• Title/Summary/Keyword: 준수 동기

Search Result 43, Processing Time 0.038 seconds

Investigating the Effect of Value Characteristics of SNS Users on SNS Usage Motivation, Social Capital, and Usage Behavior (SNS 이용자의 가치체계의 특징이 SNS 이용동기, 사회적 자본, 이용행위 등에 미치는 영향 분석)

  • Cho, Hyong-Oh
    • Journal of Digital Contents Society
    • /
    • v.19 no.2
    • /
    • pp.351-362
    • /
    • 2018
  • This study investigated how Schwartz' value system(1992) would interfere with SNS users' motivations and behavioral responses. The study result shows that values are characterized in terms of openness, mutual reciprocity, self enhancement, normative compliance, and security. Each of them exerted differential impact on SNS usage motives, social capital, ad response, and word-of-mouth, among others. The five values were used as an input for segmenting SNS users and clustering method produced four value segments; experience seeker, interdependent sympathizer, self enhancer, and norm-bound. Each value group not only influenced SNS perceptions and behavioral responses differently, but also showed a systematic relationship with SNS service types. The study findings demonstrate that Schwartz's value system provides a very useful theoretical basis for understanding the psychological mechanism underlying SNS usage.

A Study on Environmental Performance Evaluation of ISO 14001 Certification Companies -Compliance of Environmental Regulations (ISO 14001 인증 기업의 환경성과평가에 대한 연구 -법규 준수율을 중심으로)

  • Kwon, Dong-Myung;Seo, Min-Suk;Seo, Yong-Chil
    • Clean Technology
    • /
    • v.6 no.1
    • /
    • pp.7-15
    • /
    • 2000
  • The purpose of this articls is to investigate the impacts of ISO 14001 certification on the compliance of environmental regulations by Korean companies. The impact of ISO 14001 certification on the industries obtained the certificates was studied through a survey with questionnaires, and the compliance of environmental regulations was investigated using governmental release data. Motivations of Korean companies' environmental management were mostly caused by customer's request and the requirement from foreign countries. Certified enterprises showed more 3 times compliance of environmental regulation than non-certified ones. Such results were accomplished by systematic environmental management such as clear implementation purpose and all employee's voluntary improving according to ISO 14001 requirement. The continuous monitoring system was possible through internal audit and biannual audit from the certification body, to be finally verified by the top management. The four steps in ISO 14001 environmental management system, which are objective, methodology, inspection and monitoring, has contributed to this achievement.

  • PDF

Construction and Validation of a Data Synchronization Server supporting OMA DS Standards (OMA DS 표준을 지원하는 자료동기화 서버 구축 및 적합성 검증)

  • Pak, Ju-Geon;Park, Kee-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.5
    • /
    • pp.79-91
    • /
    • 2011
  • In this paper, a DS (Data Synchronization) server for mobile communication environments is constructed and the suitability and the performance of its operations are validated. The DS server provides a way to update the newest data and keep data consistency for clients (mobile devices). In addition, the DS server constructed in this paper supports various synchronization types, and detects all changes and conflicts. In case of data conflicts, the DS server resolves the conflicts according to the several policies implemented in this work. The DS server conforms to the OMA(Open Mobile Alliance) DS standard protocol for interoperability with other mobile devices and servers. In addition to the transmission-by record scheme proposed by the OMA DS standard protocol, the DS server constructed in this paper also provides the transmission-by field scheme for the enhancement transmission performance between the server and clients. In order to validate its operations, data synchronization between the DS server and the SCTS (SyncML Conformance Test Suit), the suitability validation tool provided by the OMA, is performed. The validation results show that the DS server constructed in this paper satisfies all of the test cases except the Large Object function. The Large Object function will be implemented later because the function is not needed for the personal information synchronization process which this paper aims for. Also, synchronization times of the DS server are measured while increasing the number of data and clients. The results of the performance evaluations demonstrate that the DS server is scalable, in the sense that it has not suffered from any serious bottlenecks with respect to the number of data and clients. We expect that this work will provide a framework for various studies in the future for improving mobile DS operations.

Development of Data Synchronization Client based on SyncML (SyncML 기반의 자료 동기화 클라이언트 개발)

  • Jang, Dae-Jin;Park, Kee-Hyun;Ju, Hong-Taek
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.4
    • /
    • pp.357-367
    • /
    • 2005
  • According to the recent advancement of mobile computing technology and the hardware technology, the mobile device has rapidly come into wide use.'rho data in the central management server needs to confirm to that in mobile devices in order for the mobile device users to access the needed data regardless of time and place. This is called Data Synchronization. Currently, major mobile device manufacturing companies provide the data synchronization solutions, but these solutions are not compatible with other mobile devices/other applied services. In order to solve this problem, OMA(Open Mobile Alliance), mainly composed of mobile telecommunication companies, has suggested using the SyncML(Synchronization Markup Language) data synchronization method. This is an attempt to make a public standard. In this paper, the data synchronization client that synchronizes the PIMS (Personal Information Management System) data in mobile devices like PDA is developed, complying with the SyncML standard requirements.

Analysis of Asynchronous IMT-2000 (W-CDMA) Systems Using Channel Estimation Algorithm (채널 추정 알고리즘을 이용한 비동기식 IMT-2000 (W-CDMA) 시스템의 성능 분석)

  • 김병기;나인학;전준수;김철성
    • Proceedings of the IEEK Conference
    • /
    • 2002.06a
    • /
    • pp.77-80
    • /
    • 2002
  • In this paper, we analyze a physical layer of W-CDMA .system and design a transmitter and receiver by using ADS (Advanced Design System). Also, we simulated a link level performance with different channel estimation algorithm in Jakes fading channel environment. For the channel estimator, we used the WMSA(Weighted Multi-Slot Averaging) algorithm, EGE(Equal Gain Estimation) algorithm and SSE(Symbol-to-Symbol Estimation) algorithm. This study will be useful in the analysis and design of W-CDMA system.

  • PDF

Development of a SyncML Conformance Test Suite (SyncML 적합성 시험도구 개발)

  • Bae, Jang-Hwan;Jung, In-Hae;Han, Jae-Il
    • Annual Conference of KIPS
    • /
    • 2002.11a
    • /
    • pp.175-178
    • /
    • 2002
  • 모바일 인터넷 환경에서 동일한 데이터가 다양한 단말 장치에 산재되어 사용되는 경우 효과적인 사용과 관리를 위해 산재된 데이터가 서로 동기화(synchronization) 즉 일치되어야 한다. SyncML은 모바일 인터넷 환경에서 다양한 플랫폼을 가진 기기 사이의 데이터 동기화를 위해 제시된 표준 프로토콜로서 많은 국 내외 산업체 및 연구기관이 SyncML 규격을 구현한 제품을 선보이고 있다. 이러한 SyncML 구현 제품이 이질적인 플랫폼에 상관없이 상호운용되기 위해서는 SyncML 규격에 대한 규격 준수 시험이 필요하다. 본 논문은 SyncML 규격의 적합성 시험(conformance test)을 위한 시험도구의 설계와 구현에 대하여 논한다.

  • PDF

A Study on Adherence to Dental Revisit of Scaling Patients (치석제거 환자의 치과 재방문 준수에 관한 연구)

