• Title/Summary/Keyword: Controlling the Access

Search Result 186, Processing Time 0.03 seconds

Study on the Relationship between Health Risk Behaviors of Rural Residents by Regional Scale (지역 규모에 따른 농촌주민의 건강위험행동 관계 연구)

  • Seungyeon Cho
    • Journal of agricultural medicine and community health
    • /
    • v.49 no.2
    • /
    • pp.111-120
    • /
    • 2024
  • Objective: This study aimed to analyze the correlation between factors affecting health risk behaviors of rural residents according to regional scale. Methods: Restricted-access data from the 2016~2021 Korea National Health and Nutrition Examination Survey and the multivariate probit model were used. As for health risk behaviors, smoking, drinking, lack of aerobic exercise, low level of healthy eating index, unvaccination, and non-participation in health examination were considered. Results: Controlling for individuals' socio-demographic characteristics, in general, correlation coefficients between unobservable factors affecting health risk behaviors were significant. However, the magnitude and statistical significance of the correlation coefficients varied by regional scale (dong/eup/myeon). This suggests that rural residents engage in health risk behaviors due to their different characteristics compared with urban dwellers, which also varies by whether residents are located in eup or myeon area. Conclusion: It is necessary to differentiate health care services between urban and rural areas in terms of type of service and programs based on the relationship between unobservable factors affecting each type of health risk behaviors.

Public Interest Test of Broadcasting Services in Korea : Focused on US and UK (한국의 방송서비스 공익성심사에 관한 고찰 : 미국 및 영국의 사례를 중심으로)

  • Lie, Han-Young
    • International Commerce and Information Review
    • /
    • v.12 no.1
    • /
    • pp.179-202
    • /
    • 2010
  • Broadcasting services sector has been facing strong public pressure to shift gears from regulation to deregulation since mid-1990s, where a triggering role was played particularly by rapid development of IT technology and content digitization. Major agenda was how to reduce regulatory divides between more liberal telecommunication sector and less liberal broadcasting. After all, common solution package worldwide was for the latter to switch over from network-dependent(vertical) to network-independent(horizontal) regulation, and to facilitate more open and competitive transmission with content market kept protected. This is no other than decoupling content provision from broadcasting and promoting market access towards the latter. Policy experiences of US and UK show that there exists a complementary relationship between quantitative and qualitative restrictions in implementing such deregulation. While mitigating quantitative ownership regulations in broadcasting, they also sought to systematize, so-called, PIT(public interest test) as a qualitative safety device to cope with the risk of losing fundamental public values accordingly in broadcasting. Recent domestic progress in broadcasting legislation in 2009, however, seems to overlook the growing importance of PIT in the process of deregulation. Bearing this motivation in mind and taking account of the relevant WTO disciplines, this paper is to address policy issues and suggestions for PIT in Korea's broadcasting services sector.

  • PDF

A Study of Program Execution Control based on Whitelist (화이트리스트 기반 프로그램 실행 통제 방안 연구)

  • Kim, Chang-hong;Choi, Dae-young;Yi, Jeong-hyun;Kim, Jong-bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.346-349
    • /
    • 2014
  • Currently, the growing cyber threat continues, the damage caused by the evolution of malicious code incidents become more bigger. Such advanced attacks as APT using 'zero-day vulnerability' bring easy way to steal sensitive data or personal information. However it has a lot of limitation that the traditional ways of defense like 'access control' with blocking of application ports or signature base detection mechanism. This study is suggesting a way of controlling application activities focusing on keeping integrity of applications, authorization to running programs and changes of files of operating system by hardening of legitimate resources and programs based on 'white-listing' technology which analysis applications' behavior and its usage.

  • PDF

A Priority-based Time Slot Allocation Protocol for Hybrid MAC in WSNs (WSN에서 하이브리드 MAC을 위한 우선순위기반 타임 슬롯 할당 프로토콜)

  • Nam, Jae-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.6
    • /
    • pp.1435-1440
    • /
    • 2014
  • Nodes in WSNs must operate under limited energy resource. Controlling access to the channel in WSNs plays a key role in determining channel utilization and energy consumption. This paper introduces a priority-based time slot allocation protocol for hybrid TDMA/CSMA MAC in WSNs. This protocol combines both TDMA and CSMA techniques while introducing prioritization by (m,k)-firm constraint. The performance of this protocol is obtained through simulations for various number of nodes and show significant improvements in delay and packet delivery ratio compared to S-MAC.

Certificate Revocation in Connected Vehicles

  • Sami S. Albouq
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.13-20
    • /
    • 2023
  • In connected vehicles, drivers are exposed to attacks when they communicate with unauthenticated peers. This occurs when a vehicle relies on outdated information resulting in interactions with vehicles that have expired or revoked certificates claiming to be legitimate nodes. Vehicles must frequently receive or query an updated revoked certificate list to avoid communicating with suspicious vehicles to protect themselves. In this paper, we propose a scheme that works on a highway divided into clusters and managed by roadside units (RSUs) to ensure authenticity and preserve hidden identities of vehicles. The proposed scheme includes four main components each of which plays a major role. In the top hierarchy, we have the authority that is responsible for issuing long-term certificates and managing and controlling all descending intermediate authorities, which cover specific regions (e.g., RSUs) and provide vehicles with short-term pseudonyms certificates to hide their identity and avoid traceability. Every certificate-related operation is recorded in a blockchain storage to ensure integrity and transparency. To regulate communication among nodes, security managers were introduced to enable authorization and access right during communications. Together, these components provide vehicles with an immediately revoked certificate list through RSUs, which are provided with publish/subscribe brokers that enable a controlled messaging infrastructure. We validate our work in a simulated smart highway environment comprising interconnected RSUs to demonstrate our technique's effectiveness.

Implementation of a Realtime Wireless Remote Control and Monitoring Systems (실시간 무선 원격 제어 및 모니터링 시스템의 구현)

  • Seong, Hae-Kyung;Lee, Moon-Goo
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.6
    • /
    • pp.93-102
    • /
    • 2010
  • Existing web based information service system solutions show limitations in mobile information services, as well as problems such as uncertain error messages, and difficulty providing swift assistance or real time emergency support. In order to solve these deficiencies, a realtime wireless remote control system has been designed and implemented in this thesis, which is capable of managing and monitoring remote systems using mobile communication devices (Mobile Phone, PDA, Smart Phone) for realtime control. Proposed systems are applied at remote places, for instance 'office building', and a nursery school like 'kindergarten'. In the case of implemented at office building, it can be managing and controlling at real time all sorts of the sensor information that are installed at office building system environment through wire(web environment) or wireless(mobile device). In the other case at kindergarten system that are providing the real-time wireless remote control and monitoring system can be monitoring activity of kindergarten children with a mobile phone of authentication user. The security functions of proposed systems include mobile device user authentication and target system access control. The proposed systems allow real-time user authentication function and system access control function that improve the security of resource administrators and mobile device users, and provides not only uninterrupted services, but also real time mobile service environments.

UbiController: Universal Mobile System for Controlling Appliances in Smart Home Environment (UbiController: 스마트 홈 환경의 가전기기 제어를 위한 통합 모바일 시스템)

  • Yoon, Hyo-Seok;Kim, Hye-Jin;Woo, Woon-Tack;Lee, Sang-Goog
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.8
    • /
    • pp.1059-1071
    • /
    • 2008
  • Users in ubiquitous computing environment can easily access and use a multitude of devices and services anywhere and anytime. The key technology to realize this scenario is the method to intuitively provide proper user interfaces for each device and service. Previous attempts simply provided a designated user interface for each device and service or provided an abstract user interface to control common functions of different services. To select a target appliance, either user directly specified the target device or depended on sensors such as RFID tags and readers limiting the applicable scenarios. In this paper, we present UbiController which uniquely uses camera on the mobile device to recognize markers of appliances to acquire user interface for controlling task. UbiController aims to provide automatic discovery of multiple services in the smart home environment, support traditional GUI and novel camera-based recognition method as well as intuitive interaction methods for users. In this paper, we show experiments on the performance of UbiController's discovery and recognition methods and user feedback on interaction methods from a user study.

  • PDF

Differences in Medical Care Utilization Rates of the Disabled and the Non-disabled with Ambulatory Care Sensitive Conditions (외래진료 민감질환 유질환자 중 장애인과 비장애인의 의료이용률 차이)

  • Eun, Sang-Jun;Hong, Jee-Young;Lee, Jin-Yong;Lee, Jin-Seok;Kim, Yong-Ik;Shin, Young-Soo;Kim, Yoon
    • Journal of Preventive Medicine and Public Health
    • /
    • v.39 no.5
    • /
    • pp.411-418
    • /
    • 2006
  • Objectives: The purpose of this study was to determine whether the disabled have worse access to primary care than the non-disabled. Methods: We used the National Disability Registry data and the National Health Insurance data for the calendar year 2003, and we analyzed 807,380 disabled persons who had been registered until December 2001 and we also analyzed 1,614,760 non-disabled persons for nine ambulatory care sensitive conditions (ACSCs). The rates of physician visits and hospitalizations for the patients with ACSCs were compared between the disabled and the nondisabled. Multiple logistic regression analysis was used to evaluate the association between medical care utilization and disability and to assess the association between hospitalization and the number of physician visits while controlling for potential confounders. Results: The numbers of physician visits per 100 patients were $0.78{\sim}0.97$ times lower for the disabled than that for the non-disabled with five of nine ACSCs. The numbers of hospitalizations per 100 patients were $1.16{\sim}1.77$ times higher for the disabled than that for the non-disabled with all the ACSCs. While the ORs of a physician visit for the disabled were significantly lower than that for the non-disabled with all the ACSCs (OR: $0.44{\sim}0.70$), and the ORs of hospitalization for the disabled were significantly higher (OR: $1.16{\sim}1.89$). The lower physician visit group (number of physician visits ${\leq}$1) was more likely to be hospitalized than the higher physician visit group (number of physician visits ${\geq}$2) (OR: $1.69{\sim}19.77$). The effect of the physician visit rate on hospitalization was larger than the effect of disability on hospitalization. Conclusions: The results suggest that the disabled were more likely to be hospitalized for ACSCs due to their lower access to primary care.

Beach-chair lateral traction position using a lateral decubitus distracter in shoulder arthroscopy

  • Kim, Kyung-Cheon;Rhee, Kwang-Jin;Shin, Hyun-Dae;Byun, Ki-Yong
    • The Academic Congress of Korean Shoulder and Elbow Society
    • /
    • 2008.03a
    • /
    • pp.164-164
    • /
    • 2008
  • The beach-chair traction position is designed to allow the use of traction while allowing the surgeon to orient the shoulder in an upright position and convert to an open procedure, if necessary. The patient is placed in the beach-chair position under general anesthesia. A three-point shoulder holder (Arthrex, Naples, Florida) is attached to the rail of the operating table on the same side as the surgeon, whereas it is placed on the side opposite the surgeon in the lateral decubitus position. A shoulder traction and rotation sleeve (Arthrex) are affixed to the arm following the manufacturer's instructions. Positioning the thumb toward the closed side of the sleeve ensures a field for the anterior portion of the rotator cuff and prevents the tendency of the suspension apparatus to place the arm in internal rotation. The arm is maintained in 30 to 40 degree abduction and 30 to 40 degree flexion by controlling the length and height of the bar and the location of the universal clamp. The universal clamp allows multiple planes of adjustment to control abduction and forward movement of the arm. The sleeve is attached to the longitudinal traction cable using a sterile hook, and a lateral strap is secured around the proximal portion of the sleeve to the overhead traction cable to ensure a field for glenohumeral reconstruction. The use of a lateral strap permits ideal shoulder positioning for improved access to the anterior and inferior glenohumeral joint. The lateral strap can be released or removed to widen the subacromial space during subacromial decompression or rotator cuff repair. A 10-lb weight is attached to the longitudinal traction cable for an average-sized person.

  • PDF

A Study on the Protection of Biometric Information against Facial Recognition Technology

  • Min Woo Kim;Il Hwan Kim;Jaehyoun Kim;Jeong Ha Oh;Jinsook Chang;Sangdon Park
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.8
    • /
    • pp.2124-2139
    • /
    • 2023
  • In this article, the authors focus on the use of smart CCTV, a combnation of biometric recognition technology and AI algorithms. In fact, the advancements in relevant technologies brought a significant increase in the use of biometric information - fingerprint, retina, iris or facial recognition - across diverse sectors. Both the public and private sectors, with the developments of biometric technology, widely adopt and use an individual's biometric information for different reasons. For instance, smartphone users highly count on biometric technolgies for the purpose of security. Public and private orgazanitions control an access to confidential information-controlling facilities with biometric technology. Biometric infomration is known to be unique and immutable in the course of one's life. Given the uniquness and immutability, it turned out to be as reliable means for the purpose of authentication and verification. However, the use of biometric information comes with cost, posing a privacy issue. Once it is leaked, there is little chance to recover damages resulting from unauthorized uses. The governments across the country fully understand the threat to privacy rights with the use of biometric information and AI. The EU and the United States amended their data protection laws to regulate it. South Korea aligned with them. Yet, the authors point out that Korean data aprotection law still requires more improvements to minimize a concern over privacy rights arising from the wide use of biometric information. In particular, the authors stress that it is necessary to amend Section (2) of Article 23 of PIPA to reflect the concern by changing the basis for permitting the processing of sensitive information from 'the Statutes' to 'the Acts'.