Description
Unlock the power of ROOT CAUSE ANALYSIS with the NEW 4th Edition of the Root Cause Analysis Handbook with its downloadable resources and 22″x34″ RCA Map™ − the gold standard in root cause analysis (RCA)
COMING JUNE 1, 2026
The Root Cause Analysis Handbook offers the unique breadth, depth, and practicality that can only come from five authors with a wellspring of 150+ years of combined consulting experience in the fields of risk/reliability engineering, risk management, incident investigation/root cause analysis, hazard analysis, process safety, environmental safety, loss prevention, asset integrity, and professional/ technical training.
Are you ready to transform your approach to incident investigation and risk management?
The Root Cause Analysis Handbook is your essential guide, backed by over 150 years of combined expertise from five seasoned authors. This comprehensive resource combines real-world experience with a proven methodology, making it the gold standard in root cause analysis (RCA).
Why This Handbook is a Must-Have:
- Expert Insights: Learn from professionals with extensive backgrounds in risk/reliability engineering, incident investigation, process safety, and more. Their hands-on experience ensures you receive practical, applicable knowledge.
- Global Best Practices: Benefit from methodologies developed by an international consulting firm with 50+ years of success across 35+ countries. This book presents field-tested strategies tailored for various industries, NGOs, and government agencies.
- Practical Toolkit: The accompanying 300+ page downloadable toolkit includes:
- Cause and Effect Trees: Easily adaptable templates for thorough analysis.
- Sample Plans: Step-by-step guides for effective investigation.
- Forms and Checklists: Streamline your processes with ready-to-use resources.
- Exclusive Access: Enjoy ongoing support with licensed access to ABS Consulting’s website, featuring a wealth of articles, charts, and tools to keep you informed and effective in your RCA efforts.
Comprehensive Learning Experience:
This 700+-page package offers a deep dive into the SOURCE methodology—Seeking Out the Underlying Causes of Events—enabling you to uncover the root causes of incidents and implement effective corrective actions.
- Step-by-Step Guidance: Navigate each phase of RCA, from initiating investigations to reporting and trending findings.
- Visual Tools: Utilize the Root Cause Map™, a vibrant 22″ x 34″ wall chart that simplifies the coding and identification of root causes.
- Detailed Appendices: Enhance your understanding with five comprehensive appendices covering glossaries, causal factor charts, timelines, and more.
Who Should Read This Book?
- Professionals in Quality, Reliability, and Safety: If you’re responsible for managing risk or ensuring safety in your organization, this handbook is essential for your toolkit.
- Students and Educators: Perfect for classroom use, this resource supports learning in college courses and professional development programs worldwide.
Equip yourself with the knowledge and tools to minimize risks and improve your processes! Don’t miss out—secure your copy of the Root Cause Analysis Handbook today and take the first step toward excellence in incident investigation!
- Based on a real-world, globally successful, proprietary methodology by an international consulting firm with 50+ years’ experience in 35+ countries, serving an impressive array of industries, NGOs, and government agencies. You’ll find field-tested, easily adaptable methods to improve your own processes and get management buy-in.
- Practical 300+-page download toolkit including examples of Cause and Effect Trees and sample templates; examples of Cause and Effect Timelines and sample templates; toolkits for Investigating, Data Gathering, Data Analysis, etc.; extensive forms, checklists, questionnaires, and sample plans; as well as a resource list of recommended books, websites, organizations, etc. (Secure download link provided upon registration).
- Root Cause Map™ (full color wall chart 22″ x 34″), a powerful tool for staff to use in identifying and coding root causes (Mailed separately upon registration if not shipped with purchased book).
- Licensed access to ABS Consulting’s website for an abundant collection of new/archival articles, examples, charts, forms, etc., as an ongoing way to stay abreast of the field.
- Chapter introductions/summaries; sample plans; examples of incidents drawn from many industries; five appendices packed with step-by-step instructions for conducting every phase of RCA; numerous charts, checklists, and reproducible forms; and a glossary all facilitate classroom use in college courses and professional development programs.
Root Cause Analysis Handbook breakdown for professionals and college students
This comprehensive, 600-page package (book + downloads + RCA 22″ x 34″ map + online resources) presents the field-tested SOURCE™ methodology, or Seeking Out the Underlying Causes of Events, from ABS Consulting, an international firm with 50+ years of experience in 35+ countries. This model customizes, combines, and encapsulates global best practices for investigating incidents following any loss. For example, this handbook covers losses related to people, equipment, software, structural failure, and other factors. The methodology addresses (1) incident investigation and (2) corrective and preventive action requirements found in many regulations, industry standards, and guidance documents.
The SOURCE™ system for incident investigation
The SOURCE™ system enables businesses to generate specific, concrete recommendations to prevent incident recurrences. Using factual data from any incident, this model can also help you implement more reliable, cost-effective practices that result in major, long-term improvements. Such process improvements increase your business’s ability to recover from and prevent incidents that pose financial, legal, health, and safety risks.
Included are tips and tools for developing an ongoing incident investigation program and — importantly — successfully dealing with the resulting management, corporate culture, and process changes often required.
SCOPE AND ORGANIZATION OF THE ROOT CAUSE ANALYSIS HANDBOOK
The five authors use their collective global experience to guide you step-by-step through every phase of conducting a root cause analysis, including investigating, categorizing, reporting, and trending, and ultimately eliminating the root causes of incidents with quality, reliability, environmental, health, safety, and production-process impacts.
They focus on how to apply structured analysis techniques, including the use of ABS Consulting’s Root Cause Map™, to two levels of analyses: apparent cause analyses (ACAs) and root cause analyses (RCAs). They also provide instructions for performing these activities along with flow diagrams, forms, checklists, charts, and sample plans:
Initiating the investigation
How to determine whether an incident has occurred, how to classify and categorize the incident, and finally, how to decide whether to conduct an in-depth investigation.
Data gathering
How to collect data related to people, processes, procedures, documents (both hard copy and electronic), position, and physical data associated with an incident.
Data analysis
How to analyze incidents to determine causal factors using tools such as causal factor charts, timelines, and cause-and-effect trees. Guidance is also provided on identifying root causes using ABS Consulting’s Root Cause Map. You’ll find this roadmap as a convenient pull-out, color-coded, 22″ x34″ chart.
Developing recommendations
This book will also help you document causal factors and root causes identified during an analysis. It will also include guidance on identifying what changes (i.e., recommendations) may be needed to enhance management systems and reduce risks.
Reporting and trending
How to archive findings and recommendations to allow review and trending of incident patterns after SOURCE™ use.
Root Cause Analysis Handbook Appendices
In addition to the hundreds of pages of downloads with forms, checklists, and sample plans, five detailed Appendices add to making this 700+-page package the most comprehensive and real-world resource available for root cause analysis:
Appendix A: Glossary
Clarifies terms often used differently by different groups.
Appendix B: Timeline Details
Provides in-depth information about the use, development, and construction of timelines. Example timelines are also included. This appendix supplements information provided in Section 4, “Analyzing Data.”
Appendix C: Cause and Effect Tree Details
Provides in-depth information about the use, development, and construction of causal factor charts. Example causal factor charts are also included. This appendix supplements information provided in Section 4, “Analyzing Data.”
Appendix D: SOURCE™ Investigator’s Toolkit
Provides summary guidance and resources. For example, it will include checklists and forms to document incident investigation activities.
The Root Cause Analysis Handbook is widely used in corporate training programs and college courses worldwide. For this reason, we recommend you purchase this book if you’re responsible for quality, reliability, safety, and/or risk management. In addition, you’ll want this comprehensive and practical resource at your fingertips and in your cause analysis library!
June, 2026, 448 pages PLUS 22″x34″ Root Cause Map™ and supplemental resources
ISBN 978-1-944480-85-1 PRINT
ISBN 978-1-944480-86-8 PDF eBOOK
ISBN 978-1-944480-87-5 ePUB eBOOK
WHAT'S NEW IN THE NEW 2026 4TH EDITION
The 2026 edition of the Root Cause Analysis Handbook incorporates many updates and new features. ABS Consulting’s SOURCE™ incident investigation methodology continues to evolve based on our experience using the technique, observation of customers using the tools we provide, plus feedback from our clients. The changes incorporated into this edition make the use of the SOURCE™ methodology even more efficient and effective:
- Three new sections
- A new section (11) for legal professionals who are involved in investigations.
- A new section (12) for supervisors and reviewers of investigations.
- A new section (13) for preparing personnel to become members of your investigation teams.
- Addition of real-world stories demonstrating the application of the SOURCE™ Methodology
- These real-world stories are based on decades of applying the methodology to problems and issues like yours.
- Addition of summary inserts into all major sections
- Each section is summarized to help you quickly find the content you need.
- Callouts to referenced materials in the SOURCEtm Investigator’s Toolkit and the RCA Handbook Resources website.
- These link the content of the Handbook to the implementation forms and checklists available as part of the SOURCEtm Investigator’s Toolkit and the online RCA Handbook resources.
- More details and examples
- More detailed explanations of the steps in the SOURCEtm investigation process and more examples to demonstrate the application of the techniques.
- Improved templates and online resources
- Easier-to-use templates for development of timelines, cause and effect trees, and root cause identification.
- Multiple formats – print and ebook
- Colored diagrams and flowcharts in the e-book version
What hasn’t changed?
- The high-quality guidance you have come to expect from ABS Consulting.
- Access to our RCA Handbook Resources with extensive templates, forms, and checklists.
- Integration with the Root Cause Mapm and the Root Cause Mapm online guidance
- Simple and practical tools to analyze simple to complex issues.
Excerpt from the FOREWORD
Organizations across industries experience incidents ranging from near misses to major loss events. You should understand the causes of these incidents because many regulations require it, and industry initiatives encourage it. But more importantly, the root cause analysis process helps your organization learn from past performance and develop strategies to improve safety, reliability, quality, financial performance, and the overall work environment for your personnel.
ABS Consulting’s SOURCE™ (Seeking Out the Underlying Root Causes of Events) methodology, presented in this handbook, is flexible enough to analyze incidents with safety, health, environmental, quality, reliability, production, security, and financial impacts in almost any industry.
The SOURCE™ methodology provides an effective and efficient approach for investigating incidents of any magnitude. The application of the SOURCE™ techniques by ABS Consulting personnel and our clients ensures that these methodologies are field-proven, not just theories. The objectives of the SOURCE™ approach are to provide an investigation approach and tools that:
- Guides incident investigators in identifying the causes (causal factors, intermediate causes, and root causes) of incidents.
- Provides organizations with a structured approach for developing recommendations to address the causes of incidents.
- Applies to a wide variety of types of incidents (including fires/explosions, manufacturing errors, equipment malfunctions, and customer complaints) with consequences ranging from minor to major.
- Applies to a wide variety of types of operations, including manufacturing, chemical processing, logistics/transportation, mining, governmental operations, forensics, consumer services, and many others.
- Is sufficiently flexible to allow customization to each client’s management system, health, safety, and environment programs, or related initiatives.
- Facilitates analysis of losses, whether they are related to safety, the environment, security, reliability, quality, or business losses.
- Supports compliance with root cause analysis and incident investigation-related industry guidelines and regulations.
The SOURCE™ Methodology
The SOURCE™ RCA methodology addresses the (1) incident investigation and (2) corrective and preventive action program requirements found in many regulations, industry standards, and guidance documents.
Scope of the Handbook
The focus of this handbook is on the application of structured analysis techniques, including the use of ABS Consulting’s Root Cause Map™, to the root cause analysis (RCA) process. The Handbook is structured around three classes, or levels of investigations: Class 1 (simple), Class 2 (intermediate), to Class 3 (very complex). The sections in this handbook generally apply to all three levels or classes of analyses. For example, the data gathering techniques covered in the handbook apply to all three levels (classes) of investigations. However, some details applicable to Class 3 incidents (i.e., rare, catastrophic incidents) are beyond the scope of this handbook.
This handbook provides detailed guidance for performing RCA activities, including:
- Initiating the investigation: How to determine whether an investigation should be performed, how to classify and categorize the incident, and how to determine the appropriate depth of analysis.
- Data gathering: How to collect data related to people, processes, procedures, documents (both hard copy and electronic), position, and physical data associated with an incident.
- Data analysis: How to analyze incidents to determine causal factors using tools such as timelines and cause-and-effect trees. Guidance is also provided on identifying root causes using ABS Consulting’s Root Cause Map™.
- Developing recommendations: How to identify what changes (i.e., recommendations) may be needed to enhance management systems and reduce risk to a tolerable level.
- Documenting the analysis: How to develop a report that will efficiently and effectively communicate the results of the analysis to others.
- Reporting and trending: How to document findings and recommendations to allow review and trending of incident patterns after some period of SOURCE™ use.
Contents of the Handbook
Each of the 13 sections of this handbook focuses on one aspect of the incident investigation process. The handbook sections are as follows:
Section 1: Basics of Incident Investigation presents a basic overview of the SOURCE™ investigation process. It describes the reasons why an organization should perform investigations and includes basic definitions of terms used in the handbook.
Section 2: Initiating Investigations describes the steps an organization must perform before the investigation begins, such as setting up processes for incident classification and team selection.
Section 3: Gathering and Preserving Data provides guidance for gathering and preserving the different types of data that are needed for an investigation.
Section 4: Analyzing Data discusses two different methods (timelines and cause and effect trees) for analyzing the data that has been collected.
Section 5: Identifying Root Causes describes the use of ABS Consulting’s Root Cause Map™ to assist in identifying the underlying causes of incidents.
Section 6: Developing Recommendations explains the different types of recommendations that should be developed to ensure that the highest return is obtained from the analysis.
Section 7: Completing the Investigation describes the activities that should be performed to complete an investigation.
Section 8: Selecting Incidents for Analysis provides guidance on determining which incidents need to be analyzed.
Section 9: Data and Results Trending explains the method for setting up and monitoring a trending system. Trending is used to identify chronic incidents that trigger analyses.
Section 10: Program Development describes the process of setting up the overall incident investigation program.
Section 11: Legal Aspects of Investigations is specifically aimed at legal professionals involved in guiding investigations.
Section 12: Supervising and Reviewing Investigations is specifically aimed at individuals that provide guidance to personnel performing investigations.
Section 13: Preparing Investigation Team Members for an Investigation is intended to provide an overview of the investigation process for personnel that will participate, but not lead, an investigation.
Additional information that can help the reader use the SOURCE™ approach is provided in the appendices:
Appendix A: Glossary provides definitions of and notes on terms used in this handbook.
Appendix B: Timeline Details provides in-depth information about the use, development, and construction of timelines. Example timelines are also included. This appendix supplements information provided in Section 4, “Analyzing Data.”
Appendix C: Cause and Effect Tree Details provides in-depth information about the use, development, and construction of cause and effect trees. Example cause and effect trees are also included. This appendix supplements information provided in Section 4, “Analyzing Data.”
Appendix D: ABS Consulting’s Root Cause Analysis Handbook Resources describes the content of ABS Consulting’s web resources, including the Root Cause Map. The Root Cause Map guidance presents detailed descriptions of the individual nodes (or items) on the map. The Root Cause Map™ itself is included as part of the SOURCE™ Investigator’s Toolkit in Appendix E.
Appendix E: SOURCE™ Investigator’s Toolkit provides summary guidance and resources (such as checklists and forms) that can be used to document incident investigation activities.
Contents
Each of the 13 sections of this handbook focuses on one aspect of the incident investigation process. The handbook sections are as follows:
Section 1: Basics of Incident Investigation presents a basic overview of the SOURCE™ investigation process. It describes the reasons why an organization should perform investigations and includes basic definitions of terms used in the handbook.
Section 2: Initiating Investigations describes the steps an organization must perform before the investigation begins, such as setting up processes for incident classification and team selection.
Section 3: Gathering and Preserving Data provides guidance for gathering and preserving the different types of data that are needed for an investigation.
Section 4: Analyzing Data discusses two different methods (timelines and cause and effect trees) for analyzing the data that has been collected.
Section 5: Identifying Root Causes describes the use of ABS Consulting’s Root Cause Map™ to assist in identifying the underlying causes of incidents.
Section 6: Developing Recommendations explains the different types of recommendations that should be developed to ensure that the highest return is obtained from the analysis.
Section 7: Completing the Investigation describes the activities that should be performed to complete an investigation.
Section 8: Selecting Incidents for Analysis provides guidance on determining which incidents need to be analyzed.
Section 9: Data and Results Trending explains the method for setting up and monitoring a trending system. Trending is used to identify chronic incidents that trigger analyses.
Section 10: Program Development describes the process of setting up the overall incident investigation program.
Section 11: Legal Aspects of Investigations is specifically aimed at legal professionals involved in guiding investigations.
Section 12: Supervising and Reviewing Investigations is specifically aimed at individuals that provide guidance to personnel performing investigations.
Section 13: Preparing Investigation Team Members for an Investigation is intended to provide an overview of the investigation process for personnel that will participate, but not lead, an investigation.
Additional information that can help the reader use the SOURCE™ approach is provided in the appendices:
Appendix A: Glossary provides definitions of and notes on terms used in this handbook.
Appendix B: Timeline Details provides in-depth information about the use, development, and construction of timelines. Example timelines are also included. This appendix supplements information provided in Section 4, “Analyzing Data.”
Appendix C: Cause and Effect Tree Details provides in-depth information about the use, development, and construction of cause and effect trees. Example cause and effect trees are also included. This appendix supplements information provided in Section 4, “Analyzing Data.”
Appendix D: ABS Consulting’s Root Cause Analysis Handbook Resources describes the content of ABS Consulting’s web resources, including the Root Cause Map. The Root Cause Map guidance presents detailed descriptions of the individual nodes (or items) on the map. The Root Cause Map™ itself is included as part of the SOURCE™ Investigator’s Toolkit in Appendix E.
Appendix E: SOURCE™ Investigator’s Toolkit provides summary guidance and resources (such as checklists and forms) that can be used to document incident investigation activities.
What’s New in the 2026 4th Edition of the Root Cause Analysis Handbook ……….v
List of Figures………………………………………………… xvii
List of Tables………………………………………………………… xxi
List of Acronyms ……………………………………………………….. xxiii
Limitations of Liability………………………………………………… xxiv
Acknowledgments……………………………………………. xxiv
Foreword ………………………………………………. xxv
Background …………………………………………………………………………………………… xxv
The SOURCE™ Methodology…………………………………………………………………. xxvi
Scope of the Handbook …………………………………………………………………………. xxvii
Contents of the Handbook………………………………………………………………………. xxvii
Section 1 Basics of Incident Investigation………………………1
1.1 The Need for Incident Investigation…………………………..1
1.2 Rationale for Taking a Structured Approach to Incident Investigation………1
1.3 Depths of Analyses……………………………………..2
1.4 Structured Analysis Process……………………………………………4
1.5 Selecting Incidents to Investigate……………………………………5
1.6 The Investigation Thought Process…………………………………………………………………5
1.6.1 Differences Between Traditional Problem Solving and Structured RCA……….5
1.6.2 The Typical Investigator……………………………………………………………………..6
1.6.3 A Structured Approach to the Analysis………………………………………………..7
1.7 Relationship Between Proactive Analysis, Management Systems, and
Reactive Analysis……………………………………………………………………………..8
1.8 The Elements of an Incident…………………………………………………..9
1.9 The Goal of Your Incident Investigation Process……………………….10
1.10 Overview of the SOURCE™ Methodology………………..12
1.11 The SOURCE™ Methodology………………………..12
1.11.1 Steps That Apply to Single Event Analyses…………………………………………12
1.11.2 Steps That Apply to Chronic Incident Analyses…………………………………..15
1.11.3 Steps That Apply When No Formal Analysis Is Performed…………………..16
1.11.4 Steps That Apply to All Analyses………………………………………………………17
1.12 Classes of Investigations………………………………….17
1.13 Definitions…………………………………………….18
1.14 Software……………………………………………..23
1.15 Summary………………………………………24
1.16 Applying Section 1 to Your Investigations………………….24
Section 2 Initiating Investigations……………………………………….25
2.1 Introduction…………………………………………………………..25
2.2 Investigation Triggers…………………………………………………………………………………27
2.3 Initial Reports……………………………………………………………………………………………28
2.4 Local Incident Reporting and Entry into the Incident Software………..29
2.5 Incident Classification………………….30
2.6 Notifications………………………………………32
2.7 Team Composition……………………………………33
2.8 Chartered Investigations………………………………………36
2.9 Investigation Management Tasks……………….36
2.10 Beginning the Investigation……………………………………37
2.11 Interfacing with Emergency and Immediate Response Activities……….38
2.12 Restart Criteria………………………………39
2.13 Gathering Investigation Resources…………………………40
2.14 Application to Three Classes of Investigations…………….41
2.15 Software………………………………………………………………41
2.16 Summary………………………………………………….42
2.17 Applying Section 2 to Your Investigations…………………..42
Section 3 Gathering and Preserving Data…………………………….43
3.1 Introduction…………………………………………………………………43
3.2 General Data-gathering and Preservation Issues………………….43
3.2.1 Importance of Data-gathering……………………………………………………………43
3.2.2 Types of Data………………………………………………………………………………….45
3.2.3 Prioritizing Data-gathering Efforts…………………………………………………….45
3.2.3.1 People Data Fragility Issues………………………………………………47
3.2.3.2 Electronic Data Fragility Issues…………………………………………48
3.2.3.3 Physical/Position Data Fragility Issues……………………………….48
3.2.3.4 Paper Data Fragility Issues……………………………………………….48
3.2.4 Gathering Data…………………………………………………………..49
3.3 Gathering Data from People…………………………..49
3.3.1 Factors to Assess the Credibility of People Data………………………………….50
3.3.2 Initial Witness Statements…………………………………………………………………51
3.3.3 The Interview Process………………………………………………………………………52
3.3.3.1 Before the Interviews……………………………………………………….53
3.3.3.2 Beginning the Interview…………………………………………………..55
3.3.3.3 Conducting the Interview………………………………………………….56
3.3.3.4 Concluding the Interview………………………………………………….57
3.3.3.5 Follow-up Interviews……………………………………………………….59
3.4 Physical Data……………………..59
3.4.1 Sources of Physical Data…………………………………………………………………..59
3.4.2 Types and Nature of Physical Data Analysis Questions………………………..60
3.4.3 Basic Steps in Failure Analysis………………………………………………………….60
3.4.4 Use of Physical Data Analysis Plans…………………………………………………. 64
3.4.5 Chain of Custody for Physical Data……………………………………………………65
3.4.6 Use of Outside Experts…………………………………………………………………….65
3.4.7 Summary of Physical Data Analysis…………………………………………………..65
3.5 Paper Data……………………………………65
3.6 Electronic Data…………………………………….66
3.7 Position Data……………………………..67
3.7.1 Documentation of Photos and Videos…………………………………………………68
3.7.2 Alternative Sources of Position Data………………………………………………….68
3.8 Overall Data-collection Plan…………………………………………69
3.10 Application to the Three Classes of Analyses………………….70
3.11 Software………………………….70
3.12 Summary……………………………………….70
3.13 Applying Section 3 to Your Investigations………………71
Section 4 Identifying Causal Factors…………………………….73
4.1 Introduction……………………………………………..73
4.2 Overview of the Causal Factor Identification Techniques………….75
4.3 Timelines………………………………………………..77
4.3.1 Timeline Development Steps…………………………………………………………….77
4.3.2 Example Timeline……………………………………………………………………………79
4.3.3 Advantages and Disadvantages of Timelines……………………………………….85
4.3.4 Details on Timeline Development………………………………………………………85
4.4 Cause and Effect Trees…………………………………………85
4.4.1 CAET Development Steps………………………………………………………………..86
4.4.2 CAETs Versus the 5-Whys Technique………………………………………………..90
4.4.3 Confirming and Contradicting Data…………………………………………………..91
4.4.4 Advantages and Disadvantages of CAETs…………………………………………..93
4.4.5 Details on CAET Development………………………………………………………….94
4.5 Using Multiple Analysis Techniques During an Investigation………….94
4.6 Causes Versus Causal Factors…………………..96
4.7 Supplementary Causal Factor Identification Techniques………97
4.8 Addressing Items of Note……………………………….98
4.9 Application to the Three Classes of Analyses……………………98
4.10 Software………………………………………….100
4.11 Summary……………………………………………..100
4.12 Applying Section 4 to Your Investigations…………………………………………………..100
Section 5 Identifying Root Causes………………………………103
5.1 Introduction…………………………………………………….103
5.2 Typical Root Cause Analysis Issues……………………………………106
5.2.1 Equipment Issues…………………………………………………………………………..107
5.2.2 Human Performance Issues…………………………………………………………….107
5.2.3 External Event Issues……………………………………………………………………..108
5.3 Procedure for Identifying Root Causes……………………108
5.4 ABS Consulting’s Root Cause Map™…………………………… 110
5.5 The Structure of the Root Cause Map™……………………………………………………. 110
5.6 Root Cause Identification and Coding Using the Root Cause Map™……… 113
5.6.1 The Five Steps………………………………………………………………………………. 113
5.6.2 Partial Root Cause Map™ Paths……………………………………………………… 119
5.6.3 Multiple Coding…………………………………………………………………………….121
5.6.4 Incorporating Organizational Standards, Policies, and
Administrative Controls………………………………………………………………….122
5.6.5 Using the Root Cause Map™ Guidance During an Investigation…………122
5.6.6 Typical Problems Encountered When Using the Root Cause Map™…….123
5.6.7 Advantages and Disadvantages of Using the Root Cause Map™………….126
5.7 Documenting the Root Cause Analysis Process…………………..126
5.8 Application to the Three Classes of Analyses…………….134
5.9 Application to Items of Note…………………………..134
5.10 Software……………………………………………….135
5.11 Summary……………………………………………..135
5.12 Applying Section 5 to Your Investigations……………………..136
Section 6 Developing Recommendations…………………..137
6.1 Introduction……………………………………….137
6.2 Characteristics of Effective Recommendations………….139
6.3 Recommendation Terminology…………………………………………….140
6.4 The Four Levels of Recommendations…………………………………… 141
6.4.1 Level 1: Address the Causal Factor………………………………………………….. 141
6.4.2 Level 2: Address the Intermediate Causes of the Specific Problem………. 141
6.4.3 Level 3: Fix Similar Problems………………………………………………………….142
6.4.4 Level 4: Correct the Process That Creates These Problems…………………. 143
6.4.5 Recommendation Levels on the Task Triangle…………………………………..146
6.4.6 Recommendation Levels and ISO Terminology…………………………………146
6.5 Hierarchy of Controls………………………………………………. 147
6.5.1 Eliminate the Hazard………………………………….148
6.5.2 Make the System Inherently Safer or More Reliable – Reduce,
Substitute, Isolate/Separate, Engineer……………………………………………….148
6.5.3 Administrative and Procedural Controls…………………………………………..149
6.5.4 Personal Protective Equipment (PPE)……………………………………………….149
6.5.5 Implementing Multiple Types of Recommendations…………………………..149
6.6 Prevention Versus Mitigation of an Incident………………………..150
6.6.1 Prevent Occurrence of the Incident…………………………………………………..150
6.6.2 Detect and Mitigate the Loss…………………………………………………………..150
6.7 Suggested Format for Recommendations………………………………. 151
6.8 Recommendation Should Be Measurable……………………….152
6.9 No Action May Be Appropriate………………..153
6.10 Restart, Provisional, and Interim Recommendations……………..154
6.11 Ranking of Recommendations…………………….156
6.12 Management Review and Resolution of Recommendations………….156
6.13 Assessing Risks Associated with Recommendation Implementation……158
6.13.1 Quantitative Benefit/Cost Ratios………………………………………………………159
6.13.2 Qualitative Assessment of Benefits and Costs…………………………………… 161
6.14 Implementing Recommendations……………………………….162
6.15 Recommendation Verification…………………………………………..162
6.16 Assessing Recommendation Effectiveness……………………..163
6.17 Application to the Three Classes of Analyses and Items of Note…….166
6.17.1 Classes of Investigations…………………………………………………..166
6.17.2 Involvement of Third Parties in Class 3 Investigations……………………….167
6.17.3 Development of Recommendations for Items of Note…………………………167
6.18 Software…………………………………………………..168
6.19 Summary…………………………………………………………………………169
6.20 Applying Section 6 to Your Investigations………………………..169
Section 7 Completing the Investigation……………………………………..171
7.1 Introduction……………………………………………………………… 171
7.2 Writing Investigation Reports……………………………………. 171
7.2.1 Typical Items to Be Included in an Investigation Report……………………..173
7.2.2 Tips for Writing Reports………………………………………………………………… 176
7.2.3 The Diverse Needs of Different Groups…………………………………………… 178
7.3 Review and Approval of the Report……………………………… 179
7.4 Communicating Investigation Results……………………………….180
7.4.1 Type of Communications Associated with an Investigation…………………180
7.4.2 Decide to Whom the Results Should Be Communicated…………………….. 181
7.4.3 Decide How to Distribute the Information……………………………………….. 181
7.4.4 Document the Communications……………………………………………………….182
7.5 Resolving Recommendations…………………………182
7.6 Addressing Final Issues…………………………………………………………………………….182
7.6.1 Entering Trending Data…………………………………………………………………..182
7.6.2 Report Scoring………………………………………………………………………………184
7.6.3 Evaluate the Investigation Process……………………………………………………184
7.7 Application to the Three Classes of Analyses………………………..185
7.8 Software……………………………………….186
7.9 Summary………………………………………………………….186
7.10 Applying Section 7 to Your Investigations……………….186
Section 8 Selecting Incidents for Analysis………………………………..189
8.1 Introduction………………………………………189
8.2 Not Investigating Enough Incidents……………………….189
8.3 Investigating Too Many Incidents………………….190
8.4 Selecting the Right Number of Incidents Using the Right Criteria………192
8.5 Other Learning from Experience Methods………………………..193
8.6 Risk Matrix Approach……………………………………………..194
8.7 Some General Incident Selection Guidance……………….196
8.7.1 Incidents to Investigate (High Potential Learning Value)…………………….197
8.7.2 Incidents to Trend and Potentially Investigate……………………………………198
8.7.3 No Investigation (Low Potential Learning Value)………………………………198
8.8 Near Misses……………………………….199
8.8.1 Factors to Consider When Defining Near Misses……………………………….199
8.8.2 Why Near Misses Should Be Investigated…………………………………………199
8.8.3 Barriers to Getting Near Misses Reported………………………………………..200
8.8.4 Overcoming the Barriers…………………………………………………………………201
8.9 Identifying Chronic Incidents That Should Be Analyzed…………………………….201
8.9.1 Using Pareto Analysis for Environmental, Health, and Safety
Incidents…………………………………….201
8.9.1.1 Examples of Pareto Analysis……………………………………………..202
8.9.1.2 Weaknesses of Pareto Analysis………………………………………….205
8.9.2 Chronic Analysis of Reliability and Quality Problems………………………..205
8.9.2.1 Prioritizing the RCA Efforts……………………………………………..206
8.9.2.2 Repeating the Process………………………………………………………206
8.9.3 Other Chronic Analysis Identification Tools………………………………………206
8.10 Turning This Guidance Into Practical Guidelines………………….207
8.11 Application to the Three Classes of Analyses………………………………………………207
8.12 Software………………………………………………….207
8.13 Summary………………………………………………………………………………..207
8.14 Applying Section 8 to Your Investigations……………………………….208
Section 9 Data and Results Trending………………………………………….209
9.1 Introduction……………………………………………………………………………………………..209
9.2 Benefits of a Trending Program………………………………………………..209
9.3 Determining the Data to Collect……………………………………………….. 211
9.3.1 Deciding What Data to Collect……………………………………………………….. 213
9.3.2 Defining the Data to Collect…………………………………………………………… 215
9.3.3 Other Data-collection Guidance……………………………………………………… 216
9.4 Data Analysis…………………………………………………. 216
9.4.1 Interpreting Data Trends………………………………………………………………… 217
9.5 Application to Three Classes of Analyses…………………………….. 218
9.6 Software……………………………………………………….. 218
9.7 Summary…………………………………………………… 218
9.8 Applying Section 9 to Your Investigations…………………………. 218
Section 10 Program Management………………………………………..219
10.1 Introduction……………………………………………… 219
10.2 Program Implementation Process………………………………………. 219
10.2.1 Design the Program……………………………………………………………………….221
10.2.2 Develop the Program……………………………………………………………………..222
10.2.3 Implement the Program…………………………………………………………………..224
10.2.4 Monitor the Program’s Performance…………………………………………………224
10.2.5 Improve the Program……………………………………………………………………..225
10.3 Legal Considerations and Guidelines……………………………………….225
10.4 Media Considerations………………………………………227
10.5 Selected Regulatory Requirements and Industry Standards…………….228
10.6 Training Guidelines……………………………………………………..229
10.7 Management’s Influence on the Program……………………………………………….231
10.8 Large-scale (Class 3) Investigation Issues………………………….232
10.9 Common Investigation Problems and Solutions………………………..232
10.9.1 There Is No Business Driver to Change…………………………………………….232
10.9.2 There Is No Organizational Champion for the Program………………………233
10.9.3 The Organization Never Leaves the Reactive Mode……………………………233
10.9.4 The Organization Must Find an Individual to Blame………………………….234
10.9.5 Personnel Are Unwilling to Critique Management Systems………………..234
10.9.6 Implementation of Recommendations Is Not Rewarded…………………….234
10.9.7 The Organization Tries to Investigate Everything………………………………235
10.9.8 The Organization Only Performs Incident Investigations on
Large Incidents………………………………………………235
10.9.9 Recommendations Are Never Implemented………………………………………236
10.10 Software……………………………………………236
10.11 Summary…………………………….236
10.12 Applying Section 10 to Your Investigations…………………236
Section 11 Incident Investigation and RCA for Legal Professionals…………..239
11.1 Introduction/Overview………………………………………………………….239
11.2 How Attorney-Directed Investigations Relate to Other Potential
Investigations…………………………………………………………………….240
11.3 What a Formal RCA Can Do to Support an Attorney……………..241
11.4 Keys to an Effective Attorney-Directed Investigation…………………….243
11.5 Understanding the Client Situation…………………………244
11.5.1 The Starting Point: A Generic Loss Event/Consequence Type
Stakeholder Matrix…………………………………………….244
11.5.2 Replace the Generic Likelihoods with the Actual Consequences………….246
11.5.3 Replace Generic Consequences with Actual Consequences…………………248
11.5.4 Replace Generic Potentially Affected and Interested
Stakeholder Assessments with Actual Assessments……………………………250
11.6 Specifying the Scope of the Investigation………………………..252
11.6.1 What Issues Are in Scope/Out of Scope (Breadth of the Analysis)……….252
11.6.2 Level of Causal Analysis (Depth of the Analysis)………………………………254
11.6.3 Will Recommendations Be Developed?…………………………………………255
11.7 Structuring/Charting the Investigation…………………….256
11.7.1 Specifying the Communication and Documentation Requirements………256
11.7.2 Getting the Right People on the Team………………………………………………257
11.8 Staying Involved…………………………………257
11.9 Apply the Results of the Investigation to Meet the Client/Company’s Needs……259
11.10 Concerns with Performing an RCA and Some Mitigation Strategies……………….260
11.11 Typical Issues Where Outside Investigation Support Is Appropriate……………….260
11.12 Overview of the Investigation Process…………………………………………………………261
11.13 Software…………………………………………………264
11.14 Summary………………………………………………….264
11.15 Applying Section 11 to Your Investigations………………………………….264
Section 12 Supervising and Reviewing Investigations…………………….265
12.1 Introduction………………………………………………………………………265
12.2 Relationship of This Section to the Rest of the Handbook…………..265
12.3 The Supervisor as an Advocate for the Investigation Team……………267
12.4 Typical Issues Where You Can Help Your Investigation Teams…………….267
12.4.1 Incident Classification…………………………………………………………………….267
12.4.2 Anticipated Level of Effort……………………………………………………………..268
12.4.3 Someone or Something Is Preventing the Investigation Team From Completing the Investigation in an Efficient and Effective Manner………….269
12.4.4 Which Causes Should Be Causal Factors or Root Causes?………………..270
12.4.4.1 Not All Causes Are Causal Factors…………………………………..270
12.4.5 How Much Focus Should We Place on External Organizations
and Their Contributions to the Incident?……………………………271
12.4.6 For Sensitive Issues, How Much Detail Should Be Included in
the Report?………………………………………………………………272
12.4.7 When Analyzing Chronic Incident Data, When Does the Data
Show a Problem That Is Actionable?………………………………………………..272
12.5 Reviewing Recommendations Before a Report Is Finalized………..273
12.6 Reviewing Final Drafts of Investigation Reports…………….274
12.7 Reviewing Final Reports………………….275
12.8 Application to Three Classes of Analyses……………….275
12.9 Software………………………….275
12.10 Summary……………………………..275
12.11 Applying Section 12 to Your Investigations……………276
Section 13 Preparing Investigation Team Members for an Investigation………277
13.1 Introduction………………………………………………..277
13.2 Relationship of This Section to the Rest of the Handbook…………277
13.3 The Goals of the Investigation……………………279
13.4 What the Investigation Team Will Do…………………..279
13.5 The Role of Team Members…………………………………281
13.6 Getting the Investigation Started………………………..281
13.7 General Guidance for Team Personnel…………….281
13.8 Application to Three Classes of Analyses……………….281
13.9 Software………………………………………………………….282
13.10 Summary……………………………………………………………………..282
13.11 Applying Section 13 to Your Investigations……………..282
Appendix A Glossary…………………………………………………..283
Appendix B Timeline Details………………………………….291
B.1 Introduction………………………………………………….291
B.2 Timeline Example……………………………………292
B.3 Overall Timeline Guidance…………………………………298
B.3.1 Electronic Versus Hard-copy Development……………………………………….298
B.3.2 Keep the Level of Detail Manageable……………………………………………….299
B.3.3 Color Coding for Different Types of Data…………………………………………299
B.4 Rules for Building Blocks………………………………………………………………………….300
B.4.1 Use Complete Sentences…………………………………………………………………301
B.4.2 Only One Idea Per Building Block…………………………………………………..301
