SlideShare a Scribd company logo
1 of 31
Risk and Safety in Work Environments
Mahsa Teimourikia, PhD Student
Supervised by: Prof. Mariagrazia Fugini
Politecnico di Milano
mahsa.teimourikia@polimi.it
June 2015
Polo Territoriale di Como
2
Outlines
• Motivation and Objectives
• Overview of our research
• Definitions
• Methodology:
• Risk Assessment
• Future Work
Polo Territoriale di Como
3
Motivations
[1] K. Smith, Environmental hazards: assessing risk and reducing disaster, Routledge, 2013.
• In environmental risk management, providing
security and safety for people and various
resources dynamically, according what happens
in the environment is an open issue [1].
• In monitored environments, where risks can be
acknowledged via sensors and spatial data
technologies, risk should be assessed to be able
to provide required safety and security.
Polo Territoriale di Como
4
The Definition of Risk
Risk: hazards and abnormalities recognized in an
environment that indicate a threat to the
infrastructures and/or the civilians
• (e.g., If sensors indicate gas leak, there is a risk
of fire and explosion.).
• Risks can be avoided via preventive strategies
(e.g., closing the gas flow).
• Risks contain attributes like Type, IntensityLevel,
and Location.
Polo Territoriale di Como
5
The Steps in Risk Management
Polo Territoriale di Como
6
Risk Assessment (ISO 31000:2009)
• Risk Identification: A process to understand
what could happen, how, when and why
• Risk Analysis: Concerned with developing an
understanding of each risk, its consequences,
and the likelihood of those consequences to
happen.
• Risk Evaluation: Involves making a decision
about the level of risk and the priority for
attention through the application the criteria
developed when the context was established.
Polo Territoriale di Como
7
Risk Assessment (ISO 31000:2009)
• Risk assessment is a methodological framework for
determining the nature and extent of the risk associated
with an activity. Including:
– Identification of relevance sources (threats,
hazards, opportunities).
– Cause and consequence analysis, including
assessment of exposure and vulnerabilities.
– Risk description.
• The risk assessment provides a description of risk
related to loss of lives and injuries as a result of these
hazards, based on relevant data, models and expert
judgments. The assessment thus produces knowledge
about safety related phenomena, processes, events, etc.;
Polo Territoriale di Como
8
Risk Treatment (ISO 31000:2009)
• Involves evaluation and selection from options,
prioritizing and implementing the selected treatment
through a planned process.
• Options to be considered during risk treatment:
– Avoiding the risk by deciding not to start or
continue with the activity that gives rise to the
risk.
– Removing the risk source
– Changing the likelihood
– Changing the consequences
– …
Polo Territoriale di Como
9
Main Risk Assessment Methods
• Qualitative Techniques:
– Check lists, what-if Analysis, Safety Audits, Task
Analysis, STEP technique, HAZOP
• Quantitative Techniques:
– PRAT Technique, DMRA Technique, Risk
measures of societal risk, QRA technique, QADS,
CREA method, PEA method, WRA
• Hybrid Techniques:
– HEAT/HFEA, FTA, ETA, RBM
Polo Territoriale di Como
10
Going back to our research
Polo Territoriale di Como
11
The Risk Management System (RMS) [2]
• The RMS receives the inputs from sensors and
monitoring devices, recognizes the risks in the
environment and produces a Risk Map and preventive
Strategies accordingly.
[2] M. Fugini, C. Raibulet, and L. Ubezio, "Risk assessment in work environments: modeling and simulation,"
Concurrency and Computation: Practice and Experience, vol. 24, no. 18, pp. 2381-2403, 2012.
Polo Territoriale di Como
14
What we consider...
In our context we consider:
 The use of risk definition patterns to avoid
malformed definitions
 The use of best practices to define risk
patterns to avoid missing some risks
 The indication of strategies for risk
management, to be executed through a set
of corrective actions.
Polo Territoriale di Como
15
What we consider...
The definition of risk implies the specification of the following
information:
 A risk name that clearly identify it. To
identify a risk the system must learn from
BP, namely:
 Workers experience
 Working environment law
 Rescue/Safety force repots
 Accident statistical information
 A verbal/textual definition of the risk.
Polo Territoriale di Como
16
What we consider...
And prescriptions:
 Identify the causes of the risk
 Identify the events and their correlation to
identify a risk situation
 Identify the measure for the level of risk
 Identify by which means such measures can be
extracted from the working environment and the
acquisition strategies.
 Enumerate the actions performed on the
environment to reduce the risk level
 Identify by which means it would be possible to
check that the proposed preventive action have
been applied.
Polo Territoriale di Como
17
What we consider: Risk Levels
What is the risk level? How to model a risk level?
 Each risk should be associated with a risk
level expressing its severity.
 Not all risks lead to the same
consequences.
Why risk level should be modeled?
 To maintain the level of risk to the lowest
possible
 In case of multiple risks the level is a good
measure for prioritizing their treatments.
Polo Territoriale di Como
18
Characterizing the Risk
We identify risk through some properties
