• Title/Summary/Keyword: Violate Behavior

Search Result 13, Processing Time 0.023 seconds

An Analysis on the Users' behavior of the Parking Area for the handicapped (장애인전용주차구역제도의 이용행위 분석)

  • Yang, Sook-Mee;Kim, Man-Ki
    • Journal of Digital Convergence
    • /
    • v.9 no.5
    • /
    • pp.55-63
    • /
    • 2011
  • The purpose of this study is analyzes the violate behavior the Parking Area for the handicapped and monitor the management problem, therefore presents the improvement alternatives of it. We use the field interview survey method by visiting the government office of cities of 16, commercial facility, housings, medical centers, cultural and sports facilities, express highway rest area. We visited the 50 places and interviewed the 227 violating persons. As a result, violate behavior is divided into the not attachment of sticker on parking possibility and not accompaniment with walking disabled person. We presented the improvement alternatives for the lawful usage of the parking area for the handicapped. First, We have to magnify a recognition and a advertisement about the parking area for the handicapped. Second, We have to improve a management of expense, manpower and civil complains, etc. We have to prepare the legal revision which strengthens the concrete punishment for a violate behavior improvement.

Hypoelastic modeling of reinforced concrete walls

  • Shayanfar, Mohsen A.;Safiey, Amir
    • Computers and Concrete
    • /
    • v.5 no.3
    • /
    • pp.195-216
    • /
    • 2008
  • This paper presents a new hypoelasticity model which was implemented in a nonlinear finite element formulation to analyze reinforced concrete (RC) structures. The model includes a new hypoelasticity constitutive relationship utilizing the rotation of material axis through successive iterations. The model can account for high nonlinearity of the stress-strain behavior of the concrete in the pre-peak regime, the softening behavior of the concrete in the post-peak regime and the irrecoverable volume dilatation at high levels of compressive load. This research introduces the modified version of the common application orthotropic stress-strain relation developed by Darwin and Pecknold. It is endeavored not to violate the principal of "simplicity" by improvement of the "capability" The results of analyses of experimental reinforced concrete walls are presented to confirm the abilities of the proposed relationships.

Mathematical Properties of the Differential Pom-Pom Model

  • Kwon, Youngdon
    • Macromolecular Research
    • /
    • v.9 no.3
    • /
    • pp.164-170
    • /
    • 2001
  • Recently in order to describe the complex rheological behavior of polymer melts with long side branches like low density polyethylene, new constitutive equations called the pom-pom equations have been derived by McLeish and Larson on the basis of the reptation dynamics with simplified branch structure taken into account. In this study mathematical stability analysis under short and high frequency wave disturbances has been performed for the simplified differential version of these constitutive equations. It is proved that they are globally Hadamard stable except for the case of maximum constant backbone stretch (λ = q) with arm withdrawal s$\_$c/ neglected, as long as the orientation tensor remains positive definite or the smooth strain history in the now is previously given. However this model is dissipative unstable, since the steady shear How curves exhibit non-monotonic dependence on shear rate. This type of instability corresponds to the nonlinear instability in simple shear flow under finite amplitude disturbances. Additionally in the flow regime of creep shear flow where the applied constant shear stress exceeds the maximum achievable value in the steady now curves, the constitutive equations will possibly violate the positive definiteness of the orientation tensor and thus become Hadamard unstable.

  • PDF

Effect of performance method of sand compaction piles on the mechanical behavior of reinforced soft clay

  • Kwon, Jeonggeun;Kim, Changyoung;Im, Jong-Chul;Yoo, Jae-won
    • Geomechanics and Engineering
    • /
    • v.14 no.2
    • /
    • pp.175-185
    • /
    • 2018
  • Sand Compaction Piles (SCPs) are constructed by feeding and compacting sand into soft clay ground. Sand piles have been installed with irregular cross-sectional shapes, and mixtures of both sand and clay, which violate the design requirement of circular shape according to the replacement area ratio due to various factors, including side flow pressure. Therefore, design assumptions cannot be satisfied according to the conditions of the ground and construction and the replacement area ratio. Two case histories were collected, examined, and interpreted in order to study the effect of the shape of SCPs. The effects of the distortion of SCP shape and the mixture of sand and clay were studied with the results of large direct shear tests. The design internal friction angle was secured with the irregular cross-sectional sand piles regardless of the replacement area ratio. The design internal friction angle was secured regardless of mixed condition when the mixture of sand and clay was higher than the replacement area ratio of 65%. Therefore, systematic construction management is recommended with a replacement area ratio below 65%.

