4
Hazard Analysis Techniques for System Safety Copyright © 2005 John Wiley & Sons, Inc. Author(s): Clifton A. Ericson Published Online: 24 AUG 2005 Print ISBN: 9780471720195 Online ISBN: 9780471739425 DOI: 10.1002/0471739421 About this Book More about this book summary Table of contents 1. 1. You have free access to this content Frontmatter (pages i–xx) (/doi/10.1002/0471739421.fmatter/summary) Summary (/doi/10.1002/0471739421.fmatter/summary) PDF(101K) (/doi/10.1002/0471739421.fmatter/pdf) Request Permissions (https://s100.copyright.com/AppDispatchServlet? publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Frontmatter&publicatio 2. Chapter 1 System Safety (pages 1–12) (/doi/10.1002/0471739421.ch1/summary) Summary (/doi/10.1002/0471739421.ch1/summary) PDF(110K) (/doi/10.1002/0471739421.ch1/pdf) Request Permissions (https://s100.copyright.com/AppDispatchServlet? publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=System%20Safety&pub 3. Chapter 2 Hazards, Mishap, and Risk (pages 13–29) (/doi/10.1002/0471739421.ch2/summary) Summary (/doi/10.1002/0471739421.ch2/summary) PDF(146K) (/doi/10.1002/0471739421.ch2/pdf) Request Permissions (https://s100.copyright.com/AppDispatchServlet? publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Hazards%2C%20Misha 4. Chapter 3 Hazard Analysis Types and Techniques (pages 31–53) (/doi/10.1002/0471739421.ch3/summary) Summary (/doi/10.1002/0471739421.ch3/summary) PDF(149K) (/doi/10.1002/0471739421.ch3/pdf) Request Permissions (https://s100.copyright.com/AppDispatchServlet? publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Hazard%20Analysis%2 A practical guide to identifying hazards using common hazard analysis techniques Many different hazard analysis techniques have been developed over the past forty years. However, there is only a handful of techniques that safety analysts actually apply in their daily work. Written by a former president of the System Safety Society and winner of the Boeing Achievement and Apollo Awards for his safety analysis work, Hazard Analysis Techniques for System Safety explains, in detail, how to perform the most commonly used hazard analysis techniques employed by the system safety engineering discipline. Focusing on the twentytwo most commonly used hazard analysis methodologies in the system safety discipline, author Clifton Ericson outlines the three components that comprise a hazard and describes how to use these components to recognize a hazard during analysis. He then examines each technique in sufficient detail and with numerous illustrations and examples, to enable the reader to easily understand and perform the analysis. Techniques covered include: * Preliminary Hazard List (PHL) Analysis * Preliminary Hazard Analysis (PHA) * Subsystem Hazard Analysis (SSHA) * System Hazard Analysis (SHA) * Operating and Support Hazard Analysis (O&SHA) * Health Hazard Assessment (HHA) * Safety Requirements/Criteria Analysis (SRCA) * Fault Tree Analysis (FTA)

Index-Hazard Analysis Techniques for System Safety - Ericson - Wiley Online Library

Embed Size (px)

DESCRIPTION

Hazard Analysis

Citation preview

Page 1: Index-Hazard Analysis Techniques for System Safety - Ericson - Wiley Online Library

Hazard Analysis Techniques for System SafetyCopyright © 2005 John Wiley & Sons, Inc.

Author(s): Clifton A. Ericson

Published Online: 24 AUG 2005

Print ISBN: 9780471720195

Online ISBN: 9780471739425

DOI: 10.1002/0471739421

About this Book

More about this book summary

Table of contents

1.  1.  You have free access to this contentFrontmatter (pages i–xx) (/doi/10.1002/0471739421.fmatter/summary)

Summary (/doi/10.1002/0471739421.fmatter/summary)PDF(101K) (/doi/10.1002/0471739421.fmatter/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Frontmatter&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=i&endPage=xx&copyright=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.fmatter&orderSource=Wileyonline&orderBeanReset=true)

2.  Chapter 1

System Safety (pages 1–12) (/doi/10.1002/0471739421.ch1/summary)

Summary (/doi/10.1002/0471739421.ch1/summary)PDF(110K) (/doi/10.1002/0471739421.ch1/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=System%20Safety&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=1&endPage=12&copyright=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.ch1&orderSource=Wileyonline&orderBeanReset=true)

3.  Chapter 2

Hazards, Mishap, and Risk (pages 13–29) (/doi/10.1002/0471739421.ch2/summary)

