Cause Analysis Manual: Incident Investigation Method & Techniques

Rothstein Publishing
Free sample

A failure or accident brings your business to a sudden halt. How did it happen? What’s at the root of the problem? What keeps it from happening again? Good detective work is needed -- but how do you go about it? In this new book, industry pioneer Fred Forck’s seven-step cause analysis methodology guides you to the root of the incident, enabling you to act effectively to avoid loss of time, money, productivity, and quality.

From 30+ years of experience as a performance improvement consultant, self-assessment team leader, and trainer, Fred Forck, CPT, understands what you need to get the job done. He leads you through a clear step-by-step process of root cause evaluation, quality improvement, and corrective action. Using these straightforward tools, you can avoid errors, increase reliability, enhance performance, and improve bottom-line results -- while creating a resilient culture that avoids repeat failures. The key phases of this successful cause analysis include:

  • Scoping the Problem
  • Investigating the Factors
  • Reconstructing the Story
  • Establishing Contributing Factors
  • Validating Underlying Factors
  • Planning Corrective Actions
  • Reporting Learnings

At each stage, Cause Analysis Manual: Incident Investigation Method and Techniques gives you a wealth of real-world examples, models, thought-provoking discussion questions, and ready-to-use checklists and forms.

The author provides:

  • references for further reading
  • hundreds of illustrative figures, tables, and diagrams
  • a full glossary of terms and acronyms
  • professional index

You know that identifying causes and preventing business-disrupting events isn’t always easy. By following Fred Forck’s proven steps you will be able to identify contributing factors, align organizational behaviors, take corrective action, and improve business performance!

Are you a professor or leader of seminars or workshops? On confirmed course adoption of Cause Analysis Manual: Incident Investigation Method and Techniques, you will have access to a comprehensive, professional Instructor’s Manual.

Read more
Collapse

About the author

Fred Forck, CPT, is a highly experienced incident investigator and self-assessment team leader who completed a 25-year career at the Callaway Nuclear Power Plant in Fulton, MO, in May 2007. He offers a rich array of root cause evaluation, quality assurance, quality improvement, facilitation, and teaching skills — including proven abilities to determine and correct the organizational weaknesses linking multiple adverse business incidents.

In 1982 Fred joined Quality Assurance (QA) at Callaway Nuclear Power Plant while the station was still under construction. As QA training supervisor, Fred developed the initial auditor and lead auditor training for the Callaway plant. He supervised the QA operations support group. As a certified lead auditor, Fred led inspections of vendors, chemistry, health physics, training, environmental monitoring, and corrective action. He also led the first self-assessment of industrial safety at the Callaway plant. At Callaway and at Palo Verde Nuclear Generating Stations, Fred developed the root cause analysis (RCA) training programs and compiled root cause manuals for both stations (the latter for Palo Verde’s regulatory recovery). At Callaway, Fred participated on over 90 root cause investigations generally as the lead investigator or the mentor. Besides participating in five common cause analyses, Fred developed and delivered the station’s common cause analysis training. In 1999, Fred participated on a Nuclear Energy Institute (NEI) team that benchmarked best corrective action processes in the nuclear industry. Fred’s final position at Callaway was root cause analysis coordinator. He has recent qualifications as a root cause analyst at Palo Verde, Ft. Calhoun, Tennessee Valley Authority (TVA), and Entergy nuclear stations. He was the lead RCA investigator for Fort Calhoun station’s Nuclear Regulatory Commission (NRC) 95002 inspection and qualified as a root cause subject matter expert at TVA’s Browns Ferry nuclear plant to support the NRC’s 95003 inspection. After Duke Energy completed its merger with Progress Energy in 2012, Fred consolidated the corrective action and cause analysis programs of both utilities into a single set of procedures. His most recent work has been with Entergy Nuclear as an investigator to support the Arkansas Nuclear One (ANO) 95003 regulatory recovery and the River Bend Nuclear Generating Station 95001 regulatory recovery.

In 2007, Fred was designated as a Certified Performance Technologist (CPT) in accordance with the International Society of Performance Improvement (ISPI) standards. is certification is a reflection of Fred’s work for over 35 years improving workplace performance by focusing on organizational assessment, incident investigation, continuous improvement, and safety culture.

Kristen Noakes-Fry, ABCI, is Executive Editor at Rothstein Publishing. Previously, she was a Research Director, Information Security and Risk Group, for Gartner, Inc.; Associate Editor at Datapro (McGraw- Hill); and Associate Professor of English at Atlantic Cape College in New Jersey. She holds an M.A. from New York University and a B.A. from Russell Sage College.

Read more
Collapse
Loading...

Additional Information

Publisher
Rothstein Publishing
Read more
Collapse
Published on
Oct 5, 2016
Read more
Collapse
Pages
342
Read more
Collapse
ISBN
9781944480103
Read more
Collapse
Read more
Collapse
Read more
Collapse
Language
English
Read more
Collapse
Genres
Business & Economics / General
Business & Economics / Insurance / General
Business & Economics / Insurance / Risk Assessment & Management
Business & Economics / Management
Read more
Collapse
Content Protection
This content is DRM protected.
Read more
Collapse
Read Aloud
Available on Android devices
Read more
Collapse
Eligible for Family Library

Reading information

Smartphones and Tablets

Install the Google Play Books app for Android and iPad/iPhone. It syncs automatically with your account and allows you to read online or offline wherever you are.

Laptops and Computers

You can read books purchased on Google Play using your computer's web browser.

eReaders and other devices

To read on e-ink devices like the Sony eReader or Barnes & Noble Nook, you'll need to download a file and transfer it to your device. Please follow the detailed Help center instructions to transfer the files to supported eReaders.
You know by now that your company could not survive without the Internet. Not in today’s market. You are either part of the digital economy or reliant upon it. With critical information assets at risk, your company requires a state-of-the-art cybersecurity program. But how do you achieve the best possible program? Tari Schreider, in Building Effective Cybersecurity Programs: A Security Manager’s Handbook, lays out the step-by-step roadmap to follow as you build or enhance your cybersecurity program.

Over 30+ years, Tari Schreider has designed and implemented cybersecurity programs throughout the world, helping hundreds of companies like yours. Building on that experience, he has created a clear roadmap that will allow the process to go more smoothly for you. Building Effective Cybersecurity Programs: A Security Manager’s Handbook is organized around the six main steps on the roadmap that will put your cybersecurity program in place:

Design a Cybersecurity ProgramEstablish a Foundation of GovernanceBuild a Threat, Vulnerability Detection, and Intelligence CapabilityBuild a Cyber Risk Management CapabilityImplement a Defense-in-Depth StrategyApply Service Management to Cybersecurity Programs

Because Schreider has researched and analyzed over 150 cybersecurity architectures, frameworks, and models, he has saved you hundreds of hours of research. He sets you up for success by talking to you directly as a friend and colleague, using practical examples. His book helps you to:

Identify the proper cybersecurity program roles and responsibilities. Classify assets and identify vulnerabilities. Define an effective cybersecurity governance foundation. Evaluate the top governance frameworks and models. Automate your governance program to make it more effective. Integrate security into your application development process. Apply defense-in-depth as a multi-dimensional strategy. Implement a service management approach to implementing countermeasures.

With this handbook, you can move forward confidently, trusting that Schreider is recommending the best components of a cybersecurity program for you. In addition, the book provides hundreds of citations and references allow you to dig deeper as you explore specific topics relevant to your organization or your studies.

Have you begun to question traditional best practices in business continuity (BC)? Do you seem to be concentrating on documentation rather than preparedness? Compliance rather than recoverability? Do your efforts provide true business value? If you have these concerns, David Lindstedt and Mark Armour offer a solution in Adaptive Business Continuity: A New Approach. This ground-breaking new book provides a streamlined, realistic methodology to change BC dramatically.

After years of working with the traditional practices of business continuity (BC) – in project management, higher education, contingency planning, and disaster recovery – David Lindstedt and Mark Armour identified unworkable areas in many core practices of traditional BC. To address these issues, they created nine Adaptive BC principles, the foundation of this book:

Deliver continuous value. Document only for mnemonics. Engage at many levels within the organization. Exercise for improvement, not for testing. Learn the business. Measure and benchmark. Obtain incremental direction from leadership. Omit the risk assessment and business impact analysis. Prepare for effects, not causes.

Adaptive Business Continuity: A New Approach uses the analogy of rebuilding a house. After the initial design, the first step is to identify and remove all the things not needed in the new house. Thus, the first chapter is “Demolition” – not to get rid of the entire BC enterprise, but to remove certain BC activities and products to provide the space to install something new. The stages continue through foundation, framework, and finishing. Finally, the last chapter is “Dwelling,” permitting you a glimpse of what it might be like to live in this new home that has been created.

Through a wealth of examples, diagrams, and real-world case studies, Lindstedt and Armour show you how you can execute the Adaptive BC framework in your own organization. You will:

Recognize specific practices in traditional BC that may be problematic, outdated, or ineffective. Identify specific activities that you may wish to eliminate from your practice. Learn the capability and constraint model of recoverability. Understand how Adaptive BC can be effective in organizations with vastly different cultures and program maturity levels. See how to take the steps to implement Adaptive BC in your own organization. Think through some typical challenges and opportunities that may arise as you implement an Adaptive BC approach.
In today’s litigious business world, cyber-related matters could land you in court. As a computer security professional, you are protecting your data, but are you protecting your company? While you know industry standards and regulations, you may not be a legal expert. Fortunately, in a few hours of reading, rather than months of classroom study, Tari Schreider’s The Manager’s Guide to Cybersecurity Law: Essentials for Today’s Business, lets you integrate legal issues into your security program.

Tari Schreider, a board-certified information security practitioner with a criminal justice administration background, has written a much-needed book that bridges the gap between cybersecurity programs and cybersecurity law. He says, “My nearly 40 years in the fields of cybersecurity, risk management, and disaster recovery have taught me some immutable truths. One of these truths is that failure to consider the law when developing a cybersecurity program results in a protective façade or false sense of security.”

In a friendly style, offering real-world business examples from his own experience supported by a wealth of court cases, Schreider covers the range of practical information you will need as you explore – and prepare to apply – cybersecurity law. His practical, easy-to-understand explanations help you to:

Understand your legal duty to act reasonably and responsibly to protect assets and information. Identify which cybersecurity laws have the potential to impact your cybersecurity program. Upgrade cybersecurity policies to comply with state, federal, and regulatory statutes. Communicate effectively about cybersecurity law with corporate legal department and counsel. Understand the implications of emerging legislation for your cybersecurity program. Know how to avoid losing a cybersecurity court case on procedure – and develop strategies to handle a dispute out of court. Develop an international view of cybersecurity and data privacy – and international legal frameworks.

Schreider takes you beyond security standards and regulatory controls to ensure that your current or future cybersecurity program complies with all laws and legal jurisdictions. Hundreds of citations and references allow you to dig deeper as you explore specific topics relevant to your organization or your studies. This book needs to be required reading before your next discussion with your corporate legal department.

Now updated — your guide to getting the best insurance policy

Are you intimidated by insurance? Have no fear — this easy-to-understand guide explains everything you need to know, from getting the most coverage at the best price to dealing with adjusters, filing claims, and more. Whether you're looking for personal or business insurance, you'll see how to avoid common pitfalls, lower your costs, and get what you deserve at claim time.

Get to know the basics — understand how to make good insurance decisions and reduce the chances of a financial loss in your life

Take your insurance on the road — manage your personal automobile risks, handle special situations, insure recreational vehicles, and deal with insurance adjusters

Understand homeowner's and renter's insurance — know what is and isn't covered by typical policies, common exclusions and pitfalls, and how to cover yourself against personal lawsuits

Buy the right umbrella policy — discover the advantages, and coordinate your policies to cover the gaps

Manage life, health, and disability risks — explore individual and group policies, understand Medicare basics, and evaluate long-term disability and long-term-care insurance

Open the book and find:

The best life, health, home, and auto policies

Strategies for handling the claims process to get what you deserve

Tips on adjusting your deductible to suit your lifestyle

How to navigate healthcare policies

Ways to reduce your risk and your premiums

Common traps and loopholes

Considerations for grads, freelancers, and remote workers

“Entertaining and informative. Desai takes us on a journey through the fundamentals of finance, from asset pricing to risk and risk management, via options, mergers, debt, and bankruptcy."- John Lanchester, The New Yorker

"A fascinating new perspective on modern finance," --Oliver Hart, 2016 Nobel Laureate in Economics

"Lucid, witty and delightfully erudite...From the French revolution to film noir, from the history of probability to Jane Austen and The Simpsons, this is an astonishing intellectual feast." --Sebastian Mallaby, author of The Man Who Knew: The Life and Times of Alan Greenspan

Longlisted for 2017 Financial Times/McKinsey Business Book of the Year 

A 2017 AMAZON PICK IN BUSINESS & LEADERSHIP

A WealthManagement.com BEST BUSINESS BOOK OF 2017

In 1688, essayist Josef de la Vega described finance as both “the fairest and most deceitful business . . . the noblest and the most infamous in the world, the finest and most vulgar on earth.”

The characterization of finance as deceitful, infamous, and vulgar still rings true today – particularly in the wake of the 2008 financial crisis. But, what happened to the fairest, noblest, and finest profession that de la Vega saw? 

De la Vega hit on an essential truth that has been forgotten: finance can be just as principled, life-affirming, and worthy as it can be fraught with questionable practices.  Today, finance is shrouded in mystery for outsiders, while many insiders are uneasy with the disrepute of their profession.  How can finance become more accessible and also recover its nobility?

Harvard Business School professor Mihir Desai, in his “last lecture” to the graduating Harvard MBA class of 2015, took up the cause of restoring humanity to finance. With incisive wit and irony, his lecture drew upon a rich knowledge of literature, film, history, and philosophy to explain the inner workings of finance in a manner that has never been seen before.

This book captures Desai’s lucid exploration of the ideas of finance as seen through the unusual prism of the humanities. Through this novel, creative approach, Desai shows that outsiders can access the underlying ideas easily and insiders can reacquaint themselves with the core humanity of their profession.

The mix of finance and the humanities creates unusual pairings: Jane Austen and Anthony Trollope are guides to risk management; Jeff Koons becomes an advocate of leverage; and Mel Brooks’s The Producers teaches us about fiduciary responsibility. In Desai’s vision, the principles of finance also provide answers to critical questions in our lives. Among many surprising parallels, bankruptcy teaches us how to react to failure, the lessons of mergers apply to marriages, and the Capital Asset Pricing Model demonstrates the true value of relationships.
THE WISDOM OF FINANCE is a wholly unique book, offering a refreshing new perspective on one of the world’s most complex and misunderstood professions.    
When faced with a ’human error’ problem, you may be tempted to ask 'Why didn’t these people watch out better?' Or, 'How can I get my people more engaged in safety?' You might think you can solve your safety problems by telling your people to be more careful, by reprimanding the miscreants, by issuing a new rule or procedure and demanding compliance. These are all expressions of 'The Bad Apple Theory' where you believe your system is basically safe if it were not for those few unreliable people in it. Building on its successful predecessors, the third edition of The Field Guide to Understanding ’Human Error’ will help you understand a new way of dealing with a perceived 'human error' problem in your organization. It will help you trace how your organization juggles inherent trade-offs between safety and other pressures and expectations, suggesting that you are not the custodian of an already safe system. It will encourage you to start looking more closely at the performance that others may still call 'human error', allowing you to discover how your people create safety through practice, at all levels of your organization, mostly successfully, under the pressure of resource constraints and multiple conflicting goals. The Field Guide to Understanding 'Human Error' will help you understand how to move beyond 'human error'; how to understand accidents; how to do better investigations; how to understand and improve your safety work. You will be invited to think creatively and differently about the safety issues you and your organization face. In each, you will find possibilities for a new language, for different concepts, and for new leverage points to influence your own thinking and practice, as well as that of your colleagues and organization. If you are faced with a ’human error’ problem, abandon the fallacy of a quick fix. Read this book.
©2019 GoogleSite Terms of ServicePrivacyDevelopersArtistsAbout Google|Location: United StatesLanguage: English (United States)
By purchasing this item, you are transacting with Google Payments and agreeing to the Google Payments Terms of Service and Privacy Notice.