• 제목/요약/키워드: protection risks

검색결과 290건 처리시간 0.027초

을지로 3가 지하철 ESS를 모의한 ESS 화재에서 Cell Balancing이 미치는 영향성 분석 (Analysis of the Cell Balancing Effect on the ESS Fire by Simulating the Euljiro 3-ga Subway ESS)

  • 윤상선;기석철
    • 전력전자학회논문지
    • /
    • 제25권3호
    • /
    • pp.219-226
    • /
    • 2020
  • Given the change in the energy market, large energy storage systems (ESS) is rapidly entering the market. In this rapid spread, fire accidents are becoming an issue. This study attempts to approach the fire from the system point of view to analyze the problems caused by bonding from different perspectives. Moreover, to conduct this study, the fabrication of real objects is dangerous, which needs to be verified through simulation. In this study, we approach the cause of fire that occurs in large-capacity ESS from the system perspective. We focus on determining the effects of cell balancing performed on the BMS after charging. Thus, we analyze the cell balancing behavior and the linkage risks to the various stacks. The study also explores why no fire occurs during 70% operation.

텍스트마이닝을 이용한 정보보호 연구동향 분석 (Research Trends Analysis of Information Security using Text Mining)

  • 김태경;김창식
    • 디지털산업정보학회논문지
    • /
    • 제14권2호
    • /
    • pp.19-25
    • /
    • 2018
  • With the development of IT technology, various services such as artificial intelligence and autonomous vehicles are being introduced, and many changes are taking place in our lives. However, if secure security is not provided, it will cause many risks, so the information security becomes more important. In this paper, we analyzed the research trends of main themes of information security over time. In order to conduct the research, 'Information Security' was searched in the Web of Science database. Using the abstracts of theses published from 1991 to 2016, we derived main research topics through topic modeling and time series regression analysis. The topic modeling results showed that the research topics were Information technology, system access, attack, threat, risk management, network type, security management, security awareness, certification level, information protection organization, security policy, access control, personal information, security investment, computing environment, investment cost, system structure, authentication method, user behavior, encryption. The time series regression results indicated that all the topics were hot topics.

How should the regulatory defaults be set?

  • Jang, Seung-Cheol
    • Nuclear Engineering and Technology
    • /
    • 제50권7호
    • /
    • pp.1099-1105
    • /
    • 2018
  • How to choose defaults in risk-informed regulations depends on the conservatism implicated in regulatory defaults. Without a universal agreement on the approaches dealing with the conservatism of defaults, however, the desirability of conservatism in regulatory risk analyses has long been controversial. The opponent views it as needlessly costly and irrational, and the proponent as a form of protection against possible omissions or underestimation of risks. Moreover, the inherent ambiguity of risk makes it difficult to set suitable defaults in terms of risk. This paper, the extension of the previous work [1], focuses on the effects of different levels of conservatism implicated in regulatory defaults on the estimates of risk. According to the postulated behaviors of regulated parties and the diversity of interests of regulators, in particular, various measures for evaluating the effect of conservatism in defaults are developed and their properties are explored. In addition, a simple decision model for setting regulatory defaults is formulated, based on the understanding of the effect of conservatism implicated in them. It can help decision makers evaluate the levels of safety likely to result from their regulatory policies.

A Study on the Risk Management Tools against Infectious Diseases in the Port-Utilizing Semi-Quantitative Bow-Tie Method

  • Lim, Kukhwan;Oh, Yong-Sik
    • 한국항해항만학회지
    • /
    • 제46권2호
    • /
    • pp.145-157
    • /
    • 2022
  • Due to the global epidemic of infectious diseases, it has become important for all industries to respond to the risk of infectious diseases. Ports in each country are also responding to the risk of infectious diseases, but the occurrence of infectious diseases in ports of various countries is causing a lot of damage to the logistics of ports. Korea is in the same situation, and cases of infectious diseases in ports are steadily being announced. Therefore, this paper conducted semi-quantitative Bow-Tie risk assessment by substituting measures to cope with infectious disease risks in Korean ports into actual cases of port infectious diseases in Korea, deriving improvements and suggesting directions. As a result, it was concluded that it was necessary to standardize some of the countermeasures against infectious diseases and develop more countermeasures.

Blockchain based Online Pharmacy with Customer Privacy Protection

  • Im, Cheon Woon;Kim, Dong Han;Jang, Jung Eun;Shin, Eun Jung;Lee, Hyun Chul;Kim, Tae Hyun;Kim, Seong Whan
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2021년도 춘계학술발표대회
    • /
    • pp.33-36
    • /
    • 2021
  • Corona 19 minimizes face-to-face contact, and online untact platforms are emerging in the medical sector. However, there are potential risks of medicine expiration, medicine misuse, and responsible materials management for secure delivery. In this paper, we investigate three key functional requirements for online pharmacy, and design the blockchain based online pharmacy to meet the requirements. To protect the patient's privacy and to ensure tamper-free traceability, we incorporate the multi-level access authentication scheme for each participant (governments, medical circles, and patients). We show that our system guarantees patient's privacy without further system modification.

"생명윤리 및 안전에 관한 법률" 전부개정안의 내용과 의의: 임상연구와의 관계를 중심으로 (A study on the proposed amendment bill of Bioethics and Safety Law (2010): focusing on the meaning of significant contents related to the clinical research)

  • 김은애
    • 의료법학
    • /
    • 제12권1호
    • /
    • pp.99-131
    • /
    • 2011
  • To strengthen the protection of human research subjects and human materials, the Korean Ministry of Health and welfare proposed the amendment bill of Bioethics and Safety Law(2010) to the Congress. It includes so many meaningful clauses. According to the bill, the scope that this act shall apply will be expended to the research involving human subjects and human materials. In the bill, there are the principles of this act; the protection of the life, health, and dignity of the human subjects, the obtaining of the adequate informed consent, the protection of the human subject's information confidentiality and the human subject's privacy, the assessment and minimizing of the risks involved and the guarantee of the safety for the human subjects, the preparation of the special protection program for the vulnerable human subjects, and so on. According to the bill, Institutional Bioethics Review Board(the same as Institutional Review Board) will be responsible for the auditing and monitoring on the research that was approved by IBRB, conducting the education program for the researchers, IBRB members and administrative staffs, preparing of the special protection program for the vulnerable human subjects, and forming the guidelines for the researchers as well as the review of the research protocols. And the State and local governments shall take necessary measures to support the expending of the social infrastructure. In addition to, IBRB will have to be assessed and to be gained the accreditation by the Korean Ministry of Health and welfare. So, if Bioethics and Safety Law is amended, it will contribute enormously to enhance the level of the human research subjects protection. Also, if this Law is amended, IBRB will play a major role for the conduct of the ethically, scientifically, and legally proper research. But now, as a matter of fact, the capability of IBRB members and IBRB office members is not enough to charge of this role because some people and some organizations does not know the importance of IBRB exactly. In spite of, IBRB shall be able to this role to protect the human subjects and to develop the level of the research On the international level. Therefore, the State, local governments and the Organization shall back up the administrative and financial terms of the IRB and IRB Office.

  • PDF

금융거래 고객정보 침해사고 보상보험의 구성 및 정책방향 (Composition and Policy Direction of Compensation Insurance Against Customer Information Infringements in Financial Transactions)

  • 김종환;임종인
    • 한국전자거래학회지
    • /
    • 제19권3호
    • /
    • pp.1-21
    • /
    • 2014
  • 개인정보는 금융거래의 성립조건이며 금융회사의 핵심자산이다. 그러나 정보사회의 부작용으로써 나타난 개인정보 침해사고는 중대한 사회적 위험이 되고 있으며, 이러한 위험은 개인과 회사의 실제적 피해로써 현실화되고 있다. 본 연구는 소비자의 손실 측면에서 개인정보 침해 사고로 인해 금융 분야에서 발생한 금전적, 정신적 손해 현황을 분석하고, 이러한 실제 손해를 최소화하기 위한 위험전가의 수단으로써 보험의 유용성을 제시하였다. 그리고 개인 정보 침해 사고 보상보험의 구성요소와 보험료의 산정원리를 검토하고 최종적으로 이러한 보험 제도를 활성화하기 위한 정책을 제안하였다. 위험관리의 한 방법으로써 보험은 소비자 보호와 회사의 재무적 건전성을 동시에 확보할 수 있는 유용한 수단이며, IT 리스크의 계량적 측정을 위한 기반을 제공할 수 있다.

정보보호 인력양성을 위한 효율적인 정보보호관리체계의 융합 관리 방안 (A Measures to Converge Manage an Efficient Information Security Management System for Information Security Experts Manpower)

  • 이근호
    • 한국융합학회논문지
    • /
    • 제5권4호
    • /
    • pp.81-86
    • /
    • 2014
  • IT기술의 발전으로 인하여 각종 새로운 서비스모델을 통한 다양한 서비스가 제공이 되고 있다. 이러한 새로운 서비스의 제공으로 인한 새로운 보안위협이 증가하고 있는 상황이다. 국가적으로도 보안위협으로부터 안전한 자산을 보호하기 위한 각종 정보보호 인력 양성프로그램이 운영이 되고 있다. 제도적으로도 정보보호관리체계를 통하여 새로운 서비스와 기존 서비스에 대한 안전성을 검증하면서 기관 인증을 해주고 있다. 사회적으로도 정보보호에 대한 인식이 확산되어 많은 대학이 정보보호 인력 양성을 위한 과정을 운영중이다. 아울러 정보보호 인력양성을 위한 정보보호동아리에 대한 관리도 함께 병행하고 있다. 본 연구에서는 각 대학의 정보보호 인력 양성시 필요한 정보보호관리체계(ISMS)에 대한 교과과정의 운영과 정보보호동아리의 효율적인 융합관리 방안을 제안하고자 한다. 정보보호 인력의 양성을 통하여 안전성을 좀더 보완하는 융합형 정보보안 전문 과정으로 IT기반의 사회의 안전에 기여가 예상된다.

Improving International Access to the IARC Monographs Database with Linkage to other Sources of Information

  • Rice, Jerry M.;Waters, Michael D.;Wright, R.Glenn
    • Toxicological Research
    • /
    • 제17권
    • /
    • pp.227-236
    • /
    • 2001
  • The IARC Monographs Programme on the Evaluation of Carcinogenic Risks to Humans has reviewed, summarized and evaluated 869 environmental agents and exposures as oj June 2000. This large collection includes all relevant published epidemiological data on cancer in exposed humans and results of bioassays for carcinogenicity in experimental animals. Since 1986. cancer data have been systematically supplemented by summaries of other toxicological data that are relevant to assessments of carcinogenic hazard. These include summaries qf genetic and related effects of chemicals. which have been prepared as Genetic Activity Profiles (GAP) by the U.S. EPA in collaboration with IARC. As the Mono-graphs have proved increasingly valuable and influential worldwide. they have evolved into an encyclopedia on environmental carcinogenic risks to humans. However. the Monographs have historically been prepared only as printed books with limited distribution. and the Monographs Programme has needed to adjust to expectations oj wider availability. Since 1998 the evaluations and summaries have been globally accessible by Internet from IARC (http://www.iarc.fr) and the GAP profiles by Internet from EPA (http://www.epa.gov/gapdb/). with the two web sites linked. Improved EPN/ARC GAP database and software. GAP2000. now link GAP profiles directly to the appropriate IARC web pages for summaries of evaluations of a given compound and its overall IARC classification. During the year 2000. by means of optical character recognition (OCR) technology the entire series of IARC Monographs is being converted to an electronic version. The first edition is now available commercially in CD-ROM format and will soon become available on-line at .

  • PDF

IPv6의 방화벽 규칙을 기반으로한 보안위험 평가 (Security Risks Evaluation based on IPv6 Firewall Rules)

  • 팽상우;이훈재;임효택
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2008년도 추계종합학술대회 B
    • /
    • pp.261-264
    • /
    • 2008
  • IPv6 has been proposed and deployed to cater the shortage of IPv4 addresses. It is expected to foresee mobile phones, pocket PCs, home devices and any other kind of network capable devices to be connected to the Internet with the introduction and deployment of IPv6. This scenario will bring in more challenges to the existing network infrastructure especially in the network security area. Firewalls are the simplest and the most basic form of protection to ensure network security. Nowadays, firewalls' usage has been extended from not only to protect the whole network but also appear as software firewalls to protect each network devices. IPv6 and IPv4 are not interoperable as there are separate networking stacks for each protocol. Therefore, the existing states of the art in firewalling need to be reengineered. In our context here, we pay attention only to the IPv6 firewalls configuration anomalies without considering other factors. Pre-evaluation of security risk is important in any organization especially a large scale network deployment where an add on rules to the firewall may affect the up and running network. We proposed a new probabilistic based model to evaluate the security risks based on examining the existing firewall rules. Hence, the network administrators can pre-evaluate the possible risk incurred in their current network security implementation in the IPv6 network. The outcome from our proposed pre-evaluation model will be the possibilities in percentage that the IPv6 firewall is configured wrongly or insecurely where known attacks such as DoS attack, Probation attack, Renumbering attack and etc can be launched easily. Besides that, we suggest and recommend few important rules set that should be included in configuring IPv6 firewall rules.

  • PDF