• 제목/요약/키워드: Moral Action

검색결과 70건 처리시간 0.019초

A Mechanism to Derive Optimal Contractor-type & Action Comginations of a Single-source Procurement Contract

  • 정승호
    • 한국경영과학회지
    • /
    • 제24권2호
    • /
    • pp.41-51
    • /
    • 1999
  • In sole-source procurement contraction for government goods and services, the buyer (government) needs to derive the optimal actions from the contractor so the buyer can obtain the maximum utility and the contractor, or single-source supplier, is guaranteed the equivalent of a minimum level of profit. Under the assumption of risk-neutrality for both the buyer and the contractor and the buyer's unobservability of the contractor's action, it is necessary for the buyer to design a (mathematical) model to achieve the above objective. This paper considers the mathematical formulation in which two problems - moral hazard and adverse selection - are present simultaneously; furthermore, from the formulation, a GAMS (General Algebraic Modeling System) program is used for a possible buyer to obtain the optimal actions.

  • PDF

국내 간호대학생 간호윤리 교육 프로그램에 관한 통합적 문헌고찰 (An Integrative Review of Nursing Ethics Education Programs For Undergraduate Nursing Students)

  • 한달롱
    • 문화기술의 융합
    • /
    • 제6권1호
    • /
    • pp.55-62
    • /
    • 2020
  • 본 연구의 목적은 국내 간호대학생 간호윤리 교육 프로그램에 대한 중재 연구 고찰을 통해 향후 간호윤리 교육의 방향성을 제시하는 것이다. 연구방법으로 통합적 문헌고찰을 적용하였으며, 문제 규명, 문헌 검색, 자료 평가, 자료 분석, 자료 제시의 5단계에 따라 연구를 수행하였다. 분석에 포함된 연구는 12편으로 교육 내용은 생명의료윤리, 간호윤리에 대한 것이었고, 대부분이 교과목 수업을 통해 이루어졌다. 교육 방법은 전통식 강의를 포함하여 사례에 기반한 토론, 토의, 액션러닝, 온라인 학습, 문제기반학습 등이 활용되었다. 교육 프로그램을 통해 생명윤리의식, 윤리적 가치관, 도덕적 판단력, 도덕적 민감성 등의 유의한 증가가 있었다. 추후 간호윤리 교육은 대학 교과과정 안에서 단계적이고 지속적으로 제공되어야 할 것이다.

사회 혁신을 위한 디자인 씽킹과 액션러닝의 통합모형 (A Unified Model of Action Learning and Design Thinking for Social Innovation)

  • 박상혁;오승희;박정선;이명관
    • 벤처창업연구
    • /
    • 제11권2호
    • /
    • pp.89-100
    • /
    • 2016
  • 본 연구는 사회 혁신분야의 문제해결도구로 활용 비중이 커지고 있는 디자인 씽킹과 액션러닝 방법론을 비교분석하고 통합모델을 제시하는데 목적이 있다. 구체적으로 두 방법론의 프로세스 측면에서 유사점과 차이점을 비교, 분석하고, 두 방법론의 장점을 기반으로 통합된 방법론을 제시하고자 한다. 비교 분석 연구를 통해 제시된 통합모델은 디자인 씽킹 방법론의 완성도를 높이기 위하여 액션러닝의 팀빌딩과 성찰 프로세스 부분을 중점적으로 보완하였다. 또한 통합모델을 검증하기 위한 사례 연구를 통해 디자인 씽킹 방법만을 활용하는 경우보다 액션러닝이 가미된 통합모델이 더욱 우수한 성과 도출이 가능하다는 것을 통계적으로 검증하였다. 본 연구결과는 사회혁신 도구로 활용할 수 있는 디자인 씽킹과 액션러닝 방법론을 이해하는데 기여할 수 있으며, 두 방법론을 기반으로 수정된 통합모형을 제시함으로써 디자인 씽킹을 이용한 사회 혁신 전략의 질적 수준과 만족도를 향상시킬 수 있을 것이다.

