• Title/Summary/Keyword: Audit Time

Search Result 161, Processing Time 0.035 seconds

Materialize the Checklist through Type of Classification analysis for the Regulatory Compliance and Database Encryption, Access Control (데이터베이스 규제 준수, 암호화, 접근제어 유형 분류에 따른 체크리스트 구현)

  • Lee, Byoung-Yup;Park, Jun-Ho;Kim, Mi-Kyoung;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.2
    • /
    • pp.61-68
    • /
    • 2011
  • Due to the rapid development of the Internet, many companies in a variety of applications to users open an unspecified number of the current business environment, security of personal information about recent issues are often mentioned in terms of its importance may be the company's top priority. The government recently on personal information strengthening measures on information communications network law enacted into law which is applicable to various industries. Companies to protect the personal information of various measures to comply with these regulations, and arrange your personal information for internal management to enhance security fast security solution has been introduced. The number of used data is stored in the DBMS in terms of compliance with these regulations at the same time effectively to ensure data security and encryption measures, access control, audit, each separated by an implementation of the solution and how it compares with the best Database security plan allows you to explore as a this paper's security checklist.

A Study of the Back-tracking Techniques against Hacker's Mobile Station on WiBro (WiBro에서 공격 이동단말에 대한 역추적기법 연구)

  • Park, Dea-Woo;Lim, Seung-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.3
    • /
    • pp.185-194
    • /
    • 2007
  • WiBro has become intentionally standardize as IEEE 802.16e. This WiBro service has been started by a portable internet at home as well as abroad. In this paper, an offender hacker do not direct attack on system on system that It marched an attack directly in damage system because a place oneself in mobile station of portable internet WiBro and avoid to attack hacker's system. At this time, a mobile make use of network inspection policy for back-tracking based on log data. Used network log audit, and presented TCP/IP bases at log bases as used algorithm, the SWT technique that used Thumbprint Algorithm. Timing based Algorithm, TCP Sequence number. Study of this paper applies algorithm to have been progressed more that have a speed to be fast so that is physical logical complexity of configuration of present Internet network supplements a large disadvantage, and confirm an effective back-tracking system. result of research of this paper contribute to realize a back-tracking technique in ubiquitous in WiBro internet network.

  • PDF

Development of the Financial Account Pre-screening System for Corporate Credit Evaluation (분식 적발을 위한 재무이상치 분석시스템 개발)

  • Roh, Tae-Hyup
    • The Journal of Information Systems
    • /
    • v.18 no.4
    • /
    • pp.41-57
    • /
    • 2009
  • Although financial information is a great influence upon determining of the group which use them, detection of management fraud and earning manipulation is a difficult task using normal audit procedures and corporate credit evaluation processes, due to the shortage of knowledge concerning the characteristics of management fraud, and the limitation of time and cost. These limitations suggest the need of systemic process for !he effective risk of earning manipulation for credit evaluators, external auditors, financial analysts, and regulators. Moot researches on management fraud have examined how various characteristics of the company's management features affect the occurrence of corporate fraud. This study examines financial characteristics of companies engaged in fraudulent financial reporting and suggests a model and system for detecting GAAP violations to improve reliability of accounting information and transparency of their management. Since the detection of management fraud has limited proven theory, this study used the detecting method of outlier(upper, and lower bound) financial ratio, as a real-field application. The strength of outlier detecting method is its use of easiness and understandability. In the suggested model, 14 variables of the 7 useful variable categories among the 76 financial ratio variables are examined through the distribution analysis as possible indicators of fraudulent financial statements accounts. The developed model from these variables show a 80.82% of hit ratio for the holdout sample. This model was developed as a financial outlier detecting system for a financial institution. External auditors, financial analysts, regulators, and other users of financial statements might use this model to pre-screen potential earnings manipulators in the credit evaluation system. Especially, this model will be helpful for the loan evaluators of financial institutes to decide more objective and effective credit ratings and to improve the quality of financial statements.

A Digital Secret File Leakage Prevention System via Hadoop-based User Behavior Analysis (하둡 기반의 사용자 행위 분석을 통한 기밀파일 유출 방지 시스템)

  • Yoo, Hye-Rim;Shin, Gyu-Jin;Yang, Dong-Min;Lee, Bong-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.11
    • /
    • pp.1544-1553
    • /
    • 2018
  • Recently internal information leakage in industries is severely increasing in spite of industry security policy. Thus, it is essential to prepare an information leakage prevention measure by industries. Most of the leaks result from the insiders, not from external attacks. In this paper, a real-time internal information leakage prevention system via both storage and network is implemented in order to protect confidential file leakage. In addition, a Hadoop-based user behavior analysis and statistics system is designed and implemented for storing and analyzing information log data in industries. The proposed system stores a large volume of data in HDFS and improves data processing capability using RHive, consequently helps the administrator recognize and prepare the confidential file leak trials. The implemented audit system would be contributed to reducing the damage caused by leakage of confidential files inside of the industries via both portable data media and networks.

