The Application of Causal Analysis Techniques for Computer-Related Mishaps
نویسنده
چکیده
Causal analysis techniques support the investigation of incidents and accidents. These include elicitation methods, such as Barrier Analysis, and event-based techniques, for example accident fault trees. Other approaches rely on flow charts, including those within the PRISMA approach and accident models, including the control theory model in STAMP. A further class of causal analysis techniques relies upon models of argumentation, such as the counterfactual approach in WBA. This paper reviews the support that different causal analysis techniques provide for the investigation of adverse events and near misses involving Electrical, Electronic or Programmable, Electronic Systems (E/E/PES). The events leading to an explosion and fires at a fluidized catalytic cracking unit are used to illustrate the application of these different techniques. This is then used to assess the degree of support that different techniques provide for the identification of latent failures at different stages in the software and systems lifecycle.
منابع مشابه
Using IEC 61508 to Guide the Investigation of Computer-Related Incidents and Accidents
Relatively few investigation techniques have been specifically developed to identify the causal factors that contribute to mishaps involving safety-critical computer systems. This is a significant omission because a number of factors distinguish this class of incidents from other mishaps. For example, the Rand report into NTSB investigation methods observed that the introduction of software con...
متن کاملWeb-Based Information Management of Maintenance Errors in Aviation Mishaps
This paper describes a safety information management system designed to capture maintenance factors that contribute to aircraft mishaps. The Human Factors Analysis and Classification System-Maintenance Extension taxonomy (HFACS-ME), an effective framework for classifying and analyzing the presence of maintenance errors that lead to mishaps, incidents, and personal injuries, is the theoretical f...
متن کاملA Hybrid Machine Learning Method for Intrusion Detection
Data security is an important area of concern for every computer system owner. An intrusion detection system is a device or software application that monitors a network or systems for malicious activity or policy violations. Already various techniques of artificial intelligence have been used for intrusion detection. The main challenge in this area is the running speed of the available implemen...
متن کاملQuad-pixel edge detection using neural network
One of the most fundamental features of digital image and the basic steps in image processing, analysis, pattern recognition and computer vision is the edge of an image where the preciseness and reliability of its results will affect directly on the comprehension machine system made objective world. Several edge detectors have been developed in the past decades, although no single edge detector...
متن کاملQuad-pixel edge detection using neural network
One of the most fundamental features of digital image and the basic steps in image processing, analysis, pattern recognition and computer vision is the edge of an image where the preciseness and reliability of its results will affect directly on the comprehension machine system made objective world. Several edge detectors have been developed in the past decades, although no single edge detector...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003