141,99 €
Risk management deals with prevention, decision-making, action taking, crisis management and recovery, taking into account the consequences of unexpected events. The authors of this book are interested in ecological processes, human behavior, as well as the control and management of life-critical systems, which are potentially highly automated. Three main attributes define life-critical systems, i.e. safety, efficiency and comfort. They typically lead to complex and time-critical issues and can belong to domains such as transportation (trains, cars, aircraft), energy (nuclear, chemical engineering), health, telecommunications, manufacturing and services. The topics covered relate to risk management principles, methods and tools, and reliability assessment: human errors as well as system failures, socio-organizational issues of crisis occurrence and management, co-operative work including human.machine cooperation and CSCW (computer-supported cooperative work): task and function allocation, authority sharing, interactivity, situation awareness, networking and management evolution and lessons learned from Human-Centered Design.
Sie lesen das E-Book in den Legimi-Apps auf:
Seitenzahl: 570
Veröffentlichungsjahr: 2014
First published 2014 in Great Britain and the United States by ISTE Ltd and John Wiley & Sons, Inc.
Apart from any fair dealing for the purposes of research or private study, or criticism or review, as permitted under the Copyright, Designs and Patents Act 1988, this publication may only be reproduced, stored or transmitted, in any form or by any means, with the prior permission in writing of the publishers, or in the case of reprographic reproduction in accordance with the terms and licenses issued by the CLA. Enquiries concerning reproduction outside these terms should be sent to the publishers at the undermentioned address:
ISTE Ltd27-37 St George’s RoadLondon SW19 4EUUK
www.iste.co.uk
John Wiley & Sons, Inc.111 River StreetHoboken, NJ 07030USA
www.wiley.com
© ISTE Ltd 2014The rights of Patrick Millot to be identified as the author of this work have been asserted by him in accordance with the Copyright, Designs and Patents Act 1988.
Library of Congress Control Number: 2014947879
Contents
List of Figures
List of Tables
Foreword
Introduction
PART 1 General Approaches for Crisis Management
1 Dealing with the Unexpected
1.1. Introduction
1.2. From mechanics to software to computer network
1.3. Handling complexity: looking for new models
1.4. Risk taking: dealing with nonlinear dynamic systems
1.5. Discussion
1.6. Conclusion
1.7. Bibliography
2 Vulnerability and Resilience Assessment of Infrastructures and Networks: Concepts and Methodologies
2.1. Introduction
2.2. Risk and vulnerability
2.3. Vulnerability analysis and assessment
2.4. Resilience and main associated concepts
2.5. Paradigms as consequence of risk analysis extension
2.6. Resilience analysis and assessment
2.7. Conclusion: new challenges
2.8. Bibliography
3 The Golden Hour Challenge: Applying Systems Engineering to Life-Critical System of Systems
3.1. Introduction
3.2. The Golden hour: toward a resilient life-critical system of systems
3.3. Systems of systems engineering
3.4. Next steps forward
3.5. Bibliography
4 Situated Risk Visualization in Crisis Management
4.1. Introduction
4.2. Crisis management, emergency management and business continuity
4.3. Risk management in critical operations
4.4. Situated risk visualization in critical operations
4.5. Conclusions and perspectives
4.6. Bibliography
5 Safety Critical Elements of the Railway System: Most Advanced Technologies and Process to Demonstrate and Maintain Highest Safety Performance
5.1. Railways demonstrate the highest safety performance for public transportation
5.2. Key success factors
5.3. The European very high-speed rail technology: a safety concept with more than 30 years of experience and continuous innovation in the technology
5.4. Project management and system integration
5.5. Procedure for risk management
5.6. Conclusion
6 Functional Modeling of Complex Systems
