Safety in the Digital Age : : Sociotechnical Perspectives on Algorithms and Machine Learning.
Saved in:
Superior document: | SpringerBriefs in Applied Sciences and Technology Series |
---|---|
: | |
TeilnehmendeR: | |
Place / Publishing House: | Cham : : Springer,, 2023. ©2023. |
Year of Publication: | 2023 |
Edition: | 1st ed. |
Language: | English |
Series: | SpringerBriefs in Applied Sciences and Technology Series
|
Online Access: | |
Physical Description: | 1 online resource (135 pages) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
50030679927 |
---|---|
ctrlnum |
(MiAaPQ)50030679927 (Au-PeEL)EBL30679927 (OCoLC)1394041309 |
collection |
bib_alma |
record_format |
marc |
spelling |
Le Coze, Jean-Christophe. Safety in the Digital Age : Sociotechnical Perspectives on Algorithms and Machine Learning. 1st ed. Cham : Springer, 2023. ©2023. 1 online resource (135 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier SpringerBriefs in Applied Sciences and Technology Series Intro -- Contents -- 1 Safety in a Digital Age: Old and New Problems-Algorithms, Machine Learning, Big Data and Artificial Intelligence -- References -- 2 The Digitalisation of Risk Assessment: Fulfilling the Promises of Prediction? -- 2.1 Introduction -- 2.2 Assessing and Computing Risks -- 2.3 Layers of Transformation: A Historical Perspective on Digitalisation -- 2.3.1 Mathematical Models: Technologies of Computing -- 2.3.2 Datafication -- 2.3.3 Computational Risk Assessment: The Integrated Vision -- 2.4 Discussion -- References -- 3 Key Dimensions of Algorithmic Management, Machine Learning and Big Data in Differing Large Sociotechnical Systems, with Implications for Systemwide Safety Management -- 3.1 Roadmap and Introduction -- 3.2 Limitations of "Automation" as a Covering Concept -- 3.3 Developers' Perspective on a New Software Application -- 3.4 What's the Upshot for System Safety? Obsolescence as a Long-Term Sociotechnical Concern -- 3.5 A Concluding Speculation on When System Safety is Breached -- References -- 4 Digitalisation, Safety and Privacy -- 4.1 Introduction -- 4.2 Individualised Digital Tools and Privacy at Work -- 4.2.1 An Empirical Analysis -- 4.3 Conclusion -- Bibliography -- 5 Design and Dissemination of Blockchain Technologies: The Challenge of Privacy -- 5.1 A First Privacy Test: Defining Governance -- 5.1.1 The Appointment of a Controller, a "Test" for the Consortium -- 5.1.2 A Form of Recentralisation Contrary to the Imagination of Blockchain Designers -- 5.1.3 The Compromise of Choosing the Consortium Blockchain -- 5.2 Second Privacy Test: Management of Personal Data -- 5.2.1 Setting up an Off-Chain System to Store the Data -- 5.2.2 Data Minimisation -- 5.3 Third Privacy Test: A User Pathway Tested for Explicability and Security -- 5.3.1 Three Requests for Consent -- 5.3.2 An Opaque Security Key System. 5.4 Conclusion -- References -- 6 Considering Severity of Safety-Critical System Outcomes in Risk Analysis: An Extension of Fault Tree Analysis -- 6.1 Motivation -- 6.2 Background -- 6.3 Objective -- 6.4 Review of Traditional FTA -- 6.5 A Consequence Severity-Probability Importance Measure Algorithm for FTA -- 6.6 Conclusions -- References -- 7 Are We Going Towards "No-Brainer" Safety Management? -- 7.1 Introduction -- 7.1.1 Artificial Intelligence and Machine Learning -- 7.1.2 Monitoring of Early Deviations and Past Events -- 7.2 Examples of AI-Based Prediction -- 7.2.1 Consequence Class Associated with a Hazardous Material Release -- 7.2.2 Wellhead Damage Frequency in a Drilling Rig -- 7.2.3 Alarm Chattering in an Ammonia Plant -- 7.3 Method -- 7.3.1 Metrics -- 7.4 Results and Discussion -- 7.5 Conclusion -- References -- 8 Looking at the Safety of AI from a Systems Perspective: Two Healthcare Examples -- 8.1 Introduction -- 8.2 Challenges Old and New -- 8.3 Example 1: AI-based infusion pumps for IV medication administration -- 8.4 Example 2: AI to support the recognition of out-of-hospital cardiac arrest -- 8.5 Conclusion -- References -- 9 Normal Cyber-Crises -- 9.1 Introduction -- 9.2 Normal Accidents and High Reliability Organisations -- 9.3 Analysis -- 9.3.1 Technology -- 9.3.2 Cognition -- 9.3.3 Organisation -- 9.3.4 Macro -- 9.4 Conclusion -- References -- 10 Information Security Behaviour in an Organisation Providing Critical Infrastructure: A Pre-post Study of Efforts to Improve Information Security Culture -- 10.1 Introduction -- 10.1.1 Background -- 10.1.2 Aims -- 10.1.3 Previous Research -- 10.2 Methods -- 10.2.1 Qualitative Interviews -- 10.2.2 Quantitative Survey -- 10.2.3 Samples -- 10.3 Results -- 10.3.1 IS Management System Implementation -- 10.3.2 Improvements in ISC -- 10.3.3 Improvements in Information Security Behaviour. 10.4 Discussion -- 10.4.1 The Implementation of ISMS -- 10.4.2 How Can We Explain the Improvements in Information Security Culture? -- 10.4.3 How Can We Explain the Improvements in Information Security Behaviours? -- 10.4.4 Safety Culture Versus Security Culture -- 10.5 Conclusion -- References -- 11 AI at Work, Working with AI. First Lessons from Real Use Cases -- 11.1 Artificial Intelligence at Work: Five Workers Stories -- 11.2 From Stories to Real Cases: What Working with AI Could Mean -- 11.2.1 Five Workers Stories Put to Test of Real World -- 11.3 Discussion: AI, Organisation, Workers and Safety -- References -- 12 Safety in the Digital Age-Sociotechnical Challenges -- 12.1 Introduction -- 12.1.1 What is a "Sociotechnical Perspective"? -- 12.2 Sociotechnical Challenges -- 12.2.1 Where is "The System"? The Migration of Risk -- 12.2.2 The Relations of Rationalities -- 12.2.3 The Big Picture Versus Empirical Specificities ("Moving Closer" and "Zooming Out") -- 12.3 Looking Forward -- References. Description based on publisher supplied metadata and other sources. Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries. Electronic books. Antonsen, Stian. Print version: Le Coze, Jean-Christophe Safety in the Digital Age Cham : Springer,c2023 9783031326325 ProQuest (Firm) https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=30679927 Click to View |
language |
English |
format |
eBook |
author |
Le Coze, Jean-Christophe. |
spellingShingle |
Le Coze, Jean-Christophe. Safety in the Digital Age : Sociotechnical Perspectives on Algorithms and Machine Learning. SpringerBriefs in Applied Sciences and Technology Series Intro -- Contents -- 1 Safety in a Digital Age: Old and New Problems-Algorithms, Machine Learning, Big Data and Artificial Intelligence -- References -- 2 The Digitalisation of Risk Assessment: Fulfilling the Promises of Prediction? -- 2.1 Introduction -- 2.2 Assessing and Computing Risks -- 2.3 Layers of Transformation: A Historical Perspective on Digitalisation -- 2.3.1 Mathematical Models: Technologies of Computing -- 2.3.2 Datafication -- 2.3.3 Computational Risk Assessment: The Integrated Vision -- 2.4 Discussion -- References -- 3 Key Dimensions of Algorithmic Management, Machine Learning and Big Data in Differing Large Sociotechnical Systems, with Implications for Systemwide Safety Management -- 3.1 Roadmap and Introduction -- 3.2 Limitations of "Automation" as a Covering Concept -- 3.3 Developers' Perspective on a New Software Application -- 3.4 What's the Upshot for System Safety? Obsolescence as a Long-Term Sociotechnical Concern -- 3.5 A Concluding Speculation on When System Safety is Breached -- References -- 4 Digitalisation, Safety and Privacy -- 4.1 Introduction -- 4.2 Individualised Digital Tools and Privacy at Work -- 4.2.1 An Empirical Analysis -- 4.3 Conclusion -- Bibliography -- 5 Design and Dissemination of Blockchain Technologies: The Challenge of Privacy -- 5.1 A First Privacy Test: Defining Governance -- 5.1.1 The Appointment of a Controller, a "Test" for the Consortium -- 5.1.2 A Form of Recentralisation Contrary to the Imagination of Blockchain Designers -- 5.1.3 The Compromise of Choosing the Consortium Blockchain -- 5.2 Second Privacy Test: Management of Personal Data -- 5.2.1 Setting up an Off-Chain System to Store the Data -- 5.2.2 Data Minimisation -- 5.3 Third Privacy Test: A User Pathway Tested for Explicability and Security -- 5.3.1 Three Requests for Consent -- 5.3.2 An Opaque Security Key System. 5.4 Conclusion -- References -- 6 Considering Severity of Safety-Critical System Outcomes in Risk Analysis: An Extension of Fault Tree Analysis -- 6.1 Motivation -- 6.2 Background -- 6.3 Objective -- 6.4 Review of Traditional FTA -- 6.5 A Consequence Severity-Probability Importance Measure Algorithm for FTA -- 6.6 Conclusions -- References -- 7 Are We Going Towards "No-Brainer" Safety Management? -- 7.1 Introduction -- 7.1.1 Artificial Intelligence and Machine Learning -- 7.1.2 Monitoring of Early Deviations and Past Events -- 7.2 Examples of AI-Based Prediction -- 7.2.1 Consequence Class Associated with a Hazardous Material Release -- 7.2.2 Wellhead Damage Frequency in a Drilling Rig -- 7.2.3 Alarm Chattering in an Ammonia Plant -- 7.3 Method -- 7.3.1 Metrics -- 7.4 Results and Discussion -- 7.5 Conclusion -- References -- 8 Looking at the Safety of AI from a Systems Perspective: Two Healthcare Examples -- 8.1 Introduction -- 8.2 Challenges Old and New -- 8.3 Example 1: AI-based infusion pumps for IV medication administration -- 8.4 Example 2: AI to support the recognition of out-of-hospital cardiac arrest -- 8.5 Conclusion -- References -- 9 Normal Cyber-Crises -- 9.1 Introduction -- 9.2 Normal Accidents and High Reliability Organisations -- 9.3 Analysis -- 9.3.1 Technology -- 9.3.2 Cognition -- 9.3.3 Organisation -- 9.3.4 Macro -- 9.4 Conclusion -- References -- 10 Information Security Behaviour in an Organisation Providing Critical Infrastructure: A Pre-post Study of Efforts to Improve Information Security Culture -- 10.1 Introduction -- 10.1.1 Background -- 10.1.2 Aims -- 10.1.3 Previous Research -- 10.2 Methods -- 10.2.1 Qualitative Interviews -- 10.2.2 Quantitative Survey -- 10.2.3 Samples -- 10.3 Results -- 10.3.1 IS Management System Implementation -- 10.3.2 Improvements in ISC -- 10.3.3 Improvements in Information Security Behaviour. 10.4 Discussion -- 10.4.1 The Implementation of ISMS -- 10.4.2 How Can We Explain the Improvements in Information Security Culture? -- 10.4.3 How Can We Explain the Improvements in Information Security Behaviours? -- 10.4.4 Safety Culture Versus Security Culture -- 10.5 Conclusion -- References -- 11 AI at Work, Working with AI. First Lessons from Real Use Cases -- 11.1 Artificial Intelligence at Work: Five Workers Stories -- 11.2 From Stories to Real Cases: What Working with AI Could Mean -- 11.2.1 Five Workers Stories Put to Test of Real World -- 11.3 Discussion: AI, Organisation, Workers and Safety -- References -- 12 Safety in the Digital Age-Sociotechnical Challenges -- 12.1 Introduction -- 12.1.1 What is a "Sociotechnical Perspective"? -- 12.2 Sociotechnical Challenges -- 12.2.1 Where is "The System"? The Migration of Risk -- 12.2.2 The Relations of Rationalities -- 12.2.3 The Big Picture Versus Empirical Specificities ("Moving Closer" and "Zooming Out") -- 12.3 Looking Forward -- References. |
author_facet |
Le Coze, Jean-Christophe. Antonsen, Stian. |
author_variant |
c j c l cjc cjcl |
author2 |
Antonsen, Stian. |
author2_variant |
s a sa |
author2_role |
TeilnehmendeR |
author_sort |
Le Coze, Jean-Christophe. |
title |
Safety in the Digital Age : Sociotechnical Perspectives on Algorithms and Machine Learning. |
title_sub |
Sociotechnical Perspectives on Algorithms and Machine Learning. |
title_full |
Safety in the Digital Age : Sociotechnical Perspectives on Algorithms and Machine Learning. |
title_fullStr |
Safety in the Digital Age : Sociotechnical Perspectives on Algorithms and Machine Learning. |
title_full_unstemmed |
Safety in the Digital Age : Sociotechnical Perspectives on Algorithms and Machine Learning. |
title_auth |
Safety in the Digital Age : Sociotechnical Perspectives on Algorithms and Machine Learning. |
title_new |
Safety in the Digital Age : |
title_sort |
safety in the digital age : sociotechnical perspectives on algorithms and machine learning. |
series |
SpringerBriefs in Applied Sciences and Technology Series |
series2 |
SpringerBriefs in Applied Sciences and Technology Series |
publisher |
Springer, |
publishDate |
2023 |
physical |
1 online resource (135 pages) |
edition |
1st ed. |
contents |
Intro -- Contents -- 1 Safety in a Digital Age: Old and New Problems-Algorithms, Machine Learning, Big Data and Artificial Intelligence -- References -- 2 The Digitalisation of Risk Assessment: Fulfilling the Promises of Prediction? -- 2.1 Introduction -- 2.2 Assessing and Computing Risks -- 2.3 Layers of Transformation: A Historical Perspective on Digitalisation -- 2.3.1 Mathematical Models: Technologies of Computing -- 2.3.2 Datafication -- 2.3.3 Computational Risk Assessment: The Integrated Vision -- 2.4 Discussion -- References -- 3 Key Dimensions of Algorithmic Management, Machine Learning and Big Data in Differing Large Sociotechnical Systems, with Implications for Systemwide Safety Management -- 3.1 Roadmap and Introduction -- 3.2 Limitations of "Automation" as a Covering Concept -- 3.3 Developers' Perspective on a New Software Application -- 3.4 What's the Upshot for System Safety? Obsolescence as a Long-Term Sociotechnical Concern -- 3.5 A Concluding Speculation on When System Safety is Breached -- References -- 4 Digitalisation, Safety and Privacy -- 4.1 Introduction -- 4.2 Individualised Digital Tools and Privacy at Work -- 4.2.1 An Empirical Analysis -- 4.3 Conclusion -- Bibliography -- 5 Design and Dissemination of Blockchain Technologies: The Challenge of Privacy -- 5.1 A First Privacy Test: Defining Governance -- 5.1.1 The Appointment of a Controller, a "Test" for the Consortium -- 5.1.2 A Form of Recentralisation Contrary to the Imagination of Blockchain Designers -- 5.1.3 The Compromise of Choosing the Consortium Blockchain -- 5.2 Second Privacy Test: Management of Personal Data -- 5.2.1 Setting up an Off-Chain System to Store the Data -- 5.2.2 Data Minimisation -- 5.3 Third Privacy Test: A User Pathway Tested for Explicability and Security -- 5.3.1 Three Requests for Consent -- 5.3.2 An Opaque Security Key System. 