• Title/Summary/Keyword: Misuse Types

Search Result 36, Processing Time 0.031 seconds

Understanding and Misuse Type of Quality Improvement Tools According to the Kind of Data and the Number of Population in DMAIC Process of Six Sigma (식스시그마 DMAIC 프로세스에서 모집단의 수와 데이터 종류에 따른 품질개선 기법의 오적용 유형 및 이해)

  • Choi, Sung-Woon
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2010.04a
    • /
    • pp.509-517
    • /
    • 2010
  • The paper proposes the misuse types of statistical quality tools according to the kind of data and the number of population in DMAIC process of six sigma. The result presented in this paper can be extended to the QC story 15 steps of QC circle. The study also provides the improvement methods about control chart, measurement system analysis, statistical difference, and practical equivalence.

  • PDF

A Prediction Model of Drug Misuse Behaviors in Community-Dwelling Older Adults (재가노인의 약물오용행위 예측모형)

  • Hong, Se Hwa;Yoo, Kwang Soo
    • Journal of Korean Academy of Nursing
    • /
    • v.46 no.5
    • /
    • pp.630-641
    • /
    • 2016
  • Purpose: This study was designed to construct a model which explains drug misuse behaviors in community-dwelling older adults. Methods: The design of this research is a cross-sectional study using structure equation modeling. The hypothetical model consisted of two types of variables: the exogenous variables of health status, cognitive ability, and negative emotion, and the endogenous variables of number of drugs, and drug misuse behaviors. The data collection was conducted from September 2 to September 21, 2013 through self-report questionnaires. Participants were 320 community-dwelling adults over the age of 65 living in J city. Data were analyzed with SPSS 21.0 program and Amos 18.0 program. Results: The results of the model fitness analysis were satisfied. The predictor variables for the hypothetical model explained 62.3% of variance regarding drug misuse behaviors. Drug misuse behaviors were directly affected by health status, cognitive ability, negative emotion and number of drugs and indirectly affected by health status, and negative emotion through number of drugs. Conclusion: These findings indicate factors that should be used in developing effective nursing interventions for safe and proper drug use and the prevention of drug misuse behaviors in community-dwelling older adults.

The Causal Relationship between Information Security Countermeasures and Information System Misuse (정보보안대책과 정보시스템 오남용과의 인과적 관계)

  • Lee, Joontaik;Kim, Sanghoon
    • Journal of Information Technology Services
    • /
    • v.14 no.4
    • /
    • pp.81-104
    • /
    • 2015
  • Intentional information systems (IS) misuse is a serious problem in many organizations. This study aims at developing the theoretical framework of deterring IS misuse on the basis of Nagin's General Deterrence Theory (GDT) which is very famous in the area of socio-criminology. Applying GDT to the IS misuse situation could be reasoned that the perceived certainty and the perceived severity of sanctions associated with committing IS misuse have positive impact on deterring the deviant behaviors. Also, these two constructs (certainty of sanctions and severity of sanctions) could be inferred to be influenced by the four types of IS security countermeasures (security policies, security awareness program, monitoring practices and preventive security software) derived through critically reviewing IS security-relevant literature. The proposed research model and ten hypotheses were empirically analysed using structural equation modelling with the data collected by conducting a questionnaire survey of staff members in business organizations in Korea. As a result, it was found that five ones of ten hypotheses were supported. It is thought that this study makes theoretical contribution to expanding research area of IS security and also has strong implications for IS security management practices within organizations.

Review of cases of patient risk associated with ginseng abuse and misuse

  • Paik, Doo Jin;Lee, Chang Ho
    • Journal of Ginseng Research
    • /
    • v.39 no.2
    • /
    • pp.89-93
    • /
    • 2015
  • Ginseng has long been used as a functional food or therapeutic supplement and it is empirically known to be safe and nontoxic. During recent decades, a number of in vitro and in vivo experiments, as well as human studies have been conducted to prove the safety of various types of ginseng samples and their components. Clinical trials, case reports, and in vitro and in vivo research articles addressing the safety, toxicity, and other adverse events of ginseng application were selected and reviewed. Patient risks associated with ginseng abuse and misuse such as affective disorder, allergy, cardiovascular and renal toxicity, genital organ bleeding, gynecomastia, hepatotoxicity, hypertension, reproductive toxicity, and anticoagulant-ginseng interaction were reviewed and summarized. There are some cases of patient risk associated with ginseng abuse and misuse depending on patients' conditions although further investigation in more cases is required to clarify these issues.

Simulation of Detecting the Distributed Denial of Service by Multi-Agent

  • Seo, Hee-Suk;Lee, Young-Won
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.59.1-59
    • /
    • 2001
  • The attackers on Internet-connected systems we are seeing today are more serious and more technically complex than those in the past. Computer security incidents are different from many other types of crimes because detection is unusually difficult. So, network security managers need a IDS and Firewall. IDS (Intrusion Detection System) monitors system activities to identify unauthorized use, misuse or abuse of computer and network system. It accomplishes these by collecting information from a variety of systems and network resources and then analyzing the information for symptoms of security problems. A Firewall is a way to restrict access between the Internet and internal network. Usually, the input ...

  • PDF

A soldering station controller for two types heater (이종의 인두기 히터를 제어하는 솔더링 스테이션)

  • Oh, Kab-suk
    • Journal of Power System Engineering
    • /
    • v.19 no.3
    • /
    • pp.48-54
    • /
    • 2015
  • This paper introduced a design method of soldering station that can control two types of soldering iron heater. At design time, to distinguish two types of soldering iron heater the voltage divider rule has been applied, and the distinguished resistor is inserted to handler of soldering iron to prevent misuse by users. And an algorithm to design a PID controllers is proposed. The proposed controllers parameter which can be easily realized, and are designed by using the input output data from systems, and have outstanding ability making the output response of nonlinear systems similar to the desired one. Temperature control experiments were performed to verify the ability of the suggested controller. As a result, suggested PID controller followed the desired ones, and one soldering station can control the various type of soldering irons in real time.

Status Epilepticus Caused by Nefopam

  • Park, Yong-Sook;Kim, Young-Baeg;Kim, Jeong-Min
    • Journal of Korean Neurosurgical Society
    • /
    • v.56 no.5
    • /
    • pp.448-450
    • /
    • 2014
  • Nefopam, a centrally acting analgesic, has been used to control postoperative pain. Reported adverse effects are anticholinergic, cardiovascular or neuropsychiatric. Neurologic adverse reactions to nefopam are confusion, hallucinations, delirium and convulsions. There are several reports about fatal convulsive seizures, presumably related to nefopam. A 71-year-old man was admitted for surgery for a lumbar spinal stenosis. He was administered intravenous analgesics : ketorolac, tramadol, orphenadrine citrate and nefopam HCl. His back pain was so severe that he hardly slept for several days; he even needed morphine and pethidine. At 4 days of administration of intravenous analgesics, the patient suddenly started generalized tonic-clonic seizures for 15 seconds, and subsequently, status epilepticus; these were not responsive to phenytoin and midazolam. After 3 days of barbiturate coma therapy the seizures were controlled. Convulsive seizures related to nefopam appear as focal, generalized, myoclonic types, or status epilepticus, and are not dose-related manifestations. In our case, the possibility of convulsions caused by other drugs or the misuse of drugs was considered. However, we first identified the introduced drugs and excluded the possibility of an accidental misuse of other drugs. Physicians should be aware of the possible occurrence of unpredictable and serious convulsions when using nefopam.

Design and Implementation of IDS and Management Modules based on Network (네트워크 기반의 침입 탐지 시스템 관리 모듈 설계 및 구현)

  • 양동수;윤덕현;황현숙;정동호;김창수
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.05a
    • /
    • pp.680-683
    • /
    • 2001
  • As the rapid information communication technique, internet users have been continuously increasing every year, but on the other hand many damages have occurred on the internet because of dysfunction for computer system intrusion. To reduce damages, network and system security mechanism is variously developed by researcher, IDS(Intrusion Detection System) is commercialized to security technique. In this paper we describe for intrusion detection based on network, we design and implement IDS to detect illegal intrusion using misuse detection model. Implemented IDS can detect various intrusion types. When IDS detected illegal intrusion, we implemented for administrator to be possible management and control through mechanisms of alert message transmission, mail transmission, mail at the remote.

  • PDF

An Analysis of Intrusion Pattern Based on Backpropagation Algorithm (역전파 알고리즘 기반의 침입 패턴 분석)

  • Woo Chong-Woo;Kim Sang-Young
    • Journal of Internet Computing and Services
    • /
    • v.5 no.5
    • /
    • pp.93-103
    • /
    • 2004
  • The main function of the intrusion Detection System (IDS) usee to be more or less passive detection of the intrusion evidences, but recently it is developed with more diverse types and methodologies. Especially, it is required that the IDS should process large system audit data fast enough. Therefore the data mining or neural net algorithm is being focused on, since they could satisfy those situations. In this study, we first surveyed and analyzed the several recent intrusion trends and types. And then we designed and implemented an IDS using back-propagation algorithm of the neural net, which could provide more effective solution. The distinctive feature of our study could be stated as follows. First, we designed the system that allows both the Anomaly dection and the Misuse detection. Second, we carried out the intrusion analysis experiment by using the reliable KDD Cup ‘99 data, which would provide us similar results compared to the real data. Finally, we designed the system based on the object-oriented concept, which could adapt to the other algorithms easily.

  • PDF

A Design and Implementation of Anomaly Detection Model based the Web Traffic Trend Analysis (웹 트래픽 추이 분석 기반 비정상행위 탐지 모델의 설계 및 구현)

  • Jang, Sung-Min;Park, Soon-Dong
    • Journal of the Korea Computer Industry Society
    • /
    • v.6 no.5
    • /
    • pp.715-724
    • /
    • 2005
  • Recently many important systems that used to be operated in a closed environment are now providing web services and these kinds of web-based services are often an easy and common target of attacks. In addition, the great variety of web content and applications cause the development of new various intrusion technologies, while the misuse-based intrusion detection technology cannot keep the peace with the attacks and it seems to lack the capability to deal with such various new security threats, As a result it is necessary to research and develop new types of detection technologies that can detect newly developed attacks and intrusions as well as to be able to deal with previous types of exploits. In this paper, a HTTP traffic model is tested for its anomaly by using a HTTP request traffic pattern analysis and the field information analysis of the HTTP packet. Consequently, the HTTP traffic models by applying anomaly tests is designed and established.

  • PDF