• Title/Summary/Keyword: negative information

Search Result 4,496, Processing Time 0.027 seconds

The Effect of Attributions to Switching Barrier on Negative Emotions and Complain Behaviors (전환장벽의 귀인이 부정적 감정과 불평행동에 미치는 영향)

  • Jeong, Yun-Hee
    • Management & Information Systems Review
    • /
    • v.36 no.2
    • /
    • pp.223-237
    • /
    • 2017
  • This study focus on the effect of switching barrier on negative performance. To suggest the negative effect of switching barrier, we reviewed the researches on service-failure and attribution theory. The model which we present in the research study includes the antecedents and consequences of negative emotions(regret, resentment) that caused by switching barriers. The former factors consist of internal attribution and external attribution. The latter factors consist of acceptance, complain, negative word-of-mouth. Survey research is employed to test these hypotheses. Previous researches, such as service marketing, psychology, have been referenced to measure constructs. We collected data involving various service area, and used 189 respondents to analyze these data with LISREL structural modeling. The hypothesized relationships were statistically significant. Internal attribution had positive effect on regret and external attribution had positive effects on resentment. And then regret had significant effects on acceptance and complain behaviour. Also resentment strongly effects on complain behaviour and negative word-of-mouth. We concluded with managerial implications, including the potential to deeper understanding switching barrier.

  • PDF

Negative Selection Algorithm based Multi-Level Anomaly Intrusion Detection for False-Positive Reduction (과탐지 감소를 위한 NSA 기반의 다중 레벨 이상 침입 탐지)

  • Kim, Mi-Sun;Park, Kyung-Woo;Seo, Jae-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.6
    • /
    • pp.111-121
    • /
    • 2006
  • As Internet lastly grows, network attack techniques are transformed and new attack types are appearing. The existing network-based intrusion detection systems detect well known attack, but the false-positive or false-negative against unknown attack is appearing high. In addition, The existing network-based intrusion detection systems is difficult to real time detection against a large network pack data in the network and to response and recognition against new attack type. Therefore, it requires method to heighten the detection rate about a various large dataset and to reduce the false-positive. In this paper, we propose method to reduce the false-positive using multi-level detection algorithm, that is combine the multidimensional Apriori algorithm and the modified Negative Selection algorithm. And we apply this algorithm in intrusion detection and, to be sure, it has a good performance.

False Alarm Filtering Algorithm Development of Pipeline Leak Detection System using Flow Volume Balance (유량 밸런스 특성을 활용한 송유관 누유 감지 시스템의 오알람 필터링 알고리즘 개발)

  • Kim, Min-Sung;Kim, Hie-Sik;Jung, Hae-Kyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.10
    • /
    • pp.95-102
    • /
    • 2016
  • Pipeline is making the most use of transportation of petroleum products on the land. But due to tremendous accident or environmental disaster by oil pipeline leak or pipeline stolen, leak detection systems have been used for preventing it. Leak detection method based on negative pressure wave has been used at the long distance pipeline. But even if it has showed good leak detection quality, due to making a lot of false alarm, it has weak point that disturbs concentration to system. This study suggests algorithm and method of using volume balance to decrease false-alarm of pipeline leak detection system based on negative pressure wave.

Accurate Equation Analysis for RF Negative Resistance circuit at High Frequency Operation Range (고주파수 영역의 정확도 높은 RF 부성저항 회로 분석)

  • Yun, Eun-Seung;Hong, Jong-Phil
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.4
    • /
    • pp.88-95
    • /
    • 2015
  • This paper presents a new analysis of RF negative resistance (RFNR) circuits, known as a negative resistance generator. For accurate equation analysis of RFNR, this study examined the effects of the gate resistance and the source parasitic capacitance of the transistor. In addition, the input admittance of the conventional equation was calculated by looking into the source-terminal of the transistor, whereas that of the proposed equation was calculated by examining the gate-terminal of the transistor. The proposed equation analysis is more accurate than that of the conventional analysis, especially for higher frequency range. This paper verify the accuracy of the proposed analysis at high frequency range using the simulation.

