Risk analysis : socio-technical and industrial systems / Jean-Marie Flaus.
An overview of the methods used for risk analysis in a variety of industrial sectors, with a particular focus on the consideration of human aspects, this book provides a definition of all the fundamental notions associated with risks and risk management, as well as clearly placing the discipline of...
Saved in:
Online Access: |
Full Text (via Wiley) |
---|---|
Main Author: | |
Format: | eBook |
Language: | English |
Published: |
London : Hoboken, NJ :
ISTE ; Wiley,
2013.
|
Series: | Systems engineering series.
|
Subjects: |
MARC
LEADER | 00000cam a2200000xi 4500 | ||
---|---|---|---|
001 | b12217468 | ||
003 | CoU | ||
005 | 20220513050510.0 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 130823s2013 enka ob 001 0 eng d | ||
010 | |z 2013940050 | ||
019 | |a 960204939 |a 961593131 |a 962570447 |a 988538076 |a 992111411 |a 992824353 |a 1037715991 |a 1038687073 |a 1045542290 |a 1055356995 |a 1065820392 |a 1081208617 |a 1086968249 |a 1114430660 |a 1153516022 |a 1162512803 |a 1290094829 |a 1303434706 | ||
020 | |a 9781118790021 |q (oBook) | ||
020 | |a 1118790022 |q (oBook) | ||
020 | |a 9781299805217 |q (ebook) | ||
020 | |a 1299805213 |q (ebook) | ||
020 | |a 1848214928 | ||
020 | |a 9781848214927 | ||
020 | |a 9781118789964 |q (e-book) | ||
020 | |a 1118789962 |q (e-book) | ||
020 | |z 9781848214927 |q (print) | ||
020 | |a 1118789997 | ||
020 | |a 9781118789995 | ||
024 | 8 | |a 11082451 | |
035 | |a (OCoLC)wol856625874 | ||
035 | |a (OCoLC)856625874 |z (OCoLC)960204939 |z (OCoLC)961593131 |z (OCoLC)962570447 |z (OCoLC)988538076 |z (OCoLC)992111411 |z (OCoLC)992824353 |z (OCoLC)1037715991 |z (OCoLC)1038687073 |z (OCoLC)1045542290 |z (OCoLC)1055356995 |z (OCoLC)1065820392 |z (OCoLC)1081208617 |z (OCoLC)1086968249 |z (OCoLC)1114430660 |z (OCoLC)1153516022 |z (OCoLC)1162512803 |z (OCoLC)1290094829 |z (OCoLC)1303434706 | ||
040 | |a IDEBK |b eng |e rda |e pn |c IDEBK |d OCLCQ |d CUS |d OCLCO |d E7B |d YDXCP |d CDX |d CCO |d OCLCF |d OCLCQ |d DG1 |d OCLCQ |d COO |d OCLCQ |d LOA |d OCLCQ |d COCUF |d DG1 |d Z5A |d MOR |d LIP |d PIFPO |d ESU |d OCLCQ |d U3W |d OCLCQ |d STF |d WRM |d NRAMU |d VT2 |d OCLCQ |d WYU |d OCLCQ |d UKAHL |d OCLCQ |d HS0 |d W2U |d UKCRE |d BOL |d VLY |d VHC | ||
049 | |a GWRE | ||
050 | 4 | |a HM1101 | |
066 | |c (S | ||
100 | 1 | |a Flaus, Jean-Marie, |e author. |0 http://id.loc.gov/authorities/names/nb2013020230. | |
245 | 1 | 0 | |a Risk analysis : |b socio-technical and industrial systems / |c Jean-Marie Flaus. |
264 | 1 | |a London : |b ISTE ; |a Hoboken, NJ : |b Wiley, |c 2013. | |
300 | |a 1 online resource (xiv, 371 pages) : |b illustrations. | ||
336 | |a text |b txt |2 rdacontent. | ||
337 | |a computer |b c |2 rdamedia. | ||
338 | |a online resource |b cr |2 rdacarrier. | ||
340 | |g polychrome. |2 rdacc. | ||
347 | |a text file |2 rdaft. | ||
490 | 1 | |a Systems engineering series. | |
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |6 880-01 |a pt. 1. General concepts and principles -- pt. 2. Knowledge representation -- pt. 3. Risk analysis methods -- pt. 4. Appendices. | |
