Academic literature on the topic 'Security e safety e disabilità'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security e safety e disabilità.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Security e safety e disabilità"

1

Boardman, Jed. "Dismantling the social safety net: social security reforms, disability and mental health conditions." BJPsych Bulletin 44, no. 5 (July 17, 2020): 208–12. http://dx.doi.org/10.1192/bjb.2020.79.

Full text
Abstract:
SummaryThis article examines the effects of UK welfare reform since 2008 on people with mental health conditions and disabilities. The results have been profound, particularly during a time of economic austerity, damaging the social safety net and pushing many vulnerable people into poverty and hardship. It has perpetuated inequalities and increased the social exclusion of disabled groups. The holes in the safety net require repair, alongside extensive social policy reform to both protect and empower people with disabilities and long-term conditions.
APA, Harvard, Vancouver, ISO, and other styles
2

Purnomo, Agung, Yuly Peristiowati, and Agusta Dian Elina. "Dimension of Patient Safety Culture." Interdisciplinary Social Studies 1, no. 3 (December 20, 2021): 193–202. http://dx.doi.org/10.55324/iss.v1i3.35.

Full text
Abstract:
Background: Patient safety is a serious public health issue. Several studies reported security problems in healthcare systems in various countries. The impacts were varied, starting from mild pain, disability, death, and high cost of service. Aim: This study attempted to review the culture of patient safety from several studies and to identify factors that influence them. Method: This study was conducted with systematic mapping studies related to patient safety culture. There were 10 research articles were evaluated from various online sources that related from data base ProQuest,Oxford Academic, Wiley Online Library, Google Schoolar, and Springer. It was conducted by entering keywords which appropriate to the topic, the obtained results were analyzed and discussed to produce conclusions. Findings: Adverse events were common problems. Healthcare employees had roles in creating safe and high quality services. One of them was through implementation of a culture of patient safety. There were several factors which support a culture of patient safety, namely leadership, teamwork, patient care, evidence-based, communication, learning, just, and patient-centered.
APA, Harvard, Vancouver, ISO, and other styles
3

Miller, John. "Resuscitating Private Social Security Accounts: Countering Inequality With Panic and Prevarication." NEW SOLUTIONS: A Journal of Environmental and Occupational Health Policy 30, no. 1 (February 3, 2020): 52–56. http://dx.doi.org/10.1177/1048291120905081.

Full text
Abstract:
This article, originally published in Dollars & Sense: Real World Economics , is being reprinted in New Solutions to bring attention to efforts to privatize, dismantle, and fail to protect and expand the U.S. Social Security system. Social Security is an essential element for protecting the health, safety, and well-being of retired U.S. workers and their family members. This article explains attempts to weaken the system and efforts that can be made to sustain the system. The author asks and responds to the question, “Why then would anyone swap a highly successful Social Security system that provides life insurance as well as disability and retirement benefits for private retirement accounts?”
APA, Harvard, Vancouver, ISO, and other styles
4

Prakoso, Gilang Dwi, and Mohammad Zainal Fatah. "ANALISIS PENGARUH SIKAP, KONTROL PERILAKU, DAN NORMA SUBJEKTIF TERHADAP PERILAKU SAFETY." Jurnal PROMKES 5, no. 2 (February 26, 2018): 193. http://dx.doi.org/10.20473/jpk.v5.i2.2017.193-204.

Full text
Abstract:
Safety behavior in the workplace has aims to make the workers get off from work accidents that can cause financial or material losses, disability and death. The workers supposed to work safety so that companies or workplaces get the financial or material benefits. The purpose of this research was to find out the factors that affect workers to work safety. This research was an analytical descriptive with quantitative approach. Data collection was using questionnaires to respondents. The worker’s safety behavior which difficult to control when working made the number of workplace accident bigger. To know the factors that influence safety behavior was by connecting attitude, subjective norm, and worker’s perceived with safety behavior according to company rules. The results of this study showed that there was a relationship between attitude, perceived, and subjective norm with the worker’s safety behavior. This is showed by the use of PPE such as helmet, shoes, and earplug. The important of safety behavior for the worker was to alert the worker of their safety and security when they were working so they not got financial and material loss for the company, disability and death of the workers.Keyword: safety, perceived, subjective norm and attitude
APA, Harvard, Vancouver, ISO, and other styles
5

Olney, Marjorie F. "Caught in a Social Safety Net: Perspectives of Recipients of Social Security Disability Programs on Employment." Journal of Applied Rehabilitation Counseling 38, no. 2 (June 1, 2007): 5–13. http://dx.doi.org/10.1891/0047-2220.38.2.5.

Full text
Abstract:
It is estimated that 15-30 percent of people who are on the Social Security Administration's (SSA) disability benefit programs would like to work. However, despite a number of incentives, few leave benefit programs and become employed. A qualitative study with SSA recipients, all of whom expressed a desire to work, was conducted to augment findings from previous quantitative studies. The most common barrier to employment mentioned by participants was the SSA system itself which was viewed as an institution breeding fear and mistrust. Respondents identified three scenarios that would allow them to work: a full-time job with medical benefits, a part-time job that would allow them to maintain SSA benefits, or a full-time job with sufficient income to afford medical benefits.
APA, Harvard, Vancouver, ISO, and other styles
6

José G. Hernández R., María J. García G., and Gilberto J. Hernández G. "Safety and Attention of Passengers With Disabilities Who Travel by Train." International Journal of Sustainable Entrepreneurship and Corporate Social Responsibility 7, no. 1 (January 2022): 1–16. http://dx.doi.org/10.4018/ijsecsr.287867.

Full text
Abstract:
In this work, within the business world, two fields of great social interest are related. In particular, it will talk about corporate Safety & Security (S&S) and Corporate Social Responsibility (CSR). The importance of S&S in a service company will be analyzed, while some of the actions that these companies can take to increase their CSR will be studied. Specifically, the study will focus on trying to offer some recommendations, to help ensure that train travel is safer and more enjoyable for passengers who suffer from a disability. From what has been said previously, the objective of this work can be stated as: present some actions, so that the trip by train, of passengers with some disability, is safer and more pleasant. To achieve this objective and the secondary objectives that may be generated, the Integrated-Adaptable Methodology for the development of Decision Support System will be followed, which, it has been shown, is very useful in investigations similar to this.
APA, Harvard, Vancouver, ISO, and other styles
7

Barreto de Miranda, Cristiano, Amanda Gonçalves Simões, João Silvestre Silva-Junior, and Frida Marina Fischer. "Temporal trend of social security disability benefits due to musculoskeletal disorders from 2008 to 2018 in Brazil." Safety and Health at Work 13 (January 2022): S152. http://dx.doi.org/10.1016/j.shaw.2021.12.1227.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Daigle, Megan, Sarah Martin, and Henri Myrttinen. "‘Stranger Danger’ and the Gendered/Racialised Construction of Threats in Humanitarianism." Journal of Humanitarian Affairs 2, no. 3 (September 1, 2020): 4–13. http://dx.doi.org/10.7227/jha.047.

Full text
Abstract:
Humanitarian, development and peacebuilding work has become increasingly dangerous in recent decades. The securitisation of aid has been critiqued, alongside the racialised and gendered dynamics of security provision for aid actors. What has received less attention is how a range of intersectional marginalisations – gender, racialisation, sexuality, nationality and disability – play out in constructions of security, danger and fear in aid deployments. Focusing on sexual harassment, abuse and violence as threats to safety and security, the article examines how in training and guidance for deployment to ‘the field’ (itself a problematically securitised notion), danger is projected onto sexualised and racialised ‘locals’, often overlooking the potentially far greater threat from colleagues. Here, we employ a review of security guidance, social media groups, interviews with aid staffers and reflections on our own experiences to explore how colonialist notions of security and ‘stranger danger’ play out in training. We argue that humanitarianism is still dominated by the romanticised figure of the white, male humanitarian worker – even if this problematic imaginary no longer reflects reality – and a space where those questioning exclusionary constructs of danger are quickly silenced and even ridiculed, even in the age of #MeToo and #BlackLivesMatter.
APA, Harvard, Vancouver, ISO, and other styles
9

Ari, Ajeni, Maria Chiara Leva, Lorraine D’Arcy, and Mary Kinahan. "Fairness and Inclusion for Users of Surface Transport—An Exploratory Thematic Study for Irish Users." Sustainability 14, no. 11 (May 25, 2022): 6480. http://dx.doi.org/10.3390/su14116480.

Full text
Abstract:
This paper explores the conditions of public transport with respect to user accessibility, design of infrastructure, and safety from a gendered perspective. Our investigation aims to understand the factors that direct a citizen’s choice of whether or not to use public transport. Our discussion is focused on gender disparities among user experiences, so we confine our focus to that of women’s perspectives and their experiences with public transport use. A framework for our discussion was formed with consideration of the theoretical aspects of fairness, justice, and gender in transport, as well as user statistics. We identified several spaces where public transport policy planning and implementation may be improved in order to balance gender disparity of access, safety, and security across the gender divide. (We acknowledge that both distinct and interchangeable definitions of safety and security exist. In this work, we err to the latter, while also recognising from user-based qualitative data that safety concerns are not limited to infrastructure, but also relate to other unwanted sources of physical, mental, or emotional harm experienced within the transport system.) Primary among these was the necessity of both the acknowledgment and appreciation of the issues disproportionately experienced by women. A one-size-fits-all approach was found to ill-recognise the societal minutiae of constant caring responsibilities, income limitations, ability/disability, or the effects of past negative experiences faced by women. We conclude that improvements may be achieved by targeting and meeting actual, not just perceived need.
APA, Harvard, Vancouver, ISO, and other styles
10

Willets, Laura, Paul Mooney, and Nicholas Blagden. "Social climate in Learning Disability services." Journal of Intellectual Disabilities and Offending Behaviour 5, no. 1 (March 4, 2014): 24–37. http://dx.doi.org/10.1108/jidob-10-2013-0025.

Full text
Abstract:
Purpose – The social climate of psychiatric institutions correlates with multiple outcomes related to staff and patients. Research into social climate in Learning Disability services is limited. Staff and patients in Learning Disability services have documented both positive and negative experiences. No research has directly compared the social climate of Learning Disability and non-Learning Disability psychiatric services. The purpose of this paper is to understand how these compare. The study will also compare staff and patient views of social climate and the impact of security on social climate in Learning Disability services. Design/methodology/approach – A total of 64 patients and 73 staff, from Learning Disability and non-Learning Disability psychiatric hospitals completed the Essen Climate Evaluation Schema (EssenCES) measure of social climate. Findings – Patients in Learning Disability and non-Learning Disability services did not differ in their perceptions of social climate. Staff in non-Learning Disability services had a more positive perception of social climate than staff in Learning Disability services. Patients and staff did not differ in their views on climate. Security was negatively related to patients’ Experienced Safety. Originality/value – The findings suggest that staff perceive that the deficits associated with Learning Disabilities may limit patients’ therapeutic experience and relationships with their peers. Despite this, patients with Learning Disabilities feel supported by their peers, have positive views of the treatment process and feel as safe as non-Learning Disabled psychiatric patients.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Security e safety e disabilità"

1

Simpson, Andrew C. "Safety through security." Thesis, University of Oxford, 1996. http://ora.ox.ac.uk/objects/uuid:4a690347-46af-42a4-91fe-170e492a9dd1.

Full text
Abstract:
In this thesis, we investigate the applicability of the process algebraic formal method Communicating Sequential Processes (CSP) [Hoa85] to the development and analysis of safetycritical systems. We also investigate how these tasks might be aided by mechanical verification, which is provided in the form of the proof tool Failures-Divergences Refinement (FDR) [Ros94]. Initially, we build upon the work of [RWW94, Ros95], in which CSP treatments of the security property of non-interference are described. We use one such formulation to define a property called protection, which unifies our views of safety and security. As well as applying protection to the analysis of safety-critical systems, we develop a proof system for this property, which in conjunction with the opportunity for automated analysis provided by FDR, enables us to apply the approach to problems of a sizable complexity. We then describe how FDR can be applied to the analysis of mutual exclusion, which is a specific form of non-interference. We investigate a number of well-known solutions to the problem, and illustrate how such mutual exclusion algorithms can be interpreted as CSP processes and verified with FDR. Furthermore, we develop a means of verifying the faulttolerance of such algorithms in terms of protection. In turn, mutual exclusion is used to describe safety properties of geographic data associated with Solid State Interlocking (SSI) railway signalling systems. We show how FDR can be used to describe these properties and model interlocking databases. The CSP approach to compositionality allows us to decompose such models, thus reducing the complexity of analysing safety invariants of SSI geographic data. As such, we describe how the mechanical verification of Solid State Interlocking geographic data, which was previously considered to be an intractable problem for the current generation of mechanical verification tools, is computationally feasible using FDR. Thus, the goals of this thesis are twofold. The first goal is to establish a formal encapsulation of a theory of safety-critical systems based upon the relationship which exists between safety and security. The second goal is to establish that CSP, together with FDR, can be applied to the modelling of Solid State Interlocking geographic databases. Furthermore, we shall attempt to demonstrate that such modelling can scale up to large-scale systems.
APA, Harvard, Vancouver, ISO, and other styles
2

Carter, R. A. "Fire Safety and Security in Schools." University of Canterbury. Civil Engineering, 1999. http://hdl.handle.net/10092/8255.

Full text
Abstract:
This report examines the historical and present situation in New Zealand regarding school fires and arson. The Ministry of Education has been installing combined security and smoke detection alarm system in schools since 1991 as a measure to protect schools from fire and arson. The costs and benefits of this system are compared to an automatic sprinkler system. The security and smoke detection alarm system provides early warning in the event of a fire. Since the installation of these systems there has been a reduction in the cost of fires. This system is relatively inexpensive compared to an automatic sprinkler system. An automatic sprinkler system provides not only a warning device but also a suppression mechanism that acts to extinguish or control the fire while it is still very small. Water is applied directly to the base of the fire resulting in very little fire damage compared to the major losses in a building protected with a security and smoke alarm detection system. The best strategy to further reduce fire losses in New Zealand schools is to progressively install automatic sprinkler systems in new and existing buildings.
APA, Harvard, Vancouver, ISO, and other styles
3

Sajjad, Imran. "Autonomous Highway Systems Safety and Security." DigitalCommons@USU, 2017. https://digitalcommons.usu.edu/etd/5696.