B.4.3 Be as Specific as Possible………………………………………………………………..301
B.4.4 Document the Source for Each Event and Condition…………………………..302
B.5 Rules for Questions……………………………………………………303
B.6 Timeline Construction………………………………………………………………………………303
B.6.1 Step 1 – Identify the Loss Events……………………………………………………..304
B.6.2 Step 2 – Identify the Actors…………………………………………………………….304
B.6.3 Step 3 – Develop Building Blocks and Add Them to the Timeline……….304
B.6.4 Step 4 – Generate Questions and Identify Data Sources to Fill
in Gaps…………………………..305
B.6.5 Step 5 – Gather Data………………………………………………………………………305
B.6.6 Step 6 – Add Additional Building Blocks to the Timeline…………………..305
B.6.7 Step 7 – Determine Whether the Sequence of Events Is Complete……….305
B.6.8 Step 8 – Identify Causal Factors and Items of Note…………………………….306
B.7 Example Timeline Development…………………….306
B.7.1 Step 1 – Identify the Loss Events……………………………………………………..307
B.7.2 Step 2 – Identify the Actors…………………………………………………………….307
B.7.3 Step 3 – Develop Building Blocks and Add them to the Timeline………..308
B.7.4 Step 4 – Generate Questions and Identify Data Sources to Fill
in Gaps, Step 5 – Gather Data, and Step 6 – Add Additional Building Blocks to the Timeline……………………309
B.7.5 Step 7 – Determine Whether the Sequence of Events Is Complete………. 317
B.7.6 Step 8 – Identify Causal Factors and Items of Note……………………………. 319
Appendix C Cause and Effect Tree Details…………………………321
C.1 Introduction to Cause and Effect Tree Analysis…………………….321
C.2 Cause and Effect Tree Basics……………………………..321
C.2.1 Gates Used on CAETs…………………………………………………………………….321
C.2.2 Multiple Gates on a CAET………………………………………………………………323
C.2.3 Hard Copy and Electronic Formats…………………………………………………..324
C.2.4 Layout Options for CAETs………………………………………………………………325
C.3 Confirming and Contradicting Data…………………….327
C.4 A Completed Example…………………………………330
C.5 Symbols Used on a CAET………………………………..335
C.6 Helpful Generic CAET Structures…………………….335
C.6.1 Generic Structures for Equipment Performance Gaps…………………………336
C.6.2 Human Performance Structures……………………………………………………….338
C.6.3 Generic CAET Structures for “Failure to Prevent, Detect,
and Correct”……………………………….340
C.7 Cause and Effect Tree Examples…………………..342
C.7.1 OR Gate Examples…………………………………………………………………………342
C.7.2 AND Gate Examples………………………………………………………………………345
C.7.3 Example of Combinations of AND and OR Gates……………………………..347
C.8 Application of CAET Analysis to a Simple Failure……………..349
C.9 Steps for Developing a Cause and Effect Tree……………… 351
C.9.1 Step 1. Define the Loss Event(s) of Interest……………………………………….352
C.9.2 Step 2. Add Potential Causes/Contributors to the Next Level
of Each Branch of the Tree………………………………………………………………352
C.9.3 Step 3. Assign an AND or OR Gate to This Level/Branch
of the Tree…………………………353
C.9.4 Step 4. Test the Logic of the Tree……………………………………………………..354
C.9.5 Step 5. Collect and Document Sufficient Confirming and
Contradicting Data for Each Branch to Assign One of the Four Outcomes in Step 6………356
C.9.6 Step 6. Assign an Outcome to Each Branch of the Tree………………………357
C.9.8 Step 8. Confirm All Causal Factors Are Identified……………………………..357
C.10 Worked Example………………………….358
C.11 Conclusion…………………….362
C.12 Additional Resources Available on ABS Consulting’s Web Site……….362
Appendix D SOURCE™ Investigator’s Toolkit………………………..363
Pocket Guide to Performing Investigations………………………………364
Responsibilities of the RCA/II Team Leader……………………………367
Investigation Plan………………………………………368
Investigation Data Needs Checklist…………………………………370
Investigation Data Needs Checklist – Blank…………………………….372
Incident Scene Tour Checklist…………………………………373
Initial Witness Statement……………………………………374
Incident Investigation – Near Miss or Accident………………………….374
Interview Preparation Form………………………………………….376
Interview Documentation Form…………………………………..378
Physical Data Analysis Plan – Parts Analysis………………………………….380
Physical Data Analysis Plan – Sample/Chemical Analysis………………….382
Photography Guidelines……………………………………………..384
Videography Guidelines………………………………………….385
Causal Factor, Root Cause, and Recommendation Checklist……………………..392
Report and Investigation Checklist……………………………393
Index ………………………….395
About the Authors……………………………………………..417
Credits ……………………………………………………………419
About Rothstein Publishing…………………………………………419
How to Get Your Free Bonus Resource Materials………….420
About the Authors
Root Cause Analysis Handbook is written by a team of five international consultants with a combined experience of nearly 150 years in the fields of risk/reliability engineering, risk management, incident investigation/root cause analysis, hazard analysis, process safety, environmental safety, loss prevention, asset integrity, and professional/technical training.
They are all on the staff of ABS Consulting, a Houston-based firm specializing in global safety, risk, and integrity management for half a century and operating in over 35 countries. The company serves customers in the oil and gas, chemical, nuclear, maritime, renewable energy, mining, food processing, hospitality, and transportation industries as well as government agencies.
Julie E. Ott, S.E., P.E., is a Senior Manager of Engineering, lead root cause analysis investigator, and instructor. Ms. Ott has over 30 years of experience in structural engineering, risk analysis, physical security, root cause analysis, incident investigation, and evidence preservation.
Ms. Ott has investigated the effects of natural and man-made extreme loads on numerous types of structures. She has provided construction, retrofit, and reconstruction design and project management on projects throughout the United States, Canada, Mexico, Africa, and Europe. She has assisted numerous refining, chemical, manufacturing, and power (nuclear and fossil) facilities in incident investigations, evidence preservation, root cause analysis, and structural deconstruction support/analysis following significant operational incidents. She also leads ABS Consulting’s training department and provides instruction in incident investigation and RCA methods.
Ms. Ott is a security subject-matter expert for the U.S. Department of Homeland Security, Infrastructure Security Compliance Division, providing support to DHS ISCD on physical security for chemical facilities. In addition, she consults for DoD and DoE on structural Forced Entry/Ballistic Ratings (FE/BR) of facilities worldwide.
Ms. Ott was recognized as the 2008 Utah Engineer of the Year by the Governor of Utah and the Utah Engineers Council, which represents 15 national engineering chapters. In addition, she has served the Structural Engineers Association
of Utah (SEAU) as President, Vice President, and Member of the Board for 7 years, and served on/chaired the Programs Committee for 18 years.
Lee N. Vanden Heuvel is a senior investigator and lead course instructor. Mr. Vanden Heuvel has over 35 years of experience in plant operations, analysis, and performance improvement.
He provides consulting services and instruction in root cause analysis (RCA),
cultural cause analyses (CCAs), incident investigation, human factors, conduct of operations, and organizational culture assessment and improvement. He has performed numerous investigations of incidents involving health, safety, and environmental (HSE), reliability, manufacturing, and quality issues ranging from small- to large-scale projects across a wide variety of industries. These include: upstream/midstream/downstream oil and gas, pharmaceuticals, electrical power production/distribution/renewables/storage, chemical processing, transportation, manufacturing, nuclear power/waste, and law enforcement/forensics.
