• Title/Summary/Keyword: Misuse Service

Search Result 51, Processing Time 0.026 seconds

Tetanus occurred by misuse of syringe in Korean native cattle (한우에서의 주사기 오사용으로 발생한 파상풍 증례)

  • Lee, KyungHyun;Kim, HaYoung;Jung, ByeongYeal;Kim, JongWan;Lee, KiChan;So, ByungJae;Oem, JaeGu;Song, JaeChan;Choi, Eun-Jin
    • Korean Journal of Veterinary Service
    • /
    • v.42 no.1
    • /
    • pp.39-42
    • /
    • 2019
  • Tetanus is an acute, often fatal, and infectious disease of all species of domestic animals caused by the neurotoxin of Clostridium tetani (C. tetani). This disease is usually known to develop after microbial contamination in the deep or penetrating wound sites. In February 2017, a farmer who was raising 76 cows injected foot and mouth disease vaccine to three or more cows with one syringe. Their clinical symptoms were observed 2 to 16 days after the vaccination. The initial symptoms were stiffness, rigidity of the neck and limbs, pricked ears, and prolapse of the third eyelid. Subsequently, there was recumbency with extension of the limbs, convulsions and opistotonus and the affected 20 cows were all died. Two dead cows were submitted to Animal and Plant Quarantine Agency for disease diagnosis. At necropsy, a focal edematous abscess of 15 to 20 cm in diameter was grossly observed in the subcutaneous and intramuscular tissue of scapular region and filled with a large amount of greenish pus. The feed was full in oral cavity and slightly observed in the trachea and lobes of lung. Histopathologically, focal granulomatous nodules with eosinophilic materials in the tissue were observed. In the lung, aspiration pneumonia and gram (+) bacteria were seen. The C. tetani was isolated in samples anaerobically cultured using reinforced clostridial medium and identified by PCR. To our knowledge, no previous outbreak of tetanus in cattle has affected such a high number of animals; neither has it been associated with misuse of the same syringe and needle to administer multiple individuals.

A Review of Ecosystem Service Studies: Concept, Approach and Future Work in Korea

  • Chung, Min Gon;Kang, Hojeong
    • Journal of Ecology and Environment
    • /
    • v.36 no.1
    • /
    • pp.1-9
    • /
    • 2013
  • In South Korea, the conflict between development and conservation policy still exist among government ministries, and conventional development plan often has priority over conservation policy. Establishment of sustainable development and comprehensive management policy employing the results of ecosystem service studies are highly warranted, but researchers in South Korea are still limited and often misuse the concept of ecosystem services. Thus, we aimed to introduce the concept of Ecosystem Service (ES) and related terminologies such as Social-Ecological Systems (SESs), ecosystem function, trade-off, and human well-being in this paper. Additionally, this article reviewed and arranged key approaches in ES studies as follows: 1) field works, 2) mapping ecosystem services, 3) valuing ES, 4) quantifying trade-offs between ES and 5) understanding SESs. Based on those results, we suggest that field works for basic information have the first priority to be conducted among ES studies. Once basic information is sufficiently accumulated, researchers can perform applied ES research with accuracy. Finally, results of ES studies conducted by five approaches allow decision makers to consider both natural system and society simultaneously, and hence the results can be utilized for sustainable development and conservation policy based on ecosystem-based management.

Analysis of Privacy threats and Security mechanisms on Location-based Service (위치기반 서비스의 프라이버시 위협 요소 분석 및 보안 대책에 관한 연구)

  • Oh, Soo-Hyun;Kwak, Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.2
    • /
    • pp.272-279
    • /
    • 2009
  • A location information used in LBS provides convenience to the user, but service provider can be exploited depending on how much risk you have. Location information can be exploited to track the location of the personal privacy of individuals because of the misuse of location information may violate the user can import a lot of damage. In this paper, we classify the life cycle of location information as collection, use, delivery, storage and destroy and analyze the factors the privacy is violated. Furthermore, we analyze information security mechanism is classified as operation mechanism and policy/management mechanism and propose a security solutions of all phase in life cycle.

  • PDF

A Delegation Model based on Agent in Distributed Systems

  • Kim, Kyu-Il;Lee, Joo-Chang;Choi, Won-Gil;Lee, Eun-Ju;Kim, Ung-Mo
    • Journal of Information Processing Systems
    • /
    • v.3 no.2
    • /
    • pp.82-88
    • /
    • 2007
  • Web services are the new building block of today's Internet, and provides interoperability among heterogeneous distributed systems. Recently in web services environment, security has become one of the most critical issues. The hackers attack one of fragile point and can misuse legitimate user privilege because all of the connected devices provide services for the user control and monitoring in real time. Also, the users of web services must temporarily delegate some or all of their rights to agents in order to perform actions on their behalf. This fact risks the exposure of user privacy information. In this paper, we propose secure delegation model based on SAML that provides confidentiality and integrity about the user information in distributed systems. In order to support privacy protection, service confidentiality, and assertion integrity, encryption and a digital signature mechanism is deployed. We build web service management server based on XACML, in order to manage services and policies of web service providers.

