• Title/Summary/Keyword: audit environment

Search Result 152, Processing Time 0.033 seconds

Evaluation of Methodology for the Measurement of VOCs in the Air by Adsorbent Sampling and Thermal Desorption with GC Analysis (흡착포집 및 열탈착/GC 분석에 의한 공기 중 휘발성 유기화합물의 측정방법론 평가)

  • 백성옥;황승만;박상곤;전선주;김병주;허귀석
    • Journal of Korean Society for Atmospheric Environment
    • /
    • v.15 no.2
    • /
    • pp.121-138
    • /
    • 1999
  • This study was carried out to evaluate the performance of a sampling and analytical methodology for the measurement of selected volatile organic compounds (VOCs) in the ambient air. VOCs were determined by the adsorbent tube sampling and automatic thermal desorption coupled with GC/FID and GC/MSD analysis. Target analytes were aromatic VOCs, including BTEX, 1,3,5-and 1,2,4,-trimethylbenzenes(TMBs), and naphthalene. The methodology was investigatedwith a wide range of performance criteria such as repeatability, linearity, lower detection limits, collection efficiency, thermal conditioning, breakthrough volume and calibration methods using internal and external standards. standards. Stability of samples collected on adsorbent tubes during storage was also investigated. In addition, the sampling and analytical method developed during this study was applied to real samples duplicately collected in various indoor and outdoor environments. Precisions for the duplicate samples and distributed volume samples appeared to be well comparable with the performance criteria recommended by USEPA TO-17. The audit accuracy was estimated by inter-lab comparison of both duplicate samples and standard materials between the two independent labs. The overall precision and accuracy of the method were estimated to be within 30% for major aromatic VOCs such as BTEX. This study demonstrated that the adsorbent sampling and thermal desorption method can be reliably applied for the measurement of BTEX in ppb levels frequently occurred in common indoor and ambient environments.

  • PDF

The Design of Router Security Management System for Secure Networking

  • Jo, Su-Hyung;Kim, Ki-Young;Lee, Sang-Ho
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1594-1597
    • /
    • 2005
  • A rapid development and a wide use of the Internet have expanded a network environment. Further, the network environment has become more complex due to a simple and convenient network connection and various services of the Internet. However, the Internet has been constantly exposed to the danger of various network attacks such as a virus, a hacking, a system intrusion, a system manager authority acquisition, an intrusion cover-up and the like. As a result, a network security technology such as a virus vaccine, a firewall, an integrated security management, an intrusion detection system, and the like are required in order to handle the security problems of Internet. Accordingly, a router, which is a key component of the Internet, controls a data packet flow in a network and determines an optimal path thereof so as to reach an appropriate destination. An error of the router or an attack against the router can damage an entire network. This paper relates to a method for RSMS (router security management system) for secure networking based on a security policy. Security router provides functions of a packet filtering, an authentication, an access control, an intrusion analysis and an audit trail in a kernel region. Security policy has the definition of security function against a network intrusion.

  • PDF

Transaction Mining for Fraud Detection in ERP Systems

  • Khan, Roheena;Corney, Malcolm;Clark, Andrew;Mohay, George
    • Industrial Engineering and Management Systems
    • /
    • v.9 no.2
    • /
    • pp.141-156
    • /
    • 2010
  • Despite all attempts to prevent fraud, it continues to be a major threat to industry and government. Traditionally, organizations have focused on fraud prevention rather than detection, to combat fraud. In this paper we present a role mining inspired approach to represent user behaviour in Enterprise Resource Planning (ERP) systems, primarily aimed at detecting opportunities to commit fraud or potentially suspicious activities. We have adapted an approach which uses set theory to create transaction profiles based on analysis of user activity records. Based on these transaction profiles, we propose a set of (1) anomaly types to detect potentially suspicious user behaviour, and (2) scenarios to identify inadequate segregation of duties in an ERP environment. In addition, we present two algorithms to construct a directed acyclic graph to represent relationships between transaction profiles. Experiments were conducted using a real dataset obtained from a teaching environment and a demonstration dataset, both using SAP R/3, presently the predominant ERP system. The results of this empirical research demonstrate the effectiveness of the proposed approach.

