SlideShare a Scribd company logo
1 of 16
1
A Human Factors-Based
Safety Management Model for
Aviation Maintenance Safety
Yu-Lin Hsiao, PhD
Department of Industrial and Systems Engineering
2
How do we manage safety?
• The way we currently do
– Reactive way: Accident & Incident Investigation
– Proactive way
• Daily- or Periodic-Based: Audit, LOSA, FOQA
• Behavior-Oriented: ASAP, LOSA
• Event- or Consequence-Based: MEDA, Risk Matrix
• Each system has its own advantages, but
also probably goes its own and unique way
3
How do we manage safety?
• If there is a integrated method to manage safety from
a macro-system viewpoint?
– According to the purpose and philosophy of the ICAO Safety
Management System (SMS) as well
• Can we integrate all these safety programs or
methods by using the same language?
– Based on the same common concepts
– Quantitative and Data-driven Method
4
How do we manage safety?
• Furthermore, can we use these safety data to
evaluate the safety status and manage the risk?
– To assist upper-level management and decision-making
– For long-term and continued safety management
– But not just focus on single event analysis or case by case
5
Answer: Human Factors (HF)
• It is the major cause of flight accidents
– Implicated in most accidents and incidents
• Most safety programs are related to
human factors in some way
• Connected with current risk and safety
management concepts
– To eliminate or mitigate specific human error
6
Steps to establish the HF model
• 1. Data Transformation
– From Qualitative Documents
• audit, investigation, or voluntary reports
– To Quantitative Data
• Human Factors Rates
• Use the Human Factors Analysis and Classification
System – Maintenance Audit (HFACS-MA)
– Set up an internal review board
• To analyze data sourced from various systems
• Extract consensus results to calculate the quantitative
rates
7
8
9
Human Factors Rates
• Each error type was accumulated for monthly period
• Multiply by the weights of severity degree
– Weights were developed by aviation authority
– Based on Analytic Hierarchy Process (AHP) method
• Human Factors Rate =
W : The highest weight of severity degree (W = 11, the designated weight of Finding )
wi : The weight of the severity degree, i={I, R, C, F}
n : The sum of the human failures with all severity degree per month
ni : The sum of the human failures with specific severity degree, i={I, R, C, F}
( )
nW
nw
i
ii
∗
∗∑
10
Future Incident Rate
Incident Rate =
Incident : The number of incidents per month
Departure: The number of flight departure per month
000,1×
∑
Departure
Incident
Airline Departure
Times
Accident Incident Accident
Rate
Incident
Rate
A 81,448 1 73 0.012 0.90
B 134,814 2 192 0.015 1.42
11
Steps to establish the HF model
• 2. Develop the mathematical model
– Use Neural Network method
– Verify the prediction performance of the model
• 3. Start using the model to evaluate safety
status
– Output: Future Incident Rate
– Different company might have different prediction
performance or time range (month or quarter)
12
Steps to establish the HF model
• 4. Detect the uprising trend of future incident
rate
– Self- or Expert-decided warning threshold
• 5. Find out the root causes and the original
data sources
– Based on real and reliable data collected by different
safety systems or programs
– To support the corresponding safety management
activities
13
• Current Achievement:
– Succeed in the prediction of future incident rate using
human factors analysis
– Based on real safety audit data from aviation authority
(data-driven & practical)
– Prove the causality of human error and safety
– General Accuracy
• Correlation Coefficient: 0.6 ~ 0.75
• R2
: 0.35 ~ 0.58
HF-Based Safety Management Model
14
Prediction Result
0
2
4
6
8
10
Months
IncidentRates
Actual Simulate
Airline A
Airline B
60
0
1
2
3
4
5
Month
IncidentRates
Actual Simulate
15
• Advantages
– Can integrate various data sources from different safety
programs using the same standard
• Human Factors concept
• As an integrated part of SMS
– Can become a safety management tool to detect risk
associated with uprising incident rate from a systematic
perspective
• Find out the root causes related to incident rate
• Conduct corresponding management activities to
control the risk
HF-Based Safety Management Model
16
HF-Based Safety Management Model
• Improvement to safety management system
– Help manager’s decision making regarding the safety
management priority
– Integrate and utilize various safety data to improve
safety management in a quantitative way
– Focus on both active and latent human factors such as
safety climate which could affect the safety performance
16

