Flight Training Risk Identification and Assessment Based on the HHM-RFRM Model
Author
Abstract
Suggested Citation
Download full text from publisher
References listed on IDEAS
- Stan Kaplan & Yacov Y. Haimes & B. John Garrick, 2001. "Fitting Hierarchical Holographic Modeling into the Theory of Scenario Structuring and a Resulting Refinement to the Quantitative Definition of Risk," Risk Analysis, John Wiley & Sons, vol. 21(5), pages 807-807, October.
- Tamasi, Galileo & Demichela, Micaela, 2011. "Risk assessment techniques for civil aviation security," Reliability Engineering and System Safety, Elsevier, vol. 96(8), pages 892-899.
- Stanley Kaplan & B. John Garrick, 1981. "On The Quantitative Definition of Risk," Risk Analysis, John Wiley & Sons, vol. 1(1), pages 11-27, March.
- Yacov Y. Haimes & Stan Kaplan & James H. Lambert, 2002. "Risk Filtering, Ranking, and Management Framework Using Hierarchical Holographic Modeling," Risk Analysis, John Wiley & Sons, vol. 22(2), pages 383-397, April.
- Oster, Clinton V. & Strong, John S. & Zorn, C. Kurt, 2013. "Analyzing aviation safety: Problems, challenges, opportunities," Research in Transportation Economics, Elsevier, vol. 43(1), pages 148-164.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Ioanna Ioannou & Jaime E. Cadena & Willy Aspinall & David Lange & Daniel Honfi & Tiziana Rossetto, 2022. "Prioritization of hazards for risk and resilience management through elicitation of expert judgement," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 112(3), pages 2773-2795, July.
- Barry Charles Ezell, 2007. "Infrastructure Vulnerability Assessment Model (I‐VAM)," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 571-583, June.
- Gregory A. Lamm & Yacov Y. Haimes, 2002. "Assessing and managing risks to information assurance: A methodological approach," Systems Engineering, John Wiley & Sons, vol. 5(4), pages 286-314.
- Elizabeth B. Connelly & Lisa M. Colosi & Andres F. Clarens & James H. Lambert, 2015. "Risk Analysis of Biofuels Industry for Aviation with Scenario‐Based Expert Elicitation," Systems Engineering, John Wiley & Sons, vol. 18(2), pages 178-191, March.
- James H. Lambert & Rachel K. Jennings & Nilesh N. Joshi, 2006. "Integration of risk identification with business process models," Systems Engineering, John Wiley & Sons, vol. 9(3), pages 187-198, September.
- James H. Lambert & Benjamin L. Schulte & Priya Sarda, 2005. "Tracking the complexity of interactions between risk incidents and engineering systems," Systems Engineering, John Wiley & Sons, vol. 8(3), pages 262-277, September.
- Barry M. Horowitz & Yacov Y. Haimes, 2003. "Risk‐based methodology for scenario tracking, intelligence gathering, and analysis for countering terrorism," Systems Engineering, John Wiley & Sons, vol. 6(3), pages 152-169.
- Maria Leung & James H. Lambert & Alexander Mosenthal, 2004. "A Risk‐Based Approach to Setting Priorities in Protecting Bridges Against Terrorist Attacks," Risk Analysis, John Wiley & Sons, vol. 24(4), pages 963-984, August.
- Wenjun Zhang & Yingjun Zhang & Weiliang Qiao, 2022. "Risk Scenario Evaluation for Intelligent Ships by Mapping Hierarchical Holographic Modeling into Risk Filtering, Ranking and Management," Sustainability, MDPI, vol. 14(4), pages 1-18, February.
- Yacov Y. Haimes, 2012. "Systems‐Based Guiding Principles for Risk Modeling, Planning, Assessment, Management, and Communication," Risk Analysis, John Wiley & Sons, vol. 32(9), pages 1451-1467, September.
- Kenneth G. Crowther & Yacov Y. Haimes, 2005. "Application of the inoperability input—output model (IIM) for systemic risk assessment and management of interdependent infrastructures," Systems Engineering, John Wiley & Sons, vol. 8(4), pages 323-341.
- Jia-ni Zhao & Li-na Shi & Li Zhang, 2017. "Application of improved unascertained mathematical model in security evaluation of civil airport," International Journal of System Assurance Engineering and Management, Springer;The Society for Reliability, Engineering Quality and Operations Management (SREQOM),India, and Division of Operation and Maintenance, Lulea University of Technology, Sweden, vol. 8(3), pages 1989-2000, November.
- Michael J. Pennock & Yacov Y. Haimes, 2002. "Principles and guidelines for project risk management," Systems Engineering, John Wiley & Sons, vol. 5(2), pages 89-108.
- James H. Lambert & Jeffrey M. Keisler & William E. Wheeler & Zachary A. Collier & Igor Linkov, 2013. "Multiscale approach to the security of hardware supply chains for energy systems," Environment Systems and Decisions, Springer, vol. 33(3), pages 326-334, September.
- Abhinav B. Agrawal & Kash Barker & Yacov Y. Haimes, 2011. "Adaptive multiplayer approach for risk‐based decision‐making: 2006 Virginia Gubernatorial Inauguration," Systems Engineering, John Wiley & Sons, vol. 14(4), pages 455-470, December.
- Yacov Y. Haimes & Clyde C. Chittister, 2012. "Risk to cyberinfrastructure systems served by cloud computing technology as systems of systems," Systems Engineering, John Wiley & Sons, vol. 15(2), pages 213-224, June.
- Andreas Lindhe & Lars Rosén & Tommy Norberg & Jon Røstum & Thomas J. R. Pettersson, 2013. "Uncertainty modelling in multi-criteria analysis of water safety measures," Environment Systems and Decisions, Springer, vol. 33(2), pages 195-208, June.
- Yacov Y. Haimes, 2011. "On the Complex Quantification of Risk: Systems‐Based Perspective on Terrorism," Risk Analysis, John Wiley & Sons, vol. 31(8), pages 1175-1186, August.
- Yacov Y. Haimes, 2009. "On the Complex Definition of Risk: A Systems‐Based Approach," Risk Analysis, John Wiley & Sons, vol. 29(12), pages 1647-1654, December.
- Yacov Y. Haimes & Stan Kaplan & James H. Lambert, 2002. "Risk Filtering, Ranking, and Management Framework Using Hierarchical Holographic Modeling," Risk Analysis, John Wiley & Sons, vol. 22(2), pages 383-397, April.
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jsusta:v:15:y:2023:i:2:p:1693-:d:1037259. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.
Printed from https://ideas.repec.org/a/gam/jsusta/v15y2023i2p1693-d1037259.html