• 제목/요약/키워드: general deterrence

검색결과 15건 처리시간 0.019초

건강보험 현지조사제도에서 일반적 억제이론에 대한 경험적 연구 (An Empirical Study on General Deterrence Effects of the On-site Investigation System in the Korean National Health Insurance)

  • 강희정;홍재석;김세라;최지숙
    • 보건행정학회지
    • /
    • 제19권3호
    • /
    • pp.109-124
    • /
    • 2009
  • Background: This study aimed to examine whether cases of punishing false claimants threat general physicians to check their medical cost claims with care to avoid being suspected, and identify empirically general deterrence effects of the on-site investigation system in the Korean National Health Insurance. Methods: 800 clinics were selected among a total of 15,443 clinics that had no experience of on-site investigation until June 2007 using a stratified proportional systematic sampling method. We conducted logistic multiple regression to examine the association between factors related to provider's perception of on-site investigation and high level of perceived deterrence referring to fear of punishment after adjusting provider's service experiences and general characteristics. Results: The probability of high perceived deterrence was higher 1.7 times (CI: 1.13-2.56), 2.73 times (CI: 1.68-4.45) each among clinics exchanging the information once or more per year or once or more for 2-3 months than among clinics no exchanging the information about on-site investigation. Also, the probability of high perceived deterrence was higher 2.27 times (CI: 1.28-4.45) among clinics that knows more than 3 health care institutions having experienced an on-site investigation than among clinics knowing no case. Conclusion: A clinic knowing more punishment cases by onsite investigation and exchanging more frequently information about on-site investigation is likely to present high perceived deterrence. This result will provide important information to enlarge preventive effects of on-site investigation on fraud and abuse claims.

A Coherent Model in Upholding General Deterrence Theory and Impact to Information Security Management

  • Choi, Myeong-Gil;Ramos, Edwin R.;Kim, Man-Sig;Kim, Jin-Soo;Whang, Jae-Hoon;Kim, Ki-Joo
    • Journal of Information Technology Applications and Management
    • /
    • 제16권3호
    • /
    • pp.73-86
    • /
    • 2009
  • To establish an effective security strategy, business enterprises need a security benchmarking tool. The strategy helps to lessen an impact and a damage in any threat. This study analyses many aspects of information security management and suggests a way to deal with security investments by considering important factors that affect security manager's decision. To address the different threats resulting from a major cause of accidents inside an enterprise, we investigate an approach that followed ISO17799. We unfold a criminology theory that has designated many measures against the threat as suggested by General Deterrence Theory. The study proposes a coherent model of the theory to improve the security measures especially in handling and protecting company assets and human lives as well.

  • PDF

정보유출의도에 대한 영향요인: 일반 억제 이론 및 합리적 선택 이론을 기반으로 (Factors Affecting Information Breach Intention: Based on General Deterrence Theory and Rational Choice Theory)

  • 김준영;김태성
    • 정보보호학회논문지
    • /
    • 제27권6호
    • /
    • pp.1507-1517
    • /
    • 2017
  • 일반적으로 정보유출사건은 외부 해커에 의해 발생된다고 생각되지만 내부자에 의한 직간접적인 정보유출사건이 더 많고 전체 유출비중의 과반 수 이상을 차지하기 때문에 내부자 유출에 대한 대비가 필요하다. 본 연구에서는 일반 억제 이론과 합리적 선택 이론을 기반으로 교통심리학 분야에서 연구되었던 행동결정요인인 위험감수성과 상황불안을 통합해 연구모델을 구성하고 설문조사를 통해 실증분석 하였다. 분석 결과, 위험감수성이 지각된 처벌의 심각성 및 확실성에 미치는 영향은 통계적으로 유의미하지 않았으나, 지각된 이익, 상황불안, 지각된 처벌의 심각성 및 확실성은 정보유출의도에 영향을 주는 것으로 확인되었다.

북 핵·미사일 시대의 억제전략 : 도전과 나아갈 방향 (Deterrent Strategy in the era of North Korea's WMD and Missile Threats : Challenges and the Ways to go)

  • 이상엽
    • Strategy21
    • /
    • 통권41호
    • /
    • pp.232-260
    • /
    • 2017
  • The purpose of this paper is to open a debate about what kind of deterrent strategy the ROK military should pursue in the era of NK's weapons of mass destruction and missile threats. I argue that the ROK military needs a comprehensive deterrent strategy that reflects the international security situations and trends and that builds on clear understanding of the basic concepts and how deterrence operates. The paper starts with surveying the basic knowledge of deterrence from the perspectives of both theory and practice. Then, it provides explanations on why deterrence against NK can be particularly difficult given the security environment in and around the Korean peninsula. For example, South Korea and North Korea hardly share 'common knowledge' that serves as a basic element for the operation of deterrence. Deterrence against North Korea involves complex situations in that both deterrence and compellence strategies may be relevant particularly to North Korea's WMD and missile threats. It also involves both immediate and general deterrence. Based on the discussion, I suggest several ideas that may serve as guidelines for establishing a deterrent strategy against NK. First, our threats for deterrence should be the ones that can be realized, particularly in terms of the international norms. In other words, they must be considered appropriate among other nations in the international community. Second, there should be separate plans for the different kinds of threats: one is conventional, local provocations and the other is WMD/missile related provocations. Third, we should pursue much closer cooperative relations with the U.S. military to enhance the effectiveness of immediate deterrence in the Korean peninsula. Fourth, the ROK military should aim to accomplish 'smart deterrence' maximizing the benefits of technological superiority. Fifth, the ROK military readiness and structure should be able to deny emerging North Korean military threats such as the submarine-launched ballistic missiles and intercontinental ballistic missiles. Lastly, in executing threats, we should consider that the current action influences credibility and reputation of the ROK, which in turn affect the decisions for future provocations. North Korea's WMD/missile threats may soon become critical strategic-level threats to South Korea. In retrospect, the first debate on building a missile defense system in South Korea dates back to the 1980s. Mostly the debate has centered on whether or not South Korea's system should be integrated into the U.S. missile defense system. In the meantime, North Korea has become a small nuclear power that can threaten the United States with the ballistic missiles capability. If North Korea completes the SLBM program and loads the missiles on a submarine with improved underwater operation capability, then, South Korea may have to face the reality of power politics demonstrated by Thucydides through the Athenians: "The strong do what they have the power to do, the weak accept what they have to accept."

신뢰성이론을 바탕으로 한 통합 컴퓨터 보안 모형에 관한 연구 (An Integrated Computer Security Model Based on the General Trust Theory)

  • 이상근;유상진
    • Asia pacific journal of information systems
    • /
    • 제12권1호
    • /
    • pp.123-138
    • /
    • 2002
  • For the last two decades, there has been much research on computer abuse from the perspective of the general deterrence theory based on objectism, which covers security policy, security awareness programs, and physical security system. The traditional view offered by the general deterrence theory indicates that security policy, security awareness, and security system play a major role in preventing computer abuse. In spite of continuous organizational efforts and investments based on these systematic factors, the incidence of computer abuse in organizations is still rapidly increasing. This paper proposes another perspective-the social control theory based on subjectism-in preventing computer abuse. According to the social control theory, organizational trust, which comprises organizational attachment, commitment, involvement and norms, can prevent computer abuse by reducing insider's computer abuse. The aim of this article is to assess the role of organizational trust come from attachment, commitment, involvement, norms in preventing computer abuse. The results indicate that both organizational trust and deterrent factors are effective in preventing computer abuse.

정보보안대책과 정보시스템 오남용과의 인과적 관계 (The Causal Relationship between Information Security Countermeasures and Information System Misuse)

  • 이준택;김상훈
    • 한국IT서비스학회지
    • /
    • 제14권4호
    • /
    • pp.81-104
    • /
    • 2015
  • Intentional information systems (IS) misuse is a serious problem in many organizations. This study aims at developing the theoretical framework of deterring IS misuse on the basis of Nagin's General Deterrence Theory (GDT) which is very famous in the area of socio-criminology. Applying GDT to the IS misuse situation could be reasoned that the perceived certainty and the perceived severity of sanctions associated with committing IS misuse have positive impact on deterring the deviant behaviors. Also, these two constructs (certainty of sanctions and severity of sanctions) could be inferred to be influenced by the four types of IS security countermeasures (security policies, security awareness program, monitoring practices and preventive security software) derived through critically reviewing IS security-relevant literature. The proposed research model and ten hypotheses were empirically analysed using structural equation modelling with the data collected by conducting a questionnaire survey of staff members in business organizations in Korea. As a result, it was found that five ones of ten hypotheses were supported. It is thought that this study makes theoretical contribution to expanding research area of IS security and also has strong implications for IS security management practices within organizations.

