• Title/Summary/Keyword: prevention of incidents

Search Result 167, Processing Time 0.024 seconds

Efficient countermeasures against e-terrorism (e-테러리즘의 효율적 통제방안)

  • Lee, Yoon-Ho;Kim, Dae-Kwon
    • Korean Security Journal
    • /
    • no.20
    • /
    • pp.271-289
    • /
    • 2009
  • In e-terrorism, terrorists use cyber spaces including the internet in order to strike terror into the heart of a nation. It is revealed that recently happening terror cases use cyber spaces as a strategic tool. This research aims to investigate efficient countermeasures against various types of terror attacks made by terrorists and their cyber networking, in order to contribute to the prevention of terrors from a modern standpoint. Based on the results of the investigation, relevant problems are suggested such that terrors are not cases happening in a specific country only because they take place in cyber spaces, that hacking incidents frequently happen in Korea which is used as a footstool by foreign hackers, and that Korea has poor professional security manpower and foundational facilities in comparison with other advanced countries. Answers to the problems include cultivating cyber information manpower to cope with e-terrorism, making an appropriate budget, setting up networks to integrate and systematize anti-e-terrorism organizations, and intensifying the collection of information of cyber attacks and the analysis of the information.

  • PDF

Research on digital evidence-based countermeasure depending on the type of small and medium-sized enterprises technology leakage accident (중소기업 기술유출사고 유형에 따른 디지털증거기반 대응방안 연구)

  • Jaeyun Wang;Hangbae Chang
    • Journal of Platform Technology
    • /
    • v.12 no.1
    • /
    • pp.67-76
    • /
    • 2024
  • Small and medium-sized enterprises play a fundamental role in the foundation of our country's industry and economy, and most technological innovations occur in small and medium-sized enterprises rather than large corporations. Technology development and innovation are the only way for small and medium-sized enterprises to survive in a fiercely competitive environment, so they focus on it, but interest and investment in technology protection tend to be stingy. As a result, industrial technology leakage accidents occur frequently, and it is difficult to meet improvement measures. When a leak occurs, digital evidence is required to prove criminal activity, but problems such as digital evidence being damaged or deleted due to management loopholes often occur. Therefore, through this study, we aim to design a digital evidence-based countermeasure depending on the type of technology leak accident. We will classify the types of technology leak incidents that actually occurred and study ways to secure digital evidence in the security environment of small and medium-sized businesses that operate internal information leak prevention solutions.

  • PDF

Overview of Major Oil Spill at Sea and Details of Various Response Actions -1. Number and Volume of Marine Oil Spills in Korea and in the World (대형 기름유출사고와 방제조치에 관한 연구 -1. 국내외 해양기름오염사고 건수와 유출량)

  • Kim, Kwang-Soo
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.19 no.2
    • /
    • pp.129-137
    • /
    • 2013
  • In order to obtain quantitative basic data for marine oil pollution prevention, the statistics of oil spill incidents in Korea and in the world for 20 years from 1993 to 2012 were collected and analyzed with relation to the number of oil spills and the amount of oil spilt. In Korea for 20 years, total number and average annual number of oil spills were 6,608 cases and nearly 330 cases/year, respectively, and total volume and average annual volume of oils spilt were 57,328 kL and nearly 2,866 kL/year, respectively. Due to major oil spills from oil tankers, annual volumes of oils spilt in Korea were sharply increased to 15,388 kL in 1993, 15,773 kL in 1995, 3,428 kL in 1997 and 13,008 kL in 2007. In case of worldwide oil spills for 20 years, total number and average annual number of oil spills of 8 kL (or 7 tonnes) and above were 420 cases and 21 cases/year, respectively, and total amount and average annual amount of oils spilt 8 kL (or 7 tonnes) and above were about 800,000 kL (or 704,000 tonnes) and about 40,000 kL/year (or 35,200 tonnes/year), respectively. Major oil spills from oil tankers increased massively annual amounts of oils spilt worldwide to about 159,000 kL (or 140,000 tonnes) in 1993, about 147,600 kL (or 130,000 tonnes) in 1994, about 90,900 kL (80,000 tonnes) in 1996, about 81,800 kL (72,000 tonnes) in 1997 and about 76,100 kL (or 67,000 tonnes) in 2002. Obvious correlation between annual number of oil spills and annual amount of oil spilt was not found in both Korea and the world, while both annual number and annual volume tended to decrease with the lapse of year in both Korea and the world, though there were wide fluctuations from year to year in both annual number of oil spills and annual amount of oils spilt worldwide and in Korea for 20 years. From 2008 to 2012 worldwide, there were sharp decreases in both annual number and annual amount of oil spills. In particular, no oil spill of 800 kL (or 700 tonnes) and above occurred in the year of 2012.

