skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 148027 Find in a Library
Title: INCIDENT CAUSATION MODEL
Journal: Journal of Security Administration  Volume:16  Issue:2  Dated:(1993)  Pages:3-9
Author(s): J Fay
Date Published: 1993
Page Count: 7
Type: Training (Aid/Material)
Format: Article
Language: English
Country: United States of America
Annotation: This article explains the structure and use of the Incident Causation Model (ICM), which is designed to determine why a security-related loss occurred, who was responsible, and what should be done to keep it from recurring.
Abstract: The ICM can be used by security professionals to examine actual and potential loss-producing incidents. A loss-producing incident is "an undesired event that results in harm to people or loss to property or process." The structure of the ICM is a pyramid. At the top of the pyramid is the loss. Below it in descending order are the incident (violation), opportunities, and management failures. Analysis of the loss from the incident may encompass lost time, increased operating costs, property losses, and loss of business. The event that precipitates the loss is the incident, which often stems from a combination of violations. The opportunities for an incident are the circumstances present in a situation at or immediately prior to the conduct that produced the incident. Opportunities are nonsecure situations. In the ICM, the primary focal point for analysis and corrective action is at the base of the pyramid, i.e., management failures. Management failures occur in the promulgation of policy and work rules and especially in the setting of standards. When using the model as a tool for factfinding and preventing recurrence of the incident, the security practitioner starts with an examination of the incident and works downward through the pyramid. Proactive analysis, however, begins at the bottom of the pyramid and works toward the top. 7 references
Main Term(s): Crime prevention planning
Index Term(s): Business security; Crime analysis; Models; Occupational safety and health; Security management
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=148027

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.