Vertical and horizontal alignment within organizations are seen as prerequisites for meeting strategic objectives and indications of effective management. In the area of safety management, the concept of vertical alignment has been followed through the introduction of hierarchical structures and bidirectional communication, but horizontal alignment has been given little attention. The principal goal of this study was the assessment of horizontal alignment within an aviation organization with the use of data from safety investigations, audits and meetings in order to explore the extent to which (1) causal factors recorded in safety investigation reports comprised topics discussed by safety committees and focus areas of internal safety auditors, and (2) the agendas of safety committees include weak points revealed during safety audits. The study employed qualitative and quantitative analysis of data collected over a 6 years’ period at three organizational levels. The results suggested a low horizontal alignment across the three pairs of the corresponding safety management activities within each organizational level. The findings were attributed to the inadequacy of procedures and lack of a safety information database for consistently sharing safety information, cultural factors and lack of planning for the coordination of safety management activities. The current research comprises a contribution to the literature and practice and introduces a technique to assess the intra-alignment of safety management initiatives within various organizational levels. Future research is needed in order to investigate the association between horizontal alignment of safety management practices and safety performance.
Literature and industry standards do not mention inclusive guidelines to generate safety recommendations. Following a literature review, we suggest nine design criteria as well as the classification of safety recommendations according to their scope (i.e. organisational context, stakeholders addressed and degree of change) and their focus, the latter corresponding to the type of risk barrier introduced. The design and classification criteria were applied to 625 recommendations published by four aviation investigation agencies. The analysis results suggested sufficient implementation of most of the design criteria. Concerning their scope, the findings showed an emphasis on processes and structures (i.e. lower organisational contexts), adaptations that correspond to medium degree of changes, and local stakeholders. Regarding the focus of the recommendations, non-technical barriers that rely mostly on employees’ interpretation were introduced by the vast majority of safety recommendations. Also, statistically significant differences were detected across investigation authorities and time periods. This study demonstrated how the application of the suggested design and classification frameworks could reveal valuable information about the quality, scope and focus of recommendations. Especially the design criteria could function as a starting point towards the introduction of a common standard to be used at local, national and international levels.
This dissertation describes a research project about the communication between communication vulnerable people and health care professionals in long-term care settings. Communication vulnerable people experience functional communication difficulties in particular situations, due to medical conditions. They experience difficulties expressing themselves or understanding professionals, and/or professionals experience difficulties understanding these clients. Dialogue conversations between clients and professionals in healthcare, which for example concern health-related goals, activity and participation choices, diagnostics, treatment options, and treatment evaluation, are, however, crucial for successful client-centred care and shared decision making. Dialogue conversations facilitate essential exchanges between clients and healthcare professionals, and both clients and professionals should play a significant role in the conversation. It is unknown how communication vulnerable people and their healthcare professionals experience dialogue conversations and what can be done to support successful communication in these conversations. The aim of this research is to explore how communication vulnerable clients and professionals experience their communication in dialogue conversations in long-term care and how they can best be supported in improving their communication in these conversations.
The integration of renewable energy resources, controllable devices and energy storage into electricity distribution grids requires Decentralized Energy Management to ensure a stable distribution process. This demands the full integration of information and communication technology into the control of distribution grids. Supervisory Control and Data Acquisition (SCADA) is used to communicate measurements and commands between individual components and the control server. In the future this control is especially needed at medium voltage and probably also at the low voltage. This leads to an increased connectivity and thereby makes the system more vulnerable to cyber-attacks. According to the research agenda NCSRA III, the energy domain is becoming a prime target for cyber-attacks, e.g., abusing control protocol vulnerabilities. Detection of such attacks in SCADA networks is challenging when only relying on existing network Intrusion Detection Systems (IDSs). Although these systems were designed specifically for SCADA, they do not necessarily detect malicious control commands sent in legitimate format. However, analyzing each command in the context of the physical system has the potential to reveal certain inconsistencies. We propose to use dedicated intrusion detection mechanisms, which are fundamentally different from existing techniques used in the Internet. Up to now distribution grids are monitored and controlled centrally, whereby measurements are taken at field stations and send to the control room, which then issues commands back to actuators. In future smart grids, communication with and remote control of field stations is required. Attackers, who gain access to the corresponding communication links to substations can intercept and even exchange commands, which would not be detected by central security mechanisms. We argue that centralized SCADA systems should be enhanced by a distributed intrusion-detection approach to meet the new security challenges. Recently, as a first step a process-aware monitoring approach has been proposed as an additional layer that can be applied directly at Remote Terminal Units (RTUs). However, this allows purely local consistency checks. Instead, we propose a distributed and integrated approach for process-aware monitoring, which includes knowledge about the grid topology and measurements from neighboring RTUs to detect malicious incoming commands. The proposed approach requires a near real-time model of the relevant physical process, direct and secure communication between adjacent RTUs, and synchronized sensor measurements in trustable real-time, labeled with accurate global time-stamps. We investigate, to which extend the grid topology can be integrated into the IDS, while maintaining near real-time performance. Based on topology information and efficient solving of power flow equation we aim to detect e.g. non-consistent voltage drops or the occurrence of over/under-voltage and -current. By this, centrally requested switching commands and transformer tap change commands can be checked on consistency and safety based on the current state of the physical system. The developed concepts are not only relevant to increase the security of the distribution grids but are also crucial to deal with future developments like e.g. the safe integration of microgrids in the distribution networks or the operation of decentralized heat or biogas networks.
