• Title/Summary/Keyword: Vulnerability Risk

Search Result 455, Processing Time 0.032 seconds

Developing the Vulnerability Factor Structure Affecting Injuries and Health Problems Among Migrant Seafood Processing Industry Workers

  • Jiaranai, Itchaya;Sansakorn, Preeda;Mahaboon, Junjira
    • Safety and Health at Work
    • /
    • v.13 no.2
    • /
    • pp.170-179
    • /
    • 2022
  • Background: The vulnerability of international migrant workers is on the rise, affecting the frequency of occupational accidents at workplaces worldwide. If migrant workers are managed in the same way as native workers, the consequences on safety assurance and risk management will be significant. This study aimed to develop the vulnerability factor model for migrant workers in seafood processing industries because of significant risk-laden labor of Thailand, which could be a solution to control the risk effectively. Methods: A total of 569 migrant workers were surveyed (432 Burmese and 137 Cambodian), beginning with 40 initial vulnerability factors identified in the questionnaire established from experts. The data were analyzed through descriptive analysis; exploratory factor analysis (EFA) and confirmatory factor analysis (CFA) were used to ascertain the model. Results: The result of content validity >0.67 and the Cronbach's alpha of 0.957 specified the high reliability of 40 factors. The EFA indicated a total variance of 65.49%. The final CFA validated the model and had an empirical fitting; chi-square = 85.34, Adjust Goodness-of-Fit Index = 0.96, and root mean square error of approximation = 0.016. The structure concluded with three dimensions and 18 factors. Dimension 1 of the structure, "multicultural safety operation," contained 12 factors; Dimension 2, "wellbeing," contained four factors; and Dimension 3, "communication technology," contained two factors. Conclusion: The vulnerability factor structure developed in this study included three dimensions and 18 factors that were significantly empirical. The knowledge enhanced safety management in the context of vulnerability factor structure for migrant workers at the workplace.

Assessment of Local Social Vulnerability in Facing Merapi Volcanic Hazard (메라피 화산재해에 대한 지역단위의 사회적 취약성 평가)

  • Lee, Sungsu;Maharani, Yohana Noradika;Yi, Waon-Ho
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.27 no.6
    • /
    • pp.485-492
    • /
    • 2014
  • In regards to natural disasters, vulnerability analysis is a component of the disaster risk analysis with one of its objectives as a basis for planning priority setting activities. The volcano eruption raises many casualties and property in the surrounding area, especially when the volcano located in densely populated areas. Volcanic eruptions cannot be prevented, but the risk and vulnerability can be reduced which involve careful planning and preparations that anticipate a future crisis. The social vulnerability as social inequalities with those social factors can influence the susceptibility of various groups to harm and govern their ability to respond. This study carried out the methods of Social Vulnerability Index (SoVI) to measure the socially created vulnerability of the people living in Merapi proximal hamlets in Central Java, Indonesia that refers to the socioeconomic and demographic factors that affect the resilience of communities in order to describe and understand the social burdens of risk. Social vulnerability captured here, using a qualitative survey based-data such as interviews to local people with random ages and background to capture the answer vary, also interviews to stakeholders to help define social vulnerability variables. The paper concludes that by constructing the vulnerability index for the hamlets, the study reveals information about the distribution and causes of social vulnerability. The analysis using SoVI confirms that this method works well in ensuring that positive values indicating high social vulnerability and vice versa.

Assessing Vulnerability and Risk of Sensor Networks under Node Compromise (Node Compromise에 대한 무선 센서 네트워크의 취약성 및 위험 평가)

  • Park, Jong-Sou;Suh, Yoon-Kyung;Lee, Seul-Ki;Lee, Jang-Se;Kim, Dong-Seong
    • Convergence Security Journal
    • /
    • v.7 no.4
    • /
    • pp.51-60
    • /
    • 2007
  • It is important to assess vulnerability of network and information system to countermeasure against a variety of attack in effective and efficient way. But vulnerability and risk assessment methodology for network and information systems could not be directly applied to sensor networks because sensor networks have different properties compared to traditional network and information system. This paper proposes a vulnerability assessment framework for cluster based sensor networks. The vulnerability assessment for sensor networks is presented. Finally, the case study in cluster based sensor networks is described to show possibility of the framework.

