• Title/Summary/Keyword: Security Behavior

Search Result 899, Processing Time 0.029 seconds

A Study on Affordance Dimensions of Digital Services for the Elderly through the Analysis of Senior Adults' Daily Activities

  • Park, Soobeen
    • Architectural research
    • /
    • v.10 no.2
    • /
    • pp.11-20
    • /
    • 2008
  • Designing environments for the elderly includes studying changes in the elderly themselves, changes in their environment, and changes in the intercommunication between the elderly and their environment. The purpose of this study is to provide guidelines for a ubiquitous environment in which seniors can "age in place," using an environment-behavioral approach. 305 subjects aged 45 to 78 take part in the survey research. Temporal sequence (age groups) and behavior (daily activities) are considered as the significant variables to design digital services for the elderly in the perspective of an environment-behavioral approach. Several conclusions can be made. (1) The characteristics of subjects in the over-65 age group shows that they manage an independent lifestyle even if they realize some body functions deteriorate as they age. (2) Over-65 age group is more engaged in healthcare and pastime activities. The male subjects of it are most inactive. (3) The IDA (importance of daily activities) and FDA (frequency of daily activities) are classified by five to six factors in each group. The IDA and FDA of the group aged over 65 differ from other age groups. (4) Five affordance dimensions of digital services for the elderly are proposed: Healthcare, Domesticity, Mobility & Security, Network, and Recreation & Pastime. These affordance dimensions will help research groups or companies design ubiquitous environments to enhance the quality of life of seniors.

A Systems Engineering Approach to Implementing Hardware Cybersecurity Controls for Non-Safety Data Network

  • Ibrahim, Ahmad Salah;Jung, Jaecheon
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.12 no.2
    • /
    • pp.101-114
    • /
    • 2016
  • A model-based systems engineering (MBSE) approach to implementing hardware-based network cybersecurity controls for APR1400 non-safety data network is presented in this work. The proposed design was developed by implementing packet filtering and deep packet inspection functions to control the unauthorized traffic and malicious contents. Denial-of-Service (DoS) attack was considered as a potential cybersecurity issue that may threaten the data availability and integrity of DCS gateway servers. Logical design architecture was developed to simulate the behavior of functions flow. HDL-based physical architecture was modelled and simulated using Xilinx ISE software to verify the design functionality. For effective modelling process, enhanced function flow block diagrams (EFFBDs) and schematic design based on FPGA technology were together developed and simulated to verify the performance and functional requirements of network security controls. Both logical and physical design architectures verified that hardware-based cybersecurity controls are capable to maintain the data availability and integrity. Further works focus on implementing the schematic design to an FPGA platform to accomplish the design verification and validation processes.

ICU Patients' Experience Process of Physical Restraint (중환자실 환자의 억제대 경험과정)

  • Kim, Mi Young
    • Korean Journal of Adult Nursing
    • /
    • v.19 no.4
    • /
    • pp.583-592
    • /
    • 2007
  • Purpose: The purposes of this study were to explore and describe the use of restraint on patients and to generate a grounded theory of how the use of restraint affects patients who have been restrained. Methods: Interview data from seven patients with physical restraint was analyzed using the Strauss and Corbin's grounded theory method. Data were collected and analyzed simultaneously. Unstructured and in-depth interviews were conducted retrospectively with patients recalling their memories of ICU following their transfer to general unit. Results: 'Safety belt' was emerged as a core category and it reflected that physical restraint provided a sense of security to patients. On the basis of core category, a model of the experience process of restrained patients in ICU was developed. The experience process were categorized into four stages: resistance, fear, resignation, and agreement. Stages of these proceeds appeared to have been influenced by the nurses' attitude and caring behavior such as the frequency of nurse-patient interaction, repetition of explanation, and empathetic understanding. Conclusion: These findings indicate that patients have mixed feelings towards restraint use, although negative feelings were stronger than positive ones. The result of this study will help nurses make effective nursing intervention.

  • PDF

Development of a nonlinear seismic response capacity spectrum method for intake towers of dams

  • Cocco, Leonardo;Suarez, Luis E.;Matheu, Enrique E.
    • Structural Engineering and Mechanics
    • /
    • v.36 no.3
    • /
    • pp.321-341
    • /
    • 2010
  • The seismic-induced failure of a dam could have catastrophic consequences associated with the sudden release of the impounded reservoir. Depending on the severity of the seismic hazard, the characteristics and size of the dam-reservoir system, preventing such a failure scenario could be a problem of critical importance. In many cases, the release of water is controlled through a reinforced-concrete intake tower. This paper describes the application of a static nonlinear procedure known as the Capacity Spectrum Method (CSM) to evaluate the structural integrity of intake towers subject to seismic ground motion. Three variants of the CSM are considered: a multimodal pushover scheme, which uses the idea proposed by Chopra and Goel (2002); an adaptive pushover variant, in which the change in the stiffness of the structure is considered; and a combination of both approaches. The effects caused by the water surrounding the intake tower, as well as any water contained inside the hollow structure, are accounted for by added hydrodynamic masses. A typical structure is used as a case study, and the accuracy of the CSM analyses is assessed with time history analyses performed using commercial and structural analysis programs developed in Matlab.

A Study on Construction of Crime Prevention System using Big Data in Korea (한국에서 빅데이터를 활용한 범죄예방시스템 구축을 위한 연구)

  • Kim, SungJun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.5
    • /
    • pp.217-221
    • /
    • 2017
  • Proactive prevention is important for crime. Past crimes have focused on coping after death and punishing them. But with Big Data technology, crime can be prevented spontaneously. Big data can predict the behavior of criminals or potential criminals. This article discusses how to build a big data system for crime prevention. Specifically, it deals with the way to combine unstructured data of big data with basic form data, and as a result, designs crime prevention system. Through this study, it is expected that the possibility of using big data for crime prevention is described through fingerprints, and it is expected to help crime prevention program and research in future.

