• Title/Summary/Keyword: Defensive Decision-Making

Search Result 9, Processing Time 0.025 seconds

Defensive Behaviors of IT Purchasing-Related Stakeholders (IT 구매 이해관계자들의 방어적 행동에 관한 연구)

  • Kim, Sung Kun;Ahn, Namkyu
    • Journal of Information Technology Applications and Management
    • /
    • v.26 no.2
    • /
    • pp.89-110
    • /
    • 2019
  • Information technology is an effective means for raising firm competitiveness. In fact, what to purchase or how to purchase it must fall under a highly complex decision-making in which many different stakeholders are involved. These stakeholders are often known to take a defensive behavior. That is, instead of working toward a common goal of organizational performance, each individual of these stakeholders tends to act defensively to avoid risks he/she faces or minimize subsequent changes. Despite a frequent occurrence of defensive behavior in the process of IT purchasing, there has been no research about defensiveness in IT purchasing. Our study aims to elicit different types of defensive behavior in IT purchasing situations and to identify causes of these defensive behaviors. To this end, we surveyed IT professionals having much experience in IT purchasing and took a qualitative analysis on their opinions. We found out that there exist 9 different types of defensive behavior in IT purchasing and identified a set of factors causing the defensiveness and a set of their consequences.

Decision Making Experience of VIP Ward Nurses in the Clinical Practice Adjustment Process (특실병동 간호사의 실무적응과정에서의 의사결정 경험)

  • Kim, Chun-Mi;Kim, Jung-Soo;Kim, Duck-Hee
    • Journal of Korean Academy of Nursing Administration
    • /
    • v.15 no.3
    • /
    • pp.391-402
    • /
    • 2009
  • Purpose: The purpose of this research was to describe the decision making experience of VIP ward nurses in the clinical practice adjustment process. The research question was about "how nurses adjust their clinical practice to nursing situations and develop decision making process in a VIP ward." Method: The methodology of collecting and analyzing the data was based on the grounded theory of Strauss and Corbin(1998). The data was collected through in-depth interviews with 10 nurses from July to November, 2007. Results: The core category of nursing care decision making process was named as "adjusting with flexibility and deepened insight." The clinical practice adjustment process in nursing care decision making has progressed through four preceding interlocking phases: 1) dependent phase, 2) defensive phase, 3) independent phase, 4) integrative phase. These phases were classified by the level of nurses' dependency, proactivity, presupposition and integration. Conclusion: The result of this study indicated that nurse's decision making depended on their experiences and the nature of social context in which nursing occurs. Therefore, it is important to elaborate an effective training program for nurses to develop the phases of nursing care decision making.

  • PDF

A study on Forecasting The Operational Continuous Ability in Battalion Defensive Operations using Artificial Neural Network (인공신경망을 이용한 대대전투간 작전지속능력 예측)

  • Shim, Hong-Gi;Kim, Sheung-Kown
    • Journal of Intelligence and Information Systems
    • /
    • v.14 no.3
    • /
    • pp.25-39
    • /
    • 2008
  • The objective of this study is to forecast the operational continuous ability using Artificial Neural Networks in battalion defensive operation for the commander decision making support. The forecasting of the combat result is one of the most complex issue in military science. However, it is difficult to formulate a mathematical model to evaluate the combat power of a battalion in defensive operation since there are so many parameters and high temporal and spatial variability among variables. So in this study, we used company combat power level data in Battalion Command in Battle Training as input data and used Feed-Forward Multilayer Perceptrons(MLP) and General Regression Neural Network (GRNN) to evaluate operational continuous ability. The results show 82.62%, 85.48% of forecasting ability in spite of non-linear interactions among variables. We think that GRNN is a suitable technique for real-time commander's decision making and evaluation of the commitment priority of troops in reserve.

