• Title/Summary/Keyword: Selfish

Search Result 149, Processing Time 0.023 seconds

The Moral Judgment and Justification Reasoning in terms of Aggressive Behavior by 3, 4 and 5 Year Olds : The Relationship to Children's False Belief Understanding (3, 4, 5세 유아의 공격행동에 대한 도덕 판단 및 정당화 추론과 틀린믿음 이해와의 관계)

  • Kim, Yu Mi;Yi, Soon Hyung
    • Korean Journal of Child Studies
    • /
    • v.35 no.3
    • /
    • pp.49-69
    • /
    • 2014
  • The purposes of this study were (1) to investigate children's moral judgment, justification reasoning in terms of aggressive behavior, and (2) it examined the relationship to false belief understanding. Children aged between 3 to 5 years(N = 120) participated in this study. Each child was interviewed individually and responded questions designed to measure his/her moral judgment and justification reasoning and false belief understanding. The 12 pictorial tasks consisted of selfish and altruistic intentions and three different types of acts (physical, verbal, relational) as responses to aggressive behavior. The results indicated that the kind of moral judgment used was different according to the intention and the types of acts. There were significant differences in children's justification reasoning according to the age and the types of acts. There was a positive relationship between false belief understanding and moral judgment, justification reasoning. This paper also provided a detailed discussion of the results and recommendations in the context of more general cognitive developmental changes.

A Model for Detecting Braess Paradox in General Transportation Networks (일반 교통망에서 브라이스 역설 발견 모형)

  • Park, Koo-Hyun
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.32 no.4
    • /
    • pp.19-35
    • /
    • 2007
  • This study is for detecting the Braess Paradox by stable dynamics in general transportation networks. Stable dynamics, suggested by Nesterov and de Palma[18], is a new model which describes and provides a stable state of congestion in urban transportation networks. In comparison with user equilibrium model based on link latency function in analyzing transportation networks, stable dynamics requires few parameters and is coincident with intuitions and observations on the congestion. Therefore it is expected to be an useful analysis tool for transportation planners. The phenomenon that increasing capacity of a network, for example creating new links, may decrease its performance is called Braess Paradox. It has been studied intensively under user equilibrium model with link latency function since Braess[5] demonstrated a paradoxical example. However it is an open problem to detect the Braess Paradox under stable dynamics. In this study, we suggest a method to detect the Paradox in general networks under stable dynamics. In our model, we decide whether Braess Paradox will occur in a given network. We also find Braess links or Braess crosses if a network permits the paradox. We also show an example how to apply it in a network.

A Fair and Efficient Congestion Avoidance Scheme Based on the Minority Game

  • Kutsuna, Hiroshi;Fujita, Satoshi
    • Journal of Information Processing Systems
    • /
    • v.7 no.3
    • /
    • pp.531-542
    • /
    • 2011
  • In this paper, we propose a new congestion control scheme for high-speed networks. The basic idea of our proposed scheme is to adopt a game theory called, "Minority Game" (MG), to realize a selective reduction of the transmission speed of senders. More concretely, upon detecting any congestion, the scheme starts a game among all senders who are participating in the communication. The losers of the game reduce the transmission speed by a multiplicative factor. MG is a game that has recently attracted considerable attention, and it is known to have a remarkable property so that the number of winners converges to a half the number of players in spite of the selfish behavior of the players to increase its own profit. By using this property of MG, we can realize a fair reduction of the transmission speed, which is more efficient than the previous schemes in which all senders uniformly reduce their transmission speed. The effect of the proposed scheme is evaluated by simulation. The result of simulations indicates that the proposed scheme certainly realizes a selective reduction of the transmission speed. It is sufficiently fair compared to other simple randomized schemes and is sufficiently efficient compared to other conventional schemes.

