• Title/Summary/Keyword: Risk detection

Search Result 1,337, Processing Time 0.038 seconds

Security Risk Evaluation Scheme for Effective Threat Management (효과적인 위협관리를 위한 보안 위험도 평가기법)

  • Kang, Pil-Yong
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.5
    • /
    • pp.380-386
    • /
    • 2009
  • It is most important that identifying security threats(or vulnerabilities) of critical IT assets and checking the propriety of related security countermeasures in advance for enhancing security level. In this paper, we present a new security risk evaluation scheme based on critical assets and threats for this. The presented scheme provides the coverage and propriety of the countermeasures(e.g., intrusion detection rules and vulnerability scan rules, etc.), and the quantitative risk level of identified assets and threats. So, it is expected that the presented scheme will be utilized in threat management process efficiently compared to previous works.

DEA와 Worst Practice DEA를 이용한 정보통신기업의 신용위험평가

  • 한국정보시스템학회
    • Proceedings of the Korea Association of Information Systems Conference
    • /
    • 2005.12a
    • /
    • pp.334-346
    • /
    • 2005
  • The purpose of this paper is to introduce the concept of worst practice DEA, which aims at identifying worst performers by placing them on the efficient frontier. This is particularly relevant for our application to credit risk evaluation, but this also has general relevance since the worst performers are where the largest improvement potential can be found. The paper also proposes to use a layering technique instead of the traditional cut-off point approach, since this enables incorporation of risk attitudes and risk-based pricing. Finally, it is shown how the use of a combination of normal and worst practice DEA models enable detection of self-identifiers. The results of the empirical application on credit risk evaluation validate the method which is proposed in this paper.

  • PDF

Hazard Analysis and Risk Assessments for Industrial Processes Using FMEA and Bow-Tie Methodologies

  • Afefy, Islam H.
    • Industrial Engineering and Management Systems
    • /
    • v.14 no.4
    • /
    • pp.379-391
    • /
    • 2015
  • Several risk assessment techniques have been presented and investigated in previous research, focusing mainly on the failure mode and effect analysis (FMEA). FMEA can be employed to determine where failures can occur within industrial systems and to assess the impact of such failures. This research proposes a novel methodology for hazard analysis and risk assessments that integrates FMEA with the bow-tie model. The proposed method has been applied and evaluated in a real industrial process, illustrating the effectiveness of the proposed method. Specifically, the bowtie diagram of the critical equipment in the adopted plant in the case study was built. Safety critical barriers are identified and each of these is assigned to industrial process with an individual responsible. The detection rating to the failure mode and the values of risk priority number (RPN) are calculated. The analysis shows the high values of RPN are 500 and 490 in this process. A global corrective actions are suggested to improve the RPN measure. Further managerial insights have been provided.

A study on interaction effect among risk factors of delirium using multifactor dimensionality reduction method

  • Lee, Jong-Hyeong;Lee, Yong-Won;Lee, Yoon-Seok;Lee, Jea-Young
    • Journal of the Korean Data and Information Science Society
    • /
    • v.22 no.6
    • /
    • pp.1257-1264
    • /
    • 2011
  • Delirium is a neuropsychiatric disorder accompanying symptoms of hallucination, drowsiness, and tremors. It has high occurrence rates among elders, heart disease patients, and burn patients. It is a medical emergency associated with increased morbidity and mortality rates. That s why early detection and prevention of delirium ar significantly important. And This mental illness like delirium occurred by complex interaction between risk factors. In this paper, we identify risk factors and interactions between these factors for delirium using multi-factor dimensionality reduction (MDR) method.

Location Analysis for Emergency Medical Service Vehicle in Sub District Area

  • Nanthasamroeng, Natthapong
    • Industrial Engineering and Management Systems
    • /
    • v.11 no.4
    • /
    • pp.339-345
    • /
    • 2012
  • This research aims to formulate a mathematical model and develop an algorithm for solving a location problem in emergency medical service vehicle parking. To find an optimal parking location which has the least risk score or risk priority number calculated from severity, occurrence, detection, and distance from parking location for emergency patients, data were collected from Pratoom sub-district Disaster Prevention and Mitigation Center from October 2010 to April 2011. The criteria of risk evaluation were modified from Automotive Industry Action Group's criteria. An adaptive simulated annealing algorithm with multiple cooling schedules called multi-agent simulated quenching (MASQ) is proposed for solving the problem in two schemes of algorithms including dual agent and triple agent quenching. The result showed that the solution obtained from both scheme of MASQ was better than the traditional solution. The best locations obtained from MASQ-dual agent quenching scheme was nodes #5 and #133. The risk score was reduced 61% from 6,022 to 2,371 points.

Crowdsourced Risk Minimization for Inter-Application Access in Android

  • Lee, Youn Kyu;Kim, Tai Suk
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.5
    • /
    • pp.827-834
    • /
    • 2017
  • Android's inter-application access enriches its application ecosystem. However, it exposes security vulnerabilities where end-user data can be exploited by attackers. While existing techniques have focused on minimizing the risks of inter-application access, they either suffer from inaccurate risk detection or are primarily available to expert users. This paper introduces a novel technique that automatically analyzes potential risks between a set of applications, aids end-users to effectively assess the identified risks by crowdsourcing assessments, and generates an access control policy which prevents unsafe inter-application access at runtime. Our evaluation demonstrated that our technique identifies potential risks between real-world applications with perfect accuracy, supports a scalable analysis on a large number of applications, and successfully aids end-users' risk assessments.

A Study on safety improvement of Domestic Construction Industry subject to Design for Safety review (설계안전성 검토 시행에 따른 국내 건설업 주체의 안전개선 연구)

  • Ji, Kyung-Hwan;Choi, Byung-Jung
    • Journal of the Korea Safety Management & Science
    • /
    • v.19 no.4
    • /
    • pp.63-76
    • /
    • 2017
  • This thesis provides background information on DFS carried out by the government in an effort to reduce the accident rate, cases of DFS in other advanced countries to study their risk detection, risk assessment, risk control measures, and cases in which application of DFS during the designing phase succesfully led to reduction of the accident rate. Till now, the focus has been on incident responses after the occurance of accidents, it describes the importance of considering safety during the desining process through safety results and cases.

A study of Web map investigation for the risk recognition (위험 인지를 위한 웹 지도 탐색 연구)

  • Park, Sangjoon;Lee, Jongchan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.171-172
    • /
    • 2019
  • In this paper, we consider the dynamic method for the searching development of Web map to the monitoring object in the risk environments. It is to recognize the real-time detection to the risk situation based on the location monitoring mechanism of management to the object movement.

  • PDF

Rule Protecting Scheme for Snort

  • Son, Hyeong-Seo;Lee, Sung-Woon;Kim, Hyun-Sung
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.259-262
    • /
    • 2005
  • This paper addresses the problem of protecting security policies in security mechanisms, such as the detection policy of an Intrusion Detection System. Unauthorized disclosure of such information might reveal the fundamental principles and methods for the protection of the whole network. In order to avoid this risk, we suggest two schemes for protecting security policies in Snort using the symmetric cryptosystem, Triple-DES.

  • PDF

Assessment of the Reliability of a Novel Self-sampling Device for Performing Cervical Sampling in Malaysia

  • Latiff, Latiffah A.;Rahman, Sabariah Abdul;Wee, Wong Yong;Dashti, Sareh;Asri, Andi Anggeriana Andi;Unit, Nor Hafeeza;Li, Shirliey Foo Siah;Esfehani, Ali Jafarzadeh;Ahmad, Salwana
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.16 no.2
    • /
    • pp.559-564
    • /
    • 2015
  • Background: The participation of women in cervical cancer screening in Malaysia is low. Self-sampling might be able to overcome this problem. The aim of this study was to assess the reliability of self-sampling for cervical smear in our country. Materials and Methods: This cross-sectional study was conducted on 258 community dwelling women from urban and rural settings who participated in health campaigns. In order to reduce the sampling bias, half of the study population performed the self-sampling prior to the physician sampling while the other half performed the self-sampling after the physician sampling, randomly. Acquired samples were assessed for cytological changes as well as HPV DNA detection. Results: The mean age of the subjects was $40.4{\pm}11.3years$. The prevalence of abnormal cervical changes was 2.7%. High risk and low risk HPV genotypes were found in 4.0% and 2.7% of the subjects, respectively. A substantial agreement was observed between self-sampling and the physician obtained sampling in cytological diagnosis (k=0.62, 95%CI=0.50, 0.74), micro-organism detection (k=0.77, 95%CI=0.66, 0.88) and detection of hormonal status (k=0.75, 95%CI=0.65, 0.85) as well as detection of high risk (k=0.77, 95%CI=0.4, 0.98) and low risk (K=0.77, 95%CI=0.50, 0.92) HPV. Menopausal state was found to be related with 8.39 times more adequate cell specimens for cytology but 0.13 times less adequate cell specimens for virological assessment. Conclusions: This study revealed that self-sampling has a good agreement with physician sampling in detecting HPV genotypes. Self-sampling can serve as a tool in HPV screening while it may be useful in detecting cytological abnormalities in Malaysia.