Welcome  Publications  Methodology  Soft Methods  RAS 
Lectures  Collection  Formulae  Contact  
Safety Methodology  
This collection of safety engineering methods is compiled from four different sources as given below. Playing cards symbols [♣, ♥, ♠, ♦] refer to each source. Double symbols correspond to software appliable methods. Triple symbols refer to combined (software and nonsoftware appliable) methods. Some methods not listed in any of these references are indicated by an asterisk. ♣ IEC ISO 31010:200911, Risk Management — Risk Management Techniques, 1st edition, Annex B. [Link] ♥ EN 50128:2001, Railway applications – Communications, signalling and processing systems – Software for railway control and protection systems. European Committee for Electrotechnical Standardization (CENELEC). [Link] ♠ Federal Aviation Administration (ed.): System Safety Handbook. Federal Aviation Administration, 20001230. [Link] ♦ Stephens, R. A.; Talso, W.: System Safety Analysis Handbook – A Source Book for Safety Practitioners. Unionville/Virginia, USA: System Safety Society, 2nd Edition, 199908.  

1.  Accident Analysis 


♠ 
♦ 
2.  Action Error Analysis 


♠ 
♦ 
3.  AI Fault Correction 

♥♥ 


4.  Analysable Programs 

♥♥ 


5.  Analyze Architectural Design 


♠♠J 

6.  Architectural Design Analysis 


♠♠J 

7.  Avalanche/Stress Testing 

♥♥ 


8.  Backward Recovery 

♥♥ 


9.  Barrier Analysis 


♠ 
♦ 
10.  Bayesian Statistics and Bayes Nets 
♣ B26 



11.  Bent Pin Analysis 


♠ 
♦ 
12.  Boundary Value Analysis 

♥♥ 


13.  Bow Tie Analysis 
♣ B21 



14.  Brainstorming 
♣ B01 



15.  Business Impact Analysis 
♣ B11 



16.  Cable Failure Matrix 


♠ 
♦ 
17.  Calculus of Communicating Systems (CCS) 

♥♥ 


18.  Cause Consequence Analysis 
♣ B16 
♥♥ 
♠ 
♦ 
19.  Cause and Effect Analysis 
♣ B17 



20.  Certified Tools and Certified Translators 

♥♥ 


21.  Change Analysis 


♠ 
♦ 
22.  Check List Analysis, Checklists 
♣ B04 
♥♥ 
♠ 
♦ 
23.  Chemical Process Quantitative Risk Analysis 



♦ 
24.  Code Analysis 


♠♠J 

25.  Code Data Analysis 


♠♠J 

26.  Code Inspection Checklists (including coding standards) 


♠♠J 

27.  Code Interface Analysis 


♠♠J 

28.  Code Logic Analysis 


♠♠J 

29.  Common Cause Analysis, Common Cause Failure Analysis 

♥♥ 
♠ 
♦ 
30.  Communicating Sequential Processes (CSP) 

♥♥ 


31.  ComparisonToCriteria 


♠ 
♦ 
32.  Conduct Risk Assessment 


♠♠J 

33.  Confined Space Safety 


♠ 
♦ 
34.  Consequence Probability Matrix 
♣ B29 



35.  Contingency Analysis 


♠ 
♦ 
36.  Control Flow Analysis 

♥♥ 


37.  Control Rating Code Method 


♠ 
♦ 
38.  Controlled Requirements Expression (CORE) 

