Open Access. Powered by Scholars. Published by Universities.®

Risk Analysis Commons

Open Access. Powered by Scholars. Published by Universities.®

884 Full-Text Articles 1,504 Authors 308,143 Downloads 97 Institutions

All Articles in Risk Analysis

Faceted Search

884 full-text articles. Page 5 of 39.

Contributions Of The Women Groups Of West Bengal, India For Solving Rural Water Challenges, Mina Das 2021 Nishtha, India

Contributions Of The Women Groups Of West Bengal, India For Solving Rural Water Challenges, Mina Das

wH2O: The Journal of Gender and Water

Poor rural communities suffer from many socio-economic issues; however, the availability of clean and safe water is the fundamental challenge amongst all other hindrances confronted by these communities. This article focuses on the non-profit organization, Nishtha (meaning dedication) and their intervention in women empowerment for better water accessibility in rural communities of West Bengal, India. The paper will further highlight the so-called “rural ignorant women’s endeavour” in innovative thought and strategy to protect their own families and the community. The article also discusses Nishtha’s intervention during water crises and disasters using a participatory approach involving women.


Community Effort For Drinking Water Management Near India- China Border At Jamak Village District Uttarkashi, Uttarakhand, India, Kamlesh Gururani 2021 Reliance Foundation, India

Community Effort For Drinking Water Management Near India- China Border At Jamak Village District Uttarkashi, Uttarakhand, India, Kamlesh Gururani

wH2O: The Journal of Gender and Water

In Uttarakhand, drinking water is a major problem and a burning issue for the last decade. Many natural springs that dotted the hillside have been damaged due to the climate conditions and other unplanned or illegal activities such as deforestation and human-made forest fires have affected spring catchments, resulting in reduced discharge from springs. To tackle this major problem of drinking water security, the community of mountain village Jamak, district Uttarkashi came together for community-led drinking water supply by adopting participatory planning and ownership. The village community’s participation and ownership improved the village’s drinking water situation, and villagers ...


Review And Analysis Of Failure Detection And Prevention Techniques In It Infrastructure Monitoring, Deepali Arun Bhanage, Ambika Vishal Pawar, K Kotecha 2021 Symbiosis Institute of Technology, Symbiosis International University, Pune, Maharashtra, India

Review And Analysis Of Failure Detection And Prevention Techniques In It Infrastructure Monitoring, Deepali Arun Bhanage, Ambika Vishal Pawar, K Kotecha

Library Philosophy and Practice (e-journal)

Maintaining the health of IT infrastructure components for improved reliability and availability is a research and innovation topic for many years. Identification and handling of failures are crucial and challenging due to the complexity of IT infrastructure. System logs are the primary source of information to diagnose and fix failures.

In this work, we address three essential research dimensions about failures, such as the need for failure handling in IT infrastructure, understanding the contribution of system-generated log in failure detection and reactive & proactive approaches used to deal with failure situations.

This study performs a comprehensive analysis of existing literature by ...


Jack Voltaic 3.0 Cyber Research Report, Erica Mitchell, Douglas Fletcher, Erik Korn, Steven Whitham, Jason Hillman, Ron Yearwood, Clint Walker, Aryn Pyke, Gabriel Weaver, Brandon Pugh, Katherine Hutton, George Platsis, Timothy Klett, Ryan Hruska 2021 Army Cyber Institute

Jack Voltaic 3.0 Cyber Research Report, Erica Mitchell, Douglas Fletcher, Erik Korn, Steven Whitham, Jason Hillman, Ron Yearwood, Clint Walker, Aryn Pyke, Gabriel Weaver, Brandon Pugh, Katherine Hutton, George Platsis, Timothy Klett, Ryan Hruska

ACI Technical Reports

The Jack Voltaic (JV) Cyber Research project is an innovative, bottom-up approach to critical infrastructure resilience that informs our understanding of existing cybersecurity capabilities and identifies gaps. JV 3.0 contributed to a repeatable framework cities and municipalities nationwide can use to prepare. This report on JV 3.0 provides findings and recommendations for the military, federal agencies, and policy makers.


