Academic literature on the topic 'Critical control risk management'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Critical control risk management.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Critical control risk management"

1

Atkins, P. Mardeen. "Reducing Risks Through Quality Improvement, Infection Control, and Risk Management." Critical Care Nursing Clinics of North America 7, no. 4 (December 1995): 733–41. http://dx.doi.org/10.1016/s0899-5885(18)30367-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Molotsi, Tebogo, and Tankiso Moloi. "Risk management and control: Human resources risks in a merged academic institution." Journal of Governance and Regulation 4, no. 2 (2015): 155–59. http://dx.doi.org/10.22495/jgr_v4_i2_c1_p9.

Full text
Abstract:
This paper measured the mood of College of Science, Engineering and Technology (CSET) academics following the merger between University of South Africa (UNISA), Vista University Distance Education Campus (VUDEC) and Technikon SA (TSA). The formulated statements, potential human resources related risks with association to the statements were articulated. The results obtained from the survey indicated that had the risk assessment been undertaken in CSET, the risk of losing/ retaining critical skills, corporate memory, and the inability to attract these critical skills to CSET could have been higher on the risk dashboard following the post-merger of UNISA, VUDEC and TSA.
APA, Harvard, Vancouver, ISO, and other styles
3

Yudha Adi Kusuma and Aan Zainal Muttaqin. "Asset Management Based on Risk Control and Information Systems." Jurnal Sistem Teknik Industri 24, no. 2 (July 29, 2022): 147–58. http://dx.doi.org/10.32734/jsti.v24i2.6909.

Full text
Abstract:
Asset management is needed in asset inventory. The preparation of an asset inventory is taken into account the aspects of asset management and risk management. The measurement results with SEM obtained APC values and values < 0.05 and AVIF < 5 so that the relationship between the criteria for asset management and risk management has a significant effect on the design of asset information systems. Measurement of risk management obtained 4 critical risks that affect the design of asset information systems. One of the asset information systems that meet the criteria of being integrated, easy to manage, and easy to update the data is a QR code-based check sheet. Its use in a small scope is easier to implement than using a database system.
APA, Harvard, Vancouver, ISO, and other styles
4

Sales, Xavier. "Managing strategic risks from management control approach." Corporate Ownership and Control 7, no. 4 (2010): 9–13. http://dx.doi.org/10.22495/cocv7i4sip2.

Full text
Abstract:
It is this conceptual paper’s intention to show the use of a management control approach to managing strategic risks. This theoretical work presents and conceptualizes strategic risk, categorizes strategic risks (examples taken from financial industry are used) and presents a management control framework to manage with these risks strategically. The paper illustrates the need to identify strategic risks proactively and to integrate risk management tools into overall company strategic management. It suggests that risk management is critical for an organization’s survival; it needs to have a company-wide strategic approach and backed by the top management of the organization. The paper also suggests that shareholders are ultimately responsible for the way the risks their companies face are managed. The recent financial crisis has generated a considerable amount of discussion around what regulators can do or could have done, while forgetting proper controls system by owners (shareholders) to influence and control the behavior of the managers of their own companies.
APA, Harvard, Vancouver, ISO, and other styles
5

Boyson, Sandor. "Cyber supply chain risk management: Revolutionizing the strategic control of critical IT systems." Technovation 34, no. 7 (July 2014): 342–53. http://dx.doi.org/10.1016/j.technovation.2014.02.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Selleck, Roberta, Maureen Hassall, and Marcus Cattani. "Determining the Reliability of Critical Controls in Construction Projects." Safety 8, no. 3 (September 7, 2022): 64. http://dx.doi.org/10.3390/safety8030064.

Full text
Abstract:
Across the global construction industry, fatalities continue to occur from high-risk activities, where the risk controls have been defined; however, these were unreliable. In the mining industry, Critical Control Risk Management has provided positive results in reducing major accidents, which raises the question, could the Critical Control approach reduce the fatality rate in the construction industry? This study analyzed 10 years of serious and fatal incident investigation reports from four international construction companies to (i) assess the reliability of their Critical Controls (CCs) and (ii) assess the factors that affect the reliability of CCs. The results show the reliability of CCs, measured by implementation and effectiveness, averaged just 42%. Insight into human performance and organizational factors, including risk identification, decision-making and competency, together with supervision, job planning and communication, were identified as opportunities to improve the reliability of CCs. The study used bowtie diagrams with real event data to find the actual CC reliability. This appears to be the first published study that reports on the reliability of critical risk controls in construction. It demonstrates a feasible method for determining and communicating control effectiveness that can be used to deliver meaningful insights to industry practitioners on actual control performance and focus areas for improvement. In addition, actionable findings directly related to individual CCs can be derived that enable the participating organization to focus resources on improving specific verification processes. The results confirm the applicability of CCs for the Major Accident Event hazards analyzed and highlights that further reviews are required on the factors that need to be considered when implementing a CC program. This paper details our methodology and results, to assist others applying CCs as a risk management tool.
APA, Harvard, Vancouver, ISO, and other styles
7

ABBASS, Wissam, Zineb BAKRAOUY, Amine BAINA, and Mostafa BELLAFKIH. "Intelligent Risk Management framework." IAES International Journal of Artificial Intelligence (IJ-AI) 8, no. 3 (December 1, 2019): 278. http://dx.doi.org/10.11591/ijai.v8.i3.pp278-285.

Full text
Abstract:
The Internet of Things(IoT) is rapidly increasing and enhancing today’s world by introducing a large set of interconnected devices. Several beneficial services are produced by these devices as for area monitoring and process control. However, IoT security is still a major problem. In fact, IoT’ security beggings largely whith an effective Risk Management process. However, the essense of this process is to acquire a risk inventory cibling the IoT devices. Nevertheless, it is quite difficult to obtaining this latter which significantly adds complication issues to the Risk Management.Without the ability of holisticly identify the IoT critical devices, inaccurate Risk Management is achieved which leads unfortunately to novel risk exposures. Traditional Risk-based approaches fails drastically at apprending IoT’ potential attacks. The dynamic structure, the heteregouns nature of devices, the various security objectives and infrastructure pervasiveness are key factors impacting the overall perfomance. Thus, a holistic Risk Management witihin the IoT is indispensable. Accordingly, we propose an intelligent Risk Management framework using Mobile Agents in order to deliver preventive and responsive assessment.
APA, Harvard, Vancouver, ISO, and other styles
8

Carvalho, Maria Carolina, Rui Gonçalves, Renato Lopes da Costa, Leandro Ferreira Pereira, and Alvaro Dias. "Contributions of Artificial Intelligence in Operational Risk Management." International Journal of Intelligent Information Technologies 18, no. 1 (January 2022): 1–16. http://dx.doi.org/10.4018/ijiit.296237.