The Behavioral Attitude of Financial Firms' Employees on the Customer Information Security in Korea (금융회사의 고객정보보호에 대한 내부직원의 태도 연구)

  • Jung, Woo-Jin;Shin, Yu-Hyung;Lee, Sang-Yong Tom
    • Asia pacific journal of information systems
    • /
    • v.22 no.1
    • /
    • pp.53-77
    • /
    • 2012
  • Financial firms, especially large scaled firms such as KB bank, NH bank, Samsung Card, Hana SK Card, Hyundai Capital, Shinhan Card, etc. should be securely dealing with the personal financial information. Indeed, people have tended to believe that those big financial companies are relatively safer in terms of information security than typical small and medium sized firms in other industries. However, the recent incidents of personal information privacy invasion showed that this may not be true. Financial firms have increased the investment of information protection and security, and they are trying to prevent the information privacy invasion accidents by doing all the necessary efforts. This paper studies how effectively a financial firm will be able to avoid personal financial information privacy invasion that may be deliberately caused by internal staffs. Although there are several literatures relating to information security, to our knowledge, this is the first study to focus on the behavior of internal staffs. The big financial firms are doing variety of information security activities to protect personal information. This study is to confirm what types of such activities actually work well. The primary research model of this paper is based on Theory of Planned Behavior (TPB) that describes the rational choice of human behavior. Also, a variety of activities to protect the personal information of financial firms, especially credit card companies with the most customer information, were modeled by the four-step process Security Action Cycle (SAC) that Straub and Welke (1998) claimed. Through this proposed conceptual research model, we study whether information security activities of each step could suppress personal information abuse. Also, by measuring the morality of internal staffs, we checked whether the act of information privacy invasion caused by internal staff is in fact a serious criminal behavior or just a kind of unethical behavior. In addition, we also checked whether there was the cognition difference of the moral level between internal staffs and the customers. Research subjects were customer call center operators in one of the big credit card company. We have used multiple regression analysis. Our results showed that the punishment of the remedy activities, among the firm's information security activities, had the most obvious effects of preventing the information abuse (or privacy invasion) by internal staff. Somewhat effective tools were the prevention activities that limited the physical accessibility of non-authorities to the system of customers' personal information database. Some examples of the prevention activities are to make the procedure of access rights complex and to enhance security instrument. We also found that 'the unnecessary information searches out of work' as the behavior of information abuse occurred frequently by internal staffs. They perceived these behaviors somewhat minor criminal or just unethical action rather than a serious criminal behavior. Also, there existed the big cognition difference of the moral level between internal staffs and the public (customers). Based on the findings of our research, we should expect that this paper help practically to prevent privacy invasion and to protect personal information properly by raising the effectiveness of information security activities of finance firms. Also, we expect that our suggestions can be utilized to effectively improve personnel management and to cope with internal security threats in the overall information security management system.