reported below:
Polo Territoriale di Como
19
Risk Computation/Assessment
Elements used in risk computation:
Polo Territoriale di Como
20
Risk Computation/Assessment
Polo Territoriale di Como
21
Risk Computation/Assessment
Polo Territoriale di Como
22
Problems of the analytical risk computation
It is difficult to obtain validity ranges for coefficients
from experimental data;
Risk coefficients should not be bound to any other
factor in the expression, since the worn protections
and the procedures in place should offer a constant
support to reduction of the risk for a person
independently of his distance from dangers.
The distance parameter could make risk values
oscillate out of the prescribed range. In fact even
short distances can increase the risk to very high
levels. Although conceptually correct, this could lead
to problems during the elaboration of risk formulas.
Polo Territoriale di Como
23
To solve the problems…
The security coefficient has been separated from
the computation of the actual danger by
subtracting a numeric valued depending of the
protections used to prevent a damage caused by
the considered element.
The distance has been substituted by a Gaussian
coefficient dependent on both the distance from the
dangerous source and on the danger type, giving a
value between 0 and 1. Such value is multiplied with
the dangerousness Pr in order to smoothen its
contribute with the increase of the distance.
Polo Territoriale di Como
24
The risk formula
Polo Territoriale di Como
25
The risk formula in two dimensional space
Polo Territoriale di Como
26
Moving from Risk to Safety
Safety: The condition of being safe; freedom from
danger, risk or injury.
• the absence of accidents that are events
involving an unplanned and unacceptable loss.
• Safety as low or acceptable risk.
Polo Territoriale di Como
27
Risk Management vs. Safety Management
• Very similar concepts
• Safety management can be considered as
the subset of risk management.
• Risk refers to a broader concept that can
include: financial, reputation, legal,
business, and market share risks.
Polo Territoriale di Como
28
Bow-tie Model
Bow-tie Model: Several hazards/threats can
cause a hazardous event which may have
consequences.
Polo Territoriale di Como
29
Uncertainty models in Safety Management
• Uncertainty can apply at different levels:
– Uncertainty of input data
– Uncertainty of the risk assessment
model
– Uncertainty of output data
• Uncertainty plays an important part in
decision making specifically when it
comes to security and safety.
Polo Territoriale di Como
30
Selected Publications
• Fugini, Mariagrazia, and Mahsa Teimourikia, George Hadjichristofi. "Web-Based
Cooperative Tool for Risk Treatment under Adaptive Security Rules." submitted for
publication at Special Issue on Semantic Web for Cooperation - Future Generation
Computer Systems, Elsevier Editor.
• Fugini, Mariagrazia, and Mahsa Teimourikia. "RAMIRES: Risk Adaptive Management
In Resilient Environments with Security" Submitted for publication in WETICE
Conference (WETICE), 2015 IEEE 24th International. IEEE, 2015.
• Fugini, Mariagrazia, and Mahsa Teimourikia. "Risks in smart environments and
adaptive access controls." Innovative Computing Technology (INTECH), 2014 Fourth
International Conference on. IEEE, 2014.
• Fugini, Mariagrazia, and Mahsa Teimourikia. "Access Control Privileges Management
for Risk Areas." Information Systems for Crisis Response and Management in
Mediterranean Countries. Springer International Publishing, 2014. 98-111.
• Fugini, Mariagrazia, George Hadjichristofi, and Mahsa Teimourikia. "Adaptive
Security for Risk Management Using Spatial Data." Database and Expert Systems
Applications. Springer International Publishing, 2014.
• Fugini, Mariagrazia, George Hadjichristofi, and Mahsa Teimourikia. "Dynamic
Security Modeling in Risk Management Using Environmental Knowledge." WETICE
Conference (WETICE), 2014 IEEE 23rd International. IEEE, 2014.
Polo Territoriale di Como
31
Contact Information
• Drop an email to:
Mahsa.teimourikia@polimi.it
• View profile in:
Polimi Deib:
http://home.deib.polimi.it/teimourikia
 Office:
 Via Ponzio, Edificio 21, First Floor,
Office no. 19
Polo Territoriale di Como
32
References
• [1] Bahr, Nicholas J. System safety engineering and risk assessment: a practical
approach. CRC Press, 2014.
• [2] Purdy, Grant. "ISO 31000: 2009—setting a new standard for risk
management."Risk analysis 30.6 (2010): 881-886.
• [3] Aven, Terje. "On the new ISO guide on risk management terminology."Reliability
engineering & System safety 96.7 (2011): 719-726.
• [4] Aven, Terje, et al. Uncertainty in Risk Assessment: The Representation and
Treatment of Uncertainties by Probabilistic and Non-probabilistic Methods. John
Wiley & Sons, 2013.
• [5] Rausand, Marvin. Risk assessment: Theory, methods, and applications. Vol. 115.
John Wiley & Sons, 2013.
• [6] Marhavilas, Pan-K., D. Koulouriotis, and V. Gemeni. "Risk analysis and assessment
methodologies in the work sites: on a review, classification and comparative study of
the scientific literature of the period 2000–2009." Journal of Loss Prevention in the
Process Industries 24.5 (2011): 477-523
• [7] Fugini, Mariagrazia, Claudia Raibulet, and Luigi Ubezio. "Risk assessment in
work environments: modeling and simulation." Concurrency and computation:
Practice and experience 24.18 (2012): 2381-2403.
Polo Territoriale di Como
33
Thank You

