Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000010144409 | BF623.E7 P48 2006 | Open Access Book | Book | Searching... |
Searching... | 30000010219697 | BF623.E7 P48 2006 | Open Access Book | Book | Searching... |
Searching... | 30000010219696 | BF623.E7 P48 2006 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
Human error is regularly viewed as an inevitable part of everyday life. In many cases the results of human error are harmless and correctable, but in cases where injury and death can occur, reduction of error is imperative. An integration of useful how-to-do-it information, Human Error: Causes and Control covers theories, methods, and specific techniques for controlling human error. It provides ideas, concepts, and examples from which selections can be made to fit the needs of a particular situation. Detailed, practical, and broad in scope, the book explores the field of human error, including its identification, its probable cause, and how it can be reasonably controlled or prevented.
Experts in human factors, design engineering, and law, the authors explore and apply known generic principles effective in the prevention of consumer error, worker fault, managerial mistakes, and organizational blunders. They discuss errors and their effects in our increasingly complex technological society and delineate how to devise a proper framework, select workable concepts and techniques, and then implement them. Exploring widespread applications of the techniques, the book illustrates how to achieve a fully integrated, process-compatible, comprehensive, user-effective, and methodologically sound model.
Author Notes
Peters, George A.; Peters, Barbara J.
Table of Contents
Chapter 1 Introduction | p. 1 |
Scenarios | p. 2 |
Caveats | p. 8 |
Importance | p. 8 |
Common sense | p. 8 |
Sloganeering | p. 8 |
Bias | p. 8 |
Error proofing | p. 9 |
Need | p. 9 |
Chapter 2 Data collection | p. 11 |
Introduction | p. 11 |
Evidence-based data | p. 11 |
Sources of data | p. 12 |
Clarification and purification | p. 13 |
Cautions | p. 17 |
Caveats | p. 18 |
Foundation | p. 18 |
Enrichment | p. 18 |
No data | p. 18 |
Accommodation | p. 19 |
Chapter 3 Risk assessment | p. 21 |
Introduction | p. 21 |
Definitions | p. 21 |
Classification models | p. 23 |
Frequency estimates | p. 23 |
Severity estimates | p. 24 |
Analogies and reciprocity | p. 24 |
Risk | p. 26 |
Worker (OHS) risk assessment | p. 28 |
Assessment of control measures | p. 29 |
Whistle-blowing | p. 30 |
Managerial actions | p. 30 |
Political risk assessment | p. 31 |
Postmarket considerations | p. 31 |
Caveats | p. 32 |
Conflicts | p. 32 |
Objectivity | p. 33 |
Secrecy | p. 33 |
Documentation | p. 33 |
No analysis possible | p. 33 |
Chapter 4 Alternative analytic methods | p. 35 |
Introduction | p. 35 |
No data methods | p. 35 |
Default decisions | p. 35 |
The precautionary principle | p. 36 |
Expert elicitation | p. 36 |
Local consensus | p. 37 |
Error troubleshooting | p. 37 |
Search teams | p. 38 |
Systems integration analysis | p. 39 |
Successive evaluations | p. 40 |
Targeted errors | p. 40 |
Immediate problem resolution | p. 41 |
Uncertainty analysis | p. 43 |
Exclusions | p. 44 |
Caveats | p. 44 |
Just ask | p. 44 |
Subjective risk | p. 45 |
Spin | p. 45 |
Legal risk | p. 45 |
Allocating resources | p. 45 |
Chapter 5 Behavioral vectors | p. 47 |
Introduction | p. 47 |
General approach | p. 48 |
Basic human characteristics | p. 48 |
Learning ability | p. 49 |
Communication skills | p. 49 |
Information processing | p. 49 |
Physical attributes | p. 49 |
Reaction | p. 49 |
Language skills | p. 50 |
Illustrative personality traits | p. 50 |
Antisocial personality | p. 50 |
Histrionic personality | p. 50 |
Avoidant personality | p. 50 |
Passive-aggressive personality | p. 50 |
Dependent personality | p. 51 |
Obsessive-compulsive personality | p. 51 |
Narcissistic personality | p. 51 |
Symptom cross-reference | p. 51 |
Normalcy and impairment | p. 53 |
A psychometric perspective | p. 53 |
A human error perspective | p. 53 |
Neuropsychological test evaluation | p. 55 |
Abstract reasoning | p. 56 |
Memory | p. 56 |
Cognitive processing | p. 57 |
Substance abuse | p. 57 |
Intelligence | p. 57 |
Aphasia | p. 58 |
Malingering | p. 58 |
Cautions | p. 58 |
Caveats | p. 58 |
Chapter 6 Countermeasures (remedies) | p. 61 |
Introduction | p. 61 |
General principles | p. 61 |
Specific countermeasures | p. 62 |
Single-error tolerance | p. 62 |
The rule of two | p. 63 |
Interposition | p. 64 |
Sequestration | p. 64 |
Interlocks and lockouts | p. 64 |
Channelization | p. 65 |
Guides and stops | p. 65 |
Automation | p. 66 |
Instructions | p. 66 |
Training | p. 67 |
Behavior modification | p. 68 |
Safety factors | p. 68 |
Warnings | p. 69 |
Protective equipment | p. 70 |
Redundancy | p. 70 |
Derating | p. 71 |
Fail-safe | p. 71 |
Stress reduction | p. 71 |
Tools | p. 72 |
Replacement | p. 73 |
Enhancement | p. 73 |
Inactivity | p. 73 |
Independent confirmation | p. 74 |
Therapy | p. 74 |
Improvisation | p. 74 |
Pragmatism | p. 76 |
Caveats | p. 76 |
Targeting | p. 76 |
Acceptability | p. 76 |
Multiple remedies | p. 77 |
Success metric | p. 77 |
Fade-out | p. 77 |
Perversity | p. 77 |
Customization | p. 77 |
Classification of human error | p. 78 |
Chapter 7 Human factors design guidelines | p. 79 |
Introduction | p. 79 |
Methodology | p. 80 |
Scientific research | p. 80 |
Empirical research | p. 81 |
Descriptive measurements | p. 82 |
Task analysis | p. 82 |
Simulation | p. 83 |
Focus groups | p. 83 |
Design reviews | p. 84 |
Field studies | p. 84 |
Meta-analysis | p. 85 |
Stabilization research | p. 85 |
Illustrative guidelines | p. 86 |
Clutter | p. 86 |
Visual references | p. 86 |
Fatigue | p. 87 |
Accidental activation | p. 87 |
Control motion compatibility | p. 87 |
Operator incapacity | p. 88 |
Abuse | p. 88 |
Coding | p. 88 |
Pictorials | p. 89 |
Grouping | p. 89 |
Accessibility | p. 89 |
False cues | p. 89 |
Abstract theory | p. 89 |
Ignoring documents | p. 90 |
Information | p. 90 |
Cold weather | p. 90 |
Audible alarms | p. 91 |
Intelligibility | p. 91 |
Installation | p. 91 |
Arming | p. 91 |
Balance | p. 92 |
Overload | p. 92 |
Controllability | p. 92 |
Unusual conditions | p. 93 |
Prompts | p. 93 |
Self-governance | p. 94 |
Similarities | p. 94 |
Overlap | p. 94 |
Scope of work | p. 94 |
Moral obligations | p. 95 |
Language interpretations | p. 95 |
Negotiating change | p. 96 |
Caveats | p. 96 |
Constant change | p. 96 |
Symbiosis | p. 96 |
Noise control | p. 96 |
Dynamic systems | p. 97 |
Multiple causation | p. 97 |
Uncertainty | p. 97 |
Process shifts | p. 97 |
Field reports | p. 97 |
Bias recognition | p. 97 |
Chapter 8 Testing and functional validation | p. 99 |
Introduction | p. 99 |
General principles | p. 100 |
Direct observations | p. 100 |
Firsthand investigation | p. 100 |
General solutions | p. 100 |
Definitions | p. 100 |
Illustrative tests | p. 101 |
Proof-of-concept tests | p. 101 |
Component and assembly testing | p. 102 |
Parameter analysis | p. 102 |
Systems testing | p. 102 |
Special testing | p. 104 |
Intentional exposure to harm | p. 104 |
Compliance testing | p. 105 |
Installation testing | p. 105 |
Field audit and validation testing | p. 106 |
Modification testing | p. 106 |
Special needs testing | p. 107 |
Cautions | p. 108 |
Caveats | p. 108 |
Minimum cost | p. 108 |
The difference | p. 108 |
Life cycle | p. 108 |
Overlap | p. 109 |
Neglect | p. 109 |
Chapter 9 Managerial errors | p. 111 |
Introduction | p. 111 |
Error vector analysis | p. 111 |
Intrinsic factors | p. 111 |
Impressed factors | p. 111 |
Extrinsic factors | p. 112 |
Compensatory factors | p. 112 |
Error analysis | p. 112 |
Error-prone managers | p. 112 |
Analytic techniques | p. 113 |
Psychological risk assessment | p. 113 |
Conduct clusters | p. 114 |
Focus (inattentiveness) | p. 115 |
Sex (addictive conduct) | p. 116 |
Truthfulness (deceit) | p. 118 |
Compulsiveness (inflexibility) | p. 121 |
Avoidant personality (self-isolation) | p. 122 |
Dependent personality (indecisiveness) | p. 122 |
Social anxiety disorders (phobias) | p. 123 |
Social exclusion (pain) | p. 123 |
Schizoid personality disorder (loners) | p. 124 |
Paranoid personality disorder (suspiciousness) | p. 124 |
Passive-aggressive personality disorder (negativism) | p. 125 |
Depressive personality disorder (sadness) | p. 125 |
Posttraumatic stress disorder (anxiety) | p. 125 |
Antisocial personality disorder (disregard) | p. 126 |
Other disorders | p. 127 |
Overlays | p. 127 |
Drugs | p. 127 |
Harmful chemicals (chemophobia) | p. 129 |
Denial | p. 129 |
Cigarettes | p. 130 |
Coffee | p. 130 |
Caveats | p. 131 |
Confirmation | p. 131 |
Supplemental information | p. 131 |
Confidentiality | p. 131 |
Intervening causation | p. 131 |
Rapid changes | p. 132 |
Do no harm | p. 132 |
Secondary gain | p. 132 |
Chapter 10 Institutional and organizational errors | p. 133 |
Introduction | p. 133 |
Institutional errors | p. 133 |
Common viewpoints | p. 134 |
Mind-set | p. 134 |
Perceptual errors | p. 135 |
Reciprocity | p. 135 |
Open loops | p. 136 |
Motivation | p. 137 |
Theoretical risk | p. 137 |
Leadership errors | p. 138 |
Organizational culture | p. 140 |
Assumptions | p. 140 |
Historical perspective | p. 140 |
Industrial engineering | p. 141 |
Motivational concepts | p. 141 |
Supplemental error principles | p. 142 |
Adaptation of remedies | p. 142 |
Multiple actions | p. 142 |
Error indices | p. 142 |
Arbitrary controls | p. 142 |
Unreported incidents | p. 142 |
Nuisance problems | p. 142 |
Responsible supervision | p. 143 |
ERP teams | p. 143 |
Cautions | p. 144 |
Caveats | p. 144 |
Systematic error | p. 144 |
Emotional error | p. 144 |
Error detection | p. 144 |
Cueing | p. 145 |
Clarity | p. 145 |
Peer evaluations | p. 145 |
Rigidity | p. 145 |
Chapter 11 Management challenges | p. 147 |
Introduction | p. 147 |
Extended error traceability | p. 147 |
Depersonalization | p. 149 |
Incisive restoration | p. 150 |
Outsourcing | p. 151 |
Intelligence | p. 152 |
Error R&D | p. 153 |
Contagion | p. 154 |
Cognivitis and linguistic dystrophy | p. 155 |
Rising stars | p. 156 |
Robotization | p. 157 |
Error detectives | p. 157 |
Caveats | p. 158 |
Brain drain | p. 158 |
Visibility | p. 158 |
Loyalty | p. 158 |
Remote control | p. 159 |
Direct feedback | p. 159 |
Leadership | p. 159 |
Chapter 12 Professional responsibility (ethics) | p. 161 |
Obligations and duties | p. 161 |
Useful principles and practice | p. 162 |
The Nuremberg Code | p. 163 |
Forensic principles | p. 165 |
Independence | p. 165 |
Confidentiality | p. 166 |
Integrity of others | p. 166 |
Fees | p. 166 |
Familiarity with the law | p. 167 |
Records | p. 167 |
Other relationships | p. 167 |
Client property | p. 168 |
Practice of law | p. 168 |
Collegiality | p. 168 |
Institutional review boards | p. 168 |
Protocols | p. 169 |
Supplements | p. 171 |
Caveats | p. 172 |
Limits | p. 172 |
Rules | p. 173 |
Responsibility | p. 173 |
Obsession | p. 173 |
Enforcement | p. 173 |
Chapter 13 Discussion questions | p. 175 |
Smart robots | p. 175 |
Flexible workers | p. 176 |
The unguarded saw | p. 176 |
The stairway | p. 176 |
Acceptable defects | p. 177 |
Instinct | p. 177 |
Anger | p. 178 |
Fear | p. 178 |
Decision support | p. 178 |
Problem employees | p. 178 |
Aircraft control | p. 179 |
The zoo | p. 179 |
Pedagogy | p. 179 |
Surgical errors | p. 180 |
Epidural errors | p. 180 |
Averaging the errors | p. 180 |
Building evacuation | p. 181 |
Social information | p. 181 |
Pollution | p. 182 |
Sea spray | p. 182 |
Robotized humans | p. 182 |
Energetics and hardening | p. 183 |
Howitzer misfire | p. 183 |
Safety enhancement | p. 183 |
Aircraft munitions | p. 184 |
Robotic systems | p. 184 |
Reactive chemicals | p. 184 |
Decisions | p. 185 |
The tour route | p. 185 |
Hole in the ground | p. 185 |
Close call | p. 186 |
Regional differences | p. 186 |
The 5% rule | p. 187 |
One keystroke from danger | p. 187 |
Things happen | p. 187 |
Stress and mental confusion | p. 188 |
Space station | p. 188 |
Medical mistakes | p. 188 |
Oil refinery shortcomings | p. 189 |
Unknown probability of catastrophic events | p. 189 |
Attention | p. 190 |
Imitation | p. 190 |
Stress-induced alcoholism | p. 190 |
Cultural norms | p. 191 |
Cues and memory retrieval | p. 191 |
Cognitive memory | p. 192 |
Linear programming | p. 192 |
Safe exposure levels | p. 192 |
Multiple causation | p. 193 |
Attitude matters | p. 193 |
References and recommended reading | p. 195 |
Index | p. 203 |