• 제목/요약/키워드: Administrative controls

검색결과 37건 처리시간 0.028초

Tuberculosis Infection Control in Health-Care Facilities: Environmental Control and Personal Protection

  • Lee, Ji Yeon
    • Tuberculosis and Respiratory Diseases
    • /
    • 제79권4호
    • /
    • pp.234-240
    • /
    • 2016
  • Transmission of tuberculosis (TB) is a recognized risk to patients and healthcare workers in healthcare settings. The literature review suggests that implementation of combination control measures reduces the risk of TB transmission. Guidelines suggest a three-level hierarchy of controls including administrative, environmental, and respiratory protection. Among environmental controls, installation of ventilation systems is a priority because ventilation reduces the number of infectious particles in the air. Natural ventilation is cost-effective but depends on climatic conditions. Supplemented intervention such as air-cleaning methods including high efficiency particulate air filtration and ultraviolet germicidal irradiation should be considered in areas where adequate ventilation is difficult to achieve. Personal protective equipment including particulate respirators provides additional benefit when administrative and environmental controls cannot assure protection.

상지, 하지에서 발생하는 근골격계질환의 예방 (Prevention of the Musculoskeletal Disorders at Upper or Lower Extremities)

  • 박희석;이윤근;임상혁
    • 대한인간공학회지
    • /
    • 제29권4호
    • /
    • pp.455-463
    • /
    • 2010
  • Work-related musculoskeletal disorders (WMSDs) are recognized as leading causes of significant human suffering, loss of productivity, and economic burdens on our society. WMSDs are associated with work patterns that include fixed or constrained body positions, continual repetition of movements, force concentrated on small parts of the body, cold environment and vibration. Main effort to protect workers from WMSDs should focus on avoiding repetitive patterns of work through engineering controls which may include mechanization, ergonomic design of tools and equipment, and workplace layout. Where elimination of the risk factors is not practical, administrative controls involving job rotation, job enlargement and enrichment, teamwork should be considered.

Examining China's Internet Policies through a Bibliometric Approach

  • Li, Jiang;Xu, Weiai Wayne;Wang, Fang;Chen, Si;Sun, Jianjun
    • Journal of Contemporary Eastern Asia
    • /
    • 제17권2호
    • /
    • pp.237-253
    • /
    • 2018
  • In order to understand China's internet governance, this paper examined 1,931 Internet policies of China by bibliometric techniques. Specifically, the bibliometric techniques include simple document counting, co-word analysis, collaboration network analysis and citation analysis. The findings include: (1) China's Internet legislations mainly emphasized e-commerce and Internet governance, and, to some extent, neglected personal data protection; (2) China's Internet is under intensive multiple regulatory controls by central government. A large number of government agencies are involved in Internet policy-making. The Propaganda Department of the Central Committee of the Communist Party of China and the State Information Leading Group of the State Council, enforced fewer policy documents, but occupy higher positions in the Internet governance hierarchy; (3) China's Internet legislation system is primarily composed of industry-specific administrative rules, rather than laws or administrative regulations. Nevertheless, laws and administrative regulations received significantly more citations owing to their superior force. This paper also discussed current gaps in China's internet governance and how the country's internet policies are situated in the broader global context.

스피어 피싱 대응을 위한 관리적 보안대책에 의한 접근 (On the administrative security approaches against spear phishing attacks)

  • 손유승;남길현;고승철
    • 한국정보통신학회논문지
    • /
    • 제17권12호
    • /
    • pp.2753-2762
    • /
    • 2013
  • 최근 정보보호 기술의 발전으로 사이버 공격의 패러다임이 변화하고 있다. 조직의 시스템이나 네트워크에 대한 보호 대책이 강화되면서 최종 사용자를 대상으로 사회공학적 기법을 이용하는 사이버 공격이 증가하고 있다. 기업이나 정부기관을 대상으로 중요한 기밀 데이터를 절취하거나 중요 서비스를 무력화하는 지능형지속위협(APT, Advanced Persistent Threat) 공격의 약 91%가 스피어 피싱 이메일을 사용하는 것으로 알려졌다. 본 논문에서는 스피어 피싱 공격의 특성과 보안 위협을 자세히 분석하여 기술적인 통제항목만으로 스피어 피싱 공격에 대응하는 것에 한계가 있음을 설명하고 이를 보완할 수 있는 스피어 피싱 공격에 대한 관리적 대응방안을 제안하였다.

