• Title/Summary/Keyword: 부정행위

Search Result 218, Processing Time 0.027 seconds

The Effect of Social Worker's Person-Social Welfare Value Fit on Job Satisfaction and Organizational Commitment: Mediating Role of Emotional Labor (사회복지사의 사회복지 가치적합성이 직무만족과 조직몰입에 미치는 영향: 감성노동의 매개역할을 중심으로)

  • Shin, Junghwan;Kim, Jungwoo
    • Korean Journal of Social Welfare
    • /
    • v.66 no.4
    • /
    • pp.157-179
    • /
    • 2014
  • This study introduces the mediating role of social worker's emotional labor in the relationship between person-social welfare value fit and job-related psychological attitudes. This study characterizes emotional labor as surface acting and deep acting, and job-related psychological attitudes as job satisfaction and organizational commitment. This study hypothesizes that the social worker's person-social welfare value fit raises job satisfaction and organizational commitment, that social worker's surface acting negatively mediates the relationship between social welfare value fit and psychological attitudes, and that deep acting positively mediates the relationship. The results from this study are as follows. Firstly, social worker's person-social welfare value fit raises job satisfaction and organizational commitment. Secondly, social worker's surface acting fully mediates the relationship between social welfare value fit and organizational commitment. Thirdly, deep acting fully mediates the relationship between social welfare value fit and job satisfaction, and social welfare value fit and organizational commitment. Based on these results, detailed practical and theoretical implications are discussed.

  • PDF

이슈&이슈 - SH공사, 2010년 부패제로 원년 선포

  • 대한설비건설협회
    • 월간 기계설비
    • /
    • s.238
    • /
    • pp.25-27
    • /
    • 2010
  • 서울특별시 SH공사(사장 유민근)는 최근 정부와 서울시의 부정부패 척결의지에 부응하고 조직의 청렴도를 한단계 끌어올리기 위해 강력한 청렴종합대책을 발표했다. SH공사는 상시청렴도 평가시스템인 "청렴온도를 높여라" 및 공사 청렴도 취약분야 개선방안 자문을 위한"SH청렴도향상시민위원회"를 운영하고, 시민에게 불편을 주거나 비리유발 요인 규정 등의 정비를 통하여 비리행위 사전차단 및 항상 청렴한 조직시스템을 새롭게 구축했다.

  • PDF

Study and development on ethics code of research-learning (연구·학습윤리 규범 연구개발)

  • Yi, Sae-seong
    • Journal of Korean Philosophical Society
    • /
    • v.123
    • /
    • pp.309-346
    • /
    • 2012
  • The trust toward the researchers and their study activities in society has faltered, in the wake of the paper fabrication event of researcher, Hwang Woo-Suk's doctor research team. After the event, researcher community and scientific community have experienced many changes through the self-reflection or the process of insight meditation. Until now, we have experienced that when researcher community leads the way to try to show their efforts to eliminate the raised doubts throughly, the public support toward researcher community and the trust in its study activity have not faltered. Nevertheless, the path for the researchers to go is still far and rough because the opposite cases coping with research misconducts passively are much more. Therefore It's urgent that misconducts in the research and learning should be avoided from unnecessary overinterpretation. To practice it, above all it's important how well researcher or learner should be equipped with a system where decision is made autonomously and reasonably, regardless of the interests from all fields including politic, economic and social etc. It's also required that their systems should be meticulous enough to prevent such irrationality in advance before the misconduct instances are depreciated. In this context, I will investigate the reason why research and development on norms in research ethics and learning ethics is meaningful, not in a posteriori but a priori dimension, as the way to have researcher and learner prepare autonomous self-purification systems. It's essential that for the progress of an obvious argument, first, what research ethics and learning ethics are should be established and defined distinctly(2). Then in the process, it is also examined why research ethics and learning ethics need norms(3). Subsequently I will conclude the paper, arguing the reason why research ethics and learning ethics should be justified(4), if the norms in research ethics and learning ethics can be formulated(5).

Agent's Learning Concept for Negation (에이전트의 부정에 대한 개념 학습)

  • Tae, Kang-Soo
    • Journal of KIISE:Software and Applications
    • /
    • v.27 no.5
    • /
    • pp.521-528
    • /
    • 2000
  • One of the hidden problems in a domain theory is that an agent does not understand the meaning of its action. Graphplan uses mutex to improve efficiency, but it does not understand negation and suffers from a redundancy problem. Introducing a negative function not in IPP partially helps to solve this kind of problem. However, using a negative function comes with its own price in terms of time and space. Observing that a human utilizes opposite concept to negate a fact based on MDL principle, we hypothesize that using a positive atom rather than a negative function to represent a negative fact is a more efficient technique for building an intelligent agent. We show empirical results supporting our hypothesis in IPP domains. To autonomously learn the human-like concept, we generate a cycle composed of opposite operators from a domain theory and extract opposite literals through experimenting with the operators.

  • PDF

Empirical Analysis Approach to Investigating how Consumer's Continuance Intention to Use Online Store is Influenced by Uncertainty, Switching Cost, Offline Trust, and Individual Negative Emotion: Emphasis on Offline-Online Multi-Channels (오프라인-온라인 멀티채널 상황에서 불확실성, 전환비용, 오프라인 신뢰 및 개인의 부정감정이 사용자 지속구매의도에 미치는 영향에 관한 실증연구)

  • Jeon, Hyeon Gyu;Lee, Kun Chang
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.5
    • /
    • pp.428-439
    • /
    • 2016
  • It becomes undeniable trends that offline shopping stores operate their own online shopping stores too. The multi-channel shopping stores like this allow consumers to have much choices to shop from either offline channel or online channel. This trend, however, also opens new research issues. Especially, we have found from literature survey that a new research model is necessary for more in-depth study of the consumer behavior analysis in the multi-channel trends like this, where those constructs such as offline trust, uncertainty, switching cost, and individual negative emotion are considered. It is noted, especially in the multi-channel environments, that uncertainty and switching cost need to be considered, and that individual tends to feel negative emotion much more. By relying on 406 valid questionnaires, we obtained empirical results such that switching cost and offline trust have a positive effect on continuance intention, and uncertainty tends to increase switching cost. Individual negative emotion also affects continuance intention significantly.

The Survey of Gifted Students' Scientific Integrity and Perception of Scientific Misconduct in R&E Program (R&E 수행과정에서 과학영재고 학생의 연구윤리 준수 실태 조사)

  • Lee, Jiwon;Kim, Jung Bog
    • Journal of Gifted/Talented Education
    • /
    • v.25 no.4
    • /
    • pp.565-580
    • /
    • 2015
  • We investigated gifted students' scientific integrity, perception of scientific misconduct and needs for research ethics education. For this study, 267 science academy students who have participated in R&E program responded to questionnaire of those three parts. The major findings are as follows: First, 45.31% of gifted students answered that they had one or more experiences in five categories; fabrication, falsification, plagiarism, unfair authorship, and connivance of scientific misconduct. Second, almost 90% of gifted students responded that statements of questions are scientific misconduct except the self plagiarism. Third, 28.83% of gifted students needed to study research ethics and all of them were 1st graders. Fourth, they wanted to know specifically the limit of apt citation, writing skills of research notes, specific examples of scientific misconduct, and concrete acting method for scientific integrity, etc. In order to get gifted students to conduct their research responsibly, educators have to consider and reflect the voice of gifted students.

A Method for Efficient Malicious Code Detection based on the Conceptual Graphs (개념 그래프 기반의 효율적인 악성 코드 탐지 기법)

  • Kim Sung-Suk;Choi Jun-Ho;Bae Young-Geon;Kim Pan-Koo
    • The KIPS Transactions:PartC
    • /
    • v.13C no.1 s.104
    • /
    • pp.45-54
    • /
    • 2006
  • Nowadays, a lot of techniques have been applied for the detection of malicious behavior. However, the current techniques taken into practice are facing with the challenge of much variations of the original malicious behavior, and it is impossible to respond the new forms of behavior appropriately and timely. There are also some limitations can not be solved, such as the error affirmation (positive false) and mistaken obliquity (negative false). With the questions above, we suggest a new method here to improve the current situation. To detect the malicious code, we put forward dealing with the basic source code units through the conceptual graph. Basically, we use conceptual graph to define malicious behavior, and then we are able to compare the similarity relations of the malicious behavior by testing the formalized values which generated by the predefined graphs in the code. In this paper, we show how to make a conceptual graph and propose an efficient method for similarity measure to discern the malicious behavior. As a result of our experiment, we can get more efficient detection rate.

Comparison of IT Security Risk Analysis and Internal Control Evaluation (정보시스템 보안을 위한 위험분석활동과 내부통제평가와의 비교)

  • Cho, Sungbaek;Kim, Kuinam J.
    • Convergence Security Journal
    • /
    • v.3 no.3
    • /
    • pp.81-90
    • /
    • 2003
  • Risk analysis and internal control evaluation are key security management activities for securing organizational assets. Risk analysis is used to identify areas that need safeguarding while internal control evaluation is used to check whether the current control system is effective with a reasonable degree of assurance. Risk analysis usually focuses on unauthorised activities of unauthorised people and has not paid much attention to threats that could be committed by authorized users. As attention to fraud increases, these threats should be appropriately treated within organizations. This paper compares the difference between these two approaches.

  • PDF

Election Protocol using Verifiable Interactive Oblivious Transfer and Blind Signature (내용 은닉서명과 VIOT를 적용한 전자선거 프로토콜)

  • Kim, Sang-Choon;Yi, Yong-Ju;Lee, Sang-Ho
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.2
    • /
    • pp.392-400
    • /
    • 2000
  • In this paper, we propose an electronic election protocol based on VIOT protocol which utilizes public key cryptographic system and blind signature method to meet the seccurity requirement in election systems. Our proposed electronic election protocol provide voter's privacy and non-repudiation functionality which detect any misdemeanors of voters or relevant personnels.

  • PDF

A Study of Unknown Attack Detection using Weight and Negative/Positive Selection of Computer Immune System (컴퓨터 면역시스템의 부정 및 긍정선택과 가중치를 이용한 알려지지 않은 공격탐지 연구)

  • 정일안;김민수;노봉남
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04a
    • /
    • pp.359-361
    • /
    • 2003
  • 기존의 오용 기반 침입탐지 시스템에서는 변형되거나 새로운 해킹 방법에 대한 지속적인 탐지패턴을 지원해 주어야 하는 단점이 있다. 이러한 변형되거나 알려지지 않은 공격에 대한 탐지는 비정상행위 탐지 방법으로 본 논문에서는 컴퓨터 면역시스템의 부정 및 긍정선택 방법과 가중치의 특성을 이용하였다. 즉, 알리진 공격으로부터 특성을 추출하여 알려지지 않은 공격에 대응할 수 있도록 특성을 변경하는 방법을 사용하였다. 이러한 방법으로 공격 특성을 추출하고 특성 추출에 사용하지 않은 다른 공격에 대한 탐지를 실험한 결과 u2r 공격인 buffer overflow 공격과 race condition 공격에 대하여 정확한 탐지가 이루어짐을 보였다.

  • PDF