Details

Risk Modeling, Assessment, and Management


Risk Modeling, Assessment, and Management


Wiley Series in Systems Engineering and Management 4. Aufl.

von: Yacov Y. Haimes, Andrew P. Sage

131,99 €

Verlag: Wiley
Format: EPUB
Veröffentl.: 17.07.2015
ISBN/EAN: 9781119017998
Sprache: englisch
Anzahl Seiten: 720

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<p><b>Presents systems-based theory, methodology, and applications in risk modeling, assessment, and management</b></p> <p>This book examines risk analysis, focusing on quantifying risk and constructing probabilities for real-world decision-making, including engineering, design, technology, institutions, organizations, and policy. The author presents fundamental concepts (hierarchical holographic modeling; state space; decision analysis; multi-objective trade-off analysis) as well as advanced material (extreme events and the partitioned multi-objective risk method; multi-objective decision trees; multi-objective risk impact analysis method; guiding principles in risk analysis); avoids higher mathematics whenever possible; and reinforces the material with examples and case studies. The book will be used in systems engineering, enterprise risk management, engineering management, industrial engineering, civil engineering, and operations research.</p> <p>The fourth edition of <i>Risk Modeling, Assessment, and Management</i> features:<br /><br /></p> <ul> <li>Expanded chapters on systems-based guiding principles for risk modeling, planning, assessment, management, and communication; modeling interdependent and interconnected complex systems of systems with phantom system models; and hierarchical holographic modeling</li> <li>An expanded appendix including a Bayesian analysis for the prediction of chemical carcinogenicity, and the Farmer’s Dilemma formulated and solved using a deterministic linear model</li> <li>Updated case studies including a new case study on sequential Pareto-optimal decisions for emergent complex systems of systems</li> <li>A new companion website with over 200 solved exercises that feature risk analysis theories, methodologies, and application</li> </ul> <p><i><br />Risk Modeling, Assessment, and Management, Fourth Edition</i>, is written for both undergraduate and graduate students in systems engineering and systems management courses. The text also serves as a resource for academic, industry, and government professionals in the fields of homeland and cyber security, healthcare, physical infrastructure systems, engineering, business, and more.</p>
<p>Preface to the Fourth Edition ix</p> <p>The Companion Website xv</p> <p>Acknowledgments xvii</p> <p><b>Part I Fundamentals of Risk Modeling, Assessment, and Management 1</b></p> <p><b>1 The Art and Science of Systems and Risk Analysis 3</b></p> <p>1.1 Introduction 3</p> <p>1.2 Systems Engineering 4</p> <p>1.3 Risk Assessment and Management 14</p> <p>1.4 Concept Road Map 26</p> <p>1.5 Epilogue 35</p> <p>References 35</p> <p><b>2 The Role of Modeling in the Definition and Quantification of the Risk Function 41</b></p> <p>2.1 Introduction 41</p> <p>2.2 The Risk Assessment and Management Process: Historical Perspectives 43</p> <p>2.3 Information, Intelligence, and Models 45</p> <p>2.4 The Building Blocks of Mathematical Models 47</p> <p>2.5 On the Complex Definition of Risk, Vulnerability, and Resilience: a Systems‐Based Approach 51</p> <p>2.6 On the Definition of Vulnerabilities in Measuring Risks to Systems 56</p> <p>2.7 On the Definition of Resilience in Measuring Risk to Systems 57</p> <p>2.8 On the Complex Quantification of Risk to Systems 60</p> <p>References 65</p> <p><b>3 Identifying Risk through Hierarchical Holographic Modeling and its Derivatives 69</b></p> <p>3.1 Hierarchical Aspects 69</p> <p>3.2 Hierarchical Overlapping Coordination 70</p> <p>3.3 HHM 73</p> <p>3.4 HHM and the Theory of Scenario Structuring 76</p> <p>3.5 Adaptive Multiplayer HHM Game 79</p> <p>3.6 Water Resources System 80</p> <p>3.7 Sustainable Development 83</p> <p>3.8 HHM in a System Acquisition Project 