520 | |a An overview of the methods used for risk analysis in a variety of industrial sectors, with a particular focus on the consideration of human aspects, this book provides a definition of all the fundamental notions associated with risks and risk management, as well as clearly placing the discipline of risk analysis within the broader context of risk management processes.The author begins by presenting a certain number of basic concepts, followed by the general principle of risk analysis. He then moves on to examine the ISO31000 standard, which provides a specification for the implementat. | ||
546 | |a English. | ||
588 | 0 | |a Print version record. | |
650 | 0 | |a Risk assessment. |0 http://id.loc.gov/authorities/subjects/sh87002638. | |
650 | 7 | |a Risk assessment. |2 fast |0 (OCoLC)fst01098146. | |
776 | 0 | 8 | |i Print version: |a Flaus, Jean-Marie. |t Risk Analysis. |d Wiley-ISTE, 2013 |z 9781848214927. |
830 | 0 | |a Systems engineering series. |0 http://id.loc.gov/authorities/names/n92030897. | |
856 | 4 | 0 | |u https://colorado.idm.oclc.org/login?url=https://onlinelibrary.wiley.com/doi/book/10.1002/9781118790021 |z Full Text (via Wiley) |
880 | 0 | 0 | |6 505-01/(S |g Machine generated contents note: |g ch. 1 |t Introduction -- |g 1.1. |t What is risk management'-- |g 1.2. |t Nature of risks -- |g 1.3. |t Evolution of risk management -- |g 1.4. |t Aims of this book -- |g ch. 2 |t Basic Notions -- |g 2.1. |t Formalization of the notion of risk -- |g 2.2. |t Hazard and sources of hazard -- |g 2.3. |t Stakes and targets -- |g 2.4. |t Vulnerability and resilience -- |g 2.5. |t Undesirable events and scenarios -- |g 2.6. |t Accidents and incidents -- |g 2.7. |t Safety -- |g 2.8. |t Likelihood, probability and frequency -- |g 2.9. |t Severity and intensity -- |g 2.10. |t Criticality -- |g 2.11. |t Reducing risk: prevention, protection and barriers -- |g 2.12. |t Risk analysis and risk management -- |g 2.13. |t Inductive and deductive approaches -- |g 2.14. |t Known risks and emerging risks -- |g 2.15. |t Individual and societal risks -- |g 2.16. |t Acceptable risk -- |g 2.17. |t The ALARP and ALARA principles -- |g 2.18. |t Risk maps -- |g ch. 3 |t Principles of Risk Analysis Methods -- |g 3.1. |t Introduction -- |g 3.2. |t Categories of targets and damages -- |g 3.3. |t Classification of sources and undesirable events -- |g 3.3.1. |t General points -- |g 3.3.2. |t Case of occupational risks -- |g 3.3.3. |t Case of major industrial risks -- |g 3.4. |t Causes of technical origin -- |g 3.4.1. |t Material failures -- |g 3.4.2. |t Failures in software and information systems -- |g 3.4.3. |t Failures linked to fluids and products -- |g 3.5. |t Causes linked to the natural or manmade environment -- |g 3.6. |t Human and organizational factors -- |g 3.6.1. |t Reason's analysis of the human factor -- |g 3.6.2. |t Tripod classification of organizational failures -- |g ch. 4 |t The Risk Management Process (ISO31000) -- |g 4.1. |t Presentation -- |g 4.2. |t IS031000 standard -- |g 4.2.1. |t Basic principles -- |g 4.2.2. |t The organizational framework -- |g 4.3. |t Implementation: the risk management process -- |g 4.3.1. |t Establishing the context -- |g 4.3.2. |t Risk assessment -- |g 4.3.3. |t Treatment of risk -- |g 4.3.4. |t Communication and consultation -- |g 4.3.5. |t Monitoring and review -- |g 4.3.6. |t Risk evaluation methods -- |g ch. 5 |t Modeling Risk -- |g 5.1. |t Introduction -- |g 5.2. |t Degradation flow models -- |g 5.2.1. |t Source-target model -- |g 5.2.2. |t Reason's model -- |g 5.2.3. |t From source-target to causal modeling -- |g 5.3. |t Causal modeling -- |g 5.3.1. |t Fishbone cause-effect diagram -- |g 5.3.2. |t Causal trees -- |g 5.3.3. |t Fault tree -- |g 5.3.4. |t Consequence or event trees -- |g 5.3.5. |t Bow-tie diagram -- |g 5.3.6. |t Scenario -- |g 5.3.7. |t Bayesian networks -- |g 5.4. |t Modeling dynamic aspects -- |g 5.4.1. |t Markov model -- |g 5.4.2. |t Dynamic fault tree -- |g 5.5. |t Summary -- |g ch. 6 |t Measuring the Importance of a Risk -- |g 6.1. |t Introduction -- |g 6.2. |t Assessing likelihood -- |g 6.2.1. |t Presentation -- |g 6.2.2. |t Quantitative scale -- |g 6.2.3. |t Qualitative scale -- |g 6.2.4. |t Determining likelihood values -- |g 6.3. |t Assessment of severity -- |g 6.3.1. |t Presentation -- |g 6.3.2. |t Quantitative indicators -- |g 6.3.3. |t Qualitative indicators -- |g 6.3.4. |t Determining a severity value -- |g 6.4. |t Risk assessment -- |g 6.4.1. |t Criticality -- |g 6.4.2. |t Risk matrices -- |g 6.4.3. |t Acceptability of a risk -- |g 6.5. |t Application to the case of occupational risks -- |g 6.5.1. |t Probability assessment -- |g 6.5.2. |t Severity assessment -- |g 6.5.3. |t Risk matrices -- |g 6.6. |t Application to the case of industrial risks -- |g 6.6.1. |t Probability assessment -- |g 6.6.2. |t Severity assessment -- |g 6.6.3. |t Risk matrices -- |g ch. 7 |t Modeling of Systems for Risk Analysis -- |g 7.1. |t Introduction -- |g 7.1.1. |t Why model a system-- |g 7.1.2. |t The modeling process -- |g 7.2. |t Systemic or process modeling -- |g 7.2.1. |t Principle -- |g 7.2.2. |t Hierarchical breakdown -- |g 7.3. |t Functional modeling -- |g 7.3.1. |t Identifying functions -- |g 7.3.2. |t IDEFO (SADT) representation -- |g 7.4. |t Structural modeling -- |g 7.5. |t Structuro-functional modeling -- |g 7.6. |t Modeling the behavior of a system -- |g 7.7. |t Modeling human tasks -- |g 7.7.1. |t Hierarchical task analysis (HTA) -- |g 7.7.2. |t Modeling using a decision/action flow diagram -- |g 7.7.3. |t Event tree modeling -- |g 7.8. |t Choosing an approach -- |g 7.9. |t Relationship between the system model and the risk model -- |g ch. 8 |t Preliminary Hazard Analysis -- |g 8.1. |t Introduction -- |g 8.2. |t Implementation of the method -- |g 8.2.1. |t Definition of context, information gathering and representation of the installation -- |g 8.2.2. |t Identification of hazards and undesirable events -- |g 8.2.3. |t Analysis of hazardous situations, consequences and existing barriers -- |g 8.2.4. |t Assessment of severity and frequency or likelihood -- |g 8.2.5. |t Proposing new barriers -- |g 8.2.6. |t Limitations -- |g 8.3. |t Model-driven PHA -- |g 8.4. |t Variations of PHA -- |g 8.4.1. |t Different forms of results tables -- |g 8.4.2. |t PHA in the chemical industry -- |g 8.5. |t Examples of application -- |g 8.5.1. |t Desk lamp -- |g 8.5.2. |t Chemical reactor -- |g 8.5.3. |t Automobile repair garage -- |g 8.5.4. |t Medication circuit -- |g 8.6. |t Summary -- |g ch. 9 |t Failure Mode and Effects Analysis -- |g 9.1. |t Introduction -- |g 9.2. |t Key concepts -- |g 9.2.1. |t Basic definitions -- |g 9.2.2. |t Causes of failure -- |g 9.2.3. |t The effects of a failure -- |g 9.2.4. |t Frequency or probability of a failure -- |g 9.2.5. |t The severity of a failure -- |g 9.2.6. |t Detection of a failure -- |g 9.2.7. |t Criticality of a failure and RPN -- |g 9.3. |t Implementation of the method -- |g 9.3.1. |t Analysis preparation -- |g 9.3.2. |t System modeling -- |g 9.3.3. |t Application of the analysis procedure -- |g 9.3.4. |t Review of the analysis and the measures to be taken -- |g 9.4. |t Model-based analysis -- |g 9.5. |t Limitations of the FMEA -- |g 9.5.1. |t Common cause failures -- |g 9.5.2. |t Other difficulties -- |g 9.6. |t Examples -- |g 9.6.1. |t Desk lamp -- |g 9.6.2. |t Chemical process -- |g ch. 10 |t Deviation Analysis Using the HAZOP Method -- |g 10.1. |t Introduction -- |g 10.2. |t Implementation of the HAZOP method -- |g 10.2.1. |t Preparing the study -- |g 10.2.2. |t Analysis of the study nodes -- |g 10.2.3. |t Causes and consequences of the deviation -- |g 10.2.4. |t Result tables -- |g 10.3. |t Limits and connections with other methods -- |g 10.4. |t Model-based analysis -- |g 10.5. |t Application example -- |g ch. 11 |t The Systemic and Organized Risk Analysis Method -- |g 11.1. |t Introduction -- |g 11.2. |t Implementation of part A -- |g 11.2.1. |t Modeling of the installation -- |g 11.2.2. |t Identification of the hazard sources -- |g 11.2.3. |t Building the scenarios -- |g 11.2.4. |t Assessment of the severity of the scenarios -- |g 11.2.5. |t Negotiation of the objectives -- |g 11.2.6. |t Proposing the barriers -- |g 11.3. |t Implementing part B -- |g 11.3.1. |t Identifying the possible dysfunction -- |g 11.3.2. |t Building the fault tree -- |g 11.3.3. |t Negotiation of quantified objectives -- |g 11.3.4. |t Barrier quantification -- |g 11.4. |t Conclusion -- |g ch. 12 |t Fault Tree Analysis -- |g 12.1. |t Introduction -- |g 12.2. |t Method description -- |g 12.3. |t Useful notions -- |g 12.3.1. |t Definitions -- |g 12.3.2. |t Graphical representation of events and connections -- |g 12.4. |t Implementation of the method -- |g 12.5. |t Qualitative and quantitative analysis -- |g 12.5.1. |t MOCUS algorithm -- |g 12.5.2. |t Probability calculations -- |g 12.5.3. |t Importance measures -- |g 12.6. |t Connection with the reliability diagram -- |g 12.7. |t Model-based approach -- |g 12.8. |t Examples -- |g 12.8.1. |t Desk lamp -- |g 12.8.2. |t Chemical process -- |g 12.9. |t Common cause failure analysis -- |g 12.9.1. |t Introduction -- |g 12.9.2. |t Identification of