• 제목/요약/키워드: Violation

검색결과 858건 처리시간 0.023초

An Examination of the Effectiveness of Crisis Response Strategies for Repairing Competence and Integrity Violations

  • Sung, Yen-yi;Lee, Han-joon;Park, Jong-chul
    • Asia Marketing Journal
    • /
    • 제15권1호
    • /
    • pp.129-154
    • /
    • 2013
  • Product-harm crises, which are connected to defective or dangerous products, are perceived as the most common threats to a company. Product harm crises can distort long standing favorable equality perceptions, tarnish a company's reputation, cause major revenue and market-share losses, lead to costly product recalls, and devastate a carefully nurtured brand equity. However, in spite of the devastating impact of product-harm crises, little systematic research exists to asses its marketing consequences. So, the purpose of this study is to investigate how Koreans react to the crisis response in the aftermath of different crises(competence violation vs. integrity violation) and inspire additional research in crisis communication. This study has three main findings which run counter to the assumptions of Kim et al.(2007). Namely, the current study expands on the research of Kim et al. (2004, 2007) by examining how companies repair customers' trust and corporate attitude after crises. Different from previous studies, this study assumes that apology for an integrity-based crisis is the most appropriate way to repair consumer trust and corporate attitude. As for competence-based crisis, similarly, apology for competence-based crisis can be more successful repairing consumer trust and corporate attitude. Concerning silence strategy, remaining silent dose not admit or deny guilt right away, but instead of asking the perceiver to withhold judgment, suggesting that, silence could be expected to be superior to apology but inferior to denial. Finally, apology for competence violation will be expected to bemore effective than apology for integrity violation. Research conceptual model was as follows: According to the results, apology is found to be the most effective strategy to repair corporate attitude no matter the crisis is perceived as a violation of competence or integrity. Second, company may consider keeping silent as a desirable response because they does not admit nor deny responsibility but ask the public to withhold judgment. However, the result of this study shows that, in the overall crisis situations, silence strategy did not differ significantly from the denial strategy, which suggested that the public wants explanation instead of uncertainty. Third, there was the interaction effect between crisis type and crisis response strategies. In this study, apology is more effective for the competence violated situation in terms of regaining consumer trust and repairing their attitude toward company, while the apology's effectiveness is lower for the integrity-violated situation. More specifically, when the crisis is perceived due to company's lack of ability(competence violation), consumer's trust belief and attitude toward the company is more easily to repair when the company issued a sincere apology. Damaged product is perceived less intentional so participants are more likely to give the company second chance when they apology to the public. By contrast, exaggerated advertisement(integrity violation) is perceived intentionally and thus makes participants angrier toward the accused company. Although apology is perceived as the most effective strategy, when issuing apology, it also means the company admitted their intention. Therefore, in this kind of crisis situation, trust repair needs not only a sincere apology but additional efforts.

  • PDF

Based on Proven Practices in Violation of Research Ethics for the KODISA Journals

  • Hwang, Hee-Joong;Youn, Myoung-Kil
    • 산경연구논집
    • /
    • 제7권1호
    • /
    • pp.5-10
    • /
    • 2016
  • Purpose - The purpose of this research is to suggest researchers to know the standards of research ethics violation and eliminate the researchers' anxiety for the possible cases in violation of research ethics through the notification on the web site with online paper submission system for over the last year. We have made an effort and achieved the most exemplary and leading position in the academic journals, however, not satisfied with this, we will endeavor to strengthen it. Research design, data and methodology - Plagiarism and overlapping publications are the most serious problems in research ethics. Therefore, it is necessary to verify the submitted articles making use of paper similarity test programs such as copy killer, KCI test, etc. Editorial board and reviewers should present clear evidences and notify contributors on research ethics violation after close review the contributors' article content. Results - This research focused on the submitted articles which were verified as research ethics violation, and categorized them into 7 cases. Conclusions - With analyzing the verified 7 cases from KODISA journals, this research will examine closely the verification system and regulations in the current academic research ethics. Afterwards, this research will seek for solution to the problems and make an effort to get improvement for them.

