1.Objective of the proposal
The main objective of the proposal is to perform and refine the study of vulnerability- as a dangerous phenomena for all industrial enterprises and not only. Every economic entity (enterprise) is exposed to vulnerability. An enterprise could be vulnerable to internal or external factors, to unintended mistakes or to malevolence. The common direct effects or vulnerability are loss, incidents or accidents. Indirect effects of vulnerability are manifested on the position of the enterprise in the market, on its brand or on the relationships with suppliers, clients, local community or society as a whole.
Based on previous research developed inside iNTeG-Risk project, this study would end with operational instruments for assessing vulnerability, training people how to mitigate it and developing also other mitigation measures. . A prototype of the developed tools will be implemented and tested in at least 3 pilot enterprises.
The obtained results could be used by any enterprise- with a special focus on SME (Small and medium Enterprises) that are more affected by the vulnerabilities.
The research proposed here covers a complex, multidisciplinary field including development and asset studies, public health, security studies, engineering, and disaster and risk management.
2. Activities to be performed
-a. vulnerability cross study- vulnerability would be looked upon as a phenomena that afects economic unitsThe study would include the main actors of vulnerability, the vulnerability cycle, the relationship between vulnerability and critical assets of the enterprise and more .
-vulnerability assessment method development; we know at this point that the enterprise could be affected by some identified vulnerabilities; we also know that these are interacting with certain assets that could affect or could be affected by vulnerabilities. We need to be able to assess the vulnerabilities taking into account all these considerations, in order to prioritize the mitigation plans.
c.research on a vulnerability mitigation tool through training and managerial best practices: this activity should be based on points a and b and should research the development of the best vulnerability mitigation tools; as one of the main actors is the human operator- specific training, focused on knowledge islands should be one of the tools, together with a way to quickly and efficiently develop and implement best practices for specific vulnerabilities (like a sudden spill);
d.Development of an integrated package to deal with vulnerability in connexion with quality, health and safety and environment management. Vulnerability has specific common parts with these three types of management.
e.Piloting the implementation of the developed tools and methods in at least three specific pilots from construction industry, mechanical maintenance services and process industry.
The main activities that would be performed would give their global content to specific workpackages.
3. Methodologies used
The methodologies to be used are mixed, providing examples of best practice in data generation and analysis. The wealth of experiences with existing methods have also laid the foundation for more innovative approaches in integrating quantitative and qualitative research , implemented in this research. Mainly the methods would be cantered around a qualitative approach- as needed for such a research.
As the main expected results were ennounced with the activities that would produce them- we could recapitulate:
-R1.a risk-vulnerability ontology;
-R2.an intelligent vulnerability identification checklist including a BEEVA tool (mainly a specialized cost- benefit tool);
-R3.an operative semi-qualitative method to assess vulnerabilities ;
-R4.a framework that would integrate the identification and the assessment of vulnerabilities for further efficient management;
-R5.an individual quick adaptive training tool based on knowledge islands;
-R6.a tool for vulnerability mitigation based upon best practice procedures;