Upload
adhavanrk
View
6
Download
0
Embed Size (px)
DESCRIPTION
Hazard Analysis
Citation preview
Hazard Analysis Techniques for System SafetyCopyright © 2005 John Wiley & Sons, Inc.
Author(s): Clifton A. Ericson
Published Online: 24 AUG 2005
Print ISBN: 9780471720195
Online ISBN: 9780471739425
DOI: 10.1002/0471739421
About this Book
More about this book summary
Table of contents
1. 1. You have free access to this contentFrontmatter (pages i–xx) (/doi/10.1002/0471739421.fmatter/summary)
Summary (/doi/10.1002/0471739421.fmatter/summary)PDF(101K) (/doi/10.1002/0471739421.fmatter/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Frontmatter&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=i&endPage=xx©right=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.fmatter&orderSource=Wileyonline&orderBeanReset=true)
2. Chapter 1
System Safety (pages 1–12) (/doi/10.1002/0471739421.ch1/summary)
Summary (/doi/10.1002/0471739421.ch1/summary)PDF(110K) (/doi/10.1002/0471739421.ch1/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=System%20Safety&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=1&endPage=12©right=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.ch1&orderSource=Wileyonline&orderBeanReset=true)
3. Chapter 2
Hazards, Mishap, and Risk (pages 13–29) (/doi/10.1002/0471739421.ch2/summary)
Summary (/doi/10.1002/0471739421.ch2/summary)PDF(146K) (/doi/10.1002/0471739421.ch2/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Hazards%2C%20Mishap%2C%20and%20Risk&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=13&endPage=29©right=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.ch2&orderSource=Wileyonline&orderBeanReset=true)
4. Chapter 3
Hazard Analysis Types and Techniques (pages 31–53) (/doi/10.1002/0471739421.ch3/summary)
Summary (/doi/10.1002/0471739421.ch3/summary)PDF(149K) (/doi/10.1002/0471739421.ch3/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Hazard%20Analysis%20Types%20and%20Techniques&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=31&endPage=53©right=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.ch3&orderSource=Wileyonline&orderBeanReset=true)
A practical guide to identifying hazards using common hazard analysis techniques
Many different hazard analysis techniques have been developed over the past forty years. However, there is only a handful of techniques thatsafety analysts actually apply in their daily work. Written by a former president of the System Safety Society and winner of the BoeingAchievement and Apollo Awards for his safety analysis work, Hazard Analysis Techniques for System Safety explains, in detail, how toperform the most commonly used hazard analysis techniques employed by the system safety engineering discipline.
Focusing on the twentytwo most commonly used hazard analysis methodologies in the system safety discipline, author Clifton Ericsonoutlines the three components that comprise a hazard and describes how to use these components to recognize a hazard during analysis. Hethen examines each technique in sufficient detail and with numerous illustrations and examples, to enable the reader to easily understand andperform the analysis.
Techniques covered include:* Preliminary Hazard List (PHL) Analysis* Preliminary Hazard Analysis (PHA)* Subsystem Hazard Analysis (SSHA)* System Hazard Analysis (SHA)* Operating and Support Hazard Analysis (O&SHA)* Health Hazard Assessment (HHA)* Safety Requirements/Criteria Analysis (SRCA)* Fault Tree Analysis (FTA)
5. Chapter 4
Preliminary Hazard List (pages 55–72) (/doi/10.1002/0471739421.ch4/summary)
Summary (/doi/10.1002/0471739421.ch4/summary)PDF(143K) (/doi/10.1002/0471739421.ch4/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Preliminary%20Hazard%20List&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=55&endPage=72©right=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.ch4&orderSource=Wileyonline&orderBeanReset=true)
6. Chapter 5
Preliminary Hazard Analysis (pages 73–93) (/doi/10.1002/0471739421.ch5/summary)
Summary (/doi/10.1002/0471739421.ch5/summary)PDF(155K) (/doi/10.1002/0471739421.ch5/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Preliminary%20Hazard%20Analysis&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=73&endPage=93©right=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.ch5&orderSource=Wileyonline&orderBeanReset=true)
7. Chapter 6
Subsystem Hazard Analysis (pages 95–114) (/doi/10.1002/0471739421.ch6/summary)
Summary (/doi/10.1002/0471739421.ch6/summary)PDF(143K) (/doi/10.1002/0471739421.ch6/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Subsystem%20Hazard%20Analysis&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=95&endPage=114©right=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.ch6&orderSource=Wileyonline&orderBeanReset=true)
8. Chapter 7
System Hazard Analysis (pages 115–129) (/doi/10.1002/0471739421.ch7/summary)
Summary (/doi/10.1002/0471739421.ch7/summary)PDF(128K) (/doi/10.1002/0471739421.ch7/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=System%20Hazard%20Analysis&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=115&endPage=129©right=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.ch7&orderSource=Wileyonline&orderBeanReset=true)
9. Chapter 8
