• Title/Summary/Keyword: Industrial Security Management

Search Result 595, Processing Time 0.024 seconds

Establish Manufacturing Firms' Response Strategy to the Serious Accident Punishment Act Using IPA (IPA를 활용한 제조기업의 중대재해처벌법 대응방안 수립)

  • Seo, JunHyeok;SungMin Bae
    • Journal of Korean Society for Quality Management
    • /
    • v.51 no.4
    • /
    • pp.607-618
    • /
    • 2023
  • Purpose: In this study, we proposed a plan to establish and implement a safety and health management system by utilizing corporate resources so that manufacturing companies can effectively respond to the Serious Accident Punishment Act. Methods: We identified critical factors and response strategies necessary for manufacturing companies to respond to the Severe Accident Punishment Act effectively and surveyed employees working at the company regarding their importance and performance. Results: In this study, we presented a method of strategically constructing the response strategies (20) shown in previous studies by matching them with the company's resources (leadership, organization, budget, education, and awareness). In particular, leadership refers to the ability of managers who can prevent serious accidents by carrying out safety and health security obligations to avoid safety and health hazards or risks to employees in the business or workplace that is controlled, operated, and managed. Conclusion: Based on the manager's firm leadership, the system's purpose and direction must be accurately set and sufficiently communicated to members. In addition, for companies to identify and improve risk factors on their own, a Process approach must be established to improve execution by referring to legal standards together with field managers and supervisors.

Design and Implementation of Road Construction Risk Management System based on LPWA and Bluetooth Beacon

  • Lee, Seung-Soo;Kim, Yun-cheol;Jee, Sung-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.12
    • /
    • pp.145-151
    • /
    • 2018
  • While commercialization of IoT technologies in the safety management sector is being promoted in terms of industrial safety of large indoor businesses, implementing a system for risk management of small outdoor work sites with frequent site movements is not actively implemented. In this paper, we propose an efficient dynamic workload balancing strategy which combined low-power, wide-bandwidth (LPWA) communication and low-power Bluetooth (BLE) communication technologies to support customized risk management alarm systems for each individual (driver/operator/manager). This study was designed to enable long-term low-power collection and transmission of traffic information in outdoor environment, as well as to implement an integrated real-time safety management system that notifies a whole field worker who does not carry a separate smart device in advance. Performance assessments of the system, including risk alerts to drivers and workers via Bluetooth communication, the speed at which critical text messages are received, and the operation of warning/lighting lamps are all well suited to field application.

An Effective Information Visualization Technique for Intrusion Detection: Hyperbolic View Intrusion Visualizer

  • Jeong, Yun-Seok;Myung, Ro-Hae
    • Journal of the Ergonomics Society of Korea
    • /
    • v.30 no.2
    • /
    • pp.319-330
    • /
    • 2011
  • In computer forensics investigation, the investigators collect, protect, analyze and interpret massive amount of data which were used in cyber crime. However, due to its huge amount of information, it takes a great deal of time and errors often result even when they use forensics investigation tool in the process. The information visualization techniques will greatly help to improve the information processing ability of human when they deal with the overwhelming amount of data and have to find out significant information in it. The importance of Intrusion Detection System(IDS) among network forensics is being emphasized in computer forensics. In this study, we apply the information visualization techniques which are proposed to be a great help to IDS and carry out the usability test to find out the most effective information visualization techniques for IDS.

A Study on Authentication Management Technique Used of SSO (Single Sign-On을 이용한 인증 관리 기법에 관한 연구)

  • Choi, Jin-Tak
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • v.10 no.1
    • /
    • pp.61-69
    • /
    • 2006
  • SSO (Single Sign On), which allows users to have an access to a various systems through a single authentication, has been receiving much attention from many enterprises due to the user convience through a single authentication and the recent security features based on PKI. An emerging authentication management system called EAM has further enhanced the efficiency and stability of the enterprise IT infrastructrure systems. In this article, the basic concept and characteristics of the existing SSO systems are analyzed and a new SSO model, based on PKI where authentication load is balanced via multiple circulators, is presented.

  • PDF

A Risk Management of Architectural Planning Phase in the Korea Private Infrastructure Project Using Project Financing (프로젝트 파이낸싱을 활용한 국내 SOC 민간투자사업 건축기획 단계에서의 리스크 관리)

  • Lee, Sin-young;Kim, Seon-Gyoo;Lee, Nak-Woon
    • Journal of Industrial Technology
    • /
    • v.27 no.B
    • /
    • pp.177-184
    • /
    • 2007
  • Project Financing(PF) was introduced from the way of banks' conditional financing that take buried oil as security and offer required money to oil explores which have weak loaning ability in the U.S. 1930s. After that PF has developed with financial market and it has been activated in the market of Korea since 'An Institution about Private Financing Invitation Promotion' was established. Started with I-Hwa Ryoung tunnel project, PF has been used in the Metropolitan Area Airport Highway and etc. But because of the risk that occurred by PF's complexity and uncertainty, PF has not been used fully and there are only few practical examples. The purpose of the present study is to investigate how to decrease, identify and extract the risky factors of project that being planned by PF.

  • PDF

On Renewable Energy Technology Valuation Using System Dynamics and Compound Real Options (시스템다이내믹스와 복합 리얼옵션 기반 신·재생에너지 기술가치평가)

  • Jeon, Chanwoong;Shin, Juneseuk
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.40 no.2
    • /
    • pp.195-204
    • /
    • 2014
  • The transition from fossil to renewable energy is inevitable due to fossil depletion. So, Renewable energy is very important for energy security and economic growth although it's R&D is long-term and high risky project. We propose new valuation method which combined system dynamics and compound real option method for long-term and high risk projects such as renewable energy. This method can show dynamic valuation results for the complex causal interaction and be easy for Monte-Carlo simulation to estimate volatility. And it can reflect the value of flexible decision for uncertainty. We applied the empirical analysis for Korea's photovoltaic industry by using this method. As results by empirical analysis, photovoltaic's R&D has high valuation using this method compared by traditional valuation methods such as DCF.

Extenuating Food Integrity Risk through Supply Chain Integration: The Case of Halal Food

  • Ali, Mohd Helmi;Tan, Kim Hua;Pawar, Kulwant;Makhbul, Zafir Mohd
    • Industrial Engineering and Management Systems
    • /
    • v.13 no.2
    • /
    • pp.154-162
    • /
    • 2014
  • Effects of food scandals on religious belief, human health and even on causes of death indicate that firms and consumers are vulnerable to integrity risks in the global supply chain. Mitigating the integrity risk and maintaining the credence quality products like halal food is very challenging, if not impossible. Our aim in this research is to show that supply chain integration can mitigate the halal food integrity risk. To illustrate this idea, we have conducted case studies and interviews in seven Malaysian chicken supply chain focal firms. We unpack the halal integrity risks along the supply chain, such as production risk, raw material risk, food security risk, outsourcing practices risk, service risk, and logistics risk. The research argues that supply chain integration, such as internal integration and external integration practices, could minimize the halal integrity risk. The advantages of supply chain integration in mitigating the halal integrity risk are also highlighted in this paper.

Preparation of Reliable Measurement Data by Using State Estimation (상태추정을 이용한 고 신뢰도 측정데이터 확보방안 연구)

  • Kim, Hong-Rae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.5
    • /
    • pp.1020-1025
    • /
    • 2007
  • EMS(energy management system) and SCADA(supervisory control and data acquisition) systems are used for reliable and efficient operation of electrical power systems. Various functions in EMS such as power flow, contingency analysis, security analysis essentially need accurate data set for reliable operation. State estimation can be a tool for providing these data. In this paper, programs for observability analysis and bad data processing are developed. Fundamental algorithms are introduced and validity of the proposed techniques is inspected with test cases.

  • PDF

Management of Innovation and Investment Activities of Enterprises in the Conditions of Digitalization to Increase Their Competitiveness in the International Market

  • Kravchuk, Nataliia;Rusinova, Olha;Desyatov, Tymofii;Lapshyn, Ihor;Alnuaimi, Ali Juma Ali Sallam
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.335-343
    • /
    • 2022
  • The article analyzes the features of innovation and investment activities of enterprises in the context of digitalization to increase their competitiveness in the international market. Ukraine's position on the Global Innovation Index is assessed. The interrelation of management functions in the context of innovation and investment activities of enterprises is substantiated. The structure of sources of financing of innovative activity of industrial enterprises is analyzed. Trends in changes in the volume of foreign direct investment and capital investment in Ukraine are assessed. It is determined that the level of innovative development of enterprises is determined by the level of their investment support, which is determined by the level of their investment attractiveness. The components of the strategy of investment attractiveness of enterprises are outlined. Determining factors in the implementation of innovation and investment policy of enterprises are identified and the main stages that should include the processes of managing innovation and investment activities of enterprises in the context of digitalization.

A Study on the Method of Optimizing the Test Order of Explosive Detection System Using Analytic Hierarchy Process and Objective Rating (계층분석방법 및 객관적평가법을 활용한 폭발물탐지장비 시험순서 최적화 방법에 관한 연구)

  • Sun-Ju, Won;Hyun Su, Sim;Yong Soo, Kim
    • Journal of Korean Society for Quality Management
    • /
    • v.50 no.4
    • /
    • pp.793-810
    • /
    • 2022
  • Purpose: As improving the search performance of aviation security equipment is considered essential, this study proposes the need for research on how to find an optimized test sequence that can reduce test time and operator power during the search function test of explosive detection systems. We derive the weights and work difficulty adjustment factor required to find the optimized test order. Methods: First, after setting the test factors, the time of each test and the difficulty scale determined by the worker who performed the test directly were used to derive weights. Second, the work difficulty adjustment coefficient was determined by combining the basic weight adjustment factor and corresponding to the body part used by the test using objective rating. Then the final standard time was derived by calculating the additional weights for the changeability of the test factors. Results: The order in which the final standard time is minimized when 50 tests are performed was defined as the optimized order. 50 tests should be conducted without duplication and the optimal order of tests was obtained when compared to previously numbered tests. As a result of minimizing the total standard time by using Excel's solver parameters, it was reduced by 379.14 seconds, about 6.32 minutes. Conclusion: We tried to express it in mathematical formulas to propose a method for setting an optimized test sequence even when testing is performed on other aviation security equipment. As a result, the optimal test order was derived from the operator's point of view, and it was demonstrated by minimizing the total standard time.