Sikkerhet MTO

Promoting onshore planners’ ability to address offshore safety hazards
The terms of interaction and concurrent learning in the definition of integrated operations
Applying a security conceptual model for coverage analysis
Visualizing complex processes on large screen displays: Design principles based on the Information Rich Design concept
Selection and identification of a shape function for modeling degradation as a gamma process
Empirical insights on operators’ procedure following behavior in nuclear power plants
The development of the MFM Editor and its applicability for supervision, diagnosis and prognosis
Enhancing CHASSIS: A Method for Combining Safety and Security
Requirements management in a combined process for safety and security assessments
Presenting a traceability based approach for safety argumentation
Simulation of bronchial mucociliary clearance of insoluble particles by computational fluid and particle dynamics methods
Distinguishing three accounts of situation awareness based on their domains of origin
Teamwork competence requirements in nuclear power plant control rooms
Assessing the quality of collaboration in an integrated operations organization
Towards an understanding of information needed when planning offshore activities
Evaluating usability of the Halden Reactor Large Screen Display: Is the Information Rich Design concept suitable for real-world installations?
Seeing the big picture: Principles for dynamic process data visualization on large screen displays
Promoting safer decisions in future collaboration environments – mapping of information and knowledge onto a shared surface to improve onshore planner’s hazard identification
An empirical investigation of team decision-making with emergency procedures
Developing safe control systems using patterns for assurance
Procedures and practices - Challenges for decommissioning management and teamwork
Human-centred radiological software techniques supporting improved nuclear safety
Comparing risk identification techniques for safety and security requirements