In its 8th edition the SAFE conference continues to publish important research contributing to the development of the field. The papers included in this volume are the work of engineers, scientists, field researchers, managers and other specialists involved in one or more of the theoretical and practical aspects of safety and security.
A new approach to safety, based on systems thinking, that is more effective, less costly, and easier to use than current techniques. Engineering has experienced a technological revolution, but the basic engineering techniques applied in safety and reliability engineering, created in a simpler, analog world, have changed very little over the years. In this groundbreaking book, Nancy Leveson proposes a new approach to safety—more suited to today's complex, sociotechnical, software-intensive world—based on modern systems thinking and systems theory. Revisiting and updating ideas pioneered by 1950s aerospace engineers in their System Safety concept, and testing her new model extensively on real-world examples, Leveson has created a new approach to safety that is more effective, less expensive, and easier to use than current techniques. Arguing that traditional models of causality are inadequate, Leveson presents a new, extended model of causation (Systems-Theoretic Accident Model and Processes, or STAMP), then shows how the new model can be used to create techniques for system safety engineering, including accident analysis, hazard analysis, system design, safety in operations, and management of safety-critical systems. She applies the new techniques to real-world events including the friendly-fire loss of a U.S. Blackhawk helicopter in the first Gulf War; the Vioxx recall; the U.S. Navy SUBSAFE program; and the bacterial contamination of a public water supply in a Canadian town. Leveson's approach is relevant even beyond safety engineering, offering techniques for “reengineering” any large sociotechnical system to improve safety and manage risk.
This open access book explores the synergies and tensions between safety and security management from a variety of perspectives and by combining input from numerous disciplines. It defines the concepts of safety and security, and discusses the methodological, organizational and institutional implications that accompany approaching them as separate entities and combining them, respectively. The book explores the coupling of safety and security from different perspectives, especially: the concepts and methods of risk, safety and security; the managerial aspects; user experiences in connection with safety and security. Given its scope, the book will be of interest to researchers and practitioners in the fields of safety and security, and to anyone working at a business or in an industry concerned with how safety and security should be managed.
The third edition of Safety Engineering: Principles and Practices has been thoroughly revised, updated, and expanded. It provides practical information for students and professionals who want an overview of the fundamentals and insight into the subtleties of this expanding discipline.Although this book primarily serves as a textbook, managers and technical personnel will find it a useful reference in dealing with complex safety matters and in planning worker training. This edition includes topics such as identifying regulatory requirements, handling contemporary problem that affect the modern worker, complying with record-keeping requirements, and much more. Many courses and curriculum focus on purely theoretical and scientific aspects of safety and related topics. Often, these students are lacking the fundamental concepts and principles that are required in the real world. Safety Engineering: Principles and Practices helps bridge the gap between what is typically taught and what is truly needed.
Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) introduces a new methodology to help critical infrastructure owners, operators and their security practitioners make demonstrable improvements in securing their most important functions and processes. Current best practice approaches to cyber defense struggle to stop targeted attackers from creating potentially catastrophic results. From a national security perspective, it is not just the damage to the military, the economy, or essential critical infrastructure companies that is a concern. It is the cumulative, downstream effects from potential regional blackouts, military mission kills, transportation stoppages, water delivery or treatment issues, and so on. CCE is a validation that engineering first principles can be applied to the most important cybersecurity challenges and in so doing, protect organizations in ways current approaches do not. The most pressing threat is cyber-enabled sabotage, and CCE begins with the assumption that well-resourced, adaptive adversaries are already in and have been for some time, undetected and perhaps undetectable. Chapter 1 recaps the current and near-future states of digital technologies in critical infrastructure and the implications of our near-total dependence on them. Chapters 2 and 3 describe the origins of the methodology and set the stage for the more in-depth examination that follows. Chapter 4 describes how to prepare for an engagement, and chapters 5-8 address each of the four phases. The CCE phase chapters take the reader on a more granular walkthrough of the methodology with examples from the field, phase objectives, and the steps to take in each phase. Concluding chapter 9 covers training options and looks towards a future where these concepts are scaled more broadly.
The overall design and strategies that create work systems within organizations must be evaluated and analyzed in order to ensure that all structures of a company are properly harmonized. Harmonizing all aspects of a company serves to optimize workflow and support all interactions between employees, machines, and software utilized by the company. Advanced Macroergonomics and Sociotechnical Approaches for Optimal Organizational Performance provides emerging research exploring the theoretical and practical aspects of system harmonization and applications within macroergonomics. Featuring coverage on a broad range of topics such as stress-related conditions, organizational culture, and worker health, this book is ideally designed for ergonomists, human resource professionals, manufacturing engineers, industrial engineers, industrial designers, researchers, industry practitioners, research scientists, and academics seeking current research on the optimization of workflow and work systems.
Technology in today’s world has continued to develop into multifaceted structures. The performance of computers, specifically, has significantly increased leading to various and complex problems regarding the dependability of these systems. Recently, solutions for these issues have been based on soft computing methods; however, there lacks a considerable amount of research on the applications of these techniques within system dependability. Soft Computing Methods for System Dependability is a collection of innovative research on the applications of these processing techniques for solving problems within the dependability of computer system performance. This book will feature comparative experiences shared by researchers regarding the development of these technological solutions. While highlighting topics including evolutionary computing, chaos theory, and artificial neural networks, this book is ideally designed for researchers, data scientists, computing engineers, industrialists, students, and academicians in the field of computer science.
The formidable challenge of harmonizing economic imperatives with ecological responsibility in supply chain operations only increases with added complexity. In an era where global commerce is interwoven with environmental concerns, Sustainable Supply Chain Management for Environmental Responsibility is the pivotal resource that addresses the pervasive challenge of implementing Sustainable Supply Chain Management (SSCM). It navigates the intricate terrain of SSCM, offering an authoritative exploration of its key elements, drivers, and challenges. This book dissects the foundational principles of SSCM, revealing its relevance and significance in fostering environmental stewardship. Readers embark on a journey through the core elements of SSCM, from green procurement and sustainable production to optimizing logistics through technology-driven solutions. The narrative is grounded in academic rigor, enriched with case studies of companies that have triumphantly embraced SSCM, showcasing tangible benefits such as cost reduction, enhanced brand reputation, and heightened customer loyalty. This book is ideal for managers, academics, and students and unfolds environmental responsibility within the intricate fabric of supply chain operations.
Containing the papers from the 11th International Conference on Computer Simulation in Risk Analysis and Hazard Mitigation 2018, this book will be of interest to those concerned with all aspects of risk management and hazard mitigation, associated with both natural and anthropogenic hazards. Current events help to emphasise the importance of the analysis and management of risk to planners and researchers around the world. Natural hazards such as floods, earthquakes, landslides, fires and others have always affected human societies. The more recent emergence of the importance of man-made hazards is a consequence of the rapid technological advances made in the last few centuries. The interaction of natural and anthropogenic risks adds to the complexity of the problems. The included papers, presented at the Risk Analysis Conference, cover a variety of topics related to risk analysis and hazard mitigation.
This bookdefines more than 900 metrics measuring compliance with current legislation, resiliency of security controls, and return on investment. It explains what needs to be measured, why and how to measure it, and how to tie security and privacy metrics to business goals and objectives. The metrics are scaled by information sensitivity, asset criticality, and risk; aligned to correspond with different lateral and hierarchical functions; designed with flexible measurement boundaries; and can be implemented individually or in combination. The text includes numerous examples and sample reports and stresses a complete assessment by evaluating physical, personnel, IT, and operational security controls.