• Title/Summary/Keyword: misbehavior

Search Result 43, Processing Time 0.027 seconds

Negative Spillover Effects of Other-Customer Failure in Airline Context

  • Kim, Mi-Jeong;Park, Chul-Ju;Park, Jae-Sung
    • Journal of Distribution Science
    • /
    • v.15 no.1
    • /
    • pp.15-20
    • /
    • 2017
  • Purpose - Other customers within the same service environment do influence a customer' attitude and behavior toward a service firm. Specially, other customers' misbehaviour and various service problems stemmed from them could make the other customers suffer some bad experiences. However, there are few studies to answer how the spillover effect of a service failure arisen from other customers' misbehavior. This study is aimed to examine how service failure due to the dysfunctional behavior of other customers has negative effects on customer evaluation with the service provider. Research design, data, and methodology - Data were collected from a survey based on consumers' retrospective experiences in airline service context. The hypothesized relationships were tested conducting structural equation modeling. Results - Our results show that the attribution of a firm responsibility for other-customer failure has a positive influence on customer's recovery expectation, in turn, it is negatively related to customer satisfaction. Furthermore, perceived service provider's efforts positively influence customer satisfaction. Conclusions - Although a service failure was caused by other customer's misbehavior, employees should be able to alleviate any bad feelings of the affected customers. Furthermore, service providers should provide proper recovery efforts for solving problems caused by the other customers for the wounded customers.

Mother's Attributions and Control Behavior for Child's Misbehavior of Moral Norm and Prosocial Behavior (아동의 도덕규범과 친사회적 문제행동 상황에서 어머니의 아동역량 판단, 귀인 및 통제)

  • 신양재;유안진
    • Journal of the Korean Home Economics Association
    • /
    • v.38 no.6
    • /
    • pp.101-116
    • /
    • 2000
  • This study integrated mother's control behavior of child's misbehavior within social domain analysis and the framework of attributional models of social cognition. The purpose of this study was to identify, compare and contrast maternal attributions and control responses according to child's age and domains of social behavior, and to investigate that mother's social cognition factors(authoritarian attitude and self competence perception) influence material inference and responses for their child's acts. Then this study was to find out whether mother's attribution would mediate their socialization techniques. For empirical research, 654 mothers with 5.6 year old and 8.9 year old children as subjects answered the structured questionnaire. The data were analyzed by frequencies, t-test, oneway ANOVA, and multiple regression. The major findings were as follows: First, according to child's two domains of misbehavior, there were differences in mothers'attribution and control behavior. Also mothers regarded older child's behavior as more dispositional cause and as more deserving of punishment than younger child's. Second, mother's authoritarian altitude of parenting, self-competence perception, and educational level were significantly related to mother's judgment. Third, the more authoritarian attitude mothers had, the more dispositional factor of children they attributed. And the lower self-competence mothers perceived. the more internal factor of child they attributed. Finally, maternal attributions and control responses are interrelated. When they attributed their children's misdeeds to internal dispositions, they respond with more stronger control behavior. The results suggested maternal social cognition mediate socialization behavior.

  • PDF

Design and evaluation of a VPRS-based misbehavior detection scheme for VANETs (차량애드혹망을 위한 가변정밀도 러프집합 기반 부정행위 탐지 방법의 설계 및 평가)

  • Kim, Chil-Hwa;Bae, Ihn-Han
    • Journal of the Korean Data and Information Science Society
    • /
    • v.22 no.6
    • /
    • pp.1153-1166
    • /
    • 2011
  • Detecting misbehavior in vehicular ad-hoc networks is very important problem with wide range of implications including safety related and congestion avoidance applications. Most misbehavior detection schemes are concerned with detection of malicious nodes. In most situations, vehicles would send wrong information because of selfish reasons of their owners. Because of rational behavior, it is more important to detect false information than to identify misbehaving nodes. In this paper, we propose the variable precision rough sets based misbehavior detection scheme which detects false alert message and misbehaving nodes by observing their action after sending out the alert messages. In the proposed scheme, the alert information system, alert profile is constructed from valid actions of moving nodes in vehicular ad-hoc networks. Once a moving vehicle receives an alert message from another vehicle, it finds out the alert type from the alert message. When the vehicle later receives a beacon from alert raised vehicle after an elapse of time, then it computes the relative classification error by using variable precision rough sets from the alert information system. If the relative classification error is lager than the maximum allowable relative classification error of the alert type, the vehicle decides the message as false alert message. Th performance of the proposed scheme is evaluated as two metrics: correct ratio and incorrect ratio through a simulation.

