• Title/Summary/Keyword: personal cause

Search Result 429, Processing Time 0.03 seconds

A Study on the Steering System of Electric Scooter

  • Park, Sung Cheon
    • International journal of advanced smart convergence
    • /
    • v.11 no.2
    • /
    • pp.219-225
    • /
    • 2022
  • Recently, the popularization of personal mobility(PM) has made it possible to see many electric scooters. The energy source of personal transportation used by the general public and the disabled can be seen as environmentally friendly as electricity. Personal transportation means are divided into small electric vehicles because they use electric energy, and they are being treated as new models by automobile manufacturers in each country and spurring development. On the other hand, personal transportation means may cause various types of traffic accidents as they travel between roads and a human walk. In order to prevent such accidents, it is judged that the enactment of laws on the establishment of specifications for electric scooters, which are personal transportation means, and the method of restricting road operation should be given priority. The electric scooter is basically different from the conventional vehicle. The steering shaft of the steering system applied to the electric scooter one to two is possible. 1 to 2 the front-wheel under the steering column is used. It is classified according to the number of wheel installed at the electric scooter is the vehicle body into 2 wheel - electric scooter, and 3 wheel - electric scooter and 4 wheel - electric scooter. In this study, we propose a steering shaft design model that can be applied to an electric scooter, one of personal transportation means. A design model for 1-shaft steering and 2-shafts steering that can be applied to electric scooters is proposed. In addition, we have produced the prototypes for the commercialization of the proposed models, and reviewed the pros and cons of the manufactured prototypes and models.

Privacy leakage security system research for small physical companies (중소 경호.경비업체의 개인정보 유출 방지를 위한 보안 체계 연구)

  • Kang, Poo-Reum;Lee, DongHwi;Kim, Kuinam J.
    • Convergence Security Journal
    • /
    • v.12 no.5
    • /
    • pp.87-97
    • /
    • 2012
  • Privacy of personal information disclosure incident occurs frequently as a problem to our society's most important and sensitive social agenda is emerging. Personal information is actually more accurate, depending on the type or types of economic value and sensitivity, the quality of the information, because it can cause a spill a serious social threat and systematic personal information protection and management are not carried out and the information society in a big mess can result. Customers my affairs when small guard security companies, especially the sensitive personal information of customers who need to work, the collected information be leaked or the company's trade secrets, are exposed on the outside, it could be a serious threat to a greater problem cause. Small escort guard companies, however, compared with large companies to build its own security system, due to issues such as the extent of funding, staffing shortages, there are many difficulties. Status of Information Security, scale and analyze the characteristics of small escort guard companies occupied by guard security companies in the present study, sleep, look at him in the solution of the practical issues of information protection system laid small guard. Expenses supplier of propose a security system for preventing the leakage of personal information.

Analysis of Privacy Vulnerability Caused by Location-Based Service (위치기반 서비스에 따른 개인정보보안 취약점의 사례분석)

  • Choi, Hee Sik;Cho, Yang Hyun;Kim, Jung Sook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.151-159
    • /
    • 2014
  • Recently, spread of large amount Smartphones made users to download location-based service applications, which provided by application developers. These location-based service applications are convenient tool for users. Location-based service use technology to find location of user and provide information of user's location. Leakage of information of user's location and expose of privacy life raised new controversy. In this thesis, it will analyze relations of increase of Smartphone market, usage of Location-based service and severity of personal information leakage. Also, it will analyze examples of user's case of damage which caused by leakage personal information and find solutions to reduce damage of personal information leakage. In research, it will find cases of damage that cause by Location-based service. Also it will analyze and research cases of damage and present with graph and chart. In conclusion, to reduce and prevent from damage which caused by leakage personal information, it is important that users and application developers to realize danger of private and personal information leakage. Also, user's personal information must deal with cautiously and application developers have to research and develop the application with powerful security.

