• Title/Summary/Keyword: Threat Factors

Search Result 354, Processing Time 0.02 seconds

Factors Affecting LOSA Data Quality (LOSA Data 품질(Quality)에 영향을 미치는 요소)

  • Kyoung Ho Lee;Jang Ryong Lee
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.31 no.2
    • /
    • pp.72-80
    • /
    • 2023
  • Line Operations Safety Audit (LOSA) is a well known preventive aviation safety program for Threat and Error management (TEM). High quality LOSA data suitable for safety management is obtained when a flight crew flies at the same level of attention as ordinary flight. Factors contributing to LOSA data quality may include flight crew's understanding on LOSA purpose, observer's career, and characteristics of the organization responsible for LOSA operations. This study explored purposes of TEM and LOSA, as well as their relationship. Previous studies mentioned quality of LOSA data can be influenced by heuristic judgment, hawthorne effect, and priming effect. This study recognized the importance of LOSA data quality to be effectively used for preventive safety management. It was confirmed that the level of understanding on LOSA concept, experience of the observer, and the characteristics of the department in charge of LOSA operation could affect the quality of LOSA data.

Factors Influencing Participation in Barter Trade by Rural Farming Households in Ondo State, Nigeria

  • Adejobi, A.O.;Sanusi, O.G.;Mafimisebi, T.E.
    • The Journal of Economics, Marketing and Management
    • /
    • v.3 no.4
    • /
    • pp.5-11
    • /
    • 2015
  • The study examined the socio-economic factors influencing the participation of rural farming households in barter trade in Ondo State, Nigeria. The objectives were to compare the socio-economic characteristics of the participants and non-participants in barter trade, analyze the preference for barter trade and identify the constraints to it. Also, the factors affecting respondents' participation in barter trade were identified. Empirical results indicated that there were significant differences in the socio-economic characteristics of the participants and non-participants in barter trade. The SWOT analysis showed that possession of agrarian attributes by the locality where the trade is practiced was the strongest factor ensuring the survival of barter in the study area. Double coincidence of wants was found to be the most prevailing weakness associated with barter while the major reason for participation by some households was that the quantity of commodities received is usually higher compared with cash transactions. Transportation cost to barter markets was found to be the greatest threat to the continued existence of barter trade in the area. The results of the Probit model showed that age, household size, transportation cost to cash markets, farm size, distance to barter markets, and formal education significantly affected the probability participating in barter trade.

A Study on Improvement for Service Proliferation Based on Blockchain (블록체인 기반 서비스 확산을 위한 개선 방안 연구)

  • Yoo, Soonduck;Kim, Kiheung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.1
    • /
    • pp.185-194
    • /
    • 2018
  • This study investigates the limitations of blockchain technology and the ways to improve it by using Delphi technique. Limit factors and improvement measures are classified into technology, service, and legal system. First, from a technical point of view, lack of standardization of the technology, insufficiency of integration, lack of scalability, unclear cancellation or correction policy, excessive cost of transaction verification, insufficient personal information protection and not enough to respond to hacking defense were the limiting factors. In order to improve these, the followings; ensuring standardization, securing integration and scalability, establishing cancellation of each applicable data, establishment of correction policy, efficiency of verification cost, the protection of personal information and countermeasure against hacking are provided. The related technology development and countermeasures must be established to effectively introduce the blockchain technology to the market. Second, in the early stage of blockchain service, it showed lack of utilization of the blockchain, security threat, shortage of skilled workers, and lack of legal liability. As a solution to these problems, it is necessary to suggest various applications, against security threat, training professional manpower, and securing legal responsibility. It should also provide a foundation for providing institutionally stable services. Third, from as legal system point of view, inadequate legal compliance, lack of relevant regulation, and uncertainty in the regulation were the limiting factors. Therefore establishing a legal system, which is the most important area for activating the service, should be accompanied by the provision of legal countermeasures, clearness of regulations and measures to be taken by relevant governmental authorities. This study will contribute as a reference for a research, related to the blockchain.

A Survey on Community dwelling Mentally Ill Patients Who could not be Accessed by a Community Health Center (보건소에서 접근할 수 없는 재가 정신질환자에 대한 조사연구: B시 일 보건소를 중심으로)

  • Reu, Jeong-Suk;Kim, Myung-Hee;Jeong, Chu-Young
    • The Korean Journal of Rehabilitation Nursing
    • /
    • v.15 no.2
    • /
    • pp.91-99
    • /
    • 2012
  • Purpose: The purpose of this study was to identify the frequency and status of mentally ill patients who registered in a community health center (CHC) but they could not be accessed. Methods: A total of 233 mentally ill individuals who were registered to a CHC in B Metropolitan City participated in this survey. Data were collected from December 1 to 31, 2010 and analyzed. Results: There were 140 (60.1%) community dwelling mentally ill patients who had been registered to that CHC but were not accessible. The major reasons of this inaccessibility were patients' rejection to be accessed (27.1%) and the wrong or missing address in hospital's discharge note (22.9%). The nursing problems of the subjects were rejection of medication (93.4%); poor personal hygiene (85.8%); violence including harassment of family member(s), assault, property destruction, threat with weapon (38.7%); and so on. Among 159 cases of referrals and requests for help immediate action with patient's compliance were only 8.8%. Conclusion: The findings show that mentally ill patients who had registered to the CHC but were not able to be accessed failed to be managed properly. This would become risk factors of social problems which threat to the community as well as individuals. Thus, we need to prepare programs for this population to make them take medicine at a minimum.

