• Title/Summary/Keyword: 응답 거부

Search Result 43, Processing Time 0.023 seconds

The Effect of Survey Refusal and Noncontact on Nonresponse Error: For Economically Active Population Survey (응답 거부와 부재율이 무응답 오차에 미치는 영향: 경제활동인구조사를 중심으로)

  • Kim, Seo-Young;Kwon, Soon-Pil
    • The Korean Journal of Applied Statistics
    • /
    • v.22 no.3
    • /
    • pp.667-676
    • /
    • 2009
  • This study investigates the effect of survey refusal and noncontact on the nonresponse error in the household survey. For this purpose we analyzed the data of the interviewer's field work report. The survey data quality is affected by nonresponse rate and nonresponse error, and also nonresponse rate measures the reliability of the survey data. The household survey mainly contains two types of nonresponses of refusals and noncontacts. These refusals and noncontacts have different effect on the nonresponse error. This could be a venue for future research interested in decreasing the error due to noncontacts and refusals.

Detecting Protest Responses (지불거부응답의 판별)

  • OH, Hyungna
    • KDI Journal of Economic Policy
    • /
    • v.34 no.1
    • /
    • pp.135-168
    • /
    • 2012
  • This study analyzes ways to detect protest responses (hereafter, PR zero-bid) in the contingent valuation method (CVM). In order to distinguish PR zero-bids from true zero-bids (non-PR zero bids), this study adopts the concept of the implicit willingness to pay employing the Hicksian compensating surplus and the Taylor's 1st order approximation. When a respondent proposes a zero-bid (i.e., WTP=0) and chooses a PR filtering item to indicate that her implicit WTP is not necessary zero, her response is identified as a PR zero bid. PR filtering items falling into the PR zero bids category include the uncertainty of information, distrust in the government and project achievement, disagreement to project plans, discontent with the fairness of public works and their payment method and animosity against the CVM itself. The empirical analysis shows that PR zero bids take place systematically in particular respondent groups: respondents who have never used similar facilities before nor plans to use the facility provided by the public project, the employed, and low income groups. In conclusion, the study suggests that a CVM questionnaire needs to be designed carefully to minimize problems associated with PR zero bids and the potential risks of having sample selection bias should be concerned.

  • PDF

Analysis on the Effect of Unit Non-Response Adjustment using the Survey of Household Finances (가계금융조사를 활용한 단위무응답 조정효과 분석)

  • Baek, Jeeseon;Shim, Kyuho
    • The Korean Journal of Applied Statistics
    • /
    • v.26 no.3
    • /
    • pp.375-387
    • /
    • 2013
  • Unit non-response of surveys reduces the efficiency of the estimates and also causes non-response bias especially when there is large difference between respondents and non-respondents. Non-response weighting adjustments have usually been used to compensate for non-response. It is not easy to examine the non-response bias as well as to obtain information on the non-respondents in sample surveys. A household panel survey, called The Survey of Household Finances, was conducted in both 2010 and 2011. In this paper, we assume that non-response households in Wave 2 have strong non-response (non-cooperative) tendency. We classify those households into non-response households in Wave 1. Under this assumption, the characteristics of non-response households, the non-response bias and the effect of non-response adjustments are investigated.

A Study of security threats and response of Distribute Reflection Denial of Service Attack using IP spoofing (IP Spoofing을 이용한 분산 반사 서비스 거부 공격의 보안 위협과 대응 실태 연구)

  • Hong, YunSeok;Han, Wooyoung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.143-145
    • /
    • 2022
  • With the spread of the Internet around the world, devices connected to the Internet are gradually increasing. In addition, the number of distributed reflection service attacks (DrDoS), an attack that maliciously requests large responses by deceiving IPs as if the attacker was a victim, using vulnerabilities in application protocols such as DNS, NTP, and CLDAP, is increasing rapidly. It is believed that the security threat of distributed reflection service attacks will not disappear unless ISPs establish appropriate countermeasures to IP Spoofing. Therefore, this paper describes the security threat and response status of distributed reflection service attacks based on IP Spoofing.

