• 제목/요약/키워드: illegal

검색결과 1,448건 처리시간 0.024초

데이터마이닝 기법을 활용한 불법주차 영향요인 분석 (A Study on the Analysis Effect Factors of Illegal Parking Using Data Mining Techniques)

  • 이창희;김명수;서소민
    • 한국ITS학회 논문지
    • /
    • 제13권4호
    • /
    • pp.63-72
    • /
    • 2014
  • 우리나라는 급속한 경제발전과 고속성장으로 생활수준이 향상되면서 자동차 수요가 급격히 증가함에 따라 교통혼잡, 교통사고, 주차문제 등의 문제가 발생되고 있다. 자동차 증가로 인한 주차문제 중 불법주차는 교통혼잡을 야기하고 주차공간으로 인한 이웃간 분쟁의 원인이 되어 사회적 문제로 대두되고 있다. 이에 본 연구에서는 지방 광역시중 승용차 수단분담률이 높음에도 불구하고 불법주차 단속건수가 상대적을 적은 대전광역시를 대상으로 주차조사를 실시하였으며 불법주차에 대한 원론적인 문제를 파악하기 위해 의사결정나무모형 Exhaustive CHAID분석을 통하여 운전자들의 주차행위에 있어 불법주차를 선택하는 과정과 그에 따른 영향요인을 탐색하여 불법주차의 원인을 파악하고 해결하는 방안을 제시하고자 한다. 분석결과 불법주차를 선택하는 영향요인으로는 거리, 단속경험, 직업, 이용시간대 순으로 영향을 미치는 것으로 나타났으며 예측 모형은 최종적으로 4가지 노드가 도출되었다. 분석결과에 따른 불법주차의 해결방안으로는 공영주차장의 추가설치와 생계유지 및 조업차량의 주차공간 확보가 우선되어야 하고 불법주차 단속강화와 시민의식 고취를 위한 캠페인의 활성화가 필요하다.

Consumer Ethics and Fashion Corporate Social Responsibility -Attributions of Fashion CSR Motives and Perceptions-

  • Ahn, Soo-kyoung
    • 패션비즈니스
    • /
    • 제20권6호
    • /
    • pp.1-18
    • /
    • 2016
  • This study examines the impact of consumer ethics on the CSR motive attributions and, the subsequent consumer perception of the firm's ethicality. Data of 512 adults were collected nationwide using a self-administered questionnaire online. Exploratory and confirmative factor analysis were employed to identify six underlying dimensions of consumer ethics, as follows: actively benefiting from illegal actions, passively benefiting from illegal actions, no harm/no foul, economic benefiting from illegal actions, intellectual property infringement, and pro-environmental behavior. In order to examine the relationships between consumer ethics, CSR motive attribution, and consumer perceived ethicality, a structural equation modeling test was conducted. The results demonstrated that actively benefiting from illegal actions, economic benefiting from illegal action, and pro-environmental behavior had impacts on CSR motive attributions such as strategy-driven attribution, value-driven attribution, and stakeholder-driven attribution. Consequently, strategy-driven attribution and value-driven attribution influenced the consumer perception of the firm's ethicality, whereas stakeholder-driven attribution did not. This study provides an understanding of the CSR attribution mechanism from the view of consumer ethics that are multi-dimensional. The ethical judgements on different types of consumer behavior lead to attributions of CSR motives and subsequently their perception of a firm's ethicality.

디지털콘텐츠 불법 파일공유에 관한 사회문화적 접근 (A Social Cultural Approach to Illegal Digital Contents Sharing)

  • 박경자
    • 지식경영연구
    • /
    • 제17권1호
    • /
    • pp.113-133
    • /
    • 2016
  • Why illegal digital contents sharing happens? This study pays attention to the fact that file sharing is an exchanging behavior between people and it is expanding despite of an illegal behavior and proposes that it is necessary for the phenomenon to be understood from social cultural point of view beyond a personal dimension. Based on the social exchange theory, this study demonstrates effects of file sharing attitudes and continuity, regarding 'group norm', 'popular demand', 'reciprocity' and 'social solidarity' as main factors. The main findings of this study are as followed;- First, it is shown that a tacit agreement of a group on file sharing is a determinant of positive attitude to file sharing and the intent of continual file sharing. Second, it is not found that the social relationship factors that are regarded as potential influential factors on file sharing attitude have effects on file sharing behavior, except for 'group norm'. Unlike previous studies, the results may come from the fact that this study deals with an illegal behavior. The third finding indicates a structural relationship between social relationship factors. When members of a group have more amicable attitude to file sharing including silence or a tacit agreement on file sharing, more people ask illegal sharing of files that they need. Such public demand creates expectation of reciprocity. As reciprocity maintains, social connectedness is strengthened. Then, strong social connectedness escalates the intent to maintain file sharing. It is important to notice that this study promotes understanding of how digital contents sharing happens by structuring and demonstrating influential relationship between characteristic factors of the social relationship.

  • PDF

봉인볼트용 UHF RFID Tag Antenna를 이용한 차량인식에 관한 연구 (A Study on Detecting System of Illegal Automobile Using a Seal-Bolt UHF RFID Tag Antenna)

  • 정유정;김기식;설창환
    • 한국통신학회논문지
    • /
    • 제42권1호
    • /
    • pp.157-161
    • /
    • 2017
  • 본 논문은 UHF 대역의 소형 RFID 태그 Antenna를 설계하여 자동차 후방 번호판 봉인볼트나 고정용 볼트에 적용하여 자동차를 인식 하여서 대포차량을 포함한 불법 차량을 속출 할 수 있는 시스템을 구현 하였다. 해당 태그의 크기는 100원짜리 동전정도의 지름이 24mm 정도의 크기이며 태그의 반사계수와 인식거리를 측정하였다. 기존의 볼트형 태그보다 인식거리를 대폭 개선하였다. 이 볼트형 태그를 번호판에 부착하면 경찰은 차량의 정보를 쉽게 알아낼 수 있으며 더 나아가 차량관리 시스템을 통한 손쉬운 범죄차량 추적 및 검거가 용이하다.

