• Title/Summary/Keyword: risk communication

Search Result 1,193, Processing Time 0.036 seconds

Relationship between handwashing practices and infectious diseases in Korean students (한국 학생의 손씻기 실천과 감염병 이환과의 관련성)

  • Zhang, Dong-Fang;Lee, Moo-Sik;Hong, SuJin;Yang, Nam-Young;Hwang, Hae-Jung;Kim, Byung-Hee;Kim, Hyun-Soo;Kim, Eun-Young;Park, Yun-Jin;Lim, Go-Un;Kim, Young-Tek
    • Journal of agricultural medicine and community health
    • /
    • v.40 no.4
    • /
    • pp.206-220
    • /
    • 2015
  • Objectives: The purpose of this study was to investigate the association between practice and infectious diseases in elementary, middle and high school students. Methods: In 16 metropolitan cities and province of the Korea, the students who from fourth grade of elementary school to third grade of high school were surveyed by personal interviews and an web-based online survey from 5 to 25 September, 2014. We analyzed data with chi-square test and logistic regression analysis. Results: Common cold, diarrhea, and eye infections were more prevalent among students in higher grade than lower grade. In particular, common cold was more prevalent among girls than boys, using hand sanitizer than washing with soaps, and students who wash the dorsal side of hand than not wash the dorsal side of hand. Conclusions: Higher-grade students showed low status of hand washing practice. Hand washing was determined as the fact which influences to increase the prevention of communicable disease such as common cold. Considering the fact that youth groups have higher risk of being infected due to their group life, schools are recommended to provide adequate educations regarding proper hand washing practice with soap.

An Analysis of Efficiency of Security Services : A Comparative Determinants Analysis of Public and Private Security (경호업무 효율성에 관한 연구 : 공공경호와 민간경호의 효율성 영향요인의 비교분석)

  • Park, Moon-Sun
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.67-103
    • /
    • 2009
  • Objectives of this study is develop security services through determinants analysis on the efficiency of security works regarding security and guarding business in Korea because nowadays the modern society like Korea let alone all over the world faces the increase of dangerous factors in every security field of the human societies, and also it is the very present situation that an individual's life even the national security itself can be at the risk without guaranteeing the efficiency of the security services. For this purpose, this study reviewed related documents, surveyed and interviewed security personnels to identify what the potentially influential factors are in both the public and private security organizations regarding the efficiency of present security services and organizations, and what differences are. Also, comparing the public and private security sectors, this study intended to suggest policy agendas how to enhance the efficiency of security services in the future. This study surveyed the 177 agents and former agents of the Presidential Security Service(PSS) for the public security sector, and also surveyed, interviewed, and internet-based polled 821 randomly selected personnels for the private security sector. This research showed that regarding the efficiency of the security services number of independent variables which had positive responses in the public security sector was more than that in the private security sector. Among the 21 questions regarding this issue, there were all of 21 positive responses in the public security sector while there were 18 negative responses in the private security sector. As a result of synthesizing all the answers of the both sides, it is possible to understand that mostly the ratio of the positive response was much higher. In the public security service, statistically significant variables were budget support for events, prior access of information, an integrated teamwork training, organizational atmosphere, morale of organization personnel. However, practical training of the security service and mutual communication showed unexpectedly negative(-) signs. In the private security service, statistically significant variables were budget support for events, integrated teamwork training, socially friendly atmosphere, compensation for the personnels, bullet-proof equipments and vehicles, mood of organization, personnel recruit and disposition, unexpected incidents and basic attitude for security services. In sum, while organizational personnel variables and organizational management variables were significant in the public security service, some organizational management variables and all socio-environment variables were statistically significant at 5% significance level.

  • PDF

Study on the Fire Risk Prediction Assessment due to Deterioration contact of combustible cables in Underground Common Utility Tunnels (지하공동구내 가연성케이블의 열화접촉으로 인한 화재위험성 예측평가)

  • Ko, Jaesun
    • Journal of the Society of Disaster Information
    • /
    • v.11 no.1
    • /
    • pp.135-147
    • /
    • 2015
  • Recent underground common utility tunnels are underground facilities for jointly accommodating more than 2 kinds of air-conditioning and heating facilities, vacuum dust collector, information processing cables as well as electricity, telecommunications, waterworks, city gas, sewerage system required when citizens live their daily lives and facilities responsible for the central function of the country but it is difficult to cope with fire accidents quickly and hard to enter into common utility tunnels to extinguish a fire due to toxic gases and smoke generated when various cables are burnt. Thus, in the event of a fire, not only the nerve center of the country is paralyzed such as significant property damage and loss of communication etc. but citizen inconveniences are caused. Therefore, noticing that most fires break out by a short circuit due to electrical works and degradation contact due to combustible cables as the main causes of fires in domestic and foreign common utility tunnels fire cases that have occurred so far, the purpose of this paper is to scientifically analyze the behavior of a fire by producing the model of actual common utility tunnels and reproducing the fire. A fire experiment was conducted in a state that line type fixed temperature detector, fire door, connection deluge set and ventilation equipment are installed in underground common utility tunnels and transmission power distribution cables are coated with fire proof paints in a certain section and heating pipes are fire proof covered. As a result, in the case of Type II, the maximum temperature was measured as $932^{\circ}C$ and line type fixed temperature detector displayed the fire location exactly in the receiver at a constant temperature. And transmission power distribution cables painted with fire proof paints in a certain section, the case of Type III, were found not to be fire resistant and fire proof covered heating pipes to be fire resistant for about 30 minutes. Also, fire simulation was carried out by entering fire load during a real fire test and as a result, the maximum temperature is $943^{\circ}C$, almost identical with $932^{\circ}C$ during a real fire test. Therefore, it is considered that fire behaviour can be predicted by conducting fire simulation only with common utility tunnels fire load and result values of heat release rate, height of the smoke layer, concentration of O2, CO, CO2 etc. obtained by simulation are determined to be applied as the values during a real fire experiment. In the future, it is expected that more reliable information on domestic underground common utility tunnels fire accidents can be provided and it will contribute to construction and maintenance repair effectively and systematically by analyzing and accumulating experimental data on domestic underground common utility tunnels fire accidents built in this study and fire cases continuously every year and complementing laws and regulations and administration manuals etc.

Survey on Comparative Awareness between Media and Industry on Occurrence of Food Safety Incident (식품안전사건 발생 시 미디어와 산업의 인식도 조사)

  • Shin, Won-Jung;Lee, Yu-Si;Oh, Se-Ra;Park, Tae-Gyun;Kim, Renee;Kim, Ho-Sik;Lee, Jung-Ho;Lee, Seung-Yong;Ha, Sang-Do
    • Journal of Food Hygiene and Safety
    • /
    • v.28 no.2
    • /
    • pp.108-114
    • /
    • 2013
  • To describe the comparative awareness between media and industry, we conducted a survey with a professional group including 28 food safety managers at food corporations and 17 food journalists to find out the differences in perception of 'reporting terms' and 'correspondence terms' when food safety incident occurs. We surveyed by questionnaire methods and did the statistical analysis by SPSS. The results showed that 70.6% of the journalists and 92.9% of the corporation workers answered 'yes indeed' about the question whether the media has a great influence when food safety incident occurs. In the perception that use of the stimulating terms of the media was the cause of company damage, 83% of the corporate workers answered 'yes indeed', and 70.6% of the journalists answered 'yes'. It means that both groups agreed on stimulating terms causing company damage. In the question whether the 'reporting terms' of the media and the 'correspondence terms' of the government and academia made a difference in the consumers' perception and the spread of the incident, 92.9% of the corporate workers and 35.3% of the journalists answered 'yes indeed'. It means that both groups showed a common opinion that the difference in choice of words expanded the perception of consumers, and the spread of the incident. However, the corporate workers agreed with this in a more serious manner than the journalist group. In standardization of 'reporting terms' and restricting use, corporate workers were overall at a positive stand while journalists showed a big difference in opinion within the group. In conclusion, it is necessary to establish a measure to standardize the terms used by corporations, journalists, and professionals in order to decrease the differences of terms and the damage of consumers and the company when food safety incident occurs.

