• Title/Summary/Keyword: Protection and Management System

Search Result 1,284, Processing Time 0.031 seconds

Proposals On The Designe, Construction, Management Maintenance standardization Method Of Mechanical Field Fire Protection System By NFSC (화재안전기준(NFSC)에 따른 기계분야 소방설비 설계, 시공, 감리 유지관리 업무 표준화 방안에 대한 제안)

  • Kim, Sung-Il;Kang, Kyung-Sik
    • Journal of the Korea Safety Management & Science
    • /
    • v.19 no.3
    • /
    • pp.11-17
    • /
    • 2017
  • The study seeks to cooperate with the investigation of a fire investigation based on public-private partnership. Fire protection systems provide a wide variety of viewpoints from the perspectives of design, construction, management, maintenance, maintenance and maintenance systems at a particular point in time, construction, management, and maintenance systems. What is controversial is that there are illegal activities such as illegal activities of the Patent Office, misconduct of construction work and unreasonable construction of construction works.As a theoretical framework, the present study identified the four key elements of a successful disaster response system : responsiveness, control, professionalism, and bias.

A Novel Procedure for Protection Setting in an HVDC System Based on Fault Quantities

  • Gao, Benfeng;Zhang, Ruixue;Zhang, Xuewei
    • Journal of Electrical Engineering and Technology
    • /
    • v.12 no.2
    • /
    • pp.513-521
    • /
    • 2017
  • HVDC protection setting is difficult to be calculated analytically because of its strong nonlinearity. The currently used setting method is based on the empirical setting of previous projects and then verified by digital simulation. It entails a huge workload and low efficiency. To facilitate protection setting, this paper systematically summarizes the HVDC protection characteristics and then presents a classification of HVDC protections according to the protection principles. On the basis of the fault quantities, a novel setting procedure suitable for travelling wave protection, derivative and level protection, and differential protection is proposed. The proposed procedure is illustrated and verified in detail with the example of travelling wave protection. An HVDC protection setting system that has the functions of automatic protection setting and data management is developed utilizing the C# programming language.

The ICRP and Its System of Radiological Protection (국제방사선방호위원회와 방사선방호체계)

  • Kun-Woo Cho
    • Journal of Environmental Health Sciences
    • /
    • v.50 no.1
    • /
    • pp.1-5
    • /
    • 2024
  • International Commission on Radiological Protection (ICRP) is an independent international organization that advances the science of radiological protection for the public benefit, particularly by providing recommendations and guidance on all aspects of protection against ionizing radiation. The ICRP is a community of more than 380 globally-recognized experts in radiological protection science, policy, and practice from more than 50 countries. As of January 2024, the ICRP is comprised of a Main Commission, the Scientific Secretariat, four Standing Committees, and 30 Task Groups under the four committees. The ICRP has released well over one hundred publications on all aspects of radiological protection. Most address a particular area within radiological protection, but a handful of the publications, the so-called fundamental recommendations, describe the overall system of radiological protection. The system for radiological protection is based on the current understanding of the science of radiation exposure and its effects along with value judgements. The ICRP offers recommendations to regulatory and advisory agencies and provides advice to management and professional staff with responsibilities for radiological protection. Legislation in most countries adheres closely to ICRP recommendations. The International Atomic Energy Agency's (IAEA) International Basic Safety Standards are based heavily on ICRP recommendations. ICRP recommendations form the core of radiological protection standards, legislation, programs, and practice worldwide.

Technical Protection Measures for Personal Information in Each Processing Phase in the Korean Public Sector