Effect of Choice of Overseas Travel on Fear of risk in Overseas (해외에서 발생한 위험에 대한 두려움이 해외여행 선택에 미치는 영향)

  • Shin, Jaehun;Kim, Sangwooon
    • Journal of the Society of Disaster Information
    • /
    • v.15 no.2
    • /
    • pp.198-205
    • /
    • 2019
  • Purpose: This study was conducted and analyzed using statistical techniques to examine the impact of fear of risk committed by risk committed overseas on people who are about to travel abroad. Method: In the event of a risk, fear of a risk occurs, and fear of a risk adversely affects people's daily lives, and in the event of a decline in daily life, affecting the economy and social activities of the area, a small risk often has a huge impact on society. In particular, the fear of risk committed abroad has an impact on overseas activities as overseas travel has been activated in time for the global era. Result and Conclusion: Therefore, according to the research, the fear of crimes committed overseas has a negative effect on the choice of overseas travel.

Effectiveness of Drinking Reduction Program Focused on Self-Determination Enhancement for College Students with Problematic Drinking (문제음주 대학생을 위한 자기결정성증진 절주프로그램 개발 및 효과)

  • Ma, Jin-Kyoung;Yoo, Moon-Sook
    • Journal of Korean Academy of Nursing
    • /
    • v.51 no.3
    • /
    • pp.265-279
    • /
    • 2021
  • Purpose: This study examined the impact of a drinking reduction program on drinking motivation, drinking refusal self-efficacy, and problematic drinking behaviors in college students with problematic drinking habits. Methods: This study incorporated a non-equivalent control group prepost-test design. Study participants included 58 college students who scored 12 or more in the AUDIT-K test (Alcohol Use Disorders Identification Test-Korean version) (experimental group: 30; control group: 28). The intervention consisted of eight sessions and was conducted once a week. It was designed to promote autonomy, competence, and relatedness-the three elements of basic psychological needs in self-determination theory. The participants were assessed before the intervention, immediately after, and four weeks post intervention. Data were collected from October 12 to December 31, 2017. The analysis employed the chi-square test, Fisher's exact test, independent t-test, and repeated measures ANOVA using SPSS/WIN 22.0. Results: The mean age of participants was 21.8 years. There were 30 men (51.7%) and 28 women (48.3%). The differences in drinking motivation, drinking refusal self-efficacy, and problematic drinking behaviors were statistically significant for the group by time interaction (F = 42.56, p < .001; F = 54.96, p < .001; F = 39.90, p < .001, respectively). Conclusion: The findings indicate that the intervention effectively decreases drinking motivation, increases drinking refusal self-efficacy, and decreases problematic drinking behaviors. It can be an efficient strategy for college students with problematic drinking habits to enhance their self-determination ability.

OHDSI OMOP-CDM Database Security Weakness and Countermeasures (OHDSI OMOP-CDM 데이터베이스 보안 취약점 및 대응방안)

  • Lee, Kyung-Hwan;Jang, Seong-Yong
    • Journal of Information Technology Services
    • /
    • v.21 no.4
    • /
    • pp.63-74
    • /
    • 2022
  • Globally researchers at medical institutions are actively sharing COHORT data of patients to develop vaccines and treatments to overcome the COVID-19 crisis. OMOP-CDM, a common data model that efficiently shares medical data research independently operated by individual medical institutions has patient personal information (e.g. PII, PHI). Although PII and PHI are managed and shared indistinguishably through de-identification or anonymization in medical institutions they could not be guaranteed at 100% by complete de-identification and anonymization. For this reason the security of the OMOP-CDM database is important but there is no detailed and specific OMOP-CDM security inspection tool so risk mitigation measures are being taken with a general security inspection tool. This study intends to study and present a model for implementing a tool to check the security vulnerability of OMOP-CDM by analyzing the security guidelines for the US database and security controls of the personal information protection of the NIST. Additionally it intends to verify the implementation feasibility by real field demonstration in an actual 3 hospitals environment. As a result of checking the security status of the test server and the CDM database of the three hospitals in operation, most of the database audit and encryption functions were found to be insufficient. Based on these inspection results it was applied to the optimization study of the complex and time-consuming CDM CSF developed in the "Development of Security Framework Required for CDM-based Distributed Research" task of the Korea Health Industry Promotion Agency. According to several recent newspaper articles, Ramsomware attacks on financially large hospitals are intensifying. Organizations that are currently operating or will operate CDM databases need to install database audits(proofing) and encryption (data protection) that are not provided by the OMOP-CDM database template to prevent attackers from compromising.

Strength and Durability Test of Rapid Hardening Composite Mat for Protect Railway Slope in Operation (운영중인 철도비탈면 보호를 위한 초속경 복합매트의 강도 및 내구성 실험)

  • Hyun-Sang, Yoo;Tae-Hee, Kang;Hyuk-Sang, Jung;In-Chul, Back
    • Journal of the Korean Geosynthetics Society
    • /
    • v.21 no.4
    • /
    • pp.79-91
    • /
    • 2022
  • Recently, the frequency of damage to slopes for highways, railways, and complexes has been increasing according to abnormal climates such as heavy rainfall or snowfall. Rapid Hardening Composite Mat (RHCM) could be a satisfactory alternative because it has the advantages that large-scale earthwork is not essential and the period for restoration is minimized. Also, this method does not require heavy machines and a phase of maintenance for slopes against the shotcrete method or planted slope protection, which are representative slope protection methods. Furthermore, the curing time is shorter than Geosynthetic Concrete Composite Mat (GCCM). Therefore, RHCM could be useful for emergency restoration work. Thus, in this study, the strength and duration of RHCM are estimated, compared, and analyzed with GCCM. As a result of the laboratory test, the strength of RHCM is greater 51%, and the duration is larger 69% than GCCM.

SWOT Analysis and Expert Assessment of the Effectiveness of the Introduction of Healthcare Information Systems in Polyclinics in Aktobe, Kazakhstan

  • Lyudmila, Yermukhanova;Zhanar, Buribayeva;Indira, Abdikadirova;Anar, Tursynbekova;Meruyert, Kurganbekova
    • Journal of Preventive Medicine and Public Health
    • /
    • v.55 no.6
    • /
    • pp.539-548
    • /
    • 2022
  • Objectives: The purpose of this study was to assess the organizational effectiveness of the introduction of a healthcare information system (electronic medical records and databases) in healthcare in Kazakhstan. Methods: The authors used a combination of 2 methods: expert assessment and strengths, weaknesses, opportunities, and threats (SWOT) analysis. SWOT analysis is a necessary element of research, constituting a mandatory preliminary stage both when drawing up strategic plans and for taking corrective measures in the future. The expert survey was conducted using 2 questionnaires. Results: The study involved 40 experts drawn from specialists in primary healthcare in Aktobe: 15 representatives of administrative and managerial personnel (chief doctors and their deputies, heads of medical statistics offices, organizational and methodological offices, and internal audit services) and 25 general practitioners. Conclusions: The following functional indicators of the medical and organizational effectiveness of the introduction of information systems in polyclinics were highlighted: first, improvement of administrative control, followed in descending order by registration and movement of medical documentation, statistical reporting and process results, and the cost of employees' working time. There has been no reduction in financial costs, namely in terms of the costs of copying, delivery of information in paper form, technical equipment, and paper.

Relationship Between Internet Addiction and Circadian Rhythm in Adults (성인 인터넷 중독과 일주기 리듬의 연관성)

  • Kang, Do Won;Soh, Minah;Lee, Tae Kyeong
    • Sleep Medicine and Psychophysiology
    • /
    • v.22 no.2
    • /
    • pp.57-63
    • /
    • 2015
  • Background and Objectives: Internet addiction is an increasing problem in Korea. The previous studies in this area have targeted adolescents and young adults. This study was conducted to examine the risk of internet addiction in Korean adults and the effect of internet addiction on circadian rhythm. Materials and Methods: For this study, 508 subjects were chosen through population proportional sampling to represent the adult population in Korea, 325 of whom were included based on the Alcohol Use Disorder Identification Test-Korea (Audit-K), Zung's Self-Rating Depression Scale (SDS), drug use in the past year, and suicide attempts. In these subjects, sociodemographic factors including age, gender, and residential area were analyzed, and Young's Internet Addiction Scale (IAS), Morningness-Eveningness Questionnaire (MEQ), and an online survey examining sleep onset time on weekdays and weekends, wake-up time, and caffeinated drink intake were executed. Results: Of the 325 subjects, 136 (41.8%) belonged to a high-risk internet addiction group ($IAS{\geq}40$), and 189 (58.2%) belonged to a normal group (IAS < 40). There was a high proportion of male subjects (p = 0.03) in the high-risk group compared to the normal group. There was a high proportion of younger subjects (p = 0.055) in the high-risk group compared to the normal group, but this difference was not statistically significant. Compared to the normal group, there was a high proportion of the evening type ($MEQ{\leq}41$) in the high-risk group (p = 0.024), who also showed a high proportion of caffeinated drink intake (p < 0.001). Also, the high-risk group was found to go to bed and wake up late, but there was no statistically significant difference with the normal group. Conclusion: This study showed that many adults have a high-risk of internet addiction, and there was a significant correlation between internet addiction and sleep in adult, as has been found in adolescents and early adults. In the future, a longitudinal study will be needed to verify the causal relationship between internet addiction and morningness-eveningness.