an investigation into the factors that govern …
TRANSCRIPT
The Pennsylvania State University
The Graduate School
AN INVESTIGATION INTO THE FACTORS THAT GOVERN SUCCESS
FOR NEW SAFETY AND HEALTH TECHNOLOGIES IN THE MINING INDUSTRY
AND THE EFFICACY OF THOSE FACTORS TO PREDICT THE LIKELIHOOD
OF SUCCESS FOR EMERGING TECHNOLOGIES
A Dissertation in
Energy and Mineral Engineering
by
Jacob L. Carr
© 2019 Jacob L. Carr
Submitted in Partial Fulfillment
of the Requirements
for the Degree of
Doctor of Philosophy
December 2019
ii
The dissertation of Jacob L. Carr was reviewed and approved* by the following:
Jeffrey L. Kohler
Professor of Mining Engineering
Undergraduate Program Chair of Mining Engineering
Dissertation Adviser
Chair of Committee
Shimin Liu
Associate Professor of Energy and Mineral Engineering
Sekhar Battacharyya
Associate Professor of Mining Engineering
Michael Pate
Nationwide Insurance Associate Professor of Agricultural Safety and Health
Mort D. Webster
Professor of Energy Engineering
Co-Director Initiative for Sustainable Electric Power Systems
Associate Department Head for Graduate Education
*Signatures are on file in the Graduate School.
iii
Abstract The mining industry faces many safety and health challenges, and these challenges are often
addressed by the introduction of new technologies, many of which are introduced through
legislative or regulatory mandates requiring the technology’s use. Many such mandates have been
enacted, causing dramatic changes to how work is conducted. Despite these mandates, there are
cases in which the intended safety or health benefit of introducing a new technology was not
achieved, or worse, cases in which some unintended negative consequence was created by the
introduction of a new technology. Given the weighty consequences these mandates can have, both
in terms of economic impacts as well as impacts on the safety and health of miners, it is
increasingly critical to ensure that the technologies being mandated will achieve their intended
benefit without introducing unintended negative consequences. To that end, the goal of the
research presented in this dissertation was to identify the factors that govern the success of new
safety and health technologies in the mining industry and to develop guidance for the timely and
effective introduction of new safety and health technologies through legislative or regulatory
mandates. This goal was accomplished through an analysis of several case studies of mining safety
and health technology introduction, including mandated as well as voluntarily adopted
interventions. For each case study, the development and diffusion of the technology was examined
and indications that the technology achieved either a successful or an unsuccessful outcome was
identified. Causal tree analysis was then used to identify the root causes for each of these successful
and unsuccessful outcomes. The root causes identified for unsuccessful outcomes include, among
other factors, the effect of biases on decisions made by researchers, regulators, and legislators. The
analysis shows that these root causes lead to consequences including the failure of interventions
to deliver their intended safety or health benefit or for new interventions to introduce unintended
negative safety consequences. Using these root causes, a bowtie analysis was conducted to identify
controls for preventing the enactment of legislative or regulatory mandates requiring the use of
immature technologies and to mitigate the negative consequences of the enactment of such a
mandate. These controls represent a set of guidelines that can be used to ensure that immature
safety and health technologies are not introduced prematurely and that future mining safety and
health regulations and legislation are as effective as possible at protecting the safety and health of
miners. The implementation of these guidelines will result in more effective regulation, more
impactful safety and health research, safer mines, and healthier miners.
iv
Table of Contents List of Figures ............................................................................................................................... vii
List of Tables ................................................................................................................................. xi
Acronyms and Abbreviations ...................................................................................................... xiv
Chapter 1: Introduction ....................................................................................................................1
Objectives and Specific Aims ......................................................................................................4
Scope of Work .............................................................................................................................5
Dissertation Format ......................................................................................................................6
Chapter 2: Background and Survey of Pertinent Literature.............................................................8
2.1 The Economics of Technological Change .............................................................................8
2.2 The Effect of Policy on Technological Change ...................................................................11
2.3 The Assessment of Environmental Control Technologies ...................................................12
2.4 The Assessment of Technology Readiness ..........................................................................13
Chapter 3: Methodology ................................................................................................................16
3.1 Overall Research Approach .................................................................................................16
3.2 Data Compilation and Consultation with Subject Matter Experts .......................................18
3.3 Identification of Factors that Influence the Success of New Safety and Health
Technologies ..............................................................................................................................19
3.4 Development of Strategies to Improve the Likelihood of Success for New Safety
and Health Technology Mandates .............................................................................................20
Chapter 4: Case Studies of Safety And Health Technology Introduction to the Mining
Industry ..........................................................................................................................................24
4.1 Safety Interventions .............................................................................................................25
4.1.1: Case 1: Refuge Alternatives for Use in Underground Coal Mines..............................25
4.1.2 Case 2: Self-Contained Self-Rescuers ..........................................................................37
4.1.3 Case 3: Primary Communications and Tracking Systems ............................................48
v
4.1.4 Case 4: Proximity Detection Systems for Continuous Mining Machines ....................68
4.1.5 Case 5: LED Cap Lamps...............................................................................................72
4.2 Health Interventions .............................................................................................................81
4.2.1 Noise Controls and Noise Exposure Regulations .........................................................82
4.2.2 Case 6: Noise Controls for Continuous Mining Machines ...........................................88
4.2.3 Case 7: Noise Controls for Roof Bolting Machines .....................................................96
Chapter 5: Causal Tree Analyses .................................................................................................101
5.1 Causal Tree Analyses for Safety Interventions ..................................................................103
5.1.1 Causal Tree Analysis for Case 1: Refuge Alternatives ...............................................103
5.1.2 Causal Tree Analysis for Case 2: Self-Contained Self-Rescuers ...............................118
5.1.3 Causal Tree Analysis for Case 3: Primary Communications and Tracking
Systems ................................................................................................................................126
5.1.4 Causal Tree Analysis for Case 4: Proximity Detection Systems ................................141
5.1.5 Causal Tree Analysis for Case 5: LED Cap Lamps ....................................................144
5.2 Causal Tree Analyses for Health Interventions .................................................................146
5.2.1 Causal Tree Analysis for Noise Controls for Case 6: Continuous Mining
Machines ..............................................................................................................................146
5.2.2 Causal Tree Analysis for Noise Controls for Case 7: Roof Bolting Machines ..........151
5.3 Generalization of Causal Tree Analysis Results ................................................................155
Chapter 6: Bowtie Analysis of Mandates for Immature Safety and Health Technologies ..........164
6.1 Threats and Outcomes Associated with the Enactment of a Mandate for an
Immature Safety or Health Technology ...................................................................................165
6.2 Overview of Bowtie Analysis ............................................................................................169
6.3 Discussion of Controls to Prevent the Enactment of a Mandate for an Immature
Safety or Health Technology ...................................................................................................171
6.3.1: (T1) Biases lead legislators to judge that immediate action is needed and to
ignore indications of technology immaturity .......................................................................172
vi
6.3.2: (T2) Biases lead regulators to judge that immediate action is needed and to
ignore indications of technological immaturity ...................................................................175
6.3.3: (T3) Biases and political pressures lead researchers to ignore or to understate
observed indications of technological immaturity ...............................................................179
6.3.4: (T4) Despite the best efforts of researchers and developers, effective
interventions either cannot be developed or cannot be demonstrated to be effective
due to engineering challenges or economic constraints .......................................................181
6.3.5: (T5) Biases lead to an acceptance of the status quo with respect to recognized
deficiencies in safety and health standards or technologies.................................................184
6.3.6: (T6) Cultural forces and cognitive biases among miners lead to a mistrust of
new interventions .................................................................................................................188
6.3.7: (T7) Biases result in insufficient or poorly designed experiments and (T8)
Biases result in insufficient or ineffective review of research .............................................189
6.4 Discussion of Controls to Mitigate the Enactment of a Mandate for an Immature
Safety or Health Technology ...................................................................................................198
6.4.1: (C1) Intervention does not achieve the intended safety or health benefit .................199
6.4.2: (C2) Intervention causes an unintended, negative safety or health consequence ......203
6.4.3: (C3) A device that fails to meet the safety and health standard or is otherwise
defective is certified and used ..............................................................................................204
6.4.4: (C4) Despite effective interventions being available to meet the mandate,
there is sustained strong resistance to their use ...................................................................205
Chapter 7: Guidelines and Recommendations to Improve the Likelihood of Success for
New Safety and Health Technology Mandates ............................................................................208
7.1 Summary of Recommendations .....................................................................................208
7.2 Implementation of Policies to Assess Technology Maturity .........................................210
Chapter 8: Conclusions and Recommendations ..........................................................................229
References ....................................................................................................................................240
vii
List of Figures
Figure 1: Generic Causal Tree Analysis Framework .....................................................................19
Figure 2: Generic bow-tie analysis framework ..............................................................................20
Figure 3: Bow-tie analysis framework as applied in the proposed research ..................................21
Figure 4: Metal-type portable refuge alternative ...........................................................................25
Figure 5: A tent-type portable refuge alternative deployed in the Experimental Mine at
the NIOSH facility in Pittsburgh............................................................................26
Figure 6: Door to a built-in-place refuge alternative constructed in the Experimental Mine
at the NIOSH facility in Pittsburgh ........................................................................26
Figure 7: CSE SR-100 Self-Contained Self-Rescuer ....................................................................38
Figure 8: Leaky feeder cable..........................................................................................................49
Figure 9: Conceptual drawing of node-based communications .....................................................50
Figure 10: Tag-based tracking concept ..........................................................................................52
Figure 11: Tracking tag used in underground coal mines..............................................................52
Figure 12: Miners' cap lamp assembly from the early 20th century with spring-loaded
contacts designed to interupt electric current in the event that the
incandescent bulb shattered [174] ..........................................................................73
Figure 13: The Edison Electric Cap Lamp, approved by the Bureau of Mines for use in
underground coal mines in 1915 [176] ..................................................................74
Figure 14: Single sprocket chain conveyor on a continuous mining machine (Source:
[228])......................................................................................................................89
Figure 15: Dual sprocket chain conveyor on a continuous mining machine (Source:
[228])......................................................................................................................89
Figure 16: Dual sprocket conveyor chain with polyurethane-coated flight bars on a
continuous mining machine (Source: [228])..........................................................89
Figure 17: Average noise dose for continuous mining machine operators as reported in
the MSHA Noise Samples data set [217] ..............................................................94
Figure 18: Proportion of noise surveys for continuous mining machine operators for
which the PEL dose was above 100% as reported in the MSHA Noise
Samples data set [217] ...........................................................................................94
viii
Figure 19: Average noise dose for roof bolting machine operators as reported in the
MSHA Noise Samples data set [217] ..................................................................100
Figure 20: Proportion of noise surveys for roof bolting machine operators for which the
PEL dose was above 100% as reported in the MSHA Noise Samples data
set [217]. ..............................................................................................................100
Figure 21: Causal tree analysis for “Judicial intervention and after-rule time extensions
occurred in refuge alternatives rulemaking” (See notes in Table 12) ..................105
Figure 22: Causal tree analysis for “Miners express strong resistance to using refuge
alternatives” (portions shown in dashed lines are not shown in their
entirety because they would duplicate portions of Figure 21; therefore,
only the root causes are shown) ...........................................................................115
Figure 23: Causal tree analysis for "Unacceptably high rate of quality control failures
occur for CSE SR-100 self-contained self-rescuers" (See notes in Table
15) ........................................................................................................................119
Figure 24: Causal tree analysis for "Primary communications and tracking systems are
adopted throughout the underground coal mining industry" (See notes in
Table 17) ..............................................................................................................128
Figure 25: Causal tree analysis for "No documented evidence exists showing that
tracking systems achieve a material improvement to safety" (See
remainders of causal tree in Figure 26 and Figure 27) ........................................134
Figure 26: Causal tree analysis for "Compelling evidence does not exist to indicate that
the performance standards, if achieved, will substantially improve the
likelihood of successful rescue or escape" (Continues from Figure 25; see
notes in Table 19).................................................................................................135
Figure 27: Causal tree analysis for "Compelling evidence does not exist to indicate that
the tracking systems in use in the industry meet the performance
standards" (Continues from Figure 25) ................................................................136
Figure 28: Causal tree analysis for "Electromagnetic interference (EMI) between
continuous personal dust monitors and proximity detection systems
effectively render the proximity detection system temporarily inoperable" ........141
Figure 29: Causal tree analysis for "LED cap lamps are rapidly and voluntarily adopted
by mine operators throughout the underground mining industry" .......................145
Figure 30: Causal tree analysis for "Continuous mining machine noise controls achieve a
demonstrated reduction in noise exposure for operators" (See notes in
Table 23) ..............................................................................................................147
ix
Figure 31: Causal tree analysis for "Roof bolting machine noise controls fail to achieve a
demonstrated reduction in noise exposure for operators" (See notes in
Table 25) ..............................................................................................................152
Figure 32: Threats contributing to the enactment of a law or regulation that mandates the
use of a safety or health technology that is immature ..........................................168
Figure 33: Bowtie analysis of the enactment of a law or regulation that mandates the use
of a safety or health technology that is immature ................................................170
Figure 34: Left-hand side of bowtie analysis of the enactment of a law or regulation that
mandates the use of a safety or health technology that is immature,
showing threats and preventative controls ...........................................................171
Figure 35: Partial bowtie analysis of the enactment of a law or regulation that mandates
the use of a safety or health technology that is immature, showing portion
associated with Threat 1.......................................................................................173
Figure 36: Partial bowtie analysis of the enactment of a law or regulation that mandates
the use of a safety or health technology that is immature, showing portion
associated with Threat 2.......................................................................................176
Figure 37: Partial bowtie analysis of the enactment of a law or regulation that mandates
the use of a safety or health technology that is immature, showing portion
associated with Threat 3.......................................................................................181
Figure 38: Partial bowtie analysis of the enactment of a law or regulation that mandates
the use of a safety or health technology that is immature, showing portion
associated with Threat 4.......................................................................................183
Figure 39: Partial bowtie analysis of the enactment of a law or regulation that mandates
the use of a safety or health technology that is immature, showing portion
associated with Threat 5.......................................................................................185
Figure 40: Partial bowtie analysis of the enactment of a law or regulation that mandates
the use of a safety or health technology that is immature, showing portion
associated with Threat 6.......................................................................................189
Figure 41: Partial bowtie analysis of the enactment of a law or regulation that mandates
the use of a safety or health technology that is immature, showing portion
associated with Threat 7.......................................................................................191
Figure 42: Partial bowtie analysis of the enactment of a law or regulation that mandates
the use of a safety or health technology that is immature, showing portion
associated with Threat 8.......................................................................................191
Figure 43: Five-stage process of research and reviews associated with each stage ....................193
x
Figure 44: Right-hand side of bowtie analysis of the enactment of a law or regulation that
mandates the use of a safety or health technology that is immature,
showing consequences and recovery controls .....................................................198
Figure 45: Partial bowtie analysis of the enactment of a law or regulation that mandates
the use of a safety or health technology that is immature, showing portion
associated with Consequence 1 ............................................................................200
Figure 46: Partial bowtie analysis of the enactment of a law or regulation that mandates
the use of a safety or health technology that is immature, showing portion
associated with Consequence 2 ............................................................................204
Figure 47: Partial bowtie analysis of the enactment of a law or regulation that mandates
the use of a safety or health technology that is immature, showing portion
associated with Consequence 3 ............................................................................205
Figure 48: Partial bowtie analysis of the enactment of a law or regulation that mandates
the use of a safety or health technology that is immature, showing portion
associated with Consequence 4 ............................................................................206
Figure 49: Technology Readiness Levels as defined by NASA [257] ........................................212
Figure 50: Sources of uncertainty about technology's readiness at each TRL ............................223
Figure 51: Risk of unsuccessful outcomes decreases with increasing TRL; relative level
of risk for each type of unsuccessful outcome is indicated by the width of
the column, which decreases with increasing TRL .............................................225
Figure 52: Recommended TRL definitions for mining safety and health technologies ..............238
xi
List of Tables
Table 1: Summary of key guidance provided by MSHA for communications system
performance [128] ..................................................................................................61
Table 2: Summary of key guidance provided by MSHA for tracking system performance
[128] .......................................................................................................................62
Table 3: NIOSH OMSHR extramural research contracts in the topic area “Emergency
Communications and Tracking” (2006 - 2016) [134]............................................64
Table 4: Key dates for proximity detection regulations .................................................................70
Table 5: Estimated excess risk of material hearing impairment at age 60 after a 40-year
working lifetime exposure to occupational noise for different definitions
of material hearing impairment (From [212]) ........................................................84
Table 6: Engineering and administrative noise controls considered by MSHA to be
technologically and administratively achievable in reducing the noise
exposure of miners operating or working around continuous mining
machines [229] .......................................................................................................91
Table 7: Engineering and administrative noise controls considered by MSHA to offer
promise in reducing the noise exposure of miners operating or working
around continuous mining machines [24] ..............................................................92
Table 8: Engineering and administrative noise controls considered by MSHA to be
technologically and administratively achievable in reducing the noise
exposure of miners operating or working around roof bolters [229] .....................98
Table 9: Engineering and administrative noise controls considered by MSHA to offer
promise in reducing the noise exposure of miners operating or working
around roof bolters [24] .........................................................................................98
Table 10: Indicators of a successful safety and health technology introduction .........................102
Table 11: Indicators of an unsuccessful safety and health technology introduction ...................102
Table 12: Notes for causal tree analysis for “Judicial intervention and after-rule time
extensions occurred in refuge alternatives rulemaking” (See causal tree in
Figure 21) .............................................................................................................106
Table 13: Identified root causes for “Judicial intervention and after-rule time extensions
occurred in refuge alternatives rulemaking” ........................................................113
Table 14: Identified root causes for “Miners express strong resistance to using refuge
alternatives” .........................................................................................................117
xii
Table 15: Notes for causal tree analysis for "Unacceptably high rate of quality control
failures occur for CSE SR-100 self-contained self-rescuers" (See causal
tree in Figure 23) ..................................................................................................120
Table 16: Identified root causes for "Unacceptably high rate of quality control failures
occur for CSE SR-100 self-contained self-rescuers" ...........................................126
Table 17: Notes for causal tree analysis for "Primary communications and tracking
systems are adopted throughout the underground coal mining industry"
(See causal tree in Figure 24) ...............................................................................129
Table 18: Identified root causes for "Primary communications and tracking systems are
adopted throughout the underground coal mining industry" ...............................133
Table 19: Notes for causal tree analysis for "No documented evidence exists showing that
tracking systems achieve a material improvement to safety" (See causal
trees in Figure 25, Figure 26, and Figure 27) ......................................................137
Table 20: Identified root causes for "No documented evidence exists showing that
tracking systems achieve a material improvement to safety" ..............................140
Table 21: Identified root causes for "Electromagnetic interference (EMI) between
continuous personal dust monitors and proximity detection systems
effectively render the proximity detection system temporarily inoperable" ........144
Table 22: Identified root causes for "LED cap lamps are rapidly and voluntarily adopted
by mine operators throughout the underground mining industry" .......................145
Table 23: Notes for causal tree analysis for "Continuous mining machine noise controls
achieve a demonstrated reduction in noise exposure for operators" (See
causal tree in Figure 30) .......................................................................................148
Table 24: Identified root causes for "Continuous mining machine noise controls achieve a
demonstrated reduction in noise exposure for operators" ....................................151
Table 25: Notes for causal tree analysis for "Roof bolting machine noise controls fail to
achieve a demonstrated reduction in noise exposure for operators" (See
causal tree in Figure 31) .......................................................................................152
Table 26: Identified root causes for "Roof bolting machine noise controls fail to achieve a
demonstrated reduction in noise exposure for operators" ....................................154
Table 27: Identified root causes for indications of safety and health technology mandate
success..................................................................................................................155
Table 28: Identified root causes for indications of safety and health technology mandate
failure ...................................................................................................................156
xiii
Table 29: Root causes for indications of technology mandate success grouped by groups
primarily involved ................................................................................................158
Table 30: Root causes for indications of technology mandate failure grouped by groups
primarily involved ................................................................................................159
Table 31: Summary of recommended preventative and recovery controls to prevent and
mitigate, respectively, the enactment of a legislative or regulatory mandate
for the use of an immature safety or health technology .......................................209
Table 32: TRL definitions used by NASA and DOD as well as a suggested set of
definitions for mining safety and health technologies (These scales are
identical for TRL 1 through 5 but have minor differences for TRL 6
through 9) .............................................................................................................213
Table 33: Guidance for adjusting TRL for a technology that has been developed for and
tested in some prior environment and is being adapted to a new
environment .........................................................................................................215
Table 34: Effects on federal and state legislative bodies of assessing the readiness of
safety and health technologies .............................................................................218
Table 35: Effects on regulatory agencies of assessing the readiness of safety and health
technologies .........................................................................................................219
Table 36: Effects on research agencies of assessing the readiness of safety and health
technologies .........................................................................................................220
Table 37: Effects on the mining industry of assessing the readiness of safety and health
technologies .........................................................................................................221
Table 38: Generalized forms of identified root causes for successful outcomes in case
studies of safety and health technology introductions studied.............................232
Table 39: Generalized forms of identified root causes for unsuccessful outcomes in case
studies of safety and health technology introductions studied.............................233
xiv
Acronyms and Abbreviations
Organizations:
CDC .......................................Centers for Disease Control and Prevention
CSE ........................................Refers to the CSE Corporation
DART .....................................Division of Applied Research and Technology
DHHS .....................................Department of Health and Human Services
DOD .......................................Department of Defense
DOE .......................................Department of Energy
DOL .......................................Department of Labor
EPA ........................................Environmental Protection Agency
ESA ........................................European Space Agency
GAO .......................................Government Accountability Office
ISO .........................................International Organization for Standardization
MESA ....................................Mine Enforcement and Safety Administration
MSA .......................................Mine Safety Appliances Company
MSHA ....................................Mine Safety and Health Administration
MSHRAC ...............................Mine Safety and Health Research Advisory Committee
MSTTC ..................................Mine Safety Technology and Training Commission
NAS........................................National Academy of Sciences
NASA .....................................National Aeronautics and Space Administration
NIOSH ...................................National Institute for Occupational Safety and Health
NMA ......................................National Mining Association
NPPTL ...................................National Personal Protective Technology Laboratory
OMB ......................................Office of Management and Budget
OMSHR .................................Office of Mine Safety and Health Research
OSHA .....................................Occupational Safety and Health Administration
PMRD ....................................Pittsburgh Mining Research Division
PRL ........................................Pittsburgh Research Laboratory
SMRD ....................................Spokane Mining Research Division
USBM ....................................United States Bureau of Mines
WVMSTTF ............................West Virginia Mine Safety Technology Task Force
xv
Other Acronyms and Abbreviations:
ANPRM .................................Advance Notice of Proposed Rulemaking
APA........................................Administrative Procedure Act
AT ..........................................Apparent Temperature
BACT .....................................Best Available Control Technology
BIP .........................................Built-in-place (referring to a refuge alternative)
CDEM ....................................Coal Dust Explosibility Meter
CFR ........................................Code of Federal Regulations
CO ..........................................Carbon Monoxide
CO2 .........................................Carbon Dioxide
CPDM ....................................Continuous Personal Dust Monitor
EMC .......................................Electromagnetic Compatibility
EMI ........................................Electromagnetic Interference
ERP ........................................Emergency Response Plan
FACA .....................................Federal Advisory Committee Act
GNSS .....................................Global Navigation Satellite System
GPS ........................................Global Positioning System
HCP ........................................Hearing Conservation Plan
HTL ........................................Hearing Threshold Level
IRB .........................................Institutional Review Board
LAER .....................................Lowest Achievable Emissions Rate
LAN .......................................Local Area Network
LED ........................................Light-Emitting Diode
LIDAR ...................................Light Detection and Ranging
LiOH ......................................Lithium Hydroxide
LTFE ......................................Long Term Field Evaluation
MEMS ....................................MicroElectro-Mechanical Systems
MF ..........................................Medium Frequency
MINER ...................................Mine Improvement and New Emergency Response
MSD .......................................Musculoskeletal Disorders
MWC......................................Miner-Wearable Component
NFC ........................................Near-Field Communication
xvi
NLOS .....................................Non-Line-Of-Sight
NPRM ....................................Notice of Proposed Rule Making
O2 ...........................................Oxygen
PAN........................................Personal Area Network
PDM .......................................Personal Dust Monitor
PDS ........................................Proximity Detection System
PEL ........................................Permissible Exposure Limit
PIB .........................................Program Information Bulletin
PIL..........................................Program Instruction Letter
PPL .........................................Program Policy Letter
PRA ........................................Paperwork Reduction Act
QA ..........................................Quality Assurance
R&D .......................................Research and Development
RA ..........................................Refuge Alternative
RACT .....................................Reasonably Available Control Technology
RBLC .....................................RACT/BACT/LAER Clearinghouse
RADAR..................................Radio Detection and Ranging
REL ........................................Recommended Exposure Limit
RFI .........................................Request for Information
RSSI .......................................Received Signal Strength Indicator
RFID ......................................Radio Frequency Identification
SCSR ......................................Self-Contained Self-Rescuer
SEC ........................................Self-Escape Competencies
SME .......................................Subject Matter Expert
TPMM ....................................Technology Program Management Model
TOF ........................................Time of Flight
TRA........................................Technology Readiness Assessment
TRL ........................................Technology Readiness Level
TRLC .....................................Technology Readiness Level Calculator
TTE ........................................Through-the-Earth
TWA ......................................Time-Weighted Average
UWB ......................................Ultra-Wideband
1
Chapter 1: Introduction
Mineworkers face some of the most challenging safety and health risks of any industry. Miners
work near heavy pieces of machinery and often work in confined spaces. Miners also work in
low light conditions and often have high exposures to noise as well as to dust and other
respiratory hazards. And miners face the risk of disastrous explosions, fires, or falls of ground
that can trap them underground. To address these risks, several technologies have been
introduced to the mining industry with the intent of protecting miners’ safety and health.
The Coal Mine Safety Act of 1969 (Coal Act), precipitated by the Farmington Mine disaster in
1968, instituted many new safety and health requirements and led to the introduction of many
new technologies to the mining industry. These requirements were later extended to non-coal
mines by the Federal Mine Safety and Health Act of 1977 (Mine Act).
December of this year will mark the 50th anniversary of the passage of the Coal Act. In this half-
century, conditions at mines have steadily improved, as evidenced by dramatic decreases in the
rates of injuries, fatalities, and occupational illness. This improvement has been driven largely by
the promulgation of important regulations and the introduction of several new safety and health
technologies. However, despite these improvements, significant safety challenges remain for the
industry.
In 2006, disasters at the Sago, Darby, and Alma mines led to the passage of the Mine
Improvement and New Emergency Response (MINER) Act of 2006. The MINER Act
dramatically expanded the requirements of the Coal and Mine Acts by mandating the
implementation of new technologies such as communications and tracking systems, refuge
alternatives, and breathing air supply systems. In addition to the new requirements of the MINER
2
Act, mining safety and health requirements have increased over the last decade with new
regulations mandating the use of technologies such as proximity detection and personal dust
monitors. Still other technologies, such as LED cap lamps, have been voluntarily adopted within
the industry without government mandate. In a few instances the improved understanding of
health hazards, such as diesel particulate matter, have led to a recognition of the need for
technological solutions. New safety and health technologies can either be developed within and
specifically for the mining industry, or can be adopted and adapted from other industries.
These technologies are sometimes voluntarily adopted by the industry, but more often, they are
widely adopted only after a mandate requiring their use is enacted, either through legislation or
regulation. A recent examination of safety and health advances in the mining industry over the
last several decades provides some perspective on how new safety and health technologies have
been adopted by the industry [1]. For several cases, a new technology was developed and
voluntarily adopted by some portion of the industry, but a regulatory or legislative mandate was
required to achieve pervasive use. For example, the use of rock dust to prevent deadly mine
explosions was adopted by some mines in the 1930s, and rock dust was used in the majority of
mines by 1940. However, it was not used in all mines until required by the 1952 Federal Coal
Mine Safety Act.
In other cases, legislative or regulatory mandates completely precede the development and use of
the technology. For example, the MINER Act mandated the use of wireless communications and
tracking systems for underground coal mines, but, at the time this law was passed, the
technology did not exist in a mature form for use by the industry. Such requirements are referred
to as “technology-forcing” mandates as they are designed to force the development and diffusion
of technologies that do not yet exist. In the case of the MINER Act, the legislation drove
3
research and development of new technologies by their use, by charging federal research
agencies with the responsibility of spearheading research and development efforts, and by
funding those efforts. As with all safety and health technology mandates, the intent of the
MINER Act was to improve safety and health through the introduction of new technologies.
While the intent of regulatory or legislative mandates is to improve the safety and health of
miners, this intent is sometimes not fully achieved because the mandated technology fails to
deliver the expected benefit. Worse, the introduction of a new technology can sometimes cause
unintended and unexpected consequences that have a negative impact on safety and health. As
new technologies continue to be developed and introduced – whether through mandate or
through voluntary adoption – it will be increasingly critical to understand why some safety and
health technologies achieve success, while others fail to do so. The goal of the research presented
in this dissertation is to provide this understanding by identifying the factors that have driven
some safety and health technologies to success and prevented others from reaching success.
From these factors, a set of guidelines is presented that can be used to inform the development of
future safety and health regulations, to steer the strategic direction of safety and health research,
and to ensure that the introduction of new technologies will achieve their intended benefit
without introducing some unintended negative consequence.
The guidelines provided in this dissertation build on a deep body of knowledge on the
mechanisms by which technology is developed and diffused as well as how those mechanisms
can be impacted by laws and regulations. Notably, much has been done by federal agencies such
as NASA, the Department of Defense, and the Department of Energy, to assess the readiness of
technology for deployment through Technology Readiness Levels. The results of this study
demonstrate the applicability of these tools, with some modification, to mining safety and health
4
technology assessment. The results also demonstrate the need for rigorous scientific assessment
of safety and health interventions to overcome the effects of biases and maintain objectivity in
the regulatory, legislative, and research processes.
By identifying the factors that govern the success of new safety and health technology
introduction in the mining industry, this research fills a critical knowledge gap, and by
translating these findings into actionable guidelines, this dissertation provides the mining
community with a valuable set of tools for ensuring that future safety and health technology
introduction efforts achieve success. The implementation of these guidelines will enable the
design of effective regulations, which are backed by sound science and which mandate the use of
technologies that have been proven to be sufficiently mature. In this way, the use of the
information presented in this dissertation will minimize the regulatory burden of new mining
safety and health requirements while providing the most effective and proven protections for
miners’ safety and health.
Objectives and Specific Aims
The research addresses the following objectives:
Objective 1: Test the hypothesis that there exists some set of factors that govern the
success of mandated safety and health technologies in the mining industry
and that these factors can be determined.
Objective 2: Establish a set of guidelines to maximize the likelihood of success for new
safety and health technologies that may be mandated for the mining
industry.
5
These objectives have been accomplished through the achievement of three specific aims:
Specific Aim 1: Identify factors or conditions that have positively contributed to the
success of safety and health technologies in mining.
Specific Aim 2: Identify factors or conditions that have negatively affected the success of
safety and health technologies in mining.
Specific Aim 3: Develop a set of strategies to: (a) reduce the likelihood of a government
mandate being enacted for an immature safety or health technology, and
(b) mitigate the repercussions of the enactment of a mandate for an
immature safety or health technologies.
Scope of Work
The factors identified and the guidelines developed in this research are applicable to all sectors
of mining, including both surface and underground mines as well as all mining commodities:
coal, metal, non-metal, stone, sand and gravel. However, due to the unique nature and heightened
safety concerns of underground coal mining, this sector has seen a disproportionately large
number of mandated technologies as compared to the other sectors. Therefore, the data used for
this study has necessarily drawn more heavily on case studies from underground coal mining
than from surface mining and from non-coal mining. Nonetheless, the findings and conclusions
are applicable to all sectors of mining.
6
Dissertation Format
In the following chapters, a study of several cases of safety and health technology introductions
to the mining industry will be presented. These cases were used to identify and demonstrate the
factors that govern success for new safety and health technologies in mining, and guidelines for
the introduction of future safety and health technologies will be presented.
In Chapter 2, background for this study is presented, including an extensive review of the
relevant literature on the economics of technological change, the effect of policy on
technological change, the assessment of environmental control technologies, and the assessment
of technology readiness.
In Chapter 3, a detailed description of study methodology is presented, including an overview of
the methods of causal tree analysis and bowtie analysis.
In Chapter 4, several case studies for safety and health technologies are introduced. In this
chapter, no analysis or commentary on these cases is provided; rather, this chapter only presents
the relevant history of the research, development, diffusion, and regulation of each of the
technologies. The chapter is organized into two sections: Safety Technologies (which include
case studies for refuge alternatives, self-contained self-rescuers, communications and tracking
systems, proximity detection systems, and LED cap lamps) and Health Technologies (which
include case studies for noise controls for continuous mining machines and noise controls for
roof bolting machines). Each case study is discussed in a sub-section which concludes by
identifying indications that the technology introduction achieved either a successful or an
unsuccessful outcome.
7
In Chapter 5, causal tree analysis is used to identify the root causes for each of the successful and
unsuccessful outcomes identified in Chapter 4. The structure of this chapter mirrors Chapter 4
with the chapter being broken into two main sections – Safety Technologies and Health
Technologies – and each of these main sections being broken into subsections, each of which is
dedicated to one case study. Each subsection in Chapter 5 concludes by giving the root causes
for the success or failure of the technology introduction. The chapter concludes by combining the
results of all of the causal tree analyses to identify a generalized set of root causes for the success
or failure of new safety and health technology introductions.
In Chapter 6, the generalized root causes of successful and unsuccessful safety and health
technology introductions identified in Chapter 5 are used to conduct a bowtie analysis to develop
a set of strategies to prevent the promulgation of legislative or regulatory mandates for
technologies that are unlikely to achieve success as well as a set of strategies to mitigate the
negative consequences that would be experienced in the event that such a mandate is enacted.
In Chapter 7, a set of guidelines and recommendations for the introduction of new safety and
health technologies to the mining industry are presented. These guidelines and recommendations
are based on the results of the analysis in Chapters 5 and 6.
Finally, in Chapter 8, conclusions are presented.
8
Chapter 2: Background and Survey of Pertinent Literature
2.1 The Economics of Technological Change
To understand the processes through which new technologies are introduced to an industry it is
important to understand the economics of technological change. Extensive research has been
conducted to understand the economics that drive technological change and how regulatory
actions can influence those economics. Foundational work in this field was completed in the first
half of the twentieth century when researchers laid out economic theories of technological
change [2]. Schumpeter describes three stages in the process through which a new technology is
introduced: Invention, Innovation, and Diffusion. Invention refers to the development of a new
technology. Through innovation, this new technology is refined into a product that can be
commercialized. Finally, the product gradually becomes widely used through diffusion.
Research has been conducted to understand how firms make decisions during each of these
stages. A review and summary of some analytical frameworks for developing such an
understanding is given in [3]. Models for the invention and innovation stages of technological
change can be broadly categorized into two approaches, the first of which is to assume that
firms’ decisions regarding funding for research and development (R&D) are governed by an
effort to maximize value, and the second of which is to assume that firms base R&D funding
decisions not on economic optimization but on some other set of rules, for example a previously
established company policy or a set of “rules-of-thumb” [3, 4].
Under the assumption that firms act to maximize value, one can model the output of R&D as
“knowledge capital,” an asset that the firm can use to gain a competitive advantage [5, 6]. In this
way, R&D can be viewed as an investment activity; however, there are important peculiarities to
this type of investment that differ from investment in tangible assets. These differences include
9
the facts that the uncertainty associated with the outcome of R&D investments is very high, the
products of R&D are inherently intangible, and spillover of benefits to competing firms is
difficult or impossible to avoid [7]. The impact of uncertainty on R&D investment has been
investigated in terms of the implications for funding decisions [8, 9]. When coupled with the
inherent intangibility of R&D products, this high level of uncertainty makes it difficult,
especially for smaller firms, to secure funding, and may result in underinvestment. The other
major difficulty for R&D investment is the fact that spillover of benefits to competing firms is
difficult to avoid; in other words, it is difficult to prevent others from somehow making use of
the knowledge developed through R&D efforts [10, 5, 11, 7]. This issue of spillover may also
have the effect of reducing R&D investments.
If investment in R&D, and thereby in the invention and innovation of new technologies, is
viewed as being driven by decisions to maximize the benefits of the generated knowledge
capital, it is reasonable to conclude that invention and innovation can be induced by altering the
costs through policy and that this induced innovation can be understood from a profit-driven
perspective. However, some suggest that industries do not make R&D funding decisions based
on optimizing criteria. Rather, the high level of uncertainty and intangibility of R&D outcomes
necessitates that firms use a set of established routines or “rules of thumb” to make these funding
decisions [12]. If the assumption that R&D funding decisions are based on some economic
optimization is removed, then it becomes much more difficult to predict the impact of policy
designed to change the costs associated with safety, health or environmental impacts. Some have
argued that a new regulation that forces firms to re-evaluate their routine decision-making rules-
of-thumb, a “win-win” scenario can arise as the firm both complies with the new regulation and
10
also discovers a more efficient way of doing business [13, 14]. This “win-win” theory has been
met with skepticism and contrary findings have been published [15].
Following the invention and innovation of a new product, the gradual process of diffusion
begins. Theories to describe the diffusion process can be traced to two influential models. Both
models seek to explain the empirically observed S-shaped curve by which the number of
adopters grows. Initially only a few users adopt the technology at a slow rate. This is followed by
a period of rapid growth and then another slower period as the last few users adopt the
technology. This diffusion pattern has been consistently observed and documented for a wide
variety of technologies [16].
The first model to explain this pattern is referred to as the probit or rank model and attributes the
S-shaped diffusion curve to differences in the returns received or expected by various potential
users [17]. In this model, each user weighs the cost of the new product against the value it is
expected to provide. Since new products generally become less expensive as time passes, more
potential users will adopt the technology as the price falls below their individual threshold value.
If it is assumed that the value of the product to potential users follows a normal bell-shaped
distribution and that the price of the product falls in a smoothly decreasing fashion, this model
results in the expected S-shaped curve for diffusion.
An alternate model to explain the S-shaped curve of diffusion is the epidemic model, which ties
the diffusion of a product to the dissemination of information about that product [18, 19]. In this
model, which considers diffusion to be analogous to the spread of an infectious disease, posits
that, as people try the new product, they become a source of information about the product for
others in the population. Therefore, as more people adopt the technology, the rate at which
11
information about the product is disseminated increases, and diffusion follows suit. This process
is modeled by differential equations that result in the desired S-shaped curve.
2.2 The Effect of Policy on Technological Change
A large body of literature exists in the environmental arena dealing with the effect of various
regulatory strategies on the invention, innovation, and diffusion of new control technologies.
Some have argued, using industry surveys as evidence, that incentive-oriented policies are more
likely to result in technology change through lower compliance costs as compared to prescriptive
regulatory approaches [20, 4]. Case studies from the U.S. automotive industry have been used to
show that performance-based standards can result in significant induced innovation and diffusion
of new technologies [21]. Others have argued, with evidence based on analytical models, that
performance-based standards create a disincentive to the adoption of environmentally friendly
technologies [22].
Another question is whether technology-forcing regulations are effective. Again, a large body of
research exists from the field of environmental regulation. In general, this literature finds that
properly designed technology-forcing regulations can be effective at driving technological
change and diffusion [23, 21, 24, 25]. However, for these policies to be effective, it is necessary
that the government have superior knowledge of the technology, its potential impacts, and the
economics of its adoption [4, 26]. This knowledge can be used to strategically push for
technologies that are beyond the current capabilities of the industry. If the government is at a
knowledge deficit to the industry, it is possible that opponents to regulation can use their superior
knowledge to postpone or halt new regulations [27].
12
2.3 The Assessment of Environmental Control Technologies
In the regulation of greenhouse gases from stationary sources, standards such as best available
control technology (BACT), reasonably available control technology (RACT), and lowest
achievable emissions rate (LAER) are used. These standards were promulgated under the Clean
Air Act (42 U.S.C. § 7475). The U.S. Environmental Protection Agency (EPA), along with state
agencies, use these criteria to determine what air pollution control technology will be used to
control specific pollutants. Permits under these requirements are determined on a case-by-case
basis by state and local permitting agencies, and the EPA maintains a publicly available database
of the decisions [28]. In making the case-by-case decisions about what technologies satisfy the
BACT (or RACT, LAER) requirement, regulatory agencies are required by the Clean Air Act to
consider the achievable emission reduction along with cost and to demonstrate that the selected
technology is feasible.
The technologies proposed by a firm in air permit applications for a new stationary source of
pollution, such as a power plant, for which the BACT standard applies, are evaluated according
to a top down methodology [29]. This methodology requires applicants to first identify a list of
the available control technologies, often using the online clearinghouse maintained by the EPA.
This list of technologies is then reduced by eliminating technically infeasible options. The
remaining technologies are ranked according by control effectiveness, and each technology is
evaluated in order of this ranking. The evaluation considers energy impacts, environmental
impacts, and cost effectiveness. The technology that is ranked highest in terms of effectiveness
that cannot be eliminated based on this evaluation is selected. Guidance for complying with this
process are provided by the EPA in the New Source Review Workshop Manual [30]. Attempts at
improving the efficiency and ease of this approval process have been made [31, 32].
13
2.4 The Assessment of Technology Readiness
In order to evaluate the maturity of a technology for application in the mining industry, it is
necessary to have a clearly defined metric that is as objective as possible. Clearly, the desire for
such a metric is not unique to mining. In many industries and applications, engineers attempt to
evaluate whether a given technology is ready for deployment and use. A commonly used metric
is the Technology Readiness Levels (TRL). The TRL constitute a 9-level scale on which
technologies and components can be more objectively evaluated.
NASA developed the original Technology Readiness Levels in the 1980s as a means of
internally evaluating technologies to be used in space exploration [33, 34]. These TRL
definitions were subsequently modified and adopted by several other organizations including the
United States Air Force. A report published by the United States General Accountability Office
(GAO) in 1999 summarized the results of an investigation into the technology development and
deployment practices in the Department of Defense (DOD) [35]. This report was critical of the
DOD tendency to take on high levels of risk by promoting emerging technologies with low
levels of maturity. To better monitor and control this risk, the GAO recommended that the DOD
adopt the use of the TRL system developed by NASA. The DOD’s implementation of TRL is
detailed in the guidance provided in the DOD Technology Readiness Assessment Deskbook, first
published in 2003 and subsequently updated [36, 37].
Other alternative scales have also been developed by the Department of Energy (DOE) [38], and
the European Space Agency (ESA) [39]. More specialized implementations have also been
developed, for example to evaluate the readiness of software applications [40]. Note that this is
far from a complete list of the numerous implementations of the TRL concept. Many of these
14
implementations are largely the same with the most substantial differences in how they define
the environments in which the technologies are to be evaluated.
Aside from the TRL scales themselves, methods of calculating and implementing TRL include
the Technology Readiness Level Calculator (TRLC) developed by the United States Air Force
[41], the Technology Program Management Model (TPMM) developed by the United States
Army [42] and the Technology Readiness Assessments used by the DOD and the DOE [43, 37].
The Technology Readiness Assessments and the Technology Readiness Level Calculator are
similar in that they give a set of questions that are aimed at addressing different aspects of
technological readiness such as feasibility, reliability, maintainability, repeatability, robustness,
ruggedness, cost, and existence of a market. For some of the questions, very similar text appears
in both the DOD and the DOE guidance documents. However, many of the questions are also
highly industry-specific. Given this, it would be problematic to try to directly apply these
guidelines to mining safety and health technologies.
Regardless of how the TRL is calculated or exactly which scale is used, there are advantages and
limitations to using this method as an assessment tool. The key advantages are that it provides a
common language with which the technology status can be clearly communicated, it gives a
means of recognizing and managing risks associated with technology transition, and it gives a
largely objective measure that can be used to make decisions concerning funding and technology
adoption. A NASA study using mission data and pre-mission TRL assessments attempted to
quantify the benefits of using TRL in terms of program cost [44]. This study showed that, by
reducing uncertainty, the variability of program costs was reduced by 30%. Another study aimed
to quantify the economic value of TRAs in the DOD’s funding of technology development
15
projects and in technology acquisition decisions [45]. Although this study did conclude that a
positive economic impact is present, insufficient data was available to fully quantify this impact.
Other studies have looked at the limitations and challenges associated with TRL. Through
interviews with employees at organizations that use TRL, one study identified challenges and
potential pitfalls of the system [46]. These challenges were grouped into three categories: system
complexity, planning and review, and assessment validity. Another retrospective study of NASA
projects identified challenges with TRL assessment associated with difficulty in setting
appropriate cost and performance metrics that can be applied across a broad range of systems
and subsystems [47]. All of these challenges underscore the importance of clearly defined
guidance on how TRL-based tools can be used. Since no such guidance exists in the mining
industry, research is needed to understand the factors that are critical to the success of safety and
health technologies in the industry and to develop guidance specifically for mining.
16
Chapter 3: Methodology
3.1 Overall Research Approach
Several historical and contemporary examples of new safety and health technologies being
introduced to the mining industry have been assembled; this information comes from a variety of
sources including research literature, government records, and consultation with subject matter
experts. These detailed histories were examined to determine what factors or conditions existed
at various points in time and whether these factors positively or negatively impacted the
successful introduction of the technology.
Clearly, a definition for success is needed. For the purposes of this study, success of a safety or
health technology is understood in terms of performance, diffusion, and expected impact on
safety or health. For this study, success is defined by three characteristics:
1. For a safety and health technology to be considered successful, there must be evidence
that the technology, when used in the manner intended and when performing as expected,
will provide a material improvement to the safety or health of workers.
2. There must be evidence that the technology will meet some acceptable level of
performance. This performance level would need to be defined for the technology under
consideration; and defining characteristics of performance are likely to include accuracy,
reliability, robustness, maintainability, interoperability, among others. The performance
level should be selected such that it provides reasonable confidence that the technology
will perform as expected (i.e. that it will provide the intended safety or health benefit and
will not cause deleterious unintended safety or health implications) under a range of
operating conditions.
3. It must be possible to effectively diffuse the technology to a large subset of the industry.
17
Using this definition of success, the historical record of several technologies were examined
retrospectively to find evidence of whether the technology has achieved a successful or
unsuccessful outcome. Indications that the outcome was successful would include:
• There is documented evidence of an achieved safety or health benefit
• Documented successful trials were performed
• If not mandated, there was wide-spread voluntary adoption
• There is an indication of broad applicability throughout the industry
Indications of an unsuccessful outcome would include:
• There are documented failures of the technology
• The technology’s use introduces a new hazard
• There are low levels of adoption despite demonstrated ability to meet regulatory
standards
• Judicial intervention in rule-making or enforcement occurs
• Miners strongly resist the deployment and use of the technology
• After-rule time extensions occur
In each case, the characteristics of the technology and/or the conditions surrounding the
technology that caused or contributed to the successful or unsuccessful outcome was identified.
In determining which factors contribute to or limit success, causal tree analysis was used to
determine the root causes of the technology failure or success. Once the root causes for each of
the successes and failures were determined, they were categorized into a set of generalized root
causes. These generalized root causes were then be used, along with generalized outcomes, to
build a bow-tie analysis that provided a means of developing strategies to prevent the enactment
18
of mandates that are likely to be unsuccessful and to mitigate the negative outcomes of such
mandates if they are enacted. The development of these strategies draws on the research
literature such as previously developed models for technology development and diffusion as well
as on evaluation metrics used in other industries such as BACT and TRL.
3.2 Data Compilation and Consultation with Subject Matter Experts
For each of the technologies, a thorough review of the research literature was conducted. In
addition, government records, such as patents, MSHA product approvals, legislative records, and
regulatory records, was reviewed as they relate to the technology. Finally, subject matter experts
(SMEs)1 for each technology were consulted to ensure the accuracy and completeness of the
historical account. Based on these reviews, a summary of the history of each technology was
written.
For technologies considered successful according to the definitions provided in the previous
section, both mandated and voluntarily adopted technologies were included. However, for
unsuccessful outcomes, only mandated technologies were considered. This is for two reasons.
The first is that the research aims to capture challenges unique to mandated technologies. The
second is to avoid confounding errors due to survivorship bias. In other words, for the case of an
unsuccessful safety or health technology that was not mandated, little information is likely to
have been recorded. This would lead to an over-weighting of information on technologies for
1 For this research, subject matter experts were selected to be individuals who had both technical expertise in the
particular technology being considered as well as direct experience of the development, diffusion, and deployment
of that technology. The SMEs selected were employed by federal research and regulatory agencies, academic
institutions, and mining companies at the time the events of the case study occurred and were directly involved in
these events. The perspectives provided by these individuals was invaluable to understanding the details and nuance
of these case studies that are not fully captured in public documents and research literature.
19
which more information just happened to be recorded. By focusing strictly on mandated
technologies, the impact of this bias is minimized.
3.3 Identification of Factors that Influence the Success of New
Safety and Health Technologies
For each of the successful or unsuccessful safety and health outcomes examined, a causal tree
analysis was conducted to find the root causes for that outcome. In this method, the outcome is
placed at the top of a tree, such as the generic example shown in Figure 1. Direct causes for this
outcome are identified and form the second tier of the tree. For each direct cause, intermediate
causes are identified, which form the third tier of the tree. This process is continued by adding
further tiers until the root causes are found at the bottom of the tree.
Figure 1: Generic Causal Tree Analysis Framework
20
To generalize the findings on the causes of successful outcomes for safety and health
technologies in mining, a generalized set of outcomes and a generalized set of root causes for
those outcomes were defined. This was accomplished by identifying similarities between the
successful outcomes found in each of the root cause analyses. As with the successful outcomes,
generalized unsuccessful outcomes for mandated safety and health technologies and generalized
root causes for those outcomes were also identified.
3.4 Development of Strategies to Improve the Likelihood of Success
for New Safety and Health Technology Mandates
For the general case of the failure of a safety or health technology mandate, a bow-tie analysis
was performed. Bow-tie analysis is a method typically used to develop mitigation strategies for
hazards, such as those found in occupational safety and health. A generic framework for bow-tie
analysis is given in Figure 2. This method was adapted for the purposes of this research to
develop strategies to minimize the likelihood of unsuccessful outcomes for mandated safety and
health technologies in mining. This modified bow-tie analysis framework is given in Figure 3.
