Online Human Risk Assessment at the Industrial Plants

Author(s):  
S.I. Simonenko ◽  
◽  
L.A. Sokolov ◽  

Risks of the employee unsafe behavior associated with their abilities and personal qualities are considered. The methodology is presented in the article concerning the risk assessment of unsafe behavior using online assessment by knowledge tests, ability tests and a professional personality questionnaire Deep Safety developed by Detech. The results of the employee online assessment are presented. The analysis of the criterion sample showed that the level of abilities and the level of expression of safety competencies affects both the number of cases of unsafe behavior and the overall results of work. A positive correlation was also found between the level of verbal intelligence and the propensity for safe behavior. Four safety competencies have the greatest correlation with the actual severity of safe behavior — they are law-abiding (following the rules), adherence to principles (intolerance to violations), responsibility, non-conflict. The first three of them have a positive correlation, while employees who are examples of safe behavior demonstrate a higher level of conflict. This can be explained by the fact that when they encounter violations or unsafe behavior, they openly point out this, suppress violations not being afraid to go to confrontation in the interests of ensuring safety. Online assessment is a fast and cost effective way of assessment, and, moreover, easily integrates with the professional tests and other assessment tools. We recommend that such an assessment be carried out in labor collectives with an interval of 1.5–2 years, which makes it possible to track the dynamics of indicators. One more advantage of this assessment system is that it allows not only to identify those who are prone to unsafe behavior, but to form the best strategy for interaction with the employee, to recruit labor collectives, in which, for example, the low law-abidingness of some employees would be compensated for by the high integrity of the manager and team-mates.

Author(s):  
Kar-Tin Lee ◽  
Hitendra Pillay ◽  
Vinesh Chandra

This article will examine the development and implementation of two information and communications technology (ICT) e-assessment tools—a diagnostic assessment system and an intelligent content assessment marking system—for the teaching of secondary science. An e-learning management system (ELMS, see Figure 1) was used with second-year secondary students in science which provided both content and online assessment tools for teachers. By using this system, teachers had the opportunity to modify how they assessed their students by shifting the skills and knowledge being tested and also when and at which stage of the learning they are tested. The use of the ELMS had also assisted teachers to move away from the narrow confines of standardised tests with their discrete and decontextualized ‘items’ towards more complex, holistic, contextualised, and authentic forms of assessment (e.g., Pellegrino, Chudowski, & Glaser, 2001).


2021 ◽  
Vol 18 (5) ◽  
pp. 38-47
Author(s):  
Yu. V. Trifonov ◽  
E. A. Fomina

Th e purpose of this article is to develop tools for assessing the risks of enterprises, used both to assess the current activities of enterprises and during the implementation of investment proj-ects. It is supposed to be used both as the main risk assessment tool, for example, for small and medium-sized enterprises, and as an additional tool, mainly for large enterprises, for making a preliminary decision on the feasibility of the project. Th e developed tools include a comprehen-sive risk assessment system, which provides a fundamental basis for calculations, and a soft ware product that signifi cantly optimizes the calculations of a complex integral risk indicator. Th e risk assessment system represents individual risks, grouped by 51 risk groups. Making calculations using the developed risk assessment tools involves assigning to each risk the characteristics of assessing the level of infl uence by selecting the characteristic most appropriate to the current level of risk. A standard version of indicators is proposed for each risk and characteristics cor-responding to "high", "elevated", "medium", "moderate" and "low" risk levels. Based on the results of the analysis, a complex integral risk indicator is formed, which is a quantitative risk assessment, which allows you to classify an enterprise into one of three groups: "eff ective enterprise / project", "enterprise / project requiring improvements", "ineffi cient enterprise". To optimize the calcula-tions, the authors have developed a soft ware product that allows for analysis with a signifi cant reduction in the time spent on its implementation. In general, the use of the developed risk as-sessment system and tools makes it possible to signifi cantly optimize the risk assessment process and reduce the costs of analisys.


Agronomie ◽  
2003 ◽  
Vol 23 (1) ◽  
pp. 75-84 ◽  
Author(s):  
Andy Hart ◽  
Colin D. Brown ◽  
Kathy A. Lewis ◽  
John Tzilivakis

Author(s):  
Bogdan Korniyenko ◽  
Lilia Galata

In this article, the research of information system protection by ana­ ly­ zing the risks for identifying threats for information security is considered. Information risk analysis is periodically conducted to identify information security threats and test the information security system. Currently, various information risk analysis techni­ ques exist and are being used, the main difference being the quantitative or qualitative risk assessment scales. On the basis of the existing methods of testing and evaluation of the vulnerabilities for the automated system, their advantages and disadvantages, for the possibility of further comparison of the spent resources and the security of the information system, the conclusion was made regarding the deter­ mi­ nation of the optimal method of testing the information security system in the context of the simulated polygon for the protection of critical information resources. A simula­ tion ground for the protection of critical information resources based on GNS3 application software has been developed and implemented. Among the considered methods of testing and risk analysis of the automated system, the optimal iRisk methodology was identified for testing the information security system on the basis of the simulated. The quantitative method Risk for security estimation is considered. Generalized iRisk risk assessment is calculated taking into account the following parameters: Vulnerabili­ ty  — vulnerability assessment, Threat — threat assessment, Control — assessment of security measures. The methodology includes a common CVSS vul­ nerability assessment system, which allows you to use constantly relevant coefficients for the calculation of vulnerabilities, as well as have a list of all major vulnerabilities that are associated with all modern software products that can be used in the automated system. The known software and hardware vulnerabilities of the ground are considered and the resistance of the built network to specific threats by the iRisk method is calculated.


Author(s):  
Rikito Hisamatsu ◽  
Rikito Hisamatsu ◽  
Kei Horie ◽  
Kei Horie

Container yards tend to be located along waterfronts that are exposed to high risk of storm surges. However, risk assessment tools such as vulnerability functions and risk maps for containers have not been sufficiently developed. In addition, damage due to storm surges is expected to increase owing to global warming. This paper aims to assess storm surge impact due to global warming for containers located at three major bays in Japan. First, we developed vulnerability functions for containers against storm surges using an engineering approach. Second, we simulated storm surges at three major bays using the SuWAT model and taking global warming into account. Finally, we developed storm surge risk maps for containers based on current and future situations using the vulnerability function and simulated inundation depth. As a result, we revealed the impact of global warming on storm surge risks for containers quantitatively.


Sign in / Sign up

Export Citation Format

Share Document