SlideShare une entreprise Scribd logo
1  sur  14
Télécharger pour lire hors ligne
KAREN MEAD
SPECIALIST PRACTITIONER OF TRANSFUSION
NORTH BRISTOL NHS TRUST
What is Root Cause Analysis ?
Root Cause Analysis (RCA) is a technique used to
identify why a problem occurred in the first place
Swiss Cheese Model
Many layers of defense usually lie between hazards and accidents but there
are flaws in each layer which if aligned can allow the accident to occur.
Website ref - http://calleam.com/WTPF/?p=4369
The Root Cause Analysis Process
Three basic types of causes
Hum an Error
Aoccdrnig to rscheearch at Cm abrigde
Uinervtisy, it deosn't m ttaer in waht oredr
the ltteers in a wrod are, the olny iprm oetnt
tihng is taht the frist and lsat ltteer are in the
rghit pclae.
The rset can be a total m ses and you can sitll
raed it fialry eailsy.
Tihs is bcuseae the huam n m nid deos not raed
ervey lteter by istlef, but the wrod as a wlohe.
Hum an Error - Myths
The Perfection Myth
- if we try hard enough we
will not make any errors
The Punishm ent Myth
- if we punish people when
they make errors they will
make fewer of them
Five Whys
Problem : Your client is refusing to pay for the leaflets you printed for
them.
Why? The delivery was late, so the leaflets couldn't be used.
Why? The job took longer than we anticipated.
Why? We ran out of printer ink.
Why? The ink was all used up on a big, last-minute order.
Why? We didn't have enough in stock, and we couldn't order it in quickly
enough.
Counter-measure: We need to find a supplier who can deliver ink at very short
notice.
Fishbone Diagram
Sim ply telling people to be m ore careful does not work!
Reducing the likelihood of error
Safety Solutions / Actions
Rem edial actions should
• Draw on the experience of NHS staff + patients / public
• Be simple and cost effective (proportionality)
• Target root causes or lessons learned
• Offer a long term solution to the problem
• Be SMART (Specific, Measurable, Achievable, Reasonable + Timed)
• Have a greater positive than negative impact on other procedures, resources
and schedules (risk assess and evaluate before implementation)
• Be shared
Take Hom e Messages
RCAs are used to identify and correct problems, and should
not to used to blame individual(s)
All contributing factors should be explored
As much information as possible is required
Suggestions for improvement should be given
Feedback should be provided to everyone who contributed
to the RCA and anyone who is affected by the actions
Any Questions?
Reference
National Patient Safety Agency Website:
http:/ / www.nrls.npsa.nhs.uk/ resources/ collections/
root-cause-analysis/ rca-training-course-overview/

Contenu connexe

Similaire à Understanding Root Cause Analysis and Error Prevention Techniques

Root Cause Analysis
Root Cause AnalysisRoot Cause Analysis
Root Cause Analysismtalhausmani
 
Advanced Maintenance And Reliability (Maintenance and Reliability Best Pract...
Advanced Maintenance And Reliability  (Maintenance and Reliability Best Pract...Advanced Maintenance And Reliability  (Maintenance and Reliability Best Pract...
Advanced Maintenance And Reliability (Maintenance and Reliability Best Pract...Ricky Smith CMRP, CMRT
 
The Dark of Building an Production Incident Syste
The Dark of Building an Production Incident SysteThe Dark of Building an Production Incident Syste
The Dark of Building an Production Incident SysteAlois Reitbauer
 
Progress in AI and its application to Asset Management.pptx
Progress in AI and its application to Asset Management.pptxProgress in AI and its application to Asset Management.pptx
Progress in AI and its application to Asset Management.pptxDerryn Knife
 
Pin On Sample Sop For Masters In Engineering Ma
Pin On Sample Sop For Masters In Engineering MaPin On Sample Sop For Masters In Engineering Ma
Pin On Sample Sop For Masters In Engineering MaCarla Potier
 
Accident Investigation Basics Training by Washington State Department of Labo...
Accident Investigation Basics Training by Washington State Department of Labo...Accident Investigation Basics Training by Washington State Department of Labo...
Accident Investigation Basics Training by Washington State Department of Labo...Atlantic Training, LLC.
 
1115 wyatt wheres the science in hi for christchurch nz oct 2015
1115 wyatt wheres the science in hi   for christchurch nz oct 20151115 wyatt wheres the science in hi   for christchurch nz oct 2015
1115 wyatt wheres the science in hi for christchurch nz oct 2015Health Informatics New Zealand
 
Demystifying the concepts of hazard avoidance in a dynamic work environment -...
Demystifying the concepts of hazard avoidance in a dynamic work environment -...Demystifying the concepts of hazard avoidance in a dynamic work environment -...
Demystifying the concepts of hazard avoidance in a dynamic work environment -...Shola Yemi-Jonathan
 
How to Monitoring the SRE Golden Signals (E-Book)
How to Monitoring the SRE Golden Signals (E-Book)How to Monitoring the SRE Golden Signals (E-Book)
How to Monitoring the SRE Golden Signals (E-Book)Siglos
 
Yan Cui - Applying principles of chaos engineering to Serverless - Codemotion...
Yan Cui - Applying principles of chaos engineering to Serverless - Codemotion...Yan Cui - Applying principles of chaos engineering to Serverless - Codemotion...
Yan Cui - Applying principles of chaos engineering to Serverless - Codemotion...Codemotion
 
Applying principles of chaos engineering to Serverless (CodeMotion Berlin)
Applying principles of chaos engineering to Serverless (CodeMotion Berlin)Applying principles of chaos engineering to Serverless (CodeMotion Berlin)
Applying principles of chaos engineering to Serverless (CodeMotion Berlin)Yan Cui
 
Yan Cui - Applying principles of chaos engineering to Serverless - Codemotion...
Yan Cui - Applying principles of chaos engineering to Serverless - Codemotion...Yan Cui - Applying principles of chaos engineering to Serverless - Codemotion...
Yan Cui - Applying principles of chaos engineering to Serverless - Codemotion...Codemotion
 
1- Tripod Beta Analysis, Incident Reporting & Investigation Techniques.pptx
1- Tripod Beta Analysis, Incident Reporting & Investigation  Techniques.pptx1- Tripod Beta Analysis, Incident Reporting & Investigation  Techniques.pptx
1- Tripod Beta Analysis, Incident Reporting & Investigation Techniques.pptxALIASGHAR855724
 
Stop the Blame, Find the Cause
Stop the Blame, Find the CauseStop the Blame, Find the Cause
Stop the Blame, Find the CauseMedgate Inc.
 
MSA – Overview
MSA – OverviewMSA – Overview
MSA – OverviewMatt Hansen
 
Cybersecurity 5 road_blocks
Cybersecurity 5 road_blocksCybersecurity 5 road_blocks
Cybersecurity 5 road_blocksCyphort
 

Similaire à Understanding Root Cause Analysis and Error Prevention Techniques (20)

Root Cause Analysis
Root Cause AnalysisRoot Cause Analysis
Root Cause Analysis
 
Advanced Maintenance And Reliability (Maintenance and Reliability Best Pract...
Advanced Maintenance And Reliability  (Maintenance and Reliability Best Pract...Advanced Maintenance And Reliability  (Maintenance and Reliability Best Pract...
Advanced Maintenance And Reliability (Maintenance and Reliability Best Pract...
 
The Dark of Building an Production Incident Syste
The Dark of Building an Production Incident SysteThe Dark of Building an Production Incident Syste
The Dark of Building an Production Incident Syste
 
Progress in AI and its application to Asset Management.pptx
Progress in AI and its application to Asset Management.pptxProgress in AI and its application to Asset Management.pptx
Progress in AI and its application to Asset Management.pptx
 
Root Cause Analysis
Root Cause AnalysisRoot Cause Analysis
Root Cause Analysis
 
Pin On Sample Sop For Masters In Engineering Ma
Pin On Sample Sop For Masters In Engineering MaPin On Sample Sop For Masters In Engineering Ma
Pin On Sample Sop For Masters In Engineering Ma
 
Accident inves
Accident invesAccident inves
Accident inves
 
Accident Investigation Basics Training by Washington State Department of Labo...
Accident Investigation Basics Training by Washington State Department of Labo...Accident Investigation Basics Training by Washington State Department of Labo...
Accident Investigation Basics Training by Washington State Department of Labo...
 
Accident Investigation
Accident InvestigationAccident Investigation
Accident Investigation
 
1115 wyatt wheres the science in hi for christchurch nz oct 2015
1115 wyatt wheres the science in hi   for christchurch nz oct 20151115 wyatt wheres the science in hi   for christchurch nz oct 2015
1115 wyatt wheres the science in hi for christchurch nz oct 2015
 
Demystifying the concepts of hazard avoidance in a dynamic work environment -...
Demystifying the concepts of hazard avoidance in a dynamic work environment -...Demystifying the concepts of hazard avoidance in a dynamic work environment -...
Demystifying the concepts of hazard avoidance in a dynamic work environment -...
 
How to Monitoring the SRE Golden Signals (E-Book)
How to Monitoring the SRE Golden Signals (E-Book)How to Monitoring the SRE Golden Signals (E-Book)
How to Monitoring the SRE Golden Signals (E-Book)
 
Yan Cui - Applying principles of chaos engineering to Serverless - Codemotion...
Yan Cui - Applying principles of chaos engineering to Serverless - Codemotion...Yan Cui - Applying principles of chaos engineering to Serverless - Codemotion...
Yan Cui - Applying principles of chaos engineering to Serverless - Codemotion...
 
Applying principles of chaos engineering to Serverless (CodeMotion Berlin)
Applying principles of chaos engineering to Serverless (CodeMotion Berlin)Applying principles of chaos engineering to Serverless (CodeMotion Berlin)
Applying principles of chaos engineering to Serverless (CodeMotion Berlin)
 
Yan Cui - Applying principles of chaos engineering to Serverless - Codemotion...
Yan Cui - Applying principles of chaos engineering to Serverless - Codemotion...Yan Cui - Applying principles of chaos engineering to Serverless - Codemotion...
Yan Cui - Applying principles of chaos engineering to Serverless - Codemotion...
 
1- Tripod Beta Analysis, Incident Reporting & Investigation Techniques.pptx
1- Tripod Beta Analysis, Incident Reporting & Investigation  Techniques.pptx1- Tripod Beta Analysis, Incident Reporting & Investigation  Techniques.pptx
1- Tripod Beta Analysis, Incident Reporting & Investigation Techniques.pptx
 
Stop the Blame, Find the Cause
Stop the Blame, Find the CauseStop the Blame, Find the Cause
Stop the Blame, Find the Cause
 
Root causeanalysis
Root causeanalysisRoot causeanalysis
Root causeanalysis
 
MSA – Overview
MSA – OverviewMSA – Overview
MSA – Overview
 
Cybersecurity 5 road_blocks
Cybersecurity 5 road_blocksCybersecurity 5 road_blocks
Cybersecurity 5 road_blocks
 

Dernier

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Dernier (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Understanding Root Cause Analysis and Error Prevention Techniques

  • 1. KAREN MEAD SPECIALIST PRACTITIONER OF TRANSFUSION NORTH BRISTOL NHS TRUST
  • 2. What is Root Cause Analysis ? Root Cause Analysis (RCA) is a technique used to identify why a problem occurred in the first place
  • 3. Swiss Cheese Model Many layers of defense usually lie between hazards and accidents but there are flaws in each layer which if aligned can allow the accident to occur. Website ref - http://calleam.com/WTPF/?p=4369
  • 4. The Root Cause Analysis Process
  • 5. Three basic types of causes
  • 6. Hum an Error Aoccdrnig to rscheearch at Cm abrigde Uinervtisy, it deosn't m ttaer in waht oredr the ltteers in a wrod are, the olny iprm oetnt tihng is taht the frist and lsat ltteer are in the rghit pclae. The rset can be a total m ses and you can sitll raed it fialry eailsy. Tihs is bcuseae the huam n m nid deos not raed ervey lteter by istlef, but the wrod as a wlohe.
  • 7. Hum an Error - Myths The Perfection Myth - if we try hard enough we will not make any errors The Punishm ent Myth - if we punish people when they make errors they will make fewer of them
  • 8. Five Whys Problem : Your client is refusing to pay for the leaflets you printed for them. Why? The delivery was late, so the leaflets couldn't be used. Why? The job took longer than we anticipated. Why? We ran out of printer ink. Why? The ink was all used up on a big, last-minute order. Why? We didn't have enough in stock, and we couldn't order it in quickly enough. Counter-measure: We need to find a supplier who can deliver ink at very short notice.
  • 10. Sim ply telling people to be m ore careful does not work! Reducing the likelihood of error
  • 11. Safety Solutions / Actions Rem edial actions should • Draw on the experience of NHS staff + patients / public • Be simple and cost effective (proportionality) • Target root causes or lessons learned • Offer a long term solution to the problem • Be SMART (Specific, Measurable, Achievable, Reasonable + Timed) • Have a greater positive than negative impact on other procedures, resources and schedules (risk assess and evaluate before implementation) • Be shared
  • 12. Take Hom e Messages RCAs are used to identify and correct problems, and should not to used to blame individual(s) All contributing factors should be explored As much information as possible is required Suggestions for improvement should be given Feedback should be provided to everyone who contributed to the RCA and anyone who is affected by the actions
  • 14. Reference National Patient Safety Agency Website: http:/ / www.nrls.npsa.nhs.uk/ resources/ collections/ root-cause-analysis/ rca-training-course-overview/