• 제목/요약/키워드: Compliance Behaviour

검색결과 26건 처리시간 0.025초

모바일 뱅킹 이용자의 개인정보 유출사고 인지가 개인정보관리 준수행동에 미치는 영향에 대한 사전 연구 (A Preliminary Research on the Impact of Perception of Personal Information Leakage Incidents on the Behavior of Individual Information Management in the Mobile Banking Contexts)

  • 김정덕;임세헌
    • 정보보호학회논문지
    • /
    • 제26권3호
    • /
    • pp.735-744
    • /
    • 2016
  • 최근 모바일 서비스 증가와 함께 다양한 개인정보 유출사고가 증가하고 있다. 개인정보 유출사고는 개인의 모바일 뱅킹 서비스 이용에 중요한 영향을 미친다. 이에 따라 본 연구에서는 다양한 개인정보 유출사고 인지가 모바일 뱅킹 이용자의 심리와 행동에 미치는 영향관계를 살펴보았다. 본 연구에서는 모바일 뱅킹 이용자의 심리와 행동 이해를 위해 인간의 심리와 행동을 설명해주는 대인행동이론과 외부 자극에 대한 반응 결과를 설명해주는 자극반응이론을 활용하였다. 본 연구자들은 모바일 뱅킹 이용자들을 대상으로 온라인을 통해 설문조사를 수행하였고, 구조방정식 모델을 통해 인과관계를 분석하였다. 본 연구결과는 모바일 뱅킹 서비스를 제공하는 금융기관에서 개인정보보호 관련 준수의도와 준수행동을 강화하는데 유용하게 활용될 것이다.

단기노화 된 아스팔트 바인더의 유변학적 거동 특성에 관한 연구 (A Study on the Rheological Behavior Properties of Short-term Aged Asphalt Binder)

  • 박태순
    • 한국도로학회논문집
    • /
    • 제7권4호
    • /
    • pp.203-210
    • /
    • 2005
  • 바인더의 노화로 인한 성능변화는 침입도 또는 점도시험을 실시하여 판정하여왔다. 기존의 시험방법으로 아스팔트 바인더의 점탄성 특성과 실제거동을 평가할 수 없기 때문에 새로운 분석방법이 요구되어 왔다. 본 연구에서는 기존시험 방법을 사용하여 침입도지수와 잔류침입도를 판정하였고, 양방향 반복회전 모드와 일방향 반복회전 모드 시험을 실시하여 단기 노화된 아스팔트 바인더의 유변학적 특성을 분석하였다. 시험결과 단기 노화된 아스팔트 바인더는 시험주기(frequency) 즉, 차량속도의 변화에 따라 서로 다른 복합계수와 위상각을 나타냈으며 단기 노화 전후의 크리프 컴플라이언스 및 전단점도 시험결과에도 영향을 미치는 것으로 나타나서 포장 설계시 이러한 특성이 고려되어야 한다.

  • PDF

Numerical simulation of hollow steel profiles for lightweight concrete sandwich panels

  • Brunesi, E.;Nascimbene, R.;Deyanova, M.;Pagani, C.;Zambelli, S.
    • Computers and Concrete
    • /
    • 제15권6호
    • /
    • pp.951-972
    • /
    • 2015
  • The focus of the present study is to investigate both local and global behaviour of a precast concrete sandwich panel. The selected prototype consists of two reinforced concrete layers coupled by a system of cold-drawn steel profiles and one intermediate layer of insulating material. High-definition nonlinear finite element (FE) models, based on 3D brick and 2D interface elements, are used to assess the capacity of this technology under shear, tension and compression. Geometrical nonlinearities are accounted via large displacement-large strain formulation, whilst material nonlinearities are included, in the series of simulations, by means of Von Mises yielding criterion for steel elements and a classical total strain crack model for concrete; a bond-slip constitutive law is additionally adopted to reproduce steel profile-concrete layer interaction. First, constitutive models are calibrated on the basis of preliminary pull and pull-out tests for steel and concrete, respectively. Geometrically and materially nonlinear FE simulations are performed, in compliance with experimental tests, to validate the proposed modeling approach and characterize shear, compressive and tensile response of this system, in terms of global capacity curves and local stress/strain distributions. Based on these experimental and numerical data, the structural performance is then quantified under various loading conditions, aimed to reproduce the behaviour of this solution during production, transport, construction and service conditions.