He has developed and implemented the organization’s RCA, CCA, and large-scale investigation protocols. He was the project manager and lead analyst for a large quantitative risk assessment program. Mr. Vanden Heuvel worked for 8 years at a nuclear power plant, serving in various capacities. His duties included providing procedural interpretations, operational advice, and technical specification interpretations; supervising the operation and modification of the plant’s full-scope control room simulator; and providing classroom and simulator instruction in plant operations, procedures, academic topics, and plant systems.
Contact Rothstein Associates, Inc. to request a complimentary copy to evaluate for classroom use.
Instructor's Materials
Root Cause Analysis Handbook has been widely adopted for use in college courses and corporate professional development programs. The book and its accompanying downloads include many helpful tools for classroom instruction.
The book includes chapter introductions and summaries; sample plans; examples of incidents drawn from a wide variety of industries; five appendices packed with step-by-step instructions for conducting an incident investigation, writing reports and communicating about it, and implementing the recommendations; numerous charts, checklists, and reproducible forms; and a glossary.
Accompanying the book are practical tools that give students the opportunity to apply what they are learning, including:
- Wall-size (22″ x 34″), color-coded flow chart illustrating all the key steps in the root cause analysis process.
- Companion downloads packed with…
- Examples of Cause and Effect Trees and a sample template
- Examples of Timelines and a sample template
- Toolkits for Investigating, Data Gathering, Data Analysis, etc.
- Plentiful forms and checklists
- Resource list of recommended books, websites, organizations, etc.
See the EXCERPTS Tab above and click on Section 11 for a complete list of ancillary resources available in the companion downloads and the ABS Consulting website
Purchasers of the book also receive licensed access to the ABS Consulting website for new and archival information on root cause analysis, including charts, forms, and related materials.
Contact Rothstein Associates, Inc. to request a complimentary copy to evaluate for classroom use.
Figure 1.1. Task Triangle Showing Possible Depths of Analyses……………3
Figure 1.2. Overlap of Multiple Task Triangles…………………….3
Figure 1.3. Relationship Between Proactive Analysis, Management Systems, and
Reactive Analysis……………………………..8
Figure 1.4. Connection Among the Loss Event, Causal Factors, Root Causes, and
Recommendations………………………………..11
Figure 1.5. Steps in the SOURCE™ Methodology…………………..13
Figure 1.6. General Relationship Between the Classes of Investigations, the
Number of Investigations Performed, and the Associated Level of Effort………….18
Figure 1.7. Connection Among the Loss Event, Causal Factors, Intermediate
Causes, and Root Causes…………………………………………..22
Figure 2.1. “Initiate Investigation” Within the Context of the Overall Incident
Investigation Process…………………………………….26
Figure 3.1. “Gather Data” Within the Context of the Overall Incident
Investigation Process……………………………………………………….. 44
Figure 3.2. Types of Data Sources……………………………….45
Figure 3.3. General Fragility of Data Types……………………46
Figure 3.4. The Interview Process……………………………………..52
Figure 3.5. Basic Steps in Physical Data Analysis………………61
Figure 4.1. “Identify Causal Factors” Within the Context of the Overall Incident
Investigation Process………………………..74
Figure 4.2. Relationship of “Causal Factor Identification” with the Other Major
Analysis Steps……………………….75
Figure 4.3. Job Aid for Developing a Timeline……………………….77
Figure 4.4. Four Requirements for Building Blocks (Events, Conditions, Loss
Events) on Timelines…………………………………..78
Figure 4.5. Sandblasting Timeline Example (page 1 of 5)……………..80
Figure 4.6. Job Aid for Developing CAETs………………….87
Figure 4.7. Example Cause and Effect Tree (page 1 of 2) ………..88
Figure 4.8. Cause and Effect Tree Showing a Multiple-Event Failure……………91
Figure 4.9. Example CAET Showing Confirming and Contradicting Data…….92
Figure 4.10. Small Portion of a Cause and Effect Tree……………….94
Figure 4.11. Portion of a Timeline with Integrated CAET…………………95
Figure 5.1. “Identify Root Causes” Within the Context of the Overall
Investigation Process…………………………104
Figure 5.2. Connection Between the Steps of the Investigation……………109
Figure 5.3. Structure of ABS Consulting’s Root Cause Map™……………….. 111
Figure 5.4. Five General Areas of the Root Cause Map™…………… 112
Figure 5.5. An Example of a Why Tree Constructed Following Steps 2 Through
4 of the Root Cause Identification Process………………………… 115
Figure 5.6. Levels of the Root Cause Map™………………………………. 117
Figure 5.7. Example of a Complete Root Cause Map™ Path………………….120
Figure 5.8. Document Hierarchy………………………123
Figure 5.9. Documenting the Root Cause Identification Process on the 3-Column Table……127
Figure 5.10. Sources of Information for Completing the 3-Column Table………128
Figure 5.11. Example of a Completed 3-Column Table (Example 1)…………..129
Figure 5.12. Example of a Completed 3-Column Table (Example 2)………….130
Figure 5.13. Why Tree Associated with 3-Column Table in Figure 5.12………….. 131
Figure 5.14. Example of a Completed 3-Column Table (Example 3)…………132
Figure 5.15. Why Tree Associated with 3-Column Table in Figure 5.14…………133
Figure 6.1. Developing Recommendations Within the Context of the Overall
Incident Investigation Process……………..138
Figure 6.2. Connections Among the Loss Event, Causal Factors, Root Causes,
and Recommendations………………………………………….139
Figure 6.3. Recommendation Levels on the Task Triangle…………….146
Figure 6.4. Example Hierarchy of Controls…………………….. 147
Figure 6.5. Lagging and Leading Indicators on the Task Triangle……………163
Figure 7.1. “Completing the Investigation” Within the Context of the Overall
Incident Investigation Process……………172
Figure 7.2. Connection Between Causal Factors, Root Causes, and
Recommendations……………………………. 174
Figure 7.3. Tracking Recommendations…………………….183
Figure 8.1. Selecting Incidents for Analysis Within the Context of the Overall
Incident Investigation Process………………..190
Figure 8.2. Relationship Between Proactive Analysis, Management Systems, and
Reactive Analysis…………………………….. 191
Figure 8.3. Example Risk Matrix……………194
Figure 8.4. Hierarchy of Accidents, Near Misses, and Unsafe
Acts/Unsafe Conditions…………………………………………………………………………….197
Figure 8.5. Example Pareto Charts Using Two Different Attributes…………..203
Figure 8.6. A Cause and Effect Tree Used for Chronic Analysis……………203
Figure 8.7. A Cause and Effect Tree Used for Chronic Analysis…………204
Figure 8.8. A Cause and Effect Tree Used for Chronic Analysis………..204
Figure 9.1. “Data and Results Trending” Within the Context of the Overall
Incident Investigation Process……………………. 210
Figure 9.2. Pareto Analysis of Incidents By Facility and Equipment Type…… 214
Figure 10.1. Overall Incident Investigation Process………………..220
Figure 11.1. Overall Investigation Flowchart………………………….263
Figure 12.1. The Overall Incident Investigation Process…………………266
Figure 13.1. The Overall Incident Investigation Process………….278
Figure A.1. Causal Relationship Among the Loss Event, Causal Factors,
Intermediate Causes, and Root Causes……………….284
Figure B.1. Sandblasting Timeline Example (page 1 of 5)………………293
Figure B.2. Example Timeline Building Block………………………….300
