• Title/Summary/Keyword: Risks

Search Result 5,171, Processing Time 0.033 seconds

Mediating effects and Moderating effects of Anticipated Risks, Anticipated Benefits in the relationships between Academic Burnout and Life Satisfaction (학업소진과 삶의 만족간의 관계에서 위험예측/이득예측의 매개효과와 조절효과)

  • Jung, Eun-Sun;Ha, Jung-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.9
    • /
    • pp.6009-6018
    • /
    • 2015
  • The purpose of the present study was to investigate the role of anticipated risks and anticipated benefits on the relationship between academic burnout and life satisfaction. The participants of this study were 326 university students and analyses for this study was conducted by using PASW 18.0 and Amos 8.0. The major achievements were as follows; anticipated risks confirmed partially mediating variable between academic burnout and life satisfaction. That is, academic burnout had some effect on life satisfaction through anticipated risks. Also, anticipated risks confirmed moderating variable between academic burnout and life satisfaction. Finally, the needs of development about the counseling and the education approaches as a special intervention was discussed, and that approaches were reflected academic burnout and anticipated risks to be reduced. And limitations and implications of subsequent further study were suggested in this research.

Association between Maternal Adverse Childhood Experiences and Attention-Deficit/Hyperactivity Disorder in the Offspring: The Mediating Role of Antepartum Health Risks

  • Moon, Duk-Soo;Bong, Su-Jeong;Kim, Bung-Nyun;Kang, Na Ri
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • v.32 no.1
    • /
    • pp.28-34
    • /
    • 2021
  • Objectives: This study aimed to examine the effect of maternal adverse childhood experiences (ACEs) on the attention-deficit/hyperactivity disorder (ADHD) symptoms in the offspring and to examine the mediating role of antepartum health risk on the intergenerational transmission of maternal ACEs. Methods: The participants consisted of 461 mother-child dyads. Mothers completed the ACEs questionnaire and Diagnostic Predictive Scales. Multivariate logistic regression analysis was used to estimate the risk of ADHD symptoms in the offspring of mothers with ACEs and the mediating effect of antepartum health risks by path analysis. Results: In all, 35.4% (n=163) had at least one maternal ACE, and 11.1% (n=51) had three or more. Compared to the non-ADHD symptom group, the group of offspring with ADHD symptoms showed a significant association with maternal ACE score (p<0.001) and antepartum health risks (p<0.001). Multivariate analysis further showed a significant association between the sum of maternal ACEs [odds ratio (OR)=1.264, 95% confidence interval (CI)= 1.060-1.516, p=0.009], antepartum health risks (OR=1.236, 95% CI=1.036-1.475, p=0.019), and ADHD symptoms in the offspring. In the mediation model in which the mother's ACE score affected the offspring's ADHD symptoms, partial mediation through antepartum health risks was found to be significant (B=0.041, 95% CI=0.011-0.124). Conclusion: Maternal ACEs are significantly related to the incidence of ADHD symptoms in the offspring and antepartum health risks exert an indirect effect. These findings suggest that maternal ACEs have a negative impact on the offspring's brain development through intergenerational transmission, resulting in neurodevelopmental disorders such as ADHD.

Healthcare Workers' Mental Health in Pandemic Times: The Predict Role of Psychosocial Risks

  • Carla Barros;Pilar Baylina;Ruben Fernandes;Susana Ramalho;Pedro Arezes
    • Safety and Health at Work
    • /
    • v.13 no.4
    • /
    • pp.415-420
    • /
    • 2022
  • Background: Healthcare workers perform an emotionally exhausting daily work activity, making them prone to occupational hazards, namely psychosocial ones. This study aims to assess the impact of psychosocial risk factors on healthcare workers' mental health. Methods: A cross-sectional study was developed between May and June of 2021 with 479 healthcare workers from Portuguese hospitals. The Depression, Anxiety and Stress Scale was used to assess mental health, and psychosocial risks were assessed through the Health and Work Survey - INSAT. Statistical analysis was performed to identify the psychosocial risk factors related to anxiety, depression, and stress. Subsequently, a multiple linear regression was performed to identify the models that better explained psychosocial risk factors' relationship with anxiety, depression, and stress. Results: Data showed a strong exposure to psychosocial risks. Work pace and intensity, work relationships, and emotional demands stood out with higher global average percentages for yes answers to "exposure and discomfort." The analysis of the b values and p-values from the multiple linear regression shows that some cross-sectional psychosocial risks are predictors of anxiety and stress dimensions, and other psychosocial risks differ in the two mental health dimensions. However, it is important to highlight that healthcare workers still showed great joy and pleasure in performing their work activities. Conclusion: Support network development in the work environment is needed to prevent healthcare workers' emotional stress and promote their psychological well-being. Therefore, new research is essential to understand the psychosocial risks that affect healthcare workers and assess the less visible effects of work-health relationships.

A Study on the Identification of Cloud Security Risks in the Manufacturing Industry (제조산업 클라우드 보안위험 식별 연구)

  • Junghun Oh;Juno Lee;Hangbae Chang
    • Journal of Platform Technology
    • /
    • v.12 no.2
    • /
    • pp.3-11
    • /
    • 2024
  • In the trend of digital transformation and the increase in non-face-to-face services triggered by the Fourth Industrial Revolution, the demand for cloud computing services is being sharply stimulated. Currently, the cloud is being introduced in various industrial sectors including public, IT, and finance, and the manufacturing industry is also adopting the cloud to secure future sustainability and is promoting innovation through smart manufacturing. However, it has been found that there are constraints in the adoption of cloud by manufacturing companies due to concerns about security. Existing studies that have identified cloud security risks have been limited to presenting general cloud security risks or technical security risks rather than focusing on the manufacturing industry. Therefore, this study aimed to identify cloud security risks in the manufacturing industry based on the actual concerns in the field. For this, expert interviews and literature research were conducted to newly identify cloud security risks in the manufacturing industry, and the adequacy and urgency of the selected security risks were verified through surveys. Based on this study, if a cloud security management system for the manufacturing industry is designed in the future, it is expected that the adoption of cloud in the manufacturing industry will be more activated.

  • PDF

Factors Influencing the Adoption of Location-Based Smartphone Applications: An Application of the Privacy Calculus Model (스마트폰 위치기반 어플리케이션의 이용의도에 영향을 미치는 요인: 프라이버시 계산 모형의 적용)

  • Cha, Hoon S.
    • Asia pacific journal of information systems
    • /
    • v.22 no.4
    • /
    • pp.7-29
    • /
    • 2012
  • Smartphone and its applications (i.e. apps) are increasingly penetrating consumer markets. According to a recent report from Korea Communications Commission, nearly 50% of mobile subscribers in South Korea are smartphone users that accounts for over 25 million people. In particular, the importance of smartphone has risen as a geospatially-aware device that provides various location-based services (LBS) equipped with GPS capability. The popular LBS include map and navigation, traffic and transportation updates, shopping and coupon services, and location-sensitive social network services. Overall, the emerging location-based smartphone apps (LBA) offer significant value by providing greater connectivity, personalization, and information and entertainment in a location-specific context. Conversely, the rapid growth of LBA and their benefits have been accompanied by concerns over the collection and dissemination of individual users' personal information through ongoing tracking of their location, identity, preferences, and social behaviors. The majority of LBA users tend to agree and consent to the LBA provider's terms and privacy policy on use of location data to get the immediate services. This tendency further increases the potential risks of unprotected exposure of personal information and serious invasion and breaches of individual privacy. To address the complex issues surrounding LBA particularly from the user's behavioral perspective, this study applied the privacy calculus model (PCM) to explore the factors that influence the adoption of LBA. According to PCM, consumers are engaged in a dynamic adjustment process in which privacy risks are weighted against benefits of information disclosure. Consistent with the principal notion of PCM, we investigated how individual users make a risk-benefit assessment under which personalized service and locatability act as benefit-side factors and information privacy risks act as a risk-side factor accompanying LBA adoption. In addition, we consider the moderating role of trust on the service providers in the prohibiting effects of privacy risks on user intention to adopt LBA. Further we include perceived ease of use and usefulness as additional constructs to examine whether the technology acceptance model (TAM) can be applied in the context of LBA adoption. The research model with ten (10) hypotheses was tested using data gathered from 98 respondents through a quasi-experimental survey method. During the survey, each participant was asked to navigate the website where the experimental simulation of a LBA allows the participant to purchase time-and-location sensitive discounted tickets for nearby stores. Structural equations modeling using partial least square validated the instrument and the proposed model. The results showed that six (6) out of ten (10) hypotheses were supported. On the subject of the core PCM, H2 (locatability ${\rightarrow}$ intention to use LBA) and H3 (privacy risks ${\rightarrow}$ intention to use LBA) were supported, while H1 (personalization ${\rightarrow}$ intention to use LBA) was not supported. Further, we could not any interaction effects (personalization X privacy risks, H4 & locatability X privacy risks, H5) on the intention to use LBA. In terms of privacy risks and trust, as mentioned above we found the significant negative influence from privacy risks on intention to use (H3), but positive influence from trust, which supported H6 (trust ${\rightarrow}$ intention to use LBA). The moderating effect of trust on the negative relationship between privacy risks and intention to use LBA was tested and confirmed by supporting H7 (privacy risks X trust ${\rightarrow}$ intention to use LBA). The two hypotheses regarding to the TAM, including H8 (perceived ease of use ${\rightarrow}$ perceived usefulness) and H9 (perceived ease of use ${\rightarrow}$ intention to use LBA) were supported; however, H10 (perceived effectiveness ${\rightarrow}$ intention to use LBA) was not supported. Results of this study offer the following key findings and implications. First the application of PCM was found to be a good analysis framework in the context of LBA adoption. Many of the hypotheses in the model were confirmed and the high value of $R^2$ (i.,e., 51%) indicated a good fit of the model. In particular, locatability and privacy risks are found to be the appropriate PCM-based antecedent variables. Second, the existence of moderating effect of trust on service provider suggests that the same marginal change in the level of privacy risks may differentially influence the intention to use LBA. That is, while the privacy risks increasingly become important social issues and will negatively influence the intention to use LBA, it is critical for LBA providers to build consumer trust and confidence to successfully mitigate this negative impact. Lastly, we could not find sufficient evidence that the intention to use LBA is influenced by perceived usefulness, which has been very well supported in most previous TAM research. This may suggest that more future research should examine the validity of applying TAM and further extend or modify it in the context of LBA or other similar smartphone apps.

  • PDF

A Case Study of the Risk Identification in Construction Project (건설사업의 리스크 식별에 관한 사례연구)

  • Ahn, Sanghyun
    • Korean Journal of Construction Engineering and Management
    • /
    • v.16 no.1
    • /
    • pp.15-23
    • /
    • 2015
  • In the construction industry, risk management has gained constant attention as the factor not only to evaluate global competitiveness of the country but also to secure competitiveness of public institutions and private companies. For effective construction risk management, the specific work process improvement that can be employed in the field in terms of risk management of the entire corporation such as financial, insurance and safety management is necessary. To manage construction risks, what is important is the step to identifying inherent risks in the construction project. The identification of risks will be followed by the step to seeking ways to establish and manage strategies responding to the risks. This study suggests ways and processes to make a checkslit to identify risks through case studies. To that end, the focus will be placed on working process improvement of risk identification among stages to manage construction risks such as risk identification and analyses, planning to respond to risks, risk monitoring and management. The case study checklists show that setting up the system to classify risks by stage is helpful to figure out causes of risks to reduce or eliminate risk factors. The checklist making process that considers features of the project is expected to contribute to successful completion of the project by enabling effective risk identification and systematic risk management.

Collision Risk Analysis in Busan Harbour

  • Gug, Seung-Gi;Fukuda, Gen;Cho, A-Ra;Park, Hye-Ri
    • Journal of Navigation and Port Research
    • /
    • v.38 no.1
    • /
    • pp.53-57
    • /
    • 2014
  • This thesis, concentrates on marine collision risks of the area divided by cells. Using a gas molecular collision calculation model, a collision risk model is proposed. Collision risk is estimated by relative angle, relative speed, and ship's density in the cell. For one week, Automatic Identification System (AIS) data was collected and analyzed on the Busan North Port area. The results indicate a high-risk area at the sea route connection point in Busan North Port. It also shows that twilight is the time of day when most collisions occur. This means that the area is high risk due to the number of collisions and other dangerous factors related to twilight. Although there is still need to consider other risks such as grounding risks, the results of this study are useful to for plotting a risk map for the port.

Analysis of Train Operation Obstacle Using Number of Failures and Delay Time of Electric Door System (전기식 도어시스템의 고장건수 및 지연시간을 활용한 열차운행장애 분석)

  • Lee, Bon Hyung;Kim, Doo-Hyun;Kim, Sung-Chul
    • Journal of the Korean Society of Safety
    • /
    • v.35 no.1
    • /
    • pp.12-17
    • /
    • 2020
  • This paper analyzes functions of component parts of D-Urban Railway's door system along with operation obstacle risks on frequency(the number of occurrences/year) and severity(delay time/the number of occurrences). Based on this, the paper presents improvements and current system's problems after obstacle risks of EMU and door system are appled. The obstacle of door system causes corrosion of main parts such as DCU due to heat problem of operation environment, problems of maintenance methods and deterioration. DCUs on PCBs with more than 50% pattern corrosion cause problems. Even though the number of door system's obstacle occurrences for the last 5 years is 42, along with 104 minutes of operation obstacle, EMU operation obstacle risk is low(Level 1), which indicates there is limit in matrix of railway risks presented by the standard of railway safety management system. Therefore, it is necessary to have railway risk matrix suitable for the field. Finally, the paper deducts the obstacle risks through frequency and severity. Since 2017 when the risks of EMU and door system's obstacle, that of EMU has been 24(47% reduced) and that of door system has been average 9.5 per year(23% reduced).

Estimation methods and interpretation of competing risk regression models (경쟁 위험 회귀 모형의 이해와 추정 방법)

  • Kim, Mijeong
    • The Korean Journal of Applied Statistics
    • /
    • v.29 no.7
    • /
    • pp.1231-1246
    • /
    • 2016
  • Cause-specific hazard model (Prentice et al., 1978) and subdistribution hazard model (Fine and Gray, 1999) are mostly used for the right censored survival data with competing risks. Some other models for survival data with competing risks have been subsequently introduced; however, those models have not been popularly used because the models cannot provide reliable statistical estimation methods or those are overly difficult to compute. We introduce simple and reliable competing risk regression models which have been recently proposed as well as compare their methodologies. We show how to use SAS and R for the data with competing risks. In addition, we analyze survival data with two competing risks using five different models.

A Case Study of Business Process Centered Risk Analysis for Information Technology Security (업무 프로세스 중심의 정보기술 보안 위험분석 적용 사례-클라이언트/서버 시스템 중심으로)

  • Ahn, Choon-Soo;Cho, Sung-Ku
    • IE interfaces
    • /
    • v.16 no.4
    • /
    • pp.421-431
    • /
    • 2003
  • Due to the increasing complexity of the information systems environment, modern information systems are facing more difficult and various security risks than ever, there by calling for a higher level of security safeguard. In this paper, an information technology security risk management model, which modified by adopting the concept of business processes, is applied to client/server distributed systems. The results demonstrate a high level of risk-detecting performance of the model, by detecting various kinds of security risks. In addition, a practical and efficient security control safeguard to cope with the identified security risks are suggested. Namely, using the proposed model, the risks on the assets in both of the I/O stage(on client side) and the request/processing stage(on server side), which can cause serious problems on business processes, are identified and the levels of the risks are analyzed. The analysis results show that maintenance of management and access control to application systems are critical in the I/O stage, while managerial security activities including training are critical in the request/processing stage.