1 |
Prevence sebepoškození u hospitalizovaných pacientů v ČR / Self-harm prevention in inpatientsNecid, Petr January 2010 (has links)
The aim of this diploma work is to explore tactics which would help serve as a preventive measure from inpatients inflicting self-harm. This work was conducted in selected psychiatric departments throughout the Czech Republic by using an anonymous questionnaire investigation. Only fifty percent of the departments have internal guidelines for detection of at risk patients. Eighty-eight percent of departments have an internal system for reporting extraordinary events. Many of these departments have advanced technical equipment, but there are still some departments with technical equipment at lower levels, probably due to the high costs associated. Only two departments are using scales for evaluation of admitting patients. Fifty percent of the departments evaluate risks of self-harm for admitting patients. Self-harm was present in all departments in this study; seventeen percent of departments did not report any number of suicide attempts and forty two percent of the departments did not report any number of the self-harm attempts. The results are showing a positive trend in the role of prevention, as well as increasing the safety level within individual departments. The data are also showing that not all of departments are taking sufficient measures to ensure prevention. Clear evidence of self-harm and suicide...
|
2 |
A Novel Approach to Determining Real-Time Risk Probabilities in Critical Infrastructure Industrial Control SystemsElrod, Michael 01 January 2017 (has links)
Critical Infrastructure Industrial Control Systems are substantially different from their more common and ubiquitous information technology system counterparts. Industrial control systems, such as distributed control systems and supervisory control and data acquisition systems that are used for controlling the power grid, were not originally designed with security in mind. Geographically dispersed distribution, an unfortunate reliance on legacy systems and stringent availability requirements raise significant cybersecurity concerns regarding electric reliability while constricting the feasibility of many security controls. Recent North American Electric Reliability Corporation Critical Infrastructure Protection standards heavily emphasize cybersecurity concerns and specifically require entities to categorize and identify their Bulk Electric System cyber systems; and, have periodic vulnerability assessments performed on those systems. These concerns have produced an increase in the need for more Critical Infrastructure Industrial Control Systems specific cybersecurity research. Industry stakeholders have embraced the development of a large-scale test environment through the Department of Energy’s National Supervisory Control and Data Acquisition Test-bed program; however, few individuals have access to this program. This research developed a physical industrial control system test-bed on a smaller-scale that provided an environment for modeling a simulated critical infrastructure sector performing a set of automated processes for the purpose of exploring solutions and studying concepts related to compromising control systems by way of process-tampering through code exploitation, as well as, the ability to passively and subsequently identify any risks resulting from such an event. Relative to the specific step being performed within a production cycle, at a moment in time when sensory data samples were captured and analyzed, it was possible to determine the probability of a real-time risk to a mock Critical Infrastructure Industrial Control System by comparing the sample values to those derived from a previously established baseline. This research achieved such a goal by implementing a passive, spatial and task-based segregated sensor network, running in parallel to the active control system process for monitoring and detecting risk, and effectively identified a real-time risk probability within a Critical Infrastructure Industrial Control System Test-bed. The practicality of this research ranges from determining on-demand real-time risk probabilities during an automated process, to employing baseline monitoring techniques for discovering systems, or components thereof, exploited along the supply chain.
|
3 |
Supply Risk Management of Automotive Suppliers : Development in a Fluctuating EnvironmentStaudinger, Maximilian, Günl, Marius January 2012 (has links)
Background: The implementation of procurement concepts such as JIT or singlesourcing have resulted in the emergence of new supply risks forautomotive suppliers. The economic crisis in 2008 and volatiledemand in recent years had enormous impact on the sector.Consequently, in association with lean purchasing models, newdimensions of supply risks have emerged. This creates the need forautomotive suppliers to adapt and improve their supply riskmanagement in response to the increased risk potential. There hasbeen no research on how automotive suppliers have furtherdeveloped their supply risk management recently. Purpose: The purpose is to examine how automotive suppliers have adaptedtheir supply risk management in response to the fluctuatingeconomy since 2008. Frame of reference: In this section the Kraljic matrix and the risk management processare presented. The theories lead to a synthesis including the researchquestions for fulfilling the purpose. Method: This research is based on a qualitative multiple case study. In orderto gather the necessary in-depth data, four automotive suppliersfrom Germany and Northern Europe were interviewed by theauthors. Conclusions: Automotive suppliers have clearly reacted on increasedconsequences of supply risks. The general grown awareness andsensitivity have lead to the implementation of new managementtools. Particularly the cooperation between supply chain membershas considerably intensified and contributed to a better riskreduction. Moreover, the financial stability of vendors has risen inimportance and is considered more thoroughly. All the instrumentsand methods may, however, be more powerful and efficient ifautomotive suppliers had standardized and linked them into aconsecutive process.
|
4 |
Risk monitoring with intrusion detection for industrial control systems / Surveillance des risques avec détection d'intrusion pour les systèmes de contrôle industrielsMuller, Steve 26 June 2018 (has links)
Les cyberattaques contre les infrastructures critiques telles que la distribution d'électricité, de gaz et d'eau ou les centrales électriques sont de plus en plus considérées comme une menace pertinente et réaliste pour la société européenne. Alors que des solutions éprouvées comme les applications antimalware, les systèmes de détection d'intrusion (IDS) et même les systèmes de prévention d'intrusion ou d'auto-cicatrisation ont été conçus pour des systèmes informatiques classiques, ces techniques n'ont été que partiellement adaptées au monde des systèmes de contrôle industriel. En conséquence, les organisations et les pays font recours à la gestion des risques pour comprendre les risques auxquels ils sont confrontés. La tendance actuelle est de combiner la gestion des risques avec la surveillance en temps réel pour permettre des réactions rapides en cas d'attaques. Cette thèse vise à fournir des techniques qui aident les responsables de la sécurité à passer d'une analyse de risque statique à une plateforme de surveillance des risques dynamique et en temps réel. La surveillance des risques comprend trois étapes, chacune étant traitée en détail dans cette thèse : la collecte d'informations sur les risques, la notification des événements de sécurité et, enfin, l'inclusion de ces informations en temps réel dans une analyse des risques. La première étape consiste à concevoir des agents qui détectent les incidents dans le système. Dans cette thèse, un système de détection d'intrusion est développé à cette fin, qui se concentre sur une menace persistante avancée (APT) qui cible particulièrement les infrastructures critiques. La deuxième étape consiste à traduire les informations techniques en notions de risque plus abstraites, qui peuvent ensuite être utilisées dans le cadre d'une analyse des risques. Dans la dernière étape, les informations collectées auprès des différentes sources sont corrélées de manière à obtenir le risque auquel l'ensemble du système est confronté. Les environnements industriels étant caractérisés par de nombreuses interdépendances, un modèle de dépendance est élaboré qui prend en compte les dépendances lors de l'estimation du risque. / Cyber-attacks on critical infrastructure such as electricity, gas, and water distribution, or power plants, are more and more considered to be a relevant and realistic threat to the European society. Whereas mature solutions like anti-malwareapplications, intrusion detection systems (IDS) and even intrusion prevention or self-healing systems have been designed for classic computer systems, these techniques have only been partially adapted to the world of Industrial ControlSystems (ICS). As a consequence, organisations and nations fall back upon risk management to understand the risks that they are facing. Today's trend is to combine risk management with real-time monitoring to enable prompt reactions in case of attacks. This thesis aims at providing techniques that assist security managers in migrating from a static risk analysis to areal-time and dynamic risk monitoring platform. Risk monitoring encompasses three steps, each being addressed in detail in this thesis: the collection of risk-related information, the reporting of security events, and finally the inclusion of this real time information into a risk analysis. The first step consists in designing agents that detect incidents in the system. In this thesis, an intrusion detection system is developed to this end, which focuses on an advanced persistent threat (APT) that particularly targets critical infrastructures. The second step copes with the translation of the obtained technical information in more abstract notions of risk, which can then be used in the context of a risk analysis. In the final step, the information collected from the various sources is correlated so as to obtain the risk faced by the entire system. Since industrial environments are characterised by many interdependencies, a dependency model is elaborated which takes dependencies into account when the risk is estimated.
|
5 |
Use of notifiable infectious disease surveillance data for benefit/risk monitoring of vaccines in the EU within the context of the IMI ADVANCE project : Estimating the annual burden of invasive meningococcal disease in the EU/EEA, 2011-2015Hennings, Viktoria January 2018 (has links)
The Innovative Medicines Initiative Accelerated Development of VAccine beNefit-risk Collaboration in Europe (IMI ADVANCE) project aims to develop a framework for best practice methods on integrated rapid benefit/risk monitoring of vaccines in the European Union (EU). Burden of disease is one of the measures considered when estimating vaccine benefits. This study explores the use of notifiable infectious disease surveillance data for this purpose by estimating burden of invasive meningococcal disease in the EU/European Economic Area (EEA). We use the Burden of Communicable Diseases in Europe toolkit for computing disability-adjusted life years from incidence-based data retrieved from the European Surveillance System (TESSy) held at the European Centre for Disease Prevention and Control. Invasive meningococcal is a common cause of meningitis and septicaemia, with high case-fatality (~10%) and sequelae. We found that the median annual burden of invasive meningococcal disease in the EU/EEA, 2011-2015, was 3.87 DALYs per 100 000 total population (95% UI: 3.79-3.95). Children below one year of age and children below five years of age were at greatest risk of invasive meningococcal disease serogroup B with 89.15 DALYs per 100 000 stratum specific population (95% UI: 83.11-95.02) and 22.57 DALYs per 100 000 stratum specific population (95% UI: 21.03-24.12), respectively. We found that the distribution of burden of invasive meningococcal disease serogroup B differs widely between countries in the EU/EEA and consequently confirm that national assessment of the new infant meningococcal B vaccine is highly relevant.
