• Title/Summary/Keyword: Abuse Damage

Search Result 61, Processing Time 0.025 seconds

Study of Security Requirement of Smart Home Hub through Threat Modeling Analysis and Common Criteria (위협 모델링 분석 및 국제공통평가기준을 통한 스마트홈 허브의 보안요구사항에 관한 연구)

  • Park, Jae-Hyeon;Kang, Soo-young;Kim, Seung-joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.513-528
    • /
    • 2018
  • In a smart home environment that integrates IoT technology into a residential environment, the smart home hub provides convenience functions to users by connecting various IoT devices to the network. The smart home hub plays a role as a gateway to and from various data in the process of connecting and using IoT devices. This data can be abused as personal information because it is closely related to the living environment of the user. Such abuse of personal information may cause damage such as exposure of the user's identity. Therefore, this thesis analyzed the threat by using LINDDUN, which is a threat modeling technique for personal information protection which was not used in domestic for Smart Home Hub. We present evaluation criteria for smart home hubs using the Common Criteria, which is an international standard, against threats analyzed and corresponding security requirements.

Cognition and Experience about Sexual Harassment in Elementary School Students (초등학생의 성희롱에 대한 인식과 경험)

  • Yang, In-Hye;Chun, Jin-Ho
    • Journal of the Korean Society of School Health
    • /
    • v.15 no.2
    • /
    • pp.233-248
    • /
    • 2002
  • Purpose : Sexual abuse especially in younger group have been growing. This study was performed to propose the fundamental data for developing early education program to prevent damage from sexual harassment in elementary school students. Method : Questionnaire survey on cognitions and experiences about sexual harassment was done on 3125 elementary school students from seven elementary schools in Busan area from January to March, 2002. Data analysis was done with SPSS (ver 10.0). Results : Though 82% of the students have ever herd about sexual harassment previously, but self assessment of 'well-known' was only 5%. About 40% of them have ever experienced audio-visual sexual materials mainly through PC (18%), media (14%), etc. And, 60% of them have ever educated about sexual harassment. In cognitions, they agreed 'unwanted touch', 'intentional showing his (her) own body', 'send lewd mails and pictures', but disagreed 'ask massage from aged', 'gaudy joke' as one of sexual harassment. In attitudes, 'no response', 'defense with friends and family', 'express unpleasantness apparently' were desirable pattern, instead, 'his (her) own responsibility', 'problem only between person concerned', 'neglect is the best way' were undesirable. About 24% of them have ever experienced at least one of the fifteen types of sexual harassment with major types of lewd mails pictures (11%), hugging (5%), ask massage (4.7%) and unwanted touch (3.3%). The experience by gender was higher in girls (25.0%) than boys (22.4%) with no statistical significance. The mean level of cognition and attitude out of one hundred was $70.3{\pm}28.1$ and $73.5{\pm}15.9$, respectively. The mean frequency of experience was $0.4{\pm}1.1$ times. The level of cognition and attitude was higher in girls, 6th graders, and in ever educated group (p<0.001). Conclusions : The cognition level of elementary school students about sexual harassment assessed considerable. And, they also experienced several types of sexual harassment, though not too much. Therefore, compatible education program let them able to protect themselves from sexual harassment should be developed and applied even in early school age.

A Study on the Realities of Sexual Violence and the Measure for Social Welfare (성폭력 실태와 사회복지적 대책 방안에 관한 연구)

  • Bae, Na-Rae;So, Kwon-Seob
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.2
    • /
    • pp.251-258
    • /
    • 2020
  • This study aims to address the current situation and damage from sexual violence, to arouse public opinion, help broader awareness, and further lead to community social efforts to cope actively with the situation. In Korean society, discourse on sex is often conducted in a double structure. Sexual violence is not just a personal misfortune; it is a problem for women as a whole. Furthermore, it is a challenge that society needs to address. Therefore, the government should evolve its response to sexual violence into a collective, not individual, movement of men and women toward social and cultural movements together. Although the visible reality of sexual violence is important, damaging their mental health by passing on a distorted cultural environment to future generations should be seen as a type of historical crime.

