151:. Thus, a bow-tie analysis is centred on an energy-based event. The need for energy sources in any damage process had been noted by Lewis DeBlois as early as 1926 as well as Gibson and Haddon in the decade prior to the introduction of the bow-tie diagram. It is evident that any central event may be originated by more than one mechanism and that, following the release of energy, a number of different outcomes may result. As Rowe made clear, it is these various unwanted outcomes that produce the adverse consequences of injury, damage etc.
120:
194:), spurious pressurization above design limits, inadvertent opening, etc. Shown to the right of the central event, are the results/outcomes of the release (e.g., noise, blast overpressure propagation, flying debris, loss of fluid, etc.) When mechanisms and outcomes and subsequently routes to adverse consequences are understood, the analyst can ensure that control measures (often now called
30:
initiating mechanisms on the left (being where reading diagrams starts) and resulting outcomes and associated consequences (such as injury, loss of property, damage to the environment, etc.) on the right. Needed control measures, or barriers, can be identified for each possible path from mechanisms to the final consequences. The shape of the diagram resembles a
57:. The diagram follows the same basic principles as those on which fault tree analysis and event tree analysis are based, but, in being far less complex than these, is attractive as a means of rapidly establishing an overall scope of risk concerns for an organisation, only some few of which may justify those more rigorous and logical methods.
104:
use the same principle: Things go wrong, there is a reason for that and a result too, with the result generating the adverse consequences. The bow-tie diagram introduces the concept of a central energy-based event (the "bow tie knot") in which the damaging properties of the energy are no longer under
48:
Bow-tie analysis is used to display and communicate information about risks in situations where an event has a range of possible causes and consequences. A bow tie is used when assessing controls to check that each pathway from cause to event and event to consequence has effective controls, and that
131:
The fact that scientific effort benefits greatly from a focus on the process giving rise to the phenomenon of interest is well known in several scientific domains, as noted by
William Haddon. The generalized time sequence model (GTSM) was developed in the 1970s by Viner as a process model suited to
29:
used to describe a possible damage process in terms of the mechanisms that may initiate an event in which energy is released, creating possible outcomes, which themselves produce adverse consequences such as injury and damage. The diagram is centred on the (generally unintended) event with credible
142:
in which the energy necessary to bring about the ultimate undesired consequences is released. In
William Rowe’s seminal work, which explained half of the process of damage, the event of interest is defined as what produces outcomes and consequences of interest and outcomes as what results from an
178:, such as injury, loss of property, damage to the environment, etc. on the right. This left to right flow of the process is also a time axis. Control barriers, either hard/engineered or administrative/procedural, are identified for each path from the mechanisms to the final outcomes.
127:
Bow-tie diagrams contribute to the identification, description and understanding of the different types of hazards that can arise in a given situation, facility or production process. They also help identify the relevant risk control measures (barriers) for a given hazard.
221:. However, a different type of bow-tie diagram exists that is more apt at supporting quantified risk analysis. This diagram is essentially the combination of a fault tree and an event tree and maintains the Boolean and probabilistic features of those approaches.
198:) exist to stop the initiating mechanisms from resulting in the central event and the central event from leading to the ultimate unwanted outcomes and consequences. Left-hand side (mechanism) control measures are, in this example, external and internal surface
181:
For example, pressure in a process vessel is a form of energy that can be released if containment is breached (the central event). Possible mechanisms for breach of containment, shown to the left, include structural degradation
143:
event. Derek Viner resolved this circularity by defining the event as "the point in time when control is lost of the potentially damaging properties of the energy source of interest." This is sometimes referred to as the
502:
132:
understanding this process to the phenomenon of unwanted damage. Bow-tie diagrams are a simplified extract of this, conceived of (and then named by students) during a lecture to assist explanation.
217:
Bow-tie diagrams are typically a qualitative tool, used for simple damage process analysis as well as for illustrative purposes, such as in training courses to plant operators and in support of
45:(analyzing the consequences), although it can maintain the quantitative, probabilistic aspects of the fault and event tree when it is used in the context of quantified risk assessments.
773:
Bernsmed, K.; Frøystad, C.; Meland, P.H.; Nesheim, D.A.; Rødseth, Ø.J. (2018). "Visualizing Cyber
Security Risks with Bow-Tie Diagrams". In Liu, P.; Mauw, S.; Stolen, K. (eds.).
754:
Gibson, J. (1961). "The
Contribution of Experimental Psychology to the Formulation of the Problem of Safety: A Letter for Basic Research". In Jacobs, Herbert J. (ed.).
587:
53:
failures) are recognized. It can be used proactively to consider potential events and also retrospectively to model events that have already occurred, such as in an
96:
of
Australia), who drew it as an aid to visualization of his generalized time sequence model (GTSM) for damage processes. The more complex risk analysis tools of
492:
111:
is considered to be the first major company to successfully integrate bow-tie diagrams into their business practices, at least since the early 1990s.
214:. Outcome (right-hand side) control measures in this example would include nearby structures designed to withstand modelled blast overpressure.