More Related Content

What's hot

What's hot (13)

Practical Application Of System Safety For Performance Improvement
Practical Application Of System Safety For Performance ImprovementPractical Application Of System Safety For Performance Improvement
Practical Application Of System Safety For Performance Improvement
 
EPA RMP Regulations
EPA RMP RegulationsEPA RMP Regulations
EPA RMP Regulations
 
Project managment 10
Project managment  10Project managment  10
Project managment 10
 
Expert systems
Expert systemsExpert systems
Expert systems
 
Security Risk Assessment
Security Risk AssessmentSecurity Risk Assessment
Security Risk Assessment
 
Ballot: Risk Assessments Made Simple
Ballot: Risk Assessments Made SimpleBallot: Risk Assessments Made Simple
Ballot: Risk Assessments Made Simple
 
Isa 4
Isa 4Isa 4
Isa 4
 
Security risk management
Security risk managementSecurity risk management
Security risk management
 
Hardwiring Safety 7 Tips For Changing Culture
Hardwiring Safety 7 Tips For Changing CultureHardwiring Safety 7 Tips For Changing Culture
Hardwiring Safety 7 Tips For Changing Culture
 
Risk Management Training
Risk Management TrainingRisk Management Training
Risk Management Training
 
BSidesQuebec2013_fred
BSidesQuebec2013_fredBSidesQuebec2013_fred
BSidesQuebec2013_fred
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Con...
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Con...Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Con...
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Con...
 
Clinical Risk Management
Clinical Risk Management Clinical Risk Management
Clinical Risk Management
 

Viewers also liked

Sealy Publications
Sealy   PublicationsSealy   Publications
Sealy Publicationsjemels
 
Wgss stel spring_13
Wgss stel spring_13Wgss stel spring_13
Wgss stel spring_13susanluevano
 
Chls 104 moran_spring_15
Chls 104 moran_spring_15Chls 104 moran_spring_15
Chls 104 moran_spring_15susanluevano
 
TBF 2011- Ezequiel Singer: "Google Workshop"
TBF 2011- Ezequiel Singer: "Google Workshop"TBF 2011- Ezequiel Singer: "Google Workshop"
TBF 2011- Ezequiel Singer: "Google Workshop"Karla Witte
 
Chls 104 rivera_fall_11_revised
Chls 104 rivera_fall_11_revisedChls 104 rivera_fall_11_revised
Chls 104 rivera_fall_11_revisedsusanluevano
 
Chls 104 moran_spring_13
Chls 104 moran_spring_13Chls 104 moran_spring_13
Chls 104 moran_spring_13susanluevano
 
CLASIFICACIÓN DE LA OBESIDAD
CLASIFICACIÓN DE LA OBESIDADCLASIFICACIÓN DE LA OBESIDAD
CLASIFICACIÓN DE LA OBESIDADHellen Rodriguez
 
цахим тест мат-бб
цахим тест мат-ббцахим тест мат-бб
цахим тест мат-ббdeem_8989
 
Giáo trình thương mại điện tử (2)
Giáo trình thương mại điện tử (2)Giáo trình thương mại điện tử (2)
Giáo trình thương mại điện tử (2)vinhthanhdbk
 
Statoil 2011 positioned for long term growth
Statoil 2011 positioned for long term growthStatoil 2011 positioned for long term growth
Statoil 2011 positioned for long term growthderrick_anitha
 
Power tutorial
Power tutorialPower tutorial
Power tutorialMrp20
 

Viewers also liked (20)

Sealy Publications
Sealy   PublicationsSealy   Publications
Sealy Publications
 
Lesson tres
Lesson tres Lesson tres
Lesson tres
 
Wgss stel spring_13
Wgss stel spring_13Wgss stel spring_13
Wgss stel spring_13
 
بكار فى المدينة
بكار فى المدينةبكار فى المدينة
بكار فى المدينة
 
Chls 104 moran_spring_15
Chls 104 moran_spring_15Chls 104 moran_spring_15
Chls 104 moran_spring_15
 
