SlideShare a Scribd company logo
Term Explanation
Barrier
A physical device or an administrative control used to reduce risk of the undesired
outcome to an acceptable level. Barriers can provide physical intervention (e.g., a
guardrail) or procedural separation in time and space (e.g., lock-out-tag-out
procedure).
Cause (Causal Factor)
An event or condition that results in an effect. Anything that shapes or influences
the outcome.
Condition
Any as-found state, whether or not resulting from an event, that may have safety,
health, quality, security, operational, or environmental implications.
Contributing Factor
An event or condition that may have contributed to the occurrence of an undesired
outcome but, if eliminated or modified, would not by itself have prevented the
occurrence.
Crisis management
The process responsible for managing the wider implications of business continuity.
A crisis management team is responsible for strategic issues such as managing
media relations and shareholder confidence, and decides when to invoke business
continuity plans.
Event
A real-time occurrence describing one discrete action, typically an error, failure, or
malfunction. Examples: pipe broke, power lost, lightning struck, person opened
Organizational Factors
Any operational or management structural entity that exerts control over the system
development, design, fabrication, test, maintenance, operation, and disposal.
Examples: resource management (budget, staff, training); policy (content,
implementation, verification); and management decisions.
Proximate Cause(s)
The event(s) that occurred, including any condition(s) that existed immediately
before the undesired outcome, directly resulted in its occurrence and, if eliminated
or modified, would have prevented the undesired outcome. Also known as the
direct cause(s).
Root Cause Analysis (RCA)
A structured evaluation method that identifies the root causes for an undesired
outcome and the actions adequate to prevent recurrence. Root cause analysis
should continue until organizational factors have been identified, or until data are
exhausted.
Root Cause(s)
One of multiple factors (events, conditions or organizational factors) that
contributed to or created the proximate cause and subsequent undesired outcome
and, if eliminated, or modified would have prevented the undesired outcome.
Typically multiple root causes contribute to an undesired outcome.

More Related Content

What's hot

Topic 04 risk mangement
Topic 04 risk mangementTopic 04 risk mangement
Topic 04 risk mangement
Basitali Nevarekar
 
Human factors in risk management
Human factors in risk managementHuman factors in risk management
Human factors in risk management
Basitali Nevarekar
 
Business continuity and recovery planning for manufacturing
Business continuity and recovery planning for manufacturingBusiness continuity and recovery planning for manufacturing
Business continuity and recovery planning for manufacturingARC Advisory Group
 
Operational Risk Management and Bpm
Operational Risk Management and BpmOperational Risk Management and Bpm
Operational Risk Management and Bpm
Nathaniel Palmer
 
Contingency%20planning%20lecture%205
Contingency%20planning%20lecture%205Contingency%20planning%20lecture%205
Contingency%20planning%20lecture%205Magdalena Anna Fas
 
2010; Risk Management Workshop Rev.1.1
2010; Risk Management Workshop Rev.1.12010; Risk Management Workshop Rev.1.1
2010; Risk Management Workshop Rev.1.1
Muhammad Ector Prasetyo
 
Develop a Business Continuity Plan
Develop a Business Continuity PlanDevelop a Business Continuity Plan
Develop a Business Continuity Plan
Info-Tech Research Group
 
Various steps of risk assessment. md. anwar ibrahim miraz
Various steps of risk assessment. md. anwar ibrahim mirazVarious steps of risk assessment. md. anwar ibrahim miraz
Various steps of risk assessment. md. anwar ibrahim miraz
MDAnwarIbrahimMiraz
 
Risk assessment and management
Risk assessment and managementRisk assessment and management
Risk assessment and management
TaekHyeun Kim
 
A simplified guide to Risk Assessment in Occupational Health & Safety
A simplified guide to Risk Assessment in Occupational Health & SafetyA simplified guide to Risk Assessment in Occupational Health & Safety
A simplified guide to Risk Assessment in Occupational Health & Safety
Wessam Atif
 
Risk Management in Pilotage - By Mr. Marantis Stylianos
Risk Management in Pilotage - By Mr. Marantis StylianosRisk Management in Pilotage - By Mr. Marantis Stylianos
Risk Management in Pilotage - By Mr. Marantis Stylianos
ISPO | International Standard for Maritime Pilot Organizations
 
2015-01-13 Resiliency (v04)
2015-01-13 Resiliency (v04)2015-01-13 Resiliency (v04)
2015-01-13 Resiliency (v04)John Mymryk
 
App Showcase: Internal Audit
App Showcase: Internal AuditApp Showcase: Internal Audit
App Showcase: Internal Audit
Resolver Inc.
 
