排序方式: 共有291条查询结果,搜索用时 218 毫秒
31.
Doraval Govender 《African Security Review》2013,22(3):291-306
This article is about the management of security incidents in organisations and companies which are under the protection of private security personnel, whether in-house or contracted. Incidents can be defined as accidental or anecdotal (bird flies into a camera) to a violation of law or company policy. Managing security incidents is one of the key functions of a private security service provider. The purpose of this study is to explore the management of security incidents and the information related thereto, identify shortcomings and find solutions for managing these shortcomings. Interviews were used to gain insight from personnel within the private and government sectors which are served by the private security industry. It was found that security incidents are handled in a routine way by organisations from the different sectors. One major shortcoming is that security incidents and the information related thereto are not managed by security service providers according to an operational framework or model with the required infrastructure and resources. The significance of this study is for security incidents to be managed correctly, so that the information related thereto may be captured accurately, analysed and used proactively and reactively to improve physical protection systems, develop preventative strategies and provide actionable information products in order to reduce crime, increase detection rates and prevent losses. 相似文献
32.
This paper analyses the financial and war‐spending policies of a state that faces a conflict in which defeat would result in the loss of sovereign power and in which the material consequences, conditional on avoiding defeat, are stochastic. The analysis takes explicit account of the historical experiences of lenders, who face debt repudiation if the state to whom they have lent is defeated and who also face partial default if the material consequences of the war are unfavorable for the debtor state, even if it avoids defeat. In this analysis, the state uses war debt to smooth expected consumption intertemporally in response to temporary war spending, and the state also uses contingent debt servicing to insure realized consumption against the risk associated with the material consequences of the war. An important innovation in the analysis is to treat the equilibrium amount of war spending, the state's resulting probability of avoiding defeat, as well as the equilibrium amount of borrowing as a set of endogenous variables to be determined simultaneously. 相似文献
33.
从战术导弹靶场试验风险因素存在的主要环节分析入手,建立了风险因素指标体系,结合靶场试验特点阐述了风险辨识、评估、处理的原则和方法,结合某型舰空导弹试验靶标保障的工程问题,对该靶标供靶风险进行了辨识,对风险发生的概率和后果严重性作出了评估,并在此基础上提出了解决问题的基本途径. 相似文献
34.
采用工作结构分解(Work Breakdown Structure,WBS)和风险结构分解法(Risk Breakdown Structure,RBS)对装备保障综合演练全过程的风险及其风险因素进行了系统分析,得出了装备保障综合演练过程中存在的7类风险、24种风险因素;运用网络层次分析法(Analytic Network Process,ANP)对各种风险及其风险因素进行了评估,得出了其对装备保障综合演练风险影响的权重及排序。研究结果可为装备保障综合演练顺利开展,确保人员、装备安全提供参考。 相似文献
35.
当前,领导干部经济责任审计风险的成因主要有外部原因和内部原因两个方面。防范经济责任审计风险,必须创造良好的审计环境,加强审计工作管理,努力提高审计人员的综合素质。 相似文献
36.
37.
导弹的落点精度包括落点的准确度与密集度。对于子样很小的情况 ,分别鉴定准确度和密集度是有一定的难度。本文提出了采用概率圆的综合鉴定方法。当落入概率圆的导弹数大于等于要求的数时就接收 ,否则拒绝。文中给出了如何确定落入概率圆的导弹数 ,并且给出了该方法的风险。最后以仿真实例说明了方法的有效性。概率圆方法简便易行 ,便于工程应用。 相似文献
38.
贝叶斯网络推理在信息系统安全风险评估中的应用 总被引:2,自引:0,他引:2
提出了一种基于贝叶斯网络推理的安全风险评估方法。从实际出发建立信息系统的贝叶斯网络模型,根据专家给出的先验信息,结合获得的证据信息,运用Pearl方法完成对模型的评估,给出在特定条件下模型的计算——线性推理算法。最后,以实例分析信息系统安全评估的实现过程,结果表明,该方法可行、有效。 相似文献
39.
针对当前石化企业新技术、新工艺、新材料的不断应用,从典型化学反应入手分析了石化企业的火灾危险性,探讨了石化企业火灾特点,并将安全预评价和安全评价的理论方法引入到石油企业的安全防控中,结合石化企业的本质安全化建设,提出了安全对策,为新时期石化企业的火灾预防提供了理论依据。 相似文献
40.
张鸿鹤 《中国人民武装警察部队学院学报》2007,23(4):29-32
分析了地下停车库的火灾特点,并从停车库的火灾规模、发生轰燃的烟气条件、释放辐射热的大小、相邻汽车被引燃的临界条件和自动喷水系统的动作时间等几方面对停车库潜在的火灾危险性进行了探讨。以某地下一层停车库为例,对其火灾风险进行了具体评价。 相似文献