Environmental Engineering Reference
In-Depth Information
includes legal concern and citation of the similar events. The environmental
knowledge management represents collection of data for the environment
assessment.
3.7.3. Resilience of Management System
The assessment of the overall resilience profile for each organization
represents the set of rules to be followed in the assessment procedure.[3,4].
Resilience profiles have been developed to give organizations a visual
description of their resilience and indicate areas of strength and weakness.
In the organization resilience assessment the procedure it is of the primary
interest to verify the vulnerability of the company management system and its
structure. Among the main attribute of resilience procedure are the
implementation of following measure:
Situation awareness is a measure of an organization's understanding and
perception of its entire operating environment. This includes:
the ability to look forward for opportunities as well as potential crises,
the ability to identify crises and their consequences accurately,
an enhanced understanding of the trigger factors for crises,
an increased awareness of the resources available both internally and
externally,
a better understanding of minimum operating requirements from a
recovery perspective; and,
an enhanced awareness of expectations, obligations and limitations in
relation to the community of stakeholders, both internally (staff) and
externally (customers, suppliers, consultants etc).
Management of keystone vulnerabilities defines those aspects of an
organization, operational and managerial, that have the potential to have
significant negative impacts in a crisis situation. The impacts of keystone
vulnerabilities may be either instantaneous (occur suddenly and take the
failure of only one component to have a significant negative impact) or
insidious (small failures of key components lead to a large scale cascading-
type failure over time). It is important for organizations to also have a clear
understanding of the links between components and the vulnerabilities that
may arise from these. These may include specific tangible organizational
components such as:
Search WWH ::




Custom Search