SlideShare une entreprise Scribd logo
1  sur  1
Télécharger pour lire hors ligne
Term Explanation
Barrier
A physical device or an administrative control used to reduce risk of the undesired
outcome to an acceptable level. Barriers can provide physical intervention (e.g., a
guardrail) or procedural separation in time and space (e.g., lock-out-tag-out
procedure).
Cause (Causal Factor)
An event or condition that results in an effect. Anything that shapes or influences
the outcome.
Condition
Any as-found state, whether or not resulting from an event, that may have safety,
health, quality, security, operational, or environmental implications.
Contributing Factor
An event or condition that may have contributed to the occurrence of an undesired
outcome but, if eliminated or modified, would not by itself have prevented the
occurrence.
Crisis management
The process responsible for managing the wider implications of business continuity.
A crisis management team is responsible for strategic issues such as managing
media relations and shareholder confidence, and decides when to invoke business
continuity plans.
Event
A real-time occurrence describing one discrete action, typically an error, failure, or
malfunction. Examples: pipe broke, power lost, lightning struck, person opened
Organizational Factors
Any operational or management structural entity that exerts control over the system
development, design, fabrication, test, maintenance, operation, and disposal.
Examples: resource management (budget, staff, training); policy (content,
implementation, verification); and management decisions.
Proximate Cause(s)
The event(s) that occurred, including any condition(s) that existed immediately
before the undesired outcome, directly resulted in its occurrence and, if eliminated
or modified, would have prevented the undesired outcome. Also known as the
direct cause(s).
Root Cause Analysis (RCA)
A structured evaluation method that identifies the root causes for an undesired
outcome and the actions adequate to prevent recurrence. Root cause analysis
should continue until organizational factors have been identified, or until data are
exhausted.
Root Cause(s)
One of multiple factors (events, conditions or organizational factors) that
contributed to or created the proximate cause and subsequent undesired outcome
and, if eliminated, or modified would have prevented the undesired outcome.
Typically multiple root causes contribute to an undesired outcome.

Contenu connexe

Tendances

Human factors in risk management
Human factors in risk managementHuman factors in risk management
Human factors in risk managementBasitali Nevarekar
 
Business continuity and recovery planning for manufacturing
Business continuity and recovery planning for manufacturingBusiness continuity and recovery planning for manufacturing
Business continuity and recovery planning for manufacturingARC Advisory Group
 
Operational Risk Management and Bpm
Operational Risk Management and BpmOperational Risk Management and Bpm
Operational Risk Management and BpmNathaniel Palmer
 
Contingency%20planning%20lecture%205
Contingency%20planning%20lecture%205Contingency%20planning%20lecture%205
Contingency%20planning%20lecture%205Magdalena Anna Fas
 
Various steps of risk assessment. md. anwar ibrahim miraz
Various steps of risk assessment. md. anwar ibrahim mirazVarious steps of risk assessment. md. anwar ibrahim miraz
Various steps of risk assessment. md. anwar ibrahim mirazMDAnwarIbrahimMiraz
 
Risk assessment and management
Risk assessment and managementRisk assessment and management
Risk assessment and managementTaekHyeun Kim
 
A simplified guide to Risk Assessment in Occupational Health & Safety
A simplified guide to Risk Assessment in Occupational Health & SafetyA simplified guide to Risk Assessment in Occupational Health & Safety
A simplified guide to Risk Assessment in Occupational Health & SafetyWessam Atif
 
2015-01-13 Resiliency (v04)
2015-01-13 Resiliency (v04)2015-01-13 Resiliency (v04)
2015-01-13 Resiliency (v04)John Mymryk
 
App Showcase: Internal Audit
App Showcase: Internal AuditApp Showcase: Internal Audit
App Showcase: Internal AuditResolver Inc.
 
Business Continuity Management PowerPoint Presentation Slides
Business Continuity Management PowerPoint Presentation SlidesBusiness Continuity Management PowerPoint Presentation Slides
Business Continuity Management PowerPoint Presentation SlidesSlideTeam
 
Security Risk management Chapther 8: Risk Evaluation and Mitigation Strategies
Security Risk management Chapther 8:  Risk Evaluation and Mitigation StrategiesSecurity Risk management Chapther 8:  Risk Evaluation and Mitigation Strategies
Security Risk management Chapther 8: Risk Evaluation and Mitigation StrategiesErnst Dettbarn
 
