Applied Safety Science and Engineering Techniques (ASSETTM) merge hazard based safety engineering and safety science principles in an overall framework of a safety
management process to achieve, maintain and continuously improve safety. The ASSET process has been synthesized from current, industry-standard risk assessment and risk management guidelines, including recent International Organization for
Standardization (ISO), International Electrotechnical Commission (IEC) and American National Standards Institute (ANSI) publications.
Health Informatics – Application of Clinical Risk Management to the Manufacture and Deployment of Health Software. Thick M. eHealth week 2010 (Barcelona: CCIB Convention Centre; 2010)
In the past decade, global business has experienced substantial growth; the manufacturing industry has played a large role in this expansion. Growth of the manufacturing industry, increased intelligence of manufacturing equipment, plus connectivity of equipment and software within and among companies has increased the probability of attacks and threats to these systems. Security infrastructure technologies in the manufacturing industry have not kept pace with the technological advancements that spurred the industry’s growth. A course is being designed at Purdue University to provide the working professional with knowledge in the integration of Automatic Identification and Data Capture (including biometrics) into the manufacturing environment. This paper discusses the issues and challenges facing the manufacturing industry and how these are incorporated into the curriculum design.
Health Informatics – Application of Clinical Risk Management to the Manufacture and Deployment of Health Software. Thick M. eHealth week 2010 (Barcelona: CCIB Convention Centre; 2010)
In the past decade, global business has experienced substantial growth; the manufacturing industry has played a large role in this expansion. Growth of the manufacturing industry, increased intelligence of manufacturing equipment, plus connectivity of equipment and software within and among companies has increased the probability of attacks and threats to these systems. Security infrastructure technologies in the manufacturing industry have not kept pace with the technological advancements that spurred the industry’s growth. A course is being designed at Purdue University to provide the working professional with knowledge in the integration of Automatic Identification and Data Capture (including biometrics) into the manufacturing environment. This paper discusses the issues and challenges facing the manufacturing industry and how these are incorporated into the curriculum design.
An Overview of Information Systems Security Measures in Zimbabwean Small and ...researchinventy
This paper reports on the Information Systems (IS) securitymeasures implemented by small and medium size enterprises (SMEs) in Zimbabwe. A survey questionnaire was distributed to 32 randomly selected participants in order to investigate the security measures and practices in their respective organisations. The results indicated that over 50% of the respondents had installed firewalls, while more than 80% carried out regular software updates and none of the respondents had intrusion detection systems. The researchers recommended that SMEs work to enhance their knowledge on the different IS threats in order to enable the implementation of preventive measures.
The advent of image-guided surgical technology has revolutionized conventional surgical techniques by providing surgeons with an intricate view of almost all body parts that includes the lobe of a brain, the nasal cavities, and even the structure of vertebrae in the spine. Computer-assisted image-guidance technology is a development to be on the lookout that will work in concert with minimally invasive techniques and is found to be much more powerful and elegant than simple X-ray technology. This minimally invasive technique enables the surgeons to obtain three-dimensional models of a patient’s anatomy that appears on a computer screen with virtual representations of real surgical instruments. Surgeries can even be fore planned virtually on the computer before a patient is subjected to anesthesia.
This presentation intends to specifically cover the unique integration of emerging technological advances in computer-assisted image-guidance and intraoperative image-guidance systems that will bring about fewer traumas to normal tissues, push forward the healing times, minor incisions, equivalent or better relief from pain, and last of all hasten the patient’s normal recovery. Highlights of the PPT include: outline of the surgical concepts behind image-guided surgery and robotic-assisted surgery; viewpoint on surgical robots designed to address surgeon’s limitations; enabling computer-assisted technologies for minimally invasive surgery, and future trends for image-guided surgical interventions sector.
Sobre A Haz que sempre atou no mercado gráfico e agora entra com total excelência no mercado de comunicação visual.
Com anos de experiência em impressão a Haz Gráfica Rápida e Comunicação Visual, tornou-se uma das principais referências no ramo de Comunicação Visual e Gráfica Rápida.
Com estrutura moderna e planejada, nossos clientes vão, desde simples impressões para trabalhos pessoais à grandes projetos corporativos.
Atentos à tecnologia de última geração, conseguimos garantir excelentes resultados com eficiência e qualidade.
Buscamos constantemente investir em treinamentos dos nossos colaboradores, o que faz da nossa equipe altamente qualificada e preparada, para melhor atendê-lo.
Solar energy is radiant light and heat from the sun harnessed using a range of ever-evolving technologies such as solar heating , solar photovoltaic's , solar thermal energy , solar architecture and artificial photosynthesis.
An Overview of Information Systems Security Measures in Zimbabwean Small and ...researchinventy
This paper reports on the Information Systems (IS) securitymeasures implemented by small and medium size enterprises (SMEs) in Zimbabwe. A survey questionnaire was distributed to 32 randomly selected participants in order to investigate the security measures and practices in their respective organisations. The results indicated that over 50% of the respondents had installed firewalls, while more than 80% carried out regular software updates and none of the respondents had intrusion detection systems. The researchers recommended that SMEs work to enhance their knowledge on the different IS threats in order to enable the implementation of preventive measures.
The advent of image-guided surgical technology has revolutionized conventional surgical techniques by providing surgeons with an intricate view of almost all body parts that includes the lobe of a brain, the nasal cavities, and even the structure of vertebrae in the spine. Computer-assisted image-guidance technology is a development to be on the lookout that will work in concert with minimally invasive techniques and is found to be much more powerful and elegant than simple X-ray technology. This minimally invasive technique enables the surgeons to obtain three-dimensional models of a patient’s anatomy that appears on a computer screen with virtual representations of real surgical instruments. Surgeries can even be fore planned virtually on the computer before a patient is subjected to anesthesia.
This presentation intends to specifically cover the unique integration of emerging technological advances in computer-assisted image-guidance and intraoperative image-guidance systems that will bring about fewer traumas to normal tissues, push forward the healing times, minor incisions, equivalent or better relief from pain, and last of all hasten the patient’s normal recovery. Highlights of the PPT include: outline of the surgical concepts behind image-guided surgery and robotic-assisted surgery; viewpoint on surgical robots designed to address surgeon’s limitations; enabling computer-assisted technologies for minimally invasive surgery, and future trends for image-guided surgical interventions sector.
Sobre A Haz que sempre atou no mercado gráfico e agora entra com total excelência no mercado de comunicação visual.
Com anos de experiência em impressão a Haz Gráfica Rápida e Comunicação Visual, tornou-se uma das principais referências no ramo de Comunicação Visual e Gráfica Rápida.
Com estrutura moderna e planejada, nossos clientes vão, desde simples impressões para trabalhos pessoais à grandes projetos corporativos.
Atentos à tecnologia de última geração, conseguimos garantir excelentes resultados com eficiência e qualidade.
Buscamos constantemente investir em treinamentos dos nossos colaboradores, o que faz da nossa equipe altamente qualificada e preparada, para melhor atendê-lo.
Solar energy is radiant light and heat from the sun harnessed using a range of ever-evolving technologies such as solar heating , solar photovoltaic's , solar thermal energy , solar architecture and artificial photosynthesis.
Privacy Protection in Distributed Industrial Systemiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This is the presentation slides on the paper "Safe & Sec Case Patterns" at ASSURE 2015. This research investigate how to integrate safety and security from process patterns and show an integrated assurance case for both.
A Step Change In Safety Management - An engica overview of safety management using electronic PTW systems with an Integrated SafeSystem of Work (ISSoW)
http://rismandukhan.wordpress.com
Module: [LIBR_01]_SIGE XIII_Method Prop to Design Radars
Topic: RESEARCH, DEVELOPMENT & INNOVATION
Subject: A Methodology Proposal to Design Radars - Systems Approach
Article by Antonio Sallum Librelato and Osamu Saotome, presented and published during the XIII SIGE. ITA, 27 a 30 de setembro de 2011.
