Risk Assessment. Marvin Rausand

Risk Assessment - Marvin Rausand


Скачать книгу
1Table 1.1 Some past major accidents.Table 1.2 Risk arenas that may be subject to risk analysis.

      2 Chapter 2Table 2.1 The wordrisk as used in some Internet newspapers (in 2018). Table 2.2 Risk related to a system (example).Table 2.3 Examples of hazards.Table 2.4 Hazards, enabling events and conditions, and initiating events.Table 2.5 Generic hazard list (not exhaustive).Table 2.6 Some types of assets.Table 2.7 Some types of harm to different assets.Table 2.8 Consequence spectrum for a study object (example).Table 2.9 Categories of barriers.

      3 Chapter 3Table 3.1 Applicability of analysis methods in the various phases of a system...

      4 Chapter 5Table 5.1 ALARP limits in the United Kingdom.

      5 Chapter 6Table 6.1

for some selected types of occupations in Norway, based on the avera...Table 6.2 Annual deaths per million for various age groups in the United King...Table 6.3 Annual risk of death from industrial accidents to employees for var...Table 6.4 Individual risk criteria for various installations.Table 6.5 Experienced
values for Norway for the period 2013–2017.Table 6.6 Experienced
values for the United Kingdom.Table 6.7 Experienced
for offshore workers in the United Kingdom and Norweg...Table 6.8 Frequency categories.Table 6.9 Classification of consequences according to their severity.Table 6.10 Severity classification in MIL‐STD‐882E (2012).Table 6.11 Estimated average reduction in life expectancy due to various caus...

      6 Chapter 7Table 7.1 Stages of development in risk communication.

      7 Chapter 8Table 8.1 Accident types.Table 8.2 Causes of airplane accidents 1992–2001.Table 8.3 Causes of car accidents (Example 8.4).Table 8.4 Basic risk factors.Table 8.5 Attributes of interactive complexity.Table 8.6 Attributes of tight coupling.Table 8.7 Characteristics of tight and loose coupling systems.Table 8.8 A brief comparison of accident models.

      8 Chapter 9Table 9.1 A simple data dossier for a risk analysis.

      9 Chapter 10Table 10.1 Hazards for a ship (Example 10.1).Table 10.2 List of generic hazardous events on offshore oil and gas installat...Table 10.3 Process/system checklist for the design phase.Table 10.4 Questions used to identify hazards (partly based on CCOHS (2009)).Table 10.5 Generic HAZOP guidewords.Table 10.6 Extract of interpretation of HAZOP guidewords for use in CHAZOP (C...Table 10.7 Generic causes of unsafe control actions.

      10 Chapter 11Table 11.1 Some basic causes of hazardous events.Table 11.2 Fault tree symbols.Table 11.3 Criticality ranking of minimal cut sets of order 2.Table 11.4 Example of a conditional probability table (CPT) for a node with t...Table 11.5 Truth table for a fault tree with a singleAND‐gate and two basic e...Table 11.6 Conditional probability table corresponding to a fault tree with a...Table 11.7 Conditional probability table corresponding to a fault tree with a...Table 11.8 Possible states of a system of two pumps.Table 11.9 Possible states for the pumping system in Example 11.3 .

      11 Chapter 13Table 13.1 Comparison of the

‐factor model, the MGL model, and the
‐fact...

      12 Chapter 14Table 14.1 Intervals of the average probability of failure on demand (

) an...Table 14.2 Survey of relevant risk‐influencing factors (RIFs).Table 14.3 State scores for RIFs.

      13 Chapter 15Table 15.1 Typical human errors.Table 15.2 Errors of omission and errors of commission.Table 15.3 Performance‐influencing factors (not exhaustive).Table 15.4 Human HAZOP guidewords.Table 15.5 Human HAZOP guidewords.Table 15.6 SHERPA error mode taxonomy.

      14 Chapter 16Table 16.1 Examples of activity types in the MIRMAP risk models

      15 Chapter 17Table 17.1 Examples of potential internal and external threat actors.Table 17.2 Simple threat rating.Table 17.3 Procedure for rating threat actors (constructed example).Table 17.4 Vulnerability rating.Table 17.5 Procedure for rating vulnerabilities (constructed example).

      List of Illustrations

      1 Chapter 1Figure 1.1 The Beauvais Cathedral (Source: Photo by David Iliff. License: CC...

      2 Chapter 2Figure 2.1 Hazard (a), event (b), and consequence (c) (Example 2.4).Figure 2.2 An accident scenario and related concepts illustrated in a bow‐ti...Figure 2.3 Two different choices of hazardous events, (a) early in the event...Figure 2.4 Failure and fault of a degrading item.Figure 2.5 Consequence spectrum for a hazardous event.Figure 2.6 Loss spectrum for a hazardous event

.Figure 2.7 The concepts of threat, threat actor, and vulnerability.

      3 Chapter 3Figure 3.1 Risk assessment as a combination of risk analysis and risk evalua...Figure 3.2 The six steps of a risk assessment.Figure 3.3 Step 1: Plan the risk assessment.Figure 3.4 Risk assessment in the decision‐making process.Figure 3.5 Step 2: Define the study.Figure 3.6 Step 3: Identify hazards and initiating events.Figure 3.7 Step 4: Develop accident scenarios and describe consequences.Figure 3.8 Step 5: Determine and assess the risk.

      4 Chapter 4Figure 4.1 System breakdown structure (simplified).Figure 4.2 A system and its boundary.Figure 4.3 Black box model for a component function.Figure 4.4 The system modeling and analysis process.Figure 4.5


Скачать книгу