209,264 research outputs found

    Recent developments in the application of risk analysis to waste technologies.

    Get PDF
    The European waste sector is undergoing a period of unprecedented change driven by business consolidation, new legislation and heightened public and government scrutiny. One feature is the transition of the sector towards a process industry with increased pre-treatment of wastes prior to the disposal of residues and the co-location of technologies at single sites, often also for resource recovery and residuals management. Waste technologies such as in-vessel composting, the thermal treatment of clinical waste, the stabilisation of hazardous wastes, biomass gasification, sludge combustion and the use of wastes as fuel, present operators and regulators with new challenges as to their safe and environmentally responsible operation. A second feature of recent change is an increased regulatory emphasis on public and ecosystem health and the need for assessments of risk to and from waste installations. Public confidence in waste management, secured in part through enforcement of the planning and permitting regimes and sound operational performance, is central to establishing the infrastructure of new waste technologies. Well-informed risk management plays a critical role. We discuss recent developments in risk analysis within the sector and the future needs of risk analysis that are required to respond to the new waste and resource management agenda

    Cyber Babel: Finding the Lingua Franca in Cybersecurity Regulation

    Get PDF
    Cybersecurity regulations have proliferated over the past few years as the significance of the threat has drawn more attention. With breaches making headlines, the public and their representatives are imposing requirements on those that hold sensitive data with renewed vigor. As high-value targets that hold large amounts of sensitive data, financial institutions are among the most heavily regulated. Regulations are necessary. However, regulations also come with costs that impact both large and small companies, their customers, and local, national, and international economies. As the regulations have proliferated so have those costs. The regulations will inevitably and justifiably diverge where different governments view the needs of their citizens differently. However, that should not prevent regulators from recognizing areas of agreement. This Note examines the regulatory regimes governing the data and cybersecurity practices of financial institutions implemented by the Securities and Exchange Commission, the New York Department of Financial Services, and the General Data Protection Regulations of the European Union to identify areas where requirements overlap, with the goal of suggesting implementations that promote consistency, clarity, and cost reduction

    A critical analysis of research potential, challenges and future directives in industrial wireless sensor networks

    Get PDF
    In recent years, Industrial Wireless Sensor Networks (IWSNs) have emerged as an important research theme with applications spanning a wide range of industries including automation, monitoring, process control, feedback systems and automotive. Wide scope of IWSNs applications ranging from small production units, large oil and gas industries to nuclear fission control, enables a fast-paced research in this field. Though IWSNs offer advantages of low cost, flexibility, scalability, self-healing, easy deployment and reformation, yet they pose certain limitations on available potential and introduce challenges on multiple fronts due to their susceptibility to highly complex and uncertain industrial environments. In this paper a detailed discussion on design objectives, challenges and solutions, for IWSNs, are presented. A careful evaluation of industrial systems, deadlines and possible hazards in industrial atmosphere are discussed. The paper also presents a thorough review of the existing standards and industrial protocols and gives a critical evaluation of potential of these standards and protocols along with a detailed discussion on available hardware platforms, specific industrial energy harvesting techniques and their capabilities. The paper lists main service providers for IWSNs solutions and gives insight of future trends and research gaps in the field of IWSNs

    Modern Approaches to Risk Management and Their Use in Customs

    Get PDF
    In the article the analysis of experience and best practices of Europe and the world regarding the methods and tools of risk management in customs affairs. In accordance with the requirements of the Kyoto Convention the risk management is the main basic principle of modern customs control methods, which allows optimal use of resources of customs bodies, without reducing the effectiveness of customs controls, and exempt the majority of foreign trade operators from unnecessary bureaucratic control. Procedures based on risk management, concentrate customs control on areas, where there is the greatest risk, allowing the bulk of goods and individuals relatively free to pass the checkpoint at the customs border Special attention is paid to the principles and methods of risk management and their impact on the simplification of customs procedures through the use of risk-based thinking. The paper discusses the problems concerning the application and implementation of modern risk management techniques in customs procedures subject to the requirements of international standards ISO for the quality management system and risk management based on risk-based thinking

    Medical Cyber-Physical Systems Development: A Forensics-Driven Approach

    Full text link
    The synthesis of technology and the medical industry has partly contributed to the increasing interest in Medical Cyber-Physical Systems (MCPS). While these systems provide benefits to patients and professionals, they also introduce new attack vectors for malicious actors (e.g. financially-and/or criminally-motivated actors). A successful breach involving a MCPS can impact patient data and system availability. The complexity and operating requirements of a MCPS complicates digital investigations. Coupling this information with the potentially vast amounts of information that a MCPS produces and/or has access to is generating discussions on, not only, how to compromise these systems but, more importantly, how to investigate these systems. The paper proposes the integration of forensics principles and concepts into the design and development of a MCPS to strengthen an organization's investigative posture. The framework sets the foundation for future research in the refinement of specific solutions for MCPS investigations.Comment: This is the pre-print version of a paper presented at the 2nd International Workshop on Security, Privacy, and Trustworthiness in Medical Cyber-Physical Systems (MedSPT 2017
    • …
    corecore