Hazard Analysis Techniques for System Safety / Edition 1

Hazard Analysis Techniques for System Safety / Edition 1

by Clifton A. Ericson II
     
 

ISBN-10: 0471720194

ISBN-13: 9780471720195

Pub. Date: 07/22/2005

Publisher: Wiley

A practical guide to identifying hazards using common hazard analysis techniques

Many different hazard analysis techniques have been developed over the past forty years. However, there is only a handful of techniques that safety analysts actually apply in their daily work. Written by a former president of the System Safety Society and winner of the Boeing

…  See more details below

Overview

A practical guide to identifying hazards using common hazard analysis techniques

Many different hazard analysis techniques have been developed over the past forty years. However, there is only a handful of techniques that safety analysts actually apply in their daily work. Written by a former president of the System Safety Society and winner of the Boeing Achievement and Apollo Awards for his safety analysis work, Hazard Analysis Techniques for System Safety explains, in detail, how to perform the most commonly used hazard analysis techniques employed by the system safety engineering discipline.

Focusing on the twenty-two most commonly used hazard analysis methodologies in the system safety discipline, author Clifton Ericson outlines the three components that comprise a hazard and describes how to use these components to recognize a hazard during analysis. He then examines each technique in sufficient detail and with numerous illustrations and examples, to enable the reader to easily understand and perform the analysis.

Techniques covered include:

  • Preliminary Hazard List (PHL) Analysis
  • Preliminary Hazard Analysis (PHA)
  • Subsystem Hazard Analysis (SSHA)
  • System Hazard Analysis (SHA)
  • Operating and Support Hazard Analysis (O&SHA)
  • Health Hazard Assessment (HHA)
  • Safety Requirements/Criteria Analysis (SRCA)
  • Fault Tree Analysis (FTA)
  • Event Tree Analysis (ETA)
  • Failure Mode and Effects Analysis (FMEA)
  • Fault Hazard Analysis
  • Functional Hazard Analysis
  • Sneak Circuit Analysis (SCA)
  • Petri Net Analysis (PNA)
  • Markov Analysis (MA)
  • Barrier Analysis (BA)
  • Bent Pin Analysis (BPA)
  • HAZOP Analysis
  • Cause Consequence Analysis (CCA)
  • Common Cause Failure Analysis (CCFA)
  • MORT Analysis
  • Software Safety Assessment (SWSA)

Written to be accessible to readers with a minimal amount of technical background, Hazard Analysis Techniques for System Safety gathers, for the first time in one source, the techniques that safety analysts actually apply in daily practice. Both new and seasoned analysts will find this book an invaluable resource for designing and constructing safe systems—— in short, for saving lives.

Read More

Product Details

ISBN-13:
9780471720195
Publisher:
Wiley
Publication date:
07/22/2005
Edition description:
Older Edition
Pages:
528
Sales rank:
812,991
Product dimensions:
6.40(w) x 9.25(h) x 1.25(d)

Table of Contents

PREFACE.

ACKNOWLEDGMENTS.