  • Shim, Min-A;Baek, Seung-Jo;Park, Tae-Hyoung;Seol, Jeong-Seon;Lim, Jong-In
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.5
    • /
    • pp.548-574
    • /
    • 2009
  • Personal information (hereinafter referred to as "PI") infringement has recently emerged as a serious social problem in Korea. PI infringement in the public and private sector is common. There were 182,666 cases of PI in 2,624 public organizations during the last three years. Online infringement cases have increased. PI leakage causes moral and economic damage and is an impediment to public confidence in public organizations seeking to manage e-government and maintain open and aboveboard administration. Thus, it is an important matter. Most cases of PI leakage result from unsatisfactory management of security, errors in home page design and insufficient system protection management. Protection management, such as encryption or management of access logs should be reinforced urgently. However, it is difficult to comprehend the scope of practical technology management satisfied legislation and regulations. Substantial protective countermeasures, such as access control, certification, log management and encryption need to be established. It is hard to deal with the massive leakage of PI and its security management. Therefore, in this study, we analyzed the conditions for the technical protection measures during the processing phase of PI. In addition, we classified the standard control items of protective measures suited to public circumstances. Therefore, this study provides a standard and checklist by which staff in public organizations can protect PI via technical management activities appropriate to laws and ordinances. In addition, this can lead to more detailed and clearer instructions on how to carry out technical protection measures and to evaluate the current status.

A Study on the Efficient Countermeasure of the Serious Accidents Punishment Act in the Small Businesses: On the Basis of the Serious Industrial Accidents (소규모 사업장의 중대재해처벌법 효율적 대응방안 연구 - 중대산업재해 중심)

  • Lee, Byoung-Lim;Choi, Yu-Jung;Yoo, Sam-Yeol;Choi, Jae-Wook
    • Journal of the Society of Disaster Information
    • /
    • v.18 no.3
    • /
    • pp.507-519
    • /
    • 2022
  • Purpose: This study propose efficient and practical measures to comply with the duty to secure safety and health of the Serious Accidents Punishment Act at small businesses. Method: Based on literature review and previous studies, a plan to comply with the Serious Accidents Punishment Act was reviewed by the link with the safety and health management system and using the process approach method, etc. Result: It was confirmed that if the safety and health management system is faithfully implemented, it is possible to comply with the duty to secure safety and health under the Serious Accidents Punishment Act. In addition, a methodology for fulfilling and inspecting the duty to secure safety and health was presented. Conclusion: If the safety and health management system is operated actively by utilizing the process approach and implementation inspection checklist, it is judged that it will be possible to comply with the Serious Accidents Punishment Act as well as to continuously improve the safety and health management system.

Software Verification & Validation for Digital Reactor Protection System (디지털 원자로 보호계통의 소프트웨어 확인 및 검증)

  • Park, Gee-Yong;Kwon, Kee-Choon
    • Proceedings of the KIEE Conference
    • /
    • 2005.05a
    • /
    • pp.185-187
    • /
    • 2005
  • The reactor protection system is the most important function for the safe operation of nuclear powerplants (NPPs) in that such system protects a nuclear reactor tore whose damage can cause an enormous disaster to the nuclear facility and the public. A digital reactor protection system (DRPS) is being developed in KAERI for use in the newly-constructed NPPs and also for replacing the existing analog-type reactor Protection systems. In this paper, an software verification and validation (V&V) activities for DRPS, which are independent of the DRPS development processes, are described according to the software development life cycle. The main activities of DRPS V&V processes are the software planning documentations, the verification of software requirements specification (SRS) and software design specification (SDS), the verification of codes, the tests of the integrated software and system. Moreover, the software safety analysis and the software configuration management are involved in the DRPS V&V processes. All of the V&V activities are described, in detail, in this paper.

  • PDF

The Standardization Modeling concerning Organizational Composition and a Management System for the Protection of Personal Information (개인정보 보호를 위한 조직구성과 관리체계에 관한 표준화 모델링)

  • Seo, Woo Seok;Jun, Moon Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.3
    • /
    • pp.33-39
    • /
    • 2012
  • Since the passing of the Personal Information Act in March 2011 and its initial introduction in September, over the one year to date diverse security devices and solutions have been flowing into the market to enable observance of the relevant laws. Beginning with security consulting, corporations and institutions have focused on technology-based business in order to enable observance of those laws competitively in accordance with 6-step key procedures including proposal, materialization, introduction, construction, implementation, and execution. However there has not been any investment in human resources in the field of education such as technology education and policy education relative to the most important human resources field nor investment in professionals in the organization for the protection of personal information or in human resources for operating and managing IT infrastructure for actual entire personal information such as special sub-organizations. In this situation, as one process of attracting change from the nature of the technology-based security market toward a professional human resource-based security infrastructure market, it is necessary to conduct research into standardization modeling concerning special organizational composition and a management system for the protection of personal information.

Issues and Tasks of Personal Information Protection Liability Insurance (개인정보 손해배상책임 보장제도의 쟁점과 과제)

  • Lee, Suyeon;Kwon, Hun-Yeong
    • Journal of Information Technology Services
    • /
    • v.19 no.1
    • /
    • pp.37-53
    • /
    • 2020
  • Today, our society is exposed to cyber threats, such as the leakage of personal information, as various systems are connected and operated organically with the development of information and communication technology. With the impact of these cyber risks, we are experiencing damage from the virtual world to the physical world. As the number of cases of damage caused by cyber attacks has continued to rise, social voices have risen that the government needs to manage cyber risks. Thus, information and telecommunication service providers are now mandatory to have insurance against personal information protection due to amendment of "the Act on Promotion of Information and Communication Network Utilization and Information Protection". However, the insurance management system has not been properly prepared, with information and communication service providers selecting the service operators based on sales volume rather than selecting them based on the type and amount of personal information they store and manage. In order for the personal information protection liability insurance system to be used more effectively in line with the legislative purpose, effective countermeasures such as cooperation with the government and related organizations and provision of benefits for insured companies should be prepared. Thus, the author of this study discuss the current status of personal information protection liability insurance system and the issues raised in the operation of the system. Based on the results of this analysis, the authors propsoe tasks and plans to establish an effective personal information protection liability insurance system.

A Study on Personal Information Protection Management Assessment Method by DEA (DEA 모형을 이용한 개인정보보호 관리수준 평가방법에 대한 연구)

  • Jeong, Myeong-soo;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.3
    • /
    • pp.691-701
    • /
    • 2015
  • Recently, with the growing number of services using personal information, government offices' tasks have become more dependent to personal information. Various policies and systems have been made and managed for the safe use of personal information in the circumstances that inevitably require the use of personal information, but the personal information privacy incidents and their scale are on a constant increase. Thus, Korea has been implementing personal information protection management system since 2008 to examine whether public organizations observe the personal information protection act and to how well they manage the personal information, and to improve what is insufficient in the process. However, despite high scores of the outcomes of the system, questions about the effectiveness of the outcomes and about the actual manage level are being raised. Thus, this study seeks to analyze public organizations' activities to protect personal information and the effectiveness of their foundation efforts for them by using the DEA model, and to propose a new model to enhance the effectiveness of the outcomes of personal information protection management system by reflecting them into the outcomes of system, using the derived effectiveness.

The Development of a Database for Self Health Management - Focusing on the Soojichim (Koryo Hand Therapy) - (자가 건강관리를 위한 데이터베이스 시스템 구축에 관한 연구 - 수지침요법을 중심으로 -)

  • Choung, Hye-Myoung
    • Journal of Korean Public Health Nursing
    • /
    • v.20 no.2
    • /
    • pp.195-206
    • /
    • 2006
  • Purpose: As Koryo Hand Therapy is generally referenced by a manual, we made a database system to ease. Method: Using the basic theory of Koryo Hand Therapy with the System Development Life Cycle (SDLC), we tested, analyzed, designed and implemented the system and constructed a database system with MS Access according to the symptoms. Results: We constructed the database system of Handing and the symptoms of Koryo Hand Therapy in 3 parts (Basic Data Management, Disorder Therapy Management, Report) for easy management. This database system will be useful for general users to protect, promote and measure their health. The structured database system was valued on the basis of the students basic knowledge of Koryo Hand Therapy. As a result, 80% of the respondents answered that the "system is well structured", 78% that "it's convenient to search", and 87% that "it's helpful for self health management". Conclusion: These study results provides people with information on the basic treatment of symptoms for the self health protection and promotion with Koryo Hand Therapy by constructing a database.

  • PDF