• Title/Summary/Keyword: 위반행동

Search Result 80, Processing Time 0.022 seconds

Information Security Importance Perception: Protection Motivation Theory Perpectives (정보보안 중요성 인식에 관한 연구: 예방동기이론 관점에서)

  • Yim, Myung-Seong
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.1
    • /
    • pp.283-295
    • /
    • 2022
  • This study attempts to explore factors that influence the perception of importance of information security. Three possible exogenous variables including perceived certainty of punishment, perceived response cost, and acquiescense are suggested that are based on the protectiom motivation theory. As a result, we found followings. First, The perceived punishment certainty has a significant effect on the perceived importance of information security. Also, it influences a negative effect on acquiescence. Second, the response cost has a negative effect on the perceived importance of information security. In addition, the response cost positively effects on acquiescence. Finally, acquiescence negatively influences on the perceived importance of information security. The results show that, in order to increase the perceived importance of information security among employees, it is necessary to make them aware that a security violation can result in certain punishment. At the same time, organizations should also attempt to remove major obstacles accompanying security behaviors of employees. Finally, organizations encourage open communication relating to information security among employees.

A Study on the Violation of Probation Condition Determinants between Sex Offenders and Non-Sex Offenders (성범죄자와 일반범죄자의 보호관찰 경고장 관련 요인 비교)

  • Cho, Youn-Oh
    • Korean Security Journal
    • /
    • no.43
    • /
    • pp.205-230
    • /
    • 2015
  • This study aims to compare the differences of crucial factors that are associated with probation warning tickets between sex offenders and non-sex offenders in South Korea. Serious high-profile cases have occurred in recent years which resulted in public and political conners for successful sex offender management and monitoring strategy through community corrections. The official response has been to initiate a series of legislative probation and parole measures by using GPS electronic monitoring system, chemical castration, and sex offender registry and notification. In this context, the current study is designed to explore the major factors that could affect the failure of probation by comparing the differences between sex offenders and non-sex offenders in terms of their major factors which are related to the failure of probation. The failure of probation is measured by the number of warning tickets which would be issued when there is the violation of probation conditions. The data is obtained from Seoul Probation office from January, 29, 2014 to February, 28, 2014. The sample number of sex offenders is 144 and the number of non-sex offenders is 1,460. The data includes the information regarding the offenders who completed their probation order after they were assigned to Seoul Probation in 2013. Furthermore, this study uses the chi-square and logistic regression analysis by using SPSS statistical package program. The result demonstrated that only prior criminal history was statistically significant factor that was related to the number of warning tickets in the sex offender group when other variables were controlled($X^2=25.15$, p<0.05, Nagelkerke $R^2=0.23$)(b=0.19, SE=0.08, p<0.05). By contrast, there were various factors that were associated with the number of warning tickets in non-sex offender group. Specifically, the logistic regression analysis for the non-sex offenders showed that demographic variable(marital status and employment type), offender-victim relationships, alcohol addiction, violent behavior, prior criminal history, community service order, and attendance order were statistically significant factors that were associated with the odds of warning tickets. Further policy implication will be discussed.

  • PDF

A Study on the Possibility of Self-Correction in the Market for Protecting Internet Privacy (인터넷 개인정보보호의 시장자체해결가능성에 대한 연구)

  • Chung, Sukkyun
    • Journal of Digital Convergence
    • /
    • v.10 no.9
    • /
    • pp.27-37
    • /
    • 2012
  • Internet privacy has become a significant issue in recent years in light of the sharp increase in internet-based social and economic activities. The technology which collects, processes and disseminates personal information is improving significantly and the demand for personal information is rising given its inherent value in regard to targeted marketing and customized services. The high value placed on personal information has turned it into a commodity with economic worth which can be transacted in the marketplace. Therefore, it is strongly required to approach the issue of privacy from economic perspective in addition to the prevailing approaches. This article analyzes the behaviors of consumers and firms in gathering personal information, and shielding it from unauthorized access, using a game theory framework in which players strive to do their best under the given conditions. The analysis shows that there exist no market forces which require all firms to respect consumer privacy, and that government intervention in the form of a nudging incentive for information sharing and/or strict regulation is necessary.

Influencing Factors for Compliance Intention of Information Security Policy (정보보안 정책 준수 의도에 대한 영향요인)

  • Kim, Sang-Hoon;Park, Sun-Young
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.4
    • /
    • pp.33-51
    • /
    • 2011
  • This research derived the influencing factors for employees' compliance with the information security policy in organizations on the basis of Neutralization Theory, Theory of Planned Behavior and Protection Motivation Theory. To empirically analyze the research model and the hypotheses, data were collected by conducting web survey, 194 of 207 questionnaires were available. The test of causal model was conducted by PLS. Reliability, validity and model fit were found to be statistically significant. the results of hypotheses tests showed that seven ones of eight hypotheses could be accepted. The theoretical implications of this study are as follows : 1) this study is expected to play a role of baseline for future research about employee compliance with the information security policy, 2) this study attempted interdisciplinary approach through combining psychology and information system security research, and 3) it suggested concrete operational definitions of influencing factors for information security policy compliance through comprehensive theoretical review. Also, this study has some practical implications. First, it can provide the guideline to support the successful execution of the strategic establishment for implement of information system security policies in organizations. Second, it is proved that the need for conducting education and training program suppressing employees. neutralization psychology to violate information security policy should be emphasized in the organizations.

A Study on the Ritual of Exorcism Play and Mask Play - Based on Victor Turner's theory of social drama (굿놀이와 탈놀이의 제의성 고찰 -빅터 터너(V. Turner)의 사회극 이론을 바탕으로)

  • Yang, Jin-Young
    • (The) Research of the performance art and culture
    • /
    • no.39
    • /
    • pp.581-607
    • /
    • 2019
  • Noting that exorcism play and mask play are different in their ritual nature, this paper aims to examine their ritual through the social drama theory of Victor Turner, a cultural anthropologist. Turner views every incident in human history as a social drama and interprets it based on the four-step structural theory of breach, crisis, redressive action, and reintegration. In particular, he believes that the redressive phase takes place through a ritual solution rather than a legal or political solution in the village community. Based on such Turner's theory, Chapter 2 analyzes Yeonggamnori, Jeju's typical exorcism play, and explains the process leading to reintegration in accordance with peaceful ritual. Chapter 3 then analyzes the Puppet Play on the same principle and examines that redressive action is being resolved through a sacrificial ritual in the case of this play. Chapter 4 checks whether the results from the previous two plays show similar aspects in other traditional plays. To this end, the exorcism play will be analyzed for Jeju's Seocheon Flower Play, Junsangnori, Segyeongnori and Sanshinnori, while the mask play will include Bongsan Mask Dance, Yangju Byeonsandae Play, Goseong Ogwangdae and Hahoe Mask Dance. As a result of these studies, it is the main point of the study to prove that exorcism play and mask play are different in their ritual nature. However, this research is only in the stage of seeking differences in its ritual, and the review on the historical and social causes of differences is left as a research task at a later date.

Young Children's Free Choice Activities and a Play Rule Restricting the Number of Players (유아의 자유선택활동과 놀이 인원수 제한규칙)

  • Lee, Eu Jung;Won, Kye Son
    • Korean Journal of Childcare and Education
    • /
    • v.12 no.1
    • /
    • pp.57-81
    • /
    • 2016
  • The purpose of this study was to find out the feature of children's play according to a player number restriction rule in the free choice activities. And it is expected that the result of this study will contribute to improving the management of free choice activities. The participants of this study were a homeroom teacher, professor as a co-researcher and 25 4-year-old children of a private kindergarten. The data were collected by observation, children interview and reflective journal of the teacher from July to October in 2014. The results indicated that the children were stressed out with using name cards for presenting center selection, showed overcompetitive behaviors, and frequently violated the rules. The researchers found that the restriction rule had some dysfunctions, which were interferences of moral development, social-emotional development, self-regulation development, preventing safety-accident and free choice behavior. The researcher as a teacher abandoned the player number restriction rule, and observed the children's play. As a result, children's self-regulation abilities on physical space, play and conflicts improved and the teacher changed her strategy when managing free choice activities. Based on the results, the needs of various restriction rules and appropriate methods for applying the rules in free choice activities were further discussed.

Predicting Peer Rejection of Middle-school Students with Ordered Probit Analysis (중학생 또래따돌림('왕따')의 예측요인)