More Related Content

Viewers also liked

Viewers also liked (10)

Interjections
InterjectionsInterjections
Interjections
 
Volunteering idioms
Volunteering idiomsVolunteering idioms
Volunteering idioms
 
Visiting the pharmacist mb
Visiting the pharmacist mbVisiting the pharmacist mb
Visiting the pharmacist mb
 
Candian government
Candian governmentCandian government
Candian government
 
ACTEP2014: Patient safety & risk management
ACTEP2014: Patient safety & risk managementACTEP2014: Patient safety & risk management
ACTEP2014: Patient safety & risk management
 
Business idioms
Business idiomsBusiness idioms
Business idioms
 
Home and House idioms
Home and House idiomsHome and House idioms
Home and House idioms
 
Back to school idioms 3
Back to school idioms 3Back to school idioms 3
Back to school idioms 3
 
Business meeting idioms
Business meeting idiomsBusiness meeting idioms
Business meeting idioms
 
Electrical Safety and Risk Assessments
Electrical Safety and Risk AssessmentsElectrical Safety and Risk Assessments
Electrical Safety and Risk Assessments
 

Similar to Risk and Safety in Work Environments

PRMG195 - Rsik Management Case Study.pdf
PRMG195 - Rsik Management Case Study.pdfPRMG195 - Rsik Management Case Study.pdf
PRMG195 - Rsik Management Case Study.pdfmohamed Ismail
 
Lecture 02. OSH Risk Assessment
Lecture 02. OSH Risk Assessment Lecture 02. OSH Risk Assessment
Lecture 02. OSH Risk Assessment KateKazhan
 
Software IT risk-management
Software IT risk-managementSoftware IT risk-management
Software IT risk-managementgufranresearcher
 
RAMIRES: Risk Adaptive Management In Resilient Environments with Security
RAMIRES: Risk Adaptive Management In Resilient Environments with SecurityRAMIRES: Risk Adaptive Management In Resilient Environments with Security
RAMIRES: Risk Adaptive Management In Resilient Environments with SecurityMahsa Teimourikia
 
Risk Assessment.ppt
Risk Assessment.pptRisk Assessment.ppt
Risk Assessment.pptCaptDevendra
 
Hse, Risk Assessment
Hse, Risk AssessmentHse, Risk Assessment
Hse, Risk AssessmentTara Smith
 
CHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docx
CHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docxCHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docx
CHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docxchristinemaritza
 
M1-1-SMS_Aerodrome_Hazard Identfication.pdf
M1-1-SMS_Aerodrome_Hazard Identfication.pdfM1-1-SMS_Aerodrome_Hazard Identfication.pdf
M1-1-SMS_Aerodrome_Hazard Identfication.pdfGSEProject
 
Risk management of telecommunication and engineering laboratory
Risk management of telecommunication and engineering laboratoryRisk management of telecommunication and engineering laboratory
Risk management of telecommunication and engineering laboratorySalam Shah
 
Session 01 _Risk Assessment Program for YSP_Introduction, Definitions and Sta...
Session 01 _Risk Assessment Program for YSP_Introduction, Definitions and Sta...Session 01 _Risk Assessment Program for YSP_Introduction, Definitions and Sta...
Session 01 _Risk Assessment Program for YSP_Introduction, Definitions and Sta...Muizz Anibire
 
Project Risk Management-Pankaj K Sinha
Project Risk Management-Pankaj K SinhaProject Risk Management-Pankaj K Sinha
Project Risk Management-Pankaj K SinhaPankaj K Sinha
 
D12 1 risk assessment_final-web
D12 1 risk assessment_final-webD12 1 risk assessment_final-web
D12 1 risk assessment_final-webDir Jan
 
Dynamic Security Modeling in Risk Management Using Environmental Knowledge
Dynamic Security Modeling in Risk Management Using Environmental KnowledgeDynamic Security Modeling in Risk Management Using Environmental Knowledge
Dynamic Security Modeling in Risk Management Using Environmental KnowledgeMahsa Teimourikia
 
Risk Management (1) (1).ppt
Risk Management (1) (1).pptRisk Management (1) (1).ppt
Risk Management (1) (1).pptAjjuSingh2
 
HIRA (hazard identification risk assessment)
HIRA (hazard identification risk assessment)HIRA (hazard identification risk assessment)
HIRA (hazard identification risk assessment)PrasantakumarNayak4
 
Hira – hazard identification & risk assessment
Hira – hazard identification & risk assessment Hira – hazard identification & risk assessment
Hira – hazard identification & risk assessment Salim Solanki
 
CYBOK: Risk Management Governance KA Webinar slides.pdf
CYBOK: Risk Management Governance KA Webinar slides.pdfCYBOK: Risk Management Governance KA Webinar slides.pdf
CYBOK: Risk Management Governance KA Webinar slides.pdfHari319621
 
Safety hazard-identification-on-construction-projects
Safety hazard-identification-on-construction-projectsSafety hazard-identification-on-construction-projects
Safety hazard-identification-on-construction-projectsAHMED NADIM JILANI
 
Ppt for IMPROVEMENT OF SAFETY THROUGH SAFETY MANAGAMENT PLAN – office p...
Ppt for IMPROVEMENT OF SAFETY   THROUGH    SAFETY MANAGAMENT PLAN –  office p...Ppt for IMPROVEMENT OF SAFETY   THROUGH    SAFETY MANAGAMENT PLAN –  office p...
Ppt for IMPROVEMENT OF SAFETY THROUGH SAFETY MANAGAMENT PLAN – office p...AMIT SAHU
 

Similar to Risk and Safety in Work Environments (20)

PRMG195 - Rsik Management Case Study.pdf
PRMG195 - Rsik Management Case Study.pdfPRMG195 - Rsik Management Case Study.pdf
PRMG195 - Rsik Management Case Study.pdf
 
Risk Management 1 (2)
Risk Management 1 (2)Risk Management 1 (2)
Risk Management 1 (2)
 
Lecture 02. OSH Risk Assessment
Lecture 02. OSH Risk Assessment Lecture 02. OSH Risk Assessment
Lecture 02. OSH Risk Assessment
 
Software IT risk-management
Software IT risk-managementSoftware IT risk-management
Software IT risk-management
 
RAMIRES: Risk Adaptive Management In Resilient Environments with Security
RAMIRES: Risk Adaptive Management In Resilient Environments with SecurityRAMIRES: Risk Adaptive Management In Resilient Environments with Security
RAMIRES: Risk Adaptive Management In Resilient Environments with Security
 
Risk Assessment.ppt
Risk Assessment.pptRisk Assessment.ppt
Risk Assessment.ppt
 
Hse, Risk Assessment
Hse, Risk AssessmentHse, Risk Assessment
Hse, Risk Assessment
 
CHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docx
CHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docxCHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docx
CHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docx
 
M1-1-SMS_Aerodrome_Hazard Identfication.pdf
M1-1-SMS_Aerodrome_Hazard Identfication.pdfM1-1-SMS_Aerodrome_Hazard Identfication.pdf
M1-1-SMS_Aerodrome_Hazard Identfication.pdf
 
