Bow-Tie Industrial Risk Management Across Sectors. Luca Fiorentini. Читать онлайн. Newlib. NEWLIB.NET

Автор: Luca Fiorentini
Издательство: John Wiley & Sons Limited
Серия:
Жанр произведения: Программы
Год издания: 0
isbn: 9781119523673
Скачать книгу
1 Applicability of tools for risk assessment.

      2 Chapter 2Table 2 Example of “what‐if” analysis.Table 3 Guidewords for HAZOP analysis.Table 4 Extract of an example of HAZOP analysis. Adapted from Assael and Kako...Table 5 Subdivision of the analyzed system into areas.Table 6 Hazards and assumed event in HAZID.Table 7 List of typical consequences.Table 8 HAZID worksheet.Table 9 Different classification of barriers as physical or non‐physical.Table 10 Comparison of defined hazards with insufficient detail and optimal d...Table 11 Comparison of defined top events with insufficient detail and with a...Table 12 Comparison of defined causes with insufficient detail and with an op...Table 13 Comparison of defined consequences with insufficient detail and with...Table 14 Barrier Types.Table 15 Quality scores and judgments on the effectiveness of barriers.Table 16 Standard Performance Scores (PS)

      3 Chapter 3Table 17 Definition of BRFs in Tripod Beta.Table 18 Example of spreadsheet event timeline.Table 19 Example of Gantt chart investigation timeline.

      4 Chapter 4Table 20 Barrier function score (FS).Table 21 Barrier consequence of failure score (CS).Table 22 Barrier redundancy score (RS).Table 23 Barrier criticality ranking.Table 24 Barrier criticality assessment example.Table 25 Interpretation of the barrier‐based audit response histograms.Table 26 Survey team members should and should not.Table 27 General information about the case study.Table 28 Record of the supervisor systems (adapted from Italian).Table 29 Threshold values according to Italian regulations.Table 30 Summary of the investigation.

      5 Appendix 3Table 31 Example of calculating HEP with the SPAR‐H Method.Table 32 PIF (current configuration).Table 33 PIF (Configuration A).Table 34 PIF (POST configuration).Table 35 Frequency of incidental assumptions considered.

      List of Illustrations

      1 Preface 3Figure 1 Descent from Col du Chardonnet. Is it safe?

      2 Preface 5Figure 2 Bas‐relief depicting the god Kairos.Figure 3 The epistemological meaning of security.

      3 Chapter 1Figure 4 Swiss Cheese Model.Figure 5 Top five global risks in terms of likelihood (2007–2020).Figure 6 Top five global risks in terms of impact (2007–2020).Figure 7 Different perspectives on risk.Figure 8 Definition of the scope of risk management.Figure 9 Relationship between principles, framework, and risk management pro...Figure 10 The principles of RM according to ISO 31000.Figure 11 The RM framework.Figure 12 Components of a risk management framework.Figure 13 Risk management framework.Figure 14 Leadership and commitment.Figure 15 Internal and external context.Figure 16 Identify the requirements related to risk management.Figure 17 Implementing the risk management framework.Figure 18 Scheme of the risk management process according to ISO 31000.Figure 19 Relationship between the RM principles, framework, and process.Figure 20 Improving the risk management framework.Figure 21 The risk assessment phase in the context of the RM process.Figure 22 Level of risk.Figure 23 Frequency analysis and probability estimation.Figure 24 Risk acceptability and tolerability thresholds.Figure 25 Example of a risk matrix with level of acceptability regions.Figure 26 Prioritization of risk given impact and liklihood.Figure 27 Risk prioritization and the risk matrix.Figure 28 Matrix example for qualitative ALARP analysis.Figure 29 Achieving balance in risk reduction.Figure 30 Risk treatment activities.Figure 31 Residual risk.Figure 32 Risk management process continuous improvement.Figure 33 Documenting the risk management process.Figure 34 Skills and knowledge for a risk manager.Figure 35 Resources to be allocated for an effective RM.Figure 36 Understand the mission, objectives, values, and strategies.Figure 37 Risk control hierarchy and in practice.Figure 38 Thinking‐Behavior‐Result model.Figure 39 Stimulus‐Response model.Figure 40 Two‐pointed model.Figure 41 Inverted two‐pointed model.Figure 42 Human factors in process plant operation.Figure 43 The principles of RM according to ISO 31000.Figure 44 Main types of business risks.Figure 45 Most common enterprise risks.Figure 46 Culture maturity level in an organization.Figure 47 Safety culture levels.Figure 48 Quality of risk management approach.Figure 49 The pathological condition.Figure 50 The reactive condition.Figure 51 The bureaucratic condition.Figure 52 The proactive condition.Figure 53 The generative condition.Figure 54 The Deming Cycle PDCA.Figure 55 Swiss Cheese Model applied to a major industrial event.Figure 56 Maturity model.

      4 Chapter 2Figure 57 Feed line propane‐butane separation column.Figure 58 Basic structure of a fault tree (horizontal).Figure 59 Basic structure of a fault tree (vertical).Figure 60 Basic Events.Figure 61 Example of the fault tree, taking inspiration from the Åsta railwa...Figure 62 Gates.Figure 63 Fire triangle using FTA.Figure 64 Flammable liquid storage system.Figure 65 Example of FTA for a flammable liquid storage system.Figure 66 Fault tree example.Figure 67 The structure of a typical ETA diagram.Figure 68 Event tree analysis for the Åsta railway accident.Figure 69 Pipe connected to a vessel.Figure 70 Example of event tree for the pipe rupture.Figure 71 Bow‐Tie diagram structure.Figure 72 F‐N Curve.Figure 73 Example of a risk matrix with acceptability regions.Figure 74 Calibrated risk graph.Figure 75 A typical Bow‐Tie.Figure 76 Bow‐Tie as the combination of an FTA and an ETA.Figure 77 The Swiss Cheese Model by James Reason.Figure 78 Bow‐Tie project risk assessment.Figure 79 Bow‐Tie diagram – transfer of a data center.Figure 80 Bow‐Tie diagram on virtual classroom training.Figure 81 Level of abstraction.Figure 82 Zoom level and point in time.Figure 83 Example of point in time.Figure 84 Basic elements of a Bow‐Tie diagram.Figure 85 Determining the threshold level to cause the top event.Figure 86 Barrier functions.Figure 87 Location of elimination and prevention barriers.Figure 88 Location of control and mitigation barriers.Figure 89 Barrier systems.Figure 90 Using the same barrier on either side of the Bow‐Tie diagram.Figure 91 Classification of safety barriers.Figure 92 Barrier classification promoted by the AIChE CCPS Guidelines.Figure 93 The energy model.Figure 94 Generic safety functions related to a process model.Figure 95 Layers of defence