• Title/Summary/Keyword: 위험대응

Search Result 1,446, Processing Time 0.028 seconds

Development of a Risk Assessment Program for Chemical Terrorism (화학적 테러에 대한 위험성 평가 프로그램 개발)

  • Lee, Younghee;Kim, Eunyong;Kim, Jinkyung;Moon, Il
    • Journal of Korean Society of societal Security
    • /
    • v.1 no.1
    • /
    • pp.63-67
    • /
    • 2008
  • This study focuses on assessing the security ri sk or the terrorism in chemical process industries. This research modifies conventional method for assessing the terrorism risk. The risk assessment method is developed and it is implemented as software to analyze the possibility of terrorism and sabotage. This program includes five steps; asset characterization, threat assessment, vulnerability analysis, risk assessment and new countermeasures. It is a systematic, risk based approach in which risk is a function of the severity of consequences of an undesired event, the likelihood of adversary attack, and the likelihood of adversary success in causing the undesired event. The reliability of the program is verified using a dock zone case. The case dock zone includes a storage farm, a manufacturing plant, an electrical supply utility, a hydrotreater unit, many containers, and administration buildings. This study represents chemical terrorism response technology, the prevention plan, and new countermeasure to mitigate by using risk assessment methods in the chemical industry and public sector. This study suggests an effective approach to the chemical terrorism response management.

  • PDF

A Study on the Safety through Response Analysis Evaluation of Pre-Anxiety Behavior and Risk Sensitivity Images (대응분석을 통한 안전·불안전 행동 및 위험감수성 이미지 평가)

  • Yu Mi Moon
    • Journal of the Society of Disaster Information
    • /
    • v.20 no.3
    • /
    • pp.471-483
    • /
    • 2024
  • Purpose: This study aimed to understand the relationship between risk-sensitive factors and safety and unsafe behavior, and to clarify the relationship between risk-sensitive factors and demographic cha- racteristics through response matching analysis. To this end, a survey was conducted on 501 construc- tion site workers and data were analyzed using the SPSS program. Method: Six factors were derived through frequency analysis, cross-analysis, exploratory factor analysis, and reliability analysis for data purification. Multiple regression analysis and response analysis were conducted. Result: Risk-sensitive sensitivity and avoidance were found to have a significant effect on safety behavior and unsafe behavior, and the relationship was found according to age and occupation. Conclusion: Taken together, it shows that safety behavior is influenced by managing individual risk sensitivity and sensitivity, and properly managing avoidance. Accordingly, it suggests that intervention is necessary to manage risk sensitivity and sensitivity to promote safety behavior and maintain a sustainable safety culture, and to prevent excessive avoidance.

A Framework Design of an Active Supply Chain Risk Management System from the Perspective of Shippers (화주 중심의 능동적인 공급망 위험관리 시스템의 프레임워크 설계)

  • Song, Byung-Jun;Ahn, Hye-Jeong;Rhee, Jong-Tae;Lee, Jong-Yun
    • The KIPS Transactions:PartA
    • /
    • v.18A no.4
    • /
    • pp.151-158
    • /
    • 2011
  • For the purpose of cost saving and sales promotion, various industry companies have introduced logistics management techniques in their field. However, enterprises faced to damages because proper products can not be provided to customers in basic logistics 3S1L(speedy, safely, surely, and low) principles for environments changing rapidly and inflexible business processes. So, we need the ability in coping with risk to handle this phenomenon. In particular, the shipper of key decisions of supply chain risk management requires continuous exchange and collection of logistics information in the third-party logistics. However the current SCRMS(Supply Chain Risk Management System) is not sufficient to cover the shipper's various needs and to recognize and respond to emergency situations. Therefore, this paper proposes an active SCRMS framework through the reconsideration about the previous research on SCRM and rearrangement of risk factors for coping with those problems. in addition, it verifies an efficiency through a stability comparison with the current system.

The construction project's risk threshold calculation methodology applying a concept of VaR (VaR개념을 응용한 건설공사 위험허용도 산정방법)

  • Kim Seon-Gyoo;Kim Jae-Jun;Kim Kyung-Rai
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • autumn
    • /
    • pp.65-72
    • /
    • 2001
  • With the recent rising project complexities and competitive environments in the construction projects, a risk management is recognized as more important management tool than the others. However, as most risk management techniques applied to the construction projects are centered around their initial phases and risk analyses, they are not developed into general project management technique such as time management, cost management and quality management, etc., that are usually applied in the process of construction. Thus, this paper proposes a response process to construction project risks based on the risk threshold and its calculation methodology applying a concept of VaR to establish risk management as general management technique in the construction projects.

  • PDF

Applicability and Utility of the Precautionary Principle in Developing Measures for CCS Risk Management (탄소 포집 및 저장(CCS) 위험 관리 방안 수립 시 사전예방원칙 적용 필요성과 유용성)

  • Yim, Hyosook
    • Journal of Environmental Policy
    • /
    • v.13 no.1
    • /
    • pp.3-23
    • /
    • 2014
  • TThe CCS, gathering attention as a practical measure against climate change, has various potential risks within itself. Identifying those risks and developing proper countermeasures for each one, therefore, is essential. Failure to take proper measures against such risks may result in significant damages and accidents, causing social anxiety and unwillingness to accept CCS. This study proposes the precautionary principle as a fundamental principle for CCS risk management. While the justifications for the precautionary principle are acceptable, there have been criticisms on its limitations including its impracticality. The purpose of this study was, therefore, to identify detailed application strategies to overcome those limitations. The risk factors related to CCS consist of quantifiable risk domains as well as a number of those with high uncertainty and ambiguity. Thus, there is a need to develop differentiated coping measures, meaning that the precautionary principle should be applied. The risk assessment and management applying the precautionary principle has implication of social appraisal based on wide participation and communication among the interested parties, which may be a useful approach for expanding social applicability.

  • PDF

A Study on Developing R&D Response Strategy to prepare Hazardous Space Situation (우주위험 대비를 위한 R&D 대응전략 연구)

  • Kim, Syeun;Cho, Sungki;Choi, Eunjung;Hong, Jeongyoo
    • Journal of Korean Society of Disaster and Security
    • /
    • v.9 no.1
    • /
    • pp.25-32
    • /
    • 2016
  • Technical development have broaden human activity ranges and make human possible to defend the disasters which was undependable in the past. However, human's space activity brought a new kind of disaster to human. In the past, natural space objects was the only concern from the space, like the asteroid fallen on Chelyabinsk, Russia. But, nowadays, by the increasing number of the man-made space objects, these space kind of threat have diversified and become very real. So, nationwide safety strategy should be established to protect the people. In this paper, we suggest three points to make the decision for establishing the strategy based on the AHP analysis results.

Comparison Study between Institutional Response to Security Risks of the EU's Revised Payment Services Directive and Domestic Electronic Finance Regulation (개정된 유럽연합 지급결제서비스지침의 보안위험에 대한 제도적인 대응과 관련 국내 전자금융 규제와의 비교 연구)

  • Kim, Hyun Boo;Kim, In Seok
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.4
    • /
    • pp.79-107
    • /
    • 2019
  • Traditionally banks and other financial institutions use customers' accounts and information managed by them and provide payment services in dominant positions. Recently, EU amends Payment Services Directive to institutionally guarantee access to customers' accounts and use of account-related information even to third parties, which facilitates competition in financial markets and promotes innovation. However, this kind of change can increase potential security risks and therefore institutional responses from financial authorities are required so that all participants in financial markets can properly respond to security risks. In this study institutional responses to the security risks in the EU's new Payment Services Directive (PSD2) are analyzed, comparisons between this and domestic electronic financial regulations are analyzed, and implications for the direction of improving domestic electronic financial regulations will be suggested.

Learning from the UK Disaster Management and Risk Assessment Systems (영국의 재난관리체계 및 재난위험성 평가제도의 도입 및 적용에 관한 연구)

  • Kim, Hak-Kyong;Kang, Wook
    • Korean Security Journal
    • /
    • no.50
    • /
    • pp.11-32
    • /
    • 2017
  • The Civil Contingencies Act 2004 in the United Kingdom provides a comprehensive definition of "Emergency", calling upon the Uk's emergency management to deal with any disaster risk regardless of cause or source. Old contingency plans for civil defense and peacetime emergencies have been integrated into current integrated emergency management. In the UK, emergencies are managed by emergency services and other responders at the local level without direct involvement of central government. On top of this, a classified assessment of the risks of civil emergencies is also conducted on a regular basis, not only at the local level but also at the national level. This research looks into the Uk's emergency management system, including recent changes, and its risk assessment systems. Finally, the research draws policy implications for the development of Korea's disaster management mechanism as follows: 1) Korea should adopt an integrated emergency management system and combine civil defense with peacetime emergency planning, 2) it should create inter-operability between emergency responding organizations such as police, fire and ambulance, and finally 3) it must develop risk evaluating tools, such as a Community Risk Register and National Risk Register, both at the local and the national level. Last but not least, the UK emergency management system cannot be directly lifted from the UK and applied to risks and hazards faced by South Korea. Therefore, cross-cultural synthesis of many national approaches to emergency management is further required particularly for customizing policy to the particular needs of Korea.

  • PDF

A Study on Risks of Big Data (빅데이터의 위험 요소에 대한 고찰)

  • Yoonsoo Cheon;Jaekyung Park
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.07a
    • /
    • pp.631-633
    • /
    • 2023
  • 본 논문에서는 빅데이터의 활용이 확산되는 현대 사회에서 빅데이터의 수집, 관리, 이용 등에서 나타날 수 있는 문제를 확인하고 그 문제에 대한 기존의 대응 방법과 보완점을 시사한다. 빅데이터의 위험성은 개인 정보유출, 디지털 디바이드, 편향성과 신뢰성, 의존성과 통제 가능성 등이 있다. 해당 문제는 빅데이터의 보편화가 가중될수록 큰 규모의 사회적 문제로 대두될 가능성이 높다. 이를 보완하기 위한 대응 방법을 크게 기술적 대응, 법적 대응, 사회적 대응으로 나누어 알아보고 각 부분의 취약점을 분석하여 개선의 방향을 제시한다.

  • PDF

A Deep Learning-Based Smartphone Phishing Attacks Countermeasures (딥러닝 기반 스마트폰 피싱 공격 대응 방법)

  • Lee, Jae-Kyung;Seo, Jin-Beom;Cho, Young-Bok
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2022.07a
    • /
    • pp.321-322
    • /
    • 2022
  • 스마트폰 사용자가 늘어남에 따라 갖춰줘야 할 보안성이 취약하여, 다양한 바이러스 및 악성코드 위험에 노출되어 있다. 안드로이드는 운영체제 중 가장 많이 사용되는 운영체제로, 개방성이 높으며 수많은 악성 앱 및 바이러스가 마켓에 존재하여 위험에 쉽게 노출된다. 2년 넘게 이어진 코로나 바이러스(Covid-19)으로 인해 꾸준히 위험도가 높아진 피싱공격(Phshing attack)은 현재 최고의 스마트폰 보안 위협 Top10에 위치한다. 본 논문에서는 딥러닝 기반 자연어처리 기술을 통해 피싱 공격 대응 방법 제안 및 실험 결과를 도출하고, 또한 향후 제안 방법을 보완하여 피싱 공격 및 다양한 모바일 보안 위협에 대응할 수 있는 앱을 설계할 것이다.

  • PDF