• Title/Summary/Keyword: Risk Degree

Search Result 1,216, Processing Time 0.039 seconds

A Comparison of ES and PARK Maritime Traffic Risk Assessment Models in a Korean Waterway

  • Nguyen, Thanh Xuan;Park, Young-Soo;Smith, Matthew Vail;Aydogdu, Volkan;Jung, Chang-Hyun
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.21 no.3
    • /
    • pp.246-252
    • /
    • 2015
  • This paper compared the consistency of the Environment Stress(ES) model and the Potential Risk Assessment Model (PARK model, which was developed based on a Korean mariner risk perception) for the Busan adjacent waterway. Evaluation of accuracy and comparison of these two models have been made by Vessel Traffic Service (VTS) officers in the Busan VTS Centre. The assessment results of Busan waterway show that the PARK model is more consistent than the ES model as follows. (1) The difference between assessment results applying ES model and PARK model with risk degree of VTSOs were 34% and 5% respectively in six typical traffic situations. (2) The assessment using PARK model is more suitable and identical with the VTSOs opinion in his or her duty time.

The Influence of Fashion Consumers' Perceived Risk and Regret-Solution Effort upon the Post-Purchase Intention -Focus on the Different Impulse Buying Types-

  • Suh, Hyun-Suk;Na, Youn-Kue;Kim, Mi-Hee
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.34 no.6
    • /
    • pp.889-901
    • /
    • 2010
  • This study examines the relationship between perceived risk and regret, the influence of regret, and the regret-solution effort upon post-purchase behavior. These causal pathways are controlled by moderated different impulse buying types. The results of the study are three-fold. First, consumers with high social and convenience risks resulted in the high levels of regret. Second, the higher the regret then the higher the negative purchase intention and the lower the positive purchase intention. Consumers who emphasize the regret-solution have high positive purchase intentions and the low negative purchase intentions. Lastly, as for the influence of the regret upon the negative purchase intention, the 'recollection impulse buying type' has the greatest influence among all other types. No impulse buying types have a positive influence on purchase intention. As for the influence of the regret-solution efforts on the positive purchase intention, the 'pure impulse buying type' had the greatest influence. Only the 'suggestion impulse buying type' influenced the negative purchase behavior intention. The post-purchase intention depends on the level and the degree of the regret-solution efforts of the consumer. This study contributes to the examination of the different impulse buying types that influence the moderators in the causal pathway of the risk perception to the post-purchase buying behavior.

Social Engineering Attack Graph for Security Risk Assessment: Social Engineering Attack Graph framework(SEAG)

  • Kim, Jun Seok;Kang, Hyunjae;Kim, Jinsoo;Kim, Huy Kang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.11
    • /
    • pp.75-84
    • /
    • 2018
  • Social engineering attack means to get information of Social engineering attack means to get information of opponent without technical attack or to induce opponent to provide information directly. In particular, social engineering does not approach opponents through technical attacks, so it is difficult to prevent all attacks with high-tech security equipment. Each company plans employee education and social training as a countermeasure to prevent social engineering. However, it is difficult for a security officer to obtain a practical education(training) effect, and it is also difficult to measure it visually. Therefore, to measure the social engineering threat, we use the results of social engineering training result to calculate the risk by system asset and propose a attack graph based probability. The security officer uses the results of social engineering training to analyze the security threats by asset and suggests a framework for quick security response. Through the framework presented in this paper, we measure the qualitative social engineering threats, collect system asset information, and calculate the asset risk to generate probability based attack graphs. As a result, the security officer can graphically monitor the degree of vulnerability of the asset's authority system, asset information and preferences along with social engineering training results. It aims to make it practical for companies to utilize as a key indicator for establishing a systematic security strategy in the enterprise.

Structuring Risk Factors of Industrial Incidents Using Natural Language Process (자연어 처리 기법을 활용한 산업재해 위험요인 구조화)

