• Title/Summary/Keyword: Security Behavior

Search Result 899, Processing Time 0.027 seconds

The Relationship between Work Values and Entrepreneurial Attitudes: Implications for the Distribution Industry

  • Wang, Haikun;Moon, Jaeseung
    • Journal of Distribution Science
    • /
    • v.17 no.3
    • /
    • pp.57-67
    • /
    • 2019
  • Purpose - This study aims to examine the impact of work values on entrepreneurial attitudes, and test the moderating effect of entrepreneurial opportunity identification on the above mentioned relationship as well. Research design, data, and methodology - A questionnaire survey was conducted to 258 employees who comes from 8 different types of the enterprises in northwestern of China, and the corresponding research model was verified. Results - The results show that "comfort and security" (one dimension of work values) has a significant negative impact on entrepreneurial attitudes. Another two dimensions of work values, such as "competence and growth" and "status and independence" have a significant positive impact on entrepreneurial attitudes. In addition, entrepreneurial opportunity identification has a significant moderating effect on the relations between work values and entrepreneurial attitudes. Specifically, only the entrepreneurship opportunity identification positively moderates the relationship between status & independence and entrepreneurial attitudes. Conclusions - This research further enriches the relevant theories of organizational behavior and entrepreneurships. This study also has guiding significance and value for management practice, especially for this research results implies, that is, individual's ability to entrepreneurial opportunity identification (e.g., identify feasible distribution channel for potential new venture) is important in entrepreneurship.

Application of steel equivalent constitutive model for predicting seismic behavior of steel frame

  • Wang, Meng;Shi, Yongjiu;Wang, Yuanqing
    • Steel and Composite Structures
    • /
    • v.19 no.5
    • /
    • pp.1055-1075
    • /
    • 2015
  • In order to investigate the accuracy and applicability of steel equivalent constitutive model, the calculated results were compared with typical tests of steel frames under static and dynamic loading patterns firstly. Secondly, four widely used models for time history analysis of steel frames were compared to discuss the applicability and efficiency of different methods, including shell element model, multi-scale model, equivalent constitutive model (ECM) and traditional beam element model (especially bilinear model). Four-story steel frame models of above-mentioned finite element methods were established. The structural deformation, failure modes and the computational efficiency of different models were compared. Finally, the equivalent constitutive model was applied in seismic incremental dynamic analysis of a ten-floor steel frame and compared with the cyclic hardening model without considering damage and degradation. Meanwhile, the effects of damage and degradation on the seismic performance of steel frame were discussed in depth. The analysis results showed that: damages would lead to larger deformations. Therefore, when the calculated results of steel structures subjected to rare earthquake without considering damage were close to the collapse limit, the actual story drift of structure might already exceed the limit, leading to a certain security risk. ECM could simulate the damage and degradation behaviors of steel structures more accurately, and improve the calculation accuracy of traditional beam element model with acceptable computational efficiency.

Privacy and Security on the Web (웹에서의 개인정보보호 방안)

  • Woo, Sung-hee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.657-660
    • /
    • 2013
  • The Internet is referred as sea of information, which provides huge information, but personal information is collected for malicious behavior and provided to various web sites via internet. This can lead to economic losses as well as the disclosure of personal information. We can easily get personal information from device, such as mobile and private terminal, as well as internet, and then it can be spread very quickly. The personal information leakage and damage cases are also increasing, while the importance of personal information on the web page to distinguish the individual as the basic information is growing. In this paper we review and analyse recent invasion of privacy practices on the web and its causes, and technical and administrative protections.

  • PDF

Does Earnings Quality Affect Companies' Performance? New Evidence from the Jordanian Market

  • SALEH, Isam;ABU AFIFA, Malik;ALSUFY, Fares
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.11
    • /
    • pp.33-43
    • /
    • 2020
  • This study aims to investigate the importance of earnings quality as a determinant of companies' performance. It provides some empirical evidences from an emerging market, specifically from the Jordanian market. This study developed an econometric model for the effect of earnings quality on the companies' performance using empirical evidence. The study employs a panel data analysis method by using a sample of all Jordanian industrial public shareholding companies listed on Amman Stock Exchange (ASE) during 2010-2018. The results reveal that Return on Assets (ROA), Return on Equity (ROE), and Earnings Per Share (EPS) as proxies of company's performance are affected by the earnings quality. This provides the importance of positive earnings quality that eventually influences the companies' performance. The results of this study suggest that the higher control level on the managers' behavior and its outcome will have an effect on earnings quality, and thus the company's performance increases. As well as, high relevance of accounting information will improve earnings quality, and thus earnings quality with the interaction factors of the company's environment work on improving performance. As a conclusion, this study can work as a reference to assist standard setters, security analysts, regulators and other accounting-information users in appraising relation between the earnings quality and companies' performance.

Fire Endurance Estimate of Reinforced Concrete Structure Using Nonlinear Finite Element Method (비선형 유한요소해석을 이용한 철근콘크리트 구조물의 내화성능평가)

  • Byun, Sun-Joo;Im, Jung-Soon;Hwang, Jee-Wook
    • Journal of the Korean Society of Hazard Mitigation
    • /
    • v.6 no.1 s.20
    • /
    • pp.17-27
    • /
    • 2006
  • To estimate the retained strength of reinforced concrete structure after fire is very difficult because the complex behavior of structure is hard to understand during course of a fire. However, the damages which is caused by fire of the traffic facility infrastructure are enormous. Therefore the security against fire is important element that must not be overlooked. For this reason, an exact estimate method of the fire endurance is highly demanded. In this study, the validity of the nonlinear finite element method approach for the fire endurance of reinforced concrete structure is verified. The results of fire endurance estimate of underground road way by nonlinear finite element method approach are compared with those by ACI 216R-89.

A Study on the e-CRM, Customer Satisfaction, Repurchase Intention and Word of Mouth Intention in the Internet Shopping Mall (e-CRM 구성요인이 e-쇼핑몰 고객만족과 웹사이트 재방문 및 e-구전에 미치는 영향에 관한 연구)

  • Yoon, Jong-Hoon;Chung, Ji-Bok;Kim, Yong-Min
    • The Journal of Information Systems
    • /
    • v.17 no.1
    • /
    • pp.63-82
    • /
    • 2008
  • Recently the development of information technology and the emergence of electronic commerce have brought significant changes of purchase behavior in customers. The purpose of this research is to investigate the important elements of e-CRM which influence the customers satisfaction in the shopping mall. Also this study is to investigate the relationship between customer satisfaction and repurchase intention and word of mouth intention. What we have found are as follows. (1) e-CRM elements greatly influencing on customer satisfaction in the shopping mall were e-Marketing, s-Sales, e-Service, and e-Security. (2) results of the relationship between customer satisfaction and repurchase intention was significant. (3) results of the relationship between customer satisfaction and word of mouth intention was significant. (4) results of the relationship between repurchase intention and word of mouth intention was significant. In conclusion, the results of this study will be helpful for the managers participating the operation of internet shopping mall.

Analysis of Propensity for Conflict Resolution According to the Types of SNS Users, Usages and Conflicts (SNS 사용자 유형 및 이용방식과 갈등유형에 따른 갈등해결 성향 분석)

  • Lee, Eun Ju;Park, Dae-Ha
    • Journal of Service Research and Studies
    • /
    • v.5 no.2
    • /
    • pp.149-159
    • /
    • 2015
  • This paper proposes a making study model using Ajzen's Theory of planned behavior (TPB) and established hypothesis and then analysed propensity of conflict resolution according to the types of SNS users, usages and conflicts. The results of study, active users of SNS have propensity of resolution for their own conflicts through SNS. The users having conflicts between person and person are same with active users. The results of this study could be referenced to other researches for resolving conflicts in or between people in the future.

Unethical Network Attack Detection and Prevention using Fuzzy based Decision System in Mobile Ad-hoc Networks

  • Thanuja, R.;Umamakeswari, A.
    • Journal of Electrical Engineering and Technology
    • /
    • v.13 no.5
    • /
    • pp.2086-2098
    • /
    • 2018
  • Security plays a vital role and is the key challenge in Mobile Ad-hoc Networks (MANET). Infrastructure-less nature of MANET makes it arduous to envisage the genre of topology. Due to its inexhaustible access, information disseminated by roaming nodes to other nodes is susceptible to many hazardous attacks. Intrusion Detection and Prevention System (IDPS) is undoubtedly a defense structure to address threats in MANET. Many IDPS methods have been developed to ascertain the exceptional behavior in these networks. Key issue in such IDPS is lack of fast self-organized learning engine that facilitates comprehensive situation awareness for optimum decision making. Proposed "Intelligent Behavioral Hybridized Intrusion Detection and Prevention System (IBH_IDPS)" is built with computational intelligence to detect complex multistage attacks making the system robust and reliable. The System comprises of an Intelligent Client Agent and a Smart Server empowered with fuzzy inference rule-based service engine to ensure confidentiality and integrity of network. Distributed Intelligent Client Agents incorporated with centralized Smart Server makes it capable of analyzing and categorizing unethical incidents appropriately through unsupervised learning mechanism. Experimental analysis proves the proposed model is highly attack resistant, reliable and secure on devices and shows promising gains with assured delivery ratio, low end-to-end delay compared to existing approach.

A study of the Telecommunication Technique Policy in ]Korea : in case social changes (한국의 정보통신 기술정책에 관한 연구( I ) -사회적 변화를 중심으로 -)

  • 박민수
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.2 no.2
    • /
    • pp.215-222
    • /
    • 1998
  • This study is focused on the developing of the telecommunication technique for the analysis on the social changes. We predict, the role increase greatly important foundational society structure of coming twenty-one century. In the scope and method of this study there must invalve following five items: constructed global society, developing economic, limit resources, change personal behavior, security of living, This problem to find a solution to the change of telecommunication technique policy in Korea.

  • PDF

Perception of Public Safety of Night Users in Neighborhood Parks (도시공원 야간이용의 공공안전성 제고를 위한 요인 정합성 평가)

  • Rho, Jae-Hyun;Huh, Joon;Ahn, Deug-Soo
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.23 no.2
    • /
    • pp.213-222
    • /
    • 1995
  • To increase the night use level, this study was analyzed perception of users about the public safety, and extracted main variables which were influencing public safety. The public safety was evaluated by the actual (on site) and nonactual users (off site) and the Delphi method. The night users of female and the elders were relatively more than male and the young respectively as compared with day. Walking was predominant in approaching means. In public safety ratings, $\boxDr$vuknerability to violence$\boxUl$varied accoding to sex, income, education, marriage, job, age. $\boxDr$crowding, $\boxDr$noise$\boxUl$ were important variables in satisfying users at night. $\boxDr$Lack of surveillance, $\boxDr$harassment of other person$\boxUl$, $\boxDr$rowdy behavior in poorer visibility$\boxUl$, $\boxDr$fear in lower intensity of light$\boxUl$ and $\boxDr$vulnerability to violence$\boxUl$stood high , so it is required guarantee of security guard to enhance the park use at night Although the ratings between field and indoor evaluation were somewhat different the variables had so similiar rant.

  • PDF