Full Symposium Program - International System Safety Training

advertisement
ISSTS 2014
• Technical Papers
• Tutorials
• Panel Discussions
• Workshops
UM
OSI
MP
SY
Safety
GATEWAY
TO SAFETY
U
20
14
.L
ST
Arching
O
G
INTER
NA
TI
O
N
Program
OverM SAFET Y TR
AI
STE
Y
N
S
IN
L
A
IS
,
T
MI
US
SSO
UR I · AUG
8,
4-
Things to Do
in St. Louis
Gateway Arch, Six Flags,
Saint Louis Zoo, Forest Park,
Ballpark Village/Busch
Stadium, Anheuser-Busch
Brewery, Saint Louis Science
Center, Missouri History
Museum, The Muny,
Saint Louis Art Museum,
Missouri Botanical Garden
St. Louis Union Station DoubleTree Hotel
1ST FLOOR
Foyer C
C
Grand Ballroom
F
E
D
Foyer A
B
Foyer B
B
Regency Ballroom
A
A
Caboose
Reg Office
Elevator Depot Reg Office
Stairs
C
Outdoor
Courtyard
Restrooms
Access to
Ballrooms
Terminal
Atrium
Switchman
Room
2ND FLOOR
Storage
Missouri Pacific
Illinois Central
Pegram
Wabash Cannonball
Terminal
Atrium B
Texas Special
Atrium
Knickerbock
Midway Bridge to Garden Rooms
II
I
Front Entrance Market Street
Grand
Hall
Stairs
Registration
2nd Floor
Conference Center
Speakers Breakfast
Presentations/Tutorials/Workshops
Receptions/Exhibitor Area
Opening Ceremony/
General Meeting/Luncheons
Committee & Group Meetings
To Grand Hall
Meeting Rooms
2
III
Gothic Corridor
Front
Desk
IV
Midway Suites
Jeffersonian
Station
Grille
Access to
Hotel
Prefunction
Colorado Eagle
Elevator
Stairs
Terminal Atrium A
Grand Hall
Balcony
Conductor
Room
Men
Midnight Special
Meteor
Midway
Burlington Route
Ladies
Dixie Flyer
Station
Master Room
Frisco
New York Central
Zephyr Rocket
Red Caps
Room
Presenter Preparation
Staff Office
General Information...................................................................................................................................................... 3
Greetings......................................................................................................................................................................... 5
Speakers........................................................................................................................................................................... 8
Schedule........................................................................................................................................................................ 12
Tutorials........................................................................................................................................................................ 21
Panel Discussions/Forums.......................................................................................................................................... 29
Workshops..................................................................................................................................................................... 30
Paper Presentations..................................................................................................................................................... 33
About the ISSS.............................................................................................................................................................. 48
Special Functions......................................................................................................................................................... 50
ISSTS 2014 Program
Contents
Organizing Committee
The following volunteers contributed to the success of the conference.
Conference Chair
Technical Program Chair
Tutorial Coordinator
Pam Kniess
Don Swallom
Debbie Hale
Vice Chair
Sponsor/Exhibitor Chair
Sponsor/Exhibitor
Warren Naylor
Barry Hendrix
Melissa Emery
Facilities Chair
Protocol/Speakers
CEUs
Darrell Stokes
Bill Edmonds
Dr. Rod Simmons
Social/Off-site Chair
Registration
St. Louis Site Coordinator
Matt Johnson
Cathy Carter
Carol Barnes-Schmedake
Communications
Communications/Social
Publishing
Saralyn Dwyer
Arch McKinlay
Heather French
International Chair
Webmaster
Bob Fletcher
Don Swallom
1
w w w. a p t- re s e a rc h .co m
System Safety Engineering & Analysis. Mission Assurance. Range
Safety. Test Planning. Explosives Safety. Software System Safety.
Industrial Engineering. Quality Engineering. Reliability Engineering.
Software Development & Modeling. Independent Risk Assessments.
Standards Development. And now...
C-IED Training &
Training Devices
APT personnel have extensive experience
in an environment saturated with IED
weaponry. With this knowledge and
experience, our experts are qualified to
conduct training in the latest, advanced
techniques for IED defusal, detonation,
and disposal, and to supply quality inert
reproductions of terrorist IEDs.
Providing safe solutions. Protecting your most valuable assets.
Founded in 1990, APT (Analysis, Planning,
Test) is an employee-owned, small business
located in Cummings Research Park near
Redstone Arsenal in Huntsville, Alabama.
Our corporate vision is to provide
state-of-the-art expertise and ensure the
highest levels of customer satisfaction.
A-P-T Research, Inc.
4950 Research Drive
Huntsville, Alabama 35805
Phone: 256.327.3373
Fax: 256.837.7786
www.apt-research.com
DoD photo by Senior Airman Jodi Martinez, U.S. Air Force/Released. Modified from original.
2
Registration Desk. The Registration Desk is in the
Depot Registration Office near the access to the
Grand and Regency Ballrooms.
Messages. An easel is located in the registration area
to post conference information and messages to
attendees.
Badges & Special Event Tickets. Go to Registration
Desk upon arrival to pick up badge. All personnel
must display a 32nd ISSTS badge while attending
sessions, luncheons and social events. Once a
badge is issued, it is the sole responsibility of the
registrant to ensure that it is not lost. If you are a
sponsor, the name on each badge can be changed
as often as necessary between sessions, if approved
by Registration. Exhibitor badges are nontransferable.
32nd ISSTS Daily News. The daily news will be
available at 7:30 each morning and can be picked up
at the Registration Desk.
Spousal Program. A meeting will be held Monday at
9:00 in the in the Frisco/Burlington room on the
second floor. Information and maps will be provided
and a St. Louis resident will be there to answer
questions.
ISSTS 2014 Program
General Information
Tuesday Evening Sponsor & Exhibitor Social. Please join
us for a St. Louis steakhouse dinner buffet at the
Special event tickets may be purchased by spouses
Sponsor and Exhibitor Social. Visit the sponsor and
and guests at the Registration Desk at least 24 hours
exhibitor booths. The Boeing Jazz Band will provide
before the event. Tickets for the Tuesday night
entertainment.
social event and Wednesday night off-site event
Wednesday Evening Off-site. Fly in a simulator or just
will be sold for spouses and guests. Kids tickets
explore, and enjoy dinner and a star show at the
will be available for the Wednesday night off-site
James S. McDonnell Planetarium at the Saint Louis
event. Tickets for Monday, Tuesday, Wednesday
Science Center. Bus transportation will leave the
and Thursday luncheons will also be sold at the
Registration Desk at least 24 hours before the event. hotel between 5:00pm and 5:30pm and return to the
hotel between 9:00pm and 10:00pm.
Internet. There is complimentary wireless internet
in guest rooms.
Transportation. There are many transportation
options in St. Louis. The MetroLink is behind
the hotel. MetroLink One Ride Ticket is $2.50.
MetroLink Two Hour Pass is $3.00. The Metro
Weekly Pass is $27.00. If you drive to the hotel,
be sure to use Valet Parking. The 2014 ISSTS gets
Valet Parking at half price which makes it cheaper
to Valet Park than to Self Park.
Tutorial Program and CEUs. Continuing Education
Units (CEUs) will be issued by the 2014 ISSTS for
attending the conference tutorials. To receive
CEUs for a tutorial, you must attend the entire
tutorial. You must sign in after returning from
any breaks that occur during the tutorial, and you
must be present at the end of the tutorial. The
certificates will be issued on the basis of 0.1 CEU
per instruction contract hour.
Dress Code. We would like you to feel comfortable
while you are in the sessions, so we advise
“business casual” attire. The Awards Luncheon on
Thursday is traditionally the time when you may
want to dress more formally with business dress.
All off-site events are business casual.
3
Thank you to
Boeing
for supporting
the 32nd International System Safety
Training Symposium
www.boeing.com
4
From the Society President
I want to extend a special welcome to the 2014 International
System Safety Training Symposium. I am extremely happy to
have you here in my home town of St. Louis for this 32nd annual
conference and training opportunity. I want to thank our sponsors
and exhibitors for making this conference possible. Please join us
on Tuesday night for a social event and dinner recognizing them.
In addition, our speakers and authors are a vital component of
this conference. Most importantly, I want to thank all of you for
caring enough about your professional development to attend this
conference.
ISSTS 2014 Program
Greetings
This is a week of opportunity! We all work in similar disciplines
with similar issues. Our learning together, exchanging ideas, and
developing professional networks improves our worth to our companies. Furthermore, it raises the
worth of our profession in society. The International System Safety Society (ISSS) and these conferences
are important contributors to the safety of products and services across industry. I think we need to
remember that as we recognize the value of the ISSS.
In addition to the daytime professional development offerings, there are a number of evening
opportunities for networking, socializing, and enjoying the local area. As you may know, St. Louis
was host to the 1904 World’s Fair part of which was located in the area that is now Forest Park. Our
Wednesday night off-site event will take us to the James S. McDonnell Planetarium at the St. Louis
Science Center in Forest Park. As you travel through Forest Park, please note that one of the buildings
which was built for the World’s Fair now houses the Saint Louis Art Museum. If you are a sports fan, the
St. Louis Cardinals are playing the Boston Red Sox at Busch Stadium on Thursday night.
Enjoy this week! Get to know the other attendees. Take advantage of the many opportunities to develop
your professional skills. This week is for you and I hope you find it rewarding.
Thank you for meeting us in St. Louis!
Robert A. Schmedake
President,
International System Safety Society
5
© 2012 Lockheed Martin Corporation
3, 2, 1 Safety
System safety is paramount. It impacts our products, employees, technicians, and
maintenance personnel. And safety is no accident – it is designed into everything we do.
We are proud to sponsor this year’s International System Safety Conference and
their mission to think outside the box when it comes to the best processes, methods,
and techniques. We’re committed to delivering innovative ideas and solutions that
help connect, protect, and explore our universe.
www.lockheedmartin.com/ssc
6
307-64315_TurningVisions_ISSC.indd 1
7/16/12 5:01 PM
From The Conference Chair
Welcome to St. Louis and the 32nd International System Safety
Training Symposium. The conference committee has worked
hard to make this a world class event, and we are committed to
providing an enriching experience for all. We realize that budgets
are tight and are happy that you have chosen this conference
to attend. As the system safety environment changes, we have
tried to include tutorials, workshops, panels and papers on new
methods, technologies and ideas. Tutorials will earn continuing
education units to document your professional development.
ISSTS 2014 Program
Greetings
After the General Assembly address on Monday there will be a
panel composed of several of the Society Fellows titled “Exploring
Society History as a Guide for its Future Course.” This panel
provides an informal opportunity to learn from longtime members and hopefully use that information to
shape the future of our society.
On behalf of the entire conference committee, we sincerely hope you enjoy your stay in St. Louis. There
are many things to see and do in the city and the surrounding areas. St. Louis Union Station, the site of
this year’s conference, is a National Historic Landmark. On September 1, 1894 it opened as the largest
train terminal in the U.S. The MetroLink is behind the hotel and stops at many of the historic and scenic
areas in St. Louis. On Tuesday evening we have a social event and dinner honoring our sponsors and
exhibitors. Come prepared to enjoy food and networking opportunities. The Wednesday night offsite event at the James S. McDonnell Planetarium at the Saint Louis Science Center will be an exciting
experience, including flight simulators, dinner, and a star show. If you enjoy baseball, the Boston Red Sox
are in town playing the hometown St. Louis Cardinals, and there is a game on Thursday night.
If you have a special request or need assistance at any time during the conference, please feel free to see
me or any of the conference committee for assistance.
Sincerely,
Pam Kniess
Conference Chair
International System Safety Society
7
Speakers
Carl A. Avila, Director, Advanced Programs, Boeing Phantom Works, Keynote Speaker
Carl Avila is the Director of the Advanced Weapons and Missiles
Systems organization within the Advanced Boeing Military
Aircraft organization in Phantom Works. Carl’s team is responsible
for developing products and technologies supporting next
generation tactical systems.
Carl has held various Program Management and Engineering
assignments during his 36 year career with Boeing.
Prior to this assignment, Carl was Program Manager of the
Air Launched Cruise Missile and Conventional Air Launched
Cruise Missile (ALCM/CALCM) Program, responsible for ongoing
production of CALCM missiles, as well as support of fielded
systems. Carl was the F/A-18 Affordability Manager, responsible
for developing and implementing the Program’s Affordability
plan, including Cost Reduction programs aimed at reducing the
cost of the F/A-18 E/F. Carl was Program Manager of the Joint
Direct Attack Munition (JDAM), responsible for the day-to-day
operations of this joint U.S. Air Force, Navy and Marine Corps missile program during its transition from
development into high rate production.
Joining Boeing in 1978 as a logistics engineer, he also held several engineering positions associated with
the design, development and fielding of tactical missile systems and launch platforms. He was Chief
Engineer and Deputy Program Manager on the Bradley-Linebacker program, and Chief Engineer for the
Avenger Air Defense System.
Avila holds a Bachelor of Science degree in Electrical and Computer Engineering from the University of
Massachusetts, and an Executive Masters in International Business from Saint Louis University.
8
Tom Pfitzer holds a Master’s Degree in Industrial Engineering
(System Safety Option) from Texas A&M University. He is a
graduate of the U.S. Army Intern Program in Safety Engineering.
He has over 35 years’ experience in System Safety, Range Safety,
and Risk Analysis and has held various positions in safety and risk
assessment in both Government and industry. Prior to establishing
the Safety Engineering and Analysis Center (SEAC), he founded
A-P-T Research, Inc., in 1990, a company that employs over 100
practicing safety professionals. Early in his career he was the
Safety Officer at a national range monitoring safety for over 200
launches.
ISSTS 2014 Program
Tom Pfitzer, President, A-P-T Research, Inc.,
Sponsor & Exhibitor Luncheon Speaker
Tom has supported numerous U.S. and international agencies that
are developing risk-based standards. He is currently a member
of the Society of Risk Assessment, a senior member of System
Safety Society, and on the Board of Directors of the International
Association for the Advancement of Space Safety, chairing the
Launch Safety Committee. He has authored more than 20 papers in technical journals.
Gabriele Schedl, Frequentis, International Luncheon Speaker
An Austrian safety pioneer, Gabriele Schedl has been strongly
dedicated to the development of appropriate safety education,
information and research in Austria over more than a decade.
Her notable contribution was not only the establishment and
implementation of a Safety Management System at the company
Frequentis, but also the foundation of a safety education program,
as well as development of a study program for integrated safety
(security) management at the University of Applied Sciences in
Vienna. She also gives regular lectures in IT Service Management
and Project Management in the safety-critical area at university.
Mrs. Schedl’s responsibility as Director of Safety Management
at Frequentis, where she has been working since 1999, contains
furthermore, the management and performance of extensive
safety training programs for employees and safety trainings for
international customers.
Raising Safety awareness, putting the priorities of team above
individual success, as well as stressing the impact of one’s own actions in a safety critical environment
are the main topics her work is focused on.
She holds an Engineering Degree and a Master of Science in Electrical Engineering from the University
of Technology, Vienna, has finished a post-graduate education in business computer science and has
completed several safety courses at Eurocontrol, the University of York, and the University of Southern
California. She is committed to lifelong learning.
9
Technology Meets Tradition
in the UH-60M BLACK HAWK and S-97 RAIDER™ helicopters.
