• Title/Summary/Keyword: illegal behavior

Search Result 94, Processing Time 0.027 seconds

A Study on risk factors for senile dementia (노인성치매 발생요인과 돌보는 가족원의 스트레스에 관한 조사 연구)

  • 홍여신;이선자;박현애;조남옥;오진주
    • Journal of Korean Academy of Nursing
    • /
    • v.24 no.3
    • /
    • pp.448-460
    • /
    • 1994
  • This study was conducted to investigate risk factors for senile dementia as well as care givers' stresses and thier needs for nursing care. It was done using a retrospective survey. A convenience sample or In senile dementia patients and l20 nor-mal elders in a rural area was used. The tools used in the study were the MMSE-K(Mini-Mental State Examination-Korea) for dementia screening test and a questionaire developed by the research team. Data were collected through home visits by Com-munity Health Practitioners. Data were analyzed using descriptive statistics, T-test, and Chi-square test. The findings are as follows : 1. There were significant differences in age, marital status, and religions between the two groups. 2. There was a significant difference in smoling behavior between the two groups. 3. There was a significant difference in past his-tory of cancer between groups. 4. There was a significant difference in past and present elderftmily relationship between the two groups. 5. There were significant differences in intellectual activities, assuming major role in family and seeking other's help in daily life troubles between the two groups. 6. There were significant differences in stress factors such as child problem, family conflict, health problem and illegal behavior between the two groups. 7. The major problems out by families in caring for dementia patient were catastrophic reactions, dirtiness, mood change, devouring and tremor. The most serious problems faced by families was dirtiness. with catastrophic reactions, sleep distrubance, changeableness, and a suspcio-usness following. The care givers expressed chronic fatigue, anxiety, tension, depression, disorder in daily life, shamefulness, blame from neighbours and guiltiness. 8. There is need for geriatric hospitals, nursing homes, burden sharing, and counselling or education for family care givers. A replicate study in the urban area is recommended to validate the findings of this study. To explore the impact of stress in life and ‘han’ on senile dementia, a qualitative study is recommended.

  • PDF

A Basic Study on Vehicle Load Analyzing System for Embedded Road (임베디드 도로를 위한 차량하중 분석시스템 기초연구)

  • Jo, Byung-Wan;Yoon, Kwang-Won;Park, Jung-Hoon;Kim, Heoun
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.31 no.1D
    • /
    • pp.127-132
    • /
    • 2011
  • Load managing method on road became necessary since overloaded vehicles occur damage on road facilities and existing systems for preventing this damage still show many problems. Accordingly, efficient managing system for preventing overloaded vehicles could be organized by using the road itself as a scale by applying genetic algorithm to analyze the load and the drive information of vehicles. First of all, accurate analysis of load using the behavior of road itself is needed for solving illegal axle manipulation problems of overloaded vehicles and for installing intelligent embedded load analyzing system. Accordingly in this study, to use the behavior of road, the transformation was measured by installing underground box type indoor model and indoor experiment was held using genetic algorithm and 10% error were checked.

A Real-Time User Authenticating Method Using Behavior Pattern Through Web (웹 사용자의 실시간 사용 패턴 분석을 이용한 정상 사용자 판별 방법)

  • Jang, Jin-gu;Moon, Jong Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1493-1504
    • /
    • 2016
  • As cyber threats have been increased over the Internet, the invasions of personal information are constantly occurring. A malicious user can access the Web site as a normal user using leaked personal information and does illegal activities. This paper proposes an effective method which authenticates a genuine user with real-time. The method use the user's profile which is a record of user's behavior created by Membership Analysis(MA) and Markov Chain Model(MCM). In addition to, user's profile is augmented by a Time Weight(TW) which reflects the user's tendency. This method can detect a malicious user who camouflage normal user. Even if it is a genuine user, it can be determined as an abnomal user if the user acts beyond the record profile. The result of experiment showed a high accuracy, 96%, for the correct user.

Fraud Detection in E-Commerce

  • Alqethami, Sara;Almutanni, Badriah;AlGhamdi, Manal
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.312-318
    • /
    • 2021
  • Lack of knowledge and digital skills is a threat to the information security of the state and society, so the formation and development of organizational culture of information security is extremely important to manage this threat. The purpose of the article is to assess the state of information security of the state and society. The research methodology is based on a quantitative statistical analysis of the information security culture according to the EU-27 2019. The theoretical basis of the study is the theory of defense motivation (PMT), which involves predicting the individual negative consequences of certain events and the desire to minimize them, which determines the motive for protection. The results show the passive behavior of EU citizens in ensuring information security, which is confirmed by the low level of participation in trainings for the development of digital skills and mastery of basic or above basic overall digital skills 56% of the EU population with a deviation of 16%. High risks to information security in the context of damage to information assets, including software and databases, have been identified. Passive behavior of the population also involves the use of standard identification procedures when using the Internet (login, password, SMS). At the same time, 69% of EU citizens are aware of methods of tracking Internet activity and access control capabilities (denial of permission to use personal data, access to geographical location, profile or content on social networking sites or shared online storage, site security checks). Phishing and illegal acquisition of personal data are the biggest threats to EU citizens. It have been identified problems related to information security: restrictions on the purchase of products, Internet banking, provision of personal information, communication, etc. The practical value of this research is the possibility of applying the results in the development of programs of education, training and public awareness of security issues.

