• Title/Summary/Keyword: Risk Management Plan

Search Result 583, Processing Time 0.031 seconds

An Improvement Method through Build-Transfer-Lease (BTL) Problem Analysis from the Special Purpose Company (SPC) Perspective (SPC 관점에서의 BTL사업 문제점 분석을 통한 개선방법)

  • Kim, Soo-Yong;Son, Myung-Chan;Yang, Jin-Kook
    • Korean Journal of Construction Engineering and Management
    • /
    • v.14 no.3
    • /
    • pp.167-175
    • /
    • 2013
  • In 2005, the government introduced BTL(Build-Transfer-Lease) projects as one of the methods of private investment in infrastructure. In a BTL project, a private company builds a public facility and leases it to the government to withdraw its invested capital. But there appear several problems with it due to a short period of preparation and lack of experiences. Specifically, private companies that plan to participate in this project have to take a risk since serious problems are likely to take place because of unrealistic estimation of construction costs, etc., and they finally avoid participating in this project. A case study was made over advanced countries, Japan and the United Kingdom, to find out how to resolve the problems, and rational 7 improvement method were presented from a perspective of Special Purpose Company (SPC), which could be accepted by both of SPC and government agencies. The findings of the study are expected to provide workable solutions to BTL projects from a standpoint of private companies to facilitate the rational improvement of BTL projects, and this study is ultimately expected to stimulate the active participation of SPC to make a contribution to the vitalization of domestic BTL projects.

Improvement on the System of Information to the Public for Chemical Accident Emergency Response (화학사고 응급정보에 대한 주민제공 체계 개선 방안)

  • Park, Hyesong;Song, Chi-sun;Shin, Chang-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.4
    • /
    • pp.571-579
    • /
    • 2019
  • To minimize the damage from chemical accidents, a risk management plan (RMP) has been implemented since 2015. According to this regulation, operators who handle more than the designated quantity of the accident preparedness chemicals should provide emergency response information to the public within the affected areas of accidents. The information, including chemicals, affected areas and evacuation instructions should be provided to the public in advance so that they can evacuate immediately in the event of a chemical accident. Currently, the information notification can be provided in various methods by being registered in the notification system, sent with written documents or delivered directly to the public. To examine the status of the operation method, this study analyzed similar cases overseas, investigated the degree of awareness of providing information through the number of the annual visitor of the Information Provision System, and obtained survey results from some residents. This current operation method are problems because the public, who do not have sufficient information about chemicals, do not understand the emergency information properly or it is difficult to recognize where the residents should find this information because of the convenient operation based on the information provider. In this study, measures were proposed to minimize the damage by making it easier for the public to understand the emergency information and the information communicated appropriately in advance by dividing them into an information providing method and post management.

A Study on the Application of Cybersecurity by Design of Critical Infrastructure (주요기반시설의 사전예방적보안(Cybersecurity by Design) 적용 방안에 관한 연구)

  • YOO, Jiyeon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.674-681
    • /
    • 2021
  • Cyber attacks targeting critical infrastructure are on the rise. Critical infrastructure is defined as core infrastructures within a country with a high degree of interdependence between the different structures; therefore, it is difficult to sufficiently protect it using outdated cybersecurity techniques. In particular, the distinction between the physical and logical risks of critical infrastructure is becoming ambiguous; therefore, risk management from a comprehensive perspective must be implemented. Accordingly, as a means of further actively protecting critical infrastructure, major countries have begun to apply their security and cybersecurity systems by design, as a more expanded concept is now being considered. This proactive security approach (CSbD, Cybersecurity by Design) includes not only securing the stability of software (SW) safety design and management, but also physical politics and device (HW) safety, precautionary and blocking measures, and overall resilience. It involves a comprehensive security system. Therefore, this study compares and analyzes security by design measures towards critical infrastructure that are leading the way in the US, Europe, and Singapore. It reflects the results of an analysis of optimal cybersecurity solutions for critical infrastructure. I would like to present a plan for applying by Design.

Application of Artificial Intelligence Technology for Dam-Reservoir Operation in Long-Term Solution to Flood and Drought in Upper Mun River Basin