Risk management of telecommunication and engineering laboratory
Risk management of telecommunication and engineering laboratoryRisk management of telecommunication and engineering laboratory
Risk management of telecommunication and engineering laboratory
 
Session 01 _Risk Assessment Program for YSP_Introduction, Definitions and Sta...
Session 01 _Risk Assessment Program for YSP_Introduction, Definitions and Sta...Session 01 _Risk Assessment Program for YSP_Introduction, Definitions and Sta...
Session 01 _Risk Assessment Program for YSP_Introduction, Definitions and Sta...
 
Project Risk Management-Pankaj K Sinha
Project Risk Management-Pankaj K SinhaProject Risk Management-Pankaj K Sinha
Project Risk Management-Pankaj K Sinha
 
D12 1 risk assessment_final-web
D12 1 risk assessment_final-webD12 1 risk assessment_final-web
D12 1 risk assessment_final-web
 
Dynamic Security Modeling in Risk Management Using Environmental Knowledge
Dynamic Security Modeling in Risk Management Using Environmental KnowledgeDynamic Security Modeling in Risk Management Using Environmental Knowledge
Dynamic Security Modeling in Risk Management Using Environmental Knowledge
 
Risk Management (1) (1).ppt
Risk Management (1) (1).pptRisk Management (1) (1).ppt
Risk Management (1) (1).ppt
 
HIRA (hazard identification risk assessment)
HIRA (hazard identification risk assessment)HIRA (hazard identification risk assessment)
HIRA (hazard identification risk assessment)
 
Hira – hazard identification & risk assessment
Hira – hazard identification & risk assessment Hira – hazard identification & risk assessment
Hira – hazard identification & risk assessment
 
CYBOK: Risk Management Governance KA Webinar slides.pdf
CYBOK: Risk Management Governance KA Webinar slides.pdfCYBOK: Risk Management Governance KA Webinar slides.pdf
CYBOK: Risk Management Governance KA Webinar slides.pdf
 
Safety hazard-identification-on-construction-projects
Safety hazard-identification-on-construction-projectsSafety hazard-identification-on-construction-projects
Safety hazard-identification-on-construction-projects
 
Ppt for IMPROVEMENT OF SAFETY THROUGH SAFETY MANAGAMENT PLAN – office p...
Ppt for IMPROVEMENT OF SAFETY   THROUGH    SAFETY MANAGAMENT PLAN –  office p...Ppt for IMPROVEMENT OF SAFETY   THROUGH    SAFETY MANAGAMENT PLAN –  office p...
Ppt for IMPROVEMENT OF SAFETY THROUGH SAFETY MANAGAMENT PLAN – office p...
 

Recently uploaded

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Recently uploaded (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Risk and Safety in Work Environments

