• Title/Summary/Keyword: Proactive in Action

Search Result 35, Processing Time 0.025 seconds

Roles of Participatory Action-oriented Programs in Promoting Safety and Health at Work

  • Kazutaka, Kogi
    • Safety and Health at Work
    • /
    • v.3 no.3
    • /
    • pp.155-165
    • /
    • 2012
  • Reflecting the current international trends toward proactive risk assessment and control at work with practical procedures, participatory action-oriented approaches are gaining importance in various sectors. The roles of these approaches in promoting the safety and health at work are discussed based on their recent experiences in preventing work-related risks and improving the quality of work life, particularly in small-scale workplaces. The emphasis placed on the primary prevention at the initiative of workers and managers is commonly notable. Participatory steps, built on local good practices, can lead to many workplace improvements when the focus is on locally feasible low-cost options in multiple aspects. The design and use of locally adjusted action toolkits play a key role in facilitating these improvements in each local situation. The effectiveness of participatory approaches relying on these toolkits is demonstrated by their spread to many sectors and by various intervention studies. In the local context, networks of trainers are essential in sustaining the improvement activities. With the adequate support of networks of trainers trained in the use of these toolkits, participatory approaches will continue to be the key factor for proactive risk management in various work settings.

The Effect of Consumer Value and Unethicality on the Type of Consumer Complaint Behaviors (소비자 가치와 비윤리성에 따른 소비자 불평행동 유형)

  • Lee, Youngae;Lim, Su-Ji
    • Korean Journal of Human Ecology
    • /
    • v.22 no.2
    • /
    • pp.267-282
    • /
    • 2013
  • This study analyzed the effect of consumer value and unethicality on the type of consumer complaint behaviors. Despite the obvious importance of the research on consumer complaint behaviors focused on consumer's inherent personality, there is relatively little work done. The purpose of this study is to analyze the determinants of consumer complaint behaviors in order to improve consumers' well-being and develop the market condition. The 1,050 respondents are finally analyzed using the descriptive statistics, factor analysis, and multinominal logit model. Consumer value and unethicality are significant effect on the type of consumer complaint behaviors such as no action, private action only, public action only, and both private and action. The orientation of achievement and pleasure among consumers' value is associated with the higher level of complaint behaviors compared with no action. In terms of consumers' unethicality, no harm unethicality is associated with the types of each consumer complaint behavior except no action. On the other hand, both proactive and passive unethicality increase the possibility of no action. The policy implications of the consumer education are suggested as well as the directions of customer management strategies in the business sector.

Architecture Modeling and Performance Analysis of Event Rule Engine (이벤트 파싱 엔진의 구조 설계와 성능 분석)

  • 윤태웅;민덕기
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2003.11a
    • /
    • pp.51-57
    • /
    • 2003
  • In operating distributed systems, proactive management is one of the major concerns for better quality of service and future capacity planning. In order to handle this management problem effectively, it is necessary to analyze performances of the distributed system and events generated by components in the system. This paper provides a rule-based event parsing engine for proactive management. Our event parsing engine uses object hooking-based and event-token approaches. The object hooking-based approach prepares new conditions and actions in Java classes and allows dynamically exchange them as hook objects in run time. The event-token approach allows the event parsing engine consider a proper sequence and relationship among events as an event token to trigger an action. We analyze the performance of our event parsing engine with two different implementations of rule structure; one is table-based and the other is tree-based.

  • PDF

Improving the Inventive Thinking Tools Using Core Inventive Principles of TRIZ (TRIZ의 핵심 발명원리를 이용한 발명적 사고도구의 개선)

  • Kim, Tai-Young;Kim, Jung-Hyeon;Park, Young-Taek
    • Journal of Korean Society for Quality Management
    • /
    • v.46 no.2
    • /
    • pp.259-268
    • /
    • 2018
  • Purpose: SIT(Systematic Inventive Thinking) has been widely used in recent years. The validity of the five thinking tools of SIT is examined, and how to improve the inventive thinking tools is investigated. Methods: Frequency analysis on the usage of the TRIZ 40 inventive principles was used. Inventive thinking tools are derived by eliminating principles with low frequencies and grouping similar principles together. Results: Segmentation, prior action, combining, extraction, cushion in advance, transformation of properties are most frequently used among the 40 principles of TRIZ. The most frequently used principles and similar principles with them are grouped into new inventive thinking tools. Two of them, division and attribute dependency, belong to the 5 thinking tools of SIT, and the others, proactive measures, combination and reversal, do not. Conclusion: The newly identified inventive thinking tools are division, combination, proactive measures, attribute dependency, and reversal. The new five inventive thinking tools are quite efficient since they can cover more than two thirds of the TRIZ 40 inventive principles.