♥♥ 


39.  Cost Benefit Analysis 
♣ B30 



40.  Critical Incident Technique 


♠ 
♦ 
41.  Critical Path Analysis 


♠ 
♦ 
42.  Criticality Analysis 


♠ 
♦ 
43.  Cryogenic Systems Safety Analysis 



♦ 
44.  Damage Mode and Effects Analysis 


♠ 
♦ 
45.  Data Evaluation* 




46.  Data Flow Analysis 

♥♥ 


47.  Data Flow Diagrams 

♥♥ 


48.  Data Recording and Analysis 

♥♥ 


49.  Deactivation Safety Analysis 


♠ 
♦ 
50.  Decision Tables, Truth Tables 

♥♥ 


51.  Decision Tree 
♣ B19 



52.  Defensive Programming 

♥♥ 


53.  Delphi Knowledge Elicitation Method 
♣ B03 



54.  Design and Coding Standards 

♥♥ 


55.  Design Constraint Analysis 


♠♠J 

56.  Design Data Analysis 


♠♠J 

57.  Design Interface Analysis 


♠♠J 

58.  Design Logic Analysis (DLA) 


♠♠J 

59.  Detailed Design Analysis 


♠♠J 

60.  Digraph Utilization Within System Safety 



♦ 
61.  Diverse Programming 

♥♥ 


62.  Dow Fire and Explosion Index* 




63.  Dynamic Flowgraph Analysis 


♠♠J 

64.  Dynamic Reconfiguration 

♥♥ 


65.  Electromagnetic Compatibility Analysis and Testing 


♠ 
♦ 
66.  Energy Analysis 


♠ 
♦ 
67.  Energy Trace and Barrier Analysis for Hazard Discovery and Analysis 


♠ 
♦ 
68.  Energy Trace Checklist 


♠ 
♦ 
69.  Environmental Risk Assessment 
♣ B08 

♠ 
♦ 
70.  Equivalence Classes and Input Partition Testing 

♥♥ 


71.  Error Detecting and Correcting Codes 

♥♥ 


72.  Error Guessing 

♥♥ 


73.  Error Seeding 

♥♥ 


74.  Event and Causal Factor Charting 


♠ 
♦ 
75.  Event Tree Analysis 
♣ B15 
♥♥ 
♠ 
♦ 
76.  Expert Assessment* 




77.  Explosive Safety Analysis 


♠ 
♦ 
78.  External Events Analysis 


♠ 
♦ 
79.  Facilities System Safety Analysis 


♠ 
♦ 
80.  Factor Analysis* 




81.  Fagan Inspections 

♥♥ 


82.  Failure Assertion Programming 

♥♥ 


83.  Failure Modes And Effects Analysis 
♣ B13 

♠ 
♦ 
84.  Failure Modes, Effects, and Criticality Analysis 
♣ B13 

♠ 
♦ 
85.  Fault Detection and Diagnosis 

♥♥ 


86.  Fault Hazard Analysis 


♠ 
♦ 
87.  Fault Isolation Methodology 


♠♠♠ 
♦♦♦ 
88.  Fault Tree Analysis 
♣ B14 
♥♥ 
♠ 
♦ 
89.  Finite State Machines, State Transition Diagrams 

♥♥ 


90.  Fire Hazards Analysis 


♠ 
♦ 
91.  Flow Analysis 


♠ 
♦ 
92.  FN Curves 
♣ B27 



93.  Formal Methods 

♥♥ 
♠♠J 

94.  Formal Methods and SafetyCritical Considerations 


♠♠J 

95.  Formal Proof 

♥♥ 


96.  Forward Recovery 

♥♥ 


97.  Fuzzy Logic 

♥♥ 


98.  Graceful Degradation 

♥♥ 


99.  Hardware/Software Safety Analysis 


♠♠♠ 
♦♦♦ 
100.  Hazard Analysis 


♠ 
♦ 
101.  Hazard Analysis and Critical Control Points (HACCP) 
♣ B07 



102.  Hazard and Operability Analysis/Study (HAZOP) 
♣ B06 
♥♥ 

♦ 
103.  Hazard Mode Effects Analysis 


♠ 
♦ 
104.  Health Hazard Assessment 


♠ 
♦ 
105.  Higher Order Logic (HOL) 

♥♥ 


106.  Human Error Analysis 


♠ 
♦ 
107.  Human Factors Analysis 


♠ 
♦ 
108.  Human Reliability Analysis 
♣ B20 

♠ 
♦ 
109.  Impact Analysis 

♥♥ 


110.  Information Hiding, Information Encapsulation 

♥♥ 


111.  Interface Analysis 


♠ 
♦ 
112.  Interface Analysis, Interdependence Analysis 


♠♠J 

113.  Interface Testing 

♥♥ 


114.  Jackson System Development (JSD) 

♥♥ 


115.  Job Safety Analysis 


♠ 
♦ 
116.  Language for Temporal Ordering Specification (LOTOS) 

♥♥ 


117.  Language Subset 

♥♥ 


118.  Laser Safety Analysis 


♠ 
♦ 
119.  Library of Trusted, Verified Modules and Components 

♥♥ 


120.  Layer Protection Analysis (LOPA) 
♣ B18 



121.  Management Oversight and Risk Tree Analysis (MORT) 


♠ 
♦ 
122.  Markov Models 
♣ B24 
♥♥ 


123.  Materials Compatibility Analysis 


♠ 
♦ 
124.  Maximum Credible Accident/Worst Case 


♠ 
♦ 
125.  Measurement of Complexity 


♠♠J 

126.  Memorising Executed Cases 

♥♥ 


127.  Metrics 

♥♥ 


128.  Modeling 


♠ 
♦ 
129.  Modular Approach 

♥♥ 


130.  Modular Approach to Software Construction (MASCOT) 

♥♥ 


131.  Monte Carlo Simulation 
♣ B25 
♥♥ 


132.  MultiCriteria Decision Analysis (MCDA) 
♣ B31 



133.  Naked Person 


♠ 
♦ 
134.  Network Logic Analysis 


♠ 
♦ 
135.  Nuclear Criticality Analysis 



♦ 
136.  Nuclear Explosives Process Hazard Analysis 



♦ 
137.  Nuclear Safety Analysis 



♦ 
138.  Nuclear Safety CrossCheck Analysis 



♦♦♦ 
139.  OBJ 

♥♥ 


140.  Object Oriented Programming 

♥♥ 


141.  Operating and Support Hazard Analysis 


♠ 
♦ 
142.  Operational Readiness Review 



♦ 
143.  Performance Modelling 

♥♥ 


144.  Performance Requirements 

♥♥ 


145.  Petri Net Analysis 


♠♠♠J 
♦♦♦ 
146.  Preliminary Hazard Analysis 
♣ B05 

♠ 
♦ 
147.  Preliminary Hazard List 


♠ 
♦ 
148.  Probabilistic Hybrid Analytical System Evaluation 



♦ 
149.  Probabilistic Risk Assessment (PRA) 



♦ 
150.  Probabilistic Testing 

♥♥ 


151.  Procedure Analysis 


♠ 
♦ 
152.  Process Hazard Analysis 



♦ 
153.  Process Simulation 

♥♥ 


154.  Production System Hazard Analysis 


♠ 
♦ 
155.  Prototype Development 


♠ 
♦ 
156.  Prototyping or Animation 

♥♥ 


157.  Radiological Hazard Safety Analysis 



♦ 
158.  Rate Monotonic Analysis 


♠♠J 

159.  Realtime Yourdon 

♥♥ 


160.  Recovery Block 

♥♥ 


161.  Relative Ranking 



♦ 
162.  Reliability Block Diagram 

♥♥ 


163.  Reliability Centred Maintenance (RCM) 
♣ B22 



164.  Repetitive Failure Analysis 



♦ 
165.  Requirements State 


♠♠J 

166.  Response Timing and Memory Constraints 

♥♥ 


167.  ReTry Fault Recovery Mechanisms 

♥♥ 


168.  RiskBased Decision Analysis 


♠ 
♦ 
169.  Risk Indices 
♣ B28 



170.  Root Cause Analysis 
♣ B12 

♠ 
♦ 
171.  Safe Subsets of Programming Languages 


♠♠J 

172.  Safety Review, Safety Audit 


♠ 
♦ 
173.  Scenario Analysis 
♣ B10 

♠ 
♦ 
174.  Seismic Analysis 



♦ 
175.  SequentiallyTimed Events Plot 


♠ 
♦ 
176.  Simulations* 




177.  SinglePoint Failure Analysis 


♠♠♠ 
♦♦♦ 
178.  Sneak Circuit Analysis 
♣ B23 
♥♥ 
♠ 
♦ 
179.  Software Configuration Management 

♥♥ 


180.  Software Error Effect Analysis (SEEA) 

♥♥ 


181.  Software Failure Modes and Effects Analysis 


♠♠♠ 
♦♦♦ 
182.  Software Fault Tree Analysis (SFTA) 


♠♠♠J 
♦♦♦ 
183.  Software Hazard Analysis 


♠♠♠ 
♦♦♦ 
184.  Software Sneak Circuit Analysis 


♠♠♠ 
♦♦♦ 
185.  Spread and Effect Analysis* 




186.  Statistical Data Analysis* 




187.  Statistical Process Control 



♦ 
188.  Strongly Typed Programming Languages 

♥♥ 


189.  Structural Safety Analysis 


♠ 
♦ 
190.  Structure Based Testing 

♥♥ 


191.  Structure Diagrams 

♥♥ 


192.  Structured Analysis and Design Technique (SADT) 

♥♥ 


193.  Structured Methodology 

♥♥ 


194.  Structured Programming 

♥♥ 


195.  Structured or Semistructured Interviews 
♣ B02 



196.  Structured WhatIf Technique (SWIFT) 
♣ B09 



197.  Subsystem Hazard Analysis 


♠ 
♦ 
198.  Suitable Programming Languages 

♥♥ 


199.  Symbolic Execution 

♥♥ 


200.  System Hazard Analysis 


♠ 
♦ 
201.  Systematic Occupational Safety Analysis 



♦ 
202.  Systematic Inspection 


♠ 
♦ 
203.  Task Analysis 


♠ 
♦ 
204.  Technique for Human Error Prediction (THERP) 


♠ 
♦ 
205.  Temporal Logic 

♥♥ 


206.  Test Safety Analysis 


♠ 
♦ 
207.  Text 

♥♥ 


208.  Threat Hazard Analysis 



♦ 
209.  Time(d) Petri Nets 

♥♥ 


210.  Time/Loss Analysis for Emergency Response Evaluation 


♠ 
♦ 
211.  Traceability 

♥♥ 


212.  Translator Proven In Use 

♥♥ 


213.  Uncertainty Analysis 


♠ 
♦ 
214.  Unused Code Analysis 


♠♠J 

215.  Update Criticality Analysis 


♠♠J 

216.  Update Design Constraint Analysis 


♠♠J 

217.  Vienna Development Method 

♥♥ 


218.  WalkThrough Task Analysis 


♠ 
♦ 
219.  Walkthroughs, Design Reviews 

♥♥ 


220.  WhatIf Analysis 
♣ B09 

♠ 
♦ 
221.  WhatIf/Checklist Analysis 
♣ B09 

♠ 
♦ 
222.  Wind/Tornado Analysis 



♦ 
223.  Z 

♥♥ 


224.  Zurich Hazard Analysis* 



