SlideShare a Scribd company logo
1 of 31
Risk and Safety in Work Environments
Mahsa Teimourikia, PhD Student
Supervised by: Prof. Mariagrazia Fugini
Politecnico di Milano
mahsa.teimourikia@polimi.it
June 2015
Polo Territoriale di Como
2
Outlines
• Motivation and Objectives
• Overview of our research
• Definitions
• Methodology:
• Risk Assessment
• Future Work
Polo Territoriale di Como
3
Motivations
[1] K. Smith, Environmental hazards: assessing risk and reducing disaster, Routledge, 2013.
• In environmental risk management, providing
security and safety for people and various
resources dynamically, according what happens
in the environment is an open issue [1].
• In monitored environments, where risks can be
acknowledged via sensors and spatial data
technologies, risk should be assessed to be able
to provide required safety and security.
Polo Territoriale di Como
4
The Definition of Risk
Risk: hazards and abnormalities recognized in an
environment that indicate a threat to the
infrastructures and/or the civilians
• (e.g., If sensors indicate gas leak, there is a risk
of fire and explosion.).
• Risks can be avoided via preventive strategies
(e.g., closing the gas flow).
• Risks contain attributes like Type, IntensityLevel,
and Location.
Polo Territoriale di Como
5
The Steps in Risk Management
Polo Territoriale di Como
6
Risk Assessment (ISO 31000:2009)
• Risk Identification: A process to understand
what could happen, how, when and why
• Risk Analysis: Concerned with developing an
understanding of each risk, its consequences,
and the likelihood of those consequences to
happen.
• Risk Evaluation: Involves making a decision
about the level of risk and the priority for
attention through the application the criteria
developed when the context was established.
Polo Territoriale di Como
7
Risk Assessment (ISO 31000:2009)
• Risk assessment is a methodological framework for
determining the nature and extent of the risk associated
with an activity. Including:
– Identification of relevance sources (threats,
hazards, opportunities).
– Cause and consequence analysis, including
assessment of exposure and vulnerabilities.
– Risk description.
• The risk assessment provides a description of risk
related to loss of lives and injuries as a result of these
hazards, based on relevant data, models and expert
judgments. The assessment thus produces knowledge
about safety related phenomena, processes, events, etc.;
Polo Territoriale di Como
8
Risk Treatment (ISO 31000:2009)
• Involves evaluation and selection from options,
prioritizing and implementing the selected treatment
through a planned process.
• Options to be considered during risk treatment:
– Avoiding the risk by deciding not to start or
continue with the activity that gives rise to the
risk.
– Removing the risk source
– Changing the likelihood
– Changing the consequences
– …
Polo Territoriale di Como
9
Main Risk Assessment Methods
• Qualitative Techniques:
– Check lists, what-if Analysis, Safety Audits, Task
Analysis, STEP technique, HAZOP
• Quantitative Techniques:
– PRAT Technique, DMRA Technique, Risk
measures of societal risk, QRA technique, QADS,
CREA method, PEA method, WRA
• Hybrid Techniques:
– HEAT/HFEA, FTA, ETA, RBM
Polo Territoriale di Como
10
Going back to our research
Polo Territoriale di Como
11
The Risk Management System (RMS) [2]
• The RMS receives the inputs from sensors and
monitoring devices, recognizes the risks in the
environment and produces a Risk Map and preventive
Strategies accordingly.
[2] M. Fugini, C. Raibulet, and L. Ubezio, "Risk assessment in work environments: modeling and simulation,"
Concurrency and Computation: Practice and Experience, vol. 24, no. 18, pp. 2381-2403, 2012.
Polo Territoriale di Como
14
What we consider...
In our context we consider:
 The use of risk definition patterns to avoid
malformed definitions
 The use of best practices to define risk
patterns to avoid missing some risks
 The indication of strategies for risk
management, to be executed through a set
of corrective actions.
Polo Territoriale di Como
15
What we consider...
The definition of risk implies the specification of the following
information:
 A risk name that clearly identify it. To
identify a risk the system must learn from
BP, namely:
 Workers experience
 Working environment law
 Rescue/Safety force repots
 Accident statistical information
 A verbal/textual definition of the risk.
Polo Territoriale di Como
16
What we consider...
And prescriptions:
 Identify the causes of the risk
 Identify the events and their correlation to
identify a risk situation
 Identify the measure for the level of risk
 Identify by which means such measures can be
extracted from the working environment and the
acquisition strategies.
 Enumerate the actions performed on the
environment to reduce the risk level
 Identify by which means it would be possible to
check that the proposed preventive action have
been applied.
Polo Territoriale di Como
17
What we consider: Risk Levels
What is the risk level? How to model a risk level?
 Each risk should be associated with a risk
level expressing its severity.
 Not all risks lead to the same
consequences.
Why risk level should be modeled?
 To maintain the level of risk to the lowest
possible
 In case of multiple risks the level is a good
measure for prioritizing their treatments.
Polo Territoriale di Como
18
Characterizing the Risk
We identify risk through some properties
reported below:
Polo Territoriale di Como
19
Risk Computation/Assessment
Elements used in risk computation:
Polo Territoriale di Como
20
Risk Computation/Assessment
Polo Territoriale di Como
21
Risk Computation/Assessment
Polo Territoriale di Como
22
Problems of the analytical risk computation
It is difficult to obtain validity ranges for coefficients
from experimental data;
Risk coefficients should not be bound to any other
factor in the expression, since the worn protections
and the procedures in place should offer a constant
support to reduction of the risk for a person
independently of his distance from dangers.
The distance parameter could make risk values
oscillate out of the prescribed range. In fact even
short distances can increase the risk to very high
levels. Although conceptually correct, this could lead
to problems during the elaboration of risk formulas.
Polo Territoriale di Como
23
To solve the problems…
The security coefficient has been separated from
the computation of the actual danger by
subtracting a numeric valued depending of the
protections used to prevent a damage caused by
the considered element.
The distance has been substituted by a Gaussian
coefficient dependent on both the distance from the
dangerous source and on the danger type, giving a
value between 0 and 1. Such value is multiplied with
the dangerousness Pr in order to smoothen its
contribute with the increase of the distance.
Polo Territoriale di Como
24
The risk formula
Polo Territoriale di Como
25
The risk formula in two dimensional space
Polo Territoriale di Como
26
Moving from Risk to Safety
Safety: The condition of being safe; freedom from
danger, risk or injury.
• the absence of accidents that are events
involving an unplanned and unacceptable loss.
• Safety as low or acceptable risk.
Polo Territoriale di Como
27
Risk Management vs. Safety Management
• Very similar concepts
• Safety management can be considered as
the subset of risk management.
• Risk refers to a broader concept that can
include: financial, reputation, legal,
business, and market share risks.
Polo Territoriale di Como
28
Bow-tie Model
Bow-tie Model: Several hazards/threats can
cause a hazardous event which may have
consequences.
Polo Territoriale di Como
29
Uncertainty models in Safety Management
• Uncertainty can apply at different levels:
– Uncertainty of input data
– Uncertainty of the risk assessment
model
– Uncertainty of output data
• Uncertainty plays an important part in
decision making specifically when it
comes to security and safety.
Polo Territoriale di Como
30
Selected Publications
• Fugini, Mariagrazia, and Mahsa Teimourikia, George Hadjichristofi. "Web-Based
Cooperative Tool for Risk Treatment under Adaptive Security Rules." submitted for
publication at Special Issue on Semantic Web for Cooperation - Future Generation
Computer Systems, Elsevier Editor.
• Fugini, Mariagrazia, and Mahsa Teimourikia. "RAMIRES: Risk Adaptive Management
In Resilient Environments with Security" Submitted for publication in WETICE
Conference (WETICE), 2015 IEEE 24th International. IEEE, 2015.
• Fugini, Mariagrazia, and Mahsa Teimourikia. "Risks in smart environments and
adaptive access controls." Innovative Computing Technology (INTECH), 2014 Fourth
International Conference on. IEEE, 2014.
• Fugini, Mariagrazia, and Mahsa Teimourikia. "Access Control Privileges Management
for Risk Areas." Information Systems for Crisis Response and Management in
Mediterranean Countries. Springer International Publishing, 2014. 98-111.
• Fugini, Mariagrazia, George Hadjichristofi, and Mahsa Teimourikia. "Adaptive
Security for Risk Management Using Spatial Data." Database and Expert Systems
Applications. Springer International Publishing, 2014.
• Fugini, Mariagrazia, George Hadjichristofi, and Mahsa Teimourikia. "Dynamic
Security Modeling in Risk Management Using Environmental Knowledge." WETICE
Conference (WETICE), 2014 IEEE 23rd International. IEEE, 2014.
Polo Territoriale di Como
31
Contact Information
• Drop an email to:
Mahsa.teimourikia@polimi.it
• View profile in:
Polimi Deib:
http://home.deib.polimi.it/teimourikia
 Office:
 Via Ponzio, Edificio 21, First Floor,
Office no. 19
Polo Territoriale di Como
32
References
• [1] Bahr, Nicholas J. System safety engineering and risk assessment: a practical
approach. CRC Press, 2014.
• [2] Purdy, Grant. "ISO 31000: 2009—setting a new standard for risk
management."Risk analysis 30.6 (2010): 881-886.
• [3] Aven, Terje. "On the new ISO guide on risk management terminology."Reliability
engineering & System safety 96.7 (2011): 719-726.
• [4] Aven, Terje, et al. Uncertainty in Risk Assessment: The Representation and
Treatment of Uncertainties by Probabilistic and Non-probabilistic Methods. John
Wiley & Sons, 2013.
• [5] Rausand, Marvin. Risk assessment: Theory, methods, and applications. Vol. 115.
John Wiley & Sons, 2013.
• [6] Marhavilas, Pan-K., D. Koulouriotis, and V. Gemeni. "Risk analysis and assessment
methodologies in the work sites: on a review, classification and comparative study of
the scientific literature of the period 2000–2009." Journal of Loss Prevention in the
Process Industries 24.5 (2011): 477-523
• [7] Fugini, Mariagrazia, Claudia Raibulet, and Luigi Ubezio. "Risk assessment in
work environments: modeling and simulation." Concurrency and computation:
Practice and experience 24.18 (2012): 2381-2403.
Polo Territoriale di Como
33
Thank You