The Efficacy of Visual Activity Schedule Intervention in Reducing Problem Behaviors in Children With Attention-Deficit/Hyperactivity Disorder Between the Age of 5 and 12 Years: A Systematic Review

  • Thomas, Naveena;Karuppali, Sudhin
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • v.33 no.1
    • /
    • pp.2-15
    • /
    • 2022
  • Objectives: Children with attention-deficit/hyperactivity disorder (ADHD) tend to be noisy and violate rules with their disruptive behaviors, resulting in greater difficulties with off-task behaviors and being at risk for social refusal. The visual activity schedule (VAS) intervention program is a frequently used method to teach multiple skills involving on-task, use of schedules, transition behaviors, social initiation, independent play skills, classroom skills, and academic skills. The current systematic review aimed to examine the efficacy of using VAS intervention in reducing problem behaviors in children with ADHD between 5 and 12 years of age. Methods: Systematic searches were conducted using two electronic databases (PubMed and Scopus) to identify relevant studies published in English between 2010 and 2020. Four studies met the inclusion criteria: two studies examined the effect of schedule-based tasks and the use of an iPad on classroom skills, while the other two examined randomized clinical trials (RCTs) of psychosocial treatment for ADHD inattentive type and a cross-sectional study examined the impact of the group size on task behavior and work productivity in children with ADHD. Results: The findings indicate that the interventions used in all four studies could lead to increased satisfaction among participants and parents, as well as a reduction in problem behavior. In terms of the research indicators, the RCT had low quality, while the others were of high quality. Conclusion: A larger number of studies and the ADHD clinical population would help to increase the generalizability of future reviews of treatments in this context.

Violations of Information Security Policy in a Financial Firm: The Difference between the Own Employees and Outsourced Contractors (금융회사의 정보보안정책 위반요인에 관한 연구: 내부직원과 외주직원의 차이)

  • Jeong-Ha Lee;Sang-Yong Tom Lee
    • Information Systems Review
    • /
    • v.18 no.4
    • /
    • pp.17-42
    • /
    • 2016
  • Information security incidents caused by authorized insiders are increasing in financial firms, and this increase is particularly increased by outsourced contractors. With the increase in outsourcing in financial firms, outsourced contractors having authorized right has become a threat and could violate an organization's information security policy. This study aims to analyze the differences between own employees and outsourced contractors and to determine the factors affecting the violation of information security policy to mitigate information security incidents. This study examines the factors driving employees to violate information security policy in financial firms based on the theory of planned behavior, general deterrence theory, and information security awareness, and the moderating effects of employee type between own employees and outsourced contractors. We used 363 samples that were collected through both online and offline surveys and conducted partial least square-structural equation modeling and multiple group analysis to determine the differences between own employees (246 samples, 68%) and outsourced contractors (117 samples, 32%). We found that the perceived sanction and information security awareness support the information security policy violation attitude and subjective norm, and the perceived sanction does not support the information security policy behavior control. The moderating effects of employee type in the research model were also supported. According to the t-test result between own employees and outsourced contractors, outsourced contractors' behavior control supported information security violation intention but not subject norms. The academic implications of this study is expected to be the basis for future research on outsourced contractors' violation of information security policy and a guide to develop information security awareness programs for outsourced contractors to control these incidents. Financial firms need to develop an information security awareness program for outsourced contractors to increase the knowledge and understanding of information security policy. Moreover, this program is effective for outsourced contractors.

Development of technology in estimating of high-risk driver's behavior (고위험군 운전자의 운행행태 판단기술 개발)

  • Jin, Ju-Hyun;Yoo, Bong-Seok;Lee, Wook-Soo;Kim, Gyu-Ho
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.5
    • /
    • pp.531-538
    • /
    • 2016
  • Driving behaviors such as speeding and illegal u-turn which violate traffic rules are main causes of car accidents, and they can lead to serious accidents. Bus drivers are less aware of dangers of illegal u-turn, and infrastructures such as traffic enforcement equipment and watchmen are deficient. This research aims to develop technology for estimating driving behaviors based on map-matching in order to prevent illegal u-turns. For this research, 23,782 of u-turn permit data and 146,000 of speed limit data are collected nationwide, and an estimation algorithm is built with these data. Then, an application based on android is developed, and finally, tests are conducted to assess the accuracy in data computations and GPS data map-matching, and to extrapolate driving behavior. As a result of the tests, the accuracy results in the map-matching is 86% and the assessment of driving behavior is 83%, while the display of the data output yielded 100% accuracy. Additional research should focus on improvement in accuracy through the development of a robust monitoring system, and study of service scenarios for technology application.

