Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

Refine search results

Journals help
Authors help
Years help

Results found: 42

first rewind previous Page / 3 next fast forward last

Search results

Search:
in the keywords:  risk analysis
help Sort By:

help Limit search:
first rewind previous Page / 3 next fast forward last
EN
Threats have accompanied humanity since the dawn of time. Most of them can develop into crisis situations that can be interpreted in many different ways. The crisis situation is closely linked with the concept of crisis management, which is implemented in four phases. At every stage of work, various elements are significant in terms of crisis management. There are also elements that are very important at every stage. These include: threat analysis, estimation of the probability of their occurrence in a given area, and assessment of their sensitivity. An appropriate information flow system supports the implementation of the above elements. This system should be effective in such relations as between services and between services and society. The effectiveness of information flow depends on the reliability of this information and its flow channel. Information is of particular importance in the decision-making process. It should have appropriate features and properties. Based on the information, both good and bad decisions can be made. In crisis management, this can be relevant to human health and even human life. This article discusses issues related to the nature of information in crisis management.
EN
Semivariance is an intuitive risk measure because it concentrates on the shortfall below a target and not on total variation. To successfully use semivariance in practice, however, a statistical estimator of semivariance is needed; Josephy and Aczel provide such an estimator. Unfortunately, they have not correctly proven asymptotic unbiasedness and mean squared error consistency of their estimator since their proof contains a mistake. This paper corrects the computational mistake in Josephy-Aczel’s original proof and, that way, allows researchers and practitioners in the field of downside portfolio selection, hedging, downside asset pricing, risk measurement in a regulatory context, and performance measurement to work with a meaningfully specified downside measure.
EN
IS/IT Risk management is the process of risk reduction through the appropriate security measures. Effective risk management in an organization requires a composite approach to risk analysis. Based on the risk analysis results, the author selected the safeguards which should be cost-effective and take into account law requirements, business needs and requirements resulting from the risk analysis. Economic efficiency, in this case, can be described as an attempt to minimize the total cost of the information system security risks management. The paper presents selected models, methods and indicators that can be used in achieving the effectiveness of investment in information systems security.
EN
This paper is dedicated to the topic of security in the context of activities carried out by organisations. The analysis of the security-related context of the enterprises, decisions and threats that often co-occur with organisational activities is an interesting challenge for a researcher. The aspiration to ensure their own survival and undisturbed development is the basic driving force behind all organisations. In the following paper, the author explains the meaning of basic terms connected with the aforementioned issues, such as uncertainty, risk and security. The models and dimensions of control are discussed consecutively, as well as the methods and techniques utilised in risk assessment. Control and risk analysis are currently the means of counteracting threats that is most commonly used in organisations. The aim of the paper is to carry out the review of the hitherto existing research stipulations regarding the sphere of organisational security. The author points out that the problem of organisational security, treated as a core research subject, may be successfully developed and elaborated within the framework of security sciences discipline.
EN
A non-financial enterprise with receivables or liabilities denominated in a foreign currency is exposed to currency risk. Wanting to calculate a financial reserve in order to secure its receivables or liabilities, an enterprise can introduce the concept of the value at risk. To determine value at risk, an enterprise has to know the probability distribution of the future value of the receivable or the liability for a specific moment in future. Using a geometric Brownian motion to reflect exchange rate changes is among the possible solutions. The aim of the paper is to indicate that using the Monte Carlo simulation for forecasting the currency risk of an enterprise is a clear, easy-to-implement and flexible in terms of the assumptions approach. The flexibility of the Monte Carlo approach relies on the possibility to take up the assumption that the currency position changes caused by currency fluctuations have an other than normal probability distribution.
EN
Information is the factor which can decide about the potential and market value of a company. An increase in the value of intellectual capital of an information-driven company requires development of an effective security management system. More and more often companies develop information security management systems (ISMS) based on already verified models. In the article, the main problems with management of information security were discussed. Security models were described, as well as the risk analysis in information security management.
