{"id":344524,"date":"2024-10-20T00:11:54","date_gmt":"2024-10-20T00:11:54","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-iec-310102019-tc\/"},"modified":"2024-10-25T23:34:42","modified_gmt":"2024-10-25T23:34:42","slug":"bs-en-iec-310102019-tc","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-iec-310102019-tc\/","title":{"rendered":"BS EN IEC 31010:2019 – TC"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
1<\/td>\n | compares BS EN IEC 31010:2019 <\/td>\n<\/tr>\n | ||||||
2<\/td>\n | TRACKED CHANGES Text example 1 \u2014 indicates added text (in green) <\/td>\n<\/tr>\n | ||||||
206<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
209<\/td>\n | Annex ZA(normative)Normative references to international publicationswith their corresponding European publications <\/td>\n<\/tr>\n | ||||||
211<\/td>\n | English CONTENTS <\/td>\n<\/tr>\n | ||||||
215<\/td>\n | FOREWORD <\/td>\n<\/tr>\n | ||||||
217<\/td>\n | INTRODUCTION <\/td>\n<\/tr>\n | ||||||
218<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
219<\/td>\n | 4 Core concepts 4.1 Uncertainty <\/td>\n<\/tr>\n | ||||||
220<\/td>\n | 4.2 Risk 5 Uses of risk assessment techniques <\/td>\n<\/tr>\n | ||||||
221<\/td>\n | 6 Implementing risk assessment 6.1 Plan the assessment 6.1.1 Define purpose and scope of the assessment <\/td>\n<\/tr>\n | ||||||
222<\/td>\n | 6.1.2 Understand the context 6.1.3 Engage with stakeholders 6.1.4 Define objectives 6.1.5 Consider human, organizational and social factors <\/td>\n<\/tr>\n | ||||||
223<\/td>\n | 6.1.6 Review criteria for decisions <\/td>\n<\/tr>\n | ||||||
225<\/td>\n | 6.2 Manage information and develop models 6.2.1 General 6.2.2 Collecting information 6.2.3 Analysing data <\/td>\n<\/tr>\n | ||||||
226<\/td>\n | 6.2.4 Developing and applying models <\/td>\n<\/tr>\n | ||||||
227<\/td>\n | 6.3 Apply risk assessment techniques 6.3.1 Overview <\/td>\n<\/tr>\n | ||||||
228<\/td>\n | 6.3.2 Identifying risk 6.3.3 Determining sources, causes and drivers of risk <\/td>\n<\/tr>\n | ||||||
229<\/td>\n | 6.3.4 Investigating the effectiveness of existing controls 6.3.5 Understanding consequences, and likelihood <\/td>\n<\/tr>\n | ||||||
231<\/td>\n | 6.3.6 Analysing interactions and dependencies 6.3.7 Understanding measures of risk <\/td>\n<\/tr>\n | ||||||
234<\/td>\n | 6.4 Review the analysis 6.4.1 Verifying and validating results 6.4.2 Uncertainty and sensitivity analysis <\/td>\n<\/tr>\n | ||||||
235<\/td>\n | 6.4.3 Monitoring and review 6.5 Apply results to support decisions 6.5.1 Overview <\/td>\n<\/tr>\n | ||||||
236<\/td>\n | 6.5.2 Decisions about the significance of risk 6.5.3 Decisions that involve selecting between options <\/td>\n<\/tr>\n | ||||||
237<\/td>\n | 6.6 Record and report risk assessment process and outcomes 7 Selecting risk assessment techniques 7.1 General <\/td>\n<\/tr>\n | ||||||
238<\/td>\n | 7.2 Selecting techniques <\/td>\n<\/tr>\n | ||||||
240<\/td>\n | Annex A (informative)Categorization of techniques A.1 Introduction to categorization of techniques A.2 Application of categorization of techniques Tables Table A.1 \u2013 Characteristics of techniques <\/td>\n<\/tr>\n | ||||||
241<\/td>\n | Table A.2 \u2013 Techniques and indicative characteristics <\/td>\n<\/tr>\n | ||||||
