• Title/Summary/Keyword: protection risks

Search Result 290, Processing Time 0.026 seconds

From Radon and Thoron Measurements, Inhalation Dose Assessment to National Regulation and Radon Action Plan in Cameroon

  • Saidou;Shinji Tokonami;Masahiro Hosoda;Augustin Simo;Joseph Victor Hell;Olga German;Esmel Gislere Oscar Meless
    • Journal of Radiation Protection and Research
    • /
    • v.47 no.4
    • /
    • pp.237-245
    • /
    • 2022
  • Background: The current study reports measurements of activity concentrations of radon (220Rn) and thoron (220Rn) in dwellings, followed by inhalation dose assessment of the public, and then by the development of regulation and the national radon action plan (NRAP) in Cameroon. Materials and Methods: Radon, thoron, and thoron progeny measurements were carried out from 2014 to 2017 using radon-thoron discriminative detectors (commercially RADUET) in 450 dwellings and thoron progeny monitors in 350 dwellings. From 2019 to 2020, radon track detectors (commercially RADTRAK) were deployed in 1,400 dwellings. It was found that activity concentrations of radon range in 1,850 houses from 10 to 2,620 Bq/㎥ with a geometric mean of 76 Bq/㎥. Results and Discussion: Activity concentrations of thoron range from 20 to 700 Bq/㎥ with a geometric mean of 107 Bq/㎥. Thoron equilibrium factor ranges from 0.01 to 0.6, with an arithmetic mean of 0.09 that is higher than the default value of 0.02 given by UNSCEAR. On average, 49%, 9%, and 2% of all surveyed houses have radon concentrations above 100, 200, and 300 Bq/㎥, respectively. The average contribution of thoron to the inhalation dose due to radon and thoron exposure is about 40%. Thus, thoron cannot be neglected in dose assessment to avoid biased results in radio-epidemiological studies. Only radon was considered in the drafted regulation and in the NRAP adopted in October 2020. Reference levels of 300 Bq/㎥ and 1,000 Bq/㎥ were recommended for dwellings and workplaces. Conclusion: Priority actions for the coming years include the following: radon risk mapping, promotion of a protection policy against radon in buildings, integration of the radon prevention and mitigation into the training of construction specialists, mitigation of dwellings and workplaces with high radon levels, increased public awareness of the health risks associated with radon, and development of programs on the scientific and technical aspects.

Governance Strategies for Trade in Financial Services in Korea (금융서비스의 무역거버넌스 전략)

  • Park, Moon-Suh
    • International Commerce and Information Review
    • /
    • v.11 no.4
    • /
    • pp.229-259
    • /
    • 2009
  • Financial service in economy is same with neural net or vein net of human body. Moreover, every economic entity which has experienced global financial crisis in 2008 is realizing more importance and power of financial service, and is recognizing financial service as a part of new engine of growth for economic development. As global linkages relating financial service in the industry are deepened, we can expect that the economic interests between countries are more conflicted. Because financial service is regarded as critical factors in order to ensure future competitive advantage, more active change of financial service paradigm in Korea is required. The purpose of this paper is to analyze the paradigm of financial service in global business aspect, to prepare the global governance strategies about financial service, and to bring up some ideas for Korea's economic development after global financial crisis by intensifying the competitiveness of financial services. It is suggested that Korea should prepare the "Master Law for Financial Service" (provisional name) in advance as governance strategy for financial service. And not only establishing the financial risks prevention system and consumer's protection agency, but financial competitiveness strengthening actions will have to be included in governance strategy of financial service in Korea.

  • PDF

A Study on Radiation Risk Recognition Aided System Visualizing Risk Information by CG

  • Katagiri, M.;Tuzuki, Y.;Sawamura, S.;Aoki, Y.
    • Proceedings of the IEEK Conference
    • /
    • 2002.07a
    • /
    • pp.425-428
    • /
    • 2002
  • The technology of Computer Graphics (CG) has been in great progress for almost 20 years and has proven to be a valuable tool for a broad variety of fields, including nuclear engineering. To work in any hazardous environment for example radiation field is particularly challenging because the danger is not always visually apparent. In this study as the application of CG to nuclear engineering field, we proposed to develop a radiation risk recognition aided system in which various radiation information; radiation risks, radiation distribution, hazard information and so on, were visualized by CG. The system used the server and client system. In the server there were two parts; one (main-server) was the database part having various data and the other (sub-server) was the visualization part visualizing the human phantom by POV-Ray. In the client there was the input and output part. The outputs from the system were various radiation information represented by coloring, circle graph and line graph intuitionally. The system is useful for a broad range of activities including radiation protection, radiation management, dose minimization, and demonstration to the public.

  • PDF

A Study for Applicating and Introducing the Right to be Forgotten (잊혀질 권리의 도입과 적용에 관한 연구)

  • Seo, Yunhee;Chang, Younghyun
    • The Journal of the Convergence on Culture Technology
    • /
    • v.2 no.3
    • /
    • pp.23-28
    • /
    • 2016
  • As a large portal sites are beginning to replace the function of the mass media, new risks began to raise. It remained without being deleted that data written to the internet was a serious privacy problem occurs. The sensitive information was inferred based on the personal data recorded in the past and also another personal information leakage itself. Witch-hunt through the personally identifiable rob has emerged as a serious social problem and damage to the parties not be able to live a normal life. In this paper, we propose the study on the need for a 'right to be forgotten' to delete the personal information relating to on-line through international case studies and activation measures. At the same time, we proposed improvement measures, such as encryption management, ownership inheritance, and blind treatment.

Human Health Risk Assessment Strategy to Evaluate Non-carcinogenic Adverse Health Effect from Total Petroleum Hydrocarbon at POL-Contaminated Sites in Korea (국내 유류오염지역에서의 석유계총탄화수소에 의한 비발암 인체위해성평가 전략)

  • Park, In-Sun;Park, Jae-Woo
    • Journal of Soil and Groundwater Environment
    • /
    • v.16 no.4
    • /
    • pp.10-22
    • /
    • 2011
  • Human health risk assessment for petroleum, oil and lubricant (POL) contaminated sites is challenging as total petroleum hydrocarbon (TPH) is not a single compound but rather a mixture of numerous substances. To address this concern, several TPH fractionation approaches have been proposed and used as an effective management tool for the POL-contaminated sites in many countries. In Korea, there are also recognized needs to establish a reliable and cost-effective human health risk assessment strategy based on the TPH fractionation method. In order to satisfy the social and institutional demand, this study suggested that the comprehensive risk assessment strategy based on a newly modified TPH fractionation method with 10 fractions, the Korean Standard Test Method (KSTM)-based analytical protocol and a stepwise risk assessment framework should be introduced into the domestic contaminated land management system. Under the proposed strategy, POL-contaminated sites can be effectively managed in terms of human health protection, and remedial cost and time can be determined reasonably. In addition, more researches required to increase our understanding of environmental risks and improve the domestic management system were proposed.

A Critical Review of Current Crisis Simulation Methodology

  • Kim, Hak-Kyong;Lee, Ju-Lak
    • International Journal of Contents
    • /
    • v.7 no.1
    • /
    • pp.58-64
    • /
    • 2011
  • This paper is concerned with simulation exercises used to train key response agencies for crisis situations. While 'multi-agency' simulations are increasingly acknowledged as a necessary and significant training tool for emergency response organisations, many current crisis simulations are still focused on the revision of existing response plans only. However, a crisis requires a rapid reaction, yet in contrast to an 'emergency', the risks for critical decision makers in crisis situations are difficult to measure, owing to their ill-structure. In other words, a crisis situation is likely to create great uncertainty, unfamiliarity and complexity, and consequently should be managed by adaptive or second order expertise and techniques, rather than routine or structured responses. In this context, the paper attempts to prove that the current practices of simulation exercises might not be good enough for uncertain, unfamiliar, and complex 'crisis' situations, in particular, by conducting case studies of two different underground fire crises in Korea (Daegu Subway Fire 2003) and the UK (King's Cross Fire 1987). Finally, it is suggested that the three abilities: 'flexibility', 'improvisation' and 'creativity' are critical in responding to a crisis situation.

Simulation-Based Operational Risk Assessment (시뮬레이션 기법을 이용한 운영리스크 평가)

  • Hwang, Myung-Soo;Lee, Young-Jai
    • Journal of Information Technology Services
    • /
    • v.4 no.1
    • /
    • pp.129-139
    • /
    • 2005
  • This paper proposes a framework of Operational Risk-based Business Continuity System(ORBCS), and develops protection system for operational risk through operational risk assessment and loss distribution approach based on risk management guideline announced in the basel II. In order to find out financial operational risk, business processes of domestic bank are assorted by seven event factors and eight business activities so that we can construct the system. After we find out KRI(Key Risk Indicator) index, tasks and risks, we calculated risk possibility and expected cost by analyzing quantitative data, questionnaire and qualitative approach for AHP model from the past events. Furthermore, we can assume unexpected cost loss by using loss distribution approach presented in the basel II. Each bank can also assume expected loss distributions of operational risk by seven event factors and eight business activities. In this research, we choose loss distribution approach so that we can calculate operational risk. In order to explain number of case happened, we choose poisson distribution, log-normal distribution for loss cost, and estimate model for Monte-Carlo simulation. Through this process which is measured by operational risk. of ABC bank, we find out that loss distribution approach explains closer unexpected cost directly compared than internal measurement approach, and makes less unexpected cost loss.

Solutions for Adjusting SELinux To Android-Powered Devices (안드로이드 응용 단말기를 위한 SELinux 환경설정 방법)

  • Vu, Anh-Duy;Han, Jea-Il;Kim, Young-Man
    • Proceedings of the KAIS Fall Conference
    • /
    • 2011.12b
    • /
    • pp.565-568
    • /
    • 2011
  • Google Android framework consists of an operating system and software platform for mobile devices. Using a general-purpose Linux operating system in mobile device has some advantages but also security risks. Security-Enhanced Linux (SELinux) is a kernel-based protection approach which can help to reduce potential damage from successful attacks. However, there are some challenges to integrate SELinux in Android. In this research, we do a study on how to do the integration and find out four challenges. The first one is that the Android file system (yaff2) does not support security namespace for extended attribute (xattr) which is required by SELinux. The second one is that it's difficult to apply SELinux policy to Dalvik process on which an Android application runs on. The third one is that Android lacks methods, tools and libraries to interact with SELinux. The last one is how to update the SELinux policy automatically when installing or removing an application. In this paper, we propose solutions for the above limitations that make the SELinux more adaptive and suitable for Android framework.

  • PDF

A Delegation Model based on Agent in Distributed Systems

  • Kim, Kyu-Il;Lee, Joo-Chang;Choi, Won-Gil;Lee, Eun-Ju;Kim, Ung-Mo
    • Journal of Information Processing Systems
    • /
    • v.3 no.2
    • /
    • pp.82-88
    • /
    • 2007
  • Web services are the new building block of today's Internet, and provides interoperability among heterogeneous distributed systems. Recently in web services environment, security has become one of the most critical issues. The hackers attack one of fragile point and can misuse legitimate user privilege because all of the connected devices provide services for the user control and monitoring in real time. Also, the users of web services must temporarily delegate some or all of their rights to agents in order to perform actions on their behalf. This fact risks the exposure of user privacy information. In this paper, we propose secure delegation model based on SAML that provides confidentiality and integrity about the user information in distributed systems. In order to support privacy protection, service confidentiality, and assertion integrity, encryption and a digital signature mechanism is deployed. We build web service management server based on XACML, in order to manage services and policies of web service providers.

A Study on the Design of Humane Animal Care System and Java Implementation

  • Gong, Hui-Su;Weon, Sunghyun;Huh, Jun-Ho
    • Journal of Information Processing Systems
    • /
    • v.14 no.5
    • /
    • pp.1225-1236
    • /
    • 2018
  • Nowadays, the number of pets in the Republic of Korea (ROK) is continuously growing, and people's perception of animals is changing. Accordingly, new systems and services for them are emerging. Despite such changes, there are still many serious problems such as animal cruelty, abandonment, and factory-type breeding places. In this study, we have conducted a research on the design of a humane animal care system and its implementation with Java. The methodology involved in the design will enable managing animals' safety and health by systematically categorizing and studying each health-related issue for protection. Moreover, with this methodology, animals can avert risks through periodic examinations, and the analyzed data will be useful in managing animals efficiently. Thus, this paper proposes a system that monitors whether the owners actually carry out such obligation. Authors expect this convenient, easily accessible system to lead to a more humane approach to the animals they own. The authors plan to establish an animal care network together with local animal associations for the active promotion of the system implemented in this study, in the hope that the network will be extended nationwide.