| Literature DB >> 34208018 |
Pieter van Gelder1, Pim Klaassen2, Behnam Taebi1, Bart Walhout3, Ruud van Ommen1, Ibo van de Poel1, Zoe Robaey4, Lotte Asveld1, Ruud Balkenende1, Frank Hollmann1, Erik Jan van Kampen1, Nima Khakzad5, Robbert Krebbers1, Jos de Lange1, Wolter Pieters6, Karel Terwel1, Eelco Visser1, Tiny van der Werff7, Dick Jung7.
Abstract
In this paper, we provide an overview of how Safe-by-Design is conceived and applied in practice in a large number of engineering disciplines. We discuss the differences, commonalities, and possibilities for mutual learning found in those practices and identify several ways of putting those disciplinary outlooks in perspective. The considered engineering disciplines in the order of historically grown technologies are construction engineering, chemical engineering, aerospace engineering, urban engineering, software engineering, bio-engineering, nano-engineering, and finally cyber space engineering. Each discipline is briefly introduced, the technology at issue is described, the relevant or dominant hazards are examined, the social challenge(s) are observed, and the relevant developments in the field are described. Within each discipline the risk management strategies, the design principles promoting safety or safety awareness, and associated methods or tools are discussed. Possible dilemmas that the designers in the discipline face are highlighted. Each discipline is concluded by discussing the opportunities and bottlenecks in addressing safety. Commonalities and differences between the engineering disciplines are investigated, specifically on the design strategies for which empirical data have been collected. We argue that Safe-by-Design is best considered as a specific elaboration of Responsible Research and Innovation, with an explicit focus on safety in relation to other important values in engineering such as well-being, sustainability, equity, and affordability. Safe-by-Design provides for an intellectual venue where social science and the humanities (SSH) collaborate on technological developments and innovation by helping to proactively incorporate safety considerations into engineering practices, while navigating between the extremes of technological optimism and disproportionate precaution. As such, Safe-by-Design is also a practical tool for policymakers and risk assessors that helps shape governance arrangements for accommodating and incentivizing safety, while fully acknowledging uncertainty.Entities:
Keywords: design for values; responsible research and innovation; risk-based design; safe-by-design; secure-by-design; uncertainty
Mesh:
Year: 2021 PMID: 34208018 PMCID: PMC8296130 DOI: 10.3390/ijerph18126329
Source DB: PubMed Journal: Int J Environ Res Public Health ISSN: 1660-4601 Impact factor: 3.390
Design strategies and associated principles.
| Design Method | Principle | |
|---|---|---|
|
| Probabilistic risk-based design | Incorporates target reliability indices, system decomposition into subsystems (fault and event trees), and probabilistic models of stress on and capacity of the system in the design. |
| B | (Deterministic) safety factor-based design | Incorporates multiplication factors on load and resistance variables of the system. |
| C | Fail-safe design/fail-secure design | In engineering, a fail-safe is a design feature or practice that in the event of a specific type of failure, inherently responds in a way that will cause minimal or no harm to other equipment, to the environment, or to people [ |
| D | Active safe design | Involves a reaction to a dangerous event by user intervention. For example, in the car industry, active safety measures are already in operation prior to an accident. |
| E | Passive safe design | Involves a reaction to a dangerous event automatically by natural laws. |
| F | Vandal-proof design | Design against vandalism. |
| G | Idiot-proof/fool-proof design | Design against misuse by end-users or to minimize negative consequences of abuse. |
| H | Fault-tolerant design | System continues processing (possibly at a reduced level) when part of the system fails. |
| I | Circular design | Design that enables maintaining product integrity (i.e., functionality and value) over a long period of time and eliminates waste. |
Manifestations of risk management strategies in different disciplines.