  • PDF

Business Strategy and Overvaluation: Evidence from Korea

  • CHA, Sangkwon;HWANG, Sunpil;KIM, Yibae
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.6 no.4
    • /
    • pp.83-90
    • /
    • 2019
  • The purpose of this study is to test the effect of business strategy on valuation error. Business strategy includes managerial decision making and managerial tendency. In previous research, there is a negative relationship between business strategy and accounting quality. In this study, we try to confirm whether strategy tendencies affected valuation errors. In order to confirm empirically between business strategy and overvaluation, we use 8,117 firms that between 2006 and 2017 and listed in KSE and KOSDAQ. We calculated business strategy which is introduced by Bentley, Omer, and Sharp (2013). We also used the overvaluation method introduced in Rhodes-Kropf, Robinson, and Viswanathan (2005). The results show that the more the leading business strategy is, the greater the value error becomes. In the case of dividing into leading and defensive companies, the lead firms showed a significant positive correlation with the valuation errors, while the defensive firms showed the negative relationship with overvaluation. This study examined the business strategy and the overvaluation. we confirmed whether the management strategy deepens the evaluation error caused by the firm characteristics. The results are meaningful that we extended the study on the quality of financial reporting of leading strategic firms.

Effects of Motivational Activation on Processing Positive and Negative Content in Internet Advertisements

  • Lee, Seungjo;Park, Byungho
    • Science of Emotion and Sensibility
    • /
    • v.15 no.4
    • /
    • pp.517-526
    • /
    • 2012
  • This study investigated the impact of individual differences in motivational reactivity on cognitive effort, memory strength (sensitivity) and decision making (criterion bias) in response to Internet ads with positive and negative content. Individual variation in trait motivational activation was measured using the Motivational Activation Measurement developed by A. Lang and her colleagues (A. Lang, Bradley, Sparks, & Lee, 2007). MAM indexes an individual's tendency to approach pleasant stimuli (ASA, Appetitive System Activation) and avoid unpleasant stimuli (DSA, Defensive System Activation). Results showed that individuals higher in ASA exert more cognitive effort during positive ads than individuals lower in ASA. Individuals higher in DSA exert more cognitive effort during negative ads compared to individuals lower in DSA. ASA did not predict recognition memory. However, individuals higher in DSA recognized ads better than those lower in DSA. The criterion bias data revealed participants higher in ASA had more conservative decision criterion, compared to participants lower in ASA. Individuals higher in DSA also showed more conservative decision criterion compared to individuals lower in DSA. The theoretical and practical implications are discussed.

  • PDF

TREES WITH EQUAL STRONG ROMAN DOMINATION NUMBER AND ROMAN DOMINATION NUMBER

  • Chen, Xue-Gang;Sohn, Moo Young
    • Bulletin of the Korean Mathematical Society
    • /
    • v.56 no.1
    • /
    • pp.31-44
    • /
    • 2019
  • A graph theoretical model called Roman domination in graphs originates from the historical background that any undefended place (with no legions) of the Roman Empire must be protected by a stronger neighbor place (having two legions). It is applicable to military and commercial decision-making problems. A Roman dominating function for a graph G = (V, E) is a function $f:V{\rightarrow}\{0,1,2\}$ such that every vertex v with f(v)=0 has at least a neighbor w in G for which f(w)=2. The Roman domination number of a graph is the minimum weight ${\sum}_{v{\in}V}\;f(v)$ of a Roman dominating function. In order to deal a problem of a Roman domination-type defensive strategy under multiple simultaneous attacks, ${\acute{A}}lvarez$-Ruiz et al. [1] initiated the study of a new parameter related to Roman dominating function, which is called strong Roman domination. ${\acute{A}}lvarez$-Ruiz et al. posed the following problem: Characterize the graphs G with equal strong Roman domination number and Roman domination number. In this paper, we construct a family of trees. We prove that for a tree, its strong Roman dominance number and Roman dominance number are equal if and only if the tree belongs to this family of trees.

Nurses' Organizational Silence in Hospitals: A Grounded Theoretical Approach (병원 간호사의 조직침묵에 관한 근거이론적 접근)

  • Yi, Kyunghee;You, Myoungsoon
    • Korean Journal of Occupational Health Nursing
    • /
    • v.31 no.2
    • /
    • pp.66-76
    • /
    • 2022
  • Purpose: This study aimed to explore the constructs and context of hospital nurses' organizational silence. Methods: In-depth interviews were conducted with 17 nurses in small-middle general hospitals as well as big university hospitals. We then derived the key themes using grounded theory method. Results: Nine themes and 30 sub-themes were derived: "Willing to be recognized for performance rather than saying", "Getting used to the hard-to-speak climate", "Face the reality that does not change when said", "Complicated situation that prevents self-regulating decision-making", "Conflicts that are difficult to confront", "Unfair responsibilities that I want to evade", "Leaders who don't support me", and "Being blocked in communication". Consequently, the nurses learned to adopt a climate of silence and "learned organizational silence" behavior. They experienced that prosocial silence was essential for obtaining approval as a member of the group, and defensive silence for protecting themselves in the hierarchical structure and unfair responsibilities. Acquiescent silence originated from a futile relationship with their supervisors, one-way communications, and the unsupportive management system, in which three types of silence appeared sequentially or in combination with each other. Conclusion: Based on these results, nursing managers should identify the context of nurses' organizational silence and should lessen these silence behaviors.

Random Forest Method and Simulation-based Effect Analysis for Real-time Target Re-designation in Missile Flight (유도탄의 실시간 표적 재지정을 위한 랜덤 포레스트 기법과 시뮬레이션 기반 효과 분석)

  • Lee, Han-Kang;Jang, Jae-Yeon;Ahn, Jae-Min;Kim, Chang-Ouk
    • Journal of the Korea Society for Simulation
    • /
    • v.27 no.2
    • /
    • pp.35-48
    • /
    • 2018
  • The study of air defense against North Korean tactical ballistic missiles (TBM) should consider the rapidly changing battlefield environment. The study for target re-designation for intercept missiles enables effective operation of friendly defensive assets as well as responses to dynamic battlefield. The researches that have been conducted so far do not represent real-time dynamic battlefield situation because the hit probability for the TBM, which plays an important role in the decision making process, is fixed. Therefore, this study proposes a target re-designation algorithm that makes decision based on hit probability which considers real-time field environment. The proposed method contains a trajectory prediction model that predicts the expected trajectory of the TBM from the current position and velocity information by using random forest and moving window. The predicted hit probability can be calculated through the trajectory prediction model and the simulator of the intercept missile, and the calculated hit probability becomes the decision criterion of the target re-designation algorithm for the missile. In the experiment, the validity of the methodology used in the TBM trajectory prediction model was verified and the superiority of using the hit probability through the proposed model in the target re-designation decision making process was validated.

Hacking Mail Profiling by Applying Case Based Reasoning (사례기반추론기법을 적용한 해킹메일 프로파일링)

  • Park, Hyong-Su;Kim, Huy-Kang;Kim, Eun-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.107-122
    • /
    • 2015
  • Many defensive mechanisms have been evolved as new attack methods are developed. However, APT attacks using e-mail are still hard to detect and prevent. Recently, many organizations in the government sector or private sector have been hacked by malicious e-mail based APT attacks. In this paper, first, we built hacking e-mail database based on the real e-mail data which were used in attacks on the Korean government organizations in recent years. Then, we extracted features from the hacking e-mails for profiling them. We design a case vector that can describe the specific characteristics of hacking e-mails well. Finally, based on case based reasoning, we made an algorithm for retrieving the most similar case from the hacking e-mail database when a new hacking e-mail is found. As a result, hacking e-mails have common characteristics in several features such as geo-location information, and these features can be used for classifying benign e-mails and malicious e-mails. Furthermore, this proposed case based reasoning algorithm can be useful for making a decision to analyze suspicious e-mails.