All Articles

Improvement Plan for the SAFETY Management System of the KOREAN Martial Arts

Vol.2 (No.3) 2017
Author
admin
Date
2017-09-30 13:38
Views
203

Abstract


This study intends to suggest ways to improve the safety management measures and the safety management system following the safety accidents and complex risk factors that may arise in the field of martial arts. In order to achieve the purpose of this study, the following research questions have been set. First, what are the status and causes of the safety accidents in the martial arts? Second, what are the ways to improve the safety management system of the martial arts?
In order to achieve the purpose of this study, we have reviewed articles, papers, and books related to the safety domestic and foreign as of 2017 in order to identify the current status and causes of the safety accidents in the martial arts and to suggest ways to improve the safety management system of the martial arts where a literature survey method was used, and the collected data were divided into the status of safety accidents, cause analysis and improvement measures, respectively.
Based on the above research method and the data analysis method, the following research conclusions were acquired.
First of all, the status and causes of safety accidents in the martial sports are analyzed as follows. First, 55.9% of the martial artist population, which is more than half of the total, experienced a safety accident sustaining severe to minor injuries and experienced an average of 2.6 injuries per year.
Second, the most common injuries were pain(54.8%) and sprains(51.8%) while they were concentrated on the head and the upper body.
Third, the causes of safety accidents in martial arts activities were technical factors such as the lack of motor functionality and skills, psychological factors such as excessive exercise, lack of tension, and conceitedness, among others. In addition, physical causes such as the failure to repair the facility, such as collision with the opponent and falling, were among the main causes.
The improvement measures for the safety management system of the martial arts are as follows. First, it is necessary to continuously improve the curriculum of the martial arts instructor certificate. Second, the safety management system should be constructed through the placement of professional medical personnel related to the safety accidents along with the institutionalization of the emergency care system. Third, it is necessary to strengthen the gymnasium establishment law and leader placement standards, and mandatory safety education for instructors should be provided to provide safety environment for trainees by enhancing the ability of martial arts leaders to deal with safety accidents.
Finally, the association of each martial art should systematize the mandatory safety training so that leader and trainee can improve the problems of environment and develop new program and safety education so that they can practice and compete in safe environments.

Keyword:Martial Arts, Safety, Martial Art Safety Education, Safety Management System, Martial Art Safety Injury
  • This study focused on the role of the bystander in the school violence situation and tried to understand the choices of the bystander by applying “Theory of Planned Behavior”. In school violence situations, there are bystanders in addition to bullies and victims, and bystanders play significant roles in the situation. Sometimes their choices can determine the outcome of the school violence. According to TPB(behavior, intention, attitude, subjective norms and perceived behavioral control), the reasons why they choose to be an outsider rather than a defender can be interpreted as follows. They perceive the indifferent behaviors of a bystander and its results as positive and believe that others around will remain outsiders. Also, there is no difficulty in being a bystander, as it does not require an active action. On the other hand, they do not show the behavior of defenders because they perceive the defender's behavior and its result as negative, believe that the students in a classroom have the norm against the defender's behavior. Even if they want to take an action, they do not know what to do. And they may not be confident in taking an action even when they know what to do. In order to resolve school violence, the bystanders should respond effectively to the situation as defenders of victims. To this end, it is necessary to actively utilize the result of verifying bystander selection in school violence applying TPB. In particular, we must improve students’ attitudes toward the outsiders’ and defenders’ behaviors and the behavioral outcomes. And Concrete and explicit norms for helping behaviors should be built in their classroom. Finally, we need to inform students how to help victims and improve their confidence in those behaviors. So, we will be able to solve school violence problems by reducing outsiders and increasing defenders when designing and operating an anti-bullying program based on the TPB in the school environment.
    Keyword:Crisis, Theory of Planned Behavior, School Violence, Bullying, Bystander
  • Purpose; This paper intends to develop evaluation indicators of safety education for the Republic of Kore Army(ROKA) personnel. In Korea, there are a lot of accidents and disasters that Korean people had never been experienced including earthquakes, fire casualties, and marine accidents. There are many physical and psychological risk factors including explosion, injury, fire, traffic accident, and psychological violence, etc. Researchers suggest that ROKA soldiers are vulnerable to daily risk factors but do not receive enough safety education due to the lack of appropriate manual, instructor, and time. This study thoroughly reviewed the literature including the US Army field manual on the safety education and studies of industrial safety. Seventeen areas of safety management in the military bases were described in the field manual and counter-measures of each area were reviewed. Thirty evaluative indicators were presented based on the literature review and the value of each indicator was suggested as a milestone for designing and conducting the safety education. The 30 indicators are composed based on the CIPP(context-input-process-product) model and each of the indicator implies theoretical meanings and practical suggestions. The indicators begin with analyzing the hazard of the workplace and they contain : (1)collecting and analyzing the hazards in the workplace, (2)collecting and analyzing the information about the health management system, (3)making the safety management plan in the workplace, (4)reflecting the opinions of military personnel in making the safety management plan, (5)investigating the implementation of health education and evaluation for military personnel, (6)reflecting the military personnel’s need for health and safety education, (7)evaluating the leader’s interest in the safety and health promotion, (8)investigating the military personnel's consciousness of safety, (9)employment of officer in charge of safety management, (10)percentage of the officers in charge of the safety management, (11)employment of the officers in charge of safety and health education, (12)qualification of the officers in charge of the safety and health education, (13)presence of department of safety and health management and education, (14)volume of contents of the safety and health education, (15)Percentage of budget for safety and health education, (16)implementation of regulations on safety and health, (17)specification of educational objectives on safety, (18)review of the appropriateness of the safety education objectives, (19)diversity of educational method for the safety education, (20)specification of the safety education contents, (21)implementation of the educational plan, (22)checking the military personnel's awareness of the safety objectives, (23)the military personnel's satisfaction in the safety education, (24)participation of the military personnel in the safety education, (25)availability of resources for the safety education, (26)communication about the contents of the safety education, (27)changes in the consciousness of the safety, (28)changes in the knowledge of the safety, (29)changes in the attitude toward the safety, (30)changes in the real actions in the safety management and implementation.
    Keyword:Safety, Republic of Korea Army, Safety Education, Evaluation, Indicator
  • With radical development of information and communication Technology, Internet of Things(IoT) era has come. All the things around us are connected through internet so that it enables objects to exchange data with connected devices and is expected to offer new advanced services that goes beyond the value where each existing objects could have offered respectively. Concerns regarding security threat are being raised in adopting IoT as the number of internet-connected appliances are rapidly increasing. So, we need to consider how to protect and control countless objects. However, traditional security systems including intrusion detection systems(IDSs), firewalls(FWs), anti-viruses(A/Vs), etc., focus on low level attack or anomalies, and raise alerts independently. And IoT services have different types of security frameworks. As a result, it is difficult for human security manager or attack response systems to understand the alerts and take appropriate actions. In this paper describes the analysis of security methods in the area of IoT and describes a mechanism that analyzes logs generated by IoT devices attacks. Data collected from the lightweight application is sent to the network component for further analysis. The collaborative component is used for collecting data in the distributed network and indicates the possible attacks. Also this paper suggests enterprise security management including IoT services which are based on distributed environments, and presents a practical technique to address this issue, and introduces Event Correlation Model(ECM) which is a simple free text causal language. We show how the concept of class in object-oriented methodology is used to provide scalability to our approach. Graph and coding theories are used for correlation.
    Keyword:Safety of IoT Services, Network Security Management, Enterprise Security Management, Log Analysis, Event Correlation
  • The purpose of this study was to overcome the nursing staff shortage crisis at small and medium sized hospitals by examining the mediation effects of organizational commitment and job satisfaction on the relationship between job stress and turnover intention. To do so, this study used Price’s voluntary turnover model and suggested an integrated model by exploring the moderated mediation effects of changes in self–efficacy. Methods: The survey was conducted with 344 nurses working at small to medium sized hospitals in C city. Data collection was conducted for two weeks, from June 1 to 15, 2016, and the collected data were analyzed using Hayes’ macro process models 4 and 8 in SPSS 22.0. Results: The findings indicated that organizational commitment and job satisfaction have indirect effects on the relationship between job stress and turnover intention. Self-efficacy was found to have a moderation effect between job stress and mediating variable pathways and also have a mediation effect on job satisfaction pathways. Conclusion: In order to reduce the turnover intention of nurses in small to medium sized hospitals, it is necessary to develop a practical self-efficacy improvement program and action plan for the nursing work place.
