Lifting Equation in Ergonomics Risk Assessment

Introduction

The assessment tool chosen for this paper is the NIOSH Lifting Equation for Single Tasks. This tool is often used by occupational health and safety professionals for assessing manual material handling risks associated with lifting and lowering tasks in the workplace (Middlesworth, n.d.b, para. 1). In order to use the NIOSH equation, it is imperative to follow these steps:

  • Determining task variables is required. The job task of lifting consists of a starting point (origin) and the ending point (destination) (Middlesworth, n.d.b).
  • Measuring and recording task variables, which include the horizontal distance at the origin of the lift and the horizontal distance at the destination, the height of the lift origins and the height of the lift at the destination, the travel distance between the origin and destination, etc. (Middlesworth, n.d.b).
  • Conducting a risk assessment using the NIOSH lifting equation calculator.

When using the NIOSH lifting equation calculator in a specific system, no adaptations should be made. The system chosen for the analysis is the warehouse of a large aircraft parts manufacturer. The assessment tool was selected for identifying any possible risks associated with manual handling of stored products. It is expected that the usage of the assessment tool will subsequently reduce the identified risks and allow the employees of the warehouse to exercise their full potential.

System Description

The warehouse chosen for the ergonomic risk assessment is a commercial building that an aircraft parts manufacturer uses for the storage of goods. It has both manual handling systems that include human workers (for smaller parts) and automated systems for handling larger parts. For warehouse management, workers use Windward System Five, which is complete Inventory Management Software designed for tracking, increasing productivity, and reducing the flow of paper documentation (Windward Software, 2017). The environmental characteristics of the manufacturers warehouse are the following:

  • Indoor facility in a rural area, equipped with a large parking lot for enhanced logistics;
  • Bright lighting to ensure visibility at all times of the day;
  • Preservation of the same temperature inside the warehouse to ensure staffs comfort;
  • Low noise levels due to the rural location.

The key task of the warehouse is associated with the smooth operation of the supply chain that ends with delivering the desired product to its customers.

Current Controls for Reducing Ergonomic Risks

Currently, the warehouse implements solutions for Workplace Evaluations of Musculoskeletal Disorders Outlined by NIOSH, Ergonomic Guidelines for Manual Material Handling, and Solutions for the Prevention of Musculoskeletal Injuries. Moreover, the management focuses on following the hierarchy of controls over musculoskeletal disorders, which consists of elimination, equipment change, job rotation & schedule, work instruction & coaching, and other measures (Humantech, Inc., 2016). The introduction of the NIOSH Lifting Equation for Lifting and Lowering Tasks will become a useful contribution to the workplace program targeted at the prevention of work-related musculoskeletal disorders among the workers of the warehouse (Centers for Disease Control and Prevention, 2014).

Findings: Pros and Cons

If to mention the positive points of ergonomic risk management in the warehouse, it is important to state that the overall environment can be considered as positive for the work of employees. Moreover, the integration of automated tools allows employees to perform less manual tasks when handling large and heavy objects. On the other hand, a storage warehouse is a stressful environment where employees are forced to perform tasks as quickly as possible in order to meet the established deadlines. Such pressure can lead to traumas associated with lifting and handling goods.

Recommendations

In order to mitigate the hazards of possible traumas, it is recommended to use the NIOSH Lifting Equation for Single Tasks for conducting risk assessments and developing a plan for their reduction. Reduction of workplace risk factors linked to lifting can be achieved through the following steps:

  • Reduction of awkward postures, highly repetitive motions, and forceful exertions (Middlesworth, n.d.a).
  • They are making sure that the members of the team are included in a pre-shift warm-up. The introduction of these work readiness systems will ensure that employees are physically ready for their lifting and lowering tasks in the warehouse.
  • They are ensuring appropriate body mechanics and work techniques. This step can be achieved by educating employees on how to use their body mechanics to avoid additional MSD hazards effectively.

Role of Stress and Fatigue

Different stressors, such as long duration of physical and mental effort, can have an adverse impact on the overall condition of employees (Reimann & Guzy, 2017). If they are not provided with adequate work conditions that account for their needs, it is highly likely that workers will experience increased stress and fatigue, especially when it comes to manual tasks. Climate, light, noise, and workstation design are all factors that can either increase or decrease the possibility of ergonomic risks.

Hazardous fatigue in a warehouse setting will decrease employees performance and lead to possible trauma due to lack of awareness, memory lapses, and absent-mindedness (HSE, n.d.). For this reason, it will be potentially beneficial to introduce the NIOSH Lifting Equation for Single Tasks to reduce workers fatigue and increase their operations.

References

Centers for Disease Control and Prevention. (2014). . Web.

HSE. (n.d.). . Web.

Humantech, Inc. (2016). Hierarchy of controls for musculoskeletal disorders. Web.

Middlesworth, M. (n.d.a). . Web.

Middlesworth, M. (n.d.b). . Web.

Reimann, M., & Guzy, J. (2017). Psychological contract breach and employee health: The relevance of unmet obligations for mental and physical health. Journal of Occupational and Organizational Psychology, 33(1), 1-11.

Windward Software. (2017). . Web.

Risk Assessment of Stickley Furniture Company

Stickley Furniture Company, based in Syracuse, New York was evaluated for its risk management practices based on utilitarian and deontological considerations. This company was selected because it deals with light and heavy machinery, used in its operations, from woodcutting, preparation, jointly, finishing, inventory and storage. The riskiest job in the factory is the management and running of the woodcutting machine that requires an employee to manually feed wood logs into the machine.

To reduce the risk of accidents associated with this job, Stickley management has made sure only skilled and trained employees work with the machine. Additionally, they have posted in bold letters on a wall next to the machine, rules governing the use of the machine. The first rule is that workers should make use of mechanical feeding whenever possible by the use of push sticks rather than hands. Secondly, only authorized employees should work with the machine. Thirdly, dangerous parts like cutters, saws, nips, and blades must be enclosed at all times. Fourthly, workers must be in protective gear involving gloves, helmets, masks, hearing protection, boots, eye shields, and workshop overalls at all times. Additionally, safety procedures must be followed and machines must be switched off when not in use. Machine operators must pay attention and not get distracted while working and should not work if fatigued. By interrogating the wood-cutting machine operators and observing them at work, it is evident that employees at Stickley are well informed of the risks involved.

The rules given by the company concerning the use and management of this machine are utilitarian (Waller, 2005). This is because by employees following these rules they will reduce the risks of getting wood and machine cuts and amputations, they avoid grazing, piercings, and gouging out of eyes. Moreover, these rules are utilitarian for they provide positive results to employees and the company, as they significantly reduce the risks of employees getting caught in rotating parts, and reduce the risk of having sharp wood pieces flying in the workshop. Moreover, by having unused parts covered at all times, they reduce the risk of amputations, cuts, and even death caused by the sudden movement of parts. Lastly, employees that follow these rules enjoy positive utilitarian results, for they significantly reduce the risk of getting their hands chopped off when they feed wood with a push stick rather than their hands. The company also reduces the cost of running, in terms of medical payments arising from accidents, while employees enjoy a healthy working environment.

Taking into consideration the business function of the company and the risks involved in their workshop, Stickley furniture must have a deontological moral duty to protect employees from risks (Waller, 2005). Towards this, the company has dutifully made sure only skilled employees work with machines. Employees are only allowed to work with the wood cutting machine after they have been trained adequately. The company provides safety gear, protective clothing, emergence aid, and healthcare for employees. The company also adheres to the governments occupational health and safety standards for woodwork.

In conclusion, by deontological ethics, the company has dutifully done its moral duty in protecting employees from risks of injury and death from the wood cutting machine. Additionally, by utilitarian ethics, since employees understand and follow laid down rules, they enjoy the benefits of reduced injury while the company has lower medical costs. Therefore, by deontological and utilitarian principles, the risks involved with the wood cutting machine are acceptable and reasonable.

Reference

Waller, B.N. (2005). Consider Ethics: Theory, Readings, and Contemporary Issues. New York: Pearson Longman.

Risk Assessment Options

Over the past three decades, the religious ministry has transitioned to become an integral aspect among most individuals worldwide. More specifically, many people, irrespective of their differences, including age, race, and social status, view the global sports ministry as a crucial societal aspect. It causes several governments and private entities tend to recognize the importance and utilize the sports ministry to advance positive societal components in respective governments and religions. Nonetheless, taking part in the global sports ministry presents significant risks that ought to be addressed with practical strategies.

One essential risk involved with global sports ministry is cross-cultural problems in the host country. According to Plueddemann (2012), cross-cultural risk is a notable aspect that could potentially arise as a result of differences in lifestyles, languages, habits, and customs. This crucial risk can significantly affect the global sports ministry process, particularly in the international environment. The risk could come up because different international countries have different practices that might affect it in general.

Another essential threat involved in taking part in the global sports ministry is political challenges. In most cases, this political concern occurs when the government of a nation unexpectedly alters its primary policies. The changes in policies could negatively affect the global sports ministry as a foreign entity. The changes may adopt different instances such as religious or sports barriers that could serve to either prevent or limit the sports ministrys global activities in a given host country. This risk is made more complex by different countries opting to consider the removal of free-trade agreements in the sports sector. Therefore, this demonstrates that political risk is a notable concern in the global sports ministry that should be considered.

One strategy to lessen the risks involved with taking part in the global sports ministry is having diverse knowledge of all the customs and cultures of the potential host country. When entering new regions in the global sports ministry, it could be effective to learn the target nations leading business and cultural elements in advance. Plueddemann (2012) points out that this ought to be considered in conventions of interpersonal interactions among the locals.

For example, consultant experts of the sports ministry could be utilized to review the primary features of the nations culture. Consultant experts would address cultural risks since the sports ministry will have a good understanding of the culture and how it could potentially risk the process. As a result, consulting an intercultural coach in advance will lessen the risk and provide a good idea of the business to reduce cultural barriers.

Another strategy to lessen the risks, especially the political risk, is considering legal and religious regulations. Since most countries across the world have countless political particularities in the form of legal regulations, it is essential to scrutinize the regulations at all times.

Taking time to consider these legal regulations would help to prevent and minimize the political risks linked to the sports ministry. For example, the global sports ministry leaders could research contemporary situations of scale, relevant legal frameworks, and customs regulations in the sports, religious, and commerce sectors to understand all the risks that might present themselves. It is essential to consider all the details at all phases before drawing up contracts and scheming the hedging instruments involved. Therefore, this strategy presents the global sports ministry with a practical solution to address the issues associated with political and customs regulation.

Reference

Plueddemann, J. E. (2012). Leading across cultures: Effective ministry and mission in the global church. InterVarsity Press.

Villaggio Malls Risk Assessment

Acknowledgment

The concept of risk assessment seeks to identify possible hazards and define the level of threat and vulnerability of a specific location or enterprise. For public locations, risk assessment is a critical management aspect that ensures the safety of visitors, patrons, staff, and physical assets within the premises. This report will define fundamental risk assessment principles, provide reasons for carrying out assessments, and provide a practical analysis of the Villaggio Mall following basic guidelines.

Report Questions

  1. What are the basic principles of risk assessment?
  2. What are the reasons for risk assessment?
  3. What are the steps of risk assessment performance?
  4. How could the risk be mitigated?

Risk Assessment Principles

Risk assessment and management are used by organizations to control losses. It consists of identifying hazards or potential causes of dangerous situations in the environment, assessing the risks, and attempting to mitigate them to minimize consequences. Hazards are defined as any situation with potentially damaging outcomes, especially ones that might harm a human being. Examples include fires, smoke, chemicals, and electricity. A risk is a negative consequence associated with the situation (Safe Work Australia 2011).

Reasons to Carry out Risk Assessment and Safety Management

There are several benefits of carrying out risk assessments that justify the time and costs invested. They assist in recognizing hazards in the workplace and controlling for adverse outcomes, which significantly reduces their risk of occurring and protects against damages. A risk assessment and subsequent training can help in the prevention of injuries and protect the safety of employees and patrons alike. It is the ethical duty of employers and organizations to create measures that protect people from preventable accidents. With proper assessment, risk management standards can be raised to meet regulations and legal requirements for safe practices. Management control is more effective at controlling health and safety measures, avoiding easily preventable errors of negligence. The implementation of proactive risk management systems is necessary to reduce the likelihood of a safety-related incident (Weekes 2017).

Targeted Place of Risk Assessment

Villaggio Mall, one of the largest shopping centers in Doha, Qatar, is located in the west end of the city. It has the highest mall foot traffic in the region with 50,000 daily visitors and up to 1.5 million monthly (Villaggio Mall n.d.). Shopping malls are inherently vulnerable to numerous hazards and threats due to the large congregation of businesses and people in a relatively limited indoor area. Security and safety have become a significant priority in the retail industry in light of shopping malls becoming highly hazardous public locations.

Organization Name: Villaggio Mall

Address: Al Waab St, Doha, Qatar

Activity: Retail shopping center

Capacity: 50,000 daily visitors

Total Floor Area: 125, 000 square meters

Years operational: 12 years. 6 years after the renovation

Steps of Risk Assessment Performance

The principles of risk assessment include recognition that the problem exists and definition of the nature of the issue. This is followed by identifying alternative solutions and assessing the chosen action. Implementing the chosen action and evaluating its effectiveness is also necessary. Risk management encompasses aspects of problem solving and decision-making that are used in a business context. It is an ongoing process, but six total steps exist that allow an organization to meet its health and safety obligations (University of Southern Queensland n.d.).

Identifying Risks and Analyzing Consequences

The Villaggio Mall faces both internal and external threats. Internal threats consist of violations of security standards, safety hazards, and potential structural issues. External threats are much rarer but could include acts of terrorism or natural disasters (Prosek Security n.d.). Shopping malls are vulnerable to security threats due to many entrances with a limited number of checkpoints such as metal detectors, cameras, or bag checkers. The most common safety hazards include injury due to falls on a wet floor (cleaning or spill), malfunctioning equipment such as escalators, sprinkler systems, and fire alarms, and crowd control measures that result in injury in cases of panic (Department of Labour Republic of South Africa n.d.).

Structural issues that overlap with safety hazards can vary in nature. One of the most common safety concerns and one that caused the fire at Villaggio is electrical wiring. Outdated or damaged wiring in combination with the use of highly flammable materials in the construction of the building can cause fires or accidents. Piping issues can cause flooding, and outdated infrastructure that might lead to collapsed ceiling tiles are also structural hazards in a shopping mall complex.

Assessing Risks

Each hazard should be evaluated to determine the level of risk. Assessment can be based on a variety of factors ranging from experience to industry practices and information available from regulators and experts. Risks should be ranked, which helps to determine prioritizing which ones to control. The risk matrix such as the one below is used to categorize hazards based on either severity or probability of occurrence.

Assessing Risks

Implementing Control

Control measures for internal and external threats are similar regarding the security and structural integrity of the building, with protection from elements such as fire or flooding. Security threats can be mitigated by introducing checkpoints at every entrance, each equipped with a metal detector and baggage scanning equipment. Routine patrols should be implemented both inside and outside the building, as well as provided with adequate training to respond to changing security conditions and crowd control. Fall hazards are unpredictable but can be improved through changes to the cleaning procedures of the mall staff. Malfunctioning equipment, particularly critical safety-focused systems (such as fire alarms) should be checked monthly by regulation and provider recommendations. Structural parameters and infrastructure such as wiring can be controlled by conducting routine pre-checks on cables and switches. Electrical installations should be tested and maintained by competent utility companies, and staff should be provided with training on electrical safety. Employees must be provided with adequate equipment and resources to administer safety precautions throughout the building. Measures such as rotational schedules and checks with managerial oversight are conducive to creating a hazardless environment.