common causes -- |g 12.9.3. |t Common cause analysis -- |g 12.9.4. |t The β-factor method -- |g ch. 13 |t Event Tree and Bow-Tie Diagram Analysis -- |g 13.1. |t Event tree -- |g 13.1.1. |t Description -- |g 13.1.2. |t Building the event tree -- |g 13.1.3. |t Conversion into a fault tree -- |g 13.1.4. |t Probability assessment -- |g 13.2. |t Bow-tie diagram -- |g 13.2.1. |t Description -- |g 13.2.2. |t Assessment of the probability -- |g 13.2.3. |t Conversion into a fault tree -- |g ch. |
880 | 0 | 0 | |g 14 |t Human Reliability Analysis -- |g 14.1. |t Introduction -- |g 14.1.1. |t Objectives and context -- |g 14.1.2. |t Definitions -- |g 14.2. |t The stages of a probabilistic analysis of human reliability -- |g 14.3. |t Human error classification -- |g 14.3.1. |t Rasmussen's Skill -- Rule -- Knowledge (SRK) classification -- |g 14.3.2. |t The Reason classification -- |g 14.3.3. |t Errors of omission and commission -- |g 14.3.4. |t Pre-accidental and post-accidental errors -- |g 14.3.5. |t Classification based on a cognitive model of the activity -- |g 14.4. |t Analysis and quantification of human errors -- |g 14.4.1. |t Performance influencing factors -- |g 14.4.2. |t Error probability assessment -- |g 14.5. |t The SHERPA method -- |g 14.6. |t The HEART method -- |g 14.7. |t The THERP method -- |g 14.8. |t The CREAM method -- |g 14.9. |t Assessing these methods -- |g ch. 15 |t Barrier Analysis and Layer of Protection Analysis -- |g 15.1. |t Choice of barriers -- |g 15.2. |t Barrier classification -- |g 15.3. |t Barrier analysis based on energy flows -- |g 15.4. |t Barrier assessment -- |g 15.5. |t Safety instrumented systems -- |g 15.5.1. |t Introduction -- |g 15.5.2. |t IEC 61508 standard -- |g 15.5.3. |t Failures of an SIS -- |g 15.6. |t The LOPA method -- |g 15.6.1. |t Description -- |g 15.6.2. |t Scenario identification -- |g 15.6.3. |t Analysis of the scenarios -- |g 15.6.4. |t Identification of the frequency of initiating events -- |g 15.6.5. |t Identification of the safety barriers -- |g 15.6.6. |t Calculating the risk level of a scenario -- |g 15.6.7. |t Example -- |g 15.6.8. |t Conclusion -- |t Appendix 1. Occupational Hazard Checklists -- |t Appendix 2. Causal Tree Analysis -- |t Appendix 3. A Few Reminders on the Theory of Probability -- |t Appendix 4. Useful Notions in Reliability Theory -- |t Appendix 5. Data Sources for Reliability -- |t Appendix 6. A Few Approaches for System Modelling -- |t Appendix 7. Case Study: Chemical Process -- |t Appendix 8. XRisk Software. |
907 | |a .b122174689 |b 06-06-22 |c 05-19-22 | ||
998 | |a web |b 05-31-22 |c b |d b |e - |f eng |g enk |h 0 |i 1 | ||
907 | |a .b122174689 |b 06-01-22 |c 05-19-22 | ||
944 | |a MARS - RDA ENRICHED | ||
915 | |a I | ||
956 | |a Wiley Online Library eBooks | ||
956 | |b Wiley Online Library: Complete oBooks | ||
999 | f | f | |i a4bed726-0ff5-5ca8-9ed3-7b7c06023fb1 |s 045cb9d7-202d-5275-ad16-833d3b98356c |
952 | f | f | |p Can circulate |a University of Colorado Boulder |b Online |c Online |d Online |e HM1101 |h Library of Congress classification |i web |n 1 |