A theoretical perspective of man-made system disasters: Social-technical analysis and design

Purpose – The purpose of this paper is to study major man‐made system disasters and to suggest a solution for filling the noted gaps in control systems interfaces and to render those vital considerations for the next‐generation disaster management control systems.Design/methodology/approach – This research analyzes the nature of large‐scale disasters and observes that most man‐made system disasters are composed of many related events that interact with one another.Findings – The findings show evidence of a common path to catastrophe. These functional failures resulted from the information gaps that eventually contribute to the development of a tragedy. Because of the intricate interconnections among related events of a developed calamity, an integrated approach to man‐made disaster detection and prevention as well as emergency management is required.Practical implications – Conducting an analysis of the typical contingency control structures, the authors suggest that disaster or emergency managers adopt a...

[1]  John W. Sutherland,et al.  Assessing the Artificial Intelligence Contribution to Decision Technology , 1986, IEEE Transactions on Systems, Man, and Cybernetics.

[2]  Anil Kumar,et al.  Information requirements of a global EIS: An exploratory macro assessment , 1996, Decis. Support Syst..

[3]  Conrad Smith,et al.  Media and Apocalypse: News Coverage of the Yellowstone Forest Fires, Exxon Valdez Oil Spill, and Loma Prieta Earthquake , 1992 .

[4]  Ching-Fang Lin,et al.  Advanced Control Systems Design , 1993 .

[5]  Sumit Ghosh,et al.  Understanding complex, real-world systems through asynchronous, distributed decision-making algorithms , 2001, J. Syst. Softw..

[6]  John W. Sutherland,et al.  A prospective on macrocybernetic process management systems , 1997 .

[7]  D. Norman,et al.  New technology and human error , 1989 .

[8]  Mohammad Jamshidi,et al.  Recent Advances in Computer-Aided Control Systems Engineering , 1992 .

[9]  Kevin Warwick,et al.  Advanced Methods in Adaptive Control for Industrial Application , 1991 .

[10]  C. J. Chesmond Basic Control System Technology , 1990 .

[11]  Samuel J. Biondo Fundamentals of expert systems technology - principles and concepts , 1990 .

[12]  John Durkin,et al.  Expert systems - design and development , 1994 .

[13]  H. Joseph Wen,et al.  Managing manmade system disasters with advanced cybernetics , 1998 .

[14]  Eric T. G. Wang,et al.  Understanding knowledge sharing in virtual communities: An integration of social capital and social cognitive theories , 2006, Decis. Support Syst..

[15]  Jan Marco Leimeister,et al.  Design, Implementation, and Evaluation of Trust-Supporting Components in Virtual Communities for Patients , 2005, J. Manag. Inf. Syst..

[16]  Craig W. Fisher,et al.  Criticality of data quality as exemplified in two disasters , 2001, Inf. Manag..

[17]  Sema E. Alptekin,et al.  Artificial neural networks for robotics coordinate transformation , 1992 .

[18]  Bart Kosko,et al.  Neural networks and fuzzy systems: a dynamical systems approach to machine intelligence , 1991 .

[19]  Keith Fletcher,et al.  The Role of Competitor Information Systems , 1993, Inf. Manag. Comput. Secur..

[20]  Annick Carnino,et al.  Man and risks : technological and human risk prevention , 1990 .

[21]  Scott T. Moore The study of disasters , 2001 .

[22]  W. Rugh Linear System Theory , 1992 .

[23]  Eric N. Berkowitz Keeping Tabs on the Competition , 2004 .

[24]  André Brink,et al.  States of Emergency , 1988 .

[25]  P. Lagadec,et al.  States of Emergency: Technological Failures and Social Destabilization , 1990 .

[26]  InduShobha N. Chengalur-Smith,et al.  Adopting a disaster-management-based contingency model to the problem of ad hoc forecasting: toward information technology-based strategies , 1999 .

[27]  Grady W. Harris Living with Murphy's Law , 1994 .

[28]  Roland Helm,et al.  The need for economic and pre‐economic marketing controlling , 1995 .

[29]  H. Joseph Wen,et al.  Computer-Based Monitoring in the American Workplace: Surveillance Technologies and Legal Challenges , 2005 .

[30]  Shu-hsien Liao,et al.  Case-based decision support system: Architecture for simulating military command and control , 2000, Eur. J. Oper. Res..

[31]  A. Sherlock,et al.  Biological analogies in manufacturing , 2000 .

[32]  Donald E. Geis,et al.  By Design: The Disaster Resistant and Quality-of-Life Community , 2000 .

[33]  L. Comfort,et al.  Reframing disaster policy: the global evolution of vulnerable communities , 1999 .

[34]  Lisa D. Ordóñez,et al.  Decisions under Time Pressure: How Time Constraint Affects Risky Decision Making , 1997 .

[35]  Kaoru Hirota,et al.  Industrial Applications of Fuzzy Technology , 1993, Springer Japan.

[36]  Jack Fischel The Road to September 11 , 2002 .

[37]  G. E. Zorpette Making intelligence smarter , 2002 .

[38]  Jörn-Axel Meyer,et al.  The acceptance of visual information in management , 1997, Inf. Manag..

[39]  Lynne Masel Walters,et al.  Bad tidings : communication and catastrophe , 1989 .

[40]  Panos J. Antsaklis,et al.  An introduction to intelligent and autonomous control , 1993 .

[41]  Achim Ilchmann,et al.  Non-Identifier-Based High-Gain Adaptive Control , 1993 .

[42]  J P Herring Senior management must champion business intelligence programs. , 1991, The Journal of business strategy.

[43]  Lee Wilkins Shared vulnerability : The media and American perceptions of the Bhopal disaster , 1987 .

[44]  Reid G. Smith,et al.  Fundamentals of expert systems , 1988 .

[45]  Richard S. Lewis Challenger: The Final Voyage , 1988 .

[46]  Malcolm McConnell,et al.  Challenger: A Major Malfunction , 1987 .

[47]  David R. Marples social impact of the Chernobyl disaster , 1989 .