  • PDF

A Study on the Types of Crime and Scalability in Metaverse (메타버스 내 범죄발생 유형과 확장성에 관한 연구)

  • Song, HyeJin;Nam, Wanwoo
    • Journal of the Society of Disaster Information
    • /
    • v.18 no.1
    • /
    • pp.218-227
    • /
    • 2022
  • Purpose: In the case of cavity discovered by ground penetrating radar exploration, it is necessary to accurately predict the filling amount in the cavity in advance, fill the cavity sufficiently and exert strength to ensure stability and prevent ground subsidence. Method: The cavity waveform analysis method by GPR exploration and the method using the cavity shape imaging equipment were performed to measure the cavity shape with irregular size and shape of the actual cavity, and the amount of cavity filling of the injection material was calculated during rapid restoration. Result: The expected filling amount was presented by analyzing the correlation between the cavity size and the filling amount of injection material according to the cavity scale and soil depth through the method by GPR exploration and the cavity scale calculation using the cavity shaping equipment. Conclusion: The cavity scale measured by the cavity imaging equipment was found to be in the range of 20% to 40% of the cavity scale by GPR exploration. In addition, the filling amount of injection material compared to the cavity scale predicted by GPR exploration was in the range of about 60% to 140%, and the filling amount of the injection material compared to the cavity size by the cavity shaping equipment was confirmed to be about 260% to 320 Purpose: The purpose of this study is to examine the types of crimes taking place in the metaverse, and to establish a crime prevention strategy and find a legal deterrent against it. Method: In order to classify crime types in the metaverse, crime types were analyzed based on the results of previous studies and current incidents. Result: Most of the crimes taking place in the metaverse are done in games such as Roblox or Zeppetto. Most of the game users were teenagers. Looking at the types, there are many teens for sexual crimes, violent crimes, and defamation, but professional criminals are often included in copyright infringement, money laundering using virtual currency, and fraud. Conclusion: Since the types of crimes in the metaverse are diverse, various institutional supplementary mechanisms such as establishment of police crime prevention strategies, legal regulations, and law revisions will have to be prepared.

Assessing Risks and Categorizing Root Causes of Demolition Construction using the QFD-FMEA Approach (QFD-FMEA를 이용한 해체공사의 위험평가와 근본원인의 분류 방법)

  • Yoo, Donguk;Lim, Nam-Gi;Chun, Jae-Youl;Cho, Jaeho
    • Journal of the Korea Institute of Building Construction
    • /
    • v.23 no.4
    • /
    • pp.417-428
    • /
    • 2023
  • The demolition of domestic infrastructures mirrors other significant construction initiatives in presenting a markedly high accident rate. A comprehensive investigation into the origins of such accidents is crucial for the prevention of future incidents. Upon detailed inspection, the causes of demolition construction accidents are multifarious, encompassing unsafe worker behavior, hazardous conditions, psychological and physical states, and site management deficiencies. While statistics relating to demolition construction accidents are consistently collated and reported, there exists an exigent need for a more foundational cause categorization system based on accident type. Drawing from Heinrich's Domino Theory, this study classifies the origins of accidents(unsafe behavior, unsafe conditions) and human errors(human factors) as per the type of accidents experienced during demolition construction. In this study, a three-step model of QFD-FMEA(Quality Function Deployment - Failure Mode Effect Analysis) is employed to systematically categorize accident causes according to the types of accidents that occur during demolition construction. The QFD-FMEA method offers a technique for cause classification at each stage of the demolition process, including direct causes(unsafe behavior, unsafe environment), and human errors(human factors) through a tri-stage process. The results of this accident cause classification can serve as safety knowledge and reference checklists for accident prevention efforts.

CQI Action Team Approach to Prevent Pressure Sores in Intensive Care Unit of an Acute Hospital Korea (중환자의 욕창 예방 연구 : 욕창 예방 QI팀을 중심으로)

  • Kang, So Young;Choi, Eun-Kyung;Kim, Jin-Ju;Ju, Mi-Jung
    • Quality Improvement in Health Care
    • /
    • v.4 no.1
    • /
    • pp.50-63
    • /
    • 1997
  • Background : A pressure sore was defined as any skin lesion caused by unrelieved pressure and resulting in damage to underlying tissue. The health care institutions in the United States were reported the incident rate of pressure sores ranging from 6 to 14 %. Intensive Care Unit needed highest quality of care has been found over 40% incidence rate of pressure sore. Also, Annual expenditures for the care of pressure sores in patients in the United States have been estimated to be $7.5 billion; furthermore, 50 percent more nursing time is required to care for patients with pressure sore in comparison to the time needed to implement preventive measures against pressure sore formation. However, In Korea, there were little reliable reports, or researches, about incidence rates of pressure sore in health care institution including intensive care unit and about the integrated approach like CQI action team for risk assessment, prevention and treatment of pressure ulcers. Therefore, this study was to develop pressure sore risk assessment tool and the protocol for prevention of pressure sore formation through CQI action team activities, to monitor incident rate of pressure sore and the length of sore formation for patients at high risk, and to approximately estimate nursing time for sore dressing during research period as the effect of CQI action team. Method : CQI action team in intensive care unit, launched since early 1996, reviewed the literature for the standardized risk assessment tool, developed the pressure sore assessment tool based on the Braden Scale, tested its validity, compared on statistics including incidence rate of pressure sore for patients at high risk. Throughout these activities, CQI action team was developed the protocol, called as St. Marys hospital Intensive Care Unit Pressure Sore Protocol, shifted the emphasis from wound treatment to wound prevention. After applied the protocol to patients at high risk, the incident rate and the period of prevention against pressure development were tested with those for patients who received care before implementation of protocol by Chi-square and Kaplan-Meier Method of Survival Analysis. Result : The CQI action team found that these was significant difference of in incidence rate of pressure sores between patients at high risk (control group) who received care before implementation of protocol and those (experimental group) who received it after implementation of protocol (p<.05). 25% possibility of pressure sore formation was shown for the patients with 6th hospital day in ICU in control group. In experimental group, the patients with 10th hospital day had 10% possibility of pressure sore. Therefore, there was significant difference(p<.05) in survival rate between two groups. Also, nursing time for dressing on pressure sore in experimental group was decreased as much as 50% of it in control group. Conclusion : The collaborative team effort led to reduced incidence, increased the length of prevention against pressure sore, and declined nursing care times for sore dressing. However, there have had several suggestions for future study. The preventive care system for pressure sore should be applied to patients at moderate, or low risk throughout continuous CQI team activities based on Bed Sore Indicator Fact Sheet. Hospital-wide supports, such as incentives, would be offered to participants for keeping strong commitment to CQI team. Also, Quality Information System monitoring incidents and estimating cost of poor quality, like workload (full time equivalence) or financial loss, regularly in a hospital has to be developed first for supporting CQI team activities as well as empowering hospital-wide QI implementation. Being several limitations, this study would be one of the report cards for the CQI team activities in intensive care unit of an acute hospital and a trial of quality improvement of health care in Korea.

  • PDF

A Study on Rethinking the Operating of Counter-terrorism Systems in South Korea (한국 대테러시스템 운영의 재모색)

  • Kwon, Jeong-Hoon
    • Korean Security Journal
    • /
    • no.51
    • /
    • pp.153-170
    • /
    • 2017
  • The purpose of this study is to rediscover the operation of anti-terrorism system focusing on the system approach and crisis management approach for counter terrorism in Korea. According to the results of this study, it is required to establish a link between open systems and integrative system focusing on functional linkage of counter-terrorism systems, and cooperative measures with private sectors in the dimension of governance activation. Further, it is necessary to prepare legal foundations for the cooperation with private sectors and then promote open consciousness transformation through the partnership with private security for anti-terrorism activities. In addition, in its preventive stage, it is required to prepare legal systems related to biochemical terrorism for stronger regulations through crisis-managerial approach. Next, in its preparatory stage, it is necessary to prepare education and enact named Terror Prevention Day for increasing terror safety consciousness, and then extend citizen reporting reward systems to enable citizens to participate and become interested voluntarily in terror prevention. Also, it is essential to establish the substantial training system for preparing for terror occurrence. Moreover, in its response stage, it is urgent to construct networks between related institutions to manage field and spot responses with integrative management systems through information sharing. Furthermore, in its restoration stage, it is indispensible to prepare long-term management systems for injured persons and families of the deceased from terror incidents.

