• Title/Summary/Keyword: Data protection

Search Result 3,440, Processing Time 0.036 seconds

An Analytical Methodology for Evaluating Radiological Protection Alternatives Using Analytical Hierarchy Process (계층화 의사결정법을 이용한 방사선방호선택 대안결정에 관한 해석적 방법론)

  • Sa, Sang-Duk;Narita, Masakuni
    • Journal of Radiation Protection and Research
    • /
    • v.19 no.2
    • /
    • pp.99-107
    • /
    • 1994
  • This study aims to introduce a prescriptive methodology to comprehensively support the analysis of decision process by the use of Saaty's Analytical Hierarchy Process for the optimization of radiation protection. The analytical Hierarchy Process for the optimization of radiation protection. The analytical process for the problem of selecting options among given protection alternatives is illustrated with the data of the uranium mine example in ICRP Publ. 55. This technique, unlike other conventional selection method, is considered to provide a useful tool for the protection manager with respect to its ease of use and simplification in the choice of optimal alternative associated with radiological protection.

  • PDF

A Study of Optimizing Cathodic Protection in Comparison of Design Methodologies

  • Choi, Young-Kwan;Choi, Sang-Yule;Shin, Myong-Chul
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.24 no.11
    • /
    • pp.23-29
    • /
    • 2010
  • The principal factor determining an optimum design method for cathodic protection is finding the protection current for preventing the corrosion of existing, already laid pipe. Some factors currently used to test designs include the sizes and lengths of pipes, soil resistivity, and the coating damage rate. We believe this method and current formulae are not optimum due to the uncertainty of determining the coating damage rate and the corrosion protection current's density. This paper analyzes the amount of protection current obtained by performing a temporary current test using data describing existing laid pipe. We then propose determining the corrosion protection current by using the temporary current test after modifying the formula. In addition, we suggest a way to choose optimized cathodic protection and the process of design by executing the design and taking account of such factors as a site condition of 34km-long non-protected water supply pipe lines (stages I and II) in ${\bigcirc}{\bigcirc}$ region, climate, interferences, and durability.

Factors Influencing Clinical Nurses' Practice of Personal Information Protection: Focusing on Knowledge of Personal Information Protection Law and Nursing Patient Advocacy (임상간호사의 개인정보보호 실천 영향요인: 개인정보보호법 지식, 옹호간호를 중심으로)

  • Kim, Dongeun;Park, Wanju
    • Journal of Korean Clinical Nursing Research
    • /
    • v.29 no.3
    • /
    • pp.261-270
    • /
    • 2023
  • Purpose: This study aimed to identify the influence of knowledge of personal information protection law and nursing patient advocacy on practice of personal information protection among nurses. Methods: The subjects were 130 nurses who have worked for six months or more in the ward of the tertiary or general hospitals. Data were collected from February 20 to March 3, 2023. Results: Factors influencing practice of personal information protection were acting as an advocate (β=.32, p=.004), environmental and educational influences (β=.21, p=.040), knowledge of personal information protection law (β=.19, p=.013) and clinical experience for five years or more but less than ten years (β=.17, p=.036). The regression model showed an explanatory power of 34.0%. Conclusion: Acting as an advocate has the most effect on practice of personal information protection. To promote practice of personal information protection for nurses, it is necessary to provide education related to privacy protection and encourage nursing patient advocacy.

A Study on Digital Protection Algorithm of IED for Hydroelectric Generating Unit (수력발전소 IED의 디지털 보호 알고리즘에 관한 연구)

  • Park, Chul-Won
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.63 no.3
    • /
    • pp.149-156
    • /
    • 2014
  • Generator of hydroelectric generating unit is to be protected by the digital protection IED. Now, any IED of large capacity for hydro power plant was not developed by domestic technology. This is because it is required for the generator of the high reliability technology and considered as due to the sale of the market of IED device is small. However, the protection IED must be develop by domestic technology to meet the advanced needs of the construction and replacement of electrical equipment in accordance with the new power plant development. In this paper, a digital algorithms for protection IED of large size of hydroelectric generating unit were designed. The algorithms consist of the stator protection, anti-motoring, overexcitation and loss of excitation. The performance of the algorithms were evaluated by using the simulation data collected from the PSCAD/EMTDC software. From test results, it can be seen that the developed algorithms were not maloperation.

A Fundamental Research on the Safety Facilities of Railroad (철도 선로안전시설에 관한 기초연구)

  • Lee Seong-Won;Kim Seung-Hwan;Shin Seung-Kyo;Kim Tae-Wook
    • Proceedings of the KSR Conference
    • /
    • 2005.05a
    • /
    • pp.550-555
    • /
    • 2005
  • In this research, safety requirements for guard rail, buffer stop, car stop scotch block, protection device, fire protection facilities, safety siding, escape facilities and inundation protection facilities are studied to establish a standard. First, various kinds of guard rails and their construction methods are investigated. Researches on the level difference of main track and guard rail, joint, length, and fastening force of guard rail are done. Second, the classification of buffer stop and car stop scotch block and its characteristics are examined, and the impact force, speed limit and capacity of buffer stop are summarized. Details of protection device, fire protection facilities, safety siding, escape facilities and inundation protection facilities are also investigated. From this fundamental research results, basic data on the safety facilities of railroad system are established.