  • Gu, Ja-Young;Lim, Soon Ryun;Lee, Su-Young
    • Journal of dental hygiene science
    • /
    • v.15 no.3
    • /
    • pp.318-324
    • /
    • 2015
  • The purpose of this study is to provide the basic date which is increase the number of revisits for scaling after analyzing factors that influence trend of dental revisits for 7 years. Research data was about 1,471 patients who visited S dental clinic in Seoul at 2007 for scaling. Data from January 2007 to December 2013 was collected. The subjects were divided into 3 groups by their trend in number of dental revisits for scaling: once, 2 times, 3~7 times. The data were analyzed using the chi-squire, independent-samples t-test and one-way ANOVA, binary logistic regression analysis. As a result, the trend of dental revisit for scaling is significantly decreased from first time to second time, and after 3rd time dental revisits were steadily continued. Factors affecting dental revisits for scaling are distance, family hospital, systemic disease, presence or absence of periodontal therapy. According to the results of the study, providing dental service in accordance with the patients' characteristics and increasing the dental revisits for scaling could give a positive influence to improvement of oral health.

A latent Profile Analysis of Students' Learning Motivation Profiles on Entrepreneurial Educational Motivation and Entrepreneurial Intentions and Type of Entrepreneurship (대학생 창업교육동기에 대한 사람중심접근법 : 잠재프로파일 유형에 따른 창업의도 및 창업유형)

  • Oh, Hyun Sung;Byun, Ji-Yeon;Kim, Jun Soo
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.9
    • /
    • pp.365-379
    • /
    • 2020
  • The purpose of this study identifies the patterns of students' learning motivation profiles on entrepreneurial educational motivation among a sample of university students from one of the Korean national university(n=614). This study also examines the relationship between students' learning motivation profiles and entrepreneurial intention and types of entrepreneurship. In order to explore the types of leaning motivation profiles, a latent profile analysis was employed. Result from LPA revealed five distinct types of learning motivation profiles fit the data best, and these five profiles are compared with students' entrepreneurial intentions and types of entrepreneurship. Results showed that Profiles (profile 5 and 4-high goal orientation) are associated with the higher level of entrepreneurial intention. Regarding the type of entrepreneurship, the majority of all students are interested in individual and co-entrepreneurship with friend regardless of the patterns of profiles.

How can selfish people choose to do moral behaviors - for Xunzi (이기적 욕망을 인정하는 도덕이론의 문제 - 순자철학을 중심으로 -)

  • Yun, Tai-yang
    • The Journal of Korean Philosophical History
    • /
    • no.54
    • /
    • pp.221-242
    • /
    • 2017
  • How can Selfish people choose moral behaviors. Xunzi thought it can be done with Human reason. For him, people move for their own interest. So they must follow Yi(禮), if they understand the life that following Yi is better than following x?ngq?ng(性情). Xunzi' theory is going to meet following two problems. One, people do not choose Yi because heir selfish is the only power to do. Second, there is nothing to blame or punishment for violators because it is not the duty. I tried to explain with two solutions for Xunzi.

Smart IoT Service Users' Compliance with Personal Information Protection Behavior: An Empirical Study on the Message Design Features to Induce Installation of Software Updates (스마트 IoT 서비스 사용자의 개인정보 보호 행동 준수: 소프트웨어 업데이트 유도를 위한 메세지 디자인 특성에 관한 실증 연구)

  • Lee, Ho-Jin;Kim, Hyung-Jin;Lee, Ho-Geun
    • Informatization Policy
    • /
    • v.31 no.2
    • /
    • pp.82-104
    • /
    • 2024
  • Smart home services are growing rapidly as the development of the Internet of Things (IoT) opens the era of the so-called "Connected Living." Although personal information leaks through smart home cameras are increasing, however, users-while concerned-tend to take passive measures to protect their personal information. This study theoretically explained and verified how to design effective software update notification messages for smart home cameras to ensure that users comply with the recommended security behavior (i.e., update installation). In a survey experiment participated in by 120 actual users, the effectiveness of both emotional appeals (i.e., security breach warning images for fear appeals) and rational appeals (i.e., loss-framed messages emphasizing the negative consequences of not installing the updates) were confirmed. The results of this study provide theoretical interpretations and practical guidelines on the message design features that are effective for threat appraisals (i.e., severity, vulnerability) of smart home camera users and their protection motivation.