{"id":"https://openalex.org/W2034896012","doi":"https://doi.org/10.1145/2676680.2676687","title":"Patterns for Sharing Safety System Operation Responsibilities between Humans and Machines","display_name":"Patterns for Sharing Safety System Operation Responsibilities between Humans and Machines","publication_year":2014,"publication_date":"2014-04-10","ids":{"openalex":"https://openalex.org/W2034896012","doi":"https://doi.org/10.1145/2676680.2676687","mag":"2034896012"},"language":"en","primary_location":{"id":"doi:10.1145/2676680.2676687","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2676680.2676687","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 8th Nordic Conference on Pattern Languages of Programs (VikingPLoP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011884117","display_name":"Jari Rauham\u00e4ki","orcid":null},"institutions":[{"id":"https://openalex.org/I4210133110","display_name":"Tampere University","ror":null,"country_code":"FI","type":null,"lineage":["https://openalex.org/I4210133110"]}],"countries":["FI"],"is_corresponding":true,"raw_author_name":"Jari Rauham\u00e4ki","raw_affiliation_strings":["Tampere University of Technology"],"affiliations":[{"raw_affiliation_string":"Tampere University of Technology","institution_ids":["https://openalex.org/I4210133110"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5006365782","display_name":"Seppo Kuikka","orcid":"https://orcid.org/0000-0003-0781-4341"},"institutions":[{"id":"https://openalex.org/I4210133110","display_name":"Tampere University","ror":null,"country_code":"FI","type":null,"lineage":["https://openalex.org/I4210133110"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Seppo Kuikka","raw_affiliation_strings":["Tampere University of Technology"],"affiliations":[{"raw_affiliation_string":"Tampere University of Technology","institution_ids":["https://openalex.org/I4210133110"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5011884117"],"corresponding_institution_ids":["https://openalex.org/I4210133110"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.13668811,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10525","display_name":"Human-Automation Interaction and Safety","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/3207","display_name":"Social Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10525","display_name":"Human-Automation Interaction and Safety","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/3207","display_name":"Social Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10809","display_name":"Occupational Health and Safety Research","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/3614","display_name":"Radiological and Ultrasound Technology"},"field":{"id":"https://openalex.org/fields/36","display_name":"Health Professions"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}},{"id":"https://openalex.org/T11357","display_name":"Risk and Safety Analysis","score":0.9914000034332275,"subfield":{"id":"https://openalex.org/subfields/1804","display_name":"Statistics, Probability and Uncertainty"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/system-safety","display_name":"System safety","score":0.6390262246131897},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6319454908370972},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.6221708059310913},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.560480535030365},{"id":"https://openalex.org/keywords/control-system","display_name":"Control system","score":0.4253070652484894},{"id":"https://openalex.org/keywords/strengths-and-weaknesses","display_name":"Strengths and weaknesses","score":0.423235684633255},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3667607307434082},{"id":"https://openalex.org/keywords/systems-engineering","display_name":"Systems engineering","score":0.3599228858947754},{"id":"https://openalex.org/keywords/reliability-engineering","display_name":"Reliability engineering","score":0.2655159831047058},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.25455692410469055},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.13646480441093445},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08126428723335266}],"concepts":[{"id":"https://openalex.org/C132835097","wikidata":"https://www.wikidata.org/wiki/Q7663745","display_name":"System safety","level":2,"score":0.6390262246131897},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6319454908370972},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.6221708059310913},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.560480535030365},{"id":"https://openalex.org/C17500928","wikidata":"https://www.wikidata.org/wiki/Q959968","display_name":"Control system","level":2,"score":0.4253070652484894},{"id":"https://openalex.org/C63882131","wikidata":"https://www.wikidata.org/wiki/Q17122954","display_name":"Strengths and weaknesses","level":2,"score":0.423235684633255},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3667607307434082},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.3599228858947754},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.2655159831047058},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.25455692410469055},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.13646480441093445},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08126428723335266},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2676680.2676687","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2676680.2676687","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 8th Nordic Conference on Pattern Languages of Programs (VikingPLoP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W610645045","https://openalex.org/W1983885055","https://openalex.org/W2460327171","https://openalex.org/W2512311143","https://openalex.org/W2970049081","https://openalex.org/W6618820360"],"related_works":["https://openalex.org/W2088670227","https://openalex.org/W2263932064","https://openalex.org/W2655426414","https://openalex.org/W4234988843","https://openalex.org/W3197785780","https://openalex.org/W2999377003","https://openalex.org/W2774600646","https://openalex.org/W4380902093","https://openalex.org/W2565796476","https://openalex.org/W1561406825"],"abstract_inverted_index":{"Although":[0],"the":[1,21,28,36,47,62,87,111,114],"automatic":[2],"operations":[3],"of":[4,27,61,100,113],"machines,":[5],"processes,":[6],"and":[7,38,93,104],"systems":[8,37,92,103],"have":[9,43,66],"increased,":[10],"human":[11,94,105],"operators":[12,95,106],"are":[13,70,76,96,107],"still":[14],"typically":[15],"required":[16],"to":[17],"operate":[18,24,35],"or":[19,23,31],"monitor":[20],"system":[22,50,63],"in":[25,39,46],"proximity":[26],"considered":[29],"process":[30],"system.":[32],"As":[33],"people":[34],"their":[40],"proximity,":[41],"they":[42,75],"a":[44,58],"role":[45],"overall":[48],"safety":[49,53,91,102],"operation.":[51],"Automated":[52],"systems,":[54],"which":[55],"primarily":[56],"ensure":[57],"safe":[59],"operation":[60],"under":[64],"control,":[65],"properties":[67],"that":[68,110],"humans":[69],"not":[71,77],"capable":[72],"of,":[73],"but":[74],"perfect":[78],"either.":[79],"In":[80],"this":[81],"paper,":[82],"two":[83],"patterns":[84],"for":[85],"sharing":[86],"responsibilities":[88],"between":[89],"automated":[90,101],"presented.":[97],"The":[98],"strengths":[99],"combined":[108],"so":[109],"weaknesses":[112],"other":[115],"can":[116],"be":[117],"overcome.":[118]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
