Operating Hazard Analysis Using Supplemented Use Case Descriptions

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsProfessional

    Abstract

    Operating Hazard Analysis (OHA) has traditionally been used to perform risk analysis for operation and maintenance related human - machine interactions. Clear specifications of system operation work tasks and maintenance work procedures are essential for operating hazard identification. The paper describes a method to enhance OHA by creating supplemented use case descriptions to supply systematic input information for the risk analysis. A supplemented use case amplifies a typical use case description with information that is necessary for comprehensive risk analysis of operational and support procedures. Such a risk analysis method with supplemented use cases as the input information is here called Use Case Safety Analysis (UCSA). The paper also provides a template for supplemented use cases and an example of a use case safety analysis using a database tool.
    Original languageEnglish
    Title of host publicationSIAS 2010
    Subtitle of host publicationThe 6th International Conference on Safety of Industrial Automated Systems, Tampere, 14.-15.6.2010
    Place of PublicationHelsinki
    PublisherSuomen automaatioseura
    Number of pages6
    ISBN (Print)978-952-5183-40-5
    Publication statusPublished - 2010
    MoE publication typeD3 Professional conference proceedings
    Event6th International Conference on Safety of Industrial Automation Systems, SIAS 2010 - Tampere, Finland
    Duration: 14 Jun 201015 Jun 2010
    Conference number: 6

    Conference

    Conference6th International Conference on Safety of Industrial Automation Systems, SIAS 2010
    Abbreviated titleSIAS 2010
    Country/TerritoryFinland
    CityTampere
    Period14/06/1015/06/10

    Keywords

    • machines
    • control system
    • safety
    • analysis

    Fingerprint

    Dive into the research topics of 'Operating Hazard Analysis Using Supplemented Use Case Descriptions'. Together they form a unique fingerprint.

    Cite this