• Title/Summary/Keyword: 보호행동전략

Search Result 41, Processing Time 0.051 seconds

A Study on the Effects of Protective Behavioral Strategies on Alcohol-Related Harms in Adults (보호행동전략이 성인의 음주폐해에 끼치는 영향에 관한 연구)

  • Lee, Hee Jong;Park, Ka Young
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.5
    • /
    • pp.627-637
    • /
    • 2021
  • Many efforts have been made to prevent alcohol related harms such as health problems and socio-economic problems. Among them, the method of improving drinking behavior at the individual level is the most direct intervention. The effectiveness of the use of protective behavior strategies(PBS) has been widely known in Western countries. The purpose of this study is to empirically verify whether the use of PBS affects alcohol related harms in Korean adults. The survey has been conducted on 2,000 adult men and women. As a result, it is found that the use of PBS reduced alcohol related harms in adults. Among the PBS, the biggest impact on alcohol related harms is the area related serious harm reduction strategy, followed by restrictions on 'manner of drinking'. The effects of 'limiting/ stopping of drinking' is not significant. In addition, drinking frequency, binge drinking, and drinking motivations have significant positive effects on alcohol-related harms, and only social motivation has a negative effect. In this work, we propose follow-up studies on identifying relationships between protective behaviors and alcohol related factors through longitudinal studies and strengthening the use of protective behavior strategies that applied to the refined target populations.

효과적인 정보보호 교육 및 훈련을 위한 프레임워크 개발

  • 오창규;김종기
    • Review of KIISC
    • /
    • v.13 no.2
    • /
    • pp.59-69
    • /
    • 2003
  • 오늘날의 정보시스템 환경에서는 물리적인 접근 통제나 정보보호기술 측면에서의 통제만으로 정보자원을 효과적으로 보호하기 어렵다. 흔히 정보보호는 기술보다는 관리의 문제라고 한다. 따라서 효과적인 정보보호는 조직 구성원의 정보보호 중요성에 대한 인식을 전제로 하며, 인식을 높이기 위해서는 적절한 교육과 훈련이 수반되어야 한다. 본 연구에서는 사회심리학 관점으로부터 의사결정과정 측면과 교육 및 훈련의 효과성 측면에서 정보보호에 대한 사용자의 실제 행동과 내면화 과정을 규명하였다. 이를 토대로 조직 구성원이 지속적인 정보보호 실제 행동을 할 수 있는 정보 보호 교육 및 훈련 프레임워크를 제안하고, 구성요소별 전략과 프로그램의 실행 단계를 소개하였다.

Development of Social Work Strategies for School-linked services - Based on Latent Class Growth Analysis of Delinquent Behaviors in adolescence - (학교연계 서비스를 위한 사회복지실천 전략 개발 - 청소년기 경비행행동의 차별적 발달궤적에 대한 잠재계층성장분석 -)

  • Lee, Sang-Gyun
    • Korean Journal of Social Welfare Studies
    • /
    • v.40 no.3
    • /
    • pp.377-406
    • /
    • 2009
  • This study used laten class growth analysis to identify discrete developmental patterns of delinquent behaviors in adolescence. This present article also examined associations among these trajectories to determine how the development of delinquent behaviors relates to protective and risk factors, which include parental monitoring, attachment with parent, association with deviant peers, self-control, and negative stigma from others. Four-wave panel data from a Korea Youth Panel Study were used for the latent class growth model analysis. The sample consisted of 3,446 adolescents who were assessed at 4 measurement waves with approximately 1-year interval. Four trajectories of delinquent behaviors emerged: delinquency persistence, delinquency increaser, delinquency decreaser, normative group(almost no delinquent behaviors). Association with deviant peers had the most proximal strong influence on the probability of being in the delinquency increaser and delinquency persistence group compared, noed to the normative group. Parental monitoring, self-efficacy and negative stigma also differentiated the four delinquent behavior trajectories from one another after controllig for socio-demographic variables. The study suggested that there is a significant heterogeneity in the timing and change rate of delinquency progression. Adolescent delinquency prevention and intervention programs will need to consider this heterogeneity and enhance attention to protective and risk factors depending on the subpopulation.