More Related Content

Viewers also liked

Viewers also liked (10)

Interjections
InterjectionsInterjections
Interjections
 
Volunteering idioms
Volunteering idiomsVolunteering idioms
Volunteering idioms
 
Visiting the pharmacist mb
Visiting the pharmacist mbVisiting the pharmacist mb
Visiting the pharmacist mb
 
Candian government
Candian governmentCandian government
Candian government
 
ACTEP2014: Patient safety & risk management
ACTEP2014: Patient safety & risk managementACTEP2014: Patient safety & risk management
ACTEP2014: Patient safety & risk management
 
Business idioms
Business idiomsBusiness idioms
Business idioms
 
Home and House idioms
Home and House idiomsHome and House idioms
Home and House idioms
 
Back to school idioms 3
Back to school idioms 3Back to school idioms 3
Back to school idioms 3
 
Business meeting idioms
Business meeting idiomsBusiness meeting idioms
Business meeting idioms
 
Electrical Safety and Risk Assessments
Electrical Safety and Risk AssessmentsElectrical Safety and Risk Assessments
Electrical Safety and Risk Assessments
 

Similar to Risk and Safety in Work Environments

PRMG195 - Rsik Management Case Study.pdf
PRMG195 - Rsik Management Case Study.pdfPRMG195 - Rsik Management Case Study.pdf
PRMG195 - Rsik Management Case Study.pdfmohamed Ismail
 
Lecture 02. OSH Risk Assessment
Lecture 02. OSH Risk Assessment Lecture 02. OSH Risk Assessment
Lecture 02. OSH Risk Assessment KateKazhan
 
Software IT risk-management
Software IT risk-managementSoftware IT risk-management
Software IT risk-managementgufranresearcher
 
RAMIRES: Risk Adaptive Management In Resilient Environments with Security
RAMIRES: Risk Adaptive Management In Resilient Environments with SecurityRAMIRES: Risk Adaptive Management In Resilient Environments with Security
RAMIRES: Risk Adaptive Management In Resilient Environments with SecurityMahsa Teimourikia
 
Risk Assessment.ppt
Risk Assessment.pptRisk Assessment.ppt
Risk Assessment.pptCaptDevendra
 
Hse, Risk Assessment
Hse, Risk AssessmentHse, Risk Assessment
Hse, Risk AssessmentTara Smith
 
CHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docx
CHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docxCHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docx
CHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docxchristinemaritza
 
M1-1-SMS_Aerodrome_Hazard Identfication.pdf
M1-1-SMS_Aerodrome_Hazard Identfication.pdfM1-1-SMS_Aerodrome_Hazard Identfication.pdf
M1-1-SMS_Aerodrome_Hazard Identfication.pdfGSEProject
 
Risk management of telecommunication and engineering laboratory
Risk management of telecommunication and engineering laboratoryRisk management of telecommunication and engineering laboratory
Risk management of telecommunication and engineering laboratorySalam Shah
 
Session 01 _Risk Assessment Program for YSP_Introduction, Definitions and Sta...
Session 01 _Risk Assessment Program for YSP_Introduction, Definitions and Sta...Session 01 _Risk Assessment Program for YSP_Introduction, Definitions and Sta...
Session 01 _Risk Assessment Program for YSP_Introduction, Definitions and Sta...Muizz Anibire
 
Project Risk Management-Pankaj K Sinha
Project Risk Management-Pankaj K SinhaProject Risk Management-Pankaj K Sinha
Project Risk Management-Pankaj K SinhaPankaj K Sinha
 
D12 1 risk assessment_final-web
D12 1 risk assessment_final-webD12 1 risk assessment_final-web
D12 1 risk assessment_final-webDir Jan
 
Dynamic Security Modeling in Risk Management Using Environmental Knowledge
Dynamic Security Modeling in Risk Management Using Environmental KnowledgeDynamic Security Modeling in Risk Management Using Environmental Knowledge
Dynamic Security Modeling in Risk Management Using Environmental KnowledgeMahsa Teimourikia
 
Risk Management (1) (1).ppt
Risk Management (1) (1).pptRisk Management (1) (1).ppt
Risk Management (1) (1).pptAjjuSingh2
 
HIRA (hazard identification risk assessment)
HIRA (hazard identification risk assessment)HIRA (hazard identification risk assessment)
HIRA (hazard identification risk assessment)PrasantakumarNayak4
 
Hira – hazard identification & risk assessment
Hira – hazard identification & risk assessment Hira – hazard identification & risk assessment
Hira – hazard identification & risk assessment Salim Solanki
 
CYBOK: Risk Management Governance KA Webinar slides.pdf
CYBOK: Risk Management Governance KA Webinar slides.pdfCYBOK: Risk Management Governance KA Webinar slides.pdf
CYBOK: Risk Management Governance KA Webinar slides.pdfHari319621
 
Safety hazard-identification-on-construction-projects
Safety hazard-identification-on-construction-projectsSafety hazard-identification-on-construction-projects
Safety hazard-identification-on-construction-projectsAHMED NADIM JILANI
 
Ppt for IMPROVEMENT OF SAFETY THROUGH SAFETY MANAGAMENT PLAN – office p...
Ppt for IMPROVEMENT OF SAFETY   THROUGH    SAFETY MANAGAMENT PLAN –  office p...Ppt for IMPROVEMENT OF SAFETY   THROUGH    SAFETY MANAGAMENT PLAN –  office p...
Ppt for IMPROVEMENT OF SAFETY THROUGH SAFETY MANAGAMENT PLAN – office p...AMIT SAHU
 

Similar to Risk and Safety in Work Environments (20)

PRMG195 - Rsik Management Case Study.pdf
PRMG195 - Rsik Management Case Study.pdfPRMG195 - Rsik Management Case Study.pdf
PRMG195 - Rsik Management Case Study.pdf
 
Risk Management 1 (2)
Risk Management 1 (2)Risk Management 1 (2)
Risk Management 1 (2)
 
Lecture 02. OSH Risk Assessment
Lecture 02. OSH Risk Assessment Lecture 02. OSH Risk Assessment
Lecture 02. OSH Risk Assessment
 
Software IT risk-management
Software IT risk-managementSoftware IT risk-management
Software IT risk-management
 
RAMIRES: Risk Adaptive Management In Resilient Environments with Security
RAMIRES: Risk Adaptive Management In Resilient Environments with SecurityRAMIRES: Risk Adaptive Management In Resilient Environments with Security
RAMIRES: Risk Adaptive Management In Resilient Environments with Security
 
Risk Assessment.ppt
Risk Assessment.pptRisk Assessment.ppt
Risk Assessment.ppt
 
Hse, Risk Assessment
Hse, Risk AssessmentHse, Risk Assessment
Hse, Risk Assessment
 
CHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docx
CHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docxCHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docx
CHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docx
 
M1-1-SMS_Aerodrome_Hazard Identfication.pdf
M1-1-SMS_Aerodrome_Hazard Identfication.pdfM1-1-SMS_Aerodrome_Hazard Identfication.pdf
M1-1-SMS_Aerodrome_Hazard Identfication.pdf
 
