SlideShare una empresa de Scribd logo
1 de 14
SAMRISK II project: 
New Strains of Society – Hidden, Dynamic 
and Emergent Vulnerabilities 
SINTEF Technology and Society 
NordForsk Conference 
New trends in societal security research 
in the Nordic countries 
26-27 November 2014, Stockholm 
1 
Tor Olav Grøtan 
Senior Research Scientist 
Dpt of Safety Research 
tor.o.grotan@sintef.no
SINTEF Technology and Society 
• Participants 
• SINTEF Technology and Society, Safety Research 
• The Norwegian University of Science and Technology (NTNU) 
• University of Tulsa, USA 
• Forsvarets Forskningsinstitutt (FFI) 
• ….. 
• Budget: 7MNOK from SAMRISK II 
• Duration: 2014-17 
• Project management SINTEF 
• Fred Størseth (fred.storseth@sintef.no) 
2 
The project
• Adressing vulnerabilities that may be "unknown" in any sense: 
• Ignored – forgotten - never contemplated - impossible to identify - misunderstood or 
underestimated – stemming from emergence, rupture, discontinuity, variability, etc - 
• Presumed impact; society (as a whole) under enormous strain 
• Will the (beliefs in the) institutions endure the strain? 
• The deafening silence from missing answers – or unrealistic assumptions? 
• Will the public still be comforted by "we will revise our routines"? 
• Armed police in Norway November 2014 – of course (?) 
SINTEF Technology and Society 
• Drivers, e.g., 
• New forms of crime - safety & security – climate change , ++ 
• Dependencies, dynamics and dynamism between systems and domains 
• Need for new foci, e.g. 
• From threat pictures to threat landscapes 
• Vulnerability patterns 
3 
New Strains of Society – Hidden, Dynamic and Emergent 
Vulnerabilities
SINTEF Technology and Society 
• A "shrinking" world 
• Where are the boundaries between society and systems? How do multiple systems 
cohere? How can vulnerabilities be identified? Can we see it as an "ecology"? E.g. 
• Safety/security "mindsets" as "industrial enclaves" in an open/dynamic society? 
• 9/11 signifies a crossroad, a new epoch, a rupture/discontinuity 
• Malicious, intended action; terror: A continual, persistent but unspecified threat 
• What is the impact on society, what is the strain? 
• ICT as a central analytical dimension: "the world connected through it" 
• Vulnerabilities when ICT fail 
• Failure, breakdown, disturbance (maintenance), virus/hacking etc etc 
• Vulnerabilities when ICT function as intended (ICT as prime mediator of interaction) 
• ICT as re-presentation technology, as organ-izing technology 
• Shared awareness and understanding? A matter of modelling? 
• Vertbatim vs gist; different (native) languages; Conditions for sensemaking? 
• Intensified potential for vulnerability: The "state of the world" as well as the 
threats and risks defined, transfused and understood by and through ICT 
4 
Some ideas and presumptions
• New threats against society produce new patterns of risk and vulnerability 
• The recognition of this may imply the challenging of some core principles 
• The idea of distinct roles and clear responsibilities: Somebody must "own" (at 
least part of) the problem 
• What if the distinct roles cannot be identified? 
• What if there are no clear areas of responsibility? 
• New threats can "play out" in ways that influence an array of systems 
SINTEF Technology and Society 
• The idea of control: 
• The prevalent imperative of identifying and "translating" risk into cintrollable 
parameters 
• How can we identfy and act on risks that are constantly changing, crossing 
and traversing system boundaries, affecting a number of parties ? 
• We must acknowldge the fact that the "standard toolbox" and approaches are 
insufficient 
• New threats demand new thinking and new methods – for vulnerability as well as risk 
5 
New Strains: Foundations
• Out point of departure is what we actually have (predominantly from industrial safety) 
• Methods, theoretical foundations, views and contemplations 
• The aim is however not just to "re-contextualize" into the societal context. 
• We will approach the borderlines and the impasses – where methods stalemate , 
SINTEF Technology and Society 
where understanding stops 
• We will explore how existing methods and principles can be related to, developed and 
translated into addressing complex landscapes of threats that 
• involve multiple systems in interplay 
• is imprinted by substantial uncertainty , e.g., related to 
• Extent, potential of escalation, degree of danger, vulnerability by coupling 
• can imply generation, transfer and relocation of risk 
• We will build "landscapes" of threat and vulnerability within different areas, e.g.: 
• Offshore activity in sensitive areas 
• Pandemic 
• Critical infrastructure integrated with ICT (incl. "ICT as mediator") 
6 
New Strains; Approach
• Develop an analytical framework for understanding and managing new threats and 
SINTEF Technology and Society 
vulnerabilities towards society 
• The objective is not to generate more knowledge to reduce uncertainty, but 
• to establish new principles for contemplation and approach, and 
• new ways to acknowledge and explore the new strains 
• Point of departure; existing methods and theory, with a special focus on: 
• Risk analysis 
• Barrier management 
• Resilience 
• Stress-testing 
• Intention: to put ourselves (safety science, practice) to the test 
• Establish borderlines and limitations of existing/prevalent approaches 
• Objective: to identifiy how approaches and methods must be developed in order to 
adress the societal threats we will face, including 
• Where it stops – where "control", methods and tools can promise no more 
• Including the new & "promising", e.g. resilience (engineering) 
7 
New Strains; Defined targets
1. The potential of development related to stress-testing as a specific method (e.g., 
simulated barrier breakdown) to address societal threats 
2. Stress-testing in a wider sense, as a principle or metaphor: 
• We intend to "stress-teste" our inventory of approaches and methods – in order 
to identify where and when our "tools" stop working 
SINTEF Technology and Society 
• INCLUDING the recent advances, 
• e.g., resilience (engineering) 
8 
Stress-testing; a double meaning
David D. Woods, 2014 
Hidden, dynamic and 
emergent vulnerabilities 
SINTEF Technology and Society 9 
"STRESS-TESTING 2" 
Society 
… 
Regulator 
…. 
Company 
…. 
Creating, constructing, conditioning…
EXAMPLE. "Pulse of Risk ExploreR" (PuRER): Project proposal Saf€ra (call.safera.eu) 2014 
New safety 
Approaches 
Knowledge 
domain 2 (KD2) 
Stable/known systems Increasingly complex and dynamic systems 
SINTEF Technology and Society 
10 
Prevalent safety approaches 
Knowledge domain 1 (KD1) 
New risk 
management 
Approaches 
(KD2) 
Prevalent risk management approaches 
Knowledge domain 1 (KD1) 
PuRER 
"TORC" 
Compliance vs Resilience 
Emergent 
Generic risk drivers risks 
Sensitization to 
local conditions 
"Safety as 
done"
SINTEF Technology and Society 
"expansion": occasions 
to extend the analytical 
horizon 
"flow": 
(re)-organized attention 
sensitivity to work as done 
"contraction": 
RA revisions 
Selected horizons 
Outcome: 
Approaches & 
methods providing 
increased sensitivity 
to emerging risks. 
Improved risk 
management 
Example: 
Exploring "The Pulse of Risk"
KD2 iNTeg-Risk KD1 = STRESS-TEST!! 
SINTEF Technology and Society 
"expansion": occasions 
to extend the analytical 
horizon 
"flow": 
(re)-organized attention 
sensitivity to work as done 
"contraction": 
RA revisions 
Selected horizons 
Outcome: 
Approaches & 
methods 
providing 
increased 
sensitivity to 
emerging risks. 
Improved risk 
management 
PuRER: Abductive research process 
Theoretical inventory/resources 
+ + "Drift into failure" + + + + + + + 
(TORC) 
Company / regulator practices and prospects 
Main 
metaphor
SINTEF Technology and Society 
• Hermeneutical ideal 
• Continuous exchange 
• Part vs whole 
• Pre-understanding Understanding …. 
• "Safety" or "security" ? 
• Build/understand landscapes of threats 
• Analyse, stress-test our methods & approaches 
13 
Ambition: "Zoom In/Out" in large ("infinite") systems
SINTEF Technology and Society 14 
"Mantra" 
Forget your perfect offering 
There's a crack in everything 
That's where the light gets in 
Leonard Cohen (Anthem)

Más contenido relacionado

Similar a Fred størseth. new strains of society hidden, dynamic and emergent vulnerabilities

Aps easst presentation 2010
Aps easst presentation 2010Aps easst presentation 2010
Aps easst presentation 2010
AdrianPaulSmith
 
Using and Developing Models for Epidemic Infectious Disease Policy – Some exa...
Using and Developing Models for Epidemic Infectious Disease Policy – Some exa...Using and Developing Models for Epidemic Infectious Disease Policy – Some exa...
Using and Developing Models for Epidemic Infectious Disease Policy – Some exa...
mliebenrood
 
IRGC 2013 presentation
IRGC 2013 presentationIRGC 2013 presentation
IRGC 2013 presentation
irgc
 
Diffusion of innovation
Diffusion of innovationDiffusion of innovation
Diffusion of innovation
Nadia
 

Similar a Fred størseth. new strains of society hidden, dynamic and emergent vulnerabilities (20)

Scanning to Manage Disruption and Controversy PACITA 2015
Scanning to Manage Disruption and Controversy PACITA 2015Scanning to Manage Disruption and Controversy PACITA 2015
Scanning to Manage Disruption and Controversy PACITA 2015
 
4th Workshop on Strategic Crisis Management, Presentation, Panel 2- decision ...
4th Workshop on Strategic Crisis Management, Presentation, Panel 2- decision ...4th Workshop on Strategic Crisis Management, Presentation, Panel 2- decision ...
4th Workshop on Strategic Crisis Management, Presentation, Panel 2- decision ...
 
What is cyber resilience?
What is cyber resilience?What is cyber resilience?
What is cyber resilience?
 
Aps easst presentation 2010
Aps easst presentation 2010Aps easst presentation 2010
Aps easst presentation 2010
 
IDRC14-Bouchon-Threvi2
IDRC14-Bouchon-Threvi2IDRC14-Bouchon-Threvi2
IDRC14-Bouchon-Threvi2
 
Towards indicators for 'opening up' science and technology policy
Towards indicators for 'opening up' science and technology policyTowards indicators for 'opening up' science and technology policy
Towards indicators for 'opening up' science and technology policy
 
Using and Developing Models for Epidemic Infectious Disease Policy – Some exa...
Using and Developing Models for Epidemic Infectious Disease Policy – Some exa...Using and Developing Models for Epidemic Infectious Disease Policy – Some exa...
Using and Developing Models for Epidemic Infectious Disease Policy – Some exa...
 
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...
 
Research Needs in Crisis Management - a European Perspective
Research Needs in Crisis Management - a European PerspectiveResearch Needs in Crisis Management - a European Perspective
Research Needs in Crisis Management - a European Perspective
 
David Winickoff, Session 1
David Winickoff, Session 1David Winickoff, Session 1
David Winickoff, Session 1
 
Theorizing ict4d
Theorizing ict4dTheorizing ict4d
Theorizing ict4d
 
Theorizing ict4d
Theorizing ict4dTheorizing ict4d
Theorizing ict4d
 
Diffusion of innovation
Diffusion of innovationDiffusion of innovation
Diffusion of innovation
 
IRGC 2013 presentation
IRGC 2013 presentationIRGC 2013 presentation
IRGC 2013 presentation
 
Diffusion of innovation
Diffusion of innovationDiffusion of innovation
Diffusion of innovation
 
4th Workshop on Strategic Crisis Management, Presentation, Panel 3 - anticipa...
4th Workshop on Strategic Crisis Management, Presentation, Panel 3 - anticipa...4th Workshop on Strategic Crisis Management, Presentation, Panel 3 - anticipa...
4th Workshop on Strategic Crisis Management, Presentation, Panel 3 - anticipa...
 
Foresight 4 Cybersecurity
Foresight 4 CybersecurityForesight 4 Cybersecurity
Foresight 4 Cybersecurity
 
Social Experimentation
Social ExperimentationSocial Experimentation
Social Experimentation
 
Jack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyJack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, Anecdotally
 
Relationship-based Knowledge Mobilization: Systems-based KMb and considerati...
Relationship-based Knowledge Mobilization: Systems-based KMb and considerati...Relationship-based Knowledge Mobilization: Systems-based KMb and considerati...
Relationship-based Knowledge Mobilization: Systems-based KMb and considerati...
 

Más de NordForsk

Peter burgess, prio NORDsteva NCoE
Peter burgess, prio NORDsteva NCoEPeter burgess, prio NORDsteva NCoE
Peter burgess, prio NORDsteva NCoE
NordForsk
 

Más de NordForsk (20)

Radiskan presentation NordForsk
Radiskan presentation NordForskRadiskan presentation NordForsk
Radiskan presentation NordForsk
 
Guðrún Gísladóttir and Guðrún Pétursdóttir NORDRESS 26.nov. 2014
Guðrún Gísladóttir and Guðrún Pétursdóttir NORDRESS 26.nov. 2014Guðrún Gísladóttir and Guðrún Pétursdóttir NORDRESS 26.nov. 2014
Guðrún Gísladóttir and Guðrún Pétursdóttir NORDRESS 26.nov. 2014
 
Ragnar andersson. towards an evidence based zero vision on residential
Ragnar andersson. towards an evidence based zero vision on residentialRagnar andersson. towards an evidence based zero vision on residential
Ragnar andersson. towards an evidence based zero vision on residential
 
Nina græger. the duty of care, protecting citizens abroad.
Nina græger. the duty of care, protecting citizens abroad.Nina græger. the duty of care, protecting citizens abroad.
Nina græger. the duty of care, protecting citizens abroad.
 
Lena näre. insecure lives
Lena näre.  insecure livesLena näre.  insecure lives
Lena näre. insecure lives
 
Lars nyberg cnds
Lars nyberg  cndsLars nyberg  cnds
Lars nyberg cnds
 
Kamrul hussein hu s arctic
Kamrul hussein hu s arcticKamrul hussein hu s arctic
Kamrul hussein hu s arctic
 
Risto kunelius. security, privacy and trust, the legitimation challenge of th...
Risto kunelius. security, privacy and trust, the legitimation challenge of th...Risto kunelius. security, privacy and trust, the legitimation challenge of th...
Risto kunelius. security, privacy and trust, the legitimation challenge of th...
 
Peter burgess. digicom
Peter burgess. digicomPeter burgess. digicom
Peter burgess. digicom
 
Jonas hallberg. securit
Jonas hallberg. securitJonas hallberg. securit
Jonas hallberg. securit
 
Jo helle valle. homerisk
Jo helle valle. homeriskJo helle valle. homerisk
Jo helle valle. homerisk
 
Eija stark. roma and nordic societies historical security practices of the ma...
Eija stark. roma and nordic societies historical security practices of the ma...Eija stark. roma and nordic societies historical security practices of the ma...
Eija stark. roma and nordic societies historical security practices of the ma...
 
Thomas persson. persona, social capital, administrative traditions and crisis...
Thomas persson. persona, social capital, administrative traditions and crisis...Thomas persson. persona, social capital, administrative traditions and crisis...
Thomas persson. persona, social capital, administrative traditions and crisis...
 
Per lagræd. govcap
Per lagræd. govcapPer lagræd. govcap
Per lagræd. govcap
 
Magnus ekengern. crisis management cooperation in europe an empirical investi...
Magnus ekengern. crisis management cooperation in europe an empirical investi...Magnus ekengern. crisis management cooperation in europe an empirical investi...
Magnus ekengern. crisis management cooperation in europe an empirical investi...
 
w Norwegian strategy societal research and development per brekke dsb
w Norwegian strategy societal research and development per brekke dsbw Norwegian strategy societal research and development per brekke dsb
w Norwegian strategy societal research and development per brekke dsb
 
Points for summary, NordForsk conference 26-27 nov 14, Kenneth Pettersen
Points for summary, NordForsk conference 26-27 nov 14, Kenneth PettersenPoints for summary, NordForsk conference 26-27 nov 14, Kenneth Pettersen
Points for summary, NordForsk conference 26-27 nov 14, Kenneth Pettersen
 
NordForsk msb 2014nov27 lundstedt
NordForsk msb 2014nov27 lundstedtNordForsk msb 2014nov27 lundstedt
NordForsk msb 2014nov27 lundstedt
 
Tom Sorell, University of Warwick. partnership for conflict, crime and securi...
Tom Sorell, University of Warwick. partnership for conflict, crime and securi...Tom Sorell, University of Warwick. partnership for conflict, crime and securi...
Tom Sorell, University of Warwick. partnership for conflict, crime and securi...
 
