• Title/Summary/Keyword: PROTECTION AND MANAGEMENT

Search Result 3,029, Processing Time 0.032 seconds

Examples of Holistic Good Practices in Promoting and Protecting Mental Health in the Workplace: Current and Future Challenges

  • Sivris, Kelly C.;Leka, Stavroula
    • Safety and Health at Work
    • /
    • v.6 no.4
    • /
    • pp.295-304
    • /
    • 2015
  • Background: While attention has been paid to physical risks in the work environment and the promotion of individual employee health, mental health protection and promotion have received much less focus. Psychosocial risk management has not yet been fully incorporated in such efforts. This paper presents good practices in promoting mental health in the workplace in line with World Health Organization (WHO) guidance by identifying barriers, opportunities, and the way forward in this area. Methods: Semistructured interviews were conducted with 17 experts who were selected on the basis of their knowledge and expertise in relation to good practice identified tools. Interviewees were asked to evaluate the approaches on the basis of the WHO model for healthy workplaces. Results: The examples of good practice for Workplace Mental Health Promotion (WMHP) are in line with the principles and the five keys of the WHO model. They support the third objective of the WHO comprehensive mental health action plan 2013-2020 for multisectoral implementation of WMHP strategies. Examples of good practice include the engagement of all stakeholders and representatives, science-driven practice, dissemination of good practice, continual improvement, and evaluation. Actions to inform policies/legislation, promote education on psychosocial risks, and provide better evidence were suggested for higher WMHP success. Conclusion: The study identified commonalities in good practice approaches in different countries and stressed the importance of a strong policy and enforcement framework as well as organizational responsibility for WMHP. For progress to be achieved in this area, a holistic and multidisciplinary approach was unanimously suggested as a way to successful implementation.

A Lightweight and Privacy-Preserving Answer Collection Scheme for Mobile Crowdsourcing

  • Dai, Yingling;Weng, Jian;Yang, Anjia;Yu, Shui;Deng, Robert H.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.8
    • /
    • pp.2827-2848
    • /
    • 2021
  • Mobile Crowdsourcing (MCS) has become an emerging paradigm evolved from crowdsourcing by employing advanced features of mobile devices such as smartphones to perform more complicated, especially spatial tasks. One of the key procedures in MCS is to collect answers from mobile users (workers), which may face several security issues. First, authentication is required to ensure that answers are from authorized workers. In addition, MCS tasks are usually location-dependent, so the collected answers could disclose workers' location privacy, which may discourage workers to participate in the tasks. Finally, the overhead occurred by authentication and privacy protection should be minimized since mobile devices are resource-constrained. Considering all the above concerns, in this paper, we propose a lightweight and privacy-preserving answer collection scheme for MCS. In the proposed scheme, we achieve anonymous authentication based on traceable ring signature, which provides authentication, anonymity, as well as traceability by enabling malicious workers tracing. In order to balance user location privacy and data availability, we propose a new concept named current location privacy, which means the location of the worker cannot be disclosed to anyone until a specified time. Since the leakage of current location will seriously threaten workers' personal safety, causing such as absence or presence disclosure attacks, it is necessary to pay attention to the current location privacy of workers in MCS. We encrypt the collected answers based on timed-release encryption, ensuring the secure transmission and high availability of data, as well as preserving the current location privacy of workers. Finally, we analyze the security and performance of the proposed scheme. The experimental results show that the computation costs of a worker depend on the number of ring signature members, which indicates the flexibility for a worker to choose an appropriate size of the group under considerations of privacy and efficiency.

A Study on Legal Issues between the Application of Blockchain Technology and Deletion and the Third Party Supply of Personal Information (블록체인 기술 적용과 개인정보 삭제 및 제3자 제공의 법적 문제에 관한 연구)

  • Choi, Yong-hyuk;Kwon, Hun-yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1607-1621
    • /
    • 2018
  • The financial industry, which guarantees a credible transaction and can not permit forgery of its transaction information, has hitherto adhered to a traditional centralized ledger management method. However, the blockchain technology has a decentralization which has been regarded as unsafe for the time being, and the more reliable transaction agreement and data integrity are guaranteed The world's financial industry and the IT world is causing the wave. Nevertheless, the inherent characteristics of the blockchain, such as the irreversibility of block information within a blockchain and the sharing of blocks between blockchain participants, can not avoid conflicts with the privacy laws. The purpose of this study is to investigate the problems related to deletion and the third party supply of personal information by focusing on these characteristics of the blockchain and to suggest the technical alternatives of the applicable blockchain and the improvement direction of the personal information protection law for using of blockchain technology.

