Muutke küpsiste eelistusi

Hazard Analysis Techniques for System Safety [Kõva köide]

  • Formaat: Hardback, 528 pages, kõrgus x laius x paksus: 234x164x29 mm, kaal: 836 g, Illustrations
  • Ilmumisaeg: 01-Jul-2005
  • Kirjastus: John Wiley & Sons Inc
  • ISBN-10: 0471720194
  • ISBN-13: 9780471720195
Teised raamatud teemal:
  • Formaat: Hardback, 528 pages, kõrgus x laius x paksus: 234x164x29 mm, kaal: 836 g, Illustrations
  • Ilmumisaeg: 01-Jul-2005
  • Kirjastus: John Wiley & Sons Inc
  • ISBN-10: 0471720194
  • ISBN-13: 9780471720195
Teised raamatud teemal:
The heart of this volume consists of the presentation of 22 of the most commonly used hazard analysis methodologies in system safety, including functional hazard analysis, health hazard assessment, failure mode and effects analysis, Markov analysis, operating and support hazard analysis, software safety assessment, and sneak circuit analysis, along with illustrations and examples. Before describing how to perform these techniques, author Ericson (a project manager for system and software safety at EG&G Technical Services, Inc.) first provides an account of hazard theory, explaining the hazard-risk- mishap connection and the hazard triangle model. Annotation ©2005 Book News, Inc., Portland, OR (booknews.com)

A practical guide to identifying hazards using common hazard analysis techniques

Many different hazard analysis techniques have been developed over the past forty years. However, there is only a handful of techniques that safety analysts actually apply in their daily work. Written by a former president of the System Safety Society and winner of the Boeing Achievement and Apollo Awards for his safety analysis work, Hazard Analysis Techniques for System Safety explains, in detail, how to perform the most commonly used hazard analysis techniques employed by the system safety engineering discipline.

Focusing on the twenty-two most commonly used hazard analysis methodologies in the system safety discipline, author Clifton Ericson outlines the three components that comprise a hazard and describes how to use these components to recognize a hazard during analysis. He then examines each technique in sufficient detail and with numerous illustrations and examples, to enable the reader to easily understand and perform the analysis.

Techniques covered include:
* Preliminary Hazard List (PHL) Analysis
* Preliminary Hazard Analysis (PHA)
* Subsystem Hazard Analysis (SSHA)
* System Hazard Analysis (SHA)
* Operating and Support Hazard Analysis (O&SHA)
* Health Hazard Assessment (HHA)
* Safety Requirements/Criteria Analysis (SRCA)
* Fault Tree Analysis (FTA)
* Event Tree Analysis (ETA)
* Failure Mode and Effects Analysis (FMEA)
* Fault Hazard Analysis
* Functional Hazard Analysis
* Sneak Circuit Analysis (SCA)
* Petri Net Analysis (PNA)
* Markov Analysis (MA)
* Barrier Analysis (BA)
* Bent Pin Analysis (BPA)
* HAZOP Analysis
* Cause Consequence Analysis (CCA)
* Common Cause Failure Analysis (CCFA)
* MORT Analysis
* Software Safety Assessment (SWSA)

Written to be accessible to readers with a minimal amount of technical background, Hazard Analysis Techniques for System Safety gathers, for the first time in one source, the techniques that safety analysts actually apply in daily practice. Both new and seasoned analysts will find this book an invaluable resource for designing and constructing safe systems-- in short, for saving lives.
