scholarly journals Models to assess the risk of introduction of selected animal viral diseases through the importation of live animals as a key part of risk analysis

2021 ◽  
Vol 65 (4) ◽  
pp. 383-389
Author(s):  
Anna Gierak ◽  
Krzysztof Śmietanka

Abstract Introduction of an animal viral disease, especially a notifiable disease, into an importing country or region free from the disease may lead to serious epidemiological consequences and economic losses. Trade in live animals is historically considered one of the most important risk pathways. To estimate the magnitude of such risk, the likelihood of a virus’ entry into a country and the consequences of this event should be jointly evaluated. Depending on data availability, the urgency of the problem and the detail level of the objectives, a risk assessment may be conducted in a qualitative, semi-quantitative or quantitative way. The purpose of this review was firstly to provide a brief description of each step of the risk analysis process, with particular emphasis on the risk assessment component, and subsequently to supply examples of different approaches to the assessment of the risk of the introduction of selected animal viral diseases. Based on the reviewed models, the overall likelihood of introduction of particular diseases was generally estimated as low. The output risk value was strongly dependent on the duration of the silent phase of the epidemic in the country of origin. Other parameters with some bearing upon the risk derived from the epidemiological situation in the country of origin and the biosecurity or mitigation measures implemented in the country of destination. The investigated models are universal tools for conducting assessment of the risk of introduction of various animal diseases to any country. Their application may lead to timely implementation of appropriate measures for the prevention of the spread of a disease to another country or region.

2011 ◽  
Vol 148-149 ◽  
pp. 1000-1006 ◽  
Author(s):  
Chang Yong Wang ◽  
Hong Huan Zhang ◽  
Meng Lan Duan

That the oil and gas exploration and development is extending into deep water proceeds the rapidly shift to subsea production system. However, complex subsea equipment and frequency offshore accidents aroused the concern on the risk assessment of subsea system. The paper illustrates the hazard aspects which should be focused on in the subsea equipment compared with the surface equipment. The hazards identification and risk analysis on subsea X-tree system is carried out. A general risk-prevent process of subsea X-tree system is illustrated, so does the reliability analysis process. Besides, some commendations on subsea detection and maintenance are presented in the paper.


2020 ◽  
Author(s):  
Hao Qin

Severe windstorms cause millions in losses annually for housing in Southeast Australia that has more than half of Australia’s population. The risk assessment for housing in these non-cyclonic regions is the key to assessing the cost-effectiveness of relevant wind mitigation measures to reduce the economic losses. This study develops a probabilistic risk assessment framework to evaluate the wind and rain losses for Australian contemporary houses subjected to non-cyclonic windstorms, which integrates the hazard modelling for extreme wind and associated rainfall, reliability-based wind damage assessment, rainwater intrusion evaluation and economic loss modelling. The risk analysis was conducted for metal-clad contemporary houses in Brisbane and Melbourne. It was found that damage to building interior and contents 18 caused by rainwater intrusion associated with extreme winds is the major contributor to the annual expected economic losses, and houses in Brisbane are generally subjected to higher losses than houses in Melbourne.


2014 ◽  
Vol 2 (2) ◽  
pp. SC61-SC76 ◽  
Author(s):  
Rocky Roden ◽  
Mike Forrest ◽  
Roger Holeywell ◽  
Matthew Carr ◽  
P. A. Alexander

Essentially all companies exploring for oil and gas should perform a risk analysis to understand the uncertainties in their interpretations and to properly value order prospects in a company’s drilling portfolio. For conventional exploration in clastic environments, primarily sands encased in shales, a key component of the risk analysis process is evaluating direct hydrocarbon indicators, which can have a significant impact on the final risk value. We investigate the role AVO plays in the risk assessment process as a portion of a comprehensive and systematic DHI evaluation. Documentation of the geologic context and quantification of data quality and DHI characteristics, including AVO characteristics, is necessary to properly assess a prospect’s risk. A DHI consortium database of over 230 drilled prospects provides statistics to determine the importance of data quality elements, primarily in class 2 and 3 geologic settings. The most important AVO interpretation characteristics are also identified based on statistical results and correlated with well success rates. A significant conclusion is the relevance of AVO in risk analysis when it is the dominant component in the DHI portion of the risk. Critical in the risk assessment process is understanding the role AVO and DHI analysis play when prospects approach class 1 geologic settings. The impact that hydrocarbons have on the seismic response is significantly diminished in this setting versus the other AVO classes. All of these observations confirm the necessity of properly evaluating a prospect’s geologic setting and implementing a consistent and systematic risk analysis process including appropriate DHI and AVO components.


