• 제목/요약/키워드: risk-accepting

검색결과 25건 처리시간 0.022초

농업인의 농작업 위험 수용도 및 관련 요인 (Risk-Accepting Personality and Associated Factors among Korean Farmers)

  • 윤지영;최영철;이원진;김재영
    • 한국환경보건학회지
    • /
    • 제42권5호
    • /
    • pp.333-344
    • /
    • 2016
  • Objectives: This study aimed to examine risk-accepting personality traits and associated factors among farmers. Methods: Data were collected from farmers aged over 40 living in Goryeong, North Gyeongsang-do Province, Korea. Study participants were enrolled in the Korean Rural Cohort study from 2011 to 2014. Surveys for the risk perception of farming were made through face-to-face interviews. Chi-square tests and logistic regression analysis were conducted adjusting for gender, age, marital status, and education. Results: Several factors such as gender, age, marital status, age first worked as a farmer, duration of farming, and history of pesticide poisoning were associated with risk-accepting personality traits among farmers. Farmers with risk-accepting personalities tend to be older, less educated, and have self-employed health insurance. Farmers who started farming after the age of 50 are likely to be risk averse compared to farmers who started farming before the age of 20 (OR=0.41, 95% CI; 0.21, 0.82). Frequent spraying of pesticides was marginally associated with higher risk acceptance among female farmers (OR=1.61, 95% CI: 0.99, 2.64). Male farmers who had experienced pesticide poisoning in their lifetime showed higher odds of risk-accepting personality traits (OR=2.20, 95% CI: 1.03, 4.72) Conclusion: Risk-acceptors were more likely to spray pesticides frequently and to experience more pesticide poisoning compared to risk-averse individuals. This result suggests that farming hazards are to some degree driven by risk-accepting personality traits. Further investigation of how risk-accepting behaviors influence farming practices and pesticide poisoning is needed.

정보보안이 스마트폰 선택에 미치는 영향에 관한 연구 (A study on the influence of information security in selecting smart-phone)

  • 안종창;이승원;이욱;조성필
    • 정보보호학회논문지
    • /
    • 제24권1호
    • /
    • pp.207-214
    • /
    • 2014
  • 최근 스마트폰 스파이웨어는 PC의 여러 가지 유형의 바이러스 요소들을 닮아가고 있으며, 점점 심각해지고 있는 추세이다. 또한 스마트폰 스파이웨어의 성장속도에 비해 스마트폰의 보안과 관련된 측면들은 매우 취약한 상태이지만 사용자들은 그러한 위험 요소들을 심각하게 인지하지 못하고 있는 실정이다. 이에 본 연구는 개인적 성향과 스파이웨어에 대한 인식을 바탕으로 정보보안이 스마트폰 선택에 미치는 영향을 살펴본다. 연구 모델의 주요 변수는 독립 변수로 개인별 위험성 감수정도와 스마트폰 스파이웨어 위험성을 선정하고, 종속 변수로 스마트폰 구매 의향을 설정하였다. 현재 스마트폰을 사용하고 있는 사용자를 대상으로 설문조사를 통해 얻은 200부의 유효한 자료를 SPSS 21 통계 프로그램을 이용하여 검증하였다. 연구결과에 의하면 개인별 위험성 감수정도에 따라 스마트폰 스파이웨어의 위험성을 인지하는 것과, 스마트폰 스파이웨어의 위험성을 인지할수록 스마트폰 구매의향에 영향을 미치는 것으로 나타났다. 즉, 스마트폰을 선택할 때 정보보안의 영향을 파악할 수 있었다.

고위험 신생아 어머니의 모성전환 과정 (Maternal Transition in Mothers with High Risk Newborns)

  • 신현정
    • 대한간호학회지
    • /
    • 제34권2호
    • /
    • pp.243-251
    • /
    • 2004
  • Purpose: The purpose of this study was a comprehensive understanding about maternal transition in mothers with high risk newborns according to the degree of situational meaning. Method: A methodological triangulation that combines qualitative and quantitative methods was used. The situational meaning of a high risk newborn mother was identified using a Family Meaning Attribution Scale. According to the degree of situational meaning, in-depth interviews were conducted at 3 time periods postpartum: between 3-10 days after childbirth, around the time of the newborn's discharge, and between 10-12 weeks after childbirth. Quantitative data was analyzed using descriptive statistics and t-test. Qualitative data was analyzed using Tutty, Rothery, & Grinnell's methodology. Result: The average score of the situational meaning in high the risk newborn mother was 53.57(possible score is between 0-96) and the average score of each item was 1.67. A Maternal transition process in the mother that has a positive situational meaning was conceptualized in three distinctive phases: confusion, accepting, and shaping phases. The Maternal transition process in the mother that has a negative situational meaning was also conceptualized in three distinctive phases: avoiding, conflicting, and accepting phases. Conclusion: It is necessary that the nurses provide high risk newborn mothers with individualized care considering both the situational meaning that is attributed to them and the maternal transition phase that they are faced with.