Brandweermensen lopen het meeste gevaar als ze onder tijdsdruk een gebouw moeten verkennen, of een brand moeten blussen terwijl de situatie nog niet goed kan worden overzien. Omvallende muren, instortende plafonds of gewoon gestruikeld over door de rook onzichtbare brokstukken leiden tot vermijdbare letsels of zelfs slachtoffers. Met name de inzet bij branden in stedelijke parkeergarages onder woontorens vormen een enorm risico. Het inzetten van onbemande, op afstand bestuurbare voertuigen voor verkenning en bluswerk is een oplossing die binnen de brandweer breed wordt gedragen. De brandweer moet deze innovatieve technologie echter zien te omarmen. Zij werken nu vanuit hun intuïtie en weten direct hoe te acteren op basis van wat zij waarnemen. Praktijkgericht onderzoek heeft echter uitgewezen dat scepsis over de inzet van blusplatforms bij incidenten plaats heeft gemaakt voor zeker vertrouwen. Een blusplatform, voorzien van juiste sensoren kan de Officier van Dienst (OVD) ondersteunen bij het nemen van een beslissing om al dan niet tot een ‘aanval’ over te gaan. Praktijktesten hebben echter laten zien dat de huidige blusplatforms nog niet optimaal functioneren om als volwaardig ‘teamlid’ te kunnen worden ingezet. Dit heeft enerzijds met technologische ontwikkelingen (sensoren en communicatieverbindingen) te maken, maar anderzijds moet de informatievoorziening (human-machine interfacing) naar de brandweer beter worden afgestemd. In dit project gaan Saxion, het instituut fysieke veiligheid, de universiteit Twente, het bedrijfsleven en vijf veiligheidsregio’s onderzoeken hoe en wanneer innovatieve blusplatforms op een intuïtieve manier kunnen worden ingezet door training én (kleine) productaanpassing zodat deze een volwaardig onderdeel kunnen zijn van het brandweerkorps. Een blusplatform kan letselschade en slachtoffers voorkomen, mits goed ingezet en vertrouwd door de mensen die daarvan afhankelijk zijn. Het vak van brandweer, als beroeps of vrijwilliger, is een van de gevaarlijkste die er is. Laten we er samen voor zorgen dat het iets veiliger kan worden.
The goal of UPIN is to develop and evaluate a scalable distributed system that enables users to cryptographically verify and easily control the paths through which their data travels through an inter-domain network like the Internet, both in terms of router-to-router hops as well as in terms of router attributes (e.g., their location, operator, security level, and manufacturer). UPIN will thus provide the solution to a very relevant and current problem, namely that it is becoming increasingly opaque for users on the Internet who processes their data (e.g., in terms of service providers their data passes through as well as what jurisdictions apply) and that they have no control over how it is being routed. This is a risk for people’s privacy (e.g., a malicious network compromising a user’s data) as well as for their safety (e.g., an untrusted network disrupting a remote surgery). Motivating examples in which (sensitive) user data typically travels across the Internet without user awareness or control are: - Internet of Things for consumers: sensors such as sleep trackers and light switches that collect information about a user’s physical environment and send it across the Internet to remote services for analysis. - Medical records: health care providers requiring medical information (e.g., health records of patients or remote surgery telemetry) to travel between medical institutions according to specified agreements. - Intelligent transport systems: communication plays a crucial role in future autonomous transportation systems, for instance to avoid freight drones colliding or to ensure smooth passing of trucks through busy urban areas. The UPIN project is novel in three ways: 1. UPIN gives users the ability to control and verify the path that their data takes through the network all the way to the destination endpoint, both in terms of hops and attributes of routers traversed. UPIN accomplishes this by adding and improving remote attestation techniques for on-path routers to existing path verification mechanisms, and by adopting and further developing in-packet path selection directives for control. 2. We develop and simulate data and control plane protocols and router extensions to include the UPIN system in inter-domain networking systems such as IP (e.g., using BGP and segment routing) and emerging systems such as SCION and RINA. 3. We evaluate the scalability and performance of the UPIN system using a multi-site testbed of open programmable P4 routers, which is necessary because UPIN requires novel packet processing functions in the data plane. We validate the system using the earlier motivating examples as use cases. The impact we target is: - Increased trust from users (individuals and organizations) in network services because they are able to verify how their data travels through the network to the destination endpoint and because the UPIN APIs enable novel applications that use these network functions. - More empowered users because they are able to control how their data travels through inter-domain networks, which increases self-determination, both at the level of individual users as well as at the societal level.