비 의료인 불법 의료행위로 발생한 근염 환자 1례에 대한 증례보고 (A case of report with myositis caused by illegal practice)

  • 허미숙;이정환;이은경;김정호;김영일
    • 혜화의학회지
    • /
    • 제19권1호
    • /
    • pp.111-118
    • /
    • 2010
  • Objective: The purpose of this study is to show A case of patient with myositis caused by illegal practice. Methods: The authors observed patient by VAS and measured sizes of Lt. thigh and Lt. calf for operated acupuncture treatment, herbal medicine treatment, physiotherapy and western medication. Result: After treatment, pain and swelling got better and also on the ultrasonography and cbc indicates that it has been improved Conclusion: These days, The illegal procedures are done broadly which might have possibilities of medical accidents. To prevent the accidents, we need to stop this illegal procedures to protect the health of population.

정보통신망상의 불법정보에 대한 경찰책임 (The Police Responsibility about Illegal Information on the Information Communication Network)

  • 구형근;정순형
    • 디지털융복합연구
    • /
    • 제11권9호
    • /
    • pp.87-94
    • /
    • 2013
  • 정보통신망상에 무분별하게 유통되는 각종 불법정보에 대한 기존의 법적규제는 정보통신서비스제공자의 형사적 책임과 민사적 책임을 중심으로 논의되고 있다. 하지만 본 논문에서는 정보통신망상의 불법정보 차단을 위한 경찰권행사의 대상으로서 경찰책임의 문제로 접근해보았다. 이러한 인식을 근거로 정보통신망상 불법정보의 신속한 차단을 위해 행위책임자에 대한 직접적 규제방식이 아닌 상태책임자인 정보통신서비스제공자에 대한 간접적 규제방식을 채택하고 있는 현행 정보통신망법 제44조의7 제2항의 문제점과 개선방안을 제시하고자 하였다.

A Study on Parking Reality in Residential Areas and an Improvement Plan -Focusing on concentrated areas of multi-family housings in Gongneung-dong, Seoul-

  • Hwang, Sung Eun;Kang, Boo Seong
    • Architectural research
    • /
    • 제20권4호
    • /
    • pp.103-108
    • /
    • 2018
  • Wandering behavior is a serious problem among the elderly in nursing homes, yet it has received relatively little study As multi-family houses built before the '80s in South Korea were designed, it did not take account into issues related to parking so that at present parking became a big issue. The Seoul Metropolitan Government tried various ways to sort out the parking problem in multi-family house areas, but inadequate parking and illegal parking are still an ongoing problem. Thus, the purpose of this study was to examine current situation on resident parking only and illegal parking centered on a congested area of multi-family houses in Seoul and present the improvement plan of parking problems through case investigation home and abroad. As the result of the survey, it has been identified that the subject area consists of 506 households in total and 186 parking spaces and also, 100 cars in parking space or parking lot in housing space and 143 in illegal parking. Green parking business and open access parking system were suggested as solution plan for parking problem. Thus, it is expected that through green parking business for 6 houses and the parking lot of elementary schools around, the illegal parking problem would be sorted out.

A Blocking Distribution Channels to Prevent Illegal Leakage in Supply Chain using Digital Forensic

  • HWANG, Jin-Hee
    • 유통과학연구
    • /
    • 제20권7호
    • /
    • pp.107-117
    • /
    • 2022
  • Purpose: The scope of forensic investigations serves to identify malicious activities, including leakage of crucial corporate information. The investigations also identify security lapses in available networks. The purpose of the present study is to explore how to block distribution channels to protect illegal leakage in supply chain through digital forensic method. Research design, data and methodology: The present study conducted the qualitative textual analysis and its data collection process entails five steps: identifying and collecting data, determining coding categories, coding the content, checking validity and reliability, and analyzing and presenting the results. This methodology is a significant research method due to its high quality of previous resources. Results: Applying previous literature analysis to the results of this study, the author figured out that there are four solutions as an evidences to block distribution channels, preventing illegal leakage regarding company information. The following subtitles show clear solutions: (1) Communicate with Stakeholders, (2) Preventing and addressing illegal leakage, (3) Victims of Data Breach, (4) Focusing Solely on Technical Teams. Conclusion: There are difficult scenarios that continue to introduce difficult questions surrounding engagement with digital evidence. Consequently, it is important to enhance data handling to provide answers for organizations that suffer due to illegal leakages of sensitive information.

소프트웨어 온라인 전자 유통에서의 동적 사용권 관리 기술 (Dynamic License Control in Online Electronic Software Distribution)

  • 하영국;임신영;함호상;박효준;김태윤
    • 산업공학
    • /
    • 제13권1호
    • /
    • pp.133-140
    • /
    • 2000
  • As the internet dramatically grows, internet electronic commerce is being increased. But, as products distributed with ESD(Electronic Software Distribution) are in the form of electronic file, it is difficult to prohibit illegal copy of products. Therefore, new technology is needed to distinguish legal products from illegal ones. In this paper, we present the ESD's requirements, characteristics and a new dynamic license management technology to prevent illegal copy.

  • PDF