• Title/Summary/Keyword: minimizing risk

Search Result 201, Processing Time 0.025 seconds

Risk Analysis of Hearing Loss in the Air Base (군용 비행장에서 청력손실의 위험요소 분석)

  • Kim, Sun-Kyung;Lee, Seung-Hyun;Kim, Dong-Soo
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.15 no.2
    • /
    • pp.186-192
    • /
    • 2012
  • Noise is a major cause of hearing loss in the air base. There are lots of risk factors of hearing loss including noise, and hearing loss can be accelerated by combined effects of these risk factors. Here in, we reviewed risk factors of hearing loss, and analysed key risk factors inducing hearing loss in the air base. Risk factors exacerbating hearing loss with noise were mainly investigated in this research because noise could not be an avoidable risk factor in the air base. Analysed data will contribute to make green environment minimizing hearing loss of pilots and supporting personnels in the air base.

The Influence of Security and Risk Perception on the Reuse of Internet Banking (보안과 위험의 지각이 인터넷 뱅킹 재사용 의도에 미치는 영향)

  • Lee, Woong-Kyu
    • Asia pacific journal of information systems
    • /
    • v.17 no.1
    • /
    • pp.77-93
    • /
    • 2007
  • Risk has been considered as one of very important topics in traditional consumer behavior theoretically and practically since its tendency of minimizing errors rather than maximizing utilization in addition to its intuitive appealing with very high explaining power. In addition to a traditional view of risk, importance of risk in online transactions such as Internet banking is due to technical instability in security of the Internet as well as temporal and spatial separation of transaction partners. Therefore, risk in online transactions should be analyzed by a very comprehensive way since it is very inherent in the Internet. The objective of this study is to suggest a research model for explaining the use of online transactions in some risk related variables including risk results, security result, perceived security, and social influence and show its validity by applying it to Internet banking users. In result, hypotheses suggested by our research model are shown to be valid ones.

Mitigating Threats and Security Metrics in Cloud Computing

  • Kar, Jayaprakash;Mishra, Manoj Ranjan
    • Journal of Information Processing Systems
    • /
    • v.12 no.2
    • /
    • pp.226-233
    • /
    • 2016
  • Cloud computing is a distributed computing model that has lot of drawbacks and faces difficulties. Many new innovative and emerging techniques take advantage of its features. In this paper, we explore the security threats to and Risk Assessments for cloud computing, attack mitigation frameworks, and the risk-based dynamic access control for cloud computing. Common security threats to cloud computing have been explored and these threats are addressed through acceptable measures via governance and effective risk management using a tailored Security Risk Approach. Most existing Threat and Risk Assessment (TRA) schemes for cloud services use a converse thinking approach to develop theoretical solutions for minimizing the risk of security breaches at a minimal cost. In our study, we propose an improved Attack-Defense Tree mechanism designated as iADTree, for solving the TRA problem in cloud computing environments.

Establishing the Method of Risk Assessment Analysis for Prevention of Marine Accidents Based on Human Factors: Application to Safe Evacuation System

  • Fukuchi, Nobuyoshi;Shinoda, Takeshi
    • Journal of Ship and Ocean Technology
    • /
    • v.4 no.4
    • /
    • pp.19-33
    • /
    • 2000
  • For the prevention of marine accidents based on human factor, the risk assessment analysis procedure is proposed which consists of (1) the structural analysis of marine accident, (2) the estimation of incidence probability based on the Fault Tree analysis, (3) the prediction of ef-fectiveness to reduced the accident risk by suitable countermeasures in the specified functional system, and (4) the risk assessment by means of minimizing of the total cost expectation and the background risk. As a practical example, the risk assessment analysis for preventing is investigated using the proposed method.

  • PDF

Design and Implementation of a Rule-based Risk Classification Algorithm for Risk-based Inspection (RBI) of Imported Goods (수입 화물의 위험 기반 검사(RBI)를 위한 규칙 기반 위험 분류 알고리즘의 설계 및 구현)

  • Cha Jooho;Heo Hoon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.19 no.3
    • /
    • pp.129-136
    • /
    • 2023
  • In this paper, we describe a rule-based risk classification algorithm to perform Risk-based Inspection (RBI) on imported goods at customs. The RBI system is a method to automatically select which cargos have to be inspected and manage potential risks in boarder. In this study, we designed a rule-based risk classification algorithm for RBI solutions and implemented them using the Svelte web application framework. The risk classification algorithm proposed in this paper uses different indicative risk factors such as HS code, country of origin, importer's reliability, trade relationships, and logistics routes to classify cargos into Green, Yellow, and Red channels. To achieve this, we assigned risk categories to each risk factor and randomly generated risk scores within a specific range for each risk category. This system is expected to contribute to the increased efficiency of customs operations and protect public safety by minimizing the risk of imported hazardous materials.

Forest Fire Risk Zonation in Madi Khola Watershed, Nepal

  • Jeetendra Gautam
    • Journal of Forest and Environmental Science
    • /
    • v.40 no.1
    • /
    • pp.24-34
    • /
    • 2024
  • Fire, being primarily a natural phenomenon, is impossible to control, although it is feasible to map the forest fire risk zone, minimizing the frequency of fires. The spread of a fire starting in any stand in a forest can be predicted, given the burning conditions. The natural cover of the land and the safety of the population may be threatened by the spread of forest fires; thus, the prevention of fire damage requires early discovery. Satellite data and geographic information system (GIS) can be used effectively to combine different forest-fire-causing factors for mapping the forest fire risk zone. This study mainly focuses on mapping forest fire risk in the Madikhola watershed. The primary causes of forest fires appear to be human negligence, uncontrolled fire in nearby forests and agricultural regions, and fire for pastoral purposes which were used to evaluate and assign risk values to the mapping process. The majority of fires, according to MODIS events, occurred from December to April, with March recording the highest occurrences. The Risk Zonation Map, which was prepared using LULC, Forest Type, Slope, Aspect, Elevation, Road Proximity, and Proximity to Water Bodies, showed that a High Fire Risk Zone comprised 29% of the Total Watershed Area, followed by a Moderate Risk Zone, covering 37% of the total area. The derived map products are helpful to local forest managers to minimize fire risks within the forests and take proper responses when fires break out. This study further recommends including the fuel factor and other fire-contributing factors to derive a higher resolution of the fire risk map.

A Solution for Sourcing Decisions under Supply Capacity Risk (공급능력 리스크를 고려한 최적 구매계획 해법)

  • Jang, Won-Jun;Park, Yang-Byung
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.42 no.1
    • /
    • pp.38-49
    • /
    • 2016
  • This paper proposes a mathematical model-based solution for sourcing decisions with an objective of minimizing the manufacturer's total cost in the two-echelon supply chain with supply capacity risk. The risk impact is represented by uniform, beta, and triangular distributions. For the mathematical model, the probability vector of normal, risk, and recovery statuses are developed by using the status transition probability matrix and the equations for estimating the supply capacity under risk and recovery statuses are derived for each of the three probability distributions. Those formulas derived are validated using the sampling method. The results of the simulation study on the test problem show that the sourcing decisions using the proposed solution reduce the total cost by 1.6~3.7%, compared with the ones without a consideration of supply capacity risk. The total cost reduction increases approximately in a linear fashion as the probability of risk occurrence or reduction rate of supply capacity due to risk events is increased.

A Comparison Study: the Risk Factors in the Lifestyles of Colorectal Cancer Patients and Healthy Adults (대장암 환자와 건강인의 생활습관 비교)

  • Yoo, Yang Gyeong
    • Journal of Korean Public Health Nursing
    • /
    • v.28 no.3
    • /
    • pp.471-483
    • /
    • 2014
  • Purpose: This study explored possible risk factors influencing the development of colorectal cancer by comparing life habits of colorectal cancer patients and healthy adults. Methods: The study was designed as a retrospective comparison survey study of the colorectal cancer patient group and healthy adult group. 107 colorectal cancer patients in a university hospital and 124 healthy adults were recruited from October 2011 to August 2012. Data were analyzed using descriptive statistics, ${\chi}^2$-test/t-test and logistic regression with the SPSS program. Results: Consumption of instant food products, lower stress management, burned meats and unhealthy eating habits were shown to be risk factors in development of colorectal cancer. Conclusion: Based on the results of this study comparing colorectal cancer patients and healthy adults, minimizing consumption of instant food products, development of healthy eating habits of consuming more vegetables, cooking meat slightly, and effective management of stress levels are recommended.

Crowdsourced Risk Minimization for Inter-Application Access in Android

  • Lee, Youn Kyu;Kim, Tai Suk
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.5
    • /
    • pp.827-834
    • /
    • 2017
  • Android's inter-application access enriches its application ecosystem. However, it exposes security vulnerabilities where end-user data can be exploited by attackers. While existing techniques have focused on minimizing the risks of inter-application access, they either suffer from inaccurate risk detection or are primarily available to expert users. This paper introduces a novel technique that automatically analyzes potential risks between a set of applications, aids end-users to effectively assess the identified risks by crowdsourcing assessments, and generates an access control policy which prevents unsafe inter-application access at runtime. Our evaluation demonstrated that our technique identifies potential risks between real-world applications with perfect accuracy, supports a scalable analysis on a large number of applications, and successfully aids end-users' risk assessments.

Estimation of Effect Zone for the Establishment of Damage-Minimizing Plan of Chemical Plants (화학공장의 사고피해 최소화 대책수립을 위한 영향범위 평가)

  • Lee, Hern-Chang;Han, Seong-Hwan;Cho, Ji-Hoon;Shin, Dong-Il;Kim, Tae-Ok
    • Journal of the Korean Institute of Gas
    • /
    • v.15 no.2
    • /
    • pp.69-74
    • /
    • 2011
  • As a way to propose a method for the establishment of practical damage-minimizing plan for chemical plants, the release scenario was established by using API-581 BRD and the effect zone was estimated by the KS-RBI program supporting the quantitative cause analysis. And the risk assessment was performed. As a result, we found that to minimize the damage of a chemical plant, it is effective to use four release hole diameters (small, medium, large and rupture) and release time estimated according to the classes of detection and isolation systems. In addition, it can be safely said that through appling the damage areas considering weighted average by failure frequency and worst-case simultaneously, industrial sites can come up with the effective emergency response plan.