• 제목/요약/키워드: Misbehavior

검색결과 43건 처리시간 0.028초

서비스접점에서 고객의 화에 대한 반응: 판매원 대 다른 고객의 관점 (Responses to Customer Anger in the Service Encounter: Retail Employee vs Other Customer Perspectives)

  • 박경애
    • 한국의류산업학회지
    • /
    • 제12권5호
    • /
    • pp.591-598
    • /
    • 2010
  • Customer misbehavior can affect dissatisfaction and negative behavioral responses of other customers at the service encounter. This study explored other customer and retail employee reponses to customer anger and aggressive behaviors at the service encounter by examining the perceived wrongness of such behaviors under different situations and comparing the two perspectives of retail employees and consumers. Three scenarios were developed representing different situations including firm's responsibility, both of customer and employee responsibilities, and uncontrollable one. Data were collected from individual interviews with 222 retail employees and 149 consumers. The results showed that the consumers' perceived wrongness of customer aggressions were higher comparing to that of employees. The reasons of perceived wrongness were different by three situations implying that responsibility and controllability affected the perceived wrongness. The study further discusses implications.

A study on Advanced Load-Balanced Ad hoc Routing Protocol

  • Lee, Joo-Yeon;Lee, Cheong-Jae;Kim, Yong-Woo;Song, Joo-Seok
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2004년도 춘계학술발표대회
    • /
    • pp.1433-1436
    • /
    • 2004
  • The ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure of centralized administration. Load-Balanced Ad hoc Routing(LBAR) protocol is an on-demand routing protocol intended for delay-sensitive applications where users are most concern with packet transmission delay. Although LBAR mechanism is a novel load balancing routing protocol for ad hoc network, it has own limitation in route path maintenance phase. Therefore, in this paper, we propose Advanced Load-Balanced Ad hoc Routing(A-LBAR) that is delay-sensitive and has an efficient path maintenance scheme. The robust path maintenance scheme is maintained by considering about nodal loads all over network and misbehavior of overloaded or selfish nodes. The proposed scheme provides good performance over DSR and AODV in terms of packet delay and packet loss rate when some misbehaving nodes exist in the network.

  • PDF

Ethically Questionable Consumer Behaviors: Korean and American Perspectives

  • Lee, Jungki;Fullerton, Sam
    • Asia Marketing Journal
    • /
    • 제21권3호
    • /
    • pp.21-46
    • /
    • 2019
  • This study compares the ethical inclination regarding consumer misbehaviors from two countries with contrasting cultural characteristics. National samples of South Korean and American adults provided their perceptions of the appropriateness of 12 ethically questionable consumer actions. The scenarios ranged from illegal actions, such as fraudulently inflating one's losses when filing an insurance claim to legal, yet questionable, actions such as purchasing an item that the buyer recognizes as having been mispriced. The 12 scenarios exhibited a wide range of mean responses in both countries, thereby supporting the oft-stated premise that consumer ethics is a situational phenomenon. Findings indicate not only where the cultures diverge but also where they converge towards a degree of congruence. Plausible explanations for differences based upon cultural dynamics are provided.

뜨살리스-엔트로피 분석을 통한 무선 랜의 이기적인 노드 탐지 기법 (A Study on Detecting Selfish Nodes in Wireless LAN using Tsallis-Entropy Analysis)

  • 류병현;석승준
    • 한국지능시스템학회논문지
    • /
    • 제22권1호
    • /
    • pp.12-21
    • /
    • 2012
  • IEEE 802.11 표준 무선 네트워크에서 사용되는 DCF(CSMA/CA) 방식의 MAC 프로토콜은 노드들 사이에서 공평한 채널 접근 확률을 보장하도록 설계되었다. 하지만 최근 급속히 확산되고 있는 무선 환경에서 다른 노드들보다 인위적으로 더 많은 데이터를 전송하는 노드가 존재하는 것이 사실이다. 이들 오동작 노드들은 더 많은 데이터를 보내기 위해서 자신의 MAC 프로토콜 동작을 변형시키거나 다른 노드들의 MAC 동작을 방해한다. 이러한 문제는 이기적(Selfish) 노드 문제라고 정의되어 왔으며, 지금까지의 대부분 연구들에서는 무선 랜 내부의 MAC 프로토콜 동작을 프레임 단위로 분석하여 이기적인 노드를 검색하는 방법을 제안하였으나 모든 종류의 이기적인 노드들을 효과적으로 검출할 수는 없었다. 이러한 단점을 보안하기 위해서 본 논문에서는 통계적 기법 중 하나인 뜨살리스-엔트로피(Tsallis-Entropy)를 사용하여 이기적인 노드 탐색 알고리즘을 제안한다. 뜨살리스-엔트로피는 확률 분포의 밀집도 혹은 분산정도를 효과적으로 나타낼 수 있는 척도이다. 제안한 알고리즘은 무선 랜을 구성하는 AP노드에서 동작하도록 설계되었으며, 무선 노드별로 데이터 간격에 대한 확률 분포를 추출해서 뜨살리스-엔트로피를 계산한 후 임계치와 비교하는 방법으로 이기적인 노드를 검출한다. 논문에서 제안한 이기적 노드 검출 알고리즘의 성능을 평가하기 위하여 다양한 무선 랜 환경(혼잡도, 이기적 노드 동작방법, 임계치)을 고려하여 시뮬레이션을 수행한다. 시뮬레이터는 ns2를 사용하였으며, 실험결과 제안한 방법의 이기적인 노드 검출률 이 매우 높음을 알 수 있다.