Professionalism raising of the escort which leads an instance analysis (사례분석을 통한 경호 전문성 제고)

  • Yu, Hyung-Chang
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.73-99
    • /
    • 2009
  • There are three assassination and treatening cases in this thesis introduced as analysis data. They are shooting accidents of the U.S.A's President Reagun (1981,3.30), and the President Park Jeong Hee of South Korea(1974.8.15), assassination of the Prime Minister Lavin of Israel (1995.11.4) In March 30, 1981, there was an accident where criminal, Hinckley, fired ball cartridges right before the President Reagan got into the car to move to White House after completing the announcement of Hilton Hotel of Washington. As a result, the chest of president was shot and public information secretary and safeguard were wounded. In August, 15, pm 10:23, where the 29th 8.15 independent anniversay event was being celebrated by the people at the National theater in Jangchungdong, Seoul, the criminal Moon Sekwang fired ball cartridges, he failed to assassinate the President Park Jeong Hee of Korea, but shot the First lady Yuk Young Soo. She was wounded right part of head and died. In November 4, Saturday, pm 22:00 the Prime Minster Lavin had finished the supporting event of Middle Asia's Peace project and was taking on the car when he was killed by the criminal Amir's shooting, The accidents left very important lesson from the aspect of security analysis and it has been frequently used as a material for the education and training of safeguard organization. In Korea, as well as Presidential Security Service, national security departments have selected it as an important model for the subjects such as 'Security Analysis, 'Security Practice' and 'Security Methodology'. In the performance of security duty, security skill is the most important matter. Moreover, it has a close relationship with politics, society and culture. The purpose of this study is to analyze and reevaluate the case, which has been treated as a usual model from the aspect of security analysis, beyond its introduction. Attempted assassination of President Reagan was evaluated as a positive success example because of its rapid response of adjacent guards to evacuate Reagan, who is a guard target, within 10 seconds after the shot. When comparing it to President Kennedy Assassination of 1963, it was evaluated that guards were significantly specialized. In the study, however, it was possible to found many problems such as carelessness of guard, who is in charge of external area of event place, idle attitude for frequently used event place, confusion of wireless communication, risk of wireless security disclose, insufficient provision of compulsory record file, insufficient profiling of dangerous person and unsecured hospital and first-aid room.

  • PDF

The Key Success Factors of University Entrepreneurship Education: Implication from USA University Cases (대학 창업교육 핵심 성공요인: 미국 대학 사례의 시사점)

  • Choi, Jong-In;Park, Chygwan
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.8 no.3
    • /
    • pp.85-96
    • /
    • 2013
  • Entrepreneurship courses and programs in Korean universities tend to increase steadily but seem to have some limitations. They are usually recognized as another domain of Business Administration. Entrepreneurship program is practical like Business Administration but should be much more interdisciplinary than that. Because Korean Entrepreneurship programs are in the early stage, they must be reinforced with factors such as education culture, faculties, curriculum and relationships with communities. This study aims to get some implications from Entrepreneurship programs have been run by universities in America in order to facilitate Entrepreneurship program in Korean universities. Based on 11 success factors found by our case universities' Entrepreneurship programs and Kauffman Campus, this study has drawn implications of critical success factors of Entrepreneurship programs as follow. First of all, because Entrepreneurship programs should focus on Entrepreneurship mind sets such as innovative idea generation and courage to overcome risk, it is more desirable that Entrepreneurship programs are introduced in all departments of universities such as Arts, Science and Engineering. These programs also need to take interdisciplinary approach and required to be opened from liberal arts course. In order to be sustained during all their academic careers, vision, mission and strategy for Entrepreneurship programs should be based on strong leadership and support of top leaders. Entrepreneurship culture of each university is also one of the most important success factors. Entrepreneurship programs not only as major programs but also as specific Entrepreneurship minors designed for departments such as Arts, Science and Engineering could be considered according to each university's situation. This study also suggest to make a motivation system for Entrepreneurship faculties, Ph d. programs for Entrepreneurship, communication network for Entrepreneurship programs and mentor system in community. To begin Entrepreneurship programs, it also needs to develop good education contents as many as possible. When it concerned with teaching method, project based 4 year program can be suggested to be effective and efficient. To introduce project based program that should be consistent till participants' graduation, university must prepare regulations to support team teaching, mentor and interdisciplinary cooperation. To dissipate the concept that Entrepreneurship is another version of management, this study support the idea that Entrepreneurship programs should be designed and run by independent and central-focused governance system, Entrepreneurship education center.

  • PDF

A Study on Optimal Site Selection for Automatic Mountain Meteorology Observation System (AMOS): the Case of Honam and Jeju Areas (최적의 산악기상관측망 적정위치 선정 연구 - 호남·제주 권역을 대상으로)

  • Yoon, Sukhee;Won, Myoungsoo;Jang, Keunchang
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.18 no.4
    • /
    • pp.208-220
    • /
    • 2016
  • Automatic Mountain Meteorology Observation System (AMOS) is an important ingredient for several climatological and forest disaster prediction studies. In this study, we select the optimal sites for AMOS in the mountain areas of Honam and Jeju in order to prevent forest disasters such as forest fires and landslides. So, this study used spatial dataset such as national forest map, forest roads, hiking trails and 30m DEM(Digital Elevation Model) as well as forest risk map(forest fire and landslide), national AWS information to extract optimal site selection of AMOS. Technical methods for optimal site selection of the AMOS was the firstly used multifractal model, IDW interpolation, spatial redundancy for 2.5km AWS buffering analysis, and 200m buffering analysis by using ArcGIS. Secondly, optimal sites selected by spatial analysis were estimated site accessibility, observatory environment of solar power and wireless communication through field survey. The threshold score for the final selection of the sites have to be higher than 70 points in the field assessment. In the result, a total of 159 polygons in national forest map were extracted by the spatial analysis and a total of 64 secondary candidate sites were selected for the ridge and the top of the area using Google Earth. Finally, a total of 26 optimal sites were selected by quantitative assessment based on field survey. Our selection criteria will serve for the establishment of the AMOS network for the best observations of weather conditions in the national forests. The effective observation network may enhance the mountain weather observations, which leads to accurate prediction of forest disasters.

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.

Permanent Preservation and Use of Historical Archives : Preservation Issues Digitization of Historical Collection (역사기록물(Archives)의 항구적인 보존화 이용 : 보존전략과 디지털정보화)

  • Lee, Sang-min
    • The Korean Journal of Archival Studies
    • /
    • no.1
    • /
    • pp.23-76
    • /
    • 2000
  • In this paper, I examined what have been researched and determined about preservation strategy and selection of preservation media in the western archival community. Archivists have primarily been concerned with 'preservation' and 'use' of archival materials worth of being preserved permanently. In the new information era, preservation and use of archival materials were faced with new challenge. Life expectancy of paper records was shortened due to acidification and brittleness of the modem papers. Also emergence of information technology affects the traditional way of preservation and use of archival materials. User expectations are becoming so high technology-oriented and so complicated as to make archivists act like information managers using computer technology rather than traditional archival handicraft. Preservation strategy plays an important role in archival management as well as information management. For a cost-effective management of archives and archival institutions, preservation strategy is a must. The preservation strategy encompasses all aspects of archival preservation process and practices, from selection of archives, appraisal, inventorying, arrangement, description, conservation, microfilming or digitization, archival buildings, and access service. Those archival functions should be considered in their relations to each other to ensure proper preservation of archival materials. In the integrated preservation strategy, 'preservation' and 'use' should be combined and fulfilled without sacrificing the other. Preservation strategy planning is essential to determine the policies of archives to preserve their holdings safe and provide people with a maximum access in most effective ways. Preservation microfilming is to ensure permanent preservation of information held in important archival materials. To do this, a detailed standardization has been developed to guarantee the permanence of microfilm as well as its product quality. Silver gelatin film can last up to 500 years in the optimum storage environment and the most viable option for permanent preservation media. ISO and ANIS developed such standards for the quality of microfilms and microfilming technology. Preservation microfilming guidelines was also developed to ensure effective archival management and picture quality of microfilms. It is essential to assess the need of preservation microfilming. Limit in resources always put a restraint on preservation management. Appraisal (and selection) of what to be preserved was the most important part of preservation microfilming. In addition, microfilms with standard quality can be scanned to produce quality digital images for instant use through internet. As information technology develops, archivists began to utilize information technology to make preservation easier and more economical, and to promote use of archival materials through computer communication network. Digitization was introduced to provide easy and universal access to unique archives, and its large capacity of preserving archival data seems very promising. However, digitization, i.e., transferring images of records to electronic codes, still, needs to be standardized. Digitized data are electronic records, and st present electronic records are very unstable and not to be preserved permanently. Digital media including optical disks materials have not been proved as reliable media for permanent preservation. Due to their chemical coating and physical character using light, they are not stable and can be preserved at best 100 years in the optimum storage environment. Most CD-R can last only 20 years. Furthermore, obsolescence of hardware and software makes hard to reproduce digital images made from earlier versions. Even if when reformatting is possible, the cost of refreshing or upgrading of digital images is very expensive and the very process has to be done at least every five to ten years. No standard for this obsolescence of hardware and software has come into being yet. In short, digital permanence is not a fact, but remains to be uncertain possibility. Archivists must consider in their preservation planning both risk of introducing new technology and promising possibility of new technology at the same time. In planning digitization of historical materials, archivists should incorporate planning for maintaining digitized images and reformatting them in the coming generations of new applications. Without the comprehensive planning, future use of the expensive digital images will become unavailable. And that is a loss of information, and a final failure of both 'preservation' and 'use' of archival materials. As peter Adelstein said, it is wise to be conservative when considerations of conservations are involved.

A Study on Personalized Product Demand Manufactured by Smart Factory (스마트팩토리 환경의 개인맞춤형 제품 구매의도의 영향요인에 관한 연구)

  • Woo, Su-Han;Kwon, Sun-Dong
    • Management & Information Systems Review
    • /
    • v.38 no.1
    • /
    • pp.23-41
    • /
    • 2019
  • Smart Factory is different from existing factory automation in that it aims to produce personalized products with minimum time and cost through ICT. However, previous researches, not from consumers but from product suppliers, have focused on technology trends and technology application methods. In order for Smart Factory to be successful, it must go beyond supplier-focus to meet the needs of consumers. In this study, we surveyed the purchase intention of the personalized product manufactured by smart factory. Influencing factors of purchase intention were drawn as consumers' need for uniqueness, innovativeness, need for touch, and privacy concern, based on previous research. As results of data analysis, it was confirmed that respondents were willing to purchase personalized products, and that consumers' need for uniqueness, innovativeness, and need for touch had a significant impact on purchase intention of personalized products. Our findings can be summarized as follows. First, Consumers' need for uniqueness was found to have positive effects(${\beta}=0.168$) on purchase intention of personalized products. The desire to differentiate themselves from others will be reflected in their personalized products. Therefore, consumers with a higher desire for uniqueness tend to be more willing to purchase personalized products. Second, consumer innovativeness was found to have positive effects(${\beta}=0.233$) on purchase intention of personalized products. Personalized shoes suggested in this study is a new type of personalized product that is manufactured by the latest information and communication technologies such as multi-function robots and 3D printing. Therefore, consumers seeking innovative new experiences are more willing to purchase personalized products. Third, need for touch was found to have positive effects(${\beta}=0.299$) on purchase intention of personalized products. In a smart factory environment, prosuming participation is given to consumers. If consumers participate in the product development process and reflect their requirements on the product, they are expected to increase their purchase intention by virtually satisfying the need for touch. Fourth, privacy concern was found to have no significantly related to purchase intention of personalized products. This is interpreted as a willingness to tolerate the risk of exposing personal information such as home address, telephone number, body size, and preference for consumers who feel highly useful in personalized products.