• Title/Summary/Keyword: Misuse Service

Search Result 51, Processing Time 0.02 seconds

Prescription Pattern for a Simulated Patient With the Common Cold at Pharmacies in a Region in Korea Without Separation of Dispensary From Medical Practice (영동지방 의약분업 예외지역 약국들에서의 감기 증상 모의 환자에 대한 약물 처방 현황)

  • Lee, Hyeong-Cheol;Park, Woo-Joo;Oh, Mi-Kyeong
    • The Korean Journal of Health Service Management
    • /
    • v.13 no.3
    • /
    • pp.115-125
    • /
    • 2019
  • Objectives: Korea has been practicing the separation of dispensary from medical practice since 2000 as a national policy to prevent misuse or overuse of medicines. This study aimed to investigate prescription patterns from except pharmacies in order to determine the appropriateness of drug usage among those patients. Methods: Thirty-two pharmacies in the Yeongdong area of Gangwon Province were examined in this study. The same simulated patient complaining of cold symptoms for 3 days visited each pharmacy to obtain a prescription for medication. Results: At pharmacies prescribing medicine, steroids (53.1%) and antibiotics (50.0%) were used to treat the common cold. Duplicate prescriptions of drugs, such as antihistamines (47.0%) and decongestants (31.3%) were common. The average number of drug prescriptions was 6.59, and 53.2% of pharmacies had prescribed more than seven drugs. The average total cost of the prescriptions was 6,093 won, and the daily cost was 2,544 won. Conclusions: Steroids and antibiotics were frequently abused among patients whose medications had been prescribed by pharmacies. Also, there were a considerable number of drugs and duplicate prescriptions. The prices of the drugs were somewhat high.

An Architecture Design of Distributed Internet Worm Detection System for Fast Response

  • Lim, Jung-Muk;Han, Young-Ju;Chung, Tai-Myoung
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.161-164
    • /
    • 2005
  • As the power of influence of the Internet grows steadily, attacks against the Internet can cause enormous monetary damages nowadays. A worm can not only replicate itself like a virus but also propagate itself across the Internet. So it infects vulnerable hosts in the Internet and then downgrades the overall performance of the Internet or makes the Internet not to work. To response this, worm detection and prevention technologies are developed. The worm detection technologies are classified into two categories, host based detection and network based detection. Host based detection methods are a method which checks the files that worms make, a method which checks the integrity of the file systems and so on. Network based detection methods are a misuse detection method which compares traffic payloads with worm signatures and anomaly detection methods which check inbound/outbound scan rates, ICMP host/port unreachable message rates, and TCP RST packet rates. However, single detection methods like the aforementioned can't response worms' attacks effectively because worms attack the Internet in the distributed fashion. In this paper, we propose a design of distributed worm detection system to overcome the inefficiency. Existing distributed network intrusion detection systems cooperate with each other only with their own information. Unlike this, in our proposed system, a worm detection system on a network in which worms select targets and a worm detection system on a network in which worms propagate themselves cooperate with each other with the direction-aware information in terms of worm's lifecycle. The direction-aware information includes the moving direction of worms and the service port attacked by worms. In this way, we can not only reduce false positive rate of the system but also prevent worms from propagating themselves across the Internet through dispersing the confirmed worm signature.

  • PDF

Workplace Violence Toward Mental Healthcare Workers Employed in Psychiatric Wards

  • d'Ettorre, Gabriele;Pellicani, Vincenza
    • Safety and Health at Work
    • /
    • v.8 no.4
    • /
    • pp.337-342
    • /
    • 2017
  • Background: Workplace violence (WPV) against healthcare workers (HCWs) employed in psychiatric inpatient wards is a serious occupational issue that involves both staff and patients; the consequences of WPV may include increased service costs and lower standards of care. The purpose of this review was to evaluate which topics have been focused on in the literature and which are new in approaching the concern of patient violence against HCWs employed in psychiatric inpatient wards, in the past 20 years. Methods: We searched for publications in PubMed and Web of Science using selected keywords. Each article was reviewed and categorized into one or more of the following four categories based on its subject matter: risk assessment, risk management, occurrence rates, and physical/nonphysical consequences. Results: Our search resulted in a total of 64 publications that matched our inclusion criteria. The topics discussed, in order of frequency (from highest to lowest), were as follows: "risk assessment," "risk management," "occurrence rates," and "physical/nonphysical consequences." Schizophrenia, young age, alcohol use, drug misuse, a history of violence, and hostile-dominant interpersonal styles were found to be the predictors of patients' violence. Conclusion: Risk assessment of violence by patients appeared the way to effectively minimize the occurrence of WPV and, consequently, to better protect mental HCWs. We found paucity of data regarding psychologic sequelae of WPV. According to these findings, we suggest the need to better investigate the psychologic consequences of WPV, with the aim of checking the effective interventions to assist HCW victims of violence and to prevent psychologic illness.