421:
335:
775:
Graphical Models for
Security. 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers
92:, Australia in 1979. Other sources point to Derek Viner (in the same year) at the then Ballarat College of Advanced Education (now the
551:
429:
417:
343:
331:
295:
786:
625:
574:
473:
437:
351:
524:
713:
315:
778:
759:
93:
233:
582:
81:
823:
497:
808:
265:
Several software packages are available in the market for bow-tie diagram creation and management.
89:
818:
646:
37:
A bow-tie diagram can be considered as a simplified, linear, and qualitative representation of a
80:
It has been commonly noted that the earliest mention of the bow-tie methodology appeared in the
294:
183:
61:
705:
617:
307:
249:
211:
8:
101:
97:
38:
730:
663:
391:
191:
813:
782:
709:
679:
671:
621:
555:
469:
433:
399:
347:
311:
253:
229:
Bow-tie diagrams are used in various disciplines and domains, including for example:
108:
60:
Bow-tie diagrams are used in several industries, such as oil and gas production, the
54:
50:
644:
Haddon, Jr., William (1973). "Energy Damage and the Ten
Countermeasure Strategies".
546:
Donaldson, Craig (December 2016). "Time for OHS to
Understand the Science of Risk".
740:
655:
383:
299:
244:
85:
659:
532:
387:
374:
239:
802:
675:
667:
559:
403:
395:
203:
683:
206:, etc. While some are relevant to design and commissioning, others are to
202:, vessel inspection (internal and external), wall thickness measurements,
736:
218:
207:
42:
372:
de
Ruijter, A.; Guldenmund, F. (2016). "The Bowtie Method: A Review".
465:
187:
170:, etc.) are shown on the left of the central event and its ultimate
65:
119:
462:
Occupational Risk
Control: Predicting and Preventing the Unwanted
259:
199:
69:
31:
26:
772:
16:
Symbolic representation of accident path and safety barriers
105:
control so that they result in outcomes and consequences.
732:
Industrial Safety Organization for Executive and Engineer
114:
49:
factors that could cause controls to fail (including
371:
41:(analyzing the cause of an event) combined with an
614:Risk Assessment: Theory, Methods, and Applications
342:. IEC 31010 (2.0 ed.). Genève, Switzerland:
800:
760:Association for the Aid of Crippled Children
426:Risk Management – Risk Assessment Techniques
340:Risk Management – Risk Assessment Techniques
643:
756:Behavioral Approaches to Accident Research
575:"Practical Application of Bowtie Analysis"
545:
430:International Electrotechnical Commission
344:International Electrotechnical Commission
296:Center for Chemical Process Safety (CCPS)
224:
464:. Abingdon, England and New York, N.Y.:
118:
728:
695:
693:
611:
455:
453:
451:
449:
801:
753:
747:
416:
330:
123:Bow-tie diagram elements and structure
639:
637:
459:
367:
365:
363:
699:
690:
593:from the original on 26 October 2022
505:from the original on 7 December 2023
487:
485:
446:
428:. IEC 31010 (2.0 ed.). Geneva:
290:
288:
286:
284:
282:
280:
278:
572:
115:Logic and structure of the diagrams
84:(ICI) course notes of a lecture on
13:
766:
634:
605:
360:
324:
135:Bow-tie diagrams are centred on a
14:
835:
566:
539:
482:
410:
275:
722:
517:
234:Occupational safety and health
1:
729:DeBlois, Lewis Amory (1926).
552:Safety Institute of Australia
268:
583:Chemical Institute of Canada
82:Imperial Chemical Industries
7:
498:UK Civil Aviation Authority
304:Bow Ties in Risk Management
147:(a fault-tree term) or the
34:, after which it is named.
10:
840:
660:10.1177/001872087301500407
550:. No. December 2016.
388:10.1016/j.ssci.2016.03.001
75:
708:. pp. 29, 456, 462.
700:Rowe, William D. (1977).
737:McGraw-Hill Book Company
612:Rausand, Marvin (2011).
493:"Introduction to Bowtie"
90:University of Queensland
704:. New York, N.Y. etc.:
225:Use in various domains
204:pressure safety valves
124:
706:John Wiley & Sons
618:John Wiley & Sons
460:Viner, Derek (2015).
308:John Wiley & Sons
300:Energy Institute (EI)
122:
94:Federation University
250:Information security
212:condition monitoring
154:Credible initiating
525:"Bowties – History"
102:event tree analysis
98:fault tree analysis
824:Safety engineering
758:. New York, N.Y.:
735:. New York, N.Y.:
702:An Anatomy of Risk
554:. pp. 18–22.
125:
62:process industries
51:management systems
809:Accident analysis
788:978-3-319-74860-3
627:978-0-470-63764-7
616:. Hoboken, N.J.:
475:978-1-4724-1970-5
439:978-2-8322-6989-3
353:978-2-8322-6989-3
306:. Hoboken, N.J.:
158:(which some call
109:Royal Dutch Shell
55:accident analysis
831:
793:
792:
770:
764:
763:
751:
745:
744:
741:Internet Archive
726:
720:
719:
697:
688:
687:
641:
632:
631:
609:
603:
602:
600:
598:
592:
579:
573:Sneddon, James.
570:
564:
563:
548:OHS Professional
543:
537:
536:
535:on 17 June 2016.
531:. Archived from
521:
515:
514:
512:
510:
489:
480:
479:
457:
444:
443:
414:
408:
407:
369:
358:
357:
328:
322:
321:
292:
839:
838:
834:
833:
832:
830:
829:
828:
799:
798:
797:
796:
789:
771:
767:
752:
748:
727:
723:
716:
698:
691:
642:
635:
628:
610:
606:
596:
594:
590:
577:
571:
567:
544:
540:
523:
522:
518:
508:
506:
491:
490:
483:
476:
458:
447:
440:
415:
411:
370:
361:
354:
329:
325:
318:
293:
276:
271:
245:Aviation safety
227:
117:
86:hazard analysis
78:
23:bow-tie diagram
17:
12:
11:
5:
837:
827:
826:
821:
819:Process safety
816:
811:
795:
794:
787:
779:Springer, Cham
765:
746:
721:
714:
689:
654:(4): 355–366.
633:
626:
604:
565:
538:
516:
481:
474:
445:
438:
409:
375:Safety Science
359:
352:
323:
316:
273:
272:
270:
267:
263:
262:
257:
254:cyber security
247:
242:
240:Process safety
237:
226:
223:
149:critical event
116:
113:
77:
74:
15:
9:
6:
4:
3:
2:
836:
825:
822:
820:
817:
815:
812:
810:
807:
806:
804:
790:
784:
780:
776:
769:
761:
757:
750:
742:
738:
734:
733:
725:
717:
715:0-471-01994-1
711:
707:
703:
696:
694:
685:
681:
677:
673:
669:
665:
661:
657:
653:
649:
648:
647:Human Factors
640:
638:
629:
623:
619:
615:
608:
589:
585:
584:
576:
569:
561:
557:
553:
549:
542:
534:
530:
526:
520:
504:
500:
499:
494:
488:
486:
477:
471:
467:
463:
456:
454:
452:
450:
441:
435:
431:
427:
423:
419:
413:
405:
401:
397:
393:
389:
385:
381:
377:
376:
368:
366:
364:
355:
349:
345:
341:
337:
333:
327:
319:
317:9781119490388
313:
309:
305:
301:
297:
291:
289:
287:
285:
283:
281:
279:
274:
266:
261:
258:
255:
251:
248:
246:
243:
241:
238:
235:
232:
231:
230:
222:
220:
215:
213:
209:
205:
201:
197:
193:
189:
185:
179:
177:
173:
169:
165:
161:
157:
152:
150:
146:
141:
138:
133:
129:
121:
112:
110:
106:
103:
99:
95:
91:
88:given at the
87:
83:
73:
71:
67:
63:
58:
56:
52:
46:
44:
40:
35:
33:
28:
24:
19:
774:
768:
755:
749:
739:– via
731:
724:
701:
651:
645:
613:
607:
595:. Retrieved
581:
568:
547:
541:
533:the original
528:
519:
507:. Retrieved
496:
461:
425:
412:
379:
373:
339:
326:
303:
264:
228:
219:safety cases
216:
195:
180:
176:consequences
175:
171:
167:
163:
159:
155:
153:
148:
144:
139:
136:
134:
130:
126:
107:
79:
59:
47:
36:
27:graphic tool
22:
20:
18:
382:: 211–218.
208:maintenance
803:Categories
529:BowTie Pro
269:References
156:mechanisms
43:event tree
39:fault tree
676:0018-7208
668:1547-8181
560:1837-4980
466:Routledge
404:0925-7535
396:1879-1042
188:corrosion
145:top event
814:Diagrams
588:Archived
509:17 March
503:Archived
424:(2019).
338:(2019).
302:(2018).
200:coatings
196:barriers
184:abrasion
172:outcomes
164:triggers
66:aviation
684:4743998
597:14 July
260:Finance
192:fatigue
168:threats
137:central
76:History
70:finance
32:bow tie
785:
712:
682:
674:
666:
624:
558:
472:
436:
402:
394:
350:
314:
160:causes
68:, and
664:eISSN
591:(PDF)
578:(PDF)
392:eISSN
256:risks
236:(OSH)
140:event
25:is a
783:ISBN
710:ISBN
680:PMID
672:ISSN
622:ISBN
599:2023
556:ISSN
511:2024
470:ISBN
434:ISBN
400:ISSN
348:ISBN
312:ISBN
252:and
210:and
174:and
656:doi
422:ISO
418:IEC
384:doi
336:ISO
332:IEC
805::
781:.
777:.
692:^
678:.
670:.
662:.
652:15
650:.
636:^
620:.
586:.
580:.
527:.
501:.
495:.
484:^
468:.
448:^
432:.
420:;
398:.
390:.
380:88
378:.
362:^
346:.
334:;
310:.
298:;
277:^
190:,
186:,
166:,
162:,
100:,
72:.
64:,
21:A
791:.
762:.
743:.
718:.
686:.
658::
630:.
601:.
562:.
513:.
478:.
442:.
406:.
386::
356:.
320:.
182:(
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.