WorldWideScience

Sample records for risk management computer

  1. Managing the Risks Associated with End-User Computing.

    Science.gov (United States)

    Alavi, Maryam; Weiss, Ira R.

    1986-01-01

    Identifies organizational risks of end-user computing (EUC) associated with different stages of the end-user applications life cycle (analysis, design, implementation). Generic controls are identified that address each of the risks enumerated in a manner that allows EUC management to select those most appropriate to their EUC environment. (5…

  2. Computer-Aided Nodule Assessment and Risk Yield Risk Management of Adenocarcinoma: The Future of Imaging?

    Science.gov (United States)

    Foley, Finbar; Rajagopalan, Srinivasan; Raghunath, Sushravya M; Boland, Jennifer M; Karwoski, Ronald A; Maldonado, Fabien; Bartholmai, Brian J; Peikert, Tobias

    2016-01-01

    Increased clinical use of chest high-resolution computed tomography results in increased identification of lung adenocarcinomas and persistent subsolid opacities. However, these lesions range from very indolent to extremely aggressive tumors. Clinically relevant diagnostic tools to noninvasively risk stratify and guide individualized management of these lesions are lacking. Research efforts investigating semiquantitative measures to decrease interrater and intrarater variability are emerging, and in some cases steps have been taken to automate this process. However, many such methods currently are still suboptimal, require validation and are not yet clinically applicable. The computer-aided nodule assessment and risk yield software application represents a validated tool for the automated, quantitative, and noninvasive tool for risk stratification of adenocarcinoma lung nodules. Computer-aided nodule assessment and risk yield correlates well with consensus histology and postsurgical patient outcomes, and therefore may help to guide individualized patient management, for example, in identification of nodules amenable to radiological surveillance, or in need of adjunctive therapy. Copyright © 2016 Elsevier Inc. All rights reserved.

  3. Towards Cloud Computing SLA Risk Management: Issues and Challenges

    OpenAIRE

    Morin, Jean-Henry; Aubert, Jocelyn; Gateau, Benjamin

    2012-01-01

    Cloud Computing has become mainstream technology offering a commoditized approach to software, platform and infrastructure as a service over the Internet on a global scale. This raises important new security issues beyond traditional perimeter based approaches. This paper attempts to identify these issues and their corresponding challenges, proposing to use risk and Service Level Agreement (SLA) management as the basis for a service level framework to improve governance, risk and compliance i...

  4. Software And Systems Engineering Risk Management

    Science.gov (United States)

    2010-04-01

    RSKM 2004 COSO Enterprise RSKM Framework 2006 ISO/IEC 16085 Risk Management Process 2008 ISO/IEC 12207 Software Lifecycle Processes 2009 ISO/IEC...1 Software And Systems Engineering Risk Management John Walz VP Technical and Conferences Activities, IEEE Computer Society Vice-Chair Planning...Software & Systems Engineering Standards Committee, IEEE Computer Society US TAG to ISO TMB Risk Management Working Group Systems and Software

  5. Computer technologies for industrial risk prevention and emergency management

    International Nuclear Information System (INIS)

    Balduccelli, C.; Bologna, S.; Di Costanzo, G.; Vicoli, G.

    1996-07-01

    This document provides an overview about problems related to the engineering of computer based systems for industrial risk prevention and emergency management. Such systems are rather complex and subject to precise reliability and safety requirements. With the evolution of informatic technologies, such systems are becoming to be the means for building protective barriers for reduction of risk associated with plant operations. For giving more generality to this document, and for not concentrating on only a specific plant, the emergency management systems will be dealt with more details than ones for accident prevention. The document is organized in six chapters. Chapter one is an introduction to the problem and to its state of art, with particular emphasis to the aspects of safety requirements definition. Chapter two is an introduction to the problems related to the emergency management and to the training of operators in charge of this task. Chapter three deals in details the topic of the Training Support Systems, in particular about MUSTER (multi-user system for training and evaluation of environmental emergency response) system. Chapter four deals in details the topic of decision support systems, in particular about ISEM (information technology support for emergency management) system. Chapter five illustrates an application of support to the operators of Civil Protection Department for the management of emergencies in the fields of industrial chemical. Chapter six is about a synthesis of the state of art and the future possibilities, identifying some research and development activities more promising for the future

  6. Computational methods in the pricing and risk management of modern financial derivatives

    Science.gov (United States)

    Deutsch, Hans-Peter

    1999-09-01

    In the last 20 years modern finance has developed into a complex mathematically challenging field. Very complicated risks exist in financial markets which need very advanced methods to measure and/or model them. The financial instruments invented by the market participants to trade these risk, the so called derivatives are usually even more complicated than the risks themselves and also sometimes generate new riks. Topics like random walks, stochastic differential equations, martingale measures, time series analysis, implied correlations, etc. are of common use in the field. This is why more and more people with a science background, such as physicists, mathematicians, or computer scientists, are entering the field of finance. The measurement and management of all theses risks is the key to the continuing success of banks. This talk gives insight into today's common methods of modern market risk management such as variance-covariance, historical simulation, Monte Carlo, “Greek” ratios, etc., including the statistical concepts on which they are based. Derivatives are at the same time the main reason for and the most effective means of conducting risk management. As such, they stand at the beginning and end of risk management. The valuation of derivatives and structured financial instruments is therefore the prerequisite, the condition sine qua non, for all risk management. This talk introduces some of the important valuation methods used in modern derivatives pricing such as present value, Black-Scholes, binomial trees, Monte Carlo, etc. In summary this talk highlights an area outside physics where there is a lot of interesting work to do, especially for physicists. Or as one of our consultants said: The fascinating thing about this job is that Arthur Andersen hired me not ALTHOUGH I am a physicist but BECAUSE I am a physicist.

  7. Information systems for risk management

    OpenAIRE

    Michael S. Gibson

    1997-01-01

    Risk management information systems are designed to overcome the problem of aggregating data across diverse trading units. The design of an information system depends on the risk measurement methodology that a firm chooses. Inherent in the design of both a risk management information system and a risk measurement methodology is a tradeoff between the accuracy of the resulting measures of risk and the burden of computing them. Technical progress will make this tradeoff more favorable over time...

  8. Risk Management Techniques and Practice Workshop Workshop Report

    Energy Technology Data Exchange (ETDEWEB)

    Quinn, T; Zosel, M

    2008-12-02

    At the request of the Department of Energy (DOE) Office of Science (SC), Lawrence Livermore National Laboratory (LLNL) hosted a two-day Risk Management Techniques and Practice (RMTAP) workshop held September 18-19 at the Hotel Nikko in San Francisco. The purpose of the workshop, which was sponsored by the SC/Advanced Scientific Computing Research (ASCR) program and the National Nuclear Security Administration (NNSA)/Advanced Simulation and Computing (ASC) program, was to assess current and emerging techniques, practices, and lessons learned for effectively identifying, understanding, managing, and mitigating the risks associated with acquiring leading-edge computing systems at high-performance computing centers (HPCCs). Representatives from fifteen high-performance computing (HPC) organizations, four HPC vendor partners, and three government agencies attended the workshop. The overall workshop findings were: (1) Standard risk management techniques and tools are in the aggregate applicable to projects at HPCCs and are commonly employed by the HPC community; (2) HPC projects have characteristics that necessitate a tailoring of the standard risk management practices; (3) All HPCC acquisition projects can benefit by employing risk management, but the specific choice of risk management processes and tools is less important to the success of the project; (4) The special relationship between the HPCCs and HPC vendors must be reflected in the risk management strategy; (5) Best practices findings include developing a prioritized risk register with special attention to the top risks, establishing a practice of regular meetings and status updates with the platform partner, supporting regular and open reviews that engage the interests and expertise of a wide range of staff and stakeholders, and documenting and sharing the acquisition/build/deployment experience; and (6) Top risk categories include system scaling issues, request for proposal/contract and acceptance testing, and

  9. ePORT, NASA's Computer Database Program for System Safety Risk Management Oversight (Electronic Project Online Risk Tool)

    Science.gov (United States)

    Johnson, Paul W.

    2008-01-01

    ePORT (electronic Project Online Risk Tool) provides a systematic approach to using an electronic database program to manage a program/project risk management processes. This presentation will briefly cover the standard risk management procedures, then thoroughly cover NASA's Risk Management tool called ePORT. This electronic Project Online Risk Tool (ePORT) is a web-based risk management program that provides a common framework to capture and manage risks, independent of a programs/projects size and budget. It is used to thoroughly cover the risk management paradigm providing standardized evaluation criterion for common management reporting, ePORT improves Product Line, Center and Corporate Management insight, simplifies program/project manager reporting, and maintains an archive of data for historical reference.

  10. Development of a computational system for management of risks in radiosterilization processes of biological tissues

    International Nuclear Information System (INIS)

    Montoya, Cynara Viterbo

    2009-01-01

    Risk management can be understood to be a systematic management which aims to identify record and control the risks of a process. Applying risk management becomes a complex activity, due to the variety of professionals involved. In order to execute risk management the following are requirements of paramount importance: the experience, discernment and judgment of a multidisciplinary team, guided by means of quality tools, so as to provide standardization in the process of investigating the cause and effects of risks and dynamism in obtaining the objective desired, i.e. the reduction and control of the risk. This work aims to develop a computational system of risk management (software) which makes it feasible to diagnose the risks of the processes of radiosterilization of biological tissues. The methodology adopted was action-research, according to which the researcher performs an active role in the establishment of the problems found, in the follow-up and in the evaluation of the actions taken owing to the problems. The scenario of this action-research was the Laboratory of Biological Tissues (LTB) in the Radiation Technology Center IPEN/CNEN-SP - Sao Paulo/Brazil. The software developed was executed in PHP and Flash/MySQL language, the server (hosting), the software is available on the Internet (www.vcrisk.com.br), which the user can access from anywhere by means of the login/access password previously sent by email to the team responsible for the tissue to be analyzed. The software presents friendly navigability whereby the user is directed step-by-step in the process of investigating the risk up to the means of reducing it. The software 'makes' the user comply with the term and present the effectiveness of the actions taken to reduce the risk. Applying this system provided the organization (LTB/CTR/IPEN) with dynamic communication, effective between the members of the multidisciplinary team: a) in decision-making; b) in lessons learned; c) in knowing the new risk

  11. Managing the risk associated with use of contrast media for computed tomography

    Energy Technology Data Exchange (ETDEWEB)

    Stacul, Fulvio [Department of Radiology, University of Trieste, Cattinara Hospital, Strada di Fiume, 447, 34149 Trieste (Italy)]. E-mail: fulvio.stacul@aots.sanita.fvg.it

    2007-05-15

    Contrast agents are widely used in patients undergoing diagnostic and therapeutic imaging procedures. In recent years, there has been a significant increase in the use of iodinated contrast media (CM) due to the growing number of computed tomography (CT) procedures. Although contrast agents are generally well-tolerated, some patient subsets are at an increased risk of complications from CM. Patients at risk include those with a history of adverse reactions to CM, asthma or severe allergies, impaired renal function, older age, dehydration, congestive heart failure, or concurrent use of some drugs. Although the incidence of CM-associated complications cannot be eliminated, the chances of developing severe adverse reactions can be reduced by incorporating a number of management strategies into clinical practice. Patients at risk for acute adverse reactions can undergo pre-medication with corticosteroids, eventually associated with anti-histamines, although opinion is divided whether this prophylaxis should be used with non-ionic CM. Patients who have been identified as at risk for contrast-induced nephropathy (CIN) should be well-hydrated and have nephrotoxic medications withdrawn prior to CM exposure. Contrast dose should be decreased, as the risk of developing CIN is dose-dependent. For patients with pre-existing renal insufficiency, use of low-osmolar or iso-osmolar CM is preferable to use of high-osmolar CM. Simple strategies for preventing the risk of adverse reactions are reviewed.

  12. Managing the risk associated with use of contrast media for computed tomography

    International Nuclear Information System (INIS)

    Stacul, Fulvio

    2007-01-01

    Contrast agents are widely used in patients undergoing diagnostic and therapeutic imaging procedures. In recent years, there has been a significant increase in the use of iodinated contrast media (CM) due to the growing number of computed tomography (CT) procedures. Although contrast agents are generally well-tolerated, some patient subsets are at an increased risk of complications from CM. Patients at risk include those with a history of adverse reactions to CM, asthma or severe allergies, impaired renal function, older age, dehydration, congestive heart failure, or concurrent use of some drugs. Although the incidence of CM-associated complications cannot be eliminated, the chances of developing severe adverse reactions can be reduced by incorporating a number of management strategies into clinical practice. Patients at risk for acute adverse reactions can undergo pre-medication with corticosteroids, eventually associated with anti-histamines, although opinion is divided whether this prophylaxis should be used with non-ionic CM. Patients who have been identified as at risk for contrast-induced nephropathy (CIN) should be well-hydrated and have nephrotoxic medications withdrawn prior to CM exposure. Contrast dose should be decreased, as the risk of developing CIN is dose-dependent. For patients with pre-existing renal insufficiency, use of low-osmolar or iso-osmolar CM is preferable to use of high-osmolar CM. Simple strategies for preventing the risk of adverse reactions are reviewed

  13. Multi-objective reverse logistics model for integrated computer waste management.

    Science.gov (United States)

    Ahluwalia, Poonam Khanijo; Nema, Arvind K

    2006-12-01

    This study aimed to address the issues involved in the planning and design of a computer waste management system in an integrated manner. A decision-support tool is presented for selecting an optimum configuration of computer waste management facilities (segregation, storage, treatment/processing, reuse/recycle and disposal) and allocation of waste to these facilities. The model is based on an integer linear programming method with the objectives of minimizing environmental risk as well as cost. The issue of uncertainty in the estimated waste quantities from multiple sources is addressed using the Monte Carlo simulation technique. An illustrated example of computer waste management in Delhi, India is presented to demonstrate the usefulness of the proposed model and to study tradeoffs between cost and risk. The results of the example problem show that it is possible to reduce the environmental risk significantly by a marginal increase in the available cost. The proposed model can serve as a powerful tool to address the environmental problems associated with exponentially growing quantities of computer waste which are presently being managed using rudimentary methods of reuse, recovery and disposal by various small-scale vendors.

  14. Practical Methods for Information Security Risk Management

    Directory of Open Access Journals (Sweden)

    Cristian AMANCEI

    2011-01-01

    Full Text Available The purpose of this paper is to present some directions to perform the risk man-agement for information security. The article follows to practical methods through question-naire that asses the internal control, and through evaluation based on existing controls as part of vulnerability assessment. The methods presented contains all the key elements that concurs in risk management, through the elements proposed for evaluation questionnaire, list of threats, resource classification and evaluation, correlation between risks and controls and residual risk computation.

  15. Operation, Management, Security and Sustainability for Cloud Computing

    Directory of Open Access Journals (Sweden)

    WESTPHAL, C. B.

    2014-06-01

    Full Text Available This paper presents some scope, context, proposals and solutions related with the following topics: Decision-Theoretic Planning for Cloud Computing; An Architecture for Risk Analysis in Cloud; Risk-based Dynamic Access Control for a Highly Scalable Cloud Federation; Challenges of Operationalizing PACS on Cloud Over Wireless Networks; Environment, Services and Network Management for Green Clouds; Provisioning and Resource Allocation for Green Clouds; and Optimizing Green Clouds through Legacy Network Infrastructure Management.

  16. Volunteered Cloud Computing for Disaster Management

    Science.gov (United States)

    Evans, J. D.; Hao, W.; Chettri, S. R.

    2014-12-01

    Disaster management relies increasingly on interpreting earth observations and running numerical models; which require significant computing capacity - usually on short notice and at irregular intervals. Peak computing demand during event detection, hazard assessment, or incident response may exceed agency budgets; however some of it can be met through volunteered computing, which distributes subtasks to participating computers via the Internet. This approach has enabled large projects in mathematics, basic science, and climate research to harness the slack computing capacity of thousands of desktop computers. This capacity is likely to diminish as desktops give way to battery-powered mobile devices (laptops, smartphones, tablets) in the consumer market; but as cloud computing becomes commonplace, it may offer significant slack capacity -- if its users are given an easy, trustworthy mechanism for participating. Such a "volunteered cloud computing" mechanism would also offer several advantages over traditional volunteered computing: tasks distributed within a cloud have fewer bandwidth limitations; granular billing mechanisms allow small slices of "interstitial" computing at no marginal cost; and virtual storage volumes allow in-depth, reversible machine reconfiguration. Volunteered cloud computing is especially suitable for "embarrassingly parallel" tasks, including ones requiring large data volumes: examples in disaster management include near-real-time image interpretation, pattern / trend detection, or large model ensembles. In the context of a major disaster, we estimate that cloud users (if suitably informed) might volunteer hundreds to thousands of CPU cores across a large provider such as Amazon Web Services. To explore this potential, we are building a volunteered cloud computing platform and targeting it to a disaster management context. Using a lightweight, fault-tolerant network protocol, this platform helps cloud users join parallel computing projects

  17. Computer security engineering management

    International Nuclear Information System (INIS)

    McDonald, G.W.

    1988-01-01

    For best results, computer security should be engineered into a system during its development rather than being appended later on. This paper addresses the implementation of computer security in eight stages through the life cycle of the system; starting with the definition of security policies and ending with continuing support for the security aspects of the system throughout its operational life cycle. Security policy is addressed relative to successive decomposition of security objectives (through policy, standard, and control stages) into system security requirements. This is followed by a discussion of computer security organization and responsibilities. Next the paper directs itself to analysis and management of security-related risks, followed by discussion of design and development of the system itself. Discussion of security test and evaluation preparations, and approval to operate (certification and accreditation), is followed by discussion of computer security training for users is followed by coverage of life cycle support for the security of the system

  18. Risk perception and risk management in cloud computing: results from a case study of Swiss companies

    OpenAIRE

    Brender, Nathalie; Markov, Iliya

    2013-01-01

    In today's economic turmoil, the pay-per-use pricing model of cloud computing, its flexibility and scalability and the potential for better security and availability levels are alluring to both SMEs and large enterprises. However, cloud computing is fraught with security risks which need to be carefully evaluated before any engagement in this area. This article elaborates on the most important risks inherent to the cloud such as information security, regulatory compliance, data location, inve...

  19. Stochastic models in risk theory and management accounting

    NARCIS (Netherlands)

    Brekelmans, R.C.M.

    2000-01-01

    This thesis deals with stochastic models in two fields: risk theory and management accounting. Firstly, two extensions of the classical risk process are analyzed. A method is developed that computes bounds of the probability of ruin for the classical risk rocess extended with a constant interest

  20. Handbook on Decision Making Vol 2 Risk Management in Decision Making

    CERN Document Server

    Lu, Jie; Zhang, Guangquan

    2012-01-01

    This book presents innovative theories, methodologies, and techniques in the field of risk management and decision making. It introduces new research developments and provides a comprehensive image of their potential applications to readers interested in the area. The collection includes: computational intelligence applications in decision making, multi-criteria decision making under risk, risk modelling,forecasting and evaluation, public security and community safety, risk management in supply chain and other business decision making, political risk management and disaster response systems. The book is directed to academic and applied researchers working on risk management, decision making, and management information systems.

  1. Risk management.

    Science.gov (United States)

    Chambers, David W

    2010-01-01

    Every plan contains risk. To proceed without planning some means of managing that risk is to court failure. The basic logic of risk is explained. It consists in identifying a threshold where some corrective action is necessary, the probability of exceeding that threshold, and the attendant cost should the undesired outcome occur. This is the probable cost of failure. Various risk categories in dentistry are identified, including lack of liquidity; poor quality; equipment or procedure failures; employee slips; competitive environments; new regulations; unreliable suppliers, partners, and patients; and threats to one's reputation. It is prudent to make investments in risk management to the extent that the cost of managing the risk is less than the probable loss due to risk failure and when risk management strategies can be matched to type of risk. Four risk management strategies are discussed: insurance, reducing the probability of failure, reducing the costs of failure, and learning. A risk management accounting of the financial meltdown of October 2008 is provided.

  2. Proposal for a security management in cloud computing for health care.

    Science.gov (United States)

    Haufe, Knut; Dzombeta, Srdan; Brandis, Knud

    2014-01-01

    Cloud computing is actually one of the most popular themes of information systems research. Considering the nature of the processed information especially health care organizations need to assess and treat specific risks according to cloud computing in their information security management system. Therefore, in this paper we propose a framework that includes the most important security processes regarding cloud computing in the health care sector. Starting with a framework of general information security management processes derived from standards of the ISO 27000 family the most important information security processes for health care organizations using cloud computing will be identified considering the main risks regarding cloud computing and the type of information processed. The identified processes will help a health care organization using cloud computing to focus on the most important ISMS processes and establish and operate them at an appropriate level of maturity considering limited resources.

  3. Proposal for a Security Management in Cloud Computing for Health Care

    Directory of Open Access Journals (Sweden)

    Knut Haufe

    2014-01-01

    Full Text Available Cloud computing is actually one of the most popular themes of information systems research. Considering the nature of the processed information especially health care organizations need to assess and treat specific risks according to cloud computing in their information security management system. Therefore, in this paper we propose a framework that includes the most important security processes regarding cloud computing in the health care sector. Starting with a framework of general information security management processes derived from standards of the ISO 27000 family the most important information security processes for health care organizations using cloud computing will be identified considering the main risks regarding cloud computing and the type of information processed. The identified processes will help a health care organization using cloud computing to focus on the most important ISMS processes and establish and operate them at an appropriate level of maturity considering limited resources.

  4. Risk in Enterprise Cloud Computing: Re-Evaluated

    Science.gov (United States)

    Funmilayo, Bolonduro, R.

    2016-01-01

    A quantitative study was conducted to get the perspectives of IT experts about risks in enterprise cloud computing. In businesses, these IT experts are often not in positions to prioritize business needs. The business experts commonly known as business managers mostly determine an organization's business needs. Even if an IT expert classified a…

  5. Risk management

    OpenAIRE

    Mcmanus, John

    2009-01-01

    Few projects are completed on time, on budget, and to their original requirement or specifications. Focusing on what project managers need to know about risk in the pursuit of delivering projects, Risk Management covers key components of the risk management process and the software development process, as well as best practices for risk identification, risk planning, and risk analysis. The book examines risk planning, risk analysis responses to risk, the tracking and modelling of risks, intel...

  6. Data security and risk assessment in cloud computing

    Directory of Open Access Journals (Sweden)

    Li Jing

    2018-01-01

    Full Text Available Cloud computing has attracted more and more attention as it reduces the cost of IT infrastructure of organizations. In our country, business Cloud services, such as Alibaba Cloud, Huawei Cloud, QingCloud, UCloud and so on are gaining more and more uses, especially small or median organizations. In the cloud service scenario, the program and data are migrating into cloud, resulting the lack of trust between customers and cloud service providers. However, the recent study on Cloud computing is mainly focused on the service side, while the data security and trust have not been sufficiently studied yet. This paper investigates into the data security issues from data life cycle which includes five steps when an organization uses Cloud computing. A data management framework is given out, including not only the data classification but also the risk management framework. Concretely, the data is divided into two varieties, business and personal information. And then, four classification levels (high, medium, low, normal according to the different extent of the potential adverse effect is introduced. With the help of classification, the administrators can identify the application or data to implement corresponding security controls. At last, the administrators conduct the risk assessment to alleviate the risk of data security. The trust between customers and cloud service providers will be strengthen through this way.

  7. Risks and crises for healthcare providers: the impact of cloud computing.

    Science.gov (United States)

    Glasberg, Ronald; Hartmann, Michael; Draheim, Michael; Tamm, Gerrit; Hessel, Franz

    2014-01-01

    We analyze risks and crises for healthcare providers and discuss the impact of cloud computing in such scenarios. The analysis is conducted in a holistic way, taking into account organizational and human aspects, clinical, IT-related, and utilities-related risks as well as incorporating the view of the overall risk management.

  8. Risks and Crises for Healthcare Providers: The Impact of Cloud Computing

    OpenAIRE

    Glasberg, Ronald; Hartmann, Michael; Draheim, Michael; Tamm, Gerrit; Hessel, Franz

    2014-01-01

    We analyze risks and crises for healthcare providers and discuss the impact of cloud computing in such scenarios. The analysis is conducted in a holistic way, taking into account organizational and human aspects, clinical, IT-related, and utilities-related risks as well as incorporating the view of the overall risk management.

  9. Integrated Geo Hazard Management System in Cloud Computing Technology

    Science.gov (United States)

    Hanifah, M. I. M.; Omar, R. C.; Khalid, N. H. N.; Ismail, A.; Mustapha, I. S.; Baharuddin, I. N. Z.; Roslan, R.; Zalam, W. M. Z.

    2016-11-01

    Geo hazard can result in reducing of environmental health and huge economic losses especially in mountainous area. In order to mitigate geo-hazard effectively, cloud computer technology are introduce for managing geo hazard database. Cloud computing technology and it services capable to provide stakeholder's with geo hazards information in near to real time for an effective environmental management and decision-making. UNITEN Integrated Geo Hazard Management System consist of the network management and operation to monitor geo-hazard disaster especially landslide in our study area at Kelantan River Basin and boundary between Hulu Kelantan and Hulu Terengganu. The system will provide easily manage flexible measuring system with data management operates autonomously and can be controlled by commands to collects and controls remotely by using “cloud” system computing. This paper aims to document the above relationship by identifying the special features and needs associated with effective geohazard database management using “cloud system”. This system later will use as part of the development activities and result in minimizing the frequency of the geo-hazard and risk at that research area.

  10. Project Risk Management

    Science.gov (United States)

    Jr., R. F. Miles

    1995-01-01

    Project risk management is primarily concerned with performance, reliability, cost, and schedule. Environmental risk management is primarily concerned with human health and ecological hazards and likelihoods. This paper discusses project risk management and compares it to environmental risk management, both with respect to goals and implementation. The approach of the Jet Propulsion Laboratory to risk management is presented as an example of a project risk management approach that is an extension to NASA NHB 7120.5: Management of Major System Programs and Projects.

  11. Risks and Crises for Healthcare Providers: The Impact of Cloud Computing

    Directory of Open Access Journals (Sweden)

    Ronald Glasberg

    2014-01-01

    Full Text Available We analyze risks and crises for healthcare providers and discuss the impact of cloud computing in such scenarios. The analysis is conducted in a holistic way, taking into account organizational and human aspects, clinical, IT-related, and utilities-related risks as well as incorporating the view of the overall risk management.

  12. Efficient Computation of Exposure Profiles for Counterparty Credit Risk

    NARCIS (Netherlands)

    de Graaf, C.S.L.; Feng, Q.; Kandhai, D.; Oosterlee, C.W.

    2014-01-01

    Three computational techniques for approximation of counterparty exposure for financial derivatives are presented. The exposure can be used to quantify so-called Credit Valuation Adjustment (CVA) and Potential Future Exposure (PFE), which are of utmost importance for modern risk management in the

  13. Computational Aspects of Dam Risk Analysis: Findings and Challenges

    Directory of Open Access Journals (Sweden)

    Ignacio Escuder-Bueno

    2016-09-01

    Full Text Available In recent years, risk analysis techniques have proved to be a useful tool to inform dam safety management. This paper summarizes the outcomes of three themes related to dam risk analysis discussed in the Benchmark Workshops organized by the International Commission on Large Dams Technical Committee on “Computational Aspects of Analysis and Design of Dams.” In the 2011 Benchmark Workshop, estimation of the probability of failure of a gravity dam for the sliding failure mode was discussed. Next, in 2013, the discussion focused on the computational challenges of the estimation of consequences in dam risk analysis. Finally, in 2015, the probability of sliding and overtopping in an embankment was analyzed. These Benchmark Workshops have allowed a complete review of numerical aspects for dam risk analysis, showing that risk analysis methods are a very useful tool to analyze the risk of dam systems, including downstream consequence assessments and the uncertainty of structural models.

  14. Enterprise risk management

    Energy Technology Data Exchange (ETDEWEB)

    Eaton, C. [Enbridge, Calgary, AB (Canada)

    2015-07-01

    Enterprise risk management (ERM) is a relative new, holistic and strategic approach for managing risks in modern organizations. ERM builds on and extends traditional risk management (RM). Risk is the effect of uncertainty on objectives - positive and/or negative. Risk management is a set of practices used to understand and address risk. ERM is a form of RM that emphasizes risk aggregation and integration. Risk aggregation is combining individual risks into categories ({sup r}olled up{sup )}. risk integration is embedding RM into organizational contexts ({sup b}uilt in{sup )}.

  15. Nuclear fuel cycle risk assessment: survey and computer compilation of risk-related literature

    International Nuclear Information System (INIS)

    Yates, K.R.; Schreiber, A.M.; Rudolph, A.W.

    1982-10-01

    The US Nuclear Regulatory Commission has initiated the Fuel Cycle Risk Assessment Program to provide risk assessment methods for assistance in the regulatory process for nuclear fuel cycle facilities other than reactors. Both the once-through cycle and plutonium recycle are being considered. A previous report generated by this program defines and describes fuel cycle facilities, or elements, considered in the program. This report, the second from the program, describes the survey and computer compilation of fuel cycle risk-related literature. Sources of available information on the design, safety, and risk associated with the defined set of fuel cycle elements were searched and documents obtained were catalogued and characterized with respect to fuel cycle elements and specific risk/safety information. Both US and foreign surveys were conducted. Battelle's computer-based BASIS information management system was used to facilitate the establishment of the literature compilation. A complete listing of the literature compilation and several useful indexes are included. Future updates of the literature compilation will be published periodically. 760 annotated citations are included

  16. NASA's Risk Management System

    Science.gov (United States)

    Perera, Jeevan S.

    2011-01-01

    Leadership is key to success. Phased-approach for implementation of risk management is necessary. Risk management system will be simple, accessible and promote communication of information to all relevant stakeholders for optimal resource allocation and risk mitigation. Risk management should be used by all team members to manage risks -- risk office personnel. Each group is assigned Risk Integrators who are facilitators for effective risk management. Risks will be managed at the lowest-level feasible, elevate only those risks that require coordination or management from above. Risk reporting and communication is an essential element of risk management and will combine both qualitative and quantitative elements. Risk informed decision making should be introduced to all levels of management. Provide necessary checks and balances to insure that risks are caught/identified and dealt with in a timely manner. Many supporting tools, processes & training must be deployed for effective risk management implementation. Process improvement must be included in the risk processes.

  17. NASA's Risk Management System

    Science.gov (United States)

    Perera, Jeevan S.

    2013-01-01

    Phased-approach for implementation of risk management is necessary. Risk management system will be simple, accessible and promote communication of information to all relevant stakeholders for optimal resource allocation and risk mitigation. Risk management should be used by all team members to manage risks - not just risk office personnel. Each group/department is assigned Risk Integrators who are facilitators for effective risk management. Risks will be managed at the lowest-level feasible, elevate only those risks that require coordination or management from above. Risk informed decision making should be introduced to all levels of management. ? Provide necessary checks and balances to insure that risks are caught/identified and dealt with in a timely manner. Many supporting tools, processes & training must be deployed for effective risk management implementation. Process improvement must be included in the risk processes.

  18. Integrating Security Risk Management into Business Process Management for the Cloud

    OpenAIRE

    Goettelmann , Elio; Mayer , Nicolas; Godart , Claude

    2014-01-01

    International audience; Security issues are still preventing wider adoption of cloud computing, especially for businesses which are handling sensitive information. Indeed, by outsourcing its information system (IS), a company can lose control over its infrastructure, its software or even its data. Therefore, new methods and tools need to be defined to respond to this challenge. In this paper we propose to integrate Security Risk Management approaches into Business Process Management to effect...

  19. Guidelines for developing NASA (National Aeronautics and Space Administration) ADP security risk management plans

    Science.gov (United States)

    Tompkins, F. G.

    1983-01-01

    This report presents guidance to NASA Computer security officials for developing ADP security risk management plans. The six components of the risk management process are identified and discussed. Guidance is presented on how to manage security risks that have been identified during a risk analysis performed at a data processing facility or during the security evaluation of an application system.

  20. Brief: Managing computing technology

    International Nuclear Information System (INIS)

    Startzman, R.A.

    1994-01-01

    While computing is applied widely in the production segment of the petroleum industry, its effective application is the primary goal of computing management. Computing technology has changed significantly since the 1950's, when computers first began to influence petroleum technology. The ability to accomplish traditional tasks faster and more economically probably is the most important effect that computing has had on the industry. While speed and lower cost are important, are they enough? Can computing change the basic functions of the industry? When new computing technology is introduced improperly, it can clash with traditional petroleum technology. This paper examines the role of management in merging these technologies

  1. Automated Risk Control in Medical Imaging Equipment Management Using Cloud Application

    Directory of Open Access Journals (Sweden)

    Sally M. Ghanem

    2018-01-01

    Full Text Available Medical imaging equipment (MIE is the baseline of providing patient diagnosis in healthcare facilities. However, that type of equipment poses high risk for patients, operators, and environment in terms of technology and application. Considering risk management in MIE management is rarely covered in literature. The study proposes a methodology that controls risks associated with MIE management. The methodology is based on proposing a set of key performance indicators (KPIs that lead to identify a set of undesired events (UDEs, and through a risk matrix, a risk level is evaluated. By using cloud computing software, risks could be controlled to be manageable. The methodology was verified by using a data set of 204 pieces of MIE along 104 hospitals, which belong to Egyptian Ministry of Health. Results point to appropriateness of proposed KPIs and UDEs in risk evaluation and control. Thus, the study reveals that optimizing risks taking into account the costs has an impact on risk control of MIE management.

  2. [Global risk management].

    Science.gov (United States)

    Sghaier, W; Hergon, E; Desroches, A

    2015-08-01

    Risk management is a fundamental component of any successful company, whether it is in economic, societal or environmental aspect. Risk management is an especially important activity for companies that optimal security challenge of products and services is great. This is the case especially for the health sector institutions. Risk management is therefore a decision support tool and a means to ensure the sustainability of an organization. In this context, what methods and approaches implemented to manage the risks? Through this state of the art, we are interested in the concept of risk and risk management processes. Then we focus on the different methods of risk management and the criteria for choosing among these methods. Finally we highlight the need to supplement these methods by a systemic and global approach including through risk assessment by the audits. Copyright © 2015 Elsevier Masson SAS. All rights reserved.

  3. Virtual Enterprise Risk Management Using Artificial Intelligence

    Directory of Open Access Journals (Sweden)

    Hanning Chen

    2010-01-01

    Full Text Available Virtual enterprise (VE has to manage its risk effectively in order to guarantee the profit. However, restricting the risk in a VE to the acceptable level is considered difficult due to the agility and diversity of its distributed characteristics. First, in this paper, an optimization model for VE risk management based on distributed decision making model is introduced. This optimization model has two levels, namely, the top model and the base model, which describe the decision processes of the owner and the partners of the VE, respectively. In order to solve the proposed model effectively, this work then applies two powerful artificial intelligence optimization techniques known as evolutionary algorithms (EA and swarm intelligence (SI. Experiments present comparative studies on the VE risk management problem for one EA and three state-of-the-art SI algorithms. All of the algorithms are evaluated against a test scenario, in which the VE is constructed by one owner and different partners. The simulation results show that the PS2O algorithm, which is a recently developed SI paradigm simulating symbiotic coevolution behavior in nature, obtains the superior solution for VE risk management problem than the other algorithms in terms of optimization accuracy and computation robustness.

  4. NGNP Risk Management Database: A Model for Managing Risk

    International Nuclear Information System (INIS)

    Collins, John

    2009-01-01

    To facilitate the implementation of the Risk Management Plan, the Next Generation Nuclear Plant (NGNP) Project has developed and employed an analytical software tool called the NGNP Risk Management System (RMS). A relational database developed in Microsoft(reg s ign) Access, the RMS provides conventional database utility including data maintenance, archiving, configuration control, and query ability. Additionally, the tool's design provides a number of unique capabilities specifically designed to facilitate the development and execution of activities outlined in the Risk Management Plan. Specifically, the RMS provides the capability to establish the risk baseline, document and analyze the risk reduction plan, track the current risk reduction status, organize risks by reference configuration system, subsystem, and component (SSC) and Area, and increase the level of NGNP decision making.

  5. NGNP Risk Management Database: A Model for Managing Risk

    Energy Technology Data Exchange (ETDEWEB)

    John Collins

    2009-09-01

    To facilitate the implementation of the Risk Management Plan, the Next Generation Nuclear Plant (NGNP) Project has developed and employed an analytical software tool called the NGNP Risk Management System (RMS). A relational database developed in Microsoft® Access, the RMS provides conventional database utility including data maintenance, archiving, configuration control, and query ability. Additionally, the tool’s design provides a number of unique capabilities specifically designed to facilitate the development and execution of activities outlined in the Risk Management Plan. Specifically, the RMS provides the capability to establish the risk baseline, document and analyze the risk reduction plan, track the current risk reduction status, organize risks by reference configuration system, subsystem, and component (SSC) and Area, and increase the level of NGNP decision making.

  6. The management object in risk management approaches

    OpenAIRE

    Christiansen, Ulrik

    2013-01-01

    Using a systematic review of the last 55 years of research within risk management this paper explores how risk management as a management technology (methodologies, tools and frameworks to mitigate or manage risks) singles out risks as an object for management in order to make action possible. The paper synthesise by developing a framework of how different views on risk management enable and constrain the knowledge about risk and thus frame the possibilities to measure, analyse an...

  7. The Management Object in Risk Management Approaches

    DEFF Research Database (Denmark)

    Christiansen, Ulrik

    Using a systematic review of the last 55 years of research within risk management this paper explores how risk management as a management technology (methodologies, tools and frameworks to mitigate or manage risks) singles out risks as an object for management in order to make action possible....... The paper synthesise by developing a framework of how different views on risk management enable and constrain the knowledge about risk and thus frame the possibilities to measure, analyse and calculate uncertainty and risk. Inspired by social studies of finance and accounting, the paper finally develops...... three propositions that illustrate how the framing of risk establishes a boundary for how managers might understand value creation and the possible future and how this impacts the possible responses to risk....

  8. Cloud computing in pharmaceutical R&D: business risks and mitigations.

    Science.gov (United States)

    Geiger, Karl

    2010-05-01

    Cloud computing provides information processing power and business services, delivering these services over the Internet from centrally hosted locations. Major technology corporations aim to supply these services to every sector of the economy. Deploying business processes 'in the cloud' requires special attention to the regulatory and business risks assumed when running on both hardware and software that are outside the direct control of a company. The identification of risks at the correct service level allows a good mitigation strategy to be selected. The pharmaceutical industry can take advantage of existing risk management strategies that have already been tested in the finance and electronic commerce sectors. In this review, the business risks associated with the use of cloud computing are discussed, and mitigations achieved through knowledge from securing services for electronic commerce and from good IT practice are highlighted.

