• Title/Summary/Keyword: risk process

Search Result 2,892, Processing Time 0.03 seconds

A Study on Correlation Analysis of Risk Factors for Urban Regeneration Using ISM method (ISM기법을 이용한 도시재생사업 리스크 요인의 상관성 분석에 관한 연구)

  • Park, Beom-Suk;Jin, Run-Zhi;Han, Sangwon;Hyun, Chang-Taek
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2013.05a
    • /
    • pp.192-193
    • /
    • 2013
  • In recent years, risks associated with mixed used development in urban regeneration projects which have actively been implemented have been on the rise due to uncertainties and complexities of those projects. Thus, risk management is needed to effectively manage those risks that may occur during the process of a project. Many studies have contributed to deal with risk management of those projects. These studies, however, have focused main on identification stage and deriving the main risk factors and have limitations on presenting the relationship among those risk factors. Since many risks are interdependent and have multiple effects, the purpose of this study is to present a way(ISM method) to provide a hierarchical structural framework of risks in Urban Regeneration. The structural of risks can helps decision makers to trace the actual source of these risks.

  • PDF

A Study on the Risk Index Model of Work Type in Architectural Construction Work (건축공사 공종별 위험지수 산정모델에 관한 연구)

  • Chang, Seong-Rok;Go, Seong-Seok;Lee, Jong-Bin
    • Journal of the Korean Society of Safety
    • /
    • v.22 no.6
    • /
    • pp.63-68
    • /
    • 2007
  • The purpose of this study is to verify the relation between the risk index using AHP(Analytic Hierarchy Process) and the risk index using Computing Model. For doing the objective, this research classified 22 work types in architectural construction work from the analysis Korean architectural standard specification and Korea occupational safety & health agency code. Based on the classified 22 work types in architectural construction work, the risk index of each work type was calculated by AHP and Computing Model. For verifying the correlation of risk index between AHP and Computing Model methods, SAS version 8.0 System, which is one of the statistics programs, was used.

A Risk Metric for Failure Cause in FMEA under Time-Dependent Failure Occurrence and Detection (FMEA에서 고장발생 및 탐지시간을 고려한 고장원인의 위험평가 척도)

  • Kwon, Hyuck Moo;Hong, Sung Hoon;Lee, Min Koo
    • Journal of Korean Society for Quality Management
    • /
    • v.47 no.3
    • /
    • pp.571-582
    • /
    • 2019
  • Purpose: To develop a risk metric for failure cause that can help determine the action priority of each failure cause in FMEA considering time sequence of cause- failure- detection. Methods: Assuming a quadratic loss function the unfulfilled mission period, a risk metric is obtained by deriving the failure time distribution. Results: The proposed risk metric has some reasonable properties for evaluating risk accompanied with a failure cause. Conclusion: The study may be applied to determining action priorities among all the failure causes in the FMEA sheet, requiring further studies for general situation of failure process.

The development of CAMBRA; Updated CRA (Caries management by risk assessment (CAMBRA)의 발전; CRA 업데이트)

  • Lee, Su-Young
    • Journal of Korean society of Dental Hygiene
    • /
    • v.21 no.4
    • /
    • pp.321-336
    • /
    • 2021
  • The aim of this study was to investigate the caries management by risk assessment (CAMBRA) development process and the latest updated caries risk assessment for the domestic settlement of the CAMBRA program and the activation of dental clinics. A system for CAMBRA was published in California Dental Association (CDA) in 2007. To investigate whether CAMBRA can be successfully implemented outside a university setting, a practice-based research network (PBRN) was created in the San Francisco Bay Area. Based on the CAMBRA-PRAN clinical studies, the caries risk assessment (CRA) tool was updated for patients aged 6 through adults in 2019. The CAMBRA system is expected to be widely and actively used in the dental field in Korea to contribute to oral health care.

An Exploratory Study on the Information Technology Outsourcing Risk Factors: An IPO Perspective (IPO 관점에서의 정보기술 아웃소싱 위험요인에 관한 탐색적 연구)

  • Yang Kyung sik;Kim Hyun soo
    • Journal of Information Technology Applications and Management
    • /
    • v.11 no.3
    • /
    • pp.35-62
    • /
    • 2004
  • Recently, IT outsouricng has been one of the major concerns of many companies. This paper explores the relationship between information technology outsourcing risk factors and outsourcing performance. It is based upon a three-phase process utilizing IPO (Input-Process-Output) system. The first phase means the outsourcing planning risks t~at arise from overall environment of outsourcing, organizational refuse, and wrong contracts. The second phase implies outsourcing operational risks, which are occurred while out-sourcing perform and consist of organizational acceptances of outsourcing, partnership and hidden costs. The last phase is outsourcing performance based on four perspective of BSC(Blanced Scored Card). The survey was performed on the IT/IS firms, and the data was collected from 53 service receivers. The result of the analysis are as follows. First, Outsourcing planning risks positively affects the operational risks. Second, Outsourcing operational risks negatively affects the Outsourcing Performance.