Effects of ICT Device Ownership on Consumers' Digital Piracy Behavior

  • Sim, Hyeonbo;Kim, Minki;Moon, Junghoon
    • The Journal of Information Systems
    • /
    • v.23 no.4
    • /
    • pp.169-196
    • /
    • 2014
  • This study investigates how information and communication technology (ICT) can damage intellectual property rights (IPR) in the movie industry. Utilizing a survey questionnaire to gather information about the extensive use of ICT devices, including tablet PCs and smartphones, we demonstrate how digital piracy behavior is associated with various socio-demographic characteristics. Econometrically, since a large number of people do not engage in piracy activities, we adopt a zero-inflated negative binomial model. We find that people with tablet PCs are more likely to engage in the piracy of movies from peer-to-peer (P2P) sites. In particular, when we categorize ICT devices based on whether they are portable and allow downloads, we find that people with devices equipped with both functions are most likely to engage in movie piracy.

Vulnerability and Information Security Investment Under Interdependent Risks: A Theoretical Approach

  • Shim, Woo-Hyun
    • Asia pacific journal of information systems
    • /
    • v.21 no.4
    • /
    • pp.27-43
    • /
    • 2011
  • This article explores economic models that show the optimal level of information security investment in the presence of interdependent security risks, Using particular functional forms, the analysis shows that the relationship between the levels of security vulnerability and the levels of optimal security investments is affected by externalities caused by agents' correlated security risks. This article further illustrates that, compared to security investments in the situation of independent security risks, in order to maximize the expected benefits from security investments, an agent should invest a larger fraction of the expected loss from a security breach in the case of negative externalities, while an agent should spend a smaller fraction of the expected loss in the case of negative externalities.

An Analysis of the Influence of Knowledge Management Factors on Knowledge Transfer (지식이전에 대한 지식경영 요인의 영향 분석)

  • Oh Jay-In
    • The Journal of Information Systems
    • /
    • v.15 no.1
    • /
    • pp.191-213
    • /
    • 2006
  • The purpose of this research is to identify the structure among determining factors focusing on knowledge transfer and analyze and prove the causal relation on knowledge transfer in Korean companies and public corporations. The results from the analysis of data collected in this study are as follows. First, forum among organization related factors has the positive relation with uncertainty in a significant level. Second, the higher the knowledge presentation and the ease of use are among information systems related factors, the lower the ambiguity and uncertainty are. Third, among process related factors, unification has the negative relation with ambiguity and uncertainty in a significant level. Fourth, a better manpower employment contributes to a worse ambiguity and uncertainty. Fifth, ambiguity has a negative relation with knowledge transfer. In conclusion, the factors that lower the ambiguity and facilitate knowledge transfer include information systems, unification, and manpower employment. These factors, however, influence on uncertainty, which turns out to be nothing to do with knowledge transfer.

  • PDF

Intrusion Detection based on Intrusion Prediction DB using System Call Sequences (시스템 호출을 이용한 침입예상 데이터베이스 기반 침입탐지)

  • Ko, Ki-Woong;Shin, Wook;Lee, Dong-Ik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04b
    • /
    • pp.927-930
    • /
    • 2002
  • 본 논문에서는 중요 프로세스(privileged process)의 시스템 호출 순서(system call sequence)를 이용한 침입탐지 시스템을 제안한다. 기존 연구의 정상행위 기반 침입탐지 시스템은 정상행위를 모델링하여 시스템을 구성하고, 이와 비교를 통해 프로세스의 이상(anomaly) 여부를 결정한다. 이러한 방법은 모델링되지 않은 미지의 행위에 대한 적절한 판단을 행할 수 없으므로, 높은 오류율(false-positive/negative)을 보인다. 본 논문에서는 현재까지 알려진 공격에서 공통적으로 나타나는 윈도우들을 수집하여 침입예상윈도우를 구축하고, 이를 기존의 침입탐지 시스템에 부가적으로 사용하여 효과적으로 오류율(false-positive/negative)을 낮출 수 있음을 보인다. 실험 결과 제안된 방법을 통한 침입탐지는 기존의 방법에 비해 공격 탐지율은 증가하고 정상행위에 대한 오류율은 감소하였다.

