• 제목/요약/키워드: technical risk

검색결과 702건 처리시간 0.028초

동맥전환술: 판상돔맥이식 수기변형과 수술사망의 위험인자 (Arterial Switch Operation: The Technical Modification of Coronary Reimplantation and Risk Factors for Operative Death)

  • 성시찬;이형두;김시호;조광조;우종수;이영석
    • Journal of Chest Surgery
    • /
    • 제37권3호
    • /
    • pp.235-244
    • /
    • 2004
  • 동맥전환술은 대혈관전위증이나 Taussig-Bing 기형의 가장 보편적인 수술법으로 인정되고 있다. 동맥전환술 후 수술사망에 영향을 미치는 위험인자와 함께 관상동맥 이식 수기변형의 유효성을 알아보고자 하였다. 1994년부터 2002년 7월까지 동맥전환술을 동아대학교 병원에서 한 명의 외과의에 의하여 시행된 85예의 대혈관전위증과 양대혈관 우심실기시증 환아를 대상으로 후향적 조사를 하였다. 관상동맥이식 수기변형 등 수술(병원)사망에 관여한다고 생각하는 여러 인자들을 다변량 회귀분석을 통해 수술사망에 미치는 위험인자들을 파악하였다. 전체 수술사망(병원사망)은 모두 17예(20%)였으며 수술사망률이 98년 이전은 31.0% (13/42), 98년 이후는 9.3% (4/43)로 감소하였다. 대동맥궁 기형을 동반하지 않은 경우는 전체 사망률이 12.5% (9/72)였으나 동반된 경우는 61.5% (8/13)로 높은 사망률을 보였다. 관상동맥이식 수기변형을 하지 않은 경우 사망률은 28.1%(18/64)를 보인 반면 관상동맥이식 수기변형을 한 경우는 4.8% (1/21)로 많은 사망률의 감소가 관찰되었다. 다변량 회귀분석에서 심폐기가동시간($\geq$ 250분), 대동맥차단시간($\geq$ 150분), 대동맥궁기형이 동반된 경우, 수술 전 사건(event)이 있었던 경우, 개방 관상동맥 이식술(open coronary reimplantation technique)이 수술사망의 위험인자로 파악되었다. 동맥전환술의 수술사망률은 수술시기가 경과함에 따라 감소하였으며, 대동맥궁 기형의 동반과 술 전 사건(event)이 수술사망의 중요 위험인자였다. 비전형적 관상동맥 형태는 수술사망의 위험요소가 아니었으며 관상동맥 이식의 수기변형이 수술사망을 낮추는 데 매우 유효하였던 것으로 생각된다.

API-581에 의한 정량적 위험기반검사에서 취성파괴에 의한 사고발생 가능성 해석 (Analysis of Likelihood of Failure for the Brittle Fracture through Quantitative Risk Based Inspection using API-581)

  • 김태옥;이헌창;장서일
    • 한국가스학회지
    • /
    • 제10권1호
    • /
    • pp.1-6
    • /
    • 2006
  • 압력설비를 안전하고 효율적으로 사용하기 위하여 본 연구에서는 API-581 절차에 의한 위험기반검사에서 취성파괴에 의한 사고발생 가능성을 정량적으로 해석하였다. 그 결과, 낮은 온도/낮은 인성파괴와 뜨임취성에서는 A 충격곡선이고. 낮은 온도와 열처리 전인 상태에서 기술종속계수(TMSF)가 큰 값을 나타내었고, $855^{\circ}F$ 취성에서는 위험도가 무시할 수 있었으나, 시그마상 취성에서는 낮은 온도의 고 시그마인 경우에 TMSF가 큰 값을 나타내어 사고발생 가능성이 매우 높았다.

  • PDF

Social Engineering Attack Graph for Security Risk Assessment: Social Engineering Attack Graph framework(SEAG)

  • Kim, Jun Seok;Kang, Hyunjae;Kim, Jinsoo;Kim, Huy Kang
    • 한국컴퓨터정보학회논문지
    • /
    • 제23권11호
    • /
    • pp.75-84
    • /
    • 2018
  • Social engineering attack means to get information of Social engineering attack means to get information of opponent without technical attack or to induce opponent to provide information directly. In particular, social engineering does not approach opponents through technical attacks, so it is difficult to prevent all attacks with high-tech security equipment. Each company plans employee education and social training as a countermeasure to prevent social engineering. However, it is difficult for a security officer to obtain a practical education(training) effect, and it is also difficult to measure it visually. Therefore, to measure the social engineering threat, we use the results of social engineering training result to calculate the risk by system asset and propose a attack graph based probability. The security officer uses the results of social engineering training to analyze the security threats by asset and suggests a framework for quick security response. Through the framework presented in this paper, we measure the qualitative social engineering threats, collect system asset information, and calculate the asset risk to generate probability based attack graphs. As a result, the security officer can graphically monitor the degree of vulnerability of the asset's authority system, asset information and preferences along with social engineering training results. It aims to make it practical for companies to utilize as a key indicator for establishing a systematic security strategy in the enterprise.

A Practical Security Risk Analysis Process and Tool for Information System

  • Chung, Yoon-Jung;Kim, In-Jung;Lee, Do-Hoon
    • Journal of Information Processing Systems
    • /
    • 제2권2호
    • /
    • pp.95-100
    • /
    • 2006
  • While conventional business administration-based information technology management methods are applied to the risk analysis of information systems, no security risk analysis techniques have been used in relation to information protection. In particular, given the rapid diffusion of information systems and the demand for information protection, it is vital to develop security risk analysis techniques. Therefore, this paper will suggest an ideal risk analysis process for information systems. To prove the usefulness of this security risk analysis process, this paper will show the results of managed, physical and technical security risk analysis that are derived from investigating and analyzing the conventional information protection items of an information system.

