Journal articles on the topic 'Technology - Risk assessment'

To see the other types of publications on this topic, follow the link: Technology - Risk assessment.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Technology - Risk assessment.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Trapp, Stefan, and Lise Samsøe-Petersen. "Remediation technology and risk assessment." Journal of Soils and Sediments 3, no. 4 (December 2003): 253. http://dx.doi.org/10.1007/bf02988678.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Byrne, James, and April Pattavina. "Next generation assessment technology." Probation Journal 64, no. 3 (August 9, 2017): 242–55. http://dx.doi.org/10.1177/0264550517720851.

Full text
Abstract:
The recent inclusion of community-level risk variables in (some) fourth generation risk assessment instruments, ostensibly to make more accurate individual-level predictions of the likelihood of reoffending among the populations of probationers and parolees under community supervision, is examined in the following review. This development raises a thorny issue: what if the price of improved predictive accuracy is increased gender, race, or class-based disparity? Our review underscores the problems (conceptualization and measurement related) inherent in combining individual risk variables with community-level risk variables in order to assess an offender’s risk for re-offending during a specified follow-up period. In recognition of the likely disparity that will result from the conflation of neighborhood risk into individual risk assessments, we suggest an alternative: conduct a separate neighborhood risk assessment that can be used to simultaneously develop (1) a community-based treatment plan for individual offenders and (2) a resource development plan identifying and addressing service shortfalls and other risk factors in the neighborhoods where offenders reside.
APA, Harvard, Vancouver, ISO, and other styles
3

Benarie, Michel. "Environmental impact assessment, technology assessment and risk analysis." Science of The Total Environment 63 (May 1987): 271–72. http://dx.doi.org/10.1016/0048-9697(87)90051-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Nikolic, Božo, and Ljiljana Ruzic-Dimitrijevic. "Risk Assessment of Information Technology Systems." Issues in Informing Science and Information Technology 6 (2009): 595–615. http://dx.doi.org/10.28945/1084.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Shultz, Elizabeth, Mayur Pandya, and Neil Mehta. "Technology and teaching: suicide risk assessment." Medical Education 47, no. 11 (October 13, 2013): 1132–33. http://dx.doi.org/10.1111/medu.12322.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cooper, Todd, and Ken Fuchs. "Technology Risk Assessment In Healthcare Facilities." Biomedical Instrumentation & Technology 47, no. 3 (May 1, 2013): 202–7. http://dx.doi.org/10.2345/0899-8205-47.3.202.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wonglimpiyarat, Jarunee. "Technology auditing and risk management of technology incubators/science parks." World Journal of Entrepreneurship, Management and Sustainable Development 13, no. 1 (March 13, 2017): 44–56. http://dx.doi.org/10.1108/wjemsd-04-2016-0023.

Full text
Abstract:
Purpose The purpose of this paper is to discuss the application of risk management and auditing to technology incubators/science parks. The proposed audit plan focusses on the risk assessment using the Committee of Sponsoring Organizations of the Treadway Commission (COSO) framework. Design/methodology/approach The risk-based audit plan for auditing and managing the risks associated with the operation of technology incubators/science parks is based on the application of the COSO framework. Findings The proposed audit plan and performance analysis as a result of COSO application can be used as a risk management tool to improve effective operation of the incubator programmes. Originality/value The paper addresses the challenges of new auditing approach. In particular, the study applies the COSO framework to manage the risks of technology incubators/science parks which would help fill the gap in technology auditing. The audit plan and the performance analysis tool provide a new approach to assist R&D managers in performing risk assessments across various aspects of incubation operation.
APA, Harvard, Vancouver, ISO, and other styles
8

Huang, Yan. "Rapid flood risk assessment using GIS technology." International Journal of River Basin Management 7, no. 1 (March 2009): 3–14. http://dx.doi.org/10.1080/15715124.2009.9635365.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gunawan, Bambang, Merry Merry, and Nelly Nelly. "Information Technology Risk Assessment: Octave-S Approach." CommIT (Communication and Information Technology) Journal 5, no. 1 (May 31, 2011): 1. http://dx.doi.org/10.21512/commit.v5i1.549.

Full text
Abstract:
Purpose of the research is to identify the risk of IT in the company, to assess all the risk, and take security actions to solve the problem. Research methods used are data collection method and analysis method. Data collection is conducted with literature review and field studies by interview and observation. Analysis is conducted using Operationally Critical Threat, Asset, and Vulnerability (OCTAVE)-S method. The expected result is the risk identification in IT of the company.Index Terms - IT, Risk Assessment, Octave-S
APA, Harvard, Vancouver, ISO, and other styles
10

Suhardi, Yudi Priyadi. "The Designing of Measurement Instrument for Information Technology Risk Assessment as a Risk Management Strategy Recommendation at SBUPE Bandung." International Journal of Science and Research (IJSR) 4, no. 4 (April 5, 2015): 3058–63. http://dx.doi.org/10.21275/sub153803.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Hailey, David, and Don Juzwishin. "Managing external risks to health technology assessment programs." International Journal of Technology Assessment in Health Care 22, no. 4 (September 19, 2006): 429–35. http://dx.doi.org/10.1017/s0266462306051348.

Full text
Abstract:
Objectives: The aim of this study was to develop a guide to identifying and managing risks for health technology assessment (HTA) programs and to obtain opinions on this topic from HTA agencies.Methods: The risks and approaches to their management were compiled, drawing on experiences from HTA programs and the risk assessment literature. Opinion on this classification was obtained from members of the International Network of Agencies for Health Technology Assessment (INAHTA).Results: Twenty-one risks for HTA programs were identified under the categories Formulation of HTA Questions, Preparation of the HTA Product, Dissemination, and Contracting. For each risk area, potential consequences and suggested management approaches were outlined. Responses from ten HTA programs indicated substantial agreement regarding the risks that had been identified and on the importance of risk management for their own operations.Conclusions: Prudent management of HTA programs should take into account the risks related to external factors.
APA, Harvard, Vancouver, ISO, and other styles
12

Терелянский, П. В., and С. Ю. Кузнецов. "INFORMATION TECHNOLOGY FOR GROUP EXPERT RISK ASSESSMENT OF A COMMERCIAL ORGANIZATION." Audit and Financial Analysis, no. 1 (March 30, 2021): 193–97. http://dx.doi.org/10.38097/afa.2021.93.67.029.

Full text
Abstract:
Рассматривается задача создания методики качественной оценки рисков. Методика предполагает использование экспертных балльных оценок вероятности рисков и их разделение по категориям. Информационная технология включает предварительную оценку согласованности экспертных оценок и их корректировку. По каждому виду риска в соответствии с приоритетностью определяется вес и рассчитывается итоговая оценка. Полученные значения позволяют определить интегральный уровень риска проекта и критически важные направления контроля риск-менеджмента. The problem of creating a methodology for qualitative risk assessment is considered. The methodology involves the use of expert point estimates of the probability of risks and their division into categories. Information technology includes a preliminary assessment of the consistency of expert assessments and their adjustment. For each type of risk, the "weight" is determined in accordance with the priority and the final score is calculated. The obtained values allow us to determine the integral risk level of the project and the critical areas of risk management control.
APA, Harvard, Vancouver, ISO, and other styles
13

Jevsejev, Roman. "INFORMATION TECHNOLOGY RISK ASSESSMENT METHODS AND IMPROVEMENT SOLUTIONS." Mokslas - Lietuvos ateitis 12 (January 30, 2020): 1–7. http://dx.doi.org/10.3846/mla.2020.10562.

Full text
Abstract:
The legal tools applied in the context of IT technology development failing to solve the problems facing society. On the other hand, the development of innovation is sometimes hindered. The intensity of the development of information systems and technologies requires highly flexible and adaptive approaches to cybersecurity. One of these approaches is IT risk assessment. There are currently many methodologies that can be used to effectively assess cyber threats. For institutions with multiple exposures, the correlation between different positions may not be correctly estimated. Measuring known risk is a common problem in risk assessment practice. In order to develop a simple IT risk assessment method, the article examines existing IT risk assessment methods, proposes IT risk assessment solutions and presents the results of practical application.
APA, Harvard, Vancouver, ISO, and other styles
14

Malyar, N. N., V. V. Polishchuk, and M. N. Sharkadi. "MODEL OF INFORMATION TECHNOLOGY PROJECT FINANCING RISK ASSESSMENT." Radio Electronics, Computer Science, Control, no. 2 (November 9, 2017): 44–52. http://dx.doi.org/10.15588/1607-3274-2017-2-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Batson, Robert G., and Robert M. Love. "Risk analysis approach to transport aircraft technology assessment." Journal of Aircraft 25, no. 2 (February 1988): 99–105. http://dx.doi.org/10.2514/3.45548.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Zagorščak, Renato, Richard Metcalfe, Laura Limer, Hywel Thomas, Ni An, Alex Bond, and Sarah Watson. "Risk assessment methodology for Underground Coal Gasification technology." Journal of Cleaner Production 370 (October 2022): 133493. http://dx.doi.org/10.1016/j.jclepro.2022.133493.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

HUNDY, B. B., and D. J. HAMBLIN. "Risk and assessment of investment in new technology." International Journal of Production Research 26, no. 11 (November 1988): 1799–810. http://dx.doi.org/10.1080/00207548808947992.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Lakdawalla, Darius N., and Charles E. Phelps. "Health technology assessment with risk aversion in health." Journal of Health Economics 72 (July 2020): 102346. http://dx.doi.org/10.1016/j.jhealeco.2020.102346.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Gottschalk, Petter. "Knowledge management technology for organized crime risk assessment." Information Systems Frontiers 12, no. 3 (May 8, 2009): 267–75. http://dx.doi.org/10.1007/s10796-009-9178-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Chesalin, A. N., S. Ya Grodzenskiy, Pham Van Tu, M. Yu Nilov, and A. N. Agafonov. "Technology for risk assessment at product lifecycle stages using fuzzy logic." Russian Technological Journal 8, no. 6 (December 18, 2020): 167–83. http://dx.doi.org/10.32362/2500-316x-2020-8-6-167-183.

Full text
Abstract:
The problem of risk assessment at the stages of the product life cycle using both qualitative and quantitative approaches is investigated, and a generalized algorithm for selecting a fuzzy risk assessment model with different input data and system requirements is proposed for the effective use of statistical information and expert assessments. The "risk-based approach" allows to reduce the cost of correcting possible errors in the future and reduce the uncertainty when performing subsequent actions. It is noted that the results of SWOT analysis, as a rule, are of a qualitative descriptive nature, and do not contain specific recommendations. The provisions of modern standards on risk analysis are analyzed and the classification of risk analysis methods is given in accordance with the provisions of the national standard GOST R 58771-2019 "Risk management. Technologies for risk assessment", in which the key is the concept of uncertainty, estimated using different scales of gradation of risk damage and probability of its occurrence. An approach based on fuzzy logic and a hybrid fuzzy neural network model is proposed, which allows to present the used criteria in a con-venient form and implement a logical conclusion using simple and visual production rules. At the same time, the effectiveness and accuracy of the developed risk assessment system based on fuzzy logic is mainly determined by the quality of expert information and the consistency of the methods used to obtain it. To improve the accuracy of the results, it is proposed to use collective expert estimates with subsequent analysis of the consistency of the obtained expert estimates by determining the coefficients of variation, rank correlation, concordation, and so on. A generalized algorithm of expert assessment is presented, which is recommended to follow when developing expert systems for risk analysis. Various models of fuzzy inference (Mamdani, Takagi-Sugeno, hybrid neuro-fuzzy inference) are considered. An algorithm for constructing a fuzzy risk analysis system based on an effective method for obtaining expert assessments and analyzing statistical information is proposed. It is suggested that if there is a priori information about previously occurred events that can be used for risk analysis and fore casting, the fuzzy conclusion should be refined using widely known methods of mathematical statistics, optimization algorithms, for example, gradient descent, simplex method or genetic algorithms. An example of developing a risk assessment system when an enterprise enters into contracts with both the customer and co-executors is given.
APA, Harvard, Vancouver, ISO, and other styles
21

Cura, Jerome. "Ecological risk assessment." Water Environment Research 70, no. 4 (June 1998): 968–71. http://dx.doi.org/10.2175/106143098x134596.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Huang, Boning, Junkang Wei, Yuhong Tang, and Chang Liu. "Enterprise Risk Assessment Based on Machine Learning." Computational Intelligence and Neuroscience 2021 (November 16, 2021): 1–6. http://dx.doi.org/10.1155/2021/6049195.

Full text
Abstract:
Scientific risk assessment is an important guarantee for the healthy development of an enterprise. With the continuous development and maturity of machine learning technology, it has played an important role in the field of data prediction and risk assessment. This paper conducts research on the application of machine learning technology in enterprise risk assessment. According to the existing literature, this paper uses three machine learning algorithms, i.e., random forest (RF), support vector machine (SVM), and AdaBoost, to evaluate enterprise risk. In the specific implementation, the enterprise’s risk assessment indexes are first established, which comprehensively describe the various risks faced by the enterprise through a number of parameters. Then, the three types of machine learning algorithms are trained based on historical data to build a risk assessment model. Finally, for a set of risk indicators obtained under current conditions, the risk index is output through the risk assessment model. In the experiment, some actual data are used to analyze and verify the method, and the results show that the proposed three types of machine learning algorithms can effectively evaluate enterprise risks.
APA, Harvard, Vancouver, ISO, and other styles
23

Liu, Jian Wu, Shuai Wang, and Yong Hong Wang. "Helicopter Transmission System Technology Readiness Assessment." Applied Mechanics and Materials 86 (August 2011): 389–93. http://dx.doi.org/10.4028/www.scientific.net/amm.86.389.

Full text
Abstract:
This paper states evaluative methods of technology readiness which are used in the national background projects development. The methods conduct helicopter transmission system technology maturity research and assessment of native significant project according to methods of technology readiness assessment. The conclusions indicate that methods of technology readiness assessment have very important promoting action to native project development and scientific decision-making. The project which adopts mature critical technology implies that guarantee the schedule of project development and reduce risk of project development. Actualizing assess methods of technology readiness can be an important part of project development risk management.
APA, Harvard, Vancouver, ISO, and other styles
24

Seker, D. Z., S. Kabdasli, and B. Rudvan. "Risk assessment of a dam-break using GIS technology." Water Science and Technology 48, no. 10 (November 1, 2003): 89–95. http://dx.doi.org/10.2166/wst.2003.0546.

Full text
Abstract:
Flood disasters cause massive loss of human lives and immense damage to the infrastructure and economic activities, not only in Turkey but also all over the world. Governments consider several long-term and short-term precautions for flood control. The numerical simulation of dam-break problems could be accomplished with geographic information systems and innovation maps. Spread of the flood wave after a dam break can be predicted using these enabling technologies. This kind of advanced modelling technology is becoming an inevitable tool for the decision-making process. Data produced by GIS are used as initial values for FLDWAV. ArcView GIS has been used to produce a Digital Elevation Model and visualization of dam-break effects and propagation of a possible flood wave. Using GIS techniques and hydrologic modelling software, possible effects and damage of a dam-break flood have been investigated and results were simulated to show significant dam break effects on the region.
APA, Harvard, Vancouver, ISO, and other styles
25

Ferguson, J. Connor, Andrew J. Hewitt, John A. Eastin, Robert J. Connell, Rory L. Roten, and Greg R. Kruger. "Developing a comprehensive Drift Reduction Technology risk assessment scheme." Journal of Plant Protection Research 54, no. 1 (January 1, 2014): 85–89. http://dx.doi.org/10.2478/jppr-2014-0013.