Peter burgess, prio NORDsteva NCoE
Peter burgess, prio NORDsteva NCoEPeter burgess, prio NORDsteva NCoE
Peter burgess, prio NORDsteva NCoE
 

Último

biology HL practice questions IB BIOLOGY
biology HL practice questions IB BIOLOGYbiology HL practice questions IB BIOLOGY
biology HL practice questions IB BIOLOGY
1301aanya
 
Module for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learningModule for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learning
levieagacer
 
Cyathodium bryophyte: morphology, anatomy, reproduction etc.
Cyathodium bryophyte: morphology, anatomy, reproduction etc.Cyathodium bryophyte: morphology, anatomy, reproduction etc.
Cyathodium bryophyte: morphology, anatomy, reproduction etc.
Silpa
 
Reboulia: features, anatomy, morphology etc.
Reboulia: features, anatomy, morphology etc.Reboulia: features, anatomy, morphology etc.
Reboulia: features, anatomy, morphology etc.
Silpa
 
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bAsymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Sérgio Sacani
 
Human genetics..........................pptx
Human genetics..........................pptxHuman genetics..........................pptx
Human genetics..........................pptx
Silpa
 
Digital Dentistry.Digital Dentistryvv.pptx
Digital Dentistry.Digital Dentistryvv.pptxDigital Dentistry.Digital Dentistryvv.pptx
Digital Dentistry.Digital Dentistryvv.pptx
MohamedFarag457087
 

Último (20)

biology HL practice questions IB BIOLOGY
biology HL practice questions IB BIOLOGYbiology HL practice questions IB BIOLOGY
biology HL practice questions IB BIOLOGY
 
PATNA CALL GIRLS 8617370543 LOW PRICE ESCORT SERVICE
PATNA CALL GIRLS 8617370543 LOW PRICE ESCORT SERVICEPATNA CALL GIRLS 8617370543 LOW PRICE ESCORT SERVICE
PATNA CALL GIRLS 8617370543 LOW PRICE ESCORT SERVICE
 
Clean In Place(CIP).pptx .
Clean In Place(CIP).pptx                 .Clean In Place(CIP).pptx                 .
Clean In Place(CIP).pptx .
 
Module for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learningModule for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learning
 
Cyathodium bryophyte: morphology, anatomy, reproduction etc.
Cyathodium bryophyte: morphology, anatomy, reproduction etc.Cyathodium bryophyte: morphology, anatomy, reproduction etc.
Cyathodium bryophyte: morphology, anatomy, reproduction etc.
 
Factory Acceptance Test( FAT).pptx .
Factory Acceptance Test( FAT).pptx       .Factory Acceptance Test( FAT).pptx       .
Factory Acceptance Test( FAT).pptx .
 
Genome sequencing,shotgun sequencing.pptx
Genome sequencing,shotgun sequencing.pptxGenome sequencing,shotgun sequencing.pptx
Genome sequencing,shotgun sequencing.pptx
 
Reboulia: features, anatomy, morphology etc.
Reboulia: features, anatomy, morphology etc.Reboulia: features, anatomy, morphology etc.
Reboulia: features, anatomy, morphology etc.
 
Call Girls Ahmedabad +917728919243 call me Independent Escort Service
Call Girls Ahmedabad +917728919243 call me Independent Escort ServiceCall Girls Ahmedabad +917728919243 call me Independent Escort Service
Call Girls Ahmedabad +917728919243 call me Independent Escort Service
 
Cyanide resistant respiration pathway.pptx
Cyanide resistant respiration pathway.pptxCyanide resistant respiration pathway.pptx
Cyanide resistant respiration pathway.pptx
 
FAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
FAIRSpectra - Enabling the FAIRification of Spectroscopy and SpectrometryFAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
FAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
 
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bAsymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
 
Role of AI in seed science Predictive modelling and Beyond.pptx
Role of AI in seed science  Predictive modelling and  Beyond.pptxRole of AI in seed science  Predictive modelling and  Beyond.pptx
Role of AI in seed science Predictive modelling and Beyond.pptx
 
Human genetics..........................pptx
Human genetics..........................pptxHuman genetics..........................pptx
Human genetics..........................pptx
 
Digital Dentistry.Digital Dentistryvv.pptx
Digital Dentistry.Digital Dentistryvv.pptxDigital Dentistry.Digital Dentistryvv.pptx
Digital Dentistry.Digital Dentistryvv.pptx
 
Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....
Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....
Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....
 
module for grade 9 for distance learning
module for grade 9 for distance learningmodule for grade 9 for distance learning
module for grade 9 for distance learning
 
Grade 7 - Lesson 1 - Microscope and Its Functions
Grade 7 - Lesson 1 - Microscope and Its FunctionsGrade 7 - Lesson 1 - Microscope and Its Functions
Grade 7 - Lesson 1 - Microscope and Its Functions
 
Bhiwandi Bhiwandi ❤CALL GIRL 7870993772 ❤CALL GIRLS ESCORT SERVICE In Bhiwan...
Bhiwandi Bhiwandi ❤CALL GIRL 7870993772 ❤CALL GIRLS  ESCORT SERVICE In Bhiwan...Bhiwandi Bhiwandi ❤CALL GIRL 7870993772 ❤CALL GIRLS  ESCORT SERVICE In Bhiwan...
Bhiwandi Bhiwandi ❤CALL GIRL 7870993772 ❤CALL GIRLS ESCORT SERVICE In Bhiwan...
 
