The process of tracking suspicious behavior manually on a system and gathering evidence are labor-intensive, variable, and experience-dependent. The system logs are the most important sources for evidences in this process. However, in the Microsoft Windows operating system, the action events are irregular and the log structure is difficult to audit. In this paper, we propose a model that overcomes these problems and efficiently analyzes Microsoft Windows logs. The proposed model extracts lists of both common and key events from the Microsoft Windows logs to determine detailed actions. In addition, we show an approach based on the proposed model applied to track illegal file access. The proposed approach employs three-step tracking templates using Elastic Stack as well as key-event, common-event lists and identify event lists, which enables visualization of the data for analysis. Using the three-step model, analysts can adjust the depth of their analysis.
This paper defines the Safety Management System (SMS) based on the rail safety act and surveys the status of the English rail SMS and International Civil Aviation Organization (ICAO) SMS and OHSAS18001 SMS. Through the analysis of the domestic rail operators' safety management regulations and the results of the universal rail safety audit, the status and problems of domestic rail operators' SMS are investigated and the improvement scheme are derived. First, to establish the continual improvement system for SMS, the instruction which describe the detailed continual improvement method for each steps of SMS including management review by CEO shall be established. Second, to settle the risk management based SMS, converting the rail operators mind and establishing the supply system of safety risk operating model and basic data for the risk analysis and safety evaluation and including the precise requirement for the risk management in the related instruction should be conducted.
Kim, Sang-Youp;Choi, Jai-Sung;Lee, Soo-Beom;Kim, Seong-Min;Cho, Won-Bum;Kim, Yong-Seok
International Journal of Highway Engineering
/
v.13
no.1
/
pp.97-105
/
2011
This paper presents how one can investigate the effects on crash occurrence of freeway geometric design elements including the horizontal, vertical alignment and road environment. At present, the available research results for the most part involve geometric data analysis that are obtained along a relatively long section of freeway, and, because of the long section's diverse geometric conditions, the results tend to miss the specific local geometric impacts on vehicle crashes. In this regard, this research attempts to establish vehicle crash models based on a set of freeway geometric patterns whose crash generating characteristics are identical because they are homogeneous in terms of producing the same vehicle operating speeds, and subsequently their actual relationships are described by providing statistical analysis made in this research. Also each standard is comprised of part of straight, curve and continuous curve. This research has revealed that each type of model has different relation between accident and geometry structure. This research results should be useful for doing more reasonable highway designs and safety audit analysis.
This study was conducted to find out the proper ways of implementation of Hazard Analysis Critical Control Point (HACCP) concepts applicable to the current Korean food inspection system. The following recommendations are based on an in-depth review of the Canadian Food Safety Enhancement Program (FSEP), which is one of the leading HACCP programs adapted to the food industry. Since 1997, the HACCP system has been voluntarily applied to meat processing plants in Korea in accordance with the Food Protection Law. But the guidelines are obscure and inadequate to expand to the diversity of food plants, and are therefore only applied to a limited number of plants of small scale enterprise. For these reasons, it is necessary to prepare an enhanced food safety control program focused not only on the HACCP plants but also on the non-HACCP plants. The national program should be the fundamental framework of a food safety control policy enforced by all the relevant authorities. The Prerequiste Program of Canadian Food Inspection Agency and Sanitation Standard Operating Procedures (SSOP) of FSIS are good example programs for the non-HACCP plants. These programs, which are a major part of the HACCP system, could easily be adapted to the Korean food industry. To improve the current HACCP implementation guideline, it is necessary to develop a detailed implementation manual, generic HACCP model, training program, and an audit program.
The existing enterprise information security activities were centered on the information security organization, and the top management considers information security and enterprise management to be separate. However, various kinds of security incidents are constantly occurring. In order to cope with such incidents, it is necessary to protect information in terms of business management, not just information security organization. In this study, we examine the existing corporate governance and IT governance, and present an information security governance model that can reflect the business goals of the enterprise and the goals of the management. The information security governance model proposed in this paper induces the participation of top management from the planning stage and establishes information security goals. We can strengthen information security activities by establishing an information security plan, establishing and operating an information security system, and reporting the results to top management through compliance audit, vulnerability analysis and risk management.
