• Title/Summary/Keyword: 위협 및 오류관리

Search Result 14, Processing Time 0.027 seconds

A Study on Flight Crew Cabin Threats

  • Jin-Kook Choi
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.31 no.2
    • /
    • pp.116-121
    • /
    • 2023
  • 항공 사고는 첨단 항공 기술의 발달로 꾸준히 감소해 왔지만, 여전히 발생하고 있다. 조종사는 목적지 공항까지 안전하고 효율적으로 비행하기 위해 위협과 오류를 관리해야 한다. 조종사에게 영향을 미치는 위협은 환경적 위협과 항공사 위협으로 나눌 수 있으며, 환경사위협에는 객실 위협이 포함된다. 조종사와 객실 승무원은 정상적인 운항 중에는 협력이 필요하며, 비상시에는 안전한 비행을 위해 효과적인 협력이 절대적으로 필요하다. 조종사가 비행 중에 간섭이나 작업 흐름의 중단이 발생할 때 에러를 할 가능성이 높아진다. 항공사들은 안전 운항을 방해할 수 있는 객실위협의 종류를 적극적으로 식별하고 분석하여, 조종사들이 안전한 비행을 유지하기 위해서 위협을 관리하도록 절차 및 훈련을 개선해야 한다. 본 연구는 안전관리시스템(SMS)의 안전도구인 LOSA(Line Operation Safety Audit)를 기반으로 기내위협의 유형을 파악하고, 항공사들에게 조종실위협 관리를 체계적으로 개선하는 데 필요한 객실위협과 간섭에 대한 자료를 제공하고자 한다.

A study of the threats towards the flight crew (민간항공사의 운항승무원에 영향을 주는 위협관리에 관한 연구)

  • Choi, Jin-Kook;Kim, Chil-Young
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.18 no.2
    • /
    • pp.54-59
    • /
    • 2010
  • The flight deck crew must manage complexity during daily flight operations. The Airline may obtain data regarding threats and errors through LOSA(Line Operations Safety Audits) on normal flights as predictive safety tool in Safety Management System of the Airline to actively improve the systems such as SOP(Standard Operation Procedure), training, evaluation and the TEM(Threat and Error Management) for the flight deck crew. The flight deck crew make errors when they fail managing threats. The crew mismanage around ten percent of threats and commit errors. The major mismanaged threats are aircraft malfunction, ATC(Air Traffic Communication), and wether threats. The effective countermeasures of TEM for manageing threats are leadership, workload management, monitor & cross check, Vigilance, communication environment and cooperation of the crew. It is important that organizations must monitor for the hazards of threats and improve system for the safer TEM environments.

The Analysis of the Major Accidents caused by Fatigue of Pilot with TEM (조종사 피로에 의한 항공사고의 TEM 적용을 통한 공통요인 도출에 관한 연구)

  • Jeon, Seung-Joon;Choi, Jin-Kook
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.12
    • /
    • pp.157-165
    • /
    • 2019
  • Charles Lindbergh has experienced the uncontrolled situation of the aircraft while he was asleep with open eyes during his Atlantic crossing flight around 20 hours after departure from the New York in 1927 because of the fatigue. According to the NTSB(National Transportation Safety Board) reports, about 40 incidents are related fatigue in each year. The sleep loss is the most wanted item for the NTSB and may cause the similar effect as the alcohol does. The fatigue may affect the management of the threats and errors especially during take-off and landing. In this study, threats and errors of major accidents that NTSB analysed fatigue as a causal factor will be identified in order to understand the seriousness of fatigue.

A Study on the Observer Training and Implementation for Effective Normal Operation Safety Survey (NOSS)

  • Choi, Jin-Kook;Choi, Se-Jong
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.29 no.2
    • /
    • pp.111-116
    • /
    • 2021
  • Normal Operation Safety Survey (NOSS) is a safety management tool used by air traffic control organizations to measure data related to threats and errors to proactively prevent accidents before they occur. NOSS was developed to be applied to the air traffic control field according to the concept of Line Operation Safety Audit (LOSA) conducted by airlines to reduce human errors in the cockpits. Safety management based on data is crucial for the prevention of control-related accidents, and the competency of observers for this is important for the successful implementation of NOSS. Based on LOSA implementation experiences and expert interviews, this paper introduces the international NOSS methods and discusses the key factors required for effective observation and the implementation methods and implications of NOSS observer training.

A Proposition on Elevator Safety System using Expert's Decision (전문가의 의사결정을 이용한 안전한 엘리베이터 시스템 제안)

  • Park, Ju-Bong;Shin, Seung-Jung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.4
    • /
    • pp.121-125
    • /
    • 2014
  • Recently, many of people concentrates on the importance of elevator safety system for the elevator accident of traction machine malfunction. Also, IT convergence has enlarged various field for the effort of enhanced traditional industry. In this paper, we define that the safety is to minimize the dangerous factor, then explain the rules of elevator installation. Through the expert's decision we could find out the dangerous factors are poor check, malfunction of amalgamative and user's mistake. We propose the IT convergence managing system for the effective alternative method of elevator safety system.

A Case Study on Aircraft Accidents Due to Air Traffic Controller's Human Error - Applying TEM (Threat & Error Management) Analysis - (항공교통관제사의 휴먼에러에 기인한 국내외 항공기 사고 사례연구 - TEM(Threat & Error Management) 분석법을 적용하여 -)

  • Kim, Jung-Bin;Park, Sung-Sik
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.29 no.4
    • /
    • pp.124-133
    • /
    • 2021
  • The airline industry has been growing steadily since 2016 with more than 100 million air passengers, renewing the largest number of air passengers every year. Increasing air demand leads to an increase in air traffic in limited airspace, increasing the likelihood of accidents between aircraft. Due to the massive human and material damage caused by a single mistake, aviation safety is being heavily focused around the world to efficiently use limited airspace. Studies related to various human factors are underway as most of the aviation accidents are found to be caused by human factors, but research on human factors by controllers is insufficient while they are active in terms of control and operation. Given that 82% of air accidents caused by controllers are caused by human error, the importance of management of human error and changes in perception are urgently needed. This study aims to understand the seriousness of the controller's human error by analyzing the accident cases caused by the controller's human error using TEM to identify threats and errors and derive common human factors.

Research on Countermeasures of Controller Area Network Vulnerability (Controller Area Network 취약점 분석 및 대응 방안 연구)

  • Hong, Sunghyuck
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.5
    • /
    • pp.115-120
    • /
    • 2018
  • As the number ofconnected cars grows, the security of the connected cars is becoming more important. There are also increasing warnings about the threat of attacks via the CAN bus used for in-vehicle networks. An attack can attack through a vulnerability in the CAN bus because the attacker can access the CAN bus remotely, or directly to the vehicle, without a security certificate on the vehicle, and send a malicious error message to the devices connected to the CAN bus. A large number of error messages put the devices into a 'Bus-Off' state, causing the device to stop functioning. There is a way to detect the error frame, or to manage the power of the devices related to the bus, but eventually the new standard for the CAN bus will be the fundamental solution to the problem. If new standards are adopted in the future, they will need to be studied.

An Assurance Mechanism of Intrusion Data for Making Digital Evidence in Digital Computing Environment (디지털 컴퓨팅 환경의 디지털 증거화를 위한 침해 데이터보증 메커니즘)

  • Jang, Eun-Gyeom
    • Journal of Internet Computing and Services
    • /
    • v.11 no.4
    • /
    • pp.129-141
    • /
    • 2010
  • In digital computing environment, for the mal functions in appliances and system errors, the unaccepted intrusion should be occurred. The evidence collecting technology uses the system which was damaged by intruders and that system is used as evidence materials in the court of justice. However the collected evidences are easily modified and damaged in the gathering evidence process, the evidence analysis process and in the court. That’s why we have to prove the evidence’s integrity to be valuably used in the court. In this paper, we propose a mechanism for securing the reliability and the integrity of digital evidence that can properly support the Computer Forensics. The proposed mechanism shares and manages the digital evidence through mutual authenticating the damaged system, evidence collecting system, evidence managing system and the court(TTP: Trusted Third Party) and provides a secure access control model to establish the secure evidence management policy which assures that the collected evidence has the corresponded legal effect.

