• Title/Summary/Keyword: 위험 식별

Search Result 377, Processing Time 0.026 seconds

A Study on Risk Situation Recognition Using OpenCV (OpenCV를 활용한 위험 상황 인식에 관한 연구)

  • Kim, Dong-Hyun;Kim, Seong-Yeol
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.2
    • /
    • pp.211-218
    • /
    • 2021
  • Construction sites have various risk factors. There are various approaches to reduce safety accidents, but they have limitations to some extent. By utilizing the wireless communication technology of IT and the rapidly developing image processing technology, it will be possible to reduce accidents at the construction site if risk factors are identified and actively responded to. Therefore, in this study, a system that can detect risk factors of construction sites in advance is constructed, and a system is proposed to discover and respond to risk factors of construction sites using OpenCV for the purpose of real-time computer vision.

Design and Implementation of Quantitative Risk Analysis System for ISP Network (ISP(Internet Service Provider) 네트워크의 정량적인 위험분석을 위한 시스템 설계 및 구현)

  • 문호건;최진기;김형순
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.2
    • /
    • pp.101-111
    • /
    • 2004
  • Risk analysis process, which identifies vulnerabilities and threat causes of network assets and evaluates expected loss when some of network assets are damaged, is essential for diagnosing ISP network security levels and response planning. However, most existing risk analysis systems provide only methodological analysis procedures, and they can not reflect continually changing vulnerabilities and threats information of individual network system on real time. For this reason, this paper suggests new system design methodology which shows a scheme to collects and analyzes data from network intrusion detection system and vulnerability analysis system and estimate quantitative risk levels. Additionally, experimental performance of proposed system is shown.

Analysis of Water Resources and Water Conflicts in Korea using Aqueduct 3.0 and Water Conflict Chronology (Aqueduct 3.0과 Water Conflict Chronology를 활용한 한국의 수자원 및 물 분쟁 사례 분석)

  • Joon-Hak Lee
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2023.05a
    • /
    • pp.395-395
    • /
    • 2023
  • 전 세계 곳곳에서 매년 발생하고 있는 홍수, 가뭄, 수질 문제는 인류가 해결해야 할 공통적인 문제이다. 홍수, 가뭄, 수질 문제뿐만 아니라 수자원의 지역적인 불균형과 인근 지역의 물 분배 문제, 공유하천 문제 등으로 인한 물 사용자 간의 물 갈등, 물 분쟁도 지속되고 있다. 최근 정보통신기술이 발달함에 따라 수자원 관련 각종 위험지표, 물 갈등, 물 분쟁 사례를 자료화하여 활용할 수 있는 온라인 플랫폼이 개발되고 있다. Aqueduct 3.0은 전 세계 물 위험을 식별하고 평가할 수 있는 물 위험평가 프로그램(water risk assessment tool)으로 세계 수자원 협회에서 2019년 기존 프로그램을 업데이트하여, 온라인 플랫폼을 통해 전 세계 각국의 지역별 수자원 분포에 따른 각종 위험지도와 데이터를 무료로 제공하고 있다. 또한 세계 자연기금(World Wide Fund For Nature)도 온라인 플랫폼으로 전 세계의 물 위험 필터도구(water risk filter tool)를 제공하고 있다. 또한 물 갈등 연대기(Water Conflict Chronology)는 태평양 협회에서 전 세계 물갈등 사례를 수집하여 연대별로 정리한 것으로, 업데이트되어 2022년 사례까지 제공하고 있다. 본 연구는 Aqueduct와 Water Conflict Chronology 등 온라인 플랫폼에 탑재된 한반도 관련 수자원 자료를 조사하여 기존 자료와 분석하였다. 연구 결과 Aqueduct와 Water Conflict Chronology 등 온라인 플랫폼이 수자원 관련 교육의 유용한 도구임을 알 수 있었다.

  • PDF

Intelligent Evaluation Algorithm for Identifying Hazards in Public Restrooms Using Virtual Reality and Sensor Data (가상현실과 센서데이터를 활용하는 공중화장실 위험요소 지능형 평가 알고리즘)

  • Shin-Sook Yoon;Jeong-Hwa Song
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.2
    • /
    • pp.473-482
    • /
    • 2024
  • This study utilized virtual reality to construct a simulated public restroom environment to identify potential hazards. The objective was to discern actual risks in real-world public restrooms through this virtual setup. During the virtual restroom experience, data from the built-in 3-axis accelerometer and gyroscope sensors of testor's smart phones were collected. Analysis of this data helped in identifying spatio temporal factors impacting the users. The determination of these factors as risk elements was based on an evaluation algorithm grounded in data analysis.

A Study on IT Based Risk Management System Development for Business Continuity Management : Centering on Cases at Automobile Manufacturing Industry (비즈니스 연속성 확보를 위한 IT 기반 위험관리체계 구축 연구 : 자동차 제조 산업 사례를 중심으로)

  • Lee, Joontaik;Kim, Yanghoon;Na, Youngsub;Chang, Hangbae
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.2
    • /
    • pp.69-79
    • /
    • 2013
  • Management activities of Business was globalization and had changed to a global management. Under these circumstances, business management factors and the environment has changed rapidly. Accordingly, the number of risk categories in business has increased. Especially in recent years, the convergence of industry with IT has a pivotal role in the industry's business processes. However, information systems in the Internet environment increased the efficiency of business management. Also, it increased the degree of risk and the occurrence ripple effects. In this study, we proposed risk management framework for ensuring business continuity management in information system based automobile manufacturing industry. In detail, we analysis business process in automotive manufacturing industry and identify information assets and we analysis and assess the risk.

