• Title/Summary/Keyword: public certificate

Search Result 336, Processing Time 0.025 seconds

Cigarette Smoking, Alcohol Consumption, Tuberculosis and Risk of Lung Cancer: The Korean Multi-center Cancer Cohort Study (흡연, 음주, 폐결핵과 폐암 발생 위험에 관한 코호트 연구)

  • Bae, Ji-Suk;Gwack, Jin;Park, Sue-Kyung;Shin, Hai-Rim;Chang, Soung-Hoon;Yoo, Keun-Young
    • Journal of Preventive Medicine and Public Health
    • /
    • v.40 no.4
    • /
    • pp.321-328
    • /
    • 2007
  • Objectives : The aim of this study was to evaluate the roles of cigarette smoking, alcohol consumption, tuberculosis, and their interactions in the risk of lung cancer in a Korean cohort. Methods : The study subjects comprised 13,150 males and females aged above 20 years old. During the follow up period from 1993 to 2002, 79 lung cancer cases were identified by the central cancer registry and the national death certificate database. Information on cigarette smoking, alcohol consumption and the history of physician-diagnosed tuberculosis was obtained by interview. Indirect chest X-ray findings were also evaluated to ascertain tuberculosis cases. Cox proportional hazard models were used to estimate relative risks (RR) and 95% confidence intervals (CI) after adjusting for age and gender. Results : Cigarette smoking was statistically significantly associated with an increased risk of lung cancer [for current smokers, RR = 2.33 (95% CI = 1.23 - 4.42) compared to non-smokers]. After further adjustment for cigarette smoking, both alcohol consumption and tuberculosis showed no statistically significant association with the risk of lung cancer [for current drinkers, RR = 0.80 (95% CI = 0.48 - 1.33) compared to non-drinkers] [for tuberculosis cases, RR = 1.17 (95% CI = 0.58 - 2.36) compared to non-cases]. There was no statistically significant interaction between cigarette smoking and alcohol consumption (p-interaction = 0.38), or cigarette smoking and tuberculosis (p-interaction = 0.74). Conclusions : Although cigarette smoking was confirmed as a risk factor of lung cancer in this cohort study, this study suggests that alcohol consumption and tuberculosis may not be associated with the risk of lung cancer.

A Study on the Factors Affecting Career Patterns of Korean Female Librarians (한국 여성사서의 직력유형(職歷類型)에 영향을 미치는 요인에 관한 연구)

  • Choi Eun Ju
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.21
    • /
    • pp.103-140
    • /
    • 1991
  • Knowledge about career patterns of women In any profession and about factors which influence these career patterns becomes increasingly necessary because of the influx of ever-increasing numbers of women into the labor force, and the need for the development and utilization of the creative productivity of women. This study alms to investigate Korean female librarians' overall career patterns and verify relevant factors which might affect to their career patterns. As an instrument, self-reported questionnaires were sent to 1,251 full-time Korean female librarians throughout the country with regular librarian's certificate, currently engaging in public, college or university, and special libraries. Based on the data gathered, the interrelationship between their career pattern inclination and its influential factors were examined through hypothesis testing. Major findings of the survey are outlined in the following: 1). Female librarians' career patterns were classified into five categories with the group represented as Categories-2 (single; wishes to continue working after marriage; places an emphasis on the sense of occupational accomplishment and social prestige) accounted for the highest proportion$(33.4\%)$. 2). The result of the hypothesis testing revealed that there is no significant relationship statistically between social factors(parents' socio-economic status, etc.) and female librarians' career patterns. So the hypothesis concerning social factors were rejected. 3). In psychological factors(job satisfaction ; self-concept sex role attitude ; role conflict ; and achievement motivation), all except for self-concept were shown to be relevant with female librarians' stable career pattern. So the hypotheses concerning psychological factors were supported. 4). According to the result of multiple discriminant analysis conducted between the above four statistically significant psychological factors and career patterns, the most influential factor for female librarians' career patterns was job satisfaction and sex role. In conclusion, the following recommendations were made: For overall enhancement of Korean female librarianship, earlier career guidance and concrete sex role education for young women is urgent which enable them to establish correct viewpoint for their occupational career female librarians themselves' constant endeavor In maintaining positive attitude toward their job is required.

