• Title/Summary/Keyword: 예방 행위

Search Result 684, Processing Time 0.03 seconds

Study on Fraud and SIM Box Fraud Detection Method in VoIP Networks (VoIP 네트워크 내의 Fraud와 SIM Box Fraud 검출 방법에 대한 연구)

  • Lee, Jung-won;Eom, Jong-hoon;Park, Ta-hum;Kim, Sung-ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.10
    • /
    • pp.1994-2005
    • /
    • 2015
  • Voice over IP (VoIP) is a technology for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks. Instead of being transmitted over a circuit-switched network, however, the digital information is packetized, and transmission occurs in the form of IP packets over a packet-switched network which consist of several layers of computers. VoIP Service that used the various techniques has many advantages such as a voice Service, multimedia and additional service with cheap cost and so on. But the various frauds arises using VoIP because VoIP has the existing vulnerabilities at the Internet and based on complex technologies, which in turn, involve different components, protocols, and interfaces. According to research results, during in 2012, 46 % of fraud calls being made in VoIP. The revenue loss is considerable by fraud call. Among we will analyze for Toll Bypass Fraud by the SIM Box that occurs mainly on the international call, and propose the measures that can detect. Typically, proposed solutions to detect Toll Bypass fraud used DPI(Deep Packet Inspection) based on a variety of detection methods that using the Signature or statistical information, but Fraudster has used a number of countermeasures to avoid it as well. Particularly a Fraudster used countermeasure that encrypt VoIP Call Setup/Termination of SIP Signal or voice and both. This paper proposes the solution that is identifying equipment of Toll Bypass fraud using those countermeasures. Through feature of Voice traffic analysis, to detect involved equipment, and those behavior analysis to identifying SIM Box or Service Sever of VoIP Service Providers.

Study on the Infection Control and Dental waste Disposal in Dental Clinic Located in Seoul City (서울시 치과의원의 진료실 감염관리 및 폐기물 처리 실태 조사연구)

  • Kang, Jae-Kyoung;Kim, Eun-Sook;Kim, Kyung-Mi
    • Journal of dental hygiene science
    • /
    • v.2 no.2
    • /
    • pp.105-113
    • /
    • 2002
  • This study was aimed to investigate the practice on the infection control and dental waste disposal in dental clinic. The data used in this study had been collected in 100 dental clinics located in Seoul city from August to October, 2001. It was shown that examination instruments, oral surgery instruments, and periodontal instruments were almost sterilization in dental clinic. It was high in the recognition of individual protection but it was low in the degree of practice. Therefore, the practice in infection control is very important to dental team for safety of patients and operators.

  • PDF

Health related practices and morbidity among adult in rural area (농촌지역 주민의 건강관련 행위와 질병이환과의 관계)

  • Song, Jue-Bok;Rhee, Boo-Ouk;Shin, Hai-Rim;Jung, Kap-Yeol;Kim, Joon-Youn
    • Journal of Preventive Medicine and Public Health
    • /
    • v.30 no.2 s.57
    • /
    • pp.342-355
    • /
    • 1997
  • This research was carried out to determine the performance rate of health related practices, to measure the agreement between morbidity by doctor's diagnosis and morbidity by subject' self-reported and the degree of association between health related practices and morbidity rate by doctor's diagnosis, to identify their effects on morbidity among rural area populations. The data were gathered by volunteer residents (over the age of 20) of Haman Myeon, Haman Gun, Kyeongsangnam Do in Korea, from June 10, 1993 to June 12, 1993 (369 male and 516 female). Face to face interview, lab, chest P-A, EKG and physical examination were completed. Descriptive statistics, agreement analysis and multiple logistic regression procedures were employed for analyses. The results of the study were summarized as follows : 1) Age adjusted morbidity rates by doctor's diagnosis and self-reported were 38.5% (male:37.3%, female:36.5%), 26.4% (male:33.3%, female:27.5%), respectively. Kappa coefficient between morbidity by doctor's diagnosis and morbidity by self-reported was 0.21 (male:0.21, female:0.22). 2) The frequency of disease by doctor's diagnosis was as follows: hypertension(15.3%), gastritis (9.6%), diabetes mellitus (8.5%), live. disease (8.1%), and degenerative arthritis (6.2%) in the study population. 3) Order of health practice performance rate was as follows: Males-normal body weight (62.1%), non-heavy alcohol consumption (57.5%), 7-8 hours of sleeping (50.1%), non-smoking (21.7%), and exercise (19.8%). Females- non-heavy alcohol consumption (97.3%), non-smoking (84.7%), normal body weight (57.8%), 7-8 hours of sleeping (45.0%), and exercise (9.9%). 4) There was no significant relationship between health related practice and morbidity except exercise among health related practices. 5) Health related practice index which was recategorized by high, medium, and low had effects on the probability of developing morbidity.

  • PDF

The Relations between Ownership Structure and Cash Holdings of Firms (기업의 소유구조와 현금보유간의 관계)

  • Shin, Min-Shik;Kim, Soo-Eun
    • The Korean Journal of Financial Management
    • /
    • v.27 no.1
    • /
    • pp.89-120
    • /
    • 2010
  • In this paper, we analyse empirically the relations between ownership structure and cash holdings of firms listed on Korea Securities Market and Kosdaq Market of Korea Exchange. The main results of this study can be summarized as follows. Cash holdings increase as large shareholder's equity holdings increase. Cash holdings increase as the difference between first largest shareholder's and second largest shareholder's equity holdings increase, and cash holdings increase as the ownership concentration increase. Managerial ownership exert a non-linear effects on cash holdings. So to speak, at lower level of managerial ownership, managers hold more cash to pursue their own interests at the expense of minority shareholders, but at higher level of managerial ownership, the interests of managers and shareholders are aligned, and also at highest level of managerial ownership, managers hold more cash to pursue their own interests at the expense of minority shareholders. Cash holdings increase larger in owner-controlled firm than in management-controlled firm. These results support the expropriation of minority shareholders hypothesis that large shareholders can extract private benefits from corporate resources under their control at the expense of minority shareholders. This paper contributes to defining information value of large shareholder's equity holdings on cash holdings for a firms' other stakeholders such as investors and creditors, and to strengthening a legal and institutional safeguard for external minority shareholders. Ownership concentration might have negatively affected the evolution of the legal and institutional frameworks for corporate governance and the manner in which economic activity is conducted. It could be a formidable barrier to future policy reform.

  • PDF

A Study on Collection and Analysis Method of Malicious URLs Based on Darknet Traffic for Advanced Security Monitoring and Response (효율적인 보안관제 수행을 위한 다크넷 트래픽 기반 악성 URL 수집 및 분석방법 연구)

  • Kim, Kyu-Il;Choi, Sang-So;Park, Hark-Soo;Ko, Sang-Jun;Song, Jung-Suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1185-1195
    • /
    • 2014
  • Domestic and international CERTs are carrying out security monitoring and response services based on security devices for intrusion incident prevention and damage minimization of the organizations. However, the security monitoring and response service has a fatal limitation in that it is unable to detect unknown attacks that are not matched to the predefined signatures. In recent, many approaches have adopted the darknet technique in order to overcome the limitation. Since the darknet means a set of unused IP addresses, no real systems connected to the darknet. Thus, all the incoming traffic to the darknet can be regarded as attack activities. In this paper, we present a collection and analysis method of malicious URLs based on darkent traffic for advanced security monitoring and response service. The proposed method prepared 8,192 darknet space and extracted all of URLs from the darknet traffic, and carried out in-depth analysis for the extracted URLs. The analysis results can contribute to the emergence response of large-scale cyber threats and it is able to improve the performance of the security monitoring and response if we apply the malicious URLs into the security devices, DNS sinkhole service, etc.

Effect of Body Image and Eating Attitude on Depressive Mood and Suicide Ideation in Female Adolescents (여자 청소년의 신체이미지와 식사태도가 우울감과 자살사고에 미치는 영향)

  • Song, Man-Kyu;Ha, Jee-Hyun;Park, Doo-Heum;Ryu, Seung-Ho;Oh, Jung-Hyeon;Yu, Jae-Hak
    • Korean Journal of Psychosomatic Medicine
    • /
    • v.18 no.1
    • /
    • pp.40-47
    • /
    • 2010
  • Objectives:Body image is closely related to self-esteem and weight-control related behaviors. In particular, relationship between two factors would be stronger in female adolescents. False recognition on body image and weight can be a risk factor of eating disorder, depression, and suicidal ideation. This study aimed to examine the effects of body image and eating disorders on developing depressive symptoms and suicidal ideation in female adolescents. Methods:Two hundred thirty nine students of a Girls' Commercial High School in Seoul were recruited. Eating Attitude Test for Korean Adolescents, Self-Esteem Scales, Impulsiveness Scale, Beck's Depression Inventory and Beck's Suicidal Ideation Scale were used to measure eating attitude and severity of psychiatric symptoms. Results:Among 239 subjects, the estimated risk group of eating disorders was 10%(n=24). They experienced more depressive symptoms than the control group. The bigger discrepancy in current and ideal body mass index was significantly related with higher depressive mood, suicidal idea, abnormal eating habits and lower self-esteem. Discrepancy between current and idea BMI was the most meaningful predictive factor about depression and suicidal thoughts by linear regression analysis. Conclusion:In spite of normal weight range of enrolled subjects, they experienced significant depressive mood, suicide thoughts and lower self-esteem associated with the discrepancy of their own subjective body image and current body mass index. Hence educational approach regarding normal body image and healthy weight control is needed for their mental health and preventing eating disorder.

  • PDF

Design and Implement a Smart Control System of Door Security Guard (도어 안전고리 스마트 제어시스템 설계 및 구현)

  • Lee, Hyo Seung;Oh, Jae Chul
    • Smart Media Journal
    • /
    • v.6 no.1
    • /
    • pp.61-67
    • /
    • 2017
  • A large number of people living in modern times prefer remaining unmarried or living alone independently for the reason of their own will or another person's will. This is because they dislike being interfered with by other persons or because there is a financial problem. This behavior has become mainstream in persons working for professional jobs, persons having a strong disposition toward individual activity or college students. In particular, career women pursuing their own comfortable life have the tendency to prefer single life. However, sometimes, they become a target of crime that targets and makes bad use of this point. For these reasons. Consequently, sometimes, they additionally install and use a security system such as door security guard at front door and so on. It is not so difficult to lock the door security guard at the front door. However, it is apt to be forgotten. And when they are on the bedspread before falling asleep, in case they should check whether the door security guard is locked or in case they should lock it, they should get up, go to the entrance, and check and lock the door security guard. They often don't lock the door security guard due to their feeling that it is all right because of annoyance and inconvenience. This paper is intended to work for safety from crime such as illegal housebreaking by more conveniently using the door security guard after designing and implementing a system that can remotely control the door security guard, using a smartphone as a method of resolving this annoyance and keeping life more safe.

The Development of Classification System of Medical Procedures in Korea (한국표준의료행위 분류체계 개발)

  • Park, Hyoung-Wook;Sohn, Myong-Sei;Kim, Han-Joong;Park, Eun-Cheol;Yu, Seung-Hum
    • Journal of Preventive Medicine and Public Health
    • /
    • v.29 no.4 s.55
    • /
    • pp.877-897
    • /
    • 1996
  • In recent years, the Korean Medical Association has undertaken the feat of establishing the Korean Standard Terminology of Medical Procedures with the dedicated help of 32 medical academic societies. However, because the project is being conducted by several different circles, it has yet to see a clear system of classification. This thesis, therefore, proposes the three principles of scientific properties, usefulness and ideology as the basis for classification system and has developed the Classification System of Medical Procedures in Korea upon their foundation. The methodology and organization of this thesis as follows. First, by adopting scientific classification system of Feinstein(1988), an analysis of the classification systems of the medical procedures in the United States, Japan, Taiwan, WHO was carried out to reveal the framework and the basic principles in each system. Second, the direction of classification system has been constructed by applying the normative principle of medical field in order to show the future direction of the medical field and realize its ideology. Third, a finalized framework for the classification system will be presented as based on the direction of classification system. Of the three basis principles mentioned above, the analysis on the principles of usefulness was left out of this thesis due to the difficulty of establishing specific standards of analysis. The results of the study are as follows. The overall structure of the thesis is aimed at showing the 'Prevention-Therapy-Rehabilitation' quality of comprehensive health care and consists of six chapters; I. Prevention and Health Promotion II. Evaluation and Management III. Diagnostic Procedures IV. Endoscopy V. Therapeutic Procedures VI. Rehabilitation Chapter three Diagnostic Procedures is divided into four parts : Functional Diagnosis, Visual Diagnosis, Pathological Diagnosis, Biopsy and Sampling. Chapter five Therapeutic Procedures is divided into Psychiatry, Non-Invasive Therapy, Invasive Therapy, Anaesthesia and Radiation Oncology. Of these sub-divisions, Functional Diagnosis, Biopsy and Sampling, Endoscopy and Invasive Therapy employs the anatomical system of classification. On the other hand, Visual Diagnosis, Pathological Diagnosis, Anesthesia and Diagnostic Radiology, namely those divisions in which there is little or no overlapping in services with other divisions, used the classification system of its own division. The classification system introduced in this thesis can be further supplemented through the use of the cluster analysis by incorporating the advice and assistance of other specialists.

  • PDF

A Study on the Feasibility of the Espionage Charges for the Industrial Technology Divulgence (산업기술의 해외유출행위에 대한 간첩죄 처벌 타당성 연구)

  • Kim, Hang-Gon;Lee, Chang-Moo
    • Korean Security Journal
    • /
    • no.57
    • /
    • pp.253-275
    • /
    • 2018
  • Economic security emerged as a strong element of national security. Nations around the world are exerting their efforts to collect economic intelligence to serve their national interest while making added efforts to uncover industrial espionage and arrest industrial spies in defensive aspect. Cases in point are the enactment of "Economic Espionage Act(1996)" of the U.S. and the "Act on Prevention of Divulgence and Protection of Industrial Technology(2006)"of Korea. Korea is trying to punish industrial spying on the same level as espionage that poses national security threat by revising Criminal Code. It is necessary to review whether the move to toughen the punishment of industrial spying from "up to 15 years in prison and/or up to 1.5 billion won in fine" to "minimum seven years of imprisonment, life imprisonment or death penalty" is appropriate. Advanced nations regulate industrial spying with a special act on economy although they have applied espionage act not to "enemy states" but to "foreign countries" in the first place. Likewise, preventing industrial spying by applying espionage act through the revision of criminal code poses a risk of undermining the autonomy of industry sector by excessive influence of state power. Furthermore, the penalty of minimum imprisonment of seven years, life imprisonment or death penalty with the application of espionage act under the criminal code is an legal application by stretching of the law, posing a risk of dampening healthy economic activities. Therefore, revising and applying relevant economic laws such as aforementioned 'Act on Prevention of Divulgence and Protection of Industrial Technology(2006)' is thought to be desirable to achieve the goal of protecting industrial technologies.

Influence on Information Security Behavior of Members of Organizations: Based on Integration of Theory of Planned Behavior (TPB) and Theory of Protection Motivation (TPM) (조직구성원들의 정보보안행동에 미치는 영향: 보호동기이론(PMT)과 계획된 행동이론(TPB) 통합을 중심으로)

  • Jeong, hye in;Kim, seong jun
    • Korean Security Journal
    • /
    • no.56
    • /
    • pp.145-163
    • /
    • 2018
  • Recently, security behavior of members of organizations has been recognized as a critical part of information security at the corporate level. Leakage of customers' information brings more attention to information security behavior of organizations and the importance of a task force. Research on information breach and information security is actively conducted of personal behavior toward security threats or members of organizations who use security technology. This study aims to identify factors of influence on information security behavior of members of organizations and to empirically find out how these factors affect information security behavior through behavior toward attitude, subjective norm and perceived behavior control. On the basis of the research, this study will present effective and efficient ways to foster information security activities of members of organizations. To this end, the study presented a research model that applied significant variables based on integration of Theory of Planned Behavior (TPB) and Theory of Protection Motivation (TPM). To empirically verify this research model, the study conducted a survey of members of organizations who had security-related work experience at companies. So, it is critical for members of organizations to encourage positive word of mouth (WOM) about information security behavior. Results show that based on the integration of TPM and TPB, perceived vulnerability, perceived severity, perceived efficiency and perceived barriers of information security behavior of members of organizations had significant influences on mediating variables such as behavior toward attitude, subjective norm, perceived behavior control and intention. They also had significant influences on organization information security behavior which is a dependent variable. This study indicates companies should introduce various security solutions so that members of the organizations can prevent and respond to potential internal and external security risks. In addition, they will have to take actions to inspect vulnerability of information system and to meet security requirements such as security patches.