• Title/Summary/Keyword: Industrial Security Management

Search Result 595, Processing Time 0.027 seconds

A Study on Cargo Handling Accident Analysis and Prevention for irregular employee in Incheon Port (인천항 비상용 근로자의 재해분석 및 예방대책에 관한 연구)

  • Nam, Young-Woo;Jho, Yong-Chul;Lee, Chang-Ho
    • Journal of the Korea Safety Management & Science
    • /
    • v.11 no.2
    • /
    • pp.1-8
    • /
    • 2009
  • The port, differently from general working place, is a closed area to execute security, customs, and quarantine procedures. The loading and unloading is being done differently by cargoes, ships, berths, and equipments. To load and unload a lot of equipments and different types of labor are required, in which work flow is very complicated. As above mentioned the port is very unique and deteriorated working place including danger. Now frequency of cargo handling accidents in port is highest for the second time among all industries. The purpose of this study is to propose ways to analyze and establish the preventive measure for cargo handling accidents in port. We have collected 45 accidents happened at Incheon Port during the period from 2007 to 2009. And the result of analysis, we proposed the new safety management system and safety education to reduce cargo handling accidents and to promote the quality of cargo handling in Incheon Port. Within the framework of effective safety management of cargo handling in port, this study will help to revise and establish system, education, and standard working manual with respect to the port loading and unloading system.

An Assessment System for Evaluating Big Data Capability Based on a Reference Model (빅데이터 역량 평가를 위한 참조모델 및 수준진단시스템 개발)

  • Cheon, Min-Kyeong;Baek, Dong-Hyun
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.39 no.2
    • /
    • pp.54-63
    • /
    • 2016
  • As technology has developed and cost for data processing has reduced, big data market has grown bigger. Developed countries such as the United States have constantly invested in big data industry and achieved some remarkable results like improving advertisement effects and getting patents for customer service. Every company aims to achieve long-term survival and profit maximization, but it needs to establish a good strategy, considering current industrial conditions so that it can accomplish its goal in big data industry. However, since domestic big data industry is at its initial stage, local companies lack systematic method to establish competitive strategy. Therefore, this research aims to help local companies diagnose their big data capabilities through a reference model and big data capability assessment system. Big data reference model consists of five maturity levels such as Ad hoc, Repeatable, Defined, Managed and Optimizing and five key dimensions such as Organization, Resources, Infrastructure, People, and Analytics. Big data assessment system is planned based on the reference model's key factors. In the Organization area, there are 4 key diagnosis factors, big data leadership, big data strategy, analytical culture and data governance. In Resource area, there are 3 factors, data management, data integrity and data security/privacy. In Infrastructure area, there are 2 factors, big data platform and data management technology. In People area, there are 3 factors, training, big data skills and business-IT alignment. In Analytics area, there are 2 factors, data analysis and data visualization. These reference model and assessment system would be a useful guideline for local companies.

파산비용(破産費用)의 중요성(重要性)과 측정방법(測定方法)에 관한 연구(硏究)

  • Jeong, Gyeong-Su
    • The Korean Journal of Financial Management
    • /
    • v.4 no.1
    • /
    • pp.45-58
    • /
    • 1988
  • This paper is to examine the relevance of banarptcy Costs (BC) to Capital Structure with three related purposes: whether or not BC are trival,, a proxy methodology for estimating BC, the present value of expected BC vs tax benefits' trade off. For these purposes, the samples includes 19 industrial firms which went bankrupt over period 1970-78 and secondly seven large Companies which went bankrnpt recently in the U.S. The results are quite strong that BC are not trival. In many cases they exceed 20% of the value of the firm measured just prior to bankruptcy. Direct BC are explicit and administrative costs paid by debtor in reorganization/liqaidation process. Indirect BC are essentially defined as unexpected losses and estimated in two way: a regression method and security analyst's forcasts. The present value of expected BC for many of the bankrupt firm is found to exceed the present value of tax benefits from leverage. This implies that firms were overleveraged and that a potentially important ingredient in the discussion of optimum capital structure is indeed the BC factor. Therefore, BC are relevant to the cost of capital structure decision and should he considered seriously.

  • PDF

Revitalization plan for Korean's Venture Business (우리 나라 벤처기업의 활성화 방안)

  • Lee Kyoung-Oh
    • Management & Information Systems Review
    • /
    • v.7
    • /
    • pp.381-400
    • /
    • 2001
  • Our country has been encountered with severe economic depression since IMF loan(1997). Korean economic system should be reformed according to the globalization and the world industrial trends based on adavanced technologies and skills. Todays the venture business should be considered to be the alternative of recovering Korean economy and increasing highly estimated values. Generally speaking, the venture business is defined as a new business with high risk-high return with new technical entrepreneurship. This treatise suggests the activating alternatives of the venture business in Korea. These alternatives are suggested as follows. First, several measures to incruit excellent technicians are suggested. These measures includes incruitment of parttime technicians, application of cooperative program of education training unemployees, the stock option system, a stock-sharing plan for the employees, etc. Second, in the financial aspect, activation of the foundation investment company, activation of the COSDAQ market, strengthening of technology security are suggested. Third, in the technical development aspect, amplification of inauguration assistant center, construction of technology accumulative network, etc. These measures will contribute to the development of Korean economy and the welfare of Korean people.

  • PDF

A Study on Information Breakdown through the Analysis of Industrial Engineering EPC Business Process (산업설비 EPC 업무 분석을 통한 정보 분류 내역에 관한 연구)

  • Cho, Hang-Min;Song, Young-Woong;Choi, Yoon-Ki
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2006.11a
    • /
    • pp.167-172
    • /
    • 2006
  • It follows recently in an order augmentation of overseas construction market plant field and the project of oil gas field is increasing. Consequently, the hazard which secures the competitive power of the overseas plant enterprise of the domestic building industry enterprises the technical competitiveness security which stands, productivity improvement and strategy management propulsion back positive disposal plan establishment are demanded. Even from in that oil gas field of overseas plant enterprise for an industrial competitive power improvement the application of EPC circulation information which relates with a project accomplishment is more demanded, the EPC phased star efficiently it manages the circulation information contents which occurs from the business which is various it is not presented it cannot there is a contents classification system for. If with him about lower the draft the problem point of information omission back of occurrence and business subject for of the fringe land and duplication business occurs, about lower the productivity decrease actual condition is appearing with such problem point. The research which it sees consequently in order to improve the use characteristic of the augmentation of practical application of the contents management system of oil gas field and building industry information civil official establishhes the contents management system the BPM for (Business Process Management) to present the contents classification system of base, it does to sleep. The part of Business Process materiality the knowledge which is demanded, contents information and system anger it analyzes system anger of industrial equipment circulation information it takes a triangular position and to sleep it does.

  • PDF

Secure Key Exchange Protocols against Leakage of Long-tenn Private Keys for Financial Security Servers (금융 보안 서버의 개인키 유출 사고에 안전한 키 교환 프로토콜)

  • Kim, Seon-Jong;Kwon, Jeong-Ok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.3
    • /
    • pp.119-131
    • /
    • 2009
  • The world's widely used key exchange protocols are open cryptographic communication protocols, such as TLS/SSL, whereas in the financial field in Korea, key exchange protocols developed by industrial classification group have been used that are based on PKI(Public Key Infrastructure) which is suitable for the financial environments of Korea. However, the key exchange protocols are not only vulnerable to client impersonation attacks and known-key attacks, but also do not provide forward secrecy. Especially, an attacker with the private keys of the financial security server can easily get an old session-key that can decrypt the encrypted messages between the clients and the server. The exposure of the server's private keys by internal management problems, etc, results in a huge problem, such as exposure of a lot of private information and financial information of clients. In this paper, we analyze the weaknesses of the cryptographic communication protocols in use in Korea. We then propose two key exchange protocols which reduce the replacement cost of protocols and are also secure against client impersonation attacks and session-key and private key reveal attacks. The forward secrecy of the second protocol is reduced to the HDH(Hash Diffie-Hellman) problem.

A Study on the Enhancement Process of the Telecommunication Network Management using Big Data Analysis (Big Data 분석을 활용한 통신망 관리 시스템의 개선방안에 관한 연구)

  • Koo, Sung-Hwan;Shin, Min-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.12
    • /
    • pp.6060-6070
    • /
    • 2012
  • Real-Time Enterprise (RTE)'s key requirement is that it should respond and adapt fast to the change of the firms' internal and external situations including the change of market and customers' needs. Recently, the big data processing technology to support the speedy change of the firms is spotlighted. Under the circumstances that wire and wireless communication networks are evolving with an accelerated rate, it is especially critical to provide a strong security monitoring function and stable services through a real-time processing of massive communication data traffic. By applying the big data processing technology based on a cloud computing architecture, this paper solves the managerial problems of telecommunication service providers and discusses how to operate the network management system effectively.

A Study on the Current Situations of Knowledge Management Systems Introduction in Korean University Libraries (우리 나라 대학도서관의 지식관리시스템 도입현황에 관한 연구)

  • 손창식;신호균
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2002.06a
    • /
    • pp.459-470
    • /
    • 2002
  • The purpose of this study is to present the factors needed to introduce knowledge management systems to university libraries in Korea, to suggest various methods needed to offer much more improved services of a library than now by investigating the current situations about introducing such factors in national and pubic university libraries in Korea. Almost all of the 33 university libraries selected the subject of investigation have offered the on-line reference service, e-mail pushing service, and full text constructions out of the 11 knowledge management system elements presented in this study, but the other services else have been offered by less than half the number of the libraries. The findings suggest to greatly improve the current services of libraries such as information education and selective dissemination of information, and immediately to introduce new systems including e-book and wireless service systems in order to the university competitiveness. The study implies that each library has already introduced the knowledge management systems, in proportion to a budget of the library, ifs librarian number, and a degree restructuring organization, and that an introduction of knowledge management systems such as policy and culture of organization, its librarian number, and its related security of budget takes the most important role in improving services of a library.

  • PDF

A Study on the Patent Valuation for SMEs' Patent Management (중소기업의 특허경영을 위한 특허가치평가에 관한 연구)

  • Yang, Hui-Man
    • Journal of Industrial Convergence
    • /
    • v.15 no.2
    • /
    • pp.17-26
    • /
    • 2017
  • In light of the fact that the effect of intellectual property rights like patent on enterprise competitiveness is growing, rational valuation of patent rights, which are own by enterprises, is required because accurate patent valuation can bring about the activation of the technology exchange market and enhancing the values of enterprises as well as the security of funds through technology security. However, in reality, interest in the value of patent rights is not great due to many variables, affecting patent rights, and diverse attributes, and non-generalized methods of valuation. Therefore, studies on patent valuation for patent management of Small and Medium Enterprises is required. This thesis examined patent valuation for the patent management of Small and Medium Enterprises based on literature studies, and attempted to find factors, affecting patent valuation by finding patent valuation factors through experts, organizing, and analyzing these factors. 10 essential factors, which are demonstrated in this research, are the commercialization possibilities of technology, market competitiveness, the possibility of technology commercialization, market size, the originality of acquired technology, the stability of the right(the possibility of invalidating), the level of technology, technology competitiveness, the ripple effect of technology, and the characteristics of technology(original technology/application technology).

A Study on the Application of the Cyber Threat Management System to the Future C4I System Based on Big Data/Cloud (빅데이터/클라우드 기반 미래 C4I체계 사이버위협 관리체계 적용 방안 연구)

  • Park, Sangjun;Kang, Jungho
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.27-34
    • /
    • 2020
  • Recently, the fourth industrial revolution technology has not only changed everyday life greatly through technological development, but has also become a major keyword in the establishment of defense policy. In particular, Internet of Things, cloud, big data, mobile and cybersecurity technologies, called ICBMS, were selected as core leading technologies in defense information policy along with artificial intelligence. Amid the growing importance of the fourth industrial revolution technology, research is being carried out to develop the C4I system, which is currently operated separately by the Joint Chiefs of Staff and each military, including the KJCCS, ATCIS, KNCCS and AFCCS, into an integrated system in preparation for future warfare. This is to solve the problem of reduced interoperability for joint operations, such as information exchange, by operating the C4I system for each domain. In addition, systems such as the establishment of an integrated C4I system and the U.S. military's Risk Management Framework (RMF) are essential for efficient control and safe operation of weapons systems as they are being developed into super-connected and super-intelligent systems. Therefore, in this paper, the intelligent cyber threat detection, management of users' access to information, and intelligent management and visualization of cyber threat are presented in the future C4I system based on big data/cloud.