Full text
Abstract:
Considering the last decades and several economic crises, Operational Risk is a rising area and companies are slowly realizing that the more they invest on it, the less profits they lose. Artificial Intelligence is the critical topic of the century, wide enough to cover all conceivable areas, bringing easy, cheaper, and more precise ways of doing tasks. This paper reflects the progresses of implementing Artificial Intelligence technologies in the control of Operational Risks. The qualitative research revealed the deficiency of investment, as well as the absence of information concerning the progresses on the AI technologies applicable to OpRisk controls. Obstacles as the lack of human resources capabilities and prioritising other sectors are impediments to this automation. Companies must invest in the OpRisk departments, considering the existing AI solutions that allow the maturation of OpRisk controls and, therefore, to mitigate losses that occur from them.
APA, Harvard, Vancouver, ISO, and other styles
9

Balakin, S. V., and B. I. Dolintse. "Risk assessment in computer networks inherent in critical infrastructures." Problems of Informatization and Management 2, no. 70 (June 24, 2022): 4–9. http://dx.doi.org/10.18372/2073-4751.70.16840.

Full text
Abstract:
This work is devoted to the problem of risk assessment in computer networks that are inherent in critical infrastructures. The work shows the place of the risk assessment process in the global risk management process, as well as its goals, content and objectives. The most important infrastructure nodes and their interrelations are considered. The system of security indicators proposed for risk assessment in computer networks of critical infrastructures. Aspects of risk management of exceeding critical state variables of the threshold values of the crisis range for the object's information technology infrastructure are considered. The main research methods included structural and system analysis. The authors identified the main security threats in automated control systems, and also proposed methods for calculating their stability.
APA, Harvard, Vancouver, ISO, and other styles
10

Petrillo, Antonella, Roberta Fusco, Vincenza Granata, Salvatore Filice, Nicola Raiano, Daniela Maria Amato, Maria Zirpoli, et al. "Risk Management in Magnetic Resonance: Failure Mode, Effects, and Criticality Analysis." BioMed Research International 2013 (2013): 1–5. http://dx.doi.org/10.1155/2013/763186.

Full text
Abstract:
The aim of the study was to perform a risk management procedure in “Magnetic Resonance Examination” process in order to identify the critical phases and sources of radiological errors and to identify potential improvement projects including procedures, tests, and checks to reduce the error occurrence risk. In this study we used the proactive analysis “Failure Mode Effects Criticality Analysis,” a qualitative and quantitative risk management procedure; has calculated Priority Risk Index (PRI) for each activity of the process; have identified, on the PRI basis, the most critical activities and, for them, have defined improvement projects; and have recalculated the PRI after implementation of improvement projects for each activity. Time stop and audits are performed in order to control the new procedures. The results showed that the most critical tasks of “Magnetic Resonance Examination” process were the reception of the patient, the patient schedule drafting, the closing examination, and the organization of activities. Four improvement projects have been defined and executed. PRI evaluation after improvement projects implementation has shown that the risk decreased significantly following the implementation of procedures and controls defined in improvement projects, resulting in a reduction of the PRI between 43% and 100%.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Critical control risk management"

1

Dawson, Robert Edward. "Secure communications for critical infrastructure control systems." Thesis, Queensland University of Technology, 2008. https://eprints.qut.edu.au/20710/1/Robert_Dawson_Thesis.pdf.

Full text
Abstract:
In March 2000, 1 million litres of raw sewage was released into the water system of Maroochy Shire on Queensland’s sunshine coast. This environmental disaster was caused by a disgruntled ex-contractor using a radio transmitter to illicitly access the electronically controlled pumps in the control system. In 2007 CNN screened video footage of an experimental attack against a electrical generator. The attack caused the generator to shake and smoke, visually showing the damage caused by cyber attack. These attacks highlight the importance of securing the control systems which our critical infrastructures depend on. This thesis addresses securing control systems, focusing on securing the communications for supervisory control and data acquisition (SCADA) systems. We review the architectures of SCADA systems and produce a list of the system constraints that relate to securing these systems. With these constraints in mind, we survey both the existing work in information and SCADA security, observing the need to investigate further the problem of secure communications for SCADA systems. We then present risk modelling techniques, and model the risk in a simple SCADA system, using the ISM, a software tool for modelling information security risk. In modelling the risk, we verify the hypothesis that securing the communications channel is an essential part of an effective security strategy for SCADA systems. After looking at risk modelling, and establishing the value of securing communications, we move on to key management for SCADA systems. Appropriate key management techniques are a crucial part of secure communications, and form an important part of the contributions made in this work. We present a key management protocol that has been designed to run under the constraints specific to SCADA systems. A reductionist security proof is developed for a simplified version of the protocol, showing it is secure in the Bellare Rogaway model.
APA, Harvard, Vancouver, ISO, and other styles
2

Dawson, Robert Edward. "Secure communications for critical infrastructure control systems." Queensland University of Technology, 2008. http://eprints.qut.edu.au/20710/.

Full text
Abstract:
In March 2000, 1 million litres of raw sewage was released into the water system of Maroochy Shire on Queensland’s sunshine coast. This environmental disaster was caused by a disgruntled ex-contractor using a radio transmitter to illicitly access the electronically controlled pumps in the control system. In 2007 CNN screened video footage of an experimental attack against a electrical generator. The attack caused the generator to shake and smoke, visually showing the damage caused by cyber attack. These attacks highlight the importance of securing the control systems which our critical infrastructures depend on. This thesis addresses securing control systems, focusing on securing the communications for supervisory control and data acquisition (SCADA) systems. We review the architectures of SCADA systems and produce a list of the system constraints that relate to securing these systems. With these constraints in mind, we survey both the existing work in information and SCADA security, observing the need to investigate further the problem of secure communications for SCADA systems. We then present risk modelling techniques, and model the risk in a simple SCADA system, using the ISM, a software tool for modelling information security risk. In modelling the risk, we verify the hypothesis that securing the communications channel is an essential part of an effective security strategy for SCADA systems. After looking at risk modelling, and establishing the value of securing communications, we move on to key management for SCADA systems. Appropriate key management techniques are a crucial part of secure communications, and form an important part of the contributions made in this work. We present a key management protocol that has been designed to run under the constraints specific to SCADA systems. A reductionist security proof is developed for a simplified version of the protocol, showing it is secure in the Bellare Rogaway model.
APA, Harvard, Vancouver, ISO, and other styles
3

Cao, Kay Quy Thanh Thi. "An Economic Analysis of Hazard Analysis Critical Control Point-Based Risk Management Programme in the New Zealand Meat Industry." The University of Waikato, 2007. http://hdl.handle.net/10289/2526.