Figure 2: Generic bow-tie analysis framework
21
Figure 3: Bow-tie analysis framework as applied in the proposed research
At the center of the bow-tie is the hazardous event that occurred. In modified bow-tie analysis
framework, the hazardous event is considered to be the promulgation, either through legislation
or regulation, of a mandate for a safety or health technology that is not likely to be successful.
The threats that potentially contributed to the event are placed to the left. In the modified
framework, these threats are the generalized root causes for the failure of mining safety and
health technology mandates. On the right side of the bow-tie are the outcomes. In the modified
framework, these are the generalized failures of mining safety and health mandates. With this
framework in place, it is possible to identify potential control measures which are intended to
prevent the threats from leading to the hazardous event, as well as recovery measures which are
intended to prevent the outcomes from occurring if the hazardous event occurs. In the modified
framework, the control measures are strategies that are expected to reduce the likelihood that a
mandate will be promulgated before the technology is likely to be successful, and the recovery
22
measures are strategies that are expected to mitigate the repercussions in the event that such a
mandate is promulgated.
The control measures in the bow-tie analysis (i.e. the strategies to reduce the likelihood that a
mandate will be promulgated before the technology is likely to be successful) were developed
through a combination of three approaches:
1. Established technology evaluation frameworks, such as BACT and TRL, were
considered, and strategies from these frameworks were applied and adapted as
appropriate.
2. The generalized root causes for successful safety and health outcomes were contrasted
with those for unsuccessful outcomes. Strategies to transform the conditions encountered
in the latter into the conditions encountered in the former were developed.
3. Subject matter experts in mining safety and health were consulted to review strategies
developed by the above two methods and to suggest revisions.
As with the control measures, the recovery measures in the bow-tie analysis (i.e. the strategies to
mitigate the repercussions in the event that an unsuccessful safety or health technology mandate
is promulgated) were developed through a combination of three approaches:
1. Established technology evaluation frameworks, such as BACT and TRL, were
considered, and strategies from these frameworks will be applied and adapted as
appropriate.
2. The generalized successful safety and health outcomes were contrasted with the
generalized unsuccessful outcomes. Strategies to transform the conditions encountered in
the latter into the conditions encountered in the former were developed.
23
3. Subject matter experts in mining safety and health were consulted to review strategies
developed by the above two methods and to suggest revisions.
The results of the bowtie analysis constitute a set of guidelines to maximize the likelihood of
successful outcomes, and minimize the likelihood of unsuccessful outcomes, for new safety and
health technology mandates.
24
Chapter 4: Case Studies of Safety and Health Technology
Introduction to the Mining Industry
The seven representative cases of new technologies, which informed the analysis of this study,
are introduced in this chapter. The interventions presented here include both technologies that
were forced to be developed through government mandate as well as technologies that were
voluntarily adopted by the mining industry. First, the following five safety interventions will be
presented.
Case 1: Refuge alternatives
Case 2: Self-contained self-rescuers
Case 3: Primary communications and tracking systems
Case 4: Proximity detection systems
Case 5: LED cap lamps
Then the following two health interventions examined are presented.
Case 6: Noise controls for continuous mining machines
Case 7: Noise controls for roof bolting machines
For each of these technologies, a thorough review of the research literature and other records has
been conducted and is documented in this chapter. From this review, indications of success or
failure for each technology have been identified. In Chapter 5, the causes of these indications of
success or failure are presented.
25
4.1 Safety Interventions
4.1.1: Case 1: Refuge Alternatives for Use in Underground Coal Mines
A refuge alternative (RA), also referred to as refuge chamber, rescue chamber, refuge shelter,
and similar names, is an enclosed place within a mine where miners can go to take refuge and
await rescue in the event that they are not able to escape the mine following a disaster such as a
fire, an explosion, a major roof fall, or an inundation. Two well-known types of RA are portable
RAs and built-in-place (BIP) RAs. A portable RA is a manufactured unit which can be a rigid
steel structure, an inflatable tent deployed from a steel skid, or some hybrid of the two, and is
brought into the mine and can be moved as the mine advances. A BIP RA is a room in the mine
that is isolated by either one block stopping for an RA in a dead-end entry or by a block stopping
at each end for an RA installed in a crosscut. Figure 4, Figure 5, and Figure 6 show a metal-type
portable RA, a tent-type portable RA and the door to a BIP RA, respectively.
Figure 4: Metal-type portable refuge alternative
26
Figure 5: A tent-type portable refuge alternative deployed in the Experimental Mine at the NIOSH facility in
Pittsburgh
Figure 6: Door to a built-in-place refuge alternative constructed in the Experimental Mine at the NIOSH facility in
Pittsburgh
27
Background on Refuge Alternatives Prior to the Sago Mine Disaster
The concept of providing a safe space within the mine for miners to go in the event of a disaster
is not new. Publications by the US Bureau of Mines suggested the concept as early as 1912 [48,
49]. A 1941 Bureau of Mines report described the construction of a built-in-place chamber which
was 75ft long by 8ft high by 11ft wide and connected to the surface by two boreholes to provide
air, communications, water, and food [50].
Section 315 of the Federal Coal Mine Health and Safety Act of 1969 granted the federal
government the authority to require refuge alternatives in underground coal mines:
The Secretary or an authorized representative of the Secretary may prescribe in
any coal mine that rescue chambers, properly sealed and ventilated, be erected at
suitable locations in the mine to which persons may go in case of an emergency
for protection against hazards. Such chambers shall be properly equipped with
first aid materials, an adequate supply of air and self-contained breathing
equipment, an independent communication system to the surface, and proper
accommodations for the persons while awaiting rescue, and such other equipment
as the Secretary may require. A plan for the erection, maintenance, and revisions
of such chambers and the training of the miners in their proper use shall be
submitted by the operator to the Secretary for his approval.
However, this requirement was never enacted or enforced due to concerns about the feasibility of
the technology. Rather, the paradigm was that in the event that they were unable to escape a
mine disaster, miners should erect a barricade across a dead-end entry by hanging curtain or
stacking block in order to create an isolated space.
28
In the late 1970s and early 1980s, the Bureau of Mines funded a research contract with Foster-
Miller, Inc. to develop guidelines for the design, construction, stocking, and maintenance of
refuge alternatives. The contract resulted in guidelines in the following topic areas: breathable air
supply, infiltration of harmful gases, chamber pressurization, chamber construction, chamber
location, power and lighting, equipment and supplies, communications, psychological aspects,
and training [51, 52]. While the use of refuge alternatives was implemented for non-coal mines
following a mandate in the 1977 Mine Act, technical challenges prevented their use in coal
mines. Therefore, the common practice in coal remained barricading.
The Call for Refuge Alternatives in Response to the Sago Mine Disaster
On January 2, 2006, the Sago mine disaster underscored a need for refuge alternatives. The Sago
disaster was unique in that it was unambiguously clear that if an RA had been available, miners
would have had a substantially better chance of survival. The miners at Sago were unable to
escape the mine and hung a curtain across a dead-end entry; however, this was not sufficient to
prevent them from being exposed to toxic levels of carbon monoxide (CO), and 12 of the 13
trapped miners died from exposure to this harmful atmosphere [53, 54, 55].
The public response to the Sago disaster was intense. One factor that contributed to the strong
public reaction was the reporting of false statements during the rescue that 12 of the 13 miners
had been found alive, when in fact there was only one survivor [56, 57]. But media attention and
criticism following the disaster was not only about this unfortunate miscommunication. In the
days and months following the Sago disaster, media coverage scrutinized the mine
management’s safety record and the government’s role in mine safety and health enforcement.
For example, the New York Times published a pair of editorials on January 5-6, 2006 which
called into question the independence and objectivity of mining regulatory agencies, saying that
29
“workers' risks are balanced against company profits in an industry with pervasive political clout
and patronage inroads in government regulatory agencies.” The editorials stated that “the Bush
administration's cramming of important posts in the Department of the Interior with biased
operatives from the coal, oil and gas industry is not reassuring about general safety in the mines”
and asserted that the miners “might have survived if government had lived up to its
responsibilities” [58, 59]. In addition, several media outlets scrutinized the safety record at Sago
and the history of citations and orders issued against the mine by MSHA [60].
Several investigations of the Sago Mine disaster were launched in the days following the
disaster. MSHA announced its investigation on January 4, followed by West Virginia which
announced that an independent investigation would be headed by Davitt McAteer, former
assistant secretary for MSHA under the Clinton Administration [61].
On January 9, Senator Robert Byrd (Democrat from West Virginia), along with Senators Arlen
Specter (Republican from Pennsylvania) and Tom Harkin (Democrat from Iowa), announced that
the Labor-HHS Appropriations Subcommittee would hold hearings beginning January 19
(rescheduled to January 21) on the role of the federal government in the Sago disaster [62],
saying:
In Congress, there are tough questions to be asked of the federal Mine Safety and
Health Administration. Is enforcement of coal mining regulations tough enough?
Are the regulations on the books today current enough to handle the challenges
posed by 21st century coal mining? Are mine hazards being minimized? These
and other issues demand scrutiny, and the miners' families deserve the answers.
Leading up to these hearings, several members of Congress were quoted questioning whether the
government was fulfilling its responsibility to provide miners with a safe place to work [63].
30
Senator Byrd said, "I don't believe that the federal government is doing enough to protect coal
miners from future tragedies,” and Senator Jay Rockefeller said, “We need congressional
hearings not only so that we can determine what happened at Sago, but, more broadly, about the
state of mine safety across West Virginia and across the country. Coal is on the rise in our
country and safety must be too.” A letter from a bipartisan group of 12 senators requesting a
series of budget hearings on budget and staffing levels for MSHA said, "We look forward to
sending strong, bipartisan mine safety legislation to the president for his signature before the end
of the year. The miners who died at Sago deserve no less."
Given the miscommunication of the number of survivors reported to the media, the media
scrutiny of the mines safety record and the role of the government in enforcing safety standards,
and the attention from Congress, it is understandable that there was a strong public outcry for
stronger mine safety regulation. Since the nature of the accident was such that it was clear that
the miners would have had a significantly better chance of survival if a refuge alternative had
been available, this outcry was, in large part, for legislation or regulation requiring refuge
alternatives.
Legislative Actions Following Sago
Days before the Senate hearings on Sago began and in the midst of intense public and media
attention, another mine disaster occurred on January 19, 2006 when a belt fire at the Aracoma
Alma Mine killed two miners. In the following week on January 25, MSHA issued a Request for
Information (RFI) to gather public input on “Underground Mine Rescue Equipment and
Technology.” Another week later, on February 1, Senator Byrd introduced the Federal Mine
Safety and Health Act of 2006, which was not enacted but contained several elements eventually
incorporated into the MINER Act.
31
At the end of March, the comment period on MSHA’s RFI ended, having gathered information
from several companies and organizations who represented refuge chamber technology as
feasible with minimal development required.
Shortly thereafter on May 16, Senator Michael Enzi introduced the MINER Act. Four days later
on May 20, a disaster at the Darby Mine No. 1 killed 5 miners, and four days after Darby, the
MINER Act passed the Senate. The Act also moved very quickly through the House of
Representatives, passing on June 7. A week later, on June 15, 2006, President George W. Bush
signed the MINER Act into law.
The rapid pace with which these actions were completed was undoubtedly fueled by the political
and social pressure to respond to the disasters at Sago, Alma, and Darby. The rapid succession of
events also makes it clear that it would have been difficult, if not impossible, to properly evaluate
claims on feasibility and technology readiness submitted to the RFI and provided at hearings.
The MINER Act that NIOSH conduct “research, including field tests, concerning the utility,
practicality, survivability, and cost of various refuge alternatives in an underground coal mine
environment, including commercially-available portable refuge chambers,” and to provide a
report to Congress on the results of this research within 18 months. (Section 13)
Research on Refuge Alternatives Following the MINER Act
In accordance with the MINER Act mandate, the NIOSH Office of Mine Safety and Health
Research (OMSHR) began conducting research on refuge alternatives and provided a report to
MSHA in December of 2007 [64, 65, 66]. This research included testing on four portable refuge
alternatives. Shortcomings were identified with these RAs having to do with heat dissipation,
time to deploy, and ability to maintain CO2 concentration at the suggested level. NIOSH
32
considered these deficiencies to be “sufficiently serious in three of the chambers to require
correction before deployment.”
All of the RAs tested had been approved by West Virginia based on representations of the
manufacturers and certification by professional engineers. The fact that serious deficiencies in
these RAs led NIOSH to conclude that “computational models and other engineering analyses
alone cannot be relied upon for approval and certification of complex systems such as refuge
chambers. The results of the testing indicate the need for independent evaluations and testing
beyond the chamber manufacturers.” Yet, at this time, no guidance for such independent testing
and certification existed [64].
The NIOSH report to Congress concluded that although “some commercially available portable
chambers have operational deficiencies that will delay their deployment in mines” and although
“there are some remaining knowledge or technology gaps for the design and specification of
refuge alternatives” that “the benefits of refuge alternatives and the general specification of these
alternatives are sufficiently known to merit their commercialization and deployment in
underground coal mines.” However, this report also acknowledged the rapidly changing state of
the art for refuge alternatives by recommending that “any regulations on the specification,
location, and conditions of use for refuge alternatives should accommodate the rapidly changing
state of knowledge and technology.” [64]
In addition to intramural research, NIOSH also contracted with Foster-Miller, Inc. to conduct a
study that concluded in 2007 to develop guidelines for design, deployment, and use of RAs [67,
68]. This report demonstrated a potential benefit of RAs by estimating the potential number of
lives that may have been saved in past mine disasters had an RA been available. While this
report provided guidance for technical topics such as heat mitigation, atmosphere management,
33
and explosion survivability, it also highlighted the need for further research to fully understand
the safety implications of these design elements.
MSHA Regulation on Refuge Alternatives
On June 16, 2008 MSHA published a Notice of Proposed Rulemaking (NPRM) for a refuge
alternatives regulation. Public comments were sought and four public hearings were held on July
29, July 31, August 5, and August 7, 2008 in Salt Lake City, UT, Charleston, WV, Lexington,
KY, and Birmingham, AL, respectively [69]. After the comment period on this proposed rule
closed on August 18, MSHA acted very quickly to finalize the rule on December 31, 2008 [70].
As with the passage of the MINER Act, the promulgation of this regulation proceeded unusually
rapidly as compared to the timelines typically seen for other safety and health regulations,
indicating the political pressure under which decisions were being made.
After the promulgation of this rule, legal actions were taken due to industry objections to the
rule’s requirements. Most notably, on October 26, 2010, the D.C. Circuit Court of Appeals, in
response to objections that MSHA had not provided adequate justification for the requirements
of the rule, issued a decision requiring MSHA to re-open the record on the regulation in order to
provide interested parties to provide further input [71]. In August of 2013, based on this ruling,
MSHA re-opened the record [72] and issued an RFI [73] requesting “data, comments, and
information on issues and options relevant to miners’ escape and refuge that may present more
effective solutions than the existing rule during underground coal mine emergencies,” stating
that responses to the RFI would “assist MSHA in determining if changes to existing practices
and regulations would improve the overall strategy for survivability, escape, and training to
protect miners in an emergency.”
34
The comment period for this RFI was originally set to run through October 7, 2013; however,
due to lingering questions about the safety of RAs and in anticipation of results from ongoing
research, multiple extensions were issued extending the deadline for comment submission to
December 6, 2013 [74], then to June 2, 2014 [75], then to October 2, 2014 [76], and finally to
April 2, 2015 [77]. Among the questions that drove these extensions were the buildup of heat and
humidity within the RA, the ingress of CO and other contaminants when miners entered the RA,
the explosion survivability of RA doors, valves, and other components, and the emergence of
new technologies related to communications, breathable air delivery, heat mitigation, and other
factors. Following the RFI closing, the record was again reopened on September 18, 2015 to
schedule a public meeting on October 19, 2015 at the MSHA National Mine Health and Safety
Academy in Beaver WV to discuss these and other remaining questions [78], and in November
of 2015, the RFI was once again re-opened until January 15, 2016 to allow comments stemming
from this public meeting [79].
The legal challenges to the requirements of this regulation and the repeated re-opening and
extending of the rulemaking process are indications that the mandate for refuge alternatives had
limited success.
Refuge Alternatives Training
In addition to research on the engineering performance of RAs, NIOSH and others also
conducted extensive research to provide guidance on training for RAs. This is of particular
interest as it pertains to the voiced forceful reluctance of many miners to utilize an RA in the
event of an emergency.
35
Investigations by the Mine Safety Technology and Training Commission (MSTTC), the West
Virginia Mine Safety Technology Task Force (WVMSTTF), the Government Accountability
Office (GAO), and others to assess coal miners’ readiness to self-escape, which identified
multiple deficiencies in the availability and effectiveness of training [80, 81, 82, 83, 53]. A later
report in 2013 from the National Academy of Sciences (NAS) identified similar deficiencies
[84].
NIOSH has conducted research on the self-escape competencies (SEC) that are needed by miners
to successfully escape a mine disaster. A reasonably comprehensive list of these competencies
was published in [85] and includes items such as “Realistic expectations about using refuge
chambers,” “Where to find refuge chambers,” “How to use refuge chambers,” and “when to use
refuge chambers,” as well as similar competencies related to SCSRs. A study published by
NIOSH in 2015 provided guidance on ways to improve mine workers’ SEC, recommending that
rigorous assessments of SEC are needed, that better evaluation tools are need to aid these
assessments, and that debriefing practices following training need to be improved [86]. Both
NAS and NIOSH concluded that SECs for which miners may need better training include
competencies related to refuge alternatives and SCSRs [84, 86].
Recommendations for training regarding refuge alternatives, as well as training programs
published by NIOSH and MSHA, advise that refuge alternatives should be used as a last resort in
the event that self-escape is not possible due to all means of egress being blocked or injury or, if
the design and deployment of the refuge alternative permits it, as a way station to rest,
communicate with the surface, or switch over SCSRs during self-escape [87, 88, 89, 90, 91, 92].
NIOSH has also published similar guidance for RA manufacturers to use in the development of
their instructional materials [93].
36
The fact that training advises miners to use RAs as a last resort may help to explain the
commonly observed reluctance of miners to utilize this technology; however, the reasons that a
miner would or would not enter an RA undoubtedly vary from person to person. As one NIOSH
training program put it, “In the end, it boils down to where they place their most faith – in the
mine rescue team’s ability to come get them or in their ability to make it out on their own” [87].
Indications of Technology Success or Failure for Refuge Alternatives
Although refuge alternatives are now common within the underground coal mining industry,
there are indications that the regulatory mandate for their use has not achieved as much success
as it could have. These indications include judicial intervention in rulemaking and after-rule time
extensions. In addition, there is strong resistance to the deployment and use of the technology by
miners; however, it is possible that this is due at least in part to miners being trained to only use
RAs as a last resort or as a way station during escape.
An analysis of these indications of technology mandate failure is presented in Section 5.1.1.
37
4.1.2 Case 2: Self-Contained Self-Rescuers
Background on Self-Contained Self-Rescuers and Regulatory Requirements
Since June 21, 1981, coal mine operators have been required to make a self-contained self-
rescuer (SCSR) available to each person who enters an underground coal mine in the United
States (30 CFR 75.1714). After the Sago Mine disaster, an emergency temporary standard
increased the requirement to two hours of breathable air per miner, and the MINER Act of 2006
added the requirement for an additional two hours of breathable air to be kept in caches at a
distance of no further than an average miner could walk in 30 minutes from the deepest working
area of the mine along the escapeway to the surface.
SCSRs provide breathable air by recirculating exhaled air through a chemical bed that produces
oxygen (O2) and absorbs exhaled carbon dioxide (CO2). The CSE SR-100, shown in Figure 7,
was approved jointly by NIOSH and MSHA as a one-hour SCSR on February 23, 1989 based on
42 CFR Part 84 (approval number TC-13F-0239). The SR-100 provides about 100 liters of
usable oxygen and has a rated duration of 60 minutes. Potassium superoxide (KO2), a yellow
solid that turns grey as it is reacted, is used as the oxygen-producing chemical bed. It is a yellow
solid but turns a dark grey as it is reacted. In addition, Lithium hydroxide (LiOH), a white solid,
is also used to absorb carbon dioxide.
A starter oxygen cylinder is used to activate the SR-100 unit and start the reaction. This is done
by pulling an actuator tag attached to the cylinder. Miners are advised that, once donned, the
SCSR should not be removed for any reason until safety is reached or until the oxygen supply is
completely depleted. Daily visual inspections are required to detect damage to the unit, and more
rigorous inspections are required every 90 days.
38
Figure 7: CSE SR-100 Self-Contained Self-Rescuer
The Response to the Sago Mine Disaster with Regard to Self-Contained Self-Rescuers
In the previous section on refuge alternatives, the public and legislative response to the Sago,
Alma, and Darby mine disasters was described. Much of the discussion there also applies to
SCSRs. As with RAs, it was very clear that more effective SCSRs or better knowledge on the
part of miners on how to use SCSRs could have significantly improved the miners’ chances for
survival at Sago. The apparent deficiencies of the SCSRs at Sago were poignantly described in a
letter by the sole survivor of the miners trapped at Sago, Randal McCloy Jr., published in the
Charleston Gazette-Mail on April 26, 2006 [94]:
[T]he mine filled quickly with fumes and thick smoke and … breathing conditions
were nearly unbearable. The first thing we did was activate our rescuers, as we
had been trained. At least four of the rescuers did not function. I shared my
rescuer with Jerry Groves, while Junior Toler, Jesse Jones and Tom Anderson
39
sought help from others. There were not enough rescuers to go around. … The air
was so bad that we had to abandon our escape attempt and return to the coal rib,
where we hung a curtain to try to protect ourselves. … The air behind the curtain
grew worse, so I tried to lie as low as possible and take shallow breaths. While
methane does not have an odor like propane and is considered undetectable, I
could tell that it was gassy… There was just so much gas. We were worried and
afraid, but we began to accept our fate… As time went on, I became very dizzy
and lightheaded. Some drifted off into what appeared to be a deep sleep, and one
person sitting near me collapsed and fell off his bucket, not moving. It was clear
that there was nothing I could do to help him.
The report on the West Virginia investigation of Sago, published on December 11, 2006
confirmed that CO exposure was the cause of death and provided information on the SCSRs
recovered from the mine [54]. Seventeen (17) SCSRs used by the miners were recovered from
the mine, in addition to several SCSRs carried into the mine by the rescue teams. The
investigators, and NIOSH researchers who performed evaluations of the SCSRs, were unable to
estimate the oxygen production of the recovered units. Estimates of the remaining oxygen-
producing capacity of a deployed SCSR depend on an estimate of how much potassium
superoxide is remaining unreacted in the unit. This can be completed by a visual inspection,
which is a subjective estimate completed by comparing the approximate quantity of unreacted
material (which is yellow in color) to the approximate quantity of reacted material (which
appears pale yellow or white in color). An alternative test is to grind the entire recovered
chemical into a homogeneous batch, then add portions of that batch to a liquid catalyst which
releases the oxygen from the unreacted material. Neither test gives an accurate estimate of the
40
oxygen production of the unit because neither test takes into account decreased air flow that can
occur during use due to particles fusing or becoming coated. In addition, after use, the units
continued to be exposed to the atmosphere, which would cause slight continued depletion of the
chemical bed [54].
The West Virginia investigation also discussed interviews conducted with miners who survived
the Sago disaster. A total of 33 persons were underground after the explosion for a period of time
sufficient to be exposed to harmful gases. Of these, 15 donned SCSRs that operated adequately,
14 chose not to don their SCSRs, 4 SCSRs were reported as not functioning properly, and 1
miner was injured such that he could not have donned an SCSR [54]. In these interviews, several
miners indicated that they chose not to use their SCSRs while others said that they removed
SCSRs to talk or because breathing was difficult.
The MSHA investigation report from Sago, published on May 9, 2007 [55] provided similar and
further findings. SCSRs recovered from the mine were visually inspected. However, in most
cases, it was impossible to determine whether the units would have passed the normal daily
inspections before the disaster due to the fact that the units had been opened and the conditions
of seals, the moisture or temperature indicator, and security bands could not be assessed.
Interviews with miners and mine records indicated that several of the miners did not have
required training and that inspections either were not performed or were not documented [55].
Also of note in the MSHA investigation was that miners reported difficulties in using the SCSRs.
Miners indicated difficulty opening the units, including one miner who stated that he had to use
channel locks to open his unit. Miners indicated that they had to perform the manual start
procedure to activate their SCSR, but it was not clear whether this was due to failure of the
starter oxygen or some other cause [55].
41
While the public reaction to the disasters of 2006 was intense and called for stronger mining
safety and health rules, the changes in rules regarding SCSRs were fairly mild as compared to
the changes for RAs, communications systems and tracking systems, which were technology-
forcing mandates. The rules for SCSRs, on the other hand, were not changed in the form of a
technology forcing mandate. An emergency temporary standard increased the requirement to two
hours of breathable air per miner, and the MINER Act added the requirement for an additional
two hours of breathable air to be kept in caches.
Identification of Issues Related to Quality Control and Manufacture
On February 26, 2010 the NIOSH National Personal Protective Technology Laboratory (NPPTL)
published a public notice stating that NIOSH and MSHA had opened a joint investigation
concerning a problem that CSE had identified and reported to NIOSH with the SR-100 [95]. CSE
had discovered that one lot of SCSRs delivered less than expected oxygen. Analysis by NIOSH
revealed that up to 1% of the units in the lot may have oxygen starter problems, and it was
suspected that a total of 4071 units may have been affected. At this time, MSHA and NIOSH
advised mine workers that to immediately don another SCSR in the event that the breathing bag
in their SCSR did not inflate and to perform the manual start procedure in the event that a second
SCSR was unavailable. Mine operators were advised to make backup SCSRs available to all
underground workers.
On May 10 of the same year, a press release from CSE stated that CSE was investigating the
starter oxygen issue and that “until the root cause can be identified, we must assume that the
potential for start-up oxygen cylinders to fail may extend to any field deployed unit, and not just
the serial numbers that were previously identified.” [96]
42
A public notice from NPPTL on June 23 provided an explanation for why NIOSH’s Long Term
Field Evaluation (LTFE) Program had failed to identify the starter oxygen issue because starter
oxygen failures in the LTFE had been attributed to environmental factors rather than to
manufacturing defects [97]. However, the starter oxygen failures reported by CSE had been
observed during an in-process quality control check conducted during production. The NIOSH
notice stated that “while there is still information to suggest that environmental factors may
increase the likelihood of these failures, the new information from CSE placed the source of the
observed failures back to the point of manufacture.” On the same day, NPPTL also published a
notice that the failure was expected to extend beyond the initial suspect production lot and that
CSE had stopped production of the SR-100 pending identification of the failure mode and the
identification of a resolution [98].
On September 29, 2010 NPPTL announced that beginning in October 2010, NIOSH and MSHA
would begin collecting and testing a sample of 500 SR-100 SCSRs using a quality assurance
(QA) approach to quantify the prevalence of failed oxygen starter problems among field-
deployed units [99]. The sampling and testing protocol to be used for this test, which was
designed to provide an adequate sample size to enable statistically significant conclusions, was
published on the same day [100].
NPPTL planned to complete the collection and testing of the 500 SR-100 units by the end of
December 2010 [101]. However, by the end of the year, only 80 of the 500 units had been
collected and tested [102]. Among those 80 units, no failures were observed. Difficulty in
obtaining more units was attributed to reluctance of mine operators to voluntarily provide units
because replacement units were difficult to obtain. Therefore, NIOSH began offering
replacement units from other manufacturers to replace the SR-100 units collected for testing.
43
On February 15, 2011 NPPTL published that 109 of the 500 units collected and tested and that
one (1) failure had been observed among those units [103]. By May 17, 2011, NPPTL had
collected and tested 269 of the 500 units [104]. Of those 269 tests, four (4) failures had been
observed, which was sufficient to conclude that the failure rate could not be assured to be less
than 1%. On July 29, 2011 NPPTL announced that sample collection and testing of all 500 units
was completed and that five (5) failures had been observed [105]. Per the protocol published in
September 2010, this was used to calculate the Limiting Quality level as greater than 1.25% and
less than 2% using ANSI/ASQC Standard Q3-1988 [106]. This was judged by NIOSH to be an
unacceptable failure rate for long-term deployment [105]. Plans for an orderly phase-out of the
SR-100 began to be developed at this time. Detailed results of tests were published in April,
2012 [107].
Also in April of 2012, NPPTL announced the phase-out of the SR-100 [108]. OSHA required
units in use for non-mining applications to be removed from service no later than May 31, 2012
[109], while MSHA required units that were worn or carried by miners or stored on mantrips to
be replaced with any other approved one-hour SCSR by April 26, 2013 and all units to be
replaced by December 31, 2013 [110, 111].
Prior Failure to Prevent Quality Control Issues
Following the identification and quantification of the starter oxygen quality control issue with
the CSE SR-100, questions around why prior evaluations of the SCSR failed to predict this
problem.
44
NIOSH had conducted long-term evaluations of field-deployed SCSRs, including the CSE SR-
100 under the Long Term Field Evaluation (LTFE). As far back as 1990, this testing of the SR-
100 revealed performance issues [112], notably including the identification of manufacturing
defects with the oxygen starter bottles: “Several units did not have oxygen in the starter bottles
requiring cold starts. In one heat-treated unit to be treadmill tested, the human test subject chose
not to continue when the oxygen level fell below 16%. It was later determined that the burst disk
was defective and that the venting of the oxygen was not a result of the heat treatment.”
However, the significance of the manufacturing defects were minimized by stating that the issues
had been resolved: “Laboratory environmental testing of the SR-100 has uncovered a
manufacturing defect in the burst disk of the oxygen starter bottle and a design problem with the
desiccant bag. Both of these problems have been corrected by the manufacturer.” The
researchers concluded that the design and manufacture of the units was satisfactory and that, if
properly maintained and inspected, that they could be relied upon, stating, “The major problem is
predicted to be not with the apparatus, but with training the user to inspect properly the
apparatus.”
A later NIOSH study from 1992 specifically noted quality control problems [113]: “A number of
quality control problem were discovered in the long-term field evaluation. These problems were
reported to NIOSH, MSHA, and the breathing apparatus manufacturers. In each case, action has
been taken to solve the problems.” Despite specifically recognizing quality control problems, the
report concludes that the primary issue is with degradation of the units in the field rather than
with manufacture, stating that the “results of this study suggest that the large majority of SCSR’s
that pass their inspection criteria can be relied upon to provide a safe level of life support
capability for mine escape purposes.”
45
Nearly identical wording appears in reports from 1994 [114] (“The results of this study suggest
that the large majority of SCSR’s that pass their inspection criteria can be relied upon to provide
a safe level of life support capability for mine escape purposes.”), 1996 [115] (“The results of
this fifth-phase SCSR test study at PRC suggest that the large majority of SCSR's that pass their
inspection criteria can be relied upon to provide a safe level of life support capability to allow
miners to escape safely during a mine emergency. However, the mining environment appears to
have caused some performance degradation in the CSE SR-100.”), 2000 [116] (“The results of
this sixth-phase SCSR test study at PRL suggest that the large majority of SCSRs that pass their
inspection criteria can be relied upon to provide a safe level of life support capability to allow
miners to escape safely during a mine emergency. However, the mining environment seems to
have caused some performance degradation in the CSE SR-100 and the MSA Portal-Pack.”), and
2002 [117] (“The results of this study suggest that the large majority of SCSRs that pass their
inspection criteria can be relied upon to provide a safe level of life support capability for mine
escape purposes. However, the mining environment seems to have caused some performance
degradation in the CSE SR-100, Draeger OXY K-Plus, and Ocenco M-20.”).
In 2006, the eighth and ninth phase results of the LTFE were published [118]. This was
published after the Sago Mine disaster and after the passage of the MINER Act and included a
more direct description of the failures observed with the CSE SR-100:
The results of this study suggest that some performance degradation was
observed. The CSE SR-100s exhibit problems with CO2 levels exceeding 4%
(65% of all units tested, with 29% of these occurring before 60 minutes); stuck-
together breathing hoses (19%) which were prone to tear; starter-O2 failure
(16%); breathing hose punctures and tears (9%); breathing pressures exceeding
46
+200 mm H2O or -300 mm H2O (36%); and loose particles in the breathing hose
(31%). The loose particles caused coughing in all human-subject tests.
Similar results and wording was also included in the publication of the tenth phase results of the
LTFE in 2008 [119]:
The results of this study suggest that the large majority of SCSRs that pass their
inspection criteria can be relied upon to provide a safe level of life support for
mine escape purposes. However, the mining environment seems to have caused
some performance degradation in all the apparatus to some degree. The CSE SR-
100 is exhibiting problems of CO2 exceeding 4% (66%), stuck-together breathing
hoses (11%), starter-O2 failure (16%), breathing hose punctures and tears (4%),
breathing pressures exceeding +200 mm H2O or -300 mm H2O (31%), and loose
particulates in the breathing hose (23%). The loose particulates caused coughing
in human-subject tests.
Despite the repeated identification of performance and quality control issues with the SR-
100 over the course of nearly two decades, the quality control issues with the oxygen
starter bottles that was reported by CSE in 2010 and eventually led to the discontinuation
of the SR-100 were apparently not recognized. This appears to be due to the propagation
of the alternative explanation that performance issues with the units were solely due to
degradation of the units in the field. In addition, the importance of previous observations
of manufacturing defects were discounted by considering the issued solved by the
manufacturer. Finally, the LTFE testing did not utilize statistically driven experimental
design and sampled an insufficient number of units to identify the issues of the sort
identified in the 2010-2011 test of 500 SR-100 units.
47
Indications of Technology Success or Failure for Self-Contained Self-Rescuers
The unacceptably high level of quality control problems with the CSE SR-100 SCSR represents
a documented failure of the technology, which is an indication of a failure of the mandate for the
use of SCSRs. In this case, the failure appears to lie in the testing and certification of the
technology rather than in the mandate itself.
An analysis of this indications of technology mandate failure is presented in Section 5.1.2.
48
4.1.3 Case 3: Primary Communications and Tracking Systems
Primary Communications Technologies
There are four main types of communications systems used in underground coal mines [120,
121, 122]:
1. Leaky feeder
2. Wired node-based
3. Wireless node-based
4. Medium frequency (MF)
5. Through-the-earth (TTE)
Leaky feeder systems have a long history in mining and tunneling applications [123]. Leaky
feeder cable, as shown in Figure 8, is a coaxial-type cable designed to radiate a portion of the
signal through a holes in its shielding, acts as a distributed antenna as well as a transmission line.
In this way, two-way communication signals are allowed to enter and exit the cable and to
propagate along the cable as needed. Coverage of a leaky feeder system depends is limited to the
areas of the mine where the leaky feeder system is run; however, it is possible to extend coverage
using antennas branching off from the leaky feeder line [122].
49
Figure 8: Leaky feeder cable
Node-based systems, also referred to as wireless-mesh systems, are formed from a number of
network nodes distributed throughout the mine. These nodes communicate with each other either
wirelessly (wireless node-based system) or through wires (wired node-based system). Regardless
of whether the communication between nodes is wired or wireless, the communication from a
node to the handheld radios is wireless. This is shown conceptually in Figure 9.
50
Figure 9: Conceptual drawing of node-based communications
Leaky feeder and node-based communications systems are the sometimes referred to as
“primary” communications systems. This indicates that these systems are used on a day-to-day
basis as the primary means of communication within the mine. In contrast, “secondary”
communication systems, including medium frequency and through-the-earth systems, are not
intended for routine day-to-day communications. Rather, these secondary systems are intended
to provide an alternative means of communication in the event of an emergency. For this chapter,
only primary communications system will be discussed.
Tracking Technologies
Tracking systems that are either commercially available or under development for underground
coal mines today operate using the following technologies [124]:
• Active Radio Frequency Identification (RFID)
51
• Local area network (LAN)
• Personal area network (PAN)
• Passive RFID
• Inertial MicroElectro-mechanical systems (MEMS)
• Ultra-wideband (UWB)
• Near-field communication (NFC)
RFID tracking systems utilize RFID tags, most commonly battery-powered active tags, and
RFID readers which measure the strength of the signals received from each uniquely identified
tag. Received signal strength indicator (RSSI) methods are used to determine the position of the
reader relative to nearby tags. Alternatively, rather than using RSSI, a zone-based RFID system
can be implemented in which the system does not determine a precise location of the reader and
only reports the position of the nearest tag. Since leaky feeder communications systems do not
typically have the capability of providing tracking information, RFID systems are often used
with leaky feeder installations. Tag-based tracking is shown conceptually in Figure 10, and an
example of the tags used in mines is shown in Figure 11.
53
In contrast, a node-based communications system can be designed to also provide tracking
information. These systems can be configured as either local area networks (LAN) or personal
area networks (PAN) and either RSSI or time of flight (TOF) methods are used to determine
positions based on the signal strength received by the handheld radio, eliminating the need for
separate tracking hardware.
The two technologies described above represent the vast majority of installed tracking systems in
underground coal mines. However, other technologies have been trialed or are under
development, including passive RFID (in which passive RFID tags are used and a reader is
carried by the miner), inertial MEMS (which uses miniaturized inertial sensors – gyroscopes and
accelerometers – in a wearable device to continuously track and integrate the movement of the
miner), ultra-wide band, and near-field communication.
Public and Political Response to Mine Disasters of 2006
Following the Sago, Alma, and Darby mine disasters in 2006, the public response and political
response was to call for increased mine safety and health regulation. This was discussed in the
preceding sections as it relates to refuge alternatives and SCSRs, and much of the discussion for
these technologies also applies to communications and tracking systems. As with RAs and
SCSRs, it was clear, especially after the Sago disaster, that if the mine had a wireless
communications and tracking system, it likely would have greatly increased the miners’ chance
of rescue. In the months following Sago and as Alma and Darby occurred, the push from the
public and from lawmakers was that communications and tracking systems should be required,
with the rationale being that, if is possible in other industries, it should be possible in mining.
54
Following the Sago and Alma mine disasters, and before the passage of the MINER Act MSHA
issued an RFI requesting information on technologies that could improve mine escape and
rescue, which included technologies to track the location of miners before or after an accident
[125]. The views of several key stakeholders are well documented in congressional hearings as
well as in the responses to this RFI. The responses to this RFI can be found on MSHA’s website
[126].
In response to the RFI, NIOSH noted that additional research would be needed to provide
survivable communications systems [126]: “Research will be needed to harden this type of
equipment, develop reliable redundant transmission paths, and provide intrinsically safe backup
power solutions.” NIOSH also commented that “miner tracking is an additional communications
research need; existing systems do not pinpoint miner location or function if mine power is lost.
Research is needed to develop systems that rescuers can use to quickly locate miners, especially
those that are not able to communicate.”
Several coal operators commented that the technology is not mature enough to be put into use
without further research and development. For example, San Juan Coal Company stated [126]
that “improving the capability of knowing where miners are located during the shift would be
desirable. Some primitive systems are available now that would provide limited information
about when people passed a certain point and if they had passed another beacon somewhere else
in the mine. Their ability to pinpoint miner’s locations is extremely limited at this time.”
Similarly, CONSOL Energy said [126], “The coal mining industry has been presented recently
with a plethora of communications technologies purported to provide improved in-mine
communications and tracking capabilities. Many proposals are merely conceptual and most
others are unproven in this nation’s prevalent and diverse underground coal mining conditions.”
55
In contrast, communications and tracking equipment manufacturers and vendors purported to
have systems that were proven in the mine environment and that would provide highly reliable
communications and accurate tracking. For example, one vendor described their system as
having accuracy of a yard or better: “The miners wear tags that transmit a low frequency signal
which is detected by locator receivers. The receivers are spaced approximately a hundred yards
apart in the drifts of the mine. Using near field physics, the receivers can measure the distance to
the transmitter. These measurements provide a basis to determine the real-time location of a
miner to an accuracy of a yard or better as the miner travels down a draft.” Several other
companies, including Varis Mine Technology, Q-Track Corporation, InSet, Savi Technology,
Mine Site Technologies, and Siemens, also reported that their systems were ready for industry-
wide deployment [126].
Similar positions were expressed at the public hearings held by MSHA as well as hearings held
by the US Senate. In general, suppliers of communications and tracking systems characterized
their technologies as mature and ready for deployment, while research organizations and mine
operators felt that further research and development was needed for these technologies. As was
described in the sections for RAs and SCSRs, political pressures caused Congress to act rapidly
to respond to the disasters by mandating new technologies, making independent verification of
the technology’s readiness impossible.
MSHA Communications and Tracking System Evaluations in Response to Sago and Alma
Based on their preliminary investigation of Sago, MSHA had concluded that functioning
communication and tracking systems would have benefited search and rescue efforts and
therefore formed a committee to evaluate the technologies that could be adapted to underground
mines. In the months immediately following Sago and Alma, MSHA formed a committee to
56
evaluate the performance of commercially available communications and tracking technologies.
This committee published a report on June 13, 2006 describing results of tests that had been
conducted in the months immediately following the disasters in January of that year [127]. The
timing of this report is notable because it occurred after the MINER Act had already passed the
Senate on May 24 and the House of Representatives on June 7 but before the Act was signed into
law by the President on June 15.
In response to their RFI, MSHA had received information from vendors on numerous
communications and tracking systems. They selected six (6) of these systems to evaluate in
underground field tests. These systems included multiple different technologies such as wireless
mesh networks, ultra-wide band radio (UWB), and through-the-earth (TTE) communications.
Tests of these systems were conducted with the cooperation of CONSOL Energy at their
McElroy Mine in West Virginia. These tests had four objectives: (1) to evaluate how well signals
propagate in the underground environment, (2) to measure the overburden a TTE
communications system could penetrate, (3) to determine how interference affects system
performance, and (4) to quantify the accuracy of tracking systems [127].
The tests of the communications systems evaluations consisted of miners moving through the
mine along pre-planned routes away from a stationary base station transmitter and recording
where signals were lost. The routes through the mine included traveling through a track entry,
through a belt entry, through a dip, through an “S” turn, into a crosscut, and along a parallel
entry. In addition, tests were performed to evaluate the ability of the signals to penetrate a
stopping. The tests showed that, in general, the communications systems had ranges comparable
to their purported specifications along straight entries; however, signals were lost quickly when
the receiver was located in a non-line-of-sight (NLOS) location such as in a crosscut, past a dip,
57
or in a parallel entry. Given the limited timeframe for these tests (each system was only tested
over a period of one to two days, and all tests were completed over a period of approximately
two months), rigorous quantification of the performance was not possible [127].
Although the stated purpose of these tests included determining “the accuracy of tracking
systems,” the tests performed did not measure this accuracy in any quantifiable way. Rather, the
test consisted of a demonstration in which the system vendor set up the tracking system in a
straight entry of the mine and showed via a graphical interface that the position of a tracking tag
appeared to be in the correct position (i.e. the tag was shown to be midway between two
stationary nodes or close to a single node in an apparently accurate way). These tests were very
limited in that quantitative data were not taken and the tests were completely only once and only
along a single straight entry of the mine [127]. This represented the most rigorous independent
evaluation of the performance claims made by the tracking system vendors between the time of
the Sago and Alma disasters in January and the passage of the MINER Act in June of 2006.
Communications and Tracking Mandate in the MINER Act
The MINER Act requires mines to install wireless communications between the surface and
underground and to install tracking systems which can “provide for above ground personnel to
determine the current, or immediately pre-accident, location of all underground personnel.” The
“post-accident” communications system is required to be “redundant,” and the tracking system is
required to “be functional, reliable, and calculated to remain serviceable in a post-accident
setting.” Section 2, Part (1)(b)(ii) of the MINER Act reads:
Not later than 3 years after the date of enactment of the Mine Improvement and
New Emergency Response Act of 2006, a plan shall, to be approved, provide for
58
post accident communication between underground and surface personnel via a
wireless two-way medium, and provide for an electronic tracking system
permitting surface personnel to determine the location of any persons trapped
underground or set forth within the plan the reasons such provisions can not be
adopted. Where such plan sets forth the reasons such provisions can not be
adopted, the plan shall also set forth the operator's alternative means of
compliance. Such alternative shall approximate, as closely as possible, the degree
of functional utility and safety protection provided by the wireless two-way
medium and tracking system referred to in this subpart.
Specific performance metrics are not provided in the Act with regard to tracking accuracy,
communications system coverage, component hardening, backup power supplies, or other
considerations to ensure that the systems are functional after a disaster and that they will provide
sufficient levels of performance to materially affect the outcome of escape and rescue attempts.
Notably, the provision that mine operators can “set forth the operator's alternative means of
compliance” that “shall approximate, as closely as possible, the degree of functional utility and
safety protection provided by the wireless two-way medium and tracking system” will be of
significance in the interpretation and enforcement of this mandate.
It should be noted that the nature of this mandate, like that for RAs, is a technology-forcing
mandate. Although system vendors represented the technologies as mature, commercial products
were not approved and available to the mining industry that would provide wireless
communications and tracking of miners.
59
MSHA Enforcement of the MINER Act Mandate for Communications and Tracking
The compliance date for the communications and tracking mandate set by the MINER Act was
three years from the passage of the Act, or June 15, 2009. As that date approached, MSHA
issued a Program Policy Letter (PPL) on January 16, 2009 providing mine operators with
guidance on complying with the law [128]. Since the MINER Act had not provided specific
performance or design requirements for the communications and tracking systems and since
MSHA had not (and has not) enacted any regulation providing more specific requirements,
guidance was needed on the interpretation of the mandate. The PPL explained that “because fully
wireless communications technology is not sufficiently developed at this time, nor is it likely to
be technologically feasible by June 15, 2009, this guidance addresses acceptable alternatives to
fully wireless communication systems.”
The performance metrics provided in the PPL were also not presented as enforcement policy, but
rather as guidance: “This guidance represents MSHA’s current thinking with respect to two-way
communication and electronic tracking for use in mine emergencies. It does not create or confer
any rights for any person nor does it operate to bind mine operators or any other members of the
public.” Since no specific regulatory or legislative language exists to establish requirements for
system performance or design standards, the MINER Act mandate is accomplished through the
approval of the Emergency Response Plan (ERP) by the district offices through “the Agency’s
existing consultative process for approving mine plans, as opposed to the process for
enforcement decisions related to citations.” As allowed by the provisions of the MINER Act, the
PPL provides “the features MSHA believes would best approximate the functional utility and
safety protections of a fully wireless system,” but also allows operators the option to “propose
60
other approaches or systems, and the District Manager will exercise his discretion in evaluating
them.” [128]
The January 2009 PPL gives specific performance specifications for communications system
related to coverage area, permissibility, standby power, surface considerations, survivability,
maintenance, and other considerations; a summary of the key recommendations for
communications systems are provided in Table 1. The PPL also gives performance specifications
for tracking systems related to performance, permissibility, standby power, capacity, scanning
rate, surface considerations, survivability, and maintenance; a summary of the key
recommendations for tracking systems are provided in Table 2.
This guidance was reissued and revised in subsequent PPLs in 2011 [129] and again in 2014
[130]. Among the revisions in these subsequent PPLs was that it should be possible to monitor
the communications system from a remote site and that the system should determine the location
of miners in belt entries to within 4000 feet. These PPLs also provided more guidance on the
survivability of components by applying the requirement for redundancy to tracking systems and
by specifying how protection should be provided for components installed in vulnerable areas.
MSHA issued related PPLs in 2011 [131] and 2013 [132], respectively, to provide guidance on
the approval of communications and tracking devices for permissibility under 30 CFR Part 23
and to provide guidance on the prevention of electromagnetic interference with blasting circuits.
MSHA also issued a Program Instruction Letter (PIL) in 2011 to provide federal inspectors with
guidance on how to complete inspections of communications and tracking systems [133].
It is important to note that MSHA has not entered rule-making for communications and tracking
systems, but is instead relying on policy guidance in the fulfillment of the MINER Act mandate.
61
Table 1: Summary of key guidance provided by MSHA for communications system performance [128]
GUIDANCE
GENERAL
CONSIDERATIONS • Each group of miners traveling together should have an
untethered device for two-way communication with the surface
through voice and/or text
• Able to send an emergency message to each untethered device
• System should be installed to prevent interference with other
electrical systems, including blasting caps
COVERAGE AREA • Coverage throughout each working section of the mine
• Continuous coverage along escapeways
• Coverage within 200 feet of strategic areas such as belt drives,
transfer points, power centers, loading points, SCSR caches, and
other areas identified by the District Manager
• Communications must be provided at refuge alternatives
per 30 CFR §75.1600-3
PERMISSIBILITY • System must be approved by MSHA for permissibility
STANDBY POWER • Stationary components should have 24 hours of standby power
• Untethered devices should have 4 hours of operation beyond a
normal working shift (12 hours minimum total duration)
SURFACE
CONSIDERATIONS • Standby power to surface components should ensure continuous
operation
• A person trained in the operation of the system and
knowledgeable of the ERP must be always on duty
per 30 CFR §75.1600-1
SURVIVABILITY • A redundant signal path to the surface should be installed either
by installing two or more systems in two or more entries or by a
single system with two or more pathways to surface
• Major events or component failure in one signal path should not
disrupt system availability
• Components that are installed in vulnerable areas should be
protected
MAINTENANCE • Procedures should be established to provide communication
during system or component failure or maintenance
• Infrastructure should be inspected weekly
• Untethered devices should be inspected daily
• Manufacturer’s maintenance recommendations should be
followed
62
Table 2: Summary of key guidance provided by MSHA for tracking system performance [128]
GUIDANCE
PERFORMANCE • Determine location of miners…
o on a working section to within 200 feet
o in escapeways at intervals not exceeding 2000 feet
o within 200 feet of strategic areas such as belt drives, transfer
points, power centers, loading points, SCSR caches, and
other areas identified by the District Manager
• Determine direction of travel at key junctions in escapeways
• Determine the identity miners within 200 feet of refuge
alternatives
• System should be installed to prevent interference with other
electrical systems, including blasting caps
PERMISSIBILITY • System must be approved by MSHA for permissibility
STANDBY POWER • Stationary components should have 24 hours of standby power
• Individually worn or carried devices (i.e. tags) should have 4
hours of operation beyond a normal working shift (12 hours
minimum total duration)
CAPACITY • System should be capable of tracking the maximum number of
persons expected to be in the coverage area
SCANNING RATE • Update rate of no more than 60 seconds
SURFACE
CONSIDERATIONS • Standby power to surface components should ensure continuous
operation
• A person trained in the operation of the system and
knowledgeable of the ERP must be always on duty
per 30 CFR §75.1600-1
• System should display the last known position of miners when the
tracking device is not reporting
• Each miner should be uniquely identified
• Each reported position should be time-stamped
• Data should be stored for two weeks
SURVIVABILITY • Components that are installed in vulnerable areas should be
protected
• Data storage should not be impacted by communications
interruptions
MAINTENANCE • Procedures should be established to provide tracking during
system or component failure or maintenance
• Infrastructure should be inspected weekly
• Miner worn or carried should be inspected daily
• Manufacturer’s maintenance recommendations should be
followed
63
Research to Develop and Adapt Communications and Tracking Systems
The MINER Act directed the newly formed Office of Mine Safety and Health Research
(OMSHR) within NIOSH “to enhance the development of new mine safety technology and
technological applications and to expedite the commercial availability and implementation of
such technology in mining environments.” OMSHR fulfills this directive by conducting
intramural research and by funding extramural research through contracts. Between 2006 and
2016, OMSHR awarded more than 120 such contracts in 25 topic areas as a result of the MINER
Act [134]. Of these contracts, the topic area which has had the greatest number of contracts
awarded is “Emergency Communications and Tracking,” with 40 contracts awarded between
2006 and 2016. These contracts are listed in Table 3, and include contracts to develop novel
technologies such as inertial navigation and through-the-earth communications, as well as to
adapt more mature technologies from other industries or to improve technologies already
available in mining, such as node-based communications, leaky feeder, and RFID-based
tracking.
Several of these contracts have resulted in commercial products that are now widely used in the
mining industry. In particular, node-based and leaky feeder communications systems have been
widely adopted [121, 135], as have RFID tracking systems and tracking systems integrated into
node-based communications systems [120].
Extensive intramural research at OMSHR, closely tied to this extramural research, has also
enhanced the success of these technology development efforts. In particular, intramural research
on communications systems has enabled the development of guidelines for the design,
installation, and use of these systems [136, 137].
64
Table 3: NIOSH OMSHR extramural research contracts in the topic area “Emergency Communications and
Tracking” (2006 - 2016) [134]
Contract No. Title Contractor Start
Date
End Date
07FED717801 Subterranean Wireless Electronic
Communication System
U.S. Army CERDEC 10/1/2006 5/19/2009
08FED898353 Mine Communications Engineering and
Compatibility Guidelines
DISA Joint Spectrum
Center
5/22/2007 9/30/2009
200-2007-20388 Wireless Mesh Mine Communication
System
L-3 Global Security &
Engineering Solutions
(now Engility
Corporation)
5/25/2007 2/27/2009
200-2007-21249 Design and Demonstration of a Location
Tracking System for Underground Coal
Mines (Award 1)
Extreme Endeavors and
Consulting
7/25/2007 3/25/2008
200-2007-21250 Design and Demonstration of a Location
Tracking System for Underground Coal
Mines (Award 2)
L-3 Global Security &
Engineering Solutions
(now Engility
Corporation)
7/25/2007 11/30/2009
200-2007-22843 A Magnetic Communication System for
Use in Mine Environments
Lockheed Martin
Corporation
9/11/2007 7/31/2009
08FEB898345 Develop a Means to Model Network
Performance Using Network Simulation
Tools
U.S. Department of
Commerce, NIST
2/15/2008 8/15/2009
200-2008-24502 Passive Fiber Optic System for Locating,
Tracking, and Communicating with
Personnel in Coal Mines
US Sensor Systems Inc. 3/18/2008 2/28/2009
200-2008-24620C Development of a Wireless Test and
Measurement Tool for Use in Mines
Helium Networks 5/14/2008 5/14/2009
200-2008-25720 Through-The-Earth Wireless Real-Time
Two-Way Voice Communications
Alertek, LLC 8/1/2008 8/31/2010
200-2008-26293 Sprinkler Head Emergency
Communications
Commonwealth
Scientific and Industrial
Research Organisation
8/5/2008 8/5/2009
200-2008-26818 Ultra-Low Frequency Through-the-Earth
Communication Technology
E-Spectrum
Technologies
8/13/2008 11/30/2009
200-2008-26815 Leaky Feeder to Wireless Media Converter
Device Technology Development
Rajant Corporation 8/14/2008 7/30/2009
200-2008-24628 Supplementary Technologies for
Advanced Mine Communication Networks
Foundation
Telecommunications Inc.
8/19/2008 12/31/2009
200-2008-27444 Mobile Adaptable RF/IT Infrastructure -
Experimental (MATRIX)
St. Francis University
Center of Excellence for
Remote and Medically
Under-Served Areas
9/1/2008 8/14/2009
200-2008-26864 System Reliability and Environmental
Survivability
Foster-Miller, Inc. (now
QinetiQ North America)
9/1/2008 10/31/2009
200-2009-29066 Emergency Seismic Communication
System for the Mining Industry
Teledyne Brown
Engineering
3/23/2009 5/22/2010
200-2009-31292 Magneto-Inductive TTE Communications Ultra Electronics Canada
Defence, Inc.
8/25/2009 10/31/2010
200-2009-31502 Post-Accident AMS System CONSPEC Controls Inc. 9/1/2009 9/29/2013
200-2009-32117 Two-Way, Through-the-Earth Emergency
Communication System for Trapped
Miners and the Surface
Stolar Research, Inc. 9/4/2009 12/4/2010
200-2009-32021 Magnetic Communication System (MCS) Lockheed Martin
Corporation
9/10/2009 4/1/2011
200-2010-35295 Radio System Modifications for Improved
Mine Safety (Medium Frequency)
Kutta Technologies, Inc. 8/25/2010 8/25/2011
65
Contract No. Title Contractor Start
Date
End Date
200-2010-34687 Demonstration of Inertial Sensor Tracking
and Communication System
InSeT Systems, LLC 8/30/2010 3/2/2011
200-2010-35935 Feasibility Study: Vision-Aided Personal
Inertial Tracking System for Mining
Carnegie Mellon
University
9/8/2010 7/8/2011
200-2010-36005 Application of Extreme Power Line
Communication Methods to Mine
Environments
Northern Microdesign,
Inc.
9/13/2010 6/13/2012
200-2010-36317 Full-Wave Modeling of MF Propagation Pennsylvania State
University
9/30/2010 9/29/2013
200-2010-36140 Development of a Uniform Methodology
for Evaluating Coal Mine Tracking
Systems
Virginia Polytechnic
Institute
9/30/2010 1/4/2014
200-2011-39884 Through-the-Earth Communication
Systems for Underground Coal Mines:
Product Final Development and
Standardized Interface Definition
E-Spectrum
Technologies, Inc.
9/1/2011 11/30/2012
200-2011-39862 Wireless Through-The-Earth Modeling
and Support
Lockheed Martin
Corporation
9/9/2011 6/30/2012
11FED1113303 Low-Frequency Electromagnetic Noise
Cancelling Antenna System
Los Alamos National
Laboratory
9/30/2011 12/15/2015
200-2012-53624 Communication and Hazard Monitoring in
Bleeders and Remote Workings
Kutta Technologies 9/20/2012 9/30/2013
200-2012-53504 Medium Frequency Radio System
Modifications for Refuge Chamber
Situational Awareness
Kutta Technologies 9/20/2012 9/30/2013
NA Resource Identification for Improvement
of Electromagnetic Compatibility (EMC)
in Underground Coal Mines
URS Corporation 3/25/2013 5/31/2013
200-2013-56128 Through-the-Earth (TTE)
Communications: Range Reliability
Improvements
Lockheed Martin 7/16/2013 4/15/2015
200-2013-56050 Kutta OutCall Micropower Messaging
System (KOMMS)
Kutta Technologies 8/12/2013 8/11/2014
200-2013-56809 Advanced Software Radio Techniques for
Improved Range and Reliability of Digital
Through-the-Earth Communication
Systems
Vital Alert
Communications, Inc.
9/9/2013 7/17/2015
200-2014-58688 Through-the-Earth Communication
Antenna Feasibility Demonstration
Raytheon-UTD 9/1/2014 8/31/2015
200-2014-59253 Integration of Sensing Technologies for
Post-Event Monitoring of Hazardous
Conditions in the Mining Environment
SenSevere 9/1/2014 4/30/2016
200-2015-63501 Wireless Sensor Network with Methane
Gas Cloud Detector and Absolute Pressure
Sensor
Innovative Wireless
Technologies
9/1/2015 6/30/2016
66
The OMSHR intramural research program on communications and tracking focused primarily on
communications systems. In particular, the research on primary communications systems
(secondary communications systems will be discussed in Chapter 7) focused on measuring and
modeling the propagation of RF signals in underground environments [138, 139, 140, 141, 142,
143, 144]. Since this research provided an empirically verified basis for the design of
communications systems to ensure proper coverage in the mining environment, in which RF
signals behave much differently than they do in open air, it provided system designers with the
tools needed to ensure that their systems would perform as expected.
On the other hand, intramural research on tracking technologies at OMSHR was fairly limited
[124]. A rigorous evaluation of the accuracy of various tracking technologies in the mining
environment was not performed as the facilities to conduct such an evaluation were not
developed and the intramural research focus was on communications. While a number of
tracking technologies were commercialized for the underground mining market, the performance
of these technologies in terms of their ability to improve the success of escape and rescue efforts
has never been independently evaluated.
Research conducted by academic researchers and by international research organizations has
resulted in the development of several novel tracking technologies, which have been evaluated in
mining and non-mining environments [145, 146, 147, 148, 149, 150, 151], but these have not
provided a systematic comparison of the performance of commercially available systems.
67
Indications of Technology Success or Failure for Primary Communications Systems
While there is wide-spread adoption of primary communications and tracking systems in
response to the MINER Act mandate, there is not documented evidence that these technologies
achieve a material improvement to safety or health. This is especially true for tracking systems,
where the requirements to locate miners to within 200 feet at working section and to within 2000
feet along escapeways has been the topic of considerable debate with regard to whether this level
of accuracy would provide mine rescue teams with sufficient information to effect successful
rescue. This indicates both success of the technology mandate, in that the technology is widely
adopted, but also failure of the technology mandate, in that there is not documented evidence of
an achieved safety or health benefit. The actual safety benefit of these technologies likely will
not be seen unless and until a mining disaster necessitates their use.
An analysis of this indications of technology mandate success and failure is presented in Section
5.1.3 for communications systems and in Section 5.1.4 for tracking systems.
68
4.1.4 Case 4: Proximity Detection Systems for Continuous Mining Machines
Background on Proximity Detection Systems and Regulatory Requirements
Since the mid 1980’s when remote-controlled continuous mining machines were introduced to
the industry, there have been 43 fatalities in which a miner was pinned by a CMM. The Mine
Safety and Health Administration (MSHA) estimates that, in the majority of these fatalities, the
use of proximity detection technology may have been a preventative factor [152]. There are
currently five proximity detection systems that have been approved by MSHA for use in
underground coal mines [153]. It is important to note that this approval does not pertain to the
performance of the system, but is rather only an indication that the systems meet the
permissibility requirements in 30 CFR Part 18 meant to prevent mine fires and explosions.
All of the five MSHA-approved systems are based on similar technical concept; the system
includes a transmitting component that generates either a magnetic field or an RF signal, and the
strength of this signal is measured by another component of the system. One of these
components (either the transmitter or the receiver) is mounted on the mining machine, and the
other is worn by the miner. The measured signal strength is used to estimate the distance
between the miner and the machine or the position of the miner relative to the machine. Based on
this position, machine motion can be automatically inhibited. This type of technology was first
considered for use in underground mining in research conducted about 20 years ago [154].
Researchers at the National Institute for Occupational Safety and Health (NIOSH) developed the
first working prototypes of such a system for continuous mining machines and demonstrated the
feasibility of this technology through laboratory and field trials [155] [156]. NIOSH researchers
also published research on human factors related to these systems including the types of
warnings to be used and the interface between the miners and the system [157].
69
This original invention was patented by the government [158, 159]. From about 2004 onward,
these two patents were licensed to a number of manufacturers that further developed and refined
the initial invention. A number of other important patents were also filed that continued to
introduce new innovations. Despite the advances evidenced by the filing of these patents during
the time, from the year 2004 through 2009, there was little published research on proximity
detection.
In 2010, NIOSH resumed research focused directly on proximity detection. Prior research had
indicated that miners were inclined to stand in positions close to the mining machine in order to
see the visual cues necessary to stay safe and to efficiently mine [160, 161]. Based on this
research, NIOSH focused its efforts on the development of a next-generation proximity detection
system that would allow miners to stand close to the machine and remain safe. To accomplish
this, they developed a system that would determine the position of a miner and selectively
disable only the machine functions that would cause an injury [162] [163] [164]. While the main
focus of this research was on the development of this next-generation system, NIOSH research at
this time also quantified the effect of coal on proximity detection systems, and showed this effect
to be minimal [165]. In addition, NIOSH researchers conducted a series of interviews with
continuous mining machine operators to understand the effect this new technology would have
on the risk perception and risk behavior of miners [166] [167].
At this time research was also conducted to measure the performance of proximity detection
systems already in use in underground coal mines on continuous mining machines [168]. This
work was conducted primarily through a cooperative effort involving the West Virginia Mine
Safety Technology Task Force, mine operators, proximity detection vendors, and NIOSH. At the
time these field tests were conducted, a limited number of mines had installed proximity
70
detection systems. As such, the number of tests completed early on was small, and with small
sample sizes, it was not possible to generalize conclusions or to set performance standards.
MSHA has mandated the use of proximity detection systems for continuous mining machines
and has also proposed regulations to require the technology on mobile haulage equipment. Key
dates for these regulations are shown in Table 4. Leading up to and following the promulgation
of the continuous mining machine regulation in 2015, adoption of the technology has accelerated
dramatically. Per the regulation, the majority of continuous mining machines in the country are
now equipped with a proximity detection system.
Table 4: Key dates for proximity detection regulations
February 1, 2010 Request for Information (RFI) published
for continuous mining machine rule
February 1, 2010 Request for Information (RFI) published for
mobile machine rule
August 31, 2011 Notice of Proposed Rule Making (NPRM)
for continuous mining machine rule
January 15, 2015 Final Rule published for continuous mining
machines
September 2, 2015 Notice of Proposed Rule Making (NPRM)
for mobile machine rule
Identification of Electromagnetic Interference
In the months following the implementation of the regulatory mandate, some miners observed
adverse performance changes in the proximity detection system when used in conjunction with
another required piece of safety technology, the personal dust monitor (PDM). MSHA
determined that this problem was caused by electromagnetic interference (EMI) between the two
devices, and issued notice of the potential for this problem to mine operators [169]. Researchers
71
at NIOSH have confirmed that such EMI does occur and that it effectively renders the proximity
detection system temporarily inoperable [170].
Indications of Technology Success or Failure for Proximity Detection Systems
The failure to anticipate the potential for EMI between the PDM and proximity detection systems
represents a documented failure of the technology. This could be considered an indication of a
failure of the mandate for the use of proximity detection systems or an indication of a failure of
the mandate for the use of the PDM.
An analysis of this indications of technology mandate failure is presented in Section 5.1.5.
72
4.1.5 Case 5: LED Cap Lamps
Historical Background on Mining Cap Lamps
Lighting has always been of critical importance in underground mining safety, and the
technology of mine illumination has continuously evolved. Given the long history of cap lamps –
a history that continues to influence the industry’s adoption new types of cap lamps and informs
the conclusions of this study with regard to safety technology adoption in the mining industry – it
is worthwhile taking a longer-term historical look at cap lamp technology.
As early as the 1st century AD, miners used candles for illumination underground. In the 16th
century, oil wick lamps were introduced and continued to be used up to as recently as 1920.
Carbide lamps were introduced in the 19th century along with the flame safety lamp. At the
beginning of the 19th century, the first electric light was invented (coincidentally, the first electric
light was invented by Humphry Davy, the inventor of the flame safety lamp). Throughout the
19th century, the technology of electric lights was improved, and in 1879, Thomas Edison
developed the first practical incandescent lightbulb. In 1915, incandescent lightbulbs were used
in the first electric cap lamp. Electric cap lamps were rapidly and widely adopted by the mining
industry, and incandescent cap lamps remained the dominant technology for cap lamps for
approximately a century [171].
The US Bureau of Mines (USBM) was formed in 1910, largely in response to several disastrous
mine fires and explosions. At this time, the concept of electric cap lamps appeared to be feasible,
but also by this time, flame safety lamps were a proven technology for controlling methane
ignition. Therefore, much of the early USBM research was focused on testing the potential for
electric cap lamps to ignite methane-air mixtures. In particular, testing was conducted to
determine what would happen if the bulb was broken, suddenly exposing the filaments to a
73
methane-air atmosphere [172, 173]. This early research led to innovative means of preventing
ignition from electric cap lamps such as using spring-loaded contacts that would interrupt current
in the event the bulb shattered [174] as shown in Figure 12.
Figure 12: Miners' cap lamp assembly from the early 20th century with spring-loaded contacts designed to interupt
electric current in the event that the incandescent bulb shattered [174]
In 1914, two engineers from the USBM, John Ryan and George Deike (for whom the Deike
Building on Penn State’s University Park campus is named), formed the Mine Safety Appliances
Company (MSA) and sought out Thomas Edison to develop and commercialize electric cap
lamps. Edison, Ryan, and Deike designed a lamp with a small, rechargeable battery and a
miniature incandescent bulb with a tungsten filament [171]. The Edison electric cap lamp (Figure
13) was approved by the USBM in 1915, and by 1917, seven models of electric cap personal
mining lamps had been approved [175]. The technology was adopted rapidly; by August of 1916,
74
approximately 70,000 lamps were in use and about 2,000 lamps per week were being purchased
according to USBM reports [175].
Figure 13: The Edison Electric Cap Lamp, approved by the Bureau of Mines for use in underground coal mines in
1915 [176]
In the first half of the 20th century, the USBM took an active role in developing electric cap lamp
technology as well as in promoting and tracking the adoption the technology [177, 178, 179], and
this undoubtedly was critical to the rapid adoption and success of the new technology. In
addition, the USBM set rules for the construction, installation, maintenance, and use of electrical
75
equipment, including cap lamps beginning in 1916 [180] and revised several times thereafter,
and in 1935, the USBM published guidelines specific to cap lamps focusing on proper
maintenance practices to not compromise permissibility or efficiency [181, 182]. These early
regulation and guidelines laid the groundwork for the regulation of cap lamp technology as it still
is today.
The Federal Coal Mine Safety Act of 1952 established requirements for permissibility, including
the requirement that only permissible electric lamps are permitted in gassy mines, and the
Federal Coal Mine Health and Safety Act of 1969 charged the Department of the Interior with
establishing “the standards under which all working places in a mine shall be illuminated,” and
the Federal Mine Safety and Health Amendments Act of 1977 extended these standards to non-
coal mines. Permissibility, inspection, and maintenance standards for cap lamps were based on
the requirements set forth by the USBM (Schedule 6D, 4 FR 4003, Sept. 21, 1939), but
requirements did not exist for the performance of cap lamps or other mine lighting. In 1970, in
fulfillment of the 1969 Coal Act mandate, the USBM proposed a regulation to require minimum
illumination in working places of at least 5 foot-candles and no more than 110 foot-candles. In
public hearings for this proposed regulation, mine operators and mining equipment
manufacturers objected to the performance requirements, saying that existing technology had not
been demonstrated to be capable of meeting the standard [176, 183].
In response to these objections, the newly formed Mine Enforcement and Safety Administration
(MESA), the precursor to MSHA, was charged with determining if the requirement for 5 foot-
candles was attainable. To accomplish this, a number of equipment operation tasks were
analyzed in terms of the visual cues that would need to be seen and the lighting that would be
needed to allow these visual cues to be seen. This analysis concluded that a minimum luminance
76
of 0.06 foot-lamberts was needed [184]. Foot-lambert is a unit of luminance, whereas foot-candle
is a unit of illuminance. The two are related by the following equation:
𝐿𝑣 = 𝐸𝑣 × 𝑅
where 𝐿𝑣 is the luminance in foot-lamberts, 𝐸𝑣 is the illuminance in foot-candles, and 𝑅 is the
reflectivity, which is the fraction of the light that is reflected by the surface being illuminated.
Since the relationship between luminance and illuminance depends on the reflectivity of the
surface being illuminated, there is no direct comparison between this 0.06 foot-lambert
recommendation and the 5 foot-candle standard proposed by the USBM; however, for any
reasonable assumption about reflectivity, the 0.06 foot-lambert is much less stringent. In 1976,
regulations were promulgated with this less stringent 0.06 foot-lambert standard, with a
compliance date of 1978 [176].
At the time these regulations were being finalized and beginning to be enforced, the USBM and
MESA published a number of instructional guides and conducted a number of seminars on the
standards and on the proper design and implementation of cap lamps as well as machine-
mounted lighting, with 44 such one-day seminars being conducted over the three-year period
from 1976 to 1978 [185, 186, 187, 188, 189]. The active role of the government in educating the
industry about these standards and about the technology of mine illumination have shaped the
culture of the industry as it relates to this critical technology.
Driven by research on lighting technology and visual requirements for safety, the standards for
mine illumination have evolved over the half century since Congress first mandated illumination
standards with the 1969 Coal Act. But the standards have consistently been notably less stringent
than the lighting requirements for other industries, and the expectation for lighting has been less
77
in underground mining than what is considered reasonable for safety in industrial environments
[176]. As such, the regulations around mine illumination have not represented a technology-
forcing mandate, and the primary driving force behind new illumination technologies has been
voluntary adoption.
Introduction and Diffusion of LED Cap Lamps
The first practical light-emitting diode (LED) was introduced in 1962 [190]; however, early
LEDs were limited to infrared light (which were used in electronics such as television remote
controls) or low-intensity colored light (which were used in electronics for indicators or seven-
segment digital displays). Key development in LED technology were the ability to produce white
light, the exponential increase in light output, and the simultaneous exponential decrease in cost.
By the mid-2000s, LEDs were capable of producing bright enough white light at a low enough
cost to be a feasible means of providing illumination [191].
When LED technology began to be widely adopted for illumination in the 2000s, cap lamp
manufacturers were quick to recognize the potential for this technology and began developing
LED cap lamps, which were first introduced to non-coal mines and were then submitted for
permissibility approval by MSHA, and MSHA approved the first LED cap lamp in 2008 [192].
A major advantage of LED cap lamps is that the lower power consumption allows for a much
smaller and lighter battery pack. As a result, cordless cap lamps are possible, in which the entire
cap lamp and battery can be contained within an all-in-one assembly that is worn on the miner’s
hard hat. This eliminates the need for the miner to carry a battery pack on their belt. The first
cordless LED cap lamp was approved by MSHA in 2010 [192].
78
LED cap lamps were shown to consume less energy to produce more light than incandescent
lamps [193]. In addition to the advantages of energy efficiency and light output, LED cap lamps
also offer advantages in terms of more accurate color rendering, decreased heat production, and
more consistent light output over as the battery is discharged and as the lamp ages. After an 8-
hour shift, the light output from an incandescent cap lamp powered by a lead-acid can decrease
by as much as 31% as compared to the start of the shift; in comparison, the light output of an
LED cap lamp powered by a nickel-hydride battery only decreases by 4% over the same period
[194]. LED cap lamps also offer advantages related to convenience and ergonomics: LED cap
lamps are lightweight, have a longer rated life, and generally have a faster charging time than
incandescent lamps [195].
All of these advantages have resulted in the rapid and pervasive adoption of LED cap lamps,
especially cordless LED cap lamps, and the majority of underground miners in the United States
now use such lamps.
Safety Benefits and Concerns of LED Cap Lamps
Although the factors that drove the adoption of LED cap lamps were largely around usability,
convenience, energy efficiency, and cost, the use of LED cap lamps has been shown to also have
safety benefits. NIOSH and others have done extensive research to demonstrate these safety
benefits.
Detection of tripping hazards was shown to be improved with LED cap lamps, enabling
detection times that were an average of 0.96 seconds faster compared to the incandescent lamps;
this improvement was attributed to the spectral content of the LED lamp making the hazards
more visible [196]. Other studies indicated that the detection time for slip and fall hazards could
79
be improved by as much as 55% with LED cap lamps [197]. The use of LED cap lamps were
also shown to improve the ability of human subjects to detect hazards in their peripheral vision,
with improvements of up to 11% - 15% in detection time for the hazards [198].
Some negative results were also obtained in these studies on the potential safety improvements
of using LED cap lamps. The postural stability of human subjects was measured while they were
wearing LED and incandescent cap lamps. Postural stability can have a significant impact on the
occurrence of slip, trip, and fall accidents. No significant difference in postural stability was
detected for the two types of cap lamps [199].
The performance of cap lamps in a smoke-filled mine entry, such as would be encountered by
miners attempting self-escape following a disaster, was also tested. Specifically, the distance at
which human subjects could detect reflective tags hanging from the roof and mine rail on the
floor was measured for incandescent cap lamps as well as for LED cap lamps. The results
showed that the incandescent lamps allowed for a greater detection distance [200]. This can be
attributed to several factors including the possibility that more light was reflected off of the
smoke particles back toward the subjects for the brighter LED lamps.
A potential unintended consequence of introducing brighter lights into the underground
environment is glare. Glare can be bothersome and distracting, but it can also be hazardous as it
can leave a miner temporarily unable to see hazards in the area. Studies at NIOSH indicated that,
although the LED cap lamps are generally brighter than the incandescent lamps, they do not
produce significantly more discomfort glare [201].
80
Indications of Technology Success or Failure for LED Cap Lamps
The rapid and wide-spread voluntary adoption of LED cap lamps is a strong indication of
success for this technology, and although the technology was not adopted solely for its safety
benefits, it does offer demonstrable safety benefits.
An analysis of the indications of technology success for LED cap lamps is presented in Section
5.1.6.
81
4.2 Health Interventions
Health-related interventions in the mining industry have focused on controlling hazardous
exposures of noise, dust, and toxic substances, as well as musculoskeletal disorders (MSD). The
cases used for this study, focus on interventions to control exposure to noise and specifically, on
noise controls for two pieces of underground coal mining equipment: continuous mining
machines and roof bolting machines.
The problem of hearing loss in the mining industry is of significant concern; the industry once
had the highest rate of hazardous noise exposure [202] and one of the highest rates of hearing
loss, along with manufacturing and construction [203]. In addition to hearing loss, high noise
exposure can also lead to workers experiencing excess stress, tinnitus, sleep disorders, and
decreased work performance [204]. Moderate noise exposure can also be of concern because it
can interfere with hearing, potentially causing workers to miss audible warnings or audible
indications of a hazard, and it can lower a worker’s ability to maintain concentration on their job,
potentially making them more likely to become distracted or make mistakes [205].
In this section, an overview of noise control technology research, development, and diffusion
will first be provided. Following this, noise controls for continuous mining machines and roof
bolters will be discussed in particular.
82
4.2.1 Noise Controls and Noise Exposure Regulations
Background on Noise Controls
The USBM had a long history of researching hearing loss prevention and noise controls for the
mining industry. The Federal Coal Mine Health and Safety Act of 1969 granted the authority to
set and enforce maximum noise exposure levels for coal mines, and the Federal Mine Safety and
Health Act of 1977 extended this authority to non-coal mines. In response to this mandate, the
USBM started conducting research on hearing loss prevention and noise controls. In 1971, a
USBM study found that 73% of underground coal miners were exposed to noise levels that
would be considered hazardous [206], and in 1976, NIOSH concluded that miners have a
measurably worse hearing than the average American [207]. The USBM conducted a series of
projects in the years following the 1969 Coal Act, which resulted in the characterization of noise
sources in the mining industry and in the development of noise control solutions [208]. These
mining machinery noise controls were published by the USBM in a handbook in 1983 [209], but
these solutions were never widely adopted by the mining industry [210].
Noise Control Research Following the Transfer of S&H Research from USBM to NIOSH
In 1996, the USBM was closed and its safety and health functions were transferred to NIOSH.
The hearing loss prevention research program remained in Pittsburgh under what is now the
Pittsburgh Mining Research Division (PMRD). At this time, NIOSH already had a hearing loss
prevention research program housed in the Division of Applied Research and Technology
(DART) in Cincinnati, Ohio. Also in 1996, DART published a “Preventing Occupational
Hearing Loss – A Practical Guide” [211], which set the strategic direction for future hearing loss
prevention research, including that to be conducted in Pittsburgh for mining. This strategy gave
primacy to engineering noise controls. Research was structured to prioritize the development of
83
controls in order of effectiveness: (1) engineering controls to reduce noise at the source, (2)
administrative controls to reduce exposure through changes in procedures or behavior, and (3)
hearing protection devices such as ear plugs or muffs [211].
Another key action from DART at this time was the publication of a recommended noise
exposure standard [212], which included a Recommended Exposure Limit (REL) of an 8-hour
time-weighted-average (TWA) sound level of 85dBA, which remains NIOSH’s
recommendation. The 1998 recommendation from NIOSH updated a 1972 recommendation
from NIOSH [213]. Both the 1972 recommendation and the 1998 recommendations gave an
REL of 85dBA. However, the recommendations differed in how the TWA was to be calculated;
specifically, the 1972 criteria recommended an exchange rate of 5dB, whereas the 1998 criteria
recommended an exchange rate of 3dB. The exchange rate is the increase in decibels
corresponding to a halving of the allowable exposure time (or, equivalently, the decrease in
decibels corresponding to a doubling of the allowable exposure time). So, for example, with an
REL of 85dBA and an exchange rate of 5dB, exposure to 90dBA for four (4) hours would be
equivalent to eight (8) hours at the REL; however, with the same REL and an exchange rate of
3dB, exposure to only 88dBA for four (4) hours would be equivalent to eight (8) hours at the
REL.
The 1972 and 1998 NIOSH recommendations were based on risk assessments which evaluated
the excess risk of material hearing impairment as a function of noise level and exposure duration
for a 40-year working lifetime [212]. Excess risk is defined as the percentage of the population
exposed to occupational noise that would have material hearing impairment minus the
percentage of a population not exposed to occupational noise that would have material hearing
impairment. Material hearing impairment is defined as having an audiogram showing an average
84
hearing threshold level (HTL) exceeding 25dB for both ears. The frequencies at which the
audiogram is to be conducted affects this definition, and a number of different standards have
been used for this frequency selection. In addition to the NIOSH risk assessments, other agencies
have conducted risk assessments for material hearing impairment. A comparison of the estimates
of excess risk for a 60-year-old worker with 40 years of working experience from NIOSH, ISO,
and EPA are shown in Table 5.
Table 5: Estimated excess risk of material hearing impairment at age 60 after a 40-year working lifetime exposure to
occupational noise for different definitions of material hearing impairment (From [212])
Material hearing impairment defined as an
average HTL for both ears exceeding 25dB at
500, 1000, and 2000 Hz
Material hearing impairment
defined as an average HTL
for both ears exceeding 25dB
at 1000, 2000, and 3000 Hz
Material hearing
impairment
defined as an
average HTL for
both ears
exceeding 25dB at
1000, 2000, 3000,
and 4000 Hz Average
exposure
level
(dBA)
1971
ISO
1972
NIOSH
1973
EPA
1990
ISO
1998
NIOSH
1972
NIOSH
1990
ISO
1998
NIOSH
1990
ISO
1998
NIOSH
90 21% 29% 22% 3% 23% 29% 14% 32% 17% 25%
85 10% 15% 12% 1% 10% 16% 4% 14% 6% 8%
80 0% 3% 5% 0% 4% 3% 0% 5% 1% 1%
This, and other information on the prevalence of noise-induced hearing loss in the mining
industry, would become the basis for a new regulation on noise exposure promulgated by MSHA
in 1999.
Introduction of New Regulatory Requirements for Noise Exposure
After the Federal Coal Mine Health and Safety Act of 1969, regulatory requirements for noise
exposure were established for coal mines, and after the Federal Mine Safety and Health Act of
1977, similar standards were established for metal/non-metal mines. The standards for both coal
and for non-coal set the permissible exposure limit (PEL) at 90dBA based on an 8-hour TWA
85
with an exchange rate of 5dB. Both standards also required feasible engineering or
administrative controls to be implemented in order to reduce exposure below the PEL.
Beyond these similarities, there were significant differences between the requirements for coal
mines and the requirements for metal/non-metal mines. For coal mines, the attenuation provided
by hearing protection devices (ear plugs or ear muffs) were considered in the determination of
whether the PEL had been exceeded, but no credit for hearing protection was given in metal/non-
metal mines. In coal mines, when the PEL was exceeded, the operator was required to implement
a hearing conservation plan (HCP) for over-exposed miners, but the requirement for an HCP was
not in place for metal/non-metal mines.
The MSHA requirements prior to 1999 also significantly differed from the corresponding OSHA
standards which had been updated in 1983 (29 CFR 1910.95). The OSHA requirements also used
a 90dBA PEL with a 5dB exchange rate but also included an “action level” at 85dBA which
triggered the implementation of an HCP. These provisions for the HCP under OSHA had also
been updated to reflect recent advances in hearing conservation research.
In 1989, MSHA published an advance notice of proposed rulemaking (ANPRM) [214],
proposing to revise the standards for noise exposure. In this ANPRM, MSHA cited calls from
members of the mining community to reconcile the differences between the standards for coal
and metal/non-metal, to reconcile the differences between the MSHA and OSHA requirements,
and to consider the more conservative 85dBA PEL recommended by NIOSH in 1972. Public
comments were received in response to this ANPRM, and MSHA did extensive work to assess
the economic and technical feasibility of a change in the regulations.
86
In December 1996, MSHA proceeded with the rulemaking process, publishing a notice of
proposed rulemaking (NPRM) [215]. The proposed rule would maintain the 90dBA PEL with an
exchange rate of 5dB, but would also implement an 85dBA action level similar to the OSHA
requirement. At the action level, mine operators would be required to enroll the miner in an HCP
and to provide the miner with hearing protection upon their request or in the event a significant
shift in hearing acuity was detected through the HCP. When the 90dBA PEL was exceeded, the
mine operator would be required to implement feasible engineering and administrative controls
to reduce exposure to the PEL. The feasibility of the controls would be determined by MSHA as
the feasibility for the particular mine in question to implement the control, and it would be up to
the mine operator to select whether engineering controls, administrative controls, or some
combination of the two would be used. To aid operators in the selection of controls, MSHA
would publish what it considered feasible controls in a Program Information Bulletin (PIB). In
the event that it was deemed infeasible for the mine to reduce the exposure to the PEL, the
proposed rule required that the operator must reduce the exposure to as close to the PEL as
feasible and to provide miners with hearing protection. The proposed rule also included a dual
hearing protection level of 105dBA, above which miners must wear both ear plugs and ear
muffs, and a ceiling level of 115dBA that could at no time be exceeded. Finally, the proposed
rule would no longer give credit for the attenuation provided by hearing protection when
determining whether the action level or PEL had been exceeded.
With the publication of the proposed rule in December 1996, MSHA sought written public
comment with a due date in February of 1997 [215]. After reviewing the written comments
received, MSHA decided to extend the comment period and to schedule a series of six public
hearings in Beckley, St. Louis, Denver, Las Vegas, Atlanta, and Washington DC [216, 217].
87
Later that year, NIOSH published a report entitled “Prevalence of Hearing Loss for Noise-
Exposed Metal/Nonmetal Miners,” and MSHA re-opened the rulemaking record to allow public
comment on this report [218, 219]. The commenting period for this rule, including this and
subsequent extensions, closed in June of 1998, and in September of 1999, MSHA published the
final rule [220], which primarily amended 30 CFR Part 62. Minor changes were made in the final
rule as compared to the proposed rule, but the main provisions described above remained
unchanged. The decision to keep the PEL at 90dBA and the exchange rate at 5dB, as opposed to
NIOSH’s recommendation of 85dBA and an exchange rate of 3dB [212], was based on MSHA’s
conclusion that it would be infeasible for the mining industry to meet the NIOSH
recommendation [215, 220].
Expansion of the NIOSH Hearing Loss Prevention Research Program
Following the implementation of the 1999 MSHA noise rule, NIOSH significantly expanded its
mining hearing loss prevention research efforts in Pittsburgh. The research team increased from
about 3-5 researchers to about 16-24 researchers [210]. The facilities for this research were also
improved with the construction and accreditation of a reverberation chamber and hemi-anechoic
chamber large enough to accommodate underground mining equipment [221, 210]. In addition to
these large laboratory facilities, NIOSH constructed and obtained accreditation for a laboratory
for the testing of attenuation of hearing protectors and commissioned a mobile hearing loss
prevention unit, a 32-foot trailer containing a four-person booth for conducting hearing tests and
for evaluating hearing protectors [210].
Based on MSHA noise exposure data, NIOSH decided to focus its research first on continuous
mining machines and roof bolting machines. This research and the diffusion of noise controls for
those two pieces of equipment is discussed in the following sections.
88
4.2.2 Case 6: Noise Controls for Continuous Mining Machines
Continuous Mining Machine Noise Control Research
Following the enactment of the new MSHA regulations on noise exposure, NIOSH began
conducting field measurements of noise exposure for workers around a variety of different
mining machines. It was found that 86% of continuous mining machine operators are exposed to
noise levels exceeding the PEL in the MSHA regulation [222]. Therefore, developing and
demonstrating the effectiveness of noise controls for continuous mining machines became a
priority for the NIOSH mining research program, with the goal of having feasible noise controls
published in an MSHA PIB [210].
Using the newly constructed and accredited hemi-anechoic chamber at the NIOSH Pittsburgh
facility and beam-forming microphone array technology, researchers identified the dominant
noise source from a continuous mining machine to be the conveying system [223]. Several
controls were developed and tested, the most successful of which was coated flight bars [224].
Testing both in the lab and in the field demonstrated that the coated flight bars reduced
operators’ noise exposure by 7dB [225].
Other notable engineering controls developed through NIOSH research for continuous mining
machines include a dual-sprocket conveyor chain, which was shown to provide a 3dB reduction
in exposure [226], a urethane jacketed tail roller, which was shown to provide a 2dB reduction
[227], and a vibration-isolated chain conveyor take-up [210]. Figure 14 shows a single-sprocket
conveyor on a continuous mining machine, which is was the standard configuration. Figure 15
shows a dual-sprocket conveyor, and Figure 16 shows a dual-sprocket conveyor with urethane-
coated flight bars.
89
Figure 14: Single sprocket chain conveyor on a continuous mining machine (Source: [228])
Figure 15: Dual sprocket chain conveyor on a continuous mining machine (Source: [228])
Figure 16: Dual sprocket conveyor chain with polyurethane-coated flight bars on a continuous mining machine
(Source: [228])
90
Diffusion of Continuous Mining Machine Noise Control Technologies
The effectiveness of noise controls developed for continuous mining machines by NIOSH was
demonstrated through both laboratory and field evaluations. The research program worked
closely with mining machinery manufacturers and material suppliers during the research process.
A major milestone was when Joy Mining Machinery, now owned by Komatsu, modified their
facilities to produce dual-sprocket chains and coated flight bars for their continuous mining
machines. The dual-sprocket chain technology provides benefits other than noise reduction; it
also reduces wear on the chain and sprockets and lengthens the life of the components [228,
226].
As a result of the demonstrated effectiveness of these noise controls and the fact that a major
manufacturer was supplying the noise controls on their equipment, MSHA determined that the
controls were “technically and administratively achievable” and listed them in a Program
Information Bulletin (PIB) [229]. Since the noise regulation requires operators to use any
feasible noise controls to reduce exposure below the PEL, this effectively requires the use of
these controls in cases where miners are overexposed. Dual-sprocket conveyor chains and
polyurethane-coated conveyor flight bars are among very few engineering noise controls listed in
the MSHA PIB, with the majority of the controls listed being administrative controls. The
controls listed by MSHA as “technically and administratively achievable” are shown in Table 6,
and the controls listed as offering promise are shown in Table 7.
It is difficult to assess how many continuous mining machines now have these controls installed,
but roughly a decade after they were developed, both the dual-sprocket conveyor chain and
coated conveyor flights are still offered as options on continuous mining machines [228]. The
91
best way of assessing the effectiveness of these controls is to look at the reduction in miner noise
exposure, which is discussed in the following section.
Table 6: Engineering and administrative noise controls considered by MSHA to be technologically and
administratively achievable in reducing the noise exposure of miners operating or working around continuous
mining machines [229]
Engineering and administrative controls considered feasible for
continuous mining machines as published in MSHA PIB [229]
Remote control with proper positioning of the operator;
Treated cutting heads on auger miners (e.g., the application of stiffening gussets to the helix
and filling of voids with sand)
Proper maintenance, such as replacing bent or misaligned conveyor flights or sides and use of
a chain with proper tension or one having an automatic chain tension device
Polyurethane coated conveyor flights
Dual sprocket conveyor chain
Locate the shuttle car change-out point away from major noise sources (e.g., auxiliary fan)
Avoid idle parking in high noise areas
Keep miners away from auxiliary fans
Have mechanics and electricians avoid working near high-noise sources during maintenance
Reduce utility personnel working time near face and auxiliary fan
Limit operation of empty chain conveyors on all equipment (i.e., shuttle car, loading machine,
continuous miner, miner-bolter, and feeder-breaker)
Eliminate a high-pitched screech by instructing roof bolters to drill straight holes and to avoid
metal strap contact with the drill steel
Follow a cutting cycle (e.g., reduce cutting into roof and floor rock, cutting directly into in-
seam rock, and over sumping) to minimize noise generation from both the continuous mining
machine and the cutting process
Regulate engine RPM on diesel-powered shuttle cars during loading and dumping
Follow shuttle car loading and tramming procedures that minimize noise (e.g., time that the
conveyor chain is turning, increase distance from continuous miner and its boom, etc.)
Follow loading and tramming procedures for loading machines that minimize noise
Turn off any mobile equipment when not in operation
Maintain proper fan blade clearance on dust scrubbers associated with continuous-mining
machines
Constrained layer damping on the conveyor pan on an auger miner (e.g., the application of
visco-elastic materials covered with wear steel to isolate the chain and flights from the
conveyor pan line)
92
Table 7: Engineering and administrative noise controls considered by MSHA to offer promise in reducing the noise
exposure of miners operating or working around continuous mining machines [24]
Engineering and administrative controls considered to offer promise for
continuous mining machines as published in MSHA PIB [229]
Transparent barrier between the operator and conveyor pan line
Constrained layer damping on the conveyor pan on a continuous ripper miner (e.g.,
the application of visco-elastic materials covered with wear steel to isolate the chain
and flights from the conveyor pan line)
Sand-filled conveyor decks
Enclosure and isolation of motors and pump housings where they have been demonstrated to
be a significant noise source
Vibration isolation mounts on motors/pumps where they have been demonstrated to be a
significant noise source
Isolated cutting bits (e.g., the application of vibration isolation materials between
the bits/block and the drum)
Sand-filled cutting heads
Rotate center bolter operator with center bolter helper, roof bolter operators with utility
personnel or shuttle car operators, miner-bolter operator with loading machine operator, or
continuous miner operator with shuttle car operator.
Noise controls for continuous mining machine scrubbers
Impact of Noise Controls on Continuous Mining Machine Operator Exposure
In 2007, researchers published an analysis of noise exposures before and after the enactment of
the 1999 noise regulation and concluded that noise exposure significantly declined after the new
regulation became effective [230]. Another analysis, published in 2017, went beyond this
analysis by considering a much larger data set and by examining exposure by mining sectors.
Overall, the mining industry saw an average 4.5dB decrease in exposure comparing
measurements before the rule change to measurements after the rule change. However, the
greatest reductions were seen at surface mines and at metal/non-metal mines. Whereas the
average reduction for all mines was 4.5dB, the average reduction was only 0.8dB for
underground coal mine [231].
93
An analysis of MSHA citations related to the noise rule from 2000 through 2014 showed a
decreasing trend in violations since 2000 [232]. Since these violations are directly tied to
measurements of noise exposure and to the implementation of noise controls, it is reasonable to
interpret this decrease in violations as a decrease in hearing loss risk. The majority of the
violations were for insufficient corrective actions when noise exposure exceeded the 85dBA
action level or the 90dBA PEL, which represents an ongoing challenge despite the downward
trend in exposure, violations, and hearing loss risk.
To look specifically at the effectiveness of noise control efforts for continuous mining machines,
data from MSHA’s database of noise samples has been analyzed, which provides measurements
taken during mine inspection noise surveys [217]. The dataset provides noise dose measurements
as a percentage of the 90dBA PEL, so any dose over 100% would be considered an overexposure
by the regulation. The data was filtered to remove noise doses above 3200% of the PEL, which
corresponds to an average exposure for an 8-hour working shift of 115dBA, which is the ceiling
limit in the regulation. These outliers were judged to be anomalous sensor readings. The average
and standard deviation for the 90dBA PEL noise dose for continuous mining machine operators
was calculated on a year-by-year basis and is shown in Figure 17. In addition, the proportion of
the noise surveys for continuous mining machine operators for which the dose was over 100%
was also calculated on a year-by-year basis and is shown in Figure 18.
These figures clearly show that, since the enforcement of the 1999 noise regulation began in
2000, the average noise dose for these miners have steadily decreased and that the number of
miners who are overexposed has also steadily decreased. This represents a demonstrated
improvement in miner health risk exposure.
94
Figure 17: Average noise dose for continuous mining machine operators as reported in the MSHA Noise Samples
data set [217]
Figure 18: Proportion of noise surveys for continuous mining machine operators for which the PEL dose was above
100% as reported in the MSHA Noise Samples data set [217]
95
Indications of Technology Success or Failure for CMM Noise Controls
The demonstrated reduction in excessive noise exposure for continuous mining machine
operators since the enactment of new noise regulations in 1999 is a clear indication of the
success of this mandate, which drove the development and deployment of improved noise
control technologies.
An analysis of this indication of technology success is presented in Section 5.2.1.
96
4.2.3 Case 7: Noise Controls for Roof Bolting Machines
Roof Bolting Machine Noise Control Research
NIOSH identified roof bolting machine operators as the second most over-exposed occupations
in underground coal mining, with 81% of operators having exposures that exceeded the MSHA
PEL [222]. Most of the noise exposure was found to occur during the drilling of the holes prior
to the insertion of the bolt [210]; therefore, the research focused on the drilling process. Noise
source identification using a beam-forming microphone array in NIOSH’s hemi-anechoic
chamber in Pittsburgh showed that the radiated noise during drilling primarily came from two
sources: the bit-roof interface and the drill-chuck interface [233].
Research for bolters therefore focused on the development and testing of noise controls to reduce
the noise from these sources. Controls were developed in collaboration between NIOSH and
companies including Corry Rubber Corporation and Kennametal, Inc. These controls included a
collapsible drill steel enclosure [234] and isolators for the drill bit and chuck [235]. In laboratory
testing, the use of the drill bit and chuck isolators together was shown to provide a 3-7dBA in
operator noise exposure [236, 237], the use of the collapsible drill steel enclosure was shown to
provide a 7dBA reduction [238], and the concurrent use of all three of these controls was shown
to provide a 13dBA reduction [239]. Field evaluations of the drill bit isolator showed a reduction
of 3-5dBA in operator exposure [240]. Conclusive field evaluations of the other controls were
not published.
97
Diffusion of Roof Bolting Machine Noise Control Technologies
The effectiveness of noise controls developed for roof bolting machines by NIOSH was
demonstrated through both laboratory and field evaluations. The research program worked
closely with manufacturers and material suppliers, including Corry Rubber Corporation and
Kennametal, Inc., during the research process. This partnership resulted in drill bit isolators
becoming commercially available. On the other hand, chuck isolators and drill steel enclosures
were not commercialized.
As a result of the demonstrated effectiveness for the drill bit isolator, and the fact that a major
manufacturer was supplying the noise control, MSHA determined that the drill bit isolator was
“technically and administratively achievable” and listed it in a PIB [229]. Since the noise
regulation requires operators to use any feasible noise controls to reduce exposure below the
PEL, this effectively requires the use of this control in cases where miners are overexposed.
MSHA lists the chuck isolator and the collapsible drill steel enclosure as offering promise. The
controls listed by MSHA as “technically and administratively achievable” for roof bolting
machines are shown in Table 8, and the controls listed as offering promise are shown in Table 9.
It is difficult to assess how many roof bolting machines now have these controls installed. The
best way of assessing the effectiveness of these controls is to look at the reduction in miner noise
exposure, which is discussed in the following section.
98
Table 8: Engineering and administrative noise controls considered by MSHA to be technologically and
administratively achievable in reducing the noise exposure of miners operating or working around roof bolters [229]
Engineering and administrative controls considered feasible for roof bolters as
published in MSHA PIB [229]
Wet drilling (where it can be implemented due to the roof bolter design and when compatible
with the geology and mining method)
Sharp drill bits
Starter drill steel to begin the hole
Straight drill steel (one piece and with thick wall, if conditions and dust collection allow)
Replacement of worn or defective drilling components (e.g., drill pot bushings or bearings,
worn steel, bent steel)
Maintenance of manufacturer-recommended drilling parameters for thrust, torque, and
rotational speed
Drill bit isolator
Table 9: Engineering and administrative noise controls considered by MSHA to offer promise in reducing the noise
exposure of miners operating or working around roof bolters [24]
Engineering and administrative controls considered to offer promise for roof bolters as
published in MSHA PIB [229]
Automated dust collection system or actuation of the dust collection system motors only
during drilling, or use of administrative controls to accomplish the same task
Exhaust conditioner (water box) and/or manufacturer-recommended exhaust muffler
Chuck isolator
Acoustic drill steel enclosure
Controls for optimizing the drilling parameters (drill feedback system)
Water misting system (i.e., injection of a small volume of water in a mist form into the drill
hole clearance system)
Grommet to isolate the drill steel and chuck
Acoustical liner in the tool tray
Damped drill steels
Impact of Noise Controls on Roof Bolter Operator Exposure
As was discussed in the preceding section for continuous mining machine noise controls, noise
exposures have been shown to have significantly declined since the enactment of the 1999 noise
regulation and [230], but whereas the average reduction for all mines was 4.5dB, the average
reduction was only 0.8dB for underground coal mine [231]. An analysis of MSHA citations also
99
showed a decreasing trend in violations since 2000, indicating a reduction in hearing loss risk
[232].
And, as was done with the continuous mining machines, MSHA’s database of noise samples
[217] was used to assess noise dose changes for roof bolting machines since 2000. Again, the
data was filtered to remove noise doses above 3200% of the PEL, considering these outliers to be
anomalous sensor readings. The average and standard deviation for the 90dBA PEL noise dose
for roof bolting machine operators was calculated on a year-by-year basis and is shown in Figure
19. In addition, the proportion of the noise surveys for roof bolting machine operators for which
the dose was over 100% was also calculated on a year-by-year basis and is shown in Figure 20.
These figures clearly show that, since the enforcement of the 1999 noise regulation began in
2000, unlike the noise dose for continuous mining machine operators, which has steadily
declined, the average noise dose for roof bolting machine operators has remained relatively flat
as has the proportion of miners who are overexposed. This indicates that a demonstrable
improvement in miner health risk has not been achieved.
Indications of Technology Success or Failure for RBM Noise Controls
Unlike the case with continuous mining machines, the development of noise controls for roof
bolting machines has not resulted in a clearly demonstrable reduction in excessive noise
exposure for roof bolting machine operators since the enactment of new noise regulations in
1999. This is an indication that these controls have not achieved success.
An analysis of this indication of technology failure is presented in Section 5.2.2.
100
Figure 19: Average noise dose for roof bolting machine operators as reported in the MSHA Noise Samples data set
[217]
Figure 20: Proportion of noise surveys for roof bolting machine operators for which the PEL dose was above 100%
as reported in the MSHA Noise Samples data set [217].
101
Chapter 5: Causal Tree Analyses
In Chapter 4, the selected cases for several mining safety and health technologies for the mining
industry were described: including portable refuge alternatives, self-contained self-rescuers,
primary communications and tracking systems, proximity detection systems, LED cap lamps,
and noise controls for continuous mining machines and roof bolting machines. In particular, the
research, development, and diffusion of these technologies were studied to find indications that
the introduction of the technology had been successful or unsuccessful. As was discussed in
Chapter 3, indications of a successful outcome include:
• There is documented evidence of an achieved safety or health benefit
• Documented successful trials were performed
• If not mandated, there was wide-spread voluntary adoption
• There is an indication of broad applicability throughout the industry
Indications of an unsuccessful outcome would include:
• There are documented failures of the technology
• The technology’s use introduces a new hazard
• There are low levels of adoption despite demonstrated ability to meet regulatory
standards
• Judicial intervention in rule-making or enforcement occurs
• Miners strongly resist the deployment and use of the technology
• After-rule time extensions occur
102
With these definitions in mind, indications of successful and unsuccessful outcomes were
identified for each of the technologies. The indications of successful outcomes that were found
are shown in Table 10, and the indications of unsuccessful outcomes that were found are shown
in Table 11. In this chapter, each of these is examined individually, and causal tree analysis is
applied to find the root causes of each successful or unsuccessful outcome. From these root
causes, commonalities are identified, and potential ways of improving the likelihood of
successful outcome are proposed.
Table 10: Indicators of a successful safety and health technology introduction
Primary communications and tracking systems are adopted throughout
the underground coal mining industry
LED cap lamps are rapidly and voluntarily adopted by mine operators
throughout the underground mining industry
Continuous mining machine noise controls achieve a demonstrated
reduction in noise exposure for operators
Table 11: Indicators of an unsuccessful safety and health technology introduction
Judicial intervention and after-rule time extensions occurred in refuge
alternatives rulemaking
Miners express strong resistance to using refuge alternatives
Unacceptably high rate of quality control failures occur for CSE SR-100
self-contained self-rescuers
No documented evidence exists showing that tracking systems achieve a
material improvement to safety
Electromagnetic interference (EMI) between continuous personal dust
monitors and proximity detection systems effectively render the
proximity detection system temporarily inoperable
Roof bolting machine noise controls fail to achieve a demonstrated
reduction in noise exposure for operators
103
In the following sections, the causal tree analysis for each of the technologies examined are
presented along with a discussion of the results. First, the causal tree analyses for the safety
technologies are presented: refuge alternatives, SCSRs, communications and tracking, proximity
detection, and LED cap lamps. Following this, the causal tree analyses for the health
technologies are presented: noise controls for continuous mining machines, and noise controls
for roof bolting machines. Finally, this chapter will conclude by presenting a summary of the
commonalities between the results of these analyses and a discussion of what this indicates for
potential means of increasing the likelihood of success for new safety and health technology
mandates, which will feed into the next chapter in which recommendations are presented.
5.1 Causal Tree Analyses for Safety Interventions
5.1.1 Causal Tree Analysis for Case 1: Refuge Alternatives
In Section 4.1.1, a summary of the research, development, and diffusion of portable refuge
alternatives was presented. Although this technology has been a topic of interest for several
decades most of the development for the underground coal mining industry has occurred since
the occurrence of the Sago, Darby, and Alma mine disasters in 2006 and the subsequent passage
of the MINER Act of 2006, which mandated research into refuge alternatives, and the
promulgation of a 2008 MSHA regulation that mandated the use of refuge alternative. Two
indications that this safety technology mandate has been unsuccessful were identified:
1. Judicial intervention and after-rule time extensions occurred in refuge alternatives
rulemaking.
2. Miners express strong resistance to using refuge alternatives.
In this section, causal tree analyses of these two outcomes are presented.
104
Causal Tree Analysis of “judicial intervention and after-rule time extensions occurred in
refuge alternatives rulemaking”
Figure 21 shows the causal tree for the outcome “judicial intervention and after-rule time
extensions occurred in refuge alternatives rulemaking.” Notes related to this analysis are shown
in Table 12. This outcome is evidenced by the filing of successful legal challenges to the
regulation [71] and the repeated re-opening and extension of the rulemaking process after the
passage of the final rule [73, 74, 75, 76, 77, 78, 79, 72].
The first step to performing the causal tree analysis is to identify the proximal cause for these
legal challenges and after-rule time extensions. It seems reasonable to conclude that the reason
these occurred was that after the enactment of regulations, lingering questions about the safety of
portable RAs remained in the minds of members of the mining community. These questions
lingered because, at the time of rulemaking, the risks associated with the use of RAs were not
well understood. Specifically, the risk of heat-related illness while in an RA, the risk of RA
components not surviving either primary or secondary explosions, and the risk of toxic gas
ingress into the RAs were not well understood. The fact that these risks were not well understood
is reflected in NIOSH research that has occurred since the passage of the regulation on the topics
of heat and humidity buildup inside RAs [241, 242, 243], cooling systems for RAs [244], the
explosion survivability of RA doors [245] and pressure relief valves [246], the ingress of harmful
gases into RAs during miner ingress [247], and the purging of harmful gases following miner
ingress [248]. The fact that concentrated, ongoing research in these topic areas has yet to provide
clear guidance for the design and use of RAs is clear evidence that these risks were not well
understood at the time the regulation was written. The above discussion is reflected in the top
three levels of the causal tree analysis in Figure 21.
105
Figure 21: Causal tree analysis for “Judicial intervention and after-rule time extensions occurred in refuge
alternatives rulemaking” (See notes in Table 12)
Judicial intervention1 and after-rule time extensions2 occurred in refuge alternatives rulemaking
Questions about risks associated with refuge alternatives remain after rulemaking
Risks associated with the use of RAs were not well understood at the time of rulemaking:
- Risk of heat-related illness3
- Risk of components not surviving explosions4
- Risk of toxic gas ingress5
Rulemaking proceeded despite the identification of
need for further research on heat mitigation,
atmosphere management, and explosion
survivability6
Political and cultural pressures exist for immediate
action following 2006 mine diasters7
The timeframe
established by the
MINER Act allows for
limited research and
development8
Biases lead legislators to
judge that immediate
action is needed9
The MINER Act calls
for the use of RAs
despite a lack of
research indicating that
the technology is
mature10
Biases lead legislators to
fail to recognize
indications of
technological
immaturity
Rulemaking proceeded despite identification of
operational deficiencies in portable RAs11
Despite identifying
serious deficiencies with
available RAs, NIOSH
report to Congress stated
that the technology
merits
commercialization and
deployment12
Biases and political
pressures lead
researchers to understate
the seriousness of issues
identified through
research
Regulators fail to fully
recognize the
seriousness of identified
deficiencies
Biases lead regulators to
judge that immediate
action is needed and to
ignore indications of
technological
immaturity
106
Table 12: Notes for causal tree analysis for “Judicial intervention and after-rule time extensions occurred in refuge
alternatives rulemaking” (See causal tree in Figure 21)
1 United Mine Workers v. MSHA, October 26, 2010 [71]
2 Multiple re-openings and extensions of public comment periods issued [73, 74, 75, 76, 77,
78, 79, 72]
3 Ongoing research on heat and humidity buildup [241, 242, 243] and cooling systems [244]
for refuge alternatives indicates significant knowledge gaps at the time the rule was enacted.
4 Ongoing research on survivability of RA doors [245] and pressure relief valves [246] for
refuge alternatives indicates significant knowledge gaps at the time the rule was enacted.
5 Ongoing research on contamination ingress [247] and harmful gas purging [248] for refuge
alternatives indicates significant knowledge gaps at the time the rule was enacted.
6 The Foster-Miller report commissioned by NIOSH in 2007 highlighted the need for further
research on heat mitigation, atmosphere management, and explosion survivability [67, 68].
7 See discussion on the call for refuge alternatives in response to the Sago mine disaster in
Section 4.1.1
8 The MINER Act required that NIOSH conduct “research, including field tests, concerning
the utility, practicality, survivability, and cost of various refuge alternatives in an
underground coal mine environment, including commercially-available portable refuge
chambers,” and to provide a report to Congress on the results of this research within 18
months. This timeframe set an expectation for rapid enactment of regulations.
9 Explain and cite relevant biases
10 A 1983 report developed by Foster-Miller through a USBM contract highlighted the
importance of considering the following in the development of refuge alternatives:
breathable air supplies, infiltration of harmful gases, chamber pressurization, chamber
construction, communications, psychological aspects, and training [51, 52]
11 NIOSH testing of refuge alternatives in 2007 identified shortcomings with RAs having to do
with heat dissipation, time to deploy, and ability to maintain CO2 concentration at the
suggested level. NIOSH considered these deficiencies to be “sufficiently serious in three of
the chambers to require correction before deployment.” [64]
12 The NIOSH report to Congress concluded that although “some commercially available
portable chambers have operational deficiencies that will delay their deployment in mines”
and although “there are some remaining knowledge or technology gaps for the design and
specification of refuge alternatives” that “the benefits of refuge alternatives and the general
specification of these alternatives are sufficiently known to merit their commercialization
and deployment in underground coal mines.” [64]
107
Between the third and fourth levels of the causal tree analysis in Figure 21, the question that
must be answered is why the risks associated with the use of RAs was not well understood at the
time of rulemaking. Two causes were identified among those that contributed to this situation:
1. Rulemaking proceeded despite the identification of need for further research on heat
mitigation, atmosphere management, and explosion survivability
2. Rulemaking proceeded despite identification of operational deficiencies in portable RAs
It should be noted that a third cause could have also contributed. Manufacturers and vendors of
refuge alternatives technologies may have either intentionally or unintentionally misrepresented
the maturity level of their products. This cause was not explicitly included in this analysis
because it was judged that any recommendations designed to objectively detect the need for
further research or to appropriately act on identified deficiencies would necessarily also detect
misrepresentations of technology maturity.
The first identified cause (“Rulemaking proceeded despite the identification of need for further
research on heat mitigation, atmosphere management, and explosion survivability”) is evidenced
by the fact that following the passage of the MINER Act, and in partial fulfillment of Act’s
mandate that NIOSH lead research and development efforts on refuge alternatives, NIOSH
commissioned a contract with Foster-Miller to quantify the potential benefits of using RAs and
to identify areas in which further research and development is needed. The report from this
contract was published in 2007, after the passage of the MINER Act but before the finalization
of the RA regulation from MSHA. This report highlighted the need for further research on heat
mitigation, atmosphere management, and explosion survivability [67, 68].
108
The second (“Rulemaking proceeded despite identification of operational deficiencies in
portable RAs”) refers to information reported by NIOSH to Congress in 2007 that testing of
refuge alternatives had identified shortcomings with RAs having to do with heat dissipation, time
to deploy, and ability to maintain CO2 concentration at the suggested level. NIOSH considered
these deficiencies to be “sufficiently serious in three of the chambers to require correction before
deployment” [64]. Asking why rulemaking proceeded despite these indications that further
research and development was needed and that the existing RA technologies exhibited
deficiencies is the next step in the causal tree analysis, which takes us to the fifth level of the
causal tree in Figure 21.
The most apparent reason that rulemaking proceeded despite the apparent need for research and
development is that political and cultural pressures were pushing for an immediate response to
the mine disasters of 2006. This was discussed in detail in Section 4.1.1: following the Sago
disaster and other disasters, media coverage, Congressional hearings, and political discourse
created an environment in which there were serious doubts about the nation’s ability to protect
miners’ safety and health and there was a call for immediate and decisive action to ensure that
disasters of this type did not occur again. The urgency of the political and cultural environment
under which the RA regulations were passed can be traced back to the passage of the MINER
Act, as shown on the left side of the sixth level of the causal tree in Figure 21, with the following
two causes:
1. The timeframe established by the MINER Act allowed for limited research and
development.
2. The MINER Act calls for the use of RAs despite a lack of research indicating that the
technology is mature.
109
The first of these can be traced to the root cause that biases lead legislators to judge that
immediate action is needed. Specifically, cognitive biases such as the availability heuristic [249],
availability cascade [250], bandwagon effect [251], the law of the hammer [252], and the
identifiable victim effect [253] may have led legislators to conclude that immediate action was
needed to respond to the disasters. A brief discussion of each of these biases and the role the
played in the decision to rapidly enact the MINER Act is presented below.
The availability heuristic [249] is the tendency to overestimate the likelihood of events which
one remembers happening recently or which are more unusual or emotionally charged. In this
case, the disasters at Sago, Darby, and Alma were recent, unusual, and emotionally charged at
the time the MINER Act was being passed; it is likely that legislators, as well as others in society
overestimated the likelihood of similar disasters occurring in the future, which contributed to the
sense of urgency for legislation. Availability cascade [250] is the cycle by which propositions
which are emotionally charged are frequently repeated in public discourse, which, by the
availability heuristic, increases the emotional charge of these propositions. This self-reinforcing
cycle undoubtedly played a role in creating the mindset that immediate legislative and regulatory
action was needed. This appears to also have been reinforced by the bandwagon effect [251],
which is the tendency to hold beliefs that many other people also hold. The law of the hammer
[252] is the tendency to over-rely on familiar tools and methods, as captured by the idiom “If all
you have is a hammer, everything looks like a nail.” This cognitive bias surely played a role in
legislators judging that legislation was the best means of addressing the apparent need for
improvements to mine safety and health. Finally, the identifiable victim effect [253] is the
tendency to respond more strongly to risk when the potential victim of an event is personally
identified rather than a group of unidentified people. The personal stories of the victims of the
110
Sago, Darby, and Alma disasters were covered extensively in the media in the months following
the disasters, notably including the poignant letters left by the victims at Sago. This
personalization of mining disaster victims was likely a factor in the thinking of legislators and
others.
The other root cause on the left side at the bottom of Figure 21 is that biases led legislators to fail
to recognize indications of technological immaturity. In particular, confirmation bias appears to
have played a role in leading legislators to the conclusion that refuge alternative technologies
either were already mature or could easily be developed to maturity. Confirmation bias [254] is
the tendency to seek out and remember information that confirms one’s beliefs or preconceptions
while ignoring information that disconfirms one’s beliefs or preconceptions. As was discussed in
Section 4.1.1, the discourse around mine safety in the media and from members of Congress
following the disasters of 2006 was largely motivated by the notion that the mining industry was
not making use of modern technologies to protect miners. This notion that available technologies
simply weren’t being used surely led legislators to think that new safety and health technology
mandates would be relatively easy to meet. Confirmation bias would have caused legislators to
more heavily weight evidence that reinforced this notion (e.g., testimony from vendors claiming
that they could provide effective solutions) and to discount evidence that contradicted this notion
(e.g., testimony stating that further research and development is needed).
Returning now to examine the right side of Figure 21 from the intermediate cause “Rulemaking
proceeded despite identification of operational deficiencies in portable RAs,” the question is why
the identification of deficiencies did not cause rulemaking to stall following the passage of the
MINER Act. Two causes for this have been identified:
111
1. Despite identifying serious deficiencies with available RAs, NIOSH report to Congress
stated that the technology merits commercialization and deployment.
2. Regulators fail to fully recognize the seriousness of identified deficiencies.
The first refers to the fact that the 2007 NIOSH report to Congress on their preliminary research
on RAs concluded that although “some commercially available portable chambers have
operational deficiencies that will delay their deployment in mines” and although “there are some
remaining knowledge or technology gaps for the design and specification of refuge alternatives”
that “the benefits of refuge alternatives and the general specification of these alternatives are
sufficiently known to merit their commercialization and deployment in underground coal mines”
[64]. In this way, although researchers had identified serious deficiencies, the implications of
these deficiencies were understated. Similarly, despite having seen these documented
deficiencies, regulators apparently failed to fully appreciate the seriousness of these deficiencies.
These are traced back to the root causes shown at the bottom right of Figure 21: “Biases and
political pressures lead researchers to understate the seriousness of issues identified through
research,” and “Biases lead regulators to judge that immediate action is needed and to ignore
indications of technological immaturity.” Both of these can be explained by similar cognitive
biases in the thinking of the researchers and the regulators, namely: confirmation bias [254],
availability heuristic [249], availability cascade [250], the identifiable victim effect [253], the
law of the hammer [252], optimism bias [255, 256], and the ostrich effect [256].
The availability heuristic, availability cascade, and the identifiable victim effect, played a role
similar to what was discussed for legislators above; the frequently repeated, emotionally charged
discussion of the recent events of Sago and other disasters created a greater sense of urgency.
112
This likely led regulators to feel that immediate action was needed and led researchers to feel
that a positive interpretation of the research was needed in order to accommodate this immediate
action. As with the legislators, the law of the hammer may also have led regulators to their most
familiar tool: regulation. Regulators and researchers appear to also have suffered confirmation
bias that caused them to discount evidence that contradicted the proposition that RA technology
was mature and effective. Finally, optimism bias and the ostrich effect may have led both
regulators and researchers to discount the evidence that there were deficiencies with RAs.
Optimism bias [255, 256] is the tendency to be overly optimistic when considering a decision
involving risk. In other words, although the risk that RAs might not be as safe as expected was
apparent in the identified deficiencies of the chambers, optimism bias caused regulators and
researchers to conclude that these deficiencies could be corrected. Similarly, the ostrich effect
[256] is the tendency to ignore an obvious risk (i.e., to stick one’s head in the proverbial sand). It
is possible that, although researchers and regulators recognized the import of the identified
deficiencies, they ignored this in decision making due to the ostrich effect.
In addition, these biases can be compounded by political pressures and interactions within or
between agencies whereby positions that do not align with the agendas of an agency can be
stifled either overtly through the silencing of those positions or more subtly through the
intentional or unintentional fostering of a culture in which those positions are not expressed.
The discussion above traces the causes for judicial and after-rule time extensions in the refuge
alternatives rulemaking process to four root causes which can all be attributed to cognitive biases
on the part of legislators, regulators, and researchers who were responsible for making key
decisions leading to the enactment of the regulation. These root causes are shown in Table 13.
113
Table 13: Identified root causes for “Judicial intervention and after-rule time extensions occurred in refuge
alternatives rulemaking”
Biases lead legislators to judge that immediate action is needed
Biases lead legislators to fail to recognize indications of technological
immaturity
Biases and political pressures lead researchers to understate the
seriousness of issues identified through research
Biases lead regulators to judge that immediate action is needed and to
ignore indications of technological immaturity
Causal Tree Analysis of “Miners express strong resistance to using refuge alternatives”
In Section 4.1.1, the other indication of an unsuccessful outcome for the mandate for refuge
alternatives was that miners express strong resistance to the use of the chambers. It is common to
hear from miners that they will not ever use an RA, or at least that they won’t use them except as
a last resort. While these statements may not reflect what miners will actually do in a disaster, it
is a significant concern that miners may not use an RA in a situation where one could save their
life. The causal tree analysis for this is shown in Figure 22. Note that a significant portion of this
tree is shown in dashed lines. This is because at two parts of the tree, one of the intermediate
causes is that “risks associated with the use of RAs were not well understood at the time of
rulemaking,” which was also an intermediate cause in the causal tree shown in Figure 21.
Therefore, only the root causes are shown with dashed lines.
There are two apparent reasons why miners would be strongly opposed to using RAs; these
represent the second level of the causal tree analysis in Figure 22:
1. Training instructs miners to use RAs only as a last resort or as a way station.
114
2. Miners perceive that attempting escape is less risky than taking refuge and awaiting
rescue.
Appropriate and effective training is obviously an important component of any successful safety
or health technology introduction. When training for technologies is designed, the creators of the
training content make decisions about what content to include and how the appropriate use of the
technology should be presented. In the case of RAs, the decision was made that miners should be
instructed to use RAs only as a last resort or as a way station to rest, communicate with the
surface, or to switch over SCSRs during escape; this is reflected in multiple training programs
created and distributed by NIOSH [87, 88, 89, 90, 91, 92]. There are two reasons for this
decision. The first is that there are justifiable reasons why escape should be preferred over refuge
and rescue. At the Sago Mine disaster, it was unambiguous that miners would have had a better
chance of survival if an RA had been available; the miners were unable to escape the mine, and
the atmosphere was filled with carbon monoxide. However, scenarios like this are rare among
mine disasters. In most cases, miners would be able to escape, even if they had to do so through
smoke and toxic gases. Clearly, if escape is possible, miners are better off getting out of the mine
than staying in the mine. Although there are these justifiable reasons why escape should be
preferred, there are also scenarios, such as the scenario at Sago, where taking refuge would be
necessary and would be safer than attempting escape. This leads to the first root cause for this
analysis, which is that this engineering control is only able to improve safety under a specific
type of scenario. In other words, since the use of RAs is not universally the safer option in every
mine disaster, the judgement of the miners is needed to select when to use an RA and when not
to.
115
Figure 22: Causal tree analysis for “Miners express strong resistance to using refuge alternatives” (portions shown in
dashed lines are not shown in their entirety because they would duplicate portions of Figure 21; therefore, only the
root causes are shown)
Miners express strong resistance to using refuge alternatives
Training instructs miners to use RAs only as a last resort or as a way station
Justifiable reasons exist for preferring
escape over refuge/rescue
Engineering control improves safety or health
only when used in a specific scenario
Among regulators, mine operators, and researchers,
confidence in RA safety is not
absolute
Risks associated with the use of
RAs were not well understood at the
time of rulemaking
See corresponding portion of causal tree for "Judicial intervention and after-rule time extensions occurred in refuge alternatives
rulemaking"
Biases lead legislators to judge
that immediate action is needed
Biases lead legislators to fail to
recognize indications of technological
immaturity
Biases and political pressures lead researchers to understate the
seriousness of issues identified through
research
Biases lead regulators to judge
that immediate action is needed and to ignore indications
of technological immaturity
Miners perceive that attempting escape is less risky than taking refuge and awaiting rescue
Justifiable reasons exist for preferring
escape over refuge/rescue
Engineering control improves safety or health
only when used in a specific scenario
Fears exist among miners about
entering refuge alternatives
Risks associated with the use of
RAs were not well understood at the
time of rulemaking
See corresponding portion of causal tree for "Judicial intervention and after-rule time extensions occurred in refuge alternatives
rulemaking"
Biases lead legislators to judge
that immediate action is needed
Biases lead legislators to fail to
recognize indications of technological
immaturity
Biases and political pressures lead researchers to understate the
seriousness of issues identified through
research
Biases lead regulators to judge
that immediate action is needed and to
ignore indications of technological immaturity
Miners are able to maintain greater
autonomy by attempting escape
than by taking refuge
Biases lead miners to mistrust
interventions
116
Another reason that training programs may have advised using RAs only as a last resort is that
those creating or advising the development of those training programs may have had less than
complete confidence in the ability of RAs to provide a safe environment to await rescue. Again,
this is justifiable since at the time of rulemaking and after, the risks associated with the use of
RAs were not well understood, as has already been discussed. This traces back to the four root
causes shown in Table 13, which were identified through the analysis shown in Figure 21. These
root causes have to do with cognitive biases, such as confirmation bias, the law of the hammer,
availability heuristic, and others as discussed for the previous analysis. The same discussion for
that analysis would apply here.
Aside from the fact that training advises miners to only use RAs as a last resort, the other reason
that miners would be hesitant to use an RA is that they perceive that attempting escape is less
risky than taking refuge and awaiting rescue, which is the right half of Figure 22. There are three
reasons miners might have this perception:
1. Justifiable reasons exist for preferring escape over refuge/rescue.
2. Fears exist about entering refuge alternatives.
3. Miners are able to maintain greater autonomy by attempting escape than by taking refuge.
The first of these has already been discussed and traces to the same root cause discussed above.
The second represents a justifiable fear since the risks associated with entering an RA (for
example, the risk of heat-related illness or the risk of secondary explosion) are significant and are
not well understood. Again, this traces back to root causes already discussed associated with
biases during the legislative and rulemaking procedures. The third, that miners are able to
maintain greater autonomy by attempting escape, represents (at least in part) biases on the part of
117
the miners themselves. These biases may cause a miner to choose to attempt escape even when
taking refuge is the safer course of action. Since this is out of the control of any legislative,
regulatory, or research activities, it is beyond the scope of this study, but should be considered by
those developing training materials or performing research on the human factors of mining safety
and health interventions.
The discussion above traces the causes for the fact that miners express strong resistance to using
RAs to six root causes, four of which can all be attributed to cognitive biases on the part of
legislators, regulators, and researchers who were responsible for making key decisions leading to
the enactment of the regulation, and two of which can be considered inherent limitations or
engineering and administrative controls. These root causes are shown in Table 14.
Table 14: Identified root causes for “Miners express strong resistance to using refuge alternatives”
Biases lead legislators to judge that immediate action is needed
Biases lead legislators to fail to recognize indications of technological
immaturity
Biases and political pressures lead researchers to understate the
seriousness of issues identified through research
Biases lead regulators to judge that immediate action is needed and to
ignore indications of technological immaturity
Engineering control improves safety or health only when used in a
specific scenario
Biases lead miners to mistrust interventions
118
5.1.2 Causal Tree Analysis for Case 2: Self-Contained Self-Rescuers
In Section 4.1.2, the recent history on SCSRs was presented, with a particular focus on the CSE
SR-100 SCSR, which was found to experience unacceptably high rates of quality control failure,
as was reported in public notices from NIOSH between 2010 and 2013 [97, 95, 99, 101, 108,
104, 102, 105, 98]. Figure 23 shows a causal tree analysis to find the root causes for this
unacceptably high rate of failures and for why this problem was not identified earlier. Notes and
citations for this analysis are shown in Table 15.
119
Figure 23: Causal tree analysis for "Unacceptably high rate of quality control failures occur for CSE SR-100 self-
contained self-rescuers" (See notes in Table 15)
Unacceptably high rate of quality control failures occur for CSE SR-100 self-contained self-rescuers1
SCSRs are certified despite deficiencies being identified2
Observed failures are incorrectly attributed to degradation in field-
deployed units rather than to problems with manufacture3
Testing is inadequately designed to positively
identify problems with
manufacture4
Biases result in insufficient or
poorly designed experiments
Biases lead to insufficient or
ineffective review of research
findings
Biases lead researchers to
faulty conclusions
despite contradictory data
Observed failures that are identified as problems with manufacture are
discounted as insignificant or as easily corrected5
Explanations provided by
SCSR manufacturers are accepted without
critical review
Biases result in insufficient or
ineffective review of research
findings
Identified concerns with
certified SCSRs are understated in
public reports6
Biases and political pressures lead researchers to understate the seriousness of
issues identified through research
Biases lead regulators,
researchers, and legislators to
maintain confidence in existing safety
and health technologies
despite indications of
poor performance
Improvements to SCSR technology have not occurred
despite deficiencies
observed in mine disasters7
Technologies other than SCSRs
were seen as a more effective
solution to problems seen at Sago and other
disasters8
Biases lead regulators,
researchers, and legislators to
maintain confidence in existing safety
and health technologies
despite indications of
poor performance
Limited research and development
resources necessitate
prioritization of some technology development and
testing efforts over others
120
Table 15: Notes for causal tree analysis for "Unacceptably high rate of quality control failures occur for CSE SR-
100 self-contained self-rescuers" (See causal tree in Figure 23)
1 See discussion of quality control failures with starter oxygen in Section 4.1.2 and see
public notices concerning failures and investigation in [97, 95, 99, 101, 108, 104, 102, 105,
98]
2 See discussion to prior failure to detect quality control issues in Section 4.1.2. The LTFE
program had identified issues with the performance of CSE SR-100 units in reports
published as far back as 1990 [112] and again in subsequent reports published over nearly
two decades [113, 114, 115, 116, 117, 118, 119].
3 The conclusions of LTFE reports consistently attribute issues identified with tested units to
degradation in the mining environment or to inadequate inspection of the units. The
following quote is from the conclusions of the 2002 LTFE report [117], but very similar
wording appears in all of the other LTFE reports published from 1990 through 2008: “The
results of this study suggest that the large majority of SCSRs that pass their inspection
criteria can be relied upon to provide a safe level of life support capability for mine escape
purposes. However, the mining environment seems to have caused some performance
degradation in the CSE SR-100.”
4 The inadequacy of the LTFE test program for detecting quality control issues is clearly
evident by comparing the sampling procedures for the LTFE testing to the sampling
performed in response to the identification of the quality control problem in 2010. In each
phase of the LTFE, dozens of SCSR units were tested; in contrast, in the 2010-2011 testing
using the quality assurance experimental design, 500 units were tested [100].
5 As early as 1990, manufacturing defects with the starter oxygen in CSE SR-100 SCSRs
were identified. However, these problems were said to have been corrected by the
manufacturer and were thereby discounted. The following quote appears in the conclusions
of the 1990 report of the LTFE, but similar language appears in other LTFE reports:
“Laboratory environmental testing of the SR-100 has uncovered a manufacturing defect in
the burst disk of the oxygen starter bottle and a design problem with the desiccant bag.
Both of these problems have been corrected by the manufacturer.”
6 Although performance problems with SCSR performance were identified through the
LTFE, the conclusions of the public reports from these tests consistently presented the
results in a positive light, including language such as: “The results of this study suggest
that the large majority of SCSRs that pass their inspection criteria can be relied upon to
provide a safe level of life support for mine escape purposes”
7 Investigations of the Sago disaster uncovered apparent deficiencies with SCSRs, including
miners having difficulty breathing while using the units, and miners having difficulty
starting the units, miners removing the units to talk (MSHA and WV Sago investigation
reports). Although these issues might be partially attributable to insufficient expectations
training or insufficient inspections, it is reasonable to conclude that improvements to the
design of the SCSRs might help to address these problems. Despite these indications that
121
improvements to the technology may be needed, changes in mining safety and health
legislation and regulation following the Sago disaster did not force any changes in the
technology.
8 In contrast to changes in SCSR requirements, which were to increase the number of SCSRs
required to be available in the mine and to require caches, changes to the requirements for
communications and tracking systems and refuge alternatives in the MINER Act were
technology-forcing in nature. This is an indication that legislators deemed the development
of these technologies to be a more effective strategy than improvement of SCSRs. In large
part, acceptance of the status quo with respect to SCSRs underlies this decision.
The fact that the potential for widespread quality control failures for these units is especially
troubling when one considers that these units were certified for use in mines jointly by MSHA
and NIOSH despite deficiencies being repeatedly identified through the Long Term Field
Evaluation (LTFE) program that was conducted to evaluate the capabilities of these and other
SCSRs deployed in the field over decades beginning in the 1980s. As was discussed in Chapter
4, the LTFE program had identified issues with the performance of CSE SR-100 units in reports
published as far back as 1990 [112] and again in subsequent reports published over nearly two
decades since then [113, 114, 115, 116, 117, 118, 119]. These performance issues included
insufficient starter oxygen, breathing difficulty, less than rated capacity, and other issues
affecting the safety value of these units.
Despite these limitations being identified, the conclusions of LTFE reports consistently attributed
them to degradation of the units due to the harsh mining environment or to inadequate
inspection. Language such as the following from the conclusions of the 2002 LTFE report [117]
appears in several of the LTFE reports published from 1990 through 2008: “The results of this
study suggest that the large majority of SCSRs that pass their inspection criteria can be relied
upon to provide a safe level of life support capability for mine escape purposes.” So, even when
122
deficiencies with the SCSRs were identified, the potential seriousness of these deficiencies were
understated, which undoubtedly contributed to the continued certification and use of these units.
The discussion above describes the first two proximal causes for the unacceptably high quality
control failure rates in the SCSRs, as shown on the second level of the causal tree in Figure 23:
1. SCSRs are certified despite deficiencies being identified.
2. Identified concerns with certified SCSRs are understated in public reports.
The third proximal cause shown on the figure is that “improvements to SCSR technology have
not occurred despite deficiencies observed in mine disasters.” Since this is unrelated to the first
two causes listed above, it will be discussed separately later.
The reasons that SCSRs are certified despite deficiencies being identified are:
1. Observed failures are incorrectly attributed to degradation in field-deployed units rather
than to problems with manufacture.
2. Observed failures that are identified as problems with manufacture are discounted as
insignificant or as easily corrected.
The first can be traced to root causes on the part of those performing the LTFE program and
preparing the reports from these evaluations. In particular, confirmation bias [254] will have led
the researchers to reinforce any pre-conception they already had that the deficiencies in
performance were due to degradation in the field. Since the same conclusion was published
repeatedly in several subsequent LTFE reports, the bandwagon effect [251] may have led
researchers to go along with this conclusion despite evidence that it might not be correct. In
addition, biases such as the optimism bias [255, 256], and the ostrich effect [256] may have
123
caused researchers to underestimate or ignore the potential negative outcomes of certifying
SCSRs with observed deficiencies.
In these ways, cognitive biases would have played a major role in the false attribution of
observed deficiencies to degradation of units rather than to defects in manufacture. Another way
that biases played a role in this was that they led to inadequate testing of the SCSR units. The
inadequacy of the methods used in the LTFE for detecting quality control issues is clearly
evident by comparing the sampling procedures for the LTFE testing to the sampling performed
in response to the identification of the quality control problem in 2010. In each phase of the
LTFE, dozens of SCSR units were tested; in contrast, in the 2010-2011 testing using the quality
assurance experimental design, 500 units were tested [100]. The sample size and the testing
procedures used in the LTFE were simply not able to conclusively implicate manufacturing
defects in observed poor SCSR performance. The reasons for the insufficiency of the test
methods in this regard can be traced back once again to cognitive biases on the part of the
researchers. Many of the biases already discussed would have caused those designing the study
and those reviewing the research to decide that the methods were sufficient despite the fact that
they could not conclusively test for manufacturing issues. In particular, confirmation bias and the
bandwagon effect were likely involved since, as discussed above, the same conclusions were
repeatedly drawn in several of the LTFE reports over several years.
In some cases, manufacturing defects were implicated in the LTFE reports. However, in these
cases the observed defects were discounted as being easily solved by the manufacturer. As early
as 1990, manufacturing defects with the starter oxygen bottles in CSE SR-100 SCSRs were
identified. However, these problems were said to have been corrected by the manufacturer and
were thereby discounted. The following quote appears in the conclusions of the 1990 report of
124
the LTFE [112], but similar language appears in other LTFE reports: “Laboratory environmental
testing of the SR-100 has uncovered a manufacturing defect in the burst disk of the oxygen
starter bottle and a design problem with the desiccant bag. Both of these problems have been
corrected by the manufacturer.” In this way, the LTFE authors took the word of the SCSR
manufacturers that the issues had been corrected without performing rigorous review of these
claims. This can again be traced to cognitive biases such as confirmation bias, optimism bias,
and the ostrich effect.
So, despite observing and reporting several deficiencies with the SCSR performance, the
seriousness of these issues was understated in public reports. The above discussion shows how
cognitive biases led to this understatement of the deficiencies, which led to the continued
certification and use of these SCSR units.
The third proximal cause shown on the second level of the causal tree in Figure 23 is that
“improvements to SCSR technology have not occurred despite deficiencies observed in mine
disasters.” This refers to the fact that during disasters where SCSRs have been used, the use of
the technology was problematic. In particular, at Sago, miners had difficulty breathing while
using the units, had difficulty starting the units, and removed the units to talk [53, 55]. Although
these issues might be partially attributable to insufficient expectations training or insufficient
inspections, it is reasonable to conclude that improvements to the design of the SCSRs might
help to address these problems. Despite these indications that improvements to the technology
may be needed, changes in mining safety and health legislation and regulation following the
Sago disaster did not force any changes in the technology. Rather, the MINER Act and an
emergency temporary standard only required that an increased number of SCSRs be made
available and that extra units be kept in caches at strategic locations in the mine. Thus,
125
improvements to the functionality of the technology were not forced through the legislation and
regulation.
In contrast, changes to the requirements for communications and tracking systems and refuge
alternatives in the MINER Act were technology-forcing in nature. This is an indication that
legislators deemed the development of these technologies to be a more effective strategy than
improvement of SCSRs. This is due, in part, simply because limited resources necessitate the
prioritization of some R&D efforts over others. However, the decision to prioritize refuge
alternatives and communications and tracking development over improvements to SCSR
technology may also be due to an implicit acceptance of the status quo with respect to SCSRs. In
other words, SCSRs were accepted as a mature and well established technology due to their
long-standing use in mines and the positive conclusions regarding their capabilities as presented
in the LTFE reports. This may have caused legislators and regulators to fail to see the need for
improvement to the technology that was apparent in the difficulties experienced by the Sago
miners. This can be traced to biases such as the optimism bias, which would lead individuals to
believe that the technology would be likely to help miners in a disaster and the ostrich effect,
which would lead individuals to ignore indications that this might not be the case.
The above discussion traces the causes for the fact that unacceptably high rates of quality control
failures occur for CSE SR-100 self-contained self-rescuers to seven root causes, six of which
have to do with cognitive biases at play in decisions made during the testing and certification of
SCSRs as well as in the crafting of legislative and regulatory requirements for this technology.
These root causes are shown in Table 16.
126
Table 16: Identified root causes for "Unacceptably high rate of quality control failures occur for CSE SR-100 self-
contained self-rescuers"
Biases result in insufficient or poorly designed experiments
Biases lead to insufficient or ineffective review of research findings
Biases lead researchers to faulty conclusions despite contradictory data
Biases result in insufficient or ineffective review of research findings
Biases and political pressures lead researchers to understate the
seriousness of issues identified through research
Biases lead regulators, researchers, and legislators to maintain
confidence in existing safety and health technologies despite indications
of poor performance
Limited research and development resources necessitate prioritization of
some technology development and testing efforts over others
5.1.3 Causal Tree Analysis for Case 3: Primary Communications and
Tracking Systems
In Section 4.1.3, the history of the research, development, and diffusion of primary
communications and tracking systems was presented. These technologies were introduced to the
mining industry through a technology-forcing mandate in the MINER Act in response to the
mining disasters of 2006. An examination of this history showed indications that the introduction
of the technology was successful as well as indications that it was not as successful as it may
have been. The fact that primary communications and tracking systems were adopted throughout
the underground coal mining industry without significant time delays or strong resistance is a
good indication that the introduction was successful. On the other hand, the fact that there is no
documented evidence showing that tracking systems achieve a material improvement to safety is
127
an indication that the technology introduction has not been fully successful. Causal analyses for
these two outcomes are presented below.
Causal Tree Analysis of “primary communications and tracking systems are adopted
throughout the underground coal mining industry”
As was discussed in Section 4.1.3, primary communications and tracking systems, which are
node-based wireless systems and leaky feeder systems as opposed to secondary systems such as
through-the-earth and medium frequency, have been adopted by every operating underground
coal mine in the country. This is evidenced in by a review of the emergency response plans
(ERP), which the mines are required to submit to MSHA as mandated by the MINER Act [121].
A causal tree analysis of why this wide-spread adoption has occurred is shown in Figure 24, and
the notes and citations for this analysis are shown in Table 17. As is shown in the second level of
the figure, there are three proximal causes for this success:
1. Systems offer benefits beside safety.
2. Systems developed to an acceptable level of maturity relatively quickly.
3. Enforcement of MINER Act requirements accounted for technological maturity.
The first is relatively self-explanatory – having effective wireless communications and tracking
is useful to mine operators because they can more easily and efficiently coordinate mine
operations. The convenience of having wireless communication quickly and the convenience of
always knowing where miners and equipment are located is an important component of the rapid
adoption. The other two proximal causes require somewhat more discussion. First the relatively
rapid development of the technology will be discussed.
128
Figure 24: Causal tree analysis for "Primary communications and tracking systems are adopted throughout the
underground coal mining industry" (See notes in Table 17)
Primary communications and tracking systems are adopted throughout the underground coal mining industry1
Systems offer benefits
beside safety
Technology provides benefits besides
safety and health
protections
Systems developed to an acceptable level of maturity relatively quickly
Existing technologies from other industries could be
adapted to mining2
MINER Act mandate was designed to
leverage existing
technologies to expedite technology difusion3
Legislators correctly
identified an opportunity
for a technology-
forcing mandate to result in the development
of new or adaptation of
existing technologies
Intramural research by federal agencies provided sound understanding of underlying physics and
other parameters affecting system operation4
MINER Act mandated
federal research on technology
development5
Legislators correctly
identified the need for
research to achieve
successful results for
technology-forcing mandate
Research agencies
were equipped
with appropriate expertise,
facilities, and resources to
conduct research6
Research agencies correctly identified need for
specialized capabilities and acted to
fulfill the need
Federal research
dollars used to direct
large-scale effort to
develop and adapt
technologies through
extramural research
contracts7
MINER Act mandated
federal research on technology
development5
Legislators correctly
identified the need for
technology research and
provided adequate
funding to support this
effort
Enforcement of MINER Act requirements
accounted for technological maturity8
MINER Act contained
provisions to allow for less
than fully wireless
communi-cations
systems9
Legislators correctly identified
uncertainty in the ability of industry to meet the
provisions of a technology-
forcing mandate
MSHA recognized that feasible technology
does not exist to provide
truly wireless communi-cations as
required by the MINER
Act
Regulators correctly identified
indications of technological immaturity
129
Table 17: Notes for causal tree analysis for "Primary communications and tracking systems are adopted throughout
the underground coal mining industry" (See causal tree in Figure 24)
1 A review of emergency response plans (ERP) shows that node-based and leaky feeder
wireless communications and tracking systems are implemented at underground mines
throughout the industry [121]. 2 Several of the communications and tracking technologies investigated through the MINER-
Act-mandated NIOSH extramural research program were established technologies that were
already in use in other industries, including node-based communications and RFID tracking
systems. 3 The technology-forcing mandate for communication and tracking systems in the MINER
Act was, in large part, motivated by the observation that wireless communication and
positioning technology was available on the surface but not underground. See the discussion
of this mandate in Section 4.1.3 for more detail. 4 In addition to funding research and development contracts for communication and tracking
systems, as part of the MINER Act mandate, NIOSH conducted extensive intramural
research on communication systems. The bulk of this research focused on understanding and
modeling the propagation of RF signals of various frequencies in underground mines [138,
140, 139, 141, 142, 143]. This research provided system developers with the fundamental
understanding of the operating phenomena to design effective systems as well as with clear
guidelines for system implementation [136, 137]. 5 The MINER Act directed the newly formed Office of Mine Safety and Health Research
(OMSHR) within NIOSH “to enhance the development of new mine safety technology and
technological applications and to expedite the commercial availability and implementation
of such technology in mining environments.” 6 In response to the MINER Act mandate for NIOSH to perform and fund communication and
tracking research and development, the program hired several researchers with expertise in
electromagnetic theory and practical experience with the design and implementation of
communication systems. In addition, laboratory facilities were improved and developed to
enable this research. 7 Between 2006 and 2016, OMSHR awarded 40 extramural research and development
contracts in the topic area of “Emergency Communications and Tracking” [134]. 8 The MINER Act required mines to implement wireless communications systems by June 15,
2009. In the months before this enforcement deadline, MSHA published a program policy
letter (PPL) in which it was stated that “because fully wireless communications technology
is not sufficiently developed at this time, nor is it likely to be technologically feasible by
June 15, 2009, this guidance addresses acceptable alternatives to fully wireless
communication systems.” [128]. This PPL established the acceptance of wired node-based
and leaky feeder systems as acceptable alternatives to fully wireless systems. 9 MINER Act contains the provision: “Where such plan sets forth the reasons such provisions
can not be adopted, the plan shall also set forth the operator's alternative means of
compliance. Such alternative shall approximate, as closely as possible, the degree of
functional utility and safety protection provided by the wireless two-way medium and
tracking system referred to in this subpart.”
130
The relatively rapid development of communications and tracking technologies to a level of
maturity that is acceptable and useful to mine operators was important to the adoption of the
technology. While this development didn’t occur immediately, within a few years of the passage
of the MINER Act, there were systems that were usable and a marked improvement over the
technologies they replaced such as page phones. There are three reasons why the technology was
able to be developed to an acceptable level of maturity so quickly:
First, existing technologies from other industries could be adapted to mining. Technologies such
as node-based communications systems and RFID tracking were already extensively used in
other industries, and more sophisticated leaky feeder technology was already in use in metal/non-
metal mines at the time the MINER Act was passed. Although the underground coal mining
environment presents unique challenges for the implementation of these technologies, it was not
the case that the research and development was starting from the ground up (or rather, down).
This was possible because the MINER Act was written in such a way that it specifically called
for the adaptation of existing technologies, leveraging this opportunity to implement already
mature technologies in a new setting. Because these opportunities did exist, i.e., since it was, in
fact, true that existing wireless communications technologies could be effectively adapted to the
underground mine environment, it can be concluded that legislators correctly identified an
opportunity where a technology-forcing mandate would be effective.
The second reason why communications and tracking technologies were able to be rapidly
developed for underground mining was that there was extensive intramural research by federal
agencies to provide a sound understanding of the underlying physics and other parameters
affecting system operation. Much of the NIOSH intramural research that was conducted in
response the MINER Act was to measure and model the propagation of RF signals in
131
underground mines [138, 140, 139, 141, 142, 143]. Through this research, NIOSH developed and
published guidelines for the design, installation, and use of communications and tracking
systems [136, 137]. This provided the industry with the understanding needed to develop
effective systems and to quickly diffuse this technology throughout the industry. The reasons for
this success can be traced to the root causes that legislators recognized the need for research and
development in order to make the technology-forcing mandate successful and that research
agencies recognized and filled the need for specialized expertise and facilities to conduct this
research and significantly expanded capabilities following the passage of the MINER Act by
hiring several RF experts and improving facilities.
The final, and perhaps most significant, reason that communications and tracking technologies
were developed to maturity rapidly is that extensive extramural research and development efforts
were funded by NIOSH as part of the MINER Act mandate to conduct research on the
technology. Between 2006 and 2016, NIOSH awarded 40 extramural research and development
contracts in the topic area of “Emergency Communications and Tracking” [134]. Although not
all of these resulted in successful products, the overall effect of this massive investment into
R&D was clearly positive. As with the intramural research, this can be traced to the root cause
that legislators correctly recognized that significant research and development would be needed
in order to successfully implement this new technology, and a mandate for this research to be
funded was written into the legislation.
Besides the rapid development of the technology, another proximal cause for the successful
wide-spread adoption of the technology was that enforcement of MINER Act requirements
accounted for the fact that the technology simply was not at a level of maturity to meet the letter
of the requirements of the law – there were not effective communications systems that could
132
provide completely wireless communication between surface and underground. The MINER Act
required mines to implement wireless communications systems by June 15, 2009. In the months
before this enforcement deadline, MSHA published a program policy letter (PPL) in which it
was stated that “because fully wireless communications technology is not sufficiently developed
at this time, nor is it likely to be technologically feasible by June 15, 2009, this guidance
addresses acceptable alternatives to fully wireless communication systems.” [128]. This PPL
established the acceptance of wired node-based and leaky feeder systems as acceptable
alternatives to fully wireless systems.
It was possible for MSHA to be flexible with enforcement of the law in this way because the
MINER Act contains a provision stating that when the provision for a completely wireless
system could not be met, that alternative means of compliance, which “shall approximate, as
closely as possible, the degree of functional utility and safety protection provided by the wireless
two-way medium and tracking system referred to in this subpart.” The inclusion of this language
in the Act shows that legislators correctly identified uncertainty in the ability of the industry to
meet the provisions of their technology-forcing mandate, and therefore provided a level of
flexibility in the enforcement of the law.
With this provision allowing more flexible enforcement, it was up to MSHA to recognize that it
was necessary to take advantage of this flexibility, which they did through the issuance of PPLs
allowing for less than fully wireless systems. This shows that regulators correctly identified the
indications of technological immaturity in fully wireless communications systems and did not
require mines to meet this more rigid requirement.
133
The above discussion has examined the causes for the wide-spread successful adoption of
primary communications and tracking systems and has traced these causes to seven root causes,
six of which are related to legislators, regulators, and researchers correctly assessing the maturity
of the technologies. These root causes are shown in Table 18.
Table 18: Identified root causes for "Primary communications and tracking systems are adopted throughout the
underground coal mining industry"
Legislators correctly identified an opportunity for a technology-forcing
mandate to result in the development of new or adaptation of existing
technologies
Legislators correctly identified the need for research to achieve
successful results for technology-forcing mandate
Legislators correctly identified the need for technology research and
development and provided adequate funding to support this effort
Legislators correctly identified uncertainty in the ability of industry to
meet the provisions of a technology-forcing mandate
Regulators correctly identified indications of technological immaturity
Research agencies correctly identified need for specialized capabilities
and acted to fulfill the need
Technology provides benefits besides safety and health protections
Causal Tree Analysis of “no documented evidence exists showing that tracking systems
achieve a material improvement to safety”
Although the mining industry has adopted communications and tracking technologies in
response to the mandate of the MINER Act, there are, nonetheless, indications that the
technology has not achieved the levels of success that it may have. In particular, there is not
documented evidence that tracking systems achieve a material improvement to safety, meaning
that there is not compelling evidence in the research literature that the performance standards, if
134
achieved, will substantially improve the likelihood of successful escape or rescue and there is not
compelling evidence in the research literature that the tracking systems in use in the industry
meet the performance standards. It is difficult to provide evidence for the lack of research in the
literature; however, the review presented in Section 4.1.3 did not find any evidence that studies
of this type have been performed to show that tracking systems materially improve the chances
of successful escape or rescue. A causal tree analysis of this apparent unsuccessful outcome is
shown in Figure 25, Figure 26, and Figure 27. Notes and citations for this analysis are given in
Table 19.
Below, the causes of the fact that “compelling evidence does not exist to indicate that the
performance standards, if achieved, will substantially improve the likelihood of successful rescue
or escape” is discussed as shown in Figure 26. Following this, the causes for the fact that
“compelling evidence does not exist to indicate that the tracking systems in use in the industry
meet the performance standards” is discussed shown in Figure 27.
Figure 25: Causal tree analysis for "No documented evidence exists showing that tracking systems achieve a
material improvement to safety" (See remainders of causal tree in Figure 26 and Figure 27)
No documented evidence exists showing that tracking systems achieve a material improvement to safety
Compelling evidence does not exist to indicate that the performance standards, if achieved, will substantially improve the likelihood of successful rescue or escape
See remainder of causal tree in subsequent figures
Compelling evidence does not exist to indicate that the tracking systems in use in the industry meet the
performance standards
See remainder of causal tree in subsequent figures
135
Figure 26: Causal tree analysis for "Compelling evidence does not exist to indicate that the performance standards, if
achieved, will substantially improve the likelihood of successful rescue or escape" (Continues from Figure 25; see
notes in Table 19)
Compelling evidence does not exist to indicate that the performance standards, if achieved, will substantially improve the likelihood of successful rescue or escape
Performance standards are not based on a publicly documented an analysis of expected safety gains
Enforcement standards were enacted through mechanisms
that did not require public review as in the rulemaking
process1
Biases lead to insufficient or ineffective review of
research findings
Biases lead regulators to judge that immediate action
is required and to ignore indications of technology
immaturity
Research on the effect of tracking system accuracy on the outcome of escape and rescue
attempts has not been conducted
Test facilities for performing appropriate experiments
were not available
Research on communication system performance is prioritized over research on tracking system performance
Limited research and development resources necessitate prioritization of some technology development and testing
efforts over others
The timeframe for compliance in the MINER Act limits the amount of research that can be completed
Biases lead regulators to judge that immediate action is needed and to ignore indications of technology immaturity
Regulators judged tracking systems to be a mature
technology2
Biases lead regulators to judge that immediate action is required
and to ignore indications of technology immaturity
136
Figure 27: Causal tree analysis for "Compelling evidence does not exist to indicate that the tracking systems in use
in the industry meet the performance standards" (Continues from Figure 25)
Compelling evidence does not exist to indicate that the tracking systems in use in the industry meet the performance standards
Enforcement policy does not provide effective means by which inspectors can check compliance
Enforcement policy was formulated without the support of research on methodological approaches to
quantifying performance
Biases lead regulators to judge that immediate action is needed and to ignore indications of technology
immaturity
The timeframe for compliance in the MINER Act limits the amount of research that can be completed
Biases lead legislators to judge that immediate action is needed and to ignore indications of technology
immaturity
Research has not been performed to provide independent verification of tracking system
performance
Limited federal research funding is used for quantitative testing of tracking system performance
Test facilities for performing appropriate experiments were not
available
Research on communication system performance is prioritized over research
on tracking system performance
Limited research and development resources necessitate prioritization of some technology development and
testing efforts over others
The timeframe for compliance in the MINER Act limits the amount of research that can be completed
Biases lead legislators to judge that immediate action is needed and to ignore indications of technology
immaturity
137
Table 19: Notes for causal tree analysis for "No documented evidence exists showing that tracking systems achieve
a material improvement to safety" (See causal trees in Figure 25, Figure 26, and Figure 27)
1 The MINER Act provides a mandate that communications and tracking systems be used in
underground mines, but it does not give details on the required capabilities of these systems.
The performance standards for these systems were enacted through a series of program
policy letters and policy information bulletins [128, 131, 133, 129, 132, 130] rather than
through the normal rulemaking process. 2 In contrast to fully wireless communication systems, tracking systems were judged to be
mature in MSHA’s enforcement of the MINER Act mandate [128].
The reason that there is not compelling evidence that the performance standards, if achieved, will
materially improve the likelihood of successful escape or rescue appears to be that the
performance standards are not based on a publicly documented an analysis of expected safety
gains. While evaluations and demonstrations of tracking systems have been conducted by
NIOSH, MSHA, and others, there is not any study showing what system capabilities would be
needed to enable a miner to successfully escape or to enable a rescue team to successfully find
trapped miners. Clearly, having greater accuracy, faster refresh rates, greater reliability, etc.
would be beneficial to aiding escape and rescue, but it is not clear what all of the performance
metrics should be to evaluate tracking systems and what minimum specifications should be
required for these metrics.
Three factors appear to contribute to this outcome. First, the enforcement of the MINER Act
mandate for tracking systems was accomplished through means other than the normal
rulemaking process. Rather, MSHA issued a series of program policy letters and policy
information bulletins [128, 131, 133, 129, 132, 130] which established the requirements for
accuracy on working sections, in escapeways, and at strategic locations in the mine as well as
establishing other performance metrics such as battery life and component ruggedness. The use
of policy documents rather than rulemaking appears to have been motivated by a sense of
138
urgency to enforce the mandate of the MINER Act. This can be traced to biases which caused
regulators to judge that immediate action was needed and to ignore the fact that compelling
studies of the benefits of tracking systems had not been presented. Biases at play in this decision
were likely the same biases that created the sense of urgency driving refuge alternatives
regulation as discussed in Section 5.1.1, which are presented again in the following.
Cognitive biases such as the availability heuristic [249], availability cascade [250], bandwagon
effect [251], the law of the hammer [252], and the identifiable victim effect [253] may have led
the regulators to conclude that immediate action was needed to respond to the mine disasters that
occurred in 2006.
The availability heuristic [249] is the tendency to overestimate the likelihood of events which
one remembers happening recently or which are more unusual or emotionally charged. In this
case, the disasters at Sago, Darby, and Alma were recent, unusual, and emotionally charged at
the time the tracking requirements was being developed, which contributed to the sense of
urgency for the implementation of the technology. Availability cascade [250] is the cycle by
which propositions which are emotionally charged are frequently repeated in public discourse,
which, by the availability heuristic, increases the emotional charge of these propositions. Before
and following the passage of the MINER Act, the media coverage and public discourse of
mining disasters was intense as has been discussed, which would have reinforced the sense of
urgency to implement tracking technologies. As with the RA regulations, the bandwagon effect
[251] may have also played into this discourse. Finally, the identifiable victim effect [253], the
tendency to respond more strongly to risk when the potential victim of an event is personally
identified rather than a group of unidentified people was at play in these decisions as the personal
stories of mining disaster victims were surely on the minds of regulators.
139
The sense of urgency and the rapid deployment of communications and tracking systems also
limited the amount of research that could be conducted on the needed capabilities of tracking
systems to enable successful escape or rescue. This is shown as the second cause on the second
level of Figure 26. This is traced to three root causes. First, the facilities to conduct the tests were
not available to federal researchers. Second, limited resources caused researchers to prioritize
communications research over tracking research. And finally, the same biases that caused
regulators to judge that immediate action was needed also caused legislators to judge that
immediate action was needed when they passed the MINER Act.
Figure 27 shows the analysis for the causes of why compelling evidence does not exist to
indicate that the tracking systems in use in the industry meet the performance standards. As with
the previous analysis, one reason is the fact that research had not been conducted, which traces to
the same root causes discussed above: the facilities to conduct the testing were not available,
limited resources led to prioritization of communications research over tracking research, and
biases caused legislators to judge that immediate action was needed while ignoring indications of
technological immaturity.
The other causal chain shown on the left side of Figure 27 has to do with the enforcement policy
for tracking systems not including clearly defined, quantitative methods by which inspectors can
evaluate the performance of tracking systems. While policy guidance has been issued to aid
inspectors in evaluating these systems [133], the guidance does not provide a detailed method by
which inspectors can systematically and quantitatively check the accuracy, reliability, or other
performance metrics. This can reasonably be expected to lead to inconsistencies in how these
evaluations are performed from inspector to inspector, which decreases the confidence that can
be placed in the ability of tracking systems to meet the established performance criteria. The lack
140
of detailed guidance is likely due again to the sense of urgency that existed around the creation
of these policies and around the passage of the MINER Act. The root causes for this are once
again the same biases that have caused legislators and regulators to judge that immediate action
is needed and to ignore indications that technologies are not mature.
The above discussion and analysis has identified the root causes for the unsuccessful outcome
“no documented evidence exists showing that tracking systems achieve a material improvement
to safety.” Six root causes have been identified, four of which have to do with cognitive biases in
decision making by legislators, regulators, and researchers. These root causes are shown in Table
20.
Table 20: Identified root causes for "No documented evidence exists showing that tracking systems achieve a
material improvement to safety"
Biases lead to insufficient or ineffective review of research findings
Biases lead regulators to judge that immediate action is required and to
ignore indications of technology immaturity
Biases lead regulators to judge that immediate action is needed and to
ignore indications of technology immaturity
Biases lead legislators to judge that immediate action is needed and to
ignore indications of technology immaturity
Test facilities for performing appropriate experiments were not available
Limited research and development resources necessitate prioritization of
some technology development and testing efforts over others
141
5.1.4 Causal Tree Analysis for Case 4: Proximity Detection Systems
In Section 4.1.4, a summary of the recent history of proximity detection systems for underground
coal mining equipment was presented. In this history, one indication that the technology has
achieved an unsuccessful outcome is the occurrence of electromagnetic interference (EMI)
between the continuous personal dust monitor and proximity detection systems, the result of
which is to render the proximity detection system inoperable. A root cause analysis for why this
outcome was not predicted and prevented is shown in Figure 28.
Figure 28: Causal tree analysis for "Electromagnetic interference (EMI) between continuous personal dust monitors
and proximity detection systems effectively render the proximity detection system temporarily inoperable"
Electromagnetic interference (EMI) between continuous personal dust monitors and proximity detection systems effectively render the proximity detection system temporarily inoperable
Proximity detection systems and personal dust monitors are not
designed for electromagnetic
compatibility (EMC)
Standards for EMC do not exist for the
underground mining industry
Biases lead to an acceptance of the status quo with
respect to recognized deficiencies in safety and health standards
Research failed to identify the potential
for EMI
Laboratory and field testing of proximity detection systems was not conducted
under conditions that would show EMI
Biases result in poorly designed or
insufficient experiments
Reports from mine operators that systems are not operating properly are not attributed to EMI
A high level of confidence was
placed in manufacturers' engineering of
systems
Biases lead to insufficient review of
research findings
Biases lead to a lack of independent assessment of technologies' capabilities
Reports of system malfunction are
incorrectly attributed to innocuous causes
such as operator misunderstanding/
misinterpretation of system functionality
or poor system calibration/
configuration
Biases lead regulators to ignore indications
of technology immaturity
Biases lead researchers to ignore
indications of technology immaturity
142
Three reasons that the potential for EMI between the personal dust monitor and the proximity
detection system was not predicted and prevented are:
1. Proximity detection systems and personal dust monitors are not designed for
electromagnetic compatibility (EMC).
2. Research failed to identify the potential for EMI.
3. Reports from mine operators that systems are not operating properly are not attributed to
EMI.
Standards for EMC design of electronic systems do not apply to devices used underground.
Since these standards do not exist, they obviously weren’t applied in the design of the personal
dust monitor and the proximity detection systems. The use of such standards would have placed
upper limits on the electromagnetic emission of each device and lower limits on the
susceptibility of each device to interference, which would have prevented this occurrence of
EMI. It is reasonable to assume that through the years, several people in research and regulatory
agencies recognized the need for such standards, but action was never taken to implement such
standards. It is also reasonable to conclude that cognitive biases played a role in this inaction by
contributing to an acceptance of the status quo with respect to recognized deficiencies in safety
and health standards. Biases that may be at play here likely include confirmation bias [254],
which would have led people to reinforce their notions that standards were not needed, optimism
bias [255, 256], which would have led people discount the possibility that EMI could occur, and
the ostrich effect [256], which would have led people to ignore indications that the lack of
standards created the potential for EMI.
143
The failure of agencies performing research on proximity detection and personal dust monitors to
identify the potential for EMI was due to the fact that studies on the potential for EMI involving
these devices simply was not conducted. Although experts in electromagnetics were involved in
the research at NIOSH, experiments on the potential for EMI did not occur. This shows that
biases, such as those described above led resulted in poorly designed or insufficient experiments.
The final proximal cause for the failure to prevent EMI was that reports from mine operators that
systems were not operating properly were not attributed to EMI. During the development and
diffusion of proximity detection systems, mine operators reported to NIOSH as well as to MSHA
that the systems were not operating properly or consistently. It now seems that many of these
instances may have been due to EMI; however, this was not identified at the time because
alternative explanations such as operator misunderstanding/misinterpretation of system
functionality or poor system calibration/configuration were believed to have been the true cause
of the reports of malfunction. Although there was no evidence to support these explanations, they
are relatively innocuous and were simply assumed to be true. A high level of trust had also been
placed in the engineering of the systems, with the underlying assumption that the manufacturers
would have properly designed their systems to prevent EMI. This was clearly a faulty
assumption given the lack of EMC standards. In all of these judgements, the same biases
discussed above (confirmation bias [254], optimism bias [255, 256], and the ostrich effect [256])
may have been involved.
The analysis and discussion above has traced the causes for the fact that electromagnetic
interference (EMI) between continuous personal dust monitors and proximity detection systems
effectively render the proximity detection system temporarily inoperable” to six root causes, all
144
of which have to do with biases during key decisions by researchers and regulators. These root
causes are shown in Table 21.
Table 21: Identified root causes for "Electromagnetic interference (EMI) between continuous personal dust monitors
and proximity detection systems effectively render the proximity detection system temporarily inoperable"
Biases lead to an acceptance of the status quo with respect to recognized
deficiencies in safety and health standards
Biases lead to insufficient review of research findings
Biases lead to a lack of critical assessment of technologies' capabilities
Biases lead regulators to ignore indications of technology immaturity
Biases lead researchers to ignore indications of technology immaturity
Biases result in poorly designed or insufficient experiments
5.1.5 Causal Tree Analysis for Case 5: LED Cap Lamps
Section 4.1.5 provided a history of the development and diffusion of mine cap lamp technology
and a more focused history of the recent development and diffusion of LED cap lamp
technology. LED cap lamps have been rapidly and voluntarily adopted throughout the
underground mining industry. A causal tree analysis for why this adoption was so successful is
shown in Figure 29. This rapid adoption can be attributed to the fact that LED cap lamps offer
several benefits related to energy efficiency, operating cost, compact size, and the convenience
of not having a corded light with a belt-worn battery. These benefits were discussed in more
detail in Section 4.1.5. The safety benefits of the technology have also been demonstrated, but
this was not a driving factor in the adoption of the cap lamps. The adoption of the new
technology of LED cap lamps was also enabled by the fact that regulatory and legislative
standards for cap lamps do not prescribe a specific technology to be used, but rather provide
145
performance-based specifications that must be met. Since these standards did not preclude the
use of new technologies, they did not hinder the adoption of LED cap lamps. The root causes
identified for the successful adoption of LED cap lamps are shown in Table 22. Two of the three
root causes have to do with regulators and legislators enabling new technologies to be introduced
by including flexibility in the safety mandate for mine lighting.
Figure 29: Causal tree analysis for "LED cap lamps are rapidly and voluntarily adopted by mine operators
throughout the underground mining industry"
Table 22: Identified root causes for "LED cap lamps are rapidly and voluntarily adopted by mine operators
throughout the underground mining industry"
Legislators correctly identified the need for flexibility in regulations to
allow for technology development
Regulators correctly identified the need for flexibility in regulations to
allow for technology development
Technology provides benefits besides safety and health protections
LED cap lamps are rapidly and voluntarily adopted by mine operators throughout the underground mining industry
LED cap lamps offer benefits besides than safety and health
improvements
Technology provides benefits besides safety and health
protections
Regulatory standards for cap lamps allow for alternative cap
lamp technology to be used
Regulators correctly identified the need for flexibility in regulations to allow for technology development
Legislative standards for cap lamps allow for alternative cap
lamp technology to be used
Legislators correctly identified the need for flexibility in regulations to allow for technology development
146
5.2 Causal Tree Analyses for Health Interventions
In Section 4.2, historical summaries of the research, development, and diffusion of new noise
control technologies for mining equipment was provided with a particular focus on underground
coal mining equipment including continuous mining machines and roof bolting machines, which
had been identified as the pieces of equipment with the greatest occurrence of noise
overexposure. The development of this technology was driven, in large part, by the promulgation
of new hearing loss prevention regulations by MSHA in 1999. An analysis of the MSHA data on
noise exposure surveys, it was noted that the average noise dose experienced by continuous
mining machine operators has steadily decreased since the promulgation of the regulation, while
the dose for roof bolting machine operators has remained relatively flat. This is an indication
that, somehow, the technology-forcing mandate for new noise controls has apparently been more
successful for the continuous mining machines than it has for the roof bolting machines.
In the following sections, causal tree analyses for the successful outcome with continuous mining
machine noise controls and for the unsuccessful outcome with roof bolting machines will be
presented.
5.2.1 Causal Tree Analysis for Noise Controls for Case 6: Continuous Mining
Machines
Noise exposures for continuous mining machine operators have steadily dropped since 1999
when MSHA passed a technology-forcing regulation, which in part, required all feasible noise
controls to be used. A causal tree analysis for why these exposures have decreased is shown in
Figure 30, and notes and citations for this analysis are given in Table 23.
147
Figure 30: Causal tree analysis for "Continuous mining machine noise controls achieve a demonstrated reduction in
noise exposure for operators" (See notes in Table 23)
Continuous mining machine noise controls achieve a demonstrated reduction in noise exposure for operators1
Mines utilize engineering noise controls to reduce noise exposure
Effective noise controls are available as standard equipment
or as options from mining machinery
OEM2
Implementation of noise controls offer
benefits besides safety and health3
Technology provides benefits besides safety and health protections
Noise controls are developed and
demonstrated through collaboration between researchers and OEM4
Researchers develop effective partnerships with industry in order to facilitate the best
solutions and to better diffuse research
findings into practice
Mine operators purchase equipment with noise controls
Technology provides benefits besides safety
and health protections3
Technology increases capital cost, but does not increase operating
cost
Noise controls have minimal impact on
equipment operation
During research and development, the impact on mining
operations was considered
Noise controls are deemed technically and administratively
achievable by regulators5
Effectiveness of intervention was
successfully demonstrated in field trials under operating
conditions
Mines utilize administrative noise controls to reduce
noise exposure
Effective means of isolating workers
from hazards through administrative controls exist
Administrative noise controls are deemed
administratively achievable by
regulators5
Regulators correctly recognized the need for a combination of
engineering and administrative
controls
Noise regulation allows mine operators to use a combination of engineering and
administrative controls at their
discretion6
Regulatory requirement is a
written as a performance-based
standard
148
Table 23: Notes for causal tree analysis for "Continuous mining machine noise controls achieve a demonstrated
reduction in noise exposure for operators" (See causal tree in Figure 30)
1 See discussion on continuous mining machine operator noise dose surveillance data in
Section 4.2.1.
2 Joy Mining Machinery, now owned by Komatsu, modified their facilities to produce dual-
sprocket chains and coated flight bars for their continuous mining machines [228, 226, 225].
3 The dual-sprocket chain technology was shown to reduce wear on the chain and sprockets
and to lengthen the life of the components [228, 226, 225].
4 Throughout the development of the noise controls, collaborative research and development
efforts were performed between NIOSH and Joy Mining Machinery [225].
5 See MSHA Program Information Bulletin No. P14-02 (Reissue of P08-12),
“Technologically Achievable, Administratively Achievable, and Promising Noise Controls”
[229].
6 Per the noise regulation, when the 90dBA PEL is exceeded, the mine operator is required to
implement feasible engineering and administrative controls to reduce exposure to the PEL.
While the feasibility of the controls is determined by MSHA as the feasibility for the
particular mine in question to implement the control, it is up to the mine operator to select
whether engineering controls, administrative controls, or some combination of the two is
used [220].
This reduction in exposures can be attributed to two primary causes: the use of administrative
noise controls and the use of engineering noise controls. It is important to note that since the
regulations do not give credit for hearing protectors and since the noise exposure surveys
conducted by inspectors do not take the attenuation provided by hearing protectors into
consideration; therefore, these exposures are independent of any additional benefit that may have
been achieved over the same period by increased use of ear plugs or ear muffs. It is also
important to note that mining operations have changed significantly over the last two decades. In
particular, the number and size of underground coal mining operations have decreased as market
and regulatory conditions have changed. This is a confounding factor to this analysis since it is
possible that the changing nature of mine operations also played a role in the changing noise
149
exposure. This effect would be difficult to isolate and quantify, and no attempt has been made to
do so here.
The reasons why mine operators have utilized engineering noise controls can be linked to three
causes:
1. Effective noise controls are available as standard equipment or as options from mining
machinery OEM.
2. Mine operators purchase equipment with noise controls.
3. Noise controls are deemed technically and administratively achievable by regulators.
The noise controls for continuous mining machines that have been listed as feasible in the
MSHA PIB [229] include the dual-sprocket conveyor chain and polyurethane-coated conveyor
flights, both of which were successfully demonstrated to be effective in field tests and both of
which are now offered either as standard equipment or as options on all new continuous mining
machines from Joy Mining Machinery, now owned by Komatsu [228, 226, 225]. The fact that
the manufacturer modified their facilities to offer these products as well as the fact that mine
operators purchased these products is in part due to the fact that they provide benefits besides
just reducing noise exposure; the dual-sprocket chain technology was shown to reduce wear on
the chain and sprockets and to lengthen the life of the components [228, 226, 225]. The adoption
of the technologies is also due, in part, to the effective collaboration that occurred between
federal researchers at NIOSH and the equipment manufacturers to develop and test these
systems. The nature of the noise controls also play a part in the adoption by mine operators; the
controls are installed on the conveyor chain and do not affect the normal operation of the
150
machine or change the way the equipment operator does their job, which can be attributed to the
fact that the impact on mine operations was considered during the development of these controls.
The adoption of administrative controls for continuous mining machines is also influenced by the
design of the machine and the nature in which it is operated. Continuous mining machines are
remote-controlled pieces of equipment, which grants greater flexibility in when the machine
operator can be positioned in order to avoid especially noisy locations. The use of these
administrative controls was enabled by the listing of the controls in the MSHA PIB [229] and by
the flexibility allowed in the regulation to use a combination of administrative and engineering
controls. Per the noise regulation, when the 90dBA PEL is exceeded, the mine operator is
required to implement feasible engineering and administrative controls to reduce exposure to the
PEL. While the feasibility of the controls is determined by MSHA as the feasibility for the
particular mine in question to implement the control, it is up to the mine operator to select
whether engineering controls, administrative controls, or some combination of the two is used
[220]. This flexibility reflects the regulators correct assessment that a combination of
engineering controls and administrative controls would be needed to address noise
overexposures and that the use of a performance-based standard was most appropriate.
The analysis and discussion above traced the causes of the demonstrated reduction in noise
exposure for continuous mining machine operators since the promulgation of a technology-
forcing mandate for noise controls by MSHA in 1999. Eight root causes were identified, five of
which have to do with regulators and researchers engaging effectively in the development and
diffusion of the technologies. These root causes are shown in Table 24.
151
Table 24: Identified root causes for "Continuous mining machine noise controls achieve a demonstrated reduction in
noise exposure for operators"
Regulators correctly recognized the need for a combination of
engineering and administrative controls
Researchers develop effective partnerships with industry in order to
facilitate the best solutions and to better diffuse research findings into
practice
During research and development, the impact on mining operations was
considered
Effectiveness of intervention was successfully demonstrated in field
trials under operating conditions
Regulatory requirement is a written as a performance-based standard
Effective means of isolating workers from hazards through
administrative controls exist
Technology provides benefits besides safety and health protections
Technology increases capital cost, but does not increase operating cost
5.2.2 Causal Tree Analysis for Noise Controls for Case 7: Roof Bolting
Machines
In contrast to continuous mining machine operators, the average noise dose for roof bolting
machine operators has remained relatively flat since the promulgation of the new MSHA noise
regulation in 1999, and through the resulting efforts to introduce engineering and administrative
noise controls for this equipment. A causal tree analysis of why exposures with this machine
have not decreased as they did with the continuous mining machine is shown in Figure 31. Notes
and citations for this analysis are given in Table 25.
152
Figure 31: Causal tree analysis for "Roof bolting machine noise controls fail to achieve a demonstrated reduction in
noise exposure for operators" (See notes in Table 25)
Table 25: Notes for causal tree analysis for "Roof bolting machine noise controls fail to achieve a demonstrated
reduction in noise exposure for operators" (See causal tree in Figure 31)
1 See discussion on roof bolting machine operator noise dose surveillance data in Section
4.2.2. 2 Controls were developed in collaboration between NIOSH and companies including Corry
Rubber Corporation and Kennametal, Inc. These controls included a collapsible drill steel
enclosure [234] and isolators for the drill bit and chuck [236]. 3 See MSHA Program Information Bulletin No. P14-02 (Reissue of P08-12),
“Technologically Achievable, Administratively Achievable, and Promising Noise Controls”
[229].
Roof bolting machine noise controls fail to achieve a demonstrated reduction in noise exposure for operators1
There is limited utilization of
engineering noise controls
Noise controls are supplied by a
third-party manufacturer
rather than being offered by mining machinery OEM2
Nature of noise control does not
allow it to be offered by the
OEM
Nature of equipment
operation and design limits
design of engineering
controls
Mine operators do not purchase and implement noise
controls
Noise controls have significant negative impacts
on equipment operation
Nature of equipment
operation and design limits
design of engineering
controls
Noise controls increase operating
cost
Technology increases capital
and operating costs
Noise control is implemented as a
consumable
Nature of equipment
operation and design limits
design of engineering
controls
Noise controls are not deemed technically
achievable by regulators3
Effectiveness of intervention was not successfully demonstrated in field trials under
operating conditions
There is limited utilization of
administrative noise controls
Effective means of isolating workers
from hazards through
administrative controls do not
exist
153
Whereas the continuous mining machine apparently experienced decreases in exposure due to
the adoption of engineering and administrative controls, there was limited adoption of such
controls for roof bolting machines. The limited adoption of administrative controls can be
attributed primarily to a fundamental difference in the design of these two machines and the
means by which the machines are operated. Continuous mining machines are remote-controlled,
which allows miners to position themselves more flexibly. On the other hand, roof bolting
machines are operated by a miner standing directly adjacent to where the holes are being drilled,
which is the greatest noise source for the machine. Miners must stand in this location in order to
operate the machine properly, which greatly limits the use of administrative controls.
The reasons that the engineering controls for the roof bolting machines have not been adopted
are also in direct contrast with the reasons that controls were adopted for continuous mining
machines. Whereas continuous mining machine noise controls were included as standard or
optional equipment by equipment manufacturers, the noise controls for roof bolting machines
were offered as consumable components (drill bit and drill steel components) by third-party
suppliers. This placed a greater burden on mine operators to utilize the controls since it was not
simply a matter of purchasing a new piece of equipment with the controls installed; the mine
operator had to continuously stock the controls and ensure that they were being used. This can be
traced to the root cause that the nature of the equipment design limited the type of noise controls
that could be used – since the noise sources is the drill steel and the drill bit, the possible set of
controls that could be designed is limited. Another factor that apparently limited the adoption of
these controls was that the controls increase operating cost and have a significant impact on the
operation of the machine. Again, this can be traced to the fact that the noise controls that could
be designed for a roof bolting machine was limited by the nature of the noise sources for this
154
machine and the manner in which the machine is operated. In other words, the development of
effective noise controls for a roof bolting machine is simply a more difficult engineering
challenge than the development of effective noise controls for a continuous mining machine.
The challenges associated with developing controls for this machine also led to the failure of
researchers to successfully demonstrate the effectiveness of the controls through field trials and
to have the controls listed as technically achievable in the MSHA PIB (with the exception of the
drill bit isolator, which was demonstrated and listed).
In summary, the causes for the lack of exposure reduction for roof bolting machine operators was
traced to four root causes, which are shown in Table 26. All of these root causes reflect the
difficulty of the engineering challenges involved with developing controls for this machine,
which is not an indication of any shortcoming in the regulatory or research processes involved.
Table 26: Identified root causes for "Roof bolting machine noise controls fail to achieve a demonstrated reduction in
noise exposure for operators"
Effectiveness of intervention was not successfully demonstrated in field
trials under operating conditions
Effective means of isolating workers from hazards through
administrative controls do not exist
Technology increases capital and operating costs
Nature of equipment operation and design limits design of engineering
controls
155
5.3 Generalization of Causal Tree Analysis Results
The preceding sections have presented causal tree analyses for three indications of successful
outcomes for new safety and health technologies in mining and for six indications of
unsuccessful outcomes for new safety and health technologies in mining. The identified root
causes associated with the successful outcomes are summarized in Table 27, and the identified
root causes for the unsuccessful outcomes are summarized in Table 28. In this section,
commonalities between these identified root causes will be identified and the implications for
future efforts to introduce new safety and health technologies will be discussed.
Table 27: Identified root causes for indications of safety and health technology mandate success
Identified Root Causes
Primary communications and
tracking systems are adopted
throughout the underground
coal mining industry
Legislators correctly identified an opportunity for a technology-forcing
mandate to result in the development of new or adaptation of existing
technologies
Legislators correctly identified the need for research to achieve successful
results for technology-forcing mandate
Legislators correctly identified the need for technology research and
development and provided adequate funding to support this effort
Legislators correctly identified uncertainty in the ability of industry to meet the
provisions of a technology-forcing mandate
Regulators correctly identified indications of technological immaturity
Research agencies correctly identified need for specialized capabilities and
acted to fulfill the need
Technology provides benefits besides safety and health protections
LED cap lamps are rapidly
and voluntarily adopted by
mine operators throughout
the underground mining
industry
Legislators correctly identified the need for flexibility in regulations to allow
for technology development
Regulators correctly identified the need for flexibility in regulations to allow
for technology development
Technology provides benefits besides safety and health protections
Continuous mining machine
noise controls achieve a
demonstrated reduction in
noise exposure for operators
Regulators correctly recognized the need for a combination of engineering and
administrative controls
Researchers develop effective partnerships with industry in order to facilitate
the best solutions and to better diffuse research findings into practice
During research and development, the impact on mining operations was
considered
Effectiveness of intervention was successfully demonstrated in field trials
under operating conditions
Regulatory requirement is a written as a performance-based standard
Effective means of isolating workers from hazards through administrative
controls exist
Technology provides benefits besides safety and health protections
Technology increases capital cost, but does not increase operating cost
156
Table 28: Identified root causes for indications of safety and health technology mandate failure
Identified Root Causes
Judicial intervention and
after-rule time extensions
occurred in refuge
alternatives rulemaking
Biases lead legislators to judge that immediate action is needed
Biases lead legislators to fail to recognize indications of technological
immaturity
Biases and political pressures lead researchers to understate the seriousness of
issues identified through research
Biases lead regulators to judge that immediate action is needed and to ignore
indications of technological immaturity
Miners express strong
resistance to using refuge
alternatives
Biases lead legislators to judge that immediate action is needed
Biases lead legislators to fail to recognize indications of technological
immaturity
Biases and political pressures lead researchers to understate the seriousness of
issues identified through research
Biases lead regulators to judge that immediate action is needed and to ignore
indications of technological immaturity
Engineering control improves safety or health only when used in a specific
scenario
Biases lead miners to mistrust interventions
Unacceptably high rate of
quality control failures occur
for CSE SR-100 self-
contained self-rescuers
Biases result in insufficient or poorly designed experiments
Biases lead to insufficient or ineffective review of research findings
Biases lead researchers to faulty conclusions despite contradictory data
Biases result in insufficient or ineffective review of research findings
Biases and political pressures lead researchers to understate the seriousness of
issues identified through research
Biases lead to acceptance of status quo despite observed deficiencies
Limited research and development resources necessitate prioritization of some
technology development and testing efforts over others
No documented evidence
exists showing that tracking
systems achieve a material
improvement to safety
Biases lead to insufficient or ineffective review of research findings
Biases lead regulators to judge that immediate action is required and to ignore
indications of technology immaturity
Biases lead regulators to judge that immediate action is needed and to ignore
indications of technology immaturity
Biases lead legislators to judge that immediate action is needed and to ignore
indications of technology immaturity
Test facilities for performing appropriate experiments were not available
Limited research and development resources necessitate prioritization of some
technology development and testing efforts over others
Electromagnetic interference
(EMI) between continuous
personal dust monitors and
proximity detection systems
effectively render the
proximity detection system
temporarily inoperable
Biases lead to an acceptance of the status quo with respect to recognized
deficiencies in safety and health standards
Biases lead to insufficient review of research findings
Biases lead to a lack of critical assessment of technologies' capabilities
Biases lead regulators to ignore indications of technology immaturity
Biases lead researchers to ignore indications of technology immaturity
Biases result in poorly designed or insufficient experiments
Roof bolting machine noise
controls fail to achieve a
demonstrated reduction in
noise exposure for operators
Effectiveness of intervention was not successfully demonstrated in field trials
under operating conditions
Effective means of isolating workers from hazards through administrative
controls do not exist
Technology increases capital and operating costs
Nature of equipment operation and design limits design of engineering controls
157
Several of the root causes pertain to actions or decisions made by legislators, regulators, and
researchers. Re-organizing the lists of root causes by the relevant group is useful. This is done in
Tables 29 and 30 for the successful and unsuccessful outcomes, respectively. Examining the
tables above, a number of similarities begin to become apparent. Several of the root causes that
contributed to successful outcomes for new safety and health technologies (Tables 27 and 29)
relate to the assessment of technological maturity. It seems to be the case that, in order for the
introduction of a new safety and health technology mandate to be successful, legislators and
regulators need to have an accurate assessment of the capabilities of the technology and an
accurate assessment of the effort that would be required to develop and implement the
technology, as well as a recognition of any uncertainty involved in either of those assessments.
In contrast, several of the root causes that contributed to unsuccessful outcomes (Tables 28 and
30) relate to cognitive biases causing regulators, legislators, and researchers to draw flawed
conclusions about the maturity of a technology or to ignore indications of technological
immaturity.
Other root causes for successful outcomes relate to the success of research to definitively
demonstrate the efficacy of the interventions and to the effective partnership between researchers
and industry to design and deploy interventions in a way that minimizes the impact on mine
operations and/or offers some benefit besides safety and health. Again, by way of contrast, some
of the root causes for unsuccessful outcomes relate to an increased burden on mine operators,
either in the form of increased costs or some hindering of mine operations.
158
Table 29: Root causes for indications of technology mandate success grouped by groups primarily involved
Root causes of
technology success
that pertain
primarily to
legislators
Legislators correctly identified an opportunity for a technology-forcing
mandate to result in the development of new or adaptation of existing
technologies
Legislators correctly identified the need for research to achieve successful
results for technology-forcing mandate
Legislators correctly identified the need for technology research and
development and provided adequate funding to support this effort
Legislators correctly identified uncertainty in the ability of industry to meet the
provisions of a technology-forcing mandate
Legislators correctly identified the need for flexibility in regulations to allow
for technology development
Root causes of
technology success
that pertain
primarily to
regulators
Regulators correctly identified indications of technological immaturity
Regulators correctly identified the need for flexibility in regulations to allow
for technology development
Regulators correctly recognized the need for a combination of engineering and
administrative controls
Regulatory requirement is a written as a performance-based standard
Root causes of
technology success
that pertain
primarily to
researchers
Researchers develop effective partnerships with industry in order to facilitate
the best solutions and to better diffuse research findings into practice
Research agencies correctly identified need for specialized capabilities and
acted to fulfill the need
Effectiveness of intervention was successfully demonstrated in field trials
under operating conditions
During research and development, the impact on mining operations was
considered
Other root causes of
technology success
Technology provides benefits besides safety and health protections
Effective means of isolating workers from hazards through administrative
controls exist
Technology increases capital cost, but does not increase operating cost
159
Table 30: Root causes for indications of technology mandate failure grouped by groups primarily involved
Root causes of
technology failure
that pertain
primarily to
legislators
Biases lead legislators to judge that immediate action is needed
Biases lead legislators to fail to recognize indications of technological
immaturity
Biases lead legislators to judge that immediate action is needed and to ignore
indications of technology immaturity
Root causes of
technology failure
that pertain
primarily to
regulators
Biases lead regulators to judge that immediate action is needed and to ignore
indications of technological immaturity
Biases lead regulators to ignore indications of technology immaturity
Root causes of
technology failure
that pertain
primarily to
researchers
Biases and political pressures lead researchers to understate the seriousness of
issues identified through research
Biases result in insufficient or poorly designed experiments
Biases lead researchers to faulty conclusions despite contradictory data
Biases lead to insufficient or ineffective review of research findings
Limited research and development resources necessitate prioritization of some
technology development and testing efforts over others
Test facilities for performing appropriate experiments were not available
Biases lead researchers to ignore indications of technology immaturity
Effectiveness of intervention was not successfully demonstrated in field trials
under operating conditions
Other root causes of
technology failure
Engineering control improves safety or health only when used in a specific
scenario
Biases lead miners to mistrust interventions
Biases lead to acceptance of status quo despite observed deficiencies
Biases lead to an acceptance of the status quo with respect to recognized
deficiencies in safety and health standards
Biases lead to a lack of critical assessment of technologies' capabilities
Effective means of isolating workers from hazards through administrative
controls do not exist
Technology increases capital and operating costs
Nature of equipment operation and design limits design of engineering
controls
160
The list of root causes for successful outcomes were simplified by combining similar items into
the following ten items:
1. Legislators correctly identified an opportunity for a technology-forcing mandate to result
in the development of new or adaptation of existing technologies
2. Legislators correctly identified the need for research and development to achieve
successful results for a technology-forcing mandate
3. Legislators correctly identified uncertainty in the ability of industry to meet the
provisions of a technology-forcing mandate and permitted flexibility in compliance to
allow for technology development
4. Regulators correctly identified indications of technological immaturity
5. Regulators correctly identified the need for flexibility in regulations to allow for
technology development
6. Regulatory requirements are written as performance-based standards
7. Researchers develop effective partnerships with industry in order to facilitate the best
solutions and to better develop research findings into practical interventions that can be
effectively diffused
8. Research agencies correctly identified need for specialized capabilities and acted to fulfill
the need
9. Effectiveness of intervention was successfully demonstrated in field trials under
operating conditions
10. Interventions can be designed that have minimal impact on mine operations and/or offer
some benefit aside from safety and health protections
161
It is not necessary that all of these be present, but the analysis shows that at least some of these
factors contributed in each of the successful outcomes analyzed. Although not all of these are
applicable to every technology introduction, this analysis shows these factors to contribute to
successful outcomes.
The root causes for unsuccessful outcomes can similarly be simplified to the following eight
items:
1. Biases lead legislators to judge that immediate action is needed and to ignore indications
of technology immaturity
2. Biases lead regulators to judge that immediate action is needed and to ignore indications
of technological immaturity
3. Biases and political pressures lead researchers to ignore or to understate observed
indications of technological immaturity identified through research
4. Despite the best efforts of researchers and developers, effective interventions either
cannot be developed or cannot be demonstrated to be effective due to engineering
challenges or economic constraints
5. Biases lead to an acceptance of the status quo with respect to recognized deficiencies in
safety and health standards or technologies
6. Cultural forces and cognitive biases among miners lead to a mistrust of new interventions
7. Biases result in insufficient or poorly designed experiments
8. Biases result in insufficient or ineffective review of research
162
The presence of one, or even several, or these factors would not guarantee an unsuccessful
outcome for a new safety or health technology mandate, but at least a few of these factors were
present in each of the unsuccessful outcomes analyzed.
These root causes demonstrate the need to find ways of overcoming biases that affect the
decisions made by regulators, researchers, and legislators and to ensure the objectivity of these
groups. These biases can lead to several intermediate outcomes that further contribute to
unsuccessful outcomes, such as:
• Regulators or legislators may fail to confirm that, if successfully implemented, new
standards would achieve a material improvement to safety and health
• Regulators or legislators may fail to implement effective means of checking and
quantifying compliance with a new standard
• Regulators or legislators may act with an unfounded degree of urgency to implement new
mandates without first confirming the readiness of the technology needed to meet the
mandate
• Researchers may overstate the maturity of technologies despite evidence of deficiencies
• Researchers may fail to identify the potential for unintended consequences that can occur
in the operating conditions at the mine
These outcomes can lead to the enactment of rules which mandate the use of technologies that
have not been demonstrated to be effective or that have observed deficiencies; an example of this
is the mandate for refuge alternatives despite observed deficiencies in the chambers. They can
also lead to the certification and use of technologies that are defective and do not meet the intent
or letter of safety and health regulations; an example of this is the continued certification and use
163
of SR-100 SCSRs despite observed deficiencies through the LTFE. Finally, these causes can lead
to the implementation of technologies that, although they perform well and deliver the desired
safety or health benefit, introduce some unintended consequence that diminishes safety in some
other way; an example of this is electromagnetic interference between the personal dust monitor
and proximity detection systems, whereby the introduction of an effective health intervention
caused the unintended consequence of disabling an effective safety intervention.
There is a need to maintain objectivity throughout the process of writing, reviewing, passing, and
enforcing new safety and health mandates as well as throughout the process of researching,
developing, deploying, and using new safety and health technologies. In particular, it is
necessary to actively identify indications of technological immaturity in an objective manner.
When indications of technological immaturity are identified, efforts should be made to improve
the technology, but efforts should also be made to appropriately modify existing or proposed
safety and health regulations or legislation. A means of assessing when a new safety or health
technology has matured to the point that it can proceed in development, diffusion, or regulation
is needed.
In the next chapter, recommendations for how objectivity can be better assured during the
crafting of new safety and health regulations or legislation and during the research and
development of new safety and health interventions will be presented.
164
Chapter 6: Bowtie Analysis of Mandates for Immature
Safety and Health Technologies
The previous chapter presented a series of root cause analyses for several successful and
unsuccessful outcomes for safety and health technology mandates in the mining industry. The
result of each of these analyses was the identification of root causes for the outcome. These root
causes were then compiled and compared to find a set of ten generalized root causes for
successful outcomes and a generalized set of eight root causes for unsuccessful outcomes. The
root causes for the successful outcomes represent desirable conditions to enable and foster the
development and diffusion of effective safety and health technologies whereas the root causes
for the unsuccessful outcomes represent threats to the successful development and diffusion of
effective technologies.
Left unchecked, these threats can lead to the enactment of legislation or regulation that mandates
the use of safety and health technologies that are immature, meaning that these technologies have
not been adequately developed or demonstrated and may lead to undesirable consequences. In
this chapter, bowtie analysis is used to develop recommendations for how mining safety and
health regulatory agencies and research agencies can attempt to avoid the enactment of a
mandate for an immature safety or health technology and, in the event that such a mandate is
enacted, to mitigate the undesirable consequences of the mandate. This bowtie analysis will be
presented in the next section along with general recommendations for mining safety and health
regulatory agencies and research agencies. In Chapter 7, a more detailed discussion of how these
recommendations could be implemented is presented.
165
As was described in Chapter 3, bowtie analysis is a method typically used to systematically
consider the causes and outcomes of some hazardous event and to develop controls to prevent
the causes from leading to the release of the hazard as well as recovery measures to mitigate and
to decrease the severity of the consequences it that hazard is realized. In this study, bowtie
analysis is adapted to develop strategies to prevent the enactment of a safety or health technology
mandate for an immature technology and to mitigate the undesirable consequences of such a
mandate. Rather than performing this analysis for each of the safety and health technologies
considered in Chapters 4 and 5, a generalized case was studied. This simplified the analysis and
also enabled the development of more generalizable conclusions and recommendations. This
bowtie analysis for the generalized case of an immature safety or health technology mandate is
presented here.
6.1 Threats and Outcomes Associated with the Enactment of a
Mandate for an Immature Safety or Health Technology
The threats in this bowtie analysis are the generalized root causes for unsuccessful outcomes for
safety or health technologies in the mining industry, which were identified in Chapter 5 and are
listed below :
Threat 1: Biases lead legislators to judge that immediate action is needed and to ignore
indications of technology immaturity
Threat 2: Biases lead regulators to judge that immediate action is needed and to ignore
indications of technological immaturity
Threat 3: Biases and political pressures lead researchers to ignore or to understate observed
indications of technological immaturity
166
Threat 4: Despite the best efforts of researchers and developers, effective interventions
either cannot be developed or cannot be demonstrated to be effective due to
engineering challenges or economic constraints
Threat 5: Biases lead to an acceptance of the status quo with respect to recognized
deficiencies in safety and health standards or technologies
Threat 6: Cultural forces and cognitive biases among miners lead to a mistrust of new
interventions
Threat 7: Biases result in insufficient or poorly designed experiments
Threat 8: Biases result in insufficient or ineffective review of research
It is important to note that the presence of these root causes is, for the most part, out of the
control of agencies involved in mining safety and health regulation or research. This is clearly
the case for some of the threats (for example, Threat 6). For most of the others, it is less clear
that the regulatory agencies, research agencies, and legislators cannot directly control these
threats. Most of the threats deal with cognitive biases on the part of individuals or groups within
these organizations, so a naïve view might be that these biases can be avoided through objective
thinking. However, biases are an unavoidable part of any human being’s thinking – it is a myth
to say that we can eliminate bias from our thinking. Moreover, these biases can be further
compounded by political forces and interactions within or between agencies. Rather, the key to
avoiding biases is to be vigilant for them in our own thinking as well as in the thinking of others
and to work to correct them when they occur. In organizations, this can be accomplished through
policies such as those for scientific peer-review and proper design of experiments. Since the
threats cannot be directly controlled or eliminated, it is necessary to implement policies which
167
are designed to prevent the presence of these threats from leading to the enactment of a law or
regulation that mandates the use of a safety or health technology that is immature.
In the event that a mandate is enacted for an immature technology, a number of undesirable
outcomes are possible. Examples of these were seen in Chapters 4 and 5 and fall into four
generalized categories:
Consequence 1: Intervention does not achieve the intended safety or health benefit
(An example is the lack of evidence that tracking systems provide a
material safety benefit)
Consequence 2: Intervention causes an unintended, negative safety or health consequence
(An example is the occurrence of electromagnetic interference between
the personal dust monitor and proximity detection systems)
Consequence 3: A device that fails to meet the safety and health standard or is otherwise
defective is certified and used
(An example is the continued certification and use of self-contained self-
rescuers with observed deficiencies)
Consequence 4: Despite effective interventions being available to meet the mandate, there
is sustained strong resistance to their use
(An example is the low adoption rate of noise controls for roof bolting
machines)
Figure 32 shows the threats and consequences for this bowtie analysis.
168
Figure 32: Threats contributing to the enactment of a law or regulation that mandates the use of a safety or health
technology that is immature
Threats Event
C2: Intervention causes an
unintended, negative health or
safety consequence
C4: Despite effective interventions
being available to meet the
mandate, there is sustained strong
resistance to their use
C3: A device that fails to meet the
health and safety standard or is
otherwise defective is certified and
used
C1: Intervention does not achieve
the intended health or safety
benefit
Consequences
Enactment of a
law or regulation
that mandates the
use of a health or
safety technology
that is immature
T1: Biases lead legislators to judge
that immediate action is needed
and to ignore indications of
technology immaturity
T2: Biases lead regulators to judge
that immediate action is needed
and to ignore indications of
technological immaturity
T3: Biases lead researchers to
ignore or to understate observed
indications of technological
immaturity
T7: Biases result in insufficient or
poorly designed experiments
T8: Biases result in insufficient or
ineffective review of research
T5: Biases lead to an acceptance of
the status quo with respect to
recognized deficiencies in safety
and health standards or
technologies
T4: Despite the best efforts of
researchers and developers,
effective interventions either
cannot be developed or cannot be
demonstrated to be effective due to
engineering challenges or
economic constraints
T6: Cultural forces and cognitive
biases among miners lead to a
mistrust of new interventions
169
6.2 Overview of Bowtie Analysis
With these threats and consequences in place, preventative controls can be developed to prevent
the enactment of immature technology mandates and recovery controls can be developed to
mitigate the enactment of such a mandate. A set of recommended controls is shown in Figure 33.
These controls were developed using the knowledge gained through the study of both successful
and unsuccessful safety and health technology outcomes in Chapters 4 and 5 and through
discussion with subject matter experts in the areas of safety and health technology development
and diffusion. Detailed discussion on how the controls shown in the figure is provided in this
chapter. These controls draw on tools such as Technology Readiness Levels (TRL) as discussed
in Chapter 2.
In the following sections, the controls associated with each threat and with each consequence
will be discussed, including a discussion of the rationale for the recommended controls and a
brief description of how these controls could be implemented at mining safety and health
regulatory and research agencies. In Chapter 7, a more detailed discussion of the
recommendations for these organizations is given.
170
Figure 33: Bowtie analysis of the enactment of a law or regulation that mandates the use of a safety or health technology that is immature
T1: Biases lead legislators to
judge that immediate action is
needed and to ignore
indications of technology
immaturity
T2: Biases lead regulators to
judge that immediate action is
needed and to ignore
indications of technological
immaturity
T3: Biases lead researchers to
ignore or to understate
observed indications of
technological immaturity
T7: Biases result in insufficient
or poorly designed experiments
T8: Biases result in insufficient
or ineffective review of
research
T5: Biases lead to an
acceptance of the status quo
with respect to recognized
deficiencies in safety and
health standards or
technologies
T4: Despite the best efforts of
researchers and developers,
effective interventions either
cannot be developed or cannot
be demonstrated to be effective
due to engineering challenges
or economic constraints
T6: Cultural forces and
cognitive biases among miners
lead to a mistrust of new
interventions
Threats Event Preventative Controls
PC2: Research and regulatory
agencies should implement
policies for the effective
communication of science-
based recommendations to
Congress and state legislatures
PC3: During the rulemaking
process, regulatory agencies
should conduct assessments of
technology readiness as part of
the normal technical and
economic feasibility
assessment
PC4: Research and regulatory
agencies should implement
policies to perform technology
readiness assessments and to
publicly report these
assessments in a transparent
manner
PC6: Research agencies
should implement rigorous
policies for meaningful peer-
review of project proposals,
protocols, and publications
PC5: Research and regulatory
agencies should implement
policies to seek engagement
with industry stakeholders
PC1: During legislative
process, assemble
congressional committees to
examine scientific evidence
and technological maturity
C2: Intervention causes an
unintended, negative health or
safety consequence
C4: Despite effective
interventions being available to
meet the mandate, there is
sustained strong resistance to
their use
C3: A device that fails to meet
the health and safety standard
or is otherwise defective is
certified and used
C1: Intervention does not
achieve the intended health or
safety benefit
Consequences Recovery Controls
RC4: Research and regulatory
agencies should implement
policies to seek engagement
with industry stakeholders
RC2: Research and regulatory
agencies should implement
policies to track technology
maturity development
RC1: Regulations should be
designed to allow for discretion
in enforcement
RC3: Agencies responsible for
safety and health product
certification should implement
policies to link product
certification to assessments of
technology maturity
Enactment of a law
or regulation that
mandates the use of
a health or safety
technology that is
immature
171
6.3 Discussion of Controls to Prevent the Enactment of a Mandate
for an Immature Safety or Health Technology
In this section, the left side (the threats and the associated preventative controls) of the bowtie
analysis given in Figure 33 will be discussed. This portion of the bowtie is shown in Figure 34.
In this section, each of the threats and associated preventative controls will be discussed in turn.
Figure 34: Left-hand side of bowtie analysis of the enactment of a law or regulation that mandates the use of a safety
or health technology that is immature, showing threats and preventative controls
T1: Biases lead legislators to judge
that immediate action is needed
and to ignore indications of
technology immaturity
T2: Biases lead regulators to judge
that immediate action is needed
and to ignore indications of
technological immaturity
T3: Biases lead researchers to
ignore or to understate observed
indications of technological
immaturity
T7: Biases result in insufficient or
poorly designed experiments
T8: Biases result in insufficient or
ineffective review of research
T5: Biases lead to an acceptance of
the status quo with respect to
recognized deficiencies in safety
and health standards or
technologies
T4: Despite the best efforts of
researchers and developers,
effective interventions either
cannot be developed or cannot be
demonstrated to be effective due to
engineering challenges or
economic constraints
T6: Cultural forces and cognitive
biases among miners lead to a
mistrust of new interventions
Threats Event Preventative Controls
PC2: Research and regulatory agencies
should implement policies for the
effective communication of science-based
recommendations to Congress and state
legislatures
PC3: During the rulemaking process,
conduct assessments of technology
readiness as part of the normal technical
and economic feasibility assessment
PC4: Research and regulatory agencies
should implement policies to perform
technology readiness assessments and to
publicly report these assessments in a
transparent manner
PC6: Research agencies should
implement rigorous policies for
meaningful peer-review of project
proposals, protocols, and publications
PC5: Research and regulatory agencies
should implement policies to seek
engagement with industry stakeholders
PC1: During legislative process,
assemble congressional committees to
examine scientific evidence and
technological maturity
Enactment of a
law or regulation
that mandates the
use of a health or
safety technology
that is immature
172
6.3.1: (T1) Biases lead legislators to judge that immediate action is needed and
to ignore indications of technology immaturity
The first threat (T1) is that biases may lead legislators to judge that immediate action is needed
and to ignore indications of technology immaturity. This was observed as one of the root causes
in the analyses of the unsuccessful outcomes associated with refuge alternatives and miner
tracking systems. The use of tracking technology was directly mandated by the MINER Act of
2006. The use of refuge alternatives was mandated by MSHA regulation, as directed by the
MINER Act. As was discussed in Section 4.1.1, the MINER Act was passed unusually rapidly
following the Sago Mine disaster and other disasters in 2006; the Sago disaster occurred in
January and by June, the Act had been signed into law. The public discourse following these
disasters, along with the unavoidable biases held by legislators as discussed in Sections 5.1.1 and
5.1.3, led legislators to judge that immediate action was needed to prevent similar disasters from
occurring in the future. With both technologies, there was a lack of evidence to show that the
technologies were mature and ready to be implemented through government mandate.
Nonetheless, these indications of immaturity were ignored.
It is impossible to eliminate the cognitive biases that contribute to legislative actions, such as the
passage of the MINER Act. Rather, the goal should be to prevent these biases from leading to
future mandates for immature safety and health technologies. Figure 35 shows the portion of the
bowtie analysis that is relevant to this threat and gives two possible preventative controls.
173
Figure 35: Partial bowtie analysis of the enactment of a law or regulation that mandates the use of a safety or health
technology that is immature, showing portion associated with Threat 1
The first of these (PC1) is a recommendation to Congress to, during the legislative process, to
assemble congressional committees to examine the scientific evidence relevant to the proposed
legislation and to critically assess the maturity of technologies that are proposed to be mandated.
This is perhaps the most open-ended and imprecise recommendation provided in this dissertation
– it will be up to the individual Senators and Representatives to decide how best to assess the
evidence for any proposed legislation, but a healthy degree of skepticism about new
interventions is advisable.
The second preventative control for this threat (PC2) has to do with how research and regulatory
agencies communicate with Congress about proposed or potential legislation. Specifically, these
agencies should provide science-based recommendations concerning existing as well as potential
new safety and health interventions. These recommendations should not be limited to positive
findings, but should also indicate when there is a lack of evidence and, therefore, a need for
further investigation. In other words, there should be an expectation that the maturity, efficacy,
T1: Biases lead legislators to judge
that immediate action is needed
and to ignore indications of
technology immaturity
Threat Event Preventative Controls
PC2: Research and regulatory agencies
should implement policies for the
effective communication of science-based
recommendations to Congress and state
legislatures
PC1: During legislative process,
assemble congressional committees to
examine scientific evidence and
technological maturity
Enactment of a
law or regulation
that mandates the
use of a health or
safety technology
that is immature
174
and suitability of a new intervention should be demonstrated before any mandate to use the
technology can be issued, and this expectation should be reflected in recommendations provided
by regulatory and research agencies to Congress.
In order for such recommendations to carry weight, it will be necessary for the agencies issuing
them to have an established track record of performing sound scientific research and also of
being authorities on the state of the art for emerging safety and health technologies. When one of
these organizations says that there is not sufficient evidence to support a proposed mandate, it
must be clear that, if such evidence existed, the organization would be aware of it. To make a
conclusive recommendation based on a lack of evidence, it must be possible to convincingly
dismiss the accusation “you just didn’t look hard enough.” The degree to which this accusation
can be convincingly dismissed is a function of how strongly the organization is perceived to be
an authority on emerging safety and health technologies.
To strengthen this perception, regulatory and research agencies should establish policies for the
continual (re)assessment of safety and health technologies in terms of their maturity and their
ability to address safety and health concerns. The use of tools such as technology readiness
assessments or product development lifecycle approaches could be used to do this. These
recommendations are discussed below for the second threat (T2).
175
6.3.2: (T2) Biases lead regulators to judge that immediate action is needed and
to ignore indications of technological immaturity
The second threat (T2) is that biases lead regulators to judge that immediate action is needed and
to ignore indications of technological immaturity. This is very similar to T1 in that those in
regulatory agencies are subject to the same unavoidable cognitive biases that cause flawed
thinking for legislators. These biases can lead to the enactment of regulations that mandate the
use of technologies that are immature, potentially leading to unsuccessful outcomes for these
technology mandates. This was seen in the root causes for the unsuccessful outcomes associated
with refuge alternatives and proximity detection systems, as discussed in Sections 5.1.1 and
5.1.4, respectively. In the case of refuge alternatives, the regulation was driven primarily by the
expectations established by the MINER Act, as was discussed above. For proximity detection
systems, the mandate for the use of this technology (as well as for the personal dust monitors that
were involved in the electromagnetic interference with proximity detection systems) was driven
by MSHA. However, in both cases, there was a lack of compelling evidence to conclude that the
technology was sufficiently mature and appropriate to be mandated.
As was discussed in the relevant sections of Chapter 5, the decision to proceed with regulations
mandating the use of refuge alternatives and proximity detection systems despite a lack
compelling evidence for their maturity can be traced back, in part, to biases on the part of
regulators. These biases are an unavoidable aspect of human thinking, so the focus should not be
on eliminating the biases, but rather on detecting them and preventing them from leading to the
enactment of mandates for immature technologies. The portion of the bowtie analysis which are
relevant to this threat is shown in Figure 36.
176
Figure 36: Partial bowtie analysis of the enactment of a law or regulation that mandates the use of a safety or health
technology that is immature, showing portion associated with Threat 2
Two potential controls have been identified to prevent biases within regulatory agencies from
leading to the enactment of mandates for safety and health technologies that haven’t been
demonstrated to be mature. In contrast to T1, which had to do with biases among legislators and
is largely out of the control of mining safety and health organizations, this threat can be more
directly controlled through the implementation of policy changes within these organizations. The
two preventative controls identified (PC3 and PC4) are recommendations for such policy
changes.
The first (PC3) is the recommendation that during the rulemaking process, regulatory agencies
should conduct assessments of the technology’s readiness as part of the regular technical and
economic feasibility assessment, and the second (PC4) is that both research and regulatory
agencies should regularly perform technology readiness assessments. For any new regulation, a
determination of technical and economic feasibility must be made and must be supported by
documented evidence. As part of the research conducted to make this feasibility determination,
information on the readiness of any technology proposed to be mandated should be collected and
T2: Biases lead regulators to judge
that immediate action is needed
and to ignore indications of
technological immaturity
Threat Event Preventative Controls
PC3: During the rulemaking process,
conduct assessments of technology
readiness as part of the normal technical
and economic feasibility assessment
PC4: Research and regulatory agencies
should implement policies to perform
technology readiness assessments and to
publicly report these assessments in a
transparent manner
Enactment of a
law or regulation
that mandates the
use of a health or
safety technology
that is immature
177
analyzed. The question of feasibility is fundamentally different from the question of technology
maturity, but much of the same information can be used to answer both questions. Since a
significant effort is already expended on the determination of feasibility, it is wise to put in
somewhat more effort to concurrently investigate the readiness of the technology and to make a
complimentary determination of technology readiness. This technology readiness assessment
would be different from the normal feasibility investigation in that the processes and standards of
evidence would be clearly defined for the assignment of a given maturity level. In addition, the
use of a standardized evaluation framework would allow for clearer and more consistent
communication about the how the maturity determination was done and what evidence supports
the determination. Transparency in this process is critically important.
For this recommendation to be effective at mitigating the effects of biases in the regulatory
process, it is clearly necessary to conduct the analysis of technology readiness in a manner that
minimizes the influence of biases. This is accomplished by implementing processes for detecting
biases through objective reviews and established expectations for supporting evidence before
decisions are made. As was discussed in Section 2.4, the Technology Readiness Level (TRL)
scale provides a useful means of performing consistent evaluations of the maturity of
technologies with explicitly stated expectations for supporting evidence. The TRL scale was
developed by NASA [33, 34], and was adopted by the DOD in order to prevent the funding of
high-risk development efforts for emerging technologies with low levels of maturity [35]. The
DOD provides guidance in their Technology Readiness Assessment Deskbook on how the TRL
scale can be used in a structured way to manage the progression of technology research and
development efforts [36, 37].
178
Other tools, such as the Technology Readiness Level Calculator (TRLC) [41], the Technology
Program Management Model (TPMM) [42], and Technology Readiness Assessment guides [43,
37] have been developed by the DOD, DOE, and other organizations as ways of managing the
development of technologies through the TRL stages. In the private sector, many companies
employ similar methods to assess the maturity of their products and to manage the progression of
R&D efforts. The Product Development Lifecycle (PDLC) is a framework for managing all
aspects of product development and evaluation through all phases of technology maturity, from
conceptual stages through diffusion and marketing.
The PDLC framework is most applicable to situations where the entire product development is
under the direct control of the company or organization developing the technology. As such, it
has more limited applicability in situations where technologies are being developed through
more distributed means as would be the case for most safety and health technologies that would
be mandated for use in the mining industry. In other words, since the agencies mandating the use
of these technologies isn’t solely responsible for the decisions made during the technologies
development, the PDLC framework may not be entirely appropriate. However, lessons from this
approach can be useful nonetheless.
Namely, it is advisable to utilize a systematic approach to assessing and managing the
development of a technology even in the case that the development is not entirely under the
control of the organization conducting the assessment or driving the development. Under a
PDLC framework or under any of the frameworks for managing the funding of technology
development based on TRLs (e.g. the TPMM), decisions are managed in a structured way with
defined responsibilities for those involved in making the decisions and clear expectations for the
type of supporting evidence that is needed at each decision point. Suggestions on how such a
179
system might be implemented for mining safety and health research and regulatory agencies are
provided in Chapter 7.
Regardless of the details of how these tools might be used to manage key decisions in the
research and regulation of safety and health interventions, the use of tools based on TRL has
important advantages as were discussed in Chapter 2. The key advantages are that these tools
provide a common language with which the technology status can be clearly communicated, they
give a means of recognizing and managing risks associated with technology transition, and they
give a largely objective measure that can be used to make decisions concerning research funding,
acquisition, and most significantly here, regulation. NASA and DOD studies have quantified the
economic benefits of these tools [44, 45], and the analysis presented in Chapter 5 on the root
causes of unsuccessful outcomes for safety and health technology mandates shows the less
quantifiable risks associated with not using these tools.
6.3.3: (T3) Biases and political pressures lead researchers to ignore or to
understate observed indications of technological immaturity
The third threat (T3) is that biases amongst safety and health researchers in the mining
community may lead these researchers to ignore or understate observed indications of
technological immaturity. This was identified in the causal tree analyses for the unsuccessful
outcomes associated with refuge alternatives, SCSRs, and proximity detection, although it likely
plays a role in other cases as well. In the case of refuge alternatives, researchers saw in testing
that the chambers exhibited significant deficiencies, and, although these deficiencies were
publicly reported to Congress, the conclusions of this report stated that “the benefits of refuge
alternatives and the general specification of these alternatives are sufficiently known to merit
180
their commercialization and deployment in underground coal mines.” With SCSRs, researchers
repeatedly identified deficiencies with CSE SR100 SCSR units during LTFE testing that spanned
nearly two decades. Again, these deficiencies were publicly reported; however, the seriousness
of these deficiencies was either not recognized or was understated in the conclusions of these
reports, and the units continued to be certified and used. In the case of proximity detection,
researchers were told by mine operators that there were performance problems with proximity
detection systems that could potentially be attributed to electromagnetic interference, but these
claims were dismissed by the researchers and a rigorous study of EMI between personal dust
monitors and proximity detection systems was not conducted until after both technologies had
been mandated. Again, it is likely that the biases that contributed to these outcomes also played a
role in similar cases and these cases simply were not captured in this analysis due to a lack of
documented evidence.
The portion of the bowtie analysis associated with this threat is shown in Figure 37 and provides
one suggested preventative control (PC4), which is the same control as was discussed above for
T2, namely to implement policies within research agencies to perform technology readiness
assessments. In each of the three examples discussed for this threat, researchers made a
determination that the technologies were mature and ready for widespread use in the industry.
For refuge alternatives and SCSRs, this determination was explicit in recommendations to
Congress or in the continued certification of products for use. For proximity detection systems,
the determination was implicit in the lack of action to investigate reported performance issues.
181
Figure 37: Partial bowtie analysis of the enactment of a law or regulation that mandates the use of a safety or health
technology that is immature, showing portion associated with Threat 3
In all three cases, if a policy had been in place that established a structured framework for
determining the maturity of safety and health interventions with clearly defined expectations for
supporting evidence, it is unlikely that the research that had been conducted would have
supported a determination that the technologies were mature enough to merit a mandate for their
use. In Chapter 7, suggestions on how such a policy might be implemented are provided.
6.3.4: (T4) Despite the best efforts of researchers and developers, effective
interventions either cannot be developed or cannot be demonstrated to
be effective due to engineering challenges or economic constraints
The fourth threat (T4) is that despite their best efforts, it is sometimes not possible for
researchers and technology developers to develop and demonstrate an effective engineering
solution to a safety or health problem. This can be due to significant engineering challenges, as
was seen in the case of noise controls for roof bolters, or due to economic constraints, including
the constraint of limited resources to conduct research, as was seen in the case of tracking
systems.
T3: Biases lead researchers to
ignore or to understate observed
indications of technological
immaturity
Threat Event Preventative Control
PC4: Research and regulatory agencies
should implement policies to perform
technology readiness assessments and to
publicly report these assessments in a
transparent manner
Enactment of a
law or regulation
that mandates the
use of a health or
safety technology
that is immature
182
As was discussed in Section 5.2.2, despite cooperative research and development efforts between
NIOSH researchers and equipment manufacturers, the drill chuck isolator, the drill bit enclosure,
and other noise controls for roof bolters were never successfully demonstrated to be effective
under operating conditions. As a result, these interventions were never listed as feasible in the
MSHA PIB and were never widely adopted by the industry. In a sense, this can be considered a
success of the mechanisms that were in place through the expectations established by MSHA
enforcement policies that a successful demonstration under operating conditions must first be
completed before an intervention could be considered to be feasible. It also showcases the harsh
reality that, despite well designed research and despite strong partnership between researchers
and product developers, it is still sometimes the case that an effective engineering solution will
simply not be found.
In contrast, the failure of researchers to produce compelling evidence that miner tracking systems
provide a material improvement to post-disaster safety can largely be attributed to a lack of
concerted research in this area. As was discussed in Section 5.1.3, although NIOSH had been
mandated by the MINER Act to conduct research on communications and tracking systems, the
bulk of that research was on communications and little was done on tracking. This was a
decision made under the economic and practical constraints of limited resources, facilities, and
personnel as well as in the presence of competing research focuses such as refuge alternatives
and proximity detection, for which regulatory mandates were concurrently being enacted. Again,
this highlights a harsh reality that, even when a safety or health problem is well appreciated, it
may be difficult to properly address the problem through research due to economic constraints.
In Figure 38, the portion of the bowtie analysis that is relevant to this threat is given and includes
one suggested preventative control, which again is PC4 as was discussed for the previous two
183
threats: Research and regulatory agencies should implement policies to perform technology
readiness assessments and to publicly report these assessments in a transparent manner. In this
case, it may be less clear how the use of these tools could prevent the enactment of a law or
regulation mandating the use of a technology that is immature. By assessing maturity in the early
stages of technology development as well as throughout the later stages, it will be possible to
better detect cases where there are indications that a technology is unlikely to be successful or
cases where there is a lack of sufficient evidence to conclude that the technology will be
successful. In addition, the information provided by these tools will help to make prioritization
decisions regarding the allocation of resources and the development of infrastructure or
expertise. By identifying which technologies represent lower risk development efforts, research
funding decisions can be based on an analysis of expected impact on safety and health issues. In
order to make this possible, it is necessary to continually assess the maturity of technologies that
are either being researched or that are being considered for research. Specific suggestions on
how a policy to use tools based on TRA or PDLC are given in Chapter 7.
Figure 38: Partial bowtie analysis of the enactment of a law or regulation that mandates the use of a safety or health
technology that is immature, showing portion associated with Threat 4
T4: Despite the best efforts of
researchers and developers,
effective interventions either
cannot be developed or cannot be
demonstrated to be effective due to
engineering challenges or
economic constraints
Threat Event Preventative Control
PC4: Research and regulatory agencies
should implement policies to perform
technology readiness assessments and to
publicly report these assessments in a
transparent manner
Enactment of a
law or regulation
that mandates the
use of a health or
safety technology
that is immature
184
6.3.5: (T5) Biases lead to an acceptance of the status quo with respect to
recognized deficiencies in safety and health standards or technologies
The next threat (T5) is that biases can lead to an acceptance of the status quo with respect to
recognized deficiencies in safety and health technologies or standards. Examples of this are
discussed in the causal tree analyses for the unsuccessful outcomes associated with SCSRs and
proximity detection systems as discussed in Chapter 5.
With SCSRs, there were indications that the existing SCSR technologies were insufficient. In
particular, at disasters like Sago, miners had difficulty starting the units, had difficulty breathing
once the units were started, and had to remove the units in order to talk. Despite this, no action
has been taken to institute new standards for the design or functionality of SCSRs, due, at least in
part, to an acceptance of the status quo with respect to these apparent deficiencies.
The unsuccessful outcome analyzed for proximity detection systems, namely the occurrence of
EMI between the personal dust monitor and proximity detection systems, also shows a scenario
where the status quo was accepted with respect to existing safety and health standards or
technology. Standards designed to prevent EMI, including the allocation of the RF spectrum and
design standards for electromagnetic compatibility, do not apply to the underground mining
industry. This is certainly not because there has never been anyone in the mining community that
recognized the potential for EMI. This potential has long been understood, but this has not
resulted in action to implement changes to standards through regulation. Again, it is reasonable
to conclude that this is due, in part, to an acceptance of the status quo regarding the safety of
electronic devices in underground mines.
The portion of the bowtie analysis that is relevant to this threat is shown in Figure 39, and two
suggestions for preventative controls are given.
185
Figure 39: Partial bowtie analysis of the enactment of a law or regulation that mandates the use of a safety or health
technology that is immature, showing portion associated with Threat 5
The first (PC4) has already been discussed for the previous three threats and is to implement
policies to conduct assessments of technology readiness. By prompting the continual assessment
of the maturity of technologies in use in the mining industry, such policies would help to identify
deficiencies with existing standards or technologies earlier, and by explicitly stating clear
expectations for supporting evidence in order to justify a determination that a technology is
mature, these policies would force the discussion of the appropriateness and sufficiency of
existing standards. In addition, by assessing the readiness of technologies not yet in use in the
mining industry, opportunities might be identified for improvements to the status quo using
technologies or applicable standards from other industries. And a structured approach to the
decisions made using these assessments would again force the discussion of whether existing
changes are needed.
The second preventative control (P5) is that policies should be implemented within research and
regulatory agencies to seek engagement with industry stakeholders. Arguably, this is something
that the mining regulatory and research organizations already do well – seeking input from and
T5: Biases lead to an acceptance of
the status quo with respect to
recognized deficiencies in safety
and health standards or
technologies
Threat Event Preventative Controls
PC4: Research and regulatory agencies
should implement policies to perform
technology readiness assessments and to
publicly report these assessments in a
transparent manner
PC5: Research and regulatory agencies
should implement policies to seek
engagement with industry stakeholders
Enactment of a
law or regulation
that mandates the
use of a health or
safety technology
that is immature
186
engaging with the mining community. The small size of the industry makes it somewhat easier to
maintain this engagement. In addition, the high level of industry oversight (frequent and rigorous
government inspections and strict requirements for reportable incidents) give a strong incentive
for mine operators and other stakeholders to engage with the regulatory process. This incentive is
also strengthened by the unique nature of mining safety and health regulations, which are
focused on the limited jurisdiction of mining. Finally, the historical and ongoing influence of
labor organizations and lobbying groups in the mining industry create opportunities and
incentives for engagement and cooperation.
On the other hand, it could be argued that there are gaps in the level of engagement between
government agencies and the mining community, as demonstrated in cases that were analyzed in
this research. Regardless of whether current relationships between government agencies and
members of the mining community are strong or not, it is always worth further strengthening
those relationships. To do so, policies can be implemented that encourage, empower, and
incentivize employees of the agencies to more effectively engage with the stakeholders.
At a minimum, this would include making collaboration and partnering a priority in agency
strategic documents and communicating the importance of these values to employees. To enable
employees to fulfill this directive, competencies related to collaboration and partnering should be
developed. This can be done through training and other professional development activities.
Cascading personnel performance plan elements should be used to reinforce the importance of
these competencies and to put concrete plans in place for them. In addition to conventional
classroom training, other tools for developing these competencies can include mentoring,
coaching, and job shadowing.
187
Beyond training, policies to enable effective engagement with the industry can include the
organization of workshops, partnership meetings, webinars, and other opportunities for meetings
with as broad a cross-section of the mining community as possible. Meetings which bring
together researchers, regulatory representatives, mine operators, equipment manufacturers, labor
organizations, professional organizations, and other groups are critically important to the success
of efforts to foster engagement between the government and industry. There are several
requirements with which the organization of these meetings must comply, including those of the
Paperwork Reduction Act (PRA), which limits the administrative burden that the government
can place on the public, the Federal Advisory Committee Act (FACA), which governs the
formation and operation of advisory committees to direct the strategic planning of government
activities, and the Administrative Procedure Act (APA), which governs the process of
rulemaking. Within the constraints of these legal requirements, agencies should seek out and
create opportunities to bring the mining community together through meetings.
Finally, means of incentivizing industry engagement should be used. This can be accomplished
by writing goals related to engagement into employees’ performance plans and by rewarding
effective collaboration through performance awards and other means of formal recognition. In
addition to these formal means of formal recognition and incentives, creative ways of
incentivizing employees and to create a culture in which partnering is valued should be found.
Investment in fostering these relationships will pay dividends in that the safety and health needs
and opportunities in the industry will be better understood.
188
6.3.6: (T6) Cultural forces and cognitive biases among miners lead to a
mistrust of new interventions
The next threat (T6) is related to T5 in that it could be addressed through better engagement with
the mining community. This is the threat that cultural forces and cognitive biases within the
community lead to a mistrust of new interventions. It should be no surprise that people are, to
varying degrees, resistant to change. There are significant barriers to the adoption of new
technology in the mining industry that contribute to this resistance to change, including barriers
to entry imposed by the small size of the industry and by regulatory standards such as
permissibility requirements. But it can also be attributed to an apparent culture of resistance to
and mistrust of new safety and health interventions. It should also be noted that this resistance
can be justified in many situations. Past situations, such as the cases studied in this research, in
which a new technology failed to achieve its intended safety or health benefit or created some
new hazard have occurred. These situation clearly give miners sufficient justification to be
skeptical of future interventions.
The portion of the bowtie analysis related to this threat is shown in Figure 40, and one
preventative control is given. This preventative control (PC5) has already been discussed above
and is to implement policies to improve engagement with the mining community. By doing so by
the methods described above, it will be possible to influence the mistrust many have in new
189
interventions by earning trust and by ensuring that their needs are addressed.
Figure 40: Partial bowtie analysis of the enactment of a law or regulation that mandates the use of a safety or health
technology that is immature, showing portion associated with Threat 6
6.3.7: (T7) Biases result in insufficient or poorly designed experiments and
(T8) Biases result in insufficient or ineffective review of research
The final two threats (T7 and T8) are closely related, are addressed by the same preventative
controls, and will be discussed here together. T7 is the threat that biases amongst researchers
lead to insufficient or poorly designed experiments, and T8 is the threat that biases amongst
those responsible for reviewing research will lead to insufficient or ineffective review. It should
be noted that sometimes it may be prohibitively difficult or even impossible to conduct properly
designed experiments due to a lack of needed cooperation. For example, if researchers do not
have access to a mine in which to conduct experiments, those experiments will not be conducted.
Similarly, it is possible that the vendor of a safety or health technology may seek to impede
research on their product by preventing researchers from obtaining the product to test.
These barriers aside, there are also cases in which researchers have access to the resources and
cooperation they need to conduct a proper experiment, but fail to do so. This was observed most
notably in the analyses of unsuccessful outcomes for SCSRs (Section 5.1.2) and for proximity
detection systems (Section 5.1.4). In the case of SCSRs, the testing conducted through the LTFE
T6: Cultural forces and cognitive
biases among miners lead to a
mistrust of new interventions
Threat Event Preventative Control
PC5: Research and regulatory agencies
should implement policies to seek
engagement with industry stakeholders
Enactment of a
law or regulation
that mandates the
use of a health or
safety technology
that is immature
190
was insufficient to conclusively implicate quality control issues in the observed failures. As a
result, the results of the studies were left up to interpretation, and the conclusions were thus more
susceptible to being influenced by the cognitive biases of the researchers. Similarly, experiments
evaluating the performance of proximity detection systems failed to identify the possibility for
electromagnetic interference affecting the performance of the system. In this case, experiments
simply were not conducted to test for this possibility, which shows the biases of researchers who
decided that such experiments were not necessary.
The fault for these unsuccessful outcomes cannot be laid entirely at the feet of the researchers
directly responsible for conducting the experiments. Good science depends on proper peer-
review to overcome and counteract biases among researchers. At research organizations, policies
must be in place to ensure that research is being properly reviewed by appropriately qualified
and objective experts. Without well-defined policies for scientific review, these reviews are left
up to the judgement and discretion of the researchers and their management. Biases can
influence the decisions of either of these groups, leading to insufficient reviews. Thus, well-
defined and consistently-applied policies and procedures for review are needed. The
implementation of such policies is the last preventative control (PC6) recommended in this
dissertation and is shown in the relevant portions of the bowtie analysis in Figure 41 and Figure
42.
191
Figure 41: Partial bowtie analysis of the enactment of a law or regulation that mandates the use of a safety or health
technology that is immature, showing portion associated with Threat 7
Figure 42: Partial bowtie analysis of the enactment of a law or regulation that mandates the use of a safety or health
technology that is immature, showing portion associated with Threat 8
While peer-review is an integral part of any research process and policies for peer-review are
already in place at federal research agencies, there are opportunities to improve these policies. Of
critical importance to the effectiveness of peer-review is the independence of the review.
Whenever practical, blind reviews should be performed such that the researchers do not know
who is reviewing their work and the reviewers do not know whose work they are reviewing. This
helps to prevent conflicts of interest and subconscious biases from affecting the outcome of the
T7: Biases result in insufficient or
poorly designed experiments
Threat Event Preventative Control
PC6: Research agencies should
implement rigorous policies for
meaningful peer-review of project
proposals, protocols, and publications
Enactment of a
law or regulation
that mandates the
use of a health or
safety technology
that is immature
T8: Biases result in insufficient or
ineffective review of research
Threat Event Preventative Control
PC6: Research agencies should
implement rigorous policies for
meaningful peer-review of project
proposals, protocols, and publications
Enactment of a
law or regulation
that mandates the
use of a health or
safety technology
that is immature
192
reviews. In addition, it is important to have oversight of the peer-review process incorporated
into the policy. It is necessary to assign responsibility to someone within the research agency to
check that reviewer comments have been appropriately addressed. Ideally, the person responsible
for this oversight task would be independent from the researchers’ normal chain of command,
but would be given the authority to halt research or dissemination activities that did not meet the
standards of scientific excellence and integrity.
There are several stages in the research process where oversight and review is important, and
there are several ways in which these stages can be delineated. For the purpose of this discussion,
a five-stage process for research is used, consisting of: (1) Project concept development, (2)
Project proposal and planning, (3) Design of experimental protocols, (4) Conduct of experiments
and analysis of results, and (5) Dissemination of results. This process is not necessarily a linear
progression through the stages. It is possible that the stages overlap and that the stages are re-
visited in an iterative process throughout the life of a research effort. At each stage, appropriate
and effect oversight and review is needed. This five-stage process, along with a brief statement
of the objective of review at each stage, is shown in Figure 43. This process is described for
intramural research (research conducted directly by the organization, as opposed to extramural
research, which is funded and overseen by the organization), but the expectations for effective
review in both intramural and extramural research should be consistent.
193
Figure 43: Five-stage process of research and reviews associated with each stage
Project concept development – At the earliest stage of a research effort, researchers will develop
a concept for a research project. The development of this concept should be informed by a
review of the research literature to identify research gaps as well as to identify opportunities
from innovation, an analysis of available injury and illness surveillance data to identify safety
and health needs, and engagement with mining stakeholders to understand the safety and health
challenges they face as well as the burden and impact that might result from the implementation
of a new intervention. At this stage, reviews should probe whether the project concept is justified
based on documented evidence of the need for the research, and the burden and impact that is
expected to be achieved through the successful completion of the research. These reviews can be
effectively conducted internally to the research organization – appropriate experts within the
Project concept development
Reviews should confirm that research concept is justified by a clear health or safety need, burden, and impact
Project proposal and planning
Reviews should confirm that the project plan is sound and that needed expertise, resources, and facilities are available
Design of experimental protocols
Reviews should confirm that experiments are designed in a scientifically valid and ethical way
Conduct of experiments and analysis of results
Reviews should confirm that established protocols are being followed and that adjustments to these protocols are valid
Dissemination of results
Reviews should confirm that publications, presentations, and other products present sound results and conclusions
194
organization should scrutinize the justification for the research project, and senior management
should make a decision on whether the concept should advance to the next stage.
Project proposal and planning – Once a determination has been made that a project concept is
justified, a project proposal must be written. This proposal should comprehensively document
the burden, need, and impact identified in the previous stage through literature review,
surveillance data analysis, and stakeholder engagement and should detail a plan of how the
research will be conducted, including descriptions of methods, analysis, and plans for
dissemination of results. The proposal should also state the availability of the expertise,
resources, equipment, and facilities needed to successfully complete the research.
For reviews, this is likely the most critical stage of the research process. The decision of whether
to commence a research project should be based on an objective assessment that the project is
likely to be successful, and that, if successful, the project is likely to address a safety or health
need. Reviews at this stage should include both internal and external peer-reviews. Experts from
outside the research organization should be sought out for their expertise for these reviews. To
the extent possible, the reviews should be conducted as blind reviews, with neither the reviewer
nor the researcher knowing who the other is. The number of reviews needed and the type of
expertise needed to conduct the reviews will vary, but procedures for these reviews should be
well documented and consistently applied to all project proposals.
Design of experimental protocols – Protocols for the conduct of experiments should, ideally, be
designed during the project proposal stage. However, due to the exploratory and adaptive nature
of research, it is often not possible at the outset of a research project to completely plan every
experiment that will be completed during the course of the project. Hence, protocols are often
195
written throughout the course of a research project. These protocols can be for tests to be
conducted in laboratory settings or for tests to be conducted in the field at a cooperating mine
site. In either case, the protocol should thoroughly explain the motivation and justification for the
experiment as well as explaining methods to be used for data collection, data processing, data
analysis, data storage and sharing, and dissemination of results. In addition, protocols should also
discuss ethical considerations, including how the safety of researchers and, if applicable, human
subject will be protected. Protocols should also provide a review of relevant literature regarding
research methods and should utilize appropriate statistical and analytical methods to ensure that
supportable conclusions are reached.
The review of research protocols should be focused on ensuring the quality of the science and the
adherence to standards of scientific integrity. In the case of experiments involving human or
animal subjects, review by an Institutional Review Board (IRB) should be conducted to ensure
the protection of these subjects. Government research must also comply with laws limiting the
burden that can be placed on the public; for research involving surveys or interviews with
members of the public, this includes complying with the requirements of the PRA. Under the
PRA, government researchers must obtain approval from the Office of Management and Budget
(OMB) for any such study that collects information from ten (10) or more members of the
public. The processes for obtaining IRB and OMB approvals already represent effective
mechanisms for providing review of scientific research protocols.
Regardless of whether IRB or OMB approval is needed, research organizations should ensure
that appropriate peer-review of all research protocols is conducted. This can include both internal
and external review and should include reviews from individuals with all applicable areas of
expertise, including statistics and design of experiments, research ethics, and whatever technical
196
area the protocol concerns. Procedures for obtaining protocol reviews should be consistently
applied to all research activities, and policies should be in place to prohibit the conduct of any
research activities not approved through the designated processes.
Conduct of experiments and analysis of results – If the review of the project concept has
confirmed the justification for the research, if the review of the project proposal has confirmed
the soundness of the research plan and the likelihood of successful, impactful results, and if the
review of research protocols has confirmed that experiments are being conducted using
scientifically and ethically appropriate methods, then minimal review of the actual conduct of the
research should be needed. However, oversight should be in place to ensure that projects proceed
according to the approved project proposal and that experiments are conducted according to
approved research protocols. Policies should be in place to monitor the progress of projects
through regular quarterly, semi-annual, or annual project reviews. The focus of these project
reviews should be to confirm that research is proceeding only according to approved plans.
Minor adjustments to the approved plans (for example, changes in personnel or timelines) are to
be expected, but if substantial adjustments to the approved plans are needed (for example,
fundamental changes to research methods or the addition of new major research tasks), the
appropriate stages of review should be re-visited – either a re-review of the project protocol or a
re-review of relevant research protocols.
Dissemination of results – Following the completion of an experiment or of a research project,
results and conclusions are typically disseminated through government-issued technical papers,
peer-reviewed journal articles, conference papers, and presentations. Research can also be
disseminated through less conventional means such as workshops, webinars, or software
applications. However research is disseminated, it is important that the products be sufficiently
197
reviewed to ensure that they contain valid scientific methods, appropriate analysis, and
conclusions that are supported by the evidence.
For official government statements or documents, rigorous reviews are required, and in the case
of peer-reviewed journal articles, the journal will administer its own review process. However,
research organizations should not rely on these mechanisms to guarantee the quality of research
dissemination products. Consistently applied review practices should be used for all products.
Even for non-peer-reviewed products, such as conference papers or presentations, organizations
should, at a minimum, internally review the products prior to publication and should consider
whether a more rigorous external review is appropriate.
A final thought on the review of research is that, while established and consistently applied
processes for review are important, the culture of the organization with regard to review is also
important. Valuing peer-review should be part of the culture at a research organization, and
researchers should be encouraged to seek out review for their own research as well as to provide
review of others’ research. It is human nature to be uncomfortable with having our work
criticized or our objectivity questioned, but for science to have value, it must be backed by
rigorous and critical peer-review. It is challenging to overcome people’s resistance to criticism
and to get them to value critical review, but if a culture that values review can be created, the
validity and impact of the research will be strengthened. Efforts to instill this culture should be a
priority for any organization where research is conducted.
198
6.4 Discussion of Controls to Mitigate the Enactment of a Mandate
for an Immature Safety or Health Technology
In the previous section, a number of preventative controls were suggested that could help to
prevent the enactment of a regulation or legislation mandating the use of a safety or health
technology that is immature, which represents the left half of the bowtie analysis given in Figure
33. In this section, the right half of the bowtie analysis will be discussed and a number of
recovery controls will be presented that could help to mitigate negative consequences associated
with the enactment of a law or regulation mandating the use of an immature safety or health
technology. The relevant portion of the bowtie analysis is shown in Figure 44.
Figure 44: Right-hand side of bowtie analysis of the enactment of a law or regulation that mandates the use of a
safety or health technology that is immature, showing consequences and recovery controls
On the left side of this figure is the event which corresponds with the middle of the bowtie: the
enactment of a law or regulation mandating an immature technology. On the right side of the
Event
C2: Intervention causes an
unintended, negative health or
safety consequence
C4: Despite effective interventions
being available to meet the
mandate, there is sustained strong
resistance to their use
C3: A device that fails to meet the
health and safety standard or is
otherwise defective is certified and
used
C1: Intervention does not achieve
the intended health or safety
benefit
Consequences
Enactment of a
law or regulation
that mandates the
use of a health or
safety technology
that is immature
Recovery Controls
RC4: Research and regulatory
agencies should implement policies
to seek engagement with industry
stakeholders
RC2: Research and regulatory
agencies should implement policies
to track technology maturity
development
RC1: Regulations should be
designed to allow for discretion in
enforcement
RC3: Agencies responsible for
safety and health product
certification should implement
policies to link product
199
figure, are the negative consequences that can occur as a result of the enactment of such a
mandate. Whereas the threats used in the previous section were derived from the root causes for
unsuccessful outcomes of safety and health technology mandates obtained through the causal
tree analyses presented in Chapter 5, the consequences used in this section are generalizations of
the unsuccessful outcomes themselves. Between the event and the consequences on the bowtie
analysis are the recovery controls – strategies that can be used to help mitigate the impact of the
event and to decrease the likelihood that it will lead to the negative consequences.
In the following, each of the consequences will be discussed in turn, along with the associated
recovery controls.
6.4.1: (C1) Intervention does not achieve the intended safety or health benefit
The first negative consequence (C1) that could occur is that the mandated intervention might not
achieve the safety or health benefit that it is intended to achieve. Two examples in which this
might be the case are with refuge alternatives and tracking systems.
As was discussed in Section 5.1.1, at the time the RA regulation was passed and continuing to
today, there are many unanswered questions about the safety of RAs with regard to heat and
humidity buildup, the explosion resistance of components, the ingress of harmful gases, and
post-accident communications with the surface. Until a disaster occurs that necessitates their use,
it will be impossible to conclusively say whether the design of RAs is sufficient to protect the
lives of miners. However, the lingering questions with this technology merit concern.
200
Similarly, questions remain around whether tracking systems provide a material improvement to
safety during a post-disaster escape or rescue. While it is known that tracking systems provide a
level of functionality, there is not sufficient evidence to conclude that the use of these systems
will provide the information needed to substantially increase the likelihood of successful escape
or rescue following a disaster. As with RAs, the true safety value of these systems will not be
known until a disaster necessitates their use, but the questions are cause for concern.
The portion of the bowtie analysis that is relevant to this consequence is shown in Figure 45,
which suggests two recovery controls.
Figure 45: Partial bowtie analysis of the enactment of a law or regulation that mandates the use of a safety or health
technology that is immature, showing portion associated with Consequence 1
The first recovery control (RC1) is that, where appropriate, regulations should be designed to
allow for discretion in enforcement. This recommendation is drawn from a lesson learned in the
causal tree analysis of the successful outcome for communications systems given in Section
5.1.3. With communications systems, MSHA recognized that the available systems could not
meet the letter of the MINER Act mandate for fully wireless communications between
underground and surface. The MINER Act contained a clause allowing for discretion in the
Event
C1: Intervention does not achieve
the intended health or safety
benefit
Consequence
Enactment of a
law or regulation
that mandates the
use of a health or
safety technology
that is immature
Recovery Controls
RC2: Research and regulatory
agencies should implement policies
to track technology maturity
development
RC1: Regulations should be
designed to allow for discretion in
enforcement
201
enforcement of this mandate by allowing for alternatives to a fully wireless system that
“approximate, as closely as possible, the degree of functional utility and safety protection
provided by the wireless two-way medium.” With communications systems, MSHA utilized this
discretion by issuing guidance on the use and enforcement of partially wireless communications
system. If appropriate, similar flexibility should be written into future regulations to permit the
enforcement of the regulation to be adaptable to the state of the technology.
As technology advances and as the nature of mining evolves, the enforcement of regulations
should adapt. To do this, it is necessary for regulatory requirements to allow for discretion and
flexibility on the part of the enforcement agency. It should be noted that this does not mean that
the discretion should be in the hands of individual investigators or individual district offices.
Rather, if a change in enforcement is needed and is permitted by the language of the regulation
or law, a policy change should be published and consistently enforced. With this flexibility, if a
situation occurs in which a mandated safety or health technology is suspected to be immature,
the enforcement of the mandate can be adjusted.
The second recovery control suggested (RC2) is that research and regulatory agencies should
implement policies to track technology maturity development for mandated, as well as emerging,
safety and health technologies. Presumably, by the time a technology is mandated, a
determination will have been made, either justifiably or not, that the technology is mature or that
it can be developed to maturity to satisfy the mandate. Once a rule is issued this question should
not be considered settled. Rather, the question of maturity should be revisited and tracked
throughout the development and diffusion of the technology.
202
For voluntarily-adopted technologies, adoption will follow an S-shaped curve as was discussed
in Chapter 2, with few early adopters, followed by a more rapid increase in adoption as others
see the benefits, and finally a slowdown in adoption as some of those who were resistant to the
new innovation gradually become late adopters. In the case of mandated technologies, adoption
rates are not organically determined in this manner; rather, adoption is driven by compliance
deadlines and enforcement, with even those who are resistant to the change being forced to adopt
the technology. This will result in more rapid adoption by a non-self-selecting user group, which
will provide a trial by fire for the technology under a wide variety of operating environments and
use conditions. As a result, the clearest picture of the technology’s readiness can often come
after the mandate for its use has been implemented.
For this reason, the period following the enactment and initial enforcement of a technology
mandate is a critical time to assess the success of the technology. As mine operators begin to use
the technology, they should be approached and encouraged to share their experiences and views.
Tests of the intervention’s performance under a wide variety of real operating conditions should
be conducted in as objective and quantifiable a manner possible, using appropriately designed
research protocols. The actual burden of the intervention’s use, both economically and
practically, on the mining industry should be assessed, both through the gathering of stakeholder
feedback and through objectively quantifiable means. All of this information should be utilized
in evaluating the maturity of the technology and in identifying areas where improvements are
needed. Tools based on TRL can be used for this, and a more detailed discussion on the use of
these tools is given in Chapter 7.
203
6.4.2: (C2) Intervention causes an unintended, negative safety or health
consequence
The second potential negative consequence (C2) of the enactment of a mandate for an immature
safety or health technology is that the deployment of the intervention may result in some
unintended negative impact on safety or health. An example of this was observed with the EMI
occurrence between personal dust monitors and proximity detection systems. Both devices
function correctly in that, under most circumstances, they achieve the intended safety or health
impact (i.e., reducing dust exposure and reducing the risk of striking/pinning accidents).
However, when the two devices are used together and are worn close to each other on a miner’s
belt, the unintended consequences of EMI occurs, effectively rendering the proximity detection
system inoperable. It is conceivable that, if a miner had come to expect the proximity detection
system to stop the motion of the machine when they got too close, that this could create a
scenario that is more hazardous than the situation without a proximity detection system installed
at all. This is one example of an unintended consequence of the introduction of a safety
intervention, but many other scenarios where the introduction of an intervention designed to
increase safety could, in fact, decrease safety in unexpected ways.
The relevant portion of the bowtie analysis related to this consequence, and the associated
recovery controls, is shown in Figure 46. The two recovery controls (RC1 and RC2) suggested
here for C2 are identical to those suggested for C1 in Figure 45. As with an intervention that fails
to deliver the intended safety or health benefit, the fallout from an intervention that delivers the
intended benefit but also creates some other unintended negative consequence could be mitigated
by allowing for discretion and adaptability in the enforcement of the mandate as well as by
continually tracking the maturity of the technology to identify and correct shortcomings.
204
Figure 46: Partial bowtie analysis of the enactment of a law or regulation that mandates the use of a safety or health
technology that is immature, showing portion associated with Consequence 2
6.4.3: (C3) A device that fails to meet the safety and health standard or is
otherwise defective is certified and used
The third type of negative consequence (C3) that could occur is that a device that fails to meet
the standards or intent of a safety or health mandate could be certified and used. This was
observed with the unsuccessful outcome associated with SCSRs, namely that an unacceptably
high rate of quality control failures occurred with a certified and widely used SCSR model.
Despite testing showing deficiencies with these units over nearly two decades, the model
continued to be certified and used. One could argue that this is not the result of a flawed
regulatory mandate, but rather the result of flawed certification procedures. Regardless, there are
lessons that can be learned to prevent similar situations from occurring in the future.
The relevant portion of the bowtie analysis is given in Figure 47. One recovery control (RC3) is
suggested: organizations responsible for certifying safety and health products for use in mining
should link the certification of these products to prior assessments of the maturity of the
underlying technologies. By doing so, it will more confidence will be able to be placed in the
correct functioning of the component technologies, and abnormal function, due to manufacturing
Event
C2: Intervention causes an
unintended, negative health or
safety consequence
Consequence
Enactment of a
law or regulation
that mandates the
use of a health or
safety technology
that is immature
Recovery Controls
RC2: Research and regulatory
agencies should implement policies
to track technology maturity
development
RC1: Regulations should be
designed to allow for discretion in
enforcement
205
defect or other deficiencies will be more easily detected. In addition, the use of technology
maturity assessments will provide a framework under which rigorous scientific studies of the
capabilities of the technology will need to be evaluated as well as clear expectations for the type
and degree of supporting evidence needed to make a determination that a system is effective. A
discussion of how a policy requiring such assessments could be designed is given in Chapter 7.
Figure 47: Partial bowtie analysis of the enactment of a law or regulation that mandates the use of a safety or health
technology that is immature, showing portion associated with Consequence 3
6.4.4: (C4) Despite effective interventions being available to meet the mandate,
there is sustained strong resistance to their use
The last type of negative consequence (C4) that can result from the enactment of a mandate to
use a safety or health technology that is not mature is that the mining community may have
strong and sustained resistance the use of the mandated technology. This has been seen with
refuge alternatives, which many miners say they would not enter in the event of a disaster, and
noise controls for roof bolting machines, which have failed to achieve widespread adoption due,
in part, to the impact the use of these interventions has the normal operation of the machines. In
both cases, it can legitimately be argued that the underlying failure is that the interventions do
not provide the intended safety or health benefit (i.e., a consequence of type C1) and that
Event
C3: A device that fails to meet the
health and safety standard or is
otherwise defective is certified and
used
Consequence
Enactment of a
law or regulation
that mandates the
use of a health or
safety technology
that is immature
Recovery Control
RC3: Agencies responsible for
safety and health product
certification should implement
policies to link product
certification to assessments of
206
improving the performance of the technologies would alleviate the resistance to their use, but the
continued resistance to the use of the technologies is nonetheless a consequence worth
considering.
The relevant portion for this consequence is given in Figure 48, and one recovery control (RC4)
is suggested: research and regulatory agencies should implement policies to seek stronger
engagement with industry stakeholders.
Figure 48: Partial bowtie analysis of the enactment of a law or regulation that mandates the use of a safety or health
technology that is immature, showing portion associated with Consequence 4
This identically echoes a preventative control, PC5 (“Research and regulatory agencies should
implement policies to seek engagement with industry stakeholders”), which was suggested as a
way to address threat T6 (“Cultural forces and cognitive biases among miners lead to a mistrust
of new interventions”). The similarities between T6 and C4 should be apparent, but it is worth
noting that resistance to a new intervention will not go away simply because a regulatory or
legislative mandate has been issued for its use. This resistance is likely to continue, or even to
intensify, following the promulgation and enforcement of such a mandate. To overcome this
resistance, it is important to promote the value of collaboration and partnering, to develop
employees’ competencies for collaboration and partnering, to organize meetings with broad
Event
C4: Despite effective interventions
being available to meet the
mandate, there is sustained strong
resistance to their use
Consequence
Enactment of a
law or regulation
that mandates the
use of a health or
safety technology
that is immature
Recovery Control
RC4: Research and regulatory
agencies should implement policies
to seek engagement with industry
stakeholders
207
cross-sections of the mining community, and to incentivize employees to engage with industry
stakeholders using performance plans and awards.
It may be difficult or even impossible to foster a cooperative relationship between government
and industry with respect to the enforcement of regulations. It would also be inappropriate to
build such a relationship to the point that the independence and objectivity of the regulatory
oversight could be called into question. Nevertheless, partnering and collaboration is critical to
success both before and after the passage of new rules.
