Shopping Cart

No products in the cart.

BS EN IEC 31010:2019 – TC

$280.87

Tracked Changes. Risk management. Risk assessment techniques

Published By Publication Date Number of Pages
BSI 2019 334
Guaranteed Safe Checkout
Categories: ,

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

PDF Catalog

PDF Pages PDF Title
1 compares BS EN IEC 31010:2019
2 TRACKED CHANGES
Text example 1 — indicates added text (in green)
206 undefined
209 Annex ZA(normative)Normative references to international publicationswith their corresponding European publications
211 English
CONTENTS
215 FOREWORD
217 INTRODUCTION
218 1 Scope
2 Normative references
3 Terms and definitions
219 4 Core concepts
4.1 Uncertainty
220 4.2 Risk
5 Uses of risk assessment techniques
221 6 Implementing risk assessment
6.1 Plan the assessment
6.1.1 Define purpose and scope of the assessment
222 6.1.2 Understand the context
6.1.3 Engage with stakeholders
6.1.4 Define objectives
6.1.5 Consider human, organizational and social factors
223 6.1.6 Review criteria for decisions
225 6.2 Manage information and develop models
6.2.1 General
6.2.2 Collecting information
6.2.3 Analysing data
226 6.2.4 Developing and applying models
227 6.3 Apply risk assessment techniques
6.3.1 Overview
228 6.3.2 Identifying risk
6.3.3 Determining sources, causes and drivers of risk
229 6.3.4 Investigating the effectiveness of existing controls
6.3.5 Understanding consequences, and likelihood
231 6.3.6 Analysing interactions and dependencies
6.3.7 Understanding measures of risk
234 6.4 Review the analysis
6.4.1 Verifying and validating results
6.4.2 Uncertainty and sensitivity analysis
235 6.4.3 Monitoring and review
6.5 Apply results to support decisions
6.5.1 Overview
236 6.5.2 Decisions about the significance of risk
6.5.3 Decisions that involve selecting between options
237 6.6 Record and report risk assessment process and outcomes
7 Selecting risk assessment techniques
7.1 General
238 7.2 Selecting techniques
240 Annex A (informative)Categorization of techniques
A.1 Introduction to categorization of techniques
A.2 Application of categorization of techniques
Tables
Table A.1 – Characteristics of techniques
241 Table A.2 – Techniques and indicative characteristics
246 A.3 Use of techniques during the ISO 31000 process
Figures
Figure A.1 – Application of techniques in the ISO 31000 risk management process [3]
247 Table A.3 – Applicability of techniques to the ISO 31000 process
249 Annex B (informative)Description of techniques
B.1 Techniques for eliciting views from stakeholders and experts
B.1.1 General
B.1.2 Brainstorming
251 B.1.3 Delphi technique
252 B.1.4 Nominal group technique
253 B.1.5 Structured or semi-structured interviews
254 B.1.6 Surveys
255 B.2 Techniques for identifying risk
B.2.1 General
256 B.2.2 Checklists, classifications and taxonomies
258 B.2.3 Failure modes and effects analysis (FMEA) and failure modes, effects and criticality analysis (FMECA)
259 B.2.4 Hazard and operability (HAZOP) studies
260 Table B.1 – Examples of basic guidewords and their generic meanings
261 B.2.5 Scenario analysis
263 B.2.6 Structured what if technique (SWIFT)
264 B.3 Techniques for determining sources, causes and drivers of risk
B.3.1 General
265 B.3.2 Cindynic approach
266 Table B.2 – Table of deficits for each stakeholder
Table B.3 – Table of dissonances between stakeholders
267 B.3.3 Ishikawa analysis (fishbone) method
268 Figure B.1 – Example Ishikawa (fishbone) diagram
269 B.4 Techniques for analysing controls
B.4.1 General
B.4.2 Bow tie analysis
270 Figure B.2 – Example of Bowtie
271 B.4.3 Hazard analysis and critical control points (HACCP)
273 B.4.4 Layers of protection analysis (LOPA)
275 B.5 Techniques for understanding consequences and likelihood
B.5.1 General
B.5.2 Bayesian analysis
277 B.5.3 Bayesian networks and influence diagrams
278 Figure B.3 – A Bayesian network showing a simplified version of a realecological problem: modelling native fish populations in Victoria, Australia
279 B.5.4 Business impact analysis (BIA)
281 B.5.5 Cause-consequence analysis (CCA)
282 Figure B.4 – Example of cause-consequence diagram
283 B.5.6 Event tree analysis (ETA)
284 Figure B.5 – Example of event tree analysis
285 B.5.7 Fault tree analysis (FTA)
286 Figure B.6 – Example of fault tree
287 B.5.8 Human reliability analysis (HRA)
288 B.5.9 Markov analysis
289 Figure B.7 – Example of Markov diagram
Table B.4 – Example of Markov matrix
290 B.5.10 Monte Carlo simulation
Table B.5 – Examples of systems to which Markov analysis can be applied
294 B.6 Techniques for analysing dependencies and interactions
B.6.1 Causal mapping
296 B.6.2 Cross impact analysis
298 B.7 Techniques that provide a measure of risk
B.7.1 Toxicological risk assessment
Figure B.8 – Example of dose response curve
300 B.7.2 Value at risk (VaR)
Figure B.9 – Distribution of value
Figure B.10 – Detail of loss region VaR values
302 B.7.3 Conditional value at risk (CVaR) or expected shortfall (ES)
Figure B.11 – VaR and CVaR for possible loss portfolio
303 B.8 Techniques for evaluating the significance of risk
B.8.1 General
B.8.2 As low as reasonably practicable (ALARP) and so far as is reasonably practicable (SFAIRP)
304 Figure B.12 – ALARP diagram
305 B.8.3 Frequency-number (F-N) diagrams
306 Figure B.13 – Sample F-N diagram
307 B.8.4 Pareto charts
Figure B.14 – Example of a Pareto chart
309 B.8.5 Reliability centred maintenance (RCM)
310 Table B.6 – An example of RCM task selection
311 B.8.6 Risk indices
312 B.9 Techniques for selecting between options
B.9.1 General
313 B.9.2 Cost/benefit analysis (CBA)
315 B.9.3 Decision tree analysis
316 B.9.4 Game theory
317 Table B.7 – Example of a game matrix
318 B.9.5 Multi-criteria analysis (MCA)
320 B.10 Techniques for recording and reporting
B.10.1 General
321 B.10.2 Risk registers
322 B.10.3 Consequence/likelihood matrix (risk matrix or heat map)
323 Figure B.15 – Part example of table defining consequence scales
Figure B.16 – Part example of a likelihood scale
324 Figure B.17 – Example of consequence/likelihood matrix
326 B.10.4 S-curves
Figure B.18 – Probability distribution function and cumulative distribution function
328 Bibliography
BS EN IEC 31010:2019 - TC
$280.87