Tesis sobre el tema "Risques industriels – Mesures de sécurité"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores tesis para su investigación sobre el tema "Risques industriels – Mesures de sécurité".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore tesis sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Dequaire-Falconnet, Elodie. "Modélisation de l'activité individuelle et collective dans la perspective d'une prévention des risques des installations, dès la conception : Application au domaine de l'imprimerie". Compiègne, 2001. http://www.theses.fr/2001COMP1368.
Texto completoMachkova, Elena. "Intérim : risques au travail, risques de l'emploi : le cas des travailleurs intérimaires du bâtiment en France". Paris 5, 2009. http://www.theses.fr/2009PA05H044.
Texto completoThe question of health and safety of French temporary workers is still not sufficiently explored, though the particularity of this form of employment has been officially recognized since the beginning of the 1970's. Studies of working conditions, even when they take into account the employment status, do not clearly show by which mechanisms it impacts the' construction of health and safety for this category of workers. The construction sector makes a good case study for exploring the problematic of temporary workers' safety and health regulation. While analyzing the triangular relation between temporary work agency, firm using temporary workforce and temporary worker, the present study aims at a better understanding of structural relations between policies of temporary workforce management and degrees of its protection. Crossing different sociological theoretical frameworks, this analysis offers a perspective on articulations between risks related to the position of temporary workers within their employment relations and their capacity to protect their health
Merle, Ivanne. "La fiabilité à l'épreuve du feu : la prévention des risques d'accidents majeurs dans une usine Seveso II". Paris, Institut d'études politiques, 2010. http://www.theses.fr/2010IEPP0070.
Texto completoThis PhD report deals with the topic of major hazard prevention - fires, explosions or toxic emissions - which can have high consequences on people or the environment. From an empirical point of view, the research project is based on a study of a chemical company applying European Seveso II directive and seen by control authorities as a model of safety. The fieldwork had as a purpose first, to understand the reasons of this excellent reputation and secondly to compare this image with facts gathered from observations and interviews. This thesis shows that, if this company demonstrates many features of what researchers from Berkeley consider representative of a “High Reliabilty Organization” (HRO), it also reveals, at the same time, many signs of vulnerability which are generally considered, in the literature and in practice, as “precursors” of an “accident waiting to happen”. These findings question, from a theoretical point of view, the concept of HRO and as a consequence, it is suggested to replace it by the less normative and more realistic concept of NRO, namely of “Normally Reliable Organization”. This shift has a twofold purpose. It expresses primarily the idea that an organization, as reliable and sure as it can be, is never completely protected from an accident, but more importantly, expresses the idea that this under-optimality is partly accepted by the leaders and the employees of these organizations, who do not seek to completely eliminate risks, but to control them effectively to reconcile the objectives of safety and economic performance
Janès, Agnès. "Caractérisation des dangers des produits et évaluation des risques d'explosion d'ATEX, contribution à l'amélioration de la sécurité des procédés industriels". Thesis, Université de Lorraine, 2012. http://www.theses.fr/2012LORR0346/document.
Texto completoControlling fire and explosion hazards in industrial processes is based on occurrence conditions and the assessment of possible effects and consequences of these events. The feedback from industrial accidents involving combustible products often reveals an insufficient identification of products hazards and/or an incorrect or incomplete risk assessment of the processes by the operators. The regulatory evolutions in the past decade were aimed at better identification and management of these risks. Nevertheless, in order to reduce the frequency and the severity of these accidents, it is necessary to further improve the safety procedures concerning combustible materials. When this evaluation is the most accurate and realistic, prevention and protection measures are the most adequate. This requires an accurate hazard characterization of the products stored, transported or used. It is also necessary to better identify and manage the risks associated. This work has been devoted primarily to the regulatory characterization of physical and chemical hazards of substances and mixtures, as well as evaluating the ability of flammable gas, vapour or dust to form explosive atmospheres and an eventual ignition. Secondly, this work have attempted to highlight the key elements of the regulatory, normative and methodological context concerning explosive atmospheres and to develop a specific methodology allowing explosive atmospheres explosion risk assessment in industrial facilities, consistent with applicable regulatory requirements
Glatron, Sandrine. "L'évaluation des risques technologiques majeurs en milieu urbain : approche géographique : le cas de la distribution des carburants dans la région Ile-de-France". Paris 1, 1997. http://www.theses.fr/1997PA010684.
Texto completoTechnological hasards have now a societal dimension, as shown by the necessity for the town planner to consider them, since the French law of 1987. During the elaboration of urban plans, local (Land of urban, local (Land Use Plan) or regional, the technological hazards must be taken into account. An original assesment method is built, using this legal constraint - the control of urban development around dangerous industrial sites. It consists in counting the potential damages wihin the area concerned by the consequences of an accident. This area is calculated for the most serious accident, called "penalizing" accident, because of the determinist assessment method we use in France. This assessment doesn't concern only the dangerous plants. It is implemented for the hole steps of an industrial branch, including the transport. Flows are very closely linked to the spatial firm organisation. The assessing method elaborated takes account of this close link, when it proposes a common evaluation for plant - hazards and transport - hazards. It allows the verification of the following hypothesis : there might be risks transferts from the plant to the dangerous substances transports if the georgraphy of the firm was changed, as the storage or production plant is localized elsewhere. The evaluation method is undertaken for the end of the petroleum industrial branch, i. E. Storage and retail road distribution of fuel oils, in the Ile-de-France Region. It uses the spatial analysis described in the land use map worked out by the IAURIF (Town Planning Institut of the Ile-de-France Region)
Kriaa, Siwar. "Modélisation conjointe de la sûreté et de la sécurité pour l’évaluation des risques dans les systèmes cyber-physiques". Thesis, Université Paris-Saclay (ComUE), 2016. http://www.theses.fr/2016SACLC014/document.
