SlideShare a Scribd company logo
1 of 33
Download to read offline
LIST	
  OF	
  
TOOLS	
  &	
  
TECHNIQUES	
  
RECOMMENDED
IN	
  ISO	
  31010
Brainstorming
produce	
  an	
  idea	
  or	
  way	
  of	
  
solving	
  a	
  problem	
  by	
  holding	
  
a	
  spontaneous	
  group	
  
discussion.
Structured	
  &	
  Semi-­‐structured	
  Interviews
A	
  semi-­‐structured	
  interview is	
  a	
  method	
  of	
  research used	
  most	
  often	
  in	
  the	
  social	
  sciences.	
  While	
  a	
  
structured	
  interview has	
  a	
  rigorous	
  set	
  of	
  questions	
  which	
  does	
  not	
  allow	
  one	
  to	
  divert,	
  a	
  semi-­‐
structured	
  interview is	
  open,	
  allowing	
  new	
  ideas	
  to	
  be	
  brought	
  up	
  during	
  the	
  interview	
  as	
  a	
  result	
  of	
  
what	
  the	
  interviewee	
  says.	
  The	
  interviewer	
  in	
  a	
  semi-­‐structured	
  interview	
  generally	
  has	
  a	
  framework	
  of	
  
themes	
  to	
  be	
  explored.
The	
  Delphi	
  method is	
  a	
  structured	
  communication	
  
technique or	
  method,	
  originally	
  developed	
  as	
  a	
  
systematic,	
  interactive	
  forecasting	
  method which	
  
relies	
  on	
  a	
  panel	
  of	
  experts.	
  The	
  experts	
  answer	
  
questionnaires	
  in	
  two	
  or	
  more	
  rounds.
Delphi Technique
Checklist	
  Technique
The	
  preliminary	
  hazard	
  analysis	
  
(PrHA)	
  technique	
  is	
  a	
  broad,	
  initial	
  
study	
  used	
  in	
  the	
  early	
  stages	
  of	
  
system	
  design.	
  It	
  focuses	
  on	
  (1)	
  
identifying	
  apparent	
  hazards,	
  (2)	
  
assessing	
  the	
  severity	
  of	
  potential	
  
accidents	
  that	
  could	
  occur	
  
involving	
  the	
  hazards,	
  and	
  (3)	
  
identifying	
  safeguards	
  for	
  reducing	
  
the	
  risks	
  associated	
  with	
  the	
  
hazards.	
  This	
  technique	
  focuses	
  on	
  
identifying	
  weaknesses	
  early	
  in	
  the	
  
life	
  of	
  a	
  system,	
  thus	
  saving	
  time	
  
and	
  money	
  that	
  might	
  be	
  required	
  
for	
  major	
  redesign	
  if	
  the	
  hazards	
  
were	
  discovered	
  at	
  a	
  later	
  date.	
  
Preliminary	
  Hazard	
  Analysis	
  
A	
  hazard	
  and	
  
operability	
  study	
  
(HAZOP)	
  is	
  a	
  
structured	
  and	
  
systematic	
  
examination	
  of	
  a	
  
complex	
  planned	
  
or	
  existing	
  process	
  
or	
  operation	
  in	
  
order	
  to	
  identify	
  
and	
  evaluate	
  
problems	
  that	
  
may	
  represent	
  
risks	
  to	
  personnel	
  
or	
  equipment.
HAZOP
Hazard	
  and	
  Operability	
  Study
Hazard	
  analysis	
  and	
  critical	
  control	
  points	
  or	
  
HACCP (/ˈhæsʌp/)	
  is	
  a	
  systematic	
  preventive	
  
approach	
  to	
  food	
  safety	
  from	
  biological,	
  
chemical,	
  and	
  physical	
  hazards	
  in	
  production	
  
processes	
  that	
  can	
  cause	
  the	
  finished	
  product	
  
to	
  be	
  unsafe,	
  and	
  designs	
  measurements	
  to	
  
reduce	
  these	
  risks	
  to	
  a	
  safe	
  level.
HACCP
Environmental	
  Risk	
  Assessment
An	
  environmental	
  risk	
  assessment	
  (ERA)	
  is	
  a	
  
process	
  of	
  predicting	
  whether	
  there	
  may	
  be	
  a	
  risk	
  
of	
  adverse	
  effects	
  on	
  the	
  environment	
  caused	
  by	
  a	
  
chemical	
  substance.	
  Environmental	
  exposure	
  
concentrations	
  of	
  a	
  chemical	
  are	
  predicted	
  and	
  
compared	
  to	
  predicted	
  no-­‐effect	
  concentrations	
  
for	
  different	
  environmental	
  compartments.	
  
Structure	
  What	
  if?	
  (SWIFT)
Scenario	
  analysis
is	
  a	
  process	
  of	
  analyzing	
  possible	
  
future	
  events	
  by	
  considering	
  
alternative	
  possible	
  outcomes	
  
(sometimes	
  called	
  "alternative	
  
worlds").	
  Thus,	
  scenario	
  analysis,	
  
which	
  is	
  one	
  of	
  the	
  main	
  forms	
  of	
  
projection,	
  does	
  not	
  try	
  to	
  show	
  one	
  
exact	
  picture	
  of	
  the	
  future.
Business	
  Impact	
  Analysis
Risk	
  Assessment
Business	
  Impact	
  Analysis
Root	
  cause	
  analysis (RCA)	
  is	
  a	
  method	
  
