SAFETYLIT WEEKLY UPDATE

We compile citations and summaries of about 400 new articles every week.
RSS Feed

HELP: Tutorials | FAQ
CONTACT US: Contact info

Search Results

Journal Article

Citation

Johnston RG. J. Saf. Res. 2004; 35(3): 245-248.

Copyright

(Copyright © 2004, U.S. National Safety Council, Publisher Elsevier Publishing)

DOI

10.1016/j.jsr.2004.03.013

PMID

15288557

Abstract

INTRODUCTION: Safety and security share numerous attributes. The author, who heads the (Security) Vulnerability Assessment Team at Los Alamos National Laboratory, therefore argues that techniques used to optimize security might be useful for optimizing safety. OPTIMIZING SECURITY: There are three main ways to attempt to improve security-security surveys, risk assessment (or "design basis threat"), and vulnerability assessments. The latter is usually the most effective. SAFETY ANALOGS: Vulnerability assessment techniques used to improve security can be applied to safety analysis--even though safety is not ordinarily viewed as having malicious adversaries (other than hazards involving deliberate sabotage). Thinking like a malicious adversary can nevertheless have benefits in identifying safety vulnerabilities. SUGGESTIONS: The attributes of an effective safety vulnerability assessment are discussed, and recommendations are offered for how such an adversarial assessment might work. CONCLUSION: A safety vulnerability assessment can potentially provide new insights, a fresh and vivid perspective on safety hazards, and increased safety awareness.

NEW SEARCH


All SafetyLit records are available for automatic download to Zotero & Mendeley
Print