A Study on the Assessment of the Marine Traffic Congestion and the Improvement of a Technical Standards (해상교통혼잡도 평가현황 분석을 통한 진단기술기준 개선연구)

  • Um, Han-Chan;Jang, Woon-Jae;Cho, Kyung-Min;Cho, Ik-Soon
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.18 no.5
    • /
    • pp.416-422
    • /
    • 2012
  • To prevent serious maritime accident and eliminate the cause of the potential maritime accidents, Maritime Safety Audit Scheme was formally institutionalized through amendment of Maritime Traffic Safety Act(May 27, '09). At the initial step of the enforcement of the law, it has risen the necessity of amending the present institution concerning with the range of applicable business, method of practice, detailed technical standards in the assessment articles, etc. Among them, the assessment of marine traffic congestion has been practiced as a mandatory assessment article, but it is analyzed that the assessment doesn't reflect current variation of ships' size and its speed. By analyzing the status of assessments on marine traffic congestion so far and collecting experts' opinion, this paper suggests draft amendments to improve technical standards on the assessment of marine traffic congestion.

Third-Party Financing Contracts Between Energy Users and Energy Saving Companies (비대칭정보하에서의 최적계약 도출 -에너지절약시장)

  • Kang, Kwang-Kyu
    • Journal of Environmental Policy
    • /
    • v.8 no.4
    • /
    • pp.75-94
    • /
    • 2009
  • The process of obtaining third-party financing contacts was analyzed via a two-stage game model: a "signaling game" for the first stage,and a "principal-agent model" for the second stage. The two-stage game was solved by a process of backward induction. In the second stage game, the optimal effort level of the energy saving company (ESCO), the optimal compensation scheme of the energy user, and the optimal payoffs for both parties were derived for each subgame. The optimal solutions forthe different subgames were then compared with each other. Our main finding was that if there is some restriction on ESCO's revenue (e.g. a progressive sales tax) that causes ESCO's revenue toincrease at a decreasing rate, then the optimal sharing ratio is uniquely determined at a level of strictly less than one under a linear compensation scheme, i.e. a unique balance exists. Subgames have a unique equilibrium arrived at separately for each situation,. Within this equilibrium, energy users accept energy audit proposals from H-type ESCOs with high levels of technology, but reject proposals from L-type ESCOs with low levels of technology. While L-type ESCOs cannot attain profits in the third-party financing market, H-type ESCOS can pocket the price differential between L-type and H-type audit fees. Accordingly, revenues in an H-type ESCO equilibrium increase not only in line with the technology of the ESCO inquestion, but also faster than in an L-type equilibrium due to more advanced technology. At the same time, energy users receive some positive payoff by allowing ESCOs to perform third-party financing tasks within their existing energy system without incurring any extra costs.

  • PDF

New Environmental Impact Assessment Technology (신환경영향평가기술(新環境影響評價技術)의 개발방향(開發方向))

  • Han, Sang-Wook;Lee, Jong-Ho;Nam, Young-Sook
    • Journal of Environmental Impact Assessment
    • /
    • v.9 no.4
    • /
    • pp.277-290
    • /
    • 2000
  • The purpose of this study is to identify the problems of environmental impact assessment(EIA) and to suggest new EIA technology. The problems of EIA in Korea can be summarized as follows. First, the EIA does not reflect the impact of policy, plan and program on environment. Second, the project EIA does not consider the cumulative impacts such as additive impacts, synergistic impacts, threshold/saturation impacts, induced and indirect impacts, time-crowded impacts, and space-crowded impacts. Third, the EIA techniques in Korea are not standardized. Finally, the present EIA suggests only alternatives to reduce adverse impacts. To solve above-mentioned problems, the development of new EIA technology is essential. First, the new EIA technology should be developed toward pollution prevention technology and comprehensive and integrated environmental management technology. Second, new fields of EIA for pollution prevention contain strategic environmental assessment, cumulative impacts assessment, socio-economic impact assessment, cyber EIA and EIA technology necessary after the reunification of Korean Peninsula. Third, EIA technology for integrated environmental management contains the development of integated environment assessment system and the development of packaged EIA technology. The EIA technology for integrated environmental assessment system contains (1) development of integrated impact assessment technology combining air/water quality model, GIS and remote sensing, (2) integrated impact assessment of EIA, traffic impact assessment, population impact assessment and disaster impact assessment. (3) development of integrated technology combining risk assessment and EIA (4) development of integrated technology of life cycle assessment and EIA, (5) development of integrated technology of spatial planning and EIA, (6) EIA technology for biodiversity towards sustainable development, (7) mathematical model and GIS based location decision techniques, and (8) environmental monitoring and audit. Furthermore, there are some fields which need packaged EIA technology. In case of dam development, urban or industrial complex development, tourist development, landfill or combustion facilities construction, electric power plant development, development of port, road/rail/air port, is necessary the standardized and packaged EIA technology which considers the common characteristics of the same kind of development project.