A Design of Encryption Method for Strong Security about Tapping/Interception of VoIP Media Information between Different Private Networks (이종 사설망간에 VoIP 미디어의 도.감청 보안 강화를 위한 암호화 기법 설계)

  • Oh, Hyung-Jun;Won, Yoo-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.3
    • /
    • pp.113-120
    • /
    • 2012
  • VoIP provides voice data service using existing IP networks and has received much attention recently. VoIP service has a variety of security vulnerabilities. Types of main attacks on VoIP service are tapping/interception, DoS attacks, spam, misuse of service attacks and the like. Of these, confidential information leak because of tapping/interception has been considered as a critical problem. Encryption techniques, such as SRTP and ZRTP, are mostly used to prevent tap and intercept on VoIP media information. In general, VoIP service has two service scenarios. First, VoIP service operates within a single private network. Second, VoIP service operates between different private networks. Both SRTP and ZRTP for VoIP media information within a single private network can perform encryption. But they can not perform encryption between different private networks. In order to solve this problem, in this paper, we modify SRTP protocol. And then, we propose an encryption method that can perform encryption of VoIP media information between the different private networks.

A Method for Effective Mobile Electronic Notification Service of Private Institutions

  • Kim, JongBae
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.2
    • /
    • pp.194-200
    • /
    • 2022
  • Traditionally, postal services that produce and deliver paper-based notices have been the mainstream. The reason is that it has the function of distribution and proof of delivery in the postal delivery system as well as the advantage of information delivery through postal delivery. After all, for the purpose of distribution and proof of delivery, many organizations use paper-based postal notices. However, in recent years, it has been in the spotlight to produce a paper-based postal notice as an electronic notice and deliver information to a mobile device through the Internet. In this paper, we propose a safe interworking method for user identification information required for private institutions to transmit mobile electronic notices. In order for a private institution to accurately deliver an electronic notice to a mobile service subscriber, a means to confirm whether the private institution and the mobile device subscriber are the same person is required. In the mobile electronic notification service, the connecting information provided by the personal identity proofing agency is used as a means of user identification. Connecting information is called a resident registration number on the Internet and is one-way hash information that can only be created by the personal identity proofing agency designated by the government. In order to transmit a mobile electronic notice, it is necessary to share connecting information for the same user identification between the institution that requests the sending of the electronic notice and the institution that processes the sending of the electronic notice. Connecting information is personal information that can uniquely identify a user, and if it is disclosed, damage such as personal information infringement may occur. As such, it is necessary to prevent problems that may arise from misuse and abuse of connecting information as well as increase in the benefits of sending the mobile electronic notice. In this paper, a safe and effective mobile electronic notification service can be performed by suggesting a method for safe interworking of information related to the mobile electronic notification service.

Analysis of 1,590 Patients of IV-PCA for Postoperative Pain Management (정맥내 통증 자가조절법에 의한 술후통증관리 1,590예에 대한 분석)

  • Song, Sun-Ok;Jee, Dae-Lim;Koo, Bon-Up
    • The Korean Journal of Pain
    • /
    • v.9 no.2
    • /
    • pp.354-362
    • /
    • 1996
  • Background: We started postoperative pain management service using an intravenous patient-controlled analgesia (IV-PCA, PCA), which is known as convenient and effective analgesic method. In this report, we describe the efficacy and safety of PCA and the experience of developing an acute pain service to treat postoperative pain using a PCA. Methods: Practices of an acute pain service were started at a ward for general surgery after preparation of the standardized protocols for PCA. In each patient, PCA was connected following administration of initial loading doses of analgesics at recovery room after operation. All patients were checked by acute pain service team once or twice daily. The scope of acute pain service was gradually spread to other departments such as orthopedic, thoracic, obstetric and gynecologic departments by requests of patients or surgeons. We managed 1,590 patients during first 22 months. among them, nine hundred seventy two cases were prospectively evaluated for their analgesis efficacy and side effects of PCA. Results: The number of patients was increased day by day. the most common type of operation was gastrectomy (21.6%). Commonly used analgesics were nalbuphine (59%) and morphine (37%). The mean duration of PCA attachment was 3.3 days. The degree of analgesia on operation day was good in 44.8% and tolerable in 52.6% of patients. Only 3.9% of patients complained severe pain during their postoperative periods. One elderly patient experienced respiratory depression (0.06%) owing to accidental misuse of PCA by his relatives. Overall patient's satisfaction was over 93%. Conclusion: According to our experiences, we conclude that PCA is an effective, relatively safe and highly satisfactory method for postoperative pain management. Because of these advantages of PCA, the creation of our acute pain service using a PCA was successful and expanded rapidly.