    Keyword:Nursing Crisis, Turnover Intention, Job Satisfaction, Organizational Commitment, Self-Efficacy
  • With radical development of information and communication Technology, Internet of Things(IoT) era has come. All the things around us are connected through internet so that it enables objects to exchange data with connected devices and is expected to offer new advanced services that goes beyond the value where each existing objects could have offered respectively. Concerns regarding security threat are being raised in adopting IoT as the number of internet-connected appliances are rapidly increasing. So, we need to consider how to protect and control countless objects. However, traditional security systems including intrusion detection systems(IDSs), firewalls(FWs), anti-viruses(A/Vs), etc., focus on low level attack or anomalies, and raise alerts independently. And IoT services have different types of security frameworks. As a result, it is difficult for human security manager or attack response systems to understand the alerts and take appropriate actions. In this paper describes the analysis of security methods in the area of IoT and describes a mechanism that analyzes logs generated by IoT devices attacks. Data collected from the lightweight application is sent to the network component for further analysis. The collaborative component is used for collecting data in the distributed network and indicates the possible attacks. Also this paper suggests enterprise security management including IoT services which are based on distributed environments, and presents a practical technique to address this issue, and introduces Event Correlation Model(ECM) which is a simple free text causal language. We show how the concept of class in object-oriented methodology is used to provide scalability to our approach. Graph and coding theories are used for correlation.
    Keyword:Safety of IoT Services, Network Security Management, Enterprise Security Management, Log Analysis, Event Correlation
  • The purpose of this study was to overcome the nursing staff shortage crisis at small and medium sized hospitals by examining the mediation effects of organizational commitment and job satisfaction on the relationship between job stress and turnover intention. To do so, this study used Price’s voluntary turnover model and suggested an integrated model by exploring the moderated mediation effects of changes in self–efficacy. Methods: The survey was conducted with 344 nurses working at small to medium sized hospitals in C city. Data collection was conducted for two weeks, from June 1 to 15, 2016, and the collected data were analyzed using Hayes’ macro process models 4 and 8 in SPSS 22.0. Results: The findings indicated that organizational commitment and job satisfaction have indirect effects on the relationship between job stress and turnover intention. Self-efficacy was found to have a moderation effect between job stress and mediating variable pathways and also have a mediation effect on job satisfaction pathways. Conclusion: In order to reduce the turnover intention of nurses in small to medium sized hospitals, it is necessary to develop a practical self-efficacy improvement program and action plan for the nursing work place.
    Keyword:Nursing Crisis, Turnover Intention, Job Satisfaction, Organizational Commitment, Self-Efficacy
  • With radical development of information and communication Technology, Internet of Things(IoT) era has come. All the things around us are connected through internet so that it enables objects to exchange data with connected devices and is expected to offer new advanced services that goes beyond the value where each existing objects could have offered respectively. Concerns regarding security threat are being raised in adopting IoT as the number of internet-connected appliances are rapidly increasing. So, we need to consider how to protect and control countless objects. However, traditional security systems including intrusion detection systems(IDSs), firewalls(FWs), anti-viruses(A/Vs), etc., focus on low level attack or anomalies, and raise alerts independently. And IoT services have different types of security frameworks. As a result, it is difficult for human security manager or attack response systems to understand the alerts and take appropriate actions. In this paper describes the analysis of security methods in the area of IoT and describes a mechanism that analyzes logs generated by IoT devices attacks. Data collected from the lightweight application is sent to the network component for further analysis. The collaborative component is used for collecting data in the distributed network and indicates the possible attacks. Also this paper suggests enterprise security management including IoT services which are based on distributed environments, and presents a practical technique to address this issue, and introduces Event Correlation Model(ECM) which is a simple free text causal language. We show how the concept of class in object-oriented methodology is used to provide scalability to our approach. Graph and coding theories are used for correlation.
    Keyword:Safety of IoT Services, Network Security Management, Enterprise Security Management, Log Analysis, Event Correlation
  • The purpose of this study was to overcome the nursing staff shortage crisis at small and medium sized hospitals by examining the mediation effects of organizational commitment and job satisfaction on the relationship between job stress and turnover intention. To do so, this study used Price’s voluntary turnover model and suggested an integrated model by exploring the moderated mediation effects of changes in self–efficacy. Methods: The survey was conducted with 344 nurses working at small to medium sized hospitals in C city. Data collection was conducted for two weeks, from June 1 to 15, 2016, and the collected data were analyzed using Hayes’ macro process models 4 and 8 in SPSS 22.0. Results: The findings indicated that organizational commitment and job satisfaction have indirect effects on the relationship between job stress and turnover intention. Self-efficacy was found to have a moderation effect between job stress and mediating variable pathways and also have a mediation effect on job satisfaction pathways. Conclusion: In order to reduce the turnover intention of nurses in small to medium sized hospitals, it is necessary to develop a practical self-efficacy improvement program and action plan for the nursing work place.
    Keyword:Nursing Crisis, Turnover Intention, Job Satisfaction, Organizational Commitment, Self-Efficacy
  • Purpose: This study conducted the exploration using the Colaizzi method, a phenomenological research method to identify the constituents of the experience of the SNB-program, one of Terahertz therapy, which is receiving much attention as a thermal treatment method recently. Method: The data collection method of the first study using the Colaizzi method consisted of literature review for theoretical extraction, narrative observation and interview. For the first analysis of the data, the Colaizzi 6-step analysis method, a phenomenological research method, was used to identify the participants' SNB-program experience and explore the constituent factors of the human body's natural healing experience. Second, a questionnaire was created based on the constituent factors of the participant's experience identified through in-depth interviews, and the principle component analysis of 123 questionnaires collected was conducted to verify the inner validity of the research results. Results: In the results of this study, the SNB-program experience was confirmed based on two categories such as positive experience and uncomfortable experience. In detail, eight types of uncomfortable experiences including eight physical changes, six emotional changes, five social education changes, and improvements were derived. In addition, to verify the validity and reliability of the extracted constituent factors, from the results of constructing preliminary items and conducting exploratory factor analysis, lastly, it was confirmed with two categories, five theme clusters, and 27 formulated meanings. Conclusion: In this study, the SNB-program participant's experience was verified in vivid language through the Colaizzi method, and the procedure was verified through social science analysis. The results of this study are meaningful in that the user's experience of thermotherapy using Terahertz waves has been generalized.
    Keyword:SNB-Program, Colaizzi Method, Health Intervention, Experience, Constituent Factors
  • Purpose: The study induced obesity in 50-week-old white rats with high fat intake for eight weeks. Then for 12 weeks, we analyzed how resistance exercise with anaerobic properties and fermented soybean ingestion with a nutritional approach affect the potential mechanisms underlying body composition, metabolic risk factors, and inflammatory cytokine of aortic tissue. Method: The experimental animals were randomly assigned to four groups: Control(Con), Soybean(Soy), Resistance Expense(Re), and Soybean + Resistance Expense(Soy+Resistance). For the resistance exercise, the ladder climbing is applied, and the soy supplement made up 24% of the total calories of soy protein. After eight weeks of high-fat diets, obesity was induced and treated for 12 weeks. The appearance of inflammatory cytokine was analyzed for IL-6, TNF-α, IL-10, and IL-4 in the aortic tissue. Results: In Soy and Soy+Re groups, the fat content decreased compared to those in Con and Re groups(Figure 2A), and body fat was higher in Soy and Soy+Re groups than in Con and Re groups. The appearance of IL-6 cytokine associated with infectious diseases showed significant differences in Soy, Re, and Soy+Re groups over Con groups(p <0.05). The appearance of other cytokine, such as TNF-α, IL-4, and IL-10, showed no significant differences between the groups. Conclusion: As a result, the positive effects of fermented soybean ingestion on changes in inflammatory factors associated with vascular inflammation cannot be clearly identified in improving the function in the aortic tissue. Therefore, since it cannot be seen as a positive effect, it is necessary to choose the intake and type according to the purpose of the ingestion and to apply it compiling prior studies and literature regarding the form, frequency, intensity, and time settings of exercise.
    Keyword:Resistance Exercise, Soybeans, Obesity, Metabolic Risk Factors, Inflammatory Cytokine