  • PDF

Applet Security Technique against Hostile Applet's Attack (유해 애플릿 공격에 대한 애플릿 보안 기술)

  • Park, Sang-Kil;Noh, Bong-Nam
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2000.04a
    • /
    • pp.491-496
    • /
    • 2000
  • 웹상의 자바 애플릿은 클라이언트의 웹 브라우저에 다운로드 되어서 브라우저 내부에 있는 자바가상기계(JVM : Java Virtual Machine)내에서 실행된다. 각 자바가상기계에는 실행 전에 바이트 코드 검증기와 바이트 코드 인터프리터를 통하여 오류문법을 점검한다. 애플릿을 이용한 잠재적인 공격형태는 시스템 수정, 개인정보의 침해, 서비스 거부공격, 강한 거부감을 느끼게 하는 공격이 있다. 이러한 유해한 애플릿의 공격에 대응하기 위한 방법으로 코드분석, 행위분석, 위치정보등을 이용한 보안기법이 제시되었지만 효율적인 대응을 하지 못하고 있다. 이 논문에서는 자바의 특성을 이용하여 자바클래스 내부의 바이트 코드 수정을 통한 애플릿 보안기술에 대해 기술한다. 유해한 행동이 예상되는 애플릿의 클래스에 대하여 바이트 코드 수정을 통하여 안전한 클래스로 대체함으로서 유해 애플릿 공격으로부터 시스템을 보호한다. 이를 수행하기 위해 프록시 서버를 두어서 웹브라우저의 요구를 수용하고, 이를 웹 서버에게 Safe클래스로 수정하여 요구하며, 그에 대한 응답도 처리한 후 애플릿에게 보여준다. 이는 런타임때 수행되며 웹브라우저, 서버, 클라이언트의 수정없이 프록시 서버의 개입으로 이루어진다.

  • PDF

The Effect of Self-leadership and Rejection Sensitivity on Subjective Quality of Life in College Students (전문대학생의 셀프리더십, 거부민감성이 주관적 삶의 질에 미치는 영향)

  • Lee, Yunju;Seo, Bomi
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.9
    • /
    • pp.156-165
    • /
    • 2018
  • The purpose of this study was to provide a basic data required to improve the satisfaction of life in college students. A sample of 607 students attending the university in Incheon, Korea completed a survey, which consisted of a quality of life questionnaire and sociodemographic inventory. The data were collected between November 14 and November 30, 2016. Data analysis was performed using t-test, ANOVA, Pearson correlation coefficients, and stepwise multiple regression analysis with SPSS/WIN 18.0 program. The subjective quality of life was significantly correlated with self-leadership (r=.279, p<0.01) and rejection sensitivity (r=-.224, p<0.01). The significant predictors that influence the quality of life of subjects were satisfaction in major, natural reward strategies, gender, anticipated anxiety and grade, in which 27.6% (F=47.27, p<0.01) was the explained variance. (Ed note: confirm) This study showed that rejection sensitivity and self-leadership were significant factors that influenced college students' subjective quality of life. Therefore, college administrators may consider developing educational programs about rejection sensitivity and self-leadership for college students to improve subjective quality of life.

Effects of Experiences of Elderly Using Social Welfare Organizations in Socio-economic Deprivation on their Relational Aggression Damage Experiences: Verification of the Mediating Effects of Rejection Sensitivity (기관이용 노인의 사회경제적 박탈 경험이 관계적 공격성 피해 경험에 미치는 영향: 거부민감성의 매개효과 검증)

  • Jeong, YoungHee
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.6
    • /
    • pp.267-282
    • /
    • 2018
  • This study analyzes the impact of the experiences of elderly using social welfare organizations in socio-economic deprivation on their relational aggression damage experiences, and verifies the mediating effects of rejection sensitivity. For data collection, 275 of 290 questionnaires, excluding 15 questionnaires with inadequate responses, were used for the final analysis. The SPSS and AMOS programs were used for data analysis through the following procedures. The analysis showed that socio-economic deprivation experiences, relational aggression damage experiences, and rejection sensitivity were higher for the groups of male elderly, higher age, education above college, absence of spouse, and longer institutionalization. The size of indirect effect (${\beta}=.32$) was larger than that of direct effect (${\beta}=.14$), signifying that the indirect impact through rejection sensitivity was larger than the impact of socio-economic deprivation on the experiences of damage by relational aggression. With the above findings, this study makes practical suggestions for institutional measures to reduce the elderly's relational aggression damage experiences and rejection sensitivity and programs on socio-economic deprivation, etc.

