Emergency Materials Distribution Risk Control

2013 ◽  
Vol 310 ◽  
pp. 710-713
Author(s):  
Xiao Bin Wang ◽  
Qing Jun Wang ◽  
Zhou Su

In recent years, all kinds of frequent occurrence of unexpected events, damage is very serious, affect the range is very wide, such as the 2004 India Ocean tsunami in 2008, South China heavy snow disaster and Wenchuan earthquake in Sichuan, 2009 swept the global influenza a H1N1 influenza. These sudden public events not only cause great loss of life and property, but also affects the social stability, and even endanger the national security, the economic society to develop overall situation produces major effect. Emergency materials distribution level is directly related to whether the effective control of various emergencies, as far as possible so that the losses are minimized, avoid disaster expand. Therefore to strengthen the emergency logistics operation in the process of risk management is the urgent need of developing situation changes, the successful operation of emergency logistics is one of the key. And the implementation of accurate, comprehensive, rapid risk analysis and implementation of emergency logistics risk management. This article through to the emergency materials distribution of risk analysis, understanding of emergency materials distribution risk comes from where, and its risk control. The control method has established non affected areas of emergency material sending and receiving points between the affected areas of emergency materials distribution network, distribution scheme decision and preliminary analysis on emergency materials distribution center, warehouse storage to do regular checks. In the disaster areas of much-needed supplies to the shortest possible time delivery to the disaster area, improve the distribution efficiency, reduce the losses caused by disasters, but also ensure the material distribution in an orderly manner, avoid the invalid distribution.

2011 ◽  
pp. 234-248
Author(s):  
Enid Mumford

Participative systems design has, in the past, been seen as a positive group process of thinking through needs and problems and arriving at solutions for making the situation better. This improved situation then continues until new technology or new solutions provide an opportunity for making the situation better still. So far this book has concentrated on how to make the best use of the positive factors assisting change, especially change that involves the introduction and use of technology. It has described the importance of getting a clear understanding of the change problem and its complexity, of developing effective strategies to address this complexity, and of the creation of structures, often organizational, to facilitate the subsequent use of the new system. This last requires always keeping in mind the need to meet the dual objectives of achieving operating efficiency and a good quality of working life. This is often described as job satisfaction. Most of all there has been a continual stress on the importance of participation. This involves sharing the design tasks with those who will be affected by them and taking account of their opinions in design decisions. This chapter addresses the reverse of this positive objective. It considers the negative factors in a change situation which are likely to cause problems and to threaten the success of the change programme and of the new system. There are very many of these kinds of problems and it is only possible to discuss a few here. The ones I have selected are criminal threats which affect the future viability of the company, technical problems which reduce efficiency, unpleasant and stressful work that threatens employee health, and problems of morale which affect the individual’s happiness in the workplace. A consideration of negative factors brings us into the challenging areas of uncertainty and risk. Uncertainty is when we do not know what is going to happen and often contains an element of surprise. This is especially true today when so many decisions depend on forecasts of the future. A contributing factor here can be an overemphasis on the present as a means of forecasting the future. Uncertainty is also often a result of the behaviour of others rather than of events. This is hard to predict. Experts tell us that today we are living in a risk society (Beck, 1992). Complex design problems can have a high degree of uncertainty and easily become risks. They often have a subjective element, for what one person considers a problem or a risk, another will see as an opportunity. Complex problems also require information for their solution and this may be difficult to find. It requires the ability to search for, analyse and synthesise, relevant intelligence and relate it to past, current and future events. Threats to important institutions from terrorists are of a different nature and scale to those that have been experienced before. Many will take us completely by surprise. Bernstein (1996) suggests that the essence of risk management lies in maximising the areas which we have some control over while minimising those areas where we have no control over the outcome and the linkage between cause and effect is hidden. When we take a risk we are making a bet that a particular outcome will result from the decision we have made although we have no certainty that this will happen. Risk management usually starts with risk analysis, which attempts to establish and rank the most serious risks to be avoided so far as these are known. Here many companies attempt to achieve a balance between the benefits of greater security and the costs involved. Too high a level of security, while providing good protection, can result in a system that is both difficult to use and expensive to operate (Mumford, 1999). Risk analysis next moves on to risk assessment. This is an analysis of the seriousness of different risks by determining the probability and potential damage of each one. For example, major risks can come from a large concentration of data in one place that is accessed by many different people, not all of whom are known. There can be relationships between risks. Clifford Stoll’s (1990) book The Cuckoo’s Egg shows how the ability of a German hacker to enter a university laboratory computer made it possible for him to later enter into the computers of United States military bases. Risk analysis identifies the risks; risk assessment tries to estimate how likely they are to happen and how serious the consequences will be. Risk priorisation recognises that all companies cannot be protected from all risks and choices must be made. Risk impact is the likely magnitude of the loss if a system break-in, fraud or other serious problem occurs. Risk control involves further actions to reduce the risk and to trigger further defensive actions if a very serious problem occurs. Risk control also covers the monitoring of risk on a regular basis to check that existing protection is still effective. This can lead to risk reassessment. Very serious risks such as those coming from terrorist attack or criminal activity require monitoring. This, together with the detailed documentation of any problems or illegal activities when they occur, is essential to avoid complacency. An effective system must both prevent problems and detect when they have occurred. All of these activities to design security into a system require human vigilance if they are to be effective. All employees should accept some responsibility for checking that the system they work with continues to maintain its integrity and security. This chapter will place its main focus on protective problem solving and design directed at avoiding or minimising very serious risks. Today, it is unwise for managers to neglect this. Because of its growth in recent years and its prevalence today criminal activity will be examined first in some detail. Particular attention will be paid to how the involvement of employees in problem solving can play a part in reducing or avoiding this.