Business Continuity Management PowerPoint Presentation Slides
Business Continuity Management PowerPoint Presentation SlidesBusiness Continuity Management PowerPoint Presentation Slides
Business Continuity Management PowerPoint Presentation Slides
SlideTeam
 
Security Risk management Chapther 8: Risk Evaluation and Mitigation Strategies
Security Risk management Chapther 8:  Risk Evaluation and Mitigation StrategiesSecurity Risk management Chapther 8:  Risk Evaluation and Mitigation Strategies
Security Risk management Chapther 8: Risk Evaluation and Mitigation Strategies
Ernst Dettbarn
 
Risk and testing
Risk and testingRisk and testing
Risk and testing
Emi Rahmi
 
Overview Of Job Hazard Analysis for South Carolina Hospitality Industry
Overview Of Job Hazard Analysis for South Carolina Hospitality IndustryOverview Of Job Hazard Analysis for South Carolina Hospitality Industry
Overview Of Job Hazard Analysis for South Carolina Hospitality Industry
Stephen Deas
 
Infographic - Critical Capabilities of a Good Risk Management Solution
Infographic - Critical Capabilities of a Good Risk Management SolutionInfographic - Critical Capabilities of a Good Risk Management Solution
Infographic - Critical Capabilities of a Good Risk Management Solution
Corporater
 

What's hot (20)

Topic 04 risk mangement
Topic 04 risk mangementTopic 04 risk mangement
Topic 04 risk mangement
 
Human factors in risk management
Human factors in risk managementHuman factors in risk management
Human factors in risk management
 
Business continuity and recovery planning for manufacturing
Business continuity and recovery planning for manufacturingBusiness continuity and recovery planning for manufacturing
Business continuity and recovery planning for manufacturing
 
Operational Risk Management and Bpm
Operational Risk Management and BpmOperational Risk Management and Bpm
Operational Risk Management and Bpm
 
Contingency%20planning%20lecture%205
Contingency%20planning%20lecture%205Contingency%20planning%20lecture%205
Contingency%20planning%20lecture%205
 
2010; Risk Management Workshop Rev.1.1
2010; Risk Management Workshop Rev.1.12010; Risk Management Workshop Rev.1.1
2010; Risk Management Workshop Rev.1.1
 
Develop a Business Continuity Plan
Develop a Business Continuity PlanDevelop a Business Continuity Plan
Develop a Business Continuity Plan
 
Various steps of risk assessment. md. anwar ibrahim miraz
Various steps of risk assessment. md. anwar ibrahim mirazVarious steps of risk assessment. md. anwar ibrahim miraz
Various steps of risk assessment. md. anwar ibrahim miraz
 
Risk assessment and management
Risk assessment and managementRisk assessment and management
Risk assessment and management
 
A simplified guide to Risk Assessment in Occupational Health & Safety
A simplified guide to Risk Assessment in Occupational Health & SafetyA simplified guide to Risk Assessment in Occupational Health & Safety
A simplified guide to Risk Assessment in Occupational Health & Safety
 
Risk Management in Pilotage - By Mr. Marantis Stylianos
Risk Management in Pilotage - By Mr. Marantis StylianosRisk Management in Pilotage - By Mr. Marantis Stylianos
Risk Management in Pilotage - By Mr. Marantis Stylianos
 
2015-01-13 Resiliency (v04)
2015-01-13 Resiliency (v04)2015-01-13 Resiliency (v04)
2015-01-13 Resiliency (v04)
 
