• 제목/요약/키워드: Internet Incidents

Search Result 99, Processing Time 0.022 seconds

Structural Topic Modeling Analysis of Patient Safety Interest among Health Consumers in Social Media (소셜미디어 내 의료소비자의 환자안전 관심에 대한 구조적 토픽 모델링 분석)

  • Kim, Nari;Lee, Nam-Ju
    • Journal of Korean Academy of Nursing
    • /
    • v.54 no.2
    • /
    • pp.266-278
    • /
    • 2024
  • Purpose: This study aimed to investigate healthcare consumers' interest in patient safety on social media using structural topic modeling (STM) and to identify changes in interest over time. Methods: Analyzing 105,727 posts from Naver news comments, blogs, internet cafés, and Twitter between 2010 and 2022, this study deployed a Python script for data collection and preprocessing. STM analysis was conducted using R, with the documents' publication years serving as metadata to trace the evolution of discussions on patient safety. Results: The analysis identified a total of 13 distinct topics, organized into three primary communities: (1) "Demand for systemic improvement of medical accidents," underscoring the need for legal and regulatory reform to enhance accountability; (2) "Efforts of the government and organizations for safety management," highlighting proactive risk mitigation strategies; and (3) "Medical accidents exposed in the media," reflecting widespread concerns over medical negligence and its repercussions. These findings indicate pervasive concerns regarding medical accountability and transparency among healthcare consumers. Conclusion: The findings emphasize the importance of transparent healthcare policies and practices that openly address patient safety incidents. There is clear advocacy for policy reforms aimed at increasing the accountability and transparency of healthcare providers. Moreover, this study highlights the significance of educational and engagement initiatives involving healthcare consumers in fostering a culture of patient safety. Integrating consumer perspectives into patient safety strategies is crucial for developing a robust safety culture in healthcare.

Efficient Broadcasting Scheme of Emergency Message based on VANET and IP Gateway (VANET과 IP 게이트웨이에 기반한 긴급메시지의 효율적 방송 방법)

  • Kim, Dongwon;Park, Mi-Ryong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.4
    • /
    • pp.31-40
    • /
    • 2016
  • In vehicular ad-hoc networks (VANETs), vehicles sense information on emergency incidents (e.g., accidents, unexpected road conditions, etc.) and propagate this information to following vehicles and a server to share the information. However, this process of emergency message propagation is based on multiple broadcast messages and can lead to broadcast storms. To address this issue, in this work, we use a novel approach to detect the vehicles that are farthest away but within communication range of the transmitting vehicle. Specifically, we discuss a signal-to-noise ratio (SNR)-based linear back-off (SLB) scheme where vehicles implicitly detect their relative locations to the transmitter with respect to the SNR of the received packets. Once the relative locations are detected, nodes that are farther away will set a relatively shorter back-off to prioritize its forwarding process so that other vehicles can suppress their transmissions based on packet overhearing. We evaluate SLB using a realistic simulation environment which consists of a NS-3 VANET simulation environment, a software-based WiFi-IP gateway, and an ITS server operating on a separate machine. Comparisons with other broadcasting-based schemes indicate that SLB successfully propagates emergency messages with latencies and hop counts that is close to the experimental optimal while reducing the number of transmissions by as much as 1/20.

RealTime Personal Video Image Protection on CCTV System using Intelligent IP Camera (지능형 IP 카메라를 이용한 CCTV 시스템에서의 실시간 개인 영상정보 보호)

  • HWANG, GIJIN;PARK, JAEPYO;YANG, SEUNGMIN
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.9
    • /
    • pp.120-125
    • /
    • 2016
  • For the purpose of protecting personal property and lives from incidents, accidents, and threats such as terrorism, video surveillance equipment has been installed and operates in many places. Video surveillance technology has gradually developed into high-quality, high-definition equipment, and a lot of products have been launched. However, closed circuit television (CCTV) equipment for security purposes can invade a person's privacy. In this paper, we propose a way to protect personal video images using meta-data in an intelligent Internet protocol (IP) camera. We designed the system to mask personal video information from meta-data, define the method of image-information access according to user privileges, and show how to utilize the meta-data during storage and recorded data searches. The suggested system complies with guidelines for CCTV installation and operation from Korea's Ministry of the Interior. Installed on only a single server so far, due to the limitations and technical difficulties of hardware performance, it has been difficult to find a method that can be applied to personal image information using real-time protection techniques. Applying the method proposed in this paper can satisfy the guidelines, reduce server costs, and reduce system complexity.

