Premium
7.1.4 Identifying and Modeling Safety Hazards
Author(s) -
Daniels Jesse,
Bahill A. Terry,
Werner Paul W.
Publication year - 2000
Publication title -
incose international symposium
Language(s) - English
Resource type - Journals
ISSN - 2334-5837
DOI - 10.1002/j.2334-5837.2000.tb00364.x
Subject(s) - hazard , computer science , hazard analysis , representation (politics) , hazard map , key (lock) , hazardous waste , process (computing) , index (typography) , data mining , risk analysis (engineering) , reliability engineering , engineering , computer security , medicine , chemistry , organic chemistry , politics , world wide web , political science , law , operating system , waste management
The Hazard Model described in this paper is a risk management tool that is intended to aid in tracking and evaluating risks. The model is a new application of old systems engineering tools, i.e., tradeoff studies. However, the model is not intended to be directly integrated into the SE process. Rather, it should be implemented as an ongoing evaluator of key attributes as required by the system under study. The Hazard Model is designed to accept data from distributed databases, evaluate the data, and provide as output a numerical representation of the system's state, called the Hazard Index . The Hazard Index may be interpreted as a traveler's advisory. A Hazard Object template is used to ensure that all necessary descriptors for each condition that may potentially contribute to hazardous circumstances are collected in a standardized format. Three methods for combining hazard data are presented and compared. These three methods serve as the “engine” for our Hazard Model. Interactions among hazard stimuli are also investigated. Three methods are presented for handling three different types of interactions between the Hazard Objects.