• Title/Summary/Keyword: emerging risk

Search Result 331, Processing Time 0.028 seconds

Who is to Blame for Infection?: Emotional Discourse in Editorial Articles during the Emerging Infectious Diseases Epidemics in Korea (감염병과 감정: 신종감염병에 관한 대중매체의 메시지와 공포, 분노 감정)

  • Kim, Jongwoo;Kang, Jiwoong
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.12
    • /
    • pp.816-827
    • /
    • 2021
  • The purpose of this study is to understand the relationship between fear and anger emotions in the discourse produced by the media during the period of major emerging infectious diseases (SARS, Swine Flu, MERS, and COVID-19) that occurred since 2000 in Korea. The researcher collected editorial articles of the major daily newspaper after a significant epidemic of new infectious diseases and analyzed them using the Extended Parallel Processing Model (EPPM) and text mining techniques. In all epidemic times, fear appears stronger than anger, but the smaller the fear, the greater the risk control message is produced. In detail, fear emerges strongly in the discourse of the risk of infectious diseases or the economic crisis. Anger appears strong when the government's quarantine failures, groups where group infections occurred, and concealing information about infectious diseases. In this process, anger is strongly expressed against the factors that threaten the safety of society. Anger is also an emotion that can justify strong quarantine, but it can be the basis for discourse on minority hate. In this respect, anger is a two-sided emotion, so it must be handled carefully in the media.

A Study on Developing Framework for Measuring of Security Risk Appetite (보안 위험성향 측정을 위한 프레임워크 개발에 관한 연구)

  • Gim, Gisam;Park, Jinsang;Kim, Jungduk
    • Journal of Digital Convergence
    • /
    • v.17 no.1
    • /
    • pp.141-148
    • /
    • 2019
  • The advancement of digital technology accelerates intelligence, convergence, and demands better change beyond traditional methods in all aspects of business models and technologies, infrastructure, processes, and platforms. Risk management is becoming more important because of various security risks, depending on the changing business environment and aligned to business goals is emerging from the existing information asset based risk management. For business aligned risk management, it is essential to understand the risk appetite for achieving business goals, which provides a basis for decision-making in subsequent risk management processes. In this paper, we propose a framework for analyzing the risk management framework, pre - existing risk analysis, and protection motivation theory that influences decisions on security risk management. To examine the practical feasibility of the developed risk appetite framework, we reviewed the applicability and significance of the proposed risk appetite framework through an advisory committee composed of security risk management specialists.

Banding the World Together; The Global Growth of Control Banding and Qualitative Occupational Risk Management

  • Zalk, David M.;Heussen, Ga Henri
    • Safety and Health at Work
    • /
    • v.2 no.4
    • /
    • pp.375-379
    • /
    • 2011
  • Control Banding (CB) strategies to prevent work-related illness and injury for 2.5 billion workers without access to health and safety professionals has grown exponentially this last decade. CB originates from the pharmaceutical industry to control active pharmaceutical ingredients without a complete toxicological basis and therefore no occupational exposure limits. CB applications have broadened into chemicals in general - including new emerging risks like nanomaterials and recently into ergonomics and injury prevention. CB is an action-oriented qualitative risk assessment strategy offering solutions and control measures to users through "toolkits". Chemical CB toolkits are user-friendly approaches used to achieve workplace controls in the absence of firm toxicological and quantitative exposure information. The model (technical) validation of these toolkits is well described, however firm operational analyses (implementation aspects) are lacking. Consequentially, it is often not known if toolkit use leads to successful interventions at individual workplaces. This might lead to virtual safe workplaces without knowing if workers are truly protected. Upcoming international strategies from the World Health Organization Collaborating Centers request assistance in developing and evaluating action-oriented procedures for workplace risk assessment and control. It is expected that to fulfill this strategy's goals, CB approaches will continue its important growth in protecting workers.

Operational Risk Assessment for Airworthiness Certification of Military Unmanned Aircraft Systems using the SORA Method

  • Namgung, Pyeong;Eom, Jeongho;Kwon, Taehwa;Jeon, Seungmok
    • Journal of Aerospace System Engineering
    • /
    • v.15 no.4
    • /
    • pp.64-74
    • /
    • 2021
  • Unmanned Aircraft Systems (UAS) are rapidly emerging not only as a key military power, such as surveillance and reconnaissance for military purposes but also as a new air transportation means in the form of Urban Air Mobility (UAM). Currently, airworthiness certification is carried out focused on the verification of technical standards for flight safety suitability of aircraft design in accordance with the Military Aircraft Flight Safety Certification Act and does not employ the model for operational risk assessment for mission areas and airspace. In this study, in order to evaluate the risk of the mission area from the perspective of the UAS operator, a risk assessment simulation has been conducted by applying the Specific Operations Risk Assessment (SORA) model to the operating environment of the Korean military UAS. Also, the validity of the SORA model has been verified through the analysis of simulation results, and a new application plan for airworthiness certification of the military unmanned aerial system has been presented.

Assessment and Access Control for Ubiquitous Environments

  • Diep, Nguyen Ngoc;Lee, Sung-Young;Lee, Young-Koo;Lee, Hee-Jo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.1107-1109
    • /
    • 2007
  • Context-based access control is an emerging approach for modeling adaptive solution, making access control management more flexible and powerful. However, these strategies are inadequate for the increased flexibility and performance that ubiquitous computing environment requires because such systems can not utilize effectively all benefit from this environment. In this paper, we propose a solution based on risk to make use of many context parameters in order to provide good decisions for a safety environment. We design a new model for risk assessment in ubiquitous computing environment and use risk as a key component in decision-making process in our access control model.

  • PDF

Determinants for the Social Acceptance of New Emerging Science and Technology: The Case of Genetically Modified Foods

  • Kim, Seoyong
    • STI Policy Review
    • /
    • v.4 no.2
    • /
    • pp.136-158
    • /
    • 2013
  • This study identifies the structural determinants of the social acceptance of genetically modified (GM) foods across European countries. Toward this end, we suggest an integrated theoretical model to explain the social acceptance of GM foods by including both perception factors (perceived benefit, perceived risk, feelings, trust, and knowledge) and value factors (ethical concerns, science optimism, religiosity, and ideology). This model is then tested by analyzing survey data collected from 18,634 Europeans in 32 countries. The results indicate that first, not only perception factors but also value factors significantly contribute to explaining the acceptance of GM foods. Second, perceived benefits, perceived risk, feelings, and ethical concerns tend to be the four biggest determinants for acceptance. Third, this two-factor model could be generalized even with variation across countries. Finally, ethical concerns and scientific optimism play a moderating role between predictors and outcomes in the acceptance of GM foods.

Immunization schedule Recommended by Korean Pediatric Society, 2008 (2008년 대한소아과학회 예방접종 스케줄)

  • Lee, Hoan Jong
    • Pediatric Infection and Vaccine
    • /
    • v.15 no.1
    • /
    • pp.1-4
    • /
    • 2008
  • Immunizations are among the most cost-effective and widely used public health interventions. This is a report a revision of recommendation of immunization for children by Korean Pediatric Society. Immunization. Vaccines were divided into 4 groups. 1) Vaccines that are recommended to all infants and children (BCG, hepatitis B vaccine, DTaP, Td, Polio vaccine, Japanese encephalitis vaccine, MMR, varicella vaccine, influenza vaccine [6-23 months of age], H. influenzae type b vaccine), 2) those that can be administered to all infants and children, but decision of administration is made by parents (pneumococcal conjugate vaccine, hepatitis A vaccine, influenza vaccine [healthy children ${\geq}24$ months of age], rotavirus vaccine, human papilloma virus vaccine), 3) those that should be given to high risk group (pneumococcal polysaccharide vaccine [high risk patients ${\geq}24$ months of age], influenza vaccine [high risk patients ${\geq}24$ months of age], typhoid vaccine), and 4) those administered for control of outbreaks or prevention of emerging infectious diseases. Immunization schedule recommended by Korean Pediatric Society in 2008 is presented.

  • PDF

Government Necessity of Risk Rating Methodology for Nationwide Emerging IT Infrastructure (국가단위 신규 IT인프라의 위험수준 등급화모델에 대한 정책적 필요성)

  • Kim, Sang-Kyun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2010.07a
    • /
    • pp.285-287
    • /
    • 2010
  • 국가단위로 구축예정인 신규 IT인프라의 계획 및 설계 단계에서 신규 IT인프라에 잠재하는 위험도를 사전에 종합적으로 분석하기 위하여 현재까지는 위험분석 이론이 사용되고 있으나 여러 가지 적용상 한계점이 지적되고 있다. 본 연구는 이와 관련하여 신규 IT인프라의 위험도를 일정 단위의 등급으로 분류하여 정부기관, 서비스 제공자, 서비스 수요자가 정확하게 인지하고 대응할 수 있도록 하기 위하여 신규 IT인프라에 대한 위험수준 등급화 모델의 필요성을 제시하는 것이 목적이다.

  • PDF

The Research for Cyber Security Experts (소프트웨어 취약점의 보안성 강화를 위한 연구)

  • Kim, Seul-gi;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.347-350
    • /
    • 2016
  • Analysis of vulnerability of the software for risk. The weakness of the software material, the importance of strengthening security in accordance with financial damage occurred is emerging. There is a potential risk factor not only from the case, the manufacturing to use the software company that appropriate to use a software business and personal risk of loss to size.In this paper due to diagnose and vulnerabilities in software, diagnosis, the curriculum and to cultivate a diagnostic guide, and security vulnerabilities in software.Proposal system for increased.

  • PDF

Korea's countermeasures based on a Comparison of the policy of large-value funds payment system between Korea and the US (한·미 거액결제시스템 정책비교로 본 우리나라의 대응방안)

  • Jeong, Boon-Do;Hong, Mi-Seon
    • Korea Trade Review
    • /
    • v.44 no.3
    • /
    • pp.191-202
    • /
    • 2019
  • Despite innovative efforts to accommodate changes in the payment environment, the new types of settlement risks that are emerging require preemptive and proactive responses. Therefore, Korea should complement and develop large-value funds payment system operation and risk management policies by introducing international standards and linking with advanced financial institutions. This study examines the major issues such as the development process and characteristics of the large-value funds payment system of the two countries, the operation policy of the central bank, and the risk management policy by comparing the US Fedwire with the Korea Bok-Wire+. In addition, policy implications are suggested for efficient operation and development of Bok-Wire+.