• Title/Summary/Keyword: 규범적 접근

Search Result 147, Processing Time 0.021 seconds

Comparative analysis of inter-Korean acoustic terminology and proposal for integration (남북한 음향학 전문용어 비교 분석 및 통합안 제시)

  • Jiwan Kim
    • The Journal of the Acoustical Society of Korea
    • /
    • v.42 no.4
    • /
    • pp.271-284
    • /
    • 2023
  • This study compared 431 acoustic terminology of South Korean industrial standards and North Korean national standards based on IEC 60050-801:1994 international standards. In addition, this study attempted to integrate acoustic terminology between the two Koreas. There were 139 (32.3 %) AA types with exactly the same form of terminology, 35 (8.1 %) Aa types with different spellings due to differences in linguistic norms, and 257 (59.6 %) AB types with completely different forms. Morphologically, there were more than twice as many different types of terminology as the same type. In the integration of acoustic terminology with different forms, 178 (61 %) North Korean terminology and 76 (26 %) South Korean terminology were adopted. we would like to overcome the limitations of this study through the following suggestions. First, the government should support academic exchanges between the two Koreas and encourage the establishment of common standards for acoustic terminology. Second, efforts should be made to share acoustic terminology data between the two Koreas and publish an integrated acoustic terminology dictionary. Third, South and North Korea should jointly launch a terminology committee to make efforts to revise international standards together.

Influence of Motivational, Social, and Environmental Factors on the Learning of Hackers (동기적, 사회적, 그리고 환경적 요인이 해커의 기술 습득에 미치는 영향)

  • Jang, Jaeyoung;Kim, Beomsoo
    • Information Systems Review
    • /
    • v.18 no.1
    • /
    • pp.57-78
    • /
    • 2016
  • Hacking has raised many critical issues in the modern world, particularly because the size and cost of the damages caused by this disruptive activity have steadily increased. Accordingly, many significant studies have been conducted by behavioral scientists to understand hackers and their practices. Nonetheless, only qualitative methods, such as interviews, meta-studies, and media studies, have been employed in such studies because of hacker sampling limitations. Existing studies have determined that intrinsic motivation was the dominant factor influencing hackers, and that their techniques were mainly acquired from online hacking communities. However, such results have yet to be causally proven. This study attempted to identify the causal factors influencing the motivational and environmental factors encouraging hackers to learn hacking skills. To this end, hacker community members using the theory of planned behavior were observed to identify the causal factors of their learning of hacking skills. We selected a group of students who were developing their hacking skills. The survey was conducted over a two-week period in May 2015 with a total of 227 students as respondents. After list-wise deletion, 215 of the responses were deemed usable (94.7 percent). In summary, the hackers were aware that hacking skills are considered socially unethical, and their attitudes toward the learning of hacking skills were affected by both intrinsic and extrinsic motivations. In addition, the characteristics of the online hacking community affected their perceived behavioral control. This study introduced new concepts in the process of conducting a causal relationship analysis on a hacker sample. Moreover, this research expanded the discussion on the causal direction of subjective norms in unethical research, and empirically confirmed that both intrinsic and extrinsic motivations affect the learning of hacking skills. This study also made a practical contribution by raising the educational and policy response issues for ethical hackers and demonstrating the necessity to intensify the punishment for hacking.

India's Maritime-Security Strategy: Pretext, Context and Subtext (인도의 해상 안보 전략: 구실, 맥락 및 숨은 의미)