Anura Call Monitoring Data Collection and Quality Management through Citizen Participation (시민참여형 무미목 양서류 음성신호 수집 및 품질관리 방안)

  • Kyeong-Tae Kim;Hyun-Jung Lee;Won-Kyong Song
    • Korean Journal of Environment and Ecology
    • /
    • v.38 no.3
    • /
    • pp.230-245
    • /
    • 2024
  • Amphibians, sensitive to external environmental changes, serve as bioindicator species for assessing alterations or disturbances in local ecosystems. It is known that one-third of amphibian species within the order Anura are at risk of extinction due to anthropogenic threats such as habitat destruction and fragmentation caused by urbanization. To develop effective protection and conservation strategies for anuran amphibians, species surveys that account for population characteristics are essential. This study aimed to investigate the potential for citizen participation in ecological monitoring using the mating calls of anura species. We also proposed suitable quality control measures to mitigate errors and biases, ensuring the extraction of reliable species occurrence data. The Citizen Science project was carried out nationwide from April 1 to August 31, 2022, targeting 12 species of anura amphibians in Korea. Citizens voluntarily participated in voice signal monitoring, where they listened to anura species' mating calls and recorded them using a mobile application. Additionally, we established a quality control process to extract reliable species occurrence data, categorizing errors and biases from citizen-collected data into three levels: omission, commission, and incorrect identification. A total of 6,808 observations were collected during the citizen participation in anura species vocalization monitoring. Through the quality control process, errors and biases were identified in 1,944 (28.55%) of the 6,808 data. The most common type of error was omission, accounting for 922 cases (47.43%), followed by incorrect identification with 540 cases (27.78%), and commission with 482 cases (24.79%). During the Citizen Science project, we successfully recorded the mating calls of 10 out of the 12 anuran amphibian species in Korea, excluding the Asian toads (Bufo gargarizans Cantor), Korean brown frog (Rana coreana). Difficulties in collecting mating calls were primarily attributed to challenges in observing due to population decline or discrepancies between the breeding season of non-emergent individuals and the timing of the citizen science project. This study represents the first investigation of distribution status and species emergence data collection through mating calls of anura species in Korea based on citizen participation. It can serve as a foundation for designing future bioacoustic monitoring that incorporates citizen science and quality control measures for citizen science data.

Study of Snort Intrusion Detection Rules for Recognition of Intelligent Threats and Response of Active Detection (지능형 위협인지 및 능동적 탐지대응을 위한 Snort 침입탐지규칙 연구)

  • Han, Dong-hee;Lee, Sang-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1043-1057
    • /
    • 2015
  • In order to recognize intelligent threats quickly and detect and respond to them actively, major public bodies and private institutions operate and administer an Intrusion Detection Systems (IDS), which plays a very important role in finding and detecting attacks. However, most IDS alerts have a problem that they generate false positives. In addition, in order to detect unknown malicious codes and recognize and respond to their threats in advance, APT response solutions or actions based systems are introduced and operated. These execute malicious codes directly using virtual technology and detect abnormal activities in virtual environments or unknown attacks with other methods. However, these, too, have weaknesses such as the avoidance of the virtual environments, the problem of performance about total inspection of traffic and errors in policy. Accordingly, for the effective detection of intrusion, it is very important to enhance security monitoring, consequentially. This study discusses a plan for the reduction of false positives as a plan for the enhancement of security monitoring. As a result of an experiment based on the empirical data of G, rules were drawn in three types and 11 kinds. As a result of a test following these rules, it was verified that the overall detection rate decreased by 30% to 50%, and the performance was improved by over 30%.