Scope:
Abstract
I. INTRODUCTION
Motivations for the Systems Concepts Research (SCR) method
II. BRIEF DESCRIPTION OF THE SCR METHOD
Principles of SCR
Phases of the SCR
Purposes of SCR
III. NRA - NEEDS AND REQUIREMENTS ANALYSIS
Purposes of NRA
Steps and Tasks of NRA
IV. SCE - SYSTEMS CONCEPTS EXPLORATION
Purposes of SCE
Steps and Tasks of SCE
V. SCD - SYSTEM CONCEPT DEFINITION
Purposes of SCD
Steps and Tasks of SCD
VI. SRAA - SYSTEMS RISKS AND ASSURANCE ANALYSIS
Purposes of SRAA
Steps and Tasks of SRAA
VII. CONCLUSIONS
REFERENCES
John kingsley OT ICS SCADA Cyber security consultantJohn Kingsley
John kingsley OT ICS SCADA Cyber security consultant
SCADA ICS Security Courses
Lack of SCADA ICS security professionals that lead to big gaps between compliance against the respected guidelines with the real situation at site. Critical needs for proper security professional in SCADA ICS
SCADA ICS Security Assurance
Ensuring the SCADA ICS environment to comply with the security requirements in order to maintain the production operations and sustain the business performance
SCADA ICS (OT) Security Services
SCADA ICS Security Services Summary
SCADA ICS Security Asset Management
SCADA ICS Security Risk Management
SCADA ICS Security Assessment
SCADA ICS Standard, Policy & Procedure Management
SCADA ICS Security Implementation
Cyber Security Services
Vulnerability Assessment
Penetration Testing
ISO 27001 Certified Management System Audit
Case-Based Reasoning for the Evaluation of Safety Critical Software. Applicat...IJERDJOURNAL
ABSTRACT: The purpose of the work described in this paper is to improve the assessment of the safety analyses for railway transport systems in France. The modes of reasoning which are used in the context of safety analysis and the very nature of knowledge about safety mean that a conventional computing solution is unsuitable and the utilization of artificial intelligence techniques would seem to be more appropriate. The approach which was adopted in order to design and implement an assistance tool for safety analysis involved the following two main activities: – Extracting, formalizing and storing hazardous situations to produce a library of standard cases which covers the entire problem. This process entailed the use of knowledge acquisition techniques; – Exploiting the stored historical knowledge in order to develop safety analysis know-how which can assist experts to judge the thoroughness of the manufacturer’s suggested safety analysis. This second activity involves the use of machine learning techniques in particular the use of Case-Based Reasoning. This paper presents a mock-up of a tool for storing and assessing Software Error Effect Analysis (SEEA) for the safety of automatic devices of terrestrial guided transport system. The purpose of our work is to exploit historical SEEA, which have already been carried out on approved safety-critical software, in order to assess SEEA of new software.
Similar to Applied Safety Science and Engineering Techniques (ASSET) (20)
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...Underwriters Laboratories
This UL white paper discusses some of the many issues and challenges that must be addressed in the future deployment of wireless technology for the processing
of secure transactions. It begins with a discussion of the strengths and limitations of both contactless and wireless technologies. The white paper then reviews and assesses internal system risks, as well as external security concerns, for both technologies. The paper concludes with some thoughts on the future use of wireless technology in secure transactions, and how manufacturers can provide assurances to both system providers and users regarding the security of their private data.
This UL white paper provides an overview of the issues related to the presence of
pharmaceuticals and personal care products (PPCPs) in drinking water. The paper
discusses the possible effects of PPCPs on humans and on the environment and
summarizes recent research conducted by U.S. government agencies, UL and others on
PPCP concentrations found in public drinking water supplies and wastewater facilities.
The white paper also discusses available water treatment options for reducing PPCP concentrations and their relative effectiveness. The paper concludes with areas for
further research and a preview of possible future regulatory actions.
Recent research regarding the modern residence fire is providing new insights into the advantages and limitations of current smoke alarm technologies. This white paper summarizes recent and current research conducted at UL on the changing nature of residential fires and the effectiveness of smoke alarm
technologies, and discusses the implications of this research for future standards development.
This UL white paper reviews Brazil’s current regulatory framework for medical
devices, and the requirements for those entities seeking to manufacture, import or
sell medical devices in the country. It also discusses the registration and certification
process required of all device manufacturers, importers and distributors, and the
steps necessary to secure and maintain approval for medical devices. This white
paper includes information on requirements found in RDC 27/IN-3 and Resolution 350,
published by Brazilian regulatory authorities in June 2011.
Technological advances and the increased allocation of electromagnetic spectrum for advanced communications have produced a wave of new electronic and digital devices
that communicate wirelessly. As a result, product manufacturers are increasingly abandoning wired communications interfaces in favor of wireless technologies that offer greater user mobility without compromising transmission speed and accuracy. But obtaining worldwide regulatory approval for products with integrated wireless modules is a complex process.
