• Title/Summary/Keyword: The Incidents of IT

Search Result 630, Processing Time 0.024 seconds

Study on Hazard of Toner Cartridge at Recycle Facilities

  • Koseki, Hiroshi;Iwata, Yusaku;Lim, Woo-Sub
    • International Journal of Safety
    • /
    • v.11 no.1
    • /
    • pp.15-18
    • /
    • 2012
  • Because of development of printing technology, toner cartridge particle becomes smaller and more dangerous. And sometimes we had incidents with dust explosion of toner cartridge particle at recycling facilities in Japan. Therefore we studied on hazard of toner particle relating with dust explosion. We found that toner particle is so dangerous compared with most organic solids, even though it does not belong to hazardous materials in the UN regulation and the Japanese Fire Service Law.

A Study on How to Deal with the Accident/Incident for High-Speed Train Crew (고속열차 승무원의 사고/장애 처리 방안에 관한 연구)

  • 전한준;홍선호;왕종배;임승수
    • Proceedings of the KSR Conference
    • /
    • 2002.10a
    • /
    • pp.367-375
    • /
    • 2002
  • In this paper the cases in developed countries on how to deal with the accident/incident for high-speed train crew, and their training and exercises for filed application will be reviewed, and the plan on how to deal with accidents/incidents for crew, which is helpful for preparing the high-speed railway operation in Korea and it's safety, will be presented.

  • PDF

Improvement of Information Security Management System Evaluation Model Considering the Characteristics of Small and Medium-Sized Enterprises (중소기업의 특성을 고려한 정보보호 관리체계 평가 모델 개선)

  • Kim, Yi Heon;Kim, Tae-Sung
    • Journal of Information Technology Services
    • /
    • v.21 no.1
    • /
    • pp.81-102
    • /
    • 2022
  • Although more than 99% of all Korean companies are small and medium-sized enterprises (SMEs), which accounts for a large part of the national economy, they are having difficulties in securing information protection capabilities due to problems such as budget and manpower. On the other hand, as 97% of cyber incidents are concentrated in SMEs, it is urgent to strengthen the information protection management and response capabilities of SMEs. Although the government is promoting company-wide information security consulting for SMEs, the need for supplementing it's procedures and consulting items is being raised. Based on the results of information security consulting supported by the government in 2020, this study attempted to derive improvement plans by interviewing SME workers, information security consultants, and system operators. Through the research results, it is expected to create a basis for SMEs to autonomously check the information security management system and contribute to the reference of related policies.

An Research Into The Reactive Safety Action Program for Promoting Aviation Safety Culture

  • Kim, Dae Ho
    • Journal of the Ergonomics Society of Korea
    • /
    • v.35 no.3
    • /
    • pp.165-173
    • /
    • 2016
  • Objective: The objective of this research is to inquire about safety information from the standpoint of its usefulness to suggest the significance of the Reactive Safety Action Program, which serves to promote aviation safety culture. Background: Safety information plays an important role in operating safety programs. Each organization learns lessons from safety information collected from aviation accidents and incidents. When an accident occurs, it is only through safety investigation and a close inquiry on the cause that we can come up with an appropriate countermeasure which would contribute to preventing the recurrence of the same or similar accident. However, the usefulness of safety information produced from unsatisfactory safety investigation is insufficient. Method: This research analyzed the characteristics of aviation accidents, the differences between safety investigations and legal accident investigations in systematic and operative perspectives, and safety culture as a measure to activate reporting systems (compulsory/voluntary). Results: This research defined the investigation scope and processes of safety investigations and legal accident investigations. It also suggested factors such as just culture based on trust, non-punitiveness, confidentiality, the participation of the entire staff through the use of inclusive reporting base, ensuring the independence of the operating organization as a way to promote safety through reporting systems. Conclusion: The organization's effort is the important aspect in obtaining exact and accurate safety information from accidents/incidents. The separate running of SIB (Safety Investigation Board) and AIB (Accident Investigation Board), the systematization of safety information reporting system, and prescribing (legislating) the composition of related organizations are some representative programs. Application: This research inquired experiences that contributed in promoting aviation safety culture in a reactive perspective, and will serve a role in spreading safety culture by enabling the use of application experiences of the aviation field in other domains.

Study on Factors Affecting Nurses' Experience of Non-Reporting Incidents (병원 간호사의 사건보고 불이행 경험여부에 영향을 미치는 요인)

  • Kim, Ki-Kyong;Song, Mal-Soon;Rhee, Kae-Sook;Hur, Hea-Kung
    • Journal of Korean Academy of Nursing Administration
    • /
    • v.12 no.3
    • /
    • pp.454-463
    • /
    • 2006
  • Purpose: This study was designed to identify the factors affecting the nurses' experience of non-reporting adverse incidents in hospital. Methods: This study is a cross-sectional, descriptive survey design and nonrandom, convenience sampling. Study subjects were 392 clinical nurses, who have agreed to be the subject of this research. The measuring instrument of attitudes toward incident reporting was developed by the authors. The questionnaire which consisted of 17 items about worry about appraisal, the belief in improvement, the intention of reporting, and knowledge was measured by 5-point Likert-type scale. The estimate of internal consistency was alpha =.84. Analysis of data was done with use of mean, t-test, ANOVA, logistic regression with SPSS program. Results: Clinical nurses had experience of reporting incident (51.3%), non-reporting incident (76.5%). Statistically, significant differences were found between experiences group and non experience group in intention on reporting, belief on improvement, and worry about appraisal. Logistic regression analysis showed that the significant predictors were caused by report no-fault cases, belief on improvement, worry about appraisal. Conclusion: The result also indicated that, to improve the incident reporting and risk management, it might be necessary to give a belief that it results on improvement and remove concern about punishment through construction of no-blame system.

  • PDF

Browser fuzzing and analysis using known vulnerability (소프트웨어 취약점의 종류와 탐색 방법)

  • Kim, Nam-gue;Kim, Hyun Ho;Lee, Hoon-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.753-756
    • /
    • 2015
  • Internet technology is universal, news from the Web browser, shopping, search, etc., various activities have been carried out. Its size becomes large, increasing the scale of information security incidents, as damage to this increases the safety for the use of the Internet is emphasized. IE browser is ASLR, such as Isolated Heap, but has been continually patch a number of vulnerabilities, such as various protection measures, this vulnerability, have come up constantly. And, therefore, in order to prevent security incidents, it is necessary to be removed to find before that is used to exploit this vulnerability. Therefore, in this paper, we introduce the purge is a technique that is used in the discovery of the vulnerability, we describe the automation technology related thereto. And utilizing the known vulnerabilities, and try to show any of the typical procedures for the analysis of the vulnerability.

  • PDF

A Case Study on World of Warcraft Storytelling's Positive Emotion-inducing Effects (World of Warcraft의 정서유발스토리텔링 사례연구)

  • Lee, Jae Hong
    • Journal of Korea Game Society
    • /
    • v.15 no.3
    • /
    • pp.97-106
    • /
    • 2015
  • Game is the latest type of Gesamtkunstwerk encompassing humanistic and engineering creativity. Nevertheless, Korea's game industry faces a crisis. The purpose of this study is to consider positive emotion-inducing effects as a way to deal with it. Among others, storytelling of , one of the most representative MMORPG games in the world, was selected for the study on various positive emotion-inducing effects. In the story of , the view of the world, characters and incidents are vital to the game and the study is focused on their emotion-inducing effects among the users based on actual examples. As a result, it was confirmed that the positive emotion-inducing storytelling would provide a possibility to reduce negative sentiment towards games, address crisis Korea's game industry faces, and interact with gamers in a positive direction.

International Cases and Their Implications on School Safety in Korea (학교안전의 국제적 프로그램 사례와 국내적 함의)

  • Kim, Eun-Joo
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.9
    • /
    • pp.261-271
    • /
    • 2021
  • Recent accidents in school environment involving violence, and bullying indicate that school safety is exposed to a serious threat to community well-being. Such incidents come as big problem because various policies and programs have widely long been implemented in order to protect the school environment. Thus, it is critical for the local community and goverment to develop measures for prevention. However, some of the incidents are misrepresented because school environment still remains as one of the safest settings. The current study discusses successful case studies of education, policies and projects regarding school violence and safety that are enforced in many other nations. One of the most practical and concrete means of pursuing an improved level of school safety is for the local community to be actively involved in the process. And one of the key factors for the success of international programs was that it was very much an integrative approach involving a joint effort with the local communities, accompanying a strong tie between the school and its surrounding context.

Intrusion Artifact Acquisition Method based on IoT Botnet Malware (IoT 봇넷 악성코드 기반 침해사고 흔적 수집 방법)

  • Lee, Hyung-Woo
    • Journal of Internet of Things and Convergence
    • /
    • v.7 no.3
    • /
    • pp.1-8
    • /
    • 2021
  • With the rapid increase in the use of IoT and mobile devices, cyber criminals targeting IoT devices are also on the rise. Among IoT devices, when using a wireless access point (AP), problems such as packets being exposed to the outside due to their own security vulnerabilities or easily infected with malicious codes such as bots, causing DDoS attack traffic, are being discovered. Therefore, in this study, in order to actively respond to cyber attacks targeting IoT devices that are rapidly increasing in recent years, we proposed a method to collect traces of intrusion incidents artifacts from IoT devices, and to improve the validity of intrusion analysis data. Specifically, we presented a method to acquire and analyze digital forensics artifacts in the compromised system after identifying the causes of vulnerabilities by reproducing the behavior of the sample IoT malware. Accordingly, it is expected that it will be possible to establish a system that can efficiently detect intrusion incidents on targeting large-scale IoT devices.

Building a Database of DQT Information to Identify a Source of the SmartPhone JPEG Image File (스마트폰 JPEG 파일의 출처 식별을 위한 DQT 정보 데이터베이스 구축)

  • Kim, MinSik;Jung, Doowon;Lee, Sang-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.359-367
    • /
    • 2016
  • As taking pictures by using smartphones has become more common in society, there are many incidents which are unexpected manipulation of images and leak of confidential information. Because of those incidents, demands that identify forgery/alteration of image file and proves of the original copy is constantly increasing. In general, smartphone saves image file as JPEG form and it has DQT which determines a compression rate of image in a header part of image. There is also DQT in Thumbnail image which inside of JPEG. In previous research, it identified a smartphone which take image by only using DQT, However, the research has low accuracy to identify the devices. There are two main purposes in this research. First, this research will analogize a smartphone and an application that takes a picture, edits and save an image file by testing not only about a DQT information but also a information of Thumbnail image. Second, the research will build a database of DQT and Thumbnail information in JPEG file to find more accurate image file's origin.