121 resultados para security risk analysis


Relevância:

100.00% 100.00%

Publicador:

Relevância:

100.00% 100.00%

Publicador:

Relevância:

100.00% 100.00%

Publicador:

Resumo:

An examination of Information Security (IS) and Information Security Management (ISM) research in Saudi Arabia has shown the need for more rigorous studies focusing on the implementation and adoption processes involved with IS culture and practices. Overall, there is a lack of academic and professional literature about ISM and more specifically IS culture in Saudi Arabia. Therefore, the overall aim of this paper is to identify issues and factors that assist the implementation and the adoption of IS culture and practices within the Saudi environment. The goal of this paper is to identify the important conditions for creating an information security culture in Saudi Arabian organizations. We plan to use this framework to investigate whether security culture has emerged into practices in Saudi Arabian organizations.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The finite element (FE) analysis is an effective method to study the strength and predict the fracture risk of endodontically-treated teeth. This paper presents a rapid method developed to generate a comprehensive tooth FE model using data retrieved from micro-computed tomography (μCT). With this method, the inhomogeneity of material properties of teeth was included into the model without dividing the tooth model into different regions. The material properties of the tooth were assumed to be related to the mineral density. The fracture risk at different tooth portions was assessed for root canal treatments. The micro-CT images of a tooth were processed by a Matlab software programme and the CT numbers were retrieved. The tooth contours were obtained with thresholding segmentation using Amira. The inner and outer surfaces of the tooth were imported into Solidworks and a three-dimensional (3D) tooth model was constructed. An assembly of the tooth model with the periodontal ligament (PDL) layer and surrounding bone was imported into ABAQUS. The material properties of the tooth were calculated from the retrieved CT numbers via ABAQUS user's subroutines. Three root canal geometries (original and two enlargements) were investigated. The proposed method in this study can generate detailed 3D finite element models of a tooth with different root canal enlargements and filling materials, and would be very useful for the assessment of the fracture risk at different tooth portions after root canal treatments.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The advanced programmatic risk analysis and management model (APRAM) is one of the recently developed methods that can be used for risk analysis and management purposes considering schedule, cost, and quality risks simultaneously. However, this model considers those failure risks that occur only over the design and construction phases of a project’s life cycle. While it can be sufficient for some projects for which the required cost during the operating life is much less than the budget required over the construction period, it should be modified in relation to infrastructure projects because the associated costs during the operating life cycle are significant. In this paper, a modified APRAM is proposed, which can consider potential risks that might occur over the entire life cycle of the project, including technical and managerial failure risks. Therefore, the modified model can be used as an efficient decision-support tool for construction managers in the housing industry in which various alternatives might be technically available. The modified method is demonstrated by using a real building project, and this demonstration shows that it can be employed efficiently by construction managers. The Delphi method was applied in order to figure out the failure events and their associated probabilities. The results show that although the initial cost of a cold-formed steel structural system is higher than a conventional construction system, the former’s failure cost is much lower than the latter’s

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Healthy governance systems are key to delivering sound environmental management outcomes from global to local scales. There are, however, surprisingly few risk assessment methods that can pinpoint those domains and sub-domains within governance systems that are most likely to influence good environmental outcomes at any particular scale, or those if absent or dysfunctional, most likely to prevent effective environmental management. This paper proposes a new risk assessment method for analysing governance systems. This method is then tested through its preliminary application to a significant real-world context: governance as it relates to the health of Australia's Great Barrier Reef (GBR). The GBR exists at a supra-regional scale along most of the north eastern coast of Australia. Brodie et al (2012 Mar. Pollut. Bull. 65 81-100) have recently reviewed the state and trend of the health of the GBR, finding that overall trends remain of significant concern. At the same time, official international concern over the governance of the reef has recently been signalled globally by the International Union for the Conservation of Nature (IUCN). These environmental and political contexts make the GBR an ideal candidate for use in testing and reviewing the application of improved tools for governance risk assessment. © 2013 IOP Publishing Ltd.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Public concern about the safety of many forms of industrial technology are known to be linked to a range of factors including a perceived lack of confidence in regulatory decision making.1 The use of transgenic plants in agriculture may be seen as an issue that could generate similar concern. Criticism has been made about the completeness of knowledge on the potential for aberrant behaviour of genetically manipulated organisms (GMO's) in release environments, and the adequacy of existing pre­‐release screening and assessment methodologies (Goldberg & Tjaden, 1990). Such comments are important because any perceived shortcomings in the pre-release assessment of GMO safety may lead to decreased public support of the technology -­‐and the industry itself...

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Security protocols are designed in order to provide security properties (goals). They achieve their goals using cryptographic primitives such as key agreement or hash functions. Security analysis tools are used in order to verify whether a security protocol achieves its goals or not. The analysed property by specific purpose tools are predefined properties such as secrecy (confidentiality), authentication or non-repudiation. There are security goals that are defined by the user in systems with security requirements. Analysis of these properties is possible with general purpose analysis tools such as coloured petri nets (CPN). This research analyses two security properties that are defined in a protocol that is based on trusted platform module (TPM). The analysed protocol is proposed by Delaune to use TPM capabilities and secrets in order to open only one secret from two submitted secrets to a recipient

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Poor mine water management can lead to corporate, environmental and social risks. These risks become more pronounced as mining operations move into areas of water scarcity and/or increase climatic variability while also managing increased demand, lower ore grades and increased strip ratios. Therefore, it is vital that mine sites better understand these risks in order to implement management practices to address them. Systems models provide an effective approach to understand complex networks, particularly across multiple scales. Previous work has represented mine water interactions using systems model on a mine site scale. Here, we expand on that work by present an integrated tool that uses a systems modeling approach to represent mine water interactions on a site and regional scale and then analyses the risks associated with events stemming from those interactions. A case study is presented to represent three indicative corporate, environmental and social risks associated with a mine site that exists in a water scarce region. The tool is generic and flexible, and can be used in many scenarios to provide significant potential utility to the mining industry.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In parts of the Indo-Pacific, large-scale exploitation of the green turtle Chelonia mydas continues to pose a serious threat to the persistence of this species; yet very few studies have assessed the pattern and extent of the impact of such harvests. We used demographic and genetic data in an age-based model to investigate the viability of an exploited green turtle stock from Aru, south-east Indonesia. We found that populations are decreasing under current exploitation pressures. The effects of increasingly severe exploitation activities at foraging and nesting habitat varied depending on the migratory patterns of the stock. Our model predicted a rapid decline of the Aru stock in Indonesia under local exploitation pressure and a shift in the genetic composition of the stock. We used the model to investigate the influence of different types of conservation actions on the persistence of the Aru stock. The results show that local management actions such as nest protection and reducing harvests of adult nesting and foraging turtles can have considerable conservation outcomes and result in the long-term persistence of genetically distinct management units. © 2010 The Authors. Animal Conservation © 2010 The Zoological Society of London.