• Title/Summary/Keyword: Respond Plan

Search Result 304, Processing Time 0.023 seconds

Correlation analysis between COVID-19 cases and emergency alerts service (COVID-19 확진자 수와 긴급재난문자 서비스의 상관관계 분석)

  • Ju, Sang-Lim;Kang, Hyunjoo;Oh, Seung-Hee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.5
    • /
    • pp.1-9
    • /
    • 2021
  • In Korea, various information related to COVID-19 has been provided to the public through an EAM (Emergency Alert Message) service using CBS (Cell Broadcast Service) technology to respond to COVID-19. In particular, local governments have been actively using the EAM service as a major means of responding to COVID-19. However, since excessive use of EAM service has caused the inconvenience of the people rather than the positive effects, the authority to be able to send EAMs has be limited. In this paper, with the purpose of providing primary data for establishing a plan to properly operate EAMs, we compare and analyze the number of EAMs issued and the incidence rate of COVID-19 cases during the period from 2020 to the present. In addition, the monthly EAM usage and incidence rate of COVID-19 cases are compared in detail and correlation analysis is performed for local governments that have issued many EAMs. We expect that the analysis results of this paper will be used as primary data in establishing strategies for EAM service to counteract the prolonged COVID-19.

The Improvement Plan for Indicator System of Personal Information Management Level Diagnosis in the Era of the 4th Industrial Revolution: Focusing on Application of Personal Information Protection Standards linked to specific IT technologies (제4차 산업시대의 개인정보 관리수준 진단지표체계 개선방안: 특정 IT기술연계 개인정보보호기준 적용을 중심으로)

  • Shin, Young-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.12
    • /
    • pp.1-13
    • /
    • 2021
  • This study tried to suggest ways to improve the indicator system to strengthen the personal information protection. For this purpose, the components of indicator system are derived through domestic and foreign literature, and it was selected as main the diagnostic indicators through FGI/Delphi analysis for personal information protection experts and a survey for personal information protection officers of public institutions. As like this, this study was intended to derive an inspection standard that can be reflected as a separate index system for personal information protection, by classifying the specific IT technologies of the 4th industrial revolution, such as big data, cloud, Internet of Things, and artificial intelligence. As a result, from the planning and design stage of specific technologies, the check items for applying the PbD principle, pseudonymous information processing and de-identification measures were selected as 2 common indicators. And the checklists were consisted 2 items related Big data, 5 items related Cloud service, 5 items related IoT, and 4 items related AI. Accordingly, this study expects to be an institutional device to respond to new technological changes for the continuous development of the personal information management level diagnosis system in the future.

Current Status and Future Perspectives of Academic Library Online Services in the Pandemic Era (팬데믹 시대 대학도서관 온라인 정보서비스의 현황과 과제)

  • Lee, Jisu
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.55 no.4
    • /
    • pp.159-185
    • /
    • 2021
  • After the pandemic, universities are shifting to distance learning, and the information use environment of libraries is rapidly changing. Therefore, there is a need for academic libraries to provide learning and research support services to users in response to these changes. This study analyzed the following contents, focusing on the contents of online services of academic libraries in order to understand the services provided by academic libraries after the pandemic, 1) the current status of online information services provided by 60 academic libraries at domestic and foreign and 2) the experience and requirements for using the online information services of academic library were investigated. As a result of the study, academic libraries at domestic and foreign responded to the untact environment by providing various online information services and users showed high experience and requirements for the electronic resource service and online user education service of academic libraries after the outbreak of the pandemic. Based on the analysis of the current status of online information services provided by domestic and foreign academic libraries after the outbreak of the pandemic, as well as the experiences and requirements of university students, several strategies were proposed to improve the quality of university education and library online information services and to plan services that respond to user needs.

Development of Job Burnout and Job Stress Relife Program for the Nursing Care Workers based on Acceptance and Commitment Therapy(ACT) (수용전념치료(ACT) 기반 요양보호사 직무 소진, 직무스트레스 완화 프로그램 개발과 적용)

  • Lee, OkJoo;Kim, Mooyoung
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.7
    • /
    • pp.222-237
    • /
    • 2021
  • The purpose of this study is to develop an ACT group counseling program for the purpose of alleviating and healing the job stress and burnout of nursing care workers and to verify the effectiveness of the ACT group counseling program. To this end, the goal and theoretical model, content, operation and evaluation of the program were composed and applied according to the procedure. The main research results are as follows. First, as a result of measuring the job stress of the study subjects, there was a positive change in the group participating in the program. Second, as a result of measuring the level of job burnout of the study subjects, there was a positive change in the group participating in the program. Third, as a result of measuring the level of role conflict of the study subjects, there was a positive change in the group participating in the program. Fourth, as a result of measuring the level of over-role of the study subjects, there was a positive change in the group participating in the program. Fifth, as a result of measuring the level of role ambiguity of the study subjects, there was a positive change in the group participating in the program. As a practical implication, by including the ACT theory and practice plan in various nursing care providers training courses, the ability to respond to job burnout and job stress is increased, and ultimately, by increasing the psychological flexibility of nursing care workers, the opportunity for essential change in attitude toward work and life describe what to provide.

Senior Center Based Diabetes Self-management Program: An Action Research Approach (노인복지관 당뇨병 자기관리 프로그램의 과정과 평가: 실행연구방법)

  • Ko, Hana;Song, Misoon
    • 한국노년학
    • /
    • v.38 no.1
    • /
    • pp.169-185
    • /
    • 2018
  • The purpose of this study examined the feasibility and efficacy of a senior center-based diabetes self-management program applying action research approach. The cyclical action research method was applied for this study: plan, act, evaluate, and reflect in delivering three waves of the intervention program. Three waves of a 12 weeks-length small group diabetes self-management program were offered during the period of 15 months in a senior center in Seoul. Planning of $2^{nd}$ and $3^{rd}$ wave program were based on reflection of $1^{st}$ and $2^{nd}$ program evaluation respectively. Among the 46 participants, 93.48% (N=43) completed the program. The quantitative evaluation showed statistically significant improvement in HbA1C(p<.001), fasting plasma glucose(p<.001), BMI(p=.016), waist circumference(p=.001), systolic blood pressure(p=.036), diabetes self-management behavior(p<.001) and health knowledge(p=.008). Qualitative data revealed that individual management was very helpful in empowering and adhering for own diabetes care for the participants. Participants reported high satisfaction towards the program with mean satisfaction score of 65.12. Application of the Diabetes Self-management program with action study strategy was successful in community setting for improving participants' subjective and objective outcomes. Action research method guides the practitioner to tailor the program to respond for the participants and field needs.

Detecting and Avoiding Dangerous Area for UAVs Using Public Big Data (공공 빅데이터를 이용한 UAV 위험구역검출 및 회피방법)

  • Park, Kyung Seok;Kim, Min Jun;Kim, Sung Ho
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.6
    • /
    • pp.243-250
    • /
    • 2019
  • Because of a moving UAV has a lot of potential/kinetic energy, if the UAV falls to the ground, it may have a lot of impact. Because this can lead to human casualities, in this paper, the population density area on the UAV flight path is defined as a dangerous area. The conventional UAV path flight was a passive form in which a UAV moved in accordance with a path preset by a user before the flight. Some UAVs include safety features such as a obstacle avoidance system during flight. Still, it is difficult to respond to changes in the real-time flight environment. Using public Big Data for UAV path flight can improve response to real-time flight environment changes by enabling detection of dangerous areas and avoidance of the areas. Therefore, in this paper, we propose a method to detect and avoid dangerous areas for UAVs by utilizing the Big Data collected in real-time. If the routh is designated according to the destination by the proposed method, the dangerous area is determined in real-time and the flight is made to the optimal bypass path. In further research, we will study ways to increase the quality satisfaction of the images acquired by flying under the avoidance flight plan.

Review of Environmental Impact Assessment Re-consulting System - A Comparative Analysis of Korea and Foreign Countries - (환경영향평가 변경협의 및 재협의 제도 고찰 - 국내외 제도 운용현황을 중심으로 -)

  • Kim, Jin-Oh;Joo, Yong-Joon
    • Journal of Environmental Impact Assessment
    • /
    • v.30 no.5
    • /
    • pp.328-338
    • /
    • 2021
  • EIA consultation is a final decision-making process that enables a variety of stakeholders to participate in and to share important information about the expected environmental impacts caused by development projects. However, this process is often undermined through re-consultation processes by significant changes in the proposed plans. EIA re-consultation is a necessary process when an approved plan needs to be changed for a variety of importantreasons including the changes of land use, delay of construction, and surrounding environments. EIA re-consultation is also important to resolve conflicts among stakeholders and to respond flexibly to unexpected changes in surrounding environment. This study aims to analyze the operation status and the problems of current institutional systems of EIA re-consultation, and to draw implications by reviewing institutional systems of other countries such as U.S. EU, Scotland, and Japan. On the basis of the previous analysis, we propose recommendations to improve the existing EIA re-consultation process. We expect this study helps understand operation status and problems of EIA re-consultation, and provides meaningful implications to improve the existing institutional systems and practice of re-consultation.

Causal Loop Diagram for the Relation Between Degree of Field Safety Management and Productivity Based on Effectiveness Metrics : Focusing on Plumbing work in Mega Project (작업효율 지표 기반 안전관리행위 - 생산성 인과 모델 구축 - 메가 프로젝트 배관공사 중심으로 -)

  • Chae, Yeon;Park, Moonseo;Cho, Jongwoo;Lee, Jinsol;Joo, Seonu;Hong, Yeongmin
    • Korean Journal of Construction Engineering and Management
    • /
    • v.22 no.2
    • /
    • pp.12-20
    • /
    • 2021
  • Unsafe working environments slow down working speed in that it takes a lot of time to respond in case of an accident, greatly reducing the productivity of construction work. Therefore, proper safety management that does not impede the productivity of construction works is a very important factor for successful construction project. However especially in mega project, the mutual effects of safety management and productivity are complex. Therefore, this study establishes a causal model between safety management and productivity influencing factors based on effectiveness metrics, and analyzes the effect of increased site congestion due to excessive personnel input, irregular safety measures and inefficient change of work schedules. The result of this study, is expected to contribute to enhancing the competitiveness of the construction industry as the basis for establishing a safety management plan that can secure appropriate productivity.

A Study on the Analysis of R&D Trends and the Development Plan of Electronic Attack System (전자공격체계 연구개발 동향 분석과 발전방안에 대한 연구)

  • Sim, Jaeseong;Park, Byoung-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.6
    • /
    • pp.469-476
    • /
    • 2021
  • An electronic attack (EA) system is an essential weapon system for performing electronic warfare missions that contain signal tracking and jamming against multiple threats using electromagnetic waves, such as air defense radars, wireless command and communication networks, and guided missiles. The combat effectiveness can be maximized, and the survivability of militarily protecting combat power can be enhanced through EA mission operations, such as disabling the functions of multiple threats. The EA system can be used as a radio frequency jamming system to respond to drone attacks on the core infrastructure, such as airports, power plants, and communication broadcasting systems, in the civilian field. This study examined the criteria for classification according to the electronic attack missions of foreign EA systems based on an aviation platform. The foreign R&D trends by those criteria were investigated. Moreover, by analyzing the R&D trends of domestic EA systems and future battlefields in the domestic security environments, this paper proposes technological development plans of EA systems suitable for the future battlefield environments compared to the foreign R&D trends.

A study for Information Security Risk Assessment Methodology Improvement by blockade and security system level assessment (봉쇄와 보안장비 수준평가를 통한 정보보호 위험평가 개선 연구)

  • Han, Choong-Hee;Han, ChangHee
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.187-196
    • /
    • 2020
  • In order to manage information security risk, various information security level evaluation and information security management system certification have been conducted on a larger scale than ever. However, there are continuous cases of infringement of information protection for companies with excellent information security evaluation and companies with excellent information security management system certification. The existing information security risk management methodology identifies and analyzes risks by identifying information assets inside the information system. Existing information security risk management methodology lacks a review of where cyber threats come from and whether security devices are properly operated for each route. In order to improve the current risk management plan, it is necessary to look at where cyber threats come from and improve the containment level for each inflow section to absolutely reduce unnecessary cyber threats. In addition, it is essential to measure and improve the appropriate configuration and operational level of security equipment that is currently overlooked in the risk management methodology. It is necessary to block and enter cyber threats as much as possible, and to detect and respond to cyber threats that inevitably pass through open niches and use security devices. Therefore, this paper proposes additional evaluation items for evaluating the containment level against cyber threats in the ISMS-P authentication items and vulnerability analysis and evaluation items for major information and communication infrastructures, and evaluates the level of security equipment configuration for each inflow.