  • PDF

The Child Sexual Assaults by Kin -The Experience of YoungNam District Sunflower Center for Prevention of Child Sexual Assaults- (친족에 의한 아동 성폭력 실태 - 영남권역 해바라기 아동센터의 경험 -)

  • Seo, Sun-Ki;Lee, Sang-Han
    • Journal of forensic and investigative science
    • /
    • v.2 no.2
    • /
    • pp.21-29
    • /
    • 2007
  • News from the media on sexual assaults to children committed by natural fathers doesn't attract social attention any more. The number of crimes related to Child Sexual Assault(CSA) is increasing every year in spite of the "Special Act on Prevention of Sexual Assault in Korea". The YoungNam District Sunflower Center for prevention of Child Sexual Assaults(SC-CSA) was established in Daegu, June 2005. The YoungNam District SC-CSA provides forensic evaluation of physical evidence, medical and psychological treatment for the victims less than 13 years of sexual assaults simultaneously. This study carried out 36 cases of CSA by kin reported to YoungNam District SC-CSA, among 180 cases in total until December 2006 since its opening. Most of the victims were girls (32 cases). 28 cases (78%) were indecent assaults (78%) and 8 cases (22%) were rapes. The assailants were overwhelmingly males (35 cases). The assailants of 21 cases (58.3%) were identified as the victims' natural fathers. The incident locations were victim's residence (31 cases, 86.1%) and the victims had been sexually assaulted regularly for many years (25 cases, 69.4%). Considering the above research, we can conclude that CSA committed by kin has specific characteristics. CSA is not a one-time incident, but consistently occurring crime. However, in 22 cases (61.1%), the victim's guardian didn't want to report about it or punish the assailants. As the assailants were natural fathers or relatives of the victims, the other family members probably thought it might be shameful to reveal their wrong doings and would lead to defamation of their family's reputation. The SC-CSA provides the counseling and medical treatment to the victims with the consent of the parents. Due to the guardians' misjudgment, the incident is sometimes not reported to the police. By not reporting the incident to the police, the assailant freely commits other crimes, which multiplies victims. The legal Act of supporting the management of the SC-CSA is still not regulated, so the stability of the SC-CSA is not guaranteed, yet. Even though it is obligatory to report incidents to the police, some cases are still not reported. Currently, there are three SC-CSA centers : in Seoul, in Daegu, and in Gwangju. More centers need to be established to diminish CSA cases in Korea.

  • PDF

A Study on improvement of traffic accident safety index for Uljugun, Ulsan (교통사고 안전지수 등급 향상방안 연구_울산광역시 울주군 중심으로)

  • Kim, Yong Moon;Kang, Seong Kyung;Lee, Young Jai
    • Journal of Korean Society of Disaster and Security
    • /
    • v.10 no.2
    • /
    • pp.7-19
    • /
    • 2017
  • Recently, the incidence of disasters and safety incidents is increasing rapidly, and the interest and demands of the people are increasing. In particular, traffic accidents in Korea are decreasing due to the continuous efforts of the government and the local governments, but still higher than the OECD average. In response to such demands of the times, the 'Regional Safety Index', a numerical value that quantifies the level of safety of each local government, is being publicized every year to awaken public awareness. The Regional Safety Index covers seven categories of accidents (traffic accidents, crimes, suicide, infectious diseases, fire, safety accidents, and natural disasters) in local governments. But, this study focuses on the traffic accident area and analyzed. The target local government is Ulju county of Ulsan Metropolitan City. Based on the traffic accident statistical data of Ulju county, the analysis of the traffic accidents and vulnerable points were analyzed. Among them, 3 key improvement districts were selected and 15 vulnerable branches were selected for each key improvement district. Next, we prepared measures for improvement of each accident vulnerable site through analysis of geographic information through traffic data related to traffic accidents and interview with related organizations. In addition, the improvement measures are divided into the structural infrastructure improvement, the institutional improvement, and the traffic safety culture movement from the viewpoint of traffic accident prevention. Finally, the implications of this study are to clarify the duties and roles of the relevant departments in the municipality, based on the implementation schedule of the improvement projects for the prevention of traffic accidents and the budget plan. In addition, it is very important that the participating agencies involved in traffic accidents and the private sector participate in the project.