• 제목/요약/키워드: Violation

검색결과 858건 처리시간 0.02초

Privacy Level Indicating Data Leakage Prevention System

  • Kim, Jinhyung;Park, Choonsik;Hwang, Jun;Kim, Hyung-Jong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권3호
    • /
    • pp.558-575
    • /
    • 2013
  • The purpose of a data leakage prevention system is to protect corporate information assets. The system monitors the packet exchanges between internal systems and the Internet, filters packets according to the data security policy defined by each company, or discretionarily deletes important data included in packets in order to prevent leakage of corporate information. However, the problem arises that the system may monitor employees' personal information, thus allowing their privacy to be violated. Therefore, it is necessary to find not only a solution for detecting leakage of significant information, but also a way to minimize the leakage of internal users' personal information. In this paper, we propose two models for representing the level of personal information disclosure during data leakage detection. One model measures only the disclosure frequencies of keywords that are defined as personal data. These frequencies are used to indicate the privacy violation level. The other model represents the context of privacy violation using a private data matrix. Each row of the matrix represents the disclosure counts for personal data keywords in a given time period, and each column represents the disclosure count of a certain keyword during the entire observation interval. Using the suggested matrix model, we can represent an abstracted context of the privacy violation situation. Experiments on the privacy violation situation to demonstrate the usability of the suggested models are also presented.

Energy and Service Level Agreement Aware Resource Allocation Heuristics for Cloud Data Centers

  • Sutha, K.;Nawaz, G.M.Kadhar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권11호
    • /
    • pp.5357-5381
    • /
    • 2018
  • Cloud computing offers a wide range of on-demand resources over the internet. Utility-based resource allocation in cloud data centers significantly increases the number of cloud users. Heavy usage of cloud data center encounters many problems such as sacrificing system performance, increasing operational cost and high-energy consumption. Therefore, the result of the system damages the environment extremely due to heavy carbon (CO2) emission. However, dynamic allocation of energy-efficient resources in cloud data centers overcomes these problems. In this paper, we have proposed Energy and Service Level Agreement (SLA) Aware Resource Allocation Heuristic Algorithms. These algorithms are essential for reducing power consumption and SLA violation without diminishing the performance and Quality-of-Service (QoS) in cloud data centers. Our proposed model is organized as follows: a) SLA violation detection model is used to prevent Virtual Machines (VMs) from overloaded and underloaded host usage; b) for reducing power consumption of VMs, we have introduced Enhanced minPower and maxUtilization (EMPMU) VM migration policy; and c) efficient utilization of cloud resources and VM placement are achieved using SLA-aware Modified Best Fit Decreasing (MBFD) algorithm. We have validated our test results using CloudSim toolkit 3.0.3. Finally, experimental results have shown better resource utilization, reduced energy consumption and SLA violation in heterogeneous dynamic cloud environment.

Prevalence of dental implant positioning errors: A cross-sectional study

  • Gabriel, Rizzo;Mayara Colpo, Prado;Lilian, Rigo
    • Imaging Science in Dentistry
    • /
    • 제52권4호
    • /
    • pp.343-350
    • /
    • 2022
  • Purpose: This study evaluated the prevalence of dental implant positioning errors and the most frequently affected oral regions. Materials and Methods: A sample was obtained of CBCT images of 590 dental implants from 230 individuals who underwent diagnosis at a radiology center using cone-beam computed tomography from 2017 to 2020. The following variables were considered: thread exposure, violation of the minimum distance between 2 adjacent implants and between the implant and tooth, and implant contact with anatomical structures. Descriptive data analysis and the Pearson chi-square test(P<0.05) were performed to compare findings according to mouth regions. Results: Most (74.4%) of the 590 implants were poorly positioned, with the posterior region of the maxilla being the region most frequently affected by errors. Among the variables analyzed, the most prevalent was thread exposure (54.7%), followed by implant contact with anatomical structures, violation of the recommended distance between 2 implants and violation of the recommended distance between the implant and teeth. Thread exposure was significantly associated with the anterior region of the mandible (P<0.05). The anterior region of the maxilla was associated with violation of the recommended tooth-implant distance (P<0.05) and the recommended distance between 2 adjacent implants(P<0.05). Implant contact with anatomical structures was significantly more likely to occur in the posterior region of the maxilla (P<0.05). Conclusion: Many implants were poorly positioned in the posterior region of the maxilla. Thread exposure was particularly frequent and was significantly associated with the anterior region of the mandible.

