Hazard analysis techniques, methods and approaches: A review
List of Authors
  • Azma Abdullah , Kiriyadhatshini Gunaratnam

Keyword
  • hazard analysis, hazard analysis techniques, safety-critical system

Abstract
  • Hazard analysis (HA) is an indispensable task during the specification and development of safety-critical systems. It involves identifying potential forms of harm, their effects, causal factors, and the level of risk associated with them. Systems are always vulnerable to mishaps, hazards, or risks that result in system failures, resulting in injuries, loss, and damage. Even though previous studies have made a significant contribution to the study of hazard analysis, little effort has been made to give an overview of the common HA techniques, highlighting their responsibilities, advantages, and disadvantages. Thus, this paper aims to focus on and feature the existing HA techniques along with their respective functions. An overall picture of the advantages and disadvantages of listed HA techniques is presented as well in this paper. Such a study may be utilized as a guide to aid researchers and practitioners in understanding hazard analysis. The investigation is conducted using a process-oriented approach that consists of three steps: formulation of the research questions, the gathering of related studies, and the analysis of the extracted studies. The study revealed a total of 22 HA techniques. A further study is to propose and carry out a systematic literature review to identify to what extent the hazard analysis techniques have been implemented and evaluated in case studies.

Reference
  • 1. Haider, A. A., & Nadeem, A. (2013). A Survey of Safety Analysis Techniques for Safety Critical Systems. International Journal of Future Computer and Communication, 2(2), 134–137.Harris, A. L., Lang, M., Yates, D., & Kruck, S. E. (2008). Incorporating Ethics and Social Responsibility in IS Education. Journal of Information Systems Education, 22(3), 183-189.

    2. Abdullah, A. B., & Liu, S. (2013). Hazard analysis for safety-critical systems using SOFL. Proceedings of the 2013 IEEE Symposium on Computational Intelligence for Engineering Solutions, CIES 2013 - 2013 IEEE Symposium Series on Computational Intelligence, SSCI 2013, 133–140.

    3. Vilela, J., Castro, J., Martins, L. E. G., & Gorschek, T. (2017). Integration between requirements engineering and safety analysis: A systematic literature review. Journal of Systems and Software, 125, 68–92.

    4. Popović, V., & Vasić, B. (2008). Review of hazard analysis methods and their basic characteristics. FME Transactions, 36(4), 181–187.

    5. Ericson, C. A. (2005). Hazard Analysis Techniques for System Safety. Hazard Analysis Techniques for System Safety. John Wiley and Sons.

    6. Sere, K., & Troubitsyna, E. (1999). Hazard Analysis in formal specification. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 1709, 1564–1583.

    7. Sulaman, S. M., Beer, A., Felderer, M., & Höst, M. (2019). Comparison of the FMEA and STPA safety analysis methods–a case study. Software Quality Journal, 27(1), 349–387.

    8. Guo, H., Su, G., Jia, Y., Feng, G., Zhou, R., & Wang, Y. (2019). A systemic approach to hazard analysis and control based on energy function. Proceedings of 2018 IEEE International Conference of Safety Produce Informatization, IICSPI 2018, 20–25.

    9. Foster, N., & Jacob, J. (2002). Hazard Analysis for Security Protocol Requirements, 75–92.

    10. Dunjó, J., Fthenakis, V., Vílchez, J. A., & Arnaldos, J. (2010). Hazard and operability (HAZOP) analysis. A literature review. Journal of Hazardous Materials, 173(1–3), 19–32.

    11. Yang, S., & Chung, P. W. H. (1998). Hazard analysis and support tool for computer controlled processes. Journal of Loss Prevention in the Process Industries, 11(5), 333–345.

    12. Asare, P., Lach, J., & Stankovic, J. A. (2013). FSTPA-I: A Formal Approach to Hazard Identification via System Theoretic Process Analysis. 2013 ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS), 150.

    13. Wei, X., Dong, Y., Yang, M., Hu, N., & Ye, H. (2014). Hazard analysis for AADL model. RTCSA 2014 - 20th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, 1–10.

    14. Muller, M., Roth, M., & Lindemann, U. (2016). The hazard analysis profile: Linking safety analysis and SysML. 10th Annual International Systems Conference, SysCon 2016 - Proceedings.

    15. Mason-Blakley, F., Weber, J., & Habibi, R. (2014). Prospective hazard analysis for information system. Proceedings - 2014 IEEE International Conference on Healthcare Informatics, ICHI 2014, 256–265.

    16. Zhang, H., Li, W., & Chen, W. (2010). Model-based hazard analysis method on automotive programmable electronic system. Proceedings - 2010 3rd International Conference on Biomedical Engineering and Informatics, BMEI 2010, 7(Bmei), 2658–2661.