  • PDF

기부행위에 대한 커뮤니케이션 행동의 영향요인 연구: 문제해결 상황이론의 확장을 토대로 (Factors Influencing Communicative Action on Donation Behavior: Based on the Extended Situational Theory of Problem Solving)

  • 박나림;성동규
    • 한국콘텐츠학회논문지
    • /
    • 제17권3호
    • /
    • pp.238-252
    • /
    • 2017
  • 디지털 미디어 환경에서 개인은 직면한 기부이슈에 대하여 보다 능동적으로 정보를 취득하고 선택하며 전달하며 기부이슈를 심화, 확산시키기도 한다. 이러한 미디어 이용의 변화로 기부행동연구에 다른 관점의 접근이 필요하게 되었다. 개인들은 직면한 기부 문제에 대해 더 잘 알고자하는 동기에 의해 문제와 관련된 커뮤니케이션 행동을 할 가능성이 있다. 또한 잠재적인 기부자의 인식특성과 커뮤니케이션 특성의 관계를 이해하는 것은 기부요청 전략에도 도움이 될 것이다. 따라서 본 연구는 문제해결 상황이론을 토대로 인식과 지각된 도덕적 책임감, 예기된 죄책감이 희귀난치병 어린이 문제해결을 위한 커뮤니케이션 행동에 미치는 영향을 살펴보고자 하였다. 연구 결과, 희귀난치병 어린이에 대한 문제인식이 높고, 자신과 관련되어 있다는 관여인식이 크며 문제해결에 대한 제약인식이 낮을수록 희귀난치병 어린이 문제 해결에 대해 더 잘 알고자하는 상황적 동기화가 활성화되었다. 이어 문제해결에 대한 개인적 판단기준인 준거지침과 상황적 동기화는 문제해결을 위한 커뮤니케이션 행동(정보수용, 정보선별, 정보공유, 정보전파, 정보주목, 정보추구)에 구별된 영향을 주었다. 즉, 상황적 동기화는 여섯 정보행동 모두에 정적인 영향력이 있는 반면, 준거지침은 적극적 정보행동(정보선별, 정보전파, 정보추구)에만 정적인 영향을 주었다. 또한 추가된 변인인 지각된 도덕적 책임감과 예기된 죄책감 역시 상황적 동기화에 정적인 영향을 주는 것으로 나타나 기부행위 연구 맥락에서 문제해결 상황이론의 독립변인의 확장 필요성을 제기한 본 연구를 뒷받침하였다.

금융회사의 고객정보보호에 대한 내부직원의 태도 연구 (The Behavioral Attitude of Financial Firms' Employees on the Customer Information Security in Korea)

  • 정우진;신유형;이상용
    • Asia pacific journal of information systems
    • /
    • 제22권1호
    • /
    • pp.53-77
    • /
    • 2012
  • Financial firms, especially large scaled firms such as KB bank, NH bank, Samsung Card, Hana SK Card, Hyundai Capital, Shinhan Card, etc. should be securely dealing with the personal financial information. Indeed, people have tended to believe that those big financial companies are relatively safer in terms of information security than typical small and medium sized firms in other industries. However, the recent incidents of personal information privacy invasion showed that this may not be true. Financial firms have increased the investment of information protection and security, and they are trying to prevent the information privacy invasion accidents by doing all the necessary efforts. This paper studies how effectively a financial firm will be able to avoid personal financial information privacy invasion that may be deliberately caused by internal staffs. Although there are several literatures relating to information security, to our knowledge, this is the first study to focus on the behavior of internal staffs. The big financial firms are doing variety of information security activities to protect personal information. This study is to confirm what types of such activities actually work well. The primary research model of this paper is based on Theory of Planned Behavior (TPB) that describes the rational choice of human behavior. Also, a variety of activities to protect the personal information of financial firms, especially credit card companies with the most customer information, were modeled by the four-step process Security Action Cycle (SAC) that Straub and Welke (1998) claimed. Through this proposed conceptual research model, we study whether information security activities of each step could suppress personal information abuse. Also, by measuring the morality of internal staffs, we checked whether the act of information privacy invasion caused by internal staff is in fact a serious criminal behavior or just a kind of unethical behavior. In addition, we also checked whether there was the cognition difference of the moral level between internal staffs and the customers. Research subjects were customer call center operators in one of the big credit card company. We have used multiple regression analysis. Our results showed that the punishment of the remedy activities, among the firm's information security activities, had the most obvious effects of preventing the information abuse (or privacy invasion) by internal staff. Somewhat effective tools were the prevention activities that limited the physical accessibility of non-authorities to the system of customers' personal information database. Some examples of the prevention activities are to make the procedure of access rights complex and to enhance security instrument. We also found that 'the unnecessary information searches out of work' as the behavior of information abuse occurred frequently by internal staffs. They perceived these behaviors somewhat minor criminal or just unethical action rather than a serious criminal behavior. Also, there existed the big cognition difference of the moral level between internal staffs and the public (customers). Based on the findings of our research, we should expect that this paper help practically to prevent privacy invasion and to protect personal information properly by raising the effectiveness of information security activities of finance firms. Also, we expect that our suggestions can be utilized to effectively improve personnel management and to cope with internal security threats in the overall information security management system.

