an icon showing a delivery van Shulph delivers to Germany.
Book cover for Harnessing The Power Of Failure: Using Storytelling And Systems Engineering To Enhance Organizational Learning, a book by John Steven Newman, Stephen M. Wander Book cover for Harnessing The Power Of Failure: Using Storytelling And Systems Engineering To Enhance Organizational Learning, a book by John Steven Newman, Stephen M. Wander

Harnessing The Power Of Failure: Using Storytelling And Systems Engineering To Enhance Organizational Learning

Powered by RoundRead®
This book leverages Shulph’s RoundRead system - buy the book once and read it on both physical book and on up to 5 of your personal devices. With RoundRead, you’re 4 times more likely to read this book cover-to-cover and up to 3 times faster.
Book 49,72
Book + eBook 66,29
eBook Only 48,40
Add to Read List


Instant access to ebook. Print book delivers in 5 - 10 working days.

  • Page count

    248 pages

  • Category

    Strategy

  • Publisher

    Emerald Publishing Limited

  • Ebook file size

    4.0 MB

Summary



Failure informs more generously and reliably than success. Failure is the best indicator of what’s working and what’s not in any complex system or enterprise.

All failures will inevitably reveal latent defects and/or failure modes that are invariably buried within the people, processes, materials, design, manufacturing, and management that comprise the complex system. In this new framework from former NASA aerospace professionals, Newman and Wander employ a unique system failure case study (SFCS) paradigm, originally developed to stimulate systems thinking and lessons learning at NASA, that combines storytelling and systems engineering designed to enhance organizational learning. The authors employ the SFCS approach to explore a vast array of failure events in multiple sectors of transportation, industry, aerospace, construction, and critical infrastructure.
They provide an Integrated Analysis seeking trends, patterns, and universally applicable insights that readers can use to recognize areas of potential vulnerability within their own activities. The authors then identify specific actions within the span of control of enterprise leaders, project managers, process owners and operators which can be implemented to manage risk in high consequence, high risk activities.