Full text
Abstract:
Abstract Drift Reduction Technologies (DRTs) are becoming increasingly important for improving spray applications in many countries including New Zealand (NZ). Although there is a growing database on the performance of DRTs, there is no rating system showing the effectiveness of the DRT’s performance. In Europe, DRTs are classified relative to current reference technologies as part of the rating systems used to establish spray drift risk reduction. We have recommended some key elements of such a comprehensive exposure risk reduction scheme for any country, based on prior and on-going research into the performance of specific DRTs in row, tree, and vine crops. Our intention was to create a rating system to determine the effectiveness of a given technology. This rating system would improve spray application practices and environmental stewardship for a wide range of crops and application scenarios.
APA, Harvard, Vancouver, ISO, and other styles
26

Wang, Xiao Yan, Ting Liang, and Shao Yan Fan. "The Risk Assessment and Control Technology to Engineering Schedule." Advanced Materials Research 217-218 (March 2011): 268–73. http://dx.doi.org/10.4028/www.scientific.net/amr.217-218.268.

Full text
Abstract:
The progress of construction projects in the plan are generally based on engineering theory and construction developed on the basis of experience. In addition, The schedule impact on the political and economic situation, resources, technology development and other factors. So progress has a great uncertainty. Once the delay period to the owner and construction unit will be a great deal of risk, so risk control of the progress it is essential. This article describes the uncertainty factors about affect on schedule and progress against these uncertainties should be how to control and progress of risk response.
APA, Harvard, Vancouver, ISO, and other styles
27

Marx, Ben, and Deon Oosthuizen. "Risk assessment and mitigation at the information technology companies." Risk Governance and Control: Financial Markets and Institutions 6, no. 2 (2016): 44–51. http://dx.doi.org/10.22495/rcgv6i2art6.

Full text
Abstract:
Developing computer software that is free from material defects is the ultimate goal for software developers; however, due to the cost and complexity of software development, it is a goal that is unlikely to be achieved. As a consequence of the inevitable defects that manifest within computer software, the task of software patch management becomes a key focus area for software companies, IT departments, and even end users. Audit departments, as part of their responsibilities, are required to provide assurance on the patching process and therefore need to understand the various decision-making factors. Software flaws that exist within computer systems may put confidential information at risk and may also compromise the availability of such systems. The study investigated the recommended approaches for the task of software patching, with a view to balancing the sometimes conflicting requirements of security and system availability. The study found that there are a number of key aspects that are required to ensure a successful patching process and that the internal auditors of the ‘big four’ South African banks considered most of these factors to be important.
APA, Harvard, Vancouver, ISO, and other styles
28

Zhang, Jie, Gao Liu, Junli Zhao, and Jianlei Chen. "Research of Risk Assessment Technology for Long-span Bridge." IABSE Symposium Report 97, no. 36 (January 1, 2010): 33–39. http://dx.doi.org/10.2749/222137810796012171.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Hillebrand, Marcus, Stephan Pflugmacher, and Axel Hahn. "Toxicological risk assessment in carbon capture and storage technology." Toxicology Letters 221 (August 2013): S116. http://dx.doi.org/10.1016/j.toxlet.2013.05.197.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Wang, J., H. S. Sii, J. B. Yang, A. Pillay, D. Yu, J. Liu, E. Maistralis, and A. Saajedi. "Use of Advances in Technology for Maritime Risk Assessment." Risk Analysis 24, no. 4 (August 2004): 1041–63. http://dx.doi.org/10.1111/j.0272-4332.2004.00506.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Koivisto, Raija, Nina Wessberg, Annele Eerola, Toni Ahlqvist, Sirkku Kivisaari, Jouko Myllyoja, and Minna Halonen. "Integrating future-oriented technology analysis and risk assessment methodologies." Technological Forecasting and Social Change 76, no. 9 (November 2009): 1163–76. http://dx.doi.org/10.1016/j.techfore.2009.07.012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Moon, Yaejin, K. Roeing, Y. Amouyal, V. Ramkrishnan, R. Ratnam, and J. J. Sosnoff. "Fall Risk Assessment: The Potential For Home-Based Technology." Archives of Physical Medicine and Rehabilitation 97, no. 10 (October 2016): e46. http://dx.doi.org/10.1016/j.apmr.2016.08.138.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Gribova, V. V., B. I. Geltser, K. I. Shakhgeldyan, M. V. Petryaeva, E. A. Shalfeeva, and V. V. Kosterin. "HYBRID TECHNOLOGY OF RISK ASSESSMENT AND PROGNOSIS IN CARDIOLOGY." Vrach i informacionnye tehnologii, no. 3 (2022): 24–35. http://dx.doi.org/10.25881/18110193_2022_3_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Mock, Theodore J., Rajendra P. Srivastava, and Arnold M. Wright. "Fraud Risk Assessment Using the Fraud Risk Model as a Decision Aid." Journal of Emerging Technologies in Accounting 14, no. 1 (February 1, 2017): 37–56. http://dx.doi.org/10.2308/jeta-51724.