Behavior based Routing Misbehavior Detection in Wireless Sensor Networks

  • Terence, Sebastian;Purushothaman, Geethanjali
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.11
    • /
    • pp.5354-5369
    • /
    • 2019
  • Sensor networks are deployed in unheeded environment to monitor the situation. In view of the unheeded environment and by the nature of their communication channel sensor nodes are vulnerable to various attacks most commonly malicious packet dropping attacks namely blackhole, grayhole attack and sinkhole attack. In each of these attacks, the attackers capture the sensor nodes to inject fake details, to deceive other sensor nodes and to interrupt the network traffic by packet dropping. In all such attacks, the compromised node advertises itself with fake routing facts to draw its neighbor traffic and to plunge the data packets. False routing advertisement play vital role in deceiving genuine node in network. In this paper, behavior based routing misbehavior detection (BRMD) is designed in wireless sensor networks to detect false advertiser node in the network. Herein the sensor nodes are monitored by its neighbor. The node which attracts more neighbor traffic by fake routing advertisement and involves the malicious activities such as packet dropping, selective packet dropping and tampering data are detected by its various behaviors and isolated from the network. To estimate the effectiveness of the proposed technique, Network Simulator 2.34 is used. In addition packet delivery ratio, throughput and end-to-end delay of BRMD are compared with other existing routing protocols and as a consequence it is shown that BRMD performs better. The outcome also demonstrates that BRMD yields lesser false positive (less than 6%) and false negative (less than 4%) encountered in various attack detection.

Determinants of Revisit Intention Among Indonesian Beauty Clinic Customers in Distribution Beauty Clinic Market: The Mediating Role of Trust

  • Anas HIDAYAT;Binarinta Tirto ANDIKA;Sri Rejeki EKASASI
    • Journal of Distribution Science
    • /
    • v.22 no.2
    • /
    • pp.31-40
    • /
    • 2024
  • Purpose: This study aimsto assert trust as an important mediator in the service business. The research topic relatesto service businesses that have low exposure to comparative information and weak consumer positions in terms of law, such as the beauty clinic businesses in Indonesia. Research design, data, and methodology: This study uses explanatory and purposive sampling. A survey was conducted among 268 Indonesians, collected by distribution via Google Forms. The hypotheses were tested using AMOS software. Results: The results indicate that trust did not have a significant role in mediating brand awareness, service quality, and price perception on revisit intention, but only mediated satisfaction. Furthermore, this study discloses the neutralization attitude and dissonance behavior represented by trust mediation. Conclusions: These findings attempt to expand the literature on the role of trust in the service business. However, the beauty clinic businessin Indonesia infers misbehavior. Misbehavior is caused by vulnerable conditionsin which consumers are unable to share their experiences with other consumers. The reason is that the defamation law in Indonesia is often implemented in the wrong direction. This must be corrected so that consumers obtain their rights and create a mutually beneficial relationship between beauty businesses and consumers.

A Case of Fence Entrapment Associated with Anti-Welfare in a Thoroughbred Colt with Misbehavior at a Paddock (행동장애를 가진 Thoroughbred 수망아지에서 반동물복지와 연관된 펜스함정 1례)

  • Yang, Jae-Hyuk;Park, Yong-Soo
    • Journal of Practical Agriculture & Fisheries Research
    • /
    • v.18 no.1
    • /
    • pp.25-28
    • /
    • 2016
  • The welfare of horses depends on satisfying both the physiological and psychological needs of the animal. The object of this study was to evaluate fence safety at the horse farm. A Thoroughbred colt with cribbing was found dead in a paddock. The fence of paddock is a four-pipe fencing. He cribbed the 2nd pipe from the top. But he couldn't pull his face because his incisors acted as hooks and two ramuses of the mandible was entrapped in a top pipe. So he was embarrassed and went down while he terribly struggled to get out his face. Finally, he was strangulated to death. Safe fencing is essential on a horse farm. The function of these fences are to protect the horses but it was more of a hazard. In order to safe management of horses, facial length of the horse and the pipe interval of the fence should be considered. Further research is needed to put a muzzle on the horses while they are at a paddock. This study provides important benchmarks for the equine industry to consider fence type and evaluate fence safety.

Effects of North Korea Defectors' Living Experiences in South Korea on Their Self-perceptions and Perceptions of South Korea (남한사회에서의 생활경험이 탈북자에게 미치는 영향: 남한과 자신에 대한 인식을 중심으로)

  • Taeyun Jung ;Young-man Kim
    • Korean Journal of Culture and Social Issue
    • /
    • v.10 no.3
    • /
    • pp.61-81
    • /
    • 2004
  • The purpose of this study was to investigate effects of North Korea defectors' living experiences in South Korea on their self-perceptions and perceptions of South Korea. For this purpose, a questionnaire was distributed to 66 defectors with no living experiences at all and 99 defectors with living experiences of an average of 2.7 years in South Korea. They were asked to rate their own as well as South Koreans' values, personality, attitudes toward sexual misbehavior, gender stereotypes. Also, they evaluated the society of South Korea and its political control. The results indicated that those defectors with living experiences tended to perceive more negatively their own and South Koreans as well, and yet that they were less negative for sexual misbehavior and weaker for gender stereotypes. Also, results suggested that living experiences led defectors to perceive South Korea in a more negative way. Those findings were discussed in terms of changes in culture.

  • PDF

Enhanced ANTSEC Framework with Cluster based Cooperative Caching in Mobile Ad Hoc Networks

  • Umamaheswari, Subbian;Radhamani, Govindaraju
    • Journal of Communications and Networks
    • /
    • v.17 no.1
    • /
    • pp.40-46
    • /
    • 2015
  • In a mobile ad hoc network (MANET), communication between mobile nodes occurs without centralized control. In this environment the mobility of a node is unpredictable; this is considered as a characteristic of wireless networks. Because of faulty or malicious nodes, the network is vulnerable to routing misbehavior. The resource constrained characteristics of MANETs leads to increased query delay at the time of data access. In this paper, AntHocNet+ Security (ANTSEC) framework is proposed that includes an enhanced cooperative caching scheme embedded with artificial immune system. This framework improves security by injecting immunity into the data packets, improves the packet delivery ratio and reduces end-to-end delay using cross layer design. The issues of node failure and node malfunction are addressed in the cache management.

The Role and Tasks of Family Science in the Probation and Parole System (보호관찰에 있어서의 가족학의 역할과 과제)

  • Lee, Jung-Yeon
    • Korean Journal of Human Ecology
    • /
    • v.11 no.1
    • /
    • pp.1-11
    • /
    • 2002
  • This paper was written to present the recent trend of juvenile delinquency within the context of family system and to provide the role and tasks of Family Science in the area of Probation and Parole System in Korea. Since Family Science provides knowledges and skills to help for both adolescents and their families by improving interactional functions, the role of Family Science was focusing more on comprehensive and integrated perspectives. The tasks of Family Science, especially, in family life education, family therapy, and family policy, were as follows: 1) to prevent recurrence of misbehavior by family life education. 2) to draw the cooperation with the judicial system. 3) to provide the advanced course for volunteers. 4) to perform crime prevention education for normal adolescents. 5) to join the official education for civil service personnel. 6) to manage group-homes after the completion of the probation period.

  • PDF

SEC Approach for Detecting Node Replication Attacks in Static Wireless Sensor Networks

  • Sujihelen, L.;Jayakumar, C.;Senthilsingh, C.
    • Journal of Electrical Engineering and Technology
    • /
    • v.13 no.6
    • /
    • pp.2447-2455
    • /
    • 2018
  • Security is more important in many sensor applications. The node replication attack is a major issue on sensor networks. The replicated node can capture all node details. Node Replication attacks use its secret cryptographic key to successfully produce the networks with clone nodes and also it creates duplicate nodes to build up various attacks. The replication attacks will affect in routing, more energy consumption, packet loss, misbehavior detection, etc. In this paper, a Secure-Efficient Centralized approach is proposed for detecting a Node Replication Attacks in Wireless Sensor Networks for Static Networks. The proposed system easily detects the replication attacks in an effective manner. In this approach Secure Cluster Election is used to prevent from node replication attack and Secure Efficient Centralized Approach is used to detect if any replicated node present in the network. When comparing with the existing approach the detection ratio, energy consumption performs better.