TBF 2011- Ezequiel Singer: "Google Workshop"
TBF 2011- Ezequiel Singer: "Google Workshop"TBF 2011- Ezequiel Singer: "Google Workshop"
TBF 2011- Ezequiel Singer: "Google Workshop"
 
Chls 104 rivera_fall_11_revised
Chls 104 rivera_fall_11_revisedChls 104 rivera_fall_11_revised
Chls 104 rivera_fall_11_revised
 
Chls 104 moran_spring_13
Chls 104 moran_spring_13Chls 104 moran_spring_13
Chls 104 moran_spring_13
 
Salita 5 j
Salita 5 jSalita 5 j
Salita 5 j
 
Ingles
InglesIngles
Ingles
 
Hideki Frazier
Hideki FrazierHideki Frazier
Hideki Frazier
 
Hw anis
Hw anisHw anis
Hw anis
 
Apl machinery-pvt-ltd
Apl machinery-pvt-ltdApl machinery-pvt-ltd
Apl machinery-pvt-ltd
 
CLASIFICACIÓN DE LA OBESIDAD
CLASIFICACIÓN DE LA OBESIDADCLASIFICACIÓN DE LA OBESIDAD
CLASIFICACIÓN DE LA OBESIDAD
 
Cuentitos
Cuentitos Cuentitos
Cuentitos
 
цахим тест мат-бб
цахим тест мат-ббцахим тест мат-бб
цахим тест мат-бб
 
Giáo trình thương mại điện tử (2)
Giáo trình thương mại điện tử (2)Giáo trình thương mại điện tử (2)
Giáo trình thương mại điện tử (2)
 
De thi qlda1
De thi qlda1De thi qlda1
De thi qlda1
 
Statoil 2011 positioned for long term growth
Statoil 2011 positioned for long term growthStatoil 2011 positioned for long term growth
Statoil 2011 positioned for long term growth
 
Power tutorial
Power tutorialPower tutorial
Power tutorial
 

Similar to Yulin’s research introduction

Continual Monitoring
Continual MonitoringContinual Monitoring
Continual MonitoringTripwire
 
Risk assessment techniques a critical success factor
Risk assessment techniques a critical success factorRisk assessment techniques a critical success factor
Risk assessment techniques a critical success factorPECB
 
RiskWatch for Financial Institutions™
RiskWatch for Financial Institutions™RiskWatch for Financial Institutions™
RiskWatch for Financial Institutions™CPaschal
 
NASA System-Wide Safety Project System-Wide Predictive Analytics and Continuo...
NASA System-Wide Safety Project System-Wide Predictive Analytics and Continuo...NASA System-Wide Safety Project System-Wide Predictive Analytics and Continuo...
NASA System-Wide Safety Project System-Wide Predictive Analytics and Continuo...Dr. Pankaj Dhussa
 
Information Security Continuous Monitoring within a Risk Management Framework
Information Security Continuous Monitoring within a Risk Management FrameworkInformation Security Continuous Monitoring within a Risk Management Framework
Information Security Continuous Monitoring within a Risk Management FrameworkWilliam McBorrough
 
Safeguarding Health Information through HIPA.pptx
Safeguarding Health Information through HIPA.pptxSafeguarding Health Information through HIPA.pptx
Safeguarding Health Information through HIPA.pptxibrahimsukari2
 
crisc_wk_3.pptx
crisc_wk_3.pptxcrisc_wk_3.pptx
crisc_wk_3.pptxdotco
 
implementation_of_a_risk-based_process_safety_management_system_framework.pptx
implementation_of_a_risk-based_process_safety_management_system_framework.pptximplementation_of_a_risk-based_process_safety_management_system_framework.pptx
implementation_of_a_risk-based_process_safety_management_system_framework.pptxzeidali3
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniyaseraljohani
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniYaser Alrefai
 
RiskWatch for Physical & Homeland Security™
RiskWatch for Physical & Homeland Security™RiskWatch for Physical & Homeland Security™
RiskWatch for Physical & Homeland Security™CPaschal
 
Microsoft InfoSec for cloud and mobile
Microsoft InfoSec for cloud and mobileMicrosoft InfoSec for cloud and mobile
Microsoft InfoSec for cloud and mobileVijayananda Mohire
 