Full text
Abstract:
ABSTRACT This study investigates the efficacy of using a technology based on an elaboration of the traditional fraud risk model to assess the risk of fraud and subsequently plan the audit. The fraud risk model used is based on Srivastava, Mock, and Turner (2007, 2009) and explicitly assesses the presence of fraud triangle factors and the need for forensic tests to aid in the assessment of fraud detection risk and audit planning. Previous studies that examine fraud risk decomposition simply advise subjects to assess fraud risks separately without an analytical model. We examine the effectiveness of the approach using an experiment involving 76 experienced auditors where specific fraud risks are present or absent. As expected, the results indicate that the model significantly enhances auditors' sensitivity to differences in the level of fraud risks. That is, the auditors using the fraud risk model appropriately assessed low fraud risk as low and high fraud risk as high, whereas the auditors using the traditional Audit Risk Model approach assessed fraud risk at essentially the same level under either risk condition. The experiment also investigates effects on audit program planning decisions. Contrary to expectations but consistent with prior research, the risk decomposition technology tested did not result in auditors providing more effective fraud detection procedures. In all, the results suggest that although the tested risk decomposition technology can enhance risk assessments and recognition of the need for additional forensic tests, auditors continue to have difficulties in responding to fraud risks, perhaps because they lack the requisite fraud experience and training. Data Availability: Copies of the instruments are available from the first author.
APA, Harvard, Vancouver, ISO, and other styles
35

Beard, Leo R. "Water resources engineering risk assessment." Journal of Hydrology 140, no. 1-4 (December 1992): 394–95. http://dx.doi.org/10.1016/0022-1694(92)90252-q.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Singh, A. "Selection of an appropriate risk assessment tool for waste water risk abatement planning: an eThekwini case study." Water Practice and Technology 9, no. 3 (September 1, 2014): 283–92. http://dx.doi.org/10.2166/wpt.2014.019.

Full text
Abstract:
A Wastewater Risk Abatement Plan (WWRAP) has become an integral part in the operation of wastewater treatment plants across South Africa with the introduction of the Green Drop initiative. With each successive Green Drop season the WWRAP has become more of a focal point of the assessments and is intended to engender a more risk aware and risk averse philosophy into the operation of wastewater plants. The WWRAP, itself, is intended to be used as a tool to prioritize the deployment of limited resources and funds to achieve better compliance and management of wastewater treatment plants across the country. This is only effective if the method used for rating risk successfully identifies risks inherent on the plants. In essence the WWRAP will not achieve its objectives unless risks are properly identified. This paper explores the two successive WWRAPs produced by the eThekwini Municipality and the evolution of the risk rating systems employed. In 2011 the eThekwini Municipality's WWRAP was based on a modified risk matrix as proposed in the Draft Guidelines for the development of WWRAPs by DWA and the WRC. While the results of this assessment generally correlated with the Department of Water Affairs' Cumulative Risk Rating assessments, the rating system was based primarily on health targets and as a result was ineffectual as a tool for prioritization of resources. In 2012 with the next revision of the WWRAP there was a need to further ‘tweak’ the risk matrix used in order to more accurately reflect and identify risks on the various plants. This entailed increasing the complexity of the risk rating methodology and care was taken to ensure usability while still enhancing the efficacy of the risk assessment process. It was decided that ‘Administrative’ or ‘Reputational’ risk be taken into account when evaluating risk at the various plants and the risk assessment matrix was adjusted accordingly. It was decided that both administrative and reputational risk could be adequately represented by the influence that a particular risk had on the Affairs' potential Green Drop score. Multiple permutations and approaches were evaluated to determine which method would best reflect the ‘on the ground situation’. Using the new rating system, a total of 1,235 low risks were identified over the previous year's 913, medium risks numbered 223 over the 17 from 2011 and 105 high risks were identified for 2012 as compared to 2011 where no high risks were identified at all. The new rating system was thus deemed a more appropriate tool for the prioritization of resources for the municipality.
APA, Harvard, Vancouver, ISO, and other styles
37

Hu, Liang, and Yun Gen Hu. "Information Security Risk Assessment Analysis of Quantitative Methods." Applied Mechanics and Materials 687-691 (November 2014): 2015–18. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2015.

Full text
Abstract:
The development of information technology is increasingly widespread application of information systems and social dependence on information systems is constantly increasing. Therefore, information security has become an important aspect of the development of information technology has an important impact on economic development and social security. Effective information security risk assessment is an important measure to improve information technology.
APA, Harvard, Vancouver, ISO, and other styles
38

Bailar, John C. "Asbestos in Commercial and Public Buildings: Risk Assessment, Technology Assessment, and Public Policy." Applied Occupational and Environmental Hygiene 9, no. 11 (November 1994): 777–80. http://dx.doi.org/10.1080/1047322x.1994.10388411.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Campbell, H. "Risk assessment: subjective or objective?" Engineering Science & Education Journal 7, no. 2 (April 1, 1998): 57–63. http://dx.doi.org/10.1049/esej:19980202.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Pietzsch, Jan B., and M. Elisabeth Paté-Cornell. "Early technology assessment of new medical devices." International Journal of Technology Assessment in Health Care 24, no. 01 (January 2008): 36–44. http://dx.doi.org/10.1017/s0266462307080051.

Full text
Abstract:
Objectives:In the United States, medical devices represent an eighty-billion dollar a year market. The U.S. Food and Drug Administration rejects a significant number of applications of devices that reach the investigational stage. The prospects of improving patient condition, as well as firms' profits, are thus substantial, but fraught with uncertainties at the time when investments and design decisions are made. This study presents a quantitative model focused on the risk aspects of early technology assessment, designed to support the decisions of medical device firms in the investment and development stages.Methods:The model is based on the engineering risk analysis method involving systems analysis and probability. It assumes use of all evidence available (both direct and indirect) and integrates the information through a linear formula of aggregation of probability distributions. The model is illustrated by a schematic version of the case of the AtrialShaper, a device for the reduction of stroke risk that is currently in the preprototype stage.Results:The results of the modeling provide a more complete description of the evidence base available to support early-stage decisions, thus allowing comparison of alternative designs and management alternatives.Conclusions:The model presented here provides early-stage decision-support to industry, but also benefits regulators and payers in their later assessment of new devices and associated procedures.
APA, Harvard, Vancouver, ISO, and other styles
41

Taylor, Hazel, Edward Artman, and Jill Palzkill Woelfer. "Information Technology Project Risk Management: Bridging the Gap between Research and Practice." Journal of Information Technology 27, no. 1 (March 2012): 17–34. http://dx.doi.org/10.1057/jit.2011.29.

Full text
Abstract:
The gap between research and practice is strikingly evident in the area of information technology (IT) project risk management. In spite of extensive research for over 30 years into IT project risk factors resulting in normative guidance on IT project risk management, adoption of these risk management methods in practice is inconsistent. Managing risk in IT projects remains a key challenge for many organizations. We discuss barriers to the application of normative prescriptions, such as assessments of probability and impact of risk, and suggest a contingency approach, which addresses the uncertainties, complexities, and ambiguities of IT projects and enables early identification of high-risk projects. Specifically, in a case study, we examine how the project management office (PMO) at one organization has bridged the gap between research and practice, developing a contingency-based risk assessment process well founded on research knowledge of project dimensions related to project performance, while also being practical in its implementation. The PMO's risk assessment process, and the risk spider chart that is the primary tool in this assessment, has proven to be effective for surfacing inherent risk at the early stages of IT projects, thereby enabling the recommendation of appropriate management strategies. The PMO's project risk assessment process is a model for other organizations striving to engage in effective and collaborative practices in order to improve project outcomes. The case illustrates the importance of considering the practical constraints of the context of application in order to transform research findings into practices that promote attainment of desired outcomes.
APA, Harvard, Vancouver, ISO, and other styles
42

Elina, Saarivuori, Molarius Riitta, Wessman-Jääskeläinen Helena, and Poussa Liisa. "Connecting water footprint and water risk assessment: case packaging board." Water Practice and Technology 10, no. 2 (June 1, 2015): 229–41. http://dx.doi.org/10.2166/wpt.2015.025.

Full text
Abstract:
A company can evaluate water impacts related to its activities with the help of water footprint (WF), allowing manufacturer to identify freshwater consumption and degradation hotspots along the value chain. However, WF does not directly consider the environmental or process related risks caused by water use. This study aims at providing a framework for more extensive and complementary water assessments by connecting two environmental tools, WF and water risk assessment. Product system of a packaging board is used as a case example. WF assessment is carried out in accordance with the ISO 14046 Standard. Risk analysis focuses on the WF hotspots by analysing the local environmental circumstances and the main risks, their likelihood and consequences. The results show that water stress indicator is sensitive to input and output water qualities. The significance of local environmental circumstances (potential for droughts and shallow water levels, upstream water storages) on the water-based risks are highlighted in the results. The use of complementary methods reveals opposing interests: the lowest WF results of the studied scenarios include a risk for poor product quality. The results offer valuable information to a manufacturer on self-inflicted water impact and the role of indirect water use, helping to integrate water risk approach in the strategic planning.
APA, Harvard, Vancouver, ISO, and other styles
43

Bobrov, A. F. "Prevention of technological emergency situations: information technology to develop criteria for anthropogenic risks estimation." Medicо-Biological and Socio-Psychological Problems of Safety in Emergency Situations, no. 2 (June 22, 2019): 5–16. http://dx.doi.org/10.25016/2541-7487-2019-0-2-05-16.

