• Title/Summary/Keyword: Risk Sharing

Search Result 295, Processing Time 0.034 seconds

The Network Effects of Smoking and Drinking Behaviors on Subjective Job Risk Assessment and Workplace Injuries (근로자의 흡연과 음주를 통한 네트워크 형성효과 -주관적 업무위험판단과 사업장 산업재해 발생 분석-)

  • Lee, Sunkuk;Jeon, Yongil
    • Journal of Labour Economics
    • /
    • v.39 no.2
    • /
    • pp.83-111
    • /
    • 2016
  • We investigate how smokers and drinkers have influenced on self-reported risk assessment and workplace injuries, using the Korean Working Conditions Survey. Our empirical results indicate that persistent smoking habit raises workers' job risk assessments and work injuries significantly. Also, former smokers notice relatively higher risk assessments in various work activities, but they are less likely to affect work injuries. More frequent drinking behavior leads to a positive effect of job risk perception and workplace injuries. Regular smoking with frequent drinking for high income classes, however, have significantly reduced the chance of work injuries. Furthermore, establishing smoking-designated area at the workplace makes workers reduce workplace accidents positively. Therefore, the network effect of smoking and drinking behaviors in private circle levels is suggested to extend into public and constructive activies at the workplace levels for sharing useful and productive information, which will eventually reduce workplace injuries dramatically.

  • PDF

Which country's end devices are most sharing vulnerabilities in East Asia? (거시적인 관점에서 바라본 취약점 공유 정도를 측정하는 방법에 대한 연구)

  • Kim, Kwangwon;Won, Yoon Ji
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1281-1291
    • /
    • 2015
  • Compared to the past, people can control end devices via open channel. Although this open channel provides convenience to users, it frequently turns into a security hole. In this paper, we propose a new human-centered security risk analysis method that puts weight on the relationship between end devices. The measure derives from the concept of entropy rate, which is known as the uncertainty per a node in a network. As there are some limitations to use entropy rate as a measure in comparing different size of networks, we divide the entropy rate of a network by the maximum entropy rate of the network. Also, we show how to avoid the violation of irreducible, which is a precondition of the entropy rate of a random walk on a graph.

Physical Activity and Non-specific Neck Pain Recurrence: A Nationwide Cohort Risk Factor Study Based on National Health Insurance Data (신체활동과 비특이적 목 통증의 재발 -국민건강보험 자료에 기반한 전국 코호트 위험인자 연구-)

  • Mi-ran Goo
    • PNF and Movement
    • /
    • v.22 no.1
    • /
    • pp.101-111
    • /
    • 2024
  • Purpose: The purpose of this study was to investigate physical activity as a risk factor for neck pain recurrence using the National Health Insurance Data Sharing Service that utilizes a nationwide cohort in South Korea. Methods: Medical records spanning a two-year period were extracted from the National Health Insurance database for 541,937 patients who sought healthcare services for neck pain (ICD 10 codes: M54.2) in 2020 and completed the national health examination survey. Selected variables for analysis included age, gender, health insurance premium decile, regional health vulnerability index, body mass index (BMI), acuity, blood pressure, and types of physical activity. A mixed-effect multivariate logistic regression analysis was conducted to examine the recurrence rate of neck pain and identify risk factors for neck pain recurrence. Results: Among the participants, 124,433 patients (23.0%) experienced a recurrence of neck pain within two years, with higher recurrence rates observed among older individuals and females. Regression analysis revealed that the risk of neck pain recurrence increased with age (OR=1.51), being female (OR= 1.10), being a medical aid recipient (OR=1.51), and having anaerobic (OR=1.04) or vigorous physical activities (OR=1.06). By contrast, an increased health insurance premium decile (OR=0.96) and having moderate physical activity (OR=0.97) were associated with a decreased risk of neck pain recurrence. Conclusion: This study highlights the importance of moderate physical activity as an effective strategy for reducing the recurrence of nonspecific neck pain, underscoring the necessity for personalized physical activity programs for patients.

Current Trends in the U.S. Cybersecurity Laws (미국 사이버보안법의 최근 동향 - 「사이버보안 정보공유법」을 중심으로 하여 -)

  • Yang, Chun-Soo;Jee, Yu-Mi
    • Journal of Legislation Research
    • /
    • no.54
    • /
    • pp.155-192
    • /
    • 2018
  • As the 'hyper-connected society' has emerged through the 'Fourth Industrial Revolution, public interests as well as social dangers have increased. Above all, the risk of infringement of information, including confidential personal information, is dramatically increasing. As the hyper-connected society has been realized, even if only one of the internet devices is hacked, there would be a danger that the ripple effect of such a hacking spreads to the whole network. Therefore, the necessity and importance of information security, including cybersecurity, has been increasing. In other words, the stability of cyberspace and internet space is becoming more important. As a result, the Korean government is seeking to build a legal system related to information security, which would be able to cope with the information infringement problem in the hyper-connected society. However, it seems that the government is still struggling with the direction of building such a legal system. In this context, a comparative review examining the legal systems of advanced foreign countries will provide meaningful implications as to what kinds of legal policies we should devise and implement for information security. In particular, the U.S. legislative act that actively responds to the cybersecurity violations is worthy of reference. For this reason, this article systematically analyzes the current status of the U.S. cybersecurity laws. Especially, this article focuses on the "Cybersecurity Information Sharing Act of 2015"(hereinafter "CISA"), that was recently enacted by the U.S. congress. The CISA prescribes the systemic and detailed information-sharing between national and private entities. The CISA, that actively promotes information-sharing, is full of suggestions for us, in that information-sharing is an effective way to properly realize information security in today's hyper-connected society.

A Study on the Value of Shared Real-time Stock Information in Two-Echelon Distribution Supply Chains (2계층 분배형 공급사슬에서 실시간 공유 재고 정보의 가치에 관한 연구)

  • Seo, Yong-Won;Jung, Sung-Won;Hahm, Ju-Ho
    • IE interfaces
    • /
    • v.13 no.3
    • /
    • pp.444-454
    • /
    • 2000
  • Due to the improvement of modern information technologies, sharing stock information among the supply chain members is a common practice nowadays. Many companies are planning to adopt the information systems to possess the real-time shared stock information. Thus, it is needed to quantify the value of shared stock information. The purpose of this paper is to evaluate the value of the shared stock information for two-echelon distribution systems. Existing reorder policies can be classified into installation stock policies and echelon stock policies. Since installation stock policies do not utilize the shared stock information, and both classes of policies may show poor performances for distribution systems, we cannot evaluate the value of the shared stock information with the existing policies. Thus, we provide a new type of reorder policy, named order risk policy. We define the order risk using marginal analysis, and prove the optimality. Through computational experiment that compares the order risk policy with the existing policies, it is shown that a significant cost reduction is achieved with the effective utilization of the shared stock information. We also show the effect of the system characteristics on the value of the shared stock information.

  • PDF

Risk Analysis on Vulnerabilities and Threats for Domestic P2P Service Environments (국내 P2P 서비스 환경 하에서의 보안 취약점 및 위협 요소 분석)

  • Shin, Weon;Rhee, Kyung-Hyune
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.7
    • /
    • pp.1447-1454
    • /
    • 2012
  • Recently P2P is the most popular network service on Internet and is applied various areas such as streaming, file sharing and software distribution, but there are many security threats depending on vulnerabilities by P2P network environments. Conceptually P2P network is a overlay network based on Internet, and it has security concerns of itself as well as those of Internet environments. In this paper, we analyze the vulnerabilities and threats for domestic P2P services through various experiments and describe their risk analysis. We expect that this work contributes to new domestic P2P services in consideration of service qualities and security vulnerabilities.

Chuna Manual Therapy for Spondylolisthesis: A Systematic Review and Meta-analysis (척추전방전위증의 추나 치료에 대한 체계적 문헌 고찰 및 메타 분석)

  • Hong, Su Min;Ha, Hyun Ju;Yoon, Kwang Sik
    • Journal of Korean Medicine Rehabilitation
    • /
    • v.30 no.4
    • /
    • pp.65-77
    • /
    • 2020
  • Objectives This study is aimed to evaluate the effectiveness of Chuna therapy for spondylolisthesis. Methods We searched th following 10 online databases without a language restriction (National Digital Science Library [NDSL], Research Information Sharing Service [RISS], Oriental Medicine Advanced Searching Integrated System [OASIS], KMBASE, MEDLINE/PubMed, Cochrane library, Ebscohost, EMBASE, Ovid, China National Knowledge Infrastru [CNKI]) to find randomized controlled trials that used Chuna therapy for spondylolisthesis. The methodological quality of each randomized controlled clinical trial was assessed using the Cochrane risk of bias tool and meta-analyses were perfomed. Results Eleven randomized controlled trials were included. Chuna therapy showed statistically significant reduction of symptoms. Meta-analysis showed positive results for Chuna therapy for spondylolisthesis in terms of therapeutic effects to traction, chinese medicine, therapeutic exercise. Conclusion In this study, we reviewed studies about Chuna therapy used for spondylolisthesis. The studies showed that Chuna therapy can significantly effective on spondylolisthesis. But according to Cochrane risk of bias evaluation method, most of the studies's risk of bias were unclear. Therefore, more high-quality studies will be needed.

A Study of Security Risk Analysis for Public IaaS Cloud Certification (공공 IaaS 클라우드 인증제도에 적용할 위험분석 방법에 대한 연구)

  • Kim, Sun-Jib;Kim, Ki-Young
    • Convergence Security Journal
    • /
    • v.15 no.5
    • /
    • pp.9-15
    • /
    • 2015
  • Cloud computing has emerged with promise to decrease the cost of server additional cost and expanding the data storage and ease for computer resource sharing and apply the new technologies. However, Cloud computing also raises many new security concerns due to the new structure of the cloud service models. Therefore, several cloud service certification system were performed in the world in order to meet customers need which is the safe and reliable cloud service. This paper we propose the new risk analysis method different compare with existing method for secure the reliability of certification considering public IaaS(Infrastructure as a Service) cloud service properties.

Quantitative Risk Assessment of City Gas Facilities Using Geographic Information System (지리정보시스템을 이용한 도시가스시설의 정량적 위험성 평가)

  • Lee Jeung-Woo;Kim Ky-Soo;Ko Jae-Wook
    • Journal of the Korean Institute of Gas
    • /
    • v.2 no.2
    • /
    • pp.12-17
    • /
    • 1998
  • The number of fuel gas accidents is increasing in domestic fuel gas facilities as increasing the supply area. To prevent gas accident, the government institutions related to fuel gas industry partly collected and managed the information of physical properties and safety data. Due to the overlap of data between institutions, collecting and managing the safety information was inefficient. The purpose of this research is developing geographic information system which providing the information of quantitative risk assessment, accident prevention plan, and efficient sharing and managing of the system.

  • PDF

Influences of channel assessment on the usage levels of multi-channels by product category in decision making process for purchasing fashion products (패션상품 구매의사 결정과정에서의 상품유형별 채널평가가 멀티채널 이용도에 미치는 영향)

  • Park, Sung Ryul;Kim, Mi Sook
    • The Research Journal of the Costume Culture
    • /
    • v.24 no.6
    • /
    • pp.803-816
    • /
    • 2016
  • The purposes of this study were to investigate the influences of channel assessments on the usage of multi-channels by product types, and the differences in the usage of multi-channels among product types in buying decision making process for fashion products. Data were collected from 510 consumers in their 20s to 50s with purchasing experiences through multi-channel distribution system and living in Seoul and Kyunggi province; 491 were analyzed after deleting incomplete questionnaires. Factor analysis, multiple regression analysis and one-way ANOVA were used for statistical analysis by using SPSS 18.0. The results were as follows: 5 factors were extracted for channel assessment: utility, accuracy, risk, price benefit and sharing information. Price benefits, utility and sharing information for online channel tended to influence positively on the usage of online channel and online+offline channels. Accuracy and low perceived risk of offline influenced positively on offline and on+offline channel usages. The usage levels of on-line and off-line channels for cosmetics were significantly lower than the usage levels for clothes and accessories on information search, evaluation of alternatives, and purchase stages. Significant differences were also found in the usage levels of multi-channels (on+off-line) on information search and evaluation of alternatives stages. The usage levels of the multi-channels for clothes were the highest followed by those of accessories and cosmetics in order.