• Title/Summary/Keyword: The Incidents of IT

Search Result 630, Processing Time 0.029 seconds

A Methodology for Analyzing Human Error in Railway Operations (철도 인적오류 분석방법론 개발)

  • Kim, Dong-San;Baek, Dong-Hyun;You, Seoung-Ryul;Yoon, Wan-Chul
    • Proceedings of the KSR Conference
    • /
    • 2009.05a
    • /
    • pp.1817-1827
    • /
    • 2009
  • Although human error is recognized as the primary cause of railway accidents and incidents, there have been limitations in finding the root causes of errors and developing effective corrective actions in the Korean railway industry, due to the absence of a systematic method and lack of professional knowledge and skills of investigators. Therefore, there has been a strong need for a systematic methodology for human error analysis. This paper introduces a methodology for analyzing human error m railway operations, called HEAR (Human Error Analysis and Reduction). HEAR is intended to help analysts identify the sequences and various levels of causes of operators' erroneous actions in railway accidents or incidents and make recommendations to eliminate or reduce the future possibility of similar errors and accidents. It was developed based on a thorough investigation of various techniques for human errors analysis and feedback from field investigators.

  • PDF

Risk of Attack through an Open Wireless Network of IoT Devices (IoT 장치의 개방형 무선 네트워크를 통한 공격 위험)

  • Lee, Geonwoo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.10-14
    • /
    • 2019
  • The number of security incidents is increasing as the Internet of Things(IoT) is distributed widely. The security incidents of IoT can cause financial damages. Moreover, It can become direct threats to humans. In order to prevent these problems, the security installation for IoT devices is important. This paper describes the definition of IoT devices, security incident case, architecture, and the security threats that can occur when a device is connected to network without security installation.

  • PDF

Sink holes material damage and mental harm analysis and risk assessment studies -Focusing on the incidents surrounding the construction site- (씽크홀의 물적손상과 정신적 피해분석 및 위험성 평가연구 -건설현장 주변의 사고사례를 중심으로-)

  • Lim, Jin Sang;Kang, Kyung-Sik
    • Journal of the Korea Safety Management & Science
    • /
    • v.17 no.4
    • /
    • pp.153-160
    • /
    • 2015
  • Recent News patrons of incidents can be called sinkhole that occurred one after another (Sink Hole). Due to this anytime, anywhere I do not know how the land is turned off worry and anxiety is the reason why you can never be dismissed as exaggerated. As we have seen today through the video, the vehicle was traveling on a road or pedestrian who was walking down the street they look out of the basement of a sudden they still come to mind vividly. Here, examples and corresponding measures to prevent the sinkhole off the ground, including the causes and impact on society because of this that occurred, and policy measures and abroad are evaluated with respect to what it is.

The Development of Third-Party Damage Monitoring System for Natural Gas Pipeline Using Sound Propagation Model (음향 전파 모델을 이용한 천연가스 배관용 타공사 모니터링 시스템의 개발)

  • Shin, Seung-Mok;Suh, Jin-Ho;Yu, Hui Ryong;Kim, Sang-Bong
    • Proceedings of the KSME Conference
    • /
    • 2003.04a
    • /
    • pp.905-910
    • /
    • 2003
  • In this paper, we develop real-time monitoring system to detect third-party damage on natural gas pipeline by using sound propagation model. Since many third-party incidents cause damage that does not lead to immediate rupture but can grow with time, the developed real-time monitoring system can execute a significant role in reducing many third-party damage incidents. The developed system is composed of three steps as follows: i) DSP based system, ii) wireless communication system, iii) the calculation and monitoring software to detect the position of third-party damage using the propagation speed of acoustic wave. Furthermore, the developed system was set at practical offshore pipeline between two islands in Korea and it has been operating in real time.

  • PDF

A Fundamental Research to Safety at Tower Crane Major Work (타워크레인 주요 작업의 안전성에 관한 기초 연구)

  • Lee, Sung-Ho;Joo, Jin-Kyu;Lee, Goon-Jae;Kim, Sun-Kuk
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2011.11a
    • /
    • pp.151-152
    • /
    • 2011
  • As recent construction projects aim to build higher and bigger buildings, lifting operation is getting increasingly important in construction sites. Accordingly, as tower cranes get higher and higher, disasters involving tower cranes are also on the rise. According to occupational incident statistics of the Korea Occupational Health & Safety Agency (KOHSA), most of such incidents occur in installation, dismantling and climbing phases of tower crane. Therefore, it is essential to develop preventative measures to secure safety of tower crane operations, with critical focus on installation, dismantling and climbing of tower crane. Hence, this research attempts to measure criticality of key risk factors in installation, dismantling and climbing phases of tower crane on construction site and propose necessary safety measures. As a result, conclusions herein will contribute to minimize disasters and incidents involving tower cranes in high-rise building construction sites.

