• Title/Summary/Keyword: reputation

검색결과 1,089건 처리시간 0.025초

사용자의 패스워드 인증 행위 분석 및 피싱 공격시 대응방안 - 사용자 경험 및 HCI의 관점에서 (Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives)

  • 유홍렬;홍모세;권태경
    • 인터넷정보학회논문지
    • /
    • 제15권3호
    • /
    • pp.79-90
    • /
    • 2014
  • 아이디와 패스워드를 통한 인증은 고전적인 방법이나 여전히 가장 널리 사용되고 있다. 오늘날 사용자들의 패스워드의 인증 수행 과정은 그 단순함과 편리함, 반복적인 수행으로 인해 적응무의식화 되었다. 즉, 의식화된 상태가 아닌 무의식적으로 인증을 수행하고 있다. 인증과정은 그 절차가 단순하고 반복 학습되어 인간의 깊은 사고 없이도 무의식적으로 수행할 수 있도록 학습될 수 있다. 또한 사용자들이 보유한 아이디와 패스워드 개수가 적기 때문에 기억에 의존할 수 있는 것도 적응무의식화의 원인 중 하나이다. 소수의 아이디와 패스워드 개수를 보유한 것과 달리 대개 사용자들은 수많은 웹, 모바일, 인터넷사이트 서비스에 가입되어 있다. 계정의 수는 많은 반면 소수의 아이디, 패스워드 쌍을 보유했을 때, 그리고 그것이 기억에 의존하여 관리될 때, 마지막으로 인증 과정이 무의식적으로 수행될 때 그것은 인간의 취약점이 된다. 과거에는 정보유출을 위한 해킹 공격이 하드웨어나 소프트웨어 등의 취약점을 이용한 것이었다면 최근에는 이와 더불어 인적 요소의 취약점을 이용하는 사회공학적 공격이 많아지고 있다. 특히 피싱 및 파밍 등과 같은 정보유출형 공격이 급증하고 있다. 피싱 및 파밍 공격은 인적 요소의 취약성을 이용한 것이며, 무의적으로 수행하는 인간의 인증 행위에 취약하다. 과거의 피싱 및 파밍에 대한 연구는 기술적인 분석이나 대책이 주를 이루었지만, 본 논문은 피싱 및 파밍 공격시 반응하는 인간의 행위에 관심이 있다. 사용자가 패스워드를 무의식적으로 입력 할 때, 그리고 인증 행위를 반복 수행할 때, 얼마나 많은 패스워드를 노출할 수 있는지 실험을 통해 확인했다.

친족에 의한 아동 성폭력 실태 - 영남권역 해바라기 아동센터의 경험 - (The Child Sexual Assaults by Kin -The Experience of YoungNam District Sunflower Center for Prevention of Child Sexual Assaults-)

