• Title/Summary/Keyword: Response Organizations

Search Result 365, Processing Time 0.028 seconds

Case Study on the Application of Disaster Training System in Disaster Response Safety Training in Korea (에너지산업현장에서의 재난대응안전한국훈련시 재난훈련시스템 적용성 검토 사례조사)

  • Park, Namhee;Yeo, Wookhyun;Kim, Taehwan
    • Journal of the Society of Disaster Information
    • /
    • v.14 no.2
    • /
    • pp.211-218
    • /
    • 2018
  • Purpose: The purpose of this study is to find a way to use the disaster drill system that can be used in the training in the required situation in the safety training situation in the safety industry to prepare for the disaster in the energy industry field by utilizing the developed system. Method: In order to accomplish the purpose of the research, I investigated the papers, reports, statistical data, and visited the site to investigate the training situation. Results: Disaster response safety Korean training is not only responding to disasters but also cooperating activities with local governments and related organizations. The contents are complex, diverse, and multifaceted. Conclusion: The disaster training system should be applied to the self training of the organization to prepare for the disaster and the safety training for disaster response in Korea.

Development of Truck Shipment Incident Emergency Response System for Transporting Hazardous Materials Using GPS (GPS를 이용한 수송사고 조기경보시스템 개발(1단계 : 국내외 사례조사와 개발방법제시))

  • Oh Se-Chang;Cho Yong-Sung
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.1 no.1
    • /
    • pp.79-88
    • /
    • 2002
  • As a part of NERI:;, Truck Shipment Safety Information is divided into Optimal Route Guidance system and Emergency Response system. This study which is for developing of Truck Shipment Incident Emergency Response System intends to prevent or early response damage caused by incidents through realtime monitoring about the position and the state of Hazard material transport truck. For this, we divide it into three scenarios; realtime monitoring, management of incidents, information provision to related organizations and present functional requirements and architecture coming with each scenario. As a result of the first step among total three steps, it would able to not only realtime management of trucks but also guide for auto-enforcement or management about illegal act like dumping scrapped material. It is now under examination about position of detection and technology of communication to application. From now on, it is expect to test in the range of Metropolitan after selecting appropriate technology.

  • PDF

A Study on the Impact of Business Continuity Management System (BCMS) on Disaster Management Performance and Disaster Site Response (사업연속성경영시스템(BCMS)이 재난관리 성과와 재난현장 대응에 미치는 영향에 관한 연구)

  • Jae-Sung Shin;Chong-Soo Cheung
    • Journal of the Society of Disaster Information
    • /
    • v.20 no.2
    • /
    • pp.430-439
    • /
    • 2024
  • Purpose: The purpose of this study is to analyze the impact of seven sub-components of the business continuity management system(BCM) on disaster management performance and disaster site response. Method: After establishing a hypothesis through prior research and conducting a survey of employees of telecommunication business organizations, a total of 327 pieces of data were gathered and the hypothesis was verified through statistical analysis. Result: First, the leadership, planning, support, operation, and performance evaluation of the business continuity management system were found to have a positive (+) impact on disaster management performance. Second, leadership, planning, support, operation, performance evaluation and improvement were found to have a positive (+) impact on disaster scene response. Conclusion: The business continuity management system was confirmed to have an overall significant impact on disaster management performance and disaster site response. In order to improve a company's disaster management performance and ability to respond to disaster scenes, it is necessary to establish and operate a business continuity management system.

Development of Earthquake Damage Estimation System and its Result Transmission by Engineering Test Satellite for Supporting Emergency

  • Jeong, Byeong-Pyo;Hosokawa, Masafumi;Takizawa, Osamu
    • 한국방재학회:학술대회논문집
    • /
    • 2011.02a
    • /
    • pp.12-19
    • /
    • 2011
  • Drawing on its extensive experience with natural disasters, Japan has been dispatching Japan Disaster Relief (JDR) team to disaster-stricken countries to provide specialist assistance in rescue and medical operations. The JDR team has assisted in the wake of disasters including the 2004 Indian Ocean Earthquake and the 2008 Sichuan Earthquake in China. Information about the affected area is essential for a rapid disaster response. However, it can be difficult to gather information on damages in the immediate post-disaster period. To help overcome this problem, we have built on an Earthquake Damage Estimation System. This system makes it possible to produce distributions of the earthquake's seismic intensity and structural damage based on pre-calculated data such as landform and site amplification factors for Peak Ground Velocity, which are estimated from a Digital Elevation Model, as well as population distribution. The estimation result can be shared with the JDR team and with other international organizations through communications satellite or the Internet, enabling more effective rapid relief operations.

  • PDF

Intrusion Detection: Supervised Machine Learning

  • Fares, Ahmed H.;Sharawy, Mohamed I.;Zayed, Hala H.
    • Journal of Computing Science and Engineering
    • /
    • v.5 no.4
    • /
    • pp.305-313
    • /
    • 2011
  • Due to the expansion of high-speed Internet access, the need for secure and reliable networks has become more critical. The sophistication of network attacks, as well as their severity, has also increased recently. As such, more and more organizations are becoming vulnerable to attack. The aim of this research is to classify network attacks using neural networks (NN), which leads to a higher detection rate and a lower false alarm rate in a shorter time. This paper focuses on two classification types: a single class (normal, or attack), and a multi class (normal, DoS, PRB, R2L, U2R), where the category of attack is also detected by the NN. Extensive analysis is conducted in order to assess the translation of symbolic data, partitioning of the training data and the complexity of the architecture. This paper investigates two engines; the first engine is the back-propagation neural network intrusion detection system (BPNNIDS) and the second engine is the radial basis function neural network intrusion detection system (BPNNIDS). The two engines proposed in this paper are tested against traditional and other machine learning algorithms using a common dataset: the DARPA 98 KDD99 benchmark dataset from International Knowledge Discovery and Data Mining Tools. BPNNIDS shows a superior response compared to the other techniques reported in literature especially in terms of response time, detection rate and false positive rate.