  • Kang, Sungsik;Chang, Seong Rok;Lee, Jongbin;Suh, Yongyoon
    • Journal of the Korean Society of Safety
    • /
    • v.36 no.1
    • /
    • pp.56-63
    • /
    • 2021
  • The narrative texts of industrial accident reports help to identify accident risk factors. They relate the accident triggers to the sequence of events and the outcomes of an accident. Particularly, a set of related keywords in the context of the narrative can represent how the accident proceeded. Previous studies on text analytics for structuring accident reports have been limited to extracting individual keywords without context. We proposed a context-based analysis using a Natural Language Processing (NLP) algorithm to remedy this shortcoming. This study aims to apply Word2Vec of the NLP algorithm to extract adjacent keywords, known as word embedding, conducted by the neural network algorithm based on supervised learning. During processing, Word2Vec is conducted by adjacent keywords in narrative texts as inputs to achieve its supervised learning; keyword weights emerge as the vectors representing the degree of neighboring among keywords. Similar keyword weights mean that the keywords are closely arranged within sentences in the narrative text. Consequently, a set of keywords that have similar weights presents similar accidents. We extracted ten accident processes containing related keywords and used them to understand the risk factors determining how an accident proceeds. This information helps identify how a checklist for an accident report should be structured.

Study of Personal Credit Risk Assessment Based on SVM

  • LI, Xin;XIA, Han
    • The Journal of Industrial Distribution & Business
    • /
    • v.13 no.10
    • /
    • pp.1-8
    • /
    • 2022
  • Purpose: Support vector machines (SVMs) ensemble has been proposed to improve classification performance of Credit risk recently. However, currently used fusion strategies do not evaluate the importance degree of the output of individual component SVM classifier when combining the component predictions to the final decision. To deal with this problem, this paper designs a support vector machines (SVMs) ensemble method based on fuzzy integral, which aggregates the outputs of separate component SVMs with importance of each component SVM. Research design, data, and methodology: This paper designs a personal credit risk evaluation index system including 16 indicators and discusses a support vector machines (SVMs) ensemble method based on fuzzy integral for designing a credit risk assessment system to discriminate good creditors from bad ones. This paper randomly selects 1500 sample data of personal loan customers of a commercial bank in China 2015-2020 for simulation experiments. Results: By comparing the experimental result SVMs ensemble with the single SVM, the neural network ensemble, the proposed method outperforms the single SVM, and neural network ensemble in terms of classification accuracy. Conclusions: The results show that the method proposed in this paper has higher classification accuracy than other classification methods, which confirms the feasibility and effectiveness of this method.

Relationship between hazardous risk factors and subjective health conditions in the working environment of dental hygienists (치과위생사의 작업환경 유해위험요인과 주관적 건강상태와의 관계)

  • Hyoung-Joo, Kim;Jun-Yeong, Kwon;Hee-Jung, Lim
    • Journal of Korean Dental Hygiene Science
    • /
    • v.5 no.2
    • /
    • pp.1-11
    • /
    • 2022
  • Background: This study was aimed at investigating the type of work of dental hygienists and identifying factors affecting the subjective health status according to hazardous risk factors in the working environment. Methods: From May 15 to 31, 2019, we surveyed 411 dental hygienists working at dental hospitals in the metropolitan area. SPSS 25.0 was used to perform the frequency analysis, t-test, one-way analysis of variance, Pearson's correlation analysis, and multiple regression analysis. Results: Regarding factors related to the degree of exposure to hazardous risk factors in the work environment and subjective health status, the more exposed the ergonomic (p<0.05) and psychological (p< 0.001)factors, the worse is the subjective health status. Conclusion: The results of this study suggest that the working environment should be improved for dental hygienists such that they can perform their duties in a safe environment.

The degree of paternal attachment to neonate (아버지의 신생아에 대한 애착정도)

  • 김지영
    • Journal of Korean Academy of Nursing
    • /
    • v.25 no.2
    • /
    • pp.330-340
    • /
    • 1995
  • This study was conducted to find out the degree of paternal attachment to neonate, and to identify factors affecting paternal attachment. The main purpose was to make the base data for nursing intervention to improve parternal attachment. The subjects of this study were 20 fathers whose partners have delivered premature neonate and 30 fathers whose partners have delivered normal neonate in 3 university hospitals in Seoul. Data were collected from Feb. 10 to Apr. 10 1994 by self report questionaires. The instrument for this study was based on 7 kinds of characteristics of paternal attachment by Greenberg St Morris(1974), and developed by re-searcher The statistical methods for data analysis were percentage, mean, standard deviation, 1-test, ANOVA with S.P.S.S. program. The conclusions are as follows. 1. Fathers had the high degree of paternal attachent to neonate, but were afraid of active touch. 2. The factors that affect paternal attachment were delivery odor, past experience about own father except delivery pattern, pregnancy plan, sex of nonate. 3. There were not significant correlations between paternal attachment and early visual contact frequency of father-neonate. 4. In the degree of paternal attachment, though normal neonate father showed somewhat higher result than premature neonate father, there was not statistically significant difference between two groups(t=-1.83, P=0.076). But in the character of tactail awarness there were significant differences between two groups, hence nursing interventions are needed to help the premature neonate's father bring early tactile con-tact. Pother research about factors affecting paternal attachment to neonate and high risk neonate as well as low birth weight neonate is reguired.