  • PDF

Outcomes of Triple-Negative Versus Non-Triple-Negative Breast Cancers Managed with Breast-Conserving Therapy

  • Bhatti, Abu Bakar Hafeez;Khan, Amina Iqbal;Siddiqui, Neelam;Muzaffar, Nargis;Syed, Aamir Ali;Shah, Mazhar Ali;Jamshed, Arif
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.6
    • /
    • pp.2577-2581
    • /
    • 2014
  • Background: Triple negative breast cancer is associated with aggressive behavior and high risk of local and regional failure. Aggressive surgical intervention is considered suitable. This makes role of breast conserving therapy (BCT) debatable in these patients. The objective of this study was to compare outcome of BCT for triple negative versus non-triple negative breast cancer. Materials and Methods: Medical records of patients who underwent breast conserving therapy from 1999 to 2009 at Shaukat Khanum Cancer Hospital and had complete receptor status information were extracted. Patients were divided into triple negative breast cancer (TNBC) and non-TNBC. Patient characteristics, medical treatment modalities and adverse events were compared. Expected five year locoregional recurrence free, disease free and overall survival was calculated. The Cox proportional hazard model was used to identify independent predictors of outcome. Results: A total of 194 patients with TNBC and 443 with non-TNBC were compared. Significant difference was present for age at presentation (p<0.0001), family history (p=0.005), grade (p<0.0001) and use of hormonal therapy (p<0.0001). The number of locoregional failures, distant failures and mortalities were not significantly different. No significant difference was present in 5 year locoregional recurrence free (96% vs 92%, p=0.3), disease free (75% vs 74%, p=0.7) and overall survival (78% vs 83%, p=0.2). On multivariate analysis, tumor size, nodal involvement and hormonal treatment were independent predictors of negative events. Conclusions: Breast conserving therapy has comparable outcomes for triple negative and non-triple negative breast cancers.

Modeling Consumers' WOM (Word-Of-Mouth) Behavior with Subjective Evaluation and Objective Information on High-tech Products (하이테크 제품에 대한 소비자의 주관적 평가와 객관적 정보 구전 활동에 대한 연구)

  • Chung, Jaihak
    • Asia Marketing Journal
    • /
    • v.11 no.1
    • /
    • pp.73-92
    • /
    • 2009
  • Consumers influence other consumers' brand choice behavior by delivering a variety of objective or subjective information on a particular product, which is called WOM (Word-Of-Mouth) activities. For WOM activities, WOM senders should choose messages to deliver to other consumers. We classify the contents of the messages a consumer chooses for WOM delivery into two categories: Subjective (positive or negative) evaluation and objective information on products. In our study, we regard WOM senders' activities as a choice behavior and introduce a choice model to study the relationship between the choice of different WOM information (WOM with positive or negative subjective evaluation and WOM with objective information) and its influencing factors (information sources and consumer characteristics) by developing two bivariate Probit models. In order to consider the mediating effects of WOM senders' product involvement, product attitude, and their characteristics (gender and age), we develop three second-level models for the propagation of positive evaluations, of negative evaluations, and of objective information on products in an hierarchical Bayesian modeling framework. Our empirical results show that WOM senders' information choice behavior differs according to the types of information sources. The effects of information sources on WOM activities differ according to the types of WOM messages (subjective evaluation (positive or negative) and objective information). Therefore, our study concludes that WOM activities can be partially managed with effective communication plans influencing on consumers' WOM message choice behavior. The empirical results provide some guidelines for consumers' propagation of information on products companies want.

  • PDF