• Title/Summary/Keyword: Safety training

Search Result 1,975, Processing Time 0.035 seconds

Exploratory Study on Enhancing Cyber Security for Busan Port Container Terminals (부산항 컨테이너 터미널 사이버 보안 강화를 위한 탐색적 연구)

  • Do-Yeon Ha;Yul-Seong Kim
    • Journal of Navigation and Port Research
    • /
    • v.47 no.6
    • /
    • pp.437-447
    • /
    • 2023
  • By actively adopting technologies from the Fourth Industrial Revolution, the port industry is trending toward new types of ports, such as automated and smart ports. However, behind the development of these ports, there is an increasing risk of cyber security incidents and threats within ports and container terminals, including information leakage through cargo handling equipment and ransomware attacks leading to disruptions in terminal operations. Despite the necessity of research to enhance cyber security within ports, there is a lack of such studies in the domestic context. This study focuses on Busan Port, a representative port in South Korea that actively incorporates technology from the Fourth Industrial Revolution, in order to discover variables for improving cyber security in container terminals. The research results categorized factors for enhancing cyber security in Busan Port's container terminals into network construction and policy support, standardization of education and personnel training, and legal and regulatory factors. Subsequently, multiple regression analysis was conducted based on these factors, leading to the identification of detailed factors for securing and enhancing safety, reliability, performance, and satisfaction in Busan Port's container terminals. The significance of this study lies in providing direction for enhancing cyber security in Busan Port's container terminals and addressing the increasing incidents of cyber security attacks within ports and container terminals.

Exploring the Meaning of the 2018 'Comprehensive Plan for Vitalizing Democratic Citizenship Education' (2018년 '민주시민 교육 활성화를 위한 종합계획' 의미탐색)

  • Yoon Ok Han
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.1
    • /
    • pp.51-60
    • /
    • 2024
  • The purpose of this study is to explore the meaning of the 2018 'Comprehensive Plan for the Vitalization of Democratic Citizenship Education' centered on the '2022 Revised Curriculum General Discussion'. Research Results First, in the case of strengthening democratic citizenship education in schools, one of the main tasks in the general discussion of the 2022 revised curriculum emphasizes democratic citizenship education to cultivate citizenship. are doing Second, in the case of teacher professionalism enhancement and support for educational activities, development of teaching and learning materials and reinforcement of teacher training are promoted in the 2022 revised curriculum summary. Third, in the case of creating a democratic school culture, the 2022 revised curriculum outline guarantees student safety and learning rights through remodeling or remodeling old schools to restructure learning spaces and realize a digital-based learning environment. Fourth, in the case of revitalization of student autonomy, in the general discussion of the 2022 revised curriculum, the autonomy of the school curriculum considering the needs of students and school conditions is expanded, and classes centered on participatory experiences and self-government activities are strengthened. Fifth, in the case of establishing a democratic citizenship education support system, the 2022 revised curriculum outline establishes a mutual cooperation system that respects the roles and expertise of various educational subjects and a mutual cooperation system between the local community and the educational community.

Angioembolization performed by trauma surgeons for trauma patients: is it feasible in Korea? A retrospective study

