• Title/Summary/Keyword: risk-accepting

Search Result 25, Processing Time 0.029 seconds

Risk-Accepting Personality and Associated Factors among Korean Farmers (농업인의 농작업 위험 수용도 및 관련 요인)

  • Youn, Ji Young;Choi, Yeongchull;Lee, Won Jin;Kim, Jaeyoung
    • Journal of Environmental Health Sciences
    • /
    • v.42 no.5
    • /
    • pp.333-344
    • /
    • 2016
  • Objectives: This study aimed to examine risk-accepting personality traits and associated factors among farmers. Methods: Data were collected from farmers aged over 40 living in Goryeong, North Gyeongsang-do Province, Korea. Study participants were enrolled in the Korean Rural Cohort study from 2011 to 2014. Surveys for the risk perception of farming were made through face-to-face interviews. Chi-square tests and logistic regression analysis were conducted adjusting for gender, age, marital status, and education. Results: Several factors such as gender, age, marital status, age first worked as a farmer, duration of farming, and history of pesticide poisoning were associated with risk-accepting personality traits among farmers. Farmers with risk-accepting personalities tend to be older, less educated, and have self-employed health insurance. Farmers who started farming after the age of 50 are likely to be risk averse compared to farmers who started farming before the age of 20 (OR=0.41, 95% CI; 0.21, 0.82). Frequent spraying of pesticides was marginally associated with higher risk acceptance among female farmers (OR=1.61, 95% CI: 0.99, 2.64). Male farmers who had experienced pesticide poisoning in their lifetime showed higher odds of risk-accepting personality traits (OR=2.20, 95% CI: 1.03, 4.72) Conclusion: Risk-acceptors were more likely to spray pesticides frequently and to experience more pesticide poisoning compared to risk-averse individuals. This result suggests that farming hazards are to some degree driven by risk-accepting personality traits. Further investigation of how risk-accepting behaviors influence farming practices and pesticide poisoning is needed.

A study on the influence of information security in selecting smart-phone (정보보안이 스마트폰 선택에 미치는 영향에 관한 연구)

  • Ahn, Jong-Chang;Lee, Seung-Won;Lee, Ook;Cho, Sung-Phil
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.207-214
    • /
    • 2014
  • Recently, smartphone spyware resembles various types of virus components in PCs and has trends getting more and more severe. Users do not perceive the risk factors severely even if smartphone security is very vulnerable in spite of the smartphone spyware growth. Thus, this study observes the influence of information security in selecting smartphone based on the personal inclinations and spyware perceptions. The main variables of study model are such as the degree of personal risk-accepting and the risk of smartphone spyware as independent variables and smartphone purchasing intention as a dependent variable. The model is tested using SPSS 21 packages on the effective 200 samples gathered through questionnaire survey on the present smartphone users. As a result, the two main hypotheses which are "the degree of personal risk-accepting will influence on the perceiving risk of smartphone spyware" and "the perceiving risk of smartphone spyware will influence on smartphone purchasing intention" were significant statistically. Therefore, we could find out information security's influence on the selecting smartphone.

Maternal Transition in Mothers with High Risk Newborns (고위험 신생아 어머니의 모성전환 과정)

  • 신현정
    • Journal of Korean Academy of Nursing
    • /
    • v.34 no.2
    • /
    • pp.243-251
    • /
    • 2004
  • Purpose: The purpose of this study was a comprehensive understanding about maternal transition in mothers with high risk newborns according to the degree of situational meaning. Method: A methodological triangulation that combines qualitative and quantitative methods was used. The situational meaning of a high risk newborn mother was identified using a Family Meaning Attribution Scale. According to the degree of situational meaning, in-depth interviews were conducted at 3 time periods postpartum: between 3-10 days after childbirth, around the time of the newborn's discharge, and between 10-12 weeks after childbirth. Quantitative data was analyzed using descriptive statistics and t-test. Qualitative data was analyzed using Tutty, Rothery, & Grinnell's methodology. Result: The average score of the situational meaning in high the risk newborn mother was 53.57(possible score is between 0-96) and the average score of each item was 1.67. A Maternal transition process in the mother that has a positive situational meaning was conceptualized in three distinctive phases: confusion, accepting, and shaping phases. The Maternal transition process in the mother that has a negative situational meaning was also conceptualized in three distinctive phases: avoiding, conflicting, and accepting phases. Conclusion: It is necessary that the nurses provide high risk newborn mothers with individualized care considering both the situational meaning that is attributed to them and the maternal transition phase that they are faced with.

