• Title/Summary/Keyword: 위험관리 프로세스

Search Result 195, Processing Time 0.029 seconds

Design of Intrusion Detection Immune System Model (침입탐지면역시스템모델 설계)

  • Kim, Kang;Lee, Keon-Ik;Jeon, Young-Cheol
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2009.01a
    • /
    • pp.369-372
    • /
    • 2009
  • 컴퓨터의 확대 및 컴퓨터 이용의 급격한 증가에 따른 부작용으로 컴퓨터 보안문제가 중요하게 대두되고 있다. 이에 따라 침입자들로부터 침입을 줄이기 위한 침입탐지시스템에 관한 연구가 활발하다. 더욱이 보안을 요구하는 시스템들의 환경이 다양하여 그에 적합한 보안정책을 수립하여 관리하기가 어려워지고 있다. 따라서 침입자들로부터 위험을 줄이기 위해 침입탐지 및 대응 위한 보안정책기반 모텔에 관한 연구가 활발하다. 본 논문은 오늘날의 정보통용용에서 침입 탐지요구사항의 복잡한 문제를 해결하기 위한 침입탐지 메카니즘의 설계 방안을 제시한다. 탐지대상을 특권프로세스가 수행할 때 발생하는 시스템 호출 순서 중 비정상적인 시스템 호출을 탐지하여 이를 분산된 각각의 침입탐지 시스템들아 서로 동적으로 공유하여 침입에 대한 대응력을 향상시키는 침입탐지시스템을 설계하고 프로토타입으로 구현하고자 한다.

  • PDF

Security Control of International Logistic Service based on RFID (RFID 기반 국제 물류 서비스의 보안 정책)

  • Jeong Hee Hwang;Moon-Sun Shin;Ik-Soo Hwang;Hun-Chul Kim
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.11a
    • /
    • pp.1444-1447
    • /
    • 2008
  • RFID 기술은 유비쿼터스 환경을 구현하기 위한 핵심기술 중 하나로 기술 개발과 시범사업 등을 통해 충분한 성장 가능성과 기술력 향상이 기대된다. 특히 물류 환경에서 RFID 기술 기반의 물류 환경 관리는 비용 및 납기의 개선 등에 큰 효율성을 가져올 수 있다. 이 논문에서는 RFID 기반의 국제 물류 프로세스에 대한 보안 위험 요소를 분석하고 이에 대한 보안 요구사항 및 보안 정책 방안을 기술한다.

Analysis of the Schedule Risk using PROMETHEE in Building Construction Management (건설관리에서의 PROMETHEE기반 공정 리스크 분석)

  • Lee, Jang-Young;Yoon, You-Sang;Jang, Myung-Houn;Suh, Sang-Wook
    • Korean Journal of Construction Engineering and Management
    • /
    • v.11 no.2
    • /
    • pp.25-34
    • /
    • 2010
  • The building construction projects include a variety of risk factors due to uncertainties. To succeed in the projects, it is important how risks are managed. Risk management is composed of identification, analysis and response. Especially, the risk analysis is important to objectively calculate significance of risk factors. This paper evaluates a method to find priorities of risks using the AHP(Analytic Hierarchy Process). The method has some defects; (1) the consistency becomes weak as the number of pair-wise compared risks is large, and (2) the input and output procedures are complex when risks are added to or removed from a risk database. Thus the paper adopts the PROMETHEE(Preference Ranking Organization METHod Enrichment Evaluations) analysis process which is able to overcome the limitation of the AHP restricted to 9 risk factors. The PROMETHEE makes the procedure of risk analysis simple, when the risk factors pull out and put in the risk database. The purpose of this study is to provide process of risk analysis to use the PROMETHEE.

Safety Techniques-Based Improvement of Task Execution Process Followed by Execution Maturity-Based Risk Management in Precedent Research Stage of Defense R&D Programs (국방 선행연구단계에서 안전분석 기법에 기반한 수행프로세스의 개선 및 수행성숙도 평가를 활용한 위험 관리)

  • Choi, Se Keun;Kim, Young-Min;Lee, Jae-Chon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.10
    • /
    • pp.89-100
    • /
    • 2018
  • The precedent study stage of defense programs is a project stage that is conducted to support the determination of an efficient acquisition method of the weapon system determined by the requirement. In this study, the FTA/FMEA technique was used in the safety analysis process to identify elements to be conducted in the precedent study stage and a methodology for deriving the key review elements through conceptualization and tailoring was suggested. To supplement the key elements derived from the existing research, it is necessary to analyze various events that may arise from key elements. To accomplish this, the HAZOP technique for safety analysis in other industrial fields was used to supplement the results of kdy element derivation. We analyzed and modeled the execution procedure by establishing input/output information and association with the key elements of the precedent study stage derived by linking HAZOP/FTA/FMEA techniques. In addition, performance maturity was evaluated for performance of precedent study, and a risk-based response manual was generated based on inter-working information with key elements with low maturity. Based on the results of this study, it is possible to meet the performance, cost, and schedule of the project implementation through application of the key elements and procedures and the risk management response manual in the precedent study stage of the defense program.

4D BIM based Workspace Planning Process in Building Construction Project (4D BIM 기반의 건설프로젝트 작업공간 계획 프로세스)

  • Choi, Byungjoo;Lee, Hyun-Soo;Park, Moonseo;Kim, Hyunsoo;Hwang, Sungjoo
    • Korean Journal of Construction Engineering and Management
    • /
    • v.14 no.5
    • /
    • pp.175-187
    • /
    • 2013
  • Each participant in building construction project requires their own workspace to execute their activities. In this environment, inappropriate workspace planning in construction site causes workspace conflicts which result in a loss of productivity, safety hazard and poor-quality issues. Therefore, workspace should be regarded as one of the most important resources and constraints have to be managed at construction site. However, current construction planning techniques such as Gantt chart, network diagram and critical path method have proven to be insufficient to workspace planning. This paper contains formalized process for workspace planning in 4D BIM environment to prevent workspace related problems in construction project. The proposed process in this paper represents workspace occupation status for each activity and suitable solutions for identified workspace conflicts by integrating workspace attributes and activity execution plan. Based on the result of this study, project manager will be able to prevent probable workspace conflicts and negative effect on project performance by devising appropriate workspace plan during preconstruction phase.

Evaluation of a Fall Risk Assessment Tool to Establish Continuous Quality Improvement Process for Inpatients' Falls (낙상예방 활동의 지속적 질 관리 프로세스 확립을 위한 위험 사정도구 평가)

  • Park, Ihn-Sook;Cho, In-Sook;Kim, Eun-Man;Kim, Min-Kyung
    • Journal of Korean Academy of Nursing Administration
    • /
    • v.17 no.4
    • /
    • pp.484-492
    • /
    • 2011
  • Purpose: The aims of study were; (1) to evaluate the validity and sensitivity of a fall-risk assessment tool, and (2) to establish continuous quality improvement (CQI) methods to monitor the effective use of the risk assessment tool. Methods: A retrospective case-control cohort design was used. Analysis was conducted for 90 admissions as cases and 3,716 as controls during the 2006 and 2007 calendar years was conducted. Fallers were identified from the hospital’s Accident Reporting System, and non-fallers were selected by randomized selection. Accuracy estimates, sensitivity analysis and logistic regression were used. Results: At the lower cutoff score of one, sensitivity, specificity, and positive and negative predictive values were 82.2%, 19.3%, 0.03%, and 96.9%, respectively. The area under the ROC was 0.60 implying poor prediction. Logistic regression analysis showed that five out of nine constitutional items; age, history of falls, gait problems, and confusion were significantly associated with falls. Based on these results, we suggested a tailored falls CQI process with specific indexes. Conclusion: The fall-risk assessment tool was found to need considerable reviews for its validity and usage problems in practice. It is also necessary to develop protocols for use and identify strategies that reflect changes in patient conditions during hospital stay.

Brand Positioning of IT Governance System -Focused on Case study of Spin-off Venture- (IT 거버넌스시스템의 브랜드 포지셔닝 전략 -스핀오프벤처기업의 사례를 중심으로-)

  • Chun, Myung-Hwan
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.12 no.5
    • /
    • pp.110-119
    • /
    • 2007
  • In an extended enterprise, there is a shift to shared services, cosourcing and outsourcing, and extending out to partners, suppliers, and customers to accomplish business objectives more effectively. Along with this critical need, executives should be aware of the need to focus on optimizing the value of their information technology and reducing the related risks. So IT governance is critical, and many companies including spin-off venture are providing IT governance solution, but very little is known about brand management and marketing strategy of IT governance solution provider. The purpose of this study is to investigate brand positioning of IT governance solution company focusing on spin-off venture. The results of this study are summarized as follows. First, brand management is needed in the spin-off venture. second, IT governance solution companies including spin-off venture must provide something more than functional value. That is, they actively seek to emotional or symbolic value for their customers.