A Framework of Service Level Agreement for Activating Cloud Services (클라우드서비스 활성화를 위한 서비스수준협약(SLA) 프레임워크)

  • Seo, Kwang-Kyu
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.6
    • /
    • pp.173-186
    • /
    • 2018
  • While cloud services are expanding, many users are having difficulty in adopting cloud services. This is because there is no information as to which cloud services can be trusted by users. loud service level agreement (Cloud SLA) is an agreement between cloud service providers and cloud service consumers using qualitative and quantitative indicators including quality and performance, etc. of cloud services. In this study, we propose a framework for cloud SLA that can be applied to the domestic cloud industry to improve service levels for cloud service providers and to protect users and also derive the detailed components of cloud SLA applicable to the domestic cloud industry using the proposed framework. Through this result, it is expected that the government will utilize the policy to enhance the reliability between cloud service providers and users under "the Act on the Development of Cloud Computing and Protection of Users", and eventually to activate cloud services by improving the quality and performance level of domestic cloud services and building a user trust.

Analysis of privacy issues and countermeasures in neural network learning (신경망 학습에서 프라이버시 이슈 및 대응방법 분석)

  • Hong, Eun-Ju;Lee, Su-Jin;Hong, Do-won;Seo, Chang-Ho
    • Journal of Digital Convergence
    • /
    • v.17 no.7
    • /
    • pp.285-292
    • /
    • 2019
  • With the popularization of PC, SNS and IoT, a lot of data is generated and the amount is increasing exponentially. Artificial neural network learning is a topic that attracts attention in many fields in recent years by using huge amounts of data. Artificial neural network learning has shown tremendous potential in speech recognition and image recognition, and is widely applied to a variety of complex areas such as medical diagnosis, artificial intelligence games, and face recognition. The results of artificial neural networks are accurate enough to surpass real human beings. Despite these many advantages, privacy problems still exist in artificial neural network learning. Learning data for artificial neural network learning includes various information including personal sensitive information, so that privacy can be exposed due to malicious attackers. There is a privacy risk that occurs when an attacker interferes with learning and degrades learning or attacks a model that has completed learning. In this paper, we analyze the attack method of the recently proposed neural network model and its privacy protection method.

Discovery of a new primer set for detection and quantification of Ilyonectria mors-panacis in soils for ginseng cultivation

  • Farh, Mohamed El-Agamy;Han, Jeong A.;Kim, Yeon-Ju;Kim, Jae Chun;Singh, Priyanka;Yang, Deok-Chun
    • Journal of Ginseng Research
    • /
    • v.43 no.1
    • /
    • pp.1-9
    • /
    • 2019
  • Background: Korean ginseng is an important cash crop in Asian countries. However, plant yield is reduced by pathogens. Among the Ilyonectria radicicola-species complex, I. mors-panacis is responsible for root-rot and replant failure of ginseng in Asia. The development of new methods to reveal the existence of the pathogen before cultivation is started is essential. Therefore, a quantitative real-time polymerase chain reaction method was developed to detect and quantify the pathogen in ginseng soils. Methods: In this study, a species-specific histone H3 primer set was developed for the quantification of I. mors-panacis. The primer set was used on DNA from other microbes to evaluate its sensitivity and selectivity for I. mors-panacis DNA. Sterilized soil samples artificially infected with the pathogen at different concentrations were used to evaluate the ability of the primer set to detect the pathogen population in the soil DNA. Finally, the pathogen was quantified in many natural soil samples. Results: The designed primer set was found to be sensitive and selective for I. mors-panacis DNA. In artificially infected sterilized soil samples, using quantitative real-time polymerase chain reaction the estimated amount of template was positively correlated with the pathogen concentration in soil samples ($R^2=0.95$), disease severity index ($R^2=0.99$), and colony-forming units ($R^2=0.87$). In natural soils, the pathogen was recorded in most fields producing bad yields at a range of $5.82{\pm}2.35pg/g$ to $892.34{\pm}103.70pg/g$ of soil. Conclusion: According to these results, the proposed primer set is applicable for estimating soil quality before ginseng cultivation. This will contribute to disease management and crop protection in the future.

Antioxidative and Hepatocyte Protective Effects of Guava (Psidium guajava L.) Leaves Cultivated in Korea (국내산 구아바(Psidium guajava L.) 잎 추출물의 항산화 활성 및 간세포 보호효과)

  • Cheon, Wonyoung;Seo, Dongyeon;Kim, Younghwa
    • The Korean Journal of Food And Nutrition
    • /
    • v.32 no.1
    • /
    • pp.33-40
    • /
    • 2019
  • The purpose of this study was to evaluate the antioxidant and hepatocyte protective effects of guava (Psidium guajava L.) leaves cultivated in Korea. The contents of the total polyphenol of the extract was 271.57 mg gallic acid equivalent (GAE)/g residue. Antioxidant activities of leaf extract were evaluated by examining the free radical scavenging ability. 2,2'-azinobis-(3-ethylbenzothiazoline-6-sulfonic acid) (ABTS) and ${\alpha}-{\alpha}$-diphenyl-${\beta}$-picrylhydrazyl (DPPH) free radical scavenging activities of the extract were 1133.23 mg trolox equivalent antioxidant capacity (TEAC)/g residue and 721.68 mg TEAC/g residue, respectively. The hepatocyte protective effect of guava leaf extract was examined in HepG2 cells. Against tert-butyl hydroperoxide (TBHP), the viability of HepG2 cells were increased by the treatment of leaf extract. In addition, guava leaf extract led to the inhibition of reactive oxygen species (ROS) generated in HepG2 cells. The leaf extract increased the activity of glutathione (GSH), glutathione reductase (GR), and glutathione peroxidase (GPx) against oxidative stress. These results suggested that guava leaves might be regarded as a potential source natural antioxidant and a hepatoprotective material.

A Study on the Risk Perception and Acceptance of Location-based SNS Service of Smartphone Users (스마트폰 사용자의 위치기반 SNS 서비스에 대한 위험인식과 수용에 관한 연구)

  • Yun, Sung-Uk
    • Journal of Digital Convergence
    • /
    • v.17 no.2
    • /
    • pp.453-462
    • /
    • 2019
  • This study investigates the relationship between controllability, severity, unrealistic optimism and risk perception of risk factors related to location - based SNS services for smartphone users. For this purpose, I surveyed university students who had experience using location - based SNS service. The main results are as follows. First, controllability has a statistically significant effect on unrealistic optimism. Second, Severity had a statistically significant negative impact on unrealistic optimism. Third, Controllability did not have a statistically significant effect on risk perception, Fourth, Severity did not have a statistically significant effect on perceived risk. Fifth, Unrealistic optimism had a statistically significant negative impact on perception of risk. The results of this study will contribute to the prevention of privacy incidents and the protection of smartphone users by using location - based SNS service. On the one hand, future research will need to look at the relationship between unrealistic optimism and risk prevention or coping behavior.

A Study of Metal Manufacturing Disaster Situation and Safety Consciousness (금속제조업 재해 현황과 안전의식에 관한 연구)

  • Chun, Kwanok;Lee, Sinbok;Rie, Dongho
    • The Journal of the Convergence on Culture Technology
    • /
    • v.4 no.4
    • /
    • pp.429-438
    • /
    • 2018
  • Recently, there has been a tendency for accidents occurring in manufacturing to lead to serious accidents and serious industrial accidents and to extend to community disasters. In accordance with the Third Plan (2015-2019) of the National Security Management Plan, the Safety Administration announces and promotes improvement measures to minimize industrial accidents and disasters. In the case of industrial accidents from KOSHA 2015 to 2017, the accident rate of the metal-related manufacturing industry is 1.57%, which is more than three times higher than the average 0.50% of all industries. As a result of investigating the causes of disasters, 72% of workers were found to be caused by unsafe behaviors. In addition, insecure behaviors are closely related to safety consciousness, and a survey on safety consciousness was conducted for workers in this field. Safety consciousness improvement has the affirmative effect on accident prevention and it is a factor to reduce accidents.

NFC based Smart Waiting Number Ticket Issuing System (NFC를 이용한 스마트 대기표발권시스템 설계)

  • Kang, Su-kyoung;Kim, Chang-jae;Lee, Nam-young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.940-943
    • /
    • 2014
  • Currently in many places, such as a business or government office, customers are spending many time after issuing waiting number ticket. To improve this, this paper proposes new design of waiting number ticket issuing system which provides real-time notification service with smartphone. This system add the NFC tag to the issuing machine in order to input the information of waiting and increase the convenience of users and provides an integrated management of corporate and government information using a waiting number ticket. Therefore, it is possible to efficiently use the waiting time than when using the existing ticketing system by taking advantage of this system, and appears to be to reduce costs and environmental protection, by not using the paper ticket. Also this system can be used to improve business processes through the application Waiting Number Ticket ticket cancellation feature.

  • PDF