Critical Hazard Factors in the Risk Assessments of Industrial Robots: Causal Analysis and Case Studies

  • Lee, Kangdon;Shin, Jaeho;Lim, Jae-Yong
    • Safety and Health at Work
    • /
    • v.12 no.4
    • /
    • pp.496-504
    • /
    • 2021
  • Background: With the increasing demand for industrial robots and the "noncontact" trend, it is an appropriate point in time to examine whether risk assessments conducted for robot operations are performed effectively to identify and eliminate the risks of injury or harm to operators. This study discusses why robot accidents resulting in harm to operators occur repetitively despite implementing control measures and proposes corrective actions for risk assessments. Methods: This study collected 369 operator-injured robot accidents in Korea over the last decade and reconstructed them into the mechanism of injury, work being undertaken, and bodily location of the injury. Then, through the techniques of Systematic Cause Analysis Technique (SCAT) and Root Cause Analysis (RCA), this study analyzed the root and direct causes of robot accidents that had occurred. Causes identified included physical hazards and complex combinations of hazards, such as psychological, organizational, and systematic errors. The requirements of risk assessments regarding robot operations were examined, and three case studies of robot-involved tasks were investigated. The three assessments presented were: camera module processing, electrical discharge machining, and a panel-flipping robot installation. Results: After conducting RCA and comparing the three assessments, it was found that two-thirds of injury-occurring from robot accidents, causative factors included psychological and personal traits of robot operators. However, there were no evaluations of the identifications of personal aspects in the three assessment cases. Conclusion: Therefore, it was concluded that personal factors of operators, which had been overlooked in risk assessments so far, need to be included in future risk assessments on robot operations.

The Investigation of Literature about fever (발열(發熱)에 관(關)한 문헌적(文獻的) 고찰(考察) -(황제내경(黃帝內經)을 중심(中心)으로)-)

  • Gyun, Hyun;Jeong, Seung-Gi;Lee, Hyeong-Gu
    • The Journal of Internal Korean Medicine
    • /
    • v.11 no.1
    • /
    • pp.1-13
    • /
    • 1990
  • We objerved the following results from The Yellow Emperior's Canon of Internal medicine through the investigation of literature about fever. 1. Fever is divieded two type asthenic fever sthenic heat and It accused two type of excess of Yang-exoganous heat, deficiency of Yin-internal fever 2. The cause of fever is divieded three type, exoganous cause, internal cause non-exoganouse and internal cause Among the cause of fever Exoganous cause is almost affected by cold-evil Internal cause is affected by deficiency of Yin and seven emotion caused by having sex after intoxigation or over-exertion, and non-exoganous and internal cause bring about the difference of a personal life and food and drink 3. The sympton produced by fever is appeared differently through-pulse and meridian and they are indication of Diagnosis 4. The theory of treatment about fever are as follows Drinking cold-water Practising acupuncture Trerating hot-evil by cold Dispel cold by warm Treating cold-evil by heat Promote vital energy circulation by cold Treating warm-evil by cold Promating circulation by cold Treating cold-evil by warm Promoting circulation by heat.

  • PDF

A Review of Studies on personal information (개인정보 연구동향과 과제)

  • Bang, Min Seok;Oh, Cheol H.
    • Informatization Policy
    • /
    • v.21 no.1
    • /
    • pp.3-16
    • /
    • 2014
  • The personal information is now considered more valuable and important topic in this highly improved knowledge information society. In this research, 50 research papers and government reports between 2000 and 2013 are analysed to understand a trend of academic research of the personal information. To summarize of the result of the analysis, firstly, there are many discussions and emphases to governmental protections of the personal information, mainly in the qualitative and legal system level. Secondly, there are insufficient researches of the personal information, particularly in the academic field rather than government and national research institutes. Thirdly, there are not sufficient investigations to approach influential reasons and relations of cause and effect, though there are much enough researches on the actual and present conditions of the protection of the personal information. To develop the investigation of the personal information, it needs to be considered to research more about systematic approach to the issue of personal information, expansion of research area considering the changeable IT environment, diverse methodological experiment like a metrical way, reformation of investigation system, and improved information management in the private sector.

Development and Validation of Privacy Concern Measurement Tool in Personal Medical Information (개인의료정보 프라이버시 염려 측정도구 개발 및 타당도 검증)

  • Lee, Kiho;Chung, Youngchul;Han, Kyeongseok;Song, Taemin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.6
    • /
    • pp.197-208
    • /
    • 2014
  • In an information society, privacy protection is one of the most important ethical issues. In medical institutes in which personal medical information is collected and stored, in addition, a privacy breach can cause a serious damage on personal lives. This study attempted to develop privacy concern measurement tool in personal medical information to measure patients' concern on their medical information from medical service consumers' perspective and verify its validity. For this, privacy concern measurement tool in personal medical information was developed based on the results of previous studies. After performing Exploratory Factor Analysis(EFA) and Confirmatory Factor Analysis(CFA) on the measurement tool, its reliability and validity were verified. It appears that the measurement tool would be useful in developing decent privacy protection policy after investigating citizens' concern on the protection of personal medical information and domains they are interested in. For medical institutes as well, they would be helpful in coming up with a reasonable plan after figuring out problems in the protection of personal medical information and current status.

Design and Implementation of a Smartphone Application for Loss Prevention with Precautionary Functions (예방 기능을 갖춘 스마트폰 분실방지 애플리케이션의 설계 및 구현)

  • Koh, Jeong Gook
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.9
    • /
    • pp.1098-1103
    • /
    • 2014
  • Smartphone is very much ingrained into our lives and it has propagated rapidly. With the growing expansion of smartphone, the number of lost smartphones has proliferated all the while. Unlike common personal belongings, smartphone is a high-priced goods and has personal information. In case it gets lost or stolen, it will cause monetary damage as well as secondary damage of personal information leaks. To lesson the damage, diverse applications that prevent the loss of a smartphone have been developed. But existing applications place emphasis on providing countermeasures that tracks the missing smartphones. Therefore, this paper describes the design and implementation of a smartphone application which provides precautionary functions to prevent the loss of a smartphone and countermeasures to track the missing smartphone. The implemented application prevents the loss of a smartphone using satefy zone and movement detection. In the event we lose a smartphone, it helps us recover a lost property using location tracking and remote control functions quickly and efficiently.

Development of Qualification Analysis Preliminary Frame for Railway Personal Injury Accident (철도 사상사고 위험도 평가를 위한 정량화 분석 기초모델 개발)

  • Park, Chan-Woo;Wnag, Jong-Bae;Park, Joo-Nam;Kwak, Sang-Log
    • Proceedings of the KSR Conference
    • /
    • 2007.05a
    • /
    • pp.1227-1232
    • /
    • 2007
  • The objective of this study is to develop qualification analysis preliminary frame for railway personal injury accident. In this research, we develop accident scenarios to analyze systematically and evaluate quantitatively fatality accident scenarios for railway personal. The accident scenario analysis first identifies the hazardous events and explains the hazardous conditions that surround the accident and cause railway accidents. This method includes a feasibility test, a clustering process and a pattering process for a clearer understanding of the accident situation. Since this method enables an accident scenario analysis to be performed systematically as well as objectively, this method is useful in building better accident prevention strategies. Therefore, this study could serve to reduce railway accidents and could be an effective tool for a hazard analysis.

  • PDF

Blockchain-based DID Problem Analysis Research (블록체인 기반의 DID 문제점 분석 연구)

  • Lee, Kwangkyu
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.18 no.3
    • /
    • pp.25-32
    • /
    • 2022
  • DID(Decentralized Identity Identification) is a system in which users voluntarily manage their identity, etc., and control the scope and subject of submission of identity information based on a block chain. In the era of the 4th industrial revolution, where the importance of protecting personal information is increasing day by day, DID will surely be positioned as the industrial center of the Internet and e-business. However, when managing personal information, DID is highly likely to cause a large amount of personal information leakage due to electronic infringement, such as hacking and invasion of privacy caused by the concentration of user's identity information on global service users. Therefore, there are a number of challenges to be solved before DID settles into a stable standardization. Therefore, in this paper, we try to examine what problems exist in order to positively apply the development of DID technology, and analyze the improvement plan to become a stable service in the future.