Risk Modeling, Assessment, and Management / Edition 3

Hardcover (Print)
Used and New from Other Sellers
Used and New from Other Sellers
from $135.96
Usually ships in 1-2 business days
(Save 23%)
Other sellers (Hardcover)
  • All (11) from $135.96   
  • New (9) from $135.96   
  • Used (2) from $136.15   


Risk Modeling, Assessment, and Management describes the state of the art of risk analysis, a rapidly growing field with important applications in engineering, science, manufacturing, business, management, and public policy. It shows clearly how to quantify risk and construct probability in conjunction with real-world decision-making problems, including a host of institutional, organizational, political, and cultural considerations. Presenting basic concepts as well as advanced material, avoiding higher mathematics whenever possible, and incorporating numerous examples and case studies to illustrate the analytical methods under discussion, this book unites the latest theories and methodologies from diverse disciplines. Risk Modeling, Assessment, and Management is an essential reference for professionals working in universities, industry, and government: and for anyone interested in risk analysis in virtually any discipline.

"...unites the latest theories and methodologies from diverse disciplines; explains how to identify real, perceived, and imaginary risks; offers extensive coverage of the modeling process; and introduces advanced methodologies.

Read More Show Less

Editorial Reviews

From the Publisher
“This is a text for students of risk analysis, covering everything from the art of risk analysis to the statistics of extremes.” (Natural Hazards Observer, 1 March 2013)
A holistic exploration of risk that attempts to balance the quantitative and empirical dimensions of risk assessment and management with the more qualitative and normative aspects of decision making under risk and uncertainty. Haimes (risk analysis, U. of Virginia) shows how to quantify risk and construct probability in conjunction with real-world decision-making problems including institutional, organizational, political, and cultural considerations. He avoids higher mathematics whenever possible in his presentation of the material. Includes many case studies used to illustrate the analytical methods under discussion. Intended for risk management professionals working in universities, industry, and government. Annotation c. by Book News, Inc., Portland, Or.
Read More Show Less

Product Details

  • ISBN-13: 9780470282373
  • Publisher: Wiley
  • Publication date: 1/9/2009
  • Edition description: New Edition
  • Edition number: 3
  • Pages: 1040
  • Sales rank: 1,219,794
  • Product dimensions: 6.50 (w) x 9.30 (h) x 2.00 (d)

Meet the Author

Yacov Y. Haimes is the Lawrence R. Quarles Professor of Systems and Information Engineering and Civil Engineering. He is the Founding Director (1987) of the Center for Risk Management of Engineering Systems at the University of Virginia.

Read More Show Less

Table of Contents




1. The Art and Science of Systems and Risk Analysis.

1.1 Introduction.

1.2 Systems Engineering.

1.3 Risk Assessment and Management.

1.4 Concept Road Map: The Farmer's Dilemma.

1.5 Epilogue.


2. The Role of Modeling in the Risk Analysis Process.

2.1 Introduction.

2.2 The Risk Assessment and Management Process.

2.3 Information, Intelligence, and Models.

2.4 The Building Blocks of Mathematical Models.

2.5 The Farmer's Dilemma Revisited.

2.6 Example Problems.


3. Identifying Risk Through Hierarchical HolographicModeling.

3.1 Hierarchical Aspects.

3.2 Hierarchical Overlapping Coordination.

3.3 Hierarchical Holographic Modeling (HHM).

3.4 Hierarchical Holographic Modeling and the Theory of ScenarioStructuring.

3.5 Adaptive Multiplayer HHM (AMP-HHM) Game.

3.6 Water Resource System.

3.7 Sustainable Development.

3.8 HHM in a System Acquisition Project.

3.9 Software Acquisition.

3.10 Hardening the Water Supply Infrastructure.

3.11 Risk Assessment and Management for Support of OperationsOther Than War.

3.12 Automated Highway System.

3.13 Food-Poisoning Scenarios.


4. Decision Analysis.

4.1 Introduction.

4.2 Decision Rules Under Uncertainty.

4.3 Decision Trees.

4.4 Decision Matrix.

4.5 The Fractile Method.

4.6 Triangular Distribution.

4.7 Influence Diagrams.

4.8 Population Dynamics Models.

4.9 Phantom System Models.

4.10 Example Problems.


5. Multiobjective Trade-Off Analysis.

5.1 Introduction.

5.2 Examples of Multiple Environmental Objectives.

5.3 The Surrogate Worth Trade-off (SWT) Method.

5.4 Characterizing a Proper Noninferior Solution.

5.5 The Surrogate Worth Trade-off Method and the Utility.

Function Approach.

