• Title/Summary/Keyword: Deterrent factors

Search Result 21, Processing Time 0.025 seconds

A Study on the Improvements of the Deterrent Factors in Coastal Passenger Routes of Korea;At a Management Level in the 'P' Car-ferry Liner. (우리나라 연안여객항로의 활성화저해요인과 그 개선방안에 관한 연구;P선사의 진해-거제항로를 중심으로)

  • Kim, Myeong-Jae
    • Proceedings of the Korea Port Economic Association Conference
    • /
    • 2006.08a
    • /
    • pp.67-102
    • /
    • 2006
  • The Purpose of this study is to improve the deterrent factors in Korea's coastal passenger shipping on the basis of field data collected in order to help stimulate it and enhance its competitiveness. As the representative model of this study, the "P" car-ferry liner was chosen, whereby various deterrent factors were observed in the course of the SWOT analysis and through the questionnaires. The major deterrent factors in summary were inflexible government regulations for additional ship operation, disadvantages of taxes policy, port facility shortages, non-allowing of ship's night operation, complicated and inflexible ship's operation controls by the concerned authorities, unreasonable divisions of steaming areas, and existences of obstacles on the ship's running routes, etc. which considered all are important to activate the liners.

  • PDF

A Study on the Activation of Coastal Passenger Routes in Korea: At a Management Level in the "P" Car-ferry Liner (우리나라 연안여객항로의 활성화에 관한 연구 -P선사의 진해-거제항로를 중심으로-)

  • Kim, Myung-Jae
    • Journal of Korea Port Economic Association
    • /
    • v.22 no.3
    • /
    • pp.97-140
    • /
    • 2006
  • The purpose of this study is to activate Korea's coastal passenger shipping by improvement of the deterrent factors on the basis of field data collected in order to help stimulate it and enhance its competitiveness. As the representative model of this study, the "P" car-ferry liner was chosen, whereby various deterrent factors were observed in the course of the SWOT analysis and through the questionnaires. The major deterrent factors in summary were inflexible government regulations for additional ship operation, disadvantages of taxes policy, port facility shortages, non-allowing of ship's night operation, complicated and inflexible ship's operation controls by the concerned authorities, unreasonable divisions of steaming areas, and existences of obstacles on the ship's running routes, etc. which considered all are important to activate the liners.

  • PDF

A Study on the Competitiveness Improvement of Port Policy in the Philippines (필리핀 항만정책의 경쟁력 제고방안에 관한 연구)

  • Baek, In-heum;Kim, Myung-jae
    • Journal of Korea Port Economic Association
    • /
    • v.34 no.3
    • /
    • pp.53-74
    • /
    • 2018
  • The purpose of this study is to give a guiding implications to strengthen the competitiveness of port policy in Philippines, considering the inefficiencies in the port infrastructures and management systems in the country, despite its average economic growth of 5-6% and subsequent increment in passenger and trading volumes. These growth figures imply a compelling need for a systemic development plan and impellent actions. This study used the analytic hierarchy process for conducting a port competitiveness analysis and the data on deterrent factors were collected through literature and internal government documents including on-site interviews of the parties involved. The implications of the analysis led the study to conclude the need for adopting an enhanced centralized management, a separate investment and management for ports, a grade classification of nationwide small-, medium, and large-sized ports, efficient incoming systems for port dues, and an advanced mode of financing and investment inducement, among others.

A Comparative Study of Factors Influencing Software Piracy : Focused on Different Software User Groups (소프트웨어 사용자 집단에 따른 불법복제 의도에 미치는 요인 비교 연구)

  • Kim, Joong Han
    • Journal of Information Technology Services
    • /
    • v.14 no.2
    • /
    • pp.15-31
    • /
    • 2015
  • Software piracy is widespread throughout the world. It has negative effects on the software industry and the intellectual property market. Despite various deterrent policies, the phenomenon has been getting severe. The current study investigated the antecedents of software piracy attitudes and intention. In order to identify factors and their relationship, a research model for illegal piracy behavior was developed and empirically examined through a path analysis using structural equation model. Also, this study employed a multiple group structural equation model to investigate differences in structural weights across PC software user group and smartphone application user group. It was revealed that perceived benefit, habit, social factor, self-efficacy had positive effect on attitude toward software piracy, whereas perceived risk had a decreasing influence on attitude. Relationships between piracy attitudes and intentions were significant as well. Furthermore, the cross validation between two groups showed the path coefficients of habit to attitude and attitude to intention were significantly different. Implications for research and practice are discussed.

An Integrated Computer Security Model Based on the General Trust Theory (신뢰성이론을 바탕으로 한 통합 컴퓨터 보안 모형에 관한 연구)

  • Lee, Sang-Gun;Yoo, Sang-Jin
    • Asia pacific journal of information systems
    • /
    • v.12 no.1
    • /
    • pp.123-138
    • /
    • 2002
  • For the last two decades, there has been much research on computer abuse from the perspective of the general deterrence theory based on objectism, which covers security policy, security awareness programs, and physical security system. The traditional view offered by the general deterrence theory indicates that security policy, security awareness, and security system play a major role in preventing computer abuse. In spite of continuous organizational efforts and investments based on these systematic factors, the incidence of computer abuse in organizations is still rapidly increasing. This paper proposes another perspective-the social control theory based on subjectism-in preventing computer abuse. According to the social control theory, organizational trust, which comprises organizational attachment, commitment, involvement and norms, can prevent computer abuse by reducing insider's computer abuse. The aim of this article is to assess the role of organizational trust come from attachment, commitment, involvement, norms in preventing computer abuse. The results indicate that both organizational trust and deterrent factors are effective in preventing computer abuse.

A Study of Political Use of Naval Power in Solving International Conflicts (설득이론을 통한 해군력의 정치적 사용에 관한 고찰)

  • Yang, Jung-Seung
    • Strategy21
    • /
    • s.30
    • /
    • pp.236-262
    • /
    • 2012
  • Morgenthau claims that in international relations, there are the economic, political, and military powers that enable a nation to achieve its political and diplomatic goals. This paper explores the possibility of resolving international conflicts with naval power. First, the theoretical and historical perspective, naval power was used as a final resort to force a nation's political or diplomatic objective on an enemy nation when negotiations failed, and this was done through the physical and psychological destruction of the enemy by naval power. But as the use of military power has decreased because of the invention of the nuclear weapon, the existence of a large and capable navy deterrent has become one of the most useful military options among a nation's diplomatic measures. In other words, he focused on the political usefulness of naval power as a deterrent and coercive diplomatic tool for persuading other nations to acquiesce, rather than using naval power and actual military action as a final resort. The reason for this is that compared to army and air force, navy's flexibility, continuity, and the ability to deter are greater. The navy provides excellent accessibility through its wide mobility on the sea, and it has been shown through research that the navy possesses a political usefulness that facilitates the solution of conflicts through presence, naval intervention, and naval blockade. On the other hand, among the factors that could improve the influence of the navy are alliance relations, a reliable and powerful navy, carrots and sticks that it would have to deal with in the case of successful or unsuccessful negotiations, and support from international opinion. On this paper I introduce E.N.Luttwak's naval suasion theory. By the his theory, there are two mode of naval suasion. One is latent naval suasion the other is active suasion. Latent suasion there are deterrent mode and supportive mode. Active naval suasion there are coercive mode and supportive mode. Coercive mode has positive and negative. The limitations of naval suasion have been identified as follows. First, because the objective of the use of naval power is persuading enemy nations, the results are unpredictable. Second, the leaders of all countries possess limited understanding on the complexities of naval power and therefore lack understanding of the usefulness of naval power when choosing options. Third, in case of failure through naval suasion, prestige and reputation of a nation can be damaged. Finally, the following are additional possible research topic. First, a research on the decision making process of choosing naval power as a measure to resolve conflicts is needed. Lastly, research on the size of the navy and types of ships required for efficient naval suasion is needed. Today's world requires cooperative security regime so that middle class navy also requires political use of naval power in solving international conflicts. Therefore, additional research on this topic is needed.

