Risk Assessment. Marvin Rausand. Читать онлайн. Newlib. NEWLIB.NET

Автор: Marvin Rausand
Издательство: John Wiley & Sons Limited
Серия:
Жанр произведения: Математика
Год издания: 0
isbn: 9781119377221
Скачать книгу
that the publisher is not engaged in rendering professional services. The advice and strategies contained herein may not be suitable for your situation. You should consult with a specialist where appropriate. Further, readers should be aware that websites listed in this work may have changed or disappeared between when this work was written and when it is read. Neither the publisher nor authors shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.

       Library of Congress Cataloging‐in‐Publication Data

      Names: Rausand, Marvin, author. | Haugen, Stein, author.

      Title: Risk assessment : theory, methods, and applications / Marvin

      Rausand, Stein Haugen.

      Description: Second edition. | Hoboken, NJ : John Wiley & Sons, 2020. |

      Series: Wiley series in statistics in practice | Includes

      bibliographical references and index.

      Identifiers: LCCN 2019041379 (print) | LCCN 2019041380 (ebook) | ISBN

      9781119377238 (hardback) | ISBN 9781119377283 (adobe pdf) | ISBN

      9781119377221 (epub)

      Subjects: LCSH: Technology–Risk assessment. | Risk assessment.

      Classification: LCC T174.5 .R37 2020 (print) | LCC T174.5 (ebook) | DDC

      363.1/02–dc22

      LC record available at https://lccn.loc.gov/2019041379

      LC ebook record available at https://lccn.loc.gov/2019041380

      Cover Design: Wiley

      Cover Image: © Soloviova Liudmyla/Shutterstock

       To Hella, Guro and Idunn, Emil and Tiril

       To Jorunn, Trine, Ingrid, Kristian and Brage, Nora and Alma

      This second edition is a major update of the first edition (Rausand 2011). Almost all sections have been reorganized and rewritten. The most significant changes include:

       Chapters 1 and 2 are totally rewritten and many definitions have been rephrased.

       Material related to the risk assessment process is merged into a new Chapter 3.

       Aspects related to the study object and its delimitation are presented in a new Chapter 4.

       The section on Petri nets is removed.

       The STAMP accident model and the STPA method are covered in a new section.

       Additional new chapters cover:– Risk analysis and management in operation– Security assessment– Life cycle use of risk analysis

       Exercise problems are provided at the end of all relevant chapters.

       The glossary of terms has been removed. Instead, definitions are highlighted in the subject index.

       An author index has been added.

      An immense amount of relevant information is today available on the Internet, and many of the aspects discussed in this book may be found as books, reports, notes, tutorials, or slides. The quality of this information is varying and ranging from very high to very low, the terminology is often not consistent, and it may sometimes be a challenge to read some of these Internet resources. After having read this book, we hope it will be easier to search for supplementary information, to understand this information, and to judge its quality.

       The book was originally written as a textbook for university courses in risk analysis and risk assessment at NTNU. This second edition is based on experience gained from use of the first edition, at NTNU and other universities.

       The book is in addition intended to be a guide for practical risk assessments. The various methods are therefore described sufficiently such that you should be able to use the method after having read the description. Each method is described according to the same structure. The method descriptions are, as far as possible, self‐contained, and it should therefore not be necessary to read the entire book to apply the individual methods.

      Readers should have a basic course in probability theory. A brief introduction to probability theory is provided in Appendix A. The reader should refer to this appendix to get an understanding of what knowledge is expected.

      A wide range of theories and methods have been developed for risk analysis. All these cannot be covered in an introductory text. The objective of the book is not to show how knowledgeable the authors are, but to present theory, methods, and knowledge that will be useful for you as a risk analyst. When selecting material to cover, we focus on methods that:

       Are commonly used in industry or in other application areas

       Give the analyst insight and increases her understanding of the system (such that system weaknesses can be identified at an early stage of the analysis)

       Provide the analyst with genuine insight into system behavior

       Can be used for hand‐calculation (at least for small systems)

       Can be explained rather easily to, and understood by non‐risk specialists and managers.

      Both authors have been engaged in applications related to the offshore oil and gas industry, and many examples therefore come from this industry. The methods described and many of the examples are equally suitable for other industries and application areas.

      Use of Software Programs

      Organization

      This book is divided into 20 chapters and two appendices. Chapters 1–9 focus on the basic concepts and the theory behind risk analysis and risk assessment. Скачать книгу