Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Consequences vulnerability

Following this prioritization process or a similar one, a transportation system can be evaluated to identify those issues that need to be escalated to a more detailed TSVA to better understand the potential consequences, vulnerabilities, and level of risk, or to compare potential security countermeasures. [Pg.122]

A TSVA can be designed to analyze security risk from a wide range of threats, from vandalism to terrorism. In theory, risk is a function of the consequence and likelihood of the range of credible transportation threat scenarios. For accidental risk analyses, consequence and likelihood are evaluated directly, but in secmity analyses, likelihood is evaluated as a function of vulnerability and threat. Therefore, security risk is defined as a measure of the consequences, vulnerabilities, and threats ... [Pg.122]

Analysis Guidelines—for consistency with other facilities, corporate provided the consequence, vulnerability (the likelihood of attack success), evaluation criteria, and risk matrix... [Pg.135]

Perhaps the key to detcrnuiiiiig die consequences of an accident is die study of accident mininiization/prcvendon. This topic receives extensive treatment in Section 17.2. The estimation (not calculadon) of consequences is treated in Section 17.3, which is followed by evacuation procedures (Section 17.4). The next section e.xaniiiies failure modes, effects and critical analysis (FMECA). The cluipter concludes with vulnerability analysis (Section 17.6) and event tree analysis (Section 17.7). [Pg.484]

The first step in minimizing accidents in a chemical phuit is to evaluate the facility for potential fires, explosions, and vulnerability to other liazards, particularly those of a chemical miture. This calls for a detailed study of plant site and layout, materials, processes, operations, equipment, and training, plus an effective loss prevention program. The technical nature of industry requires detailed data and a broad range of experience. Tliis complex task, today becoming the most important in plant design, is facilitated by the safety codes, standiu ds, and practice information available. The technical approach to evaluating die consequences of hazards is discussed later in tliis cliapter and in Part V (Chapters 20 and 21). [Pg.484]

Risk analysis is an assessment of tlie likelihood (probability) of an accidental release of a hazardous material and tlie actual consequences that might occur, based on tlie estimated vulnerable zones. The risk analysis is a judgment of probability and severity of consequences based on tlie history of previous incidents, local experience, and tlie best available current technological information. It provides an estimation of ... [Pg.513]

The sociopolitical consequences of increased commitment to nuclear technologies which represent only 5 percent of world energy, raises questions of democratic decision-making to safeguard the environment and health and safety of the general public (Holdren, 1976). Some ask if it is worth the price. Research on the social and political implications identifies the crucial contrast between vulnerable and nonvulnerable technologies, and between technological waste and social waste. [Pg.314]

Andersen et al. predicted that similar results would be expected for the corrosion of other multivalent metals oxidizing via lower oxidation states. They also pointed out that their interpretation was consistent with the kinetics of the corrosion of copper in oxygenated HCl solutions. Here the final product is Cu and thus there is no vulnerable intermediate. In consequence, the rate of copper dissolution from either Nj-saturated or 02-saturated HCl solutions was the same at a given potential in conformity with the additivity principle. [Pg.5]

The argument is often made that African Americans and other ethnic minorities do not participate in clinical trials because they do not want to. African Americans in particular were thought to be suspicious of participation because of previous experiences of exploitation and manhandling of vulnerable minority groups (Melfi et al, 2000 Corbie-Smith et al, 1999). The Tusgekee syphilis study is often cited as a reason for mistrust (Shavers et al, 2000 Shavers et al, 2002 Corbie-Smith et al, 1999). This study was a federally funded study of the long-term consequences of syphilis on African American men initially started before antibiotics were available. [Pg.114]

The concentration of nickel in natural waters is so low that one or two enrichment steps are necessary before instrumental analysis. The most common method is graphite furnace atomic absorption after preconcentration by solvent extraction [122] or coprecipitation [518]. Even though this technique has been used successfully for the nickel analyses of seawater [519,520] it is vulnerable to contamination as a consequence of the several manipulation steps and of the many reagents used during preconcentration. [Pg.207]

The evident biological changes related to menopause elicit a feeling of vulnerability in women that makes them more receptive to measures aimed at detecting or preventing risk situations and, consequently, improving health status and life expectancy. This opens an opportunity window that must be used to enhance the introduction of a new lifestyle and reinforce the acceptance of pharmacological preventive measures when needed. [Pg.342]

In order to gain insight into the consequences of the choice of a certain model and limits, one could perform critical load calculations with different models (complex dynamic models versus simple steady-state models) using various limits and compare the results. In this way, one also gets insight into (i) the differences in vulnerability of the various environmental compartments and related organisms and (ii) the relevance of the different processes in the systems and of the different ways of parameterizing certain processes. [Pg.69]

The main failure of equipment is a loss of process containment. The consequences depend on the properties and the amount of the leaking material and the conditions both inside and outside of process equipment. Pumps and compressors (Marshall, 1987) are perhaps the most vulnerable items of pressurised systems, because they contain moving parts and they are also subject to erosion and cavitation. Pumps and compressors produce also vibration, which may lead to fatigue failure. Both seals and bearings of pumps and compressors are liable to failure. In addition agitator systems present difficulties due to mechanical stresses, though they operate at much lower speeds than pumps. [Pg.73]

Some people may be emotionally vulnerable and may use drugs to control the experience of emotions, but using often causes consequences that can lead to increased emotional vulnerability. [Pg.32]

Countermeasures An action taken or a physical capability provided whose principal purpose is to reduce or eliminate one or more vulnerabilities. The countermeasure may also affect the threat(s) (intent and/or capability) as well as the asset s value. The cost of a countermeasure may be monetary, but may also include nonmonetary costs such as reduced operational effectiveness, adverse publicity, unfavorable working conditions, and political consequences. [Pg.105]

Risk assessment Risk (R) assessment is the process of determining the likelihood of an adversary (T) successfully exploiting vulnerability (V) and the resulting degree of consequences (C) on an asset. A risk assessment provides the basis for rank-ordering risks and thus establishing priorities for the application of countermeasures. [Pg.105]

A chemical engineer may have a choice of inherent safety variables, such as quantity stored or process temperatures and pressures, or process safety measures such as emergency isolation valves or containment systems, all of which may greatly reduce the vulnerabilities or the consequences of intentional loss. These are in addition to traditional security measures, which may include physical security, background checks, administrative controls, access controls, or other protective measures. For a more complete discussion of the options, refer to the AIChE Center for Chemical Process Safety Guidelines for Analyzing and Managing the Security Vulnerabilities of Fixed Chemical Sites and other references.f... [Pg.106]

Security Vulnerability Assessment A security vulnerability assessment is intended to identify security vulnerabilities from a wide range of threats ranging from vandalism to terrorism. With the recognition of threats, consequences, and vulnerabilities, the risk of security events can be evaluated, and a security management system can be organized that will effectively mitigate those risks. [Pg.106]


See other pages where Consequences vulnerability is mentioned: [Pg.320]    [Pg.113]    [Pg.654]    [Pg.277]    [Pg.320]    [Pg.113]    [Pg.654]    [Pg.277]    [Pg.238]    [Pg.242]    [Pg.108]    [Pg.357]    [Pg.149]    [Pg.165]    [Pg.165]    [Pg.861]    [Pg.52]    [Pg.18]    [Pg.215]    [Pg.222]    [Pg.179]    [Pg.3]    [Pg.134]    [Pg.76]    [Pg.453]    [Pg.159]    [Pg.562]    [Pg.875]    [Pg.911]    [Pg.1179]    [Pg.1297]    [Pg.83]    [Pg.412]    [Pg.30]    [Pg.33]    [Pg.154]   
See also in sourсe #XX -- [ Pg.35 , Pg.35 ]




SEARCH



Vulnerability

© 2024 chempedia.info