Safety in the Digital Age : : Sociotechnical Perspectives on Algorithms and Machine Learning.

Saved in:
Bibliographic Details
Superior document:SpringerBriefs in Applied Sciences and Technology Series
:
TeilnehmendeR:
Place / Publishing House:Cham : : Springer,, 2023.
©2023.
Year of Publication:2023
Edition:1st ed.
Language:English
Series:SpringerBriefs in Applied Sciences and Technology Series
Online Access:
Physical Description:1 online resource (135 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
Table of Contents:
  • Intro
  • Contents
  • 1 Safety in a Digital Age: Old and New Problems-Algorithms, Machine Learning, Big Data and Artificial Intelligence
  • References
  • 2 The Digitalisation of Risk Assessment: Fulfilling the Promises of Prediction?
  • 2.1 Introduction
  • 2.2 Assessing and Computing Risks
  • 2.3 Layers of Transformation: A Historical Perspective on Digitalisation
  • 2.3.1 Mathematical Models: Technologies of Computing
  • 2.3.2 Datafication
  • 2.3.3 Computational Risk Assessment: The Integrated Vision
  • 2.4 Discussion
  • References
  • 3 Key Dimensions of Algorithmic Management, Machine Learning and Big Data in Differing Large Sociotechnical Systems, with Implications for Systemwide Safety Management
  • 3.1 Roadmap and Introduction
  • 3.2 Limitations of "Automation" as a Covering Concept
  • 3.3 Developers' Perspective on a New Software Application
  • 3.4 What's the Upshot for System Safety? Obsolescence as a Long-Term Sociotechnical Concern
  • 3.5 A Concluding Speculation on When System Safety is Breached
  • References
  • 4 Digitalisation, Safety and Privacy
  • 4.1 Introduction
  • 4.2 Individualised Digital Tools and Privacy at Work
  • 4.2.1 An Empirical Analysis
  • 4.3 Conclusion
  • Bibliography
  • 5 Design and Dissemination of Blockchain Technologies: The Challenge of Privacy
  • 5.1 A First Privacy Test: Defining Governance
  • 5.1.1 The Appointment of a Controller, a "Test" for the Consortium
  • 5.1.2 A Form of Recentralisation Contrary to the Imagination of Blockchain Designers
  • 5.1.3 The Compromise of Choosing the Consortium Blockchain
  • 5.2 Second Privacy Test: Management of Personal Data
  • 5.2.1 Setting up an Off-Chain System to Store the Data
  • 5.2.2 Data Minimisation
  • 5.3 Third Privacy Test: A User Pathway Tested for Explicability and Security
  • 5.3.1 Three Requests for Consent
  • 5.3.2 An Opaque Security Key System.
  • 5.4 Conclusion
  • References
  • 6 Considering Severity of Safety-Critical System Outcomes in Risk Analysis: An Extension of Fault Tree Analysis
  • 6.1 Motivation
  • 6.2 Background
  • 6.3 Objective
  • 6.4 Review of Traditional FTA
  • 6.5 A Consequence Severity-Probability Importance Measure Algorithm for FTA
  • 6.6 Conclusions
  • References
  • 7 Are We Going Towards "No-Brainer" Safety Management?
  • 7.1 Introduction
  • 7.1.1 Artificial Intelligence and Machine Learning
  • 7.1.2 Monitoring of Early Deviations and Past Events
  • 7.2 Examples of AI-Based Prediction
  • 7.2.1 Consequence Class Associated with a Hazardous Material Release
  • 7.2.2 Wellhead Damage Frequency in a Drilling Rig
  • 7.2.3 Alarm Chattering in an Ammonia Plant
  • 7.3 Method
  • 7.3.1 Metrics
  • 7.4 Results and Discussion
  • 7.5 Conclusion
  • References
  • 8 Looking at the Safety of AI from a Systems Perspective: Two Healthcare Examples
  • 8.1 Introduction
  • 8.2 Challenges Old and New
  • 8.3 Example 1: AI-based infusion pumps for IV medication administration
  • 8.4 Example 2: AI to support the recognition of out-of-hospital cardiac arrest
  • 8.5 Conclusion
  • References
  • 9 Normal Cyber-Crises
  • 9.1 Introduction
  • 9.2 Normal Accidents and High Reliability Organisations
  • 9.3 Analysis
  • 9.3.1 Technology
  • 9.3.2 Cognition
  • 9.3.3 Organisation
  • 9.3.4 Macro
  • 9.4 Conclusion
  • References
  • 10 Information Security Behaviour in an Organisation Providing Critical Infrastructure: A Pre-post Study of Efforts to Improve Information Security Culture
  • 10.1 Introduction
  • 10.1.1 Background
  • 10.1.2 Aims
  • 10.1.3 Previous Research
  • 10.2 Methods
  • 10.2.1 Qualitative Interviews
  • 10.2.2 Quantitative Survey
  • 10.2.3 Samples
  • 10.3 Results
  • 10.3.1 IS Management System Implementation
  • 10.3.2 Improvements in ISC
  • 10.3.3 Improvements in Information Security Behaviour.
  • 10.4 Discussion
  • 10.4.1 The Implementation of ISMS
  • 10.4.2 How Can We Explain the Improvements in Information Security Culture?
  • 10.4.3 How Can We Explain the Improvements in Information Security Behaviours?
  • 10.4.4 Safety Culture Versus Security Culture
  • 10.5 Conclusion
  • References
  • 11 AI at Work, Working with AI. First Lessons from Real Use Cases
  • 11.1 Artificial Intelligence at Work: Five Workers Stories
  • 11.2 From Stories to Real Cases: What Working with AI Could Mean
  • 11.2.1 Five Workers Stories Put to Test of Real World
  • 11.3 Discussion: AI, Organisation, Workers and Safety
  • References
  • 12 Safety in the Digital Age-Sociotechnical Challenges
  • 12.1 Introduction
  • 12.1.1 What is a "Sociotechnical Perspective"?
  • 12.2 Sociotechnical Challenges
  • 12.2.1 Where is "The System"? The Migration of Risk
  • 12.2.2 The Relations of Rationalities
  • 12.2.3 The Big Picture Versus Empirical Specificities ("Moving Closer" and "Zooming Out")
  • 12.3 Looking Forward
  • References.