• Title/Summary/Keyword: 안전사고 보호

Search Result 536, Processing Time 0.032 seconds

Quasi-public operating Bus nature of the public interest as a moral hazard - Game theoretical approach as the Yeosu area cases (도덕적 해이로서 공익적 성격의 버스운송 체계 - 여수 시내버스 사례에 대한 게임이론적 접근)

  • Lee, Moo-Seong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.11
    • /
    • pp.1285-1296
    • /
    • 2015
  • As examples of the region's transition to quasi-public goods a previous stage of full public goods also extremely limited in research. However, in this way can it compensate for this paper as a system to minimize moral hazard by electronic information and communication systems focused on safety in accordance with the methods and gave public goods introduction of grafting of electronic information systems played the Yeosu area to specific cases I went to the deployment.

ENC service and investigated related law of database distribution (전자해도 (Database)의 유통체계 수립을 위한 국내법적ㆍ비교법적 고찰)

  • 서수경;서상현
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1999.11a
    • /
    • pp.82-86
    • /
    • 1999
  • 우리 나라는 3차년도에 걸쳐 전자해도 및 수치해도를 구축하였고, 1999년도까지 우리 나라 전역에 대하여 전자해도 및 수치해도의 구축이 완료될 예정이다. 따라서, 지금까지는 데이터를 구축하는 단계였다면 이제는 데이터를 어떻게 효율적으로 관리하고, 원활하게 공급할 것인가를 고민해야한다. 현재까지 사용되어 오던 기존의 종이해도와는 전혀 다른 형태의 새로운 생산품인 전자해도는 근본적으로는 선박의 안전항해와 해난사고 예방에 초점을 두어 개발되었으나 해양정보의 공간정보화라는 측면에서 해양환경 보호 그리고 효과적인 해양행정 관리 둥 해양관련 분야에서 다양한 활용이 예상된다. 따라서 기존의 종이해도와 전혀 다른 데이터베이스 형태의 전자해도 데이터를 공급하는데 있어 기술적으로나 경제적으로 거대한 시장에 적합하고 데이터를 공급하고 사용하는 동안 그리고 전자해도 데이터를 이용한 또 다른 상품을 제작할 때 상업적 측면에서나 안전성 측면에서 데이터의 정확성과 안전성을 확보할 수 있는 공급 체계를 채택하여 이 데이터의 수요자들이 보다 좋은 품질의 공간정보와 다양한 공간정보 상품을 서비스 받을 수 있도록 하여야 한다. 본 연구에서는 디지털화된 저작물인 전자해도의 유통체계를 확립하는데 있어 국내 저작권법과 컴퓨터프로그램보호법을 기준으로 데이터의 유통에 대한 국제 상거래 관념을 비교 분석하고 외국의 전자해도 유통 사례를 비교 분석함으로써 우리 나라에 적합한 전자해도 공급체계를 제안하고자 한다.

  • PDF

Study on Smart Infant Vehicle with Arduino and Pressure Sensor (아두이노와 압력센서를 이용한 스마트 유아차에 관한 연구)

  • Sang-Wook, Lee;Min-Young, Kim;Tae-Woo, Kim;Dae-Gyu, Lee;Jae-Wook, Kim
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.6
    • /
    • pp.1293-1300
    • /
    • 2022
  • In this paper, research was conducted to prevent various safety accidents that may occur from infant vehicles carrying children and to use infant vehicles easier. In order to prevent the infant vehicle from driving without protection, a brake function is mounted on the infant vehicle wheels using a pressure sensor and a sub motor, and a pressure sensor and an LCD are used to determine whether a seat belt is fastened to prevent the infant from falling from the infant vehicle. In addition, it is designed to turn on the warning light when exceeding a certain temperature and humidity using LCD and LED so that infants can be in a pleasant environment when using a baby vehicle.

