The document discusses the role of technology in preventing accidents and improving accident investigation. It examines how technology can reduce workload and evaluate ways it can enhance investigations through electronic data collection. It stresses the importance of ongoing training to effectively use technologies. Risk assessments should identify minimum risks of new equipment, including human and technical errors. Proper procedures and identification of data that can be retrieved are important for enhancing safety and investigations.
An Update on Drone Regulations - EU U-Space & US UTM ...Kevin O'Donovan
An update on Drone Regulations - EU U-Space & US UTM update delivered at CIGRE Israel UAV Seminar on 30th July in Tel Aviv.
Posted as is without audio.
For any comments/questions, contact me on LinkedIN or Twitter.
An Update on Drone Regulations - EU U-Space & US UTM ...Kevin O'Donovan
An update on Drone Regulations - EU U-Space & US UTM update delivered at CIGRE Israel UAV Seminar on 30th July in Tel Aviv.
Posted as is without audio.
For any comments/questions, contact me on LinkedIN or Twitter.
Pemilihan presiden 2014 masih sekitar 2 tahun lagi dari sekarang tapi sudah ada partai yang mencalonkan tokohnya. Sebut saja Wiranto oleh Hanura, Hatta Rajasa oleh PAN, Aburizal Bakrie oleh Golkar, dan Prabowo oleh Gerindra. Jusuf Kalla juga disebut-sebut akan dicalonkan misalnya oleh PPP.
Sejumlah tokoh sudah populer, sudah dikenal oleh mayoritas pemilih. Pertanyaan krusialnya adalah apakah mereka yang sudah populer tersebut diterima atau disukai pemilih atau tidak. Bila popularitas seorang calon berbanding lurus dengan kediterimaannya oleh pemilih nasional maka ia potensial dipilih oleh rakyat bila maju sebagai calon presiden. Selanjutnya, apakah tokoh-tokoh yang populer itu dipilih? Seberapa besar popularitasnya berpengaruh terhadap kedipilihannya? Kalau mereka yang sudah populer itu ternyata kurang banyak dipilih, mengapa mereka kurang dipilih?
Survei nasional perilaku memilih yang akan kami paparkan hasilnya di sini dapat menjawab sebagian dari pertanyaan-pertanyaan tersebut.
Temuan Survei 20 - 30 Juni 2012
Saiful Mujani Research & Consulting
Jl. Kusumaatmaja No. 59, Menteng, Jakarta Pusat 10340
kontak@saifulmujani.com
www.saifulmujani.com
Peluang Calon-Calon Gubernur Dalam Pilkada Provinsi DKI Jakartasaifulmujani
Pilkada DKI putaran kedua tinggal menghitung hari. Siapakah di antara kedua pasang calon, Fauzi Bowo-Nachrowi Ramli dan Joko Widodo - Basuki Tjahaja Purnama, yang memiliki peluang lebih besar untuk terpilih 20 September nanti? Apakah isu SARA yang sempat ramai dibicarakan memiliki efek yang signifikan terhadap elektabilitas para calon gubernur dan wakil gubernur?
MNC Media dan Saiful Mujani Research and Consulting melakukan survei independen pada periode 7 - 11 September 2012 untuk mengetahui sikap dan perilaku calon pemilih DKI Jakarta. Survei ini juga dilakukan untuk mengetahui faktor-faktor penting apa yang berkontribusi pada pilihan para calon pemilih tersebut.
Saiful Mujani Research & Consulting
Jl. Kusumaatmaja No. 59, Menteng, Jakarta Pusat 10340
kontak@saifulmujani.com
www.saifulmujani.com
AVSS & The Institute for Drone Technology™ joint report government regulation...Paul New
Drones will fail. Drones will crash. Drones will hit humans. Drones will “fly-away”. Birds will interfere
with drones. Drones will be lost. Pilots and software will make errors.
This is the drone reality.
However, regardless of the potential risk factors involved with their operation, drones do provide
citizens, businesses, industries, and governments with tremendous value.
Furthermore, in many cases, drones provide a safer alternative to traditional manned aircraft
applications or civilian labour such as in oil and gas and mining inspection services.
Therefore, AVSS and The Institute for Drone Technology believe the challenge of the emerging drone
technologies is not to detect, exclude, or avoid the use of drones, but to determine how we can
safely utilize this growing and beneficial technology.
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMSMarco Lisi
Lesson on "Security in large, Strategic and Complex Systems" at the "Master di II Livello" in "Homeland Security" -
Università degli Studi Campus Bio-Medico di Roma, A. A. 2012-2013
mission model, mission model canvas, customer development, Hacking for Defense, lean startup, stanford, startup, steve blank, Pete Newell, Joe Felter, minimum viable product
Pemilihan presiden 2014 masih sekitar 2 tahun lagi dari sekarang tapi sudah ada partai yang mencalonkan tokohnya. Sebut saja Wiranto oleh Hanura, Hatta Rajasa oleh PAN, Aburizal Bakrie oleh Golkar, dan Prabowo oleh Gerindra. Jusuf Kalla juga disebut-sebut akan dicalonkan misalnya oleh PPP.
Sejumlah tokoh sudah populer, sudah dikenal oleh mayoritas pemilih. Pertanyaan krusialnya adalah apakah mereka yang sudah populer tersebut diterima atau disukai pemilih atau tidak. Bila popularitas seorang calon berbanding lurus dengan kediterimaannya oleh pemilih nasional maka ia potensial dipilih oleh rakyat bila maju sebagai calon presiden. Selanjutnya, apakah tokoh-tokoh yang populer itu dipilih? Seberapa besar popularitasnya berpengaruh terhadap kedipilihannya? Kalau mereka yang sudah populer itu ternyata kurang banyak dipilih, mengapa mereka kurang dipilih?
Survei nasional perilaku memilih yang akan kami paparkan hasilnya di sini dapat menjawab sebagian dari pertanyaan-pertanyaan tersebut.
Temuan Survei 20 - 30 Juni 2012
Saiful Mujani Research & Consulting
Jl. Kusumaatmaja No. 59, Menteng, Jakarta Pusat 10340
kontak@saifulmujani.com
www.saifulmujani.com
Peluang Calon-Calon Gubernur Dalam Pilkada Provinsi DKI Jakartasaifulmujani
Pilkada DKI putaran kedua tinggal menghitung hari. Siapakah di antara kedua pasang calon, Fauzi Bowo-Nachrowi Ramli dan Joko Widodo - Basuki Tjahaja Purnama, yang memiliki peluang lebih besar untuk terpilih 20 September nanti? Apakah isu SARA yang sempat ramai dibicarakan memiliki efek yang signifikan terhadap elektabilitas para calon gubernur dan wakil gubernur?
MNC Media dan Saiful Mujani Research and Consulting melakukan survei independen pada periode 7 - 11 September 2012 untuk mengetahui sikap dan perilaku calon pemilih DKI Jakarta. Survei ini juga dilakukan untuk mengetahui faktor-faktor penting apa yang berkontribusi pada pilihan para calon pemilih tersebut.
Saiful Mujani Research & Consulting
Jl. Kusumaatmaja No. 59, Menteng, Jakarta Pusat 10340
kontak@saifulmujani.com
www.saifulmujani.com
AVSS & The Institute for Drone Technology™ joint report government regulation...Paul New
Drones will fail. Drones will crash. Drones will hit humans. Drones will “fly-away”. Birds will interfere
with drones. Drones will be lost. Pilots and software will make errors.
This is the drone reality.
However, regardless of the potential risk factors involved with their operation, drones do provide
citizens, businesses, industries, and governments with tremendous value.
Furthermore, in many cases, drones provide a safer alternative to traditional manned aircraft
applications or civilian labour such as in oil and gas and mining inspection services.
Therefore, AVSS and The Institute for Drone Technology believe the challenge of the emerging drone
technologies is not to detect, exclude, or avoid the use of drones, but to determine how we can
safely utilize this growing and beneficial technology.
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMSMarco Lisi
Lesson on "Security in large, Strategic and Complex Systems" at the "Master di II Livello" in "Homeland Security" -
Università degli Studi Campus Bio-Medico di Roma, A. A. 2012-2013
mission model, mission model canvas, customer development, Hacking for Defense, lean startup, stanford, startup, steve blank, Pete Newell, Joe Felter, minimum viable product
Software occupy an increasingly prominent place in the critical embedded systems : their size and complexity is increasing , while their criticality also continues to rise. In this context, how the aeronautical, space , automotive, industrial domains are facing these challenges ? Application of international standards is essential to define the scope of practices recognized by the community as " state of the art " in terms of producing safety critical software . What are these practices, the principles on which they are built ? Starting with (re)defining the concept of software criticality and placing this concept in the whole system, then we will try to answer all these questions. During this presentation , we will illustrate the point with examples from aeronautics, air traffic control , space , automotive or railway . Finally, we will take a look at some trends , particularly through standards recently released.
TECHNICAL REPORT
CMU/SEI-99-TR-017
ESC-TR-99-017
Operationally
Critical Threat,
Asset, and
Vulnerability
EvaluationSM
(OCTAVESM)
Framework,
Version 1.0
Christopher J. Alberts
Sandra G. Behrens
Richard D. Pethia
William R. Wilson
June 1999
Pittsburgh, PA 15213-3890
Operationally
Critical Threat,
Asset, and
Vulnerability
EvaluationSM
(OCTAVESM)
Framework,
Version 1.0
CMU/SEI-99-TR-017
ESC-TR-99-017
Christopher J. Alberts
Sandra G. Behrens
Richard D. Pethia
William R. Wilson
June 1999
Networked Systems Survivability Program
Unlimited distribution subject to the copyright.
This report was prepared for the
SEI Joint Program Office
HQ ESC/DIB
5 Eglin Street
Hanscom AFB, MA 01731-2116
The ideas and findings in this report should not be construed as an official DoD position. It is published in the interest of
scientific and technical information exchange.
FOR THE COMMANDER
Norton L. Compton, Lt Col., USAF
SEI Joint Program Office
This work is sponsored by the U.S. Department of Defense. The Software Engineering Institute is a
federally funded research and development center sponsored by the U.S. Department of Defense.
Copyright 1999 by Carnegie Mellon University.
NO WARRANTY
THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS
FURNISHED ON AN "AS-IS" BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY
KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO,
WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED
FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF
ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT.
Use of any trademarks in this report is not intended in any way to infringe on the rights of the trademark holder.
Internal use. Permission to reproduce this document and to prepare derivative works from this document for internal use is
granted, provided the copyright and "No Warranty" statements are included with all reproductions and derivative works.
External use. Requests for permission to reproduce this document or prepare derivative works of this document for external
and commercial use should be addressed to the SEI Licensing Agent.
This work was created in the performance of Federal Government Contract Number F19628-95-C-0003 with Carnegie
Mellon University for the operation of the Software Engineering Institute, a federally funded research and development
center. The Government of the United States has a royalty-free government-purpose license to use, duplicate, or disclose the
work, in whole or in part and in any manner, and to have or permit others to do so, for government purposes pursuant to the
copyright license under the clause at 52.227-7013.
For information about purchasing paper copies of SEI reports, please visit the publications portion of our Web site
(http://www.sei.cmu.edu/publications/pubweb.html).
CMU/SEI-99-TR-017 i
Table of Con ...
MORT ANALYSIS | with Example I Gaurav Singh Rajput
1 Technology
1. TECHNOLOGY
1.
Examine the role of technology in preventing
accidents
Getting the most from the equipment you have:
Reducing the individual’s workload
2.
Evaluate the ways technology can improve Accident
Investigation
Importance of continued training for the effective
use of the Technology
27-29.09.2011 LONDON Karen A. K. Kruse 1
27-29.09.2011 LONDON Karen A. K. Kruse
2. Why do we want good technology;
to improve safety, efficiency, reliability, quality of work
and performance (1)
Grounding occurred; the vessel was navigating on BA
charts? (2)
Grounding occurred; the vessel was navigating with
ECDIS? (3)
27-29.09.2011 LONDON Karen A. K. Kruse 2
3. Can we ensure equipment introduced will improve
safety, efficiency, reliability, quality of work and
performance and then still be cost efficient ?
First we judge if the cost involved reducing the risk
is really beneficial. Equipment errors/flaws and
human error must be reduced to as low as
reasonably particle (ALARP) (4)
But who is really deciding what is an acceptable
ALARP level; all regulatory Authorities (performance
standards)/Flag states, ISM code, Industry and the
Company
A lot of decisions are left for the ship owners to
decide and control (5)
27-29.09.2011 LONDON Karen A. K. Kruse 3
4. So if the variability of equipment in
some circumstances could be a threat and if design
and regulatory Organizations cannot constrain
variability to prevent human errors, the Company is
obliged to implement preventive and protective
barriers (6)
The way the Company can control human errors
onboard when using the equipment is to have as
many preventive and protective barriers in use so
the risk is reduced to ALARP(7)
Therefore we need to implement/identify the barriers
before the human errors occur; the common practice
we use in Risk Assessments is to identify these
barriers
27-29.09.2011 LONDON Karen A. K. Kruse 4
5. Minimum list of Risks for equipment to be evaluated on
a Risk Assessment:
1. Equipment error tolerances, capabilities and limitations,
visibility of errors, reliability, redundancy, monitoring,
user friendliness, un-expected side effects, overreliance
and levels of automation (LOA) and related old
equipment integration with the new equipment (8) (10)
2. Resilient equipment/installation: the ability of
equipment/system to adjust its functioning, prior to or
following changes and disturbances, so that it can
sustain operations even after a major mishap or in the
presence of continuous stress (9)
3. Crew training/office staff training sufficient?
27-29.09.2011 LONDON Karen A. K. Kruse 5
6. 4. Equipment fulfilling at least regulatory requirements IMO,
Flag State, Industry Standards and Company demands
5. Maintenance/implementation in PMS?
6. Supplier support if problems occur / easy access to service?
7. Replacing/upgrading; investigate the previous problems with
the equipment?
8. Larger systems, is Supplier developing upgrades that can
later be implemented?
9. Yearly service costs /service contracts/spare part
availability?
10. The Company procedures must contain barriers for all
above (preventive and protective based on the level of risk)
27-29.09.2011 LONDON Karen A. K. Kruse 6
7. Human error using a technology is a symptom of trouble with the equipmen
that has not been identified by the Company or regulated by the regulatory
Ny tekst
Organizations.
If an accident occur using the technology:
Investigate how people’s actions made sense at the time given the
circumstances that surrounded them.
27-29.09.2011 LONDON Karen A. K. Kruse 7
8. Credible data collection from equipment often form
the basis of the Investigators recommendations and
conclusions (11)
Article 8 / Investigative bodies
Article 13 / Preservation of evidence
27-29.09.2011 LONDON Karen A. K. Kruse 8
9. A lot of equipment onboard have electronic memory (12)
VDR versus ECDIS; ECDIS is a great immediate tool for the
Investigator and include electronic logbook and a playback
function? (13)
27-29.09.2011 LONDON Karen A. K. Kruse 9
10. TRAINING?
IMO, FLAG STATE, Industry and Company (14)
Article 8 / Investigative bodies
27-29.09.2011 LONDON Karen A. K. Kruse 10
11. SUM UP:
Grounding occurred; the vessel was navigating with ECDIS.
1. Risk Assessments and related procedures only gets as good as the
knowledge of the persons creating these (risks related to a concrete
situation must be identified)
2. Look into the list with minimum risks that must be evaluated before
implementing equipment (slide 5 + 6 ).
3. Proactive risk identification of any technology/ equipment will
enhance safety a lot, do not wait for regulatory restrictions, if
procedures are implemented and equipment set up correctly then you
will also know what data can be retrieved in case of an accident.
4. Equipment Training for all is essential both for Company employees,
various Inspectors, Investigators and Crew.
27-29.09.2011 LONDON Karen A. K. Kruse 11
12. QUESTIONS?
Questions?
www.nordictankers.com
kak@nordictankers.com
27-29.09.2011 LONDON Karen A. K. Kruse 12
Editor's Notes
Larger systems, is Supplier developing upgrades that can later be implemented? Navtex overlay / T/P overlay…..other or will your system soon be outdated. Investigate the market for future demands.
Nordic Helsinkiwasbeforetake over navigatingon BA charts, ondeparture Malta the vesselwasnavigatingonfull ECDIS. The crewwerealredytrainedwithgenetic IMO ECDIS courses, had experiance from otherfleetvesselswith ECDIS and had beforedepartureshipspscific ECDIS training.Crewcanbeshipspecifictrained to know an exact ECDIS system, but the crew still needs to know the Company demands for vital procedures not regulated by anyAuthorities.
11.VDR/SVDR download, in most cases, the assistance of specialist expertise may be required (VDR design insufficient). If backup of the VDR is not done after an accident then you might loose the data as normally this is only stored 24hrs, a backup ensures that the last 12 hrs of data is stored on the VDR. ECDIS electronic logbook, ECDIS play back is easy to access, but data can be lost if this is not done after the occurrence.
12.Assumealmost all newerelectronicequiptmentonboard have some kind of memorythatcanbeviewedwith the crew, otherwise it canberetrieved.Bridge equiptmentwithoutpaper but withmemory; Navtex, Gps, Ecdis, echosounder, fire panles, integrated bridge computers, GMDSS equiptmentDeck equiptment……ODME, gas detection systems, cargo computers withvarious alarm indications. 13.ECDIS electroniclogbooks is givinghardevidence of a lot of information , unfortunately the logbook info canbecontrolled by the operator so some info is not recorded and is thenleft to a standard setting of events logged. A filter for further events mightapply but if not selectedno default is recorded. ECDIS logbooks have memory and information canoftenberetrived long time after the occurance. ECDIS logbooksarenormallyprotected so data alredyrecordedcannotbetampered. ECDIS is nogoodwhenaudio is required. Most ECDIS systems do not show what external layers (Navtex/T&P) that was used during navigation (obscuring or assisting) and data cannot be retrieved. Meaning you do not know when the Navtex, T/P and Radar Overlay was turned on/off. This info can only be found if the ECDIS is connected to the VDR system that records the ECDIS image with video. SVDRs cannot record this normally.SVDRDate and Time,Ship'sPosition,Speed,Heading,BridgeAudio,CommunicationsAudioVDR same as above + RadarData + ECDIS - post-display selection,AIS,EchoSounder,MainAlarms,RudderOrder and Response,EngineOrder and Response,HullOpenings (doors) status,Watertight and fire door status,Accelerations and Hull Stresses,Wind Speed and Direction
The ECDIS can be safe if the features on the equipment had been used/set up correctly then more options for alerts and better system performance – Further workload could also be reduced during navigation (layers T/P + Navtex) . Overview on the bridge not in the back of the BA chart room. Then if a grounding occur the ECDIS electronic logbook and play back can be used immediately by the Investigator.