This document provides a comprehensive protection plan for building a new depot, including risk assessment, identification of assets and threats, loss impact, and recommendations for security measures.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
PROTECTION PLAN ON BUILDING A NEW DEPOT
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Contents Introduction-....................................................................................................................................2 Scope............................................................................................................................................3 Conduct a risk assessment...............................................................................................................3 Risk management and risk philosophy:.......................................................................................3 Identification of assets –..................................................................................................................4 Fig 1.................................................................................................................................................5 Identification of Threats –...............................................................................................................5 Loss event profile:........................................................................................................................5 Loss Impact –...................................................................................................................................7 The risk management process:.........................................................................................................7 Recommendation.............................................................................................................................8 Adjacent areas:.............................................................................................................................8 Perimeter of site.........................................................................................................................10 Zoning and protection of vital restricted areas:.........................................................................10 Security system and means........................................................................................................12 Security manpower, procedures and contingency plans:...........................................................13 Conclusion.....................................................................................................................................14 Reference list.................................................................................................................................15 1
Introduction- The main issues that are involved in the assessment of various risks include assessing various factorslikekeepinganeyeoversafedesignstoensuresafety.Itinvolvesefficient implementation of management. Maintenance issues are taken great care while dealing with railway issues. Efficient coordination is required. Risk analysis involves carefully analyzing the various engineering operations as well as the structures that are involved in the successful making of a railway network. The railways tracks that play the role of being the cause of major numberofaccidentsareanimportantpartoftheriskanalysisorassessment.Efficient management to keep the tracks the order to ensure the safe movement of the railways is an important part of the risk assessment. The condition of the ground needs to be checked regularly. Risk assessment involves ensuring a check over the access way, the level crossings. The level crossings need to have strong inspection facilities implemented over them. A great number of accidents occur at the level crossings. The access pathways also need to be kept well under control. The electricity issues that are faced over the operation of the railways are an important factor. The stations need to be connected in a proper way. The stations should be in a position to handle situations of emergency. Stations should be able to take rapid actions in case the situation demands so. Managementof time is extremely whiledealing with railways and the various operations associated with it. Time available is very little in most of the situations to waste. Scope The assessment will evaluate the factors that create risky situations. It also scopes to analyze the factorsthatwillsupportinmakingtherailwaytrackinthesuccessfulmanner.The recommendations are provided that has the scope of mitigating the issues relate to the risky factors. Conduct a risk assessment As per the requirements of the present project, it is essential to know the meaning of risk management and other terms related to it. Firstly, risk may be explained, as the chance of something occurring that will pose an unfavorable outcome. The level of risk echoes: 1.The probability of undesirable incident 2.The possible aftermath of the undesirable incident 2
The present project deals with the security and risk management of Mass Rapid Transit system in Singapore. This network of conveyance is a speedy transport structure Which is considered to be a leading part of the railway system in Singapore(McNeil, 2015).This project will provide an account of the overall risk assessment for the development. It will touch on these topics: assets, threats, probability of occurrence, impact and consequences. Risk management and riskphilosophy: Risk management is the technique of spotting out of probable risks, obstacles, hazards or calamity before they occur (Bessis, 2015).This procedure permits trade owners to arrange special measures to avert the risk reduce its effect or find out ways to deal with its shock. The importance of managing risk lies in the fact that without it, no organization can firmly establish its objectives for the future (Hopkin, 2018). Risk philosophy is the set of common faiths and approaches that describe how risk is treated in any system or institution. This involves how risk is managed along with the factors, types of risks and ways in which they are handled. Therefore, in order to achieve a successful process of managing risks, it is important to first identify, analyze and find out the risks. A risk assessment includes diagnosing the possible perils of an institute and investigating the related susceptibility. As per the present project, it is essential to identify the probable risks related to the transport system in Singapore. The factors to identify the risks are discussed below: Identification of assets – An asset is a means of value that can be transformed into currency. An entity, person, firm inherit assets or government owned assets. As per the present project, the Mass Rapid Transit system of Singapore should launch primary actions in the field of asset management for the up gradation of this transport system (Binti Sa’adin,et al, 2016).The assets must include addition of more railway stations and terminals, crossing points, number of ramps and moving stairways. In addition, enhance their transmission, warning system, train control & several technical and electrical gadgets in terminals and depots. Although a lot of initiative has already been taken to improve and manage these assets by the Government. Then also, certain loopholes are still prevalent in this field. Therefore, the assets should be renewed or reconstructed. The warning system, transmission and information qualities should be enhanced and developed properly. In case of malfunctioning of any of these assets, might lead to a disruption of proper functioning of 3
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
the transport system (Ong,et al, 2017).This would further cause great difficulty on part of the daily passengers, who are majorly depended on the Mass Rapid Transit system. Therefore, it is essential to develop measures of sound warning, communication and distribution of information under this system. Fig 1 (Source:Sc01.alicdn.com, 2019) Identification of Threats – Loss eventprofile: Threat is a probable danger, which might escapade a vulnerability to rupture. With the ever- growing technology, computerized disclosure and other factors created by worldwide trade has resulted in some of the newest risks faced by the transport system. Identification of personal loss, which may happen, is probably the next way of finding out the security breach. This includes a proper notion about the types of loss incidents or risks, along with the situations & conditions, substances, actions, links that can create the loss incidents. It is important to measure, lessen and supervise all the exposures that a vigilant security control delivers its impact. As per this project, a vigilant security strategy should be properly constructed. It should focus on: the incidents, which can trigger any loss, one that can be counted in terms, related to fiscal, economical, political or social background. Some probable risk loss incidents can be stated as: nuclear war, 4
natural calamities like earthquakes, volcanic eruptions, floods, tornadoes and others. Man-made calamities like fire, accidents, explosions and others (Bilveer, 2018). Work place related risks include sexual harassment, acts of revenge, bully. Terrorist attacks, kidnapping, murdering and several other threats. As per the present project, the Singapore transport authorities should take special measures to enhancetheirsecuritycheckingprocedures.Theyshouldorganizeastringentsecurity examination system in all of the major MRT depots (Hung, 2018).New security personnel should be trained properly so that they can keep a strong vigilance over the passengers and the borders. In addition, the officers should be trained in such a way so that they can easily track doubtful attitude and keep an eye for commuters traveling with heavy luggage. The officers should also be made to be prepared in case of occurrence of any emergency. Fig 2 (Source:Fencingmaterials.co.uk, 2019) Probability of occurrence of threats: It is known that probability can be measured as the possible number of ways in which any specific incident can happen out of any specific action or actions. In order to foresee security loss incidents, it is advised to come up with something appreciably less than the precision of the classic equation (Fesselmeyer, 2018).Some other factors, which 5
must be kept in consideration in case of any disruption of the assets that might lead to risks, would be: 1.The physical & the social environment, which includes the area, region where the depots are situated 2.The political, historical & the criminal state-of-art, which include the essential elements for evaluating the risk linked with this system. The physical and social environment deals with the location of the terminals near residents or other institutions. There should be proper fencing around the railway tracks to avoid the risk of loss of assets of the transport system. It is a common behavior noticed in the localities that they trespass the restricted zones and create many problems in the smooth functioning of the railways. Hence, the idea of a proper fencing system can help to avoid this risk (Aksehirli, 2018). In case of the other factors, the most important one would be the criminal state-of-art this has to be carefully renewed to achieve suitable results. The acts of terrorism, murders, kidnapping and burglary are very common now a days. People travelling to distant places often face these hazards and threats. As per the current project, Singapore had faced its maximum terror threats since 2001. Loss Impact – This can be measured in several ways. The consequence on the worker’s morale of the institution The consequences of risks on the railway officials The risk on the community relations The consequences, which create massive effect on commuters Any kind of threat poses a major impact on the people who face it. In case of the impact of the losses, the fiscal matter is common to all fields. The transport system involves huge amount of investment. In order to maintain a smooth functioning of the transport system up gradation of the older gadgets is a vital step. All these steps are necessary to uphold the systematic execution of the MRT in Singapore. Despite, the huge fiscal investment, threats and risks are common to occur in any field. In addition, the consequences of these threats are deep. It will require proper management of recovering from all threats. IN case of this project, The Transport department of 6
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Singapore should construct elaborate plans and programs to overcome such threats (Chapman, 2016). The risk managementprocess: The purpose of risk management is to reduce attacks on probable points. A probable point or target is an object, asset, process or policy that has real or relative worth. However, the degree to which a point is crucial depends mostly on the level of its worth. In addition, this worth or value is relatively depended on the extent of the impact that the loss will have on other activities. The environment surrounding a target regulates the extent of risk. Risk management takes place through extensive security planning which includes utilization of physical security obstacles, process and feedback forces. In this case of MRT, careful handling of security obstacles can do risk management. In addition, Proper checking of the terminals, Luggage section, Warning department, Installation of upgraded gadgets to ensure better risk avoidable chances By providing high standard training in security department, to the officials This will enable them to gain expertise in this field and will allow them to identify possible threats from beforehand. In addition, be able to avert or manage risks. In the case of this project, the risk management can be properly achieved by following these few steps: Due to its closeness to residential area, a 12 mm sound obstacle around the track should be installed. Massive sound and dust moderation should be maintained in order to make the surrounding area less polluted. Innovative Technological gadgets should be installed. These essential steps should be included in the project. Recommendation The project concerns about the discussion of Mass Rapid Transit (MRT). This scheme is effective to transport passengers swiftly from the countryside into the city and took away them back to the countryside in huge quantities (Hillson, 2017). The assets, threats, probability of occurrence, impact and consequences have been discussed. Through all the discussion some recommendations are needed to accelerate the effectiveness of it(Larson,2017). 7
The recommendations are also based on a few factors – Adjacentareas: The implementation of this project depends on the security system of adjacent areas (Kliemet al. 2019). To protect this authority from being harmed by any outskirt attack strong CCTV camera should be imposed to enhance its outer security system. The protection from adjacent areas comes under the sector of social environment. It deals with the pleased attitude of the passengers. By this, the existence of any terror group or any annoyed person can be easily detectable. By retaining a positive effect on the neighbor people the exploited situations can be prevented from being carried out (Falkner,2015). A strong security check system can also exaggerate the prevention measures. The place can be diminished by any outsider attack but the area security check will help to prevent such kind of activity. The positive behavior towards the adjacent area associations also will help to create safety boundary around the place and in addition enriches the safety and security concerns of the project. An influencing reinforcement should be conveyed to the employees to rear up a cohesive bond with them. It will help in the advancement of the project and it will lead the project to be successful during the implementation of the project. The MRT control centre should always maintain a strongly knit bond with the adjacent areas. Any kind of further implementation of changes the effects on the areas should keep in the priority list (Burtonshaw, 2017). Perimeter of site : Perimeter of site associates with the schematic fact of the site layout plan. The perimeter of the site should be secured by strong fencing. According to the plan, there will be three buildings. Each of the buildings will be constructed for different purposes. Therefore an inner fencing is also necessary to restrict the entry of the buildings (Fiksel, 2015). A reception area should also be constructed to give the entry pass to the people according to their necessities. 8
Thus, the security system can be imposed to the outsiders and in addition, this process can help to refine the entry of the outsiders. The perimeter area should be provided with electric fence. It will enhance security alarm at the time of any emergency. Electric fence will create an obstacle for the entry of any unauthenticated person or element. The fence should be modified in such a way that it should be able to detect any unidentified object at its prior position (Hyatt, 2018). The buildings should be built by maintaining a certain gap from the fence area. The capability of creating a detectable area should be there in the fence. For this, the fence should be needed to technically update. Reduction of the harmful issues is the main concern of the risk management strategies. The updated fence system can eliminate the risk of hazards created by the outsider. The most updated fencing system will be unique from others and it is necessary to imply unique ways to assign the proper level of security. A strong sensor based device should be set up in the perimeter area, which will guide the authority to identify the risks and vulnerable assets. The theft procedure also can be prevented which will provide protection to the project (Hornstein, 2015). Perimeter of site Perimeter ofsiteis important for the people working at the site as well as for the general public that might get affected by the site. The perimeter of the site is important for keepingany unauthorized person out of the area. This helps to avoid accidents of people thatwanderaround the site inadvertently without realizing it. Following are the recommendations - For security of the employees and other people it is required that the material used for the fencing is proper As the fencing is preventive measure in regards to stopping the material for being stolen or tampered it is necessary that the material used for the fencing are tested on the basis of its strength and durability The fencing also needs to be at a suitable distance that will helps in unrestricted as well as easy movement of the machinery and the employees 9
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Zoning and protection of vital restrictedareas: The security system and risk management of any area implies on the policy of zoning. There a comprehensive plan should be implemented to exaggerate of advancement of any area. A section should be built up to look over the zoning ordinance which will deal with the text and zoning map issues (Kerzner, 2017). The land use regulations should be imposed which will help the authority to differentiate the zones; it also can restrict the use of land and in addition with all these features can impose advancement standards. It helps to detect the requirements during the procedure. The residential, commercial, industrial and combination should be done to secure the authentication of the place. Rather in future, the effectiveness of the work can be forced to stop. Thus, the protection of the zoning areas can be secured. Beside this, the zoning areas should be governed under the strong technical device. Rather the protection issue of the project will rise anytime and that can harm the procedure of the project, which will certainly lead to a great damage. The vital records, information and issues should be protected to maintain the privacy policy of any project. The authority should prepare a backlog of vital records thus they will be able to gain it if there will be any loss of these records. A data security plan or policy should be mentioned to maintain the confidential concern of the issues. A strong password should be created by the project authority management to strengthen the security and privacy of the vital reports (Grote, 2015) The person should be reliable who will be assigned the responsibility of keeping those data. The data should be backed up in regular basis. It will be better if the management authority or the project head takes the responsibility of that confidential information. Security system and means : The security system and means should be updated according to the up gradation of the technology. The heart of any project implies to the security system. The exposing facts of 10
any project can diminish the aims and objectives of the project. To strengthen the security system the authority has to impose a strong biometric password. It is also the easiest way to apply (Haddadet al.2016). A strong firewall should be introduced towards the employees. The employees should be trained properly about the firewall issues. In case of any cyber protection or data protection, a strong antivirus program should be installed to protect the cyber theft procedure. The programs should be updated regularly, thus the confidential information and the data regarding the project can be secured and the employees can able to get the updated version of the work. It will help the advancement of the project. The laptops or the technical machines where the data and the information are kept should be secured by strong password and the authority maintains the privacy policy of using those data. It is said previously that the backup of all the data and the evidence of work procedure should be done in regular basis. The important thing is the observance of the higher authority. The concerned authority to keep the privacy policy safe and secure should monitor the data ardently. The encryption and the fidelity of the database should be rechecked spontaneously. Not all the employees should have the knowledge of the backdoor of the confidential information. The database should be segmented properly to manage the privacy policy. A sudden audit plan from the authorities can also help to restrict the anti-organizational activities (Diaoet al.2017). Security system and means Security system plays an important role for any organization. In this context it is essential to provide the necessary means and resources to the security authorities of the organization. Following recommendation are required to be implemented - It is necessary to involve diversity of technologies to protect the assets The secret video is required to be combined with the wireless communications and order to provide off-site monitoring facility 11
Theresourcesare required to be provided on time and the machines are required to be maintained in the proper way Security manpower, procedures and contingencyplans: The advancement of security worker system of any organization lies in the improvement of security guard system. Few recommendations are needed to accelerate the privacy policy in the security system of this project - The surveillance system for the security authorities should be reviewed at least in the alternative of the week. The guards should be provided by the training of using advanced technologies through this the utility of the technologies can be implemented properly. The qualification of the guards should be a matter of concern as without minimum qualification they will not be able to understand the usage of modern technologies (Liet al.2017). The inspections should be done frequently to get access over the liability of the security system. Reliable persons should be appointed to take care of this job. To give emphasis on the contingency plans the first work of the authority is to recognize the key risks during the time of implementation of the project and the risk factors, which will hindrance the progress of the project. After identifying, the risk factors should be prioritized. The contingency plans should be imposed to diminish the risk factors. The authorities should take the responsibility to utilize the plan and to maintain the plan. As contingency plan is the backup plan of any project management, therefore it should be a successful plan because these plans will be imposed if the identified risk becomes a reality. A contingency plan should include the measures at the time of risk of any natural disasters. The plans should be made in such a way that the threatening of employees due to job injuries also can be solved. The contingency plan should be created not to reduce the impact of the risk but to develop response if the risk occurs. 12
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
By applying the plans the resources should be protected, the inconvenience at workplace should be minimized (Sahebjamniaet al.2015). The responsibilities in the context of the recovery should be assigned specifically. When a contingency plan is written thenmake it sure that every employee has this copy, if every employee does not imply those then there must be some communication gap in this plan and according to that the authority should change the plan. Conclusion The risk assessment analysis takes up various issues under consideration. The mass rapid transit system is taken under consideration. It is about dealing with an enormous network that connects a huge number of stations. It involves a wide network of railway lines that connects with each other. A large number of cities is connected via the mass rapid transit system. A large number of people are benefited because of this system. It permits quick transportation facilities. The capacity to carry is made enormously high. These advanced facilities also give way to a large number of risks. The assessment of risk or the analysis seeks to undertake various situations under consideration. The various factors that might lead to the occurrence of risksare taken in for consideration. The risk analysis undertakes to review such factors. It seeks to ensure that sufficient provision is made for handle situations of stress and extreme strain. The security issues arelooked into carefully.CCTV cameras should be used to ensure security and safety issues. As a whole lot of checks are made. Important considerations are made for the purpose of security issues. The use of advanced technology is recommended for the purpose of security issues. Advanced sensor devices could be used to detect threats. Risk assessment focuses upon the various risks and the emergent situations that could arise. It involves dealing with the various factors associated with risk and sorting out issues. It involves staying clean and readyto face situations that might demand emergent decisions to be made. 13
Reference list Aksehirli, E. and Li, Y., 2018, November. Predicting MRT Trips in Singapore by Creating a Mobility Behavior Model Based on GSM Data. In2018 IEEE International Conference on Data Mining Workshops (ICDMW)(pp. 632-639). IEEE. Bessis, J., 2015.Risk management in banking. John Wiley & Sons. Bilveer,S.andVasoo,S.eds.,2018.CriticalIssuesinAssetBuildinginSingapore's Development. World Scientific. Binti Sa’adin, S.L., Kaewunruen, S. and Jaroszweski, D., 2016. Heavy rainfall and flood vulnerability of Singapore-Malaysia high speed rail system.Australian Journal of Civil Engineering,14(2), pp.123-131. Burtonshaw-Gunn, S.A., 2017.Risk and financial management in construction. Routledge. Chapman, R.J., 2016.The rules of project risk management: Implementation guidelines for majorprojects. Routledge. Diao, M., Fan, Y. and Sing, T.F., 2017. A new Mass Rapid Transit (MRT) line construction and housing wealth: Evidence from the Circle Line. Diao, M., Leonard, D. and Sing, T.F., 2017. Spatial-difference-in-differences models for impact of new mass rapid transit line on private housing values.Regional Science and Urban Economics,67, pp.64-77. Falkner, E.M. and Hiebl, M.R., 2015. Risk management in SMEs: a systematic review of available evidence.The Journal of Risk Finance,16(2), pp.122-144. Fencingmaterials.co.uk. (2019). [online] Available at: https://www.fencingmaterials.co.uk/files/large/railtrack-fence3.jpg [Accessed 24 Jun. 2019]. Fesselmeyer, E. and Liu, H., 2018. How much do users value a network expansion? evidence fromthepublictransitsysteminSingapore.RegionalScienceandUrban Economics,71, pp.46-61. Fiksel, J., 2015. From risk to resilience. InResilient by Design(pp. 19-34). Island Press, Washington, DC. 14
Grote, G., 2015. Promoting safety by increasing uncertainty–Implications for risk management. Safety science,71, pp.71-79. Haddad, R.K., Reda, E., Rasani, M.R., Zedan, C.M. and Harun, Z., 2016. Fire Simulation of a Scaled Mass Rapid Transit (MRT) Tunnel. Hillson,D.andMurray-Webster,R.,2017.Understandingandmanagingriskattitude. Routledge. Hopkin,P.,2018.Fundamentalsofriskmanagement:understanding,evaluatingand implementing effective risk management. Kogan Page Publishers. Hornstein, H.A., 2015. The integration of project management and organizational change management is now a necessity.International Journal of Project Management, 33(2), pp.291-298. Hung, C.W., Lai, C.M. and Su, F.L., 2018. Evaluate the Impact on Adjacent MRT Station from Shield Tunneling by Numerical Analysis and Risk Management–Taking Taipei MRTCircularLineforExample.InProceedingsofthe2ndInternational Symposium on Asia Urban GeoEngineering(pp. 332-345). Springer, Singapore. Hyatt, N., 2018.Guidelines for process hazards analysis (PHA, HAZOP), hazards identification, and risk analysis. CRC press. Kerzner, H., 2017.Project management: a systems approach to planning, scheduling, and controlling. John Wiley & Sons. Kliem, R.L. and Ludin, I.S., 2019. Reducing project risk. Routledge. Lam, J.S.L. and Lassa, J.A., 2017. Risk assessment framework for exposure of cargo and ports to natural hazards and climate extremes.Maritime Policy & Management,44(1), pp.1-15. Larson, E.W. and Gray, C.F., 2017.Project management: The managerial process. McGraw-Hill Education. Li, G., Chen, C.J., Peng, W.C. and Yi, C.W., 2017. Estimating Crowd Flow and Crowd Density fromCellularDataforMassRapidTransit.InProceedingsofThe6th International Workshop on Urban Computing (in Conjunction with ACM KDD 2017). McNeil, A.J., Frey, R. and Embrechts, P., 2015.Quantitative Risk Management: Concepts, Techniques and Tools-revised edition. Princeton university press. 15
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Ong, S.E., Chau, C. and Wu, J., 2017.The Effects of Downtown Line MRT on Property Values (No. eres2017_52). European Real Estate Society (ERES). Sahebjamnia, N., Torabi, S.A. and Mansouri, S.A., 2015. Integrated business continuity and disaster recovery planning: Towards organizational resilience.European Journal of Operational Research,242(1), pp.261-273. Sc01.alicdn.com.(2019).[online]Availableat: https://sc01.alicdn.com/kf/HTB1ASoEJVXXXXcnXXXXq6xXFXXXI/Factory- price-railway-safety-fence.jpg_350x350.jpg [Accessed 24 Jun. 2019]. Suzuki, K. and Pheng, L.S., 2019. The Construction Industry and International Firms in Singapore. InJapanese Contractors in Overseas Markets(pp. 37-60). Springer, Singapore. Uhl, A. and Gollenia, L.A. eds., 2016.A handbook of business transformation management methodology. Routledge. 16