Safety Management: A Qualitative Systems Approach

Safety Management: A Qualitative Systems Approach

2003 | 235 Pages | ISBN: 0415303702. 0415303710 | PDF | 0,8 MB

Professionals striving for accident reduction must deal with systems in which both technical and human elements play equal and complementary roles. However, many of the existing techniques in ergonomics and risk management concentrate on plant and technical issues and downplay human factors and "subjectivity." Safety Management: A Qualitative Systems Approach describes a body of theories and data that addresses safety by drawing on systems theory and applied psychology, stressing the importance of human activity within systems. It explains in detail the central roles of social consensus and reliability and the nature of verbal reports and functional discourse.
This text presents a new approach to safety management, offering a path to both greater safety and to economic savings. It presents a series of methodological tools that have proven to be reliable through extensive use in the rail and nuclear industries. These methods allow organizational and systems failures to be analyzed much more effectively in terms of quantity, precision, and usefulness.
The concepts and tools described in this book are particularly valuable for reliability engineers, risk managers, human factors specialists, and safety managers and professionals in safety-critical organizations.


[Fast Download] Safety Management: A Qualitative Systems Approach

Ebooks related to "Safety Management: A Qualitative Systems Approach" :
Security and Privacy for Mobile Healthcare Networks
Software Quality Assurance : Integrating Testing, Security, and Audit
World of Walls: The Structure, Roles and Effectiveness of Separation Barriers
Cyber Security and Policy: A Substantive Dialogue
The Law of Cybercrimes and Their Investigations
Applications of Artificial Intelligence, Volume 47
Performance, Stability, Dynamics, and Control of Airplanes
Grigorii Kabatiansky, «Error Correcting Coding and Security for Data Networks»
Personal Cybersecurity: How to Avoid and Recover from Cybercrime
Advances in Cryptology - CRYPTO 2016, Part I
Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.