A Risk Analysis Methodology for Information Systems Security Management (정보시스템 보안관리를 위한 위험분석 방법론)

  • 이문구
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.41 no.6
    • /
    • pp.13-22
    • /
    • 2004
  • This study proposes a risk analysis methodology for information system security management in which the complexity on the procedure that the existing risk analysis methodology is reduced to the least. The proposed risk analysis methodology is composed of 3 phases as follows: beforehand processing phase, counter measure setting phase, post processing phase. The basic risk analysis phase is a basic security management phase in which fixed items are checked when the information security system is not yet established or a means for the minimum security control is necessary for a short period of time. In the detailed risk analysis phase, elements of asset a vulnerability, and threat are analysed, and using a risk degree production table produced from these elements, the risk degree is classified into 13 cases. In regard to the risk, the 13 types of risk degree will execute physical, administrative, and technical measures through ways such as accepting, rejecting, reducing, and transferring. Also, an evaluation on a remaining risk of information system is performed through a penetration test, and security policy set up and post management phase is to be carried out.

A Basic Study on the Railway Safety Management Based on Risk Assessment Approach (위험도 평가기법을 적용한 철도시스템의 안전관리)

  • Kim Sang Am;Wang Jong Bae;Kwak Sang Log;Lee Dong Ha
    • Proceedings of the KSR Conference
    • /
    • 2003.10b
    • /
    • pp.223-228
    • /
    • 2003
  • Risk Management does not mean accepting a risk but having a good grasp of, eliminating and controling the exact causes of known hazards. Good safety management plan or system for the safety of any systems need to include the procedures about standing safety goals, related technical information, time schedule, audit programs, etc at least. In this paper the summeries on general risk assessment techniques and the examples of risk assessment system and railway risk management strategies used in UK, Australia and Canada are introduced, and applicable establishment procedures for domestic railway industries are proposed.

  • PDF

Factors on Internet Game Addiction among Adolescents (청소년의 인터넷게임 중독 영향 요인)

  • Park, Hyun-Sook;Kwon, Yun-Hee;Park, Kyung-Min
    • Journal of Korean Academy of Nursing
    • /
    • v.37 no.5
    • /
    • pp.754-761
    • /
    • 2007
  • Purpose: The purpose of this study was to explore factors related to internet game addiction for adolescents. Method: This study was a cross-sectional survey, and data was collected through self-report questionnaires. Data was analyzed using the SPSS program. Results: In logistic regression analysis, the risk of being addicted to internet games was 2.22 times higher in males than females. Adolescents with low and middle academic performance also had a higher risk(2.08 times and 2.54 times) to become addicted to internet games. For the location of the computer, the risk of becoming addicted to internet games were .01 times lower in the living room or brother or sisters' room than in their own room. The risk of becoming addicted to internet games was 1.18 times higher in the higher usage time of internet games. The risk of becoming addicted to internet games was .49 times lower in the more accepting and autonomic parents' rearing attitude and .02 times lower in the high self-efficacy group than the low group. Conclusion: The result of this study suggests that there are noticeable relationships between internet game addiction and gender, academic performance, location of computer, usage time of internet games, parents' rearing attitude, and self efficacy.

A Study on the Statistical Model Validation using Response-adaptive Experimental Design (반응적응 시험설계법을 이용하는 통계적 해석모델 검증 기법 연구)

  • Jung, Byung Chang;Huh, Young-Chul;Moon, Seok-Jun;Kim, Young Joong
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2014.10a
    • /
    • pp.347-349
    • /
    • 2014
  • Model verification and validation (V&V) is a current research topic to build computational models with high predictive capability by addressing the general concepts, processes and statistical techniques. The hypothesis test for validity check is one of the model validation techniques and gives a guideline to evaluate the validity of a computational model when limited experimental data only exist due to restricted test resources (e.g., time and budget). The hypothesis test for validity check mainly employ Type I error, the risk of rejecting the valid computational model, for the validity evaluation since quantification of Type II error is not feasible for model validation. However, Type II error, the risk of accepting invalid computational model, should be importantly considered for an engineered products having high risk on predicted results. This paper proposes a technique named as the response-adaptive experimental design to reduce Type II error by adaptively designing experimental conditions for the validation experiment. A tire tread block problem and a numerical example are employed to show the effectiveness of the response-adaptive experimental design for the validity evaluation.

