The Field Guide to Human Error Investigations

The Field Guide to Human Error Investigations
Author: Sidney Dekker
Publisher: Routledge
Total Pages: 137
Release: 2017-11-01
Genre: Social Science
ISBN: 1351786032

This title was first published in 2002: This field guide assesses two views of human error - the old view, in which human error becomes the cause of an incident or accident, or the new view, in which human error is merely a symptom of deeper trouble within the system. The two parts of this guide concentrate on each view, leading towards an appreciation of the new view, in which human error is the starting point of an investigation, rather than its conclusion. The second part of this guide focuses on the circumstances which unfold around people, which causes their assessments and actions to change accordingly. It shows how to "reverse engineer" human error, which, like any other componant, needs to be put back together in a mishap investigation.

Cockpit Resource Management

Cockpit Resource Management
Author: Earl L. Wiener
Publisher: Gulf Professional Publishing
Total Pages: 715
Release: 1995-11-17
Genre: Psychology
ISBN: 012750026X

Cockpit Resource Management (CRM) has gained increased attention from the airline industry in recent years due to the growing number of accidents and near misses in airline traffic. This book, authored by the first generation of CRM experts, is the first comprehensive work on CRM. Cockpit Resource Management is a far-reaching discussion of crew coordination, communication, and resources from both within and without the cockpit. A valuable resource for commercialand military airline training curriculum, the book is also a valuable reference for business professionals who are interested in effective communication among interactive personnel. Key Features * Discusses international and cultural aspects of CRM * Examines the design and implementation of Line-Oriented Flight Training (LOFT) * Explains CRM, LOFT, and cockpit automation * Provides a case history of CRM training which improved flight safety for a major airline

Commercial Aviation Safety, Sixth Edition

Commercial Aviation Safety, Sixth Edition
Author: Stephen K. Cusick
Publisher: McGraw Hill Professional
Total Pages: 561
Release: 2017-05-12
Genre: Transportation
ISBN: 125964183X

Up-To-Date Coverage of Every Aspect of Commercial Aviation Safety Completely revised edition to fully align with current U.S. and international regulations, this hands-on resource clearly explains the principles and practices of commercial aviation safety—from accident investigations to Safety Management Systems. Commercial Aviation Safety, Sixth Edition, delivers authoritative information on today's risk management on the ground and in the air. The book offers the latest procedures, flight technologies, and accident statistics. You will learn about new and evolving challenges, such as lasers, drones (unmanned aerial vehicles), cyberattacks, aircraft icing, and software bugs. Chapter outlines, review questions, and real-world incident examples are featured throughout. Coverage includes: • ICAO, FAA, EPA, TSA, and OSHA regulations • NTSB and ICAO accident investigation processes • Recording and reporting of safety data • U.S. and international aviation accident statistics • Accident causation models • The Human Factors Analysis and Classification System (HFACS) • Crew Resource Management (CRM) and Threat and Error Management (TEM) • Aviation Safety Reporting System (ASRS) and Flight Data Monitoring (FDM) • Aircraft and air traffic control technologies and safety systems • Airport safety, including runway incursions • Aviation security, including the threats of intentional harm and terrorism • International and U.S. Aviation Safety Management Systems

Crew Resource Management

Crew Resource Management
Author: Barbara G. Kanki
Publisher: Academic Press
Total Pages: 665
Release: 2019-01-31
Genre: Psychology
ISBN: 0128129964

The new edition of Crew Resource Management reflects advancements made in the conceptual foundation as well as the methods and approaches of applying CRM in the aviation industry. Because CRM training has the practical goal of enhancing flight safety through more effective flight crew performance, this new edition adapts itself to fit the users, the task, and operational and regulatory environments--all of which continually evolve. Each contributor examines techniques and presents cases that best illustrate CRM concepts and training. This book discusses the history and research foundation of CRM and also stresses the importance of making adaptive changes and advancements. New chapters include: CRM and Individual Resilience; Flight and Cabin Crew Teamwork: Improving Safety in Aviation: CRM and Risk Management/Safety Management Systems; and MRM for Technical Operations. This book provides a deep understanding of CRM--what it is, how it works, and how to practically implement an effective program. - Addresses the expanded operating environment--pilots, flight attendants, maintenance, etc. - Assists developers and practitioners in building effective programs - Describes best practices and tools for supporting CRM training in individual organizations - Highlights new advances and approaches to CRM - Includes five completely new chapters

Blue Threat

Blue Threat
Author: Tony Kern
Publisher:
Total Pages: 256
Release: 2009-09
Genre: Attention
ISBN: 9780984206308

A Flight Attendant's Essential Guide

A Flight Attendant's Essential Guide
Author: Colin C. Law
Publisher: BrownWalker Press
Total Pages: 502
Release: 2019-08-15
Genre: Transportation
ISBN: 1627347283

A Flight Attendant's Essential Guide is written for airline executives, university lecturers who specialize in the airline industry, and for undergraduate students preparing for a career as a flight attendant. Those working in passenger, aircraft, airport as well as general communications at an airport or aircraft can benefit from this book though a thorough understanding the responsibilities of flight attendants. This textbook primarily focuses on the passenger aspect of in-flight service, including operations and communication skills, and how flight attendants interact with passengers at each phase of a flight.