PREFACE xvii
ACKNOWLEDGMENTS xix
1. System Safety
1(12)
1.1 Introduction
1(1)
1.2 System Safety Background
2(1)
1.3 System Safety Characterization
3(1)
1.4 System Safety Process
4(1)
1.5 System Concept
5(7)
1.5.1 General System Model
5(2)
1.5.2 System Attributes
7(1)
1.5.3 System Types
8(1)
1.5.4 System Life Cycle
9(1)
1.5.5 System Development
10(2)
1.6 Summary
12(1)
2. Hazards, Mishap, and Risk
13(18)
2.1 Introduction
13(1)
2.2 Hazard-Related Definitions
14(1)
2.3 Hazard Theory
15(4)
2.4 Hazard Actuation
19(2)
2.5 Hazard Causal-Factors
21(2)
2.6 Hazard-Mishap Probability
23(1)
2.7 Recognizing Hazards
23(4)
2.8 Hazard Description
27(1)
2.9 Summary
27(4)
3. Hazard Analysis Types and Techniques
31(24)
3.1 Types and Techniques
31(3)
3.2 Description of Hazard Analysis Types
34(10)
3.2.1 Conceptual Design Hazard Analysis Type (CD-HAT)
34(1)
3.2.2 Preliminary Design Hazard Analysis Type (PD-HAT)
35(2)
3.2.3 Detailed Design Hazard Analysis Type (DD-HAT)
37(1)
3.2.4 System Design Hazard Analysis Type (SD-HAT)
38(2)
3.2.5 Operations Design Hazard Analysis Type (OD-HAT)
40(1)
3.2.6 Human Design Hazard Analysis Type (HD-HAT)
41(1)
3.2.7 Requirements Design Hazard Analysis Type (RD-HAT)
42(2)
3.3 Timing of Hazard Analysis Types
44(1)
3.4 Interrelationship of Hazard Analysis Types
44(1)
3.5 Hazard Analysis Techniques
45(3)
3.5.1 Technique Attributes
45(1)
3.5.2 Primary Hazard Analysis Techniques
46(2)
3.6 Inductive and Deductive Techniques
48(3)
3.7 Qualitative and Quantitative Techniques
51(2)
3.8 Summary
53(2)
4. Preliminary Hazard List
55(18)
4.1 Introduction
55(1)
4.2 Background
55(1)
4.3 History
56(1)
4.4 Theory
56(1)
4.5 Methodology
57(3)
4.6 Worksheet
60(2)
4.7 Hazard Checklists
62(2)
4.8 Guidelines
64(1)
4.9 Example: Ace Missile System
65(5)
4.10 Advantages and Disadvantages
70(1)
4.11 Common Mistakes to Avoid
71(1)
4.12 Summary
71(2)
5. Preliminary Hazard Analysis
73(22)
5.1 Introduction
73(1)
5.2 Background
73(1)
5.3 History
74(1)
5.4 Theory
75(1)
5.5 Methodology
76(2)
5.6 Worksheet
78(3)
5.7 Guidelines
81(1)
5.8 Example: Ace Missile System
82(3)
5.9 Advantages and Disadvantages
85(1)
5.10 Common Mistakes to Avoid
85(8)
5.11 Summary
93(2)
6. Subsystem Hazard Analysis
95(20)
6.1 Introduction
95(1)
6.2 Background
95(1)
6.3 History
96(1)
6.4 Theory
96(1)
6.5 Methodology
97(1)
6.6 Worksheet
98(4)
6.7 Guidelines
102(1)
6.8 Example: Ace Missile System
103(4)
6.9 Advantages and Disadvantages
107(1)
6.10 Common Mistakes to Avoid
107(6)
6.11 Summary
113(2)
7. System Hazard Analysis
115(16)
7.1 Introduction
115(1)
7.2 Background
116(1)
7.3 History
117(1)
7.4 Theory
117(1)
7.5 Methodology
118(2)
7.6 Worksheet
120(2)
7.7 Guidelines
122(1)
7.8 Example
123(5)
7.9 Advantages and Disadvantages
128(1)
7.10 Common Mistakes to Avoid
129(1)
7.11 Summary
129(2)
8. Operating and Support Hazard Analysis
131(24)
8.1 Introduction
131(1)
8.2 Background
131(2)
8.3 History
133(1)
8.4 Definitions
133(1)
8.5 Theory
134(1)
8.6 Methodology
135(3)
8.7 Worksheet
138(2)
8.8 Hazard Checklists
140(1)
8.9 Support Tools
140(2)
8.10 Guidelines
142(1)
8.11 Examples
143(9)
8.11.1 Example 1
