• Title/Summary/Keyword: Threat Perception

Search Result 70, Processing Time 0.028 seconds

Understanding COVID-19 Vaccine Acceptance Intention: An Emotion-focused and Problem-focused Coping Perspective (코로나-19 백신 수용의도에 관한 연구: 정서 중심적 대처와 문제 중심적 대처 관점을 중심으로)

  • Yoo, Joon Woo;Park, Heejun
    • Journal of Korean Society for Quality Management
    • /
    • v.51 no.4
    • /
    • pp.643-662
    • /
    • 2023
  • Purpose: The purpose of this study was to understand an individuals' COVID-19 vaccine acceptance intention during the peak of the pandemic by utilizing the coping theory and technology threat avoidance theory (TTAT) as a framework. Specifically, we focused on understanding how inward and outward emotion-focused coping (EFC), such as psychological distancing and emotional support seeking, affect problem-focused behavior (PFC), which is vaccine acceptance. Furthermore, we investigate how the individuals' cognitive appraisal to- ward COVID-19, consisted of perceived threat and perceived avoidability act as an antecedent of EFC. Methods: A PLS-SEM analysis was conducted to find the causal relation between the variables. An online survey was conducted targeting vaccination recipients on April, 2021. Participants were asked about their perception toward the virus, their coping strategy, and vaccine acceptance intention. A total of 186 valid samples were collected and used for the analysis. Furthermore, to analyze the out-of-sample predictive power of the research model and ensure the generalizability of the results, a PLSpredict analysis was conducted. Results: The results of the PLS-SEM analysis show that perceived threat toward COVID-19 significantly affect an individuals' EFC strategy. Furthermore, both types of inward EFC (psychological distancing, wishful thinking) negatively affected vaccine acceptance intention. On the other hand, emotional support seeking, which is a type of outward EFC, positively affected vaccine acceptance. The result of the PLSpredict analysis confirms the generalizability of the PLS-SEM result. Conclusion: The results of our study could be utilized to decrease vaccine hesitancy and prevent global pandemics by accelerating and increasing vaccination. Our study provides several meaningful implications to researchers and practitioners regarding vaccine acceptance and threat coping behavior.

A Multi-level Perception Security Model Using Virtualization

  • Lou, Rui;Jiang, Liehui;Chang, Rui;Wang, Yisen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5588-5613
    • /
    • 2018
  • Virtualization technology has been widely applied in the area of computer security research that provides a new method for system protection. It has been a hotspot in system security research at present. Virtualization technology brings new risk as well as progress to computer operating system (OS). A multi-level perception security model using virtualization is proposed to deal with the problems of over-simplification of risk models, unreliable assumption of secure virtual machine monitor (VMM) and insufficient integration with virtualization technology in security design. Adopting the enhanced isolation mechanism of address space, the security perception units can be protected from risk environment. Based on parallel perceiving by the secure domain possessing with the same privilege level as VMM, a mechanism is established to ensure the security of VMM. In addition, a special pathway is set up to strengthen the ability of information interaction in the light of making reverse use of the method of covert channel. The evaluation results show that the proposed model is able to obtain the valuable risk information of system while ensuring the integrity of security perception units, and it can effectively identify the abnormal state of target system without significantly increasing the extra overhead.

A study on the Development of Personnel Security Management for Protection against Insider threat (내부 정보보호를 위한 인원보안 관리 방안 연구)

  • Cha, In-Hwan
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.3 no.4
    • /
    • pp.210-220
    • /
    • 2008
  • Insider threat is becoming a very serious issue in most organizations and management is responsible for security implementation. This study is to develop a personnel security management indicators in the areas of Personnel Assurance, Personnel Competence, and Security Environment and protection against insider threats. In this study, the information security management system and related papers are examined by reviewing the existing researches and cases. Proposed indicators are verified by pilot test, empirically analyzed to expose experts' perception and the validity, importance, and risk level of each indicators through a questionnaire. Result were encouraging, but additional study focused on personnel security management using factor analysis is needed in the future.

  • PDF

A Case Study on Aircraft Accidents Due to Air Traffic Controller's Human Error - Applying TEM (Threat & Error Management) Analysis - (항공교통관제사의 휴먼에러에 기인한 국내외 항공기 사고 사례연구 - TEM(Threat & Error Management) 분석법을 적용하여 -)

  • Kim, Jung-Bin;Park, Sung-Sik
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.29 no.4
    • /
    • pp.124-133
    • /
    • 2021
  • The airline industry has been growing steadily since 2016 with more than 100 million air passengers, renewing the largest number of air passengers every year. Increasing air demand leads to an increase in air traffic in limited airspace, increasing the likelihood of accidents between aircraft. Due to the massive human and material damage caused by a single mistake, aviation safety is being heavily focused around the world to efficiently use limited airspace. Studies related to various human factors are underway as most of the aviation accidents are found to be caused by human factors, but research on human factors by controllers is insufficient while they are active in terms of control and operation. Given that 82% of air accidents caused by controllers are caused by human error, the importance of management of human error and changes in perception are urgently needed. This study aims to understand the seriousness of the controller's human error by analyzing the accident cases caused by the controller's human error using TEM to identify threats and errors and derive common human factors.

American Attitudes toward Japan and China, Decades of Polls

  • Laken, Faith;Kim, Jibum;Smith, Tom W.
    • Asian Journal for Public Opinion Research
    • /
    • v.2 no.1
    • /
    • pp.52-70
    • /
    • 2014
  • Gathering polling items about China and Japan from 1937 to 2011, we examine how Americans think about these two powerful East Asian countries. Our study investigates American attitudes from two perspectives. First, we analyze the content of polling items asked in the US about China and Japan to track changes in salient issues over a period of over 60 years. Second, by tracking repeated items, we show how American attitudes toward China and Japan have changed over time, both in long-term general favorability, and shorter-term perception of geopolitical, ideological, and economic threat in response to historical events.

A Validation Study on the Children's Perception of Interparental Conflict Scale (자녀가 지각한 부부갈등척도(CPIC)의 타당화 연구)

  • Kwon, Young Ock;Lee, Chung Duk
    • Korean Journal of Child Studies
    • /
    • v.18 no.1
    • /
    • pp.65-80
    • /
    • 1997
  • The purpose of this study was to validate the Children's Perception of Interparental Conflict Scale(CPIC) with Korean children. The subjects were 323 sixth graders from three elementary schools in Seoul. The CPIC Scale (Grych, Seid. & Fincham, 1992). the Children's Depression Inventory(CDI; Kovacs, 1981) and the Revised Children's Manifest Anxiety Scale( RCMAS: Reynolds & Richmond, 1978) were used as methodological instruments. The methods for data analyses were Pearson's r. factor analysis, and Cronbach's. Eight of the nine initial scales showed acceptable levels of internal consistency. The correlations among the CPIC subscales were assessed and the data were examined with factor analysis. Three factors were extracted and labeled 'Conflict Properties, Self-Blame,' and 'Threat', respectively. The validity of the CPIC subscales was assessed by examining correlations between the CPIC subscales and the CDI and the RCMAS, and the coefficients were significant. The three scales demonstrated good internal consistency (Cronbach's=.86, .81, .79).

  • PDF

Factors Influencing the Preventive Behaviors of COVID-19 by Health Care Workers: A Mixed Methods Study (보건의료인의 코로나19에 대한 예방행위 영향 요인: 혼합연구방법)