|
|
| |||||||
|
|
|
|
|
|
|
|
|
|
|
| Target failure probabilities are specified, depending on the failure consequences of the structures. | 2510 | Process safety design: Identify failure scenarios and estimate consequences; redesign until risks are below a target level (of 10−6/year/individual). | 361 | Acceptable level of risk calculations based on components. | 1820 | Related to the probabilistic design of infrastructure within the urban environment. | 219 |
|
| Multiplication factors are used on characteristic/ representative values of load and resistance variables. | 15,100 | Anticipate higher loads and weaker resistance by incorporating safety factors in the design. | 4820 | Example: Determining maximum load for strength of wings and other structures. | 12,700 | As above. | 2570 |
|
| Failure of one construction element does not lead to complete collapse. | 2070 | Replace materials with less-hazardous options (e.g., clean with water and detergent rather than a flammable solvent). | 1960 | Example: Statically stable design of aircraft, which means failure of automatic flight control system does not lead to an uncontrollable aircraft. | 17,600 | Related to resilience of the urbanized area. | 1280 |
|
| Actively monitor the construction site to prevent accidents and fatalities. | 374 | Use of sensor and control technology to stabilize pressure and temperature levels. | 357 | Example: Traffic collision avoidance system warns of traffic and advises pilots. | 2360 | Focused on active safe design of road infrastructure in the urban environment. | 672 |
|
| Use passive safe columns to absorb the energy of a collision. | 333 | Gravity taking leaks to safe places; use bunds; avoid knock-on effects. | 730 | Example: Crash structures and seat design. | 1750 | Focused on passive safe design of hazardous industries inside urbanized areas. | 222 |
|
| Use gates, fences, or surveillance cameras. | 8 | Use gates, fences, or surveillance cameras. | 23 | None: Aircraft operate in secure areas and people inside aircraft generally do not want to put themselves in danger. | 177 | Crime prevention by improving natural surveillance in the urban environment. | 8800 |
|
| Careful supervision of design and execution phases of the construction project. | 432 | Make incorrect assembly impossible; ease of control. | 264 | MINIMAL: Airbus aircraft have built in protection against aircraft upset due to incorrect pilot inputs. Highly skilled end-users (pilots) are expected. | 4280 | None. | 0 |
|
| Space between construction elements to accommodate fluctuations in geometrical dimensions. | 1520 | Equipment and processes designed to withstand possible faults or deviations from design. | 2870 | All crucial systems are redundant, sometimes triply or quadruply. A single fault should never lead to a crash. | 20,400 | Related to infrastructural design of the built environment. | 2220 |
|
| Modular construction strategies (“Lego-type” structures). | 125 | Redefine performance to include entire product life cycle; “Nexus” solutions that synergistically solve several sustainability issues. | 115 | MINIMAL: Aircraft are mainly designed for their operational phase. After the operational phase, aircraft are stored or scrapped. | 417 | Green cities. | 107 |
|
|
|
|
|
|
|
|
|
|
|
| Use probabilistic programming or probablistic verification to take uncertainties into account; (For this column we take the software developer’s perspective not the user of the software). | 514 | Escape frequencies as a measure. | 232 | For example, the spread of various areas and species in the environment. | 97 | Explicit modelling of threat actors and their behavior may provide guidance regarding risk level and associated controls. | 98 |
|
| Make software forewards compatible by anticipating on future functional and safety requirements. | 3280 | Found in rationales of SbD but implementation limited. | 5840 | Limiting release may be combined with limiting toxicity. | 846 | Security measures such as cryptographic key lengths should consider future developments (e.g., increased computing power). | 390 |
|
| Use software verification or static analysis tools to ensure that certain properties hold by construction. | 12,500 | Closest to the technical application of Safe-by-Design (e.g., kill switches). | 6350 | Naomaterials used to make fail-safe (construction) materials; rarely used to make nanomaterials themselves safe. | 445 | Intrusion prevention systems aimed at reducing damage from a detected cyberattack. | 2690 |
|
| Programmer manually writes tests or uses program analysis tools to ensure software quality. | 2040 | Closest to the technical application of Safe-by-Design (e.g. biosensors). | 547 | Mostly, nanomaterials used in components for active safety; rarely used to make nanomaterials themselves safe. | 77 | Network monitoring may indicate attacker activity and enable operator responses. | 767 |
|
| Testing or program analysis tools are integrated in the software development pipeline through continuous integration. | 1180 | Closest to the technical application of SbD (e.g. auxotrophy). | 548 | Mostly, nanomaterials used in components for passive safety; rarely used to make nanomaterials themselves safe. | 124 | Decentralized architectures limit the amount of data accessible through a single system. | 253 |
|
| Explicitly validate inputs to provide robust response to all possible inputs, for example, to prevent injection attacks. | 1430 | None. | 3 | None. | 0 | Backups and quick restore procedures make cyber attacks and vandalism less attractive. | 317,000 |
|
| Testing or program analysis tools are integrated in the software development pipeline through continuous integration. | 3870 | Can be understood as biosecurity, not presently covered. | 3130 | Typically refers to synthesis and applications and not so much to safety. | 219 | Privacy-friendly or security-friendly defaults (e.g., multi-factor authentication) may protect users against attacker manipulation (e.g., phishing e-mails). | 2610 |
|
| Explicitly validate inputs to provide robust response to all possible inputs, for example, overflows and illegal memory access. | 17,500 | None. | 4190 | No relation to toxicity. | 0 | Network segmentation limits possibilities for attackers to compromise the whole system. | 12,000 |
|
| Reuse of software through libraries, thereby inheriting safety guarantees of the libraries. | 303 | None. | 371 | Possible tension between Safe-by-Design and circular design (see text). | 81 | Adequate identification of and response to software vulnerabilities, via software updates, is crucial. | 78 |
Note: GS = Google Scholar.
Figure 1Navigating the Scylla of precaution and the Charybdis of innovation through Safe-by-Design.