Non-ethic Behavior and the Process of Adaptation of Used Market Site: An Approach Based on Grounded Theory (아나바다 사이트 참여자의 비윤리적 행동과 반응양식 : 근거이론적 접근)

  • Nam, Su-Jung;Yoo, Hyun-Jung
    • Journal of the Korean Home Economics Association
    • /
    • v.44 no.12
    • /
    • pp.189-201
    • /
    • 2006
  • The purpose of this study was to explore consumers' experiences in one used market site. For this purpose, in-depth interviews were conducted for the 8 consumers who were members of the used market site. In the study methodology, the grounded theory designed by Strauss and Corbin was utilized. From the analysis results, 23 subcategories and 11 categories were created. In the axial coding, the following paradigm model was proposed: 1) the casual conditions were "the pond of information" and "underground market," 2) the contextual conditions were "inconsistent behavior" and "error of communication", 3) the central phenomenon was "non-ethic behavior of seller/buyer, 4) the intervening conditions were "induction of intimacy", "use of patronage", and "creation of network", 5) the action/interaction strategy was "being shrewd", and 6) the consequence was "adaptation/non-adaptation". In selective coding, the core category was "to adapt of non-ethic behaviors through being shrewd." Based on the core category, the following four types of process of adaptation of the used market site were found: "A selfish addict," "An advanced utilitarian", "A hard philosopher," and "A cynical dropout".

Feminist Phenomenology on the Life Experiences of Young Korean Women with Attempted Suicide (자살을 시도한 젊은 여성들의 삶의 경험에 관한 페미니스트 현상학)

  • Yi, Myung-Sun;Hwang, Soon-Chan
    • Korean Journal of Adult Nursing
    • /
    • v.23 no.2
    • /
    • pp.123-134
    • /
    • 2011
  • Purpose: The purpose of the study was to understand and describe the experiences of young Korean women with attempted suicide. Methods: The data were collected by individual interviews from four women who attempted suicide during 2008-2009. A total of 25 hours interviews were audio-recorded and transcribed verbatim. The data were analyzed using feminist phenomenology to reflect and respect the participants' view and experience as much as possible. Results: Five theme clusters and ten themes emerged from the analysis. Five theme clusters include "anger resulting from others-oriented life," "guilt resulting from selfish life," "confusion resulting from unbalanced life between self and others," "attempted suicide resulting from the chaos of life as a whole," and "peace resulting from balanced life between self and others." While these theme clusters represent the phases of life experience, ten themes indicate specific problems or strategies raised during these phases in the context of male-oriented Korean patriarchal society. Conclusion: The results of the study provide insights by deeply understanding of life of young women who attempted suicide in the Korean sociocultural context with the ideology of the subjection of women.

A Changeological Interpretation on the Function and Malfunction of the Oromaxillary Structure (악관절의 기능과 이상에 관한 역학적(易學的) 해석)

  • Chi, Gyoo-yong;Lee, Young Jun
    • Journal of TMJ Balancing Medicine
    • /
    • v.7 no.1
    • /
    • pp.11-16
    • /
    • 2017
  • In order to understand Changeologically on the meaning of FCST's TMJ (temporo-mandibular joint) treatment procedure, Yi, Shike, Bi, Gen trigrams concerning the jaw and change by treatment were analyzed from the viewpoint of semiotic context of hexagon and holistic interpretation on disease. Yi is meant by jaw but actually indicates mouth made by maxilla and mandible, and it's characters are related with nourishing by aliment and words. But when we eat and speak in the daily life, jaw does not nourish properly it's own body by bad habit or postures. For the treatment of this ill state, there needs punishment and correction symbolized with Shike. Shike has fourth nine meaning obstacles between the two strong lines in the upper and lower end, and so it has the function of mastication and get rid of the fourth nine metaphorically indicating subluxation of axis using CBA and auxiliary measures of four movement or laughing methods. Bi expresses the achievement and effects of consecutive mastication process implicating normalized manifestation of jaw and its linked spinal function. Gen symbolizes removing selfish motive or partiality in advance and reaches the best state of the saint righteously self-nourishable human being.

  • PDF

A Reason of Reckless Development and Method of Improvement (난개발 발생원인 분석과 개선방안)

  • Lim, Myung-Gu
    • Journal of The Korean Digital Architecture Interior Association
    • /
    • v.7 no.1
    • /
    • pp.7-13
    • /
    • 2007
  • Virtues and advantages of urban areas would be tarnished if benefits and convenience of the cities were overwhelmed by the logics of selfish development and reckless expansion. Reckless development, which is not limited to a certain point of time and space, has become a social and environmental problem for a long period of time, taking advantage of legal and administrative loopholes. In the metropolitan area surrounding the capital, especially Yongin, where semi-agricultural zones have been developed recklessly, serious problems have already emerged including the lack of infrastructure, environmental contamination, destruction of scenic landscapes, encroachment of good farmland and forest and invitation of natural disasters. This study assumed all these problems as the consequence of the inadequacy of the legislative system and analyzed the causes. The study also suggests some countermeasures. Most of all, a "planning-first, development-later" practice should be brought into place so that various experts could participate for a detailed planning. Public development should also be expanded so that beneficial public facilities could be set up in the first place. A system for reasonable development charges should also be come up with. In this process, the role of the administrators becomes yet more important for a long-term, systematic planning of future cities, accompanied by public housing developments.

  • PDF

A Frame Analysis of Nurse-related Articles from Korean Daily Newspapers (국내 주요 일간지에 나타난 간호사 관련 기사의 프레임 분석)

  • Na, Mi Su;Kang, Jeong Hee
    • The Journal of Korean Academic Society of Nursing Education
    • /
    • v.24 no.4
    • /
    • pp.453-462
    • /
    • 2018
  • Purpose: This study analyzed how the four nurse-related news items 'talent show,' 'neonatal death,' 'nurse's death,' and 'sexual harassment' were portrayed in Korean daily newspaper articles. Methods: A total of 392 newspaper articles published from November 2017 to May 2018 were retrieved through the internet homepages of three newspapers, the Chosun Ilbo, the Dong-a Ilbo, and the JoongAng Ilbo and through a database for 13 other newspapers. Articles were analyzed for their views on nurses and their structural and contextual frames. Results: Articles with the highest frequency of mentioning nurses' death appeared in the JoongAng Ilbo; these were written as straight news articles. In the analyzed articles, nurses were portrayed mostly as victims, troublemakers, passive, or selfish. Articles were written mostly in episodic, incident notice, or attribution of responsibility frames. Conclusion: It was not uncommon to read articles with negative views on nurses; most of these articles focused only the four major incidents as straight news type stories. Future efforts are needed to study the implications of newspaper articles with negative views on nurses and the frames most commonly used.

Model of the ebXML-based BPSS Conformance Validation in B2B Enviroment (B2B 환경에서 ebXML 기반 BPSS 적합성 검증 모델)

  • Shin, Myeong-Sook;Choi, Jong-Sik;Ahn, Seong-Soo;Lee, Joon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.2 no.2
    • /
    • pp.113-117
    • /
    • 2007
  • Recently B2B electronic transactions which go through an Internet being diffused, according to support the Internet business of the form which is various the techniques for are appearing. B2B electronic transaction systems respect B2B transactions consequently to control the system of selfish bell environmnet and various information, must exchange. But currently the tentative tool for the verification of BPSS is the condition which is wholly lacking with the domestic foreign enemy. In this paper the suitability ebMS standard verification entry written in conjunction with ebXML BPSS document the suitability of the case, depending on the item to evaluate whether the BPSS model, suggesting that fitness will be verified.

  • PDF

An Intrusion Detection Technique Suitable for TICN (전술정보통신체계(TICN)에 적합한 침입탐지 기법)

  • Lee, Yun-Ho;Lee, Soo-Jin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.6
    • /
    • pp.1097-1106
    • /
    • 2011
  • Tactical Information Communication Network(TICN), a concept-type integrated Military Communication system that enables precise command control and decision making, is designed to advance into high speed, large capacity, long distance wireless relay transmission. To support mobility in battlefield environments, the application of Ad-hoc networking technology to its wireless communication has been examined. Ad-hoc network works properly only if the participating nodes cooperate in routing and packet forwarding. However, if selfish nodes not forwarding packets of other nodes and malicious nodes making the false accusation are in the network, it is faced to many threats. Therefore, detection and management of these misbehaving nodes is necessary to make confident in Ad-hoc networks. To solve this problem, we propose an efficient intrusion detection technique to detect and manage those two types of attacks. The simulation-based performance analysis shows that our approach is highly effective and can reliably detect a multitude of misbehaving node.