Financial ratios are key indicators of an organization's financial and business conditions. Among various financial indicators, profitability, financial structure, financial activity and liquidity ratios are frequently used and analyzed. Using the structural equation modeling(SEM) technique, this study examines the structural causal relationships among key financial indicators. Data for this study are taken from complete financial statements from 142 hospitals that passed the standardization audit undertaken by the Korean Hospital Association from 1998 to 2001 for the purpose of accrediting teaching hospitals. In order to improve comparability, ratio values are standardized using the Blom's normal distribution. The final model of the SEM has four latent constructs: financial activity(total asset turnover, fixed asset turnover), liquidity(current ratio, quick ratio, collection period), financial structure(total debt to equity, long-term debt to equity, fixed assets to fund balance), and profitability(return on assets, normal profit to total assets, operating margin to gross revenue, normal profit to gross revenue). While examining several model fit indices(Chi-square (df) = 178.661 (40), likelihood ratio=4.467, RMR=.11, GFI=.849, RMSEA=.157), the final SEM we employed shows a relatively good fit. After examining the path coefficient of the constructs, the financial structure of the hospital affects the hospital's profitability in a statistically significant way. A hospital which utilizes its liabilities, more specifically fixed liabilities, and makes a stable investment decision for fixed assets was found to have a higher profitability than other hospitals. Then, the standard path coefficients were examined to directly compare the influence of variables. It was found that there were no statistically significant path coefficients among constructs. When it comes to variables, however, statistically significant relationships were found. between. financial activity and. fixed. asset turnover, and between profitability and normal profit to gross revenue. These results show that the observed variables of fixed asset turnover and normal profit to gross revenue can be used as indicators representing financial activity and profitability.
Globally researchers at medical institutions are actively sharing COHORT data of patients to develop vaccines and treatments to overcome the COVID-19 crisis. OMOP-CDM, a common data model that efficiently shares medical data research independently operated by individual medical institutions has patient personal information (e.g. PII, PHI). Although PII and PHI are managed and shared indistinguishably through de-identification or anonymization in medical institutions they could not be guaranteed at 100% by complete de-identification and anonymization. For this reason the security of the OMOP-CDM database is important but there is no detailed and specific OMOP-CDM security inspection tool so risk mitigation measures are being taken with a general security inspection tool. This study intends to study and present a model for implementing a tool to check the security vulnerability of OMOP-CDM by analyzing the security guidelines for the US database and security controls of the personal information protection of the NIST. Additionally it intends to verify the implementation feasibility by real field demonstration in an actual 3 hospitals environment. As a result of checking the security status of the test server and the CDM database of the three hospitals in operation, most of the database audit and encryption functions were found to be insufficient. Based on these inspection results it was applied to the optimization study of the complex and time-consuming CDM CSF developed in the "Development of Security Framework Required for CDM-based Distributed Research" task of the Korea Health Industry Promotion Agency. According to several recent newspaper articles, Ramsomware attacks on financially large hospitals are intensifying. Organizations that are currently operating or will operate CDM databases need to install database audits(proofing) and encryption (data protection) that are not provided by the OMOP-CDM database template to prevent attackers from compromising.
This paper presents a research result that was performed to develop a more accurate freeway crash prediction model than existing models. While the existing crash models only focus on developing crash relationships associated with highway geometric conditions found on a short section of a crash site, this research applies a different approach considering the upstream highway geometric conditions as well. Theoretically, crashes occur while motorists are in motion, and particularly at freeways vehicle speed at one specific point is very sensitive to upstream geometric conditions. Therefore, this is a reasonable approach. To form the analysis data base, this research gathers the geometric conditions of the West Seaside Freeway 269.3 km and six years crash data ranging 2003-2008 for these freeway sections. As a result, it is found that crashes fit well into Negative Binomial Distribution, and, based on the developed model, total number of crashes is inversely proportional to highway curve length and radius. Contrarily, crash occurrences are proportional to tangent length. This result is different from existing crash study results, and it seems to be resulted from this research assumption that a crash is influenced greatly by upstream geometric conditions. Also, this research provides the expected effects on crash occurrences of the length of downgrade sections, speed camera placements, and the on- and off- ramp presences. It is expected that this research result is useful for doing more reasonable highway designs and safety audit analysis, and applying the same research approach to national roads and other major roads in urban areas is recommended.
Park, Bumsoo;Yoon, Hyo Jik;Hong, Yong Seok;Kim, Sung Pyo
Journal of Korean Society on Water Environment
/
v.36
no.6
/
pp.546-558
/
2020
While industrialization has provided in abundance, the pollution it creates has caused untold damage to the environment, increasing the frequency and severity of natural disasters through changes in global climate patterns. The World Risk Forum's (WEF) World Risk Report presented the results of a survey of experts from around the world detailing the most influential risk factors over the next decade. Notably, the failure to respond to climate change ranked first and the global water crisis third. The extreme drought in the western Chungnam province was unexpected in 2016. At the time, the water level of Boryeong Dam was drastically decreased due to receiving less than half the average recorded rainfall in the region that year. The Boryeong Dam diversion pipeline has the capacity to solve the water shortage problem between these two regions by providing water from Geumgang to the western part of Chungnam, including Boryeong City. Current weather trends suggest drought is likely to continue in western Chungnam, which uses the Boryeong Dam as an intake source. This makes it necessary to operate Boryeong Dam diversion pipeline in an efficient and effective manner. SWAT is a watershed scale model developed to predict the impact of land management practices on water. The SWAT model was used in this study to evaluate the adequacy of the Boryeong Dam diversion pipeline operational plan by comparing it to present Boryeong Dam diversion pipeline operation. By investigating the number of days required to reach each reservoir stage, we determined that the number of days required to reach the boundary stage was less than that of the current operation. This determination accounts for the caveats that the Boryeong Dam waterway was not operated and only one pump will be operated from October to May of next year. As our results suggest, the most stable operation scenario is to operate two pumps at all times. This can be accomplished by operating two pumps from the caution stage to increase the number of pumps whenever the stage is raised. In addition to the stable operation of the Boryeong Dam pipeline, policy considerations are required with regard to imposing a water use charge on users of the Boryeong Dam region.
Purpose - This study conducted empirical research on non-financial corporations listed on the stock exchange from 2001 to 2010, focusing on the effects of corporate governance on real earnings management of corporations. In particular, this study examined primarily the impact of the largest shareholder who could use earnings management to pursue his own self-interest, and foreign investors who played a checking role against the largest shareholders. The study also reviewed the relationship between corporate governance and earnings management while also considering corporate growth. Research design, data, and methodology - As for the measurements of real earnings management, abnormal operating cash flow and abnormal production cost were utilized. As for the independent variables, share ratio of the largest shareholder and affiliate person (M) and share ratio of foreign investors (FT) were leveraged. This study excluded those organizations that had changed their fiscal years, those that had not submitted an audit report, corporations under supervision, delisted corporations, corporations that had changed their business type, and so on, from the non-financial corporations out of the publicly traded corporations whose fiscal year ended in December from 2001 to 2010 in addition, KIS values were utilized for the corporate financial data in the study. To verify whether management structure and growth had an impact on real earnings management of a corporation through empirical analysis, a multiple regression analysis model was applied. Result - First, as a result of the analysis, the share ratio (M) of the largest shareholder and affiliate person was found to have a significant positive correlation with abnormal cash flow from operations(ACF) and abnormal production cost (APD). When controlling the growth, the share ratio (M) of the largest shareholder and affiliate person was found to have an insignificant correlation with abnormal cash flow from operations(ACF) but a significant correlation with abnormal production cost (APD). Second, foreign ownership (FT) was found to have a significant positive correlation with abnormal cash flow from operations(ACF) and abnormal production cost (APD) at the confidence level of 1 percent when not including the growth dummy. When controlling the growth, foreign ownership (FT) was found to have a significant negative correlation with abnormal cash flow from operations (ACF) and with abnormal production cost (APD). Conclusion - The results imply that the largest shareholder is closely related to earnings management through real activities regardless of corporate growth. It is also possible to determine from these results that foreign investors are related to earnings management through real activities when not considering corporate growth, but that they would reduce earnings management in the case of considering the growth. Thus, this study verified along with the existing studies that foreign investors were conducting the control function on controlling shareholders.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.