Begomoviruses and Their Emerging Threats in South Korea: A Review

  • Khan, Mohammad Sajid;Ji, Sang-He;Chun, Se-Chul
    • The Plant Pathology Journal
    • /
    • v.28 no.2
    • /
    • pp.123-136
    • /
    • 2012
  • Diseases caused by begomoviruses (family Geminiviridae, genus Begomovirus) constitute a serious constraint to tropical and sub-tropical agro-ecosystems worldwide. In recent years, they have also introduced in temperate regions of the world where they have great impact and are posing a serious threat to a variety of greenhouse crops. Begomoviral diseases can in extreme cases reduce yields to zero leading to catastrophic losses in agriculture. They are still evolving and pose a serious threat to sustainable agriculture across the world, particularly in tropics and sub-tropics. Till recently, there have been no records on the occurrence of begomoviral disease in South Korea, however, the etiology of other plant viral diseases are known since last century. The first begomovirus infected sample was collected from sweet potato plant in 2003 and since then there has been gradual increase in the begomoviral epidemics specially in tomato and sweet potato crops. So far, 48 begomovirus sequences originating from various plant species have been submitted in public sequence data base from different parts of the country. The rapid emergence of begomoviral epidemics might be with some of the factors like evolution of new variants of the viruses, appearance of efficient vectors, changing cropping systems, introduction of susceptible plant varieties, increase in global trade in agricultural products, intercontinental transportation networks, and changes in global climatic conditions. Another concern might be the emergence of a begomovirus complex and satellite DNA molecules. Thorough understanding of the pathosystems is needed for the designing of effective managements. Efforts should also be made towards the integration of the resistant genes for the development of transgenic plants specially tomato and sweet potato as they have been found to be widely infected in South Korea. There should be efficient surveillance for emergence or incursions of other begomoviruses and biotypes of whitefly. This review discusses the general characteristics of begomoviruses, transmission by their vector B. tabaci with an especial emphasis on the occurrence and distribution of begomoviruses in South Korea, and control measures that must be addressed in order to develop more sustainable management strategies.

The Influence of Violence Experience on the Job Stress among Hospital Employees Working at Administration and Discharging Department (병원 원무행정근무자의 폭력경험이 직무스트레스에 미치는 영향)

  • Choi, Yun-young;Han, Mi Ah;Park, Jong;Choi, Seong Woo
    • Health Policy and Management
    • /
    • v.26 no.4
    • /
    • pp.325-332
    • /
    • 2016
  • Background: Workplace violence was recognized to be social problems that might impact the health status and the job satisfaction of employee in hospitals. This study investigated the current status of violence and job stress among hospital employees working at administration and discharging department. Methods: The study subjects were 213 administrative employees working at 20 general hospitals. Data were collected by self-administered questionnaire that included information such as demographics, job-related characteristics, experience of violence, and job stress. The violence was classified as verbal violence, physical threat, and physical violence occurred by patients and caregivers. Analysis of variance, t-tests, correlation analysis, and multiple linear regression analysis were performed to examine the associated factors with job stress. Results: The levels of verbal violence, physical threat, and physical violence were $1.64{\pm}1.08$, $0.54{\pm}0.67$, and $0.04{\pm}0.17$, respectively. The score of job stress was $2.74{\pm}0.50$ and it was associated with age, existence of spouse, drinking frequency, subjective health status, disease history, night-time treatment, and public health administration career in simple analysis. In multiple linear regression analysis, the level of verbal violence experience was significantly associated with job stress (B=0.09, p=0.001). Also physical threats (B=0.18, p<0.001) and physical violence (B=0.48, p=0.008) showed positive association with job stress. Conclusion: This study attempted to examine the association between experience of violence and job stress in administrative employees at medical institutions. Levels of violence showed positive correlation with the job stress. Environment improvement to protect employee from violence and management of employees who experienced workplace violence are needed to reduce the job stress.

Visual Monitoring System of Multi-Hosts Behavior for Trustworthiness with Mobile Cloud

  • Song, Eun-Ha;Kim, Hyun-Woo;Jeong, Young-Sik
    • Journal of Information Processing Systems
    • /
    • v.8 no.2
    • /
    • pp.347-358
    • /
    • 2012
  • Recently, security researches have been processed on the method to cover a broader range of hacking attacks at the low level in the perspective of hardware. This system security applies not only to individuals' computer systems but also to cloud environments. "Cloud" concerns operations on the web. Therefore it is exposed to a lot of risks and the security of its spaces where data is stored is vulnerable. Accordingly, in order to reduce threat factors to security, the TCG proposed a highly reliable platform based on a semiconductor-chip, the TPM. However, there have been no technologies up to date that enables a real-time visual monitoring of the security status of a PC that is operated based on the TPM. And the TPB has provided the function in a visual method to monitor system status and resources only for the system behavior of a single host. Therefore, this paper will propose a m-TMS (Mobile Trusted Monitoring System) that monitors the trusted state of a computing environment in which a TPM chip-based TPB is mounted and the current status of its system resources in a mobile device environment resulting from the development of network service technology. The m-TMS is provided to users so that system resources of CPU, RAM, and process, which are the monitoring objects in a computer system, may be monitored. Moreover, converting and detouring single entities like a PC or target addresses, which are attack pattern methods that pose a threat to the computer system security, are combined. The branch instruction trace function is monitored using a BiT Profiling tool through which processes attacked or those suspected of being attacked may be traced, thereby enabling users to actively respond.