Experimental Study on Gas Explosion According to the Effect of Confinement and Congestion Levels (밀폐도 및 밀집도의 영향에 따른 가스폭발 실험 연구)

  • Boohyoung Bang
    • Journal of the Korean Institute of Gas
    • /
    • v.27 no.4
    • /
    • pp.56-61
    • /
    • 2023
  • The plant is an important facility as a infrastructure, and ensuring safety against possible accidents such as gas leaks and explosions must be considered in the design. However, there is little study on explosion pressure in plants for reasons such as economic feasibility, and overpressure data on this field is insufficient. In this study, an experimental design plan considering the explosion scenario that may occur in the plant was presented, and the explosion pressure was confirmed through an explosion experiment. Hydrogen-methane mixed gas was used as a combustible material, and the effect of confinement and congestion on overpressure was studied. The effect of overlapping pressure waves during deflagration and the turbulence effect by congested pipes are discussed. The results of this study can be used as input data in various safety designs.

Toxic Concentration(T-LOC) Endpoint Distance Study for Fire Brigade Protection in Response to Chemical Accidents (화학사고 초기대응 소방대 보호를 위한 독성농도(T-LOC) 끝점거리 연구)

  • Jong Chan Yun;Chul Hee Cho;Jeong Hun Won
    • Journal of the Korean Society of Safety
    • /
    • v.38 no.6
    • /
    • pp.60-71
    • /
    • 2023
  • The purpose of this study is to propose a quantitative toxicity endpoint distance suitable for the initial response of firefighters by comparing and analyzing the commonly applied toxic level of concern (T-LOC), specifically emergency response planning guidelines (ERPG), acute exposure guideline levels (AEGL), and immediately dangerous to life or health (IDLH). This is to protect the fire brigade, which responds to toxic chemical accidents first during the golden time. Using areal locations of hazardous atmospheres, a damage prediction program, the amount of leakage for both acidic and basic substances, along with the endpoint distance, were analyzed for alternative accident and worst-case accident scenarios. The results showed that the toxicity endpoint distance, serving as a compromise between Level-3 and Level-2 of T-LOC, was longer than ERPG-3 and shorter than ERPG-2 with IDLH, while its values were analyzed in the order of ERPG-2, AEGL-2, IDLH, AEGL-3, and ERPG-3. It is suggested that the application of IDLH in an emergency (red card) and ERPG-2 endpoint distance in a non-emergency (non-red card) can be utilized for the initial response of the fire brigade.

A Review on the Improvement of the Meaning and Composition Requirements of Interference with Fire Protection Activities - Focusing on Interference with 119 EMS Activities - (소방활동방해죄의 의미와 구성요건 개선에 관한 검토 -119구급활동 방해를 중심으로-)

  • Young Pyo Hong
    • The Korean Society of Law and Medicine
    • /
    • v.24 no.3
    • /
    • pp.105-124
    • /
    • 2023
  • Modern society is facing an unstable environment due to unexpected accidents and hazardous situations. For example, incidents such as the collapse of the Bundang Bridge and the crushing accident in Itaewon could serve as examples. In addition to these, critical emergencies like sudden cardiac arrests and strokes frequently occur, requiring swift actions and smooth transfers to specialized medical institutions for effective responses. In response to these risks, the country has been establishing various systems to protect the lives and safety of its citizens. Among these, the 119 First Aid Activities plays a crucial role within the emergency medical system. Its goal is to promptly respond to critical emergency situations involving severe trauma patients or patients with serious illnesses, minimizing damage and safeguarding lives by swiftly transferring them to emergency medical institutions for specialized treatment. The core activity related to this is emergency rescue operations. In particular, the 119 First Aid system serves as a crucial institution responsible for the hospital transportation of emergency patients. However, rescue personnel still encounter cases of interference with their activities during their duties. Despite efforts from the police, these interference cases persist, and they share similarities with the crime of obstructing official duties. Interference with emergency activities exhibits a comparable nature to instances such as physical assaults and equipment damage against emergency medical practitioners working within the emergency medical system. Therefore, a comprehensive understanding and improvement efforts regarding the issues of interference that arise during the process of emergency medical activities, including the 119 First Aid system, are necessary. The solution to these problems is to establish and improve the conditions for obstruction of first aid activities, focusing on the "Framework Act on Firefighting" and the "Act on 119 Rescue and Emergency."

