res

System Security Applied Scientific Discipline

source: Nancy Leveson,  Engineering a Safer World: Systems Thinking Applied to Safety Why practise complex technologies hence oftentime...

 Why practise complex technologies hence oftentimes neglect System security applied scientific discipline

Why practise complex technologies hence oftentimes fail, too neglect inwards such unexpected ways? Why is it hence hard for hospitals, chemic plants, too railroads to pattern their processes inwards such a agency equally to dramatically cut down the accident rate? How should nosotros sweat to furnish systematic analysis of the risks that a given engineering presents too the causes of accidents that sometimes ensue? Earlier posts accept looked at the ways that sociologists accept examined this occupation (link, link, link); but how practise gifted engineers address the issue?

Nancy Leveson's electrical flow book, Engineering a Safer World: Systems Thinking Applied to Safety (2012), is an outstanding introduction to organisation security engineering. This mass brings frontward the pioneering piece of work that she did inwards Safeware: System Safety too Computers (1994) amongst novel examples too novel contributions to the champaign of security engineering.

Leveson's basic insight, hither too inwards her before work, is that technical failure is rarely the termination of the failure of a unmarried component. Instead, failures termination from multiple incidents involving the components, too unintended interactions amidst the components. So security is a characteristic of the organisation equally a whole, non of the private sub-systems too components. Here is how she puts the signal inwards Engineering a Safer World:
Safety is a organisation property, non a element property, too must hold upwards controlled at the organisation level, non the element level. (kl 263)
Traditional peril too failure analysis focuses on specific pathways that Pb to accidents, identifying potential points of failure too the singular "causes" of the accident (most usually including operator error). Leveson believes that this approach is no longer helpful. Instead she argues for what she calls a "new accident model" -- a ameliorate too to a greater extent than comprehensive agency of analyzing the possibilities of accident scenarios too the causes of actual accidents. This novel excogitation has several of import parts (kl 877-903):
  • expand accident analysis past times forcing consideration of factors other than element failures too human errors
  • provide a to a greater extent than scientific agency to model accidents that produces a ameliorate too less subjective agreement of why the accident occurred
  • include organisation pattern errors too dysfunctional organisation interactions
  • allow for too encourage novel types of peril analyses too peril assessments 
  • shift the emphasis inwards the role of humans inwards accidents from errors ... to focus on the mechanisms too factors that shape human behavior
  • encourage a shift inwards the emphasis inwards accident analysis from "cause" ... to agreement accidents inwards damage of reasons, that is, why the events too errors occurred
  • allow for too encourage multiple viewpoints too multiple interpretations when appropriate
  • assist inwards defining operational metrics too analyzing performance data
Leveson is peculiarly dissatisfied amongst the formal apparatus inwards exercise inwards applied scientific discipline too elsewhere when it comes to analysis of security too accident causation, too she argues that at that topographic point are a number of misleading conflations inwards the champaign that require to hold upwards addressed. One of these is the conflation betwixt reliability too safety. Reliability is an assessment of the performance of a element relative to its design. But Leveson points out that systems similar automobiles, chemic plants, too weapons systems tin all consist of components that are highly reliable too nevertheless that give rising to highly destructive too unanticipated accidents.

So thinking well-nigh accidents inwards damage of component failure is a serious misreading of the nature of the technologies amongst which nosotros interact every day. Instead she argues that security applied scientific discipline must hold upwards systems engineering:
The solution, I believe, lies inwards creating approaches to security based on modern systems thinking too systems theory. (kl 88)
One of import constituent of a ameliorate agreement of accidents too security is a recognition of the fact of complexity inwards contemporary engineering systems -- interactive complexity, dynamic complexity, decompositional complexity, too nonlinear complexity (kl 139). Each of these forms of complexity makes it to a greater extent than hard to anticipate possible accidents, too to a greater extent than hard to assign discrete accident pathways to the occurrence of an accident.
Accidents are complex processes involving the entire sociotechnical system. Traditional event-chain models cannot pull this procedure adequately. (kl 496)
Leveson is highly critical of iterative security applied scientific discipline -- what she calls the "fly-fix-fly" approach. Given the severity of outcomes that are possible when it comes to command systems for nuclear weapons, the operations of nuclear reactors, or the air traffic command system, nosotros require to hold upwards able to practise ameliorate than exactly improving security processes next an accident (kl 148).

