• Title/Summary/Keyword: misbehavior

Search Result 43, Processing Time 0.023 seconds

Responses to Customer Anger in the Service Encounter: Retail Employee vs Other Customer Perspectives (서비스접점에서 고객의 화에 대한 반응: 판매원 대 다른 고객의 관점)

  • Park, Kyung-Ae
    • Fashion & Textile Research Journal
    • /
    • v.12 no.5
    • /
    • pp.591-598
    • /
    • 2010
  • Customer misbehavior can affect dissatisfaction and negative behavioral responses of other customers at the service encounter. This study explored other customer and retail employee reponses to customer anger and aggressive behaviors at the service encounter by examining the perceived wrongness of such behaviors under different situations and comparing the two perspectives of retail employees and consumers. Three scenarios were developed representing different situations including firm's responsibility, both of customer and employee responsibilities, and uncontrollable one. Data were collected from individual interviews with 222 retail employees and 149 consumers. The results showed that the consumers' perceived wrongness of customer aggressions were higher comparing to that of employees. The reasons of perceived wrongness were different by three situations implying that responsibility and controllability affected the perceived wrongness. The study further discusses implications.

A study on Advanced Load-Balanced Ad hoc Routing Protocol

  • Lee, Joo-Yeon;Lee, Cheong-Jae;Kim, Yong-Woo;Song, Joo-Seok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.1433-1436
    • /
    • 2004
  • The ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure of centralized administration. Load-Balanced Ad hoc Routing(LBAR) protocol is an on-demand routing protocol intended for delay-sensitive applications where users are most concern with packet transmission delay. Although LBAR mechanism is a novel load balancing routing protocol for ad hoc network, it has own limitation in route path maintenance phase. Therefore, in this paper, we propose Advanced Load-Balanced Ad hoc Routing(A-LBAR) that is delay-sensitive and has an efficient path maintenance scheme. The robust path maintenance scheme is maintained by considering about nodal loads all over network and misbehavior of overloaded or selfish nodes. The proposed scheme provides good performance over DSR and AODV in terms of packet delay and packet loss rate when some misbehaving nodes exist in the network.

  • PDF

Ethically Questionable Consumer Behaviors: Korean and American Perspectives

  • Lee, Jungki;Fullerton, Sam
    • Asia Marketing Journal
    • /
    • v.21 no.3
    • /
    • pp.21-46
    • /
    • 2019
  • This study compares the ethical inclination regarding consumer misbehaviors from two countries with contrasting cultural characteristics. National samples of South Korean and American adults provided their perceptions of the appropriateness of 12 ethically questionable consumer actions. The scenarios ranged from illegal actions, such as fraudulently inflating one's losses when filing an insurance claim to legal, yet questionable, actions such as purchasing an item that the buyer recognizes as having been mispriced. The 12 scenarios exhibited a wide range of mean responses in both countries, thereby supporting the oft-stated premise that consumer ethics is a situational phenomenon. Findings indicate not only where the cultures diverge but also where they converge towards a degree of congruence. Plausible explanations for differences based upon cultural dynamics are provided.

A Study on Detecting Selfish Nodes in Wireless LAN using Tsallis-Entropy Analysis (뜨살리스-엔트로피 분석을 통한 무선 랜의 이기적인 노드 탐지 기법)

  • Ryu, Byoung-Hyun;Seok, Seung-Joon
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.22 no.1
    • /
    • pp.12-21
    • /
    • 2012
  • IEEE 802.11 MAC protocol standard, DCF(CSMA/CA), is originally designed to ensure the fair channel access between mobile nodes sharing the local wireless channel. It has been, however, revealed that some misbehavior nodes transmit more data than other nodes through artificial means in hot spot area spreaded rapidly. The misbehavior nodes may modify the internal process of their MAC protocol or interrupt the MAC procedure of normal nodes to achieve more data transmission. This problem has been referred to as a selfish node problem and almost literatures has proposed methods of analyzing the MAC procedures of all mobile nodes to detect the selfish nodes. However, these kinds of protocol analysis methods is not effective at detecting all kinds of selfish nodes enough. This paper address this problem of detecting selfish node using Tsallis-Entropy which is a kind of statistical method. Tsallis-Entropy is a criteria which can show how much is the density or deviation of a probability distribution. The proposed algorithm which operates at a AP node of wireless LAN extracts the probability distribution of data interval time for each node, then compares the one with a threshold value to detect the selfish nodes. To evaluate the performance of proposed algorithm, simulation experiments are performed in various wireless LAN environments (congestion level, how selfish node behaviors, threshold level) using ns2. The simulation results show that the proposed algorithm achieves higher successful detection rate.

Security Design for Efficient Detection of Misbehavior Node in MANET (MANET에서 비정상 노드를 효율적으로 탐지하기 위한 보안 설계)

  • Hwang, Yoon-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3B
    • /
    • pp.408-420
    • /
    • 2010
  • On a Mobile Ad hoc NETwork(MANET), it is difficult to detect and prevent misbehaviors nodes existing between end nodes, as communication between remote nodes is made through multiple hop routes due to lack of a fixed networked structure. Therefore, to maintain MANET's performance and security, a technique to identify misbehaving middle nodes and nodes that are compromise by such nodes is required. However, previously proposed techniques assumed that nodes comprising MANET are in a friendly and cooperative relationship, and suggested only methods to identify misbehaving nodes. When these methods are applied to a larger-scale MANET, large overhead is induced. As such, this paper suggests a system model called Secure Cluster-based MANET(SecCBM) to provide secure communication between components aperANET and to ensure eed. As such, this pand managems suapemisbehavior nodes. SecCBM consists apetwo stages. The first is the preventis pstage, whereemisbehavior nodes are identified when rANET is comprised by using a cluster-based hierarchical control structure through dynamic authentication. The second is the post-preventis pstage, whereemisbehavior nodes created during the course apecommunication amongst nodes comprising the network are dh, thed by using FC and MN tables. Through this, MANET's communication safety and efficiency were improved and the proposed method was confirmed to be suitable for MANET through simulation performance evaluation.

How Do South Koreans Perceive Corporate Social Capital and Its Benefits? An Application to Corporations and Community

  • Jin, Bumsub
    • Asian Journal for Public Opinion Research
    • /
    • v.3 no.1
    • /
    • pp.1-21
    • /
    • 2015
  • A recent public opinion survey found that the anti-corporate sentiment of South Korean citizens is primarily due to the misbehavior of Korean corporations. South Korean citizens' skepticism of corporations may hinder the democratic and economic development of the country. As a driving force for community development, social capital is considered to enable citizens to collaborate with one another to resolve a shared problem. Specifically, this study pays attention to the relationship among social capital, corporate capacity, and trust, which may perhaps contribute to developing a democratic environment in Korean society. The study aims to explore whether Korean citizens' perceived corporate bonding and bridging social capital affect corporate capacity for collaborative action and trust in corporations. A Web survey of 385 South Koreans was conducted. The findings show that perceived bonding social capital among employees is positively related to corporate capacity for collaboration action. Moreover, perceived bonding among employees and bridging social capital between employees and local residents are positively related to corporate capacity for collaboration action and trust in corporations. These findings suggest that researchers and practitioners for organizational development and community-building need to enhance corporate social capital.

A Study on FTA-related Administrative Efficiency Measures for Verifying the Origin (FTA 원산지검증행정의 효율화 방안에 대한 연구)

  • Chung, Jae-Wan
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.55
    • /
    • pp.243-264
    • /
    • 2012
  • This study is aimed to analyze problems related to FTA country of origin of goods verification which is increasing from 2006 and thereby to grope for solution of such problems and seek adequate FTA performance administration. It is found, through comparative analysis and statistics of last 8 FTAs so far Korea has concluded that there are major problems such as excessive verification processing due to complicated country of origin regulation etc. This paper suggests following policies of country of origin administration ; (1) Simplification of FTA country of origin rules (2) reciprocal cooperation between each country's Customs Authorities based on trust (3) rational measurement against corresponding country's Customs Authorities' misbehavior (4) enhancement of transparency in relation to processing rule of country of origin verification (5) securing FTA country of origin verification experts. For these improvements, upcoming FTA shall rule country of origin reasonably, simplification and transparency of rule is needed for established FTAs in relation to FTA performance administration with corresponding countries. Also it is necessary to revise FTA preferential tariff law and its related laws, and carry forward policies in accordance with medium and long term plan.