EN
The traditional methods of risk quantification include a sensitivity analysis, a scenario analysis and a historical simulation. The true nature of risk factors changes is ignored in the traditional ‘ceteris paribus’ approach to a sensitivity analysis, hence it can be reflected in a scenario analysis and a historical simulation. The most significant disadvantage of a scenario analysis is the limited number of scenarios, whereas a historical simulation depends on historical data availability and adequacy. The Monte Carlo simulation is a clear answer to the limitations of traditional methods. The changes of risk factors reflected in the Monte Carlo simulation are simultaneous, non-linear and interdependent. The most important aspect of this method is the stage of taking up the assumptions. The purpose of the paper is to indicate that considering several reasonable sets of assumptions for the Monte Carlo simulation simultaneously can bring even more comprehensive information about enterprise risk.
EN
This paper is dedicated to the topic of security in the context of activities carried out by organisations. The analysis of the security-related context of the enterprises, decisions and threats that often co-occur with organisational activities is an interesting challenge for a researcher. The aspiration to ensure their own survival and undisturbed development is the basic driving force behind all organisations. In the following paper, the author explains the meaning of basic terms connected with the aforementioned issues, such as uncertainty, risk and security. The models and dimensions of control are discussed consecutively, as well as the methods and techniques utilised in risk assessment. Control and risk analysis are currently the means of counteracting threats that is most commonly used in organisations. The aim of the paper is to carry out the review of the hitherto existing research stipulations regarding the sphere of organisational security. The author points out that the problem of organisational security, treated as a core research subject, may be successfully developed and elaborated within the framework of security sciences discipline.
EN
International aviation organizations require Poland to define the so-called acceptable level of safety for traffic accidents. To calculate this, one requires statistical data on accidents. These, however, in recent years did not occur, or the size of the sample is insufficient. In the paper a method for predicting the number of accidents on the basis of information on air incidents is mentioned. This method can be efficient and effective if any regular relation between the air traffic accident and serious incident exists. In the paper a way to find this relation is proposed, by analyzing the relevant simulation models of serious incidents and accidents. For this purpose Petri nets were used.
EN
Purpose: It is stated that the high mortality rate of cer-vical cancer worldwide can be reduced by early diag-nosis, effective observation, and treatment pro-grams. It was aimed to evaluate the correlation be-tween cervical cancer and screening and the health be-liefs of married women living in two different ethnic groups. Materials and methods: This research was con-ducted as a comparative descriptive study. 211 Roma (Gypsies) and 202 non-Roma married women included in the study. The data was obtained in the research by the introductory survey form and the "Cervical Cancer and Pap Smear Test Health Belief Model Scale". Per-centage, mean, t-test, chi-square tests were used in the evaluation of the data. A logistic regression analysis was used. Before the start of the research was received approval by the Ethics Committee. Results: The average age of the non-Roma women who participated in the survey was found 40.3 ± 10.5 (min: 20, max: 67). Non-Roma women were found to have received a pap-smear test at a higher rate (about 4 times more) than Roma women (p˂0.001, OR=3.723, 95%, CI 2.472, 5.607). Non-Roma women were found to have a higher pap-smear test rate (3-fold higher) than Roma women and found that the differ-ence between them was statistically significant (p˂0.001, OR=2.932, 95%, CI 1.855, 4.635). Conclusions: Roma women, a disadvantaged group, were found to hear fewer pap-smear tests, have less knowledge about the test, take fewer pap smears than non-Roma women and especially they did not have the pap-smear test because they did not know it.
EN
Background: The article presents a method of estimating the security level which indicates how probable it is for a phenomenon to occur. Objectives: The author attempts to answer the question: How do we estimate security? Decision makers usually need percentage showing the probability of an incident taking place in the future. This information is needed in the first place, later decision makers can use more descriptive information. Methods: The research problem concerns the assessment of security using the estimation method. Depicting security in numbers is difficult, thus the descriptive method is also usually applied. The estimation method facilitates the assessment. It is helpful since it is partly done by calculation and partly by guessing or approximation. Based on a case study analysing whether a terrorist attack may occur, the author also used tools such as averaging expert predictions, scenario analysis and risk analysis. Results: This article provides a view on forecasting security, which results in a method of estimating the level of security. Conclusions: The author presents an approach which allows to initially estimate the security level of the analyzed phenomenon in a relatively short period of time.
12
Content available remote

Risk analysis as a basis for food safety strategy

88%
Zarządzanie i Finanse
|
2015
|
vol. 4
|
issue 1
105-117
PL
Food health safety is the most important characteristic of food quality for consumers. They expect food should be safe. Food safety is regulated by the UE food law and Polish food law. Based on legal requirements it can be concluded that the fundamental principles of the food safety strategy are: best practices, HACCP system, traceability, the European Food Safety Authority (EFSA), food safety inspections and authorities, and the Rapid Alert System for Food and Feed (RASFF). Procedures for food safety are based on the scientific food risk analysis. The main aim of this paper is to characterize the food risk analysis as the fundamental element of the strategy for food safety assurance in the UE. The scientific risk analysis is built of a three stage process: risk assessment, risk management, and risk information. EFSA actively participates in the whole process of the risk analysis. System HACCP and other systems of food safety management i.e. system according to ISO 22000 standard, are also based on risk analysis
EN
Objective: While artisanal mining takes place in casual framework and with total ignorance of good practices, few studies have focused on the origin of hazards specific to each workplace constitutive of this exploitation facility. Nevertheless, this study is a condition of an efficient occupational health and safety control in this sector. Materials and Method: We took the effort to identify different workplaces, as well as hazards specific to each of them, through the observation and analysis of the tasks, tools and the processes related to their use applied in the Ruashi artisanal mine. Results: The investigated exploitation facility consists of five workplaces: diggers (60% – in charge of mineralized gangue recovery); crushers; washers; hand-made furnace workers (in charge of various treatment processes); and loaders (in charge of packing the obtained material). Beside the risks common to these various workplaces and ensuing notably from the lack of hygiene and working in bad positions, operating in underground galleries, in particular, exposes diggers to the risks connected with collapsing parts of the mine, suffocation, dehydration or fine particles in the breathed air. Crushers are especially exposed to traumatism risks, notably ocular, and loaders are exposed to risks related to handling heavy loads. These risks are connected with the mining processes because, in spite of the similarity of tools, they appear less often in other forms of artisanal exploitation described in literature. It is notable in the case of crushing in sawed gas bottles where ocular trauma risk is decreased. It was also shown that humidification of work surface reduces dust particles emission into the air. Conclusions: Hazards identification, through a tools and processes description, has the advantage of providing information on reducing the occurrence of these risks. It shows that this reduction is not necessarily a consequence of the activity mechanization degree.
EN
The concept of dominant (semantic [Barańczak 1990], translators’ and translational, intersemiotic and methodological [Bednarczyk 1999; 2008; 2010]), is well established in Polish Translation Studies, where it has been mainly used as a tool of translation criticism. The objective of the article is to investigate possible applications of the concept in fields other than literary translation such as professionally oriented LSP‑translation courses. The term pragmatic dominant has been developed, which refers to the concept of high- and low‑risk information rather than to a strictly linguistic analysis. Using examples of official documents in translation, the article demonstrates how pragmatic dominant can be made didactically useful at various stages of the translation process from text analysis to translation quality assessment.
EN
Systematic analysis based on the assumption of rational behaviour of human being in addition to the mathematical models is based on the inherent factors in quantification of global risks. Decisions are made based on all available information, to act in order to maximize the utility. However, the current state of global quantification of risks based on the probability of economic loss scenarios, rationality of action in emergencies excludes and puts to the forefront scenarios likelihood and severity based on information asymmetry. If all risk takers were fully informed, it would avoid the moral hazard and the amount of individual risks would be stable in the global context.
EN
In this paper, we present a modification of the Weibull distribution for the Value-atRisk (VaR) estimation of investment portfolios on the precious metals market. The reason for using the Weibull distribution is the similarity of its shape to that of empirical distributions of metals returns. These distributions are unimodal, leptokurtic and have heavy tails. A portfolio analysis is carried out based on daily log-returns of four precious metals quoted on the London Metal Exchange: gold, silver, platinum and palladium. The estimates of VaR calculated using GARCH-type models with non-classical error distributions are compared with the empirical estimates. The preliminary analysis proves that using conditional models based on the modified Weibull distribution to forecast values of VaR is fully justified.
EN