  • Lee, Sang-Gyun
    • Korean Journal of Social Welfare
    • /
    • v.37
    • /
    • pp.357-379
    • /
    • 1999
  • In recent years, the subject of peer rejection in school settings has received increased attention in the massmedia and counseling literature. This study focused on the effect of individual and environmental factors on peer rejection. Dependent variable was the number of perpetrating peer rejection and independent variables were psychological, behavioral, familial factors, exposure of peer rejection and perception about school policies. Ordered Probit model was employed because of the nature of limited dependent variable. The data were collected from 714 middle-school student in Seoul. Major findings were as follows. First of all, the adolescents who has aggression and problematic behaviors in school were more likely to participate in peer rejection. Second, negative parent-children relationships and the family structure didn't have significant effects on peer rejection. And there were not a significant effect of attitude toward academic value and academic achievement on peer rejection. Third, environmental risk factors such as negative peer relationship and the exposure to rejection had a significant increasing effect on peer rejection. But consistent school policies didn't have a significant effect. In conclusion, this study confirmed that peer rejection in school settings was affected by school environment such as negative-peer relationship, and exposure to rejection. Therefore, comprehesive and systematic intervention programs should be required to ensure that all the pupils at school have a right to learn in a safe and fear-free environment.

  • PDF

An Analysis on the Conditions for Successful Economic Sanctions on North Korea : Focusing on the Maritime Aspects of Economic Sanctions (대북경제제재의 효과성과 미래 발전 방향에 대한 고찰: 해상대북제재를 중심으로)

  • Kim, Sang-Hoon
    • Strategy21
    • /
    • s.46
    • /
    • pp.239-276
    • /
    • 2020
  • The failure of early economic sanctions aimed at hurting the overall economies of targeted states called for a more sophisticated design of economic sanctions. This paved way for the advent of 'smart sanctions,' which target the supporters of the regime instead of the public mass. Despite controversies over the effectiveness of economic sanctions as a coercive tool to change the behavior of a targeted state, the transformation from 'comprehensive sanctions' to 'smart sanctions' is gaining the status of a legitimate method to impose punishment on states that do not conform to international norms, the nonproliferation of weapons of mass destruction in this particular context of the paper. The five permanent members of the United Nations Security Council proved that it can come to an accord on imposing economic sanctions over adopting resolutions on waging military war with targeted states. The North Korean nuclear issue has been the biggest security threat to countries in the region, even for China out of fear that further developments of nuclear weapons in North Korea might lead to a 'domino-effect,' leading to nuclear proliferation in the Northeast Asia region. Economic sanctions had been adopted by the UNSC as early as 2006 after the first North Korean nuclear test and has continually strengthened sanctions measures at each stage of North Korean weapons development. While dubious of the effectiveness of early sanctions on North Korea, recent sanctions that limit North Korea's exports of coal and imports of oil seem to have an impact on the regime, inducing Kim Jong-un to commit to peaceful talks since 2018. The purpose of this paper is to add a variable to the factors determining the success of economic sanctions on North Korea: preventing North Korea's evasion efforts by conducting illegal transshipments at sea. I first analyze the cause of recent success in the economic sanctions that led Kim Jong-un to engage in talks and add the maritime element to the argument. There are three conditions for the success of the sanctions regime, and they are: (1) smart sanctions, targeting commodities and support groups (elites) vital to regime survival., (2) China's faithful participation in the sanctions regime, and finally, (3) preventing North Korea's maritime evasion efforts.

The Effects of Psychological Contract Violation on OS User's Betrayal Behaviors: Window XP Technical Support Ending Case (심리적 계약 위반이 OS이용자의 배신 행동에 미치는 영향: 윈도우 XP 기술적 지원서비스 중단 사례)

  • Lee, Un-Kon
    • Asia pacific journal of information systems
    • /
    • v.24 no.3
    • /
    • pp.325-344
    • /
    • 2014
  • Technical support of Window XP ended in March, 8, 2014, and it makes OS(Operating System) users fall in a state of confusion. Sudden decision making of OS upgrade and replacement is not a simple problem. Firms need to change the long term capacity plan in enterprise IS management, but they are pressed for time and cost to complete it. Individuals can not help selecting the second best plan, because the following OSs of Window XP are below expectations in performances, new PC sales as the opportunities of OS upgrade decrease, and the potential risk of OS technical support ending had not announced to OS users at the point of purchase. Microsoft as the OS vendors had not presented precaution or remedy for this confusion. Rather, Microsoft announced that the technical support of the other following OSs of Wndow XP such as Window 7 would ended in two years. This conflict between OS vendor and OS users could not happen in one time, but could recur in recent future. Although studies on the ways of OS user protection policy would be needed to escape from this conflict, few prior studies had conducted this issue. This study had challenge to cautiously investigate in such OS user's reactions as the confirmation with OS user's expectation in the point of purchase, three types of justice perception on the treatment of OS vendor, psychological contract violation, satisfaction and the other betrayal behavioral intention in the case of Window XP technical support ending. By adopting the justice perception on this research, and by empirically validating the impact on OS user's reactions, I could suggest the direction of establishing OS user protection policy of OS vendor. Based on the expectation-confirmation theory, the theory of justice, literatures about psychological contract violation, and studies about consumer betrayal behaviors in the perspective of Herzberg(1968)'s dual factor theory, I developed the research model and hypothesis. Expectation-confirmation theory explain that consumers had expectation on the performance of product in the point of sale, and they could satisfied with their purchase behaviors, when the expectation could have confirmed in the point of consumption. The theory of justice in social exchange argues that treatee could be willing to accept the treatment by treater when the three types of justice as distributive, procedural, and interactional justice could be established in treatment. Literatures about psychological contract violation in human behaviors explains that contracter in a side could have the implied contract (also called 'psychological contract') which the contracter in the other side would sincerely execute the contract, and that they are willing to do vengeance behaviors when their contract had unfairly been broken. When the psychological contract of consumers had been broken, consumers feel distrust with the vendors and are willing to decrease such beneficial attitude and behavior as satisfaction, loyalty and repurchase intention. At the same time, consumers feel betrayal and are willing to increase such retributive attitude and behavior as negative word-of-mouth, complain to the vendors, complain to the third parties for consumer protection. We conducted a scenario survey in order to validate our research model at March, 2013, when is the point of news released firstly and when is the point of one year before the acture Window XP technical support ending. We collected the valid data from 238 voluntary participants who are the OS users but had not yet exposed the news of Window OSs technical support ending schedule. The subject had been allocated into two groups and one of two groups had been exposed this news. The data had been analyzed by the MANOVA and PLS. MANOVA results indicate that the OSs technical support ending could significantly decrease all three types of justice perception. PLS results indicated that it could significantly increase psychological contract violation and that this increased psychological contract violation could significantly reduce the trust and increase the perceived betrayal. Then, it could significantly reduce satisfaction, loyalty, and repurchase intention, and it also could significantly increase negative word-of-month intention, complain to the vendor intention, and complain to the third party intention. All hypothesis had been significantly approved. Consequently, OS users feel that the OSs technical support ending is not natural value added service ending, but the violation of the core OS purchase contract, that it could be the posteriori prohibition of OS user's OS usage right, and that it could induce the psychological contract violation of OS users. This study would contributions to introduce the psychological contract violation of the OS users from the OSs technical support ending in IS field, to introduce three types of justice as the antecedents of psychological contract violation, and to empirically validate the impact of psychological contract violation both on the beneficial and retributive behavioral intentions of OS users. For practice, the results of this study could contribute to make more comprehensive OS user protection policy and consumer relationship management practices of OS vendor.

Relationship between Violent Criminal Behavior and Imbalance of Scalp Hair Minerals in Man (두발중 미량 중금속과 필수금속의 과다 또는 과소의 불균형과 폭력범죄 행동과의 관련성 연구)

  • Kim, Doo-Hie;Jang, Bon-Ki;Lee, Duk-Hee;Hong, Sung-Chul;Kim, Byung-Hie
    • Journal of Preventive Medicine and Public Health
    • /
    • v.27 no.1 s.45
    • /
    • pp.25-43
    • /
    • 1994
  • To estimate the factors to the inclination of the criminal violence, the content of trace minerals and toxic metals in the scalp hair were measured during the period from May 1992 to October 1992. One hundred eleven violent and 89 nonviolent criminal inmates of Taegu Correctional Institute were selected. The inmates of violent criminals were imprisoned by murder, robber, rape, injury and violent acts. Those of nonviolent criminals were swindle, larceny, and adultery and had no history of institutional violence. The contents of two toxic metals (cadmium, lead) and five trace minerals (Cu, Fe, Zn, Mg, Na) were determined by an atomic absorption spectrophotometer (IL. 551). The contents of cadmium and lead in hair of violent criminals were significantly higher as $0.56{\pm}0.14ppm,\;11.53{\pm}3.32ppm$, respectively, than $0.42{\pm}0.20ppm,\;9.63{\pm}4.31ppm$ of nonviolent group (p<0.01). But the level of copper was significantly lower than nonviolent group (p<0.05). The factors that had a significant correlation with the inclination of violence in multiple logistic regression analysis were cadmium (odds ratio=98.09), unmarried (odds ratio=0.39), many times of criminal history(odds ratio=1.57) and residence of rural area (odds ratio=0.44). The results suggest that the sub-toxic contents of cadmium and lead in the hair may be of potential effect on behavior, and the mineral analysis may be an important adjunctive diagnostic procedure. Further studies into this problem are necessary.

  • PDF