MANET에서 비정상 노드를 효율적으로 탐지하기 위한 보안 설계 (Security Design for Efficient Detection of Misbehavior Node in MANET)

  • 황윤철
    • 한국통신학회논문지
    • /
    • 제35권3B호
    • /
    • pp.408-420
    • /
    • 2010
  • MANET(Mobile Ad hoc NETwork)은 고정된 네트워크 구조의 부재로 원거리 노드들 간의 통신은 다중 홉 경로를 통해 이루어지기 때문에 종단 노드 사이에 존재하는 노드들의 비정상적 행위를 탐지하고 예방하기가 어렵다. 그러므로 MANET의 성능과 보안 유지를 위해서는 비정상적 행위를 하는 중간노드들과 그에 오염된 노드를 찾아내기 위한 기법들이 필요하다. 그러나 기존에 제안된 기법들은 MANET를 구성하는 노드들이 우호적이며 상호 협력적인 관계라고 가정하고 비정상적 행위를 하는 노드를 식별하는 방법들만 제시해 왔고, 큰 규모의 MANET에 적용할 경우 많은 오버헤드가 발생한다. 따라서 이 논문에서는 MANET에서 구성요소간 안전한 통신을 제공하고 비정상 노드를 효율적으로 탐지 관리할 수 있는 Secure Cluster-based MANET(SecCBM)을 제안하였다. SecCBM은 동적인증을 통한 클러스터 기반 계층적 제어 구조를 이용하여 비정상 노드들을 MANET 구성 과정에서 식별하는 예방 단계와 네트워크를 구성하고 있는 노드들간 통신과정에서 발생하는 비정상 노드들을 FC 테이블과 MN 테이블을 이용해 탐지 관리하는 사후 단계로 구성하였다. 이를 통하여 MANET의 통신 안전성과 효율성을 향상시켰으며 시뮬레이션을 통한 성능평가에서 MANET에 적합한 기법임을 확인 할 수 있었다.

How Do South Koreans Perceive Corporate Social Capital and Its Benefits? An Application to Corporations and Community

  • Jin, Bumsub
    • Asian Journal for Public Opinion Research
    • /
    • 제3권1호
    • /
    • pp.1-21
    • /
    • 2015
  • A recent public opinion survey found that the anti-corporate sentiment of South Korean citizens is primarily due to the misbehavior of Korean corporations. South Korean citizens' skepticism of corporations may hinder the democratic and economic development of the country. As a driving force for community development, social capital is considered to enable citizens to collaborate with one another to resolve a shared problem. Specifically, this study pays attention to the relationship among social capital, corporate capacity, and trust, which may perhaps contribute to developing a democratic environment in Korean society. The study aims to explore whether Korean citizens' perceived corporate bonding and bridging social capital affect corporate capacity for collaborative action and trust in corporations. A Web survey of 385 South Koreans was conducted. The findings show that perceived bonding social capital among employees is positively related to corporate capacity for collaboration action. Moreover, perceived bonding among employees and bridging social capital between employees and local residents are positively related to corporate capacity for collaboration action and trust in corporations. These findings suggest that researchers and practitioners for organizational development and community-building need to enhance corporate social capital.

FTA 원산지검증행정의 효율화 방안에 대한 연구 (A Study on FTA-related Administrative Efficiency Measures for Verifying the Origin)

  • 정재완
    • 무역상무연구
    • /
    • 제55권
    • /
    • pp.243-264
    • /
    • 2012
  • This study is aimed to analyze problems related to FTA country of origin of goods verification which is increasing from 2006 and thereby to grope for solution of such problems and seek adequate FTA performance administration. It is found, through comparative analysis and statistics of last 8 FTAs so far Korea has concluded that there are major problems such as excessive verification processing due to complicated country of origin regulation etc. This paper suggests following policies of country of origin administration ; (1) Simplification of FTA country of origin rules (2) reciprocal cooperation between each country's Customs Authorities based on trust (3) rational measurement against corresponding country's Customs Authorities' misbehavior (4) enhancement of transparency in relation to processing rule of country of origin verification (5) securing FTA country of origin verification experts. For these improvements, upcoming FTA shall rule country of origin reasonably, simplification and transparency of rule is needed for established FTAs in relation to FTA performance administration with corresponding countries. Also it is necessary to revise FTA preferential tariff law and its related laws, and carry forward policies in accordance with medium and long term plan.

  • PDF

중학교 남·여 학급간 학급 훈육문제의 심각성과 빈도의 차이 (The Difference in Severity and Frequency of Classroom Discipline Problems Between Male and Female Students in Middle School Classrooms)

  • 김달효
    • 수산해양교육연구
    • /
    • 제17권1호
    • /
    • pp.35-47
    • /
    • 2005
  • The purpose of this study is to investigate various kinds of discipline problems in middle school classrooms, and the differences in severity and frequency of the classroom discipline problems between male and female students' classrooms in middle schools. This study shows that the discipline problems in the middle school classrooms include using a cellular phone, chattering, sleeping, chewing gum, reading comic books, asking useless questions, challenging a teacher, fighting, calling names, skipping class, throwing trash in the classroom, breaking classroom equipment, creating disorder, losing materials, playing with a ball in the classroom, gambling, and so on. Generally, male students recognized the severity of the classroom discipline problems more than the female students. However, it is shown that the frequency of discipline problems in male students' classrooms is higher than that in female students' classrooms. From the results of this study, male students have more active discipline problems (playing with a ball in the classroom, throwing trash in the classroom, coming to class late, gambling, cutting in line, and so on). On the other hand, female students have more passive discipline problems (making a noise by using a cellular phone, asking useless questions, sending messages to a classmate, studying other subjects, scattering, and so on).

Lightweight Acknowledgement-Based Method to Detect Misbehavior in MANETs

  • Heydari, Vahid;Yoo, Seong-Moo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권12호
    • /
    • pp.5150-5169
    • /
    • 2015
  • Mobile Ad hoc NETworks (MANETs) are the best choice when mobility, scalability, and decentralized network infrastructure are needed. Because of critical mission applications of MANETs, network security is the vital requirement. Most routing protocols in MANETs assume that every node in the network is trustworthy. However, due to the open medium, the wide distribution, and the lack of nodes' physical protection, attackers can easily compromise MANETs by inserting misbehaving nodes into the network that make blackhole attacks. Previous research to detect the misbehaving nodes in MANETs used the overhearing methods, or additional ACKnowledgement (ACK) packets to confirm the reception of data packets. In this paper a special lightweight acknowledgement-based method is developed that, contrary to existing methods, it uses ACK packets of MAC layer instead of adding new ACK packets to the network layer for confirmations. In fact, this novel method, named PIGACK, uses ACK packets of MAC 802.11 to piggyback confirmations from a receiver to a sender in the same transmission duration that the sender sends a data packet to the receiver. Analytical and simulation results show that the proposed method considerably decreases the network overhead and increases the packet delivery ratio compared to the well-known method (2ACK).

FMEA를 활용한 뒷문거래 개선모델 개발 (Development of the FMEA-based Backdoor Transaction Improvement Model)

  • 류성국;김선호;김종만
    • 대한안전경영과학회지
    • /
    • 제21권4호
    • /
    • pp.7-15
    • /
    • 2019
  • This paper proposes the FMEA-based model to avoid backdoor transactions when purchasers select suppliers for products and services. In the model, backdoor transactions consist of two categories: backdoor selling and maverick buying. Both of which influence negative effects on cost savings due to not only uncompetitive advantage but also unusable purchasing leverage by unethical and misbehavior of purchase requestors. For the risk evaluation based on FMEA, three and five risk types of backdoor selling and maverick buying are identified respectively. Current risk priority numbers(RPN) based on those risk types are calculated by three categories: occurrence, detection and severity. Six risk mitigation strategies and fourteen mitigation tactics are identified to improve current RPN. In order to validate the model, questionnaires are collected from fifteen companies and statistically analyzed. The analysis result shows that the model reduces backdoor transaction risks and has no differences in reduction of backdoor transaction risks regardless of the type of purchasing organization units and existence of purchasing procedures in the organization.