    17. Wang, R., & Zheng, W. (2013). Research and application of the BFM-STAMP hazard analysis method. IEEE ICIRT 2013 - Proceedings: IEEE International Conference on Intelligent Rail Transportation, 174–178.

    18. Alexander, R., & Kelly, T. (2013). Supporting systems of systems hazard analysis using multi-agent simulation. Safety Science, 51(1), 302–318.

    19. Laufenberg, X. (1995). Modeling and Model-Based Analysis for Safety and Hazard Analysis. IFAC Proceedings Volumes, 28(25), 263–268.

    20. Zhu, D., & Yao, S. (2019). A Hazard Analysis Method for Software-Controlled Systems Based on System-Theoretic Accident Modeling and Process. Proceedings of the IEEE International Conference on Software Engineering and Service Sciences, ICSESS, 2018–Novem, 90–95.

    21. Zhou, J., Hänninen, K., Lundqvist, K., & Provenzano, L. (2018). An ontological approach to identify the causes of hazards for safety-critical systems. 2017 2nd International Conference on System Reliability and Safety, ICSRS 2017, 2018–January, 405–413.

    22. Jain, P., Rogers, W. J., Pasman, H. J., Keim, K. K., & Mannan, M. S. (2018). A Resilience-based Integrated Process Systems Hazard Analysis (RIPSHA) approach: Part I plant system layer. Process Safety and Environmental Protection, 116, 92–105.

    23. Fernandez Ares, A., & Fatehi, A. (1970). Development of probabilistic seismic hazard analysis for international sites, challenges and guidelines. Nuclear Engineering and Design, 259(Usgs 2008), 222–229.

    24. Ortmeier, F. (2014). Deductive Cause-Consequence Analysis ( DCCA ), (January 2006).

    25. Oh, H.-J., & Hong, J.-P. (2012). A Study of Software Hazard Analysis for Safety Critical Function in Military Aircraft. Journal of IKEEE, 16(2), 145–152.

    26. Dokas, I. M., Feehan, J., & Imran, S. (2013). EWaSAP: An early warning sign identification approach based on a systemic hazard analysis. Safety Science, 58, 11–26.

    27. Wu, Y., Zhao, T., & Chu, J. (2017). A Hybrid Process Coupling Hazard Analysis Method based on PFMEA and BN, (Tcrse).

    28. Zahabi, M., & Kaber, D. (2019). A fuzzy system hazard analysis approach for human-in-the-loop systems. Safety Science, 120(April), 922–931.

    29. Song, H., & Schnieder, E. (2018). Evaluating Fault Tree by means of Colored Petri nets to analyze the railway system dependability. Safety Science, 110(January), 313–323.

    30. Pereira, D. P., Hirata, C., & Nadjm-Tehrani, S. (2019). A STAMP-based ontology approach to support safety and security analyses. Journal of Information Security and Applications, 47, 302–319.

    31. Radosavljević, S., Lilić, N., Ćurčić, S., & Radosavljević, M. (2009). Risk assessment and managing technical systems in case of mining industry. Strojniski Vestnik/Journal of Mechanical Engineering, 55(2), 119–130.

    32. B, P. M., Zhang, Y., & Jones, P. (2017). A Hazard Analysis Method for Systematic Identification of Safety Requirements for User Interface Software in Medical Devices, 1, 284–299.

    33. Höfig, K., Klein, C., Rothbauer, S., Zeller, M., Vorderer, M., & Koo, C. H. (2019). A Meta-model for Process Failure Mode and Effects Analysis (PFMEA). IEEE International Conference on Emerging Technologies and Factory Automation, ETFA, 2019–September, 1199–1202.

    34. Banduka, N., Tadic, D., Macužic, I., & Crnjac, M. (2018). Extended process failure mode and effect analysis (PFMEA) for the automotive industry: The FSQC-PFMEA. Advances in Production Engineering And Management, 13(2), 206–215.

    35. Li, W., & Zhang, H. (2011). A software hazard analysis method for automotive control system. Proceedings - 2011 IEEE International Conference on Computer Science and Automation Engineering, CSAE 2011, 3, 744–748.

    36. Wang, H., Zhong, D., Zhao, Y., & Sun, R. (2017). A system safety analysis method based on multiple category hazard factors. Proceedings - 4th International Conference on Dependable Systems and Their Applications, DSA 2017, 2018–Janua, 29–34.

    37. Du, J., Wang, J., & Feng, X. (2014). A safety requirement elicitation technique of safety-critical system based on scenario. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8588 LNCS, 127–136.

    38. Liu, H. C., Chen, X. Q., Duan, C. Y., & Wang, Y. M. (2019). Failure mode and effect analysis using multi-criteria decision making methods: A systematic literature review. Computers and Industrial Engineering, 135(April), 881–897.