5.6 Example Problems.

5.7 Summary.


6. Defining Uncertainty and Sensitivity Analysis.

6.1 Introduction.

6.2 Sensitivity, Responsivity, Stability, andIrreversibility.

6.3 Uncertainties Due to Errors in Modeling.

6.4 Characterization of Modeling Errors.

6.5 Uncertainty Taxonomy.

6.6 The Uncertainty Sensitivity Index Method.

6.7 Formulation of the Multiobjective Optimization Problem.

6.8 A Robust Algorithm of the USIM.

6.9 Integration of the USIM with Parameter Optimization at theDesign Stage.

6.10 Conclusions.


7. Risk Filtering, Ranking, and Management.

7.1 Introduction.

7.2 Past Efforts in Risk Filtering and Ranking.

7.3 Risk Filtering, Ranking, and Management A MethodologicalFramework.

7.4 Case Study: An Operation Other Than War.

7.5 Summary.



8. Risk of Extreme Events and the Fallacy of ExpectedValue.

8.1 Introduction.

8.2 Risk of Extreme Events.

8.3 The Fallacy of the Expected Value.

8.4 The Partitioned Multiobjective Risk Method.

8.5 General Formulation of the PMRM.

8.6 Summary of the PMRM.

8.7 Illustrative Example.

8.8 Analysis of Dam Failure and Extreme Floods Through thePMRM.

8.9 Example Problems.

8.10 Summary.


9. Multiobjective Decision-Tree Analysis.

9.1 Introduction.

9.2 Methodological Approach.

9.3 Differences Between Single- and Multiple-Objective DecisionTrees.

9.4 Summary.

9.5 Example Problems.


10. Multiobjective Risk Impact Analysis Method.

10.1 Introduction.

10.2 Impact Analysis.

10.3 The Multiobjective, Multistage Impact Analysis Method: AnOverview.

10.4 Combining the PMRM and the MMIAM.

10.5 Relating Multiobjective Decision Trees to theMultiobjective Risk Impact Analysis Method.

10.6 Example Problems.

10.7 Epilogue.


11. Statistics of Extremes: Extension of the PMRM.

11.1 A Review of the Partitioned Multiobjective Risk Method.

11.2 Statistics of Extremes.

11.3 Incorporating the Statistics of Extremes into the PMRM.

11.4 Sensitivity Analysis of the Approximation off4 (·).

11.5 Generalized Quantification of Risk of Extreme Events.

11.6 Summary.

11.7 Example Problems.


12. Bayesian Analysis and the Prediction of ChemicalCarcinogenicity.

12.1 Background.

12.2 Calculating Sensitivity and Specificity.

12.3 Battery Selection.

12.4 Determining the Performance (Predictivity and Selectivity)of the Test Battery.

12.5 Trade-offs and Policy Analysis.


13. Fault Trees.

13.1 Introduction.

13.2 Basic Fault-Tree Analysis.

13.3 Reliability and Fault-Tree Analysis.

13.4 Minimal Cut Sets.

13.5 The Distribution Analyzer and Risk Evaluator Using FaultTrees.

13.6 Extreme Events in Fault-Tree Analysis.

13.7 An Example Problem Based on a Case Study.

13.8 Failure Mode and Effects Analysis (FMEA); Failure Mode,Effects, and Criticality Analysis (FMECA).

13.9 Event Trees. 

13.10 Example Problems.


14. Multiobjective Statistical Method.

14.1 Introduction.

14.2 Mathematical Formulation of the Interior DrainageProblem.

14.3 Formulation of the Optimization Problem.

14.4 The Multiobjective Statistical Method (MSM):Step-by-Step.

14.5 The Surrogate Worth Trade-off (SWT) Method.

14.6 Multiple Objectives.

14.7 Applying the MSM.

14.8 Example Problems.


15. Principles and Guidelines for Project RiskManagement.

15.1 Introduction.

15.2 Definitions and Principles of Project Risk Management.

15.3 Project Risk Management Methods.

15.4 Aircraft Development Example.

15.5 Quantitative Risk Assessment and Management of SoftwareAcquisition.

15.6 Critical Factors That Affect Software NontechnicalRisk.

15.7 Basis for Variances in Cost Estimation.

15.8 Discrete Dynamic Modeling.

15.9 Summary.


16. Applying Risk Analysis to Space Missions.

16.1 Introduction.

16.2 Overview of Selected Space Missions.

16.3 Risk Analysis Examples for Selected Space Missions.

16.4 Hierarchical Holographic Modeling.

16.5 Risk Filtering, Ranking, and Management.

16.6 Epilogue.


17. Risk Modeling, Assessment, and Management ofTerrorism.

17.1 Overview.

17.2 On the Definition of Vulnerabilities in Measuring Risks toInfrastructures.

17.3 Risk-Based Methodology for Scenario Tracking, IntelligenceGathering, and Analysis for Countering Terrorism.

17.4 Homeland Security Preparedness: Balancing Protection withResilience in Emergent Systems.

17.5 Risk of Terrorism to Information Technology and to CriticalInterdependent Infrastructures.


18. Inoperability Input-Output Model and Its Derivatives forInterdependent Infrastructure Sectors.

18.1 Overview.

18.2 Background: The Original Leontief I/O Model.

18.3 Inoperability Input-Output Model (IIM).

18.4 Regimes of Recovery.

18.5 Supporting Databases for IIM Analysis.

18.6 National and Regional Databases for IIM Analysis.

18.7 Regional Input-Output Multiplier System (RIMS II).

18.8 Development of IIM and Its Derivatives.

18.9 The Dynamic IIM.

18.10 Practical Uses of IIM.

18.11 Uncertainty IIM.

18.12 Example Problems.

18.13 Summary.


19. Case Studies.

19.1 A Risk-Based Input-Output Methodology for Measuring theEffects of the August 2003 Northeast Blackout.

19.2 Systemic Valuation of Strategic Preparedness ThroughApplying the Inoperability Input-Output Model with Lessons Learnedfrom Hurricane Katrina.

19.3 Ex Post Analysis Using the IIM of the September 11, 2001Attack on the US.

19.4 Risk Modeling, Assessment, and Management of Lahar FlowThreat.

19.5 The Statistics of Extreme Events and 6-SigmaCapability.


Appendix: Optimization Techniques.

A.1 Introduction to Modeling and Optimization.

A.2 Classical Unconstrained Optimization Problems.

A.3 Classical Equality Constraint Problem.

A.4 Newton-Raphson Method.

A.5 Linear Programming.

A.6 Dynamic Programming.

A.7 Generalized Nonlinear Programming.

A.8 Multiobjective Decision Trees.

A.9 Derivation of the Expected Value of a Log-normalDistribution.

A.10 Derivation of the Conditional Expected Value of aLog-normal Distribution.

A.11 Triangular Distribution: Unconditional and ConditionalExpected Values.

A.12 Standard Normal Distribution Probability Table.



Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)