Organizational Usage of Social Media for Corporate Reputation Management

  • Becker, Kip;Lee, Jung Wan
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.6 no.1
    • /
    • pp.231-240
    • /
    • 2019
  • The paper aims to investigate the relationship between firm size and organizational actions on adopting social media for corporate reputation management. The sample group of 198 companies is selected with a simple random sample method from the New York Stock Exchange (NYSE) listings: Sixty nine companies were from the Fortune 500 listings, seventy one companies from the NYSE midsize capitalization and fifty eight companies from the NYSE small capitalization listings. This study employs cross tabulations and Chi-square analysis, and the Kruskal-Wallis that enables the comparison of three samples that are independent. The results of the study show that (1) large firms have more social media ownership than small firms, (2) large firms respond to social media posts at a greater frequency and quickly than small firms, and (3) firm size is less likely associated with response styles to social media for online reputation management. The results show that reply time and response styles of organizations to social media customers in the 2015 survey has no significant change compared to that of 2011. There appears to be a pervasive lack strategic framework as most firms in the study were found not to be adequately monitoring or leveraging social media communication for their reputation management.

Status analysis of patients on islands and seas of Jeollanam-do (전라남도 섬과 해상에서 발생한 환자의 현황분석)

  • Choi, Young-Ju;Yun, Jong-Geun
    • The Korean Journal of Emergency Medical Services
    • /
    • v.26 no.2
    • /
    • pp.87-96
    • /
    • 2022
  • Purpose: By analyzing the health status of emergency patients on islands in the Jeollanam-do province, this study aims to provide basic data for proposed future medical emergency services on the islands. This information includes monthly and hourly statistics on patients' characteristics, patient frequency, an analysis of first aid procedures, response times, and time spent at hospitals. Methods: The study analyzed the monthly and hourly frequency of emergency patients, first aid status and procedures, general patient characteristics, accident types, patient cognitive status and agility, marine police response times, and frequency and percentile of hospital dispatch times. Results: 1Q and #q show the highest patient turnover rate in one year. 50.5% of daily patients are admitted between 4 PM and 12 PM. The hospital dispatch time is within a one- to two-hour window for 54.0% of all patients. Conclusion: The emergency medical service system for the Jeollanam-do province islands and seas is available to all Korean residents, citizens, and visitors. It is necessary to implement an emergency medical system for the relevant organizations.

A Study on Artificial Intelligence-based Automated Integrated Security Control System Model (인공지능 기반의 자동화된 통합보안관제시스템 모델 연구)

  • Wonsik Nam;Han-Jin Cho
    • Smart Media Journal
    • /
    • v.13 no.3
    • /
    • pp.45-52
    • /
    • 2024
  • In today's growing threat environment, rapid and effective detection and response to security events is essential. To solve these problems, many companies and organizations respond to security threats by introducing security control systems. However, existing security control systems are experiencing difficulties due to the complexity and diverse characteristics of security events. In this study, we propose an automated integrated security control system model based on artificial intelligence. It is based on deep learning, an artificial intelligence technology, and provides effective detection and processing functions for various security events. To this end, the model applies various artificial intelligence algorithms and machine learning methods to overcome the limitations of existing security control systems. The proposed model reduces the operator's workload, ensures efficient operation, and supports rapid response to security threats.

Trust based Mutual Authentication Mechanism for Cloud Computing

  • Mandeeep Kaur;Prachi Garg
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.81-90
    • /
    • 2023
  • Cloud computing is an emerging business model popularized during the last few years by the IT industry. Providing "Everything as a Service" has shifted many organizations to choose cloud-based services. However, some companies still fear shifting their data to the cloud due to issues related to the security and privacy. The paper suggests a novel Trust based Mutual Authentication Mechanism using Secret P-box based Mutual Authentication Mechanism (TbMAM-SPb) on the criticality of information. It uses a particular passcodes from one of the secret P-box to act as challenge to one party. The response is another passcode from other P-box. The mechanism is designed in a way that the response given by a party to a challenge is itself a new challenge for the other party. Access to data is provided after ensuring certain number of correct challenge-responses. The complexity can be dynamically updated on basis of criticality of the information and trust factor between the two parties. The communication is encrypted and time-stamped to avoid interceptions and reuse. Overall, it is good authentication mechanism without the use of expensive devices and participation of a trusted third party.

A Study on National Defense Enterprise Architecture Framework (국방 전군적 아키텍처 프레임워크에 관한 연구)

  • 이태공;김진우
    • Journal of the military operations research society of Korea
    • /
    • v.29 no.2
    • /
    • pp.45-60
    • /
    • 2003
  • As we live in real If era, If become a mandatory component for nations and organizations to survive in severe competition. If is also thought of as strategic asset for effective business operations, yet there is no proved statement on the interoperability and system integration which causes serious problem in terms of requirement engineering among current systems. The National Defense Enterprise Architecture Framework is a strategic information asset base, which define the military operation activities for the mission, the information necessary for military operations, the technologies necessary for implementing new technology in response to changing operational needs. It is an integrated model or representation. Information Systems will be evolved by the National Defense Enterprise Architecture framework. The purpose of this framework is to present overall picture of national defense information system domain so that information systems are interoperated, integrated and information sharing is increased among affiliated organization of Defense Military.