of	
  problem	
  solving	
  used	
  for	
  identifying	
  
the	
  root	
  causes of	
  faults	
  or	
  problems.
ROOT	
  CAUSE	
  ANALYSIS
Failure	
  Mode	
  Effect	
  Analysis
or
orand
Fault	
  tree	
  analysis (FTA)	
  
is	
  a	
  top	
  down,	
  deductive	
  failure	
  analysis in	
  which	
  an	
  
undesired	
  state	
  of	
  a	
  system	
  is	
  analyzed	
  using	
  Boolean	
  
logic	
  to	
  combine	
  a	
  series	
  of	
  lower-­‐level	
  events.
Event	
  tree	
  analysis (ETA)	
  
is	
  a	
  forward,	
  bottom	
  up,	
  logical	
  modeling	
  
technique	
  for	
  both	
  success	
  and	
  failure	
  that	
  
explores	
  responses	
  through	
  a	
  single	
  initiating	
  
event and	
  lays	
  a	
  path	
  for	
  assessing	
  probabilities	
  of	
  
the	
  outcomes	
  and	
  overall	
  system	
  analysis.
Cause-­‐Consequence	
  
Analysis
Cause-­‐consequence	
  analysis	
  (CCA)	
  is	
  a	
  
method	
  for	
  analyzing	
  consequence	
  
chains	
  and	
  can	
  be	
  used	
  individually	
  or	
  as	
  
a	
  supportive	
  method	
  for	
  other	
  analysis	
  
methods.	
  The	
  objective	
  of	
  the	
  analysis	
  is	
  
to	
  recognize	
  consequence	
  chains	
  
developing	
  from	
  failures	
  or	
  other	
  
unwanted	
  events,	
  and	
  to	
  estimate	
  these	
  
consequences	
  with	
  their	
  probabilities.	
  
The	
  cause-­‐consequence	
  structure	
  of	
  the	
  
analysis	
  is	
  formed	
  by	
  combining	
  two	
  
different	
  types	
  of	
  tree	
  structures	
  
together.	
  To	
  the	
  consequence	
  tree,	
  built	
  
from	
  left	
  to	
  right,	
  includes	
  the	
  examined	
  
primary	
  event	
  and	
  its	
  follow-­‐up	
  events	
  
leading	
  eventually	
  to	
  a	
  failure	
  or	
  some	
  
other	
  unwanted	
  event	
  like	
  for	
  example	
  a	
  
serious	
  injury	
  of	
  a	
  person.	
  
The	
  Ishikawa	
  Diagram,	
  also	
  known	
  as	
  the	
  Fishbone	
  Diagram	
  or	
  the	
  
Cause-­‐and-­‐Effect	
  Diagram,	
  is	
  a	
  tool	
  used	
  for	
  systematically	
  identifying	
  and	
  
presenting	
  all	
  the	
  possible	
  causes	
  of	
  a	
  particular	
  problem	
  in	
  graphical	
  
format. The	
  possible	
  causes	
  are	
  presented	
  at	
  various	
  levels	
  of	
  detail	
  in	
  
connected	
  branches,	
  with	
  the	
  level	
  of	
  detail	
  increasing	
  as	
  the	
  branch	
  goes	
  
outward,	
  i.e.,	
  an	
  outer	
  branch	
  is	
  a	
  cause	
  of	
  the	
  inner	
  branch	
  it	
  is	
  attached	
  
to. Thus,	
  the	
  outermost	
  branches	
  usually	
  indicate	
  the	
  root	
  causes	
  of	
  the	
  
problem.
Ishikawa	
  Diagram	
  /	
  Fishbone	
  Diagram	
  /	
  Cause	
  and	
  Effect	
  Diagram
Layer of Protection
Analysis (LOPA)
technique is described in detail in The
American
Institute of Chemical Engineers Center for
Chemical Process Safety (CCPS) publication
on
the subject [2]. An overview of the technique
is presented here. For more information the
reader is referred to the CCPS publication,
which contains a number of worked
examples and
extensive references.
Decision	
  treeis	
  a	
  
decision support	
  tool	
  that	
  uses	
  a	
  
tree-­‐like	
  graph	
  or	
  model	
  of	
  decisions
and	
  their	
  possible	
  consequences,	
  
including	
  chance	
  event	
  outcomes,	
  
resource	
  costs,	
  and	
  utility.	
  It	
  is	
  one	
  
way	
  to	
  display	
  an	
  algorithm.
Once	
  potential	
  sources	
  of	
  error	
  have	
  been	
  
identified,	
  actions	
  can	
  be	
  developed	
  to	
  minimise or	
  
mitigate	
  their	
  impact	
  and	
  improve	
  the	
  reliability of	
  
human performance	
  within	
  the	
  task.	
  U.S.	
  Nuclear	
  
Regulatory	
  Commission	
  (2005).	
  The	
  SPAR-­‐H	
  Human	
  
Reliability	
  Analysis Method	
  (nrc.gov).
Human	
  Reliability	
  Analysis
‘Bowtie’is	
  a	
  diagram	
  that	
  visualizes	
  the	
  risk	
  
you	
  are	
  dealing	
  with	
  in	
  just	
  one,	
  easy	
  to	
  understand	
  the	
  
picture.	
  The	
  diagram	
  is	
  shaped	
  like	
  a	
  bow-­‐tie,	
  creating	
  a	
  
clear	
  differentiation	
  between	
  proactive	
  and	
  reactive	
  risk	
  
management.	
  The	
  power	
  of	
  a	
  BowTieXP diagram	
  is	
  that	
  it	
  
gives	
  you	
  an	
  overview	
  of	
  multiple	
  plausible	
  scenarios,	
  in	
  a	
  
single	
  picture.	
  In	
  short,	
  it	
  provides	
  a	
  simple,	
  visual	
  
explanation	
  of	
  a	
  risk	
  that	
  would	
  be	
  much	
  more	
  difficult	
  to	
  
explain	
  otherwise.	
  
Reliability-­‐centered	
  
maintenance	
  
is	
  a	
  process	
  to	
  ensure	
  that	
  systems	
  
continue	
  to	
  do	
  what	
  their	
  users	
  require	
  
in	
  their	
  present	
  operating	
  context.
Sneak	
  Circuit	
  Analysis	
  is	
  a	
  vital	
  part	
  of	
  the	
  safety	
  
assurance	
  of	
  safety-­‐critical	
  electronic	
  and	
  electro-­‐mechanical	
  
systems.	
  Sneak conditions	
  are	
  defined	
  as	
  latent	
  hardware,	
  software,	
  
or	
  integrated	
  conditions	
  that	
  may	
  cause	
  unwanted	
  actions	
  or	
  may	
  
inhibit	
  a	
  desired	
  function,	
  and	
  are	
  not	
  caused	
  by	
  component	
  failure.
A	
  method	
  used	
  to	
  forecast	
  the	
  
value	
  of	
  a	
  variable	
  whose	
  
future	
  value	
  is	
  independent	
  of	
  
its	
  past	
  history.	
  The	
  technique	
  
is	
  named	
  after	
  Russian	
  
mathematician	
  Andrei	
  
Andreyevich Markov,	
  who	
  
pioneered	
  the	
  study	
  of	
  
stochastic	
  processes,	
  which	
  are	
  
processes	
  that	
  involve	
  the	
  
operation	
  of	
  chance.
Markov	
  Analysis
Monte	
  Carlo	
  
simulation
performs	
  risk	
  analysis by	
  building	
  
models	
  of	
  possible	
  results	
  by	
  
substituting	
  a	
  range	
  of	
  values—a	
  
probability	
  distribution—for	
  any	
  factor	
  
that	
  has	
  inherent	
  uncertainty.	
  It	
  then	
  
calculates	
  results	
  over	
  and	
  over,	
  each	
  
time	
  using	
  a	
  different	
  set	
  of	
  random	
  
values	
  from	
  the	
  probability	
  functions.
Bayesian	
  network,	
  Bayes	
  network,	
  
belief	
  network,	
  Bayes(ian)	
  model or	
  probabilistic	
  directed	
  acyclic	
  graphical	
  model is	
  a	
  
probabilistic	
  graphical	
  model (a	
  type	
  of	
  statistical	
  model)	
  that	
  represents	
  a	
  set	
  of	
  random	
  
variables and	
  their	
  conditional	
  dependencies via	
  a	
  directed	
  acyclic	
  graph (DAG).
F-­N  curves:  
Curves  relating  the  probability  per  year  of  causing  
N  or  more  fatalities  (F)  to  N.  This  is  the  
complementary  cumulative  distribution  function.  
Such  curves  may  be  used  to  express  societal  risk  
criteria  and  to  describe  the  safety  levels  of  
particular  facilities.
Risk	
  Index :	
  
The	
  risk	
  index is	
  the	
  overall	
  result	
  of	
  a	
  risk assessment.	
  
All	
  indicators	
  and	
  indexes can	
  be	
  used	
  in	
  the	
  calculation	
  
for	
  the	
  risk	
  index.	
  It	
  is	
  a	
  composite	
  of	
  the	
  likelihood	
  and	
  
impact	
  index.	
  Likelihood	
  :	
  The	
  likelihood	
  index shows	
  
the	
  probability	
  of	
  a	
  risk event	
  occuring.
The	
  most	
  common	
  approach	
  to	
  the	
  consequence	
  
matrix is	
  using	
  “descriptors”	
  as	
  a	
  way	
  of	
  
determining	
  how	
  each	
  risk	
  may	
  impact	
  on	
  the	
  
organisation.	
  ...	
  catastrophic	
  impact	
  on	
  an	
  
organisation's ability	
  to	
  achieve	
  its	
  objectives;	
  
irrevocable	
  damage	
  to	
  the	
  reputation	
  of	
  the	
  
organisation;	
  and.	
  high	
  level,	
  frequent	
  litigation.
Consequence	
  /	
  
Probability	
  Matrix
Cost	
  benefit	
  analysis
(CBA),	
  sometimes	
  called	
  benefit	
  cost	
  
analysis (BCA),	
  is	
  a	
  systematic	
  approach	
  to	
  
estimating	
  the	
  strengths	
  and	
  weaknesses	
  of	
  
alternatives	
  (for	
  example	
  in	
  transactions,	
  
activities,	
  functional	
  business	
  requirements	
  
or	
  projects	
  investments);	
  it	
  is	
  used	
  to	
  
determine	
  options	
  that	
  provide	
  the	
  best	
  
approach	
  to	
  achieve	
  benefits	
  while	
  
preserving	
  savings.[1] The	
  CBA	
  is	
  also	
  defined	
  
as	
  a	
  systematic	
  process	
  for	
  calculating	
  and	
  
comparing	
  benefits	
  and	
  costs of	
  a	
  decision,	
  
policy	
  (with	
  particular	
  regard	
  to	
  government	
  
policy)	
  or	
  (in	
  general)	
  project.
Broadly,	
  CBA	
  has	
  two	
  main	
  purposes:
1.To	
  determine	
  if	
  an	
  investment/decision	
  is	
  
