• Title/Summary/Keyword: Security Behavior

Search Result 892, Processing Time 0.029 seconds

Analysis of Risk Factors for Patient Safety Management (환자안전 관리를 위한 위험요인 분석)

  • Ahn, Sung-Hee
    • Journal of Korean Academy of Nursing Administration
    • /
    • v.12 no.3
    • /
    • pp.373-384
    • /
    • 2006
  • Purpose: This is a pilot study to identify patient safety risk factors and strategies for patient safety management perceived by nurses. Methods: Data were collected and analyzed with an open questionnaire from April to May 2005, targeted on 100 nurses working in two hospitals. The issues were 'what are risk factors for patients, nurses, and other medical practitioners? How do they prevent with the aftermath of risk factors, causes of incidents?' For data analysis, types and frequency of risk factors were worked out, using the Australian Incident Monitoring System Taxonomy. Results: The types of patient safety risk factor perceived by nurses were as follows ; therapeutic devices or equipment, infrastructure and services (29.5%), nosocomial infections (16.3%), clinical processes or procedures (15.4%), behavior, human performance, violence, aggression, security and safety (12.2%), therapeutic agents (9.7%), injuries and pressure ulcers (8.7%), logistics, organization, documentation, and infrastructure technology (5.6%). Strategies for patient safety included training of prevention of infection, education about safety management for patients and medical professionals, establishment of reporting system, culture of care, pre-elimination of risk factors, cooperative system among employees, and sharing information. Conclusion: These results will be used to provide evidences for patient safety management and educational program.

  • PDF

Honeypot Model Analysis using CPN (CPN을 이용한 Honeypot 모델 설계)

  • 현병기;구경옥;조도은;조용환
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.5B
    • /
    • pp.489-499
    • /
    • 2003
  • This paper is a study about Honey-pot Model using CPN(Colored Petri Nets) that is a method of intrusion detection. Suggested Honey-pot model consists of two parts : \circled1 security kernel module for active induction of hacker's intrusion, intrusion detection and behavior pattern analysis. \circled2 virtual module for activity of induced hackers. However, suggested model was compared and analysed with conventional Denning model and Shieh nodel. The Honey-pot model using CPN can classify the characteristic of intrusion pattern, modeling intrusion pattern and pattern matching procedure, detect DDoS attack through multi hosts, and provide basis of study model for analysing intrusion pattern, finally.

Modeling and Analysis of Multi-type Failures in Wireless Body Area Networks with Semi-Markov Model (무선 신체 망에서 세미-마르코프 모델을 이용한 다중 오류에 대한 모델링 및 분석)

  • Wang, Song;Chun, Seung-Man;Park, Jong-Tae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.9B
    • /
    • pp.867-875
    • /
    • 2009
  • The reliability of wireless body area networks is an important research issue since it may jeopardize the vital human life, unless managed properly. In this article, a new modeling and analysis of node misbehaviors in wireless body area networks is presented, in the presence of multi-type failures. First, the nodes are classified into types in accordance with routing capability. Then, the node behavior in the presence of failures such as energy exhaustion and/or malicious attacks has been modeled using a novel Semi-Markov process. The proposed model is very useful in analyzing reliability of WBANs in the presence of multi-type failures.

The Relationship between Work Values and Entrepreneurial Attitudes: Implications for the Distribution Industry

  • Wang, Haikun;Moon, Jaeseung
    • Journal of Distribution Science
    • /
    • v.17 no.3
    • /
    • pp.57-67
    • /
    • 2019
  • Purpose - This study aims to examine the impact of work values on entrepreneurial attitudes, and test the moderating effect of entrepreneurial opportunity identification on the above mentioned relationship as well. Research design, data, and methodology - A questionnaire survey was conducted to 258 employees who comes from 8 different types of the enterprises in northwestern of China, and the corresponding research model was verified. Results - The results show that "comfort and security" (one dimension of work values) has a significant negative impact on entrepreneurial attitudes. Another two dimensions of work values, such as "competence and growth" and "status and independence" have a significant positive impact on entrepreneurial attitudes. In addition, entrepreneurial opportunity identification has a significant moderating effect on the relations between work values and entrepreneurial attitudes. Specifically, only the entrepreneurship opportunity identification positively moderates the relationship between status & independence and entrepreneurial attitudes. Conclusions - This research further enriches the relevant theories of organizational behavior and entrepreneurships. This study also has guiding significance and value for management practice, especially for this research results implies, that is, individual's ability to entrepreneurial opportunity identification (e.g., identify feasible distribution channel for potential new venture) is important in entrepreneurship.

Application of steel equivalent constitutive model for predicting seismic behavior of steel frame

  • Wang, Meng;Shi, Yongjiu;Wang, Yuanqing
    • Steel and Composite Structures
    • /
    • v.19 no.5
    • /
    • pp.1055-1075
    • /
    • 2015
  • In order to investigate the accuracy and applicability of steel equivalent constitutive model, the calculated results were compared with typical tests of steel frames under static and dynamic loading patterns firstly. Secondly, four widely used models for time history analysis of steel frames were compared to discuss the applicability and efficiency of different methods, including shell element model, multi-scale model, equivalent constitutive model (ECM) and traditional beam element model (especially bilinear model). Four-story steel frame models of above-mentioned finite element methods were established. The structural deformation, failure modes and the computational efficiency of different models were compared. Finally, the equivalent constitutive model was applied in seismic incremental dynamic analysis of a ten-floor steel frame and compared with the cyclic hardening model without considering damage and degradation. Meanwhile, the effects of damage and degradation on the seismic performance of steel frame were discussed in depth. The analysis results showed that: damages would lead to larger deformations. Therefore, when the calculated results of steel structures subjected to rare earthquake without considering damage were close to the collapse limit, the actual story drift of structure might already exceed the limit, leading to a certain security risk. ECM could simulate the damage and degradation behaviors of steel structures more accurately, and improve the calculation accuracy of traditional beam element model with acceptable computational efficiency.

Privacy and Security on the Web (웹에서의 개인정보보호 방안)

  • Woo, Sung-hee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.657-660
    • /
    • 2013
  • The Internet is referred as sea of information, which provides huge information, but personal information is collected for malicious behavior and provided to various web sites via internet. This can lead to economic losses as well as the disclosure of personal information. We can easily get personal information from device, such as mobile and private terminal, as well as internet, and then it can be spread very quickly. The personal information leakage and damage cases are also increasing, while the importance of personal information on the web page to distinguish the individual as the basic information is growing. In this paper we review and analyse recent invasion of privacy practices on the web and its causes, and technical and administrative protections.

  • PDF

Does Earnings Quality Affect Companies' Performance? New Evidence from the Jordanian Market

  • SALEH, Isam;ABU AFIFA, Malik;ALSUFY, Fares
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.11
    • /
    • pp.33-43
    • /
    • 2020
  • This study aims to investigate the importance of earnings quality as a determinant of companies' performance. It provides some empirical evidences from an emerging market, specifically from the Jordanian market. This study developed an econometric model for the effect of earnings quality on the companies' performance using empirical evidence. The study employs a panel data analysis method by using a sample of all Jordanian industrial public shareholding companies listed on Amman Stock Exchange (ASE) during 2010-2018. The results reveal that Return on Assets (ROA), Return on Equity (ROE), and Earnings Per Share (EPS) as proxies of company's performance are affected by the earnings quality. This provides the importance of positive earnings quality that eventually influences the companies' performance. The results of this study suggest that the higher control level on the managers' behavior and its outcome will have an effect on earnings quality, and thus the company's performance increases. As well as, high relevance of accounting information will improve earnings quality, and thus earnings quality with the interaction factors of the company's environment work on improving performance. As a conclusion, this study can work as a reference to assist standard setters, security analysts, regulators and other accounting-information users in appraising relation between the earnings quality and companies' performance.

Fire Endurance Estimate of Reinforced Concrete Structure Using Nonlinear Finite Element Method (비선형 유한요소해석을 이용한 철근콘크리트 구조물의 내화성능평가)

  • Byun, Sun-Joo;Im, Jung-Soon;Hwang, Jee-Wook
    • Journal of the Korean Society of Hazard Mitigation
    • /
    • v.6 no.1 s.20
    • /
    • pp.17-27
    • /
    • 2006
  • To estimate the retained strength of reinforced concrete structure after fire is very difficult because the complex behavior of structure is hard to understand during course of a fire. However, the damages which is caused by fire of the traffic facility infrastructure are enormous. Therefore the security against fire is important element that must not be overlooked. For this reason, an exact estimate method of the fire endurance is highly demanded. In this study, the validity of the nonlinear finite element method approach for the fire endurance of reinforced concrete structure is verified. The results of fire endurance estimate of underground road way by nonlinear finite element method approach are compared with those by ACI 216R-89.

A Study on the e-CRM, Customer Satisfaction, Repurchase Intention and Word of Mouth Intention in the Internet Shopping Mall (e-CRM 구성요인이 e-쇼핑몰 고객만족과 웹사이트 재방문 및 e-구전에 미치는 영향에 관한 연구)

  • Yoon, Jong-Hoon;Chung, Ji-Bok;Kim, Yong-Min
    • The Journal of Information Systems
    • /
    • v.17 no.1
    • /
    • pp.63-82
    • /
    • 2008
  • Recently the development of information technology and the emergence of electronic commerce have brought significant changes of purchase behavior in customers. The purpose of this research is to investigate the important elements of e-CRM which influence the customers satisfaction in the shopping mall. Also this study is to investigate the relationship between customer satisfaction and repurchase intention and word of mouth intention. What we have found are as follows. (1) e-CRM elements greatly influencing on customer satisfaction in the shopping mall were e-Marketing, s-Sales, e-Service, and e-Security. (2) results of the relationship between customer satisfaction and repurchase intention was significant. (3) results of the relationship between customer satisfaction and word of mouth intention was significant. (4) results of the relationship between repurchase intention and word of mouth intention was significant. In conclusion, the results of this study will be helpful for the managers participating the operation of internet shopping mall.

Analysis of Propensity for Conflict Resolution According to the Types of SNS Users, Usages and Conflicts (SNS 사용자 유형 및 이용방식과 갈등유형에 따른 갈등해결 성향 분석)

  • Lee, Eun Ju;Park, Dae-Ha
    • Journal of Service Research and Studies
    • /
    • v.5 no.2
    • /
    • pp.149-159
    • /
    • 2015
  • This paper proposes a making study model using Ajzen's Theory of planned behavior (TPB) and established hypothesis and then analysed propensity of conflict resolution according to the types of SNS users, usages and conflicts. The results of study, active users of SNS have propensity of resolution for their own conflicts through SNS. The users having conflicts between person and person are same with active users. The results of this study could be referenced to other researches for resolving conflicts in or between people in the future.