TransientOffsetin14CAftertheCarringtonEventRecordedbyPolarTreeRings
TransientOffsetin14CAftertheCarringtonEventRecordedbyPolarTreeRingsTransientOffsetin14CAftertheCarringtonEventRecordedbyPolarTreeRings
TransientOffsetin14CAftertheCarringtonEventRecordedbyPolarTreeRings
 

Fred størseth. new strains of society hidden, dynamic and emergent vulnerabilities

  • 1. SAMRISK II project: New Strains of Society – Hidden, Dynamic and Emergent Vulnerabilities SINTEF Technology and Society NordForsk Conference New trends in societal security research in the Nordic countries 26-27 November 2014, Stockholm 1 Tor Olav Grøtan Senior Research Scientist Dpt of Safety Research tor.o.grotan@sintef.no
  • 2. SINTEF Technology and Society • Participants • SINTEF Technology and Society, Safety Research • The Norwegian University of Science and Technology (NTNU) • University of Tulsa, USA • Forsvarets Forskningsinstitutt (FFI) • ….. • Budget: 7MNOK from SAMRISK II • Duration: 2014-17 • Project management SINTEF • Fred Størseth (fred.storseth@sintef.no) 2 The project
  • 3. • Adressing vulnerabilities that may be "unknown" in any sense: • Ignored – forgotten - never contemplated - impossible to identify - misunderstood or underestimated – stemming from emergence, rupture, discontinuity, variability, etc - • Presumed impact; society (as a whole) under enormous strain • Will the (beliefs in the) institutions endure the strain? • The deafening silence from missing answers – or unrealistic assumptions? • Will the public still be comforted by "we will revise our routines"? • Armed police in Norway November 2014 – of course (?) SINTEF Technology and Society • Drivers, e.g., • New forms of crime - safety & security – climate change , ++ • Dependencies, dynamics and dynamism between systems and domains • Need for new foci, e.g. • From threat pictures to threat landscapes • Vulnerability patterns 3 New Strains of Society – Hidden, Dynamic and Emergent Vulnerabilities
  • 4. SINTEF Technology and Society • A "shrinking" world • Where are the boundaries between society and systems? How do multiple systems cohere? How can vulnerabilities be identified? Can we see it as an "ecology"? E.g. • Safety/security "mindsets" as "industrial enclaves" in an open/dynamic society? • 9/11 signifies a crossroad, a new epoch, a rupture/discontinuity • Malicious, intended action; terror: A continual, persistent but unspecified threat • What is the impact on society, what is the strain? • ICT as a central analytical dimension: "the world connected through it" • Vulnerabilities when ICT fail • Failure, breakdown, disturbance (maintenance), virus/hacking etc etc • Vulnerabilities when ICT function as intended (ICT as prime mediator of interaction) • ICT as re-presentation technology, as organ-izing technology • Shared awareness and understanding? A matter of modelling? • Vertbatim vs gist; different (native) languages; Conditions for sensemaking? • Intensified potential for vulnerability: The "state of the world" as well as the threats and risks defined, transfused and understood by and through ICT 4 Some ideas and presumptions
  • 5. • New threats against society produce new patterns of risk and vulnerability • The recognition of this may imply the challenging of some core principles • The idea of distinct roles and clear responsibilities: Somebody must "own" (at least part of) the problem • What if the distinct roles cannot be identified? • What if there are no clear areas of responsibility? • New threats can "play out" in ways that influence an array of systems SINTEF Technology and Society • The idea of control: • The prevalent imperative of identifying and "translating" risk into cintrollable parameters • How can we identfy and act on risks that are constantly changing, crossing and traversing system boundaries, affecting a number of parties ? • We must acknowldge the fact that the "standard toolbox" and approaches are insufficient • New threats demand new thinking and new methods – for vulnerability as well as risk 5 New Strains: Foundations
  • 6. • Out point of departure is what we actually have (predominantly from industrial safety) • Methods, theoretical foundations, views and contemplations • The aim is however not just to "re-contextualize" into the societal context. • We will approach the borderlines and the impasses – where methods stalemate , SINTEF Technology and Society where understanding stops • We will explore how existing methods and principles can be related to, developed and translated into addressing complex landscapes of threats that • involve multiple systems in interplay • is imprinted by substantial uncertainty , e.g., related to • Extent, potential of escalation, degree of danger, vulnerability by coupling • can imply generation, transfer and relocation of risk • We will build "landscapes" of threat and vulnerability within different areas, e.g.: • Offshore activity in sensitive areas • Pandemic • Critical infrastructure integrated with ICT (incl. "ICT as mediator") 6 New Strains; Approach
  • 7. • Develop an analytical framework for understanding and managing new threats and SINTEF Technology and Society vulnerabilities towards society • The objective is not to generate more knowledge to reduce uncertainty, but • to establish new principles for contemplation and approach, and • new ways to acknowledge and explore the new strains • Point of departure; existing methods and theory, with a special focus on: • Risk analysis • Barrier management • Resilience • Stress-testing • Intention: to put ourselves (safety science, practice) to the test • Establish borderlines and limitations of existing/prevalent approaches • Objective: to identifiy how approaches and methods must be developed in order to adress the societal threats we will face, including • Where it stops – where "control", methods and tools can promise no more • Including the new & "promising", e.g. resilience (engineering) 7 New Strains; Defined targets
  • 8. 1. The potential of development related to stress-testing as a specific method (e.g., simulated barrier breakdown) to address societal threats 2. Stress-testing in a wider sense, as a principle or metaphor: • We intend to "stress-teste" our inventory of approaches and methods – in order to identify where and when our "tools" stop working SINTEF Technology and Society • INCLUDING the recent advances, • e.g., resilience (engineering) 8 Stress-testing; a double meaning
  • 9. David D. Woods, 2014 Hidden, dynamic and emergent vulnerabilities SINTEF Technology and Society 9 "STRESS-TESTING 2" Society … Regulator …. Company …. Creating, constructing, conditioning…
  • 10. EXAMPLE. "Pulse of Risk ExploreR" (PuRER): Project proposal Saf€ra (call.safera.eu) 2014 New safety Approaches Knowledge domain 2 (KD2) Stable/known systems Increasingly complex and dynamic systems SINTEF Technology and Society 10 Prevalent safety approaches Knowledge domain 1 (KD1) New risk management Approaches (KD2) Prevalent risk management approaches Knowledge domain 1 (KD1) PuRER "TORC" Compliance vs Resilience Emergent Generic risk drivers risks Sensitization to local conditions "Safety as done"
  • 11. SINTEF Technology and Society "expansion": occasions to extend the analytical horizon "flow": (re)-organized attention sensitivity to work as done "contraction": RA revisions Selected horizons Outcome: Approaches & methods providing increased sensitivity to emerging risks. Improved risk management Example: Exploring "The Pulse of Risk"
  • 12. KD2 iNTeg-Risk KD1 = STRESS-TEST!! SINTEF Technology and Society "expansion": occasions to extend the analytical horizon "flow": (re)-organized attention sensitivity to work as done "contraction": RA revisions Selected horizons Outcome: Approaches & methods providing increased sensitivity to emerging risks. Improved risk management PuRER: Abductive research process Theoretical inventory/resources + + "Drift into failure" + + + + + + + (TORC) Company / regulator practices and prospects Main metaphor
  • 13. SINTEF Technology and Society • Hermeneutical ideal • Continuous exchange • Part vs whole • Pre-understanding Understanding …. • "Safety" or "security" ? • Build/understand landscapes of threats • Analyse, stress-test our methods & approaches 13 Ambition: "Zoom In/Out" in large ("infinite") systems
  • 14. SINTEF Technology and Society 14 "Mantra" Forget your perfect offering There's a crack in everything That's where the light gets in Leonard Cohen (Anthem)

Notas del editor

  1. Eksempel PuRER
  2. Visualizing (different) cases ?
  3. Abuktivt premiss for nyutvikling av metoder NS: Stressteste våre egne nyutviklinger …. Tvinges til å definere gyldighetsområde