• 제목/요약/키워드: Safer Impact factor

검색결과 3건 처리시간 0.019초

위험도 접근방법에 의한 건설사업 안전영향평가방안에 관한 연구 (Risk-based Safety Impact Assessment for Construction Projects)

  • 최현호;정평기;서종원;최욱
    • 한국건설관리학회:학술대회논문집
    • /
    • 한국건설관리학회 2004년도 제5회 정기학술발표대회 논문집
    • /
    • pp.504-509
    • /
    • 2004
  • 건설사업의 안전관리는 건설공사의 종류, 공법, 공정, 기후의 특성, 환경적 영향 등 여러 가지 복잡한 제반 요소에 영향을 받는 특성을 지니고 있으나, 현재 계획 및 설계단계에서 설계 실무를 담당하는 설계전문가들 조차도 안전에 관하여 고려하지 않고 설계업무를 수행하고 있으며, 설계로 인하여 대상 시설물이 어느 정도의 안전도를 지니게 되는지에 대한 인식이 부족한 실정이다. 따라서 본 연구에서는 건설사업의 안전사고 예방차원에서 유해위험을 설계단계에서 사전 안전도 차원의 설계를 수행하도록 유도하기 위하여 건설안전영향평가의 개념을 도입하고자 하며, 이에 따라 안전영향평가 관련 기술동향을 분석하여 위험도 방식에 근거한 합리적인 안전영향평가모형을 제안하였다. 제안된 안전영향평가모형은 건설사업의 안전영향 요소 수집 및 사고시나리오 작성방안, 설계와의 연관성 여부에 근거하여 설계에 의한 안전영향요소와 시공에 의한 안전영향요소로의 분류방안, 그리고 이에 대한 사건중요도 산정기법이 제안되어 있으며, 설계에 의한 안전영향요소로 분류된 각각의 안전영향요소와 설계항목과의 상관성을 규명한 안전영향평가 Checklist 개발방안과 이에 따른 위험도 접근방법에 의한 안전영향평가방안을 제시하고자 한다.

  • PDF

Bridge Inspection and condition assessment using Unmanned Aerial Vehicles (UAVs): Major challenges and solutions from a practical perspective

  • Jung, Hyung-Jo;Lee, Jin-Hwan;Yoon, Sungsik;Kim, In-Ho
    • Smart Structures and Systems
    • /
    • 제24권5호
    • /
    • pp.669-681
    • /
    • 2019
  • Bridge collapses may deliver a huge impact on our society in a very negative way. Out of many reasons why bridges collapse, poor maintenance is becoming a main contributing factor to many recent collapses. Furthermore, the aging of bridges is able to make the situation much worse. In order to prevent this unwanted event, it is indispensable to conduct continuous bridge monitoring and timely maintenance. Visual inspection is the most widely used method, but it is heavily dependent on the experience of the inspectors. It is also time-consuming, labor-intensive, costly, disruptive, and even unsafe for the inspectors. In order to address its limitations, in recent years increasing interests have been paid to the use of unmanned aerial vehicles (UAVs), which is expected to make the inspection process safer, faster and more cost-effective. In addition, it can cover the area where it is too hard to reach by inspectors. However, this strategy is still in a primitive stage because there are many things to be addressed for real implementation. In this paper, a typical procedure of bridge inspection using UAVs consisting of three phases (i.e., pre-inspection, inspection, and post-inspection phases) and the detailed tasks by phase are described. Also, three major challenges, which are related to a UAV's flight, image data acquisition, and damage identification, respectively, are identified from a practical perspective (e.g., localization of a UAV under the bridge, high-quality image capture, etc.) and their possible solutions are discussed by examining recently developed or currently developing techniques such as the graph-based localization algorithm, and the image quality assessment and enhancement strategy. In particular, deep learning based algorithms such as R-CNN and Mask R-CNN for classifying, localizing and quantifying several damage types (e.g., cracks, corrosion, spalling, efflorescence, etc.) in an automatic manner are discussed. This strategy is based on a huge amount of image data obtained from unmanned inspection equipment consisting of the UAV and imaging devices (vision and IR cameras).

패스워드의 정보시스템 보안효과에 영향을 미치는 요인에 관한 연구 (A Study on the Factors Affecting the Information Systems Security Effectiveness of Password)

  • 김종기;강다연
    • Asia pacific journal of information systems
    • /
    • 제18권4호
    • /
    • pp.1-26
    • /
    • 2008
  • Rapid progress of information technology and widespread use of the personal computers have brought various conveniences in our life. But this also provoked a series of problems such as hacking, malicious programs, illegal exposure of personal information etc. Information security threats are becoming more and more serious due to enhanced connectivity of information systems. Nevertheless, users are not much aware of the severity of the problems. Using appropriate password is supposed to bring out security effects such as preventing misuses and banning illegal users. The purpose of this research is to empirically analyze a research model which includes a series of factors influencing the effectiveness of passwords. The research model incorporates the concept of risk based on information systems risk analysis framework as the core element affecting the selection of passwords by users. The perceived risk is a main factor that influences user's attitude on password security, security awareness, and intention of security behavior. To validate the research model this study relied on questionnaire survey targeted on evening class MBA students. The data was analyzed by AMOS 7.0 which is one of popular tools based on covariance-based structural equation modeling. According to the results of this study, while threat is not related to the risk, information assets and vulnerability are related to the user's awareness of risk. The relationships between the risk, users security awareness, password selection and security effectiveness are all significant. Password exposure may lead to intrusion by hackers, data exposure and destruction. The insignificant relationship between security threat and perceived risk can be explained by user's indetermination of risk exposed due to weak passwords. In other words, information systems users do not consider password exposure as a severe security threat as well as indirect loss caused by inappropriate password. Another plausible explanation is that severity of threat perceived by users may be influenced by individual difference of risk propensity. This study confirms that security vulnerability is positively related to security risk which in turn increases risk of information loss. As the security risk increases so does user's security awareness. Security policies also have positive impact on security awareness. Higher security awareness leads to selection of safer passwords. If users are aware of responsibility of security problems and how to respond to password exposure and to solve security problems of computers, users choose better passwords. All these antecedents influence the effectiveness of passwords. Several implications can be derived from this study. First, this study empirically investigated the effect of user's security awareness on security effectiveness from a point of view based on good password selection practice. Second, information security risk analysis framework is used as a core element of the research model in this study. Risk analysis framework has been used very widely in practice, but very few studies incorporated the framework in the research model and empirically investigated. Third, the research model proposed in this study also focuses on impact of security awareness of information systems users on effectiveness of password from cognitive aspect of information systems users.