• Title/Summary/Keyword: 사회통제이론

Search Result 182, Processing Time 0.027 seconds

Analysis of Features Related to Authentic Science Inquiry Appear in Open-ended Activities of the Elementary Science-gifted Students (초등과학 영재학생의 개방적 탐구 활동에서 나타난 참과학탐구의 특정 분석)

  • Kang, Eun-Ju;Kim, Sun-Ja;Park, Jong-Wook
    • Journal of Gifted/Talented Education
    • /
    • v.19 no.3
    • /
    • pp.647-667
    • /
    • 2009
  • This study intends to analyze open-ended inquiry activities of elementary science-gifted students in terms of how similar they are to authentic science inquiry and suggest desirable ways to make more effective programs for the gifted. For this study, we selected a small group with five elementary science-gifted students who had participated in the open inquiry program of summer camp held in the Institute for Science Gifted Education and collected data through recording and video-taping their discussion and performance from planning to coordinating inquiry results. The data was analyzed in terms of epistemological features and cognitive process in authentic science inquiry. The results is as follows. In terms of epistemology, students' inquiry methods were theory laden and they constructed knowledge in collaborative groups. For example, the students often discussed about performing the thought experiment and scientific concept related to inquiry task or their opinion. And in terms of cognitive process, their designing inquiry was similar to authentic science inquiry especially selecting variables, planning procedures, controlling variables, planning measures.

Analyzing Impact Factors of User Resistance to Accepting Paid Mobile Application (유료 모바일 애플리케이션 수용 저항 요인에 관한 분석)

  • Song, Seong-Beom;Kang, Ju-Young;Lee, Sang-Gun
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.4
    • /
    • pp.361-375
    • /
    • 2013
  • While the mobile application market is growing fast, the revenues of the majority apps are declining. Moreover, paid mobile application prices and purchases have been slow because of intensifying competition. However, the conventional studies focused only on the acceptance factor of mobile applications, so they cannot explain the phenomenon such as acceptance resistance for paid mobile applications. Therefore, our study tries to analyze the factors for the acceptance resistance of users for paid mobile applications. The research model in this paper, which is based on S-O-R model, verified through surveys how social influence and app characteristics affect user perception and how user perception affects to app resistance. The results of our study showed that paid mobile applications happened to be destroyed in front of the chasm because of the perceived loss. Consequently, the results implicate that the developers should lower the initial price and actively react to the negative reviews in order to lower the perceived loss. Moreover, the results verified that a sense of self-efficacy can lower application acceptance resistance by including personal properties to our research model as control variables.

The Effects of Time Monitoring and Goal Orientation on Persuasion (시간 모니터링과 목표지향이 설득에 미치는 영향)

  • Min, Dongwon
    • Journal of Digital Convergence
    • /
    • v.18 no.8
    • /
    • pp.103-109
    • /
    • 2020
  • The aim of this research is to investigate the effect of how individuals monitor the time in their life on persuasion and the moderating role of goal orientation and types of persuasive message in the relationship between time monitoring and persuasion. By controlling participants' time horizon perspectives (THPs), an experiment using a 2 (THP: limited vs. expansive) × 3 (goal orientation: approach vs. avoidance vs. control) × 2 (message type: emotional vs. knowledge-related) between-subjects design was conducted.. Results showed that when participants with limited THP, those who oriented avoidance goals were more favorable to knowledge-related messages, whereas those who oriented approach goals preferred emotional messages. Participants with expansive THP were more persuaded by knowledge-related messages, regardless of pursuing goal types.

The Effects of Parent's Positive Perception of Parenting Children with Disabilities on Family Adaptation -Focusing on the Mediating Effect of Empowerment - (장애자녀 양육경험 인식이 가족적응에 미치는 영향 - 임파워먼트의 매개효과 -)

  • Kim, Su Jeong
    • 재활복지
    • /
    • v.17 no.4
    • /
    • pp.79-101
    • /
    • 2013
  • This research investigated the relationship between the parent's positive perception of parenting children with disabilities and family adaptation, and the mediating effect of empowerment on the relationship. For this research, data from 189 parents of children with disabilities who had used social service facilities and a school for the disability. There are the research results. First, the level of empowerment and positive perception are both high and were different between father and mother. The level of Self-efficacy is highest among sub-factors of empowerment. The parent's positive perception of parenting children with disabilities was positively correlated with empowerment. The empowerment and parent's positive perception had an direct effect on the family adaptation. On the verification of the effect of empowerment as the mediator, the empowerment variable revealed possessing the partial mediating effect. Therefore, this study suggest for the practical promotion about empowerment and parent's positive perception of parenting children with disabilities.

