Tailored incident investigation protocols: a critically needed practice
The BowTie as a digital twin: how a BowTie looks different from a data perspective