• Title/Summary/Keyword: Policy Violation

Search Result 109, Processing Time 0.033 seconds

Study on Fatality Risk of Older Driver and Traffic Accident Cost (고령운전자 연령구간별 사망사고 발생위험도와 사고비용 분석 연구)

  • Choi, Jaesung
    • Journal of the Korean Society of Safety
    • /
    • v.33 no.4
    • /
    • pp.111-118
    • /
    • 2018
  • Korea is facing a surge in the aging population, showing that population aged 65 and above will be accounted for 42.5% of the total population in 2065 with the emphasis on the over-80 population consisting of 19.2%. In response to this abrupt change in population structure, the number of traffic fatality accident referring to older driver as aged 65+ years had been increasing from 605 fatalities in 2011 to 815 fatalities in 2015 resulting in increases in 34.7% in oppose to happening to decreases in 17.2% about non-older driver. With Logit analysis based on Newton-Raphson algorithm utilizing older driver's traffic fatality data for the 2011-2015 years, it was found that the likelihood of an accident resulting in a fatality for super older driver aged 80 years and above considerably increased compared to other older driver with aging classification: 2.24 times for violation of traffic lane, 2.04 times for violation of U-turn, 1.48 times for violation of safety distance, 1.35 times for violation of obstacle of passing; also average annual increase of traffic accident cost related to super older driver was fairly increased rather than other older driver groups. Hence, this study proposes that improving and amending transport safety system and Road Traffic Act for super older driver needs to be urgently in action about license management, safe driving education, etc. when considering the increase of over-80 population in the near future. Also, implementing a social agreement with all ages and social groups to apply with advanced driver assistance system for older driver groups will be able to become a critical factor to enhance safe driving over the face of the country.

A Study on the i-PIN Policy Implementation Process for the i-PIN Revitalization (i-PIN의 활성화를 위한 정책집행 과정 분석)

  • Kim, Min Chen;Song, Keun Won;Chung, Choong Sik
    • Informatization Policy
    • /
    • v.17 no.1
    • /
    • pp.43-62
    • /
    • 2010
  • Mandatory use of resident registration number in Korean websites is likely to result in an violation of privacy. The Korea government introduced i-PIN (Internet Personal Identification Number) to solve this problem in Oct of 2006. But the implementation of i-PIN has failed to decrease violation of privacy. Therefore, we must open our eyes to problems of i-PIN and the importance of privacy protection. This study analyzes the policy failures of i-PIN and considers countermeasures for protecting privacy on the Internet, and explores policy alternatives to secure privacy on the Internet by analyzing the implementation process of I-PIN. In conclusion, this study stresses the urgent need for a well-thought-out policy in order to solve the problems of i-PIN on the Internet. It expects that the i-PIN will make a big stride for the realization of secure electronic government.

  • PDF

Factors Affecting the Intention to Invade Privacy on Social Network Service (SNS에서 프라이버시 침해의도에 영향을 미치는 요인)

  • Ahn, Soomi;Jang, Jaeyoung;Kim, Jidong;Kim, Beomsoo
    • Information Systems Review
    • /
    • v.16 no.2
    • /
    • pp.1-23
    • /
    • 2014
  • With side effects such as Phishing and Spam using personal information in Social Network Service, there is a growing need for studies related to harmful behaviors such as the reason for privacy violation. As such, this study assumed privacy violation to be ethical decision, making behavior and used the Theory of Planned Behavior and Motivation Theory, which are mostly used in social science to identify the factors affecting privacy violation. The results suggested that the Perceived Enjoyment and Punishment used in motivation studies affected privacy violation behaviors, and that the factors of the Theory of Planned Behavior such as Attitude toward Privacy Violation, Subjective Norms of Privacy Violation, and Perceived Behavioral Control with regard to Privacy Violation significantly influenced the Intention to Privacy Violation. On the other hand, Perceived Curiosity and Subjective Norms of Privacy Violation did not affect the Intention to Privacy Violation. Therefore, this study confirmed that the Theory of Planned Behavior was appropriate to explain the Intention to Privacy Violation, and that the variables of the Motivation Theory generally influenced the Attitude toward Privacy Violation. This study was significant since it extended the scope of theoretical privacy study from users and victims centered to inflictor and applied the Extended Theory of Planned Behavior using the variables of the Motivation Theory in the study of Intention to Privacy Violation. From the practical aspect, it provided the ground for privacy education based on the fact that the Attitude toward Privacy Violation can be curbed when education on the Privacy Concerns, Perceived Enjoyment, and Punishment with regard to privacy is strengthened. It also cited the need for the punishment of privacy violation and the practical ground to amend the terms and conditions of user license and Personal Information Protection Act to provide policy support.