86</p> <p>3.9 Software Acquisition 90</p> <p>3.10 Hardening the Water Supply Infrastructure 94</p> <p>3.11 Risk Assessment and Management for Support of Operations other than War 98</p> <p>3.12 Automated Highway System 103</p> <p>3.13 Food‐Poisoning Scenarios 108</p> <p>References 113</p> <p><b>4 Modeling and Decision Analysis 115</b></p> <p>4.1 Introduction 115</p> <p>4.2 Decision Rules Under Uncertainty 116</p> <p>4.3 Decision Trees 118</p> <p>4.4 Decision Matrix 122</p> <p>4.5 The Fractile Method 124</p> <p>4.6 Triangular Distribution 127</p> <p>4.7 Influence Diagrams 128</p> <p>4.8 Population Dynamic Models 132</p> <p>4.9 PSM 139</p> <p>4.10 Example Problems 144</p> <p>References 152</p> <p><b>5 Multiobjective Trade‐off Analysis 155</b></p> <p>5.1 Introduction 155</p> <p>5.2 Examples of Multiple Environmental Objectives 157</p> <p>5.3 The Surrogate Worth Trade‐off Method 159</p> <p>5.4 Characterizing a Proper Noninferior Solution 166</p> <p>5.5 The SWT Method and the Utility Function Approach 168</p> <p>5.6 Example Problems 172</p> <p>5.7 Summary 177</p> <p>References 178</p> <p><b>6 Defining Uncertainty and Sensitivity Analysis 179</b></p> <p>6.1 Introduction 179</p> <p>6.2 Sensitivity, Responsivity, Stability, and Irreversibility 180</p> <p>6.3 Uncertainties Due to Errors in Modeling 182</p> <p>6.4 Characterization of Modeling Errors 183</p> <p>6.5 Uncertainty Taxonomy 185</p> <p>6.6 The USIM 196</p> <p>6.7 Formulation of the Multiobjective Optimization Problem 199</p> <p>6.8 A Robust Algorithm of the USIM 204</p> <p>6.9 Integration of the USIM with Parameter Optimization at the Design Stage 207</p> <p>6.10 Conclusions 209</p> <p>References 209</p> <p><b>7 Risk Filtering, Ranking, and Management 211</b></p> <p>7.1 Introduction 211</p> <p>7.2 Past Efforts in Risk Filtering and Ranking 212</p> <p>7.3 RFRM: A Methodological Framework 213</p> <p>7.4 Case Study: An OOTW 220</p> <p>7.5 Summary 224</p> <p>References 224</p> <p><b>Part II Advances in Risk Modeling, Assessment, and Management 227</b></p> <p><b>8 Risk of Extreme Events and the Fallacy of the Expected Value 229</b></p> <p>8.1 Introduction 229</p> <p>8.2 Risk of Extreme Events 230</p> <p>8.3 The Fallacy of the Expected Value 232</p> <p>8.4 The PMRM 233</p> <p>8.5 General Formulation of the PMRM 236</p> <p>8.6 Summary of the Pmrm 238</p> <p>8.7 Illustrative Example 239</p> <p>8.8 Analysis of Dam Failure and Extreme Flood through the PMRM 240</p> <p>8.9 Example Problems 243</p> <p>8.10 Summary 257</p> <p>References 257</p> <p><b>9 Multiobjective Decision‐tree Analysis 259</b></p> <p>9.1 Introduction 259</p> <p>9.2 Methodological Approach 261</p> <p>9.3 Differences between SODT and MODT 279</p> <p>9.4 Summary 281</p> <p>9.5 Example Problems 282</p> <p>References 293</p> <p><b>10 Multiobjective Risk Impact Analysis Method 295</b></p> <p>10.1 Introduction 295</p> <p>10.2 Impact Analysis 296</p> <p>10.3 The Multiobjective, Multistage Impact Analysis Method: An Overview 297</p> <p>10.4 Combining the PMRM and the MMIAM 298</p> <p>10.5 Relating Multiobjective Decision Trees to the MRIAM 304</p> <p>10.6 Example Problems 313</p> <p>10.7 Epilogue 325</p> <p>References 326</p> <p><b>11 Statistics of Extremes: Extension of the PMRM 329</b></p> <p>11.1 A Review of the Partitioned Multiobjective Risk Method 329</p> <p>11.2 Statistics of Extremes 333</p> <p>11.3 Incorporating the Statistics of Extremes into the PMRM 338</p> <p>11.4 Sensitivity Analysis of the Approximation of f4(·) 344</p> <p>11.5 Generalized Quantification of Risk of Extreme Events 350</p> <p>11.6 Summary 356</p> <p>11.7 Example Problems 357</p> <p>References 368</p> <p><b>12 Systems‐Based Guiding Principles for Risk Modeling, Planning, Assessment, Management, and</b> <b>Communication 371</b></p> <p>12.1 Introduction 371</p> <p>12.2 The Journey: The Guiding Principles in the Broader Context of the Emerging Next Generation Developed by the Federal Aviation Administration  372</p> <p>References 387</p> <p><b>13 Fault Trees 389</b></p> <p>13.1 Introduction 389</p> <p>13.2 Basic Fault-Tree Analysis 391</p> <p>13.3 