Types of Students' Responses to Anomalous Data (변칙 사례에 대한 학생들의 반응 유형)

  • Noh, Tae-Hee;Lim, Hee-Yeon;Kang, Suk-Jin
    • Journal of The Korean Association For Science Education
    • /
    • v.20 no.2
    • /
    • pp.288-296
    • /
    • 2000
  • In this study, the types and the characteristics of students' responses to anomalous data were investigated. The criteria for classifying students' responses were 'acceptance of validity of anomalous data', 'acceptance of inconsistency between anomalous data and initial theory', and 'change of belief in initial theory'. Seven types of responses were identified as follows: Rejection, reinterpretation, exclusion, uncertainty, peripheral theory change, partial belief change, and theory change. Absolute belief in the intial theory and doubts about methodological accuracy were found to be the major reasons for rejecting anomalous data. The students did not accept the inconsistency between anomalous data and initial theory because they ignored the experimental procedures and focused on the similarity of the experimental results.

  • PDF

Issues in Applying CV Methods to the Preliminary Feasibility Test (예비타당성조사 적용 CVM의 분석체계와 개선과제)

  • Eom, Young Sook;Kwon, Oh-Sang;Shin, Youngchul
    • Environmental and Resource Economics Review
    • /
    • v.20 no.3
    • /
    • pp.595-628
    • /
    • 2011
  • This study investigates the issues and suggests reform measures in applying CV methods to the Korea Development Institute's (KDI's) Preliminary Feasibility Test (PFT) of public projects. Most public projects on culture, science and environment evaluated under the PFT system belong to the category of "nonstandard" projects whose outputs are non-marketed, and CV is currently the main tool used for their benefit estimation. A careful discussion and investigation is recommended for the selection of target population, payment vehicle, and number of payment times. Operating expert reviews, focus group interviews, and pre-tests is highly recommended to reduce the potential bias involved in the CV studies. A single or double bounded dichotomous choice format is the most popular design of questionnaire, but we identify several undissolved issues in designing and implementing the format. Some other forms of inducing WTPs may still deserve our consideration. Various specifications of the WTP function need to be tried and tested based on their stability, in particular. Employing a nonparametric approach is also recommended. Treatments of 0 or negative WTPs and protest bids are shown to be the most serious issues that affect the estimation results significantly. We review diverse measures of handling those issues and summarize their advantages and shortcomings.

  • PDF

A Lightweight RFID Authentication Protocol Based on Hash Chain (해시체인기반의 경량화 RFID 인증 프로토콜)

  • Youn, Keun-Young;Kim, Dong-Seong;Park, Jong-Sou
    • Convergence Security Journal
    • /
    • v.6 no.1
    • /
    • pp.45-53
    • /
    • 2006
  • It has been proposed that several RFID authentication protocols based on hash chain. Status based authentication protocol and challenge-response based authentication protocol are secured against location tracking attacks, spoofing attacks, replay attacks, traffic analysis attacks but are vulnerable to Dos attacks. RFID authentication protocol with strong resistance against traceability and denial of service attack is secured against location tracking attack, spoofing attacks, replay attacks, DoS attacks but are vulnerable to traffic analysis attacks. The present study suggests a more secure and lightweight RFID authentication protocol which is combining the advantages of hash-chain authentication protocol and RFID authentication protocol with strong resistance against traceability and denial of service attack. The results of the secure analysts for a proposed protocol are illustrated that it is secured against location tracking attacks, spoofing attacks, replay attacks, traffic analysis attacks, Dos attacks and is a lightweight operation between server and tag.

  • PDF