The article presents safety issues related to on-site machining with the use of portable machine tools. Their advantage is the possibility of machining elements at places in which they are used. This especially refers to large-size constructions, welded elements and any items whose disassembly is technically difficult. The authors present tasks performed by the operators of portable machining equipment, working conditions, construction and characteristic features of portable machine tools on the example of a portable boring machine, milling machine and flange facing machine. The presented characteristics can influence the safety of work with these machines. The information given in the article were used to asses risk at the position of a portable machine tool operator. The assessment was conducted using the Risk Score method taking into account four stages of using portable machine tools, i.e. transport, assembly/disassembly, machining and maintenance. The result of the conducted risk analysis is the proposal of possible risk reducing actions. Due to the specificity of the operation of portable machine tools which significantly impedes the development of a machine tool which would be safe in and of itself, the proposed actions refer mainly to organisational solutions. The work presents also the thesis that it is possible to decrease the risk at this position thanks to the use of numerical control in a portable machine tool. Such a solution may reduce exposure to some identified threats. The issue is presented on the example of a prototype of a portable flange facing machine developed in the Institute of Mechanical Technology ZUT in Szczecin.
|
2016
|
vol. 61
|
issue 6 (371)
21-37
EN
The method of risk-based supervision, developed by the American banking supervision, is in its nature a universal method that can be successfully applied in other areas. Due to vast global experience in the field and the advancement of this method, it is worth observing the application of the approach to the financial market and considering other areas in which it can potentially be applied, and to what extent and in what way it can be transferred. Even more so, since recently a project appeared to make certain public organs obliged to apply this approach, which has met with serious objections on the part of several audit bodies. For a few years, the Supreme Audit Office of Poland has been also directing towards performing its duties on the basis of risk analysis, which is clearly visible in its audit plans and in NIK’s publications.
PL
W pracy przedstawiono propozycję uwzględnienia specyfiki statystyki publicznej, jako istotnego warunku dobrze wykonanej analizy ryzyka grup informacji (II poziom) przy założeniu 3-poziomowej struktury modelu bezpieczeństwa informacji w krajowej organizacji statystycznej o strukturze korporacyjnej hierarchiczno-sieciowej. Model trójpoziomowej struktury modelu zarządzania bezpieczeństwem informacji został zaproponowany w metodyce TISM. Analizę ryzyka II poziomu można wykonać albo w oparciu o analizę zasobów organizacji, albo o analizę wszystkich procesów związanych z funkcjonowaniem organizacji w aspekcie jej bezpieczeństwa. W przypadku braku mapy procesów w organizacji, w jakimś stopniu niedoskonałym substytutem rozwiązania takiej sytuacji może być analiza poszczególnych specyfik funkcjonowania danej organizacji, która grupuje pewne procesy w ramach właściwości każdej z nich. W pracy zilustrowano wykorzystanie specyfik statystyki publicznej w analizie ryzyka II poziomu.
EN
We present a proposal for including characteristics of public statistics as a precondition of validity for any level II risk analysis based on a 3-layered model of information security in a national statistic organization with hierarchical-networking corporate structure. 3-layered model is proposed using the TISM methodology. The risk analysis can be based on corporate resources or all business processes within the organization related to its security. In case of lack of a mapping of relationships between processes, there is a possibility of an imperfect substitute in the form of an analysis of specifics of organisational functions, which groups some processes by their characteristics. An example is given to illustrate utilization of the characteristics of public statistics in level II risk analysis.
PL
Artykuł prezentuje nową technikę analizy ryzyka. Analiza Zagrożenia Ludności i Mienia (People and Property Hazard Analysis – PPHA) jest probabilistyczną, półilościową techniką, nieskomplikowaną i łatwą do zastosowania. Zapewnia bardziej precyzyjne szacunki poziomu ryzyka niż Wstępna Analiza Zagrożeń (Preliminary Hazard Analysis – PHA) – prawdopodobnie najbardziej powszechnie wykorzystywana przez jednostki samorządu terytorialnego w Polsce. PPHA można zastosować w analizie wszystkich wspólnot i organizacji. Celem nowej techniki jest zapewnienie narzędzia, które wesprze decydentów w efektywnym alokowaniu ograniczonych zasobów w szerokim wachlarzu potencjalnych inwestycji mogących obniżać ryzyko. Uzupełnienie artykułu stanowi aktywny formularz zawierający dane wejściowe i wyliczenia potrzebne do oszacowania ryzyka dla przykładowych zagrożeń przedstawionych w jego treści. Ma on również ułatwić stosowanie techniki PPHA w praktyce.
EN
This article presents new risk analysis technique. The People and Property Hazard Analysis (PPHA) is probabilistic, semiquantitative technique, uncomplicated and easy to use. It provides more precise estimates of a risk level than preliminary hazard analysis – probably the most commonly performed technique by local governments in Poland. PPHA is applicable to the analysis of all types of communities and organizations. The purpose of the new technique is to provide a tool that can assist decision-makers in effectively allocating limited resources across the vast array of potential investments that could mitigate risk.
first rewind previous Page / 3 next fast forward last
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.