• Title/Summary/Keyword: risk access

Search Result 382, Processing Time 0.029 seconds

A Study on Computer Security and Controls (Computer Security에 관한 소고 - 사고범죄예방을 중심으로 -)

  • 이종철
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.4 no.4
    • /
    • pp.25-34
    • /
    • 1981
  • Recently there has been a marked increase in concern for security in computerized operations. The purposes of computer security controls are to protect against the unauthorized access to and modification of data processing resources, unauthorised access to and modification of data files and software, and the misuse of authorized activities. The controls relate to the physical security of the data processing department and of the areas within the data processing department : to the security of the data files, programs, and system software : and to the human interaction with the data files, programs, and system software. The controls that will be discussed in this paper include : I. Risk on the computer use. II. Methods of risk counter measure. III. Role of system auditing.

  • PDF

Prevalence and Risk Factors of Unmet Healthcare Needs among Korean Adults with Hypertension (한국인 고혈압 환자의 의료접근성 및 미 충족 의료실태와 위험요인 분석)

  • Oh, Heeyoung;Gil, Eunha
    • Korean Journal of Adult Nursing
    • /
    • v.29 no.1
    • /
    • pp.22-31
    • /
    • 2017
  • Purpose: The purposes of this secondary analysis study was to examine prevalence, risk factors and unmet healthcare needs among adults with hypertension. Methods: A sample of 3,386 adults over the age of 40 with hypertension were drawn from the Korea Health Panel Study (2013). Using SPSS 22.0 version, descriptive statistics including frequency, percentage, chi-square and logistic regression were performed. Results: Results showed that 18.9% of the sample reported unmet healthcare needs with the most frequently cited one was financial burdens (43.2%). The reported experiences of unmet healthcare needs differed by gender, marital status, vision or hearing impairment, memory problem, impaired mobility, subjective health status, total family income, depressive episode and the difficulty in making decisions. The sample participants were more likely to report unmet healthcare if they had vision impairment, low income and perception that their health status as moderate to poor. Those without vision impairment were less likely to report unmet healthcare needs. Conclusion: The identified risk factors of unmet healthcare needs should be addressed which would enhance access both to health care and to resolution of unmet healthcare needs. Since visual ability seems to impact perception of unmet healthcare needs, it may be useful to find ways to address this factor.

Review of Programs for Improving Patient's Access to Medicines (의약품 접근성 향상을 위한 방안 고찰)

  • Kim, EuGene;Kim, Younhee
    • Korean Journal of Clinical Pharmacy
    • /
    • v.28 no.1
    • /
    • pp.40-50
    • /
    • 2018
  • Objective: This study presented the analysis period, the complexity of combined therapy and comparator choice as the key limitations in the economic evaluation of new drugs, and discussed programs for coping with these limitations. Methods: This study evaluated the post-evaluation, risk-sharing agreement, extra funding program, and flexible incremental cost-effectiveness ratio (ICER) threshold as actions or programs that would increase accessibility to costly new drugs. The study also presented the cases of other countries. The application of the post-evaluation was considered to deal with high uncertainty regarding new drugs. Results: The risk-sharing agreement was introduced in European countries as well as South Korea and has been responsible for the shift from using the financial schemes to outcome-based schemes. The drug funding program has had troubled in securing stable extra funds. The application of higher ICER in the economic evaluation of expensive and innovative oncology drugs was criticized because of the inequity between oncology patients and patients with other diseases. Conclusion: Therefore, introducing and applying actions that would increase the accessibility to costly new drugs in South Korea have been deemed necessary after careful reviews and discussions with various stakeholders (insurer, policy makers, pharmaceutical companies and patients).

Pterional or Subfrontal Access for Proximal Vascular Control in Anterior Interhemispheric Approach for Ruptured Pericallosal Artery Aneurysms at Risk of Premature Rupture

  • Park, Jaechan
    • Journal of Korean Neurosurgical Society
    • /
    • v.60 no.2
    • /
    • pp.250-256
    • /
    • 2017
  • Objective : Cases of a ruptured pericallosal artery aneurysm with a high risk of intraoperative premature rupture and technical difficulties for proximal vascular control require a technique for the early and safe establishment of proximal vascular control. Methods : A combined pterional or subfrontal approach exposes the bilateral A1 segments or the origin of the ipsilateral A2 segment of the anterior cerebral artery (ACA) for proximal vascular control. Proximal control far from the ruptured aneurysm facilitates tentative clipping of the rupture point of the aneurysm without a catastrophic premature rupture. The proximal control is then switched to the pericallosal artery just proximal to the aneurysm and its intermittent clipping facilitates complete aneurysm dissection and neck clipping. Results : Three such cases are reported : a ruptured pericallosal artery aneurysm with a contained leak of the contrast from the proximal side of the aneurysm, a low-lying ruptured pericallosal artery aneurysm with irregularities on its proximal wall, and a multilobulated ruptured pericallosal artery aneurysm with the parasagittal bridging veins hindering surgical access to the proximal parent artery. In each case, the proposed combined pterional-interhemispheric or subfrontal-interhemispheric approach was successfully performed to establish proximal vascular control far from the ruptured aneurysm and facilitated aneurysm clipping via the interhemispheric approach. Conclusion : When using an anterior interhemispheric approach for a ruptured pericallosal artery aneurysm with a high risk of premature rupture, a pterional or subfrontal approach can be combined to establish early proximal vascular control at the bilateral A1 segments or the origin of the A2 segment.