The Problem of Military Sexual Violence by Hierarchy: Focusing on the Contents of Media Articles (위계에 의한 군 성폭력의 문제점 -언론 기사 내용을 중심으로-)

  • Kim, Seon-Nyeo
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.1
    • /
    • pp.85-92
    • /
    • 2022
  • In order to identify the factors and problems in which military sexual violence is a continuous and repeated blind spot, this study conducted a content analysis focusing on articles of military sexual violence incidents covered in Internet news from January 2010 to June 15, 2021. carried out. As a result of the study, structurally unequal power relations, authoritarian and closed military organizational culture, internal military response system that is distrustful of passive responses to sexual violence, and enveloping family-friendly investigations and tolerant punishment of perpetrators are blind spots despite the Ministry of National Defense's efforts to improve. factors that exist. Underlying this, the compensatory spirit caused by the conscription system and the negative effects of the patriarchal system are embodied in the national sentiment, suggesting that the sense of crisis of division and an overly permissive attitude toward the military act as a factor that slows change. As an improvement plan according to the results, it is necessary to entail the establishment of a civilian-centered judicial institution, strong punishment of perpetrators, and limited pension payment, as well as honorable punishment such as 'class demotion' in the military culture with a clear hierarchical relationship. Taken together, we can see that most military sexual violence is caused by a hierarchy, and it strongly suggests that the main cause of sexual violence is unequal power relations.

The Value of Private Information based on Cost-Benefit Analysis Framework: Focusing on Individual Attributes, Dealer Traits, and Circumstantial Properties (비용편익분석 프레임워크를 통한 개인정보가치에 대한 연구: 개인적 특성, 거래 상대방 특성, 상황적 특성을 중심으로)

  • Jaehyun Park;Eunkyung Kweon;Minjung Park;Sangmi Chai
    • Information Systems Review
    • /
    • v.19 no.3
    • /
    • pp.155-177
    • /
    • 2017
  • The purpose of this study is to investigate those factors that are influenced when a user recognizes his/her private information value as an economic asset. The relationship among these factors will also be discussed. This research targets Internet users, and the value of their private information will be converted into economic figures. How economic value changes in relation with individual attributes, dealer's traits, and circumstantial properties will also be studied. The changes in the factors of private information value under different situations will be analyzed from an economic perspective. By using the cost-benefit analysis framework, this work hypothesizes that the user's private information value can be influenced by individual attributes and situational properties. in the business aspect, this study can help users recognize the true value of their personal information and minimize the cost resulting from private information security incidents. This work also highlights the necessity of estimating the scale of investments for protecting private information. Overall, this research will proceed under the hypothesis that the users' recognition of their private information value is influenced by the attributes of the individual, dealers, or situations.

An Analysis of Efficiency of Security Services : A Comparative Determinants Analysis of Public and Private Security (경호업무 효율성에 관한 연구 : 공공경호와 민간경호의 효율성 영향요인의 비교분석)

  • Park, Moon-Sun
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.67-103
    • /
    • 2009
  • Objectives of this study is develop security services through determinants analysis on the efficiency of security works regarding security and guarding business in Korea because nowadays the modern society like Korea let alone all over the world faces the increase of dangerous factors in every security field of the human societies, and also it is the very present situation that an individual's life even the national security itself can be at the risk without guaranteeing the efficiency of the security services. For this purpose, this study reviewed related documents, surveyed and interviewed security personnels to identify what the potentially influential factors are in both the public and private security organizations regarding the efficiency of present security services and organizations, and what differences are. Also, comparing the public and private security sectors, this study intended to suggest policy agendas how to enhance the efficiency of security services in the future. This study surveyed the 177 agents and former agents of the Presidential Security Service(PSS) for the public security sector, and also surveyed, interviewed, and internet-based polled 821 randomly selected personnels for the private security sector. This research showed that regarding the efficiency of the security services number of independent variables which had positive responses in the public security sector was more than that in the private security sector. Among the 21 questions regarding this issue, there were all of 21 positive responses in the public security sector while there were 18 negative responses in the private security sector. As a result of synthesizing all the answers of the both sides, it is possible to understand that mostly the ratio of the positive response was much higher. In the public security service, statistically significant variables were budget support for events, prior access of information, an integrated teamwork training, organizational atmosphere, morale of organization personnel. However, practical training of the security service and mutual communication showed unexpectedly negative(-) signs. In the private security service, statistically significant variables were budget support for events, integrated teamwork training, socially friendly atmosphere, compensation for the personnels, bullet-proof equipments and vehicles, mood of organization, personnel recruit and disposition, unexpected incidents and basic attitude for security services. In sum, while organizational personnel variables and organizational management variables were significant in the public security service, some organizational management variables and all socio-environment variables were statistically significant at 5% significance level.

  • PDF

Korea's Terrorist Environment and Crisis Management Plan (한국의 테러환경과 위기관리 방안)

  • Jang, Sung Jin;Kim, Young-Hyun;Shin, Seung-Cheol
    • Korean Security Journal
    • /
    • no.52
    • /
    • pp.73-91
    • /
    • 2017
  • This study is based on the political and economic standpoint of each country, Use advanced equipment to prevent new terrorism from causing widespread damage, In order to establish a countermeasures against terrorism in accordance with the reality of Korea, which is effective in responding to terrorist attacks, Korea conducted a SWOT analysis of the terrorist environment and terrorist environment through specialists. First, internal strengths of Korea 's terrorist environment include stable security situation, weakness of religious and ethnic conflicts, strong regulation and control of firearms, and counter terrorism capabilities and know - how accumulated during major international events. Second, the internal weaknesses of the terrorist environment in Korea include the insecurity of the people, the instability caused by the military confrontation with North Korea, the absence of anti-terrorism law system, the difficulty of terrorism control and management by the development of the Internet and IT technology. Third, the external opportunities for Korea 's terrorist environment are as follows: ease of supplementation and learning through cases of foreign terrorism failure, ease of increase of terrorist budget and support with higher terrorism issues, strengthening of counterterrorism through military cooperation with allied nationsRespectively. Fourth, the external threats to the terrorist environment in Korea are the increase of social dissatisfaction due to the continuous influx of defectors and foreign workers, the goal of terrorism from international terrorist organizations through alliance with the United States,Increased frequency of incidents, and increased IS coverage of terrorism around the world. In addition, the SWOT in - depth interviews on the terrorist environment of the expert group were conducted to diagnose and analyze the problems, terrorism awareness and legal system in the Korean terror environment. The results of the study are summarized as follows.First, the basic law on terrorism should be enacted.Second, the establishment of an integrated anti-terrorism organization.Third, securing and nurturing specialized personnel in response to terrorism.

  • PDF

Design and Implementation of a Web Application Firewall with Multi-layered Web Filter (다중 계층 웹 필터를 사용하는 웹 애플리케이션 방화벽의 설계 및 구현)

  • Jang, Sung-Min;Won, Yoo-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.12
    • /
    • pp.157-167
    • /
    • 2009
  • Recently, the leakage of confidential information and personal information is taking place on the Internet more frequently than ever before. Most of such online security incidents are caused by attacks on vulnerabilities in web applications developed carelessly. It is impossible to detect an attack on a web application with existing firewalls and intrusion detection systems. Besides, the signature-based detection has a limited capability in detecting new threats. Therefore, many researches concerning the method to detect attacks on web applications are employing anomaly-based detection methods that use the web traffic analysis. Much research about anomaly-based detection through the normal web traffic analysis focus on three problems - the method to accurately analyze given web traffic, system performance needed for inspecting application payload of the packet required to detect attack on application layer and the maintenance and costs of lots of network security devices newly installed. The UTM(Unified Threat Management) system, a suggested solution for the problem, had a goal of resolving all of security problems at a time, but is not being widely used due to its low efficiency and high costs. Besides, the web filter that performs one of the functions of the UTM system, can not adequately detect a variety of recent sophisticated attacks on web applications. In order to resolve such problems, studies are being carried out on the web application firewall to introduce a new network security system. As such studies focus on speeding up packet processing by depending on high-priced hardware, the costs to deploy a web application firewall are rising. In addition, the current anomaly-based detection technologies that do not take into account the characteristics of the web application is causing lots of false positives and false negatives. In order to reduce false positives and false negatives, this study suggested a realtime anomaly detection method based on the analysis of the length of parameter value contained in the web client's request. In addition, it designed and suggested a WAF(Web Application Firewall) that can be applied to a low-priced system or legacy system to process application data without the help of an exclusive hardware. Furthermore, it suggested a method to resolve sluggish performance attributed to copying packets into application area for application data processing, Consequently, this study provide to deploy an effective web application firewall at a low cost at the moment when the deployment of an additional security system was considered burdened due to lots of network security systems currently used.

A Study on the Function of Oral Medicine as the Secondary Clinic Based on Analysis on Admissive Channel and Case Features (내원경위 분석과 환자 특성 평가에 따른 2차 진료기관으로서 구강내과 역할에 대한 연구)

  • Lee, You-Mee;Lee, Jung-Hyun;Lim, Hyun-Dae
    • Journal of Oral Medicine and Pain
    • /
    • v.31 no.3
    • /
    • pp.199-210
    • /
    • 2006
  • The epidemiological researches on the inpatients hospitalized at the oral medicine ward have been continuously carried out since 1970, and most researches have been performed by centering around the oral medicine wards of college hospitals. Numerous specialists have been produced after the establishment of oral medicine, and they have been active in various fields. As dental clinics have gotten bigger, the function of oral medicine in the secondary clinics is being brought out. As admissive channel, case features, case composition and otherwise have not been researched for a long time, the related researches should be carried out from now on. Hereupon, this study was carried out by targeting the 100 inpatients hospitalized at the oral medicine ward of Sun Hospital located in Daejeon Korea, through questionnaire. As the result, the following results were derived. 1. The ages of the inpatients in Sun Hospital were $29.21{\pm}11.31$ on the average; 71 females' mean average was $29.63{\pm}11.29$ and 29 males' mean average was $28.17{\pm}11.48$. In regard of school career, the patients who finished high-school course or higher accounted for 78%; the patients' school career seemed to be relatively high. The patients who complained of temporomandibular pain accounted for the highest proportion with 65%. In motivation to visit this hospital, internet surfing was 11%, mass media was 10%, acquaintance's introduction was 38%. The patients, who were hospitalized at another hospital due to the same symptom, accounted for 56%. The dental clinics, which made the patients visit this hospital, accounted for 20%. The patients, who were previously aware that the present symptom should be treated by oral medicine, accounted for 38%. The patients, who were not aware of the fact in advance, were 62%. The respondents of 51% answered that they were aware of the fact one month or below before hospitalization. 2. The patients, who complained of craniocervical ache, accounted for 58%; the patients, whose ache aches affect dailylife, were 22%. Continuous ache was 14% and intermittent ache was 68%, and dull pain was 23%. 3. Life variations were compared with each other by using SRRS (Social Readjustment Rating Scale). In consequence, the variation within 3 years indicated a significant difference in the both groups but the variation within 6 months did not indicate any differences. 4. In regard of the questionnaire on the incidents happened for a week, the ache-group was compared with the group free from the ache. As the result, the number of strain arisen for a week, the decrease of favorite works and sudden fear indicated a significant difference. Pleasant feeling and the decrease of interests in looks did not indicate a significant difference, but came close to the significance. 5. In the questionnaire on impatience, the ache-group indicated higher value but there was not a significant difference. 6. In the questionnaire on the symptoms caused by stress, the two groups indicated significant differences in the item of 'the teethridge itches and feels a tooth rising' and 'the occiput or the nape is stiff.' In the item 'the inside of the cheek or the teethridge are widely peeled off, accompanied with ache and hemorrhage', 'the face has acne or pimple' and 'headache frequently attacks', a significant difference was not observed but the two groups came close to the significance.