Cargando…

Risk assessment : tools, techniques, and their applications /

"Since the first edition of our book was published there have been several changes in the types of risk individuals, businesses, and governments are being exposed to. Cyber-attacks are more frequent and costly and lone-wolf style terrorist attacks are more common; events not addressed in the fi...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Ostrom, Lee T. (Autor), Wilhelmsen, Cheryl A., 1953- (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hoboken, NJ, USA : John Wiley & Sons, Inc., 2019.
Edición:Second edition.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 KNOVEL_on1107989594
003 OCoLC
005 20231027140348.0
006 m o d
007 cr |||||||||||
008 190405t20192019nju ob 001 0 eng
010 |a  2019981241 
040 |a DLC  |b eng  |e rda  |e pn  |c DLC  |d EBLCP  |d N$T  |d OCLCO  |d DG1  |d OCLCF  |d YDX  |d BRX  |d DG1  |d OCLCQ  |d DG1  |d OCLCQ  |d K6U  |d OCLCO  |d OCLCQ  |d OCLCO 
020 |a 9781119483373  |q (electronic book) 
020 |a 1119483379  |q (electronic book) 
020 |a 9781119483342  |q (electronic book) 
020 |a 1119483344  |q (electronic book) 
020 |a 9781119483410  |q (electronic publication) 
020 |a 1119483417  |q (electronic publication) 
020 |z 9781119483465  |q (hardcover) 
020 |z 1119483468 
029 1 |a CHNEW  |b 001060536 
029 1 |a CHVBK  |b 571899048 
035 |a (OCoLC)1107989594 
042 |a pcc 
050 4 |a TA169.55.R57  |b O88 2019 
082 0 0 |a 363.1/02  |2 23 
049 |a UAMI 
100 1 |a Ostrom, Lee T.,  |e author. 
245 1 0 |a Risk assessment :  |b tools, techniques, and their applications /  |c Lee T. Ostrom, Cheryl A. Wilhelmsen. 
250 |a Second edition. 
264 1 |a Hoboken, NJ, USA :  |b John Wiley & Sons, Inc.,  |c 2019. 
264 4 |c ©2019 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b n  |2 rdamedia 
338 |a online resource  |b nc  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
505 0 |a Introduction to risk assessment -- Risk perception -- Risks and consequences -- Ecological risk assessment -- Task analysis techniques -- Preliminary hazard analysis -- Primer on probability and statistics -- Mathematical tools for updating probabilities -- Developing probabilities -- Quantifying the unquantifiable -- Failure mode and effects analysis -- Human reliability analyses -- Critical incident technique -- Basic fault tree analysis technique -- Critical function analysis -- Event tree and decision tree analysis -- Probabilistic risk assessment -- Probabilistic risk assessment software -- Qualitative and quantitative research methods used in risk assessment -- Risk of an epidemic -- Vulnerability analysis technique -- Developing risk model for aviation inspection and maintenance tasks -- Risk assessment and community planning -- Threat assessment -- Project risk management -- Enterprise risk management overview -- Process safety management and hazard and operability assessment -- Emerging risks -- Process plant risk assessment example -- Risk assessment framework for detecting, predicting, and mitigating aircraft material -- Inspection: a case study -- Traffic risks -- Acronyms. 
520 |a "Since the first edition of our book was published there have been several changes in the types of risk individuals, businesses, and governments are being exposed to. Cyber-attacks are more frequent and costly and lone-wolf style terrorist attacks are more common; events not addressed in the first edition. The book continues to provide a resource that leads the reader through a risk assessment and shows them the proper tools to be used at the various steps in the process. This book also provides students studying safety and risk assessment a resource that assists them in understanding the various risk assessment tools. The book provides readers with a toolbox of techniques that can be used to aid them in analyzing conceptual designs, completed designs, procedures and operational risk. On top of the ten new chapters the new edition also includes expanded case studies and real life examples; coverage on risk assessment software like SAPPHIRE and RAVEN; and end-of-chapter questions for students with a solutions manual for academic adopters. The approach to the book remains the same and is analogous to a toolkit. The user locates the tool that best fits the risk assessment task they are performing. The chapters of the book progress from the concept of risk, through the simple risk assessment techniques, and into the more complex techniques. In addition to discussing the techniques, this book presents them in a form that the readers can readily adapt to their particular situation. Each chapter, where applicable, presents the technique discussed in that chapter and demonstrates how it is used"--  |c Provided by publisher. 
588 0 |a Online resource; title from digital title page (viewed on August 19, 2019). 
590 |a Knovel  |b ACADEMIC - General Engineering & Project Administration 
650 0 |a Risk assessment  |x Statistical methods. 
650 0 |a System failures (Engineering)  |x Prevention. 
650 0 |a System safety. 
650 0 |a Probabilities. 
650 2 |a Probability 
650 6 |a Évaluation du risque  |x Méthodes statistiques. 
650 6 |a Sécurité des systèmes. 
650 6 |a Probabilités. 
650 7 |a probability.  |2 aat 
650 7 |a Probabilities  |2 fast 
650 7 |a Risk assessment  |x Statistical methods  |2 fast 
650 7 |a System safety  |2 fast 
700 1 |a Wilhelmsen, Cheryl A.,  |d 1953-  |e author. 
776 0 8 |i Print version:  |a Ostrom, Lee T.  |t Risk assessment.  |b Second edition.  |d Hoboken, NJ : John Wiley & Sons, Inc., 2019  |z 9781119483465 
856 4 0 |u https://appknovel.uam.elogim.com/kn/resources/kpRATTTAE6/toc  |z Texto completo 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL5813678 
938 |a EBSCOhost  |b EBSC  |n 2194446 
994 |a 92  |b IZTAP