• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 5
  • 4
  • 4
  • 4
  • 2
  • 2
  • 1
  • Tagged with
  • 21
  • 21
  • 6
  • 6
  • 6
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

New trends for conducting hazard & operability (HAZOP) studies in continuous chemical processes

Dunjó Denti, Jordi 18 February 2010 (has links)
Identifying hazards is fundamental for ensuring the safe design and operation of a system in process plants and other facilities. Several techniques are available to identify hazardous situations, all of which require their rigorous, thorough, and systematic application by a multi-disciplinary team of experts. Success rests upon first identifying and subsequently analyzing possible scenarios that can cause accidents with different degrees of severity. While hazard identification may be the most important stage for risk management, it depends on subjectivity issues (e.g., human observation, good judgment and intuition, creativity, expertise, knowledge) which introduce bias. Without a structured identification system, hazards can be overlooked, thus entailing incomplete risk-evaluations and potential loss. The present Thesis is focused on developing both managerial and technical aspects intended to standardize one of the most used techniques for hazard identification; viz. HAZard & Operability (HAZOP) study. These criteria have been carefully implemented not only to ensure that most of the hazardous scenarios will be identified, but also that US OSHA PSM Rule, EPA RMP, and Seveso Directive requirements will be accomplished. Chapter I pioneers the main research topic; from introducing the process safety concept up to the evidence of more detailed information is required from related regulations. A review of regulations (i.e., US, Europe legislation) focused on Hazard Identification has been conducted, highlighting, there is an absence of specific criteria for performing techniques intended to identify what can go wrong. Chapter II introduces the risk management system required to analyze the risk from chemical process facilities, and justifies that hazard identification stage is the Process Safety foundation. Hereafter, an overview of the key Process Hazard Analyzes (PHA) has been conducted, and the specific HAZOP weaknesses and strengths have been highlighted to establish the first steps to focus on. Chapter III establishes the scope, the purpose and the specific objectives that the research covers. It answers the following questions on the spot: why the present research is performed, which elements are included, and what has been considered for acquiring the final conclusions of the manuscript. Chapter IV gathers HAZOP-related literature from books, guidelines, standards, major journals, and conference proceedings with the purpose of classifying the research conducted over the years and finally define the HAZOP state-of-the-art. Additionally, and according to the information collected, the current HAZOP limitations have been emphasized, and thus, the research needs that should be considered for the HAZOP improvement and advance. Chapter V analyzes the data collected while preparing, organizing, executing and writing HAZOPs in five petroleum-refining processes. A statistical analysis has been performed to extract guidance and conclusions to support the established criteria to conduct effectively HAZOP studies. Chapter VI establishes the whole set of actions that have to be taken into account for ensuring a wellplanned and executed HAZOP study. Both technical and management issues are addressed, criteria supported after considering the previous chapters of the manuscript. Chapter VI itself is the result of the present research, and could be used as a guideline not only for team leaders, but also for any related party interested on performing HAZOPs in continuous chemical processes. Chapter VII states the final conclusions of the research. The interested parties should be released about the hazard identification related-gaps present in current process safety regulations; which are the key limitations of the HAZOP study, and finally, which are the criteria to cover the research needs that have been found Annex I proposes the key tools (tables, figures and checklists "ready-to use'') to be used for conducting HAZOPs in continuous chemical processes. The information layout is structured according to the proposed HAZOP Management System. This information is intended to provide concise and structured documentation to be used as a reference book when conducting HAZOPs. Annex II is intended to overview the most relevant petroleum refining processes by highlighting key factors to take into account in the point of view of process safety and hazard identification, i.e. HAZOP. In