143(1)
8.11.2 Example 2
143(9)
8.12 Advantages and Disadvantages
152(1)
8.13 Common Mistakes to Avoid
152(1)
8.14 Summary
152(3)
9. Health Hazard Assessment
155(14)
9.1 Introduction
155(1)
9.2 Background
155(1)
9.3 History
156(1)
9.4 Theory
156(1)
9.5 Methodology
157(3)
9.6 Worksheet
160(2)
9.7 Checklist
162(2)
9.8 Example
164(1)
9.9 Advantages and Disadvantages
164(4)
9.10 Common Mistakes to Avoid
168(1)
9.11 Summary
168(1)
10. Safety Requirements/Criteria Analysis 169(14)
10.1 Introduction
169(1)
10.2 Background
169(1)
10.3 History
170(1)
10.4 Theory
170(1)
10.5 Methodology
171(1)
10.6 Worksheets
172(3)
10.7 Example
175(1)
10.8 Advantages and Disadvantages
175(5)
10.9 Common Mistakes to Avoid
180(1)
10.10 Summary
180(3)
11. Fault Tree Analysis 183(40)
11.1 Introduction
183(2)
11.2 Background
185(1)
11.3 History
186(1)
11.4 Theory
187(1)
11.5 Methodology
188(9)
11.5.1 Building Blocks
188(3)
11.5.2 Definitions
191(2)
11.5.3 Construction-Basics
193(2)
11.5.4 Construction-Advanced
195(1)
11.5.5 Construction Rules
196(1)
11.6 Functional Block Diagrams
197(1)
11.7 Cut Sets
198(1)
11.8 MOCUS Algorithm
199(1)
11.9 Bottom-Up Algorithm
199(2)
11.10 Mathematics
201(1)
11.11 Probability
202(2)
11.12 Importance Measures
204(2)
11.13 Example 1
206(1)
11.14 Example 2
207(3)
11.15 Example 3
210(5)
11.16 Phase- and Time-Dependent FTA
215(3)
11.17 Dynamic FTA
218(1)
11.18 Advantages and Disadvantages
219(1)
11.19 Common Mistakes to Avoid
220(1)
11.20 Summary
220(3)
12. Event Tree Analysis 223(12)
12.1 Introduction
223(1)
12.2 Background
223(1)
12.3 History
224(1)
12.4 Definitions
225(1)
12.5 Theory
225(3)
12.6 Methodology
228(2)
12.7 Worksheet
230(1)
12.8 Example 1
231(1)
12.9 Example 2
231(1)
12.10 Example 3
231(1)
12.11 Example 4
231(2)
12.12 Advantages and Disadvantages
233(1)
12.13 Common Mistakes to Avoid
233(1)
12.14 Summary
233(2)
13. Failure Mode and Effects Analysis 235(26)
13.1 Introduction
235(1)
13.2 Background
236(1)
13.3 History
237(1)
13.4 Definitions
237(1)
13.5 Theory
238(6)
13.5.1 Structural and Functional Models
241(1)
13.5.2 Product and Process FMEA
242(1)
13.5.3 Functional Failure Modes
242(1)
13.5.4 Hardware Failure Modes
242(1)
13.5.5 Software Failure Modes
243(1)
13.5.6 Quantitative Data Sources
244(1)
13.6 Methodology
244(3)
13.7 Worksheet
247(4)
13.8 Example 1: Hardware Product FMEA
251(1)
13.9 Example 2: Functional FMEA
252(1)
13.10 Level of Detail
252(3)
13.11 Advantages and Disadvantages
255(3)
13.12 Common Mistakes to Avoid
258(1)
13.13 Summary
258(3)
14. Fault Hazard Analysis 261(10)
14.1 Introduction
261(1)
14.2 Background
261(1)
14.3 History
262(1)
14.4 Theory
262(1)
14.5 Methodology
263(2)
14.6 Worksheet
265(1)
14.7 Example
266(1)
14.8 Advantages and Disadvantages
267(2)
14.9 Common Mistakes to Avoid
269(1)
14.10 Summary
269(2)
15. Functional Hazard Analysis 271(20)
15.1 Introduction
271(1)
15.2 Background
271(1)
15.3 History
272(1)
15.4 Theory
272(1)
15.5 Methodology
273(2)
15.6 Worksheets
275(2)
15.7 Example 1: Aircraft Flight Functions
277(1)
15.8 Example 2: Aircraft Landing Gear Software
278(1)
15.9 Example 3: Ace Missile System
278(1)
15.10 Advantages and Disadvantages
278(3)
15.11 Common Mistakes to Avoid
281(3)
15.12 Summary
284(7)
16. Sneak Circuit Analysis 291(16)
16.1 Introduction
291(1)
16.2 Background
292(1)
16.3 History
293(1)
16.4 Definitions
293(1)
16.5 Theory
294(1)
16.6 Methodology
295(5)
16.6.1 Step 1: Acquire Data
296(1)
16.6.2 Step 2: Code Data
296(1)
16.6.3 Step 3: Process Data
297(1)
16.6.4 Step 4: Produce Network Trees
297(1)
16.6.5 Step 5: Identify Topographs
298(1)
16.6.6 Step 6: Perform Analysis
298(1)
16.6.7 Step 7: Generate Report
299(1)
16.7 Example 1: Sneak Path
300(1)
16.8 Example 2: Sneak Label
301(1)
16.9 Example 3: Sneak Indicator
301(1)
16.10 Example Sneak Clues
301(2)
16.11 Software Sneak Circuit Analysis
303(1)
16.12 Advantages and Disadvantages
304(1)
16.13 Common Mistakes to Avoid
305(1)
16.14 Summary
305(2)
17. Petri Net Analysis (PNA) 307(10)
17.1 Introduction
307(1)
17.2 Background
307(1)
17.3 History
308(1)
17.4 Definitions
308(1)
17.5 Theory
309(1)
17.6 Methodology
309(4)
17.7 Examples
313(2)
17.8 Advantages and Disadvantages
315(1)
17.9 Common Mistakes to Avoid
315(1)
17.10 Summary
315(2)
18. Markov Analysis 317(18)
18.1 Introduction
317(1)
18.2 Background
318(1)
18.3 History
318(1)
18.4 Definitions
319(1)
18.5 Theory
320(1)
18.6 Methodology
320(5)
18.6.1 State Transition Diagram Construction
320(3)
18.6.2 State Equation Construction
323(2)
18.7 Examples
325(3)
18.7.1 Markov Chain
325(1)
18.7.2 Markov Model of Two-Component Series System with No Repair
325(1)
18.7.3 Markov Model of Two-Component Parallel System with No Repair
326(1)
18.7.4 Markov Model of Two-Component Parallel System with-Component Repair
326(1)
18.7.5 Markov Model of Two-Component Parallel System with ComponentSystem Repair
327(1)
18.7.6 Markov Model of Two-Component Parallel System with Sequencing
328(1)
18.8 Markov Analysis and FTA Comparisons
328(3)
18.9 Advantages and Disadvantages
331(1)
18.10 Common Mistakes to Avoid
332(1)
18.11 Summary
332(3)
19. Barrier Analysis 335(18)
19.1 Introduction
335(1)
19.2 Background
335(1)
19.3 History
336(1)
19.4 Definitions
337(1)
19.5 Theory
337(1)
19.6 Methodology
338(6)
19.6.1 Example Checklist of Energy Sources
338(1)
19.6.2 Considerations
338(6)
19.7 Worksheet
344(3)
19.8 Example
347(1)
19.9 Advantages and Disadvantages
347(2)
19.10 Common Mistakes to Avoid
349(1)
19.11 Summary
350(3)
20. Bent Pin Analysis 353(12)
20.1 Introduction
353(1)
20.2 Background
353(1)
20.3 History
354(1)
20.4 Theory
354(2)
20.5 Methodology
356(1)
20.6 Worksheet
356(2)
20.7 Example
358(2)
20.8 Advantages and Disadvantages
360(4)
20.9 Common Mistakes to Avoid
364(1)
20.10 Summary
364(1)
21. Hazard and Operability Analysis 365(18)
21.1 Introduction
365(1)
21.2 Background
366(1)
21.3 History
366(1)
21.4 Theory
367(1)
21.5 Methodology
368(5)
21.5.1 Design Representations
370(1)
21.5.2 System Parameters
371(1)
21.5.3 Guide Words
372(1)
21.5.4 Deviation from Design Intent
372(1)
21.6 Worksheet
373(2)
21.7 Example 1
375(1)
21.8 Example 2
376(1)
21.9 Advantages and Disadvantages
376(3)
21.10 Common Mistakes to Avoid
379(1)
21.11 Summary