Potentially Inappropriate Prescriptions of Antibiotics in Patients with Acute Rhinosinusitis in Ambulatory Settings in South Korea (외래 급성 비부비동염 환자의 잠재적으로 부적절한 항생제 사용)

  • Daei Jung;Nam Kyung Je
    • Korean Journal of Clinical Pharmacy
    • /
    • v.33 no.4
    • /
    • pp.261-269
    • /
    • 2023
  • Background: Acute rhinosinusitis (ARS) is a common condition encountered in ambulatory practice and is one of the most common reasons for antibiotic prescriptions. This study aimed to evaluate the potentially inappropriate antibiotic prescribing for ARS in South Korea and identify influencing factors. Methods: We analyzed Health Insurance Review and Assessment Service-National Patient Samples data. We selected outpatients aged 20 to 64 with ARS, prescribed antibiotics between February and November 2020. Potentially inappropriate antibiotic prescribing was categorized as: 1) inappropriate antibiotic selection and 2) inappropriate antibiotic dosage or duration. Multiple logistic regression was conducted to estimate the impact of various factors on inappropriate antibiotic prescribing. Results: Of 1,210 patients, 80.83% received potentially inappropriate ARS antibiotic prescriptions. Inappropriate antibiotic selection accounted for 43.55%, and inappropriate antibiotic dosage and duration contributed to 37.28%. Otolaryngologists had higher odds ratio (OR) of potentially inappropriate antibiotic prescribing compared to internal medicine practitioners, while dentists had lower OR. Patients aged 20 to 29 years had a higher OR than other age groups, and those who visited primary care clinics had a higher OR than those who visited hospitals. Conclusion: Potentially inappropriate antibiotic prescribing for ARS is prevalent in South Korea. This study identified physician specialty, patient age group, and the level of healthcare facility as factors influencing potentially inappropriate antibiotic prescriptions. Addressing this issue through targeted interventions, such as improved guidelines adherence and patient education, is imperative to mitigate the risks associated with antibiotic misuse and antibiotic resistance.

Current status of opioid prescription in South Korea using narcotics information management system

  • Soo-Hyuk Yoon;Jeongsoo Kim;Susie Yoon;Ho-Jin Lee
    • The Korean Journal of Pain
    • /
    • v.37 no.1
    • /
    • pp.41-50
    • /
    • 2024
  • Background: Recognizing the seriousness of the misuse and abuse of medical narcotics, the South Korean government introduced the world's first narcotic management system, the Narcotics Information Management System (NIMS). This study aimed to explore the recent one-year opioid prescribing patterns in South Korea using the NIMS database. Methods: This study analyzed opioid prescription records in South Korea for the year 2022, utilizing the dispensing/administration dataset provided by NIMS. Public data from the Korean Statistical Information Service were also utilized to explore prescription trends over the past four years. The examination covered 16 different opioid analgesics, assessed by the total number of units prescribed based on routes of administration, type of institutions, and patients' sex and age group. Additionally, the disposal rate for each ingredient was computed. Results: In total, 206,941 records of 87,792,968 opioid analgesic units were analyzed. Recently, the overall quantity of prescribed opioid analgesic units has remained relatively stable. The most prescribed ingredient was oral oxycodone, followed by tapentadol and sublingual fentanyl. Tertiary hospitals had the highest number of dispensed units (49.4%), followed by community pharmacies (40.2%). The highest number of prescribed units was attributed to male patients in their 60s. The disposal rates of the oral and transdermal formulations were less than 0.1%. Conclusions: Opioid prescription in South Korea features a high proportion of oral formulations, tertiary hospital administration, pharmacy dispensing, and elderly patients. Sustained education and surveillance of patients and healthcare providers is required.

Protecting Individuals from Secondary Privacy Loss using Breached Personal Data Information Center (개인정보 오.남용 방지 및 보호를 위한 정보공유센터 프레임워크)

  • Ko, Yu-Mi;Choi, Jae-Won;Kim, Beom-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.391-400
    • /
    • 2012
  • This study focused on the role of the center for private information, which can manage and share the personal data from data breach incidents. Especially, this study addresses on the importance of establishing information management systems for preventing secondary misappropriation of breached personal data and private information. The database of breached personal data can be used for reducing privacy worries of potential victims of secondary misuse of personal data. Individuals who use the same IDs and passwords on multiple websites may find this service more effective and necessary. The effectiveness of this breached data center on reducing secondary privacy infringement may differ depending on the extend of data being shared and the conditions of data submission. When businesses experienced data breach and submission of data to this center is required by the law, the accuracy and effectiveness of this service can be enhanced. In addition, centralized database with high quality data set can increase matching for private information and control the secondary misappropriation of personal data or private information better.

Data Mining Approaches for DDoS Attack Detection (분산 서비스거부 공격 탐지를 위한 데이터 마이닝 기법)

  • Kim, Mi-Hui;Na, Hyun-Jung;Chae, Ki-Joon;Bang, Hyo-Chan;Na, Jung-Chan
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.279-290
    • /
    • 2005
  • Recently, as the serious damage caused by DDoS attacks increases, the rapid detection and the proper response mechanisms are urgent. However, existing security mechanisms do not effectively defend against these attacks, or the defense capability of some mechanisms is only limited to specific DDoS attacks. In this paper, we propose a detection architecture against DDoS attack using data mining technology that can classify the latest types of DDoS attack, and can detect the modification of existing attacks as well as the novel attacks. This architecture consists of a Misuse Detection Module modeling to classify the existing attacks, and an Anomaly Detection Module modeling to detect the novel attacks. And it utilizes the off-line generated models in order to detect the DDoS attack using the real-time traffic. We gathered the NetFlow data generated at an access router of our network in order to model the real network traffic and test it. The NetFlow provides the useful flow-based statistical information without tremendous preprocessing. Also, we mounted the well-known DDoS attack tools to gather the attack traffic. And then, our experimental results show that our approach can provide the outstanding performance against existing attacks, and provide the possibility of detection against the novel attack.

Drug Consumption and Nutritional Status of the Elderly in Chung-Buk Area - I. Diseades and Drug Consumption- (충북지역 노인들의 약물복용 및 영양상태 - I. 질병 및 약물복용실태-)

  • 한경희;김기남;박동연
    • Korean Journal of Community Nutrition
    • /
    • v.3 no.1
    • /
    • pp.76-93
    • /
    • 1998
  • Three hundred sixty-two(male 131, female 231) elderly aged over 65 in Chungb- uk area were interviewed to determine the disease states and drug usage patterns. The prebalence of disease was 78% and women reported more chronic diseases(83%) than men(71%). Elderly who live with spouse and have an occupation have a lower rate of disease. Average number of diseases of the elderly was $1.8\pm{1.1}$, and women$(2.1\pm{1.3)}$ have significantly higher average number of diseases than that of men$(1.4\pm{0.7)}$. Also the elderly in urban areas$(2.1\pm{1.4)}$ have significantly higher number of diseases than that of the elderly in rural areas$(1.6\pm{0.9)}$. Arthritis, hypertension, cardiovascular and gastric diseases were the most frequently listed chronic diseases in order for both men and women. Anemia and fracture of bone were relatively higher in women than in men. Particularly, the arthritis of the urban elderly have a rate of 1.5 times higher than that of the rural elderly. Fifty-two percent of the elderly were currently using drugs ; among drug users 71.2% used prescription drugs and 20.5% used nonprescription drugs. The average number taken per person was 2.1$\pm$1.4 and there was no sex or age difference. However, the elderly in rural areas $(2.7\pm{1.7)}$ consumed a significantly higher number of drugs than those in urban areas$(1.7\pm{0.7)}$. The average number of prescripti- on drugs taken was 2.0$\pm$1.4 while the average of nonprescription drugs taken was $(1.3\pm{0.6)}$. Analgesics and antihypertensive drugs were most commonly used. Vitamin and analgesics were the most frequently used self-prescribed drugs. It was noted that potential adverse drug interaction by concominant drug consumption for arthritis and antihypensive drug, abuse of digestants and antiacid without treatment of the underlying disease, and misuse of quick-acting bowel medications were problematic for the elderly. In addition drugs used for the elderly have some adverse effect on the digestive system. The types and composition of drugs used by the elderly were identified and presented. Medication compliance was poor and 13.5% reported adverse reactions such as edema, heartburn, nausea, and difficulty with eating. Seventeen percent of the elderly obtained drugs arranged by those other than medical staff. Also, even among those elderly who obtained drugs prescribed by a doctor, 69.1% of subjects had not receive instruction about potential adverse reactions. These results suggest that nutritional problems related to drug usage might exist and so dietitians, either individually or as members of health teams, need to have a better understanding of drug-nutrient interaction and closer supervision, and drug information/education service should therefore be provided to prevent or minimize adverse drug reaction in elderly users of medication.

  • PDF

An Efficient Top-k Query Processing Algorithm over Encrypted Outsourced-Data in the Cloud (아웃소싱 암호화 데이터에 대한 효율적인 Top-k 질의 처리 알고리즘)

  • Kim, Jong Wook;Suh, Young-Kyoon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.12
    • /
    • pp.543-548
    • /
    • 2015
  • Recently top-k query processing has been extremely important along with the explosion of data produced by a variety of applications. Top-k queries return the best k results ordered by a user-provided monotone scoring function. As cloud computing service has been getting more popular than ever, a hot attention has been paid to cloud-based data outsourcing in which clients' data are stored and managed by the cloud. The cloud-based data outsourcing, though, exposes a critical secuity concern of sensitive data, resulting in the misuse of unauthorized users. Hence it is essential to encrypt sensitive data before outsourcing the data to the cloud. However, there has been little attention to efficient top-k processing on the encrypted cloud data. In this paper we propose a novel top-k processing algorithm that can efficiently process a large amount of encrypted data in the cloud. The main idea of the algorithm is to prune unpromising intermediate results at the early phase without decrypting the encrypted data by leveraging an order-preserving encrypted technique. Experiment results show that the proposed top-k processing algorithm significantly reduces the overhead of client systems from 10X to 10000X.

The analysis of ethylene glycol and metabolites in biological specimens (생체시료에서 에틸렌 글리콜과 그 대사체 분석에 관한 연구)

  • Park, Seh-Youn;Kim, Yu-Na;Kim, Nam-Yee
    • Analytical Science and Technology
    • /
    • v.24 no.2
    • /
    • pp.69-77
    • /
    • 2011
  • Ethylene glycol (EG) is produced commercially in large amounts and is widely used as antifreeze or deicing solution for cars, boats, and aircraft. EG poisoning occurs in suicide attempts and infrequently, either intentionally through misuse or accidental as EG has a sweet taste. EG has in itself a low toxicity, but is in vivo broken down to higher toxic organic acids which are responsible for extensive cellular damage in various tissues caused principally by the metabolites glycolic acid and oxalic acid. The most conclusive analytical method of diagnosing EG poisoning is determination of EG concentration. However, victims are sometimes admitted at a late stage to hospitals or died during emergency treatment like a gastric lavage or found rotten dead, when blood EG concentrations are low or not detected. Therefore, in this study, the identification of EG was not only performed by gas chromatograpyc-mass spectrometry (GC-MS) following derivatization but also further toxicological analyses of metabolites, glycolic acid (GA) and oxalic acid (OA), were performed by ion chromatography in various biological specimens. A ranges of blood concentrations (3 cases) was $10\sim2,400\;{\mu}g/mL$ for EG, $224\sim1,164\;{\mu}g/mL$ for GA and ND $\sim40\;{\mu}g/mL$ for OA, respectively, In other biological specimens (liver, kidney, bile and pleural fluid), a range of concentrations (3 cases) was ND $\sim55,000\;{\mu}g/mL$ for EG, ND $\sim1,124\;{\mu}g/mL$ for GA and ND $\sim60\;{\mu}g/mL$ for OA, respectively. Liver and kidney tissues were recommended specimens including blood because OA, a final metabolite of EG, was identified large amounts in these despite no detectable EG caused by some therapy.