• Title/Summary/Keyword: protection risks

Search Result 290, Processing Time 0.027 seconds

Experimental Study on the Explosion and Fire Risks of Mobile Phone Batteries (휴대폰 배터리의 폭발 및 화재 위험성에 관한 실험적 연구)

  • Lee, Ho-Sung;Kim, Si-Kuk
    • Fire Science and Engineering
    • /
    • v.30 no.4
    • /
    • pp.111-120
    • /
    • 2016
  • This is an experimental study to analyze the explosion and fire hazards of mobile phone batteries. Using the lithium-ion batteries currently used on smart phone as the experiment samples, the experiments were conducted by overcharging, internal and external short circuit, and thermal shock with the potential of explosion and fire caused by careless use or abnormal conditions. The experiment results showed that, in the case of overcharging and external short circuit, there was no explosion and fire hazard in the normal operation of the protection circuit module (PCM), but there were big risks when the PCM faulted conditions were assumed. In the case of the experiments by internal short circuit and thermal shock, such risks varied depending on a battery charge state. In other words, it could be verified that there were low risks of explosion and fire in a full discharge state, but there were high risks in a full charge state. These experiment results suggest that to minimize the explosion and fire hazards of mobile phone batteries, an alarm device is necessary when the PCM fault occurs. In addition, a solid battery case should be made and safety equipment, such as a cooling device to avoid high temperature, is needed.

A Study on the Causal Relationship of Perceived Risks, Service Quality and Customer Satisfaction in Ubiquitous Environment by Using Spatial Information (유비쿼터스 환경에서 공간정보 활용에 따른 고객의 지각된 위험, 서비스 품질과 고객만족의 구조적 관계 연구)

  • Kim, Yong-Beom;Chung, Nam-Ho
    • Journal of the Korea Safety Management & Science
    • /
    • v.10 no.3
    • /
    • pp.145-154
    • /
    • 2008
  • The Location Based Services (LBS) comprise spatial information and mobile technology allow users to receive various services based on Global Positioning Systems (GPS). Although, spatial information based services are very useful, it has lots of possibility to damage privacy protection. But the contents of the legislation by government have problems conflicted between protection of a person's location information and invigoration LBS. Therefore, in this study suggest a causal model to deal with user satisfaction and factors affecting spatial information based services to customer perspective. The proposed research model is tested empirically with one hundred and forty one usable questionnaires and partial least square (PLS) method. Experimental results showed that the usefulness, playfulness, and service quality play a prominent role in influencing the spatial information services satisfaction compared to other factors. But, easy of use and perceived risk are not significant.

A Study on the Enhancement of the Quality of Pusan Port Traffic Management Service (부산항 해상교통관제 서비스의 품질개선에 관한 연구)

  • 이은방;윤정수
    • Proceedings of KOSOMES biannual meeting
    • /
    • 2001.05a
    • /
    • pp.105-133
    • /
    • 2001
  • World trade has been increasing continuously in total volume, on the other hand, environmental protection on sea and conservation of fishery resources has been rising up the major issue. All of the world are pushing their efforts two major purposes to the full, one is taking competitive place in marine transportation throughout the world and another Is environment protection. Pusan Port as world leading Port put its all effort in bring more ocean going vessels and securing their traffic route by providing them more information related marine traffics through PTMS in port. During two years of operation, statistics of marine traffic accidents showed that many dynamic casualties such as collisions, groundings, and rammings has been decreased. However, due to increasing cargo volume, limited water area and unpredictable weather condition, potential risks still exist high. In this paper, in order to maximize the efficiency of PTMS and reduce various risks in the future, we examine risk factors over operational results and experience, and propose reasonable operational methods of PTMS.

  • PDF

A Study on the Causal Relationship of Perceived Risks, Service Quality and Customer Satisfaction in Ubiquitous Environment by Using Spatial Information (유비쿼터스 환경에서 공간정보 활용에 따른 고객의 지각된 위험, 서비스 품질과 고객만족의 구조적 관계 연구)

  • Chung, Nam-Ho;Kim, Yong-Bum
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2007.04a
    • /
    • pp.373-385
    • /
    • 2007
  • The Location Based Services (LBS) comprise spatial information and mobile technology allow users to receive various services based on Global Positioning Systems (GPS). Although, spatial information based services are very useful, it has lots of possibility to damage privacy protection. But the contents of the legislation by government have problems conflicted between protection of a person's location information and invigoration LBS. Therefore, in this study suggest a causal model to deal with user satisfaction and factors affecting spatial information based services to customer perspective. The proposed research model is tested empirically with one hundred and forty one usable questionnaires and partial least square (PLS) method. Experimental results showed that the usefulness, playfulness, and service quality play a prominent role in influencing the spatial information services satisfaction compared to other factors. But, easy of use and perceived risk are not significant.

  • PDF

The Mitigation Model Development for Minimizing IT Operational Risks (IT운영리스크 최소화를 위한 피해저감모델 구현에 관한 연구)

  • Lee, Young-Jai;Hwang, Myung-Soo
    • Journal of Information Technology Applications and Management
    • /
    • v.14 no.3
    • /
    • pp.95-113
    • /
    • 2007
  • To minimize IT operational risks and the opportunity cost for lost business hours. it is necessary to have preparedness in advance and mitigation activities for minimization of a loss due to the business discontinuity. There are few cases that banks have a policy on systematic management, system recovery and protection activities against system failure. and most developers and system administrators response based on their experience and the instinct. This article focuses on the mitigation model development for minimizing the incidents of disk unit in IT operational risks. The model will be represented by a network model which is composed of the three items as following: (1) the risk factors(causes, attributes and indicators) of IT operational risk. (2) a periodic time interval through an analysis of historical data. (3) an index or an operational regulations related to the examination of causes of an operational risk. This article will be helpful when enterprise needs to hierarchically analyze risk factors from various fields of IT(information security, information telecommunication, web application servers and so on) and develop a mitigation model. and it will also contribute to the reduction of operational risks on information systems.

  • PDF

Ecological Risk Assessment of Chemicals Migrated from a Recycled Plastic Product

  • Roh, Ji-Yeon;Kim, Min-Hyuck;Kim, Woo Il;Kang, Young-Yeul;Shin, Sun Kyoung;Kim, Jong-Guk;Kwon, Jung-Hwan
    • Environmental Analysis Health and Toxicology
    • /
    • v.28
    • /
    • pp.13.1-13.5
    • /
    • 2013
  • Objectives: Potential environmental risks caused by chemicals that could be released from a recycled plastic product were assessed using a screening risk assessment procedure for chemicals in recycled products. Methods: Plastic slope protection blocks manufactured from recycled plastics were chosen as model recycled products. Ecological risks caused by four model chemicals - di-(2-ethylhexyl) phthalate (DEHP), diisononyl phthalate (DINP), cadmium (Cd), and lead (Pb)-were assessed. Two exposure models were built for soil below the block and a hypothetic stream receiving runoff water. Based on the predicted no-effect concentrations for the selected chemicals and exposure scenarios, the allowable leaching rates from and the allowable contents in the recycled plastic blocks were also derived. Results: Environmental risks posed by slope protection blocks were much higher in the soil compartment than in the hypothetic stream. The allowable concentrations in leachate were $1.0{\times}10^{-4}$, $1.2{\times}10^{-5}$, $9.5{\times}10^{-3}$, and $5.3{\times}10^{-3}mg/L$ for DEHP, DINP, Cd, and Pb, respectively. The allowable contents in the recycled products were $5.2{\times}10^{-3}$, $6.0{\times}10^{-4}$, $5.0{\times}10^{-1}$, and $2.7{\times}10^{-1}mg/kg$ for DEHP, DINP, Cd, and Pb, respectively. Conclusions: A systematic ecological risk assessment approach for slope protection blocks would be useful for regulatory decisions for setting the allowable emission rates of chemical contaminants, although the method needs refinement.

Virtual Network Embedding through Security Risk Awareness and Optimization

  • Gong, Shuiqing;Chen, Jing;Huang, Conghui;Zhu, Qingchao;Zhao, Siyi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.7
    • /
    • pp.2892-2913
    • /
    • 2016
  • Network virtualization promises to play a dominant role in shaping the future Internet by overcoming the Internet ossification problem. However, due to the injecting of additional virtualization layers into the network architecture, several new security risks are introduced by the network virtualization. Although traditional protection mechanisms can help in virtualized environment, they are not guaranteed to be successful and may incur high security overheads. By performing the virtual network (VN) embedding in a security-aware way, the risks exposed to both the virtual and substrate networks can be minimized, and the additional techniques adopted to enhance the security of the networks can be reduced. Unfortunately, existing embedding algorithms largely ignore the widespread security risks, making their applicability in a realistic environment rather doubtful. In this paper, we attempt to address the security risks by integrating the security factors into the VN embedding. We first abstract the security requirements and the protection mechanisms as numerical concept of security demands and security levels, and the corresponding security constraints are introduced into the VN embedding. Based on the abstraction, we develop three security-risky modes to model various levels of risky conditions in the virtualized environment, aiming at enabling a more flexible VN embedding. Then, we present a mixed integer linear programming formulation for the VN embedding problem in different security-risky modes. Moreover, we design three heuristic embedding algorithms to solve this problem, which are all based on the same proposed node-ranking approach to quantify the embedding potential of each substrate node and adopt the k-shortest path algorithm to map virtual links. Simulation results demonstrate the effectiveness and efficiency of our algorithms.

Can Basic Income be an Alternative to Social Security? (기본소득은 미래 사회보장의 대안인가?)

  • Yang, Jae-jin
    • 한국사회정책
    • /
    • v.25 no.1
    • /
    • pp.45-70
    • /
    • 2018
  • After critically assessing the effectiveness of basic income as an alternative to the existing social security system, this article argues that basic income is fundamentally incapable of providing an adequate protection for those in social risks or welfare needs. The proponents of basic income often claims that technological innovations will lead to the end of work and thus that basic income will be required for all citizens in the future. Moreover, they emphasize that labor market flexibility is making a large segment of work forces unstable working poor, what is often called the precariat who are not effectively protected by the existing social insurance programs. For them, basic income is the best source of social protection for the precariat of today and the citizens in the future, freeing them from the necessity of having a paid work. This article, however, points out the ineffectiveness of basic income as social protection due to its unustainably high cost that comes from unconditional benefit provisions regardless of levels of income, social risks, and welfare needs. Also it challenges the simplified 'Luddites' image of workless society in the future, arguning that techological unemployment can be overcome by new job creation as seen in Silicon Valley and job sharing following working time reduction. It maintains that it is more cost-effective and reliable to strengthen the welfare state based on the principle of reciprocity that aims at 'universal sufficient protection for those in social risks and welfare needs.'

CLARIFYING THE PARADIGM ON RADIATION EFFECTS & SAFETY MANAGEMENT: UNSCEAR REPORT ON ATTRIBUTION OF EFFECTS AND INFERENCE OF RISKS

  • Gonzalez, Abel J.
    • Nuclear Engineering and Technology
    • /
    • v.46 no.4
    • /
    • pp.467-474
    • /
    • 2014
  • The aim of this paper is to describe a relatively recent international agreement on the widely debated concepts of: (i) attributing effects to low dose radiation exposure situations that have occurred in the past and, (ii) inferring radiation risk to situations that are planned to occur in the future. An important global consensus has been recently achieved on these fundamental issues at the level of the highest international intergovernmental body: the General Assembly of the United Nations. The General Assembly has welcomed with appreciation a scientific report on attributing health effects to radiation exposure and inferring risks that had been prepared the United Nations Scientific Committee on the Effects of Atomic Radiation (UNSCEAR) following a formal request by the General Assembly.

The Risk Management of Information System Using CRAMM - Case of a Korean Credit Card Company - (CRAMM을 이용한 정보시스템 위험관리 - 신용카드회사 사례연구 -)

  • Kim, Bob-Jin;Han, In-Goo;Lee, Sang-Jae
    • Asia pacific journal of information systems
    • /
    • v.10 no.2
    • /
    • pp.149-176
    • /
    • 2000
  • As companies become more dependent upon information systems(IS), the potential losses of IS resources become critical. IS management must assume the increasing responsibility for protection of IS resources as the IS and business environments become more vulnerable to various threats. The major issues facing management, when attempting to manage risks, include the assessment of the impact of risks on business objectives and the design of security safeguards to reduce the unacceptable risks to an acceptable level. This paper provides a case study of the risk management for IS. A Korean credit card company which has the high sensitivity for customers security was selected as a case. The risk management procedure using a powerful tool, CRAMM(the Central Computer and Telecommunications Agencys Risk Analysis and Management Method) was applied for this company.

  • PDF