Figure B.3. Four Rules for Building Blocks (Events, Conditions, Loss Events) on
Timelines…………………………300
Figure B.4. Job Aid for Creating a Timeline………………….303
Figure B.5. Sandblasting Timeline After Completion of Step 1……………307
Figure B.6. Sandblasting Timeline After Step 2……………………….308
Figure B.7. Sandblasting Timeline After Several Applications of Step 3…….309
Figure B.8. Sandblasting Timeline After Several More Applications of Step 3
(page 1 of 2)……………………………………………. 310
Figure B.9. Sandblasting Timeline with “Show Comments” Selected………….. 313
Figure B.10. Sandblasting Timeline After Additional Applications of Steps 3 and 4…………… 314
Figure B.11. Selected Building Blocks From the Sandblasting Timeline………. 315
Figure B.12. Sandblasting Timeline After Step 7………………….. 318
Figure C.1. A Simple CAET with an OR Gate………………322
Figure C.2. A Simple CAET with an AND Gate………………….322
Figure C.3. CAET with Both an OR and AND Gate……………..323
Figure C.4. CAET with Both an AND and OR Gate……………………….323
Figure C.5. CAET with Multiple Layers of Causes and Effects………………324
Figure C.6. Traditional Layout of a CAET……………………….326
Figure C.7. Other Layouts of a CAET……………………………326
Figure C.8. Initial CAET for “My Car Won’t Start”………………………..329
Figure C.9. CAET for “My Car Won’t Start” with Confirming/Contradicting Data……………330
Figure C.10. Complete CAET for Hands of Operator Injured During Removal of
Sandblasting Hose (see Figure C.11 for a more readable, two-page version)……..332
Figure C.11. Analysis of a Sandblasting Incident with a CAET (page 1 of 2)………………………333
Figure C.12. Symbols Used on CAETs……………………………335
Figure C.13. Generic CAET Structure for “Equipment Performance Gap”…….336
Figure C.14. Generic CAET Structure for “Equipment Performance Gap” Subcategories…….337
Figure C.15. Generic CAET Structure for “Personnel Performance Issues”…….338
Figure C.16. Detailed Generic CAET Structure for “Personnel Performance Issues”…………..339
Figure C.17. Generic CAET Structure for “Task Not Performed Correctly”……..340
Figure C.18. Generic CAET Structure Addressing Failure to Prevent, Failure to
Detect, and Failure to Correct for an “Equipment failure with Impact”……………341
Figure C.19. Generic CAET Structure Addressing Failure to Prevent, Failure to
Detect, and Failure to Correct for “Human performance issue with Impact”……341
Figure C.20. CAET for “Electronic device damaged by environmental conditions”…………….342
Figure C.21. CAET for “Release of oil in the oil tank area”……………343
Figure C.22. CAET for “Manufacturing Line Problem”…………..343
Figure C.23. CAET for “No acetone flow to Tank 23”……………..344
Figure C.24. CAET for “The operator did not stop the transfer pump prior to the
tank overflowing”…………………………………………………………344
Figure C.25. CAET for “Fire occurred”………………………345
Figure C.26. CAET for “Acetone misdirected to tank through valve 17”………………………..346
Figure C.27. CAET for “No oil to the gearbox”……………….346
Figure C.28. CAET for “Tank 17 ruptured from overpressure event”……346
Figure C.29. CAET for “Machine damage caused by uncorrected machine imbalance”……….347
Figure C.30. CAET for “Machine shut down from vibration monitoring system signals”……..348
Figure C.31. CAET for “Machine shut down from vibration monitoring signal” –
alternate layout………………………………………….348
Figure C.32. CAET for “Both lights are out”……………………………….349
Figure C.33. System Diagram for Lighting System…………349
Figure C.34. Job Aid for Creating a CAET………………… 351
Figure C.35. CAET Showing Breakdown of General Systems into Specific Components…….353
Figure C.36. Initial CAET with Incorrect Logic for “Control Systems Fail”…………..354
Figure C.37. Revised CAET with Corrected Logic for “Control Systems Fail”……………..355
Figure C.38. Correction of OR Logic to a Two-level CAET……..355
Figure C.39. Correction of AND Logic to a Two-level CAET…………..356
Figure C.40. Loss Event Identified for Sandblasting Incident…………….358
Figure C.41. First Level of the CAET for Sandblasting Incident……..358
Figure C.42. Revised CAET for First Level of Sandblasting Incident……..359
Figure C.43. First Application of Steps 5 and 6 to the CAET for the Sandblasting Incident…..359
Figure C.44. Additional Applications of Steps 2 through 6 for the Sandblasting Incident……..360
Figure D.1. Flowchart of Typical Interview Sequence………….377
Figure D.2. Job Aid for Creating a Timeline (page 1 of 2)……….386
Figure D.3. Job Aid for Creating a Cause and Effect Tree (page 1 of 2)……..388
Figure D.4. Root Cause Map™………………………….390
List of Tables
Table 2.1. General Incident Classification Matrix………………31
Table 2.2. Typical Level of Effort for Each Incident Class…………………32
Table 2.3. Typical Team Roles and Associated Activities………………33
Table 3.1. Forms of Data Fragility…………………………..46
Table 3.2. Factors to Assess the Credibility of People Data……………..51
Table 3.3. Application of Data-collection Methods………………..71
Table 4.1. Summary of CF Analysis Technique Characteristics…………76
Table 4.2. Applicability of CF Analysis Techniques………………..76
Table 4.3. Guidance on Using Timelines and Cause and Effect Trees…………..99
Table 6.1. Recommendation Level Characteristics……………………………….144
Table 6.2. Example Recommendations for Each Level……………. 145
Table 6.3. SOURCE™ Recommendation Levels and ISO Recommendation Types…………. 147
Table 6.4. Examples of Recommendations That Are Not Measureable and
Measureable………………………152
Table 6.5. Benefits and Costs of Recommendation Implementation……… 161
Table 6.6. Effectiveness of Various Shift Turnover Assessment Strategies……..165
Table 6.7. Recommendations for Class 1, 2, and 3 Analyses……………….166
Table 7.1. Typical Items to Include in Investigation Reports…………… 173
Table 7.2. Investigation Completion Activities for the 3 Classes of Analyses….185
Table 8.1. Learning Potential for Types of Incidents……………….196
Table 9.1. Examples of Recommendations Developed Based on Correlations Alone………..212
Table 10.1. Suggested Training Topics and Levels………………….230
Table 10.2. Destructive and Supportive Investigation Evaluation Criteria……231
Table 11.1. Different Investigations and Their Typical Objectives…………….241
Table 11.2. Generic Loss Event/Consequence Type/Stakeholder Matrix with
Typical Consequence Types and Effects Associated with Potential
Loss Events………………………..245
Table 11.3. Loss Event/Consequence Type/Stakeholder Matrix After Actual
Consequence Types Have Been Identified……………………………….247
Table 11.4. Loss Event/Consequence Type/Stakeholder Matrix After
Consequence Types Have Been Identified (Actual, Not Significant,
and None)……………………………………..249
Table 11.5. Loss Event/Consequence Type/Stakeholder Matrix After Actual
“Stakeholder Affects” and “Stakeholder Interest” Were Identified………………….251
Table 11.6. Loss Event/Consequence Type/Stakeholder Matrix After “Stakeholder
Affects” and “Stakeholder Interest” Were Identified……………………………………..253
Table 11.7. Example Situations Where Involving Outside Investigators May Be
Appropriate………………………………261
Table B.1. Application of the Four Building Block Rules to Building Block #6 in
Figure B.7………………………………………. 312
Table C.1. Potential Outcomes for Each Branch of a Tree………………..357
Reviews
Root Cause Analysis Handbook has been peer reviewed and selected by the American Society for Quality (ASQ), Risk and Insurance Management Society (RIMS), and other professional associations for inclusion in their online bookstores.
Read Amazon.com customer reviews.
Contact Rothstein Associates, Inc. to request a complimentary copy to evaluate for classroom use.