246<\/td>\n | A.3 Use of techniques during the ISO 31000 process Figures Figure A.1 \u2013 Application of techniques in the ISO 31000 risk management process [3] <\/td>\n<\/tr>\n | ||||||
247<\/td>\n | Table A.3 \u2013 Applicability of techniques to the ISO 31000 process <\/td>\n<\/tr>\n | ||||||
249<\/td>\n | Annex B (informative)Description of techniques B.1 Techniques for eliciting views from stakeholders and experts B.1.1 General B.1.2 Brainstorming <\/td>\n<\/tr>\n | ||||||
251<\/td>\n | B.1.3 Delphi technique <\/td>\n<\/tr>\n | ||||||
252<\/td>\n | B.1.4 Nominal group technique <\/td>\n<\/tr>\n | ||||||
253<\/td>\n | B.1.5 Structured or semi-structured interviews <\/td>\n<\/tr>\n | ||||||
254<\/td>\n | B.1.6 Surveys <\/td>\n<\/tr>\n | ||||||
255<\/td>\n | B.2 Techniques for identifying risk B.2.1 General <\/td>\n<\/tr>\n | ||||||
256<\/td>\n | B.2.2 Checklists, classifications and taxonomies <\/td>\n<\/tr>\n | ||||||
258<\/td>\n | B.2.3 Failure modes and effects analysis (FMEA) and failure modes, effects and criticality analysis (FMECA) <\/td>\n<\/tr>\n | ||||||
259<\/td>\n | B.2.4 Hazard and operability (HAZOP) studies <\/td>\n<\/tr>\n | ||||||
260<\/td>\n | Table B.1 \u2013 Examples of basic guidewords and their generic meanings <\/td>\n<\/tr>\n | ||||||
261<\/td>\n | B.2.5 Scenario analysis <\/td>\n<\/tr>\n | ||||||
263<\/td>\n | B.2.6 Structured what if technique (SWIFT) <\/td>\n<\/tr>\n | ||||||
264<\/td>\n | B.3 Techniques for determining sources, causes and drivers of risk B.3.1 General <\/td>\n<\/tr>\n | ||||||
265<\/td>\n | B.3.2 Cindynic approach <\/td>\n<\/tr>\n | ||||||
266<\/td>\n | Table B.2 \u2013 Table of deficits for each stakeholder Table B.3 \u2013 Table of dissonances between stakeholders <\/td>\n<\/tr>\n | ||||||
267<\/td>\n | B.3.3 Ishikawa analysis (fishbone) method <\/td>\n<\/tr>\n | ||||||
268<\/td>\n | Figure B.1 \u2013 Example Ishikawa (fishbone) diagram <\/td>\n<\/tr>\n | ||||||
269<\/td>\n | B.4 Techniques for analysing controls B.4.1 General B.4.2 Bow tie analysis <\/td>\n<\/tr>\n | ||||||
270<\/td>\n | Figure B.2 \u2013 Example of Bowtie <\/td>\n<\/tr>\n | ||||||
271<\/td>\n | B.4.3 Hazard analysis and critical control points (HACCP) <\/td>\n<\/tr>\n | ||||||
273<\/td>\n | B.4.4 Layers of protection analysis (LOPA) <\/td>\n<\/tr>\n | ||||||
275<\/td>\n | B.5 Techniques for understanding consequences and likelihood B.5.1 General B.5.2 Bayesian analysis <\/td>\n<\/tr>\n | ||||||
277<\/td>\n | B.5.3 Bayesian networks and influence diagrams <\/td>\n<\/tr>\n | ||||||
278<\/td>\n | Figure B.3 \u2013 A Bayesian network showing a simplified version of a realecological problem: modelling native fish populations in Victoria, Australia <\/td>\n<\/tr>\n | ||||||
279<\/td>\n | B.5.4 Business impact analysis (BIA) <\/td>\n<\/tr>\n | ||||||
281<\/td>\n | B.5.5 Cause-consequence analysis (CCA) <\/td>\n<\/tr>\n | ||||||
282<\/td>\n | Figure B.4 \u2013 Example of cause-consequence diagram <\/td>\n<\/tr>\n | ||||||
283<\/td>\n | B.5.6 Event tree analysis (ETA) <\/td>\n<\/tr>\n | ||||||
284<\/td>\n | Figure B.5 \u2013 Example of event tree analysis <\/td>\n<\/tr>\n | ||||||
285<\/td>\n | B.5.7 Fault tree analysis (FTA) <\/td>\n<\/tr>\n | ||||||
286<\/td>\n | Figure B.6 \u2013 Example of fault tree <\/td>\n<\/tr>\n | ||||||
287<\/td>\n | B.5.8 Human reliability analysis (HRA) <\/td>\n<\/tr>\n | ||||||
288<\/td>\n | B.5.9 Markov analysis <\/td>\n<\/tr>\n | ||||||
289<\/td>\n | Figure B.7 \u2013 Example of Markov diagram Table B.4 \u2013 Example of Markov matrix <\/td>\n<\/tr>\n | ||||||
290<\/td>\n | B.5.10 Monte Carlo simulation Table B.5 \u2013 Examples of systems to which Markov analysis can be applied <\/td>\n<\/tr>\n | ||||||
294<\/td>\n | B.6 Techniques for analysing dependencies and interactions B.6.1 Causal mapping <\/td>\n<\/tr>\n | ||||||
296<\/td>\n | B.6.2 Cross impact analysis <\/td>\n<\/tr>\n | ||||||
298<\/td>\n | B.7 Techniques that provide a measure of risk B.7.1 Toxicological risk assessment Figure B.8 \u2013 Example of dose response curve <\/td>\n<\/tr>\n | ||||||
300<\/td>\n | B.7.2 Value at risk (VaR) Figure B.9 \u2013 Distribution of value Figure B.10 \u2013 Detail of loss region VaR values <\/td>\n<\/tr>\n | ||||||
302<\/td>\n | B.7.3 Conditional value at risk (CVaR) or expected shortfall (ES) Figure B.11 \u2013 VaR and CVaR for possible loss portfolio <\/td>\n<\/tr>\n | ||||||
303<\/td>\n | B.8 Techniques for evaluating the significance of risk B.8.1 General B.8.2 As low as reasonably practicable (ALARP) and so far as is reasonably practicable (SFAIRP) <\/td>\n<\/tr>\n | ||||||
304<\/td>\n | Figure B.12 \u2013 ALARP diagram <\/td>\n<\/tr>\n | ||||||
305<\/td>\n | B.8.3 Frequency-number (F-N) diagrams <\/td>\n<\/tr>\n | ||||||
306<\/td>\n | Figure B.13 \u2013 Sample F-N diagram <\/td>\n<\/tr>\n | ||||||
307<\/td>\n | B.8.4 Pareto charts Figure B.14 \u2013 Example of a Pareto chart <\/td>\n<\/tr>\n | ||||||
309<\/td>\n | B.8.5 Reliability centred maintenance (RCM) <\/td>\n<\/tr>\n | ||||||
310<\/td>\n | Table B.6 \u2013 An example of RCM task selection <\/td>\n<\/tr>\n | ||||||
311<\/td>\n | B.8.6 Risk indices <\/td>\n<\/tr>\n | ||||||
312<\/td>\n | B.9 Techniques for selecting between options B.9.1 General <\/td>\n<\/tr>\n | ||||||
313<\/td>\n | B.9.2 Cost\/benefit analysis (CBA) <\/td>\n<\/tr>\n | ||||||
315<\/td>\n | B.9.3 Decision tree analysis <\/td>\n<\/tr>\n | ||||||
316<\/td>\n | B.9.4 Game theory <\/td>\n<\/tr>\n | ||||||
317<\/td>\n | Table B.7 \u2013 Example of a game matrix <\/td>\n<\/tr>\n | ||||||
318<\/td>\n | B.9.5 Multi-criteria analysis (MCA) <\/td>\n<\/tr>\n | ||||||
320<\/td>\n | B.10 Techniques for recording and reporting B.10.1 General <\/td>\n<\/tr>\n | ||||||
321<\/td>\n | B.10.2 Risk registers <\/td>\n<\/tr>\n | ||||||
322<\/td>\n | B.10.3 Consequence\/likelihood matrix (risk matrix or heat map) <\/td>\n<\/tr>\n | ||||||
323<\/td>\n | Figure B.15 \u2013 Part example of table defining consequence scales Figure B.16 \u2013 Part example of a likelihood scale <\/td>\n<\/tr>\n | ||||||
324<\/td>\n | Figure B.17 \u2013 Example of consequence\/likelihood matrix <\/td>\n<\/tr>\n | ||||||
326<\/td>\n | B.10.4 S-curves Figure B.18 \u2013 Probability distribution function and cumulative distribution function <\/td>\n<\/tr>\n | ||||||
328<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Tracked Changes. Risk management. Risk assessment techniques<\/b><\/p>\n |