Author(s):  
Dhea Rizky Novandhini ◽  
M. Affan Mahfudz ◽  
Indriati Paskarini

 Introduction: PT X is one of the companies in fertilizer production industry. There are two high-risk activities that endanger the safety and health of workers, namely supervision of welding and oil level checking in ammonia plant field of PT X. The purpose of this research was to apply risk management to the activities. Method: This research was a descriptive study which was carried out in observation using a cross sectional design. Variables in this study included hazard identification, basic risk analysis, risk control that has been done, existing risk analysis, and risk reduction assessment. The tools used for the data collection were observation sheets, interview guide sheets, and Job Safety Analysis sheets. Data that has been obtained through observation and interviews was processed using Fine (1971) semi quantitative technique. Results: The results of hazard identification were known to have as many as 6 potential hazards. The assessment results in the basic risk analysis showed that the initial risk level consisted of 3 risks with very high level, 2 risks with a substantial level and 1 risk with priority 3 level. After the risk control effort was applied, the results of the assessment in the existing risk analysis showed that the level of risk has decreased significantly. Conclusion: The value of risk reduction of each potential hazard results decreases by 95%, 88.89%, 85%, 93.33%, 66.67%, and 75%.Keywords: ammonia plant, fertilizer production industry, risk management


2013 ◽  
Vol 10 (81) ◽  
pp. 20121019 ◽  
Author(s):  
Andrew J. Black ◽  
Thomas House ◽  
M. J. Keeling ◽  
J. V. Ross

Antiviral treatment offers a fast acting alternative to vaccination; as such it is viewed as a first-line of defence against pandemic influenza in protecting families and households once infection has been detected. In clinical trials, antiviral treatments have been shown to be efficacious in preventing infection, limiting disease and reducing transmission, yet their impact at containing the 2009 influenza A(H1N1)pdm outbreak was limited. To understand this seeming discrepancy, we develop a general and computationally efficient model for studying household-based interventions. This allows us to account for uncertainty in quantities relevant to the 2009 pandemic in a principled way, accounting for the heterogeneity and variability in each epidemiological process modelled. We find that the population-level effects of delayed antiviral treatment and prophylaxis mean that their limited overall impact is quantitatively consistent (at current levels of precision) with their reported clinical efficacy under ideal conditions. Hence, effective control of pandemic influenza with antivirals is critically dependent on early detection and delivery ideally within 24 h.


2009 ◽  
Vol 364 (1530) ◽  
pp. 2637-2642 ◽  
Author(s):  
Fiona M. Tomley ◽  
Martin W. Shirley

Infectious diseases of livestock are a major threat to global animal health and welfare and their effective control is crucial for agronomic health, for safeguarding and securing national and international food supplies and for alleviating rural poverty in developing countries. Some devastating livestock diseases are endemic in many parts of the world and threats from old and new pathogens continue to emerge, with changes to global climate, agricultural practices and demography presenting conditions that are especially favourable for the spread of arthropod-borne diseases into new geographical areas. Zoonotic infections that are transmissible either directly or indirectly between animals and humans are on the increase and pose significant additional threats to human health and the current pandemic status of new influenza A (H1N1) is a topical example of the challenge presented by zoonotic viruses. In this article, we provide a brief overview of some of the issues relating to infectious diseases of livestock, which will be discussed in more detail in the papers that follow.


2019 ◽  
Vol 288 ◽  
pp. 02001
Author(s):  
ZHAI Yi ◽  
SUN Gang ◽  
Li Bin ◽  
ZHU Kaimin ◽  
Wang Qiang

In this article, the Process Fault Tree Analysis (PFTA) method is researched, which is about to the risk management of spacecraft Assembly Integration and Test (AIT) process. The method of how to identify the top event and bottom event of Spacecraft AIT process risk and the method of how to assess the risk severity of the bottom event is introduced. The model of risk control matrix is established. From the responsibilities, tools, methods, monitor and other dimensions about the post roles involved of the AIT process, how to establish a risk management system based on the identification, assessment, analysis and control of the whole AIT process is researched. In this risk management system, through technology subject, quantitative topic, process improve, Quality Control (QC) subjects, implementation of product assurance elements, writing Standard Operating procedure (SOP), maintaining system documents, combing knowledge and operation taboo items and other method is used.


The contracting of a power plant construction is usually regarded as a “high risk activity”, primarily due to the lack of sufficient environmental data. Risk management has significant potential to improve the performance of the venture. Nonetheless, this requires proper and structured methods to recognize and quantify both risk factors and their interactions and, most critically, knowledge and experience. There were significantly fewer efforts to develop. The built model uses a micro-system technique to introduce a new methodology for threat assessment to define the risks associated with building power station. The methodology for evaluation enables the use of linguistic and numerical risk factor evaluations. For transform linguistic and numerical evaluations, the Fuzzy Linguistic-Numerical Conversion Scheme (FLNCS) is adopted. The predictive analysis approach often incorporates the plan pre-mitigation contingency, which is the contingency fund of threat, if no mitigation technique is introduced. A new risk management model for the development and assessment of potential mitigation strategies for each threat under consideration is established. A newly developed threat management system contrasts the current exhausted contingency with the post-mitigation contingency, tracking the effects of the chosen reduction technique. The developed risk assessment system provides an early warning that informs users that a select mitigation technique may fail. It also specifies the appropriate time to start the control cycle based on a variety of subjective criteria. Once the threat management process has begun, the control method established defines, reviews, and selects the most effective control mechanisms in favor of the selected reduction approach. If the control intervention chosen fails, the control method established notifies the client of the evaluation of the risk management program. Such alerts enable users to avoid possible future failures with similar risk objects. The built user interface has been programmed with MATLAB for easy usage.


2018 ◽  
Vol 64 (3) ◽  
pp. 55-67
Author(s):  
Wojciech Wiesner ◽  
Piotr Kunysz

Abstract This article discusses issues related to safety during kitesurfing (swimming on a board with a kite). The considerations are based on risk management procedures. These procedures can be described interchangeably as managing your own safety. Risk management allows you to minimize threats without sacrificing your planned sport goals. The authors first describe the procedures related to the identification of threats occurring in this discipline. Teaching and practicing kitesurfing involves overcoming a large number of threats. These threats can have both external and internal character. The next stage is risk analysis, understood as the product of negative events and the probability of their occurrence. Afterwards, we discuss the ways of dealing with the threat in the event of its occurrence. The last stage is the risk control (tracking) - whether new threats have emerged, or the level of risk has remained unchanged. The described methodical impacts can be labelled as education for safety.


2017 ◽  
Vol 3 (2) ◽  
pp. 505-507
Author(s):  
Elisabeth Ibenthal ◽  
Uvo M. Hölscher ◽  
Claus Backhaus

AbstractThe ISO 80369-series replace Luer-connectors in five application areas to fight misconnections. Although the standard avoids the mechanical problem of misconnections, the design of products and packages remains arbitrary. So, packages and products with same functions but different connectors could have similar designs and hence could be mixed-up.To ascertain whether standardization is needed for marking non-distinguishable products and packages, a risk management and usability engineering process were carried out, partly.The ensuing risk analysis created nine unacceptable risks relating to non-distinguishable packages and lookalike-products. Based on this, risk control (standardization) is needed for lookalikes with the following proposed measures: colour allocation and haptic textures for products, colour allocation and symbols for packages. Furthermore, three scenarios were planned for summative evaluation.An additional consideration of the efficiency of proposed combinations of measures and products relying on measures would be helpful.


Sign in / Sign up

Export Citation Format

Share Document