Economic Justification of the Internet Access Management (인터넷 차단 시스템의 경제성 분석에 대한 연구)

  • Kim, Sang-Kyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.6 s.38
    • /
    • pp.269-278
    • /
    • 2005
  • To justify the economic impacts of the internet access management is a purpose of this paper. Previous researches on economic justification were reviewed and the internet access management system. sniffer, and firewall were implemented to monitor real-time sessions and to record blocked attempts. This paper suggests the impact factors and measurement methods to justify the economic values of the internet access management system. Finally, this paper Proves that the overall impacts of the internet access management system have a Positive value because filtering mechanisms cause users to lose a small number of URLs including useful information and to diminish refreshment but save users from various risk points and enhance labor productivity.

  • PDF

Information for Urban Risk Management: the Role of Remote and Close Sensing

  • Hofstee, Paul;Genderen, John van
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.162-164
    • /
    • 2003
  • The multi-disciplinary research project Strengthening Local Authorities in Risk Management (SLARIM), initiated by ITC, includes three case study cities in Asia. An important question is: what are the essential data for risk management and how to access such data. The role of common sources (e.g. census data), data derived from remote sensing (high-resolution satellite imagery, aerial photos), and data from close sensing (field observation, including mobile GIS) to acquire essential risk management data will be discussed. Special attention is given to the question of the minimum area and to disaggregating population data. A few examples are given of Kathmandu / Lalitpur, Nepal.

  • PDF

Continuous-authentication Method based on the Risk Profile associated with Context-awareness to Lock Smart Devices (스마트 기기 잠금을 위한 상황인지 위험도기반의 지속인증기법)

  • Kim, Jihwan;Lee, Younho
    • Journal of KIISE
    • /
    • v.43 no.11
    • /
    • pp.1259-1269
    • /
    • 2016
  • In order to block the access of the information in the smartphone of a user by other users, it is checked if the current user is the owner or not in the smartphone authentication process, whenever a user begins to use a smartphone. This makes smartphone users in front of frequent smartphone authentications, which leads significant inconvenience to them. Because of such inconvenience, users tend not to use the smartphone authentication anymore. Finally, their smartphones become very vulnerable against malicious access. This paper proposes a progressive authentication method on the android-platform in order to solve the problem described above. With the proposed method, smartphones can identify relevant risks based on users' past experiences and determine whether an authentication is needed. Because authentication occurs only when the identified risk level is high, it can achieve both a high-level of security in the high-level risk situation and user convenience in the low-level risk situation.

Development of Security Metric of Network Access Control (네트워크 접근제어 시스템의 보안성 메트릭 개발)

  • Lee, Ha-Yong;Yang, Hyo-Sik
    • Journal of Digital Convergence
    • /
    • v.15 no.6
    • /
    • pp.219-227
    • /
    • 2017
  • Network access control should be able to effectively block security threats to the IT infrastructure, such as unauthorized access of unauthorized users and terminals, and illegal access of employees to internal servers. From this perspective, it is necessary to build metrics based on relevant standards to ensure that security is being met. Therefore, it is necessary to organize the method for security evaluation of NAC according to the related standards. Therefore, this study builds a model that combines the security evaluation part of ISO / IEC 15408 (CC: Common Criteria) and ISO 25000 series to develop security metric of network access control system. For this purpose, we analyzed the quality requirements of the network access control system and developed the convergence evaluation metric for security of the two international standards. It can be applied to standardization of evaluation method for network access control system in the future by constructing evaluation model of security quality level of network access control system.

A Study on Stabilization of the Collapsed Slope due to Gyeongju Earthquake at Seokguram Access Road based on Geological Investigation (지질학적 조사를 바탕으로 한 경주지진으로 붕괴된 석굴암 진입도로 비탈면의 안정성 평가에 관한 연구)

  • Kim, Seung-Hyun;Lee, Kwang-Wu
    • Journal of the Korean Geosynthetics Society
    • /
    • v.18 no.4
    • /
    • pp.225-242
    • /
    • 2019
  • Rockfall failure at the access road to Seokguram were occurred due to the earthquake on September 12, 2016. A detailed investigation was carried out in order to find out the cause of the rockfall, to identify the risk of the entire sites, and to prepare proper countermeasure methods and mitigation. We checked for geological and topographical characteristics of overall slopes alongside the access road to Seokguram and made a face map. In addition, we analyzed topographical factors caused by the earthquake through calculating a degree of slope, degree of bearing, upslope contributing area, and wetness index with the use of shading relief map. As a result, we confirmed that the large rockfall occurred with a weak section. In this study, we also evaluated the overall slope stability of the entire access road to Seokguram in order to classify it into danger and caution zones depending on the risk of collapse.

Study on the Relationship between Health Risk Behaviors of Rural Residents by Regional Scale (지역 규모에 따른 농촌주민의 건강위험행동 관계 연구)

  • Seungyeon Cho
    • Journal of agricultural medicine and community health
    • /
    • v.49 no.2
    • /
    • pp.111-120
    • /
    • 2024
  • Objective: This study aimed to analyze the correlation between factors affecting health risk behaviors of rural residents according to regional scale. Methods: Restricted-access data from the 2016~2021 Korea National Health and Nutrition Examination Survey and the multivariate probit model were used. As for health risk behaviors, smoking, drinking, lack of aerobic exercise, low level of healthy eating index, unvaccination, and non-participation in health examination were considered. Results: Controlling for individuals' socio-demographic characteristics, in general, correlation coefficients between unobservable factors affecting health risk behaviors were significant. However, the magnitude and statistical significance of the correlation coefficients varied by regional scale (dong/eup/myeon). This suggests that rural residents engage in health risk behaviors due to their different characteristics compared with urban dwellers, which also varies by whether residents are located in eup or myeon area. Conclusion: It is necessary to differentiate health care services between urban and rural areas in terms of type of service and programs based on the relationship between unobservable factors affecting each type of health risk behaviors.