Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

Refine search results

Journals help
Years help
Authors help

Results found: 38

first rewind previous Page / 2 next fast forward last

Search results

Search:
in the keywords:  risk analysis
help Sort By:

help Limit search:
first rewind previous Page / 2 next fast forward last
EN
Threats have accompanied humanity since the dawn of time. Most of them can develop into crisis situations that can be interpreted in many different ways. The crisis situation is closely linked with the concept of crisis management, which is implemented in four phases. At every stage of work, various elements are significant in terms of crisis management. There are also elements that are very important at every stage. These include: threat analysis, estimation of the probability of their occurrence in a given area, and assessment of their sensitivity. An appropriate information flow system supports the implementation of the above elements. This system should be effective in such relations as between services and between services and society. The effectiveness of information flow depends on the reliability of this information and its flow channel. Information is of particular importance in the decision-making process. It should have appropriate features and properties. Based on the information, both good and bad decisions can be made. In crisis management, this can be relevant to human health and even human life. This article discusses issues related to the nature of information in crisis management.
EN
This paper is dedicated to the topic of security in the context of activities carried out by organisations. The analysis of the security-related context of the enterprises, decisions and threats that often co-occur with organisational activities is an interesting challenge for a researcher. The aspiration to ensure their own survival and undisturbed development is the basic driving force behind all organisations. In the following paper, the author explains the meaning of basic terms connected with the aforementioned issues, such as uncertainty, risk and security. The models and dimensions of control are discussed consecutively, as well as the methods and techniques utilised in risk assessment. Control and risk analysis are currently the means of counteracting threats that is most commonly used in organisations. The aim of the paper is to carry out the review of the hitherto existing research stipulations regarding the sphere of organisational security. The author points out that the problem of organisational security, treated as a core research subject, may be successfully developed and elaborated within the framework of security sciences discipline.
EN
This paper is dedicated to the topic of security in the context of activities carried out by organisations. The analysis of the security-related context of the enterprises, decisions and threats that often co-occur with organisational activities is an interesting challenge for a researcher. The aspiration to ensure their own survival and undisturbed development is the basic driving force behind all organisations. In the following paper, the author explains the meaning of basic terms connected with the aforementioned issues, such as uncertainty, risk and security. The models and dimensions of control are discussed consecutively, as well as the methods and techniques utilised in risk assessment. Control and risk analysis are currently the means of counteracting threats that is most commonly used in organisations. The aim of the paper is to carry out the review of the hitherto existing research stipulations regarding the sphere of organisational security. The author points out that the problem of organisational security, treated as a core research subject, may be successfully developed and elaborated within the framework of security sciences discipline.
EN
International aviation organizations require Poland to define the so-called acceptable level of safety for traffic accidents. To calculate this, one requires statistical data on accidents. These, however, in recent years did not occur, or the size of the sample is insufficient. In the paper a method for predicting the number of accidents on the basis of information on air incidents is mentioned. This method can be efficient and effective if any regular relation between the air traffic accident and serious incident exists. In the paper a way to find this relation is proposed, by analyzing the relevant simulation models of serious incidents and accidents. For this purpose Petri nets were used.
EN
The traditional methods of risk quantification include a sensitivity analysis, a scenario analysis and a historical simulation. The true nature of risk factors changes is ignored in the traditional ‘ceteris paribus’ approach to a sensitivity analysis, hence it can be reflected in a scenario analysis and a historical simulation. The most significant disadvantage of a scenario analysis is the limited number of scenarios, whereas a historical simulation depends on historical data availability and adequacy. The Monte Carlo simulation is a clear answer to the limitations of traditional methods. The changes of risk factors reflected in the Monte Carlo simulation are simultaneous, non-linear and interdependent. The most important aspect of this method is the stage of taking up the assumptions. The purpose of the paper is to indicate that considering several reasonable sets of assumptions for the Monte Carlo simulation simultaneously can bring even more comprehensive information about enterprise risk.
EN
IS/IT Risk management is the process of risk reduction through the appropriate security measures. Effective risk management in an organization requires a composite approach to risk analysis. Based on the risk analysis results, the author selected the safeguards which should be cost-effective and take into account law requirements, business needs and requirements resulting from the risk analysis. Economic efficiency, in this case, can be described as an attempt to minimize the total cost of the information system security risks management. The paper presents selected models, methods and indicators that can be used in achieving the effectiveness of investment in information systems security.
EN
A non-financial enterprise with receivables or liabilities denominated in a foreign currency is exposed to currency risk. Wanting to calculate a financial reserve in order to secure its receivables or liabilities, an enterprise can introduce the concept of the value at risk. To determine value at risk, an enterprise has to know the probability distribution of the future value of the receivable or the liability for a specific moment in future. Using a geometric Brownian motion to reflect exchange rate changes is among the possible solutions. The aim of the paper is to indicate that using the Monte Carlo simulation for forecasting the currency risk of an enterprise is a clear, easy-to-implement and flexible in terms of the assumptions approach. The flexibility of the Monte Carlo approach relies on the possibility to take up the assumption that the currency position changes caused by currency fluctuations have an other than normal probability distribution.
EN
Semivariance is an intuitive risk measure because it concentrates on the shortfall below a target and not on total variation. To successfully use semivariance in practice, however, a statistical estimator of semivariance is needed; Josephy and Aczel provide such an estimator. Unfortunately, they have not correctly proven asymptotic unbiasedness and mean squared error consistency of their estimator since their proof contains a mistake. This paper corrects the computational mistake in Josephy-Aczel’s original proof and, that way, allows researchers and practitioners in the field of downside portfolio selection, hedging, downside asset pricing, risk measurement in a regulatory context, and performance measurement to work with a meaningfully specified downside measure.
EN
Information is the factor which can decide about the potential and market value of a company. An increase in the value of intellectual capital of an information-driven company requires development of an effective security management system. More and more often companies develop information security management systems (ISMS) based on already verified models. In the article, the main problems with management of information security were discussed. Security models were described, as well as the risk analysis in information security management.
EN
The method of risk-based supervision, developed by the American banking supervision, is in its nature a universal method that can be successfully applied in other areas. Due to vast global experience in the field and the advancement of this method, it is worth observing the application of the approach to the financial market and considering other areas in which it can potentially be applied, and to what extent and in what way it can be transferred. Even more so, since recently a project appeared to make certain public organs obliged to apply this approach, which has met with serious objections on the part of several audit bodies. For a few years, the Supreme Audit Office of Poland has been also directing towards performing its duties on the basis of risk analysis, which is clearly visible in its audit plans and in NIK’s publications.
11
Content available remote

Risk analysis as a basis for food safety strategy

88%
Zarządzanie i Finanse
|
2015
|
vol. 4
|
issue 1
105-117
PL
Food health safety is the most important characteristic of food quality for consumers. They expect food should be safe. Food safety is regulated by the UE food law and Polish food law. Based on legal requirements it can be concluded that the fundamental principles of the food safety strategy are: best practices, HACCP system, traceability, the European Food Safety Authority (EFSA), food safety inspections and authorities, and the Rapid Alert System for Food and Feed (RASFF). Procedures for food safety are based on the scientific food risk analysis. The main aim of this paper is to characterize the food risk analysis as the fundamental element of the strategy for food safety assurance in the UE. The scientific risk analysis is built of a three stage process: risk assessment, risk management, and risk information. EFSA actively participates in the whole process of the risk analysis. System HACCP and other systems of food safety management i.e. system according to ISO 22000 standard, are also based on risk analysis
EN
The concept of dominant (semantic [Barańczak 1990], translators’ and translational, intersemiotic and methodological [Bednarczyk 1999; 2008; 2010]), is well established in Polish Translation Studies, where it has been mainly used as a tool of translation criticism. The objective of the article is to investigate possible applications of the concept in fields other than literary translation such as professionally oriented LSP‑translation courses. The term pragmatic dominant has been developed, which refers to the concept of high- and low‑risk information rather than to a strictly linguistic analysis. Using examples of official documents in translation, the article demonstrates how pragmatic dominant can be made didactically useful at various stages of the translation process from text analysis to translation quality assessment.
EN
Purpose: It is stated that the high mortality rate of cer-vical cancer worldwide can be reduced by early diag-nosis, effective observation, and treatment pro-grams. It was aimed to evaluate the correlation be-tween cervical cancer and screening and the health be-liefs of married women living in two different ethnic groups. Materials and methods: This research was con-ducted as a comparative descriptive study. 211 Roma (Gypsies) and 202 non-Roma married women included in the study. The data was obtained in the research by the introductory survey form and the "Cervical Cancer and Pap Smear Test Health Belief Model Scale". Per-centage, mean, t-test, chi-square tests were used in the evaluation of the data. A logistic regression analysis was used. Before the start of the research was received approval by the Ethics Committee. Results: The average age of the non-Roma women who participated in the survey was found 40.3 ± 10.5 (min: 20, max: 67). Non-Roma women were found to have received a pap-smear test at a higher rate (about 4 times more) than Roma women (p˂0.001, OR=3.723, 95%, CI 2.472, 5.607). Non-Roma women were found to have a higher pap-smear test rate (3-fold higher) than Roma women and found that the differ-ence between them was statistically significant (p˂0.001, OR=2.932, 95%, CI 1.855, 4.635). Conclusions: Roma women, a disadvantaged group, were found to hear fewer pap-smear tests, have less knowledge about the test, take fewer pap smears than non-Roma women and especially they did not have the pap-smear test because they did not know it.
EN
Background: The article presents a method of estimating the security level which indicates how probable it is for a phenomenon to occur. Objectives: The author attempts to answer the question: How do we estimate security? Decision makers usually need percentage showing the probability of an incident taking place in the future. This information is needed in the first place, later decision makers can use more descriptive information. Methods: The research problem concerns the assessment of security using the estimation method. Depicting security in numbers is difficult, thus the descriptive method is also usually applied. The estimation method facilitates the assessment. It is helpful since it is partly done by calculation and partly by guessing or approximation. Based on a case study analysing whether a terrorist attack may occur, the author also used tools such as averaging expert predictions, scenario analysis and risk analysis. Results: This article provides a view on forecasting security, which results in a method of estimating the level of security. Conclusions: The author presents an approach which allows to initially estimate the security level of the analyzed phenomenon in a relatively short period of time.
EN