  • Soonseong Kwon;Kyounghwan Kim;Soon Tak Jeong;Joongsuck Kim;Kwanghee Yeo;Ohsang Kwon;Sung Jin Park;Jihun Gwak;Wu Seong Kang
    • Journal of Trauma and Injury
    • /
    • v.37 no.1
    • /
    • pp.28-36
    • /
    • 2024
  • Purpose: Recent advancements in interventional radiology have made angioembolization an invaluable modality in trauma care. Angioembolization is typically performed by interventional radiologists. In this study, we aimed to investigate the safety and efficacy of emergency angioembolization performed by trauma surgeons. Methods: We identified trauma patients who underwent emergency angiography due to significant trauma-related hemorrhage between January 2020 and June 2023 at Jeju Regional Trauma Center. Until May 2022, two dedicated interventional radiologists performed emergency angiography at our center. However, since June 2022, a trauma surgeon with a background and experience in vascular surgery has performed emergency angiography for trauma-related bleeding. The indications for trauma surgeon-performed angiography included significant hemorrhage from liver injury, pelvic injury, splenic injury, or kidney injury. We assessed the angiography results according to the operator of the initial angiographic procedure. The term "failure of the first angioembolization" was defined as rebleeding from any cause, encompassing patients who underwent either re-embolization due to rebleeding or surgery due to rebleeding. Results: No significant differences were found between the interventional radiologists and the trauma surgeon in terms of re-embolization due to rebleeding, surgery due to rebleeding, or the overall failure rate of the first angioembolization. Mortality and morbidity rates were also similar between the two groups. In a multivariable logistic regression analysis evaluating failure after the first angioembolization, pelvic embolization emerged as the sole significant risk factor (adjusted odds ratio, 3.29; 95% confidence interval, 1.05-10.33; P=0.041). Trauma surgeon-performed angioembolization was not deemed a significant risk factor in the multivariable logistic regression model. Conclusions: Trauma surgeons, when equipped with the necessary endovascular skills and experience, can safely perform angioembolization. To further improve quality control, an enhanced training curriculum for trauma surgeons is warranted.

A Study Security Measures for Protection of VIP in the G20 Summit (G20 정상회의 시 주(主)행사장에서의 VIP 안전대책 방안에 관한 연구)

  • Lee, Sun-Ki;Lee, Choong-Soo
    • Korean Security Journal
    • /
    • no.24
    • /
    • pp.91-123
    • /
    • 2010
  • The threat factors available for occurrence given G20 Summit Meeting are expected leader terrorism, hostage terrorism, bomb terrorism, public facilities terrorism, and aircraft terrorism. As for the threat groups, which are expected in Korea, the North Korea, Islam extremist group, and the group such as NGO organization of being opposed to international meeting are regarded as having possibility of causing hazard. Thus, the purpose of this study is to suggest VIP Security-measure plans in the main site in preparation for G20 Summit Meeting. Accordingly, each country in the world is adopting 'the principle of Triple Ring' in common. Thus, it elicited a coping plan by 1st line(inner ring) 2nd line(middle ring) 3rd line(outer ring) based on this principle, and proposed even an opinion together that will need to be reflected in light of policy for the VIP security measures. In conclusion, as for the VIP Security-measure plans in the main site in preparation for G20 Summit Meeting, In the inner ring(safety sector), first, an intercepting measure needs to be devised for a spot of getting into and out of vehicles given the Straight Street. Second, the Walking Formation needs to be reinforced boldly in the exposed area. In the middle ring(security sector), first, the control plan needs to be devised by considering particularity of the main site. Second, there is necessity for adopting the efficient security badge operation plan that is included RFID function within security badge. In the outer ring(aid protective sector), first, there is necessity of preparing for several VIP terrorisms, of collecting information and intelligence, and of reinforcing the information collection system against terrorism under the cooperation with the overseas information agency. Second, the urgent measure training in time of emergency needs to be carried out toward security agent event manpower. Third, to maintain the certain pace in VIP motorcade, the efficient traffic control system needs to be operated. Finally, as for what will need to be reflected in light of policy for VIP security measures, first, there is necessity for allowing VIP residence to be efficiently dispersed to be distributed and controlled. Second, there is necessity for allowing impure element to misjudge or attack to be failed by utilizing diverse deception operations. Third, according to the reorganization in North Korea's Organization of the South Directed Operations, the powerful 'military-support measure' needs to be driven from this G20 Summit Meeting. For this, the necessity was proposed for further reinforcing the front back defense posture under the supervision of the Ministry of National Defense and for positively coping even with detecting and removing poison in preparation for CBR (chemical, biological, and radio-logical) terrorism.