    39. Alsammak, A. K., & Yahia, H. (2017). Hazard Analysis of Real-Time Safety Critical System Using Hierarchical Communicating Real-Time State Machines Formal Model, 628–634.

    40. Guiochet, J. (2016). Hazard analysis of human-robot interactions with HAZOP-UML. Safety Science, 84, 225–237.

    41. Jain, P., Rogers, W. J., Pasman, H. J., & Mannan, M. S. (2018). A resilience-based integrated process systems hazard analysis (RIPSHA) approach: Part II management system layer. Process Safety and Environmental Protection, 118, 115–124.

    42. Basu, S. (2017). Qualitative Hazard Analysis. Plant Hazard Analysis and Safety Instrumentation Systems.

    43. Pasman, H. J., Rogers, W. J., & Mannan, M. S. (2018). How can we improve process hazard identification? What can accident investigation methods contribute and what other recent developments? A brief historical survey and a sketch of how to advance. Journal of Loss Prevention in the Process Industries, 55(January), 80–106.

    44. Rao, C., Guo, J., Li, N., Lei, Y., Zhang, Y. D., & Li, Y. (2018). Safety-critical system modeling in model-based testing with hazard and operability analysis. Proceedings - 2018 IEEE 18th International Conference on Software Quality, Reliability, and Security, QRS 2018, 397–404.

    45. Kritzinger, D. (2017). Functional Hazard Analysis. Aircraft System Safety, 37–57.

    46. Gabsi, W., Zalila, B., & Jmaiel, M. (2017). Development of a parser for the AADL error model annex. Proceedings - 16th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2017, 233–238.

    47. Casson Moreno, V., & Cozzani, V. (2018). Integrated hazard identification within the risk management of industrial biological processes. Safety Science, 103(September 2017), 340–351.

    48. Lin, J.-W., & Chiou, J.-S. (2019). Active Probability Backpropagation Neural Network Model for Monthly Prediction of Probabilistic Seismic Hazard Analysis in Taiwan. IEEE Access, 7, 108990–109014.

    49. Li, Z., Wang, S., Zhao, T., & Liu, B. (2016). A hazard analysis via an improved timed colored petri net with time–space coupling safety constraint. Chinese Journal of Aeronautics, 29(4), 1027–1041.

    50. Alexander, R., & Kelly, T. (2013). Supporting systems of systems hazard analysis using multi-agent simulation. Safety Science, 51(1), 302–318.

    51. Paolo, E.A.D., Noble, J., Bullock, S., (2000). Simulation models as opaque thought experiments. in: Proceedings of the Seventh International Conference on Artificial Life. MIT Press, pp. 497–506.

    52. Laufenberg, X. (1995). Modeling and Model-Based Analysis for Safety and Hazard Analysis. IFAC Proceedings Volumes, 28(25), 263–268.

    53. Ares, A. F. (2010). Development of probabilistic seismic hazard analysis for international sites, challenges and guidelines. 2010 1st International Nuclear and Renewable Energy Conference, INREC’10, 1(Usgs 2008), 1–6.

    54. Eschenburg, J. (2006). Failure-Sensitive Specification: A Formal Method for Finding Failure Modes, (April).

    55. Woods, D.D., 2009. Escaping failures of foresight. Safety Science 47 (4), 498–501.

    56. Wei, X., Dong, Y., Li, X., & Wong, W. E. (2018). Architecture-level hazard analysis using AADL. Journal of Systems and Software, 137, 580–604.

    57. Leveson, N. G. (2004). A Systems-Theoretic Approach to Safety in Software-Intensive Systems, 1(1), 66–86.

    58. Liu, Q., Peng, Y., Li, Z., Zhao, P., & Qiu, Z. (2021). Hazard identification methodology for underground coal mine risk management - Root-State Hazard Identification. Resources Policy, 72(19), 102052.

    59. Knight, J. C. (2002). Safety critical systems: Challenges and directions. Proceedings - International Conference on Software Engineering, 547–550.

    60. Daramola, O., Stålhane, T., Sindre, G., & Omoronyia, I. (2011). Enabling hazard identification from requirements and reuse-oriented HAZOP analysis. 2011 4th International Workshop on Managing Requirements Knowledge, MaRK’11 - Part of the 19th IEEE International Requirements Engineering Conference, RE’11, 3–11.

    61. Baybutt, P. (2014). Requirements for improved process hazard analysis (PHA) methods. Journal of Loss Prevention in the Process Industries, 32, 182–191.

    62. Burns, D. J., & Pitblado, R. M. (1993). A Modified Hazop Methodology For Safety Critical System Assessment. Directions in Safety-Critical Systems, 232–245.

    63. Lawrence, J. D., & Gallagher, J. M. (1997). A proposal for performing software safety hazard analysis. Reliability Engineering and System Safety, 55(3), 267–282.