|
6 |
Insights into everyday life of a compliance officer in the Liechtenstein financial marketGraber, Nicolas 28 November 2023 (has links)
The text explores the multifaceted role of a compliance officer in the Liechtenstein financial market. Drawing parallels to Forrest Gump's life analogy, the compliance officer's routine is marked by unpredictability, earning them the reputation of either a business killer or an everyday hero. Their primary responsibility is ensuring that their company adheres to legal and regulatory requirements. The compliance officer is a vigilant source of information, staying abreast of law amendments, geopolitical developments, and fraud schemes. They act as a second line of defense, rigorously assessing business profiles and monitoring risks associated with client relationships. Additionally, compliance officers play roles as counselors/psychologists, subject matter experts, protectors, and liaisons with the Financial Intelligence Unit (FIU). The text emphasizes their liability for actions or inactions, citing examples of legal repercussions for non-compliance. Despite the challenges, the conclusion depicts compliance officers as everyday heroes contributing to the integrity of the financial industry in Liechtenstein.
|
7 |
Aspekty ovlivňující rizikovost bankovních úvěrů (z pohledu České spořitelny a.s.) / Aspects influencing the risk of bank loans (from the perspective of the Česká spořitelna a.s.)Babková, Eva January 2009 (has links)
The aim of my diploma thesis is to evaluate aspects of credit risk, particularly focused on the retail banking in Česká spořitelna a.s., where all the data come from. At first the thesis describes the background of Česká spořitelna a.s., bank products and credit process. Further there are explains the basic procedures for assessement of the state of company and portfolio monitoring. In the section devoted to banking risks there are specified bank risks and regulation of these risks from the perspective of the Basel Capital Accord. The remaining two theoretical parts describe methods that will be used to evaluate the risk of loans i.e. descriptive statistics and hypothesis testing. Introduction of empirical study describes the structure and over time of the loan portfolio evolution of retail banking. The remainder of the study is already focused on the analysis of credit risks from several points of view. In the first place there is examining the impact of legal form of organization and type of product on credit risk. Furthermore, evaluations of the riskiest sectors from subject come and ultimately verify the influence business plans of the branch network. My personal contribution is a notice on aspects which have proven negative effect on loan.
|
8 |
Risk management in global supply chains : A review based on the impact of COVID-19Suresh, Prashanth, Smirnov Patroshkov, Ivan January 2020 (has links)
Global supply chains (GSCs) are formed with the primary objective of cost minimization. Apart from cost reductions, GSCs also have other benefits like opening up new markets, reduction in the price of the product sold, and increasing production capacity. The benefits of GSCs are significant only when the environment it works in is stable. But in real life, almost all the systems are stochastic. While companies try to globalize their supply chains (SC), it is important to understand and evaluate the risks associated with global expansion. Several risk events arise in global supply chains and efficient management of these probable risk events plays a crucial role. Supply chain risk management (SCRM) is the implementation of strategies to manage both everyday and exceptional risks along the SCs based on continuous risk assessment to reduce vulnerability and ensure continuity. But there is a need to differentiate risk management of domestic and global supply chains due to additional risk elements involved in the functioning of GSCs. COVID-19 pandemic is one such risk event that has disrupted the GSCs of many companies around the world. Hence, the purpose of this study is to examine whether the framework of risk management in global supply chains needs reviewing after the manifestation of the COVID-19 pandemic. To fulfill the purpose, the study is divided into 2 sections. A literature review is done in supply chain management, supply chain risk management using the keywords mentioned below. Interviews were conducted with companies having GSCs. The interviews help in primary data collection for understanding the impact of COVID-19 on GSCs. Questions regarding company background, strategy for RM, the impact of COVID-19 on the GSC, and previous catastrophic impacts & future plans were asked. The collected data is processed and analyzed to arrive at findings. These findings are compared with theory to conclude by answering the research questions. The findings prove that the existing risk management (RM) framework is sufficient to handle risk events such as pandemics. The benefits of implementing risk monitoring are visible with the comparison of the impact of RM strategies prior to and during the pandemic. Disruptive events such as COVID-19 cannot be completely avoided but can be mitigated. Several risk types occur due to catastrophic events as risk types are interconnected. Hence, all risk types must be evaluated for the RM plan. The impact is also dependent on local restrictions. Hence, it should also be considered in RM plans. Coordination mechanisms and robust strategies have shown that resiliency and flexibility improve and have reduced the impact of COVID-19 both proactively and reactively. So, it shows that the existing RM framework has the capability of mitigating the impacts of future pandemics and does not require updating.
|
9 |
Rozhodovací metody v managementu rizik / Decision Risks Management MethodsJanošík, Petr January 2011 (has links)
This thesis deals with the matter of risk managament in IT projects. It explains the importance of risk management in such projects and shows different ways and methods of managing and analyzing the risks. After explaining the basic concepts and the various phases of risk management the text focuses on two methods of risk analysis - the fault tree analysis of event tree analysis. Use of both methods is explained for both quantitative and qualitative analyses. The second half of the work includes the design of an application for the support of risk analysis employing the methods of fault tree analysis and event tree analysis. This is followed by a description of the implementation of the proposed system in a web environment using jQuery, Nette Framework and Dibi.
|
10 |
Automating Security Risk and Requirements Management for Cyber-Physical SystemsHansch, Gerhard 15 October 2020 (has links)
No description available.
|
Page generated in 0.0732 seconds