• Title/Summary/Keyword: Scientific prevention measures

Search Result 36, Processing Time 0.018 seconds

Comparative Analysis of COVID-19 Pandemic Crisis Response Capacities by Countries (코로나19 팬데믹 위기 대응 역량의 국가별 비교분석)

  • Yoon Hyeon Lee
    • The Journal of Korean Society for School & Community Health Education
    • /
    • v.25 no.2
    • /
    • pp.59-70
    • /
    • 2024
  • Objectives: The purpose of this study is to analyze each country's infectious disease response capacities and, based on this, find areas for improvement in Korea's infectious disease management response. Methods: First, the capacity to respond to the COVID-19 infectious disease was analyzed by country using the SPAR scores of 96 countries around the world released by WHO in 2022. Second, we analyzed each country's specific COVID-19 quarantine performance using Our World in Data and the Global Health Security Index (GHSI). Results: First, the quarantine intensity index on January 24, 2021 was the highest in the Southeast Asia branch at 67.6, which had strong quarantine measures, and the lowest at 44.5 in the Africa branch. As of December 31, 2022, the quarantine intensity index in Europe was significantly lowered to 11.6. Second, the factor that influenced the SPAR indicator on the total number of patients per million population was national laboratory (C4), p=.027, and the factor that influenced the total number of deaths per million population was infection prevention and control (C9), p=.005., Risk Communication and Community Participation (C10) p=.040. The influential factor on GDP per capita was infection prevention and control (C9) p=.009, and the influential factor on GHSI was infection prevention and control (C9) p=.002. Conclusion: The research findings indicate that it was difficult to find a correlation between the SPAR, which is each country's self-assessment of their infectious disease capacities, and the number of COVID-19 cases or the intensity of pandemic responses. However, mortality rates, as well as factors such as the Global Health Security Index (GHSI) and national income, appear to be somewhat influenced. For future improvements in infectious disease management and response in our country, it is necessary to develop pandemic strategies that can reduce socio-economic costs based on more scientific and reliable data like JEE or GHSI, especially in preparation for potential unknown emerging infectious diseases. Based on this, proactive decision-making led by a control tower of experts and effective health communication are also required to respond to public health crises at a national level.

Limitations of National Responsibility and its Application on Marine Environmental Pollution beyond Borders -Focused on the Effects of China's Three Gorges Dam on the Marine Environment in the East China Sea- (국경을 넘는 해양환경오염에 대한 국가책임과 적용의 한계 -중국의 산샤댐 건설로 인한 동중국해 해양환경 영향을 중심으로-)

  • Yang, Hee Cheol
    • Ocean and Polar Research
    • /
    • v.37 no.4
    • /
    • pp.341-356
    • /
    • 2015
  • A nation has a sovereign right to develop and use its natural resources according to its policies with regard to development and the relevant environment. A nation also has an obligation not to harm other countries or damage environments of neighboring countries as consequences of such actions of developments or use of natural resources. However, international precedents induce a nation to take additional actions not to cause more damages from the specific acts causing environmental damages beyond national borders, when such acts have economic and social importance. That is to say that there is a tendency to resolve such issues in a way to promote the balance between the mutual interests by allowing such actions to continue. A solution to China's Three Gorges Dam dilemma based on a soft law approach is more credible than relying on a good faith approach of national responsibilities and international legal proceedings since the construction and operation of the dam falls within the category of exercising national sovereign rights. If a large scale construction project such as the Three Gorges Dam or operation of a nuclear power plant causes or may cause environmental damage beyond the border of a nation engaged in such an undertaking, countries affected by this undertaking should jointly monitor the environmental effects in a spirit of cooperation rather than trying to stop the construction and should seek cooperative solutions of mutual understanding to establish measures to prevent further damages. If China's Three Gorges Dam construction and operation cause or contain the possibility of causing serious damages to marine environment, China cannot set aside its national responsibility to meet international obligations if China is aware of or knows about the damage that has occurred or may occur but fail to prevent, minimize, reverse or eliminate additional chances of such damages, or fails to put in place measures in order to prevent the recurrence of such damages. However, Korea must be able to prove a causal relationship between the relevant actions and resulting damages if it is to raise objections to the construction or request certain damage-prevention actions against crucial adverse effects on the marine environment out of respect for China's right to develop resources and acts of use thereof. Therefore, it is essential to cumulate continuous monitoring and evaluations information pertaining to marine environmental changes and impacts or responses of affected waters as well as acquisition of scientific baseline data with observed changes in such baseline. As China has adopted a somewhat nonchalant attitude toward taking adequate actions to protect against marine pollution risks or adverse effects caused by the construction and operation of China's Three Gorges Dam, there is a need to persuade China to adopt a more active stance and become involved in the monitoring and co-investigation of the Yellow Sea in order to protect the marine environment. Moreover, there is a need to build a regular environmental monitoring system that includes the evaluation of environmental effects beyond borders. The Espoo Convention can serve as a mechanism to ease potential conflicts of national interest in the Northeast Asian waters where political and historical sensitivities are acute. Especially, the recent diplomatic policy advanced by Korea and China can be implemented as an important example of gentle cooperation as the policy tool of choice is based on regional cooperation or cooperation between different regions.

A Study on the Optimization Methods of Security Risk Analysis and Management (경비위험 분석 및 관리의 최적화 방안에 관한 연구)

  • Lee, Doo-Suck
    • Korean Security Journal
    • /
    • no.10
    • /
    • pp.189-213
    • /
    • 2005
  • Risk management should be controlled systematically by effectively evaluating and suggesting countermeasures against the various risks which are followed by the change of the society and environment. These days, enterprise risk management became a new trend in the field. The first step in risk analysis is to recognize the risk factors, that is to verify the vulnerabilities of loss in the security facilities. The second step is to consider the probability of loss in assessing the risk factors. And the third step is to evaluate the criticality of loss. The security manager will determine the assessment grades and then the risk levels of each risk factor, on the basis of the result of risk analysis which includes the assessment of vulnerability, the provability of loss and the criticality. It is of great importance to put the result of risk analysis in mathematical statement for a scientific approach to risk management. Using the risk levels gained from the risk analysis, the security manager can develop a comprehensive and supplementary security plan. In planning the risk management measures to prepare against and minimize the loss, insurance is one of the best loss-prevention programs. However, insurance in and of itself is no longer able to meet the security challenges faced by major corporations. The security manager have to consider the cost-effectiveness, to suggest the productive risk management alternatives by using the security files which contains every information about the security matters. Also he/she have to reinforce the company regulations on security and safety, and to execute education repeatedly on security and risk management. Risk management makes the most efficient before-the-loss arrangement for and after-the-loss continuation of a business. So it is very much important to suggest a best cost-effective and realistic alternatives for optimizing risk management above all, and this function should by maintained and developed continuously and repeatedly.

  • PDF

Effective Management of Invasive Nutria (Myocastor coypus) in the UK and the USA (영국과 미국에서 침입성 뉴트리아 (Myocastor coypus)의 효과적 관리)

  • Kil, Jihyon;Lee, Do-hun;Kim, Young-chae
    • Ecology and Resilient Infrastructure
    • /
    • v.2 no.4
    • /
    • pp.265-273
    • /
    • 2015
  • It is the better to take preventative measures against the natural intrusion in advance from invasive alien species that reduce biodiversity and cause economic loss to humans. If the prevention of intrusion and spread fails, we need to make active control and eradication. This study aims to introduce nutria (Myocastor coypus) control cases performed in the United Kingdom and the United States and to provide information for the contribution of nutria management measure improvements. The nutria eradication campaign in the United Kingdom was developed as a long-term plan based on sufficient understanding on the management target and objective and suitable support. Sufficient information on nutria was accumulated and the management strategy was flexibly modified according to the changes in management that were proactively reflected in the field. Regarding the eradication project at Chesapeake Bay in the United States, based on long-term ecological information, more advanced capture technology than in the United Kingdom were introduced and the eradication plan, strategy and implementation were configured by analyzing the strengths and weaknesses of the eradication campaign in the United Kingdom. The successful cases in the United Kingdom and the United State provide an information on how to improv the nutria management measure. For the eradication of nutria, it is necessary to reach a consensus between stakeholders and to form a consultative group between related organizations for periodic communication. Opinions on the field must be actively accepted in the consultation process for strategy and policy decision, and the eradication plan needs to be developed based on a management index. The eradication plan is required to be managed, evaluated and adjusted in a systematic way. Scientific management must be introduced and the management performance must be evaluated objectively so that a practical plan can be flexibly adjusted. It is also required to secure a long-term budget support and a stable organization and to input a concentrated budget at the proper period when there is high efficiency of eradication.

An Analysis of Swimming Injuries and Their Rehabilitation (근육 골격계의 질환 및 재활분석(수영선수를 중심으로))

  • Kim, Kwi-Baek;Ji, Jin-Gu;Kwak, Yi-Sub
    • Journal of Life Science
    • /
    • v.32 no.4
    • /
    • pp.325-330
    • /
    • 2022
  • While swimming is a very popular competitive sports activity, swimming injuries are unique due to the repetitive nature of the swimming stroke and demanding training programs that can result in upper limb overuse. Therefore, the primary objective of this review was to analyze swimmers' injury areas, injury types by stroke type, and swimming rehabilitation, as well as to discuss safety management for improving swimming performance. In this study, the injuries incurred in swimming events were discussed in the order of upper limb injuries (neck, shoulder, arm, and wrist), lower limb injuries (knee and ankle), and waist injuries. An analysis by stroke type found that shoulder injuries occurred most often with freestyle, backstroke, and butterfly strokes, followed by rotator cuff injury, impingement syndrome, and SLAP (superior labral tear from anterior to posterior) lesions. Knee injuries were associated with the breaststroke, whereas spinal cord injuries occurred with the breaststroke and butterfly stroke. Finally, back injuries were associated with the butterfly stroke. During the freestyle stroke, the shoulder undergoes repetitive overhead movement; hence, shoulder and musculoskeletal pain are the most common and well-documented complaints of swimmers. For safety management, coaches and instructors must ensure that athletes do sufficient warm-up and cool-down exercises to avoid injuries. In case of an injury, they should be familiar with first aid measures so that secondary damage can be prevented with its quick application. In addition, coaches and instructors need to be trained in injury prevention and treatment so that they can provide appropriate rehabilitation treatment for athletes. Although swimming-related injuries cannot be completely eliminated, to reduce them to a minimum, leaders need the knowledge to apply scientific and systematic training principles and methods individualized for each athlete.

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF