Treceți la conținutul principal

Vulnerability Analysis and Management-1

Vulnerability derives from the Latin word vulnerare (to be wounded) and describes the potential to be harmed physically and/or psychologically. Vulnerability is often understood as the counterpart of resilience, and is increasingly studied in linked social-ecological systems. The Yogyakarta Principles, one of the international human rights instruments use the term "vulnerability" as such potential to abuse or social exclusion.
Vulnerability refers to the inability of a worker or a group of workers  to withstand the effects of a hostile work environment. 
A window of vulnerability (WoV) is a time frame within which defensive measures are reduced, compromised or lacking. In windows of vulnerability – like the preparation for a movement of a workshop in parallel with the normal performance of the work ,workers are more prone to occupational accidents and incidents.
In relation to hazards and risks, vulnerability is a concept that unifies the relationship that people have with their environment to social forces and institutions and the cultural and other kind of  values(habbit,etc.)  that sustain or contest them. “The concept of vulnerability expresses the multi-dimensionality of disasters by focusing attention on the totality of relationships in a given social situation which constitute a condition that, in combination with environmental forces, produces a disaster”

It's also the extent to which changes could harm a work system, or to which the community can be affected by the impact of a hazard.


A short presentation (the paper was shown at the 5 th iNTeg-Risk Conference in May 2013) could be found here. 

Comentarii

Postări populare de pe acest blog

IDENTIFICAREA ȘI ANALIZA CAUZELOR RĂDĂCINĂ -1

Analiza cauzelor rădăcină este o metodă extrem de folosită de către managementul de performanță  din firmele dezvoltate. Metoda este considerată ca o metodă primară- care trebuie utilizată în primele faze ale analizei specifice procesului managerial. Ne propunem să prezentăm o metodă de analiză a cauzelor rădăcină care să poată fi aplicată atât pentru managementul calității cât și pentru managementul securității – ținând seama de faptul că în cea mai mare parte, cauzele rădăcină ale problemelor de calitate și problemelor de securitate și sănătate sunt comune. Figura 1 prezintă modul  global de analiză pentru cauzele rădăcină Din figură se poate observa că avem 2 procese distincte: ·         -un proces de identificare- care va fi realizat pe baza metodei cunoscute și ca 5 W ( 5 Why); ·         -un proces de analiză; procesul de analiză urmărește: o   stabilirea cauzelor specifice managementului calității și managementului de SSM; o   ierarhizarea cauzelor identificate;

Figura 1  Structurare…

DEVELOPING SAFETY ASSESSMENT SYSTEMS USING EXPERT SYSTEM SHELLS-1

Acknowledgements: The author wants to thank XpertRule Software LTD and mr. Tim Sell for being able to try Decision Author- the main software in which this prototype shall be built.
GENERAL ASPECTS Safety domain of research is by excellence a domain based on expertise. Textbooks and theoretical knowledge are good but the safety expert which inspects three times a day a certain part of an enterprise is the ultimate safety dealer here. A lot of expertise is transformed into lessons learned- that are used for training and improvement of existing safety attitudes. On the other part, this expertise could be also valued in order to build optimal and effective safety assessment systems. An expert system is software that emulates the decision-making ability of a human expert. In our case- the expert part should interrogate the specific employees regarding safety aspects of an enterprise. The next figure illustrates how a safety expert, with the necessary knowledge into the problem could impr…

VULNERABILITY METRICS AND KPI

KPI definitionA key performance indicator(KPI) is a measure of performance, commonly used to help an organization defineand evaluate how successful it is, typically in terms of making progress towards its long-term organizational goals.
–KPIs provide business-level context to security-generated data –KPIs answer the “so what?” question –Each additional KPI indicates a step forward in program maturity –None of these KPIs draw strictly from security data
COBITControl Objectives for Information and Related Technology (COBIT) is a framework created by ISACA for information technology (IT) management and IT governance. It is a supporting toolset that allows managers to bridge the gap between control requirements, technical issues and business risks. COBIT was first released in 1996; the current version, COBIT 5, was published in 2012. Its mission is “to research, develop, publish and promote an authoritative, up-to-date, international set of generally accepted information technology control obj…