Full text
Abstract:
Relevance. An analysis of the saturation of potentially dangerous objects in the technogenic sphere shows constant increase in the number and severity of the consequences of manmade disasters. The possibilities of countering threats in the technogenic sphere were limited, mainly due to the human factor. Therefore, the assessment and management of anthropogenic risks is one of the main measures to prevent manmade emergencies. In enterprises with potentially hazardous technologies, this problem is solved mainly by improving the safety culture at work. The lack of scientific research on the development of criteria for assessing anthropogenic risks makes it difficult to solve important practical tasks for ranking hazardous industries according to their anthropogenic hazard, the distribution of forces and facilities of the Emercom, taking into account the most likely place of occurrence of manmade disaster, improving medical and physiological support of personnel of hazardous facilities and industries.Intention. Development of information technology for the quantitative assessment of anthropogenic risks for personnel at hazardous facilities and industries.Methodology. The object of the study was the literature data on existing approaches to risk assessment in applied scientific research. The subject of the research is information technology for developing criteria for assessing anthropogenic risks.Results and discussion. Based on the analysis of literature data, the definition of the concept “anthropogenic risk” and the conceptual model of its quantitative assessment are given. An information technology for human risk assessment has been developed, which includes the following steps: 1) selection of the basic components of anthropogenic risk 2) determination of the values of the basic components; 3) expert assessment of the likelihood of risk realization with the established value of the basic components; 4) assessment using the risk matrix of the level of anthropogenic risk of the basic components; 5) an assessment of the social acceptability of anthropogenic risk for the basic components; 6) calculation of the weighted average anthropogenic risk; 7) the decision on the level of human risk. The methods of implementing information technology are described. An example of using the developed information technology to assess the anthropogenic risk of nuclear power plant personnel is given. Professional competence, professional success and professional health of an employee were used as a component of anthropogenic risk.Conclusion. Anthropogenic risk is a quantitative characteristic of the threat to the security of an enterprise from an employee’s professional activities due to the incompatibility of his medical and psychophysiological characteristics with the requirements of professional activity and the anthropogenic vulnerability of equipment and technological processes. Reducing anthropogenic risks is a prerequisite for improving the safety of enterprises with potentially dangerous technologies. The proposed information technology, assessment criteria and classification of levels of human risk can be used in developing a risk management system in order to minimize them.
APA, Harvard, Vancouver, ISO, and other styles
44

Gorgone, Robert G. "Improving Overhaul Planning Through Risk Assessment and Risk Management." Journal of Ship Production 8, no. 04 (November 1, 1992): 235–43. http://dx.doi.org/10.5957/jsp.1992.8.4.235.

Full text
Abstract:
The execution of the overhaul of U.S. naval vessels at a public shipyard is fraught with risk. Far too often the work authorization process is constrained by a limited budget. This situation can result in two common outcomes:The shipyard delivers a ship to the customer that has significant repair work either deferred or incomplete.The deferred or incomplete work is screened back to the shipyard late in the overhaul, forcing an upheaval in the logical planning and execution of the availability. Risk affects both the shipyard and ship's force because the completion of the overhaul could be affected by late authorized work resulting in the ship not being able to meet her commitments. As Philadelphia Naval Shipyard (PNSV) is an industry leader in Zone or Group Technology execution methods, it is particularly disruptive to work flow to return to geographic areas and perform work in an area out of phase—or even worse—in an area where similar work is already complete. With the innovation of Zone Technology, it was clear that a consistent and effective risk assessment method must be developed to determine the probability of equipment failure during the testing phase of the overhaul and the impact on cost and schedule to the overhaul. The USS Kidd (DD-963) scheduled availability in 1989 proved to be the ideal opportunity to develop and execute a formal risk assessment and management program. The USS Constellation (CV-64) SLEP availability in 1990 afforded the opportunity to refine and expand the risk assessment methodology.
APA, Harvard, Vancouver, ISO, and other styles
45

Leite da Silva, A. M., I. P. Coutinho, A. C. Zambroni de Souza, R. B. Prada, and A. M. Rei. "Voltage collapse risk assessment." Electric Power Systems Research 54, no. 3 (June 2000): 221–27. http://dx.doi.org/10.1016/s0378-7796(99)00087-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Sehlola, Petronnell, and Tiko Iyamu. "Assessment of Risk on Information Technology Projects Through Moments of Translation." International Journal of Actor-Network Theory and Technological Innovation 4, no. 2 (April 2012): 32–43. http://dx.doi.org/10.4018/jantti.2012040104.

Full text
Abstract:
Many of the IT solutions in an organisation are employed through IT projects. Based on the reliance on IT solutions, organisations’ investment in IT projects have increased tremendously in the past two decades. This is informed and triggered by the premise that IT will help yield solutions that will fulfill or exceed expectations, thereby making the organisation realise the required return on investment. Projects are a means to yield solutions through technological artefacts, such as infrastructure (networks included), applications, databases, or a combination of these artefacts. Technological artefacts are associated with foreseen or unforeseen risks. Hence, proper risk identification and management of IT projects is necessary to ensure that the organisation reaches the desired state. Unfortunately, risks are not easy to identify or manage. Using one case, the study employed actor network theory in the analysis of the data to understand the factors which manifest themselves into risks during the deployment of IT projects in the organisation.
APA, Harvard, Vancouver, ISO, and other styles
47

Sehlola, Petronnell, and Tiko Iyamu. "Assessment of Risk on Information Technology Projects Through Moments of Translation." International Journal of Actor-Network Theory and Technological Innovation 4, no. 3 (July 2012): 1–12. http://dx.doi.org/10.4018/jantti.2012070101.

Full text
Abstract:
Many of the IT solutions in an organisation are employed through IT projects. Based on the reliance on IT solutions, organisations’ investment on IT projects has increased tremendously in the last two decades. This is informed and triggered by the premises that IT will help them to yield solutions that will fulfill or exceed their expectations, thereby make the organisation realise the required return on investment. Projects are a means to yield solutions through technological artefacts such as infrastructure (networks included), applications, databases or a combination of these. The technological artefacts do carries or are associated with foreseen or unforeseen risks. Hence proper risk identification and management on IT projects is necessitated to ensure that the organisation reaches its desire state. Unfortunately, risks are never easy to identify or manage. Using one case, the study employed actor-network theory in the analysis of the data to understand the factors which manifest themselves into risks during the deployment of IT projects in the organisation.
APA, Harvard, Vancouver, ISO, and other styles
48

Claassen, M. "Ecological risk assessment as a framework for environmental impact assessments." Water Science and Technology 39, no. 10-11 (May 1, 1999): 151–54. http://dx.doi.org/10.2166/wst.1999.0645.

Full text
Abstract:
Environmental impact assessments in South Africa are usually conducted according to the integrated environmental management (IEM) procedure. The preliminary investigation reported here, indicates that most of the ecological requirements specified in the IEM procedure are supported in the ecological risk assessment (ERA) framework. The main concern about the ERA process is that it might not allow for sufficient feedback and consultation during impact quantification. A lack of appropriate techniques and expertise has also been identified in the collation and integration of the various disciplines involved in an environmental impact assessment. The outcome of this preliminary investigation suggests the need for a more detailed evaluation of the applicability of the ERA framework in the IEM procedure.
APA, Harvard, Vancouver, ISO, and other styles
49

Lytton, L., S. Howe, R. Sage, and P. Greenaway. "Groundwater pollution risk assessment methodology." Water Science and Technology 47, no. 9 (May 1, 2003): 1–7. http://dx.doi.org/10.2166/wst.2003.0478.

Full text
Abstract:
A generic groundwater pollution risk assessment methodology has been developed to enable the evaluation and ranking of the potential risk of pollution to groundwater abstractions. The ranking can then be used to prioritise risk management or mitigation procedures in a robust and quantifiable framework and thus inform business investment decisions. The risk assessment considers the three components of the pollution transport model: source - pathway - receptor. For groundwater abstractions these correspond to land use (with associated pollutants and shallow subsurface characteristics), aquifer and the abstraction borehole. An hierarchical approach was chosen to allow the risk assessment to be successfully carried out with different quality data for different parts of the model. The 400-day groundwater protection zone defines the catchment boundary that forms the spatial limit of the land use audit for each receptor. A risk score is obtained for each land use (potential pollution source) within the catchment. These scores are derived by considering the characteristics (such as load, persistence and toxicity) of all pollutants pertaining to each land use, their on-site management and the potential for the unsaturated subsurface to attenuate their effects in the event of a release. Risk scores are also applied to the aquifer characteristics (as pollutant pathway) and to the abstraction borehole (as pollutant receptor). Each risk score is accompanied by an uncertainty score which provides a guide to the confidence in the data used to compile the risk assessment. The application of the methodology has highlighted a number of problems in this type of work and results of initial case studies are being used to trial alternative scoring methods and a more simplified approach to accelerate the process of pollution risk assessment.
APA, Harvard, Vancouver, ISO, and other styles
50

Crabtree, K. D., C. P. Gerba, J. B. Rose, and C. N. Haas. "Waterborne adenovirus: a risk assessment." Water Science and Technology 35, no. 11-12 (June 1, 1997): 1–6. http://dx.doi.org/10.2166/wst.1997.0700.

Full text
Abstract:
Adenoviruses have been detected in raw sewage throughout the world and are associated with a number of human illnesses but their occurrence and pathogenicity have not been well studied. A risk assessment approach was used to determine their significance as a waterborne pathogen. There are 47 types of adenoviruses and the diseases resulting from infections include conjunctivitis, pharyngitis, pneumonia, acute and chronic appendicitis, exanthematous disease, bronchiolitis, acute respiratory disease, and gastroenteritis (types 40 and 41). Adenovirus is considered to be only second to rotavirus in terms of its significance as a pathogen of childhood gastroenteritis. Adenovirus infections are usually acute and self-limiting with a greater severity of illness occurring in the immunocompromised (e.g. AIDS patients and transplant recipients). They are reported to be more resistant to inactivation by UV than enteroviruses and are sometimes detected at higher levels in polluted waters. There are documented outbreaks of conjunctivitis due to adenovirus types 3 & 4 associated with swimming in contaminated recreational waters. Based on the data obtained from human dose-response studies, the exponential model [Pi = 1 -exp(-rN); r = 0.4172] was chosen for this risk assessment. Annual risks of infection in drinking water for adenovirus at average levels of 1/1,000L to 1/100L ranged from 8.3/10,000 to 8.3/1,000, respectively. Using monitoring data from a recreational water, risks were calculated to be as high as 1/1,000 for a single exposure.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography