Guidelines to Conducting Threat Susceptibility and Identification Assessments of Pipelines Prior to Reactivation

Author(s):  
Chad Bunch ◽  
Glenn Cameron ◽  
Rafael G. Mora

This paper provides guidelines to identify all threats and assess a pipeline’s susceptibility to those threats in order to select appropriate and effective mitigation, monitoring, and prevention measures prior to reactivating pipelines. The intent of this paper is to provide pipeline operators, consultants and regulatory agencies with a generic threat assessment approach that has to be customized to the pipeline-specific characteristics and conditions, and the regulatory requirements of its own jurisdiction. A literature review and authors’ experiences across the pipeline industry have identified the need for a generic, yet complete approach that guides pipeline integrity engineers in the methodologies that adequately and effectively assess threats prior to reactivation and that can be validated in a timely manner during the operations. Pipeline operators may be called on to reactivate pipelines that are facing challenges such as aging, changes in operational conditions, lack of maintenance and inconsistent integrity practices while facing constraints from increasing population density, higher pressure and flow throughput requirements of a competitive marketplace, and regulatory requirements insisting on higher levels of safety and protection of the environment. This paper was structured with the following components to assist the reader in conducting threat assessments: • Current regulations and recognized industry standards with respect to reactivating pipelines; • Definition of and differentiation between hazard and threat; • Hazard identification analysis for the known and potential situations, events and conditions; and • Threat susceptibility and identification analysis process for the known categories derived from the hazard identification process. A case study is described as an example of applying the guidelines to conduct threat susceptibility and identification assessments of a pipeline prior to its reactivation. The results from the threat susceptibility and identification assessment process can help operators, consultants and regulators in determining effective inspection, mitigation, prevention and monitoring measures.

Buildings ◽  
2020 ◽  
Vol 10 (6) ◽  
pp. 109 ◽  
Author(s):  
Elena Perria ◽  
Mike Sieder

Each construction material deals with specific mechanical properties, their distribution, damage mechanisms, and degradation processes. Therefore, each material requires a particular assessment approach in order to derive a reliable description of the residual performance of the structure, correctly remove the cause of damage, and proceed with the correct design of interventions. The aims of this paper are, first, the definition of a process of assessment and retrofitting of existing timber structures, both for engineered and heritage/traditional timber structures, and second, a comparison between the defined assessment process and its contents, and the content of existing guidelines, codes, and standards. In order to gain a definition of the process of assessment and retrofitting of existing timber structures, the content of scientific papers and articles was analyzed, and on this basis, an assessment process with six main steps and three milestones was developed. The content of the guidelines, codes and standards was afterwards analyzed basing on this six-steps assessment process. From a comparison among the current literature, guidelines, codes, and standards, interesting results emerged that gave us a picture of the European knowledge and interests on the assessment of existing timber structures. Not only agreement, but also discrepancies, variances, and incongruities were identified as possible topics for future research.


2011 ◽  
Vol 328-330 ◽  
pp. 2400-2404
Author(s):  
Zi Qi Ju

To prevent runway incursions, we should have the corresponding systematic prevent ideas. Based on the definition of runway incursions and classification of relevant criteria, it analyzed the runway incursion system, put forward the closed-loop management ideas to prevent runway incursions, and found the main contradictions of preventing runway incursions using the gray relational analysis. With the example of runway incursion dates of U.S.A, by means of Grey Relational Analysis of different severities and different factors for runway incursions, it have shown that the key factors leading to the class AB and class CD runway incursions are Vehicle/Pedestrian Deviations and Pilot Deviations respectively. Meanwhile, it proposed integrated prevention measures of runway incursions.


Author(s):  
Shailesh Javia

Integrity management of pipelines is a systematic, comprehensive and integrated approach to proactively counter the threats to pipeline integrity. Pressure testing, in-line inspection and direct assessment methods are used to verify the integrity of a buried pipeline. The Paper Discuses Direct Assessment Methodologies for Hydrocarbon Non Piggable Pipelines. Advantages and Disadvantages of Direct Assessment methodology and DA Protocols. The DA process accomplishes this by utilizing and integrating condition monitoring, effective mitigation, meticulous documentation and timely structured reporting processes. DA is a structured, iterative integrity assessment process through which an operator may be able to assess and evaluate the integrity of a pipeline segment. TIME DEPENDENT THREATS INEVITABLY LED TO NUMEROUS FAILURES WITH A COMMON DEFINING MECHANISM OR SOURCE – CORROSION. This Paper will focus on internal, external and stress corrosion cracking direct assessment along with pre and post assessment, quality assurance, data analysis and integration, and remediation and mitigation activities. This paper will discuss some of the regulatory requirements for Pipeline Integrity Management System.


Author(s):  
Randy Borum

Though targeted attacks at schools are rare events, educators and behavioral health professionals working in those settings must evaluate threats and threatening situations when they occur. Schools across the world have experimented with different methods over time, but the threat assessment approach—particularly executed by an interdisciplinary team—has emerged as abest practice. This chapter describes the results of the Safe School Initiative, an in-depth case analysis of 37 targeted school attacks involving 41 attackers over a 25-year period, and their implications for understanding the attackers, the situations, the settings, and the targets. It addresses the continuum of threats that schools may encounter and offers some heuristics for decision making, including recent research on key indicators of intent. It concludes by emphasizing the need for schools to have incident and post-incident response plans to mitigate harm if an attack does occur.


2018 ◽  
Author(s):  
Robert C Wilson

Prevalence-induced concept change is the process by which the definition of a concept can shift as the prevalence of that concept changes. In a series of beautiful experiments, Levari and colleagues (2018) demonstrated that prevalence-induced concept change occurs across a range of situations, from color perception to threat assessment to ethical judgment. Here we show that in all of these cases the extent of prevalence-induced concept change is accounted for by sequential effects in which previous stimuli and responses bias the upcoming categorization. Crucially, these sequential effects are always active, even when the prevalence is does not change. Thus, by modeling these effects, we were able to predict the magnitude of prevalence-induced concept change based on participants’ behavior when the prevalence is fixed. This suggests that sequential effects are the mechanism by which prevalence-induced concept change occurs.


2008 ◽  
Vol 3 (3) ◽  
Author(s):  
M. Möderl ◽  
D. Vanham ◽  
S. De Toffo ◽  
W. Rauch

One of the most important aspects in water supply management is supply security. In this article a methodology is introduced to first identify vulnerable sites of a water supply system (WSS) and second to estimate the potential effect of alpine natural hazards on this system. The approach serves for the definition of zones with low, medium and high potential risk by combining vulnerability and hazard maps. This approach enables the possibility to accomplish prevention measures on risky sites considering the available budget. A management support tool (VulNetWS - Vulnerability of Water Supply Networks) is developed which quantifies vulnerability based on hydraulic and quality simulations assuming component failure of each single WSS component. Hazards of flooding, landslide, debris flow and avalanches are calculated and categorized in potential low, medium and high hazard zones. For this analysis different GIS data sets (e.g. Austrian hazard zone maps, HORA “Flood Risk Zoning”) are used. The methodology is presented by applying it upon an alpine region encompassing the municipality of Kitzbühel (Tyrol - Austria) and 4 neighbouring municipalities. The combination of vulnerability and hazard is summarized using a risk matrix that highlights a zone of 0.42 square kilometres within the study area as being potentially risky.


Author(s):  
Xavier Ortiz ◽  
Dan Jungwirth ◽  
Yashar Behnamian ◽  
Hossein Jiryaei Sharahi

Abstract Composite sleeve repairs have been used in the pipeline industry for the last 25+ years. Fiberglass sleeves (e.g., Clock Spring®) were initially introduced in the market and are still being used as a proven pipeline repair method. For the last 15+ years, new composite materials have been introduced in the industry to provide a wider variety of repair options depending on the type of imperfections being repaired. Regulations in the U.S.A. and Canada share some requirements regarding design, installation, testing, and assessment of composite sleeve repairs. The U.S. Department of Transportation (DOT) through the Pipeline and Hazardous Materials Safety Administration (PHMSA) recommends the use of repair methods consistent with industry standards. The 2019 version of the Canadian CSA Z662 Oil and Gas Pipeline Standard includes requirements for testing and qualification according to the American Society of Mechanical Engineers (ASME) regulation PCC-2 or ISO/TS 24817, and requirements for conducting an engineering assessment to determine the subsequent maximum stress on the pipe sleeve. This paper compares the regulatory requirements for pipeline composite sleeve repairs in the U.S.A. and Canada; it describes some of the options for composite sleeve repair, and reviews engineering assessments of methodologies for composite sleeve repair.


Author(s):  
Shakeel Ali

A rapidly changing face of internet threat landscape has posed remarkable challenges for security professionals to thwart their IT infrastructure by applying advanced defensive techniques, policies, and procedures. Today, nearly 80% of total applications are web-based and externally accessible depending on the organization policies. In many cases, number of security issues discovered not only depends on the system configuration but also the application space. Rationalizing security functions into the application is a common practice but assessing their level of resiliency requires structured and systematic approach to test the application against all possible threats before and after deployment. The application security assessment process and tools presented here are mainly focused and mapped with industry standards and compliance including PCI-DSS, ISO27001, GLBA, FISMA, SOX, and HIPAA, in order to assist the regulatory requirements. Additionally, to retain a defensive architecture, web application firewalls have been discussed and a map between well-established application security standards (WASC, SANS, OWASP) is prepared to represent a broad view of threat classification.


Author(s):  
Aditya Ponnam

Organizations worldwide recognize the importance of a comprehensive, continuously evolving risk assessment process, built around a solid risk strategy that properly manages internal and external threats. A comprehensive enterprise risk management strategy must ideally contribute to the protection of the organizations’ assets, operations, shareholder’s value, and customer satisfaction while meeting imposed regulatory requirements and standards. As IT represents an integral part of the process required to achieve the aforementioned objectives, managing the risks associated with the information technology infrastructure of an organization is critical. The goal of this chapter is to review the most common risks and threat agents for a typical organizations’ information technology infrastructure and to discuss how systematic risk management procedures and controls can manage and minimize these risks.


Sign in / Sign up

Export Citation Format

Share Document