000 10040nam a22004333i 4500
001 EBC7104349
003 MiAaPQ
005 20221031135435.0
007 cr cnu||||||||
008 221028s2015 xx o ||||0 eng d
020 _a9781119017998
_q(electronic bk.)
020 _z9781119017981
035 _a(MiAaPQ)EBC7104349
035 _a(Au-PeEL)EBL7104349
040 _aMiAaPQ
_beng
_erda
_epn
_cMiAaPQ
_dMiAaPQ
100 1 _aHaimes, Yacov Y.
245 1 0 _aRisk Modeling, Assessment, and Management.
264 1 _aNewark :
_bJohn Wiley & Sons, Incorporated,
_c2015.
264 4 _c�2015.
300 _a1 online resource (1269 pages)
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
490 1 _aNew York Academy of Sciences Ser.
505 0 _aIntro -- Title page -- Table of Contents -- Preface to the Fourth Edition -- The Companion Website -- Acknowledgments -- ACKNOWLEDGMENTS TO THE FIRST EDITION -- ACKNOWLEDGMENTS TO THE SECOND EDITION -- ACKNOWLEDGMENTS TO THE THIRD EDITION -- ACKNOWLEDGMENTS TO THE FOURTH EDITION -- Part I: Fundamentals of Risk Modeling, Assessment, and Management -- 1 The Art and Science of Systems and Risk Analysis -- 1.1 INTRODUCTION -- 1.2 SYSTEMS ENGINEERING -- 1.3 RISK ASSESSMENT AND MANAGEMENT -- 1.4 CONCEPT ROAD MAP -- 1.5 EPILOGUE -- REFERENCES -- 2 The Role of Modeling in the Definition and Quantification of the Risk Function -- 2.1 INTRODUCTION -- 2.2 THE RISK ASSESSMENT AND MANAGEMENT PROCESS: HISTORICAL PERSPECTIVES -- 2.3 INFORMATION, INTELLIGENCE, AND MODELS -- 2.4 THE BUILDING BLOCKS OF MATHEMATICAL MODELS -- 2.5 ON THE COMPLEX DEFINITION OF RISK, VULNERABILITY, AND RESILIENCE: A SYSTEMS-BASED APPROACH -- 2.6 ON THE DEFINITION OF VULNERABILITIES IN MEASURING RISKS TO SYSTEMS -- 2.7 ON THE DEFINITION OF RESILIENCE IN MEASURING RISK TO SYSTEMS -- 2.8 ON THE COMPLEX QUANTIFICATION OF RISK TO SYSTEMS -- REFERENCES -- 3 Identifying Risk through Hierarchical Holographic Modeling and Its Derivatives -- 3.1 HIERARCHICAL ASPECTS -- 3.2 HIERARCHICAL OVERLAPPING COORDINATION -- 3.3 HHM -- 3.4 HHM AND THE THEORY OF SCENARIO STRUCTURING -- 3.5 ADAPTIVE MULTIPLAYER HHM GAME -- 3.6 WATER RESOURCES SYSTEM -- 3.7 SUSTAINABLE DEVELOPMENT -- 3.8 HHM IN A SYSTEM ACQUISITION PROJECT -- 3.9 SOFTWARE ACQUISITION -- 3.10 HARDENING THE WATER SUPPLY INFRASTRUCTURE -- 3.11 RISK ASSESSMENT AND MANAGEMENT FOR SUPPORT OF OPERATIONS OTHER THAN WAR -- 3.12 AUTOMATED HIGHWAY SYSTEM -- 3.13 FOOD-POISONING SCENARIOS -- REFERENCES -- 4 Modeling and Decision Analysis -- 4.1 INTRODUCTION -- 4.2 DECISION RULES UNDER UNCERTAINTY -- 4.3 DECISION TREES -- 4.4 DECISION MATRIX.
505 8 _a4.5 THE FRACTILE METHOD -- 4.6 TRIANGULAR DISTRIBUTION -- 4.7 INFLUENCE DIAGRAMS -- 4.8 POPULATION DYNAMIC MODELS -- 4.9 PSM -- 4.10 EXAMPLE PROBLEMS -- REFERENCES -- 5 Multiobjective Trade-Off Analysis -- 5.1 INTRODUCTION -- 5.2 EXAMPLES OF MULTIPLE ENVIRONMENTAL OBJECTIVES -- 5.3 THE SURROGATE WORTH TRADE-OFF METHOD -- 5.4 CHARACTERIZING A PROPER NONINFERIOR SOLUTION -- 5.5 THE SWT METHOD AND THE UTILITY FUNCTION APPROACH -- 5.6 EXAMPLE PROBLEMS -- 5.7 SUMMARY -- REFERENCES -- 6 Defining Uncertainty and Sensitivity Analysis -- 6.1 INTRODUCTION -- 6.2 SENSITIVITY, RESPONSIVITY, STABILITY, AND IRREVERSIBILITY -- 6.3 UNCERTAINTIES DUE TO ERRORS IN MODELING -- 6.4 CHARACTERIZATION OF MODELING ERRORS -- 6.5 UNCERTAINTY TAXONOMY -- 6.6 THE USIM -- 6.7 FORMULATION OF THE MULTIOBJECTIVE OPTIMIZATION PROBLEM -- 6.8 A ROBUST ALGORITHM OF THE USIM -- 6.9 INTEGRATION OF THE USIM WITH PARAMETER OPTIMIZATION AT THE DESIGN STAGE -- 6.10 CONCLUSIONS -- REFERENCES -- 7 Risk Filtering, Ranking, and Management -- 7.1 INTRODUCTION -- 7.2 PAST EFFORTS IN RISK FILTERING AND RANKING -- 7.3 RFRM: A METHODOLOGICAL FRAMEWORK -- 7.4 CASE STUDY: AN OOTW -- 7.5 SUMMARY -- REFERENCES -- Part II: Advances in Risk Modeling, Assessment, and Management -- 8 Risk of Extreme Events and the Fallacy of the Expected Value -- 8.1 INTRODUCTION -- 8.2 RISK OF EXTREME EVENTS -- 8.3 THE FALLACY OF THE EXPECTED VALUE -- 8.4 THE PMRM -- 8.5 GENERAL FORMULATION OF THE PMRM -- 8.6 SUMMARY OF THE PMRM -- 8.7 ILLUSTRATIVE EXAMPLE -- 8.8 ANALYSIS OF DAM FAILURE AND EXTREME FLOOD THROUGH THE PMRM -- 8.9 EXAMPLE PROBLEMS -- 8.10 SUMMARY -- REFERENCES -- 9 Multiobjective Decision-Tree Analysis -- 9.1 INTRODUCTION -- 9.2 METHODOLOGICAL APPROACH -- 9.3 DIFFERENCES BETWEEN SODT AND MODT -- 9.4 SUMMARY -- 9.5 EXAMPLE PROBLEMS -- REFERENCES -- 10 Multiobjective Risk Impact Analysis Method.
505 8 _a10.1 INTRODUCTION -- 10.2 IMPACT ANALYSIS -- 10.3 THE MULTIOBJECTIVE, MULTISTAGE IMPACT ANALYSIS METHOD: AN OVERVIEW -- 10.4 COMBINING THE PMRM AND THE MMIAM -- 10.5 RELATING MULTIOBJECTIVE DECISION TREES TO THE MRIAM -- 10.6 EXAMPLE PROBLEMS -- 10.7 EPILOGUE -- REFERENCES -- 11 Statistics of Extremes: Extension of the PMRM -- 11.1 A REVIEW OF THE PARTITIONED MULTIOBJECTIVE RISK METHOD -- 11.2 STATISTICS OF EXTREMES -- 11.3 INCORPORATING THE STATISTICS OF EXTREMES INTO THE PMRM -- 11.4 SENSITIVITY ANALYSIS OF THE APPROXIMATION OF f4(�) -- 11.5 GENERALIZED QUANTIFICATION OF RISK OF EXTREME EVENTS -- 11.6 SUMMARY -- 11.7 EXAMPLE PROBLEMS -- REFERENCES -- 12 Systems-Based Guiding Principles for Risk Modeling, Planning, Assessment, Management, and Communication -- 12.1 INTRODUCTION -- 12.2 THE JOURNEY: THE GUIDING PRINCIPLES IN THE BROADER CONTEXT OF THE EMERGING NEXT GENERATION DEVELOPED BY THE FEDERAL AVIATION ADMINISTRATION -- REFERENCES -- 13 Fault Trees -- 13.1 INTRODUCTION -- 13.2 BASIC FAULT-TREE ANALYSIS -- 13.3 RELIABILITY AND FAULT-TREE ANALYSIS -- 13.4 MINIMAL CUT SETS -- 13.5 THE DARE USING FAULT TREES -- 13.6 EXTREME EVENTS IN FAULT TREE ANALYSIS -- 13.7 AN EXAMPLE PROBLEM BASED ON A CASE STUDY -- 13.8 FAILURE MODE AND EFFECTS ANALYSIS AND FAILURE MODE, EFFECTS, AND CRITICALITY ANALYSIS -- 13.9 EVENT TREES -- 13.10 EXAMPLE PROBLEMS -- REFERENCES -- 14 Multiobjective Statistical Method -- 14.1 INTRODUCTION -- 14.2 MATHEMATICAL FORMULATION OF THE INTERIOR DRAINAGE PROBLEM -- 14.3 FORMULATION OF THE OPTIMIZATION PROBLEM -- 14.4 THE MSM: STEP-BY-STEP -- 14.5 THE SWT METHOD -- 14.6 MULTIPLE OBJECTIVES -- 14.7 APPLYING THE MSM -- 14.8 EXAMPLE PROBLEMS -- REFERENCES -- 15 Principles and Guidelines for Project Risk Management -- 15.1 INTRODUCTION -- 15.2 DEFINITIONS AND PRINCIPLES OF PROJECT RISK MANAGEMENT -- 15.3 PROJECT RISK MANAGEMENT METHODS.