208
Chapter 7: Guidelines and Recommendations to Improve
the Likelihood of Success for New Safety and Health
Technology Mandates
In the previous chapter, a bowtie analysis was presented in which the event at the center of the
bowtie was the enactment of a legislative or regulatory mandate to use a safety or health
technology that is not mature; the consequences at the right side of the bowtie were generalized
forms of observed unsuccessful outcomes resulting from immature safety and health
technologies that have been mandated; and the threats at the left side of the bowtie were
generalized forms of the root causes for those unsuccessful outcomes, which were informed by
the causal tree analyses presented in Chapter 5. Six preventative controls were formulated, which
will help to prevent the threats from leading to the event (the enactment of a mandate for an
immature intervention). In addition, four recovery controls, which will help to mitigate the
outcome of such an event and prevent or lessen the negative consequences were formulated.
In this section, a brief summary of these recommended preventative and recovery controls, most
of which call for policy changes at regulatory and research organizations, will be presented in
Section 7.1. Following this summary, since several of the recommendations deal with the use of
tools to assess and track the maturity of technologies, a discussion is provided in Section 7.2 on
how procedures to conduct such assessments might be designed.
7.1 Summary of Recommendations
The preventative and recovery controls identified through the bowtie analysis presented in
Chapter 6 are listed in Table 31.
209
Table 31: Summary of recommended preventative and recovery controls to prevent and mitigate, respectively, the
enactment of a legislative or regulatory mandate for the use of an immature safety or health technology
Preventative Controls Recovery Controls
PC1: During legislative process, responsible
Congressional committees should constitute
scientific panels to investigate technical issues
including the scientific evidence for
technological maturity
RC1: Regulations should be designed to
allow for discretion in enforcement
PC2: Research and regulatory agencies
should implement policies for the effective
communication of science-based
recommendations to Congress and state
legislatures
RC2: Research and regulatory agencies
should implement policies to track technology
maturity development
PC3: During the rulemaking process,
regulatory agencies should conduct
assessments of technology readiness as part of
the normal technical and economic feasibility
assessment
RC3: Agencies responsible for safety and
health product certification should implement
policies to link product certification to
assessments of technology maturity
PC4: Research and regulatory agencies
should implement policies to perform
technology readiness assessments and to
publicly report these assessments in a
transparent manner
RC4: Research and regulatory agencies
should implement policies to seek
engagement with industry stakeholders
PC5: Research and regulatory agencies
should implement policies to seek
engagement with industry stakeholders
PC6: Research agencies should implement
rigorous policies for meaningful peer-review
of project proposals, protocols, and
publications
These controls would require policy changes in government agencies, with the exception of PC1,
which would require action by Congressional committees. The examples in this research were at
the federal level, but the conclusions apply at the state level as well. Recommendations PC2,
PC5, and RC4 deal with effective communication, including communication between
government agencies and Congress as well as communication between the same agencies and the
210
mining community. This communication is important for ensuring that regulations and
legislative recommendations from the agencies are based both on scientific evidence as well as
on the needs and opportunities in the industry.
Recommendation PC6 addresses scientific peer review, which is critical to the success of any
research program. Rigorous review of findings by qualified experts is necessary to ensure that
conclusions and policy are based on sound analysis of the data. Review is needed at all stages of
the research process, from the generation of a research concept through the dissemination of
results.
Most of the recommendations listed in Table 31 were discussed in Chapter 6, but four
recommendations that were not discussed in detail are PC3, PC4, RC2, and RC3, which address
the implementation of policies to assess and track technological maturity. Implementation of
such policies is examined in the next section.
7.2 Implementation of Policies to Assess Technology Maturity
Several threats identified as root causes for the unsuccessful outcomes analyzed in Chapter 5
could be, at least partially, controlled by having a consistently applied policy for the assessment
of technology maturity. Tools for assessing technology maturity and managing the advancement
of technologies through the levels of maturity would be valuable for enhancing the success of
safety and health technology development efforts for mining. One approach to assessing the
maturity of a technology was discussed in Chapter 2: Technology Readiness Levels (TRL).
TRL is a 9-level scale on which technologies and components can be more objectively evaluated,
as shown in Figure 49. TRL was developed by NASA in the 1980s [33, 34], and the system was
211
subsequently modified and adopted by several other organizations including the Department of
Defense [36, 37], the Department of Energy (DOE) [38], the European Space Agency [39], and
many others. It is recommended that some form of TRL should be used in mining to provide a
more consistent framework under which safety and health technologies can be evaluated and to
establish well-defined guidelines for the supporting evidence that should be expected in order to
make a determination that a technology is mature.
The wording of each of the nine technology readiness levels varies somewhat among agencies
utilizing the system, but the general idea behind each of the levels is consistent. The definitions
used by NASA and by DOD are shown in Table 32 along with a suggested set of definitions for
the mining industry. The first 5 levels are identical across these three scales, but there are minor
wording differences for TRL 6 through 9. For example, where the NASA scale refers to testing
in “a space environment,” the DOD scales refers to testing in “an operational environment,” and
the recommended mining scale refers to testing in “an operating mine.”
213
Table 32: TRL definitions used by NASA and DOD as well as a suggested set of definitions for mining safety and
health technologies (These scales are identical for TRL 1 through 5 but have minor differences for TRL 6 through 9)
NASA Definition DOD Definition Suggested Mining Definition
TRL 9 Actual system 'flight proven'
through successful mission
operations
Actual system proven through
successful mission operations
Actual system proven through
successful use in active mining
operations under the range of
conditions expected to be
encountered in use
TRL 8
Actual system completed and
'flight qualified' through test
and demonstration (ground or
space)
Actual system completed and
qualified through test and
demonstration
Actual system completed and
demonstrated through field tests
TRL 7 System prototype demonstration
in a space environment
System prototype demonstration
in an operational environment
System prototype demonstration
in a representative operating
mine
TRL 6
System/subsystem model or
prototype demonstration in a
relevant environment (ground
or space)
System/subsystem model or
prototype demonstration in a
relevant environment
System/subsystem model or
prototype demonstrated in a
relevant environment
TRL 5 Component and/or breadboard
validation in relevant
environment
Component and/or breadboard
validation in relevant
environment
Component and/or breadboard
validation in relevant
environment
TRL 4 Component and/or breadboard
validation in laboratory
environment
Component and/or breadboard
validation in laboratory
environment
Component and/or breadboard
validation in laboratory
environment
TRL 3 Analytical and experimental
critical function and/or
characteristic proof of concept
Analytical and experimental
critical function and/or
characteristic proof of concept
Proof of concept established
through analytical or
experimental means
TRL 2 Technology concept and/or
application formulated
Technology concept and/or
application formulated
Technology concept and/or
application formulated
TRL 1 Basic principles observed and
reported
Basic principles observed and
reported
Basic principles observed and
reported
214
One important aspect of a TRL determination is the environment under which the technology has
been tested (e.g. laboratory environment, relevant environment, or operating environment) and
the actual environment under which the technology is expected to be used. For the mining
industry, the operating environment is clearly an operating mine, but this statement alone falls far
short of defining the environment. To best evaluate the readiness of the technology, the
following considerations should be taken into account:
• Mine characteristics, e.g. surface/underground, commodity, mining method, equipment
type
• Range of expected conditions under normal and abnormal operation, e.g. environmental
parameters
• Differences in operating conditions or practices at different mines
• Dependence on infrastructure (electrical power, water, GPS, data communication, etc.)
• Presence of other technologies in the environment (including the potential for EMI)
• Intended and unintended usage by miners
In many cases, a technology might have been successfully demonstrated or evaluated in a non-
mining environment and adapted to the mining environment. For example, node-based wireless
communications systems were successfully used in other industries before being adapted to use
in underground mines. Or a technology used in one mining environment might be adapted to
another mining environment.
Frequently, legislative or regulatory mandates are motivated by the notion that an existing
technology can be adapted to a mining application. A TRL determination for one operating
environment is not valid in another operating environment. However, having information on the
TRL in the prior environment can still be useful. Guidance on how a TRL for one operating
environment can be adjusted for another operating environment is shown in Table 33.
215
Table 33: Guidance for adjusting TRL for a technology that has been developed for and tested in some prior
environment and is being adapted to a new environment
Difference between new environment and prior environment
It is unknown
whether the
same basic
principles hold
in new
environment
Use in new
environment
represents a
fundamentally
different
application
Differences
environment
justify
laboratory
evaluation
Prior
environment
considered a
“relevant
environment”
for new
environment
New
environment is
practically the
same as the
prior
environment
TR
L i
n P
rio
r E
nv
iron
men
t
TRL 9
Actual system proven
through successful use
in active mining
operations under the
range of conditions
expected to be
encountered in use
↘TRL 0
Adjust TRL
in new
environment
to 0
↘TRL 2
Adjust TRL
in new
environment
to 2
↘TRL 4
Adjust TRL
in new
environment
to 4
↘TRL 6
Adjust TRL
in new
environment
to 6
↘TRL 8
Adjust TRL
in new
environment
to 8
TRL 8
Actual system
completed and
demonstrated through
field tests
TRL 7
System prototype
demonstration in a
representative operating
mine
TRL 6
System/subsystem
model or prototype
demonstrated in a
relevant environment
TRL 5
Component and/or
breadboard validation in
relevant environment
TRL 4
Component and/or
breadboard validation in
laboratory environment
No Change TRL in new environment is the
same as in the prior environment
TRL 3
Proof of concept
established through
analytical or
experimental means
TRL 2
Technology concept
and/or application
formulated
TRL 1
Basic principles
observed and reported
216
Assessments of the technology readiness of safety and health interventions can be performed at
any point during the intervention’s research, development, and diffusion. At each of these points,
the information provided by such an assessment would be beneficial for various reasons. Six
distinct scenarios in which having an assessment of the maturity of a health or a safety
technology would be useful have been considered:
1. The technology is under consideration by Congress to be mandated through legislation
2. The technology is under consideration by a regulatory agency to be mandated through
regulation
3. The technology is already mandated either through legislation or regulation
4. The technology is suspected to provide substantial safety or health benefits, but is not
widely adopted and is not under consideration to be mandated
5. The technology is widely and voluntarily adopted
6. The technology has been mandated and implementation has begun, but problems are
surfacing
This list is not meant to be exhaustive, but rather illustrative of the benefits provided by using
tools based on TRL. The effects of using such tools have been analyzed for four groups that
might conduct an assessment of technology readiness, use the results of an assessment of
technology readiness, or benefit from the use of such assessments:
1. Federal or state legislative bodies
2. Federal or state regulatory agencies, such as MSHA
3. Research agencies, such as NIOSH
4. The mining industry, including mine operators, equipment manufacturers, and others
217
Again, this is far from an exhaustive list, and might include, for example, universities, labor
organizations, and trade associations, among others. For each of the scenarios and
aforementioned groups, the effects on each the groups of using tools for assessing the readiness
of safety and health technologies has been considered. Tables 34 - 37 list some of the potential
benefits that could be received by Congress, regulatory agencies, research agencies, and the
mining industry, respectively.
For each of these tables, the effects of conducting an assessment of a technology’s readiness are
listed in three columns: (1) the effects that would be achieved if the assessment produces
definitive evidence that the technology is acceptably mature, (2) the effects that would be
achieved if the assessment produces definitive evidence that the technology is not acceptably
mature, and (3) the effects that would be achieved if the assessment is inconclusive.
There is no table to present the effects that would occur in terms of benefits to mineworkers, to
whom safety and health regulations and interventions are directed. Effectively, they will be the
primary beneficiaries of this process to ensure that mandated safety and health technologies are
able to accomplish their intended purpose and that ineffective technologies are not allowed to
consume resources, instill false confidence, or create unintended new hazards.
218
Table 34: Effects on federal and state legislative bodies of assessing the readiness of safety and health technologies
SCENARIO
EFFECTS ON CONGRESS OR STATE LEGISLATURES OF ASSESSING
TECHNOLOGY READINESS…
…if the assessment shows
that the technology is
acceptably mature
…if assessment shows that
the technology is not
acceptably mature
…if assessment is not
conclusive
TECHNOLOGY IS
UNDER
CONSIDERATION
BY CONGRESS TO
BE MANDATED
THROUGH
LEGISLATION
Legislation can proceed with
greater confidence that it will
achieve a positive safety or
health outcome
Legislation mandating an
immature technology can be
avoided
Legislation can be postponed
until sufficient evidence can be
found to make a conclusive
determination of maturity;
gaps in the evidence will be
identified, and specific
additional evidence can be
requested from government or
from industry
TECHNOLOGY IS
UNDER
CONSIDERATION
BY A
REGULATORY
AGENCY TO BE
MANDATED
THROUGH
REGULATION
Congressional oversight
committees will have greater
confidence that regulatory
agencies are developing
appropriate regulations
Congressional oversight
committees can identify
inappropriate actions by
regulatory agencies
Congressional oversight
committees can direct
regulatory agencies to provide
further justification for
regulatory actions or research
agencies to address knowledge
gaps
TECHNOLOGY IS
ALREADY
MANDATED
EITHER THROUGH
LEGISLATION OR
REGULATION
The success of prior legislation
mandating the technology will
be validated
Prior legislation mandating an
immature technology can be
repealed or amended
Research agencies can be
directed and funded to address
the knowledge gaps needed to
make a conclusive
determination of maturity;
since the technology is already
mandated, this should be a top
priority
TECHNOLOGY
SHOWS THE
POTENTIAL TO
PROVIDE
SUBSTANTIAL
SAFETY OR
HEALTH
BENEFITS, BUT IS
NOT WIDELY
ADOPTED AND IS
NOT UNDER
CONSIDERATION
TO BE MANDATED
Potential legislation mandating
the use of the technology could
be considered
Legislation mandating an
immature technology can be
avoided
If a legislative mandate seems
like a potential future
possibility, research agencies
can be directed and funded to
address knowledge gaps
TECHNOLOGY IS
WIDELY AND
VOLUNTARILY
ADOPTED
Will have greater confidence
that industry is working safely
Unintended consequences of
using an immature technology
can be identified; legislation
can be considered
If unintended consequences
are suspected possible,
agencies can be directed to
address knowledge gaps
THE
TECHNOLOGY
HAS BEEN
MANDATED AND
IMPLEMENTATION
HAS BEGUN, BUT
PROBLEMS ARE
SURFACING
Results of the assessment can
be used to address problems as
they surface
Prior legislation mandating an
immature technology can be
repealed or amended
Research agencies can be
directed and funded to address
the knowledge gaps needed to
make a conclusive
determination of maturity;
since the technology is already
mandated, this should be a top
priority
219
Table 35: Effects on regulatory agencies of assessing the readiness of safety and health technologies
SCENARIO
EFFECTS ON FEDERAL OR STATE REGULATORY AGENCIES OF ASSESSING
TECHNOLOGY READINESS…
…if the assessment shows
that the technology is
acceptably mature
…if assessment shows that
the technology is not
acceptably mature
…if assessment is not
conclusive
TECHNOLOGY IS
UNDER
CONSIDERATION BY
CONGRESS TO BE
MANDATED THROUGH
LEGISLATION
Evidence supporting the
legislation can be provided to
Congress with confidence that
the mandate will be successful
A cogent recommendation that
the legislation should be
delayed or revised can be
provided to Congress and
supported by evidence
A recommendation can be
provided to Congress that
further research is needed,
including specific knowledge
gaps to address; the weight of
this recommendation will
depend on the agency’s track
record of effective technology
readiness evaluations and their
reputation as a technical
authority
TECHNOLOGY IS
UNDER
CONSIDERATION BY A
REGULATORY
AGENCY TO BE
MANDATED THROUGH
REGULATION
Regulation can proceed with
greater confidence that it will
achieve a positive safety or
health outcome
Regulation mandating an
immature technology can be
avoided
Regulation can be postponed
until sufficient evidence is
found to make a conclusive
determination of maturity;
gaps in the evidence will be
identified, which can be shared
with research agencies to guide
strategy
TECHNOLOGY IS
ALREADY MANDATED
EITHER THROUGH
LEGISLATION OR
REGULATION
The success of prior
regulations mandating the
technology will be validated
Prior regulations mandating an
immature technology can be
repealed or amended;
enforcement policy can be
adjusted to account for the
technology’s insufficiencies
Research can be conducted,
and assistance from research
agencies can be requested, to
address knowledge gaps
needed to make a conclusive
determination of maturity;
since the technology is already
mandated, this should be a top
priority
TECHNOLOGY IS
SUSPECTED TO
PROVIDE
SUBSTANTIAL SAFETY
OR HEALTH BENEFITS,
BUT IS NOT WIDELY
ADOPTED AND IS NOT
UNDER
CONSIDERATION TO
BE MANDATED
Potential regulation mandating
the use of the technology
could be considered
Regulations mandating an
immature technology can be
avoided
If a regulatory mandate seems
like a potential future
possibility, research can be
conducted to address
knowledge gaps and efforts
can be coordinated with
research agencies
TECHNOLOGY IS
WIDELY AND
VOLUNTARILY
ADOPTED
Will have greater confidence
that industry is working safely
Unintended consequences of
using an immature technology
can be identified; regulation
can be considered
If unintended consequences
are suspected possible,
research can be conducted to
address knowledge gaps and
efforts can be coordinated with
research agencies
TECHNOLOGY HAS
BEEN MANDATED AND
IMPLEMENTATION
HAS BEGUN, BUT
PROBLEMS ARE
SURFACING
Results of the assessment can
be used to address problems as
they surface
Prior regulations mandating an
immature technology can be
repealed or amended;
enforcement policy can be
adjusted to account for the
technology’s insufficiencies
Research can be conducted,
and assistance from research
agencies can be requested, to
address knowledge gaps
needed to make a conclusive
determination of maturity;
since the technology is already
mandated, this should be a top
priority
220
Table 36: Effects on research agencies of assessing the readiness of safety and health technologies
SCENARIO
Effects on RESEARCH AGENCIES OF ASSESSING TECHNOLOGY READINESS…
…if the assessment shows
that the technology is
acceptably mature
…if assessment shows that
the technology is not
acceptably mature
…if assessment is not
conclusive
TECHNOLOGY IS
UNDER
CONSIDERATION
BY CONGRESS
TO BE
MANDATED
THROUGH
LEGISLATION
Evidence supporting the
legislation can be provided to
Congress with confidence that
the mandate will be successful
A forceful recommendation
that the legislation should be
halted can be provided to
Congress and supported by
evidence
A recommendation can be
provided to Congress that
further research is needed,
including specific knowledge
gaps to address; the weight of
this recommendation will
depend on the agency’s track
record of effective technology
readiness evaluations and their
reputation as a technical
authority
TECHNOLOGY IS
UNDER
CONSIDERATION
BY A
REGULATORY
AGENCY TO BE
MANDATED
THROUGH
REGULATION
Evidence supporting the
regulation can be provided to
the regulatory agency with
confidence that the mandate
will be successful
A cogent recommendation that
the regulation should be
delayed or revised can be
provided to the regulatory
agency and supported by
evidence
A recommendation can be
provided to the regulatory
agency that further research is
needed, including specific
knowledge gaps to address; the
weight of this recommendation
will depend on the agency’s
track record of effective
technology readiness
evaluations and their reputation
as a technical authority
TECHNOLOGY IS
ALREADY
MANDATED
EITHER
THROUGH
LEGISLATION OR
REGULATION
The effectiveness of safety and
health protections for miners
will be validated
Cogent recommendations for
needed changes to regulations
or legislation can be provided
to Congress and regulatory
agencies
Identifying knowledge gaps
will provide a clear strategic
direction; since the technology
is already mandated, this
should be a top priority
TECHNOLOGY IS
SUSPECTED TO
PROVIDE
SUBSTANTIAL
SAFETY OR
HEALTH
BENEFITS, BUT IS
NOT WIDELY
ADOPTED AND IS
NOT UNDER
CONSIDERATION
TO BE
MANDATED
Demonstrated maturity of the
technology will provide
evidence needed to promote the
use of the technology through
voluntary adoption or to
recommend regulatory action
Resources spent on research
into technologies with low
probability of success can be
minimized
Identifying knowledge gaps
will provide a clear strategic
direction and can be used to
strategically coordinate with
regulatory agencies
TECHNOLOGY IS
WIDELY AND
VOLUNTARILY
ADOPTED
Will have greater confidence
that industry is working safely
Unintended consequences of
using an immature technology
can be identified and mitigation
strategies developed
If unintended consequences are
suspected possible, research
can be conducted to address
knowledge gaps and efforts can
be coordinated with regulatory
agencies
The technology has
been mandated and
implementation has
begun, but
problems are
surfacing
Results of the assessment can
be used to address problems as
they surface
Cogent recommendations for
needed changes to regulations
or legislation can be provided
to Congress and regulatory
agencies
Identifying knowledge gaps
will provide a clear strategic
direction; since the technology
is already mandated, this
should be a top priority
221
Table 37: Effects on the mining industry of assessing the readiness of safety and health technologies
SCENARIO
EFFECTS ON THE MINING INDUSTRY OF ASSESSING TECHNOLOGY READINESS…
…if the assessment shows
that the technology is
acceptably mature
…if assessment shows that
the technology is not
acceptably mature
…if assessment is not
conclusive
TECHNOLOGY IS
UNDER
CONSIDERATION
BY CONGRESS
TO BE
MANDATED
THROUGH
LEGISLATION
Clearly defined performance
requirements for the
technology will be known,
enabling more effective
implementation
Objections to mandate for an
immature technology can be
supported by evidence
Government agencies can be
pressed to provide evidence of
technology’s maturity before a
mandate can be enacted
TECHNOLOGY IS
UNDER
CONSIDERATION
BY A
REGULATORY
AGENCY TO BE
MANDATED
THROUGH
REGULATION
Clearly defined performance
requirements for the
technology will be known,
enabling more effective
implementation
Objections to mandate for an
immature technology can be
supported by evidence
Government agencies can be
pressed to provide evidence of
technology’s maturity before a
mandate can be enacted
TECHNOLOGY IS
ALREADY
MANDATED
EITHER
THROUGH
LEGISLATION OR
REGULATION
Clearly defined performance
requirements for the
technology will be known,
enabling more effective
implementation
Objections to mandate or
requests for changes to
enforcement policy can be
supported by evidence
Government agencies can be
pressed to provide evidence of
technology’s maturity or to
change enforcement policy
TECHNOLOGY IS
SUSPECTED TO
PROVIDE
SUBSTANTIAL
SAFETY OR
HEALTH
BENEFITS, BUT IS
NOT WIDELY
ADOPTED AND IS
NOT UNDER
CONSIDERATION
TO BE
MANDATED
Proactive industry players can
lead the development and
implementation of promising
technologies in advance of any
legislative or regulatory
mandate
Investment in R&D efforts
unlikely to be successful can be
avoided; better
recommendations can be
provided to government
agencies
Knowledge gaps will be known
and can be used to guide R&D
efforts or to provide
recommendations to
government agencies
TECHNOLOGY IS
WIDELY AND
VOLUNTARILY
ADOPTED
The technology can be used
with greater confidence that it
will be effective
Unintended consequences of
using an immature, even if
popular, technology can be
avoided
Knowledge gaps will be known
and can be used to guide R&D
efforts or to provide
recommendations to
government agencies
The technology has
been mandated and
implementation has
begun, but
problems are
surfacing
Clearly defined performance
requirements for the
technology will be known,
enabling more effective
implementation
Objections to mandate or
requests for changes to
enforcement policy can be
supported by evidence
Government agencies can be
pressed to provide evidence of
technology’s maturity or to
change enforcement policy
222
The question of what level of maturity qualifies as “acceptably” mature is not trivial. In these
scenarios in which a mandate requiring the use of the technology is being considered, the
acceptable level of maturity may be higher than in the acceptable level of maturity in other
scenarios. The question boils down to what an acceptable level of uncertainty is regarding the
ability of the technology to provide the desired safety or health benefit. This uncertainty can be
thought of as a function of the TRL; at lower TRLs, there is a high degree of uncertainty, and
this uncertainty decreases as the technology is proven and advanced through the TRLs. For
example, at TRL 2, the concept for the technology has been formulated, but there is no proof that
the concept is achievable. Obviously, this is substantial uncertainty.
By the time the technology reaches TRL 9, it will have been proven through successful use in
active mining operations, as well as having passed the prior TRL milestones, i.e. laboratory
evaluation, testing in a relevant environment. The uncertainty surrounding the performance
capabilities of the technology are not reduced to zero at this point, but they are significantly
reduced. It is still possible that, despite successful use in mines, changes in operating conditions
or practices, introduction of other technologies into the environment, system degradation, and
other factors may impact performance. If these changes are outside the range of conditions for
which testing has been conducted, it is unknown whether they will decrease efficacy.
Figure 50 shows some of the sources of uncertainty that are present at each TRL. To read the
figure for a given TRL, the horizontal band containing that TRL is extended to the right and all
vertical bands that it intersects are a remaining source of uncertainty at that TRL. So TRL 9 only
intersects one of the eight vertical bands, indicating the fewest sources of uncertainty, whereas
TRLs 1 and 2 intersect all eight vertical bands, indicating the most sources of uncertainty.
223
TRL 9 Actual system proven through successful use in active mining operations under the range of
conditions expected to be encountered in use
Ch
ang
es i
n o
per
atin
g c
on
dit
ion
s o
r p
ract
ices
, in
tro
du
ctio
n o
f o
ther
tec
hn
olo
gie
s in
to t
he
env
iro
nm
ent,
sy
stem
deg
rad
atio
n,
and
oth
er
fact
ors
may
im
pac
t p
erfo
rman
ce;
if o
uts
ide
the
ran
ge
of
cond
itio
ns
test
ed,
this
wil
l d
ecre
ase
effe
ctiv
e re
adin
ess
TRL 8 Actual system completed and demonstrated through field tests
Per
form
ance
may
dif
fer
un
der
co
nd
itio
ns
no
t in
clu
ded
in
tes
tin
g a
nd
dem
on
stra
tio
n;
Ch
ang
ing
con
dit
ion
s w
ith
in o
ne
min
e o
r d
isp
arat
e co
nd
itio
ns
bet
wee
n m
ines
may
lea
d t
o p
erfo
rman
ce d
iffe
ren
ces;
Un
exp
ecte
d u
se c
ases
m
ay o
ccur
un
der
op
erat
ing
con
dit
ion
s
TRL 7 System prototype demonstration in a representative operating mine
Cap
abil
itie
s o
f ac
tual
sy
stem
as
mas
s-p
rod
uce
d m
ay d
iffe
r fr
om
th
e ca
pab
ilit
ies
of
pro
toty
pes
TRL 6 System/subsystem model or prototype demonstrated in a
relevant environment
It i
s u
nk
no
wn
if
th
e re
lev
ant
env
iro
nm
ent
un
der
wh
ich
te
stin
g h
as b
een
co
nd
uct
ed
accu
rate
ly e
mu
late
s co
nd
itio
ns
at a
n o
per
atin
g m
ine TRL 5
Component and/or breadboard validation in relevant
environment
Key
co
mp
on
ents
of
the
tech
nolo
gy
hav
e no
t b
een
dem
on
stra
ted
to
wo
rk
un
der
min
ing
co
nd
itio
ns,
or
a co
mp
lete
pro
toty
pe
has
no
t b
een
ass
emb
led
TRL 4 Component and/or breadboard validation
in laboratory environment
Key
co
mp
on
ents
of
the
tech
nolo
gy
hav
e no
t b
een
dem
on
stra
ted
to w
ork
in
an
env
iro
nm
ent
oth
er t
han
a
lab
ora
tory
TRL 3 Proof of concept established
through analytical or
experimental means
Key
co
mp
on
ents
of
the
tech
nolo
gy
hav
e
no
t b
een d
emon
stra
ted
to
wo
rk i
n a
lab
ora
tory
en
vir
on
men
t
TRL 2 Technology concept
and/or application
formulated
Th
e co
nce
pt
of
the
tech
no
logy
is
no
t pro
ven
TRL 1 Basic principles
observed and
reported
Figure 50: Sources of uncertainty about technology's readiness at each TRL
224
So, as the technology is proven through laboratory testing, field testing, and finally successful
use in an operating environment, the uncertainty that the technology will provide the desired
benefit decreases, which means that the technology mandate under consideration is likely to be
successful. In Chapter 6, four general types of unsuccessful outcomes for safety and health
technology mandates were identified and are listed below:
Unsuccessful Outcome Type 1: Intervention does not achieve the intended safety or health
benefit
Unsuccessful Outcome Type 2: Intervention causes an unintended, negative safety or health
consequence
Unsuccessful Outcome Type 3: A device that fails to meet the safety and health standard or
is otherwise defective is certified and used
Unsuccessful Outcome Type 4: Despite effective interventions being available to meet the
mandate, there is sustained strong resistance to their use
As TRL increases, the risk that each of these unsuccessful outcomes will occur decreases.
However, these four risks do not all decrease at the same rate. Confidence that a Type 1 outcome
will not occur (i.e. confidence that the intervention will achieve its intended benefit) can
reasonably be said to begin increasing after successful proof-of-concept testing (TRL 3) and to
further decrease with laboratory and field testing (TRLs 4+). In contrast, confidence that a Type
2 outcome will not occur (i.e. confidence that unintended consequences such as EMI will not
occur) would not begin to increase until testing in a mine-like environment was conducted (TRLs
5+). Similarly, the risk of a Type 3 outcome cannot be said to be significantly reduce until the
capabilities of the technology’s components are proven and design specifications are established
(TRL 5+). Finally, a Type 4 outcome should be considered likely until the technology has been
demonstrated in a mine environment and successfully used by miners, i.e., that the technology
has achieved a TRL of 7 or greater. A visual representation of these decreasing risks for each of
the unsuccessful outcome types with increasing TRL is shown in Figure 51.
225
TRL 9
Actual system proven
through successful use in
active mining operations
under the range of
conditions expected to be
encountered in use
TRL 8
Actual system completed
and demonstrated
TRL 7
System prototype
demonstration in a
representative operating
mine
TRL 6
System/subsystem model
or prototype
demonstrated in a
relevant environment
TRL 5
Component and/or
breadboard validation in
relevant environment
TRL 4 Component and/or
breadboard validation in
laboratory environment
TRL 3
Proof of concept
established through
analytical or experimental
means
TRL 2 Technology concept
and/or application
formulated
TRL 1 Basic principles observed
and reported
Figure 51: Risk of unsuccessful outcomes decreases with increasing TRL; relative level of risk for each type of
unsuccessful outcome is indicated by the width of the column, which decreases with increasing TRL
Risk of
unsuccessful
outcome type 1:
Intervention
does not
achieve the
intended health
or safety benefit
Risk of
unsuccessful
outcome type 2:
Intervention
causes an
unintended,
negative health
or safety
consequence
Risk of
unsuccessful
outcome type 3:
A device that
fails to meet the
health and
safety standard
or is otherwise
defective is
certified and
used
Risk of
unsuccessful
outcome type 4:
Despite
effective
interventions
being available
to meet the
mandate, there
is sustained
strong
resistance to
their use
226
Based on the uncertainty presented in Figure 50 and the risks of an unsuccessful technology
mandate outcome presented in Figure 51, an informed decision can be made regarding what
might be an appropriate TRL to require before a technology mandate can be considered. For a
TRL of 6 or below, there is still significant uncertainty since a complete prototype has not yet
been demonstrated at an operating mine. As a result, the risk of all four types of unsuccessful
outcomes would be substantial. To reach a TRL of 8, a manufactured product (as opposed to a
prototype) must be demonstrated in an operating mine. For a technology-forcing mandate, i.e., a
mandate specifically designed to be promulgated before a product is on the market, it would not
make sense to require TRL 8 to be achieved.
Therefore, TRL 7 is a reasonable threshold level to set as what must be achieved before a
technology can be considered mature enough for a mandate to be appropriate. At this TRL, a
prototype of the technology has been tested and demonstrated in an operating mine. Even at this
stage of maturity, there is a degree of uncertainty concerning the capabilities of the technology.
As is shown in Figure 50, the sources of this uncertainty include the following:
• Capabilities of actual system as mass-produced may differ from the capabilities of
prototypes.
• Changing conditions within one mine or disparate conditions between mines may lead to
performance differences.
• Unexpected use cases may occur under operating conditions.
• Evolving operating conditions or practices, introduction of other technologies into the
environment, system degradation, and other factors may impact performance.
227
With these uncertainties, it is possible that the mandate may result in an unsuccessful outcome of
the types shown in Figure 51. In order to minimize these risks, it is necessary to minimize the
uncertainties of the types listed above. Consideration of these uncertainties should be built into
the determination of TRL. In particular, an assignment of TRL 7 to a prototype technology
should account for the following considerations:
• There should be evidence that the capabilities of the prototype are representative of what
would be achievable with the manufactured product. To do this, the manufacturing
capabilities in the industry should be well understood and channels for technology
diffusion should be established through engagement and partnering. Recommendations in
this area were previously discussed as PC5 (“Research and regulatory agencies should
implement policies to seek engagement with industry stakeholders”).
• The certification of products as meeting the requirements of the mandate should be tied to
clearly-defined technical capabilities, which will be produced through the assessment of
the maturity of the technology. This was previously discussed as RC3 (“Agencies
responsible for safety and health product certification should implement policies to link
product certification to assessments of technology maturity”).
• Testing in the field and in the lab should be designed to capture, to the extent feasible, the
full range of operating conditions under which the technology could be used. For
example, for underground mining interventions, testing should be conducted in mines of
various seam heights and geologies. This should also include testing for the potential for
electromagnetic interference and other environmental factors that could impact
performance. This is closely tied to PC6 (“Research agencies should implement rigorous
policies for meaningful peer-review of project proposals, protocols, and publications”).
228
• As the technology is introduced, the manner in which the industry is actually using the
technology and the issues that are occurring should be tracked by active engagement with
stakeholders. This was discussed as RC4 (“Research and regulatory agencies should
implement policies to seek engagement with industry stakeholders”).
• Finally, the presence of uncertainty in the capabilities of the technology should be
recognized and accounted for by designing regulations to allow for discretion and
flexibility to adjust to evolving industry conditions and advances in technology. This was
discussed as RC1 (“Regulations should be designed to allow for discretion in
enforcement”).
If the above considerations and recommendations are built into the determination of technology
readiness for a new intervention and if the technology can, subject to those considerations, be
successfully demonstrated to meet a TRL of 7, a much higher degree of confidence can be placed
on the expected success of the technology’s introduction. These guidelines should be used in the
processes for proposing new regulations as well as for formulating recommendations by research
agencies to regulatory agencies as well as recommendations from both types of agencies to
Congress and state legislatures.
229
Chapter 8: Conclusions and Recommendations
This dissertation set out to identify the factors that govern the success of mandated safety and
health technologies in the mining industry and to develop a set of guidelines that can be used to
maximize the likelihood of success for future mining safety and health technology mandates.
This goal was accomplished by analyzing several cases of safety and health technology
introduction to the industry. These case studies included technologies that were mandated
through legislation or regulation as well as technologies that were voluntarily adopted by the
mining industry. The root causes for the success or failure in each of these case studies were
determined and these root causes were analyzed to identify factors that were key to the success
or failure of the introduced technologies
For each case, the factual basis for the analysis came from the research literature and government
records, as well as through discussions with subject matter experts. Successful outcomes
clustered into four categories: (1) Wide-spread voluntary adoption; (2) Documented successful
trials; (3) Documented evidence of an achieved safety and health benefit; and (4) Indication of
broad applicability throughout the industry. Unsuccessful outcomes clustered into six categories:
(1) Documented failures of the technology; (2) Introduction of a new hazard due to the
technology’s use; (3) Low levels of adoption despite demonstrated ability to meet regulatory
standards; (4) Judicial intervention in rule-making or enforcement; (5) Strong resistance to the
deployment and use of the technology by miners; and (6) After-rule time extensions.
Within the cases analyzed, three successful and six unsuccessful outcomes were identified falling
into these categories. A causal tree analysis was performed for each of these successful and
unsuccessful outcomes to find the root causes that resulted in either success or failure. The root
230
causes from these analyses were compared and formulated into a set of generalized root causes
for successful outcomes and another set for unsuccessful outcomes.
Ten generalized root causes for successful outcomes, shown in Table 38, and eight generalized
root causes for unsuccessful outcomes, shown in Table 39, were identified. An examination of
these root causes revealed four interesting themes.
• The accurate assessment of technology readiness contributes to success. Three of the
generalized root causes for unsuccessful outcomes (items 1 through 3 in Table 39)
involve biases among researchers, regulators, or legislators leading to a failure to
accurately assess the readiness of a safety or health technology. In contrast, five of the
generalized root causes for successful outcomes (items 1 through 5 in Table 38)
involve researchers, regulators, or legislators correctly assessing technology
readiness.
• Research based on sound scientific methods and study design contributes to success.
Two of the generalized root causes for unsuccessful outcomes (items 4 and 5 in Table
39) involve poorly designed experiments or ineffective review of research. In
contrast, two of the generalized root causes for successful outcomes (items 8 and 9 in
Table 38) involve the successful completion of well-designed scientific research.
• Effective engineering solutions can be developed through partnerships between
stakeholders. Three of the root causes for unsuccessful outcomes (items 6 through 8
in Table 39) describe failures to develop effective interventions that address the needs
of the industry and that are accepted by miners. In contrast, two of the root causes for
successful outcomes (items 7 and 10 in Table 38) describe partnerships between
231
researchers and stakeholders to develop effective engineering solutions that address
the needs of the industry.
• The practice of incorporating provisions into regulations that will allow for
technology development is beneficial, and this is reflected in two of the successful
outcome root causes (items 5 and 6 in Table 38).
The identification of the root causes for successful and unsuccessful safety and health technology
introduction outcomes represents the first major contribution of this research. The identification
of the root causes fills a critical knowledge gap in the understanding of the challenges and
opportunities faced during the introduction of new safety and health technologies to the mining
industry. This research has shown how the factors identified resulted in the successful and
unsuccessful outcomes observed in the case studies. A high degree of consistency was observed
in the root causes identified across the analyses for all of the unsuccessful outcomes. This
consistency indicates that these findings are generalizable to other technology introductions and
that the findings can be used to inform future efforts to introduce new safety and health
technologies.
232
Table 38: Generalized forms of identified root causes for successful outcomes in case studies of safety and health
technology introductions studied
Generalized Root Causes for Successful Safety and Health Technology Introduction
Outcomes
11. Legislators correctly identified an opportunity for a technology-forcing mandate to
result in the development of new, or adaptation of, existing technologies.
12. Legislators correctly identified the need for research and development to achieve
successful results for a technology-forcing mandate.
13. Legislators correctly identified uncertainty in the ability of industry to meet the
provisions of a technology-forcing mandate and permitted flexibility in compliance to
allow for technology development.
14. Regulators correctly identified indications of technological immaturity.
15. Regulators correctly identified the need for flexibility in regulations to allow for
technology development.
16. Regulatory requirements were written as performance-based standards
17. Researchers established effective partnerships with industry in order to develop
research findings into practical interventions that can be effectively diffused.
18. Research agencies correctly identified need for specific research and acted to fulfill the
need.
19. The effectiveness of intervention was successfully demonstrated in field trials under
operating conditions.
20. The interventions were designed such that they had minimal impact on mine operations
and/or offered an additional benefit beyond the intended safety or health benefit.
233
Table 39: Generalized forms of identified root causes for unsuccessful outcomes in case studies of safety and health
technology introductions studied
Generalized Root Causes for Unsuccessful Safety and Health Technology Introduction
Outcomes
9. Biases led legislators to judge that immediate action is needed and to ignore indications
of technology immaturity
10. Biases led regulators to judge that immediate action is needed and to ignore indications
of technological immaturity
11. Biases led researchers to ignore or to understate observed indications of technological
immaturity identified through research
12. Biases resulted in insufficient or poorly designed experiments
13. Biases resulted in insufficient or ineffective review of research
14. Biases led to an acceptance of the status quo with respect to recognized deficiencies in
safety and health standards or technologies
15. Despite the best efforts of researchers and developers, effective interventions either
could not be developed or could not be demonstrated to be effective due to engineering
challenges or economic constraints
16. Cultural forces and cognitive biases among miners led to a mistrust of new
interventions
In addition, a high degree of consistency was observed across the root causes for the successful
outcomes, and these root causes showed a logical contrast to the root causes for the unsuccessful
outcomes. The contrast between the root causes for the unsuccessful and successful outcomes are
observed across four major themes: (1) the accurate assessment of technology readiness
contributes to success, (2) the completion of research based on sound scientific methods and
234
study design contributes to success, (3) effective engineering solutions can be developed through
partnerships between stakeholders, and (4) having regulations that allow for technology
development is beneficial. The contrast between the identified causes for successful and
unsuccessful outcomes with respect to these four themes is to be expected if these causes have
predictive value for the success of new safety and health technology introductions. The fact that
the expected contrast is observed validates that the factors identified do have predictive value
and that they can be used to inform guidance for the introduction of future safety and health
technologies.
To develop such guidance, a bowtie analysis for unsuccessful mining safety and health
technology mandates was constructed using the results of the causal tree analyses. At the center
of the bowtie analysis was placed the event, “Enactment of a law or regulation that mandates the
use of a safety and health technology that is immature.” On the left side of the bowtie analysis
were the threats, which are the eight generalized root causes for unsuccessful outcomes, and on
the right side of the bowtie are the consequences, which are generalized forms of the
unsuccessful outcomes themselves. This bowtie was used to identify preventative controls,
which are designed to prevent the threats from leading to the event, and recovery controls, which
are designed to mitigate the effects of the event. Six preventative and four recovery controls were
identified, which are listed below.
Preventative Control 1: During legislative process, responsible Congressional committees
should constitute scientific panels to investigate technical issues
including the scientific evidence for technological maturity
235
Preventative Control 2: Research and regulatory agencies should implement policies for
the effective communication of science-based recommendations to
Congress and state legislatures
Preventative Control 3: During the rulemaking process, regulatory agencies should conduct
assessments of technology readiness as part of the normal technical
and economic feasibility assessment
Preventative Control 4: Research and regulatory agencies should implement policies to
perform technology readiness assessments and to publicly report
these assessments in a transparent manner
Preventative Control 5: Research and regulatory agencies should implement policies to
seek engagement with industry stakeholders
Preventative Control 6: Research agencies should implement rigorous policies for
meaningful peer-review of project proposals, protocols, and
publications
Recovery Control 1: Regulations should be designed to allow for discretion in
enforcement
Recovery Control 2: Research and regulatory agencies should implement policies to
track technology maturity development
Recovery Control 3: Agencies responsible for safety and health product certification
should implement policies to link product certification to
assessments of technology maturity
Recovery Control 4: Research and regulatory agencies should implement policies to
seek engagement with industry stakeholders
236
The development of these controls represents the second major contribution of this research. A
detailed discussion on recommendations for how these controls could be implemented for the
mining industry was presented in the previous two chapters. While the bowtie analysis was not
designed explicitly to do so, it is worth noting that the controls developed through this analysis
address the four themes previously discussed with the causal tree analysis results. These themes
again are: (1) the accurate assessment of technology readiness contributes to success, (2) the
completion of research based on sound scientific methods and study design contributes to
success, (3) effective engineering solutions can be developed through partnerships between
stakeholders, and (4) having regulations that allow for technology development is beneficial. The
first theme is addressed by Preventative Controls 1, 3, and 4 as well as by Recovery Controls 2
and 3. The second theme is addressed by Preventative Controls 2 and 6. The third theme is
addressed by Preventative Control 4 and Recovery Control 4. And the fourth theme is addressed
by Recovery Control 1.
The primary purpose of several of these controls is to maintain objectivity in the decisions that
are made in the planning of research, the design of new safety and health legislation or
regulation, and the enforcement of existing legislation and regulations. The importance of
maintaining objectivity in these processes cannot be understated. As has been discussed
extensively, biases affecting the thinking of those involved in making these decisions can lead to
many undesirable outcomes. Means of maintaining objectivity represented in the recommended
controls include performing technology readiness assessments and conducting research
according to rigorous, peer-reviewed scientific processes. The flawed thinking and biases that
affect the decisions made by researchers, regulators, and legislators should be considered an
unavoidable fact of life. Therefore, it is necessary to have strictly defined standards for evidence
237
to support decisions regarding regulation, legislation, or research. These standards should be
implemented in as consistent and transparent a manner possible.
Recommendations for such standards have been provided in the preceding chapters, most
notably including the recommendation to conduct systematic assessments of technology maturity
using Technology Readiness Levels (TRLs). When coupled with other controls recommended,
including the use of proper scientific experimental design, development of strong engagement
between government agencies and industry stakeholders, and policies for effective science-based
communication, the use of TRL assessments will ensure the objectivity of decisions concerning
whether a technology is mature enough to be mandated as well as to guide research and
development strategy. A mining-specific TRL scale definition was developed, and is shown in
Error! Reference source not found..
The expected effects of utilizing a scale of this sort for performing consistent technology
readiness assessments were described in the previous chapter and include providing for more
cogent recommendations concerning proposed regulations or legislation, offering a means of
identifying research gaps and guiding research strategy, and establishing clearly communicated
and consistently applied expectations for the maturity of technologies to be mandated or used in
the industry.
239
The findings of this research fill a critical knowledge gap on the understanding of the factors that
influence the success of new safety and health technology introduction in the mining industry.
This new knowledge has been used to develop recommendations for future safety and health
technology introductions. By using the findings of this research and by applying the
recommendations provided in this dissertation, more impactful safety and health research can be
planned and performed and more effective safety and health regulations can be designed for the
mining industry.
240
References
[1] J. L. Kohler, "Looking ahead to significant improvements in mining safety and health
through innovative research and effective diffusion into the industry," International
Journal of Mining Science and Technology, pp. 325-332, 2014.
[2] J. Schumpeter, Capitalism, Socialism and Democracy, New York: Harper, 1942.
[3] A. B. Jaffe, R. G. Newell and R. N. Stavins, "Environmental Policy and Environmental
Change," Environmental and Resource Economics, pp. 41-69, 2002.
[4] A. B. Jaffe, R. G. Newell and R. N. Stavins, "A Tale of Two Market Failures:
Technology and Environmental Policy," Ecological Economics, pp. 164-174, 2005.
[5] Z. Griliches, "Issues in Assessing the Contribution of Research and Develoment to
Productivity Growth," Bell Journal of Economics, vol. 10, pp. 92-116, 1979.
[6] B. Hall, A. Jaffe and M. Traitenberg, "Market Value and Patent Citations: A First Look,"
National Bureau of Economic Research Working Paper No. 7741, 2000.
[7] A. B. Jaffe, "The Importance of Spillovers in the Policy Mission of the Advanced
Technology Program," Journal of Technological Transfer, vol. Summer, pp. 11-19, 1998.
[8] F. M. Scherer and D. Harhoff, "Technology Policy for a World of Skew-Distributed
Outcomes," Research Policy, vol. 29, pp. 559-566, 2000.
241
[9] F. M. Scherer, D. Harhoff and J. Kukies, "Uncertainty and the Sice Distribution of
Rewards from Technological Innovation," Journal of Evolutionary Economics, vol. 10,
pp. 175-200, 2000.
[10] K. J. Arrow, "Economic Welfare and the Allocation of Resources for Invention," in The
Rate and Direction of Inventive Activity, R. Nelson, Ed., Princeton, NJ, Princeton
University Press, 1962.
[11] Z. Griliches, "The Search for R&D Spillovers," Scandinavian Journal of Economics, vol.
94, pp. S29-S47, 1992.
[12] S. G. Winter, Y. M. Kaniovski and G. Dosi, "Modeling Industrial Dynamics with
Innovative Entrants," Structural Change and Economic Dynamics, vol. 11, pp. 255-293,
2000.
[13] M. E. Porter and C. van der Linde, "Toward a New Conception of the Environment-
Competitiveness Relationship," Journal of Economic Perspectives, vol. 9, pp. 97-118,
1995.
[14] M. Greaker, "Spillovers in the Development of New Pollution Abatement Technology: A
New Look at the Porter-Hypothesis," Journal of Environmental Economics and
Management, pp. 411-420, 2006.
242
[15] K. Palmer, W. E. Oates and P. R. Portney, "Tightening Environmental Standards: The
Benefits-Cost or the No-Cost Paradigm?," Journal of Economic Perspectives, vol. 9, pp.
119-132, 1995.
[16] P. A. Geroski, "Models of Technology Diffusion," Research Policy, vol. 46, pp. 1-3,
2000.
[17] P. David, "A Contribution to the Theory of Diffusion," 1969.
[18] Z. Griliches, "Hybrid Corn: An Exploration in the Economics of Technical Change,"
Econometrica, vol. 48, pp. 501-522, 1957.
[19] P. Stoneman, The Economic Analysis of Technological Change, Oxford: Oxford
University Press, 1983.
[20] A. B. Jaffe, R. G. Newell and R. N. Stavins, "Technological Change and the
Environment," in Handbook of Environmental Economics, K. Maler and J. R. Vincent,
Eds., Amsterdam, Elsevier Science, 2003, pp. 461-516.
[21] J. Lee, F. M. Veloso, D. A. Hounshell and E. S. Rubin, "Forcing Technological Change:
A Case of Automobile Emissions Control Technology Development in the US,"
Technovation, pp. 249-264, 2010.
[22] R. D. Mohr, "Environmental Performance Standards and the Adoption of Technology,"
Ecological Economics, pp. 238-248, 2006.
243
[23] J. Lee, F. M. Veloso and D. A. Hounshell, "Linking Induced Technological Change, and
Environmental Regulation: Evidence from Patenting in the U.S. Auto Industry," Research
Policy, pp. 1240-1252, 2011.
[24] D. Gerard and L. B. Lave, "Implementing Technology-Forcing Policies: The 1970 Clean
Air Act Amendments and the Introduction of Advanced Automotive Emissions Controls
in the United States," Technological Forecasting and Social Change, pp. 761-778, 2005.
[25] A. Nentjes, F. P. de Vries and D. Wiersma, "Technology-Forcing through Environmental
Regulation," Europoean Journal of Political Economy, pp. 903-916, 2007.
[26] S. T. Anderson and R. G. Newell, "Information Programs for Technology Adoption: the
Case of Energy-Efficiency Audits," Resource and Energy Economics, pp. 27-50, 2004.
[27] S. L. Puller, "The Strategic Use of Innovation to Influence Regulatory Standards,"
Journal of Environmental Economics and Management, pp. 690-706, 2006.
[28] Environmental Protection Agency, "RACT/BACT/LAER Clearinghouse (RBLC)," 2016.
[Online]. Available:
https://cfpub.epa.gov/RBLC/index.cfm?action=Home.Home&lang=en. [Accessed July
2016].
[29] K. B. J. Schnelle, R. F. Dunn and M. E. Ternes, Air Pollution Control Technology
Handbook, Second Edition, CRC Press, 2016.
244
[30] U.S. Environmental Protection Agency, New Source Review Workshop Manual, Draft,
1990.
[31] B. Evans and K. Weiss, Sumary of progress on EPA's NSR reform initiative, 2000.
[32] B. Hawkins and M. E. Ternes, Clean Air Act Handbook, 3rd Ed., American Bar
Association, Section of Environment, Energy and Resources, Chapter 6, 2011.
[33] J. C. Mankins, "Technology Readiness Levels: A White Paper," NASA, Office of Space
Access and Technology, 1995.
[34] S. R. Sadin, F. P. Povinelli and R. Rosen, "The NASA Technology Push Towards Future
Space Mission Systems," 1988.
[35] United States Government Accountability Office, "NSIAD-99-162: Better Management
of Technology Development Can Improve Weapon System Outcomes," 1999.
[36] United States Department of Defense, "Technology Readiness Assessment (TRA)
Deskbook," 2005.
[37] United States Department of Defense, "Technology Readiness Assessment (TRA)
Guidance," 2011.
[38] R. Sanchez, "Technology Readiness Assessment Guide," United States Department of
Energy, 2011.
245
[39] European Space Agency, "Technology Readiness Level," 2016. [Online]. Available:
http://sci.esa.int/sre-ft/50124-technology-readiness-level/.
[40] C. P. Graettinger, S. Garcia-Miller, J. Siviy, P. J. V. Syckle and R. J. Schenk, "Using the
Technology Readiness Levels Scale to Support Technology Management in the DoD's
ATD/STO Environments (A Findings and Recommendations Report Conducted for
Army CECOM)," Software Engineering Institute, 2002.
[41] United States Department of Defense, "Technology Assessment Calculator," 2 October
2009. [Online]. Available: https://acc.dau.mil/CommunityBrowser.aspx?id=320594.
[42] United States Department of Defense, "TPMM - Technology Program Management
Model," 9 May 2007. [Online]. Available:
https://acc.dau.mil/CommunityBrowser.aspx?id=148163.
[43] R. Sanchez, DOE G 413.3-4A, Technology Readiness Assessment Guide, Department of
Energy, 2011.
[44] R. J. Terrile, F. G. Doumani, G. Y. Ho and B. L. Jackson, "Calibrating the Technology
Readiness Level (TRL) scale using NASA mission data," in 2015 IEEE Aerospace
Conference, 2015.
[45] R. U. Bailey, T. A. Mazzuchi, S. Sarkani and D. F. Rico, "A Comparative Analysis of the
Value of Technology Readiness Assessments," Defense Acquisition Research Journal: A
Publication of the Defense Acquisition University, vol. 21, no. 4, 2014.
246
[46] J. C. Mankins, "Technology readiness assessments: A retrospective," Acta Astronautica,
vol. 65, no. 9, pp. 1216-1223, 2009.
[47] A. Olechowski, S. D. Eppinger and N. Joglekar, "Technology readiness levels at 40: A
study of state-of-the-art use, challenges, and opportunities," in 2015 Portland
International Conference on Management of Engineering and Technology (PICMET),
2015.
[48] G. S. Rice, "Mine Fires, A Preliminary Study," Department of the Interior, Bureau of
Mines, 1912.
[49] J. W. Paul, B. O. Pickard and M. W. VonBernewitz, "Erection of Barricades During Mine
Fires or After Explosions," Department of the Interior, Bureau of Mines, 1923.
[50] D. Harrington and W. J. Fene, "Barricading as a Life-Saving Measure in Connection
With Mine Fires and Explosions," Department of the Interior, Bureau of Mines, 1941.
[51] J. F. McCoy, D. R. Berry and D. W. Mitchell, "Development of Guidelines for Rescue
Chambers, Volume I," Foster-Miller, Inc, 1983.
[52] J. F. McCoy, D. R. Berry and D. W. Mitchell, "Development of Guidelines for Rescue
Chambers, Volume II," Foster-Miller, Inc, 1983.
[53] J. D. McAteer, T. N. Bethell, C. Monforton, J. W. Pavlovich, D. Roberts and B. Spence,
"The Sago Mine Disaster: A preliminary report to Governor Joe Manchin III," 2006.
247
[54] West Virginia Office of Miners' Health, Safety, and Training, "Report of Investigation
into the Sago Mine Explosion which occured January 2, 2006," 2006.
[55] R. A. Gates, R. L. Phillips, J. E. Urosek, C. R. Stephan, R. T. Stoltz, D. J. Swentosky, G.
W. Harris, J. R. J. O'Donnell and R. A. Dresch, "Report of Investigation: Fatal
Underground Coal Mine Explosion; January 2, 2006; Sago Mine, Wolf Run Mining
Company; Tallmansville, Upshur County, West Virginia; ID No. 46-08791," Mine Safety
and Health Adminstration, United States Department of Labor, Arlington, Virginia, 2007.
[56] M. Davis, "US Mining Safety Under Scrutiny," BBC News, 5 January 2006.
[57] J. Dao, "12 Miners Found Alive 41 Hours After Explosion," The New York Times, 4
January 2006.
[58] NYT, "The Sago Mine Disaster," The New York Times, 5 January 2006.
[59] NYT, "Coal's Power Over Politicians," The New York Times, 6 January 2006.
[60] M. Clayton and A. Paulson, "Sago raises red flags for mine oversight," The Christian
Science Monitor, 6 January 2006.
[61] K. J. Ward, "Mine Safety Probe: Ex-MSHA Chief to Oversee Investigation," West
Virginia Gazette, 10 January 2006.
[62] D. Goode, "Panel to hold hearings on federal role in mine disaster," Government
Executive, 9 January 2006.
248
[63] Fox News, "Congress to Examine Mine Safety," Fox News, 21 January 2006.
[64] Office of Mine Safety and Health, "Research Report on Refuge Alternatives for
Underground Coal Mines," National Institute for Occupational Safety and Health, 2007.
[65] NIOSH, "Refuge Alternative Research," National Institute for Occupational Safety and
Health Research, 2007. [Online]. Available:
https://www.cdc.gov/niosh/docket/archive/docket125.html.
[66] E. R. Bauer and J. L. Kohler, "Update on refuge alternatives: research, recommendations
and underground deployment," Mining Engineering, vol. 61, no. 12, p. 51, December
2009.
[67] D. Ounanian, "Refuge Alternatives in Underground Coal Mines: Phase I Final Report,"
Foster-Miller, Inc, 2007.
[68] D. Ounanian, "Refuge Alternatives in Underground Coal Mines: Phase II Final Report,"
Foster-Miller, Inc, 2007.
[69] Department of Labor, "Refuge Alternatives for Underground Coal Mines (RIN 1219-
AB58)," Federal Register, vol. 73, no. 116, pp. 34140 - 34173, 16 June 2008.
[70] Department of Labor, "Refuge Alternatives for Underground Coal Mines (RIN 1219-
AB58)," Federal Register, vol. 73, no. 251, pp. 80656 - 80700, 31 December 2008.
[71] United Mine Workers v. MSHA, 2010.
249
[72] Department of Labor, "Refuge Alternatives for Underground Coal Mines (RIN 1219-
AB84)," Federal Register, vol. 78, no. 153, pp. 48592 - 48593, 8 August 2013.
[73] Department of Labor, "Refuge Alternatives for Underground Coal Mines (RIN 1219-
AB79)," Federal Register, vol. 78, no. 153, pp. 48593 - 48597, 8 August 2013.
[74] Department of Labor, "Refuge Alternatives for Underground Coal Mines (RIN 1219-
AB79)," Federal Register, vol. 78, no. 184, p. 58264, 23 September 2013.
[75] Department of Labor, "Refuge Alternatives for Underground Coal Mines (RIN 1219-
AB79)," Federal Register, vol. 78, no. 235, pp. 73471 - 73472, 6 December 2013.
[76] Department of Labor, "Refuge Alternatives for Underground Coal Mines (RIN 1219-
AB79)," Federal Register, vol. 79, no. 106, p. 31895, 3 June 2014.
[77] Department of Labor, "Refuge Alternatives for Underground Coal Mines (RIN 1219-
AB79)," Federal Register, vol. 79, no. 190, pp. 59167 - 59168, 1 October 2014.
[78] Department of Labor, "Refuge Alternatives for Underground Coal Mines (RIN 1219-
AB79)," Federal Register, vol. 80, no. 181, pp. 56416 - 56418, 18 September 2015.
[79] Department of Labor, "Refuge Alternatives for Underground Coal Mines (RIN 1219-
AB79)," Federal Register, vol. 80, no. 222, p. 72028, 18 November 2015.
250
[80] Mine Safety Technology and Training Commission (MSTTC), Improving mine safety
technology and training: establishing U.S. global leadership, National Mining
Association, 2006, p. 193.
[81] West Virginia Mine Safety Technology Task Force, "Mine Safety Recommendations,
Report to the Director of the Office of Miners’ Health, Safety and Training by the West
Virginia Mine Safety Technology Task Force," West Virginia Office of Miners’ Health,
Safety and Training, Charleston, WV, 2006.
[82] GAO, "Better oversight and coordination by MSHA and other federal agencies could
improve safety for underground coal miners. GAO-07-622," U.S. Government
Accountability Office, Washington, DC, 2007.
[83] J. D. McAteer, T. N. Bethell, C. Monforton, J. W. Pavlovich, D. Roberts and B. Spence,
"The Fire at Aracoma Alma Mine #1: A preliminary report to Governor Joe Manchin III,"
2006.
[84] National Acadamy of Sciencies, "Improving self-escape from underground coal mines,"
National Academies Press, Washington, DC, 2013.
[85] R. Peters and C. Kosmoski, "Are your coal miners prepared to self-escape?," Coal Age,
vol. 118, no. 1, pp. 26 - 28, 2013.
[86] E. J. Haas, R. H. Peters and C. L. Kosmoski, "Report of Investigations 9699: Enhancing
Mine Workers' Self-escape by Integrating Competency Assessment into Training,"
251
Centers for Disease Control and Prevention (CDC), National Institute for Occupational
Safety and Health (NIOSH), 2015.
[87] C. Vaught, E. E. Hall and K. A. Klein, "Information Circular 9511: Harry's Hard Choices:
Mine Refuge Chamber Training Instructor's Guide," Centers for Disease Control and
Prevention (CDC), National Institute for Occupational Safety and Health (NIOSH), 2009.
[88] K. A. Margolis, K. M. Kowalski-Trakofler and C. Y. Kingsley Westerman, "Information
Circular 9516: Refuge Chamber Expectations Training," Centers for Disease Control and
Prevention (CDC), National Institute for Occupational Safety and Health (NIOSH), 2009.
[89] E. E. Hall and K. A. Margolis, "Information Circular 9525: Emergency Escape & Refuge
Alternatives Instructor Guide and Lesson Plan," Centers for Disease Control and
Prevention (CDC), National Institute for Occupational Safety and Health (NIOSH), 2010.
[90] M. J. Brnich, C. Vaught and K. M. Kowalski-Trakofler, "Information Circular 9685: Man
Mountain's Refuge: Refuge Chamber Training Instructor's Guide and Trainee's Problem
Book," Centers for Disease Control and Prevention (CDC), National Institute for
Occupational Safety and Health (NIOSH), 2011.
[91] C. L. Kosmoski, K. A. Margolis, K. L. McNelis, M. J. Brnich, L. Mallet and P. Lenart,
"Report of Investigations 9682: When Do You Take Refuge? Decisionmaking During
Mine Emergency Escape Instructor's Guide and Lesson Plans," Centers for Disease
Control and Prevention (CDC), National Institute for Occupational Safety and Health
(NIOSH), 2011.
252
[92] C. Y. Kingsley Westerman, K. L. McNelis and K. A. Margolis, "Report of Investigations
9683: Recommendations for Refuge Chamber Operations Training," Centers for Disease
Control and Prevention (CDC), National Institute for Occupational Safety and Health
(NIOSH), 2011.
[93] K. A. Klein and E. E. Hall, "Information Circular 9514: Guidelines for Instructional
Materials on Refuge Chamber Setup, Use, and Maintenance," Centers for Disease
Control and Prevention (CDC), National Institute for Occupational Safety and Health
(NIOSH), 2009.
[94] R. J. McCloy, "Text of Randal McCloy Jr.'s Letter," Charleston Gazette-Mail, 28 April
2006.
[95] H. W. Ahlers, "CSE SR-100 SCSR - notice of information. Joint Investigation - CSE
Corp SR-100 Self-Contained Self-Rescuerer (SCSR)," Centers for Disease Control and
Prevention (CDC), National Institute for Occupational Safety and Health (NIOSH),
National Personal Protective Technology Laboratory (NPPTL), Pittsburgh, PA, 2010.
[96] CSE Corporation, "SR-100 User Notice," CSE Corporation, Monroeville, PA, 2010.
[97] H. W. Ahlers, "Background and SUmmary of CSE SR-100 Investigations," Centers for
Disease Control and Prevention (CDC), National Institute for Occupational Safety and
Health (NIOSH), National Personal Protective Technology Laboratory (NPPTL),
Pittsburgh, PA, 2010.
253
[98] H. W. Ahlers, "Updated Users Notice Concerning SR-100 Self-Contained Self-Rescuer
(SCSR)," Centers for Disease Control and Prevention (CDC), National Institute for
Occupational Safety and Health (NIOSH), National Personal Protective Technology
Laboratory (NPPTL), Pittsburgh, PA, 2010.
[99] H. W. Ahlers, "CSE SR-100 SCSR Sampling Plan," Centers for Disease Control and
Prevention (CDC), National Institute for Occupational Safety and Health (NIOSH),
National Personal Protective Technology Laboratory (NPPTL), Pittsburgh, PA, 2010.
[100] Centers for Disease Control and Prevention (CDC), National Institute for Occupational
Safety and Health (NIOSH), National Personal Protective Technology Laboratory
(NPPTL), "Protocol for Sampling, Testing and Analyzing Oxygen-Starter Performance of
the CSE SR-100 Self-Contained Self-Rescuer," 2010.
[101] H. W. Ahlers, "CSE SR-100 Self-Contained Self-Rescuer Respirator User Notice,"
Centers for Disease Control and Prevention (CDC), National Institute for Occupational
Safety and Health (NIOSH), National Personal Protective Technology Laboratory
(NPPTL), Pittsburgh, PA, 2010.
[102] H. W. Ahlers, "Update of the NIOSH and MSHA Collection and Testing of the CSE SR-
100; December 30, 2010," Centers for Disease Control and Prevention (CDC), National
Institute for Occupational Safety and Health (NIOSH), National Personal Protective
Technology Laboratory (NPPTL), Pittsburgh, PA, 2010.
254
[103] H. W. Ahlers, "Update of the NIOSH and MSHA Collection and Testing of the CSE SR-
100; February 15, 2011," Centers for Disease Control and Prevention (CDC), National
Institute for Occupational Safety and Health (NIOSH), National Personal Protective
Technology Laboratory (NPPTL), Pittsburgh, PA, 2011.
[104] H. W. Ahlers, "Update of the NIOSH and MSHA Collection and Testing of the CSE SR-
100," Centers for Disease Control and Prevention (CDC), National Institute for
Occupational Safety and Health (NIOSH), National Personal Protective Technology
Laboratory (NPPTL), Pittsburgh, PA, 2011.
[105] H. W. Ahlers, "Update of the NIOSH and MSHA Collection and Testing of the CSE SR-
100; July 29, 2011," Centers for Disease Control and Prevention (CDC), National
Institute for Occupational Safety and Health (NIOSH), National Personal Protective
Technology Laboratory (NPPTL), Pittsburgh, PA, 2011.
[106] American Society for Quality (ASQ), "ANSI/ASQC Q3-1988: Sampling Procedures and
Tables for Inspection of Isolated Lots by Attributes," American Society for Quality
(ASQ), Milwaukee, WI, 2000.
[107] R. Stein, H. Ahlers and R. Berry Ann, "Loss of Start-Up Oxygen in CSE SR-100 Self-
Contained Self-Rescuers," Centers for Disease Control and Prevention (CDC), National
Institute for Occupational Safety and Health (NIOSH), National Personal Protective
Laboratory (NPPTL), 2012.
255
[108] H. W. Ahlers, "Loss of Start-Up Oxygen in CSE SR-100 Self-Contained Self-Rescuers,"
Centers for Disease Control and Prevention (CDC), National Institute for Occupational
Safety and Health (NIOSH), National Personal Protective Technology Laboratory
(NPPTL), Pittsburgh, PA, 2012.
[109] Occupational Safety and Health Administration, "OSHA ALERT OA-3541: Loss of
Start-Up Oxygen in CSE SR-100 Self-Contained Self-Rescuers," US Department of
Labor, 2012.
[110] Mine Safety and Health Administration, "Program Information Bulletin (PIB) No. 12-
09," US Department of Labor, 2012.
[111] Mine Safety and Health Administration, "News Release: Labor Department's MSHA
issues user notice regarding SCSR units; Phase-out of CSE SR-100 breathing devices in
underground mines to begin immediately," US Department of Labor, Arlington, Virginia,
2012.
[112] N. Kyriazi, J. Kovac, W. Duerr and J. Shubilla, "Report of Investigations 9328:
Laboratory Testing of the CSE SR-100 Self-Contained Self-Rescuer for Ruggedness and
Reliability," US Department of the Interior, Bureau of Mines, 1990.
[113] N. Kyriazi and J. Shubilla, "Report of Investigations 9401: Self-Contained Self-Rescuer
Field Evaluation: Results from 1982-90," US Department of the Interior, Bureau of
Mines, 1992.
256
[114] N. Kyriazi and J. Shubilla, "Report of Investigations 9499: Self-Contained Self-Rescuer
Field Evaluation: Fourth-Phase Results," US Department of the Interior, Bureau of
Mines, 1994.
[115] N. Kyriazi and J. Shubilla, "Report of Investigations 9635: Self-Contained Self-Rescuer
Field Evaluation: Fifth-Phase Results," US Department of the Interior, Bureau of Mines,
1996.
[116] N. Kyriazi and J. Shubilla, "Information Circular 9451: Self-Contained Self-Rescuer
Field Evaluation: Sixth-Phase Results," US Department of Health and Human Services,
Centers for Disease Control and Prevention, 2000.
[117] N. Kyriazi and J. Shubilla, "Report of Investigations 9656: Self-Contained Self-Rescuer
Field Evaluation: Seventh-Phase Results," Centers for Disease Control and Prevention
(CDC), National Institute for Occupational Safety and Health (NIOSH), 2002.
[118] National Institute for Occupational Safety and Health, "Report of Investigations 9671:
Self-Contained Self-Rescuer Long Term Field Evaluation Combined Eighth and Ninth
Phase Results," Centers for Disease Control and Prevention (CDC), National Institute for
Occupational Safety and Health (NIOSH), 2006.
[119] National Institute for Occupational Safety and Health, "Report of Investigations 9675:
Self-Contained Self-Rescuer Long Term Field Evaluation Tenth Phase Results," Centers
for Disease Control and Prevention (CDC), National Institute for Occupational Safety and
Health (NIOSH), 2008.
257
[120] S. J. Schafrik, C. Dietrich and C. Harwood, "Geolocation for underground coal mining
applications: Classification of systems," Mining Engineering, vol. 66, no. 4, pp. 22-48,
April 2014.
[121] N. Damiano, G. Homce and R. Jacksha, "A Review of Underground Coal Mine
Emergency Communications and Tracking System Installations," Coal Age, pp. 34-35,
November 2014.
[122] T. Novak, D. P. Snyder and J. L. Kohler, "Postaccident Mine Communications and
Tracking Systems," IEEE Transactions on Industry Applications, vol. 46, no. 2, pp. 712-
719, 2010.
[123] D. J. R. Martin, "Leaky-feeder radio communications: A historical review," Proceedings
of the 34th IEEE Vehicle Technology Conference, vol. 34, pp. 25-30, 1984.
[124] C. Sunderman and J. Waynert, "An Overview of Underground Coal Miner Electronic
Tracking System Technologies," in 2012 IEEE Industry Applications Society Annual
Meeting, Las Vegas, NV, 2012.
[125] Department of Labor, "Underground Mine Rescue Equipment and Technology (RIN
1219-AB44)," Federal Register, pp. 4224 - 4226, 25 January 2006.
[126] MSHA, "List of Commenters: 30 CFR Part 49: Underground Mine Rescue Equipment
and Technology - Request for Information: RIN 1219-AB44," 27 March 2006. [Online].
Available: https://arlweb.msha.gov/regs/comments/06-722/minerescueequipment.asp.
258
[127] D. Chirdon, T. Barkand, N. Damiano, K. Dolinar, G. Dransite, J. Hill, P. Retzer and W.
Shumaker, Emergency Communication and Tracking Committee Underground
Communication and Tracking Systems Tests at CONSOL Energy Inc., McElroy Mine,
Mine Safety and Health Administration, 2006.
[128] K. Stricklin and M. Skiles, "Guidance for Compliance with Post-Accident Two-Way
Communications and Electronic Tracking Requirements of the Mine Improvement and
New Emergency Response Act (MINER Act)," Program Policy Letter No. P09-V-01, 16
January 2009.
[129] K. G. Stricklin and L. F. Zeiler, "Guidance for Compliance with Post-Accident Two-Way
Communications and Electronic Tracking Requirements of the Mine Improvement and
New Emergency Response Act (MINER Act)," Program Policy Letter No. P11-V-13, 28
April 2011.
[130] K. G. Stricklin and G. Fesak, "Revised Guidance for Compliance with Post-Accident
Two-Way Communication and Electronic Tracking Requirements of the Mine
Improvement and New Emergency Response Act of 2006 (MINER Act)," Program
Policy Letter No. P14-V-01, 27 March 2014.
[131] K. G. Stricklin, N. H. Merrifield and L. F. Zeiler, "Approval of Communication and
Tracking Devices Required by the Mine Improvement and New Emergency Response
Act of 2006 (MINER Act)," Program Policy Letter No. P11-V-11, 14 April 2011.
259
[132] K. G. Stricklin and G. M. Fesak, "Re-Issue of P11-V-07 - Two-Way Communication and
Electronic Tracking System: Potential Interference of RF Electromagnetic Fields with
Electric Blasting Circuits," Program Policy Letter No. P13-V-09, 12 July 2013.
[133] K. G. Stricklin and L. F. Zeiler, "Inspection of Post-Accident Communication and
Electronic Tracking Systems," Procedure Instruction Letter No. I11-V-06, 7 June 2011.
[134] NIOSH, "Mining Contracts," 31 August 2017. [Online]. Available:
https://www.cdc.gov/niosh/mining/researchprogram/contracts/index.html.
[135] A. D. Douglas, Status of Communication and Tracking Technologies in Underground
Coal Mines, University of Kentucky, 2014.
[136] NIOSH, "Basic Tutorial on Wireless Communication and Electronic Tracking:
Technology Overview," 6 February 2013. [Online]. Available:
https://www.cdc.gov/niosh/mining/content/emergencymanagementandresponse/commtra
cking/commtrackingtutorial1.html.
[137] NIOSH, "Advanced Tutorial on Wireless Communication and Electronic Tracking," 25
October 2013. [Online]. Available:
https://www.cdc.gov/niosh/mining/content/emergencymanagementandresponse/commtra
cking/advcommtrackingtutorial1.html.
260
[138] C. Zhou, J. Waynert, T. Plass and R. Jacksha, "Attenuation Constants of Radio Waves in
Lossy-Walled Rectangular Waveguides," Progress In Electromagnetics Research, vol.
142, pp. 75-105, 2013.
[139] C. Zhou and J. Waynert, "The Equivalence of the Ray Tracing and Modal Methods for
Modeling Radio Propagation in Lossy Rectangular Tunnels," IEEE Antenas and WIreless
Propagation Letters, vol. 13, pp. 615-618, 2014.
[140] C. Zhou, T. Plass, R. Jacksha and J. Waynert, "RF Propagation in Mines and Tunnels,"
IEEE Antennas & Propagation Magazine, pp. 88-102, August 2015.
[141] C. Zhou and R. Jacksha, "Modeling and Measurement of Radio Propagation in Tunnel
Environments," IEEE Antennas and Wireless Propagation Letters, 2016.
[142] C. Zhou, "Ray Tracing and Modal Methods for Modeling Radio Propagation in Tunnels
With Rough Walls," IEEE Transactions on Antennas and Propagation, vol. 65, no. 5, pp.
2624-2634, 2017.
[143] R. Jacksha and C. Zhou, "Measurement of RF propagation around corners in underground
mines and tunnels," Transactions of the society for mining, metallurgy & exploration,
vol. 340, pp. 30-37, 2016.
[144] A. C. Yucel, W. Sheng, C. Zhou, Y. Liu, H. Bagci and E. Michielssen, "An FMM-FFT
Accelerated SIE Simulator for Analyzing EM Wave Propagation in Mine Environments
261
Loaded With Conductors," IEEE Journal On Multiscale and Multiphysics Computational
Techniques, vol. 3, pp. 3-15, 2018.
[145] M. Hedley and I. Gipps, "Accurate Wireless Tracking for Underground Mining," in IEEE
International Conference on Communications 2013: IEEE ICC'13 - Workshop on
Advances in Network Localization and Navigation (ANLN), 2013.
[146] S. Dayekh, S. Affes and C. Nerguizian, "Cooperative Geo-location in Underground
Mines: A Novel Fingerprint Positioning Technique Exploiting Spatio-Temporal
Diversity," in 2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile
Radio Communications, Piscataway, NJ, 2011.
[147] A. Fink and H. Beikirch, "MineLoc - Personnel Tracking SYstem for Longwall Coal
Mining Sites," IFAC-PapersOnLine, vol. 48, no. 10, pp. 215-221, 2015.
[148] Y.-X. Chen, "Underground Coal Mine Positioning System Based on RSSI Positioning
Algorithm Improved Through the BP Learning Training," The Open Fuels & Energy
Science Journal, vol. 8, pp. 281-286, 2015.
[149] V. Savic, J. Ferrer-Coll, P. Angskog, J. Chilo, P. Stenumgaard and E. G. Larsson,
"Measurement Analysis and Channel Modeling for TOA-Based Ranging in Tunnels,"
IEEE Transactions on Wireless Communications, vol. 14, no. 1, pp. 456-467, 2015.
[150] X. Zhang, Smart Sensor and Tracking System for Underground Mining, Saskatoon,
Saskatchewan, Canada: University of Saskatchewan, 2016.
262
[151] F. J. L. Pereira, Positioning Systems for Underground Tunnel Environments,
Universidade do Porto, 2016.
[152] C. Huntley and D. Chirdon, Remote Controlled Continuous Mining Machine Fatal
Accident Analysis Report of Victim’s Physical Location with Respect to the Machine, US
Department of Labor, Mine Safety and Health Administration, 2014.
[153] MSHA, "Proximity Detection / Collision Warning Single Source Page," 2016. [Online].
Available:
http://www.msha.gov/Accident_Prevention/NewTechnologies/ProximityDetection/Proxi
mitydetectionSingleSource.asp.
[154] T. M. Ruff and D. Hession-Kunz, "Application of radio frequency identification systems
to collision avoidance in metal/nonmetal mines," in IEEE Industry Applications
Conference, 1998.
[155] W. H. Schiffbauer and G. L. Mowrey, "An environmentally robust proximity warning
system for hazardous areas," in Proceedings of the ISA Emerging Technologies
Conference , 2001.
[156] W. H. Schiffbauer, "Active proximity warning system for surface and underground
mining applications," Mining Engineering, vol. 54, no. 12, pp. 40-48, 2002.
263
[157] L. J. Steinter and W. H. Schiffbauer, "Human factors design and evaluation of a close
proximity warning device," in Proceedings of the Human Factors and Ergonomics
Society Annual Meeting , 2000.
[158] W. H. Schiffbauer, "Mobile machine hazardous working zone warning system". United
States Patent US 5939986 A, 1999.
[159] W. H. Schiffbauer, "Non-directional magnet field based proximity receiver with multiple
warning and machine shutdown capability". United States Patent US 6810353 B2, 2004.
[160] J. R. Bartels, S. Gallagher and D. H. Ambrose, "Continuous mining: a pilot study of the
role of visual attention locations and work position in underground coal mines,"
Professional Safety, vol. 54, no. 8, 2009.
[161] J. R. Bartels, C. C. Jobes, D. J. P. and T. J. Lutz, "Evaluation of work positions used by
continuous miner operators in underground coal mines," in Proceedings of the Human
Factors and Ergonomics Society Annual Meeting, 2009.
[162] J. L. Carr, C. C. Jobes and J. Li, "Development of a method to determine operator
location using electromagnetic proximity detection," in IEEE International Workshop on
Robotic and Sensors Environments (ROSE), 2010.
[163] C. Jobes, J. Carr and J. DuCarme, "Evaluation of an Advanced Proximity Detection
System for Continuous Mining Machines," International Journal of Applied Engineering
Research, vol. 7, no. 6, 2012.
264
[164] J. L. Carr and J. P. DuCarme, "Performance of an Intelligent Proximity Detection System
for Continuous Mining Machines," in SME Annual Meeting and Exhibit, Denver, CO,
2013.
[165] J. Li, J. Carr, J. Waynert and P. Kovalchik, "Environmental impact on the magnetic field
distribution of a magnetic proximity detection system in an underground coal mine,"
Journal of Electromagnetic Waves and Applications, vol. 27, no. 18, pp. 2416-2429,
2013.
[166] E. J. Haas and K. A. Rost, "Integrating technology: Learning from mine worker
perceptions of proximity detection systems," in Proceedings of the 144th Annual Society
for Mining, Metallurgy, & Exploration Conference , Denver, 2015.
[167] E. J. Haas and J. P. DuCarme, "A Different Perspective: NIOSH researchers learn from
CM operator responses to proximity detection systems," Coal Age, October 2015.
[168] J. L. Carr, T. J. Lutz and M. A. Reyes, "Field Evaluations of Proximity Detection
Technology on Continuous Mining Machines," in SME Annual Meeting and Exhibit, Salt
Lake City, UT, 2014.
[169] MSHA, "Notice to Underground Coal Mine Operators: Proximity Detection System
(PDS) Interference," 2 May 2016. [Online]. Available: https://www.msha.gov/notice-
underground-coal-mine-operators-proximity-detection-system-pds-interference.
265
[170] J. Noll, R. Matetic, J. Li and C. Zhou, "Electromagnetic interference from personal dust
monitors and other electronic devices with proximity detection systems," Mining
Engineering, vol. 70, no. 5, pp. 61 - 68, May 2018.
[171] D. A. Trotter, The Lighting of Underground Mines, Trans Tech Publications, 1982.
[172] H. H. Clark and L. C. Ilsley, "Ignition of Mine Gases by the Filaments of Incandescent
Electric Lamps," US Bureau of Mines Bulletin 52, 1913.
[173] H. H. Clark, "Permissible Electric Lamps for Miners," US Bureau of Mines Technical
Paper 75, 1914.
[174] L. C. Ilsley and A. B. Hooker, "Permissible Electric Mine Lamps," US Bureau of Mines
Bulletin 332, 1930.
[175] H. H. Clark and L. C. Ilsley, "Approved Electric Lamps for Miners," U.S. Bureau of
Mines Bulletin 131, 1917.
[176] J. J. Sammarco and J. L. Carr, "Mine Illumination: A Historical and Technological
Perspective," in 2010 SME Annual Meeting and Exhibit, Phoenix, Arizona, 2010.
[177] S. P. Howell, A. C. Fieldner and L. C. Ilsley, "Permissible Explosives, Mining
Equipment, and apparatus, Approved Prior to March 15, 1922," US Bureau of Mines
Technical Paper 307, 1922.
266
[178] L. C. Ilsley, A. B. Hooker and W. H. Roadstrum, "Investigations of Permissible Electric
Mine Lamps 1930-40," US Bureau of Mines Bulletin 441, 1942.
[179] F. E. Cash, "Electric Cap Lamps in Alabama Mines," US Bureau of Mines Information
Circular 6865, 1935.
[180] H. H. Clark and C. M. Means, "Suggested Safety Rules for Installing and Using Electrical
Equipment in Bituminous Coal Mines," US Bureau of Mines Technical Paper 138, 1916.
[181] A. B. Hooker and D. H. Zellers, "Factors that Decrease the Light of Electric Cap Lamps,"
US Bureau of Mines Report of Investigations 3292, 1935.
[182] D. H. Zellers and A. B. Hooker, "Maintaining the Permissibility of Electric Cap Lamps,"
US Bureau of Mines Informaiton Circular 6832, 1935.
[183] R. Vines, K. Klouse, G. R. Bockosh, R. E. Slone, G. Evans and G. Becket, "Panel
Discussion - Illumination," in Proceedings of the 8th Annual Institute on Coal Mining
Health, Safety and Research, Blacksburg, Virginia, 1977.
[184] L. C. Hitchcock, "Development of Minimum Luminance Requirements for Underground
Coal Mining Tasks," Research and Development Department, Naval Ammunition Depot,
1973.
[185] J. W. Blakely, "Problems Remain i n U nderground Lighting; New Regulations
Forthcoming," Coal Mining & Processing, vol. 58, 1976.
267
[186] N. P. Chironis, "Underground M ine Lighting . .. A look at What's New in Concepts and
E quipment," Coal Age, pp. 66-76, 1974.
[187] K. Klouse, "Measurement Procedures Proceedings: Bureau of Mines Technology
Transfer Seminars: Coal Mine Illumination," US Bureau of Mines Information Circular
8709, 1976.
[188] C. E. Lester, "Mining Enforcement and Safety Administration Review of New
Rulemaking in Mine Illumination," in Proceedings: Bureau o f Mines Technology
Transfer Seminars: Coal Mine Illumination. US Bureau of Mines Information Circular
8709, 1976.
[189] J. W. Crawford, "Impact of US Legislation on Equipment Manufacturers," Colliery
Guardian International, 1978.
[190] T. M. Okon and J. R. Biard, "The First Practical LED," Edison Tech Center, 9 November
2015. [Online]. Available:
http://edisontechcenter.org/lighting/LED/TheFirstPracticalLED.pdf.
[191] M. P. Mills, "The LED Illumination Revolution," Forbes, 27 February 2008.
[192] MSHA, "Approval And Certification Center: Electric Cap Lamps Approved Under Part
19," Mine Safety and Health Administration, 12 October 2018. [Online]. Available:
https://arlweb.msha.gov/TECHSUPP/ACC/lists/19lamps.pdf.
268
[193] N. Pal, P. K. Sadhu, R. P. Gupta and U. Prasad, "Review of LED Based Cap Lamps for
Underground Coalmines to Improve Energy Efficiency as Compared to Other Light
Sources," in The 2nd International Conference on Computer and Automation
Engineering (ICCAE), 2010.
[194] J. J. Sammarco, J. P. Freyssinier, J. D. Bullough, X. Zhang and M. A. Reyes,
"Technological Aspects of Solid-State and Incandescent Sources for Miner Cap Lamps,"
IEEE Transactions on Industry Applications, vol. 45, no. 5, pp. 1583-1588, 2009.
[195] H. Mishra, Study of Application of LED Lighting System in Mines, National Institute of
Technology Rourkela, 2012.
[196] J. J. Sammarco, S. Gallagher and M. A. Reyes, "Visual performance for trip hazard
detection when using incandescent and led miner cap lamps," Journal of Safety Research,
vol. 41, pp. 85-91, 2010.
[197] J. J. Sammarco and T. J. Lutz, "Visual Performance for Incandescent and Solid-State Cap
Lamps in an Underground Mining Environment," IEEE Transactions on Industry
Applications, vol. 47, no. 5, pp. 2301-2306, 2011.
[198] J. J. Sammarco, M. A. Reyes, J. R. Bartels and S. Gallagher, "Evaluation of Peripheral
Visual Performance When Using Incandescent and LED Miner Cap Lamps," IEEE
Transactions on Industry Applications, vol. 45, no. 6, pp. 1923-1929, 2009.
269
[199] J. J. Sammarco, J. P. Pollard, W. L. Porter, P. G. Dempsey and C. T. Moore, "The effect
of cap lamp lighting on postural control and stability," International Journal of Industrial
Ergonomics, vol. 42, pp. 377-383, 2012.
[200] T. J. Lutz, J. J. Sammarco, J. R. Srednicki and S. Gallagher, "Comparison of cap lamp
and laser illumination for detecting visual escape cues in smoke," Transactions of the
Society of Mining, Metallurgy, and Exploration, vol. 334, no. 1, pp. 401-409, 2013.
[201] J. J. Sammarco, A. G. Mayton, T. J. Lutz and S. Gallagher, "Discomfort Glare
Comparison for Various LED Cap Lamps," IEEE Transactions on Industry APplications,
vol. 47, no. 3, pp. 1168-1174, 2011.
[202] S. Tak, R. D. Davis and G. M. Calvert, "Exposure to hazardous workplace noise and use
of hearing protection devices among US workers," American Journal of Industrial
Medicine, vol. 52, pp. 358-371, 2009.
[203] E. A. Masterson, S. Tak, C. L. Themann, D. K. Wall, M. R. Groenewold, J. A. Deddens
and G. M. Calvert, "Prevalence of Hearing Loss in the United States by Industry,"
American Journal of Industrial Medicine, vol. 56, pp. 670-681, 2013.
[204] K. D. Kryter, The Handbook of Hearing and the Effects of Noise, San Diego, California:
Academic Press, 1994.
270
[205] T. J. Horberry, R. Burgess-Limerick and L. J. Steiner, Human Factors for the Design,
Operation, and Maintenance of Mining Equipment, Boca Raton, Florida: CRC Press,
2011.
[206] J. A. Lamonica, R. L. Mundell and T. L. Muldoon, Noise in Underground Coal Mines,
US Bureau of Mines, 1971.
[207] NIOSH, Survey of Hearing Loss in the Coal Mining Industry, Cincinnati, OH: National
Institute for Occupational Safety and Health, 1976.
[208] W. W. Aljoe, T. G. Bobick, G. W. Redmond and R. C. Bartholomae, The Bureau of
Mines Noise-Control Research Program: A 10-Year Review, US Bureau of Mines, 1985.
[209] R. C. Bartholomae and R. P. Parker, Mining Machinery Noise Control Guidelines,
Pittsburgh, PA: US Bureau of Mines, 1983.
[210] R. Matetic, R. F. Randolph and P. G. Kovalchik, "Hearing Loss in the Mining Industry:
The Evolution of NIOSH and Bureau of Mines Hearing Loss Research," in Extracting the
Science: A Century of Mining Research, J. Brune, Ed., Littleton, Colorado, Society for
Mining, Metallurgy, and Exploration, Inc, 2010, pp. 23-29.
[211] NIOSH, Preventing Occupational Hearing Loss--A Practical Guide, Cincinnati, OH:
National Institute for Occupational Safety and Health, 1996.
[212] NIOSH, Criteria for a Recommended Standard: Occupational Noise Exposure,
Cincinnati, Ohio: National Institute for Occupational Safety and Health, 1998.
271
[213] NIOSH, NIOSH criteria for a recommended standard: occupational exposure to noise,
Cincinnati, Ohio: National Institute for Occupational Safety and Health, 1972.
[214] MSHA, "Noise: Advance notice of proposed rulemaking (RIN 1219-AA53)," Federal
Register, vol. 54, no. 231, pp. 50209-50213, 4 December 1989.
[215] MSHA, "Health Standards for Occupational Noise Exposure: Proposed rule (RIN 12-19-
AA53)," Federal Register, vol. 61, no. 243, pp. 66348-66469, 17 December 1996.
[216] MSHA, "Health Standards for Occupational Noise Exposure: Proposed Rule: Extension
of comment period and notice of hearings (RIN 1219-AA53)," Federal Register, vol. 62,
no. 25, pp. 5554-5555, 6 February 1997.
[217] MSHA, "Noise Samples Data Set," [Online]. Available:
https://arlweb.msha.gov/OpenGovernmentData/DataSets/NoiseSamples.zip.
[218] MSHA, "Health Standards for Occupational Noise Exposure in Coal, Metal and
Nonmetal Mines: Proposed Rule: availability: request for comments (RIN 1219-AA53),"
Federal Register, vol. 62, no. 246, pp. 67013-67014, 23 December 1997.
[219] NIOSH, Prealence of Hearing Loss for Noise Exposed Metal/Nonmetal Miners,
Cincinatti, Ohio: National Institute for Occupational Safety and Health, 1997.
[220] MSHA, "Health Standards for Occupational Noise Exposure: Final Rule (RIN 1219-
AA53)," Federal Register, vol. 64, no. 176, pp. 49548-49634, 13 September 1999.
272
[221] J. S. Peterson and R. C. Bartholomae, "Design and instrumentation of a large
reverberation chamber," in NOISE-CON 2003, Ames, IA, 2003.
[222] E. R. Bauer, D. R. Babich and J. S. Vipperman, Equipment Noise and Worker Exposure
in the Coal Mining Industry (IC 9492), Pittsburgh, PA: National Institute for
Occupational Safety and Health, 2006.
[223] P. G. Kovalchik, M. Johnson, R. Burdisso, F. Duda and M. Durr, "Noise Control for
Continuous Miners," in Proceedings from the 10th International Meeting on Low
Frequency Noise and Vibration and its Control, York, England, 2002.
[224] E. R. Spencer, A. K. Smith, L. A. Alcorn and P. G. Kovalchik, "Underground Evaluation
of Coated Flight Bars for a Continuous Mining Machine," in Inter-Noise 2006.,
Honolulu, Hawaii, 2006.
[225] A. K. Smith, Engineering Controls for Reducing Continuous Mining Machine Noise
(Technology News 531), Pittsburgh, PA: National Institute for Occupational Safety and
Health, 2008.
[226] A. K. Smith, P. G. Kovalchik, L. A. Alcorn and R. J. Matetic, "A dual sprocket chain as a
noise control for a continuous mining machine," Noise Control Engineering Journal, vol.
57, no. 5, pp. 413-419, 2009.
[227] A. K. Smith, D. S. Yantek and J. S. Peterson, "Development And Evaluation Of A
Urethane Jacketed Tail Roller For Continuous Mining Machines," in Proceedings of the
273
ASME 2007 International Mechanical Engineering Congress and Exposition
(IMECE2007), 2007.
[228] Komatsu, "Continuous Miner Conveyor Chains," Komatsu Mining Corp. Group, 2017.
[Online]. Available: https://mining.komatsu/docs/default-source/product-
documents/underground/underground-service-products-and-consumables/en-gjspcmcc01-
0616-v1.pdf?sfvrsn=8c68f06b_22.
[229] MSHA, "Program Information Bulletin No. P14-02: Reissue of P08-12 - Technologically
Achievable, Administratively Achievable, and Promising Noise Controls (30 CFR Part
62)," Mine Safety and Health Administration, 2014.
[230] G. J. Joy and P. J. Middendorf, "Noise exposure and hearing conservation in US coal
mines: A surveillance report," Journal of Occupational and Environmental Hygeine, vol.
4, pp. 26-35, 2007.
[231] B. Roberts, K. Sun and R. L. Neitzel, "What can 35 years and over 700,000
measurements tell us about noise exposure in the mining industry?," International
Journal of Audiology, vol. 56, pp. S4-S12, 2017.
[232] K. Sun and A. S. Azman, "Evaluating hearing loss risks in the minign industry through
MSHA citations," Journal of Occupational and Environmental Hygiene, vol. 15, no. 3,
pp. 246-262, 2018.
274
[233] D. S. Yantek, J. S. Peterson and A. K. Smith, "Application of a Microphone Phased Array
to Identify Noise Sources on a Roof Bolting Machine," in NOISE-CON 2007, Reno, NV,
2007.
[234] J. S. Peterson, Collapsible Drill Steel Enclosure for Reducing Roof Bolting Machine
Drilling Noise (Technology News 532), Pittsburgh, PA: National Institute for
Occupational Safety and Health, 2008.
[235] P. G. Kovalchik, A. K. Smith, R. J. Matetic and J. S. Peterson, "Noise Controls for Roof
Bolting Machines," Mining Engineering, vol. 61, no. 1, pp. 74-78, 2009.
[236] J. S. Peterson, P. G. Kovalchik and D. Yantek, "Development of roof-bolting machine bit
and chuck isolators for drilling noise reductions," in Proceedings of the ASME 2009
International Mechanical Engineering Congress & Exposition, IMECE2009, Lake Buena
Vista, Florida, 2009.
[237] D. S. Yantek, J. S. Peterson, R. Michael and E. Ferro, "The Evolution of Drill Bit and
Chuck Isolators to Reduce Roof Bolting Machine Drilling Noise," Transactions of the
Society of Mining, Metallurgy, and Exploration, vol. 330, pp. 429-437, 2012.
[238] R. J. Matetic, P. G. Kovalchik, J. S. Peterson and L. A. Alcorn, "A Noise Control for a
Roof Bolting Machine: Collapsible Drill Steel Enclosure," in NOISE-CON 2008:
Proceedings of the 2008 National Conference on Noise Control Engineering, 2008.
[239] M. J. Lowe, J. S. Peterson, D. S. Yantek, L. A. Alcorn and R. Michael, "A control suite to
reduce roof bolting machine drilling noise," in NOISE-CON 2010: Proceedings of the
275
2010 National Conference on Noise Control Engineering and 159th Meeting of the
Acoustical Society of America, 2010.
[240] A. S. Azman, D. S. Yantek and L. A. Alcorn, "Evaluations of a noise control for roof
bolting machines," Mining Engineering, vol. 64, no. 12, pp. 64-70, 2012.
[241] D. S. Yantek, Investigation of Temperature Rise in Mobile Refuge Alternatives (RI
9695), National Institute for Occupational Safety and Health, 2014.
[242] L. Yan, D. S. Yantek, P. Bissert and M. Klein, "In-mine experimental investigation of
temperature rise and development of a validated thermal simulation model of a mobile
refuge alternative," in ASME 2015 International Mechanical Engineering Congress and
Exposition, 2015.
[243] L. Yan, D. S. Yantek, M. Klein, P. Bissert and R. J. Matetic, "Validation of temperature
and humidity thermal model of 23-person tent-type refuge alternative," Mining
Engineering, vol. 68, no. 9, 2016.
[244] L. Yan, D. S. Yantek, M. A. Reyes, N. Damiano, J. Srednicki, J. Bickson, B. Whisner and
E. Bauer, "Cooling Systems for Refuge Alternatives in Hot Mine Conditions," in ASME
2018 International Mechanical Engineering Congress and Exposition, 2018.
[245] D. S. Yantek, "Update on Blast Resistance of BIP RA Doors," in NIOSH Refuge
Alternative Workshop, Bruceton, PA, 2018.
276
[246] J. Homer, "Relief Valve Research for Refuge Alternatives," in NIOSH Refuge Alternative
Workshop, Bruceton, PA, 2018.
[247] T. J. Lutz, J. D. Noll and L. Yan, "Evaluation of Contamination Ingress for Built-in-place
Refuge Alternatives," in SME Annual Meeting, Minneapolis, MN, 2018.
[248] J. Bickson, D. S. Yantek, J. R. Srednicki and M. A. Reyes, "Effect of Ventilation System
Layout on Purging of Harmful Gases In a Built-in-place Refuge Alternative with a
Borehole Air Supply," in SME Annual Meeting, Denver, CO, 2019.
[249] N. Schwarz, H. Bless, F. Strack, G. Klumpp, H. Rittenauer-Schatka and A. Simons, "Ease
of Retrieval as Information: Another Look at the Availability Heuristic," Journal of
Personality and Social Psychology, 1991.
[250] T. Kuran and C. R. Sunstein, "Availability Cascades and Risk Regulation," Stanford Law
Review, 1998.
[251] A. Colman, Oxford Dictionary of Psychology, New York: Oxford University Press, 2003.
[252] R. W. Brislin, "Cross-Cultural Research Methods: Strategies, Problems, Applications," in
Environment and Culture, Springer, 1980, p. 73.
[253] T. Kogut and I. Ritov, "The 'Identified Victim' Effect: An Identified Group, or Just a
Single Individual?," Journal of Behavioral Decision Making, pp. 157-167, 2005.
277
[254] M. E. Oswald and S. Grosjean, "Confirmation Bias," in Cognitive Illusions: A Handbook
on Fallacies and Biases in Thinking, Judgement and Memory, Hove, UK, Psychology
Press, 2004, pp. 79-96.
[255] J. Baron, Thinking and Deciding (Second Edition), Cambridge University Press, 1994.
[256] D. Hardman, Judgment and decision making: psychological perspectives, Wiley-
Blackwell, 2009.
[257] NASA, "Technology Readiness Levels: Introduction," 21 October 2004. [Online].
Available: https://web.archive.org/web/20051206035043/http://as.nasa.gov/aboutus/trl-
introduction.html.
Vita
Jacob L. Carr
Education
PhD in Energy and Mineral Engineering: The Pennsylvania State University
Dissertation Title: “An Investigation into the Factors That Govern Success for New
Safety and Health Technologies in the Mining Industry and the Efficacy of those Factors
to Predict the Likelihood of Success for Emerging Technologies”
M.S. in Mining Engineering: University of Nevada, Reno
December, 2008; Thesis Title: “Application of Computer-Assisted Control Architecture
to the Operation of Large Surface Mining Shovels and Excavators”
B.S. in Mining Engineering: University of Nevada, Reno
December, 2006
Research Experience
Team Leader for the Machine Safety Team at NIOSH’s Pittsburgh Mining Research Division
2015 – Present
Safety Engineer at NIOSH’s Pittsburgh Mining Research Division
2009 – 2014
Graduate Research Assistant at the University of Nevada, Reno
2007 – 2008
Undergraduate Research Assistant at the University of Nevada, Reno
2004 – 2006
Professional Membership
Member of Society of Mining, Metallurgy, and Exploration (SME) since 2002
Honors and Awards
JW Woomer Young Engineer Award, 2018
University of Nevada, Reno, College of Science: Young Alumnus of the Year, 2017
Presidential Early Career Award for Scientists and Engineers (PECASE), 2016
Stefanko Best Paper Award, 2013
CDC & ATSDR Honor Award – Excellence in Leadership, 2013
Pittsburgh FEB Outstanding Professional Employee in a Medical/Scientific Field, 2012
University of Nevada, Reno: Outstanding B.S. Student, Mining Engineering, 2006
Publications
Author or co-author on more than 30 research publications, including conference papers, journal
articles, and book chapters on mining equipment automation, proximity detection systems, mine
illumination, RF and magnetic field propagation and modeling, and electromagnetic interference
mitigation.