Construction safety management
Construction safety managementConstruction safety management
Construction safety management
 
App Showcase: Internal Audit
App Showcase: Internal AuditApp Showcase: Internal Audit
App Showcase: Internal Audit
 
Business Continuity Management PowerPoint Presentation Slides
Business Continuity Management PowerPoint Presentation SlidesBusiness Continuity Management PowerPoint Presentation Slides
Business Continuity Management PowerPoint Presentation Slides
 
Security Risk management Chapther 8: Risk Evaluation and Mitigation Strategies
Security Risk management Chapther 8:  Risk Evaluation and Mitigation StrategiesSecurity Risk management Chapther 8:  Risk Evaluation and Mitigation Strategies
Security Risk management Chapther 8: Risk Evaluation and Mitigation Strategies
 
Risk and testing
Risk and testingRisk and testing
Risk and testing
 
Overview Of Job Hazard Analysis for South Carolina Hospitality Industry
Overview Of Job Hazard Analysis for South Carolina Hospitality IndustryOverview Of Job Hazard Analysis for South Carolina Hospitality Industry
Overview Of Job Hazard Analysis for South Carolina Hospitality Industry
 
Risk management
Risk managementRisk management
Risk management
 
Infographic - Critical Capabilities of a Good Risk Management Solution
Infographic - Critical Capabilities of a Good Risk Management SolutionInfographic - Critical Capabilities of a Good Risk Management Solution
Infographic - Critical Capabilities of a Good Risk Management Solution
 

Viewers also liked

Unit Plan- The Continents
Unit Plan- The ContinentsUnit Plan- The Continents
Unit Plan- The Continents
Mikalyn
 
Interesting facts about each contient
Interesting facts about each contientInteresting facts about each contient
Interesting facts about each contient
Mikalyn
 
INT1B3_E6
INT1B3_E6INT1B3_E6
Ada#1 b3
Ada#1 b3Ada#1 b3
Cedula
Cedula Cedula
Cedula
Rosy Pablo
 
Periféricos de procesamiento de datos
Periféricos de procesamiento de datosPeriféricos de procesamiento de datos
Periféricos de procesamiento de datos
Leoniciop52
 
PRACTICAS DE WORD
PRACTICAS DE WORDPRACTICAS DE WORD
PRACTICAS DE WORD
Cristian Jimenez
 
Holiday Fun in the Sun: Planning a Holiday Vacation in Miami Beach
Holiday Fun in the Sun: Planning a Holiday Vacation in Miami BeachHoliday Fun in the Sun: Planning a Holiday Vacation in Miami Beach
Holiday Fun in the Sun: Planning a Holiday Vacation in Miami Beach
oceanpointresort
 
Evidence 8 export the product
Evidence 8 export the productEvidence 8 export the product
Evidence 8 export the product
Steven Romero
 
La neurocisticercosis como una amenaza potencial
La neurocisticercosis como una amenaza potencialLa neurocisticercosis como una amenaza potencial
La neurocisticercosis como una amenaza potencial
Manolo Hernández Martinez
 
Sample lab
Sample labSample lab
Sample lab
jane_collar7
 

Viewers also liked (13)

Trabajo de informatica
Trabajo de informaticaTrabajo de informatica
Trabajo de informatica
 
Hari CV
Hari CVHari CV
Hari CV
 
Unit Plan- The Continents
Unit Plan- The ContinentsUnit Plan- The Continents
Unit Plan- The Continents
 
Interesting facts about each contient
Interesting facts about each contientInteresting facts about each contient
Interesting facts about each contient
 
INT1B3_E6
INT1B3_E6INT1B3_E6
INT1B3_E6
 
Ada#1 b3
Ada#1 b3Ada#1 b3
Ada#1 b3
 
Cedula
Cedula Cedula
Cedula
 
Periféricos de procesamiento de datos
Periféricos de procesamiento de datosPeriféricos de procesamiento de datos
Periféricos de procesamiento de datos
 
PRACTICAS DE WORD
PRACTICAS DE WORDPRACTICAS DE WORD
PRACTICAS DE WORD
 
Holiday Fun in the Sun: Planning a Holiday Vacation in Miami Beach
Holiday Fun in the Sun: Planning a Holiday Vacation in Miami BeachHoliday Fun in the Sun: Planning a Holiday Vacation in Miami Beach
Holiday Fun in the Sun: Planning a Holiday Vacation in Miami Beach
 
Evidence 8 export the product
Evidence 8 export the productEvidence 8 export the product
Evidence 8 export the product
 
La neurocisticercosis como una amenaza potencial
La neurocisticercosis como una amenaza potencialLa neurocisticercosis como una amenaza potencial
La neurocisticercosis como una amenaza potencial
 
Sample lab
Sample labSample lab
Sample lab
 

Similar to Crisis Management Glossary

JSA_For_MINERS_Penn_State_9-10.ppt
JSA_For_MINERS_Penn_State_9-10.pptJSA_For_MINERS_Penn_State_9-10.ppt
JSA_For_MINERS_Penn_State_9-10.ppt
KhalilUrRehman480961
 
Risk assessment for Risk management subject.pptx
Risk assessment for Risk management subject.pptxRisk assessment for Risk management subject.pptx
Risk assessment for Risk management subject.pptx
galangjuliet669
 
Hazards and risk management
Hazards and risk managementHazards and risk management
Hazards and risk management
saurastra university
 
Risk assessment
Risk assessmentRisk assessment
Risk assessment
Havio
 
PRINCIPLES-OF-RISK-AND-MANAGEMENT.pptx
PRINCIPLES-OF-RISK-AND-MANAGEMENT.pptxPRINCIPLES-OF-RISK-AND-MANAGEMENT.pptx
PRINCIPLES-OF-RISK-AND-MANAGEMENT.pptx
GraciaSuratos
 
OHS
OHSOHS
OHS
bips007
 
Risk management osh
Risk management oshRisk management osh
Risk management osh
jaycatubig
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
Faheem Ul Hasan
 
Hpe program rating #5 ops performance feedback
Hpe program rating #5 ops performance feedbackHpe program rating #5 ops performance feedback
Hpe program rating #5 ops performance feedback
PMHaas
 
Enterprise risk & risk management - I
Enterprise risk & risk management - IEnterprise risk & risk management - I
Enterprise risk & risk management - I
Dr. Shiv S Tripathi
 
Study to Identify and Rectify Potential Risks in General Engineering Services...
Study to Identify and Rectify Potential Risks in General Engineering Services...Study to Identify and Rectify Potential Risks in General Engineering Services...
Study to Identify and Rectify Potential Risks in General Engineering Services...
Sheetal Singh
 
Management system in safety and health at work
Management system in safety and health at workManagement system in safety and health at work
Management system in safety and health at work
salvado52
 
Chapter 1Managing RiskTHE FOLLOWING COMPTIA SECURITY+ EXAM OBJ.docx
Chapter 1Managing RiskTHE FOLLOWING COMPTIA SECURITY+ EXAM OBJ.docxChapter 1Managing RiskTHE FOLLOWING COMPTIA SECURITY+ EXAM OBJ.docx
Chapter 1Managing RiskTHE FOLLOWING COMPTIA SECURITY+ EXAM OBJ.docx
walterl4
 
Supervisors have one role
Supervisors have one roleSupervisors have one role
Supervisors have one role
Terry Penney
 
Chapter 5 Environmental Safety, Security and Compliances(FASS)
Chapter 5  Environmental Safety, Security and Compliances(FASS)Chapter 5  Environmental Safety, Security and Compliances(FASS)
Chapter 5 Environmental Safety, Security and Compliances(FASS)
Md Shaifullar Rabbi
 
Disaster Preparedness and planning
Disaster Preparedness and planningDisaster Preparedness and planning
Disaster Preparedness and planning
rakesh11032000
 
Management of Change 22.4.15
Management of Change 22.4.15Management of Change 22.4.15
Management of Change 22.4.15SANJIV SONI
 
7 job safety analysis - jsa
7   job safety analysis - jsa7   job safety analysis - jsa
7 job safety analysis - jsa
saidulu anthati
 
Multimedia Studio OH&S
Multimedia Studio OH&SMultimedia Studio OH&S
Multimedia Studio OH&S
Webmaster
 

Similar to Crisis Management Glossary (20)

JSA_For_MINERS_Penn_State_9-10.ppt
JSA_For_MINERS_Penn_State_9-10.pptJSA_For_MINERS_Penn_State_9-10.ppt
JSA_For_MINERS_Penn_State_9-10.ppt
 
Risk assessment for Risk management subject.pptx
Risk assessment for Risk management subject.pptxRisk assessment for Risk management subject.pptx
Risk assessment for Risk management subject.pptx
 
Hazards and risk management
Hazards and risk managementHazards and risk management
Hazards and risk management
 
Risk assessment
Risk assessmentRisk assessment
Risk assessment
 
PRINCIPLES-OF-RISK-AND-MANAGEMENT.pptx
PRINCIPLES-OF-RISK-AND-MANAGEMENT.pptxPRINCIPLES-OF-RISK-AND-MANAGEMENT.pptx
PRINCIPLES-OF-RISK-AND-MANAGEMENT.pptx
 
OHS
OHSOHS
OHS
 
Risk management osh
Risk management oshRisk management osh
Risk management osh
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
Hpe program rating #5 ops performance feedback
Hpe program rating #5 ops performance feedbackHpe program rating #5 ops performance feedback
Hpe program rating #5 ops performance feedback
 
Enterprise risk & risk management - I
Enterprise risk & risk management - IEnterprise risk & risk management - I
Enterprise risk & risk management - I
 
Study to Identify and Rectify Potential Risks in General Engineering Services...
Study to Identify and Rectify Potential Risks in General Engineering Services...Study to Identify and Rectify Potential Risks in General Engineering Services...
Study to Identify and Rectify Potential Risks in General Engineering Services...
 
Management system in safety and health at work
Management system in safety and health at workManagement system in safety and health at work
Management system in safety and health at work
 
Chapter 1Managing RiskTHE FOLLOWING COMPTIA SECURITY+ EXAM OBJ.docx
Chapter 1Managing RiskTHE FOLLOWING COMPTIA SECURITY+ EXAM OBJ.docxChapter 1Managing RiskTHE FOLLOWING COMPTIA SECURITY+ EXAM OBJ.docx
Chapter 1Managing RiskTHE FOLLOWING COMPTIA SECURITY+ EXAM OBJ.docx
 
Worksitehazanalysis2
Worksitehazanalysis2Worksitehazanalysis2
Worksitehazanalysis2
 
Supervisors have one role
Supervisors have one roleSupervisors have one role
Supervisors have one role
 
Chapter 5 Environmental Safety, Security and Compliances(FASS)
Chapter 5  Environmental Safety, Security and Compliances(FASS)Chapter 5  Environmental Safety, Security and Compliances(FASS)
Chapter 5 Environmental Safety, Security and Compliances(FASS)
 
Disaster Preparedness and planning
Disaster Preparedness and planningDisaster Preparedness and planning
Disaster Preparedness and planning
 
Management of Change 22.4.15
Management of Change 22.4.15Management of Change 22.4.15
Management of Change 22.4.15
 
7 job safety analysis - jsa
7   job safety analysis - jsa7   job safety analysis - jsa
7 job safety analysis - jsa
 
Multimedia Studio OH&S
Multimedia Studio OH&SMultimedia Studio OH&S
Multimedia Studio OH&S
 

More from Ronald Bartels

Implementing a modern Fusion Centre
Implementing a modern Fusion Centre Implementing a modern Fusion Centre
Implementing a modern Fusion Centre
Ronald Bartels
 
NSA advisory about state sponsored cybersecurity threats
NSA advisory about state sponsored cybersecurity threatsNSA advisory about state sponsored cybersecurity threats
NSA advisory about state sponsored cybersecurity threats
Ronald Bartels
 
The reasons why your business cannot afford to be offline
The reasons why your business cannot afford to be offlineThe reasons why your business cannot afford to be offline
The reasons why your business cannot afford to be offline
Ronald Bartels
 
RADWIN, software defined wide area network, Press Release
RADWIN, software defined wide area network, Press ReleaseRADWIN, software defined wide area network, Press Release
RADWIN, software defined wide area network, Press Release
Ronald Bartels
 
Infrastructure management presented to GPNOG (Updated)
Infrastructure management presented to GPNOG (Updated)Infrastructure management presented to GPNOG (Updated)
Infrastructure management presented to GPNOG (Updated)
Ronald Bartels
 
Infrastructure management using a VPN Concentrator
Infrastructure management using a VPN ConcentratorInfrastructure management using a VPN Concentrator
Infrastructure management using a VPN Concentrator
Ronald Bartels
 
Problem management foundation - Introduction
Problem management foundation - IntroductionProblem management foundation - Introduction
Problem management foundation - Introduction
Ronald Bartels
 
Problem management foundation - Overview
Problem management foundation - OverviewProblem management foundation - Overview
Problem management foundation - Overview
Ronald Bartels
 
Problem management foundation - Perceptions
Problem management foundation - PerceptionsProblem management foundation - Perceptions
Problem management foundation - Perceptions
Ronald Bartels
 
Problem management foundation - Engineering
Problem management foundation - EngineeringProblem management foundation - Engineering
Problem management foundation - Engineering
Ronald Bartels
 
Problem management foundation - Tiger teams
Problem management foundation - Tiger teamsProblem management foundation - Tiger teams
Problem management foundation - Tiger teams
Ronald Bartels
 
Problem management foundation - Lifecycle
Problem management foundation - Lifecycle Problem management foundation - Lifecycle
Problem management foundation - Lifecycle
Ronald Bartels
 
Problem management foundation - Tools
Problem management foundation - ToolsProblem management foundation - Tools
Problem management foundation - Tools
Ronald Bartels
 
Problem management foundation - Analysing
Problem management foundation - AnalysingProblem management foundation - Analysing
Problem management foundation - Analysing
Ronald Bartels
 
Problem management foundation Simulation
Problem management foundation SimulationProblem management foundation Simulation
Problem management foundation Simulation
Ronald Bartels
 
Problem management foundation - IT risk
Problem management foundation - IT riskProblem management foundation - IT risk
Problem management foundation - IT risk
Ronald Bartels
 
Problem management foundation - Continious improvement
Problem management foundation - Continious improvementProblem management foundation - Continious improvement
Problem management foundation - Continious improvement
Ronald Bartels
 
Problem management foundation - Mission control
Problem management foundation - Mission controlProblem management foundation - Mission control
Problem management foundation - Mission control
Ronald Bartels
 
Problem management foundation - Significant havoc in technology
Problem management foundation - Significant havoc in technologyProblem management foundation - Significant havoc in technology
Problem management foundation - Significant havoc in technology
Ronald Bartels
 
Problem management foundation Budget
Problem management foundation BudgetProblem management foundation Budget
Problem management foundation Budget
Ronald Bartels
 

More from Ronald Bartels (20)

Implementing a modern Fusion Centre
Implementing a modern Fusion Centre Implementing a modern Fusion Centre
Implementing a modern Fusion Centre
 
NSA advisory about state sponsored cybersecurity threats
NSA advisory about state sponsored cybersecurity threatsNSA advisory about state sponsored cybersecurity threats
NSA advisory about state sponsored cybersecurity threats
 
The reasons why your business cannot afford to be offline
The reasons why your business cannot afford to be offlineThe reasons why your business cannot afford to be offline
The reasons why your business cannot afford to be offline
 
RADWIN, software defined wide area network, Press Release
RADWIN, software defined wide area network, Press ReleaseRADWIN, software defined wide area network, Press Release
RADWIN, software defined wide area network, Press Release
 
Infrastructure management presented to GPNOG (Updated)
Infrastructure management presented to GPNOG (Updated)Infrastructure management presented to GPNOG (Updated)
Infrastructure management presented to GPNOG (Updated)
 
Infrastructure management using a VPN Concentrator
Infrastructure management using a VPN ConcentratorInfrastructure management using a VPN Concentrator
Infrastructure management using a VPN Concentrator
 
Problem management foundation - Introduction
Problem management foundation - IntroductionProblem management foundation - Introduction
Problem management foundation - Introduction
 
Problem management foundation - Overview
Problem management foundation - OverviewProblem management foundation - Overview
Problem management foundation - Overview
 
Problem management foundation - Perceptions
Problem management foundation - PerceptionsProblem management foundation - Perceptions
Problem management foundation - Perceptions
 
Problem management foundation - Engineering
Problem management foundation - EngineeringProblem management foundation - Engineering
Problem management foundation - Engineering
 
Problem management foundation - Tiger teams
Problem management foundation - Tiger teamsProblem management foundation - Tiger teams
Problem management foundation - Tiger teams
 
Problem management foundation - Lifecycle
Problem management foundation - Lifecycle Problem management foundation - Lifecycle
Problem management foundation - Lifecycle
 
Problem management foundation - Tools
Problem management foundation - ToolsProblem management foundation - Tools
Problem management foundation - Tools
 
Problem management foundation - Analysing
Problem management foundation - AnalysingProblem management foundation - Analysing
Problem management foundation - Analysing
 
Problem management foundation Simulation
Problem management foundation SimulationProblem management foundation Simulation
Problem management foundation Simulation
 
Problem management foundation - IT risk
Problem management foundation - IT riskProblem management foundation - IT risk
Problem management foundation - IT risk
 
Problem management foundation - Continious improvement
Problem management foundation - Continious improvementProblem management foundation - Continious improvement
Problem management foundation - Continious improvement
 
Problem management foundation - Mission control
Problem management foundation - Mission controlProblem management foundation - Mission control
Problem management foundation - Mission control
 
Problem management foundation - Significant havoc in technology
Problem management foundation - Significant havoc in technologyProblem management foundation - Significant havoc in technology
Problem management foundation - Significant havoc in technology
 
Problem management foundation Budget
Problem management foundation BudgetProblem management foundation Budget
Problem management foundation Budget
 

Recently uploaded

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 

Recently uploaded (20)

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 

Crisis Management Glossary

  • 1. Term Explanation Barrier A physical device or an administrative control used to reduce risk of the undesired outcome to an acceptable level. Barriers can provide physical intervention (e.g., a guardrail) or procedural separation in time and space (e.g., lock-out-tag-out procedure). Cause (Causal Factor) An event or condition that results in an effect. Anything that shapes or influences the outcome. Condition Any as-found state, whether or not resulting from an event, that may have safety, health, quality, security, operational, or environmental implications. Contributing Factor An event or condition that may have contributed to the occurrence of an undesired outcome but, if eliminated or modified, would not by itself have prevented the occurrence. Crisis management The process responsible for managing the wider implications of business continuity. A crisis management team is responsible for strategic issues such as managing media relations and shareholder confidence, and decides when to invoke business continuity plans. Event A real-time occurrence describing one discrete action, typically an error, failure, or malfunction. Examples: pipe broke, power lost, lightning struck, person opened Organizational Factors Any operational or management structural entity that exerts control over the system development, design, fabrication, test, maintenance, operation, and disposal. Examples: resource management (budget, staff, training); policy (content, implementation, verification); and management decisions. Proximate Cause(s) The event(s) that occurred, including any condition(s) that existed immediately before the undesired outcome, directly resulted in its occurrence and, if eliminated or modified, would have prevented the undesired outcome. Also known as the direct cause(s). Root Cause Analysis (RCA) A structured evaluation method that identifies the root causes for an undesired outcome and the actions adequate to prevent recurrence. Root cause analysis should continue until organizational factors have been identified, or until data are exhausted. Root Cause(s) One of multiple factors (events, conditions or organizational factors) that contributed to or created the proximate cause and subsequent undesired outcome and, if eliminated, or modified would have prevented the undesired outcome. Typically multiple root causes contribute to an undesired outcome.