• Title/Summary/Keyword: Administrative Controls

Search Result 40, Processing Time 0.033 seconds

Tuberculosis Infection Control in Health-Care Facilities: Environmental Control and Personal Protection

  • Lee, Ji Yeon
    • Tuberculosis and Respiratory Diseases
    • /
    • v.79 no.4
    • /
    • pp.234-240
    • /
    • 2016
  • Transmission of tuberculosis (TB) is a recognized risk to patients and healthcare workers in healthcare settings. The literature review suggests that implementation of combination control measures reduces the risk of TB transmission. Guidelines suggest a three-level hierarchy of controls including administrative, environmental, and respiratory protection. Among environmental controls, installation of ventilation systems is a priority because ventilation reduces the number of infectious particles in the air. Natural ventilation is cost-effective but depends on climatic conditions. Supplemented intervention such as air-cleaning methods including high efficiency particulate air filtration and ultraviolet germicidal irradiation should be considered in areas where adequate ventilation is difficult to achieve. Personal protective equipment including particulate respirators provides additional benefit when administrative and environmental controls cannot assure protection.

Prevention of the Musculoskeletal Disorders at Upper or Lower Extremities (상지, 하지에서 발생하는 근골격계질환의 예방)

  • Park, Hee-Sok;Lee, Yun-Keun;Yim, Sang-Hyuk
    • Journal of the Ergonomics Society of Korea
    • /
    • v.29 no.4
    • /
    • pp.455-463
    • /
    • 2010
  • Work-related musculoskeletal disorders (WMSDs) are recognized as leading causes of significant human suffering, loss of productivity, and economic burdens on our society. WMSDs are associated with work patterns that include fixed or constrained body positions, continual repetition of movements, force concentrated on small parts of the body, cold environment and vibration. Main effort to protect workers from WMSDs should focus on avoiding repetitive patterns of work through engineering controls which may include mechanization, ergonomic design of tools and equipment, and workplace layout. Where elimination of the risk factors is not practical, administrative controls involving job rotation, job enlargement and enrichment, teamwork should be considered.

Examining China's Internet Policies through a Bibliometric Approach

  • Li, Jiang;Xu, Weiai Wayne;Wang, Fang;Chen, Si;Sun, Jianjun
    • Journal of Contemporary Eastern Asia
    • /
    • v.17 no.2
    • /
    • pp.237-253
    • /
    • 2018
  • In order to understand China's internet governance, this paper examined 1,931 Internet policies of China by bibliometric techniques. Specifically, the bibliometric techniques include simple document counting, co-word analysis, collaboration network analysis and citation analysis. The findings include: (1) China's Internet legislations mainly emphasized e-commerce and Internet governance, and, to some extent, neglected personal data protection; (2) China's Internet is under intensive multiple regulatory controls by central government. A large number of government agencies are involved in Internet policy-making. The Propaganda Department of the Central Committee of the Communist Party of China and the State Information Leading Group of the State Council, enforced fewer policy documents, but occupy higher positions in the Internet governance hierarchy; (3) China's Internet legislation system is primarily composed of industry-specific administrative rules, rather than laws or administrative regulations. Nevertheless, laws and administrative regulations received significantly more citations owing to their superior force. This paper also discussed current gaps in China's internet governance and how the country's internet policies are situated in the broader global context.

On the administrative security approaches against spear phishing attacks (스피어 피싱 대응을 위한 관리적 보안대책에 의한 접근)

  • Sohn, Yu-Seung;Nam, Kil-Hyun;Goh, Sung-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.12
    • /
    • pp.2753-2762
    • /
    • 2013
  • Recently the paradigm of cyber attacks is changing due to the information security technology improvement. The cyber attack that uses the social engineering and targets the end users has been increasing as the organization's systems and networks security controls have been tightened. The 91% of APT(Advanced Persistent Threat) which targets an enterprise or a government agency to get the important data and disable the critical service starts with the spear phishing email. In this paper, we analysed the security threats and characteristics of the spear phishing in detail and explained why the technical solutions are not enough to prevent spear phishing attacks. Therefore, we proposed the administrative prevention methods for the spear phishing attack.

