security risk management
Recently Published Documents


TOTAL DOCUMENTS

367
(FIVE YEARS 87)

H-INDEX

19
(FIVE YEARS 2)

2022 ◽  
pp. 302-321
Author(s):  
Petya Ivanova Toneva

The purpose of this chapter is to provide knowledge and propose a methodology for identifying the potential hazards and dealing with health, safety, and security risks in special events. The object of study is special events and the issues caused by their characteristics to concentrate visitors in a certain place for a limited period of time under a planned program. The highlighted issue concerning health, safety, and security in special events is crowd and its management. The author's main thesis is based on the need for a systematic management approach, in which measures are taken for the safety, health, and security of the employees, volunteers, and visitors while planning and conducting an event. This chapter focuses on risk management, which includes identifying potential hazards, risk analysis and risk assessment, measures to prevent or control the risk, as well as developing an action plan. The chapter attempts to provide a comprehensive health, safety, and security risk management framework aimed at special event management and to offer a set of planning and control tools.


2021 ◽  
pp. 0169796X2110668
Author(s):  
Tom de Groot ◽  
Salvador Santino F. Regilme

The widespread use of private military and security companies (PMSCs) in United Nations peacebuilding missions often undermines the effectiveness of these missions. PMSCs tend to encourage, in unnecessary ways, what is called security risk management and promote the militarization of humanitarian efforts. They encourage humanitarian aid organizations to protect their personnel with barbed wire fences, security guards, armed convoys, and secure aid compounds, even if the security risks are relatively low. Consequently, these militarized humanitarian efforts heighten the perception of risks and intensify security measures, which create physical and psychological barriers between humanitarian aid personnel and the local communities in which they carry out their tasks. This situation undermines local ownership of peacebuilding efforts and makes them less responsive to the local communities involved in these efforts. This article provides a comparative analysis of the nature of this problem and its effects in the Global South.


Computers ◽  
2021 ◽  
Vol 10 (12) ◽  
pp. 160
Author(s):  
Temitope Elizabeth Abioye ◽  
Oluwasefunmi Tale Arogundade ◽  
Sanjay Misra ◽  
Kayode Adesemowo ◽  
Robertas Damaševičius

Despite the attractive benefits of cloud-based business processes, security issues, cloud attacks, and privacy are some of the challenges that prevent many organizations from using this technology. This review seeks to know the level of integration of security risk management process at each phase of the Business Process Life Cycle (BPLC) for securing cloud-based business processes; usage of an existing risk analysis technique as the basis of risk assessment model, usage of security risk standard, and the classification of cloud security risks in a cloud-based business process. In light of these objectives, this study presented an exhaustive review of the current state-of-the-art methodology for managing cloud-based business process security risk. Eleven electronic databases (ACM, IEEE, Science Direct, Google Scholar, Springer, Wiley, Taylor and Francis, IEEE cloud computing Conference, ICSE conference, COMPSAC conference, ICCSA conference, Computer Standards and Interfaces Journal) were used for the selected publications. A total of 1243 articles were found. After using the selection criteria, 93 articles were selected, while 17 articles were found eligible for in-depth evaluation. For the results of the business process lifecycle evaluation, 17% of the approaches integrated security risk management into one of the phases of the business process, while others did not. For the influence of the results of the domain assessment of risk management, three key indicators (domain applicability, use of existing risk management techniques, and integration of risk standards) were used to substantiate our findings. The evaluation result of domain applicability showed that 53% of the approaches had been testing run in real-time, thereby making these works reusable. The result of the usage of existing risk analysis showed that 52.9% of the authors implemented their work using existing risk analysis techniques while 29.4% of the authors partially integrated security risk standards into their work. Based on these findings and results, security risk management, the usage of existing security risk management techniques, and security risk standards should be integrated with business process phases to protect against security issues in cloud services.


2021 ◽  
Vol 11 (19) ◽  
pp. 9206
Author(s):  
Traian Mihai Popescu ◽  
Alina Madalina Popescu ◽  
Gabriela Prostean

In the COVID-19 and post-pandemic business environment, leveraging robust Internet of Things (IoT) security risk management strategies becomes of particular importance to IoT adopters. Thus, given that no research study was found to exclusively focus on the current state of IoT security risk management strategies in organizations, this article aims to support IoT security practitioners to peer benchmark and enhance their IoT security risk management strategies. In a nutshell, this study relies on a mixed methods research methodology, and its main contribution is the determination of the current state of the IoT security risk management strategies in the surveyed organizations relative to our IoT Security Risk Management Strategy Reference Model (IoTSRM2). Hence, this study entails designing and conducting a survey, analyzing survey responses, and reporting survey results based on our IoTSRM2 and proposed three-phased survey methodology. Furthermore, before discussing the related work, this article provides our survey results for the surveyed large and small-medium organizations, the surveyed large organizations, and the surveyed large Technology, Media, and Telecom (TMT) organizations. For instance, our results reveal that while most surveyed organizations perform IoT risk assessments and focus on IoT infrastructure resilience, they fail in strategizing IoT governance and risk management, among others.


2021 ◽  
Vol 7 (5) ◽  
pp. 911-920
Author(s):  
Suqin Chen

Objectives: Through the reflection on the city’s response to the crisis in the process of tobacco control, a comprehensive and systematic public safety prevention and control system will be built to help cities cope with future risks and challenges. Methods: By using the methodological principle of the unity of subject and object and systematic research, this paper analyzes the problems from the three aspects of subject, object and means, and puts forward three important links of prevention, response and guarantee to construct a large urban public security system, and these three links support each other form a closed loop of risk prevention and control urban public security. Results: Under the background of tobacco control, it is feasible to a reliable whole-cycle management system for urban emergency response and accident rescue, a sound basic public safety guarantee system and a whole-society participation system. Conclusions: Due to the change of global climate conditions and the increase of flow people in the social environment, human beings will face a more complex living environment in the future and may encounter more extreme problems. It can be said that at present and even in the future, global urban public security risk management work is facing a grim situation. WHO research shows that smoking will increase the risk of new crown virus infection among smokers and their surrounding population.China is a big smoking country and in the stage of rapid urbanization. Many citiesare densely populated. Once there is an epidemic infection, the cities will face a severe public security situation. Smoking will not only have an adverse impact on personal health, but also the fires in factories, homes and forests caused by smoking.Since the Chinese government’s tobacco control in 2014, various accidents caused by smoking have caused great adverse effects.Smoking in public places has great hidden dangers of public safety, which leads us to think about the risk management of urban public safety.In the context of tobacco control, we should use scientific thinking and methods to construct a new pattern of urban public security risk management. Another important concept is to implement the risk management concept and the value of prevention first in the management of public affairs, so as to create a situation of risk sharing and coordinated response of the whole society.


Sign in / Sign up

Export Citation Format

Share Document