Reliability and Fault-Tree Analysis 392</p> <p>13.4 Minimal Cut Sets 397</p> <p>13.5 The DARE Using Fault Trees 400</p> <p>13.6 Extreme Events in Fault Tree Analysis 403</p> <p>13.7 An Example Problem Based on a Case Study 405</p> <p>13.8 Failure Mode and Effects Analysis and Failure Mode, Effects, and Criticality Analysis 409</p> <p>13.9 Event Trees 411</p> <p>13.10 Example Problems 414</p> <p>References 420</p> <p><b>14 Multiobjective Statistical Method 423</b></p> <p>14.1 Introduction 423</p> <p>14.2 Mathematical Formulation of the Interior Drainage Problem 424</p> <p>14.3 Formulation of the Optimization Problem 424</p> <p>14.4 The MSM: Step-by-Step 425</p> <p>14.5 The SWT Method 427</p> <p>14.6 Multiple Objectives 428</p> <p>14.7 Applying the MSM 429</p> <p>14.8 Example Problems 432</p> <p>References 438</p> <p><b>15 Principles and Guidelines for Project Risk Management 439</b></p> <p>15.1 Introduction 439</p> <p>15.2 Definitions and Principles of Project Risk Management 440</p> <p>15.3 Project Risk Management Methods 443</p> <p>15.4 Aircraft Development Example 450</p> <p>15.5 Quantitative Risk Assessment and Management of Software Acquisition 454</p> <p>15.6 Critical Factors That Affect Software Nontechnical Risk 458</p> <p>15.7 Basis for Variances in Cost Estimation 460</p> <p>15.8 Discrete Dynamic Modeling 461</p> <p>15.9 Summary 469</p> <p>References 469</p> <p><b>16 Modeling Complex Systems of Systems with Phantom System Models 473</b></p> <p>16.1 Introduction 473</p> <p>16.2 What Have We Learned from Other Contributors? 474</p> <p>16.3 The Centrality of the States of the System in Modeling and in Risk Analysis 476</p> <p>16.4 The Centrality of Time in Modeling Multidimensional Risk, Uncertainty, and Benefits 477</p> <p>16.5 Extension of HHM to PSM 478</p> <p>16.6 PSM and Meta-modeling 480</p> <p>16.7 PSM Laboratory 486</p> <p>16.8 Summary 488</p> <p>References 489</p> <p><b>17 Adaptive Two‐Player Hierarchical Holographic Modeling Game for Counterterrorism Intelligence</b> <b>Analysis 493</b></p> <p>17.1 Introduction 493</p> <p>17.2 Bayes’ Theorem 494</p> <p>17.3 Modeling the Multiple Perspectives of Complex Systems 495</p> <p>17.4 Adaptive Two‐Player Hhm Game: Terrorist Networks versus Homeland Protection 499</p> <p>17.5 The Building Blocks of Mathematical Models and the Centrality of State Variables in Intelligence Analysis 502</p> <p>17.6 Hierarchical Adaptive Two‐Player HHM Game 504</p> <p>17.7 Collaborative Computing Support for Adaptive Two‐Player HHM Games 505</p> <p>17.8 Summary 507</p> <p>References 508</p> <p><b>18 Inoperability Input–Output Model and Its Derivatives for Interdependent Infrastructure Sectors 511</b></p> <p>18.1 Overview 511</p> <p>18.2 Background: The Original Leontief Input–Output Model 512</p> <p>18.3 Inoperability Input–Output Model 513</p> <p>18.4 Regimes of Recovery 516</p> <p>18.5 Supporting Databases for IIM Analysis 517</p> <p>18.6 National and Regional Databases for IIM Analysis 518</p> <p>18.7 RIMS II 522</p> <p>18.8 Development of the IIM and its Extensions 523</p> <p>18.9 The Dynamic IIM 527</p> <p>18.10 Practical Uses of the IIM 530</p> <p>18.11 Uncertainty IIM 533</p> <p>18.12 Example Problems 536</p> <p>18.13 Summary 539</p> <p>References 540</p> <p><b>19 Case Studies 543</b></p> <p>19.1 A Risk‐Based Input–Output Methodology for Measuring the Effects of the August 2003 Northeast Blackout  543</p> <p>19.2 Systemic Valuation of Strategic Preparedness Through Applying the IIM with Lessons Learned from Hurricane Katrina 558</p> <p>19.3 Ex Post Analysis Using the IIM of the September 11, 2001, Attack on the United States 569</p> <p>19.4 Risk Modeling, Assessment, and Management of Lahar Flow Threat 575</p> <p>19.5 The Statistics of Extreme Events and 6‐Sigma Capability 587</p> <p>19.6 Sequential Pareto‐Optimal Decisions Made During Emergent Complex Systems of Systems: An Application to the Faa Nextgen 593</p> <p>References 612</p> <p><b>Appendix: Optimization Techniques 617</b></p> <p>A.1 Introduction to Modeling and Optimization 617</p> <p>A.2 Bayesian Analysis and the Prediction of Chemical Carcinogenicity 655</p> <p>A.3 The Farmer’s Dilemma: Linear Model and Duality 657</p> <p>A.4 Standard Normal Probability Table 664</p> <p>References 665</p> <p>Author Index 667</p> <p>Subject Index 673</p>
<p><b>YACOV Y. HAIMES, PhD,</b> is the Lawrence R. Quarles Professor at the School of Engineering and Applied Science, University of Virginia, USA, and is a member of the Systems and Information Engineering faculty and the Civil and Environmental Engineering faculty. He is the Founding Director (1987) of the university-wide Center for Risk Management of Engineering Systems. On the faculty of Case Western Reserve University, USA, for 17 years, he was the Chair of the Systems Engineering Department, and Director of the Center for Large-Scale Systems and Policy Analysis.
<p><b>Presents systems-based theory, methodology, and applications in risk modeling, assessment, and management</b> <p>This book examines risk analysis, focusing on quantifying risk and constructing probabilities for real-world decision-making, including engineering, design, technology, institutions, organizations, and policy. The author presents fundamental concepts (hierarchical holographic modeling; state space; decision analysis; multi-objective trade-off analysis) as well as advanced material (extreme events and the partitioned multi-objective risk method; multi-objective decision trees; multi-objective risk impact analysis method; guiding principles in risk analysis); avoids higher mathematics whenever possible; and reinforces the material with examples and case studies. The book will be used in systems engineering, enterprise risk management, engineering management, industrial engineering, civil engineering, and operations research. <p>The fourth edition of <i>Risk Modeling, Assessment, and Management</i> features: <ul> <li>Expanded chapters on systems-based guiding principles for risk modeling, planning, assessment, management, and communication; modeling interdependent and interconnected complex systems of systems with phantom system models; and hierarchical holographic modeling</li> <li>An expanded appendix including a Bayesian analysis for the prediction of chemical carcinogenicity, and the Farmer's Dilemma formulated and solved using a deterministic linear model</li> <li>Updated case studies including a new case study on sequential Pareto-optimal decisions for emergent complex systems of systems</li> <li>A new companion website with over 200 solved exercises that feature risk analysis theories, methodologies, and applications</li> </ul> <p>"<i>An authoritative account of the fundamentals of risk assessment and risk-informed decision making; a masterful mix of theory and real world applications</i>"</br> <b>Ali Mosleh, Director, B. John Garrick Institute for the Risk Sciences, UCLA School of Engineering and Applied Science</b> <p>"<i>Students, instructors and practitioners working in risk management will need a copy of the Fourth Edition of Professor Haimes' seminal book to keep abreast of the very latest innovative ideas in the theory and practice of risk concepts from an interdisciplinary, systems thinking and multiple objective decision-making perspective.</i>"</br> <b>Keith W. Hipel, President, Academy of Science, Royal Society of Canada; University Professor, Department of Systems Design Engineering, University of Waterloo</b> <p>"<i>This Fourth Edition will truly empower readers with both theory and practical knowledge necessary to embrace the challenges in the next decades.</i>"</br> <b>Duan Li, Patrick Huen Wing Ming Professor of Systems Engineering & Engineering Management, The Chinese University of Hong Kong</b>

Diese Produkte könnten Sie auch interessieren:

Bandwidth Efficient Coding
Bandwidth Efficient Coding
von: John B. Anderson
EPUB ebook
114,99 €
Digital Communications with Emphasis on Data Modems
Digital Communications with Emphasis on Data Modems
von: Richard W. Middlestead
PDF ebook
171,99 €
Bandwidth Efficient Coding
Bandwidth Efficient Coding
von: John B. Anderson
PDF ebook
114,99 €