KSII Transactions on Internet and Information Systems (TIIS)
/
v.11
no.2
/
pp.959-981
/
2017
Existing Android malware detection approaches mostly have concentrated on superficial features such as requested or used permissions, which can't reflect the essential differences between benign apps and malware. In this paper, we propose a quantitative calculation model of application risks based on the key observation that the essential differences between benign apps and malware actually lie in the way how permissions are used, or rather the way how their corresponding permission methods are used. Specifically, we employ a fine-grained analysis on Android application risks. We firstly classify application risks into five specific categories and then introduce comprehensive risk, which is computed based on the former five, to describe the overall risk of an application. Given that users' risk preference and risk-bearing ability are naturally fuzzy, we design and implement a fuzzy logic system to calculate the comprehensive risk. On the basis of the quantitative calculation model, we propose a risk classification based approach for Android malware detection. The experiments show that our approach can achieve high accuracy with a low false positive rate using the RandomForest algorithm.
The Journal of The Korea Institute of Intelligent Transport Systems
/
v.11
no.2
/
pp.67-76
/
2012
In this study, we established objective appraisal standard by applying newly made appraisal standard to those areas equipped with the protection system targeted to the Mobility handicapped announced in this edition (issue 5, volume 9(Oct., 2010)) beyond simple evaluation related to protector satisfaction. Additionally, we achieved efficient budget execution by conducting the preliminary estimation assessment regarding those areas on which recognition devices should be newly deployed. Through the assessment of the system coordination, the maximum safety distance is proved to be 72.2m. On the basis of this result, we applied dangerous grade to the deployment of recognition devices considering both psychological and accidental risk. With this, we proposed valuation basis to enable us to do future business. Based on this assessment standard, the degree of risk is proved to decrease by 35.2% compared to before conducting the demonstration project in terms of evaluation of comprehensive risk regarding intended areas. Additionally, we confirmed the fact that the degree of risk can decrease by 33.1% totally after having recognition devices built according to the deployment standard within budget. Furthermore, comprehensive risk can decrease up to 94% compared to the level of the demonstration project even though we spend 21.9% less of the existing budget. Hence, we can say that the deployment method of recognition devices related to the degree of risk is applied efficiently in the near future in terms of controlling comprehensive risk and cutting down budget through this study.
Given the further promotion of economic globalization, China's financial market has also expanded. However, at present, this market faces substantial risks. The main financial and economic risks in China are in the areas of policy, credit, exchange rates, accounting, and interest rates. The current status of China's financial market is as follows: insufficient attention from upper management; insufficient innovation in the development of the financial economy; and lack of a sound financial and economic risk protection system. To further understand the current situation of China's financial market, we conducted a questionnaire survey on the financial market and reached the following conclusions. A comprehensive enterprise questionnaire from the government's perspective, the enterprise's perspective and the individual's perspective showed that the following problems exist in the financial and economic risk prevention aspects of big data and Internet of Things in China. The political system at the country's grassroots level is not comprehensive enough. The legal regulatory system is not comprehensive enough, leading to serious incidents of loan fraud. The top management of enterprises does not pay enough attention to financial risk prevention. Therefore, we constructed a financial and economic risk prevention model based on big data and Internet of Things that has effective preventive capabilities for both enterprises and individuals. The concept reflected in the model is to obtain data through Internet of Things, use big data for screening, and then pass these data to the big data analysis system at the grassroots level for analysis. The data initially screened as big data are analyzed in depth, and we obtain the original data that can be used to make decisions. Finally, we put forward the corresponding opinions, and their main contents represent the following points: the key is to build a sound national financial and economic risk prevention and assessment system, the guarantee is to strengthen the supervision of national financial risks, and the purpose is to promote the marketization of financial interest rates.
