scholarly journals Stages of safety risk assessment of civil servants

2020 ◽  
Vol 8 (2) ◽  
pp. 63-70
Author(s):  
Veronika Karkovska

Purpose. The article explores the topical topic of assessing the security risk of public servants. One of the main responsibilities of public authorities is to protect national security, that is, to protect the country and the community from threats related to disorderly conduct and welfare. Relevance. The urgency of the problem of assessing the risk of public servants is to research and substantiate the appropriate methodology for the effectiveness of the assessment. The recommended methodology for risk assessment is unique in that the main focus is on the risks posed by persons having legitimate access to the assets of public authorities. It is simple, reliable, flexible and transparent. It can be used on its own or as a supplement to an existing risk assessment program. Although the guidance explains how to check the risks posed by a person to a valuable asset, it does not attempt to indicate which of these assets is the most important or which employee group may be the most threatening. Results. The recommended risk assessment methodology provides the basis for the work, but in order for this work to be successful in accordance with the methodology, it is necessary to identify appropriate positions in the public authority for professionals with their further access to the necessary information. The stages of the risk assessment process highlight the threat identification and vulnerability assessment. It has been established that the risk assessment process consists in the importance of following the risk assessment process step by step and the lack of assumptions about the final results. Therefore, the article examines the risk assessment process carried out at the appropriate levels. Conclusions. It turns out that risk assessments are most effective when they are an integral part of the risk management process. This helps to transform risk assessment into action. The best results are achieved when the risk assessment team is composed of: employees and security teams responsible for risk management, persons with deep knowledge of specific areas of activity of employees, external specialists in the field of risk assessment. To maximize the benefits of employee safety risk assessment: Risk assessment requires discussion and benefits from the exchange of views from various areas of government.

2019 ◽  
Vol 9 (2) ◽  
pp. 63 ◽  
Author(s):  
John Pyrgies

Purpose: This research studies the UAV incidents in the vicinity of worldwide airports in order to deliver a quantitative and qualitative analysis of this phaenomenon, to analyse the risks associated to this threat and propose mitigation measures that brings this risk to an ‘acceptable’ level.Methodology: A population of 139 ‘serious UAV incidents in the vicinity of worldwide airports’ has been constituted on the basis of the FAA and NASA databases and articles published on the Web by online media. This phaenomenon has then been analysed quantitatively using descriptive statistics techniques and qualitatively by analysing in-depth some representative incidents. A risk analysis has then been performed based on the FAA Safety Risk Management 5-steps process to identify the hazards i.e. the root causes of those UAV incidents, determine their outcome i.e. negative consequences that jeopardize airports objectives and assign them a severity level and likelihood i.e. frequency level. Analysed risks have then been assessed based on FAA ARP Risk Matrix. Mitigation measures (prevention, deterrence, denial, detection, neutralisation) have been identified following a ‘Defence-in-Depth’ approach.Findings: The findings of the study are that those UAV incidents are more numerous than anticipated and happen higher and further from the airports than expected: they happen not only in CTRs but also in TMAs. This has an impact on the mitigation measures that shall not only be deployed at airports side but also be on-boarded in manned aircrafts.Originality: To our knowledge, no study has combined different sources to constitute such a population focused on ‘serious’ UAVs incidents around airports worldwide, has applied the official FAA Safety Risk Management process to assess this risk and followed a structured ‘Defence-in-Depth’ approach typically used in Cybersecurity to mitigate this risk.Keywords: Airport security and safety, Unmanned Aerial Vehicles (UAVs) threat, Risk analysis and mitigation, Counter-UAVs technologies.


2012 ◽  
Vol 27 (1) ◽  
pp. 17-34 ◽  
Author(s):  
Hazel Taylor ◽  
Edward Artman ◽  
Jill Palzkill Woelfer

The gap between research and practice is strikingly evident in the area of information technology (IT) project risk management. In spite of extensive research for over 30 years into IT project risk factors resulting in normative guidance on IT project risk management, adoption of these risk management methods in practice is inconsistent. Managing risk in IT projects remains a key challenge for many organizations. We discuss barriers to the application of normative prescriptions, such as assessments of probability and impact of risk, and suggest a contingency approach, which addresses the uncertainties, complexities, and ambiguities of IT projects and enables early identification of high-risk projects. Specifically, in a case study, we examine how the project management office (PMO) at one organization has bridged the gap between research and practice, developing a contingency-based risk assessment process well founded on research knowledge of project dimensions related to project performance, while also being practical in its implementation. The PMO's risk assessment process, and the risk spider chart that is the primary tool in this assessment, has proven to be effective for surfacing inherent risk at the early stages of IT projects, thereby enabling the recommendation of appropriate management strategies. The PMO's project risk assessment process is a model for other organizations striving to engage in effective and collaborative practices in order to improve project outcomes. The case illustrates the importance of considering the practical constraints of the context of application in order to transform research findings into practices that promote attainment of desired outcomes.


Sign in / Sign up

Export Citation Format

Share Document