  • PDF

A Study on the Influence of Information Security on Consumer's Preference of Android and iOS based Smartphone (정보보안이 안드로이드와 iOS 기반 스마트폰 소비자 선호에 미치는 영향)

  • Park, Jong-jin;Choi, Min-kyong;Ahn, Jong-chang
    • Journal of Internet Computing and Services
    • /
    • v.18 no.1
    • /
    • pp.105-119
    • /
    • 2017
  • Smartphone users hit over eighty-five percentage of Korean populations and personal private items and various information are stored in each user's smartphone. There are so many cases to propagate malicious codes or spywares for the purpose of catching illegally these kinds of information and earning pecuniary gains. Thus, need of information security is outstanding for using smartphone but also user's security perception is important. In this paper, we investigate about how information security affects smartphone operating system choices by users. For statistical analysis, the online survey with questionnaires for users of smartphones is conducted and effective 218 subjects are collected. We test hypotheses via communalities analysis using factor analysis, reliability analysis, independent sample t-test, and linear regression analysis by IBM SPSS statistical package. As a result, it is found that hardware environment influences on perceived ease of use. Brand power affects both perceived usefulness and perceived ease of use and degree of personal risk-accepting influences on perception of smartphone spy-ware risk. In addition, it is found that perceived usefulness, perceived ease of use, degree of personal risk-accepting, and spy-ware risk of smartphone influence significantly on intention to purchase smartphone. However, results of independent sample t-test for each operating system users of Android or iOS do not present statistically significant differences among two OS user groups. In addition, each result of OS user group testing for hypotheses is different from the results of total sample testing. These results can give important suggestions to organizations and managers related to smartphone ecology and contribute to the sphere of information systems (IS) study through a new perspective.

Tabu Search Heuristics for Solving a Class of Clustering Problems (타부 탐색에 근거한 집락문제의 발견적 해법)

  • Jung, Joo-Sung;Yum, Bong-Jin
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.23 no.3
    • /
    • pp.451-467
    • /
    • 1997
  • Tabu search (TS) is a useful strategy that has been successfully applied to a number of complex combinatorial optimization problems. By guiding the search using flexible memory processes and accepting disimproved solutions at some iterations, TS helps alleviate the risk of being trapped at a local optimum. In this article, we propose TS-based heuristics for solving a class of clustering problems, and compare the relative performances of the TS-based heuristic and the simulated annealing (SA) algorithm. Computational experiments show that the TS-based heuristic with a long-term memory offers a higher possibility of finding a better solution, while the TS-based heuristic without a long-term memory performs better than the others in terms of the combined measure of solution quality and computing effort required.

  • PDF

A Study on the Oil Pollution Compensation System in Korea (우리나라 유류오염보상제도에 관한 고찰)

  • 서동오
    • Journal of the Korean Institute of Navigation
    • /
    • v.17 no.4
    • /
    • pp.73-87
    • /
    • 1993
  • As a result of accepting the '71 FUND Convention and enforcing the Oil Pollution Compensation Act 1992, we observed some benefits and costa. This paper analyses those benefits and costs and suggests se-veral key policy recommendations for the estasblishment of an effective oil pollution compensation regime in Korea. This paper identifies the said benefits and costs as follows : First, by establishing the oil pollu-tion compensation system as same as the international level, most of small and medium size of oil pollution damage which are caused by coastal tankers will be compensated by FUND. Second, most of oil pollution damage which are not covered by '69 CLC will be compensated by FUND. Third, some parts of FUND Contribution Fee and CRISTAL Contribution Fee to be charged by major oil companies will be doubled. However the limit of international oil pollution compensation system and the loophole outside the Oil Pol-lution Compensation Act 1992 suggest followings : 1) Radical risk management and insurance manage-ment of ocean going tanker owners, 2) Establishment of oil pollution claim settlement system, 3) Enforce-ment of crew and ship management for coastal tanker and 4) Establishment of Korean P & I Club.

  • PDF