Development and Effectiveness Verification of Inner Family System(IFS) Program to Reduce Job Stress of Telephone Counselor (전화상담자의 직무스트레스 감소를 위한 내면가족체계(IFS) 프로그램 개발 및 효과 검증)

  • Lee, Jung-mi
    • Industry Promotion Research
    • /
    • v.7 no.3
    • /
    • pp.131-137
    • /
    • 2022
  • This study is to develop a program based on IFS theory to reduce job stress and psychological exhaustion experienced by telephone counselors in the counseling field, and to verify the effectiveness. After selecting 9 people in advance and conducting a demand survey, detailed program activities, content organization, and validity were reviewed. And preliminary research was conducted with experts, and the final program was composed of evaluation, correction, and supplementation. To verify the effectiveness of the program, 10 people from the experimental group and 10 people from the control group were selected for voluntarily participating telephone counselors. As a result of the study, first, the overall job stress and its sub-factors, 'overwork', 'difficult clients', and 'social expectations of counselors' scores decreased statistically significantly. Second, 'physical fatigue', 'non-cooperative work environment', 'decreased client value', and 'deterioration of privacy', which are sub-factors of psychological exhaustion, significantly decreased. Third, the IFS score decreased significantly according to the IFS application program.

Improving the Security Policy Based on Data Value for Defense Innovation with Science and Technology (과학기술 중심 국방혁신을 위한 데이터 가치 기반 보안정책 발전 방향)

  • Heungsoon Park
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.109-115
    • /
    • 2023
  • The future outlook for defense faces various and challenging environments such as the acceleration of uncertainty in the global security landscape and limitations in domestic social and economic conditions. In response, the Ministry of National Defense seeks to address the problems and threats through defense innovation based on scientific and technological advancements such as artificial intelligence, drones, and robots. To introduce advanced AI-based technology, it is essential to integrate and utilize data on IT environments such as cloud and 5G. However, existing traditional security policies face difficulties in data sharing and utilization due to mainly system-oriented security policies and uniform security measures. This study proposes a paradigm shift to a data value-based security policy based on theoretical background on data valuation and life-cycle management. Through this, it is expected to facilitate the implementation of scientific and technological innovations for national defense based on data-based task activation and new technology introduction.

A Study on National Response Strategies of Large-scale Marine Disaster (대규모 해양재난의 국가적 대응전략에 관한 연구)

  • Lee, Choonjae
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.25 no.5
    • /
    • pp.550-559
    • /
    • 2019
  • The sinking of the M/V SEWOL in April 2014 was not a mere marine accident, but a marine catastrophe. This grim case developed into a social tragedy that impinged the national sentiment and communal integrity. It is imperative that thorough provisions and measures be outlined at the national level with regard to massive marine accidents, oil pollution, and natural disasters that might critically affect government affairs. Pivoting on "The Black Swan Theory," a concept of improperly rationalizing a national crisis based on uncertainties, this research assesses a variety of response strategies that minimize the national economic and social damage caused by a large-scale marine disaster. Along with the effort of minimizing any potential defects in each protective barrier, the "Black Swan Detection System of the Marine Disaster" needs to be incorporated to prevent cases wherein such defects lead to an actual crisis. Maritime safety must be systematically unified under a supervisory organization, and a structure for maritime crisis on-scene command and cooperation must likewise be established in order that every force on the scene of a marine disaster may act effectively and consistently under the direction of an on-scene commander.

Does Artificial Intelligence Algorithm Discriminate Certain Groups of Humans? (인공지능 알고리즘은 사람을 차별하는가?)

  • Oh, Yoehan;Hong, Sungook
    • Journal of Science and Technology Studies
    • /
    • v.18 no.3
    • /
    • pp.153-216
    • /
    • 2018
  • The contemporary practices of Big-Data based automated decision making algorithms are widely deployed not just because we expect algorithmic decision making might distribute social resources in a more efficient way but also because we hope algorithms might make fairer decisions than the ones humans make with their prejudice, bias, and arbitrary judgment. However, there are increasingly more claims that algorithmic decision making does not do justice to those who are affected by the outcome. These unfair examples bring about new important questions such as how decision making was translated into processes and which factors should be considered to constitute to fair decision making. This paper attempts to delve into a bunch of research which addressed three areas of algorithmic application: criminal justice, law enforcement, and national security. By doing so, it will address some questions about whether artificial intelligence algorithm discriminates certain groups of humans and what are the criteria of a fair decision making process. Prior to the review, factors in each stage of data mining that could, either deliberately or unintentionally, lead to discriminatory results will be discussed. This paper will conclude with implications of this theoretical and practical analysis for the contemporary Korean society.

Ubiquitous Sensor Network Application Strategy of Security Companies (시큐리티업체의 유비쿼터스 센서네트워크(USN) 응용전략)

  • Jang, Ye-Jin;An, Byeong-Su;Ju, Choul-Hyun
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.75-94
    • /
    • 2009
  • Since mechanical security systems are mostly composed of electronic, information and communication devices, they have effects in the aspects of overall social environment and crime-oriented environment. Also, the importance is increasing for wireless recognition of RFID and tracing function, which will be usefully utilized in controlling the incomings and outgoings of people/vehicles or allowance, surveillance and control. This is resulting from the increase in the care for the elderly according to the overall social environment, namely, the aging society, and the number of women entering, as well as the increase in the number of heinous crimes. The purpose of this study is to examine the theoretical considerations on ubiquitous sensor network and present a direction for securities companies for their development by focusing on the technological and application areas. To present strategies of response to a new environment for security companies, First, a diversification strategy is needed for security companies. The survival of only high level of security companies in accordance with the principle of liberal market competition will bring forth qualitative growth and competitiveness of security market. Second, active promotion by security companies is needed. It is no exaggeration to say that we are living in the modern society in the sea of advertisements and propaganda. The promotional activities that emphasize the areas of activity or importance of security need to be actively carried out using the mass media to change the aware of people regarding security companies, and they need to come up with a plan to simultaneously carry out the promotional activities that emphasize the public aspect of security by well utilizing the recent trend that the activities of security agents are being used as a topic in movies or TV dramas. Third, technically complementary establishment of ubiquitous sensor network and electronic tag is needed. Since they are used in mobile electronic tag services such as U-Home and U-Health Care, they are used throughout our lives by forming electronic tag environment within safe ubiquitous sensor network based on the existing privacy guideline for the support of mobile electronic tag terminal commercialization, reduction in communication and information usage costs, continuous technical development and strengthening of privacy protection, and the system of cooperation of academic-industrial-research needs to be established among the academic world and private research institutes for these parts.

  • PDF

Open Collaboration Innovation Methodology (OCIM) : A Methodology for New Service Development (개방형 협업을 통한 서비스 혁신 방법론)

  • Lee, Zoon-Ky;Lee, Min-He;Chu, Yo-Han
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.1
    • /
    • pp.49-70
    • /
    • 2011
  • While new service development has become one of the most popular topics among practitioners and academics, methodologies development for new service development is only in its infancy. Especially, despite the growing interests in open innovations that effectively utilize external resources for R&D, existing research on new service development methodology designed to use external resources is scant. This article proposes a new methodology to generate new service business models that utilize massive external resources in combination with internal resources using ICT. The "Open Collaboration Innovation Methodology (OCIM)" is built based upon the theory of open innovation model and social psychology theories on behavioral motivation for cooperation. The model begins with the procedures to identify external resources that meet service objectives and requirements, and suggests motivation, control and monitoring mechanisms to implement a new service model. A business case is followed to demonstrate the use of the model. We expect that this model can be practically used by companies that are planning for developing new business models, and will provide a better understanding on open collaboration models, collective intelligence and crowd sourcing models.