scholarly journals Risk assessment in avalanche-prone areas

2004 ◽  
Vol 38 ◽  
pp. 115-122 ◽  
Author(s):  
Massimiliano Barbolini ◽  
Federica Cappabianca ◽  
Fabrizio Savi

AbstractThis paper addresses the problem of defining a proper method for formal risk analysis in avalanche-prone areas. In this study, risk is defined as the annual probability of being killed by an avalanche for someone living or working permanently in a building under a hazardous hillside. A new methodology to estimate the hazard component of avalanche risk based on the use of dynamic models is introduced. This approach seems to have some advantages over the current methods based on statistical analysis of historic avalanche data. The vulnerability component of risk is formulated as a function of avalanche velocity, according to previous formulations. However, given the lack of knowledge on how avalanche impact damages structures and causes fatalities, the effect on the resulting risk mapping of using different vulnerability relations is explored. The potential of the proposed approach for evaluating the residual risk after the implementation of defensive structural work is discussed.

2014 ◽  
Vol 1 (1) ◽  
pp. 35-45
Author(s):  
Fenty Simanjuntak ◽  
Bobby Suryajaya

Many banks are looking for a better core banking system to support their business growth with a more efficient and flexible core banking system to improve their sales and services in the competitive market and to fulfill regulatory requirements. The decision of replacing the legacy core banking system is difficult due to the high IT investment cost required for banks because they are also trying to cut costs. But maintaining the legacy system is costly in terms of upgrade. Changing the core banking system is also a difficult process and increases risks. To have a successful Core Banking System implementation, risk assessment is required to be performed prior to starting any activities. The assessment can help project teams to identify the risks and then to mitigate the risks as part of the plan. In this research the Core Banking System replacement risks were assessed based on ISACA Framework for IT Risk. Fourteen risk scenarios related to Core Banking System Replacement were identified. The high and medium rated inherent risks can become medium and low residual risk after assessment by putting the relevant control in place. The result proves that by adding mitigation plan it will help to mitigate the Residual Risk to become low risk. There are still three residual risk which categorized as medium risk and should be further mitigated they are Software Implementation, Project Delivery and Selection/Performance of Third Party Suppliers. It is also found that COBIT 5 has considered some specific process capabilities that can be used to improve the processes to mitigate the medium risks.


Author(s):  
Devi Pratami

A project always has risks that can lead to project failure. In the project, a risk analysis is required to provide an evaluation for the project to proceed as planned. In the event of inadequate planning and ineffective control, it will result in irregularities identified as a risk to the project. This study aims to analyze the qualitative risk on Fiber Optic Installaion project in Sukabumi, West Java, Indonesia. In addition, risk assessment is undertaken on project implementation. Assessment of risk using the impact and probability to measure the impact of risk occurrence. The impacts are more detailed by classified by time impact, cost impact, quality impact, safety and security impact, proximity. The result is there are 36 risk that may occur and mostly risks are associaated by quality and safety&security impact.


Author(s):  
Bogdan Korniyenko ◽  
Lilia Galata

In this article, the research of information system protection by ana­ ly­ zing the risks for identifying threats for information security is considered. Information risk analysis is periodically conducted to identify information security threats and test the information security system. Currently, various information risk analysis techni­ ques exist and are being used, the main difference being the quantitative or qualitative risk assessment scales. On the basis of the existing methods of testing and evaluation of the vulnerabilities for the automated system, their advantages and disadvantages, for the possibility of further comparison of the spent resources and the security of the information system, the conclusion was made regarding the deter­ mi­ nation of the optimal method of testing the information security system in the context of the simulated polygon for the protection of critical information resources. A simula­ tion ground for the protection of critical information resources based on GNS3 application software has been developed and implemented. Among the considered methods of testing and risk analysis of the automated system, the optimal iRisk methodology was identified for testing the information security system on the basis of the simulated. The quantitative method Risk for security estimation is considered. Generalized iRisk risk assessment is calculated taking into account the following parameters: Vulnerabili­ ty  — vulnerability assessment, Threat — threat assessment, Control — assessment of security measures. The methodology includes a common CVSS vul­ nerability assessment system, which allows you to use constantly relevant coefficients for the calculation of vulnerabilities, as well as have a list of all major vulnerabilities that are associated with all modern software products that can be used in the automated system. The known software and hardware vulnerabilities of the ground are considered and the resistance of the built network to specific threats by the iRisk method is calculated.


2018 ◽  
Vol 180 ◽  
pp. 05006
Author(s):  
Zofia Wróbel

The valuation of the risk of losses makes easy the correct estimation of resulted threats as a result of atmospheric discharges and harms connected to them. Qualifying the need of lightning protection use for the object, we ought to take into account the risk R for the object and for the public services devices. In every case of examining risks we ought to fulfill: the identification of components RX forming the risk, counting the identified components of the risk RX, the entire risk R, identify the tolerated risk RT and compare the risk R with the tolerated value RT. As a result of such analysis we can come to a decision about the use of protection resources. In the report was realized the risk analysis of devices damages for a chosen object - the signal box with installed station - relaying devices of the railway traffic controlling with a computer adjustable control panel. From the realized analysis results that DEHN Risk Tool is a useful tool for the risk analysis of lightning losses in buildings, making possible the improvement of the calculations process, especially in the range of the choice of proper protection resources.


Author(s):  
Е.В. Докукина ◽  
Е.В. Парфенова

В работе исследуется один из возможных метод оценки риска дополнительных финансовых незапланированных затрат в рамках реализации проектов ракетно-космической отрасли, поскольку по различным причинам они не учитывались при определении технико-экономических показателей реализуемого перспективного проекта. Следовательно, предлагаемый метод позволяет на ранних стадиях проведения исследований оценить дополнительные затраты и учесть их влияние на конечные технико-экономические показатели перспективного проекта. Метод строится на основе статистического анализа затрат по этапам жизненного цикла и по проекту в целом. По итогам исследования сделан вывод о том, что риск дополнительных финансовых затрат может снизить эффективность проекта в полтора - три раза. The paper explores one of the possible methods for assessing the risk of additional unplanned costs for the implementation of a promising project. Under additional means costs that for some reason were not planned when determining the technical and economic indicators of the prospective project being implemented. The proposed method allows for the early stages of research to assess the additional costs and take into account their impact on the final technical and economic indicators of a promising project. The method is based on a statistical analysis of costs for the stages of the life cycle and for the project as a whole. The study concluded that the risk of additional costs may reduce the effectiveness of the project in one and a half to three times.


Sign in / Sign up

Export Citation Format

Share Document