  • PDF

A Study on Identification of the Heat Vulnerability Area - Case Study in Chungcheongnamdo - (폭염 취약지역 도출에 관한 연구 - 충청남도를 대상으로 -)

  • Lee, Gyeongjin;Cha, Jungwoo
    • Journal of Korean Society of Rural Planning
    • /
    • v.25 no.1
    • /
    • pp.67-74
    • /
    • 2019
  • This study is to identify the heat vulnerability area as represented by heat risk factors which could be attributable to heat-related deaths. The heat risk factors were temperature, Older Adults(OA), Economic Disadvantage(ED), Accessibility of Medical Services(AMS), The population Single Person Households(SPH). The factors are follow as; the temperature means to the number of days for decades average daily maximum temperature above $31^{\circ}C$, the Older Adults means to population ages 65 and above, furthermore, the Economic Disadvantage means to the population of Basic Livelihood Security Recipients(BLSR), the Accessibility of Medical Services(AMS) means to 5 minutes away from emergency medical services. The results of the analysis are showed that the top-level of temperature vulnerability areas is Dong, the top-level of vulnerability OA areas is Eup, the top-level of AMS vulnerability is Eup. Moreover, the top-level of vulnerability ED area appears in the Eup and Dong. The result of analysing relative importance to each element, most of the Eup were vulnerable to heat. Since, there are many vulnerable groups such as Economic Disadvantage, Older Adults in the Eup. We can be figured out estimated the number of heat-related deaths was high in the Eup and Dong by the data of emergency activation in the Chungcheongnam-do Fire Department. Therefore, the result of this study could be reasonable.

The needs for advanced sensor technologies in risk assessment of civil infrastructures

  • Fujino, Yozo;Siringoringo, Dionysius M.;Abe, Masato
    • Smart Structures and Systems
    • /
    • v.5 no.2
    • /
    • pp.173-191
    • /
    • 2009
  • Civil infrastructures are always subjected to various types of hazard and deterioration. These conditions require systematic efforts to assess the exposure and vulnerability of infrastructure, as well as producing strategic countermeasures to reduce the risks. This paper describes the needs for and concept of advanced sensor technologies for risk assessment of civil infrastructure in Japan. Backgrounds of the infrastructure problems such as natural disasters, difficult environment, limited resource for maintenance, and increasing requirement for safety are discussed. The paper presents a concept of risk assessment, which is defined as a combination of hazard and structural vulnerability assessment. An overview of current practices and research activities toward implementing the concept is presented. This includes implementation of structural health monitoring (SHM) systems for environment and natural disaster prevention, improvement of stock management, and prevention of structural failure.

A Basic Study on the Derivation of Vulnerability Factors for Safety Management of old Buildings (노후 건축물의 안전관리를 위한 취약성 요소 도출 기본연구)

  • Oh, Gyuho;Cha, Inhyuck;Ahn, Sungjin
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2023.05a
    • /
    • pp.275-276
    • /
    • 2023
  • In order to prevent disaster risks caused by building aging in advance, the prevailing opinion is that it is urgent to actively improve systems such as mandatory safety inspections, and to calculate risks and develop safety management systems due to building aging. The need for systematic risk management continues to be emphasized in the process of safety inspection and repair of old buildings, but the risk management and safety management techniques of each construction entity have not been established in practice. Accordingly, this study aims to analyze the vulnerability factors of aging buildings and provide basic data on the development of a risk rating calculation model for old buildings and the efficiency of safety management systems in the future.

  • PDF

Windborne debris risk analysis - Part I. Introduction and methodology

  • Lin, Ning;Vanmarcke, Erik
    • Wind and Structures
    • /
    • v.13 no.2
    • /
    • pp.191-206
    • /
    • 2010
  • Windborne debris is a major cause of structural damage during severe windstorms and hurricanes owing to its direct impact on building envelopes as well as to the 'chain reaction' failure mechanism it induces by interacting with wind pressure damage. Estimation of debris risk is an important component in evaluating wind damage risk to residential developments. A debris risk model developed by the authors enables one to analytically aggregate damage threats to a building from different types of debris originating from neighboring buildings. This model is extended herein to a general debris risk analysis methodology that is then incorporated into a vulnerability model accounting for the temporal evolution of the interaction between pressure damage and debris damage during storm passage. The current paper (Part I) introduces the debris risk analysis methodology, establishing the mathematical modeling framework. Stochastic models are proposed to estimate the probability distributions of debris trajectory parameters used in the method. It is shown that model statistics can be estimated from available information from wind-tunnel experiments and post-damage surveys. The incorporation of the methodology into vulnerability modeling is described in Part II.

The Study of Developing an Index for Evaluating (위험분석모델의 정보시스템 구축방법론 적용에 관한 연구)

  • 박동석;안성진;정진욱
    • Convergence Security Journal
    • /
    • v.2 no.2
    • /
    • pp.67-75
    • /
    • 2002
  • The purpose of this study is to reflect the risk analysis results acquired while building an information system of an organization by applying a risk analysis model capable of analyzing the confronted risk, on the information system build methodology. Risk analysis, a method of utilizing the functional relation between risk, vulnerability and countermeasure of information assets, is used to evaluate the overall information risk level by analyzing the influence range of vulnerability imposed in the information asset of an organization, and the applications of the countermeasures on the frequency and intensity of the corresponding risk.

  • PDF

A Study on Five Levels of Security Risk Assessment Model Design for Ensuring the u-Healthcare Information System (u-헬스케어시스템의 정보보안 체계 확보를 위한 5단계 보안위험도 평가모델 설계)

  • Noh, Si Choon
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.11-17
    • /
    • 2013
  • All u-Health system has security vulnerabilities. This vulnerability locally(local) or network(network) is on the potential risk. Smart environment of health information technology, Ad-hoc networking, wireless communication environments, u-health are major factor to increase the security vulnerability. u-health care information systems user terminal domain interval, interval public network infrastructure, networking section, the intranet are divided into sections. Health information systems by separating domain specific reason to assess vulnerability vulnerability countermeasure for each domain are different. u-Healthcare System 5 layers of security risk assessment system for domain-specific security vulnerability diagnosis system designed to take the security measures are needed. If you use this proposed model that has been conducted so far vaguely USN-based health information network security vulnerabilities diagnostic measures can be done more systematically provide a model.

Vulnerability AssessmentunderClimateChange and National Water Management Strategy

  • Koontanakulvong, Sucharit;Suthinon, Pongsak
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2016.05a
    • /
    • pp.204-204
    • /
    • 2016
  • Thailand had set the National Water Management Strategy which covered main six areas in the next 12 years, i.e., by priority: (1) water for household, (2) water for agricultural and industrial production, (3) water for flood and drought management, (4) water for quality issue, (5) water from forest conservation and soil erosion protection, (6) water resources management. However due to the climate change impact, there is a question for all strategies is whether to complete this mission under future climate change. If the impact affects our target, we have to clarify how to mitigate or to adapt with it. Vulnerability assessment was conducted under the framework of ADB's (with the parameters of exposure, sensitivity and adaptive capacity) and the assessments were classified into groups due to their different characteristic and the framework of the National Water Management Strategy, i.e., water supply (rural and urban), water for development (agriculture and others), water disasters (floods (flash, overflow), drought, water quality). The assessments identified the parameters concerned and weight factors used for each groups via expert group discussions and by using GIS mapping technology, the vulnerability maps were produced. The maps were verified with present water situation data (floods, drought, water quality). From the analysis result of this water resources management strategy, we found that 30% of all projects face the big impacts, 40% with low impact, and 30% for no impact. It is clear that water-related agencies have to carefully take care approximately 70% of future projects to meet water resources management strategy. It is recommended that additional issues should be addressed to mitigate the impact from climate risk on water resource management of the country, i.e., water resources management under new risk based on development scenarios, relationship with area-based problems, priority definition by viewpoints of risk, vulnerability (impact and occurrence probability in past and future), water management system in emergency case and water reserve system, use of information, knowledge and technology in management, network cooperation and exchange of experiences, knowledge, technique for sustainable development with mitigation and adaptation, education and communication systems in risk, new impact, and emergency-reserve system. These issues will be described and discussed.

  • PDF