{"id":344524,"date":"2024-10-20T00:11:54","date_gmt":"2024-10-20T00:11:54","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-iec-310102019-tc\/"},"modified":"2024-10-25T23:34:42","modified_gmt":"2024-10-25T23:34:42","slug":"bs-en-iec-310102019-tc","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-iec-310102019-tc\/","title":{"rendered":"BS EN IEC 31010:2019 – TC"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
1<\/td>\ncompares BS EN IEC 31010:2019 <\/td>\n<\/tr>\n
2<\/td>\nTRACKED CHANGES
Text example 1 \u2014 indicates added text (in green) <\/td>\n<\/tr>\n
206<\/td>\nundefined <\/td>\n<\/tr>\n
209<\/td>\nAnnex ZA(normative)Normative references to international publicationswith their corresponding European publications <\/td>\n<\/tr>\n
211<\/td>\nEnglish
CONTENTS <\/td>\n<\/tr>\n
215<\/td>\nFOREWORD <\/td>\n<\/tr>\n
217<\/td>\nINTRODUCTION <\/td>\n<\/tr>\n
218<\/td>\n1 Scope
2 Normative references
3 Terms and definitions <\/td>\n<\/tr>\n
219<\/td>\n4 Core concepts
4.1 Uncertainty <\/td>\n<\/tr>\n
220<\/td>\n4.2 Risk
5 Uses of risk assessment techniques <\/td>\n<\/tr>\n
221<\/td>\n6 Implementing risk assessment
6.1 Plan the assessment
6.1.1 Define purpose and scope of the assessment <\/td>\n<\/tr>\n
222<\/td>\n6.1.2 Understand the context
6.1.3 Engage with stakeholders
6.1.4 Define objectives
6.1.5 Consider human, organizational and social factors <\/td>\n<\/tr>\n
223<\/td>\n6.1.6 Review criteria for decisions <\/td>\n<\/tr>\n
225<\/td>\n6.2 Manage information and develop models
6.2.1 General
6.2.2 Collecting information
6.2.3 Analysing data <\/td>\n<\/tr>\n
226<\/td>\n6.2.4 Developing and applying models <\/td>\n<\/tr>\n
227<\/td>\n6.3 Apply risk assessment techniques
6.3.1 Overview <\/td>\n<\/tr>\n
228<\/td>\n6.3.2 Identifying risk
6.3.3 Determining sources, causes and drivers of risk <\/td>\n<\/tr>\n
229<\/td>\n6.3.4 Investigating the effectiveness of existing controls
6.3.5 Understanding consequences, and likelihood <\/td>\n<\/tr>\n
231<\/td>\n6.3.6 Analysing interactions and dependencies
6.3.7 Understanding measures of risk <\/td>\n<\/tr>\n
234<\/td>\n6.4 Review the analysis
6.4.1 Verifying and validating results
6.4.2 Uncertainty and sensitivity analysis <\/td>\n<\/tr>\n
235<\/td>\n6.4.3 Monitoring and review
6.5 Apply results to support decisions
6.5.1 Overview <\/td>\n<\/tr>\n
236<\/td>\n6.5.2 Decisions about the significance of risk
6.5.3 Decisions that involve selecting between options <\/td>\n<\/tr>\n
237<\/td>\n6.6 Record and report risk assessment process and outcomes
7 Selecting risk assessment techniques
7.1 General <\/td>\n<\/tr>\n
238<\/td>\n7.2 Selecting techniques <\/td>\n<\/tr>\n
240<\/td>\nAnnex A (informative)Categorization of techniques
A.1 Introduction to categorization of techniques
A.2 Application of categorization of techniques
Tables
Table A.1 \u2013 Characteristics of techniques <\/td>\n<\/tr>\n
241<\/td>\nTable A.2 \u2013 Techniques and indicative characteristics <\/td>\n<\/tr>\n
246<\/td>\nA.3 Use of techniques during the ISO 31000 process
Figures
Figure A.1 \u2013 Application of techniques in the ISO 31000 risk management process [3] <\/td>\n<\/tr>\n
247<\/td>\nTable A.3 \u2013 Applicability of techniques to the ISO 31000 process <\/td>\n<\/tr>\n
249<\/td>\nAnnex B (informative)Description of techniques
B.1 Techniques for eliciting views from stakeholders and experts
B.1.1 General
B.1.2 Brainstorming <\/td>\n<\/tr>\n
251<\/td>\nB.1.3 Delphi technique <\/td>\n<\/tr>\n
252<\/td>\nB.1.4 Nominal group technique <\/td>\n<\/tr>\n
253<\/td>\nB.1.5 Structured or semi-structured interviews <\/td>\n<\/tr>\n
254<\/td>\nB.1.6 Surveys <\/td>\n<\/tr>\n
255<\/td>\nB.2 Techniques for identifying risk
B.2.1 General <\/td>\n<\/tr>\n
256<\/td>\nB.2.2 Checklists, classifications and taxonomies <\/td>\n<\/tr>\n
258<\/td>\nB.2.3 Failure modes and effects analysis (FMEA) and failure modes, effects and criticality analysis (FMECA) <\/td>\n<\/tr>\n
259<\/td>\nB.2.4 Hazard and operability (HAZOP) studies <\/td>\n<\/tr>\n
260<\/td>\nTable B.1 \u2013 Examples of basic guidewords and their generic meanings <\/td>\n<\/tr>\n
261<\/td>\nB.2.5 Scenario analysis <\/td>\n<\/tr>\n
263<\/td>\nB.2.6 Structured what if technique (SWIFT) <\/td>\n<\/tr>\n
264<\/td>\nB.3 Techniques for determining sources, causes and drivers of risk
B.3.1 General <\/td>\n<\/tr>\n
265<\/td>\nB.3.2 Cindynic approach <\/td>\n<\/tr>\n
266<\/td>\nTable B.2 \u2013 Table of deficits for each stakeholder
Table B.3 \u2013 Table of dissonances between stakeholders <\/td>\n<\/tr>\n
267<\/td>\nB.3.3 Ishikawa analysis (fishbone) method <\/td>\n<\/tr>\n
268<\/td>\nFigure B.1 \u2013 Example Ishikawa (fishbone) diagram <\/td>\n<\/tr>\n
269<\/td>\nB.4 Techniques for analysing controls
B.4.1 General
B.4.2 Bow tie analysis <\/td>\n<\/tr>\n
270<\/td>\nFigure B.2 \u2013 Example of Bowtie <\/td>\n<\/tr>\n
271<\/td>\nB.4.3 Hazard analysis and critical control points (HACCP) <\/td>\n<\/tr>\n
273<\/td>\nB.4.4 Layers of protection analysis (LOPA) <\/td>\n<\/tr>\n
275<\/td>\nB.5 Techniques for understanding consequences and likelihood
B.5.1 General
B.5.2 Bayesian analysis <\/td>\n<\/tr>\n
277<\/td>\nB.5.3 Bayesian networks and influence diagrams <\/td>\n<\/tr>\n
278<\/td>\nFigure B.3 \u2013 A Bayesian network showing a simplified version of a realecological problem: modelling native fish populations in Victoria, Australia <\/td>\n<\/tr>\n
279<\/td>\nB.5.4 Business impact analysis (BIA) <\/td>\n<\/tr>\n
281<\/td>\nB.5.5 Cause-consequence analysis (CCA) <\/td>\n<\/tr>\n
282<\/td>\nFigure B.4 \u2013 Example of cause-consequence diagram <\/td>\n<\/tr>\n
283<\/td>\nB.5.6 Event tree analysis (ETA) <\/td>\n<\/tr>\n
284<\/td>\nFigure B.5 \u2013 Example of event tree analysis <\/td>\n<\/tr>\n
285<\/td>\nB.5.7 Fault tree analysis (FTA) <\/td>\n<\/tr>\n
286<\/td>\nFigure B.6 \u2013 Example of fault tree <\/td>\n<\/tr>\n
287<\/td>\nB.5.8 Human reliability analysis (HRA) <\/td>\n<\/tr>\n
288<\/td>\nB.5.9 Markov analysis <\/td>\n<\/tr>\n
289<\/td>\nFigure B.7 \u2013 Example of Markov diagram
Table B.4 \u2013 Example of Markov matrix <\/td>\n<\/tr>\n
290<\/td>\nB.5.10 Monte Carlo simulation
Table B.5 \u2013 Examples of systems to which Markov analysis can be applied <\/td>\n<\/tr>\n
294<\/td>\nB.6 Techniques for analysing dependencies and interactions
B.6.1 Causal mapping <\/td>\n<\/tr>\n
296<\/td>\nB.6.2 Cross impact analysis <\/td>\n<\/tr>\n
298<\/td>\nB.7 Techniques that provide a measure of risk
B.7.1 Toxicological risk assessment
Figure B.8 \u2013 Example of dose response curve <\/td>\n<\/tr>\n
300<\/td>\nB.7.2 Value at risk (VaR)
Figure B.9 \u2013 Distribution of value
Figure B.10 \u2013 Detail of loss region VaR values <\/td>\n<\/tr>\n
302<\/td>\nB.7.3 Conditional value at risk (CVaR) or expected shortfall (ES)
Figure B.11 \u2013 VaR and CVaR for possible loss portfolio <\/td>\n<\/tr>\n
303<\/td>\nB.8 Techniques for evaluating the significance of risk
B.8.1 General
B.8.2 As low as reasonably practicable (ALARP) and so far as is reasonably practicable (SFAIRP) <\/td>\n<\/tr>\n
304<\/td>\nFigure B.12 \u2013 ALARP diagram <\/td>\n<\/tr>\n
305<\/td>\nB.8.3 Frequency-number (F-N) diagrams <\/td>\n<\/tr>\n
306<\/td>\nFigure B.13 \u2013 Sample F-N diagram <\/td>\n<\/tr>\n
307<\/td>\nB.8.4 Pareto charts
Figure B.14 \u2013 Example of a Pareto chart <\/td>\n<\/tr>\n
309<\/td>\nB.8.5 Reliability centred maintenance (RCM) <\/td>\n<\/tr>\n
310<\/td>\nTable B.6 \u2013 An example of RCM task selection <\/td>\n<\/tr>\n
311<\/td>\nB.8.6 Risk indices <\/td>\n<\/tr>\n
312<\/td>\nB.9 Techniques for selecting between options
B.9.1 General <\/td>\n<\/tr>\n
313<\/td>\nB.9.2 Cost\/benefit analysis (CBA) <\/td>\n<\/tr>\n
315<\/td>\nB.9.3 Decision tree analysis <\/td>\n<\/tr>\n
316<\/td>\nB.9.4 Game theory <\/td>\n<\/tr>\n
317<\/td>\nTable B.7 \u2013 Example of a game matrix <\/td>\n<\/tr>\n
318<\/td>\nB.9.5 Multi-criteria analysis (MCA) <\/td>\n<\/tr>\n
320<\/td>\nB.10 Techniques for recording and reporting
B.10.1 General <\/td>\n<\/tr>\n
321<\/td>\nB.10.2 Risk registers <\/td>\n<\/tr>\n
322<\/td>\nB.10.3 Consequence\/likelihood matrix (risk matrix or heat map) <\/td>\n<\/tr>\n
323<\/td>\nFigure B.15 \u2013 Part example of table defining consequence scales
Figure B.16 \u2013 Part example of a likelihood scale <\/td>\n<\/tr>\n
324<\/td>\nFigure B.17 \u2013 Example of consequence\/likelihood matrix <\/td>\n<\/tr>\n
326<\/td>\nB.10.4 S-curves
Figure B.18 \u2013 Probability distribution function and cumulative distribution function <\/td>\n<\/tr>\n
328<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Tracked Changes. Risk management. Risk assessment techniques<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2019<\/td>\n334<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":344532,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[385,2641],"product_tag":[],"class_list":{"0":"post-344524","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-25-040-40","7":"product_cat-bsi","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/344524","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/344532"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=344524"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=344524"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=344524"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}