  9. Agile risk management

    CERN Document Server

    Moran, Alan

    2014-01-01

    This work is the definitive guide for IT managers and agile practitioners. It elucidates the principles of agile risk management and how these relate to individual projects. Explained in clear and concise terms, this synthesis of project risk management and agile techniques is illustrated using the major methodologies such as XP, Scrum and DSDM.Although the agile community frequently cites risk management, research suggests that risk is often narrowly defined and, at best, implicitly treated, which in turn leads to an inability to make informed decisions concerning risk and reward and a poor u

  10. Fundamentals of risk management understanding, evaluating and implementing effective risk management

    CERN Document Server

    Hopkin, Paul

    2012-01-01

    Now more than ever, organizations must plan, response and recognize all forms of risks that they face. "Fundamentals of Risk Management", now in its second edition, provides a comprehensive introduction to the subject of commercial and business risk for anyone studying for a career in risk as well as a broad range of risk professionals. It examines the key components of risk management and its application with examples to demonstrate its benefit to organisations in the public and private sector. The second edition has been completely updated to take into account the greater influence of ISO 3100, the emergence of Governance Risk and Compliance (GRC) and the wide use of the bowtie method to illustrate risk management. In addition, there is now a chapter on the skills and competencies required by an effective risk manager.

  11. Rethinking risk management

    International Nuclear Information System (INIS)

    Kloman, H.F.

    1992-01-01

    The purpose of this paper is to bring together the ideas of those who currently practice the many different forms of risk management on a global basis. These forms include guidance of public policy on macro risks, risk financing and insurance for many larger commercial organizations, managing credit, currency and interest rate risks for financial institutions, plus other extensions of risk management including security, quality control, and quality assurance in a health-care environment

  12. Knowledge management in support of enterprise risk management

    OpenAIRE

    Rodriguez, Eduardo; Edwards, John S.

    2014-01-01

    Risk management and knowledge management have so far been studied almost independently. The evolution of risk management to the holistic view of Enterprise Risk Management requires the destruction of barriers between organizational silos and the exchange and application of knowledge from different risk management areas. However, knowledge management has received little or no attention in risk management. This paper examines possible relationships between knowledge management constructs relate...

  13. Implications of Fuzziness for the Practical Management of High-Stakes Risks

    Directory of Open Access Journals (Sweden)

    Mark Jablonowski

    2010-04-01

    Full Text Available High-stakes (dangerous, catastrophic risks take on a wider profile as progress unfolds. What are the impacts of technological and social change on the risk landscape? Due to the complexities and dynamics involved, we can only answer these questions approximately. By using the concept of fuzziness, we can formalize our imprecision about high-stakes risk, and therefore place their management on a stronger footing. We review here the impacts of fuzziness, i.e., knowledge imperfection, on high-stakes risk management, including its implementation via computationally intelligent decision aids.

  14. Cloud computing assessing the risks

    CERN Document Server

    Carstensen, Jared; Golden, Bernard

    2012-01-01

    Cloud Computing: Assessing the risks answers these questions and many more. Using jargon-free language and relevant examples, analogies and diagrams, it is an up-to-date, clear and comprehensive guide the security, governance, risk, and compliance elements of Cloud Computing.

  15. Risk management overview

    International Nuclear Information System (INIS)

    McGovern, S.

    1995-01-01

    Launching of the first natural gas contract by the New York Mercantile Exchange (NYMEX) in April 1990 was a huge success which allowed natural gas to surpass crude oil as the most successful launch of any commodity contract. Despite this unprecedented initial success it must be kept in mind that in a competitive marketplace there are risks of many kinds (market risks, price risks, basis risks, currency risks and timing risks), that parties must deal with in everyday operations. The concept of risk management was defined, techniques and issues in risk management were explained, a glossary of fully explained industry terms, and basic financial tools most often used in risk management, were provided. 11 figs

  16. RAFT: a computer program for fault tree risk calculations

    International Nuclear Information System (INIS)

    Seybold, G.D.

    1977-11-01

    A description and user instructions are presented for RAFT, a FORTRAN computer code for calculation of a risk measure for fault tree cut sets. RAFT calculates release quantities and a risk measure based on the product of probability and release quantity for cut sets of fault trees modeling the accidental release of radioactive material from a nuclear fuel cycle facility. Cut sets and their probabilities are supplied as input to RAFT from an external fault tree analysis code. Using the total inventory available of radioactive material, along with release fractions for each event in a cut set, the release terms are calculated for each cut set. Each release term is multiplied by the cut set probability to yield the cut set risk measure. RAFT orders the dominant cut sets on the risk measure. The total risk measure of processed cut sets and their fractional contributions are supplied as output. Input options are available to eliminate redundant cut sets, apply threshold values on cut set probability and risk, and control the total number of cut sets output. Hash addressing is used to remove redundant cut sets from the analysis. Computer hardware and software restrictions are given along with a sample problem and cross-reference table of the code. Except for the use of file management utilities, RAFT is written exclusively in FORTRAN language and is operational on a Control Data, CYBER 74-18--series computer system. 4 figures

  17. Computer-Aided Facilities Management Systems (CAFM).

    Science.gov (United States)

    Cyros, Kreon L.

    Computer-aided facilities management (CAFM) refers to a collection of software used with increasing frequency by facilities managers. The six major CAFM components are discussed with respect to their usefulness and popularity in facilities management applications: (1) computer-aided design; (2) computer-aided engineering; (3) decision support…

  18. Optimal Bi-Objective Redundancy Allocation for Systems Reliability and Risk Management

    DEFF Research Database (Denmark)

    Govindan, Kannan; Jafarian, Ahmad; Azbari, Mostafa E.

    2016-01-01

    In the big data era, systems reliability is critical to effective systems risk management. In this paper, a novel multiobjective approach, with hybridization of a known algorithm called NSGA-II and an adaptive population-based simulated annealing (APBSA) method is developed to solve the systems...... of domination; and 4) data envelopment analysis. The computational studies have shown that the proposed algorithm is an effective approach for systems reliability and risk management....

  19. Management Needs for Computer Support.

    Science.gov (United States)

    Irby, Alice J.

    University management has many and varied needs for effective computer services in support of their processing and information functions. The challenge for the computer center managers is to better understand these needs and assist in the development of effective and timely solutions. Management needs can range from accounting and payroll to…

  20. Integrating emerging earth science technologies into disaster risk management: an enterprise architecture approach

    Science.gov (United States)

    Evans, J. D.; Hao, W.; Chettri, S. R.

    2014-12-01

    Disaster risk management has grown to rely on earth observations, multi-source data analysis, numerical modeling, and interagency information sharing. The practice and outcomes of disaster risk management will likely undergo further change as several emerging earth science technologies come of age: mobile devices; location-based services; ubiquitous sensors; drones; small satellites; satellite direct readout; Big Data analytics; cloud computing; Web services for predictive modeling, semantic reconciliation, and collaboration; and many others. Integrating these new technologies well requires developing and adapting them to meet current needs; but also rethinking current practice to draw on new capabilities to reach additional objectives. This requires a holistic view of the disaster risk management enterprise and of the analytical or operational capabilities afforded by these technologies. One helpful tool for this assessment, the GEOSS Architecture for the Use of Remote Sensing Products in Disaster Management and Risk Assessment (Evans & Moe, 2013), considers all phases of the disaster risk management lifecycle for a comprehensive set of natural hazard types, and outlines common clusters of activities and their use of information and computation resources. We are using these architectural views, together with insights from current practice, to highlight effective, interrelated roles for emerging earth science technologies in disaster risk management. These roles may be helpful in creating roadmaps for research and development investment at national and international levels.

  1. Project risk management: A review of an institutional project life cycle

    Directory of Open Access Journals (Sweden)

    Wanjiru Gachie

    2017-11-01

    Full Text Available This article is a desktop analysis of project risk management involving a project management institutional restructuring. The pragmatic nature of this research allows for the literature review and the document analysis to be integrated and presented as both a descriptive and analytical research. The analysis demonstrates that the project committee did not proactively manage project risk. The restructuring was a change management project, entailing the implementation of many organisational changes, such as restructuring, lay-off of some part of the administrative workforce, adoption of new technology, provision of new approaches to well-established procedures, and implementation of new performance initiative, the process which should have been managed with an effective integrated risk strategy and plan. Analysis of the restructuring project risk management exhibits little evidence of a systematic (computer based or manual record that should have provided policies, procedures, and structures for managing risk. The article concludes that the restructuring risk process was inadequate and it could not have ensured a successful project. An analysis of the restructuring project risk monitoring and control exhibits a reactive rather than proactive application of risk management procedures. The analysis further indicates that the committee failed to make use of the various project risk management processes, standards, and guidelines. Based on the conclusions, the article recommends that project risk planning, strategy, control, and monitoring should be put in place for future institutional projects. The project management team should also put in place procedures for primary stakeholders engagements, identify and address their nature of interest and power in future risk management projects

  2. Investigation of risk management auditing

    International Nuclear Information System (INIS)

    Cao Lu

    2012-01-01

    2004, COSO published 'Enterprise Risk Management Framework', 2009, SASAC issued the 'central enterprise-wide risk management guidelines' to promote risk management within the formal state-owned enterprises in medium and large. Nuclear Group, which risk management in all branches to carry out the project homeopathic, and A Ⅱ will carry out risk management program as the first unit has accumulated more experience. This article from the perspective of internal control, based on the company's risk management practices carried out to try for the nuclear power enterprise risk management audit to describe and propose new ideas. Which expounds the significance of risk management, audit, risk management audit of the ways and means, for practical application of risk management audit of a representative summary of the issues and the ways and means to solve the problem of forward-looking recommendations. (authors)

  3. RISK MANAGEMENT: AN INTEGRATED APPROACH TO RISK MANAGEMENT AND ASSESSMENT

    Directory of Open Access Journals (Sweden)

    Szabo Alina

    2012-12-01

    Full Text Available Purpose: The objective of this paper is to offer an overview over risk management cycle by focusing on prioritization and treatment, in order to ensure an integrated approach to risk management and assessment, and establish the ‘top 8-12’ risks report within the organization. The interface with Internal Audit is ensured by the implementation of the scoring method to prioritize risks collected from previous generated risk report. Methodology/approach: Using evidence from other research in the area and the professional expertise, this article outlines an integrated approach to risk assessment and risk management reporting processes, by separating the risk in two main categories: strategic and operational risks. The focus is on risk prioritization and scoring; the final output will comprise a mix of strategic and operational (‘top 8-12’ risks, which should be used to establish the annual Internal Audit plan. Originality/value: By using an integrated approach to risk assessment and risk management will eliminate the need for a separate Internal Audit risk assessment over prevailing risks. It will reduce the level of risk assessment overlap by different functions (Tax, Treasury, Information System over the same risk categories as a single methodology, is used and will align timings of risk assessment exercises. The risk prioritization by usage of risk and control scoring criteria highlights the combination between financial and non-financial impact criteria allowing risks that do not naturally lend themselves to a financial amount to be also assessed consistently. It is emphasized the usage of score method to prioritize the risks included in the annual audit plan in order to increase accuracy and timelines.

  4. Continuous Risk Management: An Overview

    Science.gov (United States)

    Rosenberg, Linda; Hammer, Theodore F.

    1999-01-01

    Software risk management is important because it helps avoid disasters, rework, and overkill, but more importantly because it stimulates win-win situations. The objectives of software risk management are to identify, address, and eliminate software risk items before they become threats to success or major sources of rework. In general, good project managers are also good managers of risk. It makes good business sense for all software development projects to incorporate risk management as part of project management. The Software Assurance Technology Center (SATC) at NASA GSFC has been tasked with the responsibility for developing and teaching a systems level course for risk management that provides information on how to implement risk management. The course was developed in conjunction with the Software Engineering Institute at Carnegie Mellon University, then tailored to the NASA systems community. This is an introductory tutorial to continuous risk management based on this course. The rational for continuous risk management and how it is incorporated into project management are discussed. The risk management structure of six functions is discussed in sufficient depth for managers to understand what is involved in risk management and how it is implemented. These functions include: (1) Identify the risks in a specific format; (2) Analyze the risk probability, impact/severity, and timeframe; (3) Plan the approach; (4) Track the risk through data compilation and analysis; (5) Control and monitor the risk; (6) Communicate and document the process and decisions.

  5. Exploring the Key Risk Factors for Application of Cloud Computing in Auditing

    Directory of Open Access Journals (Sweden)

    Kuang-Hua Hu

    2016-08-01

    Full Text Available In the cloud computing information technology environment, cloud computing has some advantages such as lower cost, immediate access to hardware resources, lower IT barriers to innovation, higher scalability, etc., but for the financial audit information flow and processing in the cloud system, CPA (Certified Public Accountant firms need special considerations, for example: system problems, information security and other related issues. Auditing cloud computing applications is the future trend in the CPA firms, given this issue is an important factor for them and very few studies have been conducted to investigate this issue; hence this study seeks to explore the key risk factors for the cloud computing and audit considerations. The dimensions/perspectives of the application of cloud computing audit considerations are huge and cover many criteria/factors. These risk factors are becoming increasingly complex, and interdependent. If the dimensions could be established, the mutually influential relations of the dimensions and criteria determined, and the current execution performance established; a prioritized improvement strategy designed could be constructed to use as a reference for CPA firm management decision making; as well as provide CPA firms with a reference for build auditing cloud computing systems. Empirical results show that key risk factors to consider when using cloud computing in auditing are, in order of priority for improvement: Operations (D, Automating user provisioning (C, Technology Risk (B and Protection system (A.

  6. Agricultural risk management

    DEFF Research Database (Denmark)

    Lund, Mogens; Oksen, Arne; Larsen, Torben U.

    2005-01-01

    A new model for risk management in agriculture is described in the paper. The risk model is constructed as a context dependent process, which includes four main phases. The model is aimed at agricultural advisors, who wish to facilitate and disseminate risk management to farmers. It is developed...... and tested by an action research approach in an attempt to make risk management more applicable on family farms. Our obtained experiences indicate that farmers don’t apply probabilistic thinking and other concepts according to formal decision theory....

  7. Security Risks: Management and Mitigation in the Software Life Cycle

    Science.gov (United States)

    Gilliam, David P.

    2004-01-01

    A formal approach to managing and mitigating security risks in the software life cycle is requisite to developing software that has a higher degree of assurance that it is free of security defects which pose risk to the computing environment and the organization. Due to its criticality, security should be integrated as a formal approach in the software life cycle. Both a software security checklist and assessment tools should be incorporated into this life cycle process and integrated with a security risk assessment and mitigation tool. The current research at JPL addresses these areas through the development of a Sotfware Security Assessment Instrument (SSAI) and integrating it with a Defect Detection and Prevention (DDP) risk management tool.

  8. RISK MANAGEMENT: AN INTEGRATED APPROACH TO RISK MANAGEMENT AND ASSESSMENT

    OpenAIRE

    Szabo Alina

    2012-01-01

    Purpose: The objective of this paper is to offer an overview over risk management cycle by focusing on prioritization and treatment, in order to ensure an integrated approach to risk management and assessment, and establish the ‘top 8-12’ risks report within the organization. The interface with Internal Audit is ensured by the implementation of the scoring method to prioritize risks collected from previous generated risk report. Methodology/approach: Using evidence from other research in ...

  9. Commodity risk management

    Directory of Open Access Journals (Sweden)

    Hilary Till

    2016-09-01

    Full Text Available This article discusses the practical issues involved in applying a disciplined risk management methodology to commodity futures trading. Accordingly, the paper shows how to apply methodologies derived from both conventional asset management and hedge fund management to futures trading. The article also discusses some of the risk management issues that are unique to leveraged futures trading.

  10. Internal Audit and Risk Management

    OpenAIRE

    Constantin Nicolae Vasile; Alexandru Georgiana

    2011-01-01

    Internal audit and risk management have the same goal: the control of risk. There are various roles for the internal audit in respect of risk management. The main limitations of internal audit in respect of risk management regards assuming risk management tasks. One of the main issues regarding risk management is to make sure that the key risks are taken into consideration and that the management and the board of the organization take action as needed. Internal audit could give advice to mana...

  11. Protection planning and risk management at Lawrence Livermore National Laboratory

    International Nuclear Information System (INIS)

    Hunt, J.S.; Altman, W.D.; Hockert, J.W.

    1988-01-01

    Effective safeguards and security management begins with comprehensive strategic planning that synthesizes protection objectives, threat information, existing protection capabilities, consequences of protection failure, and the costs and impacts of safeguards changes into cost effective protection strategies that adequately address credible threats. Lawrence Livermore National Laboratory (LLNL) has developed a structured risk management approach to safeguards and security planning that is designed to lead to protection strategies that are cost effective, meet the intent of Department of Energy (DOE) orders, balance protection needs with programmatic priorities, and acknowledge a level of residual risks that is not cost effective to eliminate. This risk management approach to safeguards decision making was used to develop the first DOE-approved Master Safeguards and Security Agreement (MSSA) that addresses all security interests at a major facility including: special nuclear material, classified information and materials, computer and communication security, and other DOE property. This risk management approach also provides the strategic basis for day-to-day management of the LLNL security program as well as the integration of safeguards program upgrades

  12. Hog Producers' Risk Management Attitudes and Desire for Additional Risk Management Education

    OpenAIRE

    Patrick, George F.; Peiter, Amy J.; Knight, Thomas O.; Coble, Keith H.; Baquet, Alan E.

    2007-01-01

    Hog producers in Indiana and Nebraska were surveyed about sources of risk, effectiveness of risk management strategies, and prior participation in and desire for additional risk management education. Ownership of hogs by the producer, size of the operation, and age did have significant effects on ratings of both sources of risk and effectiveness of risk management strategies. Probit analysis found age, prior attendance, knowledge and prior use of the tool, level of integration, and concern ab...

  13. Cloud Computing Services: Benefits, Risks and Intellectual Property Issues

    Directory of Open Access Journals (Sweden)

    IONELA BĂLŢĂTESCU

    2014-05-01

    Full Text Available Major software players of the global market, such as Google, Amazon and Microsoft are developing cloud computing solutions, providing cloud services on demand: Infrastructure as a Service (IaaS, Platform as a Service (PaaS and Software as a service (SaaS. In software industry and also in ICT services market, cloud computing is playing an increasingly important role. Moreover, the expansion of cloud services indirectly contributed to the development and improvement of other types of services on the market – financial and accounting services, human resources services, educational services etc. – in terms of quality and affordability. Given the fact that cloud computing applications proved to be more affordable for small and medium enterprises (SME, an increasing number of companies in almost all the fields of activity have chosen cloud based solutions, such as Enterprise Resource Management (ERP software and Customer Relationship Management (CRM software. However, cloud computing services involve also some risks concerning privacy, security of data and lack of interoperability between cloud platforms. Patent strategy of certain proprietary software companies leaded to a veritable “patent war” and “patent arm race” endangering the process of standardization in software industry, especially in cloud computing. Intellectual property (IP legislation and court ruling in patent litigations is likely to have a significant impact on the development of cloud computing industry and cloud services.

  14. Certification and risk management

    International Nuclear Information System (INIS)

    Villanueva Fernandez, M.

    2015-01-01

    Nowadays more organizations are increasingly aware of the importance of properly managing the uncertainty of its activities and build competitive advantages through the identification, assessment and management of risks that they face. Risk management is also an aspect of great importance within the new version of ISO fact it is one of the most innovative and also the most laborious, because an appropriate risk management achieves expected results and customer satisfaction. In conclusion, risk management is a new field of business and can be considered a cross-cutting component for other relevant factors of organizational change management. (Author)

  15. Risk management in Takaful

    OpenAIRE

    Akhter, Waheed

    2010-01-01

    Risk management is of vital importance in Islam and Takāful provides a way to manage risks in business according to Sharī’ah principles. This research paper attempts to identify various types of risks involved in Takāful business that affect operational and investment functions of Takāful operators across the globe. It lays down criteria for Takāful operator to manage those risks effectively. However, Takāful operators often face difficulty in managing market and credit risks as Sharī’ah comp...

  16. Communicating Risk to Program Managers

    Science.gov (United States)

    Shivers, C. Herbert

    2005-01-01

    Program Managers (PM) can protect program resources and improve chances of success by anticipating, understanding and managing risks. Understanding the range of potential risks helps one to avoid or manage the risks. A PM must choose which risks to accept to reduce fire fighting, must meet the expectations of stakeholders consistently, and avoid falling into costly "black holes" that may open. A good risk management process provides the PM more confidence to seize opportunities save money, meet schedule, even improve relationships with people important to the program. Evidence of managing risk and sound internal controls can mean better support from superiors for the program by building a trust and reputation from being on top of issues. Risk managers have an obligation to provide the PM with the best information possible to allow the benefits to be realized (Small Business Consortium, 2004). The Institute for Chartered Accountants in England and Wales sees very important benefits for companies in providing better information about what they do to assess and manage key business risks. Such information will: a) provide practical forward-looking information; b) reduce the cost of capital; c) encourage better risk management; and d) improve accountability for stewardship, investor protection and the usefulness of financial reporting. We are particularly convinced that enhanced risk reporting will help listed companies obtain capital at the lowest possible cost (The Institute of Chartered Accountants in England &Wales, June 2002). Risk managers can take a significant role in quantifying the success of their department and communicating those figures to executive (program) management levels while pushing for a broader risk management role. Overall, risk managers must show that risk management work matters in the most crucial place-the bottom line- as they prove risk management can be a profit center (Sullivan, 2004).

  17. Governmental management of chemical risk

    International Nuclear Information System (INIS)

    Zimmerman, R.

    1990-01-01

    This book is organized under the following headings: risk management in the government context; legal and regulatory decrees and directives for managing chemical risk; incentive-based approaches for regulating risk; risk management in the federal system; and traditional approaches and new initiatives for managing chemical risk

  18. Managing the risks of risk management on large fires

    Science.gov (United States)

    Donald G. MacGregor; Armando González-Cabán

    2013-01-01

    Large fires pose risks to a number of important values, including the ecology, property and the lives of incident responders. A relatively unstudied aspect of fire management is the risks to which incident managers are exposed due to organizational and sociopolitical factors that put them in a position of, for example, potential liability or degradation of their image...

  19. Risk management in customs control

    OpenAIRE

    Drobot, Elena; Klevleeva, Aziza

    2016-01-01

    The particularities of risk-management system implementation within customs control are discussed in the article. The authors single out the elements of risk-management system, evaluate effectiveness of risk-management in customs control. The main reasons for non-implementation of risk-management system in customs control are described, as well. Particular attention is paid to the benefits of customs risk management.

  20. Improving operational safety management through probabilistic safety assessment on personal computers

    International Nuclear Information System (INIS)

    1988-10-01

    The Technical Committee Meeting considered the current effort in the implementation and use of PSA information for day-to-day operational safety management on Personal Computers. Due to the very recent development of the necessary hardware and software for Personal Computers, the application of PSA information for day-to-day operational safety management on PCs is essentially still in a pioneering stage. There is at present only one such system for end users existing, the PRISIM (Plant Risk Status Information Management) program for which a limited practical application experience is available. Others are still in the development stage. The main aim of the Technical Committee Meeting was to discuss the present status of PSA based systems for operational safety management support on small computers, to consider practical aspects when implementing these systems into a nuclear installation and to address problems related to the further work in the area. A separate abstract was prepared for the summary of the Technical Committee Meeting and for the 8 papers presented by the participants. Refs, figs and tabs

  1. The role of CFD computer analyses in hydrogen safety management

    International Nuclear Information System (INIS)

    Komen, E.M.J; Visser, D.C; Roelofs, F.; Te Lintelo, J.G.T

    2014-01-01

    The risks of hydrogen release and combustion during a severe accident in a light water reactor have attracted considerable attention after the Fukushima accident in Japan. Reliable computer analyses are needed for the optimal design of hydrogen mitigation systems, like e.g. passive autocatalytic recombiners (PARs), and for the assessment of the associated residual risk of hydrogen combustion. Traditionally, so-called Lumped Parameter (LP) computer codes are being used for these purposes. In the last decade, significant progress has been made in the development, validation, and application of more detailed, three-dimensional Computational Fluid Dynamics (CFD) simulations for hydrogen safety analyses. The objective of the current paper is to address the following questions: - When are CFD computer analyses needed complementary to the traditional LP code analyses for hydrogen safety management? - What is the validation status of the CFD computer code for hydrogen distribution, mitigation, and combustion analyses? - Can CFD computer analyses nowadays be executed in practical and reliable way for full scale containments? The validation status and reliability of CFD code simulations will be illustrated by validation analyses performed for experiments executed in the PANDA, THAI, and ENACCEF facilities. (authors)

  2. Financial Risk Management

    OpenAIRE

    Catalin-Florinel Stanescu; Laurentiu Mircea Simion

    2011-01-01

    Concerns about the financial risk is increasing. In this climate, companies of all types and sizes want a robust framework for financial risk management to meet compliance requirements, contribute to better decision making and increase performance. Financial risk management professionals working with financial institutions and other corporate clients to achieve these objectives.

  3. Optimizing risk management

    International Nuclear Information System (INIS)

    Kindred, G.W.

    2000-01-01

    Commercial nuclear power plant management is focussed on the safe, efficient, economical production of electricity. To accomplish the safe aspect of the equation, risk must be determined for the operation and maintenance of the facility. To accomplish the efficient aspect of the equation, management must understand those risks and factor risk insights into their decision process. The final piece of the equation is economical which is accomplished by minimizing, plant outage durations and proper utilization of resources. Probabilistic Risk Assessment can provide the risk insights to accomplish all three; safety, efficiency, and economically. How? Safe production of electricity can be quantified by use of PRA modeling and other risk insights that can determine the core damage frequency. Efficient production of electricity can be influenced by providing management with quantified risk insights for use in decision making. And, one example of economical production of electricity is by not having over conservative deterministic based defense in depth approaches to system maintenance and availability. By using risk-informed insights nuclear safety can be quantified and risk can be managed. Confidence in this approach can be achieved by ensuring the content and quality of the PRA is standardized throughout the industry. The time has arrived for Probabilistic Risk Assessment to take an active position as a major role player in the safe, efficient, and economical operation of commercial nuclear power plants. (author)

  4. Risk management and safety

    International Nuclear Information System (INIS)

    Niehaus, F.; Novegno, A.

    1985-01-01

    Risk assessment, including probabilistic analyses, has made great progress over the past decade. In spite of the inherent uncertainties it has now become possible to utilize methods and results for decision making at various levels. This paper will, therefore, review risk management in industrial installations, risk management for energy safety policy and prospects of risk management in highly industrialized areas. (orig.) [de

  5. Applied software risk management a guide for software project managers

    CERN Document Server

    Pandian, C Ravindranath

    2006-01-01

    Few software projects are completed on time, on budget, and to their original specifications. Focusing on what practitioners need to know about risk in the pursuit of delivering software projects, Applied Software Risk Management: A Guide for Software Project Managers covers key components of the risk management process and the software development process, as well as best practices for software risk identification, risk planning, and risk analysis. Written in a clear and concise manner, this resource presents concepts and practical insight into managing risk. It first covers risk-driven project management, risk management processes, risk attributes, risk identification, and risk analysis. The book continues by examining responses to risk, the tracking and modeling of risks, intelligence gathering, and integrated risk management. It concludes with details on drafting and implementing procedures. A diary of a risk manager provides insight in implementing risk management processes.Bringing together concepts ...

  6. [Risk Assessment and Risk Management of Chemicals in China].

    Science.gov (United States)

    Wang, Tie-yu; Zhou, Yun-qiao; Li, Qi-feng; Lü, Yong-long

    2016-02-15

    Risk assessment and risk management have been increasingly approved as an effective approach for appropriate disposal and scientific management of chemicals. This study systematically analyzed the risk assessment methods of chemicals from three aspects including health risk, ecological risk and regional risk. Based on the current situation of classification and management towards chemicals in China, a specific framework of risk management on chemicals was proposed by selecting target chemicals, predominant industries and related stakeholders as the objects. The results of the present study will provide scientific support for improving risk assessment and reasonable management of chemicals in China.

  7. From risk management to uncertainty management: a significant change in project management

    Institute of Scientific and Technical Information of China (English)

    LI Gui-jun; ZHANG Yue-song

    2006-01-01

    Starting with the meanings of the terms "risk" and "uncertainty,"" he paper compares uncertainty management with risk management in project management. We bring some doubt to the use of "risk" and "uncertainty" interchangeably in project management and deem their scope, methods, responses, monitoring and controlling should be different too. Illustrations are given covering terminology, description, and treatment from different perspectives of uncertainty management and risk management. Furthermore, the paper retains that project risk management (PRM) processes might be modified to facilitate an uncertainty management perspective,and we support that project uncertainty management (PUM) can enlarge its contribution to improving project management performance, which will result in a significant change in emphasis compared with most risk management.

  8. Improving Operational Risk Management Using Business Performance Management Technologies

    OpenAIRE

    Bram Pieket Weeserik; Marco Spruit

    2018-01-01

    Operational Risk Management (ORM) comprises the continuous management of risks resulting from: human actions, internal processes, systems, and external events. With increasing requirements, complexity and a growing volume of risks, information systems provide benefits for integrating risk management activities and optimizing performance. Business Performance Management (BPM) technologies are believed to provide a solution for effective Operational Risk Management by offering several combined ...

  9. Risk Management Issues - An Aerospace Perspective

    Science.gov (United States)

    Perera, Jeevan S.

    2011-01-01

    Phased-approach for implementation of risk management is necessary. Risk management system will be simple, accessible and promote communication of information to all relevant stakeholders for optimal resource allocation and risk mitigation. Risk management should be used by all team members to manage risks--risk office personnel. Each group is assigned Risk Integrators who are facilitators for effective risk management. Risks will be managed at the lowest-level feasible, elevate only those risks that require coordination or management from above. Risk reporting and communication is an essential element of risk management and will combine both qualitative and quantitative elements.. Risk informed decision making should be introduced to all levels of management. Provide necessary checks and balances to insure that risks are caught/identified and dealt with in a timely manner, Many supporting tools, processes & training must be deployed for effective risk management implementation. Process improvement must be included in the risk processes.

  10. RISK MANAGEMENT IN CUSTOMS CONTROL

    Directory of Open Access Journals (Sweden)

    Elena Valerievna Drobot

    2017-06-01

    Full Text Available Customs administrations operating in the modern global economy are faced with a complex range of challenges. The prime responsibilities remain the collection of revenues and the protection of the society, but these demanding tasks must be performed effectively and efficiently, whilst at the same time facilitating the flow of legitimate goods. Risk management is a logical and systematic method of identifying, analyzing and managing risks. Risk management can be associated with any activity, function or process within the organization and will enable the organization to take advantage of opportunities and minimize potential losses. Minimization of the human factor in customs control through the implementation of non-intrusive inspection equipment can be very useful. The particularities of risk-management system (RMS implementation within customs control are discussed in the article. The authors single out the elements of the risk-management system, evaluate the effectiveness of risk-management in customs control. The main reasons for non-implementation of the risk-management system in customs control are described as well. The particular attention is paid to the benefits of customs risk management. The authors’ hypothesis is that risk management in customs control must find a balance between costs and benefits to address all risks equally. Criteria are needed to decide what constitutes an acceptable or unacceptable risk. Thus, system analysis and risk management system are the effective mechanisms for acceleration of customs clearance and improve the quality of customs control. As a conclusion, the authors give recommendations for the improvement of the effectiveness of risk management system in customs control.

  11. Risk management in nuclear projects

    International Nuclear Information System (INIS)

    Salles, Claudio J.R.

    2002-01-01

    The risk management will be defined by different aspects: danger or loss possibility, or responsibility for damage. The risk management is one stage of project management. The risk management is a continuous process of planning, identification, quantification, answer and risk control to maximize the success potential of activity. The reduction of risk is part of priority establishment. This work will indicate how introduce this important instrument in the management of nuclear projects. (author)

  12. Risk Management for e-Business

    Directory of Open Access Journals (Sweden)

    2007-01-01

    Full Text Available In the new Internet economy, risk management plays a critical role to protect the organization and its ability to perform their business mission, not just its IT assets. Risk management is the process of identifying risk, assessing risk, and taking steps to reduce risk to an acceptable level. The risk management is an important component of a IT security program. Information and communications technology management and IT security are responsible for ensuring that technology risks are managed appropriately. These risks originate from the deployment and use of IT assets in various ways, such as configuring systems incorrectly or gaining access to restricted software.

  13. Decisionmaking under risk in invasive species management: risk management theory and applications

    Science.gov (United States)

    Shefali V. Mehta; Robert G. Haight; Frances R. Homans

    2010-01-01

    Invasive species management is closely entwined with the assessment and management of risk that arises from the inherently random nature of the invasion process. The theory and application of risk management for invasive species with an economic perspective is reviewed in this synthesis. Invasive species management can be delineated into three general categories:...

  14. Risk management frameworks for human health and environmental risks.

    Science.gov (United States)

    Jardine, Cindy; Hrudey, Steve; Shortreed, John; Craig, Lorraine; Krewski, Daniel; Furgal, Chris; McColl, Stephen

    2003-01-01

    A comprehensive analytical review of the risk assessment, risk management, and risk communication approaches currently being undertaken by key national, provincial/state, territorial, and international agencies was conducted. The information acquired for review was used to identify the differences, commonalities, strengths, and weaknesses among the various approaches, and to identify elements that should be included in an effective, current, and comprehensive approach applicable to environmental, human health and occupational health risks. More than 80 agencies, organizations, and advisory councils, encompassing more than 100 risk documents, were examined during the period from February 2000 until November 2002. An overview was made of the most important general frameworks for risk assessment, risk management, and risk communication for human health and ecological risk, and for occupational health risk. In addition, frameworks for specific applications were reviewed and summarized, including those for (1)contaminated sites; (2) northern contaminants; (3) priority substances; (4) standards development; (5) food safety; (6) medical devices; (7) prescription drug use; (8) emergency response; (9) transportation; (10) risk communication. Twelve frameworks were selected for more extensive review on the basis of representation of the areas of human health, ecological, and occupational health risk; relevance to Canadian risk management needs; representation of comprehensive and well-defined approaches; generalizability with their risk areas; representation of "state of the art" in Canada, the United States, and/or internationally; and extent of usage of potential usage within Canada. These 12 frameworks were: 1. Framework for Environmental Health Risk Management (US Presidential/Congressional Commission on Risk Assessment and Risk Management, 1997). 2. Health Risk Determination: The Challenge of Health Protection (Health and Welfare Canada, 1990). 3. Health Canada Decision

  15. Integrated Computer System of Management in Logistics

    Science.gov (United States)

    Chwesiuk, Krzysztof

    2011-06-01

    This paper aims at presenting a concept of an integrated computer system of management in logistics, particularly in supply and distribution chains. Consequently, the paper includes the basic idea of the concept of computer-based management in logistics and components of the system, such as CAM and CIM systems in production processes, and management systems for storage, materials flow, and for managing transport, forwarding and logistics companies. The platform which integrates computer-aided management systems is that of electronic data interchange.

  16. Construction Management Risk System (CMRS for Construction Management (CM Firms

    Directory of Open Access Journals (Sweden)

    Kyungmo Park

    2017-02-01

    Full Text Available After the global financial crisis of 2008, the need for risk management arose because it was necessary to minimize the losses in construction management (CM firms. This was caused by a decreased amount of orders in the Korean CM market, which intensified order competition between companies. However, research results revealed that risks were not being systematically managed owing to the absence of risk management systems. Thus, it was concluded that it was necessary to develop standard operating systems and implement risk management systems in order to manage risks effectively. Therefore, the purpose of this study was to develop a construction risk management system (CRMS for systematically managing risks. For this purpose, the field operation managers of CM firms were interviewed and surveyed in order to define risk factors. Upon this, a risk assessment priority analysis was performed. Finally, a risk management system that comprised seven modules and 20 sub-modules and was capable of responding systematically to risks was proposed. Furthermore, the effectiveness of this system was verified through on-site inspection. This system allows early response to risks, accountability verification and immediate response to legal disputes with clients by managing risk records.

  17. Resource Management in Mobile Cloud Computing

    Directory of Open Access Journals (Sweden)

    Andrei IONESCU

    2015-01-01

    Full Text Available Mobile cloud computing is a major research topic in Information Technology & Communications. It integrates cloud computing, mobile computing and wireless networks. While mainly built on cloud computing, it has to operate using more heterogeneous resources with implications on how these resources are managed and used. Managing the resources of a mobile cloud is not a trivial task, involving vastly different architectures. The process is outside the scope of human users. Using the resources by the applications at both platform and software tiers come with its own challenges. This paper presents different approaches in use for managing cloud resources at infrastructure and platform levels.

  18. Information Risk Management and Resilience

    Science.gov (United States)

    Dynes, Scott

    Are the levels of information risk management efforts within and between firms correlated with the resilience of the firms to information disruptions? This paper examines the question by considering the results of field studies of information risk management practices at organizations and in supply chains. The organizations investigated differ greatly in the degree of coupling from a general and information risk management standpoint, as well as in the levels of internal awareness and activity regarding information risk management. The comparison of the levels of information risk management in the firms and their actual or inferred resilience indicates that a formal information risk management approach is not necessary for resilience in certain sectors.

  19. Continuous Risk Management at NASA

    Science.gov (United States)

    Hammer, Theodore F.; Rosenberg, Linda

    1999-01-01

    NPG 7120.5A, "NASA Program and Project Management Processes and Requirements" enacted in April, 1998, requires that "The program or project manager shall apply risk management principles..." The Software Assurance Technology Center (SATC) at NASA GSFC has been tasked with the responsibility for developing and teaching a systems level course for risk management that provides information on how to comply with this edict. The course was developed in conjunction with the Software Engineering Institute at Carnegie Mellon University, then tailored to the NASA systems community. This presentation will briefly discuss the six functions for risk management: (1) Identify the risks in a specific format; (2) Analyze the risk probability, impact/severity, and timeframe; (3) Plan the approach; (4) Track the risk through data compilation and analysis; (5) Control and monitor the risk; (6) Communicate and document the process and decisions. This risk management structure of functions has been taught to projects at all NASA Centers and is being successfully implemented on many projects. This presentation will give project managers the information they need to understand if risk management is to be effectively implemented on their projects at a cost they can afford.

  20. Probability concepts in quality risk management.

    Science.gov (United States)

    Claycamp, H Gregg

    2012-01-01

    Essentially any concept of risk is built on fundamental concepts of chance, likelihood, or probability. Although risk is generally a probability of loss of something of value, given that a risk-generating event will occur or has occurred, it is ironic that the quality risk management literature and guidelines on quality risk management tools are relatively silent on the meaning and uses of "probability." The probability concept is typically applied by risk managers as a combination of frequency-based calculation and a "degree of belief" meaning of probability. Probability as a concept that is crucial for understanding and managing risk is discussed through examples from the most general, scenario-defining and ranking tools that use probability implicitly to more specific probabilistic tools in risk management. A rich history of probability in risk management applied to other fields suggests that high-quality risk management decisions benefit from the implementation of more thoughtful probability concepts in both risk modeling and risk management. Essentially any concept of risk is built on fundamental concepts of chance, likelihood, or probability. Although "risk" generally describes a probability of loss of something of value, given that a risk-generating event will occur or has occurred, it is ironic that the quality risk management literature and guidelines on quality risk management methodologies and respective tools focus on managing severity but are relatively silent on the in-depth meaning and uses of "probability." Pharmaceutical manufacturers are expanding their use of quality risk management to identify and manage risks to the patient that might occur in phases of the pharmaceutical life cycle from drug development to manufacture, marketing to product discontinuation. A probability concept is typically applied by risk managers as a combination of data-based measures of probability and a subjective "degree of belief" meaning of probability. Probability as

  1. IMPLEMENTING A RISK MANAGEMENT STANDARD

    Directory of Open Access Journals (Sweden)

    Constantin PREDA

    2013-01-01

    Full Text Available After risk management “conquered” more and more project managers’ minds and showed its benefits for business and programs, the need to have a global risk management standard has become a crucial issue in the world of risk management. But having a global risk management standard has been a big challenge, starting from the decision of developing the standard (March-June 2005, to the moment of publishing it, November 2009. So, developing the ISO 31000:2009 standard has been more or less like a bumpy ride. Apparently, the people involved in developing the global risk management standard understood from the very beginning that no challenges are too big, nor any tasks too small and that the task of having a new, comprehensive global risk management standard should be completed with excellence: defining the principles and the framework guiding the risk management process applicable for all type of organizations and for a wide range of activities. Coming up with a global standard should always be based on the real organizations’ needs and should fulfill real risk management requirements. The article is trying to present the pros and cons of risk management standard implementation, challenging the implementation process itself and the added value of implementing the standard due to the lack of implementation enablers, like risk culture, a real problem especially in an international environment.

  2. Adapting risk management and computational intelligence network optimization techniques to improve traffic throughput and tail risk analysis.

    Science.gov (United States)

    2014-04-01

    Risk management techniques are used to analyze fluctuations in uncontrollable variables and keep those fluctuations from impeding : the core function of a system or business. Examples of this are making sure that volatility in copper and aluminum pri...

  3. Cyber Terrorism demands a Global Risks and Threats Strategic Management

    International Nuclear Information System (INIS)

    Gareva, R.

    2007-01-01

    The world is in the third wave of development, which is digital managed and networked. Information, which creates the knowledge is transferring thorough the Internet by exponential function. The rapid advancement of the computer technology has a great influence over the development of the critical information infrastructure, thus changing the safety environment and the national values and interests. This advancement produces threats and risks from computer perspective which are sublimated in different forms of international terrorism and particularly in cyber terrorism. The main aim of this paper is based on a thorough analysis of what is scientifically known and practiced when nowadays critical information infrastructure is in the focus of the cyber terrorism. The rapid IT development demands changes in the strategic management focus. As a result of a time-consuming theoretical and empirical research this paper suggests a methodology for strategic managing of: threats, risks and vulnerabilities. The proposed methodology is seen as a mean to increase the human security conscious in every sense of the word, and to promote the need for rules, procedures and standards establishment from the aspect of the strategic management in the new information epoch concerning. In addition, through a scientific discourse, a short attempt is made to relate Macedonian reality with the phenomenon mentioned above. The most fundamental set phrase is that the efficiency and promptly made decisions during strategic planning are a projection of the systematic organization of functions and models for managing the risks and threats of the critical information infrastructure. Hence, this paper could be seen as a perspective when taking in consideration the regional strategic management, and the cyber space vital functioning. (author)

  4. CEA - 2014 risk management assessment

    International Nuclear Information System (INIS)

    Bonnevie, Edwige; Verwaerde, Daniel; Maillot, Bernard

    2015-06-01

    After introducing presentations of CEA managers in charge of risk management and controls, this document presents and comments the actions undertaken by the CEA and the obtained results in terms of risk management in different fields: protection and control of the environment, installation safety, health, safety and radiation protection, transport of hazardous materials, waste management, protection of sites, installations and heritage, management of emergency situations, management of legal risks, internal audits and controls. Other topics are addressed like the presentation of the risk management department, and the role of the CEA in the relationship between research and industry

  5. Pneumoperitoneum after virtual colonoscopy: causes, risk factors, and management.

    Science.gov (United States)

    Baccaro, Leopoldo M; Markelov, Alexey; Wilhelm, Jakub; Bloch, Robert

    2014-06-01

    Computed tomographic virtual colonoscopy (CTVC) is a safe and minimally invasive modality when compared with fiberoptic colonoscopy for evaluating the colon and rectum. We have reviewed the risks for colonic perforation by investigating the relevant literature. The objectives of this study were to assess the risk of colonic perforation during CTVC, describe risk factors, evaluate ways to reduce the incidence complications, and to review management and treatment options. A formal search of indexed publications was performed through PubMed. Search queries using keywords "CT colonography," "CT virtual colonoscopy," "virtual colonoscopy," and "perforation" yielded a total of 133 articles. A total of eight case reports and four review articles were selected. Combining case reports and review articles, a total of 25 cases of colonic perforation after CTVC have been reported. Causes include, but are not limited to, diverticular disease, irritable bowel diseases, obstructive processes, malignancies, and iatrogenic injury. Both operative and nonoperative management has been described. Nonoperative management has been proven safe and successful in minimally symptomatic and stable patients. Colonic perforation after CTVC is a rare complication and very few cases have been reported. Several risk factors are recurrent in the literature and must be acknowledged at the time of the study. Management options vary and should be tailored to each individual patient.

  6. A Computational Framework for Flood Risk Assessment in The Netherlands

    Directory of Open Access Journals (Sweden)

    A.A. Markus

    2010-01-01

    Full Text Available The safety of dikes in The Netherlands, located in the delta of the rivers Rhine, Meuse and Scheldt, has been the subject of debate for more than ten years. The safety (or flood risk of a particular area may depend on the safety of other areas. This is referred to as effects of river system behaviour on flood risk (quantified as the estimated number of casualties and economic damage. A computational framework was developed to assess these effects. It consists of several components that are loosely coupled via data files and Tcl scripts to manage the individual programs and keep track of the state of the computations. The computations involved are lengthy (days or even weeks on a Linux cluster, which makes the framework currently more suitable for planning and design than for real-time operation. While the framework was constructed ad hoc, it can also be viewed more formally as a tuplespace Realising this makes it possible to adopt the philosophy for other similar frameworks.

  7. Difficulties encountered managing nodules detected during a computed tomography lung cancer screening program.

    Science.gov (United States)

    Veronesi, Giulia; Bellomi, Massimo; Scanagatta, Paolo; Preda, Lorenzo; Rampinelli, Cristiano; Guarize, Juliana; Pelosi, Giuseppe; Maisonneuve, Patrick; Leo, Francesco; Solli, Piergiorgio; Masullo, Michele; Spaggiari, Lorenzo

    2008-09-01

    The main challenge of screening a healthy population with low-dose computed tomography is to balance the excessive use of diagnostic procedures with the risk of delayed cancer detection. We evaluated the pitfalls, difficulties, and sources of mistakes in the management of lung nodules detected in volunteers in the Cosmos single-center screening trial. A total of 5201 asymptomatic high-risk volunteers underwent screening with multidetector low-dose computed tomography. Nodules detected at baseline or new nodules at annual screening received repeat low-dose computed tomography at 1 year if less than 5 mm, repeat low-dose computed tomography 3 to 6 months later if between 5 and 8 mm, and fluorodeoxyglucose positron emission tomography if more than 8 mm. Growing nodules at the annual screening received low-dose computed tomography at 6 months and computed tomography-positron emission tomography or surgical biopsy according to doubling time, type, and size. During the first year of screening, 106 patients underwent lung biopsy and 91 lung cancers were identified (70% were stage I). Diagnosis was delayed (false-negative) in 6 patients (stage IIB in 1 patient, stage IIIA in 3 patients, and stage IV in 2 patients), including 2 small cell cancers and 1 central lesion. Surgical biopsy revealed benign disease (false-positives) in 15 cases (14%). Positron emission tomography sensitivity was 88% for prevalent cancers and 70% for cancers diagnosed after first annual screening. No needle biopsy procedures were performed in this cohort of patients. Low-dose computed tomography screening is effective for the early detection of lung cancers, but nodule management remains a challenge. Computed tomography-positron emission tomography is useful at baseline, but its sensitivity decreases significantly the subsequent year. Multidisciplinary management and experience are crucial for minimizing misdiagnoses.

  8. DEFENSE PROGRAMS RISK MANAGEMENT FRAMEWORK

    Directory of Open Access Journals (Sweden)

    Constantin PREDA

    2012-01-01

    Full Text Available For the past years defense programs have faced delays in delivering defense capabilities and budget overruns. Stakeholders are looking for ways to improve program management and the decision making process given the very fluid and uncertain economic and political environment. Consequently, they have increasingly resorted to risk management as the main management tool for achieving defense programs objectives and for delivering the defense capabilities strongly needed for the soldiers on the ground on time and within limited defense budgets. Following a risk management based decision-making approach the stakeholders are expected not only to protect program objectives against a wide range of risks but, at the same time, to take advantage of the opportunities to increase the likelihood of program success. The prerequisite for making risk management the main tool for achieving defense programs objectives is the design and implementation of a strong risk management framework as a foundation providing an efficient and effective application of the best risk management practices. The aim of this paper is to examine the risk management framework for defense programs based on the ISO 31000:2009 standard, best risk management practices and the defense programs’ needs and particularities. For the purposes of this article, the term of defense programs refers to joint defense programs.

  9. Risk analysis of radioactive waste management systems in Germany

    International Nuclear Information System (INIS)

    Wingender, H.J.

    1978-01-01

    Within the scope of a system study, ''Radioactive wastes in the Federal Republic of Germany,'' performed from 1974 through 1976, the questions of risk assessment were investigated. A risk analysis of a high-level waste (HLW) management system was performed. The results of the HLW tank storage are that the risk expectation value is 700 nJ/kg x RBE (7 x 10 -5 rem) per year for atmospheric release. The discussion of the main contributing accidents shows the possibility of reducing the risk by a technical means. A qualitative comparison on the release basis with the results of the WASH-1400 report shows significant differences that can be explained by the different methodologies applied. The risk analysis activities have led to a comprehensive risk assessment project, which was recently started. The projected includes research and development tasks concerning nuclide migration and transport to the ecosphere, nuclide mobilization by various mechanisms, methodology problems, data collection, computer code development, as well as risk analyses of waste management facilities. It is intended to round off the project with risk analyses of spent fuel element transport, storage, and reprocessing

  10. Risk and/or resilience management

    Directory of Open Access Journals (Sweden)

    Jean-Paul Louisot

    2015-06-01

    Full Text Available Risk management aims at managing all the uncertainties that may interfere with the objectives and missions of the organization. Resilience engineering aims at building its capacity to get over disturbances or stress while keeping the functionalities needed to survive, and possibly thrive. A recently open debate on an Internet blog launched by the risk managers of the Scottish Widows Bank seems to arise from what some professionals see as two competing branches of the management sciences. Whereas through the development of ERM – Enterprise-wide Risk Managementrisk management is emerging at last to become a science, as well as an art and a practice, the mentioned above centered on the role of a newly forged name “resilience management”. This opens a new front of the many debates that could derail the path to maturity of Risk Management as a science and reopen new silos much as Business Impact Analysis, BIA, or continuity management, might do if a clear distinction is not made between science, objectives and tools. However, because organizations are so interconnected today in the supply cloud that it is inevitable that they will face catastrophic risk and this is why resilience needs to be a core objective of any risk management plan? Whereas traditional risk management techniques alone may not be adequate to deal with such pervasive and insipient risk scenarios, resilience is ingrained into ERM

  11. Methodical Approaches to Risk Management in a Regional Commercial Bank

    Directory of Open Access Journals (Sweden)

    Elena Vladimirovna Altukhova

    2016-03-01

    Full Text Available The article presents the results of the research of the methodological and information infrastructure of the integrated risk management in a regional commercial bank. Within the study of the general development tendencies of the regional banking services market, the most significant risks for a regional bank are revealed. The analysis is carried out on the basis of the stress testing technique developed at the Plekhanov Russian University of Economics. It is based on a technique of dynamic economic and mathematical modeling with the application of information technologies. The created combination of the methodological and instrumental tools allows to carry out the dynamic scenario analysis of the activity of a commercial bank for the identification of potential risks and for the development of the strategy of financial management reducing the potential risks and leveling the consequences of their realization. The received tool allows during the computer test to watch the predicted dynamics of the condition of the key indicators of the activity of a regional commercial bank changing under the influence of the exogenous regulatory measures and instruments of bank management applied to decrease risk and at the same time to introduce adjustments in the perspective strategy of management. As the result of the analysis, the universal management model of the main bank risks in a regional commercial bank within three alternative scenarios is created. The software product allowing to develop and acquire the practical skills of the students in banking is developed. It also may help to develop the methodological support for the regulation of the organizational procedures of risk management in a regional commercial bank. The received software product may be used in a system of the improving the professional skills, and also for obtaining the expected data in a risk management system in a regional commercial bank.

  12. Supply chain risk management

    OpenAIRE

    Christian Hollstein; Frank Himpel

    2013-01-01

    Background: Supply chain risk management increasingly gains prominence in many international industries. In order to strengthen supply chain structures, processes, and networks, adequate potentials for risk management need to be built (focus on effective logistics) and to be utilized (focus on efficient logistics). Natural-based disasters, such as the case of Fukushima, illustrate how crucial risk management is. Method: By aligning a theoretical-conceptual framework with empirical-induct...

  13. A probabilistic method for computing quantitative risk indexes from medical injuries compensation claims.

    Science.gov (United States)

    Dalle Carbonare, S; Folli, F; Patrini, E; Giudici, P; Bellazzi, R

    2013-01-01

    The increasing demand of health care services and the complexity of health care delivery require Health Care Organizations (HCOs) to approach clinical risk management through proper methods and tools. An important aspect of risk management is to exploit the analysis of medical injuries compensation claims in order to reduce adverse events and, at the same time, to optimize the costs of health insurance policies. This work provides a probabilistic method to estimate the risk level of a HCO by computing quantitative risk indexes from medical injury compensation claims. Our method is based on the estimate of a loss probability distribution from compensation claims data through parametric and non-parametric modeling and Monte Carlo simulations. The loss distribution can be estimated both on the whole dataset and, thanks to the application of a Bayesian hierarchical model, on stratified data. The approach allows to quantitatively assessing the risk structure of the HCO by analyzing the loss distribution and deriving its expected value and percentiles. We applied the proposed method to 206 cases of injuries with compensation requests collected from 1999 to the first semester of 2007 by the HCO of Lodi, in the Northern part of Italy. We computed the risk indexes taking into account the different clinical departments and the different hospitals involved. The approach proved to be useful to understand the HCO risk structure in terms of frequency, severity, expected and unexpected loss related to adverse events.

  14. Data Management in Metagenomics: A Risk Management Approach

    Directory of Open Access Journals (Sweden)

    Filipe Ferreira

    2014-07-01

    Full Text Available In eScience, where vast data collections are processed in scientific workflows, new risks and challenges are emerging. Those challenges are changing the eScience paradigm, mainly regarding digital preservation and scientific workflows. To address specific concerns with data management in these scenarios, the concept of the Data Management Plan was established, serving as a tool for enabling digital preservation in eScience research projects. We claim risk management can be jointly used with a Data Management Plan, so new risks and challenges can be easily tackled. Therefore, we propose an analysis process for eScience projects using a Data Management Plan and ISO 31000 in order to create a Risk Management Plan that can complement the Data Management Plan. The motivation, requirements and validation of this proposal are explored in the MetaGen-FRAME project, focused in Metagenomics.

  15. Risk Management Considerations in Cloud Computing Adoption

    OpenAIRE

    Doherty, Eileen; Carcary, Marian; Conway, Gerard

    2012-01-01

    Information and Communication Technology (ICT) plays a pivotal role in enabling organizational capability and productivity, and in initiating and facilitating innovation across all industry sectors. In recent years, cloud computing has emerged as a growing trend because it serves as an enabler of scalable, flexible and powerful computing. Consequently, each year significant global investment is made in migrating to the cloud environment. However, despite its growing po...

  16. Tank waste remediation system risk management plan

    International Nuclear Information System (INIS)

    Zimmerman, B.D.

    1998-01-01

    The purpose of the Tank Waste Remediation System (TWRS) Risk Management Plan is to describe a consistent approach to risk management such that TWRS Project risks are identified and managed to achieve TWRS Project success. The Risk Management Plan implements the requirements of the Tank Waste Remediation System Systems Engineering Management Plan in the area of risk management. Figure ES-1 shows the relationship of the TWRS Risk Management Plan to other major TWRS Project documents. As the figure indicates, the Risk Management Plan is a tool used to develop and control TWRS Project work. It provides guidance on how TWRS Project risks will be assessed, analyzed, and handled, and it specifies format and content for the risk management lists, which are a primary product of the risk management process. In many instances, the Risk Management Plan references the TWRS Risk Management Procedure, which provides more detailed discussion of many risk management activities. The TWRS Risk Management Plan describes an ongoing program within the TWRS Project. The Risk Management Plan also provides guidance in support of the TWRS Readiness To-Proceed (RTP) assessment package

  17. Task and Interruption Management in Activity-Centric Computing

    DEFF Research Database (Denmark)

    Jeuris, Steven

    to address these not in isolation, but by fundamentally reevaluating the current computing paradigm. To this end, activity-centric computing has been brought forward as an alternative computing paradigm, addressing the increasing strain put on modern-day computing systems. Activity-centric computing follows...... the scalability and intelligibility of current research prototypes. In this dissertation, I postulate that such issues arise due to a lack of support for the full set of practices which make up activity management. Most notably, although task and interruption management are an integral part of personal...... information management, they have thus far been neglected in prior activity-centric computing systems. Advancing the research agenda of activity-centric computing, I (1) implement and evaluate an activity-centric desktop computing system, incorporating support for interruptions and long-term task management...

  18. THE ANALYSIS OF RISK MANAGEMENT PROCESS WITHIN MANAGEMENT

    Directory of Open Access Journals (Sweden)

    ROMANESCU MARCEL LAURENTIU

    2016-10-01

    Full Text Available This article highlights the risk analysis within management, focusing on how a company could practicaly integrate the risks management in the existing leading process. Subsequently, it is exemplified the way of manage risk effectively, which gives numerous advantages to all firms, including improving their decision-making process. All these lead to the conclusion that the degree of risk specific to companies is very high, but if managers make the best decisions then it can diminish it and all business activitiy and its income are not influenced by factors that could disturb in a negative way .

  19. Innovations in Quantitative Risk Management

    CERN Document Server

    Scherer, Matthias; Zagst, Rudi

    2015-01-01

    Quantitative models are omnipresent –but often controversially discussed– in todays risk management practice. New regulations, innovative financial products, and advances in valuation techniques provide a continuous flow of challenging problems for financial engineers and risk managers alike. Designing a sound stochastic model requires finding a careful balance between parsimonious model assumptions, mathematical viability, and interpretability of the output. Moreover, data requirements and the end-user training are to be considered as well. The KPMG Center of Excellence in Risk Management conference Risk Management Reloaded and this proceedings volume contribute to bridging the gap between academia –providing methodological advances– and practice –having a firm understanding of the economic conditions in which a given model is used. Discussed fields of application range from asset management, credit risk, and energy to risk management issues in insurance. Methodologically, dependence modeling...

  20. Risk assessment and risk management in managed aquifer recharge

    CSIR Research Space (South Africa)

    Page, D

    2012-06-01

    Full Text Available This chapter presents the methodologies used for risk assessment and risk management in MAR in Australia and the European Union, qualitative and quantitative approaches adopted within the RECLAIM Water project and case studies where the outcomes...

  1. Value of risk management

    OpenAIRE

    Vik, Marie Amdal

    2012-01-01

    Master's thesis in Risk management The overall aim of this study was to discuss the validity of the hypothesis that risk management contributes with added value to projects and the enterprise holding the projects, and consequently to the enterprise’s stakeholders. To examine this hypothesis, a case study of three projects taken from the same portfolio at Statoil was selected. The projects were said to have an active risk management. Data was collected from the project’s documentation as...

  2. Supply Cain Risk Management

    OpenAIRE

    Goodwin, Les

    2011-01-01

    “The management of supply chain risk is crucial to any business, more so to Rolls Royce who face an almost doubling of load within the next 10 years. So what is supply chain risk management and how well is it deployed within an operational business of Rolls Royce? What are the tools and techniques available and what are the key issues around implementing world class supply chain risk management with a Supply Chain Unit within Rolls Royce?”

  3. Credit risk management in banks

    OpenAIRE

    Pětníková, Tereza

    2014-01-01

    The subject of this diploma thesis is managing credit risk in banks, as the most significant risk faced by banks. The aim of this work is to define the basic techniques, tools and methods that are used by banks to manage credit risk. The first part of this work focuses on defining these procedures and describes the entire process of credit risk management, from the definition of credit risk, describing credit strategy and policy, organizational structure, defining the most used credit risk mi...

  4. Management of business risks

    OpenAIRE

    BAZARBAY A.

    2015-01-01

    The article presents methodological ideas concerning the problem of risk management. Special attention is paid to increasing of enterprises' operating efficiency by means of risk-management system development in business organizations.

  5. The Uncertainties of Risk Management

    DEFF Research Database (Denmark)

    Vinnari, Eija; Skærbæk, Peter

    2014-01-01

    for expanding risk management. More generally, such uncertainties relate to the professional identities and responsibilities of operational managers as defined by the framing devices. Originality/value – The paper offers three contributions to the extant literature: first, it shows how risk management itself......Purpose – The purpose of this paper is to analyse the implementation of risk management as a tool for internal audit activities, focusing on unexpected effects or uncertainties generated during its application. Design/methodology/approach – Public and confidential documents as well as semi......-structured interviews are analysed through the lens of actor-network theory to identify the effects of risk management devices in a Finnish municipality. Findings – The authors found that risk management, rather than reducing uncertainty, itself created unexpected uncertainties that would otherwise not have emerged...

  6. Risk management and corporate value

    Directory of Open Access Journals (Sweden)

    Milan Cupic

    2015-12-01

    Full Text Available The paper presents a theoretical framework for assessing the impact of risk management on corporate value. As the relevant factors that determine this impact, the paper analyzes market imperfections and investors’ risk aversion. The results of the present research indicate that risk management contributes to an increase in corporate value if, under the influence of market imperfections, corporate risk exposure is concave. As an expression of market imperfections, the paper analyzes the costs of financial distress, agency costs, and taxation. The results of the research also indicate that the risk management policy should not aim to minimize, but rather optimize risk exposure, by taking into account the costs of risk management, investors’ risk aversion and the competitive advantage a corporation has on the relevant market.

  7. CEA: risk management assessment 2011

    International Nuclear Information System (INIS)

    Bigot, Bernard; Bonnevie, Edwige; Maillot, Bernard

    2012-01-01

    This report proposes a qualitative and quantitative overview of CEA activities in the field of risk management during 2011. These activities concerned the impact on the environment, the safety of installations, the management of professional risks (safety and health at work), the radiological protection of workers, the transports of hazardous materials, waste management, protection of sites, installations and heritage, the management of emergency situations, the management of law risks, controls and audits

  8. CEA: assessment of risk management 2011

    International Nuclear Information System (INIS)

    2012-06-01

    This report proposes an overview of CEA activities in the field of risk management in different areas: impact on the environment, installation safety, management of occupational risks (occupational health and safety), radiological protection of workers, transportation of hazardous materials, waste management, protection of sites, installations and heritage, management of emergency situations, management of law risks, controls and audits. It finally presents the risk management department

  9. Risk management at university

    OpenAIRE

    Ivanova, H.; Abramovich, S.

    2013-01-01

    This article observes the basic recommendations for the risk management system in higher education as an example Yanka Kupala State University of Grodno. Consider the risk-management standard that based in a process approach

  10. Energy Consumption Management of Virtual Cloud Computing Platform

    Science.gov (United States)

    Li, Lin

    2017-11-01

    For energy consumption management research on virtual cloud computing platforms, energy consumption management of virtual computers and cloud computing platform should be understood deeper. Only in this way can problems faced by energy consumption management be solved. In solving problems, the key to solutions points to data centers with high energy consumption, so people are in great need to use a new scientific technique. Virtualization technology and cloud computing have become powerful tools in people’s real life, work and production because they have strong strength and many advantages. Virtualization technology and cloud computing now is in a rapid developing trend. It has very high resource utilization rate. In this way, the presence of virtualization and cloud computing technologies is very necessary in the constantly developing information age. This paper has summarized, explained and further analyzed energy consumption management questions of the virtual cloud computing platform. It eventually gives people a clearer understanding of energy consumption management of virtual cloud computing platform and brings more help to various aspects of people’s live, work and son on.

  11. Nuclear fuel cycle risk assessment: survey and computer compilation of risk-related literature. [Once-through Cycle and Plutonium Recycle

    Energy Technology Data Exchange (ETDEWEB)

    Yates, K.R.; Schreiber, A.M.; Rudolph, A.W.

    1982-10-01

    The US Nuclear Regulatory Commission has initiated the Fuel Cycle Risk Assessment Program to provide risk assessment methods for assistance in the regulatory process for nuclear fuel cycle facilities other than reactors. Both the once-through cycle and plutonium recycle are being considered. A previous report generated by this program defines and describes fuel cycle facilities, or elements, considered in the program. This report, the second from the program, describes the survey and computer compilation of fuel cycle risk-related literature. Sources of available information on the design, safety, and risk associated with the defined set of fuel cycle elements were searched and documents obtained were catalogued and characterized with respect to fuel cycle elements and specific risk/safety information. Both US and foreign surveys were conducted. Battelle's computer-based BASIS information management system was used to facilitate the establishment of the literature compilation. A complete listing of the literature compilation and several useful indexes are included. Future updates of the literature compilation will be published periodically. 760 annotated citations are included.

  12. Role of NDT in risk management

    International Nuclear Information System (INIS)

    Porter, Jr. James F.

    2009-01-01

    Risk management is identifying and then managing threats that could severely affect or bring down a company. This involves reviewing the operations of the company to include the process, equipment, procedures and personnel. Potential threats are then identified including their probability of occurrence, and then taking appropriate actions to address the most likely threats. Traditionally, risk management was thought of as mostly getting the right insurance. However, this impression of risk management has changed dramatically. With the recent increase in rules and regulations and optimizing utilization of key resources, risk management is becoming a management practice that is as important as financial or facilities management. In ideal risk management, a prioritization process is followed whereby the risks with the greatest loss and greatest probability of occurring are handled first, and risks with lower probability of occurrence and lower loss are handled in descending order. In practice the process can be very difficult, and balancing between risks with a high probability of occurrence but lower loss versus a risk with high but lower probability of occurrence can often be mishandled. (author)

  13. Cattle farmers’ perceptions of risk and risk management strategies

    DEFF Research Database (Denmark)

    Bishu, Kinfe G.; O'Reilly, Seamus; Lahiff, Edward

    2018-01-01

    This study analyzes cattle farmers’ perceptions of risk and risk management strategies in Tigray, Northern Ethiopia. We use survey data from a sample of 356 farmers based on multistage random sampling. Factor analysis is employed to classify scores of risk and management strategies, and multiple...... utilization were perceived as the most important strategies for managing risks. Livestock disease and labor shortage were perceived as less of a risk by farmers who adopted the practice of zero grazing compared to other farmers, pointing to the potential of this practice for risk reduction. We find strong...... evidence that farmers engage in multiple risk management practices in order to reduce losses from cattle morbidity and mortality. The results suggest that government strategies that aim at reducing farmers’ risk need to be tailored to specific farm and farmer characteristics. Findings from this study have...

  14. A Risk Management Approach for a Sustainable Cloud Migration

    Directory of Open Access Journals (Sweden)

    Alifah Aida Lope Abdul Rahman

    2017-11-01

    Full Text Available Cloud computing is not just about resource sharing, cost savings and optimisation of business performance; it also involves fundamental concerns on how businesses need to respond on the risks and challenges upon migration. Managing risks is critical for a sustainable cloud adoption. It includes several dimensions such as cost, practising the concept of green IT, data quality, continuity of services to users and clients, guarantee tangible benefits. This paper presents a risk management approach for a sustainable cloud migration. We consider four dimensions of sustainability, i.e., economic, environmental, social and technology to determine the viability of cloud for the business context. The risks are systematically identified and analysed based on the existing in house controls and the cloud service provider offerings. We use Dempster Shafer (D-S theory to measure the adequacy of controls and apply semi-quantitative approach to perform risk analysis based on the theory of belief. The risk exposure for each sustainability dimension allows us to determine the viability of cloud migration. A practical migration use case is considered to determine the applicability of our work. The results identify the risk exposure and recommended control for the risk mitigation. We conclude that risks depend on specific migration case and both Cloud Service Provider (CSP and users are responsible for the risk mitigation. Inherent risks can evolve due to the cloud migration.

  15. The Key to Risk Management: Management

    OpenAIRE

    Adrian E. Tschoegl

    2000-01-01

    The Barings, Daiwa Bank and Sumitomo Corp. financial debacles in the mid-1990s suggest that management failures rather than misfortune, errors, or complexity are a major source of the risk of financial debacles. These errors are systematic and are a concommittant of the structure of trading and of human nature. Risk management systems must take these facts into account.

  16. Framework for systematic risk management

    International Nuclear Information System (INIS)

    Knief, R.A.; Mahn, J.A.; Briant, V.S.; Lee, R.B.; Long, R.L.

    1991-01-01

    The first paper of the Symposium described GPU Nuclear's Risk Management Group (RMG) and the use of literature search and interviews in a extensive study of risk management. One of the most important goals of the study was to identify comprehensive approaches to managing risk in the nuclear and major high-technology industries. This paper discusses RMG's multi-step generic risk-management process consisting of the following steps to: identify hazards; screen hazards and identify preventive actions, including costs; evaluate hazards for severity, probable frequency, and cost of preventive actions; prioritize preventive actions (preference to high risk and low cost); implement preventive actions; monitor and provide feedback

  17. Security Risks of Cloud Computing and Its Emergence as 5th Utility Service

    Science.gov (United States)

    Ahmad, Mushtaq

    Cloud Computing is being projected by the major cloud services provider IT companies such as IBM, Google, Yahoo, Amazon and others as fifth utility where clients will have access for processing those applications and or software projects which need very high processing speed for compute intensive and huge data capacity for scientific, engineering research problems and also e- business and data content network applications. These services for different types of clients are provided under DASM-Direct Access Service Management based on virtualization of hardware, software and very high bandwidth Internet (Web 2.0) communication. The paper reviews these developments for Cloud Computing and Hardware/Software configuration of the cloud paradigm. The paper also examines the vital aspects of security risks projected by IT Industry experts, cloud clients. The paper also highlights the cloud provider's response to cloud security risks.

  18. The NASA risk management program

    International Nuclear Information System (INIS)

    Buchbinder, B.; Philipson, L.L.

    1989-01-01

    This paper reports that the NASA Risk Management Program has been established to ensure the appropriate application of risk-based procedures in support of the elimination, reduction, or acceptance of significant safety risks of concern in NASA. The term appropriate is emphasized, in that the particular procedures applied to each given risk are to reflect its character and prioritized importance, the technological and economic feasibility of its treatment. A number of key documents have been produced in support of this implementation. Databases, risk analysis tools, and risk communication procedures requisite to the execution of the risk management functions also are being developed or documented. Several risk management applications have been made and a comprehensive application to a major new NASA program is underway. This paper summarizes the development and current status of the NASA Risk Management Program. Some principal actions that have been carried out in NASA in consonance with the program are noted particularly, and views are presented on the program's likely future directions

  19. Risk Management in Mergers and Acquisitions

    Directory of Open Access Journals (Sweden)

    Dmitry O. Verdiev

    2015-01-01

    Full Text Available M&A statistics show that less than a third of newly merged companies has realized their planned synergistic effects and increased shareholder value. According to the author, such disgusting situation is due to improper planning and failure of corporate management to understand the importance of risk management in M&A. Lack of practice in identification, evaluation, mitigation and regular monitoring of risks leads to the situation when many companies merge despite the fact that the merger bears substantial risks. Corporate management fails to include risk mitigation expenses in merger costs. In many cases, risk mitigation expenses may be so substantive that the merger loses its attractiveness. Only few companies implement risk management methodology while planning M&A activity. This methodology may anticipate and minimize the consequences of various risk factors that negatively influence integration process. The article suggests an implementation of risk management best practice. This risk management best practice may act as an effective tool of successful realization of synergistic effects in M&A and may be helpful in increasing shareholder value in post-merger period. Risk management is conducted throughout the stages of merger and includes identification, analysis, assessment, management and monitoring of risks. Implementation of risk management at early stages of merger planning significantly decreases uncertainty in relation to achievement of financial and operational goals of newly merged company. The article provides with typical M&A risk matrix that may be adapted for specific M&A project. Risk matrix includes a register of risks sorted by stages of M&A deal, quality assessment of their probability, influence and impact on merger as well as risk mitigation methods.

  20. Risk Management in Cocurricular Activities.

    Science.gov (United States)

    Webb, Edward M.

    1988-01-01

    Discusses risk management for colleges' cocurricular activities. Discusses tort liability, contributory negligence, and assumption of risk. Provides six concrete steps for managing risks responsibly and professionally: adopting an educational mission statement, assigning risk to others, establishing safety standards, training club advisors,…

  1. RISK MANAGEMENT OF GERMAN FRUIT PRODUCERS

    Directory of Open Access Journals (Sweden)

    Annkatrin PORSCH

    2018-03-01

    Full Text Available Horticultural farms in Germany face substantial business risks. However, fruit farms often struggle to implement appropriate risk management processes, and the risk management literature widely has ignored this farm type. The aim of the study was to improve the assessment of risks by farmers and the choice of suitable risk management instruments. Therefore, a risk management process based on subjective probabilities and suitable for small and medium-sized farms was developed, considering the specific needs of family run businesses. An online survey was conducted to achieve a comprehensive view of the risk perception and risk management practices of German fruit producers. Price and production risks are the most relevant risk categories for fruit farmers. However, among single risk sources, those in the people risk category were seen as the most important. Results show significant interactions among risk categories and a significant correlation between loss experience and the rating of risk categories. The assumption that risk averse farmers generally rate risks higher than risk neutral or risk seeking farmers cannot be confirmed. Diversification seems to be the most important risk management instrument for many fruit producers, especially diversification of marketing channels, farm income, and production activities. Further research should focus on the apparent inconsistency between the satisfaction with instruments reported by farmers and the actual implementation of many of them (e.g., hail insurance and anti-hail net. Furthermore, there is a need for research, to develop decision models considering the interactions of risks and risk management instruments, loss experience and risk seeking attitudes.

  2. Context-aware computing and self-managing systems

    CERN Document Server

    Dargie, Waltenegus

    2009-01-01

    Bringing together an extensively researched area with an emerging research issue, Context-Aware Computing and Self-Managing Systems presents the core contributions of context-aware computing in the development of self-managing systems, including devices, applications, middleware, and networks. The expert contributors reveal the usefulness of context-aware computing in developing autonomous systems that have practical application in the real world.The first chapter of the book identifies features that are common to both context-aware computing and autonomous computing. It offers a basic definit

  3. Study of International Standards of Risk Management

    Directory of Open Access Journals (Sweden)

    Dykan Volodymyr L.

    2014-01-01

    Full Text Available The goal of the article lies in the study of existing international standards of risk management, an important factor of improvement of risk management in domestic corporations and enterprises and development of recommendations on application of international standards in Ukraine, in particular, within the framework of building corporate systems of risk management. The conducted study shows that approaches on organisation of the process of risk management, used in standards of risk management, are of general character and differ with the degree of detailing. Their undoubted value in development of risk management in Ukraine is identification of a general direction of building corporate systems of risk management in practice. The said approaches at the national and corporate levels of standardisation in Ukraine within the framework of building corporate systems of risk management would allow improvement of risk management in corporations and enterprises. The prospect of further studies of domestic specialists in the field of risk management is development of the domestic standard of risk management with consideration of modern domestic specific features of development of risk management in Ukraine and leading foreign experience.

  4. Outage Risk Assessment and Management (ORAM) technology to improve outage safety and economics

    International Nuclear Information System (INIS)

    Kalra, S.P.

    2004-01-01

    The Electric Power Research Institute (EPRI) has undertaken an aggressive program, called ORAM (Outage Risk Assessment and Management), to provide utilities with tools and technology to assist in managing risk during the planning and conduct of outages. The ORAM program consists of the following 6 steps: i) Perform utility surveys and visits on shutdown risk management needs, ii) Perform probabilistic shutdown safety assessments (PSSAs) to identify generic insights that can be incorporated into risk management guidelines and identify selected areas for the development of contingency actions, iii) Develop risk management guidelines (RMG's) that provide a systematic approach to the planning and conduct of outages from a safety perspective. Incorporate insights from the shutdown safety assessments and other operating experience into the RMG's. iv) Develop selected contingency actions including a thermalhydraulic tool kit to address higher risk time periods and activities identified in the shutdown safety assessments, v) Develop computer software that integrates all of the above capability into an easy to use tool for effective shutdown operation management for utilities, vi) Provide assistance in the transfer of this technology and the application of these tools. This paper briefly describes the technical approach and tools developed under EPRI's ORAM program and its applications for improving outage safety and economics. (author)

  5. Individual Property Risk Management

    Directory of Open Access Journals (Sweden)

    Michael S. Finke

    2010-01-01

    Full Text Available This paper reviews household property risk management and estimates normatively optimal choice under theoretical assumptions. Although risk retention limits are common in the financial planning industry, estimates of optimal risk retention that include both financial and human wealth far exceed limits commonly recommended. Households appear to frame property losses differently from other wealth losses leading to wealth-reducing, excess risk transfer. Possible theoretical explanations for excess sensitivity to loss are reviewed. Differences between observed and optimal risk management imply a large potential gain from improved choice.

  6. [The relevance of clinical risk management].

    Science.gov (United States)

    Gulino, Matteo; Vergallo, Gianluca Montanari; Frati, Paola

    2011-01-01

    Medical activity includes a risk of possible injury or complications for the patients, that should drive the Health Care Institutions to introduce and/ or improve clinical Risk management instruments. Although Italy is still lacking a National project of Clinical Risk Management, a number of efforts have been made by different Italian Regions to introduce instruments of risk management. In addition, most of National Health Care Institutions include actually a Department specifically in charge to manage the clinical risk. Despite the practical difficulties, the results obtained until now suggest that the risk management may represent a useful instrument to contribute to the reduction of errors in clinical conduct. Indeed, the introduction of adequate instruments of prevention and management of clinical risk may help to ameliorate the quality of health care Institution services.

  7. Enterprise Content Management Implementation and Risk

    Directory of Open Access Journals (Sweden)

    Jaroslava Klegová

    2015-01-01

    Full Text Available Enterprise Content Management (ECM solutions are commonly used in many areas such as document management, record management, digital asset management, etc. Key features of ECM systems are capturing, indexing, preserving and retrieving of digital information. The state-of-the- art ECM solution can help revolutionize document management and further automated business processes which can lead to better decisions and competitive advantage. Risk management can reduce project failure and that is why controlling risk in ECM implementation projects is considered to be a major contributor to project success. To manage software risk, the first step is to identify a list of ECM projects’ risks. The present paper provides an overview of ECM implementation risks and contains findings from a small survey on experience of ECM implementation and risk in Czech enterprises. Risk of implementation in the public sector is discussed more deeply with case study examples.

  8. Credit derivatives and risk management

    OpenAIRE

    Michael S. Gibson

    2007-01-01

    The striking growth of credit derivatives suggests that market participants find them to be useful tools for risk management. I illustrate the value of credit derivatives with three examples. A commercial bank can use credit derivatives to manage the risk of its loan portfolio. An investment bank can use credit derivatives to manage the risks it incurs when underwriting securities. An investor, such as an insurance company, asset manager, or hedge fund, can use credit derivatives to align its...

  9. 12 CFR 917.3 - Risk management.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Risk management. 917.3 Section 917.3 Banks and Banking FEDERAL HOUSING FINANCE BOARD GOVERNANCE AND MANAGEMENT OF THE FEDERAL HOME LOAN BANKS POWERS AND RESPONSIBILITIES OF BANK BOARDS OF DIRECTORS AND SENIOR MANAGEMENT § 917.3 Risk management. (a) Risk management...

  10. Hanford Tanks Initiative risk management guide

    International Nuclear Information System (INIS)

    Schaus, P.S.

    1997-01-01

    This project-specific Risk Management Guide describes the general approach and process being used by the HTI Project to manage risk associated with execution of the HTI mission. It includes the initial identification of risk and the quantification of its likelihood and severity of its consequences. It further addresses the formulation of risk mitigation plans, periodic statusing of the Risk Management List, and risk closure

  11. A Cloud Computing Approach to Personal Risk Management: The Open Hazards Group

    Science.gov (United States)

    Graves, W. R.; Holliday, J. R.; Rundle, J. B.

    2010-12-01

    According to the California Earthquake Authority, only about 12% of current California residences are covered by any form of earthquake insurance, down from about 30% in 1996 following the 1994, M6.7 Northridge earthquake. Part of the reason for this decreasing rate of insurance uptake is the high deductible, either 10% or 15% of the value of the structure, and the relatively high cost of the premiums, as much as thousands of dollars per year. The earthquake insurance industry is composed of the CEA, a public-private partnership; modeling companies that produce damage and loss models similar to the FEMA HAZUS model; and financial companies such as the insurance, reinsurance, and investment banking companies in New York, London, the Cayman Islands, Zurich, Dubai, Singapore, and elsewhere. In setting earthquake insurance rates, financial companies rely on models like HAZUS, that calculate on risk and exposure. In California, the process begins with an official earthquake forecast by the Working Group on California Earthquake Probabilities. Modeling companies use these 30 year earthquake probabilities as inputs to their attenuation and damage models to estimate the possible damage factors from scenario earthquakes. Economic loss is then estimated from processes such as structural failure, lost economic activity, demand surge, and fire following the earthquake. Once the potential losses are known, rates can be set so that a target ruin probability of less than 1% or so can be assured. Open Hazards Group was founded with the idea that the global public might be interested in a personal estimate of earthquake risk, computed using data supplied by the public, with models running in a cloud computing environment. These models process data from the ANSS catalog, updated at least daily, to produce rupture forecasts that are backtested with standard Reliability/Attributes and Receiver Operating Characteristic tests, among others. Models for attenuation and structural damage

  12. Enterprise risk management and disclosure

    Directory of Open Access Journals (Sweden)

    Nicoleta Farcane

    2008-01-01

    Full Text Available Our paper deals with aspects regarding risk and uncertainty. Many risk management methods are today implemented in organizations. This perspective reveals that managers are linked in different forms to the activities they are managing, depending on the conditions and levels of uncertainty they are in. Actually, these multiple levels of uncertainty lead to the conclusion that any situation in an organizational system can be classified in two different models of organizational phenomena: the organizational phenomena that are putting managers and stakeholders in conditions of risk and the organizational phenomena that are putting them in condition of uncertainty. Using content analyze in this paper we survey the disclosure level of risk management information in the annual report of top Romanian listed companies.

  13. At your own risk. An inquiry about risk management in the ESI

    International Nuclear Information System (INIS)

    Anon.

    1996-01-01

    The UNIPEDE survey on Risk Management within the Electricity Supply Industry has provided a picture of the risks facing the Industry at present and an insight into the management of tomorrow's risks. The survey, in which 81 companies (85 respondents) from 31 countries took part shows that: nearly all types of risk identified in the questionnaire are perceived to be growing : the Risk Management role has become more centralized over the past three years: change will slow in the coming three ; the amount of top level attention given to Risk Management is increasing. However only 37 % of respondent companies have Risk Management as a regular top level management item ; environment-related risks and the safety of both employees and the public are perceived as the most critical risks facing the Industry. Over 80 % of surveyed companies consider that both are of increasing concern ; almost 90 % of respondents agreed that risk management processes should be implemented for both pure and speculative risks. Those who disagreed maintained that Risk Management should be 'realistic not theoretical' ; respondents from the US gave markedly different answers to those from the rest of the world. Risk Management in the US receives top level attention, with numerous separated risk management departments handling risk strategy

  14. Managing information technology security risk

    Science.gov (United States)

    Gilliam, David

    2003-01-01

    Information Technology (IT) Security Risk Management is a critical task for the organization to protect against the loss of confidentiality, integrity and availability of IT resources. As systems bgecome more complex and diverse and and attacks from intrusions and malicious content increase, it is becoming increasingly difficult to manage IT security risk. This paper describes a two-pronged approach in addressing IT security risk and risk management in the organization: 1) an institutional enterprise appraoch, and 2) a project life cycle approach.

  15. The Supply Chain Risk Management

    OpenAIRE

    Skitsko Volodymyr I.; Voynikov Mykola Yu.

    2018-01-01

    The article considers current approaches of risk-management in supply chains, the main steps of the risk management process are analyzed and detailed both for a separate enterprise – participant of supply chain, for the supply chain in general, and for the Beer game, based on the international risk management standards. The article provides a way to assess the risks of the «producer» in the Beer game according to the three strategies of its behavior, which presumably can correspond to differe...

  16. Tank waste remediation system risk management list

    International Nuclear Information System (INIS)

    Collard, L.B.

    1995-01-01

    The Tank Waste Remedation System (TWRS) Risk Management List and it's subset of critical risks, the Critical Risk Management List, provide a tool to senior RL and WHC management (Level-1 and -2) to manage programmatic risks that may significantly impact the TWRS program. The programmatic risks include cost, schedule, and performance risks. Performance risk includes technical risk, supportability risk (such as maintainability and availability), and external risk (i.e., beyond program control, for example, changes in regulations). The risk information includes a description, its impacts, as evaluation of the likelihood, consequences and risk value, possible mitigating actions, and responsible RL and WHC managers. The issues that typically form the basis for the risks are presented in a separate table and the affected functions are provided on the management lists

  17. Risk management versus incentives

    International Nuclear Information System (INIS)

    Aven, E.; Lovas, K.; Osmundsen, P.

    2006-01-01

    Portfolio theory indicates that risk management should take place at the group level. Hedging at the project level or in the individual business areas may lead to suboptimal results. However, the efficiency of a profit centre depends on its management's being able to influence factors that are crucial to the unit's financial results. Price hedging could be one such factor. In the wider perspective, this constitutes part of the balancing between centralisation and decentralisation. This article covers important elements of risk management and incentive design. It goes on to discuss the balancing of overall risk management at the group level and incentive design in profit centres and corporate units. Throughout the article, the oil industry serves as a case. (author)

  18. NeuroManager: A workflow analysis based simulation management engine for computational neuroscience

    Directory of Open Access Journals (Sweden)

    David Bruce Stockton

    2015-10-01

    Full Text Available We developed NeuroManager, an object-oriented simulation management software engine for computational neuroscience. NeuroManager automates the workflow of simulation job submissions when using heterogeneous computational resources, simulators, and simulation tasks. The object-oriented approach 1 provides flexibility to adapt to a variety of neuroscience simulators, 2 simplifies the use of heterogeneous computational resources, from desktops to super computer clusters, and 3 improves tracking of simulator/simulation evolution. We implemented NeuroManager in Matlab, a widely used engineering and scientific language, for its signal and image processing tools, prevalence in electrophysiology analysis, and increasing use in college Biology education. To design and develop NeuroManager we analyzed the workflow of simulation submission for a variety of simulators, operating systems, and computational resources, including the handling of input parameters, data, models, results, and analyses. This resulted in twenty-two stages of simulation submission workflow. The software incorporates progress notification, automatic organization, labeling, and time-stamping of data and results, and integrated access to Matlab's analysis and visualization tools. NeuroManager provides users with the tools to automate daily tasks, and assists principal investigators in tracking and recreating the evolution of research projects performed by multiple people. Overall, NeuroManager provides the infrastructure needed to improve workflow, manage multiple simultaneous simulations, and maintain provenance of the potentially large amounts of data produced during the course of a research project.

  19. Managing Associated Risks in Cloud Computer Applications Abstract

    African Journals Online (AJOL)

    2012-12-01

    Dec 1, 2012 ... Cloud Computing, the long-held dream of computing as a utility, has the potential to transform a .... standard approaches to many of the issues, although simple cut .... collapse; So security and privacy are high priorities for all ...

  20. Future Communication, Computing, Control and Management Volume 1

    CERN Document Server

    2012-01-01

    This volume contains revised and extended research articles written by prominent researchers participating in the ICF4C 2011 conference. 2011 International Conference on Future Communication, Computing, Control and Management (ICF4C 2011) has been held on December 16-17, 2011, Phuket, Thailand. Topics covered include intelligent computing, network management, wireless networks, telecommunication, power engineering, control engineering, Signal and Image Processing, Machine Learning, Control Systems and Applications, The book will offer the states of arts of tremendous advances in Computing, Communication, Control, and Management and also serve as an excellent reference work for researchers and graduate students working on Computing, Communication, Control, and Management Research.

  1. Future Communication, Computing, Control and Management Volume 2

    CERN Document Server

    2012-01-01

    This volume contains revised and extended research articles written by prominent researchers participating in the ICF4C 2011 conference. 2011 International Conference on Future Communication, Computing, Control and Management (ICF4C 2011) has been held on December 16-17, 2011, Phuket, Thailand. Topics covered include intelligent computing, network management, wireless networks, telecommunication, power engineering, control engineering, Signal and Image Processing, Machine Learning, Control Systems and Applications, The book will offer the states of arts of tremendous advances in Computing, Communication, Control, and Management and also serve as an excellent reference work for researchers and graduate students working on Computing, Communication, Control, and Management Research.

  2. Future Computing, Communication, Control and Management Volume 2

    CERN Document Server

    2012-01-01

    This volume contains revised and extended research articles written by prominent researchers participating in the ICF4C 2011 conference. 2011 International Conference on Future Communication, Computing, Control and Management (ICF4C 2011) has been held on December 16-17, 2011, Phuket, Thailand. Topics covered include intelligent computing, network management, wireless networks, telecommunication, power engineering, control engineering, Signal and Image Processing, Machine Learning, Control Systems and Applications, The book will offer the states of arts of tremendous advances in Computing, Communication, Control, and Management and also serve as an excellent reference work for researchers and graduate students working on Computing, Communication, Control, and Management Research.

  3. Computer technologies for industrial risk prevention and emergency management; Tecnologie informatiche per la prevenzione dei rischi industriali e la gestione delle emergenze

    Energy Technology Data Exchange (ETDEWEB)

    Balducelli, C; Bologna, S; Di Costanzo, G; Vicoli, G [ENEA, Centro Ricerche Casaccia, Rome (Italy). Dip. Energia

    1996-07-01

    This document provides an overview about problems related to the engineering of computer based systems for industrial risk prevention and emergency management. Such systems are rather complex and subject to precise reliability and safety requirements. With the evolution of information technologies, such systems are becoming to be the means for building protective barriers for reduction of risk associated with plant operations. For giving more generality to this document, and for not concentrating on only a specific plant, the emergency management systems will be dealt with more details than ones for accident prevention. The document is organized in six chapters. Chapter one is an introduction to the problem and to its state of art, with particular emphasis to the aspects of safety requirements definition. Chapter two is an introduction to the problems related to the emergency management and to the training of operators in charge of this task. Chapter three deals in details the topic of the Training Support Systems, in particular about MUSTER (multi-user system for training and evaluation of environmental emergency response) system. Chapter four deals in details the topic of decision support systems, in particular about ISEM (information technology support for emergency management) system. Chapter five illustrates an application of support to the operators of Civil Protection Department for the management of emergencies in the fields of industrial chemical. Chapter six is about a synthesis of the state of art and the future possibilities, identifying some research and development activities more promising for the future.

  4. Risk Management Practices by Barbadian Banks

    Directory of Open Access Journals (Sweden)

    Anthony Wood

    2013-07-01

    The main findings of the paper are: risk managers perceive risk management as critical to their banks’ performance; the types of risks causing the greatest exposures are credit risk, operational risk, country/sovereign risk, interest rate risk and market risk; there was a high level of success with current risk management practices and these practices have evolved over time in line with the changing economic environment and regulatory updates. Overall, the findings suggest strongly that in light of the current depressed economic climate, banks operating in Barbados are indeed risk-focused or might we say “risk intelligent”.

  5. Probabilistic risk assessment as an aid to risk management

    International Nuclear Information System (INIS)

    Garrick, B.J.

    1982-01-01

    Probabilistic risk assessments are providing important insights into nuclear power plant safety. Their value is two-fold: first as a means of quantifying nuclear plant risk including contributors to risk, and second as an aid to risk management. A risk assessment provides an analytical plant model that can be the basis for performing meaningful decision analyses for controlling safety. It is the aspect of quantitative risk management that makes probabilistic risk assessment an important technical discipline of the future

  6. INTERNAL AUDIT AND RISK MANAGEMENT

    Directory of Open Access Journals (Sweden)

    Elena RUSE

    2014-04-01

    Full Text Available The existence of risk in economic activity can not be denied. In fact, the risk is a concept which exists in every activity, the term of risk being identified with uncertainty, respectively the (unchance to produce an undesirable event. Internal audit and risk management aim at the same goal, namely the control of risks. Internal Audit performs several roles in risk management plan. The objectives of the internal audit function varies from company to company, but in all economic entities internal audit department aims to improve performance management, enterprise performance and thus improve the internal control system. This paper aims to demonstrate, among other things, that any event that may result in failure is unquestionably classified as risk.

  7. Branding and the Risk Management Imperative

    OpenAIRE

    Fournier Susan; Srinivasan Shuba

    2018-01-01

    In an increasingly risky socioeconomic environment, management needs to proactively consider brand-related risks. To understand brands as tools for risk management, they need to understand four types of brand risk: brand reputation risk, brand dilution risk, brand cannibalization risk and brand stretch risk.

  8. 42 CFR 441.476 - Risk management.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 4 2010-10-01 2010-10-01 false Risk management. 441.476 Section 441.476 Public... Self-Directed Personal Assistance Services Program § 441.476 Risk management. (a) The State must... plan for how identified risks will be mitigated. (d) The State must ensure that the risk management...

  9. Methods of Financial Risk Management

    Directory of Open Access Journals (Sweden)

    Korzh Natalia

    2016-10-01

    Full Text Available The essence and nature of financial risks are investigated. Their classification is conducted. The features of financial risk management and the main methods of management are considered. The ways of risk compensation are identified. It is proved that the objective external risk basis is such market imperfections as externalities of enterprises and incomplete information about the operation of the business environment and internal objective basis risk – the objective function to maximise profits in a competitive environment. It is revealed that to compensate market imperfections business entities should develop a strategy that combines fill in missing information and neutralise or minimise externalities that tactically implemented in financial risk management programs.

  10. Risk Management and Risk Psychology in Romanian Sme’s

    Directory of Open Access Journals (Sweden)

    Irina Dănciulescu

    2015-12-01

    Full Text Available Risk is one of the biggest and most fascinating challenges of all times for humanity, because of its presence in all fields. Risk management as a component of modern management, has become a main concern for the modern world and one of the “key mechanisms” of economic development, a complex processn that includes a series of activities meant to alleviate the impact of risk over business and planed or foreseen results. This paper wants to bring to attention the importance of risks and their management in today’s economic crisis. The sector presented is the IT& C, especially software, because Romania had a growth in this area for a few years but beginning the crisis this segment in economy had known a serious decrease. This paper tries to connect risk management and risk psychology to Romanian economy, culture and mentality. The paper presents in short some of risk management characteristics, definitions and few opinions; why in Romania this subject is not treated with the appropriate attention. The paper at hand focuses on the psychology of risk and how it affects the life of individuals and the existence of companies, the importance it should have on day to day basis, especially in Romania

  11. MANAGEMENT OF SECURITY FOR BANK LOANS ON THE BASIS OF RISK MANAGEMENT

    Directory of Open Access Journals (Sweden)

    Viktoriia Kovalenko

    2016-03-01

    Full Text Available The article aims to study methods and tools for risk management to ensure bank loans.  Proved that the effectiveness of risk management to ensure bank loans depends on consistency,  adequacy methods of evaluation, quality monitoring and timely response system of the banks and the  regulator. The article is to develop recommendations to improve the effectiveness of risk management providing bank loans considering the risks inherent in the process support mortgage portfolio of banks in the  face of considerable uncertainty functioning banks. It is proved that the risk provision of bank loans in the loan management should be considered  through risk characteristics that form the aggregate credit risk. Substantiated that risk management software meets the classic risk management, which identifies  four main stages: identification; risk assessment software; control risk; minimizing risk. Keywords: credit risk provision, loan, risk management, reserves.JEL: G 28

  12. Branding and the Risk Management Imperative

    Directory of Open Access Journals (Sweden)

    Fournier Susan

    2018-05-01

    Full Text Available In an increasingly risky socioeconomic environment, management needs to proactively consider brand-related risks. To understand brands as tools for risk management, they need to understand four types of brand risk: brand reputation risk, brand dilution risk, brand cannibalization risk and brand stretch risk.

  13. Risk assessment and management logistics chains

    Directory of Open Access Journals (Sweden)

    Vladimir Vikulov

    2014-03-01

    Full Text Available Background: In the context of economic globalization and increasing complexity of economic relations enterprises need methods and techniques to improve and sustain their position on the global market. Integration processes offer business new opportunities, but at the same time present new challenges for the management, including the key objectives of the risk management. Method: On the basis of analysis tools known from the pertinent literature (Supply Chain Management and Supply Chain Risk Management methods, methods of probability theory, methods of risk management, methods of statistics the authors of this paper proposed their own risk assessment method and the method of management of logistics chains. The proposed tool is a specific hybrid of solutions known from the literature. Results: The presented method has been successfully used within the frames of economic-mathematical model of industrial enterprises. Indicators of supply chain risks, including risks caused by supplier are considered in this paper. Authors formed a method of optimizing the level of supply chain risk in the integration with suppliers and customers. Conclusion: Every organization, which starting the process of integration with supplier and customers, needs to use tools, methodologies and techniques for identification of "weak links" in the supply chain. The proposed method allows to fix risk origin places in various links of the supply chain and to identify "weak links" of a logistic chain that may occur in the future. The method is a useful tool for managing not only risks and risk situations, but also to improve the efficiency of current assets management by providing the ability to optimize the level of risk in the current assets management of the industrial enterprise.

  14. Risk management for whales

    OpenAIRE

    Cont, R; Wagalath, L

    2016-01-01

    We propose framework for modeling portfolio risk which integrates market risk with liquidation costs which may arise in stress scenarios. Our model provides a systematic method for computing liquidation-adjusted risk measures for a portfolio. Calculation of Liquidation-adjusted VaR (LVaR) for sample portfolios reveals a substantial impact of liquidation costs on portfolio risk for portfolios with large concentrated positions.

  15. Considerations on Integrating Risk and Quality Management

    Directory of Open Access Journals (Sweden)

    Maria POPESCU

    2011-03-01

    Full Text Available This paper aims to highlight the links between risk management and quality management and to study the possibility of their integrated approach. The study reviews the evolution of risk approach within organizations and stresses the need to increase the effectiveness of this approach by incorporating risk management methodology in the quality management system. Starting from this idea, the authors present the current state of risk approach into quality management, basic rules of integrated quality-risk management and major difficulties which may arise in the implementation of integrated quality–risk systems.

  16. Records management and risk management at Kenya Commercial Bank Limited, Nairobi

    Directory of Open Access Journals (Sweden)

    Cleophas Ambira

    2011-03-01

    Full Text Available Background: This paper reported empirical research findings of an MPhil in Information Sciences (Records and Archives Management study conducted at Moi University in Eldoret, Kenya between September 2007 and July 2009.Objectives: The aim of the study was to investigate records management and risk management at Kenya Commercial Bank (KCB Ltd, in the Nairobi area and propose recommendations to enhance the functions of records and risk management at KCB. The specific objectives of the study were to, (1 establish the nature and type of risks to which KCB is exposed, (2 conduct business process analysis and identify the records generated by KCB, (3 establish the extent to which records management is emphasised within KCB as a tool to managing risk, (4 identify which vital records of KCB need protection because of their nature and value to the bank and (5 make recommendations to enhance current records management practices to support the function of risk management in KCB.Method: The study was qualitative. Data were collected through face-to-face interviews. The theoretical framework of the study involved triangulation of the records continuum model by Frank Upward (1980 and the integrated risk management model by the Government of Canada (2000.Results: The key findings of the study were, (1 KCB is exposed to a wide range of risks by virtue of its business, (2 KCB generates a lot of records in the course of its business activities and (3 there are inadequate records management practices and systems, the lack of which undermines the risk management function.Conclusion: The findings of this study have revealed the need to strengthen records management as a critical success factor in risk mitigation within KCB and, by extension, the Kenyan banking industry. A records management model was proposed to guide the management of records within an enterprise-wide risk management framework in the bank.

  17. Teaching Disaster Risk Management: Lessons from the Rotman School of Management

    Directory of Open Access Journals (Sweden)

    ANDRÁS TILCSIK

    Full Text Available This article describes how disaster risk management topics are taught at the Rotman School of Management at the University of Toronto and thus highlights opportunities for developing similar course modules on disaster risk management at other institutions. An undergraduate and MBA elective course, titled Catastrophic Failure in Organizations, contains four modules that are directly relevant to disaster risk management. The first module focuses on the need to move from risk indifference to risk sensitivity. The second module considers the importance of business continuity and crisis management plans and explores their common shortcomings. The third module uses a case study to examine the topic of prospective risk management. The fourth module focuses on the vulnerability of supply chains and other complex systems to disaster risk. The article describes the details of implementing these modules and discusses opportunities for further integration of disaster risk management topics in other parts of the curriculum.

  18. International and Russian practice of banking risk-management. Mortgage risks

    Directory of Open Access Journals (Sweden)

    A. V. Nikolaeva

    2016-01-01

    Full Text Available The goal of the work is to compare Russian norms and standards of risk management of mortgage lending with international standards of risk management based on the documents of the Basel Committee. The article also aims to analyze new banking tools of risk management of mortgage lending, that arise in connection with the application of international norms and standards of risk management.Materials and Methods: The main documents considered in the article are the agreements on capital, issued by the Basel Committee on Banking Supervision: Basel-I (1988, Basel-II (2004 and Basel-III (2010, as well as instructions and standing orders issued by the Central Bank of Russia, including: Instruction № 139-I "Ob obiazatel'nykh normativakh bankov", instruction № 1 "O poriadke regulirovaniia deiatel'nosti kommercheskikh bankov", the standing order number 215-P "O metodike opredeleniia sobstvennykh sredstv (kapitala kreditnykh organizatsii", the standing order № 395-P "O metodike opredeleniia velichiny sobstvennykh sredstv (kapitala kreditnykh organizatsii («BAZEL III»" and others. On the basis of these documents the work examines and summarizes the main methods of risk management of mortgage lending, such as: comparison and analysis of risk management techniques, study of the basic documents regulating risk management in banks and generalization of risk management methods in the segment of mortgage lending.Results: The article analyzes the legal and methodological basis of risk management and provides practical methods that can be used in practice for managerial decisions in a constantly changing external economic environment. It also analyses international and native risk management. Russian standards of risk-management are compared with international. The work conducts a critical review of the effects of introduction of international standards in Russia. Special attention is paid to the practice of mortgage risk-management

  19. Risk Management and Simulation

    DEFF Research Database (Denmark)

    Skovmand, David

    2014-01-01

    Review of: Risk Management and Simulation / Aparna Gupta. Boca Raton, FL: CRC Press, 2013, xxix + 491 pp., $99.95(H), ISBN: 978-1-4398-3594-4.......Review of: Risk Management and Simulation / Aparna Gupta. Boca Raton, FL: CRC Press, 2013, xxix + 491 pp., $99.95(H), ISBN: 978-1-4398-3594-4....

  20. Overview of the Hanford risk management plan

    International Nuclear Information System (INIS)

    Halverson, T.G.

    1998-01-01

    The Project Hanford Management Contract called for the enhancement of site-wide decision processes, and development of a Hanford Risk Management Plan to adopt or develop a risk management system for the Hanford Site. This Plan provides a consistent foundation for Site issues and addresses site-wide management of risks of all types. It supports the Department of Energy planning and sitewide decision making policy. Added to this requirement is a risk performance report to characterize the risk management accomplishments. This paper presents the development of risk management within the context of work planning and performance. Also discussed are four risk elements which add value to the context

  1. Overcoming Learning Aversion in Evaluating and Managing Uncertain Risks.

    Science.gov (United States)

    Cox, Louis Anthony Tony

    2015-10-01

    Decision biases can distort cost-benefit evaluations of uncertain risks, leading to risk management policy decisions with predictably high retrospective regret. We argue that well-documented decision biases encourage learning aversion, or predictably suboptimal learning and premature decision making in the face of high uncertainty about the costs, risks, and benefits of proposed changes. Biases such as narrow framing, overconfidence, confirmation bias, optimism bias, ambiguity aversion, and hyperbolic discounting of the immediate costs and delayed benefits of learning, contribute to deficient individual and group learning, avoidance of information seeking, underestimation of the value of further information, and hence needlessly inaccurate risk-cost-benefit estimates and suboptimal risk management decisions. In practice, such biases can create predictable regret in selection of potential risk-reducing regulations. Low-regret learning strategies based on computational reinforcement learning models can potentially overcome some of these suboptimal decision processes by replacing aversion to uncertain probabilities with actions calculated to balance exploration (deliberate experimentation and uncertainty reduction) and exploitation (taking actions to maximize the sum of expected immediate reward, expected discounted future reward, and value of information). We discuss the proposed framework for understanding and overcoming learning aversion and for implementing low-regret learning strategies using regulation of air pollutants with uncertain health effects as an example. © 2015 Society for Risk Analysis.

  2. Hybrid Risk Management Methodology: A Case Study

    Directory of Open Access Journals (Sweden)

    Jacky Siu-Lun Ting

    2009-10-01

    Full Text Available Risk management is a decision-making process involving considerations of political, social, economic and engineering factors with relevant risk assessments relating to a potential hazard. In the last decade, a number of risk management tools are introduced and employed to manage and minimize the uncertainty and threats realization to the organizations. However, the focus of these methodologies are different; in which companies need to adopt various risk management principles to visualize a full picture of the organizational risk level. Regarding to this, this paper presents a new approach of risk management that integrates Hierarchical Holographic Modeling (HHM, Enterprise Risk Management (ERM and Business Recovery Planning (BCP for identifying and assessing risks as well as managing the consequences of realized residual risks. To illustrate the procedures of the proposed methodology, a logistic company ABC Limited is chosen to serve as a case study Through applying HHM and ERM to investigate and assess the risk, ABC Limited can be better evaluated the potential risks and then took the responsive actions (e.g. BCP to handle the risks and crisis in near future.

  3. INTERNAL AUDIT AND RISK MANAGEMENT

    OpenAIRE

    Elena RUSE; Georgiana SUSMANSCHI (BADEA); Daniel DĂNECI-PĂTRĂU

    2014-01-01

    The existence of risk in economic activity can not be denied. In fact, the risk is a concept which exists in every activity, the term of risk being identified with uncertainty, respectively the (un)chance to produce an undesirable event. Internal audit and risk management aim at the same goal, namely the control of risks. Internal Audit performs several roles in risk management plan. The objectives of the internal audit function varies from company to company, but in all economic entities int...

  4. Systematic implementation of clinical risk management in a large university hospital: the impact of risk managers.

    Science.gov (United States)

    Sendlhofer, Gerald; Brunner, Gernot; Tax, Christa; Falzberger, Gebhard; Smolle, Josef; Leitgeb, Karina; Kober, Brigitte; Kamolz, Lars Peter

    2015-01-01

    For health care systems in recent years, patient safety has increasingly become a priority issue. National and international strategies have been considered to attempt to overcome the most prominent hazards while patients are receiving health care. Thereby, clinical risk management (CRM) plays a dominant role in enabling the identification, analysis, and management of potential risks. CRM implementation into routine procedures within complex hospital organizations is challenging, as in the past, organizational change strategies using a top-down approach have often failed. Therefore, one of our main objectives was to educate a certain number of risk managers in facilitating CRM using a bottom-up approach. To achieve our primary purpose, five project strands were developed, and consequently followed, introducing CRM: corporate governance, risk management (RM) training, CRM process, information, and involvement. The core part of the CRM process involved the education of risk managers within each organizational unit. To account for the size of the existing organization, we assumed that a minimum of 1 % of the workforce had to be trained in RM to disseminate the continuous improvement of quality and safety. Following a roll-out plan, CRM was introduced in each unit and potential risks were identified. Alongside the changes in the corporate governance, a hospital-wide CRM process was introduced resulting in 158 trained risk managers correlating to 2.0 % of the total workforce. Currently, risk managers are present in every unit and have identified 360 operational risks. Among those, 176 risks were scored as strategic and clustered together into top risks. Effective meeting structures and opportunities to share information and knowledge were introduced. Thus far, 31 units have been externally audited in CRM. The CRM approach is unique with respect to its dimension; members of all health care professions were trained to be able to identify potential risks. A network of risk

  5. Risk Management in Insurance Companies

    OpenAIRE

    Yang, Xufeng

    2006-01-01

    Insurance is the uncertain business in uncertain society. Today, insures face more complex and difficult risks. Efficient risk management mechanisms are essential for the insurers. The paper is set out initially to explore UK insurance companies risk management and risk disclosure by examining companies annual report after all the listed insurance companies are required to disclose risk information in their annual report, which seeks to reflect the recent development in UK insurance companies...

  6. Financial risk management of pharmacy benefits.

    Science.gov (United States)

    Saikami, D

    1997-10-01

    Financial risk management of pharmacy benefits in integrated health systems is explained. A managed care organization should assume financial risk for pharmacy benefits only if it can manage the risk. Horizontally integrated organizations often do not have much control over the management of drug utilization and costs. Vertically integrated organizations have the greatest ability to manage pharmacy financial risk; virtual integration may also be compatible. Contracts can be established in which the provider is incentivized or placed at partial or full risk. The main concerns that health plans have with respect to pharmacy capitation are formulary management and the question of who should receive rebates from manufacturers. The components needed to managed pharmacy financial risk depend on the type of contract negotiated. Health-system pharmacists are uniquely positioned to take advantage of opportunities opening up through pharmacy risk contracting. Functions most organizations must provide when assuming pharmacy financial risk can be divided into internal and external categories. Internally performed functions include formulary management, clinical pharmacy services and utilization management, and utilization reports for physicians. Functions that can be outsourced include claims processing and administration, provider- and customer support services, and rebates. Organizations that integrate the pharmacy benefit across the health care continuum will be more effective in controlling costs and improving outcomes than organizations that handle this benefit as separate from others. Patient care should not focus on payment mechanisms and unit costs but on developing superior processes and systems that improve health care.

  7. RI management by personal computer

    International Nuclear Information System (INIS)

    Ono, Isamu; Hiyoshi, Katsunori; Ono, Kazuhiko; Morimitsu, Wataru

    1983-01-01

    For RI-handling facilities up to medium scale, it has been studied whether a personal computer is applicable to the practical management of radioisotopes. In the present system, the number of writing in mini floppy disks is 1280 articles per diskette, which is the sufficient capacity for a storage medium for one year in variety of books. The correction of radioactivity decay as well as various totalizations can be made easily, so that the state of RI storage and use for the whole RI-handling facility can be grasped. Further, by the improvement of the output formats, the transfer to the books as obligated to write is possible. From the above reason, a personal computer is practically applicable with the management system and also leads to labor saving in RI management personnel. (Mori, K.)

  8. Gender, Race, and Risk: Intersectional Risk Management in the Sale of Sex Online.

    Science.gov (United States)

    Moorman, Jessica D; Harrison, Kristen

    2016-09-01

    Sex worker experience of risk (e.g., physical violence or rape) is shaped by race, gender, and context. For web-based sex workers, experience of risk is comparatively minimal; what is unclear is how web-based sex workers manage risk and if online advertising plays a role in risk management. Building on intersectionality theory and research exploring risk management in sex work, we content-analyzed 600 escort advertisements from Backpage.com ( http://www.backpage.com ) to explore risk management in web-based sex work. To guide our research we asked: Do advertisements contain risk management messages? Does the use of risk management messaging differ by sex worker race or gender? Which groups have the highest overall use of risk management messages? Through a multivariate analysis of covariance (MANCOVA) we found that advertisements contained risk management messages and that uses of these phrases varied by race and gender. Blacks, women, and transgender women drove the use of risk management messages. Black and White transgender women had the highest overall use of these phrases. We conclude that risk management is an intersectional practice and that the use of risk management messages is a venue-specific manifestation of broader risk management priorities found in all venues where sex is sold.

  9. Risk perception as a driver for risk management policies

    Science.gov (United States)

    Carmona, María; Mañez, María

    2016-04-01

    Risk is generally defined as the "combination of the probability of the occurrence of an event and its negative consequences" ( UNISDR, 2009). However, the perception of a risk differs among cultures regarding different features such as the context,causes, benefits or damage. Risk perception is the subjective valuation of the probability of an event happening and how concerned individuals or groups are with the consequences (Sjöberg, 2004). Our study is based on an existing framework for risk perception (Rehn and Rohrmann, 2000). We analyse the characteristics of the risk perception regarding extreme events (e.g.droughts) and how the perception of the group drives the action to manage the risk. We do this to achieve an overview of the conditions that let stakeholders join each other to improve risk management especially when governments are not reacting properly. For our research, attention is paid on risk perception of Multi-Sector Partnerships not taking into account the individual level of risk perception. We focus on those factors that make risk management effective and increase resilience. Multi-Sector Partnerships, considered as significant governance structures for risk management, might contribute to reduce vulnerability in prone areas to natural hazards and disasters. The Multi-Sector Partnerships used for our research are existing partnerships identified in the cases studies of the European project ENHANCE. We implement a survey to analyse the perception of risk in the case studies. That survey is based on the Cultural Theory (Douglas and Wildavsky, 1982)and the Protection Motivation Theory (Rogers, 1975). We analyse the results using the Qualitative-Comparative Analysis proposed by Ragin in 1987. The results show the main characteristics of a risk culture that are beneficial to manage a risk. Those characteristics are shaped by the perception of risk of the people involved in the partnership, which in turn shapes their risk management. Nevertheless, we

  10. PERFORMANCE IN INTERNAL CONTROL AND RISK MANAGEMENT

    Directory of Open Access Journals (Sweden)

    JELER (POPA IOANA

    2017-06-01

    Full Text Available The purpose of this article is to highlight the importance of internal control and risk management. In practice, economic entities meet a variety of risks that have the origins from the internal environment or the external one. Although there are different of views on addressing the concept of risk - threats or opportunities, event or action, accordingly uncertain, proposed by specialists in risk management in this article we try to present these issues and identify techniques to counter risks occurrence. In this article we present also means managing risk and why needs to be implemented at institutional level a risk management. The paper concludes by highlight the role of efficient risk management in the company’s management and company's activities.

  11. Calysto: Risk Management for Commercial Manned Spaceflight

    Science.gov (United States)

    Dillaman, Gary

    2012-01-01

    The Calysto: Risk Management for Commercial Manned Spaceflight study analyzes risk management in large enterprises and how to effectively communicate risks across organizations. The Calysto Risk Management tool developed by NASA's Kennedy Space Center's SharePoint team is used and referenced throughout the study. Calysto is a web-base tool built on Microsoft's SharePoint platform. The risk management process at NASA is examined and incorporated in the study. Using risk management standards from industry and specific organizations at the Kennedy Space Center, three methods of communicating and elevating risk are examined. Each method describes details of the effectiveness and plausibility of using the method in the Calysto Risk Management Tool. At the end of the study suggestions are made for future renditions of Calysto.

  12. Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities

    OpenAIRE

    Buyya, Rajkumar; Yeo, Chee Shin; Venugopal, Srikumar

    2008-01-01

    This keynote paper: presents a 21st century vision of computing; identifies various computing paradigms promising to deliver the vision of computing utilities; defines Cloud computing and provides the architecture for creating market-oriented Clouds by leveraging technologies such as VMs; provides thoughts on market-based resource management strategies that encompass both customer-driven service management and computational risk management to sustain SLA-oriented resource allocation; presents...

  13. The Strategic-Renovation Banks’ Risks Management

    Directory of Open Access Journals (Sweden)

    Yeremeychuk Raisa A.

    2017-04-01

    Full Text Available The article is aimed at developing approaches to implementation of the strategic-renovation risk management. Essence of risk theories was researched, the concept of «risk» in the bank’s management system were analyzed. On the basis of a theoretical generalization of scientific literature and the carried out analysis of existing risk management strategies to ensure the security of banking business, the strategy of renovation management has been selected. Because bank risks are part of the economic risk system, they are complex in their nature. However, given the importance of bank risks, the interpretation of their essence is still a debating matter. In a certain number of cases, their essence is replaced by the cause of occurrence, that is, all the different circumstances, factors that lead to the losses. So today, banks are considering risks, in particular, not only as a source of possible losses, but also as an opportunity to generate additional profits. An algorithm for taking a strategic-renovation decision on the banks’ risks management system has been proposed.

  14. Risk, innovation and change : design propositions for implementing risk management in organizations

    NARCIS (Netherlands)

    van Staveren, Martinus Theodorus

    2009-01-01

    This Ph.D. research generated unique design propositions for implementing existing risk management methodologies in organizations. The resulting design propositions incorporate a synthesis of risk management, innovation management and change management. True implementation of risk management is

  15. Efficient Resource Management in Cloud Computing

    OpenAIRE

    Rushikesh Shingade; Amit Patil; Shivam Suryawanshi; M. Venkatesan

    2015-01-01

    Cloud computing, one of the widely used technology to provide cloud services for users who are charged for receiving services. In the aspect of a maximum number of resources, evaluating the performance of Cloud resource management policies are difficult to optimize efficiently. There are different simulation toolkits available for simulation and modelling the Cloud computing environment like GridSim CloudAnalyst, CloudSim, GreenCloud, CloudAuction etc. In proposed Efficient Resource Manage...

  16. TRECII: a computer program for transportation risk assessment

    International Nuclear Information System (INIS)

    Franklin, A.L.

    1980-05-01

    A risk-based fault tree analysis method has been developed at the Pacific Northwest Laboratory (PNL) for analysis of nuclear fuel cycle operations. This methodology was developed for the Department of Energy (DOE) as a risk analysis tool for evaluating high level waste management systems. A computer package consisting of three programs was written at that time to assist in the performance of risk assessment: ACORN (draws fault trees), MFAULT (analyzes fault trees), and RAFT (calculates risk). This methodology evaluates release consequences and estimates the frequency of occurrence of these consequences. This document describes an additional risk calculating code which can be used in conjunction with two of the three codes for transportation risk assessment. TRECII modifies the definition of risk used in RAFT (prob. x release) to accommodate release consequences in terms of fatalities. Throughout this report risk shall be defined as probability times consequences (fatalities are one possible health effect consequence). This methodology has been applied to a variety of energy material transportation systems. Typically the material shipped has been radioactive, although some adaptation to fossil fuels has occurred. The approach is normally applied to truck or train transport systems with some adaptation to pipelines and aircraft. TRECII is designed to be used primarily in conjunction with MFAULT; however, with a moderate amount of effort by the user, it can be implemented independent of the risk analysis package developed at PNL. Code description and user instructions necessary for the implementation of the TRECII program are provided

  17. An enhanced data-analytic framework for integrating risk management and performance management

    International Nuclear Information System (INIS)

    Thekdi, Shital; Aven, Terje

    2016-01-01

    There is increasing interest for agencies and industries to develop risk management processes for a wide variety of applications. Traditional risk management processes are motivated by controlling risk and avoiding losses. In contrast, other organizational processes focus on managing performance and value generation. In this paper we argue that risk management also adds an important contribution to these processes. However, this requires “proper” risk management extending beyond narrow safety oriented perspectives built on quantitative risk analysis and tolerability/acceptance criteria. There is need for a broad risk-performance framework with uncertainty being a main component of risk, and where knowledge and surprises are adequately reflected. In the paper we present and discuss such a framework. The framework is developed on the basis of an analysis of combinations of different risk management and performance management practices/policies. We show how the risk and performance management processes can be improved by proper risk conceptualization and a holistic thinking on how to develop and use goals in the organization, how to balance different concerns, and consider the need for agility – “sensitivity to operations”, as well as how to give weight to vulnerabilities, resilience, and antifragility. - Highlights: • We relate key performance management and risk management principles. • We propose an enhanced framework to unify thinking of performance and risk. • We apply the framework to a public-private partnership case study.

  18. Tank waste remediation system programmatic risk management plan

    International Nuclear Information System (INIS)

    Seaver, D.A.

    1995-01-01

    This risk management plan defines the approach to be taken to managing risks in the Tank Waste Remediation System (TWRS) program. It defines the actions to be taken at the overall program level, and the risk management requirements for lower-level projects and other activities. The primary focus of this plan is on ''programmatic'' risks, i.e., risks with respect to the cost, schedule, and technical performance of the program. The plan defines an approach providing managers with the flexibility to manage risks according to their specific needs, yet creates. The consistency needed for effectiveness across the program. The basic risk management approach uses a risk management list for the program, each project, and additional lower-level activities. The risk management list will be regularly reviewed and updated by appropriate level of management. Each list defines key risks, their likelihood and consequences, risk management actions to be taken, responsible individuals, and other management information

  19. Perspectives: Intellectual Risk Management

    Science.gov (United States)

    Hall, James C.

    2013-01-01

    Ask a college administrator about students and risk management, and you're likely to get a quick and agitated speech about alcohol consumption and bad behavior or a meditation on mental health and campus safety. But in colleges and universities, we manage intellectual risk-taking too. Bring that up, and you'll probably get little out of that same…

  20. How to manage project opportunity and risk why uncertainty management can be a much better approach than risk management

    CERN Document Server

    Ward, Stephen

    2011-01-01

    Since I wrote the Foreword for the second edition of this book, risk management processes have become much more widely used, but controversy about what should be done and how best to do it has grown. Managing risk is a risky business. Chapman and Ward provide an in-depth explanation of why it is important to understand and manage underlying uncertainty in all its forms, in order to realise opportunities more fully and enhance corporate performance. They show what best practice should look like. The implications go well beyond the conventional wisdom of project risk management, providing an enl

  1. Enterprise risk management: A process for enhanced management and improved performance

    OpenAIRE

    Gates , Stephen; Nicolas , Jean-Louis; Walker , Paul L.

    2012-01-01

    Some company boards of directors and management teams are still reluctant to embrace enterprise risk management (ERM) because of the uncertainty regarding its value to the bottom line. A survey of audit and risk management executives suggests that the use of ERM leads to increased management consensus, better-informed decisions, enhanced communication of risk taking, and greater management accountability.

  2. Risk Management Standards: Towards a contemporary, organisation-wide management approach

    OpenAIRE

    Koutsoukis, Nikitas-Spiros

    2010-01-01

    Risk management has been progressively evolving into a systemic approach for organisational decision making in today’s dynamic economic environment of the global era. In this context, risk management is reaching beyond its traditional finance and insurance application context and is entering the sphere of generic, organisation-wide management approaches. In support of this argument we consider four generic risk management standards issued at the institutional, national or international level...

  3. Risk management through dynamic technical specifications

    International Nuclear Information System (INIS)

    Klopp, George T.; Petersen, Thomas A.

    2004-01-01

    The wide deployment of plant specific probabilistic risk assessments for nuclear power plants has provided the means to effect a fresh risk management perspective and a fresh, risk based, regulatory outlook on nuclear power. There has been a great deal of conversation on risk based regulation within the U. S. nuclear power industry but, curiously, very little on effective risk management. This paper proposes a means to link the two subjects through the plant Technical Specifications. A revised concept for Technical Specifications is suggested which is based on deterministic analyses and probabilistic risk assessments for each plant. The revised Technical Specifications would consider, on a real-time basis, the exact state of the plant in terms of the status of key components and systems. It would depict current plant risk levels and compare those levels to the desired and limiting (alert/action) levels. It would advise the plant operator on the risk impact of proposed actions through a simple query system and illustrate the impact of such actions on plant status relative to designated risk values. The basis for the proposed approach lies in realistic deterministic plant analyses and probabilistic risk assessment (PRA) deployment tools being developed, in parallel, by a number of parties in the U.S. today. These PRAs are based primarily on the existing plant responses to Generic Letter 88-20, 'Individual Plant Examinations' (IPEs). Each of these tools allows the plant operator to input, on a real-time basis, the status of key equipment and systems. The tools then provide explicit illustrations of dependency effects; updated, 'real-time' risk status indications such as core damage frequency; and, in some cases, allow the operator to assess the risk impact of removing from service selected components for maintenance or testing. These systems generally operate on personal computers and provide nearly instantaneous responses to plant queries. Moving from these tools to

  4. Development of computerized risk management tool

    International Nuclear Information System (INIS)

    Kil Yoo Kim; Mee Jung Hwang; Seung Cheol Jang; Sang Hoon Han; Tae Woon Kim

    1997-01-01

    The author describes the kinds of efforts for the development of computerized risk management tool; (1) development of a risk monitor, Risk Monster, (2) improvement of McFarm (Missing Cutsets Finding Algorithm for Risk Monitor) and finally (3) development of reliability database management system, KwDBMan. Risk Monster supports for plant operators and maintenance schedulers to monitor plant risk and to avoid high peak risk by rearranging maintenance work schedule. Improved McFarm significantly improved calculation speed of Risk Monster for the cases of supporting system OOS (Out Of Service). KwDBMan manages event data, generic data and CCF (Common Cause Failure) data to support Risk Monster as well as PSA tool, KIRAP (KAERI Integrated Reliability Analysis Package)

  5. Understanding and managing risk attitude

    National Research Council Canada - National Science Library

    Hillson, David; Murray-Webster, Ruth

    2007-01-01

    ... This book highlights how risk attitude factors influence the human psyche, and carefully explains the impacts. Organisations seeking to dramatically improve the effectiveness of their risk management process will want to use this book's insights. Craig Peterson, President, PMI Risk Management SIG This book has prompted me to think more deeply as a change d...

  6. Risk Management and Value Creation

    DEFF Research Database (Denmark)

    Andersen, Torben Juul; Roggi, Oliviero

    Corporate failures, periodic recessions, regional debt crises and volatile financial markets have intensified the focus on risk management as the means to deal with turbulent conditions. The ability to respond effectively to abrupt environmental impacts is considered an important source...... of competitive advantage. Yet, surprisingly little research has analyzed whether the presumed advantages of effective risk management are associated with superior outcomes. Here we present a comprehensive study of risk management effectiveness and the relationship to corporate performance based on more than 33......,500 observations in 3,400 firms over the turbulent 20-year period 1991-2010. Determining effective risk management as the ability to reduce earnings and cash flow volatility, we find that both have significant positive relationships to lagged performance measures after controlling for industry effects, company...

  7. Managing risks and hazardous in industrial operations

    Energy Technology Data Exchange (ETDEWEB)

    Almaula, S.C. [Woodward-Clyde International, Oakland, CA (United States)

    1996-12-31

    The main objective of this paper is to demonstrate that it makes good business sense to identify risks and hazards of an operation and take appropriate steps to manage them effectively. Developing and implementing an effective risk and hazard management plan also contibutes to other industry requirements and standards. Development of a risk management system, key elements of a risk management plan, and hazards and risk analysis methods are outlined. Comparing potential risk to the cost of prevention is also discussed. It is estimated that the cost of developing and preparing the first risk management plan varies between $50,000 to $200,000. 3 refs., 2 figs., 1 tab.

  8. Business resilience: Reframing healthcare risk management.

    Science.gov (United States)

    Simeone, Cynthia L

    2015-09-01

    The responsibility of risk management in healthcare is fractured, with multiple stakeholders. Most hospitals and healthcare systems do not have a fully integrated risk management system that spans the entire organizational and operational structure for the delivery of key services. This article provides insight toward utilizing a comprehensive Business Resilience program and associated methodology to understand and manage organizational risk leading to organizational effectiveness and operational efficiencies, with the fringe benefit of realizing sustainable operational capability during adverse conditions. © 2015 American Society for Healthcare Risk Management of the American Hospital Association.

  9. Risk Management in the Exchange Fund Account

    OpenAIRE

    Michel Rochette

    2002-01-01

    In this article, author Michel Rochette of the Bank's Risk-Management Unit briefly describes the initiatives undertaken to identify, analyze, model, and manage the principal risks inherent in the transactions of the Exchange Fund Account (EFA), where the international reserves of the federal government are held. The author focuses on five types of risk: credit risk, market risk, liquidity risk, operational risk, and legal risk. In addition, the author presents the risk-management principles u...

  10. New technologies for the support of risk management. A systems-engineering point of view for the creation of risk information systems

    International Nuclear Information System (INIS)

    Beroggi, G.E.G.

    1995-01-01

    Within the framework of the poly project, the partial project 'Methodical Fundamentals and Computer Supported Risk Management' has developed two RISs (Risk Information Systems). The aim of the present book is to present the viewpoints gained in these new technologies and model formation attempts with which new RISs can be conceived and created. Because of the numerous new attempts, a compromise had to be made between the breadth and depth of the discussions whereby the breadth was preferred; which means that the aim is to define the broad range of RIS development as comprehensively as possible. The reader is meant to be motivated to think about the new technologies and their role in risk management. figs., tabs., refs

  11. 12 CFR 932.1 - Risk management.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Risk management. 932.1 Section 932.1 Banks and Banking FEDERAL HOUSING FINANCE BOARD FEDERAL HOME LOAN BANK RISK MANAGEMENT AND CAPITAL STANDARDS FEDERAL HOME LOAN BANK CAPITAL REQUIREMENTS § 932.1 Risk management. Before its new capital plan may take...

  12. RISK MANAGEMENT IN THE ELECTRONIC BUSINESS

    Directory of Open Access Journals (Sweden)

    Georgeta Soava

    2016-12-01

    Full Text Available Risk should not be understood as a destructive phenomenon, but bear in mind that managers who know how to use it can lead to real opportunities. Manager must first recognize the existence of risk, namely to identify and then use specific methods to avoid or reduce the risk. The purpose of this paper is to enter the world, at all simple, of risk management, relatively easy concept to understand but not so easy to put into practice. Of course, the approach relates primarily at the risks inherent of the business in digital environments, but they not represent only a particular case of the risks they are exposed, in general, the companies. In the paper we put in evidence the significance in general business, risks in e-business, then we added a description of the types of security risks, an exemplification of these and a series of test scenarios, and finally to make a analysis of operational solutions of risk management

  13. Trends in risk management in nuclear industry

    International Nuclear Information System (INIS)

    Kim, Inn Seock

    1996-01-01

    Safety management may be classified into three dimensions: risk management, accident management, and emergency management. This paper addresses the recent trends of safety management in nuclear industry, focussing on risk management and accident management

  14. TRManager – Technical Risk Manager

    Directory of Open Access Journals (Sweden)

    Mark A. Gregory

    2009-06-01

    Full Text Available This paper presents research into the development of a new information management technique called Technical Risk Manager. Project management involves the use of processes and information management techniques to aid decision making in the pursuit of project success. Project success may be achieved by meeting time, cost or performance criteria. Current project management practices focus on achieving time and cost project success criteria by using three information management techniques developed in the 1950s: Gantt, PERT and Critical Path Method. Technical Risk Manager has been developed to provide an information management technique that may be used to aid project management decision making in the pursuit of achieving the performance project success criteria.

  15. Activity-based computing: computational management of activities reflecting human intention

    DEFF Research Database (Denmark)

    Bardram, Jakob E; Jeuris, Steven; Houben, Steven

    2015-01-01

    paradigm that has been applied in personal information management applications as well as in ubiquitous, multidevice, and interactive surface computing. ABC has emerged as a response to the traditional application- and file-centered computing paradigm, which is oblivious to a notion of a user’s activity...

  16. Integrated supply chain risk management

    OpenAIRE

    Riaan Bredell; Jackie Walters

    2007-01-01

    Integrated supply chain risk management (ISCRM) has become indispensable to the theory and practice of supply chain management. The economic and political realities of the modern world require not only a different approach to supply chain management, but also bold steps to secure supply chain performance and sustainable wealth creation. Integrated supply chain risk management provides supply chain organisations with a level of insight into their supply chains yet to be achieved. If correctly ...

  17. Framework of Resource Management for Intercloud Computing

    Directory of Open Access Journals (Sweden)

    Mohammad Aazam

    2014-01-01

    Full Text Available There has been a very rapid increase in digital media content, due to which media cloud is gaining importance. Cloud computing paradigm provides management of resources and helps create extended portfolio of services. Through cloud computing, not only are services managed more efficiently, but also service discovery is made possible. To handle rapid increase in the content, media cloud plays a very vital role. But it is not possible for standalone clouds to handle everything with the increasing user demands. For scalability and better service provisioning, at times, clouds have to communicate with other clouds and share their resources. This scenario is called Intercloud computing or cloud federation. The study on Intercloud computing is still in its start. Resource management is one of the key concerns to be addressed in Intercloud computing. Already done studies discuss this issue only in a trivial and simplistic way. In this study, we present a resource management model, keeping in view different types of services, different customer types, customer characteristic, pricing, and refunding. The presented framework was implemented using Java and NetBeans 8.0 and evaluated using CloudSim 3.0.3 toolkit. Presented results and their discussion validate our model and its efficiency.

  18. Risks in hospitals. Assessment and Management

    Directory of Open Access Journals (Sweden)

    Bradea Ioana-Alexandra

    2014-12-01

    Full Text Available In a complex world, characterized by a multitude of risks, managers need to manage the risks they encounter, in an efficient way and in the shortest time possible. In the current economic crisis, the concept of hospital risk management, as the process in which is identified, analyzed, reduced, or avoided a risk that may affect the hospital, gained great importance. The Romanian health system, distinguished by: lack of transparency, poor funding, the loss of the valuable medical staff, lack of hospitals in villages and small towns, inability to engage patients due to the old and poor equipment, lack of research and problems in information privacy and cyber-security, requires an appropriate management, enabling risk managers to take decisions in order to avoid the occurrence of risks. Important for the functioning of every hospital is the perception of patients and their degree of satisfaction, regarding the quality of services, which depend largely on the quality of human resources. But what are the human resources weaknesses and risks from the patient point of view? What are the risk indicators which must be monitored to avoid risks? And also, which is the most useful method for measurement and assessment of risk?

  19. [Does clinical risk management require a structured conflict management?].

    Science.gov (United States)

    Neumann, Stefan

    2015-01-01

    A key element of clinical risk management is the analysis of errors causing near misses or patient damage. After analyzing the causes and circumstances, measures for process improvement have to be taken. Process management, human resource development and other established methods are used. If an interpersonal conflict is a contributory factor to the error, there is usually no structured conflict management available which includes selection criteria for various methods of conflict processing. The European University Viadrina in Frankfurt (Oder) has created a process model for introducing a structured conflict management system which is suitable for hospitals and could fill the gap in the methodological spectrum of clinical risk management. There is initial evidence that a structured conflict management reduces staff fluctuation and hidden conflict costs. This article should be understood as an impulse for discussion on to what extent the range of methods of clinical risk management should be complemented by conflict management.

  20. An Integrated Cyber Security Risk Management Approach for a Cyber-Physical System

    Directory of Open Access Journals (Sweden)

    Halima Ibrahim Kure

    2018-05-01

    Full Text Available A cyber-physical system (CPS is a combination of physical system components with cyber capabilities that have a very tight interconnectivity. CPS is a widely used technology in many applications, including electric power systems, communications, and transportation, and healthcare systems. These are critical national infrastructures. Cybersecurity attack is one of the major threats for a CPS because of many reasons, including complexity and interdependencies among various system components, integration of communication, computing, and control technology. Cybersecurity attacks may lead to various risks affecting the critical infrastructure business continuity, including degradation of production and performance, unavailability of critical services, and violation of the regulation. Managing cybersecurity risks is very important to protect CPS. However, risk management is challenging due to the inherent complex and evolving nature of the CPS system and recent attack trends. This paper presents an integrated cybersecurity risk management framework to assess and manage the risks in a proactive manner. Our work follows the existing risk management practice and standard and considers risks from the stakeholder model, cyber, and physical system components along with their dependencies. The approach enables identification of critical CPS assets and assesses the impact of vulnerabilities that affect the assets. It also presents a cybersecurity attack scenario that incorporates a cascading effect of threats and vulnerabilities to the assets. The attack model helps to determine the appropriate risk levels and their corresponding mitigation process. We present a power grid system to illustrate the applicability of our work. The result suggests that risk in a CPS of a critical infrastructure depends mainly on cyber-physical attack scenarios and the context of the organization. The involved risks in the studied context are both from the technical and

  1. Risk management as a social defence against anxiety

    Directory of Open Access Journals (Sweden)

    Dirk J. Geldenhuys

    2012-03-01

    Research purpose: The aim of the study is to describe how risk management unconsciously influences behaviour when doing business in an African country. Motivation for the study: Operational risk management is a rational management imperative. However, this does not take cognisance of the unconscious role of risk management. A systems-psychodynamic perspective might be particularly relevant if the anxiety implied in risk management is not appropriately contained. Awareness of these dynamics may provide an opportunity for addressing them and allow for a more holistic way of managing risk. Research design, approach and method: The researchers conducted the study as a qualitative case study in an African country. They used purposive sampling and analysed the data using qualitative content analysis. Main findings: Viewing risk management from a systems-psychodynamic perspective allowed the researchers to identify the influence of risk management on the behaviour of people. The emerging hypothesis was that, if businesses do not address the anxiety underlying risk management, managing risk becomes a social defence against the anxiety. Practical/managerial implications: Awareness of the anxiety involved in risk management may assist businesses to manage risk in a more realistic way, making provision for, and even capitalising on, the human element. Contributions/value-add: The article provides a systems-psychodynamic, and hence a more complete, perspective of operational risk management when doing business in an African country.

  2. A risk communication case study: the Nevada risk assessment/management program

    International Nuclear Information System (INIS)

    Hechanova, A.E.

    2001-01-01

    The Nevada Risk Assessment/Management Program is part of a national effort by the U.S. Department of Energy (Grant DE-FG01-96EW56093) to develop new sources of information and approaches to risk assessment, risk management, risk communication and public outreach as these objectives relate to the ecological and human health effects of radioactive and hazardous material management and site remediation activities. This paper reviews the innovation behind the Nevada Risk Assessment/Management Program and presents a synopsis of the effort that began in 1995 and will officially conclude on April 30, 2000. (author)

  3. A data management system to enable urgent natural disaster computing

    Science.gov (United States)

    Leong, Siew Hoon; Kranzlmüller, Dieter; Frank, Anton

    2014-05-01

    Civil protection, in particular natural disaster management, is very important to most nations and civilians in the world. When disasters like flash floods, earthquakes and tsunamis are expected or have taken place, it is of utmost importance to make timely decisions for managing the affected areas and reduce casualties. Computer simulations can generate information and provide predictions to facilitate this decision making process. Getting the data to the required resources is a critical requirement to enable the timely computation of the predictions. An urgent data management system to support natural disaster computing is thus necessary to effectively carry out data activities within a stipulated deadline. Since the trigger of a natural disaster is usually unpredictable, it is not always possible to prepare required resources well in advance. As such, an urgent data management system for natural disaster computing has to be able to work with any type of resources. Additional requirements include the need to manage deadlines and huge volume of data, fault tolerance, reliable, flexibility to changes, ease of usage, etc. The proposed data management platform includes a service manager to provide a uniform and extensible interface for the supported data protocols, a configuration manager to check and retrieve configurations of available resources, a scheduler manager to ensure that the deadlines can be met, a fault tolerance manager to increase the reliability of the platform and a data manager to initiate and perform the data activities. These managers will enable the selection of the most appropriate resource, transfer protocol, etc. such that the hard deadline of an urgent computation can be met for a particular urgent activity, e.g. data staging or computation. We associated 2 types of deadlines [2] with an urgent computing system. Soft-hard deadline: Missing a soft-firm deadline will render the computation less useful resulting in a cost that can have severe

  4. Integrated Risk Management Within NASA Programs/Projects

    Science.gov (United States)

    Connley, Warren; Rad, Adrian; Botzum, Stephen

    2004-01-01

    As NASA Project Risk Management activities continue to evolve, the need to successfully integrate risk management processes across the life cycle, between functional disciplines, stakeholders, various management policies, and within cost, schedule and performance requirements/constraints become more evident and important. Today's programs and projects are complex undertakings that include a myriad of processes, tools, techniques, management arrangements and other variables all of which must function together in order to achieve mission success. The perception and impact of risk may vary significantly among stakeholders and may influence decisions that may have unintended consequences on the project during a future phase of the life cycle. In these cases, risks may be unintentionally and/or arbitrarily transferred to others without the benefit of a comprehensive systemic risk assessment. Integrating risk across people, processes, and project requirements/constraints serves to enhance decisions, strengthen communication pathways, and reinforce the ability of the project team to identify and manage risks across the broad spectrum of project management responsibilities. The ability to identify risks in all areas of project management increases the likelihood a project will identify significant issues before they become problems and allows projects to make effective and efficient use of shrinking resources. By getting a total team integrated risk effort, applying a disciplined and rigorous process, along with understanding project requirements/constraints provides the opportunity for more effective risk management. Applying an integrated approach to risk management makes it possible to do a better job at balancing safety, cost, schedule, operational performance and other elements of risk. This paper will examine how people, processes, and project requirements/constraints can be integrated across the project lifecycle for better risk management and ultimately improve the

  5. Managing IT Integration Risk in Acquisitions

    DEFF Research Database (Denmark)

    Henningsson, Stefan; Kettinger, William J.

    2016-01-01

    The article discusses a framework for evaluating risk of information technology (IT) integration in acquisitions. Topics include the use of the experience of serial acquirer Trelleborg AB to show the merits of the framework for managing the risk and to determine low-risk acquisitions......, the importance of managing IT integration risk, and various risk areas for acquisition IT integration....

  6. Strategies for successful software development risk management

    Directory of Open Access Journals (Sweden)

    Marija Boban

    2003-01-01

    Full Text Available Nowadays, software is becoming a major part of enterprise business. Software development is activity connected with advanced technology and high level of knowledge. Risks on software development projects must be successfully mitigated to produce successful software systems. Lack of a defined approach to risk management is one of the common causes for project failures. To improve project chances for success, this work investigates common risk impact areas to perceive a foundation that can be used to define a common approach to software risk management. Based on typical risk impact areas on software development projects, we propose three risk management strategies suitable for a broad area of enterprises and software development projects with different amounts of connected risks. Proposed strategies define activities that should be performed for successful risk management, the one that will enable software development projects to perceive risks as soon as possible and to solve problems connected with risk materialization. We also propose a risk-based approach to software development planning and risk management as attempts to address and retire the highest impact risks as early as possible in the development process. Proposed strategies should improve risk management on software development projects and help create a successful software solution.

  7. Value-oriented risk management of insurance companies

    CERN Document Server

    Kriele, Marcus

    2014-01-01

    Value- and risk-oriented management is a holistic method of managing businesses. In this book both actuarial methods and methods pertaining to classical internal control and classical risk management are used. Therefore the approach taken is necessarily interdisciplinary. Indeed, there is a new dynamically developing field for actuaries as a result of the emphasis now on the measurement of risk. This book provides the required basic knowledge for this subject from an actuarial perspective. It enables the reader to implement in practice a risk management system that is based on quantitative methods. With this book, the reader will additionally be able to critically appraise the applicability and the limits of the methods used in modern risk management. Value- Oriented Risk Management of Insurance Companies focuses on risk capital, capital allocation, performance measurement and value-oriented management. It also makes a connection to regulatory developments (for example, Solvency II). The reader should have...

  8. Integrated supply chain risk management

    Directory of Open Access Journals (Sweden)

    Riaan Bredell

    2007-11-01

    Full Text Available Integrated supply chain risk management (ISCRM has become indispensable to the theory and practice of supply chain management. The economic and political realities of the modern world require not only a different approach to supply chain management, but also bold steps to secure supply chain performance and sustainable wealth creation. Integrated supply chain risk management provides supply chain organisations with a level of insight into their supply chains yet to be achieved. If correctly applied, this process may optimise management decision-making and assist in the protection and enhancement of shareholder value.

  9. Corporate risk management : an overview

    NARCIS (Netherlands)

    Oosterhof, Casper M.

    2001-01-01

    Corporate risk management and hedging are important activities within financial as well as non-financial corporations. Under the assumptions of Modigliani and Miller [1958], corporate risk management is a redundant activity. However, the existence of market imperfections can explain the corporate

  10. Risk management study for the retired Hanford Site facilities: Risk management executive summary

    International Nuclear Information System (INIS)

    Coles, G.A.; Shultz, M.V.; Taylor, W.E.

    1994-02-01

    This document provides a cost-comparison evaluation for implementing certain risk-reduction measures and their effect on the overall risk of the 100 and 200 Area retired, surplus facilities. The evaluation is based on conditions that existed at the time the risk evaluation team performed facility investigations, and does not acknowledge risk-reduction measures that occurred soon after risk identification. This evaluation is one part of an overall risk management study for these facilities. The retired facilities investigated for this evaluation are located in the 100 and 200 Areas of the 1450-km 2 Hanford Site. The Hanford Site is a semiarid tract of land in southeastern Washington State. The nearest population center is Richland, Washington, (population 32,000) 30 km southeast of the 200 Area. This document is the first in a four volume series that comprise the risk management study for the retired, surplus facilities. Volume 2 is the risk evaluation work procedure; volume 3 provides the results for the risk evaluation; and volume 4 is the risk-reduction cost comparison

  11. Overview of Risk Management for Engineered Nanomaterials

    Science.gov (United States)

    Schulte, P. A.; Geraci, C. L.; Hodson, L. L.; Zumwalde, R. D.; Kuempel, E. D.; Murashov, V.; Martinez, K. F.; Heidel, D. S.

    2013-04-01

    Occupational exposure to engineered nanomaterials (ENMs) is considered a new and challenging occurrence. Preliminary information from laboratory studies indicates that workers exposed to some kinds of ENMs could be at risk of adverse health effects. To protect the nanomaterial workforce, a precautionary risk management approach is warranted and given the newness of ENMs and emergence of nanotechnology, a naturalistic view of risk management is useful. Employers have the primary responsibility for providing a safe and healthy workplace. This is achieved by identifying and managing risks which include recognition of hazards, assessing exposures, characterizing actual risk, and implementing measures to control those risks. Following traditional risk management models for nanomaterials is challenging because of uncertainties about the nature of hazards, issues in exposure assessment, questions about appropriate control methods, and lack of occupational exposure limits (OELs) or nano-specific regulations. In the absence of OELs specific for nanomaterials, a precautionary approach has been recommended in many countries. The precautionary approach entails minimizing exposures by using engineering controls and personal protective equipment (PPE). Generally, risk management utilizes the hierarchy of controls. Ideally, risk management for nanomaterials should be part of an enterprise-wide risk management program or system and this should include both risk control and a medical surveillance program that assesses the frequency of adverse effects among groups of workers exposed to nanomaterials. In some cases, the medical surveillance could include medical screening of individual workers to detect early signs of work-related illnesses. All medical surveillance should be used to assess the effectiveness of risk management; however, medical surveillance should be considered as a second line of defense to ensure that implemented risk management practices are effective.

  12. Overview of Risk Management for Engineered Nanomaterials

    International Nuclear Information System (INIS)

    Schulte, P A; Geraci, C L; Hodson, L L; Zumwalde, R D; Kuempel, E D; Murashov, V; Martinez, K F; Heidel, D S

    2013-01-01

    Occupational exposure to engineered nanomaterials (ENMs) is considered a new and challenging occurrence. Preliminary information from laboratory studies indicates that workers exposed to some kinds of ENMs could be at risk of adverse health effects. To protect the nanomaterial workforce, a precautionary risk management approach is warranted and given the newness of ENMs and emergence of nanotechnology, a naturalistic view of risk management is useful. Employers have the primary responsibility for providing a safe and healthy workplace. This is achieved by identifying and managing risks which include recognition of hazards, assessing exposures, characterizing actual risk, and implementing measures to control those risks. Following traditional risk management models for nanomaterials is challenging because of uncertainties about the nature of hazards, issues in exposure assessment, questions about appropriate control methods, and lack of occupational exposure limits (OELs) or nano-specific regulations. In the absence of OELs specific for nanomaterials, a precautionary approach has been recommended in many countries. The precautionary approach entails minimizing exposures by using engineering controls and personal protective equipment (PPE). Generally, risk management utilizes the hierarchy of controls. Ideally, risk management for nanomaterials should be part of an enterprise-wide risk management program or system and this should include both risk control and a medical surveillance program that assesses the frequency of adverse effects among groups of workers exposed to nanomaterials. In some cases, the medical surveillance could include medical screening of individual workers to detect early signs of work-related illnesses. All medical surveillance should be used to assess the effectiveness of risk management; however, medical surveillance should be considered as a second line of defense to ensure that implemented risk management practices are effective.

  13. Risk management on nuclear power plant. Application of probabilistic risk assessment

    International Nuclear Information System (INIS)

    Kojima, Shigeo

    2003-01-01

    In U.S.A., nuclear safety regulation is moving to risk-informed regulation (RIR), so necessity of a standard to provide contents of probabilistic risk assessment (PRA) constructing its roots has been discussed for a long time. In 1998, the Committee on Nuclear Risk Management (CNRM) of the American Society of Mechanical Engineers (ASME) began to investigate the standard, of which last edition was published as the Standard for Probabilistic Risk Management for Nuclear Power Plant Applications: RA-S-2002 (PRMA) on April, 2002. As in the Committee, the Nuclear Regulatory Commission (NRC), electric power companies, national institutes, PRA specialists, and so on took parts to carry out many discussions with full energies of participants on risk management in U.S.A., the standard was finished after about four years' efforts. In U.S.A., risk management having already used PRA is successfully practiced, U.S.A. is at a stage with more advancing steps of the risk management than Japan is. Here was described on the standard of PRA and a concrete method of the risk management carried out at nuclear power stations. (G.K.)

  14. Risk management in facility transition and management decision making: Needs and opportunities

    International Nuclear Information System (INIS)

    Stillwell, W.; Seaver, D.; Keller, J.; Smith, D.; Weaver, D.; Sanders, T.; Thullen, P.

    1993-02-01

    An overall approach to risk management is described in this paper. Many of these concepts have been developed and applied as part of Hanford Mission Planning (HMP) (Hanford Mission Plan, 1992). At Hanford, HMP provides a mechanism for integrating planning across all the missions and programs of the site. This paper discusses the decision context within which EM must make and defend decisions, the types of decisions that are being and will need to be made in order to progress with the cleanup of the DOE complex, and the resulting need for risk management. Risk management, in turn, requires quality health and ecological risk information to make these decisions. Other types of information are also needed, but the risk information is typically the most important and the most difficult to obtain. The paper then describes a general technical approach to risk management, including particular methods for developing the high quality of human health and ecological risk information that will be needed to support risk management. We next turn to several special issues that make risk management more complex than many other decisions. We discuss these issues and offer some practical suggestions with respect to addressing them in the risk management framework. Finally, we conclude with some discussion of other opportunities for applying risk management

  15. Benefits Management of Cloud Computing Investments

    OpenAIRE

    Richard Greenwell; Xiaodong Liu; Kevin Chalmers

    2014-01-01

    This paper examines investments in cloud computing using the Benefits Management approach. The major contribution of the paper is to provide a unique insight into how organizations derive value from cloud computing investments. The motivation for writing this paper is to consider the business benefits generated from utilizing cloud computing in a range of organizations. Case studies are used to describe a number of organizations approaches to benefits exploitation using cloud computing. It wa...

  16. Managing Risks in Dry Port Operations

    OpenAIRE

    Ciortescu Cezar-Gabriel; Pãvãla?cu Narcis Sebastian

    2012-01-01

    The purpose of this paper is to have an in-depth look into the phenomenon of risk assessment and risk management strategies in managing dry port operations as an integrated part into international containerized freight trade. The fact that world crises take the form of disruptions, bankruptcies, breakdowns, macroeconomic and political changes, and disasters leads to higher risks and makes risk management more and more difficult. This paper aims to discuss the theory behind the dry port concep...

  17. Management of radiation risk

    International Nuclear Information System (INIS)

    Hubert, P.

    1996-01-01

    The need to control the risk from ionizing radiation can be tracked back to the eve of the twentieth century. However, as knowledge improved and practices expanded, the approaches to this control have evolved. No longer is the mere respect of some forms of exposure limits or safety related standards sufficient. Rather, it is widely admitted that there is a need for managing radiation risk, both by balancing the advantages and disadvantages of enhancing protection and by setting up a proper organization that allows handling of the risk. This paper describes the multiple aspects of radiation risk management and points out the main related issues. It critically analyzes ALARA and ICRP recommendations. 74 refs, 8 figs, 5 tabs

  18. Noninvasive Computed Tomography-based Risk Stratification of Lung Adenocarcinomas in the National Lung Screening Trial.

    Science.gov (United States)

    Maldonado, Fabien; Duan, Fenghai; Raghunath, Sushravya M; Rajagopalan, Srinivasan; Karwoski, Ronald A; Garg, Kavita; Greco, Erin; Nath, Hrudaya; Robb, Richard A; Bartholmai, Brian J; Peikert, Tobias

    2015-09-15

    Screening for lung cancer using low-dose computed tomography (CT) reduces lung cancer mortality. However, in addition to a high rate of benign nodules, lung cancer screening detects a large number of indolent cancers that generally belong to the adenocarcinoma spectrum. Individualized management of screen-detected adenocarcinomas would be facilitated by noninvasive risk stratification. To validate that Computer-Aided Nodule Assessment and Risk Yield (CANARY), a novel image analysis software, successfully risk stratifies screen-detected lung adenocarcinomas based on clinical disease outcomes. We identified retrospective 294 eligible patients diagnosed with lung adenocarcinoma spectrum lesions in the low-dose CT arm of the National Lung Screening Trial. The last low-dose CT scan before the diagnosis of lung adenocarcinoma was analyzed using CANARY blinded to clinical data. Based on their parametric CANARY signatures, all the lung adenocarcinoma nodules were risk stratified into three groups. CANARY risk groups were compared using survival analysis for progression-free survival. A total of 294 patients were included in the analysis. Kaplan-Meier analysis of all the 294 adenocarcinoma nodules stratified into the Good, Intermediate, and Poor CANARY risk groups yielded distinct progression-free survival curves (P < 0.0001). This observation was confirmed in the unadjusted and adjusted (age, sex, race, and smoking status) progression-free survival analysis of all stage I cases. CANARY allows the noninvasive risk stratification of lung adenocarcinomas into three groups with distinct post-treatment progression-free survival. Our results suggest that CANARY could ultimately facilitate individualized management of incidentally or screen-detected lung adenocarcinomas.

