• Title/Summary/Keyword: 1 step protection

Search Result 136, Processing Time 0.03 seconds

A Study on the Safety of Evacuation according to Evacuation Delay Time and Fire Door Openness: Based on Residence Types (피난 지연시간의 적용과 방화문 개방 정도에 따른 피난 안전성 확보에 관한 고찰 : 주거형태를 중심으로)

  • Seo, Dong-Gil;Kim, Mi-Seon;Gu, Seon-Hwan;Song, Young-Joo
    • Fire Science and Engineering
    • /
    • v.34 no.2
    • /
    • pp.156-165
    • /
    • 2020
  • In this paper, the application of evacuation delay time (Cognition time + initiation time) and examine the degree of opening of fire doors in households for evaluating evacuation safety and suggest a realistic alternative. In order to proceed with this study, first of all, the preliminary investigation on evacuation safety evacuation of residential-type buildings (Apartment, urban living houses, etc.) among the performance-oriented design targets of Gwangju Metropolitan City, which was implemented until June 2018. Then, for the two representative types that are commonly used among the previously surveyed buildings, evacuation delay time is applied to W1, W2, and respectively simulating the opening of the doors is applied to th full open, 1/4 open, the leakage gap and evacuation safety evaluation was performed. As a result of evaluating evacuation safety was found that it is difficult to secure evacuation safety regardless of evacuation delay time W1 and W2 when the fire door is fully open and 1/4 open, Only when the leakage gap is applied evacuation safety was ensured even if evacuation delay time W2 was applied. Therefore, when a residential building is subject to performance-oriented design, evaluating the application of W2 rather than W1 is considered for evacuation delay time to reflect concern about privacy infringement due to CCTV installation, etc. In order to secure the Smoke blocking performance of the fire door and to improve the performance-oriented design, I would like to propose to consider the method of applying a leak gap to the degree of opening of the fire door. Through this, it is expected that the performance-oriented design will be a step further by performing evacuation safety evaluation with more realistic data.

Mixing Zone Analysis on Outfall Plume considering Influence of Temperature Variation (수온 변화의 영향을 고려한 방류관 플룸의 혼합역 분석)

  • Kim Ji-Yeon;Lee Joong-Woo
    • Journal of Navigation and Port Research
    • /
    • v.28 no.10 s.96
    • /
    • pp.947-953
    • /
    • 2004
  • As a large scale port development in coastal waters proceeds step by step and populations in the vicinity of port are getting increased, the issue on 'how to dispose the treated municipal water and wastewater in harbor' brings peoples' concern. The submarine outfall system discharges the primary or secondary treated effluent at the coastline or in deep water, or between these two. The effluent, which has a density similar to that of fresh water, rises to the sea surface forming plume or jet, together with entraining the surrounding sea water and becomes very dilute. We intended in this paper to investigate the impact on dilution of effluent and the behavior of flume under the conditions of the seasonal and spatial temperature variations, which have not been noticeable in designing effective marine outfall system. To predict and analyze the behaviour and dilution characteristics of plume not just with the effluent temperature, but also with the seasonal variation of temperature of surround water, CORMIX( Cornell Mixing Zone Expert System)-GI have been applied. The results should be used with caution in evaluation the mixing zone characteristics of discharged water. We hope to help for the effective operation of outfall system, probable outfall design, protection of water quality, and warm water discharges from a power plant, etc.

The Behavioral Attitude of Financial Firms' Employees on the Customer Information Security in Korea (금융회사의 고객정보보호에 대한 내부직원의 태도 연구)

  • Jung, Woo-Jin;Shin, Yu-Hyung;Lee, Sang-Yong Tom
    • Asia pacific journal of information systems
    • /
    • v.22 no.1
    • /
    • pp.53-77
    • /
    • 2012
  • Financial firms, especially large scaled firms such as KB bank, NH bank, Samsung Card, Hana SK Card, Hyundai Capital, Shinhan Card, etc. should be securely dealing with the personal financial information. Indeed, people have tended to believe that those big financial companies are relatively safer in terms of information security than typical small and medium sized firms in other industries. However, the recent incidents of personal information privacy invasion showed that this may not be true. Financial firms have increased the investment of information protection and security, and they are trying to prevent the information privacy invasion accidents by doing all the necessary efforts. This paper studies how effectively a financial firm will be able to avoid personal financial information privacy invasion that may be deliberately caused by internal staffs. Although there are several literatures relating to information security, to our knowledge, this is the first study to focus on the behavior of internal staffs. The big financial firms are doing variety of information security activities to protect personal information. This study is to confirm what types of such activities actually work well. The primary research model of this paper is based on Theory of Planned Behavior (TPB) that describes the rational choice of human behavior. Also, a variety of activities to protect the personal information of financial firms, especially credit card companies with the most customer information, were modeled by the four-step process Security Action Cycle (SAC) that Straub and Welke (1998) claimed. Through this proposed conceptual research model, we study whether information security activities of each step could suppress personal information abuse. Also, by measuring the morality of internal staffs, we checked whether the act of information privacy invasion caused by internal staff is in fact a serious criminal behavior or just a kind of unethical behavior. In addition, we also checked whether there was the cognition difference of the moral level between internal staffs and the customers. Research subjects were customer call center operators in one of the big credit card company. We have used multiple regression analysis. Our results showed that the punishment of the remedy activities, among the firm's information security activities, had the most obvious effects of preventing the information abuse (or privacy invasion) by internal staff. Somewhat effective tools were the prevention activities that limited the physical accessibility of non-authorities to the system of customers' personal information database. Some examples of the prevention activities are to make the procedure of access rights complex and to enhance security instrument. We also found that 'the unnecessary information searches out of work' as the behavior of information abuse occurred frequently by internal staffs. They perceived these behaviors somewhat minor criminal or just unethical action rather than a serious criminal behavior. Also, there existed the big cognition difference of the moral level between internal staffs and the public (customers). Based on the findings of our research, we should expect that this paper help practically to prevent privacy invasion and to protect personal information properly by raising the effectiveness of information security activities of finance firms. Also, we expect that our suggestions can be utilized to effectively improve personnel management and to cope with internal security threats in the overall information security management system.

  • PDF

Analysis of the Risk of Heat Generation due to Bolt Loosening in Terminal Block Connector Parts (볼트풀림에 의한 터미널 블록의 접속부 발열 위험성 분석)

  • Yeon, Yeong-Mo;Kim, Seung-Hee
    • Fire Science and Engineering
    • /
    • v.34 no.3
    • /
    • pp.67-75
    • /
    • 2020
  • In this study, the risk of heat generation due to normal and overload currents that vary with the abnormal loosening angle of wire-connecting bolts were identified. The risks were analyzed based on the thermal characteristics to minimize the carbonization accidents of terminal blocks inside distribution panels typically used in industrial sites. We applied a method for measuring the heating temperature and temperature variations in the terminal blocks in real-time by installing a resistance temperature detector sensor board in the terminal block. The experimental results showed that the terminal block model with a low-rated current exhibited a higher heating temperature, thus, confirming the need to select the terminal block capacity based on load currents. Additionally, the higher the rated current of the terminal block with a high-rated current and the higher the degree of loosening, the faster the carbonization point. Such heating temperature monitoring enabled real-time thermal temperature measurement and a step-by-step risk level setting through thermal analysis. The results of the measurement and analysis of carbonization risks can provide a theoretical basis for further research regarding the risk of fire due to carbonization. Furthermore, the deterioration measurement method using the temperature sensor board developed in this study is widely applicable to prevent fires caused by poor electrical contact as well as risk-level management.

Analysis of Key Parameters for Designing the Spent Nuclear Fuel Disposal Container in Korea (사용후핵연료 처분용기 설계를 위한 주요인자 분석)

  • Choi, Jong-Won;Cho, Dong-Keun;Choi, Hui-Ju
    • Journal of Radiation Protection and Research
    • /
    • v.31 no.1
    • /
    • pp.37-46
    • /
    • 2006
  • For the first step to develop a reference disposal container of spent fuel to be used in a deep geological repository, this paper examined safe dimensions of the disposal container on the points of nuclear criticality and radiation safety and mechanical structural safety and provided basic information for dimensioning the container and configuration of the container components, and establishing the favorable and safe disposal conditions. When the safety factor for stress due to the external loads (hydrostatic and swelling pressure) is taken as 2.0, the safe diameter of the filler material to provide enough container strength under the assumed external loads is found to be 112cm with 13cm spacing between inner baskets in PWR container. Also the thickness of the thinner section between the fuel basket and the surface of the cast insert is determined to be 150 mm. Regarding these dimensions of the container, the PWR fuel container is sketched to accommodate 4 square assemblies or 297 CANDU fuel 297 bundles (33 circle tubes x 9 stacks). However the top and bottom parts need to be checked again through the detail radiation shielding analysis with respects to the emplacement position and handling processes of the disposal container.

Employment Adjustment in the British Shipbuilding Industry(1860~1945) - Focusing on the Case of the Boilermakers' Society (영국 조선산업의 고용조정(1860~1945): 보일러제조공조합을 중심으로)

  • Shin, Wonchul
    • Korean Journal of Labor Studies
    • /
    • v.24 no.2
    • /
    • pp.321-365
    • /
    • 2018
  • Though the British shipbuilding industry dominated the world market in the 19th century, it could not avoid the repetitive rise and fall of the unemployment following after the cyclical fluctuations. Without challenging the employers' rights to fire at will, the boilermakers maintained their own unemployment insurance in order to escape from the new poverty law system. In the beginning the craft union could continue their own unemployment insurance under the National Insurance Act of 1911, but it went into bankruptcy under the massive unemployment of the 1920s and the attacks of shipyard employers. The Act of 1911 was a step towards social solidarity in that it spread the risks beyond the occupational boundaries, applying unemployment insurance to unskilled and non-union workers, and the employer and the government also paid the premium. In the Great Depression, the shipyard trade unions demanded that the government should intervene in the shipbuilding market to provide jobs, but it was not accepted by the government. The government responded only to the another demand of the union for the maintenance, which could be achieved partially through the abnormal operation of the insurance system, abandoning the insurance principle. After all, unemployment in the shipbuilding industry was resolved only by the expansion of rearmaments and the outbreak of World War II. From the 19th century to the World War II, the craft unions did not challenge the employers' right to fire at will and did not attempt to regulate dismissal procedures or make any demands on dismissal compensations. During interwar periods rules and practices related with weak employment protection - one of the main features of the liberal employment adjustment institution - were prevalent in Britain. The principle of 'employment at will' could survive through the historical events such as the World War I, II as the operation of the unemployment insurance became the focus of the social conflicts.

Exopolysaccharide Produced by Pediococcus acidilactici M76 Isolated from the Korean Traditional Rice Wine, Makgeolli

  • Song, Young-Ran;Jeong, Do-Youn;Cha, Youn-Soo;Baik, Sang-Ho
    • Journal of Microbiology and Biotechnology
    • /
    • v.23 no.5
    • /
    • pp.681-688
    • /
    • 2013
  • This work is aimed to increase knowledge of the functional exopolysaccharide (EPS) from lactic acid bacteria (LAB) in makgeolli, a Korean fermented rice wine. Among LAB strains isolated from makgeolli, strain M76 was selected as a functional strain producing a bioactive EPS, based on its antioxidative activity on the DPPH radical. The 16S rRNA gene sequencing analysis showed a high sequence similarity (99.0%) with P. acidilactici, but had different biochemical properties with the already known P. acidilactici type strains in the aspect of carbohydrates utilization. The obtained P. acidilactici M76 produced a soluble EPS above 2 g/l. One-step chromatography using gel filtration after ethanol precipitation from the supernatant of P. acidilactici M76 was enough to obtain purified EPS with a single peak, showing a molecular mass of approximately 67 kDa. Componential and structural analyses of EPS by TLC, HPLC, and FT-IR indicated that the EPS is a glucan, consisting of glucose units. The purified EPS had antioxidant activity on the DPPH radical of 45.8% at a concentration of 1 mg/ml. The purified EPS also showed proliferative effect on the pancreatic RIN-m5F cell line and remarkable protection activity on alloxan-induced cytotoxicity. This potent antioxidant and antidiabetic EPS by LAB in makgeolli may contribute to understanding the functionality of makgeolli.

An Improved High-Performance Protocol for Security Vulnerability of GSM based on SIM Card (SIM 카드 기반 보안 취약성을 개선한 고성능 GSM 보안 프로토콜)

  • Kim, Hee-Jung;Jeon, Ha-Yong;Lee, Ju-Hwa;Jung, Min-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.7
    • /
    • pp.902-911
    • /
    • 2007
  • GSM platform is a hugely successful wireless technology and an unprecedented story of global achievement. In less than ten years since the first GSM network was commercially launched, it became the world's leading and fastest growing mobile standard, using over 1 billion GSM subscribers across more than 200 countries of the world. GSM platform evolved into 3th generation mobile communication which includes not only voice call services but also the international roaming and various kinds of the multimedia services. GSM is an essential element techniques a safe data transmission and a personal private protection while support services. However, a crypto algorithm and a secure protocol for a safe data communication using GSM are indicating various kinds of problems. In this paper, we propose a more safer and more efficient authentication protocol in 3th generation network through analysis of GSM security mechanism of 2th/2.5th generation. This security protocol offers enforced security efficiency by using user verification between SIM/ME and reduction of authentication and key agreement step between SIM/ME/AuC.

  • PDF

Citizen Volunteer Monitoring as a Tool for Environmental Education (민간환경감시활동을 통한 환경교육)

  • Gang, Seong-Hyeon;Kim, Eun-Hui;Sin, Jong-Won
    • Hwankyungkyoyuk
    • /
    • v.10 no.2
    • /
    • pp.311-324
    • /
    • 1997
  • General citizens can be a valuable resource for various types of environmental monitoring when they are well-trained and managed. Successful use of volunteer monitors depends on understanding that citizens are partners sharing expanded roles as the guardians of their local environment. Citizen volunteer monitoring programs are developed for three reasons: 1) to supplement environmental data collected by professional staffs in governmental agencies and scientific institutions; 2) to educate the public about local environmental problems; 3) to build a constituency of citizen to practice sound environmental management at a local level and build public support for environmental protection. All three goals can be achieved with a well-organized program which provides useful and credible data. Initial step in planning a successful volunteer monitoring project is to clearly identify the use to be made of the data. Technical advice from the identified potential user groups should be convened early in the planning stage to refine the program objectives and determine if volunteers can provide the level of expertise required. Data users must have confidence in the representativeness, consistency, and accuracy of data collected by volunteers. Effective quality assurance and quality control(QA/QC) procedures are essential to ensure the utility of environmental monitoring data. Volunteers must be trained in advance to carry out specific environmental monitoring tasks. Another components of successful volunteer monitoring programs is to give the volunteers praise and feedback as well as to encourage experienced volunteers to impose increased responsibilities. The increase of volunteer monitoring programs in Korea will play a major role in developing a participatory system in which the people are "empowered" to make decisions and make a difference.

  • PDF

An Empirical Study on the Effects of Business Performance by Information Security Management System(ISMS) (정보보호 관리체계(ISMS)가 기업성과에 미치는 영향에 관한 실증적 연구)

  • Jang, Sang Soo;Kim, Sang Choon
    • Convergence Security Journal
    • /
    • v.15 no.3_1
    • /
    • pp.107-114
    • /
    • 2015
  • Since 2002, information security management system has been implemented (ISMS) certification scheme whilst providing telecommunications services to enhance the level of enterprise information security was ongoing and Prevent accidents and avoid spread of infringement, such as rapid response and there is a lot of it came true. However, this system is the protection of the country or the investment company, as part of the actual information on how management affects the performance came from or how measures are still lacking for. In this study, the companies have their own privacy ISMS certification measures the level of activity continued to improve information security performance measures and methodology are presented. The government is also based on the validity of the certification system to ensure the overall implementation of the ISMS itself is this a step increase effective information security system is to be certified in advance to prevent security incidents and to improve business performance to help.