In case of break-down Standardization and the vulnerability of technological cultures Anique Hommels Maastricht University.

Slides:



Advertisements
Similar presentations
Museum Presentation Intermuseum Conservation Association.
Advertisements

DS-01 Disaster Risk Reduction and Early Warning Definition
Scoping the Framework Guidelines on Interoperability Rules for European Gas Transmission Geert Van Hauwermeiren Workshop, Ljubljana, 13 Sept 2011.
International Telecommunication Union Accra, Ghana, June 2009 Emergency Communications Systems: Nigeria Bashir Gwandu, PhD, MBA, CEng MIEE, MIEEE.
EMS Checklist (ISO model)
THE ROLE OF CSDs DURING ENVIRONMENTAL CRISIS OR OPERATIONAL DISRUPTION THE ROLE OF CSDs DURING ENVIRONMENTAL CRISIS OR OPERATIONAL DISRUPTION A PRESENTATION.
Thijs LAEVEN, Amsterdam Archiefschool Brussels DLM Forum ‘99 A Dutch experience in digital records education and training innovation and collaboration;
"Safe and Secure Solutions for Smarter Cities" The value of standardization and certification in planning and managing Smart Cities 12/05/2014Euralarm.
1Comprehensive Disaster Risk Management Framework The Role of Local Actors 111 Safer Cities Session 1 World Bank Institute Fouad Bendimerad, Ph.D., P.E.
RAMIRI2 Prague 2012 Project management and the RI Life Cycle.
The EU and Resilience. Core EU Document Document Overview 1.The need to address chronic vulnerability 2.The resilience paradigm 3.The EU’s experience.
Visual 1.1 Course Overview Unit 1: Course Overview.
TETRA Inter System Interface (ISI)
Systems Engineering in a System of Systems Context
Mink Spaans What are the problems that need to be solved What is hard.
Session 2 Definition, Vision and Mission of Emergency Management.
Software Architecture Quality. Outline Importance of assessing software architecture Better predict the quality of the system to be built How to improve.
Understanding Multiagency Coordination IS-701.A – February 2010 Visual 2.1 Unit 2: Understanding Multiagency Coordination.
Research and Innovation Research and Innovation Research and Innovation Research and Innovation Research Infrastructures and Horizon 2020 The EU Framework.
Competing for Advantage
BL6006 RESIT Assessment 2 Details Submission date: 3pm 30 July 2015 Assessment weighting: 30% of the overall mark Marks for this assessment will be awarded.
Emergency Management & Homeland Security Interface Samuel Musa National Defense University.
Crisis Management Planning Employee Health Safety and Security Expertise Panel · Presenter Name · 2008.
Session 5: Political and Legal Issues Catastrophe Readiness and Response Session 5: Political and Legal Issues1.
Public Health Preparedness & Leadership Louis Rowitz, PhD Director Mid-America Regional Public Health Leadership Institute.
Session 16: Distribution of Geospatial Data 1 Distribution of Geospatial Data in the Public Environment Hazard Mapping and Modeling.
Fostering New Ways of Working: New Practices Session 32.
Programming of International Development Assistance Donor Sectoral Meeting Ministry of Interior September 17, 2007.
Logistics and supply chain strategy planning
IST SEWASIE SEWASIE 3rd Review March 14, 2005 SEWASIE Value Proposition and End User Demo Andreas Becks.
Recap and Synthesis of National and Regional Research MK21 Inception workshop for local research projects Yangon, June 2015.
15/07/08 | 1NorMAS’08 ALIVE EU FUNDED PROJECT Norm Dynamics in Adaptive Organisations Huib Aldewereld, Loris Penserini, Frank Dignum, and Virginia Dignum.
Three Country Pilot The way to ISI ”Jeppe” Jepsen Motorola.
Practical Strategies for Urban Adaptation in Asia: the Asian Cities Climate Change Resilience Network Dr. Stephen Tyler ISET Cities and Climate Change:
Quimba Software June 2008 Improvisation as a Training Framework for Emergency Managers Nina Zumel, PhD. Quimba Software Zeno Franco Larry Beutler, PhD.
Systems approaches Chapter 4.
Knowledge Utilization 1.  The 1960s saw the emergence of “knowledge utilization” as a field of study  The study of knowledge utilization emerged because.
1 Guiding Principles for Nationwide Interoperability A Brief Overview of Recent Efforts and Progress.
Legal Aspects Related to Brownfield Regenerations Prof. Maros Finka, M.arch., Ph.D. „This project has been funded with support from the European Commission.
Business Continuity Program Orientation (insert presentation date) (This presentation is a template that requires adjustments to meet your needs)
Coordination and Control The focus is to find the appropriate structure to manage the MNC.
Learning Package 2: Resilient buildings and infrastructure Disaster Resilience in the Built Environment Dr Richard Haigh Resilience Buildings and Infrastructure.
Copyright 2012 Delmar, a part of Cengage Learning. All Rights Reserved. Chapter 9 Improving Quality in Health Care Organizations.
Hazard Identification
Assessing Vulnerability and Adaptation to Climate-related Risks A Flavour of SEI Activities Stockholm Environment Institute Frank Thomalla with contributions.
LORIS Background Disaster management key concept relying on communication Government plans driven by ICT Focus on data transfer Balance between.
Measuring Sustainable development: Achievements and Challenges Enrico Giovannini OECD Chief Statistician June 2005.
Results of the group discussions with elderly on needs of users Results Dutch Telecare Review Business case: update October 2010 ? Overview.
International Recovery Forum 2014 ~ The Role of Private Sector in Disaster Recovery ~ 21 January 2014 Kobe, Japan Dr Janet L. Asherson THE LINK BETWEEN.
The Art of Measuring Nothing
Role of Technical Agencies Responsible for Hazard Assessment, Monitoring, Observations, Data and Analysis Dr. David Green National Oceanic and Atmospheric.
Strategy in Action 12: Strategy Development Processes
WHAT CONTRIBUTES TO THE BUILDING OF RESILIENT COMMUNITIES?: INTEGRATION OF KNOWLEDGE, RISK PERCEPTION, AND AWARENESS OF SOCIAL VULNERABILITY Pamela McMullin-Messier.
Interorganizational Relationships
Interoperability, Interworking, Sharing Risto Toikkanen Beijing November
Roles and Responsibilities FO01 Slide 1. Introduction  Operations – potentially fewer procedures  IATG 12:10  Compliance is strongly recommended 
TETRA Experience – Poland Public Safety Shared Networks Kees Verweij ISC/C2000.
Responsive Innovation for Disaster Mitigation Gordon A. Gow University of Alberta.
CCT 333: Imagining the Audience in a Wired World Class 6: Intro to Research Methods – Qualitative Methods.
1 - 1 Employee Training and Development Introduction: Training for Competitive Advantage.
Building Systems for Today’s Dynamic Networked Environments A Methodology for Building Sustainable Enterprises in Dynamic Environments through knowledge.
Horizon 2020 Secure Societies Disaster-Resilience Workshop 18 Mar /06/2016.
1 Software Requirements Descriptions and specifications of a system.
Community Health Centers of Arkansas Hazard Vulnerability Assessment Workshop August 11, 2017 Mark Fuller.
BSR Risk Management Capability Assessment Methodology
Geert Van Hauwermeiren Workshop, Ljubljana, 13 Sept 2011
and Security Management: ISO 28000
Incident Management & Business Continuity
Building Your Adaptive Leadership Skills
Improvisation and Flexibility
Presentation transcript:

In case of break-down Standardization and the vulnerability of technological cultures Anique Hommels Maastricht University

Overview Perspectives on vulnerability –NAT –HROT –MMD –STS Standardization and vulnerability Case: emergency communication Implications for governance

Vulnerability People, organizations, systems, cultures or places that are susceptible to harm Vulnerability = reduced ability to anticipate, resist, cope with and recover from events that could reduce a system’s functional integrity (Wackers & Kørte)

Perspectives on vulnerability Normal Accidents Theory (Perrow) High Reliability Organisations Theory (LaPorte, Sagan) Man Made Disasters model (Turner, Pidgeon)

Normal Accidents Theory Normal accidents (Perrow, 1984) Organizations act not as rationally as assumed System characteristics: –Loose - Tight coupling –Linear - Complex interactions System characteristics determine vulnerability Critique: too static, tight coupling can change over time (Weick, 1990)

Normal Accidents Theory

High Reliability Organizations Systems that are supposed to be vulnerable, don’t fail that often (LaPorte, Sagan) Positive safety record explained by “high reliability culture in decentralized and continually practiced operations” (Sagan, 1993) Safety can be achieved by organizational measures

Man Made Disasters Focus on “disaster incubation period” “Culture is positioned at the heart of the system vulnerability problem, because of its role in shaping blindness to certain forms of hazard.” (Pigeon, 1997: 5) Interactions between humans and organizational arrangements: prime cause of accidents

STS perspective Three claims: 1.Vulnerability as a characteristic of technological cultures 2.Vulnerability as socially constructed 3.Vulnerability as potentially positive (Bijker, 2006 and ‘work in progress’ Bijker, Hommels, Mesman)

Vulnerability of Technological Cultures We live in a technological culture Vulnerability as a key characteristic of technological cultures Double role of technology: reducing vulnerabilities but also creating new ones

Vulnerability as a social construction Vulnerability is not an inherent characteristic of a system Focus on: –Analyzing vulnerabilities in their context –Negotiating vulnerabilities –Trade-offs between vulnerabilities (e.g. efficiency/safety) –Vulnerability perceptions

Vulnerability as potentially positive Vulnerability can be a necessary condition for survival: “Only when a culture is capable of learning, innovating, and flexibly reacting to external threats, will it be sustainable on the long run.” (Bijker, 2006)

Standardization and vulnerability Dealing with standards, rules and protocols in high-tech organizations Assumption: standardization saves lives Notions as –Practical drift (Snook; Rosness) –Safety drift (Farjoun) –Bricolage (Sanne) –Normalization of deviance (Vaughan) (small deviations from norms and rules become standard behavior) show that it can be risky to deviate from the rules

Standardization and vulnerability Study gaps between standards and local practices Implications for vulnerability? Example: emergency communication

Case study Emergency communication as a critical infrastructure Characterised by both high degree of standardization and the need to improvise in case of emergencies Balance standardization – improvisation Transnational aspect

Emergency collaboration across borders Schengen agreements ETSI developed Tetra standard (1990s): –Dream of a Pan-European system In the end: two standards –Tetra –Tetrapol

Key Nationwide TETRA Regional TETRA Nationwide TETRA under construction Project in progress likely to be TETRA Other technologies No project known European Public Safety Networks

Two cases 1.Before the introduction of the Tetra standard: –The explosion of a fire works storage facility in the Dutch city of Enschede (close to the German border) (2000)

Border region Enschede

Two cases 2.Using the Tetra standard: –The 3 Countries Pilot (Netherlands, Germany, Belgium) (2003)

Border region 3CP

Methodology 20 semi-structured interviews Document analysis –Archival sources (minutes, correspondence) –Reports Enschede disaster –Reports 3CP Interview transcripts Secondary literature vulnerability, improvisation, standardization Comparison (before/after)

Explosion in Enschede May 13, 2000, 22 people died, 950 injured At that time, practices were characterized by: –Use of improvised gateways (Egyedi, 2000) Exchange of equipment Double sets of equipment –Local, short-term arrangements for international radio communication –No communication between dispatch rooms in Germany and NL –Separate radio networks for police, ambulance and fire

Coordination problems Not only technological communication problems Also differences in: –governmental structures and responsibilities –legal arrangements (not allowed to cross borders with light/sound/weapons) –tactics (offensive and defensive fire fighting) –language

Vulnerability issues Vulnerability due to coordination problems Ambiguous role of culture (notion of ‘noaberschap’) “Uncoordinated action is the worst thing that can happen… because you loose control, people take risks, there is no communication, certainly not when they begin spontaneously and use their own communication technologies. So on the one hand you have to be grateful that they come to help you – on the other hand, it is important to coordinate this in a different way.” (chief commander Enschede fire brigade)

3 Countries Pilot Operational Tetra test 2003 Border area Germany, Netherlands, Belgium

Coordination problems Operational differences (sequence of spoken orders) Language differences (English/German/local dialects) Legal differences Technological coordination –Lacking Inter System Interface –Nokia/Motorola

Vulnerability issues 3CP Vulnerability due to coordination problems ánd the problem of concentration of power Dependence on two suppliers (Nokia/Motorola), reluctance to share knowledge

Conclusions Enschede3CP Historical period1980s Type of gatewayImprovisedStandardized Type and scale of collaboration Cross-border/short-termTransnational/ long-term Type of vulnerability test DisasterExperiment Types of vulnerabilityCoordination problemsCoordination problems and power concentration/ dependence

Conclusions (2) Coordination of heterogeneous elements is precondition for reduction of vulnerability Technological interoperability is not sufficient Also in case of standardized gateways, improvisation needed Ambiguous role standardization: –On the one hand: helps to improve coordination –On the other hand: can create new vulnerabilities: dependence on manufacturers/concentration

Governance implications Right balance between standardization and improvisation Criticizing belief that standardization (automatically) saves lives Focus on messiness and drift contradicts (governmental) focus on more detailed standards and rules Reflexivity on trade-offs between different vulnerabilities should improve Discussion about C2000 in the Netherlands (blaming the users)