Research Ethics of Plagiarism of Adult Learners

  • Hwang, Hee-Joong;Chae, Soo-Joon
    • 동아시아경상학회지
    • /
    • 제5권3호
    • /
    • pp.41-47
    • /
    • 2017
  • Purpose - Adult learners are easily exposed to the risk of plagiarizing others' writings when writing papers or reports. Therefore, this study investigates the research ethics of adult learners and suggests alternatives for research ethics standards in online lifelong education system. The purpose of this study is to investigate the causes of violation of research ethics and preventive measures (education program) for adult learners. Research design, data, methodology - Before establishing a research ethics education plan, it is confirmed through the empirical investigation of adult learners in undergraduate. In this study, 30 questionnaires of 5-point Likert scale were used to examine the level of consciousness of adult learners related to research ethics. Results - First, the experience of participating in ethics education and the presence of prior knowledge did not affect the prevention of research ethics violation. Second, adult learners did not learn about research ethics in the pre- college education environment and they frequently engaged in research ethics violation without guilt or consciousness. Third, the students who experienced the research ethics violation (plagiarism) were more willing to know and use the plagiarism search program. Fourth, Opinions differed according to age as to the need to enforce research ethics compliance. Conclusions - Universities should clearly and easily announce and monitor plagiarism criteria or guidelines. When adult learners are relieved of the anxiety about the possibility of violation of research ethics, a developmental and original research atmosphere will be created.

지상형 탄약고 폭발 시 안전거리 위반율에 따른 위험노출대상의 피해 수준 분석 연구 (Expected Damage Analysis of Risk Exposure Object by Violation Rate of Safety Distance in Explosion of Ground Type Magazine)

  • 함태윤;이재준
    • 한국안전학회지
    • /
    • 제37권4호
    • /
    • pp.92-100
    • /
    • 2022
  • Of the Korean military's 3,959 ammunition depots, 1,007 - more than 25% - violate safety requirements for distance and equipment. There is a risk of explosion in old depots that are vulnerable to various interior and exterior accidents. This paper examines 10 scenarios, with varying values for ammunition amount and safety distance. The study calculated the overpressure that can be applied to risk-exposure objects, based on the safety distance; expected damage was predicted using constructed spatial information from 3D explosion simulations. The simulations confirmed that explosion overpressure increased the most when the safety distance violation rate increased from 80% to 90%. It also confirmed that secondary damage such as fire and explosion can cause casualties and property damage when the violation rate is 60% or higher. The results show that building collapse becomes a risk with a violation rate of 70% or higher. We conclude that taking ammunition depot safety distance violation into account when planning military facilities and their land utilization could better protect life and property.

우수 의약품 제조 기준 위반 패턴 인식을 위한 연관규칙과 텍스트 마이닝 기반 t-SNE분석 (Violation Pattern Analysis for Good Manufacturing Practice for Medicine using t-SNE Based on Association Rule and Text Mining)

  • 이준오;손소영
    • 품질경영학회지
    • /
    • 제50권4호
    • /
    • pp.717-734
    • /
    • 2022
  • Purpose: The purpose of this study is to effectively detect violations that occur simultaneously against Good Manufacturing Practice, which were concealed by drug manufacturers. Methods: In this study, we present an analysis framework for analyzing regulatory violation patterns using Association Rule Mining (ARM), Text Mining, and t-distributed Stochastic Neighbor Embedding (t-SNE) to increase the effectiveness of on-site inspection. Results: A number of simultaneous violation patterns was discovered by applying Association Rule Mining to FDA's inspection data collected from October 2008 to February 2022. Among them there were 'concurrent violation patterns' derived from similar regulatory ranges of two or more regulations. These patterns do not help to predict violations that simultaneously appear but belong to different regulations. Those unnecessary patterns were excluded by applying t-SNE based on text-mining. Conclusion: Our proposed approach enables the recognition of simultaneous violation patterns during the on-site inspection. It is expected to decrease the detection time by increasing the likelihood of finding intentionally concealed violations.