Risk and testing
Risk and testingRisk and testing
Risk and testingEmi Rahmi
 
Overview Of Job Hazard Analysis for South Carolina Hospitality Industry
Overview Of Job Hazard Analysis for South Carolina Hospitality IndustryOverview Of Job Hazard Analysis for South Carolina Hospitality Industry
Overview Of Job Hazard Analysis for South Carolina Hospitality IndustryStephen Deas
 
Infographic - Critical Capabilities of a Good Risk Management Solution
Infographic - Critical Capabilities of a Good Risk Management SolutionInfographic - Critical Capabilities of a Good Risk Management Solution
Infographic - Critical Capabilities of a Good Risk Management SolutionCorporater
 

Tendances (20)

Topic 04 risk mangement
Topic 04 risk mangementTopic 04 risk mangement
Topic 04 risk mangement
 
Human factors in risk management
Human factors in risk managementHuman factors in risk management
Human factors in risk management
 
Business continuity and recovery planning for manufacturing
Business continuity and recovery planning for manufacturingBusiness continuity and recovery planning for manufacturing
Business continuity and recovery planning for manufacturing
 
Operational Risk Management and Bpm
Operational Risk Management and BpmOperational Risk Management and Bpm
Operational Risk Management and Bpm
 
Contingency%20planning%20lecture%205
Contingency%20planning%20lecture%205Contingency%20planning%20lecture%205
Contingency%20planning%20lecture%205
 
2010; Risk Management Workshop Rev.1.1
2010; Risk Management Workshop Rev.1.12010; Risk Management Workshop Rev.1.1
2010; Risk Management Workshop Rev.1.1
 
Develop a Business Continuity Plan
Develop a Business Continuity PlanDevelop a Business Continuity Plan
Develop a Business Continuity Plan
 
Various steps of risk assessment. md. anwar ibrahim miraz
Various steps of risk assessment. md. anwar ibrahim mirazVarious steps of risk assessment. md. anwar ibrahim miraz
Various steps of risk assessment. md. anwar ibrahim miraz
 
Risk assessment and management
Risk assessment and managementRisk assessment and management
Risk assessment and management
 
A simplified guide to Risk Assessment in Occupational Health & Safety
A simplified guide to Risk Assessment in Occupational Health & SafetyA simplified guide to Risk Assessment in Occupational Health & Safety
A simplified guide to Risk Assessment in Occupational Health & Safety
 
Risk Management in Pilotage - By Mr. Marantis Stylianos
Risk Management in Pilotage - By Mr. Marantis StylianosRisk Management in Pilotage - By Mr. Marantis Stylianos
Risk Management in Pilotage - By Mr. Marantis Stylianos
 
2015-01-13 Resiliency (v04)
2015-01-13 Resiliency (v04)2015-01-13 Resiliency (v04)
2015-01-13 Resiliency (v04)
 
Construction safety management
Construction safety managementConstruction safety management
Construction safety management
 
App Showcase: Internal Audit
App Showcase: Internal AuditApp Showcase: Internal Audit
App Showcase: Internal Audit
 
Business Continuity Management PowerPoint Presentation Slides
Business Continuity Management PowerPoint Presentation SlidesBusiness Continuity Management PowerPoint Presentation Slides
Business Continuity Management PowerPoint Presentation Slides
 
Security Risk management Chapther 8: Risk Evaluation and Mitigation Strategies
Security Risk management Chapther 8:  Risk Evaluation and Mitigation StrategiesSecurity Risk management Chapther 8:  Risk Evaluation and Mitigation Strategies
Security Risk management Chapther 8: Risk Evaluation and Mitigation Strategies
 
Risk and testing
Risk and testingRisk and testing
Risk and testing
 
Overview Of Job Hazard Analysis for South Carolina Hospitality Industry
Overview Of Job Hazard Analysis for South Carolina Hospitality IndustryOverview Of Job Hazard Analysis for South Carolina Hospitality Industry
Overview Of Job Hazard Analysis for South Carolina Hospitality Industry
 
Risk management
Risk managementRisk management
Risk management
 
Infographic - Critical Capabilities of a Good Risk Management Solution
Infographic - Critical Capabilities of a Good Risk Management SolutionInfographic - Critical Capabilities of a Good Risk Management Solution
Infographic - Critical Capabilities of a Good Risk Management Solution
 

En vedette

Unit Plan- The Continents
Unit Plan- The ContinentsUnit Plan- The Continents
Unit Plan- The ContinentsMikalyn
 
Interesting facts about each contient
Interesting facts about each contientInteresting facts about each contient
Interesting facts about each contientMikalyn
 
Periféricos de procesamiento de datos
Periféricos de procesamiento de datosPeriféricos de procesamiento de datos
Periféricos de procesamiento de datosLeoniciop52
 
Holiday Fun in the Sun: Planning a Holiday Vacation in Miami Beach
Holiday Fun in the Sun: Planning a Holiday Vacation in Miami BeachHoliday Fun in the Sun: Planning a Holiday Vacation in Miami Beach
Holiday Fun in the Sun: Planning a Holiday Vacation in Miami Beachoceanpointresort
 
Evidence 8 export the product
Evidence 8 export the productEvidence 8 export the product
Evidence 8 export the productSteven Romero
 
La neurocisticercosis como una amenaza potencial
La neurocisticercosis como una amenaza potencialLa neurocisticercosis como una amenaza potencial
La neurocisticercosis como una amenaza potencialManolo Hernández Martinez
 

En vedette (13)

Trabajo de informatica
Trabajo de informaticaTrabajo de informatica
Trabajo de informatica
 
Hari CV
Hari CVHari CV
Hari CV
 
Unit Plan- The Continents
Unit Plan- The ContinentsUnit Plan- The Continents
Unit Plan- The Continents
 
Interesting facts about each contient
Interesting facts about each contientInteresting facts about each contient
Interesting facts about each contient
 
INT1B3_E6
INT1B3_E6INT1B3_E6
INT1B3_E6
 
Ada#1 b3
Ada#1 b3Ada#1 b3
Ada#1 b3
 
Cedula
Cedula Cedula
Cedula
 
Periféricos de procesamiento de datos
Periféricos de procesamiento de datosPeriféricos de procesamiento de datos
Periféricos de procesamiento de datos
 
PRACTICAS DE WORD
PRACTICAS DE WORDPRACTICAS DE WORD
PRACTICAS DE WORD
 
Holiday Fun in the Sun: Planning a Holiday Vacation in Miami Beach
Holiday Fun in the Sun: Planning a Holiday Vacation in Miami BeachHoliday Fun in the Sun: Planning a Holiday Vacation in Miami Beach
Holiday Fun in the Sun: Planning a Holiday Vacation in Miami Beach
 
Evidence 8 export the product
Evidence 8 export the productEvidence 8 export the product
Evidence 8 export the product
 
La neurocisticercosis como una amenaza potencial
La neurocisticercosis como una amenaza potencialLa neurocisticercosis como una amenaza potencial
La neurocisticercosis como una amenaza potencial
 
Sample lab
Sample labSample lab
Sample lab
 

Similaire à Crisis Management Glossary

JSA_For_MINERS_Penn_State_9-10.ppt
JSA_For_MINERS_Penn_State_9-10.pptJSA_For_MINERS_Penn_State_9-10.ppt
JSA_For_MINERS_Penn_State_9-10.pptKhalilUrRehman480961
 
Risk assessment for Risk management subject.pptx
Risk assessment for Risk management subject.pptxRisk assessment for Risk management subject.pptx
Risk assessment for Risk management subject.pptxgalangjuliet669
 
Risk assessment
Risk assessmentRisk assessment
Risk assessmentHavio
 
PRINCIPLES-OF-RISK-AND-MANAGEMENT.pptx
PRINCIPLES-OF-RISK-AND-MANAGEMENT.pptxPRINCIPLES-OF-RISK-AND-MANAGEMENT.pptx
PRINCIPLES-OF-RISK-AND-MANAGEMENT.pptxGraciaSuratos
 
Risk management osh
Risk management oshRisk management osh
Risk management oshjaycatubig
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security AssessmentFaheem Ul Hasan
 
Hpe program rating #5 ops performance feedback
Hpe program rating #5 ops performance feedbackHpe program rating #5 ops performance feedback
Hpe program rating #5 ops performance feedbackPMHaas
 
Enterprise risk & risk management - I
Enterprise risk & risk management - IEnterprise risk & risk management - I
Enterprise risk & risk management - IDr. Shiv S Tripathi
 
Study to Identify and Rectify Potential Risks in General Engineering Services...
Study to Identify and Rectify Potential Risks in General Engineering Services...Study to Identify and Rectify Potential Risks in General Engineering Services...
Study to Identify and Rectify Potential Risks in General Engineering Services...Sheetal Singh
 
Management system in safety and health at work
Management system in safety and health at workManagement system in safety and health at work
Management system in safety and health at worksalvado52
 
Chapter 1Managing RiskTHE FOLLOWING COMPTIA SECURITY+ EXAM OBJ.docx
Chapter 1Managing RiskTHE FOLLOWING COMPTIA SECURITY+ EXAM OBJ.docxChapter 1Managing RiskTHE FOLLOWING COMPTIA SECURITY+ EXAM OBJ.docx
Chapter 1Managing RiskTHE FOLLOWING COMPTIA SECURITY+ EXAM OBJ.docxwalterl4
 
Supervisors have one role
Supervisors have one roleSupervisors have one role
Supervisors have one roleTerry Penney
 
Chapter 5 Environmental Safety, Security and Compliances(FASS)
Chapter 5  Environmental Safety, Security and Compliances(FASS)Chapter 5  Environmental Safety, Security and Compliances(FASS)
Chapter 5 Environmental Safety, Security and Compliances(FASS)Md Shaifullar Rabbi
 
Disaster Preparedness and planning
Disaster Preparedness and planningDisaster Preparedness and planning
Disaster Preparedness and planningrakesh11032000
 
Management of Change 22.4.15
Management of Change 22.4.15Management of Change 22.4.15
Management of Change 22.4.15SANJIV SONI
 
7 job safety analysis - jsa
7   job safety analysis - jsa7   job safety analysis - jsa
7 job safety analysis - jsasaidulu anthati
 
Multimedia Studio OH&S
Multimedia Studio OH&SMultimedia Studio OH&S
Multimedia Studio OH&SWebmaster
 

Similaire à Crisis Management Glossary (20)

JSA_For_MINERS_Penn_State_9-10.ppt
JSA_For_MINERS_Penn_State_9-10.pptJSA_For_MINERS_Penn_State_9-10.ppt
JSA_For_MINERS_Penn_State_9-10.ppt
 
Risk assessment for Risk management subject.pptx
Risk assessment for Risk management subject.pptxRisk assessment for Risk management subject.pptx
Risk assessment for Risk management subject.pptx
 
Hazards and risk management
Hazards and risk managementHazards and risk management
Hazards and risk management
 
Risk assessment
Risk assessmentRisk assessment
Risk assessment
 
PRINCIPLES-OF-RISK-AND-MANAGEMENT.pptx
PRINCIPLES-OF-RISK-AND-MANAGEMENT.pptxPRINCIPLES-OF-RISK-AND-MANAGEMENT.pptx
PRINCIPLES-OF-RISK-AND-MANAGEMENT.pptx
 
OHS
OHSOHS
OHS
 
Risk management osh
Risk management oshRisk management osh
Risk management osh
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
Hpe program rating #5 ops performance feedback
Hpe program rating #5 ops performance feedbackHpe program rating #5 ops performance feedback
Hpe program rating #5 ops performance feedback
 
Enterprise risk & risk management - I
Enterprise risk & risk management - IEnterprise risk & risk management - I
Enterprise risk & risk management - I
 
Study to Identify and Rectify Potential Risks in General Engineering Services...
Study to Identify and Rectify Potential Risks in General Engineering Services...Study to Identify and Rectify Potential Risks in General Engineering Services...
Study to Identify and Rectify Potential Risks in General Engineering Services...
 
Management system in safety and health at work
Management system in safety and health at workManagement system in safety and health at work
Management system in safety and health at work
 
Chapter 1Managing RiskTHE FOLLOWING COMPTIA SECURITY+ EXAM OBJ.docx
Chapter 1Managing RiskTHE FOLLOWING COMPTIA SECURITY+ EXAM OBJ.docxChapter 1Managing RiskTHE FOLLOWING COMPTIA SECURITY+ EXAM OBJ.docx
Chapter 1Managing RiskTHE FOLLOWING COMPTIA SECURITY+ EXAM OBJ.docx
 
Worksitehazanalysis2
Worksitehazanalysis2Worksitehazanalysis2
Worksitehazanalysis2
 
Supervisors have one role
Supervisors have one roleSupervisors have one role
Supervisors have one role
 
Chapter 5 Environmental Safety, Security and Compliances(FASS)
Chapter 5  Environmental Safety, Security and Compliances(FASS)Chapter 5  Environmental Safety, Security and Compliances(FASS)
Chapter 5 Environmental Safety, Security and Compliances(FASS)
 
Disaster Preparedness and planning
Disaster Preparedness and planningDisaster Preparedness and planning
Disaster Preparedness and planning
 
Management of Change 22.4.15
Management of Change 22.4.15Management of Change 22.4.15
Management of Change 22.4.15
 
7 job safety analysis - jsa
7   job safety analysis - jsa7   job safety analysis - jsa
7 job safety analysis - jsa
 
Multimedia Studio OH&S
Multimedia Studio OH&SMultimedia Studio OH&S
Multimedia Studio OH&S
 

Plus de Ronald Bartels

Implementing a modern Fusion Centre
Implementing a modern Fusion Centre Implementing a modern Fusion Centre
Implementing a modern Fusion Centre Ronald Bartels
 
NSA advisory about state sponsored cybersecurity threats
NSA advisory about state sponsored cybersecurity threatsNSA advisory about state sponsored cybersecurity threats
NSA advisory about state sponsored cybersecurity threatsRonald Bartels
 
The reasons why your business cannot afford to be offline
The reasons why your business cannot afford to be offlineThe reasons why your business cannot afford to be offline
The reasons why your business cannot afford to be offlineRonald Bartels
 
RADWIN, software defined wide area network, Press Release
RADWIN, software defined wide area network, Press ReleaseRADWIN, software defined wide area network, Press Release
RADWIN, software defined wide area network, Press ReleaseRonald Bartels
 
Infrastructure management presented to GPNOG (Updated)
Infrastructure management presented to GPNOG (Updated)Infrastructure management presented to GPNOG (Updated)
Infrastructure management presented to GPNOG (Updated)Ronald Bartels
 
Infrastructure management using a VPN Concentrator
Infrastructure management using a VPN ConcentratorInfrastructure management using a VPN Concentrator
Infrastructure management using a VPN ConcentratorRonald Bartels
 
Problem management foundation - Introduction
Problem management foundation - IntroductionProblem management foundation - Introduction
Problem management foundation - IntroductionRonald Bartels
 
Problem management foundation - Overview
Problem management foundation - OverviewProblem management foundation - Overview
Problem management foundation - OverviewRonald Bartels
 
Problem management foundation - Perceptions
Problem management foundation - PerceptionsProblem management foundation - Perceptions
Problem management foundation - PerceptionsRonald Bartels
 
Problem management foundation - Engineering
Problem management foundation - EngineeringProblem management foundation - Engineering
Problem management foundation - EngineeringRonald Bartels
 
Problem management foundation - Tiger teams
Problem management foundation - Tiger teamsProblem management foundation - Tiger teams
Problem management foundation - Tiger teamsRonald Bartels
 
Problem management foundation - Lifecycle
Problem management foundation - Lifecycle Problem management foundation - Lifecycle
Problem management foundation - Lifecycle Ronald Bartels
 
Problem management foundation - Tools
Problem management foundation - ToolsProblem management foundation - Tools
Problem management foundation - ToolsRonald Bartels
 
Problem management foundation - Analysing
Problem management foundation - AnalysingProblem management foundation - Analysing
Problem management foundation - AnalysingRonald Bartels
 
Problem management foundation Simulation
Problem management foundation SimulationProblem management foundation Simulation
Problem management foundation SimulationRonald Bartels
 
Problem management foundation - IT risk
Problem management foundation - IT riskProblem management foundation - IT risk
Problem management foundation - IT riskRonald Bartels
 
Problem management foundation - Continious improvement
Problem management foundation - Continious improvementProblem management foundation - Continious improvement
Problem management foundation - Continious improvementRonald Bartels
 
Problem management foundation - Mission control
Problem management foundation - Mission controlProblem management foundation - Mission control
Problem management foundation - Mission controlRonald Bartels
 
Problem management foundation - Significant havoc in technology
Problem management foundation - Significant havoc in technologyProblem management foundation - Significant havoc in technology
Problem management foundation - Significant havoc in technologyRonald Bartels
 
Problem management foundation Budget
Problem management foundation BudgetProblem management foundation Budget
Problem management foundation BudgetRonald Bartels
 

Plus de Ronald Bartels (20)

Implementing a modern Fusion Centre
Implementing a modern Fusion Centre Implementing a modern Fusion Centre
Implementing a modern Fusion Centre
 
NSA advisory about state sponsored cybersecurity threats
NSA advisory about state sponsored cybersecurity threatsNSA advisory about state sponsored cybersecurity threats
NSA advisory about state sponsored cybersecurity threats
 
The reasons why your business cannot afford to be offline
The reasons why your business cannot afford to be offlineThe reasons why your business cannot afford to be offline
The reasons why your business cannot afford to be offline
 
RADWIN, software defined wide area network, Press Release
RADWIN, software defined wide area network, Press ReleaseRADWIN, software defined wide area network, Press Release
RADWIN, software defined wide area network, Press Release
 
Infrastructure management presented to GPNOG (Updated)
Infrastructure management presented to GPNOG (Updated)Infrastructure management presented to GPNOG (Updated)
Infrastructure management presented to GPNOG (Updated)
 
Infrastructure management using a VPN Concentrator
Infrastructure management using a VPN ConcentratorInfrastructure management using a VPN Concentrator
Infrastructure management using a VPN Concentrator
 
Problem management foundation - Introduction
Problem management foundation - IntroductionProblem management foundation - Introduction
Problem management foundation - Introduction
 
Problem management foundation - Overview
Problem management foundation - OverviewProblem management foundation - Overview
Problem management foundation - Overview
 
Problem management foundation - Perceptions
Problem management foundation - PerceptionsProblem management foundation - Perceptions
Problem management foundation - Perceptions
 
Problem management foundation - Engineering
Problem management foundation - EngineeringProblem management foundation - Engineering
Problem management foundation - Engineering
 
Problem management foundation - Tiger teams
Problem management foundation - Tiger teamsProblem management foundation - Tiger teams
Problem management foundation - Tiger teams
 
Problem management foundation - Lifecycle
Problem management foundation - Lifecycle Problem management foundation - Lifecycle
Problem management foundation - Lifecycle
 
Problem management foundation - Tools
Problem management foundation - ToolsProblem management foundation - Tools
Problem management foundation - Tools
 
Problem management foundation - Analysing
Problem management foundation - AnalysingProblem management foundation - Analysing
Problem management foundation - Analysing
 
Problem management foundation Simulation
Problem management foundation SimulationProblem management foundation Simulation
Problem management foundation Simulation
 
Problem management foundation - IT risk
Problem management foundation - IT riskProblem management foundation - IT risk
Problem management foundation - IT risk
 
Problem management foundation - Continious improvement
Problem management foundation - Continious improvementProblem management foundation - Continious improvement
Problem management foundation - Continious improvement
 
Problem management foundation - Mission control
Problem management foundation - Mission controlProblem management foundation - Mission control
Problem management foundation - Mission control
 
Problem management foundation - Significant havoc in technology
Problem management foundation - Significant havoc in technologyProblem management foundation - Significant havoc in technology
Problem management foundation - Significant havoc in technology
 
Problem management foundation Budget
Problem management foundation BudgetProblem management foundation Budget
Problem management foundation Budget
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Dernier (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Crisis Management Glossary

  • 1. Term Explanation Barrier A physical device or an administrative control used to reduce risk of the undesired outcome to an acceptable level. Barriers can provide physical intervention (e.g., a guardrail) or procedural separation in time and space (e.g., lock-out-tag-out procedure). Cause (Causal Factor) An event or condition that results in an effect. Anything that shapes or influences the outcome. Condition Any as-found state, whether or not resulting from an event, that may have safety, health, quality, security, operational, or environmental implications. Contributing Factor An event or condition that may have contributed to the occurrence of an undesired outcome but, if eliminated or modified, would not by itself have prevented the occurrence. Crisis management The process responsible for managing the wider implications of business continuity. A crisis management team is responsible for strategic issues such as managing media relations and shareholder confidence, and decides when to invoke business continuity plans. Event A real-time occurrence describing one discrete action, typically an error, failure, or malfunction. Examples: pipe broke, power lost, lightning struck, person opened Organizational Factors Any operational or management structural entity that exerts control over the system development, design, fabrication, test, maintenance, operation, and disposal. Examples: resource management (budget, staff, training); policy (content, implementation, verification); and management decisions. Proximate Cause(s) The event(s) that occurred, including any condition(s) that existed immediately before the undesired outcome, directly resulted in its occurrence and, if eliminated or modified, would have prevented the undesired outcome. Also known as the direct cause(s). Root Cause Analysis (RCA) A structured evaluation method that identifies the root causes for an undesired outcome and the actions adequate to prevent recurrence. Root cause analysis should continue until organizational factors have been identified, or until data are exhausted. Root Cause(s) One of multiple factors (events, conditions or organizational factors) that contributed to or created the proximate cause and subsequent undesired outcome and, if eliminated, or modified would have prevented the undesired outcome. Typically multiple root causes contribute to an undesired outcome.