Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Security context, safety

There are still gaps concerning joint (unified) safety and security analysis, development and maintenance/operation. Therefore, further safety and security standards and approaches used in general in industrial context should be taken into account in the future. Exemplary safety standards are lEC 61508 (Functional Safety) or ISO 13482 (Safety requirements for personal care robots) [7] and security standards, like ISO 15408 (Common Criteria) [2] or the ISO 2700x series (Security Management) . As such, the analysis of appropriate abilities will be extended to cover security and safety requirements in heterogeneous systems. [Pg.299]

The first step of the risk assessment itself is the risk identification (see Figure 21.1, point 2). In this context the PTO representatives need to precisely identify the potential threats and their connected risk scenarios that can have an impact on the PT system. Risks shall be categorized according to their nature, and grouped into the relevant risk families - e.g. security risks, safety risks, environmental risks, etc. (see Figure 21.2). The amount of security levels to be studied depends directly on the level of detail the risk assessment team would like to reach. [Pg.341]

In common language, security is a synonym of safety. In the context of this book, security is devoted to the field of property protection against theft or incursion. [Pg.8]

This chapter provides guidance on developing risk reduetion strategies and highlights the faetors that influence the different types of safety and security measures that ean be seleeted and ultimately implemented. Additionally, given the complexity of a transportation network and aoeeptanee needed among all stakeholders, risk reduetion opportrrrrities shorrld be evalrrated explicitly in the context of the benefits, eomparison to other optiorrs, and the eosts. [Pg.141]

About 35 years later, the Author participated in a project dealing with the design of steel skeleton structures for blast, that is, in the context of infrastructure security. Since the invented connection integrates all beams with the column and, at least partially, contributes to the spatial behavior of the entire steel skeleton structure, it should potentially provide a desired behavior during the blast contributing to the increased safety of a skeleton structure. For this reason, Urgessa and Arciszewski (2011) conducted a comparison study of the behavior of various types of connections in a steel skeleton structure under blast conditions. The Author s connection performed surprisingly well, and its behavior was comparable with a very complicated connection specifically developed for blast-resistant steel skeleton structures. It was the final feasibility proof of the developed connection. [Pg.173]

In the present model, the driver is only used as a precondition to certain transitions (T1 and T2). But CPN could be used for the modeling of human behavior. This is an interesting feature as it places the specification model in its context of use and allows the integration of human influence in safety and security analysis. [Pg.1252]

The students will be given topics/themes related to the subject they have to explore an interesting problem of their choice in the context of the course. Projects can be done individually or in teams of two/three students. The students will be given various themes related to automotive electronics like the realization of control algorithms required for specific automotive applications using MATLAB/Simulink and the implementation of communication protocols automotive sensors emission control systems safety, security, and driver assistance systems etc. The activity involves different phases like the following ... [Pg.443]

The workshop also recognised the relevance of the provisions of Articles X and XI, and that opportunities existed to more fully meet the objectives of these provisions by raising chemical safety and security issues in the context of the OPCW. [Pg.565]

The state of the art that is relevant for the solution approach envisioned by EMC is twofold. On the one hand, there is the research question of safety and security coengineering. And on the other hand, there is the research question of modularizing safety and security in an adequate way to enable runtime certification in the context of... [Pg.182]

Maintaining Security Level during Operations (includes Maintenance, Change Management and Incident Handling), Disaster Recovery and Business Continuity Planning). This is a critical issue in context of safety certification Security outlives rather quick its life time, so frequent updates are necessary - quite opposite to what safety people want, to avoid re-assessment and re-certification ... [Pg.185]

This generic PCSR is the top-tier document within the safety submission the suite of documents that have been produced for the GDA of die APIOOO, which collectively justify the safety, security, and environmental impact of the APIOOO in a UK context. [Pg.30]

With that said we have seen a growing number of scientific studies on safety culture, which aimed to characterize the concept and to define the dimensions that allow the evaluation. In this context, we emphasize the study of Femandez-Muniz, Montes-Peon and V quez-Oidas (2007). This study based on key publications on safety culture and an integrative perspective defined the concept as a set of values, perceptions, attitudes and behavioural patterns related to security and shared by members of an organization. In this conceptualization it is also integrated a set of policies and practices relating to the management of exposure to occupational hazards, implemented at each level of organization procedures. [Pg.360]

Technology assessment (Westrum 1991) aims considering the potential consequences of new technological system. Several methods and tools exist to support such assessment. In the context of safety and security, brainstorming, expert groups and traditional risk assessment methods such as FMECA (Failure Mode, Effects and Criticality Analysis) are often used with the purpose of identifying potential risks related to the adoption of a new technology. [Pg.1011]

On the one hand, risk can be traced back etymologically to riza (Greek = root, basis) see also rise (Arabic = destiny). On the other hand, risk can be referred to ris(i)co (Italian) The cliff, which has to be circumnavigated . Safety derives from Latin and could be translated as free from worry (se cura = without worry). Today, the topic of safety is viewed in various different contexts for example, in regards to economic safety, environmental safety, admittance and access security but also in terms of work safety, plant and machinery safety and vehicle safety. The term safety varies significantly from just only functional safety. [Pg.9]


See other pages where Security context, safety is mentioned: [Pg.1]    [Pg.413]    [Pg.69]    [Pg.678]    [Pg.701]    [Pg.262]    [Pg.125]    [Pg.545]    [Pg.348]    [Pg.117]    [Pg.38]    [Pg.151]    [Pg.353]    [Pg.361]    [Pg.50]    [Pg.114]    [Pg.17]    [Pg.21]    [Pg.97]    [Pg.101]    [Pg.157]    [Pg.173]    [Pg.18]    [Pg.15]    [Pg.340]    [Pg.180]    [Pg.183]    [Pg.186]    [Pg.296]    [Pg.359]    [Pg.1027]    [Pg.78]    [Pg.336]    [Pg.246]    [Pg.327]    [Pg.191]   
See also in sourсe #XX -- [ Pg.413 ]




SEARCH



Securing Safety

© 2024 chempedia.info