• Title/Summary/Keyword: abusing

Search Result 69, Processing Time 0.027 seconds

Determination of MDMA and MDA in 44 hair samples during 2002 to 2003

  • Han, Eun-Young;Yang, Won-Kyung;Lee, Jae-Sin;Park, Yong-Hoon;Kim, Eun-Mi;Lim, Mi-Ae;Chung, Hee-Sun
    • Proceedings of the PSK Conference
    • /
    • 2003.10b
    • /
    • pp.112.1-112.1
    • /
    • 2003
  • The qualitative and quantitative analysis of MDMA and MDA in hair samples by GC/MS were reported. Hairs were collected from subjects aged 22-37 years, who were suspected of abusing MDMA. After washing with methanol, hair samples were cut into small pieces, extracted with methanol containing 1 percent hydrochloric acid for 20th, and the solution was evaporated. MDMA or MDA in the extract were determined by GC/MS using selected ion monitoring after derivatization with trifluoroacetic anhydride. (omitted)

  • PDF

A Study on the Actual Condition of Abuse in PVP Game (PVP 게임에서 어뷰징 실태에 관한 연구)

  • Kim, Jae-Un;Kim, Hyo-Nam
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.649-652
    • /
    • 2020
  • 본 논문에서는 스타크래프트 게임이나 리그 오브 레전드 게임 등의 이용자끼리 실력을 겨루는 PVP 형태의 온라인 게임들에서 일어나는 어뷰징에 대해서 실태를 조사하고 이에 따른 개선 방안을 제시한다. 어뷰징에 관하여 알아보고 어뷰징이 게임과 일상에서 어떻게 작용하는지 설명하고 유저들이 어뷰징으로 인한 피해를 입는 사례를 조사하고 현재 개발사들의 조치 방안 및 유저 커뮤니티의 의견 등을 통해 실태에 대해 내용을 제시한다. 결론으로 조사한 자료를 바탕으로 어떻게 하면 어뷰징을 좀 더 방지할 수 있는지에 대한 개선 방안을 제시하고 게임 운영 차원에서 어떤 방식으로 지원해야 하는지를 제시한다.

  • PDF

Analysis of the Threats abusing IPv6 Fragment Header

  • Zhao, Zhen;Gyeong, Gye-Hyeon;Ko, Kwang-Sun;Eom, Young-Ik
    • Annual Conference of KIPS
    • /
    • 2007.05a
    • /
    • pp.1087-1090
    • /
    • 2007
  • The security issues related to IPv6 protocol have been focused on by many researchers and engineers. Especially, extension headers of IPv6 protocol provide various functionalities such as IP security, mobile IP, and in principle, it is said to give much more effective network services than the previous protocol, IPv4. In this paper, the cases are surveyed in which fragment header, that is one of many extension headers in IPv6 protocol, is abused and made to be the sources of threats. Prevention mechanisms are also surveyed to countermeasure the threats.

The Study on the Factors Affecting Consumer's Buying Behavior Under The E-commerce Environment. (전자상거래의 소비자 구매행위에 영향을 미치는 요인에 관한 실증연구)

  • Han, Kyung-Il;Son, Won-Il
    • Journal of Global Scholars of Marketing Science
    • /
    • v.7
    • /
    • pp.321-337
    • /
    • 2001
  • The Purpose of this study is to empirically examine the factors that affect the consumer's buying behavior under the e-commerce environment. In order to achieve this goal, vendor characteristics, securities of transaction, concern for privacy, shopping orientation and perceived channel utilities were used as independent variables. Findings of study indicated that the concerns for abusing individual information, perceived securities of transaction, consumer's recreational orientation, consumer's convenience orientation, perceived distribution channel are the robust predictors of buying behavior of internet users.

  • PDF

Performance Analysis of an On-line Game Abuse Pattern Monitoring Method (온라인 게임 악용 패턴 모니터링 방법의 성능 분석)

  • Roh, Chang-Hyun;Son, Han-Seong
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.12
    • /
    • pp.71-77
    • /
    • 2011
  • CEP(Complex Event Processing) is a technique to find complex event pattern in a massive information system. Based on CEP technique, an abuse pattern monitoring method has been developed to provide an real-time detection. In the method, the events occurred by game-play are observed to be against the rules using CEP. User abuse patterns are pre-registered in CEP engine. And CEP engine monitors user abuse after aggregating the game data transferred by game logging server. This article provides the performance analysis results of the abuse pattern monitoring method using real game DB. We results that the method proposed in previous study is effective to monitor abusing users.

QoS Guaranteed Secure Network Service Realization using Global User Management Framework (GUMF);Service Security Model for Privacy

  • Choi, Byeong-Cheol;Kim, Kwang-Sik;Seo, Dong-Il
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1586-1589
    • /
    • 2005
  • GUMF (Global User Management Framework) that is proposed in this research can be applied to next generation network such as BcN (Broadband convergence Network), it is QoS guaranteed security framework for user that can solve present Internet's security vulnerability. GUMF offers anonymity for user of service and use the user's real-name or ID for management of service and it is technology that can realize secure QoS. GUMF needs management framework, UMS (User Management System), VNC (Virtual Network Controller) etc. UMS consists of root UMS in country dimension and Local UMS in each site dimension. VNC is network security equipment including VPN, QoS and security functions etc., and it achieves the QoSS (Quality of Security Service) and CLS(Communication Level Switching) functions. GUMF can offer safety in bandwidth consumption attacks such as worm propagation and DoS/DDoS, IP spoofing attack, and current most attack such as abusing of private information because it can offer the different QoS guaranteed network according to user's grades. User's grades are divided by 4 levels from Level 0 to Level 3, and user's security service level is decided according to level of the private information. Level 3 users that offer bio-information can receive secure network service that privacy is guaranteed. Therefore, GUMF that is proposed in this research can offer profit model to ISP and NSP, and can be utilized by strategy for secure u-Korea realization.

  • PDF

A Study on Structural Vulnerability of MobilePhone Micropayment System And Improvement of Standard Payment Module for User Protection (휴대전화 소액결제 시스템의 구조적 취약점 및 이용자 보호를 위한 표준결제창의 개선방안)

  • Park, Kwang Sun;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1007-1015
    • /
    • 2013
  • The automatic payment process of mobile phone micropayment system has not checked user's authentication. That is the structural vulnerability of mobile phone micropayment system. The malicious contents provider can cheat users and payment gateway through abusing the structural vulnerability. The payment gateway applies standard payment module after August, 2012 in order to solve the problem. But the standard payment module also has the vulnerability that makes damage of users. So the purpose of this paper is to suggest efficient improvement of standard payment module for user protection.

Predicting Resilience of Married Couples : Focused on the Couple Violence (기혼 남녀의 레질리언스(Resilience) 예측성 연구 : 부부폭력을 중심으로)

  • Bang, Hyun-Ju;Yoon, Gyung-Ja
    • Journal of the Korean Home Economics Association
    • /
    • v.44 no.12
    • /
    • pp.127-137
    • /
    • 2006
  • The goal of this study is twofold: (1) to identify how well the predictors of family resilience using selected ENRICH subscales measure couple resilience of spouse abusing couples; (2) to verify how predictors of family resilience differentiate abusive partners from non-abusive partners through discriminant analysis. The results show that nonviolent couples have significantly higher scores of family resilience factors than violence experienced couples. The accuracy of discriminant analysis was as high as 85.7% for non-violent couples and 85.4% for violence experienced couples. Whereas collaborative problem solving and couple's flexibility had the highest discriminant power, socioeconomic resources and transcendence and spirituality had little contributed. In addition, this study shows that predictors of family resilience have high discriminant power for distinguishing violent groups from non-violent groups. The results of this study can be clinically utilized in identifying violent groups and designing couple education programs. Based on these results, the recommendations for the future research in this area were discussed.

A Study on Serum Zinc Concentration in some Methamphetamine Abusers (Methamphetamine 남용자에 있어서 혈청 아연농도에 관한 연구)

  • Moon, Hyung-Il;Lee, Hoo-Rak;Lee, Soo-Il
    • Journal of Preventive Medicine and Public Health
    • /
    • v.25 no.2 s.38
    • /
    • pp.172-179
    • /
    • 1992
  • The author investigated the zinc concentrations in sera of 110 methamphetaimine abusers (male 87, female 23) and of 41 healthy official workers(male 29, female 12) using inductively coupled plasma emission spectrometer. The serum zinc concentrations were analysed according to hepatitis C virus antibody(Anti HCV), hepatitis B surface antigen(HBsAg) and alanine aminotransferase(ALT) value in both groups. The analytical results were obtained as follows 1. The mean zinc concentration of MAP abuser group($298.5{\pm]246.9{\mu}g/100ml$) was 2.5 times higher than that of control group($118.8{\pm}25.4{\mu}g/100ml$). 2. The distributions of zinc concentration in both groups were skewed pattern. 3. The zinc concentrations were higher in Anti HCV-positive group and abnormal ALT value group than Anti HCV-negative group and normal ALT value group. But HBs-Ag positive group had lower zinc concentration than HBs-Ag negative group. 4. The number of anti HCV-positive subjects was increased and the zinc concentrations were decreasd in proportion to the abusing duration of MAP.

  • PDF

A Study on an Optimal Design of Electric Snow Melting Mat for Vulnerable Walk Zone (제설기반 취약지역 보행자의 전기안전발판(융설용) 최적설계에 관한 연구)

  • Kwon, Jin Wook;Jang, Chul;Hwang, Myung Whan
    • Journal of the Korean Society of Safety
    • /
    • v.31 no.6
    • /
    • pp.12-18
    • /
    • 2016
  • This paper describes an optimal design of electric snow melting mat on vulnerable walk zone. In order to design an optimal electric power of snow melting mat and protect pedestrians with a nonslip mat, with considering protection of environmental pollution from abusing of the de-icing salts added calcium chloride. We analyzed nine snow melting mats through verification experiment in the condition of $-5^{\circ}C$, depending on three different kinds of heating material, electric heating cable, carbon heating film and carbon textile film. As a consequence, the $150W/m^2$ carbon textile film mat for snow melting was identified as an optimal power input and functional performance for pedestrians' safety on vulnerable walk zone. It is expected that the $150W/m^2$ carbon textile film mat would be useful to reduce slip down accidents by human error.