Jack Voltaic 3.0 Cyber Research Report Executive Summary, Douglas Fletcher, Erica Mitchell, Erik Korn, Steven Whitham, Jason Hillman, Aryn Pyke 2021 Army Cyber Institute

Jack Voltaic 3.0 Cyber Research Report Executive Summary, Douglas Fletcher, Erica Mitchell, Erik Korn, Steven Whitham, Jason Hillman, Aryn Pyke

ACI Technical Reports

This condensed Executive summary provides an overview of the information contained in the full JV 3.0 Cyber Research Report.


Developing Infrastructure Adaptation Pathways To Combat Hurricane Intensification: A Coupled Storm Simulation And Economic Modeling Framework For Coastal Installations, Alexander J. Baldwin 2021 Air Force Institute of Technology

Developing Infrastructure Adaptation Pathways To Combat Hurricane Intensification: A Coupled Storm Simulation And Economic Modeling Framework For Coastal Installations, Alexander J. Baldwin

Theses and Dissertations

Climate change projections suggest intensification of extreme weather events, including hurricanes, is expected throughout the 21st century. This will lead to increased destruction for coastal military bases unless infrastructure resiliency and adaptation measures are implemented. This research focuses on examining the simulation of probabilistic, climate-intensified hurricane events at Eglin Air Force Base. FEMA Hazus models are combined with climate projections for wind Intensity, tide, and sea-level rise to produce an assessment of losses to the installation. Damage estimates and hurricane intensity outputs are downscaled to the facility-level so that climate adaptation signals can be identified. The facility losses and climate ...


Complete Issue, Volume 4, Issue 1, 2021 University of Central Florida

Complete Issue, Volume 4, Issue 1

Journal of International Crisis and Risk Communication Research

This is the complete issue of JICRCR Volume 4, Issue 1.


How College Students Assess The Threat Of Infectious Diseases: Implications For University Leaders And Health Communicators, Yan Jin, Yen-I Lee, Brooke F. Liu, Lucinda Austin, Seoyeon Kim 2021 University of Georgia

How College Students Assess The Threat Of Infectious Diseases: Implications For University Leaders And Health Communicators, Yan Jin, Yen-I Lee, Brooke F. Liu, Lucinda Austin, Seoyeon Kim

Journal of International Crisis and Risk Communication Research

Higher education institutions and their students face a wide range of infectious disease threats (IDTs). However, there is a lack of theory-driven research on how to provide communication for multiple IDTs to motivate protective action taking. To close this gap, this study focuses on college students and two IDT types: respiratory and sexually transmitted infections. We tested an IDT appraisal model with data from an online survey conducted at two U.S. universities with 842 students. Findings indicate that IDT type led to different patterns of threat appraisal and protective action taking intentions. More specifically, participants perceived sexually transmitted threats ...


Victims As Stakeholders: Insights From The Intersection Of Psychosocial, Ethical, And Crisis Communication Paths, Wouter Jong, Kjell Brataas 2021 Leiden University, The Netherlands

Victims As Stakeholders: Insights From The Intersection Of Psychosocial, Ethical, And Crisis Communication Paths, Wouter Jong, Kjell Brataas

Journal of International Crisis and Risk Communication Research

This article examines the position of victims and those affected within communication theory. Current research has broadly been skewed toward reputation management and protecting brand value as primary goals of crisis communication efforts. As crises affect real people, crisis communication theory needs to be adapted to include their needs. To assure their needs are met, an integration of business ethics and psychosocial mechanisms in the field of crisis communication is proposed. This integration prevents crisis communication output from becoming an additional source of stress to the affected in the aftermath of crises. We offer recommendations for crisis communication scholarship to ...


The Conceptualization Of Risk Tolerance And Scale Development For Measuring Publics’ Tolerance Of Individual Health Risks, Hyoyeun Jun, Yan Jin 2021 Salve Regina University

The Conceptualization Of Risk Tolerance And Scale Development For Measuring Publics’ Tolerance Of Individual Health Risks, Hyoyeun Jun, Yan Jin

Journal of International Crisis and Risk Communication Research

Risk tolerance, identified by scholars over two decades ago as an essential concept in risk communication, has remained understudied without clear conceptual and operational definitions. As the first study developing a multiple-item scale for measuring at-risk publics’ tolerance of different risk types, this study refines the conceptualization of risk tolerance and advances its operationalization in the setting of individual health risks. Qualitative research (in-depth interviews: n = 28; focus group: n = 30) and two survey datasets (sample 1: n = 500; sample 2: n = 500) were employed for scale development and testing. Results identify that two types of individual health risk tolerance ...


