Preface to the Fourth Edition |
|
ix | |
The Companion Website |
|
xv | |
Acknowledgments |
|
xvii | |
|
Part I Fundamentals of Risk Modeling, Assessment, and Management |
|
|
1 | (226) |
|
1 The Art and Science of Systems and Risk Analysis |
|
|
3 | (38) |
|
|
3 | (1) |
|
|
4 | (10) |
|
1.3 Risk Assessment and Management |
|
|
14 | (12) |
|
|
26 | (9) |
|
|
35 | (6) |
|
|
35 | (6) |
|
2 The Role of Modeling in the Definition and Quantification of the Risk Function |
|
|
41 | (28) |
|
|
41 | (2) |
|
2.2 The Risk Assessment and Management Process: Historical Perspectives |
|
|
43 | (2) |
|
2.3 Information, Intelligence, and Models |
|
|
45 | (2) |
|
2.4 The Building Blocks of Mathematical Models |
|
|
47 | (4) |
|
2.5 On the Complex Definition of Risk, Vulnerability, and Resilience: A Systems-Based Approach |
|
|
51 | (5) |
|
2.6 On the Definition of Vulnerabilities in Measuring Risks to Systems |
|
|
56 | (1) |
|
2.7 On the Definition of Resilience in Measuring Risk to Systems |
|
|
57 | (3) |
|
2.8 On the Complex Quantification of Risk to Systems |
|
|
60 | (9) |
|
|
65 | (4) |
|
3 Identifying Risk through Hierarchical Holographic Modeling and Its Derivatives |
|
|
69 | (46) |
|
|
69 | (1) |
|
3.2 Hierarchical Overlapping Coordination |
|
|
70 | (3) |
|
|
73 | (3) |
|
3.4 HHM and the Theory of Scenario Structuring |
|
|
76 | (3) |
|
3.5 Adaptive Multiplayer HHM Game |
|
|
79 | (1) |
|
3.6 Water Resources System |
|
|
80 | (3) |
|
3.7 Sustainable Development |
|
|
83 | (3) |
|
3.8 HHM in a System Acquisition Project |
|
|
86 | (4) |
|
|
90 | (4) |
|
3.10 Hardening the Water Supply Infrastructure |
|
|
94 | (4) |
|
3.11 Risk Assessment and Management for Support of Operations other than War |
|
|
98 | (5) |
|
3.12 Automated Highway System |
|
|
103 | (5) |
|
3.13 Food-Poisoning Scenarios |
|
|
108 | (7) |
|
|
113 | (2) |
|
4 Modeling and Decision Analysis |
|
|
115 | (40) |
|
|
115 | (1) |
|
4.2 Decision Rules Under Uncertainty |
|
|
116 | (2) |
|
|
118 | (4) |
|
|
122 | (2) |
|
|
124 | (3) |
|
4.6 Triangular Distribution |
|
|
127 | (1) |
|
|
128 | (4) |
|
4.8 Population Dynamic Models |
|
|
132 | (7) |
|
|
139 | (5) |
|
|
144 | (11) |
|
|
152 | (3) |
|
5 Multiobjective Trade-Off Analysis |
|
|
155 | (24) |
|
|
155 | (2) |
|
5.2 Examples of Multiple Environmental Objectives |
|
|
157 | (2) |
|
5.3 The Surrogate Worth Trade-Off Method |
|
|
159 | (7) |
|
5.4 Characterizing a Proper Noninferior Solution |
|
|
166 | (2) |
|
5.5 The SWT Method and the Utility Function Approach |
|
|
168 | (4) |
|
|
172 | (5) |
|
|
177 | (2) |
|
|
178 | (1) |
|
6 Defining Uncertainty and Sensitivity Analysis |
|
|
179 | (32) |
|
|
179 | (1) |
|
6.2 Sensitivity, Responsivity, Stability, and Irreversibility |
|
|
180 | (2) |
|
6.3 Uncertainties Due to Errors in Modeling |
|
|
182 | (1) |
|
6.4 Characterization of Modeling Errors |
|
|
183 | (2) |
|
|
185 | (11) |
|
|
196 | (3) |
|
6.7 Formulation of the Multiobjective Optimization Problem |
|
|
199 | (5) |
|
6.8 A Robust Algorithm of the USIM |
|
|
204 | (3) |
|
6.9 Integration of the USIM with Parameter Optimization at the Design Stage |
|
|
207 | (2) |
|
|
209 | (2) |
|
|
209 | (2) |
|
7 Risk Filtering, Ranking, and Management |
|
|
211 | (1) |
|
|
211 | (16) |
|
