scholarly journals The use of the PN-EN 62305-2 standard to the risk assessment of losses in the equipped object in station- devices of the railway traffic controlling

2018 ◽  
Vol 180 ◽  
pp. 05006
Author(s):  
Zofia Wróbel

The valuation of the risk of losses makes easy the correct estimation of resulted threats as a result of atmospheric discharges and harms connected to them. Qualifying the need of lightning protection use for the object, we ought to take into account the risk R for the object and for the public services devices. In every case of examining risks we ought to fulfill: the identification of components RX forming the risk, counting the identified components of the risk RX, the entire risk R, identify the tolerated risk RT and compare the risk R with the tolerated value RT. As a result of such analysis we can come to a decision about the use of protection resources. In the report was realized the risk analysis of devices damages for a chosen object - the signal box with installed station - relaying devices of the railway traffic controlling with a computer adjustable control panel. From the realized analysis results that DEHN Risk Tool is a useful tool for the risk analysis of lightning losses in buildings, making possible the improvement of the calculations process, especially in the range of the choice of proper protection resources.

2019 ◽  
pp. 150-177
Author(s):  
Alex Griffiths

This chapter focuses on one particularly salient application of algorithmic regulation in the public sector—for the purposes of risk assessment to inform decisions about the allocation of enforcement resources, focusing on their accuracy and effectiveness in risk prediction. Drawing on two UK case studies in health care and higher education, it highlights the limited effectiveness of algorithmic regulation in these contexts, drawing attention to the pre-requisites for algorithmic regulation to fully play to its predictive strengths. In so doing, it warns against any premature application of algorithmic regulation to ever-more regulatory domains, serving as a sober reminder that delivering on the claimed promises of algorithmic regulation is anything but simple, straightforward or ‘seamless’.


2017 ◽  
Vol 7 (1) ◽  
pp. 1377-1381
Author(s):  
M. Mousavi ◽  
I. Ghazi ◽  
B. Omaraee

Risk assessment is a well-developed field which many operators are currently applying to improve their operations and reduce their risk exposure. This paper is intended to provide an overview of the risk assessment for mariners in the Maritime transportation. The risks addressed are primarily those affecting the safety of a vessel, facility or operation. The concept of risk is defined, and the methods available to assess the risks associated with an operation are described. Regulatory requirements that have prompted the development of modern risk assessment practices are described, and future regulatory trends are discussed. There are many different analysis techniques and models that have been developed to aid in conducting risk assessments. A key to any successful risk analysis is choosing the right method (or combination of methods) for the situation at hand. This is achieved through critical analysis of the available data concerning marine crises. This paper provides a brief introduction to some of the analysis methods available and suggests risk analysis approaches to support different types of decision making within the maritime transportation to cope with crises. Finally, as awareness of risk assessment increases, the benefits which can be realized through its application will continue to increase. Organizations in both the public and the private sector are becoming more and more familiar with the benefits associated with risk-based approaches to managing safety and consequently reducing crisis in maritime transportation.


Author(s):  
Devi Pratami

A project always has risks that can lead to project failure. In the project, a risk analysis is required to provide an evaluation for the project to proceed as planned. In the event of inadequate planning and ineffective control, it will result in irregularities identified as a risk to the project. This study aims to analyze the qualitative risk on Fiber Optic Installaion project in Sukabumi, West Java, Indonesia. In addition, risk assessment is undertaken on project implementation. Assessment of risk using the impact and probability to measure the impact of risk occurrence. The impacts are more detailed by classified by time impact, cost impact, quality impact, safety and security impact, proximity. The result is there are 36 risk that may occur and mostly risks are associaated by quality and safety&security impact.


Author(s):  
Bogdan Korniyenko ◽  
Lilia Galata

In this article, the research of information system protection by ana­ ly­ zing the risks for identifying threats for information security is considered. Information risk analysis is periodically conducted to identify information security threats and test the information security system. Currently, various information risk analysis techni­ ques exist and are being used, the main difference being the quantitative or qualitative risk assessment scales. On the basis of the existing methods of testing and evaluation of the vulnerabilities for the automated system, their advantages and disadvantages, for the possibility of further comparison of the spent resources and the security of the information system, the conclusion was made regarding the deter­ mi­ nation of the optimal method of testing the information security system in the context of the simulated polygon for the protection of critical information resources. A simula­ tion ground for the protection of critical information resources based on GNS3 application software has been developed and implemented. Among the considered methods of testing and risk analysis of the automated system, the optimal iRisk methodology was identified for testing the information security system on the basis of the simulated. The quantitative method Risk for security estimation is considered. Generalized iRisk risk assessment is calculated taking into account the following parameters: Vulnerabili­ ty  — vulnerability assessment, Threat — threat assessment, Control — assessment of security measures. The methodology includes a common CVSS vul­ nerability assessment system, which allows you to use constantly relevant coefficients for the calculation of vulnerabilities, as well as have a list of all major vulnerabilities that are associated with all modern software products that can be used in the automated system. The known software and hardware vulnerabilities of the ground are considered and the resistance of the built network to specific threats by the iRisk method is calculated.


2001 ◽  
Author(s):  
Jorge Calmon Moniz de Bittencourt Filho ◽  
Elizabeth R. Loiola

2020 ◽  
Vol 39 (4) ◽  
pp. 31-55
Author(s):  
Chiraz Ben Ali ◽  
Sabri Boubaker ◽  
Michel Magnan

SUMMARY This paper examines whether multiple large shareholders (MLS) affect audit fees in firms where the largest controlling shareholder (LCS) is a family. Results show that there is a negative relationship between audit fees and the presence, number, and voting power of MLS. This is consistent with the view that auditors consider MLS as playing a monitoring role over the LCS, mitigating the potential for expropriation by the LCS. Therefore, our evidence suggests that auditors reduce their audit risk assessment and audit effort and ultimately audit fees in family controlled firms with MLS. Data Availability: Data are available from the public sources cited in the text. JEL Classifications: G32; G34; M42; D86.


BMJ ◽  
1925 ◽  
Vol 2 (3375) ◽  
pp. 447-454
Keyword(s):  

Author(s):  
R. A. W. Rhodes

This chapter is not an example of comparative politics but of area studies, a field that is descriptive, cultural, historical, and contextual, seeking to analyse a country or region. The chosen area is the dominion countries of the British Commonwealth. The chosen method is the textual analysis of primary sources: speeches, writings, evidence to inquiries, and interviews by heads of the public services. This chapter analyses how the heads of the public services articulate the traditions of ‘constitutional bureaucracy’ found in Westminster systems of parliamentary government and selectively draw on past understandings to understand present-day changes. It describes traditions under challenge that reshape reforms as reforms reshape them. In each case, it is not a question of ‘in with the new, out with the old’, but of ‘in with the new alongside key components of the old’. The myths and legends of yore remain germane to the modern public service.


Sign in / Sign up

Export Citation Format

Share Document