scholarly journals Da probabilidade à racionalidade: um estudo sobre o risco nos processos de avaliação da conformidade | From probability to rationality: a study on risk in conformity assessment processes

2012 ◽  
Vol 8 (1) ◽  
Author(s):  
Maria Luiza Costa Martins ◽  
Janaina Goulart Belchior

Resumo O trabalho discute a questão do risco no âmbito do Sistema Brasileiro de Avaliação da Conformidade. Valendo-se da evolução do conceito de risco ao longo da história, estuda o processo de análise de risco nas decisões relacionadas à regulamentação de produtos e qual o embasamento que esta análise deve ter de modo a fugir de uma dedução meramente pautada em cálculos probabilísticos, para buscar uma racionalidade social que atenda plenamente aos anseios de todos os indivíduos. Para tanto, destaca a atuação do Inmetro como gerenciador de riscos, analisando as estratégias que usa para estimar os riscos.Palavras-chave gerenciamento de risco, avaliação da conformidade, racionalidade social, regulamentação, InmetroAbstract This paper discusses risk analysis in the Brazilian Conformity Assessment System. Beyond risk conception evolution throughout history, this work studies the relationship between the risk analysis process and the decisions of product regulation. The issue is what parameters  should be included in the analysis.Keywords risk management, conformity assessment, social rationality, regulation, Inmetro

1996 ◽  
Vol 11 (4) ◽  
pp. 347-357 ◽  
Author(s):  
Helga Drummond

The term ‘risk management’ implies that risk is something which can be quantified, predicted and controlled. This paper seeks to demonstrate the limits of this assumption where complex projects are involved. The argument is based upon a case study of a failed £80 million IT venture known as Taurus. Analysis focuses upon the relationship between politics and the assumption of risk. Acceptance of risk, it is argued, is ultimately determined by the balance of power between decision makers. Moreover, risk analysis and other techniques of management may actually compound the difficulties by fostering an illusion of control and escalation. The implications for project management are discussed.


2014 ◽  
Vol 1030-1032 ◽  
pp. 2523-2526
Author(s):  
Hai Min Wei ◽  
Lian Yue

Endowment property is prevalent a new form of social endowment in China in recent years, But financing has become one of the bottleneck for its smooth development. In this paper, the author combing the various risk factors of REITs financing pattern, using ISM model to analysis the factors involved in grading evaluation, rendering risk model diagram to explain the structure, resulting the relationship between the various risk factors, clear the direction of risk management


10.14311/1289 ◽  
2010 ◽  
Vol 50 (6) ◽  
Author(s):  
J. Jirsa ◽  
J. Žáček

Whenever we want to avoid failures or hazardous events in today’s complex technological systems, it is advisable to carry out appropriate risk management. One of the most important aspects of risk management is the risk analysis process. The aim of this paper is to show a new risk analysis method based on the Unified Modelling Language (UML), which is successfully used in software engineering for describing the problem domain. The paper also includes a small practical example. It also shows a new risk analysis method based on an example of an unreeling process in cable manufacturing.


2013 ◽  
Vol 437 ◽  
pp. 857-860
Author(s):  
Anderes Gui ◽  
Hasnah Haron ◽  
Cecilia Sabrina ◽  
Jerom Timoti ◽  
Mochamad Yusuf ◽  
...  

The purpose of this study was to determine how the application of information technology and the risks of what might happen. Research methods used include literature studies, field studies by conducting observations, interview and study documentation. The approach used to conduct risk management of information technology is a method of Facilitated Risk Analysis Process (FRAP). The results are the discovery of the risks of using information technology. The conclusions of this study demonstrate the application of information technology is good enough because it takes only a little improvement in information technology risk management.


2019 ◽  
Vol 16 (6) ◽  
pp. 60-77
Author(s):  
E. V. Vasilieva ◽  
T. V. Gaibova

This paper describes the method of project risk analysis based on design thinking and explores the possibility of its application for industrial investment projects. Traditional and suggested approaches to project risk management have been compared. Several risk analysis artifacts have been added to the standard list of artifacts. An iterative procedure for the formation of risk analysis artifacts has been developed, with the purpose of integrating the risk management process into strategic and prompt decision-making during project management. A list of tools at each stage of design thinking for risk management within the framework of real investment projects has been proposed. The suggested technology helps to determine project objectives and content and adapt them in regards to possible; as well as to implement measures aimed at reducing these risks, to increase productivity of the existing risk assessment and risk management tools, to organize effective cooperation between project team members, and to promote accumulation of knowledge about the project during its development and implementation.The authors declare no conflict of interest.


Author(s):  
Svetlana Sergeevna Kozunova ◽  
Alla Grigorievna Kravets

The article highlights the aspects of risk management in the information system. According to the analysis of the work of Russian and foreign scientists and world practices in the field of risk management, it is stated that there is a need to improve the effectiveness of risk management of information system and to develop a method for managing the risks of the information system. As a solution to the problem of effective risk management of the information system, there has been proposed a formalized procedure for managing the risks of the information system. The scientific novelty of this solution is the use of decision space and optimization space to reduce risks. This procedure allows to assess the damage, risk and effectiveness of risk management of the information system. The risks of the information system are determined and analyzed; a pyramidal risk diagram is developed. This diagram allows you to describe the relationship of risks with the components of the information system. The negative consequences to which these risks can lead are given. The analysis of methods and approaches to risk management has been carried out. Based on the results of the analysis, the methods GRAMM, CORAS, GOST R ISO / IEC scored to the maximum. The weak points of these methods and the difficulty of applying these methods in practice are described. The developed formalized risk management procedure to control the risks of information system can be used as management system’s element of the information security quality that complies with the recommendations of GOST R ISO / IEC 27003-2012. The prospect of further development of the research results is the development of management systems of risk of information system.


2020 ◽  
Vol 17 (1) ◽  
pp. 59
Author(s):  
Ching Ching Wong

Enterprise Risk Management (ERM) is an effective technique in managing risk within an organization strategically and holistically. Risk culture relates to the general awareness, attitudes and behaviours towards risk management in an organisation. This paper presents a conceptual model that shows the relationship between risk culture and ERM implementation. The dependent variable is ERM implementation, which is measured by the four processes namely risk identification and risk assessment; risk treatment; monitor and consult; communicate and consult. The independent variables under risk culture are risk policy and risk appetite; key risk indicators; accountability; incentives; risk language and internal relationships. This study aims to empirically test the relationship between risk culture and ERM implementation among Malaysian construction public listed companies. Risk culture is expected to have direct effects and significantly influence ERM. This study contributes to enhance the body of knowledge in ERM especially in understanding significant of risk culture that influence its’ implementation from Malaysian perspective.


Author(s):  
Bogdan Korniyenko ◽  
Lilia Galata

In this article, the research of information system protection by ana­ ly­ zing the risks for identifying threats for information security is considered. Information risk analysis is periodically conducted to identify information security threats and test the information security system. Currently, various information risk analysis techni­ ques exist and are being used, the main difference being the quantitative or qualitative risk assessment scales. On the basis of the existing methods of testing and evaluation of the vulnerabilities for the automated system, their advantages and disadvantages, for the possibility of further comparison of the spent resources and the security of the information system, the conclusion was made regarding the deter­ mi­ nation of the optimal method of testing the information security system in the context of the simulated polygon for the protection of critical information resources. A simula­ tion ground for the protection of critical information resources based on GNS3 application software has been developed and implemented. Among the considered methods of testing and risk analysis of the automated system, the optimal iRisk methodology was identified for testing the information security system on the basis of the simulated. The quantitative method Risk for security estimation is considered. Generalized iRisk risk assessment is calculated taking into account the following parameters: Vulnerabili­ ty  — vulnerability assessment, Threat — threat assessment, Control — assessment of security measures. The methodology includes a common CVSS vul­ nerability assessment system, which allows you to use constantly relevant coefficients for the calculation of vulnerabilities, as well as have a list of all major vulnerabilities that are associated with all modern software products that can be used in the automated system. The known software and hardware vulnerabilities of the ground are considered and the resistance of the built network to specific threats by the iRisk method is calculated.


2021 ◽  
Vol 13 (11) ◽  
pp. 5771
Author(s):  
Piero Lovreglio ◽  
Angela Stufano ◽  
Francesco Cagnazzo ◽  
Nicola Bartolomeo ◽  
Ivo Iavicoli

The COVID-19 incidence in 61 manufacturing plants in Europe (EU), North America (NA) and Latin-America (LATAM) was compared with the incidence observed in the countries where the plants are located in order to evaluate the application of an innovative model for COVID-19 risk management. Firstly, a network of local and global teams was created, including an external university occupational physician team for scientific support. In July 2020, global prevention guidelines for the homogenous management of the pandemic were applied, replacing different site or regional procedures. A tool for COVID-19 monitoring was implemented to investigate the relationship between the incidence rates inside and outside the plants. In the period of May–November 2020, 565 confirmed cases (EU 330, NA 141, LATAM 94) were observed among 20,646 workers with different jobs and tasks, and in the last two months 85% EU and 70% NA cases were recorded. Only in 10% of cases was a possible internal origin of the contagion not excluded. In the EU and NA, unlike LATAM, the COVID-19 incidence rates inside the sites punctually followed the rising trend outside. In conclusion, the model, combining a global approach with the local application of the measures, maintains the sustainability in the manufacturing industry.


Sign in / Sign up

Export Citation Format

Share Document