  • 서순기;이상한
    • 대한수사과학회지
    • /
    • 제2권2호
    • /
    • pp.21-29
    • /
    • 2007
  • 아동 성폭력 중에서도 친족에 의한 성폭력은 어린 시절부터 시작되어 청소년기를 거쳐 성인에 이르기까지 지속되는 경향이 있고, 가장 신뢰하는 사람으로부터 피해를 입기 때문에 신체적, 심리적, 사회적으로 심각한 후유증을 겪는다. 영남권역 해바라기 센터는 13세 미만의 성폭력 피해아동을 위해 법의학적 증거물 채취에서부터 신체적, 정신적, 심리적 치료를 원스톱으로 할 수 있는 성폭력 전문센터로 2005년 6월 대구에 개소되었다. 본 연구는 영남권 역 해바라기 아동센터 개소 이래 2006년 12월까지 상담한 사례 180건 중 친족에 의한 아동성폭력 사례 36건을 대상으로 하여 그 특성을 분석하였다. 피해 아동은 여아가 32건 (88.9%), 남아가 4건(11.1%)이었고, 연령별로는 7세 이하의 유아 20건(5.6%), 어린이 16건(44.4%)이었다. 피해 유형으로는 성추행이 28건(78%), 강간이 8건(22%)이었다. 가해자는 친부가 58.3%(21건)으로 가장 많았고, 조부(3건), 사촌오빠(3건), 의부(2건)의 순이었다. 가해자의 연령별로는 성인이 32건(88.9%), 청소년 2건(5.5%), 어린이 2건(5.5%)이었다. 피해 장소는 피해자의 집이 31건(86.1%)으로 대부분을 차지하였고, 피해기간별로는 지속적인 피해가 25건(69.4%), 1회가 6건(16.6%), 모름(3건), 3-4회(2건)의 순이었다. 피해사실에 대해 신고나 처벌을 원치 않는 경우가 22건(61.1%), 경찰에 신고(7건), 고려 중(6건)의 순이었고, 실제 고소 고발된 사례는 1건이었다. 이상의 결과를 바탕으로 단일 기관의 통계라는 한계는 있지만 친족에 의한 아동 성폭력은 주로 친부에 의해 피해자의 집에서 이루어지며, 단회에 그치기보다는 지속적으로 피해가 발생하며, 유아기부터 일찍 발생하는 것으로 나타났다. 친족에 의한 성폭력을 예방하기 위해서는 사회 전반에 걸친 지속적인 홍보와 교육이 절실하며, 피해자 치료 외에도 단순한 가정내 문제라는 잘못된 인식을 과감히 버리고 피해 사실에 대한 경찰 신고를 의무화하고 해바라기 아동센터와 같은 전문 센터의 확충이 요구된다고 생각한다.

  • PDF

중소기업 기술 유출에 대한 조기경보시스템 개발에 대한 연구 (Development on Early Warning System about Technology Leakage of Small and Medium Enterprises)

  • 서봉군;박도형
    • 지능정보연구
    • /
    • 제23권1호
    • /
    • pp.143-159
    • /
    • 2017
  • 급속한 IT의 발전으로 인해 개인정보뿐만 아니라 기업이 보유하고 있는 핵심 기술 및 정보에 대한 유출 위협이 중요한 이슈로 인식되고 있다. 기업에게 있어서 보유하고 있는 핵심 기술은 기업의 생존 및 지속적으로 경쟁 우위를 차지하기 위해 매우 중요한 부분이다. 최근 기술 침해 사례가 많이 일어나고 있는데, 기술 유출은 기업에게 있어서 주가하락 등의 막대한 재무적인 손실을 가져올 뿐만 아니라, 기업의 신뢰에 손상을 입게 되고, 기업의 발전을 지연시키게 되는 악영향을 미치게 된다. 특히, 대기업에 비해 핵심기술이 기업 내 중요한 많은 부분을 차지하는 중소기업에 있어서 기술 유출에 대한 대비는 기업의 존립에 있어서 필수적인 요소로 볼 수 있다. 이처럼 정보 보안 관리의 필요성과 중요성이 대두되면서 기업 입장에서 조기에 기술 침해 위협에 대해 확인하고 대비할 필요가 있다. 본 연구에서는 기술 유출에 영향을 미치는 요인들을 탐색하는 실증 분석을 수행하고, 인공지능 알고리즘을 통해 기술유출 조기경보시스템을 개발하고자 한다. 구체적으로 본 연구에서는 중소기업이 보유한 기술 유출에 영향을 미치는 요인들을 로지스틱 회귀분석을 통해 확인해보고, 통계분석을 통해 검증된 요인들을 기반으로 인공지능 여러 기법들 중 하나인 Support Vector Machine을 활용하여 기술침해 가능성을 조기에 알려주는 모형을 개발하였다. 본 연구에서 제안하는 기술 유출 가능성에 대한 조기 경보 모형을 통해 기업 및 정부 관점에서 기술 유출을 미리 예방할 수 있는 기회를 제공할 수 있을 것으로 기대된다.

