Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Summary

Summary Lectures and Literature Security & Organisation

Rating
-
Sold
1
Pages
30
Uploaded on
27-10-2018
Written in
2018/2019

7 lectures and chapter 2 tm 6 Ben Ale; risk an introduction. For the minor Safety, Security and Justice

Institution
Course

Content preview

Lectures and literature Security and Organisaton


Lecture 1a
Shell Moerdijk indicent
Explosions at the Moerdijk installation. The first mistake was made  manually
heating up the vessels because the temperature was not increasing fast enough. This
caused the temperature to rise above normal levels. But this was not the main
problem. Another problem was that important information on the design was lost
and not available at that moment. Because of this shell was unable control the
failure. The pressure in the reactors raises so much because of the increased
temperature. This caused the reactors to explode. The conclusion is that Shell has
not learned enough from past mistakes. An important question within this problem
is: how can organizations manage safety and security in terms of risk? And therefore
prevent harm.

Uses of Risk:
1. Our organization faces many risks  risk as an event
2. The risk of a flood is 1:10.000  risks involved in an event
3. The risk in this facility is very high
4. Locks would reduce the risk of burglary  ensure more safety

We accept a certain amount of risk. To get to self-fulfillment, which is the top of the
Maslow pyramid unwanted side effects can occur. We try to prevent or minimize the
unwanted effects. But mostly they are not very harmful and do not always involve
death.
The annual loss expectancy is the expected monetary loss that can be expected for
an asset due to a risk over a one year period  expected frequency x expected
impact.
Risk characterizes uncertain future events in terms of likelihood and impact. 1 – e^-
x/x. This is exponential distribution. Often to calculate risk, models are used instead
of numbers.
The Trespass Project  say which attack opportunities are possible, which are most
urgent and which countermeasures are most effective. The project combines
knowledge from technical sciences, social sciences and state-of-the-art industry
processes and tools.
But it is important to see if the technology or the people must be fixed and if a
countermeasure always helps to improve the situation.


Lecture 1b
Safety is used when the threat is an unwanted side effect of something else we want.
Safety thus is associated with incidents and accidents. Security deals with malicious
acts, such as sabotage and terrorism. Safety is the condition of being safe, freedom


1

, from danger, risk, or injury. Danger is also called hazard or threat. Dangers make us
feel unsafe. Though models, risk science tries to understand the risk and help predict
future behavior and risks. These models are linear, the consequence has one single
cause. Definitions:
 Hazard: A potential source of harm or damage to people, property, or the
environment. Hazard has to be ‘controlled’ to be safe.
 Safety: Freedom from unacceptable risk.
 Risk: An estimate of the probability of a hazards-related incident or exposure
(= scenario) occurring and the severity of harm or damage that could result.
Approaches:
o Deterministic: only one outcome – MCA (maximum credible accident)
o Probabilistic: change variation. All 'conceivable' accidents in relation
to their probability of occurrence.


Lecture 2
Risk management is to protect 5 assets: life, properties, reputation, business
continuity and procedures. Risk management is important because it makes it easier
to set priorities and better management. In this lecture, the focus is on
organizational level of the policy from safety and security. Examples of policy
objectives could be: zero incidents; minimize organizational vulnerability; ensuring
safety, security and well being of personnel. There are hundreds of risk management
systems.

Security risk management  1. Prevent 2. Control 3. Stabilize

Safety risk management  1. Prevention 2. Recovery 3. Protection 4. Mitigation

Risk assessment is to identify and classify the risks:

1. Understand risk prioritization
a. What criteria are used?
b. Expert opinions or quantitative scoring methods
2. Understand the statistics for severity
a. Impact: deaths, permanent injury etc.
b. Likelihood
3. Prioritize risks based on severity, importance & risk appetite

Risk inventory is about classifying the key risk indicators. They are used to predict
a risk observation. This is mostly done in a quantitative way. Reported in key
performance indicators, which state what is most effective. This is done on the basis
of CBS, academic research, peer benchmarking, SWOT (strengths, weaknesses,
opportunities, threats). When looking at the nature and the source of the risk, this is
called root cause analysis.

Risk classification  What can go wrong (scenario’s)? What is the likelihood of it


2

Connected book

Written for

Institution
Study
Course

Document information

Summarized whole book?
No
Which chapters are summarized?
H 2 tm h 6
Uploaded on
October 27, 2018
Number of pages
30
Written in
2018/2019
Type
SUMMARY

Subjects

8.47 $
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
Tessdw

Get to know the seller

Seller avatar
Tessdw maerlant-lyceum
Follow You need to be logged in order to follow users or courses
Sold
9
Member since
13 year
Number of followers
9
Documents
0
Last sold
3 year ago

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions