46 resultados para Safety ownership


Relevância:

20.00% 20.00%

Publicador:

Resumo:

A new Dam Safety Act (494/2009) came into force on 1st October 2009 and a Government Decree on Dam Safety (319/2010) on 5th May 2010. This Dam Safety Guide replaces the Dam Safety Code of Practice (Publication of the Ministry of Agriculture and Forestry 7/1997), removed from circulation on 1st October 2009. The Dam Safety Guide is not binding on the dam owner; the purpose is to complement and elucidate the relevant law and and decree through examples and descriptions. The Guide takes up questions concerning dam design, for instance hydrological dimensioning and technical safety requirements, dam construction and use, the dam break hazard analysis and the dam owner’s emergency action plan, maintenance, use, monitoring as well as the annual and periodic inspections. Dams are classified according to the hazard they pose into class 1, 2 or 3 dams. The classification is not needed, if, according to the dam safety authority, the dam poses no danger. The owner of a classified dam must prepare a monitoring programme, to be approved by decision of the dam safety authority. To establish the hazard caused by a dam, the owner of a class 1 dam must prepare an analysis of the dam hazard to humans and property as well as to the environment. The dam safety authority may also require a dam break hazard analysis for a dam other than class 1 dam if deemed necessary for classification. The owner of a class 1 dam must prepare a plan of measures in case of emergency or operational failure. The plan shall present the dam owner’s state of preparedness to act on their own initiative in the situations described above. In each case, the rescue authorities make a separate assessment for the need to prepare a plan as set out in the Rescue Act. The dam owner must provide the information specified in the Dam Safety Decree to be entered into the dam safety information system. The dam safety authority and the owner of the dam must keep up-to-date printouts in their own dam safety files from the information system for each dam as well as other important documents connected with dam safety to ensure that these are readily available in case of disturbance.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Extant research on exchange-listed firms has acknowledged that the concentration of ownership and the identity of owners make a difference. In addition, studies indicate that firms with a dominant owner outperform firms with dispersed ownership. During the last few years, scholars have identified one group of owners, in particular, whose ownership stake in publicly listed firm is positively related to performance: the business family. While acknowledging that family firms represent a unique organizational form, scholars have identified various concepts and theories in order to understand how the family influences organizational processes and firm performance. Despite multitude of research, scholars have not been able to present clear results on how firm performance is actually impacted by the family. In other words, studies comparing the performance of listed family and other types of firms have remained descriptive in nature since they lack empirical data and confirmation from the family business representatives. What seems to be missing is a convincing theory that links the involvement and behavioral consequences. Accordingly, scholars have not yet come to a mutual understanding of what precisely constitutes a family business. The variety of different definitions and theories has made comparability of different results difficult for instance. These two issues have hampered the development of a rigorous theory of family business. The overall objective of this study is to describe and understand how the family as a dominant owner can enhance firm performance, and can act a source of sustainable success in listed companies. In more detail, in order to develop understanding of the unique factors that can act as competitive advantages for listed family firms, this study is based on a qualitative approach and aims at theory development, not theory verification. The data in this study consist of 16 thematic interviews with CEOs, members of the board, supervisory board chairs, and founders of Finnish listed-family firms. The study consists of two parts. The first part introduces the research topic, research paradigm, methods, and publications, and also discusses the overall outcomes and contributions of the publications. The second part consists of four publications that address the research questions from different viewpoints. The analyses of this study indicate that family ownership in listed companies represents a structure that differs from the traditional views of agency and stewardship, as well as from resource-based and stakeholder views. As opposed to these theories and shareholder capitalism which consider humans as individualistic, opportunistic, and self-serving, and assume that the behaviors of an investor are based on the incentives and motivations to maximize private profits, the family owners form a collective social unit that is motivated to act together toward their mutual purpose or benefit. In addition, socio-emotional and psychological elements of ownership define the family members as owners, rather than the legal and financial dimensions of ownership. That is, collective psychological ownership of family over the business (F-CPO) can be seen as a construct that comprehensively captures the fusion between the family and the business. Moreover, it captures the realized, rather than merely potential, family influence on and interaction with the business, and thereby brings more theoretical clarity of the nature of the fusion between the family and the business, and offers a solution to the problem of family business definition. This doctoral dissertation provides academics, policy-makers, family business practitioners, and the society at large with many implications considering family and business relationships.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Nowadays, computer-based systems tend to become more complex and control increasingly critical functions affecting different areas of human activities. Failures of such systems might result in loss of human lives as well as significant damage to the environment. Therefore, their safety needs to be ensured. However, the development of safety-critical systems is not a trivial exercise. Hence, to preclude design faults and guarantee the desired behaviour, different industrial standards prescribe the use of rigorous techniques for development and verification of such systems. The more critical the system is, the more rigorous approach should be undertaken. To ensure safety of a critical computer-based system, satisfaction of the safety requirements imposed on this system should be demonstrated. This task involves a number of activities. In particular, a set of the safety requirements is usually derived by conducting various safety analysis techniques. Strong assurance that the system satisfies the safety requirements can be provided by formal methods, i.e., mathematically-based techniques. At the same time, the evidence that the system under consideration meets the imposed safety requirements might be demonstrated by constructing safety cases. However, the overall safety assurance process of critical computerbased systems remains insufficiently defined due to the following reasons. Firstly, there are semantic differences between safety requirements and formal models. Informally represented safety requirements should be translated into the underlying formal language to enable further veri cation. Secondly, the development of formal models of complex systems can be labour-intensive and time consuming. Thirdly, there are only a few well-defined methods for integration of formal verification results into safety cases. This thesis proposes an integrated approach to the rigorous development and verification of safety-critical systems that (1) facilitates elicitation of safety requirements and their incorporation into formal models, (2) simplifies formal modelling and verification by proposing specification and refinement patterns, and (3) assists in the construction of safety cases from the artefacts generated by formal reasoning. Our chosen formal framework is Event-B. It allows us to tackle the complexity of safety-critical systems as well as to structure safety requirements by applying abstraction and stepwise refinement. The Rodin platform, a tool supporting Event-B, assists in automatic model transformations and proof-based verification of the desired system properties. The proposed approach has been validated by several case studies from different application domains.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

University of Turku, Faculty of Medicine, Department of Cardiology and Cardiovascular Medicine, Doctoral Programme of Clinical Investigation, Heart Center, Turku University Hospital, Turku, Finland Division of Internal Medicine, Department of Cardiology, Seinäjoki Central Hospital, Seinäjoki, Finland Heart Center, Satakunta Central Hospital, Pori, Finland Annales Universitatis Turkuensis Painosalama Oy, Turku, Finland 2015 Antithrombotic therapy during and after coronary procedures always entails the challenging establishment of a balance between bleeding and thrombotic complications. It has been generally recommended to patients on long-term warfarin therapy to discontinue warfarin a few days prior to elective coronary angiography or intervention to prevent bleeding complications. Bridging therapy with heparin is recommended for patients at an increased risk of thromboembolism who require the interruption of anticoagulation for elective surgery or an invasive procedure. In study I, consecutive patients on warfarin therapy referred for diagnostic coronary angiography were compared to control patients with a similar disease presentation without warfarin. The strategy of performing coronary angiography during uninterrupted therapeutic warfarin anticoagulation appeared to be a relatively safe alternative to bridging therapy, if the international normalized ratio level was not on a supratherapeutic level. In-stent restenosis remains an important reason for failure of long-term success after a percutaneous coronary intervention (PCI). Drug-eluting stents (DES) reduce the problem of restenosis inherent to bare metal stents (BMS). However, a longer delay in arterial healing may extend the risk of stent thrombosis (ST) far beyond 30 days after the DES implantation. Early discontinuation of antiplatelet therapy has been the most important predisposing factor for ST. In study II, patients on long-term oral anticoagulant (OAC) underwent DES or BMS stenting with a median of 3.5 years’follow-up. The selective use of DESs with a short triple therapy seemed to be safe in OAC patients, since late STs were rare even without long clopidogrel treatment. Major bleeding and cardiac events were common in this patient group irrespective of stent type. In order to help to predict the bleeding risk in patients on OAC, several different bleeding risk scorings have been developed. Risk scoring systems have also been used also in the setting of patients undergoing a PCI. In study III, the predictive value of an outpatient bleeding risk index (OBRI) to identify patients at high risk of bleeding was analysed. The bleeding risk seemed not to modify periprocedural or long-term treatment choices in patients on OAC after a percutaneous coronary intervention. Patients with a high OBRI often had major bleeding episodes, and the OBRI may be suitable for risk evaluation in this patient group. Optical coherence tomography (OCT) is a novel technology for imaging intravascular coronary arteries. OCT is a light-based imaging modality that enables a 12–18 µm tissue axial resolution to visualize plaques in the vessel, possible dissections and thrombi as well as, stent strut appositions and coverage, and to measure the vessel lumen and lesions. In study IV, 30 days after titanium-nitride-oxide (TITANOX)-coated stent implantation, the binary stent strut coverage was satisfactory and the prevalence of malapposed struts was low as evaluated by OCT. Long-term clinical events in patients treated with (TITANOX)-coated bio-active stents (BAS) and paclitaxel-eluting stents (PES) in routine clinical practice were examined in study V. At the 3-year follow-up, BAS resulted in better long-term outcome when compared with PES with an infrequent need for target vessel revascularization. Keywords: anticoagulation, restenosis, thrombosis, bleeding, optical coherence tomography, titanium

