Comparative Analysis of Earthquake Emergency Response in China and Japan Based on Timeline: 311 Earthquake vs 512 Earthquake

2015 ◽  
Vol 10 (2) ◽  
pp. 276-287 ◽  
Author(s):  
Xiaoxia Du ◽  
◽  
Jun Zhang ◽  
Jianhua Xu ◽  
Zhuan He ◽  
...  

A devastating <bm>Ms</bm>8.0 earthquake hit Wenchuan County, Sichuan Province, China, on May 12, 2008. A similarly destructive <bm>Ms</bm>9.0 earthquake hit eastcoast Miyagi Prefecture, Japan, on March 11, 2011. The governments of both countries took rapid, effective emergency response measures, gaining invaluable experience and learning precious lessons. To compare detailed emergency responses during these earthquakes and share lessons, this paper uses timeline analysis focusing on the levels of the two earthquakes, summarizing key emergency response measures focusing on emergency command center setup and operation, rescue force deployment and dispatch, emergency victim housing and resettlement, and public information reporting and release based on a time sequence. It also comparatively analyzes and sorts their implementation and timing and studies the similarities and differences of the two earthquakes. This paper also analyzes the advantages and disadvantages of emergency response measures taken by both nations, considering the background of emergency management systems to share experiences and provide references on future disaster emergency response work to improve abilities and progress in earthquake response.

Author(s):  
Anthony A. Piña

In this chapter, the reader is taken through a macro level view of learning management systems, with a particular emphasis on systems offered by commercial vendors. Included is a consideration of the growth of learning management systems during the past decade, the common features and tools contained within these systems, and a look at the advantages and disadvantages that learning management systems provide to institutions. In addition, the reader is presented with specific resources and options for evaluating, selecting and deploying learning management systems. A section highlighting the possible advantages and disadvantages of selecting a commercial versus an open source system is followed by a series of brief profiles of the leading vendors of commercial and open source learning management systems.


Author(s):  
Gabriela Moise ◽  
Otilia Cangea

With the continuous development of the computers networks, new problems have been posed in the process of keys management in the cryptographic systems. The main element in the cryptographic technologies is the keys management, as the cryptographic algorithms are known, while the keys have to be either secret (for unauthorized users that do not need them), or public (for users that need them). With an efficient cryptographic keys management system and the existing encryption techniques, there may be implemented a proper security system in the informational systems of the organizations. The process of cryptographic keys management consists in the following operations: keys generation, distribution, update, revocation, storage, backup/ recovery, import and export, usage control, expiration, and destruction. The cryptographic keys management techniques depend on the type of the keys, i.e. symmetric or public. Nowadays, the efforts of the researches in the cryptographic keys management are focused on the standardization and interoperability of the keys management. In this paper, the authors analyze the existing keys management systems and standards available for the keys management techniques, emphasizing the advantages and disadvantages of different systems. They also propose a cryptographic keys management model based on the ideas and principles of the INTERRAP architecture (a conceptual model developed by Jőrg Műller for intelligent agents). Also, there are incorporated some intelligent techniques to manage emergency situations, such as keys losing or their improper usage.


2020 ◽  
Vol 15 (2) ◽  
pp. 131-142
Author(s):  
Marek Bugdol ◽  
◽  
Daniel Puciato ◽  
Tadeusz Borys ◽  
◽  
...  

The cognitive objective of this paper was to establish the roles played by standardized environmental management systems in the process of the sustainable development of an organization. At present this process is analysed mainly in the context of the UN Sustainable Development Goals formulated within the scope of the 2030 Agenda for Global Action. The main research method used by the authors was a systematic literature review. The result of the conducted review was the identification of motives and conditions for the implementation of environmental management systems as well as advantages and disadvantages resulting from such implementation. The authors also indicated the major causes of failures in the introduction and improvement of systems consistent with the ISO 14001 standard and presented conditions determining their successful implementation. In the final part of the paper, they included recommendations for further research directions in the examined problem area.


2021 ◽  
Vol 5 (3) ◽  
Author(s):  
Juan Cheng ◽  
Xiaoyan Zhang

The author nursed suspected and confirmed cases of COVID-19 imported from abroad in a mobile hospital. During the front-line work in the fight against the epidemic in 2020, emergency response measures and corresponding clinical nursing experience have been accumulated for public health emergencies. This article summarized and shared the psychological nursing of patients with COVID-19 during the work of the author.


