• Title/Summary/Keyword: 위협 및 오류관리

Search Result 13, Processing Time 0.023 seconds

A Study on Flight Crew Cabin Threats

  • Jin-Kook Choi
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.31 no.2
    • /
    • pp.116-121
    • /
    • 2023
  • 항공 사고는 첨단 항공 기술의 발달로 꾸준히 감소해 왔지만, 여전히 발생하고 있다. 조종사는 목적지 공항까지 안전하고 효율적으로 비행하기 위해 위협과 오류를 관리해야 한다. 조종사에게 영향을 미치는 위협은 환경적 위협과 항공사 위협으로 나눌 수 있으며, 환경사위협에는 객실 위협이 포함된다. 조종사와 객실 승무원은 정상적인 운항 중에는 협력이 필요하며, 비상시에는 안전한 비행을 위해 효과적인 협력이 절대적으로 필요하다. 조종사가 비행 중에 간섭이나 작업 흐름의 중단이 발생할 때 에러를 할 가능성이 높아진다. 항공사들은 안전 운항을 방해할 수 있는 객실위협의 종류를 적극적으로 식별하고 분석하여, 조종사들이 안전한 비행을 유지하기 위해서 위협을 관리하도록 절차 및 훈련을 개선해야 한다. 본 연구는 안전관리시스템(SMS)의 안전도구인 LOSA(Line Operation Safety Audit)를 기반으로 기내위협의 유형을 파악하고, 항공사들에게 조종실위협 관리를 체계적으로 개선하는 데 필요한 객실위협과 간섭에 대한 자료를 제공하고자 한다.

A study of the threats towards the flight crew (민간항공사의 운항승무원에 영향을 주는 위협관리에 관한 연구)

  • Choi, Jin-Kook;Kim, Chil-Young
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.18 no.2
    • /
    • pp.54-59
    • /
    • 2010
  • The flight deck crew must manage complexity during daily flight operations. The Airline may obtain data regarding threats and errors through LOSA(Line Operations Safety Audits) on normal flights as predictive safety tool in Safety Management System of the Airline to actively improve the systems such as SOP(Standard Operation Procedure), training, evaluation and the TEM(Threat and Error Management) for the flight deck crew. The flight deck crew make errors when they fail managing threats. The crew mismanage around ten percent of threats and commit errors. The major mismanaged threats are aircraft malfunction, ATC(Air Traffic Communication), and wether threats. The effective countermeasures of TEM for manageing threats are leadership, workload management, monitor & cross check, Vigilance, communication environment and cooperation of the crew. It is important that organizations must monitor for the hazards of threats and improve system for the safer TEM environments.

The Analysis of the Major Accidents caused by Fatigue of Pilot with TEM (조종사 피로에 의한 항공사고의 TEM 적용을 통한 공통요인 도출에 관한 연구)

  • Jeon, Seung-Joon;Choi, Jin-Kook
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.12
    • /
    • pp.157-165
    • /
    • 2019
  • Charles Lindbergh has experienced the uncontrolled situation of the aircraft while he was asleep with open eyes during his Atlantic crossing flight around 20 hours after departure from the New York in 1927 because of the fatigue. According to the NTSB(National Transportation Safety Board) reports, about 40 incidents are related fatigue in each year. The sleep loss is the most wanted item for the NTSB and may cause the similar effect as the alcohol does. The fatigue may affect the management of the threats and errors especially during take-off and landing. In this study, threats and errors of major accidents that NTSB analysed fatigue as a causal factor will be identified in order to understand the seriousness of fatigue.

A Study on the Observer Training and Implementation for Effective Normal Operation Safety Survey (NOSS)

  • Choi, Jin-Kook;Choi, Se-Jong
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.29 no.2
    • /
    • pp.111-116
    • /
    • 2021
  • Normal Operation Safety Survey (NOSS) is a safety management tool used by air traffic control organizations to measure data related to threats and errors to proactively prevent accidents before they occur. NOSS was developed to be applied to the air traffic control field according to the concept of Line Operation Safety Audit (LOSA) conducted by airlines to reduce human errors in the cockpits. Safety management based on data is crucial for the prevention of control-related accidents, and the competency of observers for this is important for the successful implementation of NOSS. Based on LOSA implementation experiences and expert interviews, this paper introduces the international NOSS methods and discusses the key factors required for effective observation and the implementation methods and implications of NOSS observer training.

A Proposition on Elevator Safety System using Expert's Decision (전문가의 의사결정을 이용한 안전한 엘리베이터 시스템 제안)

  • Park, Ju-Bong;Shin, Seung-Jung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.4
    • /
    • pp.121-125
    • /
    • 2014
  • Recently, many of people concentrates on the importance of elevator safety system for the elevator accident of traction machine malfunction. Also, IT convergence has enlarged various field for the effort of enhanced traditional industry. In this paper, we define that the safety is to minimize the dangerous factor, then explain the rules of elevator installation. Through the expert's decision we could find out the dangerous factors are poor check, malfunction of amalgamative and user's mistake. We propose the IT convergence managing system for the effective alternative method of elevator safety system.

A Case Study on Aircraft Accidents Due to Air Traffic Controller's Human Error - Applying TEM (Threat & Error Management) Analysis - (항공교통관제사의 휴먼에러에 기인한 국내외 항공기 사고 사례연구 - TEM(Threat & Error Management) 분석법을 적용하여 -)

  • Kim, Jung-Bin;Park, Sung-Sik
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.29 no.4
    • /
    • pp.124-133
    • /
    • 2021
  • The airline industry has been growing steadily since 2016 with more than 100 million air passengers, renewing the largest number of air passengers every year. Increasing air demand leads to an increase in air traffic in limited airspace, increasing the likelihood of accidents between aircraft. Due to the massive human and material damage caused by a single mistake, aviation safety is being heavily focused around the world to efficiently use limited airspace. Studies related to various human factors are underway as most of the aviation accidents are found to be caused by human factors, but research on human factors by controllers is insufficient while they are active in terms of control and operation. Given that 82% of air accidents caused by controllers are caused by human error, the importance of management of human error and changes in perception are urgently needed. This study aims to understand the seriousness of the controller's human error by analyzing the accident cases caused by the controller's human error using TEM to identify threats and errors and derive common human factors.

Research on Countermeasures of Controller Area Network Vulnerability (Controller Area Network 취약점 분석 및 대응 방안 연구)

  • Hong, Sunghyuck
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.5
    • /
    • pp.115-120
    • /
    • 2018
  • As the number ofconnected cars grows, the security of the connected cars is becoming more important. There are also increasing warnings about the threat of attacks via the CAN bus used for in-vehicle networks. An attack can attack through a vulnerability in the CAN bus because the attacker can access the CAN bus remotely, or directly to the vehicle, without a security certificate on the vehicle, and send a malicious error message to the devices connected to the CAN bus. A large number of error messages put the devices into a 'Bus-Off' state, causing the device to stop functioning. There is a way to detect the error frame, or to manage the power of the devices related to the bus, but eventually the new standard for the CAN bus will be the fundamental solution to the problem. If new standards are adopted in the future, they will need to be studied.

An Assurance Mechanism of Intrusion Data for Making Digital Evidence in Digital Computing Environment (디지털 컴퓨팅 환경의 디지털 증거화를 위한 침해 데이터보증 메커니즘)

  • Jang, Eun-Gyeom
    • Journal of Internet Computing and Services
    • /
    • v.11 no.4
    • /
    • pp.129-141
    • /
    • 2010
  • In digital computing environment, for the mal functions in appliances and system errors, the unaccepted intrusion should be occurred. The evidence collecting technology uses the system which was damaged by intruders and that system is used as evidence materials in the court of justice. However the collected evidences are easily modified and damaged in the gathering evidence process, the evidence analysis process and in the court. That’s why we have to prove the evidence’s integrity to be valuably used in the court. In this paper, we propose a mechanism for securing the reliability and the integrity of digital evidence that can properly support the Computer Forensics. The proposed mechanism shares and manages the digital evidence through mutual authenticating the damaged system, evidence collecting system, evidence managing system and the court(TTP: Trusted Third Party) and provides a secure access control model to establish the secure evidence management policy which assures that the collected evidence has the corresponded legal effect.

Study of Snort Intrusion Detection Rules for Recognition of Intelligent Threats and Response of Active Detection (지능형 위협인지 및 능동적 탐지대응을 위한 Snort 침입탐지규칙 연구)

  • Han, Dong-hee;Lee, Sang-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1043-1057
    • /
    • 2015
  • In order to recognize intelligent threats quickly and detect and respond to them actively, major public bodies and private institutions operate and administer an Intrusion Detection Systems (IDS), which plays a very important role in finding and detecting attacks. However, most IDS alerts have a problem that they generate false positives. In addition, in order to detect unknown malicious codes and recognize and respond to their threats in advance, APT response solutions or actions based systems are introduced and operated. These execute malicious codes directly using virtual technology and detect abnormal activities in virtual environments or unknown attacks with other methods. However, these, too, have weaknesses such as the avoidance of the virtual environments, the problem of performance about total inspection of traffic and errors in policy. Accordingly, for the effective detection of intrusion, it is very important to enhance security monitoring, consequentially. This study discusses a plan for the reduction of false positives as a plan for the enhancement of security monitoring. As a result of an experiment based on the empirical data of G, rules were drawn in three types and 11 kinds. As a result of a test following these rules, it was verified that the overall detection rate decreased by 30% to 50%, and the performance was improved by over 30%.

Analysis of Aircraft Upset through TEM and Improvement of UPRT (항공기 비정상 자세 사고의 TEM 분류 및 UPRT 향상에 관한 연구)

  • Choi, Jin-Kook;Jeon, Seung-Joon
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.11
    • /
    • pp.365-374
    • /
    • 2019
  • Loss of Control in Flight(LOC-I) due to aircraft upset attitude has the highest air accident rate, and International Aviation Institute such as ICAO and FAA recommended flight crew to operate aircraft safely through UPRT(Upset Prevention & Recovery Training) program. ICAO has selected Loss of Control(LOC) as key safety indicator, and recommended to respond using TEM(Threat and Error Management). However there are not much specific treats and errors classified for UPRT programs using real TEM based on evidences. This study intends to consider the importance of UPRT through the introduction of UPRT and accident analysis using TEM. Typical upset accidents were classified to common threats as IFR, inadequate training, Automation surprise, and inexperienced copilots. The common errors were cross-check, speed and altitude deviation, callouts, communication, thrust and stall action fail. The undesired aircraft states were inadequate automation mode, Deviation of speed and vertical, stall, and crash. These suggest areas to improve UPRT.