Risk assessment approach

Top PDF Risk assessment approach:

A measurable approach for risk justification of explicit and tacit knowledge assessment

A measurable approach for risk justification of explicit and tacit knowledge assessment

Knowledge has become a central organizing principle in society to the extent that knowledge management has become a mainstream activity in organizations. Nevertheless, knowledge- related risks remain relatively neglected in the risk management domain. Whilst knowledge reduces uncertainty and the associated risks, the increased knowledge intensity in organizations also represents a risk factor that has to be assessed. The paper describes and validates an organizational risk assessment approach that considers knowledge-related and knowledge management risks in an integrated manner. The approach makes it possible to calculate risk ratings in terms of vulnerability and likelihood for 50 threats to all activities and phases of the knowledge life cycle. These risk ratings are plotted against 24 potential risks in the human, organizational, and technical domains. To impress on management the significance of these knowledge-related risks, the risk ratings are transformed to approximated financial figures. The approach is applied to 10 Slovenian organizations, two of which are discussed in detail in the paper, to demonstrate that it can be successfully used in a wide variety of organizations. It is concluded that the approach offers a way to assess both knowledge-related and knowledge- management-related risks, that the costs that individual risks potentially hold can be approximated, and that for a diversity of organizations mitigation strategies can be suggested for the identified risks.
Show more

19 Read more

Changing Requirements of Information Security landscape

Changing Requirements of Information Security landscape

ABSTRACT:Information security risk assessment has gained importance as organisations‟ dependence on information has grown on the one handwhile the threat environment has become complex on the other hand. Traditional risk assessments are subjective and are have proven to be inadequate in addressing the growing complexity of identifying, analyzing and evaluating risks in recent times. Risk-related decisions are invariably based upon scores derived from rudimentary aggregation of qualitative ratings. A study of risk assessment practices over the last two decades revealed that effort has been made to make risk assessments as quantitative as possible. Literature review revealed rich potential for adaptations of risk assessment methods from other mature fields namely medicine and finance.The study proposes research and innovation requirement towards a new information security risk assessment model. This new approach should have a scientific foundation to assess and evaluate risks which should improve information security risk assessment approach by assessing risks in a more objective manner while giving due consideration to appropriate measurement unit for each specific risk area; while taking into consideration inter dependence among different risk areas.This paper lays a sound foundation for advanced innovation in the field of information risks.
Show more

8 Read more

Risk Assessment for Relational Database Schema-based Constraint Using State Machine Diagram

Risk Assessment for Relational Database Schema-based Constraint Using State Machine Diagram

The proposed risk assessment approach is to calculate the probability that an application will be breaking the schema- based constraints in a relational database using state machine diagram. Ideally this approach will be used for evaluating a scenario’s risk factor which covers the evaluation of component and connection’s risk factor. For evaluating component and connection risk factors we apply a full predicate coverage to generate an unsatisfactory probability. In addition, the number of attributes and relations of the database’s schema are used for identification of the hazard level. Finally, a scenario’s risk factor is calculated using the component and connection’s risk factor. The advantage of this approach is an acquisition of scenario risk factors which will be used in the risk management process.
Show more

8 Read more

An Initial Assessment of the Risk Approach to Antenatal Management in Malaysia

An Initial Assessment of the Risk Approach to Antenatal Management in Malaysia

An Initial Assessment of the Risk Approach to Antenatal Management in Malaysia An Initial Assessment of the Risk Approach to Antenatal M anagement in Malaysia B Somboonsook* J Wakerman* C T Hattch* M[.]

9 Read more

Assessing Safety of Ferry Routes by Ship Handling Model through AHP and Fuzzy Approach

Assessing Safety of Ferry Routes by Ship Handling Model through AHP and Fuzzy Approach

Based on this approach, port of Padangbai (PAD) has highest ship handling difficulty value in any case fol- lowed by port of Lembar (LEM), port Gilimanuk (GIL) and port of Ketapang (KET). Therefore, for ship master at port of Padangbai (PAD) should give attention to ship handling of their ferry. Further, Bali Strait has higher ship handling difficulty on maximum value of SHDs than Lombok Strait. Whereas, in any cases, average value of SHDs showed that Lombok Strait has higher ship han- dling difficulty than Bali Strait. The result of simulation of ship handling model could be used for several parties concerned such as ship master, shipping company and port authority. Ship master of Ro-Ro ferries should more aware during ship handling process especially during departure and arrival at port. The appropriateness of the arrangement of officer for departure and arrival process would prevent the potential accident refers to ship han- dling difficulty. Further, the shipping company could establish strategies which are different for each ferry route. Special attention should be given to ferry routes which ship handling difficulty value is in higher level. Finally, the port authority could develop ship handling difficulty index for each ferry route, so each ferry will be
Show more

7 Read more

A Study on  Risk Aware Mitigation for MANET Routing Attacks

A Study on Risk Aware Mitigation for MANET Routing Attacks

 D. Raman , M. Siva Shankar Reddy , Y. Srinivas Reddy in their paper [5] has taken one of the most amazing network concepts which makes network simpler. By considering the aspect of both side as of good and its related issues like most important and unavoidable is i.e. “Security”. Hence, enhancing the security in wireless networks has become of vital importance. In this perspective of concept, mainly two security aspects of wireless networks have been discussed. One is service confidentiality and access control that is to ensure only legitimate users can access service data according to their privileges and in other perspective is of service attack. Wireless broadcast is a convenient and effective approach for disseminating data to a number of users. User training in computer and network security is crucial to the survival of modern networks, yet
Show more

13 Read more

Definition of Internet of Things (IoT) Cyber Risk – Discussion on a Transformation Roadmap for Standardization of Regulations, Risk Maturity, Strategy Design and Impact Assessment

Definition of Internet of Things (IoT) Cyber Risk – Discussion on a Transformation Roadmap for Standardization of Regulations, Risk Maturity, Strategy Design and Impact Assessment

The CVSS calculator [34], [35] could be used to create a current cyber profile, in addition to the Exostar system [36] for determining the supply chain cyber maturity level, and CMMI [37] the overall current state of cyber maturity. The final gap in the NIST framework is the lack of cyber risk quantitative assessment, which is crucial for making an informed and detailed recommendations for a target cyber profile. The Factor Analysis of Information Risk Institute (FAIR) [38] aims to address this gap in the NIST framework. FAIR Institute adapts existing quantitative models, e.g. RiskLens [39], and Cyber VaR (CyVaR) [40]. In a way, FAIR is complementing the work of NIST and the International Organisation for Standardisation (ISO) [41], which is the international standard-setting body and includes cyber risk standards. Notable for this discussion, only FAIR [38] provides recommendations for quantitative risk estimation. To complete the risk assessment, the cyber risk from supply chains needs to be simplified [31], [42], [43]. To identify a current cyber risk state that includes supply chain cyber risks, the Exostar system [36], can be used for complimenting the CVSS and covering the supply chain aspect of cyber risk. Further analysis, including SWAT and GAP analysis are considered beyond the scope of this conference paper, but can be found in other articles [43]–[47].
Show more

9 Read more

A GIS based approach for Radiation Risk Assessment around a

A GIS based approach for Radiation Risk Assessment around a

203.. This can significantly reduce the risk due to the windblown ash. Based on the landuse and riskmap of the study area two tier. 206[r]

20 Read more

Information Security Risk Assessment — A Practical Approach with a Mathematical Formulation of Risk

Information Security Risk Assessment — A Practical Approach with a Mathematical Formulation of Risk

In general, the safety of SI has several objectives. Safety, then, must protect information such as company assets against data loss, disclosure or alteration to ensure continuity of business operations. This research document could form the basis for a technical project to develop an actual web-based Information Security Risk Management Tool to achieve theses objectives. In the future, this project could then also include the COBIT standard to assist organizations in exactly on ‗what‘ must be done.

7 Read more

Integrated Risk Assessment: Case Study of Lithuanian Family Farms

Integrated Risk Assessment: Case Study of Lithuanian Family Farms

This study is designed to develop the tool for risk assessment under the integrated approach. Several problems are encountered while analyzing risk. The first one arises at the farm level – assessment of risk in the context of whole-farm rather than in a partial context, i.e. an integrated risk assessment tool is necessary. The second problem is related to the dynamic aspect when determining how the risk changes over time and what the main drivers of these changes are. All these problems are solved in the presented research, creating an integrated risk assessment index (IRAI) and testing it in Lithuanian family farms. This index assesses four types of risk: economic, financial, production, and political. The research methodology is developed to make sure that the data collected on the IRAI behavior is as diverse as possible. A model of IRAI variation by farm size illustrating risk evolution at the Lithuanian farms and, at the same time, enabling visual diversification of the dependence of integrated risk on farm size is developed. Hierarchical cluster analysis is applied for identification of the integrated risk evolution models. Assessment of the interaction between the IRAI and output and input using nonparametric Kruskal-Wallis test is used to find out whether the type of integrated risk is based on differential logic. IRAI was tested using official statistical data of 1300 family farms collected in 2004–2013 for institutional purposes. The testing revealed that the designed IRAI allows identifying types of farms by their risk evolvement profiles and the key risk (s) acting on the farm in the historical period. Four meaningful clusters representing the changing pattern of the risk are identified during the testing of IRAI: increasing risk farms; decreasing risk farms; relatively constant risk farms; varying risk farms. IRAI can be applied both for macro analysis (at a national, EU or other levels) and microanalysis (at the level of a single farm).
Show more

9 Read more

‘Nothing Ventured, Nothing Gained’: Risk Guidance for people with dementia

‘Nothing Ventured, Nothing Gained’: Risk Guidance for people with dementia

Dementia is important to us all – as individuals, as professionals and as a society. We know from reports and predictions that the number of people with dementia is set to rise, both because of the ageing of the population and the improved rate of diagnosis. Dementia is a priority for the Coalition Government and the National Dementia Strategy sets out an ambitious, but achievable, agenda for improving the quality of life for people with dementia and their carers. The new landscape of the NHS with a focus on improved outcomes for people living with dementia provides the opportunity to take the work forward. People with dementia and their carers are supported by both health, and care – aligning these services presents a challenge at the same time as giving opportunities to maximise the synergies between them for the benefit of people with dementia and their carers. It is a great pleasure to write a foreword to such an important document as ‘Nothing Ventured, Nothing Gained’. We all face risk in our everyday lives and regularly make judgements, sometimes unconsciously, about risks and benefits for everyday actions. It is a challenge to tread the line between being overprotective (in an attempt to eliminate risk altogether) while respecting individual freedoms. The trick is giving people the opportunity to live life to the full, while at the same time making sure they are properly safeguarded. This guidance provides a very helpful discourse about the issues at stake, presenting a framework for managing risk in a positive and constructive way by enabling and supporting people with dementia and their carers. I should like to congratulate everyone involved in the project in producing such a substantial and helpful document.
Show more

74 Read more

Assessment of PAH contaminated land:implementing a risk based approach

Assessment of PAH contaminated land:implementing a risk based approach

Prediction of polycyclic aromatic hydrocarbon biodegradation in contaminated soils using an aqueous hydroxypropyl-beta-cyclodextrin extraction technique, Environ.. Prediction of PAH biod[r]

36 Read more

Flood Vulnerability Assessment by Applying a Fuzzy Logic Method: A Case Study from Melbourne

Flood Vulnerability Assessment by Applying a Fuzzy Logic Method: A Case Study from Melbourne

Among these three quantifying methods (i.e. HLD approach, VC method and FVI), the FVI is the most widely adopted approach and is also a tool to identify the risks of flood disaster and increase the safety of infrastructure and humans (Albano et. al. 2014). In other words, the FVI is a tool that can assist urban planners and policy makers in prioritizing flood mitigation strategies and in increasing public awareness by providing information such as hotspots for the flood risk, communities vulnerable to floods and so on (Balica et al. 2009). The most important advantage of the FVI method is that it considers not only the hydrological and economic aspects of flood damage, but also the social aspect of damage caused by floods. This method is more complex than the other two approaches defined above, and it has the potential to assess flood vulnerability in a far better way than the other methods. Due to these advantages, the FVI method is the most widely adopted approach in many recent studies (Kumar et al. 2010; Solin 2012; Kumar & Kunte 2012; Balica et al. 2012, Zhang & You 2013; Kunte et al. 2014; Balica et al. 2013).
Show more

96 Read more

How effective are risk assessments/measures for predicting future aggressive behaviour in adults with intellectual disabilities (ID) : a systematic review and meta analysis

How effective are risk assessments/measures for predicting future aggressive behaviour in adults with intellectual disabilities (ID) : a systematic review and meta analysis

The aim of the present study was to provide a systematic review and meta- analysis of existing evidence on the predictive validity of available methods of predicting risk of aggression among individuals with ID. The current study aimed to address limitations in the research evidence so far by: (a) establishing more stringent criteria for ID (e.g., IQ <70) to accurately define the sample, because in ID forensic services there is a clinical need to understand what works most effectively for adults with ID as a distinct group, (b) focusing on aggression only and not sexual offences given the evidence for different risk factors relating to different types of offending (Craig et al., 2013), (c) including only prospective studies considered to be higher quality and thus generating more accurate results, and (d) including a meta-analysis to synthesize findings in a summary statistic that is useful to guide clinical decision- making. Meta-analysis is considered the most robust method of synthesizing from quantitative research studies.
Show more

42 Read more

A Socio Technical Approach to Cyber Risk Management and Impact Assessment

A Socio Technical Approach to Cyber Risk Management and Impact Assessment

of a more social approach to cyber security and safety. The socio-technical systems (STS) have as a main target to blend both the technical and the social systems in an organization. This can be viewed as a necessary condi- tion within a risk management framework as both aspects are of equal importance [3]. We will use stateful models to express the status quo of an organization, i.e. the cur- rent state of the systems, personnel and processes at each discrete moment before and after an event have occurred. This is going to give us a better perspective of the de- pendencies, responsibilities and finally reliabilities that run through the entire hierarchical chain of an organisa- tion. Thus it will allow us to be able to run different threat scenarios and detect the potential vulnerabilities in a corporate network through forward and backward chaining.
Show more

9 Read more

Hereditary cancer risk assessment: essential tools for a better approach

Hereditary cancer risk assessment: essential tools for a better approach

[13] models. All of these models incorporate first- degree relatives with breast cancer along with hormone risk factors, although they may vary in which known breast cancer risk factors are incorporated. There are also some published tools available to assess risks for colon, ovarian, lung and melanoma, but few are validated [32]. However, for prostate cancer, whose familial risk is known to be associated with dozens of low-penetrant vari- ants [33], there is not a genetic model so far. Predictability based on the number of affected relatives, degree of con- sanguinity and also ancestry could be calculated by math- ematical models to estimate empiric risks and possibly guide recommendations for appropriate screening. The undergoing discovery of functional alleles reinforces the need for new models to incorporate them better address cancer risk assessment.
Show more

8 Read more

PubMedCentral-PMC5568635.pdf

PubMedCentral-PMC5568635.pdf

The distribution of key demographics, AOD use, sex behaviors and contraception use, STI and pregnancy test results, and other psychosocial factors are reported in Table 1. There were no significant differences between study arms in the distribution of baseline participant characteristics; however, differences were found in the proposed dependent variables, suggesting that randomization procedures were not completely successful balancing risk behavior. Most young women were 17 or 18 years of age (60.4%), reported ever dropping out of school (60.3%), and were below grade level for their age (65.0%). Nearly 30% had children, and 27% reported ever being homeless. Although 64.6% of participants lived in the same place for the preceding six months, 23.7% had moved one or two times and 11.8% had moved three or more times. Only 18.2% were employed; however, 90.2% reported currently looking for work. About one-third had ever been arrested, 51.9% reported gang affiliation, and 6.3% were a current or past member of a gang (Table 1). Significant differences at baseline between the two groups showed the nutrition group significantly more likely to use a condom at last sex episode (p = .007).
Show more

23 Read more

Risk assessment of spent fuel ponds subject to the risk of flooding

Risk assessment of spent fuel ponds subject to the risk of flooding

A model for the assessment of the risk of exposure of spent nuclear fuel has been proposed. The methodology adopted is based on the enhancement of BNs using structural reliability methods and it has been implemented in the general purpose software OpenCossan. The computational tool obtained allows taking into consideration continuous and uncertain but bounded variables not renouncing to the advantages and robustness of exact inference algorithms, at the cost of a higher, but still acceptable, computational cost. The network proposed has been applied to a real-world case study, in which aleatory and epistemic uncertainty have been represented through the use of probabilistic models and intervals. The results have been briefly discussed, in order to highlight the potential of the model and tool developed.
Show more

10 Read more

Risk Assessment – a human psychology approach

Risk Assessment – a human psychology approach

When attempting to shape the risk profile for implementing a project, aspects related to the plan of the project, the resources of the project, the opportunities and attribution of the personnel within the project, the justification of the costs and benefits of the project, the expertise of the project’s personnel, members of the conso rtium as well as of the beneficiaries, the clarity of the project’s requirements, management techniques adequate for the project are considered. Obviously, not exclusively. When considering the human factor the analysis is usually done through the prism of the following aspects: health and safety at the work place, position held within the project (the risk of dependency on the key personnel), as well as aspects related to the human resources policies. In the model we will be presenting below we try to introduce a new approach, namely the psychological one, for the moment only on the level of the temperamental pattern and personality (Obviously this approach could also analyze aspects related to the person’s abilities, character etc. And for abilities psychology provides us with what is called the test battery for the profession of computer scientist, a complex test structured on five levels – verbal comprehension, reasoning, logical operators, numerical ability and diagrams – meant to reveal the ability level of the individual).
Show more

7 Read more

Nutritional Value and Associated Potentials Risks of Seafood Consumption

Nutritional Value and Associated Potentials Risks of Seafood Consumption

sudden cardiac death, especially when seafood replaces the intake of less healthy foods [21]. Also, Zhao et.al, 2019 concluded that fish consumption was associated with a decreased risk of stroke [22]. The PUFAs particularly concentrate in the nervous system, alter immune system function reduce serum triglyceride levels and have been reported to reduce the risk of sudden death after a myocardial infarction [23]. Several meta-analyses have evaluated the beneficial role of LC ω-3 PUFA supplementation in several mental disorders such as bipolar disorder, schizophrenia, or depression [24]. Yang et.al, 2018 further stated a modest inverse association between fish or omega-3 fatty acid intake and risk of depression, especially in women [25]. Greater consumption of fish is associated with a lower risk of dementia [26]. Weight-loss diet including oily fish resulted in greater TG reduction than did a diet without fish or fish oil [27]. A high intake of fatty seafood increases circulating levels of the insulin- sensitizing hormone adiponectin, whose blood concentration is reduced in obesity and T2DM [28,29]. Increased intake of protein from meats, chicken with skin and regular cheese was associated with weight gain but increased intake of seafood together with peanut butter, walnuts, other nuts, chicken without skin, yogurt and low- fat cheese was associated with weight reduction [30]. A frequent intake of lean seafood, as compared with intake of terrestrial meats, reduces energy intake typically in the range of 4–9% [29]. Bodybuilders traditionally have chosen many types of seafood (scallops, shrimp, crab, haddock, cod, pollack, snapper, halibut and white tuna) as their prime sources of fairly-digesting protein [31,32]. Adding more seafood to the diet could help get couples' sex lives, and even their fertility. Research suggests that seafood intake might affect semen quality, ovulation or embryo quality [33]. Greater male and female seafood intake were associated with a higher sexual intercourse frequency (SIF) and fecundity among a large prospective cohort of couples attempting pregnancy [34]. In the
Show more

9 Read more

Show all 10000 documents...