  • PDF

Workplace Violence Experiences among Care Helpers (요양보호사의 직장폭력 경험실태)

  • Seo, Eun Ju;Kim, Souk Young
    • Korean Journal of Adult Nursing
    • /
    • v.24 no.6
    • /
    • pp.607-614
    • /
    • 2012
  • Purpose: This is a descriptive research that reports incidents of workplace violence among care helpers. Methods: The subjects were 181 care helpers from elderly care facilities and domiciliary elderly welfare centers in Daejeon. Data were collected through self-administered questionnaires from July to November 2011. Subjects were asked to report incidents of violence within the previous six months. Data analysis included one-way ANOVA, and logistic regression analysis. Results: Forty-seven percent of care helpers reported verbal violence, 16% reported being physically threatened, more than 21 % reported sustaining a physical injury with 2% reporting severe physical injuries. Further, 18.8% of the care givers reported being sexually harassed by client. There were differences in reported workplace violence based on service types, service hours and whether there were policies about workplace violence. Conclusion: To prevent workplace violence for carehelpers, it is necessary to make a policy for preventing violence and develop a violence prevention program to meet service characteristics of facility-based and domiciliary care helpers.

Narrative Analysis on Survivor's Experience of Daegu Subway Fire Disaster - The Hypothetical Suggestions for Disaster Nursing Practice - (재난 생존자 경험의 내러티브 분석 -재난 간호를 위한 제언-)

  • Choi Namhee
    • Journal of Korean Academy of Nursing
    • /
    • v.35 no.2
    • /
    • pp.407-418
    • /
    • 2005
  • Some fifty survivors participated in the narrative therapy sessions from March 2003 to December 2004, and thirty cases were analyzed using the transcripts. Each participant's surviving story was summarized, and then interpreted and reinterpreted by the survivors themselves in collaboration with the researcher. The two main principles in narrative analysis were hermeneutical distanciation and hermeneutical circulation. Result and Conclusion: First, nursing involvement should play active roles from the early stages of disaster incidents. Specifically, emergency nursing and flexible coping plans are to be available according to the specific properties of each case. Secondly, it is necessary to try to understand the extreme emotional experiences of disaster survival. The horror and pain people feel at an incident cannot simply be generalized, and it requires that each case be approached individually to help stop social alienation. Thirdly, more constant and long-term studies are required to set up nursing strategies for disaster survivors. Forming a trusting relationship with survivors is basic, and formally registering as participants is necessary for continuous interventions. Fourthly, we should deeply appreciate the danger and complexity of modern society and understand the complex nature of disaster. Fifthly, interdisciplinary activities and studies are necessary in combination with various other fields to establish a framework of total nursing care for disaster incidents. Lastly, it is urgently necessary to educate families and friends of the survivors and the society as a whole about life after a disaster.

원자력발전소의 교대근무체계하에서 발생한 인적오류 시간 분포

  • 박근옥;이정운
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1996.04a
    • /
    • pp.266-269
    • /
    • 1996
  • This paper describes the rotating shift system managed in Korean nuclear power plants and the retrospective analysis procedure of incidents induced by erroneous actions of plant personnel. It also describes the analysis results which include time distribution of erroneous actions occurred under the rotating shift system.

  • PDF

Browser fuzzing and analysis using known vulnerability (파이썬 모듈과 정규표현식을 활용한 웹 취약점 탐색 자동화 봇)

  • Kim, Nam-gue;Kim, Ki Hwan;Lee, Hoon-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.749-751
    • /
    • 2016
  • Internet technology is universal, news from the Web browser, shopping, search, etc., various activities have been carried out. Its size becomes large, increasing the scale of information security incidents, as damage to this increases the safety for the use of the Internet is emphasized. IE browser is ASLR, such as Isolated Heap, but has been continually patch a number of vulnerabilities, such as various protection measures, this vulnerability, have come up constantly. And, therefore, in order to prevent security incidents, it is necessary to be removed to find before that is used to exploit this vulnerability. Therefore, in this paper, we introduce the purge is a technique that is used in the discovery of the vulnerability, we describe the automation technology related thereto. And utilizing the known vulnerabilities, and try to show any of the typical procedures for the analysis of the vulnerability.

  • PDF

Health and Safety Performance of UK Universities and How to Improve It

  • Olga Kuzmina;Douglas Searle
    • Safety and Health at Work
    • /
    • v.15 no.2
    • /
    • pp.139-146
    • /
    • 2024
  • Background: This research suggested a method for evaluating health and safety performance as a combination of reactive and active monitoring. Methods: A number of Freedom of Information requests (FoI) were sent to the Health and safety Executive (HSE) and 100 UK universities. Data on the number of reportable incidents, diseases and dangerous occurrences were compiled for UK universities and combined with the Impact Ranking for good health and well-being. A semi-structured survey was used to identify best H&S practices. Subsequently, the effect of workers' involvement in H&S management on RIDDOR and near-miss reports, was investigated using statistical analysis. Results: A ranking of UK universities that perform highly in Health and Safety (H&S) was assembled and selected universities were contacted to identify best practices. Best practices were divided into three categories: team management, roles and responsibilities, and H&S performance monitoring. One of the findings demonstrated a reverse dependence between provision of a refresher training in risk assessments and a number of reported RIDDOR incidents. Conclusion: Health and Safety professionals in the universities may find it useful to reflect on these findings and the identified best practices in order to improve the H&S performance in their own organisations.