• Title/Summary/Keyword: 사전 예방

Search Result 1,217, Processing Time 0.023 seconds

Developing a Framework of Software Risk Management Process for Small Organizations (중소규모 조직을 위한 소프트웨어 위험관리 프로세서 프레임워크 개발)

  • Young Mi Park;Sung Ryong Do;Hyuk Soo Han
    • Annual Conference of KIPS
    • /
    • 2008.11a
    • /
    • pp.476-479
    • /
    • 2008
  • 소프트웨어 프로젝트는 본질적으로 모호한 요구사항, 정확하지 않은 산정과 기술의 어려움 등 많은 불확실성을 포함하고 있다. 이러한 불확실성은 프로젝트가 내부에 잠재적인 문제인 위험(Risk)을 지니고 있다는 것을 의미한다. 위험은 발생되면 프로젝트 성공에 부정적 영향을 미칠 수 있다. 따라서 이러한 위험을 사전에 예방하고 최소화하기 위한 프로세스(Process)의 정립이 필요하다. 상당수의 중소규모 조직이 이러한 위험관리의 중요성을 인지하고 있지만, 위험관리 프로세스를 정의하고 이행하는 것은 전문적인 지식을 요구한다. 따라서 특정 조직과 프로젝트에 적합한 프로세스가 안정적인 단계에 이르기 위해서는 많은 시행착오의 과정이 필요하다. 이러한 어려움 때문에 중소규모 조직에서는 쉽게 프로세스 구축을 시도하지 못하고 있다. 관련 표준과 참조모델에서도 위험관리 프로세스 영역을 포함하여 중요성을 강조하고 있지만, 상위수준의 활동목표와 수행되어야 하는 프랙티스(Practice)만을 제시하고 있는 세부적인 절차나 방법들에 대해서는 언급하지 않고 있다. 이에 본 논문에서는 PMBOK 과 CMMI, 그리는 기존 전문가들의 연구를 바탕으로 소프트웨어 위험관리 프로세스 프레임워크(Framework)를 개발하였다. 중소규모 조직에서는 이 프레임워크를 활용하여 규모와 프로젝트의 특성을 반영한 위험관리 프로세스를 정의하고 적용할 수 있을 것이다.

Sequence Labeling-based Multiple Causal Relations Extraction using Pre-trained Language Model for Maritime Accident Prevention (해양사고 예방을 위한 사전학습 언어모델의 순차적 레이블링 기반 복수 인과관계 추출)

  • Ki-Yeong Moon;Do-Hyun Kim;Tae-Hoon Yang;Sang-Duck Lee
    • Journal of the Korean Society of Safety
    • /
    • v.38 no.5
    • /
    • pp.51-57
    • /
    • 2023
  • Numerous studies have been conducted to analyze the causal relationships of maritime accidents using natural language processing techniques. However, when multiple causes and effects are associated with a single accident, the effectiveness of extracting these causal relations diminishes. To address this challenge, we compiled a dataset using verdicts from maritime accident cases in this study, analyzed their causal relations, and applied labeling considering the association information of various causes and effects. In addition, to validate the efficacy of our proposed methodology, we fine-tuned the KoELECTRA Korean language model. The results of our validation process demonstrated the ability of our approach to successfully extract multiple causal relationships from maritime accident cases.

Study on Incidence and Improvement of Food Allergies for Prevention of Damage in Adolescents and Adults (청소년과 성인의 식품 알레르기 예방을 위한 식품 알레르기 발생 실태 및 개선안 연구)

  • Kim, Mi Jung;Sim, Ki Hyeon
    • Journal of the East Asian Society of Dietary Life
    • /
    • v.24 no.4
    • /
    • pp.514-528
    • /
    • 2014
  • This study examined the actual state and future improvement of food allergies in adolescents and adults in order to prevent damage. In this survey, proportions of females, people in their 40s, college graduates, and office workers and housewives with allergies were higher than other groups. Exactly 41.1% of participants responded that they had experienced food allergies while 58.9% responded that they had not. According to their responses, the most common food allergy symptom involved the skin while whole-body allergic reactions were rare. Most respondents answered that frequency of their food allergies was two or three times. There was a variety of allergenic foods, including fast food, eggs, mackerel and milk, and instant food was ranked as the most allergenic food. Therefore, in order to protect consumers from damage caused by food allergens, the food allergen labeling system must be improved. A better food allergen labeling system should be implemented to avoid potential risks of allergic reactions and ensure national food safety.