505 8 _a15.4 AIRCRAFT DEVELOPMENT EXAMPLE -- 15.5 QUANTITATIVE RISK ASSESSMENT AND MANAGEMENT OF SOFTWARE ACQUISITION -- 15.6 CRITICAL FACTORS THAT AFFECT SOFTWARE NONTECHNICAL RISK -- 15.7 BASIS FOR VARIANCES IN COST ESTIMATION -- 15.8 DISCRETE DYNAMIC MODELING -- 15.9 SUMMARY -- REFERENCES -- 16 Modeling Complex Systems of Systems with Phantom System Models -- 16.1 INTRODUCTION -- 16.2 WHAT HAVE WE LEARNED FROM OTHER CONTRIBUTORS? -- 16.3 THE CENTRALITY OF THE STATES OF THE SYSTEM IN MODELING AND IN RISK ANALYSIS -- 16.4 THE CENTRALITY OF TIME IN MODELING MULTIDIMENSIONAL RISK, UNCERTAINTY,  AND BENEFITS -- 16.5 EXTENSION OF HHM TO PSM -- 16.6 PSM AND META-MODELING -- 16.7 PSM LABORATORY -- 16.8 SUMMARY -- REFERENCES -- 17 Adaptive Two-Player Hierarchical Holographic Modeling Game for Counterterrorism Intelligence Analysis -- 17.1 INTRODUCTION -- 17.2 BAYES' THEOREM -- 17.3 MODELING THE MULTIPLE PERSPECTIVES OF COMPLEX SYSTEMS -- 17.4 ADAPTIVE TWO-PLAYER HHM GAME: TERRORIST NETWORKS VERSUS HOMELAND PROTECTION -- 17.5 THE BUILDING BLOCKS OF MATHEMATICAL MODELS AND THE CENTRALITY OF STATE VARIABLES IN INTELLIGENCE ANALYSIS -- 17.6 HIERARCHICAL ADAPTIVE TWO-PLAYER HHM GAME -- 17.7 COLLABORATIVE COMPUTING SUPPORT FOR ADAPTIVE TWO-PLAYER HHM GAMES -- 17.8 SUMMARY -- REFERENCES -- 18 Inoperability Input-Output Model and Its Derivatives for Interdependent Infrastructure Sectors -- 18.1 OVERVIEW -- 18.2 BACKGROUND: THE ORIGINAL LEONTIEF INPUT-OUTPUT MODEL -- 18.3 INOPERABILITY INPUT-OUTPUT MODEL -- 18.4 REGIMES OF RECOVERY -- 18.5 SUPPORTING DATABASES FOR IIM ANALYSIS -- 18.6 NATIONAL AND REGIONAL DATABASES FOR IIM ANALYSIS -- 18.7 RIMS II -- 18.8 DEVELOPMENT OF THE IIM AND ITS EXTENSIONS -- 18.9 THE DYNAMIC IIM -- 18.10 PRACTICAL USES OF THE IIM -- 18.11 UNCERTAINTY IIM -- 18.12 EXAMPLE PROBLEMS -- 18.13 SUMMARY -- REFERENCES -- 19 Case Studies.
505 8 _a19.1 A RISK-BASED INPUT-OUTPUT METHODOLOGY FOR MEASURING THE EFFECTS OF THE AUGUST 2003 NORTHEAST BLACKOUT -- 19.2 SYSTEMIC VALUATION OF STRATEGIC PREPAREDNESS THROUGH APPLYING THE IIM WITH LESSONS LEARNED FROM HURRICANE KATRINA -- 19.3 EX POST ANALYSIS USING THE IIM OF THE SEPTEMBER 11, 2001, ATTACK ON THE UNITED STATES -- 19.4 RISK MODELING, ASSESSMENT, AND MANAGEMENT OF LAHAR FLOW THREAT -- 19.5 THE STATISTICS OF EXTREME EVENTS AND 6-SIGMA CAPABILITY -- 19.6 SEQUENTIAL PARETO-OPTIMAL DECISIONS MADE DURING EMERGENT COMPLEX SYSTEMS OF SYSTEMS: AN APPLICATION TO THE FAA NEXTGEN -- REFERENCES -- Appendix: Optimization Techniques -- A.1 INTRODUCTION TO MODELING AND OPTIMIZATION -- A.2 BAYESIAN ANALYSIS AND THE PREDICTION OF CHEMICAL CARCINOGENICITY -- A.3 THE FARMER'S DILEMMA: LINEAR MODEL AND DUALITY -- A.4 STANDARD NORMAL PROBABILITY TABLE -- REFERENCES -- Author Index -- Subject Index -- Series page -- End User License Agreement.
588 _aDescription based on publisher supplied metadata and other sources.
590 _aElectronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2022. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
655 4 _aElectronic books.
776 0 8 _iPrint version:
_aHaimes, Yacov Y.
_tRisk Modeling, Assessment, and Management
_dNewark : John Wiley & Sons, Incorporated,c2015
_z9781119017981
797 2 _aProQuest (Firm)
830 0 _aNew York Academy of Sciences Ser.
856 4 0 _uhttps://ebookcentral.proquest.com/lib/kliuc-ebooks/detail.action?docID=7104349
_zClick to View
942 _2lcc
_cEBK
999 _c318769
_d318769