• Title/Summary/Keyword: IS Audit

Search Result 802, Processing Time 0.03 seconds

A Collaborative decision making for distributed detection system (분산 탐지 시스템을 위한 협업적 의사 결정)

  • Farooqi, Ashfaq Hussain;Jin, Wang;Khan, Farrukh Aslam;Lee, Sung-Young
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06d
    • /
    • pp.115-117
    • /
    • 2011
  • Intrusion detection systems (IDS) are supposed to be an efficient safety measure against inside attacks. In purely distributed IDS approach, IDS agent is installed in every node. It checks abnormal behavior of neighboring nodes locally. It collects the data that it receives from nodes in its radio range. Sensor nodes audit that data and generate alerts for abnormal activity. Here, there are two ways of taking decision. First, it can take decision individually and second, it can communicate with its neighbor to find the status of the claimed compromised nodes. In this paper, we propose a collaborative decision making scheme for purely distributed detection system. The proposed scheme is light weight compared to consensus based validation methodology. It provides a better scheme to find intrusions by interacting with other nodes.

Design of Fraudulent Process Notification for Management Information Systems (정보시스템 부정행위 신고시스템 설계)

  • Lee, Joong Hee;Lee, Sangwon;Ahn, Hyunsup
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.629-631
    • /
    • 2013
  • In many enterprises, fraudulent activities and processes are widely prevalent. But, their employees would not report the illegal activities since they would be attacked by defensive and reactive retaliations in their enterprises. Against this backdrop, we design notification systems for whistle blowing. The design would certainly be useful for fraudulent process notification while using management information systems in the field of business. The fraudulent process notification is related to whistle blowing systems, methods, storage media, and so on. Also, we establish the whole architecture of fraudulent process notification with functional structure from the viewpoint of systems and whistle blower. The flow diagram of notification method is added.

  • PDF

Noise Assurance Plan in the Project for Design a New Rolling Stock (철도차량 개발과정에서의 소음관리방안)

  • 정경렬;김경택;이병현
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2003.05a
    • /
    • pp.542-548
    • /
    • 2003
  • This paper describes an overall Noise Assurance Plan(NAP) in the project for developing a new rolling stock. In this paper, the procedure for implementing noise control activities for each development stage on the basis of the NAP is also described. The NAP was developed by KITECH(Korea Institute of Industrial Technology) and ODS(${\Phi}$degaard & Danneskiold-Samsoe in DENMARK). Generally, the main objective of NAP is that noise assurance plan applies to the establishment of organization and personnel's roles and responsibilities, set-up of overall procedure and internal audit program. Here, a few comments are made to the deviations of the actual procedure(G7 Project) relative to the suggested NAP presented. The major difference between the suggested NAP and the actual procedure was the late involvement of the noise consultant resulting in suggestions for design improvements could not be implemented due to the advanced stage of the design. Similarly, the important task of preparing sub-supplier specifications was performed. The proposed NAP will be an efficient tool for noise management in the R&D project for new rolling stock. Specially, in case that several companies and institutes are involoved in the R&D team

  • PDF

Suggestions for a better HACCP system assessment in livestock product processing plants (축산물가공장 HACCP system 평가방법 개선방안)

  • Hong, Chong-Hae;Lee, Sung-Mo
    • Korean Journal of Veterinary Service
    • /
    • v.34 no.4
    • /
    • pp.441-448
    • /
    • 2011
  • According to the Korean government policy of expanding HACCP system application to food chain from farm to meat market, the importance of HACCP assessment to keep balance among the certified HACCP plants is urged. The objective of this study is to recommend more effective HACCP assessment methods. We reviewed major foreign countries HACCP implementation policy focused on the audit system, and compared with the Korean HACCP assessment system. We found that the checklist guidelines of prerequisite program were not enough for precise evaluation and many of the items were not directly related to the risk occurrences. And current rating grade for each items and judgments were inadequate to induce non-compliances and corrections for better HACCP implementation. We suggest revision points as follows; (1) checklists should be revised and reorganized according to the possibility of risk occurrences, (2) all the items should be supported by detailed guidelines for more objective inspection, (3) non-compliances identified must be reconfirmed after correction, (4) the items for HACCP plan should be divided into an accreditation inspection and a regular inspection, (5) rating grade 'high', 'medium', 'low', 'failure' was better for indicating non-compliances.

Difference in Length of Stay and Treatment Outcome of Pulmonary Tuberculosis Inpatients between Health Insurance Types (의료보장유형에 따른 폐결핵 입원환자의 재원기간과 치료결과 차이분석)

  • Kim, Sang Mi;Lee, Hyun Sook;Hwang, Seul ki
    • Korea Journal of Hospital Management
    • /
    • v.21 no.4
    • /
    • pp.45-54
    • /
    • 2016
  • The purpose of this study is to identify patient and hospital characteristics with pulmonary tuberculosis and to analyze factors which were influencing length of stay and treatment. The Korean National Hospital Discharge In-depth Injury Survey database from 2006 to 2012 was used for analysis. Study subjects were 4,704 patients and analyzed by using frequency, chi-square and logistic regression through using STATA 12.0. To avoid selection bias, we used propensity score matching. Analysis results show that the length of stay and treatment of pulmonary tuberculosis was different between insurance types. Patients characteristic(female, comorbidity, admission by outpatient department, medical insurance type) and hospital characteristic(500-999 beds, over 1000 beds) significantly influence length of stay. Admission by outpatient department and over 1000 beds are significantly influence treatment. Based on these findings, it is necessary to clarify between length of stay and treatment outcome by medical aids beneficiaries and audit hospitals follow discharge guidelines in pulmonary tuberculosis patients.

Analysis of Relationship between Fatal Accidents Causes and Consciousness of Scapegoatism in Construction Site (건설현장 사망사고 발생원인과 책임전가의식 간의 관계 분석)

  • Oh, Gyu-Sun;Cha, Yongwoon;Hyun, Chang-Tack
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2015.05a
    • /
    • pp.192-193
    • /
    • 2015
  • The number of accidents is raising every year and severity is also increasing. A lot of studies are interested in the leading indicator such as safety culture or safety audit to reduce accidents. In particular, the studies on safety awareness are actively conducted. However, these studies showed that there was consciousness of scapegoatism which to pass responsibility of accident causes to others regardless of safety awareness. It means that there are probability about overestimating and making light of unsafe condition and act which have to manage and control. Eventually, the direct causes which lead to the fatal accident may be consistently arisen. Nevertheless, researches about consciousness of scapegoatism are shortage. Therefore, this study proposed the means to investigate the relationship between consciousness of scapegoatism and accidents through report from KOSHA and conducts the survey with suggested means. This paper will contribute to prevent accidents by identifying relationship between consciousness of scapegoatism and accidents.

  • PDF

The Effects of the Drinking-Reduction Program Adopting Transtheoretical and Leisure Models on Problem Drinking Behavior and Cognition (범이론과 여가모형을 적용한 절주프로그램이 문제음주행위와 인지에 미치는 효과)

  • Do, Eun-Young
    • Research in Community and Public Health Nursing
    • /
    • v.18 no.3
    • /
    • pp.363-372
    • /
    • 2007
  • Purpose: This study is to examine the effects of the drinking-reduction program that utilizes transtheoretical model and leisure ability model on the problem drinking behavior, alcohol outcome expectancy, and abstinence self-efficacy of. problem drinkers at workplaces. Method: The subjects consisted of 54 male problem drinkers who scored over 12 points in the AUDIT-K with 23 persons in the experimental group and 31 persons in the control group. The research results were analyzed using the SAS program with Chi-square test, t-test, repeated ANOVA, and post-hoc comparison. Results: 1) The experimental group showed a significantly lower score in problem drinking behavior than the control group. 2) The experimental group showed a significantly lower score in alcohol outcome expectancy than the control group. 3) The experimental group showed a significantly higher score in abstinence self-efficacy than the control group. Conclusion: These results demonstrate that the drinking-reduction program effectively reduces the drinking behavior of problem drinkers at workplaces, reduces alcohol outcome expectancy, and enhances abstinence self-efficacy. Accordingly, it is considered that a drinking-reduction program can be a useful nursing intervention method for problem drinkers at workplaces to reduce drinking and improve the quality of life.

  • PDF

Secure logging system with self-protecting function (자체 보호 기능을 갖는 안전한 로깅 시스템)

  • Kim, Min-Su;No, Bong-Nam
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.9
    • /
    • pp.2442-2450
    • /
    • 1999
  • The audit logging system is to write the details of systems use and access on networks. These details are used for trailing the route, when illegal access or using system resource is occurred on networks. The logging system therefore, might be the first target of intruder. We developed the logging system which writes the information of logging and command execution on UNIX system. And we prepared the self-protecting functions of blocking intruder's attack on the logging system. They are protecting the logging process and the log file. To protect the logging process, we made it keep changing the process ID to avoid the intruder's attack. To protect the log file, we use hard link and mandatory file locking, so it can make it impossible to delete or change log file.

  • PDF

Structural Equation Model for the Analysis of Alcohol-related Problem of Alcohol Use Disorders (알코올사용장애자의 음주관련 문제 분석을 위한 구조모형)

  • Son, Hee Jung;Lee, Won Kee;Park, Young Shin;Hong, Hae Sook
    • Journal of health informatics and statistics
    • /
    • v.42 no.2
    • /
    • pp.192-198
    • /
    • 2017
  • Objectives: This study was designed to construct and test the structural equation model for the alcohol-related problem of alcohol use disorders. Methods: Data were collected by structured self-questionnaires from 229 male subjects who received > 8 (greater than 8) score on Alcohol Use Disorder Identification Test (AUDIT). The Data were analyzed by SPSS 21.0 and AMOS 21.0. Results: The model fit indices for the modified hypothetical model showed Q = 2.50, GFI = 0.90, and CFI = 0.94. As a result, Life position, parent's drinking problem, and alcohol expectancy had significantly direct effect on alcohol-related problem. Alcohol expectancy also had mediator effect between life position and alcohol-related problem. Conclusions: Consequently, the more positive life position, the less alcohol-related problem occurred. It is necessary to change their life position, which is individual factor, to prevent or reduce the alcohol related problem of alcohol use disorders.

Legal System and Regulation Analysis by S/W Development Security (S/W 개발 분석 단계에서 식별 및 인증)

  • Shin, Seong-Yoon;Jin, Dong-Soo;Shin, Kwong-Seong;Lee, Hyun-Chang;Lee, Yang-Won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.211-212
    • /
    • 2014
  • This paper is to suggest the security requirements for identification and authentication in analysis step. Firstly, individual ID should be uniquely identified. The second element is to apply the length limitations, combination and periodic changes of passwords. The third should require the more reinforced authentication methods besides ID and passwords and satisfy the defined security elements on authentication process.

  • PDF