• Title/Summary/Keyword: THREAT

Search Result 2,837, Processing Time 0.031 seconds

FALSE ANEURYSM IN INTERNAL MAXILLARY ARTERY (내악 동맥에 발생한 가성 동맥류)

  • Lee, Jong-Ho;Hong, Soon-Min;Lee, Eun-Jin;Ahn, Kang-Min;Kim, Sung-Min;Myoung, Hoon;Hwang, Soon-Jung;Seo, Byoung-Moo;Choi, Jin-Young;Choung, Pill-Hoon;Kim, Myung-Jin
    • Journal of the Korean Association of Oral and Maxillofacial Surgeons
    • /
    • v.29 no.1
    • /
    • pp.56-59
    • /
    • 2003
  • The incident of false aneurysm of internal maxillary artery in the oral and maxillofacial region is known to be very rare. One case of false aneurysm in the internal maxillary artery is presented, which was experienced in our department. The etiology of this case is regarded as the mandibular condyle fracture, and/or iatrogenic trauma during open reduction. Clinically, there were systolic bruit on auscultation, pulsation and massive bleeding during operation. The lesion was finally diagnosed with angiography and treated by embolization procedure. False aneurysm can cause so massive bleeding as to threat the life of the patients. Therefore accurate diagnosis and treatment is very important. Angiography enables the solid diagnosis for the clinical one. And as the embolization has many advantages over the ligation, it can be a good treatment method.

How to improve carrier (telecommunications) billing services to prevent damage (통신과금서비스의 피해예방을 위한 개선방안)

  • Yoo, Soonduck;Kim, Jungil
    • Journal of Digital Convergence
    • /
    • v.11 no.10
    • /
    • pp.217-224
    • /
    • 2013
  • Due to the development of mobile technologies, the carrier (telecommunications) billing service market is rapidly growing. carrier (telecommunications) billing service allows users to make on-line purchases through mobile-billing. Users find this particularly convenient because the payment acts as a credit transaction. Furthermore, the system is commonly believed to be secure through its use of SMS (Short Message Service) authentication and a real-time transaction history to confirm the transaction. Unfortunately, there is a growing number of fraudulent transactions threaten the future of this system. The more well documented types of security breaches involves hackers intercepting the authentication process. By contaminating the device with security breaching applications, hackers can secretly make transactions without notifying users until the end of month phone bill. This study sheds light on the importance of this societal threat and suggests solutions. In particular, "secure" systems need to be more proactive in addressing the methods hackers use to make fraudulent transactions. Our research partially covers specific methods to prevent fraudulent transactions on carrier billing service providers' systems. We discuss about the proposed improvements such as complement of electronic payment systems, active promotion for fraudulent transactions enhanced monitoring, fraud detection and introduce a new authentication service. This research supports a future of secure communications billing services, which is essential to expanding new markets.

A Study on the Measurement Method of Personal Information Protection Investment Performance (개인정보보호투자의 성과측정방안에 관한 연구)

  • Kim, Young-Il;Lee, Jae-Hoon
    • Journal of Digital Convergence
    • /
    • v.11 no.1
    • /
    • pp.99-106
    • /
    • 2013
  • Personal information protection has become one of the most impending business issues because leakage of personal information can cause tremendous financial losses and image degradation. Consequently, personal information protection initiatives have been recognized widely in business. To invigorate personal information protection investments, performance measurement method such as cost benefits analysis or qualitative analyses are needed, which have not been studied enough in the previous studies. This study proposes a performance measurement model which can include quantitative and qualitative analyses in the context of personal information protection investments. A comparative analysis has been performed on security investment and IT investment performance measurements, which leads to choose the WiBe method (developed by the German Interior Ministry), considering the privacy characteristics and the method's applicability. In particular, the quantitative effect measured how proactive threat assessment based on the way according to the nature of the businesses and organizations of privacy and possible investment decisions. This study proposes the 16 performance indicators, which turn out to be meaningful in terms of their materiality and feasibility by conducting focus group interviews of 25 experts on personal information protection.

A study on the growth mechanism of Burger King based on dynamic models of success and failure of businesses

  • Lee, Sang-Youn
    • East Asian Journal of Business Economics (EAJBE)
    • /
    • v.5 no.4
    • /
    • pp.39-49
    • /
    • 2017
  • Purpose - This study is to propose a creative idea for constant business growth and development by examining characteristics of business outcomes by phase, which are "growth" and "erosion and stagnation," respectively. Research design, data, methodology - It is necessary to identify an occurrence of crisis and its diffusion with a dynamic model in order to identify a success and failure of businesses in an organic way, not on a binary structure. The static perspective is to understand a crisis as a simply one-time event or as a linear causation. Thus, it has a limited understanding of the overall situation and has limits to investigating a foundational cause and developing long-term countermeasures. On the contrary, the dynamic perspective is to understand the crisis as circulation process of the overall system. Thus, it divides elements of the crisis as external and internal ones to understand it as the causal relationship of each element. Results - During the growth period of Burger King, the company promoted its brand very successfully with aggressive and creative marketing activities. However, due to the founder's disposal of management rights and the following changes in the management, the company had no choice but to lose focus on its business philosophy and brand management, and eventually it had to face the big crisis (resonance) which was delisting from the stock market because of the external threat; well-being trend. However, Burger King resumed lifting on the stock exchange by making great efforts to clearly identify the current issues and seek solutions. Under the spirit of "perseverance" and its slogan "Have it your way" the company is now going head to head with McDonald's in the North American region and emerging countries. Conclusions - Then, what is the most crucial factor in the success and failure of businesses? Answers may vary, however, as learned from the case study of Burger King, corporations should inspect the present and focus on developing a long-term strategy for the future and actively fulfill the actions. McDonald's may not be able to innovate by itself in the future as it may become routinized to the growth. There will be chances of winning if we change conditions of individuals or organizations to an organic system in terms of being creative. There is a hopeful message here that an individual or small business may have more advantages in the era of the idea and innovation.

Study on the Direction of Korea's National Defense Strategy Focused on the Hegemony Strategy of U.S.A. (미국의 패권전략과 한국 군사전략 발전방향)

  • Kim, Sung-Woo
    • Journal of National Security and Military Science
    • /
    • s.8
    • /
    • pp.239-270
    • /
    • 2010
  • This thesis is to make an appropriate national defense policy of Republic of Korea through studying the Hegemony Strategy of United States. I searched the theory of hegemony. The hegemony was differently defined by the point of time and region. The strong power nations with the hegemony have been making efforts to maintain their hegemony everytime. I have conclusion that the presence of hegemony once emerged, it brought regional stability in place whether it is coercive or beneficial. The stability and instability of international order IS not exclusively dependent on hegemony. Even if the safety of hegemony cannot guarantee absolute stability of international order, there IS on doubt that the hegemony has enormous impact on that. According to the hegemonic theory, the history of mankind equals to the history of rising and falling hegemony. The international order was changed as the hegemony changes. The United States has been making efforts to maintain her global hegemony during the post cold-war era as well. Taking all these into consideration, relevant military strategy direction able to pursue national interest is that to make up for the relative weakness in the strategic environment. South Korea have to prepare security policy response as following. First, South Korea should build the military force equipped with advanced weapons in military technology sector and solidify military diplomatic relation able to form cooperative relation in wartime. Second, South Korea should make solid Alliance of Korea and U.S. Third, develop and maintain multilateral security cooperation of East Asia. Forth, we could realize that there are means that can neutralize opponent's strong point by seeking one or two and more asymmetry in the aspect of strategy, tactics, and means through asymmetric strategy. Than the military force of South Korea should develop into a force that is able to overcome to the traditional North Korea's threat and new type of conflicts. And the force should have sufficient strength and be deployed to effectively defend the Korean Peninsula. So, we need to establish a denial and defense system against any hostile neighboring country. Therefore, ROK military forces preparing for the future should try to construct a future military power to gradually establish enough strength for self-defense to prepare for a uncertain security environment and when the Korean Peninsula is unified in a future.

  • PDF

LPI-based Assessment of Liquefaction Potential on the West Coastal Region of Korea (액상화 가능 지수를 이용한 국내 서해안 지역의 액상화 평가)

  • Seo, Min-Woo;Sun, Chang-Guk;Oh, Myoung-Hak
    • Journal of the Earthquake Engineering Society of Korea
    • /
    • v.13 no.4
    • /
    • pp.1-13
    • /
    • 2009
  • Liquefaction is a significant threat to structures on loose saturated sandy soil deposits in the event of an earthquake, and can often cause catastrophic damage, economic loss, and loss of life. Nevertheless, the Korean peninsula has for a long time been recognized as a safe region with respect to the hazard of liquefaction, as the peninsula is located in a moderate seismicity region, and there have been no reports of liquefaction, with the exception of references in some historical documents. However, some earthquakes that have recently occurred in different parts of the world have led to liquefaction in non-plastic silty soils, a soil type that can be found in many of the western coastal areas of Korea. In this study, we first present procedures for evaluating the liquefaction potential, and calculate the liquefaction potential index (LPI) distribution at two western coastal sites using both piezocone penetration test (CPTu) data and standard penetration test (SPT) data. The LPI is computed by integrating liquefaction potential over a depth of 20m, and provides an estimate of liquefaction-related surface damage. In addition, we compared the LPI values obtained from CPTu and SPT, respectively. Our research found that the CRR values from CPTu were lower than those from the SPT, particularly in the range between 40 and 120 for the corrected tip resistance, (qc1N)CS, from the CPTu, or in the range of CRR less than 0.23, resulting in relatively high LPI values. Moreover, it was observed that the differences in the CRR between the two methods were relatively higher for soils with high fine contents.

Security Knowledge Classification Framework for Future Intelligent Environment (미래 융합보안 인력양성을 위한 보안교육과정 분류체계 설계)

  • Na, Onechul;Lee, Hyojik;Sung, Soyung;Chang, Hangbae
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.3
    • /
    • pp.47-58
    • /
    • 2015
  • Recently, new information security vulnerabilities have proliferated with the convergence of information security environments and information and communication technology. Accordingly, new types of cybercrime are on the rise, and security breaches and other security-related incidents are increasing rapidly because of security problems like external cyberattacks, leakage by insiders, etc. These threats will continue to multiply as industry and technology converge. Thus, the main purpose of this paper is to design and present security subjects in order to train professional security management talent who can deal with the enhanced threat to information. To achieve this, the study first set key information security topics for business settings on the basis of an analysis of preceding studies and the results of a meeting of an expert committee. The information security curriculum taxonomy is developed with reference to an information security job taxonomy for domestic conditions in South Korea. The results of this study are expected to help train skilled security talent who can address new security threats in the future environment of industrial convergence.

The Analysis of Vegetation Characteristics According to Revetment Structure at Rural Small Streams (농촌지역 소하천의 제방형태에 따른 식생특성 분석연구)

  • Kim, Mi-Heui;Kang, Banghun;Kong, Min-Jae;Jeong, Myeong-Cheol;Son, Jin-Kwan
    • Journal of Wetlands Research
    • /
    • v.17 no.4
    • /
    • pp.359-369
    • /
    • 2015
  • Stream ecosystems are highly valued natural resources, however, stream environments are currently under threat in several respects. We evaluated vegetation and ecological characteristics according to different revetment types. The distribution of vegetation differed with revetment type, with a 42~45 taxa found in natural revetments, and 23~38 taxa in vertical revetments. Thus, natural revetments host more diverse vegetation than vertical revetments. We also found more plants belonging to the families Labiatae and Cyperaceae growing in natural revetments than in vertical revetments. We proposed that habitat space be apportioned to introduce annual plants as part of stream restoration projects. And, we identified 7 families and 18 taxa of naturalized plants, majority taxa were either biennial or perennial. Moreover, naturalized ratio was higher in vertical(14.3%) than natural(12.1%), we proposed a plan to promote and improve natural streams and revetments. Furthermore, we applied a waterfront evaluation method developed by the Natural Resources Conservation Service of the USDA-NRCS, which confirmed that stream health can be improved in most regions by controlling naturalized plants and ensuring shrub and tree growth. We adopted a new method to remove naturalized plants and establish natural revetments to ensure shrub and tree growth to aid in small-stream restoration and improvement. In future studies, we hope to develop methods for small-stream restoration projects in rural areas.

Vascular Plant Diversity of Jeju Island, Korea

  • Kim, Chan-Soo
    • Korean Journal of Plant Resources
    • /
    • v.22 no.6
    • /
    • pp.558-570
    • /
    • 2009
  • The vascular plants in Jeju composed of 21 families 62 genera, 190 species, 7 varieties with 197 taxa in Pteridophyta, 3 families 5 genera, 7 species, 3 forma with 10 taxa in gymnosperm (Coniferophyta) and 143 families 703 genera, 1,622 species, 114 varieties and 47 forma with 1,783 taxa in Endospermae. The total number of taxa was 1,990 consisting 167 families, 770 genera, 1,818 species, 121 varieties and 50 forma. Three families, 4 genera 4 species and 1 variety in Pteridophyta and 1 family, 1 genus I species, 1 forma of Coniferophyta were endemic to Jeju. Five families, 8 genera and 8 species in the Monocotyledonae of Endospermae and 23 families, 32 genera, 21 species, 16 varieties and 7 forma and 44 taxa in Cholipetalae, and 9 families, 24 genera, 12 species, 13 varieties and 7 forma, total 32 taxa in Sympetalae were endemic to Jeju. Total 90 taxa with 41 families, 69 genera, 46 species, 29 varieties and 15 forma were drawn up as endemic plants in Jeju. As the numbers show on, Jeju has more biodiversity especially plant diversity than any other places in Korea. It was an important region in regard to geographical position. The rarity on plants from Jeju has been assessed based on the IUCN red list categories and criteria at both regional and global levels. There was one species in each extinct (EX) and extinct in the Wild (EW). The EX and EW species were Rhododendron saisiuense Nakai (Ericaceae) and Asplenium antiquum Makino (Aspleniaceae), respectively. Three taxa, Rhododendron dauricum L. (Ericaceae), Lycopodium sieboldii Miq., and Lycopodiella cernua (L.) Serm (Lycopodiaceae) were species that is extinct in the region (RE). Sixty-one taxa were critically endangered (CR), 13 were endangered (EN), and 83 were vulnerable (VU) at regional level. The taxa listed on a Red List corresponds 26.9% of total taxa in Jeju. At global level, there were 19 taxa in CR, 4 in EN, and 1 in VU (Vulnerable) as the category of threat. The rest taxa (133 taxa) were classified as Least Concern (LC). According to the results of the assessment, conservation measures must be taken for total of 157 species that were categorized in threaten including one of EX, one of EW and three extinct in the region immediately. Of 157 species, 61 were CR, 13 are EN and 83 were VU.

Development and Effectiveness Evaluation of Teaching/Learning Plan for Clothing Safety Education in Home Economics Based on the Health Belief Model (건강신념모델을 적용한 의생활 안전교육 교수·학습 과정안 개발 및 효과평가)

  • Kim, Ryu-Gyeong;Shim, Huen-Sup
    • Journal of Korean Home Economics Education Association
    • /
    • v.32 no.1
    • /
    • pp.127-143
    • /
    • 2020
  • The purpose of this study is to develop the clothing safety teaching/learning plan in Home Economics based on the health belief model and to examine the effects of the course using the developed teaching/learning plan on the health belief. Based on ADDIE model, 6 clothing safety teaching/learning plans were developed by applying the health belief model. They consisted of three learning factors of 'harmful substances that can be exposed during the production, wear, wash, and storage of clothes and textile products', 'environment friendly fibers' and 'natural detergents'. Then they were implemented on 7 classes in middle school located in Gyeonggi-do Province from August 20 to September 7 in 2018. The health beliefs data collected before and after the course were analyzed with paired t-test with SPSS/win. As a result, the perceived threat(combination of perceived severity and perceived susceptibility), the perceived benefit, and the self-efficacy were significantly improved. And the perceived barrier was significantly reduced. In conclusion, the home economics clothing safety education course using the health belief model was meaningful as the safety education to enable middle school students to practice safe clothing life from harmful substances. The results of this study are expected to be helpful for activating safety education in home economics.