The Proactive Threat Protection Method from Predicting Resignation Throughout DRM Log Analysis and Monitor (DRM 로그분석을 통한 퇴직 징후 탐지와 보안위협 사전 대응 방법)

  • Hyun, Miboon;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.369-375
    • /
    • 2016
  • Most companies are willing to spend money on security systems such as DRM, Mail filtering, DLP, USB blocking, etc., for data leakage prevention. However, in many cases, it is difficult that legal team take action for data case because usually the company recognized that after the employee had left. Therefore perceiving one's resignation before the action and building up adequate response process are very important. Throughout analyzing DRM log which records every single file's changes related with user's behavior, the company can predict one's resignation and prevent data leakage before those happen. This study suggests how to prevent for the damage from leaked confidential information throughout building the DRM monitoring process which can predict employee's resignation.

Obstacle Avoidance Using Velocity Dipole Field Method

  • Munasinghe, Sudath R.;Oh, Chang-Mok;Lee, Ju-Jang;Khatib, Oussama
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1657-1661
    • /
    • 2005
  • The velocity dipole field method is presented for real-time collision avoidance of mobile robots. The direction of motion of the obstacle is used as the axis of the dipole field, and the speed of the obstacle is used to proportionally strengthen the dipole field. The elliptical field lines of the dipole field are useful to skillfully guide the robot around obstacles, quite similar to the way humans avoid moving obstacles. Field modulation coefficient is also introduced to weaken the field effect as the obstacle recedes. The real-time algorithm of the velocity dipole field has been devised and experimentally tested on the robot soccer test-bed. The results show the capability of the new real-time collision avoidance strategy and how it can overcome the weaknesses in the conventional potential field method. The new method makes an explicit and proactive action of collision avoidance, unlike the conventional method, which forces the robot merely away from the obstacle aimlessly. The proposed method delivers greater capability with no considerable computational overhead

  • PDF

Context aware Modeling and Services Implementation With Event Driven in Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경에서 Event Driven 상황정보 모델링 및 서비스 구현)

  • Kim, Hyoung-Sun;Kim, Hyun;Moon, Ae-Kyung;Cho, Jun-Myun;Hong, Chung-Sung
    • Journal of Internet Computing and Services
    • /
    • v.7 no.5
    • /
    • pp.13-24
    • /
    • 2006
  • Context aware computing is an emerging paradigm to achieve ubiquitous computing environments by enabling computer systems to understand their situational contexts. A context aware system uses context to provide relevant information and services to the user depending on the user's task. In this paper, we propose an ontology based context aware modeling methodology that transmits low level contexts acquired by directly accessing various sensors in the physical environments to high level contexts. With these high level contexts, context aware application can provides proactive and intelligent services using ECA (Event Condition Action) rules. We implemented a presentation service in smart office environment.

  • PDF

Overcoming the Hurdles of Transition: Middle School Students' Engagement in Distance Instruction During the COVID-19 Pandemic in South Korea

  • Jinsol KIM;Jeongmin LEE
    • Educational Technology International
    • /
    • v.24 no.1
    • /
    • pp.81-114
    • /
    • 2023
  • The study aimed to qualitatively examine middle school students' engagement in distance instruction during the COVID-19 pandemic. The participants comprised 119 students from a girls' middle school in Seoul, South Korea. To gain an in-depth understanding of the students' experiences, we collected their reflective journals, which included structured items about their learning engagement at three timepoints in 2020: April, July, and December. The following are the results: 10 themes and 18 concepts were derived, and they were integrated into causal conditions (sudden transition due to COVID-19), contextual condition (technology readiness, school education context), central phenomena (high level of behavioral engagement, low emotional engagement), interventional conditions (recognizing the potential of online learning, situational awareness about COVID-19 and online learning), action/interaction phenomena (development and use of self-regulated learning strategies), and consequences (changes in practices and perception towards online learning). Based on the findings, engagement patterns of the participants were classified into five types: proactive, conservative, receptive, reactive, passive learners. The present study demonstrated important findings that are essential for the improvement and development of engaging online learning strategies in the future.

A Case Study of Ergonomic Analysis and Improvement of a Machinery Manufacturing Company (기계설비 제조업체의 인간공학적 진단 및 개선사례)

  • Park, Hee‐Sok;Heo, So‐rim
    • Journal of the Ergonomics Society of Korea
    • /
    • v.25 no.4
    • /
    • pp.153-157
    • /
    • 2006
  • The objective of this study was to establish a systematic ergonomic program for the prevention and control of work-related musculoskeletal disorders(WMSDs) in a machinery manufacturing company. The steps such as looking for the signs of WMSDs problems, setting the stage for action, training-building in-house expertise, gathering and examining the evidence of WMSDS, developing controls of health care management, and proactive ergonomic interventions were applied. The primary success factors were management commitment and encouragement, and harmonious union-management relations.