Development of the Safety Management Risk Assessment Factors and Indicators for Coastal/Offshore Fishing Vessels (연근해어선의 안전관리 위험성평가 인자 및 지표개발)

  • Song, Byung-Hwa;Kim, Cheol-Seong
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.27 no.6
    • /
    • pp.783-788
    • /
    • 2021
  • Although the Korean government (Ministry of Ocean and Fisheries) and related organizations are enforcing many policies to improve the marine safety of vessels with weak safety management, the effectiveness of each policy is deficient due to the lack of a risk assessment method for ship safety management. Most previous studies in Korea of the risk assessment of ships only dealt with fragmentary risks of individual marine accident risks, so a new assessment method for comprehensive marine accident risk is needed. Examples of comprehensive risk assessments for ship safety management are the selection method for inspection targets by the Port State Control and the Norwegian Maritime Authority. In this study, indicators for the comprehensive risk assessment of ship safety management were developed for and applied to coastal/offshore fishing vessels that occupy a high proportion of the registrations and marine accidents in Korea. As a result, the risk of each ship was confirmed quantitatively, and a ranking of the weakness factors for ship safety management was identified.

The Effect of Composition and Security Activities for Information Security Architecture on Information Asset Protection and Organizational Performance (정보보호 아키텍처 구성과 보안활동이 정보자산보호 및 조직성과에 미치는 영향)

  • Jeong, Gu-Heon;Yi, Dong-Wook;Jeong, Seung-Ryul
    • The KIPS Transactions:PartD
    • /
    • v.17D no.3
    • /
    • pp.223-232
    • /
    • 2010
  • This study was carried out for the purpose of inquiring into the effect of composition and security activities for information security architecture on information asset protection and organizational performance in terms of general information security. This study made a survey on 300 workers in the government, public institutions and private companies, which it showed that management factors of risk identification and risk analysis, in general, have an usefulness to composition and security activities for information security architecture to prevent inside information leakage. And the understanding and training factors of IT architecture and its component were rejected, requiring the limited composition and security activities for information security architecture. In other words, from the reality, which most institutions and organizations are introducing and operating the information security architecture, and restrictively carrying out the training in this, the training for a new understanding of architecture and its component as an independent variable made so much importance, or it did not greatly contribute to the control or management activities for information security as the generalized process, but strict security activities through the generalization of risk identification and risk analysis management had a so much big effect on the significant organizational performance.

Deriving of Major Risk Factors for Planning Phase of u-City Project (U-City사업 계획단계에서의 핵심 리스크 요인 도출)

  • Kim, Ho-Ki;Kwon, Soon-Wook
    • Korean Journal of Construction Engineering and Management
    • /
    • v.12 no.4
    • /
    • pp.139-148
    • /
    • 2011
  • u-City projects are different with the existing urban development projects progress via convergence with IT technology. Therefore, it inheres many risk factors more than the existing development projects as including more complexity and variety. The risk management system to systematically manage those risks which get identified and quantified is required. Especially, the planning phase that is appeared the various forms has a large effect on the success of the business. However, the management of risk factors remains in the passive form. So the problems on u-City project in the planning phase and risk factors of existing development business were analyzed for the continuous growth and the successful performance of u-City project, and those risk factors was identified and quantified by using statistical technique. In the results of it, the core risk factors were obtained through which way and the basis for the effective risk management in u-City business is provided.

A Risk Management Method Using Fuzzy Theory for Early Construction Stage (퍼지이론을 이용한 초기 건설공사의 리스크 관리 방법)

  • Hwang Ji-Sun;Lee Chan-Sik
    • Korean Journal of Construction Engineering and Management
    • /
    • v.5 no.2 s.18
    • /
    • pp.136-143
    • /
    • 2004
  • This study presents a risk management methodology using fuzzy theory for early construction stage and is focused on risk identification and risk analysis. This study identifies various risk factors associated with activities clearly construction stage, then establishes the Risk Breakdown Structure(RBS) by classifying the risks into the three groups; Common risks, risks for Earth works, and risks for Foundation works. The risk analysis method presented in this study is based on the RBS that has two levels such as upper level and lower level. The risk exposure of lower level risk factors is assessed by fuzzy inference. The weight of risks is estimated by fuzzy measure. Then, the estimated risk exposures and weights are aggregated to assess the risk exposure of upper level risks by Choquet fuzzy integral. The risk exposure of upper level risks determine the priority of risk factors in view of risk management. This study performs case study to validate the proposed method. The result of case study shows that the methodology suggested in this thesis would be utilized well in evaluating risk exposure.

A study on the application of mission-based weapon system cybersecurity test and evaluation (임무 기반의 무기체계 사이버보안 시험평가 적용 연구)

  • Kim, Ik-jae;Kang, Ji-won;Shin, Dong-kyoo
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.71-81
    • /
    • 2021
  • This paper examines the ongoing research on ways to improve cybersecurity during the entire life cycle of weapons systems applied in advanced countries such as the United States, analyzes restrictions on obtaining domestic weapons systems, and presents effective security evaluation measures. By consistently performing mission-based risk assessment in the cybersecurity test and evaluation plan suitable for domestic circumstances at all stages of acquisition, important information is provided to major decision-making organizations in a timely manner to support decision-making, and to respond to identified vulnerabilities in cybersecurity. It is proposed to set the rules of engagement so that the protection measures can be verified, and a simulated invasion is proposed. In addition, the proposed cybersecurity test and evaluation system was compared with the domestic weapon system test and evaluation. Through this, the mission-based risk assessment element was grafted into the cybersecurity test and evaluation system research conducted so far to identify risks in a timely manner between acquisition projects, thereby supplementing the capability to support major decision-making.