this sense, key health and safety information of specific petroleum refining units is provided as a valuable guidance during brainstorming sessions. Annex III illustrates the complete set of data collected during the field work of the present research, and also analyzed in Chapter V of the manuscript. Additionally, it depicts a statistical summary of the key variables treated during the analysis. Finally, the Nomenclature, References, and Abbreviations & Acronyms used and cited during the manuscript have been listed. Additionally, a Glossary of key terms related to the Process Safety field has been illustrated. / La present Tesis doctoral té com a objectiu estandarditzar l'aplicació d'una de les tècniques més utilitzades a la industria de procés per a la identificació de perills; l'anomenat HAZard & OPerability (HAZOP) study, específicament a processos complexes, com per exemple, unitat de refineria del petroli.El capítol I defineix el concepte de Seguretat de Processos, i progressivament analitza les diferents regulacions relacionades amb la temàtica, detallant específicament les mancances i buits d'informació que actualment hi ha presents a la primera etapa de la gestió del risc en industries de procés: la identificació de perills.El capítol II defineix el sistema de gestió del risc tecnològic que aplica a les industries de procés, i es justifica que l'etapa d'identificació de perills és el pilar de tot el sistema. Finalment, es mencionen algunes de les tècniques d'identificació més utilitzades, els anomenats Process Hazard Analysis (PHA), i es detallen les seves mancances i fortaleses, característiques que han acabat definint la temàtica específica de la Tesis. Concretament, es dóna èmfasis a la tècnica anomenada HAZard & OPerability (HAZOP) study, objecte principal de la recerca.El capítol III defineix l'abast, el propòsit i els objectius específics de la recerca. La intenció d'aquest capítol és donar resposta a les següents qüestions: el perquè de la recerca, quins elements han estat inclosos i què s'ha considerat per tal d'assolir les conclusions de la Tesis.El capítol IV descriu l'estat de l'art de la literatura relacionada amb el HAZOP. Aquesta revisió no només permet classificar les diferents línies de recerca relacionades amb el HAZOP, sinó que també permet assolir un coneixement profund de les diferents particularitats de la pròpia tècnica. El capítol finalitza amb un conjunt de mancances tant de gestió com tècniques, així com les necessitats de recerca que poden millorar l'organització i execució dels HAZOPs.El capítol V analitza la informació que ha estat recopilada durant la fase experimental de la tesis. Les dades procedeixen de la participació en cinc estudis HAZOP aplicats a la industria de refineria del petroli.En aquest sentit, el capítol V desenvolupa una anàlisi estadística d'aquestes dades per extreure'n conclusions quant a la preparació, organització i execució dels HAZOPs.El capítol VI estableix el conjunt d'accions que s'ha de tenir en compte per tal d'assegurar que un estudi HAZOP estigui ben organitzat i executat (la metodologia). Es defineix un Sistema de Gestió del HAZOP, i a partir de les seves fases, es desenvolupa una metodologia que pretén donar suport a tots aquells punts febles que han estat identificats en els capítols anteriors. Aquesta metodologia té la intenció de donar suport i guia no només als líders del HAZOP, sinó també a qualsevol part interessada en aquesta temàtica.El capítol VII descriu les conclusions de la recerca. En primera instància s'enumeren les mancances quant a la definició de criteris a seguir de diferents regulacions que apliquen a la Seguretat de Processos.Seguidament, es mencionen les limitacions de la pròpia tècnica HAZOP, i finalment, es descriuen quins són els criteris establerts per donar solució a totes aquestes febleses que han estat identificades.L'Annex I és una recopilació de diferents criteris que han estat desenvolupats al llarg de l'escrit en forma de taules i figures. Aquestes han estat ordenades cronològicament d'acord amb les diferents fases que defineixen el Sistema de Gestió HAZOP. L'annex I es pot utilitzar com a una referència concisa i pràctica, preparada i pensada per ésser utilitzada directament a camp, amb la intenció de donar suport a les parts interessades en liderar estudis HAZOP.L'annex II recopila informació relacionada amb aspectes clau de seguretat i medi ambient en diferents unitats de refineria. Aquest informació és un suport per tal de motivar el "brainstorming" dels diferents membres que conformen l'equip HAZOP.L'Annex III recopila les dades de les diferents variables que han estat considerades a la fase experimental de la recerca, juntament amb un conjunt de figures que mostren la seva estadística bàsica.
12

Nasazení kontextového DLP systému v rámci zavádění ISMS / Deployment of the Context DLP System within ISMS Implementation

Imrich, Martin January 2015 (has links)
This diploma thesis focuses on a DLP implementation within a specific organization. The thesis contains current situation analysis and provides decision for choice of the most suitable DLP based on the analysis findings. Eventually describes a real implementation of the chosen DLP system within the organization.
13

Musiklärarstudenters erfarenheter av hörselvårdsutbildning vid högre utbildning och praktik : ”Man har bara en hörsel…” / Experiences of music education students regarding hearing health education in higher education and during internships : ”Your sense of hearing is invaluable and irreplaceable…”

Olsson, Anton January 2023 (has links)
According to research and authorities both young people and musicians are in need of hearing health knowledge in order to protect their own hearing. The purpose of this study was to investigate music teacher trainees’ experiences and thoughts concerning hearing health education at their music teacher programmes and internships. A sociocultural framework was used in this study. Semi-structured interviews were utilised to collect viewpoints and experiences from participants. The study involved 4 music teacher trainees, from three different music teacher training programmes. Two students were from the same music teacher programme. The data was analysed using thematic analysis. A sociocultural perspective was also used when analysing the data. The results indicate that music teacher students are not examined in hearing conservation. They do not seem to receive formative assessment in hearing conservation or hearing loss prevention. The staff is not necessarily knowledgeable in hearing conservation, even though they educate future music teachers. The staff does not seem to teach hearing conservation. Some supervisors at the internships were knowledgeable in hearing conservation and appeared to help their younger students understand risks. Other supervisors were not as knowledgeable and could be perceived as relatively passive when their students found themselves in risky sound environments without hearing protection. Social interactions which focused on hearing conservation or hearing loss prevention seemed to be quite absent at higher education and internships in Sweden. In conclusion, according to research and authorities, both youth and musicians are at risk and lack understanding of the risks in their sound environments. Music teachers are expected to teach hearing care according to the curriculum in Sweden, but many music teacher students do not feel well equipped to teach hearing care. It is important to have knowledgeable music teachers who can teach hearing care, as today's youth need this knowledge. The results and conclusions of this study suggest that society needs to equip music teachers at various levels of education with knowledge of hearing care. Several music education students in this study also expressed a desire for more hours of hearing care education at their music teacher programmes. These groups, music teachers and future music teachers, need knowledge of hearing care and hearing loss prevention to create cultures that emphasize hearing care and hearing health.
14

Telemetry Post-Processing in the Clouds: A Data Security Challenge

Kalibjian, J. R. 10 1900 (has links)
ITC/USA 2011 Conference Proceedings / The Forty-Seventh Annual International Telemetering Conference and Technical Exhibition / October 24-27, 2011 / Bally's Las Vegas, Las Vegas, Nevada / As organizations move toward cloud [1] computing environments, data security challenges will begin to take precedence over network security issues. This will potentially impact telemetry post processing in a myriad of ways. After reviewing how data security tools like Enterprise Rights Management (ERM), Enterprise Key Management (EKM), Data Loss Prevention (DLP), Database Activity Monitoring (DAM), and tokenization are impacting cloud security, their effect on telemetry post-processing will also be examined. An architecture will be described detailing how these data security tools can be utilized to make telemetry post-processing environments in the cloud more robust.
15

Monitoring a analýza uživatelů systémem DLP / Monitoring and Analysis of Users Using DLP System

Pandoščák, Michal January 2011 (has links)
The purpose of this masters thesis is to study issues of monitoring and analysis of users using DLP (Data Loss Prevention) system, the definition of internal and external attacks, the description of the main parts of the DLP system, managing of politic, monitoring user activities and classifying the data content. This paper explains the difference between contextual and content analysis and describes their techniques. It shows the fundamentals of network and endpoint monitoring and describes the process and users activities which may cause a data leakage. Lastly, we have developed endpoint protection agent who serves to the monitoring activities at a terminal station.
16

Ridge Dimensional Changes: A Comparative Study of Socket Compression After Dental Extraction with No Compression

Bennett, Duane Everett, II, 1984- January 2013 (has links)
Indiana University-Purdue University Indianapolis (IUPUI) / Exodontia, or extraction of teeth, has been a well-documented dental treatment that forms one of the foundations of dentistry. The steps associated with extracting teeth have changed little in the last century and these steps are largely part of the dogma of dentistry. One such step is that of socket compression post-extraction. Rationale for socket compression after extraction is manifold. They include: shorter healing times, fewer dry sockets and re-approximating walls that were stretched in the elevation and delivery stages of extractions. The purpose of this study was to determine if post-extraction ridge compression negatively affected alveolar ridge dimensions when compared to sites that are not compressed post-extraction. Secondary outcome measures will identify if socket compression/re-approximation affects the rate of soft tissue closure or occurrence of alveolar osteitis. In this study, 14 subjects were recruited. Eight subjects formed the compression group, while six formed the non-compression group. The subjects in the compression group received compression of their alveolar ridges after extraction to approximate their original pre-extraction width. The subjects in the non-compression group did not receive ridge compression. Each subject had pre-extraction and post-extraction CBCT scans along with post-operative follow up visits at 1, 2, and 4 weeks post-extraction. The present investigation found that with respect to changes in ridge width, sites that were compressed did not lose significantly more dimension than those that were not. With respect to ridge height, sites that were compressed did not lose significantly more dimension than those that were not. Sites that were compressed and sites that were not, healed at approximately the same rate, with respect to soft tissue closure. While the results showed a lack of statistical significance between both groups, there appears to be a trend towards the ridge compression group having a smaller ridge width. Such a trend was not noted with soft tissue closure, thereby invalidating the rationale for socket compression after extraction. One of the limitations of this pilot study is the small sample size. Further validation of these results must be done with a larger sample size in order to provide clinical guidance to dental practitioners.
17

Improving Outcomes for Children At-Risk for Hearing Loss

Daney, Samantha January 2016 (has links)
No description available.
18

台灣地區保全業風險管理暨保險相關問題之研究

楊重正, Yang, Chung-Chang Unknown Date (has links)
企業之興衰可概分為導入期、成長期、成熟期、衰退期。本研究發現,台灣地區保全業目前處於「成熟期」。隨著微利時代之來臨,保全之傳統服務業勢必將面臨極大之挑戰,若無長遠規劃及有效興革,日後將被跨國性大保全公司所併購之可能,最後從而步入「衰退期」。因此,保全業必須重視研發與管理,方能因應市場之快速變遷與挑戰。 由於社會大眾對保全業之運作缺乏正確觀念,總以為安排保全後即無須另行安排保險保障,因此時常有保障缺漏之產生。就現況而言,保全業者素質良莠不齊,常因業務競爭而忽視風險管理之重要性,且普遍未能落實損害防阻之工作,造成保全重大事故時有所聞,甚至引發社會各界之非難與抨擊。再者,法令要求保全業必須利用保險以分散風險。然而因為認知上之差距,時常發生理賠責任界定之糾紛,造成消費者不諒解、保險業不願繼續承保之困窘,影響保全業之形象與聲譽甚鉅。 本研究主要探討台灣地區保全業風險管理與保險之相關問題,架構上係以風險管理原理為基礎,輔以實務運作現況,以求有系統地分析保全業經營管理之相關風險,並藉此歸納保全業風險管理之核心原則。其次,本研究亦針對保全業運用產物保險(保全業責任保險、銀行業綜合保險、員工誠實信用保證保險)時所衍生紛爭,以案例研究方式解析其爭議所在,期能界定消費者、保全業、保險業三方之權利義務關係。最後,根據發現與結論,本研究提出若干建議供相關單位參考,期能全面提升保全業風險管理與保險運用之水平。 / In terms of the life cycle, an enterprise may experience the following stages: introduction stage, growth stage, maturity stage and decline stage. It is observed that the security industry in Taiwan is currently situated in the maturity stage. Due to severe market competition and narrow margin of profits, the security industry is forced to meet the magnificent challenge, locally or internationally. Without a long-term planning and efficient reform, it is likely to see many security companies merged by multi-national security companies in the future. Under such a scenario, the security industry in Taiwan will eventually step into the decline stage. Misunderstanding the operation of security industry, many people ignore the necessity of insurance coverage after security protection is arranged. It leads to the leakage in protection and coverage. In practice, many security companies also take less care of risk management and loss prevention due to business competition. In addition, a security company is required to transfer its risks through insurance. Because of the perceptional gap, many claim disputes arise among the security industry, the insurance industry and the clients. Under such circumstances, all of the above have deteriorated the reputation of security industry and result in many criticisms from the general public. The main theme of this research is to explore the issues related to risk management and insurance of the security industry in Taiwan. Based on the fundamental theories of risk management and market practices, the relevant risks are systematically analyzed and core risk management principles for the industry are developed. In addition, it undertakes several case studies to examine the controversial issues of certain insurance products often associated with the security business. It is hoped to clarify these issues and define the rights and obligations among different players. In the final part, the conclusion and recommendation is submitted to relevant institutions to upgrade and enhance the risk management and insurance arrangement of the security industry.
19

企業風險評估與風險控制策略之研究

吳及揚, Wu, Chi-Yang Unknown Date (has links)
由於現代企業面臨之風險是多變的,許多有關之法令規定已過時,企業組織可用之資源、成本和效益會產生變化,故企業要能適應未來的變局更需落實風險管理。 企業實施風險管理之重要目標,是為了在損失發生前能以節約的原則,減少憂慮,符合外界規定,並善盡社會責任;在損失發生後能生存,繼續營運,維持收益穩定,以求繼續成長等。然而企業往往會多角化擴充經營範疇,甚至在各處實施特定的經營活動,如此其風險管理將更形複雜。 本文擬以風險管理與損害防阻的實務經驗,佐以理論基礎,說明導入風險管理與損害防阻之目標、策略、程序、計畫、績效評核等,期能使各企業認識、衡量風險,藉由選擇並執行最符合經濟效益之風險管理方法,達到企業永續經營的目標。 其次,以個人在集團內執行安全管理系統和損害防阻安全查勘服務計畫的個案,說明企業損害防阻管理意義、風險的確認、分析與評估、損害防阻管理的執行與考核、績效評估等。最後再以身為企業推動風險管理與損害防阻的一份子,檢視以往歷程提出建議,期能拋磚引玉,讓更多的組織、企業和相關人士重視並推動主動式的風險控制及損害防阻管理。 / Since the risks faced by the modern enterprises are changeable, the laws and stipulations are obsolete and outdated, the resources, costs and benefits used by the enterprises organizations are subject to change, and therefore the enterprises have to carry out the risk management in order to be able to adapt the future changes in situations. The major targets for the enterprises to implement the risk management are for the purposes of reducing the anxiety, conforming to the outside stipulations and fulfilling the social responsibilities sincerely before the losses occur; surviving, operating continually, maintaining the incomes and continuing to grow, etc. if the losses should occur. However, the enterprises often run their business diversified and even operate the specific business activities everywhere, that will make their risk management more complex. This article intends to be written in the view of practical experiences to engage in the risk management, loss prevention and control as well as the assists of theory foundations, depicts the implementations of goals, strategies, procedures, plans and performance evaluations, etc. in risk management, loss prevention and control, anticipating various enterprises to identify and measure the risks by means of selecting and executing the risk management methods which conform to the utmost economical benefits for the goals of running businesses continually. Next, in the case where the writer personally carried out the safety management systems and safety survey service plans of loss prevention and control in group enterprises illustrates the meaning of loss control management, the identification, analysis and evaluation of risk, and the implementation, the verification and performance evaluation of loss control management, etc. Finally, as the member of implementing enterprises risk management and loss prevention and control, the writer examines the past working processes and experiences to offer some recommendations, expecting to throw stones and bring back jade to let much more organizations, enterprises and the parties concerned think highly of and enforce the proactive risk control and loss control management.
20

Návrh koncepce prevence ztráty dat / Design of conception of data loss prevention

Brejla, Tomáš January 2011 (has links)
This work deals with the making of conception of implementation of processes and software tools designed to ensure sensitive data leakage prevention from the organization infrastructure. The structure consists of three key parts. The first one describes theoretical basis of the work. It explains what is the data loss prevention, what it comes from, why it is necessary to deal with it and what its goals are. It also describes how this fits into the whole area of corporate ICT security environment. There are defined all the risks associated with leakage of sensitive data and there are also defined possible solutions and problems that are associated with these solutions. The first part also analyzes the current state of data loss prevention in organizations. They are divided according to their size and for each group there is a list of the most common weaknesses and risks. It is evaluated how the organizations currently solve prevention of data loss and how they cover this issue from both a procedural point of view and in terms of software tools. The second part focuses directly on the software tools. It is characterized the principle of operation of these systems and it is explained their network architecture. There are described and evaluated current trends in the development of the data loss prevention tools and it is outlined possible further development. They are divided into different categories depending on what features they offer and how these categories cover the needs of organizations. At the end of the second part there are compared the software solutions from leading vendors in the market against actual experience, focusing on their strengths and weaknesses. The third part presents the core content. IT joins two previous sections and the result is the creation of the overall concept of the implementation of data loss prevention with focus on breakdown by several different levels -- processes, time and size of the company. At the beginning of this third section it is described what precedes the implementation of data loss prevention, and what the organizations should be careful of. It is defined by how and what the organizations should set their own expectations for the project could be manageable. The main point is the creation of a procedure of data loss prevention implementation by creating a strategy, choice of solutions, to the implementation of this solution and related processes. The end of the third part deals with the legal and personnel issues which are with the implementation of DLP very closely related. There are made recommendations based on analysis of the law standards and these recommendations are added to the framework approach of HR staff. At the very end there are named benefits of implementing data loss prevention, and the created concept is summarized as a list of best practices.

Page generated in 0.1009 seconds