5.4 Conclusion -- References -- 6 Considering Severity of Safety-Critical System Outcomes in Risk Analysis: An Extension of Fault Tree Analysis -- 6.1 Motivation -- 6.2 Background -- 6.3 Objective -- 6.4 Review of Traditional FTA -- 6.5 A Consequence Severity-Probability Importance Measure Algorithm for FTA -- 6.6 Conclusions -- References -- 7 Are We Going Towards "No-Brainer" Safety Management? -- 7.1 Introduction -- 7.1.1 Artificial Intelligence and Machine Learning -- 7.1.2 Monitoring of Early Deviations and Past Events -- 7.2 Examples of AI-Based Prediction -- 7.2.1 Consequence Class Associated with a Hazardous Material Release -- 7.2.2 Wellhead Damage Frequency in a Drilling Rig -- 7.2.3 Alarm Chattering in an Ammonia Plant -- 7.3 Method -- 7.3.1 Metrics -- 7.4 Results and Discussion -- 7.5 Conclusion -- References -- 8 Looking at the Safety of AI from a Systems Perspective: Two Healthcare Examples -- 8.1 Introduction -- 8.2 Challenges Old and New -- 8.3 Example 1: AI-based infusion pumps for IV medication administration -- 8.4 Example 2: AI to support the recognition of out-of-hospital cardiac arrest -- 8.5 Conclusion -- References -- 9 Normal Cyber-Crises -- 9.1 Introduction -- 9.2 Normal Accidents and High Reliability Organisations -- 9.3 Analysis -- 9.3.1 Technology -- 9.3.2 Cognition -- 9.3.3 Organisation -- 9.3.4 Macro -- 9.4 Conclusion -- References -- 10 Information Security Behaviour in an Organisation Providing Critical Infrastructure: A Pre-post Study of Efforts to Improve Information Security Culture -- 10.1 Introduction -- 10.1.1 Background -- 10.1.2 Aims -- 10.1.3 Previous Research -- 10.2 Methods -- 10.2.1 Qualitative Interviews -- 10.2.2 Quantitative Survey -- 10.2.3 Samples -- 10.3 Results -- 10.3.1 IS Management System Implementation -- 10.3.2 Improvements in ISC -- 10.3.3 Improvements in Information Security Behaviour. 10.4 Discussion -- 10.4.1 The Implementation of ISMS -- 10.4.2 How Can We Explain the Improvements in Information Security Culture? -- 10.4.3 How Can We Explain the Improvements in Information Security Behaviours? -- 10.4.4 Safety Culture Versus Security Culture -- 10.5 Conclusion -- References -- 11 AI at Work, Working with AI. First Lessons from Real Use Cases -- 11.1 Artificial Intelligence at Work: Five Workers Stories -- 11.2 From Stories to Real Cases: What Working with AI Could Mean -- 11.2.1 Five Workers Stories Put to Test of Real World -- 11.3 Discussion: AI, Organisation, Workers and Safety -- References -- 12 Safety in the Digital Age-Sociotechnical Challenges -- 12.1 Introduction -- 12.1.1 What is a "Sociotechnical Perspective"? -- 12.2 Sociotechnical Challenges -- 12.2.1 Where is "The System"? The Migration of Risk -- 12.2.2 The Relations of Rationalities -- 12.2.3 The Big Picture Versus Empirical Specificities ("Moving Closer" and "Zooming Out") -- 12.3 Looking Forward -- References. |
isbn |
9783031326332 9783031326325 |
callnumber-first |
H - Social Science |
callnumber-subject |
HD - Industries, Land Use, Labor |
callnumber-label |
HD28-70 |
callnumber-sort |
HD 228 270 |
genre |
Electronic books. |
genre_facet |
Electronic books. |
url |
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=30679927 |
illustrated |
Not Illustrated |
oclc_num |
1394041309 |
work_keys_str_mv |
AT lecozejeanchristophe safetyinthedigitalagesociotechnicalperspectivesonalgorithmsandmachinelearning AT antonsenstian safetyinthedigitalagesociotechnicalperspectivesonalgorithmsandmachinelearning |
status_str |
n |
ids_txt_mv |
(MiAaPQ)50030679927 (Au-PeEL)EBL30679927 (OCoLC)1394041309 |
carrierType_str_mv |
cr |
hierarchy_parent_title |
SpringerBriefs in Applied Sciences and Technology Series |
is_hierarchy_title |
Safety in the Digital Age : Sociotechnical Perspectives on Algorithms and Machine Learning. |
container_title |
SpringerBriefs in Applied Sciences and Technology Series |
author2_original_writing_str_mv |
noLinkedField |
marc_error |
Info : MARC8 translation shorter than ISO-8859-1, choosing MARC8. --- [ 856 : z ] |
_version_ |
1792331071578177537 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>07007nam a22004333i 4500</leader><controlfield tag="001">50030679927</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20240229073851.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cnu||||||||</controlfield><controlfield tag="008">240229s2023 xx o ||||0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783031326332</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9783031326325</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)50030679927</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL30679927</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1394041309</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HD28-70</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Le Coze, Jean-Christophe.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Safety in the Digital Age :</subfield><subfield code="b">Sociotechnical Perspectives on Algorithms and Machine Learning.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham :</subfield><subfield code="b">Springer,</subfield><subfield code="c">2023.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2023.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (135 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">SpringerBriefs in Applied Sciences and Technology Series</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Intro -- Contents -- 1 Safety in a Digital Age: Old and New Problems-Algorithms, Machine Learning, Big Data and Artificial Intelligence -- References -- 2 The Digitalisation of Risk Assessment: Fulfilling the Promises of Prediction? -- 2.1 Introduction -- 2.2 Assessing and Computing Risks -- 2.3 Layers of Transformation: A Historical Perspective on Digitalisation -- 2.3.1 Mathematical Models: Technologies of Computing -- 2.3.2 Datafication -- 2.3.3 Computational Risk Assessment: The Integrated Vision -- 2.4 Discussion -- References -- 3 Key Dimensions of Algorithmic Management, Machine Learning and Big Data in Differing Large Sociotechnical Systems, with Implications for Systemwide Safety Management -- 3.1 Roadmap and Introduction -- 3.2 Limitations of "Automation" as a Covering Concept -- 3.3 Developers' Perspective on a New Software Application -- 3.4 What's the Upshot for System Safety? Obsolescence as a Long-Term Sociotechnical Concern -- 3.5 A Concluding Speculation on When System Safety is Breached -- References -- 4 Digitalisation, Safety and Privacy -- 4.1 Introduction -- 4.2 Individualised Digital Tools and Privacy at Work -- 4.2.1 An Empirical Analysis -- 4.3 Conclusion -- Bibliography -- 5 Design and Dissemination of Blockchain Technologies: The Challenge of Privacy -- 5.1 A First Privacy Test: Defining Governance -- 5.1.1 The Appointment of a Controller, a "Test" for the Consortium -- 5.1.2 A Form of Recentralisation Contrary to the Imagination of Blockchain Designers -- 5.1.3 The Compromise of Choosing the Consortium Blockchain -- 5.2 Second Privacy Test: Management of Personal Data -- 5.2.1 Setting up an Off-Chain System to Store the Data -- 5.2.2 Data Minimisation -- 5.3 Third Privacy Test: A User Pathway Tested for Explicability and Security -- 5.3.1 Three Requests for Consent -- 5.3.2 An Opaque Security Key System.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">5.4 Conclusion -- References -- 6 Considering Severity of Safety-Critical System Outcomes in Risk Analysis: An Extension of Fault Tree Analysis -- 6.1 Motivation -- 6.2 Background -- 6.3 Objective -- 6.4 Review of Traditional FTA -- 6.5 A Consequence Severity-Probability Importance Measure Algorithm for FTA -- 6.6 Conclusions -- References -- 7 Are We Going Towards "No-Brainer" Safety Management? -- 7.1 Introduction -- 7.1.1 Artificial Intelligence and Machine Learning -- 7.1.2 Monitoring of Early Deviations and Past Events -- 7.2 Examples of AI-Based Prediction -- 7.2.1 Consequence Class Associated with a Hazardous Material Release -- 7.2.2 Wellhead Damage Frequency in a Drilling Rig -- 7.2.3 Alarm Chattering in an Ammonia Plant -- 7.3 Method -- 7.3.1 Metrics -- 7.4 Results and Discussion -- 7.5 Conclusion -- References -- 8 Looking at the Safety of AI from a Systems Perspective: Two Healthcare Examples -- 8.1 Introduction -- 8.2 Challenges Old and New -- 8.3 Example 1: AI-based infusion pumps for IV medication administration -- 8.4 Example 2: AI to support the recognition of out-of-hospital cardiac arrest -- 8.5 Conclusion -- References -- 9 Normal Cyber-Crises -- 9.1 Introduction -- 9.2 Normal Accidents and High Reliability Organisations -- 9.3 Analysis -- 9.3.1 Technology -- 9.3.2 Cognition -- 9.3.3 Organisation -- 9.3.4 Macro -- 9.4 Conclusion -- References -- 10 Information Security Behaviour in an Organisation Providing Critical Infrastructure: A Pre-post Study of Efforts to Improve Information Security Culture -- 10.1 Introduction -- 10.1.1 Background -- 10.1.2 Aims -- 10.1.3 Previous Research -- 10.2 Methods -- 10.2.1 Qualitative Interviews -- 10.2.2 Quantitative Survey -- 10.2.3 Samples -- 10.3 Results -- 10.3.1 IS Management System Implementation -- 10.3.2 Improvements in ISC -- 10.3.3 Improvements in Information Security Behaviour.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">10.4 Discussion -- 10.4.1 The Implementation of ISMS -- 10.4.2 How Can We Explain the Improvements in Information Security Culture? -- 10.4.3 How Can We Explain the Improvements in Information Security Behaviours? -- 10.4.4 Safety Culture Versus Security Culture -- 10.5 Conclusion -- References -- 11 AI at Work, Working with AI. First Lessons from Real Use Cases -- 11.1 Artificial Intelligence at Work: Five Workers Stories -- 11.2 From Stories to Real Cases: What Working with AI Could Mean -- 11.2.1 Five Workers Stories Put to Test of Real World -- 11.3 Discussion: AI, Organisation, Workers and Safety -- References -- 12 Safety in the Digital Age-Sociotechnical Challenges -- 12.1 Introduction -- 12.1.1 What is a "Sociotechnical Perspective"? -- 12.2 Sociotechnical Challenges -- 12.2.1 Where is "The System"? The Migration of Risk -- 12.2.2 The Relations of Rationalities -- 12.2.3 The Big Picture Versus Empirical Specificities ("Moving Closer" and "Zooming Out") -- 12.3 Looking Forward -- References.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources.</subfield></datafield><datafield tag="590" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries. </subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Antonsen, Stian.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Le Coze, Jean-Christophe</subfield><subfield code="t">Safety in the Digital Age</subfield><subfield code="d">Cham : Springer,c2023</subfield><subfield code="z">9783031326325</subfield></datafield><datafield tag="797" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">SpringerBriefs in Applied Sciences and Technology Series</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=30679927</subfield><subfield code="z">Click to View</subfield></datafield></record></collection> |