期刊文献+

从“对立面”来考虑安全脆弱性 被引量:1

Consider Safety Vulnerability from the Opposite
下载PDF
导出
摘要 安全和治安防卫有很多的共同特征,分析和研究治安防卫达到最佳效果的方法同样可应用于安全和事故防范方面。虽然通常安全不必考虑蓄意的破坏活动,但可以应用治安的脆弱性评估技术来进行安全分析。笔者旨在从另一个角度来讨论安全分析的方法,换一个切入点来辨识安全的脆弱性:将治安防卫中的脆弱性评估方法应用于安全脆弱性分析中,以期达到转换思维模式的目的。为此,讨论了“对立面”分析的人员组成、考虑范围和对该方法的理解,并运用实例,说明从“对立面”来考虑安全脆弱性是可行的。 Safety and security share numerous attributes. The methods used in the study and analysis of optimal effectiveness in security guard could also be used in safety and accident prevention. Though in safety usually don' t have to consider intentional destruction, however, the technology used in assessing security vulnerability might also be used in safety analysis. The authors intend to discuss the method of safety analysis from another angle and to change the point of view in recognizing the safety vulnerability. That is to use the assessment technique for security vulnerability into safety uvlnerability analysis so as to transfoma the way of thinking. It is for this reason that the personnel composite of opposite analysis, the scope covered, and their understanding of this method are discussed. The feasibility of this method is described by realistic examples.
出处 《中国安全科学学报》 CAS CSCD 2005年第11期23-26,共4页 China Safety Science Journal
基金 国家自然科学基金资助(70373031) 国家"十五"科技攻关计划专题项目资助(2001BA803B01)
关键词 安全 脆弱性评估 风险分析 治安防卫 对立性 safety vulnerability assesmxent risk analysis security guard opposite
  • 相关文献

参考文献7

二级参考文献11

  • 1[2]U.S. Office of the Coordinator for Counterterrorism. Patterns of global terrorism-2002[R]., 2003
  • 2[5]Ronfeldt D., Arquilla J. Networks and netwars: The future of terror, crime and militancy[R]. RAND Corporation, 2001
  • 3[6]S. Galam. The September 11 attack: A percolation of individual passive support[J].The European Physical Journal B, 2002,26: 269~272
  • 4[7]Gordon Woo. Insuring against al-Qaeda[R]. National Bureau of Economic Research Meeting. Risk Management Solutions Ltd., 2003
  • 5[8]Serge Galam, Alain Mauger. On reducing terrorism power: a hint from physics[J]. Physica A, 2003,323: 695~704
  • 6[11]U.S. Office of the Coordinator for Counterterrorism. Patterns of global terrorism-2001[R], 2002
  • 7[12]Nancy A. Renfroe, Joseph L. Smith. Threat/Vulnerability Assessments and Risk Analysis[R]. Applied Research Associates Inc.,2002
  • 8.大亚湾核电站系统手册[R].广东核电合营有限公司,1991.7..
  • 9虞子.分裂新疆的“东突独”揭秘[J].凤凰周刊,2001,(36).
  • 10王亚军,黄平.2001年8-11月国内安全事故数据[J].安全与环境学报,2001,1(6):55-64. 被引量:44

共引文献25

同被引文献14

  • 1李因果,李新春.综合评价模型权重确定方法研究[J].辽东学院学报(社会科学版),2007,9(2):92-97. 被引量:60
  • 2American Petroleum Institute. Security vulnerability assessment methodology for the petroleum and petrochemical indus- tries ( Second Edition) [ M]. Washington D C : API Publishing Services, 2004 : 1 - 142.
  • 3Johnston Roger G. Adversarial safety analysis: Borrowing the methods of security vulnerability assessments[J]. Journal of Safety Research, 2004, 35 ( 3 ) : 245 - 253.
  • 4David A Moore. Security risk assessment methodology for the petroleum and petrochemical industries[J]. Journal of Loss Prevention in the Process Industries,2013, 26(6):12 -17.
  • 5G F White. Natural hazards[M]. London: Metheun & Co. Ltd, 1974:1 -212.
  • 6Wire Naude, Amelia Santos-paulino, Mark Mcgillivray. Measuring vulnerability: An overview and introduction [J]. Oxford Development Studies,2009,37(3):183 -191.
  • 7Barry Charles Ezell. Quantifying vulnerability to critical infrastructure[D]. Virginia: Old Dominion University,2005.
  • 8American Homeland Security. National infrastructure protection plan[M]. Washington D C: Homeland Security ,2009:1 -188.
  • 9李鹤,张平宇,程叶青.脆弱性的概念及其评价方法[J].地理科学进展,2008,27(2):18-25. 被引量:426
  • 10刘铁民.事故灾难成因再认识——脆弱性研究[J].中国安全生产科学技术,2010,6(5):5-10. 被引量:71

引证文献1

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部