2020 ◽  
pp. 27-32
Author(s):  
E. S. Ryaryaeva ◽  
◽  
A. V. Agapov ◽  

The article deals with the development and application of software (software) «Solomka» for risk management of quality management systems (QMS). The problems and prospects of its application from the standpoint of management systems are highlighted. This topic will be of interest to specialists in the field of standardization and certification. The characteristic features of the application of the process and risk-oriented approaches in the construction and maintenance of management systems are highlighted and described. This article provides an analysis of user requirements for QMS risk management software, as well as a market research of proposals for similar software with a description of the advantages and disadvantages of each. This article provides an analysis of user requirements for QMS risk management software, as well as a market research of proposals for similar software with a description of the advantages and disadvantages of each. As a result of the work, the terms of reference for the development of software for risk management of QMS processes were substantiated, and user requirements for software were identified


Author(s):  
Oliver J. Hodgson ◽  
Dennis W. J. Keen ◽  
Malcolm Toft

A Pipeline Integrity Management System (PIMS) is a comprehensive, systematic, and integrated set of arrangements implemented by an operator to assess, mitigate, and manage pipeline risk. Over the past 16 years, Penspen have performed over 30 PIMS audits of pipeline operators internationally. This paper presents the collated findings from these audits, and examines the common areas in which operators have fallen short of best practice. The paper concludes with a series of recommendations based on the findings, which can be adopted by operators to improve their PIMS arrangements and practices. Penspen’s standardized 17 -element PIMS Model takes a holistic view of pipeline integrity. The audits, which are based on the Model, assess the adequacy and effectiveness of operators’ management systems and arrangements in keeping risks to people, the environment, and to the business to acceptable levels, given the anticipated pipeline operating conditions and taking into account the pipeline’s history and current status. Starting at the ‘top level’ of a PIMS, the audits consider the adequacy of operators’ pipeline policies, objectives, and performance metrics, and how these are subject to monitoring, review, and audit. The audits look at the organization responsible for managing the integrity of pipelines, and examine how all those with a role to play in the wider PIMS work together to this end. The numerous activities that take place during a pipeline’s lifecycle are investigated, to assess how the risk assessment results are used to determine the control and mitigation measures to be implemented during the pipeline’s design, construction, handover, commissioning, operation, inspection and maintenance, and how the operator ensures the effectiveness of these measures. The audits also study those ‘supporting’ processes and systems which play an important part in pipeline integrity management, including procurement, emergency response and recovery, incident investigation, change control, document and data management, and legal and code compliance. The collated results from the 30+ audits reveal that while operators typically have good control systems in place for the project stages of the pipeline lifecycle, controls for the operational stages have been found to be less robust. In terms of management and organization, operators can fail to recognize how many different individuals and teams have a role to play in the management of pipeline integrity. Furthermore, while operators often have good corporate systems in place for change control, emergency response, and risk assessment, such systems may not take into account pipeline-specific risks or requirements. Operators can tend to focus on pipeline safety and/or environmental-related risks, when through holistic assessment it can be shown that risks associated with production interruptions will tend to drive actions in practice.


2020 ◽  
Vol 157 ◽  
pp. 04007 ◽  
Author(s):  
Oksana Pirogova ◽  
Vladimir Plotnikov

Currently, the process of forming new management concepts is ongoing in Russia. At the same time, on the way to the development, creation and implementation of modern concepts, approaches and management systems at domestic enterprises there are several problems, one of which is the problem of intellectual capital management based on the VBM concept. Issues related to the definition of the concept of “intellectual capital”, its assessment and management are relevant. The article discusses the features of the VBM concept at the enterprise level, its advantages and disadvantages, implementation problems. The analysis performed in the study made it possible to clarify the economic content of the concept of intellectual capital and identify its key features that allow characterizing it and using specific assessment methods. The article describes the main methods and indicators for assessing intellectual capital, based on which an approach to the assessment and management of intellectual capital of an enterprise is proposed. The approach is based on a combination of two methods for calculating intellectual capital CIV and MVAIC. The first technique allows to assess the amount of intellectual capital of the enterprise. The second technique allows to reveal the structure of intellectual capital. The joint use of techniques allows to get a valuation of the intellectual capital of the enterprise and evaluate the effectiveness of investments in the development of its components. Criteria for assessing the effectiveness of investments in elements of intellectual capital are proposed.


Sign in / Sign up

Export Citation Format

Share Document