  • PDF

Sun Protection Use Behaviour among University Students from 25 Low, Middle Income and Emerging Economy Countries

  • Pengpid, Supa;Peltzer, Karl
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.16 no.4
    • /
    • pp.1385-1389
    • /
    • 2015
  • The aim of this study was to investigate the sun protection use behaviour among university students from 25 low, middle income and emerging economy countries. Using anonymous questionnaires, data were collected from 18,687 undergraduate university students aged 18-30 years (mean age 20.8, SD=2.8) from 26 universities in 25 countries across Asia, Africa and the Americas. Overall, 57.2% of university students reported liking to sunbathe and of those only 48.1% used sun protection when sunbathing. In multivariate logistic regression, younger age, being female, coming from a wealthy or quite well off economic family background, living in an upper middle or high income country, lighter skin tone, and other health behaviours were found to be associated with sun protection use behaviour. Low sun protection use calls for health promotion programmes to prevent unprotected sun exposure.

Analysis of Actual Condition of Counterfeits and Anti-Counterfeiting Strategies of Korean Fashion Firms (국내 패션기업의 위조상품 관리실태 및 대응전략분석)

  • 김용주
    • Journal of the Korean Home Economics Association
    • /
    • v.42 no.1
    • /
    • pp.53-67
    • /
    • 2004
  • The purpose of this study was to analyze anti-counterfeiting strategies of fashion firms in Korea. Data was collected by in-depth interviews for 25 fashion firms and 5 buying offices who had been victims of counterfeiting. The result showed that fashion firms recognized the counterfeiting, especially deceptive counterfeiting, as a serious problem in Korea and seek for stronger protection. Fashion firms adopted diverse strategies for the protection of trademark and for the protection of design; (1) Investigation and Surveillance, (2) Warning, (3) Prosecution, (4) Lawsuit, (5) Consumer education (6) High-tech tabooing, (7) Provide incentives, (8) Penalty, (9) Do nothing. Despite the diverse efforts, they proposed the most desirable strategies to deter the counterfeiting as the changes of consumer attitude and stronger legal protection.

Comparative study of the privacy information protection policy - Privacy information basic laws and dedicated organizations - (국내외 개인정보보호정책 비교 분석 - 개인정보보호 법률과 전담조직을 중심으로 -)

  • Jeong, Dae-Kyeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.923-939
    • /
    • 2012
  • In the information society, to serve the normal economic activity and to delivery the public service is to secure the privacy information. The government endeavors to support with the privacy protection laws and public organizations. This paper is to study the privacy protection policy in the major countries by analyzing the laws and organizations. At last, The study is to examine the policy tasks to support the privacy protection policy.

A Study on Data Governance Maturity Model and Total Process for the Personal Data Use and Protection (개인정보의 활용과 보호를 위한 데이터 거버넌스 성숙도 모형과 종합이행절차에 관한 연구)

  • Lee, Youngsang;Park, Wonhwan;Shin, Dongsun;Won, Yoojae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1117-1132
    • /
    • 2019
  • Recently, IT technology such as internet, mobile, and IOT has rapidly developed, making it easy to collect data necessary for business, and the collected data is analyzed as a new method of big data analysis and used appropriately for business. In this way, data collection and analysis becomes easy. In such data, personal information including an identifier such as a sensor id, a device number, IP address, or the like may be collected. However, if systematic management is not accompanied by collecting and disposing of large-scale data, violation of relevant laws such as "Personal Data Protection Act". Furthermore, data quality problems can also occur and make incorrect decisions. In this paper, we propose a new data governance maturity model(DGMM) that can identify the personal data contained in the data collected by companies, use it appropriately for the business, protect it, and secure quality. And we also propose a over all implementation process for DG Program.

An Extended Role-based Access Control Model with Privacy Enforcement (프라이버시 보호를 갖는 확장된 역할기반 접근제어 모델)

  • 박종화;김동규
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.8C
    • /
    • pp.1076-1085
    • /
    • 2004
  • Privacy enforcement has been one of the most important problems in IT area. Privacy protection can be achieved by enforcing privacy policies within an organization's data processing systems. Traditional security models are more or less inappropriate for enforcing basic privacy requirements, such as privacy binding. This paper proposes an extended role-based access control (RBAC) model for enforcing privacy policies within an organization. For providing privacy protection and context based access control, this model combines RBAC, Domain-Type Enforcement, and privacy policies Privacy policies are to assign privacy levels to user roles according to their tasks and to assign data privacy levels to data according to consented consumer privacy preferences recorded as data usage policies. For application of this model, small hospital model is considered.