합성암반체 접근법에 대한 고찰 (Review of the Synthetic Rock Mass Approach)

  • 박철환;신중호;박의섭
    • 터널과지하공간
    • /
    • 제17권6호
    • /
    • pp.438-447
    • /
    • 2007
  • 본 기술보고서는 Lisbon에서 개최된 2007 ISRM Congress에서 발표된 논문을 소개한 것이다. 이는 SRM(합성암반체)에 관한 연구결과이며, 이의 중요성과 향후 잠재력을 강조하고 있는 Fairhurst 교수가 직접 발표한 논문이다. 절리 암반의 특성을 규명하는 SRM 접근법은 현존하는 경험적 접근법이나 절리 암반의 거동에 대한 현재의 이해정도와 관련지어 재검토된다. 이 재검토 논문에서 절리 암반의 역학적 거동에 영향을 미치는 주요 요소들이 어떻게 고려되는가를 기술하며, 또 SRM 접근법이 상당히 발전되어 현장에 적용된 사례를 보여준다. PFC-3D에서 BP 모델링과 DFN 모사법 등의 두개의 잘 정립된 방법에 기초를 두고 있는 이 기법은 새로운 미끄러지는 절리모델을 사용한다. 이 모델은 모든 응력경로에 의하여 힘을 받고 있는 수천개의 기존 절리를 포함하는 대규모 암반체를 모사할 수 있게 하는 것이다. 암반의 강도 및 취성도, 완전 순응 행렬의 전개, 그리고 초기의 파쇄 등이 SRM 시험에서 얻어지는 결과이다.

Seismic retrofitting by base-isolation of r.c. framed buildings exposed to different fire scenarios

  • Mazza, Fabio;Mazza, Mirko
    • Earthquakes and Structures
    • /
    • 제13권3호
    • /
    • pp.267-277
    • /
    • 2017
  • Base-isolation is now being adopted as a retrofitting strategy to improve seismic behaviour of reinforced concrete (r.c.) framed structures subjected to far-fault earthquakes. However, the increase in deformability of a base-isolated framed building may lead to amplification in the structural response under the long-duration horizontal pulses of high-magnitude near-fault earthquakes, which can become critical once the strength level of a fire-weakened r.c. superstructure is reduced. The aim of the present work is to investigate the nonlinear seismic response of fire-damaged r.c. framed structures retrofitted by base-isolation. For this purpose, a five-storey r.c. framed building primarily designed (as fixed-base) in compliance with a former Italian seismic code for a medium-risk zone, is to be retrofitted by the insertion of elastomeric bearings to meet the requirements of the current Italian code in a high-risk seismic zone. The nonlinear seismic response of the original (fixed-base) and retrofitted (base-isolated) test structures in a no fire situation are compared with those in the event of fire in the superstructure, where parametric temperature-time curves are defined at the first level, the first two and the upper levels. A lumped plasticity model describes the inelastic behaviour of the fire-damaged r.c. frame members, while a nonlinear force-displacement law is adopted for the elastomeric bearings. The average root-mean-square deviation of the observed spectrum from the target design spectrum together with a suitable intensity measure are chosen to select and scale near- and far-fault earthquakes on the basis of the design hypotheses adopted.

Corporate Social Responsibility in Modern Transnational Corporations

  • Vitalii Nahornyi;Alona Tiurina;Olha Ruban;Tetiana Khletytska;Vitalii Litvinov
    • International Journal of Computer Science & Network Security
    • /
    • 제24권5호
    • /
    • pp.172-180
    • /
    • 2024
  • Since the beginning of 2015, corporate social responsibility (CSR) models have been changing in connection with the trend towards the transition of joint value creation of corporate activities and consideration of stakeholders' interests. The purpose of the academic paper lies in empirically studying the current practice of social responsibility of transnational corporations (TNCs). The research methodology has combined the method of qualitative analysis, the method of cases of agricultural holdings in emerging markets within the framework of resource theory, institutional theory and stakeholders' theory. The results show that the practice of CSR is integrated into the strategy of sustainable development of TNCs, which determine the methods, techniques and forms of communication, as well as areas of stakeholders' responsibility. The internal practice of CSR is aimed at developing norms and standards of moral behaviour with stakeholders in order to maximize economic and social goals. Economic goals are focused not only on making a profit, but also on minimizing costs due to the potential risks of corruption, fraud, conflict of interest. The system of corporate social responsibility of modern TNCs is clearly regulated by internal documents that define the list of interested parties and stakeholders, their areas of responsibility, greatly simplifying the processes of cooperation and responsibility. As a result, corporations form their own internal institutional environment. Ethical norms help to avoid the risks of opportunistic behaviour of personnel, conflicts of interest, cases of bribery, corruption, and fraud. The theoretical value of the research lies in supplementing the theory of CSR in the context of the importance of a complex, systematic approach to integrating the theory of resources, institutional theory, theory of stakeholders in the development of strategies for sustainable development of TNCs, the practice of corporate governance and social responsibility.

A review: Synthetic strategy control of magnetite nanoparticles production

  • Yusoff, Ahmad H.M.;Salimi, Midhat N.;Jamlos, Mohd F.
    • Advances in nano research
    • /
    • 제6권1호
    • /
    • pp.1-19
    • /
    • 2018
  • Iron oxide nanoparticles excite researcher interest in biomedical applications due to their low cost, biocompatibility and superparamagnetism properties. Magnetic iron oxide especially magnetite ($Fe_3O_4$) possessed a superparamagnetic behaviour at certain nanosize which beneficial for drug and gene delivery, diagnosis and imaging. The properties of nanoparticles mainly depend on their synthesis procedure. There has been a massive effort in developing the best synthetic strategies to yield appropriate physico-chemical properties namely co-precipitation, thermal decomposition, microemulsions, hydrothermal and sol-gel. In this review, it is discovered that magnetite nanoparticles are best yielded by co-precipitation method owing to their simplicity and large production. However, its magnetic saturation is within range of 70-80 emu/g which is lower than thermal decomposition and hydrothermal methods (80-90 emu/g) at 100 nm. Dimension wise, less than 100 nm is produced by co-precipitation method at $70^{\circ}C-80^{\circ}C$ while thermal decomposition and hydrothermal methods could produce less than 50 nm but at very high temperature ranging between $200^{\circ}C$ and $300^{\circ}C$. Thus, co-precipitation is the optimum method for pre-compliance magnetite nanoparticles preparation (e.g., 100 nm is fit enough for biomedical applications) since thermal decomposition and hydrothermal required more sophisticated facilities.

Scattering of torsional surface waves in a three layered model structure

  • Gupta, Shishir;Pati, Prasenjit;Mandi, Anand;Kundu, Santimoy
    • Structural Engineering and Mechanics
    • /
    • 제68권4호
    • /
    • pp.443-457
    • /
    • 2018
  • In this article, a comparative study has been made to investigate the scattering behaviour of three layered structure model on torsional surface wave. For such model intermediate layer is taken as fiber reinforced composite, resting over a dry sandy Gibson substratum and underlying by different anelastic media. We consider two distinct mediums for topmost layer. In the first case, topmost layer has been taken as fluid saturated homogeneous porous layer, while in the second case the fluid saturated porous layer has been replaced by a transversely isotropic layer. Simple form expression for the secular equation of torsional surface wave has been worked out in both the cases by executing specific boundary conditions, which comprises Whittaker's function and its derivative, for imminent result that have been elaborated asymptotically. Some special cases have been constituted which are in excellent compliance with recorded literatures. For the sake of comparative study, numerical estimation and graphical illustration have been accomplished to identify the effects of the width ratio of the layers, Biot's gravity parameter, sandy parameter, porosity parameter and other heterogeneity parameters corresponding to the layers and half spaces, horizontal compressive and tensile initial stress on the phase velocity of torsional surface wave.

미국/영국 정보기관의 무차별 정보수집행위: 인터넷과 법치주의의 위기 (Massive Surveillance by US-UK intelligence services : Crisis of the Internet and the Rule of Law)

  • 김기창
    • 인터넷정보학회지
    • /
    • 제14권3호
    • /
    • pp.78-85
    • /
    • 2013
  • The revelations made possible by Edward Snowden, a contractor of the US intelligence service NSA, are a sobering reminder that the Internet is not an 'anonymous' means of communication. In fact, the Internet has never been conceived with anonymity in mind. If anything, the Internet and networking technologies provide far more detailed and traceable information about where, when, with whom we communicate. The content of the communication can also be made available to third parties who obtain encryption keys or have the means of exploiting vulnerabilities (either by design or by oversight) of encryption software. Irrebuttable evidence has emerged that the US and the UK intelligence services have had an indiscriminate access to the meta-data of communications and, in some cases, the content of the communications in the name of security and protection of the public. The conventional means of judicial scrutiny of such an access turned out to be ineffectual. The most alarming attitude of the public and some politicians is "If you have nothing to hide, you need not be concerned." Where individuals have nothing to hide, intelligence services have no business in the first place to have a peek. If the public espouses the groundless assumption that State organs are benevolent "( they will have a look only to find out whether there are probable grounds to form a reasonable suspicion"), then the achievements of several hundred years of struggle to have the constitutional guarantees against invasion into privacy and liberty will quickly evaporate. This is an opportune moment to review some of the basic points about the protection of privacy and freedom of individuals. First, if one should hold a view that security can override liberty, one is most likely to lose both liberty and security. Civilized societies have developed the rule of law as the least damaging and most practicable arrangement to strike a balance between security and liberty. Whether we wish to give up the rule of law in the name of security requires a thorough scrutiny and an informed decision of the body politic. It is not a decision which can secretly be made in a closed chamber. Second, protection of privacy has always depended on human being's compliance with the rules rather than technical guarantees or robustness of technical means. It is easy to tear apart an envelope and have a look inside. It was, and still is, the normative prohibition (and our compliance) which provided us with protection of privacy. The same applies to electronic communications. With sufficient resources, surreptitiously undermining technical means of protecting privacy (such as encryption) is certainly 'possible'. But that does not mean that it is permissible. Third, although the Internet is clearly not an 'anonymous' means of communication, many users have a 'false sense of anonymity' which make them more vulnerable to prying eyes. More effort should be made to educate the general public about the technical nature of the Internet and encourage them to adopt user behaviour which is mindful of the possibilities of unwanted surveillance. Fourth, the US and the UK intelligence services have demonstrated that an international cooperation is possible and worked well in running the mechanism of massive surveillance and infiltration into data which travels globally. If that is possible, it should equally be possible to put in place a global mechanism of judicial scrutiny over a global attempt at surveillance.

  • PDF

지적장애인 대상의 성교육 프로그램 현황과 과제 : 디지털 교육콘텐츠를 중심으로 (An Exploratory Study on Digital Contents-based Life-long Sex Education Program for Persons with Mental Retardation)

  • 박원희;최연숙;박성택
    • 디지털융복합연구
    • /
    • 제10권6호
    • /
    • pp.349-359
    • /
    • 2012
  • 본 연구에서는 현재 우리나라의 지적장애인 대상의 디지털 성교육 콘텐츠 프로그램과 현황을 살펴보고, 이에 따른 디지털 성교육 콘텐츠 구성에 대한 연령별 제안과 피셔의 성교육에 관한 정보 동기 행동 스킬 모형을 인적자원 개발에서 흔히 논의되는 역량(competency)이라는 개념의 모형을 적용 확장하여 성적역량(sexual competency) 이라는 목표 하에서 모형을 제시해 보았다. 또한 이러한 모형과 현황조사를 바탕으로 적절한 디지털 성교육 프로그램 개발을 위한 과제를 제시해 보았다.