what-when-how
In Depth Tutorials and Information
related to ship collisions occurring on the Maritime Transport System. his
application identified those contributing factors as well as the conditions and/or
scenarios that increase the possibility of ship accidents between two high-speed
crafts on the open sea. Additionally, the case study provided support for illus-
trating the characteristics associated with the Bayesian Belief Network, which
are as follows:
Modeling of human and organizational factors in a Bayesian Belief Network
can be used as a tool for tuning parameters within other probabilistic models
and performing risk analysis.
Simplify the identification of failures or causal factors at the organizational level.
Probabilities of a Bayesian Belief Network model are easily updateable, which
is beneficial upon introduction of future evidence related to existing factors
over time.
he Bayesian Belief Network model has the potential for further application
in that it can be used as a tool for safety management processes and decision
making at different levels.
9.3 InteragencyAntiterrorism
Information-SharingSystems[14]
A growing concern for interagency communication between counter-terrorism and
emergency management agencies in regard to information sharing and coordina-
tion has come out of the terrorist attacks of 9/11 in 2001, as well as the govern-
ment's response to Hurricane Katrina in 2005. hese occurrences are suicient
evidence to support that emergency management agencies need to improve their
means of information sharing and coordination.
A study was conducted to analyze counterterrorism organizations' acceptance of
inter-organizational information-sharing systems in terms of sociotechnical factors
at a station level [14]. hese factors include information sharing between partners,
sensitivity of shared information, organizational norm of interagency information
sharing, and IT infrastructure [14]. A station is considered to be a physical structure
or establishment of a counterterrorism organization located within a small geograph-
ical area [14]. By defining the study on the station level, data collection from individ-
uals can be aggregated and for multiple responses from a single station, it is required
that confidentiality be maintained of the surveyed counterterrorism organization.
Information sharing commonly occurs among business partners for the pur-
pose of achieving some degree of inancial or economic beneit. hese informa-
tion-sharing relationships have limited confidentiality in regards to public safety
and national security. For this reason, the information sharing between businesses
and government organizations do not directly correlate although they are some-
what comparable. Cooperation between various counterterrorism organizations
Search WWH ::




Custom Search