Operating and Support Hazard Analysis (pages 131–153) (/doi/10.1002/0471739421.ch8/summary)
Summary (/doi/10.1002/0471739421.ch8/summary)PDF(147K) (/doi/10.1002/0471739421.ch8/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Operating%20and%20Support%20Hazard%20Analysis&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=131&endPage=153©right=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.ch8&orderSource=Wileyonline&orderBeanReset=true)
10. Chapter 9
Health Hazard Assessment (pages 155–168) (/doi/10.1002/0471739421.ch9/summary)
Summary (/doi/10.1002/0471739421.ch9/summary)PDF(99K) (/doi/10.1002/0471739421.ch9/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Health%20Hazard%20Assessment&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=155&endPage=168©right=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.ch9&orderSource=Wileyonline&orderBeanReset=true)
11. Chapter 10
Safety Requirements/Criteria Analysis (pages 169–181) (/doi/10.1002/0471739421.ch10/summary)
Summary (/doi/10.1002/0471739421.ch10/summary)PDF(99K) (/doi/10.1002/0471739421.ch10/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Safety%20Requirements%2FCriteria%20Analysis&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=169&endPage=181©right=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.ch10&orderSource=Wileyonline&orderBeanReset=true)
12. Chapter 11
Fault Tree Analysis (pages 183–221) (/doi/10.1002/0471739421.ch11/summary)
Summary (/doi/10.1002/0471739421.ch11/summary)PDF(288K) (/doi/10.1002/0471739421.ch11/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Fault%20Tree%20Analysis&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=183&endPage=221©right=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.ch11&orderSource=Wileyonline&orderBeanReset=true)
13. Chapter 12
Event Tree Analysis (pages 223–234) (/doi/10.1002/0471739421.ch12/summary)
Summary (/doi/10.1002/0471739421.ch12/summary)PDF(110K) (/doi/10.1002/0471739421.ch12/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Event%20Tree%20Analysis&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=223&endPage=234©right=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.ch12&orderSource=Wileyonline&orderBeanReset=true)
14. Chapter 13
Failure Mode and Effects Analysis (pages 235–259) (/doi/10.1002/0471739421.ch13/summary)
Summary (/doi/10.1002/0471739421.ch13/summary)PDF(166K) (/doi/10.1002/0471739421.ch13/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Failure%20Mode%20and%20Effects%20Analysis&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=235&endPage=259©right=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.ch13&orderSource=Wileyonline&orderBeanReset=true)
15. Chapter 14
Fault Hazard Analysis (pages 261–269) (/doi/10.1002/0471739421.ch14/summary)
Summary (/doi/10.1002/0471739421.ch14/summary)PDF(87K) (/doi/10.1002/0471739421.ch14/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Fault%20Hazard%20Analysis&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=261&endPage=269©right=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.ch14&orderSource=Wileyonline&orderBeanReset=true)
16. Chapter 15
Functional Hazard Analysis (pages 271–289) (/doi/10.1002/0471739421.ch15/summary)
Summary (/doi/10.1002/0471739421.ch15/summary)PDF(127K) (/doi/10.1002/0471739421.ch15/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Functional%20Hazard%20Analysis&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=271&endPage=289©right=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.ch15&orderSource=Wileyonline&orderBeanReset=true)
17. Chapter 16
Sneak Circuit Analysis (pages 291–306) (/doi/10.1002/0471739421.ch16/summary)
Summary (/doi/10.1002/0471739421.ch16/summary)PDF(130K) (/doi/10.1002/0471739421.ch16/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Sneak%20Circuit%20Analysis&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=291&endPage=306©right=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.ch16&orderSource=Wileyonline&orderBeanReset=true)
18. Chapter 17
Petri Net Analysis (PNA) (pages 307–316) (/doi/10.1002/0471739421.ch17/summary)
Summary (/doi/10.1002/0471739421.ch17/summary)PDF(90K) (/doi/10.1002/0471739421.ch17/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Petri%20Net%20Analysis%20%28PNA%29&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=307&endPage=316©right=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.ch17&orderSource=Wileyonline&orderBeanReset=true)
19. Chapter 18
Markov Analysis (pages 317–333) (/doi/10.1002/0471739421.ch18/summary)
Summary (/doi/10.1002/0471739421.ch18/summary)PDF(147K) (/doi/10.1002/0471739421.ch18/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Markov%20Analysis&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=317&endPage=333©right=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.ch18&orderSource=Wileyonline&orderBeanReset=true)
20. Chapter 19
Barrier Analysis (pages 335–351) (/doi/10.1002/0471739421.ch19/summary)
Summary (/doi/10.1002/0471739421.ch19/summary)PDF(144K) (/doi/10.1002/0471739421.ch19/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Barrier%20Analysis&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=335&endPage=351©right=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.ch19&orderSource=Wileyonline&orderBeanReset=true)
21. Chapter 20
Bent Pin Analysis (pages 353–364) (/doi/10.1002/0471739421.ch20/summary)
Summary (/doi/10.1002/0471739421.ch20/summary)PDF(95K) (/doi/10.1002/0471739421.ch20/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Bent%20Pin%20Analysis&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=353&endPage=364©right=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.ch20&orderSource=Wileyonline&orderBeanReset=true)
22. Chapter 21
Hazard and Operability Analysis (pages 365–381) (/doi/10.1002/0471739421.ch21/summary)
Summary (/doi/10.1002/0471739421.ch21/summary)PDF(120K) (/doi/10.1002/0471739421.ch21/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Hazard%20and%20Operability%20Analysis&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=365&endPage=381©right=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.ch21&orderSource=Wileyonline&orderBeanReset=true)
23. Chapter 22
Cause–Consequence Analysis (pages 383–395) (/doi/10.1002/0471739421.ch22/summary)
Summary (/doi/10.1002/0471739421.ch22/summary)PDF(124K) (/doi/10.1002/0471739421.ch22/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Cause%E2%80%93Consequence%20Analysis&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=383&endPage=395©right=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.ch22&orderSource=Wileyonline&orderBeanReset=true)
24. Chapter 23
Common Cause Failure Analysis (pages 397–422) (/doi/10.1002/0471739421.ch23/summary)
Summary (/doi/10.1002/0471739421.ch23/summary)PDF(178K) (/doi/10.1002/0471739421.ch23/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Common%20Cause%20Failure%20Analysis&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=397&endPage=422©right=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.ch23&orderSource=Wileyonline&orderBeanReset=true)
25. Chapter 24
Management Oversight Risk Tree Analysis (pages 423–430) (/doi/10.1002/0471739421.ch24/summary)
Summary (/doi/10.1002/0471739421.ch24/summary)PDF(77K) (/doi/10.1002/0471739421.ch24/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?
publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Management%20Oversight%20Risk%20Tree%20Analysis&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=423&endPage=430©right=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.ch24&orderSource=Wileyonline&orderBeanReset=true)
26. Chapter 25
Software Safety Assessment (pages 431–449) (/doi/10.1002/0471739421.ch25/summary)
Summary (/doi/10.1002/0471739421.ch25/summary)PDF(118K) (/doi/10.1002/0471739421.ch25/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Software%20Safety%20Assessment&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=431&endPage=449©right=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.ch25&orderSource=Wileyonline&orderBeanReset=true)
27. Chapter 26
Summary (pages 451–459) (/doi/10.1002/0471739421.ch26/summary)
Summary (/doi/10.1002/0471739421.ch26/summary)PDF(87K) (/doi/10.1002/0471739421.ch26/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Summary&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=451&endPage=459©right=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.ch26&orderSource=Wileyonline&orderBeanReset=true)
28. You have free access to this contentAppendix A: List of Acronyms (pages 461–465) (/doi/10.1002/0471739421.app1/summary)
Summary (/doi/10.1002/0471739421.app1/summary)PDF(31K) (/doi/10.1002/0471739421.app1/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Appendix%20A%3A%20List%20of%20Acronyms&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=461&endPage=465©right=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.app1&orderSource=Wileyonline&orderBeanReset=true)
29. You have free access to this contentAppendix B: Glossary (pages 467–482) (/doi/10.1002/0471739421.app2/summary)
Summary (/doi/10.1002/0471739421.app2/summary)PDF(110K) (/doi/10.1002/0471739421.app2/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Appendix%20B%3A%20Glossary&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=467&endPage=482©right=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.app2&orderSource=Wileyonline&orderBeanReset=true)
30. You have free access to this contentAppendix C: Hazard Checklists (pages 483–495) (/doi/10.1002/0471739421.app3/summary)
Summary (/doi/10.1002/0471739421.app3/summary)PDF(67K) (/doi/10.1002/0471739421.app3/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Appendix%20C%3A%20Hazard%20Checklists&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=483&endPage=495©right=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.app3&orderSource=Wileyonline&orderBeanReset=true)
31. You have free access to this contentIndex (pages 497–499) (/doi/10.1002/0471739421.index/summary)
Summary (/doi/10.1002/0471739421.index/summary)PDF(28K) (/doi/10.1002/0471739421.index/pdf)Request Permissions (https://s100.copyright.com/AppDispatchServlet?publisherName=Wiley&publication=oBook&bookTitle=Hazard%20Analysis%20Techniques%20for%20System%20Safety&title=Index&publicationDate=24%20AUG%202005&author=Clifton%20A.%20Ericson&startPage=497&endPage=499©right=Copyright%20%C2%A9%202005%20John%20Wiley%20%2526%20Sons%2C%20Inc.&contentID=10.1002%2F0471739421.index&orderSource=Wileyonline&orderBeanReset=true)