Texto completoCyber physical systems (CPS) denote systems that embed programmable components in order to control a physical process or infrastructure. CPS are henceforth widely used in different industries like energy, aeronautics, automotive, medical or chemical industry. Among the variety of existing CPS stand SCADA (Supervisory Control And Data Acquisition) systems that offer the necessary means to control and supervise critical infrastructures. Their failure or malfunction can engender adverse consequences on the system and its environment.SCADA systems used to be isolated and based on simple components and proprietary standards. They are nowadays increasingly integrating information and communication technologies (ICT) in order to facilitate supervision and control of the industrial process and to reduce exploitation costs. This trend induces more complexity in SCADA systems and exposes them to cyber-attacks that exploit vulnerabilities already existent in the ICT components. Such attacks can reach some critical components within the system and alter its functioning causing safety harms.We associate throughout this dissertation safety with accidental risks originating from the system and security with malicious risks with a focus on cyber-attacks. In this context of industrial systems supervised by new SCADA systems, safety and security requirements and risks converge and can have mutual interactions. A joint risk analysis covering both safety and security aspects would be necessary to identify these interactions and optimize the risk management.In this thesis, we give first a comprehensive survey of existing approaches considering both safety and security issues for industrial systems, and highlight their shortcomings according to the four following criteria that we believe essential for a good model-based approach: formal, automatic, qualitative and quantitative and robust (i.e. easily integrates changes on system into the model).Next, we propose a new model-based approach for a safety and security joint risk analysis: S-cube (SCADA Safety and Security modeling), that satisfies all the above criteria. The S-cube approach enables to formally model CPS and yields the associated qualitative and quantitative risk analysis. Thanks to graphical modeling, S-cube enables to input the system architecture and to easily consider different hypothesis about it. It enables next to automatically generate safety and security risk scenarios likely to happen on this architecture and that lead to a given undesirable event, with an estimation of their probabilities.The S-cube approach is based on a knowledge base that describes the typical components of industrial architectures encompassing information, process control and instrumentation levels. This knowledge base has been built upon a taxonomy of attacks and failure modes and a hierarchical top-down reasoning mechanism. It has been implemented using the Figaro modeling language and the associated tools. In order to build the model of a system, the user only has to describe graphically the physical and functional (in terms of software and data flows) architectures of the system. The association of the knowledge base and the system architecture produces a dynamic state based model: a Continuous Time Markov Chain. Because of the combinatorial explosion of the states, this CTMC cannot be exhaustively built, but it can be explored in two ways: by a search of sequences leading to an undesirable event, or by Monte Carlo simulation. This yields both qualitative and quantitative results.We finally illustrate the S-cube approach on a realistic case study: a pumped storage hydroelectric plant, in order to show its ability to yield a holistic analysis encompassing safety and security risks on such a system. We investigate the results obtained in order to identify potential safety and security interactions and give recommendations
Alcantara, Manzueta Santiago Elias. "Etude de la sécurité thermique d'un réacteur chimique : approche par contrôle de la température". Electronic Thesis or Diss., Normandie, 2024. http://www.theses.fr/2024NORMIR45.
Texto completoIn this thesis, my contribution focuses on the development of a methodology for intelligent control of the maximum temperature in a tubular reactor. These expressions are derived from an analytical model previously published by (Vernières-Hassimi et al., 2016) and have been adapted and simplified for their application in this context. The first analytical expression developed concerns the calculation of the position of the maximum reaction temperature, a fundamental parameter for safety in tubular reactors. This expression allows for the analysis of the behaviour of the hot spot inside the reactor and how its position varies according to changes in input parameters, which facilitates a more appropriate selection of operational configurations. Furthermore, this expression integrates with the formula previously developed by (Vernières-Hassimi et al., 2016). The second expression results from a resolution of the original equation, through which the reactor's cooling temperature is calculated. This expression is particularly useful for determining the cooling temperature in response to variations in operational conditions, thus providing an effective tool for the thermal management of the system
Dimbour, Jean-Philippe. "Contribution à l'étude expérimentale et à la modélisation de l'influence de dispositifs de protection de type rideau d'eau sur la dispersion atmosphérique d'un rejet de gaz lourd se produisant depuis un local de stockage de chlore liquiéfié sous pression". Aix-Marseille 1, 2003. http://www.theses.fr/2003AIX11036.
Texto completoSicard, Franck. "Prise en compte des risques de cyber-attaques dans le domaine de la sécurité des systèmes cyber-physiques : proposition de mécanismes de détection à base de modèles comportementaux". Thesis, Université Grenoble Alpes (ComUE), 2018. http://www.theses.fr/2018GREAT080/document.
Texto completoIndustrial Control Systems (ICSs) are infrastructures composed by several industrial devices connected to a network and used to control a physical system. They control electrical power grid (Smart Grid), production systems (e.g. chemical and manufacturing industries), transport (e.g. trains, aircrafts and autonomous vehicles), health and weapon systems. Designed to ensure productivity and respect safety in a non-malicious environment, the ICSs are, since the 21st century, increasingly vulnerable to attacks (e.g. Stuxnet, Industroyer, Triton) especially with the emergence of the industry 4.0. Several studies contributed to secure the ICS with approaches from the security field (e.g. cryptography, IDS) which do not take into account the behavior of the physical system and therefore the consequences of the malicious act. Thus, a security approach limited exclusively to the analysis of information exchanged by industrial network is not sufficient. Our approach creates a paradigm shift in detection mechanisms by integrating the behavioral modeling of the cyber-physical system.This thesis proposes detection mechanisms of attacks by locating detection closer to physical system. They analyze the data exchanged between the control system and the physical system, and filter the exchanges through deterministic models that represent the behavior of the physical system controlled by control laws. For this purpose, a design methodology has been proposed in which all actions are identified in order to instantly detect brutal attacks. To deal with other attacks, especially the more sneaky, such as sequential attacks, we propose a complementary detection strategy to estimate the occurrence of an attack before its consequences are destructive. To this end, we have developed the concepts of distance of a state identified as critical to which we have added a second mechanism called trajectory which leads to a temporal notion that characterize an intention to harm.As part of this thesis, the proposed approach combines two techniques oriented security (IDS probe) and safety (filter approach) to propose a detection strategy based on four mechanisms related to:• Context detection: based on the current state of the system, an order sent by the PLC can be blocked by the control filter if it leads to a critical state (brutal attack).• Combinatorial constraints (sequential attack): verified by the concepts of distance (risk indicator for the current state) and trajectory (indicator of the intention to harm by studying the evolution of the distance on a sequence).• Temporal constraints (temporal attack): verified by time windows on the appearance of events and an indicator monitoring the average duration of execution.• Over-solicitation monitoring mechanism: based on an indicator monitoring orders sent to the actuators to prevent premature ageing of the production equipment (attack on the equipment).The proposed approach has been applied to various simulation examples and an industrial platform where the detection strategy has shown its effectiveness against different scenarios corresponding to attacker profiles
Moatti, Jean-Paul. "Economie de la sécurité : la gestion collective des risques sanitaires industriels". Paris 1, 1987. http://www.theses.fr/1987PA010002.
Texto completoChevreau, François-Régis. "Maîtrise des risques industriels et culture de sécurité : le cas de la chimie pharmaceutique". Phd thesis, École Nationale Supérieure des Mines de Paris, 2008. http://tel.archives-ouvertes.fr/tel-00360174.
Texto completoPour les industriels du secteur de la chimie pharmaceutique, qui comptent parmi les exploitants des systèmes à risques, le développement d'une culture de sécurité dans les sites de production est une nécessité. Des évolutions techniques et la mise en place de systèmes spécifiques de gestion leur ont en effet permis d'obtenir des résultats largement meilleurs que la moyenne des entreprises mais qui semblent plafonner dans le temps. Développer une culture de sécurité dans les usines nécessite cependant de changer de regard sur la maîtrise des risques. Cela nécessite en effet de prendre en compte toutes les dimensions de l'organisation en replaçant l'être humain au centre des préoccupations.
Ce travail de recherche se situe dans le domaine de la recherche en gestion, dans le courant de l'analyse de l'activité collective. Il vise à répondre à plusieurs objectifs. En premier lieu, décrypter les logiques d'action sous-jacentes à la notion de culture de sécurité afin de déterminer le projet managérial qu'elle implique. Ensuite, identifier les processus de gestion mis en œuvre pour concrétiser ces logiques d'action afin d'observer comment le projet managérial culture de sécurité se met en œuvre. Enfin, analyser certaines activités liées à ces processus, notamment la formation du personnel et le retour d'expérience, afin de faire émerger des leviers d'action permettant de développer la culture de sécurité.
Le terrain d'intervention est constitué des usines de production d'un grand industriel français de la pharmacie.
L'approche proposée a été mise en œuvre dans différentes usines de production de composés chimiques et à l'échelle de la branche chimie du partenaire industrielle. Elle a permis d'identifier les leviers de progrès dans les activités de maîtrise des risques qui contribuent à développer et à renforcer une culture de sécurité devant permettre d'améliorer les résultats de sécurité des sites chimiques étudiés.
La démarche de recherche mise en œuvre peut être adaptée à d'autres secteurs industriels désireux de développer ou renforcer une culture de sécurité et prêts à mettre à plat leurs pratiques de maîtrise des risques industriels.
Mangeon, Michaël. "Conception et évolution du régime français de régulation de la sûreté nucléaire (1945-2017) à la lumière de ses instruments : une approche par le travail de régulation". Thesis, Paris Sciences et Lettres (ComUE), 2018. http://www.theses.fr/2018PSLEM059/document.
Texto completoThis thesis studies the design and evolution of the risk regulation regime of nuclear safety in France between 1945 and 2017. Based on the concept of “risk regulation regimes” (Hood et al, 2001), we propose a model that identifies three periods, corresponding to three types of "philosophies". During the first period (1945-1969), an embryonic regulatory regime developed within CEA is characterized by "experimentation and autocontrol". The second period of "reasonable flexibility" (1969-1986) is marked by an institutional reorganization but leaves many room for maneuver to experts and operators, in a context of intensive industrial development. Finally, during the third period (1986-2017), a regime "in search of auditability" is the product of hybridization between the regime of "reasonable flexibility" and a standardized regime responding to international good practice (openness, transparency, and regulator’s and expert’s independence). To explain the evolution of the regime, we focus on one of its components, the rules, which we analyze as regulatory instruments, and we describe as "regulatory work" all activities and interactions of a group of agents who act to design, transform and implement these instruments (for our case, flooding rules and guides). We argue that regulatory work is at the same time cognitive, political, social and organizational, and, beyond producing an instrument, it results in exploring evolutions of the regulation regime, while building both the knowledge mobilized in regulatory instruments and interorganizational collective that shares them. This process would explain the relative slowness of the ongoing hybridization process
Diaz, Frédéric. "Coproduction de la sécurité : un nouveau mode de contrôle et de régulation sociale : la gestion des risques dans les espaces privés lors de manifestations sportives et culturelles". Versailles-St Quentin en Yvelines, 2003. http://www.theses.fr/2003VERS018S.
Texto completoBeylat, Delphine. "Contribution à l'étude du comportement dynamique aléatoire de structures libres et empilées sous séïsme". Thesis, Université Clermont Auvergne (2017-2020), 2020. http://www.theses.fr/2020CLFAC041.
Texto completoA free-standing (i.e. placed on the ground and not anchored) structure can be found in severalindustrial facilities during maintenance operations, in storage halls, etc. During an earthquake,these stacks are likely to rock, slide or overturn. Thus, one of the main concerns regarding theseismic risk studies is to assess and limit, as the case may be, their excessive movements (due tosliding or overturning) to avoid impacts with the surroundings. In this work the earthquake responsesof a free standing stacked structure composed of three pallets intended to store packagesare investigated.The study of the seismic behavior of free-standing structures is known to be a quite challengingtask. Indeed, this problem involves several difficulties due to the large displacements, largerotations and also impact and friction nonlinearities. This implies an extreme sensitivity of theirseismic responses to small perturbations, both experimentally and numerically. Therefore, to analyzeand to predict how they respond under seismic excitation, probabilistic approaches are necessary.First of all, in order to have a quick estimate of the seismic response of the stack taking intoaccount the predominant physical phenomena that take place under unidirectional excitation, asimplified four degrees of freedom analyticalmodel, inspired fromliterature, has been developed.Then, different finite element models, more or less refined, have also been implemented. At thesame time, a comprehensive experimental campaign has been performed on an unidirectionalshaking table of the CEA / Saclay. These experimental results allow us to (i) validate the numericalmodel and (ii) identify the sensitivity of seismic responses (both experimental and numerical).Both approaches - numerical and experimental - combined with probabilistic approacheswere carried out simultaneously during this work and highlight several phenomena. A deterministicapproach identified the consequences of the uplift of the structure on the global behavior :the « fundamental » frequency mode is higher in the rocking phase than in the full contact phase.This work also showed that the adjustment of the dynamic properties of the models is an essential,but delicate task, to obtain an adequate nonlinear response. This means that it will be difficultto know a priori what will be the dynamic properties of the structure. Nevertheless, the simplifiedanalytical model can be used to quickly evaluate the models’sensitivity in relation to the mainphysical parameters, although the sensitivity is not necessarily comparable from one model toanother. In addition, as it is often noted with industrial structures, the seismic tests have shownthat the motion of the stacking was not purely 2D even under an unidirectional excitation. Consequently,defects have been introduced in the models and the numerical results showed an overallsatisfactory agreement by comparison with experimental results. A probabilistic analysis of thedynamic behavior of stacking, entirely conducted in a reliability context and based on the calculationof three usual reliability indicators (the failure probability and the Cornell and Hasofer-Lindreliability index), confirms the deterministic results obtained for each of the seismic excitationsconsidered (uni, bi and tridirectional). However, this effect is less marked for bi and tridirectional excitations
Didelot, Armelle. "Contribution à l'identification et au contrôle des risques dans le processus de conception". Vandoeuvre-les-Nancy, INPL, 2001. http://www.theses.fr/2001INPL566N.
Texto completoPuys, Maxime. "Sécurité des systèmes industriels : filtrage applicatif et recherche de scénarios d'attaques". Thesis, Université Grenoble Alpes (ComUE), 2018. http://www.theses.fr/2018GREAM009/document.
Texto completoIndustrial systems, also called SCADA (for Supervisory Control And Data Acquisition),are targeted by cyberattacks since Stuxnet in 2010. Due to the criticality of theirinteraction with the real world, these systems can be really harmful for humans andenvironment. As industrial systems have historically been physically isolated from therest of the world, they focused on the protection against outages and human mistakes(also called safety). Cybersecurity differs from safety in the way that an adversary iswilling to harm the system and will learn from his mistakes. One of the difficulty interms of cybersecurity of industrial systems is to make coexist security properties withdomain specific constraints. We tackle this question with three main axes.First, we propose a filter dedicated to industrial communications, allowing to enforceapplicative properties. Then, we focus on formal verification of cryptographic protocolsapplied to industrial protocols such as MODBUS or OPC-UA. Using well-known toolsfrom the domain, we model the protocols in order to check if they provide securityproperties including confidentiality, authentication and integrity. Finally, we propose anapproach named ASPICS (for Applicative Attack Scenarios Production for IndustrialControl Systems) to study if safety properties (similar to those verified by our filter)can actually be jeopardized by attackers depending on their position and capacity. Weimplement this approach in the UPPAAL model-checker and study its results on aproof-of-concept example
Camus, Fabrice. "Conception d'environnements virtuels dédiés à la maîtrise des risques : l'approche MELISSA". Compiègne, 2010. http://www.theses.fr/2010COMP1891.
Texto completoOur work refers to the design of virtual environments for risks management. More precisely, this work concerns the representation of application contexts of safety rules in a virtual environment. The goal is to be able to test the appropriation of these safety rules by the stakeholders of a working situation. These virtual environments can be used to check the relevance of safety rules, their coherence and their adequacy with the various application contexts. Designing virtual environments which represent safety rules application contexts requires explaining all parts of these safety rules. But some parts are implicit and theses rules are always subject of negotiations between the actors of the safety system. We present a methodology for designing virtual environments dedicated to risks management : MELISSA. This methodology is based on a model of the working situation. The model is built on a risks analysis. It aims at articulating three points of view : accidental scenarios related to the activity, tasks to be performed and potential factors which influence the working situation. MELISSA was developed for two projects. The first one is a national project : V3S (Virtual Reality for Safe SEVESO Subcontractors) and the second one is a European project : Virthualis. This approach has showed relevance to collect and articulate the necessary knowledge for designing a virtual environment dedicated to risks management. It is able to represent the sequences of events of the working situation, the action of the user in response to these events and all the entities changes of state to be represented in the virtual environment
Michard, Claire-Elise. "Un siècle d'histoire des risques professionnels en agriculture (depuis 1898)". Nantes, 2009. http://www.theses.fr/2009NANT4008.
Texto completoAt the end of the 19th century, modem social welfare was created in France with the Act of April 9th 1898, introducing an inclusive payment system for accidents at work: this system entitled wage earners victims of accidents that had occurred during working hours and on their work location to an automatic compensation. A fierce ideological controversy flared up about the implementation of this act in the agricultural sector, especially among the agrarian, who defended the agricultural worid against industry. From the end of the 19th century to the interwar period, the agrarian strongly opposed the implementation of the principle of professional risk to the agricultural sector as a whole; yet, they opposition took a rather « dynamic » aspect, as they created their own network of social welfare. Indeed, the agricultural benefit system enabled them to vindicate their opposition, since, according to them, agricultural professional risks were already covered by an inability benefit. Eventually, thanks to the Act of December 15th 1922, agricultural wage earners could benefit from the measures of the Act of April 9th 1898. However, as far as this extension was concerned, the autonomy and specificities of the agricultural worid were taken into account and reinforced as the years went by. At the Liberation, despite the creation of the Social Security, the agricultural system was not questioned. Agricultural workers kept on benefiting from their own organisations and social measures. Yet, the various acts related to agricultural professional risks written after the Liberation tended to bring the agricultural system closer the general system
Mathieu, Eric. "Apport de l'écoute sismoacoustique pour la surveillance des chantiers miniers affectés de coups de terrains : application au cas des tailles de l'unité d'exploitation de Provence". Vandoeuvre-les-Nancy, INPL, 1989. http://www.theses.fr/1989NAN10435.
Texto completoSmache, Meriem. "La sécurité des réseaux déterministes de l’Internet des objets industriels (IIoT)". Thesis, Lyon, 2019. http://www.theses.fr/2019LYSEM033.
Texto completoTime synchronization is a crucial requirement for the IEEE802.15.4e based Industrial Internet of Things (IIoT). It is provided by the application of the Time-Slotted Channel-Hopping (TSCH) mode of the IEEE802.15.4e. TSCH synchronization allows reaching low-power and high-reliability wireless networking. However, TSCH synchronization resources are an evident target for cyber-attacks. They can be manipulated by attackers to paralyze the whole network communications. In this thesis, we aim to provide a vulnerability analysis of the TSCH asset synchronization. We propose novel detection metrics based on the internal process of the TSCH state machine of every node without requiring any additional communications or capture or analysis of the packet traces. Then, we design and implement novel self-detection and self-defence techniques embedded in every node to take into account the intelligence and learning ability of the attacker, the legitimate node and the real-time industrial network interactions. The experiment results show that the proposed mechanisms can protect against synchronization attacks
Artus, Samuel. "Estimation et pronostic de températures de disques de frein : application aux véhicules industriels". Lille 1, 2006. http://www.theses.fr/2006LIL10159.
Texto completoActive safety systems are of growing importance in automotive applications, including commercial vehicles. Their development is deeply based on embedded electronic modules. The first objective of this thesis consists in developing a brake disc temperature estimation for commercial heavy vehicles. Trucks manufacturer knowledge limitations impose to consider this problem via a global energetic approach. This approach is applied at the vehicle level to reach a systemic point of view and represent the manufacturer's vision of the system integration. Our algorithms have shown promising results on prototype vehic1es, where tests and demonstration were performed for a European project contribution. The proposed model based approach is also able to address prediction objectives. Thus, this work presents the prediction of commercial heavy vehicle brake disc temperature. Considering temperature estimation, it seems feasible to define the temperature evolution over a near future time window. Required assumptions to achieve the brake disc temperature prediction are discussed in the last part of the thesis
Ruillé, Jonathan. "Management des risques intégré des navires et de leurs armements : un ferry peut-il être une organisation à haute fiabilité ?" Nantes, 2015. http://www.theses.fr/2015NANT4027.
Texto completoDespite the technological developments making the ships more "safe", the recent accidents - Costa Concordia (2012), Sewol (2014), Norman Atlantic (2014) - remind us that the maritime transport remains a risk activity. For as much, the maritime traffic has never been as important, either in number of vessels or in tons of freight transported, and these accidents have a relatively low frequency. The multiplication of regulations and conventions (SOLAS, MARPOL, STCW, ISM, ISPS; MLC 2006, etc. ) is intended to reduce them because their consequences can be quickly dramatic: hundreds, or even thousands, of people may lose their lives due to a shipwreck. Thus, ferries have an imperative of reliability counteracting the dangers that threaten them. The responsibilities which weigh on the crew are important, and each day they have to lead the ship of a point A to a point B safely while respecting the deadlines. This thesis is concerned with the organizational reliability by examining the organization allowing the crew, in link with the stakeholders (shipping company, approved inspection body, etc. ), to seize all of requirements for risk management and performance expected, in a context of globalization and increased competition. During our five-week boarding of two ferries, we combined a qualitative approach (observations, interviews) to a quantitative approach (questionnaires) to answer the question: a ferry can be a high reliability organization ?
Dherine, Jean. "Les instruments de mesure de la gestion de production. : Le problème de la sécurité et de la sauvegarde des ressources humaines et non humaines dans trois grands groupes industriels". Metz, 2002. http://docnum.univ-lorraine.fr/public/UPV-M/Theses/2002/Dherine.Jean.LMZ0205.pdf.
Texto completoThis thesis deals with measurement and the instruments used, through the methods of production management governed by the ISO norms in three large industrial companies : the first of these companies manufactures carbonate and sodium bicarbonate ; the second builds car equipment ; the third develops steel destined to be used cars, household appliances construction works and packaging industries. Starting from the origins and development of measurement, the thesis attemps to establish its hold and incidence on man and machines. A census of the instruments and tools used in production units has led to an observation of the system of constraints inposed on both the operator and his operands. Throughout the interactions between man and machine, we note that measurement does not contradict the juxtaposition of instruments and measuring tools. On the contrary, it encourages the reinforcement of systems which are assured by management techniques intended to increase the safety of man and of machine, and the viability of products. It is by observing measurements and their imposed mechanisms in production units that we manage to reveal their features and their influence on both man and machine
Chaudet-Bressy, Frédérique. "Apport du retour d'expérience à la maîtrise des risques relatifs à l'hygiène, la sécurité et l'environnement, dans les petits établissements industriels : application à l'industrie du traitement thermique". Phd thesis, Ecole Nationale Supérieure des Mines de Saint-Etienne, 2002. http://tel.archives-ouvertes.fr/tel-00804521.
Texto completoLaoufi, Nabil. "Processus guidé pour l'identification des exigences de sécurité à partir de l'analyse des risques". Electronic Thesis or Diss., Paris, CNAM, 2017. http://www.theses.fr/2017CNAM1103.
Texto completoAny organization is enabled by continuous physical flow and decision flow from operating symbiosis to achieve specific objectives. Which generates the implementation of a reliable information system, operating with a continuous control and maximum security, taking in to account the internal and external environment to maintain its operational and strategic role. Given the level of risk exposure and the vital dependence of companies on their information systems, it is crucial to pay attention to security requirements. Achieving a balance between the security and effectiveness of the information system is a complex task requiring an in-depth analysis of the organizational context. It also requires the identification, analysis, and management of the risks incurred by the company. It also requires the determination of security requirements. Few approaches offer guidance to derive security requirements from the risks involved. The aim of this thesis is to design a suggestive guiding mechanism that allows to derive the security requirements from the risk analysis. We propose an approach based on a modular ontology and a set of correspondence rules. To achieve, we propose the development of four ontologies and an alignment process between then using consistent semantic relationships. The validation process is based on a case study and a prototype
Bakkali-Hassani, Marie-Hélène. "La connaissance des risques professionnels de l'entreprise par le médecin du travail". Bordeaux 2, 1992. http://www.theses.fr/1992BOR23031.
Texto completoSimba, Ngabi Marcellin. "Proposition d'une méthode de maîtrise des risques industriels pour le respect de l'hygiène, de la santé, de la sécurité et de l'environnement dans le secteur pétrolier". Phd thesis, Paris, ENSAM, 2006. http://pastel.archives-ouvertes.fr/pastel-00001941.
Texto completoKonan, Koffi Eric. "Les risques liés au transport maritime : étude sur la sécurité et la sûreté maritimes". Thesis, Paris 1, 2018. http://www.theses.fr/2018PA01D003.
Texto completoEvery maritime expedition is a new adventure and that, the seafarers know something about it. This idea of a new adventure reflects the diversity of maritime risks that this research has proposed to deal with. Today, there is an increase in capacity marked by a trend of chartering of giga container ships, vessels and tankers. This increase in capacity is not without an increase in maritime risks. Thus, the persistence of maritime collisions, the failure of vessels and accidental pollution by ships have revealed, over the years, the short comings, but also the non-observance of the legal framework regulating maritime transport. These risks of shipping, with sometimes catastrophic consequences, the effective management of which is still beyond the reach of maritime actors and organizations, are exacerbated by threats of piracy, terrorism, smuggling of migrants, narcotics and firearms. Faced with this situation which does not facilitate the operation of ships, if not shipping, we have seized the framework of this research to classify these risks. Depending on whether they affect maritime safety (traditional shipping risks) or affect maritime security (maritime threats) in order to make their examination accessible, but also to remove the many confusions to which these two concepts lend themselves. This review proved to bean indispensable step in considering alternatives, essentially legal, forthe effective handling of such maritime risks. If the vigilance of the maritime actors is essential for the effective management (prevention and control) of the risks linked to maritime transport, the law in this area must follow, in the face of constantly changing and widening risks
Loschmann, Ronald. "Contribution à l'élaboration d'une méthode d'analyse prévisionnelle de la sécurité de systèmes à risques multiples : application à un site industriel urbain". Aix-Marseille 3, 2002. http://www.theses.fr/2002AIX30050.
Texto completoThe work presented in this thesis is in the scope of organisational safety and knowledge engineering. It contributes to the elaboration of a computerized method for the provisional analysis on safety of Urban Industrial Sites (UIS). The method consists in foreseeing the critical behaviour of UIS, given accident scenarios, by means of an hybrid model simulator. The simulator rests on the UIS and the accident conceptual models, elaborated from ontological studies and the KOD method. The UIS model renders an account of technical, human and organisational aspects. The accident model, inspired from the J. Dumaine model, permits to assess the consequences of the three industrial accident types : the release of toxic substances, fire and explosion. The conceptual models are formalized using UML-RT extended for hybrid systems and implemented with Anylogic. Our experimentations were carried out on the UIS of Marseilles St Menet
Muralidhara, Anitha. "Physico-chemical safety issues pertaining to biosourced furanics valorization with a focus on humins as biomass resource". Thesis, Compiègne, 2019. http://www.theses.fr/2019COMP2508.
Texto completoThe present research work was integrated as part of the EU-funded project named HUGS (HUmins as Green and Sustainable precursors for eco-friendly building blocks and materials), involving 5 main partners (Institut national de l'environnement industriel et des risques - France, Avantium - the Netherlands, Institut de Chimie de Nice - France, Universidad De Cordoba- Spain and Leibniz - Institut Fur Katalyse Ev An Der Universitat Rostock- Germany). The project is essentially supported through five European Industrial Doctorate fellowships put in place when the HUGS-MSCA-ITN-2015 program was launched in 2016. The primary objective of the HUGS project was to explore several valorization pathways of so-called “humins” in order to add value and create better business cases. Humins (and similarly lignins) are the side products that may become low-cost feedstock resulting from a number of future biorefineries and sugar conversion processes. Humins are complex residues resulting from the Acid-Catalyzed Dehydration and condensation of sugars, having furan-rings in their polymeric structures. The work presented in this specific part of the HUGS project is essentially focusing on safety-related topics of all components and subsequent applications related to sugar dehydration technology. Priority actions were devoted to a first insight on the characterization of physicochemical safety profiles of the side-product humins and main (parent) furanic products. Some members of this large family of compounds (e.g. RMF and FDCA) have high volume potential which results in opening new doors towards the development of furanbased building blocks and a bio-based economy. Humins are residues or side products which can be burnt for energy. However, its safe and sustainable use in high-value applications could also become a key milestone in the so-called circular economy. In practice, the work has been developed in two main locations: primarily at the INERIS lab, located in Verneuil-en-Halatte and at Avantium, located in Amsterdam. Nearly all experimental research after the production of the components at Avantium was performed at INERIS. This involved the evaluation of physicochemical hazards of both humins (crude industrial humins and humin foams obtained by thermal curing) and a series of furanic compounds. Avantium is involved in the commercialization of humins, furanics and furanic polymers/materials as novel chemicals and materials. The work has encompassed: An extensive bibliographical review of humins, furanics, and their related products (polymers, composites) resulted in the following main conclusions o A lack of physicochemical safety-oriented studies for many furanic compounds and for humins was observed as these products are still in the early stage of development and only a few may be commercialized in the next 5 years.o Despite the limited availability of safety-related data, more studies on toxicity aspects have been conducted for a selected number of furanics than physicochemical safety-related aspects. o A few furanic family members that have been evaluated as biofuel components were found to have given better emphasis on addressing some physicochemical safety attributes. o Every modification of the process for acid-catalyzed sugar dehydration (such as solvent, temperature, residence time and sugar concentration) will result in different humins, which would certainly demand further characterization and safety profiling of the resulting humins. • Analytical development integrating the first examination of flash point distribution versus the Net Heating Values, and analysis of total heats of combustion of furanic compounds. • Design and development of experimental plan addressing the safety-related key parameters such as thermal stability, self-heating risks, fire-risk-assessment and flammability limits depending on the need for specific tests and availability of the test samples
Junges, Pierre-Marie. "Évaluation à l'échelle de l'Internet du niveau d'exposition des objets connectés face aux risques de sécurité". Electronic Thesis or Diss., Université de Lorraine, 2022. http://www.theses.fr/2022LORR0078.