조직 구성원들의 정보보안 정책 준수행위 의도에 관한 연구 (A Path Way to Increase the Intention to Comply with Information Security Policy of Employees)

  • 임명성
    • 디지털융복합연구
    • /
    • 제10권10호
    • /
    • pp.119-128
    • /
    • 2012
  • 본 연구는 조직원들의 정보보안 정책준수 의도에 영향을 미치는 요인을 규명하고자 시작되었다. 기본 문헌의 경우 특정한 이론을 기반으로 보안정책 준수를 설명하려 하였으나 본 연구의 경우 총체적인 관점에서 접근하였다. 분석결과 적발가능성과 개인의 조직에 대한 애착심이 보안정책 준수의도를 유발할 수 있는 것으로 나타났다. 여기서 적발가능성은 정보보안 인식 교육에 영향을 받는 것으로 나타났다. 그러나 인지된 준수비용의 경우 보안 정책 준수를 방해 할 수 있는 것으로 나타났다.

A study on the Relationship between Cyberloafing Characteristic and Cognitive Dissonance

  • Chang, Hwal-Sik;Jung, Dae-Hyun
    • 한국컴퓨터정보학회논문지
    • /
    • 제20권9호
    • /
    • pp.73-80
    • /
    • 2015
  • Cyberloafing is a term used to describe the actions of employees who use their Internet access at work for personal use while pretending to do legitimate work. This research that this puts the foundation on the general deterrence theory, social control theory, and Triandis model compares the individual characteristic including the group norm, self-control, perceived value among many factors having an effect on the personal ethical decision-making besides the general principles of ethics and stipulated regulation like the severity of sanction together. It was exposed to have the effect that the severity of punishment, self control, and perceived value notes to the internet abuse action. Therefore, the education and rules of punishment which is consistent along with the theoretical thesis supporting the groping of the preparation plan that is active in the various ethic problems has to be built. It is necessary that the company devises the internet application in the appropriate range, that is the partial the affirmation feeling which and it can allow officially. According to the cognitive dissonance, since this will have to allow with the positive direction can move to the misuse action with the intention differently, it can draw a conclusion.

금융회사 정보보안정책의 위반에 영향을 주는 요인 연구 : 지각된 고객정보 민감도에 따른 조절효과 (A Study on the Factors for Violation of Information Security Policy in Financial Companies : Moderating Effects of Perceived Customer Information Sensitivity)

  • 이정하;이상용
    • Journal of Information Technology Applications and Management
    • /
    • 제22권4호
    • /
    • pp.225-251
    • /
    • 2015
  • This paper analyzed factors for employees to violate information security policy in financial companies based on the theory of reasoned action (TRA), general deterrence theory (GDT), and information security awareness and moderating effects of perceived sensitivity of customer information. Using the 376 samples that were collected through both online and offline surveys, statistical tests were performed. We found that the perceived severity of sanction and information security policy support to information policy violation attitude and subjective norm but the perceived certainty of sanction and general information security awareness support to only subjective norm. Also, the moderating effects of perceived sensitivity of customer information against information policy violation attitude and subjective norm were supported. Academic implications of this study are expected to be the basis for future research on information security policy violations of financial companies; Employees' perceived sanctions and information security policy awareness have an impact on the subjective norm significantly. Practical implications are that it can provide a guide to establish information security management strategies for information security compliance; when implementing information security awareness training for employees to deter violations by emphasizing the sensitivity of customer information, a company should make their employees recognize that the customer information is very sensitive data.

공공 연구원 건축물의 대수선에 따른 효과분석 (Effects Analysis of Governmental Research Buildings by the Main Components and Frame Repair Activities)

  • 이강희;채창우
    • 교육시설 논문지
    • /
    • 제26권6호
    • /
    • pp.29-37
    • /
    • 2019
  • The research institute has a function to get the research outcome through the various experiments, data collection and analysis. Therefore, research building is important to keep the research condition or experiment environment. But buildings would be deteriorated and leaded into the deterrence of research. Maintenance is planned to protect the research building condition through various general repair or heavy repair. The heavy repair is generally conducted in massive repair scope or main components preparation. In this paper, it aimed at analyzing the effect of the massive or main components repair with inputted cost and its resulted output. In order to analyze the effect of a massive repair, it used the Benefit/Cost analysis and sensitivity analysis. Results of this study are as follows : The benefit/cost analysis shows that research building whose researcher continuously live and study has good effect. On the contrary, pace of the the experimental function is not good effect in benefit/cost analysis. But the experimental function is indispensible to get the research outcom for the research goal. Therefore, the experimental function will be planned to repair and get the historical repair data because the proper repair time would be prepared to cut down the repair cost.