Comparative Evaluation of Conidia, Blastospores and Culture Filtrates from Entomopathogenic Fungi against Tetranychus urticae

  • Yun, Hwi-Geon;Kim, Dong-Jun;Lee, Ji-Hoon;Ma, Ji-In;Gwak, Won-Seok;Woo, Soo-Dong
    • International Journal of Industrial Entomology and Biomaterials
    • /
    • v.35 no.1
    • /
    • pp.58-62
    • /
    • 2017
  • The two-spotted spider mite (Tetranychus urticae) has sustained damage on more than 200 host plants worldwide. Many farmers have relied on chemical acaricides to control mite, but the abuse of acaricides has caused serious resistance to mite. To overcome this problem, microbial control using entomopathogenic fungi have been studied. Entomopathogenic fungi have been an important role against the control of pest, and most of their culture products have been demonstrated to have virulence against pest population. In this study, we evaluated and compared the virulence of culture filtrates, aerial conidia and blastospores of selected Metarhizium anisopliae 4-2 and Beauveria bassiana 2R-3-3-1, respectively, among two-spotted spider mite-pathogenic fungi. As a result, the virulence was confirmed in all treatments, and the accumulated mortality rates were between 77 and 100% within 7 days. Especially, treatment with the fungal culture filtrate alone exhibited quite high virulence, and combined treatment with aerial conidia or blastospores enhanced activity. However, the median lethal time of treatments was not significantly different. When two isolates were compared, M. anisopliae 4-2 showed higher virulence than B. bassiana 2R-3-3-1. These results suggest that the selected two fungal isolates and their culture products could be used effectively for the control of two-spotted spider mite.

Revisiting History of Treatment of Attention Deficit Hyperactivity Disorder : Pharmacologic Approach (주의력결핍 과잉행동장애 치료의 역사적 재조명 : 약물치료적 접근)

  • Bahn, Geon Ho;Hong, Min Ha;Lee, Yeon Jung;Han, Ju Hee;Oh, Soo Hyun
    • Korean Journal of Biological Psychiatry
    • /
    • v.21 no.2
    • /
    • pp.37-48
    • /
    • 2014
  • Besides from medical data, the patients who were previously called as attention disorder, mental instability, moral imbeciles, or moral defectives, can also be identified by exploring literatures and historical figures. In the past, as we can notice from the titles, they were recognized as a 'moral defect group'. And rather than treating them, separation from the society was the main solution. After the endemic encephalitis from 1917 to late 1920s, however, many survivors suffered from behavioral problems similar to those of the previous 'moral defect group' and studies on the relationship between brain damage and behavior problems were started henceforth. After being known as the 'minimal brain dysfunction', it was developed into the current attention-deficit/hyperactivity disorder. While the disease concept changed and developed over time, after numerous trials and errors, treatment medication starting from central nervous system stimulants such as amphetamine and methylphenidate is used for treatment in children and adult patients with ADHD, and most recently non-stimulants such as atomoxetine has become the one of the first line treatment options. Although we went through a thorough verification process of the safety and efficacy of the medication by contemplating the historical development process, we believe that adjustment is needed for remaining concerns on medication abuse and slight differences in disease paradigm and therapeutic philosophy depending on cultures.

Thermal Resistance Characteristics of the Backfill Material with Bottom Ash (저회 되메움재의 열저항 특성)

  • Jung, Hyuksang;Cho, Sam-Deok;Kim, Ju-Hyong;Park, Jongsik;Kong, Jin-Young
    • Journal of the Korean GEO-environmental Society
    • /
    • v.17 no.6
    • /
    • pp.5-12
    • /
    • 2016
  • This paper deals with the result of thermal resistance test with backfill materials as bottom ash by using backfill material. Bottom ash, one of coal ashes, can be reused to replace sand because of its similar engineering properties. But without considering the thermal property, the abuse of bottom ash resulted in damage for existing structures. To investigate the thermal conductivity of bottom ash, laboratory tests for thermal resistance of that were carried out in this study. Thermal properties of bottom ash was compared with those of in-situ soil, sand, backfill material which can be applied as filling material. The tests were classified by water contents defined as the major influence factor. The beneficial use method of bottom ash was suggested as backfilling material.

Analyzing Effects on Firms' Market Value of Personal Information Security Breaches (개인정보 유출이 기업의 주가에 미치는 영향)

  • Kim, JeongYeon
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.1
    • /
    • pp.1-12
    • /
    • 2013
  • With the increases of requirement for user identification in Internet services, we should let the service companies know my personal information. If the shared personal information with them are used in not-allowed area or delivered to un-authorized persons, we may have practical harms in several fields such as financial related operations. Korean Government has introduced new management method for personal information, but it is not hard to find the personal information management issues from Korean news papers. The proper measurement should be delivered to related companies to help them to decide investment for security. This paper review the indirect measurement method of demages by check the stock prices of related company for personal information management issue. We check the relationship between change of stock price and the information management issue. The result shows there are no changes in stock market. Korean government added strong regulations for personal information management though. To prevent further personal information issues, we should recognize the indirect damages properly and let the company pay higher reparations for any personal information abuse.

A Case Report of Alcohol-Related Dementia Treated with Korean Medicine, Including Gwibi-Tang-Gami (귀비탕 가미방을 포함한 한방치료로 호전된 알코올성 치매 환자 1례)

  • Lee, Hyoung-min;Kim, Jeong-hwa;Yang, Seung-bo;Lee, Hyun-joong;Cho, Seung-yeon;Park, Seong-uk;Ko, Chang-nam;Park, Jung-mi
    • The Journal of Internal Korean Medicine
    • /
    • v.37 no.4
    • /
    • pp.678-684
    • /
    • 2016
  • Objectives: This clinical study describes the effect of Korean medicine on a patient with alcohol-related dementia.Methods: A patient with cognitive disorder and memory impairment due to alcohol abuse was treated with the herbal medicine “Gami Gwibi-tang”, acupuncture, and moxibustion, together with basic Western medicine. The patient’s cognitive function was evaluated by the Mini-Mental State Examination-Korean (MMSE-K) and Clinical Dementia Rating (CDR). Brain Magnetic Resonance Imaging (MRI) was used to estimate the severity of structural brain damage.Results: Following treatment with Gami Gwibi-tang, patent’s MMSE-K score and CDR improved.Conclusion: This clinical case study provides evidence of the effect of Korean medicine, including Gwibi-tang-gami, on alcohol-related dementia.

Methamphetamine and MDMA (3,4-methylenedioxymethamphetamine) Induce Apoptosis in Both Human Serotonergic and Dopaminergic Cell Lines

  • Kim, Kyu Bong;Suh, Soo Kyung;Lee, Bo Kyung;Kim, Byung Kyu;Kim, Jae Hee;Han, Eui Sik;Park, Chang Won;Kim, Jong Won;Kim, Kwang Jin;Lee, Sun Hee
    • Biomolecules & Therapeutics
    • /
    • v.11 no.4
    • /
    • pp.214-223
    • /
    • 2003
  • Methamphetamine (METH) and 3,4-methylenedioxymethamphetamine (MDMA) have become popular recreational drugs of abuse in many countries. Although the neurotoxic damage caused by METH and MDMA is characterized by degeneration of the dopaminergic and serotonergic systems in brain, the molecular and cellular mechanisms remain to be clarified. Therefore, the purposes of this study were to confirm the capability of METH and MDMA to induce apoptosis and to clarify the action of its molecular mechanism by using serotonergic JAR cells and dopaminergic SK-N-SH cells. METH and MDMA were dose-dependently cytotoxic to human serotonergic JAR cells and dopaminergic SK-N-SH cells. The morphological change of apoptosis was found in Giemsa staining and TUNEL and further verified in DNA fragmentation analysis. Immunoblotting analysis revealed proteolytic cleavage of caspase-3 and -9 and change of bcl-2 and bax proteins. These results suggest that METH and MDMA may induce caspase-dependent apoptosis via the mitochondrial cell death pathway and METH and MDMA-induced neurotoxicity may happen to broadly and independently of both dopaminergic and serotonergic systems.

A Method for Effective Mobile Electronic Notification Service of Private Institutions

  • Kim, JongBae
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.2
    • /
    • pp.194-200
    • /
    • 2022
  • Traditionally, postal services that produce and deliver paper-based notices have been the mainstream. The reason is that it has the function of distribution and proof of delivery in the postal delivery system as well as the advantage of information delivery through postal delivery. After all, for the purpose of distribution and proof of delivery, many organizations use paper-based postal notices. However, in recent years, it has been in the spotlight to produce a paper-based postal notice as an electronic notice and deliver information to a mobile device through the Internet. In this paper, we propose a safe interworking method for user identification information required for private institutions to transmit mobile electronic notices. In order for a private institution to accurately deliver an electronic notice to a mobile service subscriber, a means to confirm whether the private institution and the mobile device subscriber are the same person is required. In the mobile electronic notification service, the connecting information provided by the personal identity proofing agency is used as a means of user identification. Connecting information is called a resident registration number on the Internet and is one-way hash information that can only be created by the personal identity proofing agency designated by the government. In order to transmit a mobile electronic notice, it is necessary to share connecting information for the same user identification between the institution that requests the sending of the electronic notice and the institution that processes the sending of the electronic notice. Connecting information is personal information that can uniquely identify a user, and if it is disclosed, damage such as personal information infringement may occur. As such, it is necessary to prevent problems that may arise from misuse and abuse of connecting information as well as increase in the benefits of sending the mobile electronic notice. In this paper, a safe and effective mobile electronic notification service can be performed by suggesting a method for safe interworking of information related to the mobile electronic notification service.