Open-Field Scale-Model Experiments Of Fire Whirls Over L-Shaped Line Fires, Yuto Iga, Kazunori Kuwana, Kozo Sekimoto, Yuji Nakamura 2021 Yamagata University

Open-Field Scale-Model Experiments Of Fire Whirls Over L-Shaped Line Fires, Yuto Iga, Kazunori Kuwana, Kozo Sekimoto, Yuji Nakamura

Progress in Scale Modeling, an International Journal

This paper presents the results of open-field scale-model experiments of fire-whirl formation over line fires. L-shaped line fires were burned in crosswinds, and the processes of fire-whirl formation were observed. The flame height was measured using an image-processing technique, while two-dimensional velocity components were measured at two different locations using ultrasonic anemometers. Two tests were selected for comparison: test A, in which intense fire whirls repeatedly formed, and test B, in which no whirls were observed. In test A, the wind flow was bent by the fire plume, creating swirling flows near the burning area, thereby forming fire whirls. On ...


Effect Of Reduced Plume Entrainment On The Burning Rate Of Porous Fuel Beds, Sara McAllister 2021 USDA Forest Service

Effect Of Reduced Plume Entrainment On The Burning Rate Of Porous Fuel Beds, Sara Mcallister

Progress in Scale Modeling, an International Journal

Large outdoor fires often exhibit unexpected fire behavior, particularly compared with much smaller fires. Understanding the difference between large- and small-scale fires is of importance for both fire behavior predictions and safety. Large fires are often characterized by very tall plumes that can extend to the stratosphere. Particularly as the actively burning area increases, plumes in large-scale fires likely entrain relatively little and may act in a similar fashion to a chimney. To explore the possible changes in burning rate due to the chimney effect, experiments were conducted with wood cribs burned with a chimney of variable height. The burning ...


A Study On Fire Hazards Of Oil Tanks In Urban Areas With Scale Model Experiments, Ho Yin Ng, Yu Wan, Wan Ki Chow 2021 Hong Kong Polytechnic University

A Study On Fire Hazards Of Oil Tanks In Urban Areas With Scale Model Experiments, Ho Yin Ng, Yu Wan, Wan Ki Chow

Progress in Scale Modeling, an International Journal

Large fuel tanks are located in an urban area of Tsing Yi in Hong Kong, giving potentially high risks to people living nearby if a fire was to occur. Scale modeling experiments were carried out to investigate the potential of fire hazards. Propanol pool fires with five different scales of oil tanks were studied first. Appropriate tank sizes were then put in a 1/2500 architectural scale model on the Tsing Yi Island to study a fuel tank fire. Results show that the heat and smoke from a fire would affect occupants staying in areas near to the fuel tanks ...


Risk Management Decision Making For Security And Trust In Hardware Supply Chains, Zachary A. Collier, Thomas L. Polmateer, James H. Lambert 2021 Radford University

Risk Management Decision Making For Security And Trust In Hardware Supply Chains, Zachary A. Collier, Thomas L. Polmateer, James H. Lambert

CESUN Conference

Modern cyber-physical systems are enabled by electronic hardware and embedded systems. The security of these sub-components is a concern during the design and operational phases of cyber-physical system life cycles. Compromised electronics can result in mission-critical failures, unauthorized access, and other severe consequences. As systems become more complex and feature greater connectivity, system owners must make decisions regarding how to mitigate risks and ensure resilience and trust. This paper provides an overview of research efforts related to assessing and managing risks, resilience, and trust with an emphasis on electronic hardware and embedded systems. The research takes a decision-oriented perspective, drawing ...


Improving Real-Time Methane Monitoring In Longwall Coal Mines Through System Response Characterization Of A Multi-Nodal Methane Detection Network, Brian Philip Cappellini 2021 West Virginia University

Improving Real-Time Methane Monitoring In Longwall Coal Mines Through System Response Characterization Of A Multi-Nodal Methane Detection Network, Brian Philip Cappellini

Graduate Theses, Dissertations, and Problem Reports

Machine automation and atmospheric monitoring are used by many industries to improve safety and productivity in the workplace. The underground Methane Watchdog System (MWS) is a multi-nodal network of sensors currently under development. The MWS aims to improve safety and productivity by introducing 10 compact sampling units designed to be easily integrated within the current roof support equipment of the mine. Each unit contains an array of sensors used to continuously monitor the environmental conditions which include methane concentration, temperature, pressure, and relative humidity. All MWS units report information back to a remote central processing hub (CPH) which collects nodal ...


Open Voting Client Architecture And Op-Ed Voting: A Novel Framework For Solving Requirement Conflicts In Secret Ballot Elections, Aaron M. Wilson 2021 University of North Florida

Open Voting Client Architecture And Op-Ed Voting: A Novel Framework For Solving Requirement Conflicts In Secret Ballot Elections, Aaron M. Wilson

UNF Graduate Theses and Dissertations

Building voting systems for secret ballot elections has many challenges and is the subject of significant academic research efforts. These challenges come from conflicting requirements. In this paper, we introduce a novel architectural approach to voting system construction that may help satisfy conflicting requirements and increase voter satisfaction. Our design, called Open Voting Client Architecture, defines a voting system architectural approach that can harness the power of individualized voting clients. In this work, we contribute a voting system reference architecture to depict the current voting system construction and then use it to define Open Voting Client Architecture. We then detail ...


Quantum Safety Metrics Framework For Commercial Unmanned Aircraft Operators, Tracy L. Lamb, Nathan A. Phillips, Trong Van Nguyen 2021 Embry-Riddle Aeronautical University

Quantum Safety Metrics Framework For Commercial Unmanned Aircraft Operators, Tracy L. Lamb, Nathan A. Phillips, Trong Van Nguyen

International Journal of Aviation, Aeronautics, and Aerospace

Commercial unmanned aircraft systems continue to increase in applications and diversity; however, mishaps and accidents erode safety, investment return, and efficiency. Most unmanned aircraft accidents are preceded by leading indicators; the ability to forecast and quantify these may provide increased safety and profitability. This mixed-method research study used a non-experimental parallel convergence approach with multiple instruments, multiple-case study n = 22, and one exemplar case design to develop a quantum safety metric program. This study used a combination of previously validated methods as development instruments, including; the HFACS, STAMP, 'Sierra Scale,' and Accident Prevention Effort equations. The study extended the Accident ...


Identifying Scotomata In Hazard Identification Caused By Ignorance And Overconfidence, Allen Johanson 2021 Eastern Illinois University

Identifying Scotomata In Hazard Identification Caused By Ignorance And Overconfidence, Allen Johanson

Masters Theses

The manufacturing and construction industries are two of the most dangerous professions, and employees are frequently exposed to hazards and hazardous conditions which can lead to serious injury or even death. An observed phenomenon, frequently called the Dunning-Kruger Effect states that unskilled people are often unaware of their shortcomings and those with the higher-level skills often underestimate their abilities. This study examines employees’ training, years of experience, and performance to gauge any correlations among these variables in the area of hazard awareness. The goal of this study is to help individuals to recognize blind spots in their knowledge to identify ...


The Ftc And Ai Governance: A Regulatory Proposal, Michael Spiro 2020 Seattle University School of Law

The Ftc And Ai Governance: A Regulatory Proposal, Michael Spiro

Seattle Journal of Technology, Environmental & Innovation Law

No abstract provided.


Small Modular Reactors And Advanced Reactor Security: Regulatory Perspectives On Integrating Physical And Cyber Security By Design To Protect Against Malicious Acts And Evolving Threats, Raphael Duguay 2020 Canadian Nuclear Safety Commission

Small Modular Reactors And Advanced Reactor Security: Regulatory Perspectives On Integrating Physical And Cyber Security By Design To Protect Against Malicious Acts And Evolving Threats, Raphael Duguay

International Journal of Nuclear Security

How can future nuclear technologies and Small Modular Reactors (SMRs) deter and prevent organized crime groups, terrorists, and malicious actors from attempting to steal or sabotage nuclear materials and facilities? This paper presents the benefits of integrating Security by Design (SeBD) into a regulatory framework to allow more a flexible and effective design of physical protection systems for SMRs. During its effort to modernize the Nuclear Security Regulations, the Canadian Nuclear Safety Commission (CNSC) licensing application process provides for the option of SeBD in moving toward a performance-based approach with less prescriptive requirements. CNSC also recognizes the need for a ...


Digital Commons powered by bepress