  • Khurana, Gurpreet S
    • Maritime Security
    • /
    • v.4 no.1
    • /
    • pp.1-56
    • /
    • 2022
  • Why has India become a key actor in the maritime-configured Indo-Pacific region? There are some external factors, but for India, its geo-strategic frontier encompassing its geopolitical and maritime interests is expanding rapidly beyond its territorial space across both the Indian and Pacific oceans amidst an increasingly arduous geopolitical and security environment. India must, therefore, acquire the ability to influence events within this strategic arena using all facets of national power, including maritime-military power. Lately, therefore, New Delhi has invested much intellectual capital to review its maritime-security strategy. India's new strategy is premised on the concept of holistic security involving the 'softer' aspects of maritime-security, and a rekindling of maritime consciousness in India, a nation that has traditionally been beset by 'sea-blindness'. The strategy adopts a region-wide, inclusive, and a more proactive approach than hitherto, as is evident in its title 'Ensuring Secure Seas: Indian Maritime Security Strategy'. While it deals with the growing concern of new non-traditional threats in the Indian littoral and the need for military deterrence and preparedness, it also addresses the imperatives for India to seek a favorable and rules-based benign environment in its immediate and extended maritime periphery, including through multi-vectored strategic partnerships dictated by its enduring principle of strategic autonomy. For a more profound and comprehensive understanding of India's maritime-security strategy, this paper examines the key unstated and implicit factors that underpin the strategy. These include India's historical and cultural evolution as a nation; its strategic geography; its geopolitical and security perceptions; and the political directions to its security forces. The paper deals specifically with India's response to maritime threats ranging from natural disasters, crime and state-sponsored terrorism to those posed by Pakistan and China, as well as the Indian Navy's envisaged security role East of the Malacca Straits. It also analyzes the aspects of organizational restructuring and force planning of India's maritime-security forces.

  • PDF

Belief factors associated with breastfeeding intentions of single women: Based on the theory of planned behavior (계획적 행동이론을 적용한 미혼여성의 모유수유 의도와 관련된 신념요인)

  • Jang, Min Kyung;Lee, Seung-Min;Khil, Jin
    • Journal of Nutrition and Health
    • /
    • v.50 no.3
    • /
    • pp.284-293
    • /
    • 2017
  • Purpose: This study was conducted to examine the behavioral intentions of breastfeeding in single women using the theory of planned behavior. Methods: The questionnaires were distributed to 350 single women in her 20~30s, and 316 respondents were analyzed by descriptive statistics, Spearman's correlation, and multiple regression analysis. Results: The subjects showed strong intentions and favorable attitudes toward breastfeeding. The subjects were more favorably influenced by their mothers, siblings, friends, and coworkers who previously experienced breastfeeding than ones with no breastfeeding experiences. There were significant correlations between breastfeeding intention and attitudes (r = 0.321, p < 0.0001), subjective norms (r = 0.434, p < 0.0001), and perceived control (r = 0.307, p < 0.0001). However, regression analysis with two different age groups revealed that subjective norms (p < 0.0001) and perceived control (p < 0.001) contributed to the model of explaining breastfeeding intentions in subjects who were 25 years old or younger, whereas attitudes did not. In addition, subjects who were more than 25 years old showed that attitudes (p < 0.003) and subjective norms (p = 0.002) contributed to the model of explaining breastfeeding intentions while perceived control (p < 0.070) showed less contribution. Conclusion: These results suggest that the theory of planned behavior can be a useful tool to increase the rate of breastfeeding intentions in single women when designing educational materials, which requires consideration of age differences.

A Study on the Precedents Changing Related to International Jurisdiction in Electronic Commerce-Focused on U.S. Cases- (전자상거래의 국제재판관할 관련 판례변화에 관한 연구)

  • Woo, Kwang-Myung
    • International Commerce and Information Review
    • /
    • v.13 no.3
    • /
    • pp.3-29
    • /
    • 2011
  • The Internet has become a medium through which people engage in increasingly sophisticated transactions. Businesses and consumers now use the Internet to communicate and engage in commercial transactions creating a virtual worldwide marketplace. They fear that the determination of Internet jurisdiction could be uncertain because electronic commerce is not executed in one particular place. Until now, there are no specific rules in the model laws and conventions dealing with international jurisdiction in electronic commerce. Due to the fact that U.S. companies are at the forefront of Internet technology, litigation regarding electronic commerce in the U.S. is more advanced than anywhere else in the world This paper analysis the basic framework for personal jurisdiction and approach for determining international jurisdiction in electronic commerce cases and explain the differences of several approaches involving interactions over the Internet. According to jurisdiction approach test, the U.S. employs sliding scale, effects and targeting test in electronic commerce. In recent many research views the targeting test as a global standard for determining international electronic commerce jurisdiction. However, there is still no clear indication of conclusive test of jurisdiction determination for electronic commerce. Therefore, it is a changing and process of jurisdiction test in the U.S. cases. In Korea, there is jurisdiction related clause in Private International Law, but it may be asked whether applicable in electronic commerce. Accordingly, analysis of the precedents changing related to electronic commerce jurisdiction of U.s. is full of suggestions in Korean companies, consumers and helps an enactment of code of civil procedure that containing many group's demands.

  • PDF

A study on the structure of the Three storied Stone pagoda in Gameunsa Temple site (감은사지 삼층석탑 구조)

  • Nam, si-jin
    • Korean Journal of Heritage: History & Science
    • /
    • v.38
    • /
    • pp.329-358
    • /
    • 2005
  • The Three storied Stone pagoda in Gameunsa Temple site, one of the early staged stone pagodas, has been known as a standard for Silla stone pagodas. A stone pagoda is not only a stone art work and but also a stone structure. Most studies and investigation of the stone pagoda has done mainly based on style and chronological research according to an art historical view. However, there is not an attempt to research the stone pagoda as a stone architecture. Most Korean experts at the stone pagoda has art history in their background. Engineers who can understand the structure of the stone pagoda are very limited. More architectural and engineering approach is need to research not only art historial understanding but also safety as a structure. We can find many technical know-how from our ancestors who made stone pagodas. 1. To reduce any deformation such as relaxation and sinking of BuJae which is caused by a heavy load, the BuJae (consist of a foundation stone and lower stereobates) should be enlarged. 2. A special construction method for connection between Myonsuk and Tangjoo was invented. This unique method is not used any longer after the Three storied Stone pagoda in Gameunsa Temple site. 3. The upper BuJae and the lower BuJae are missed each other by making a difference of Okgaesuk and Okgaebatchim in size. It is done for a distribution of perpendicular load and a prevention for relaxation of BuJae. 4. The center of gravity in the BuJae is located to the center of the stone pagoda by trimming the upper surface of the Okgaebatchim into a convex shape. The man who made stone pagodas had excellent knowledge on the engineering and techniques to understand the structure of the stone pagodas. We can confirm it as follows: the enlarged BuJae, dislocated connection between upper Bujae and lower BuJae, and moving the center of gravity close to the center of the stone pagoda.

Violations of Information Security Policy in a Financial Firm: The Difference between the Own Employees and Outsourced Contractors (금융회사의 정보보안정책 위반요인에 관한 연구: 내부직원과 외주직원의 차이)

  • Jeong-Ha Lee;Sang-Yong Tom Lee
    • Information Systems Review
    • /
    • v.18 no.4
    • /
    • pp.17-42
    • /
    • 2016
  • Information security incidents caused by authorized insiders are increasing in financial firms, and this increase is particularly increased by outsourced contractors. With the increase in outsourcing in financial firms, outsourced contractors having authorized right has become a threat and could violate an organization's information security policy. This study aims to analyze the differences between own employees and outsourced contractors and to determine the factors affecting the violation of information security policy to mitigate information security incidents. This study examines the factors driving employees to violate information security policy in financial firms based on the theory of planned behavior, general deterrence theory, and information security awareness, and the moderating effects of employee type between own employees and outsourced contractors. We used 363 samples that were collected through both online and offline surveys and conducted partial least square-structural equation modeling and multiple group analysis to determine the differences between own employees (246 samples, 68%) and outsourced contractors (117 samples, 32%). We found that the perceived sanction and information security awareness support the information security policy violation attitude and subjective norm, and the perceived sanction does not support the information security policy behavior control. The moderating effects of employee type in the research model were also supported. According to the t-test result between own employees and outsourced contractors, outsourced contractors' behavior control supported information security violation intention but not subject norms. The academic implications of this study is expected to be the basis for future research on outsourced contractors' violation of information security policy and a guide to develop information security awareness programs for outsourced contractors to control these incidents. Financial firms need to develop an information security awareness program for outsourced contractors to increase the knowledge and understanding of information security policy. Moreover, this program is effective for outsourced contractors.