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Today, renewable energy technologies and modern power electronics have made it feasible to implement low voltage direct current (LVDC) microgrids (MGs) ca-pable to island operation. Such LVDC networks are particularly useful in remote areas. However, there are still pending issues in island operated LVDC MGs like electrical safety and controlled operation, which should be addressed before wide-scale implementation. This thesis is focused on the overall protection of an island operated LVDC network concept, including protection against electrical shocks, mains equipment protection and protection of photovoltaic (PV) power sources and battery energy storage systems (BESSs). The topic is approached through ex-amination of the safety hazards and the appropriate methods to protect against them, comprising considerations for earthing system selection and realisation of the protection system.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The increased awareness and evolved consumer habits have set more demanding standards for the quality and safety control of food products. The production of foodstuffs which fulfill these standards can be hampered by different low-molecular weight contaminants. Such compounds can consist of, for example residues of antibiotics in animal use or mycotoxins. The extremely small size of the compounds has hindered the development of analytical methods suitable for routine use, and the methods currently in use require expensive instrumentation and qualified personnel to operate them. There is a need for new, cost-efficient and simple assay concepts which can be used for field testing and are capable of processing large sample quantities rapidly. Immunoassays have been considered as the golden standard for such rapid on-site screening methods. The introduction of directed antibody engineering and in vitro display technologies has facilitated the development of novel antibody based methods for the detection of low-molecular weight food contaminants. The primary aim of this study was to generate and engineer antibodies against low-molecular weight compounds found in various foodstuffs. The three antigen groups selected as targets of antibody development cause food safety and quality defects in wide range of products: 1) fluoroquinolones: a family of synthetic broad-spectrum antibacterial drugs used to treat wide range of human and animal infections, 2) deoxynivalenol: type B trichothecene mycotoxin, a widely recognized problem for crops and animal feeds globally, and 3) skatole, or 3-methyindole is one of the two compounds responsible for boar taint, found in the meat of monogastric animals. This study describes the generation and engineering of antibodies with versatile binding properties against low-molecular weight food contaminants, and the consecutive development of immunoassays for the detection of the respective compounds.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Patient information systems are crucial components for the modern healthcare and medicine. It is obvious that without them the healthcare cannot function properly – one can try to imagine how brain surgery could be done without using information systems to gather and show information needed for an operation. Thus, it can be stated that digital information is irremovable part of modern healthcare. However, the legal ownership of patient information lacks a coherent and justified basis. The whole issue itself is actually bypassed by controlling pa- tient information with different laws and regulations how patient information can be used and by whom. Nonetheless, the issue itself – who owns the patient in- formation – is commonly missed or bypassed. This dissertation show the problems if the legislation of patient information ownership is not clear. Without clear legislation, the outcome can be unexpected like it seems to be in Finland, Sweden and United Kingdom: the lack of clear regulation has come up with unwanted consequences because of problematic Eu- ropean Union database directive implementation in those countries. The legal ownership is actually granted to the creators of databases which contains the pa- tient information, and this is not a desirable situation. In healthcare and medicine, we are dealing with issues such as life, health and information which are very sensitive and in many cases very personal. Thus, this dissertation leans on four philosophical theories form Locke, Kant, Heidegger and Rawls to have an ethically justified basis for regulating the patient infor- mation in a proper way. Because of the problems of property and ownership in the context of information, a new concept is needed and presented to replace the concept of owning, that concept being Datenherrschaft (eng. mastery over in- formation). Datenherrschaft seems to be suitable for regulating patient infor- mation because its core is the protection of one’s right over information and this aligns with the work of the philosophers whose theories are used in the work. The philosophical argumentation of this study shows that Datenherrschaft granted to the patients is ethically acceptable. It supports the view that patient should be controlling the patient information about themselves unless there are such specific circumstance that justifies the authorities to use patient information to protect other people’s basic rights. Thus, if the patients would be legally grant- ed Datenherrschaft over patient information we would endorse patients as indi- viduals who have their own and personal experience of their own life and have a strong stance against any unjustified paternalism in healthcare. Keywords: patient information, ownership, Datenherrschaft, ethics, Locke, Kant, Heidegger, Rawls

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Finnish legislation requires for a safe and secure learning environment. However, the comprehensive, risk based safety and security management (SSM) and the management commitment in the implementation and development of the SSM are not mentioned in the legislation. Multiple institutions, operators and researchers have studied and developed safety and security in educational institutions over the past decade. Typically the approach has been fragmented and without bringing up the importance of the comprehensive SSM. The development needs of the safety and security operations in universities have been studied. However, in universities of applied sciences (UASs) and in elementary schools (ESs), the performance level, strengths and weaknesses of the comprehensive SSM have not been studied. The objective of this study was to develop the comprehensive, risk based SSM of educational institutions by developing the new Asteri consultative auditing process and study its effects on auditees. Furthermore, the performance level in the comprehensive SSM in UASs and ESs were studied using Asteri and the TUTOR model developed by the Keski-Uusimaa Department for Rescue Services. In addition, strengths, development needs and differences were identified. In total, 76 educational institutions were audited between the years 2011 and 2014. The study is based on logical empiricism, and an observational applied research design was used. Auditing, observation and an electronic survey were used for data collection. Statistical analysis was used to analyze the collected information. In addition, thematic analysis was used to analyze the development areas of the organizations mentioned by the respondents in the survey. As one of the main contributions, this research presents the new Asteri consultative auditing process. Organizations with low performance levels on the audited subject benefit the most from the Asteri consultative auditing process. Asteri may be usable in many different types of audits, not only in SSM audits. As a new result, this study provides new knowledge on attitudes related to auditing. According to the research findings, auditing may generate negative attitudes and the auditor should take them into account when planning and preparing for audits. Negative attitudes can be compensated by producing added value, objectivity and positivity for the audit and, thus, improve the positive effects of auditing on knowledge and skills. Moreover, as the results of this study shows, auditing safety and security issues do not increase feelings of insecurity, but rather increase feelings of safety and security when using the new Asteri consultative auditing process with the TUTOR model. The results showed that the SSM in the audited UASs was statistically significantly more advanced than that in the audited ESs. However, there is still room for improvement in the ESs and the UASs as the approach to the SSM was fragmented. It can be assumed that the majority of Finnish UASs and ESs do not likely meet the basic level of the comprehensive, risk based the SSM.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of this master’s thesis is to gain an understanding of passive safety systems’ role in modern nuclear reactors projects and to research the failure modes of passive decay heat removal safety systems which use phenomenon of natural circulation. Another purpose is to identify the main physical principles and phenomena which are used to establish passive safety tools in nuclear power plants. The work describes passive decay heat removal systems used in AES-2006 project and focuses on the behavior of SPOT PG system. The descriptions of the main large-scale research facilities of the passive safety systems of the AES-2006 power plant are also included. The work contains the calculations of the SPOT PG system, which was modeled with thermal-hydraulic system code TRACE. The dimensions of the calculation model are set according to the dimensions of the real SPOT PG system. In these calculations three parameters are investigated as a function of decay heat power: the pressure of the system, the natural circulation mass flow rate around the closed loop, and the level of liquid in the downcomer. The purpose of the calculations is to test the ability of the SPOT PG system to remove the decay heat from the primary side of the nuclear reactor in case of failure of one, two, or three loops out of four. The calculations show that three loops of the SPOT PG system have adequate capacity to provide the necessary level of safety. In conclusion, the work supports the view that passive systems could be widely spread in modern nuclear projects.