In the European Union (EU), compliance with the essential requirements of the EU’s directive on Radio & Telecommunications Terminal Equipment (also known as the R&TTE Directive) is required for all wireless transmitters, including wireless modules integrated into end host devices. Ensuring compliance with the Directive’s essential requirements is the legal obligation of any party that seeks to import or sell such devices in the EU. However, unlike regulations in the United States that require manufacturers to obtain approval either from the FCC or an FCC-approved telecommunications certification body (TCB), the EU approval process for wireless modules offer manufacturers some flexibility in their chosen method for demonstrating compliance, including the ability to self-declare compliance with the applicable harmonized standards.
This white paper from UL is discusses the key regulatory compliance and approval issues facing manufacturers and importers of host devices with integrated wireless modules. This paper provides information on the regulations regarding the sale of host devices with integrated wireless modules in the EU and guidance on how to efficiently navigate the Union’s regulatory approval process.
In January 2010, “IEC 62368-1 Ed 1.0: Audio/Video, Information and Communication Technology Equipment — Safety Requirements” was published as an international standard. The development was an outcome of almost eight years of planning, hard work and dedication by IEC TC108, the IEC technical committee responsible for standards for safety of electronic equipment within the field of audio/video, information technology, and communication technology.
This paper provides background on the new standard and looks ahead to the challenges and potential impact of its implementation.
The Life Cycle of Materials -- How New Phone Technology Affects the EnvironmentUnderwriters Laboratories
In just 30 years, mobile telephony has grown into a major global industry, with an estimated 5 billion users around the world (compared with a total world population of just under 7 billion people). While new subscriber growth has slowed somewhat in recent years, product turnover remains high, with over 1 billion new mobile phones shipped in 2009 alone. As a result of ever-advancing technology and product obsolescence in this market, it is estimated that some 300,000 mobile phones are sent to the trash every day in the United States alone.
This white paper examines the overall environmental impact of materials used in mobile phones, from the extraction of raw materials and component manufacturing required to produce the latest models, to the appropriate recovery and recycling of these products at end-of-life (EoL). While the scope of this paper is limited to mobile phones, similar materials are used in many other high technology products, including personal computers, portable entertainment players, and other types of information and communications devices. Energy consumption and radio frequency emissions at the product level are outside the scope of this paper.
Underwriters Laboratories (UL), a world leader in safety testing and certification released the first in a series of white papers that review evolving battery technology.
This paper explores many of the issues and opportunities associated with the new technology as well as current and recommended safety standards to address changes in the technology and use.
Lithium-ion battery technologies have evolved over the last two decades, with batteries now offering longer cycle life and improved reliability for products in the areas of consumer electronics, medical devices, industrial equipment and automotive applications. In the white paper, UL explains the need for risk assessment as part of the product design and development process to identify and address root causes of safety issues.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Applied Safety Science and Engineering Techniques (ASSET)
1. Applied Safety Science and
Engineering Techniques (ASSETTM)
The Evolution of Hazard Based Safety Engineering into the
Framework of a Safety Management Process
2. Applied Safety Science and Engineering Techniques (ASSET TM )
Applied Safety Science and Engineering
Techniques (ASSETTM)
The Evolution of Hazard Based Safety Engineering
into the Framework of a Safety Management Process
Applied Safety Science and Engineering Techniques (ASSET TM) merge hazard based
safety engineering and safety science principles in an overall framework of a safety
management process to achieve, maintain and continuously improve safety. The
ASSET process has been synthesized from current, industry-standard risk assessment
and risk management guidelines, including recent International Organization for
Standardization (ISO), International Electrotechnical Commission (IEC) and American
National Standards Institute (ANSI) publications.
Basic relationships are explored among hazards, exposure and harm to persons,
property and the environment. Various potential approaches to protect against harm
are then explored in the framework of safety management, systems engineering,
quality management systems, concurrent engineering, human factors and other
relevant principles.
This ASSET safety management process has potential application in virtually any
industry and product segment to support informed decisions on solutions to difficult
safety issues, using sound safety science and engineering experience and judgment.
This paper covers the ASSET safety management process, its guiding principles and
objectives.
ASSET Objective
The objective of the ASSET Process of Safety Management is to utilize Applied
Safety Science and Engineering Techniques (ASSET TM), together with existing standards,
codes and regulations, to achieve, maintain and continuously improve the safety of
products, processes and services for safer living and working environments. ASSET TM
is a trademark of UL LLC.
page 2
3. Applied Safety Science and Engineering Techniques (ASSET TM )
Background National Lab, 2011 Today’s Engineering of identified standards, codes and/or
This paper follows the introductory paper, Challenges – Tomorrow’s Solutions regulations that may potentially apply.
Applied Safety Science and Engineering Technical Conference and Exhibition. The scope and context of the assessment
Techniques (ASSETTM): Taking Hazard Based itself is also established, including
With essential technical input and
Safety Engineering (HBSE) to the Next boundaries, and scope alignment on
development of Bob Davidson and
Level, which was presented at the 2010 all three counts is sought. In this early
strategic leadership of Dan Bejnarowicz,
International Symposium on Product stage and throughout the process,
ASSET was developed in the safety
Compliance Engineering (ISPCE) of the potential gaps need to be identified and
management process framework.
Institute of Electrical and Electronics bridged. A gap may exist for example,
Notification has just been made that this
Engineers (IEEE) Product Safety if a product, process or service – in the
ASSET work has earned a 2011 IEEE Region 1
Engineering Society, and had established context of its application – does not fall
Award (Northeastern US) in the category
the case and set the stage for ASSET. completely within the scope of existing
of Technological Innovation (Industry or
safety standards. Another gap may exist
A similar paper was published by the Government): For significant Patents, for
whereby a product, process or service
American Society of Safety Engineers discovery of new devices, development of
falls within the scope of a safety
in their Safety Health and Environment applications or exemplary contributions
standard, but involves features, functions,
(SH&E) Standards Digest, a publication to industry or government.
technologies or applications that may
of their Engineering Practice Specialty.
ASSET also reflects concepts of the
ASSET Application introduce a safety hazard, and not
be anticipated or addressed by the
ANSI/ASSE Z690 series, the US national The ASSET process has application in
requirements in the standard.
adoption of ISO 31000, ISO/IEC 31010 and areas including the development of
safety standards, codes, and regulations,
ISO Guide 73, initiating membership on ASSET and Standards
the ISO Technical Advisory Group (TAG) and the design, evaluation, compliance,
ASSET provides a process and
on Risk Management. certification and safety management
methodology for complementing
of products, processes and services.
Certain ASSET principles have been existing standards in evaluating the
As such, ASSET applies to functions
applied and presented in recent safety of products, processes or services;
and responsibilities including safety
conferences including the 2009 NASA assisting in the evaluation of products,
designers, regulatory compliance,
Aerospace Battery Workshop ("FTA {Fault processes or services not within the scope
product safety certifiers, standards/codes
Tree Analysis} / FMEA {Failure Modes and of existing standards; and evaluating
developers and product and program
Effects Analysis} Safety Analysis Model for product features such as materials and
safety managers. ASSET can also help
Lithium-ion Batteries"), ASEAN/ ACCSQ constructions, functions, technologies or
to integrate and address the needs of
2010 ("ASEAN-US Enhanced Partnership applications not anticipated or covered
various stakeholders including
Workshop on Hazard-Based Engineering by existing standards. In these situations
regulators, AHJs, standards developers,
Principles for the Electrical and Electronic ASSET can be applied to help identify
trade and professional organizations,
Equipment: A Risk-Based Approach Applied hazards not anticipated or covered
consumer groups, government agencies
to Li-Ion Battery (LIB) Hazards"), as well by existing standards and the need
and the public.
as ICPHSO 2011 (International Consumer for additional requirements to meet
Product Health and Safety Organization, For example, relevant safety the safety objective or intent of the
“Hazard Analysis: Hazard Based Safety requirements are generally determined standards, and help identify alternative
Engineering & Fault Tree Analysis”).The by first establishing the scope of the protective measures not anticipated
ASSET Safety Management process was product, process, or service in question. by the standard but which can achieve
presented for the IEEE and Argonne This scope is then compared to the scope an equivalent level of safety to the
page 3
4. Applied Safety Science and Engineering Techniques (ASSET TM )
START
DETERMINE SCOPE / CONTEXT
IDENTIFY / ANALYZE HAZARDS
ASSESS / DECIDE ON ACTION
SPECIFY / IDENTIFY / DESIGN PROTECTIVE MEASURES
EVALUATE PROTECTIVE MEASURES
NO ACCEPTABLE LEVEL OF SAFETY ACHIEVED?
YES
CONTROL / MONITOR / REVIEW
NO PRESENT LEVEL OF SAFETY MAINTAINED? YES
IDENTIFY OPPORTUNITIES FOR IMPROVEMENT
Figure 1: ASSET Process of Safety Management
protective measures specified in the ASSET Safety Safety Engineering (HBSE) was originally
standard, thereby meeting the safety Management Process conceived by HP/Agilent, and targeted
objective of the standard. typical types of hazards and forms of
The ASSET process of safety management
was developed as the evolution of injury involving electronics products,
In fact, the ASSET process stages include
such as information technology and
repeated “spec-checks”, whereby the hazard-based safety engineering
office equipment.
initially identified requirements are principles and safety science into
assessed at each stage. an overall framework of a safety The ASSET process is based on a number
management process. Hazard Based of acknowledged risk management / risk
page 4
5. Applied Safety Science and Engineering Techniques (ASSET TM )
assessment principles and processes, components, subsystems, environment This stage has goals to establish the
for example those found in publications and boundaries with interfaces and safety objective(s); determine the need
including but not limited to ISO/IEC Guide interactions; intended implementation, for protective measures; identify the
51, IEC Guide 116, ISO 31000, ISO/IEC 31010, operation, use, users and others affected; potential protective measure strategies,
ISO 14121, ISO 14971, IEC 60300-3-9 and conditions and requirements for categories and mechanisms; analyze
ANSI/ASSE Z690. installation; recommended procedures and prioritize protective measures;
This process involves stages to formulate for maintenance and repair; potential and specify, design and implement the
the right types of questions to identify effects of packing, shipping and storage; protective measures.
the scope of the product, system or reasonably foreseeable misuse by using
Evaluate Protective Measures
service to be evaluated for potential a sub-process developed to determine
degrees of reasonable foreseeable misuse The goal of this stage is to determine
harm; identify and analyze hazards and
and associated guidance; other whether protective measures are
potential sources of harm; identify,
conditions or factors of potential adequate and effective by evaluating
analyze and evaluate protective measures
impact; and applicable standards, whether and how protective measures
to reduce the risk of harm such as risk
codes and/or regulations. meet specific safety objectives;
of injury from products; assist in the
identifying safety attributes that
determination of whether or not an Identify / Analyze Hazards
are being relied upon and need to be
acceptable level of safety is achieved;
The goals of the stage are to identify controlled; and evaluating those safety
understand and apply methods to
potential types and sources of harm attributes. In order to determine if
maintain and continuously improve
(hazards); determine how harm can occur the goal of this stage is achieved, key
safety. This can help explain, apply and
such as hazardous situations, hazardous questions are asked which include
enhance existing requirements, and help
and harmful events, and the severity of the following:
address emerging technologies, products
the harm; sort consequences by the level • Have all the hazards
and applications.
of severity, in which initial consequence been identified?
This ASSET process was developed to evaluation is akin to worst case scenario,
address a broad spectrum of applications • Have the safety (risk reduction)
with guidance on severity factors, and
and each stage has different needs objectives been determined?
consideration of extent and exposure of
and significance for the assessment of harm; and determine if the applicable • Have the protective measures
different products, processes, services standards, codes and/or regulations intended to address the hazards
in different applications. The following address the identified hazards, or if there and achieve the safety objectives
provides a brief look at each ASSET are gaps that need to be addressed. been identified and designed?
process stage and its objectives.
Specify / Identify / Design • Have tests and evaluations been
Determine Scope / Context Protective Measures conducted to demonstrate that the
protective measures are capable
The goals of this stage are to determine In this stage, protective measures
of achieving the safety objectives
and attempt to align the scope and are specified, identified or designed,
with acceptable results?
context of the following: the product, depending on the given function and
process or service to be assessed, the responsibility being fulfilled. For example, • Have the constructions,
assessment itself and the initially a protective measure may be specified components and materials that
identified requirements. Relevant topics by developers of standards, codes and are relied upon for the protective
include the subject of the assessment, regulations, designed by a manufacturer measure to meet the safety
including systems aspects of materials, or identified by an evaluator. objectives been identified?
page 5
6. Applied Safety Science and Engineering Techniques (ASSET TM )
• Have their safety-related This may involve revisiting earlier process present level of safety is not being
characteristics (safety attributes), stages or discontinuing. maintained, there is a different need to
factors which may degrade those assess and decide on action. Again, this
This point of the ASSET process
characteristics, and the tests and generally involves conformance and may involve revisiting earlier process
evaluations needed to determine compliance activities. stages or discontinuing.
their adequacy been identified?
Control / Monitor / Review This point of the ASSET process generally
• Have the necessary evaluations to Maintain Safety involves activities including certification,
/ tests been performed with market and conformity surveillance,
At this stage, if determined that an
acceptable results? follow-up for certification mark integrity,
acceptable level of safety has been
updates in regulations, standards and
Through this point in the ASSET achieved, the goal is to ensure that
codes, and assessment of new/emerging
process, these stages generally involve safety is then maintained by establishing
technologies that may either benefit or
activities such as hazard based safety controls throughout the life cycle,
threaten safety.
engineering, safety research, safety up the supply chain, to ensure that
design, conformity assessment and new safety is maintained; monitoring field Identify Opportunities for Improvement
standards development. It is also noted performance down the supply chain The goal of this stage is to monitor and
that the evaluation of certain protective and factors that may impact safety identify the opportunity, or the need,
measures, including life safety devices, by means of surveillance and follow for improvement in safety and safety
may effectively begin at this stage. up; and periodically reviewing and standards and the processes, methods
Decision Gate: Acceptable Level assessing results and deciding on and tools used to determine whether and
of Safety Achieved? appropriate actions. how safety is achieved and maintained.
Decision Gate: Present Level These opportunities are then assessed
There are two basic outcomes of this
of Safety Maintained? to decide on action, which may involve
safety decision. If it is determined that
revisiting earlier process stages.
an acceptable level of safety has been Similar to the prior decision gate, there
achieved, then there is a need to control, are also two basic outcomes of this safety Activities involved in this stage of the
monitor and review to maintain safety. decision. If determined that the present ASSET process include improvements in
However, if an acceptable level of safety level of safety is being maintained, then regulations, standards and codes, as well
has not been achieved, there is a different there is a need to continue to control, as improvements in safety assessment
need to assess and decide on action. monitor, and review. However, if the processes, methods and tools.
page 6
7. Applied Safety Science and Engineering Techniques (ASSET TM )
Meeting the Objective
The stated objective of the ASSET process of safety management is to utilize Applied
Safety Science and Engineering Techniques (ASSET TM) together with existing standards,
codes and regulations to achieve, maintain and continuously improve the safety of
products, processes and services for safer living and working environments.
By this we mean to determine and achieve an acceptable level of safety, based on
specific safety objectives; maintain that present level of safety throughout the entire
lifecycle of the product, process or service, under all anticipated conditions, considering
upstream (suppliers) and downstream (users and all affected) the supply chain; and
continually seek and assess opportunities for improvement,based on the availability,
need or demand for improvements.
ASSET stresses the importance of assessing the sources, causes and conditions of harm,
as HBSE always has, as well as the risk of harm including severity, likelihood, extent,
exposure of harm. ASSET also addresses different forms of potential harm to various
entities, including injury or health risk to persons, harm to property or the environment
and even continuity of critical operations and functions. Sources are categorized in
terms of energy or matter/substance that may be harmful, from different sources in
various forms, conversions or conditions. The standard HBSE tools of the 3-block energy
transfer model for injury and HBSE process to evaluate a safeguard and standard injury
fault tree are adapted and expanded.
Then the most effective protective measure strategies can be determined, with
appropriate identification, evaluation and control of safety attributes - the very
properties and characteristics of protective measures relied upon to achieve, maintain
and improve this level of safety.
The ASSET process supports informed decisions using the best available information,
data and other resources, based on the best available knowledge and experience, at
progressive stages of development. This can help identify the degree of confidence in
the decision and the relative need and value of additional inputs or analysis. ASSET can
also serve as a tool for effective communication and interaction to share information,
as needed by various stakeholders.
For more information about the Applied Safety Science and Engineering Techniques
(ASSET TM) white paper, please contact Thomas Lanzisero, Senior Research Engineer at
thomas.p.lanzisero@ul.com.
page 7