Development of Personal Information Protection Framework to be Followed by IoT Service Providers (IoT서비스제공자가 준수해야 할 개인정보보호 프레임워크의 개발 방안)

  • Shin, Young-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.7
    • /
    • pp.20-32
    • /
    • 2020
  • This study is to develop and provide a personal information protection framework that enables IoT service providers to safely and systematically operate personal information of IoT service subjects in the overall process of providing IoT devices and services. To this end, a framework for personal information framework was derived through literature survey, and FGI with experts, it was divided into three stages, each of three stages: IoT service provision process and IoT personal information processing process. The study conducted an e-mail survey of related experts using AHP techniques to determine the importance of the components of the selected personal information protection framework. As a result, in the IoT service provision process, the IoT product and service design and development stage (0.5413) is the most important, and in the IoT personal information processing process, personal information protection in the collection and retention of personal information (0.5098) is the most important. Therefore, based on this research, as the IoT service is spreading, it is expected that a safe personal information protection framework will be realized by preventing security threats and personal information infringement accidents.

Research on the Development of SLA Indicators for Personal Information Protection of Public IT Maintenance Business (공공정보화분야 유지관리사업의 개인정보보호를 위한 SLA 지표 개발에 대한 연구)

  • Lee, Kyung-Hwan;Ryu, Gab-Sang
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.6
    • /
    • pp.37-42
    • /
    • 2020
  • In the field of public informatization maintenance business, the attacks of external illegal users such as unauthorized leakage, destruction, and alteration due to intentional or inadequate management of personal information are increasing. In order to prevent such security incidents in advance, it is necessary to develop and quantitatively manage SLA indicators. This study presents the privacy SLA indicators and suggests specific methods such as information collection method and timing of the privacy SLA indicators. In order to confirm the validity and reliability of the proposed SLA indicators, an online survey was conducted with a group of experts. As a result, it was evaluated that compliance rate of personal information destruction and compliance rate of personal information protection system would be effective when applied to new and revised SLA indicators in terms of importance and validity. In the future, using SLA indicators for personal information protection as a standard for public information maintenance will contribute to improving SW quality and securing safety.

Key Management and Recovery Scheme over SCADA System Using ID-based Cryptosystem (ID 기반 암호 기법을 이용한 SCADA 시스템에서 비밀 키 관리 및 복구 방안)

  • Oh, Doo-Hwan;Choi, Doo-Sik;Na, Eun-Sung;Kim, Sang-Chul;Ha, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.427-438
    • /
    • 2012
  • The SCADA(Supervisory Control and Data Acquisition) systems are used to control some critical national infrastructures such as electricity, gas, and water distribution systems. Recently, there are many researches on key management scheme for secure communication due to change to the open network environment. We propose a new key management method which is established on ID-based cryptosystem using pairing on MTU(Master Terminal Unit), Sub-MTU, and RTU(Remote Terminal Unit). Furthermore, we present a redistribution protocol of private key of each device and a system recovery protocol as a countermeasure of exposure of KMS(Key Management System) master key which is occurred by some unexpected accidents or malicious attacks.

Location-Based Authentication Mechanism for Server Access Control (서버 접근 통제를 위한 위치기반 인증 기법)

  • Choi, Jung Min;Cho, Kwantae;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1271-1282
    • /
    • 2012
  • Recently, security incidents occur continuously, resulting in the leakages of a large amount of the company's confidential and private information. For these reasons, the security technologies such as the authentication and the access control in order to prevent the information leakage are attracting attention. In particular, location-based authentication that utilizes the user's current location information which is used an authentication factor. And it provides more powerful authentication by controlling the users who attempt to access and blocks internal information leakage path. However, location information must be handled safely since it is the personal information. The location based authentication scheme proposed in this paper enhances the stability of the process location information compared with existing relevant location-based authentication protocol. Also it strengthens the end-user authentication by using one-time password. In addition, the proposed scheme provides authentication to prevent information leakage and employs the concept of the user's physical access control. Resultingly, the proposed scheme can provide higher security than the previous studies, while guarantee to low communication cost.