  • PDF

행위유형과 책임문제 - 행위분석도를 통해 본 책임부여문제 - (Action Types and Responsibility)

  • 손경상
    • 철학연구
    • /
    • 제116권
    • /
    • pp.181-206
    • /
    • 2010
  • 우리는 흔히 인간은 자신의 행위를 선택하고 통제할 수 있는 자유의지를 지닌 존재이기 때문에 행위에 대해 그 책임을 물을 수 있다고 말한다. 인간의 행위는 자연현상처럼 단순한 움직임으로 파악될 수 없다. 행위에는 마음이 작용하여 매우 복잡한 내면의 과정을 거쳐 나타나기 때문이다. 인간의 행위는 인간의 내부와 외부로부터 다양한 영향을 받는다. 행위에 영향을 주는 다양한 내적 외적 요인들은 '자신의 자유의지로 선택하고 통제할 수 있는 영역', '통제가능한 영역으로 변환 될 수 있는 영역', '부분적으로 결정된 영역', 그리고 '선택이나 통제가 불가능한 완전히 결정된 영역'으로 나뉘어진다. 인간의 행위에 영향을 주는 내적 외적 요인들에는 자신의 자유의지로 선택되고 통제가능한 요인들이 있는 반면, 자신이 선택하거나 통제 할 수 없는 상당히 많은 요인들도 있다는 것에 우리는 주목해야 한다. 인간에게 자유의지가 있다는 사회통념에 의해, 자신이 선택하거나 통제할 수 없는 요인들로부터 영향을 받아 발생된 인간의 행위에 대한 책임까지도 행위자에게 지우게 하는 것은 매우 불합리하다. 스스로 선택할 수없는 유전요인이나 환경요인으로 인한 책임문제가 이에 해당한다. 이런 문제를 해결하기위해서는 정치력과 교육력이 요청된다. 좋지 못한 외적인 환경요인들로 인해 발생한 책임은 정치에 있다. 인간의 내면에 올바른 가치관을 형성시킴으로 좋지 않은 내적 유전요인을 극복할 수 있는 힘은 교육에 있다. 이런 점에서 정치와 교육은 인간행위에 대한 책임문제에서 자유로울 수 없다.

윤리경영 인과지도를 바탕으로 분석한 한국의 카드사 고객정보 유출 사건: 시스템다이내믹스를 활용한 원인 탐구와 해결책 모색 (The Analyzing the Consumer Information Leak Case of Korean Card Companies with Business Ethics CLD: Studying on Cause and Solution with System Dynamics)

  • 김승범;신호상
    • 한국시스템다이내믹스연구
    • /
    • 제17권1호
    • /
    • pp.77-105
    • /
    • 2016
  • Whenever Information leak case had been happened, even though IT Infra systems were reinforced, those cases of kind were not decreased. It meant that the causes are not only the fault of IT, but also other things. So that the information leak cases should have been studied by the interdisciplinary way. There was a point of view for the Business Ethics which needed to be studied in the interdisciplinary way. Financial Information Leak Case of three representative Card Companies in Korea which is happened in 2014 was a case which was composed by many problems. These were bad circumstances, half-educated, lower salary, and the most of all, the C-Levels' ignorance of the law. By studying the CLD: Causal Loop Diagram of Business Ethics and those mentioned factors, few meanings were discovered. Firstly, this case was not a accident, but a predeterminate issue at all, because of the structural unethical corruption. Secondly, main reason of this case was not only criminals who leaked information, but also managers, especially CEO who didn't obey the law, forced that to employees. Thirdly, although those companies had moral guide and did CSR activities, it was not help to protect this information leak case. This study shows that the important thing was not the action for showing, but effective action to management for sustainability.