Full text
Abstract:
Automated vehicles are getting closer each day to large-scale deployment. It is expected that self-driving cars will be able to alleviate traffic congestion by safely operating at distances closer than human drivers are capable of and will overall improve traffic throughput. In these conditions, passenger safety and security is of utmost importance. When multiple autonomous cars follow each other on a highway, they will form what is known as a cyber-physical system. In a general setting, there are tools to assess the level of influence a possible attacker can have on such a system, which then describes the level of safety and security. An attacker might attempt to counter the benefits of automation by causing collisions and/or decreasing highway throughput. These strings (platoons) of automated vehicles will rely on control algorithms to maintain required distances from other cars and objects around them. The vehicle dynamics themselves and the controllers used will form the cyber-physical system and its response to an attacker can be assessed in the context of multiple interacting vehicles. While the vehicle dynamics play a pivotal role in the security of this system, the choice of controller can also be leveraged to enhance the safety of such a system. After knowledge of some attacker capabilities, adversarial-aware controllers can be designed to react to the presence of an attacker, adding an extra level of security. This work will attempt to address these issues in vehicular platooning. Firstly, a general analysis concerning the capabilities of possible attacks in terms of control system theory will be presented. Secondly, mitigation strategies to some of these attacks will be discussed. Finally, the results of an experimental validation of these mitigation strategies and their implications will be shown.
APA, Harvard, Vancouver, ISO, and other styles
4

Åkerberg, Johan. "On Security in Safety-Critical Process Control." Licentiate thesis, Mälardalen University, School of Innovation, Design and Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-7334.

Full text
Abstract:

This Licentiate thesis is about security in automation networks with emphasis on fieldbus communication. In the process industry, network and system security have become even more important since the introduction of Ethernet-based fieldbus protocols. As an example, a successful attack on a power plant, supporting large cities with energy, could result in a temporal but total power loss. Such attacks could be devastating for the society. The security threats are real, and motivations for attacking industrial communication systems may be political or economical.

The visions of autonomous systems, which can be supervised, diagnosed and maintained from remote is not far from reality, but stress the need for security and safety measures. Wired fieldbus protocols are mature when it comes to safety and there are existing standards for safe communication. In a setup like an autonomous system security measures over safe communication has to be taken into account.

The state-of-the-art in automation security is to use firewalls to restrict incoming and outgoing traffic to the networks. Firewalls can be deployed between different automation networks, i.e. server, control, and fieldbus networks, and even protect a single automation cell with a dedicated firewall. If an adversary can penetrate the perimeter defenses, no other security countermeasures exist in process automation to protect the safety-critical communication from sabotage.

In this thesis we initially explore the possibilities of security attacks on the automation protocols PROFINET IO and PROFIsafe. We show that it is possible to attack safety-related communication to take control of safety-critical fieldbus nodes. We propose the concept of Security Modules in combination with PROFINET IO and PROFIsafe to achieve safe and secure real-time fieldbus communication.

APA, Harvard, Vancouver, ISO, and other styles
5

Åkerberg, Johan. "On security in safety-critical process control /." Västerås : School of Innovation, Design and Engineering, Mälardalen University, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-7334.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Nyström, Oskar. "FIRE SAFETY AND EVACUATION SECURITY IN WIND TURBINES." Thesis, Luleå tekniska universitet, Institutionen för samhällsbyggnad och naturresurser, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-83289.

Full text
Abstract:
I denna rapport sammanställs information om brandsäkerhet och utrymningssäkerhet i vindkraftverk för att dra slutsatser om hur säkerheten skulle kunna förbättras. Orsaken till att detta anses vara ett intressant område för studier är att det är en bransch som snabbt växer och som är extraordinärt ur en utrymningssynpunkt på grund av höjden på dagens kraftverk. Med hjälp av litteraturstudier, en enkät riktad till tekniker inom vindkraftsbransch och intervjuer av både personer inom bransch och från räddningsorganisationer så har information om ämnet samlats in. Med hjälp av personer med dessa mycket olika perspektiv på vindkraft och säkerhet så dras slutsatser om dagens läge och vad som skulle kunna förbättras ur en säkerhetskritisk synvinkel. Vid enkätstudien tillfrågades 32 personer som arbetar i vindkraftverk olika frågor som på ett eller annat sätt berör brand och säkerhet i deras arbetsmiljö. Resultaten från denna enkät tyder på att servicetekniker på kraftverken generellt sett känner sig förhållandevis trygga på sin arbetsplats, men tycker samtidigt att den går att förbättra ur en säkerhetsynpunkt. Något som tas upp är bland annat bristen på brandlarm och automatiska släcksystem i maskinhuset på kraftverken. Båda typer finns på en del kraftverk, men personal på anläggningarna vill i många fall se det på betydligt fler av verken. Utrymning verkar inte vara något som serviceteknikerna oroar sig för, men en rapport från Nanjing Tech Univeristy, RISE, Technical Univeristy of Denmark och Univeristy of Zilina tyder på att utrymning i händelse av brand kan vara problematiskt i vindkraftverk. I rapporten har linorna som är tänkt att användas som en del i utrymningen testats utifrån resultaten i en simulerad brand i maskinhuset. Vid simuleringen användes PyroSim för att simulera brandförlopp där temperaturer kunde tas fram vid olika tider. Dessa temperaturer och tider jämfördes sedan med antändningstemperatur för de linor som används vid utrymning. Resultatet visade att linorna antänds inom den tid som är tänkt för utrymning från vindkraftverket. Stämmer detta kan inte vinschning ses som en alternativ väg för utrymning i händelse av brand. Vid intervjustudien med räddningsorganisationer har fokus legat på släckning av vindkraftverk. De organisationer som deltagit har svarat väldigt lika på dessa frågor. På grund av höjden på kraftverken och den höga brandbelastning som oftast uppstår så har inga släckningsförsök vidtagits vid insatser i vindkraftverk. I stället har räddningsinsatserna fokuserats på att spärra av området kring kraftverket och försökt att minimera brandspridningen till omkringliggande område. Räddningsorganisationer med vindkraftsparker i sitt område verkar ha en god relation med ägare från branschen. Tillsammans utför de båda kontinuerligt övningar inom livräddning på kraftverken tillsammans med båda parter. Dessa övningar är dock inte på något sätt en förberedelse för livräddning vid brand i till exempel maskinhus, utan snarare fokuserade på livräddning vid annan olycka eller sjukdom. Slutsatserna från arbetet är att mer information skulle behövas för att helt kunna utvärdera om brandsäkerheten är tillräcklig i vindkraftverk. Den rapport från 2014 som visar på att utrustningen för vinschning ej tål brand är förvisso alarmerande, men enligt rapporten så krävs ytterligare undersökningar för att kunna dra några mer konkreta slutsatser. Mellan bransch och räddningsorganisationer tycks relationen vara god men de möjligheter som räddningsorganisationer har att släcka eller livrädda personer i brinnande kraftverk är mycket små. Detta medför att i princip allt ansvar inom brand- och utrymningssäkerhet ligger på branschen. Den mest uppenbara åtgärden skulle vara att ställa krav på installation av automatiska släcksystem och brandlarm. Detta är också det som många servicetekniker, vilka är den mest utsatta yrkesgruppen i sammanhanget, efterfrågar.
APA, Harvard, Vancouver, ISO, and other styles
7

Matović, Aleksandar. "CASE STUDIES ON MODELING SECURITY IMPLICATIONS ON SAFETY." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-45320.

Full text
Abstract:
Security is widely recognized as an important property that is tightly interdependentwith safety in safety-critical systems. The goal of this thesis is to conduct case studies on the implications that security attacks may have on the safety of these systems.In these case studies, we formally model the design of a robot arm system, verify itssecurity against some potential attack scenarios, propose mitigation techniques andanalyze their effectiveness. In order to achieve a thorough knowledge about the current formal verification approaches and select a proper modeling language/tool, weconducted an extensive literature review. We performed this review following a wellknown approach proposed by Barbara Kitchenham. The procedure and outcomes ofthis review are detailed in this thesis. Based on the literature review, we chose TRebeca, (a timed extension of Rebeca), as the formal language to model the robot armsystem, attack scenarios and mitigation techniques. Rebeca is an actor-based modeling language with a Java-like syntax that is effectively used to model concurrent anddistributed systems. This language is supported by a full-featured IDE called Afra,which facilitates the development of (T)Rebeca models and verification of correctnessproperties (such as safety and security) on them. Among several functions providedby a robot arm system, we chose two important functions i.e., Stand Still Supervisionand Control Error Supervision, which we believe would be interesting for attackerstrying to get control over robot movements. In particular, attackers may maliciouslymanipulate the parameter values of these functions, which may lead to safety issues.In order to find suitable attack scenarios on these functions, we studied the mostimportant security protocols used in safety-critical industrial control systems. Weobserved that these systems are vulnerable to several attacks, and man-in-the-middleattack is among the most successful attacks on these systems. Based on this study,we devised two attack scenarios for each function and modeled them with TRebeca.To mitigate these attacks, we proposed a redundancy technique, whose effectivenesswas also assured by Afra.
APA, Harvard, Vancouver, ISO, and other styles
8

Meyers, Tommey H. "Safety risk management for Homeland Defense and Security responders." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FMeyers.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, September 2005.
Thesis Advisor(s): Paul Pitman. Includes bibliographical references (p.55-59). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
9

Nkwantabisa, Godfrey K. "The United States Army food safety, security, and protection system." Manhattan, Kan. : Kansas State University, 2008. http://hdl.handle.net/2097/975.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Abdo, Houssein. "Dealing with uncertainty in risk analysis : combining safety and security." Thesis, Université Grenoble Alpes (ComUE), 2017. http://www.theses.fr/2017GREAT113/document.

Full text
Abstract:
L'analyse des risques est un élément essentiel pour la prise de décision réglementaire liée aux industries à haut risques. Une analyse systématique des risques se compose de trois étapes: (i) l’identification des scénarios indésirables de risque. (ii) l’estimation de la probabilité d'occurrence des scénarios des risques. (iii) le calcul d’effet des conséquences des scénarios de risque identifiés. L'analyse de la vraisemblance et de la gravité s'effectue à l'aide de modèles qui dépendent de plusieurs paramètres d'entrée. Cependant, la fiabilité de l'analyse de risque est limitée grâce à diverses sources d'incertitude. L’incertitude des paramètres, du modèle et d'incomplétude sont les principales sources d'incertitude. L’incertitude de paramètres découle de l'incapacité de définir des valeurs exactes à certains paramètres d'entrée utilisés pour l'analyse de la probabilité et de l’effet. L'incertitude de l’incomplétude provient de ne pas tenir compte de l’ensemble des contributions au risque dans le processus d'identification (certains événements initiateurs sont ignorés). L'incertitude du modèle n'est pas prise en compte dans ce travail. L'INERIS (Institut national de l'environnement industriel et des risques) a développé une approche semi-quantitative d'intervalle pour l’évaluation de la probabilité des risques qui utilise des informations quantitatives si disponibles ou des informations qualitatives, sinon. Cependant, cette approche semi-quantitative d'intervalle présente certains inconvénients en raison de l'incertitude des paramètres. L'information concernant les paramètres d’entrée des modèles d’effets est souvent incomplète, vague, imprécise ou subjective. En outre, certains paramètres peuvent être de nature aléatoire et ont des valeurs différentes. Cela conduit à deux différents types d'incertitude des paramètres. L'incertitude aléatoire dû à la variabilité naturelle. L’autre est l’incertitude épistémique, causée par le manque d'informations, par exemple, une imprécision de mesure. De plus, dans les méthodes d'analyse de risque actuelles, l'étape d'identification est incomplète. Juste les scénarios liés à la sûreté causés par des événements accidentels sont pris en compte durant l’analyse. L'introduction de systèmes connectés et de technologies numériques dans l’Industrie crée de nouvelles menaces de cyber-sécurité qui peuvent entraîner des accidents de sûreté indésirables. Ces événements liés à la cyber-sécurité doivent être pris en compte lors de l'analyse des risques industriels. Cette recherche vise à développer des méthodologies d'analyse d'incertitude pour traiter l'incertitude dans le processus d'analyse de risque de l’INERIS. En d'autres termes, analyser l'incertitude dans l'analyse de la probabilité, l'analyse des effets et l'étape d'identification. Dans ce travail, nous traitons les limites de l'approche semi-quantitative d'intervalle en introduisant la notion de nombres flous au lieu d'intervalles. Les nombres flous sont utilisés pour traiter l'incertitude dans les données d’entrée. Une méthodologie hybride qui traite chaque cause de l'incertitude des paramètres dans l'analyse des effets avec la bonne théorie est développée. La théorie de la probabilité est utilisée pour représenter la variabilité, les nombres flous sont utilisés pour représenter l'imprécision et la théorie d’évidence est utilisée pour représenter l'ignorance, l'incomplétude ou le manque de consensus. Une nouvelle méthodologie d'identification des risques qui considère la sûreté et la sécurité ensemble lors de l'analyse des risques industriels est développée. Cette approche combine Nœud-Papillon (BT), utilisé pour l'analyse de sûreté, avec une nouvelle version étendue de l’arbre d’attaque (AT), introduite pour l'analyse de cybersécurité des systèmes de contrôle industriel. L'utilisation combinée d'AT-BT fournit une représentation exhaustive des scénarios de risque en termes de sûreté et de sécurité
Risk analysis is a critical part for regulatory decision-making related to high-risk risk industries. A systematic risk analysis is made up of three steps: (i) identifying the undesirable risk scenarios. A risk scenario is characterized by referencing to the potential event with its causes and consequences. (ii) Estimating the likelihood of occurrence of risk scenarios. (iii) Calculating the effect of consequences of the identified risk scenarios. Likelihood and effect analysis are carried out with the help of models that depend on several number of input parameters.However, the trustworthiness of risk analysis is limited when inaccuracies in the results can occur, and are due to various sources of uncertainty. Parameter, model and completeness uncertainties are the main sources of uncertainty. Parameter uncertainty arises from the inability to set exact values for certain input parameters used for likelihood and severity analysis. Completeness uncertainty originates from not considering all contributions to risk in the identification process (some initiating events are ignored). Model uncertainty is not considered in this work.The INERIS (French National Institute for Industrial Environment and Risks) has developed an interval semi-quantitative approach that uses both quantitative information if available or qualitative information if not. However, this interval semi-quantitative approach has some drawbacks due to parameter uncertainty.Information regarding model parameters used for effect analysis is often incomplete, vague, imprecise or subjective. Moreover, some of the parameters may be random in nature and have different values. This leads to two different types of parameter uncertainty that need to be accounted for an accurate risk analysis and effective decision-making. Aleatoric uncertainty arises from randomness due to natural variability resulting from the variation of a value in time. Or epistemic uncertainty caused by the lack of information resulting, for example, from measurement errors, subjectivity expert judgment or incompleteness.Moreover, the identification step is incomplete where only safety related scenarios caused by accidental events are considered. The introduction of connected systems and digital technology in process industries creates new cyber-security threats that can lead to undesirable safety accidents. These cyber-security related events should be considered during industrial risk analysis.This research aims to develop uncertainty analysis methodologies to treat uncertainty in the INERIS risk analysis process. In other words, to analyze uncertainty in likelihood analysis, effect analysis and the identification step.In this work, we propose a fuzzy semi-quantitative approach to deal with parameter uncertainty in the likelihood analysis step. We handle the limits of the interval semi-quantitative approach by introducing the concept of fuzzy numbers instead of intervals. Fuzzy numbers are used to represent subjectivity in expert judgments (qualitative data) and covers uncertainty in the quantitative data if this data exists.A hybrid methodology that treat each cause of parameter uncertainty in effect analysis with the right theory is developed. Probability theory is used to represent variability, fuzzy numbers are used to represent imprecision and evidence theory is used to represent vagueness, incompleteness and the lack of consensus.A new risk identification methodology that considers safety and security together during industrial risk analysis is developed. This approach combines Bow-Tie Analysis (BTA), commonly used for safety analysis, with a new extended version of Attack Tree Analysis (ATA), introduced for security analysis of industrial control systems. The combined use of AT-BT provides an exhaustive representation of risk scenarios in terms of safety and security
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Security e safety e disabilità"

1

Joseph, Carmel. Safety and security. Johannseburg: Friedrich Ebert Stiftung, South Africa Office, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Books, Time-Life, ed. Home safety & security. Alexandria, Va: Time-Life Books, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Poynton, Deborah. Safety and security. Cape Town: Michael Stevenson, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cheng, Jieren, Xiangyan Tang, and Xiaozhang Liu, eds. Cyberspace Safety and Security. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73671-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Babalola, Olubukola Oluranti, ed. Food Security and Safety. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-50672-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Meng, Weizhi, and Mauro Conti, eds. Cyberspace Safety and Security. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-94029-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chen, Xiaofeng, Jian Shen, and Willy Susilo, eds. Cyberspace Safety and Security. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-18067-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Vaidya, Jaideep, Xiao Zhang, and Jin Li, eds. Cyberspace Safety and Security. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-37337-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Vaidya, Jaideep, Xiao Zhang, and Jin Li, eds. Cyberspace Safety and Security. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-37352-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Castiglione, Arcangelo, Florin Pop, Massimo Ficco, and Francesco Palmieri, eds. Cyberspace Safety and Security. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-01689-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Security e safety e disabilità"

1

M'hamed, Abdallah. "Safety, Security, Privacy and Trust Issues." In The Engineering Handbook of Smart Technology for Aging, Disability, and Independence, 619–29. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2008. http://dx.doi.org/10.1002/9780470379424.ch33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Suojanen, Ilona, and Neil Thin. "Positive Safety." In International Security Management, 29–41. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42523-4_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hearn, Keith, and Jennifer Murray. "Safety and security." In Barcraft, 84–89. London: Macmillan Education UK, 1990. http://dx.doi.org/10.1007/978-1-349-10170-2_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Paul, Valerie, and Christine Jones. "Safety and Security." In Housecraft, 106–19. London: Macmillan Education UK, 1989. http://dx.doi.org/10.1007/978-1-349-10172-6_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hayter, Roy. "Safety and security." In Food and Drink Service, 13–16. London: Macmillan Education UK, 1993. http://dx.doi.org/10.1007/978-1-349-80473-3_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Smith, Mary S. "Security and Safety." In Parking Structures, 114–35. Boston, MA: Springer US, 1996. http://dx.doi.org/10.1007/978-1-4684-9922-3_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Serpanos, Dimitrios, and Marilyn Wolf. "Security and Safety." In Internet-of-Things (IoT) Systems, 55–76. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-69715-4_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chun, Julia, Tyler Tingley, and William Lidwell. "Safety and Security." In The Elements of Education for School Leaders, 82–83. New York: Routledge, 2022. http://dx.doi.org/10.4324/9780429321641-41.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Vardon-Smith, Garry M., Kenneth I. Roberts, Kenneth I. Roberts, and Bob Mark. "Safety and Security." In Conflict and Catastrophe Medicine, 287–314. London: Springer London, 2009. http://dx.doi.org/10.1007/978-1-84800-352-1_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Eckert, Claudia, and Michael Waidner. "Safety and Security." In Digital Transformation, 265–83. Berlin, Heidelberg: Springer Berlin Heidelberg, 2019. http://dx.doi.org/10.1007/978-3-662-58134-6_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Security e safety e disabilità"

