• Title/Summary/Keyword: Access prevention

Search Result 377, Processing Time 0.028 seconds

An integrated Approach to Worksite Tobacco Use Prevention and Oral Cancer Screening Among Factory Workers in Mumbai, india

  • Pimple, Sharmila;Pednekar, Mangesh;Majmudar, Parishi;Ingole, Nilesh;Goswami, Savita;Shastri, Surendra
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.13 no.2
    • /
    • pp.527-532
    • /
    • 2012
  • Background: Tobacco control and cessation interventions are among the most cost effective medical interventions but health systems in low resource countries lack the infrastructure to promote prevention and cessation among tobacco users. Workplace settings have the potential to provide opportunities and access for tobacco prevention interventions. Methods: This is a single group study evaluating tobacco use prevention and cessation through a structured three stage intervention program for tobacco users comprising education on harmful effects of tobacco, oral cancer screening and behavior therapy for tobacco cessation at the worksite. Results: All the 739 workers who were invited participated in tobacco awareness program and were screened for oral pre cancer lesions. 291 (39.4%) workers were found to be users of tobacco in some form. Education, gender and alcohol use (p<0.0001) were some of the factors associated with tobacco user status. The prevalence of clinical oral precancer lesions among tobacco users was 21.6%. Alcohol consumption (p<0.001), the type of tobacco consumed (p<0.018), personal medical history of chronic diseases (p<0.007) and combined use of alcohol and tobacco (p<0.001) were some factors found to be associated with presence of oral pre cancer lesions. Conclusion: An integrated approach for worksite based tobacco use prevention with oral cancer screening program showed good acceptance and participation and was effective in addressing the problem of tobacco consumption among the factory workers.

A Study on Interdependence of Private Security and Techniques of CPTED (민간경비와 환경설계를 통한 범죄예방(CPTED) 기법의 상호의존성에 관한 연구)

  • Lee, Jung-Duk;Lim, You-Seok
    • Korean Security Journal
    • /
    • no.29
    • /
    • pp.223-249
    • /
    • 2011
  • In modern society, citizens' quality of life aspects of safety and crime prevention activities are actively considering the incidence of crime prevention in advance. It also can be quite important elicit the interest of who community members through effective crime prevention strategies. For crime prevention policies and techniques over time as more scientific and advanced methods are made. Today, A typical crime prevention strategies is private security zones and Crime Prevention Through Environmental Design (CPTED) is a corresponding to the new strategy. CPTED is a diversification can be called a crime prevention approach that emphasizes the principle of natural surveillance, access control, territoriality, activity support, maintenance and management. The defensible space of the space area related to crime prevention setting the activities of private security and CPTED determine. Also, the reality of crime prevention and protection should be considered space. The emphasis on proactive prevention of crime in modern society for the prevention of crime how to approach differing perspectives and disparate aspects of private security and CPTED. Technical and professional areas that overlap to some extent in a homogeneous aspect. Ultimately, CPTED is a crime prevention through space and environmental approach for crime. In addition, Ultimate goal of convergence, crime prevention, with the same or higher is required to study for the area after looking for the characteristics and limitations of private security and CPTED.

  • PDF

Long-Term Results of Arteriovenous Fistula for Hemodialysis in Chronic Renal Failure (혈액투석을 위한 동정맥루의 장기관찰 성적)

  • 김인광
    • Journal of Chest Surgery
    • /
    • v.27 no.9
    • /
    • pp.764-769
    • /
    • 1994
  • From november, 1985 to May, 1993, 222 arteriovenous fistulae were made in 201 patients with chronic renal failure. Among them, a total of 183 arteriovenous fistulae in 173 patients were reviewed to evaluate the factors influencing patency rate of the vascular access. The results were revealed as follows: There were 102 men and 71 women,aged 10 to 76 years [mean = 45.7 years]. Sixteen patients of them had previous shunts. The procedures included establishment of 214 radiocephalic or brachioocephalic fistulae, 203 side to end, 9 side to side, 2 end to end, 2 autologous saphenous vein grafts, 6 Gore-Tex grafts. There were 28 early shunt failures[12%] due to use of 23 inadequate veins and 5 thrombosis.There were 32 late complications[14%]; 19 thrombosis, 4 aneurysm, 4 venous hypertension, 3 steal syndrome, 2 infections. There were 32 diabetic patients [17 %]. No significant differences in graft patency were noted between diabetic and nondiabetic individuals. There were no significant difference in graft patency between male and female. Overall shunt patency in 183 cases with chronic renal failure was 96% at I month, 95% at 3 months, 93% at I year, 91% at 2 years, 84% at 3 years, 56% at 5years.This Study showed that early postoperative thrombosis and diabetic vasculopathy were most causes of the vascular access failure and suggested that prevention of thrombi and well control of diabetes mellitus were most important to enhance patency rates of the vascular access.

  • PDF

Network Group Access Control system using piggy-backing prevention technique based on Infrared-Ray (적외선 기반 피기백킹 방지 기법을 적용한 네트워크 그룹 접근통제 시스템)

  • Kim, JongMin;Choi, KyongHo;Lee, DongHwi
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.109-114
    • /
    • 2012
  • Information society in recent times, lots of important information have been stored in information systems. In this situation, unauthorized person can obtains important information by piggy-backing and shoulder surfing in specific area of organization. Therefore, in this study, we proposed network group access control system by combining RFID and infrared-ray for blocking information leakage due to unauthorized access by internal threats and enhancing personnel security. So it can provides a more secure internal network environment.

Adaptive Convergence Security Policy and Management Technology of Home Network (홈 네트워크에서의 적응적 통합 보안 정책 및 관리 기술)

  • Lee, Sang-Joon;Kim, Yi-Kang;Ryu, Seung-Wan;Park, You-Jin;Cho, Choong-Ho
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.34 no.4
    • /
    • pp.72-81
    • /
    • 2011
  • In this paper, we propose adaptive convergence security policies and management technologies to improve security assurance in the home networking environment. Many security issues may arise in the home networking environment. Examples of such security issues include the user privacy, the service security, the integrated networking security, the middleware security and the device failure. All these security issues, however, should be fulfilled in phase due to many difficulties including deployment cost and technical complexity. For instance, fundamental security requirements such as authentication, access control and prevention of crime and disaster should be addressed first. Then, supplementary security policies and diverse security management technologies should be fulfilled. In this paper, we classify these requirements into three categories, a service authentication, a user authentication and a device authentication, and propose security policies and management technologies for each requirement. Since the home gateway is responsible for interconnection of many home devices and external network access, a variety of context information could be collected from such devices.

A Study on Anomaly Detection Model using Worker Access Log in Manufacturing Terminal PC (제조공정 단말PC 작업자 접속 로그를 통한 이상 징후 탐지 모델 연구)

  • Ahn, Jong-seong;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.321-330
    • /
    • 2019
  • Prevention of corporate confidentiality leakage by insiders in enterprises is an essential task for the survival of enterprises. In order to prevent information leakage by insiders, companies have adopted security solutions, but there is a limit to effectively detect abnormal behavior of insiders with access privileges. In this study, we use the Unsupervised Learning algorithm of the machine learning technique to effectively and efficiently cluster the normal and abnormal access logs of the worker's work screen in the manufacturing information system, which includes the company's product manufacturing history and quality information. We propose an optimal feature selection model for anomaly detection by studying clustering methods.

Identify Management System with improved security based working time supervising (근태관리 중심으로 보안성을 향상시킨 2-Factor 인증 계정관리시스템)

  • Choi, Kyong-Ho;Kim, Jongmin;Lee, DongHwi
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.71-76
    • /
    • 2017
  • Today, it is an information society where a large number of users access and view important data in a large number of information assets as needed. In this complexity, techniques related Identify Management are being applied, in order to verify authorized user access to important information assets and manage of history. But, the ability access to sensitive information using account has the disadvantage of being able to open the way for information to the attacker when it is hijacked. Thus, in this paper, we propose a secure Identify Management System that can control the use of accounts based on the attitude of the account holder, but also enhances the security and does not hinder the convenience.

The Proposal of Efficient Hit Prevention Technique according to the Frequency Hopping Pattern in Orthogonal Multi-Carrier FH/CDMA System (직교 멀티캐리어 FH/CDMA 시스템에서 주파수 도약 패턴에 따른 효율적인 충돌 방지 기법 제안)

  • 이문승
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.2
    • /
    • pp.141-150
    • /
    • 2002
  • In this paper, we composed orthogonal multi carrier FH/CDMA system using frequency hopping sequence. Considering hit possibilities by delayed other user's signals we searched the optimal number of user access carrier slots not to influence on performance deterioration with the variation of number of carrier slots according to the number of user access carrier slots. A]io, we evaluated the BER performance improvement due to TCM and Concatenated coding technique by computer simulation.

A Study on the Safety Control System of Child Care Systems Using Interior Lighting and Entry Systems

  • Joo, Dae-Chul;Kwon, Mee-Rhan;Shin, Seung-Jung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.9 no.1
    • /
    • pp.42-49
    • /
    • 2017
  • Despite the government's various safety measures, the number of safety accidents continues to rise and the interior is more likely to occur indoors than outdoors. Safety accidents involving young children account for more than 70 % of the safety accidents in the safety accidents, and the ratio of safety accidents in the classroom or classroom is more than 50 %. In this thesis the author proposes the system managing the accidents notification service using LED lighting and access entry control. Utilizing IoT technology, remote control or access can be controlled remotely by controlling multiple lights and entrances from each room and by means of a number of lighting and entrances. By monitoring and analyzing real-time status via server PC and mobile interface, it can control the maximum control and incident prevention, automatic control, and automatic control.

sDBMS for Hacking Prevention on Based PMI for Contents Protection in Web Environment (Web 환경에서 컨텐츠 보호를 위한 PMI 기반의 해킹방지 sDBMS)

  • Ryoo Du-Gyu;Kim Young-Chul;Jun Moon-Seog
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.5
    • /
    • pp.679-690
    • /
    • 2005
  • Business model in Web environments is usually provided by multimedia data. Information exchange between users and service providers should be made in encrypted data. Encrypted data are secure from being hacked. Application of DB encryption is a main technology for contents protection. We have applied the access control based on RBAC and prevented the unauthorized users from using the contents. In this paper, we propose a new DB encryption scheme which uses RHAC and digital signature based on PMI.

  • PDF