Cooperative Strategies and Swarm Behavior in Distributed Autonomous Robotic Systems based on Artificial Immune System (인공면역 시스템 기반 자율분산로봇 시스템의 협조 전략과 군행동)

  • 심귀보
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.9 no.6
    • /
    • pp.627-633
    • /
    • 1999
  • In this paper, we propose a method of cooperative control (T-cell modeling) and selection of group behavior strategy (B-cell modeling) based on immune system in distributed autonomous robotic system (DARS). Immune system is living body's self-protection and self-maintenance system. These features can be applied to decision making of optimal swarm behavior in dynamically changing environment. For applying immune system to DARS, a robot is regarded as a ?3-cell, each environmental condition as an antigen, a behavior strategy as an antibody and control parameter as a T-cell respectively. When the environmental condition (antigen) changes, a robot selects an appropriate behavior strategy (antibody). And its behavior strategy is stimulated and suppressed by other robot using communication (immune network). Finally much stimulated strateby is adopted as a swarm behavior strategy. This control scheme is based on clonal selection and immune network hypothesis, and it is used for decision making of optimal swarm strategy. Adaptation ability of robot is enhanced by adding T-cell model as a control parameter in dynamic environments.

  • PDF

Impact on the Innovation Action for Job Autonomy of Caregiver (요양보호사의 직무자율성이 혁신행동에 미치는 영향)

  • Kim, Youn Jae;NamKoong, Sun;PARK, Su Jan
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.11 no.3
    • /
    • pp.199-208
    • /
    • 2016
  • In this study, We tried to investigate the relationship between the Caregiver's Autonomy of duty and the Their innovation action at the present situation of awareness diffusion of caregiver's job autonomy and rapid aging increasing. We analyzed the factors effected to the innovative action by the caregiver's job autonomy and demographic factor, to the caregivers who work in Seoul. As a result of the analysis, it was found the factors that effect to innovation action statistically and significantly are job autonomy, work schedule, decision-making, methodology, age, education, type of facility, scale of facility and job title. In other words, the organization tries to invest enough job autonomy to caregiver in their environment and the organizational culture tries to encourage new idea is induct positive effect to the innovative action. In this regards, the principal requires ability to create environment that the caregivers can suggest new idea, and develop the management strategy to improve caregiver's job autonomy.

  • PDF

Analysis of the effects of digital privacy security awareness and digital civic engagement on digital privacy protection behavior : focusing on volition and horizontality (디지털 개인 보안 인식과 디지털 시민 참여의식이 디지털 개인 정보보호 행동에 미치는 영향 분석: 자의성과 수평성을 중심으로)

  • Lee, Ryo-whoa;Hu, Sung-ho
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.4
    • /
    • pp.349-358
    • /
    • 2022
  • The aim of this study to analyze the effect of person and situation on digital privacy protection behaviors. The research method design is a factorial design of volition and horizontality. The measurement variables used in the investigation are digital privacy security awareness, digital civic engagement, and digital privacy protection behavior. As a result, the volition had a significant effect on digital privacy protection behavior, and it was found that influence of the high-volition-based condition was greater than the low-volition-based condition. The horizontality had a significant effect on digital privacy security awareness, digital civic engagement, and it was found that influence of the high-horizontality-based condition was greater than the low-horizontality-based condition. In addition, the discussion explains the suitable contents of information security usability based on these research results.

A Content Site Management Model by Analyzing User Behavior Patterns (사용자 행동 패턴 분석을 이용한 규칙 기반의 컨텐츠 사이트 관리 모델)

  • 김정민;김영자;옥수호;문현정;우용태
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04a
    • /
    • pp.539-541
    • /
    • 2003
  • 본 논문에서는 컨텐츠 사이트에서 디지털 컨텐츠를 보호하기 위하여 사용자 행동 패턴을 분석을 이용해 특이한 성향을 보이는 사용자를 탐지하기 위한 모델을 제시하였다. 사용자의 행동 패턴을 분석하기 위한 탐지 규칙(detection rule)으로 Syntactic Rule과 Semantic Rule을 정의하였다. 사용자 로그 분석 결과 탐지 규칙에 대한 위반 정도가 일정 범위를 벗어나는 사용자를 비정상적인 사용자로 추정하였다. 또한 제안 모델은 eCRM 시스템에서 이탈 가능성이 있는 고객 집단을 사전에 탐지하여 고객으로 유지하기 위한 promotion 전략 수립에 응용될 수 있다.