  • PDF

The Difference in Severity and Frequency of Classroom Discipline Problems Between Male and Female Students in Middle School Classrooms (중학교 남·여 학급간 학급 훈육문제의 심각성과 빈도의 차이)

  • KIM, Dal-Hyo
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.17 no.1
    • /
    • pp.35-47
    • /
    • 2005
  • The purpose of this study is to investigate various kinds of discipline problems in middle school classrooms, and the differences in severity and frequency of the classroom discipline problems between male and female students' classrooms in middle schools. This study shows that the discipline problems in the middle school classrooms include using a cellular phone, chattering, sleeping, chewing gum, reading comic books, asking useless questions, challenging a teacher, fighting, calling names, skipping class, throwing trash in the classroom, breaking classroom equipment, creating disorder, losing materials, playing with a ball in the classroom, gambling, and so on. Generally, male students recognized the severity of the classroom discipline problems more than the female students. However, it is shown that the frequency of discipline problems in male students' classrooms is higher than that in female students' classrooms. From the results of this study, male students have more active discipline problems (playing with a ball in the classroom, throwing trash in the classroom, coming to class late, gambling, cutting in line, and so on). On the other hand, female students have more passive discipline problems (making a noise by using a cellular phone, asking useless questions, sending messages to a classmate, studying other subjects, scattering, and so on).

Lightweight Acknowledgement-Based Method to Detect Misbehavior in MANETs

  • Heydari, Vahid;Yoo, Seong-Moo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.5150-5169
    • /
    • 2015
  • Mobile Ad hoc NETworks (MANETs) are the best choice when mobility, scalability, and decentralized network infrastructure are needed. Because of critical mission applications of MANETs, network security is the vital requirement. Most routing protocols in MANETs assume that every node in the network is trustworthy. However, due to the open medium, the wide distribution, and the lack of nodes' physical protection, attackers can easily compromise MANETs by inserting misbehaving nodes into the network that make blackhole attacks. Previous research to detect the misbehaving nodes in MANETs used the overhearing methods, or additional ACKnowledgement (ACK) packets to confirm the reception of data packets. In this paper a special lightweight acknowledgement-based method is developed that, contrary to existing methods, it uses ACK packets of MAC layer instead of adding new ACK packets to the network layer for confirmations. In fact, this novel method, named PIGACK, uses ACK packets of MAC 802.11 to piggyback confirmations from a receiver to a sender in the same transmission duration that the sender sends a data packet to the receiver. Analytical and simulation results show that the proposed method considerably decreases the network overhead and increases the packet delivery ratio compared to the well-known method (2ACK).

Development of the FMEA-based Backdoor Transaction Improvement Model (FMEA를 활용한 뒷문거래 개선모델 개발)

  • Ryou, Sungkook;Kim, Sunho;Kim, Chongman
    • Journal of the Korea Safety Management & Science
    • /
    • v.21 no.4
    • /
    • pp.7-15
    • /
    • 2019
  • This paper proposes the FMEA-based model to avoid backdoor transactions when purchasers select suppliers for products and services. In the model, backdoor transactions consist of two categories: backdoor selling and maverick buying. Both of which influence negative effects on cost savings due to not only uncompetitive advantage but also unusable purchasing leverage by unethical and misbehavior of purchase requestors. For the risk evaluation based on FMEA, three and five risk types of backdoor selling and maverick buying are identified respectively. Current risk priority numbers(RPN) based on those risk types are calculated by three categories: occurrence, detection and severity. Six risk mitigation strategies and fourteen mitigation tactics are identified to improve current RPN. In order to validate the model, questionnaires are collected from fifteen companies and statistically analyzed. The analysis result shows that the model reduces backdoor transaction risks and has no differences in reduction of backdoor transaction risks regardless of the type of purchasing organization units and existence of purchasing procedures in the organization.