  • PDF

Determination of pesticides in dead wild birds in Korea (우리나라 폐사 야생조류에서의 농약 분석)

  • Kim, MeeKyung;Yun, Seon Jong;Kim, Dong-Gyu;Bong, Young-Hoon;Kim, Heuijin;Jang, Jung-Hee;Chung, Gab-Soo
    • Korean Journal of Veterinary Research
    • /
    • v.48 no.2
    • /
    • pp.131-137
    • /
    • 2008
  • Pesticides are extensively used for the control of crop pests in agriculture and forestry. Organophosphate (OP) and carbamate pesticides are especially effective for the control of a variety of harmful insects. However, these cholinesterase inhibitors are also dangerous to non-target organisms (wildlife and other animals) because of their high acute toxicity. Most poisonings by pesticides occur as a result of misuse or accidental exposure, but intentional killing of unwanted animals also occurs. At the request of a local autonomous entity, we investigated wild bird poisonings by pesticides from 2003 to 2007. The 207 suspicious samples of pesticide poisoning based on the necropsy were analyzed by GC/NPD, GC/FPD, or GC/MSD. We looked for trends in the identification of pesticides in wild birds thought to have died from poisoning. Pesticides were determined in 59% of the total samples analyzed. Phosphamidon and monochrotophos were the most common pesticides identified, which amounted to 77% of the subtotal. Other OP and carbamate pesticides were also found in various concentrations from dead wild birds. The determined rates of pesticides were as high as 86% and 76% in 2003 and 2006, respectively, during an outbreak of avian influenza in Korea.

mVoIP Vulnerability Analysis And its Countermeasures on Smart Phone (스마트폰에서 mVoIP 취약성 분석 및 대응 방안)

  • Cho, Sik-Wan;Jang, Won-Jun;Lee, Hyung-Woo
    • Journal of the Korea Convergence Society
    • /
    • v.3 no.3
    • /
    • pp.7-12
    • /
    • 2012
  • mVoIP (mobile Voice over Internet Protocol) service is a technology to transmit voice data through an IP network using mobile device. mVoIP provides various supplementary services with low communication cost. It can maximize the availability and efficiency by using IP-based network resources. In addition, the users can use voice call service at any time and in any place, as long as they can access the Internet on mobile device easily. However, SIP on mobile device is exposed to IP-based attacks and threats. Observed cyber threats to SIP services include wiretapping, denial of service, and service misuse, VoIP spam which are also applicable to existing IP-based networks. These attacks are also applicable to SIP and continuously cause problems. In this study, we analysis the threat and vulnerability on mVoIP service and propose several possible attack scenarios on existing mobile VoIP devices. Based on a proposed analysis and vulnerability test mechanism, we can construct more enhanced SIP security mechanism and stable mobile VoIP service framework after eliminating its vulnerability on mobile telephony system.

Development of a Simultaneous Detection and Quantification Method of Anorectics in Human Urine Using GC-MS and its Application to Legal Cases (GC-MS를 이용한 사람 뇨시료 중 비만치료제 분석 및 비만치료제 남용 현황의 법과학적 고찰)

  • Choi, Hyeyoung;Lee, Jaesin;Jang, Moonhee;Yang, Wonkyung;Kim, Eunmi;Choi, Hwakyung
    • YAKHAK HOEJI
    • /
    • v.57 no.6
    • /
    • pp.420-425
    • /
    • 2013
  • Phentermine (PT) and phenmetrazine (PM) have been widely used as anti-obesity drugs. These drugs should be used with caution due to its close relation to amphetamine in its structure and toxicity. PT and PM, amphetamine-type anorectics, have recently been considered as alternatives for methamphetamine abuse in Korea. In addition, the misuse and abuse of PT and PM obtained by illegal sources such as the internet become a serious social problem. In the present study, a simultaneous detection and quantification method for determining PT and PM in human urine was developed and validated according to the international guidelines. The urine samples were screened using a fluorescence polarization immunooassay and analyzed by gas chromatography mass spectrometry (GC-MS) after extraction using automatic solid phase extraction (SPE) with a mixed-mode cation exchange cartridge and derivatization with pentafluoropropionic anhydride (PFPA). The validation results for selectivity, linearity, limits of detection (LOD) and quantification (LOQ), intra- and inter-assay precision and accuracy and recovery were satisfactory. The validated method was successfully applied to authentic urine samples collected from 38 drug abuse suspects. PT and/or PM were identified with or without methamphetamine in urine samples. Abuse of PT and PM have increased continuously in Korea, therefore, closer supervision of the inappropriate use of anoretics is necessary.