Response to "Problems with Empirical Bayes"
In: Risk analysis: an international journal, Band 6, Heft 3, S. 273-274
ISSN: 1539-6924
6 Ergebnisse
Sortierung:
In: Risk analysis: an international journal, Band 6, Heft 3, S. 273-274
ISSN: 1539-6924
In: Risk analysis: an international journal, Band 5, Heft 2, S. 93-95
ISSN: 1539-6924
In: Risk analysis: an international journal, Band 4, Heft 1, S. 15-23
ISSN: 1539-6924
Several recent nuclear power plant probabilistic risk assessments (PRAs) have utilized broadened Reactor Safety Study (RSS) component failure rate population variability curves to compensate for such things as expert "overvaluation bias" in the estimates upon which the curves are based.A simple two‐components of variation empirical Bayes model is proposed for use in estimating the between‐expert variability curve in the presence of such biases. Under certain conditions this curve is a population variability curve. Comparisons are made with the existing method.The popular procedure appears to be generally much more conservative than the empirical Bayes method in removing such biases. In one case the broadened curve based on the popular method is more than two orders of magnitude broader than the empirical Bayes curve. In another case it is found that the maximum justifiable degree of broadening of the RSS curve is to increase α from 5% to 12%, which is significantly less than the 20% value recommended in the popular approach.
In: Risk analysis: an international journal, Band 7, Heft 1, S. 35-47
ISSN: 1539-6924
A quantitative probabilistic/systems analysis model is described which is useful for allocating resources to safeguard valuable documents or materials in either a fixed‐site facility or a moving convoy against an overt terrorist attack. The model is also useful for ranking the sensitive areas at a site according to their survivability of a given hypothesized terrorist attempt. To compare various defense strategies and security configurations, the probability of a successful terrorist activity is computed based on event tree models of the site/security configuration. This calculation incorporates a realistic engagement model (in the event a guard force engages the terrorists prior to completion of their objective) and information on barrier penetration times (for example, distribution of the time to defeat a chain link fence or vault door, traverse an open area, and so forth). Two security analyses are described to illustrate the methodology. One example considers a terrorist attack on a convoy transporting a missile from a storage to a launch facility. The second example involves an attack on a munitions storage facility.
In: Risk analysis, Band 7, Heft 1, S. 35-47
ISSN: 0272-4332