• Title/Summary/Keyword: 지속행위

Search Result 661, Processing Time 0.028 seconds

Applying the Theory of Planned Behavior to Digital Gaming: Focusing on the Balance Relationship with Significant Others (디지털 게임에 대한 계획행동이론의 적용: 중요한 타인과 균형관계를 중심으로)

  • Gyu Hyun Ho;Eun Yeong Na
    • Korean Journal of Culture and Social Issue
    • /
    • v.29 no.3
    • /
    • pp.275-304
    • /
    • 2023
  • This study aimed to examine the mechanisms underlying digital game usage behavior by applying the Theory of Planned Behavior and the Balance Theory. It investigated the influences of attitude, subjective norms, and perceived behavioral control on the intention to use digital games, as well as the differences in the application of the Theory of Planned Behavior model based on the balance state among individuals, significant others, and digital games. A total of 315 responses from adult PC game users were collected through an online survey conducted from October 21 to 25, 2021, and were analyzed using multiple regression analysis. The results revealed that attitude and perceived behavioral control had a significant positive impact on the intention to continue using digital games, while subjective norms did not exert a significant influence. By categorizing groups into balanced, unbalanced, and imbalance states based on the balance relationship, the application of the Theory of Planned Behavior model showed that in the unbalanced and imbalance groups, both perceived behavioral control and attitude had a positive impact on the intention to continue using digital games. However, in the balanced group, attitude only had a positive impact on the intention to continue game usage. This study contributes to understanding digital game users by examining both individual psychological factors and the influence of others on digital game usage behavior.

Consciousness and Behavior of the Radiation Safety Management by Clinical Pathologists (임상병리사의 방사선안전관리에 대한 고찰)

  • Kim, Jean-Soo;Lee, Jin-Yong;Lee, Moo-Sik;Na, Baeg-Ju;Hong, Jee-Young;Go, Eun-Ju
    • Proceedings of the KAIS Fall Conference
    • /
    • 2011.05b
    • /
    • pp.1052-1056
    • /
    • 2011
  • 이 연구는 동위원소실에 근무하는 임상병리사들의 방사선 방어에 대한 지식, 태도 및 행위수준을 조사하여 상관관계를 파악하고 방사선 안전관리에 대한 행위에 영향을 미치는 요인을 분석하기 위해 시행하였다. 설문지는 2010년 10월부터 11월까지 대전 충청권 및 서울 경기권 동위원소실 임상병리사를 연구 대상자로 하여 연구자자 임의로 선정 직접설문, 또는 우편방식으로 조사하였고, 수집된 자료는 SPSS12.0 프로그램을 이용하여 빈도와 백분율, T-검정, ANOVA, 다중회귀분석법을 이용하여 분석하였다. 방사선 안전관리에 대한 지식 점수는 평균은 11.5점이었으며 표준편차는 ${\pm}$1.9 분포를 보였다. 방사선 안전관리에 대한 태도 점수는 평균 69.0점, 표준편차는 ${\pm}$5.4이었다. 방사선 방어에 대한 행위점수는 평균은 57.1점, 표준편차 ${\pm}$3.5이었다. 방사선 안전관리 행위에 있어 이론적으로 알고 있는 내용에 비해 수행이 현저히 떨어진 결과가 나왔으며, 방사선 안전관리에 대한 지식, 태도, 행위와의 상관성은 통계적으로 유의한 상관관계를 보였다(p<0.01). 행위점수에 영향을 미치는 요인으로는 종사자법정교육, RI 면허취득, 지식, 태도로 나타났다. 결론적으로 동위원소실에 근무하는 임상병리사의 방사성동위원소 안전관리 행위는 태도에 비하여 수행이 현저히 떨어진 결과가 나왔고, 안전관리 행위에 영향을 주는 인자로 종사자법정교육, RI 면허취득, 지식점수, 태도점수를 알 수 있었다. 업무 진행에 있어 잘못된 지식의 습득 및 태도를 취할 수 있는 가능성이 충분히 있으며 이를 바로 잡을 수 있도록 안전관리에 대한 지속적인 교육을 실시함과 더불어 RI면허 취득, 방사선 종사자에게 교육의 효과를 더욱 높이기 위한 적절한 교육 자료의 개발이 필요하다고 할 수 있다.

  • PDF

An Exploratory Study for Clustering of Technology Leakage Activitie (기술유출행위 군집화를 위한 탐색적 연구)

  • Kim, Jaesoo;Kim, Jawon;Kim, Jeongwook;Choi, Yurim;Chang, Hangbae
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.3-9
    • /
    • 2019
  • Most of security countermeasures have been implemented to cope with continuous increase leakage of technology, but almost security countermeasures are focused on securing the boundary between inside and outside. This is effective for detecting and responding to attacks from the outside, but it is vulnerable to internal security incidents. In order to prevent internal leakage effectively, this study identifies activities corresponding to technology leakage activities and designes technology leakage activity detection items. As a design method, we analyzed the existing technology leakage detection methods based on the previous research and analyzed the technology leakage cases from the viewpoint of technology leakage activities. Through the statistical analysis, the items of detection of the technology leakage outcomes were verified to be appropriate, valid and reliable. Based on the results of this study, it is expected that it will be a basis for designing the technology leaking scenarios based on future research and leaking experiences.

L-CAA : An Architecture for Behavior-Based Reinforcement Learning (L-CAA : 행위 기반 강화학습 에이전트 구조)

  • Hwang, Jong-Geun;Kim, In-Cheol
    • Journal of Intelligence and Information Systems
    • /
    • v.14 no.3
    • /
    • pp.59-76
    • /
    • 2008
  • In this paper, we propose an agent architecture called L-CAA that is quite effective in real-time dynamic environments. L-CAA is an extension of CAA, the behavior-based agent architecture which was also developed by our research group. In order to improve adaptability to the changing environment, it is extended by adding reinforcement learning capability. To obtain stable performance, however, behavior selection and execution in the L-CAA architecture do not entirely rely on learning. In L-CAA, learning is utilized merely as a complimentary means for behavior selection and execution. Behavior selection mechanism in this architecture consists of two phases. In the first phase, the behaviors are extracted from the behavior library by checking the user-defined applicable conditions and utility of each behavior. If multiple behaviors are extracted in the first phase, the single behavior is selected to execute in the help of reinforcement learning in the second phase. That is, the behavior with the highest expected reward is selected by comparing Q values of individual behaviors updated through reinforcement learning. L-CAA can monitor the maintainable conditions of the executing behavior and stop immediately the behavior when some of the conditions fail due to dynamic change of the environment. Additionally, L-CAA can suspend and then resume the current behavior whenever it encounters a higher utility behavior. In order to analyze effectiveness of the L-CAA architecture, we implement an L-CAA-enabled agent autonomously playing in an Unreal Tournament game that is a well-known dynamic virtual environment, and then conduct several experiments using it.

  • PDF

Transition as a Theory and Practice: Transition Studies and Policies in Netherlands (이론과 실천으로서의 전환 : 네덜란드의 전환이론과 전환정책)

  • Jung, Byung Kul
    • Journal of Science and Technology Studies
    • /
    • v.15 no.1
    • /
    • pp.109-143
    • /
    • 2015
  • For continuous and successful innovation, changes in innovation system are required and have been magnified as a new controversy. With high public interest in changes of innovation system, Transition theory and policy in Netherlands are now attracting attentions of many researchers and policymakers. Transition policy in Netherlands is distinguished from existing policies for fundamental system change in that take remarkably different views and methods. Typical examples of transition in Netherlands are such as sustainable energy transition, biodiversity and natural resource transition, sustainable agriculture transition, and sustainable transportation. Transitions in Netherlands are still in the early stage of it but several positive effects are witnessing. However some problems - linking theory and practice, ambiguity of transition concept, linking long-term vision and short-term, resistance of existing regime, implementation problem, diffusion of support, etc.- to be tackled are still remaining. In spite of those problems, many lessons can be drawn from them. To guide structural changes in innovation system into the right path and cope with lock-in problem by existing system and regime, we need to learn from Transition theory and policy in Netherlands.

Continuous Use Intention of Paid Reading Media: Influencing Factors, Mechanisms, and Improvement Paths--Empirical Research Based on Expectation Confirmation (ECT) Model

  • Congying Sun;Ziyang Liu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.1
    • /
    • pp.85-96
    • /
    • 2024
  • As users of paid media readers' satisfaction with usage directly affects the promotion and development of paid media in China. Based on relevant research literature on user sustained use behavior, using the Expectation Confirmation Model as the framework, China paid media Caixin is used as a content product to construct a sustained use model for paid media. At the same time, the operational definition and theoretical assumptions of the variables in the model were provided, laying the foundation for subsequent empirical research on the effectiveness of the model.The research results show that paid media's social influence and performance expectations have a positive impact on Caixin App readers' adoption behavior,perceived usefulness and expection confirmation has a positive impact on Caixin App readers' satisfaction . Adoption behavior and satisfaction has a positive effect on continue using intention, what's more,the perceived usefulness also has a positive effect on continue using intention.

Impact of Nursing Students' Knowledge, Attitudes, and Performance Confidence in Patient Safety Management on Patient Safety Management Behavior (간호대학생의 환자안전관리 지식, 태도, 수행자신감이 환자안전관리 행위에 미치는 영향)

  • Jihyun Lee;Gaeun Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.2
    • /
    • pp.149-157
    • /
    • 2024
  • Despite continuous efforts by healthcare institutions and professionals, incidents threatening patient safety continue to occur. Policies related to patient safety are being strengthened, and nursing students are recognized as key personnel in patient safety management. Identifying factors influencing patient safety management behavior can enhance competency in patient safety management and prevent and improve patient safety incidents. Therefore, the purpose of this study is to clarify the impact of nursing students' knowledge, attitudes, and performance confidence related to patient safety management on their patient safety management behavior. A descriptive survey study was conducted, and data collection targeted 138 fourth-year nursing students in K region from October 25th to October 28th, 2022. Statistical analysis was performed using SPSS 25.0 program. The research findings showed that knowledge, attitudes, and confidence regarding patient safety management were positively correlated with patient safety management behavior. Factors influencing patient safety management behavior were identified as patient safety management education experience (β=.22, p<.001) and confidence (β=.66, p<.001). Based on these results, it is suggested that educational programs aimed at improving patient safety management behavior among nursing students should focus on enhancing patient safety management education experience and confidence.

An Anomaly Intrusion Detection Method using Multiple System Log (사용자 로그의 분석을 통한 실시간 비정상행위 탐지 기술)

  • Kim, Myung-Soo;Shin, Jong-Cheol;Jung, Jae-Myung;Ko, You-Sun;Lee, Won-Suk
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2009.05a
    • /
    • pp.361-364
    • /
    • 2009
  • 침입의 방법이 점차 치밀해지고 다양해짐에 따라 새로운 방식의 침입 탐지 기법 역시 지속적으로 요구되어진다. 기존의 오용 탐지 방법론은 탐지율은 뛰어나지만 새로운 침입형태에 대한 대응 능력이 부족하다. 이러한 단점을 보완하고자 등장한 것이 비정상 행위 탐지 방법론이다. 하지만 현재까지의 연구는 네트워크나 서버 OS, 데이터베이스 등 각 개별 분야에 대해서만 진행되고 있어 그 탐지 능력에 한계가 있다. 본 논문에서는 이러한 한계를 극복하고자 사용자의 네트워크 및 운영체제 로그를 통합 하고, 데이터마이닝 기법 중 빈발 패턴 마이닝 기법을 이용한 보다 정확한 비정상 행위 탐지 기술을 제안한다.

  • PDF

Integrated Log Extraction Program for an Anomaly Intrusion Detection in Various Environments (다양한 환경에서의 비정상행위 탐지를 위한 통합 로그 추출 프로그램)

  • Shin, Jong-Cheol;Lee, Jong-Hoon;Lim, Seon-Kyu;Choi, Won-Sub;Lee, Won-Suk
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2009.11a
    • /
    • pp.511-515
    • /
    • 2009
  • 최근 정보기술의 발달과 함께 지속적으로 다양해지고 빨라지는 침입 방법에 대처하기 위해 정보를 보호하기 위한 새로운 방법이 요구되고 있는 실정이다. 이를 해결하기 위해 제안된 방법 중 하나가 네트워크 패킷 데이터에 대한 실시간 데이터 스트림 마이닝 알고리즘 기반의 비정상행위 탐지 기법이다. 이는 현재 발생하고 있는 패턴이 기존 패턴과 다를 경우 비정상행위로 간주되고 사용자에게 알려주는 방법으로, 지금까지 없었던 새로운 형태의 침입에도 대처할 수 있는 능동적인 방어법이라고 할 수 있다. 그러나 이 방법에서 네트워크 패킷 데이터 정보만을 통해 얻어낼 수 있는 정보에는 한계가 있다. 따라서, 본 논문에서는 보다 높은 정확도의 비정상행위 판정을 위한 다양한 환경의 로그들을 추출하여 처리에 적합한 형태로 변환하는 전처리 시스템을 제안한다.

  • PDF

Virus Detection and Recovery Using File Virus Self-Reproduction Characteristic (파일 바이러스 복제 특성을 이용한 바이러스 탐지 및 복구1))

  • 서용석;이성욱;홍만표;조시행
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.724-726
    • /
    • 2001
  • 본 논문에서는 컴퓨터 바이러스의 자기 복제 특성을 용한 바이러스 탐지 및 복구 방안을 제안한다. 바이러스의 행동 패턴은 바이러스의 종류 만큼 다양하지만 파일 바이러스의 경우, 자기 복제 행동 패턴은 대부분의 바이러스가 유사하다. 파일 바이러스가 시스템 감염시키기 위해서는 기생할 실행파일을 열고, 자기 자신을 그 실행 파일에 복사해야 한다. 이와 같은 자기 복제 행위를 통해 바이러스가 광범위하게 선과될 때 피 피해도 커지게 된다. 바이러스치 자기 복제 특성을 감안하여 본 연구에서 제안하는 바이러스 탐지 알고리즘은 다음과 같은 득징을 가진다. 첫째, 바이러스의 자기복세 행동 패턴은 파일 입출력 이벤트로 표현하여 바이러스의 행동 패턴으로 일반화시켰다. 둘째, 바이러스의 1차 감염행위는 허용하고 2차 이후 감염 행위부터 탐지하고, 탐지되기 이전에 감염되었던, 파일들을 복구한다. 이는 일반적인 바이러스들이 자기 복제를 지속적으로 수행한다는 점에 착안하여 false-positive 오류를 줄이기 위한 것이다. 본 고에서 제안하는 방법을 사용함으로써 특정 문자열에 의한 바이러스 탐지 및 복구 방법의 단점을 보안할 수 있을 것으로 기대된다.

  • PDF