Black box incident management

May 2016 Editor's Choice, Surveillance

The introduction of what is commonly referred to as a ‘black box’ marked an important milestone in aviation history. The black box or to use the more precise term flight data recorder (FDR), is used to preserve a flight’s recent history by collecting multiple parameters several times per second. The FDR, combined with the cockpit voice recorder (CVR), which captures the audio including pilot conversations, provide an accurate testimony of a flight’s history, and assists in any further investigation.

Udi Segall, director of business development, Qognify.
Udi Segall, director of business development, Qognify.

A painful lesson that has been learned during investigations of aviation accidents and incidents. In order to accurately compose the sequence of events that led to an incident, it is critical to capture all flight data parameters together with the pilots’ conversations. In other words to gain insight from past events it is critical to examine the data parameters of various systems as well as human conduct.

This theme is very much aligned with the findings of the Abnormal Situation Management (ASM) consortium that argues that there are three principal types of sources or causes of abnormal situations:

• People and work context factors.

• Equipment and technology factors.

• Process factors.

Figure 1. Flight recorder aka black box (no longer black, but orange).
Figure 1. Flight recorder aka black box (no longer black, but orange).

How is that relevant to incident management solutions?

Continuous improvement enabled through process excellence and a culture of high performance are key attributes for organisations wishing to maintain a leadership position in today’s markets. To this end, incident management solutions should provide tools that analyse an incident’s complete data, as shown in Figure 2.

Mining an organisation’s incident performance data allows organisations to detect inefficiencies in processes and/or SOP (standard operating procedures). It can also identify sub-par performance of both individuals and teams relative to an organisation’s benchmarks, and discover anomalies in system performance as reported by IoT (Internet of Things) sensors.

Figure 2: Incident data breakdown.
Figure 2: Incident data breakdown.

Conducting an analysis with methodologies that have been proven to provide continuous improvement, such as Six Sigma, is critical for organisations that want to create and maintain an adaptive culture.

Black boxes have played an invaluable role in improving aviation safety by dramatically reducing the volume and magnitude of incidents and accidents. Today’s incident management solutions should capture all incident data to provide organisations visibility into how incidents have unfolded. In addition, with the right analytical tools, they should allow them to extract valuable insights that can transform the way these organisations work. In the same way that that black box has transformed the aviation industry.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Pentagon appointed as Milestone distributor
Elvey Security Technologies News & Events Surveillance
Milestone Systems appointed Pentagon Distribution (an Elvey Group company within the Hudaco Group of Companies) as a distributor. XProtect’s open architecture means no lock-in and the ability to customise the connected video solution that will accomplish the job.

Read more...
Re-imagining business operations with the power of AI
AI & Data Analytics Surveillance
inq., a Convergence Partners company, has introduced a range of artificial intelligence (AI) solutions to assist organisations across industry verticals in optimising business operations and improving internal efficiencies.

Read more...
Enhance control rooms with surveillance and intelligence
Leaderware Editor's Choice Surveillance Mining (Industry)
Dr Craig Donald advocates the use of intelligence and smart surveillance to assist control rooms in dealing with the challenges of the size and dispersed nature common in all mining environments.

Read more...
A long career in mining security
Technews Publishing Editor's Choice Mining (Industry) Risk Management & Resilience
Nash Lutchman recently retired from a security and law enforcement career, initially as a police officer, and for the past 16 years as a leader of risk and security operations in the mining industry.

Read more...
A constant armed struggle
Technews Publishing XtraVision Editor's Choice Integrated Solutions Mining (Industry) IoT & Automation
SMART Security Solutions asked a few people involved in servicing mines to join us for a virtual round table and give us their insights into mine security today. A podcast of the discussion will be released shortly-stay tuned.

Read more...
Risk management: There's an app for that
Editor's Choice News & Events Risk Management & Resilience
Zulu Consulting has streamlined the corporate risk management process with the launch of Risk-IO, a web-based app designed to consolidate and guide risk managers through the process, monitoring progress as one proceeds.

Read more...
Integrated information platform for risk management
Editor's Choice News & Events Risk Management & Resilience
Online Intelligence recently launched version 7 of its CiiMS risk and security platform. Speaking to SMART Security Solutions after the launch event, the company’s Arnold van den Bout described the enhancements in version 7.

Read more...
Unlocking Africa's AI potential
Editor's Choice News & Events AI & Data Analytics
Africa's AI market is set to grow exponentially; by investing in AI education, training, and ethical practices, African nations can harness the power of AI to transform the continent and create a brighter future for its people.

Read more...
The CIPC hack has potentially serious consequences
Editor's Choice Information Security
A cyber breach at the South African Companies and Intellectual Property Commission (CIPC) has put millions of companies at risk. The organisation holds a vast database of registration details, including sensitive data like ID numbers, addresses, and contact information.

Read more...
Global Identity Fraud Report revealing eight-month ‘mega-attack’
Editor's Choice Risk Management & Resilience
AU10TIX recently released its Q4 Global Identity Fraud Report, with the research identifying two never-before-seen attack patterns, with the worst case involving 22 000+ AI-generated variations of a single U.S. passport.

Read more...