Table 16: Adaptive risk identification with scenario of risk weight threshold: hetero-hetero.
Elements in level 1
Risk factor Risk weight Risk (푆푙푠)
푆푂 퐷 푤푆 푤푂 푤퐷 GRPN (푅푙푠푒) 푇푙푠 Identify risk
푅 111 5 8 1 0.6 0.3 0.1 0.69 0.55 Yes
푅 112 5 8 4 0.3 0.6 0.1 0.81 0.78 Yes
푅 113 2 5 8 0.3 0.1 0.6 0.70 0.50 Yes
푅 114 2 9 3 0.6 0.1 0.3 0.42 0.62 No
푅 115 9 4 2 0.6 0.1 0.3 0.72 0.75 No
푅 116 5 9 5 0.3 0.6 0.1 0.85 0.61 Yes
푅 117 5 2 4 0.6 0.3 0.1 0.57 0.55 Yes
analysis on correlation and regression to compare it to the
traditional (TRPN-based) approach. To understand how the
proposed model works, we use a healthcare example as a
potential application of the proposed GRPN-based FMEA
model. An illustrated example of Down syndrome test is
given, and the computation of GRPNs is explained in detail.
We introduce two application modes based on experience
and preference. The experience-based mode allows the user
to choose a risk factor combination arbitrarily. This mode
can be used in different organizations, departments, or
processes, by estimating historical data of failure modes for
each of the risk factors (SOD). Under the preference-based
mode, we assume that the organization always defines a risk
management policy to identify failure modes. Therefore, the
weight combination is determined by the policy, for example,
(H,L,M).Afterselectingtheweightcombination,wesetthe
GRPN threshold to determine if the failure modes exist.
However, this paper only discusses two of various stochastic
models for the risk factor distribution, that is, uniform and
normal. In fact, there are numerous distributions in real
world. More realistically, future work can pay more attention
to testing and validation for various distributions.
Conflict of Interests
The authors declare that there is no conflict of interests
regarding the publication of this paper.
Acknowledgment
This paper is sponsored by the National Science Council of
Taiwan (NSC 98-2410-H-227-004).
References
[1] R. Y. Shtykh and Q. Jin, “A human-centric integrated approach
to web information search and sharing,”Human-Centric Com-
puting and Information Sciences,vol.1,p.2,2011.
[2] N.Y.YenandS.Y.F.Kuo,“Anintergratedapproachforinternet
resources mining and searching,”Journal of Convergence,vol.3,
no. 2, pp. 37–44, 2012.
[3] D. Hubbard,The Failure of Risk Management: Why It’s Broken
and How to Fix It, John Wiley & Sons, New York, NY, USA, 2009.
[4] ISO,ISO/IEC Guide 73:2009 Risk Management-Vocabulary,
2009.
[5] H. VanCott, “Human errors: their causes and reduction,” in
Human Error in MEdicine,M.S.Bogner,Ed.,pp.82–98,
Lawrence Erlbaum Associates, Hillsdale, NJ, USA, 1994.
[6] S. Ternov, “The human side of medical mistakes,” inError
ReductioninHealthCare:ASystemsApproachtoImproving
Patient Safty,P.L.Spath,Ed.,pp.97–138,AHAPress,Chicago,
Ill, USA, 2002.
[7] American Hospital Association,Hospital Statistics,American
Hospital Association, Chicago, Ill, USA, 1999.
[8] Centers for Disease Control and Prevention-National Center
for Health Statistics, “Births and deaths: preliminary data for
1998,”National Vital Statistics Reports, vol. 47, no. 25, p. 6, 1999.
[9]T.S.Lesar,B.M.Lomaestro,andH.Pohl,“Medication-
prescribing errors in a teaching hospital: A 9-year experience,”
Archives of Internal Medicine,vol.157,no.14,pp.1569–1576,1997.
[10] E. J. Thomas, D. M. Studdert, H. R. Burstin et al., “Incidence
and types of adverse events and negligent care in Utah and
Colorado,”Medical Care,vol.38,no.3,pp.261–271,2000.
[11] L. T. Kohn, J. M. Corrigan, and M. S. Donaldson, Eds.,To Err
Is Human: Building a Safer Health System, Institute of Medicine,
National Academy Press, Washington, DC, USA, 2000.
[12] BS5760:Part5,Reliability of Systems, Equipment and Compo-
nents. Guide to Failure Modes, Effects and Criticality Analysis,
1991.
[13]D.Werth,A.Emrich,andA.Chapko,“Prosumerizationof
mobile service provision: a conceptual approach,”International
Journal of Web Portals,vol.3,no.4,pp.44–55,2011.
[14] J. K.-Y. Ng, “Ubiquitous healthcare: healthcare systems and
applications enabled by mobile and wireless technologies,”
Journal of Convergence,vol.3,no.2,pp.15–20,2012.
[15]A.K.DeyandD.Estrin,“Perspectivesonpervasivehealth
from some of the field’s leading researchers,”IEEE Pervasive
Computing,vol.10,no.2,pp.4–7,2011.
[16] W. Kaiser and M. Sarrafzadeh, “Introduction to special issue on
wireless health,”Transactions on Embedded Computing Systems,
vol. 10, no. 1, article 10, 2010.
[17] S. Deng, C. Youn, Q. Liu, H. Y. Kim, T. Yu, and Y. H. Kim, “Policy
adjuster-driven grid workflow management for collaborative
heart disease identification system,”Journal of Information
Processing Systems,vol.4,no.3,pp.103–112,2008.
[18] M.Lee,J.-W.Lee,K.-A.Kim,andS.S.Park,“Evaluatingservice
description to guarantee quality of U-service ontology,”Journal
of Information Processing Systems,vol.7,no.2,pp.287–298,2011.
[19] J. C. Augusto, V. Callaghan, D. Cook, A. Kameas, and I.
Satoh, “Intelligent environments: a manifesto,”Human-Centric
Computing and Information Sciences,vol.3,p.12,2013.