Comprehensive School Threat Assessment Guidelines

Comprehensive School Threat Assessment Guidelines
Author: Dewey Cornell
Publisher:
Total Pages:
Release: 2018-11
Genre:
ISBN: 9780692192108

A manual for school threat assessment as a violence prevention strategy. This book is a sequel to Guidelines for Responding to Student Threats of Violence.

An Applied Guide to Research Designs

An Applied Guide to Research Designs
Author: W. Alex Edmonds
Publisher: SAGE Publications
Total Pages: 311
Release: 2016-04-20
Genre: Social Science
ISBN: 1483317285

The Second Edition of An Applied Guide to Research Designs offers researchers in the social and behavioral sciences guidance for selecting the most appropriate research design to apply in their study. Using consistent terminology, the authors visually present a range of research designs used in quantitative, qualitative, and mixed methods to help readers conceptualize, construct, test, and problem solve in their investigation. The Second Edition features revamped and expanded coverage of research designs, new real-world examples and references, a new chapter on action research, and updated ancillaries.

Handbook of Terror Management Theory

Handbook of Terror Management Theory
Author: Clay Routledge
Publisher: Academic Press
Total Pages: 652
Release: 2018-11-13
Genre: Psychology
ISBN: 0128118458

Handbook of Terror Management Theory provides an overview of Terror Management Theory (TMT), including critical research derived from the theory, recent research that has expanded and refined the theory, and the many ways the theory has been utilized to understand domains of human social life. The book uses TMT as a lens to help understand human relationships to nature, cultural worldviews, the self, time, the body, attachment, group identification, religion and faith, creativity, personal growth, and the brain. The first section reviews theoretical and methodological issues, the second focuses on basic research showing how TMT enhances our understanding of a wide range of phenomena, and the third section, Applications, uses TMT to solve a variety of real world problems across different disciplines and contexts, including health behavior, aging, psychopathology, terrorism, consumerism, the legal system, art and media, risk-taking, and communication theory. - Examines the three critical hypotheses behind Terror Management Theory (TMT) - Distinguishes proximal and distal responses to death-thoughts - Provides a practical toolbox for conducting TMT research - Covers the Terror Management Health Model - Discusses the neuroscience of fear and anxiety - Identifies how fear motivates consumer behavior - Relates fear of death to psychopathologies

Cybersecurity - Attack and Defense Strategies

Cybersecurity - Attack and Defense Strategies
Author: Yuri Diogenes
Publisher: Packt Publishing Ltd
Total Pages: 368
Release: 2018-01-30
Genre: Computers
ISBN: 178847385X

Key Features Gain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tactics Learn to unique techniques to gather exploitation intelligence, identify risk and demonstrate impact with Red Team and Blue Team strategies A practical guide that will give you hands-on experience to mitigate risks and prevent attackers from infiltrating your system Book DescriptionThe book will start talking about the security posture before moving to Red Team tactics, where you will learn the basic syntax for the Windows and Linux tools that are commonly used to perform the necessary operations. You will also gain hands-on experience of using new Red Team techniques with powerful tools such as python and PowerShell, which will enable you to discover vulnerabilities in your system and how to exploit them. Moving on, you will learn how a system is usually compromised by adversaries, and how they hack user's identity, and the various tools used by the Red Team to find vulnerabilities in a system. In the next section, you will learn about the defense strategies followed by the Blue Team to enhance the overall security of a system. You will also learn about an in-depth strategy to ensure that there are security controls in each network layer, and how you can carry out the recovery process of a compromised system. Finally, you will learn how to create a vulnerability management strategy and the different techniques for manual log analysis.What you will learn Learn the importance of having a solid foundation for your security posture Understand the attack strategy using cyber security kill chain Learn how to enhance your defense strategy by improving your security policies, hardening your network, implementing active sensors, and leveraging threat intelligence Learn how to perform an incident investigation Get an in-depth understanding of the recovery process Understand continuous security monitoring and how to implement a vulnerability management strategy Learn how to perform log analysis to identify suspicious activities Who this book is for This book aims at IT professional who want to venture the IT security domain. IT pentester, Security consultants, and ethical hackers will also find this course useful. Prior knowledge of penetration testing would be beneficial.