• Title/Summary/Keyword: risk access

Search Result 384, Processing Time 0.029 seconds

A Case Study on the Estimation of the Risk based on Statistics (산업재해통계기반 Risk 산정에 관한 연구)

  • Woo, Jong-Gwon;Lee, Mi-Jeong;Seol, Mun-Su;Baek, Jong-Bae
    • Journal of the Korean Society of Safety
    • /
    • v.36 no.4
    • /
    • pp.80-87
    • /
    • 2021
  • Risk assessment techniques are processes used to evaluate hazardous risk factors in construction sites, facilities, raw materials, machinery, and equipment, and to estimate the size of risk that could lead to injury or disease, and establish countermeasures. The most important thing in assessing risk is calculating the size of the risk. If the size of the risk cannot be calculated objectively and quantitatively, all members who participated in the evaluation would passively engage in establishing and implementing appropriate measures. Therefore, this study focused on predicting accidents that are expected to occur in the future based on past occupational accident statistics, and quantifying the size of the risk in an overview. The technique employed in this study differs from other risk assessment techniques in that the subjective elements of evaluators were excluded as much as possible by utilizing past occupational accident statistics. This study aims to calculate the size of the risk, regardless of evaluators, such as a manager, supervisor, safety manager, or employee. The size of the risk is the combination of the likelihood and severity of an accident. In this study, the likelihood of an accident was evaluated using the theory of Bud Accident Chainability, and the severity of an accident was calculated using the occupational accident statistics over the past five years according to the accident classification by the International Labor Organization.

Security Problems and Protection Methods in Remote Control Communication for Mobile Robots Using Wireless IP Network

  • Mizoguchi, Hiroshi;Teshiba, Masashi;Goto, Yoshiyasu;Hidai, Ken-Ichi;Shigehara, Takaomi;Mishima, Taketoshi
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1998.10a
    • /
    • pp.401-406
    • /
    • 1998
  • If a mobile robot can be controlled remotely via the internet using wireless IP protocol network, it becomes much useful and convenient. However risk of illegal access is also increased. This paper discusses problems of the illegal access and proposes protection methods against the access.

  • PDF

Recreational Physical Activity and Risk of Ovarian Cancer: a Meta-analysis

  • Zhou, Li-Min
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.13
    • /
    • pp.5161-5166
    • /
    • 2014
  • Our aim was to access the association between recreational physical activity (RPA) and risk of ovarian cancer (OC). The studies were retrieved from the PubMed and Embase databases up to February 20th, 2014. Risk ratios (OR) and 95% confidence intervals (CI) were used to estimate effect sizes. Random-effects or fixed-effects models were used to pool the data. The trim and fill method was applied for sensitivity analysis. Begg's rank correlation test and Egger's regression asymmetry test were employed to assess the publication bias. A total of 6 studies (435398 participants including 2983 OC patients) were included in this meta-analysis. The overall estimate indicated that there was weakly inverse association between RPA and OC risk (RR=0.90, 95%CI: 0.72-1.12, p=0.335). Meanwhile, for prospective cohort studies, a result consistent with the overall estimate was obtained (RR=1.12, 95% CI: 0.88-1.42, p=0.356). However, for case control studies, the pooled estimate of RR was 0.76 (95%CI: 0.64-0.90, p=0.002), indicating a clear significant association between RPA and OC risk. In addition, the sensitivity analysis indicated a significant link between RPA and risk of OC after removing Lahmann's study (RR=0.80, 95% CI: 0.68-0.93, p=0.004). No significant publication bias was found (Begg's test: p=1.00; Egger's test: p=0.817). In conclusion, our meta-analysis indicated a weakly inverse relationship between RPA and the occurrence of OC.

Banding the World Together; The Global Growth of Control Banding and Qualitative Occupational Risk Management

  • Zalk, David M.;Heussen, Ga Henri
    • Safety and Health at Work
    • /
    • v.2 no.4
    • /
    • pp.375-379
    • /
    • 2011
  • Control Banding (CB) strategies to prevent work-related illness and injury for 2.5 billion workers without access to health and safety professionals has grown exponentially this last decade. CB originates from the pharmaceutical industry to control active pharmaceutical ingredients without a complete toxicological basis and therefore no occupational exposure limits. CB applications have broadened into chemicals in general - including new emerging risks like nanomaterials and recently into ergonomics and injury prevention. CB is an action-oriented qualitative risk assessment strategy offering solutions and control measures to users through "toolkits". Chemical CB toolkits are user-friendly approaches used to achieve workplace controls in the absence of firm toxicological and quantitative exposure information. The model (technical) validation of these toolkits is well described, however firm operational analyses (implementation aspects) are lacking. Consequentially, it is often not known if toolkit use leads to successful interventions at individual workplaces. This might lead to virtual safe workplaces without knowing if workers are truly protected. Upcoming international strategies from the World Health Organization Collaborating Centers request assistance in developing and evaluating action-oriented procedures for workplace risk assessment and control. It is expected that to fulfill this strategy's goals, CB approaches will continue its important growth in protecting workers.

Entrepreneurial Orientation, Access to Financial Resources and SMEs' Business Performance: The Case of the United Arab Emirates

  • ZARROUK, Hajer;SHERIF, Mohamed;GALLOWAY, Laura;EL GHAK, Teheni
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.12
    • /
    • pp.465-474
    • /
    • 2020
  • This study investigates how financial resources and entrepreneurial orientation (EO) may influence the performance of small- and medium-sized enterprises (SMEs) in the United Arab Emirates (UAE). Twenty-seven interviews were conducted and evaluated using the method of GABEK® (A GAnzheitliche BEwältigung von Komplexität - holistic processing of complexity). The research demonstrated that access to financial resources has significantly mediated EO's effect on the SMEs' performance. The study found that financial autonomy, enhanced through both personal financing and availability of external finance sources, plays a central role in supporting the EO dimension of autonomy and enhancing the SMEs' performance. In particular, the other EO dimension of risk-taking is stymied by lack of funds with which to take commercial and market opportunities. However, when an innovation strategy is pursued and adopted, access to finance can be facilitated, either through financial institutions or through other governmental funding programs attracting high potential innovators. Furthermore, financial barriers, difficulties accessing bank financing, and legal issues have a detrimental impact on SMEs' growth. The study has implications for policy-makers in the UAE, specifically in terms of sending a signal for lending institutions to consider strategies that provide access to affordable financial services to satisfy SMEs' needs.

A Study of Analysis of Hacking Attacks on Cyber Terrorism and Prognostic Analysis of Phenomena (사이버테러에 대한 해킹공격 분석과 전조 현상 분석)

  • Noh, Jung Ho;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.123-126
    • /
    • 2013
  • Access control system, when operating the infrastructure manager and the permissions for the user to clearly define the terminology that is. Various IT incidents still happening frequently occur, and these incidents in order to prevent the situation of access control is needed. In this study, the Copy command by hackers hacking incidents, such as walking dangerous limits for instructions attacks in advance, and also the internal administrator accident accidental limit command to walk off the risk in advance and even if the incident occurred access to the command history log and post it as evidence through the analysis techniques that can be utilized are described.

  • PDF

Family Function and Internet Addiction in Lower Grade Elementary School Students (초등학교 저학년 아동의 가족기능과 인터넷 중독)

  • Jung, Eun-Sook;Shim, Moon-Sook
    • Journal of Korean Public Health Nursing
    • /
    • v.26 no.2
    • /
    • pp.328-340
    • /
    • 2012
  • Purpose: This study explored the degree of internet addiction and its influencing factors in lower grade elementary school children in rural areas. Methods: Subjects included 1,137 elementary school children. A structured questionnaire consisting of questions internet addiction, family function and school life satisfaction was used for data collection. Descriptive statistics, ${\chi}^2$-test, ANOVA and Correlation and Regression were performed using a SPSS program. Results: Among the subjects, 85.8% were regular users, 8.1% were potential risk users, and 6.1% were high-risk users. Career of internet use, daily internet access time, the number of conversations per week, the number of times spent eating out and traveling with parents within the last month and activities with friends, and satisfaction on school life differed significantly according to the degree of internet addiction. Finally, among the factors studied, daily internet access time, conversations within family, activities with friends and school life satisfaction in children in early elementary school was 20.7% of the explanatory power of the subjects' degree of internet addiction, collectively. Conclusion: Use of the internet by early elementary school children should be monitored and strategies to promote familial conversations, activities with peers and school life satisfaction should be developed.

Factors Affecting User Acceptance of Mobile Commerce Services

  • Jun, Jungho;Lee, Kyoung Jun;Kim, Byung Gon
    • Asia pacific journal of information systems
    • /
    • v.26 no.4
    • /
    • pp.489-508
    • /
    • 2016
  • Growth in the use of mobile commerce services (MCS) as an enabler to conduct business more effectively has been phenomenal. Technology acceptance model (TAM) has been applied in different contexts to examine a wide range of information technology. As more and more companies are finding ways to utilize MCS, an important issue is to understand what factors will affect the decisions of consumers in adopting the services. Based on TAM with two additional groups of external factors (i.e., service-related factors [ubiquitous access and contextual service] and technology-related factors [perceived security risk and network connectivity]) that are theoretically justified to affect both perceived usefulness and perceived ease of use, which are also considered, a research model for the investigated technology acceptance was developed and empirically examined. The major results of this study are as follows. First, ubiquitous access affects perceived usefulness and perceived ease of use. Contextual service affects perceived usefulness. Second, perceived security risk affects perceived usefulness and perceived ease of use. Finally, network connectivity affects perceived usefulness and perceived ease of use.

Effects of Easing LTV·DTI Regulations on the Debt Structure and Credit Risk of Borrowers

  • KIM, MEEROO;OH, YOON HAE
    • KDI Journal of Economic Policy
    • /
    • v.43 no.3
    • /
    • pp.1-32
    • /
    • 2021
  • With CB data in South Korea, this study examines whether the credit risk of borrowers changes when the regulation on bank mortgage supply is relaxed. We analyze the effect of deregulation on LTV and DTI limits in the Seoul-metropolitan area in August 2014 with a difference-in-difference approach. We find that the probability of delinquency is lower in the Seoul metropolitan area after the deregulation than in other urban areas. The effect is noticeable among low-income and low-credit borrowers. We also find that borrowers change their debt structure to reduce the interest costs utilizing their improved access to bank mortgages. The findings suggest the necessity to consider the burden of the high interest costs of unsecured loans for debtors with low incomes and low credit ratings in designing housing finance regulations.

Abbreviated Magnetic Resonance Imaging for Breast Cancer Screening: Concept, Early Results, and Considerations

  • Eun Sook Ko;Elizabeth A. Morris
    • Korean Journal of Radiology
    • /
    • v.20 no.4
    • /
    • pp.533-541
    • /
    • 2019
  • Breast magnetic resonance imaging (MRI) has been increasingly utilized, especially in screening for high-risk cases, because of its high sensitivity and superior ability to detect cancers as compared with mammography and ultrasound. Several limitations such as higher cost, longer examination time, longer interpretation time, and low availability have hindered the wider application of MRI, especially for screening of average-risk women. To overcome some of these limitations and increase access to MRI screening, an abbreviated breast MRI protocol has been introduced. Abbreviated breast MRI is becoming popular and challenges the status quo. This review aims to present an overview of abbreviated MRI, discuss the current findings, and introduce ongoing prospective trials.