  • 1. Risk and Safety in Work Environments Mahsa Teimourikia, PhD Student Supervised by: Prof. Mariagrazia Fugini Politecnico di Milano mahsa.teimourikia@polimi.it June 2015
  • 2. Polo Territoriale di Como 2 Outlines • Motivation and Objectives • Overview of our research • Definitions • Methodology: • Risk Assessment • Future Work
  • 3. Polo Territoriale di Como 3 Motivations [1] K. Smith, Environmental hazards: assessing risk and reducing disaster, Routledge, 2013. • In environmental risk management, providing security and safety for people and various resources dynamically, according what happens in the environment is an open issue [1]. • In monitored environments, where risks can be acknowledged via sensors and spatial data technologies, risk should be assessed to be able to provide required safety and security.
  • 4. Polo Territoriale di Como 4 The Definition of Risk Risk: hazards and abnormalities recognized in an environment that indicate a threat to the infrastructures and/or the civilians • (e.g., If sensors indicate gas leak, there is a risk of fire and explosion.). • Risks can be avoided via preventive strategies (e.g., closing the gas flow). • Risks contain attributes like Type, IntensityLevel, and Location.
  • 5. Polo Territoriale di Como 5 The Steps in Risk Management
  • 6. Polo Territoriale di Como 6 Risk Assessment (ISO 31000:2009) • Risk Identification: A process to understand what could happen, how, when and why • Risk Analysis: Concerned with developing an understanding of each risk, its consequences, and the likelihood of those consequences to happen. • Risk Evaluation: Involves making a decision about the level of risk and the priority for attention through the application the criteria developed when the context was established.
  • 7. Polo Territoriale di Como 7 Risk Assessment (ISO 31000:2009) • Risk assessment is a methodological framework for determining the nature and extent of the risk associated with an activity. Including: – Identification of relevance sources (threats, hazards, opportunities). – Cause and consequence analysis, including assessment of exposure and vulnerabilities. – Risk description. • The risk assessment provides a description of risk related to loss of lives and injuries as a result of these hazards, based on relevant data, models and expert judgments. The assessment thus produces knowledge about safety related phenomena, processes, events, etc.;
  • 8. Polo Territoriale di Como 8 Risk Treatment (ISO 31000:2009) • Involves evaluation and selection from options, prioritizing and implementing the selected treatment through a planned process. • Options to be considered during risk treatment: – Avoiding the risk by deciding not to start or continue with the activity that gives rise to the risk. – Removing the risk source – Changing the likelihood – Changing the consequences – …
  • 9. Polo Territoriale di Como 9 Main Risk Assessment Methods • Qualitative Techniques: – Check lists, what-if Analysis, Safety Audits, Task Analysis, STEP technique, HAZOP • Quantitative Techniques: – PRAT Technique, DMRA Technique, Risk measures of societal risk, QRA technique, QADS, CREA method, PEA method, WRA • Hybrid Techniques: – HEAT/HFEA, FTA, ETA, RBM
  • 10. Polo Territoriale di Como 10 Going back to our research
  • 11. Polo Territoriale di Como 11 The Risk Management System (RMS) [2] • The RMS receives the inputs from sensors and monitoring devices, recognizes the risks in the environment and produces a Risk Map and preventive Strategies accordingly. [2] M. Fugini, C. Raibulet, and L. Ubezio, "Risk assessment in work environments: modeling and simulation," Concurrency and Computation: Practice and Experience, vol. 24, no. 18, pp. 2381-2403, 2012.
  • 12. Polo Territoriale di Como 14 What we consider... In our context we consider:  The use of risk definition patterns to avoid malformed definitions  The use of best practices to define risk patterns to avoid missing some risks  The indication of strategies for risk management, to be executed through a set of corrective actions.
  • 13. Polo Territoriale di Como 15 What we consider... The definition of risk implies the specification of the following information:  A risk name that clearly identify it. To identify a risk the system must learn from BP, namely:  Workers experience  Working environment law  Rescue/Safety force repots  Accident statistical information  A verbal/textual definition of the risk.
  • 14. Polo Territoriale di Como 16 What we consider... And prescriptions:  Identify the causes of the risk  Identify the events and their correlation to identify a risk situation  Identify the measure for the level of risk  Identify by which means such measures can be extracted from the working environment and the acquisition strategies.  Enumerate the actions performed on the environment to reduce the risk level  Identify by which means it would be possible to check that the proposed preventive action have been applied.
  • 15. Polo Territoriale di Como 17 What we consider: Risk Levels What is the risk level? How to model a risk level?  Each risk should be associated with a risk level expressing its severity.  Not all risks lead to the same consequences. Why risk level should be modeled?  To maintain the level of risk to the lowest possible  In case of multiple risks the level is a good measure for prioritizing their treatments.
  • 16. Polo Territoriale di Como 18 Characterizing the Risk We identify risk through some properties reported below:
  • 17. Polo Territoriale di Como 19 Risk Computation/Assessment Elements used in risk computation:
  • 18. Polo Territoriale di Como 20 Risk Computation/Assessment
  • 19. Polo Territoriale di Como 21 Risk Computation/Assessment
  • 20. Polo Territoriale di Como 22 Problems of the analytical risk computation It is difficult to obtain validity ranges for coefficients from experimental data; Risk coefficients should not be bound to any other factor in the expression, since the worn protections and the procedures in place should offer a constant support to reduction of the risk for a person independently of his distance from dangers. The distance parameter could make risk values oscillate out of the prescribed range. In fact even short distances can increase the risk to very high levels. Although conceptually correct, this could lead to problems during the elaboration of risk formulas.
  • 21. Polo Territoriale di Como 23 To solve the problems… The security coefficient has been separated from the computation of the actual danger by subtracting a numeric valued depending of the protections used to prevent a damage caused by the considered element. The distance has been substituted by a Gaussian coefficient dependent on both the distance from the dangerous source and on the danger type, giving a value between 0 and 1. Such value is multiplied with the dangerousness Pr in order to smoothen its contribute with the increase of the distance.
  • 22. Polo Territoriale di Como 24 The risk formula
  • 23. Polo Territoriale di Como 25 The risk formula in two dimensional space
  • 24. Polo Territoriale di Como 26 Moving from Risk to Safety Safety: The condition of being safe; freedom from danger, risk or injury. • the absence of accidents that are events involving an unplanned and unacceptable loss. • Safety as low or acceptable risk.
  • 25. Polo Territoriale di Como 27 Risk Management vs. Safety Management • Very similar concepts • Safety management can be considered as the subset of risk management. • Risk refers to a broader concept that can include: financial, reputation, legal, business, and market share risks.
  • 26. Polo Territoriale di Como 28 Bow-tie Model Bow-tie Model: Several hazards/threats can cause a hazardous event which may have consequences.
  • 27. Polo Territoriale di Como 29 Uncertainty models in Safety Management • Uncertainty can apply at different levels: – Uncertainty of input data – Uncertainty of the risk assessment model – Uncertainty of output data • Uncertainty plays an important part in decision making specifically when it comes to security and safety.
  • 28. Polo Territoriale di Como 30 Selected Publications • Fugini, Mariagrazia, and Mahsa Teimourikia, George Hadjichristofi. "Web-Based Cooperative Tool for Risk Treatment under Adaptive Security Rules." submitted for publication at Special Issue on Semantic Web for Cooperation - Future Generation Computer Systems, Elsevier Editor. • Fugini, Mariagrazia, and Mahsa Teimourikia. "RAMIRES: Risk Adaptive Management In Resilient Environments with Security" Submitted for publication in WETICE Conference (WETICE), 2015 IEEE 24th International. IEEE, 2015. • Fugini, Mariagrazia, and Mahsa Teimourikia. "Risks in smart environments and adaptive access controls." Innovative Computing Technology (INTECH), 2014 Fourth International Conference on. IEEE, 2014. • Fugini, Mariagrazia, and Mahsa Teimourikia. "Access Control Privileges Management for Risk Areas." Information Systems for Crisis Response and Management in Mediterranean Countries. Springer International Publishing, 2014. 98-111. • Fugini, Mariagrazia, George Hadjichristofi, and Mahsa Teimourikia. "Adaptive Security for Risk Management Using Spatial Data." Database and Expert Systems Applications. Springer International Publishing, 2014. • Fugini, Mariagrazia, George Hadjichristofi, and Mahsa Teimourikia. "Dynamic Security Modeling in Risk Management Using Environmental Knowledge." WETICE Conference (WETICE), 2014 IEEE 23rd International. IEEE, 2014.
  • 29. Polo Territoriale di Como 31 Contact Information • Drop an email to: Mahsa.teimourikia@polimi.it • View profile in: Polimi Deib: http://home.deib.polimi.it/teimourikia  Office:  Via Ponzio, Edificio 21, First Floor, Office no. 19
  • 30. Polo Territoriale di Como 32 References • [1] Bahr, Nicholas J. System safety engineering and risk assessment: a practical approach. CRC Press, 2014. • [2] Purdy, Grant. "ISO 31000: 2009—setting a new standard for risk management."Risk analysis 30.6 (2010): 881-886. • [3] Aven, Terje. "On the new ISO guide on risk management terminology."Reliability engineering & System safety 96.7 (2011): 719-726. • [4] Aven, Terje, et al. Uncertainty in Risk Assessment: The Representation and Treatment of Uncertainties by Probabilistic and Non-probabilistic Methods. John Wiley & Sons, 2013. • [5] Rausand, Marvin. Risk assessment: Theory, methods, and applications. Vol. 115. John Wiley & Sons, 2013. • [6] Marhavilas, Pan-K., D. Koulouriotis, and V. Gemeni. "Risk analysis and assessment methodologies in the work sites: on a review, classification and comparative study of the scientific literature of the period 2000–2009." Journal of Loss Prevention in the Process Industries 24.5 (2011): 477-523 • [7] Fugini, Mariagrazia, Claudia Raibulet, and Luigi Ubezio. "Risk assessment in work environments: modeling and simulation." Concurrency and computation: Practice and experience 24.18 (2012): 2381-2403.
  • 31. Polo Territoriale di Como 33 Thank You