• Title/Summary/Keyword: 회피적 행위

Search Result 94, Processing Time 0.029 seconds

Exploring the Pre-service Science Teachers' Emotional Experience, Display Rules, and Controlling Strategies During Teaching Practice (교육실습과정에서 나타난 예비과학교사의 감정 경험과 감정 표현 규칙, 조절 전략의 탐색)

  • Kim, Heekyong;Lee, Narea
    • Journal of The Korean Association For Science Education
    • /
    • v.36 no.2
    • /
    • pp.231-251
    • /
    • 2016
  • The goal of the study was to examine pre-service teachers' emotional experiences, especially during student teaching. The following questions guided this study. First, during student teaching, what are the characteristics of emotional experiences of pre-service science teachers? Second, what are used as the emotional rules and strategies by student teacher? In this study, we tracked nine pre-service science teachers over a four-week period of the student teaching. The data sources were lesson observations, interviews, emotional journals, and video-recorded classroom lessons. Results showed that student teachers experienced various 25 different types of emotions which were reported as the primary emotions of Koreans. The main subjects for interaction for positive emotions were students. For negative emotions, students, teachers and student teachers themselves all resulted in such negative emotional experiences. When the student teachers experienced negative emotions, they followed the emotional rule that their emotions should not be expressed in front of the students. Because of this, they tried various strategies for controlling emotions, such as 'understanding students', 'finding the positive side', 'seeing good students', 'ignoring', 'holding back', 'evading', and 'giving up'. Finally, suggestions for teacher education were discussed.

Learning Multi-Character Competition in Markov Games (마르코프 게임 학습에 기초한 다수 캐릭터의 경쟁적 상호작용 애니메이션 합성)

  • Lee, Kang-Hoon
    • Journal of the Korea Computer Graphics Society
    • /
    • v.15 no.2
    • /
    • pp.9-17
    • /
    • 2009
  • Animating multiple characters to compete with each other is an important problem in computer games and animation films. However, it remains difficult to simulate strategic competition among characters because of its inherent complex decision process that should be able to cope with often unpredictable behavior of opponents. We adopt a reinforcement learning method in Markov games to action models built from captured motion data. This enables two characters to perform globally optimal counter-strategies with respect to each other. We also extend this method to simulate competition between two teams, each of which can consist of an arbitrary number of characters. We demonstrate the usefulness of our approach through various competitive scenarios, including playing-tag, keeping-distance, and shooting.

  • PDF

Do Family Members Promote Internationalization? : Evidence from Family Firms from ICT Sectors in Korea (가족기업의 가족 구성원이 국제화를 촉진하는가?: 한국의 ICT 산업 관련 가족기업을 중심으로)

  • Shin, Joon-ho;Kim, So-hyun
    • Journal of Venture Innovation
    • /
    • v.6 no.2
    • /
    • pp.21-39
    • /
    • 2023
  • The study investigates the impact of family ownership heterogeneity on the internationalization decisions of family-owned enterprises from ICT sectors in South Korea. The study uses prospect theory to explore the relationship between ownership structure and internationalization. The study finds that as performance improves, the ultimate owner (CEO) is negatively related to internationalization, while other family members are positively related, demonstrating the heterogeneous behavior of family members. The study suggests that the ultimate owner (CEO) tends to avoid risks associated with internationalization, while other family members are willing to take risks. To better understand the various risk behaviors of family firms regarding internationalization, the inherent heterogeneity of family firms, particularly in light of different risk behaviors between the ultimate owner (CEO) and other family members, may explain the inconsistent results in studies on the effect of family ownership on internationalization.

An Analysis on the Conditions for Successful Economic Sanctions on North Korea : Focusing on the Maritime Aspects of Economic Sanctions (대북경제제재의 효과성과 미래 발전 방향에 대한 고찰: 해상대북제재를 중심으로)

  • Kim, Sang-Hoon
    • Strategy21
    • /
    • s.46
    • /
    • pp.239-276
    • /
    • 2020
  • The failure of early economic sanctions aimed at hurting the overall economies of targeted states called for a more sophisticated design of economic sanctions. This paved way for the advent of 'smart sanctions,' which target the supporters of the regime instead of the public mass. Despite controversies over the effectiveness of economic sanctions as a coercive tool to change the behavior of a targeted state, the transformation from 'comprehensive sanctions' to 'smart sanctions' is gaining the status of a legitimate method to impose punishment on states that do not conform to international norms, the nonproliferation of weapons of mass destruction in this particular context of the paper. The five permanent members of the United Nations Security Council proved that it can come to an accord on imposing economic sanctions over adopting resolutions on waging military war with targeted states. The North Korean nuclear issue has been the biggest security threat to countries in the region, even for China out of fear that further developments of nuclear weapons in North Korea might lead to a 'domino-effect,' leading to nuclear proliferation in the Northeast Asia region. Economic sanctions had been adopted by the UNSC as early as 2006 after the first North Korean nuclear test and has continually strengthened sanctions measures at each stage of North Korean weapons development. While dubious of the effectiveness of early sanctions on North Korea, recent sanctions that limit North Korea's exports of coal and imports of oil seem to have an impact on the regime, inducing Kim Jong-un to commit to peaceful talks since 2018. The purpose of this paper is to add a variable to the factors determining the success of economic sanctions on North Korea: preventing North Korea's evasion efforts by conducting illegal transshipments at sea. I first analyze the cause of recent success in the economic sanctions that led Kim Jong-un to engage in talks and add the maritime element to the argument. There are three conditions for the success of the sanctions regime, and they are: (1) smart sanctions, targeting commodities and support groups (elites) vital to regime survival., (2) China's faithful participation in the sanctions regime, and finally, (3) preventing North Korea's maritime evasion efforts.

Impacts of Framing and the Interaction with Involvement on Responses toward the Campaign of Helping the Hungry Abroad (국제 기아 돕기 캠페인의 효과에 미치는 긍.부정 프레이밍과 관여도의 영향-상호작용을 중심으로)

  • Lee, Seung-Jo;Yeon, Bo-Young;Koo, Se-Hee
    • Science of Emotion and Sensibility
    • /
    • v.13 no.1
    • /
    • pp.147-162
    • /
    • 2010
  • This study investigates how framing and the interaction with involvement influences responses toward a help campaign. There could be two possible predictions about the results of framing. One is that, because helping is a risk avoidance behaviors, the positive framing would dominant or the other is that, because helping is mainly mediated by negative emotions such as sadness or guilty, the negative framing would be preferred. The present research was to solve the conflicting predictions and was conducted with a experimental design. The participants were exposed to a campaign emphasizing either positive aspects of the help or negative contexts which would be maintained without any help. The results were that the main effect of framing was not existent, but the significant interaction with involvement on responses was found. The interaction of framing and involvement, though, included unexpected inconsistency between the results of attitude and behavioral intention. The theoretical and practical meanings of the results were discussed.

  • PDF

Network Session Analysis For BotNet Detection (봇넷 탐지를 위한 네트워크 세션 분석)

  • Park, Jong-Min
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.12
    • /
    • pp.2689-2694
    • /
    • 2012
  • In recent years, cyber crimes were intended to get financial benefits through malicious attempts such as DDoS attacks, stealing financial information and spam. Botnets, a network composed of large pool of infected hosts, lead such malicious attacks. The botnets have adopted several evasion techniques and variations. Therefore, it is difficult to detect and eliminate them. Current botnet solutions use a signature based detection mechanism. Furthermore, the solutions cannot cover broad areas enough to detect world-wide botnets. In this paper, we propose IRC (Internet Relay Chat) that is used to control the botnet communication in a session channel of IRC servers connected through the analysis of the relationship of the channel and the connection with the server bot-infected hosts and how to detect.

PFI법을 적용한 일본의 ESCO사업

  • 에너지절약전문기업협회
    • The Magazine for Energy Service Companies
    • /
    • s.29
    • /
    • pp.48-61
    • /
    • 2004
  • 최근 일본에서는 ESCO사업에 PFI법을 새로이 적용하고 있다. 성과배분제, 성과보증제에 이어 이 제도를 적용할 경우, 국가 및 공공기관을 대상으로 하는 ESCO사업의 확대 및 자금조달이 한층 유리해질 전망이다. 지난 99년 제정된 PFI(Private Finance Initiative)법(민간자금 등의 활용에 의한 공공시설 등의 정비 등의 촉진에 관한 법률)에 근거한 사업은 ''공공시설 등''에 있어서 건설, 유지관리 운영 등을 민간의 자금, 경영능력 및 기술적 능력을 활용하는 사업방법으로 사업 전체의 리스크관리가 효율적으로 행해지는 것과 설게$\cdot$시공$\cdot$유지관리$\cdot$운영의 전부 또는 일부를 일체적으로 취급하는 것에 의해 사업비용의 절감이 기대되며 질 높은 서비스의 제공이 가능한 제도이다. 이것과 매우 유사한 개념을 가지고 있는 것이 성과보증제에 의한 ESCO사업이다. 민간사업자인 ESCO사업자가 자금을 조달하고 에너지절약 개수공사에 따른 설계$\cdot$시공$\cdot$, 운전$\cdot$유지관리, 계측$\cdot$검증, 에너지절감 보증 등의 서비스를 제공하며, 광열수도비 및 운전$\cdot$유지관리비의 절감분으로 모든 투자와 ESCO사업자의 경비를 지불한다. 또 에너지절감 및 공공의 이익보증을 포함한 퍼포먼스계약이라고 하는 형태를 취하는 것으로 공공 이익의 최대화를 도모함과 동시에 금융기관의 투자 리스크에 관한 우려를 회피할 수도 있다. 또 PFI법 특유의 법제상, 재정상의 조치와 재정상 및 금융상의 지원이라는 배려에 있다. 예를 들면, 국고채무부담행위의 설정, 행정재산 사용료의 무상화 또는 감면, 프로젝트 파이낸싱 등에 의한 자금조달을 고려할 경우에 있어서 담보권의 설정 등에 관한 제도를 합리적으로 정비하는 것이 가능하게 된다. 그 내용의 대강을 살펴본다.