스키마 관점에서 살펴본 인터넷 쇼핑몰 선택에 대한 소비자행동의 이해: Bricks & Clicks와 Pure-Player 인터넷 쇼핑몰 비교를 중심으로 (Empirical Analysis of Consumer Behavior on the Internet Shopping Mall Choice from the Schema Perspective: Comparison Between Bricks & Clicks and Pure-Player Shopping Mall)

  • 정남호;이건창
    • Asia pacific journal of information systems
    • /
    • 제17권4호
    • /
    • pp.165-186
    • /
    • 2007
  • With the advent of a wide variety of Internet shopping malls, consumers can choose a best appealing shopping mall from among the Bricks-and-Clicks and Pure-Player malls. Pure-Players launched their operation grandiosely with the early stage of Internet use in 1995. However, after the burst of Dot-com company bubbles in 1997, Pure-Players introduce various types of business models to meet potential needs of consumers. While Pure-Players suffer skeptical views from market analysts as well as consumers, traditional offline companies learned important lessons from Dot-com companies collapse phenomena, and expanded their business channels into online in the name of Bricks-and-Clicks. Nowadays, Bricks-and-Clicks successfully establish in the market as one of reliable business partners among consumers. Therefore, it is no surprise that recent competitions between Bricks-and Clicks and Pure-Players become fiercer than ever to attract potential customers to their websites. In this situation, consumers can choose a shopping mall to their best satisfaction. Consumers can enjoy both offline and online options for shopping because Bricks-and Clicks provide both offline and online channels to consumers, which is compared with Pure-Players offering only online channel. Offline channel is unique in providing consumers with chances to touch and feel target products and services. Meanwhile, online channel is considered very viable and convenient shopping options for consumers. In this respect, it is easily assumed that consumers will show different online shopping behavior when they have to choose either Bricks-and-Clicks mall or Pure-Player mall for the sake of shopping. Remaining research issue in this case is how much consumers' schema would influence online shopping behavior between Bricks-and-Clicks and Pure-Players. Basically, schema is a framework for synthetic information recognition that individual consumers have and is very characteristic in that it focuses not on fragmentary facts but on the combination of various causes affecting results. Consumers' schema is closely represented by trust, structural assurance, and perceived relative advantage towards a specific type of shopping mall. In literature, there exist a lot of studies comparing Bricks-and-Clicks and Pure-Players. However, there is no study to pursue the analysis of consumer behaviors comparing Bricks-and Clicks and Pure-Players from the schema perspective. Therefore, this study aims to investigate this research gap. Empirical analysis is adopted by garnering valid questionnaires from 514 Internet shopping mall users. 237 were mainly using Bricks-and-Clicks for shopping, while 277 were found to visit Pure-Players for shopping. PLS was applied to analyze the survey data to verify the proposed research hypotheses. Findings from the empirical test results are as follows. First, consumers perceive more trust and relative advantage in Pure-Players, comparing with Bricks-and-Clicks. This result is against widely-accepted perception that Bricks-and-Clicks would be perceived by consumers as more trustworthy and relatively advantageous because they have offline reputation and stores. Therefore, it becomes more obvious that Internet is becoming daily necessaries, and consumers increasingly feel very comfortable in using the Internet for their own personal purposes. Second, consumers have firm faith in transaction safety, regardless Bricks-and-Clicks and Pure-Players. This seems due to the fact that most of shopping malls showing dubious transaction safety have no place in the market. In a nutshell, empirical results tell us that Pure-Players will grow very much in the future, to the extent that consumers perceive no difference in comparison with Bricks-and-Clicks. Besides, consumers' schema accumulated through trust and perceived relative advantage plays crucial role in determining consumer behavior.

중국소수민족(中國少數民族)의 민족복식(民族服飾)에 관(關)한 연구(硏究)(II) - 운남성(雲南省)의 소수민족(少數民族)을 중심(中心)으로 - (A Study on Traditional Costume of China's Minorities(II) - Centering Around Yunnan Province Minorities -)

  • 김영신;홍정민
    • 패션비즈니스
    • /
    • 제3권1호
    • /
    • pp.65-80
    • /
    • 1999
  • In this study, the researcher studied the historical background and the traditional culture about dress and ornament of Yunnan Province of China. The Results of the study are as follows. 1. In the Past, Derung's dress was very simple due to the influence of various factors, such as geography and history. Men wore shorts and covered diagonally a piece of cloth from left shoulders to right armpits and tied up the two ends on chests. Women covered crisscross two pieces of cloth from both shoulders to knee. 2. Achang people's dress and adornment has its own unique characteristic. Generally, men wear Jackets with buttons down the front and black trousers. Unmarried men like to wear white turbans, while most of married men usually wear dark blue ones. Women usually wear tight-sleeve blouses with buttons down the front and skirts. Unmarried women wear the hair in braids coil them on the top of their heads. They wear short blouses and trousers. Married women wear their hair Into buns and like to entwine black or blue cloth into high trubans. They wear short blouses and knee-length straight skirts. Achang knife enjoys high reputation and has a long history and an exquisite workmanship. All the men like to wear it. 3. The dress and adornment of the Lahu nationality has both the characteristic of farming culture and the style of nomadic culture of early times. Men usually wear short shirts with round necks and buttons down the front, loose-legged trousers, turbans or dark blue cloth caps Women's dress and adornment can be categorized into two styles. One is black cloth gown with buttons diagonally on the right front and waist-length slits on both sides. The edges of fronts and cuffs are edged with Silver ornaments and lace. They also wear trousers. The other is short blouse with round neck and short opening on th right front, straight skirt and colourful leggings with embroidered patterns. 4. The Hani people, men and women, old and young, like black colour and are fond of wearing black clothes. Men usually wear shirts with buttons down the front and trousers, entwining their heads with black or white cloth. The elderly people wear calottes. Women wear cloth blouses, skirts and trousers or shorts. Slight differences exist in the clothing and adornments according to region, branch and age 5. Blang people's dyeing technique with an exquisite method has a long history. Men wear dark blue long sleeve shirts with round necks and buttons down the front or arranged diagonally on the front and loose-legged trousers. Elderly men wear big turbans wdress and adornment varies greatly in different regions. 6. The Lisu people culture of dress and adornment has some unique characteristics. The styles and colours of their dress and adornment differ slightly from place to place. In the Nujiang area, Women wear black velvet Jackets over blouses with buttons arranged diagonally on the right front and long pleated ramie skirts. Men usually wear wraparound ramie gowns, with center vent, made of fabrics alternated with white and black cross stripes. They also wear cloth waistbands and trohile youngsters keep their hair short. Women's users. In the Lushui area, the dress and adornment is similar to that in the Nujing region, but women wear aprons and trousers instead of skirts. 7. The Nu people dress and adornment is simple but elegant Women are proficient in ramie-weaving. Men usually wear gowns With overlapping necks, knee-length trousers and leggings. They like to wear their hair long and entwine dark blue or white turbans. Women wear black and red vests over blouses with buttons arranged diagonally on the right front and ankle-length skirts. They also wear their hair long, make it into braids, and entwine dark blue or colourful cloth turbans. 8. Pumi men usually wear ramie shirts With buttons arranged diagonally on the right front, loose trousers and white sheepskin vests. Some also wear overcoats made of "pulu". Women's dress and adornment varies in different areas. In the Lanping and Weixi regions, women wear white short blouses with buttons arranged diagonally on the front and dark brown embroidered vests. They also wear trousers and blue or black cloth turbans. In the Ninglang and Yongsheng regions, women wear hemmed blouses With buttons arranged diagonally on the right front and drape sheepskin capes. They also wear white pleated skirts and use broad colourful cloth as their waistbands.

  • PDF

시장공사적협동책략화소비자태도(时装公司的协同策略和消费者态度) (Collaboration Strategies of Fashion Companies and Customer Attitudes)

