• Title/Summary/Keyword: protection management

Search Result 2,951, Processing Time 0.033 seconds

Development of Protection Coordination Algorithm for Smart Distribution Management System using Communication Method based on IEC61850 (IEC61850 기반의 통신방식을 이용한 스마트 배전운영시스템용 보호협조 알고리즘 개발)

  • Chu, Cheol-Min;Yun, Sang-Yun;Kwan, Seung-Chul;Chu, Kyung-Yong;Jin, Young-Kyu;Choi, Myeon-Song
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.61 no.10
    • /
    • pp.1412-1419
    • /
    • 2012
  • In this paper, we propose the protection coordination algorithm using communication methode based on IEC 61850. The communication protocol in power distribution management system has been issued by IEC standard, IEC61850 of them, which was made for substation automation system, has researched to apply into power distribution system, even though the standard is not a suitable for the system. In smart distribution management system' launched in 2009, the communication network based on the ethernet network for IEC 61850 has been designed to apply the self-healing concept, which is to perform the system protection through the communication between remote terminal units(RTU) according to the standard. However, it is first time to apply the scheme in the real. Thus, this paper proposed the protection algorithm and consideration for applying communication method and introduced the result of demonstration.

The Awareness and the Challenges about Protection and Access Control of Record (기록정보의 안전한 보호와 접근통제에 관한 인식과 과제)

  • Lim, Mi-Hyun;Yim, Jin-Hee
    • Journal of the Korean Society for information Management
    • /
    • v.38 no.1
    • /
    • pp.191-219
    • /
    • 2021
  • The development of IT technology that has come to symbolize the fourth industrial revolution, the introduction of online government, and the change in environment has caused radical changes in record management. Most public institutions under the government make use of information systems that are objects of information protection such as electronic document system, document management system, and Onnara system. Further, protection and access control of record information through physical environment and electronic system in a user-centered record management environment is an essential component. Hence, this study studies how professional records management professionals in public institutions recognize safe protection and access management of record information, deriving areas that require improvement and providing a discussion and suggestions to bring about such improvement. This study starts by examining laws and policies on information protection in Korea, analyzing items on access control to compare them with laws and policies, as well as the current situation on records management and derive implications. This study is meaningful in that it aims to substantialize records management by suggesting areas of improvement necessary for the protection and management of record information in public institutions and providing professionals with tangible authority and control.

Determinants and Complementarities of the Technological Innovation Protection Mechanisms of Korean Manufacturing Firms (한국 제조기업의 기술혁신보호방법 결정요인과 상호보완성)

  • Yu, Kyung-Jin;Hong, Soon-Ki
    • Korean Management Science Review
    • /
    • v.28 no.3
    • /
    • pp.31-45
    • /
    • 2011
  • This study aims to analyze determinants and complementarities of the technological innovation protection mechanisms of Korean manufacturing firms. The results of the inter-industry comparison show that there are differentiations of the determinants among industries. Independence between legal and strategic protection mechanisms is found in the high technology industry, whereas complementarities exist between them in the low technology industry. It implies that the firms should take into account their endogenous and exogenous factors to choose appropriate combinations of the mechanisms when they build up their innovation protection strategies. This study expects to contribute to establishing technological innovation protection strategies in manufacturing industry.

A Study on Chaining Threat Analysis of Cybersecurity against Reactor Protection Systems (원자로보호계통 사이버보안 연계 위협 분석 연구)

  • Jung, Sungmin;Kim, Taekyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.18 no.2
    • /
    • pp.39-48
    • /
    • 2022
  • The application of digital technology to instrumentation and control systems in nuclear power plants has overcome many shortcomings of analog technology, but the threat of cybersecurity has increased. Along with other systems, the reactor protection system also uses digital-based equipment, so responding to cybersecurity threats is essential. We generally determine cybersecurity threats according to the role and function of the system. However, since the instrumentation and control system has various systems linked to each other, it is essential to analyze cybersecurity threats together between the connected systems. In this paper, we analyze the cybersecurity threat of the reactor protection system with the associated facilities. To this end, we quantitatively identified the risk of the reactor protection system by considering safety functions, a communication type, the use of analog or digital-based equipment of the associated systems, and the software vulnerability of the configuration module of the reactor protection system.

Clinical Information Protection Behavior in a Medical Institution : Based on Health Psychology Theories (의료기관 종사자의 진료정보 보호행위분석: 건강심리이론관점을 중심으로)

  • Son, Mi-Jung;Yoon, Tai-Young;Lee, Sang-Chul
    • Journal of Korean Society for Quality Management
    • /
    • v.42 no.2
    • /
    • pp.153-163
    • /
    • 2014
  • Purpose: This research aims to find out clinical information protection behavior within a medical institution in mandatory circumstance based on health psychology theories Methods: This research has developed the survey based on the variables from ealth psychology theories; and conducted the survey during the whole month in April 2013. In the end, 256 samples have been used for this research's analysis. Results: First of all, Empirical results has proved that perceived benefits, self-efficacy, and cues to action have an positive influence on clinical information protection behavior. Perceived barriers has an negative influence. Finally, it has proven from the research that perceived severity and perceived susceptibility do not have an impact on clinical inf ormation protection behavior Conclusion: These findings provide an enriched understanding about medical institution workers information protection behavior on patient's clinical information.