  • PDF

Measuring the Burden of Major Cancers in Korea Using Healthy Life-Year (HeaLY) (건강생활년을 이용한 우리 나라 주요 암 질환의 질병부담 측정)

  • Yoon, Seok-Jun;Kim, Chang-Yup;Shin, Young-Soo;Choi, Yong-Jun
    • Journal of Preventive Medicine and Public Health
    • /
    • v.34 no.4
    • /
    • pp.372-378
    • /
    • 2001
  • Objectives : This study introduced the healthy life-year(HeaLY), a composite indicator of disease burden, and used it to estimate the burden of major cancers in Korea. Methods : We collected data from the national death certificate database, the national health insurance claims database and the abridged life table. This data was used to create a spreadsheet and estimate the burden of major cancers by sex in terms of HeaLYs. Results : The burden of 10 major cancers for males was 2,248.97 person-year in terms of HeaLYs. Stomach cancer, liver cancer, and lung cancer were responsible for 75.2% of the burden of 10 major cancers. The disease burden of 10 major cancers for females was estimated to be 1,567.58 person-years. About two thirds of HeaLYs lost were from stomach cancer, liver cancer, lung cancer, colorectal cancer, and breast cancer. The rankings among 10 major cancers were somewhat different in terms of both HeaLYs and deaths as the HeaLY method considers both mortality and morbidity. Conclusions : Despite the limitations of the data sources, we conclude that HeaLY can aid in setting policy priorities concerning major cancers by estimating the disease burden of these cancers. Time-series analysis of the disease burden using HeaLY and DALY will elucidate the strengths and weaknesses of both methods.

  • PDF

An Improved Protocol for the Secure Mobile IPv6 Binding Updates (안전한 모바일 IPv6 바인딩 갱신을 위한 개선된 프로토콜)

  • You, Il-Sun;Won, You-Seuk;Cho, Kyung-San
    • The KIPS Transactions:PartC
    • /
    • v.11C no.5
    • /
    • pp.605-612
    • /
    • 2004
  • In MIPv6, unauthenticated binding updates expose the involved MN and CN to various security attacks. Thus, protecting the binding update process becomes of paramount importance in the MIPv6, and several secure binding update protocols have been proposed. In this paper, we pro-pose a novel protocol for the secure binding updates in MIPv6, which can resolve the drawbacks of the Deng-Zhou-Bao's protocol [2], by adopt-ing Aura's CGA scheme with two hashes [9]. Aura's scheme enables our protocol to achieve stronger security than other CGA-based protocols without a trusted CA, resulting in less cost of verifying the HA's public key than the Deng-Zhou-Bao's protocol. Through the comparison of our protocol with other protocols such as the Deng-Zhou-Bao's protocol, CAM-DH and SUCV, we show that our protocol can provide better performance and manageability in addition to stronger security than other approaches.

DTLS-based CoAP Security Mechanism Analysis and Performance Evaluation (DTLS 기반의 CoAP 보안 메커니즘 분석 및 성능평가)

  • Han, Sang woo;Park, Chang seop;Cho, Jung mo
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.3-10
    • /
    • 2017
  • Standard Protocol Optimized for Resource-Constrained IoT Environment Constrained Application Protocol (CoAP) supports web-based communication between a sensor node in the IoT environment and a client on the Internet. The CoAP is a Request / Response model that responds to the client's CoAP Request message by responding with a CoAP Response message from the server. CoAP recommends the use of CoAP-DTLS for message protection. However, validation of the use of DTLS in the IoT environment is underway. We analyze CoAP and DTLS security mode, evaluate performance of secure channel creation time, security channel creation step time, and RAM / ROM consumption through Cooja simulator and evaluate the possibility of real environment application.

Military Application of Two-factor Authentication to Data Leakage and Access Prevention (데이터 유출 및 접근방지를 위한 이중 인증방식의 군(軍) 적용방안)

  • Jung, Ui Seob;Kim, Jee Won;Kim, Jae Hyun;Jeong, Chan ki
    • Convergence Security Journal
    • /
    • v.18 no.5_2
    • /
    • pp.21-27
    • /
    • 2018
  • Most of the Internet users in Korea are issued certificates and use them for various tasks. For this reason, it is recommended that accredited certification authorities and security related companies and use public certificates on USB memory and portable storage devices rather than on the user's desktop. Despite these efforts, the hacking of the certificate has been continuously occurring and the financial damage has been continuing. Also, for security reasons, our military has disabled USB to general military users. Therefore, this study proposes a two-factor method using the unique information of the USB memory and the PC which is owned by the user, and suggests a method of managing the private key file secure to the general user. Furthermore, it will be applied to national defense to contribute to the prevention of important data and prevention of access by unauthorized persons.

  • PDF

Blockchain-based new identification system (블록체인 기반 새로운 신원확인 체계)

  • Jung, Yong-Hoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.2
    • /
    • pp.452-458
    • /
    • 2021
  • The value and importance of personal information are increasing due to the increasing number of fields where the Internet environment and computing environment are used, and user authentication technology is also changing. Until now, accredited certificates, which are mainly used in the financial sector, are being replaced with biometric authentication technology due to the problem of revocation. However, another problem is that biometric information cannot be modified once it is leaked. Recently, with the advent of blockchain technology, research on user authentication methods has actively progressed. In this paper, both public certificate and blockchain-based user authentication can be used without system change, and a new DID issuance and reissuance method that can replace the resident registration number is presented. The proposed system can be used without restrictions in a blockchain. However, the currently used DID requires installation of an application at the Interworking Support Center for verification. Since a DID can be authenticated without registering as a member, indiscriminate information collection can be prevented. Security, convenience, and determinism are compared with the existing system, and excellence is proven based on various attack methods, its portability, and proxy use.

An Implementation of NEIS′DB Security Using RBAC based on PMI (PMI기반의 RBAC를 이용한 NEIS의 DB 보안 구현)

  • Ryoo Du-Gyu;Moon Bong-Keun;Jun Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.6
    • /
    • pp.31-45
    • /
    • 2004
  • Public Key Infrastructure(PKI) provides a strong authentication. Privilege Management Infrastructure(PMI) as a new technology can provide user's attribute information. The main function of PMI is to give more specified authority and role to user. To authenticate net and role, we have used digital signature. Role Based Access Control(RBAC) is implemented by digital signature. RBAC provides some flexibility for security management. NEIS(National Education Information System) can not always provide satisfied quality of security management. The main idea of the proposed RNEIS(Roll Based NEIS) is that user's role is stored in AC, access control decisions are driven by authentication policy and role. Security manager enables user to refer to the role stored in user's AC, admits access control and suggests DB encryption by digital signature.

A Study on Needs for Information Design Development of Civil Affair Registration Form Design by User-Experience-Perspective (Focusing on Birth Registration Form) (사용자경험 관점으로 분석한 문서양식 정보디자인의 개선점 연구: 지류 출생신고서를 중심으로)

  • Kim, Jhonghee
    • Journal of Digital Convergence
    • /
    • v.20 no.3
    • /
    • pp.447-457
    • /
    • 2022
  • Form design for information registration should consider and classify various possible cases and each user case and reflect it in the design. In this paper, I analyzed the visual and emotional factors of information design that elicit positive emotions from the user experience point of view, focusing on the birth certificate of among other public documents issued by the government. In order to derive problems and supplements from the user's overall writing experience point of view, Keller's Motivational Behavior Construction Model was used. The process of writing the birth registration form creates recognition, reasoning, relationship, establishment, achievement, expectation. In order to more actively draw an emotional point of view, it is essential to set of information and to materialize the information experience. It is hoped that this will be a good guideline in the process of presenting a new perspective on information design and improving the experience.

Evaluating the knowledge, attitude, perception, and readiness of caregivers of under 5-year-old children to accept malaria vaccine in Nigeria

  • Blessing Nkechi Emmanuel;Abubakar Nuhu Ishaq;Olisaemeka Zikora Akunne;Umar Faruk Saidu
    • Clinical and Experimental Vaccine Research
    • /
    • v.13 no.2
    • /
    • pp.121-131
    • /
    • 2024
  • Purpose: The global burden of disease and mortality is greatly influenced by malaria, particularly in children. Nigeria alone accounts for about 25% of global malaria cases and fatalities. Despite efforts to control and eliminate malaria, conventional treatments have limitations, prompting the need for a vaccine. However, while efforts have focused on researching and developing malaria vaccines, less attention has been given to public acceptance and preparedness for vaccination. Materials and Methods: The study employed a cross-sectional approach to assess the knowledge, perceptions, and readiness of caregivers towards the malaria vaccine. Data were collected through a physical and online survey among a representative sample of caregivers across the six geopolitical regions of Nigeria. The data was analyzed using principal component analysis and percentages. Results: Out of 347 respondents, 180 (51%) men, 165 (46.6%) women, 2 (0.5%) transgender, 156 (45%) rural settlers, and 191 (55%) urban settlers were identified in this study. The study reported an overall acceptance rate of 78.4% and 21.6% resistance rate. The age group between 21-30 years recorded the highest 207 (59.6%). A significant number of participants, 252 (59.6%), held at least a higher or post-secondary certificate, out of which 193 (55.6%) demonstrated strong readiness to accept the malaria vaccine. The study showed that fear of adverse effects was the main reason for malaria vaccine resistance among caregivers. Conclusion: This study's findings offer valuable insights into caregivers' knowledge about the malaria vaccine, highlighting the factors that impact the acceptance of the malaria vaccine.