정보시스템 보안관리를 위한 위험분석 방법론 (A Risk Analysis Methodology for Information Systems Security Management)

  • 이문구
    • 전자공학회논문지CI
    • /
    • 제41권6호
    • /
    • pp.13-22
    • /
    • 2004
  • 본 연구는 기존의 위험분석 방법론들이 갖는 절차상의 복잡성을 최소한으로 줄이기 위하여, 정보시스템보안관리를 위한 위험분석방법론을 제안한다. 제안한 위험분석방법론은 사전처리단계, 대응책설정단계, 사후처리단계의 3단계로 구성된다. 사전처리단계에서는 기본위험분석단계와 상세위험분석 단계로 나누어 실행하도록 하였다. 기본위험분석단계에서는 정보보안 체계가 구축되지 않았거나 단기간에 최소한의 보안 제어를 위한 수단이 필요한 경우 설정된 항목들을 점검하도록 하는 기본적인 보안 관리 단계이다. 상세위험분석단계에서는 자산, 취약성, 위협의 요소들을 분석하고 이를 기반으로 작성된 위험정도 산출표를 이용하여 위험의 정도를 13가지의 경우로 분류한다. 대응책설정단계에서는 위험의 정도에 따라 13가지의 위험정도를 수용, 무시, 감소 또는 이양 등으로 대응방법을 설정한 후, 물리적, 관리적, 기술적으로 대응책을 실행하도록 하였다. 마지막으로 사후관리 단계에서는 침투 테스트로 잔류위험을 평가하고, 보안정책수립과 감사 및 사고대응을 위한 대책이 이루어지도록 하였다.

위험도 평가기법을 적용한 철도시스템의 안전관리 (A Basic Study on the Railway Safety Management Based on Risk Assessment Approach)

  • 김상암;왕종배;곽상록;이동하
    • 한국철도학회:학술대회논문집
    • /
    • 한국철도학회 2003년도 추계학술대회 논문집(II)
    • /
    • pp.223-228
    • /
    • 2003
  • Risk Management does not mean accepting a risk but having a good grasp of, eliminating and controling the exact causes of known hazards. Good safety management plan or system for the safety of any systems need to include the procedures about standing safety goals, related technical information, time schedule, audit programs, etc at least. In this paper the summeries on general risk assessment techniques and the examples of risk assessment system and railway risk management strategies used in UK, Australia and Canada are introduced, and applicable establishment procedures for domestic railway industries are proposed.

  • PDF

청소년의 인터넷게임 중독 영향 요인 (Factors on Internet Game Addiction among Adolescents)

  • 박현숙;권윤희;박경민
    • 대한간호학회지
    • /
    • 제37권5호
    • /
    • pp.754-761
    • /
    • 2007
  • Purpose: The purpose of this study was to explore factors related to internet game addiction for adolescents. Method: This study was a cross-sectional survey, and data was collected through self-report questionnaires. Data was analyzed using the SPSS program. Results: In logistic regression analysis, the risk of being addicted to internet games was 2.22 times higher in males than females. Adolescents with low and middle academic performance also had a higher risk(2.08 times and 2.54 times) to become addicted to internet games. For the location of the computer, the risk of becoming addicted to internet games were .01 times lower in the living room or brother or sisters' room than in their own room. The risk of becoming addicted to internet games was 1.18 times higher in the higher usage time of internet games. The risk of becoming addicted to internet games was .49 times lower in the more accepting and autonomic parents' rearing attitude and .02 times lower in the high self-efficacy group than the low group. Conclusion: The result of this study suggests that there are noticeable relationships between internet game addiction and gender, academic performance, location of computer, usage time of internet games, parents' rearing attitude, and self efficacy.

반응적응 시험설계법을 이용하는 통계적 해석모델 검증 기법 연구 (A Study on the Statistical Model Validation using Response-adaptive Experimental Design)

  • 정병창;허영철;문석준;김영중
    • 한국소음진동공학회:학술대회논문집
    • /
    • 한국소음진동공학회 2014년도 추계학술대회 논문집
    • /
    • pp.347-349
    • /
    • 2014
  • Model verification and validation (V&V) is a current research topic to build computational models with high predictive capability by addressing the general concepts, processes and statistical techniques. The hypothesis test for validity check is one of the model validation techniques and gives a guideline to evaluate the validity of a computational model when limited experimental data only exist due to restricted test resources (e.g., time and budget). The hypothesis test for validity check mainly employ Type I error, the risk of rejecting the valid computational model, for the validity evaluation since quantification of Type II error is not feasible for model validation. However, Type II error, the risk of accepting invalid computational model, should be importantly considered for an engineered products having high risk on predicted results. This paper proposes a technique named as the response-adaptive experimental design to reduce Type II error by adaptively designing experimental conditions for the validation experiment. A tire tread block problem and a numerical example are employed to show the effectiveness of the response-adaptive experimental design for the validity evaluation.

  • PDF

정보보안이 안드로이드와 iOS 기반 스마트폰 소비자 선호에 미치는 영향 (A Study on the Influence of Information Security on Consumer's Preference of Android and iOS based Smartphone)

  • 박종진;최민경;안종창
    • 인터넷정보학회논문지
    • /
    • 제18권1호
    • /
    • pp.105-119
    • /
    • 2017
  • 현재 국내 인구의 85% 이상이 스마트폰을 사용 중이며, 개인의 사생활과 다양한 정보들이 스마트폰 내부에 저장되어 있다. 이러한 정보를 불법으로 취득하고자 악성코드와 스파이웨어 등을 유포하여 사용자에게는 금전적인 피해를 입히는 사례들이 증가하고 있다. 이에 따라 스마트폰을 이용하는데 있어 정보보안의 필요성은 불가피하며 사용자의 보안 인식이 중요시 되고 있다. 본 논문에서는 정보보안이 사용자들의 스마트폰 운영체제 선택에 어떠한 영향을 미치는지에 대해서 알아보고자 한다. 스마트폰 사용자를 대상으로 온라인 설문조사를 실시하여 수집한 응답지 218개를 샘플로 통계분석 프로그램 IBM SPSS Statistics 22를 사용하여 요인분석을 통한 공통성, 신뢰성 분석 그리고 회귀분석을 통해 가설을 검증하였다. 검증 결과, 하드웨어 환경에 따라 지각된 용이성에 영향을 주는 것을 알 수 있었다. 스마트폰의 사용을 통해 즐거움을 얻고 편하게 사용하고자 하는 소비자의 의도는 스마트폰의 하드웨어가 그 기능을 수행하기 위해 뒷받침되어야 함이 검증되었다. 또한 브랜드 영향력은 지각된 유용성과 지각된 용이성에 모두 영향을 미침을 알 수 있었다. 개인위험 감수정도에 따라 스마트폰 스파이웨어 위험성을 인지하는데 차이가 있다는 가설이 채택되었다. 또한 지각된 유용성, 지각된 용이성, 개인위험 감수정도, 스파이웨어 위험성이 스마트폰 구매의향에 유의한 영향을 준다는 것을 파악하였다. 한편 안드로이드와 iOS 운영체제(OS) 사용자의 집단간 차이분석 결과 두 집단 간에는 유의한 차이가 없음을 알 수 있었다. 본 연구의 결과는 국내 스마트폰 관련 기업 및 실무자에게 중요한 시사점을 줄 수 있고, 정보시스템 관련 분야 연구에 새로운 관점을 제시해 줄 수 있다는 점에서 유용성을 가진다.

타부 탐색에 근거한 집락문제의 발견적 해법 (Tabu Search Heuristics for Solving a Class of Clustering Problems)

  • 정주성;염봉진
    • 대한산업공학회지
    • /
    • 제23권3호
    • /
    • pp.451-467
    • /
    • 1997
  • Tabu search (TS) is a useful strategy that has been successfully applied to a number of complex combinatorial optimization problems. By guiding the search using flexible memory processes and accepting disimproved solutions at some iterations, TS helps alleviate the risk of being trapped at a local optimum. In this article, we propose TS-based heuristics for solving a class of clustering problems, and compare the relative performances of the TS-based heuristic and the simulated annealing (SA) algorithm. Computational experiments show that the TS-based heuristic with a long-term memory offers a higher possibility of finding a better solution, while the TS-based heuristic without a long-term memory performs better than the others in terms of the combined measure of solution quality and computing effort required.

  • PDF

우리나라 유류오염보상제도에 관한 고찰 (A Study on the Oil Pollution Compensation System in Korea)

  • 서동오
    • 한국항해학회지
    • /
    • 제17권4호
    • /
    • pp.73-87
    • /
    • 1993
  • As a result of accepting the '71 FUND Convention and enforcing the Oil Pollution Compensation Act 1992, we observed some benefits and costa. This paper analyses those benefits and costs and suggests se-veral key policy recommendations for the estasblishment of an effective oil pollution compensation regime in Korea. This paper identifies the said benefits and costs as follows : First, by establishing the oil pollu-tion compensation system as same as the international level, most of small and medium size of oil pollution damage which are caused by coastal tankers will be compensated by FUND. Second, most of oil pollution damage which are not covered by '69 CLC will be compensated by FUND. Third, some parts of FUND Contribution Fee and CRISTAL Contribution Fee to be charged by major oil companies will be doubled. However the limit of international oil pollution compensation system and the loophole outside the Oil Pol-lution Compensation Act 1992 suggest followings : 1) Radical risk management and insurance manage-ment of ocean going tanker owners, 2) Establishment of oil pollution claim settlement system, 3) Enforce-ment of crew and ship management for coastal tanker and 4) Establishment of Korean P & I Club.

  • PDF