Threat intelligence life cycle steps by steps
Threat intelligence life cycle steps by stepsThreat intelligence life cycle steps by steps
Threat intelligence life cycle steps by stepsJayeshGadhave1
 
Operations Risk Management
Operations Risk ManagementOperations Risk Management
Operations Risk ManagementMedlin Rozario
 
M1-1-SMS_Aerodrome_Hazard Identfication.pdf
M1-1-SMS_Aerodrome_Hazard Identfication.pdfM1-1-SMS_Aerodrome_Hazard Identfication.pdf
M1-1-SMS_Aerodrome_Hazard Identfication.pdfGSEProject
 

Similar to Yulin’s research introduction (20)

Continual Monitoring
Continual MonitoringContinual Monitoring
Continual Monitoring
 
Risk assessment techniques a critical success factor
Risk assessment techniques a critical success factorRisk assessment techniques a critical success factor
Risk assessment techniques a critical success factor
 
RiskWatch for Financial Institutions™
RiskWatch for Financial Institutions™RiskWatch for Financial Institutions™
RiskWatch for Financial Institutions™
 
NASA System-Wide Safety Project System-Wide Predictive Analytics and Continuo...
NASA System-Wide Safety Project System-Wide Predictive Analytics and Continuo...NASA System-Wide Safety Project System-Wide Predictive Analytics and Continuo...
NASA System-Wide Safety Project System-Wide Predictive Analytics and Continuo...
 
Information Security Continuous Monitoring within a Risk Management Framework
Information Security Continuous Monitoring within a Risk Management FrameworkInformation Security Continuous Monitoring within a Risk Management Framework
Information Security Continuous Monitoring within a Risk Management Framework
 
Safeguarding Health Information through HIPA.pptx
Safeguarding Health Information through HIPA.pptxSafeguarding Health Information through HIPA.pptx
Safeguarding Health Information through HIPA.pptx
 
crisc_wk_3.pptx
crisc_wk_3.pptxcrisc_wk_3.pptx
crisc_wk_3.pptx
 
Chapter003
Chapter003Chapter003
Chapter003
 
HIPAA omnibus rule update
HIPAA omnibus rule updateHIPAA omnibus rule update
HIPAA omnibus rule update
 
implementation_of_a_risk-based_process_safety_management_system_framework.pptx
implementation_of_a_risk-based_process_safety_management_system_framework.pptximplementation_of_a_risk-based_process_safety_management_system_framework.pptx
implementation_of_a_risk-based_process_safety_management_system_framework.pptx
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohani
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohani
 
RiskWatch for Physical & Homeland Security™
RiskWatch for Physical & Homeland Security™RiskWatch for Physical & Homeland Security™
RiskWatch for Physical & Homeland Security™
 
Microsoft InfoSec for cloud and mobile
Microsoft InfoSec for cloud and mobileMicrosoft InfoSec for cloud and mobile
Microsoft InfoSec for cloud and mobile
 
Threat intelligence life cycle steps by steps
Threat intelligence life cycle steps by stepsThreat intelligence life cycle steps by steps
Threat intelligence life cycle steps by steps
 
CISSP Chapter 1 Risk Management
CISSP Chapter 1  Risk ManagementCISSP Chapter 1  Risk Management
CISSP Chapter 1 Risk Management
 
PSM RM - Learn from experience
PSM RM - Learn from experiencePSM RM - Learn from experience
PSM RM - Learn from experience
 
Operations Risk Management
Operations Risk ManagementOperations Risk Management
Operations Risk Management
 
Lesson 3
Lesson 3Lesson 3
Lesson 3
 
M1-1-SMS_Aerodrome_Hazard Identfication.pdf
M1-1-SMS_Aerodrome_Hazard Identfication.pdfM1-1-SMS_Aerodrome_Hazard Identfication.pdf
M1-1-SMS_Aerodrome_Hazard Identfication.pdf
 

Recently uploaded

My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 

Recently uploaded (20)

My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 

Yulin’s research introduction

  • 1. 1 A Human Factors-Based Safety Management Model for Aviation Maintenance Safety Yu-Lin Hsiao, PhD Department of Industrial and Systems Engineering
  • 2. 2 How do we manage safety? • The way we currently do – Reactive way: Accident & Incident Investigation – Proactive way • Daily- or Periodic-Based: Audit, LOSA, FOQA • Behavior-Oriented: ASAP, LOSA • Event- or Consequence-Based: MEDA, Risk Matrix • Each system has its own advantages, but also probably goes its own and unique way
  • 3. 3 How do we manage safety? • If there is a integrated method to manage safety from a macro-system viewpoint? – According to the purpose and philosophy of the ICAO Safety Management System (SMS) as well • Can we integrate all these safety programs or methods by using the same language? – Based on the same common concepts – Quantitative and Data-driven Method
  • 4. 4 How do we manage safety? • Furthermore, can we use these safety data to evaluate the safety status and manage the risk? – To assist upper-level management and decision-making – For long-term and continued safety management – But not just focus on single event analysis or case by case
  • 5. 5 Answer: Human Factors (HF) • It is the major cause of flight accidents – Implicated in most accidents and incidents • Most safety programs are related to human factors in some way • Connected with current risk and safety management concepts – To eliminate or mitigate specific human error
  • 6. 6 Steps to establish the HF model • 1. Data Transformation – From Qualitative Documents • audit, investigation, or voluntary reports – To Quantitative Data • Human Factors Rates • Use the Human Factors Analysis and Classification System – Maintenance Audit (HFACS-MA) – Set up an internal review board • To analyze data sourced from various systems • Extract consensus results to calculate the quantitative rates
  • 7. 7
  • 8. 8
  • 9. 9 Human Factors Rates • Each error type was accumulated for monthly period • Multiply by the weights of severity degree – Weights were developed by aviation authority – Based on Analytic Hierarchy Process (AHP) method • Human Factors Rate = W : The highest weight of severity degree (W = 11, the designated weight of Finding ) wi : The weight of the severity degree, i={I, R, C, F} n : The sum of the human failures with all severity degree per month ni : The sum of the human failures with specific severity degree, i={I, R, C, F} ( ) nW nw i ii ∗ ∗∑
  • 10. 10 Future Incident Rate Incident Rate = Incident : The number of incidents per month Departure: The number of flight departure per month 000,1× ∑ Departure Incident Airline Departure Times Accident Incident Accident Rate Incident Rate A 81,448 1 73 0.012 0.90 B 134,814 2 192 0.015 1.42
  • 11. 11 Steps to establish the HF model • 2. Develop the mathematical model – Use Neural Network method – Verify the prediction performance of the model • 3. Start using the model to evaluate safety status – Output: Future Incident Rate – Different company might have different prediction performance or time range (month or quarter)
  • 12. 12 Steps to establish the HF model • 4. Detect the uprising trend of future incident rate – Self- or Expert-decided warning threshold • 5. Find out the root causes and the original data sources – Based on real and reliable data collected by different safety systems or programs – To support the corresponding safety management activities
  • 13. 13 • Current Achievement: – Succeed in the prediction of future incident rate using human factors analysis – Based on real safety audit data from aviation authority (data-driven & practical) – Prove the causality of human error and safety – General Accuracy • Correlation Coefficient: 0.6 ~ 0.75 • R2 : 0.35 ~ 0.58 HF-Based Safety Management Model
  • 14. 14 Prediction Result 0 2 4 6 8 10 Months IncidentRates Actual Simulate Airline A Airline B 60 0 1 2 3 4 5 Month IncidentRates Actual Simulate
  • 15. 15 • Advantages – Can integrate various data sources from different safety programs using the same standard • Human Factors concept • As an integrated part of SMS – Can become a safety management tool to detect risk associated with uprising incident rate from a systematic perspective • Find out the root causes related to incident rate • Conduct corresponding management activities to control the risk HF-Based Safety Management Model
  • 16. 16 HF-Based Safety Management Model • Improvement to safety management system – Help manager’s decision making regarding the safety management priority – Integrate and utilize various safety data to improve safety management in a quantitative way – Focus on both active and latent human factors such as safety climate which could affect the safety performance 16