The model that she favors is called STAMP (Systems-Theoretic Accident Model too Processes; kl 1059). This model replaces the linear component-by-component analysis of technical devices amongst a system-level representation of their functioning. The STAMP approach begins amongst an sweat to seat crucial security constraints for a given system. (For example, inwards the Union Carbide institute at Bhopal, "never allow MIC to come upwards inwards contact amongst water"; in pattern of the Mars Polar Lander, "don't allow the spacecraft to deport upon the planet surface amongst to a greater extent than than a maximum force" (kl 1074); inwards pattern of populace H2O systems, "water lineament must non hold upwards compromises" (kl 1205).) Once the constraints are specified, the number of command arises; what are the internal too external processes that ensure that the constraints are continuously satisfied? This devolves into a laid of questions well-nigh organisation pattern too organisation administration; the instrumentation that is developed to stair out compliance amongst the constraint too the direction systems that are inwards house to ensure continuous compliance.
Also of involvement inwards the mass is Leveson's description of a novel systems-level agency of analyzing the hazards associated amongst a device or technology, STPA (System-Theoretic Process Analysis) (kl 2732). She describes STPA equally the hazards analysis associated amongst the risks identified past times STAMP:
STPA has ii primary steps:
  1. Identify the potential for inadequate command of the organisation that could Pb to a hazardous state.
  2. Determine how each potentially hazardous command activeness identified inwards stair 1 could occur. (kl 2758)
Here is an lawsuit of the procedure through which an STPA peril analysis proceeds for NASA (kl 2995).

 Why practise complex technologies hence oftentimes neglect System security applied scientific discipline

It would hold upwards really interesting to come across how an engineer would employ the STAMP too STPA methodologies to evaluate the risks too hazards associated amongst swarms of autonomous vehicles. Each vehicle is a organisation that tin hold upwards analyzed using the STAMP methodology. But likewise the workings of an freeway amongst hundreds of autonomous vehicles (perhaps interspersed amongst less predictable human drivers) is equally good a organisation amongst complex characteristics.


 Why practise complex technologies hence oftentimes neglect System security applied scientific discipline

Each private vehicle has a hierarchical organisation of command designed to ensure prophylactic shipping of its passengers too the vehicle itself; what are the failure modes for this command system? And what well-nigh the swarm -- given that each vehicle is responsive to the other vehicles or hence it, how volition private cars response to odd circumstances (a jack-knifed truck blocking all 3 lanes, let's say)? It would appear that autonomous vehicles create the kinds of novel hazards amongst which Leveson begins her mass -- complexity, non-linear relationships, emergent properties of the whole that are unexpected given the expected operations of the components. The fly-fix-fly approach would propose the deployment of a sure enough number of experimental vehicles too hence evaluate their interactions inwards real-world settings. Influenza A virus subtype H5N1 to a greater extent than disciplined approach using the methodologies of STAMP too STPA would brand systematic efforts to seat too command the pathways through which accidents tin occur.

Here is a fake swarm of autonomous vehicles:

But accidents happen; neither software nor command systems are perfect. So what would hold upwards the termination of 1 disabling fender-bender inwards the intersection, followed past times a one-half dozen more; followed past times a gigantic pileup of robo-cars?