6.1. Introduction
6.2. The modeling paradigm of MFM
6.3. Uses of functional modeling
6.4. Multilevel flow modeling
6.5. Conclusions
6.6. Bibliography
PART 2 RISK MANAGEMENT AND HUMAN FACTORS
7 Designing Driver Assistance Systems in a Risk-based Process
7.1. Risk-based design in perspective
7.2. Human factors in risk-based design
7.3. A quasi-static methodology
7.4. Implementation on board vehicles for driver assistance
7.5. A case study
7.6. Conclusions
7.7. Bibliography
8 Dissonance Engineering for Risk Analysis: A Theoretical Framework
8.1. Introduction
8.2. The concept of dissonance
8.3. A theoretical framework for risk analysis
8.4. Examples of application of the theoretical framework
8.5. Conclusion
8.6. Bibliography
9 The Fading Line between Self and System
9.1. Introduction
9.2. Four events
9.3. Development, drama
9.4. Views on human error
9.5. Peirce’s triadic semiotic system
9.6. Abduction, or how do humans form conclusions
9.7. Heidegger and Descartes
9.8. Designing the signs
9.9. Consequences
9.10. Conclusions
9.11. Bibliography
10 Risk Management: A Model for Procedure Use Analysis
10.1. Introduction
10.2. Procedures in nuclear power
10.3. Description of the model
10.4. Application of the model
10.5. Significance
10.6. Conclusions
10.7. Acknowledgements
10.8. Bibliography
11 Driver-assistance Systems for Road Safety Improvement
11.1. Introduction
11.2. Driver’s vigilance diagnostic
11.3. Driver distraction diagnostic
11.4. Human–machine interaction concept
11.5. Conclusions
11.6. Bibliography
PART 3 Managing Risk via Human–Machine Cooperation
12 Human–Machine Cooperation Principles to Support Life-Critical Systems Management
12.1. Context
12.2. Human–machine cooperation model
12.3. Common work space
12.4. Multilevel cooperation
12.5. Towards a generic modeling of human–machine cooperation
12.6. Conclusion and perspectives
12.7. Bibliography
13 Cooperative Organization for Enhancing Situation Awareness
13.1. Introduction
13.2. Procedure-based behavior versus innovative behavior
13.3. Situation awareness: between usefulness and controversy
13.4. Collective SA: how to take the agent’s organization into account?
13.5. Enhancing collective SA with a support tool issued of cooperation concepts: the common work space
13.6. Conclusion
13.7. Bibliography
14 A Cooperative Assistant For Deep Space Exploration
14.1. Introduction
14.2. The virtual camera
14.3. Evaluation
14.4. Future work
14.5. Conclusion
14.6. Bibliography
15 Managing the Risks of Automobile Accidents via Human–Machine Collaboration
15.1. Introduction
15.2. Trust as human understanding of machine
15.3. Machine understanding of humans
15.4. Design of attention arousal and warning systems
15.5. Trading of authority for control from the driver to the machine under time-critical situations
15.6. Conclusions
15.7. Bibliography
16 Human–Machine Interaction in Automated Vehicles: The Abv Project
16.1. Introduction
16.2. The ABV project
16.3. Specifications of the human–machine cooperation
16.4. Cooperation realization
16.5. Results
16.6. Conclusion
16.7. Bibliography
17 Interactive Surfaces, Tangible Interaction: Perspectives for Risk Management
17.1. Introduction
17.2. State of the art
17.3. Proposition: distributed UI on interactive tables and other surfaces for risk management
17.4. Case studies
17.5. Conclusion
17.6. Acknowledgments
17.7. Bibliography
Conclusion
C.1. A large range of Life-critical Systems
C.2. Evolution of risk management methods
C.3. Risk management and human factors
C.4. Bibliography
List of Authors
Index
List of Figures
1.1. Expected and actual situation showing small and bigger variations
2.1. Factors shaping the risks faced to critical infrastructures [KRO 08]
2.2. A proposition of risk situations and relevant risk assessment strategies
3.1. eCall: the crashed car calls 112! [EC 13e]
3.2. N² matrix of pairings of different systems within the system of systems [RUA 11]
3.3. Functional model of the accident detection system architecture [RUA 11]
4.1. RTO and maximum tolerable period of disruption [COR 07]