Risk management of telecommunication and engineering laboratory
Risk management of telecommunication and engineering laboratoryRisk management of telecommunication and engineering laboratory
Risk management of telecommunication and engineering laboratory
 
Session 01 _Risk Assessment Program for YSP_Introduction, Definitions and Sta...
Session 01 _Risk Assessment Program for YSP_Introduction, Definitions and Sta...Session 01 _Risk Assessment Program for YSP_Introduction, Definitions and Sta...
Session 01 _Risk Assessment Program for YSP_Introduction, Definitions and Sta...
 
Project Risk Management-Pankaj K Sinha
Project Risk Management-Pankaj K SinhaProject Risk Management-Pankaj K Sinha
Project Risk Management-Pankaj K Sinha
 
D12 1 risk assessment_final-web
D12 1 risk assessment_final-webD12 1 risk assessment_final-web
D12 1 risk assessment_final-web
 
Dynamic Security Modeling in Risk Management Using Environmental Knowledge
Dynamic Security Modeling in Risk Management Using Environmental KnowledgeDynamic Security Modeling in Risk Management Using Environmental Knowledge
Dynamic Security Modeling in Risk Management Using Environmental Knowledge
 
Risk Management (1) (1).ppt
Risk Management (1) (1).pptRisk Management (1) (1).ppt
Risk Management (1) (1).ppt
 
HIRA (hazard identification risk assessment)
HIRA (hazard identification risk assessment)HIRA (hazard identification risk assessment)
HIRA (hazard identification risk assessment)
 
Hira – hazard identification & risk assessment
Hira – hazard identification & risk assessment Hira – hazard identification & risk assessment
Hira – hazard identification & risk assessment
 
CYBOK: Risk Management Governance KA Webinar slides.pdf
CYBOK: Risk Management Governance KA Webinar slides.pdfCYBOK: Risk Management Governance KA Webinar slides.pdf
CYBOK: Risk Management Governance KA Webinar slides.pdf
 
Safety hazard-identification-on-construction-projects
Safety hazard-identification-on-construction-projectsSafety hazard-identification-on-construction-projects
Safety hazard-identification-on-construction-projects
 
Ppt for IMPROVEMENT OF SAFETY THROUGH SAFETY MANAGAMENT PLAN – office p...
Ppt for IMPROVEMENT OF SAFETY   THROUGH    SAFETY MANAGAMENT PLAN –  office p...Ppt for IMPROVEMENT OF SAFETY   THROUGH    SAFETY MANAGAMENT PLAN –  office p...
Ppt for IMPROVEMENT OF SAFETY THROUGH SAFETY MANAGAMENT PLAN – office p...
 