Analytical Procedures for Designing an Optimal Noise Hazard Prevention Program

  • Asawarungsaengkul, Krisada;Nanthavanij, Suebsak
    • Industrial Engineering and Management Systems
    • /
    • 제4권2호
    • /
    • pp.165-175
    • /
    • 2005
  • Two extreme and one mixed procedures for designing a noise hazard prevention program are discussed in this paper. The two extreme design procedures (engineering-based and HPD-based) yield upper and lower bounds of the total noise control cost, respectively; while the mixed design procedure provides an optimal noise hazard prevention program within a given total budget. The upper bound of the workforce size for job rotation is approximated using a heuristic procedure. Six optimization models are developed and utilized by the mixed procedure to eliminate or reduce excessive noise levels (or noise exposures) in an industrial workplace. The mixed procedure also follows the OSHA’s hierarchy of noise control. A numerical example is given to demonstrate the application of the proposed design procedures.

Biomedical Laboratory: Its Safety and Risk Management

  • Tun, Tin
    • 대한의생명과학회지
    • /
    • 제23권3호
    • /
    • pp.155-160
    • /
    • 2017
  • Biomedical laboratory is full of risks. Risk could be biological, chemical, radioactive, mechanical, physical, fire and electrical. All possible risks need to be identified, evaluated and controlled. A risk management system must be in place to prevent accident or loss of lives and to improve overall workplace safety and productivity. Safety in laboratory is a combination of appropriate risk management system, engineering controls and technical facilities, administrative controls and safety procedures and practices. Laboratory safety culture must be developed so that exposure to hazards for laboratory personnel, community and environment will be minimized or eliminated. In this review, importance of safety in a biomedical laboratory and risk management will be discussed.

IDENTIFICATION OF SAFETY CONTROLS FOR ENGINEERING-SCALE PYROPROCESS FACILITY

  • MOON, SEONG-IN;SEO, SEOK-JUN;CHONG, WON-MYUNG;YOU, GIL-SUNG;KU, JEONG-HOE;KIM, HO-DONG
    • Nuclear Engineering and Technology
    • /
    • 제47권7호
    • /
    • pp.915-923
    • /
    • 2015
  • Pyroprocess technology has been considered as a fuel cycle option to solve the spent fuel accumulation problems in Korea. The Korea Atomic Energy Research Institute, Daejeon, Korea has been studying pyroprocess technology, and the conceptual design of an engineering-scale pyroprocess facility, called the Reference Engineering-scale Pyroprocess Facility, has been performed on the basis of a 10 ton heavy metal throughput per year. In this paper the concept of Reference Engineering-scale Pyroprocess Facility is introduced along with its safety requirements for the protection of facility workers, collocated workers, the off-site public, and the environment. For the identification of safety structures, systems, and components and/or administrative controls, the following activities were conducted: (1) identifying hazards associated with operations; (2) identifying potential events associated with these hazards; and (3) identifying the potential preventive and/or mitigative controls that reduce the risk associated with these accident events. This study will be used to perform a safety evaluation for accidents involving any of the hazards identified, and to establish safety design policies and propose a more definite safety design.

Design and Load Map of the Next Generation Convergence Security Framework for Advanced Persistent Threat Attacks

  • Lee, Moongoo
    • IEIE Transactions on Smart Processing and Computing
    • /
    • 제3권2호
    • /
    • pp.65-73
    • /
    • 2014
  • An overall responding security-centered framework is necessary required for infringement accidents, failures, and cyber threats. On the other hand, the correspondence structures of existing administrative, technical, physical security have weakness in a system responding to complex attacks because each step is performed independently. This study will recognize all internal and external users as a potentially threatening element. To perform connectivity analysis regarding an action, an intelligent convergence security framework and road map is suggested. A suggested convergence security framework was constructed to be independent of an automatic framework, such as the conventional single solution for the priority defense system of APT of the latest attack type, which makes continuous reputational attacks to achieve its goals. This study suggested the next generation convergence security framework to have preemptive responses, possibly against an APT attack, consisting of the following five hierarchical layers: domain security, domain connection, action visibility, action control, and convergence correspondence. In the domain, the connection layer suggests a security instruction and direction in the domains of administrative, physical and technical security. The domain security layer has consistency of status information among the security domain. A visibility layer of an intelligent attack action consists of data gathering, comparison and decision cycle. The action control layer is a layer that controls the visibility action. Finally, the convergence corresponding layer suggests a corresponding system of before and after an APT attack. The administrative security domain had a security design based on organization, rule, process, and paper information. The physical security domain is designed to separate into a control layer and facility according to the threats of the control impossible and control possible. Each domain action executes visible and control steps, and is designed to have flexibility regarding security environmental changes. In this study, the framework to address an APT attack and load map will be used as an infrastructure corresponding to the next generation security.

건강보험 진료비심사의 법적 근거와 효력 (The Legal Base and Validity of Reviewing Medical Expenses in the Health Insurance)

  • 김운목
    • 의료법학
    • /
    • 제8권1호
    • /
    • pp.137-177
    • /
    • 2007
  • The medical expenses review system in Korea has developed under fee-for-service system with its own unique structure. The importance of reviewing medical expenses has been emphasized, as the size of medical expenditures moving through the health insurance legal context and its weight in the national economy have increased very rapidly. It is, however, analyzed that the feuds and arguments continue among the stakeholders for the lack of laws supporting the medical expenses review system. The medical expenses review is a series of administrative procedures, deciding whether claims from medical care institutions to the insurer are legal and valid or not. It mainly controls the increase of unnecessarily excessive health insurance claim and prevents fraudulent claim and abuse and checks the less use or unsuitable use of medical resources. It also works a function guarantees medical benefits for the appropriate treatment according to the object of health insurance system as a social insurance scheme. The dispute on legal base of the medical expenses review is about the source of law in the medical expenses review. There are the Health Insurance Act and administrative laws as jus scriptum and the guidelines of review as administrative orders. The medical expenses review should reflect various factors, such as the development of medical healthcare technologies, the health expenditures distribution, the financial situation of the health insurance, and the evaluation on the level of appropriate benefits. It is also likely to adapt to the traits of characters of medicine, and trends and transition, Besides it should judge the legality and the validity of medical benefits expenditures by synthesizing these all factors. And the evaluation system of appropriateness of medical benefits was administrative procedure which was consecutive with reviewing the medical expenses system and it was intended to make up for the result of reviewing the medical expenses in more comprehensive levels.

  • PDF

The Survey of Job Rotation Implementation at Medium- and Small-Industries

  • Yoon, Sang-Young;Jung, Myung-Chul
    • 대한인간공학회지
    • /
    • 제32권2호
    • /
    • pp.199-205
    • /
    • 2013
  • Objective: The aim of this study is to investigate the job rotation implementation at medium- or small-industries and to identify the viewpoint on job rotation as preventive activity of work-related musculoskeletal disorders(WMSDs). Background: Job rotation has been implemented in many industrial areas in order to prevent the WMSDs as one part of ergonomic program. Generally, the cases of implementation of ergonomic program or successful cases of job rotation were reported on the side of major or large company. Therefore, this study tried to inspect the current state of job rotation implementation at medium- or small-industries. Method: Survey was carried out for randomly contacted forty seven mangers responsible for safety. Survey contained the questionnaires on the general state of company, shift-work and job rotation. Results: The ratio of work-shift in medium- and small-industry was 34.0% and the ratio of job rotation was 19.1%. For manufacturing industry, the ratio was 37.9% and 17.2%, respectively. Conclusion: The implementation ratio of job rotation was relatively low considering the results of previous studies. Many managers appealed the quality decreasing of goods and the injuries of workers due to job rotation, though agreed to train the multi-functional worker and to prevent the WMSDs. Application: The results can be used for the fundamental data how the job rotation will be properly implemented in medium- and small-industry as an administrative control for MSDs.