  • PDF

A Study on the Design of Standard Code for Hazardous and Noxious Substance Accidents at Sea (해상 HNS 사고 표준코드 설계에 관한 연구)

  • Ha, Min-Jae;Jang, Ha-Lyong;Yun, Jong-Hwui;Lee, Moonjin;Lee, Eun-Bang
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.22 no.2
    • /
    • pp.228-232
    • /
    • 2016
  • As the quantity of HNS sea trasport and the number of HNS accidents at sea are increasing recently, the importance of HNS management is emphasized so that we try to develop marine accident case standard code for making HNS accidents at sea databased systemically in this study. First and foremost, we draw the related requisites of essential accident reports along with internal and external decrees and established statistics of classified items for conducting study, and we referred to analogous standard codes obtained from developed countries in order to research code design. Code design is set like 'Accident occurrence ${\rightarrow}$ The initial accident information ${\rightarrow}$ Accident response ${\rightarrow}$ Accident investigation' in accordance with the general flow of marine HNS accidents of in which the accident information is input and queried. We classified initial accident information into the items of five categories and constructed "Preliminary Information Code(P.I.C.)". In addition we constructed accident response in two categories and accident investigation in three categories that get possible after the accident occurrence as called "Full Information(F.I.C.)", including the P.I.C. It is represented in 3 kinds of steps on each topic by departmentalizing the classified majority as classified middle class and classified minority. As a result of coding marine HNS accident and of the code to a typical example of marine HNS accident, HNS accident was ascertained to be represented sufficiently well. We expect that it is feasible to predict possible trouble or accident henceforward by applying code, and also consider that it is valuable to the preparedness, response and restoration in relation to HNS accidents at sea by managing systemically the data of marine HNS accidents which will occur in the future.

A Study on the Effects of an Increase in the Height of Ship's Accommodation Area on Safe Evacuation in Emergency Situation (선박 거주구역의 높이가 피난안전에 미치는 영향에 대한 연구)

  • Kim, Won-Ouk;Kim, Jong-Su
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.17 no.1
    • /
    • pp.69-73
    • /
    • 2011
  • Unlike land fires, Fires on board a ship are not likely to be extinguished by skilled human resources using a variety of fire fighting equipments, but have to be brought under control on board a ship itself despite of difficult task. There are more cases of deaths from suffocation by smoke than from an increased temperature by heat in fires on board ships, because crew fail to secure a sufficient visibility range enough to escape from the scene of a fire or to leave the ship as early as possible. On the assumption that the height of ship's accommodation area increases from 2.0m to 2.3m comparable to the height of apartments on the ground in Korea, behaviors of fire smokes between the cases of 2.0m and 2.3m heights were compared and analyzed. Based on the blue print of the existing Training Ship "Hanbada", a new blueprint with the 30 cm height adjustment was additionally created. FDS (Fire Dynamic Simulator), which was created by the NIST in the United States and is the most widely distributed simulator for fires, was used to conduct a simulation and predict results. The results of simulation on the basis of temperature of $60^{\circ}C$ showed a safe evacuation period of time at the position 10m apart from the scene of a fire to increase by 55.8 seconds, when the height of ship's accommodation area increased from 2.0m to 2.3m. The results of simulation on the basis of visibility range of 6m showed the safe evacuation periods of time at the positions 10m, 20m and 30m apart from the scene of a fire to increase by 27.1 seconds, 109.2 seconds and 73.3 seconds, respectively, as the height of ship's accommodation area increased from 2.0m to 2.3m. This means that crew can escape more safely from a scene of fires on board when the height of ship's accommodation area is increased and equal to the height of living room in a building on land.

Analysis of Long-Term Variation in Marine Traffic Volume and Characteristics of Ship Traffic Routes in Yeosu Gwangyang Port (여수광양항 해상교통량의 장기변동 및 통항 특성)

  • Kim, Dae-Jin;Shin, Hyeong-Ho;Jang, Duck-Jong
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.26 no.1
    • /
    • pp.31-38
    • /
    • 2020
  • The characteristics of ship traffic routes and the long term fluctuation in marine traf ic volume of the incoming and outgoing routes of the Yeosu Gwangyang Port were analyzed using vessel traffic data from the past 22 years and a real-time vessel traffic volume survey performed for 72 hours per year, for three years, between 2015 and 2017. As of 2017, the number of vessels passing through Yeosu Gwangyang Port was about 66,000 and the total tonnage of these ships was about 804,564 thousand tons, which is a 400 % increase from the 189,906 thousand tons shipped in 1996. Specifically, the dangerous cargo volume was 140,000 thousand tons, which is a 250 % increase compared to 1996. According to the real-time vessel traffic volume survey, the average daily number of vessels was 357, and traf ic route utilization rates were 28.1 % in the Nakpo sea area, 43.8 % in the specified sea area, and the coastal area traf ic route, Dolsan coastal area, and Kumhodo sea area showed the same rate of 6.8 %. Many routes meet in the Nakpo sea area and, parallel and cross passing were frequent. Many small work vessels entered the specific sea area from the neighboring coastal area traffic route and frequently intersected the path of larger vessels. The anchorage waiting rate for cargo ships was about 24 %, and the nightly passing rate for dangerous cargo ships such as chemical vessels and tankers was about 20 %. Although the vessel traffic volume of Yeosu Gwangyang Port increases every year, the vessel traffic routes remain the same. Therefore, the risk of accidents is constantly increasing. The route conditions must be improved by dredging and expanding the available routes to reduce the high risk of ship accidents due to overlapping routes, by removing reefs, and by reinforcing navigational aids. In addition, the entry and exit time for dangerous cargo ships at high-risk ports must be strictly regulated. Advancements in the VTS system can help to actively manage the traffic of small vessels using the coastal area traffic route.

Basic Research for Designing a Specialized Curriculum for Women Students at the Maritime College - Focusing on Mokpo National Maritime University (해사대학 여학생 특화 교육과정 설계를 위한 기초연구 - 목포해양대학교를 중심으로)

  • Kim, Seungyeon;Park, Jun-Mo;Jeong, Dae-Deuk
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.26 no.4
    • /
    • pp.346-352
    • /
    • 2020
  • It has been about 30 years since women students entered the Maritime College at Mokpo National Maritime University (MMU) and Korea Maritime & Ocean University to train as maritime seafarers. The women have been choosing a maritime college regardless of the Boarding Service Reserve System. Therefore, it is necessary to continuously study the motivation for admission, preferences for boarding, and desired career paths to guide the distinction and vision of maritime colleges. Accordingly, this study conducted a questionnaire survey on 93 women students attending the Maritime College at MMU. Of the respondents, 35.5 % said that they enrolled to become maritime officials and 30.1 % to become maritime seafarers. In addition to the current training for maritime seafarers, additional courses are required to train maritime experts. The study found that 88.2 % of the respondents thought that women's embarkation was more difficult than usual. It is considered that a systematic education program is needed for the onboard life of women maritime seafarers in schools and shipping companies. It was found that 69.6 % of the respondents preferred to embark as seafarers after graduation. After graduating from university, 32.3 % of the respondents said that they preferred to become navigation officers or engineers. It was also found that 24.7 % preferred to become marine-related civil servants / professionals, and 18.3 % preferred to become marine police. From the total, 83.9 % hoped for careers in marine-related fields. It is, therefore, necessary to organize courses and further education according to the motives for admission and preferred occupations of women students.

International Success the Second Time Around: A Case Study (제이륜국제성공(第二轮国际成功): 일개안례연구(一个案例研究))

  • Colley, Mary Catherine;Gatlin, Brandie
    • Journal of Global Scholars of Marketing Science
    • /
    • v.20 no.2
    • /
    • pp.173-178
    • /
    • 2010
  • A privately held, third generation family owned company, Boom Technologies, Inc. (BTI), a provider of products and services to the electric utility, telecommunications and contractor markets, continues to make progress in exporting. Although export sales only equaled 5% of total revenue in 2008, BTI has an entire export division. Their export division's Managing Director reveals the trial and errors of a privately held company and their quest for success overseas. From its inception, BTI has always believed its greatest asset is its employees. When export sales struggled due to lack of strategy and direction, BTI hired a Managing Director for its export division. With leadership and guidance from BTI's president and from the Managing Director, they utilized the department's skills and knowledge. Structural changes were made to expand their market presence abroad and increase export sales. As a result, export sales increased four-fold, area managers in new countries were added and distribution networks were successfully cultivated. At times, revenue generation was difficult to determine due to the structure of the company. Therefore, in 1996, the export division was restructured as a limited liability company. This allowed the company to improve the tracking of revenue and expenses. Originally, 80% of BTI's export sales came from two countries; therefore, the initial approach to selling overseas was not reaching their anticipated goals of expanding their foreign market presence. However, changes were made and now the company manages the details of selling to over 80 countries. There were three major export expansion challenges noted by the Managing Director: 1. Product and Shipping - The major obstacle for BTI was product assembly. Originally, the majority of the product was assembled in the United States, which increased shipping and packaging costs. With so many parts specified in the order, many times the order would arrive with parts missing. The missing parts could equate to tens of thousands of dollars. Shipping these missing parts separately in another shipment also cost tens of thousands of dollar, plus a delivery delay time of six to eight weeks; all of which came out of the BTI's pockets. 2. Product Adaptation - Safety and product standards varied widely for each of the 80 countries to which BTI exported. Weights, special licenses, product specification requirements, measurement systems, and truck stability can all differ from country to country and can serve as a type of barrier to entry, making it difficult to adapt products accordingly. Technical and safety standards are barriers that serve as a type of protection for the local industry and can stand in the way of successfully pursuing foreign markets. 3. Marketing Challenges - The importance of distribution creates many challenges for BTI as they attempt to determine how each country prefers to operate with regard to their distribution systems. Some countries have competition from a small competitor that only produces one competing product; whereas BTI manufactures over 100 products. Marketing material is another concern for BTI as they attempt to push marketing costs to the distributors. Adapting the marketing material can be costly in terms of translation and cultural differences. In addition, the size of paper in the United States differs from those in some countries, causing many problems when attempting to copy the same layout and With distribution being one of several challenges for BTI, the company claims their distribution network is one of their competitive advantages, as the location and names of their distributors are not revealed. In addition, BTI rotates two offerings yearly: training to their distributors one year and then the next is a distributor's meeting. With a focus on product and shipping, product adaptation, and marketing challenges, the intricacies of selling overseas takes time and patience. Another competitive advantage noted is BTI's cradle to grave strategy, where they follow the product from sale to its final resting place, whether the truck is leased or purchased new or used. They also offer service and maintenance plans with a detailed cost analysis provided to the company prior to purchasing or leasing the product. Expanding abroad will always create challenges for a company. As the Managing Director stated, "If you don't have patience (in the export business), you better do something else." Knowing how to adapt quickly provides BTI with the skills necessary to adjust to the changing needs of each country and its own unique challenges, allowing them to remain competitive.

Wearable Computers

  • Cho, Gil-Soo;Barfield, Woodrow;Baird, Kevin
    • Fiber Technology and Industry
    • /
    • v.2 no.4
    • /
    • pp.490-508
    • /
    • 1998
  • One of the latest fields of research in the area of output devices is tactual display devices [13,31]. These tactual or haptic devices allow the user to receive haptic feedback output from a variety of sources. This allows the user to actually feel virtual objects and manipulate them by touch. This is an emerging technology and will be instrumental in enhancing the realism of wearable augmented environments for certain applications. Tactual displays have previously been used for scientific visualization in virtual environments by chemists and engineers to improve perception and understanding of force fields and of world models populated with the impenetrable. In addition to tactual displays, the use of wearable audio displays that allow sound to be spatialized are being developed. With wearable computers, designers will soon be able to pair spatialized sound to virtual representations of objects when appropriate to make the wearable computer experience even more realistic to the user. Furthermore, as the number and complexity of wearable computing applications continues to grow, there will be increasing needs for systems that are faster, lighter, and have higher resolution displays. Better networking technology will also need to be developed to allow all users of wearable computers to have high bandwidth connections for real time information gathering and collaboration. In addition to the technology advances that make users need to wear computers in everyday life, there is also the desire to have users want to wear their computers. In order to do this, wearable computing needs to be unobtrusive and socially acceptable. By making wearables smaller and lighter, or actually embedding them in clothing, users can conceal them easily and wear them comfortably. The military is currently working on the development of the Personal Information Carrier (PIC) or digital dog tag. The PIC is a small electronic storage device containing medical information about the wearer. While old military dog tags contained only 5 lines of information, the digital tags may contain volumes of multi-media information including medical history, X-rays, and cardiograms. Using hand held devices in the field, medics would be able to call this information up in real time for better treatment. A fully functional transmittable device is still years off, but this technology once developed in the military, could be adapted tp civilian users and provide ant information, medical or otherwise, in a portable, not obstructive, and fashionable way. Another future device that could increase safety and well being of its users is the nose on-a-chip developed by the Oak Ridge National Lab in Tennessee. This tiny digital silicon chip about the size of a dime, is capable of 'smelling' natural gas leaks in stoves, heaters, and other appliances. It can also detect dangerous levels of carbon monoxide. This device can also be configured to notify the fire department when a leak is detected. This nose chip should be commercially available within 2 years, and is inexpensive, requires low power, and is very sensitive. Along with gas detection capabilities, this device may someday also be configured to detect smoke and other harmful gases. By embedding this chip into workers uniforms, name tags, etc., this could be a lifesaving computational accessory. In addition to the future safety technology soon to be available as accessories are devices that are for entertainment and security. The LCI computer group is developing a Smartpen, that electronically verifies a user's signature. With the increase in credit card use and the rise in forgeries, is the need for commercial industries to constantly verify signatures. This Smartpen writes like a normal pen but uses sensors to detect the motion of the pen as the user signs their name to authenticate the signature. This computational accessory should be available in 1999, and would bring increased peace of mind to consumers and vendors alike. In the entertainment domain, Panasonic is creating the first portable hand-held DVD player. This device weight less than 3 pounds and has a screen about 6' across. The color LCD has the same 16:9 aspect ratio of a cinema screen and supports a high resolution of 280,000 pixels and stereo sound. The player can play standard DVD movies and has a hour battery life for mobile use. To summarize, in this paper we presented concepts related to the design and use of wearable computers with extensions to smart spaces. For some time, researchers in telerobotics have used computer graphics to enhance remote scenes. Recent advances in augmented reality displays make it possible to enhance the user's local environment with 'information'. As shown in this paper, there are many application areas for this technology such as medicine, manufacturing, training, and recreation. Wearable computers allow a much closer association of information with the user. By embedding sensors in the wearable to allow it to see what the user sees, hear what the user hears, sense the user's physical state, and analyze what the user is typing, an intelligent agent may be able to analyze what the user is doing and try to predict the resources he will need next or in the near future. Using this information, the agent may download files, reserve communications bandwidth, post reminders, or automatically send updates to colleagues to help facilitate the user's daily interactions. This intelligent wearable computer would be able to act as a personal assistant, who is always around, knows the user's personal preferences and tastes, and tries to streamline interactions with the rest of the world.

  • PDF