Evaluation of Controls

The assessment should be completed with a feedback and evaluation stage. Relevant process mapping, documentation, audit reports, and program evaluations should be included. Furthermore, regulatory standards and organizational experience support are vital for the evaluation stage. The assessment is completed by creating a list of relevant hazards, identifying who may be harmed, what measures are being taken, and any necessary further actions. The accuracy of documentation is paramount to maintain responsibility as well as for legal and regulatory purposes if any issues arise

Recommendations for Safety Officers

Villaggio Mall is vulnerable to public security and fire hazard risks. It is recommended that all fire protection systems be checked monthly, while structural and electrical aspects must be monitored continuously. Another recommendation is that identified hazards should be implemented into staff training on emergency preparedness. Communication is key with relevant stakeholders including owners, management, employees, and customers. Therefore, if a hazard is preventable or avoidable, proper measures of communication will be introduced so that the public is aware.

Risk Assessment Form

Name of person doing assessment:
Date:
Activity / Procedure being assessed: Occupational safety and hazard identification and assessment at Villaggio Shopping Mall
Known or expected hazards and risks associated with the activity:

  1. Security hazards due to numerous entry points into the building and large patrol area.
  2. Structural hazards due to the failure of internal infrastructure and wiring.
  3. Malfunctioning equipment hazards, including unresponsive safety measures such as fire alarms.
Possible consequences: What are the possible consequences? How likely are these consequences to occur? What is the possible severity of the harm?

  1. Security hazards can lead to potential trespassing, poor crowd control situation, and could lead to potential acts of terrorism and crime inside the mall. Security hazards are most likely to occur due to human factors. They are limited in severity most often unless a terrorist attack happens which is rare but extremely dangerous.
  2. Structural hazards could lead to a wide range of consequences including an electrical fire, pipe flooding, and the collapse of building elements. It could cause permanent damage to life and property, becoming extensively severe if not managed. A medium level of probability could be expected as shopping malls maintain complex infrastructural systems but without necessary upkeep and support. However, after the fire of 2012, Villaggio Mall carefully monitors any electrical systems which can cause fires.
  3. Malfunctioning equipment can lead to physical injury or blunt trauma of visitors and staff. However, malfunctioning safety systems can have extensive consequences of loss of life and property during any accidents or disasters. Many massive shopping mall tragedies have resulted in casualties due to malfunctioning safety and notification equipment.
Who is at risk?

  1. Shopping mall visitors
  2. Custodial, security, and administrative staff
  3. Retail staff
  4. First responders
  5. Residents in the surrounding area
Measure to be taken to eliminate the hazard or lower the level of risk:

  1. Security risks are controlled by implementing patrol elements in the building and metal detectors with cameras at all entrances.
  2. Structural hazards could be mitigated by monthly evaluation of infrastructure and public utilities. Routine checks and inspections on electrical systems are implemented.
  3. Malfunctioning equipment could be tested periodically. Regulatory protocols for fire safety systems should be followed.
  4. Staff training to ensure proper safety, first aid, and response protocols in case of various types of emergency.
Is there a risk of the control measures failing? What would the consequences be?

An inherent risk of failure will exist. It can be mitigated through thorough monitoring of systems, training, preparation for response, and safety evaluations. If controls were to fail, damage to life and property could likely be significant.

Training requirements:

Training manuals, safety packets, shopping mall engineering, and utility plans, federal regulatory guidelines.

Level of risk remaining:

Low risk remaining

Action to be taken in an emergency:

  • First response measures and emergency or evacuation protocols
  • Notification of authorities and emergency services
  • Use of safety systems such as fire suppression or lockdown
  • Evaluation of situational safety protocols
References, if any: n/a
Signature of Assessor:

Reference List

Department of Labour Republic of South Africa n.d., Occupational health and safety in shopping centers, Web.

Prosek Security n.d., , Web.

Safe Work Australia 2011,, Web.

University of Southern Queensland n.d. Risk management in work health and safety, Web.

Villaggio Mall n.d. , Web.

Qualitative and Quantitative Risk Assessment Methods

Risk Categorization

Risk categorization is an important aspect of the risk management framework. For organizations, a risk management framework is the procedure of recognizing and attempting to moderate risk occurrence. Risk can occur in numerous forms, which include integrity risk and competitive risk (Debono 16). Consequently, risk can be inadvertent and unanticipated, while others can be foreseen and controlled.

Risk categorization mitigates surprise, provides approaches to identify challenges, creates compelling management strategies, establishes reliable systems to control risk, improves communication, and facilitates the risk-monitoring process (Debono 14). The primary objective of classifying risk is to evade any repulsive surprise. It gives a fundamental and organized approach to recognize the risk to a reliable level. Another advantage is that it supports the management in distinguishing a variety of risks. It likewise helps in risk evaluation by directing members to work with a particular risk framework.

Risk Urgency

Risk urgency appraisal is a procedure that prioritizes risk categorization assessment. This procedure empowers a supervisor to deploy assets to resourceful sectors. The risk urgency evaluation audits and decides the planning of activities that need immediate attention (Debono 11). Project managers use the risk urgency assessment to monitor and control daily operations based on rank and opportunity. The factors that classify risk urgency include time availability, warning signs, and risk rating score. The project supervisor groups risk based on the time-control process. The risk rating factor is the numeric score that reveals the effect and likelihood of risk (Debono 12). This implies that risks with higher scores are prioritized with immediate control procedures.

Risk Data Quality Assessment

The risk data assessment evaluates the level to which information about risk is valid, accurate, and reliable. It likewise investigates the quality and consistency of information concerning the hazard (Dunovic et al. 677). The risk apparatus guarantees that the information being utilized is valid and objective. However, the managers inability to assess the source validity could create an erroneous investigation on the mitigating variables. The goal of risk data management is to expand the comprehension of outcomes that may occur from misguided information and organize developments.

Qualitative Interview

In qualitative research methods, interviews describe and create meanings to the themes of the subject. The primary task is to comprehend the significance of responses from participants. An interview covers the facts and the significance level of an investigation. This is the most recognized method of information gathering in qualitative research. A qualitative interview is a framework in which practices and benchmarks are recorded, accomplished, tested, and protected.

Probability Distribution

A probability distribution is a mathematical function that portrays conceivable quality and probabilities a variable can occupy in a particular range. This range could be the smallest or biggest values. The factors that influence the range values include the mean, standard deviation, and kurtosis. When utilizing the likelihood distribution in risk appraisal, the supervisor monitors conceivable risk and outcome and decides if the risk is acceptable or requires change.

The Monte Carlo Technique

The Monte Carlo strategy is a model that shows feasible results of choices and evaluates the measure of risk involved. In other words, Monte Carlo analysis is a mechanized system that enables individuals to represent a risk in the quantitative examination and decision-making (Dunovic et al. 680). Experts in accounting, finance, oil exploration plants, production, oil and gas, R& D, and aviation utilize the Monte Carlo method. Monte Carlo simulation reveals possible outcomes of project management decisions and the likelihood of success or failure.

Advantages and Disadvantages of Risk Tools and Techniques

Risk categorization helps managers to classify potential risk patterns during the project timeline. It creates opportunities to manage risks based on their effects. However, risk categorization could be a disadvantage because its source may not be valid and reliable. As a result, the organization could act on false information, and the result may be worse. Risk urgency creates a balanced approach to risk management. The assessment tool prioritizes hazards that require a quick solution.

It enables the organization or project supervisor to allocate resources based on the vulnerability rating. The risk urgency tool allows the management to use effective steps to control avoidable challenges. However, such control measures may not be effective when natural disasters occur. By implication, the cost of risk urgency assessment may be wasted when the risk falls beyond the scope of the organization. Risk data assessment evaluates the reliability of the threat assessment. It creates an improvement plan for current and future operations. However, risk data can be corrupted for personal interest. In such situations, the managers decision-making process is flawed.

