• Title/Summary/Keyword: Personnel access

Search Result 104, Processing Time 0.023 seconds

A Survey of Open Access Institutional Repositories in Nigerian University Libraries: The Current State

  • Victor Okeoghene Idiedo;Christopher Agbeniaru Omigie;Loveth Ebhomeye
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.14 no.1
    • /
    • pp.53-73
    • /
    • 2024
  • The purpose of the study is to investigate the development of institutional repositories in university libraries in Nigeria. The study adopted a survey research design. Online questionnaire, IRs investigation, and interview methods were used to collect data from the 21 university libraries that have developed IRs in Nigeria. The study revealed that only few universities have successfully developed open access IRs to preserve and manage their intellectual outputs emanating from their universities. Contents such as journal articles, theses/dissertations, and conference / workshop papers were found to be the most popular contents that are hosted in the IRs. The interview revealed that although few respondents mentioned having IR policy statements in areas such as access policy, submission policy, preservation policy, content policy and copyright policy, the majority mentioned not having any defined policy in their IR. Also in the interview, inadequate fund, challenge of collecting contents for the IR, shortage of skilled ICT personnel, and inadequate facilities were the most mentioned challenges encountered in the development of IRs in Nigeria. Findings from this study will inform University Librarians, university management and policy makers on the need to provide the necessary infrastructure and formulate policies for smooth development of institutional repositories to make research visible globally. The results will therefore provide important data and insight into the development of institutional repositories in university libraries in the context of developing countries.

To Neutralize the Security Systems, Infringement Actions by the Administrator on the Computer Networks (시스템 보안을 무력화 시키는 전산관리자의 시스템 침해 행위 연구)

  • Roo, kyong-ha;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.165-168
    • /
    • 2012
  • In this paper, to remind ourselves that exist in the world what kind of security system is also difficult to defend a system with computerized access system representative of infringement that, Computerized personnel act of infringement cases, and thus the extent of the damage and the severity Revisited, Furthermore, technical measures beyond the limits of the technical security measures in line computerized rights management representative and for infringement prevention measures in Human Resource Management through its own alternative to find.

  • PDF

Enhancement of Internal Control by expanding Security Information Event Management System

  • Im, DongSung;Kim, Yongmin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.8
    • /
    • pp.35-43
    • /
    • 2015
  • Recently, internal information leaks is increasing rapidly by internal employees and authorized outsourcing personnel. In this paper, we propose a method to integrate internal control systems like system access control system and Digital Rights Managements and so on through expansion model of SIEM(Security Information Event Management system). this model performs a analysis step of security event link type and validation process. It develops unit scenarios to react illegal acts for personal information processing system and acts to bypass the internal security system through 5W1H view. It has a feature that derives systematic integration scenarios by integrating unit scenarios. we integrated internal control systems like access control system and Digital Rights Managements and so on through expansion model of Security Information Event Management system to defend leakage of internal information and customer information. We compared existing defense system with the case of the expansion model construction. It shows that expanding SIEM was more effectively.

Fertility preservation during cancer treatment: The Korean Society for Fertility Preservation clinical guidelines

  • Kim, Jayeon;Kim, Seul Ki;Hwang, Kyung Joo;Kim, Seok Hyun
    • Clinical and Experimental Reproductive Medicine
    • /
    • v.44 no.4
    • /
    • pp.171-174
    • /
    • 2017
  • While many fertility preservation (FP) options now exist for reproductive-aged cancer patients, access to these services continues to be limited. A comprehensive FP program should be organized to serve oncofertility patients effectively. Also, much effort is needed from various individuals-patients, specialists from various fields, and consultants-to facilitate FP in a timely manner. Various challenges still exist in improving access to FP programs. To improve access to FP treatment, it is important to educate oncologists and patients via electronic tools and to actively navigate patients through the system. Reproductive endocrinology practices that receive oncofertility referrals must be equipped to provide a full range of options on short notice. A multidisciplinary team approach is required, involving physicians, nurses, mental health professionals, office staff, and laboratory personnel. The bottom line of FP patient care is to understand the true nature of each patient's specific situation and to develop a patient flow system that will help build a successful FP program. Expanding the patient flow system to all comprehensive cancer centers will ensure that all patients are provided with adequate information regarding their fertility, regardless of geography.

Network Group Access Control system using piggy-backing prevention technique based on Infrared-Ray (적외선 기반 피기백킹 방지 기법을 적용한 네트워크 그룹 접근통제 시스템)

  • Kim, JongMin;Choi, KyongHo;Lee, DongHwi
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.109-114
    • /
    • 2012
  • Information society in recent times, lots of important information have been stored in information systems. In this situation, unauthorized person can obtains important information by piggy-backing and shoulder surfing in specific area of organization. Therefore, in this study, we proposed network group access control system by combining RFID and infrared-ray for blocking information leakage due to unauthorized access by internal threats and enhancing personnel security. So it can provides a more secure internal network environment.

A Study of Built-In-Test Diagnosis Mistakes as a False Alarm Filter Useful Redundant Techniques for Built-in-Test Related System

  • Oh, Hyun Seung;Yoo, Wang Jin
    • Journal of Korean Society for Quality Management
    • /
    • v.21 no.2
    • /
    • pp.1-16
    • /
    • 1993
  • Early generations of products had little to no inherent capability to test themselves. The technologies involved often required only visual inspection and limited probing to troubleshoot the system once it was turned over to maintenance personnel. However, as the complexity of military and commercial systems grew, symptoms of failure became less noticeable to the operator. Therefore, the procedure to access, inspect, repair and replace a component became complicated, the requirements for personnel skill and testing equipment increased. and it took too long of a time to maintain a system. Meanwhile, the need for availability became more mission-critical and maintenance become very expensive. The obvious solution was to design in-system circuits or devices to self-test the primary system, the Built-In-Test(BIT) was born. This approach has continued right on up through present systems and is an integral part of systems now being designed. The object of this paper is to present a state-of-the-art research for filtering out the BIT diagnosis mistakes using Bayesian analysis and develop the algorithm for Redundant systems with BIT to improve BIT diagnosis.

  • PDF

Real time crack detection using mountable comparative vacuum monitoring sensors

  • Roach, D.
    • Smart Structures and Systems
    • /
    • v.5 no.4
    • /
    • pp.317-328
    • /
    • 2009
  • Current maintenance operations and integrity checks on a wide array of structures require personnel entry into normally-inaccessible or hazardous areas to perform necessary nondestructive inspections. To gain access for these inspections, structure must be disassembled and removed or personnel must be transported to remote locations. The use of in-situ sensors, coupled with remote interrogation, can be employed to overcome a myriad of inspection impediments stemming from accessibility limitations, complex geometries, the location and depth of hidden damage, and the isolated location of the structure. Furthermore, prevention of unexpected flaw growth and structural failure could be improved if on-board health monitoring systems were used to more regularly assess structural integrity. A research program has been completed to develop and validate Comparative Vacuum Monitoring (CVM) Sensors for surface crack detection. Statistical methods using one-sided tolerance intervals were employed to derive Probability of Detection (POD) levels for a wide array of application scenarios. Multi-year field tests were also conducted to study the deployment and long-term operation of CVM sensors on aircraft. This paper presents the quantitative crack detection capabilities of the CVM sensor, its performance in actual flight environments, and the prospects for structural health monitoring applications on aircraft and other civil structures.

Interactive Quality in Ethiopian Telecom's Service Encounters: A Dyadic Perspective

  • Potluri, Rajasekhara Mouly;Yigezu, Yoseph;Ansari, Rizwana;Khan, Saqib Rasool
    • The Journal of Industrial Distribution & Business
    • /
    • v.6 no.1
    • /
    • pp.27-35
    • /
    • 2015
  • Purpose - This research primarily assesses interactive quality in the service encounters of Ethiopian Telecom from the customer and contact personnel perspectives. Research design, data, and methodology - After reviewing the literature on service encounters and interactive quality, two separate questionnaires and structured personal interviews were conducted to collect the opinions of 400 customers and 100 employees of Ethiopian Telecom. The researchers used convenience sampling; the responses, measured on a five-point Likert-type scale, were analyzed through chi-square tests conducted on SPSS 17.0. Results - Regarding the outcome expected by customers, encounter effectiveness is very low. Regarding accessibility and materiality, the corporation's personnel are freely accessible, relatively well-dressed, and have access to sophisticated office equipment and physical facilities. Finally, with regard to agent satisfaction, the telecom's contact employees are shown to gain little professional satisfaction from service encounters. Conclusion - The study clearly presents the areas in which interactive quality strongly affects both telecom customers and employees; this will help the corporation take corrective action. This is of utmost contemporary importance for both practitioners and researchers.

Analysis of Determinants of Hospital Closures: Focusing on Cox Proportional Hazard Model (병원은 왜 폐업하는가?: Cox 비례위험모형을 중심으로)

  • Ok, Hyun Min;Kim, Sung Hyun;Ji, Seok Min
    • Health Policy and Management
    • /
    • v.32 no.3
    • /
    • pp.317-322
    • /
    • 2022
  • Background: Limited access to medical services causes problems in patients' health and life. Also, hospital closures cause concentration towards general hospitals, which leads to worsening National Health Insurance finance. Therefore, hospital closure is an important topic to be analyzed. Methods: This paper analyzed the factors that affect hospital closures using survival analysis with the data of 970 hospitals opened between 2010 and 2019 in Korea. The number of medical personnel, hospital rooms, sickbeds, and medical departments were used as explanatory variables. Results: The number of medical personnel and hospital rooms increased the survival probability while the number of sickbeds and medical departments decrease the survival probability. Conclusion: The results suggest that hospitals have economies of scale and diseconomies of scope in management.

An Assessment of Records Management Practice in Selected Local Government Councils in Ogun State, Nigeria

  • Bakare, Abdullahi A.;Abioye, Abiola A.;Issa, Abdulwahab Olanrewaju
    • Journal of Information Science Theory and Practice
    • /
    • v.4 no.1
    • /
    • pp.49-64
    • /
    • 2016
  • What government does/fails to do is conveyed to the public largely by records and information of various types in the public service, without which there will be no government. When records are poorly managed, much time is involved in sorting and locating needed information from large volumes of records. The rate of records misplaced or lost from which useful information for decision making is usually obtained makes it difficult to provide concise and up-to-date records of both past and present operations, raising the challenge of effective record-keeping. Thus this study examined records management practices in selected local government councils in Ogun State, Nigeria, adopting the descriptive survey research method using questionnaires for data collection. Its population comprised 415 records of personnel in the selected councils, of which 208 were sampled using simple random technique. From the 208 copies of the questionnaire administered on the registry personnel, 150 copies were useable, with a 72.12% response rate. Descriptive statistics were used for the analysis. The results indicated a prevalence of paper as the dominant medium for recording/conveying information in the councils with most of these being either in active state, semi-active, and vital and were kept and maintained in the registry, while in-active records were kept in the records store. Storage facilities for record-keeping were insufficient. Security measures against unauthorized access to records were by restrictions and subject users to managerial clearance. The study concluded that council records were in chaos and recommended the formulation of coherent records management policy, adequate budgetary provision, and adequate finance.