Sikorsky continues its long history of providing continuous improvement
and leading-edge solutions for its current production aircraft while
actively preparing for vertical lift requirements of tomorrow.
Updated with impressive new capabilities, the UH-60M BLACK HAWK
helicopter is today’s multi-mission workhorse, while the S-97 RAIDER™
aircraft is a bold and innovative investment in the future armed aerial
scout mission.
sikorsky.com |
10
6351 6/14
Dr. Garza came to Saint Louis University after service in the
Federal Government. In August of 2009, Dr. Garza was appointed by
President Obama and confirmed by the US Senate as the Assistant
Secretary for Health Affairs and Chief Medical Officer for the U.S.
Department of Homeland Security (DHS) where he served until
April of 2013. Dr. Garza led the health and security efforts for
DHS which included the health aspects of terrorism and natural
disasters.
His office led DHS programs in CBRNE including the BioWatch
program and the National Biosurviellance Integration Center. He
has served as the DHS lead in response to the H1N1 pandemic,
and the health lead for multiple disasters including the Fukishima
Tsunami, the Deepwater Horizon oil spill, the Haiti earthquake
among others. In 2009, Dr. Garza was also appointed by President
Obama to serve on the Presidential Commission for the Study of
Bioethical Issues. He participated and helped author reports to
the President on numerous issues including the use of Synthetic Biology and the ethics of bioterrorism
medical countermeasure development and testing on children.
ISSTS 2014 Program
Alexander Garza, MD, MPH, Associate Dean and Professor in Epidemiology, Saint Louis
University College of Public Health and Social Justice, Awards Luncheon Speaker
Dr. Garza began his career in health as an EMT in 1986 and has worked in every level of providing care
and leadership in emergency medicine. He has extensive experience working as a paramedic and flight
medic and is a board certified emergency physician working at academic medical centers. Dr. Garza
has worked as the Medical Director for Emergency Medical Services for the City of Kansas City Health
Department and the State of New Mexico. He is a Lieutenant Colonel in the US Army Reserves and a
veteran of Operation Iraqi Freedom.
He has written and lectured extensively on issues involving EMS, health, security and preparedness
and has counseled leadership at the highest levels of government. Dr. Garza is considered an expert
in weapons of mass destruction, health threats to national security and strategic and operational
excellence.
Dr. Garza has received numerous awards for his military service and civilian career including the
Bronze Star and Combat Action Badge as well as the Young Investigator Award by the American Heart
Association for his research in out of hospital cardiac arrest. He and his wife Melissa enjoy spending time
with their three boys doing camping, scouting, swimming and baseball.
11
Schedule Monday, 4 August
Gothic Corridor: 6:30 - 8:00 Speakers’ Breakfast
Jeffersonian/Knickerbock: 8:00 - 17:00 Presenter Prep
Grand B
8:00 - Safety Topics 1 (Gonzalez)
8:50
“Mishap Prevention Utilizing Unlimited &
Government Purpose Data Rights”
McDougall
9:00 9:50
Grand C
Hazard Analysis 1 (Rose)
“Cases For Tailoring The MIL-STD-882E Risk Matrix
For US Air Force Space & Launch Vehicles”
Moran, Jackson
“Practical Insights for the Exchange of Leading
“MIL-STD-882E, A Near Miss About System Safety”
Practices Lessons Learned in Accident Investigation
Sadler
and Lessons Learned from Incident Investigations”
Johnson, Reinartz, Rebentisch
10:30 - “System Safety Challenges in High Energy
“Accurate Risk Assessment using Multi11:20 Laser (HEL) Weapon Systems”
Relational Hazard/Mishap Pairings”
Chizek
Eller, Zemore, Kady
11:30 - Luncheon & Opening Ceremony, Grand F
13:30
Carl A. Avila, Director, Advanced Programs, Boeing Phantom Works, Keynote Speaker
13:30 - General Assembly Address, Grand F
14:20
Society President Bob Schmedake
14:30 - Panel, Regency C
15:20
Exploring Society History as a Guide for its Future Course
16:00 - Gordon
16:50
12
Regency B
Tutorial
Why Should You Care About the “-ilities”
Southwick (3 hrs)
Health Hazard Assessment in System Safety Evaluation
Geiger, Simmons (3 hrs)
9:00 9:50
ISSTS 2014 Program
8:00 8:50
Regency A
Tutorial
10:30 11:20
11:30 13:30
13:30 14:20
14:30 15:20
16:00 16:50
WHAT A R E Y OU R STR ENGT HS
AS AN ENGINEER?
“thinking system-wide”
“providing in-depth analysis of
the latest technologies”
“solving real-life problems”
ONLINE MASTER’S DEGREES
- RELIABILTY ENGINEERING
- PROJECT MANAGEMENT
- CYBERSECURITY
LEARN MORE
www..advancedengineering.edu/issc
13
Schedule Tuesday, 5 August
Gothic Corridor: 6:30 - 8:00 Speakers’ Breakfast
Jeffersonian/Knickerbock: 8:00 - 17:00 Presenter Prep
Grand A
Grand B
8:00 - Tutorial
Aviation Safety (Liming)
8:50
Functional Hazard Analysis “Aviation Safety Risk Modeling:
Scharl, Stottlar, Kady,
Lessons Learned from Multiple
Ingram
Knowledge Elicitation Sessions”
(6 hrs)
Luxhoj, Ancel, Green, Shih, Jones, Reveley
9:00 “DO-278A Impacts on Legacy MIL-STD9:50
882E Air Traffic Management Programs”
Bartos, Oviedo
10:30 “Modeling Increased Complexity and
11:20
the Reliance on Automation: FLightdeck
Automation Problems (FLAP) Model”
Ancel, Shih
11:30 - Sponsor & Exhibitor Luncheon, Grand F
13:30
Guest Speaker Tom Pfitzer, President, A-P-T Research, Inc.
13:30 - Tutorial (cont’d)
14:20
14:30 15:20
16:00 16:50
Creating A Culture of Chronic Unease
What Does it Take to Really “Learn
from Incidents” Lessons get shared,
but sharing is not learning
Best Practices in Process Safety Culture
- Lessons from the Energy Industry
Safety Topics 2 (Atencia-Yepez )
Safety Topics 3 (Pottratz)
“Defining Layered Safety Concepts to
Guide Multi-Supplier Development of
Interoperable Safety-Critical Systems”
Shi, Ailey, Gough
Rhapsody Model Safety Tagging for
Model Development Driven (MDD)
Approach to System Architecture
and Requirements Development”
Duong
“Gaining Deeper Operational
Intelligence Using Human
Performance Learning Teams”
Edwards
“Reducing High Impact Events by
Implementing a Deep Dive Process
Early in the Event Closure Lifecycle”
Laabs, Allison, Russell, Stewart
“Reconciling Developmental Weapons
Safety Tests in MIL-STD-2105”
Tomasello, Dray, Adams
18:00 - Sponsor & Exhibitor Social located in Grand D/E/F
21:00
Entertainment will be provided by the Boeing Jazz Band
14
Grand C
Workshops (Pearlman, Scott )
“Effects of Unintended Longitudinal
Acceleration and Deceleration
Profile Magnitude and Duration on
Driver Performance Behaviors”
Vernacchia, Green, Llanares
Regency B
Tutorial
Regency C
Tutorial
Melding DOD and FAA
System Safety Methods
Jones (3 hrs)
Human Factors and Systems Safety
Sandom (3 hrs)
New Approaches to the CyberSecurity of Safety-Critical Systems
Johnson (5 hrs)
Tutorial
Tutorial (cont’d)
9:00 9:50
ISSTS 2014 Program
8:00 8:50
Regency A
Tutorial
10:30 11:20
11:30 13:30
13:30 - Workshop
14:20
Human and Organizational
Performance (HOP) Fundamentals
Edwards (4 hrs)
Weapons Systems Software Safety
Criticality and Level of Rigor (LoR)
Bower (3 hrs)
14:30 15:20
16:00 16:50
18:00 21:00
15
Schedule Wednesday, 6 August
Gothic Corridor: 6:30 - 8:00 Speakers’ Breakfast
Jeffersonian/Knickerbock: 8:00 - 17:00 Presenter Prep
Grand A
Grand B
8:00 - Tutorial
Robotics/Unmanned Systems (Kady)
8:50
Software Safety Analysis
“Models for Assessment of
Rogers, Zemore, Whitford, Unmanned Air Vehicle Hazards”
Tilghman, Funkhouser (6
Chiam
hrs)
9:00 9:50
10:30 11:20
“Safety, Autonomy, Latency, and the
Unmanned or Remotely Piloted Vehicle”
McKinlay
“System Safety Considerations for
Unmanned Ground Vehicles”
Owens
Grand C
Software Safety 1 (Axelrod)
“Interpretation of the Software Control
Categories for MIL-STD-882C”
Tan
“Decoding The Software Control Category”
Onn, Ericson, Brown
“System and Software Safety
Challenges for Widespread
Acceptance of Driverless Vehicles”
Turgeon
11:30 - International Luncheon, Grand F
13:30
Guest Speaker Gabriele Schedl, Director of Safety Management at Frequentis in Austria
13:30 - Tutorial (cont’d)
14:20
Safety Topics 4 (Rozanski)
Software Safety 2 (Schedl)
“The Evolution of System Safety at NASA”
Dezfuli, Groen, Everett
14:30 15:20
“Utilizing Error Prevention Data and
Lean Six Sigma Techniques to Verify
the Existence of Error Prone Zones”
Laabs
“Study of a Method for Early Interface
Verification with Hierarchical
Executable Software Model”
Ujiie, Katahira, Hernek, Rubio
“Predicting Software
Performance - Software 1”
Zito
16:00 16:50
“What is ‘Unnecessary’ Code
and Why Is It Unsafe?”
McKinlay
17:00 - Dinner at James S. McDonnell Planetarium at the Saint Louis Science Center
22:00
Will include flight simulators and a star show.
Buses leave between 17:00 and 17:30 and return to hotel between 21:00 and 22:00.
The gift shop will extend their hours until 18:00.
16
Regency B
Tutorial
Regency C
G-48 Meeting
Frisco/Burlington
G-48 Meeting
(cont’d)
Tutorial
“Hazardous Dependency of Critical
Hands-On System Safety
Infrastructures on Global Navigation
Basics, Focused on FHA
Satellite Systems Services”
Fritz, Schedl (3 hrs)
Atencia-Yepez, Cueto-Santamaría,
Cezón-Moro
9:00 - “Major Hazardous Events for
9:50
Unmanned Space Systems”
Durmaz
10:30 - “Simulating the Risks of Sub-Orbital
11:20 Space Flight for Air Traffic Management”
Johnson, Sarconi
ISSTS 2014 Program
8:00 8:50
Regency A
Space Safety (Thomas)
11:30 13:30
13:30 - Tutorial
14:20
“The STAMP Model, STPA Hazard
Analysis and CAST Accident Analysis”
Fletcher (2 hrs)
Fault Tree Analysis
with CAFTA
Roy (3 hrs)
14:30 15:20
16:00 16:50
17:00 22:00
17
Schedule Thursday, 7 August
Gothic Corridor: 6:30 - 8:00 Speakers’ Breakfast
Jeffersonian/Knickerbock: 8:00 - 17:00 Presenter Prep
Grand A
Grand B
8:00 - Tutorial
Hazard Analysis 2 (Durmaz)
8:50
Practical Generation “Innovation vs Safety: Hazard Analysis
of Safety Cases With Techniques to Avoid Premature Commitment
the Help of GSN
During the Early Stage Development of
Gerstinger, Schedl National Critical Infrastructures”
(3 hrs)
Johnson
9:00 “Mind-Mapping the Hazard Space of a System”
9:50
Ericson
10:30 11:20
Grand C
Risk Assessment 1 (Rinaldo)
“Distribution of Risk”
Banerjee
“Personnel Risk Assessment for Random
Reentry Considering Casualty Expectation”
Dang, Meyers, Jackson
“The Challenges of a Quantitative
Approach to Risk Assessment”
Kady, Ranasinghe, Zemore, Eller
11:30 - Awards Luncheon, Grand F
13:30
Guest Speaker Alexander Garza, MD, MPH serves as Associate Dean and
Professor in Epidemiology at the St. Louis University College of Public Health and Social Justice
13:30 - Workshop
Security & System Safety (Owens)
Risk Assessment 2 (Pierson)
14:20
Systems-of-Systems “Supporting the Exchange of Lessons
“Usability for System Safety Engineers:
(SoS) Workshop
Learned from Cyber-Security Incidents
Using Nielson’s Ten Heuristics to Identify
on Framework,
in Safety-Critical Systems”
the Increased Potential of Human Error
Collection,
Johnson
as a Contributor to Mishap Risk”
Processing and
Funkhouser, St. Laurent, Sperry
Organizing
for
14:30 “Cyber Safety of Voice Communication Systems: “Influence Diagrams: Generalizing Fault
15:20 System Safety and About Security Threats and Safety Analysis”
Trees for Informed Decision Making”
Software Safety
Riedl, Schedl
Monat, McCracken, Obaldo, Sweany
McKinlay,
16:00 - Murgatroyd (4 hrs) “Inadequate Legal, Regulatory, and Technical
16:50
Guidance for the Forensic Analysis of CyberAttacks on Safety-Critical Software”
Johnson
18
9:00 9:50
Regency B
Workshop
Regency C
Panel
Joint Munitions Safety
Testing Initiative
Hawley, Dray (1 hr)
System Safety Handbook
Working Group
Muniak (2 hrs)
G-48 Workshop – The Most Pressing
Issues Facing System Safety
West (3 hrs)
ISSTS 2014 Program
8:00 8:50
Regency A
Tutorial
Open Forum
10:30 11:20
11:30 13:30
13:30 - Open Forum (cont’d)
14:20
Panel
Developing Global System
Safety Perspectives
Naylor, Fletcher (2 hrs)
14:30 15:20
16:00 16:50
Friday, 8 August
Gothic Corridor: 6:30 - 8:00 Speakers’ Breakfast
Regency C
8:00 - Best Papers Presentations (Swallom)
8:50
Best Paper #1
9:00 - Best Paper #2
9:50
10:00 10:30
10:30 11:20
Frisco/Burlington
Lessons Learned &
ISSTS Staff Turn-Over Meeting
19
Manage your risks
Improve your safety!
At Controls and Data Services (CDS), we provide solutions to
understand and manage operational risks, helping you to run a
safer, more efficient and fully compliant business.
VISIUMKMS™ helps you effectively manage
change through a proven system for
tracking corrective and preventive actions,
conducting process hazard analyses (PHAs),
audit facilities and managing incident
investigations.
VISIUMRISK™ combines CAFTA (fault trees
analysis) with maintenance programme
data, to provide insight into operational
safety and enable decisions that improve
both safety and productivity.
Choose our proven solutions to support your business.
www.controlsdata.com
info@controlsdata.com
CAFTA is an EPRI developed product. EPRI: Electric Power Research Institute, Palo Alto, California.
CDS is a licensed re-seller of CAFTA and related EPRI software products.
20
Advert 6"x9".indd 1
09/07/2014 18:06
The symposium organizers have an information-packed tutorial program planned for the ISSTS 2014.