Smart Phone 저작권 위반과 포렌식 적용 방안 (Smart Phone Copyright Violation and Forensic Apply Method)

  • 이정훈;박대우
    • 한국정보통신학회논문지
    • /
    • 제14권11호
    • /
    • pp.2491-2496
    • /
    • 2010
  • 국내 Smart Phone 수요가 급속도로 증가함에 따라 멀티미디어 서비스의 활용도 다양해졌다. Smart Phone 사용자들은 Jail Breaking과 Rooting 등 해킹을 하여 멀티미디어 저작권 콘텐츠를 불법으로 이용하고 있다. 또한 한 미 FTA 체결에 따른 법적 문제제기와 이동통신 단말로서 범죄와 관련성이 높아서, 생성, 저장된 디지털 증거는 증거의 활용도가 높아 모바일 포렌식 연구가 필요하다. 본 논문은 Smart Phone 저작권 위반을 가정한 경우 적법적인 압수 수색의 방법과 주의 할 점을 연구하였다. Smart Phone 저작권 침해 현황과 관련 위반사항들을 방송, 영화, 음악, e-book 등으로 항목별로 조사하였고, 포렌식에 기술을 적용하여 법정에 보고서를 제출하는 방법에 대해 연구하였다. 본 연구 결과는 Smart Phone 범죄 증거 자료 제공과 모바일 포렌식 기술 발전에 기여 할 수 있을 것이다.

The Use of Pedicle Screw-Rod System for the Posterior Fixation in Cervico-Thoracic Junction

  • Cho, Won-ik;Eid, Ahmed Shawky;Chang, Ung-Kyu
    • Journal of Korean Neurosurgical Society
    • /
    • 제48권1호
    • /
    • pp.46-52
    • /
    • 2010
  • Objective : In cervico-thoracic junction (CTJ), the use of strong fixation device such as pedicle screw-rod system is often required. Purpose of this study is to analyze the anatomical features of C7 and T1 pedicles related to screw insertion and to evaluate the safety of pedicle screw insertion at these levels. Methods : Nineteen patients underwent posterior CTJ fixation with C7 and/or T1 included in fixation levels. Seventeen patients had tumorous conditions and two with post-laminectomy kyphosis. The anatomical features were analyzed for C7 and T1 pedicles in 19 patients using computerized tomography (CT). Pedicle screw and rod fixation system was used in 16 patients. Pedicle violation by screws was evaluated with postoperative CT scan. Results : The mean values of the width, height, stable depth, safety angle, transverse angle, and sagittal angle of C7 pedicles were $6.9{\pm}1.34\;mm$, $8.23{\pm}1.18\;mm$, $30.93{\pm}4.65\;mm$, $26.42{\pm}7.91$ degrees, $25.9{\pm}4.83$ degrees, and $10.6{\pm}3.39$ degrees. At T1 pedicles, anatomic parameters were similar to those of C7. The pedicle violation revealed that 64.1% showed grade I violation and 35.9% showed grade II violation, overall. As for C7 pedicle screw insertion, grade I was 61.5% and grade II 38.5%. At T1 level, grade I was 65.0% and grade II 35.0%. There was no significant difference in violation rate between the whole group, C7, and T1 group. Conclusion : C7 pedicles can withstand pedicle screw insertion. C7 pedicle and T1 pedicle are anatomically very similar. With the use of adequate fluoroscopic oblique view, pedicle screw can be safely inserted at C7 and T1 levels.

고령운전자 연령구간별 사망사고 발생위험도와 사고비용 분석 연구 (Study on Fatality Risk of Older Driver and Traffic Accident Cost)

  • 최재성
    • 한국안전학회지
    • /
    • 제33권4호
    • /
    • pp.111-118
    • /
    • 2018
  • Korea is facing a surge in the aging population, showing that population aged 65 and above will be accounted for 42.5% of the total population in 2065 with the emphasis on the over-80 population consisting of 19.2%. In response to this abrupt change in population structure, the number of traffic fatality accident referring to older driver as aged 65+ years had been increasing from 605 fatalities in 2011 to 815 fatalities in 2015 resulting in increases in 34.7% in oppose to happening to decreases in 17.2% about non-older driver. With Logit analysis based on Newton-Raphson algorithm utilizing older driver's traffic fatality data for the 2011-2015 years, it was found that the likelihood of an accident resulting in a fatality for super older driver aged 80 years and above considerably increased compared to other older driver with aging classification: 2.24 times for violation of traffic lane, 2.04 times for violation of U-turn, 1.48 times for violation of safety distance, 1.35 times for violation of obstacle of passing; also average annual increase of traffic accident cost related to super older driver was fairly increased rather than other older driver groups. Hence, this study proposes that improving and amending transport safety system and Road Traffic Act for super older driver needs to be urgently in action about license management, safe driving education, etc. when considering the increase of over-80 population in the near future. Also, implementing a social agreement with all ages and social groups to apply with advanced driver assistance system for older driver groups will be able to become a critical factor to enhance safe driving over the face of the country.

차량용 블랙박스를 활용한 교통위반신고 자동화 방법 (A Method for Automation of Traffic Violation Report Using Automobile Black Boxes)

  • 정민석;김성혁;염인호;김현규
    • 정보처리학회논문지:컴퓨터 및 통신 시스템
    • /
    • 제3권10호
    • /
    • pp.351-356
    • /
    • 2014
  • 최근 차량용 블랙박스는 무선 네트워크를 통해 블랙박스에 저장된 동영상을 휴대폰으로 전송하는 기능을 제공하여, 해당 동영상을 여러 용도로 활용할 수 있도록 지원한다. 본 논문에서는 블랙박스 촬영 동영상을 이용하여 교통법규 위반 신고를 자동화하는 방법에 대해 소개한다. 제안하는 방법에서는 교통법규 위반 사례가 포착되었을 때, 간단한 사용자 인터페이스 조작을 통해 촬영된 블랙박스 동영상을 휴대폰으로 전송시킨다. 해당 동영상은 촬영시간 및 위치 등의 관련정보와 함께 HTTP 요청의 형태로 생성되어, 신고센터에 자동으로 전송된다. 본 논문에서는 제안하는 방법을 구현한 프로토타입 시스템에 대해 소개하고, 실제 활용을 위해 필요한 부가적인 사항들에 대해 논의한다.