1. System Safety.

1.1 Introduction.

1.2 System Safety Background.

1.3 System Safety Characterization.

1.4 System Safety Process.

1.5 System Concept.

1.6 Summary.

2. Hazards, Mishap, and Risk.

2.1 Introduction.

2.2 Hazard-Related Definitions.

2.3 Hazard Theory.

2.4 Hazard Actuation.

2.5 Hazard Causal Factors.

2.6 Hazard–Mishap Probability.

2.7 Recognizing Hazards.

2.8 Hazard Description.

2.9 Summary.

3. Hazard Analysis Types and Techniques.

3.1 Types and Techniques.

3.2 Description of Hazard Analysis Types.

3.3 Timing of Hazard Analysis Types.

3.4 Interrelationship of Hazard Analysis Types.

3.5 Hazard Analysis Techniques.

3.6 Inductive and Deductive Techniques.

3.7 Qualitative and Quantitative Techniques.

3.8 Summary.

4. Preliminary Hazard List.

4.1 Introduction.

4.2 Background.

4.3 History.

4.4 Theory.

4.5 Methodology.

4.6 Worksheet.

4.7 Hazard Checklists.

4.8 Guidelines.

4.9 Example: Ace Missile System.

4.10 Advantages and Disadvantages.

4.11 Common Mistakes to Avoid.

4.12 Summary.

5. Preliminary Hazard Analysis.

5.1 Introduction.

5.2 Background.

5.3 History.

5.4 Theory.

5.5 Methodology.

5.6 Worksheet.

5.7 Guidelines.

5.8 Example: Ace Missile System.

5.9 Advantages and Disadvantages.

5.10 Common Mistakes to Avoid.

5.11 Summary.

6. Subsystem Hazard Analysis.

6.1 Introduction.

6.2 Background.

6.3 History.

6.4 Theory.

6.5 Methodology.

6.6 Worksheet.

6.7 Guidelines.

6.8 Example: Ace Missile System.

6.9 Advantages and Disadvantages.

6.10 Common Mistakes to Avoid.

6.11 Summary.

7. System Hazard Analysis.

7.1 Introduction.

7.2 Background.

7.3 History.

7.4 Theory.

7.5 Methodology.

7.6 Worksheet.

7.7 Guidelines.

7.8 Example.

7.9 Advantages and Disadvantages.

7.10 Common Mistakes to Avoid.

7.11 Summary.

8. Operating and Support Hazard Analysis.

8.1 Introduction.

8.2 Background.

8.3 History.

8.4 Definitions.

8.5 Theory.

8.6 Methodology.

8.7 Worksheet.

8.8 Hazard Checklists.

8.9 Support Tools.

8.10 Guidelines.

8.11 Examples.

8.12 Advantages and Disadvantages.

8.13 Common Mistakes to Avoid.

8.14 Summary.

9. Health Hazard Assessment.

9.1 Introduction.

9.2 Background.

9.3 History.

9.4 Theory.

9.5 Methodology.

9.6 Worksheet.

9.7 Checklist.

9.8 Example.

9.9 Advantages and Disadvantages.

9.10 Common Mistakes to Avoid.

9.11 Summary.

10. Safety Requirements/Criteria Analysis.

10.1 Introduction.

10.2 Background.

10.3 History.

10.4 Theory.

10.5 Methodology.

10.6 Worksheets.

10.7 Example.

10.8 Advantages and Disadvantages.

10.9 Common Mistakes to Avoid.

10.10 Summary.

11. Fault Tree Analysis.

11.1 Introduction.

11.2 Background.

11.3 History.

11.4 Theory.

11.5 Methodology.

11.6 Functional Block Diagrams.

11.7 Cut Sets.

11.8 MOCUS Algorithm.

11.9 Bottom-Up Algorithm.

11.10 Mathematics.

11.11 Probability.

11.12 Importance Measures.

11.13 Example 1.

11.14 Example 2.

11.15 Example 3.

11.16 Phase- and Time-Dependent FTA.

11.17 Dynamic FTA.

11.18 Advantages and Disadvantages.

11.19 Common Mistakes to Avoid.

11.20 Summary.

12. Event Tree Analysis.

12.1 Introduction.

12.2 Background.

12.3 History.

12.4 Definitions.

12.5 Theory.

12.6 Methodology.

12.7 Worksheet.

12.8 Example 1.

12.9 Example 2.

12.10 Example 3.

12.11 Example 4.

12.12 Advantages and Disadvantages.

12.13 Common Mistakes to Avoid.

12.14 Summary.

13. Failure Mode and Effects Analysis.

13.1 Introduction.

13.2 Background.

13.3 History.

13.4 Definitions.

13.5 Theory.

13.6 Methodology.

13.7 Worksheet.

13.8 Example 1: Hardware Product FMEA.

13.9 Example 2: Functional FMEA.

13.10 Level of Detail.

13.11 Advantages and Disadvantages.

13.12 Common Mistakes to Avoid.

13.13 Summary.

14. Fault Hazard Analysis.

14.1 Introduction.

14.2 Background.

14.3 History.

14.4 Theory.

14.5 Methodology.

14.6 Worksheet.

14.7 Example.

14.8 Advantages and Disadvantages.

14.9 Common Mistakes to Avoid.

14.10 Summary.

15. Functional Hazard Analysis.

15.1 Introduction.

15.2 Background.

15.3 History.

15.4 Theory.

15.5 Methodology.

15.6 Worksheets.

15.7 Example 1: Aircraft Flight Functions.

15.8 Example 2: Aircraft Landing Gear Software.

15.9 Example 3: Ace Missile System.

15.10 Advantages and Disadvantages.

15.11 Common Mistakes to Avoid.

15.12 Summary.

16. Sneak Circuit Analysis.

16.1 Introduction.

16.2 Background.

16.3 History.

16.4 Definitions.

16.5 Theory.

16.6 Methodology.

16.7 Example 1: Sneak Path.

16.8 Example 2: Sneak Label.

16.9 Example 3: Sneak Indicator.

16.10 Example Sneak Clues.

16.11 Software Sneak Circuit Analysis.

16.12 Advantages and Disadvantages.

16.13 Common Mistakes to Avoid.

16.14 Summary.

17. Petri Net Analysis (PNA).

17.1 Introduction.

17.2 Background.

17.3 History.

17.4 Definitions.

17.5 Theory.

17.6 Methodology.

17.7 Examples.

17.8 Advantages and Disadvantages.

17.9 Common Mistakes to Avoid.

17.10 Summary.

18. Markov Analysis.

18.1 Introduction.

18.2 Background.

18.3 History.

18.4 Definitions.

18.5 Theory.

18.6 Methodology.

18.7 Examples.

18.8 Markov Analysis and FTA Comparisons.

18.9 Advantages and Disadvantages.

18.10 Common Mistakes to Avoid.

18.11 Summary.

19. Barrier Analysis.

19.1 Introduction.

19.2 Background.

19.3 History.

19.4 Definitions.

19.5 Theory.

19.6 Methodology.

19.6.1 Example Checklist of Energy Sources.

19.6.2 Considerations.

19.7 Worksheet.

19.8 Example.

19.9 Advantages and Disadvantages.

19.10 Common Mistakes to Avoid.

19.11 Summary.

20. Bent Pin Analysis.

20.1 Introduction.

20.2 Background.

20.3 History.

20.4 Theory.

20.5 Methodology.

20.6 Worksheet.

20.7 Example.

20.8 Advantages and Disadvantages.

20.9 Common Mistakes to Avoid.

20.10 Summary.

21. Hazard and Operability Analysis.

21.1 Introduction.

21.2 Background.

21.3 History.

21.4 Theory.

21.5 Methodology.

21.5.1 Design Representations.

21.5.2 System Parameters.

21.5.3 Guide Words.

21.5.4 Deviation from Design Intent.

21.6 Worksheet.

21.7 Example 1.

21.8 Example 2.

21.9 Advantages and Disadvantages.

21.10 Common Mistakes to Avoid.

21.11 Summary.

22. Cause–Consequence Analysis.

22.1 Introduction.

22.2 Background.

22.3 History.

22.4 Definitions.

22.5 Theory.

22.6 Methodology.

22.7 Symbols.

22.8 Worksheet.

22.9 Example 1: Three-Component Parallel System.

22.10 Example 2: Gas Pipeline System.

22.10.1 Reducing Repeated Events.

22.11 Advantages and Disadvantages.

22.12 Common Mistakes to Avoid.

22.13 Summary.

23. Common Cause Failure Analysis.

23.1 Introduction.

23.2 Background.

23.3 History.

23.4 Definitions.

23.5 Theory.

23.6 Methodology.

23.7 Defense Mechanisms.

23.8 Example.

23.9 Models.

23.10 Advantages and Disadvantages.

23.11 Common Mistakes to Avoid.

23.12 Summary.

24. Management Oversight Risk Tree Analysis.

24.1 Introduction.

24.2 Background.

24.3 History.

24.4 Theory.

24.5 Methodology.

24.6 Worksheet.

24.7 Advantages and Disadvantages.

24.8 Common Mistakes to Avoid.

24.9 Summary.

25. Software Safety Assessment.

25.1 Introduction.

25.2 Background.

25.3 History.

25.4 Theory.

25.5 Methodology.

25.6 Worksheet.

25.7 Software Risk Level.

25.8 Example.

25.9 Advantages and Disadvantages.

25.10 Common Mistakes to Avoid.

25.11 Summary.

26. Summary.

26.1 Principle 1: Hazards, Mishaps, and Risk are Not Chance Events.

26.2 Principle 2: Hazards are Created During Design.

26.3 Principle 3: Hazards are Comprised of Three Components.

26.4 Principle 4: Hazard and Mishap Risk Management Is the Core Safety Process.

26.5 Principle 5: Hazard Analysis Is a Key Element of Hazard and Mishap Risk Management.

26.6 Principle 6: Hazard Management Involves Seven Key Hazard Analysis Types.

26.7 Principle 7: Hazard Analysis Primarily Encompasses Seven Hazard Analysis Techniques.

26.8 Finis.

Appendix A: List of Acronyms.

Appendix B: Glossary.

Appendix C: Hazard Checklists.

Index.

Read More

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >