CINXE.COM
Coen Gulijk | University of Huddersfield - Academia.edu
<!DOCTYPE html> <html lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" class="wf-loading"> <head prefix="og: https://ogp.me/ns# fb: https://ogp.me/ns/fb# academia: https://ogp.me/ns/fb/academia#"> <meta charset="utf-8"> <meta name=viewport content="width=device-width, initial-scale=1"> <meta rel="search" type="application/opensearchdescription+xml" href="/open_search.xml" title="Academia.edu"> <title>Coen Gulijk | University of Huddersfield - Academia.edu</title> <!-- _ _ _ | | (_) | | __ _ ___ __ _ __| | ___ _ __ ___ _ __ _ ___ __| |_ _ / _` |/ __/ _` |/ _` |/ _ \ '_ ` _ \| |/ _` | / _ \/ _` | | | | | (_| | (_| (_| | (_| | __/ | | | | | | (_| || __/ (_| | |_| | \__,_|\___\__,_|\__,_|\___|_| |_| |_|_|\__,_(_)___|\__,_|\__,_| We're hiring! See https://www.academia.edu/hiring --> <link href="//a.academia-assets.com/images/favicons/favicon-production.ico" rel="shortcut icon" type="image/vnd.microsoft.icon"> <link rel="apple-touch-icon" sizes="57x57" href="//a.academia-assets.com/images/favicons/apple-touch-icon-57x57.png"> <link rel="apple-touch-icon" sizes="60x60" href="//a.academia-assets.com/images/favicons/apple-touch-icon-60x60.png"> <link rel="apple-touch-icon" sizes="72x72" href="//a.academia-assets.com/images/favicons/apple-touch-icon-72x72.png"> <link rel="apple-touch-icon" sizes="76x76" href="//a.academia-assets.com/images/favicons/apple-touch-icon-76x76.png"> <link rel="apple-touch-icon" sizes="114x114" href="//a.academia-assets.com/images/favicons/apple-touch-icon-114x114.png"> <link rel="apple-touch-icon" sizes="120x120" href="//a.academia-assets.com/images/favicons/apple-touch-icon-120x120.png"> <link rel="apple-touch-icon" sizes="144x144" href="//a.academia-assets.com/images/favicons/apple-touch-icon-144x144.png"> <link rel="apple-touch-icon" sizes="152x152" href="//a.academia-assets.com/images/favicons/apple-touch-icon-152x152.png"> <link rel="apple-touch-icon" sizes="180x180" href="//a.academia-assets.com/images/favicons/apple-touch-icon-180x180.png"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-32x32.png" sizes="32x32"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-194x194.png" sizes="194x194"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-96x96.png" sizes="96x96"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/android-chrome-192x192.png" sizes="192x192"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-16x16.png" sizes="16x16"> <link rel="manifest" href="//a.academia-assets.com/images/favicons/manifest.json"> <meta name="msapplication-TileColor" content="#2b5797"> <meta name="msapplication-TileImage" content="//a.academia-assets.com/images/favicons/mstile-144x144.png"> <meta name="theme-color" content="#ffffff"> <script> window.performance && window.performance.measure && window.performance.measure("Time To First Byte", "requestStart", "responseStart"); </script> <script> (function() { if (!window.URLSearchParams || !window.history || !window.history.replaceState) { return; } var searchParams = new URLSearchParams(window.location.search); var paramsToDelete = [ 'fs', 'sm', 'swp', 'iid', 'nbs', 'rcc', // related content category 'rcpos', // related content carousel position 'rcpg', // related carousel page 'rchid', // related content hit id 'f_ri', // research interest id, for SEO tracking 'f_fri', // featured research interest, for SEO tracking (param key without value) 'f_rid', // from research interest directory for SEO tracking 'f_loswp', // from research interest pills on LOSWP sidebar for SEO tracking 'rhid', // referrring hit id ]; if (paramsToDelete.every((key) => searchParams.get(key) === null)) { return; } paramsToDelete.forEach((key) => { searchParams.delete(key); }); var cleanUrl = new URL(window.location.href); cleanUrl.search = searchParams.toString(); history.replaceState({}, document.title, cleanUrl); })(); </script> <script async src="https://www.googletagmanager.com/gtag/js?id=G-5VKX33P2DS"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-5VKX33P2DS', { cookie_domain: 'academia.edu', send_page_view: false, }); gtag('event', 'page_view', { 'controller': "profiles/works", 'action': "summary", 'controller_action': 'profiles/works#summary', 'logged_in': 'false', 'edge': 'unknown', // Send nil if there is no A/B test bucket, in case some records get logged // with missing data - that way we can distinguish between the two cases. // ab_test_bucket should be of the form <ab_test_name>:<bucket> 'ab_test_bucket': null, }) </script> <script type="text/javascript"> window.sendUserTiming = function(timingName) { if (!(window.performance && window.performance.measure)) return; var entries = window.performance.getEntriesByName(timingName, "measure"); if (entries.length !== 1) return; var timingValue = Math.round(entries[0].duration); gtag('event', 'timing_complete', { name: timingName, value: timingValue, event_category: 'User-centric', }); }; window.sendUserTiming("Time To First Byte"); </script> <meta name="csrf-param" content="authenticity_token" /> <meta name="csrf-token" content="68pL+2Msy5swNLPxEhXM9Sa/Upe+a01vGY5bLA6i6dnmsixwwvIXnX+pYff17Hb9aAEj3hXZKw/gD8WajeDP+A==" /> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/wow-77f7b87cb1583fc59aa8f94756ebfe913345937eb932042b4077563bebb5fb4b.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/social/home-9e8218e1301001388038e3fc3427ed00d079a4760ff7745d1ec1b2d59103170a.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/heading-b2b823dd904da60a48fd1bfa1defd840610c2ff414d3f39ed3af46277ab8df3b.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/button-3cea6e0ad4715ed965c49bfb15dedfc632787b32ff6d8c3a474182b231146ab7.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/body-8d679e925718b5e8e4b18e9a4fab37f7eaa99e43386459376559080ac8f2856a.css" /><link crossorigin="" href="https://fonts.gstatic.com/" rel="preconnect" /><link href="https://fonts.googleapis.com/css2?family=DM+Sans:ital,opsz,wght@0,9..40,100..1000;1,9..40,100..1000&family=Gupter:wght@400;500;700&family=IBM+Plex+Mono:wght@300;400&family=Material+Symbols+Outlined:opsz,wght,FILL,GRAD@20,400,0,0&display=swap" rel="stylesheet" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/common-10fa40af19d25203774df2d4a03b9b5771b45109c2304968038e88a81d1215c5.css" /> <meta name="author" content="coen gulijk" /> <meta name="description" content="Coen Gulijk, University of Huddersfield: 55 Followers, 6 Following, 51 Research papers. Research interests: Disturbance Ecology, Bioscience, and Biosciences." /> <meta name="google-site-verification" content="bKJMBZA7E43xhDOopFZkssMMkBRjvYERV-NaN4R6mrs" /> <script> var $controller_name = 'works'; var $action_name = "summary"; var $rails_env = 'production'; var $app_rev = '92477ec68c09d28ae4730a4143c926f074776319'; var $domain = 'academia.edu'; var $app_host = "academia.edu"; var $asset_host = "academia-assets.com"; var $start_time = new Date().getTime(); var $recaptcha_key = "6LdxlRMTAAAAADnu_zyLhLg0YF9uACwz78shpjJB"; var $recaptcha_invisible_key = "6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj"; var $disableClientRecordHit = false; </script> <script> window.Aedu = { hit_data: null }; window.Aedu.SiteStats = {"premium_universities_count":15276,"monthly_visitors":"113 million","monthly_visitor_count":113458213,"monthly_visitor_count_in_millions":113,"user_count":277535005,"paper_count":55203019,"paper_count_in_millions":55,"page_count":432000000,"page_count_in_millions":432,"pdf_count":16500000,"pdf_count_in_millions":16}; window.Aedu.serverRenderTime = new Date(1732796817000); window.Aedu.timeDifference = new Date().getTime() - 1732796817000; window.Aedu.isUsingCssV1 = false; window.Aedu.enableLocalization = true; window.Aedu.activateFullstory = false; window.Aedu.serviceAvailability = { status: {"attention_db":"on","bibliography_db":"on","contacts_db":"on","email_db":"on","indexability_db":"on","mentions_db":"on","news_db":"on","notifications_db":"on","offsite_mentions_db":"on","redshift":"on","redshift_exports_db":"on","related_works_db":"on","ring_db":"on","user_tests_db":"on"}, serviceEnabled: function(service) { return this.status[service] === "on"; }, readEnabled: function(service) { return this.serviceEnabled(service) || this.status[service] === "read_only"; }, }; window.Aedu.viewApmTrace = function() { // Check if x-apm-trace-id meta tag is set, and open the trace in APM // in a new window if it is. var apmTraceId = document.head.querySelector('meta[name="x-apm-trace-id"]'); if (apmTraceId) { var traceId = apmTraceId.content; // Use trace ID to construct URL, an example URL looks like: // https://app.datadoghq.com/apm/traces?query=trace_id%31298410148923562634 var apmUrl = 'https://app.datadoghq.com/apm/traces?query=trace_id%3A' + traceId; window.open(apmUrl, '_blank'); } }; </script> <!--[if lt IE 9]> <script src="//cdnjs.cloudflare.com/ajax/libs/html5shiv/3.7.2/html5shiv.min.js"></script> <![endif]--> <link href="https://fonts.googleapis.com/css?family=Roboto:100,100i,300,300i,400,400i,500,500i,700,700i,900,900i" rel="stylesheet"> <link href="//maxcdn.bootstrapcdn.com/font-awesome/4.3.0/css/font-awesome.min.css" rel="stylesheet"> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/libraries-a9675dcb01ec4ef6aa807ba772c7a5a00c1820d3ff661c1038a20f80d06bb4e4.css" /> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/academia-bdb9e8c097f01e611f2fc5e2f1a9dc599beede975e2ae5629983543a1726e947.css" /> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system_legacy-056a9113b9a0f5343d013b29ee1929d5a18be35fdcdceb616600b4db8bd20054.css" /> <script src="//a.academia-assets.com/assets/webpack_bundles/runtime-bundle-005434038af4252ca37c527588411a3d6a0eabb5f727fac83f8bbe7fd88d93bb.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/webpack_libraries_and_infrequently_changed.wjs-bundle-bae13f9b51961d5f1e06008e39e31d0138cb31332e8c2e874c6d6a250ec2bb14.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/core_webpack.wjs-bundle-19a25d160d01bde427443d06cd6b810c4c92c6026e7cb31519e06313eb24ed90.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/sentry.wjs-bundle-5fe03fddca915c8ba0f7edbe64c194308e8ce5abaed7bffe1255ff37549c4808.js"></script> <script> jade = window.jade || {}; jade.helpers = window.$h; jade._ = window._; </script> <!-- Google Tag Manager --> <script id="tag-manager-head-root">(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer_old','GTM-5G9JF7Z');</script> <!-- End Google Tag Manager --> <script> window.gptadslots = []; window.googletag = window.googletag || {}; window.googletag.cmd = window.googletag.cmd || []; </script> <script type="text/javascript"> // TODO(jacob): This should be defined, may be rare load order problem. // Checking if null is just a quick fix, will default to en if unset. // Better fix is to run this immedietely after I18n is set. if (window.I18n != null) { I18n.defaultLocale = "en"; I18n.locale = "en"; I18n.fallbacks = true; } </script> <link rel="canonical" href="https://hud.academia.edu/CoenGulijk" /> </head> <!--[if gte IE 9 ]> <body class='ie ie9 c-profiles/works a-summary logged_out'> <![endif]--> <!--[if !(IE) ]><!--> <body class='c-profiles/works a-summary logged_out'> <!--<![endif]--> <div id="fb-root"></div><script>window.fbAsyncInit = function() { FB.init({ appId: "2369844204", version: "v8.0", status: true, cookie: true, xfbml: true }); // Additional initialization code. if (window.InitFacebook) { // facebook.ts already loaded, set it up. window.InitFacebook(); } else { // Set a flag for facebook.ts to find when it loads. window.academiaAuthReadyFacebook = true; } };</script><script>window.fbAsyncLoad = function() { // Protection against double calling of this function if (window.FB) { return; } (function(d, s, id){ var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) {return;} js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/sdk.js"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk')); } if (!window.defer_facebook) { // Autoload if not deferred window.fbAsyncLoad(); } else { // Defer loading by 5 seconds setTimeout(function() { window.fbAsyncLoad(); }, 5000); }</script> <div id="google-root"></div><script>window.loadGoogle = function() { if (window.InitGoogle) { // google.ts already loaded, set it up. window.InitGoogle("331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"); } else { // Set a flag for google.ts to use when it loads. window.GoogleClientID = "331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"; } };</script><script>window.googleAsyncLoad = function() { // Protection against double calling of this function (function(d) { var js; var id = 'google-jssdk'; var ref = d.getElementsByTagName('script')[0]; if (d.getElementById(id)) { return; } js = d.createElement('script'); js.id = id; js.async = true; js.onload = loadGoogle; js.src = "https://accounts.google.com/gsi/client" ref.parentNode.insertBefore(js, ref); }(document)); } if (!window.defer_google) { // Autoload if not deferred window.googleAsyncLoad(); } else { // Defer loading by 5 seconds setTimeout(function() { window.googleAsyncLoad(); }, 5000); }</script> <div id="tag-manager-body-root"> <!-- Google Tag Manager (noscript) --> <noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-5G9JF7Z" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript> <!-- End Google Tag Manager (noscript) --> <!-- Event listeners for analytics --> <script> window.addEventListener('load', function() { if (document.querySelector('input[name="commit"]')) { document.querySelector('input[name="commit"]').addEventListener('click', function() { gtag('event', 'click', { event_category: 'button', event_label: 'Log In' }) }) } }); </script> </div> <script>var _comscore = _comscore || []; _comscore.push({ c1: "2", c2: "26766707" }); (function() { var s = document.createElement("script"), el = document.getElementsByTagName("script")[0]; s.async = true; s.src = (document.location.protocol == "https:" ? "https://sb" : "http://b") + ".scorecardresearch.com/beacon.js"; el.parentNode.insertBefore(s, el); })();</script><img src="https://sb.scorecardresearch.com/p?c1=2&c2=26766707&cv=2.0&cj=1" style="position: absolute; visibility: hidden" /> <div id='react-modal'></div> <div class='DesignSystem'> <a class='u-showOnFocus' href='#site'> Skip to main content </a> </div> <div id="upgrade_ie_banner" style="display: none;"><p>Academia.edu no longer supports Internet Explorer.</p><p>To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to <a href="https://www.academia.edu/upgrade-browser">upgrade your browser</a>.</p></div><script>// Show this banner for all versions of IE if (!!window.MSInputMethodContext || /(MSIE)/.test(navigator.userAgent)) { document.getElementById('upgrade_ie_banner').style.display = 'block'; }</script> <div class="DesignSystem bootstrap ShrinkableNav"><div class="navbar navbar-default main-header"><div class="container-wrapper" id="main-header-container"><div class="container"><div class="navbar-header"><div class="nav-left-wrapper u-mt0x"><div class="nav-logo"><a data-main-header-link-target="logo_home" href="https://www.academia.edu/"><img class="visible-xs-inline-block" style="height: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015-A.svg" width="24" height="24" /><img width="145.2" height="18" class="hidden-xs" style="height: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015.svg" /></a></div><div class="nav-search"><div class="SiteSearch-wrapper select2-no-default-pills"><form class="js-SiteSearch-form DesignSystem" action="https://www.academia.edu/search" accept-charset="UTF-8" method="get"><input name="utf8" type="hidden" value="✓" autocomplete="off" /><i class="SiteSearch-icon fa fa-search u-fw700 u-positionAbsolute u-tcGrayDark"></i><input class="js-SiteSearch-form-input SiteSearch-form-input form-control" data-main-header-click-target="search_input" name="q" placeholder="Search" type="text" value="" /></form></div></div></div><div class="nav-right-wrapper pull-right"><ul class="NavLinks js-main-nav list-unstyled"><li class="NavLinks-link"><a class="js-header-login-url Button Button--inverseGray Button--sm u-mb4x" id="nav_log_in" rel="nofollow" href="https://www.academia.edu/login">Log In</a></li><li class="NavLinks-link u-p0x"><a class="Button Button--inverseGray Button--sm u-mb4x" rel="nofollow" href="https://www.academia.edu/signup">Sign Up</a></li></ul><button class="hidden-lg hidden-md hidden-sm u-ml4x navbar-toggle collapsed" data-target=".js-mobile-header-links" data-toggle="collapse" type="button"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></button></div></div><div class="collapse navbar-collapse js-mobile-header-links"><ul class="nav navbar-nav"><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/login">Log In</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/signup">Sign Up</a></li><li class="u-borderColorGrayLight u-borderBottom1 js-mobile-nav-expand-trigger"><a href="#">more <span class="caret"></span></a></li><li><ul class="js-mobile-nav-expand-section nav navbar-nav u-m0x collapse"><li class="u-borderColorGrayLight u-borderBottom1"><a rel="false" href="https://www.academia.edu/about">About</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/press">Press</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://medium.com/@academia">Blog</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="false" href="https://www.academia.edu/documents">Papers</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/terms">Terms</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/privacy">Privacy</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/copyright">Copyright</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/hiring"><i class="fa fa-briefcase"></i> We're Hiring!</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://support.academia.edu/"><i class="fa fa-question-circle"></i> Help Center</a></li><li class="js-mobile-nav-collapse-trigger u-borderColorGrayLight u-borderBottom1 dropup" style="display:none"><a href="#">less <span class="caret"></span></a></li></ul></li></ul></div></div></div><script>(function(){ var $moreLink = $(".js-mobile-nav-expand-trigger"); var $lessLink = $(".js-mobile-nav-collapse-trigger"); var $section = $('.js-mobile-nav-expand-section'); $moreLink.click(function(ev){ ev.preventDefault(); $moreLink.hide(); $lessLink.show(); $section.collapse('show'); }); $lessLink.click(function(ev){ ev.preventDefault(); $moreLink.show(); $lessLink.hide(); $section.collapse('hide'); }); })() if ($a.is_logged_in() || false) { new Aedu.NavigationController({ el: '.js-main-nav', showHighlightedNotification: false }); } else { $(".js-header-login-url").attr("href", $a.loginUrlWithRedirect()); } Aedu.autocompleteSearch = new AutocompleteSearch({el: '.js-SiteSearch-form'});</script></div></div> <div id='site' class='fixed'> <div id="content" class="clearfix"> <script>document.addEventListener('DOMContentLoaded', function(){ var $dismissible = $(".dismissible_banner"); $dismissible.click(function(ev) { $dismissible.hide(); }); });</script> <script src="//a.academia-assets.com/assets/webpack_bundles/profile.wjs-bundle-e032f1d55548c2f2dee4eac9fe52f38beaf13471f2298bb2ea82725ae930b83c.js" defer="defer"></script><script>Aedu.rankings = { showPaperRankingsLink: false } $viewedUser = Aedu.User.set_viewed( {"id":37932251,"first_name":"Coen","middle_initials":null,"last_name":"Gulijk","page_name":"CoenGulijk","domain_name":"hud","created_at":"2015-11-09T01:46:39.427-08:00","display_name":"Coen Gulijk","url":"https://hud.academia.edu/CoenGulijk","photo":"https://0.academia-photos.com/37932251/17112120/17272908/s65_coen.gulijk.jpg","has_photo":true,"department":{"id":129599,"name":"School of Computing \u0026 Engineering","url":"https://hud.academia.edu/Departments/School_of_Computing_Engineering/Documents","university":{"id":509,"name":"University of Huddersfield","url":"https://hud.academia.edu/"}},"position":"Faculty Member","position_id":1,"is_analytics_public":false,"interests":[{"id":10881,"name":"Disturbance Ecology","url":"https://www.academia.edu/Documents/in/Disturbance_Ecology"},{"id":40511,"name":"Bioscience","url":"https://www.academia.edu/Documents/in/Bioscience"},{"id":115041,"name":"Biosciences","url":"https://www.academia.edu/Documents/in/Biosciences"},{"id":11993,"name":"Wetland Ecology","url":"https://www.academia.edu/Documents/in/Wetland_Ecology"},{"id":196448,"name":"Medicina Veterinaria","url":"https://www.academia.edu/Documents/in/Medicina_Veterinaria"}]} ); if ($a.is_logged_in() && $viewedUser.is_current_user()) { $('body').addClass('profile-viewed-by-owner'); } $socialProfiles = []</script><div id="js-react-on-rails-context" style="display:none" data-rails-context="{"inMailer":false,"i18nLocale":"en","i18nDefaultLocale":"en","href":"https://hud.academia.edu/CoenGulijk","location":"/CoenGulijk","scheme":"https","host":"hud.academia.edu","port":null,"pathname":"/CoenGulijk","search":null,"httpAcceptLanguage":null,"serverSide":false}"></div> <div class="js-react-on-rails-component" style="display:none" data-component-name="ProfileCheckPaperUpdate" data-props="{}" data-trace="false" data-dom-id="ProfileCheckPaperUpdate-react-component-6240b526-78e7-4bbd-928e-2f0e3c0f106f"></div> <div id="ProfileCheckPaperUpdate-react-component-6240b526-78e7-4bbd-928e-2f0e3c0f106f"></div> <div class="DesignSystem"><div class="onsite-ping" id="onsite-ping"></div></div><div class="profile-user-info DesignSystem"><div class="social-profile-container"><div class="left-panel-container"><div class="user-info-component-wrapper"><div class="user-summary-cta-container"><div class="user-summary-container"><div class="social-profile-avatar-container"><img class="profile-avatar u-positionAbsolute" alt="Coen Gulijk" border="0" onerror="if (this.src != '//a.academia-assets.com/images/s200_no_pic.png') this.src = '//a.academia-assets.com/images/s200_no_pic.png';" width="200" height="200" src="https://0.academia-photos.com/37932251/17112120/17272908/s200_coen.gulijk.jpg" /></div><div class="title-container"><h1 class="ds2-5-heading-sans-serif-sm">Coen Gulijk</h1><div class="affiliations-container fake-truncate js-profile-affiliations"><div><a class="u-tcGrayDarker" href="https://hud.academia.edu/">University of Huddersfield</a>, <a class="u-tcGrayDarker" href="https://hud.academia.edu/Departments/School_of_Computing_Engineering/Documents">School of Computing & Engineering</a>, <span class="u-tcGrayDarker">Faculty Member</span></div></div></div></div><div class="sidebar-cta-container"><button class="ds2-5-button hidden profile-cta-button grow js-profile-follow-button" data-broccoli-component="user-info.follow-button" data-click-track="profile-user-info-follow-button" data-follow-user-fname="Coen" data-follow-user-id="37932251" data-follow-user-source="profile_button" data-has-google="false"><span class="material-symbols-outlined" style="font-size: 20px" translate="no">add</span>Follow</button><button class="ds2-5-button hidden profile-cta-button grow js-profile-unfollow-button" data-broccoli-component="user-info.unfollow-button" data-click-track="profile-user-info-unfollow-button" data-unfollow-user-id="37932251"><span class="material-symbols-outlined" style="font-size: 20px" translate="no">done</span>Following</button></div></div><div class="user-stats-container"><a><div class="stat-container js-profile-followers"><p class="label">Followers</p><p class="data">55</p></div></a><a><div class="stat-container js-profile-followees" data-broccoli-component="user-info.followees-count" data-click-track="profile-expand-user-info-following"><p class="label">Following</p><p class="data">6</p></div></a><a><div class="stat-container js-profile-coauthors" data-broccoli-component="user-info.coauthors-count" data-click-track="profile-expand-user-info-coauthors"><p class="label">Co-authors</p><p class="data">15</p></div></a><span><div class="stat-container"><p class="label"><span class="js-profile-total-view-text">Public Views</span></p><p class="data"><span class="js-profile-view-count"></span></p></div></span></div><div class="ri-section"><div class="ri-section-header"><span>Interests</span></div><div class="ri-tags-container"><a data-click-track="profile-user-info-expand-research-interests" data-has-card-for-ri-list="37932251" href="https://www.academia.edu/Documents/in/Disturbance_Ecology"><div id="js-react-on-rails-context" style="display:none" data-rails-context="{"inMailer":false,"i18nLocale":"en","i18nDefaultLocale":"en","href":"https://hud.academia.edu/CoenGulijk","location":"/CoenGulijk","scheme":"https","host":"hud.academia.edu","port":null,"pathname":"/CoenGulijk","search":null,"httpAcceptLanguage":null,"serverSide":false}"></div> <div class="js-react-on-rails-component" style="display:none" data-component-name="Pill" data-props="{"color":"gray","children":["Disturbance Ecology"]}" data-trace="false" data-dom-id="Pill-react-component-f1ed092b-a378-41ce-ba0e-baf08a4d77f9"></div> <div id="Pill-react-component-f1ed092b-a378-41ce-ba0e-baf08a4d77f9"></div> </a><a data-click-track="profile-user-info-expand-research-interests" data-has-card-for-ri-list="37932251" href="https://www.academia.edu/Documents/in/Bioscience"><div class="js-react-on-rails-component" style="display:none" data-component-name="Pill" data-props="{"color":"gray","children":["Bioscience"]}" data-trace="false" data-dom-id="Pill-react-component-1661edc2-9a09-4f36-801a-9dab90a8503b"></div> <div id="Pill-react-component-1661edc2-9a09-4f36-801a-9dab90a8503b"></div> </a><a data-click-track="profile-user-info-expand-research-interests" data-has-card-for-ri-list="37932251" href="https://www.academia.edu/Documents/in/Biosciences"><div class="js-react-on-rails-component" style="display:none" data-component-name="Pill" data-props="{"color":"gray","children":["Biosciences"]}" data-trace="false" data-dom-id="Pill-react-component-eb3c281f-99ee-46f2-901f-ef2d7f1e9865"></div> <div id="Pill-react-component-eb3c281f-99ee-46f2-901f-ef2d7f1e9865"></div> </a><a data-click-track="profile-user-info-expand-research-interests" data-has-card-for-ri-list="37932251" href="https://www.academia.edu/Documents/in/Wetland_Ecology"><div class="js-react-on-rails-component" style="display:none" data-component-name="Pill" data-props="{"color":"gray","children":["Wetland Ecology"]}" data-trace="false" data-dom-id="Pill-react-component-339d8a94-d124-4895-b108-9654c61b13ba"></div> <div id="Pill-react-component-339d8a94-d124-4895-b108-9654c61b13ba"></div> </a><a data-click-track="profile-user-info-expand-research-interests" data-has-card-for-ri-list="37932251" href="https://www.academia.edu/Documents/in/Medicina_Veterinaria"><div class="js-react-on-rails-component" style="display:none" data-component-name="Pill" data-props="{"color":"gray","children":["Medicina Veterinaria"]}" data-trace="false" data-dom-id="Pill-react-component-a06b3189-fab5-4f9c-b5e1-ea6e2bed9030"></div> <div id="Pill-react-component-a06b3189-fab5-4f9c-b5e1-ea6e2bed9030"></div> </a></div></div></div></div><div class="right-panel-container"><div class="user-content-wrapper"><div class="uploads-container" id="social-redesign-work-container"><div class="upload-header"><h2 class="ds2-5-heading-sans-serif-xs">Uploads</h2></div><div class="nav-container backbone-profile-documents-nav hidden-xs"><ul class="nav-tablist" role="tablist"><li class="nav-chip active" role="presentation"><a data-section-name="" data-toggle="tab" href="#all" role="tab">all</a></li><li class="nav-chip" role="presentation"><a class="js-profile-docs-nav-section u-textTruncate" data-click-track="profile-works-tab" data-section-name="Papers" data-toggle="tab" href="#papers" role="tab" title="Papers"><span>50</span> <span class="ds2-5-body-sm-bold">Papers</span></a></li><li class="nav-chip" role="presentation"><a class="js-profile-docs-nav-section u-textTruncate" data-click-track="profile-works-tab" data-section-name="Drafts" data-toggle="tab" href="#drafts" role="tab" title="Drafts"><span>1</span> <span class="ds2-5-body-sm-bold">Drafts</span></a></li></ul></div><div class="divider ds-divider-16" style="margin: 0px;"></div><div class="documents-container backbone-social-profile-documents" style="width: 100%;"><div class="u-taCenter"></div><div class="profile--tab_content_container js-tab-pane tab-pane active" id="all"><div class="profile--tab_heading_container js-section-heading" data-section="Papers" id="Papers"><h3 class="profile--tab_heading_container">Papers by Coen Gulijk</h3></div><div class="js-work-strip profile--work_container" data-work-id="80388087"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/80388087/Experience_from_chemical_industry_for_controlling_patient_safety"><img alt="Research paper thumbnail of Experience from chemical industry for controlling patient safety" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/80388087/Experience_from_chemical_industry_for_controlling_patient_safety">Experience from chemical industry for controlling patient safety</a></div><div class="wp-workCard_item"><span>ESREL 2011</span><span>, 2011</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="80388087"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="80388087"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 80388087; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=80388087]").text(description); $(".js-view-count[data-work-id=80388087]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 80388087; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='80388087']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 80388087, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=80388087]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":80388087,"title":"Experience from chemical industry for controlling patient safety","translated_title":"","metadata":{"publisher":"CRC Press","publication_date":{"day":null,"month":null,"year":2011,"errors":{}},"publication_name":"ESREL 2011"},"translated_abstract":null,"internal_url":"https://www.academia.edu/80388087/Experience_from_chemical_industry_for_controlling_patient_safety","translated_internal_url":"","created_at":"2022-05-31T10:57:06.341-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":37932251,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Experience_from_chemical_industry_for_controlling_patient_safety","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":37932251,"first_name":"Coen","middle_initials":null,"last_name":"Gulijk","page_name":"CoenGulijk","domain_name":"hud","created_at":"2015-11-09T01:46:39.427-08:00","display_name":"Coen Gulijk","url":"https://hud.academia.edu/CoenGulijk"},"attachments":[],"research_interests":[{"id":26,"name":"Business","url":"https://www.academia.edu/Documents/in/Business"},{"id":26327,"name":"Medicine","url":"https://www.academia.edu/Documents/in/Medicine"},{"id":35317,"name":"Process Safety","url":"https://www.academia.edu/Documents/in/Process_Safety"},{"id":1116281,"name":"Chemical Safety","url":"https://www.academia.edu/Documents/in/Chemical_Safety"},{"id":1194586,"name":"T","url":"https://www.academia.edu/Documents/in/T"},{"id":1212997,"name":"Q","url":"https://www.academia.edu/Documents/in/Q"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="18265359"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/18265359/Airport_security_An_ethnographic_study"><img alt="Research paper thumbnail of Airport security: An ethnographic study" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/18265359/Airport_security_An_ethnographic_study">Airport security: An ethnographic study</a></div><div class="wp-workCard_item wp-workCard--coauthors"><span>by </span><span><a class="" data-click-track="profile-work-strip-authors" href="https://independent.academia.edu/AlanKirschenbaum">Alan Kirschenbaum</a> and <a class="" data-click-track="profile-work-strip-authors" href="https://hud.academia.edu/CoenGulijk">Coen Gulijk</a></span></div><div class="wp-workCard_item"><span>Journal of Air Transport Management</span><span>, 2012</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Abstract This paper employs a behavioral science perspective of airport security to, examine secu...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Abstract This paper employs a behavioral science perspective of airport security to, examine security related decision behaviors using exploratory ethnographic observations. Sampling employees from a broad spectrum of departments and occupations in several major ...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="18265359"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="18265359"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 18265359; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=18265359]").text(description); $(".js-view-count[data-work-id=18265359]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 18265359; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='18265359']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 18265359, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=18265359]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":18265359,"title":"Airport security: An ethnographic study","translated_title":"","metadata":{"abstract":"Abstract This paper employs a behavioral science perspective of airport security to, examine security related decision behaviors using exploratory ethnographic observations. Sampling employees from a broad spectrum of departments and occupations in several major ...","publication_date":{"day":null,"month":null,"year":2012,"errors":{}},"publication_name":"Journal of Air Transport Management"},"translated_abstract":"Abstract This paper employs a behavioral science perspective of airport security to, examine security related decision behaviors using exploratory ethnographic observations. Sampling employees from a broad spectrum of departments and occupations in several major ...","internal_url":"https://www.academia.edu/18265359/Airport_security_An_ethnographic_study","translated_internal_url":"","created_at":"2015-11-13T01:34:49.993-08:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":38248047,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[{"id":9667552,"work_id":18265359,"tagging_user_id":38248047,"tagged_user_id":11948859,"co_author_invite_id":null,"email":"m***i@unimore.it","affiliation":"Universit脿 degli studi di Modena e Reggio Emilia","display_order":4194304,"name":"Michele Mariani","title":"Airport security: An ethnographic study"},{"id":9667554,"work_id":18265359,"tagging_user_id":38248047,"tagged_user_id":37932251,"co_author_invite_id":null,"email":"c***k@hud.ac.uk","affiliation":"University of Huddersfield","display_order":6291456,"name":"Coen Gulijk","title":"Airport security: An ethnographic study"},{"id":9667556,"work_id":18265359,"tagging_user_id":38248047,"tagged_user_id":29855823,"co_author_invite_id":null,"email":"s***z@gmail.com","display_order":7340032,"name":"Sharon Lubasz","title":"Airport security: An ethnographic study"}],"downloadable_attachments":[],"slug":"Airport_security_An_ethnographic_study","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":38248047,"first_name":"Alan","middle_initials":null,"last_name":"Kirschenbaum","page_name":"AlanKirschenbaum","domain_name":"independent","created_at":"2015-11-13T01:32:47.240-08:00","display_name":"Alan Kirschenbaum","url":"https://independent.academia.edu/AlanKirschenbaum"},"attachments":[],"research_interests":[{"id":3170,"name":"Air Transport","url":"https://www.academia.edu/Documents/in/Air_Transport"},{"id":20436,"name":"Urban And Regional Planning","url":"https://www.academia.edu/Documents/in/Urban_And_Regional_Planning"},{"id":684819,"name":"Air Transport Management","url":"https://www.academia.edu/Documents/in/Air_Transport_Management"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="33095044"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/33095044/The_role_of_data_visualization_in_railway_Big_Data_Risk_Analysis"><img alt="Research paper thumbnail of The role of data visualization in railway Big Data Risk Analysis" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" rel="nofollow" href="https://www.academia.edu/33095044/The_role_of_data_visualization_in_railway_Big_Data_Risk_Analysis">The role of data visualization in railway Big Data Risk Analysis</a></div><div class="wp-workCard_item"><span>ESREL 2015</span><span>, 2015</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">ABSTRACT</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="33095044"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="33095044"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 33095044; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=33095044]").text(description); $(".js-view-count[data-work-id=33095044]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 33095044; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='33095044']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 33095044, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=33095044]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":33095044,"title":"The role of data visualization in railway Big Data Risk Analysis","translated_title":"","metadata":{"abstract":"ABSTRACT","publication_date":{"day":null,"month":null,"year":2015,"errors":{}},"publication_name":"ESREL 2015"},"translated_abstract":"ABSTRACT","internal_url":"https://www.academia.edu/33095044/The_role_of_data_visualization_in_railway_Big_Data_Risk_Analysis","translated_internal_url":"","created_at":"2017-05-19T04:21:59.204-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":37932251,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"The_role_of_data_visualization_in_railway_Big_Data_Risk_Analysis","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":37932251,"first_name":"Coen","middle_initials":null,"last_name":"Gulijk","page_name":"CoenGulijk","domain_name":"hud","created_at":"2015-11-09T01:46:39.427-08:00","display_name":"Coen Gulijk","url":"https://hud.academia.edu/CoenGulijk"},"attachments":[],"research_interests":[],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="33095043"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/33095043/Big_Data_Risk_Analysis_for_rail_safety"><img alt="Research paper thumbnail of Big Data Risk Analysis for rail safety?" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" rel="nofollow" href="https://www.academia.edu/33095043/Big_Data_Risk_Analysis_for_rail_safety">Big Data Risk Analysis for rail safety?</a></div><div class="wp-workCard_item"><span>ESREL 2015</span><span>, 2015</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">ABSTRACT</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="33095043"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="33095043"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 33095043; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=33095043]").text(description); $(".js-view-count[data-work-id=33095043]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 33095043; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='33095043']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 33095043, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=33095043]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":33095043,"title":"Big Data Risk Analysis for rail safety?","translated_title":"","metadata":{"abstract":"ABSTRACT","publication_date":{"day":null,"month":null,"year":2015,"errors":{}},"publication_name":"ESREL 2015"},"translated_abstract":"ABSTRACT","internal_url":"https://www.academia.edu/33095043/Big_Data_Risk_Analysis_for_rail_safety","translated_internal_url":"","created_at":"2017-05-19T04:21:59.091-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":37932251,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Big_Data_Risk_Analysis_for_rail_safety","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":37932251,"first_name":"Coen","middle_initials":null,"last_name":"Gulijk","page_name":"CoenGulijk","domain_name":"hud","created_at":"2015-11-09T01:46:39.427-08:00","display_name":"Coen Gulijk","url":"https://hud.academia.edu/CoenGulijk"},"attachments":[],"research_interests":[],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="33095042"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/33095042/Visualising_Close_Call_in_railways_a_step_towards_Big_Data_Risk_Analysis"><img alt="Research paper thumbnail of Visualising Close Call in railways: a step towards Big Data Risk Analysis" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" rel="nofollow" href="https://www.academia.edu/33095042/Visualising_Close_Call_in_railways_a_step_towards_Big_Data_Risk_Analysis">Visualising Close Call in railways: a step towards Big Data Risk Analysis</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">ABSTRACT</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="33095042"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="33095042"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 33095042; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=33095042]").text(description); $(".js-view-count[data-work-id=33095042]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 33095042; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='33095042']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 33095042, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=33095042]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":33095042,"title":"Visualising Close Call in railways: a step towards Big Data Risk Analysis","translated_title":"","metadata":{"abstract":"ABSTRACT"},"translated_abstract":"ABSTRACT","internal_url":"https://www.academia.edu/33095042/Visualising_Close_Call_in_railways_a_step_towards_Big_Data_Risk_Analysis","translated_internal_url":"","created_at":"2017-05-19T04:21:58.960-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":37932251,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Visualising_Close_Call_in_railways_a_step_towards_Big_Data_Risk_Analysis","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":37932251,"first_name":"Coen","middle_initials":null,"last_name":"Gulijk","page_name":"CoenGulijk","domain_name":"hud","created_at":"2015-11-09T01:46:39.427-08:00","display_name":"Coen Gulijk","url":"https://hud.academia.edu/CoenGulijk"},"attachments":[],"research_interests":[],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="33095041"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/33095041/Rational_design_of_a_robust_diesel_particulate_filter"><img alt="Research paper thumbnail of Rational design of a robust diesel particulate filter" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" rel="nofollow" href="https://www.academia.edu/33095041/Rational_design_of_a_robust_diesel_particulate_filter">Rational design of a robust diesel particulate filter</a></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="33095041"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="33095041"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 33095041; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=33095041]").text(description); $(".js-view-count[data-work-id=33095041]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 33095041; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='33095041']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 33095041, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=33095041]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":33095041,"title":"Rational design of a robust diesel particulate filter","translated_title":"","metadata":{},"translated_abstract":null,"internal_url":"https://www.academia.edu/33095041/Rational_design_of_a_robust_diesel_particulate_filter","translated_internal_url":"","created_at":"2017-05-19T04:21:58.822-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":37932251,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Rational_design_of_a_robust_diesel_particulate_filter","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":37932251,"first_name":"Coen","middle_initials":null,"last_name":"Gulijk","page_name":"CoenGulijk","domain_name":"hud","created_at":"2015-11-09T01:46:39.427-08:00","display_name":"Coen Gulijk","url":"https://hud.academia.edu/CoenGulijk"},"attachments":[],"research_interests":[{"id":2202458,"name":"Diesel particulate filter","url":"https://www.academia.edu/Documents/in/Diesel_particulate_filter"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="33095040"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/33095040/Controlling_security_risks_with_the_MMO_method"><img alt="Research paper thumbnail of Controlling security risks with the MMO method" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/33095040/Controlling_security_risks_with_the_MMO_method">Controlling security risks with the MMO method</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">A fimdamental analysis of crime and the juridical systems to punish crime has yielded a starting ...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">A fimdamental analysis of crime and the juridical systems to punish crime has yielded a starting point for quantitative risk analysis of security risks. This method is called the MMO concept as a generic concept for the design of security barriers and their evaluation by quantitative risk analysis methods. It is based on a simplification of the basic elements for proving criminal liability that a defendant committed a crime under US law: motive, means and opportunity. These three elements form the preconditions that are needed to let an ill meaning person to develop into a hazard or threat. The MMO concept also forms the key to the development of successful barriers against the completion of the actual act. Taking one of these three away would render the hazard meffective. This enables the development of a model for security threats along the same lines as safety threats and opens the possibility for similar qualitative and quantitative analysis. The MMO concept may seem relatively ...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="33095040"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="33095040"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 33095040; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=33095040]").text(description); $(".js-view-count[data-work-id=33095040]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 33095040; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='33095040']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 33095040, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=33095040]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":33095040,"title":"Controlling security risks with the MMO method","translated_title":"","metadata":{"abstract":"A fimdamental analysis of crime and the juridical systems to punish crime has yielded a starting point for quantitative risk analysis of security risks. This method is called the MMO concept as a generic concept for the design of security barriers and their evaluation by quantitative risk analysis methods. It is based on a simplification of the basic elements for proving criminal liability that a defendant committed a crime under US law: motive, means and opportunity. These three elements form the preconditions that are needed to let an ill meaning person to develop into a hazard or threat. The MMO concept also forms the key to the development of successful barriers against the completion of the actual act. Taking one of these three away would render the hazard meffective. This enables the development of a model for security threats along the same lines as safety threats and opens the possibility for similar qualitative and quantitative analysis. The MMO concept may seem relatively ..."},"translated_abstract":"A fimdamental analysis of crime and the juridical systems to punish crime has yielded a starting point for quantitative risk analysis of security risks. This method is called the MMO concept as a generic concept for the design of security barriers and their evaluation by quantitative risk analysis methods. It is based on a simplification of the basic elements for proving criminal liability that a defendant committed a crime under US law: motive, means and opportunity. These three elements form the preconditions that are needed to let an ill meaning person to develop into a hazard or threat. The MMO concept also forms the key to the development of successful barriers against the completion of the actual act. Taking one of these three away would render the hazard meffective. This enables the development of a model for security threats along the same lines as safety threats and opens the possibility for similar qualitative and quantitative analysis. The MMO concept may seem relatively ...","internal_url":"https://www.academia.edu/33095040/Controlling_security_risks_with_the_MMO_method","translated_internal_url":"","created_at":"2017-05-19T04:21:58.695-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":37932251,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Controlling_security_risks_with_the_MMO_method","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":37932251,"first_name":"Coen","middle_initials":null,"last_name":"Gulijk","page_name":"CoenGulijk","domain_name":"hud","created_at":"2015-11-09T01:46:39.427-08:00","display_name":"Coen Gulijk","url":"https://hud.academia.edu/CoenGulijk"},"attachments":[],"research_interests":[],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="33095039"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/33095039/Oil_Spills_a_persistent_problem"><img alt="Research paper thumbnail of Oil Spills, a persistent problem" class="work-thumbnail" src="https://attachments.academia-assets.com/53193708/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/33095039/Oil_Spills_a_persistent_problem">Oil Spills, a persistent problem</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Oil-颅鈥恠pills like the Deepwater Horizon spill shake the world but was the occurrence of that spil...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Oil-颅鈥恠pills like the Deepwater Horizon spill shake the world but was the occurrence of that spill, the size of it in particular, really that rare? The aim of this work is to compare the Deepwater Horizon spill with historic spill data to put evaluate the rarity of the spill. This work addresses that problem by analyzing historic spill data from the National Oceanic and Atmospheric Administration (NOAA). A quantitative risk approach is used where the F-颅鈥怤 curve is the instrument of the analysis. In this work, the Deepwater Horizon spill is classified as a super-颅鈥恠pill of 1,000,000 barrels or more. Historic data suggests that these super spills are not excessively rare and have occurred with a frequency of about 5 years. This shows that oil spills are indeed a persistent problem. 2. Prelude to this investigation The Deepwater Horizon catastrophe has a great impact on the environment and public opinion about the risks of oil production. The future of oil production is debated in sci...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="f10802e79a87a0b7404905b5c52ba137" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":53193708,"asset_id":33095039,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/53193708/download_file?st=MTczMjc5NjgxNiw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="33095039"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="33095039"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 33095039; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=33095039]").text(description); $(".js-view-count[data-work-id=33095039]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 33095039; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='33095039']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 33095039, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "f10802e79a87a0b7404905b5c52ba137" } } $('.js-work-strip[data-work-id=33095039]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":33095039,"title":"Oil Spills, a persistent problem","translated_title":"","metadata":{"abstract":"Oil-颅鈥恠pills like the Deepwater Horizon spill shake the world but was the occurrence of that spill, the size of it in particular, really that rare? The aim of this work is to compare the Deepwater Horizon spill with historic spill data to put evaluate the rarity of the spill. This work addresses that problem by analyzing historic spill data from the National Oceanic and Atmospheric Administration (NOAA). A quantitative risk approach is used where the F-颅鈥怤 curve is the instrument of the analysis. In this work, the Deepwater Horizon spill is classified as a super-颅鈥恠pill of 1,000,000 barrels or more. Historic data suggests that these super spills are not excessively rare and have occurred with a frequency of about 5 years. This shows that oil spills are indeed a persistent problem. 2. Prelude to this investigation The Deepwater Horizon catastrophe has a great impact on the environment and public opinion about the risks of oil production. The future of oil production is debated in sci..."},"translated_abstract":"Oil-颅鈥恠pills like the Deepwater Horizon spill shake the world but was the occurrence of that spill, the size of it in particular, really that rare? The aim of this work is to compare the Deepwater Horizon spill with historic spill data to put evaluate the rarity of the spill. This work addresses that problem by analyzing historic spill data from the National Oceanic and Atmospheric Administration (NOAA). A quantitative risk approach is used where the F-颅鈥怤 curve is the instrument of the analysis. In this work, the Deepwater Horizon spill is classified as a super-颅鈥恠pill of 1,000,000 barrels or more. Historic data suggests that these super spills are not excessively rare and have occurred with a frequency of about 5 years. This shows that oil spills are indeed a persistent problem. 2. Prelude to this investigation The Deepwater Horizon catastrophe has a great impact on the environment and public opinion about the risks of oil production. The future of oil production is debated in sci...","internal_url":"https://www.academia.edu/33095039/Oil_Spills_a_persistent_problem","translated_internal_url":"","created_at":"2017-05-19T04:21:58.557-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":37932251,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":53193708,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/53193708/thumbnails/1.jpg","file_name":"Oil_Spills_a_persistent_problem20170519-7310-2crhz7.pdf","download_url":"https://www.academia.edu/attachments/53193708/download_file?st=MTczMjc5NjgxNiw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Oil_Spills_a_persistent_problem.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/53193708/Oil_Spills_a_persistent_problem20170519-7310-2crhz7-libre.pdf?1495193153=\u0026response-content-disposition=attachment%3B+filename%3DOil_Spills_a_persistent_problem.pdf\u0026Expires=1732800416\u0026Signature=Pd3dBQrUA-c5UGi8tUNUiVAQ-O3derHycrru46AUSDqWOgLK35WmA7UYSTXKYrAxkNOrXrFoRY~sE4ADIwLY9FDQgYs8jFpvJBVuAY2jT4XfJue5RNnaiweF6PDlI5qxiCCnBefBGjU4ssRFOpUFf3VSvyZgwzPPtO07NH3cteIbCKPOUEo8Rgfn70AOQQlmXMWJvYgq74NtKBBo-lJYoWdmbFA0cEXvfuAqo3Arl7XnviJgjsH-qpOJeQW-ThS9Hb6jlH5W7tSNzPnm8H5GHx7psPYJeNU1lSUYeyxNnHuvtJ8DRTCq1N8lhFRlHPCWsCmV5sE6O4XPbMhhZ7BjlQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Oil_Spills_a_persistent_problem","translated_slug":"","page_count":20,"language":"en","content_type":"Work","owner":{"id":37932251,"first_name":"Coen","middle_initials":null,"last_name":"Gulijk","page_name":"CoenGulijk","domain_name":"hud","created_at":"2015-11-09T01:46:39.427-08:00","display_name":"Coen Gulijk","url":"https://hud.academia.edu/CoenGulijk"},"attachments":[{"id":53193708,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/53193708/thumbnails/1.jpg","file_name":"Oil_Spills_a_persistent_problem20170519-7310-2crhz7.pdf","download_url":"https://www.academia.edu/attachments/53193708/download_file?st=MTczMjc5NjgxNiw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Oil_Spills_a_persistent_problem.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/53193708/Oil_Spills_a_persistent_problem20170519-7310-2crhz7-libre.pdf?1495193153=\u0026response-content-disposition=attachment%3B+filename%3DOil_Spills_a_persistent_problem.pdf\u0026Expires=1732800416\u0026Signature=Pd3dBQrUA-c5UGi8tUNUiVAQ-O3derHycrru46AUSDqWOgLK35WmA7UYSTXKYrAxkNOrXrFoRY~sE4ADIwLY9FDQgYs8jFpvJBVuAY2jT4XfJue5RNnaiweF6PDlI5qxiCCnBefBGjU4ssRFOpUFf3VSvyZgwzPPtO07NH3cteIbCKPOUEo8Rgfn70AOQQlmXMWJvYgq74NtKBBo-lJYoWdmbFA0cEXvfuAqo3Arl7XnviJgjsH-qpOJeQW-ThS9Hb6jlH5W7tSNzPnm8H5GHx7psPYJeNU1lSUYeyxNnHuvtJ8DRTCq1N8lhFRlHPCWsCmV5sE6O4XPbMhhZ7BjlQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="33095038"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/33095038/All_swept_up_An_initial_classification_of_NSA_surveillance_technology"><img alt="Research paper thumbnail of All swept up: An initial classification of NSA surveillance technology" class="work-thumbnail" src="https://attachments.academia-assets.com/53193709/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/33095038/All_swept_up_An_initial_classification_of_NSA_surveillance_technology">All swept up: An initial classification of NSA surveillance technology</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">The study was initiated as part of the FP7 SURVEILLE project commissioned by the European Commiss...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">The study was initiated as part of the FP7 SURVEILLE project commissioned by the European Commission. The goal is to examine the mass surveillance technology used by the NSA in the programs revealed by the Snowden leaks. This paper forms the basis from which to study the effectiveness of these surveillance technologies. Novelty: While there have been a lot of headlines regarding what the NSA is purportedly doing, discussion of the technology used to do this is scarce to nonexistent. There is also the problem of different programs being revealed via different media sources, thus making it difficult to know and follow the information being revealed regarding NSA programs. This paper attempts to bring the NSA programs and methods into one place, categorize those that are similar, and analyze the probable surveillance systems used. Relevance: This work is the beginning of developing a method of evaluating the effectiveness of surveillance technologies, the lack of which is notable in go...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="18a9dda231f10760f6e40f121a6a14a5" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":53193709,"asset_id":33095038,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/53193709/download_file?st=MTczMjc5NjgxNiw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="33095038"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="33095038"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 33095038; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=33095038]").text(description); $(".js-view-count[data-work-id=33095038]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 33095038; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='33095038']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 33095038, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "18a9dda231f10760f6e40f121a6a14a5" } } $('.js-work-strip[data-work-id=33095038]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":33095038,"title":"All swept up: An initial classification of NSA surveillance technology","translated_title":"","metadata":{"abstract":"The study was initiated as part of the FP7 SURVEILLE project commissioned by the European Commission. The goal is to examine the mass surveillance technology used by the NSA in the programs revealed by the Snowden leaks. This paper forms the basis from which to study the effectiveness of these surveillance technologies. Novelty: While there have been a lot of headlines regarding what the NSA is purportedly doing, discussion of the technology used to do this is scarce to nonexistent. There is also the problem of different programs being revealed via different media sources, thus making it difficult to know and follow the information being revealed regarding NSA programs. This paper attempts to bring the NSA programs and methods into one place, categorize those that are similar, and analyze the probable surveillance systems used. Relevance: This work is the beginning of developing a method of evaluating the effectiveness of surveillance technologies, the lack of which is notable in go..."},"translated_abstract":"The study was initiated as part of the FP7 SURVEILLE project commissioned by the European Commission. The goal is to examine the mass surveillance technology used by the NSA in the programs revealed by the Snowden leaks. This paper forms the basis from which to study the effectiveness of these surveillance technologies. Novelty: While there have been a lot of headlines regarding what the NSA is purportedly doing, discussion of the technology used to do this is scarce to nonexistent. There is also the problem of different programs being revealed via different media sources, thus making it difficult to know and follow the information being revealed regarding NSA programs. This paper attempts to bring the NSA programs and methods into one place, categorize those that are similar, and analyze the probable surveillance systems used. Relevance: This work is the beginning of developing a method of evaluating the effectiveness of surveillance technologies, the lack of which is notable in go...","internal_url":"https://www.academia.edu/33095038/All_swept_up_An_initial_classification_of_NSA_surveillance_technology","translated_internal_url":"","created_at":"2017-05-19T04:21:58.413-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":37932251,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":53193709,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/53193709/thumbnails/1.jpg","file_name":"All_swept_up_An_initial_classification_o20170519-7313-x6jigr.pdf","download_url":"https://www.academia.edu/attachments/53193709/download_file?st=MTczMjc5NjgxNiw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"All_swept_up_An_initial_classification_o.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/53193709/All_swept_up_An_initial_classification_o20170519-7313-x6jigr-libre.pdf?1495193146=\u0026response-content-disposition=attachment%3B+filename%3DAll_swept_up_An_initial_classification_o.pdf\u0026Expires=1732800416\u0026Signature=GTHe4E0GnuT4INHcuCcmXvW9axfZxO2YszCFEWUVLDzeWwDnUuVPteMCD5aNZ62DtLICLF10N5QhC50ZD2gjMvcLGozcdsZ7OdpWo2m5XkpINyFUtskf9Kncwb3jU8ROSwHzgUcPFgiwGdcbT7PCK8idC88GW2hSt0cGvrqI112-K94V4FqvmIlNg~LWrD5nc1gJnbcfPhUILMwLZoODJJUKy5Jg37WrhH-9b1hMFN8Zc0Qa3dQnYuarQPuHZLs4VvbTVB2FpM4gntzI~1lXmFbER~-bqZBGu7CMbmmkw40jwakq8txOr3e2F9g6W1fjKka-2BruZwZbaPwmTXlXrA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"All_swept_up_An_initial_classification_of_NSA_surveillance_technology","translated_slug":"","page_count":8,"language":"en","content_type":"Work","owner":{"id":37932251,"first_name":"Coen","middle_initials":null,"last_name":"Gulijk","page_name":"CoenGulijk","domain_name":"hud","created_at":"2015-11-09T01:46:39.427-08:00","display_name":"Coen Gulijk","url":"https://hud.academia.edu/CoenGulijk"},"attachments":[{"id":53193709,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/53193709/thumbnails/1.jpg","file_name":"All_swept_up_An_initial_classification_o20170519-7313-x6jigr.pdf","download_url":"https://www.academia.edu/attachments/53193709/download_file?st=MTczMjc5NjgxNiw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"All_swept_up_An_initial_classification_o.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/53193709/All_swept_up_An_initial_classification_o20170519-7313-x6jigr-libre.pdf?1495193146=\u0026response-content-disposition=attachment%3B+filename%3DAll_swept_up_An_initial_classification_o.pdf\u0026Expires=1732800416\u0026Signature=GTHe4E0GnuT4INHcuCcmXvW9axfZxO2YszCFEWUVLDzeWwDnUuVPteMCD5aNZ62DtLICLF10N5QhC50ZD2gjMvcLGozcdsZ7OdpWo2m5XkpINyFUtskf9Kncwb3jU8ROSwHzgUcPFgiwGdcbT7PCK8idC88GW2hSt0cGvrqI112-K94V4FqvmIlNg~LWrD5nc1gJnbcfPhUILMwLZoODJJUKy5Jg37WrhH-9b1hMFN8Zc0Qa3dQnYuarQPuHZLs4VvbTVB2FpM4gntzI~1lXmFbER~-bqZBGu7CMbmmkw40jwakq8txOr3e2F9g6W1fjKka-2BruZwZbaPwmTXlXrA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="33095037"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/33095037/Cost_benefit_analysis_of_surveillance_technologies"><img alt="Research paper thumbnail of Cost-benefit analysis of surveillance technologies" class="work-thumbnail" src="https://attachments.academia-assets.com/53193706/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/33095037/Cost_benefit_analysis_of_surveillance_technologies">Cost-benefit analysis of surveillance technologies</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">There are several types of surveillance devices in the market, each with its own operating charac...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">There are several types of surveillance devices in the market, each with its own operating characteristics. Since the terrorist attack of 9/11 there has been much focus on preventing or mitigating damages and causalities caused by terrorist activities. A key issue is whether the investment in fighting crime and counter-terrorism devices is well spent in a manner that optimizes public safety in a cost-effective manner. SURVEILLE is a research project funded within the EU Commission FP7 framework where one of the objectives is to assess the benefits and costs of surveillance technology. This paper reports on ongoing work of cost-benefit modelling for security that is performed within in this project. This paper provides a brief overview of the quantification method for cost-benefit models for security devices. Currently, a straightforward and easy-to-use cost-benefit analysis of surveillance technologies is not available. A cost-benefit model considering probabilistic terrorism risk a...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="9d4dcd85301fadf7c5787956dcaa0930" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":53193706,"asset_id":33095037,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/53193706/download_file?st=MTczMjc5NjgxNiw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="33095037"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="33095037"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 33095037; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=33095037]").text(description); $(".js-view-count[data-work-id=33095037]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 33095037; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='33095037']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 33095037, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "9d4dcd85301fadf7c5787956dcaa0930" } } $('.js-work-strip[data-work-id=33095037]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":33095037,"title":"Cost-benefit analysis of surveillance technologies","translated_title":"","metadata":{"abstract":"There are several types of surveillance devices in the market, each with its own operating characteristics. Since the terrorist attack of 9/11 there has been much focus on preventing or mitigating damages and causalities caused by terrorist activities. A key issue is whether the investment in fighting crime and counter-terrorism devices is well spent in a manner that optimizes public safety in a cost-effective manner. SURVEILLE is a research project funded within the EU Commission FP7 framework where one of the objectives is to assess the benefits and costs of surveillance technology. This paper reports on ongoing work of cost-benefit modelling for security that is performed within in this project. This paper provides a brief overview of the quantification method for cost-benefit models for security devices. Currently, a straightforward and easy-to-use cost-benefit analysis of surveillance technologies is not available. A cost-benefit model considering probabilistic terrorism risk a..."},"translated_abstract":"There are several types of surveillance devices in the market, each with its own operating characteristics. Since the terrorist attack of 9/11 there has been much focus on preventing or mitigating damages and causalities caused by terrorist activities. A key issue is whether the investment in fighting crime and counter-terrorism devices is well spent in a manner that optimizes public safety in a cost-effective manner. SURVEILLE is a research project funded within the EU Commission FP7 framework where one of the objectives is to assess the benefits and costs of surveillance technology. This paper reports on ongoing work of cost-benefit modelling for security that is performed within in this project. This paper provides a brief overview of the quantification method for cost-benefit models for security devices. Currently, a straightforward and easy-to-use cost-benefit analysis of surveillance technologies is not available. A cost-benefit model considering probabilistic terrorism risk a...","internal_url":"https://www.academia.edu/33095037/Cost_benefit_analysis_of_surveillance_technologies","translated_internal_url":"","created_at":"2017-05-19T04:21:58.267-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":37932251,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":53193706,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/53193706/thumbnails/1.jpg","file_name":"Cost-benefit_analysis_of_surveillance_te20170519-7310-aggkjk.pdf","download_url":"https://www.academia.edu/attachments/53193706/download_file?st=MTczMjc5NjgxNiw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Cost_benefit_analysis_of_surveillance_te.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/53193706/Cost-benefit_analysis_of_surveillance_te20170519-7310-aggkjk-libre.pdf?1495193149=\u0026response-content-disposition=attachment%3B+filename%3DCost_benefit_analysis_of_surveillance_te.pdf\u0026Expires=1732800416\u0026Signature=YwG51qkK1Kw1jrhzMOvQ7vcd2jNIM5bksQ9DkPjbsKYbUCwen~Vacn~ARQ6LZOtKK8yPAM1Hspmg9nrF2AQ~ByFLkQQ7PBIbKPkKc2gLO2OrkpVqKNGGLwwnwpH0LEib2FOj70inejFaZLv997TZiiiLGgDBI0K5QJUMN6uL0guJf02~JAXnmL4zu6AhKw6fYGUSilXVYWl-ZGn-ZC2~ghZLCHdKS80-xN7miXob3RqJAx1H53FiOsA7In~EOQSzX~cuekx78PK1XPzJbHZyB0Pmp8~qnK641RODb6q07-R-AoQ7pG7NbSMLptgQ0oVVohfRB2qT~eho7qcx1FwY7Q__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Cost_benefit_analysis_of_surveillance_technologies","translated_slug":"","page_count":7,"language":"en","content_type":"Work","owner":{"id":37932251,"first_name":"Coen","middle_initials":null,"last_name":"Gulijk","page_name":"CoenGulijk","domain_name":"hud","created_at":"2015-11-09T01:46:39.427-08:00","display_name":"Coen Gulijk","url":"https://hud.academia.edu/CoenGulijk"},"attachments":[{"id":53193706,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/53193706/thumbnails/1.jpg","file_name":"Cost-benefit_analysis_of_surveillance_te20170519-7310-aggkjk.pdf","download_url":"https://www.academia.edu/attachments/53193706/download_file?st=MTczMjc5NjgxNiw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Cost_benefit_analysis_of_surveillance_te.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/53193706/Cost-benefit_analysis_of_surveillance_te20170519-7310-aggkjk-libre.pdf?1495193149=\u0026response-content-disposition=attachment%3B+filename%3DCost_benefit_analysis_of_surveillance_te.pdf\u0026Expires=1732800416\u0026Signature=YwG51qkK1Kw1jrhzMOvQ7vcd2jNIM5bksQ9DkPjbsKYbUCwen~Vacn~ARQ6LZOtKK8yPAM1Hspmg9nrF2AQ~ByFLkQQ7PBIbKPkKc2gLO2OrkpVqKNGGLwwnwpH0LEib2FOj70inejFaZLv997TZiiiLGgDBI0K5QJUMN6uL0guJf02~JAXnmL4zu6AhKw6fYGUSilXVYWl-ZGn-ZC2~ghZLCHdKS80-xN7miXob3RqJAx1H53FiOsA7In~EOQSzX~cuekx78PK1XPzJbHZyB0Pmp8~qnK641RODb6q07-R-AoQ7pG7NbSMLptgQ0oVVohfRB2qT~eho7qcx1FwY7Q__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="33095036"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/33095036/Testing_a_Safety_Management_System_in_Aviation"><img alt="Research paper thumbnail of Testing a Safety Management System in Aviation" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" rel="nofollow" href="https://www.academia.edu/33095036/Testing_a_Safety_Management_System_in_Aviation">Testing a Safety Management System in Aviation</a></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="33095036"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="33095036"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 33095036; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=33095036]").text(description); $(".js-view-count[data-work-id=33095036]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 33095036; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='33095036']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 33095036, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=33095036]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":33095036,"title":"Testing a Safety Management System in Aviation","translated_title":"","metadata":{},"translated_abstract":null,"internal_url":"https://www.academia.edu/33095036/Testing_a_Safety_Management_System_in_Aviation","translated_internal_url":"","created_at":"2017-05-19T04:21:58.098-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":37932251,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Testing_a_Safety_Management_System_in_Aviation","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":37932251,"first_name":"Coen","middle_initials":null,"last_name":"Gulijk","page_name":"CoenGulijk","domain_name":"hud","created_at":"2015-11-09T01:46:39.427-08:00","display_name":"Coen Gulijk","url":"https://hud.academia.edu/CoenGulijk"},"attachments":[],"research_interests":[],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="33095035"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/33095035/Elements_of_criminal_liability_as_a_basis_for_the_design_of_security_barriers_and_risk_modeling"><img alt="Research paper thumbnail of Elements of criminal liability as a basis for the design of security barriers and risk modeling" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" rel="nofollow" href="https://www.academia.edu/33095035/Elements_of_criminal_liability_as_a_basis_for_the_design_of_security_barriers_and_risk_modeling">Elements of criminal liability as a basis for the design of security barriers and risk modeling</a></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="33095035"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="33095035"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 33095035; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=33095035]").text(description); $(".js-view-count[data-work-id=33095035]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 33095035; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='33095035']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 33095035, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=33095035]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":33095035,"title":"Elements of criminal liability as a basis for the design of security barriers and risk modeling","translated_title":"","metadata":{},"translated_abstract":null,"internal_url":"https://www.academia.edu/33095035/Elements_of_criminal_liability_as_a_basis_for_the_design_of_security_barriers_and_risk_modeling","translated_internal_url":"","created_at":"2017-05-19T04:21:57.904-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":37932251,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Elements_of_criminal_liability_as_a_basis_for_the_design_of_security_barriers_and_risk_modeling","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":37932251,"first_name":"Coen","middle_initials":null,"last_name":"Gulijk","page_name":"CoenGulijk","domain_name":"hud","created_at":"2015-11-09T01:46:39.427-08:00","display_name":"Coen Gulijk","url":"https://hud.academia.edu/CoenGulijk"},"attachments":[],"research_interests":[],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="33095034"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/33095034/Modelling_risk_in_high_hazard_operations_integrating_technical_organisational_and_cultural_factors"><img alt="Research paper thumbnail of Modelling risk in high hazard operations: integrating technical, organisational and cultural factors" class="work-thumbnail" src="https://attachments.academia-assets.com/53193711/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/33095034/Modelling_risk_in_high_hazard_operations_integrating_technical_organisational_and_cultural_factors">Modelling risk in high hazard operations: integrating technical, organisational and cultural factors</a></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="00ca429d449268ce2c4ec0a50b48d123" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":53193711,"asset_id":33095034,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/53193711/download_file?st=MTczMjc5NjgxNiw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="33095034"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="33095034"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 33095034; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=33095034]").text(description); $(".js-view-count[data-work-id=33095034]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 33095034; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='33095034']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 33095034, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "00ca429d449268ce2c4ec0a50b48d123" } } $('.js-work-strip[data-work-id=33095034]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":33095034,"title":"Modelling risk in high hazard operations: integrating technical, organisational and cultural factors","translated_title":"","metadata":{"grobid_abstract":"Recent disasters in high hazard industries such as Oil and Gas Exploration (The Deepwater Horizon) and Petrochemical production (Texas City) have been found to have causes that range from direct technical failures through organizational shortcomings right up to weak regulation and inappropriate company cultures. Risk models have generally concentrated upon technical failures, which are easier to construct and for which there is more concrete data. The primary causes, as identified by the US Chemical Safety Board for Texas City and the Presidential Commission for the Deepwater Horizon, lie firmly rooted in the culture of the organization and determine the way in which individuals go about risky activities. Modelling human activities, especially collectively rather than individual human errors as is done in most human models, is a quite different proposition, in which complex interactions between different individuals and levels change over time as success and failure alter the pattern of payoffs. This paper examines the development of an integrated model for risk in a real-time environment for the hydrocarbon industry. It is based originally on the CATS model for commercial aviation safety, that first attempted to address some of these problems in a relatively simple way. Aviation is, however, a relatively simple activity, with large numbers of common components in a constrained environment. The Oil and Gas industry is significantly more diverse, covering the gamut from exploration, drilling, production, transport, refining and chemical production, each with its own potential for large scale disaster, but in the case of an integrated oil company all run by individuals within a common company culture. Other papers will cover the details of specific issues; this paper covers the integration of the model as a whole.","grobid_abstract_attachment_id":53193711},"translated_abstract":null,"internal_url":"https://www.academia.edu/33095034/Modelling_risk_in_high_hazard_operations_integrating_technical_organisational_and_cultural_factors","translated_internal_url":"","created_at":"2017-05-19T04:21:57.764-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":37932251,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":53193711,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/53193711/thumbnails/1.jpg","file_name":"Modelling_risk_in_high_hazard_operations20170519-7313-685vfh.pdf","download_url":"https://www.academia.edu/attachments/53193711/download_file?st=MTczMjc5NjgxNiw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Modelling_risk_in_high_hazard_operations.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/53193711/Modelling_risk_in_high_hazard_operations20170519-7313-685vfh-libre.pdf?1495193147=\u0026response-content-disposition=attachment%3B+filename%3DModelling_risk_in_high_hazard_operations.pdf\u0026Expires=1732800416\u0026Signature=G~NMhPZCLl8thTenWaZbhqft-OqGJ5GvatlpCiGMRsGFacteX~DifZT9ZP2WEbg8BrGXTuCAJpbAqQ4Pfp43ZwIPqij4O~i4l8SNGZDW1auDo1l-lKNy86HrgPIPm1E8Y3Yfwm3ajkxUpH--nyep09Oew3~eXgIiFgy5RAoYFHZvGUsiKWkBJQJWS6rFgHGy3O4boDbEkqwQJdQVze5Scnwxru3C5eBe0wrThPjTfk6yRo5iFeQ9eb-0Ay7gBDHYTL3WLFszqxHhMGaM6W6wxWGbY-tzfStJeJLgWON9H0kWEfPDdg8GayXCnV7Z41YoQRaMhnwt3NoCWHhXWElfYA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Modelling_risk_in_high_hazard_operations_integrating_technical_organisational_and_cultural_factors","translated_slug":"","page_count":10,"language":"en","content_type":"Work","owner":{"id":37932251,"first_name":"Coen","middle_initials":null,"last_name":"Gulijk","page_name":"CoenGulijk","domain_name":"hud","created_at":"2015-11-09T01:46:39.427-08:00","display_name":"Coen Gulijk","url":"https://hud.academia.edu/CoenGulijk"},"attachments":[{"id":53193711,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/53193711/thumbnails/1.jpg","file_name":"Modelling_risk_in_high_hazard_operations20170519-7313-685vfh.pdf","download_url":"https://www.academia.edu/attachments/53193711/download_file?st=MTczMjc5NjgxNiw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Modelling_risk_in_high_hazard_operations.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/53193711/Modelling_risk_in_high_hazard_operations20170519-7313-685vfh-libre.pdf?1495193147=\u0026response-content-disposition=attachment%3B+filename%3DModelling_risk_in_high_hazard_operations.pdf\u0026Expires=1732800416\u0026Signature=G~NMhPZCLl8thTenWaZbhqft-OqGJ5GvatlpCiGMRsGFacteX~DifZT9ZP2WEbg8BrGXTuCAJpbAqQ4Pfp43ZwIPqij4O~i4l8SNGZDW1auDo1l-lKNy86HrgPIPm1E8Y3Yfwm3ajkxUpH--nyep09Oew3~eXgIiFgy5RAoYFHZvGUsiKWkBJQJWS6rFgHGy3O4boDbEkqwQJdQVze5Scnwxru3C5eBe0wrThPjTfk6yRo5iFeQ9eb-0Ay7gBDHYTL3WLFszqxHhMGaM6W6wxWGbY-tzfStJeJLgWON9H0kWEfPDdg8GayXCnV7Z41YoQRaMhnwt3NoCWHhXWElfYA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="33095033"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/33095033/Safety_management_for_operational_controllability_developing_an_organized_theoretical_perspective"><img alt="Research paper thumbnail of Safety management for operational controllability: developing an organized theoretical perspective" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" rel="nofollow" href="https://www.academia.edu/33095033/Safety_management_for_operational_controllability_developing_an_organized_theoretical_perspective">Safety management for operational controllability: developing an organized theoretical perspective</a></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="33095033"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="33095033"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 33095033; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=33095033]").text(description); $(".js-view-count[data-work-id=33095033]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 33095033; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='33095033']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 33095033, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=33095033]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":33095033,"title":"Safety management for operational controllability: developing an organized theoretical perspective","translated_title":"","metadata":{},"translated_abstract":null,"internal_url":"https://www.academia.edu/33095033/Safety_management_for_operational_controllability_developing_an_organized_theoretical_perspective","translated_internal_url":"","created_at":"2017-05-19T04:21:57.620-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":37932251,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Safety_management_for_operational_controllability_developing_an_organized_theoretical_perspective","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":37932251,"first_name":"Coen","middle_initials":null,"last_name":"Gulijk","page_name":"CoenGulijk","domain_name":"hud","created_at":"2015-11-09T01:46:39.427-08:00","display_name":"Coen Gulijk","url":"https://hud.academia.edu/CoenGulijk"},"attachments":[],"research_interests":[],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="33095032"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/33095032/Human_factors_in_the_layers_of_defense_in_airport_security"><img alt="Research paper thumbnail of Human factors in the layers of defense in airport security" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" rel="nofollow" href="https://www.academia.edu/33095032/Human_factors_in_the_layers_of_defense_in_airport_security">Human factors in the layers of defense in airport security</a></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="33095032"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="33095032"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 33095032; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=33095032]").text(description); $(".js-view-count[data-work-id=33095032]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 33095032; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='33095032']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 33095032, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=33095032]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":33095032,"title":"Human factors in the layers of defense in airport security","translated_title":"","metadata":{},"translated_abstract":null,"internal_url":"https://www.academia.edu/33095032/Human_factors_in_the_layers_of_defense_in_airport_security","translated_internal_url":"","created_at":"2017-05-19T04:21:57.491-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":37932251,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Human_factors_in_the_layers_of_defense_in_airport_security","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":37932251,"first_name":"Coen","middle_initials":null,"last_name":"Gulijk","page_name":"CoenGulijk","domain_name":"hud","created_at":"2015-11-09T01:46:39.427-08:00","display_name":"Coen Gulijk","url":"https://hud.academia.edu/CoenGulijk"},"attachments":[],"research_interests":[],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="33095031"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/33095031/Integrating_organisational_factors_into_a_BBN_model_of_risk"><img alt="Research paper thumbnail of Integrating organisational factors into a BBN model of risk" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" rel="nofollow" href="https://www.academia.edu/33095031/Integrating_organisational_factors_into_a_BBN_model_of_risk">Integrating organisational factors into a BBN model of risk</a></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="33095031"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="33095031"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 33095031; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=33095031]").text(description); $(".js-view-count[data-work-id=33095031]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 33095031; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='33095031']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 33095031, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=33095031]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":33095031,"title":"Integrating organisational factors into a BBN model of risk","translated_title":"","metadata":{},"translated_abstract":null,"internal_url":"https://www.academia.edu/33095031/Integrating_organisational_factors_into_a_BBN_model_of_risk","translated_internal_url":"","created_at":"2017-05-19T04:21:57.328-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":37932251,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Integrating_organisational_factors_into_a_BBN_model_of_risk","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":37932251,"first_name":"Coen","middle_initials":null,"last_name":"Gulijk","page_name":"CoenGulijk","domain_name":"hud","created_at":"2015-11-09T01:46:39.427-08:00","display_name":"Coen Gulijk","url":"https://hud.academia.edu/CoenGulijk"},"attachments":[],"research_interests":[],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="33095030"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/33095030/Bankruptcy_by_catastrophes_for_major_multi_nationals_stock_exchange_sensitivity_for_three_catastrophes"><img alt="Research paper thumbnail of Bankruptcy by catastrophes for major multi-nationals: stock exchange sensitivity for three catastrophes" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" rel="nofollow" href="https://www.academia.edu/33095030/Bankruptcy_by_catastrophes_for_major_multi_nationals_stock_exchange_sensitivity_for_three_catastrophes">Bankruptcy by catastrophes for major multi-nationals: stock exchange sensitivity for three catastrophes</a></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="33095030"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="33095030"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 33095030; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=33095030]").text(description); $(".js-view-count[data-work-id=33095030]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 33095030; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='33095030']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 33095030, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=33095030]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":33095030,"title":"Bankruptcy by catastrophes for major multi-nationals: stock exchange sensitivity for three catastrophes","translated_title":"","metadata":{},"translated_abstract":null,"internal_url":"https://www.academia.edu/33095030/Bankruptcy_by_catastrophes_for_major_multi_nationals_stock_exchange_sensitivity_for_three_catastrophes","translated_internal_url":"","created_at":"2017-05-19T04:21:57.185-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":37932251,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Bankruptcy_by_catastrophes_for_major_multi_nationals_stock_exchange_sensitivity_for_three_catastrophes","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":37932251,"first_name":"Coen","middle_initials":null,"last_name":"Gulijk","page_name":"CoenGulijk","domain_name":"hud","created_at":"2015-11-09T01:46:39.427-08:00","display_name":"Coen Gulijk","url":"https://hud.academia.edu/CoenGulijk"},"attachments":[],"research_interests":[],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="33095029"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/33095029/Participant_Observation_in_Risk_Problems"><img alt="Research paper thumbnail of Participant Observation in Risk Problems" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" rel="nofollow" href="https://www.academia.edu/33095029/Participant_Observation_in_Risk_Problems">Participant Observation in Risk Problems</a></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="33095029"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="33095029"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 33095029; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=33095029]").text(description); $(".js-view-count[data-work-id=33095029]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 33095029; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='33095029']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 33095029, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=33095029]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":33095029,"title":"Participant Observation in Risk Problems","translated_title":"","metadata":{},"translated_abstract":null,"internal_url":"https://www.academia.edu/33095029/Participant_Observation_in_Risk_Problems","translated_internal_url":"","created_at":"2017-05-19T04:21:57.030-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":37932251,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Participant_Observation_in_Risk_Problems","translated_slug":"","page_count":null,"language":"fr","content_type":"Work","owner":{"id":37932251,"first_name":"Coen","middle_initials":null,"last_name":"Gulijk","page_name":"CoenGulijk","domain_name":"hud","created_at":"2015-11-09T01:46:39.427-08:00","display_name":"Coen Gulijk","url":"https://hud.academia.edu/CoenGulijk"},"attachments":[],"research_interests":[{"id":51329,"name":"Triangulation","url":"https://www.academia.edu/Documents/in/Triangulation"},{"id":120024,"name":"Airport Security","url":"https://www.academia.edu/Documents/in/Airport_Security"},{"id":251886,"name":"Participant Observation","url":"https://www.academia.edu/Documents/in/Participant_Observation"},{"id":416537,"name":"Chemical Industry","url":"https://www.academia.edu/Documents/in/Chemical_Industry"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="33095028"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/33095028/A_paired_comparison_approach_to_improve_the_quantification_of_management_influences_in_air_transportation"><img alt="Research paper thumbnail of A paired comparison approach to improve the quantification of management influences in air transportation" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/33095028/A_paired_comparison_approach_to_improve_the_quantification_of_management_influences_in_air_transportation">A paired comparison approach to improve the quantification of management influences in air transportation</a></div><div class="wp-workCard_item"><span>Reliability Engineering & System Safety</span><span>, 2013</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">ABSTRACT This paper provides an approach to integrate management factors into risk analysis. The ...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">ABSTRACT This paper provides an approach to integrate management factors into risk analysis. The approach focuses on paired comparison quantification to differentiate and prioritize a set of management influences to reduce human or technical failure, and to quantify the size of different management influences on risk by combining it with Bayesian belief nets (BBN). The BBN model of Causal Modeling for Air Transport Safety (CATS) has been used as a case study. This approach enables better reflection in risk analysis of management functions as specific actions which can be taken by managers to maintain safety in safety critical activities.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="33095028"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="33095028"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 33095028; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=33095028]").text(description); $(".js-view-count[data-work-id=33095028]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 33095028; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='33095028']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 33095028, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=33095028]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":33095028,"title":"A paired comparison approach to improve the quantification of management influences in air transportation","translated_title":"","metadata":{"abstract":"ABSTRACT This paper provides an approach to integrate management factors into risk analysis. The approach focuses on paired comparison quantification to differentiate and prioritize a set of management influences to reduce human or technical failure, and to quantify the size of different management influences on risk by combining it with Bayesian belief nets (BBN). The BBN model of Causal Modeling for Air Transport Safety (CATS) has been used as a case study. This approach enables better reflection in risk analysis of management functions as specific actions which can be taken by managers to maintain safety in safety critical activities.","publication_date":{"day":null,"month":null,"year":2013,"errors":{}},"publication_name":"Reliability Engineering \u0026 System Safety"},"translated_abstract":"ABSTRACT This paper provides an approach to integrate management factors into risk analysis. The approach focuses on paired comparison quantification to differentiate and prioritize a set of management influences to reduce human or technical failure, and to quantify the size of different management influences on risk by combining it with Bayesian belief nets (BBN). The BBN model of Causal Modeling for Air Transport Safety (CATS) has been used as a case study. This approach enables better reflection in risk analysis of management functions as specific actions which can be taken by managers to maintain safety in safety critical activities.","internal_url":"https://www.academia.edu/33095028/A_paired_comparison_approach_to_improve_the_quantification_of_management_influences_in_air_transportation","translated_internal_url":"","created_at":"2017-05-19T04:21:56.911-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":37932251,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"A_paired_comparison_approach_to_improve_the_quantification_of_management_influences_in_air_transportation","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":37932251,"first_name":"Coen","middle_initials":null,"last_name":"Gulijk","page_name":"CoenGulijk","domain_name":"hud","created_at":"2015-11-09T01:46:39.427-08:00","display_name":"Coen Gulijk","url":"https://hud.academia.edu/CoenGulijk"},"attachments":[],"research_interests":[{"id":48,"name":"Engineering","url":"https://www.academia.edu/Documents/in/Engineering"},{"id":80414,"name":"Mathematical Sciences","url":"https://www.academia.edu/Documents/in/Mathematical_Sciences"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="33095027"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/33095027/Comparison_study_on_AIS_data_of_ship_traffic_behavior"><img alt="Research paper thumbnail of Comparison study on AIS data of ship traffic behavior" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/33095027/Comparison_study_on_AIS_data_of_ship_traffic_behavior">Comparison study on AIS data of ship traffic behavior</a></div><div class="wp-workCard_item"><span>Ocean Engineering</span><span>, 2015</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">ABSTRACT AIS (Automatic Identification System) data provides valuable input parameters in ship tr...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">ABSTRACT AIS (Automatic Identification System) data provides valuable input parameters in ship traffic simulation models for maritime risk analysis and the prevention of shipping accidents. This article reports on the detailed comparisons of AIS data analysis between a Dutch case and a Chinese case. This analysis focuses on restricted waterways to support inland waterway simulations, comparing the differences between a narrow waterway in the Netherlands (the Port of Rotterdam) and a wide one in China (wide waterway of Yangtze River close to the Su-Tong Bridge). It is shown that straightforward statistical distributions can be used to characterize lateral position, speed, heading and interval times for different types and sizes of ships. However, the distributions for different characteristics of ship behaviors differ significantly.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="33095027"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="33095027"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 33095027; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=33095027]").text(description); $(".js-view-count[data-work-id=33095027]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 33095027; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='33095027']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 33095027, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=33095027]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":33095027,"title":"Comparison study on AIS data of ship traffic behavior","translated_title":"","metadata":{"abstract":"ABSTRACT AIS (Automatic Identification System) data provides valuable input parameters in ship traffic simulation models for maritime risk analysis and the prevention of shipping accidents. This article reports on the detailed comparisons of AIS data analysis between a Dutch case and a Chinese case. This analysis focuses on restricted waterways to support inland waterway simulations, comparing the differences between a narrow waterway in the Netherlands (the Port of Rotterdam) and a wide one in China (wide waterway of Yangtze River close to the Su-Tong Bridge). It is shown that straightforward statistical distributions can be used to characterize lateral position, speed, heading and interval times for different types and sizes of ships. However, the distributions for different characteristics of ship behaviors differ significantly.","publication_date":{"day":null,"month":null,"year":2015,"errors":{}},"publication_name":"Ocean Engineering"},"translated_abstract":"ABSTRACT AIS (Automatic Identification System) data provides valuable input parameters in ship traffic simulation models for maritime risk analysis and the prevention of shipping accidents. This article reports on the detailed comparisons of AIS data analysis between a Dutch case and a Chinese case. This analysis focuses on restricted waterways to support inland waterway simulations, comparing the differences between a narrow waterway in the Netherlands (the Port of Rotterdam) and a wide one in China (wide waterway of Yangtze River close to the Su-Tong Bridge). It is shown that straightforward statistical distributions can be used to characterize lateral position, speed, heading and interval times for different types and sizes of ships. However, the distributions for different characteristics of ship behaviors differ significantly.","internal_url":"https://www.academia.edu/33095027/Comparison_study_on_AIS_data_of_ship_traffic_behavior","translated_internal_url":"","created_at":"2017-05-19T04:21:56.806-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":37932251,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Comparison_study_on_AIS_data_of_ship_traffic_behavior","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":37932251,"first_name":"Coen","middle_initials":null,"last_name":"Gulijk","page_name":"CoenGulijk","domain_name":"hud","created_at":"2015-11-09T01:46:39.427-08:00","display_name":"Coen Gulijk","url":"https://hud.academia.edu/CoenGulijk"},"attachments":[],"research_interests":[{"id":73,"name":"Civil Engineering","url":"https://www.academia.edu/Documents/in/Civil_Engineering"},{"id":81,"name":"Ocean Engineering","url":"https://www.academia.edu/Documents/in/Ocean_Engineering"},{"id":471104,"name":"Maritime Engineering","url":"https://www.academia.edu/Documents/in/Maritime_Engineering"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> </div><div class="profile--tab_content_container js-tab-pane tab-pane" data-section-id="3966827" id="papers"><div class="js-work-strip profile--work_container" data-work-id="80388087"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/80388087/Experience_from_chemical_industry_for_controlling_patient_safety"><img alt="Research paper thumbnail of Experience from chemical industry for controlling patient safety" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/80388087/Experience_from_chemical_industry_for_controlling_patient_safety">Experience from chemical industry for controlling patient safety</a></div><div class="wp-workCard_item"><span>ESREL 2011</span><span>, 2011</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="80388087"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="80388087"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 80388087; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=80388087]").text(description); $(".js-view-count[data-work-id=80388087]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 80388087; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='80388087']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 80388087, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=80388087]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":80388087,"title":"Experience from chemical industry for controlling patient safety","translated_title":"","metadata":{"publisher":"CRC Press","publication_date":{"day":null,"month":null,"year":2011,"errors":{}},"publication_name":"ESREL 2011"},"translated_abstract":null,"internal_url":"https://www.academia.edu/80388087/Experience_from_chemical_industry_for_controlling_patient_safety","translated_internal_url":"","created_at":"2022-05-31T10:57:06.341-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":37932251,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Experience_from_chemical_industry_for_controlling_patient_safety","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":37932251,"first_name":"Coen","middle_initials":null,"last_name":"Gulijk","page_name":"CoenGulijk","domain_name":"hud","created_at":"2015-11-09T01:46:39.427-08:00","display_name":"Coen Gulijk","url":"https://hud.academia.edu/CoenGulijk"},"attachments":[],"research_interests":[{"id":26,"name":"Business","url":"https://www.academia.edu/Documents/in/Business"},{"id":26327,"name":"Medicine","url":"https://www.academia.edu/Documents/in/Medicine"},{"id":35317,"name":"Process Safety","url":"https://www.academia.edu/Documents/in/Process_Safety"},{"id":1116281,"name":"Chemical Safety","url":"https://www.academia.edu/Documents/in/Chemical_Safety"},{"id":1194586,"name":"T","url":"https://www.academia.edu/Documents/in/T"},{"id":1212997,"name":"Q","url":"https://www.academia.edu/Documents/in/Q"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="18265359"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/18265359/Airport_security_An_ethnographic_study"><img alt="Research paper thumbnail of Airport security: An ethnographic study" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/18265359/Airport_security_An_ethnographic_study">Airport security: An ethnographic study</a></div><div class="wp-workCard_item wp-workCard--coauthors"><span>by </span><span><a class="" data-click-track="profile-work-strip-authors" href="https://independent.academia.edu/AlanKirschenbaum">Alan Kirschenbaum</a> and <a class="" data-click-track="profile-work-strip-authors" href="https://hud.academia.edu/CoenGulijk">Coen Gulijk</a></span></div><div class="wp-workCard_item"><span>Journal of Air Transport Management</span><span>, 2012</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Abstract This paper employs a behavioral science perspective of airport security to, examine secu...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Abstract This paper employs a behavioral science perspective of airport security to, examine security related decision behaviors using exploratory ethnographic observations. Sampling employees from a broad spectrum of departments and occupations in several major ...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="18265359"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="18265359"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 18265359; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=18265359]").text(description); $(".js-view-count[data-work-id=18265359]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 18265359; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='18265359']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 18265359, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=18265359]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":18265359,"title":"Airport security: An ethnographic study","translated_title":"","metadata":{"abstract":"Abstract This paper employs a behavioral science perspective of airport security to, examine security related decision behaviors using exploratory ethnographic observations. Sampling employees from a broad spectrum of departments and occupations in several major ...","publication_date":{"day":null,"month":null,"year":2012,"errors":{}},"publication_name":"Journal of Air Transport Management"},"translated_abstract":"Abstract This paper employs a behavioral science perspective of airport security to, examine security related decision behaviors using exploratory ethnographic observations. Sampling employees from a broad spectrum of departments and occupations in several major ...","internal_url":"https://www.academia.edu/18265359/Airport_security_An_ethnographic_study","translated_internal_url":"","created_at":"2015-11-13T01:34:49.993-08:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":38248047,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[{"id":9667552,"work_id":18265359,"tagging_user_id":38248047,"tagged_user_id":11948859,"co_author_invite_id":null,"email":"m***i@unimore.it","affiliation":"Universit脿 degli studi di Modena e Reggio Emilia","display_order":4194304,"name":"Michele Mariani","title":"Airport security: An ethnographic study"},{"id":9667554,"work_id":18265359,"tagging_user_id":38248047,"tagged_user_id":37932251,"co_author_invite_id":null,"email":"c***k@hud.ac.uk","affiliation":"University of Huddersfield","display_order":6291456,"name":"Coen Gulijk","title":"Airport security: An ethnographic study"},{"id":9667556,"work_id":18265359,"tagging_user_id":38248047,"tagged_user_id":29855823,"co_author_invite_id":null,"email":"s***z@gmail.com","display_order":7340032,"name":"Sharon Lubasz","title":"Airport security: An ethnographic study"}],"downloadable_attachments":[],"slug":"Airport_security_An_ethnographic_study","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":38248047,"first_name":"Alan","middle_initials":null,"last_name":"Kirschenbaum","page_name":"AlanKirschenbaum","domain_name":"independent","created_at":"2015-11-13T01:32:47.240-08:00","display_name":"Alan Kirschenbaum","url":"https://independent.academia.edu/AlanKirschenbaum"},"attachments":[],"research_interests":[{"id":3170,"name":"Air Transport","url":"https://www.academia.edu/Documents/in/Air_Transport"},{"id":20436,"name":"Urban And Regional Planning","url":"https://www.academia.edu/Documents/in/Urban_And_Regional_Planning"},{"id":684819,"name":"Air Transport Management","url":"https://www.academia.edu/Documents/in/Air_Transport_Management"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="33095044"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/33095044/The_role_of_data_visualization_in_railway_Big_Data_Risk_Analysis"><img alt="Research paper thumbnail of The role of data visualization in railway Big Data Risk Analysis" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" rel="nofollow" href="https://www.academia.edu/33095044/The_role_of_data_visualization_in_railway_Big_Data_Risk_Analysis">The role of data visualization in railway Big Data Risk Analysis</a></div><div class="wp-workCard_item"><span>ESREL 2015</span><span>, 2015</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">ABSTRACT</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="33095044"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="33095044"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 33095044; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=33095044]").text(description); $(".js-view-count[data-work-id=33095044]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 33095044; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='33095044']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 33095044, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=33095044]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":33095044,"title":"The role of data visualization in railway Big Data Risk Analysis","translated_title":"","metadata":{"abstract":"ABSTRACT","publication_date":{"day":null,"month":null,"year":2015,"errors":{}},"publication_name":"ESREL 2015"},"translated_abstract":"ABSTRACT","internal_url":"https://www.academia.edu/33095044/The_role_of_data_visualization_in_railway_Big_Data_Risk_Analysis","translated_internal_url":"","created_at":"2017-05-19T04:21:59.204-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":37932251,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"The_role_of_data_visualization_in_railway_Big_Data_Risk_Analysis","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":37932251,"first_name":"Coen","middle_initials":null,"last_name":"Gulijk","page_name":"CoenGulijk","domain_name":"hud","created_at":"2015-11-09T01:46:39.427-08:00","display_name":"Coen Gulijk","url":"https://hud.academia.edu/CoenGulijk"},"attachments":[],"research_interests":[],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="33095043"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/33095043/Big_Data_Risk_Analysis_for_rail_safety"><img alt="Research paper thumbnail of Big Data Risk Analysis for rail safety?" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" rel="nofollow" href="https://www.academia.edu/33095043/Big_Data_Risk_Analysis_for_rail_safety">Big Data Risk Analysis for rail safety?</a></div><div class="wp-workCard_item"><span>ESREL 2015</span><span>, 2015</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">ABSTRACT</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="33095043"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="33095043"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 33095043; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=33095043]").text(description); $(".js-view-count[data-work-id=33095043]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 33095043; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='33095043']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 33095043, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=33095043]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":33095043,"title":"Big Data Risk Analysis for rail safety?","translated_title":"","metadata":{"abstract":"ABSTRACT","publication_date":{"day":null,"month":null,"year":2015,"errors":{}},"publication_name":"ESREL 2015"},"translated_abstract":"ABSTRACT","internal_url":"https://www.academia.edu/33095043/Big_Data_Risk_Analysis_for_rail_safety","translated_internal_url":"","created_at":"2017-05-19T04:21:59.091-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":37932251,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Big_Data_Risk_Analysis_for_rail_safety","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":37932251,"first_name":"Coen","middle_initials":null,"last_name":"Gulijk","page_name":"CoenGulijk","domain_name":"hud","created_at":"2015-11-09T01:46:39.427-08:00","display_name":"Coen Gulijk","url":"https://hud.academia.edu/CoenGulijk"},"attachments":[],"research_interests":[],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="33095042"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/33095042/Visualising_Close_Call_in_railways_a_step_towards_Big_Data_Risk_Analysis"><img alt="Research paper thumbnail of Visualising Close Call in railways: a step towards Big Data Risk Analysis" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" rel="nofollow" href="https://www.academia.edu/33095042/Visualising_Close_Call_in_railways_a_step_towards_Big_Data_Risk_Analysis">Visualising Close Call in railways: a step towards Big Data Risk Analysis</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">ABSTRACT</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="33095042"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="33095042"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 33095042; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=33095042]").text(description); $(".js-view-count[data-work-id=33095042]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 33095042; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='33095042']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 33095042, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=33095042]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":33095042,"title":"Visualising Close Call in railways: a step towards Big Data Risk Analysis","translated_title":"","metadata":{"abstract":"ABSTRACT"},"translated_abstract":"ABSTRACT","internal_url":"https://www.academia.edu/33095042/Visualising_Close_Call_in_railways_a_step_towards_Big_Data_Risk_Analysis","translated_internal_url":"","created_at":"2017-05-19T04:21:58.960-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":37932251,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Visualising_Close_Call_in_railways_a_step_towards_Big_Data_Risk_Analysis","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":37932251,"first_name":"Coen","middle_initials":null,"last_name":"Gulijk","page_name":"CoenGulijk","domain_name":"hud","created_at":"2015-11-09T01:46:39.427-08:00","display_name":"Coen Gulijk","url":"https://hud.academia.edu/CoenGulijk"},"attachments":[],"research_interests":[],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="33095041"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/33095041/Rational_design_of_a_robust_diesel_particulate_filter"><img alt="Research paper thumbnail of Rational design of a robust diesel particulate filter" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" rel="nofollow" href="https://www.academia.edu/33095041/Rational_design_of_a_robust_diesel_particulate_filter">Rational design of a robust diesel particulate filter</a></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="33095041"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="33095041"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 33095041; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=33095041]").text(description); $(".js-view-count[data-work-id=33095041]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 33095041; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='33095041']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 33095041, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=33095041]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":33095041,"title":"Rational design of a robust diesel particulate filter","translated_title":"","metadata":{},"translated_abstract":null,"internal_url":"https://www.academia.edu/33095041/Rational_design_of_a_robust_diesel_particulate_filter","translated_internal_url":"","created_at":"2017-05-19T04:21:58.822-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":37932251,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Rational_design_of_a_robust_diesel_particulate_filter","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":37932251,"first_name":"Coen","middle_initials":null,"last_name":"Gulijk","page_name":"CoenGulijk","domain_name":"hud","created_at":"2015-11-09T01:46:39.427-08:00","display_name":"Coen Gulijk","url":"https://hud.academia.edu/CoenGulijk"},"attachments":[],"research_interests":[{"id":2202458,"name":"Diesel particulate filter","url":"https://www.academia.edu/Documents/in/Diesel_particulate_filter"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="33095040"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/33095040/Controlling_security_risks_with_the_MMO_method"><img alt="Research paper thumbnail of Controlling security risks with the MMO method" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/33095040/Controlling_security_risks_with_the_MMO_method">Controlling security risks with the MMO method</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">A fimdamental analysis of crime and the juridical systems to punish crime has yielded a starting ...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">A fimdamental analysis of crime and the juridical systems to punish crime has yielded a starting point for quantitative risk analysis of security risks. This method is called the MMO concept as a generic concept for the design of security barriers and their evaluation by quantitative risk analysis methods. It is based on a simplification of the basic elements for proving criminal liability that a defendant committed a crime under US law: motive, means and opportunity. These three elements form the preconditions that are needed to let an ill meaning person to develop into a hazard or threat. The MMO concept also forms the key to the development of successful barriers against the completion of the actual act. Taking one of these three away would render the hazard meffective. This enables the development of a model for security threats along the same lines as safety threats and opens the possibility for similar qualitative and quantitative analysis. The MMO concept may seem relatively ...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="33095040"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="33095040"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 33095040; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=33095040]").text(description); $(".js-view-count[data-work-id=33095040]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 33095040; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='33095040']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 33095040, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=33095040]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":33095040,"title":"Controlling security risks with the MMO method","translated_title":"","metadata":{"abstract":"A fimdamental analysis of crime and the juridical systems to punish crime has yielded a starting point for quantitative risk analysis of security risks. This method is called the MMO concept as a generic concept for the design of security barriers and their evaluation by quantitative risk analysis methods. It is based on a simplification of the basic elements for proving criminal liability that a defendant committed a crime under US law: motive, means and opportunity. These three elements form the preconditions that are needed to let an ill meaning person to develop into a hazard or threat. The MMO concept also forms the key to the development of successful barriers against the completion of the actual act. Taking one of these three away would render the hazard meffective. This enables the development of a model for security threats along the same lines as safety threats and opens the possibility for similar qualitative and quantitative analysis. The MMO concept may seem relatively ..."},"translated_abstract":"A fimdamental analysis of crime and the juridical systems to punish crime has yielded a starting point for quantitative risk analysis of security risks. This method is called the MMO concept as a generic concept for the design of security barriers and their evaluation by quantitative risk analysis methods. It is based on a simplification of the basic elements for proving criminal liability that a defendant committed a crime under US law: motive, means and opportunity. These three elements form the preconditions that are needed to let an ill meaning person to develop into a hazard or threat. The MMO concept also forms the key to the development of successful barriers against the completion of the actual act. Taking one of these three away would render the hazard meffective. This enables the development of a model for security threats along the same lines as safety threats and opens the possibility for similar qualitative and quantitative analysis. The MMO concept may seem relatively ...","internal_url":"https://www.academia.edu/33095040/Controlling_security_risks_with_the_MMO_method","translated_internal_url":"","created_at":"2017-05-19T04:21:58.695-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":37932251,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Controlling_security_risks_with_the_MMO_method","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":37932251,"first_name":"Coen","middle_initials":null,"last_name":"Gulijk","page_name":"CoenGulijk","domain_name":"hud","created_at":"2015-11-09T01:46:39.427-08:00","display_name":"Coen Gulijk","url":"https://hud.academia.edu/CoenGulijk"},"attachments":[],"research_interests":[],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="33095039"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/33095039/Oil_Spills_a_persistent_problem"><img alt="Research paper thumbnail of Oil Spills, a persistent problem" class="work-thumbnail" src="https://attachments.academia-assets.com/53193708/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/33095039/Oil_Spills_a_persistent_problem">Oil Spills, a persistent problem</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Oil-颅鈥恠pills like the Deepwater Horizon spill shake the world but was the occurrence of that spil...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Oil-颅鈥恠pills like the Deepwater Horizon spill shake the world but was the occurrence of that spill, the size of it in particular, really that rare? The aim of this work is to compare the Deepwater Horizon spill with historic spill data to put evaluate the rarity of the spill. This work addresses that problem by analyzing historic spill data from the National Oceanic and Atmospheric Administration (NOAA). A quantitative risk approach is used where the F-颅鈥怤 curve is the instrument of the analysis. In this work, the Deepwater Horizon spill is classified as a super-颅鈥恠pill of 1,000,000 barrels or more. Historic data suggests that these super spills are not excessively rare and have occurred with a frequency of about 5 years. This shows that oil spills are indeed a persistent problem. 2. Prelude to this investigation The Deepwater Horizon catastrophe has a great impact on the environment and public opinion about the risks of oil production. The future of oil production is debated in sci...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="f10802e79a87a0b7404905b5c52ba137" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":53193708,"asset_id":33095039,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/53193708/download_file?st=MTczMjc5NjgxNiw4LjIyMi4yMDguMTQ2&st=MTczMjc5NjgxNiw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="33095039"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="33095039"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 33095039; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=33095039]").text(description); $(".js-view-count[data-work-id=33095039]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 33095039; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='33095039']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 33095039, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "f10802e79a87a0b7404905b5c52ba137" } } $('.js-work-strip[data-work-id=33095039]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":33095039,"title":"Oil Spills, a persistent problem","translated_title":"","metadata":{"abstract":"Oil-颅鈥恠pills like the Deepwater Horizon spill shake the world but was the occurrence of that spill, the size of it in particular, really that rare? The aim of this work is to compare the Deepwater Horizon spill with historic spill data to put evaluate the rarity of the spill. This work addresses that problem by analyzing historic spill data from the National Oceanic and Atmospheric Administration (NOAA). A quantitative risk approach is used where the F-颅鈥怤 curve is the instrument of the analysis. In this work, the Deepwater Horizon spill is classified as a super-颅鈥恠pill of 1,000,000 barrels or more. Historic data suggests that these super spills are not excessively rare and have occurred with a frequency of about 5 years. This shows that oil spills are indeed a persistent problem. 2. Prelude to this investigation The Deepwater Horizon catastrophe has a great impact on the environment and public opinion about the risks of oil production. The future of oil production is debated in sci..."},"translated_abstract":"Oil-颅鈥恠pills like the Deepwater Horizon spill shake the world but was the occurrence of that spill, the size of it in particular, really that rare? The aim of this work is to compare the Deepwater Horizon spill with historic spill data to put evaluate the rarity of the spill. This work addresses that problem by analyzing historic spill data from the National Oceanic and Atmospheric Administration (NOAA). A quantitative risk approach is used where the F-颅鈥怤 curve is the instrument of the analysis. In this work, the Deepwater Horizon spill is classified as a super-颅鈥恠pill of 1,000,000 barrels or more. Historic data suggests that these super spills are not excessively rare and have occurred with a frequency of about 5 years. This shows that oil spills are indeed a persistent problem. 2. Prelude to this investigation The Deepwater Horizon catastrophe has a great impact on the environment and public opinion about the risks of oil production. The future of oil production is debated in sci...","internal_url":"https://www.academia.edu/33095039/Oil_Spills_a_persistent_problem","translated_internal_url":"","created_at":"2017-05-19T04:21:58.557-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":37932251,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":53193708,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/53193708/thumbnails/1.jpg","file_name":"Oil_Spills_a_persistent_problem20170519-7310-2crhz7.pdf","download_url":"https://www.academia.edu/attachments/53193708/download_file?st=MTczMjc5NjgxNiw4LjIyMi4yMDguMTQ2&st=MTczMjc5NjgxNiw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Oil_Spills_a_persistent_problem.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/53193708/Oil_Spills_a_persistent_problem20170519-7310-2crhz7-libre.pdf?1495193153=\u0026response-content-disposition=attachment%3B+filename%3DOil_Spills_a_persistent_problem.pdf\u0026Expires=1732800416\u0026Signature=Pd3dBQrUA-c5UGi8tUNUiVAQ-O3derHycrru46AUSDqWOgLK35WmA7UYSTXKYrAxkNOrXrFoRY~sE4ADIwLY9FDQgYs8jFpvJBVuAY2jT4XfJue5RNnaiweF6PDlI5qxiCCnBefBGjU4ssRFOpUFf3VSvyZgwzPPtO07NH3cteIbCKPOUEo8Rgfn70AOQQlmXMWJvYgq74NtKBBo-lJYoWdmbFA0cEXvfuAqo3Arl7XnviJgjsH-qpOJeQW-ThS9Hb6jlH5W7tSNzPnm8H5GHx7psPYJeNU1lSUYeyxNnHuvtJ8DRTCq1N8lhFRlHPCWsCmV5sE6O4XPbMhhZ7BjlQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Oil_Spills_a_persistent_problem","translated_slug":"","page_count":20,"language":"en","content_type":"Work","owner":{"id":37932251,"first_name":"Coen","middle_initials":null,"last_name":"Gulijk","page_name":"CoenGulijk","domain_name":"hud","created_at":"2015-11-09T01:46:39.427-08:00","display_name":"Coen Gulijk","url":"https://hud.academia.edu/CoenGulijk"},"attachments":[{"id":53193708,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/53193708/thumbnails/1.jpg","file_name":"Oil_Spills_a_persistent_problem20170519-7310-2crhz7.pdf","download_url":"https://www.academia.edu/attachments/53193708/download_file?st=MTczMjc5NjgxNiw4LjIyMi4yMDguMTQ2&st=MTczMjc5NjgxNiw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Oil_Spills_a_persistent_problem.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/53193708/Oil_Spills_a_persistent_problem20170519-7310-2crhz7-libre.pdf?1495193153=\u0026response-content-disposition=attachment%3B+filename%3DOil_Spills_a_persistent_problem.pdf\u0026Expires=1732800416\u0026Signature=Pd3dBQrUA-c5UGi8tUNUiVAQ-O3derHycrru46AUSDqWOgLK35WmA7UYSTXKYrAxkNOrXrFoRY~sE4ADIwLY9FDQgYs8jFpvJBVuAY2jT4XfJue5RNnaiweF6PDlI5qxiCCnBefBGjU4ssRFOpUFf3VSvyZgwzPPtO07NH3cteIbCKPOUEo8Rgfn70AOQQlmXMWJvYgq74NtKBBo-lJYoWdmbFA0cEXvfuAqo3Arl7XnviJgjsH-qpOJeQW-ThS9Hb6jlH5W7tSNzPnm8H5GHx7psPYJeNU1lSUYeyxNnHuvtJ8DRTCq1N8lhFRlHPCWsCmV5sE6O4XPbMhhZ7BjlQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="33095038"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/33095038/All_swept_up_An_initial_classification_of_NSA_surveillance_technology"><img alt="Research paper thumbnail of All swept up: An initial classification of NSA surveillance technology" class="work-thumbnail" src="https://attachments.academia-assets.com/53193709/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/33095038/All_swept_up_An_initial_classification_of_NSA_surveillance_technology">All swept up: An initial classification of NSA surveillance technology</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">The study was initiated as part of the FP7 SURVEILLE project commissioned by the European Commiss...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">The study was initiated as part of the FP7 SURVEILLE project commissioned by the European Commission. The goal is to examine the mass surveillance technology used by the NSA in the programs revealed by the Snowden leaks. This paper forms the basis from which to study the effectiveness of these surveillance technologies. Novelty: While there have been a lot of headlines regarding what the NSA is purportedly doing, discussion of the technology used to do this is scarce to nonexistent. There is also the problem of different programs being revealed via different media sources, thus making it difficult to know and follow the information being revealed regarding NSA programs. This paper attempts to bring the NSA programs and methods into one place, categorize those that are similar, and analyze the probable surveillance systems used. Relevance: This work is the beginning of developing a method of evaluating the effectiveness of surveillance technologies, the lack of which is notable in go...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="18a9dda231f10760f6e40f121a6a14a5" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":53193709,"asset_id":33095038,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/53193709/download_file?st=MTczMjc5NjgxNiw4LjIyMi4yMDguMTQ2&st=MTczMjc5NjgxNiw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="33095038"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="33095038"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 33095038; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=33095038]").text(description); $(".js-view-count[data-work-id=33095038]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 33095038; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='33095038']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 33095038, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "18a9dda231f10760f6e40f121a6a14a5" } } $('.js-work-strip[data-work-id=33095038]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":33095038,"title":"All swept up: An initial classification of NSA surveillance technology","translated_title":"","metadata":{"abstract":"The study was initiated as part of the FP7 SURVEILLE project commissioned by the European Commission. The goal is to examine the mass surveillance technology used by the NSA in the programs revealed by the Snowden leaks. This paper forms the basis from which to study the effectiveness of these surveillance technologies. Novelty: While there have been a lot of headlines regarding what the NSA is purportedly doing, discussion of the technology used to do this is scarce to nonexistent. There is also the problem of different programs being revealed via different media sources, thus making it difficult to know and follow the information being revealed regarding NSA programs. This paper attempts to bring the NSA programs and methods into one place, categorize those that are similar, and analyze the probable surveillance systems used. Relevance: This work is the beginning of developing a method of evaluating the effectiveness of surveillance technologies, the lack of which is notable in go..."},"translated_abstract":"The study was initiated as part of the FP7 SURVEILLE project commissioned by the European Commission. The goal is to examine the mass surveillance technology used by the NSA in the programs revealed by the Snowden leaks. This paper forms the basis from which to study the effectiveness of these surveillance technologies. Novelty: While there have been a lot of headlines regarding what the NSA is purportedly doing, discussion of the technology used to do this is scarce to nonexistent. There is also the problem of different programs being revealed via different media sources, thus making it difficult to know and follow the information being revealed regarding NSA programs. This paper attempts to bring the NSA programs and methods into one place, categorize those that are similar, and analyze the probable surveillance systems used. Relevance: This work is the beginning of developing a method of evaluating the effectiveness of surveillance technologies, the lack of which is notable in go...","internal_url":"https://www.academia.edu/33095038/All_swept_up_An_initial_classification_of_NSA_surveillance_technology","translated_internal_url":"","created_at":"2017-05-19T04:21:58.413-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":37932251,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":53193709,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/53193709/thumbnails/1.jpg","file_name":"All_swept_up_An_initial_classification_o20170519-7313-x6jigr.pdf","download_url":"https://www.academia.edu/attachments/53193709/download_file?st=MTczMjc5NjgxNiw4LjIyMi4yMDguMTQ2&st=MTczMjc5NjgxNiw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"All_swept_up_An_initial_classification_o.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/53193709/All_swept_up_An_initial_classification_o20170519-7313-x6jigr-libre.pdf?1495193146=\u0026response-content-disposition=attachment%3B+filename%3DAll_swept_up_An_initial_classification_o.pdf\u0026Expires=1732800416\u0026Signature=GTHe4E0GnuT4INHcuCcmXvW9axfZxO2YszCFEWUVLDzeWwDnUuVPteMCD5aNZ62DtLICLF10N5QhC50ZD2gjMvcLGozcdsZ7OdpWo2m5XkpINyFUtskf9Kncwb3jU8ROSwHzgUcPFgiwGdcbT7PCK8idC88GW2hSt0cGvrqI112-K94V4FqvmIlNg~LWrD5nc1gJnbcfPhUILMwLZoODJJUKy5Jg37WrhH-9b1hMFN8Zc0Qa3dQnYuarQPuHZLs4VvbTVB2FpM4gntzI~1lXmFbER~-bqZBGu7CMbmmkw40jwakq8txOr3e2F9g6W1fjKka-2BruZwZbaPwmTXlXrA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"All_swept_up_An_initial_classification_of_NSA_surveillance_technology","translated_slug":"","page_count":8,"language":"en","content_type":"Work","owner":{"id":37932251,"first_name":"Coen","middle_initials":null,"last_name":"Gulijk","page_name":"CoenGulijk","domain_name":"hud","created_at":"2015-11-09T01:46:39.427-08:00","display_name":"Coen Gulijk","url":"https://hud.academia.edu/CoenGulijk"},"attachments":[{"id":53193709,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/53193709/thumbnails/1.jpg","file_name":"All_swept_up_An_initial_classification_o20170519-7313-x6jigr.pdf","download_url":"https://www.academia.edu/attachments/53193709/download_file?st=MTczMjc5NjgxNiw4LjIyMi4yMDguMTQ2&st=MTczMjc5NjgxNiw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"All_swept_up_An_initial_classification_o.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/53193709/All_swept_up_An_initial_classification_o20170519-7313-x6jigr-libre.pdf?1495193146=\u0026response-content-disposition=attachment%3B+filename%3DAll_swept_up_An_initial_classification_o.pdf\u0026Expires=1732800416\u0026Signature=GTHe4E0GnuT4INHcuCcmXvW9axfZxO2YszCFEWUVLDzeWwDnUuVPteMCD5aNZ62DtLICLF10N5QhC50ZD2gjMvcLGozcdsZ7OdpWo2m5XkpINyFUtskf9Kncwb3jU8ROSwHzgUcPFgiwGdcbT7PCK8idC88GW2hSt0cGvrqI112-K94V4FqvmIlNg~LWrD5nc1gJnbcfPhUILMwLZoODJJUKy5Jg37WrhH-9b1hMFN8Zc0Qa3dQnYuarQPuHZLs4VvbTVB2FpM4gntzI~1lXmFbER~-bqZBGu7CMbmmkw40jwakq8txOr3e2F9g6W1fjKka-2BruZwZbaPwmTXlXrA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="33095037"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/33095037/Cost_benefit_analysis_of_surveillance_technologies"><img alt="Research paper thumbnail of Cost-benefit analysis of surveillance technologies" class="work-thumbnail" src="https://attachments.academia-assets.com/53193706/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/33095037/Cost_benefit_analysis_of_surveillance_technologies">Cost-benefit analysis of surveillance technologies</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">There are several types of surveillance devices in the market, each with its own operating charac...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">There are several types of surveillance devices in the market, each with its own operating characteristics. Since the terrorist attack of 9/11 there has been much focus on preventing or mitigating damages and causalities caused by terrorist activities. A key issue is whether the investment in fighting crime and counter-terrorism devices is well spent in a manner that optimizes public safety in a cost-effective manner. SURVEILLE is a research project funded within the EU Commission FP7 framework where one of the objectives is to assess the benefits and costs of surveillance technology. This paper reports on ongoing work of cost-benefit modelling for security that is performed within in this project. This paper provides a brief overview of the quantification method for cost-benefit models for security devices. Currently, a straightforward and easy-to-use cost-benefit analysis of surveillance technologies is not available. A cost-benefit model considering probabilistic terrorism risk a...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="9d4dcd85301fadf7c5787956dcaa0930" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":53193706,"asset_id":33095037,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/53193706/download_file?st=MTczMjc5NjgxNiw4LjIyMi4yMDguMTQ2&st=MTczMjc5NjgxNiw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="33095037"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="33095037"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 33095037; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=33095037]").text(description); $(".js-view-count[data-work-id=33095037]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 33095037; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='33095037']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 33095037, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "9d4dcd85301fadf7c5787956dcaa0930" } } $('.js-work-strip[data-work-id=33095037]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":33095037,"title":"Cost-benefit analysis of surveillance technologies","translated_title":"","metadata":{"abstract":"There are several types of surveillance devices in the market, each with its own operating characteristics. Since the terrorist attack of 9/11 there has been much focus on preventing or mitigating damages and causalities caused by terrorist activities. A key issue is whether the investment in fighting crime and counter-terrorism devices is well spent in a manner that optimizes public safety in a cost-effective manner. SURVEILLE is a research project funded within the EU Commission FP7 framework where one of the objectives is to assess the benefits and costs of surveillance technology. This paper reports on ongoing work of cost-benefit modelling for security that is performed within in this project. This paper provides a brief overview of the quantification method for cost-benefit models for security devices. Currently, a straightforward and easy-to-use cost-benefit analysis of surveillance technologies is not available. A cost-benefit model considering probabilistic terrorism risk a..."},"translated_abstract":"There are several types of surveillance devices in the market, each with its own operating characteristics. Since the terrorist attack of 9/11 there has been much focus on preventing or mitigating damages and causalities caused by terrorist activities. A key issue is whether the investment in fighting crime and counter-terrorism devices is well spent in a manner that optimizes public safety in a cost-effective manner. SURVEILLE is a research project funded within the EU Commission FP7 framework where one of the objectives is to assess the benefits and costs of surveillance technology. This paper reports on ongoing work of cost-benefit modelling for security that is performed within in this project. This paper provides a brief overview of the quantification method for cost-benefit models for security devices. Currently, a straightforward and easy-to-use cost-benefit analysis of surveillance technologies is not available. A cost-benefit model considering probabilistic terrorism risk a...","internal_url":"https://www.academia.edu/33095037/Cost_benefit_analysis_of_surveillance_technologies","translated_internal_url":"","created_at":"2017-05-19T04:21:58.267-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":37932251,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":53193706,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/53193706/thumbnails/1.jpg","file_name":"Cost-benefit_analysis_of_surveillance_te20170519-7310-aggkjk.pdf","download_url":"https://www.academia.edu/attachments/53193706/download_file?st=MTczMjc5NjgxNiw4LjIyMi4yMDguMTQ2&st=MTczMjc5NjgxNiw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Cost_benefit_analysis_of_surveillance_te.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/53193706/Cost-benefit_analysis_of_surveillance_te20170519-7310-aggkjk-libre.pdf?1495193149=\u0026response-content-disposition=attachment%3B+filename%3DCost_benefit_analysis_of_surveillance_te.pdf\u0026Expires=1732800416\u0026Signature=YwG51qkK1Kw1jrhzMOvQ7vcd2jNIM5bksQ9DkPjbsKYbUCwen~Vacn~ARQ6LZOtKK8yPAM1Hspmg9nrF2AQ~ByFLkQQ7PBIbKPkKc2gLO2OrkpVqKNGGLwwnwpH0LEib2FOj70inejFaZLv997TZiiiLGgDBI0K5QJUMN6uL0guJf02~JAXnmL4zu6AhKw6fYGUSilXVYWl-ZGn-ZC2~ghZLCHdKS80-xN7miXob3RqJAx1H53FiOsA7In~EOQSzX~cuekx78PK1XPzJbHZyB0Pmp8~qnK641RODb6q07-R-AoQ7pG7NbSMLptgQ0oVVohfRB2qT~eho7qcx1FwY7Q__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Cost_benefit_analysis_of_surveillance_technologies","translated_slug":"","page_count":7,"language":"en","content_type":"Work","owner":{"id":37932251,"first_name":"Coen","middle_initials":null,"last_name":"Gulijk","page_name":"CoenGulijk","domain_name":"hud","created_at":"2015-11-09T01:46:39.427-08:00","display_name":"Coen Gulijk","url":"https://hud.academia.edu/CoenGulijk"},"attachments":[{"id":53193706,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/53193706/thumbnails/1.jpg","file_name":"Cost-benefit_analysis_of_surveillance_te20170519-7310-aggkjk.pdf","download_url":"https://www.academia.edu/attachments/53193706/download_file?st=MTczMjc5NjgxNiw4LjIyMi4yMDguMTQ2&st=MTczMjc5NjgxNiw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Cost_benefit_analysis_of_surveillance_te.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/53193706/Cost-benefit_analysis_of_surveillance_te20170519-7310-aggkjk-libre.pdf?1495193149=\u0026response-content-disposition=attachment%3B+filename%3DCost_benefit_analysis_of_surveillance_te.pdf\u0026Expires=1732800416\u0026Signature=YwG51qkK1Kw1jrhzMOvQ7vcd2jNIM5bksQ9DkPjbsKYbUCwen~Vacn~ARQ6LZOtKK8yPAM1Hspmg9nrF2AQ~ByFLkQQ7PBIbKPkKc2gLO2OrkpVqKNGGLwwnwpH0LEib2FOj70inejFaZLv997TZiiiLGgDBI0K5QJUMN6uL0guJf02~JAXnmL4zu6AhKw6fYGUSilXVYWl-ZGn-ZC2~ghZLCHdKS80-xN7miXob3RqJAx1H53FiOsA7In~EOQSzX~cuekx78PK1XPzJbHZyB0Pmp8~qnK641RODb6q07-R-AoQ7pG7NbSMLptgQ0oVVohfRB2qT~eho7qcx1FwY7Q__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="33095036"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/33095036/Testing_a_Safety_Management_System_in_Aviation"><img alt="Research paper thumbnail of Testing a Safety Management System in Aviation" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" rel="nofollow" href="https://www.academia.edu/33095036/Testing_a_Safety_Management_System_in_Aviation">Testing a Safety Management System in Aviation</a></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="33095036"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="33095036"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 33095036; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=33095036]").text(description); $(".js-view-count[data-work-id=33095036]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 33095036; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='33095036']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 33095036, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=33095036]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":33095036,"title":"Testing a Safety Management System in Aviation","translated_title":"","metadata":{},"translated_abstract":null,"internal_url":"https://www.academia.edu/33095036/Testing_a_Safety_Management_System_in_Aviation","translated_internal_url":"","created_at":"2017-05-19T04:21:58.098-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":37932251,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Testing_a_Safety_Management_System_in_Aviation","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":37932251,"first_name":"Coen","middle_initials":null,"last_name":"Gulijk","page_name":"CoenGulijk","domain_name":"hud","created_at":"2015-11-09T01:46:39.427-08:00","display_name":"Coen Gulijk","url":"https://hud.academia.edu/CoenGulijk"},"attachments":[],"research_interests":[],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="33095035"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/33095035/Elements_of_criminal_liability_as_a_basis_for_the_design_of_security_barriers_and_risk_modeling"><img alt="Research paper thumbnail of Elements of criminal liability as a basis for the design of security barriers and risk modeling" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" rel="nofollow" href="https://www.academia.edu/33095035/Elements_of_criminal_liability_as_a_basis_for_the_design_of_security_barriers_and_risk_modeling">Elements of criminal liability as a basis for the design of security barriers and risk modeling</a></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="33095035"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="33095035"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 33095035; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=33095035]").text(description); $(".js-view-count[data-work-id=33095035]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 33095035; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='33095035']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 33095035, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=33095035]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":33095035,"title":"Elements of criminal liability as a basis for the design of security barriers and risk modeling","translated_title":"","metadata":{},"translated_abstract":null,"internal_url":"https://www.academia.edu/33095035/Elements_of_criminal_liability_as_a_basis_for_the_design_of_security_barriers_and_risk_modeling","translated_internal_url":"","created_at":"2017-05-19T04:21:57.904-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":37932251,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Elements_of_criminal_liability_as_a_basis_for_the_design_of_security_barriers_and_risk_modeling","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":37932251,"first_name":"Coen","middle_initials":null,"last_name":"Gulijk","page_name":"CoenGulijk","domain_name":"hud","created_at":"2015-11-09T01:46:39.427-08:00","display_name":"Coen Gulijk","url":"https://hud.academia.edu/CoenGulijk"},"attachments":[],"research_interests":[],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="33095034"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/33095034/Modelling_risk_in_high_hazard_operations_integrating_technical_organisational_and_cultural_factors"><img alt="Research paper thumbnail of Modelling risk in high hazard operations: integrating technical, organisational and cultural factors" class="work-thumbnail" src="https://attachments.academia-assets.com/53193711/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/33095034/Modelling_risk_in_high_hazard_operations_integrating_technical_organisational_and_cultural_factors">Modelling risk in high hazard operations: integrating technical, organisational and cultural factors</a></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="00ca429d449268ce2c4ec0a50b48d123" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":53193711,"asset_id":33095034,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/53193711/download_file?st=MTczMjc5NjgxNiw4LjIyMi4yMDguMTQ2&st=MTczMjc5NjgxNiw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="33095034"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="33095034"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 33095034; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=33095034]").text(description); $(".js-view-count[data-work-id=33095034]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 33095034; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='33095034']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 33095034, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "00ca429d449268ce2c4ec0a50b48d123" } } $('.js-work-strip[data-work-id=33095034]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":33095034,"title":"Modelling risk in high hazard operations: integrating technical, organisational and cultural factors","translated_title":"","metadata":{"grobid_abstract":"Recent disasters in high hazard industries such as Oil and Gas Exploration (The Deepwater Horizon) and Petrochemical production (Texas City) have been found to have causes that range from direct technical failures through organizational shortcomings right up to weak regulation and inappropriate company cultures. Risk models have generally concentrated upon technical failures, which are easier to construct and for which there is more concrete data. The primary causes, as identified by the US Chemical Safety Board for Texas City and the Presidential Commission for the Deepwater Horizon, lie firmly rooted in the culture of the organization and determine the way in which individuals go about risky activities. Modelling human activities, especially collectively rather than individual human errors as is done in most human models, is a quite different proposition, in which complex interactions between different individuals and levels change over time as success and failure alter the pattern of payoffs. This paper examines the development of an integrated model for risk in a real-time environment for the hydrocarbon industry. It is based originally on the CATS model for commercial aviation safety, that first attempted to address some of these problems in a relatively simple way. Aviation is, however, a relatively simple activity, with large numbers of common components in a constrained environment. The Oil and Gas industry is significantly more diverse, covering the gamut from exploration, drilling, production, transport, refining and chemical production, each with its own potential for large scale disaster, but in the case of an integrated oil company all run by individuals within a common company culture. Other papers will cover the details of specific issues; this paper covers the integration of the model as a whole.","grobid_abstract_attachment_id":53193711},"translated_abstract":null,"internal_url":"https://www.academia.edu/33095034/Modelling_risk_in_high_hazard_operations_integrating_technical_organisational_and_cultural_factors","translated_internal_url":"","created_at":"2017-05-19T04:21:57.764-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":37932251,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":53193711,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/53193711/thumbnails/1.jpg","file_name":"Modelling_risk_in_high_hazard_operations20170519-7313-685vfh.pdf","download_url":"https://www.academia.edu/attachments/53193711/download_file?st=MTczMjc5NjgxNiw4LjIyMi4yMDguMTQ2&st=MTczMjc5NjgxNiw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Modelling_risk_in_high_hazard_operations.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/53193711/Modelling_risk_in_high_hazard_operations20170519-7313-685vfh-libre.pdf?1495193147=\u0026response-content-disposition=attachment%3B+filename%3DModelling_risk_in_high_hazard_operations.pdf\u0026Expires=1732800416\u0026Signature=G~NMhPZCLl8thTenWaZbhqft-OqGJ5GvatlpCiGMRsGFacteX~DifZT9ZP2WEbg8BrGXTuCAJpbAqQ4Pfp43ZwIPqij4O~i4l8SNGZDW1auDo1l-lKNy86HrgPIPm1E8Y3Yfwm3ajkxUpH--nyep09Oew3~eXgIiFgy5RAoYFHZvGUsiKWkBJQJWS6rFgHGy3O4boDbEkqwQJdQVze5Scnwxru3C5eBe0wrThPjTfk6yRo5iFeQ9eb-0Ay7gBDHYTL3WLFszqxHhMGaM6W6wxWGbY-tzfStJeJLgWON9H0kWEfPDdg8GayXCnV7Z41YoQRaMhnwt3NoCWHhXWElfYA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Modelling_risk_in_high_hazard_operations_integrating_technical_organisational_and_cultural_factors","translated_slug":"","page_count":10,"language":"en","content_type":"Work","owner":{"id":37932251,"first_name":"Coen","middle_initials":null,"last_name":"Gulijk","page_name":"CoenGulijk","domain_name":"hud","created_at":"2015-11-09T01:46:39.427-08:00","display_name":"Coen Gulijk","url":"https://hud.academia.edu/CoenGulijk"},"attachments":[{"id":53193711,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/53193711/thumbnails/1.jpg","file_name":"Modelling_risk_in_high_hazard_operations20170519-7313-685vfh.pdf","download_url":"https://www.academia.edu/attachments/53193711/download_file?st=MTczMjc5NjgxNiw4LjIyMi4yMDguMTQ2&st=MTczMjc5NjgxNiw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Modelling_risk_in_high_hazard_operations.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/53193711/Modelling_risk_in_high_hazard_operations20170519-7313-685vfh-libre.pdf?1495193147=\u0026response-content-disposition=attachment%3B+filename%3DModelling_risk_in_high_hazard_operations.pdf\u0026Expires=1732800416\u0026Signature=G~NMhPZCLl8thTenWaZbhqft-OqGJ5GvatlpCiGMRsGFacteX~DifZT9ZP2WEbg8BrGXTuCAJpbAqQ4Pfp43ZwIPqij4O~i4l8SNGZDW1auDo1l-lKNy86HrgPIPm1E8Y3Yfwm3ajkxUpH--nyep09Oew3~eXgIiFgy5RAoYFHZvGUsiKWkBJQJWS6rFgHGy3O4boDbEkqwQJdQVze5Scnwxru3C5eBe0wrThPjTfk6yRo5iFeQ9eb-0Ay7gBDHYTL3WLFszqxHhMGaM6W6wxWGbY-tzfStJeJLgWON9H0kWEfPDdg8GayXCnV7Z41YoQRaMhnwt3NoCWHhXWElfYA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="33095033"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/33095033/Safety_management_for_operational_controllability_developing_an_organized_theoretical_perspective"><img alt="Research paper thumbnail of Safety management for operational controllability: developing an organized theoretical perspective" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" rel="nofollow" href="https://www.academia.edu/33095033/Safety_management_for_operational_controllability_developing_an_organized_theoretical_perspective">Safety management for operational controllability: developing an organized theoretical perspective</a></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="33095033"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="33095033"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 33095033; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=33095033]").text(description); $(".js-view-count[data-work-id=33095033]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 33095033; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='33095033']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 33095033, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=33095033]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":33095033,"title":"Safety management for operational controllability: developing an organized theoretical perspective","translated_title":"","metadata":{},"translated_abstract":null,"internal_url":"https://www.academia.edu/33095033/Safety_management_for_operational_controllability_developing_an_organized_theoretical_perspective","translated_internal_url":"","created_at":"2017-05-19T04:21:57.620-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":37932251,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Safety_management_for_operational_controllability_developing_an_organized_theoretical_perspective","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":37932251,"first_name":"Coen","middle_initials":null,"last_name":"Gulijk","page_name":"CoenGulijk","domain_name":"hud","created_at":"2015-11-09T01:46:39.427-08:00","display_name":"Coen Gulijk","url":"https://hud.academia.edu/CoenGulijk"},"attachments":[],"research_interests":[],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="33095032"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/33095032/Human_factors_in_the_layers_of_defense_in_airport_security"><img alt="Research paper thumbnail of Human factors in the layers of defense in airport security" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" rel="nofollow" href="https://www.academia.edu/33095032/Human_factors_in_the_layers_of_defense_in_airport_security">Human factors in the layers of defense in airport security</a></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="33095032"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="33095032"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 33095032; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=33095032]").text(description); $(".js-view-count[data-work-id=33095032]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 33095032; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='33095032']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 33095032, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=33095032]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":33095032,"title":"Human factors in the layers of defense in airport security","translated_title":"","metadata":{},"translated_abstract":null,"internal_url":"https://www.academia.edu/33095032/Human_factors_in_the_layers_of_defense_in_airport_security","translated_internal_url":"","created_at":"2017-05-19T04:21:57.491-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":37932251,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Human_factors_in_the_layers_of_defense_in_airport_security","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":37932251,"first_name":"Coen","middle_initials":null,"last_name":"Gulijk","page_name":"CoenGulijk","domain_name":"hud","created_at":"2015-11-09T01:46:39.427-08:00","display_name":"Coen Gulijk","url":"https://hud.academia.edu/CoenGulijk"},"attachments":[],"research_interests":[],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="33095031"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/33095031/Integrating_organisational_factors_into_a_BBN_model_of_risk"><img alt="Research paper thumbnail of Integrating organisational factors into a BBN model of risk" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" rel="nofollow" href="https://www.academia.edu/33095031/Integrating_organisational_factors_into_a_BBN_model_of_risk">Integrating organisational factors into a BBN model of risk</a></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="33095031"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="33095031"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 33095031; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=33095031]").text(description); $(".js-view-count[data-work-id=33095031]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 33095031; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='33095031']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 33095031, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=33095031]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":33095031,"title":"Integrating organisational factors into a BBN model of risk","translated_title":"","metadata":{},"translated_abstract":null,"internal_url":"https://www.academia.edu/33095031/Integrating_organisational_factors_into_a_BBN_model_of_risk","translated_internal_url":"","created_at":"2017-05-19T04:21:57.328-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":37932251,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Integrating_organisational_factors_into_a_BBN_model_of_risk","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":37932251,"first_name":"Coen","middle_initials":null,"last_name":"Gulijk","page_name":"CoenGulijk","domain_name":"hud","created_at":"2015-11-09T01:46:39.427-08:00","display_name":"Coen Gulijk","url":"https://hud.academia.edu/CoenGulijk"},"attachments":[],"research_interests":[],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="33095030"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/33095030/Bankruptcy_by_catastrophes_for_major_multi_nationals_stock_exchange_sensitivity_for_three_catastrophes"><img alt="Research paper thumbnail of Bankruptcy by catastrophes for major multi-nationals: stock exchange sensitivity for three catastrophes" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" rel="nofollow" href="https://www.academia.edu/33095030/Bankruptcy_by_catastrophes_for_major_multi_nationals_stock_exchange_sensitivity_for_three_catastrophes">Bankruptcy by catastrophes for major multi-nationals: stock exchange sensitivity for three catastrophes</a></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="33095030"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="33095030"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 33095030; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=33095030]").text(description); $(".js-view-count[data-work-id=33095030]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 33095030; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='33095030']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 33095030, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=33095030]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":33095030,"title":"Bankruptcy by catastrophes for major multi-nationals: stock exchange sensitivity for three catastrophes","translated_title":"","metadata":{},"translated_abstract":null,"internal_url":"https://www.academia.edu/33095030/Bankruptcy_by_catastrophes_for_major_multi_nationals_stock_exchange_sensitivity_for_three_catastrophes","translated_internal_url":"","created_at":"2017-05-19T04:21:57.185-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":37932251,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Bankruptcy_by_catastrophes_for_major_multi_nationals_stock_exchange_sensitivity_for_three_catastrophes","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":37932251,"first_name":"Coen","middle_initials":null,"last_name":"Gulijk","page_name":"CoenGulijk","domain_name":"hud","created_at":"2015-11-09T01:46:39.427-08:00","display_name":"Coen Gulijk","url":"https://hud.academia.edu/CoenGulijk"},"attachments":[],"research_interests":[],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="33095029"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/33095029/Participant_Observation_in_Risk_Problems"><img alt="Research paper thumbnail of Participant Observation in Risk Problems" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" rel="nofollow" href="https://www.academia.edu/33095029/Participant_Observation_in_Risk_Problems">Participant Observation in Risk Problems</a></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="33095029"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="33095029"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 33095029; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=33095029]").text(description); $(".js-view-count[data-work-id=33095029]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 33095029; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='33095029']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 33095029, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=33095029]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":33095029,"title":"Participant Observation in Risk Problems","translated_title":"","metadata":{},"translated_abstract":null,"internal_url":"https://www.academia.edu/33095029/Participant_Observation_in_Risk_Problems","translated_internal_url":"","created_at":"2017-05-19T04:21:57.030-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":37932251,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Participant_Observation_in_Risk_Problems","translated_slug":"","page_count":null,"language":"fr","content_type":"Work","owner":{"id":37932251,"first_name":"Coen","middle_initials":null,"last_name":"Gulijk","page_name":"CoenGulijk","domain_name":"hud","created_at":"2015-11-09T01:46:39.427-08:00","display_name":"Coen Gulijk","url":"https://hud.academia.edu/CoenGulijk"},"attachments":[],"research_interests":[{"id":51329,"name":"Triangulation","url":"https://www.academia.edu/Documents/in/Triangulation"},{"id":120024,"name":"Airport Security","url":"https://www.academia.edu/Documents/in/Airport_Security"},{"id":251886,"name":"Participant Observation","url":"https://www.academia.edu/Documents/in/Participant_Observation"},{"id":416537,"name":"Chemical Industry","url":"https://www.academia.edu/Documents/in/Chemical_Industry"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="33095028"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/33095028/A_paired_comparison_approach_to_improve_the_quantification_of_management_influences_in_air_transportation"><img alt="Research paper thumbnail of A paired comparison approach to improve the quantification of management influences in air transportation" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/33095028/A_paired_comparison_approach_to_improve_the_quantification_of_management_influences_in_air_transportation">A paired comparison approach to improve the quantification of management influences in air transportation</a></div><div class="wp-workCard_item"><span>Reliability Engineering & System Safety</span><span>, 2013</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">ABSTRACT This paper provides an approach to integrate management factors into risk analysis. The ...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">ABSTRACT This paper provides an approach to integrate management factors into risk analysis. The approach focuses on paired comparison quantification to differentiate and prioritize a set of management influences to reduce human or technical failure, and to quantify the size of different management influences on risk by combining it with Bayesian belief nets (BBN). The BBN model of Causal Modeling for Air Transport Safety (CATS) has been used as a case study. This approach enables better reflection in risk analysis of management functions as specific actions which can be taken by managers to maintain safety in safety critical activities.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="33095028"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="33095028"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 33095028; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=33095028]").text(description); $(".js-view-count[data-work-id=33095028]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 33095028; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='33095028']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 33095028, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=33095028]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":33095028,"title":"A paired comparison approach to improve the quantification of management influences in air transportation","translated_title":"","metadata":{"abstract":"ABSTRACT This paper provides an approach to integrate management factors into risk analysis. The approach focuses on paired comparison quantification to differentiate and prioritize a set of management influences to reduce human or technical failure, and to quantify the size of different management influences on risk by combining it with Bayesian belief nets (BBN). The BBN model of Causal Modeling for Air Transport Safety (CATS) has been used as a case study. This approach enables better reflection in risk analysis of management functions as specific actions which can be taken by managers to maintain safety in safety critical activities.","publication_date":{"day":null,"month":null,"year":2013,"errors":{}},"publication_name":"Reliability Engineering \u0026 System Safety"},"translated_abstract":"ABSTRACT This paper provides an approach to integrate management factors into risk analysis. The approach focuses on paired comparison quantification to differentiate and prioritize a set of management influences to reduce human or technical failure, and to quantify the size of different management influences on risk by combining it with Bayesian belief nets (BBN). The BBN model of Causal Modeling for Air Transport Safety (CATS) has been used as a case study. This approach enables better reflection in risk analysis of management functions as specific actions which can be taken by managers to maintain safety in safety critical activities.","internal_url":"https://www.academia.edu/33095028/A_paired_comparison_approach_to_improve_the_quantification_of_management_influences_in_air_transportation","translated_internal_url":"","created_at":"2017-05-19T04:21:56.911-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":37932251,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"A_paired_comparison_approach_to_improve_the_quantification_of_management_influences_in_air_transportation","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":37932251,"first_name":"Coen","middle_initials":null,"last_name":"Gulijk","page_name":"CoenGulijk","domain_name":"hud","created_at":"2015-11-09T01:46:39.427-08:00","display_name":"Coen Gulijk","url":"https://hud.academia.edu/CoenGulijk"},"attachments":[],"research_interests":[{"id":48,"name":"Engineering","url":"https://www.academia.edu/Documents/in/Engineering"},{"id":80414,"name":"Mathematical Sciences","url":"https://www.academia.edu/Documents/in/Mathematical_Sciences"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="33095027"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/33095027/Comparison_study_on_AIS_data_of_ship_traffic_behavior"><img alt="Research paper thumbnail of Comparison study on AIS data of ship traffic behavior" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/33095027/Comparison_study_on_AIS_data_of_ship_traffic_behavior">Comparison study on AIS data of ship traffic behavior</a></div><div class="wp-workCard_item"><span>Ocean Engineering</span><span>, 2015</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">ABSTRACT AIS (Automatic Identification System) data provides valuable input parameters in ship tr...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">ABSTRACT AIS (Automatic Identification System) data provides valuable input parameters in ship traffic simulation models for maritime risk analysis and the prevention of shipping accidents. This article reports on the detailed comparisons of AIS data analysis between a Dutch case and a Chinese case. This analysis focuses on restricted waterways to support inland waterway simulations, comparing the differences between a narrow waterway in the Netherlands (the Port of Rotterdam) and a wide one in China (wide waterway of Yangtze River close to the Su-Tong Bridge). It is shown that straightforward statistical distributions can be used to characterize lateral position, speed, heading and interval times for different types and sizes of ships. However, the distributions for different characteristics of ship behaviors differ significantly.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="33095027"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="33095027"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 33095027; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=33095027]").text(description); $(".js-view-count[data-work-id=33095027]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 33095027; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='33095027']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 33095027, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=33095027]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":33095027,"title":"Comparison study on AIS data of ship traffic behavior","translated_title":"","metadata":{"abstract":"ABSTRACT AIS (Automatic Identification System) data provides valuable input parameters in ship traffic simulation models for maritime risk analysis and the prevention of shipping accidents. This article reports on the detailed comparisons of AIS data analysis between a Dutch case and a Chinese case. This analysis focuses on restricted waterways to support inland waterway simulations, comparing the differences between a narrow waterway in the Netherlands (the Port of Rotterdam) and a wide one in China (wide waterway of Yangtze River close to the Su-Tong Bridge). It is shown that straightforward statistical distributions can be used to characterize lateral position, speed, heading and interval times for different types and sizes of ships. However, the distributions for different characteristics of ship behaviors differ significantly.","publication_date":{"day":null,"month":null,"year":2015,"errors":{}},"publication_name":"Ocean Engineering"},"translated_abstract":"ABSTRACT AIS (Automatic Identification System) data provides valuable input parameters in ship traffic simulation models for maritime risk analysis and the prevention of shipping accidents. This article reports on the detailed comparisons of AIS data analysis between a Dutch case and a Chinese case. This analysis focuses on restricted waterways to support inland waterway simulations, comparing the differences between a narrow waterway in the Netherlands (the Port of Rotterdam) and a wide one in China (wide waterway of Yangtze River close to the Su-Tong Bridge). It is shown that straightforward statistical distributions can be used to characterize lateral position, speed, heading and interval times for different types and sizes of ships. However, the distributions for different characteristics of ship behaviors differ significantly.","internal_url":"https://www.academia.edu/33095027/Comparison_study_on_AIS_data_of_ship_traffic_behavior","translated_internal_url":"","created_at":"2017-05-19T04:21:56.806-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":37932251,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Comparison_study_on_AIS_data_of_ship_traffic_behavior","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":37932251,"first_name":"Coen","middle_initials":null,"last_name":"Gulijk","page_name":"CoenGulijk","domain_name":"hud","created_at":"2015-11-09T01:46:39.427-08:00","display_name":"Coen Gulijk","url":"https://hud.academia.edu/CoenGulijk"},"attachments":[],"research_interests":[{"id":73,"name":"Civil Engineering","url":"https://www.academia.edu/Documents/in/Civil_Engineering"},{"id":81,"name":"Ocean Engineering","url":"https://www.academia.edu/Documents/in/Ocean_Engineering"},{"id":471104,"name":"Maritime Engineering","url":"https://www.academia.edu/Documents/in/Maritime_Engineering"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> </div><div class="profile--tab_content_container js-tab-pane tab-pane" data-section-id="6885769" id="drafts"><div class="js-work-strip profile--work_container" data-work-id="32649445"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/32649445/Taal_en_veiligheid_een_groeiend_nieuw_werkveld"><img alt="Research paper thumbnail of Taal en veiligheid: een groeiend nieuw werkveld" class="work-thumbnail" src="https://attachments.academia-assets.com/54571340/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/32649445/Taal_en_veiligheid_een_groeiend_nieuw_werkveld">Taal en veiligheid: een groeiend nieuw werkveld</a></div><div class="wp-workCard_item wp-workCard--coauthors"><span>by </span><span><a class="" data-click-track="profile-work-strip-authors" href="https://independent.academia.edu/Lindhout">Paul Lindhout</a>, <a class="" data-click-track="profile-work-strip-authors" href="https://independent.academia.edu/PaulHerfs">Paul Herfs</a>, <a class="" data-click-track="profile-work-strip-authors" href="https://tudelft.academia.edu/BALE">BEN ALE</a>, <a class="" data-click-track="profile-work-strip-authors" href="https://hud.academia.edu/CoenGulijk">Coen Gulijk</a>, <a class="" data-click-track="profile-work-strip-authors" href="https://independent.academia.edu/MoniqueChambon">Monique Chambon</a>, and <a class="" data-click-track="profile-work-strip-authors" href="https://independent.academia.edu/JeannettePaul">Jeannette Paul</a></span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Samenvatting Taalproblemen veroorzaken onveiligheid op het werk. Deze studie inventariseert welk ...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Samenvatting Taalproblemen veroorzaken onveiligheid op het werk. Deze studie inventariseert welk wetenschappelijk onderzoek in een aantal economische sectoren is gedaan en welk stadium van risico beheersing zij behandelen. Niet in alle sectoren is onderzoek gedaan naar taalproblemen als ongeval oorzaak. Het risico door taalproblemen is daarmee deels onbekend en dus onbeheerst. Inzicht ontbreekt in zowel de aard van dit type gevaar als in de omvang van het effect in de zorg-, agro-, transport-en de bouwsector. De zorg sector is een bijzonder geval omdat daar door aanwezigheid en interactie van en met pati毛nten slachtoffers van ongevallen door taalproblemen te verwachten zijn. In de transport en diensten sector speelt een vergelijkbaar registratieprobleem met slachtoffers onder het publiek. In de transport-en agro sectoren zijn maatregelen genomen zonder analyse van het risico. Deze studie laat zien dat wetenschappelijk onderzoek naar 'taal en veiligheid' nog pril is en meer aandacht op de wetenschappelijke onderzoeksagenda verdient. Abstract Language issues cause safety problems at work. This study presents an inventory of scientific studies in the economic sectors and assesses which level of risk management they address. Complications with language have not been investigated comprehensively across sectors as a causal factor in accidents. This leaves language related risks partially unknown, hence uncontrolled. There is lack of insight in both the nature and magnitude of this danger in healthcare, agricultural, transport and construction sectors. Healthcare is especially troublesome since patients might be victims of language related accidents due to their presence and interaction. The same may occur to members of the public in traffic accidents. In transport and agricultural sectors safety measures were taken without any analysis of language related risks. This study shows that scientific research on 'language and safety' is in its infancy and requires priority on the research agenda.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="69936e8ab2dc77b2680af38e64392e36" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":54571340,"asset_id":32649445,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/54571340/download_file?st=MTczMjc5NjgxNyw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="32649445"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="32649445"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 32649445; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=32649445]").text(description); $(".js-view-count[data-work-id=32649445]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 32649445; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='32649445']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 32649445, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "69936e8ab2dc77b2680af38e64392e36" } } $('.js-work-strip[data-work-id=32649445]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":32649445,"title":"Taal en veiligheid: een groeiend nieuw werkveld","translated_title":"","metadata":{"abstract":"Samenvatting Taalproblemen veroorzaken onveiligheid op het werk. Deze studie inventariseert welk wetenschappelijk onderzoek in een aantal economische sectoren is gedaan en welk stadium van risico beheersing zij behandelen. Niet in alle sectoren is onderzoek gedaan naar taalproblemen als ongeval oorzaak. Het risico door taalproblemen is daarmee deels onbekend en dus onbeheerst. Inzicht ontbreekt in zowel de aard van dit type gevaar als in de omvang van het effect in de zorg-, agro-, transport-en de bouwsector. De zorg sector is een bijzonder geval omdat daar door aanwezigheid en interactie van en met pati毛nten slachtoffers van ongevallen door taalproblemen te verwachten zijn. In de transport en diensten sector speelt een vergelijkbaar registratieprobleem met slachtoffers onder het publiek. In de transport-en agro sectoren zijn maatregelen genomen zonder analyse van het risico. Deze studie laat zien dat wetenschappelijk onderzoek naar 'taal en veiligheid' nog pril is en meer aandacht op de wetenschappelijke onderzoeksagenda verdient. Abstract Language issues cause safety problems at work. This study presents an inventory of scientific studies in the economic sectors and assesses which level of risk management they address. Complications with language have not been investigated comprehensively across sectors as a causal factor in accidents. This leaves language related risks partially unknown, hence uncontrolled. There is lack of insight in both the nature and magnitude of this danger in healthcare, agricultural, transport and construction sectors. Healthcare is especially troublesome since patients might be victims of language related accidents due to their presence and interaction. The same may occur to members of the public in traffic accidents. In transport and agricultural sectors safety measures were taken without any analysis of language related risks. This study shows that scientific research on 'language and safety' is in its infancy and requires priority on the research agenda."},"translated_abstract":"Samenvatting Taalproblemen veroorzaken onveiligheid op het werk. Deze studie inventariseert welk wetenschappelijk onderzoek in een aantal economische sectoren is gedaan en welk stadium van risico beheersing zij behandelen. Niet in alle sectoren is onderzoek gedaan naar taalproblemen als ongeval oorzaak. Het risico door taalproblemen is daarmee deels onbekend en dus onbeheerst. Inzicht ontbreekt in zowel de aard van dit type gevaar als in de omvang van het effect in de zorg-, agro-, transport-en de bouwsector. De zorg sector is een bijzonder geval omdat daar door aanwezigheid en interactie van en met pati毛nten slachtoffers van ongevallen door taalproblemen te verwachten zijn. In de transport en diensten sector speelt een vergelijkbaar registratieprobleem met slachtoffers onder het publiek. In de transport-en agro sectoren zijn maatregelen genomen zonder analyse van het risico. Deze studie laat zien dat wetenschappelijk onderzoek naar 'taal en veiligheid' nog pril is en meer aandacht op de wetenschappelijke onderzoeksagenda verdient. Abstract Language issues cause safety problems at work. This study presents an inventory of scientific studies in the economic sectors and assesses which level of risk management they address. Complications with language have not been investigated comprehensively across sectors as a causal factor in accidents. This leaves language related risks partially unknown, hence uncontrolled. There is lack of insight in both the nature and magnitude of this danger in healthcare, agricultural, transport and construction sectors. Healthcare is especially troublesome since patients might be victims of language related accidents due to their presence and interaction. The same may occur to members of the public in traffic accidents. In transport and agricultural sectors safety measures were taken without any analysis of language related risks. This study shows that scientific research on 'language and safety' is in its infancy and requires priority on the research agenda.","internal_url":"https://www.academia.edu/32649445/Taal_en_veiligheid_een_groeiend_nieuw_werkveld","translated_internal_url":"","created_at":"2017-04-25T10:15:05.532-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":38555712,"coauthors_can_edit":true,"document_type":"draft","co_author_tags":[{"id":28650234,"work_id":32649445,"tagging_user_id":38555712,"tagged_user_id":38772002,"co_author_invite_id":null,"email":"p***s@uu.nl","display_order":2,"name":"Paul Herfs","title":"Taal en veiligheid: een groeiend nieuw werkveld"},{"id":28650235,"work_id":32649445,"tagging_user_id":38555712,"tagged_user_id":193279456,"co_author_invite_id":6244481,"email":"b***e@xs4all.nl","affiliation":"Delft University of Technology","display_order":3,"name":"BEN ALE","title":"Taal en veiligheid: een groeiend nieuw werkveld"},{"id":28650236,"work_id":32649445,"tagging_user_id":38555712,"tagged_user_id":37932251,"co_author_invite_id":null,"email":"c***k@hud.ac.uk","affiliation":"University of Huddersfield","display_order":4,"name":"Coen Gulijk","title":"Taal en veiligheid: een groeiend nieuw werkveld"},{"id":28650237,"work_id":32649445,"tagging_user_id":38555712,"tagged_user_id":32979315,"co_author_invite_id":null,"email":"p***e@tudelft.nl","affiliation":"Delft University of Technology","display_order":5,"name":"Paul Swuste","title":"Taal en veiligheid: een groeiend nieuw werkveld"},{"id":28650238,"work_id":32649445,"tagging_user_id":38555712,"tagged_user_id":63796382,"co_author_invite_id":6244482,"email":"m***n@rivm.nl","display_order":6,"name":"Monique Chambon","title":"Taal en veiligheid: een groeiend nieuw werkveld"},{"id":28650239,"work_id":32649445,"tagging_user_id":38555712,"tagged_user_id":65159050,"co_author_invite_id":6244483,"email":"j***l@vonkenendoen.nl","display_order":7,"name":"Jeannette Paul","title":"Taal en veiligheid: een groeiend nieuw werkveld"},{"id":28650240,"work_id":32649445,"tagging_user_id":38555712,"tagged_user_id":null,"co_author_invite_id":6244484,"email":"v***r@rivm.nl","display_order":8,"name":"Viola van Guldener","title":"Taal en veiligheid: een groeiend nieuw werkveld"},{"id":37276147,"work_id":32649445,"tagging_user_id":38772002,"tagged_user_id":81218851,"co_author_invite_id":null,"email":"t***9@gmail.com","affiliation":"Vrije Universiteit Amsterdam","display_order":4194308,"name":"Truus Teunissen","title":"Taal en veiligheid: een groeiend nieuw werkveld"}],"downloadable_attachments":[{"id":54571340,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/54571340/thumbnails/1.jpg","file_name":"46_Lindhout_et_al_2017_Taal_en_Veiligheid_een_groeiend_nieuw_werkveld_TtA_2017-02_Full_paper_.pdf","download_url":"https://www.academia.edu/attachments/54571340/download_file?st=MTczMjc5NjgxNyw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Taal_en_veiligheid_een_groeiend_nieuw_we.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/54571340/46_Lindhout_et_al_2017_Taal_en_Veiligheid_een_groeiend_nieuw_werkveld_TtA_2017-02_Full_paper_-libre.pdf?1506674082=\u0026response-content-disposition=attachment%3B+filename%3DTaal_en_veiligheid_een_groeiend_nieuw_we.pdf\u0026Expires=1732800417\u0026Signature=c-7HJ0x4m-vDkkMxOeWOQHaCL6KnViwl5X7s9acw~Z5uvSa7~9XqDFLpor9Si7~nS2IMU4JLBnP2MxaT~gGdoFSHFdObsSTA8D47NKVWX0fXcZWGcmeaCmeXyxZ4AKrWfqsZtZnlp3GZLRCF38JyP7HwyJk0HHfGgBErRJo3zE~W3iX150jr32CNj4goDQ3zxXr4WyYxoLe3U1K0-FTfTxqcQviw3RHUTsF1aaqU7boAtXpk7I8JX7cjVa~M2Xobo5uY~cMIQsxziSkhwI1-d5sLF4Iwnc5TEzagVLetWFCnzNpG9kq~jjddXUcYwPksYZYvgsSOuelk2Sea2Uk5IA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Taal_en_veiligheid_een_groeiend_nieuw_werkveld","translated_slug":"","page_count":12,"language":"nl","content_type":"Work","owner":{"id":38555712,"first_name":"Paul","middle_initials":null,"last_name":"Lindhout","page_name":"Lindhout","domain_name":"independent","created_at":"2015-11-17T11:14:38.513-08:00","display_name":"Paul Lindhout","url":"https://independent.academia.edu/Lindhout"},"attachments":[{"id":54571340,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/54571340/thumbnails/1.jpg","file_name":"46_Lindhout_et_al_2017_Taal_en_Veiligheid_een_groeiend_nieuw_werkveld_TtA_2017-02_Full_paper_.pdf","download_url":"https://www.academia.edu/attachments/54571340/download_file?st=MTczMjc5NjgxNyw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Taal_en_veiligheid_een_groeiend_nieuw_we.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/54571340/46_Lindhout_et_al_2017_Taal_en_Veiligheid_een_groeiend_nieuw_werkveld_TtA_2017-02_Full_paper_-libre.pdf?1506674082=\u0026response-content-disposition=attachment%3B+filename%3DTaal_en_veiligheid_een_groeiend_nieuw_we.pdf\u0026Expires=1732800417\u0026Signature=c-7HJ0x4m-vDkkMxOeWOQHaCL6KnViwl5X7s9acw~Z5uvSa7~9XqDFLpor9Si7~nS2IMU4JLBnP2MxaT~gGdoFSHFdObsSTA8D47NKVWX0fXcZWGcmeaCmeXyxZ4AKrWfqsZtZnlp3GZLRCF38JyP7HwyJk0HHfGgBErRJo3zE~W3iX150jr32CNj4goDQ3zxXr4WyYxoLe3U1K0-FTfTxqcQviw3RHUTsF1aaqU7boAtXpk7I8JX7cjVa~M2Xobo5uY~cMIQsxziSkhwI1-d5sLF4Iwnc5TEzagVLetWFCnzNpG9kq~jjddXUcYwPksYZYvgsSOuelk2Sea2Uk5IA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":67366,"name":"Occupational health and safety","url":"https://www.academia.edu/Documents/in/Occupational_health_and_safety-2"},{"id":339087,"name":"Language Issues","url":"https://www.academia.edu/Documents/in/Language_Issues"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> </div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/google_contacts-0dfb882d836b94dbcb4a2d123d6933fc9533eda5be911641f20b4eb428429600.js"], function() { // from javascript_helper.rb $('.js-google-connect-button').click(function(e) { e.preventDefault(); GoogleContacts.authorize_and_show_contacts(); Aedu.Dismissibles.recordClickthrough("WowProfileImportContactsPrompt"); }); $('.js-update-biography-button').click(function(e) { e.preventDefault(); Aedu.Dismissibles.recordClickthrough("UpdateUserBiographyPrompt"); $.ajax({ url: $r.api_v0_profiles_update_about_path({ subdomain_param: 'api', about: "", }), type: 'PUT', success: function(response) { location.reload(); } }); }); $('.js-work-creator-button').click(function (e) { e.preventDefault(); window.location = $r.upload_funnel_document_path({ source: encodeURIComponent(""), }); }); $('.js-video-upload-button').click(function (e) { e.preventDefault(); window.location = $r.upload_funnel_video_path({ source: encodeURIComponent(""), }); }); $('.js-do-this-later-button').click(function() { $(this).closest('.js-profile-nag-panel').remove(); Aedu.Dismissibles.recordDismissal("WowProfileImportContactsPrompt"); }); $('.js-update-biography-do-this-later-button').click(function(){ $(this).closest('.js-profile-nag-panel').remove(); Aedu.Dismissibles.recordDismissal("UpdateUserBiographyPrompt"); }); $('.wow-profile-mentions-upsell--close').click(function(){ $('.wow-profile-mentions-upsell--panel').hide(); Aedu.Dismissibles.recordDismissal("WowProfileMentionsUpsell"); }); $('.wow-profile-mentions-upsell--button').click(function(){ Aedu.Dismissibles.recordClickthrough("WowProfileMentionsUpsell"); }); new WowProfile.SocialRedesignUserWorks({ initialWorksOffset: 20, allWorksOffset: 20, maxSections: 2 }) }); </script> </div></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile_edit-5ea339ee107c863779f560dd7275595239fed73f1a13d279d2b599a28c0ecd33.js","https://a.academia-assets.com/assets/add_coauthor-22174b608f9cb871d03443cafa7feac496fb50d7df2d66a53f5ee3c04ba67f53.js","https://a.academia-assets.com/assets/tab-dcac0130902f0cc2d8cb403714dd47454f11fc6fb0e99ae6a0827b06613abc20.js","https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js"], function() { // from javascript_helper.rb window.ae = window.ae || {}; window.ae.WowProfile = window.ae.WowProfile || {}; if(Aedu.User.current && Aedu.User.current.id === $viewedUser.id) { window.ae.WowProfile.current_user_edit = {}; new WowProfileEdit.EditUploadView({ el: '.js-edit-upload-button-wrapper', model: window.$current_user, }); new AddCoauthor.AddCoauthorsController(); } var userInfoView = new WowProfile.SocialRedesignUserInfo({ recaptcha_key: "6LdxlRMTAAAAADnu_zyLhLg0YF9uACwz78shpjJB" }); WowProfile.router = new WowProfile.Router({ userInfoView: userInfoView }); Backbone.history.start({ pushState: true, root: "/" + $viewedUser.page_name }); new WowProfile.UserWorksNav() }); </script> </div> <div class="bootstrap login"><div class="modal fade login-modal" id="login-modal"><div class="login-modal-dialog modal-dialog"><div class="modal-content"><div class="modal-header"><button class="close close" data-dismiss="modal" type="button"><span aria-hidden="true">×</span><span class="sr-only">Close</span></button><h4 class="modal-title text-center"><strong>Log In</strong></h4></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><button class="btn btn-fb btn-lg btn-block btn-v-center-content" id="login-facebook-oauth-button"><svg style="float: left; width: 19px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="facebook-square" class="svg-inline--fa fa-facebook-square fa-w-14" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M400 32H48A48 48 0 0 0 0 80v352a48 48 0 0 0 48 48h137.25V327.69h-63V256h63v-54.64c0-62.15 37-96.48 93.67-96.48 27.14 0 55.52 4.84 55.52 4.84v61h-31.27c-30.81 0-40.42 19.12-40.42 38.73V256h68.78l-11 71.69h-57.78V480H400a48 48 0 0 0 48-48V80a48 48 0 0 0-48-48z"></path></svg><small><strong>Log in</strong> with <strong>Facebook</strong></small></button><br /><button class="btn btn-google btn-lg btn-block btn-v-center-content" id="login-google-oauth-button"><svg style="float: left; width: 22px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="google-plus" class="svg-inline--fa fa-google-plus fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M256,8C119.1,8,8,119.1,8,256S119.1,504,256,504,504,392.9,504,256,392.9,8,256,8ZM185.3,380a124,124,0,0,1,0-248c31.3,0,60.1,11,83,32.3l-33.6,32.6c-13.2-12.9-31.3-19.1-49.4-19.1-42.9,0-77.2,35.5-77.2,78.1S142.3,334,185.3,334c32.6,0,64.9-19.1,70.1-53.3H185.3V238.1H302.2a109.2,109.2,0,0,1,1.9,20.7c0,70.8-47.5,121.2-118.8,121.2ZM415.5,273.8v35.5H380V273.8H344.5V238.3H380V202.8h35.5v35.5h35.2v35.5Z"></path></svg><small><strong>Log in</strong> with <strong>Google</strong></small></button><br /><style type="text/css">.sign-in-with-apple-button { width: 100%; height: 52px; border-radius: 3px; border: 1px solid black; cursor: pointer; }</style><script src="https://appleid.cdn-apple.com/appleauth/static/jsapi/appleid/1/en_US/appleid.auth.js" type="text/javascript"></script><div class="sign-in-with-apple-button" data-border="false" data-color="white" id="appleid-signin"><span ="Sign Up with Apple" class="u-fs11"></span></div><script>AppleID.auth.init({ clientId: 'edu.academia.applesignon', scope: 'name email', redirectURI: 'https://www.academia.edu/sessions', state: "53dd582237f877504559c3c4884ff3c7ed5cf3d5b1c6c41bf324ae90315b513b", });</script><script>// Hacky way of checking if on fast loswp if (window.loswp == null) { (function() { const Google = window?.Aedu?.Auth?.OauthButton?.Login?.Google; const Facebook = window?.Aedu?.Auth?.OauthButton?.Login?.Facebook; if (Google) { new Google({ el: '#login-google-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } if (Facebook) { new Facebook({ el: '#login-facebook-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } })(); }</script></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><div class="hr-heading login-hr-heading"><span class="hr-heading-text">or</span></div></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><form class="js-login-form" action="https://www.academia.edu/sessions" accept-charset="UTF-8" method="post"><input name="utf8" type="hidden" value="✓" autocomplete="off" /><input type="hidden" name="authenticity_token" value="0/c9Mc0OsaX15CtDJTDrcQw5G4KEuGCW+jcjIe1ETDjej1q6bNBto7p5+UXCyVF5Qodqyy8KBvYDtr2XbgZqGQ==" autocomplete="off" /><div class="form-group"><label class="control-label" for="login-modal-email-input" style="font-size: 14px;">Email</label><input class="form-control" id="login-modal-email-input" name="login" type="email" /></div><div class="form-group"><label class="control-label" for="login-modal-password-input" style="font-size: 14px;">Password</label><input class="form-control" id="login-modal-password-input" name="password" type="password" /></div><input type="hidden" name="post_login_redirect_url" id="post_login_redirect_url" value="https://hud.academia.edu/CoenGulijk" autocomplete="off" /><div class="checkbox"><label><input type="checkbox" name="remember_me" id="remember_me" value="1" checked="checked" /><small style="font-size: 12px; margin-top: 2px; display: inline-block;">Remember me on this computer</small></label></div><br><input type="submit" name="commit" value="Log In" class="btn btn-primary btn-block btn-lg js-login-submit" data-disable-with="Log In" /></br></form><script>typeof window?.Aedu?.recaptchaManagedForm === 'function' && window.Aedu.recaptchaManagedForm( document.querySelector('.js-login-form'), document.querySelector('.js-login-submit') );</script><small style="font-size: 12px;"><br />or <a data-target="#login-modal-reset-password-container" data-toggle="collapse" href="javascript:void(0)">reset password</a></small><div class="collapse" id="login-modal-reset-password-container"><br /><div class="well margin-0x"><form class="js-password-reset-form" action="https://www.academia.edu/reset_password" accept-charset="UTF-8" method="post"><input name="utf8" type="hidden" value="✓" autocomplete="off" /><input type="hidden" name="authenticity_token" value="0dFvFL7sbSWNJRV5GhbBX6n2c4i903zJDFmpLU28ObncqQifHzKxI8K4x3/973tX50gCwRZhGqn12Debzv4fmA==" autocomplete="off" /><p>Enter the email address you signed up with and we'll email you a reset link.</p><div class="form-group"><input class="form-control" name="email" type="email" /></div><script src="https://recaptcha.net/recaptcha/api.js" async defer></script> <script> var invisibleRecaptchaSubmit = function () { var closestForm = function (ele) { var curEle = ele.parentNode; while (curEle.nodeName !== 'FORM' && curEle.nodeName !== 'BODY'){ curEle = curEle.parentNode; } return curEle.nodeName === 'FORM' ? curEle : null }; var eles = document.getElementsByClassName('g-recaptcha'); if (eles.length > 0) { var form = closestForm(eles[0]); if (form) { form.submit(); } } }; </script> <input type="submit" data-sitekey="6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj" data-callback="invisibleRecaptchaSubmit" class="g-recaptcha btn btn-primary btn-block" value="Email me a link" value=""/> </form></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/collapse-45805421cf446ca5adf7aaa1935b08a3a8d1d9a6cc5d91a62a2a3a00b20b3e6a.js"], function() { // from javascript_helper.rb $("#login-modal-reset-password-container").on("shown.bs.collapse", function() { $(this).find("input[type=email]").focus(); }); }); </script> </div></div></div><div class="modal-footer"><div class="text-center"><small style="font-size: 12px;">Need an account? <a rel="nofollow" href="https://www.academia.edu/signup">Click here to sign up</a></small></div></div></div></div></div></div><script>// If we are on subdomain or non-bootstrapped page, redirect to login page instead of showing modal (function(){ if (typeof $ === 'undefined') return; var host = window.location.hostname; if ((host === $domain || host === "www."+$domain) && (typeof $().modal === 'function')) { $("#nav_log_in").click(function(e) { // Don't follow the link and open the modal e.preventDefault(); $("#login-modal").on('shown.bs.modal', function() { $(this).find("#login-modal-email-input").focus() }).modal('show'); }); } })()</script> <div class="bootstrap" id="footer"><div class="footer-content clearfix text-center padding-top-7x" style="width:100%;"><ul class="footer-links-secondary footer-links-wide list-inline margin-bottom-1x"><li><a href="https://www.academia.edu/about">About</a></li><li><a href="https://www.academia.edu/press">Press</a></li><li><a rel="nofollow" href="https://medium.com/academia">Blog</a></li><li><a href="https://www.academia.edu/documents">Papers</a></li><li><a href="https://www.academia.edu/topics">Topics</a></li><li><a href="https://www.academia.edu/journals">Academia.edu Journals</a></li><li><a rel="nofollow" href="https://www.academia.edu/hiring"><svg style="width: 13px; height: 13px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="briefcase" class="svg-inline--fa fa-briefcase fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M320 336c0 8.84-7.16 16-16 16h-96c-8.84 0-16-7.16-16-16v-48H0v144c0 25.6 22.4 48 48 48h416c25.6 0 48-22.4 48-48V288H320v48zm144-208h-80V80c0-25.6-22.4-48-48-48H176c-25.6 0-48 22.4-48 48v48H48c-25.6 0-48 22.4-48 48v80h512v-80c0-25.6-22.4-48-48-48zm-144 0H192V96h128v32z"></path></svg> <strong>We're Hiring!</strong></a></li><li><a rel="nofollow" href="https://support.academia.edu/"><svg style="width: 12px; height: 12px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="question-circle" class="svg-inline--fa fa-question-circle fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M504 256c0 136.997-111.043 248-248 248S8 392.997 8 256C8 119.083 119.043 8 256 8s248 111.083 248 248zM262.655 90c-54.497 0-89.255 22.957-116.549 63.758-3.536 5.286-2.353 12.415 2.715 16.258l34.699 26.31c5.205 3.947 12.621 3.008 16.665-2.122 17.864-22.658 30.113-35.797 57.303-35.797 20.429 0 45.698 13.148 45.698 32.958 0 14.976-12.363 22.667-32.534 33.976C247.128 238.528 216 254.941 216 296v4c0 6.627 5.373 12 12 12h56c6.627 0 12-5.373 12-12v-1.333c0-28.462 83.186-29.647 83.186-106.667 0-58.002-60.165-102-116.531-102zM256 338c-25.365 0-46 20.635-46 46 0 25.364 20.635 46 46 46s46-20.636 46-46c0-25.365-20.635-46-46-46z"></path></svg> <strong>Help Center</strong></a></li></ul><ul class="footer-links-tertiary list-inline margin-bottom-1x"><li class="small">Find new research papers in:</li><li class="small"><a href="https://www.academia.edu/Documents/in/Physics">Physics</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Chemistry">Chemistry</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Biology">Biology</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Health_Sciences">Health Sciences</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Ecology">Ecology</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Earth_Sciences">Earth Sciences</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Cognitive_Science">Cognitive Science</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Mathematics">Mathematics</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a></li></ul></div></div><div class="DesignSystem" id="credit" style="width:100%;"><ul class="u-pl0x footer-links-legal list-inline"><li><a rel="nofollow" href="https://www.academia.edu/terms">Terms</a></li><li><a rel="nofollow" href="https://www.academia.edu/privacy">Privacy</a></li><li><a rel="nofollow" href="https://www.academia.edu/copyright">Copyright</a></li><li>Academia ©2024</li></ul></div><script> //<![CDATA[ window.detect_gmtoffset = true; window.Academia && window.Academia.set_gmtoffset && Academia.set_gmtoffset('/gmtoffset'); //]]> </script> <div id='overlay_background'></div> <div id='bootstrap-modal-container' class='bootstrap'></div> <div id='ds-modal-container' class='bootstrap DesignSystem'></div> <div id='full-screen-modal'></div> </div> </body> </html>