중소기업 MZ세대 근로자의 심리적 계약위반이 이직의도에 미치는 영향 : 직무소진의 매개효과 (The Effects of Psychological Contract Violation on Turnover Intention of MZ Generation Workers in Small and Medium Businesses: Mediating Effects of Job Burnout)

  • 김예지;윤관식
    • 실천공학교육논문지
    • /
    • 제13권3호
    • /
    • pp.533-544
    • /
    • 2021
  • 급격한 사회환경 변화로 대다수의 중소기업은 만성적 내부 인력난 문제를 안고 있다. 중소기업은 유능한 MZ세대 인재를 조직에 머물도록 하기 위해 그들의 관점을 파악하고, 이를 통해 인력난 완화에 기여할 대안을 제시하는 것이 중요한 당면과제로 대두되고 있다. 이에 본 연구는 내 중소기업에 재직하고 있는 MZ세대 근로자를 대상으로 심리적 계약위반, 직무소진, 이직의도 간 구조적 관계를 규명하고자 하였다. 2021년 4월 19일부터 5월 14일까지 온·오프라인을 통해 수집되어 연구에 최종 활용한 표본은 밀레니얼 세대 144부, Z세대 140부이다. 구조방정식을 활용하여 분석한 결과 심리적 계약위반은 이직의도와 직무소진에 정(+)적으로 유의한 영향을 미치는 것으로 확인되었다. 직무소진 또한 이직의도에 정(+)적 영향을 미치는 것으로 확인되었으며, 심리적 계약위반과 이직의도와의 관계에서 직무소진의 매개효과는 통계적으로 유의미한 것으로 확인되었다. 이러한 연구결과를 바탕으로 학문적, 실무적 시사점을 제시하고 향후 연구에 대해 제언하였다.

울산지역 유해화학물질 영업자의 화학물질관리법 위반 현황과 내용 (Legal Violation of The Chemical Substances Control Act by Hazardous Chemical Business Operators in Ulsan Industrial Areas)

  • 박지훈;권혜옥
    • 한국산업보건학회지
    • /
    • 제33권1호
    • /
    • pp.60-69
    • /
    • 2023
  • Objectives: Business operators handling hazardous chemicals regulated under the Chemical Substances Control Act (CSCA) must receive permits to operate their business from the Ministry of Environment. This study analyzed the status of recent legal violation in chemical handling workplaces in Ulsan where a large volume of chemicals is handled for industrial use. Methods: A total of 557 corporations have been granted legal status as business operators in Ulsan. For all business operators, legal violations in regard to the CSCA that were discovered by the environmental office in the last five years (2018~2022) were thoroughly analyzed. Results: A total of 225 violations of the CSCA have been discovered at 165 corporations, with the violation rate accounting for approximately 27% of all business operators. In particular, 22% of the 165 violators (36 corporations) were discovered to have violated twice or more, and some business operators (6%) even violated in consecutive years. Non-compliance of facility inspection was the most frequent violation (45 cases, 20.1%), followed by non-reporting of important changes in the permitted matters (23 cases, 10.3%), non-completion of legal safety education (19 cases, 8.5%), failure to secure permission for modification in the permitted matters (18 cases, 8.0%), and failure to submit chemical transport plans (16 cases, 7.1%). Conclusions: Most of the violations could have been prevented if the field personnel had paid sufficient attention. Thus, it is fundamentally necessary to create an environment for spontaneous safety management for themselves and to strengthen individual capabilities.

무선랜 시스템에서의 하향 우선 실시간 음성 트래픽 스케줄링 (Downlink-First Scheduling of Real-Time Voice Traffic in IEEE 802.11 Wireless LANs)

  • 정동운;이채영
    • 대한산업공학회지
    • /
    • 제29권2호
    • /
    • pp.150-156
    • /
    • 2003
  • The IEEE 802.11 MAC (Media Access Control) Protocol supports two modes of operation, a random access mode for nonreal-time data applications processed by Distributed Coordinated Function (DCF), and a polling mode for real-time applications served by Point Coordinated Function (PCF). It is known that the standard IEEE 802.11 is insufficient to serve real-time traffic. To provide Quality of Service (QoS) of real-time traffic, we propose the Downlink-first scheduling with Earliest Due Date (EDD) in Contention Free Period (CFP) with suitable admission control. The capacity and deadline violation probability of the proposed system is analyzed and compared to the standard pair system of downlink and uplink. Analytical and simulation results show that the proposed scheme is remarkably efficient in view of the deadline violation probability.