Damaged IGBT
  Welcome   Publications Methodology Soft Methods RAS
Lectures Collection Formulae Contact
 
Safety Methodology

This collection of safety engineering methods is compiled from four different sources as given below. Playing cards symbols [, , , ] refer to each source. Double symbols correspond to software appliable methods. Triple symbols refer to combined (software and non-software appliable) methods. Some methods not listed in any of these references are indicated by an asterisk.

   IEC ISO 31010:2009-11, Risk Management — Risk Management Techniques, 1st edition, Annex B. [Link]

   EN 50128:2001, Railway applications – Communications, signalling and processing systems – Software for railway control and protection systems. European Committee for Electrotechnical Standardization (CENELEC). [Link]

   Federal Aviation Administration (ed.): System Safety Handbook. Federal Aviation Administration, 2000-12-30. [Link]

   Stephens, R. A.; Talso, W.: System Safety Analysis Handbook – A Source Book for Safety Practitioners. Unionville/Virginia, USA: System Safety Society, 2nd Edition, 1999-08.

ISO  IEC  CENELEC  System Safety Society

1. Accident Analysis  
 


2. Action Error Analysis  
 


3. AI Fault Correction  
♥♥
 
 
4. Analysable Programs  
♥♥
 
 
5. Analyze Architectural Design  
 
♠♠J
 
6. Architectural Design Analysis  
 
♠♠J
 
7. Avalanche/Stress Testing  
♥♥
 
 
8. Backward Recovery  
♥♥
 
 
9. Barrier Analysis  
 


10. Bayesian Statistics and Bayes Nets B26
 
 
 
11. Bent Pin Analysis  
 


12. Boundary Value Analysis  
♥♥
 
 
13. Bow Tie Analysis B21
 
 
 
14. Brainstorming B01
 
 
 
15. Business Impact Analysis B11
 
 
 
16. Cable Failure Matrix  
 


17. Calculus of Communicating Systems (CCS)  
♥♥
 
 
18. Cause Consequence Analysis B16
♥♥


19. Cause and Effect Analysis B17
 
 
 
20. Certified Tools and Certified Translators  
♥♥
 
 
21. Change Analysis  
 


22. Check List Analysis, Checklists B04
♥♥


23. Chemical Process Quantitative Risk Analysis  
 
 

24. Code Analysis  
 
♠♠J
 
25. Code Data Analysis  
 
♠♠J
 
26. Code Inspection Checklists (including coding standards)  
 
♠♠J
 
27. Code Interface Analysis  
 
♠♠J
 
28. Code Logic Analysis  
 
♠♠J
 
29. Common Cause Analysis, Common Cause Failure Analysis  
♥♥


30. Communicating Sequential Processes (CSP)  
♥♥
 
 
31. Comparison-To-Criteria  
 


32. Conduct Risk Assessment  
 
♠♠J
 
33. Confined Space Safety  
 


34. Consequence Probability Matrix B29
 
 
 
35. Contingency Analysis  
 


36. Control Flow Analysis  
♥♥
 
 
37. Control Rating Code Method  
 


38. Controlled Requirements Expression (CORE)  
♥♥
 
 
39. Cost Benefit Analysis B30
 
 
 
40. Critical Incident Technique  
 


41. Critical Path Analysis  
 


42. Criticality Analysis  
 


43. Cryogenic Systems Safety Analysis  
 
 

44. Damage Mode and Effects Analysis  
 


45. Data Evaluation*  
 
 
 
46. Data Flow Analysis  
♥♥
 
 
47. Data Flow Diagrams  
♥♥
 
 
48. Data Recording and Analysis  
♥♥
 
 
49. Deactivation Safety Analysis  
 


50. Decision Tables, Truth Tables  
♥♥
 
 
51. Decision Tree B19
 
 
 
52. Defensive Programming  
♥♥
 
 
53. Delphi Knowledge Elicitation Method B03
 
 
 
54. Design and Coding Standards  
♥♥
 
 
55. Design Constraint Analysis  
 
♠♠J
 
56. Design Data Analysis  
 
♠♠J
 
57. Design Interface Analysis  
 
♠♠J
 
58. Design Logic Analysis (DLA)  
 
♠♠J
 
59. Detailed Design Analysis  
 
♠♠J
 
60. Digraph Utilization Within System Safety  
 
 

61. Diverse Programming  
♥♥
 
 
62. Dow Fire and Explosion Index*  
 
 
 
63. Dynamic Flowgraph Analysis  
 
♠♠J
 
64. Dynamic Reconfiguration  
♥♥
 
 
65. Electromagnetic Compatibility Analysis and Testing  
 


66. Energy Analysis  
 


67. Energy Trace and Barrier Analysis for Hazard Discovery and Analysis  
 


68. Energy Trace Checklist  
 


69. Environmental Risk Assessment B08
 


70. Equivalence Classes and Input Partition Testing  
♥♥
 
 
71. Error Detecting and Correcting Codes  
♥♥
 
 
72. Error Guessing  
♥♥
 
 
73. Error Seeding  
♥♥
 
 
74. Event and Causal Factor Charting  
 


75. Event Tree Analysis B15
♥♥


76. Expert Assessment*  
 
 
 
77. Explosive Safety Analysis  
 


78. External Events Analysis  
 


79. Facilities System Safety Analysis  
 


80. Factor Analysis*  
 
 
 
81. Fagan Inspections  
♥♥
 
 
82. Failure Assertion Programming  
♥♥
 
 
83. Failure Modes And Effects Analysis B13
 


84. Failure Modes, Effects, and Criticality Analysis B13
 


85. Fault Detection and Diagnosis  
♥♥
 
 
86. Fault Hazard Analysis  
 


87. Fault Isolation Methodology  
 
♠♠♠
♦♦♦
88. Fault Tree Analysis B14
♥♥


89. Finite State Machines, State Transition Diagrams  
♥♥
 
 
90. Fire Hazards Analysis  
 


91. Flow Analysis  
 


92. FN Curves B27
 
 
 
93. Formal Methods  
♥♥
♠♠J
 
94. Formal Methods and Safety-Critical Considerations  
 
♠♠J
 
95. Formal Proof  
♥♥
 
 
96. Forward Recovery  
♥♥
 
 
97. Fuzzy Logic  
♥♥
 
 
98. Graceful Degradation  
♥♥
 
 
99. Hardware/Software Safety Analysis  
 
♠♠♠
♦♦♦
100. Hazard Analysis  
 


101. Hazard Analysis and Critical Control Points (HACCP) B07
 
 
 
102. Hazard and Operability Analysis/Study (HAZOP) B06
♥♥
 

103. Hazard Mode Effects Analysis  
 


104. Health Hazard Assessment  
 


105. Higher Order Logic (HOL)  
♥♥
 
 
106. Human Error Analysis  
 


107. Human Factors Analysis  
 


108. Human Reliability Analysis B20
 


109. Impact Analysis  
♥♥
 
 
110. Information Hiding, Information Encapsulation  
♥♥
 
 
111. Interface Analysis  
 


112. Interface Analysis, Interdependence Analysis  
 
♠♠J
 
113. Interface Testing  
♥♥
 
 
114. Jackson System Development (JSD)  
♥♥
 
 
115. Job Safety Analysis  
 


116. Language for Temporal Ordering Specification (LOTOS)  
♥♥
 
 
117. Language Subset  
♥♥
 
 
118. Laser Safety Analysis  
 


119. Library of Trusted, Verified Modules and Components  
♥♥
 
 
120. Layer Protection Analysis (LOPA) B18
 
 
 
121. Management Oversight and Risk Tree Analysis (MORT)  
 


122. Markov Models B24
♥♥
 
 
123. Materials Compatibility Analysis  
 


124. Maximum Credible Accident/Worst Case  
 


125. Measurement of Complexity  
 
♠♠J
 
126. Memorising Executed Cases  
♥♥
 
 
127. Metrics  
♥♥
 
 
128. Modeling  
 


129. Modular Approach  
♥♥
 
 
130. Modular Approach to Software Construction (MASCOT)  
♥♥
 
 
131. Monte Carlo Simulation B25
♥♥
 
 
132. Multi-Criteria Decision Analysis (MCDA) B31
 
 
 
133. Naked Person  
 


134. Network Logic Analysis  
 


135. Nuclear Criticality Analysis  
 
 

136. Nuclear Explosives Process Hazard Analysis  
 
 

137. Nuclear Safety Analysis  
 
 

138. Nuclear Safety Cross-Check Analysis  
 
 
♦♦♦
139. OBJ  
♥♥
 
 
140. Object Oriented Programming  
♥♥
 
 
141. Operating and Support Hazard Analysis  
 


142. Operational Readiness Review  
 
 

143. Performance Modelling  
♥♥
 
 
144. Performance Requirements  
♥♥
 
 
145. Petri Net Analysis  
 
♠♠♠J
♦♦♦
146. Preliminary Hazard Analysis B05
 


147. Preliminary Hazard List  
 


148. Probabilistic Hybrid Analytical System Evaluation  
 
 

149. Probabilistic Risk Assessment (PRA)  
 
 

150. Probabilistic Testing  
♥♥
 
 
151. Procedure Analysis  
 


152. Process Hazard Analysis  
 
 

153. Process Simulation  
♥♥
 
 
154. Production System Hazard Analysis  
 


155. Prototype Development  
 


156. Prototyping or Animation  
♥♥
 
 
157. Radiological Hazard Safety Analysis  
 
 

158. Rate Monotonic Analysis  
 
♠♠J
 
159. Real-time Yourdon  
♥♥
 
 
160. Recovery Block  
♥♥
 
 
161. Relative Ranking  
 
 

162. Reliability Block Diagram  
♥♥
 
 
163. Reliability Centred Maintenance (RCM) B22
 
 
 
164. Repetitive Failure Analysis  
 
 

165. Requirements State  
 
♠♠J
 
166. Response Timing and Memory Constraints  
♥♥
 
 
167. Re-Try Fault Recovery Mechanisms  
♥♥
 
 
168. Risk-Based Decision Analysis  
 


169. Risk Indices B28
 
 
 
170. Root Cause Analysis B12
 


171. Safe Subsets of Programming Languages  
 
♠♠J
 
172. Safety Review, Safety Audit  
 


173. Scenario Analysis B10
 


174. Seismic Analysis  
 
 

175. Sequentially-Timed Events Plot  
 


176. Simulations*  
 
 
 
177. Single-Point Failure Analysis  
 
♠♠♠
♦♦♦
178. Sneak Circuit Analysis B23
♥♥


179. Software Configuration Management  
♥♥
 
 
180. Software Error Effect Analysis (SEEA)  
♥♥
 
 
181. Software Failure Modes and Effects Analysis  
 
♠♠♠
♦♦♦
182. Software Fault Tree Analysis (SFTA)  
 
♠♠♠J
♦♦♦
183. Software Hazard Analysis  
 
♠♠♠
♦♦♦
184. Software Sneak Circuit Analysis  
 
♠♠♠
♦♦♦
185. Spread and Effect Analysis*  
 
 
 
186. Statistical Data Analysis*  
 
 
 
187. Statistical Process Control  
 
 

188. Strongly Typed Programming Languages  
♥♥
 
 
189. Structural Safety Analysis  
 


190. Structure Based Testing  
♥♥
 
 
191. Structure Diagrams  
♥♥
 
 
192. Structured Analysis and Design Technique (SADT)  
♥♥
 
 
193. Structured Methodology  
♥♥
 
 
194. Structured Programming  
♥♥
 
 
195. Structured or Semi-structured Interviews B02
 
 
 
196. Structured What-If Technique (SWIFT) B09
 
 
 
197. Subsystem Hazard Analysis  
 


198. Suitable Programming Languages  
♥♥
 
 
199. Symbolic Execution  
♥♥
 
 
200. System Hazard Analysis  
 


201. Systematic Occupational Safety Analysis  
 
 

202. Systematic Inspection  
 


203. Task Analysis  
 


204. Technique for Human Error Prediction (THERP)  
 


205. Temporal Logic  
♥♥
 
 
206. Test Safety Analysis  
 


207. Text  
♥♥
 
 
208. Threat Hazard Analysis  
 
 

209. Time(d) Petri Nets  
♥♥
 
 
210. Time/Loss Analysis for Emergency Response Evaluation  
 


211. Traceability  
♥♥
 
 
212. Translator Proven In Use  
♥♥
 
 
213. Uncertainty Analysis  
 


214. Unused Code Analysis  
 
♠♠J
 
215. Update Criticality Analysis  
 
♠♠J
 
216. Update Design Constraint Analysis  
 
♠♠J
 
217. Vienna Development Method  
♥♥
 
 
218. Walk-Through Task Analysis  
 


219. Walkthroughs, Design Reviews  
♥♥
 
 
220. What-If Analysis B09
 


221. What-If/Checklist Analysis B09
 


222. Wind/Tornado Analysis  
 
 

223. Z  
♥♥
 
 
224. Zurich Hazard Analysis*