Full text
Abstract:
The replacement of the Meat Act 1981 by the Animal Products Act 1999 opened a new era for food safety management in New Zealand. Administering food legislation is now the sole responsibility of the New Zealand Food Safety Authority instead of being shared between the Ministry of Agriculture and Forestry and the Ministry of Health as previously. At the core of the legislative change is the requirement for Risk Management Programmes (RMP). Every single animal primary processing business is required to have an RMP for each type of product. An RMP is required to embrace the principles of Hazard Analysis and Critical Control Point (HACCP). While there have been some studies considering the implementation of HACCP in food businesses worldwide, there has not been any study focusing on HACCP adoption in New Zealand. The mandating of RMP has also made the implementation process more complex. On the other hand, it also brings new experience in terms of food safety management. This thesis examines the implementation process of HACCP/RMP in New Zealand. It also explores the interaction between food safety management and international competitiveness through an economic analysis of the impacts of the program on a New Zealand food processing industry. The meat industry was chosen as a case study as it is one of the first industries that had to comply with the first deadline of the implementation (July 2003). Also, being a significant export-oriented industry of New Zealand, the meat industry provides an ideal case for the purpose of this study. The thesis consists of four parts. Part I presents an introduction to the study including a review of international and national food safety issues, the relationship between food safety and trade and international competitiveness, and the HACCP economic literature. This background helps to shape the research objectives and methodology as described in Chapter 3. Chapter 4 discusses the design of the survey to collect plant experience regarding the implementation of HACCP/RMP in New Zealand. Part II analyses the experiences within the New Zealand meat industry regarding the implementation of HACCP/RMP. It discusses plant motivations to adopt the program and the implementation issues they are facing. Plant observations on the costs and benefits of the implementation are reported. Further, data gathered from the survey are used in a non-parametric analysis of the influences of the plant characteristics on the HACCP/RMP implementation process. The analysis provides implications for HACCP/RMP policy design. Part III presents the modelling techniques to quantify the costs and benefits of HACCP/RMP implementation. In Chapter 8, a quality-adjusted cost function is used to estimate the change in variable cost of production due to HACCP/RMP. It shows that this type of cost can make up a significant proportion of the total implementation cost. In Chapter 9, an export model is employed to analyse the impact of HACCP/RMP on meat industry export performance. The results show that the programme can bring a positive impact on exports. However, the magnitude of the impact depends on the status of existing food safety management before HACCP/RMP implementation. In Chapter 10, the Global Trade Analysis Project (GTAP) model is used to simulate the scenarios where market accesses to significant export destinations are lost when HACCP/RMP is not adopted. The estimated costs of these losses signal the potential benefits of HACCP/RMP. The research results show that HACCP/RMP can deliver a net benefit to the New Zealand meat industry. The thesis concludes with implications for policy design and future research directions. It signifies that the research findings, in addition to reporting an investigation into HACCP/RMP implementation process in New Zealand, provide an important foundation for future research on food safety and international competitiveness.
APA, Harvard, Vancouver, ISO, and other styles
4

Welsh, R. A. "Organisational diversity and HACCP enactment: A study of risk within the Australian food industry." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2009. https://ro.ecu.edu.au/theses/1902.

Full text
Abstract:
This thesis examines the diversity management issues that arise from a risk management foray. It enters the organisational world and explores the social consequences of adopting a measure known as Hazard Analysis Critical Control Point or, to use the colloquial term, HACCP. Academically, it provides new knowledge on the tensions and discourse that mediate the response to the enactment. It links metatheory with the social mechanisms that operate within an organisation. It culminates with a theoretical model for the enactment of a HACCP program within a systems framework. Practically it contributes to the understanding of the diversity of applications of what may appear to be a simple measure but in practice has many dimensions. The expectation behind adopting a risk management intervention is to embed internal controls that manage, rather than eliminate, risk within predefined limits. Conversely diversity is critical to maintaining organisational competitiveness. The management of diversity is a matter of increasing the types of model, methodology and theory as well as the mechanisms for choosing between those types. A strong focus on diversity is the antithesis of the control inherent in a risk management intervention. The presence of both within an organisation presents an interesting conundrum. This study focused on the tensions between a control focus arising from adopting a HACCP program and the need to promote diversity within as the organisation confronts the challenges of a rapidly changing market place. This study took the unique opportunity to examine the enactment of a HACCP program from its inception as a legislative control tool to it becoming a mainstream assurance tool. It was serendipitous that enactment could be explored at a time of considerable market turbulence and where the effective use of diversity became critical to the survival of the organisation. The research design was based on the case study approach. It explored a series of cases over a tenyear period in an iterative manner. The study first looked at an industry as a whole as it struggled with seismic changes in legislation and market conditions. The focus progressively shifted more closely towards the organisation and its experiences, as it became more aware of the impact of new legislative forces. It culminated in a case study of an organisation that first evaluated then adopted a formal HACCP intervention based on the ISO22000 HACCP standard in response to market pressure. The study used interviews as the key research tool supported by observation and relevant documentation. Each of the four study phases is reviewed in chronological order and culminates by Hazard Analysis Critical Control Point exposing the constructs that emerged across the cases and phases. The interpretation primarily focussed on actor perceptions to position the enactment of HACCP within organisation management discourse. A hermeneutic phenomenology approach was adopted to construct the interactions arising from the HACCP intervention. The constructs were clarified with the assistance of four established management theories. The study found that rather than demonstrating uniformity of application the enactment of a HACCP program reflects the prevailing organisational interpretation of the meaning of management. The enactment partially defines the linkage between management practice and perceptions of power, politics, and conflict. It can also impact on the expression of performance. Finally, understanding comes from establishing a structural design in terms of HACCP focussed activity that strikes a balance between no structure and a superstructure. The balance is derived from the organisation’s own level of linkage with its social and technical environment.
APA, Harvard, Vancouver, ISO, and other styles
5

PISAPIA, GIOVANNI. "Sviluppo di una metodologia per la gestione del rischio attentati terroristici contro infrastrutture critiche." Doctoral thesis, Università Cattolica del Sacro Cuore, 2008. http://hdl.handle.net/10280/205.

Full text
Abstract:
Questa tesi di dottorato consiste nello sviluppo di una metodologia per gestire il rischio attentati terroristici contro infrastrutture fisiche per proprietari o gestori di impianti appartenenti ad infrastrutture critiche.
This Ph.D. thesis consists in developing a terrorism risk management framework (TRMF) to guide critical infrastructure facilities' owners and operators in their decision making process related to the risk of terrorism.
APA, Harvard, Vancouver, ISO, and other styles
6

PISAPIA, GIOVANNI. "Sviluppo di una metodologia per la gestione del rischio attentati terroristici contro infrastrutture critiche." Doctoral thesis, Università Cattolica del Sacro Cuore, 2008. http://hdl.handle.net/10280/205.

Full text
Abstract:
Questa tesi di dottorato consiste nello sviluppo di una metodologia per gestire il rischio attentati terroristici contro infrastrutture fisiche per proprietari o gestori di impianti appartenenti ad infrastrutture critiche.
This Ph.D. thesis consists in developing a terrorism risk management framework (TRMF) to guide critical infrastructure facilities' owners and operators in their decision making process related to the risk of terrorism.
APA, Harvard, Vancouver, ISO, and other styles
7

Braga, Mônica Durães. "Análise de perigos e pontos críticos de controle APPCC: estudo de caso no sistema de abastecimento de água da Universidade Federal de Viçosa." Universidade Federal de Viçosa, 2007. http://locus.ufv.br/handle/123456789/5210.

Full text
Abstract:
Made available in DSpace on 2015-03-26T13:47:29Z (GMT). No. of bitstreams: 1 texto completo.pdf: 4069603 bytes, checksum: 86b254d515c67c4a265e4d713e51b915 (MD5) Previous issue date: 2007-01-29
Conselho Nacional de Desenvolvimento Científico e Tecnológico
The drink water production to human use with adequate standards is very important to the health of consumers. At present, there are many researches in development to value the treatment of water in the world with support of World Health Organization and Health Treasury. On this context, the HACCP system is a important instrument to maintain the quality in water production. The studied supply system was the ETA/UFV, where were value in microbiologic and physical-chemical aspects of all treatment points to value the hazards. About the results, the ETA was according with the decree MS no 518/2004. Still, were value the associations of the protozoan (oo)cysts with others aspects as spores (aerobic e anaerobic), heterotrophic plate count, Clostridium perfringens, turbidity, color and solids. In this value of the plan was possible to suggest to introduction the points of the HACCP in the water treatment, valuing the action of al the treatment point (raw water, sedimentation, filters, disinfection and distribution) and the removal of all parameters. With this work, it was suggest as critical points the raw water, sedimentation, filters and disinfection. However, the HACCP is a system to reduce the risks to the health, valuing all the points and locate the faults, so, it is important to consider the estimation necessity of each production unit, in this case the water treatment, carrying own assessment to locate the hazards in the production to establish own limits and preventions.
A produção de água para consumo humano com padrões adequados de potabilidade é de suma importância para a saúde da população consumidora. Atualmente, diversas pesquisas têm sido realizadas sob a sugestão da Organização Mundial de Saúde e Ministério da Saúde, no intuito de avaliar as técnicas disponíveis no tratamento de água e propor novas tecnologias e, ou novos parâmetros de qualidade. Nesse contexto, o sistema APPCC apresenta-se como ferramenta viável no controle da produção de água. O sistema de abastecimento em estudo foi o da Universidade Federal de Viçosa (SAA-UFV) onde foram monitoradas todas as etapas de tratamento segundo parâmetros microbiológicos e físico-químicos a fim de identificar os perigos a partir de um diagrama de fluxo pré-elaborado. Segundo os resultados obtidos, o controle da qualidade da água produzida pela esteve sempre de acordo com os padrões estabelecidos pela Portaria MS no 518/2004. Foi verificado, ainda, correlações significativas entre (oo)cistos de protozoários e os parâmetros esporos (aeróbios e anaeróbios), contagem de bactérias heterotróficas, Clostridium perfringens, turbidez, cor e sólidos em suspensão, sendo necessários, entretanto, outros estudos para a adequada validação desses resultados. A avaliação inicial da produção de água na estação de tratamento de água da UFV (ETA-UFV) permitiu subsidiar a aplicação dos princípios do APPCC. Segundo as remoções dos parâmetros microbiológicos e físico-químicos verificadas em cada etapa, foram considerados pontos de atenção: captação, decantação, filtração, desinfecção e distribuição. Como pontos críticos de controle, foram considerados: captação, decantação, filtração e desinfecção. Há ainda de se considerar que, sendo o APPCC um plano que busca minimizar as chances de falhas no sistema de produção a partir de avaliações sistemáticas do processo, é necessário que cada unidade de produção, neste caso, as estações de tratamento de água, realize estudos preliminares para verificação de seus perigos, pontos críticos e medidas próprias de prevenção e, ou, controle.
APA, Harvard, Vancouver, ISO, and other styles
8

Yaraghi, Niam. "Critical Success Factors for Risk Management Systems." Thesis, KTH, Mechanics, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-11784.

Full text
Abstract:

Despite the existence of extensive literature regarding risk management, there still seems to be lack of knowledge in identification of Critical Success Factors (CSFs) in this area. In this research Grounded Theory is implemented to identify CSFs in Risk Management Systems (RMS). Factor analysis and one-sample t-test are then used to refine and rank the CSFs based on the results of a survey which has been performed among Risk Management practitioners in various types of Swedish corporations. CSFs are defined from three different perspectives: (a) the factors that have influence on the inclination and readiness of corporation for implementing RMS. (b) the factors that are important during the design and implementation of RMS in corporation and can significantly affect the success of RMS design and implementation and (c) the factors that are crucially important to successfully run, maintain and administrate RMS after the closure of the project of RMS design and Implementation.

This systematic approach towards understanding the taxonomy of the success dimension in RMS is important for re-enforcing effective risk management practices.

APA, Harvard, Vancouver, ISO, and other styles
9

Helliar, Christine. "Risk, derivatives and management control." Thesis, University of Dundee, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.341617.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hájková, Marcela. "Zavedení účinného systému HACCP ve firmě Cutisin s.r.o." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2009. http://www.nusl.cz/ntk/nusl-222204.

Full text
Abstract:
This Master´s thesis is focused on the proposition of system HACCP as appropriate solution incurred complaint. I start from the theoretical bases and from analysis of the current state in the company Cutisin s.r.o. The particular part is included hazard analysis of single step of the process plan, critical control points in production, precautionary measures and corrective action.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Critical control risk management"

1

Jahncke, Michael L. Application of Hazard Analysis Critical Control Point (HACCP) principles as a risk management tool to control viral pathogens at shrimp aquaculture facilities. Hampton, Va: Virginia Seafood Agricultural Research and Extension Center (VSAREC), Virginia Tech/Virginia Sea Grant, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Safety-Critical Systems Symposium (14th 2006 Bristol, England). Developments in risk-based approaches to safety: Proceedings of the fourteenth Safety-critical Systems Symposium, Bristol, UK, 7-9 February 2006. London: Springer, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Safety-Critical Systems Symposium (9th 2001 Bristol, England). Aspects of safety management: Proceedings of the Ninth Safety-Critical Systems Symposium, Bristol, UK, 2001. London: Springer, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Willemssen, Joel C. Computer security: Critical federal operations and assets remain at risk : statement of Joel C. Willemssen, Director, Civil Agencies Information Systems, Accounting and Information Management Division, before the Subcommittee on Government Management, Information and Technology, Committee on Government Reform, House of Representatives. [Washington, D.C.]: The Office, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Joint Commission on Accreditation of Healthcare Organizations. Root cause analysis in health care: Tools and techniques. 2nd ed. Oakbrook Terrace, IL: Joint Commission on Accreditation of Healthcare Organizations, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wilkinson, Shaun. Risk control. London: Witherby, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Foundation, Conservation, ed. Risk assessment and risk control. Washington, D.C: Conservation Foundation, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Pompon, Raymond. IT Security Risk Control Management. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2140-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

1941-, Head George L., and Insurance Institute of America, eds. Essentials of risk control. 2nd ed. Malvern, Pa: Insurance Institute of America, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Malcolm, Fraser. Derivatives: Optimal risk control. [London]: Financial Times, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Critical control risk management"

1

Gilsbach, J. M. "Keeping Track of Critical Incidents and Complications." In Risk Control and Quality Management in Neurosurgery, 117–24. Vienna: Springer Vienna, 2001. http://dx.doi.org/10.1007/978-3-7091-6237-8_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dister, Carl J., Anthony Jablonski, and Tyson R. Browning. "Applying DSM methodology to rank risk of internal controls in critical infrastructure enterprises." In Risk and change management in complex systems, 123–36. München: Carl Hanser Verlag GmbH & Co. KG, 2015. http://dx.doi.org/10.3139/9783446447264.012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Spiegel, Yitzhak, Orly Oren, and Ralf-Udo Ehlers. "Critical terms during development and commercialization of microbial agents for the control of plant parasitic nematodes." In Integrated nematode management: state-of-the-art and visions for the future, 446–53. Wallingford: CABI, 2021. http://dx.doi.org/10.1079/9781789247541.0062.

Full text
Abstract:
Abstract The original vision of phytonematodes' biocontrol has been to reduce the pest population by natural enemies with the active involvement of the human role. Two main arguments against the use of chemical control to combat plant parasitic nematodes directed both the consumers and the producers to look for alternatives: health risks to the customers and ecological concerns. At the beginning, there had been many expectations about the potential of biocontrol to substitute, or at least to reduce dramatically, the treatments with chemicals to control phytonematodes. However, problems regarding the techniques and other concerns relevant to different issues of biocontrol resulted in polarizing attitudes toward this discipline. This chapter discusses the difficulties and restraints faced by the developers, producers and/or the consumers (farmers), including: (i) health and ecological concerns; (ii) production techniques; (iii) efficacy of the product in the field; (iv) field application protocols; (v) shelf life of the final product; and (vi) registration. The projection of global biological control taking over chemical control is also mentioned.
APA, Harvard, Vancouver, ISO, and other styles
4

Blount, Sumner. "Risk Management." In Under Control, 35–54. Berkeley, CA: Apress, 2010. http://dx.doi.org/10.1007/978-1-4302-1593-6_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Boyle, Tony. "Risk control." In Health and Safety: Risk Management, 36–48. Fifth edition. | Abingdon, Oxon; New York, NY : Routledge, 2019.: Routledge, 2019. http://dx.doi.org/10.4324/9780429436376-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Beroggi, Giampiero E. G., and William A. Wallace. "Operational Control." In Operational Risk Management, 140–62. Boston, MA: Springer US, 1998. http://dx.doi.org/10.1007/978-1-4615-5747-0_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lee, Hongmu. "Accounting Fraud and Internal Control." In Risk Management, 25–33. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-3468-0_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lane, Stuart N. "Ethical Risk Management, but Without Risk Communication◊." In Critical Risk Research, 149–72. Chichester, UK: John Wiley & Sons, Ltd, 2012. http://dx.doi.org/10.1002/9781119962748.ch8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Liu, Sifeng, Yingjie Yang, and Jeffrey Forrest. "Grey Control Systems." In Computational Risk Management, 257–83. Singapore: Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-1841-1_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pompon, Raymond. "Risk Analysis: Adversarial Risk." In IT Security Risk Control Management, 51–65. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2140-2_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Critical control risk management"

1

Li, Cun-bin, Bing-De Lu, and Zhang Xiao-yi. "Critical Chain Project risk control with Management strengths." In 2010 IEEE International Conference on Emergency Management and Management Sciences (ICEMMS). IEEE, 2010. http://dx.doi.org/10.1109/icemms.2010.5563420.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Barreto, Carlos, and Alvaro A. Cardenas. "Optimal risk management in critical infrastructures against cyber-adversaries." In 2017 IEEE Conference on Control Technology and Applications (CCTA). IEEE, 2017. http://dx.doi.org/10.1109/ccta.2017.8062752.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Grant, Eric, Shreya Ambasta, and Mark Jean. "Systematic Assessment of Risk Control Effectiveness." In 2022 14th International Pipeline Conference. American Society of Mechanical Engineers, 2022. http://dx.doi.org/10.1115/ipc2022-87280.

Full text
Abstract:
Abstract The inherent risks associated with pipeline operations are significant. Companies dedicate countless resources to identifying, assessing, and controlling risks across their operations. Risk management activities are completed by personnel at all levels, from field staff to senior management. This ensures that risks are identified and managed at all levels within the company to align with company risk tolerance. Where risks are identified that are higher than company tolerance levels, additional controls are typically developed. For most risks, a series of controls is developed to protect in different ways or in different scenarios. In many cases, a control may protect against multiple different risks. When risk assessments are completed, there is the possibility that the effectiveness of controls that have been developed to manage the risk are incorrectly considered [1]. Individuals or teams completing the review of controls are assessing their effectiveness higher or lower than they actually are [2]. This is typically the result of a controls assessment that does not fully consider the functionality, availability, and reliability of the control. The result is the potential for a risk being accepted that may be beyond company risk tolerance or the allocation of additional resources on risks that are already well controlled. To account for a control’s partial effectiveness, they are often layered, with multiple controls working together to mitigate a risk [3]. In these instances, if one control is unable to manage the risk, another would be available to provide additional mitigation to reduce the possibility or consequence of a major risk event. With the combination of thousands of hazards that can lead to different major risk events with hundreds of unique controls, it can be difficult to quantify the degree of risk to which a company is exposed. This paper explores the approach to systematically assessing risk controls, enabling improved understanding and ability to communicate the overall organizational risk and prioritization of improvements for the most critical controls.
APA, Harvard, Vancouver, ISO, and other styles
4

Belal, Syed M., and MD Abdur Rahman. "Covid Best Practices for Cyber Risk Management." In Abu Dhabi International Petroleum Exhibition & Conference. SPE, 2021. http://dx.doi.org/10.2118/208113-ms.

Full text
Abstract:
Abstract If we learned anything from the year 2020, it is that we need to be more prepared for the unexpected. We need to be working to enable our business to be more resilient in the face of unexpected challenges. We strongly believe that for the industrial sector, the most effective way to enable resiliency is to ensure you have integrity in your operational technology (OT). The objective of this paper is to identify and manage the risk that arose from managing plants remotely. As a result of COVID-19, people started working and managing from home. While this needed to be done to keep businesses running, many risks were introduced as well. How to manage them effectively to reduce cyber risk to an acceptable level will be discussed. Industrial frameworks to identify security gaps, and thus risk, were considered, such as ISA-99/IEC-62443, NIST, ISO-27001, and Top CIS controls. New practices critical infrastructure followed to reduce infection rates were identified from interviews and surveys conducted by PAS, part of Hexagon, of our customers who work with critical infrastructure. These new practices were then compared to the industrial risk management framework to identify the severity of the threats. Once these were identified, mitigation plans were recommended to reduce the risk to an acceptable level. Because of this rapid shift to run the plant remotely, there was an over-provisioning of access in the early stages of the pandemic – i.e., giving more direct access to the industrial control system environment. This was not wise from a security standpoint, but the priority was to keep businesses up and running, so they were ready to take that risk. Now that some organizations have decided to continue with remote work, it is imperative to verify all remote access considers the least privileged access concept. Remote access is like a bridge that bypasses all the controls implemented. Having a remote access vulnerability will help bad actors break into the network and cause catastrophic damage. Though this paper focuses on remote access risk introduced by the COVID-19 pandemic, you can apply the findings to all remote access into critical infrastructure.
APA, Harvard, Vancouver, ISO, and other styles
5

Fujimoto, Mariko, Wataru Matsuda, Takuho Mitsunaga, and Yoshihiro Hashimoto. "Efficient Industrial Control Systems risk assessment using the attack path to the critical device." In MSIE 2021: 2021 3rd International Conference on Management Science and Industrial Engineering. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3460824.3460859.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lucas, Chrischell, Kathrina Clarisse Padrique, Mariah Christa Lansangan, Maria Jena Isabel Gusi, Marian Lubag, Ronnie Concepcion, Sandy Lauguico, Ryan Rhay Vicerra, and Raouf N. G. Naguib. "Machine Learning on Stroke Risk Prediction Systems as Complementary Technology for Neurologists: A Critical Review." In 2022 IEEE 14th International Conference on Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment, and Management (HNICEM). IEEE, 2022. http://dx.doi.org/10.1109/hnicem57413.2022.10109527.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kurt, Emine Serap, Aysu Yaşar, Kenan Terzioğlu, and Senem Demirkıran. "A New Generation Method for Assessing Information Security Risks: OCTAVE Allegro." In International Conference on Eurasian Economies. Eurasian Economists Association, 2022. http://dx.doi.org/10.36880/c14.02624.

Full text
Abstract:
Information system risk assessment, an essential aspect of information security management, assists organizations in identifying and analyzing critical information system assets and reducing potential risks. Internal control and risk management are two systems that complement each other in controlling an organization's activities. As a result, internal control activities, critical for controlling and managing risks, should be carried out with a risk focus. Institutions should first analyze the risks that may emerge in business processes before evaluating the steps that should be taken to secure their information assets. Many risk assessment methods are complicated and expensive, and qualified professionals should only carry them out. The OCTAVE Allegro method is a comprehensive assessment of an organization's operational risk environment to get better results without requiring considerable risk assessment information. Risk assessment can be completed in a short period and at a low cost using this method, and the effectiveness of internal control can be improved. The study's objective is to give information about the OCTAVE Allegro method, which can help prevent the risks of ensuring information security as information technologies advance and explain the method's application areas.
APA, Harvard, Vancouver, ISO, and other styles
8

Kamal, Girish. "Assurance and Verification of Safety Critical Elements in Asset Management." In International Petroleum Technology Conference. IPTC, 2021. http://dx.doi.org/10.2523/iptc-21452-ms.

Full text
Abstract:
Abstract Safety Critical Elements (SCEs) are the equipment and systems that provide the foundation of risk management associated with Major Accident Hazards (MAHs). A SCE is classified as an equipment, structure or system whose failure could cause or contribute to a major accident, or the purpose of which is to prevent or limit the effect of a major accident. Once the SCE has been ascertained, it is essential to describe its critical function in terms of a Performance Standard. Based on the Performance Standard, assurance tasks can be stated in the maintenance system to ensure that the required performance is confirmed. By analyzing the data in the maintenance system, confidence can be gained that all the SCEs required to manage Major Accidents and Environmental Hazards are functioning correctly. Alternatively, corrective actions can be taken to reinstate the integrity of the systems if shortcomings are identified. This paper shall detail out how the MAH and SCE Management process is initiated to follow the best industry practices in the identification and integrity management of major accident hazards as well as safety critical equipment. The tutorial shall describe in detail the following important stages:Identification of Major Accident HazardsIdentification of Safety Critical Equipment, involved in managing Major Accident HazardsDefine Performance Standards for these Safety Critical EquipmentExecution of the Assurance processes that maintain or ensure the continued suitability of the SCE Equipment, and that these are meeting the Performance StandardsVerification that all stages have been undertaken, any deviations being managed and thus that Major Accident Hazards are being controlled.Analyze and Improve Through the diligent application of these stages, it is possible to meet the requirements for MAH and SCE Management process giving a better understanding and control of risks in the industry.
APA, Harvard, Vancouver, ISO, and other styles
9

Abia, D., I. Aina, A. Enigbokan, S. Ajayi, and E. Aikhoje. "Fire Critical Equipment Integrity Dashboard: An Effective Tool for Fire Risk Reduction." In SPE Nigeria Annual International Conference and Exhibition. SPE, 2023. http://dx.doi.org/10.2118/217250-ms.

Full text
Abstract:
Abstract Have you ever considered what would happen to your organization if a fire outbreak occurs and how operations and business would be affected? Every year, fire is one of the major cause of millions of dollars in asset loses and damages to business operations. This is not only a safety issue but organizations are also expected and legally required to take certain fire prevention measures in order to forestall fire outbreak. Organizations must manage the risk of fires in order to protect the safety of employees and other stakeholders as well as limiting physical damage to assets. It is imperative that every organization has some plan in place to minimize the likelihood and control/mitigate the impact of fires. How reliable are the fire critical equipment in a facility? Will the equipment be available on demand, to prevent or mitigate a fire scenario? To give a positive answer to these crucial questions, management usually ensure the establishment of systems for the maintenance and inspection of fire critical equipment, in compliance with relevant standard and regulatory requirements. The challenge, however, is the ability of management to get a quick and accurate glance of how well the system that has been set up, is being implemented and being followed through. Preventing and or minimizing the risk of fire is key to successful business operations of any organization. This paper will describe the development of a user-friendly fire critical equipment integrity dashboard to readily convey in near-real time, the reliability of equipment critical to fire prevention and effects mitigation by; Identifying fire critical equipmentDefining and incorporating their assurance taskIdentifying responsible persons for the dashboard data entry and reliabilityDevelopment of the dashboard and user-friendly interface
APA, Harvard, Vancouver, ISO, and other styles
10

Kostopoulos, D., G. Leventakis, Vasilis Tsoulkas, and N. Nikitakos. "An Intelligent Fault Monitoring and Risk Management Tool for Complex Critical Infrastructures: The SERSCIS Approach in Air-Traffic Surface Control." In 2012 UKSim 14th International Conference on Computer Modelling and Simulation (UKSim). IEEE, 2012. http://dx.doi.org/10.1109/uksim.2012.37.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Critical control risk management"

1

Treadwell, Jonathan R., Mingche Wu, and Amy Y. Tsou. Management of Infantile Epilepsies. Agency for Healthcare Research and Quality (AHRQ), October 2022. http://dx.doi.org/10.23970/ahrqepccer252.

