• Title/Summary/Keyword: behavioral integrity

Search Result 34, Processing Time 0.029 seconds

A Study on Access Control Through SSL VPN-Based Behavioral and Sequential Patterns (SSL VPN기반의 행위.순서패턴을 활용한 접근제어에 관한 연구)

  • Jang, Eun-Gyeom;Cho, Min-Hee;Park, Young-Shin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.11
    • /
    • pp.125-136
    • /
    • 2013
  • In this paper, we proposed SSL VPN-based network access control technology which can verify user authentication and integrity of user terminal. Using this technology, user can carry out a safety test to check security services such as security patch and virus vaccine for user authentication and user terminal, during the VPN-based access to an internal network. Moreover, this system protects a system from external security threats, by detecting malicious codes, based on behavioral patterns from user terminal's window API information, and comparing the similarity of sequential patterns to improve the reliability of detection.

A study on the Modeling of I/O Buffer Information Specification to supply Signal Integrity Simulation (신호 통합성 시뮬레이션을 지원하기 위한 입출력 버퍼 정보형식의 모델링에 관한 연구)

  • 김현호;이용희;이천희
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2000.11a
    • /
    • pp.131-134
    • /
    • 2000
  • 본 논문에서는 디지털 IC회로의 입출력과 입출력 버퍼에 대한 입출력 버퍼정보 형식 모델링을 묘사하였고 입출력 버퍼의 전기적 특성을 표현하는 방법 등을 나타냈다. 또한 본 논문에서 도출한 입출력 버퍼 모델링은 CMOS와 TTL IC를 모델링 하는데 사용할 수 있는데 CMOS와 TTL IC 그리고 ROM과 RAM 메모리에 대한 입출력 버퍼 모델을 128개 정도 만들었다. 이러한 입출력 버퍼 모델은 정확한 행동(behavioral) 모델을 구성하기 위해 그리고 고속 회로의 PCB 디자인 시뮬레이션에 사용될 것이다.

  • PDF

Development of IoT-Based Behavioral Intervention System for Senior People (IoT 기반 고령자 행동 인터벤션 시스템 개발)

  • Yang, So Hyun;Hong, Seo Hee;Son, Sang Joon;Kim, Jun Woo;Kim, Jae Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.3
    • /
    • pp.686-697
    • /
    • 2017
  • Rapid growth in mobile communication and the proliferation of smart devices have drawn significant utilization of machine generated data. Behavior tracking technology now are utilized in the various fields based on extracting data using the sensor and device. We deploy IoT based behavioral intervention system in Suwon mental health center to improve the effectiveness of non-medicine care for senior people. Using smart activity trackers and BLE scanner devices, we proposed a location-based behavioral intervention system and verify the integrity of the harvested data.

Categorization of Nursing Diagnosis and Nursing Interventions Used in Home Care (가정간호에서 사용된 간호진단과 간호중재 분류)

  • Suh, Mi-Hae;Hur, Hae-Kung
    • Journal of Home Health Care Nursing
    • /
    • v.5
    • /
    • pp.47-60
    • /
    • 1998
  • This study was done to identify basic information in classifying nursing diagnoses and nursing interventions needed for the further development of computerized nursing care plans. Data were collected by reviewing charts of 123 home care clients who had active disease, for whom at least one nursing diagnosis was on the chart, and who had been discharged. Data included demographics, medical orders, nursing diagnoses and nursing interventions. The results of the study, which found the most frequent medical diagnoses to be cancer (40.7%) and brain injury (26.8%), showed that 'Impaired Skin Integrity'(18.3%), 'Risk for Infection'(15.0%), 'Altered Nutrition, Less than Body Requirements'(13.8%), and 'Risk for Impaired Skin Integ rity'(9.9%) were the most frequent nursing diagnoses. 'Pressure Ulcer Care'(28.4%) was the most frequent intervention for 'Impaired Skin Integrity', 'Infection Protection'(16.0%) for 'Risk of Infection', 'Nutrition Counseling'(26.8%) for 'Altered Nutrition' and 'Positioning'(22.0%) for 'Risk for Skin Integrity Impairment', Comparison of interventions with the Nursing Intervention Classification(NIC) showed that the most frequent interventions were in the domain 'Basic Physiological' (33.94%), followed by 'Behavioral'(27.8%), and 'Complex Physiological' (22.6%). Interventions related to teaching family to give care at home could not be classified in the NIC scheme. Examination of the frequency of NIC interventions showed that for the domain 'Activity & Exercise Management', 75% of the interventions were used, but for seven domains, none were used. For the domain 'Immobility Management', 93% of the times that an intervention was used, it was 'Positioning', for the domain 'Tissue Perfusion Management', 'IV Therapy' (59.1%) and for the domain 'Elimination Management', 'Tube Care: Urinary'(54.0%). The nursing diagnoses 'Altered Urinary Elimination' and 'Im paired Physical Mobility' were both used with these clients, but neither 'Fluid Volume Deficit' nor 'Risk of Fluid Volume Deficit' were used rather 'IV Therapy' was an intervention for 'Altered Nutrition, Less than Body Requirements', A comparison of clients with cancer and those with brain injury showed that interventions for the nursing diagnosis 'Impaired Skin Integrity' were more frequent for the clients with cancer, interventions for 'Risk of Infection' were similar for the two groups but for clients with cancer there were more interventions for' Altered Nutrition'. Examination of the nursing diagnoses leading to the intervention 'Positioning' showed that for both groups, it was either 'Impaired Skin Integrity' or 'Risk for Skin Integrity Impairment'. This study identified a need for further refinement in the classification of nursing interventions to include those unique to home care and that for the purposes of computerization identification of the nursing activities to be included in each intervention needs to be done.

  • PDF

A Study on the Structural Integrity of Lifting Lug without Appendage (부가물이 미부착된 리프팅 러그의 구조 건전성에 관한 연구)

  • Choi, Kyung-Shin;Kim, Ji-Jun;Choi, JeongJu
    • Journal of the Korean Society of Manufacturing Process Engineers
    • /
    • v.20 no.11
    • /
    • pp.108-114
    • /
    • 2021
  • In this study, a multivariate function was applied to the genetic algorithm for D-type lugs currently used in shipyards to closely analyze the behavioral form of weight loss without double plates. An optimal lifting lug structure design without attachments is proposed. MATLAB R2016a was used to design features by applying multivariate functions to genetic algorithms. Furthermore, the design was achieved by deriving the optimal shapes of lugs using genetic algorithms. The shapes of the designed lugs were validated for structural bonding using the structural analysis program ANSYS 2020 R2, and a robust design of lugs with no appendages was developed.

Enhancing cloud computing security: A hybrid machine learning approach for detecting malicious nano-structures behavior

  • Xu Guo;T.T. Murmy
    • Advances in nano research
    • /
    • v.15 no.6
    • /
    • pp.513-520
    • /
    • 2023
  • The exponential proliferation of cutting-edge computing technologies has spurred organizations to outsource their data and computational needs. In the realm of cloud-based computing environments, ensuring robust security, encompassing principles such as confidentiality, availability, and integrity, stands as an overarching imperative. Elevating security measures beyond conventional strategies hinges on a profound comprehension of malware's multifaceted behavioral landscape. This paper presents an innovative paradigm aimed at empowering cloud service providers to adeptly model user behaviors. Our approach harnesses the power of a Particle Swarm Optimization-based Probabilistic Neural Network (PSO-PNN) for detection and recognition processes. Within the initial recognition module, user behaviors are translated into a comprehensible format, and the identification of malicious nano-structures behaviors is orchestrated through a multi-layer neural network. Leveraging the UNSW-NB15 dataset, we meticulously validate our approach, effectively characterizing diverse manifestations of malicious nano-structures behaviors exhibited by users. The experimental results unequivocally underscore the promise of our method in fortifying security monitoring and the discernment of malicious nano-structures behaviors.

The Effect of Second-level Supervisor's Ethical Leadership on Employee' Proactive Behavior(Taking Charge Behavior, Helping Behavior): The Mediating Effect of Immediate Supervisor's Transformational Leadership (차상위 리더의 윤리적 리더십이 구성원의 선제적 행동(주도적 행동·도움행동)에 미치는 영향: 팀장의 변혁적 리더십의 매개효과를 중심으로)

  • Park, Jae-Chun;Bok, Kyoung-Soo;Kim, Ju-Seob
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.10
    • /
    • pp.730-744
    • /
    • 2016
  • This study attempt to test not only the impact of leadership(second-level supervisor's ethical leadership, immediate supervisor's transformational leadership) on followers' proactive behavior, but also the effect second-level supervisor's ethical leadership on leader's transformational leadership(i.e. TL). In particular, immediate supervisor's TL is explored as a mediating variable in the relationship between second-level supervisor's ethical leadership and followers' proactive behavior. The summary of the hierarchical regression analyses results was as follows: First, the paper showed that second-level supervisor's moral behavior was positively related to immediate supervisor's TL. But behavioral integrity and consistency across contexts was not found to play a unique role in predicting immediate supervisor's TL. Second, second-level supervisor's moral behavior was a positive impact on employee' taking charge behavior and helping behavior. and behavioral integrity was a positive impact on employee' taking charge behavior. But consistency across contexts was not found to play a unique role in predicting proactive behavior. Third, immediate supervisor's TL was a positive impact on employee' taking charge behavior and helping behavior. Finally, the effects of second-level supervisor's moral behavior on employee' proactive behavior were mediated by immediate supervisor's TL. Theoretical and practical implications of our findings as well as directions for future research are provided.

Call for an Open Discussion on Empirical Viability of Causal Indicators

  • Kim, Gi Mun;Shin, Bong Sik;Grover, Varun;Howell, Roy D.;Kim, Ki Joo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.22 no.6
    • /
    • pp.71-84
    • /
    • 2017
  • Over the past decade, we have witnessed Serious Debates in MISQ and Other Journals Between Two Camps that have Differing Views on the use of Causal Indicators to Measure Constructs. There is the Camp that advocates Causal Indicators (ADVOCATE) and the Camp that opposes Their Usage (OPPONENT). The Debates have been primarily centered on the OPPONENT's Argument that the Meaning of a Latent Variable is determined by its Outcome Variables. However, Little Effort has been made to Validate the ADVOCATE's Dispute (Against the OPPONENT's Arguments) that the Meaning of a Latent Variable is decided by its Causal Indicators if there is no Misspecification. Our Study precisely examines the Integrity of the Argument. For this, we empirically examine how the two Primary Psychometric Properties-Comprehensiveness and Interrelationship-of Causal Indicators Influence Theory Testing between Latent Variables through Three Different Tests (i.e., Comprehensive Test, Interrelationship Test, and Mixed Test). Conducted on Two Different Datasets, Our Analysis Consistently Reveals that Structural Path Coefficients are Hardly Sensitive to the Changes (i.e., Misspecification) in the Properties of Causal Indicators. The Discovery offers Important Evidence that the Sound Theoretical Logic of a Causal Model is not in Sync with the Empirical Mechanism of Parameter Estimation. This Underscores that a Latent Variable Formed by Causal Indicators is empirically an elusive notion that is Difficult to Operationalize. As Our Results have Significant Implications on the Integrity of Numerous IS studies which have conducted Theory or Hypothesis Testing Using Causal Indicators, we strongly advocate Open Discussions among Methodologists regarding Our Findings and Their Implications for Both Published IS Research and Future Practices.

Regionalism and Regional Policy (지역갈등과 지역정책)

  • 홍성웅
    • Journal of the Korean Regional Science Association
    • /
    • v.6 no.1
    • /
    • pp.1-10
    • /
    • 1990
  • Regionalism has become a liability in Korea, hampering national harmony and political stability. The regionalism finds its roots in several centuries back in history. The traditional regionalism was based on the provincial differences in cultural and social characteristics, and behavioral mannerism. Therefore, the traditional regionalism should be regarded as benign and common as in many other countries in the world. The modern version of Korean regionalism seems to be founded on the "discriminatory" treatments of Honam provinces in economic policy and the resultant regional economic disparity during the last three decades. Many believe that such "discriminatory" policy had been enforced during the period of the "third" and "fourth" republics under the influence of the key government officials and presidents form the Southeastern provinces. Since the early 80s, many public investment projects have found its home in the Honam region with the consideration of regional balance and more equitable distribution. This paper attempts to elucidate on various causes of regional disparity amplified during the period of industrialization, and also presents the economic indices which demonstrate the impacts of the policy in narrowing the economic disparity among the regions in recent years. The paper also clarifies the limits of regional economic policy in achieving regional. balance and consequently social integrity. The last part of the paper attempts to clarify the effective domain of regional policy and the new direction of regionalism.cy and the new direction of regionalism.

  • PDF

Unethical Network Attack Detection and Prevention using Fuzzy based Decision System in Mobile Ad-hoc Networks

  • Thanuja, R.;Umamakeswari, A.
    • Journal of Electrical Engineering and Technology
    • /
    • v.13 no.5
    • /
    • pp.2086-2098
    • /
    • 2018
  • Security plays a vital role and is the key challenge in Mobile Ad-hoc Networks (MANET). Infrastructure-less nature of MANET makes it arduous to envisage the genre of topology. Due to its inexhaustible access, information disseminated by roaming nodes to other nodes is susceptible to many hazardous attacks. Intrusion Detection and Prevention System (IDPS) is undoubtedly a defense structure to address threats in MANET. Many IDPS methods have been developed to ascertain the exceptional behavior in these networks. Key issue in such IDPS is lack of fast self-organized learning engine that facilitates comprehensive situation awareness for optimum decision making. Proposed "Intelligent Behavioral Hybridized Intrusion Detection and Prevention System (IBH_IDPS)" is built with computational intelligence to detect complex multistage attacks making the system robust and reliable. The System comprises of an Intelligent Client Agent and a Smart Server empowered with fuzzy inference rule-based service engine to ensure confidentiality and integrity of network. Distributed Intelligent Client Agents incorporated with centralized Smart Server makes it capable of analyzing and categorizing unethical incidents appropriately through unsupervised learning mechanism. Experimental analysis proves the proposed model is highly attack resistant, reliable and secure on devices and shows promising gains with assured delivery ratio, low end-to-end delay compared to existing approach.