Examining Public Responses to Transgressions of CEOs on YouTube: Social and Semantic Network Analysis

  • Jin-A Choi;Sejung Park
    • Journal of Contemporary Eastern Asia
    • /
    • v.23 no.1
    • /
    • pp.18-34
    • /
    • 2024
  • In what was labeled the "nut rage" incident, the vice president of Korean Air, Hyun-Ah Cho (Heather Cho), demonstrated behavior that exemplifies corporate transgression and deviation from societal moral standards toward a flight attendant aboard a flight. Such behavior instigated the public to express negative sentiment on various social media platforms. This study investigates word-of-mouth network on YouTube in response to the crisis, patterns of co-commenting activities across selected YouTube videos, as well as public responses to the incident by employing social and semantic network analysis. A total of 512 YouTube videos featuring the crisis from December 8, 2014 through November 11, 2018, and 52,772 public comments to the videos were collected. The central videos in the network successfully attracted the public's attention and engagements. The results suggest that the video network was decentralized, with multiple videos acting as hubs in the network. The public commented on various videos instead of focusing on a few. The contents of influential videos uploaded by popular news organizations revealed not only Cho's behaviors related to the nut rage crisis but also unrelated illegal behaviors and the moral violations committed by the family members of Korean Air. The public attached derogatory remarks to Cho and her family, and the comments also addressed ethical concerns, management issues of the company, and boycott intentions. The results imply that adverse public reaction was related to the long-standing problem caused by family ownership and governance in large Korean corporations. This Korean Air scandal illustrates backlash toward a leadership breakdown by the family business conglomerate prevalent in the Korean society. This study provides insights for effective handling of similar crises.

A Study on the Factors Affecting the Information Systems Security Effectiveness of Password (패스워드의 정보시스템 보안효과에 영향을 미치는 요인에 관한 연구)

  • Kim, Jong-Ki;Kang, Da-Yeon
    • Asia pacific journal of information systems
    • /
    • v.18 no.4
    • /
    • pp.1-26
    • /
    • 2008
  • Rapid progress of information technology and widespread use of the personal computers have brought various conveniences in our life. But this also provoked a series of problems such as hacking, malicious programs, illegal exposure of personal information etc. Information security threats are becoming more and more serious due to enhanced connectivity of information systems. Nevertheless, users are not much aware of the severity of the problems. Using appropriate password is supposed to bring out security effects such as preventing misuses and banning illegal users. The purpose of this research is to empirically analyze a research model which includes a series of factors influencing the effectiveness of passwords. The research model incorporates the concept of risk based on information systems risk analysis framework as the core element affecting the selection of passwords by users. The perceived risk is a main factor that influences user's attitude on password security, security awareness, and intention of security behavior. To validate the research model this study relied on questionnaire survey targeted on evening class MBA students. The data was analyzed by AMOS 7.0 which is one of popular tools based on covariance-based structural equation modeling. According to the results of this study, while threat is not related to the risk, information assets and vulnerability are related to the user's awareness of risk. The relationships between the risk, users security awareness, password selection and security effectiveness are all significant. Password exposure may lead to intrusion by hackers, data exposure and destruction. The insignificant relationship between security threat and perceived risk can be explained by user's indetermination of risk exposed due to weak passwords. In other words, information systems users do not consider password exposure as a severe security threat as well as indirect loss caused by inappropriate password. Another plausible explanation is that severity of threat perceived by users may be influenced by individual difference of risk propensity. This study confirms that security vulnerability is positively related to security risk which in turn increases risk of information loss. As the security risk increases so does user's security awareness. Security policies also have positive impact on security awareness. Higher security awareness leads to selection of safer passwords. If users are aware of responsibility of security problems and how to respond to password exposure and to solve security problems of computers, users choose better passwords. All these antecedents influence the effectiveness of passwords. Several implications can be derived from this study. First, this study empirically investigated the effect of user's security awareness on security effectiveness from a point of view based on good password selection practice. Second, information security risk analysis framework is used as a core element of the research model in this study. Risk analysis framework has been used very widely in practice, but very few studies incorporated the framework in the research model and empirically investigated. Third, the research model proposed in this study also focuses on impact of security awareness of information systems users on effectiveness of password from cognitive aspect of information systems users.