신호위반 단속건수에 영향을 미치는 요인에 관한 연구 - 대구시를 중심으로 - (A Study on the Factors Influencing the Number of Enforcement on Traffic Signal Violation - Focused on Daegu City -)

  • 김기혁;정윤재
    • 대한토목학회논문집
    • /
    • 제30권6D호
    • /
    • pp.553-560
    • /
    • 2010
  • 본 연구는 신호위반 단속건수에 영향을 미치는 요인들에 관하여 자료를 수집하고 분석하여 신호위반 단속건수와의 관계를 규명하고 모형을 개발하여 예측된 모형을 통해 신호위반 단속건수에 영향을 미치는 요인에 대한 규칙을 파악하는 방법으로 교통사고의 위험을 항시 내포하고 있는 교통법규 위반행위가 빈번한 지역에 대한 무인다기능단속시스템의 설치기준을 제시하고자 하는 연구이다.

THE RELATIONSHIP BETWEEN NONCOMMUTATIVE AND LORENTZVIOLATING PARAMETERS IN QUANTUM

  • HEIDARI, A.;GHORBANI, F.;GHORBANI, M.
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • 제16권3호
    • /
    • pp.205-216
    • /
    • 2012
  • When it comes to Lorentz symmetry violation, there are generally two approaches to studying noncommutative field theory: 1) conventional fields are equivalent to noncommutative fields; however, symmetry groups are larger. 2) The symmetry group is the same as conventional standard model's symmetry group; but fields here are written based on the Seiberg-Witten map. Here by adopting the first approach, we aim to connect Lorentz violation coefficients with noncommutative parameters and compare the results with the second approach's results. Through the experimental values obtained for the Lorentz-violating parameters, we obtain a limit of noncommutative symmetry.

정보전대응을 위한 컴퓨터 포렌식스 기반 모의실험1) (A Simulation Model for the Response of Information-Warfare based on Computer Forensics)

  • 최용락;고병수;박명찬
    • 안보군사학연구
    • /
    • 통권1호
    • /
    • pp.391-421
    • /
    • 2003
  • While the social activities using Internet become generalized, the side effect of the information security violation is increasing steadily and threaten the countries which is not ready to prevent from offensive penetration such as the Information-fighter or Cyber-military. In this paper, we define the concept and characteristics of the modern Information-Warfare and analyze various kinds of threatened elements and also examine the recent trend in other countries. And introducing Computer Forensics raised recently for the confrontation against the security violation in the future, we will show the developing strategies and the necessity in order to response cyber attacks. These developing strategies can be used to ensure and re-trace the technical evidence for the security violation and to achieve the disaster relief effectively. So we hope that can apply them to the actual preparation through developing cyber trial test of the defense and attack for the Information-Warfare.

  • PDF

지역별 교통안전도 평가와 중점관리 법규위반사항 적출 (Regional Traffic Safety Evalution and Identifying Driver Violations to Be Controlled by Priority)

  • 김경환
    • 대한교통학회지
    • /
    • 제12권1호
    • /
    • pp.5-24
    • /
    • 1994
  • The purpose of this study is to develop an accident hazard index model in order to be used for the evaluation of regional traffic safety and to develop a driver violation index model in order to identify the primary causes of traffic accidents. The accident hazard index model was developed considering the accident rates based on population and the vehicle registration. The driver violation index model was developed considering the accident rates of each item of driver violation. Using the models developed in this study, it is identified that in the provincial level analysis the degree of the traffic safety of Chungbuk, Chungnam, and Kyungbuk Province are evaluated to be low. In the county level analysis of Kyungnam Province, the degree of the traffic safety of Yangsan, Euirung, Haman, Sachun and Tongyung County are evaluated to be low. Also, it is found that the major driver violations causing accidents in the nation are driving by unlicensed drives, improper passing, and improper railroad crossing : in Kyungnam Province, improper passing is the most driver violation.

  • PDF

Timing violation의 효율적인 수정을 위한 closure 방법의 제안 (A New Closure Method for Efficient Modification of Timing Violation)

  • 서영호;박성호;최현준;김동욱
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2007년도 하계종합학술대회 논문집
    • /
    • pp.317-318
    • /
    • 2007
  • In this paper, we propose an efficient timing closure methodology during physical implementation. Many types of slacks and closure solutions were introduced case-by-case. The major part of violations was managed by specified tools, but the exceptionally generated minor violation which was occurred through correlation error between tools was manually corrected by ASIC engineer. From the proposed method, we identified that the best effective method is to decrease the sum of intrinsic delay in case of setup time violation.

  • PDF