Much more than a technical book. Erik’s work is a well documented journey into the multiple interactions between safety, work and human nature. A timely contribution to vindicate human beings and ...their variability from the one sided focus on the evils of human error. A groundbreaking look at ‘the other story’ that will certainly contribute to safer and more productive workplaces.
Dr Alejandro Morales, Mutual Seguridad, Chile
Safety needs a new maturity. We can no longer improve by simply doing what we have been doing, even by doing it better. DR Hollnagel brings forth new distinctions, interpretations, and narratives that will allow safety to progress to new unforeseen levels. Safety-II is more than just incident and accident prevention. A must read for every safety professional.
Tom McDaniel, Global Manager Zero Harm and Human Performance, Siemens Energy, Inc., USA
The auditor's guide to ensuring correct security and privacy practices in a cloud computing environmentMany organizations are reporting or projecting a significant cost savings through the use of ...cloud computing—utilizing shared computing resources to provide ubiquitous access for organizations and end users. Just as many organizations, however, are expressing concern with security and privacy issues for their organization's data in the 'cloud.' Auditing Cloud Computingprovides necessary guidance to build a proper audit to ensure operational integrity and customer data protection, among other aspects, are addressed for cloud based resources.Provides necessary guidance to ensure auditors address security and privacy aspects that through a proper audit can provide a specified level of assurance for an organization's resourcesReveals effective methods for evaluating the security and privacy practices of cloud servicesA cloud computing reference for auditors and IT security professionals, as well as those preparing for certification credentials, such as Certified Information Systems Auditor (CISA)Timely and practical, Auditing Cloud Computingexpertly provides information to assist in preparing for an audit addressing cloud computing security and privacy for both businesses and cloud based service providers.
The book has been developed in conjunction with NERS 462, a course offered every year to seniors and graduate students in the University of Michigan NERS program.The first half of the book covers the ...principles of risk analysis, the techniques used to develop and update a reliability data base, the reliability of multi-component systems, Markov methods used to analyze the unavailability of systems with repairs, fault trees and event trees used in probabilistic risk assessments (PRAs), and failure modes of systems. All of this material is general enough that it could be used in non-nuclear applications, although there is an emphasis placed on the analysis of nuclear systems.The second half of the book covers the safety analysis of nuclear energy systems, an analysis of major accidents and incidents that occurred in commercial nuclear plants, applications of PRA techniques to the safety analysis of nuclear power plants (focusing on a major PRA study for five nuclear power plants), practical PRA examples, and emerging techniques in the structure of dynamic event trees and fault trees that can provide a more realistic representation of complex sequences of events. The book concludes with a discussion on passive safety features of advanced nuclear energy systems under development and approaches taken for risk-informed regulations for nuclear plants.
Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range ...of malware targeting operating systems like Symbian and new devices like the iPhone. Examining code in past, current, and future risks, protect your banking, auctioning, and other activities performed on mobile devices. * Visual Payloads View attacks as visible to the end user, including notation of variants. * Timeline of Mobile Hoaxes and Threats Understand the history of major attacks and horizon for emerging threates. * Overview of Mobile Malware Families Identify and understand groups of mobile malicious code and their variations. * Taxonomy of Mobile Malware Bring order to known samples based on infection, distribution, and payload strategies. * Phishing, SMishing, and Vishing Attacks Detect and mitigate phone-based phishing (vishing) and SMS phishing (SMishing) techniques. * Operating System and Device Vulnerabilities Analyze unique OS security issues and examine offensive mobile device threats. * Analyze Mobile Malware Design a sandbox for dynamic software analysis and use MobileSandbox to analyze mobile malware. * Forensic Analysis of Mobile Malware Conduct forensic analysis of mobile devices and learn key differences in mobile forensics. * Debugging and Disassembling Mobile Malware Use IDA and other tools to reverse-engineer samples of malicious code for analysis. * Mobile Malware Mitigation Measures Qualify risk, understand threats to mobile assets, defend against attacks, and remediate incidents.* Understand the History and Threat Landscape of Rapidly Emerging Mobile Attacks * Analyze Mobile Device/Platform Vulnerabilities and Exploits * Mitigate Current and Future Mobile Malware Threats
The development of an instrument typically requires a reliability study. For formative assessment instruments, however, reliability is less of a concern unless a formative instrument gets used as a ...research tool or for summative purposes. When that happens, the formative instrument needs to be evaluated for reliability. The POSTT is one of those instruments that was developed for formative purposes and then subsequently used in research; but little attention has been paid to reliability. Since only a few researchers have reported the reliability of the POSTT, it is important to investigate its reliability. The primary purpose of the study reported in this paper was to determine the reliability of the POSTT using a test and retest method. The study was a secondary analysis of existing POSTT data. The results suggest that the items are relatively stable although there is some intra-individual variability. We conclude that the instrument is sufficiently reliable for research purposes.
The black belt librarian Graham, Warren
ALA Editions,
2012., 2011, 2012-00-00, 2014-05-14, 2011-12-01
eBook, Book
Sharing expertise gleaned from more than two decades as a library security manager, Graham demonstrates that libraries can maintain their best traditions of openness and public access by creating an ...unobtrusive yet effective security plan. In straightforward language, the author * Shows how to easily set clear expectations for visitors behavior * Presents guidelines for when and how to intervene when someone violates the code of conduct, including tips for approaching an unruly patron * Offers instruction on keeping persistent troublemakers under control or permanently barred from the library * Gives library staff tools for communicating effectively with its security professionals, including examples of basic documentation The Black Belt Librarian arms librarians with the confidence and know-how they need to maintain a comfortable, productive, and safe environment for everyone in the library.
Responding to the alarm caused by recent hospital scandals and accounts of unintended harm to patients, this author draws on her experience of analyzing the health care systems of over a dozen ...countries and examines whether greater regulation has increased patient safety and health care quality. It will be of key interest to government actors, health care professionals and medico-legal scholars.
In a world in which global trade is at risk, where warehouses and airports, shipping lanes and seaports try to guard against the likes of Al Qaeda and Somali pirates, and natural disaster can disrupt ...the flow of goods, even our "stuff" has a political life. The high stakes of logistics are not surprising, Deborah Cowen reveals, if we understand its genesis in war.
InThe Deadly Life of Logistics, Cowen traces the art and science of logistics over the last sixty years, from the battlefield to the boardroom and back again. Focusing on choke points such as national borders, zones of piracy, blockades, and cities, she tracks contemporary efforts to keep goods circulating and brings to light the collective violence these efforts produce. She investigates how the old military art of logistics played a critical role in the making of the global economic order-not simply the globalization of production, but the invention of the supply chain and the reorganization of national economies into transnational systems. While reshaping the world of production and distribution, logistics is also actively reconfiguring global maps of security and citizenship, a phenomenon Cowen charts through the rise of supply chain security, with its challenge to long-standing notions of state sovereignty and border management.
Though the object of corporate and governmental logistical efforts is commodity supply,The Deadly Life of Logisticsdemonstrates that they are deeply political-and, considered in the context of the long history of logistics, deeply indebted to the practice of war.
Unpacking Construction Site Safety provides a different perspective of safety in practice. • examines how useful the concept of safety actually is to the development of effective management ...interventions • providing new insights and information to the audience, and assist in a more informed development of new approaches in practice • aimed at safety and construction management practitioners as well as academics
This book—the culmination of a truly collaborative international and highly interdisciplinary effort—brings together Japanese and American political scientists, nuclear engineers, historians, and ...physicists to examine the Fukushima accident from a new and broad perspective. It explains the complex interactions between nuclear safety risks (the causes and consequences of accidents) and nuclear security risks (the causes and consequences of sabotage or terrorist attacks), exposing the possible vulnerabilities all countries may have if they fail to learn from this accident. The book further analyzes the lessons of Fukushima in comparative perspective, focusing on the politics of safety and emergency preparedness. It first compares the different policies and procedures adopted by various nuclear facilities in Japan and then discusses the lessons learned—and not learned—after major nuclear accidents and incidents in other countries in the past. The book's editors conclude that learning lessons across nations has proven to be very difficult, and they propose new policies to improve global learning after nuclear accidents or attacks.