  • PDF

Schedule Risk Management of Reinforced Concrete Construction at the Preconstruction Phase (착공전 단계에서의 철근콘크리트 공사 공정리스크 관리 방안)

  • Ryu, Han-Guk;Kim, Sun-Kuk;Lee, Hyun-Soo
    • Korean Journal of Construction Engineering and Management
    • /
    • v.6 no.5 s.27
    • /
    • pp.119-127
    • /
    • 2005
  • According to the recent systemic changes such as construction market reduction, five days per week system, introduction of construction duration reduction bidding system and post-construction sale system, the bidding competition have been enhanced. However, there are many construction schedule risks which could delay construction completion. Without the proper identification of construction schedule risks and the structured construction schedule risk management, the competitive advantages of construction project could not be made. Previous researches to solve the problem have been focused on the construction schedule categorization, construction schedule management, and the system development to manage the construction schedule risk. Therefore, this study selected the reinforeced concrete construction as the studied work due to the major impact characteristics on the total construction duration and the quite accident rate, and then proposed the real construction schedule risks of reinforced concrete construction and the construction risk management method based on the previous studies, many times of expert interviews and brainstorming.

A Study on the Design of Task Planning System for Intelligent Excavating System (IES) (지능형 굴삭을 위한 토공작업계획 시스템의 구조 설계)

  • Lee, Won-Sik;Song, Soon-Ho;Lee, Seung-Soo;Seo, Jong-Won;Kim, Sung-Keun
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2007.11a
    • /
    • pp.921-924
    • /
    • 2007
  • 토목, 건축과 관련된 노동현장은 여느 3D 업종들과 마찬가지로 숙련된 기능공의 부재 및 산업재해 발생으로 인해 어려움을 겪고 있으며 이를 극복하기 위한 노력을 계속하고 있다. 대표적인 토목공사인 토공 작업 역시 위험 혹은 유해한 작업환경으로 인해 토공장비의 안전사고 및 생산성과 품질저하가 발생하며 이를 방지하기 위한 장비의 지능화가 절실하게 요구되고 있다. 이를 위해 최근 지능형 굴삭 시스템 개발을 위한 연구가 진행되고 있으며, 토공작업은 일반적으로 광범위한 작업영역을 가지기 때문에 지능형 굴삭시스템의 개발을 위해서는 효율적인 작업을 수행할 수 있도록 하는 작업계획의 수립이 매우 중요하다. 본 연구에서는 작업계획의 대상을 굴삭로봇과 토사로 구분하였으며, 글로벌 영역에서 단위작업 영역, 로컬 영역으로의 분할을 통해 전체 작업 진행에 대해 효율적으로 작업계획을 수립할 수 있도록 구성하여 계획단계에서부터 토공작업 자동화 및 효율와에 기여하고자한다. 토공작업계획 시스템은 토공 작업자 및 감독자의 작업 특성 및 노하우를 컴퓨터, 즉 두뇌에 부여함으로써 숙련된 장비조종자의 작업 방법 및 특성을 반영하여 토공 작업 프로세스 모델링을 구축하고 실제 작업환경상의 센서에 의해 측정된 데이터를 실제 작업환경과 동일하게 모델링된 컴퓨터내의 가상환경을 바탕으로 영역분할, 최적 플랫폼 위치선정 및 작업 순차생성을 통해 최적의 토공작업계획을 수립할 수 있도록 한다.

  • PDF

A Study on the Integrated Account Management Model (위험기반 통합계정관리모델에 관한 연구)

  • Kang, Yong-Suk;Choi, Kook-Hyun;Shin, Yong-Tae;Kim, Jong-Bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.947-950
    • /
    • 2014
  • The recent APT attacks including cyber terror are caused by a high level of malicious codes and hacking techniques. This implies that essentially, advanced security management is required, from the perspective of 5A. The changes of IT environment are represented by Mobile, Cloud and BYOD. In this situation, the security model needs to be changed, too into the Airport model which emphasizes prevention, and connection, security and integration of functions from the existing Castle model. This study suggested an application method of the risk-based Airport model to the cyber security environment.

  • PDF