  • PDF

Strategic Cross-Fund Subsidization: Evidence from Equity Funds in Korea (우리나라 주식형 펀드의 전략적 행동: 주식형 펀드 간 교차보조를 중심으로)

  • Cho, Sungbin
    • KDI Journal of Economic Policy
    • /
    • v.33 no.1
    • /
    • pp.45-72
    • /
    • 2011
  • This study uses Korea's equity fund-related data ranging from Jan. 2002 to Apr. 2010 to analyze the existence of cross-subsidization among funds managed by the same management company. The findings are as follows: i) a transfer of performance outcome is confirmed to move from low-fee funds to high-fee funds, meaning that management companies tend to maximize their own interest than investors' return. And such a tendency has been strengthened since 2008. ii) young funds overperform old funds, iii) funds with high returns in the previous quarter perform better than funds with low return in the same period. These results suggest that in order to protect investors, it is necessary to conduct close monitoring on transactions that might undermine the benefits of investors and comprehensive evaluation on the capability of management companies.

  • PDF

Exploration on Risk and Protective Factors of Adolescent Runaway (청소년 가출의 위험요인과 보호요인 탐색)

  • Sang-chul Han
    • Korean Journal of Culture and Social Issue
    • /
    • v.14 no.1_spc
    • /
    • pp.273-298
    • /
    • 2008
  • The purpose of this study is to explore a risk and a protective factors of adolescent runaway based on the previous researches. Runaway of adolescents is increasing, and it is longer and more habit gradually than past. The prevailance methods of runaway is no longer effects on the decrease of adolescent runaway. Now there is to accept adolescent runaway, and has to support the difficult life conditions and the emotional distress of adolescent post-runaway. This means that must be identify and treatment the protective factors having an buffering effect as well as the risk factors influencing on runaway. Although the worse factors related family are the highest risk factors of runaway, others factors including negative peer relation, a academic stress also an have significant influence on runaway. And the protective factors mediating the negative influence of risk factors are an monitoring and controlling of parent as authoritative rearing attitude, a social support, a positive coping strategies, a self-esteem, and a conventional peer group. Protective factors prevent from runaway behavior, as well as improve a resilience of adolescents in the poor environment. The tasks of follow study are to investigate empirically the mediating effects of the protective factors on the problem behavior of post-runaway and resilience of runaway adolescents based on the systematic research design.

  • PDF

Analyzing the Privacy Leakage Prevention Behavior of Internet Users Based on Risk Perception and Efficacy Beliefs : Using Risk Perception Attitude Framework (위험지각과 효능감에 따른 인터넷 사용자의 개인정보 유출 예방행위 분석 : 위험지각태도 프레임웍을 기반으로)

  • Jang, Ickjin;Choi, Byounggu
    • The Journal of Society for e-Business Studies
    • /
    • v.19 no.3
    • /
    • pp.65-89
    • /
    • 2014
  • Although many studies have focused on the influences and outcomes of personal information leakage, few studies have investigated how the personal information leakage prevention behavior differs depending on internet user. This study attempts to supplement the existing studies' limitations with the use of risk perception attitude (RPA) framework. More specifically, this study tries to show internet user can be classified into four groups based on perceived risk of personal information leakage and efficacy beliefs of personal information protection, and to identify how the groups differ in terms of motivation, information seeking, and behaviors for privacy leakage prevention. Analysis on survey data from 276 internet users reveals that the users can be classified into responsive, avoidance, proactive, indifference groups. Furthermore, there are differences between groups in terms of motivation, information seeking, and behaviors for personal information leakage prevention. This study contributes to expand existing literature by providing tailored guidelines for implementation of personal information protection strategies and policy.