  • Chun, Eun-Ha;Niehm, Linda S.
    • 마케팅과학연구
    • /
    • 제20권1호
    • /
    • pp.4-14
    • /
    • 2010
  • 协同策略需要信息共享和其他各种对公司和股东都有利益的形式. 本文强调了在时装产业中运用到的特别形式的协同. 并且测试了对时装公司最成功的策略和消费者所感知到的协同的好处. 在本研究中, 我们定义了作为协作方的时装公司和品牌以及他们的合作方或股东. 我们定义协同为发生在至少两个公司, 品牌或个体之间, 在平等的基础上利用他们各自的竞争优势从而获得更大利益的合作关系. 协同策略需要信息共享和其他各种对公司和股东都有利益的形式. 本文强调了在时装产业中运用到的特别形式的协同. 通过合作, 时装公司一直都追求有形的差异例如设计和技术, 以及无形的差异例如对消费者情感和生理的好处. 结果就是, 时装产业中的合作已变成一个重要的创造价值的概念. 本文是一个定性研究, 使用案例研究和深度访谈来测试消费者对时装产业中协作的态度. 从1998年到2008年12月, 在韩国和国际市场中共有173个协同案例. 我们通过文件数据收集案例. 这些文件数据包括网站和产业数据和顶级门户搜索网站. 例如Rankey.com, Naver, Daum, 和Nate. 以及时装信息代表网站Samsungdesignnet 和Firstviewkorea. 我们搜集从2008年11月到2009年2月为止的个案. 个案用来分析有一个或多个合作方的时装产品生产(不包括纺织产品), 零售时装产品或设计服务. 其他在先前研究中的协同案例来自于新闻稿件, 期刊, 互联网门户网站和时装信息网站. 我们共选择了173个案例来进行分析. 清楚的显示了时装公司和股东的协作执行和策略所带来的产出和利益. 结果显示对所有参与协作的合作方(企业和顾客)来说, 最大的好处是通过共享资源降低了成本和风险. 例如设计能力, 形象, 成本, 技术和目标. 并且创造了协同作用. 考虑到协同产出的种类, 产品/设计是最重要的(55%), 紧跟其后的是推广促销(21%), 价格(20%)和地点(4%). 这个结果说明协同对给予产品和设计生命力有重要的作用. 尤其是在追求创造和新颖的时装产业里. 为了使协同可以成功, 本研究中深度访谈的结果确认了时装公司应该对为什么要进行这个协作有清晰的目标. 在设定目标之后, 时装公司应该选择符合产品形象和目标市场的合作方. 使得合作的产品有一定的概念和差异因素. 同时时装公司还要关注提升品牌知名度. 通过对消费者的深度访谈, 相互的利益可以分类为6个因素: 追求个人风格、追求品牌、追求稀有性、追求时尚、追求经济效率和社会性. 在访谈中顾客同时也强调了形象, 声誉和品牌信任. 然而, 在子范畴中, 本研究中的专家和顾客在成功因素认知方面有不同的结果. 因此, 从不同纬度研究目标客户和目标市场从而为成功的协作发展合适的策略.

식재료 아웃소싱이 경제적 주방에 미치는 영향에 관한 연구 - 특1급호텔 양식조리를 중심으로 - (Study on economic effects of outsourcing of food materials on the hotel kitchen - Focus on cooking Western food in the first class hotel -)

  • 성태종
    • 한국관광식음료학회지:관광식음료경영연구
    • /
    • 제13권2호
    • /
    • pp.45-69
    • /
    • 2002
  • This study is designed to examine feasibility and limitation of outsourcing in cooking Western food in a hotel, to interpret importance of outsourcing(eg. outside order, outside procurement, outside supply) in a broad sense in order to reinforce the core capacity in the cooking department, and to know whether the cooking human power is efficiently used and how much the chefs recognize outsourcing of food materials. As many companies conduct restructuring to cut down its size, the reduction of human power led the Western food cooking in the hotel to lower core capacities, lower quality, and lower efficiency. In addition, the sagging morale of chefs undermined creativity. To change from the traditional kitchen to an economic kitchen needs to look into importance of outsourcing, cognitive attitude of chefs, relation with outside suppliers. Here suggests performance of positive changes in the structure The study examined feasibility and limitation of outsourcing in the hotel kitchen as well as chefs' cognitive attitude toward outsourcing of food materials to reinforce core capabilities of the hotel kitchen. 1. Companies of outsourcing are selected according to variability of price conditions, flexibility of contract conditions, popularity of the outsourcing company, and reputation of the outsourcing company. 2. The importance of outsourcing in the Western food cooking is divided into 4 factors such as standard of selecting outsourcing companies, policies of cooking manu, quality of cooking, and quantity of cooking. 3. The most feasible section in outsourcing of food materials is a process of kneading flour for bread, which shows that many Western-food chefs expect to put higher possibility of outsourcing on the kneading. In other words, when it comes to confectionery and bakery, there are many outside expert processing companies supplying high quality products. In the order of outsourcing feasibility, sauce is followed by processed vegetable, garnish of main dish, and soup. The least feasible section in outsourcing of food materials is appetize. Appetize includes a concept of a improvised dish and needs speed. Due to its color, freshness, and sensibility of taste, the appetize plays a key role in the Western food cooking. 4. When outsourcing is taken in place, the highest risk is to lower the inner cooking skills. Therefore chefs in charge of the Western food sequently recognize both internal problems including storage of cooking skills, unstability of layoffs, and loss of cooperation between departments, and external problems including inferior goods, difficulty of differentiating manu, delay of delivery, and expiration date. It shows that most of the Western food chefs consider risks of the internal problems at first. 5. A effective outsourcing needs appropriate selection of outsourcing companies, maintenance of credibility, active communication, check and management of hygiene. However regardless of their position or career, chefs in charge of the Western food have the same cognitive attitude toward selecting successful outsourcing companies after the outsourcing system is enforced. The core of cooking, or a final stage in the full process of so-called artistic cooking, should be treated with insourcing. Reduction of several cooking processes resulted in shortened cooking time, increased efficiency, faster cooking, cutting the waiting-lines, and finally more room for customers. The outsourcing system can reduce or eliminate the following processes in cooking: buying various food materials, checking, storing, preparing, and processing. Especially in the Western food cooking department of a hotel, the outsourcing system should be enforced to make an economic kitchen and to efficiently manage it. Wow it's time to change from the traditional kitchen to an economic kitchen in the hotel cooking department. For that, the cooking department should become a small but strong organization by outsourcing except its core work.

  • PDF

지리적 표시제도의 의의 및 보호체제 연구 (A Study on the Concept and Protection System for the Geographical Indication)

  • 고용부
    • 한국항만경제학회지
    • /
    • 제23권3호
    • /
    • pp.165-184
    • /
    • 2007
  • 본 연구에서는 한 EU FTA 협상에서 중요이슈가 되고 있는 지적 재산권으로서의 지리적 표시제에 대한 의의 및 보호체계를 검토 연구했다. 지리적 표시는 상품의 품질 등이 지리적 특성과 연계된 지리적 명칭을 지적재산권으로 보호해주는 제도이다. 19C 후반부터 이에 대한 보호노력이 여러형태로 계속되어 오다가 드디어 WTO TRIPS 협정 상에 지적 재산권 보호대상으로 규정되었고, 이에 따라 지리적표시는 양자 규범 복수규범 내지 임의 규범에서 다자 규범 의무 규범으로 발전 된 것이다. 지리적 표시는 이같이 다자규범으로 자리 잡은 후에도 특히 EU를 주도로 하여 DDA 협상에서 계속 확대 개선을 위한 논의가 활발히 이루어지고 있다. 지리적표시보호에 대한 각국의 체계 및 형태는 유사하나 크게는 EU형과 미국형이 있다. 특히 EU는 지리적 표시가 품질정책 및 공동농업정책의 근간이 되어있고 현재 남부 공업국가의 품목들이 대부분을 점하고 있는 5,000여개의 지리적 표시가 주류 및 가공식품을 중심으로 등록되어 있으며 이에 따라 지리적표시의 국제적 보호규범체계의 정립 및 확대에서 항상 주도적 입장을 유지하고 있다. 우리나라는 1997년 7월부터 농수산 품질관리법에 의한 등록제를 마련했고 2004 7월에는 상표법에 의한 지리적표시 단체장 등록제도를 도입 운영하고 있으며 이에 기초하여 40여개의 품목들이 지리적 표시품목으로 등록되어있다. 한국과 EU 간의 지리적 표시에 관련한 협상에서는 EU 측의 적극적 상호인정 요구가 추진이 예상되고 이에 따라 우리의 대응이나 전략여하가 문제된다. 물론 EU는 그 보호가 발전되어 있고 보호등록이 많으며 그것이 농업정책의 개혁과 고품질 농산물의 화대 정책의 근간을 이루고 있다는 점에서 적극적 상호인정이 쉽지 않다. 그러나 여기서 우리는 장기적 구도로 본다면 지리적 표시 보호의 상호 인정을 회피나 무조건적 거부보다는 긍정적 단계적 측면에서 조심스럽게 접근하되 국제적 규범과 조화하면서도 후속적 관리와 대응에 철저한 이른바 전략적 수용과 대비를 고려할 수 있을 것이다. 특히 우리의 지리적표시제는 우리 농산물만의 특성에 따른 품질 향상과 경쟁력 강화 및 고 부가치 전략 구축에 결정적이고도 중요한 요인이 될 수 있다는 강점도 있다는 점이다. 정부와 농업인의 지혜를 모아 지리적 표시로 등록된 40여개 품목에 대한 지속적 품질개선은 물론 타 농산물 및 식품의 지속적 표시확대 그리고 특성화에로의 개발전략 등으로 EU시장에 과감히 진출할 경우 유럽시장에의 우리의 접근성 창출성이 크게 증폭 될 것이다.

  • PDF

오픈 소스 개발자들의 참여 의도 강화 기제 및 참여 지속 의도에 관한 연구: 사회 정체성 이론과 조직시민행동 이론에 기반하여 (The Reinforcing Mechanism of Sustaining Participations in Open Source Software Developers: Based on Social Identity Theory and Organizational Citizenship Behavior Theory)

  • 최정홍;최주희;이혜선;황보환;이인성;김진우
    • Asia pacific journal of information systems
    • /
    • 제23권3호
    • /
    • pp.1-23
    • /
    • 2013
  • Open Source Software Development (OSSD) differentiates itself from traditional closed software development in that it reveals its source codes online and allows anyone to participate in projects. Even though its success was in doubt, many of the open collaborative working models produced successful results. Academia started to get interested in how developers are willing to participate even when there are no extrinsic rewards for their efforts. Many studies tried to explain developers' motivations, and the pursuit of ideology, reputation, and altruism are found to be the answers. Those studies, however, focused mostly on how the first contribution is made out of a certain motivation. Nowadays, OSSD reaches at its maturity and 70% of professional developers have used or utilized open source software or code in their works. As the proportion of people experiencing OSS, the accounts from previous studies are expected to be weakened. Also, extant literature fails to explain how the motivation of participating in OSS evolves over time and experiences. Given that changing over time or over experiences is the natural in the perception of motivation, studies in an attempt to understand how the motivation changes or evolves are in need. In this study, we aimed to explain how the perception about OSS from past usage or related experiences leads to the intention to sustain OSS participations. By doing so, we try to bridge the gap between previous studies and the actual phenomenon. We argued that perceived instrumentality about OSS learned from past experiences will first affect the formation of organizational identity towards general OSS community. And once the organizational identity is formed, it will affect the one's following behaviors related to OSS development, most likely to sustain the favoring stance toward OSS community. Our research distinguishes itself from previous one in that it divides the paths from organizational identity formed to the intention to sustain the voluntary helping behaviors, by altruistic and conforming intentions. Drawing on this structural model, we could explain how organizational identity engages in forming the sustaining intention from past experiences, and that the intention to help at individual level and organizational level works at different level in OSS community. We grounded our arguments on Social identity theory and Organizational Citizenship theory. We examined our assumption by constructing a structural equation model (SEM) and had 88 developers to answer our online surveys. The result is analyzed by PLS (partial least square) method. Consequently, all paths but one in our model are supported, the one which assumed the association between perceived instrumentality and altruistic intention. Our results provide directions in designing online collaborative platforms where open access collaboration is meant to occur. Theoretically, our study suggests that organizational citizenship behavior can occur from organizational identity, even in bottom-up organizational settings. More specifically, we also argue to consider both organizational level and individual level of motivation in inducing sustained participations within the platforms. Our result can be interpreted to indicate the importance of forming organizational identity in sustaining the participatory behaviors. It is because there was no direct association between perceived instrumentality from past experiences and altruistic behavior, but the perception of organizational identity bridges the two constructs. This means that people with no organizational identity can sustain their participations through conforming intention from only the perception of instrumentality, but it needs little more than that for the people to feel the intention to directly help someone in the community-first to form the self-identity as a member of the given community.

해외투자(海外投資)와 지속가능발전 원칙 - 프로젝트 파이낸스의 적도원칙(赤道原則)을 중심으로 - (How to Reflect Sustainable Development, exemplified by the Equator Principles, in Overseas Investment)

  • 박훤일
    • 무역상무연구
    • /
    • 제31권
    • /
    • pp.27-56
    • /
    • 2006
  • Today's financial institutions usually take environmental issues seriously into consideration as they could not evade lender liability in an increasing number of cases. On the international scene, a brand-new concept of the "Equator Principles" in the New Millenium has driven more and more international banks to adopt these Principles in project financing. Sustainable development has been a key word in understanding new trends of the governments, financial institutions, corporations and civic groups in the 21st century. The Equator Principles are a set of voluntary environmental and social guidelines for sustainable finance. These Principles commit bank officers to avoid financial support to projects that fail to meet these guidelines. The Principles were conceived in 2002 on an initiative of the International Finance Corporation(IFC), and launched in June 2003. Since then, dozens of major banks, accounting for up to 80 percent of project loan market, have adopted the Principles. Accordingly, the Principles have become the de facto standard for all banks and investors on how to deal with potential social and environmental issues of projects to be financed. Compliance with the Equator Principles facilitates for endorsing banks to participate in the syndicated loan and help them to manage the risks associated with large-scale projects. The Equator Principles call for financial institutions to provide loans to projects under the following circumstances: - The risk of the project is categorized in accordance with internal guidelines based upon the environmental and social screening criteria of the IFC. - For Category A and B projects, borrowers or sponsors are required to conduct a Social and Environmental Assessment, the preparation of which must meet certain requirements and satisfactorily address key social and environmental issues. - The Social and Environmental Assessment report should address baseline social and environmental conditions, requirements under host country laws and regulations, sustainable development, and, as appropriate, IFC's Environmental, Health and Safety Guidelines, etc. - Based on the Social and Environmental Assessment, Equator banks then make agreements with borrowers on how they mitigate, monitor and manage the risks through a Social and Environmental Management System. Compliance with the plan is included in the covenant clause of loan agreements. If the borrower doesn't comply with the agreed terms, the bank will take corrective actions. The Equator Principles are not a mere declaration of cautious banks but a full commitment of lenders. A violation of the Principles in the process of project financing, which led to an unexpected damage to the affected community, would not give rise to any specific legal remedies other than ordinary lawsuits. So it is more effective for banks to ensure consistent implementation of the Principles and to have them take responsible measures to solve social and environmental issues. Public interests have recently mounted up with respect to environmental issues on the occasion of the Supreme Court's decision (2006Du330) on the fiercely debated reclamation project at Saemangeum. The majority Justices said that the expected environmental damages like probable pollution of water and soil were not believed so serious and that the Administration should continue to implement the project seeking ways to make it more environment friendly. In this case, though the Category A Saemangeum Project was carried out by a government agency, the Supreme Court behaved itself as a signal giver to approve or stop the environment-related project like an Equator bank in project financing. At present, there is no Equator bank in Korea in contrast to three big banks in Japan. Also Korean contractors, which are aggressively bidding for Category A-type projects in South East Asia and Mideast, might find themselves in a disadvantageous position because they are generally ignorant of the environmental assessment associated with project financing. In this regard, Korean banks and overseas project contractors should care for the revised Equator Principles and the latest developments in project financing more seriously. It's because its scope has expanded to the capital cost of US$10 million or more across all industry sectors regardless of developing countries or not. It should be noted that, for a Korean bank, being an Equator bank is more or less burdensome in a short-term period, but it must be conducive to minimizing risks and building up good reputation in the long run.

  • PDF