1

Burton, Simon, Jürgen Likkei, Priyamvadha Vembar, and Marko Wolf. "Automotive functional safety = safety + security." In the First International Conference. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2490428.2490449.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dutta, Raj Gautam, Feng Yu, Teng Zhang, Yaodan Hu, and Yier Jin. "Security for safety." In ICCAD '18: IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3240765.3243496.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cancelier, Julien, Sébastien Faux, Alexandre Gouin, and Michel Dufresne. "Convergence Safety Security." In Congrès Lambda Mu 20 de Maîtrise des Risques et de Sûreté de Fonctionnement, 11-13 Octobre 2016, Saint Malo, France. IMdR, 2016. http://dx.doi.org/10.4267/2042/61830.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

"Session safety & security." In 2008 IEEE International Workshop on Factory Communication Systems. IEEE, 2008. http://dx.doi.org/10.1109/wfcs.2008.4638779.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Tiwari, Ashish, Bruno Dutertre, Dejan Jovanović, Thomas de Candia, Patrick D. Lincoln, John Rushby, Dorsa Sadigh, and Sanjit Seshia. "Safety envelope for security." In HiCoNS '14: 3rd International Conference on High Confidence Networked Systems. New York, NY, USA: ACM, 2014. http://dx.doi.org/10.1145/2566468.2566483.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

White, Phil. "Improving Maritime and Port Security." In Passenger Ship Safety. RINA, 2003. http://dx.doi.org/10.3940/rina.pass.2003.12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Krumov, Assen V. "Software Reliability, Safety and Security." In Third IEEE Workshop on Intelligent Data Acquisition and Advanced Computer Syetems: Technology and Applications. IEEE, 2005. http://dx.doi.org/10.1109/idaacs.2005.283017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Simmerman, Jeff. "Security and Safety Are Sisters." In SPE Americas E&P Health, Safety, Security, and Environmental Conference. Society of Petroleum Engineers, 2011. http://dx.doi.org/10.2118/141051-ms.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hickey, James A., and William Carman. "Safety, security and theft issues." In 2016 Down to Earth Conference (DTEC). IEEE, 2016. http://dx.doi.org/10.1109/dtec.2016.7731294.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Romanski, G. "Combined safety and security certification." In 7th IET International Conference on System Safety, incorporating the Cyber Security Conference 2012. Institution of Engineering and Technology, 2012. http://dx.doi.org/10.1049/cp.2012.1511.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Security e safety e disabilità"

1

Harper, S. L., R. Schnitter, A. Fazil, M. Fleury, J. Ford, N. King, A. Lesnikowski, et al. Food safety and security. Natural Resources Canada/CMSS/Information Management, 2022. http://dx.doi.org/10.4095/329534.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Briscoe, G., R. Nertney, and D. Riffe. Safety considerations for security programs. Office of Scientific and Technical Information (OSTI), February 1987. http://dx.doi.org/10.2172/6686554.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Goldschlag, David, Carl Landwehr, and Michael Reed. Chapter 17. Agent Safety and Security. Fort Belvoir, VA: Defense Technical Information Center, January 1996. http://dx.doi.org/10.21236/ada465298.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Reiss, Peter T. Airline Safety & Security: An International Perspective. Fort Belvoir, VA: Defense Technical Information Center, October 1997. http://dx.doi.org/10.21236/ada351545.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Uecker, Norma J., and Michael J. Schwartz. Office of Health, Safety and Security, Office of Security Policy FY 2013 Accomplishments. Office of Scientific and Technical Information (OSTI), October 2013. http://dx.doi.org/10.2172/1105101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ogata, Michael, Barbara Guttman, and Nelson Hastings. Public Safety Mobile Application Security Requirements Workshop Summary. National Institute of Standards and Technology, January 2015. http://dx.doi.org/10.6028/nist.ir.8018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Firesmith, Donald G. Common Concepts Underlying Safety Security and Survivability Engineering. Fort Belvoir, VA: Defense Technical Information Center, December 2003. http://dx.doi.org/10.21236/ada421683.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sievers, Cindy S. Worker Safety and Security Teams Team Member Handbook. Office of Scientific and Technical Information (OSTI), June 2012. http://dx.doi.org/10.2172/1043505.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Leach, Janice, Mark K. Snell, R. Pratt, and S. Sandoval. Leveraging Safety Programs to Improve and Support Security Programs. Office of Scientific and Technical Information (OSTI), October 2015. http://dx.doi.org/10.2172/1226427.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Choong, Yee-Yin, Joshua M. Franklin, and Kristen K. Greene. Usability and Security Considerations for Public Safety Mobile Authentication. National Institute of Standards and Technology, July 2016. http://dx.doi.org/10.6028/nist.ir.8080.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography