• Title/Summary/Keyword: 이중 프로세스 이론

Search Result 7, Processing Time 0.024 seconds

A Study on the Influence of Victimization Experience and Awareness on Cyber Security Behavior - Focusing on Dual Process Theory (침해 경험 및 정보보호 인식이 정보보호 행동에 미치는 영향에 대한 연구 : 이중 프로세스 이론을 중심으로)

  • Kim, Chang-Il;Heo, Deok-Won;Lee, Hye-Min;Sung, Wook-Joon
    • Informatization Policy
    • /
    • v.26 no.2
    • /
    • pp.62-80
    • /
    • 2019
  • The purpose of this study is to investigate the direct effect of victimization experience on cyber security behavior and the indirect effect of information protection awareness through the Dual Process Theory. Baron & Kenny regression analysis was conducted and the results are as follows - first, victimization experience has a positive effect on cyber security behavior; second, the relationship between victimization experience and cyber security behavior is mediated by cyber security awareness; and third, the direct effect of victimization experience on cyber security behavior and the indirect mediating effect of cyber security awareness are both positive (+). The direct effect of victimization experience on cyber security behavior is analyzed to be relatively large compared to the indirect effect that cyber security awareness has on cyber security behavior. Based on these results, It is suggested that periodic cyber security education and campaign policies are needed to enhance cyber security behavior.

A Study on Privacy Paradox from the Behavioral Economics Perspective (행동경제학 관점에서 프라이버시 역설에 관한 연구)

  • Kim, Jongki;Kim, Sanghee
    • Informatization Policy
    • /
    • v.22 no.3
    • /
    • pp.16-35
    • /
    • 2015
  • Recently, several studies in the field of privacy research suggested counterintuitive phenomenon about previous studies on existing perspectives. They claim that consistency of attitude and behavior does not exist, which is called privacy paradox. This study aims to clarify the relationship between intention to information disclosure and actual behavior based on the privacy paradox perspective. It attempts to explain the causes of privacy paradox phenomenon through the dual process theory being discussed in the field of behavioral economics. The results of empirical analysis are as follows. First, paired t-test analysis between intention to information disclosure and actual behavior was statistically significant. This means the existence of privacy paradox. Second, privacy risk had significant explanatory power to behavioral intention, and privacy trust had significant explanatory power to actual behavior. In conclusion, this study shows that negative belief influences decision making situation controlled by rational thinking whereas positive belief influences actual situations controlled by intuitive thinking.

A Study on the Development of BIM Guideline (BIM 가이드라인 개발에 관한 연구)

  • Seong, Joon-Ho;Kim, Ghil-Chae
    • Journal of KIBIM
    • /
    • v.1 no.2
    • /
    • pp.1-5
    • /
    • 2011
  • A recent introduction of BIM has raised a necessity for BIM guidelines and guidelines following the decision about the BIM introduction are being present both home and abroad. This study hereby intended to develop BIM guidelines to the architectural field, for which the role and development directives of BIM guidelines were set up based on BIM concepts and examples of foreign guidelines. As a result, the role of guideline in (1)Activation of BIM (2)Support BIM process (3)Support and enhance collaboration (4)Standardized implementation of construction information (5)Technical support for BIM utilizing technology. It also classified the role of each guideline, standard and manual to establish detailed development directives. Besides, regarding the BIM process to clarify the goal to share among participants, information levels per stage and applicable scopes, for the sake of when to introduce BIM and how to use it properly, their contents were suggested in consideration of applicable BIM technologies based on business for each design stage at home.

Kalman filter modeling for the estimation of tropospheric and ionospheric delays from the GPS network (망기반 대류 및 전리층 지연 추출을 위한 칼만필터 모델링)

  • Hong, Chang-Ki
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.30 no.6_1
    • /
    • pp.575-581
    • /
    • 2012
  • In general, various modeling and estimation techniques have been proposed to extract the tropospheric and ionospheric delays from the GPS CORS. In this study, Kalman filter approach is adopted to estimate the tropospheric and ionospheric delays and the proper modeling for the state vector and the variance-covariance matrix for the process noises are performed. The coordinates of reference stations and the zenith wet delays are estimated with the assumption of random walk stochastic process. Also, the first-order Gauss-Markov stochastic process is applied to compute the ionospheric effects. For the evaluation of the proposed modeling technique, Kalman filter algorithm is implemented and the numerical test is performed with the CORS data. The results show that the atmospheric effects can be estimated successfully and, as a consequence, can be used for the generation of VRS data.

An Exploratory Study on the Business Failure Recovery Factors of Serial Entrepreneurs: Focusing on Small Business (연속 기업가의 사업 실패 회복요인에 관한 탐색적 연구: 소상공인을 중심으로)

  • Lee, Kyung Suk;Park, Joo Yeon;Sung, Chang Soo
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.16 no.6
    • /
    • pp.17-29
    • /
    • 2021
  • Recently, as social distancing have been raised due to the re-spread of COVID-19, the number of serial entrepreneurs who are closing their business is rapidly increasing. Learning from failure is a source of success, but business failure can result in psychological and economic losses and negative emotions of the serial entrepreneur. At this point, it is very important to find a way to recover the negative emotions caused by business failures of serial entrepreneurs. Recently, a strategic model has emerged to deal with the negative emotions of grief caused by business failures of serial entrepreneurs. This study identified the recovery factors from the grief of business failures of serial entrepreneurs and analyzed Shepherd's(2003) three areas: loss orientation, restoration orientation, and dual process. To this end, individual in-depth interviews were conducted with 12 small business serial entrepreneurs who challenged re-startup to identify the attributes of recovery factors that were not identified with quantitative data. As a result of the study, first, recovery factors were investigated in three areas: individual orientation, family orientation, and network orientation. It was found to help improve recovery in nine categories: self-esteem, persistence, personal competence, hobbies, self-confidence, family support, networks, religion, and social support. Second, recovery obstacle factors were investigated in three areas: psychological, economic, and environmental factors. Nine categories including family, health, social network, business partner, competitor, partner, fund, external environment, and government policy were found to persist negative emotions. Third, the emotional processing process for grief was investigated in three areas: loss orientation, restoration orientation, and dual process. Ten categories such as family, partner support, social member support, government support, hobbies, networks, change of business field, moving, third-party perspective, and meditation were confirmed to enhance rapid recovery in the emotional processing process for grief. The implications of this study are as follows. The process of recovering from the grief caused by business failures of serial entrepreneurs was attempted by a qualitative study. By extending the theory of Shepherd(2003), This study can be applied to help with recovery research. In addition, conceptual models and propositions for future empirical research were presented, which can be discussed in carious academic ways.

Study of Information Security Management Model in Public Institution (공공기관의 정보보안 관리 모델 연구)

  • Kim, JaeKyeong;Jeong, Yoon-Su;Oh, ChungShick;Kim, JaeSung
    • Journal of Digital Convergence
    • /
    • v.11 no.2
    • /
    • pp.43-50
    • /
    • 2013
  • Recently, Cyber threats that is doing intelligence and sophistication from the organization's information assets to secure order technical disciplines, as well as managerial and environmental sectors, such as mind-response system is must established. In this paper, possible to analyze the case for the theory in network security, such as the logical network and physical network separation suitable for the corporate environment and constantly respond and manage the Information Security Management Model A secure network design is proposed. In particular, the proposed model improvements derived from the existing network, network improvements have been made in order to design improved ability to respond to real-time security and central manageability, security threats, pre-emptive detection and proactive coping, critical equipment in the event of a dual hwalreu through applied features such as high-availability, high-performance, high-reliability, ensuring separation of individual network security policy integrated management of individual network, network security directional.

Buffer Cache Management for Low Power Consumption (저전력을 위한 버퍼 캐쉬 관리 기법)

  • Lee, Min;Seo, Eui-Seong;Lee, Joon-Won
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.35 no.6
    • /
    • pp.293-303
    • /
    • 2008
  • As the computing environment moves to the wireless and handheld system, the power efficiency is getting more important. That is the case especially in the embedded hand-held system and the power consumed by the memory system takes the second largest portion in overall. To save energy consumed in the memory system we can utilize low power mode of SDRAM. In the case of RDRAM, nap mode consumes less than 5% of the power consumed in active or standby mode. However hardware controller itself can't use this facility efficiently unless the operating system cooperates. In this paper we focus on how to minimize the number of active units of SDRAM. The operating system allocates its physical pages so that only a few units of SDRAM need to be activated and the unnecessary SDRAM can be put into nap mode. This work can be considered as a generalized and system-wide version of PAVM(Power-Aware Virtual Memory) research. We take all the physical memory into account, especially buffer cache, which takes an half of total memory usage on average. Because of the portion of buffer cache and its importance, PAVM approach cannot be robust without taking the buffer cache into account. In this paper, we analyze the RAM usage and propose power-aware page allocation policy. Especially the pages mapped into the process' address space and the buffer cache pages are considered. The relationship and interactions of these two kinds of pages are analyzed and exploited for energy saving.