  • PDF

An Empirical Study on the Determinant Factors and Success Factors of Accounting Information Systems Outsourcing (회계정보시스템 아웃소싱의 결정요인과 성공요인에 관한 실증연구)

  • Chung, Jun-Soo;Song, Sin-Geun;Cheon, Myun-Joong
    • Asia pacific journal of information systems
    • /
    • v.11 no.1
    • /
    • pp.91-115
    • /
    • 2001
  • Faced with tougher competition in global, organizations are pressured to improve organizational productivity, including information systems(IS) departments. Especially related to IS, trying to remain competitive and up-to-date in rapidly changing world is becoming a financial burden to many organizations. Through outsourcing, organizations can provide better services and acquire and maintain a competitive advantage. In recent years IS outsourcing related researches have appeared in trade and academic literature. However the research on accounting information systems(AIS) outsourcing is very little or limited. This study attempts to empirically test the relationship between determinant factors and the degree of accounting information systems outsourcing as well as the relationship between success factors and the interactions between the degree of accounting information systems outsourcing and outsourcing success. Based on the previous studies on IS outsourcing and its related theories, determinant factors(transaction characteristic, resource performance, and risk dependence) and success factors(monitor, participation, and vendor capability) were identified and their measures were developed. Empirical results demonstrate that the change in the degree of AIS outsourcing is determined by the specificity of accounting information asset, uncertainty, the effect of internal AIS, AIS cost-effectiveness, and cost increase risks, and that monitor and vendor capability are implementation factors determining the degree of outsourcing success.

  • PDF

A Method to Find the Core Node Engaged in Malware Propagation in the Malware Distribution Network Hidden in the Web (웹에 숨겨진 악성코드 배포 네트워크에서 악성코드 전파 핵심노드를 찾는 방안)

  • Kim Sung Jin
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.3-10
    • /
    • 2023
  • In the malware distribution network existing on the web, there is a central node that plays a key role in distributing malware. If you find and block this node, you can effectively block the propagation of malware. In this study, a centrality search method applied with risk analysis in a complex network is proposed, and a method for finding a core node in a malware distribution network is introduced through this approach. In addition, there is a big difference between a benign network and a malicious network in terms of in-degree and out-degree, and also in terms of network layout. Through these characteristics, we can discriminate between malicious and benign networks.

The effects of functional movement recovery of physical therapy after ACL reconstruction with MCL injury (물리치료가 슬관절 내측측부인대 손상을 동반한 전방십자인대 재건술 후 운동기능 회복에 미치는 영향)

  • Kim, In-Sup;Lim, Weon-Sik;Vae, Sung-Soo
    • The Journal of Korean Physical Therapy
    • /
    • v.14 no.1
    • /
    • pp.27-37
    • /
    • 2002
  • This is the study of the knee joint injured patients at the orthopaedic surgery clinic where is located in Daejon, who has MCL combine injured ACL reconstruction caused by sport activity and accident during the period from Jan. 2001 to Oct. 2001. By comparing with groups between 7th case of I-group for MCL combined stitch and II-group for ACL reconstruction since 6weeks cast. We have been concluded with that following results. 1. Range of motion for the knee was not limited at 5th case(37%) of I-group, 6th case(42%) of II-group and the cases of Flexion deficit less then 10 -degree were 2nd case(13%) of I-group and II-group 1st case(8%) with no extension deficit more then 5 -degree. 2. The level of activity that tells you whether you are capable of exercise for six month after operation. It han been divided by 3 levels. The case of capable of doing low risk exercise(swimming, cycling, etc.) was 5th case of I-group, the case of capable of doing medium risk exercise(jogging, etc.) was 3rd case of I-group and 4th case of II-group and the case of capable of doing high risk exercise(football, etc.) were 3rd case of I-group and 3rd case of II-group. 3. The timing of the return to their job were average 6.4 weeks for I-group and average 22.9 weeks for II-group(P<.05, statistical difference). 4. There was no statistical difference between I-group and II-group for the timing of the return to their job(P>.05). 5. By using VAS to compare them there was no statistical difference between I-group and II-group of clinical results according to Lysholm scale.

  • PDF