The Ultimate BIM Knowledge Hub
Learn the Lingo
Discover a vast dictionary of BIM terms to give you the edge in the industry.
How To Blog Posts
Find helpful tutorials and guides to master the art of BIM.
BIM Best Practices
Stay ahead of the curve with our comprehensive resources and tips.
CONTENT
risk appetite
amount and type of risk that an organization is willing to pursue or retain [cited from ISO 19650-5:2020(en), 3.5]
Risk management
Risk management provides an overview of using risk analysis as an organized method for identifying and measuring risks. How to effectively assemble and manage a
risk register
means a risk register containing the risks associated with the timely delivery of information as may be identified in the Information Particulars and/or provided in
Risk Register
means a risk register containing the risks associated with the timely delivery of information as may be identified in the Information Particulars and/or provided in
Role
BIM roles are not necessarily related to specialist positions. It should be viewed as a function that could be fulfilled by more than one person
Royal Institute of British Architects (RIBA)
RIBA Plan Of Work 2020 0 – Strategic Definition is about determining the best means of achieving the client’s requirements. An open mind is required
Scope
Bid response should include a scope management plan containing all the tasks necessary for successful project delivery. The plan shall define the implementation and verification
secondary power supply (SPS)
alternative or supplementary electrical energy sources has become more viable, typical secondary power supply (SPS) Photovoltaic (PV) power Wind turbine power standby generator
security
state of relative freedom from threat (3.13) or harm caused by deliberate, unwanted, hostile or malicious acts [cited from ISO 19650-5:2020(en), 3.7]
security breach
infraction or violation of security (3.7) [1] 1 Online Browsing Platform (OBP) [WWW Document], n.d. URL https://www.iso.org/obp/ui#search (accessed 4.10.21).
Security Management Plan
A document (or part of a document) identified in the Information Particulars setting out the security requirements for carrying out the Works in a security-minded
Selectivity
Selectivity is achieved where,under overcurrent conditions, the protective device nearest the fault operates rather than any protective device on the supply side of it,ensuring that
Semantic Web
The Semantic Web, as defined by Ontotext[1] is the extension of the existing information and data on a network (or Web) to include data descriptors,
Semi-enclosed fuse rating factor (Cf)
The rating factor Cf = 0.725 is applied to cable sizing calculations for any circuit protected by a semi-enclosed fuse to BS3036.
Sensitive Information
information, the loss, misuse or modification of which, or unauthorized access to, could:(a) adversely affect the privacy, welfare or safety of an individual or individuals;(b)
Sequence Flow (Normal or Uncontrolled)
A sequence flow is used to show the order in which activities in a process or choreography will be performed.[1] Symbol 1] Silver, B. (2009).
Set-Based Design
Set-Based Design commonly referred to as a set-based design innovation or set-based concurrent engineering. It is a product development approach where teams consider a wide
SHARED
All project Model Authors’ information for the use of the entire project team. The Federated Model Manager will combine all information for checking against the
single source of truth
In AEC industry with reference to information systems management, the single source of truth refers to Common Data Environment (CDE) The single source of truth
smart asset management
The terminology such as digital built environment and smart asset management, often referred to as Digital Construction, encompasses multiple technologies and processes related to information