  • PDF

A Study of Program Execution Control based on Whitelist (화이트리스트 기반 프로그램 실행 통제 방안 연구)

  • Kim, Chang-hong;Choi, Dae-young;Yi, Jeong-hyun;Kim, Jong-bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.346-349
    • /
    • 2014
  • Currently, the growing cyber threat continues, the damage caused by the evolution of malicious code incidents become more bigger. Such advanced attacks as APT using 'zero-day vulnerability' bring easy way to steal sensitive data or personal information. However it has a lot of limitation that the traditional ways of defense like 'access control' with blocking of application ports or signature base detection mechanism. This study is suggesting a way of controlling application activities focusing on keeping integrity of applications, authorization to running programs and changes of files of operating system by hardening of legitimate resources and programs based on 'white-listing' technology which analysis applications' behavior and its usage.

  • PDF

A Study on the Problems of Procedural Law Against Cyber Crimes in Korea - On the Trend of Procedural Law Against Cyber Crimes of U.S - (우리 사이버범죄 대응 절차의 문제점에 관한 연구 - 미국의 사이버범죄대응절차법을 중심으로 -)

  • Lim Byoung-Rak;Oh Tae-Kon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.4 s.42
    • /
    • pp.231-241
    • /
    • 2006
  • When current cyber attacks to information and communication facilities are examined, technologies such as chase evasion technology and defense deviation technology have been rapidly advanced and many weak systems worldwide are often used as passages. And when newly-developed cyber attack instruments are examined, technologies for prefect crimes such as weakness attack, chase evasion and evidence destruction have been developed and distributed in packages. Therefore, there is a limit to simple prevention technology and according to cases, special procedures such as real-time chase are required to overcome cyber crimes. Further, cyber crimes beyond national boundaries require to be treated in international cooperation and relevant procedural arrangements through which the world can fight against them together. However, in current laws, there are only regulations such as substantial laws including simple regulations on Punishment against violation. In procedure, they are treated based on the same procedure as that of general criminal cases which are offline crimes. In respect to international cooperation system, international criminal private law cooperation is applied based on general criminals, which brings many problems. Therefore, this study speculates the procedural law on cyber crimes and presents actual problems of our country and its countermeasures.

  • PDF

Research on Malicious code hidden website detection method through WhiteList-based Malicious code Behavior Analysis (WhiteList 기반의 악성코드 행위분석을 통한 악성코드 은닉 웹사이트 탐지 방안 연구)

  • Ha, Jung-Woo;Kim, Huy-Kang;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.61-75
    • /
    • 2011
  • Recently, there is significant increasing of massive attacks, which try to infect PCs that visit websites containing pre-implanted malicious code. When visiting the websites, these hidden malicious codes can gain monetary profit or can send various cyber attacks such as BOTNET for DDoS attacks, personal information theft and, etc. Also, this kind of malicious activities is continuously increasing, and their evasion techniques become professional and intellectual. So far, the current signature-based detection to detect websites, which contain malicious codes has a limitation to prevent internet users from being exposed to malicious codes. Since, it is impossible to detect with only blacklist when an attacker changes the string in the malicious codes proactively. In this paper, we propose a novel approach that can detect unknown malicious code, which is not well detected by a signature-based detection. Our method can detect new malicious codes even though the codes' signatures are not in the pattern database of Anti-Virus program. Moreover, our method can overcome various obfuscation techniques such as the frequent change of the included redirection URL in the malicious codes. Finally, we confirm that our proposed system shows better detection performance rather than MC-Finder, which adopts pattern matching, Google's crawling based malware site detection, and McAfee.