COMMENTS

Naam

ABM,21,affordable homeware,1,Affordable Skincare,1,agency,13,agriculture,3,alienation,2,analytical sociology,6,anthropology,1,assemblages,7,authoritarianism,3,autobiography,1,Beauty,22,beauty box,2,beauty facts,1,Benefit,1,Bhaskar,12,biography,4,Bizarre Beauty Facts,1,blog photography,2,blog tips,5,Blogging,1,blogging tips,2,Blogging Tips Series,6,capitalism,9,CAT_agency,24,CAT_China,15,CAT_cognition,12,CAT_collective action,18,CAT_disciplines,40,CAT_epistemology,73,CAT_explanation,18,CAT_foundations,15,CAT_globalization,5,CAT_history,34,CAT_histtech,2,CAT_identity,7,CAT_institutions,41,CAT_materialism,6,CAT_mechanisms,28,CAT_methodology,20,CAT_moraltheory,23,CAT_ontology,94,CAT_policy,39,CAT_power,2,CAT_progress,23,CAT_race,15,CAT_structure,17,causal mechanism,16,causal powers,10,causal reasoning,5,character,11,Charlotte Tilbury,1,China,9,Ciate,1,city,11,class consciousness,5,classification,1,cohort,1,collective action,1,community,4,comparative method,3,complexity,9,concepts,3,conceptual schemes,3,confirmation,2,contingency,5,convention,2,coordination,1,corruption,4,critical realism,41,Cult Beauty,2,cultural revolution,3,culture,6,democracy,15,demography,6,description,1,dry hair,1,Dupe,1,ebay,9,ebay finds,9,economic development,8,economics,6,education,5,emergence,12,epistemology,1,equilibrium,1,ethnography,3,Eurasia,5,everyday routine,1,evolution,4,experiment,4,explanation,1,face mask dupe,1,face masks,1,failure,2,fascism,6,featured,40,feudalism,1,flat lay,2,folk sociology,1,foundation,1,fragrance,1,functionalism,2,gender,1,ghd,1,Gift Sets,1,Giveaway,1,glamglow,1,globalization,5,glossier,2,Goffman,3,hair,1,hair mask,1,Haircare,1,hate,17,health,1,heterogeneity,4,historiography,6,history,4,holism,1,identity,8,India,4,inequality,22,innovation,1,institutions,7,intellectuals,4,justice,3,labor rights,2,lainnya,28,latest in beauty,1,leadership,2,lifestyle,1,Lipstick,1,localism,4,Lush,1,Makeup,2,makeup brushes,1,Makeup Revolution,1,makeup storage,1,makeup tips,1,Marx,14,mascara,1,materialism,5,Mead,2,mechanism,11,mental framework,5,mental model,1,mentality,6,methodological individualism,9,microfoundations,27,mobilization,4,morality,3,morphogenesis,7,motivation,4,naturalism,1,New in,1,New PSS,22,new releases,1,norms,2,ontology,3,organization,18,organizational change,15,pathway,1,peasant,2,philosophy,4,philosophy of science,8,phone cases. feature,1,physics,8,Pinterest,1,plasticity,1,policy,2,populism,3,positivism,1,poverty,4,power,1,practical reasoning,1,pragmatism,2,prediction,4,prejudice,2,privacy,1,public opinion,1,quality of life,2,quantitative methods,2,quantum,7,race,26,rational choice theory,9,rationality,8,Rawls,2,realism,14,rebellion,3,Red Lipstick,1,reductionism,12,regularities,1,regulatory regime,1,Review - Hair,1,Review - Skincare,9,revolution,6,safety,5,science,4,simulation,5,Skincare,10,Skincare Dupes,1,social cognition,4,social facts,2,sociology,11,sociology of ideas,2,sponsored posts. featured,1,Spring,5,structure,3,subjectivity,1,Summer,1,supervenience,13,technology,5,technology failure,9,The Ordinary,1,theory,2,university,8,urbanization,1,Valentines Day,1,verstehen,1,violence,4,warfare,3,Winter,3,Winter Makeup,1,winter skin,1,wishlist,2,youth,4,
ltr
item
belanja online murah dan mudah: System Security Applied Scientific Discipline
System Security Applied Scientific Discipline
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPvf4ALiKvFBWvMNkoUzruuOkSisuiUd5-vjLkRMaylVlaEeN8x0eNtx8bojSIwApYyj7Lsph6pob7TNEbDCVjgDPdv1MsiCc8aNfJddTXD_F8IoYjJNmf6-_ruhC5JJCEjCD8tbHU8z37/s1600/photo+(1).PNG
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPvf4ALiKvFBWvMNkoUzruuOkSisuiUd5-vjLkRMaylVlaEeN8x0eNtx8bojSIwApYyj7Lsph6pob7TNEbDCVjgDPdv1MsiCc8aNfJddTXD_F8IoYjJNmf6-_ruhC5JJCEjCD8tbHU8z37/s72-c/photo+(1).PNG
belanja online murah dan mudah
https://lazadaportal.blogspot.com/2014/08/system-security-applied-scientific.html
https://lazadaportal.blogspot.com/
http://lazadaportal.blogspot.com/
http://lazadaportal.blogspot.com/2014/08/system-security-applied-scientific.html
true
5821508181022004285
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS CONTENT IS PREMIUM Please share to unlock Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy