• Title/Summary/Keyword: cyber risk management

Search Result 113, Processing Time 0.029 seconds

A Study on the Role of Social Support for Low-Income Households of Youths or Adults with Disabilities that Devoid of Cultural Capital (문화자본 결핍 저소득 장애청소년과 장애가정청소년을 위한 두드림 프로그램의 효과성에 관한 연구)

  • Ohem, Mi-Sun;Kwak, Jee-Young
    • 재활복지
    • /
    • v.20 no.4
    • /
    • pp.55-78
    • /
    • 2016
  • This society faces problems from unequal access to quality education which eventually lead to unequal distribution on wealth. Specifically, those youths with disabilities have a higher risk of living in poverty and becoming marginalized. First established in 2009, the Dodream program has addressed the issue of poverty fixation by establishing long-term supports for households of youths or adults with disabilities through case management. This study analyzes the effectiveness of Dodream program for youths with or youths whose parents are with disabilities on low-income households. The results of the study indicate that the Dodream program leads to improvements in self-concepts and career consciousness among youth. The program was particularly effective in improving the career preparedness of those who were involved. By establishing connections and collaborating with regional case management base institutions and cooperation centers, the program secured various social support resources. Finally the study presents plans on vitalizing the youth support by thoroughly investigating the cases of each study and establishing the program as long-term Human Capital Investment Model.

Summative Usability Assessment of Software for Ventilator Central Monitoring System (인공호흡기 중앙감시시스템 소프트웨어의 사용적합성 총괄평가)

  • Ji-Yong Chung;You Rim Kim;Wonseuk Jang
    • Journal of Biomedical Engineering Research
    • /
    • v.44 no.6
    • /
    • pp.363-376
    • /
    • 2023
  • According to the COVID-19, development of various medical software based on IoT(Internet of Things) was accelerated. Especially, interest in a central software system that can remotely monitor and control ventilators is increasing to solve problems related to the continuous increase in severe COVID-19 patients. Since medical device software is closely related to human life, this study aims to develop central monitoring system that can remotely monitor and control multiple ventilators in compliance with medical device software development standards and to verify performance of system. In addition, to ensure the safety and reliability of this central monitoring system, this study also specifies risk management requirements that can identify hazardous situations and evaluate potential hazards and confirms the implementation of cybersecurity to protect against potential cyber threats, which can have serious consequences for patient safety. As a result, we obtained medical device software manufacturing certificates from MFDS(Ministry of Food and Drug Safety) through technical documents about performance verification, risk management and cybersecurity application.The purpose of this study is to conduct a usability assessment to ensure that ergonomic design has been applied so that the ventilator central monitoring system can improve user satisfaction, efficiency, and safety. The rapid spread of COVID-19, which began in 2019, caused significant damage global medical system. In this situation, the need for a system to monitor multiple patients with ventilators was highlighted as a solution for various problems. Since medical device software is closely related to human life, ensuring their safety and satisfaction is important before their actual deployment in the field. In this study, a total of 21 participants consisting of respiratory staffs conducted usability test according to the use scenarios in the simulated use environment. Nine use scenarios were conducted to derive an average task success rate and opinions on user interface were collected through five-point Likert scale satisfaction evaluation and questionnaire. Participants conducted a total of nine use scenario tasks with an average success rate of 93% and five-point Likert scale satisfaction survey showed a high satisfaction result of 4.7 points on average. Users evaluated that the device would be useful for effectively managing multiple patients with ventilators. However, improvements are required for interfaces associated with task that do not exceed the threshold for task success rate. In addition, even medical devices with sufficient safety and efficiency cannot guarantee absolute safety, so it is suggested to continuously evaluate user feedback even after introducing them to the actual site.

Revitalization Strategy of Information Security Industry Using Cognitive Map Analysis (인지지도분석을 통한 정보보호 산업 활성화전략)

  • Lee, Jung Mann;Cho, Ilgu;Rim, Myung Hwan
    • Journal of Information Technology Applications and Management
    • /
    • v.23 no.2
    • /
    • pp.177-194
    • /
    • 2016
  • This study analyzed President Park's speeches and the government's industry policy in the field of information security using cognitive map. The relationship analysis between policy tool variables and policy goal variables was employed to derive revitalization strategy of information security. This paper found that entrepreneurship revitalization has very strong causality with expansion of domestic market and global market. But, on the other hand, HR development has very weak causality with job creation and future growth driver because the labor market in the information security industry is poor and its transfer rate to other industry is very high. This study showed that this cognitive map could be characterized by a scarcity of feedback loops and a strong emphasis on the positive loops in the structure of virtuous circle. In this paper, we also constructed a comprehensive cognitive map on the policy vision of information security, showing that there are a risk of cyber threat, an opportunity of new fusion security market, information security reinforcing circle, global economic circle, and domestic market circle.

The evolution of the Human Systems and Simulation Laboratory in nuclear power research

  • Anna Hall;Jeffrey C. Joe;Tina M. Miyake;Ronald L. Boring
    • Nuclear Engineering and Technology
    • /
    • v.55 no.3
    • /
    • pp.801-813
    • /
    • 2023
  • The events at Three Mile Island in the United States brought about fundamental changes in the ways that simulation would be used in nuclear operations. The need for research simulators was identified to scientifically study human-centered risk and make recommendations for process control system designs. This paper documents the human factors research conducted at the Human Systems and Simulation Laboratory (HSSL) since its inception in 2010 at Idaho National Laboratory. The facility's primary purposes are to provide support to utilities for system upgrades and to validate modernized control room concepts. In the last decade, however, as nuclear industry needs have evolved, so too have the purposes of the HSSL. Thus, beyond control room modernization, human factors researchers have evaluated the security of nuclear infrastructure from cyber adversaries and evaluated human-in-the-loop simulations for joint operations with an integrated hydrogen generation plant. Lastly, our review presents research using human reliability analysis techniques with data collected from HSSL-based studies and concludes with potential future directions for the HSSL, including severe accident management and advanced control room technologies.

New Environmental Impact Assessment Technology (신환경영향평가기술(新環境影響評價技術)의 개발방향(開發方向))

  • Han, Sang-Wook;Lee, Jong-Ho;Nam, Young-Sook
    • Journal of Environmental Impact Assessment
    • /
    • v.9 no.4
    • /
    • pp.277-290
    • /
    • 2000
  • The purpose of this study is to identify the problems of environmental impact assessment(EIA) and to suggest new EIA technology. The problems of EIA in Korea can be summarized as follows. First, the EIA does not reflect the impact of policy, plan and program on environment. Second, the project EIA does not consider the cumulative impacts such as additive impacts, synergistic impacts, threshold/saturation impacts, induced and indirect impacts, time-crowded impacts, and space-crowded impacts. Third, the EIA techniques in Korea are not standardized. Finally, the present EIA suggests only alternatives to reduce adverse impacts. To solve above-mentioned problems, the development of new EIA technology is essential. First, the new EIA technology should be developed toward pollution prevention technology and comprehensive and integrated environmental management technology. Second, new fields of EIA for pollution prevention contain strategic environmental assessment, cumulative impacts assessment, socio-economic impact assessment, cyber EIA and EIA technology necessary after the reunification of Korean Peninsula. Third, EIA technology for integrated environmental management contains the development of integated environment assessment system and the development of packaged EIA technology. The EIA technology for integrated environmental assessment system contains (1) development of integrated impact assessment technology combining air/water quality model, GIS and remote sensing, (2) integrated impact assessment of EIA, traffic impact assessment, population impact assessment and disaster impact assessment. (3) development of integrated technology combining risk assessment and EIA (4) development of integrated technology of life cycle assessment and EIA, (5) development of integrated technology of spatial planning and EIA, (6) EIA technology for biodiversity towards sustainable development, (7) mathematical model and GIS based location decision techniques, and (8) environmental monitoring and audit. Furthermore, there are some fields which need packaged EIA technology. In case of dam development, urban or industrial complex development, tourist development, landfill or combustion facilities construction, electric power plant development, development of port, road/rail/air port, is necessary the standardized and packaged EIA technology which considers the common characteristics of the same kind of development project.

  • PDF

Device Identification System for Corporate Internal Network Visibility in IoT Era (IoT 시대 기업 내부 네트워크의 가시성 확보를 위한 단말 식별 시스템 설계)

  • Lee, Dae-Hyo;Kim, Yong-Kwon;Lee, Dong-Bum;Kim, Hyeob
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.51-59
    • /
    • 2019
  • In this paper, we propose a device identification system for network visibility that can maintain the secure internal network environment in the IoT era. Recently, the area of enterprise network is getting huge and more complicated. Not only desktops and smartphones but also business pads, barcode scanners, APs, Video Surveillance, digital doors, security devices, and lots of Internet of Things (IoT) devices are rapidly pouring into the business network, and there are highly risk of security threats. Therefore, in this paper, we propose the device identification system that includes the process and module-specific functions to identify the exploding device in the IoT era. The proposed system provides in-depth visibility of the devices and their own vulnerabilities to the IT manager in company. These information help to mitigate the risk of the potential cyber security threats in the internal network and offer the unified security management against the business risks.

Reducing the Falling Accident due to the Removal of Safety Fence from Gondola (곤돌라 안전난간 제거 등으로 인한 추락재해 감소방안)

  • Byun, Hyung Shik;Rhim, Jong kuk;Yang, Won Beak
    • Journal of the Korea Safety Management & Science
    • /
    • v.21 no.2
    • /
    • pp.9-14
    • /
    • 2019
  • Gondola is widely used as a construction facility to perform external finishing work without using scaffolding at a construction site. However, since 2000, there have been 17 deaths from now so these risks associated with work can not be ignored. Therefore, it is expected that it will contribute greatly to prevent related disasters if introducing necessary measures to prevent repeated related disasters and installing additional safety devices. In order to eliminate the risk factor according to the operation of the gondola, it is necessary for the operator to use it to use it while the examination of each product is completed, and to use the over load Dangerous arbitrary measures such as arbitrary operation of the prevention device, removal of the safety fence for convenience of work, installation of the wire rope installed in the air, falling out of the wire rope and falling to the ground Do not perform such sealing measures so that any operation of the overload prevention device can not be done so as not to take such arbitrary measures, or wire the power supply wire to the safety fence so as not to delete the safety fence. Then, when the safety fence is removed, so that it does not become a gondola operation, or when replacing the wire rope in the air, to prevent the wire rope from coming off, Additional measures such as installing falling down prevention device may be necessary.

A Study on Novel Steganography Communication Technique based on Thumbnail Images in SNS Messenger Environment (SNS 메신저 환경에서의 썸네일 이미지 기반의 새로운 스테가노그래피 통신 기법 연구)

  • Yuk, Simun;Cho, Youngho
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.151-162
    • /
    • 2021
  • Steganography is an advanced technique that hides secret messages by transforming them into subtle noise and spreading them within multimedia files such as images, video and audio. This technology has been exploited in a variety of espionage and cyber attacks. SNS messenger is an attractive SNS Service platform for sending and receiving multimedia files, which is the main medium of steganography. In this study, we proposed two noble steganography communication techniques that guarantee the complete reception rate through the use of thumbnail images in the SNS messenger environment. In addition, the feasibility was verified through implementation and testing of the proposed techniques in a real environment using KakaoTalk, a representative SNS messenger in south korea. By proposing new steganography methods in this study, we re-evaluate the risk of the steganography methods and promoted follow-up studies on the corresponding defense techniques.

Evaluation of Vasodilative Effects on 10 Traditional Herbal Formulas for Treatment of Hypertension (고혈압 치료를 위한 상용하는 한약 처방 10종의 혈관이완 평가)

  • Bumjung Kim
    • The Korea Journal of Herbology
    • /
    • v.39 no.3
    • /
    • pp.69-76
    • /
    • 2024
  • Objectives : Hypertension (high blood pressure), one of the world's major chronic diseases, has a high mortality rate due to its high prevalence and complications, but its control rate is low. The proper management and control through appropriate exercise, diet management, and optimal drug choice can reduce the risk of death from hypertension. Although various antihypertensive drugs are used to treat hypertension, they also have numerous adverse effects. Alongside increased interest in the use of Traditional Herbal Formulas (THF) for hypertension treatment, the purpose of this study was to examine the vasodilative effects of 10 THF in the rat thoracic artery pre-contracted by potassiumchloride (KCl). Methods : THF were extracted with distilled water for 2 hours. The rat thoracic artery was suspended and contracted by KCl in the organ bath which contained 10 ml Krebs Henseleit (KH) buffer. THF extracts were added in a dose-dependent increase (10-1,000 ㎍/mL) to examine vasodilative effects. The vasodilative effects produced by THF were expressed as the percentage in response to KCl-induced contraction. Results : Among the 10 THF, Banhasasim-tang, Buhnsimgieum, Sagunja-tang, and Samul-tang showed vasodilative effects. And, Sipjeondaebo-tang, Ssanghwa-tang, Ojeok-san, Onkyung-tang, Yongdamsagan-tang, and Hyangsayukgunja-tang showed no significant vasodilative effects. Also, in co-administration with amlodipine, Banhasasim-tang showed higher vasodilative effects than amlodipine alone, and Buhnsimgieum showed greater vasodilative effects at low concentrations, but inhibited amlodipine's vasodilative effects at high concentrations. Conclusion : As a result of these studies, they will be expected to provide useful data to establish guidelines of combined administration of THF and western antihypertensive drugs for the treatment of hypertension.

Study on the Evaluation of Radiant Heat Effects of Oil Storage Tank Fires Due to Environmental Conditions (환경조건에 따른 유류저장탱크 화재의 복사열 영향 평가 연구)

  • Lee, Jeomdong;Ryu, Juyeol;Park, Seowon;Yoon, Myong-O;Lee, Changwoo
    • Fire Science and Engineering
    • /
    • v.34 no.1
    • /
    • pp.72-78
    • /
    • 2020
  • In this paper, the risk of damages to humans and properties due to fire explosions in gasoline storage tanks is identified, and the effects of radiant heat on adjacent tanks are evaluated to present the necessary area to secure safety. A simulation was conducted to evaluate the effect of radiant heat (Maximum emission) on adjacent tanks in an oil storage tank fire due to environmental conditions (Wind speed and temperature) in the Northern Gyeonggi Province. The result indicated that the radiant heat released in the fire of an oil storage tank was increased by approximately 1.9 times by the maximum wind speed and the difference occurred in the range of 700~800 kW by the maximum temperature. If a storage tank fire occurs, securing approximately 34.4 m of holding area is necessary. In the future, evaluating the radiant heat emitted by the fire of gasoline storage tanks will be required by applying various environmental conditions, and through this, research on specific and quantitative holding area is required.