  • Areeya Rittima;JidapaKraisangka;WudhichartSawangphol;YutthanaPhankamolsil;Allan Sriratana Tabucanon;YutthanaTalaluxmana;VarawootVudhivanich
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2023.05a
    • /
    • pp.30-30
    • /
    • 2023
  • This study aims to establish the multi-reservoir operation system model in the Upper Mun River Basin which includes 5 main dams namely, Mun Bon (MB), Lamchae (LC), Lam Takhong (LTK), Lam Phraphoeng (LPP), and Lower Lam Chiengkrai (LLCK) Dams. The knowledge and AI technology were applied aiming to develop innovative prototype for SMART dam-reservoir operation in future. Two different sorts of reservoir operation system model namely, Fuzzy Logic (FL) and Constraint Programming (CP) as well as the development of rainfall and reservoir inflow prediction models using Machine Learning (ML) technique were made to help specify the right amount of daily reservoir releases for the Royal Irrigation Department (RID). The model could also provide the essential information particularly for the Office of National Water Resource of Thailand (ONWR) to determine the short-term and long-term water resource management plan and strengthen water security against flood and drought in this region. The simulated results of base case scenario for reservoir operation in the Upper Mun from 2008 to 2021 indicated that in the same circumstances, FL and CP models could specify the new release schemes to increase the reservoir water storages at the beginning of dry season of approximately 125.25 and 142.20 MCM per year. This means that supplying the agricultural water to farmers in dry season could be well managed. In other words, water scarcity problem could substantially be moderated at some extent in case of incapability to control the expansion of cultivated area size properly. Moreover, using AI technology to determine the new reservoir release schemes plays important role in reducing the actual volume of water shortfall in the basin although the drought situation at LTK and LLCK Dams were still existed in some periods of time. Meanwhile, considering the predicted inflow and hydrologic factors downstream of 5 main dams by FL model and minimizing the flood volume by CP model could ensure that flood risk was considerably minimized as a result of new release schemes.

  • PDF

A Study on the Construction Equipment Object Extraction Model Based on Computer Vision Technology (컴퓨터 비전 기술 기반 건설장비 객체 추출 모델 적용 분석 연구)

  • Sungwon Kang;Wisung Yoo;Yoonseok Shin
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.4
    • /
    • pp.916-923
    • /
    • 2023
  • Purpose: Looking at the status of fatal accidents in the construction industry in the 2022 Industrial Accident Status Supplementary Statistics, 27.8% of all fatal accidents in the construction industry are caused by construction equipment. In order to overcome the limitations of tours and inspections caused by the enlargement of sites and high-rise buildings, we plan to build a model that can extract construction equipment using computer vision technology and analyze the model's accuracy and field applicability. Method: In this study, deep learning is used to learn image data from excavators, dump trucks, and mobile cranes among construction equipment, and then the learning results are evaluated and analyzed and applied to construction sites. Result: At site 'A', objects of excavators and dump trucks were extracted, and the average extraction accuracy was 81.42% for excavators and 78.23% for dump trucks. The mobile crane at site 'B' showed an average accuracy of 78.14%. Conclusion: It is believed that the efficiency of on-site safety management can be increased and the risk factors for disaster occurrence can be minimized. In addition, based on this study, it can be used as basic data on the introduction of smart construction technology at construction sites.

Assessment of the impact of climate variability on runoff change of middle-sized watersheds in Korea using Budyko hypothesis-based equation (Budyko 가설 기반 기후 탄력성을 고려한 기후변동이 우리나라 중권역 유출량 변화에 미치는 영향 평가)

  • Oh, Mi Ju;Hong, Dahee;Lim, Kyung Jin;Kwon, Hyun-Han;Kim, Tae-Woong
    • Journal of Korea Water Resources Association
    • /
    • v.57 no.4
    • /
    • pp.237-248
    • /
    • 2024
  • Watershed runoff that is an important component of the hydrological processes has been significantly altered by climate variability and human activities in many watersheds around the world. It is important to investigate the impacts of climate variability and human activities on watershed runoff change for water resource management. In this study, using watershed runoff data for 109 middle-sized watersheds in Korea, the impacts of climate variability and human activities on watershed runoff change were quantitatively evaluated. Using the Pittitt test, the analysis period was divided into two sub-periods, and the impacts of climate variability and human activities on the watershed runoff change were quantified using the Budyko hypothesis-based climate elasticity method. The overall results indicated that the relative contribution of climate variability and human activities to the watershed runoff change varied by middle-sized watersheds, and the dominant factors on the watershed runoff change were identified for each watershed among climate variability and human activities. The results of this study enable us to predict the watershed runoff change considering climate variability and watershed development plans, which provides useful information for establishing a water resource management plan to reduce the risk of hydrological disasters such as drought or flood.

Proposal for Ignition Source and Flammable Material Safety Management through 3D Modeling of Hazardous Area: Focus on Indoor Mixing Processes (폭발위험장소 구분도의 3D Modeling을 통한 점화원 및 가연물 안전관리 방안 제안: 실내 혼합공정을 중심으로)