도로인근 유역의 토석류 위험평가 및 등급화 방안 (Debris Flow Risk Evaluation and Ranking Method for Drainage Basin adjacent to Road)

  • 김경석;장현익
    • 한국지반공학회:학술대회논문집
    • /
    • 한국지반공학회 2010년도 춘계 학술발표회
    • /
    • pp.279-290
    • /
    • 2010
  • Technical countermeasures against debris flow should be established upon the risk level of the target location. Risk of debris flow should consider the hazard imposed by debris flow and vulnerability of the facilities to debris flow. In this research, we have defined the target location for risk evaluation and suggested scoring method of hazard of debris flow and vulnerability of road to debris flow. By defining risk rank into 6 categories in terms of possibility of damage during rainfall and using the risk scores of 46 debris flow cases, we have suggested risk ranking matrix. The method can be used in ranking the drainage basin adjacent to road by simply determining the hazard with vulnerability score and can be used for planning the debris flow countermeasures.

  • PDF

Biomedical Laboratory: Its Safety and Risk Management

  • Tun, Tin
    • 대한의생명과학회지
    • /
    • 제23권3호
    • /
    • pp.155-160
    • /
    • 2017
  • Biomedical laboratory is full of risks. Risk could be biological, chemical, radioactive, mechanical, physical, fire and electrical. All possible risks need to be identified, evaluated and controlled. A risk management system must be in place to prevent accident or loss of lives and to improve overall workplace safety and productivity. Safety in laboratory is a combination of appropriate risk management system, engineering controls and technical facilities, administrative controls and safety procedures and practices. Laboratory safety culture must be developed so that exposure to hazards for laboratory personnel, community and environment will be minimized or eliminated. In this review, importance of safety in a biomedical laboratory and risk management will be discussed.

보안과 위험의 지각이 인터넷 뱅킹 재사용 의도에 미치는 영향 (The Influence of Security and Risk Perception on the Reuse of Internet Banking)

  • 이웅규
    • Asia pacific journal of information systems
    • /
    • 제17권1호
    • /
    • pp.77-93
    • /
    • 2007
  • Risk has been considered as one of very important topics in traditional consumer behavior theoretically and practically since its tendency of minimizing errors rather than maximizing utilization in addition to its intuitive appealing with very high explaining power. In addition to a traditional view of risk, importance of risk in online transactions such as Internet banking is due to technical instability in security of the Internet as well as temporal and spatial separation of transaction partners. Therefore, risk in online transactions should be analyzed by a very comprehensive way since it is very inherent in the Internet. The objective of this study is to suggest a research model for explaining the use of online transactions in some risk related variables including risk results, security result, perceived security, and social influence and show its validity by applying it to Internet banking users. In result, hypotheses suggested by our research model are shown to be valid ones.

공장건물의 화재리스크 경감방안에 관한 연구 (A Study on Factory Building Fire Risk Reduction Management)

  • 정의수;강경식
    • 대한안전경영과학회지
    • /
    • 제10권3호
    • /
    • pp.43-53
    • /
    • 2008
  • This study is carried out for the fire safety of the factory building, the fire risk reduction measure in compliance with an example approached in fire risk reduction systematically, contribute to reduce the fire risk. The analytical fire risk process of discovering, identifying, estimating and evaluating risk and control measure as risk reduction measures are core concept, applies loss prevention with loss control techniques. The painting process in the workplace where the fire hazard and death accident accompanies coexists. Loss prevention problem of creation prevention of dangerous atmosphere at workplace is health and human services problem of normal circumstances, must be inspected with problem of combustible gases at the time of fire explosion. Static electricity measure accomplished the risk control process thoroughly as the fire risk reduction process model with the ignition sources measure which is presented. Fire risk from within organizing will be able to classify with each field by detailedly but risk treatment process will be able to apply basically all the same concept. Consequently about risk management example from before, this study is proposed risk management techniques that standardized rightly in the actual condition of organization with one plan, with discovery of fire risk, the feedback process in compliance with a fire risk reduction and the review which control the result is joint responsibility of engineer, technical expert and manager as part of safety management to practice with the fact must be supervised.

클라우드 서비스 위험 제거를 위한 중소기업 직원의 포기옵션 선택에 관한 조직 차원의 조절 변수 연구 (Organizational-Level Moderators on the SME Employees' Adoption of Abandonment Option to Manage the Cloud Computing Service Risks)

  • 강소라;남승현;양희동
    • 한국산업정보학회논문지
    • /
    • 제22권1호
    • /
    • pp.105-116
    • /
    • 2017
  • 본 연구에서는 콜라우드 서비스의 높은 실패율에 대하여, 어떠한 위험이 존재하는지 살펴보고, 이러한 위험을 제거하기 위한 실물 옵션, 특히 포기 옵션의 채택에 영향을 끼칠 수 있는 위험의 종류에 대하여 실증 분석을 실시하였다. 특히 개인 차원에서 인식하는 위험의 정도가 포기 옵션의 채택에 어떠한 영향을 끼치는 지에 더하여, 조직 차원의 변수 (CEO의 혁신성, 밴드웨건 효과)가 개인 차원의 효과들을 어떻게 조절하는지에 대하여 실증 분석을 실시한다. 수도권 소재 중소기업의 IT 담당자들을 대상으로 설문조사한 내용을 바탕으로, 기술적 위험과 경제적 위험이 포기 옵션의 채택에 유의한 영향을 끼치며, CEO의 혁신성이 기술적 위험의 효과를 억제하는 조절 효과가 검증되었다. 그러나, 밴드웨건 효과는 개인 차원의 영향을 억제하는 조절 효과는 실증적으로 유의하지 않았다.