The Effect of the Punishment for Internet Piracy on Attitude and Intention: Focusing on the Moderating Effect of Piracy Education (인터넷 저작권 침해에 대한 처벌이 태도와 침해 의도에 미치는 영향에 관한 연구: 저작권 교육의 조절변수 효과를 중심으로)

  • Park, Joo-Yeon
    • Journal of Information Management
    • /
    • v.43 no.3
    • /
    • pp.61-78
    • /
    • 2012
  • Internet is widely spreading in everyday life and it makes easy to find and share information on the Internet. Many of Internet users are copying and distributing copyrighted materials freely on the Internet without recognizing that it is unethical and illegal behavior. The rate of Internet piracy is constantly increasing even though the regulation and punishment for piracy behavior are to be strict. However, there is a lack of study about the relationship between the punishment and education for intenet piracy on users' attitude and intention toward piracy on the Internet. The purpose of this study is therefore to find out the effect of the level of punishment for internet piracy on users' attitude and intention. This study also examines the moderating effect of piracy education on the relationship between punishment and piracy intention. The study shows that the punishment is directly associated with the attitude but not associated with the piracy intention. The piracy education has a significant effect on the relationship between punishment and intention. The result of this study could bring up the issue of intellectual property protection on the Intenet and suggest an importance of piracy education to educators, managers and internet users.

An Empirical Study on the Recognized Necessity by Vietnamese Users for the Motorcycle Inspection System (베트남 사용자가 인식하는 이륜차 검사제도 필요성에 관한 실증연구)

  • Lee, Yang-Ho;Ryu, Ki-Hyun;Son, Sung-Ho;Jung, Se-Hee
    • Journal of Auto-vehicle Safety Association
    • /
    • v.10 no.2
    • /
    • pp.43-49
    • /
    • 2018
  • Southeast Asia is a strategic market for both technology and inspection system to enter simultaneously. At the core market is Vietnam which is know to have the fourth highest registration of motorcycles as of 2016. The Motorcycle Inspection System is a social regulation, furthermore, the impact of the system is delivered through indirect means such as minimization of social cost. Therefore, measurements on the perception of users on the needs for an inspection system serves as valuable data to simultaneously enter this markets. This research is an empirical study on the perception of Vietnamese users on the needs to adopt a motorcycle inspection system based on data collected through surveys and is aimed at conducting a preliminary investigation on consumer behavior in Vietnam. The empirical study conducted through surveys revealed that Vietnamese motorcycle users perceive the needs for an inspection system for maintenance, safe operations and selling used vehicles at a reasonable price. In addition, the study also verified that the safe operations factor has a moderating effect due to interaction between prevention of illegal vehicle and reduction of emission gases. This research results present implications in developing equipment adapted to the local area in order to enter into a strategic market. Moreover, it is expected that the findings will also serve as valuable data for bilateral cooperation between the two countries and the diffusion of technology.

The Effect of PC Software Piracy Attitude and Habit on Illegal Use of Smartphone App (PC소프트웨어 불법사용에 대한 태도와 습관이 스마트폰 앱 불법복제에 미치는 영향)

  • Kim, Joong-Han
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.22 no.3
    • /
    • pp.49-61
    • /
    • 2017
  • Due to Proliferation of Mobile Devices, the Global Mobile Application (App) Market is Set to Continue its Impressive Growth Trajectory. However, like other Digital Contents, Prevalent Piracy of Smartphone Apps has Become One of the Major Obstacles to the Growth of the Newborn App Industry. The Objective of this Study is to Examine and Better Understand the Effects of Factors Which has been Known to Influence PC Software Piracy. A Research Model Explaining the Impact of Various Factors to Smartphone App Piracy Attitude and Intention is Constructed Based on Theories of Ethical Behavior. A Survey of College Students was Conducted to Test the Research Model. Findings Show that PC Software Piracy Habit and Attitude have Significant Effects on Smartphone Piracy Attitude and Intention. Beliefs Concerning Judicial and Performance Risks Due to Piracy have Little Effects on Smartphone App Piracy Attitude.

A study on hard-core users and bots detection using classification of game character's growth type in online games (캐릭터 성장 유형 분류를 통한 온라인 게임 하드코어 유저와 게임 봇 탐지 연구)

  • Lee, Jin;Kang, Sung Wook;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1077-1084
    • /
    • 2015
  • Security issues such as an illegal acquisition of personal information and identity theft happen due to using game bots in online games. Game bots collect items and money unfairly, so in-game contents are rapidly depleted, and honest users feel deprived. It causes a downturn in the game market. In this paper, we defined the growth types by analyzing the growth processes of users with actual game data. We proposed the framework that classify hard-core users and game bots in the growth patterns. We applied the framework in the actual data. As a result, we classified five growth types and detected game bots from hard-core users with 93% precision. Earlier studies show that hard-core users are also detected as a bot. We clearly separated game bots and hard-core users before full growth.