• Title/Summary/Keyword: Violation

Search Result 858, Processing Time 0.023 seconds

Cases of Ethical Violation in Research Publications: Through Editorial Decision Making Process (편집심사업무 관점에서 학술지 윤리강화를 위한 표절 검증사례)

  • Hwang, Hee-Joong;Lee, Jung-Wan;Kim, Dong-Ho;Shin, Dong-Jin;Kim, Byoung-Goo;Kim, Tae-Joong;Lee, Yong-Ki;Kim, Wan-Ki;Youn, Myoung-Kil
    • Journal of Distribution Science
    • /
    • v.15 no.5
    • /
    • pp.49-52
    • /
    • 2017
  • Purpose - To improve and strengthen existing publication and research ethics, KODISA has identified and presented various cases which have violated publication and research ethics and principles in recent years. The editorial office of KODISA has been providing and continues to provide advice and feedback on publication ethics to researchers during peer review and editorial decision making process. Providing advice and feedback on publication ethics will ensure researchers to have an opportunity to correct their mistakes or make appropriate decisions and avoid any violations in research ethics. The purpose of this paper is to identify different cases of ethical violation in research and inform and educate researchers to avoid any violations in publication and research ethics. Furthermore, this article will demonstrate how KODISA journals identify and penalize ethical violations and strengthens its publication ethics and practices. Research design, data and methodology - This paper examines different types of ethical violation in publication and research ethics. The paper identifies and analyzes all ethical violations in research and combines them into five general categories. Those five general types of ethical violations are thoroughly examined and discussed. Results - Ethical violations of research occur in various forms at regular intervals; in other words, unethical researchers tend to commit different types of ethical violations repeatedly at same time. The five categories of ethical violation in research are as follows: (1) Arbitrary changes or additions in author(s) happen frequently in thesis/dissertation related publications. (2) Self plagiarism, submitting same work or mixture of previous works with or without using proper citations, also occurs frequently, but the most common type of plagiarism is changing the statistical results and using them to present as the results of the empirical analysis; (3) Translation plagiarism, another ethical violation in publication, is difficult to detect but occurs frequently; (4) Fabrication of data or statistical analysis also occurs frequently. KODISA requires authors to submit the results of the empirical analysis of the paper (the output of the statistical program) to prevent this type of ethical violation; (5) Mashup or aggregator plagiarism, submitting a mix of several different works with or without proper citations without alterations, is very difficult to detect, and KODISA journals consider this type of plagiarism as the worst ethical violation. Conclusions - There are some individual cases of ethical violation in research and publication that could not be included in the five categories presented throughout the paper. KODISA and its editorial office should continue to develop, revise, and strengthen their publication ethics, to learn and share different ways to detect any ethical violations in research and publication, to train and educate its editorial members and researchers, and to analyze and share different cases of ethical violations with the scholarly community.

Prediction Algorithm of Threshold Violation in Line Utilization using ARIMA model (ARIMA 모델을 이용한 설로 이용률의 임계값 위반 예측 기법)

  • 조강흥;조강홍;안성진;안성진;정진욱
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.8A
    • /
    • pp.1153-1159
    • /
    • 2000
  • This paper applies a seasonal ARIMA model to the timely forecasting in a line utilization and its confidence interval on the base of the past data of the lido utilization that QoS of the network is greatly influenced by and proposes the prediction algorithm of threshold violation in line utilization using the seasonal ARIMA model. We can predict the time of threshold violation in line utilization and provide the confidence based on probability. Also, we have evaluated the validity of the proposed model and estimated the value of a proper threshold and a detection probability, it thus appears that we have maximized the performance of this algorithm.

  • PDF

A Study on Establishment of Discrimination Model of Big Traffic Accident (대형교통사고 판별모델 구축에 관한 연구)

  • 고상선;이원규;배기목;노유진
    • Journal of Korean Port Research
    • /
    • v.13 no.1
    • /
    • pp.101-112
    • /
    • 1999
  • Traffic accidents increase with the increase of the vehicles in operation on the street. Especially big traffic accidents composed of over 3 killed or 20 injured accidents with the property damage become one of the serious problems to be solved in most of the cities. The purpose of this study is to build the discrimination model on big traffic accidents using the Quantification II theory for establishing the countermeasures to reduce the big traffic accidents. The results are summarized as follows. 1)The existing traffic accident related model could not explain the phenomena of the current traffic accident appropriately. 2) Based on the big traffic accident types vehicle-vehicle, vehicle-alone, vehicle-pedestrian and vehicle-train accident rates 73%, 20.5% 5.6% and two cases respectively. Based on the law violation types safety driving non-fulfillment center line invasion excess speed and signal disobedience were 48.8%, 38.1% 2.8% and 2.8% respectively. 3) Based on the law violation types major factors in big traffic accidents were road and environment, human, and vehicle in order. Those factors were vehicle, road and environment, and human in order based on types of injured driver’s death. 4) Based on the law violation types total hitting and correlation rates of the model were 53.57% and 0.97853. Based on the types of injured driver’s death total hitting and correlation rates of the model were also 71.4% and 0.59583.

  • PDF

Understanding an Employee Information Systems Security Violations (조직 구성원들의 정보보안 정책 위반에 영향을 미치는 요인)

  • Yim, Myung-Seong
    • Journal of Digital Convergence
    • /
    • v.11 no.2
    • /
    • pp.19-32
    • /
    • 2013
  • The purpose of this paper is to find an answer why employees in organization violate the organizational information security policy. To do this, this study is rooted in the moral disengagment theory. This study found that moral belief and perceived sanction have an effect on security policy violation. However, if moral disengagement is involved in the research model, perceived sanction is not significant. Finally, SETA, moral belief, and perceived sanction have a negative effect on moral disengagement, which in turn moral disengagement influences positively the security policy violation. The conclusions and implications are discussed.

A study on the Effects of Abusive Supervision on Subordinates' Turnover Intention and Organizational Commitment : Focusing on the Moderating Effect of Psychological Contract Violation and Self-control (상사의 비인격적 행위가 부하의 이직의도와 조직몰입에 미치는 영향에 관한 연구 -심리적 계약위반과 자기통제력의 조절효과를 중심으로-)

  • Park, Seong-Jin;Kim, Oh-Hyeon
    • Journal of the military operations research society of Korea
    • /
    • v.36 no.3
    • /
    • pp.113-134
    • /
    • 2010
  • The purpose of this study is to investigate the moderating effects of psychological contract violation and self-control on the relationship between abusive supervision and subordinates' work-related attitudes. Results show that abusive supervision was positively related to subordinates' turnover intention, whereas it was negatively related to their organizational commitment. Futhermore, it is surprising that the moderating effects of psychological contract violation and self-control showed an unexpected pattern. Implication of these results as well as strengths, limitations, and avenues for future research are discussed.

Smart Phone Copyright Violation and Forensic Apply Method (Smart Phone 저작권 위반과 포렌식 적용 방안)

  • Yi, Jeong-Hoon;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.215-218
    • /
    • 2010
  • Smart Phone with domestic demand increasing rapidly, the utilization of multimedia services have become diverse. Accordingly, Smart Phone users to hack their Jail Breaking and Rooting and illegal use of the multimedia content is copyrighted. Also relevant to mobile communication terminal as a high crime, create, and the digital evidence increases the utilization of the mobile forensic evidence is required to study. In this paper, Smart Phone Copyright Violation and Forensic Apply Method research. Smart Phone Status and related violations of copyright infringement, broadcasting, film, music, e-book, etc. for each survey item, and how to apply for forensics were studied. This study investigated the development and forensic science will be able to contribute to the development.

  • PDF

Empirical Validation of Personal Information Violation Risks with Use Intention : Focusing on Domestic Smart Banking Services (개인정보 침해위험이 이용의도에 미치는 영향에 대한 연구 - 국내은행의 스마트뱅킹 서비스 중심으로)

  • Kim, Jeongwook;Jeon, Youngchan
    • Journal of Korean Society for Quality Management
    • /
    • v.45 no.3
    • /
    • pp.583-594
    • /
    • 2017
  • Purpose: The purpose of this study is how personal information protection risks affect the intention to use domestic smart banking services. VAM(Value based Adoption Model) model is validated as a theoretical background, selecting ease of use, usefulness and perceived security as a benefit factor, and considers perceived cost, technical complexity, and risk of personal information leakage as a sacrifice factor. Methods: The method of this study used questionnaire survey to collect 365 data on suer's perception on smart banking services, and also performed a structural equation modeling method using by AMOS 23. Results: The result of this paper shows that all hypothesis are accepted statistically significant except 1 hypothesis. Conclusion: This research is concluded that perceived value is affected on statistically positive impact on ease of use, usefulness and perceived security, and negative impact on perceived cost and risk of personal information violation, not statistically technical complexity.

Secure and Privacy Preserving Protocol for Traffic Violation Reporting in Vehicular Cloud Environment

  • Nkenyereye, Lewis;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.7
    • /
    • pp.1159-1165
    • /
    • 2016
  • Traffic violations such as moving while the traffic lights are red have come from a simple omission to a premeditated act. The traffic control center cannot timely monitor all the cameras installed on the roads to trace and pursue those traffic violators. Modern vehicles are equipped and controlled by several sensors in order to support monitoring and reporting those kind of behaviors which some time end up in severe causalities. However, such applications within the vehicle environment need to provide security guaranties. In this paper, we address the limitation of previous work and present a secure and privacy preserving protocol for traffic violation reporting system in vehicular cloud environment which enables the vehicles to report the traffic violators, thus the roadside clouds collect those information which can be used as evidence to pursue the traffic violators. Particularly, we provide the unlinkability security property within the proposed protocol which also offers lightweight computational overhead compared to previous protocol. We consider the concept of conditional privacy preserving authentication without pairing operations to provide security and privacy for the reporting vehicles.

Efficient Counterexample Generation for Safety Violation in Model Checking (모델 체킹에서 안전성 위반에 대한 효율적인 반례 생성)

  • Lee Tae-hoon;Kwon Gi-hwon
    • The KIPS Transactions:PartD
    • /
    • v.12D no.1 s.97
    • /
    • pp.81-90
    • /
    • 2005
  • Given a model and a property, model checking determines whether the model satisfies the property. In case the model does not satisfy the property model checking gives a counterexample which explains where the violation occurs. Since counterexamples are useful for model debugging as well as model understanding, counterexample generation is one of the indispensable components in the model checking tool. This paper presents efficient counterexample generation techniques when a safety property is falsified. These techniques are used to solve Push Push games which consist of 50 games. As a result, all the games are solved with the proposed techniques. However, with the original NuSMV, 42 games are solved but 8 failed. In addition, we obtain $86{\%}$ time improvement and $62{\%}$ space improvement compared to the original NuSMV in solving the game.

Spatial Analysis of BOD Data in Namgang-Dam Watershed for TMDLs (오염총량관리를 위한 남강댐유역 BOD 자료의 공간특성 분석)

  • Kim, Sang-Min;Kim, Sung-Min;Park, Tae-Yang
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.52 no.3
    • /
    • pp.81-88
    • /
    • 2010
  • The purpose of this study is to analyze the spatial characteristics of Namgang-Dam watershed for a Total Maximum Daily Loads (TMDL). Three TMDL target sites, Gyeonghogang1, 2, Namgang-Dam2, are located within Namgang-Dam watershed. Under the current criterion for TMDLs, 3-year arithmetic mean BOD concentration of the target sites should not exceed the target concentration for 2 consecutive years. Two and three times of violation were observed for Gyenghogang2 and Namgang-Dam2 sites while no violation was found for Gyeonghogang1 site. However, no violation was found since 1999 for all three sites. Correlation between each 12 stations within the watershed were analyzed and cluster analysis was conducted to figure out the spatial characteristics of the watershed. Correlation coefficient between Gyonghogang1 and 2 was high (0.758) while the coefficients between lake station (Namgang-Dam2) and stream stations (Gyonghogang1 and 2) were very low. Dendrogram indicated that all of three Namgang-Dam stations were very close and Gyenghogang1, 2 stations were also close.