  • Hak-Jae Kim;Duk-Han Kim;Young-Woo Chon
    • Journal of the Society of Disaster Information
    • /
    • v.20 no.1
    • /
    • pp.47-59
    • /
    • 2024
  • Purpose: This study aims to propose measures for the prevention of fire and explosion accidents within manufacturing facilities by improving the existing classification criteria for hazardous locations based on the leakage patterns of flammable liquids. The objective is to suggest ways to safely manage ignition sources and combustible materials. Method: The hazardous locations were calculated using "KS C IEC 60079-10-1," and the calculated explosion hazard distances were visualized in 3D. Additionally, the formula for the atmospheric dispersion of flammable vapors, as outlined in "P-91-2023," was utilized to calculate the dispersion rates within the hazardous locations represented in 3D. Result: Visualization of hazardous locations in 3D enabled the identification of blind spots in the floor plan, facilitating immediate recognition of ignition sources within these areas. Furthermore, when calculating the time taken for the Lower Explosive Limit (LEL) to reach within the volumetric space of the hazardous locations represented in 3D, it was found that the risk level did not correspond identically with the explosion hazard distances. Conclusion: Considering the atmospheric dispersion of flammable liquids, it was concluded that safety management should be conducted. Therefore, a method for calculating the concentration values requiring detection and alert based on realistically achievable ventilation rates within the facility is proposed.

The Effects of Psychological Contract Violation on OS User's Betrayal Behaviors: Window XP Technical Support Ending Case (심리적 계약 위반이 OS이용자의 배신 행동에 미치는 영향: 윈도우 XP 기술적 지원서비스 중단 사례)

  • Lee, Un-Kon
    • Asia pacific journal of information systems
    • /
    • v.24 no.3
    • /
    • pp.325-344
    • /
    • 2014
  • Technical support of Window XP ended in March, 8, 2014, and it makes OS(Operating System) users fall in a state of confusion. Sudden decision making of OS upgrade and replacement is not a simple problem. Firms need to change the long term capacity plan in enterprise IS management, but they are pressed for time and cost to complete it. Individuals can not help selecting the second best plan, because the following OSs of Window XP are below expectations in performances, new PC sales as the opportunities of OS upgrade decrease, and the potential risk of OS technical support ending had not announced to OS users at the point of purchase. Microsoft as the OS vendors had not presented precaution or remedy for this confusion. Rather, Microsoft announced that the technical support of the other following OSs of Wndow XP such as Window 7 would ended in two years. This conflict between OS vendor and OS users could not happen in one time, but could recur in recent future. Although studies on the ways of OS user protection policy would be needed to escape from this conflict, few prior studies had conducted this issue. This study had challenge to cautiously investigate in such OS user's reactions as the confirmation with OS user's expectation in the point of purchase, three types of justice perception on the treatment of OS vendor, psychological contract violation, satisfaction and the other betrayal behavioral intention in the case of Window XP technical support ending. By adopting the justice perception on this research, and by empirically validating the impact on OS user's reactions, I could suggest the direction of establishing OS user protection policy of OS vendor. Based on the expectation-confirmation theory, the theory of justice, literatures about psychological contract violation, and studies about consumer betrayal behaviors in the perspective of Herzberg(1968)'s dual factor theory, I developed the research model and hypothesis. Expectation-confirmation theory explain that consumers had expectation on the performance of product in the point of sale, and they could satisfied with their purchase behaviors, when the expectation could have confirmed in the point of consumption. The theory of justice in social exchange argues that treatee could be willing to accept the treatment by treater when the three types of justice as distributive, procedural, and interactional justice could be established in treatment. Literatures about psychological contract violation in human behaviors explains that contracter in a side could have the implied contract (also called 'psychological contract') which the contracter in the other side would sincerely execute the contract, and that they are willing to do vengeance behaviors when their contract had unfairly been broken. When the psychological contract of consumers had been broken, consumers feel distrust with the vendors and are willing to decrease such beneficial attitude and behavior as satisfaction, loyalty and repurchase intention. At the same time, consumers feel betrayal and are willing to increase such retributive attitude and behavior as negative word-of-mouth, complain to the vendors, complain to the third parties for consumer protection. We conducted a scenario survey in order to validate our research model at March, 2013, when is the point of news released firstly and when is the point of one year before the acture Window XP technical support ending. We collected the valid data from 238 voluntary participants who are the OS users but had not yet exposed the news of Window OSs technical support ending schedule. The subject had been allocated into two groups and one of two groups had been exposed this news. The data had been analyzed by the MANOVA and PLS. MANOVA results indicate that the OSs technical support ending could significantly decrease all three types of justice perception. PLS results indicated that it could significantly increase psychological contract violation and that this increased psychological contract violation could significantly reduce the trust and increase the perceived betrayal. Then, it could significantly reduce satisfaction, loyalty, and repurchase intention, and it also could significantly increase negative word-of-month intention, complain to the vendor intention, and complain to the third party intention. All hypothesis had been significantly approved. Consequently, OS users feel that the OSs technical support ending is not natural value added service ending, but the violation of the core OS purchase contract, that it could be the posteriori prohibition of OS user's OS usage right, and that it could induce the psychological contract violation of OS users. This study would contributions to introduce the psychological contract violation of the OS users from the OSs technical support ending in IS field, to introduce three types of justice as the antecedents of psychological contract violation, and to empirically validate the impact of psychological contract violation both on the beneficial and retributive behavioral intentions of OS users. For practice, the results of this study could contribute to make more comprehensive OS user protection policy and consumer relationship management practices of OS vendor.

The Study on Risk Factors Analysis and Improvement of VDT Syndrome in Nuclear Medicine (핵의학과 Video Display Terminals Syndrome 유해 요인 조사 및 개선에 관한 연구)

  • Kim, Jung-Soo;Kim, Seung-Jeong;Lee, Hong-Jae;Kim, Jin-Eui;Kim, Hyun-Joo;Han, In-Im;Joo, Yung-Soo
    • The Korean Journal of Nuclear Medicine Technology
    • /
    • v.14 no.1
    • /
    • pp.61-66
    • /
    • 2010
  • Purpose: Recently, Department of Nuclear Medicine have an interest in Video Display Terminals (VDT) syndrome including musculoskeletal disorders, ophthalmologic disorders, trouble of electromagnetic waves and stress disorders occur to VDT workers as the growing number of users and rapid pace of service period supply in large amount. This study research on the actual condition for VDT syndrome in Nuclear Medicine, Seoul National University Hospital (SNUH), discover the problem and draw a plan of upcoming improvement. The aim of this study establish awareness about VDT syndrome and is to prevent for it in the long run. Materials and Methods: Department of Nuclear Medicine, SNUH is composed Principle part, Pediatric part and PET center. We estimated risk factors visit in each part directly. Estimation method use "Check list for VDT work" of Wonjin working environment health laboratory and check list is condition of VDT work, condition of work tables, condition of chairs, condition of keyboards, condition of monitors, working position, character of health management and other working environment. Analysis result is verified in Department of Occupational and Environment, Hallym University Sacred Heard Hospital. Results: As a result of analysis, VDT condition of Department of Nuclear Medicine, SNUH is rule good. In case of work tables, recent of things are suitable to users upon the ergonomical planning, but 15% of existing work tables are below the standard value. In case of chairs are suitable, but 5% of theirs lost optimum capacity become superannuated. The keyboards are suitable for 98% of standard value. In case of monitors, angle control of screen is possible of all, but positioning control is impossible for 38%. In case of working position, 10% is fixed positioning for long time and some of the items researched unsuitable things for standard. At health management point, needed capable of improvement. Also, other working condition as lighting, temperature, noise and ventilation, discovered the problem, but is sufficient to advice value. Conclusion: VDT syndrome is occurrences of possibility continuously, come economical expensive about improvement, is inherent in various causes and originate without your knowledge. So, there is need systematic management system. In Nuclear Medicine, VDT syndrome make it better that constant interest and effort as improvement of ergonomical working environment, improvement of working procedure, regular exercise and steady stretching, and can be prevented fairly. This promote physical and mental condition of worker in top form in comfortable working environment, so this is judged by enlargement of operations efficiency and rising of satisfaction ratings of the inside client.

  • PDF

Current Status and Management of Alien Turtles in Korea (외래거북의 국내 현황 및 관리방안)

  • Lee, Do-Hun;Kim, Young-Chae;Chang, Min-Ho;Kim, Suhwan;Kim, Dongeon;Kil, Jihyon
    • Journal of Environmental Impact Assessment
    • /
    • v.25 no.5
    • /
    • pp.319-332
    • /
    • 2016
  • Alien turtles belonging to Genus Trachemys have been designated as Invasive Alien Species since 2001 and their import has been banned in Korea. However, current status of import and distribution of the other alien turtles have not been reported. In this study, we aimed to investigate the taxa of alien turtles introduced into Korea, to assess their potential risks to the natural ecosystems and to suggest the future management directions of them in Korea. We identified 73 species of alien turtles belonging to 9 families. Since 2008, more than 6,000 kg of turtles have been imported annually and widely distributed through the pet shops, traditional markets and individual transactions. From the survey of natural habitats, we found that 8 species belonging to 3 families including Chrysemys picta, Pseudemys concinna, P. nelsoni, P. peninsularis, P. rubriventris, Mauremys sinensis, Macrochelys temminckii and Trachemys scripta have inhabited in 12 study sites. Out of 73 alien turtles, the potential adverse impacts of 13 species to ecosystems are serious when we considered status of designation of invasive alien species in other countries. For the management of alien turtles, it is required to register alien turtles in the import list and share general information such as import purpose, distribution and management condition among relevant authorities. The breeders and distributors must be obliged to identify turtles and to record management. The government must check transfer and migration of turtles periodically to prevent their introduction and spread into natural environments. The change of alien turtle populations in natural habitats should be monitored and their management plan should be developed to control the alien turtles in areas where the impacts are significant.