• Title/Summary/Keyword: Personal Protection

Search Result 1,073, Processing Time 0.021 seconds

An exploratory analysis of factors influencing online music users' willingness to pay

  • Yu-Xuan, Yuan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.2
    • /
    • pp.217-225
    • /
    • 2023
  • The willingness of online music users to pay is the key to the protection of music copyright and the sustainable development of the industry. This paper aims to study the influencing factors of online music users' willingness to pay based on exploratory analysis. Based on the theory of customer perceived value, the unified theory of technology acceptance and use, and the theory of fan enthusiasm, the research model is constructed. Validate the obtained 583 valid data. Through analysis, I got that perceived value, interpersonal influence, fan enthusiasm, and personal payment awareness directly affect online music users' willingness to pay; practical value and hedonic value have a positive impact on perceived value, and the impact of economic cost and compilation cost has not reached a significant level; Online word-of-mouth negatively moderates the impact of perceived value on users' willingness to pay for music. Music platforms can formulate operating policies based on this.

Case Studies of Firefighter Burns Safety Accident during Fire-fighting Activities (현장 소방활동 중 소방공무원 화상사고 사례 분석 연구)

  • Sin-woong, Choi;So Yun, Lee
    • Journal of the Korean Society of Safety
    • /
    • v.37 no.6
    • /
    • pp.136-147
    • /
    • 2022
  • The purpose of this study is to analyze four cases of firefighter burns in various fire scenes and to find prevention measures to decrease firefighter injuries. Among the analysis reports prepared by the National Fire Research Institute of Korea from 2016 to 2020, four burn-related accidents are summarized and the main causes are conveyed. The four accidents include second-degree burns from using extinguishers during containment of fires; nine firefighters burned due to re-ignition in the LPG car repair shop; two firefighters injured with third-degree burns from using fire extinguishers during life-saving events in residential housing; and injuries from the radiant heat of the tank BLEVE near the factory fire. These cases are comprehensively investigated in their respective scenes and analyzed based on the fire site investigation reports from the fire department and related theoretical explanations of risk for each accident scene. In the third case study, some experimental research is conducted to evaluate the risk involved with the use of safety gloves. This is evaluated by reviewing Fire Tactics and Standard Operational Procedures (SOP) to determine improvements and recommendations for an efficient firefighting response. Results show that the main causes of burn accidents are the insufficient use of personal protective equipment (PPE), such as safety gloves, and the failure to follow firefighting tactics or SOPs. Through the accident investigation and assessment, it is concluded that to reduce the frequency of burn accidents, the performance of firefighting equipment, SOPs, protection tactics, and safety policy systems require improvement.

Naval Ship Evacuation Path Search Using Deep Learning (딥러닝을 이용한 함정 대피 경로 탐색)

  • Ju-hun, Park;Won-sun, Ruy;In-seok, Lee;Won-cheol, Choi
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.59 no.6
    • /
    • pp.385-392
    • /
    • 2022
  • Naval ship could face a variety of threats in isolated seas. In particular, fires and flooding are defined as disasters that are very likely to cause irreparable damage to ships. These disasters have a very high risk of personal injury as well. Therefore, when a disaster occurs, it must be quickly suppressed, but if there are people in the disaster area, the protection of life must be given priority. In order to quickly evacuate the ship crew in case of a disaster, we would like to propose a plan to quickly explore the evacuation route even in urgent situations. Using commercial escape simulation software, we obtain the data for deep neural network learning with simulations according to aisle characteristics and the properties and number of evacuation person. Using the obtained data, the passage prediction model is trained with a deep learning, and the passage time is predicted through the learned model. Construct a numerical map of a naval ship and construct a distance matrix of the vessel using predicted passage time data. The distance matrix configured in one of the path search algorithms, the Dijkstra algorithm, is applied to explore the evacuation path of naval ship.

The Conceptual Model of the Smart City Platform for the Citizen Participation (시민참여를 위한 스마트 도시 플랫폼의 개념모델)

  • Seo, Dong-Jo;Kim, Mi-Yun
    • Journal of Digital Convergence
    • /
    • v.19 no.11
    • /
    • pp.63-73
    • /
    • 2021
  • In order to effectively promote a smart city, various urban information must be opened and linked, and the information system that each member can share is required. In addition, it is necessary to establish a cooperative system in which citizens and citizen's organizations can participate. In this study, the components and conceptual model of a smart city platform were proposed to create a smart city that enables citizen participation. Its components include sensors for collecting data from the real world, information storage and management, information sharing and standard system, citizens' personal information protection and management system, utilization and service, etc. For the conceptual model, roles of smart city members were defined, so that citizen-centered participation and services could be made. It also includes data collection, information linkage and sharing, and service configuration system. Citizens can perform various roles such as data collector and provider, service planner or requestor, service beneficiary, etc. Ultimately, free communication and exchange of opinions with citizens is a key factor in the success of smart cities.

Investigation of the Potential Risk for Musculoskeletal Disorders in Migrant Workers (외국인근로자의 근골격계질환 발생가능성에 관한 연구)

  • Lim, Hyung-Duk;Rajitha Kawshalya, Mailan Arachchige Don;Nam, Ki-Hun
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.24 no.6_2
    • /
    • pp.781-786
    • /
    • 2021
  • Korean domestic workers are trend to avoid harmful and dangerous jobs calls 3D work due to the poor working conditions. Therefore, the incoming population of foreign workers is increasing to fulfill the required labor force. Mostly these foreign workers are placed in small and medium-size industries. As work that induces musculoskeletal disorders(WMSD) is equally exposed to domestic workers as well as foreign workers, this study attempted to investigate the work burdened by musculoskeletal disorders and derive improvement measures by understanding the actual conditions of the worksites of foreign workers. The result of this investigation defines that the possibility of developing musculoskeletal disorders is very high in the environment in which more than 40% of the respondents work with heavy objects and repetitive work of wrists and elbows. To prevent the symptoms of musculoskeletal disorders among foreign workers, three measures were proposed. To reduce the mandatory check-up period of WMSD under the Occupational Safety and Health Act, to revise the employment permit system, and to enhance the practical help of EPS education. Safety and health management of foreign workers is becoming an essential task not only for securing a workforce but also for the national image. Personal and economic losses at the national level should be minimized through policy support such as financial support for small and medium-sized businesses in Korea and supplementation of legal systems for the protection of foreign workers.

Matrix Character Relocation Technique for Improving Data Privacy in Shard-Based Private Blockchain Environments (샤드 기반 프라이빗 블록체인 환경에서 데이터 프라이버시 개선을 위한 매트릭스 문자 재배치 기법)

  • Lee, Yeol Kook;Seo, Jung Won;Park, Soo Young
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.2
    • /
    • pp.51-58
    • /
    • 2022
  • Blockchain technology is a system in which data from users participating in blockchain networks is distributed and stored. Bitcoin and Ethereum are attracting global attention, and the utilization of blockchain is expected to be endless. However, the need for blockchain data privacy protection is emerging in various financial, medical, and real estate sectors that process personal information due to the transparency of disclosing all data in the blockchain to network participants. Although studies using smart contracts, homomorphic encryption, and cryptographic key methods have been mainly conducted to protect existing blockchain data privacy, this paper proposes data privacy using matrix character relocation techniques differentiated from existing papers. The approach proposed in this paper consists largely of two methods: how to relocate the original data to matrix characters, how to return the deployed data to the original. Through qualitative experiments, we evaluate the safety of the approach proposed in this paper, and demonstrate that matrix character relocation will be sufficiently applicable in private blockchain environments by measuring the time it takes to revert applied data to original data.

Patient Safety Culture Among Dental Hygienists and Perception of Infection Control Activities (치과위생사의 환자안전문화인식과 감염관리활동)

  • Jeong, Yong-Ju;Lee, Sun-Mi
    • Journal of The Korean Society of Integrative Medicine
    • /
    • v.10 no.3
    • /
    • pp.161-172
    • /
    • 2022
  • Purpose : The study was to promote patient safety by analyzing the effect of dental hygienist's perception of patient safety culture on infection control activities. Methods : The study is based on a survey of 210 dental hygienists in total working in dental settings. To find out infection control activities according to patient safety culture awareness, there were 6 general characteristics, 3 teamwork within the department, 2 infection control systems, 4 surface management, 9 equipment washing, disinfection, and laundry management, 4 infectious wastes, and 3 personal protection phrases.The data was analyzed using the SPSS version 20.0, and p<.05 was adopted to decide on significance. Results : The longer dental hygienists have worked n the dental settings, the more active they become in infection control activities. Among the different types of dental care settings, general (university) hospitals had the largest number of infection control activities, followed by dental clinics, and network dental clinics, in descending order. The dental settings possessing a higher number of dental hygienists were found to conduct more infection control activities than other dental settings. In addition, it was found that when a dental setting adopts a patient safety policy across all the units in the hospital, more systems and procedures for patient safety tend to be established, and that stricter management response to error leads to improvement of infection control activities. Conclusion :In order to enhance infection control activities, infection control activity programs should develop and implement periodic reinforcement of infection control education. regular monitoring of infection control activities.

Human Rights in The Context of Digitalization. International-Legal Analysis

  • Panova, Liydmyla;Gramatskyy, Ernest;Kryvosheyina, Inha;Makoda, Volodymyr
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.320-326
    • /
    • 2022
  • The use of the Internet has become commonplace for billions of people on the planet. The rapid development of technology, in particular, mobile gadgets, has provided access to communication anywhere, anytime. At the same time, there are growing concerns about the behavior of people on the Internet, in particular, towards each other and social groups in general. This raises the issue of human rights in today's information society. In this study, we focused on human rights such as the right to privacy, confidentiality, freedom of expression, the right to be forgotten, etc. We point to some differences in this regard, in particular between the EU, etc. In addition, we describe the latest legal regulation in this aspect in European countries. Such methods as systemic, factual, formal and legal, to show the factors of formation and development of human rights in the context of digitalization were used. The authors indicate which of them deserve the most attention due to their prevalence and relevance. Thus, we concluded that the technological development of social communications has laid the groundwork for a legal settlement of privacy and opinion issues on the Internet. Simultaneously, jurisdictions address issues on every aspect of human rights on the Internet, based on previous norms, case law, and principles of law. It is concluded that human rights legislation on the Internet will continue to be actively developed to ensure a balance of private and public interests, safe online access and unimpeded access to it.

Overview of technologies: ensure anonymity of privacy coins

  • Kwon, Hoon;Kim, Eun-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.6
    • /
    • pp.77-86
    • /
    • 2022
  • Recently, various cryptocurrencies (coins) based on block chains have appeared, and interest in privacy coins, which is an anonymity-based cryptocurrency that values personal information protection, is growing. In this paper, we look at coin abuse cases using privacy coins, and analyze the technology that guarantees the anonymity of 8 mainly traded privacy coins (Monero, Dash, Zcash, BEAM, Grin, Horizen, Verge, and Pirate Chain). We would like to analyze the applied technologies for We present the problems that can occur in these privacy coins, check the technology and each element applied to the privacy coin, and analyze the technical difficulty of the anonymity guarantee technology for the mainly traded coins through this, and Appropriate countermeasures and classification of privacy coins for technical difficulty were presented through the problem. Through this, the standard for re-evaluating the value of the coin according to the application of appropriate technology for the privacy coin can be presented.

Vulnerability analysis for AppLock Application (AppLock 정보 은닉 앱에 대한 취약점 분석)

  • Hong, Pyo-gil;Kim, Dohyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.845-853
    • /
    • 2022
  • As the memory capacity of smartphone increases, the type and amount of privacy stored in the smartphone is also increasing. but recently there is an increasing possibility that various personal information such as photos and videos of smartphones may be leaked due to malicious apps by malicious attackers or other people such as repair technicians. This paper analyzed and studied the security and vulnerability of these vault apps by analyzing the cryptography algorithm and data protection function. We analyzed 5.3.7(June 13, 2022) and 3.3.2(December 30, 2020) versions of AppLock, the most downloaded information-hidding apps registered with Google Play, and found various vulnerabilities. In the case of access control, there was a vulnerability in that values for encrypting patterns entered by users were hardcoded into plain text in the source code, and encrypted pattern values were stored in xml files. In addition, in the case of the vault function, there was a vulnerability in that the files and log files for storing in the vault were not encrypted.