Analytical Procedures for Designing an Optimal Noise Hazard Prevention Program

  • Asawarungsaengkul, Krisada;Nanthavanij, Suebsak
    • Industrial Engineering and Management Systems
    • /
    • v.4 no.2
    • /
    • pp.165-175
    • /
    • 2005
  • Two extreme and one mixed procedures for designing a noise hazard prevention program are discussed in this paper. The two extreme design procedures (engineering-based and HPD-based) yield upper and lower bounds of the total noise control cost, respectively; while the mixed design procedure provides an optimal noise hazard prevention program within a given total budget. The upper bound of the workforce size for job rotation is approximated using a heuristic procedure. Six optimization models are developed and utilized by the mixed procedure to eliminate or reduce excessive noise levels (or noise exposures) in an industrial workplace. The mixed procedure also follows the OSHA’s hierarchy of noise control. A numerical example is given to demonstrate the application of the proposed design procedures.

Biomedical Laboratory: Its Safety and Risk Management

  • Tun, Tin
    • Biomedical Science Letters
    • /
    • v.23 no.3
    • /
    • pp.155-160
    • /
    • 2017
  • Biomedical laboratory is full of risks. Risk could be biological, chemical, radioactive, mechanical, physical, fire and electrical. All possible risks need to be identified, evaluated and controlled. A risk management system must be in place to prevent accident or loss of lives and to improve overall workplace safety and productivity. Safety in laboratory is a combination of appropriate risk management system, engineering controls and technical facilities, administrative controls and safety procedures and practices. Laboratory safety culture must be developed so that exposure to hazards for laboratory personnel, community and environment will be minimized or eliminated. In this review, importance of safety in a biomedical laboratory and risk management will be discussed.

IDENTIFICATION OF SAFETY CONTROLS FOR ENGINEERING-SCALE PYROPROCESS FACILITY

  • MOON, SEONG-IN;SEO, SEOK-JUN;CHONG, WON-MYUNG;YOU, GIL-SUNG;KU, JEONG-HOE;KIM, HO-DONG
    • Nuclear Engineering and Technology
    • /
    • v.47 no.7
    • /
    • pp.915-923
    • /
    • 2015
  • Pyroprocess technology has been considered as a fuel cycle option to solve the spent fuel accumulation problems in Korea. The Korea Atomic Energy Research Institute, Daejeon, Korea has been studying pyroprocess technology, and the conceptual design of an engineering-scale pyroprocess facility, called the Reference Engineering-scale Pyroprocess Facility, has been performed on the basis of a 10 ton heavy metal throughput per year. In this paper the concept of Reference Engineering-scale Pyroprocess Facility is introduced along with its safety requirements for the protection of facility workers, collocated workers, the off-site public, and the environment. For the identification of safety structures, systems, and components and/or administrative controls, the following activities were conducted: (1) identifying hazards associated with operations; (2) identifying potential events associated with these hazards; and (3) identifying the potential preventive and/or mitigative controls that reduce the risk associated with these accident events. This study will be used to perform a safety evaluation for accidents involving any of the hazards identified, and to establish safety design policies and propose a more definite safety design.

Design and Load Map of the Next Generation Convergence Security Framework for Advanced Persistent Threat Attacks

  • Lee, Moongoo
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.3 no.2
    • /
    • pp.65-73
    • /
    • 2014
  • An overall responding security-centered framework is necessary required for infringement accidents, failures, and cyber threats. On the other hand, the correspondence structures of existing administrative, technical, physical security have weakness in a system responding to complex attacks because each step is performed independently. This study will recognize all internal and external users as a potentially threatening element. To perform connectivity analysis regarding an action, an intelligent convergence security framework and road map is suggested. A suggested convergence security framework was constructed to be independent of an automatic framework, such as the conventional single solution for the priority defense system of APT of the latest attack type, which makes continuous reputational attacks to achieve its goals. This study suggested the next generation convergence security framework to have preemptive responses, possibly against an APT attack, consisting of the following five hierarchical layers: domain security, domain connection, action visibility, action control, and convergence correspondence. In the domain, the connection layer suggests a security instruction and direction in the domains of administrative, physical and technical security. The domain security layer has consistency of status information among the security domain. A visibility layer of an intelligent attack action consists of data gathering, comparison and decision cycle. The action control layer is a layer that controls the visibility action. Finally, the convergence corresponding layer suggests a corresponding system of before and after an APT attack. The administrative security domain had a security design based on organization, rule, process, and paper information. The physical security domain is designed to separate into a control layer and facility according to the threats of the control impossible and control possible. Each domain action executes visible and control steps, and is designed to have flexibility regarding security environmental changes. In this study, the framework to address an APT attack and load map will be used as an infrastructure corresponding to the next generation security.

The Legal Base and Validity of Reviewing Medical Expenses in the Health Insurance (건강보험 진료비심사의 법적 근거와 효력)

  • Kim, Un-Mook
    • The Korean Society of Law and Medicine
    • /
    • v.8 no.1
    • /
    • pp.137-177
    • /
    • 2007
  • The medical expenses review system in Korea has developed under fee-for-service system with its own unique structure. The importance of reviewing medical expenses has been emphasized, as the size of medical expenditures moving through the health insurance legal context and its weight in the national economy have increased very rapidly. It is, however, analyzed that the feuds and arguments continue among the stakeholders for the lack of laws supporting the medical expenses review system. The medical expenses review is a series of administrative procedures, deciding whether claims from medical care institutions to the insurer are legal and valid or not. It mainly controls the increase of unnecessarily excessive health insurance claim and prevents fraudulent claim and abuse and checks the less use or unsuitable use of medical resources. It also works a function guarantees medical benefits for the appropriate treatment according to the object of health insurance system as a social insurance scheme. The dispute on legal base of the medical expenses review is about the source of law in the medical expenses review. There are the Health Insurance Act and administrative laws as jus scriptum and the guidelines of review as administrative orders. The medical expenses review should reflect various factors, such as the development of medical healthcare technologies, the health expenditures distribution, the financial situation of the health insurance, and the evaluation on the level of appropriate benefits. It is also likely to adapt to the traits of characters of medicine, and trends and transition, Besides it should judge the legality and the validity of medical benefits expenditures by synthesizing these all factors. And the evaluation system of appropriateness of medical benefits was administrative procedure which was consecutive with reviewing the medical expenses system and it was intended to make up for the result of reviewing the medical expenses in more comprehensive levels.

  • PDF

The Survey of Job Rotation Implementation at Medium- and Small-Industries

  • Yoon, Sang-Young;Jung, Myung-Chul
    • Journal of the Ergonomics Society of Korea
    • /
    • v.32 no.2
    • /
    • pp.199-205
    • /
    • 2013
  • Objective: The aim of this study is to investigate the job rotation implementation at medium- or small-industries and to identify the viewpoint on job rotation as preventive activity of work-related musculoskeletal disorders(WMSDs). Background: Job rotation has been implemented in many industrial areas in order to prevent the WMSDs as one part of ergonomic program. Generally, the cases of implementation of ergonomic program or successful cases of job rotation were reported on the side of major or large company. Therefore, this study tried to inspect the current state of job rotation implementation at medium- or small-industries. Method: Survey was carried out for randomly contacted forty seven mangers responsible for safety. Survey contained the questionnaires on the general state of company, shift-work and job rotation. Results: The ratio of work-shift in medium- and small-industry was 34.0% and the ratio of job rotation was 19.1%. For manufacturing industry, the ratio was 37.9% and 17.2%, respectively. Conclusion: The implementation ratio of job rotation was relatively low considering the results of previous studies. Many managers appealed the quality decreasing of goods and the injuries of workers due to job rotation, though agreed to train the multi-functional worker and to prevent the WMSDs. Application: The results can be used for the fundamental data how the job rotation will be properly implemented in medium- and small-industry as an administrative control for MSDs.