Rhyme of Truce, Training Program for moral psychology in Cyberspace

  • Cho, JeongHee;Lim, Chan
    • International journal of advanced smart convergence
    • /
    • 제8권1호
    • /
    • pp.176-183
    • /
    • 2019
  • Rhyme of Truce is an educational program that helps you develop the ability to cope with cyber violence rightly. we aim to produce educational contents that will last a long time in the memory of specially children. By combining the room escape game and Leap motion / VR, the program reflects the user's motion and action in real time. The Keyboard Worrier comes into contact with the user and causes violence, and the user who is attacked by the monster see several negative messages written in red and hears abuses sound. Users enter the virtual space decorated as the cyber world. They can experience cyber-violence indirectly but vividly, and if language violence, which has been overlooked and recognized only as "letters", is executed offline, it will directly wonder if cyber-violence should also be regarded as a means of violence. Users have the opportunity to cope with violence autonomously. When a user is attacked by an in-game monster, there are two ways to choose from. First, fighting against with a keyboard (which is a symbol of language violence) just like a monster. Second, report the abuser to cyber bureau police. Both methods make them to escape the room, but when they get out of the room and return to the home and read the message through the monitor, users can recognize which action was right for.

관세업무리스크 인식과 보험사고 발생에 관한 실증연구 (An empirical study of customs business risk recognition and insurance accident occurrence)

  • 정성훈;김태인
    • 통상정보연구
    • /
    • 제9권3호
    • /
    • pp.205-229
    • /
    • 2007
  • This study analyzed relation with risk recognition degree by customs business of customs brokers and actuality insurance accident occurrence. These study finding that risk recognition by customs work area of customs brokers and actuality insurance accident occur did not agree. So customs brokers more elevate risk recognition of entry field, origin/trademark right, HS and customs tariff application, customs refund, price estimation that are high the insurance accident rate. and they may have to do emphasis administration through employee education and ability elevation. Specially, operation risk that is produced from charge employee's simplicity mistake who tax invoice omission, a tax use mistake, document nondelivery, notice dispatch delayed action, may have to manage through moral management and employee bylaws and education, employee guidance etc. Also, they publicize these contents to import and export enterprise, and practice risk management of high risk business in priority through education and public information. so we will have to make can do more effective risk management.

  • PDF

전자상거래에서 정보 프라이버시 염려를 유발하는 원인과 보호반응에 관한 연구: 주인-대리인 이론을 중심으로 (A Study on the Causes of Information Privacy Concerns and Protective Responses in e-Commerce: Focusing on the Principal-Agent Theory)

  • 김종기;김진성
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제23권4호
    • /
    • pp.119-145
    • /
    • 2014
  • Under the premise that information privacy concerns can atrophy e-commerce by causing particular behaviors of Internet users, this study focused on exploring the causes of information privacy concerns, the related information privacy protective responses of Internet users, and measures for alleviating the information privacy concerns. This study is based on the 'principal-agent theory,' and established the following as factors that cause information privacy concerns of Internet users: perceived information non-transparency; perceived action uncertainty. Also, the information privacy concerns caused by the factors were established as the cause of information privacy protective responses of Internet users. Also, the concept of 'signaling' and 'incentive,' which were presented to solve the adverse selection and moral hazard issue in the host-agent theory, was introduced to establish the following as factors that alleviate information privacy concerns: trust; informativeness. Those factors were included in the research model to conduct an empirical analysis. The analysis has revealed that both the perceived information non-transparency (p<0.01) and perceived action uncertainty (p<0.01) as to websites had a significant impact on information privacy concerns. Also, information privacy concerns of Internet users (p<0.01) had a significant impact on their information privacy protective responses who strive to protect their personal information. In addition, when trust and informativeness, which were established as factors that can alleviate information privacy concerns, were empirically analyzed, trust and informativeness had the effect of alleviating information privacy concerns. Based on the findings, the following was confirmed: Boosting the trust of Internet users in websites and offering useful information related to personal data can play a key role in alleviating the information privacy concerns of Internet users.