Friday, June 17, 2016

Chapter 1 Introduction to the Model

Latest version of the chapter that introduces the sustainment management model.


It was our goal to change things, hopefully for the better.

Chapter 1: Your System, Its Mission, “O–I–F”, and Enablers




In this chapter, the sustainment management model is covered from a big picture view. Following chapters provide additional details.

Everything Starts and Ends with Risk Identification


The “I” in O-I-F” is “identify risks”. Everything in the sustainment management model, as described in this book, is tightly connected to the sustainment risk identification process. It is the very heart of effective weapon system sustainment. Chapter 4 explains the sustainment risk identification process.



As the block diagram above implies, risk identification is the link between observations of system degradation and plans (fixes) designed to reverse the degradations. To identify risks, the system must be observed. Once risks are identified, planning begins to try to mitigate them.



The right side of the diagram above shows that the risk identification process directly feeds the process to create long-range plans and obtain funds, priority, and authority to execute. Once execution starts, if the fixes you are trying to implement are not working out, another trip to the risk board is in order.

System assessment (observing readiness) is certainly important and must stand alone as a program that continuously watches your system. However, the entire reason for the existence of an assessment program is to feed the risk identification process. As risks are identified in one area, priorities for assessment in other areas can increase. For instance, if electronic degradation in a flight control subsystem is found and a risk is written, increased scrutiny will most certainly be directed to electronics assemblies throughout the system. And if your ability to observe is lacking, you can write a risk to address it.

This diagram also identifies a group of people key to weapon system assessment, the warfighters. Warfighters have a mission that is achieved by use of their weapon system. To apply this to the civilian world, a “warfighter” and “mission” must be identified that your system satisfies.



Risk identification is also where the warfighter finds their strongest voice as risks are considered in light of the mission. The meta-model diagram above (see also chapter 2) shows reliability and availability as mission readiness factors, but other readiness factors will also exist in your system. Risk identification generates important arguments concerning what is part of and what is not part of your system.   



No comments:

Post a Comment