Treceți la conținutul principal


1.Objective of the proposal
The main objective of the proposal is to perform and refine the study of vulnerability- as a dangerous phenomena for all  industrial enterprises and not only. Every economic entity (enterprise) is exposed to vulnerability. An enterprise could be vulnerable to internal or external factors, to unintended mistakes or to malevolence. The common direct effects or vulnerability are loss, incidents or accidents. Indirect effects of vulnerability are manifested on the position of the enterprise in the market, on its brand or on the relationships with suppliers, clients, local community or society as a whole.
Based on previous research developed inside iNTeG-Risk project, this study would end with operational instruments for assessing vulnerability, training people how to mitigate it and developing also other mitigation measures. . A prototype of the developed tools will be implemented and tested in at least 3 pilot enterprises.
The obtained results could be used by any enterprise- with a special focus on SME (Small and medium Enterprises) that are more affected  by the vulnerabilities.
The research proposed here covers a complex, multidisciplinary field including development and asset studies, public health, security studies, engineering, and disaster and risk management.

2. Activities to be performed
-a. vulnerability cross study- vulnerability would be looked upon as a phenomena that afects economic unitsThe study would include the main actors of vulnerability, the vulnerability cycle, the relationship between vulnerability and critical assets of the enterprise and more .
-vulnerability assessment method development; we know at this point that the enterprise could be affected by some identified vulnerabilities; we also know that these are interacting with certain assets that could affect or could be affected by vulnerabilities. We need to be able to assess the vulnerabilities taking into account all these considerations, in order to prioritize the mitigation plans.
c.research on a vulnerability mitigation tool through training and managerial best practices: this activity should be based on points a and b and should  research the development of the best vulnerability mitigation tools; as one of the main actors is the human operator- specific training, focused on knowledge islands should be one of the tools, together with a way to quickly and efficiently develop and implement best practices for specific vulnerabilities (like a sudden spill);
d.Development of an integrated package to deal with vulnerability in connexion with quality, health and safety and environment management. Vulnerability has specific common parts with these three types of management.
e.Piloting the implementation of the developed tools and methods in at least three specific pilots from construction industry, mechanical maintenance services and process industry.
The main activities that would be performed would give their global content to specific workpackages.

3. Methodologies used
The methodologies to be used are mixed, providing examples of best practice in data generation and analysis. The wealth of experiences with existing methods have also laid the foundation for more innovative approaches in integrating quantitative and qualitative research , implemented in this research. Mainly the methods would be cantered around a qualitative approach- as needed for such a research.
4.Expected results
As the main expected results were ennounced with the activities that would  produce them- we could recapitulate:
-R1.a risk-vulnerability ontology; intelligent vulnerability identification checklist including a BEEVA tool (mainly a  specialized cost- benefit tool); operative semi-qualitative method to assess vulnerabilities ;
-R4.a framework that would integrate the identification and the assessment of vulnerabilities for further efficient management; individual quick adaptive training tool based on knowledge islands;

-R6.a tool for vulnerability mitigation  based upon best practice procedures;


Postări populare de pe acest blog


Analiza cauzelor rădăcină este o metodă extrem de folosită de către managementul de performanță  din firmele dezvoltate. Metoda este considerată ca o metodă primară- care trebuie utilizată în primele faze ale analizei specifice procesului managerial. Ne propunem să prezentăm o metodă de analiză a cauzelor rădăcină care să poată fi aplicată atât pentru managementul calității cât și pentru managementul securității – ținând seama de faptul că în cea mai mare parte, cauzele rădăcină ale problemelor de calitate și problemelor de securitate și sănătate sunt comune. Figura 1 prezintă modul  global de analiză pentru cauzele rădăcină Din figură se poate observa că avem 2 procese distincte: ·         -un proces de identificare- care va fi realizat pe baza metodei cunoscute și ca 5 W ( 5 Why); ·         -un proces de analiză; procesul de analiză urmărește: o   stabilirea cauzelor specifice managementului calității și managementului de SSM; o   ierarhizarea cauzelor identificate;

Figura 1  Structurare…


KPI definitionA key performance indicator(KPI) is a measure of performance, commonly used to help an organization defineand evaluate how successful it is, typically in terms of making progress towards its long-term organizational goals.
–KPIs provide business-level context to security-generated data –KPIs answer the “so what?” question –Each additional KPI indicates a step forward in program maturity –None of these KPIs draw strictly from security data
COBITControl Objectives for Information and Related Technology (COBIT) is a framework created by ISACA for information technology (IT) management and IT governance. It is a supporting toolset that allows managers to bridge the gap between control requirements, technical issues and business risks. COBIT was first released in 1996; the current version, COBIT 5, was published in 2012. Its mission is “to research, develop, publish and promote an authoritative, up-to-date, international set of generally accepted information technology control obj…


Este prezentat în continuare un exemplu de completare al documentelor referitoare la evaluarea mașinilor-unelte din punct de vedere al securității și sănătății în muncă- pentru noul sistem de evaluare  care va fi dezvoltat în cadrul INCDPM ”Alexandru Darabont”

Presupunem că analizăm o mașină de găurit verticală, alimentată la curent electric. Fiind un model mai vechi mașina nu dispune de dispozitive de protecție speciale. Exemplul de completare  este dat în continuare. Evaluatorul completează  mai multe fișe principale, fiind sprijinit în această activitate și de un specialist din cadrul facilității evaluate, specialist care cunoaște bine respectivele mașini unelte. Pe baza fișelor principale se completează Raportul de îmbunătățire al situației SSM și Planul de măsuri. Imaginea mașinii de evaluat este dată în continuare.
Figura 1 Mașina-unealtă evaluată
Se poate observa faptul că mașina este carcasată etanș, fără a avea însă dispozitive de protecție sau protectori. Există o cheie de regla…