needs to exert effort to lessen the prejudice and sense of distance towards North Korean defectors, in preparation for the latter and their second generation in joining the army. The purpose of this study is to investigate the prejudice of army soldiers on North Korean defectors by examining the effects of individual psychological traits(authoritarian personality, inclination to perfectionism, empathic ability) on prejudice(stereotypes, emotions, sense of social distance) towards North Korean defectors. A survey was carried out targeting four hundred soldiers from various units ranging from front to rear troops, rep-resenting the entire army. To summarize the results of this study, efforts are needed among the army in reducing their authoritarian personality, enhancing self-oriented perfectionism, and improving empathic ability to lessen the prejudice to-wards North Korean defectors. To do this, public advertisements and social programs(prejudice and stereotype mitigating program) must be created for soldiers to learn other cultures and positively embrace social minority groups. Through this study, the presentation of the policy making plan on recognition improvement towards North Korean defectors may be considered as an achievement.Keyword:North Korean Defectors, Authoritarian Personality, Perfectionism, Prejudices, Protection
-
The purpose of this research is to search the precondition and discuss at time of building the crime forecast program through the discussion for the utilization of big data for the active utilization of security information. Nowadays, crime forecast systems utilizing the crime information as it enters into the era of information utilization from the era of information collection are being attempted. The more information is, the higher the crime forecast system becomes precise and the prediction rate becomes high. However, points that the invasion of privacy, information country, the surveillance government and the infringement of the personal information, etc. should be discussed exist. Accordingly, what should be preconditioned for the public order of utilization era of big data has been suggested. As a result of discussion, first, the understanding for the police activity utilizing the big data should be preceded. Secondly, the social agreement for the utilization of big data for the utilization of crime forecast system should be drawn. Thirdly, the collection agency should be procured variously. Lastly, the criteria should be prepared so that the numerical value for the forecast may be verified.Keyword:Crime Big Data Utilization, PredPol Program, NGI Program, Compstat, AI-Policing
-
The issue of cyberattacks has become very pervasive and increasingly dangerous in the digital age. Many industrialized nations are highly dependent upon computer systems and other technologically supported infra-structures. An attack on such infrastructures may very likely compromise a nation’s security and economic vitality. However, to dat e there has not been a multinational cooperation system as an effective cyberattack prevention strategy. While the policing of high crime areas, known as hotspots, has garnered much attention among scholars and law enforcement officials, the spatial identification of hotspots in cybercrime has been limited. Routine activity theory has often been applied to explain crimes in the physical space, and consistent with this framework, a new theory has been put forth to explain crimes in cyberspace: cyber routine activities theory . This theory contends that an unguarded virtual network must be present in addition to a potential offender and potential target in order for a cybercrime to occur. Further, unlike the spatial and temporal convergence of the physical world, the virtual world is not bound by the same spatial and temporal orderings. Due to the dynamic nature of cyberspace, a cyberattack may be committed against a target in different real world time zones, while also allowing the attacker to escape. The current study seeks to address gaps in the literature concerning spatial and temporal patterns of cyberattack origins and victimizations. The purpose of this study is to identify spatial and temporal patterns of cyberattack hotspots, which can help law enforcement establish an effective cybercrime prevention strategy for international communities. In terms of methodology, Geospatial Information System(GIS) technique is employed to investigate the patterns of cyberattacks and victimizations . Data was derived from the Norse website from February 15 16, 2017, which feeds a livestream of cyberattacks worldwide. The data includes cyberattack origins, types, targets, times, IP addresses, locations, and ports. This study focuses on answering the following four research questions: Which nations are the top seven countries by count: cyberattack origins? Which nations are the top seven countries by count: cyberattack victimizations? Do the spatial hotspots for cyberattack origins differ from the spatial hotspots for cyberattack victimizations? Does a temporal pattern of cyberattacks in the daytime differ from a temporal pattern of cyberattacks in the night time? Thus, the findings of the current study indicate (1)the spatial hotspots of the cyber attackers and victims, and ( 2)the difference between temporal patterns of cyberattacks in the daytime and nighttime. Finally, policy implications and limitations of the current study are discussedKeyword:Protection Security, Cyberattack Hotspots, Cybercrime Preventions, GIS Technique, Spatial-Temporal Patterns