A Study on the Performance of Vacuum Preloading with Vertical Drains (수직배수를 병행한 진공압밀공법 적용시의 연약지반 거동 예측 연구)

  • Park, Jung-Bae;Kim, Seung-U;Kim, Yu-Seok
    • Geotechnical Engineering
    • /
    • v.12 no.5
    • /
    • pp.79-88
    • /
    • 1996
  • In this study, prediction of soil behavior under vacuum preloading with vertical drain is explored on the basis of numerical models and toe results were compared with field measurements. Reasonable prediction of the time rate of settlements and pore pressure dissipation under vacuum preloading is the maj or concern. The conventional method for vatsuum preloading is based on modeling vacuum preloading as surcharge loading for the consolidation analysis. However, this modeling may violate the real behavior of soils under vacuum loading since the total stress in the analysis varies due to the modeled surcharge loading whereas in'.situ total stress of soils under vacuum loading is constant. In this study a new method is suggested. Instead of modeling vacuum loading as surcharge loading, negative hydraulic head is applied at the surface drain boundary to simulate the vacuum preloading. Comparisons of predictions and field measurements of soil behavior under vatsuum preloading are presented and the usefulness of the new modeling technique is demonstrated.

  • PDF

A Development of Risk-Taking Behavior Forecasting Model of Taxi driver's Risk-Taking Propensity by Structural Analysis (택시운수업 종사자 위험성향 관련 변인들의 구조적 분석을 통한 위험감행 예측 모형 개발)

  • Park, Mi So;Yoon, Hyo Jin
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.32 no.4D
    • /
    • pp.313-322
    • /
    • 2012
  • This study analyzes taxi driver's risk-taking propensity with respect to risk-taking behaviour and traffic locus of control. In order to explore the traffic risk-taking, we present a predictive model by structural analysis of driver's risk-taking propensity. By applying this model to survey data from taxi drivers, we can observe that driver's risk-taking propensity has a significant impact on the traffic violation intention, and the higher perception of law and the lower lack of law-abiding drivers have, the more they tend to violate. Second, we test using multivariate analysis if the level of risk-taking propensity differs by the locus of control( external or internal). Drivers of external control shows higher risk-taking level compared to those of internal control so that the risk-taking propensity shows difference according to the locus of control for the responsibility of traffic accidents. The structural equation model of our study yielded ${\chi}^2$ = 279.7, ${\chi}^2$/df = 1.55, RMSEA = 0.44, GFI = 0.911, TLI = 0.916, CFI = 0.929.

A Study on Security Policy Violations of Organization Members (조직 구성원들의 보안정책 위반에 관한 연구)

  • Kim, Jong-Ki;Oh, Da-Woon
    • Informatization Policy
    • /
    • v.25 no.3
    • /
    • pp.95-115
    • /
    • 2018
  • This study aims to examine organization members' intention to violate security policies based on the Person-Environment Fit Model. This study investigated the effect of the relationship between organizational security environment and the individual security value on the intention of organizational security policy violation. The security environments are classified into the organizational information security culture and peers' behavior of security compliance, while the personal values are classified into reconstructing the conduct, distorting the consequence, and devaluing the organization as presented in the moral disengagement theory. Based on the concept of the moral disengagement theory, we measured the individual security values as a second order factor. This study found that the information security culture had a statistically significant impact on devaluing the organization, but did not have as much impact on reconstructing the conduct and distorting the consequence. Peers' behavior of security compliance had a significant impact on reconstructing the conduct, distorting the consequence and devaluing the organization, all of which also had relevant impact on the organizational members' intention of security policy violation.This study measured a persons' perception on security policy breach by presenting scenarios of password sharing that is common in many organizations. This study is expected to make practical contributions, as it deals with challenges that many organizations are actually faced with.