  • PDF

Polygraph Security Screening as an Internal Control Method to Counter Industrial Espionage in Korea (폴리그라프를 활용한 산업스파이 대응방안)

  • Lee, Ju-Lak
    • Korean Security Journal
    • /
    • no.20
    • /
    • pp.291-311
    • /
    • 2009
  • Amid intensified global competition, securing high technologies is becoming a prerequisite towards achieving developed nation status. Korea has made tremendous efforts into developing technologies for decades and it has now obtained a leading position in many fields. As a result, however, Korea has become a major target of industrial espionage and not a few Korean businesses have already suffered from it. In order to effectively counter industrial espionage, this research explores the use of polygraph security screening as an internal control method through literature review, and discusses matters which need to be considered before the introduction of it into Korea, focusing on the accuracy of security screening. Since polygraph security screening generates deterrent effect by increasing certainty and celerity of punishment, it makes a valuable contribution to the control of industrial espionage. However, the most important problem with the use of the polygraph in security screening is errors of the examination. Thus, polygraph security screening should be used as a part of comprehensive security management program to reduce the possibility of errors. In addition, because factors such as countermeasures and examiner's experience are known to influence the accuracy of the examination, the issues surrounding them should also be addressed.

  • PDF

Intentions of Employees to Whistleblow Information Security Policy Violations in the Organization

  • Wei, Liang-Cheng;Hsu, Carol;Wang, Kai
    • Asia pacific journal of information systems
    • /
    • v.26 no.1
    • /
    • pp.163-188
    • /
    • 2016
  • Compliance with information security policies has been an important managerial concern in organizations. Unlike traditional general deterrent theory, this study proposes whistle-blowing as an alternative approach for reducing internal information security policy violations. We build on the theories of planned behavior and rational choice as well as develop a theoretical model to understand the factors that influence whistle-blowing attitudes and intention at both the organizational and individual levels. Our empirical results reveal that altruistic and egoistic concerns are involved in the development of whistle-blowing attitudes. The results not only extend our understanding of whistle-blowing motivation but also offer directions to managers in promoting internal disclosure of information security breaches.

A Moral-Belief Model for Deterring Non-Work-Related Computing in Organizations

  • Tserendulam Munkh-Erdene;Sang Cheol Park
    • Asia pacific journal of information systems
    • /
    • v.29 no.4
    • /
    • pp.644-672
    • /
    • 2019
  • Negative consequences incurred from employees' non-work-related computing (NWRC) have been one of the security-related issues in information intensive organizations. While most studies have focused on the factors that motivate employees to engage in NWRC, this study examines the mediating effect of moral beliefs on the relationship between sanctions and NWRC using a moral beliefs-based model. The research model posits that the formal (i.e., punishment severity and detection certainty) and informal sanctions (subjective norms and descriptive norms) enhance employees' moral beliefs against NWRC intention. From a cross-sectional scenario-based survey involving 176 employees working at banks in Mongolia, our results indicate that moral beliefs fully mediate the relationship between detection certainty/subjective norms and NWRC intention and act as a partial mediator in the relationship between descriptive norms and NWRC. The findings from this study present empirical evidence that both informal and formal sanctions could be an effective deterrent for NWRC intention through employees' moral beliefs.

A Study on the Factors Affecting the Flexibility of cargo airlines to switch the airport (화물항공사의 공항 전환 유연성에 영향을 주는 요인에 관한 연구)

  • Bakhitiyorjon, Abdurakmanov;Lee, Hee-Yong
    • International Commerce and Information Review
    • /
    • v.19 no.2
    • /
    • pp.237-258
    • /
    • 2017
  • This research thoroughly analyzes prior literature related to the flexibility of cargo airlines to switch the airport and discusses the driving factors of such footloose nature. The main purpose of the study is to identify the most deterrent factors leading to airport relocation decision which determines cargo industries role on the global trade. Qualitative research based on systematic process analysis was conducted as a main research method. As a result, 24 factors related to airport-airline relationship were chosen and categorized into four main groups; (1) Location issues, (2) Restrictions, (3) Poor quality, and (4) High costs. The findings derived from the analysis of selected studies suggest that restriction related issues (e.g. night-time flight restrictions, customs administration) followed by location issues (e.g. absence of origin destination demand) have created more constraint to airport-airline relationship.

  • PDF