首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   45篇
  免费   1篇
管理学   45篇
社会学   1篇
  2017年   1篇
  2013年   1篇
  2012年   4篇
  2011年   2篇
  2009年   5篇
  2008年   1篇
  2007年   4篇
  2006年   1篇
  2004年   3篇
  2003年   2篇
  2002年   3篇
  2001年   2篇
  2000年   1篇
  1999年   4篇
  1998年   1篇
  1996年   1篇
  1995年   1篇
  1994年   2篇
  1991年   1篇
  1990年   2篇
  1989年   2篇
  1987年   1篇
  1983年   1篇
排序方式: 共有46条查询结果,搜索用时 78 毫秒
1.
2.
Risk Modeling, Assessment, and Management of Lahar Flow Threat   总被引:1,自引:0,他引:1  
The 1991 eruption of Mount Pinatubo in the Philippines is considered one of the most violent and destructive volcanic activities in the 20th century. Lahar is the Indonesian term for volcanic ash, and lahar flows resulting from the massive amount of volcanic materials deposited on the mountain's slope posed continued post-eruption threats to the surrounding areas, destroying lives, homes, agricultural products, and infrastructures. Risks of lahar flows were identified immediately after the eruption, with scientific data provided by the Philippine Institute of Volcanology, the U.S. Geological Survey, and other research institutions. However, competing political, economic, and social agendas subordinated the importance of scientific information to policy making. Using systemic risk analysis and management, this article addresses the issues of multiple objectives and the effective integration of scientific techniques into the decision-making process. It provides a modeling framework for identifying, prioritizing, and evaluating policies for managing risk. The major considerations are: (1) applying a holistic approach to risk analysis through hierarchical holographic modeling, (2) applying statistical methods to gain insight into the problem of uncertainty in risk assessment, (3) using multiobjective trade-off analysis to address the issue of multiple decisionmakers and stakeholders in the decision-making process, (4) using the conditional expected value of extreme events to complement and supplement the expected value in quantifying risk, and (5) assessing the impacts of multistage decisions. Numerical examples based on ex post data are formulated to illustrate applications to various problems. The resulting framework from this study can serve as a general baseline model for assessing and managing risks of natural disasters, which the Philippines' lead agency-the National Disaster Coordinating Council (NDCC)-and other related organizations can use for their decision-making processes.  相似文献   
3.
Interdependency analysis in the context of this article is a process of assessing and managing risks inherent in a system of interconnected entities (e.g., infrastructures or industry sectors). Invoking the principles of input-output (I-O) and decomposition analysis, the article offers a framework for describing how terrorism-induced perturbations can propagate due to interconnectedness. Data published by the Bureau of Economic Analysis Division of the U.S. Department of Commerce is utilized to present applications to serve as test beds for the proposed framework. Specifically, a case study estimating the economic impact of airline demand perturbations to national-level U.S. sectors is made possible using I-O matrices. A ranking of the affected sectors according to their vulnerability to perturbations originating from a primary sector (e.g., air transportation) can serve as important input to risk management. For example, limited resources can be prioritized for the "top-n" sectors that are perceived to suffer the greatest economic losses due to terrorism. In addition, regional decomposition via location quotients enables the analysis of local-level terrorism events. The Regional I-O Multiplier System II (RIMS II) Division of the U.S. Department of Commerce is the agency responsible for releasing the regional multipliers for various geographical resolutions (economic areas, states, and counties). A regional-level case study demonstrates a process of estimating the economic impact of transportation-related scenarios on industry sectors within Economic Area 010 (the New York metropolitan region and vicinities).  相似文献   
4.
Single-objective-based decision-tree analysis has been extensively and successfully used in numerous decision-making problems since its formal introduction by Howard Raiffa more than two decades ago. This paper extends the traditional methodology to incorporate multiple noncommensurate objective functions and use of the conditional expected value of the risk of extreme and catastrophic events. The proposed methodology considers the cases where (a) a finite number of actions are available at each decision node and (b) discrete or continuous states of nature can be presented at each chance node. The proposed extension of decision-tree analysis is introduced through an example problem that leads the reader step-by-step into the methodological procedure. The example problem builds on flood warning systems. Two noncommensurate objectives—the loss of lives and the loss of property (including monetary costs of the flood warning system)–are incorporated into the decision tree. In addition, two risk measures—the common expected value and the conditional expected value of extreme and catastrophic events—are quantified and are also incorporated into the decision-making process. Theoretical difficulties associated with the stage-wise calculation of conditional expected values are identified and certain simplifying assumptions are made for computational tractibility. In particular, it is revealed that decisions concerning experimentation have a very interesting impact on the noninferior solution set of options—a phenomenon that has no equivalence in the single-objective case.  相似文献   
5.
6.
7.
Yacov Y. Haimes 《Risk analysis》2011,31(8):1175-1186
This article highlights the complexity of the quantification of the multidimensional risk function, develops five systems‐based premises on quantifying the risk of terrorism to a threatened system, and advocates the quantification of vulnerability and resilience through the states of the system. The five premises are: (i) There exists interdependence between a specific threat to a system by terrorist networks and the states of the targeted system, as represented through the system's vulnerability, resilience, and criticality‐impact. (ii) A specific threat, its probability, its timing, the states of the targeted system, and the probability of consequences can be interdependent. (iii) The two questions in the risk assessment process: “What is the likelihood?” and “What are the consequences?” can be interdependent. (iv) Risk management policy options can reduce both the likelihood of a threat to a targeted system and the associated likelihood of consequences by changing the states (including both vulnerability and resilience) of the system. (v) The quantification of risk to a vulnerable system from a specific threat must be built on a systemic and repeatable modeling process, by recognizing that the states of the system constitute an essential step to construct quantitative metrics of the consequences based on intelligence gathering, expert evidence, and other qualitative information. The fact that the states of all systems are functions of time (among other variables) makes the time frame pivotal in each component of the process of risk assessment, management, and communication. Thus, risk to a system, caused by an initiating event (e.g., a threat) is a multidimensional function of the specific threat, its probability and time frame, the states of the system (representing vulnerability and resilience), and the probabilistic multidimensional consequences.  相似文献   
8.
As the first article of a two-part series, the purpose of this paper is to examine the functional factors that contribute to automobile accident occurrence and to model the causation structure in the form of a fault-tree. The fault-tree model provides an intuitive framework for qualitatively decomposing possible pathways to accident occurrence. Fault-tree analysis also provides a statistical representation of how interacting driver, vehicle, and environmental factors contribute to the likelihood of automobile accident occurrence. The application of this model facilitates pinpointing those factors that most contribute to accident causation and subsequently enables the identification and comparison of potential crash avoidance technologies.  相似文献   
9.
The terrorist acts of September 11, 2001 were a wake‐up call for changing our traditional response to risks of terrorism. Given that government and worldwide think‐tank organizations maintain that risks of terrorism will continue for the indefinite future, the following questions deserve strategic answers. How long can we respond to terrorism with tactical measures only, sustain current curtailments of some of our freedoms, travel, and quality of life, and absorb losses in human life and properties? Should not underlying strategic motivation lead to the tactical measures? Why do so many groups and individuals in some developing countries hate us? Is it because they fear that the ideas we export through television, movies, literature, and music have a corrupting influence on their cultures? Is it because of past operations that we conducted in such countries as Iran, Nicaragua, El Salvador, and Granada? Can the genesis of the risks of terrorism to the homeland be traced to the unfavorable socioeconomic conditions in less‐privileged and developing countries, where civil and religious freedoms are close to nonexistent, and sanitary conditions, health and education, and critical infrastructures of essential utilities are almost at the same level that existed in the United States almost a century ago? If we could make progress at improving the quality of life of the billions of people in the developing countries and become more sensitive to their needs, cultures, and heritage, would their hatred subside? What other measures can we take to reduce their hatred, without compromising our basic cultural and democratic principles or their cultural and social heritage?  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号