Risk Assessment
eBook - ePub

Risk Assessment

Tools, Techniques, and Their Applications

  1. English
  2. ePUB (mobile friendly)
  3. Available on iOS & Android
eBook - ePub

Risk Assessment

Tools, Techniques, and Their Applications

About this book

Guides the reader through a risk assessment and shows them the proper tools to be used at the various steps in the process

This brand new edition of one of the most authoritative books on risk assessment adds ten new chapters to its pages to keep readers up to date with the changes in the types of risk that individuals, businesses, and governments are being exposed to today. It leads readers through a risk assessment and shows them the proper tools to be used at various steps in the process. The book also provides readers with a toolbox of techniques that can be used to aid them in analyzing conceptual designs, completed designs, procedures, and operational risk.

Risk Assessment: Tools, Techniques, and Their Applications, Second Edition includes expanded case studies and real life examples; coverage on risk assessment software like SAPPHIRE and RAVEN; and end-of-chapter questions for students. Chapters progress from the concept of risk, through the simple risk assessment techniques, and into the more complex techniques. In addition to discussing the techniques, this book presents them in a form that the readers can readily adapt to their particular situation. Each chapter, where applicable, presents the technique discussed in that chapter and demonstrates how it is used.

  • Expands on case studies and real world examples, so that the reader can see complete examples that demonstrate how each of the techniques can be used in analyzing a range of scenarios
  • Includes 10 new chapters, including Bayesian and Monte Carlo Analyses; Hazard and Operability (HAZOP) Analysis; Threat Assessment Techniques; Cyber Risk Assessment; High Risk Technologies; Enterprise Risk Management Techniques
  • Adds end-of-chapter questions for students, and provides a solutions manual for academic adopters
  • Acts as a practical toolkit that can accompany the practitioner as they perform a risk assessment and allows the reader to identify the right assessment for their situation
  • Presents risk assessment techniques in a form that the readers can readily adapt to their particular situation

Risk Assessment: Tools, Techniques, and Their Applications, Second Edition is an important book for professionals that make risk-based decisions for their companies in various industries, including the insurance industry, loss control, forensics, all domains of safety, engineering and technical fields, management science, and decision analysis. It is also an excellent standalone textbook for a risk assessment or a risk management course.

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Risk Assessment by Lee T. Ostrom,Cheryl A. Wilhelmsen in PDF and/or ePUB format, as well as other popular books in Technology & Engineering & Industrial Health & Safety. We have over one million books available in our catalogue for you to explore.

Chapter 1
Introduction to Risk Assessment

On any given day, in every corner of the world, people are actively working, going to school, driving or taking mass transit to work, relaxing at home or on vacation, or even working at home. Some people are even finding the time to sleep. Those who are working perform jobs that range from cleaning animal kennels to serving as the head of state of a country. Every job, in fact every activity a human performs, has a hazard associated with it. The common hazards we all are exposed to include:
  • Slips, trips, and falls.
  • Illness and disease.
  • Food‐borne illness.
  • Transportation: car accidents, pedestrian accidents, and bicycle accidents.
  • Sports: organized sports (football, basketball, soccer) accidents and individual sports accidents (skiing, water sports, skate boarding).
  • Electrical‐related accidents.
  • Fires.
  • Weather‐related accidents.
  • Identity theft.
  • Internet intrusion.
On top of these more common hazards are specific/major hazards. For example, cleaning animal cages include:
  • Being attacked by the animal.
  • The bacteria, viruses, and parasites that might be in the animal waste.
  • The design of the cage might pose problems: size, shape, material of construction, and sharp edges.
  • The maintenance of the cage might pose problems: cleanliness, jagged metal or wood, and faulty locks/latches/gates/door.
  • The condition of the floor.
  • The electrical and/or HVAC system in the building.
  • The building environmental conditions.
The major hazards associated with being a head of state include:
  • Stress from decision making.
  • Stress from the potential for war.
  • Stress from political rivals.
  • Potential for assassination.
  • Potential for transportation accidents: airplane crashes (i.e. the President of Poland died in an airplane crash in Russia in 2010 (1).).
Hazardous occupations, for instance, firefighting, have numerous hazards associated with day‐to‐day activities. Risk assessment tools and techniques can be used to analyze individual jobs for risks. It is obvious that every activity the president does is analyzed for hazards. Jobs or tasks like firefighter, chemical plant worker, electrician, and even office workers are usually analyzed using tools such as job hazard analysis (2).
The focus of this book is analyzing complex systems, tasks, and combinations of tasks for hazards and the associated risks. Most of the major accidents that occur each year result from a series of events that come together in an accident chain or sequence and result in numerous deaths, environmental consequences, and property destruction. These accidents can occur anytime in the system's life cycle. One of the events from history that demonstrates this is the sinking of the Swedish ship Wasa (pronounced Vasa) on 10 August 1628 (3). The ship was fabricated between 1626 and 1628. In those days engineering of the ships was performed by the shipwright and he used his experience to determine factors such as the center of mass and the amount of ballast the ship should have. Because of various events, pressure was put on the shipbuilders to complete the ship ahead of the planned delivery time. The ship was completed and ready for sail on 10 August 1628. The ship was very ornately decorated and was heavily laden with armament. As the ship left port on its maiden voyage on that calm morning, a gust of wind hit the ship, filling her sails. The ship heeled to port and the sailors cut the sheets. The ship righted itself, but then another gust of wind hit the ship and it tipped to port far enough that water entered the gun ports. This was the event that led to the loss of the ship and approximately 30–50 lives. However, the loss of the ship was probably due to one of two design flaws: first the ship was probably too narrow for its height and, second, the ship did not carry enough ballast for the weight of its guns on the upper decks. A contributing factor was the height above sea level of the gun ports that allowed water to enter the ports when the ship listed to port. Since, as stated above, engineering of ships was more seat of the pants than a systematic design process, the real reason(s) for the disaster could only be speculated. The ship was raised from her watery grave in 1959 and has since been moved to a beautiful museum facility in Stockholm. The ship itself can be studied, but other factors such as whether the guns were properly secured, how many provisions were on the ship, and so forth will remain a mystery. Accidents can occur in any phase of a system's life cycle. For the Wasa accident, it occurred in the ship's initial phases.
A much more recent accident occurred on 23 February 2018, in Dallas, Texas, in which Atmos Energy, the country's largest natural gas distributor, caused an explosion and fire via a natural gas leak, killing one 12‐year‐old girl and injuring others (4). Atmos Energy also operates in Colorado, Kansas, Kentucky, Tennessee, Virginia, Louisiana, and Mississippi. The incident involved piping that leaked due to pressure on the piping. The accident investigators found that heavy rain caused underground pressure that pushed rock formations upward, which in turn caused pressure on the system, which caused the leakage. Aging pipes have since been replaced with a more flexible, high‐grade plastic. Weather and aging pipes were the primary drivers in the event.
Risk assessment tools and techniques, if applied systematically and appropriately, can point out these types of vulnerabilities in a system. The key term here is “systematic.” A risk assessment must be systematic in nature to be most effective and should begin early in the life cycle of complex systems. Preliminary hazard analysis (PHA) is an example of a tool that can be applied at the earliest phase of system development. As the design of a system progresses, other tools can be applied, such as failure mode and effects analysis (FMEA) and fault tree analysis (FTA). Probabilistic risk assessment (PRA) and human reliability analysis (HRA) are techniques used to analyze very complex systems. These tools usually require a well‐developed design, an operating philosophy, and at least working copies of procedures to provide enough mate...

Table of contents

  1. Cover
  2. Table of Contents
  3. Acknowledgments
  4. About the Companion Website
  5. Chapter 1: Introduction to Risk Assessment
  6. Chapter 2: Risk Perception
  7. Chapter 3: Risks and Consequences
  8. Chapter 4: Ecological Risk Assessment
  9. Chapter 5: Task Analysis Techniques
  10. Chapter 6: Preliminary Hazard Analysis
  11. Chapter 7: Primer on Probability and Statistics
  12. Chapter 8: Mathematical Tools for Updating Probabilities
  13. Chapter 9: Developing Probabilities
  14. Chapter 10: Quantifying the Unquantifiable
  15. Chapter 11: Failure Mode and Effects Analysis
  16. Chapter 12: Human Reliability Analyses
  17. Chapter 13: Critical Incident Technique
  18. Chapter 14: Basic Fault Tree Analysis Technique
  19. Chapter 15: Critical Function Analysis
  20. Chapter 16: Event Tree and Decision Tree Analysis
  21. Chapter 17: Probabilistic Risk Assessment
  22. Chapter 18: Probabilistic Risk Assessment Software
  23. Chapter 19: Qualitative and Quantitative Research Methods Used in Risk Assessment
  24. Chapter 20: Risk of an Epidemic
  25. Chapter 21: Vulnerability Analysis Technique
  26. Chapter 22: Developing Risk Model for Aviation Inspection and Maintenance Tasks
  27. Chapter 23: Risk Assessment and Community Planning
  28. Chapter 24: Threat Assessment
  29. Chapter 25: Project Risk Management
  30. Chapter 26: Enterprise Risk Management Overview
  31. Chapter 27: Process Safety Management and Hazard and Operability Assessment
  32. Chapter 28: Emerging Risks
  33. Chapter 29: Process Plant Risk Assessment Example
  34. Chapter 30: Risk Assessment Framework for Detecting, Predicting, and Mitigating Aircraft Material Inspection
  35. Chapter 31: Traffic Risks
  36. Acronyms
  37. Glossary
  38. End User License Agreement