4.2. Global view of the 3D interactive scene – Unity 3D [STE 13] (For a color version of this figure, seewww.iste.co.uk/millot/riskmanagement)
5.1. Range of order that has been observed for the last decade
5.2. Main components of a railway system
5.3. The bogie integrating six safety critical functions
5.4. Classical development V-cycle
5.5. Risk management organization in European Union
5.6. Technics for identification and evaluation of hazards and their subsequent risks
5.7. European safety management system
5.8. Safety authorization and safety management system
6.1. The means-end relation
6.2. Means-end structure showing the possible combinations of means-end relations
6.3. MFM concepts
6.4. A heat transfer loop
6.5. MFM of heat transfer loop without control
6.6. MFM of heat transfer loop with flow and temperature control
6.7. MFM model of heat transfer loop with a protection system suppressing high temperature in HE2
7.1. Risk-based design methodology flowchart
7.2. Sheridan’s five levels of “supervisory control” (adapted from [SHE 97])
7.3. A generic operator model (adapted from [CAR 07])
7.4. Essential nature of human–machine interaction
7.5. Error propensity (EP) and dynamic generation of sequences
7.6. General structure of the quasi-static methodology for RBD
7.7. Expanded human performance event tree (adapted from [CAC 12])
7.8. Generic risk matrix. For a color version of this figure, seewww.iste.co.uk/millot/riskmanagement.zip
7.9. ADAS at level of driving task a) and temporal sequence of intervention b)
7.10. EHPET for the case study with ADAS
8.1. The DIMAGE model
8.2. Stable and unstable level of a dissonance dimension
8.3. The theoretical framework based on human– machine learning to control dissonances
8.4. The reverse comic strip-based approach to identify dissonances
8.5. Examples of emotion and sound variation images
8.6. The knowledge analysis algorithm
8.7. The dissonance evaluation algorithm
8.8. The generic reinforcement based on learning process
8.9. A reinforcement algorithm by case-based reasoning
8.10. The interpretation of pictures from rail platform signaling systems
8.11. The associated reverse comic strip for dissonance identification
8.12. The associated rule analysis for dissonance identification and evaluation
8.13. A prediction process based on the knowledge reinforcement
8.14. The correct prediction rate by reinforcing the knowledge base
9.1. Depiction of Peirce’s triadic relationship between object, sign and interpretation
9.2. Diagram illustrating the problems of determining causes and control actions in an uncertain system. An unknown disturbance might be acting on the system, a shift in its parameter may have happened, leading to a qualitative change in dynamics, or a structural change might have occurred, leading to a significantly different system. The innovation or surprise i is the difference between observation and expectation, and may lead to adjustment. Whether control is based on observation or on expectation is uncertain, and probably variable
10.1. A model for procedure analysis
11.1. Examples of driver-assistance systems
11.2. Vehicle/driver/environment system
11.3. T involuntary transition from waking to sleeping (from Alain Muzet)
11.4. Algorithmic principle for the hypovigilance diagnostic of the driver and results of this analysis on a subject in real driving conditions
11.5. Classification principles for visual distraction detection
11.6. DrivEasy concept
12.1. Attributes of cooperative agent
12.2. Cooperative activity through agents’ know-how (Agi KH), agents’ know-how-to-cooperate (Agi KHC), agents’ situation awareness (Agi SA), common frame of reference (COFOR), team situation awareness (Team SA) and common work space
12.3. Fighter aircraft CWS (example of the tactical situation SITAC). For a color version of this figure, seewww.iste.co.uk/millot/riskmanagement
12.4. Multilevel cooperation
12.5. Cooperative tasks 1-KH; 2-CWS; 3-KHC (current task); 4-KHC (intention); 5-KHC (authority); 6-KHC (model)
12.6. Robotics CWS. For a color version of this figure, seewww.iste.co.uk/millot/riskmanagement
12.7. Example of agents’ abilities identification for task sharing and authority management (red arrows). For a color version of this figure, seewww.iste.co.uk/millot/riskmanagement.zip
13.1. Allocation of functions among humans and machines (adapted from [BOY 11])
13.2. SA three-level model adapted from [END 95a]
13.3. Team-SA adapted from [SAL 08]
13.4. The three forms for task distribution according to agents KH and related tasks to share
13.5. Task distribution and related SA distribution, in the augmentative and integrative forms
13.6. Task distribution and related SA distribution, in the debative form
13.7. CWS principle for team SA [MIL 13]
14.1. The model of cooperation between astronauts and ground-based experts and how it is changing for deep space exploration
14.2. Virtual camera data feedback loop
14.3. The human-centered design process for the development of the virtual camera
14.4. Riding in the NASA Lunar Electric Rover vehicle at DesertRATS, collecting user requirements for the development of the VC
14.5. Horizontal prototype for the VC showing icons and interface. For a color version of this figure, seewww.iste.co.uk/millot/riskmanagement
14.6. The VC vertical prototype with icons labeled. For a color version of this figure, seewww.iste.co.uk/millot/riskmanagement
15.1. The structure of trust
15.2. Deceleration meter
15.3. a) Pressure distribution sensors and b) the obtained data. For a color version of this figure, seewww.iste.co.uk/millot/riskmanagement
15.4. Pressure distribution sensors and the obtained data [ISH 13]. For a color version of this figure, seewww.iste.co.uk/millot/riskmanagement
15.5. Model of driver lane change intent emergence [ZHO 09]
15.6. a) The attention arousing display and b) its effects on THW [ITO 13a]. For a color version of this figure, seewww.iste.co.uk/millot/riskmanagement
15.7. Driver reaction against the rapid deceleration of the forward vehicle [ITO 08b]
15.8. A situation machine protective action is needed. In this example, the left lane is the cruising lane and the right lane is the passing lane. The vehicle in the right lane is in the blind spot of the side-view mirror of the host vehicle
16.1. Structure of the ABV project
16.2. Graph of the different modes of the ABV system
16.3. Graph of the different modes of the ABV system. For a color version of this figure, seewww.iste.co.uk/millot/riskmanagement
16.4. Driver monitoring system from Continental. For a color version of this figure, seewww.iste.co.uk/millot/riskmanagement
16.5. Shared driving control architecture
16.6. Experimental results on the SHERPA simulator. For a color version of this figure, seewww.iste.co.uk/millot/riskmanagement
16.7. Evaluation of the sharing quality. For a color version of this figure, seewww.iste.co.uk/millot/riskmanagement
17.1. Two configurations for risk management UI: a) centralized distribution of U; b) network of distributed UI [LEP 11]. For a color version of this figure, seewww.iste.co.uk/millot/riskmanagement.zip
17.2. Crisis unit using TangiSense and other platforms (adapted from [LEP 11]). For a color version of this figure, seewww.iste.co.uk/millot/riskmanagement.zip
17.3. A road traffic simulation on two TangiSense interactive tables. For a color version of this figure, seewww.iste.co.uk/millot/riskmanagement.zip
17.4. Use of zoom tangible object, without effect on the other table. For a color version of this figure, seewww.iste.co.uk/millot/riskmanagement.zip
17.5. Tangiget synchronization with effect on TangiSense 2. For a color version of this figure, seewww.iste.co.uk/millot/riskmanagement.zip
17.6. The TangiSense table as equipped for the risk game with ground map display, tangible objects and virtual feedback shown. For a color version of this figure, seewww.iste.co.uk/millot/riskmanagement.zip
17.7. Functional view showing the various types of agents, filters and traces. For a color version of this figure, seewww.iste.co.uk/millot/riskmanagement.zip.
List of Tables
2.1. Classification of initiating events
2.2. Site/building inherent vulnerability assessment matrix (partial risk assessment) [FEM 03]
3.1. Major problems and respective drivers that eCall can improve [EC 11a]
4.1. Approaches to crisis management
4.2. Crisis features, types and questions to be answered [STE 13]
7.1. Possible data for the traffic light scenario
10.1. Have you ever witnessed a scenario where?
10.2. Solutions table for Case 15
10.3. Decision point metrics
14.1. A use case for surface exploration
15.1. Scale of degrees of automation [SHE 92, INA 98]
Foreword
The theme “Risk Management in Life Critical Systems” resulted from a cooperative work between LAMIH (French acronym for Laboratory of Industrial and Human Automation, Mechanics and Computer Science) at the University of Valenciennes (France) and Human-Centered Design Institute (HCDi) at Florida Institute of Technology (USA) within the framework of the Partner University Funds (PUF) Joint Research Lab on Risk Management in Life-Critical Systems co-chaired by me and Dr Guy A. Boy.
A summer school on the above theme was held at Valenciennes on 1–5 July 2013, which had gathered more than 20 specialists from the domain from seven countries (i.e. France, USA, Italy, Germany, Netherland, Japan and Denmark) among the most developed ones where “safety” assumes an increasing importance. This book is the result of the contribution of most of these researchers.
This book relates to the management of risk. Another book, focusing on risk taking, will be edited by my colleague Dr Guy A. Boy and published by Springer, UK.
Patrick MILLOTSeptember 2014
Introduction
Introduction written by Patrick MILLOT.
Life Critical Systems are characterized by three main attributes: safety, efficiency and comfort. They typically lead to complex and time critical issues. They belong to domains such as transportation (trains, cars, aircraft, air traffic control), space exploration energy (nuclear and chemical engineering), health and medical care, telecommunication networks, cooperative robot fleets, manufacturing, and services leading to complex and time critical issues.
Risk management deals with prevention, decision-making, action taking, crisis management and recovery, taking into account consequences of unexpected events. We are interested in ecological processes, human behavior, as well as control and management of life-critical systems, potentially highly-automated. Our approach focuses on “human(s) in the loop” systems and simulations, taking advantage of the human ability to cope with unexpected dangerous events on the one hand, and attempting to recover from human errors and system failures on the other hand. Our competences are developed both in Human–Computer Interaction and Human–Machine System. Interactivity and human-centered automation are our main focuses.
The approach consists of three complementary steps: prevention, where any unexpected event could be blocked or managed before its propagation; recovery, when the event results in an accident, making protective measures mandatory to avoid damages; and possibly after the accident occurs, management of consequences is required to minimize or remove the most severe ones. Global crisis management methods and organizations are considered.
Prevention can be achieved by enhancing both system and human capabilities to guarantee optimal task execution:
The specialties of our community and the originality of our approaches are to combine these technologies with cognitive science knowledge and skills in “human in the loop” systems. Our main related research topics are: impact of new technology on human situation awareness (SA); cooperative work, including human–machine cooperation and computer supporting cooperative work (CSCW); responsibility and accountability (task and function allocation, authority sharing).
Recovery can be enhanced:
Crisis management consists:
The different themes developed in this book are related to complementary topics developed in pluridisciplinary approaches, some are more related to prevention, others to recovery and the last ones to global crisis management. But all are related to concrete application fields among life-critical systems.
Seventeen chapters contribute to answer these important issues. We chose to gather them in this book into three complementary parts: (1) general approaches for crisis management, (2) risk management and human factors and (3) managing risks via human–machine cooperation.
Part 1 is composed of first six chapters dedicated to general approaches for crisis management:
Part 2 is comprised of the five following chapters and is related to human factors, the second dimension beside the technical and methodological aspects of risk management:
Finally, Part 3 groups together the last six chapters dedicated to managing risk via a human–machine cooperation:
General Approaches for Crisis Management
Chapter written by Guy A. BOY.
Sectors dealing with life-critical systems (LCSs), such as aerospace, nuclear energy and medicine, have developed safety cultures that attempt to frame operations within acceptable domains of risk. They have improved their systems’ engineering approaches and developed more appropriate regulations, operational procedures and training programs. System reliability has been extensively studied and related methods have been developed to improve safety [NIL 03]. Human reliability is a more difficult endeavor; human factors specialists developed approaches based on human error analysis and management [HOL 98]. Despite this heavy framework, we still have to face unexpected situations that people have to manage in order to minimize consequences.
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