Ha, Min-woo;Cho, Yu-jin;Son, Seok-hyun;Han, Seung-woo
Proceedings of the Korean Institute of Building Construction Conference
/
2020.11a
/
pp.69-70
/
2020
Accidents in the construction industry are very high compared to other industries, and the number is also increasing steeply every year. Relevant studies were limited for solving the problems. The purpose of this study is to develop a comprehensive risk prediction process for personnel deployed at construction sites on safety management. First of all, the variables were divided into fixed, real-time and working types variables, and the relevant comprehensive data were collected. Second, the probability of a disaster was derived based on the collected data, and weights for each variable were calculated using the dummy regression analysis method using statistical methodology. Lastly, the resulting weighting and disaster probability equation was constructed, and The Final Risk Calculation Formula was developed. The Final Risk Calculation Formula presented in this study is expected to have a significant impact on the establishment of effective safety management measures to prevent possible safety accidents at construction sites
Water inrush and mud outburst always restricts the tunnel constructions in mountain area, which becomes a major geological barrier against the development of underground engineering. In view of the complex disaster-causing mechanism and difficult quantitative predictions of water inrush and mud outburst, several theoretical methods are adopted to realize dynamic assessment of water inrush in the progressive process of tunnel construction. Concerning both the geological condition and construction situation, eleven risk factors are quantitatively described and an assessment system is developed to evaluate the water inrush risk. In the static assessment, the weights of eight risk factors about the geological condition are determined using Analytic Hierarchy Process (AHP). Each factor is scored by experts and the synthesis scores are weighted. The risk level is ultimately determined based on the scoring outcome which is derived from the sum of products of weights and comprehensive scores. In the secondary assessment, the eight risk factors in static assessment and three factors about construction situation are quantitatively analyzed using fuzzy evaluation method. Subordinate levels and weight of factors are prepared and then used to calculate the comprehensive subordinate degree and risk level. In the dynamic assessment, the classical field of the eleven risk factors is normalized by using the extension evaluation method. From the input of the matter-element, weights of risk factors are determined and correlation analysis is carried out to determine the risk level. This system has been applied to the dynamic assessment of water inrush during construction of the Yuanliangshan tunnel of Yuhuai Railway. The assessment results are consistent with the actual excavation, which verifies the rationality and feasibility of the software. The developed system is believed capable to be back-up and applied for risk assessment of water inrush in the underground engineering construction.
Proceedings of the Korea Database Society Conference
/
2010.06a
/
pp.203-212
/
2010
The mam purpose of this study is to find out how perceived risk elements influence to customers' perceived value and repurchase intention in the electronic commerce environment. To achieve the goal, we set 6 sub-dimensions - privacy risk, social risk, time loss risk, economic risk, psychological risk, and performance risk - based on comprehensive consideration of related studies, and established a research model included 2 factors such as perceived value and repurchase intention to measure performance in internet shopping malls. From 174 customers of the electronic commerce shopping malls survey data have been collected and analyzed based on the covariance structural model method. The results of this study are summarized as follows. Firstly, five perceived risk characteristics of privacy risk, time loss risk, economic risk, psychological risk, and performance risk are significantly positive effect on perceived value. Secondly, perceived value IS very significantly related to repurchase intention in electronic commerce shopping malls. Consequently, we discussed the strategies to create perceived value and repurchase intention in electronic commerce environment. Also we suggested the implications and further research directions.
Purpose: This study was conducted to evaluate effects of a comprehensive lifestyle improvement program for middle-aged women with cardio-cerebrovascular disease (CVD)-related risk factors. Methods: The research adopted a non-equivalent control group pretest-posttest design. The number of participants was 18 in the experimental group and 16 in the control group sampled among middle-aged women who had CVD-related risk factors residing in a community. The experimental group participated in a four-session comprehensive lifestyle promotion program, which consisted of lectures, demonstrations, small-group meetings and telephone-counseling. The effects of the program were evaluated by measuring knowledge, attitude, health behavior, and self-efficacy for CVD prevention. Results: The experimental group showed a significant increase in self-efficacy for CVD prevention compared to the control group. There was no significant increase in knowledge, attitude, and health behavior. Conclusion: The results suggest that the comprehensive lifestyle improvement program was effective in improving self-efficacy for CVD prevention. There is a need to develop more effective lifestyle improvement programs designed to improve knowledge, attitude, and health behavior for CVD prevention. In further research, a follow-up evaluation is also needed to investigate any delayed effects on targeted variables among which no significant differences emerged immediately after the completion of the program.
Hong, Minha;Lee, Kyung-Sook;Park, Jin-Ah;Kang, Ji-Yeon;Shin, Yong Woo;Cho, Young Il;Moon, Duk-Soo;Cho, Seongwoo;Hwangbo, Ram;Lee, Seung Yup;Bahn, Geon Ho
Journal of the Korean Academy of Child and Adolescent Psychiatry
/
v.33
no.1
/
pp.16-23
/
2022
Objectives: Early detection of developmental issues in infants and necessary intervention are important. To identify the comorbid conditions, a comprehensive evaluation is required. The study's objectives were to 1) generate scale items by identifying and eliciting concepts relevant to young children (12-71 months) with developmental delays, 2) develop a comprehensive screening tool for developmental delay and comorbid conditions, and 3) assess the tool's validity and cut-off. Methods: Multidisciplinary experts devised the "Infant Comprehensive Evaluation for Neurodevelopmental Delay (ICEND)," an assessment method that comes in two versions depending on the age of the child: 12-36 months and 37-71 months, through monthly seminars and focused group interviews. The ICEND is composed of three parts: risk factors, resilience factors, and clinical scales. In parts 1 and 2, there were 41 caretakers responded to the questionnaires. Part 3 involved clinicians evaluating ten subscales using 98 and 114 questionnaires for younger and older versions, respectively. The Child Behavior Checklist, Strengths and Difficulties Questionnaire, Infant-Toddler Social Emotional Assessment, and Korean Developmental Screening Test for Infants and Children were employed to analyze concurrent validity with the ICEND. The analyses were performed on both typical and high-risk infants to identify concurrent validity, reliability, and cut-off scores. Results: A total of 296 people participated in the study, with 57 of them being high-risk (19.2%). The Cronbach's alpha was positive (0.533-0.928). In the majority of domains, the ICEND demonstrated a fair discriminatory ability, with a sensitivity of 0.5-0.7 and specificity 0.7-0.9. Conclusion: The ICEND is reliable and valid, indicating its potential as an auxiliary tool for assessing neurodevelopmental delay and comorbid conditions in children aged 12-36 months and 37-71 months.
Chronic postsurgical pain (CPSP) is a multifactorial condition that affects a significant proportion of patients undergoing surgery. The prevention and management of CPSP require the identification of preoperative risk factors to screen high-risk patients and establish appropriate perioperative pain management plans to prevent its development. Active postoperative pain management should be provided to prevent CPSP in patients with severe pain following surgery. These tasks have become important for perioperative team members in the management of CPSP. This review article provides a comprehensive overview of the latest research on the role of perioperative team members in preventing and managing CPSP. Additionally, it highlights practical strategies that can be employed in clinical practice, covering the definition and risk factors for CPSP, including preoperative, intraoperative, and postoperative factors, as well as a risk prediction model. The article also explores various treatments for CPSP, as well as preventive measures, including preemptive analgesia, regional anesthesia, pharmacological interventions, psychoeducational support, and surgical technique modification. This article emphasizes the importance of a comprehensive perioperative pain management plan that includes multidisciplinary interventions, using the transitional pain service as an example. By adopting a multidisciplinary and collaborative approach, perioperative team members can improve patient outcomes, enhance patient satisfaction, and reduce healthcare costs. However, further research is necessary to establish targeted interventions to effectively prevent and manage CPSP.
International conference on construction engineering and project management
/
2009.05a
/
pp.292-301
/
2009
The employment of risk management theory in Urban Disaster Management System (UDMS) has become an important trend in recent years. The viewpoint of risk management is mainly a comprehensive risk assessment of various internal and external factors, and a subsequent handling of risks. Through continuous and systematic accumulation and analysis of risk information, disaster prevention and rescue system is established. Taking risk management theory as the foundation, Organization for Economic Cooperation and Development (OECD) has developed a series of UDMS in the mega-cities all over the world. With this system as a common platform, OECD cooperates with different cities to develop disaster prevention and rescue system consisting of vulnerability assessment methods, risk assessment and countermeasures. The paper refers to the urban disaster vulnerability assessment and risk management of OECD and the mega-cities of different advanced and developed countries in the world, and then constructs a preliminarily drafted structure for the vulnerability assessment methods and risk management mechanism in the metropolitan districts of Taiwan.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.