Summary (/doi/10.1002/0471739421.ch2/summary)PDF(146K) (/doi/10.1002/0471739421.ch2/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Hazards%2C%20Mishap%2C%20and%20Risk&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=13&endPage=29&copyright=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.ch2&orderSource=Wileyonline&orderBeanReset=true)

4.  Chapter 3

Hazard Analysis Types and Techniques (pages 31–53) (/doi/10.1002/0471739421.ch3/summary)

Summary (/doi/10.1002/0471739421.ch3/summary)PDF(149K) (/doi/10.1002/0471739421.ch3/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Hazard%20Analysis%20Types%20and%20Techniques&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=31&endPage=53&copyright=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.ch3&orderSource=Wileyonline&orderBeanReset=true)

A practical guide to identifying hazards using common hazard analysis techniques

Many different hazard analysis techniques have been developed over the past forty years. However, there is only a handful of techniques thatsafety analysts actually apply in their daily work. Written by a former president of the System Safety Society and winner of the BoeingAchievement and Apollo Awards for his safety analysis work, Hazard Analysis Techniques for System Safety explains, in detail, how toperform the most commonly used hazard analysis techniques employed by the system safety engineering discipline.

Focusing on the twenty­two most commonly used hazard analysis methodologies in the system safety discipline, author Clifton Ericsonoutlines the three components that comprise a hazard and describes how to use these components to recognize a hazard during analysis. Hethen examines each technique in sufficient detail and with numerous illustrations and examples, to enable the reader to easily understand andperform the analysis.

Techniques covered include:* Preliminary Hazard List (PHL) Analysis* Preliminary Hazard Analysis (PHA)* Subsystem Hazard Analysis (SSHA)* System Hazard Analysis (SHA)* Operating and Support Hazard Analysis (O&SHA)* Health Hazard Assessment (HHA)* Safety Requirements/Criteria Analysis (SRCA)* Fault Tree Analysis (FTA)

Page 2: Index-Hazard Analysis Techniques for System Safety - Ericson - Wiley Online Library

5.  Chapter 4

Preliminary Hazard List (pages 55–72) (/doi/10.1002/0471739421.ch4/summary)

Summary (/doi/10.1002/0471739421.ch4/summary)PDF(143K) (/doi/10.1002/0471739421.ch4/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Preliminary%20Hazard%20List&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=55&endPage=72&copyright=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.ch4&orderSource=Wileyonline&orderBeanReset=true)

6.  Chapter 5

Preliminary Hazard Analysis (pages 73–93) (/doi/10.1002/0471739421.ch5/summary)

Summary (/doi/10.1002/0471739421.ch5/summary)PDF(155K) (/doi/10.1002/0471739421.ch5/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Preliminary%20Hazard%20Analysis&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=73&endPage=93&copyright=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.ch5&orderSource=Wileyonline&orderBeanReset=true)

7.  Chapter 6

Subsystem Hazard Analysis (pages 95–114) (/doi/10.1002/0471739421.ch6/summary)

Summary (/doi/10.1002/0471739421.ch6/summary)PDF(143K) (/doi/10.1002/0471739421.ch6/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Subsystem%20Hazard%20Analysis&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=95&endPage=114&copyright=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.ch6&orderSource=Wileyonline&orderBeanReset=true)

8.  Chapter 7

System Hazard Analysis (pages 115–129) (/doi/10.1002/0471739421.ch7/summary)

Summary (/doi/10.1002/0471739421.ch7/summary)PDF(128K) (/doi/10.1002/0471739421.ch7/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=System%20Hazard%20Analysis&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=115&endPage=129&copyright=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.ch7&orderSource=Wileyonline&orderBeanReset=true)

9.  Chapter 8

Operating and Support Hazard Analysis (pages 131–153) (/doi/10.1002/0471739421.ch8/summary)

Summary (/doi/10.1002/0471739421.ch8/summary)PDF(147K) (/doi/10.1002/0471739421.ch8/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Operating%20and%20Support%20Hazard%20Analysis&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=131&endPage=153&copyright=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.ch8&orderSource=Wileyonline&orderBeanReset=true)

10.  Chapter 9

Health Hazard Assessment (pages 155–168) (/doi/10.1002/0471739421.ch9/summary)

Summary (/doi/10.1002/0471739421.ch9/summary)PDF(99K) (/doi/10.1002/0471739421.ch9/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Health%20Hazard%20Assessment&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=155&endPage=168&copyright=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.ch9&orderSource=Wileyonline&orderBeanReset=true)

11.  Chapter 10

Safety Requirements/Criteria Analysis (pages 169–181) (/doi/10.1002/0471739421.ch10/summary)

Summary (/doi/10.1002/0471739421.ch10/summary)PDF(99K) (/doi/10.1002/0471739421.ch10/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Safety%20Requirements%2FCriteria%20Analysis&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=169&endPage=181&copyright=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.ch10&orderSource=Wileyonline&orderBeanReset=true)

12.  Chapter 11

Fault Tree Analysis (pages 183–221) (/doi/10.1002/0471739421.ch11/summary)

Summary (/doi/10.1002/0471739421.ch11/summary)PDF(288K) (/doi/10.1002/0471739421.ch11/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Fault%20Tree%20Analysis&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=183&endPage=221&copyright=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.ch11&orderSource=Wileyonline&orderBeanReset=true)

13.  Chapter 12

Event Tree Analysis (pages 223–234) (/doi/10.1002/0471739421.ch12/summary)

Summary (/doi/10.1002/0471739421.ch12/summary)PDF(110K) (/doi/10.1002/0471739421.ch12/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Event%20Tree%20Analysis&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=223&endPage=234&copyright=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.ch12&orderSource=Wileyonline&orderBeanReset=true)

14.  Chapter 13

Failure Mode and Effects Analysis (pages 235–259) (/doi/10.1002/0471739421.ch13/summary)

Summary (/doi/10.1002/0471739421.ch13/summary)PDF(166K) (/doi/10.1002/0471739421.ch13/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Failure%20Mode%20and%20Effects%20Analysis&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=235&endPage=259&copyright=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.ch13&orderSource=Wileyonline&orderBeanReset=true)

15.  Chapter 14

Fault Hazard Analysis (pages 261–269) (/doi/10.1002/0471739421.ch14/summary)

Page 3: Index-Hazard Analysis Techniques for System Safety - Ericson - Wiley Online Library

Summary (/doi/10.1002/0471739421.ch14/summary)PDF(87K) (/doi/10.1002/0471739421.ch14/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Fault%20Hazard%20Analysis&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=261&endPage=269&copyright=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.ch14&orderSource=Wileyonline&orderBeanReset=true)

16.  Chapter 15

Functional Hazard Analysis (pages 271–289) (/doi/10.1002/0471739421.ch15/summary)

Summary (/doi/10.1002/0471739421.ch15/summary)PDF(127K) (/doi/10.1002/0471739421.ch15/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Functional%20Hazard%20Analysis&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=271&endPage=289&copyright=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.ch15&orderSource=Wileyonline&orderBeanReset=true)

17.  Chapter 16

Sneak Circuit Analysis (pages 291–306) (/doi/10.1002/0471739421.ch16/summary)

Summary (/doi/10.1002/0471739421.ch16/summary)PDF(130K) (/doi/10.1002/0471739421.ch16/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Sneak%20Circuit%20Analysis&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=291&endPage=306&copyright=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.ch16&orderSource=Wileyonline&orderBeanReset=true)

18.  Chapter 17

Petri Net Analysis (PNA) (pages 307–316) (/doi/10.1002/0471739421.ch17/summary)

Summary (/doi/10.1002/0471739421.ch17/summary)PDF(90K) (/doi/10.1002/0471739421.ch17/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Petri%20Net%20Analysis%20%28PNA%29&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=307&endPage=316&copyright=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.ch17&orderSource=Wileyonline&orderBeanReset=true)

19.  Chapter 18

Markov Analysis (pages 317–333) (/doi/10.1002/0471739421.ch18/summary)

Summary (/doi/10.1002/0471739421.ch18/summary)PDF(147K) (/doi/10.1002/0471739421.ch18/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Markov%20Analysis&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=317&endPage=333&copyright=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.ch18&orderSource=Wileyonline&orderBeanReset=true)

20.  Chapter 19

Barrier Analysis (pages 335–351) (/doi/10.1002/0471739421.ch19/summary)

Summary (/doi/10.1002/0471739421.ch19/summary)PDF(144K) (/doi/10.1002/0471739421.ch19/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Barrier%20Analysis&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=335&endPage=351&copyright=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.ch19&orderSource=Wileyonline&orderBeanReset=true)

21.  Chapter 20

Bent Pin Analysis (pages 353–364) (/doi/10.1002/0471739421.ch20/summary)

Summary (/doi/10.1002/0471739421.ch20/summary)PDF(95K) (/doi/10.1002/0471739421.ch20/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Bent%20Pin%20Analysis&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=353&endPage=364&copyright=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.ch20&orderSource=Wileyonline&orderBeanReset=true)

22.  Chapter 21

Hazard and Operability Analysis (pages 365–381) (/doi/10.1002/0471739421.ch21/summary)

Summary (/doi/10.1002/0471739421.ch21/summary)PDF(120K) (/doi/10.1002/0471739421.ch21/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Hazard%20and%20Operability%20Analysis&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=365&endPage=381&copyright=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.ch21&orderSource=Wileyonline&orderBeanReset=true)

23.  Chapter 22

Cause–Consequence Analysis (pages 383–395) (/doi/10.1002/0471739421.ch22/summary)

Summary (/doi/10.1002/0471739421.ch22/summary)PDF(124K) (/doi/10.1002/0471739421.ch22/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Cause%E2%80%93Consequence%20Analysis&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=383&endPage=395&copyright=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.ch22&orderSource=Wileyonline&orderBeanReset=true)

24.  Chapter 23

Common Cause Failure Analysis (pages 397–422) (/doi/10.1002/0471739421.ch23/summary)

Summary (/doi/10.1002/0471739421.ch23/summary)PDF(178K) (/doi/10.1002/0471739421.ch23/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Common%20Cause%20Failure%20Analysis&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=397&endPage=422&copyright=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.ch23&orderSource=Wileyonline&orderBeanReset=true)

25.  Chapter 24

Management Oversight Risk Tree Analysis (pages 423–430) (/doi/10.1002/0471739421.ch24/summary)

Summary (/doi/10.1002/0471739421.ch24/summary)PDF(77K) (/doi/10.1002/0471739421.ch24/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?

Page 4: Index-Hazard Analysis Techniques for System Safety - Ericson - Wiley Online Library

publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Management%20Oversight%20Risk%20Tree%20Analysis&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=423&endPage=430&copyright=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.ch24&orderSource=Wileyonline&orderBeanReset=true)

26.  Chapter 25

Software Safety Assessment (pages 431–449) (/doi/10.1002/0471739421.ch25/summary)

Summary (/doi/10.1002/0471739421.ch25/summary)PDF(118K) (/doi/10.1002/0471739421.ch25/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Software%20Safety%20Assessment&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=431&endPage=449&copyright=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.ch25&orderSource=Wileyonline&orderBeanReset=true)

27.  Chapter 26

Summary (pages 451–459) (/doi/10.1002/0471739421.ch26/summary)

Summary (/doi/10.1002/0471739421.ch26/summary)PDF(87K) (/doi/10.1002/0471739421.ch26/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Summary&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=451&endPage=459&copyright=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.ch26&orderSource=Wileyonline&orderBeanReset=true)

28.  You have free access to this contentAppendix A: List of Acronyms (pages 461–465) (/doi/10.1002/0471739421.app1/summary)

Summary (/doi/10.1002/0471739421.app1/summary)PDF(31K) (/doi/10.1002/0471739421.app1/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Appendix%20A%3A%20List%20of%20Acronyms&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=461&endPage=465&copyright=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.app1&orderSource=Wileyonline&orderBeanReset=true)

29.  You have free access to this contentAppendix B: Glossary (pages 467–482) (/doi/10.1002/0471739421.app2/summary)

Summary (/doi/10.1002/0471739421.app2/summary)PDF(110K) (/doi/10.1002/0471739421.app2/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Appendix%20B%3A%20Glossary&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=467&endPage=482&copyright=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.app2&orderSource=Wileyonline&orderBeanReset=true)

30.  You have free access to this contentAppendix C: Hazard Checklists (pages 483–495) (/doi/10.1002/0471739421.app3/summary)

Summary (/doi/10.1002/0471739421.app3/summary)PDF(67K) (/doi/10.1002/0471739421.app3/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Appendix%20C%3A%20Hazard%20Checklists&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=483&endPage=495&copyright=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.app3&orderSource=Wileyonline&orderBeanReset=true)

31.  You have free access to this contentIndex (pages 497–499) (/doi/10.1002/0471739421.index/summary)

Summary (/doi/10.1002/0471739421.index/summary)PDF(28K) (/doi/10.1002/0471739421.index/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Index&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=497&endPage=499&copyright=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.index&orderSource=Wileyonline&orderBeanReset=true)