Public Attitude Survey on Traffic Fine Policy (교통과태료제도에 대한 국민의식조사 분석)

  • Kim, Yeon-Soo
    • Korean Security Journal
    • /
    • no.37
    • /
    • pp.51-82
    • /
    • 2013
  • Traffic safety has been dramatically enhanced thanks to recent improvements in traffic environment. Nonetheless, many traffic accidents occur due to unchanging driving practices. Therefore, this study addresses the issues of traffic fine and penalty fine policies, and seek appropriate levels of traffic fines through a public attitude survey. For this purpose, a survey was conducted on 905 adult drivers over 20 years of age from 15 provinces and metropolitan cities. Analysis results are as follows. First, traffic environment in South Korea is generally not safe. Respondents perceive violation of traffic laws such as reckless driving, speeding and drunk and driving as an important cause. Second, 61.6% of respondents experienced over one speeding annually, but only 15.2% of respondents were caught in the last three years. Third, opposition to levels of traffic fines has decreased over the past, and responses were more positive when more information was provided. Fourth, to deter moral hazard of paying traffic fines to avoid traffic penalty points, traffic fines should be at least 50,000~70,000 won higher than penalty fines. Fifth, there was less opposition to implementation of accumulated penalty policy compared to income-based differential fine levels. Sixth, traffic fines for different types of traffic violations need to be reorganized. In conclusion, this study suggests the following policy improvements for the current traffic fine and penalty fine policies for violation of traffic laws. First, enough understanding and consensus must be developed for policy improvements. Second, administrative sanctions such as giving penalty points should be considered rather than financial sanctions. Third, there should be policy improvement for accumulative penalty. Current acts of traffic law violation should be reorganized.

  • PDF

A Study on Security Policy Violations of Organization Members (조직 구성원들의 보안정책 위반에 관한 연구)

  • Kim, Jong-Ki;Oh, Da-Woon
    • Informatization Policy
    • /
    • v.25 no.3
    • /
    • pp.95-115
    • /
    • 2018
  • This study aims to examine organization members' intention to violate security policies based on the Person-Environment Fit Model. This study investigated the effect of the relationship between organizational security environment and the individual security value on the intention of organizational security policy violation. The security environments are classified into the organizational information security culture and peers' behavior of security compliance, while the personal values are classified into reconstructing the conduct, distorting the consequence, and devaluing the organization as presented in the moral disengagement theory. Based on the concept of the moral disengagement theory, we measured the individual security values as a second order factor. This study found that the information security culture had a statistically significant impact on devaluing the organization, but did not have as much impact on reconstructing the conduct and distorting the consequence. Peers' behavior of security compliance had a significant impact on reconstructing the conduct, distorting the consequence and devaluing the organization, all of which also had relevant impact on the organizational members' intention of security policy violation.This study measured a persons' perception on security policy breach by presenting scenarios of password sharing that is common in many organizations. This study is expected to make practical contributions, as it deals with challenges that many organizations are actually faced with.

The Effect of Black Consumer Behavior on the Intention of Turnover: Focusing on the Mediation Effect of Psychological Contract Violation (블랙컨슈머행동이 이직의도에 미치는 영향 -심리적 계약위반의 매개효과-)

  • Yang, Jin-Ho;Kwon, Hyeok-Gi
    • Journal of Digital Convergence
    • /
    • v.17 no.12
    • /
    • pp.139-145
    • /
    • 2019
  • The purpose of this study is to analyze the effects of black consumer behavior on turnover intentions. Baron and kenny (1986) The effectiveness of the analysis results, according to the verification procedure. Results of empirical analysis are as follow. black-consumer behavior has the significant positive effect on the intention of turnover of employee in restaurant. and The significance of this study indicates that service employee's psychological contract violation plays a role as mediated variable influencing the relationship between black-consumer behavior and intention of turnover. Based on the results of the empirical analysis, it was suggested that measures such as a policy banning access to black consumers or compensation system such as emotional labor allowance were needed to reduce the degree of turnover of the members of the organization. Finally, the methodological limitations of this study are presented.

Regulatory Disclosure of Large Business Groups in Korea

  • GWON, Jae-Hyun
    • Asian Journal of Business Environment
    • /
    • v.10 no.1
    • /
    • pp.45-50
    • /
    • 2020
  • Purpose: This paper examines the theoretical grounds for the disclosure of the Korea Fair Trade Commission. Three central measures of the disclosure are scrutinized: The interconnected status of affiliate companies, the important matters of private affiliates, and the large internal transactions. Contemplating on three measures, respectively, we review the rationale and derive policy implications. Research design, data, and methodology: Collecting the data of violation rates and remedial measures, we analyze the intensity of the disclosure enforcement. These statistics are critically reviewed by the economic literature of mandatory disclosure. Results: Statistics evince that the Korea Fair Trade Commission has enforced the regulatory disclosure quite successfully. Violation rates of the disclosure has declined from the outset. It demonstrates that the Korea Fair Trade Commission has enforced those measures satisfactorily for about a decade. But we cannot ascertain empirically whether the regulatory disclosures are socially and economically beneficial. To evaluate the effect of the regulatory disclosures precisely, we need a further empirical investigation. Conclusions: Despite the lack of policy evaluation, this study suggests complementary measures for current disclosures. First, disclosure of executive compensation in privately held subsidiaries must be introduced. Second, the controlling shareholder/manager should be responsible for information disclosure on foreign subsidiaries.

Violations of Information Security Policy in a Financial Firm: The Difference between the Own Employees and Outsourced Contractors (금융회사의 정보보안정책 위반요인에 관한 연구: 내부직원과 외주직원의 차이)

  • Jeong-Ha Lee;Sang-Yong Tom Lee
    • Information Systems Review
    • /
    • v.18 no.4
    • /
    • pp.17-42
    • /
    • 2016
  • Information security incidents caused by authorized insiders are increasing in financial firms, and this increase is particularly increased by outsourced contractors. With the increase in outsourcing in financial firms, outsourced contractors having authorized right has become a threat and could violate an organization's information security policy. This study aims to analyze the differences between own employees and outsourced contractors and to determine the factors affecting the violation of information security policy to mitigate information security incidents. This study examines the factors driving employees to violate information security policy in financial firms based on the theory of planned behavior, general deterrence theory, and information security awareness, and the moderating effects of employee type between own employees and outsourced contractors. We used 363 samples that were collected through both online and offline surveys and conducted partial least square-structural equation modeling and multiple group analysis to determine the differences between own employees (246 samples, 68%) and outsourced contractors (117 samples, 32%). We found that the perceived sanction and information security awareness support the information security policy violation attitude and subjective norm, and the perceived sanction does not support the information security policy behavior control. The moderating effects of employee type in the research model were also supported. According to the t-test result between own employees and outsourced contractors, outsourced contractors' behavior control supported information security violation intention but not subject norms. The academic implications of this study is expected to be the basis for future research on outsourced contractors' violation of information security policy and a guide to develop information security awareness programs for outsourced contractors to control these incidents. Financial firms need to develop an information security awareness program for outsourced contractors to increase the knowledge and understanding of information security policy. Moreover, this program is effective for outsourced contractors.

A Review on Gender and Health for Gender-Sensitive Health Policy (젠더와 건강 : 성인지적 보건정책을 위한 시론)

  • Chun, Hee-Ran;Chung, Jin-Joo
    • Health Policy and Management
    • /
    • v.18 no.2
    • /
    • pp.130-156
    • /
    • 2008
  • This review paper is to provide theoretical background and empirical evidence for gender sensitive health policy in Korea. We explore how sex and gender are implicated in health disparities. After reviewing major concepts regarding sex, gender, and health, the study moves on to describe the ways in which gender interacts with other social determinants (socioeconomic position, workplace, stress, social support, and violation) to show disparate health outcomes. Next, suggested health models considering gender and social process are introduced. The article concludes by suggesting the necessity of gender sensitive policy consorted with social programs in tackling health equity.

Analysis of periodontal data using mixed effects models

  • Cho, Young Il;Kim, Hae-Young
    • Journal of Periodontal and Implant Science
    • /
    • v.45 no.1
    • /
    • pp.2-7
    • /
    • 2015
  • A fundamental problem in analyzing complex multilevel-structured periodontal data is the violation of independency among the observations, which is an assumption in traditional statistical models (e.g., analysis of variance and ordinary least squares regression). In many cases, aggregation (i.e., mean or sum scores) has been employed to overcome this problem. However, the aggregation approach still exhibits certain limitations, such as a loss of power and detailed information, no cross-level relationship analysis, and the potential for creating an ecological fallacy. In order to handle multilevel-structured data appropriately, mixed effects models have been introduced and employed in dental research using periodontal data. The use of mixed effects models might account for the potential bias due to the violation of the independency assumption as well as provide accurate estimates.