Objective: While artisanal mining takes place in casual framework and with total ignorance of good practices, few studies have focused on the origin of hazards specific to each workplace constitutive of this exploitation facility. Nevertheless, this study is a condition of an efficient occupational health and safety control in this sector. Materials and Method: We took the effort to identify different workplaces, as well as hazards specific to each of them, through the observation and analysis of the tasks, tools and the processes related to their use applied in the Ruashi artisanal mine. Results: The investigated exploitation facility consists of five workplaces: diggers (60% – in charge of mineralized gangue recovery); crushers; washers; hand-made furnace workers (in charge of various treatment processes); and loaders (in charge of packing the obtained material). Beside the risks common to these various workplaces and ensuing notably from the lack of hygiene and working in bad positions, operating in underground galleries, in particular, exposes diggers to the risks connected with collapsing parts of the mine, suffocation, dehydration or fine particles in the breathed air. Crushers are especially exposed to traumatism risks, notably ocular, and loaders are exposed to risks related to handling heavy loads. These risks are connected with the mining processes because, in spite of the similarity of tools, they appear less often in other forms of artisanal exploitation described in literature. It is notable in the case of crushing in sawed gas bottles where ocular trauma risk is decreased. It was also shown that humidification of work surface reduces dust particles emission into the air. Conclusions: Hazards identification, through a tools and processes description, has the advantage of providing information on reducing the occurrence of these risks. It shows that this reduction is not necessarily a consequence of the activity mechanization degree.
EN
In this paper, we present a modification of the Weibull distribution for the Value-atRisk (VaR) estimation of investment portfolios on the precious metals market. The reason for using the Weibull distribution is the similarity of its shape to that of empirical distributions of metals returns. These distributions are unimodal, leptokurtic and have heavy tails. A portfolio analysis is carried out based on daily log-returns of four precious metals quoted on the London Metal Exchange: gold, silver, platinum and palladium. The estimates of VaR calculated using GARCH-type models with non-classical error distributions are compared with the empirical estimates. The preliminary analysis proves that using conditional models based on the modified Weibull distribution to forecast values of VaR is fully justified.
EN
Systematic analysis based on the assumption of rational behaviour of human being in addition to the mathematical models is based on the inherent factors in quantification of global risks. Decisions are made based on all available information, to act in order to maximize the utility. However, the current state of global quantification of risks based on the probability of economic loss scenarios, rationality of action in emergencies excludes and puts to the forefront scenarios likelihood and severity based on information asymmetry. If all risk takers were fully informed, it would avoid the moral hazard and the amount of individual risks would be stable in the global context.
18
75%
EN
Non-governmental non-pro t organisations have an important place in the society of the 21st century in the Czech Republic. These organisations involve civic associations, public benefit organisations, foundations and endowment funds, the Churches and religious societies in the Czech Republic. The aim of this paper is to find out various types of NGOs risks and recommend their management. The methodology is based on risk measurement in profit organisation assets. Weaknesses and threats were listed there for each financial source using a SWOT analysis. Risk of financial sources in NGOs is important to be controlled from the point of view of its long-term future financial stability. This paper deals only with qualitative risk assessment and gives recommendations to control risk mostly focusing on strict control, good information and professionalism in NGOs.
PL
Artykuł prezentuje nową technikę analizy ryzyka. Analiza Zagrożenia Ludności i Mienia (People and Property Hazard Analysis – PPHA) jest probabilistyczną, półilościową techniką, nieskomplikowaną i łatwą do zastosowania. Zapewnia bardziej precyzyjne szacunki poziomu ryzyka niż Wstępna Analiza Zagrożeń (Preliminary Hazard Analysis – PHA) – prawdopodobnie najbardziej powszechnie wykorzystywana przez jednostki samorządu terytorialnego w Polsce. PPHA można zastosować w analizie wszystkich wspólnot i organizacji. Celem nowej techniki jest zapewnienie narzędzia, które wesprze decydentów w efektywnym alokowaniu ograniczonych zasobów w szerokim wachlarzu potencjalnych inwestycji mogących obniżać ryzyko. Uzupełnienie artykułu stanowi aktywny formularz zawierający dane wejściowe i wyliczenia potrzebne do oszacowania ryzyka dla przykładowych zagrożeń przedstawionych w jego treści. Ma on również ułatwić stosowanie techniki PPHA w praktyce.
EN
This article presents new risk analysis technique. The People and Property Hazard Analysis (PPHA) is probabilistic, semiquantitative technique, uncomplicated and easy to use. It provides more precise estimates of a risk level than preliminary hazard analysis – probably the most commonly performed technique by local governments in Poland. PPHA is applicable to the analysis of all types of communities and organizations. The purpose of the new technique is to provide a tool that can assist decision-makers in effectively allocating limited resources across the vast array of potential investments that could mitigate risk.
first rewind previous Page / 2 next fast forward last
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.