379(4)
22. Cause-Consequence Analysis 383(14)
22.1 Introduction
383(1)
22.2 Background
383(1)
22.3 History
384(1)
22.4 Definitions
385(1)
22.5 Theory
385(1)
22.6 Methodology
386(2)
22.7 Symbols
388(1)
22.8 Worksheet
388(1)
22.9 Example 1: Three-Component Parallel System
389(1)
22.10 Example 2: Gas Pipeline System
389(5)
22.10.1 Reducing Repeated Events
390(4)
22.11 Advantages and Disadvantages
394(1)
22.12 Common Mistakes to Avoid
395(1)
22.13 Summary
395(2)
23. Common Cause Failure Analysis 397(26)
23.1 Introduction
397(1)
23.2 Background
398(1)
23.3 History
399(1)
23.4 Definitions
399(2)
23.5 Theory
401(3)
23.6 Methodology
404(9)
23.7 Defense Mechanisms
413(1)
23.8 Example
414(5)
23.9 Models
419(1)
23.10 Advantages and Disadvantages
420(1)
23.11 Common Mistakes to Avoid
420(1)
23.12 Summary
420(3)
24. Management Oversight Risk Tree Analysis 423(8)
24.1 Introduction
423(1)
24.2 Background
423(1)
24.3 History
424(1)
24.4 Theory
424(1)
24.5 Methodology
425(1)
24.6 Worksheet
425(2)
24.7 Advantages and Disadvantages
427(2)
24.8 Common Mistakes to Avoid
429(1)
24.9 Summary
430(1)
25. Software Safety Assessment 431(20)
25.1 Introduction
431(1)
25.2 Background
431(1)
25.3 History
432(1)
25.4 Theory
432(1)
25.5 Methodology
433(1)
25.6 Worksheet
434(2)
25.7 Software Risk Level
436(1)
25.8 Example
437(11)
25.9 Advantages and Disadvantages
448(1)
25.10 Common Mistakes to Avoid
448(1)
25.11 Summary
448(3)
26. Summary 451(10)
26.1 Principle 1: Hazards, Mishaps, and Risk are Not Chance Events
451(1)
26.2 Principle 2: Hazards are Created During Design
452(1)
26.3 Principle 3: Hazards are Comprised of Three Components
453(1)
26.4 Principle 4: Hazard and Mishap Risk Management Is the Core Safety Process
454(1)
26.5 Principle 5: Hazard Analysis Is a Key Element of Hazard and Mishap Risk Management
455(1)
26.6 Principle 6: Hazard Management Involves Seven Key Hazard Analysis Types
455(1)
26.7 Principle 7: Hazard Analysis Primarily Encompasses Seven Hazard Analysis Techniques
456(1)
26.8 Finis
457(4)
Appendix A List of Acronyms 461(6)
Appendix B Glossary 467(16)
Appendix C Hazard Checklists 483(14)
Index 497


CLIFTON A. ERICSON II works for EG&G Technical Services, Inc., as a project manager for system safety and software safety. Mr. Ericson previously spent thirty-five years at Boeing, where, in 2000, he won the Apollo Award for fault tree training on the International Space Station and the Boeing Achievement Award for developing the Boeing Fault Tree Analysis course. He wrote a Navy manual on system safety for the Naval Ordnance Safety and Security Activity (NOSSA) and also manages several system/software safety projects. Mr. Ericson was president (2001 2003) and executive vice president (1999 2001) of the System Safety Society. He is on the technical review committee for the Journal of System Safety, cochaired the Sixteenth International System Safety Conference, and founded the Puget Sound chapter (Seattle) of the System Safety Society. In 1998, 1999, and 2004, he won the System Safety Society's President Award for outstanding work in system safety.