7.2 Past Efforts in Risk Filtering and Ranking |
|
|
212 | (1) |
|
7.3 RFRM: A Methodological Framework |
|
|
213 | (7) |
|
|
220 | (4) |
|
|
224 | (3) |
|
|
224 | (3) |
|
Part II Advances in Risk Modeling, Assessment, and Management |
|
|
227 | (390) |
|
8 Risk of Extreme Events and the Fallacy of the Expected Value |
|
|
229 | (30) |
|
|
229 | (1) |
|
8.2 Risk of Extreme Events |
|
|
230 | (2) |
|
8.3 The Fallacy of the Expected Value |
|
|
232 | (1) |
|
|
233 | (3) |
|
8.5 General Formulation of the PMRM |
|
|
236 | (2) |
|
|
238 | (1) |
|
|
239 | (1) |
|
8.8 Analysis of Dam Failure and Extreme Flood through the PMRM |
|
|
240 | (3) |
|
|
243 | (14) |
|
|
257 | (2) |
|
|
257 | (2) |
|
9 Multiobjective Decision-Tree Analysis |
|
|
259 | (36) |
|
|
259 | (2) |
|
9.2 Methodological Approach |
|
|
261 | (18) |
|
9.3 Differences between SODT and MODT |
|
|
279 | (2) |
|
|
281 | (1) |
|
|
282 | (13) |
|
|
293 | (2) |
|
10 Multiobjective Risk Impact Analysis Method |
|
|
295 | (34) |
|
|
295 | (1) |
|
|
296 | (1) |
|
10.3 The Multiobjective, Multistage Impact Analysis Method: An Overview |
|
|
297 | (1) |
|
10.4 Combining the PMRM and the MMIAM |
|
|
298 | (6) |
|
10.5 Relating Multiobjective Decision Trees to the MRIAM |
|
|
304 | (9) |
|
|
313 | (12) |
|
|
325 | (4) |
|
|
326 | (3) |
|
11 Statistics of Extremes: Extension of the PMRM |
|
|
329 | (42) |
|
11.1 A Review of the Partitioned Multiobjective Risk Method |
|
|
329 | (4) |
|
11.2 Statistics of Extremes |
|
|
333 | (5) |
|
11.3 Incorporating the Statistics of Extremes into the PMRM |
|
|
338 | (6) |
|
11.4 Sensitivity Analysis of the Approximation of f4(·) |
|
|
344 | (6) |
|
11.5 Generalized Quantification of Risk of Extreme Events |
|
|
350 | (6) |
|
|
356 | (1) |
|
|
357 | (14) |
|
|
368 | (3) |
|
12 Systems-Based Guiding Principles for Risk Modeling, Planning, Assessment, Management, and Communication |
|
|
371 | (18) |
|
|
371 | (1) |
|
12.2 The Journey: The Guiding Principles in the Broader Context of the Emerging Next Generation Developed by the Federal Aviation Administration |
|
|
372 | (17) |
|
|
387 | (2) |
|
|
389 | (34) |
|
|
389 | (2) |
|
13.2 Basic Fault-Tree Analysis |
|
|
391 | (1) |
|
13.3 Reliability and Fault-Tree Analysis |
|
|
392 | (5) |
|
|
397 | (3) |
|
13.5 The DARE Using Fault Trees |
|
|
400 | (3) |
|
13.6 Extreme Events in Fault Tree Analysis |
|
|
403 | (2) |
|
13.7 An Example Problem Based on a Case Study |
|
|
405 | (4) |
|
13.8 Failure Mode and Effects Analysis and Failure Mode, Effects, and Criticality Analysis |
|
|
409 | (2) |
|
|
411 | (3) |
|
|
414 | (9) |
|
|
420 | (3) |
|
14 Multiobjective Statistical Method |
|
|
423 | (16) |
|
|
423 | (1) |
|
14.2 Mathematical Formulation of the Interior Drainage Problem |
|
|
424 | (1) |
|
14.3 Formulation of the Optimization Problem |
|
|
424 | (1) |
|
14.4 The MSM: Step-by-Step |
|
|
425 | (2) |
|
|
427 | (1) |
|
|
428 | (1) |
|
|
429 | (3) |
|
|
432 | (7) |
|
|
438 | (1) |
|
15 Principles and Guidelines for Project Risk Management |
|
|
439 | (34) |
|
|
439 | (1) |
|
15.2 Definitions and Principles of Project Risk Management |
|
|
440 | (3) |
|
15.3 Project Risk Management Methods |
|
|
443 | (7) |
|
15.4 Aircraft Development Example |
|
|
450 | (4) |
|