Attending tutorials, as well as other elements of the Technical Program at the ISSTS 2014, meets the
requirements for Continuance of Certification credit through the Board of Certified Safety Professionals
(BCSP). The International System Safety Society will issue Continuing Education Units (CEUs) for
participation in the symposium tutorials. CEUs are issued on the basis of 0.1 CEU per instructional contact
hour. You must be present for at least 90% of the tutorial to receive CEUs and a tutorial completion
certificate. Your attendance is verified via the process outlined below:
• At the start of the tutorial, you’ll clearly print your name in the attendance form exactly as you want it
to appear on the certificate.
• After returning from each break during the tutorial (morning, lunch, and/or afternoon), you’ll initial
the attendance form.
• You must be present at the end of the tutorial to receive your certificate and the CEUs. If there are misspellings on the CEU certificates, please mark the corrections, give back to the instructor or leave at the
registration desk.
ISSTS 2014 Program
Tutorials
Monday // 08-04-14 // 8:00-11:20 // Regency A // TUTORIAL 0.27 CEU
Why You Should Care About the “-ilities”
Instructor: Alan Southwick, Raytheon Company, Portsmouth, Rhode Island, United States
Abstract: Topic addresses the interrelationships developed from Quality, Quality Control, and
Quality Engineering, pursuing Specialty Engineering Roles and Relationships, including: Reliability,
Maintainability, supportability, Human Factors, Safety, and Security (Information Assurance) from an
overview perspective. The tutorial is designed to be somewhat interactive presenting examples and
questions to the audience related to the various topics discussed, thereby engaging and providing
participants with insights to the various disciplines and how they relate within “Specialty Engineering”.
Objective: To assist folks in understanding how the “-ilities” integrate multiple disciplines for successful
programs and projects.
Monday // 08-04-14 // 8:00-11:20 // Regency B // TUTORIAL 0.27 CEU
Health Hazard Assessment in System Safety Evaluation
Instructor: Mark Geiger, Naval Safety Center Liaison Office, Arlington, Virginia, United States;
Rodney Simmons, PhD, CSP, The Petroleum Institute, Abu Dhabi, United Arab Emirates
Attendees will be able to: Understand and apply the basic principles of recognition, evaluation and
control to occupational health hazards common to defense and industrial settings; understand the limits
of such evaluations and be introduced to sources of assistance
1. Predict/Recognize; Recognize potential health hazards common to defense and industrial operations
2. Evaluate Understand how to conduct or evaluate Health Hazard Assessments in System Safety Evaluation consistent with Military Standard 882 Task 207
3. Risk Estimation Understand the concept of dose response relationship between occupational exposures and potential disease outcome, on a population basis. This will help users evaluate risk on the
basis of known or estimated population exposures relative to
4. Control Understand the application of the system safety hierarchy of controls to mitigation of health
hazards through optimal measures- elimination/substitution; process controls/barriers; to least protective - procedures and protective equipment.
5. Where to get help Source of information and assistance will be identified.
Short Overview: Basic principles of health hazard evaluation will be described. Use of the process
outlined in Military Standard 882, Task 207 Health Hazard Evaluation, will be illustrated with examples
21
and case studies. Basic introductory lectures on the general topic will be followed by terse specific
introduction(s) to specific areas and exercises with working group review of problems.
Abstract: The workshop will introduce participants to the basic principles of health hazard evaluation in
the context of system safety and systems engineering development and risk mitigation for development/
design of systems and equipment. Introductory lectures will be followed by class exercises reviewing
and applying the principles of hazard recognition, risk evaluation and identification of potential control
measures.
Outline:
• Introduction to health hazard assessment
• Noise- the most common health hazard
• Chemical hazards
• Physical agent hazard- ergonomics
• Ventilation
• Exercise
Tuesday // 08-05-14 // 8:00-16:50 // Grand A // TUTORIAL 0.53 CEU
Functional Hazard Analysis
Instructors: Kevin Stottlar, Naval Surface Warfare Center Dahlgren Division, Dahlgren, Virginia, United
States; Adam Scharl, Naval Surface Warfare Center Dahlgren Division, Dahlgren, Virginia, United States;
Rani Kady, PhD, Naval Surface Warfare Center Dahlgren Division, Dahlgren, Virginia, United States;
Michael Ingram, Naval Ordnance Safety and Security Activity, Indian Head, Maryland, United States
Attendees will be able to: Generate a Functional Hazard Analysis
Abstract: The Functional Hazard Analysis (FHA) Tutorial will provide an understanding of the purpose
of a FHA and the applicability of the analysis to the system acquisition lifecycle. The Tutorial provides
background on system architecture products and utilizes example architecture products to articulate the
processes necessary to perform a FHA. The Tutorial presents a methodology for identifying and mitigating
functional hazards early in the system acquisition lifecycle.
Tuesday // 08-05-14 // 8:00-11:20 // Regency A // TUTORIAL 0.27 CEU
Melding DOD and FAA System Safety Methods
Instructor: Marge Jones, Safety Analytical Technologies, Huntsville, Alabama, United States
Attendees will be able to: Tailor the MIL-STD-882E tasks and DIDs to obtain a blended process that would
have documented results that satisfy both DoD and FAA requirements
Abstract: Some DoD projects find it desirable to utilize the top-down safety process used in certification
of commercial aircraft particularly in the area of software safety. Early identification of design safety
requirements is a proven hazard mitigation technique. The tutorial will highlight the differences and
similarities between MIL-STD-882E and associated Data Item Descriptions (DIDs) with the commercial
aircraft system safety process (AC25.1309, SAE ARP4761 and ARP4754). By understanding the differences
and similarities, Statement of Work and CDRL requirements can be tailored to define a blended system
safety process that could satisfy both.
Tuesday // 08-05-14 // 8:00-11:20 // Regency B // TUTORIAL 0.27 CEU
Human Factors and Systems Safety
Instructor: Carl Sandom, PhD, iSys Integrity Limited, Sherborne, Dorset, United Kingdom
Attendees will be able to: Have an appreciation of the human factors and ergonomics issues relating to
safe systems development.
22
Short Overview: This half-day Human Factors for Safe Systems tutorial will provide an introduction to the
Abstract: Human Factors are often cited as the cause of hazards within safety-related systems; yet system
safety cases often contain no mention of them. Conversely, system operators or users often provide
substantial mitigation between hazards and their associated accidents; yet this is also often overlooked. If
human factors risks are not considered, a system will not achieve the required level of integrity. If human
factors mitigations are not considered, the technical system components may be over engineered at
additional cost to achieve a target level of safety.
Objective: The tutorial will include coverage of the following objectives: - Addressing Human Factors
issues impacting Safety engineering - Integrating of Human Factors within the systems engineering
context - Integrating of Human Factors within other Safety assurance activities
Outline:
• Human Factors and System Safety
• Human Factors
• Definition & Scope
• Human (Cognitive) Limitations
• Accident Causation and Barriers
• Human Factors Exercise
-- Avionics Module change
-- People, Procedures and Equipment
ISSTS 2014 Program
Human Factors discipline along with an overview of the scope of human factors analyses in the context of
safety-related systems engineering.
• Analyzing Human Error
• Questions & Answer Session
Tuesday // 08-05-14 // 8:00-15:20 // Regency C // TUTORIAL 0.45 CEU
New Approaches to the Cyber-Security of Safety-Critical Systems
Instructor: Chris Johnson, University of Glasgow, Glasgow, Scotland, United Kingdom
Attendees will be able to: Identify the principle threats and vulnerabilities for the cyber-security of
safety-critical systems. Address the regulatory and certification challenges posed by attacks on safetycritical software. Select appropriate architectures that maintain safety and sustain resilience in the face
of attacks on safety-critical systems. Develop a plan for the detection, mitigation and forensic analysis of
malware in a safety-related environment.
Short Overview: This tutorial will present a number of case studies in which malware has been detected
inside the operational systems of safety-critical applications in Air Traffic Management, Healthcare,
Rail and Energy distribution. We will summarize the problems that arise in maintaining application
safety once an attack has been detected. We will also summarize the main stages in the forensic
analysis of safety-critical systems, when it may not be possible to immediately halt operation without
increasing the risk to application operators or to the general public. We will also address the challenge
of convincing regulators that it is safe to continue operation after an attack. The afternoon will focus on
new techniques that increase resilience to cyber-attacks. We will focus on novel software architectures
that balance safety and security. We will also explain why conventional approaches to threat detection
- which involve the regular exchange of threat signatures, create particular problems for safety-related
applications. Some of these approaches involve heterogeneous hardware; they have to support legacy
controllers from the 1980s as well as new generations of FPGAs and ‘smart’ devices. Others focus more
on mitigating the threats from insider attacks; which are a rising source of concern given the increasing
diversification of the supply chain in many safety-related industries.
Abstract: Over the last three years, I have been involved in the forensic analysis and recovery from
a number of cyber-attacks on safety-critical systems across the aviation, healthcare and energy
distribution industries. In most cases, the malware has stemmed from problems in the supply chain -
23
where sub-contractors have failed to implement the security policies of the companies they support.
In consequence, mass-market malware has been inadvertently introduced into operational systems in
safety-critical applications either through the use of third-party libraries or through secondary memory
- including but not limited to infected USB devices. It is difficult to imagine the problems that this creates
when, for instance, it is technically impossible to be one hundred per cent sure that an infection has been
removed (more sophisticated forms of attack deliberately compromise anti-viral products). In addition,
I have worked for a range of organizations taking the first steps to protect safety-critical infrastructures
against more sophisticated advanced persistent threats. These pose enormous technical and regulatory
challenges - it is often difficult to show that anti-viral products and threat detection systems meet the
reliability requirements for safety-critical software. The aim of this tutorial is to introduce delegates to
the technical, regulatory and organizational challenges of increasing cyber-security in safety-critical
systems. We will consider the weaknesses of existing security standards that cannot easily be applied
in safety-critical applications. I will also describe a number of different approaches to cyber-security
adopted by regulators across Europe and North America. The intention is to provide an interactive forum
where participants can share their own experiences but also to introduce a number of more advanced
software architectures that are being used to increase the resilience of safety-critical applications. A
particular focus will be on mitigating the insider threat and on meeting new legislative requirements, as
a number of governments develop obligations to report cyber-attacks on safety-related infrastructures.
Objective: To show area where existing cyber-security techniques do not work for safety-critical systems.
To identify hybrid and novel approaches that increase security without undermining safety. To identify
hybrid and novel approaches that increase safety without undermining security.
Outline: Session 1: Understanding the Threats - Case studies of previous attacks in aviation, rail,
healthcare and energy distribution and their impact on safety/certification/legal liability; - What are
the vulnerabilities (ubiquitous use of Linux, IP, VOIP, slow introduction of service architectures including
the Cloud and consequent problems securing the supply chain, integration of legacy and novel devices/
systems etc); - What are the technical threats? (Spear phishing, hacktivism, Stuxnet, Duqu etc); Session
2: What Can We Do - Relevant standards and guidelines (ISO/ENISA/NIST); - Why many of the obvious
approaches don’t work in safety-critical systems (certification and regulation of security management
systems in safety-critical industries, problems of audit). - Software architectures for safety and security. New legal and regulatory obligations (cyber-incident reporting and analysis requirements in the US and
Europe) - Threat detection and Forensic techniques, - Cyber-security as a Business Opportunity in Safetyrelated industries (Future of cyber-insurance)
Tuesday // 08-05-14 // 13:30-16:50 // Regency B // TUTORIAL 0.27 CEU
Weapons Systems Software Safety Criticality and Level of Rigor (LoR)
Instructor: Douglas Bower, MS, Naval Ordnance Safety and Security
Activity, Indian Head, Maryland, United States
Attendees will be able to: Conduct of Functional Hazard Analysis of a Weapons System and Apply the
Appropriate level of rigor of software safety analysis.
Short Overview: Present a detailed overview of Hypothetical Missile System and use that system as
an example to lead the participants through the conduct of a Functional Hazard Analysis (FHA), the
determination of the criticality of the software functions, and the application of the associated level of
Rigor (LoR) of software safety analysis and testing.
Abstract: Software intensive weapons system require that the software safety practitioner be able
to determine the criticality of the system’s safety critical software functional components and apply
the commensurate level of rigor of software safety analysis and testing. This tutorial will present a
detailed overview of the design of a hypothetical missile system (intentionally differentiated from any
real system) to serve as a foundational example. The tutorial will then present the Functional Hazard
Analysis (FHA) and walk the FHA of the missile systems. The tutorial will then present the software
safety criticality assessment process and walk the determination of the criticality of the missile systems
24
Objective: Develop and greater appreciation and understanding of the application of appropriate level of
rigor (LoR) of software safety analytical techniques.
Outline: I. Hypothetical Missile System Design Overview A. Missile Structural Design Overview B. Missile
Flight Control System C. Missile Payload Content and Activation System II. Functional Hazard Analysis
(FHA) Methodology III. Software Safety Criticality Determination (MIL-STD 882E) A. Control Categories
/ Mishap Severity B. Criticality Levels / Level of Rigor (LoR) C. Documentation of Application of LoR
IV. Application of Methodology to Missile System A. Conduct of the FHA B. Determine Software Safety
Criticality / LoR required C. Apply the LoR and Document the Results
Wednesday // 08-06-14 // 8:00-16:50 // Grand A // TUTORIAL 0.53 CEU
ISSTS 2014 Program
safety significant functions and required level of rigor. (LoR). Finally, the tutorial will walk through the
documentary evidence required to substantiate the application of the appropriate LoR.
Software Safety Analysis
Instructors: Peggy Rogers, Naval Ordnance Safety and Security Activity, Indian Head, Maryland, United
States; Michael Zemore, Naval Surface Warfare Center, Dahlgren Division, Dahlgren, Virginia, United
States; Stuart Whitford, Naval Ordnance Safety and Security Activity, Indian Head, Maryland, United
States; Carolyn Tilghman, Naval Surface Warfare Center Dahlgren Division, Dahlgren, Virginia, United
States; Rebecca Funkhouser, Naval Surface Warfare Center, Dahlgren Division, Dahlgren, VA, United States
Attendees will be able to: Understand the Software Safety Analysis process.
Abstract: This Tutorial provides the participant with a “hands on” learning experience in understanding
the overall process for performing Software (S/W) Safety Analysis. The S/W Safety Analysis and
Verification Process, S/W Criticality Matrix and Level of Rigor (LOR) tasks are introduced. Understanding
the purpose of the S/W Criticality Matrix and LOR will help the participant become familiar with specific
analyses and tests that are recommended based on the required LOR. S/W Safety Analysis results in
improving designs and reducing the likelihood that S/W will initiate a hazardous condition or mishap.
Objective: Understand the Software Safety Analysis process.
Wednesday // 08-06-14 // 8:00-11:20 // Regency B // TUTORIAL 0.27 CEU
Hands-On System Safety Basics, Focused on FHA
Instructors: Lukas Fritz, PhD, Frequentis AG, Vienna, Austria;
Gabriele Schedl, Frequentis AG, Vienna, Austria
Attendees will be able to: 1. Understand the role of the safety lifecycle within the project lifecycle 2.
Understand some major safety analysis techniques 3. Perform a Functional Hazard Assessment
Abstract: An overview of a generic safety process, best suited for small to medium sized projects, in
relation to the project lifecycle, is given. For each major project phase the respective safety process
phase, safety objectives, necessary in- and outputs are detailed. Some state of the art analysis techniques
are explained. Special emphasis is put on the Functional Hazard Assessment, where a practical guidance
for a Functional Failure Modes and Effects Analysis is presented. The content of this tutorial is based on
experience from an international working company.
Outline:
• Basic Definition
• Safety Process
• Safety Requirements
• Techniques/Methods
• Case Study
25
Wednesday // 08-06-14 // 13:30-15:30 // Regency A // TUTORIAL 0.2 CEU
The STAMP Model, STPA Hazard Analysis and CAST Accident Analyses
Instructor: Robert Fletcher, MSc, US Postgraduate School, Royal Military College, Ottawa, Ontario, Canada
Attendees will be able to: Understand the format of the STAMP Model and the STPA hazard analysis
process and perform CAST accident analysis. Learn the CAST process including; Identify the Accident
(Loss), Identify the Hazards, Identify the Proximal Events, Draw the Safety Control Structure, Analyze
each component of the Physical System and the Controllers
Short Overview: System-Theoretic Process Analysis (STAMP), Systems Theoretic Process Analysis (STPA)
and Causal Analyses Based on STAMP (CAST) area powerful hazard analysis methods designed to go
beyond traditional safety techniques-such as Fault Tree Analysis (FTA)-that overlook important causes of
accidents like flawed requirements, dysfunctional component interactions, and software errors. Although
traditional techniques have been effective at analyzing and reducing accidents caused by component
failures, modern complex systems have introduced new problems that can be much more difficult to
anticipate, analyze, and prevent. In addition, a new class of accidents, component interaction accidents,
has become increasingly prevalent in today’s complex systems and can occur even when systems operate
exactly as designed and without any component failures.
Abstract: System-Theoretic Process Analysis (STAMP), Systems Theoretic Process Analysis (STPA) and
Causal Analyses Based on STAMP (CAST have proven to be effective at addressing problems; however,
application has been ad-hoc with no rigorous procedures or model-based design tools to guide the
analysis. In addition, although no formal structure has yet been defined for STPA and CAST, the process is
based on a control-theoretic framework that could be formalized and adapted to facilitate development
of automated methods that assist in analyzing complex systems. This dissertation defines a formal
mathematical structure underlying CAST and STPA and introduces a procedure for systematically
performing an STPA and CAST analysis based on that structure. A method for using the results of the
hazard analysis to generate formal safety-critical, model-based system and software requirements is also
presented. Techniques to automate both the STPA and CAST analysis and the requirements generation
are introduced, as well as a method to detect conflicts between safety requirements and other functional
model-based requirements during early development of the system.
Outline: 1. STAMP 2. STPA 3 CAST
Wednesday // 08-06-14 // 13:30-16:50 // Frisco/Burlington // TUTORIAL 0.27 CEU
Fault Tree Analysis with CAFTA
Instructors: Jean-François Roy, Electric Power Research Institute, Palo Alto, California, United States
Abstract: This tutorial will introduce Fault Tree Analysis using CAFTA Software. Attendees will be first
reviewing fault tree methodology and terminology. Construction of a fault tree model in CAFTA will
then follow a brief review of CAFTA’s components and symbol types. In constructing the Fault Tree
model, topics covered will include projects, navigation, editing, shortcuts and how to add probabilities.
An overview of basic event probability formulas, type codes and variables will be included, as well as
printing and quantification processes.
Thursday // 08-07-14 // 8:00-11:20 // Grand A // TUTORIAL 0.27 CEU
Practical Generation of Safety Cases With the Help of GSN
26
Instructors: Andreas Gerstinger, PhD, Frequentis AG, Vienna, Austria;
Gabriele Schedl, Frequentis AG, Vienna, Austria
Attendees will be able to:
• Understanding of the concept of safety cases o Understanding of the benefits and potential pitfalls of
safety cases
• Overview of Goal Structuring Notation (GSN) o Ability to read GSN
• Ability to create simple arguments in GSN
Abstract: Detailed outline of the tutorial: Introduction (1h): The tutorial will start with a survey of
current safety standards (IEC 61508, ISO 26262, EN 50128, DO-178C,...) and analyse their views and
requirements regarding safety cases. We will then delve into the nature of safety cases, briefly touch
their historical origins, and clearly consider what can and what can’t be expected from a safety case.
Based on our practical experience we will also highlight some typical bad practices when constructing
safety cases. This helps to correctly and critically read them, and is also a helpful guideline for reviewing
other safety documentation. This part of the tutorial is largely a presentation. Goal Structuring Notation
(45min): We will now introduce the main elements of the Goal Structuring Notation (GSN), which is a
helpful tool to document safety cases. The presentation of the notation will be interleaved with brief
examples, excercises and questions, so that attendees have the chance to fully understand the meaning
and purpose of the various symbols. A structured method how to proceed when drafting safety cases will
also be presented. Hence, this part of the tutorial is much more interactive, requiring active participation
of attendees. Case Study (45min): A realistic case study will then be handed out. It is expected to be
solved as a group work (groups of 3-5 people are expected). The task of the groups will be to draft and
present a sound safety argument for a given claim that the system in the case study is acceptably safe
for a specific application in a given environment. GSN shall be used as a notation for this purpose. At the
end, the groups present their solutions, and the advantages/disadvantages of the presented solutions are
discussed. This part of the tutorial is a group work. Concluding Remarks (30min): Finally, we will bring
some concluding remarks, consisting of hints how to avoid common errors and fallacies in safety cases,
show some examples of real-world safety cases and a we will finish with a personal conclusion.
ISSTS 2014 Program
Short Overview: This tutorial will introduce you to the concept of safety cases. Safety cases are
structured arguments that support the claim that a system is safe to be used for a given application in
a given environment. Several standards require the production of such safety cases as a prerequisite
for approval. The tutorial will highlight good and bad practices when developing safety cases and will
introduce you to a notation specifically developed for the generation of safety cases, the Goal Structuring
Notation (GSN). There will be practical examples which need to be solved by the attendees, so that handson practice and experience is gained.
Objective: This tutorial will introduce you to the concept of safety cases. Safety cases are structured
arguments that support the claim that a system is safe to be used for a given application in a given
environment. Several standards require the production of such safety cases as a prerequisite for approval.
The tutorial will highlight good and bad practices when developing safety cases and will introduce you to
a notation specifically developed for the generation of safety cases, the Goal Structuring Notation (GSN).
There will be practical examples which need to be solved by the attendees, so that hands-on practice and
experience is gained.
Outline:
• Introduction
• Goal Structuring Notation
• Case Study
• Conclusion
Thursday // 08-07-14 // 8:00-8:50 // Regency A // TUTORIAL 0.1 CEU
Joint Munitions Safety Testing Initiative
Instructors: Eric Hawley, Naval Ordnance Safety and Security Activity, Indian Head, Maryland,
United States; Diane Dray, Booz Allen Hamilton, Arlington, Virginia, United States
Attendees will be able to: Understand the origin and goals of the Joint Munitions Safety Testing
Initiative (JMST). They will be able to access the published Joint Ordnance Test Procedures (JOTP) and
Allied Ammunition Safety and Suitability for Service Publications (AAS3P) and will understand how
these documents should be used in the current joint weapons acquisition environment. They will also
be familiar with the JOTP process and how JOTPs can be used for standardization by other functional
Department of Defense communities.
27
Short Overview: This tutorial will present the origins and goals of the Joint Munitions Safety Testing
Initiative. The tutorial will cover the established development and implementation process. Presenters
will go over completed publications, current development efforts, and future work, and how these
products should be implemented in DoD weapons acquisition. Opportunities to other DoD functional
communities offered by the JOTP process will also be covered.
Abstract: Department of Defense (DoD) acquisition has challenges in safety testing of munitions
that include duplicate or overlapping standards and multiple applications of the same standard by
different Services. The Under Secretary of Defense (OUSD) for Acquisition, Technology and Logistics
(AT&L) assigned an action to standardize basic engineering rationale to safety testing to achieve
data acceptability and interchangeability between the Services and US Special Operations Command
(USSOCOM). There already existed a Defense Safety Oversight Council (DSOC)-funded initiative, entitled
Joint Service Safety Testing Requirements (JSSTR), which was looking at implementation of the Joint
Requirements Oversight Council (JROCM 2005) directive that recognizes all weapon / explosive systems
as categorically joint. To meet these challenges, several interwoven initiatives to enhance support
to USSOCOM and the Joint Warfighting Environment have been established. These initiatives enable
collaboration on joint weapons safety reviews, integrating joint weapons safety requirements in Joint
Capabilities Integration and Development System (JCIDS), and developing joint service weapons safety
testing standards. Early phases of JSSTR validated the need among Stakeholders, published the AT&L
Study, and championed the study recommendations by the Joint Weapons Safety Technical Advisory
Panel Council (Navy-NOSSA Chair). Study recommendations were institutionalized by achieving joint
stakeholder consensus on a list of system independent environmental safety tests for use by Sponsors
in drafting JCIDS documents. Under the auspices of the NATO AC326 Subgroup 3, the Working Group for
the Development of Safety and Suitability for Service (S3) documents developed STANAG 4629 “Safety
for Service Assessment Testing of Non-Nuclear Munitions,” a standardization agreement paving the
way for improved munitions type-specific joint test standards. The S3 Working Group efforts were
complimentary with the JSST recommendations, and the efforts were linked in a dual path domestic
and international process, referred to as JMST. JMST has transitioned from a DSOC initiative and its
deliberations and product now fall under the purview of the Joint Weapons Safety Working Group
(JWSWG). The NATO S3 Working Group develops Allied Ammunition Safety and Suitability for Service
Publications (AAS3P) for munition commodity groups. The U.S. joint working group publishes a
commodity-specific corresponding Joint Ordnance Test Procedure (JOTP) for each AAS3P. The JOTPs
are designed to be retired when the AAS3P is ratified. A MIL-STD may also be used as an alternative
to eventually replace the JOTPs. The end result will be a more streamlined process for developmental
weapons safety testing involving fewer tests using fewer and non-overlapping standards. This, in turn,
will help to shorten the acquisition cycle for weapons. The JOTP has also been recognized and used as
an efficient standardization method by other functional groups such as the Explosive Ordnance Disposal
community and the Fuze community. It provides an opportunity for these groups to quickly publish and
begin using joint standards, when they may not exist or current standards are insufficient, and updates
to the existing standards are not imminent.
Objective: Familiarize participants with the background and goals of the Joint Munitions Safety
Testing Initiative and provide tools
and references for applying the joint
requirements developed to date and
potentially the JOTP standardization
process.
28
Monday // 08-04-14 // 14:30-16:30 // Regency C // Panel
Exploring Society History as a Guide for its Future Course
Includes historical notes and an open panel discussion
Moderator, Rex B. Gordon, CSP, P.E. Fellow Emeritus, Society Historian
A panel session, with audience participation solicited, will be convened. John Frost and Dr. Rod Simmons
will join Rex Gordon in leading this historically oriented discussion. Hopefully, this will lead to more fully
exploring the substance of these opposing viewpoints, with an eye toward the optimum future course for
the ISSS.
ISSTS 2014 Program
Panel Discussions/Forums
Last year at the conference in Boston, Rex presented the various historical factors that all came to gather
in Los Angeles which resulted in the charter meeting of our society on December 4, 1963. This year,
Rex will continue the chronicle with a brief review of the key movers and shakers that helped bring the
society off “Life Support” and into the “Players” room. There were then, and still are, many players in
the arena of fixing safety problems – each with solutions for some aspect or another of the complex, and
ever evolving accident prevention milieu. It so happens that in the 1960s minimizing the catastrophic
mishaps, then occurring in the cold war environment of inter-continental, nuclear tipped, ballistic
missiles, was a paramount issue for the U.S. Air Force. This had a significant influence on the nature and
subsequent evolution of the system safety concept, the promotion of which was the essential purpose for
forming the society. This environment was a driving force behind the development of MIL-STD-882, and
also some unintended limitations in the area of innovations to meet new challenges currently evolving in
today’s world.
Some current and former members of the society have questioned the validity of spending time
reviewing the past, when today’s technical and social environment is so removed from that of the 1960s.
They would have a valid case, if the past had no lessons to provide toward navigating the future course
of the society. However, others take the position that understanding the fundamental principles of the
system safety concept, and how they came into existence, is an essential key plotting the future course
of the society. However, others take the position that understanding the fundamental principles of the
system safety concept, and how they came into existence, is an essential key in plotting the future course
of the International Systems Safety Society.
Thursday // 08-07-14 // 8:00-11:20 // Regency C // Panel
G-48 Workshop – The Most Pressing Issues Facing System Safety
Moderator: David B. West, CSP, P.E., CHMM, Systems, Software, and Solutions Operation,
Science Applications International Corporation (SAIC), Huntsville, Alabama, United States
A panel of speakers (TBD) will give a series of presentations on the most pressing issues facing the System
Safety community today.
Thursday // 08-07-14 // 13:00-15:20 // Regency C // Panel
Developing Global System Safety Perspectives
Moderator (s): Warren Naylor, NGES Sr. System Safety Consulting Engineer (United States)
and Robert W. Fletcher, P.Eng., PMP, PCIP (Canada), ISSS International Director
There will be a brief presentation followed by a facilitation session where the chair will ask the audience
to respond to preselected questions such as:
• How can a Global Federation of System Safety Societies and Associations be developed? and
• How can an International Standard for certifying a professional International System Safety Engineer
and International System Safety Manager be developed?
29
Workshops
Tuesday // 08-05-14 // 8:00-8:50 // Grand C // WORKSHOP
Creating A Culture of Chronic Unease
Presenters: Laurence Pearlman, BBA, MA, Oliver Wyman, Chicago, Illinois, United
States; Susie Scott, BS ChE, Oliver Wyman, Chicago, Illinois, United States
Upon completion attendees will be able to: - Understand what Chronic Unease means - Recognize
leadership behaviors that support chronic unease - Understand behavioral ‘traps’ that prevent ourselves
from acting consistently with the desired culture - Evaluate how well leaders welcome bad news - Pro
Short Overview: This session will help safety leaders move the needle on culture from ‘we haven’t had an
incident, things must be going well’ to ‘we haven’t had an incident, I wonder what might be sneaking up
on me.’ - Understand what Chronic Unease means - Recognize leadership behaviors that support chronic
unease - Understand behavioral ‘traps’ that prevent ourselves from acting consistently with the desired
culture - Evaluate how well leaders welcome bad news - Provide discussion on how to ‘act on reds and
yellows and challenge greens’
Abstract: A state of “Chronic Unease” is achieved when leaders at all levels have created a culture where
they are made aware of weak signals of potential failure, and make effective and timely challenges and
interventions on risk assessments and decision making. It starts with openness, where we welcome bad
news and treat incidents as an opportunity to learn. When out on the site we ask the right questions and
pick up on signals of potential failure. It is:
• An Outcome and a feeling of never being complacent
-- from living a set of leadership behaviors
-- aimed at sharpening our focus (reducing our tolerance) to risk
• NOT a program and NOT about our frontline staff living in a state of fear
Tuesday // 08-05-14 // 9:00-9:50 // Grand C // WORKSHOP
What Does it Take to Really ‘Learn from Incidents’ Lessons get shared, but sharing is not learning
Presenters: Laurence Pearlman, BBA, MA, Oliver Wyman, Chicago, Illinois, United
States; Susie Scott, BS ChE, Oliver Wyman, Chicago, Illinois, United States
Upon completion attendees will be able to: Understand the difference between learning and sharing
incidents Understand ways to prioritize what gets shared Tips for communicating incidents What it takes
to learn from incidents Overcoming asset owner pride Making it sustainable
Abstract: Typical issues encountered by organizations while implementing LFIs - Trying to learn
from everything vs. a focused, risk based prioritization approach - Ambiguity to whom investigation
outcomes and lessons learned are applicable - Encountering organizational barriers to learning (e.g.,
culture, structure, roles, etc.) - Ineffective and/or inactive leadership drive and engagement - Focus on
compliance vs. commitment - Misalignment of what is said vs. the what actually happens in the field (the
‘Say-Do’ gap) - Overcomplicated and ineffective safety communication - Inability to identify the true root
causes - Lack of systems to properly capture and disseminate lessons - Lessons fail to result in revised
documentation of standards and procedures for proper re-use This session will focus on how to achieve
the benefits of successful learning: Reduce Risk - Lower overall organizational risk tolerance and incident
rate - Effective performance management systems and continuous improvement processes - Active audit
programs, identified safety barriers and robust safety-critical activities - Prompt investigation of issues
with focus on determining the true root cause - Immediate, underlying and latent cause (s), including
human/behavioral factors Committed Leadership & Organization - Leaders demonstrate a commitment
to safety and learning in their decisions and behaviors - Clearly defined basis from which to learn as well
as roles/accountabilities Impactful Knowledge Management - Effective safety communication - Simple,
memorable and visual communication - Effective systems for capturing, codifying, storing and retrieving
30
Tuesday // 08-05-14 // 10:30-11:20 // Grand C // WORKSHOP
Best Practices in Process Safety Culture - Lessons from the Energy Industry
Presenters: Laurence Pearlman, BBA, MA, Oliver Wyman, Chicago, Illinois, United
States; Susie Scott, BS ChE, Oliver Wyman, Chicago, Illinois, United States
Upon completion attendees will be able to: Understand best practices in the energy industry for driving
process safety culture Identify leadership as a core component for process safety culture Understand how
learning and employee roles are vital parts of establishing a process safety culture
Short Overview: This session shares industry best practices for establishing a process safety culture. It
will discuss how to align senior leaders to a common definition through metrics and how to sustain a
safety culture
ISSTS 2014 Program
lessons Lessons learned are auditable and identifiable across the organization Extensive networking,
crossing organizational boundaries to develop knowledge.
Abstract: This session is meant to provoke participants to assess their process safety culture by reviewing
a few fundamentals of culture and understanding what ‘good’ looks like. Participants will be encouraged
to use small group discussion to provoke thinking.
Objective: Understand best practices in the energy industry for driving process safety culture Identify
leadership as a core component for process safety culture Understand how learning and employee roles
are vital parts of establishing a process safety culture.
Outline of Session:
Definitions Committed leadership Capabilities Measurement Systems Continuous Improvement Change &
Communications
Tuesday // 08-05-14 // 13:30-16:50 // Regency A // WORKSHOP
Human and Organizational Performance (HOP) Fundamentals
Presenter: Robert “Bob” Edwards, GE, McMinnville, Tennessee, United States
Upon completion attendees will be able to:
• Understand HOP principles and have a working knowledge of the basic terms and concepts
• Apply HOP principles to their change their site management’s response to failure
• Conduct HOP Learning Teams for event investigations & to solve operational challenges
Short Overview: General Electric, with the coaching of Todd Conklin is undergoing a transformation. By
embracing the concepts of Human and Organizational Performance, the leadership teams at many GE
sites are realizing that there is a better way to respond to failure. They are becoming a lot less surprised
by human error and failure and they are now becoming a lot more interested in learning. The employees
at the GE sites that are undergoing this transformation are beginning to talk more openly than ever
before about their complex work environment and what it actually takes to get work done. As managers,
front line leaders and workers come together in a blame free, open environment, the real stories are
being told, and solution sets created by these teams are more thorough, effective and sustainable. This is
a journey worth taking and one worth sharing.
Abstract: This is a workshop to teach the fundamentals of General Electric’s Human and Organizational
Performance (HOP) initiative. Attendees will learn these HOP principles and see how GE and other
companies are applying these principles through Todd Conklin’s Learning Teams to gain deeper
operational intelligence. See the Learning Team process and witness real life examples from
manufacturing sites in GE’s Appliances, Lighting and Aviation divisions. Attendees will be able to
take home a very practical approach to try at their sites that will help them change their response to
failure, conversation about failure and ability to learn from failure. The workshop is very interactive
with several simulations and the knowledge gained can be applied immediately to improve response to
31
safety and quality events, near misses, and operational upsets and to help solve challenging design and
process issues. Bob Edwards has experience leading more than 200 HOP Learning Team sessions and
has a proven track record for bringing operational learning to a new level. Attendees will enjoy his high
energy presentation style and practical and inclusive approach to operational discovery and problem
solving. The skills gained from this workshop will blend perfectly with safety, lean, six sigma, concurrent
engineering and quality programs.
Activities: Two Learning Team simulations and several interactive activities.
Objective:
• Learn the basics terms and concepts
• Apply concepts to simulations
• Take back enough information, training and confidence to give Learning Teams a try at their site.
Outline of Session:
• Introductions
• GE HOP Journey
• HOP Principles
• Simulations
• Closing Comments
Thursday // 08-07-14 // 8:00-10:00 // Regency B // WORKSHOP
System Safety Handbook Working Group
Moderator: Chuck Muniak will lead the discussion. The meeting will be open to all.
Topics for Handbook Working Group Meeting
1. Summary of comments on the draft handbook
2. Discussion of the topics and depth of knowledge needed for certification
3. Discussion of proposed references that could be used as a source for certification exam questions and
other references that should be included in the handbook
Thursday // 08-07-14 // 13:30-16:50 // Grand A // WORKSHOP
Systems-of-Systems (SoS) Workshop on Framework, Collection, Processing,
and Organizing for System Safety and Software Safety
Presenters: Archibald McKinlay, MS, St Louis Regional Federal Executive Board, St Louis,
Missouri, United States; John Murgatroyd, BS, Team BCI, Dahlgren, Virginia, United States
Upon completion attendees will be able to: Layout a program-specific framework to outline SoS
attributes
Short Overview: Attendees will be taught how to begin a systems-of-systems (SoS) safety program by
assisting mission engineers and modelers in the collection, collation, processing, and organizing of SoS
attributes. These will be arranged within a program-specific framework such as one needed to (a) handoff to mission engineers and agent modelers, and (b) start analyses, or (c) build an SoS test plan. A basic
systems-of-systems model will be used. Basic understanding of what is required to trace safety from
mission and performance requirements will be highlighted.
Abstract: The workshop is intended to explain preparations and understanding of complex, adaptive,
systems-of-systems so that subsequent safety arguments, analyses, and tests are all developed from
the same context and data throughout the program in work, and to enable informed discussions across
systems and SoS boundaries. The size and complexity of systems-of-systems (SoS) requires a framework
from which to begin. These frameworks consist of building blocks but are arranged in program-specific
and in a context-specific manner. The framework from this workshop and from any field work is only the
32
ISSTS 2014 Program
set-up to enable modeling, analyses, and SoS test planning and will not be the SoS analyses themselves.
That is, the attendee will be taught how to collect those inputs for many engineers to use thereafter in
many SoS taskings. The context generally is derived from Concepts of Operations (CONOPS), Concepts
of Employment (CoE), and adjusted using experience with related systems, doctrines, current missions
and training programs. The building blocks, or swim lanes, concepts will be explained and used to build
out this workshop SoS framework. The collection of operational, system, and user data and artifacts will
be mapped out and example data arranged within the framework, and subsequently used to modify the
framework. The data within the framework will then be processed to assess completeness. A discussion
of weaknesses and strengths of the model, the collection processes, and the arrangement itself will
follow. Next steps will be discussed and how the next steps are impacted by the amount and types of data
within this framework. Preparations for modelers and mission engineers will be continuously assessed.
At the end of the workshop a lengthy question and answer period will be provided. No quiz or test will be
required.
Objective: Understand how to set up for a Systems-of-Systems program.
Paper Presentations
Monday // 08-04-14 // 8:00-11:20 // Grand B // Safety Topics 1 // Chair: Gonzalez
Mishap Prevention Utilizing Unlimited & Government Purpose Data Rights
Francis McDougall, MS System Engineering, BA Physics, Los Angeles
Air Force Base, El Segundo, California, United States
Assessing, reporting, tracking, accepting and documenting mishap risk using MIL-STD-882 methodology
is required by multiple DOD and Air Force policies. In order to ensure mishap risk tracking databases
are government and contractor accessible during the entire lifecycle of space systems, Air Force has to
maintain access to intellectual property data. The optimum method to do this is through negotiated
unlimited data rights while government funds analysis of alternatives, preliminary design, critical
design, test and evaluation, production and sustainment. In several cases unlimited data rights to
contractors’ intellectual property does not occur due to costs, the contractors’ assertion to retain
intellectual property and through acquisition of commercial off the shelf products integrated into space
systems via acquisition through open architecture. When unlimited data rights are not feasible, practical
or cost prohibitive then Program Managers should acquire government purpose data rights. This will
ensure effective transfer of mishap risk tracking databases linked to contractor intellectual property
to different contractors involved with Air Force space systems throughout acquisition and sustainment
lifecycles; thereby, ensuring consistent and effective mishap prevention programs.
Practical Insights for the Exchange of Leading Practices Lessons Learned in
Accident Investigation and Lessons Learned from Incident Investigations
Chris W. Johnson, School of Computing Science, University of Glasgow, Glasgow, United Kingdom;
Susan Reinartz and Michael Rebentisch, European Railway Agency, Valenciennes, France
Accidents are rare events across the transportation industries of Europe and North America. It is,
therefore, important that we learn as much as possible from small numbers of adverse events and
near miss incidents. This depends on the skill and expertise of accident investigators. Although a large
number of previous studies report on novel approaches to accident investigation, very few describe the
tools and techniques that investigators themselves would recommend to other investigation agencies. In
contrast, this paper will summarize the findings of a joint study between the European Railway Agency
and the University of Glasgow to encourage the exchange of lessons learned from investigations and to
encourage best practices in incident investigation across national borders.
33
System Safety Challenges in High Energy Laser (HEL) Weapon Systems
Martin S. Chizek, P.E., C.S.P., Raytheon Missile Systems, Tucson, Arizona, United States
Lasers are rapidly being implemented in modern weapon systems, either as additions to conventional
weapons platforms, or as stand-alone devices deployed on land and from aircraft and ships. As
technology has allowed for High Energy Laser (HEL) output from ever smaller packaging footprints, laser
missions have progressed from traditional range-finding and target designation to actively degrading
or destroying hostile sensors, missiles, aircraft and even surface craft. This paper explores the unique
hazards associated with operating and maintaining HELs, the commercial and military standards and
safety requirements to manage these hazards, and the residual risks that will inevitably remain after
reasonable mitigation measures have been implemented. Examples of current laser weapon systems
will be presented, and safety features, to include hardware, software and human interactions, will be
suggested to provide an effective HEL safety program. Finally, the international legal and regulatory
environment will be explored, and the user’s potential liability in deploying HELs will be discussed.
Monday // 08-04-14 // 8:00-11:20 // Grand C // Hazard Analysis 1 // Chair: Rose
Cases For Tailoring The MIL-STD-882E Risk Matrix For US Air Force Space & Launch Vehicles
Myles Moran, BS in Mechanical Engineering, Los Angeles Air Force Base, El Segundo,
California, United States; Tyrone Jackson, BS in Electrical Engineering & Certified
Reliability Engineer, ManTech, El Segundo, California United States
Tailoring the MIL-STD-882E 4x5 mishap risk matrix for specific US Air Force Space and Launch Vehicle
applications is subject to approvals or perhaps waivers from the Office(s) of Primary Responsibility
(OPRs) for those DoD and Air Force Instructions that specify the use of MIL-STD-882E. The SMC System
Safety organization (SMC/SE) has identified several Air Force policies and regulations which limit
making changes to three broad categories of MIL-STD-882E risk assessment metrics, i.e. mishap severity
category definitions; probability threshold definitions; and Risk Assessment Codes (RACs) aka Hazard
Risk Index (HRI) levels with associated risk acceptance authorities. During the past four years, there has
been an upsurge in instances of SMC program managers complying with their Air Force Instruction (AFI)
mandated responsibility to prepare a written safety risk assessment for spacecraft component-level
risks requiring Component Acquisition Executive (CAE) or Program Executive Officer (PEO) acceptance.
This upsurge involves “late-coming” component-level risks that were “perhaps” implicitly accepted
as part of system-level reliability requirements that were approved in the acquisition strategy many
years ago. These “late- coming” component-level risk assessment packages are becoming a significant
administrative burden on all management levels of the Air Force space systems acquisition process, but
Air Force policy may prevent affected program managers from implementing the easiest solution to this
problem, which would be to waive their mandated responsibility to identify component-level hazards
whenever the approved acquisition strategy includes quantified system-level reliability requirements.
The second easiest way to solve this problem would be to “tailor down” the MIL-STD-882E risk metrics
definitions to make them less stringent. However, making risk metrics definitions less stringent for
death, disability, injury, occupational illness, or environmental hazards would probably be met with
significant social backlash. So “tailoring down” MIL-STD-882E risk metrics must be done carefully else it
may affect death, personnel or environmental hazard assessments. This paper examines the advantages
and disadvantages of four different options for “tailoring down” the MIL-STD-882E risk assessment
metrics. These options correspond to tailoring the mishap severity category definitions; tailoring the
probability threshold definitions; tailoring the HRI levels; and tailoring the risk acceptance authorities.
The reader is left with choosing which option is best for their particular situation.
MIL-STD-882E, A Near-Miss About System Safety
David R. Sadler, BSME EE, Naval Surface Warfare Center, Dahlgren
Division, Dahlgren, Virginia, United States
Complex, procedurally-driven, or tightly coupled systems are inherently at risk of mishaps. Even the
best system safety programs embedded within the design efforts still produce systems that demonstrate
hazards via catastrophic mishaps, such as the Titan II missile. It is important, therefore, that we take
34
Accurate Risk Assessment using Multi-Relational Hazard/Mishap Pairings
Regina Eller, Naval Surface Warfare Center, Dahlgren Division, Dahlgren, Virginia, United States;
Michael Zemore, Naval Surface Warfare Center, Dahlgren Division, Dahlgren, Virginia, United States;
Rani Kady, Naval Surface Warfare Center, Dahlgren Division, Dahlgren, Virginia, United States
Current methods for defining safety risk force a single “worst case” assessment. Unfortunately, the
worst case assessment approach fails to capture the complexity of hazard/mishap relationships or
the reality of multiple effects from any given mishap. This failure limits a complex risk picture to be
characterized using only a portion of the relevant safety engineering and assessment data. This paper
describes focused research to suggest an innovative methodology for defining risk associated with
multiple hazard contributors and multiple effects. Research focus areas included defining complex
hazard path relationships, mathematical calculations of risk, and the development of requirements for
a relational engineering tool. The combined research and results is intended to transform MIL-STD-882E
based mishap risk assessment from a worst case into a complex multi-contributor risk definition and
accurately characterize risk using combined effects of personnel injury, equipment/property damage and
environmental damage. Ability to identify significant risk factors as those that influence multiple mishap
scenarios enhance the ability to focus on the most influential risk factors to gain substantially more
safety risk mitigation.
ISSTS 2014 Program
advantage of all involved to help identify potential hazards once a system is fielded. One untapped source
of information is the result of a process known as near-miss reporting. A near-miss is an event that
signals a system weakness that, if not remedied, could lead to a future mishap. A near-miss process is how
the industrialized world manages such near-miss events. A near-miss process works to identify hazards
prior to a mishap, as opposed to the reactive method of developing a mishap report after the event,
and then blaming someone. There are numerous national and international peer-reviewed publications
discussing the value of the near-miss process and identifying the methodology. Military Standard (MILSTD)-882E does not establish the “how” but it does identify the “what” of system safety. It is difficult to
understand why MIL-STD-882E does not specifically define and identify a near-miss process as a “what”
to be done.
Tuesday // 08-05-14 // 8:00-11:20 // Grand B // Aviation Safety // Chair: Liming
Aviation Safety Risk Modeling: Lessons Learned from Multiple Knowledge Elicitation Sessions
James Luxhoj, Ph.D., LCR, Somerset, New Jersey, United States; Ersin Ancel, Ph.D.; National
Institute of Aerospace, Hampton, Virginia, United States; Lawrence Green, Ann Shih,
Ph.D., Sharon Jones, Ph.D., NASA Langley Research Center, Hampton, Virginia, United
States; Mary Reveley, NASA Glenn Research Center, Cleveland, Ohio, United States
Aviation safety risk modeling has elements of both art and science. In a complex domain, such as the
National Airspace System (NAS), it is essential that knowledge elicitation (KE) sessions with domain
experts be performed to facilitate the making of plausible inferences about the possible impacts of future
technologies and procedures. This study discusses lessons learned throughout the multiple KE sessions
held with domain experts to construct probabilistic safety risk models for a Loss of Control Accident
Framework (LOCAF), FLightdeck Automation Problems (FLAP), and Runway Incursion (RI) mishap
scenarios. The intent of these safety risk models is to support a portfolio analysis of NASA’s Aviation
Safety Program (AvSP). These models use the flexible, probabilistic approach of Bayesian Belief Networks
(BBNs) and influence diagrams to model the complex interactions of aviation system risk factors. Each
KE session had a different set of experts with diverse expertise, such as pilot, air traffic controller,
certification, and/or human factors knowledge that was elicited to construct a composite, systems-level
risk model. There were numerous “lessons learned” from these KE sessions that deal with behavioral
aggregation, conditional probability modeling, object-oriented construction, interpretation of the safety
risk results, and model verification/validation that are presented in this paper.
35
DO-278A Impacts on Legacy MIL-STD-882E Air Traffic Management Programs
Ronald J. Bartos, PE, CSP, Raytheon Company, Sudbury, Massachusetts, United States;
Enrique Oviedo, Ph.D., Raytheon Company, Tucson, Arizona, United States
Most of the System Safety Programs for US and foreign civilian and military Air Traffic Management
(ATM) systems were developed in the past under MIL-STD-882E Standard Practice System Safety. Many
new or updated ATM systems are now being tasked with complying with DO-278A Software Integrity
Assurance Considerations for Communication, Navigation, Surveillance and Air Traffic Management
(CNS/ATM) Systems in their contracts. These new programs need to understand the cost and technical
impacts of DO-278A to not only the System Safety Program, but also to other areas of development such
as Systems Engineering, Software Engineering, and Test/Validation Engineering. The system safety
professionals need to understand how the DO-278A requirements compare to the MIL-STD-882E tasks
to take the lead on DO-278A certification for their systems. There are more and different tasks and
deliverables required under DO-278A compared to MIL-STD-882E. This paper highlights the additional
efforts required under DO-278A for a program to be certified to DO-278A.
Modeling Increased Complexity and the Reliance on Automation:
FLightdeck Automation Problems (FLAP) Model
Ersin Ancel, Ph.D., National Institute of Aerospace, Hampton, Virginia, United States;
Ann Shih, Ph.D., NASA Langley Research Center, Hampton, Virginia, United States
This paper highlights the development of a model that is focused on the safety issue of increasing
complexity and reliance on automation systems in transport category aircraft. Recent statistics show
an increase in mishaps related to manual handling and automation errors due to pilot complacency
and over-reliance on automation, loss of situational awareness, automation system failures and/or pilot
deficiencies. Consequently, the aircraft can enter a state outside the flight envelope and/or air traffic
safety margins which potentially can lead to loss-of-control (LOC), controlled-flight-into-terrain (CFIT),
or runway excursion/confusion accidents, etc. The goal of this modeling effort is to provide NASA’s
Aviation Safety Program (AvSP) with a platform capable of assessing the impacts of AvSP technologies
and products towards reducing the relative risk of automation related accidents and incidents. In order
to do so, a generic framework, capable of mapping both latent and active causal factors leading to
automation errors, is developed. Next, the framework is converted into a Bayesian Belief Network model
and populated with data gathered from Subject Matter Experts (SMEs). With the insertion of technologies
and products, the model provides individual and collective risk reduction acquired by technologies and
methodologies developed within AvSP.
Tuesday // 08-05-14 // 13:30-16:50 // Grand B // Safety Topics 2 // Chair: Atencia-Yépez
Defining Layered Safety Concepts based on Open System Architectures as Foundation
for Multi-Suppliers to Develop Interoperable Safety Critical Systems
Fenggang Shi, PhD; Douglas Ailey, P.Eng; Huw-Michael Gough; Thales
Canada Transportation Solutions; Toronto, Canada
It is quite common to choose one supplier for developing a safety critical system on a project. With
the increasing scale of systems in certain domains, this single supplier approach creates technical,
schedule, and cost risks due to limitations of a supplier’s product and/or their capability against
demanding technical, project delivery and maintenance requirements. To reduce such risks, integrating
interoperable systems from multiple suppliers is practiced based on the concept of operational
compatibility. The quality of the final integrated systems is limited by the degree of compatibility
between suppliers’ products. A high degree of compatibility is difficult to achieve because technical
differences between suppliers’ products naturally exist. Therefore, an Open System Architecture
approach is a way to reduce technical differences at the integration level, and it expects subsystems
developed by different suppliers to be interchangeable. However, safety engineering for the final
integrated system encounters various challenges, because suppliers have different solutions and domain
technology, and each supplier considers its technology and safety techniques as its proprietary property.
This paper discusses the main challenges and proposes the development of layered safety concepts
36
Rhapsody Model Safety Tagging for Model Development Driven (MDD)
Approach to System Architecture and Requirements Development
Hung Duong, BS, Naval Surface Warfare Center, Dahlgren Division, Dahlgren, Virginia, United States
Rhapsody is an integrated Model Development Driven (MDD) environment for systems, software, and
testing. Rhapsody enables the user to specify systems and software designs graphically, as well as to
simulate and validate the system as it is being built, to ultimately produce full production code from
the model. Identifying and tracing of Safety Critical Requirements (SCRs) in a MDD environment vice
traditional text requires a new approach. This paper describes the proposed approach for tracing SCRs
from the user Software Requirement Specification (SRS) to Dynamic Object Oriented Requirements
System (DOORS) module, to the Rhapsody Systems Engineering (SE) and Software (SW) Models.
ISSTS 2014 Program
as the foundation for multiple suppliers to manage these safety engineering challenges in delivering
interoperable systems on a project.
Gaining Deeper Operational Intelligence Using Human Performance Learning Teams
Robert Edwards, BSME, SGE, Roper Corp / GE Appliances, LaFayette, Georgia, United States
Understanding operational drift related to accidents, quality escapes, operational upsets and challenging
engineering design issues is critical to the success of our organizations. Getting the “story behind the
story” (Dekker) can be difficult using conventional retrospective investigation techniques. What we
need is a more holistic approach to understanding failures or the potential for failure. We are finding
that the use of Human Performance Learning Teams (Conklin) is giving us a deeper level of operational
intelligence then we have ever obtained in the past. By bringing the right people together with the right
attitude towards failure we are opening up that conversation. The resulting discovery process is giving
us greater depth of knowledge and increased employee engagement leading us to collaboratively develop
solution sets that are more affective, more thorough and more sustainable. With each successful Learning
Team effort we are building more confidence and capacity in our employees and more resilience and
reliability into our products and our organizations.
Tuesday // 08-05-14 // 13:30-16:50 // Grand C // Safety Topics 3 // Chair: Pottratz
Reducing High Impact Events by Implementing a Deep Dive
Process Early in the Event Closure Lifecycle
Shawn M. Laabs, System Safety Engineer, United Launch Alliance, Centennial, Colorado, United States;
James E. Allison, Error Prevention Lead, United Launch Alliance, Centennial, Colorado, United States;
Joseph P. Russell, System Safety Engineer, United Launch Alliance, Centennial, Colorado, United States;
James S. Stewart, System Safety Engineer, United Launch Alliance, Centennial, Colorado, United States
The Event Closure Lifecycle did not originally leverage the subject matter expertise of the Error
Prevention Point of Contact until later in the process. Assigning a preliminary Impact Index score
provides the opportunity to implement a Deep Dive Process. Defining an Impact Index threshold is
important when implementing a Deep Dive Process. Events with an Impact Index Score above the
threshold trigger the Deep Dive Process. The Impact Index threshold can be reduced periodically to
increase Deep Dive Process oversight requirements. The Deep Dive Process augments the Event Closure
Lifecycle, leveraging the subject matter expertise of the Error Prevention Point of Contact earlier in the
Event Closure Lifecycle. The Deep Dive Process resulted in an increased level of depth and improved
results for the causal analysis and corrective action determination / implementation processes. The
increased level of depth and improved results ultimately led to a reduction in system risk over time that
was obtained by reducing the number of Events with Impact Index over the threshold. The overall level
of safety within the enterprise was increased by leveraging the subject matter expertise of the Error
Prevention Point of Contact early in the Event Closure Lifecycle.
37
Reconciling Developmental Weapons Safety Tests in MIL-STD-2105
Ken Tomasello, Navy Insensitive Munitions Office, Indian Head, Maryland, United States;
Diane Dray, Associate, Booz Allen Hamilton, Arlington, Virginia, United States;
John Adams, Associate, formerly Booz Allen Hamilton, Arlington, Virginia, United States
Since MIL-STD-2105 was revised to add additional Insensitive Munitions (IM) tests as called out by
the Joint Service Requirement for Insensitive Munitions (JSRIM), and by various NATO STANAGs, it is
common practice to assess munitions with respect to hazards using IM tests in MIL-STD-2105; Hazard
Classification (HC) tests in TB 700-2 (transportation and storage purposes); and safety and suitability for
service (S3) assessment testing. The basic safety tests have recently begun promulgation in a series of
interconnected NATO documents with the weight of STANAGs. This paper explores the contemporary
situation of delineation of these tests in MIL-STD-2105D and an approach to improve the transparency
of this seminal set of standards. This paper will recommend how the safety tests can be reconciled in
MIL-STD-2105D, the roadmap for reconciling the safety tests in MIL-STD-2105D, and the series of NATO
standards containing the safety tests. The expected result is an updated MIL-STD-2105 will be a less
confusing and a more focused standard for IM testing and S3 assessment testing will be accessed in a
well-defined set of NATO standards.
Effects of Unintended Longitudinal Acceleration and Deceleration Profile
Magnitude and Duration on Driver Performance Behaviors
Mark A. Vernacchia, MS, PE, General Motors Company, Milford, Michigan, United States;
Charles A. Green, Ph.D., General Motors Company, Warren, Michigan, United States; Robert E.
Llaneras, Ph.D., Virginia Tech Transportation Institute, Blacksburg, Virginia, United States
The automotive industry continues to implement increasingly complex and efficient propulsion control
systems in an effort to provide customers with the best balance of performance and fuel economy,
while still satisfying required safety-critical systems criteria. Understanding how driver performance
is affected by events such as unintended longitudinal accelerations and unintended longitudinal
decelerations is a critical aspect in the design, development, and verification of these safety criteria.
This presentation explores the results of an unintended longitudinal acceleration and unintended
longitudinal deceleration vehicle study performed by GM and VTTI. The magnitude and duration of
erroneous longitudinal impulses were varied during the study and the resulting driver behaviors and
vehicle data were recorded. The study identified various driver behavior signatures that were equated
to “startle” and “panic” events where some drivers did not maintain appropriate control of the vehicle
once an unexpected impulse was introduced. The resulting driver behaviors and vehicle data were used
to characterize “panic signatures” associated with unintended longitudinal acceleration and unintended
longitudinal deceleration events.
Wednesday // 08-06-14 // 8:00-11:20 // Grand B // Robotics/Unmanned Systems //
Chair: Kady
Models for Assessment of Unmanned Air Vehicle Hazards
David Chiam Tou Wei, ST Aerospace, Singapore
In the course of evaluation of system hazards during the development of Unmanned Aerial Vehicles
(UAV), it is realized that the impact of some failure conditions normally considered to be of high severity
for manned aircraft needs to be assessed differently. Unlike manned aircraft, the UAV operates without
a human pilot aboard, thus the potential to harm aircraft occupants is non-existent. The focus instead
shifts to the potential to inflict harm on humans in the area of operations. Physics based models which
take into account the characteristics of the UAV were developed to evaluate the conditional probabilities.
This contributes to a more representative mishap risk assessment.
Safety, Autonomy, Latency, and the Unmanned or Remotely Piloted Vehicle
Archibald McKinlay, MSc., University of Southern California (USC), Los Angeles, California, United States
This paper will outline the differences safety must consider unique when analyzing a remotely piloted
38
System Safety Considerations for Unmanned Ground Vehicles
Tiffany Owens, Naval Surface Warfare Center, Dahlgren Division, Dahlgren, Virginia, United States
The applications and capabilities of Unmanned Ground Vehicles (UGVs) have increased in the last
several years in the private and military sectors. More and more UGVs are employed to execute tasks
that are considered dangerous to personnel such as chemical and biological warfare monitoring, wildfire
elimination, surveying hostile environments and deactivating explosive devices. UGVs also aid to reduce
personnel tasking requirements such as patrolling borders and transporting loads on the battlefield.
While the benefits and usages of UGVs are welcomed, UGVs also introduce new safety concerns to be
addressed due to the decreased role of the human operator. This paper will present application areas, and
discuss system safety concerns and analysis required to support the safe operation of UGVs.
ISSTS 2014 Program
or unmanned system safety program by drawing on parallels to the more common distributed system.
Building on the DoD’s Unmanned System Safety Guidebook and relevant analyses, the risks and issues
which are unique to these unmanned systems shall be separated and listed. An assessment of these
risks, issues, and attributes shall examine whether these are extensions of current MIL-STD-882, or
other standards, or whether new analyses, inspections, or tests should be required or whether existing
processes can absorb them to adequately state the integrated system safety risk.
Wednesday // 08-06-14 // 8:00-11:20 // Grand C // Software Safety 1 // Chair: Axelrod
Interpretation of the Software Control Categories for MIL-STD-882C
Tan Shen Chin, Singapore Technologies Kinetics, Singapore
Classifying a piece of software function in accordance to the MIL-STD-882C Software Control Categories
is not as simple as to pick and match to one of the following. The definition in the standard has its fair
shares of shades of grey which is a source of great debates among the software safety practitioners,
experts and within the project team members. Not many good literatures are available to provide a clear
understanding of the definition or a practical
approach for justifying the assignment of the
software control categories. This paper attempts
to provide a method to address the assignment
of the control categories to a software function
as closely matched to the definition as possible.
The method takes into account of the product
nature which the software was designed for, and
using sequence diagrams in the justification of
the of the software characteristic. In addition, the
software architecture, the degree of coupling and
cohesion relationship of the software functions
would also be used to determine the assigned
classification. This method had been adopted by
the author in his course of work and the approach
was able to provide a more assuring classification
for reviews.
39
Decoding The Software Control Category
Eng Ling Onn, ST Kinetics Ltd, Singapore; Clifton Ericson, BSEE, MBA, URS Corp., Fredericksburg,
Virginia, United States; Michael Brown, BSEE, MS, URS Corp, California, United States
This paper consolidates the development of software safety standards to aid understanding in the
application of Software Control Category (SwCC). Ambiguity in the Software Control Category (SwCC)
criteria defined in MIL-STD-882C and E is highlighted. Such ambiguity is one of the significant source
of uncertainty in the software module assessment and it often leads to inconsistent or incorrect
determination of the Software Criticality Index (SwCI). The authors re-collected the key basis used for
establishing the SwCC in MIL-STD-882C. Changes to the SwCC from MIL-STD-882C to MIL-STD-882E are
compared to ascertain the impact to the interpretation of SwCC. Further improvement to the SwCC
criteria is suggested to eliminate ambiguity.
System and Software Safety Challenges for Widespread Acceptance of Driverless Vehicles
Gregory Turgeon, GT Software Services, Decatur, Alabama, United States
Widespread use of driverless automobiles has the potential to save tens of thousands of lives annually in
the United States. While the technology for these vehicles exists today, there are unique system safety
and software safety challenges that must be addressed to ensure this lifesaving potential can be realized.
The primary system safety challenge is developing techniques to assess the complex system of systems
that is composed of the vehicle safety equipment interacting with other vehicles and the constantly
varying highway environment. The primary software safety challenges are to ensure rigorous software
standards are enforced and to tightly control the configuration of the software in each vehicle. These
new challenges will require development and update of safety standards, regulation and enforcement
by government agencies, acceptance by automotive manufacturers and suppliers, and training of the
professionals developing these systems. The paper describes a potential driverless vehicle transportation
system, identifies the system and software safety challenges to assure safety of that system, and lists
specific steps for system safety professionals to generate the foundation to fully realize the lifesaving
potential of this new technology.
Wednesday // 08-06-14 // 8:00-11:20 // Regency A // Space Safety // Chair: Thomas
Hazardous Dependency of Critical Infrastructures on Global Navigation Satellite Systems Services
Amaya Atencia-Yepez, Safety & Dependability Manager; Marta Cueto-Santamaría,
GNSS Project Manager; Ana Cezón-Moro, GNSS Section Head; GMV, Spain
The growth of GNSS technology is very fast and there are uncountable applications that rely on it. GNSS
is integrated in the daily habits of many millions of people. Almost in every sector around us there are
applications that utilize GNSS technology ranging from safety of life applications (like navigation aid
for maritime, road, railway or aviation transportation) to common utilities (like well-known in-car
or personal navigation). With such a high rate of dependency on GNSS signals, many national critical
infrastructures in key economic and social sectors would be severely affected in case of failures or
outages of GNSS: “Positioning, navigation and timing PNT services” are fundamental for transportation
sector and “Timing services” are also key for the efficient management and operations of national and
cross-border utilities. Understanding GNSS vulnerabilities and defining mitigations strategies (like
back-up systems) is essential for making them more resilient and for protecting crucial services that are
dependent of GNSS. The objective of this paper is to evaluate the degree of reliance of a given set of user
communities and to identify means that could provide PNT services to critical users in the absence of
GNSS without causing a major impact on the society.
Major Hazardous Events for Unmanned Space Systems
Burak Durmaz M.Sc., Eng., System Safety Specialist, Turkish
Aerospace Industries, Inc. (TAI), Ankara, Turkey
Unmanned satellites are being widely used in different application areas such as earth observation,
telecommunication and scientific researches. The increase in demand for these space systems also
increases the technological complexity and introduces different types of hazards into satellite and
40
ISSTS 2014 Program
associated ground support equipment design. The aim of this study is to briefly outline the major
hazardous events that shall be taken into account in the safety program of an unmanned satellite
program. The hazardous events are including propellant leakage or explosion, explosion or leakage
from battery, dropping of filled/unfilled spacecraft during vertical lifting or horizontal transportation,
electrical ignition, inadvertent thruster firing or leakage, uncontrolled release of potential energy
(rupture of pressurized tank and lines, etc.) and/or kinetic energy (momentum wheel, etc.) and radio
frequency susceptibility. The aim is to give the possible hazard causes, hazard control means, safety
verification methods, and the data which is going to be used as an evidence for the assigned verification
method. The evidence material may be spacecraft and associated ground support equipment design
documentation and drawing, various analysis results such as stress, thermal and electromagnetic
compatibility and qualification and acceptance test reports. Also, complementary verification activities
are listed as a reminder.
Simulating the Risks of Sub-Orbital Space Flight for Air Traffic Management
Chris W. Johnson and Marco Sarconi, School of Computing Science,
University of Glasgow, Glasgow, United Kingdom
The next decade will see an increasing number of sub-orbital space flights for both scientific reasons and
for space tourism. In the longer term, these initiatives may also lead to the development of sub-orbital
transportation – for instance, to support military fast response without the need for costly, high-risk
local deployments. As part of the longer term planning for these flights, it is important to assess the
possible risks to civil aviation and, in particular, the hazards that might arise from their interaction
with controlled air space. In this paper, we present the results from integrating live data about aircraft
flights using an Automatic Dependent Surveillance-Broadcast (ADS-B) server together with up to data
meteorological information. The users of the system describe the performance characteristics of a suborbital vehicle together with the coordinates of a potential accident. The system then calculates the
resulting debris field and presents a predictive model of the consequent impact on surrounding aircraft
at different flight levels. The closing sections of the paper identify future directions for research to assess
the safety impact of sub-orbital flights.
Wednesday // 08-06-14 // 13:30-16:50 // Grand B // Safety Topics 4 // Chair: Rozanski
The Evolution of System Safety at NASA
Homayoon Dezfuli, Ph.D., NASA Headquarters, Washington DC, United States;
Frank Groen, Ph.D., NASA Headquarters, Washington DC, United States;
Chris Everett, Information Systems Laboratories, New York, United States
The NASA system safety framework is in the process of change, motivated by the desire to promote an
objectives driven approach to system safety that explicitly focuses system safety efforts on system-level
safety performance, and serves to unify, in a purposeful manner, safety-related activities that otherwise
might be done in a way that results in gaps, redundancies, or unnecessary work. An objectives-driven
approach to system safety affords more flexibility to determine, on a system-specific basis, the means by
which adequate safety is achieved and verified. Such flexibility and efficiency is becoming increasingly
important in the face of evolving engineering modalities and acquisition models, where, for example,
NASA will increasingly rely on commercial providers for transportation services to low-earthorbit. A key
element of this objectives-driven approach is the use of the risk-informed safety case (RISC): a structured
argument, supported by a body of evidence, that provides a compelling, comprehensible and valid case
that a system is or will be adequately safe for a given application in a given environment. The RISC
addresses each of the objectives defined for the system, providing a rational basis for making informed
risk acceptance decisions at relevant decision points in the system life cycle.
Utilizing Error Prevention Data and Lean Six Sigma Techniques
to Verify the Existence of Error Prone Zones
Shawn M. Laabs, United Launch Alliance, Centennial, Colorado, United States
Historically, potential Error Prone Zone existence was identified through histogram analyses. Error Prone
41
Zones were originally thought to exist for Events occurring within certain Times of Day and Months
of Year. Initial research was unable to verify Error Prone Zone existence. In an attempt to verify Error
Prone Zone existence, ULA developed and analyzed a suite of Control Charts. The Control Chart analyses
increased the knowledge and understanding of Error Prone Zones. The analyses verified the existence
of some Error Prone Zones and did not verify the existence of others. There are a variety of benefits
that were realized from the analyses. One is Error Prone Zone verification. This allows more effective
application of resources on Error Prevention activities. This also allows more effective Lessons Learned
sharing about Error Prone Zones and their existence. Another benefit is increased ability to conduct
additional research on Error Prone Zones. Better understanding allows the exploration of possible effect
factors, which may affect the work force’s capability to perform error-free tasks. The Error Prevention
Team can now influence planning decisions and reschedule critical tasks to occur outside of an Error
Prone Zone in an attempt to reduce the risk of Event occurrence.
Wednesday // 08-06-14 // 13:30-16:50 // Grand C // Software Safety 2 // Chair: Schedl
Study of a Method for Early Interface Verification with Hierarchical Executable Software Model
Ryo Ujiie, Japan Aerospace Exploration Agency, Tsukuba, Ibaraki, Japan;
Masafumi Katahira, Japan Aerospace Exploration Agency, Tsukuba, Ibaraki, Japan;
Maria Hernek, European Space Agency, Noordwijk, Netherland; Pablo Abad Rubio,
Deutsches Forschungszentrum für Künstliche Intelligenz, Kaiserslautern, Germany
The Japan Aerospace Exploration Agency (JAXA) has collaborated on certain international projects.
In the projects, the interface among different organizations caused many problems, some of which
were found late in the development phase, that negatively impacted the projects. Therefore, various
organizations have attempted to define and verify adequate Interface Control Documents (ICDs) in order
to find problems early in the development phase. For JAXA’s software Independent Verification and
Validation (IV&V), engineers verify the interface early in the development phase to ensure successful
projects. However, past verification consisted mainly on validating static consistency between ICDs and
target software specifications; behavioral inconsistency among software causes problems late in the
development phase. JAXA and the European Space Agency (ESA) IV&V teams undertook a pilot project
with the objective of studying an effective method for verifying interface related to software behavior
early in the development phase. In this pilot project, we developed a verification method based on an
executable hierarchical model, and applied it to an actual international spacecraft project. As a result, 92
ICD issues were identified before implementing the software; however, significant time was consumed.
To improve efficiency, we suggest developing models based on the software component architecture
framework.
Predicting Software Performance - Software I
Richard R. Zito, Richard R. Zito Research LLC, Tucson, Arizona, United States
Simple and robust model section methods are presented for software. These models allow forward
projection of failure (defect) rates based on collection of a limited amount of early change control data
during the software development process. Naturally, model selection is simpler when more data is
available. But here, the focus is on “early model projection” because financial and temporal constraints
often limit the amount of resources available for more complete collection of software performance and
reliability data. If a maximum in the defect rate occurs at time t = tmax into the software development
cycle, then key model selection and refinement times occur at t = 2tmax and 3tmax.
What is “Unnecessary” Code and Why Is It Unsafe?
Archibald McKinlay, MSc., University of Southern California (USC), Los Angeles, California, United States
This paper will address one type of unused software code, that is, unnecessary code. Review will include
the arguments and claims regarding a set of definitions which define software code as “unnecessary”
and contrast that term with other terms often applied to unused code, such as not loaded, unreadable,
dead, partitioned, not instantiated, unreachable, or any other software code other than that intended
to execute within this runtime. Once defined and clarified, unnecessary code shall be examined to
42
Thursday // 08-07-14 // 8:00-9:50 // Grand B // Hazard Analysis 2 // Chair: Durmaz
Innovation vs Safety: Hazard Analysis Techniques to Avoid Premature Commitment
During the Early Stage Development of National Critical Infrastructures
Chris W. Johnson, School of Computing Science, University of Glasgow, Glasgow, United Kingdom
Preliminary hazards analysis helps identify safety concerns during the early stages of development.
However, these techniques rely on scoping studies and functional decompositions that can be hard
to sustain without premature commitment to particular software architectures. For example, small
alterations to the high-level design of a critical infrastructure can force radical changes in the underlying
hazard analysis. This creates tensions – safety managers become “the enemies of innovation” if they
oppose modifications that trigger additional hazard analyses. Equally, it can be hard for safety managers
to control project costs if alterations force continual changes in their safety assessments. These tensions
are compounded because many hazard analysis techniques have their roots in the 1960s when issues of
scale, modularity and reuse were arguably less significant than today. These arguments are illustrated
by the EATS project creating an Advanced Testing and Smart Train Positioning System for the next
generation European Train Control System. EATS integrates a range of wireless infrastructures with input
from Satellite Based Augmentation Systems to reduce reliance on trackside infrastructures. However, the
dynamic, multidisciplinary nature of the work has created a need for continuous feedback on potential
safety concerns as lab and bench studies innovate with novel software architectures and prototype
implementations. We present a number of approaches that can be used to balance the need for design
commitment to support safety assessments and the flexibility required in the early-stage development of
critical infrastructures.
ISSTS 2014 Program
determine whether sufficient analyses, tests, or demonstrations may be applied to satisfy a safety
argument that allows that unnecessary code to remain loaded with no further actions required.
Mind-Mapping the Hazard Space of a System
Clifton A. Ericson II, Fredericksburg, Virginia, United States
Everyone knows how to identify hazards, right? Just look at a system functional diagram and start listing
hazards that would result from component and functional failures. Or, look at all the system energy
sources and list the bad things that can happen if they fail or malfunction. Or, look at system control
laws and evaluate the effect of potential malfunctions. Although these approaches sound plausible and
are taken by many, the problem is that effective hazard recognition is not quite that simple. One of the
major problems encountered during hazard analysis is properly organizing the overall analysis such that
the correct and proper hazards can be identified. Sometimes systems are so large and complex that an
analyst easily goes off in the wrong direction and misses hazards or misidentifies hazards. This situation
is analogous to the old adage that one cannot see the trees for the forest. The solution is to develop a
system mishap model (SMM) that aids in visualizing the trees in the forest. The SMM helps the safety
analyst to organize a hazard analysis and to visualize the trees within the forest; it maps the overall
hazard space of a system. The SMM is not a hazard analysis, but rather a hazard analysis aid. This paper
explains the SMM and its usage, along with several examples.
Thursday // 08-07-14 // 8:00-11:20 // Grand C // Risk Assessment 1 // Chair: Rinaldo
Distribution of Risk
Aaron Banerjee, M.S. EE, Naval Surface Warfare Center, Dahlgren, Virginia, United States
Safety risk is expressed in terms of probability and severity. Currently, Military Standard (MIL-STD)-882D
provides a matrix whereby, given a probability and severity, the risk level can be determined. Currently,
when risk is quantified in terms of probability and severity, the worst credible scenario is typically used
as the single risk scenario. While that approach increases the confidence that the assessed risk represents
the worst possible outcome, it may not provide a comprehensive picture of all relevant risk (e.g., such as
the case where there is a credible catastrophic scenario with a very small likelihood of occurrence, but
also a serious scenario with a relatively high likelihood of occurrence). This paper proposes an approach
43
where a broad picture of risk may be obtained by expressing risk of a mishap as a series of scenarios and
then using a summing technique to obtain a Composite Risk Index (CRI). The approach utilizes factors
representing the big picture of risk, such as severities of possible mishap effects and population size
(affecting composite probability). The purpose of this approach is not to establish an absolute measure
for risk, but to provide a balanced expression of risk level to support sound safety risk decisions.
Personnel Risk Assessment for Random Reentry Considering Casualty Expectation
Lan Dang, B.S. ChE, USAF Space and Missile Systems Center, Los Angeles AFB, El Segundo,
California, United States; Tom Meyers, PE CSP, USAF Space and Missile Systems Center, Los
Angeles AFB, El Segundo, California, United States; Tyrone Jackson, BS Electrical Engineering
& Certified Reliability Engineer, ManTech, El Segundo California, United States
Assessing, reporting, accepting and documenting mishap risk to personnel using the MIL-STD-882E risk
assessment methodology is required by multiple DOD and Air Force policies. In contrast, a tradition
(also rooted in policy and national guidelines) in the Air Force Space enterprise is to assess and accept
risk using Casualty Expectation (Ec) models and estimates. Casualty Expectation differs from the MILSTD-882E risk assessments in that it does not provide separate probability estimates for a given severity
(e.g. probability of fatality of one or more personnel), but instead provides an estimate of the number of
casualties (including significant injuries and fatalities) for a particular operation and re-entry. This paper
introduces the relationship between MIL-STD-882E risk and Casualty Expectation, describes how MILSTD-882E risk assessment methodology might be used in conjunction with Casualty Expectation models
and estimates along with considerations of terminal effects, and explains the advantages and difficulties
of using such a procedure. The paper also proposes a process improvement to enable appropriate use of
MIL-STD-882E risk assessments in these cases.
The Challenges of a Quantitative Approach to Risk Assessment
Rani Kady, PhD, Naval Surface Warfare Center, Dahlgren Division, Dahlgren, Virginia, United
States; Arjuna Ranasinghe, PhD, Alabama A&M University, Huntsville, Alabama, United
States; Mike Zemore, MS, NSWCDD, Dahlgren, Virginia, United States; Regina Eller, BA,
Naval Surface Warfare Center, Dahlgren Division, Dahlgren, Virginia, United States
Risk assessment and documentation, as an element of the system safety process in the general
requirements of MIL-STD-882E, assesses the severity category and probability level of a potential
mishap. The likelihood of occurrence of a mishap determines the probability level for a given hazard at
a given point in time. Since quantitative assessments are perceived to be more accurate than qualitative
ones, several attempts have been made to accurately measure the appropriate probability level for
a hazard. Researchers of such attempts are challenged to use appropriate and representative data to
define frequency or rate of occurrence for a hazard. This paper describes the nature and complexity of
a mathematical representation to risk assessment. It outlines a detailed quantitative risk assessment
framework to guide the system safety community attempts. A case study will be presented to illustrate
the application of the framework and highlight the challenges to the system safety community in terms
of mathematical approach, assumptions, and variable conditions of risk assessment.
Thursday // 08-07-14 // 13:30-16:50 // Grand B // Security & System Safety // Chair: Owens
Supporting the Exchange of Lessons Learned from CyberSecurity Incidents in Safety-Critical Systems
Chris W. Johnson, School of Computing Science, University of Glasgow, Glasgow, United Kingdom
Over the last decade, a small but growing number of cyber-attacks have been detected in safetycritical systems. One reason is that ‘mass market’ malware targets Commercial Off-The Shelf (COTS)
infrastructures, including Linux and the IP stack, which are increasingly being used in critical
applications. Another reason is the rise of state-sponsored attacks; ‘sniffer’ programs disclose
infrastructure information from inside control networks that are not usually connected directly to the
Internet. There are considerable barriers to the disclosure of information about previous attacks. Many
commercial infrastructure providers do not want to admit that their systems have been exposed to ‘mass
44
Cyber Safety of Voice Communication Systems: About Security Threats and Safety Analysis
Maximilian Riedl, Frequentis AG, Vienna, Austria; Gabriele Schedl, Frequentis AG, Vienna, Austria
Security threats are a growing hazard for safety-relevant systems operating in cyberspace. The demands
to interact and exchange with other systems is ever-growing and results in an increasing number of
vulnerabilities. Apart from technical threats like sophisticated malware and the conflicting situation
of software assurance and outdated software, another challenge is the paradigm shift from a strict
separation of safety and security domain to a common and unified approach. Due to different interests
and requirements, this separation is understandable from a historic perspective, but disadvantageous
for the future cyber safety of systems. The paper will present promising results achieved by the
integration of security-risks into safety- and hazard analyses in the field of voice communication and
control systems. The joint examination of standards, methods, requirements and scientific literature of
both domains, has led to a mutual understanding and closer cooperation of safety domain experts with
security specialists. The cooperation has resulted in substantial improvement regarding security and
safety of the considered systems. Therefore the approach for harmonization of safety and security is
highly recommended.
ISSTS 2014 Program
market’ malware. There are also forensic and national security concerns associated with the disclosure of
information about more sophisticated forms of attack. The following pages identify ways of supporting
the exchange of information about previous cyber-attacks without disclosing data that might encourage
future attacks. In particular, we consider architectures for security-incident reporting systems that
encourage the exchange of lessons learned in safety-critical applications.
Inadequate Legal, Regulatory, and Technical Guidance for the Forensic
Analysis of Cyber-Attacks on Safety- Critical Software
Chris W. Johnson, School of Computing Science, University of Glasgow, Glasgow, United Kingdom
National and international organizations including NIST and ENISA have published guidance that is
intended to help organisations respond to, and recover from, cyber incidents. They provide detailed
information about contingency planning, about the processes needed to gather and analyse evidence,
about appropriate ways to disseminate the findings from forensic investigations. Legal frameworks,
including the Federal Rules of Evidence, also help companies to identify ways of preserving a chain
of evidence with the digital data gathered in the aftermath of a cyber-attack. It is essential that
companies apply these guidelines to increase their resilience to future attacks. However, they provide
the least support where they are needed the most. Existing guidelines focus on corporate office-based
systems; they cannot be applied to support companies dealing with cyber-attacks on safety-critical
infrastructures. This is an important omission. It is impossible to immediately disconnect infected
systems where they provide life-critical functions. There are conflicts between the need, for instance,
to preserve the evidence contained in volatile memory and the requirement to return safety-critical
applications to a safe state before any forensic work can begin. The following pages identify the problems
that arise when applying legal, regulatory and technical guidance to the cyber security of safety-critical
applications. The closing sections focus on techniques that can be used to support the forensic analysis of
cyber incidents and promote recovery from attacks without placing lives at risk.
Thursday // 08-07-14 // 13:30-16:50 // Grand C // Risk Assessment 2 // Chair: Pierson
Usability for System Safety Engineers: Using Nielson’s Ten Heuristics to Identify
the Increased Potential of Human Error as a Contributor to Mishap Risk
Rebecca Funkhouser, Naval Surface Warfare Center, Dahlgren Division, Dahlgren, Virginia,
United States; Rachel St. Laurent, Department of the Navy, Naval Surface Warfare Center,
Dahlgren Division, Dahlgren, Virginia, United States; Samantha Sperry, Department of the
Navy, Naval Surface Warfare Center, Dahlgren Division, Dahlgren, Virginia, United States
System safety experts have acknowledged that collaboration with HSI is important. Various documents,
courses, workshops, and journal articles address system safety and HSI: NAVSEA SW020-AH-SAF-010
“Weapon System Safety Guidelines Handbook” has an entire chapter on HSI, the Weapon System
45
46
ISSTS 2014 Program
Explosives Safety Review Board (WSESRB) Interactive Safety Environment (WISE) Training includes a
course on System Safety and HSI, previous International System Safety Conference papers and workshops
have focused on HSI, and several Journal of System Safety articles have been written about system safety
and HSI. Some of these resources define HSI and the seven domains which make up HSI. Other resources
describe Human Reliability Analysis (HRA), an HSI analysis technique which was developed to calculate
the probability of human error based on cognitive and environmental influences. It is useful for system
safety engineers to be aware of other HSI analysis techniques that are available. This paper will introduce
system safety engineers to the concept of usability and will teach them to identify when a system design
violates basic usability “rules of thumb.” If the safety engineer sees one of these usability problems,
especially in a safety critical system, the design in this area deserves additional scrutiny. This scrutiny
should include collaborating with HSI to determine how human error could increase the probability of a
mishap.
Influence Diagrams: Generalizing Fault Trees for Informed Decision Making
Jeremy Monat, PhD, James McCracken, Ariel Obaldo, Gary Sweany,
Systems Planning and Analysis, Washington, DC, United States
Informed safety decision making can require numerous fault tree analyses (FTA) and probabilistic risk
assessments (PRA) for a single hazard. This is especially true in complex projects. One influence diagram,
a generalization of FTA and PRA, can embody multiple analyses. Influence diagrams allow the analyst to
calculate mishap probabilities which depend on system parameters such as equipment or mitigations
used. While FTA are widely used to visualize mishap scenarios and estimate their probability, they are
cumbersome to adapt to varying circumstances to answer “what-if ” questions. Influence diagrams offer
a way to generalize FTA to add flexibility that makes these types of situations easier to address; e.g.
multiple mitigations may be added as parameters to a single model and then the results of all scenarios
(sets of mitigations) of interest can be calculated simultaneously. Thus, expeditious, informed safety
decisions are easier to make; for example, determining what mitigation(s) one must implement to keep
the mishap probability over the exposure interval below a certain level. We present a case study where a
fault tree was generalized using an influence diagram and show how more comprehensive information
can be obtained which supports informed program-wide decision making.
47
About the ISSS
The International System Safety Society is a non-profit organization of professionals dedicated to the
safety of systems, products and services through the effective implementation of the system safety
concept. Under this concept, appropriate technical and managerial skills are applied so that a systematic,
forward-looking hazard identification and control function becomes an integral part of a project,
program or activity at the planning phase and continues through the design, production, testing, use and
disposal phases.
The Society’s Objectives
•
•
•
•
To advance the art and science of system safety
To promote a meaningful management and technological understanding of system safety
To disseminate advances in knowledge to all interested groups and individuals
To further the development of the professionals engaged in system safety
• To improve public understanding of the system safety discipline
• To improve the communication of system safety principles to all levels of management, engineering
and other professional groups
International System Safety Society, Inc. P.O. Box 70, Unionville, VA 22567-0070
www.system-safety.org, email: systemsafety@system-safety.org
Points of Contact
Officers
Directors
Robert Schmedake
President
robert.a.schmedake@boeing.com
Gerry Einarsson
Chapter Services
einargk@rogers.com
Lynece Pfledderer
Conferences
lynece.pfledderer@lmco.com
Dr. Chuck Muniak
Education & Professional
Development
cmuniak@stevens.edu
Dr. Rod Simmons
Executive Vice President
rod.simmons@me.com
Dr. Matt Johnson
Executive Secretary
mdjohnson76@acm.org
Pam Kniess
Treasurer
pamkniess@gmail.com
Gary Braman
Immediate Past President
gbraman@sikorsky.com
48
Steve Mattern
Mentoring, R&D
smattern@bastiontechnologies.com
Robert Fletcher
International Development
rwfletcher@sympatico.ca
Melissa Emery
Member Services
memery@apt-research.com
Debbie Hale
Gov. & Intersociety
Hale0324@hotmail.com
Saralyn Dwyer
Publicity & Media
sdwyer@apt-research.com
Bay Area
Graham Murray
408 756 2674
Graham.t.murray@lmco.com
Tennessee Valley
Ken Rose
256 842 3246
ken@isss-tvc.org
Central California
Kathleen Brenna
805 606 2308
Kathleen.Brenna.1@us.af.mil
Twin Cities
Bill Blake
763 744 5086; 763 245 0165
Bill.blake@atk.com
Georgia
Odell Ferrell
770 494 4814
Odell.ferrell@lmco.com
Virtual
Doanna Weissgerber
408 289 4407
Doanna.Weissgerber@baesystems.com
Houston
Derek Robins
281 820 8828
Derek.Robins@mwcc-usa.com
Washington DC
Sean Peters
540 663 7369
Sean.peters@urs.com
New Mexico
William (Bill) Harwood
505 853 4595
William.harwood@mda.mil
Australian
Dr. Holger Becht
+61 (0)7 3102 9742
Holger.becht@rgbassurance.com.au
Northeast
Scott Beecher
860 565 7022
Scott.Beecher@PW.utc.com
Canada
Maury Hill
613 220 0533
Mauryhill@rogers.com
North Texas
Frank Rinaldo
817 762 3075
Frank.r.rinaldo@lmco.com
Singapore
Lin Mei Ten
65-63081006
tlinmei@dso.org.sg
ISSTS 2014 Program
Chapters
Saguaro
Amanda Boysun
520 794 5487
Amanda.Boysun@raytheon.com
Sierra High Desert
Jerry Banister
760 377 4690
Safety.citadel@earthlink.net
Southern California
Francis McDougall
310 653 1309
Francis.mcdougall@us.af.mil
49
Special Functions
Saturday
ISSS Executive Council Meeting
13:00 - 17:00
Frisco/Burlington
Sunday
ISSS Executive Council Meeting
8:00 - 17:00
Frisco/Burlington
Monday
Speakers’ Breakfast
6:30 - 8:00
Gothic Corridor
Spousal Information Meeting
9:00 – 10:00
Frisco/Burlington
Luncheon & Opening Ceremony
11:30 – 13:30
Grand F
Keynote Speaker: Carl A. Avila, Director, Advanced
Programs, Boeing Phantom Works
General Assembly Address
13:30 – 14:20
Grand F
Speaker: Bob Schmedake, Society President
Pioneer Panel
14:30 – 16:30
Regency C
Tuesday
Speakers’ Breakfast
6:30 - 8:00
Gothic Corridor
Sponsor & Exhibitor Luncheon
11:30 – 13:20
Grand F
Speaker: Tom Pfitzer
President, A-P-T Research, Inc.
50
Sponsor & Exhibitor Social
18:00 - 21:00
Grand D/E/F
Wednesday
Speakers’ Breakfast
6:30 - 8:00
Gothic Corridor
International Luncheon
11:30 - 13:20
Grand F
Speaker: Gabriele Schedl, Director of
Safety Management at Frequentis
Off-Site Social Event
17:00 – 22:00
Event buses leave between 17:00 & 17:30 and
will return between 21:00 & 22:00
Thursday
Speakers’ Breakfast
6:30 - 8:00
Gothic Corridor
Awards Luncheon
11:30 - 13:20
Grand F
Speaker: Alexander Garza, MD, MPH
Associate Dean at St. Louis University
Friday
Speakers’ Breakfast
6:30 - 8:00
Gothic Corridor
Best Papers Presentation
8:00 - 10:00
Regency C
ISSTS 2014 Program
Notes
51
Notes
52
Program
ISSTS2014
Thank you Sponsors & Exhibitors!
Corporate Sponsor
Advertisement Page
Booth Location
The Boeing Company. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Sponsors
A-P-T Research, Inc. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Isograph. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Lockheed Martin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Controls and Data Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Sikorsky. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Exhibitors
Columbia Southern University. . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Electric Power Research Institute . . . . . . . . . . . . . . . . . . . . . . . . 28 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Item Software. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
University of Maryland . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
9
4
6
5
ISSC. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Grand Ballroom D
1
2
3
4
5
6
Dining Tables
Dining Tables
7
8
9
10
11
12
Grand Ballroom E
International System Safety Society • P.O. Box 70, Unionville, VA 22567-0070 USA • www.system-safety.org
Designed and published by
A-P-T Research, Inc. Publications.
Download