Management Criteria of Underground Strage Tank for Prevention of Soil Contamination (토양오염방지를 위한 지하저장탱크의 관리 방안 연구)

  • Kim, Joon Hyun;Han, Young Han
    • Journal of Industrial Technology
    • /
    • v.18
    • /
    • pp.453-460
    • /
    • 1998
  • The purpose of this study was to analyze their status of underground storage tank(UST) facilities and level of soil contamination, and to establish its management criteria. DB program was developed to analyze the correlation between specific characteristic of UST and level of soil contamination. For a suitable management of UST, leakage monitoring and inspection method of UST was investigated. Inspection period was established based on the leakage rate. The most dominant factor for leakage seemed to be caused by the corrosion. Therefore, main factor, construction method and installation year of UST, and corrosion protection system were suggested for optimal protection of UST. Considering the present management status of UST in Korea, inspection and management criteria of UST should be accomplished in term of contamination protection of leakage, and flexible regulation act should be introduced for each specific site.

  • PDF

IMPLEMENTATION OF STRUCTURAL DIAGRAM FOR INTELLECTUAL PROPERTY MANAGEMENT AND PROTECTION(IPMP)

  • Park, Jung-Hee;Lee, Ki-Dong;Lee, Sang-Jae
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2004.11a
    • /
    • pp.435-448
    • /
    • 2004
  • While Internet promises ubiquitous access, it also creates a fundamental challenge to the traditional ownership toward digital assets traded in e-commerce market. Sharing digital information freely through shared networks leads to many untapped business opportunities, but uncontrolled digital asset transaction undermines many electronic business models. Thus, in this Internet age, proper protection and safe delivery of Intellectual Property (IP) and its representation as digital assets would be a crucial ingredient of building trust in upcoming e-business environment. In this paper, we give a general structural diagram of Intellectual Property Management and Protection (IPMP) and implement an IPMP prototype based on the RSA encryption algorithm and XrML (eXtensible rights Markup Language) WORK tags to show how proper protection and safe delivery of the intellectual property is achieved. This study concludes that IPMP mechanism may contribute significantly to the volume and quality of e-commerce market.

  • PDF

Improvement of fire protection equipment the opening of according to narrow the distance between buildings (건물 간 이격거리 협소에 따른 개구부 방화설비의 개선방안)

  • Oh, Taek-Hum;Park, Chan-Seok
    • Journal of the Korea Safety Management & Science
    • /
    • v.15 no.1
    • /
    • pp.61-68
    • /
    • 2013
  • In the case of the fire to the exterior of the building through openings, the openings of the adjacent building are exposed to the risk of combustion expanding and factors that affect the combustion in the radiant heat and direct flame. Recent five years, fire of the adjacent building indicated that incidence of the 5,134(2.27%) among total 225,934 cases occurred The damage scale of fire expanded was lower than in a single building but casualties(5.46%) and property(25.0%) damage were higher. Therefore, this study provides to analyze the operating status for fire protection equipment of fire-preventing area in the Seoul and to apply measures to improve fire protection equipment according to narrow the distance between the building openings studied.

A Study on Medical Information Privacy Protection Law and Regulation in the Information Age (정보화시대의 환자진료정보 보호에 관한 법.제도적 고찰)

  • Youn, Kyung-Il
    • Korea Journal of Hospital Management
    • /
    • v.8 no.2
    • /
    • pp.111-129
    • /
    • 2003
  • This study discusses the direction of legislation to strengthen the legal protection of medical records privacy in information age. The legislation trends on privacy protection of medical records in European Union and United States are analysed and the current law and regulation of Korea on medical records are compared. The issues discussed include the ownership of medical records, the patient's right of access to medical records, medical information publication for other than treatment or insurance processing use, confidentiality responsibility of provider organizations, medical information management in provider organizations, penalty for the unlawful use of patient information. This study concludes that the patients' right on medical record and provider organization's responsibility in processing patient information should be strengthened in order to protect patients' privacy and to conform to the international standard on medical record protection in the information age.

  • PDF

Status, Protection, and Management of Bird Community in Mt. Nam Area (남산 지역 조류 군집의 서식 현황과 보호 및 관리방안)

  • 이우신;조기현;임신재
    • The Korean Journal of Ecology
    • /
    • v.21 no.5_3
    • /
    • pp.665-673
    • /
    • 1998
  • This study was conducted to clarified the relationship between bird community and forest structure and present the counterplan for protection and management of bird community from February 1993 to July 1995 at deciduous and coniferous forest within Mt. Nam area, Seoul, Korea. DBH distribution has not significant differences in each study site. Deciduous forest had more foliage coverage in all layers than coniferous forest. Total 41 species of birds, which were 16 species of resident, 14 species of summer visitor, 4 species of winter visitor, and 7 species of passage migrant were recrded in two study sites. Leaf use rate of birds was increased the increase of coverage. The number of breeding species and pairs, breeding density, and diversity index were greater in deciduous forest than coniferous forest. The number of species and pairs on bush-nesting and foraging guild were greater than other guilds. And the nuber of species and pairs on hole nesting guild were the fewest in nesting guild. Use rate of artificial nests for improvement of habitat quality was greater in coniferous forest than deciduous forest. Maintenance of bush layer, increase of coverage and leaf layer diversity, supply of artificial nests, management of large trees, and control of natural enemy were necessary for protection and management of bird community in Mt. nam area.

  • PDF