Occurrence and control of N-nitrosodimethylamine in water engineering systems

  • Bian, Yongning;Wang, Chuang;Zhu, Guocheng;Ren, Bozhi;Zhang, Peng;Hursthouse, Andrew S.
    • Environmental Engineering Research
    • /
    • v.24 no.1
    • /
    • pp.1-16
    • /
    • 2019
  • N-nitrosodimethylamine (NDMA) is a typical nitrogen disinfection by-product, which has posed a potential threat to human health during drinking water disinfection. Because of the well-known effects of mutagenesis, carcinogenesis and teratogenesis, the high detection rate in water engineering systems (such as coagulation, membrane filtration and biological systems), and difficulty to remove, it has received wide concern in the field of water engineering systems. The NDMA is a low molecular weight hydrophilic organic substance, which is difficult to remove. Also, the mechanism for NDMA formation is also recognized to be complex, and many steps still needed to be further evaluated. Therefore, the mechanistic knowledge on NDMA formation potential and their removal processes is of particularly interest. Few papers summarize the occurrence and control of NDMA in water engineering systems. It is for this reason that the content of this paper is particularly important for us to understand and control the amount of NDMA thus reducing the threat of disinfection by-products to drinking water. Four parts including the mechanisms for the NDMA formation potential, the factors affecting the NDMA formation potential, the technologies for removal of NDMA are summarized. Finally, some definite suggestions are given.

Interaction of 2-Hydroxyquinoxaline (2-HQ) on Soil Enzymes and Its Degradation: A Review

  • Gangireddygari, Venkata Subba Reddy;Bontha, Rajasekhar Reddy;Yoon, Ju-Yeon
    • Journal of People, Plants, and Environment
    • /
    • v.23 no.4
    • /
    • pp.399-410
    • /
    • 2020
  • The United Nations project the world population to reach 10 billion by the year 2057. To increase the food of the ever-increasing world population, agrochemicals are indispensable tools to the boon in agriculture production. These agrochemicals are a serious threat to the health of humans, plants, and animals. Agrochemicals are ultimately reached to the main reservoir/sink such as soil and contaminating the groundwater, disturb the soil health and in turn a serious threat to biogeochemical cycling and the entire biosphere. Among agrochemicals, quinalphosis one of the most repeatedly and widely used insecticides in the control of a wide range of pests that attack various crops. Quinalphos is shown to be primarily toxic in organisms by acetylcholinesterase enzyme action. Hydrolysis of quinalphos produces amajor metabolite 2-hydroxyquinoxaline (2-HQ), which has shown secondary toxicity in organisms. 2-HQ is reported to be mutagenic, carcinogenic, growth inhibition and induce oxidative stress in organisms. Quinoline is a heterocyclic compound and structural resemblance of 2-HQ with minor changes, but its degradation studies are enormous compared to the 2-HQ compound. Biotic factors in fate and behavior of 2-HQ in the environment are least studied. 2-HQ interactions with soil enzymes are vary from soil to soil. Based on the toxicity of 2-HQ in our stockpile we need to isolate a handful of microorganisms to treat this persistent metabolite and also other metabolites/compounds.This brief review will be significant from the point of biological and environmental safety.

Security Threats to Enterprise Generative AI Systems and Countermeasures (기업 내 생성형 AI 시스템의 보안 위협과 대응 방안)

  • Jong-woan Choi
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.9-17
    • /
    • 2024
  • This paper examines the security threats to enterprise Generative Artificial Intelligence systems and proposes countermeasures. As AI systems handle vast amounts of data to gain a competitive edge, security threats targeting AI systems are rapidly increasing. Since AI security threats have distinct characteristics compared to traditional human-oriented cybersecurity threats, establishing an AI-specific response system is urgent. This study analyzes the importance of AI system security, identifies key threat factors, and suggests technical and managerial countermeasures. Firstly, it proposes strengthening the security of IT infrastructure where AI systems operate and enhancing AI model robustness by utilizing defensive techniques such as adversarial learning and model quantization. Additionally, it presents an AI security system design that detects anomalies in AI query-response processes to identify insider threats. Furthermore, it emphasizes the establishment of change control and audit frameworks to prevent AI model leakage by adopting the cyber kill chain concept. As AI technology evolves rapidly, by focusing on AI model and data security, insider threat detection, and professional workforce development, companies can improve their digital competitiveness through secure and reliable AI utilization.