Texto completoNowadays, the use of Internet of Things (IoT) devices in our personal and work space makes our everyday life easier, but those IoT devices often suffer from security issues. The objective of this thesis is to evaluate the security of IoT devices. On one hand, we investigate the risk of user privacy leakage introduced by IoT hubs (or IoT gateways). Those IoT hubs act as a middlebox between a user and the IoT devices. Existing passive fingerprinting techniques are not applicable in this configuration considering that the network traffic of each individual IoT device attached to the IoT hub is not accessible. We propose a passive fingerprinting technique to infer the user actions by analysing the network traffic of the IoT gateway. Our method works on encrypted network traffic, and consists of decomposing a packet payload size into a set of, potential, user actions. We applied our technique on one IoT gateway controlling up to 16 IoT devices and show that an attacker, located on the Internet, is able to infer the user actions in more than 91.2% of the investigated cases.In a further step, we propose a hybrid firmware analysis technique to evaluate the security of an IoT device by inspecting the content of its firmware. Our analysis combines a dynamic analysis and a static analysis to improve our chances to extract data. Our objectives are not to detect unknown vulnerabilities but only the known ones, and inspect if the binaries included are deprecated. We applied our analysis on 4,730 firmwares belonging to IoT devices released between 2009 and 2019, and noticed the widespread use of a small set of binaries, notably to deploy HTTP and SSH services. From 2017, we observed that IoT manufacturers implemented many updates which reduced the exposure to known vulnerabilities.Using those firmwares, we defined an active fingerprinting technique allowing an attacker to infer details about a connected IoT devices, such as its brand or the binary used to deploy the HTTP server. Thanks to the firmware content, we can 1) obtain precise information about the binaries (name, version), and 2) assume the services actually deployed by the device i.e., the results of a TCP/UDP port scans. Considering those two aspects, our method consists of training classifiers to predict one particular property of a connected IoT device from, among others, the supposed results of a TCP/UDP port scans. Our method allows to predict fine details such as the name or version of a binary, the usernames or the passwords present in an IoT device. Using our approach, we noticed that the predictions of the name and version of the HTTP, SSH and DNS binaries are achieved with a precision superior to 73.14%. On the other hand, the prediction of at least one valid password is more challenging and requires up to two tries. Our method is more effective and furtive than a naive brute-force method.Knowing the vulnerabilies present in a IoT device does not guarantee that attackers use them on a regular basis. Hence, we propose in our fourth contribution, a high interaction honeypot capable of intercepting cyberattacks targeting IoT devices. The defined honeypot is based on an existing emulation technique that uses IoT devices firmwares. Implementing an honeypot is hard, and because of the stealth constraint, the existing emulation technique could not be used as-is. Due to this constraint, we implemented a framework capable of emulating IoT devices while assuring their furtivity, and adding honeypot-specific capabilities, such as exfiltrating the attackers activities. We then compared our approach to the state of the art one, and showed that ours can emulate up to 825 (82.5%) devices compared to 454 (45.4%). Our honeypot was deployed on one server during about one year and captured unknown and recent attacks from botnets, and sometimes humans
Luang, Aphay Jean Siri. "Quelle confiance pour améliorer la sécurité du système d'information ? Contribution à une modélisation de la sécurité des systèmes d'information socio-techniques". Compiègne, 2004. http://www.theses.fr/2004COMP1527.
Texto completoInformation security rests on important technical means whose organisational and social insertion is often retumed to the steps of sensitising. Our investigations show that the training of safety forms part of a strategie global training and located. The practice of safety is indexed with a system of constraints, individual and collective objectives sometimes divergent and intentions. Ln comparison with the priorities that the individual builds itself, safety thus takes a variable weight likely to be negotiated at every moment. Safety is thus not a process but a training of installations which the actors and the threats around the apparent but nonexclusive form operate which is the organization. The piloting of safety supposes permanent construction and update of a representation of the regulations of the complex information system. This building work requires to invest the local margins of appropriation by confidence, thus making it possible to make profitable the company richness
Laoufi, Nabil. "Processus guidé pour l'identification des exigences de sécurité à partir de l'analyse des risques". Thesis, Paris, CNAM, 2017. http://www.theses.fr/2017CNAM1103/document.
Texto completoAny organization is enabled by continuous physical flow and decision flow from operating symbiosis to achieve specific objectives. Which generates the implementation of a reliable information system, operating with a continuous control and maximum security, taking in to account the internal and external environment to maintain its operational and strategic role. Given the level of risk exposure and the vital dependence of companies on their information systems, it is crucial to pay attention to security requirements. Achieving a balance between the security and effectiveness of the information system is a complex task requiring an in-depth analysis of the organizational context. It also requires the identification, analysis, and management of the risks incurred by the company. It also requires the determination of security requirements. Few approaches offer guidance to derive security requirements from the risks involved. The aim of this thesis is to design a suggestive guiding mechanism that allows to derive the security requirements from the risk analysis. We propose an approach based on a modular ontology and a set of correspondence rules. To achieve, we propose the development of four ontologies and an alignment process between then using consistent semantic relationships. The validation process is based on a case study and a prototype
Cantero, Javier. "La gouvernance de la gestion des risques industriels : entre la sécurité et la performance économique : le cas des plate-formes chimiques rhône-alpines". Lyon 3, 2008. http://www.theses.fr/2008LYO33012.
Texto completoThis study is more grounded on industrial risk management, being this field a meaningful part of organizational reliability, than on analyses focused on vulnerable aspects of organizations at risk. The innovative aspect of this shift stems from the capacity to reconcile economic performance and safety issues. Henceforth, it will be necessary to both identify and understand the mechanisms and devices that facilitate the joint analysis of these a priori contradictory logics. Indeed, our empirical corpus shows that inter-organizational coordination devices and social agreement mechanisms have positive effects on both perspectives on organizational reliability. Vertically integrated companies major changes since 1980s produced networked organizations and contributed to the evolution of risk management. On the other hand, the actors concerned with the activities of organizations at risk mobilize and demand participation in the risk management process. Despite the evident causal link connecting inter-organizational coordination devices and organizational reliability, there is no clear evidence relating social agreement mechanisms to the aforementioned reliability (taking into account its embryonic development). Nevertheless, this kind of device analysis can arouse suspiction as regards their potentialities in terms of organizational reliability. In sum, our study paves its way toward reconciling the theoretical approaches of risk management (NAT and HRO) as well as economic performance and safety. By adopting an organizational perspective with a strong empirical anchoring, we would be able to better comprehend the peculiarities of the current governance of the industrial risks
Piwowar, Julien. "Analyse des risques de malveillance sur systèmes complexes : anticipation et aide à la décision dans le cadre sécurité globale". Troyes, 2010. http://www.theses.fr/2010TROY0006.
Texto completoIncreased of economic, material or human flows, in ever-larger areas and in a reduced time imply a grow up need to secure these exchanges. This globalization is applied to all systems, which are connected through net-works today. In fact, the interdependence of each one lead to a global threat which generates risks of several malevolent procedures from simple degradation to terrorism. Now, it is not possible to manage the security of these complex systems with only mathematical methods or experimental judgments. So, it is the opportunity to develop a method combining analytical and behavioral science. The topic of the thesis is to build a general framework to capture the various characteristics of a system put in its environment with a holistic approach (systemic analysis). Then, the goal is to assess (with expert judgement) vulnerabilities associated to each component of the system and describe all critical paths using an adequate support with a global overview: human and goods flows, security systems, surveillance networks with closed-Circuit Television (CCTV), etc. The purpose of such a methodology is to permit stakeholders to simulate attacks on their infrastructure, according to several profiles of aggressors in a evoluating and dynamic con-text. Especially, it is a decision making tool to optimize security at all points of the system and to observe the global associated effects, and consequently to emphasize the concept of anticipation
Eljamassi, Alaeddinne. "Utilisation des systèmes d'information géographique (SIG) dans la gestion des risques routiers en milieu urbain". Saint-Etienne, 2006. http://www.theses.fr/2006STET2088.
Texto completoThe integration of spatial dimension in the analysis of road accidents was less well treated before the integration of GIS (Geographical Information Systems) and their tools for spatial analysis which open a new perspective to us. The thesis aims to customize some urban accident risk models developed at the Transport Research Laboratory in England to the context of French and Arabic countries in the Middle East. Some simplification of the data collection and coding necessary for these models, is proposed in order to implement these models in an easier way for road risk management ; A fair identification and localization of the major problems of road risk in urban area is now possible through the use of GIS technology as a tool for decision-making
Chirac, Raphaël. "Contribution à l'étude des facteurs d'influences de la perception des risques par les mécaniciens de maintenance aéronautique". Electronic Thesis or Diss., Bordeaux, 2024. http://www.theses.fr/2024BORD0501.
Texto completoThis study of risk perception by aircraft maintenance mechanics is based on the observation that the safety of flight operations is mainly considered through a regulatory framework in order to ensure a high level of safety. However, this does not allow us to understand how mechanics manage risks on a day-to-day basis. Thus, this work was carried out to answer the following 3 research questions: How do aircraft mechanics perceive risks in terms of the 3 risk characteristics (probability, severity, immediacy)? What factors might explain the variance in risk perception? Is there a difference between the perception of risks impacting mechanics' health and the perception of risks impacting aircraft airworthiness?In order to identify the hazards to which mechanics are exposed during their activity, we established a taxonomy. An experimental approach was followed to assess its relevance and completeness and to validate it. The results show that the 10 engineers and 20 mechanics of our panel share a common representation of the hazard. We also identified confusion between the notions of hazard, risk and safety measure. We conclude that it is important for the operators to share a clear definition of these notions. From our point of view, this corresponds to the main basis for ensuring safe maintenance operations and the airworthiness of the aircraft.Then, we designed a model of risk perception adapted to the aircraft maintenance domain, which was tested on a new panel of 27 aeronautical mechanics. We concluded that one of the major challenges is to ensure that mechanics share a common perception of risk that reflects the reality of the activity. To achieve this, we highlighted the impact of three sets of factors on risk perception: the intrinsic characteristics of a hazard; the mechanic's knowledge and experience; and the operational context. For this purpose, effective communication and training in risk management are needed, so that mechanics obtain an applicable risk perception to the operational context
Métivier, Virginie. "Méthode d'application d'un système de management de l'environnement, de la sécurité et de la santé : cas du site industriel de production pharmaceutique Abbott". Orléans, 2002. http://www.theses.fr/2002ORLE1045.
Texto completoThe purpose of this report is to promote the implementation of a general method in respect of the environmental, safety and management systems for the pharmaceutical industry and more specifically for the industrial site for the Abbott laboratory. After giving an outline of the already existing environment, safety and hygiene management systems, we would develop the method and tools chosen to implement the management system for the Abbott site. Based on numerous examples we would also evaluate the results achieved by the new system. Eventually, we would analyse all sociological constraints and limits that held back the implementation of this environment, safety and hygiene management system that was chosen for the industrial site
Gorand, Olivier. "Création d'une base de données informatique de toxicologie industrielle dans la centrale nucléaire du Blayais". Bordeaux 2, 1998. http://www.theses.fr/1998BOR23069.
Texto completoWiss, Jacques. "Contribution à l'étude de la sécurité des réacteurs chimiques au point d'ébullition par utilisation du refroidissement par évaporation : techniques d'évaluation des risques, méthodes de conception d'installations sûres". Mulhouse, 1992. http://www.theses.fr/1992MULH0250.
Texto completoWailly, Jeanne-Marie. "Risques industriels, travail et environnement : contribution du droit de l'environnement à la protection de la santé au travail et ses conséquences sur l'entreprise polluante". Littoral, 2008. http://www.theses.fr/2008DUNK0211.
Texto completoThis thesis objective is to review the situation, concerning the state of health at work at the beginning of the twenty-first century in France. The matter of the study is more particularly about the health of workers in companies but also about people who live near industrial plants. . . The emphasis is put on the methodology followed, which combines the contribution of law (work, social,. . . ), economy, history and sociology. . . This thesis demonstrates through time and space, the confrontation between health at work and environment. It also shows how the law and other elements have allowed a parallel and then a collaboration. Owever the gap is Hobvious at the end of the 19th Century (with the Industrial Revolution), and the environment law which appears approximatively a century later (in 1970, with the economical crisis). This thesis is illustrated from an empirical point of view by a study realised inside Dunkerque area, whose aim was identify the consequences of air pollution on individuals. The research was led so as to retranscribe as well as possible the feeling or the disorders experienced by the people pollued, and then to translate them, during the analysis on effects on health, and also on social economic effects
Elias, Pierre. "Contribution à la modélisation multi-agents de la conduite de processus industriels : application à la conduite en situation accidentelle d'un réacteur nucléaire à eau sous pression". Aix-Marseille 3, 1996. http://www.theses.fr/1996AIX30090.
Texto completoDautun, Carole. "Contribution à l'étude des crises de grande ampleur : connaissance et aide à la décision pour la sécurité civile". Phd thesis, Ecole Nationale Supérieure des Mines de Saint-Etienne, 2007. http://tel.archives-ouvertes.fr/tel-00803754.
Texto completoSeyssel, Sandra. "La réglementation de l’organisation des événements sportifs de nature à l’épreuve de la pratique : une mise en perspective appliquée pour une gestion maîtrisée des risques". Thesis, Rennes 2, 2020. http://www.bu.univ-rennes2.fr/system/files/theses/2020theseSeysselSComplet.pdf.
Texto completoAccidents/incidents occur, despite important legal constraints concerning the organization of outdoor sporting events. This thesis therefore aims to bring fresh thinking, at the crossroads of law and social sciences, in order to confront the prescribed orders to the actual practices on the field. The study employed a multiple-qualitative methodology, by ensuring contractual, regulatory and case law legal aid, by observation (participants or not, announced or not) and by semi-directive exploratory talks. Twenty outdoor sporting events were investigated: from small (n = 14) to big (n = 6) scale, essentially competitive (n = 18), organized within a federal framework (n = 12) by associational structures (n = 16). The results of the study show the following: 1/ relative effectiveness of applicable rules, according to the nature of the organizing structures, the rules and the sporting events in question, the level of knowledge of rules learnt by the relevant parties, the progress of the event; 2/ ambiguities and recurring deficits within the organizations, coupled with the ineffectiveness of rules in terms of gaps and loopholes, enabling the actors to be eligible for areas of freedom; 3/ independent regulations disconnected from control mechanisms not biased in favor of developing joint rules that are prone to be better understood, accepted, and thus duly applied. The present study shows that the security of outdoor sporting events has room for improvement. A number of recommendations is thus formulated alongside preventive actions already undertaken
Février, Rémy. "Management de la sécurité des systèmes d'information : les collectivités territoriales face aux risques numériques". Thesis, Paris 2, 2012. http://www.theses.fr/2012PA020025.
Texto completoThis doctoral thesis aims at answering a key question: what is the level of consideration given to Information Systems Security (ISS) by the French local authorities (LAs)? The latter are now facing new challenges that require an ever-increasing use of new technologies (e-government, e-democracy, dematerialization of call for tenders...). The under-researched territorial IT risk becomes a major issue in the sphere of public services and the protection of personal data. Theoretically based and constructed through successive professional positions, our theoretical model helps measure the actual level of inclusion of digital risk taking into account the respective influence of a set of characteristics of local authorities. A field survey was conducted with the close collaboration of representatives of LAs.While numerical risk requires a high level awareness by LA decision makers, it appears that they have a very imperfect knowledge of IT security related risks as well as of direct or indirect threats that may jeopardize their management systems. A potential solution lies with the definition of a specific public policy and with the implementation of appropriate procedures at the level of each community
Hubert, Emmanuel. "Gouvernance et vulnérabilités du territoire péri-industriel : Méthodologie d'aide à la réflexion pour une maîtrise de l'urbanisation efficace et durable vis-à-vis du risque industriel majeur". Phd thesis, Ecole Nationale Supérieure des Mines de Saint-Etienne, 2005. http://tel.archives-ouvertes.fr/tel-00781162.
Texto completoSalvador, Marie-Line. "La gestion contractuelle du risque industriel". Thesis, Toulouse 1, 2015. http://www.theses.fr/2015TOU10033/document.
Texto completoThe action of public authorities forces an industrial risk management. The initial problem resided in determining the function of a contract under an industrial risk management. After having identified the legislative devises and the position of jurisprudence, it turned out that the law orients the management towards the prevention of attacks. To ensure the object of management, the industrial risk had to be determined. The risk having a negative aspect could be legally translated by potential losses. The industrial risk management lies in preventing the realization of losses. After this analysis, a contract improves the knowledge of a risk. The main contribution of the contract lies in the awakening of consciousness of the reality of industrial risk. This effect is the pillar of its contract management. The contract promotes knowledge of the industrial risk the parties incur, as well as the awakening of their consciousness about the potential harm. By the awakening of their consciousness, the contractors should be prepared to invest in preventing the realization of losses. The contract truly brings added value in the industrial risk management
Ghemraoui, Rima. "Méthodologie de conception innovante intégrant la sécurité des utilisateurs : application aux liaisons tracteur-outils". Phd thesis, École normale supérieure de Cachan - ENS Cachan, 2009. http://tel.archives-ouvertes.fr/tel-00506040.
Texto completoFantino, Benoît. "Quels élements d'influence pour l'adoption symbolique de la sécurité des systèmes d'information?" Electronic Thesis or Diss., Aix-Marseille, 2018. http://theses.univ-amu.fr.lama.univ-amu.fr/181217_FANTINO_384augsqo481yii281yebhhz252gqv_TH.pdf.
Texto completoThe information system security for which the interest joins in the increasing dependence of companies to them information system and in prospect of increasing number of security incidents. We are interested in the information system risk management, for whom the literature underlines the lack of involvement of top-managers.We approach the concern under the view of the decision of top executives for ISS, through four theoretical streams: the models of the managerial perceptions of IS risks, the risks perception in psychology, the institutional theory and the theory about symbolic adoption of the innovations. The aim is to make intelligible the influences on the symbolic adoption of such ISS approach. We use a qualitative method organized around 17 case studies in companies with varied activities. Our results highlight the relevance to study the ISS according to an individual perspective of risk management. On one hand, the characteristics of the psychological evaluation of the risks enlighten the biases for the management of the information system risk. On the other hand, the study of these biases brings a new perspective on the understanding of the investment of the top executives for the ISS. In particular, we underline the insensitivity of the top managers in the exposure of the risk, a preference to approach the risks under a threats point of view. We expose the influences which contribute to adopt a technical and not managerial ISS such as suggests by the Research. Finally, our analysis brings to the foreground perspectives to extend the comprehension of a reactive ISS, defame by ISS’ academics
Fantino, Benoît. "Quels élements d'influence pour l'adoption symbolique de la sécurité des systèmes d'information?" Thesis, Aix-Marseille, 2018. http://www.theses.fr/2018AIXM0586.
Texto completoThe information system security for which the interest joins in the increasing dependence of companies to them information system and in prospect of increasing number of security incidents. We are interested in the information system risk management, for whom the literature underlines the lack of involvement of top-managers.We approach the concern under the view of the decision of top executives for ISS, through four theoretical streams: the models of the managerial perceptions of IS risks, the risks perception in psychology, the institutional theory and the theory about symbolic adoption of the innovations. The aim is to make intelligible the influences on the symbolic adoption of such ISS approach. We use a qualitative method organized around 17 case studies in companies with varied activities. Our results highlight the relevance to study the ISS according to an individual perspective of risk management. On one hand, the characteristics of the psychological evaluation of the risks enlighten the biases for the management of the information system risk. On the other hand, the study of these biases brings a new perspective on the understanding of the investment of the top executives for the ISS. In particular, we underline the insensitivity of the top managers in the exposure of the risk, a preference to approach the risks under a threats point of view. We expose the influences which contribute to adopt a technical and not managerial ISS such as suggests by the Research. Finally, our analysis brings to the foreground perspectives to extend the comprehension of a reactive ISS, defame by ISS’ academics