  • Lee, Ji Hye; Han, Suk Jung
    • Journal of Korean Public Health Nursing
    • /
    • v.36 no.3
    • /
    • pp.347-360
    • /
    • 2022
  • Purpose: The purpose of this study was to identify the risk perception, safety climate and preventive behaviors of COVID-19 infections, and to verify the factors influencing the adoption of preventive behaviors by health care workers. Methods: A mixed-method approach was used based on a survey carried out in a general hospital. Quantitative data (N=181) were collected through a questionnaire and analyzed using multiple regression. Qualitative data (N=8) were collected through individual interviews and analyzed through Colaizzi's phenomological research method. Results: The factors influencing adoption of preventive behaviors by health care workers were safety climate (β=.41, p<.001), education (β=-.20, p=.025), work unit (β=-.16, p=.032), and risk perception (β=.15, p=.020). The explanatory power was 28.3%, and they have shown that these health care workers felt 'the threat of a pandemic like a battlefield', experienced 'struggle with quarantine rules' and realized 'the reality of infection control and the reorganization for change'. Conclusion: The findings of this study indicate that to increase the adoption of infection control preventive behaviors by health care workers when faced with new infectious diseases in the future, it is necessary to establish organizational support and a safe climate. This study confirms the need for preemptive support and education.

A Study of a Diet Improvement Method for Controlling High Sodium Intake Based on Protective Motivation Theory

  • Hahm, Tae-Shik;Choi, Sung-Hee;Lee, Tae-Yeon
    • Journal of Food Hygiene and Safety
    • /
    • v.33 no.2
    • /
    • pp.89-93
    • /
    • 2018
  • High sodium dietary habits may cause various diseases, thereby threatening the public health. Various efforts have been made to control high sodium use in diets, but few studies have been conducted on health communication efforts to modify such habits. This study looks for suggestions for diet improvement education by examining whether or not high sodium dietary habits can be predicted by a consumer's perception on the threat and controllability of high sodium diets. In this study, a questionnaire was developed to measure the severity, vulnerability, efficiency, efficacy, and behavioral tendencies of the consumer, which were subscales of the protective motivation theory. The questionnaire was given to university students and their families in Chungnam Province. The results of a statistical analysis were as follows: First, more young people preferred high-sodium diets than older people. Second, the correlation analysis showed that older people knew that they were vulnerable to the negative effects of high sodium diets, but they would not change their dietary habits until they were confident that they could control the high-sodium diet. Third, the structural model analysis showed that the higher the coping perception was, the lower was the tendency to consume a high-sodium diet. These results suggest that in the effort to reduce high-sodium diets, it is more effective to provide viable information and improve efficacy.

Investigating Change of Users' Perception of Privacy Pre- and Post-Education on Library User Privacy (도서관이용자프라이버시에 대한 교육전후의 이용자인식변화 분석 연구)

  • Noh, Younghee;Kim, Tae-Kyung;Kim, Dong-Seok
    • Journal of the Korean Society for information Management
    • /
    • v.32 no.1
    • /
    • pp.63-84
    • /
    • 2015
  • Library users must provide their personal information to libraries. This study surveyed these library users' perception of privacy and the effect of the education after providing library user privacy education. As a result, first, it was found that after education, users were more interested in their privacy, rated the problem of library user privacy as more severe, and rated library user data collection as more likely to be considered privacy invasion. Second, we investigated users' perception of how much user service records being collected in libraries violate users' privacy, which showed a great perception change in 25 questions after the education. Third, in the survey about library and librarians' efforts for protecting library user privacy, it was found that all 15 questions were rated as significantly more important after education. Fourth, library users have recognized that is necessary to process and handle the library record and are more sympathetic to the need for this procedure. Fifth, library users felt the possibility of a library record leak was a very serious threat.

Comparison of Users' Perception of Information Security Elements on Computer Virus Between Large and Small-and-Medium Companies (대기업과 중소기업 간의 정보보안 요소에 대한 사용자의 인지 비교: 컴퓨터 바이러스를 중심으로)

  • Kim, Jong-Ki;Jeon, Jin-Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.5
    • /
    • pp.79-92
    • /
    • 2006
  • Computer virus is one of the most common information security problems in the information age. This study investigates the difference of users' perception of security elements between large companies and small-and-medium companies on the subject of computer virus. Based on t-test, no significant difference is found in users' perception on security threat and security risk While users satisfy with the level of security policy, there is a significant difference on the level of security policy recognition between the two sizes of companies. Moreover, there are significant differences on information assets, security vulnerability and security effectiveness, which implies difference in the users' perception on importance of assets, exposure to threats and computer virus prevention efforts between large and small-and-medium companies.