Risk assessment tools, techniques, and their applications /

"Since the first edition of our book was published there have been several changes in the types of risk individuals, businesses, and governments are being exposed to. Cyber-attacks are more frequent and costly and lone-wolf style terrorist attacks are more common; events not addressed in the fi...

Full description

Main Author: Ostrom, Lee T.,
Other Authors: Wilhelmsen, Cheryl A., 1953-
Format: eBook
Language: English
Published: Hoboken, NJ, USA : John Wiley & Sons, Inc., 2019.
Physical Description: 1 online resource.
Edition: Second edition.
Subjects:
LEADER 05549cam a2200673 i 4500
001 1107989594
003 OCoLC
005 20200212112048.0
006 m do d |
007 cr |||||||||||
008 190405t20192019nju ob 001 0 eng
010 |a 2019981241 
020 |a 9781119483373  |q (electronic book) 
020 |a 1119483379  |q (electronic book) 
020 |a 9781119483342  |q (electronic book) 
020 |a 1119483344  |q (electronic book) 
020 |a 9781119483410  |q (electronic publication) 
020 |a 1119483417  |q (electronic publication) 
020 |z 1119483417 
020 |z 9781119483465  |q (hardcover) 
020 |z 1119483468 
035 |a (OCoLC)1107989594 
040 |a DLC  |b eng  |e rda  |e pn  |c DLC  |d EBLCP  |d N$T  |d OCLCO  |d DG1  |d OCLCF  |d YDX  |d BRX  |d DG1  |d OCLCQ  |d COM 
042 |a pcc 
049 |a COM6 
050 4 |a TA169.55.R57  |b O88 2019 
082 0 0 |a 363.1/02  |2 23 
100 1 |a Ostrom, Lee T.,  |e author. 
245 1 0 |a Risk assessment :  |b tools, techniques, and their applications /  |c Lee T. Ostrom, Cheryl A. Wilhelmsen. 
250 |a Second edition. 
264 1 |a Hoboken, NJ, USA :  |b John Wiley & Sons, Inc.,  |c 2019. 
264 4 |c ©2019. 
300 |a 1 online resource. 
336 |a text  |b txt  |2 rdacontent. 
337 |a computer  |b n  |2 rdamedia. 
338 |a online resource  |b nc  |2 rdacarrier. 
504 |a Includes bibliographical references and index. 
505 0 |a Introduction to risk assessment -- Risk perception -- Risks and consequences -- Ecological risk assessment -- Task analysis techniques -- Preliminary hazard analysis -- Primer on probability and statistics -- Mathematical tools for updating probabilities -- Developing probabilities -- Quantifying the unquantifiable -- Failure mode and effects analysis -- Human reliability analyses -- Critical incident technique -- Basic fault tree analysis technique -- Critical function analysis -- Event tree and decision tree analysis -- Probabilistic risk assessment -- Probabilistic risk assessment software -- Qualitative and quantitative research methods used in risk assessment -- Risk of an epidemic -- Vulnerability analysis technique -- Developing risk model for aviation inspection and maintenance tasks -- Risk assessment and community planning -- Threat assessment -- Project risk management -- Enterprise risk management overview -- Process safety management and hazard and operability assessment -- Emerging risks -- Process plant risk assessment example -- Risk assessment framework for detecting, predicting, and mitigating aircraft material -- Inspection: a case study -- Traffic risks -- Acronyms. 
520 |a "Since the first edition of our book was published there have been several changes in the types of risk individuals, businesses, and governments are being exposed to. Cyber-attacks are more frequent and costly and lone-wolf style terrorist attacks are more common; events not addressed in the first edition. The book continues to provide a resource that leads the reader through a risk assessment and shows them the proper tools to be used at the various steps in the process. This book also provides students studying safety and risk assessment a resource that assists them in understanding the various risk assessment tools. The book provides readers with a toolbox of techniques that can be used to aid them in analyzing conceptual designs, completed designs, procedures and operational risk. On top of the ten new chapters the new edition also includes expanded case studies and real life examples; coverage on risk assessment software like SAPPHIRE and RAVEN; and end-of-chapter questions for students with a solutions manual for academic adopters. The approach to the book remains the same and is analogous to a toolkit. The user locates the tool that best fits the risk assessment task they are performing. The chapters of the book progress from the concept of risk, through the simple risk assessment techniques, and into the more complex techniques. In addition to discussing the techniques, this book presents them in a form that the readers can readily adapt to their particular situation. Each chapter, where applicable, presents the technique discussed in that chapter and demonstrates how it is used"--  |c Provided by publisher. 
588 0 |a Online resource; title from digital title page (viewed on August 19, 2019). 
650 0 |a Risk assessment  |x Statistical methods. 
650 0 |a System failures (Engineering)  |x Prevention. 
650 0 |a System safety. 
650 0 |a Probabilities. 
650 7 |a Probabilities.  |2 fast. 
650 7 |a Risk assessment  |x Statistical methods.  |2 fast. 
650 7 |a System safety.  |2 fast. 
655 4 |a Electronic books. 
700 1 |a Wilhelmsen, Cheryl A.,  |d 1953-  |e author. 
776 0 8 |i Print version:  |a Ostrom, Lee T.  |t Risk assessment.  |b Second edition.  |d Hoboken, NJ : John Wiley & Sons, Inc., 2019  |z 9781119483465. 
907 |a .b60723543  |b multi  |c -  |d 200212  |e 230210 
998 |a cue  |a cu  |b 200212  |c m  |d z   |e -  |f eng  |g nju  |h 0  |i 1 
948 |a MARCIVE Overnight, in 2023.02 
948 |a MARCIVE Overnight, 02/2020 
994 |a C0  |b COM 
995 |a Loaded with m2btab.ltiac in 2023.02 
995 |a Loaded with m2btab.ltiac in 2020.03 
995 |a Loaded with m2btab.b in 2020.03 
989 |d cueme  |e  - -   |f  - -   |g j   |h 0  |i 0  |j 188  |k 200212  |l $0.00  |m    |n  - -   |o -  |p 0  |q 0  |t 0  |x 0  |w Prospector  |1 .i129342919  |u http://ezproxy.coloradomesa.edu/login?url=http://ebookcentral.proquest.com/lib/ca/detail.action?docID=5813678  |3 Prospector EBC  |z Click here for access