Schweitzer Fachinformationen
Wenn es um professionelles Wissen geht, ist Schweitzer Fachinformationen wegweisend. Kunden aus Recht und Beratung sowie Unternehmen, öffentliche Verwaltungen und Bibliotheken erhalten komplette Lösungen zum Beschaffen, Verwalten und Nutzen von digitalen und gedruckten Medien.
While the methods, studies or standardization commonly used to manage risks have been quite effective, it is undeniable that through the history of accidents and disasters, their effectiveness is still not entirely satisfactory.
In order to fully understand cindynics, it seems useful to examine what its concepts can add to postponing the occurrence of feared events.
Indeed, any risk study currently conducted starts with the knowledge of the dangers existing within the situation under examination. This phase, which is the keystone of a risk study approach, is called the "hazard study".
Let us recall that the method most often used for risk studies is the one called MADS-MOSAR which involves:
The use of the MADS model makes clear the priority given to the search for hazards1: it uses "systemic modeling by breaking down the installation into sub-systems and systematically searching for the hazards presented by each of them".
This model is used to establish a hazard qualification grid. 7
Concepts linked to cindynics are therefore perfectly aligned with the principle of thinking about danger before paying attention to the risks and the initiating event. However, the hazard research carried out by MADS is limited to the exploration of a table of hazards of technical origin2. And while these have been brought to our attention, it is because they have been described and catalogued, because they are perceptible. It is therefore on this level that cindynics concepts differ and bring about very great originality, because the dangers or sources of risks are certainly of technical origin, but they are also organizational, cultural or managerial (see section 1.1).
Cindynics therefore meets the need for in-depth research into complementary sources of risk, either difficult to identify or coming from pathogenic elements which, if they do not attract attention, can unknowingly weaken an organization's ability to resist hazards (see the term "organization" in the Glossary)3. Recalling the importance of focusing on sources of risk that are difficult to perceive, [DEL 20] notes: "the two-week fall in the Dow Jones and the CAC 40 gives credence to the famous black swan theory, developed by the statistician Nassim Nicholas Taleb, according to which the greatest financial catastrophes are triggered by seemingly minor events whose rarity is such that it makes them unpredictable for market operators".
The ISO 31000:2018 standard states that the success of risk management depends on the effectiveness of an organization's management framework integrating the understanding of the organization and its context, the establishment of risk management policy, responsibilities and so on, in order to lead to a risk management process.
It further states that:
However, while the cindynics approach is completely in line with the prescriptions of the ISO 31000:2018 standard, it obligatorily precedes the risk assessment phase by the study of an assessment phase of all types of hazards (or sources of risk).
A "risk mapping" tool is commonly used in risk management in order to create and share a risk frame of reference.
Cindynics tools also use a frame of reference which concerns sharing through a process that is in line with the recommendations of the ISO 31000:2018 standard but whose purpose is to highlight the hazards through matrices of deficits and dissonances.
NOTE.- In the remainder of this book and to comply with the ISO 31000:2018 standard, the term "risk source" will be used instead of "hazard".
Then, to become fully aware of the originality of cindynics involves discovering that its concepts incorporate a method, tools and processes that are adapted to the complexity of systems, as well as an approach to the study of risk sources adapted to the complexity of systems.
During its life, any organization receives many internal or external requests (desired development, opportunities, imposed constraints, changes in objectives, realization of new projects, reactivation of a process, changes in regulatory markets, staff turnover, sociological changes, etc). As a result, any organization modifies itself voluntarily or not with time through these solicitations called transformation operators.
These inescapable developments, whether desired or endured, generate as many potential weaknesses as strengths (physical, organizational and psychological).
The cindynics approach therefore primarily monitors the fragility of collective activity situations, that is, the emergence of dangerous zones (see section 2.3.1) within an organization, thus weakening its capacity for resilience. These fragilities, due to the transformation operators, lead to deviations from a nominal or desired organization (state of the art, regulations, standards, charters, procedures, data and culture). The tensions generated by these gaps become risk sources that can lead to incidents, accidents or disasters.
This approach is therefore similar to that of physiopathology, a discipline that deals with disturbances in the normal mode of functioning of the constituent elements of a living organism.
All of the originality of cindynics lies in this ability to detect these sources of particular risks produced by these imbalances. And if, in doing so, potential forces are detected, it would be a pity not to take advantage of them.
When it comes to analyzing technical risks (which are describable), the methods and tools of dependability are perfectly suitable.
On the contrary, other categories of risk sources, more related to human, organizational, managerial, cultural and environmental aspects, being more difficult to identify, receive much less attention in order to be identified and described. As a result, cindynics, by placing the human and the organization at the heart of the complexity of organizations, focuses first on these categories of risk sources and then uses the MADS-MOSAR method to deal with technical risks.
Thus, the notion of an activity situation has become the founding concept of cindynics because it obliges us to define what is necessary to talk about when approaching a hazard study. The terms "situation" and "activity" still need to be defined:
This is, indeed, the meaning given to the activity situation which integrates notions of history, geographical space, actors and movement, and therefore dynamism and development.
Based on the fundamental concept, namely the activity situation, the resulting cindynics method is based on two notions as follows:
Consequently, in order to succeed in describing the unobservable elements, cindynics adopts a method of description known as the "method of relativized conceptualization (MRC)" [MUG 77] proposed by Mioara Mugur Schätcher, a specialist in quantum physics. This method, born from the inability of physicists to observe - by means of measuring instruments, even very sophisticated ones - the invisible phenomena existing within matter, is based on a new process of constructing knowledge of the unobservable.
Through repeated observations, descriptions of the impalpable or unobservable are obtained by producing more or less objective images called "aspects" to ensure qualification.
The multiplication of qualifications carried out by observations in arbitrarily large quantities leads to a...
Dateiformat: ePUBKopierschutz: Adobe-DRM (Digital Rights Management)
Systemvoraussetzungen:
Das Dateiformat ePUB ist sehr gut für Romane und Sachbücher geeignet – also für „fließenden” Text ohne komplexes Layout. Bei E-Readern oder Smartphones passt sich der Zeilen- und Seitenumbruch automatisch den kleinen Displays an. Mit Adobe-DRM wird hier ein „harter” Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.Bitte beachten Sie: Wir empfehlen Ihnen unbedingt nach Installation der Lese-Software diese mit Ihrer persönlichen Adobe-ID zu autorisieren!
Weitere Informationen finden Sie in unserer E-Book Hilfe.