  • PDF

Extended Linear Vulnerability Discovery Process

  • Joh, HyunChul
    • Journal of Multimedia Information System
    • /
    • v.4 no.2
    • /
    • pp.57-64
    • /
    • 2017
  • Numerous software vulnerabilities have been found in the popular operating systems. And recently, robust linear behaviors in software vulnerability discovery process have been noticeably observed among the many popular systems having multi-versions released. Software users need to estimate how much their software systems are risk enough so that they need to take an action before it is too late. Security vulnerabilities are discovered throughout the life of a software system by both the developers, and normal end-users. So far there have been several vulnerability discovery models are proposed to describe the vulnerability discovery pattern for determining readiness for patch release, optimal resource allocations or evaluating the risk of vulnerability exploitation. Here, we apply a linear vulnerability discovery model into Windows operating systems to see the linear discovery trends currently observed often. The applicability of the observation form the paper show that linear discovery model fits very well with aggregate version rather than each version.

Transient and Stationary Analyses of the Surplus in a Risk Model

  • Cho, Eon Young;Choi, Seung Kyoung;Lee, Eui Yong
    • Communications for Statistical Applications and Methods
    • /
    • v.20 no.6
    • /
    • pp.475-480
    • /
    • 2013
  • The surplus process in a risk model is stochastically analyzed. We obtain the characteristic function of the level of the surplus at a finite time, by establishing and solving an integro-differential equation for the distribution function of the surplus. The characteristic function of the stationary distribution of the surplus is also obtained by assuming that an investment of the surplus is made to other business when the surplus reaches a sufficient level. As a consequence, we obtain the first and second moments of the surplus both at a finite time and in an infinite horizon (in the long-run).

Quantitative Hazard Analysis of Information Systems Using Probabilistic Risk Analysis Method

  • Lee, Young-Jai;Kim, Tae-Ho
    • Journal of Information Technology Applications and Management
    • /
    • v.16 no.3
    • /
    • pp.59-71
    • /
    • 2009
  • Hazard analysis identifies probability to hazard occurrence and its potential impact on business processes operated in organizations. This paper illustrates a quantitative approach of hazard analysis of information systems by measuring the degree of hazard to information systems using probabilistic risk analysis and activity based costing technique. Specifically the research model projects probability of occurrence by PRA and economic loss by ABC under each identified hazard. To verify the model, each computerized subsystem which is called a business process and hazards occurred on information systems are gathered through one private organization. The loss impact of a hazard occurrence is produced by multiplying probability by the economic loss.

  • PDF

Risk Analysis and Hazard Control Process for Vital Train Control Systems (바이탈 열차제어시스템의 리스크 분석 및 헤저드 제어방법)

  • Hwang, Jong-Gyu;Jo, Hyun-Jeong;Yoon, Yong-Ki
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.951-952
    • /
    • 2006
  • Railway signaling systems are so vital to ensure the safe operation of railroad and the assurance and demonstration of the safety is so important. The safety management process shall consist of a number of phases and activities, which are linked to form the safety life-cycle. The basic processes of safety management and safety activity throughout the lifecycle are 'risk analysis' and 'hazard control'. The safety managements and activities for the two kinds of aspects are implemented throughout the whole steps of system lifecycle. The risk analyses and hazard controls like those are needed, these activities have to be carried out through the whole of system lifecycle.

  • PDF

Design criteria of wind barriers for traffic -Part 2: decision making process

  • Kim, Dong Hyawn;Kwon, Soon-Duck;Lee, Il Keun;Jo, Byung Wan
    • Wind and Structures
    • /
    • v.14 no.1
    • /
    • pp.71-80
    • /
    • 2011
  • This study presents a decision making process for installation of wind barrier which is used to reduce the wind speed applied to running vehicles on expressway. To determine whether it is needed to install wind barrier or not, cost and benefit from wind barrier are calculated during lifetime. In obtaining car accidental risk, probabilistic distribution of wind speed, daily traffic volume, mixture ratio in the volume, and duration time for wind speed range are considered. It is recommended to install wind barrier if benefit from the barrier installation exceed construction cost. In the numerical examples, case studies were shown for risk and benefit calculation and main risky regions on Korean highway were all evaluated to identify the number of installation sites.