Recently uploaded

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 

Recently uploaded (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 

Risk and Safety in Work Environments

  • 1. Risk and Safety in Work Environments Mahsa Teimourikia, PhD Student Supervised by: Prof. Mariagrazia Fugini Politecnico di Milano mahsa.teimourikia@polimi.it June 2015
  • 2. Polo Territoriale di Como 2 Outlines • Motivation and Objectives • Overview of our research • Definitions • Methodology: • Risk Assessment • Future Work
  • 3. Polo Territoriale di Como 3 Motivations [1] K. Smith, Environmental hazards: assessing risk and reducing disaster, Routledge, 2013. • In environmental risk management, providing security and safety for people and various resources dynamically, according what happens in the environment is an open issue [1]. • In monitored environments, where risks can be acknowledged via sensors and spatial data technologies, risk should be assessed to be able to provide required safety and security.
  • 4. Polo Territoriale di Como 4 The Definition of Risk Risk: hazards and abnormalities recognized in an environment that indicate a threat to the infrastructures and/or the civilians • (e.g., If sensors indicate gas leak, there is a risk of fire and explosion.). • Risks can be avoided via preventive strategies (e.g., closing the gas flow). • Risks contain attributes like Type, IntensityLevel, and Location.
  • 5. Polo Territoriale di Como 5 The Steps in Risk Management
  • 6. Polo Territoriale di Como 6 Risk Assessment (ISO 31000:2009) • Risk Identification: A process to understand what could happen, how, when and why • Risk Analysis: Concerned with developing an understanding of each risk, its consequences, and the likelihood of those consequences to happen. • Risk Evaluation: Involves making a decision about the level of risk and the priority for attention through the application the criteria developed when the context was established.
  • 7. Polo Territoriale di Como 7 Risk Assessment (ISO 31000:2009) • Risk assessment is a methodological framework for determining the nature and extent of the risk associated with an activity. Including: – Identification of relevance sources (threats, hazards, opportunities). – Cause and consequence analysis, including assessment of exposure and vulnerabilities. – Risk description. • The risk assessment provides a description of risk related to loss of lives and injuries as a result of these hazards, based on relevant data, models and expert judgments. The assessment thus produces knowledge about safety related phenomena, processes, events, etc.;
  • 8. Polo Territoriale di Como 8 Risk Treatment (ISO 31000:2009) • Involves evaluation and selection from options, prioritizing and implementing the selected treatment through a planned process. • Options to be considered during risk treatment: – Avoiding the risk by deciding not to start or continue with the activity that gives rise to the risk. – Removing the risk source – Changing the likelihood – Changing the consequences – …
  • 9. Polo Territoriale di Como 9 Main Risk Assessment Methods • Qualitative Techniques: – Check lists, what-if Analysis, Safety Audits, Task Analysis, STEP technique, HAZOP • Quantitative Techniques: – PRAT Technique, DMRA Technique, Risk measures of societal risk, QRA technique, QADS, CREA method, PEA method, WRA • Hybrid Techniques: – HEAT/HFEA, FTA, ETA, RBM
  • 10. Polo Territoriale di Como 10 Going back to our research
  • 11. Polo Territoriale di Como 11 The Risk Management System (RMS) [2] • The RMS receives the inputs from sensors and monitoring devices, recognizes the risks in the environment and produces a Risk Map and preventive Strategies accordingly. [2] M. Fugini, C. Raibulet, and L. Ubezio, "Risk assessment in work environments: modeling and simulation," Concurrency and Computation: Practice and Experience, vol. 24, no. 18, pp. 2381-2403, 2012.
  • 12. Polo Territoriale di Como 14 What we consider... In our context we consider:  The use of risk definition patterns to avoid malformed definitions  The use of best practices to define risk patterns to avoid missing some risks  The indication of strategies for risk management, to be executed through a set of corrective actions.
  • 13. Polo Territoriale di Como 15 What we consider... The definition of risk implies the specification of the following information:  A risk name that clearly identify it. To identify a risk the system must learn from BP, namely:  Workers experience  Working environment law  Rescue/Safety force repots  Accident statistical information  A verbal/textual definition of the risk.
  • 14. Polo Territoriale di Como 16 What we consider... And prescriptions:  Identify the causes of the risk  Identify the events and their correlation to identify a risk situation  Identify the measure for the level of risk  Identify by which means such measures can be extracted from the working environment and the acquisition strategies.  Enumerate the actions performed on the environment to reduce the risk level  Identify by which means it would be possible to check that the proposed preventive action have been applied.
  • 15. Polo Territoriale di Como 17 What we consider: Risk Levels What is the risk level? How to model a risk level?  Each risk should be associated with a risk level expressing its severity.  Not all risks lead to the same consequences. Why risk level should be modeled?  To maintain the level of risk to the lowest possible  In case of multiple risks the level is a good measure for prioritizing their treatments.
  • 16. Polo Territoriale di Como 18 Characterizing the Risk We identify risk through some properties reported below:
  • 17. Polo Territoriale di Como 19 Risk Computation/Assessment Elements used in risk computation:
  • 18. Polo Territoriale di Como 20 Risk Computation/Assessment
  • 19. Polo Territoriale di Como 21 Risk Computation/Assessment
  • 20. Polo Territoriale di Como 22 Problems of the analytical risk computation It is difficult to obtain validity ranges for coefficients from experimental data; Risk coefficients should not be bound to any other factor in the expression, since the worn protections and the procedures in place should offer a constant support to reduction of the risk for a person independently of his distance from dangers. The distance parameter could make risk values oscillate out of the prescribed range. In fact even short distances can increase the risk to very high levels. Although conceptually correct, this could lead to problems during the elaboration of risk formulas.
  • 21. Polo Territoriale di Como 23 To solve the problems… The security coefficient has been separated from the computation of the actual danger by subtracting a numeric valued depending of the protections used to prevent a damage caused by the considered element. The distance has been substituted by a Gaussian coefficient dependent on both the distance from the dangerous source and on the danger type, giving a value between 0 and 1. Such value is multiplied with the dangerousness Pr in order to smoothen its contribute with the increase of the distance.
  • 22. Polo Territoriale di Como 24 The risk formula
  • 23. Polo Territoriale di Como 25 The risk formula in two dimensional space
  • 24. Polo Territoriale di Como 26 Moving from Risk to Safety Safety: The condition of being safe; freedom from danger, risk or injury. • the absence of accidents that are events involving an unplanned and unacceptable loss. • Safety as low or acceptable risk.
  • 25. Polo Territoriale di Como 27 Risk Management vs. Safety Management • Very similar concepts • Safety management can be considered as the subset of risk management. • Risk refers to a broader concept that can include: financial, reputation, legal, business, and market share risks.
  • 26. Polo Territoriale di Como 28 Bow-tie Model Bow-tie Model: Several hazards/threats can cause a hazardous event which may have consequences.
  • 27. Polo Territoriale di Como 29 Uncertainty models in Safety Management • Uncertainty can apply at different levels: – Uncertainty of input data – Uncertainty of the risk assessment model – Uncertainty of output data • Uncertainty plays an important part in decision making specifically when it comes to security and safety.
  • 28. Polo Territoriale di Como 30 Selected Publications • Fugini, Mariagrazia, and Mahsa Teimourikia, George Hadjichristofi. "Web-Based Cooperative Tool for Risk Treatment under Adaptive Security Rules." submitted for publication at Special Issue on Semantic Web for Cooperation - Future Generation Computer Systems, Elsevier Editor. • Fugini, Mariagrazia, and Mahsa Teimourikia. "RAMIRES: Risk Adaptive Management In Resilient Environments with Security" Submitted for publication in WETICE Conference (WETICE), 2015 IEEE 24th International. IEEE, 2015. • Fugini, Mariagrazia, and Mahsa Teimourikia. "Risks in smart environments and adaptive access controls." Innovative Computing Technology (INTECH), 2014 Fourth International Conference on. IEEE, 2014. • Fugini, Mariagrazia, and Mahsa Teimourikia. "Access Control Privileges Management for Risk Areas." Information Systems for Crisis Response and Management in Mediterranean Countries. Springer International Publishing, 2014. 98-111. • Fugini, Mariagrazia, George Hadjichristofi, and Mahsa Teimourikia. "Adaptive Security for Risk Management Using Spatial Data." Database and Expert Systems Applications. Springer International Publishing, 2014. • Fugini, Mariagrazia, George Hadjichristofi, and Mahsa Teimourikia. "Dynamic Security Modeling in Risk Management Using Environmental Knowledge." WETICE Conference (WETICE), 2014 IEEE 23rd International. IEEE, 2014.
  • 29. Polo Territoriale di Como 31 Contact Information • Drop an email to: Mahsa.teimourikia@polimi.it • View profile in: Polimi Deib: http://home.deib.polimi.it/teimourikia  Office:  Via Ponzio, Edificio 21, First Floor, Office no. 19
  • 30. Polo Territoriale di Como 32 References • [1] Bahr, Nicholas J. System safety engineering and risk assessment: a practical approach. CRC Press, 2014. • [2] Purdy, Grant. "ISO 31000: 2009—setting a new standard for risk management."Risk analysis 30.6 (2010): 881-886. • [3] Aven, Terje. "On the new ISO guide on risk management terminology."Reliability engineering & System safety 96.7 (2011): 719-726. • [4] Aven, Terje, et al. Uncertainty in Risk Assessment: The Representation and Treatment of Uncertainties by Probabilistic and Non-probabilistic Methods. John Wiley & Sons, 2013. • [5] Rausand, Marvin. Risk assessment: Theory, methods, and applications. Vol. 115. John Wiley & Sons, 2013. • [6] Marhavilas, Pan-K., D. Koulouriotis, and V. Gemeni. "Risk analysis and assessment methodologies in the work sites: on a review, classification and comparative study of the scientific literature of the period 2000–2009." Journal of Loss Prevention in the Process Industries 24.5 (2011): 477-523 • [7] Fugini, Mariagrazia, Claudia Raibulet, and Luigi Ubezio. "Risk assessment in work environments: modeling and simulation." Concurrency and computation: Practice and experience 24.18 (2012): 2381-2403.
  • 31. Polo Territoriale di Como 33 Thank You