• Title/Summary/Keyword: misuse

Search Result 414, Processing Time 0.191 seconds

Privacy Leakage Monitoring System Design for Privacy Protection (개인정보보호를 위한 개인정보 유출 모니터링 시스템의 설계)

  • Cho, Sung-Kyu;Jun, Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.99-106
    • /
    • 2012
  • Numerous private corporations and public institutions are collecting personal information through the diverse methods for the purpose of sales, promotion and civil services, and using personal information for the profits of the organizations and services. However, due to immaturity of the technical, managerial measures and internal control for the collected personal information, the misuse, abuse and the leaks of personal information are emerged as major social issues, and the government also is promoting implementation of the act on the privacy protection by recognizing the importance of the personal information protection. This research describes on the measures to detect the anomaly by analyzing personal information treatment patterns managed by the organizations, and on the measures to coup with the leaks, misuse, and abuse of personal information. Particularly, this research is intended to suggest privacy leakage monitoring system design, which can be managed by making the elements related to personal information leaks to numeric core risk indexes to be measured objectively.

Prevention, diagnosis, and treatment of opioid use disorder under the supervision of opioid stewardship programs: it's time to act now

  • Kim, Eun-Ji;Hwang, Eun-Jung;Yoo, Yeong-Min;Kim, Kyung-Hoon
    • The Korean Journal of Pain
    • /
    • v.35 no.4
    • /
    • pp.361-382
    • /
    • 2022
  • The third opium war may have already started, not only due to illicit opioid trafficking from the Golden Crescent and Golden Triangle on the international front but also through indiscriminate opioid prescription and opioid diversion at home. Opioid use disorder (OUD), among unintentional injuries, has become one of the top 4 causes of death in the United States (U.S.). An OUD is defined as a problematic pattern of opioid use resulting in clinically significant impairment or distress, consisting of 2 or more of 11 problems within 1 year, as described by the Diagnostic and Statistical Manual for Mental Disorders, Fifth Edition. Observation of aberrant behaviors of OUD is also helpful for overworked clinicians. For the prevention of OUD, the Opioid Risk Tool and the Current Opioid Misuse Measure are appropriate screening tests before and during opioid administration, respectively. Treatment of OUD consists of 3 opioid-based U.S. Food and Drug Administration-approved medications, including methadone, buprenorphine, and naltrexone, and non-opioid-based symptomatic medications for reducing opioid withdrawal syndromes, such as α2 agonists, β-blockers, antidiarrheals, antiemetics, non-steroidal anti-inflammatory drugs, and benzodiazepines. There are at least 6 recommendable guidelines and essential terms related to OUD. Opioid stewardship programs are now critical to promoting appropriate use of opioid medications, improving patient outcomes, and reducing misuse of opioids, influenced by the successful implementation of antimicrobial stewardship programs. Despite the lack of previous motivation, now is the critical time for trying to reduce the risk of OUD.

General Public Knowledge Regarding Topical Corticosteroids: A Nationwide Survey in South Korea

  • Seo, Heenam;Song, Seoung Yeon;Kim, Dahye;Park, Ji Hwan;Shin, Yoonho;Lee, Kang Hyuk;Choi, Soo An;Lee, Ju-Yeun;Kim, Do Young;Shin, Wan Gyoon;Kim, Eunyoung
    • Korean Journal of Clinical Pharmacy
    • /
    • v.32 no.2
    • /
    • pp.84-92
    • /
    • 2022
  • Background: Topical corticosteroids (TCs) are available both as over-the-counter drugs and prescription medicines at pharmacies. Although they are generally safe drugs, inappropriate and excessive use could result in potential side effects. Thus, it is important to have appropriate knowledge regarding the use of TCs. We performed a cross-sectional survey to assess public knowledge and the potential misuse or overuse of TCs. Methods: A cross-sectional and nationwide online survey was conducted among participants who were aware of TCs. The survey items included sources of information, indications, potential side effects, and methods of application of TCs. A comparative analysis was conducted between those with (TC users) and without (TC non-users) an experience of using TCs. Results: Among 3,000 participants, 74.4% were TC users. The mass media was the most common information source of TCs, and only one-third of the surveyed people relied on pharmacists or doctors for information. Regarding indications and application methods, incorrect answer rate was high in some items, but respondents showed adequate knowledge. However, awareness of the safety of TCs was low. Overall, the TC users showed a higher knowledge of TCs than TC non-users. Conclusions: Public knowledge of the use of TCs appears to be appropriate. However, we found potential misuse or overuse of some items and a lack of awareness of the side effects concerning TCs. Thus, healthcare professionals' significant role is required.

A Study on the Establishment of the IDS Using Machine Learning (머신 러닝을 활용한 IDS 구축 방안 연구)

  • Kang, Hyun-Sun
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.2
    • /
    • pp.121-128
    • /
    • 2019
  • Computing systems have various vulnerabilities to cyber attacks. In particular, various cyber attacks that are intelligent in the information society have caused serious social problems and economic losses. Traditional security systems are based on misuse-based technology, which requires the continuous updating of new attack patterns and the real-time analysis of vast amounts of data generated by numerous security devices in order to accurately detect. However, traditional security systems are unable to respond through detection and analysis in real time, which can delay the recognition of intrusions and cause a lot of damage. Therefore, there is a need for a new security system that can quickly detect, analyze, and predict the ever-increasing cyber security threats based on machine learning and big data analysis models. In this paper, we present a IDS model that combines machine learning and big data technology.