Model Proposal for Detection Method of Cyber Attack using SIEM (SIEM을 이용한 침해사고 탐지방법 모델 제안)

  • Um, Jin-Guk;Kwon, Hun-Yeong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.43-54
    • /
    • 2016
  • The occurrence of cyber crime is on the rise every year, and the security control center, which should play a crucial role in monitoring and early response against the cyber attacks targeting various information systems, its importance has increased accordingly. Every endeavors to prevent cyber attacks is being attempted by information security personnel of government and financial sector's security control center, threat response Center, cyber terror response center, Cert Team, SOC(Security Operator Center) and else. The ordinary method to monitor cyber attacks consists of utilizing the security system or the network security device. It is anticipated, however, to be insufficient since this is simply one dimensional way of monitoring them based on signatures. There has been considerable improvement of the security control system and researchers also have conducted a number of studies on monitoring methods to prevent threats to security. In accordance with the environment changes from ESM to SIEM, the security control system is able to be provided with more input data as well as generate the correlation analysis which integrates the processed data, by extraction and parsing, into the potential scenarios of attack or threat. This article shows case studies how to detect the threat to security in effective ways, from the initial phase of the security control system to current SIEM circumstances. Furthermore, scenarios based security control systems rather than simple monitoring is introduced, and finally methods of producing the correlation analysis and its verification methods are presented. It is expected that this result contributes to the development of cyber attack monitoring system in other security centers.

Analysis of Source Terms at Domestic Nuclear Power Plant with CZT Semiconductor Detector (CZT 반도체 검출기를 이용한 국내 원전 내 선원항 분석)

  • Kang, Seo Kon;Kang, Hwayoon;Lee, Byoung-Il;Kim, Jeong-In
    • Journal of Radiation Protection and Research
    • /
    • v.39 no.1
    • /
    • pp.14-20
    • /
    • 2014
  • A lot of radiation exposure for radiation workers who are engaged in Nuclear Power Plants, especially PWRs, have been caused during the outage by CRUD, such as $^{58}Co$, $^{60}Co$, in Reactor Coolant System. And therefore we need to know source terms to achieve optimization of protection for the radiation workers from radiation exposure at Nuclear Power Plants efficiently. This study analyzed source terms at domestic NPPs (PWRs) nearby Steam Generator with CZT semiconductor detector using by IN-VIVO method during the outage for the first time in the country. We checked difference for the detected source terms between old and new NPP. It was performed especially to see a change of source terms by water chemistry process as well. There was not any difference by water chemistry process both NPPs. The main source terms are $^{58}Co$ and $^{60}Co$ at all NPPs. $^{59}Fe$ only appears in the new NPP. $^{137}Cs$ and $^{95}Zr$ are shown in the old NPP. The fraction of $^{58}Co/^{60}Co$ in the new NPP is higher than the old NPP for increasing the specific activity of $^{60}Co$.

A Study on Improving Measures against Terrorism in Metropolitan Subways (지하철내 테러대응 개선방안의 연구)

  • Park, Woong-Shin
    • Korean Security Journal
    • /
    • no.50
    • /
    • pp.91-115
    • /
    • 2017
  • Recently the characteristics of those who committed serious terrorist crimes are not directly related to the direct command system of a specific terrorist organization (ex. IS) but are influenced by the political propaganda of terrorist organizations online, Terrorist crime under the loose form of the terrorist organization. Therefore, this study suggests ways to improve countermeasures against terrorism in metropolitan subways. Although it is important for the prevention of terrorism in the subway, it is important for the police officers of the subway police and the special police officers of the railway to have a physical limit to take charge of them, and after confirming that improvement measures are necessary, And pointed out the possibility of establishing independent security departments where judicial and administrative control is not feasible to grant police rights. In addition, I pointed out how to improve the safety of subways in the metropolitan area through the recruitment of core job candidates and the identity survey during the subway operation. Furthermore, it was confirmed that a special council on terrorism, which can take into consideration the characteristics of subway terrorism, such as airports and ports, is required to be established in charge of terrorism prevention under the current Anti-Terrorism Act. Finally, it is once again emphasized that the strengthening of the powers of the counterparts to terrorism must inevitably limit the basic rights of the people, so the principle of proportionality must be observed in their activities.

  • PDF

A Study on the Use of Police Force in the Public Assembly: Focused on the Vehicle-wall-blocking and water cannon (집회현장에서의 경찰의 물리력 사용현황과 개선방안: 차벽과 물포 사용을 중심으로)

  • Hwang, Mun-Gyu
    • Korean Security Journal
    • /
    • no.50
    • /
    • pp.307-337
    • /
    • 2017
  • The freedom of assembly is the fundamental freedoms guaranteed by the Constitution. However, as far as our reality is concerned, the freedom of assembly is guaranteed only when it is under the control of the police, and otherwise it is perceived as an object to be suppressed. Police say even that they will not tolerate even a small illegal law while referring to the "broken window theory". Therefore, regardless of the peaceful nature of the rally, it is too obsessed with 'compliance'. This attitude is causing the citizens who participated in the assembly to be put to the object to be suppressed. This paper analyzes the requirements and current status of police force, focusing on the vehicle-wall-blocking and water cannon as a means of using the police force, which is a recent problem, and suggests ways to improve it. First of all, the installation of the wall cuts off the essential communication function of the assembly by separating the meeting place from the object of protest. Thus, despite the warning for prevention in the face of illegal acts, other than installing a barrier, it should be allowed only in the 'urgent case where there is a risk of causing damage to the life, body or property of the person'. Without this urgency, the vehicle-wall-blocking should not be allowed to be proactive as well as preventive. Secondly, the water cannon is a police force that is likely to harm people's life and body. Therefore, aiming shots, which could pose a significant risk to the human body, should in principle be prohibited. However, considering its risk, it should be supplementary used only when there is no other alternative, only when the direct risk to the legal interest of the other person or the order of public well-being is 'obvious'. In addition, as for the use standard of such a thing, it is necessary to be specified by law.

  • PDF

The Study on the Process of Juvenile Delinquency and It's Prevention Program (청소년 비행화 과정 개입 프로그램 개발에 관한 연구 -비행화 예방 집단활동 프로그램의 효과성 분석 -)

  • Lee, Ik-Seop;Kim, Geun-Sik
    • Korean Journal of Social Welfare
    • /
    • v.37
    • /
    • pp.381-405
    • /
    • 1999
  • The primary purpose of this study is to design and perform juvenile group program and. to evaluate the effectiveness of that program The group was consisted of 10 fourth-grade elementary school boys who have had such factors that might force themselves to be delinquent, for example, broken family, having delinquent siblings or friends, family violence, and etc. The group had been held once a week and continued for 5 months. The effectiveness of that program is evaluated quantitatively and qualitatively through goal-attainment model. The ultimate goal of this program is reduction of delinquency stimulating factors which are operationalized with overall self-esteem - family related self-esteem, friend related self-esteem, and school related self-esteem. Quantitative evaluation is performed by pre- and post-test with Hare Self-Esteem Scale. Case records, family records, group activities records, and reports from schools are analyzed for the qualitative evaluation. According to paired samples t-test scores, average overall self-esteem scores of experimental group members were escalated from 67.57 to 74.86, and this difference between pre-test and post-test was statistically significant. Difference of experimental group was bigger and more striking than that of control group. These results suggest that designed and performed group program in this study would be effective in preventing juvenile from being delinquent.

  • PDF

A Study on Obtaining Feedback Function of Disaster Information Management using Information & Communication Technology (ICT기술을 이용한 방재정보 관리의 환류기능 확보에 관한 연구)

  • Ko, Jaesun
    • Journal of the Society of Disaster Information
    • /
    • v.11 no.1
    • /
    • pp.73-88
    • /
    • 2015
  • Due to the cases of recent global warming and unusual weather etc., large-scale natural disasters such as typhoons, floods, snow damage occur frequently across the continents such as Southeast Asia and North America, South America etc. and risks of earthquakes and tsunami are also increasing gradually in Korea which has been regarded as a safe zone and disaster types are also being diversified such as typhoons, floods, heat waves, heavy snow and damage scale is also enlarged. In addition, due to geographical characteristics or lack of infrastructure, disasters tended to occur intensively around a specific region or city in the past but disasters occur throughout the country in recent years so preparation for disaster prevention has emerged as an urgent challenge issue. Therefore, considering that the plan of obtaining the effective feedback function of disaster Information is very important in the proactive and software aspects for disaster reduction, this paper analyzed this three aspects of contents, procedural and contextual aspects and proposed the plan. First, in the content aspect, building disaster prevention information communication Infrastructure, building urban and regional disaster prevention system, obtaining concurrency and sharing of information and second, in the procedural aspect, active utilization of ICT(Information and Communication Technology) of the prevention stage, disaster prevention information collection and analysis reinforcement of the preparation stage, improvement of decision-making structure and field command system of the response stage, recovery system related information promotion of the recovery stage were proposed as alternatives and finally, in the contextual aspect, if disaster prevention information is effectively managed through maintenance of disaster prevention information related systems, obtaining domainality by disaster prevention work, improvement of the ability to judge the situation, obtaining comprehensive and feedback function etc, it is considered to significantly contribute to reducing natural disasters.

The Necessity of A Cognitive-scientific Analysis on A Security threat Act - The Foundation for A Establishment of The Scientific Preventive Social-security Countermeasure - (경호위해행위에 대한 인지과학적 분석의 필요성 고찰 - 과학적 예방적 사회안전 대책 수립을 위한 기초 -)

  • Kim, Doo-Hyun;Son, Ji-Young
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.33-51
    • /
    • 2008
  • According to dictionary, the meaning of protection is "guard and protect" that means protecting the Protectee's safety in case of sudden attack or various accident and Security means all protecting activity including Protectee and place where he is in or will be as comprehensively meaning of safe. As you see in the definition, Protection and security is the act to protect or will to protect from a security-threat act. A security-threat act can be discussed in the range of the concept of a criminal act in Criminal Law. A security-threat act is based on criminal act in Criminal Law, we are going to review such a security-threat act in a point of view in a sphere of learning in today's remarkable a brain-neuro science and cognitive science based on cognitive psychology, and to use an analysis on such a security-threat act to make a foundation for a establishment of the scientific preventive social security countermeasure. To do so, First of all we are going to review a security-threat act based on criminal act in Criminal Law in a point of protection police logic view. Next, we are going to introduce how cognitive science understand about act of man before we analyse a threat act as one of an act of man in cognitive science point of view. Finally, we are going to discuss the need of cognitive scientific analyse in order to establish the Scientific Preventive Social-security Countermeasure at the same time we are going to analyse a threat act in a cognitive scientific view.

  • PDF