• Title/Summary/Keyword: Physical threats

Search Result 145, Processing Time 0.024 seconds

Reliability and Validity of Objective Diagnosis Tools According to the Emotional State of Companion Canine (반려견 정서상태에 따른 객관적 진단 도구의 신뢰도와 타당도 연구)

  • In-Hag Choi;Young-In Park;Tae-Ho Chung
    • Journal of Environmental Science International
    • /
    • v.33 no.4
    • /
    • pp.279-282
    • /
    • 2024
  • This study aimed to verify the results of emotional analysis with respect to canine behavior as reported in the existing animal behavior field based on the dog vestibular emotional reflex (VER) principle, and to evaluate humans and animals based on empathy gained through true communication rather than human-centered interpretation. A total of 200 canines were divided into non-daily and daily situation groups (n=100 each). To assess the psychological and emotional state of each group, these changes were applied to the principle of VER, and six measurement values were selected: positive emotion (balance and energy), negative emotion (tension/anxiety and stress), and body condition (inhibition and neuroticism). The results showed a statistically significant difference (p<0.05) in positive emotions, negative emotions, and body conditions between the two groups. In addition, balance, energy, tension/anxiety, inhibition, and neuroticism were higher in the non-daily situation group than in the daily situation group, with an exception for stress. Compared with the canine daily situation groups, canine in the non-daily situation groups instinctively observed their surroundings to cope with possible threats, had decreased concentration, and elevated vitals due to high-intensity anxiety. This can be perceived as a state of immediate reaction to possible situations/threats. In conclusion, it was confirmed through Vibra Image technology that canine instability mainly affects three factors: positive emotion, negative emotion, and physical condition.

Efficient Privacy Protection in Radio Frequency Identification Systems (RFID 시스템에서의 효율적인 프라이버시 보호 기법)

  • Yang Yuan;Lee Tae-seok;Lu XiaoYi;In Hoh Peter;Park Myong-Soon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.112-114
    • /
    • 2005
  • In today's hyper-competitive business environment, Radio Frequency Identification (RFID) technology is expected to enhance the operation efficiency of supplying chain management in both manufactures and retail industries. However, the widespread deployment of RFID tags may create new threats to user privacy, due to the powerful tracking capability of the tags. Many authentication protocols for RFID have been proposed. They are helpful preventing passersby being scanned to determine what articles they are carrying. However, most of them would not prevent the bigger physical tracking problem of RFID, especially when being tracked by the 'constellation' of products they carry. We proposed this RFID scheme to prevent these tracking problems.

  • PDF

Hotel Workers and Workplace Harassment: A Comparison of South Korea and Japan

  • Jung, Hyo Sun;Yoon, Hye Hyun
    • Culinary science and hospitality research
    • /
    • v.23 no.1
    • /
    • pp.10-18
    • /
    • 2017
  • This study examined the positive impact of workplace harassment on the employees' counterproductive work behavior at deluxe hotel in Seoul and Tokyo. The study verified a differentiated influence based on the nationality of the employees. The hypothesized relationships in the model were tested simultaneously by using structural equation modelling. First, isolation/exclusion (${\beta}=.403$), disrespectful behavior (${\beta}=.312$), physical aggression (${\beta}=.245$), and verbal aggression (${\beta}=.133$) had a positive impact on counterproductive work behavior. However, threats/bribes (${\beta}=.091$) did not show a significant impact. Second, no significant moderating effect based on employees' nationality (Korean versus Japanese) was observed in the relationship between the five workplace harassment factors and CWB. This study will investigate workplace harassment perceived by deluxe hotel employees in Korea and Japan, and the obtained data can also be used to help identify realistic plans to reduce workplace harassment between bosses and subordinates at an organizational level.

Space Technology in Environmental Health (Emerging Vial Disease)

  • Nakhapakorn, Kanchana;Andrianasolo, Haja
    • Proceedings of the KSRS Conference
    • /
    • 2002.10a
    • /
    • pp.411-416
    • /
    • 2002
  • The emergence of viral diseases transmitted is nowadays a central problem in the world. Problem, which is becoming very critical in developing countries, where the health systems are not yet enough developed to face the bursting of such diseases. Emerging viral diseases constitute one of the major threats to human being that are arising in the modern world. Besides bio-chemical and medical researches, new orientations are developed to understand the environmental dimensions of such emergence. Questions concerning the inter-plays between the environmental and disease dynamics are building up new investigations, both in remote sensing and GIS, for the elaboration of levels of organization of space and environment in relation to incidences, to gain understandings in these issues. Environmental attributes attached to land cover types: area, spatial heterogeneity and physical state, are derived from remote sensing and applied to uncover related dimensions of the Dengue disease.

  • PDF

A Practical Security Risk Analysis Process and Tool for Information System

  • Chung, Yoon-Jung;Kim, In-Jung;Lee, Do-Hoon
    • Journal of Information Processing Systems
    • /
    • v.2 no.2
    • /
    • pp.95-100
    • /
    • 2006
  • While conventional business administration-based information technology management methods are applied to the risk analysis of information systems, no security risk analysis techniques have been used in relation to information protection. In particular, given the rapid diffusion of information systems and the demand for information protection, it is vital to develop security risk analysis techniques. Therefore, this paper will suggest an ideal risk analysis process for information systems. To prove the usefulness of this security risk analysis process, this paper will show the results of managed, physical and technical security risk analysis that are derived from investigating and analyzing the conventional information protection items of an information system.

Codium fragile subsp. fragile (Suringar) Hariot in Tunisia: morphological data and status of knowledge

  • Cherif, Wafa;Ktari, Leila;Bour, Monia El;Boudabous, Abdellatif;Grignon-Dubois, Micheline
    • ALGAE
    • /
    • v.31 no.2
    • /
    • pp.129-136
    • /
    • 2016
  • The Mediterranean Sea is currently facing dramatic changes and threats, including change in native species and accidental introductions. The introduced green alga Codium fragile subsp. fragile (Suringar) Hariot influences diversity and community structure in some parts of the world. This paper documents the distribution of this species in Tunisia and provides a morphological description of C. fragile subsp. fragile in Northern Tunisia. Results confirm the identity of Tunisian specimens as the invasive subspecies C. fragile subsp. fragile. This is the first morphological characterization of this subspecies in Tunisia.

Security Concerns on e-Healthcare System with Countermeasures Applied

  • Bruce, Ndibanje;Kim, Hyun-Ho;Park, JeaHoon;Kim, ChangKyun;Lee, HoonJae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.256-259
    • /
    • 2013
  • Data and network security for e-Healthcare Systems are a primary concern due to the easiest deployment area accessibility of the sensor devices. Furthermore, they are often interacting closely in cooperation with the physical environment and the surrounding people, where such exposure increases security vulnerabilities in cases of improperly managed security of the information sharing among different healthcare organizations. Hence, healthcare-specific security standards such as authentication, data integrity, system security and internet security are used to ensure security and privacy of patients' information. This paper discusses security threats on e-Healthcare Systems where an attacker can access both data and network using masquerade attack. Moreover, an efficient and cost effective approach for countermeasures is discussed for the delivery of secure services.

  • PDF

ID-based group key exchange mechanism for virtual group with microservice

  • Kim, Hyun-Jin;Park, Pyung-Koo;Ryou, Jae-Cheol
    • ETRI Journal
    • /
    • v.43 no.5
    • /
    • pp.932-940
    • /
    • 2021
  • Currently, research on network functions virtualization focuses on using microservices in cloud environments. Previous studies primarily focused on communication between nodes in physical infrastructure. Until now, there is no sufficient research on group key management in virtual environments. The service is composed of microservices that change dynamically according to the virtual service. There are dependencies for microservices on changing the group membership of the service. There is also a high possibility that various security threats, such as data leakage, communication surveillance, and privacy exposure, may occur in interactive communication with microservices. In this study, we propose an ID-based group key exchange (idGKE) mechanism between microservices as one group. idGKE defines the microservices' schemes: group key gen, join group, leave group, and multiple group join. We experiment in a real environment to evaluate the performance of the proposed mechanism. The proposed mechanism ensures an essential requirement for group key management such as secrecy, sustainability, and performance, improving virtual environment security.

Conceptual Analysis of Cyber Electronic Warfare by OSI Reference Model (OSI 참조 모델에 의한 사이버전자전 개념 분석)

  • Lee, Minwoo;Lee, Jongkwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.600-601
    • /
    • 2021
  • The cyberspace, which is the fifth battle field, should be utilized for multi-domain maneuvering between the cyberspace and the physical space using an electromagnetic spectrum. This becomes a major concept of cyber electronic warfare that combines the characteristics of cyber warfare and electronic warfare. In this study, the concept of cyber electronic warfare is analyzed by using the OSI reference model and examining the threats of the two-layer data link layer.

  • PDF

A Survey on Detecting Interactions among Different Devices/Apps in IoT (IoT 분야의 다양한 기기/앱 간 상호작용 검출에 관한 연구동향)

  • Yicheng Zhen;Yeonjoon Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.05a
    • /
    • pp.101-103
    • /
    • 2023
  • With the recent advances in communication technology and Internet of Things (IoT) infrastructure, home automation systems have emerged as a new paradigm for providing users with convenient smart home services. The IoT ecosystem has merged digital systems with the physical world, dramatically changing the way people live and work. However, at the same time, security remains one of the most significant research issues in IoT, as the deployment and application of high-availability systems come with various security risks that cause serious threats to users. Among them, the security issues arising from the interaction among devices/applications should not be underestimated. Attackers can exploit interactions among devices/applications to hack into the user's home. In this paper, we present a survey of research on detecting various types of interactions among devices/applications in IoT.