Revealing the linkability of Popescue ID-based Group Signature Scheme

  • Park, Hyungki;Fangguo Zhang;Kim, Kwangjo
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.81-83
    • /
    • 2002
  • Group signature schemes allow a group member to sign a document on behalf of the group anonymously. In addition, in case of anonymity misuse, a group authority can recover the issuer of a signature. In this paper, we analyze the security of a group signature scheme proposed by Popescu which is a modification of the Tseng-Jan group signature scheme. We show that the scheme can't provide an important requirement of the group signature, unlikability. Thus, other members are allowed to identify whether two signatures have been issued by the same group member or not.

  • PDF

Public Health Risks: Antibiotic Resistance - Review -

  • Barton, Mary D;Hart, Wendy S
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.14 no.3
    • /
    • pp.414-422
    • /
    • 2001
  • Antibiotic resistance in human pathogens is a major public health issue. Some of the resistance problem can be attributed to the transfer of resistant bacteria from animals to people and the transfer of resistance genes from animal pathogens and commensal bacteria to human pathogens. Control measures include improvements in food hygiene to reduce the spread of zoonotic bacteria to people via the food chain. However, to specifically address the issue, the medical profession must control misuse and overuse of antibiotics in hospitals and community practice. In addition, the livestock industries and their advisors must reduce and refine the use of antibiotics in animal production and replace antibiotics with alternative disease control measures as much as possible.

The Type and Importance of Oriental Health Promotion Services and Nursing - By Delphi Method - (한방 건강증진 서비스 및 간호의 종류와 중요도 - 델파이방법을 이용하여 -)

  • Jang, Soon Yang;Park, Jeong Sook
    • Korean Journal of Adult Nursing
    • /
    • v.18 no.1
    • /
    • pp.62-70
    • /
    • 2006
  • Purpose: To identify the agreed opinion of experts on oriental health promotion services and nursing in Korea. Method: The study is based on the 3-round Delphi method. As a Delphi panel, a total of 28 people with at least three years of experience in the area of oriental medicine consisted of this. Results: The experts suggested that Yangsaeng, lectures on prevention of CVA, correct understanding of the misuse/abuse of oriental medicine, daily health care, meridian/acupoints massage, and Kigong therapy should be included in the promoting oriental health nursing servies. Conclusion: The agreed opinions by the experts on the oriental health promotion services and nursing, can help enhance the understanding of oriental health promotion. The curriculum should be developed further and tested with the development of the Korean oriental nursing intervention methods which is appropriate to Korean culture.

  • PDF

An Anomalous Behavior Detection Method Using System Call Sequences for Distributed Applications

  • Ma, Chuan;Shen, Limin;Wang, Tao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.2
    • /
    • pp.659-679
    • /
    • 2015
  • Distributed applications are composed of multiple nodes, which exchange information with individual nodes through message passing. Compared with traditional applications, distributed applications have more complex behavior patterns because a large number of interactions and concurrent behaviors exist among their distributed nodes. Thus, it is difficult to detect anomalous behaviors and determine the location and scope of abnormal nodes, and some attacks and misuse cannot be detected. To address this problem, we introduce a method for detecting anomalous behaviors based on process algebra. We specify the architecture of the behavior detection model and the detection algorithm. The anomalous behavior detection and analysis demonstrate that our method is a good discriminator between normal and anomalous behavior characteristics of distributed applications. Performance evaluation shows that the proposed method enhances efficiency without security degradation.

Anomaly Intrusion Detection using Neuro-Fuzzy (Neuro-Fuzzy를 애용한 이상 침입 탐지)

  • 김도윤;서재현
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.1
    • /
    • pp.37-43
    • /
    • 2004
  • Expasion of computer network and rapid growth of Internet have made computer security very important. As one of the ways to deal with security risk, much research has been made on Intrusion Detection System(IDS). The paper, also, addresses the issue of intrusion detection, but especially with Neuro-Fuzzy model. By applying the fuzzy logic which is known to deal with uncertainty to Anomaly Intrusion, it not only overcomes the difficulty of Misuse Intrusion, but also ultimately aims to detect the intrusions yet to be known.

  • PDF

The Effect of a Portable Voice Feedback Device on the Hyperfunctional Voice Behaviors of Children with Vocal Nodules (휴대용 음성 피드백 도구의 사용이 과기능적 음성 행동의 발생 빈도에 미치는 영향)

  • Lee, Moo-Kyung
    • Phonetics and Speech Sciences
    • /
    • v.1 no.2
    • /
    • pp.31-36
    • /
    • 2009
  • This study attempted to examine the effects of a portable voice feedback device on the hyperfunctional voice behaviors of children with vocal nodules when they wore the device in their daily lives. The device could set fundamental frequency and intensity at optimal levels for the subjects, It produces an audible alarm for inappropriate hyperfunctional voices beyond the preset levels, In addition, the frequency of hyperfunctional voice behaviors was recorded by the device, therefore the users were able to chart their number of hyperfunctional voice behaviors per day, According to results acquired after having subjects wear the device for 12 weeks, the subjects' frequency of hyperfunctional voice behaviors decreased significantly (p < .01). Especially from the first to fourth week, the frequency of their hyperfunctional voice behaviors declined significantly.

  • PDF