15.5 Quantitative Risk Assessment and Management of Software Acquisition |
|
|
454 | (4) |
|
15.6 Critical Factors That Affect Software Nontechnical Risk |
|
|
458 | (2) |
|
15.7 Basis for Variances in Cost Estimation |
|
|
460 | (1) |
|
15.8 Discrete Dynamic Modeling |
|
|
461 | (8) |
|
|
469 | (4) |
|
|
469 | (4) |
|
16 Modeling Complex Systems of Systems with Phantom System Models |
|
|
473 | (20) |
|
|
473 | (1) |
|
16.2 What Have We Learned from Other Contributors? |
|
|
474 | (2) |
|
16.3 The Centrality of the States of the System in Modeling and in Risk Analysis |
|
|
476 | (1) |
|
16.4 The Centrality of Time in Modeling Multidimensional Risk, Uncertainty, and Benefits |
|
|
477 | (1) |
|
16.5 Extension of HHM to PSM |
|
|
478 | (2) |
|
16.6 PSM and Meta-modeling |
|
|
480 | (6) |
|
|
486 | (2) |
|
|
488 | (5) |
|
|
489 | (4) |
|
17 Adaptive Two-Player Hierarchical Holographic Modeling Game for Counterterrorism Intelligence Analysis |
|
|
493 | (18) |
|
|
493 | (1) |
|
|
494 | (1) |
|
17.3 Modeling the Multiple Perspectives of Complex Systems |
|
|
495 | (4) |
|
17.4 Adaptive Two-Player HHM Game: Terrorist Networks versus Homeland Protection |
|
|
499 | (3) |
|
17.5 The Building Blocks of Mathematical Models and the Centrality of State Variables in Intelligence Analysis |
|
|
502 | (2) |
|
17.6 Hierarchical Adaptive Two-Player HHM Game |
|
|
504 | (1) |
|
17.7 Collaborative Computing Support for Adaptive Two-Player HHM Games |
|
|
505 | (2) |
|
|
507 | (4) |
|
|
508 | (3) |
|
18 Inoperability Input--Output Model and Its Derivatives for Interdependent Infrastructure Sectors |
|
|
511 | (32) |
|
|
511 | (1) |
|
18.2 Background: The Original Leontief Input--Output Model |
|
|
512 | (1) |
|
18.3 Inoperability Input--Output Model |
|
|
513 | (3) |
|
|
516 | (1) |
|
18.5 Supporting Databases for IIM Analysis |
|
|
517 | (1) |
|
18.6 National and Regional Databases for IIM Analysis |
|
|
518 | (4) |
|
|
522 | (1) |
|
18.8 Development of the IIM and Its Extensions |
|
|
523 | (4) |
|
|
527 | (3) |
|
18.10 Practical Uses of the IIM |
|
|
530 | (3) |
|
|
533 | (3) |
|
|
536 | (3) |
|
|
539 | (4) |
|
|
540 | (3) |
|
|
543 | (74) |
|
19.1 A Risk-Based Input--Output Methodology for Measuring the Effects of the August 2003 Northeast Blackout |
|
|
543 | (15) |
|
19.2 Systemic Valuation of Strategic Preparedness Through Applying the IIM with Lessons Learned from Hurricane Katrina |
|
|
558 | (11) |
|
19.3 Ex Post Analysis Using the IIM of the September 11, 2001, Attack on the United States |
|
|
569 | (6) |
|
19.4 Risk Modeling, Assessment, and Management of Lahar Flow Threat |
|
|
575 | (12) |
|
19.5 The Statistics of Extreme Events and 6-Sigma Capability |
|
|
587 | (6) |
|
19.6 Sequential Pareto-Optimal Decisions Made During Emergent Complex Systems of Systems: An Application to the FAA NextGen |
|
|
593 | (24) |
|
|
612 | (5) |
|
Appendix: Optimization Techniques |
|
|
617 | (50) |
|
A.1 Introduction to Modeling and Optimization |
|
|
617 | (38) |
|
A.2 Bayesian Analysis and the Prediction of Chemical Carcinogenicity |
|
|
655 | (2) |
|
A.3 The Farmer's Dilemma: Linear Model and Duality |
|
|
657 | (7) |
|
A.4 Standard Normal Probability Table |
|
|
664 | (3) |
|
|
665 | (2) |
Author Index |
|
667 | (6) |
Subject Index |
|
673 | |