Author(s):  
S. K. Tomar ◽  
A. Kaur ◽  
H. K. Dangi ◽  
T. Ghawana ◽  
K. Sarma

One of the major challenge from unplanned growth in the cities is the fire incidents posing a serious threat to life and property. Delhi, the capital city of India, has seen unplanned growth of colonies resulting in a serious concern for the relevant agencies. This paper investigates the relation between potential causes of fire incidents during 2013-2016 in South-West Delhi Division of Delhi Fire Services as part of risk analysis using the data about fire stations & their jurisdictions, incidents of fire, water reservoirs available, landuse and population data along with the divisional & sub-divisional boundaries of South-West Delhi division under Delhi Fire Service. Statistical and Geospatial tools have been used together to perform the risk analysis. The analysis reveals that difference in actual occupancy and defined landuse as a part of unplanned growth of settlements is found to be the main reason behind the major fire incidents. The suggested mitigation measures focus on legal, policy, physical & technological aspects and highlight the need to bring the systemic changes with changing scenario of demographics and infrastructure to accommodate more aspects of ground reality.


Author(s):  
Devi Pratami

A project always has risks that can lead to project failure. In the project, a risk analysis is required to provide an evaluation for the project to proceed as planned. In the event of inadequate planning and ineffective control, it will result in irregularities identified as a risk to the project. This study aims to analyze the qualitative risk on Fiber Optic Installaion project in Sukabumi, West Java, Indonesia. In addition, risk assessment is undertaken on project implementation. Assessment of risk using the impact and probability to measure the impact of risk occurrence. The impacts are more detailed by classified by time impact, cost impact, quality impact, safety and security impact, proximity. The result is there are 36 risk that may occur and mostly risks are associaated by quality and safety&security impact.


Author(s):  
Bogdan Korniyenko ◽  
Lilia Galata

In this article, the research of information system protection by ana­ ly­ zing the risks for identifying threats for information security is considered. Information risk analysis is periodically conducted to identify information security threats and test the information security system. Currently, various information risk analysis techni­ ques exist and are being used, the main difference being the quantitative or qualitative risk assessment scales. On the basis of the existing methods of testing and evaluation of the vulnerabilities for the automated system, their advantages and disadvantages, for the possibility of further comparison of the spent resources and the security of the information system, the conclusion was made regarding the deter­ mi­ nation of the optimal method of testing the information security system in the context of the simulated polygon for the protection of critical information resources. A simula­ tion ground for the protection of critical information resources based on GNS3 application software has been developed and implemented. Among the considered methods of testing and risk analysis of the automated system, the optimal iRisk methodology was identified for testing the information security system on the basis of the simulated. The quantitative method Risk for security estimation is considered. Generalized iRisk risk assessment is calculated taking into account the following parameters: Vulnerabili­ ty  — vulnerability assessment, Threat — threat assessment, Control — assessment of security measures. The methodology includes a common CVSS vul­ nerability assessment system, which allows you to use constantly relevant coefficients for the calculation of vulnerabilities, as well as have a list of all major vulnerabilities that are associated with all modern software products that can be used in the automated system. The known software and hardware vulnerabilities of the ground are considered and the resistance of the built network to specific threats by the iRisk method is calculated.


2020 ◽  
Vol 39 (4) ◽  
pp. 31-55
Author(s):  
Chiraz Ben Ali ◽  
Sabri Boubaker ◽  
Michel Magnan

SUMMARY This paper examines whether multiple large shareholders (MLS) affect audit fees in firms where the largest controlling shareholder (LCS) is a family. Results show that there is a negative relationship between audit fees and the presence, number, and voting power of MLS. This is consistent with the view that auditors consider MLS as playing a monitoring role over the LCS, mitigating the potential for expropriation by the LCS. Therefore, our evidence suggests that auditors reduce their audit risk assessment and audit effort and ultimately audit fees in family controlled firms with MLS. Data Availability: Data are available from the public sources cited in the text. JEL Classifications: G32; G34; M42; D86.


2018 ◽  
Vol 180 ◽  
pp. 05006
Author(s):  
Zofia Wróbel

The valuation of the risk of losses makes easy the correct estimation of resulted threats as a result of atmospheric discharges and harms connected to them. Qualifying the need of lightning protection use for the object, we ought to take into account the risk R for the object and for the public services devices. In every case of examining risks we ought to fulfill: the identification of components RX forming the risk, counting the identified components of the risk RX, the entire risk R, identify the tolerated risk RT and compare the risk R with the tolerated value RT. As a result of such analysis we can come to a decision about the use of protection resources. In the report was realized the risk analysis of devices damages for a chosen object - the signal box with installed station - relaying devices of the railway traffic controlling with a computer adjustable control panel. From the realized analysis results that DEHN Risk Tool is a useful tool for the risk analysis of lightning losses in buildings, making possible the improvement of the calculations process, especially in the range of the choice of proper protection resources.


Sign in / Sign up

Export Citation Format

Share Document