Interviews provide detailed information about the participant. The result cannot be influenced by external conditions. Consequently, incomplete surveys and questionnaires are clarified since respondents are reachable (Clark and Sousa 3).

However, the interview method is costly and time-consuming. Information coding and extraction are tedious and challenging. The Monte Carlo method is flexible and simple. The empirical distribution can be expanded, developed, and repeated. However, the technique requires a computer for the analysis. Consequently, the analysis is tedious and takes time. The outcome is not factual because it relies on repeated simulation. The probability distribution is convenient and simple. Please note that samples could be stratified, systematic, cluster, or random. However, a probability distribution is a complex technique that requires technical knowledge. The method is time-consuming and not compatible with heterogeneous values.

Works Cited

Clark, Alexander, and Sousa Bailey. The Five Neglected Skills all Qualitative Researchers need. International Journal of Qualitative Methods, vol. 16, no. 1, 2017, pp. 1-3.

Debono, Robert. Project Risk Management. Semantic Scholar. Web.

Dunovic, Ivana, et al. Internal and External Risk-Based Assessment and Evaluation for the Large Infrastructure Projects. Journal of Civil Engineering and Management, vol. 22, no. 5, 2016, pp. 673-682.

Nanotechnology Risk Assessment and Management

Introduction

Nanotechnology has both advantages and disadvantages to the environment and human beings. Human beings are largely exposed to the chemical particles released by the nuclear process. This poses a formidable problem because they can cause respiratory diseases such as lung cancer among others. Nanoparticles in the nuclear waste are easily absorbed by the human body leading to adverse effects of the respiratory system (Hull and Bowman 168).

The development of new technology has in the recent past resulted to the increased number of deaths. For instance, many people are dying of respiratory diseases due to chemical exposure. Some of these ultra-fine particles are emitted from natural processes such as volcanic smoke and forest fires. These ultra-fine particles have a substantial effect to both human beings and the environment (Hull and Bowman 168).

Hazard of Concern

The greatest concern is to reduce health effects caused by nanomaterials affecting individuals’ health and environmental safety. Radiation exposure especially in emergent countries has increased due to the use of cheap radioactive materials and less awareness of its risks. Exposure to the chemical is inherent given the fact that anthropogenic and natural ultra-fine particles are involved.

The capacity of nanoparticles that can be absorbed by the body to cause adverse effects is not known up to date. Therefore, it is vital to identify the chemical processes that are likely to cause health effects (Zhang 323).

Nuclear materials used to manufacture engineered nanomaterials such as electronic penetrate the human body without the consent of an individual. The combustion process of these materials is characterized by welding fumes and diesel exhaust which emits a considerable percentage of impurities in the atmosphere. These impurities are risky to the human health and the environment. Chemicals such as uranium oxide used in the mining process can be dangerous especially during its conversion to uranium hexafluoride (Zhang 323).

Risk Assessment Boundaries

Chemical exposure is likely to be high at the place of work where radioactive materials are commonly used. Areas of occupation such as hospitals, military camps and academic institutions are likely to facilitate radioactive exposure. Individuals that work in the nuclear waste management industries are exposed to impurities such as nitrogen found in the nitrogen fuels.

Consumers of nuclear wastes are also prone to the dangers associated with this environmental hazard. Scrap metal is commonly used to make cheap containers used by manufacturing Companies in the packaging. These metals contain radioactive chemicals that are harmful to the human health (Hull and Bowman 189).

The atmosphere in the workplace is highly concentrated with chemical emissions from these materials considered to other areas. As a result, high rates of chemical absorption and health effects are likely to be within the workplace environment. For instance, an individual dealing with welding materials is likely to be exposed to the fumes at the place of work compared to outside the workplace.

Combustion from vehicle engines contributes to serious environmental danger. Carbon emissions in the atmosphere lead to global warming by increasing the amount of carbon in the ozone layer. Wastes from chemical processes are drawn to the environment leading to environmental pollution (Zhang 330).

The Persons at Risk

Living organisms have defense mechanisms to prevent entry of these nanoparticles. Despite this, the particles penetrate the human body through the respiratory system causing health problems. Radioactive materials from nuclear processes are likely to be risky to the workers. The people that handle these chemicals are at a greater risk of having health problems because the rate of exposure is high (Hull and Bowman 190).

Workers in manufacturing industries are exposed to radiochemical on a regular basis hence increasing the percentage of nanoparticles inhaled. Just like the workers the general population is also at a risk of these chemical exposures. They live within the same environment where these manufacturing Companies are located hence increasing the rate of exposure.

The possible impact of nanomaterials on human beings and environment are vague. This is because the particles are absorbed in small amounts hence making it difficult to determine the quantifiable amount that leads to diverse health effects. Leakage of radioactive materials may occur during transportation hence making it difficult to clean the mess caused to the environment (Melfort 25).

Nuclear wastes are highly harmful to children and pregnant women. The impurities of these wastes affect the respiratory system which may lead to growth and formation process problems. They are at a higher risk because of their weak immune systems. Highly inclined people are also at a high risk of radioactive exposure because of their immune response.

For example, the respiratory system of asthmatic people is weak which may be prone strong radioactive emissions. Therefore, it is crucial for these individuals to take precautionary actions to prevent these health effects (Melfort 25).

Pathways and Routes of Exposure

Air

Chemical exposure is commonly caused by air. Living organisms’ cannot survives without air. Oxygen composition in the air molecules is fundamental for the survival of human beings. Thus when the chemicals circulate in the atmosphere they lead to a high percentage of concentration within the atmosphere.

The greatest contributors of air pollution are nanoparticles since they contain chemicals in them that are dangerous to the human health. Carbon emitted by ultra-particles such as engine emissions mixes with the oxygen in the air leading to pollution of the air inhaled. Air pollution is the principal cause of respiratory diseases such as lung cancer (Melfort 29).

Surface Water

The other pathway that facilitates exposure to nuclear wastage is through surface water. Improper disposal of these materials may flow into the lakes and rivers leading to water pollution. In most cases, improper disposal of these materials leads to pollution of domestic water. These wastes may also overflow in the rivers and lakes due to inevitable causes such as storms and heavy rains (Melfort 29).

The main route for nuclear waste impurities entrance into the human body is through ingestion. Once human beings consume water with deposits of radioactive materials, the impurities enter their bodies leading to chemical deposits. These chemicals also enter into the human body through contact with the skin.

The skin has small pores for respiration that makes it possible for non-particles to enter into the human body. The effect of these chemicals on the skin is characterized by irritation and itching which may further lead to dangerous skin disease (Melfort 29).

Food

The other route for radioactive exposure is food. Manufacturing Companies that produce canned beverages and food use containers made from scrap metal. The food stored in these containers has likelihood to exposure of these impurities. Once individuals consume these foods, they are likely to develop health problems depending on their immune response. Individuals with low immune system are likely to develop health problems within a short time compared to those with a strong immune system (Melfort 29).

What the Body does with the Environmental Hazard

Absorption

The human body has millions of small pores that facilitate the respiration process. During the respiration, the pores open up in order to allow removal and intake of gases. During this time, impurities within the body skin are absorbed directly hence entering the respiratory system. The human body also takes these impurities during inhalation. Once an individual inhales oxygen that has been polluted by these chemicals it is absorbed through the respiratory system (Hull and Bowman 191).

Distribution

Chemical materials from nuclear wastes move through the body system. Some of the impurities are deposited in the respiratory system where they cause infections. The chemicals affect the system portion by a portion until a time when it is worn out completely. During this time, the infection can lead to more complications such as cancer if no medical attention is taken (Hull and Bowman 191).

Metabolism

The environmental hazard is broken down by body chemicals for individuals with strong immune system. This is where the body acids form strong resistance to harmful chemicals through neutralization. The useful chemicals for the body are extracted whereas the rest are excreted through the respiratory system (Melfort 33).

Excretion

Excretion of these chemicals from the human body takes place through sweating, urination and other excretion methods. The body commonly uses the respiratory system to get rid of this chemical from the body. The excretion of these impurities takes place on a step by step process with the most dangerous chemicals being excreted first (Hull and Bowman 192).

Health Effects

Nuclear waste can cause lung cancer if not handled well. Radioactive chemicals involved in the waste management have a high potential of getting into the body through the respiratory system. Once they get into the body they cause lung infections hence leading to cancer. The infections caused in lungs by these chemicals can be cured if detected early. However, the percentage of chemical that leads to cancer infection is vague (Melfort 35).

Time taken to cause toxic effect

Exposure to radioactive chemical may take a long within an individual lifetime. This environmental hazard is chronic since it can take up to seven years of a person’s lifespan. This is because the infections of the body system take place at a slow pace. This can be attributed to the immune system that slows down the wearing out process by neutralizing the chemicals (Hull and Bowman 189).

Duration and Timing of Exposure

The exposure to this hazard depends on the living environment of an individual. People living in areas where nuclear materials are at their disposal is most likely to be affected. This is mainly because of continuous exposure to the environmental hazard leading to concentration of toxins in both the environment and body. As a result, individuals that are exposed to this hazard on a regular basis are more likely to suffer these toxic effects (Melfort 37).

Risk Management Strategies

From the above findings, it is evident that individuals may not be aware of the risks posed by nanotechnology materials. The fact that nanomaterials have safety risks to both individuals and the environment requires a precautionary approach to the problem. One of the strategies that can be used is through the creation of awareness.

Human beings need to be alerted on the harmful effect of these hazards and how to mitigate them. Alertness through the use of global environmental organizations would be most effective in order to reach the majority of individuals especially in the developing countries (Hull and Bowman 195).

Another strategy that can be used is manufacturing industries using these materials to treat them as if they were hazardous. Thus, workers will be capable of wearing protective garments when handling the chemicals. Since very little is known concerning the percentage of nanoparticles that cause health effect, disposal should be avoided.

Government regulations should also be imposed to reduce fortuitous disposal of these materials. Legal regulations will promote responsibility among the manufacturing Companies hence mitigating exposure risks. This way the environment and human beings are likely to have a safe atmosphere (Hull and Bowman 195).

Conclusion

Nanoparticles are perilous to both human health and environment. Nuclear waste causes radioactivity emissions, which cause health problems to individuals. The most common toxic effect of radioactivity exposure is cancer.

This is because the route for this chemical into the body is mainly the respiratory system. Once the chemicals enter the body system they cause infections to the respiratory system. However, the body also reacts through excretion hence reducing health risks. Therefore, it is vital to take the underlying precautions to mitigate these risks.

Works Cited

Hull, Matthew and Diana Bowman. Nanotechnology Environmental Health and Safety: Risks, Regulation and Management. Amsterdam: Elsevier, 2009. Print.

Melfort, Warren. S. Nuclear Waste Disposal: Current Issues and Proposals. New York: Nova Publishers, 2003. Print.

Zhang, Wang. Nanoscale iron particles for environmental remediation: an overview, Journal of Nanoparticle Research. 5 (2003): 323-332. Print.

Risk and Vulnerability Management and Assessment

Introduction

Risk assessment helps to identify hazards. It is a process that contributes to identifying what could happen if a hazard is to occur. It also leads to establishing the solution mechanisms.

Risk and Vulnerable Areas

In my community, there is a hospital that has fewer bed capacities than it can hold. It is serving a whole county as a referral hospital (Risk Assessment, 2016). The county has a population of 270,000 people. Its bed capacity is only 300 beds. It creates a vulnerable challenge where when there is an outbreak of diseases, the hospital cannot cater to all its dependents.

Another risk is the electricity problem. There is a faulty connection of electric cables across the neighborhood. Every time it rains some sparks and smoke coming from the wires. It may lead to electric shock shortly. It is a high-risk problem because it can cause death.

The primary school in the community is across the river. Students have to cross the river to reach the school. There have been floods in the recent past, and this has left the bridge in bad shape. It has some cracks, and this may pose a danger to the students or any person using the bridge. It is a high-risk issue because the bridge may succumb to the weight on it or water can carry it away. It can lead to hurts or even death to the users (Risk Assessment, 2016).

Environmental Vulnerability and Risk Assessment

The community is yet to assess to establish the mechanisms for solving the problem. The information about risk assessment is in the Risk Management and Hazard offices in the government building. The officers are responsible for carrying out risk assessments and providing solutions. They need to work with accountable government ministries so that the solution can be tangible and acted upon in time.

Risk and Vulnerability Prevention Plan

The government has encouraged society to set up a community policing program. The program has security measures. It includes members of the society to protect the community. It also has a risk department which helps to ascertain the veracity of the dangers in the community (Risk Assessment, 2016). The risk arm of the policing office has various compartments. One deals with the natural causes of the disaster. They include floods, earthquakes, and weather-related causes. The second arm deals with the human-made causes. It includes the construction effects, accidents, and intentional hazards. The third division deals with technological risks.

Minimizing Threat and Vulnerability

The community plays a critical role in the management of the affairs of their locality. They can help to reduce risk and vulnerability by assigning each other functions in the administration of risks. The community has people who have various capabilities and time to manage the risks. After identifying these traits, they can distribute roles basing them on each other’s capacity (Risk Assessment, 2016). They should hold regular meetings that review the previous matters and consider any arising challenges in the community.

I can help minimize the risks and vulnerability by presenting the issues to the delegated committee. Then I can assist in the finding of solutions through research. I can also participate in writing to the responsible officials in the government and call upon them to act on the impending challenges (Risk Assessment, 2016). I can also raise the matter through the county legislature.

Risks occur in the daily life of every individual and community. The best thing to do is to find the mechanisms through which we can forecast their occurrence. The next step is to try and find control measures.

Reference

Risk Assessment. (2016). Web.

Woltech Company’s Information Security Risk Assessment

An Information Security Risk Assessment for Woltech

Woltech is a UK based organisation, operating in the field of energy. It has additional offices in Eastern Europe and China, and the staff volume consisting of 65 employees. The given case study presents a range of issues that are associated with information security (IS). Considering that the organisation uses various sources of the remote access and communication between the offices, it is necessary to ensure the high-quality protection of employees’ and Woltech’s data.

This paper aims at discussing the problems encountered by the organisation, including threats, vulnerabilities, and risk treatment options in order to suggest the potential strategies for addressing the mentioned challenges.

First of all, it is necessary to identify the concept of information security risk to analyse the case study in an in-depth manner. According to Peltier (2014, p. 16), “the purpose of risk assessment is to ensure that the organisation understands the security impacts”. The risk assessment is central to the information security management system, where risk is understood as the uncertainty, which presumes the possibility of damage related to the infringement of IS.

To assess risks, it is essential to understand which business processes in the organisation are the most critical ones, following the prospects of Business Impact Analysis. It also implies evaluating how to eliminate these threats and their sources and how to minimise their likelihood. Both threats and vulnerabilities may cause serious impacts in the form of an undesirable incident, as a result of which the organisation will suffer significant losses (Feng, Wang & Li 2014).

This damage can arise because of attacks on information belonging to the organisation and leading to its unauthorised disclosure, modification, damage, destruction, inaccessibility, or loss. Threats can occur from either accidental or deliberate sources or events. The main threats to information security at Woltech may be specified as follows:

  • the risk of leakage of confidential information;
  • the risk of loss or unavailability of important data (top priority);
  • the risk of using the incomplete or distorted information;
  • the risk of unauthorized or latent exploitation of information and computing resources (when working via the Internet);
  • the risk of spreading of information in the external environment that threatens the reputation of the organisation.

The vulnerabilities are the weaknesses of IS protection associated with the assets of an organisation. These weaknesses can be integrated by one or more of the threats, thus causing the unwanted incidents. As stated by Peltier (2014), vulnerability itself is not dangerous as it is merely a condition or a set of conditions that creates the opportunity to damage the organisation. The following vulnerabilities of Woltech can be identified:

  • violation of the integrity of information stored on the Internet databases and servers (top priority);
  • breach of the availability of the server as it is hosted by the other organisation;
  • violation of confidentiality of information due to the lack of encryption.

Each of the mentioned threats and vulnerabilities can arise as a result of SQL Injection and Cross-Site Scripting attacks, for example, and the escalation of the perpetrator’s privileges in the system as a result of buffer overflow of the OS.

As it can be noted from the case study analysis, the activities of the given organisation are mostly automated. In fact, the organisation can be regarded as a human-machine system that provides the functions of interacting with its customers, both individuals and legal entities, and controlling bodies, both state and international industry regulators. The machine component of this system may be called an automated system of organisation, including communication channels, computer facilities, system, and software.

It should be emphasized that these assets store, process, and transmit intangible information, the cost of which often exceeds the cost of the automated system by orders of magnitude. In its turn, the human component, by the very definition, implies personnel, management, IS policies, and so on – all that provides information protection.

IS risks can be divided into two categories: risks caused by information leakage and its use by the unauthorized parties for purposes that may damage business; and risks of technical failures in the operation of hardware and software and information transfer channels. The core challenge is to minimise IS risks to prevent unauthorised access to data, as well as failures of equipment and software (Baskerville, Spagnoletti & Kim, 2014). Speaking of risk treatment options, it is possible to suggest that the most relevant method in this situation is avoidance and prevention. However, the modification of the likelihood of critical situations can also be applied.

As identified by the European Union Agency for Network and Information Security (ENISA), “more than one option can be considered and adopted either separately or in combination” (Risk treatment 2017, para. 9). Such an approach implies the mitigation of risk and reduction in the probability of occurrence of an incident due to this risk as well as a reduction in the impact of this risk to an acceptable level.

The Advantages and Disadvantages of Woltech Seeking Certification for ISO27001

ISO/IEC 27001 Information technology is a standard that presents a model for the development, implementation, operation, monitoring, analysis, support, and improvement of the Information Security Management System (ISMS). The introduction of the ISMS is a strategic decision for the organisation (Humphreys 2016). The design and implementation of the organisation’s ISMS are influenced by its needs and objectives, security requirements, processes used, and the scale of the organisation’s activities and structure. It is assumed that the above factors and their supporting systems will change over time under the impact of both internal and external factors. It is also suggested that the ISMS will change in proportion to the needs of the organisation, depending on the complexity of the situation.

The key advantage of ISO/IEC 27001 is that it aims at standardisation in providing information security to organisations through developing, strengthening, increasing confidence and maintaining stability as well as achieving adequacy of measures to address threats for IS, and prevent and / or reduce the damage from IS incidents (Humphreys 2016). Another beneficial aspect of the mentioned standard is that it defines the requirements for the selection and correction of the approach to assessing the risks of infringement of IS and the development of plans for handling these risks.

In particular, it is necessary to adopt methods for assessing the risks of infringement of information security at the enterprise, determining the criteria for accepting the risks and the level of the acceptable risk. When implementing this system, the organisation receives monitoring and security management tools that help to reduce various types of risks.

In this standard, the model of Plan-Do-Check-Act (PDCA) is proposed. The adoption of PDCA model also reflects the principles set forth in the Directives of the Organisation for Economic Cooperation and Development (OECD) that determine the security of information systems and networks (Humphreys 2016). It seems rather significant to point out that this standard represents a visual model for the implementation of these principles on practice, thus contributing to the risk assessment, design, and implementation of the information security system, its management, and reassessment, if required.

The most significant advantage of implementing ISO 27001 is the increase in transparency of all departments from the bottom to the top management of the company. This also applies to the information security department, whose activities are akin to some incomprehensible issue for many employees. The core purpose of ISO/IEC 27001 standard is to ensure the co-ordination of IS management along with other management systems in the company. In other words, this means that when implementing other management standards, it can easily apply a single audit system due to high-level compatibility.

As for disadvantages, one may note that the implementation of ISO 27001 standard is a rather long procedure, the duration of which depends on various factors, such as the initial state of IS in the organisation, the readiness of management and personnel for changes, the size of the company, and the presence of other implemented standards. Therefore, it is impossible to specify the definite period of implementation, namely, the terms of introduction of the standard and the passage of certification, because there are so many variables on which this period depends.

The expenses on the implementation of the standard compose another disadvantage. It may involve costs on consultation, preparation of the organisation, staff training, etc. It is important to approach to the selection of the consultants who will assist in the implementation of ISO 27001 as carefully as possible. Despite the fact that the services of a consulting company are, as a rule, expensive, it will be erroneous to assume that the decision to handle risks independently will allow the organisation to save money (Humphreys 2016). Costs after the certification, on the contrary, will be reduced due to the fact that the organisation will concentrate on significant risks, rather than trying to protect itself from everything that can threaten.

Organisational Needs for Maintaining Operation Following a Major Incident

Among all the variety of instruments of reaction towards IS risks, it seems important to highlight the business continuity associated with the quality and minimisation of risks. It is necessary to apply the methodology of Business Continuity Management (BCM), which provides insights on how to address the threats identified earlier in this paper. At present, the organisation of an effective information system protection becomes a critical strategic factor for the development of any company.

In fact, information is one of the key elements of business. At the same time, information is understood not only as static data resources, including databases, current hardware settings, etc., but also dynamic information processing procedures. In this regard, the main goal of the security system is to ensure the stable functioning of the facility to prevent threats to its security and protect the legitimate interests of the organisation from illegal encroachments, theft of funds, disclosure, loss, leakage, distortion, and destruction of official information, thus ensuring standard production activities of all units.

Considering the needs of Woltech, the following activities can be recommended to carry out with the aim of providing the necessary protection against IS risks and security control:

  • Identify the circle of employees responsible for information security and create the regulatory documents that will describe the actions of the organisation’s personnel aimed at preventing IS risks as well as providing backup capacity for the operation in a critical situation. First, it is important to prepare for these events through backing up critical data and data centres and initiating the regular training of employees.
  • Develop unified standards for information systems within the organisation by creating the unified reporting forms and rules for calculating indicators that will be used in all software products of the company. In particular, all the offices located in the UK, Eastern Europe, and China are to adopt a new system of data protection in order to eliminate information violation. At this point, “all information security roles and responsibilities should be formally allocated by defining them in writing using terms that are clearly understood across the organisation” (Peltier 2014, p. 11). To continue functioning in the standard mode, communication channels are to be re-established as appropriate.
  • Classify data by the degree of confidentiality and delimit access rights to it. This activity concerns the fact that employees utilise both corporate and personal devices to access their email and work remotely, thus creating additional threats to the organisation’s IS (Feng, Wang & Li 2014). In particular, even though Woltech may come up with the unified system of data protection, it is impossible to protect the personal devices as well. Therefore, it should be strongly recommended to avoid using individual iPads and other devices to access the corporate resources.
  • Ensure that any documents that are circulating within the organisation are created using systems that are centrally installed on devices. The installation of any other programs should be authorised, otherwise, the risk of failures and virus attacks may increase dramatically. By downloading and installing the extraneous programs and utilities, employees jeopardise the whole system.
  • Introduce monitoring tools to observe the status of all corporate systems. In case of unauthorised access, the system should either automatically deny the entry or signal the danger, so that personnel can take action (Baskerville, Spagnoletti & Kim, 2014). At this point, the current situation shows that Woltech’s support system maintains only easy and moderate problems, while the third party company resolves some more complicated issues. In this regard, it is essential for the organisation to employ its own team of professionals to become independent and more protected in terms of information security.
  • Develop and implement a system that allows quickly restoring the functionality of IS infrastructure with technical failures. This point is associated with server errors and failures. Currently, Woltech reports the inability to adequately and timely react to server losses and storage of data on the removable hard disks. It seems to be better to own a new server, so that it would be possible to restore data rapidly and prevent IS risks realisation.

In addition, special program called CCTA Risk Analysis and Management Method (CRAMM) may be applied as one of the first methods of risk analysis in the field of information security. The method of CRAMM is based on the integrated approach that combines procedures for the comprehensive evaluation (Vacca 2017). The study of IS can be carried out in two ways, pursuing two qualitatively different goals: providing the basic level of information security and conducting a complete risk analysis.

It should be noted that CRAMM can rightfully be referred to methods that use both qualitative and quantitative approaches to the analysis of IS risks as the assessment takes into account the level of expected financial losses from risk realisation, and the results are provided in points for scale from one to seven (Vacca 2017). This fact significantly increases the rating of CRAMM methodology due to its effectiveness.

In conclusion, it should be noted that the development and implementation of measures to minimise IS risks will not be useful if the recommended standards and rules are misused. For example, if employees are not trained in their application and do not understand their importance. Therefore, work to ensure IS security should be comprehensive and thoughtful. It is essential to prepare for the consequences of possible critical situations and identify the company’s actions to overcome the crisis.

An indispensable condition for the successful risk management in the field of information technology is its continuity. Therefore, the assessment of IS risks along with the development and updating of plans for their minimisation should be done at a certain intervals, for instance, once a quarter. The periodic audit of the system of work with information conducted by the independent experts will further contribute to minimising risks.

Reference List

Baskerville, R, Spagnoletti, P & Kim, 2014, ‘Incident-centered information security: managing a strategic balance between prevention and response’, Information & management, vol. 51, no. 1, pp. 138-151.

Feng, N, Wang, HJ & Li, M 2014, ‘A security risk analysis model for information systems: causal relationships of risk factors and vulnerability propagation analysis’, Information Sciences, vol. 256, no. 1, pp. 57-73.

Humphreys, E 2016, Implementing the ISO/IEC 27001:2013 ISMS standard, 2nd edn, Aptech House, London.

Peltier, TR 2014, Information security fundamentals, 2nd edn, CRC Press, Boca Raton, FL.

. 2017. Web.

Vacca, JR 2017, Computer and information security handbook, 3rd edn, Morgan Kaufmann, Cambridge, MA.

The Chemical Storage Facility’s Risk and Liability Assessment

Summary

The chemical storage facility is likely the source of the TCE and Benzene contamination in the area. The site geology can play a significant role in the movement of the contaminants and the potential risk to the surrounding environment and population (Guerin, 2022). The facility should be held liable for the contamination, and the remediation should be the facility’s responsibility. The facility is situated on a site with a high-water table, and the soils are highly permeable (Eklund et al., 2018). This means there is a high potential for the contaminants to move through the soils and groundwater. The local population likely uses shallow groundwater for drinking water, so there is a potential risk to human health. There is also a risk to the environment as the contaminants could easily block the waterways.

The most common way to remediate this contamination is to pump and treat the groundwater. This involves pumping the contaminated groundwater to the surface and running it through an air stripper to remove the TCE and a carbon adsorption system to remove the benzene (Matos et al., 2019). In situ remediation is another option, which involves injecting chemicals into the groundwater to break down the contaminants. This can be done using either chemical oxidation or bioremediation. Chemical oxidation involves injecting chemicals into the groundwater that will react with the contaminants to break them down. Bioremediation involves injecting bacteria into the groundwater that will eat the contaminants.

Both pumps, treatment, and in situ remediation effectively remediate TCE and benzene contamination. The best method will depend on the specific situation at the site. If you are the owner of the chemical storage facility, you may be liable for the contamination. If you are found to be the source of the contamination, you may be required to pay for the cleanup (Newell et al., 2020). If you are a property owner whose property is affected by the contamination, you may be able to sue the chemical storage facility for damages.

TCE and Benzene Chemical Storage Facility Remediation Action Plan

  1. Pump and treat the groundwater to remove the TCE and benzene.
  2. Install an air stripper to remove the TCE and benzene from the groundwater.
  3. Use bioremediation to break down the TCE and benzene in the groundwater.
  4. Use soil vapor extraction to remove the TCE and benzene from the soil.
  5. Place a barrier around the chemical storage facility to prevent further groundwater contamination.
  6. Monitor the groundwater regularly to ensure that the remediation action plan is effective.
  7. Update the remediation action plan as necessary.

The chemical storage facility is likely the source of the TCE and benzene contamination of the groundwater. To remove the pollutants from the groundwater and stop further contamination, a remediation action plan should be implemented. Pumping and treating the groundwater is the most common method of remediation for TCE and benzene contamination (Sekar, et al., 2022). Groundwater is pumped from the contaminated area and treated to remove the contaminants which is then returned to the ground. Air strippers can also be used to remove TCE and benzene from groundwater (Michaels, 2019). An air stripper works by passing air through the contaminated water. The TCE and benzene are removed from the water and collected in the air stripper.

Bioremediation is another option for treating TCE and benzene contamination. In bioremediation, bacteria are used to break down the contaminants The bacteria are injected into the groundwater, breaking down the TCE and benzene into harmless products. Soil vapor extraction can remove TCE and benzene from the soil. In soil vapor extraction, a vacuum removes the contaminants from the soil (Pedersen et al., 2021). The contaminants are collected in a system and then treated. A barrier can be placed around the chemical storage facility to prevent further groundwater contamination (Hu et al., 2021). The barrier can be a physical barrier or a chemical barrier. Monitoring the groundwater regularly is important to ensure that the remediation action plan is effective (Tucker, 2021). The groundwater should be tested for TCE and benzene regularly. If contamination levels are not decreasing, the remediation action plan should be updated. The remediation action plan should be updated to ensure that the TCE and benzene contamination is removed from the groundwater.

Detailed Site Investigation of Chemical Storage Facility

The chemical storage facility in Northville is the likely source of a groundwater contamination plume. The plume consists of two chemicals, TCE and Benzene. The plume is moving in an eastward direction, and a south easterly direction (Zivar et al., 2021). The depth of the plume is unknown. A remediation action plan should be implemented in order to clean up the contaminated groundwater. The plan should include a method for monitoring the plume, as well as a plan for pump and treat and/or in situ chemical oxidation.

Pump and treat involves pumping contaminated groundwater to the surface and treating it with filters or chemicals to remove the contaminants. In situ chemical oxidation involves injecting chemicals into the groundwater to chemically break down the contaminants. Monitoring the plume is necessary in order to determine the effectiveness of the remediation action plan. Monitoring wells should be installed in order to track the movement of the plume (Tarkowski, 2019). Water samples should be taken from the wells on a regular basis and analyzed for the presence of TCE and Benzene. When the remediation action plan is successful, the concentration of these minerals in the groundwater will decrease over time and plume will eventually reach a point where it is no longer harmful.

The goal of a site investigation is to gather information that will be utilized to describe the kind and level of contamination at a particular location. A remediation strategy is created using this data to deal with the contamination. Installing additional monitoring wells to define the horizontal and vertical extent of the pollution and gathering soil and groundwater samples for examination are common components of a site assessment (Koohi and Rosen, 2020). The results of the investigation will be used to develop a remediation plan that is tailored to the specific conditions at the site. Remediation options include pump and treat in situ treatment, and excavation. The type of remediation selected will depend on several factors, including the type and concentration of contaminants, the depth of the contamination, and the hydraulic properties of the soil.

Excavation is typically only performed if the contamination is shallow and concentrated in a small area. Situ Treatment involves injecting chemicals or other amendments into the ground to treat the contamination. Pump and Treat involve pumping contaminated groundwater to the surface and treating it to remove the contaminants. The specific remediation approach selected will depend on the specific conditions at the site (Guelpa and Verda, 2019). However, all remediation plans should include a monitoring component to ensure that the remediation is effective and that the contaminants are not migrating off-site

A remediation plan can be developed based on the investigation results to address the contamination. Based on the information available, it is recommended that a site investigation be conducted in order to further characterize the nature and extent of the contamination (Lu et al., 2017). This should include installing additional monitoring wells and collecting soil and groundwater samples for analysis. The investigation results will be used to develop a remediation plan to address the contamination (Chen et al., 2021). The method of remediation chosen will depend on a number of variables, including the kind and quantity of contaminants, their depth, and the hydraulic characteristics of the soil. Remediation options include pump and treat, in situ treatment, and excavation.

Situ Treatment involves injecting chemicals or other amendments into the ground to treat the contamination. The method of remediation chosen will depend on a number of variables, including the kind and quantity of contaminants, their depth, and the hydraulic characteristics of the soil. The specific remediation approach selected will depend on the specific conditions at the site (Scott et al., 2020). However, all remediation plans should include a monitoring component to ensure that the remediation is effective and that the contaminants are not migrating off-site.

Pumping contaminated vapors out of the soil and treating them to remove the impurities constitutes soil vapor extraction. Bioremediation involves using bacteria to break down the contaminants in the groundwater. Pump and Treat is the most common remediation method for TCE and benzene contamination. It is effective at removing contaminants from the groundwater, but it can be expensive and time-consuming (Ossai et al., 2020). Soil vapor extraction is less common but can be more effective than pump and treat, especially if the contamination is shallow. Bioremediation is the least common remediation method, but it can be very effective if the right bacteria are in the groundwater. The best remediation method for a particular site depends on the specific circumstances, so a detailed site investigation is necessary to determine the best option.

Reference List

Chen, R., Li, T., Huang, C., Yu, Y., Zhou, L., Hu, G., Yang, F. and Zhang, L., 2021. Characteristics and health risks of benzene series and halocarbons near a typical chemical industrial park. Environmental Pollution, 289, p. 117893.

Eklund, B., Beckley, L. and Rago, R., 2018. Overview of state approaches to vapor intrusion: 2018. Remediation Journal, 28(4), pp. 23-35.

Guelpa, E. and Verda, V., 2019. Thermal energy storage in district heating and cooling systems: A review. Applied Energy, 252, p. 113474.

Guerin, T.F., 2022. Using prototypes to enable development of commercially viable field scale contaminated site remediation processes. Chemosphere, 288, p.132481.

Hu, G., Liu, H., Chen, C., Li, J., Hou, H., Hewage, K. and Sadiq, R., 2021. An integrated geospatial correlation analysis and human health risk assessment approach for investigating abandoned industrial sites. Journal of Environmental Management, 293, p.112891.

Koohi, S. and Rosen, M.A., 2020. A review of energy storage types, applications and recent developments. Journal of Energy Storage, 27, p.101047.

Lu, S., Zhang, X. and Xue, Y., 2017. Application of calcium peroxide in water and soil treatment: a review. Journal of hazardous materials, 337, pp. 163-177.

Matos, C.R., Carneiro, J.F. and Silva, P.P., 2019. Overview of large-scale underground energy storage technologies for integration of renewable energies and criteria for reservoir identification. Journal of Energy Storage, 21, pp. 241-258.

Michaels, P., 2019. In Situ Soil Vapor Extraction Treatment 1. In EPA Environmental Engineering Sourcebook (pp. 111-122). CRC Press.

Newell, C.J., Adamson, D.T., Kulkarni, P.R., Nzeribe, B.N. and Stroo, H., 2020. Comparing PFAS to other groundwater contaminants: Implications for remediation. Remediation Journal, 30(3), pp. 7-26.

Ossai, I.C., Ahmed, A., Hassan, A. and Hamid, F.S., 2020. Remediation of soil and water contaminated with petroleum hydrocarbon: A review. Environmental Technology & Innovation, 17, pp. 100526.

Pedersen, J.E., Strandberg-Larsen, K., Andersson, M. and Hansen, J., 2021. Occupational exposure to specific organic solvents and risk of subtypes of breast cancer in a large population of Danish women, 1964–2016. Occupational and Environmental Medicine, 78(3), pp. 192-198.

Scott, P.S., Andrew, J.P., Bundy, B.A., Grimm, B.K., Hamann, M.A., Ketcherside, D.T., Li, J., Manangquil, M.Y., Nuñez, L.A., Pittman, D.L. and Rivero-Zevallos, A., 2020. Observations of volatile organic and sulfur compounds in ambient air and health risk assessment near a paper mill in rural Idaho, USA. Atmospheric pollution research, 11(10), pp. 1870-1881.

Sekar, A., Varghese, G.K. and Varma, R., 2022. Exposure to volatile organic compounds and associated health risk among workers in lignite mines. International Journal of Environmental Science and Technology, pp.1-14.

Tarkowski, R., 2019. Underground hydrogen storage: Characteristics and prospects. Renewable and Sustainable Energy Reviews, 105, pp. 86-94.

Tucker, R.K., 2021. Problems dealing with petroleum contaminated soils: a New Jersey perspective. In Petroleum contaminated soils (pp. 37-53). CRC Press.

Zivar, D., Kumar, S. and Foroozesh, J., 2021. Underground hydrogen storage: A comprehensive review. International journal of hydrogen energy, 46(45), pp. 23436-23462.

Cargo Security Planning and Risk Assessment

Introduction

Due to the advance in technology, it is possible to move cargo through various modes of transport within a short period. This requires enhanced security measures because a load can be targeted by criminals. Companies invest heavily in ensuring that they have initiated the right measures for security (Kubanova, & Kubasakova, 2020). Cargo security planning involves analyzing the risks and creating solutions that minimize the challenges during the movement of goods.

Discussion

In both road and air transport, the first aspect is to carry out vulnerability and risk assessment tests. This allows the logistics company to identify areas where the transportation of cargo can be affected by external forces. The risk analysis is followed by the development of solutions that assist the company to minimize or eliminate the dangers. The report provides the team with an overview of hotspots that needs extra attention. The hijacking of goods is more common in road transport than in the air (Kubanova & Kubasakova, 2020). For air transport, the cargo has to undergo various processes that ensure the safety of those transporting the goods. This indicates that each mode of transport requires strategies that address the challenges presented.

For the transportation of cargo using ships, the security planning follows the Ship Security Plan (SSP). This document provides the crew with the measures to take when protecting cargo, cargo transport units, and stores (Lu & Koufteros, 2019). Rail transport is used to transport bulk cargo and special goods that cannot be handled by other modes of transport. Cargo security planning for rail is based on a security management plan. The plan is tested to ascertain its effectiveness and to ensure that all issues have been incorporated. The step that follows next is the introduction of security best practices at different levels. This may include the use of technology to ensure that cargo is theft-proof (Lu & Koufteros, 2019). Logistic businesses must operate with minimal security issues because of the nature of their work.

Conclusion

In summary, cargo security planning starts with carrying out risk and vulnerability assessments. The planning identifies areas that need attention and challenges that the logistics team may encounter. The adoption of security best practices ensures that companies minimize transport disruptions. Technology allows logistic companies to track the movement of freight and cargo, which helps in reacting when an issue develops. Clients will prefer an organization that guarantees the security of its cargo.

References

Kubanova, J., & Kubasakova, I. (2020). . Transportation Research Procedia, 44, 234-239. Web.

Lu, G., & Koufteros, X. (2019). Organizing practices to combat supply chain security breaches. IEEE Engineering Management Review, 47(3), 72-78.