• Title/Summary/Keyword: protection risks

Search Result 291, Processing Time 0.021 seconds

Application of Formal Safety Assessment Methodology to Marine Structural Design (공식안전평가기법의 선박해양구조설계에의 적용)

  • Lee, Joo-Sung
    • Proceedings of the Korea Committee for Ocean Resources and Engineering Conference
    • /
    • 2001.05a
    • /
    • pp.133-138
    • /
    • 2001
  • Formal safety assessment (FSA) is defined as a structured and systematic methodology aimed at enhancing maritime safety including protection of life, health, and the marine environment and property, by using risk and cost/benefit assessment or, more specifically, it is a process of identifying hazard, evaluating risk and deciding on course of action to control those risks. Emphasis is placed on the structural aspect of the failure of cargo hold. This study is expected to illustrate how a new methodology, i.e. the Formal Safety Assessment, can be applied to specific ship safety problems.

  • PDF

Analysis of the Cell Balancing Effect on the ESS Fire by Simulating the Euljiro 3-ga Subway ESS (을지로 3가 지하철 ESS를 모의한 ESS 화재에서 Cell Balancing이 미치는 영향성 분석)

  • Yun, Sang-Sun;Kee, Seok-Cheol
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.25 no.3
    • /
    • pp.219-226
    • /
    • 2020
  • Given the change in the energy market, large energy storage systems (ESS) is rapidly entering the market. In this rapid spread, fire accidents are becoming an issue. This study attempts to approach the fire from the system point of view to analyze the problems caused by bonding from different perspectives. Moreover, to conduct this study, the fabrication of real objects is dangerous, which needs to be verified through simulation. In this study, we approach the cause of fire that occurs in large-capacity ESS from the system perspective. We focus on determining the effects of cell balancing performed on the BMS after charging. Thus, we analyze the cell balancing behavior and the linkage risks to the various stacks. The study also explores why no fire occurs during 70% operation.

Research Trends Analysis of Information Security using Text Mining (텍스트마이닝을 이용한 정보보호 연구동향 분석)

  • Kim, Taekyung;Kim, Changsik
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.2
    • /
    • pp.19-25
    • /
    • 2018
  • With the development of IT technology, various services such as artificial intelligence and autonomous vehicles are being introduced, and many changes are taking place in our lives. However, if secure security is not provided, it will cause many risks, so the information security becomes more important. In this paper, we analyzed the research trends of main themes of information security over time. In order to conduct the research, 'Information Security' was searched in the Web of Science database. Using the abstracts of theses published from 1991 to 2016, we derived main research topics through topic modeling and time series regression analysis. The topic modeling results showed that the research topics were Information technology, system access, attack, threat, risk management, network type, security management, security awareness, certification level, information protection organization, security policy, access control, personal information, security investment, computing environment, investment cost, system structure, authentication method, user behavior, encryption. The time series regression results indicated that all the topics were hot topics.

How should the regulatory defaults be set?

  • Jang, Seung-Cheol
    • Nuclear Engineering and Technology
    • /
    • v.50 no.7
    • /
    • pp.1099-1105
    • /
    • 2018
  • How to choose defaults in risk-informed regulations depends on the conservatism implicated in regulatory defaults. Without a universal agreement on the approaches dealing with the conservatism of defaults, however, the desirability of conservatism in regulatory risk analyses has long been controversial. The opponent views it as needlessly costly and irrational, and the proponent as a form of protection against possible omissions or underestimation of risks. Moreover, the inherent ambiguity of risk makes it difficult to set suitable defaults in terms of risk. This paper, the extension of the previous work [1], focuses on the effects of different levels of conservatism implicated in regulatory defaults on the estimates of risk. According to the postulated behaviors of regulated parties and the diversity of interests of regulators, in particular, various measures for evaluating the effect of conservatism in defaults are developed and their properties are explored. In addition, a simple decision model for setting regulatory defaults is formulated, based on the understanding of the effect of conservatism implicated in them. It can help decision makers evaluate the levels of safety likely to result from their regulatory policies.

A Study on the Risk Management Tools against Infectious Diseases in the Port-Utilizing Semi-Quantitative Bow-Tie Method

  • Lim, Kukhwan;Oh, Yong-Sik
    • Journal of Navigation and Port Research
    • /
    • v.46 no.2
    • /
    • pp.145-157
    • /
    • 2022
  • Due to the global epidemic of infectious diseases, it has become important for all industries to respond to the risk of infectious diseases. Ports in each country are also responding to the risk of infectious diseases, but the occurrence of infectious diseases in ports of various countries is causing a lot of damage to the logistics of ports. Korea is in the same situation, and cases of infectious diseases in ports are steadily being announced. Therefore, this paper conducted semi-quantitative Bow-Tie risk assessment by substituting measures to cope with infectious disease risks in Korean ports into actual cases of port infectious diseases in Korea, deriving improvements and suggesting directions. As a result, it was concluded that it was necessary to standardize some of the countermeasures against infectious diseases and develop more countermeasures.

Blockchain based Online Pharmacy with Customer Privacy Protection

  • Im, Cheon Woon;Kim, Dong Han;Jang, Jung Eun;Shin, Eun Jung;Lee, Hyun Chul;Kim, Tae Hyun;Kim, Seong Whan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.05a
    • /
    • pp.33-36
    • /
    • 2021
  • Corona 19 minimizes face-to-face contact, and online untact platforms are emerging in the medical sector. However, there are potential risks of medicine expiration, medicine misuse, and responsible materials management for secure delivery. In this paper, we investigate three key functional requirements for online pharmacy, and design the blockchain based online pharmacy to meet the requirements. To protect the patient's privacy and to ensure tamper-free traceability, we incorporate the multi-level access authentication scheme for each participant (governments, medical circles, and patients). We show that our system guarantees patient's privacy without further system modification.

A study on the proposed amendment bill of Bioethics and Safety Law (2010): focusing on the meaning of significant contents related to the clinical research ("생명윤리 및 안전에 관한 법률" 전부개정안의 내용과 의의: 임상연구와의 관계를 중심으로)

  • Kim, Eun-Ae
    • The Korean Society of Law and Medicine
    • /
    • v.12 no.1
    • /
    • pp.99-131
    • /
    • 2011
  • To strengthen the protection of human research subjects and human materials, the Korean Ministry of Health and welfare proposed the amendment bill of Bioethics and Safety Law(2010) to the Congress. It includes so many meaningful clauses. According to the bill, the scope that this act shall apply will be expended to the research involving human subjects and human materials. In the bill, there are the principles of this act; the protection of the life, health, and dignity of the human subjects, the obtaining of the adequate informed consent, the protection of the human subject's information confidentiality and the human subject's privacy, the assessment and minimizing of the risks involved and the guarantee of the safety for the human subjects, the preparation of the special protection program for the vulnerable human subjects, and so on. According to the bill, Institutional Bioethics Review Board(the same as Institutional Review Board) will be responsible for the auditing and monitoring on the research that was approved by IBRB, conducting the education program for the researchers, IBRB members and administrative staffs, preparing of the special protection program for the vulnerable human subjects, and forming the guidelines for the researchers as well as the review of the research protocols. And the State and local governments shall take necessary measures to support the expending of the social infrastructure. In addition to, IBRB will have to be assessed and to be gained the accreditation by the Korean Ministry of Health and welfare. So, if Bioethics and Safety Law is amended, it will contribute enormously to enhance the level of the human research subjects protection. Also, if this Law is amended, IBRB will play a major role for the conduct of the ethically, scientifically, and legally proper research. But now, as a matter of fact, the capability of IBRB members and IBRB office members is not enough to charge of this role because some people and some organizations does not know the importance of IBRB exactly. In spite of, IBRB shall be able to this role to protect the human subjects and to develop the level of the research On the international level. Therefore, the State, local governments and the Organization shall back up the administrative and financial terms of the IRB and IRB Office.

  • PDF

Composition and Policy Direction of Compensation Insurance Against Customer Information Infringements in Financial Transactions (금융거래 고객정보 침해사고 보상보험의 구성 및 정책방향)

  • Kim, Jong Hwan;Lim, Jong In
    • The Journal of Society for e-Business Studies
    • /
    • v.19 no.3
    • /
    • pp.1-21
    • /
    • 2014
  • Personal information is a requisite for financial transactions as well as a core asset of financial companies. However, as a side effect of the information society, personal information infringements have emerged as significant social risks, causing realized loss to individuals and companies. This study analyzes results of financial and emotional loss in terms of consumer loss and also presents usefulness of insurance in order to minimize such actual damages as a means of risk transfer. In addition, this study investigates components and premium calculation principles of compensation insurance against personal information invasion and finally presents policies to activate these insurance product. As a method of risk management, insurance not only is a useful tool to guarantee consumer protection and companies' financial soundness simultaneously but also provides a basis of quantitative measurement of IT risks.

A Measures to Converge Manage an Efficient Information Security Management System for Information Security Experts Manpower (정보보호 인력양성을 위한 효율적인 정보보호관리체계의 융합 관리 방안)

  • Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.5 no.4
    • /
    • pp.81-86
    • /
    • 2014
  • The development in IT technology has brought about various services that are on offer based on a new service model. But such new services have increased security risks. The government is operating a program to foster experts in information security to protect assets from the threat of such risks, too. Society's awareness on the importance of information security has also grown, leading to various courses to train such personnel, including membership clubs for the fostering of such specialists. This study seeks to suggest a method that efficiently manages the convergence of running a curriculum on ISMS(information security management systems) and a club that focuses on information protection. Such converged information security courses are expected to contribute to a safer IT-based society.

Improving International Access to the IARC Monographs Database with Linkage to other Sources of Information

  • Rice, Jerry M.;Waters, Michael D.;Wright, R.Glenn
    • Toxicological Research
    • /
    • v.17
    • /
    • pp.227-236
    • /
    • 2001
  • The IARC Monographs Programme on the Evaluation of Carcinogenic Risks to Humans has reviewed, summarized and evaluated 869 environmental agents and exposures as oj June 2000. This large collection includes all relevant published epidemiological data on cancer in exposed humans and results of bioassays for carcinogenicity in experimental animals. Since 1986. cancer data have been systematically supplemented by summaries of other toxicological data that are relevant to assessments of carcinogenic hazard. These include summaries qf genetic and related effects of chemicals. which have been prepared as Genetic Activity Profiles (GAP) by the U.S. EPA in collaboration with IARC. As the Mono-graphs have proved increasingly valuable and influential worldwide. they have evolved into an encyclopedia on environmental carcinogenic risks to humans. However. the Monographs have historically been prepared only as printed books with limited distribution. and the Monographs Programme has needed to adjust to expectations oj wider availability. Since 1998 the evaluations and summaries have been globally accessible by Internet from IARC (http://www.iarc.fr) and the GAP profiles by Internet from EPA (http://www.epa.gov/gapdb/). with the two web sites linked. Improved EPN/ARC GAP database and software. GAP2000. now link GAP profiles directly to the appropriate IARC web pages for summaries of evaluations of a given compound and its overall IARC classification. During the year 2000. by means of optical character recognition (OCR) technology the entire series of IARC Monographs is being converted to an electronic version. The first edition is now available commercially in CD-ROM format and will soon become available on-line at .

  • PDF