Full text
Abstract:
Objectives. Uncontrolled seizures in children 1 to 36 months old have serious short-term health risks and may be associated with substantial developmental, behavioral, and psychological impairments. We evaluated the effectiveness, comparative effectiveness, and harms of pharmacologic, dietary, surgical, neuromodulation, and gene therapy treatments for infantile epilepsies. Data sources. We searched Embase®, MEDLINE®, PubMed®, the Cochrane Library, and gray literature for studies published from January 1, 1999, to August 19, 2021. Review methods. Using standard Evidence-based Practice Center methods, we refined the scope and applied a priori inclusion criteria to the >10,000 articles identified. We ordered full text of any pediatric epilepsy articles to determine if they reported any data on those age 1 month to <36 months. We extracted key information from each included study, rated risk of bias, and rated the strength of evidence. We summarized the studies and outcomes narratively. Results. Forty-one studies (44 articles) met inclusion criteria. For pharmacotherapy, levetiracetam may cause seizure freedom in some patients (strength of evidence [SOE]: low), but data on other medications (topiramate, lamotrigine, phenytoin, vigabatrin, rufinamide, stiripentol) were insufficient to permit conclusions. Both ketogenic diet and the modified Atkins diet may reduce seizure frequency (SOE: low for both). In addition, the ketogenic diet may cause seizure freedom in some infants (SOE: low) and may be more likely than the modified Atkins diet to reduce seizure frequency (SOE: low). Both hemispherectomy/hemispherotomy and non-hemispheric surgical procedures may cause seizure freedom in some infants (SOE: low for both), but the precise proportion is too variable to estimate. For three medications (levetiracetam, topiramate, and lamotrigine), adverse effects may rarely be severe enough to warrant discontinuation (SOE: low). For topiramate, non-severe adverse effects include loss of appetite and upper respiratory tract infection (SOE: moderate). Harms of diets were sparsely reported. For surgical interventions, surgical mortality is rare for functional hemispherectomy/hemispherotomy and non-hemispheric procedures (SOE: low), but evidence was insufficient to permit quantitative estimates of mortality or morbidity risk. Hydrocephalus requiring shunt placement after multilobar, lobar, or focal resection is uncommon (SOE: low). No studies assessed neuromodulation or gene therapy. Conclusions. Levetiracetam, ketogenic diet, modified Atkins diet, and surgery all appear to be effective for some infants. However, the strength of the evidence is low for all of these modalities due to lack of control groups, low patient enrollment, and inconsistent reporting. Future studies should compare different pharmacologic treatments and compare pharmacotherapy with dietary therapy. Critical outcomes underrepresented in the literature include quality of life, sleep outcomes, and long-term development.
APA, Harvard, Vancouver, ISO, and other styles
2

Abercrombie, Robert K. Cryptographic Key Management and Critical Risk Assessment. Office of Scientific and Technical Information (OSTI), May 2014. http://dx.doi.org/10.2172/1131520.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bercovier, Herve, and Ronald P. Hedrick. Diagnostic, eco-epidemiology and control of KHV, a new viral pathogen of koi and common carp. United States Department of Agriculture, December 2007. http://dx.doi.org/10.32747/2007.7695593.bard.

Full text
Abstract:
Original objectives and revisions-The proposed research included these original objectives: field validation of diagnostic tests (PCR), the development and evaluation of new sensitive tools (LC-PCR/TaqManPCR, antibody detection by ELISA) including their use to study the ecology and the epidemiology of KHV (virus distribution in the environment and native cyprinids) and the carrier status of fish exposed experimentally or naturally to KHV (sites of virus replication and potential persistence or latency). In the course of the study we completed the genome sequence of KHV and developed a DNA array to study the expression of KHV genes in different conditions. Background to the topics-Mass mortality of koi or common carp has been observed in Israel, USA, Europe and Asia. These outbreaks have reduced exports of koi from Israel and have created fear about production, import, and movements of koi and have raised concerns about potential impacts on native cyprinid populations in the U.S.A. Major conclusions-A suite of new diagnostic tools was developed that included 3 PCR assays for detection of KHV DNA in cell culture and fish tissues and an ELISA assay capable of detecting anti-KHV antibodies in the serum of koi and common carp. The TKPCR assay developed during the grant has become an internationally accepted gold standard for detection of viral DNA. Additionally, the ELISA developed for detecting serum anti-KHV antibodies is now in wide use as a major nonlethal screening tool for evaluating virus status of koi and common carp populations. Real time PCR assays have been able to detect viral DNA in the internal organs of survivors of natural and wild type vaccine exposures at 1 and 10³ genome equivalents at 7 months after exposure. In addition, vaccinated fish were able to transmit the virus to naive fish. Potential control utilizing hybrids of goldfish and common carp for production demonstrated they were considerably more resistant than pure common carp or koi to both KHV (CyHV-3). There was no evidence that goldfish or other tested endemic cyprinids species were susceptible to KHV. The complete genomic sequencing of 3 strains from Japan, the USA, and Israel revealed a 295 kbp genome containing a 22 kbp terminal direct repeat encoding clear gene homologs to other fish herpesviruses in the family Herpesviridae. The genome encodes156 unique protein-coding genes, eight of which are duplicated in the terminal repeat. Four to seven genes are fragmented and the loss of these genes may be associated with the high virulence of the virus. Viral gene expression was studies by a newly developed chip which has allowed verification of transcription of most all hypothetical genes (ORFs) as well as their kinetics. Implications, both scientific and agricultural- The results from this study have immediate application for the control and management of KHV. The proposal provides elements key to disease management with improved diagnostic tools. Studies on the ecology of the virus also provide insights into management of the virus at the farms that farmers will be able to apply immediately to reduce risks of infections. Lastly, critical issues that surround present procedures used to create “resistant fish” must be be resolved (e.g. carriers, risks, etc.). Currently stamping out may be effective in eradicating the disease. The emerging disease caused by KHV continues to spread. With the economic importance of koi and carp and the vast international movements of koi for the hobby, this disease has the potential for even further spread. The results from our studies form a critical component of a comprehensive program to curtail this emerging pathogen at the local, regional and international levels.
APA, Harvard, Vancouver, ISO, and other styles
4

Babcock, Wade, and Jerome Persh. Safeguarding America's Critical Technologies (and Avoiding Personal Risk) An Introduction to Export Control and Critical Technology Restrictions. Fort Belvoir, VA: Defense Technical Information Center, January 2002. http://dx.doi.org/10.21236/ada406354.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Boren, Dale W. Management of Test Complexity for Emerging Safety Critical Control Systems Program. Fort Belvoir, VA: Defense Technical Information Center, May 2006. http://dx.doi.org/10.21236/ada455899.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

SCHAEFER, J. C. Software requirements specification for the program analysis and control system risk management module. Office of Scientific and Technical Information (OSTI), June 1999. http://dx.doi.org/10.2172/782400.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Abercrombie, R. K., and Scott Peters. Centralized Cryptographic Key Management and Critical Risk Assessment - CRADA Final Report For CRADA Number NFE-11-03562. Office of Scientific and Technical Information (OSTI), May 2014. http://dx.doi.org/10.2172/1132557.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lubowa, Nasser, Zita Ekeocha, Stephen Robert Byrn, and Kari L. Clase. Pharmaceutical Industry in Uganda: A Review of the Common GMP Non-conformances during Regulatory Inspections. Purdue University, December 2021. http://dx.doi.org/10.5703/1288284317442.

Full text
Abstract:
The prevalence of substandard medicines in Africa is high but not well documented. Low and Middle-Income Countries (LMICs) are likely to face considerable challenges with substandard medications. Africa faces inadequate drug regulatory practices, and in general, compliance with Good Manufacturing Practices (GMP) in most of the pharmaceutical industries is lacking. The majority of pharmaceutical manufacturers in developing countries are often overwhelmed by the GMP requirements and therefore are unable to operate in line with internationally acceptable standards. Non-conformances observed during regulatory inspections provide the status of the compliance to GMP requirements. The study aimed to identify the GMP non-conformances during regulatory inspections and gaps in the production of pharmaceuticals locally manufactured in Uganda by review of the available 50 GMP reports of 21 local pharmaceutical companies in Uganda from 2016. The binary logistic generalized estimating equations (GEE) model was applied to estimate the association between odds of a company failing to comply with the GMP requirements and non-conformances under each GMP inspection parameter. Analysis using dummy estimation to linear regression included determination of the relationship that existed between the selected variables (GMP inspection parameters) and the production capacity of the local pharmaceutical industry. Oral liquids, external liquid preparations, powders, creams, and ointments were the main categories of products manufactured locally. The results indicated that 86% of the non-conformances were major, 11% were minor, and 3% critical. The majority of the non-conformances were related to production (30.1%), documentation (24.5%), and quality control (17.6%). Regression results indicated that for every non-conformance under premises, equipment, and utilities, there was a 7-fold likelihood of the manufacturer failing to comply with the GMP standards (aOR=6.81, P=0.001). The results showed that major non-conformances were significantly higher in industries of small scale (B=6.77, P=0.02) and medium scale (B=8.40, P=0.04), as compared to those of large scale. This study highlights the failures in quality assurance systems and stagnated GMP improvements in these industries that need to be addressed by the manufacturers with support from the regulator. The addition of risk assessment to critical production and quality control operations and establishment of appropriate corrective and preventive actions as part of quality management systems are required to ensure that quality pharmaceuticals are manufactured locally.
APA, Harvard, Vancouver, ISO, and other styles
9

Banerjee, Pritam, and Atul Sanganeria. Developing a Risk Management System for Participating Government Agencies of India. Asian Development Bank, December 2021. http://dx.doi.org/10.22617/wps210413-2.

Full text
Abstract:
Trade facilitation is a critical building block of developing globally integrated value chains. In India, current trade facilitation systems including risk assessment criteria require improvements involving regulatory mandates for food and drugs, animal and plant quarantine, wildlife protection, and textile products. Using illustrative examples, this working paper presents specific system development needs for six major participating government agencies on trade facilitation in India. It provides a model for developing a comprehensive system of risk management. It also discusses the need for institutional cooperation between customs authorities and participating government agencies for a comprehensive single window trade facilitation solution.
APA, Harvard, Vancouver, ISO, and other styles
10

Tuller, Markus, Asher Bar-Tal, Hadar Heller, and Michal Amichai. Optimization of advanced greenhouse substrates based on physicochemical characterization, numerical simulations, and tomato growth experiments. United States Department of Agriculture, January 2014. http://dx.doi.org/10.32747/2014.7600009.bard.

Full text
Abstract:
Over the last decade there has been a dramatic shift in global agricultural practice. The increase in human population, especially in underdeveloped arid and semiarid regions of the world, poses unprecedented challenges to production of an adequate and economically feasible food supply to undernourished populations. Furthermore, the increased living standard in many industrial countries has created a strong demand for high-quality, out-of-season vegetables and fruits as well as for ornamentals such as cut and potted flowers and bedding plants. As a response to these imminent challenges and demands and because of a ban on methyl bromide fumigation of horticultural field soils, soilless greenhouse production systems are regaining increased worldwide attention. Though there is considerable recent empirical and theoretical research devoted to specific issues related to control and management of soilless culture production systems, a comprehensive approach that quantitatively considers all relevant physicochemical processes within the growth substrates is lacking. Moreover, it is common practice to treat soilless growth systems as static, ignoring dynamic changes of important physicochemical and hydraulic properties due to root and microbial growth that require adaptation of management practices throughout the growth period. To overcome these shortcomings, the objectives of this project were to apply thorough physicochemical characterization of commonly used greenhouse substrates in conjunction with state-of-the-art numerical modeling (HYDRUS-3D, PARSWMS) to not only optimize management practices (i.e., irrigation frequency and rates, fertigation, container size and geometry, etc.), but to also “engineer” optimal substrates by mixing organic (e.g., coconut coir) and inorganic (e.g., perlite, pumice, etc.) base substrates and modifying relevant parameters such as the particle (aggregate) size distribution. To evaluate the proposed approach under commercial production conditions, characterization and modeling efforts were accompanied by greenhouse experiments with tomatoes. The project not only yielded novel insights regarding favorable physicochemical properties of advanced greenhouse substrates, but also provided critically needed tools for control and management of containerized soilless production systems to provide a stress-free rhizosphere environment for optimal yields, while conserving valuable production resources. Numerical modeling results provided a more scientifically sound basis for the design of commercial greenhouse production trials and selection of adequate plant-specific substrates, thereby alleviating the risk of costly mistrials.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography