Reference no: EM131510545
Operations Safety Management Plan
Review the information in your textbook (Leveson, 2011, pp. 412-414) related to the Operations Safety Management Plan design.
Review the Figure C.1 depiction of a sample Safety Control Structure in your textbook (Leveson, 2011, p. 500).
Review and use a minimum of five (5) peer-reviewed journal articles from the CSU Online Library (Academic Search Complete) to support your design work.
Then, select one (1) of the following options:
Option 1: Design an Operations Safety Management Plan for your own organization or an organization that is familiar to you.
Option 2: Design an Operations Safety Management Plan for a bulk tank railcar off-loading facility for hydrocarbon products that has the following features:
a. one railcar switch located next to an interstate highway,
b. capacity to off-load both liquid hydrocarbon products and liquefied, compressed, natural gas products,
c. two 500,000-gallon bulk liquid storage tanks for liquid hydrocarbon products,
d. two 45,000-gallon bullet-styled, horizontal, liquid storage tanks for liquefied, compressed natural gas products,
e. one off-loading station (single-sided) that is elevated 12 feet from the ground,
f. one flare for over-pressurized gas tank railcars,
g. one 3,000-gallon condensation storage tank, and
h. one switch engine for staging railcars at the off-loading station and at railcar storage tracks.
Using the CSU APA-styled paper as a formatting template, design a minimum eight-page Operations Safety Management Plan with a minimum of five (5) scholarly sources (books and articles) using the following APA Level 1 headings:
1. General Considerations
2. Safety Organization
3. Procedures
4. Schedule
5. Safety Information System
6. Operations Hazard Analysis
7. Evaluation and Planned Use of Feedback for System Maintenance
8. Safety Control Structure Diagram (Design a Safety Control Structure Diagram for your work system and use as the content.)
How would a nuclear war be different from wars in the past
: Dependency on computers and their networks can be exploited by terrorists through the use of tactics that fall into two broad categories.
|
Exact worst-case running-time of the algorithm
: Determine a function f(n) that is the exact worst-case running-time of the algorithm. Determine a function g(n) that is a good lower-bound of the best-case.
|
Assess what the group behavior was like under this leader
: Review the organization this Leader was at the top of and assess what the group behavior was like under this Leader.
|
What does that character fear or desire
: Discussion papers, 20 points each: For some assigned readings, students must turn in a 400-500 word, typed, double-spaced paper to be used as the basis.
|
Design an operations safety management plan
: Design an Operations Safety Management Plan for your own organization or an organization that is familiar to you.
|
Systems implementation and integration
: Let's discuss the design phase. The design phase decides how the system will operate in terms of the hardware, software, and network infrastructure that will be
|
Explain how ikeas supply chain support its value proposition
: How do IKEA's products, services, and related attributes satisfy the wants and needs known as its value proposition?
|
Hazard-related incidents resulting in serious injuries
: To avoid hazard-related incidents resulting in serious injuries, human error potentials must be addressed at the cultural, organization, management system
|
Possible for the block size for a file system
: It is possible for the block size for a file system to be less than, equal to, or greater than the size of the block size provided by the physical disk.
|