sound	
  (justification/feasibility)	
  – verifying	
  
whether	
  its	
  benefits	
  outweigh	
  the	
  costs,	
  and	
  
by	
  how	
  much;
2.To	
  provide	
  a	
  basis	
  for	
  comparing	
  projects	
  –
which	
  involves	
  comparing	
  the	
  total	
  expected	
  
cost	
  of	
  each	
  option	
  against	
  its	
  total	
  expected	
  
benefits.[2]
Multi-­‐Criteria	
  Decision	
  Analysis,	
  or	
  
MCDA,	
  
is	
  a	
  valuable	
  tool	
  that	
  we	
  can	
  apply	
  to	
  many	
  complex	
  
decisions. It	
  is	
  most	
  applicable	
  to	
  solving	
  problems	
  that	
  are	
  
characterized	
  as	
  a	
  choice	
  among	
  alternatives.	
  It	
  has	
  all	
  the	
  
characteristics	
  of	
  a	
  useful	
  decision	
  support	
  tool:	
  It	
  helps	
  us	
  
focus	
  on	
  what	
  is	
  important,	
  is	
  logical	
  and	
  consistent,	
  and	
  is	
  
easy	
  to	
  use. At	
  its	
  core	
  MCDA	
  is	
  useful	
  for:
•Dividing	
  the	
  decision	
  into	
  smaller,	
  more	
  understandable	
  parts	
  
•Analyzing	
  each	
  part	
  
•Integrating	
  the	
  parts	
  to	
  produce	
  a	
  meaningful	
  solution	
  
By Ahmad	
  Azwang Aisram Omar
aisram@gmail.com

More Related Content

What's hot

FAULT & EVENT TREE ANALYSIS
FAULT & EVENT TREE ANALYSISFAULT & EVENT TREE ANALYSIS
FAULT & EVENT TREE ANALYSISNitesh Dongare
 
Qualitative & Quantitative Analysis
Qualitative & Quantitative AnalysisQualitative & Quantitative Analysis
Qualitative & Quantitative AnalysisAlin Veronika
 
ISO 31000 Risk Management
ISO 31000 Risk ManagementISO 31000 Risk Management
ISO 31000 Risk ManagementRamiro Cid
 
Process Safety
Process SafetyProcess Safety
Process SafetyConsultivo
 
Risk Identification.ppt
Risk Identification.pptRisk Identification.ppt
Risk Identification.pptAvicenna6
 
Risk Assessment and Risk Assessment Matrix Presentation
Risk Assessment and Risk Assessment Matrix PresentationRisk Assessment and Risk Assessment Matrix Presentation
Risk Assessment and Risk Assessment Matrix PresentationUsama Saeed
 
Risk Analysis : PMP- Project Risk Management
Risk Analysis : PMP- Project Risk ManagementRisk Analysis : PMP- Project Risk Management
Risk Analysis : PMP- Project Risk ManagementSaket Bansal
 
Hazard identification & characterization
Hazard identification & characterizationHazard identification & characterization
Hazard identification & characterizationArvind Kumar
 
Hazop Hazard and Operability Study
Hazop Hazard and Operability StudyHazop Hazard and Operability Study
Hazop Hazard and Operability StudyAnand kumar
 
Quantative-Risk assessment-Hazop-Study
Quantative-Risk assessment-Hazop-StudyQuantative-Risk assessment-Hazop-Study
Quantative-Risk assessment-Hazop-StudyMassimo Talia
 
Powerpoint Risk Assessment
Powerpoint Risk AssessmentPowerpoint Risk Assessment
Powerpoint Risk AssessmentSteve Bishop
 
Risk assessment and management
Risk assessment and managementRisk assessment and management
Risk assessment and managementTanmoy Sinha
 
Risk Mitigation Strategy PowerPoint Presentation Slides
Risk Mitigation Strategy PowerPoint Presentation SlidesRisk Mitigation Strategy PowerPoint Presentation Slides
Risk Mitigation Strategy PowerPoint Presentation SlidesSlideTeam
 
ISO 31000 risk management process
ISO 31000 risk management processISO 31000 risk management process
ISO 31000 risk management processMuizz Anibire
 
Risk Overview & Risk management
Risk Overview & Risk managementRisk Overview & Risk management
Risk Overview & Risk managementSubhendu Datta
 

What's hot (20)

FAULT & EVENT TREE ANALYSIS
FAULT & EVENT TREE ANALYSISFAULT & EVENT TREE ANALYSIS
FAULT & EVENT TREE ANALYSIS
 
Qualitative & Quantitative Analysis
Qualitative & Quantitative AnalysisQualitative & Quantitative Analysis
Qualitative & Quantitative Analysis
 
ISO 31000 Risk Management
ISO 31000 Risk ManagementISO 31000 Risk Management
ISO 31000 Risk Management
 
Process Safety
Process SafetyProcess Safety
Process Safety
 
Risk Identification.ppt
Risk Identification.pptRisk Identification.ppt
Risk Identification.ppt
 
Risk Assessment and Risk Assessment Matrix Presentation
Risk Assessment and Risk Assessment Matrix PresentationRisk Assessment and Risk Assessment Matrix Presentation
Risk Assessment and Risk Assessment Matrix Presentation
 
Risk Analysis : PMP- Project Risk Management
Risk Analysis : PMP- Project Risk ManagementRisk Analysis : PMP- Project Risk Management
Risk Analysis : PMP- Project Risk Management
 
Hazard identification & characterization
Hazard identification & characterizationHazard identification & characterization
Hazard identification & characterization
 
Hazop Hazard and Operability Study
Hazop Hazard and Operability StudyHazop Hazard and Operability Study
Hazop Hazard and Operability Study
 
Hira
HiraHira
Hira
 
LAYER OF PROTECTION ANALYSIS
LAYER OF PROTECTION ANALYSISLAYER OF PROTECTION ANALYSIS
LAYER OF PROTECTION ANALYSIS
 
Risk analysis
Risk analysis  Risk analysis
Risk analysis
 
Quantative-Risk assessment-Hazop-Study
Quantative-Risk assessment-Hazop-StudyQuantative-Risk assessment-Hazop-Study
Quantative-Risk assessment-Hazop-Study
 
Powerpoint Risk Assessment
Powerpoint Risk AssessmentPowerpoint Risk Assessment
Powerpoint Risk Assessment
 
Hazop analysis
Hazop analysisHazop analysis
Hazop analysis
 
Risk assessment and management
Risk assessment and managementRisk assessment and management
Risk assessment and management
 
Iso 45001 2018
Iso 45001 2018Iso 45001 2018
Iso 45001 2018
 
Risk Mitigation Strategy PowerPoint Presentation Slides
Risk Mitigation Strategy PowerPoint Presentation SlidesRisk Mitigation Strategy PowerPoint Presentation Slides
Risk Mitigation Strategy PowerPoint Presentation Slides
 
ISO 31000 risk management process
ISO 31000 risk management processISO 31000 risk management process
ISO 31000 risk management process
 
Risk Overview & Risk management
Risk Overview & Risk managementRisk Overview & Risk management
Risk Overview & Risk management
 

Similar to Risk assessment tools and techniques

Session 06_Risk Assessment Program for YSP_Risk Analysis III
Session 06_Risk Assessment Program for YSP_Risk Analysis IIISession 06_Risk Assessment Program for YSP_Risk Analysis III
Session 06_Risk Assessment Program for YSP_Risk Analysis IIIMuizz Anibire
 
Overview of Systemic Modeling Approaches
Overview of Systemic Modeling ApproachesOverview of Systemic Modeling Approaches
Overview of Systemic Modeling Approachesstargate1280
 
Overview of Systemic Modeling Approaches
Overview of Systemic Modeling ApproachesOverview of Systemic Modeling Approaches
Overview of Systemic Modeling Approachesstargate1280
 
A Neural Network Based Diagnostic System for Classification of Industrial Car...
A Neural Network Based Diagnostic System for Classification of Industrial Car...A Neural Network Based Diagnostic System for Classification of Industrial Car...
A Neural Network Based Diagnostic System for Classification of Industrial Car...CSCJournals
 
Sms Reg Nick Morten
Sms Reg Nick MortenSms Reg Nick Morten
Sms Reg Nick MortenYdalus
 
AN EVALUATION STUDY OF GENERAL SOFTWARE PROJECT RISK BASEDON SOFTWARE PRACTIT...
AN EVALUATION STUDY OF GENERAL SOFTWARE PROJECT RISK BASEDON SOFTWARE PRACTIT...AN EVALUATION STUDY OF GENERAL SOFTWARE PROJECT RISK BASEDON SOFTWARE PRACTIT...
AN EVALUATION STUDY OF GENERAL SOFTWARE PROJECT RISK BASEDON SOFTWARE PRACTIT...ijcsit
 
Layer of protection analysis
Layer of protection analysisLayer of protection analysis
Layer of protection analysisSandip Sonawane
 
An Evaluation Study of General Software Project Risk Basedon Software Practit...
An Evaluation Study of General Software Project Risk Basedon Software Practit...An Evaluation Study of General Software Project Risk Basedon Software Practit...
An Evaluation Study of General Software Project Risk Basedon Software Practit...AIRCC Publishing Corporation
 
An Evaluation Study of General Software Project Risk Basedon Software Practit...
An Evaluation Study of General Software Project Risk Basedon Software Practit...An Evaluation Study of General Software Project Risk Basedon Software Practit...
An Evaluation Study of General Software Project Risk Basedon Software Practit...AIRCC Publishing Corporation
 
Optimization of different objective function in risk assessment system
Optimization of different objective function in risk assessment  systemOptimization of different objective function in risk assessment  system
Optimization of different objective function in risk assessment systemAlexander Decker
 
Preliminary Hazard Analysis
Preliminary Hazard AnalysisPreliminary Hazard Analysis
Preliminary Hazard AnalysisMANIKANDAN V
 
Corrective and preventive action
Corrective  and preventive actionCorrective  and preventive action
Corrective and preventive actionSnehaGhadigaonkar
 

Similar to Risk assessment tools and techniques (20)

Fault tree analysis
Fault tree analysisFault tree analysis
Fault tree analysis
 
Session 06_Risk Assessment Program for YSP_Risk Analysis III
Session 06_Risk Assessment Program for YSP_Risk Analysis IIISession 06_Risk Assessment Program for YSP_Risk Analysis III
Session 06_Risk Assessment Program for YSP_Risk Analysis III
 
Lecture 8
Lecture 8Lecture 8
Lecture 8
 
Overview of Systemic Modeling Approaches
Overview of Systemic Modeling ApproachesOverview of Systemic Modeling Approaches
Overview of Systemic Modeling Approaches
 
Overview of Systemic Modeling Approaches
Overview of Systemic Modeling ApproachesOverview of Systemic Modeling Approaches
Overview of Systemic Modeling Approaches
 
Industrial safety unit iv ppt
Industrial safety unit iv pptIndustrial safety unit iv ppt
Industrial safety unit iv ppt
 
A Neural Network Based Diagnostic System for Classification of Industrial Car...
A Neural Network Based Diagnostic System for Classification of Industrial Car...A Neural Network Based Diagnostic System for Classification of Industrial Car...
A Neural Network Based Diagnostic System for Classification of Industrial Car...
 
Sms Reg Nick Morten
Sms Reg Nick MortenSms Reg Nick Morten
Sms Reg Nick Morten
 
AN EVALUATION STUDY OF GENERAL SOFTWARE PROJECT RISK BASEDON SOFTWARE PRACTIT...
AN EVALUATION STUDY OF GENERAL SOFTWARE PROJECT RISK BASEDON SOFTWARE PRACTIT...AN EVALUATION STUDY OF GENERAL SOFTWARE PROJECT RISK BASEDON SOFTWARE PRACTIT...
AN EVALUATION STUDY OF GENERAL SOFTWARE PROJECT RISK BASEDON SOFTWARE PRACTIT...
 
Layer of protection analysis
Layer of protection analysisLayer of protection analysis
Layer of protection analysis
 
An Evaluation Study of General Software Project Risk Basedon Software Practit...
An Evaluation Study of General Software Project Risk Basedon Software Practit...An Evaluation Study of General Software Project Risk Basedon Software Practit...
An Evaluation Study of General Software Project Risk Basedon Software Practit...
 
An Evaluation Study of General Software Project Risk Basedon Software Practit...
An Evaluation Study of General Software Project Risk Basedon Software Practit...An Evaluation Study of General Software Project Risk Basedon Software Practit...
An Evaluation Study of General Software Project Risk Basedon Software Practit...
 
Optimization of different objective function in risk assessment system
Optimization of different objective function in risk assessment  systemOptimization of different objective function in risk assessment  system
Optimization of different objective function in risk assessment system
 
ST-PRA
ST-PRAST-PRA
ST-PRA
 
Preliminary Hazard Analysis
Preliminary Hazard AnalysisPreliminary Hazard Analysis
Preliminary Hazard Analysis
 
Root cause analysis
Root cause analysisRoot cause analysis
Root cause analysis
 
Risk assesment
Risk assesmentRisk assesment
Risk assesment
 
Well drilling fuzzy risk assessment using fuzzy FMEA and fuzzy TOPSIS
Well drilling fuzzy risk assessment using fuzzy FMEA and fuzzy TOPSISWell drilling fuzzy risk assessment using fuzzy FMEA and fuzzy TOPSIS
Well drilling fuzzy risk assessment using fuzzy FMEA and fuzzy TOPSIS
 
Corrective and preventive action
Corrective  and preventive actionCorrective  and preventive action
Corrective and preventive action
 
50320130403010
5032013040301050320130403010
50320130403010
 

Recently uploaded

(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Call Girls In Mahipalpur O9654467111 Escorts Service
Call Girls In Mahipalpur O9654467111  Escorts ServiceCall Girls In Mahipalpur O9654467111  Escorts Service
Call Girls In Mahipalpur O9654467111 Escorts ServiceSapana Sha
 
Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...
Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...
Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...shivangimorya083
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Aminabad Call Girl Agent 9548273370 , Call Girls Service Lucknow
Aminabad Call Girl Agent 9548273370 , Call Girls Service LucknowAminabad Call Girl Agent 9548273370 , Call Girls Service Lucknow
Aminabad Call Girl Agent 9548273370 , Call Girls Service Lucknowmakika9823
 
Predicting Employee Churn: A Data-Driven Approach Project Presentation
Predicting Employee Churn: A Data-Driven Approach Project PresentationPredicting Employee Churn: A Data-Driven Approach Project Presentation
Predicting Employee Churn: A Data-Driven Approach Project PresentationBoston Institute of Analytics
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiSuhani Kapoor
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubaihf8803863
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改atducpo
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...soniya singh
 
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...Suhani Kapoor
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...Suhani Kapoor
 
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...Pooja Nehwal
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxStephen266013
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Callshivangimorya083
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfSocial Samosa
 
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...Florian Roscheck
 

Recently uploaded (20)

(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in  KishangarhDelhi 99530 vip 56974 Genuine Escort Service Call Girls in  Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
 
Call Girls In Mahipalpur O9654467111 Escorts Service
Call Girls In Mahipalpur O9654467111  Escorts ServiceCall Girls In Mahipalpur O9654467111  Escorts Service
Call Girls In Mahipalpur O9654467111 Escorts Service
 
Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...
Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...
Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Aminabad Call Girl Agent 9548273370 , Call Girls Service Lucknow
Aminabad Call Girl Agent 9548273370 , Call Girls Service LucknowAminabad Call Girl Agent 9548273370 , Call Girls Service Lucknow
Aminabad Call Girl Agent 9548273370 , Call Girls Service Lucknow
 
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
 
Predicting Employee Churn: A Data-Driven Approach Project Presentation
Predicting Employee Churn: A Data-Driven Approach Project PresentationPredicting Employee Churn: A Data-Driven Approach Project Presentation
Predicting Employee Churn: A Data-Driven Approach Project Presentation
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
 
Decoding Loan Approval: Predictive Modeling in Action
Decoding Loan Approval: Predictive Modeling in ActionDecoding Loan Approval: Predictive Modeling in Action
Decoding Loan Approval: Predictive Modeling in Action
 
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
 
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docx
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
 
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
 

Risk assessment tools and techniques

  • 1. LIST  OF   TOOLS  &   TECHNIQUES   RECOMMENDED IN  ISO  31010
  • 2. Brainstorming produce  an  idea  or  way  of   solving  a  problem  by  holding   a  spontaneous  group   discussion.
  • 3. Structured  &  Semi-­‐structured  Interviews A  semi-­‐structured  interview is  a  method  of  research used  most  often  in  the  social  sciences.  While  a   structured  interview has  a  rigorous  set  of  questions  which  does  not  allow  one  to  divert,  a  semi-­‐ structured  interview is  open,  allowing  new  ideas  to  be  brought  up  during  the  interview  as  a  result  of   what  the  interviewee  says.  The  interviewer  in  a  semi-­‐structured  interview  generally  has  a  framework  of   themes  to  be  explored.
  • 4. The  Delphi  method is  a  structured  communication   technique or  method,  originally  developed  as  a   systematic,  interactive  forecasting  method which   relies  on  a  panel  of  experts.  The  experts  answer   questionnaires  in  two  or  more  rounds. Delphi Technique
  • 6. The  preliminary  hazard  analysis   (PrHA)  technique  is  a  broad,  initial   study  used  in  the  early  stages  of   system  design.  It  focuses  on  (1)   identifying  apparent  hazards,  (2)   assessing  the  severity  of  potential   accidents  that  could  occur   involving  the  hazards,  and  (3)   identifying  safeguards  for  reducing   the  risks  associated  with  the   hazards.  This  technique  focuses  on   identifying  weaknesses  early  in  the   life  of  a  system,  thus  saving  time   and  money  that  might  be  required   for  major  redesign  if  the  hazards   were  discovered  at  a  later  date.   Preliminary  Hazard  Analysis  
  • 7. A  hazard  and   operability  study   (HAZOP)  is  a   structured  and   systematic   examination  of  a   complex  planned   or  existing  process   or  operation  in   order  to  identify   and  evaluate   problems  that   may  represent   risks  to  personnel   or  equipment. HAZOP Hazard  and  Operability  Study
  • 8. Hazard  analysis  and  critical  control  points  or   HACCP (/ˈhæsʌp/)  is  a  systematic  preventive   approach  to  food  safety  from  biological,   chemical,  and  physical  hazards  in  production   processes  that  can  cause  the  finished  product   to  be  unsafe,  and  designs  measurements  to   reduce  these  risks  to  a  safe  level. HACCP
  • 9. Environmental  Risk  Assessment An  environmental  risk  assessment  (ERA)  is  a   process  of  predicting  whether  there  may  be  a  risk   of  adverse  effects  on  the  environment  caused  by  a   chemical  substance.  Environmental  exposure   concentrations  of  a  chemical  are  predicted  and   compared  to  predicted  no-­‐effect  concentrations   for  different  environmental  compartments.  
  • 11. Scenario  analysis is  a  process  of  analyzing  possible   future  events  by  considering   alternative  possible  outcomes   (sometimes  called  "alternative   worlds").  Thus,  scenario  analysis,   which  is  one  of  the  main  forms  of   projection,  does  not  try  to  show  one   exact  picture  of  the  future.
  • 12. Business  Impact  Analysis Risk  Assessment Business  Impact  Analysis
  • 13. Root  cause  analysis (RCA)  is  a  method   of  problem  solving  used  for  identifying   the  root  causes of  faults  or  problems. ROOT  CAUSE  ANALYSIS
  • 15. or orand Fault  tree  analysis (FTA)   is  a  top  down,  deductive  failure  analysis in  which  an   undesired  state  of  a  system  is  analyzed  using  Boolean   logic  to  combine  a  series  of  lower-­‐level  events.
  • 16. Event  tree  analysis (ETA)   is  a  forward,  bottom  up,  logical  modeling   technique  for  both  success  and  failure  that   explores  responses  through  a  single  initiating   event and  lays  a  path  for  assessing  probabilities  of   the  outcomes  and  overall  system  analysis.
  • 17. Cause-­‐Consequence   Analysis Cause-­‐consequence  analysis  (CCA)  is  a   method  for  analyzing  consequence   chains  and  can  be  used  individually  or  as   a  supportive  method  for  other  analysis   methods.  The  objective  of  the  analysis  is   to  recognize  consequence  chains   developing  from  failures  or  other   unwanted  events,  and  to  estimate  these   consequences  with  their  probabilities.   The  cause-­‐consequence  structure  of  the   analysis  is  formed  by  combining  two   different  types  of  tree  structures   together.  To  the  consequence  tree,  built   from  left  to  right,  includes  the  examined   primary  event  and  its  follow-­‐up  events   leading  eventually  to  a  failure  or  some   other  unwanted  event  like  for  example  a   serious  injury  of  a  person.  
  • 18. The  Ishikawa  Diagram,  also  known  as  the  Fishbone  Diagram  or  the   Cause-­‐and-­‐Effect  Diagram,  is  a  tool  used  for  systematically  identifying  and   presenting  all  the  possible  causes  of  a  particular  problem  in  graphical   format. The  possible  causes  are  presented  at  various  levels  of  detail  in   connected  branches,  with  the  level  of  detail  increasing  as  the  branch  goes   outward,  i.e.,  an  outer  branch  is  a  cause  of  the  inner  branch  it  is  attached   to. Thus,  the  outermost  branches  usually  indicate  the  root  causes  of  the   problem. Ishikawa  Diagram  /  Fishbone  Diagram  /  Cause  and  Effect  Diagram
  • 19. Layer of Protection Analysis (LOPA) technique is described in detail in The American Institute of Chemical Engineers Center for Chemical Process Safety (CCPS) publication on the subject [2]. An overview of the technique is presented here. For more information the reader is referred to the CCPS publication, which contains a number of worked examples and extensive references.
  • 20. Decision  treeis  a   decision support  tool  that  uses  a   tree-­‐like  graph  or  model  of  decisions and  their  possible  consequences,   including  chance  event  outcomes,   resource  costs,  and  utility.  It  is  one   way  to  display  an  algorithm.
  • 21. Once  potential  sources  of  error  have  been   identified,  actions  can  be  developed  to  minimise or   mitigate  their  impact  and  improve  the  reliability of   human performance  within  the  task.  U.S.  Nuclear   Regulatory  Commission  (2005).  The  SPAR-­‐H  Human   Reliability  Analysis Method  (nrc.gov). Human  Reliability  Analysis
  • 22. ‘Bowtie’is  a  diagram  that  visualizes  the  risk   you  are  dealing  with  in  just  one,  easy  to  understand  the   picture.  The  diagram  is  shaped  like  a  bow-­‐tie,  creating  a   clear  differentiation  between  proactive  and  reactive  risk   management.  The  power  of  a  BowTieXP diagram  is  that  it   gives  you  an  overview  of  multiple  plausible  scenarios,  in  a   single  picture.  In  short,  it  provides  a  simple,  visual   explanation  of  a  risk  that  would  be  much  more  difficult  to   explain  otherwise.  
  • 23. Reliability-­‐centered   maintenance   is  a  process  to  ensure  that  systems   continue  to  do  what  their  users  require   in  their  present  operating  context.
  • 24. Sneak  Circuit  Analysis  is  a  vital  part  of  the  safety   assurance  of  safety-­‐critical  electronic  and  electro-­‐mechanical   systems.  Sneak conditions  are  defined  as  latent  hardware,  software,   or  integrated  conditions  that  may  cause  unwanted  actions  or  may   inhibit  a  desired  function,  and  are  not  caused  by  component  failure.
  • 25. A  method  used  to  forecast  the   value  of  a  variable  whose   future  value  is  independent  of   its  past  history.  The  technique   is  named  after  Russian   mathematician  Andrei   Andreyevich Markov,  who   pioneered  the  study  of   stochastic  processes,  which  are   processes  that  involve  the   operation  of  chance. Markov  Analysis
  • 26. Monte  Carlo   simulation performs  risk  analysis by  building   models  of  possible  results  by   substituting  a  range  of  values—a   probability  distribution—for  any  factor   that  has  inherent  uncertainty.  It  then   calculates  results  over  and  over,  each   time  using  a  different  set  of  random   values  from  the  probability  functions.
  • 27. Bayesian  network,  Bayes  network,   belief  network,  Bayes(ian)  model or  probabilistic  directed  acyclic  graphical  model is  a   probabilistic  graphical  model (a  type  of  statistical  model)  that  represents  a  set  of  random   variables and  their  conditional  dependencies via  a  directed  acyclic  graph (DAG).
  • 28. F-­N  curves:   Curves  relating  the  probability  per  year  of  causing   N  or  more  fatalities  (F)  to  N.  This  is  the   complementary  cumulative  distribution  function.   Such  curves  may  be  used  to  express  societal  risk   criteria  and  to  describe  the  safety  levels  of   particular  facilities.
  • 29. Risk  Index :   The  risk  index is  the  overall  result  of  a  risk assessment.   All  indicators  and  indexes can  be  used  in  the  calculation   for  the  risk  index.  It  is  a  composite  of  the  likelihood  and   impact  index.  Likelihood  :  The  likelihood  index shows   the  probability  of  a  risk event  occuring.
  • 30. The  most  common  approach  to  the  consequence   matrix is  using  “descriptors”  as  a  way  of   determining  how  each  risk  may  impact  on  the   organisation.  ...  catastrophic  impact  on  an   organisation's ability  to  achieve  its  objectives;   irrevocable  damage  to  the  reputation  of  the   organisation;  and.  high  level,  frequent  litigation. Consequence  /   Probability  Matrix
  • 31. Cost  benefit  analysis (CBA),  sometimes  called  benefit  cost   analysis (BCA),  is  a  systematic  approach  to   estimating  the  strengths  and  weaknesses  of   alternatives  (for  example  in  transactions,   activities,  functional  business  requirements   or  projects  investments);  it  is  used  to   determine  options  that  provide  the  best   approach  to  achieve  benefits  while   preserving  savings.[1] The  CBA  is  also  defined   as  a  systematic  process  for  calculating  and   comparing  benefits  and  costs of  a  decision,   policy  (with  particular  regard  to  government   policy)  or  (in  general)  project. Broadly,  CBA  has  two  main  purposes: 1.To  determine  if  an  investment/decision  is   sound  (justification/feasibility)  – verifying   whether  its  benefits  outweigh  the  costs,  and   by  how  much; 2.To  provide  a  basis  for  comparing  projects  – which  involves  comparing  the  total  expected   cost  of  each  option  against  its  total  expected   benefits.[2]
  • 32. Multi-­‐Criteria  Decision  Analysis,  or   MCDA,   is  a  valuable  tool  that  we  can  apply  to  many  complex   decisions. It  is  most  applicable  to  solving  problems  that  are   characterized  as  a  choice  among  alternatives.  It  has  all  the   characteristics  of  a  useful  decision  support  tool:  It  helps  us   focus  on  what  is  important,  is  logical  and  consistent,  and  is   easy  to  use. At  its  core  MCDA  is  useful  for: •Dividing  the  decision  into  smaller,  more  understandable  parts   •Analyzing  each  part   •Integrating  the  parts  to  produce  a  meaningful  solution  
  • 33. By Ahmad  Azwang Aisram Omar aisram@gmail.com