Basic Study for Securing Stable Water Resources in Coastal Area (해안지역 안정적 수자원 확보를 위한 기초적 연구)

  • Koh, Byoung-Ryoun;Oh, Young-Hun;Ahn, Seung-Seop
    • Journal of Environmental Science International
    • /
    • v.23 no.12
    • /
    • pp.1977-1985
    • /
    • 2014
  • Many countries around the world are amplifying interest and studies on irrigation, flood control and environment with concern on serious water problems. Especially for irrigation in water supply vulnerable areas such as coastal areas - islands, business on underwater resource security facilities are promoted to secure stable water resources due to development of society and increase of life quality. Also, various policies such as reuse of leaking underwater, utilization of underwater at waterfront, and artificial recharge, etc are planned and designed. In order to develop small sized underwater resource secure technology, verification of seawater-freshwater interface is executed and how the balance between these will develop is a great interest of coastal areas - islands. In this study, seawater-freshwater interface behavior analysis experiment was conducted while reflecting properties of coastal areas - islands and executed hydraulic similitude of saltwater intrusion form control technology on abstraction.

Purchase Satisfaction of Apparel for Internet Fashion Shopping Mall Users - focused on 20's~30's Men and Women (인터넷 패션 쇼핑몰 이용자의 의류구매 만족도 -20~30대 남녀를 중심으로-)

  • 신수연;김민정
    • The Research Journal of the Costume Culture
    • /
    • v.11 no.4
    • /
    • pp.487-499
    • /
    • 2003
  • The purpose of this study was to suggest marketing strategies to internet fashion shopping malls identifying factors that customers consider important. Data were collected by survey questionnaire and the subjects were 322 men and women in their twenties and thirties living in Seoul and Kyung-gi. SPSS 10.0 package were used and reliability, frequency, cross tabulation, chi-square, paired t-test, ANOV A and Duncan test were conducted for data analysis. The results were as follows. I) Subjects placed the most importance on providing the precise and detail information of products but its satisfaction level was low. 2) Subjects considered the ‘low price’ very importantly but its satisfaction level of it was not high. 3) Subject's importance and satisfaction level of ‘point system’ were about an average. 'Point system' has to be activated by using systems such as 'point network system' by pointbanking co. as one of price-cutting strategies. 4) Internet fashion shopping mall users treated 'the security system of personal data' importantly while they were not sufficiently satisfied with the system. 5) Female placed more importance on design and color of products and suppliance of the trendy items.

  • PDF

Analysis of Risk Factors for Patient Safety Management (환자안전 관리를 위한 위험요인 분석)

  • Ahn, Sung-Hee
    • Journal of Korean Academy of Nursing Administration
    • /
    • v.12 no.3
    • /
    • pp.373-384
    • /
    • 2006
  • Purpose: This is a pilot study to identify patient safety risk factors and strategies for patient safety management perceived by nurses. Methods: Data were collected and analyzed with an open questionnaire from April to May 2005, targeted on 100 nurses working in two hospitals. The issues were 'what are risk factors for patients, nurses, and other medical practitioners? How do they prevent with the aftermath of risk factors, causes of incidents?' For data analysis, types and frequency of risk factors were worked out, using the Australian Incident Monitoring System Taxonomy. Results: The types of patient safety risk factor perceived by nurses were as follows ; therapeutic devices or equipment, infrastructure and services (29.5%), nosocomial infections (16.3%), clinical processes or procedures (15.4%), behavior, human performance, violence, aggression, security and safety (12.2%), therapeutic agents (9.7%), injuries and pressure ulcers (8.7%), logistics, organization, documentation, and infrastructure technology (5.6%). Strategies for patient safety included training of prevention of infection, education about safety management for patients and medical professionals, establishment of reporting system, culture of care, pre-elimination of risk factors, cooperative system among employees, and sharing information. Conclusion: These results will be used to provide evidences for patient safety management and educational program.

  • PDF

Honeypot Model Analysis using CPN (CPN을 이용한 Honeypot 모델 설계)

  • 현병기;구경옥;조도은;조용환
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.5B
    • /
    • pp.489-499
    • /
    • 2003
  • This paper is a study about Honey-pot Model using CPN(Colored Petri Nets) that is a method of intrusion detection. Suggested Honey-pot model consists of two parts : \circled1 security kernel module for active induction of hacker's intrusion, intrusion detection and behavior pattern analysis. \circled2 virtual module for activity of induced hackers. However, suggested model was compared and analysed with conventional Denning model and Shieh nodel. The Honey-pot model using CPN can classify the characteristic of intrusion pattern, modeling intrusion pattern and pattern matching procedure, detect DDoS attack through multi hosts, and provide basis of study model for analysing intrusion pattern, finally.

Modeling and Analysis of Multi-type Failures in Wireless Body Area Networks with Semi-Markov Model (무선 신체 망에서 세미-마르코프 모델을 이용한 다중 오류에 대한 모델링 및 분석)

  • Wang, Song;Chun, Seung-Man;Park, Jong-Tae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.9B
    • /
    • pp.867-875
    • /
    • 2009
  • The reliability of wireless body area networks is an important research issue since it may jeopardize the vital human life, unless managed properly. In this article, a new modeling and analysis of node misbehaviors in wireless body area networks is presented, in the presence of multi-type failures. First, the nodes are classified into types in accordance with routing capability. Then, the node behavior in the presence of failures such as energy exhaustion and/or malicious attacks has been modeled using a novel Semi-Markov process. The proposed model is very useful in analyzing reliability of WBANs in the presence of multi-type failures.