The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The focus of the paper is to identify risks in various areas of operation of a selected trade and production company. The risks primarily referred to threats that had direct or indirect impact on the functioning of the organisation, thence the causes of their occurrence and effects are determined. Identification of individual risks is made based on analyses of internal and external context of the...
This chapter discusses the importance of considering safety in the design stage and tools to implement safety in design. It begins by describing the conceptual principles of safety in design and its necessity in the construction and engineering industry. This chapter also introduces how the concept is currently being implemented in the UK, Australia, the US, and Singapore. This is followed by a discussion...
Risk management is an essential process in software project management. Risk identification and analysis are critical parts of risk management. However, both processes require extensive experience and knowledge to be efficiently performed. Several literatures suggest using checklists which can be used to aid risk identification. However, there is very little information which can guide the risk analysis...
The paper presents the issue of risk management in public finance sector budget units. Risk management is one of the goals of management control under the Public Finance Act of 2009. A short review of the essence and standards of management control as they apply to risk management in these units begins the paper. Risk management consists of the following stages: understanding the activity being performed,...
The petrochemical industry is a high environmental risk industry because a large amount of toxic, hazardous, flammable and explosive substances were used in the processes of manufacture and operation. If the accidents of the leakage of chemicals, explosions and fires occurred, it would lead to release of toxic substances. The accidental releases are very dangerous to the republic health and the environmental...
Purpose - This paper aims to assess the level of using Risk Management practices by Islamic Banks in Pakistan to handle different kinds of risks. Research limitations/implications - Methodology-A questionnaire covering six aspects, was developed, in the first part: understanding risk and risk management, risk assessment and analysis (RAA), risk identification (RI), risk monitoring, credit risk analysis...
Software project development still faces high failure rate. Nowadays, researches on software project risk majorly remain in risk theoretical model, risk identification and risk analysis, lacking empirical models which unify risk analysis and risk planning procedures. This research firstly collected real data from mainland China, and used Classification Association Rules (CARs) to provide a highly...
With the rapid economic development and increasing market competition, as a new trend of HRM development, human resources outsourcing (HRO) has been paid attention by more and more enterprises. However, while human resource outsourcing shows its superiority, there is also existing high risks. This article, based on risk identification and analysis of human resources outsourcing, proposes the total...
Tightening legislation on machine safety, such as the new European Machine Directive that became applicable in Dec 2009, requires that the machine manufacturer has to perform a risk assessment to determine safety requirements. These requirements will result in partial redesign of the control system. In order to reduce this redesign, a risk assessment process utilizing several methodologies for early...
Systems Engineering Process (SEP) is the systemic approach to design, development and implementation of a reliable and trustworthy system that satisfies its specified requirements. However, beyond the precision of the plans developed through SEP, it is also essential to consider uncertainties as well as emergent properties created through the process that might lead to negative consequences and subsequent...
Human Resource Dispatch is an important tool of improving the operational efficiency of the Organization's human capital. At present more and more enterprises have recognized and used it. But for the enterprises, there are still many risks of using the labor method. Based on systematically analyzing the human resource dispatch's risk factors, this paper will introduce the risk matrix method into the...
Public infrastructure project is a complex social network that connects the interesting of governments, financial institutions, and construct and supply industries. Risk management influences the success of the project. Risk Identification is a key step in risk management. This paper takes Chinese city public infrastructure projects as the research background, uses VFPE-method to identify the key...
Due to the interaction between multiple projects and programs, the project portfolio can be regarded as a complicated system. Schedule risk of individual projects will be delivered to the inner portfolio according to this internal relationship of project portfolio. Relative project portfolio managers will take some necessary measures in order to control or shrink the scope of risk influence. However,...
Risk identification is the chief step of risk management in enterprises' international operation, and also the premise and base of risk avoidance and countermeasure. This research takes Chinese enterprises' international operation as the research background. Based on theoretical deduction of the international risk classification and identification, through empirical research about measure of risk...
In the congested urban areas, tunneling-induced ground movements may cause a serious damage to the adjacent buildings. Consequently, the safety risk management (SRM) of structures during tunnel excavation is critical for ensuring safety (including personnel safety inside the tunnel and safety of structures above) and construction quality. This paper describes the importance of SRM based on some building-damaged...
Seismic damages of bridges may have great effects on traffic transport. In order to reduce the losses of the disaster, it is necessary to carry out seismic risk management of bridge engineering. In the paper, the seismic risk management framework was proposed and the main steps of risk management including risk identification, risk analysis, risk assessment and risk control were analyzed considering...
The market of e-government outsourcing in China has not been yet mature. So there are some problems and risks arising that can not be neglected. This article identified the risks in e-government outsourcing by the method of flow chart. Then this article divided the risks into two parts including the risks from government behaviors and the risks leaded by the contractors. Based on the risk analysis,...
Software project management becomes more challenging due to increase in budget investment and stiff business competition requiring urgent deliveries. The paper presents an approach to sharing solutions to software project management problems. It includes risk identification, risk analysis and planning, risk prioritization, risk monitoring and risk control. The model incorporates problem analysis of...
Software should be continually upgraded to meet the internal and external environment of the enterprises; however, great risks exist in the upgrade deployment of the application software employed in large enterprises. With the process of upgrade deployment as its subject, this paper presents risk management strategies including the entire process of the risk identification, analysis, planning, monitoring...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.