  • PDF

Sustainability Criteria Identified in the Global Sourcing Practices of Global Fashion Retailers (글로벌 패션 기업의 해외 소싱 프로세스에서 나타난 지속 가능성 기준)

  • Lee, Ji Yeon
    • Fashion & Textile Research Journal
    • /
    • v.24 no.2
    • /
    • pp.206-216
    • /
    • 2022
  • This study sought to examine the sustainability criteria found in the global sourcing practices of global fashion retailers. Sustainable supply chain management, with a particular focus on the sustainability criteria of global sourcing, was analyzed. This qualitative study was based on a focus group interview and corporate social responsibility (CSR) annual reports. Eight master categories, 18 middle categories, and 37 bottom categories were extracted. The key categories and their middle categories were as follows: (1) Social compliance (working conditions, employment, safety); (2) Environment concerns (environmental pollution management, eco-friendly production, supply chain environment); (3) Energy efficiency (energy saving program, store environment); (4) Consumer protection (restricted substances management, consumer product safety improvement); (5) Management system (code of conduct, triangle audit system); (6) Community social activities (local community service, voluntary activities, charitable activities); (7) External stakeholder engagement (media & non-governmental organization management, maintenance of relationship with local authority); (8) Brand protection (respect for companies' intellectual property). The findings of this study offer academically significant insights into the sustainability criteria that can be encountered by companies under diverse global sourcing scenarios, revealing that global sourcing by fashion retailers is not merely a means of reducing costs, but a way of generating new jobs and making a social contribution to developing countries. The study's findings also have practical significance, offering guidelines for general CSR activities in the global sourcing process.

Attributed Intrusion Detection System using Pattern Extracting Agent (패턴 추출 에이전트를 이용한 분산 침입 탐지 시스템)

  • Jeong, Jong-Geun;Lee, Hae-Gun;Her, Kyung;Shin, Suk-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.658-661
    • /
    • 2008
  • As network security is coming up with significant problem after the major Internet sites were hacked nowadays, IDS(Intrusion Detection System) is considered as a next generation security solution for more trusted network and system security. We propose the new IDS model which can detect intrusion in the expanded distribute environment in host level, drawback of existing IDS, and implement prototype. We used pattern extraction agent so that we extract automatically audit file needed in intrusion detection even in other platforms.

  • PDF

Implementation of Security Kernel based on Linux OS (리눅스 운영체제 기반의 보안 커널 구현)

  • Shon, Hyung-Gil;Park, Tae-Kyou;Lee, Kuem-Suk
    • The KIPS Transactions:PartC
    • /
    • v.10C no.2
    • /
    • pp.145-154
    • /
    • 2003
  • Current security efforts provided in such as firewall or IDS (intrusion detection system) of the network level suffer from many vulnerabilities in internal computing servers. Thus the necessity of secure OS is especially crucial in today's computing environment. This paper identifies secure OS requirements, analyzes tile research trends for secure Linux in terms of security kernel, and provides the descriptions of the multi-level security(MLS) Linux kernel which we have implemented. This security kernel-based Linux meets the minimum requirements for TCSEC Bl class as well providing anti-hacking, real-time audit trailing, restricting of root privileges, and enterprise suity management functions.

Corporate Governance and Sustainability in Indonesia

  • SETYAHADI, R. Rulick;NARSA, I Made
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.12
    • /
    • pp.885-894
    • /
    • 2020
  • This paper aims to provide a review concept regarding the relationship between corporate governance and corporate sustainability in Indonesia. This paper examines the mechanisms and guidelines for implementing good corporate governance. This research used the literature review method and explores some effective corporate governance principles such as transparency, accountability, responsibility, independence, fairness, and equality to achieve business sustainability in Indonesia's setting. The results show that good corporate governance regulation in Indonesia has been improved, but the enforcement is still needed to be optimized because good corporate governance will positively impact corporate sustainability. Thus, sustainability requires more corporate innovation because sustainability is about how a company can create profits and value-added to society through corporate social responsibility (CSR) programs and how the company can contribute to the preservation of nature and the environment. In Indonesia, the board of directors, the board of commissioners, and the audit committees are positively related to CSR disclosure. Thus, leadership and management efforts are crucial. However, to comprehensively support the synergy of implementing good corporate governance, we need the role of the state, the business community, and society. This study provides important insights into the implementation of good corporate governance in achieving corporate sustainability in Indonesia.