• Title/Summary/Keyword: Violation

Search Result 858, Processing Time 0.03 seconds

Privacy Level Indicating Data Leakage Prevention System

  • Kim, Jinhyung;Park, Choonsik;Hwang, Jun;Kim, Hyung-Jong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.3
    • /
    • pp.558-575
    • /
    • 2013
  • The purpose of a data leakage prevention system is to protect corporate information assets. The system monitors the packet exchanges between internal systems and the Internet, filters packets according to the data security policy defined by each company, or discretionarily deletes important data included in packets in order to prevent leakage of corporate information. However, the problem arises that the system may monitor employees' personal information, thus allowing their privacy to be violated. Therefore, it is necessary to find not only a solution for detecting leakage of significant information, but also a way to minimize the leakage of internal users' personal information. In this paper, we propose two models for representing the level of personal information disclosure during data leakage detection. One model measures only the disclosure frequencies of keywords that are defined as personal data. These frequencies are used to indicate the privacy violation level. The other model represents the context of privacy violation using a private data matrix. Each row of the matrix represents the disclosure counts for personal data keywords in a given time period, and each column represents the disclosure count of a certain keyword during the entire observation interval. Using the suggested matrix model, we can represent an abstracted context of the privacy violation situation. Experiments on the privacy violation situation to demonstrate the usability of the suggested models are also presented.

Energy and Service Level Agreement Aware Resource Allocation Heuristics for Cloud Data Centers

  • Sutha, K.;Nawaz, G.M.Kadhar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5357-5381
    • /
    • 2018
  • Cloud computing offers a wide range of on-demand resources over the internet. Utility-based resource allocation in cloud data centers significantly increases the number of cloud users. Heavy usage of cloud data center encounters many problems such as sacrificing system performance, increasing operational cost and high-energy consumption. Therefore, the result of the system damages the environment extremely due to heavy carbon (CO2) emission. However, dynamic allocation of energy-efficient resources in cloud data centers overcomes these problems. In this paper, we have proposed Energy and Service Level Agreement (SLA) Aware Resource Allocation Heuristic Algorithms. These algorithms are essential for reducing power consumption and SLA violation without diminishing the performance and Quality-of-Service (QoS) in cloud data centers. Our proposed model is organized as follows: a) SLA violation detection model is used to prevent Virtual Machines (VMs) from overloaded and underloaded host usage; b) for reducing power consumption of VMs, we have introduced Enhanced minPower and maxUtilization (EMPMU) VM migration policy; and c) efficient utilization of cloud resources and VM placement are achieved using SLA-aware Modified Best Fit Decreasing (MBFD) algorithm. We have validated our test results using CloudSim toolkit 3.0.3. Finally, experimental results have shown better resource utilization, reduced energy consumption and SLA violation in heterogeneous dynamic cloud environment.

Prevalence of dental implant positioning errors: A cross-sectional study

  • Gabriel, Rizzo;Mayara Colpo, Prado;Lilian, Rigo
    • Imaging Science in Dentistry
    • /
    • v.52 no.4
    • /
    • pp.343-350
    • /
    • 2022
  • Purpose: This study evaluated the prevalence of dental implant positioning errors and the most frequently affected oral regions. Materials and Methods: A sample was obtained of CBCT images of 590 dental implants from 230 individuals who underwent diagnosis at a radiology center using cone-beam computed tomography from 2017 to 2020. The following variables were considered: thread exposure, violation of the minimum distance between 2 adjacent implants and between the implant and tooth, and implant contact with anatomical structures. Descriptive data analysis and the Pearson chi-square test(P<0.05) were performed to compare findings according to mouth regions. Results: Most (74.4%) of the 590 implants were poorly positioned, with the posterior region of the maxilla being the region most frequently affected by errors. Among the variables analyzed, the most prevalent was thread exposure (54.7%), followed by implant contact with anatomical structures, violation of the recommended distance between 2 implants and violation of the recommended distance between the implant and teeth. Thread exposure was significantly associated with the anterior region of the mandible (P<0.05). The anterior region of the maxilla was associated with violation of the recommended tooth-implant distance (P<0.05) and the recommended distance between 2 adjacent implants(P<0.05). Implant contact with anatomical structures was significantly more likely to occur in the posterior region of the maxilla (P<0.05). Conclusion: Many implants were poorly positioned in the posterior region of the maxilla. Thread exposure was particularly frequent and was significantly associated with the anterior region of the mandible.

Smart Phone Copyright Violation and Forensic Apply Method (Smart Phone 저작권 위반과 포렌식 적용 방안)

  • Yi, Jeong-Hoon;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.11
    • /
    • pp.2491-2496
    • /
    • 2010
  • Smart Phone with domestic demand increasing rapidly, the utilization of multimedia services have become diverse. Smart Phone users use the copyrighted multimedia contents illegally from hacking their Smart Phone with Jail Breaking and Rooting. Legal issues according to the Korea-U.S. FTA. and high relevance with crime as mobile communication terminal, the utilization of created and saved digital evidence is high, the mobile forensic evidence study is required. This paper studied method and notice of legal seizure and search assuming the Smart Phone copyright violation. Research the status of Smart Phone copyright violation and related violation by category as broadcasting, movies, music, e-book etc. Research the method of submit a report to the court by applying techniques to forensic. The results of this research will contribute to the provide of Smart Phone crime evidence and mobile forensic technology.

The Use of Pedicle Screw-Rod System for the Posterior Fixation in Cervico-Thoracic Junction

  • Cho, Won-ik;Eid, Ahmed Shawky;Chang, Ung-Kyu
    • Journal of Korean Neurosurgical Society
    • /
    • v.48 no.1
    • /
    • pp.46-52
    • /
    • 2010
  • Objective : In cervico-thoracic junction (CTJ), the use of strong fixation device such as pedicle screw-rod system is often required. Purpose of this study is to analyze the anatomical features of C7 and T1 pedicles related to screw insertion and to evaluate the safety of pedicle screw insertion at these levels. Methods : Nineteen patients underwent posterior CTJ fixation with C7 and/or T1 included in fixation levels. Seventeen patients had tumorous conditions and two with post-laminectomy kyphosis. The anatomical features were analyzed for C7 and T1 pedicles in 19 patients using computerized tomography (CT). Pedicle screw and rod fixation system was used in 16 patients. Pedicle violation by screws was evaluated with postoperative CT scan. Results : The mean values of the width, height, stable depth, safety angle, transverse angle, and sagittal angle of C7 pedicles were $6.9{\pm}1.34\;mm$, $8.23{\pm}1.18\;mm$, $30.93{\pm}4.65\;mm$, $26.42{\pm}7.91$ degrees, $25.9{\pm}4.83$ degrees, and $10.6{\pm}3.39$ degrees. At T1 pedicles, anatomic parameters were similar to those of C7. The pedicle violation revealed that 64.1% showed grade I violation and 35.9% showed grade II violation, overall. As for C7 pedicle screw insertion, grade I was 61.5% and grade II 38.5%. At T1 level, grade I was 65.0% and grade II 35.0%. There was no significant difference in violation rate between the whole group, C7, and T1 group. Conclusion : C7 pedicles can withstand pedicle screw insertion. C7 pedicle and T1 pedicle are anatomically very similar. With the use of adequate fluoroscopic oblique view, pedicle screw can be safely inserted at C7 and T1 levels.

Study on Fatality Risk of Older Driver and Traffic Accident Cost (고령운전자 연령구간별 사망사고 발생위험도와 사고비용 분석 연구)

  • Choi, Jaesung
    • Journal of the Korean Society of Safety
    • /
    • v.33 no.4
    • /
    • pp.111-118
    • /
    • 2018
  • Korea is facing a surge in the aging population, showing that population aged 65 and above will be accounted for 42.5% of the total population in 2065 with the emphasis on the over-80 population consisting of 19.2%. In response to this abrupt change in population structure, the number of traffic fatality accident referring to older driver as aged 65+ years had been increasing from 605 fatalities in 2011 to 815 fatalities in 2015 resulting in increases in 34.7% in oppose to happening to decreases in 17.2% about non-older driver. With Logit analysis based on Newton-Raphson algorithm utilizing older driver's traffic fatality data for the 2011-2015 years, it was found that the likelihood of an accident resulting in a fatality for super older driver aged 80 years and above considerably increased compared to other older driver with aging classification: 2.24 times for violation of traffic lane, 2.04 times for violation of U-turn, 1.48 times for violation of safety distance, 1.35 times for violation of obstacle of passing; also average annual increase of traffic accident cost related to super older driver was fairly increased rather than other older driver groups. Hence, this study proposes that improving and amending transport safety system and Road Traffic Act for super older driver needs to be urgently in action about license management, safe driving education, etc. when considering the increase of over-80 population in the near future. Also, implementing a social agreement with all ages and social groups to apply with advanced driver assistance system for older driver groups will be able to become a critical factor to enhance safe driving over the face of the country.

A Method for Automation of Traffic Violation Report Using Automobile Black Boxes (차량용 블랙박스를 활용한 교통위반신고 자동화 방법)

  • Jeong, Min Seok;Kim, Seong Hyuk;Yeom, In Ho;Kim, Hyeon Gyu
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.351-356
    • /
    • 2014
  • Recently, automobile black boxes have evolved to support functionality to transfer videos stored in them into mobile phones via wireless network, from which the videos can be utilized for various purposes. This paper presents a method for automation of traffic violation reports using the automobile black boxes. When a traffic violation is captured by a black box, the proposed method helps a user to transfer the video capturing it into a mobile phone through a simple UI operation. With the video, an HTTP request to report the violation is automatically generated from the mobile phone, and then is transferred to a cyber-report center. We present a prototype system that implements the proposed method, and discuss several issues necessary to apply the method to real-world applications.

The Effects of Psychological Contract Violation on Turnover Intention of MZ Generation Workers in Small and Medium Businesses: Mediating Effects of Job Burnout (중소기업 MZ세대 근로자의 심리적 계약위반이 이직의도에 미치는 영향 : 직무소진의 매개효과)

  • Kim, Yeji;Yoon, Gwansik
    • Journal of Practical Engineering Education
    • /
    • v.13 no.3
    • /
    • pp.533-544
    • /
    • 2021
  • The purpose of this study is to investigate the structural relationship among psychological contract violation, job burnout, and turnover intention of MZ generation workers in small and medium enterprises. The sample collected through online and offline was 144 units of millennial generation and 140 units of Z generation. The results of analysis using structural equations showed that psychological contract violation had a positive (+) effects on turnover intention and job burnout, and job burnout also had a positive (+) effect on turnover intention. In the relationship between psychological contract violation and turnover intention, job burnout had a partial mediating effect.

Legal Violation of The Chemical Substances Control Act by Hazardous Chemical Business Operators in Ulsan Industrial Areas (울산지역 유해화학물질 영업자의 화학물질관리법 위반 현황과 내용)

  • Jihoon Park;Hye-Ok Kwon
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.33 no.1
    • /
    • pp.60-69
    • /
    • 2023
  • Objectives: Business operators handling hazardous chemicals regulated under the Chemical Substances Control Act (CSCA) must receive permits to operate their business from the Ministry of Environment. This study analyzed the status of recent legal violation in chemical handling workplaces in Ulsan where a large volume of chemicals is handled for industrial use. Methods: A total of 557 corporations have been granted legal status as business operators in Ulsan. For all business operators, legal violations in regard to the CSCA that were discovered by the environmental office in the last five years (2018~2022) were thoroughly analyzed. Results: A total of 225 violations of the CSCA have been discovered at 165 corporations, with the violation rate accounting for approximately 27% of all business operators. In particular, 22% of the 165 violators (36 corporations) were discovered to have violated twice or more, and some business operators (6%) even violated in consecutive years. Non-compliance of facility inspection was the most frequent violation (45 cases, 20.1%), followed by non-reporting of important changes in the permitted matters (23 cases, 10.3%), non-completion of legal safety education (19 cases, 8.5%), failure to secure permission for modification in the permitted matters (18 cases, 8.0%), and failure to submit chemical transport plans (16 cases, 7.1%). Conclusions: Most of the violations could have been prevented if the field personnel had paid sufficient attention. Thus, it is fundamentally necessary to create an environment for spontaneous safety management for themselves and to strengthen individual capabilities.

Downlink-First Scheduling of Real-Time Voice Traffic in IEEE 802.11 Wireless LANs (무선랜 시스템에서의 하향 우선 실시간 음성 트래픽 스케줄링)

  • Jeong, Dong W.;Lee, Chae Y.
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.29 no.2
    • /
    • pp.150-156
    • /
    • 2003
  • The IEEE 802.11 MAC (Media Access Control) Protocol supports two modes of operation, a random access mode for nonreal-time data applications processed by Distributed Coordinated Function (DCF), and a polling mode for real-time applications served by Point Coordinated Function (PCF). It is known that the standard IEEE 802.11 is insufficient to serve real-time traffic. To provide Quality of Service (QoS) of real-time traffic, we propose the Downlink-first scheduling with Earliest Due Date (EDD) in Contention Free Period (CFP) with suitable admission control. The capacity and deadline violation probability of the proposed system is analyzed and compared to the standard pair system of downlink and uplink. Analytical and simulation results show that the proposed scheme is remarkably efficient in view of the deadline violation probability.