  19. The Professionalization of Risk Management: What Role can the ISO 31000 Risk Management Principles Play?

    DEFF Research Database (Denmark)

    Olechowski, Alison; Oehmen, Josef; Seering, W.

    2016-01-01

    an empirical investigation and discussion of the eleven principles of the ISO 31000:2009 Risk Management Standard via a large-scale survey of engineering and product development practitioners. Adhering to the risk management principles at a high level was found to be a significant factor in better reaching......Risk management is increasingly seen as a means of improving the likelihood of success in complex engineering projects. Yet the presence of a legitimacy gap, driven by the lack of empirical validation of published best practices, might explain low adoption of risk management on projects. We present...... cost, schedule, technical and customer targets, in addition to achieving a more stable project execution. This finding suggests that, rather than a single rigid standard or an ever-changing set of detailed methods, the ISO principles have potential to be the basis for our shared understanding of best...

  20. Identifying and Managing Risk.

    Science.gov (United States)

    Abraham, Janice M.

    1999-01-01

    The role of the college or university chief financial officer in institutional risk management is (1) to identify risk (physical, casualty, fiscal, business, reputational, workplace safety, legal liability, employment practices, general liability), (2) to develop a campus plan to reduce and control risk, (3) to transfer risk, and (4) to track and…

  1. Competitiveness in organizational integrated computer system project management

    Directory of Open Access Journals (Sweden)

    Zenovic GHERASIM

    2010-06-01

    Full Text Available The organizational integrated computer system project management aims at achieving competitiveness by unitary, connected and personalised treatment of the requirements for this type of projects, along with the adequate application of all the basic management, administration and project planning principles, as well as of the basic concepts of the organisational information management development. The paper presents some aspects of organizational computer systems project management competitiveness with the specific reference to some Romanian companies’ projects.

  2. RISKS MANAGEMENT: NEW LITERATURE REVIEW

    OpenAIRE

    Ennouri Wissem

    2013-01-01

    The complexity of the industrial activities and the important mass of flows crossing the supply chain promotes the emergence of risks that must be considered in the decision process. For this reason, we have developed this paper to clarify the basics of risk management through a short new suggestion of literature review for risk management. Our justification of this attempt is that this area is the most discussed in our days and it is impossible to present all definition of the risk concept, ...

  3. Cognitive mapping tools: review and risk management needs.

    Science.gov (United States)

    Wood, Matthew D; Bostrom, Ann; Bridges, Todd; Linkov, Igor

    2012-08-01

    Risk managers are increasingly interested in incorporating stakeholder beliefs and other human factors into the planning process. Effective risk assessment and management requires understanding perceptions and beliefs of involved stakeholders, and how these beliefs give rise to actions that influence risk management decisions. Formal analyses of risk manager and stakeholder cognitions represent an important first step. Techniques for diagramming stakeholder mental models provide one tool for risk managers to better understand stakeholder beliefs and perceptions concerning risk, and to leverage this new understanding in developing risk management strategies. This article reviews three methodologies for assessing and diagramming stakeholder mental models--decision-analysis-based mental modeling, concept mapping, and semantic web analysis--and assesses them with regard to their ability to address risk manager needs. © 2012 Society for Risk Analysis.

  4. A Framework for Integrating Knowledge Management with Risk Management for Information Technology Projects (RiskManiT)

    Science.gov (United States)

    Karadsheh, Louay A.

    2010-01-01

    This research focused on the challenges experienced when executing risk management activities for information technology projects. The lack of adequate knowledge management support of risk management activities has caused many project failures in the past. The research objective was to propose a conceptual framework of the Knowledge-Based Risk…

  5. Value at Risk models for Energy Risk Management

    OpenAIRE

    Novák, Martin

    2010-01-01

    The main focus of this thesis lies on description of Risk Management in context of Energy Trading. The paper will predominantly discuss Value at Risk and its modifications as a main overall indicator of Energy Risk.

  6. Risk management in a university environment.

    Science.gov (United States)

    Brewer, Ann; Walker, Ian

    2011-06-01

    Risk is an integral part of quality assurance in higher education in Australia. This paper describes a generic methodology for the identification and management of risk in a university or similar tertiary education environment and outlines a framework that enables the management of risk to be incorporated in the institution's governance cycle. The new approach here is that risk is embedded in the quality assurance framework and, in turn, in the strategic planning and budgeting processes. In many organisations, risk is implemented as a separate process and not considered in any meaningful way as integral to the strategic direction and performance of the university. The paper is based on work carried out by the authors and others between March 2008 and April 2009 to develop a comprehensive system for managing risk in a major Australian university, including processes whereby risk management could be integrated with, and add value to, the overall governance of the university. The case study is described in the appendix to this paper.

  7. Selecting Copulas for Risk Management

    NARCIS (Netherlands)

    H.J.W.G. Kole (Erik); C.G. Koedijk (Kees); M.J.C.M. Verbeek (Marno)

    2006-01-01

    textabstractCopulas offer financial risk managers a powerful tool to model the dependence between the different elements of a portfolio and are preferable to the traditional, correlation-based approach. In this paper we show the importance of selecting an accurate copula for risk management. We

  8. Risk Management for the International Space Station

    Science.gov (United States)

    Sebastian, J.; Brezovic, Philip

    2002-01-01

    The International Space Station (ISS) is an extremely complex system, both technically and programmatically. The Space Station must support a wide range of payloads and missions. It must be launched in numerous launch packages and be safely assembled and operated in the harsh environment of space. It is being designed and manufactured by many organizations, including the prime contractor, Boeing, the NASA institutions, and international partners and their contractors. Finally, the ISS has multiple customers, (e.g., the Administration, Congress, users, public, international partners, etc.) with contrasting needs and constraints. It is the ISS Risk Management Office strategy to proactively and systematically manages risks to help ensure ISS Program success. ISS program follows integrated risk management process (both quantitative and qualitative) and is integrated into ISS project management. The process and tools are simple and seamless and permeate to the lowest levels (at a level where effective management can be realized) and follows the continuous risk management methodology. The risk process assesses continually what could go wrong (risks), determine which risks need to be managed, implement strategies to deal with those risks, and measure effectiveness of the implemented strategies. The process integrates all facets of risk including cost, schedule and technical aspects. Support analysis risk tools like PRA are used to support programatic decisions and assist in analyzing risks.

  9. Risk management method for small photovoltaic plants

    Directory of Open Access Journals (Sweden)

    Kirova Milena

    2016-09-01

    Full Text Available Risk management is necessary for achieving the goals of the organization. There are many methods, approaches, and instruments in the literature concerning risk management. However, these are often highly specialized and transferring them to a different field can prove difficult. Therefore, managers often face situations where they have no tools to use for risk management. This is the case with small photovoltaic plants (according to a definition by the Bulgarian State Energy and Water Regulatory Commission small applies to systems with a total installed power of 200 kWp. There are some good practices in the energy field for minimizing risks, but they offer only partial risk prevention and are not sufficient. Therefore a new risk management method needs to be introduced. Small photovoltaic plants offer plenty of advantages in comparison to the other renewable energy sources which makes risk management in their case more important. There is no classification of risks for the exploitation of small photovoltaic systems in the available literature as well as to what degree the damages from those risks could spread. This makes risk analysis and evaluation necessary for obtaining information which could aid taking decisions for improving risk management. The owner of the invested capital takes a decision regarding the degree of acceptable risk for his organization and it must be protected depending on the goals set. Investors in small photovoltaic systems need to decide to what degree the existing risks can influence the goals previously set, the payback of the investment, and what is the acceptable level of damages for the investor. The purpose of this work is to present a risk management method, which currently does not exist in the Bulgaria, so that the risks and the damages that could occur during the exploitation of small photovoltaic plants could be identified and the investment in such technology – justified.

  10. 12 CFR 704.6 - Credit risk management.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Credit risk management. 704.6 Section 704.6... CREDIT UNIONS § 704.6 Credit risk management. (a) Policies. A corporate credit union must operate according to a credit risk management policy that is commensurate with the investment risks and activities...

  11. Sustainable Risk Management in the Banking Sector

    Directory of Open Access Journals (Sweden)

    Županović Ivo

    2014-01-01

    Full Text Available The globalization of financial markets and negative consequences of the financial crisis resulted in negative connotations in the operation of many financial institutions, businesses and citizens and imposed the need to implement appropriate risk management measures in the banking sector. Evolution of the financial sector makes a lot of news in the field of risk management and particularly the modelling of market, credit and operational risk. The main methodology for risk management is the value-at-risk, which is used in practice with other techniques such as the capital- at-risk method in order to minimize business risks and achieve optimal results in the banking and, generally, financial operations. Accordingly, at all levels of governance in the banking sector, there are prudential policies in place governing the management of all types of financial and operational risks. Based on the abovementioned, the focus of the examination was on the above postulate, and prompt recognition, control and proper management of banking risks.

  12. Managing Risk and Opportunity

    DEFF Research Database (Denmark)

    Andersen, Torben Juul; Garvey, Maxine; Roggi, Oliviero

    outcomes. This topic is timely and of interest both to the academic community as well as to practicing managers, executives, and directors. The volume focuses on contemporary risk leadership issues based on recent research insights but avoids excessive technical language and mathematical formulas. The book...... is framed around the challenges imposed on executives and directors in dealing with an increasingly complex and unpredictable world. This requires a new risk leadership focus that not only avoids the downside risks but also considers ways to exploit the upside potential offered by a dynamic environment....... The underlying logic is built on the principles of financial economics where benefits derive from reducing bankruptcy costs and increasing future cash inflows. This provides a stringent framework for analyzing the effect of different risk management actions and behaviors in effective risk-taking organizations...

  13. Tailoring Risk Management in Design

    DEFF Research Database (Denmark)

    Tegeltija, M.; Oehmen, J.; McMahon, C. A.

    2018-01-01

    While risk quantification research has grown over the last few decades, only a limited number of studies have addressed the overall process integration of these approaches in design risk management. This paper argues that the choice of risk quantification method has strong implications for several...... process aspects. We investigate current risk management maturity models and suggest an expansion to accommodate requirements originating from the choice of quantification method, and to inform the choice of quantification method, based on other process parameters, validated through 3 case companies....

  14. 76 FR 45724 - Clearing Member Risk Management

    Science.gov (United States)

    2011-08-01

    ... proposed rules address risk management for cleared trades by futures commission merchants, swap dealers... Commission has proposed extensive regulations addressing open access and risk management at the derivatives..., 2011) (Risk Management Requirements for Derivatives Clearing Organizations). These proposed regulations...

  15. Probabilistic risk assessment methodology for risk management and regulatory applications

    International Nuclear Information System (INIS)

    See Meng Wong; Kelly, D.L.; Riley, J.E.

    1997-01-01

    This paper discusses the development and potential applications of PRA methodology for risk management and regulatory applications in the U.S. nuclear industry. The new PRA methodology centers on the development of This paper discusses the time-dependent configuration risk profile for evaluating the effectiveness of operational risk management programs at U.S. nuclear power plants. Configuration-risk profiles have been used as risk-information tools for (1) a better understanding of the impact of daily operational activities on plant safety, and (2) proactive planning of operational activities to manage risk. Trial applications of the methodology were undertaken to demonstrate that configuration-risk profiles can be developed routinely, and can be useful for various industry and regulatory applications. Lessons learned include a better understanding of the issues and characteristics of PRA models available to industry, and identifying the attributes and pitfalls in the developement of risk profiles

  16. Contradictions Between Risk Management and Sustainable Development

    International Nuclear Information System (INIS)

    Olsen, Odd Einar; Langhelle, Oluf; Engen, Ole A.

    2006-01-01

    The aim of this paper is to discuss how risk management as a methodology and mindset influence on priorities and decisions concerning sustainable development. Management of risks and hazards often rely on partial analysis with a limited time frame. This may lead to a paradoxical situation where risk management and extended use of risk analysis could hamper long term sustainable development. The question is: Does the use of risk and vulnerability analysis (RaV-analysis) hamper or contribute to sustainable development? Because risk management and assessment has a more narrow scope and a limited time perspective based on well established methodologies, the tangible impacts of risk reducing measures in a project is easier to calculate than long-term and intangible impacts on global development. Empirical evidence is still scarce, but our preliminary conclusion is that mainstream risk management and assessments is counterproductive to sustainable development

  17. Contradictions Between Risk Management and Sustainable Development

    Energy Technology Data Exchange (ETDEWEB)

    Olsen, Odd Einar; Langhelle, Oluf; Engen, Ole A. [Univ. of Stavanger (Norway). Dept. of Media, Culture and Social Science

    2006-09-15

    The aim of this paper is to discuss how risk management as a methodology and mindset influence on priorities and decisions concerning sustainable development. Management of risks and hazards often rely on partial analysis with a limited time frame. This may lead to a paradoxical situation where risk management and extended use of risk analysis could hamper long term sustainable development. The question is: Does the use of risk and vulnerability analysis (RaV-analysis) hamper or contribute to sustainable development? Because risk management and assessment has a more narrow scope and a limited time perspective based on well established methodologies, the tangible impacts of risk reducing measures in a project is easier to calculate than long-term and intangible impacts on global development. Empirical evidence is still scarce, but our preliminary conclusion is that mainstream risk management and assessments is counterproductive to sustainable development.

  18. Risk Management for Point-of-Care Testing

    OpenAIRE

    James, H. Nichols

    2014-01-01

    Point-of-care testing (POCT) is growing in popularity, and with this growth comes an increased chance of errors. Risk management is a way to reduce errors. Originally developed for the manufacturing industry, risk management principles have application for improving the quality of test results in the clinical laboratory. The Clinical and Laboratory Standards Institute (CLSI), EP23-A Laboratory Quality Control based on Risk Management guideline, introduces risk management to the clinical labor...

  19. Radiation management computer system for Monju

    International Nuclear Information System (INIS)

    Aoyama, Kei; Yasutomo, Katsumi; Sudou, Takayuki; Yamashita, Masahiro; Hayata, Kenichi; Ueda, Hajime; Hosokawa, Hideo

    2002-01-01

    Radiation management of nuclear power research institutes, nuclear power stations and other such facilities are strictly managed under Japanese laws and management policies. Recently, the momentous issues of more accurate radiation dose management and increased work efficiency has been discussed. Up to now, Fuji Electric Company has supplied a large number of Radiation Management Systems to nuclear power stations and related nuclear facilities. We introduce the new radiation management computer system with adopted WWW technique for Japan Nuclear Cycle Development Institute, MONJU Fast Breeder Reactor (MONJU). (author)

  20. Managing Macroeconomic Risks by Using Statistical Simulation

    Directory of Open Access Journals (Sweden)

    Merkaš Zvonko

    2017-06-01

    Full Text Available The paper analyzes the possibilities of using statistical simulation in the macroeconomic risks measurement. At the level of the whole world, macroeconomic risks are, due to the excessive imbalance, significantly increased. Using analytical statistical methods and Monte Carlo simulation, the authors interpret the collected data sets, compare and analyze them in order to mitigate potential risks. The empirical part of the study is a qualitative case study that uses statistical methods and Monte Carlo simulation for managing macroeconomic risks, which is the central theme of this work. Application of statistical simulation is necessary because the system, for which it is necessary to specify the model, is too complex for an analytical approach. The objective of the paper is to point out the previous need for consideration of significant macroeconomic risks, particularly in terms of the number of the unemployed in the society, the movement of gross domestic product and the country’s credit rating, and the use of data previously processed by statistical methods, through statistical simulation, to analyze the existing model of managing the macroeconomic risks and suggest elements for a management model development that will allow, with the lowest possible probability and consequences, the emergence of the recent macroeconomic risks. The stochastic characteristics of the system, defined by random variables as input values defined by probability distributions, require the performance of a large number of iterations on which to record the output of the model and calculate the mathematical expectations. The paper expounds the basic procedures and techniques of discrete statistical simulation applied to systems that can be characterized by a number of events which represent a set of circumstances that have caused a change in the system’s state and the possibility of its application in the field of assessment of macroeconomic risks. The method has no

  1. Cloud Computing and Risk: A look at the EU and the application of the Data Protection Directive to cloud computing

    OpenAIRE

    Victoria Ostrzenski

    2013-01-01

    The use of cloud services for the management of records presents many challenges, both in terms of the particulars of data security as well the need to sustain and ensure the greater reliability, authenticity, and accuracy of records. To properly grapple with these concerns requires the development of more specifically applicable and effective binding legislation; an important first step is the examination and identification of the risks specific to cloud computing coupled with an evaluation...

  2. An optimization-based approach for facility energy management with uncertainties, and, Power portfolio optimization in deregulated electricity markets with risk management

    Science.gov (United States)

    Xu, Jun

    Topic 1. An Optimization-Based Approach for Facility Energy Management with Uncertainties. Effective energy management for facilities is becoming increasingly important in view of the rising energy costs, the government mandate on the reduction of energy consumption, and the human comfort requirements. This part of dissertation presents a daily energy management formulation and the corresponding solution methodology for HVAC systems. The problem is to minimize the energy and demand costs through the control of HVAC units while satisfying human comfort, system dynamics, load limit constraints, and other requirements. The problem is difficult in view of the fact that the system is nonlinear, time-varying, building-dependent, and uncertain; and that the direct control of a large number of HVAC components is difficult. In this work, HVAC setpoints are the control variables developed on top of a Direct Digital Control (DDC) system. A method that combines Lagrangian relaxation, neural networks, stochastic dynamic programming, and heuristics is developed to predict the system dynamics and uncontrollable load, and to optimize the setpoints. Numerical testing and prototype implementation results show that our method can effectively reduce total costs, manage uncertainties, and shed the load, is computationally efficient. Furthermore, it is significantly better than existing methods. Topic 2. Power Portfolio Optimization in Deregulated Electricity Markets with Risk Management. In a deregulated electric power system, multiple markets of different time scales exist with various power supply instruments. A load serving entity (LSE) has multiple choices from these instruments to meet its load obligations. In view of the large amount of power involved, the complex market structure, risks in such volatile markets, stringent constraints to be satisfied, and the long time horizon, a power portfolio optimization problem is of critical importance but difficulty for an LSE to serve the

  3. Risk management for noncombustion wastes

    International Nuclear Information System (INIS)

    Connor, K.K.; Rice, J.S.

    1991-01-01

    The Noncombustion Waste Risk Management Project is designed to incorporate the insights and information developed in these projects into tools that will help utilities make better noncombustion waste management decisions. Specific project goals are to synthesize information useful to utilities on noncombustion wastes, emphasize waste reduction as a priority over end-of-pipe management, develop methods to manage the costs and risks associated with noncombustion wastes (e.g., direct costs, permitting costs, liability costs, public relations costs), develop software and documentation to deliver the information and analysis methods to the industry. This project was initiated EPRI's Environment Division in late 1988. The early phases of the project involved gathering information on current noncombustion waste management practices, specific utility problems and concerns with respect to these wastes, current and potential future regulations, and current and emerging management options. Recent efforts have focused on characterizing the direct and indirect (e.g., lawsuits, remedial action) costs of managing these wastes and on developing and implementing risk management methods for a subset of wastes. The remainder of this paper describes the specific issues addressed by and the results and insights from the three completed waste-specific studies

  4. Continuous Risk Management: A NASA Program Initiative

    Science.gov (United States)

    Hammer, Theodore F.; Rosenberg, Linda

    1999-01-01

    NPG 7120.5A, "NASA Program and Project Management Processes and Requirements" enacted in April, 1998, requires that "The program or project manager shall apply risk management principles..." The Software Assurance Technology Center (SATC) at NASA GSFC has been tasked with the responsibility for developing and teaching a systems level course for risk management that provides information on how to comply with this edict. The course was developed in conjunction with the Software Engineering Institute at Carnegie Mellon University, then tailored to the NASA systems community. This presentation will briefly discuss the six functions for risk management: (1) Identify the risks in a specific format; (2) Analyze the risk probability, impact/severity, and timeframe; (3) Plan the approach; (4) Track the risk through data compilation and analysis; (5) Control and monitor the risk; (6) Communicate and document the process and decisions.

  5. Center for computer security: Computer Security Group conference. Summary

    Energy Technology Data Exchange (ETDEWEB)

    None

    1982-06-01

    Topics covered include: computer security management; detection and prevention of computer misuse; certification and accreditation; protection of computer security, perspective from a program office; risk analysis; secure accreditation systems; data base security; implementing R and D; key notarization system; DOD computer security center; the Sandia experience; inspector general's report; and backup and contingency planning. (GHT)

  6. Risk Management Practices: The Ghanaian Firms' Perspective ...

    African Journals Online (AJOL)

    Using a quantitative approach the findings of the study are that Ghanaian firms understand risk and risk management. Additionally, operational, liquidity and credit risk are the most dominant risks experienced while risk identification and selection jointly determine risk management practices in Ghana. Based on the findings ...

  7. RISK MANAGEMENT APPROACHES AND PRACTICES IN IT PROJECTS

    Directory of Open Access Journals (Sweden)

    BRANDAS Claudiu

    2012-07-01

    Full Text Available Risk is identified in project management literature as an important factor influencing IT projects success, and it is relevant for both academic and practitionersn#8217; communities. The paper presents the past and current approaches to risk management in IT projects. The objective of this paper is to compare the different approaches and relate them to existing practices. Project management literature and practice have brought different approaches to risk management, and as a result, many projects ended in failure. We present how risk management is considered in the literature, and we compare the main two approaches: the evaluation approach and the management approach. The contingency approach does not consider risk management to be a specific process as it is an embedded process in the other project management processes. Then, we present the main practices in risk management. The methodology applied is based on documentary study review and analysis of the concepts used by the literature. We analyzed the literature published between 1978 and 2011 from the main journals for IT project management and found out that the essence of project management is risk management. The risk management practices have a considerable influence on stakeholdersn#8217; perception of project success. But, regardless of the chosen approach, a standard method for identifying, assessing, and responding to risks should be included in any project as this influences the outcome of the project.

  8. Scope of environmental risk management

    Energy Technology Data Exchange (ETDEWEB)

    O' Riordan, T

    1979-01-01

    Environmental risk management embraces three techniques for project appraisal: cost/benefit analysis, environmental impact analysis and risk assessment. It also explicitly relates scientific investigations to political judgments, sometimes so closely that the two cannot be separated. Indeed it is now apparent that environmental risk management encompasses procedures both to review the relative merits and priorities of policies as well as to appraise the environmental risks of particular schemes. Until recently this relationship has not been fully appreciated, so much imagination and innovation is still required to develop the most-suitable mechanisms for review.

  9. Risk Management in the Agri-food Sector

    Directory of Open Access Journals (Sweden)

    Hrabrin Bachev

    2013-03-01

    Full Text Available This paper incorporates the interdisciplinary New Institutional Economics in a comprehensive framework for analyzing risk management in the agri-food sector. First, it specifies the diverse types of agri-food risks (natural, technical, behavioral, economic, policy, etc. and the modes of their management (market, private, public, and hybrid. Second, it defines the efficiency of risk management and identifies the factors (personal, institutional, dimensional, technological, and natural of governance choice. Next, it presents stages in the analysis of risk management and the improvement of public intervention in the governance of risk. Finally, it identifies the contemporary opportunities and challenges for risk governance in the agri-food chain.

  10. Managing total corporate electricity/energy market risks

    International Nuclear Information System (INIS)

    Henney, A.; Keers, G.

    1998-01-01

    The banking industry has developed a tool kit of very useful value at risk techniques for hedging risk, but these techniques must be adapted to the special complexities of the electricity market. This paper starts with a short history of the use of value-at-risk (VAR) techniques in banking risk management and then examines the specific and, in many instances, complex risk management challenges faced by electric companies from the behavior of prices in electricity markets and from the character of generation and electric retailing risks. The third section describes the main methods for making VAR calculations along with an analysis of their suitability for analyzing the risks of electricity portfolios and the case for using profit at risk and downside risk as measures of risk. The final section draws the threads together and explains how to look at managing total corporate electricity market risk, which is a big step toward managing total corporate energy market risk

  11. Security Management Model in Cloud Computing Environment

    OpenAIRE

    Ahmadpanah, Seyed Hossein

    2016-01-01

    In the cloud computing environment, cloud virtual machine (VM) will be more and more the number of virtual machine security and management faced giant Challenge. In order to address security issues cloud computing virtualization environment, this paper presents a virtual machine based on efficient and dynamic deployment VM security management model state migration and scheduling, study of which virtual machine security architecture, based on AHP (Analytic Hierarchy Process) virtual machine de...

  12. Improving Operational Risk Management Using Business Performance Management Technologies

    Directory of Open Access Journals (Sweden)

    Bram Pieket Weeserik

    2018-02-01

    Full Text Available Operational Risk Management (ORM comprises the continuous management of risks resulting from: human actions, internal processes, systems, and external events. With increasing requirements, complexity and a growing volume of risks, information systems provide benefits for integrating risk management activities and optimizing performance. Business Performance Management (BPM technologies are believed to provide a solution for effective Operational Risk Management by offering several combined technologies including: work flow, data warehousing, (advanced analytics, reporting and dashboards. BPM technologies can be integrated with an organization’s Planning & Control cycle and related to strategic objectives. This manuscript aims to show how ORM can benefit from BPM technologies via the development and practical validation of a new maturity model. The B4ORM maturity model was developed following the Design Science Research approach. The maturity model relates specific maturity levels of ORM processes with BPM technologies applicable for a specific maturity stage. There appears to be a strong relationship (0.78 with ORM process maturity and supporting BPM technologies. The B4ORM maturity model as described in this manuscript provides an ideal path of BPM technologies related to six distinctive stages of ORM, leading towards technologies suitable for continuous improvement of ORM processes and organization-wide integration.

  13. SEISMIC RISK CARTOGRAPHIC VISUALIZATION FOR CRISIS MANAGEMENT

    Directory of Open Access Journals (Sweden)

    Nina I. Frolova

    2014-01-01

    Full Text Available Earthquake loss estimations before future events and following strong earthquakesin emergency mode and their corresponding visualization are extremely important for properdecision on preventive measures and effective response in order to save lives and properties. The paper addresses the methodological issues of seismic risk and vulnerability assessment, mapping with GIS technology application. Requirements for simulation models,databases used at different levels, as well as ways of visualizations oriented for EmergencyManagement Agencies, as well federal and local authorities are discussed. Examples ofmapping at the different levels: global, country, region and urban one are given and theinfluence of input data uncertainties on the reliability of loss computations is analyzed.

  14. Internal audit risk management in metropolitan municipalities

    Directory of Open Access Journals (Sweden)

    Christo Ackermann

    2016-07-01

    Full Text Available Internal audit functions (IAFs of organisations are regarded as crucial components of the combined assurance model, alongside the audit committee, management and external auditors. The combined assurance model aims at having integrated and aligned assurance in organisations with the overall aim of maximising risk and governance oversight and control efficiencies. In this regard, internal audit plays a crucial role, insofar as it consists of experts in risk, governance and control consultancy who provide assurance to senior management and the audit committee. Audit committees are dependent on internal audit for information and their effectiveness revolves around a strong and well-resourced internal audit function which is able to aid audit committees to meet their oversight responsibilities. There is thus a growing demand for managing risk through the process of risk management and internal audit is in a perfect position to assist with the improvement of such processes. If internal auditors wish to continue being an important aspect of the combined assurance model, they need to address the critical area, amongst others, of risk management as part of their work. If not, it follows that the board, audit committees and other levels of management will remain uninformed on the status of these matters which, in turn, will negatively impact the ability of these stakeholders to discharge their responsibilities. This study therefore focuses on analysing the functioning of IAFs, with specific reference to their risk management mandate. The study followed a mixed method approach to describe internal audits risk management functioning in the big eight metropolitan municipalities in South Africa. The results show that internal audit provide a broad scope of risk management work which assist senior management in the discharge of their responsibilities. However, in the public eye, internal audits risk management functioning is scant

  15. Active Risk Management and Banking Stability

    NARCIS (Netherlands)

    Silva Buston, C.F.

    2013-01-01

    Abstract: This paper analyzes the net impact of two opposing effects of active risk management at banks on their stability: higher risk-taking incentives and better isolation of credit supply from varying economic conditions. We present a model where banks actively manage their portfolio risk by

  16. The process of Risk management for E-business

    Directory of Open Access Journals (Sweden)

    Erion Lekaj

    2017-07-01

    Full Text Available In the new Internet economy, risk management plays a critical role to protect the organization and its ability to perform their business mission, not just its IT assets. Risk management is the process of identifying risk, assessing risk, and taking steps to reduce risk to an acceptable level. The risk management is an important component of an IT security program. Information and communications technology management and IT security are responsible for ensuring that technology risks are managed appropriately. These risks originate from the deployment and use of IT assets in various ways, such as configuring systems incorrectly or gaining access to restricted soft ware.

  17. Model of Axiological Dimension Risk Management

    Directory of Open Access Journals (Sweden)

    Kulińska Ewa

    2016-01-01

    Full Text Available It was on the basis of the obtained results that identify the key prerequisites for the integration of the management of logistics processes, management of the value creation process, and risk management that the methodological basis for the construction of the axiological dimension of the risk management (ADRM model of logistics processes was determined. By taking into account the contribution of individual concepts to the new research area, its essence was defined as an integrated, structured instrumentation aimed at the identification and implementation of logistics processes supporting creation of the value added as well as the identification and elimination of risk factors disturbing the process of the value creation for internal and external customers. The base for the ADRM concept of logistics processes is the use of the potential being inherent in synergistic effects which are obtained by using prerequisites for the integration of the management of logistics processes, of value creation and risk management as the key determinants of the value creation.

  18. 3D Risk Management for hydrogen installations (Hy3DRM)

    International Nuclear Information System (INIS)

    Skjold, T.; Siccama, D.; Hisken, H.; Brambilla, A.; Middha, P.; Groth, K.M.; LaFleur, A.C.

    2015-01-01

    This paper introduces the 3D Risk Management (3DRM) concept for hydrogen installations (Hy3DRM). The 3DRM framework entails an integrated solution for risk management that combines a detailed site-specific 3D geometry model for a system, a computational fluid dynamics (CFD) tool for simulating accident scenarios involving dispersion, fire and explosions, and a methodology for frequency analysis and quantitative risk assessment (QRA). In order to reduce calculation time, and to cover escalating accident scenarios such as structural collapse and projectiles, the CFD-based consequence analysis can be complemented with reduced order models or finite element analysis (FEA). The paper outlines the background for 3DRM and presents a proof-of-concept risk assessment for a hypothetical hydrogen filling station. This first prototype focuses on dispersion, fire and explosion scenarios resulting from loss of containment of gaseous hydrogen. The approach adopted here combines consequence assessments obtained with the CFD tool FLACS-Hydrogen from Gexcon, and event frequencies estimated with the Hydrogen Risk Assessment Models (HyRAM) tool from Sandia, to generate 3D risk contours for explosion pressure and radiation loads. For a given population density and set of harm criteria it is straightforward to extend the analysis to include personnel risk, as well as risk-based design such as detector optimization. The discussion outlines main challenges and inherent limitations of the 3DRM concept, as well as possibilities and prospects for future development. (author)

  19. Information risk management a practitioner's guide

    CERN Document Server

    Sutton, David

    2014-01-01

    Information risk management (IRM) is about identifying, assessing and prioritising risks to keep information secure and available. This accessible book provides practical guidance to the principles and development of a strategic approach to an IRM programme. The only textbook for the BCS Practitioner Certificate in Information Risk Management.

  20. CEA - Assessment of risk management 2013

    International Nuclear Information System (INIS)

    Bigot, Bernard; Bonnevie, Edwige; Maillot, Bernard

    2014-06-01

    After some introducing texts by CEA managers, this report proposes a rather detailed overview and presentation of CEA activities, objectives and obtained results in different fields: protection and control of the environment, installation safety, health, safety and radiation protection, transports of hazardous materials, waste management, protection of sites, installations and heritage, management of emergency situations, management of legal risks, internal controls and audits, activity of the risk management department, CEA activities from research to industry

  1. Overview of the plant risk status information management system

    International Nuclear Information System (INIS)

    Kirchner, J.R.; Campbell, D.J.

    1987-01-01

    The Plant Risk Status Information Management System (PRISIM) is a personal computer program that presents PRA results and related information for use by decision-makers. The program was originally developed for NRC inspectors, but now an expanded version of the program with more potential applications is complete. Prototypes of both versions have been developed for Arkansas Nuclear One - Unit 1, and the inspection-related version is currently being field-tested. Interim results of these field tests are favorable. The PRISIM database contains both pre-processed information that is useful for long-term planning and a plant risk model for assessing the risk implications of the current plant status. The program provides rapid access to specific information by making extensive use of menus. Development of PRISIM programs for Peach Bottom-Unit 2 is underway, and there are plans to create programs for other plants

  2. Noninvasive Computed Tomography–based Risk Stratification of Lung Adenocarcinomas in the National Lung Screening Trial

    Science.gov (United States)

    Maldonado, Fabien; Duan, Fenghai; Raghunath, Sushravya M.; Rajagopalan, Srinivasan; Karwoski, Ronald A.; Garg, Kavita; Greco, Erin; Nath, Hrudaya; Robb, Richard A.; Bartholmai, Brian J.

    2015-01-01

    Rationale: Screening for lung cancer using low-dose computed tomography (CT) reduces lung cancer mortality. However, in addition to a high rate of benign nodules, lung cancer screening detects a large number of indolent cancers that generally belong to the adenocarcinoma spectrum. Individualized management of screen-detected adenocarcinomas would be facilitated by noninvasive risk stratification. Objectives: To validate that Computer-Aided Nodule Assessment and Risk Yield (CANARY), a novel image analysis software, successfully risk stratifies screen-detected lung adenocarcinomas based on clinical disease outcomes. Methods: We identified retrospective 294 eligible patients diagnosed with lung adenocarcinoma spectrum lesions in the low-dose CT arm of the National Lung Screening Trial. The last low-dose CT scan before the diagnosis of lung adenocarcinoma was analyzed using CANARY blinded to clinical data. Based on their parametric CANARY signatures, all the lung adenocarcinoma nodules were risk stratified into three groups. CANARY risk groups were compared using survival analysis for progression-free survival. Measurements and Main Results: A total of 294 patients were included in the analysis. Kaplan-Meier analysis of all the 294 adenocarcinoma nodules stratified into the Good, Intermediate, and Poor CANARY risk groups yielded distinct progression-free survival curves (P < 0.0001). This observation was confirmed in the unadjusted and adjusted (age, sex, race, and smoking status) progression-free survival analysis of all stage I cases. Conclusions: CANARY allows the noninvasive risk stratification of lung adenocarcinomas into three groups with distinct post-treatment progression-free survival. Our results suggest that CANARY could ultimately facilitate individualized management of incidentally or screen-detected lung adenocarcinomas. PMID:26052977

  3. COORDINATES OF A RISK MANAGEMENT PROJECT

    Directory of Open Access Journals (Sweden)

    ALEXANDRU OLTEANU

    2013-05-01

    Full Text Available High risk – high benefit: a well-known correlation both in the economic field and in the day-to-day life. Another correlation, on which this article is based: large project – numerous participants – increased risks and other malfunctions. The risk management concept is challenged by those projects and is forced to find the most adequate “customized” ways for each project at its turn. In this respect, the assessment of management has followed the trend of the last three decades, marked by moving of management profit analysis by risk intermediation, respectively the transition from managing profit to risk-return relationship management. Such trend assumes the obligation of participants to identify objectives and expected benefits of the project on the basis of the strategies laid-down, the elements of risk management policies, in conjunction with the indication of the most negative scenarios which they may provide. This activity must take into consideration the process of obtaining and combining human, financial, physical and information resources in order to accomplish the primary goal of the proposed and wanted project by a certain segment of population. Project participants are directed to evaluate their own activities in terms of revenues and risks from the business access, opportunity, operating mode, as well as the limitations and boundaries on certain sides of activity. The paper focuses on the analysis and evaluation of incomes and risks, on simulations to streamline the activities and the determination of the optimal model of project choice. Also, the paper treats the risks that can be taken over by the sponsors, especially those related to implied guaranties, even implied guaranties.

  4. Methods of assessment and management of enterprise risks

    Directory of Open Access Journals (Sweden)

    I. A. Kiseleva

    2017-01-01

    Full Text Available The article is devoted to the actual topic of our time – the management of business risks. An integral part of professional risk management is to identify the nature of the object of management in the sphere of economy. Since the domestic theory of risk management is under development, the problem of a clear comprehensive definition of risk becomes now of particular relevance. The article discusses the basic concepts of risk management; studied its components in the business activities; reflected system and risk management principles; The basic types of risks in business. A organizational and economic mechanism of enterprise risk assessment. Practical advice on risk management. Entrepreneurship without risk does not exist. With the development of market economy the specific entrepreneur determines the methods that will work, and they all lead to entrepreneurial risks. The level of threats on the market today, above the level of potential profits. It is concluded that it is impossible to increase revenue without increasing the risk or reduce risk without reducing income. The lower range of the probability distribution of expected returns relative to its mean value, the lower the risk associated with this operation. Avoid risk in business is almost impossible, but you can reduce this risk. And it depends on how professionally and correctly operates the entrepreneur, what kind of strategy he will choose to reduce the appearance of risk.

  5. Managing Risk to the Patient: Recoding Quality Risk Management for the Pharmaceutical and Biopharmaceutical Industries

    OpenAIRE

    Waldron, Kelly

    2017-01-01

    This thesis explores the application of quality risk management (QRM) in pharmaceutical and biopharmaceutical companies and its effectiveness at managing risk to the patient. The objective of the research described in this thesis was to characterize a maturity state of QRM implementation in which the patient is adequately protected from the risks associated with medicinal products of inadequate quality. The research was conducted over three phases: first, to determine whether patients are bet...

  6. A SURVEY OF INTERNATIONAL FINANCIAL RISK MANAGEMENT SYSTEM

    Directory of Open Access Journals (Sweden)

    SETHI Narayan

    2013-12-01

    Full Text Available Rising global competition, increasing deregulation, and introduction of innovative products have pushed financial risk management to the forefront of today's financial landscape. Identification of different types of risks and effective management of these risks in the international financial system would help to alleviate crisis, financial losses and also helpful to the long term success of all the financial institutions. The present study aims to analyze different types of risk management strategies and throws some light on challenges and opportunities regarding implementation of Basel-II in international financial system. The present paper also attempts to discuss the different methods and techniques used to measure financial risk management. There are three types of risk faced by all financial institutions: market risk, credit risk and operational risk. In commercial banking, credit risk is the biggest risk; in investment banking, its market risk; and in asset management, it’s operational risk.

  7. The application of holistic risk management in the banking industry

    Directory of Open Access Journals (Sweden)

    J. Chibayambuya

    2007-12-01

    Full Text Available Purpose: The application of holistic risk management is fast becoming a standard measure of good governance in the business arena. What role can holistic risk management play in the management of risk in the financial services industry? The aim of this paper is to propose a holistic risk management framework for the management of risk. Design/Methodology/Approach: A comprehensive framework that covers the holistic view risk management is proposed/developed out of an extensive literature review. Findings: Given the deliberations of various frameworks, a holistic risk management is proposed. The proposed framework ensures that all components of risk management are taken into account when strategizing for risk management in general and holistic risk management in particular; thereby improving the management of risk in the banking industry. Implications: The article proposes a holistic approach to risk management which takes into account all the facets of risk management, e.g. analyzing, planning, strategy, communication, implementation, motivation, systems review and plan modification. This holistic approach, when implemented in the banking industry, can have a significant impact on the improved management of risk. Originality/Value: The new proposed holistic risk management framework offers a fresh perspective of strategizing for risk management in terms of risk analysis, risk planning, risk strategy, risk communication, risk implementation, risk motivation, risk review and risk plan modification.

  8. THEORETICAL BASIS FOR MANAGEMENT OF PERSONNEL RISKS

    OpenAIRE

    Haliashova, Katsiaryna

    2017-01-01

    Necessity of personnel risks management is based on research results. The authors' approaches to the determination of personnel risks and to their management have been explored. The author's definition of the concept of "personnel risks" is proposed. A classification of personnel risks is developed depending on the stage of origin and the tasks of the personnel policy, as well as the methods of management personnel risks in the organization. The article presents a methodical approach to perso...

  9. Economic Exposure and Integrated Risk Management

    OpenAIRE

    Miller, Kent D.

    1994-01-01

    Most corporate risk management research focuses on particular risk exposures to the exclusion of other interrelated exposures. By contrast, this study models corporate risk exposures using a multivariate approach integrating the distinct exposures of interest to finance and strategy researchers. The paper addresses the implications of multivariate modeling for corporate risk management, some key methodological issues arising in empirical estimation of corporate economic exposrues, and direc...

  10. Tutorial: Parallel Computing of Simulation Models for Risk Analysis.

    Science.gov (United States)

    Reilly, Allison C; Staid, Andrea; Gao, Michael; Guikema, Seth D

    2016-10-01

    Simulation models are widely used in risk analysis to study the effects of uncertainties on outcomes of interest in complex problems. Often, these models are computationally complex and time consuming to run. This latter point may be at odds with time-sensitive evaluations or may limit the number of parameters that are considered. In this article, we give an introductory tutorial focused on parallelizing simulation code to better leverage modern computing hardware, enabling risk analysts to better utilize simulation-based methods for quantifying uncertainty in practice. This article is aimed primarily at risk analysts who use simulation methods but do not yet utilize parallelization to decrease the computational burden of these models. The discussion is focused on conceptual aspects of embarrassingly parallel computer code and software considerations. Two complementary examples are shown using the languages MATLAB and R. A brief discussion of hardware considerations is located in the Appendix. © 2016 Society for Risk Analysis.

  11. Managing power risk

    International Nuclear Information System (INIS)

    Rudd, D.C.

    1999-01-01

    Issues regarding the management of financial risks in the electric power market were discussed. The nature of the risk was defined for electricity producers, local utilities, traders/dealers, and brokers, each of which are exposed to different types of risks with the exception of credit risk, which is common to all. The main features of options, swaps, CFDs, bilateral financial contracts, futures contracts and the terms of the NYMEX electricity contract were outlined. Basic derivative strategies, the role of the broker, the elements of emissions trading, and trading strategies for consumers were also explained. 3 fig

  12. Accommodating the Challenges of Climate Change Adaptation and Governance in Conventional Risk Management: Adaptive Collaborative Risk Management (ACRM)

    OpenAIRE

    Bradley May; Ryan Plummer

    2011-01-01

    Risk management is a well established tool for climate change adaptation. It is facing new challenges with the end of climate stationarity and the need to meaningfully engage people in governance issues. The ways in which conventional approaches to risk management can respond to these challenges are explored. Conventional approaches to risk management are summarized, the manner in which they are being advanced as a tool for climate change adaptation is described, and emerging themes in risk m...

  13. Process-based project proposal risk management

    Directory of Open Access Journals (Sweden)

    Alok Kumar

    2016-12-01

    Full Text Available We all are aware of the organizational omnipresence. Projects within the organizations are ubiquitous too. Projects achieve their goals successfully if they are planned, scheduled, controlled and implemented well. The project lifecycle of initiating, planning, scheduling, controlling and implementing are very well-planned by project managers and the organizations. Successful projects have well-developed risk management plans to deal with situations impacting projects. Like any other organisation, a university does try to access funds for different purposes too. For such organisations, running a project is not the issue, rather getting a project proposal approved to fund a project is the key. Project proposal processing is done by the nodal office in every organisation. Usually, these nodal offices help in administration and submission of a project proposal for accessing funds. Seldom are these nodal project offices within the organizations facilitate a project proposal approval by proactively reaching out to the project managers. And as project managers prepare project proposals, little or no attention is made to prepare a project proposal risk plan so as to maximise project acquisition. Risk plans are submitted while preparing proposals but these risk plans cater to a requirement to address actual projects upon approval. Hence, a risk management plan for project proposal is either missing or very little effort is made to treat the risks inherent in project acquisition. This paper is an integral attempt to highlight the importance of risk treatment for project proposal stage as an extremely important step to preparing the risk management plan made for projects corresponding to their lifecycle phases. Several tools and techniques have been proposed in the paper to help and guide either the project owner (proposer or the main organisational unit responsible for project management. Development of tools and techniques to further enhance project

  14. Computer applications in radiology business management

    International Nuclear Information System (INIS)

    Pratt, J.; Parrish, D.; Butler, J.; Gregg, S.; Farley, G.

    1987-01-01

    This presentation focuses on two areas of prime importance to radiology business management: financial/accounting applications and computer networking. The business management portion is an overview of accounts receivable management, financial reporting, management reporting, budgeting and forecasting (including cost/benefit analysis and break-even analysis), and personal and/or financial tax planning. The networking portion focuses on telecommunications and considers satellite facilities, electronic claims submission, and national database networking. Both numeric and graphic summaries are demonstrated in the presentation

  15. Performance Models and Risk Management in Communications Systems

    CERN Document Server

    Harrison, Peter; Rüstem, Berç

    2011-01-01

    This volume covers recent developments in the design, operation, and management of telecommunication and computer network systems in performance engineering and addresses issues of uncertainty, robustness, and risk. Uncertainty regarding loading and system parameters leads to challenging optimization and robustness issues. Stochastic modeling combined with optimization theory ensures the optimum end-to-end performance of telecommunication or computer network systems. In view of the diverse design options possible, supporting models have many adjustable parameters and choosing the best set for a particular performance objective is delicate and time-consuming. An optimization based approach determines the optimal possible allocation for these parameters. Researchers and graduate students working at the interface of telecommunications and operations research will benefit from this book. Due to the practical approach, this book will also serve as a reference tool for scientists and engineers in telecommunication ...

  16. Managing IT-related operational risks

    Directory of Open Access Journals (Sweden)

    Savić Ana

    2008-01-01

    Full Text Available Not so long ago, information technology (IT risk occupied a small corner of operational risk - the opportunity loss from a missed IT development deadline. Today, the success of an entire financial institution may lay on managing a broad landscape of IT risks. IT risk is a potential damage to an organization's value, resulting from inadequate managing of processes and technologies. IT risk includes the failure to respond to security and privacy requirements, as well as many other issues such as: human error, internal fraud through software manipulation, external fraud by intruders, obsolesce in applications and machines, reliability issues or mismanagement. The World Economic Forum provides best information about this problem. They rank a breakdown of critical information infrastructure among the most likely core global risks, with 10-20 % likelihood over the next 10 years and potential worldwide impact of $250 billion. Sustained investment in IT - almost $1.2 trillion or 29% of 2006 private-sector capital investment in the U.S. alone fuels growing exposure to IT risk. Greg Hughes, chief strategy officer in Symantec Corp. recently claimed "IT risk management is more than using technology to solve security problems. With proper planning and broad support, it can give an organization the confidence to innovate, using IT to outdistance competitors".

  17. Risk Management in Logystics Chains

    OpenAIRE

    Butrin, Andrey; Vikulov, Vladimir

    2013-01-01

    Article is devoted to risk management of supply chain. The authors considered indicators of supply chain risks, including risks caused by supplier. Authors formed a method of optimizing the level of supply chain risk in the integration with suppliers and customers.

  18. Development of a computational system for management of risks in radiosterilization processes of biological tissues; Desenvolvimento de um sistema computacional de gerenciamento de riscos em processos de radioesterilizacao de tecidos biologicos

    Energy Technology Data Exchange (ETDEWEB)

    Montoya, Cynara Viterbo

    2009-07-01

    Risk management can be understood to be a systematic management which aims to identify record and control the risks of a process. Applying risk management becomes a complex activity, due to the variety of professionals involved. In order to execute risk management the following are requirements of paramount importance: the experience, discernment and judgment of a multidisciplinary team, guided by means of quality tools, so as to provide standardization in the process of investigating the cause and effects of risks and dynamism in obtaining the objective desired, i.e. the reduction and control of the risk. This work aims to develop a computational system of risk management (software) which makes it feasible to diagnose the risks of the processes of radiosterilization of biological tissues. The methodology adopted was action-research, according to which the researcher performs an active role in the establishment of the problems found, in the follow-up and in the evaluation of the actions taken owing to the problems. The scenario of this action-research was the Laboratory of Biological Tissues (LTB) in the Radiation Technology Center IPEN/CNEN-SP - Sao Paulo/Brazil. The software developed was executed in PHP and Flash/MySQL language, the server (hosting), the software is available on the Internet (www.vcrisk.com.br), which the user can access from anywhere by means of the login/access password previously sent by email to the team responsible for the tissue to be analyzed. The software presents friendly navigability whereby the user is directed step-by-step in the process of investigating the risk up to the means of reducing it. The software 'makes' the user comply with the term and present the effectiveness of the actions taken to reduce the risk. Applying this system provided the organization (LTB/CTR/IPEN) with dynamic communication, effective between the members of the multidisciplinary team: a) in decision-making; b) in lessons learned; c) in knowing

  19. The Theme of Risk Management

    Directory of Open Access Journals (Sweden)

    Chua, D. K. H.

    2014-07-01

    Full Text Available The papers in this issue of the Journal come from different industry sectors, yet there can be a common theme that ties them together. Two of the papers address explicitly the issue of risk management, while the other three may be related to it in different degrees. One of the critical factors for project success is risk identification, as determined by Chua et al. (1999. The importance of risk management cannot be overemphasized. Failure to identify crucial risk elements in a project can lead to significant project failures in terms of cost and schedule.

  20. Risk management at GPU Nuclear

    International Nuclear Information System (INIS)

    Long, R.L.

    1991-01-01

    This paper reports on GPU Nuclear. Among other goals, it established the independence of key safety functions as highlighted by the lessons learned from the accident. In particular, an independent Nuclear Assurance Division was established which include Quality Assurance, Training and Education, Emergency Preparedness, and Nuclear Safety Assessment. The latter consisted of corporate and site independent-safety-review groups. As the GPU Nuclear organization matured, a mid-1987 reorganization created an even more focused Planning and Nuclear Safety Division bringing together Nuclear Safety Assessment with Licensing and Regulatory Affairs and Risk Management. The Risk Management Group (RMG), which began its work in fall 1987, was formed to develop a framework for proactive identification, evaluation, and cost-effective reduction and management of risks of all types. The RMG set out to learn as much as possible about risks and their management in nuclear and other high-technology industries. This began with a thorough literature search. It progressed to interviews with individuals and organizations which have demonstrated innovative ideas, experience, and reputations for safe and reliable operation

  1. Risk Management and Uncertainty in Infrastructure Projects

    DEFF Research Database (Denmark)

    Harty, Chris; Neerup Themsen, Tim; Tryggestad, Kjell

    2014-01-01

    The assumption that large complex projects should be managed in order to reduce uncertainty and increase predictability is not new. What is relatively new, however, is that uncertainty reduction can and should be obtained through formal risk management approaches. We question both assumptions...... by addressing a more fundamental question about the role of knowledge in current risk management practices. Inquiries into the predominant approaches to risk management in large infrastructure and construction projects reveal their assumptions about knowledge and we discuss the ramifications these have...... for project and construction management. Our argument and claim is that predominant risk management approaches tends to reinforce conventional ideas of project control whilst undermining other notions of value and relevance of built assets and project management process. These approaches fail to consider...

  2. Perceptions of food risk management among key stakeholders

    DEFF Research Database (Denmark)

    van Kleef, Ellen; Frewer, Lynn J.; Chryssochoidis, George M.

    2006-01-01

    In designing and implementing appropriate food risk management strategies, it is important to examine how key stakeholders perceive both the practice and effectiveness of food risk management.......In designing and implementing appropriate food risk management strategies, it is important to examine how key stakeholders perceive both the practice and effectiveness of food risk management....

  3. Rethinking 'risk' and self-management for chronic illness.

    Science.gov (United States)

    Morden, Andrew; Jinks, Clare; Ong, Bie Nio

    2012-02-01

    Self-management for chronic illness is a current high profile UK healthcare policy. Policy and clinical recommendations relating to chronic illnesses are framed within a language of lifestyle risk management. This article argues the enactment of risk within current UK self-management policy is intimately related to neo-liberal ideology and is geared towards population governance. The approach that dominates policy perspectives to 'risk' management is critiqued for positioning people as rational subjects who calculate risk probabilities and act upon them. Furthermore this perspective fails to understand the lay person's construction and enactment of risk, their agenda and contextual needs when living with chronic illness. Of everyday relevance to lay people is the management of risk and uncertainty relating to social roles and obligations, the emotions involved when encountering the risk and uncertainty in chronic illness, and the challenges posed by social structural factors and social environments that have to be managed. Thus, clinical enactments of self-management policy would benefit from taking a more holistic view to patient need and seek to avoid solely communicating lifestyle risk factors to be self-managed.

  4. The role of risk perception for risk management

    International Nuclear Information System (INIS)

    Renn, Ortwin

    1998-01-01

    Are risks social constructions of different societal actors that can be checked at best against standards of consistency, cohesion and internal conventions of deduction, but cannot claim any validity outside of the actor's logical framework? Or are technical estimates of risk representations of real hazards that can and will affect people as predicted by the statistical values, regardless of the beliefs or convictions of those who conduct the assessments? Which of the two sides one takes determines the legitimate function of risk perception for management purposes. The paper argues that both extremes, the constructivist and the realist perspective, miss the point, as risks are always mental representations of threats that are capable of claiming real losses. Over the last two decades, risk analysts have dealt with both sides of risk in an additive fashion. In times in which risk management has been under serious pressure to demonstrate effectiveness and cost-efficiency, the parallel approach of pleasing the technical elite and the public alike has lost legitimacy. In order to integrate risk assessment and perception, the paper analyses the strengths and weaknesses of each approach to risk analysis and highlights the potential contributions that the technical sciences and the social sciences can offer to risk management. Technical assessments provide the best estimate for judging the average probability of an adverse effect linked to an object or activity. First, public perception should govern the selection of criteria on which acceptability or tolerability are to be judged. Second, public input is needed to determine the trade-offs between criteria. Third, public preferences are needed to design resilient strategies for coping with remaining uncertainties. A public participation model is introduced that promises an integration of analytic knowledge and deliberative process involving those who will be affected by the respective risk

  5. A risk communication case study: the Nevada risk assessment/management program

    International Nuclear Information System (INIS)

    Hechanova, A.E.

    2000-01-01

    The Nevada Risk Assessment/Management Program (NRAMP) is part of a national effort by the U.S. Department of Energy (DOE) to develop new sources of information and approaches to risk assessment, risk management, risk communication and public outreach as these objectives relate to the ecological and human health effects of radioactive and hazardous material management and site remediation activities. This paper reviews the innovation behind the NRAMP project and presents a synopsis of the NRAMP effort which occurred from 1995 to 2000. The primary goals of the DOE in awarding the cooperative agreement establishing NRAMP were to (I) use a risk-based approach to evaluate the consequences of alternative actions in DOE's Environmental Remediation Programs at sites in Nevada and (2) use a neutral and credible institution outside the DOE to perform the risk assessments and contribute to public education about environmental management issues at the Nevada Test Site. (author)

  6. Contextualising risk within enterprise risk management through the application of systems thinking

    CSIR Research Space (South Africa)

    Haywood, Lorren K

    2017-06-01

    Full Text Available New and emerging risks create growing uncertainty and unpredictability within enterprise risk management. While ISO 31000:2009 is a progressive risk management framework, it is limited in its guidance on how to contextualise complex risks...

  7. INVENTORY AND RISK MANAGEMENT: DECREASING DELIVERY RISK OF PURCHASERS

    Directory of Open Access Journals (Sweden)

    Grzegorz MICHALSKI

    2008-12-01

    Full Text Available The basic financial purpose of an enterprise is maximization of its value. Inventory management should also contribute to realization of this fundamental aim. The enterprise value maximization strategy is executed with a focus on risk and uncertainty. This article presents the consequences for the recipients firm that can result from operating risk that is related to delivery risk generated by the suppliers. The present article offers a method that uses portfolio management theory to choose the suppliers.

  8. Management Ownership and Risk-Shifting Investment

    OpenAIRE

    Nobuyuki Teshima

    2012-01-01

    This study analyzes the relationship between management ownership and its risk-shifting incentive. We first present a simple model showing that the risk-shifting incentive of management of financially distressed firms increases as the management ownership of the firm increases. Empirically, we test the hypothesis that under the former Japanese Corporate Reorganization Law, firms with higher management ownership are more likely to use legal rather than private reorganization. Since the reorgan...

  9. Real-time management (RTM) by cloud computing system dynamics (CCSD) for risk analysis of Fukushima nuclear power plant (NPP) accident

    Energy Technology Data Exchange (ETDEWEB)

    Cho, Hyo Sung [Yonsei Univ., Wonju Gangwon-do (Korea, Republic of). Dept. of Radiation Convergence Engineering; Woo, Tae Ho [Yonsei Univ., Wonju Gangwon-do (Korea, Republic of). Dept. of Radiation Convergence Engineering; The Cyber Univ. of Korea, Seoul (Korea, Republic of). Dept. of Mechanical and Control Engineering

    2017-03-15

    The earthquake and tsunami induced accident of nuclear power plant (NPP) in Fukushima disaster is investigated by the real-time management (RTM) method. This non-linear logic of the safety management is applied to enhance the methodological confidence in the NPP reliability. The case study of the earthquake is modeled for the fast reaction characteristics of the RTM. The system dynamics (SD) modeling simulations and cloud computing are applied for the RTM method where the real time simulation has the fast and effective communication for the accident remediation and prevention. Current tablet computing system can improve the safety standard of the NPP. Finally, the procedure of the cloud computing system dynamics (CCSD) modeling is constructed.

  10. Real-time management (RTM) by cloud computing system dynamics (CCSD) for risk analysis of Fukushima nuclear power plant (NPP) accident

    International Nuclear Information System (INIS)

    Cho, Hyo Sung; Woo, Tae Ho; The Cyber Univ. of Korea, Seoul

    2017-01-01

    The earthquake and tsunami induced accident of nuclear power plant (NPP) in Fukushima disaster is investigated by the real-time management (RTM) method. This non-linear logic of the safety management is applied to enhance the methodological confidence in the NPP reliability. The case study of the earthquake is modeled for the fast reaction characteristics of the RTM. The system dynamics (SD) modeling simulations and cloud computing are applied for the RTM method where the real time simulation has the fast and effective communication for the accident remediation and prevention. Current tablet computing system can improve the safety standard of the NPP. Finally, the procedure of the cloud computing system dynamics (CCSD) modeling is constructed.

  11. A study of computer graphics technology in application of communication resource management

    Science.gov (United States)

    Li, Jing; Zhou, Liang; Yang, Fei

    2017-08-01

    With the development of computer technology, computer graphics technology has been widely used. Especially, the success of object-oriented technology and multimedia technology promotes the development of graphics technology in the computer software system. Therefore, the computer graphics theory and application technology have become an important topic in the field of computer, while the computer graphics technology becomes more and more extensive in various fields of application. In recent years, with the development of social economy, especially the rapid development of information technology, the traditional way of communication resource management cannot effectively meet the needs of resource management. In this case, the current communication resource management is still using the original management tools and management methods, resource management equipment management and maintenance, which brought a lot of problems. It is very difficult for non-professionals to understand the equipment and the situation in communication resource management. Resource utilization is relatively low, and managers cannot quickly and accurately understand the resource conditions. Aimed at the above problems, this paper proposes to introduce computer graphics technology into the communication resource management. The introduction of computer graphics not only makes communication resource management more vivid, but also reduces the cost of resource management and improves work efficiency.

  12. Marine and Hydrokinetic Technology Development Risk Management Framework

    Energy Technology Data Exchange (ETDEWEB)

    Snowberg, David [National Renewable Energy Lab. (NREL), Golden, CO (United States); Weber, Jochem [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2015-09-01

    Over the past decade, the global marine and hydrokinetic (MHK) industry has suffered a number of serious technological and commercial setbacks. To help reduce the risks of industry failures and advance the development of new technologies, the U.S. Department of Energy (DOE) and the National Renewable Energy Laboratory (NREL) developed an MHK Risk Management Framework. By addressing uncertainties, the MHK Risk Management Framework increases the likelihood of successful development of an MHK technology. It covers projects of any technical readiness level (TRL) or technical performance level (TPL) and all risk types (e.g. technological risk, regulatory risk, commercial risk) over the development cycle. This framework is intended for the development and deployment of a single MHK technology—not for multiple device deployments within a plant. This risk framework is intended to meet DOE’s risk management expectations for the MHK technology research and development efforts of the Water Power Program (see Appendix A). It also provides an overview of other relevant risk management tools and documentation.1 This framework emphasizes design and risk reviews as formal gates to ensure risks are managed throughout the technology development cycle. Section 1 presents the recommended technology development cycle, Sections 2 and 3 present tools to assess the TRL and TPL of the project, respectively. Section 4 presents a risk management process with design and risk reviews for actively managing risk within the project, and Section 5 presents a detailed description of a risk registry to collect the risk management information into one living document. Section 6 presents recommendations for collecting and using lessons learned throughout the development process.

  13. Strategic Risk Management and Corporate Value Creation

    DEFF Research Database (Denmark)

    Andersen, Torben Juul; Roggi, Oliviero

    Major corporate failures, periodic recessions, regional debt crises and volatile markets have intensified the focus on corporate risk management as the means to deal better with turbulent business conditions. Hence, the ability to respond effectively to the often dramatic environmental changes...... is considered an important source of competitive advantage. However, surprisingly little research has analyzed if the presumed advantages of effective risk management lead to superior performance or assessed important antecedents of effective risk management capabilities. Here we present a comprehensive study...... of risk management effectiveness and the relationship to corporate performance based on panel data for more than 3,400 firms accounting for over 33,500 annual observations during the turbulent period 1991-2010. Determining effective risk management as the ability to reduce earnings and cash flow...

  14. Developing Risk Management as a Competitive Capability

    OpenAIRE

    Silva, E.; Wu, Y.; Ojiako, U.

    2013-01-01

    At the level of the firm, three major parameters are found to influence the ability of SMEs to develop risk management competencies; these are enterprise risk management, internal control, and risk culture.

  15. Social Risk and the Management of MNCs

    DEFF Research Database (Denmark)

    Taarup Esbensen, Jacob

    2015-01-01

    Multinational companies (MNCs) are increasing being exposed to risk that originate from local communities in the business environment where they operate. The response has been to implement systems for stakeholder engagement by including social issues into their risk management systems. However......” systems, which are based on the capability to identify frames and sensemaking processes. This paper show how social risk management can be conventionalised using distinct theoretical domains taking its outset in a sociological perspective on risk, linking International Business (IB) risk management...

  16. RISK MANAGEMENT PROCESSES IN SUPPLY CHAINS

    Directory of Open Access Journals (Sweden)

    Aleksandar Aleksić

    2009-06-01

    Full Text Available One of the keys of successful business last few years is effective dealing with risks in every meaning of that word. At the time when the world economic crisis largely limits business, successful Risk management is the only way of survival for a large number of business systems. This paper will present the processes of risk management in supply chains that are in accordance with the standards ISO 28000 and ISO 31000. By implementing a holistic, enterprise-wide supply chain risk management program, companies also can uphold their commitment to providing strong corporate governance on behalf of stakeholders and increase their market value.

  17. Risk management of precious metals

    NARCIS (Netherlands)

    S.M. Hammoudeh (Shawkat); F. Malik (Farooq); M.J. McAleer (Michael)

    2010-01-01

    textabstractThis paper examines volatility and correlation dynamics in price returns of gold, silver, platinum and palladium, and explores the corresponding risk management implications for market risk and hedging. Value-at-Risk (VaR) is used to analyze the downside market risk associated with

  18. Automated procedure for performing computer security risk analysis

    International Nuclear Information System (INIS)

    Smith, S.T.; Lim, J.J.

    1984-05-01

    Computers, the invisible backbone of nuclear safeguards, monitor and control plant operations and support many materials accounting systems. Our automated procedure to assess computer security effectiveness differs from traditional risk analysis methods. The system is modeled as an interactive questionnaire, fully automated on a portable microcomputer. A set of modular event trees links the questionnaire to the risk assessment. Qualitative scores are obtained for target vulnerability, and qualitative impact measures are evaluated for a spectrum of threat-target pairs. These are then combined by a linguistic algebra to provide an accurate and meaningful risk measure. 12 references, 7 figures

  19. Risk management, derivatives and shariah compliance

    Science.gov (United States)

    Bacha, Obiyathulla Ismath

    2013-04-01

    Despite the impressive growth of Islamic Banking and Finance (IBF), a number of weaknesses remain. The most important of this is perhaps the lack of shariah compliant risk management tools. While the risk sharing philosophy of Islamic Finance requires the acceptance of risk to justify returns, the shariah also requires adherents to avoid unnecessary risk-maysir. The requirement to avoid maysir is in essence a call for the prudent management of risk. Contemporary risk management revolves around financial engineering, the building blocks of which are financial derivatives. Despite the proven efficacy of derivatives in the management of risk in the conventional space, shariah scholars appear to be suspicious and uneasy with their use in IBF. Some have imposed outright prohibition of their use. This paper re-examines the issue of contemporary derivative instruments and shariah compliance. The shariah compatibility of derivatives is shown in a number of ways. First, by way of qualitative evaluation of whether derivatives can be made to comply with the key prohibitions of the sharia. Second, by way of comparing the payoff profiles of derivatives with risk sharing finance and Bai Salam contracts. Finally, the equivalence between shariah compliant derivatives like the IPRS and Islamic FX Currency Forwards with conventional ones is presented.

  20. The total theory about risk management

    International Nuclear Information System (INIS)

    Furuya, Shunsuke

    2003-01-01

    A general working procedure of risk management, some example of other countries, topics and problems in the future are described. A definition of risk, risk assessment, risk management process, setting of aim and definite policy are explained. As a fundamental way of thinking, risk is controlled by ALARP (As Low As Reasonably Practicable). The upper and lower limit of risk level is called as Quantitative Safety Goal and Target Level of Safety, respectively. These limits in the atomic power and airplane are decided. Evaluation of risk, countermeasure and practice are explained. For example, a permissible range of risk and practical use in England, U.S.A, Holland and Japan are stated. Recently, accountability risk, missing demand risk and control risk are important. (S.Y.)

  1. Exchange Risk Management Policy

    CERN Document Server

    2005-01-01

    At the Finance Committee of March 2005, following a comment by the CERN Audit Committee, the Chairman invited the Management to prepare a document on exchange risk management policy. The Finance Committee is invited to take note of this document.

  2. Risk management at Lawrence Livermore National Laboratory

    International Nuclear Information System (INIS)

    Cummings, G.E.; Strait, R.S.

    1993-10-01

    Managing risks at a large national laboratory presents a unique set of challenges. These challenges include the management of a broad diversity of activities, the need to balance research flexibility against management control, and a plethora of requirements flowing from regulatory and oversight bodies. This paper will present the experiences of Lawrence Livermore National Laboratory (LLNL) in risk management and in dealing with these challenges. While general risk management has been practiced successfully by all levels of Laboratory management, this paper will focus on the Laboratory's use of probabilistic safety assessment and prioritization techniques and the integration of these techniques into Laboratory operations

  3. BEHAVIOURAL INSIGHTS INTO SUPPLY CHAIN RISK MANAGEMENT

    OpenAIRE

    Alexandra-Codruta Popescu (Bîzoi); Cristian-Gabriel Bîzoi

    2015-01-01

    Literature has focused largely on the field of supply chain risk management. Numerous risks occur within supply chain management. Until lately, behavioural risks (implying large amount of losses) have been neglected and considered not relevant. In this paper we provide an analysis of the importance of including behavioural research in logistics and supply chain risk management, what has been written so far and potential future research directions. Until now, literature on logistics and supply...

  4. Risk management in Swedish hedge funds

    OpenAIRE

    Fri, Samuel; Nilsson, Joakim

    2011-01-01

    Background: Risk management has always been a complex topic, especially when it comes to hedge funds. Since hedge funds are able to utilize many kinds of financial instruments it is difficult to find a risk management strategy that goes well with them. Not much research regarding the Swedish hedge fund industry and its risk management has been done; hence we find it an interesting topic to focus this thesis on. Purpose: The purpose of this thesis is to increase the knowledge of how Swedish he...

  5. Is ALARP applicable to the management of terrorist risks?

    International Nuclear Information System (INIS)

    Guikema, S.D.; Aven, T.

    2010-01-01

    In this paper, we discuss the applicability of the as low as reasonable practicable (ALARP) principle to terrorist risk management. ALARP is a commonly used framework for managing risk due to non-intelligent threats, but terrorism introduces difficult issues, both technically and socially. In particular, the probability of a terrorist attack is difficult to define, terrorist threats are adaptive, and some terrorist risk management actions raise issues of loss of civil liberties not raised by risk management measures for other types of risk. We discuss these issues and their implications for risk management. After showing how ALARP is used to manage the risk from other hazards in different economic sectors, we discuss both the benefits and difficulties associated with extending the ALARP framework for terrorist risk analysis. We conclude that the ALARP framework can be modified to make it appropriate for risk management for adaptive risks, provided that care is taken to explicitly consider adaptive reallocation of risk in response to risk management actions, to account for perceived or actual loss of civil liberties resulting from risk management actions, and to consider the difficulties associated with using probability to measure uncertainty in adversary actions.

  6. Computational red teaming risk analytics of big-data-to-decisions intelligent systems

    CERN Document Server

    Abbass, Hussein A

    2015-01-01

    Written to bridge the information needs of management and computational scientists, this book presents the first comprehensive treatment of Computational Red Teaming (CRT).  The author describes an analytics environment that blends human reasoning and computational modeling to design risk-aware and evidence-based smart decision making systems. He presents the Shadow CRT Machine, which shadows the operations of an actual system to think with decision makers, challenge threats, and design remedies. This is the first book to generalize red teaming (RT) outside the military and security domains and it offers coverage of RT principles, practical and ethical guidelines. The author utilizes Gilbert’s principles for introducing a science. Simplicity: where the book follows a special style to make it accessible to a wide range of  readers. Coherence:  where only necessary elements from experimentation, optimization, simulation, data mining, big data, cognitive information processing, and system thinking are blend...

  7. Enhanced Capabilities for Subcritical Experiments (ECSE) Risk Management Plan

    Energy Technology Data Exchange (ETDEWEB)

    Urban, Mary Elizabeth [Los Alamos National Lab. (LANL), Los Alamos, NM (United States). Process Modeling and Analysis Group

    2016-05-02

    Risk is a factor, element, constraint, or course of action that introduces an uncertainty of outcome that could impact project objectives. Risk is an inherent part of all activities, whether the activity is simple and small, or large and complex. Risk management is a process that identifies, evaluates, handles, and monitors risks that have the potential to affect project success. The risk management process spans the entire project, from its initiation to its successful completion and closeout, including both technical and programmatic (non-technical) risks. This Risk Management Plan (RMP) defines the process to be used for identifying, evaluating, handling, and monitoring risks as part of the overall management of the Enhanced Capabilities for Subcritical Experiments (ECSE) ‘Project’. Given the changing nature of the project environment, risk management is essentially an ongoing and iterative process, which applies the best efforts of a knowledgeable project staff to a suite of focused and prioritized concerns. The risk management process itself must be continually applied throughout the project life cycle. This document was prepared in accordance with DOE O 413.3B, Program and Project Management for the Acquisition of Capital Assets, its associated guide for risk management DOE G 413.3-7, Risk Management Guide, and LANL ADPM AP-350-204, Risk and Opportunity Management.

  8. Assessing and managing multiple risks in a changing world ...

    Science.gov (United States)

    Roskilde University (Denmark) hosted a November 2015 workshop, Environmental Risk—Assessing and Managing Multiple Risks in a Changing World. This Focus article presents the consensus recommendations of 30 attendees from 9 countries regarding implementation of a common currency (ecosystem services) for holistic environmental risk assessment and management; improvements to risk assessment and management in a complex, human-modified, and changing world; appropriate development of protection goals in a 2-stage process; dealing with societal issues; risk-management information needs; conducting risk assessment of risk management; and development of adaptive and flexible regulatory systems. The authors encourage both cross-disciplinary and interdisciplinary approaches to address their 10 recommendations: 1) adopt ecosystem services as a common currency for risk assessment and management; 2) consider cumulative stressors (chemical and nonchemical) and determine which dominate to best manage and restore ecosystem services; 3) fully integrate risk managers and communities of interest into the risk-assessment process; 4) fully integrate risk assessors and communities of interest into the risk-management process; 5) consider socioeconomics and increased transparency in both risk assessment and risk management; 6) recognize the ethical rights of humans and ecosystems to an adequate level of protection; 7) determine relevant reference conditions and the proper ecological c

  9. Managing industrial risk--having a tested and proven system to prevent and assess risk.

    Science.gov (United States)

    Heller, Stephen

    2006-03-17

    Some relatively easy techniques exist to improve the risk picture/profile to aid in preventing losses. Today with the advent of computer system resources, focusing on specific aspects of risk through systematic scoring and comparison, the risk analysis can be relatively easy to achieve. Techniques like these demonstrate how working experience and common sense can be combined mathematically into a flexible risk management tool or risk model for analyzing risk. The risk assessment methodology provided by companies today is no longer the ideas and practices of one group or even one company. It is reflective of the practice of many companies, as well as the ideas and expertise of academia and government regulators. The use of multi-criteria decision making (MCDM) techniques for making critical decisions has been recognized for many years for a variety of purposes. In today's computer age, the easy accessing and user-friendly nature for using these techniques, makes them a favorable choice for use in the risk assessment environment. The new user of these methodologies should find many ideas directly applicable to his or her needs when approaching risk decision making. The user should find their ideas readily adapted, with slight modification, to accurately reflect a specific situation using MCDM techniques. This makes them an attractive feature for use in assessment and risk modeling. The main advantage of decision making techniques, such as MCDM, is that in the early stages of a risk assessment, accurate data on industrial risk, and failures are lacking. In most cases, it is still insufficient to perform a thorough risk assessment using purely statistical concepts. The practical advantages towards deviating from strict data-driven protocol seem to outweigh the drawbacks. Industry failure data often comes at a high cost when a loss occurs. We can benefit from this unfortunate acquisition of data through the continuous refining of our decisions by incorporating this new

  10. Managing Impression Formation in Computer-Mediated Communication.

    Science.gov (United States)

    Liu, Yuliang; Ginther, Dean

    2001-01-01

    Offers suggestions for online instructors regarding verbal and nonverbal impression management. The recommendations should facilitate computer mediated teacher-student or manager-client interactions and help develop constructive relationships that promote learning and productivity. (EV)

  11. Computer-assisted power plant management

    International Nuclear Information System (INIS)

    Boettcher, D.

    1990-01-01

    Operating a power plant and keeping it operational is ensured by a multiplicity of technical management subtasks which are cross referenced and based on an extensive inventory of descriptive and operational plant data. These data stocks are still registered in an isolated mode and managed and updated manually. This is a labor intensive, error prone procedure. In this situation, the introduction of a computer-assisted plant management system, whose core is a data-base of assured quality common to all activities, and which contains standardized processing aids fully planned for the subtasks occurring in the plant, is likely to achieve a considerable improvement in the quality of plant management and to relieve the staff of administrative activities. (orig.) [de

  12. Dairy farmer use of price risk management tools.

    Science.gov (United States)

    Wolf, C A

    2012-07-01

    Volatility in milk and feed prices can adversely affect dairy farm profitability. Many risk management tools are available for use by US dairy farmers. This research uses surveys of Michigan dairy farmers to examine the extent to which price risk management tools have been used, the farm and operator characteristics that explain the use of these tools, and reasons farmers have not used these tools. A 1999 survey was used to benchmark the degree to which dairy producers had used milk and feed price risk management instruments to compare with 2011 use rates. The surveys collected information about the farm characteristics such as herd size, farmland operated, business organization, and solvency position. Farm operator characteristics collected include age, education, and experience. Dairy farmer use of both milk and feed price risk management tools increased between 1999 and 2011. In 2011, herd size was positively related to the use of milk price risk management tools, whereas farms organized as a sole proprietorship were less likely to use them. Also in 2011, herd size and land operated were positively related to feed price risk management tools, whereas operator age was negatively related. Reasons why farmers had not used price risk management tools included basis risk, cost, lack of management time, cooperative membership, and lack of understanding. Conclusions include the need for educational programming on price risk management tools and a broader exploration of dairy farm risk management programs. Copyright © 2012 American Dairy Science Association. Published by Elsevier Inc. All rights reserved.

  13. From CSR to Social Risk Management

    DEFF Research Database (Denmark)

    Taarup Esbensen, Jacob

    2014-01-01

    When it comes to social risks multinational companies (MNC) within Mining are one of the most exposed businesses one can imagine. This paper examines how social risk management is practiced through the case of Teghout copper-molybdenum mine in North- Eastern Armenia, supplemented with evidence from...... other mining MNCs in the country, onsite fieldwork, interviews with key stakeholders, and public available information. This evidence suggest that a standards based social risk management strategy is adopted and that this strategy is based on international Corporate Social Responsibility (CSR) standards...... engagement management systems that is promoted through the standard. The implemented social risk management systems are ineffective because they makes the MNC unable to recognise the value of weak ties and fail to build legitimacy and trust with some of the key stakeholders resulting in the creation of more...

  14. WAYS TO IMPROVE RISK MANAGEMENT IN COMPLEX PROJECTS

    Directory of Open Access Journals (Sweden)

    Emilia IORDACHE

    2012-01-01

    Full Text Available Risk is present in all human activities; it can be associated with health, security, economy or environment. The goal of risk management is to control, prevent or decrease potential damages. Technically speaking, risk management means all the activities coordinated so as to orient and monitor an organization from the risk perspective. Risk management helps formulate the most adequate decisions by taking account of uncertainties and their effects upon the accomplishment of proposed goals, and argues the need to lay down and implement coercive, preventive actions typical of the management of a company. The benefits of good risk management and also the consequences of bad management shall undoubtedly be felt by an organization’s board, employees, shareholders, customers as well as by all other entities concerned with organizational performance. Projects generally include a number of risks in common with those in business as well as certain typical ones. In complex projects, it is this very feature – complexity – which generates the need to implement risk management for the purpose to diminish, remove, and monitor the risks which can influence the development of a project.

  15. Risk Management in Information Technology Project: An Empirical Study

    Directory of Open Access Journals (Sweden)

    Kornelius Irfandhi

    2016-09-01

    Full Text Available The companies are facing some risks due to changes in a dynamic environment. If risks are not managed properly, it will have some negative impacts on the companies at the present and the future. One important function of the Information Technology (IT governance is risk management. Risk management in IT project aims to provide a safe environment for IT projects undertaken. Risk management becomes an important process for the success of IT projects. This article discussed the risk of IT project and whether there was a relationship between risk management and the success of the project. The method used was performing a literature review of several scientific articles which published between 2010 and 2014. The results of this study are the presence of risk management and risk manager influence the success of the project. Risk analysis and risk monitoring and control also have a relationship with the subjective performance of IT projects. If risk management is applied properly, the chance of the success of the projects undertaken can be increased. 

  16. The NASA Continuous Risk Management Process

    Science.gov (United States)

    Pokorny, Frank M.

    2004-01-01

    As an intern this summer in the GRC Risk Management Office, I have become familiar with the NASA Continuous Risk Management Process. In this process, risk is considered in terms of the probability that an undesired event will occur and the impact of the event, should it occur (ref., NASA-NPG: 7120.5). Risk management belongs in every part of every project and should be ongoing from start to finish. Another key point is that a risk is not a problem until it has happened. With that in mind, there is a six step cycle for continuous risk management that prevents risks from becoming problems. The steps are: identify, analyze, plan, track, control, and communicate & document. Incorporated in the first step are several methods to identify risks such as brainstorming and using lessons learned. Once a risk is identified, a risk statement is made on a risk information sheet consisting of a single condition and one or more consequences. There can also be a context section where the risk is explained in more detail. Additionally there are three main goals of analyzing a risk, which are evaluate, classify, and prioritize. Here is where a value is given to the attributes of a risk &e., probability, impact, and timeframe) based on a multi-level classification system (e.g., low, medium, high). It is important to keep in mind that the definitions of these levels are probably different for each project. Furthermore the risks can be combined into groups. Then, the risks are prioritized to see what risk is necessary to mitigate first. After the risks are analyzed, a plan is made to mitigate as many risks as feasible. Each risk should be assigned to someone in the project with knowledge in the area of the risk. Then the possible approaches to choose from are: research, accept, watch, or mitigate. Next, all risks, mitigated or not, are tracked either individually or in groups. As the plan is executed, risks are re-evaluated, and the attribute values are adjusted as necessary. Metrics

  17. The essentials of risk management the definitive guide for the non-risk professional

    CERN Document Server

    Crouhy, Michel; Mark, Robert

    2006-01-01

    Learn what risk management is and how you can effectively implement it in your organisation Essentials of Risk Management eliminates the complex mathematics and minutiae surrounding corporate risk management. It describes key risk concepts and controls in language that you can understand. Topics include organisational issues and regulatory aspects, along with detailed descriptions of tools for controlling key types of market, credit, and operational risk.

  18. The Research on Safety Management Information System of Railway Passenger Based on Risk Management Theory

    Science.gov (United States)

    Zhu, Wenmin; Jia, Yuanhua

    2018-01-01

    Based on the risk management theory and the PDCA cycle model, requirements of the railway passenger transport safety production is analyzed, and the establishment of the security risk assessment team is proposed to manage risk by FTA with Delphi from both qualitative and quantitative aspects. The safety production committee is also established to accomplish performance appraisal, which is for further ensuring the correctness of risk management results, optimizing the safety management business processes and improving risk management capabilities. The basic framework and risk information database of risk management information system of railway passenger transport safety are designed by Ajax, Web Services and SQL technologies. The system realizes functions about risk management, performance appraisal and data management, and provides an efficient and convenient information management platform for railway passenger safety manager.

  19. Online application of a risk management system for risk assessment and monitoring at NPPs

    Energy Technology Data Exchange (ETDEWEB)

    Yang, Jun, E-mail: youngjun51@hotmail.com [Key Laboratory of Fundamental Science on Nuclear Safety and Simulation Technology, Harbin Engineering University (China); Yang, Ming, E-mail: yangming@hrbeu.edu.cn [Key Laboratory of Fundamental Science on Nuclear Safety and Simulation Technology, Harbin Engineering University (China); Wang, Wenlin, E-mail: wlwang0618@126.com [Key Laboratory of Fundamental Science on Nuclear Safety and Simulation Technology, Harbin Engineering University (China); Li, Fengjun, E-mail: leefengjun@163.com [China Nuclear Power Engineering Co. Ltd (China)

    2016-08-15

    Highlights: • A generic GO-FLOW modeling structure is proposed for easily Living PSA development and analysis. • Hierarchical and modularized scheme is applied in the development of Living PSA models and database. • A risk management system is developed by GO-FLOW method. • Functional testing is conducted on the risk management system for performance evaluation. • The fast solution time derived from Living PSA application is supportive in plant safety management. - Abstract: The paper presents a risk management system on the basis of Living PSA models which are developed under a proposed generic GO-FLOW modeling method with a hierarchical and modular structure. The design of the risk management system is aiming at assisting plant personnel to manage maintenance plan and system configuration, and conduct system reliability monitoring, risk monitoring and risk management quickly and conveniently through graphical user interfaces without going deep into the details of building, updating and analyzing reliability and risk models. The performance of the proposed risk management system was tested on a full-scale simulator of PWR nuclear power plant and demonstrated that the fast solution time derived from utilization of hierarchical and modularized Living PSA models is strongly supportive for instantaneous risk assessment as well as for daily risk management at NPPs.

  20. Risk management in product innovation projects

    NARCIS (Netherlands)

    Halman, J.I.M.; Keizer, J.A.

    1993-01-01

    In product innovation projects risk management has become increasingly important. Technological and commercial developments ask for effective and efficient product innovation. Systematic diagnosing and management of risks can help to make product innovation projects successful. In this paper a

  1. Shutdown risk management applied at Philadelphia Electric Company

    International Nuclear Information System (INIS)

    Dagan, William J.; True, Douglas E.; Wilson, Thomas; Truax, William

    2004-01-01

    The development and implementation of an effective risk management program requires basic risk or safety knowledge and the conversion of such information into effective management tools. ERIN Engineering and Research, Inc., under contract to the Electric Power Research Institute, has developed an effective program. Outage Risk Assessment and Management (ORAM), to provide plant and management personnel with understandable results of shutdown risk studies. With this tool, the impact of plans and decision options can be readily determined and displayed for the decision maker. This paper describes these methods and their application to the Limerick Nuclear Station of Philadelphia Electric Company. It also sets forth a broader application of these methods to include support of management decisions at-power and following forced outages. The result is an integrated risk management framework which can allow management and technical personnel to utilize readily available and understandable risk insights to optimize each activity. This paper addresses the resolution of several key issues in detail: How was the ORAM risk management method employed to represent the existing plant shutdown procedures and policies? How did the ORAM risk management method enhance the decision-making ability of the outage management staff? How was the ORAM software efficiently integrated with the outage scheduling software? How is quantitative risk information generated and used for outage planning and control? The ORAM risk management philosophy utilizes a series of colors to depict various risk configurations. Each such configuration has associated with it clear guidance. By modifying the conditions existing in the plant it is possible to impact the type of risk being encountered as well as the guidance which is appropriate for that period. In addition, the duration of a particular configuration can be effectively managed to reduce the overall risk impact. These are achieved with minimal

  2. Managing the total cost of risk exposures through risk mapping techniques

    International Nuclear Information System (INIS)

    Unione, A.J.; Rode, D.M.

    1998-01-01

    In a competitive power market, power producers are exposed to an increasingly broad spectrum of financial risks. The cumulative impact of these financial risks is known collectively as the Total of Cost of Risk. The concept of Total of Cost of Risk presents the business reality of a company's exposure to potentially devastating financial consequences in an integrated and useful way. In this way, a strategy of managing Total Cost of Risk in the most cost effective way can become a means of ensuring long term business health and security. This paper will examine the use of risk mapping as a tool for visually understanding Total Cost of Risk, thus creating an enhanced situational awareness and an integrated basis for risk management decision. The evaluation process, available through the use of risk maps allows the power producers to pro-actively implement prudent business decisions concerning the design, operation and maintenance of power plants. Risk mapping is thus a means for harmonizing operational objectives, such as improved plant reliability, with corporate strategies and goals in terms of an effective risk management program

  3. Guide to cloud computing for business and technology managers from distributed computing to cloudware applications

    CERN Document Server

    Kale, Vivek

    2014-01-01

    Guide to Cloud Computing for Business and Technology Managers: From Distributed Computing to Cloudware Applications unravels the mystery of cloud computing and explains how it can transform the operating contexts of business enterprises. It provides a clear understanding of what cloud computing really means, what it can do, and when it is practical to use. Addressing the primary management and operation concerns of cloudware, including performance, measurement, monitoring, and security, this pragmatic book:Introduces the enterprise applications integration (EAI) solutions that were a first ste

  4. APPLIED ISSUES ABOUT BANKING RISK MANAGEMENT

    Directory of Open Access Journals (Sweden)

    Elena Geanina Clipici

    2017-09-01

    Full Text Available The following paper emphasizes the need to deepen the understanding of the notion of banking risk management by explaining the significant risks the bank encounters during financial exercises as well as their additional entries. The study of the paper will focus on UniCredit Bank during the years 2014 and  2015 on all types of risks, in which we will provide comprehensive data on how the UniCredit Bank management applies its risk policies.

  5. AN OVERVIEW ON STATE OF KNOWLEDGE OF RISK AND RISK MANAGEMENT IN ECONOMICS FIELDS

    Directory of Open Access Journals (Sweden)

    Mirela NICHITA

    2015-04-01

    Full Text Available The purpose of this paper is to present a history and an evolution of concepts of risk and risk management in economic, respectively financial fields, highlighting the usefulness (or not and complexity of tools for risk assessment developed over time. The main objective of risk management is to reduce costs and increase the value of company and stakeholders gains; also, a coherent risk management strategy may improve entity capital structure which will derive in a healthy financing policy. The risk and risk management field has been developed merely after the second world war and creates the favourable context of a new C position in business chart – Chief Risk Officer. The paper will explore the etymology of term risk correlated with the uncertainty. Research on risk and risk management is not possible without taking into account the derivatives market.

  6. Drug utilization research and risk management

    NARCIS (Netherlands)

    Mazzaglia, Giampiero; Mol, Peter G. M.; Elseviers, Monique; Wettermark, Björn; Almarsdóttir, Anna Birna; Andersen, Morten; Benko, Ria; Bennie, Marion; Eriksson, Irene; Godman, Brian; Krska, Janet; Poluzzi, Elisabetta; Taxis, Katja; Vlahovic-Palcevski, Vera; Stichele, Robert Vander

    2016-01-01

    Good risk management requires continuous evaluation and improvement of planned activities. The evaluation impact of risk management activities requires robust study designs and carefully selected outcome measures. Key learnings and caveats from drug utilization research should be applied to the

  7. Risk Management for Enterprise Resource Planning Post Implementation Using COBIT 5 for Risk

    OpenAIRE

    Indah, Dwi Rosa; Harlili, Harlili; Firdaus, Afriyan

    2014-01-01

    Risk management for ERP postimplementation is required to achieve ERP success. In this paper, risk management for ERP postimplementation is designed using COBIT 5 for Risk on APO12 processes. The design of a risk management framework begins with assessment of ERP postimplementation success adopting two approaches, namely the framework of ERP post-implementation success and Critical Success Factor of ERP post-implementation as an input to the risk identification adopted from COBIT 5 for Risk. ...

  8. Computer-supported games and role plays in teaching water management

    Directory of Open Access Journals (Sweden)

    A. Y. Hoekstra

    2012-08-01

    Full Text Available There is an increasing demand for an interdisciplinary approach in teaching water management. Computer-supported games and role plays offer the potential of creating an environment in which different disciplines come together and in which students are challenged to develop integrated understanding. Two examples are discussed. The River Basin Game is a common-pool resource game in which participants experience the risk of over-abstractions of water in a river basin and learn how this risk relates to the complexity of the system, the conflict between individual and group optimums and the difficulty in achieving good cooperation. The Globalization of Water Role Play makes participants familiar with the global dimension of water management by letting them experience how national governments can integrate considerations of water scarcity and domestic water productivities into decisions on international trade in commodities like food, cotton and bio-energy. The two examples illustrate that play sessions inspire participants to think about the functioning of systems as a whole and to develop good cooperative courses of action, whereby both uncertainties about the system and the presence of different values and perspectives among participants play a role.

  9. Computer-supported games and role plays in teaching water management

    Science.gov (United States)

    Hoekstra, A. Y.

    2012-08-01

    There is an increasing demand for an interdisciplinary approach in teaching water management. Computer-supported games and role plays offer the potential of creating an environment in which different disciplines come together and in which students are challenged to develop integrated understanding. Two examples are discussed. The River Basin Game is a common-pool resource game in which participants experience the risk of over-abstractions of water in a river basin and learn how this risk relates to the complexity of the system, the conflict between individual and group optimums and the difficulty in achieving good cooperation. The Globalization of Water Role Play makes participants familiar with the global dimension of water management by letting them experience how national governments can integrate considerations of water scarcity and domestic water productivities into decisions on international trade in commodities like food, cotton and bio-energy. The two examples illustrate that play sessions inspire participants to think about the functioning of systems as a whole and to develop good cooperative courses of action, whereby both uncertainties about the system and the presence of different values and perspectives among participants play a role.

  10. Interest Rate Risk Management using Duration Gap Methodology

    Directory of Open Access Journals (Sweden)

    Dan Armeanu

    2008-01-01

    Full Text Available The world for financial institutions has changed during the last 20 years, and become riskier and more competitive-driven. After the deregulation of the financial market, banks had to take on extensive risk in order to earn sufficient returns. Interest rate volatility has increased dramatically over the past twenty-five years and for that an efficient management of this interest rate risk is strong required. In the last years banks developed a variety of methods for measuring and managing interest rate risk. From these the most frequently used in real banking life and recommended by Basel Committee are based on: Reprising Model or Funding Gap Model, Maturity Gap Model, Duration Gap Model, Static and Dynamic Simulation. The purpose of this article is to give a good understanding of duration gap model used for managing interest rate risk. The article starts with a overview of interest rate risk and explain how this type of risk should be measured and managed within an asset-liability management. Then the articles takes a short look at methods for measuring interest rate risk and after that explains and demonstrates how can be used Duration Gap Model for managing interest rate risk in banks.The world for financial institutions has changed during the last 20 years, and become riskier and more competitive-driven. After the deregulation of the financial market, banks had to take on extensive risk in order to earn sufficient returns. Interest rate volatility has increased dramatically over the past twenty-five years and for that an efficient management of this interest rate risk is strong required. In the last years banks developed a variety of methods for measuring and managing interest rate risk. From these the most frequently used in real banking life and recommended by Basel Committee are based on: Reprising Model or Funding Gap Model, Maturity Gap Model, Duration Gap Model, Static and Dynamic Simulation. The purpose of this article is to give a

  11. HOW INTERNAL RISK - BASED AUDIT APPRAISES THE EVALUATION OF RISKS MANAGEMENT

    Directory of Open Access Journals (Sweden)

    N. Dorosh

    2017-09-01

    Full Text Available The article deals with the nature and function of the internal risk-based audit process approach to create patterns of risks and methods of evaluation. Deals with the relationship between the level of maturity of the risk of the company and the method of risk-based internal audit. it was emphasized that internal auditing provides an independent and objective opinion to an organization’s management as to whether its risks are being managed to acceptable levels.

  12. Underground risk management information systems

    Energy Technology Data Exchange (ETDEWEB)

    Matsuyama, S.; Inoue, M.; Sakai, T.

    2006-03-15

    JCOAL has conducted Joint Research on an Underground Communication and Risk Management Information System with CSIRO of Australia under a commissioned study project for the promotion of coal use starting in fiscal 2002. The goal of this research project is the establishment of a new Safety System focusing on the comprehensive risk management information system by the name of Nexsys. The main components of the system are the Ethernet type underground communication system that represents the data communication base, and the risk management information system that permits risk analysis in real-time and provides decision support based on the collected data. The Nexsys is an open system and is a core element of the underground monitoring system. Using a vast amount of underground data, it is capable of accommodating a wide range of functions that were not available in the past. Because of it, it is possible to construct an advanced underground safety system. 14 figs., 4 tabs.

  13. Current Chemical Risk Management Activities

    Science.gov (United States)

    EPA's existing chemicals programs address pollution prevention, risk assessment, hazard and exposure assessment and/or characterization, and risk management for chemicals substances in commercial use.

  14. Natural hazard management high education: laboratory of hydrologic and hydraulic risk management and applied geomorphology

    Science.gov (United States)

    Giosa, L.; Margiotta, M. R.; Sdao, F.; Sole, A.; Albano, R.; Cappa, G.; Giammatteo, C.; Pagliuca, R.; Piccolo, G.; Statuto, D.

    2009-04-01

    The Environmental Engineering Faculty of University of Basilicata have higher-level course for students in the field of natural hazard. The curriculum provides expertise in the field of prediction, prevention and management of earthquake risk, hydrologic-hydraulic risk, and geomorphological risk. These skills will contribute to the training of specialists, as well as having a thorough knowledge of the genesis and the phenomenology of natural risks, know how to interpret, evaluate and monitor the dynamic of environment and of territory. In addition to basic training in the fields of mathematics and physics, the course of study provides specific lessons relating to seismic and structural dynamics of land, environmental and computational hydraulics, hydrology and applied hydrogeology. In particular in this course there are organized two connected examination arguments: Laboratory of hydrologic and hydraulic risk management and Applied geomorphology. These course foresee the development and resolution of natural hazard problems through the study of a real natural disaster. In the last year, the work project has regarded the collapse of two decantation basins of fluorspar, extracted from some mines in Stava Valley, 19 July 1985, northern Italy. During the development of the course, data and event information has been collected, a guided tour to the places of the disaster has been organized, and finally the application of mathematical models to simulate the disaster and analysis of the results has been carried out. The student work has been presented in a public workshop.

  15. Improving Information Security Risk Management

    Science.gov (United States)

    Singh, Anand

    2009-01-01

    manaOptimizing risk to information to protect the enterprise as well as to satisfy government and industry mandates is a core function of most information security departments. Risk management is the discipline that is focused on assessing, mitigating, monitoring and optimizing risks to information. Risk assessments and analyses are critical…

  16. 77 FR 30517 - Electricity Subsector Cybersecurity Risk Management Process

    Science.gov (United States)

    2012-05-23

    ... DEPARTMENT OF ENERGY Electricity Subsector Cybersecurity Risk Management Process AGENCY: Office of... Electricity Subsector Cybersecurity Risk Management Process guideline. The guideline describes a risk... Management Process. The primary goal of this guideline is to describe a risk management process that is...

  17. Risk management guide

    International Nuclear Information System (INIS)

    Briscoe, G.J.

    1977-06-01

    Risk management requires an assessment or a knowledge of risk. This, in turn, requires identification of hazards (sources of risk) and a determination of risk (evaluation of the hazard degree). The hazard identification and risk analysis techniques presented in this Guide are, in general, based on the MORT concept that accidents result from unwanted energy flow in the absence of adequate controls and/or barriers. This Guide presents an analytical tree designed to prevent oversight of specific energy sources in risk identification. Hazard identification by field personnel is also discussed. Quantitative risk analysis is discussed in the following section. A method for summary of the risks for each energy classification is given. This method uses a graphical log-normal projection so that low probability events, which are not adequately represented in the experience data, are included in the risk assessment. This permits a more acceptable risk assessment since catastrophes are not ignored, even though the actual risk is only approximated. In addition, a few examples of risk analysis of specific hazards are given. Rudimentary probability and fault tree theory are used in these examples. Total risk assessment and resource allocation and safety performance trend analysis are discussed

  18. Integrity management of offshore structures and its implication on computation of structural action effects and resistance

    Science.gov (United States)

    Moan, T.

    2017-12-01

    An overview of integrity management of offshore structures, with emphasis on the oil and gas energy sector, is given. Based on relevant accident experiences and means to control the associated risks, accidents are categorized from a technical-physical as well as human and organizational point of view. Structural risk relates to extreme actions as well as structural degradation. Risk mitigation measures, including adequate design criteria, inspection, repair and maintenance as well as quality assurance and control of engineering processes, are briefly outlined. The current status of risk and reliability methodology to aid decisions in the integrity management is briefly reviewed. Finally, the need to balance the uncertainties in data, methods and computational efforts and the cautious use and quality assurance and control in applying high fidelity methods to avoid human errors, is emphasized, and with a plea to develop both high fidelity as well as efficient, simplified methods for design.

  19. Wildfire Risk Management: Challenges and Opportunities

    Science.gov (United States)

    Thompson, M.; Calkin, D. E.; Hand, M. S.; Kreitler, J.

    2014-12-01

    In this presentation we address federal wildfire risk management largely through the lens of economics, targeting questions related to costs, effectiveness, efficiency, and tradeoffs. Beyond risks to resources and assets such as wildlife habitat, watersheds, and homes, wildfires present financial risk and budgetary instability for federal wildfire management agencies due to highly variable annual suppression costs. Despite its variability, the costs of wildfire management have continued to escalate and account for an ever-growing share of overall agency budgets, compromising abilities to attain other objectives related to forest health, recreation, timber management, etc. Trends associated with a changing climate and human expansion into fire-prone areas could lead to additional suppression costs in the future, only further highlighting the need for an ability to evaluate economic tradeoffs in investments across the wildfire management spectrum. Critically, these economic analyses need to accurately capture the complex spatial and stochastic aspects of wildfire, the inherent uncertainty associated with monetizing environmental impacts of wildfire, the costs and effectiveness of alternative management policies, and linkages between pre-fire investments and active incident management. Investing in hazardous fuels reduction and forest restoration in particular is a major policy lever for pre-fire risk mitigation, and will be a primary focus of our presentation. Evaluating alternative fuel management and suppression policies could provide opportunities for significant efficiency improvements in the development of risk-informed management fire management strategies. Better understanding tradeoffs of fire impacts and costs can help inform policy questions such as how much of the landscape to treat and how to balance investments in treating new areas versus maintaining previous investments. We will summarize current data needs, knowledge gaps, and other factors

  20. Managing economic risks through simulation

    International Nuclear Information System (INIS)

    Griffin, B.J.; Eresman, R.K.

    1994-01-01

    Industrial operations are commonly managed in terms of such factors as raw material requirements, throughput, equipment reliability, and operator productivity. Simulation can be used to transform standard management performance measures into probabilistic measures which define the associated risks. These results provide valuable insight for effective management of economic risks. Case studies are presented using the Monte Carlo simulation method to demonstrate different applications of simulation techniques, various result formats, and their use for optimizing economic returns. In the first case study, design criteria for a large gas distribution system originally developed from worst-case demand estimates were modelled to provide a risk basis for decisions on alternative upgrading options. In the second, a commercial gas storage facility operation was modelled to develop economic marketing strategies balancing supply and demand requirements from multiple clients. 3 refs

  1. Integrated project risk management of nuclear power projects

    International Nuclear Information System (INIS)

    Wang Xiaohui; Xu Yuanhui

    2001-01-01

    The concept and the features of risks in nuclear power projects are introduced, and in terms of nuclear power projects' own features, the Nuclear Power Project Integrated Risk Management Model is presented. The identification, estimation, evaluation, response plan development, control of risks and the theoretical basis of risk management are discussed. The model has feedback and control functions in order to control and manage the risks dynamically

  2. Nuclear power plant risk assembly and decomposition for risk management

    International Nuclear Information System (INIS)

    Iden, D.C.

    1985-01-01

    The state-of-the-art method for analyzing the risk from nuclear power plants is probabilistic risk assessment (PRA). The intermediate results of a PRA are first assembled to quantify the risk from operating a nuclear power plant in the form of (1) core damage (or core melt) frequency, (2) plant damage state frequencies, (3) release category frequencies, and (4) the frequency of exceeding specific levels of offsite consequences. Once the overall PRA results have been quantified, the next step is to decompose those results into the individual contributors to each of the four forms of risk in some rank order. The way in which the PRA model is set up to assemble and decompose the plant risk determines the ease and usefulness of the PRA model as a risk management tool for evaluating perturbations to the PRA model. These perturbations can take the form of technical specification changes, hardware modifications, procedural changes, etc. The matrix formalism developed by Dr. Stan Kaplan for risk assembly and decomposition represents a significant breakthrough in making the PRA model an effective risk management tool. The key to understanding the matrix formalism and making it a useful tool for managing nuclear power plant risk is the structure of the PRA model. PRA risk model structure and decomposition of the risk results are discussed with the Seabrook PRA as an example

  3. Improved materials management through client/server computing

    International Nuclear Information System (INIS)

    Brooks, D.; Neilsen, E.; Reagan, R.; Simmons, D.

    1992-01-01

    This paper reports that materials management and procurement impacts every organization within an electric utility from power generation to customer service. An efficient material management and procurement system can help improve productivity and minimize operating costs. It is no longer sufficient to simply automate materials management using inventory control systems. Smart companies are building centralized data warehouses and use the client/server style of computing to provide real time data access. This paper describes how Alabama Power Company, Southern Company Services and Digital Equipment Corporation transformed two existing applications, a purchase order application within DEC's ALL-IN-1 environment and a materials management application within an IBM CICS environment, into a data warehouse - client/server application. An application server is used to overcome incompatibilities between computing environments and provide easy, real-time access to information residing in multi-vendor environments

  4. Sustainable nanotechnology decision support system: bridging risk management, sustainable innovation and risk governance

    International Nuclear Information System (INIS)

    Subramanian, Vrishali; Semenzin, Elena; Hristozov, Danail; Zabeo, Alex; Malsch, Ineke; McAlea, Eamonn; Murphy, Finbarr; Mullins, Martin; Harmelen, Toon van; Ligthart, Tom; Linkov, Igor; Marcomini, Antonio

    2016-01-01

    The significant uncertainties associated with the (eco)toxicological risks of engineered nanomaterials pose challenges to the development of nano-enabled products toward greatest possible societal benefit. This paper argues for the use of risk governance approaches to manage nanotechnology risks and sustainability, and considers the links between these concepts. Further, seven risk assessment and management criteria relevant to risk governance are defined: (a) life cycle thinking, (b) triple bottom line, (c) inclusion of stakeholders, (d) risk management, (e) benefit–risk assessment, (f) consideration of uncertainty, and (g) adaptive response. These criteria are used to compare five well-developed nanotechnology frameworks: International Risk Governance Council framework, Comprehensive Environmental Assessment, Streaming Life Cycle Risk Assessment, Certifiable Nanospecific Risk Management and Monitoring System and LICARA NanoSCAN. A Sustainable Nanotechnology Decision Support System (SUNDS) is proposed to better address current nanotechnology risk assessment and management needs, and makes. Stakeholder needs were solicited for further SUNDS enhancement through a stakeholder workshop that included representatives from regulatory, industry and insurance sectors. Workshop participants expressed the need for the wider adoption of sustainability assessment methods and tools for designing greener nanomaterials.

  5. Sustainable nanotechnology decision support system: bridging risk management, sustainable innovation and risk governance

    Energy Technology Data Exchange (ETDEWEB)

    Subramanian, Vrishali, E-mail: vrishali.subramanian@unive.it; Semenzin, Elena; Hristozov, Danail; Zabeo, Alex [University Ca’ Foscari of Venice, Department of Environmental Sciences, Informatics and Statistics (Italy); Malsch, Ineke [Malsch TechnoValuation (Netherlands); McAlea, Eamonn; Murphy, Finbarr; Mullins, Martin [University of Limerick, Kemmy Business School (Ireland); Harmelen, Toon van; Ligthart, Tom [TNO (Netherlands); Linkov, Igor; Marcomini, Antonio, E-mail: marcom@unive.it [University Ca’ Foscari of Venice, Department of Environmental Sciences, Informatics and Statistics (Italy)

    2016-04-15

    The significant uncertainties associated with the (eco)toxicological risks of engineered nanomaterials pose challenges to the development of nano-enabled products toward greatest possible societal benefit. This paper argues for the use of risk governance approaches to manage nanotechnology risks and sustainability, and considers the links between these concepts. Further, seven risk assessment and management criteria relevant to risk governance are defined: (a) life cycle thinking, (b) triple bottom line, (c) inclusion of stakeholders, (d) risk management, (e) benefit–risk assessment, (f) consideration of uncertainty, and (g) adaptive response. These criteria are used to compare five well-developed nanotechnology frameworks: International Risk Governance Council framework, Comprehensive Environmental Assessment, Streaming Life Cycle Risk Assessment, Certifiable Nanospecific Risk Management and Monitoring System and LICARA NanoSCAN. A Sustainable Nanotechnology Decision Support System (SUNDS) is proposed to better address current nanotechnology risk assessment and management needs, and makes. Stakeholder needs were solicited for further SUNDS enhancement through a stakeholder workshop that included representatives from regulatory, industry and insurance sectors. Workshop participants expressed the need for the wider adoption of sustainability assessment methods and tools for designing greener nanomaterials.

  6. Nuclear risk management

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-07-01

    This paper gives the list of contributions to Eurosafe 2001 which was organised around two round tables on the first day and five seminars on the second day. The first round table dealt with the technical, organisational and societal aspects of risk management aimed at the prevention of accidents in nuclear power plants. The second round table focused on radiological risks from the normal operation of nuclear installations. Special consideration has been given to the involvement of stakeholders. The five seminars were held in order to provide opportunities for comparing experiences and learning about recent activities of IRSN, GRS and their partners in the European Union and Eastern Europe: - Safety assessment and analysis of nuclear installations; -Nuclear safety research; -Environment and radiation protection; - Waste management; - Nuclear material security. (author)

  7. Nuclear risk management

    International Nuclear Information System (INIS)

    2001-01-01

    This paper gives the list of contributions to Eurosafe 2001 which was organised around two round tables on the first day and five seminars on the second day. The first round table dealt with the technical, organisational and societal aspects of risk management aimed at the prevention of accidents in nuclear power plants. The second round table focused on radiological risks from the normal operation of nuclear installations. Special consideration has been given to the involvement of stakeholders. The five seminars were held in order to provide opportunities for comparing experiences and learning about recent activities of IRSN, GRS and their partners in the European Union and Eastern Europe: - Safety assessment and analysis of nuclear installations; -Nuclear safety research; -Environment and radiation protection; - Waste management; - Nuclear material security. (author)

  8. Latent-failure risk estimates for computer control

    Science.gov (United States)

    Dunn, William R.; Folsom, Rolfe A.; Green, Owen R.

    1991-01-01

    It is shown that critical computer controls employing unmonitored safety circuits are unsafe. Analysis supporting this result leads to two additional, important conclusions: (1) annual maintenance checks of safety circuit function do not, as widely believed, eliminate latent failure risk; (2) safety risk remains even if multiple, series-connected protection circuits are employed. Finally, it is shown analytically that latent failure risk is eliminated when continuous monitoring is employed.

  9. [What Surgeons Should Know about Risk Management].

    Science.gov (United States)

    Strametz, R; Tannheimer, M; Rall, M

    2017-02-01

    Background: The fact that medical treatment is associated with errors has long been recognized. Based on the principle of "first do no harm", numerous efforts have since been made to prevent such errors or limit their impact. However, recent statistics show that these measures do not sufficiently prevent grave mistakes with serious consequences. Preventable mistakes such as wrong patient or wrong site surgery still frequently occur in error statistics. Methods: Based on insight from research on human error, in due consideration of recent legislative regulations in Germany, the authors give an overview of the clinical risk management tools needed to identify risks in surgery, analyse their causes, and determine adequate measures to manage those risks depending on their relevance. The use and limitations of critical incident reporting systems (CIRS), safety checklists and crisis resource management (CRM) are highlighted. Also the rationale for IT systems to support the risk management process is addressed. Results/Conclusion: No single tool of risk management can be effective as a standalone instrument, but unfolds its effect only when embedded in a superordinate risk management system, which integrates tailor-made elements to increase patient safety into the workflows of each organisation. Competence in choosing adequate tools, effective IT systems to support the risk management process as well as leadership and commitment to constructive handling of human error are crucial components to establish a safety culture in surgery. Georg Thieme Verlag KG Stuttgart · New York.

  10. Effects of Risk Management Practices on IT Project Success

    Directory of Open Access Journals (Sweden)

    Pimchangthong Daranee

    2017-03-01

    Full Text Available Successful management of an information technology (IT project is the most desirable for all organisations and stakeholders. Many researchers elaborated that risk management is a key part of project management for any project size. Risk management is so critical because it provides project managers with a forward-looking view of both threats and opportunities to improve the project success. The objectives of this research are to explore organisational factors affecting IT project success and risk management practices influencing IT project success. Risk management practices include risk identification, risk analysis, risk response planning, and risk monitoring and control. The IT project success is measured by process performance and product performance. Data are collected from 200 project managers, IT managers, and IT analysts in IT firms through questionnaires and analysed using Independent Sample t-test, One-way ANOVA, and Multiple Linear Regression at the statistical significance level of 0.05. The results show that the differences in organisational types affect IT project success in all aspects, while the differences on organisational sizes affect IT project success in the aspect of product performance and total aspects. Risk identification and risk response planning influence the process performance and the total aspects of IT project success. Risk identification has the highest positive influence on product performance, followed closely by risk response, while risk analysis negatively influences product performance.

  11. Risk Management in the banking and insurance sector

    Directory of Open Access Journals (Sweden)

    Ibrahim Mala

    2018-03-01

    Full Text Available Risk management is becoming an integral part of every organization, especially for the banking and Insurance sector because of their high-risk business. Both sectors try to manage the risks of their clients and their own risks. But, challenges in the banking and insurance industry are frequently influenced by the liquidity rations and the amount and quality of capital as ground requirements for risk management. The risk exposure in recent times is becoming more complex, more dynamic and diverse. Hence, we need to understand the risks which can be taken and the risks which should be avoided. In the other side insurance policies are long term, enabling insurers to stabilize the financial system and oft en insurance is the final transfer of risk. In this paper we will analyze an overview of risk management in the banking and insurance sector.

  12. Cloud Computing Governance Lifecycle

    Directory of Open Access Journals (Sweden)

    Soňa Karkošková

    2016-06-01

    Full Text Available Externally provisioned cloud services enable flexible and on-demand sourcing of IT resources. Cloud computing introduces new challenges such as need of business process redefinition, establishment of specialized governance and management, organizational structures and relationships with external providers and managing new types of risk arising from dependency on external providers. There is a general consensus that cloud computing in addition to challenges brings many benefits but it is unclear how to achieve them. Cloud computing governance helps to create business value through obtain benefits from use of cloud computing services while optimizing investment and risk. Challenge, which organizations are facing in relation to governing of cloud services, is how to design and implement cloud computing governance to gain expected benefits. This paper aims to provide guidance on implementation activities of proposed Cloud computing governance lifecycle from cloud consumer perspective. Proposed model is based on SOA Governance Framework and consists of lifecycle for implementation and continuous improvement of cloud computing governance model.

  13. Risk Management of NASA Projects

    Science.gov (United States)

    Sarper, Hueseyin

    1997-01-01

    Various NASA Langley Research Center and other center projects were attempted for analysis to obtain historical data comparing pre-phase A study and the final outcome for each project. This attempt, however, was abandoned once it became clear that very little documentation was available. Next, extensive literature search was conducted on the role of risk and reliability concepts in project management. Probabilistic risk assessment (PRA) techniques are being used with increasing regularity both in and outside of NASA. The value and the usage of PRA techniques were reviewed for large projects. It was found that both civilian and military branches of the space industry have traditionally refrained from using PRA, which was developed and expanded by nuclear industry. Although much has changed with the end of the cold war and the Challenger disaster, it was found that ingrained anti-PRA culture is hard to stop. Examples of skepticism against the use of risk management and assessment techniques were found both in the literature and in conversations with some technical staff. Program and project managers need to be convinced that the applicability and use of risk management and risk assessment techniques is much broader than just in the traditional safety-related areas of application. The time has come to begin to uniformly apply these techniques. The whole idea of risk-based system can maximize the 'return on investment' that the public demands. Also, it would be very useful if all project documents of NASA Langley Research Center, pre-phase A through final report, are carefully stored in a central repository preferably in electronic format.

  14. Managing health and safety risks: Implications for tailoring health and safety management system practices.

    Science.gov (United States)

    Willmer, D R; Haas, E J

    2016-01-01

    As national and international health and safety management system (HSMS) standards are voluntarily accepted or regulated into practice, organizations are making an effort to modify and integrate strategic elements of a connected management system into their daily risk management practices. In high-risk industries such as mining, that effort takes on added importance. The mining industry has long recognized the importance of a more integrated approach to recognizing and responding to site-specific risks, encouraging the adoption of a risk-based management framework. Recently, the U.S. National Mining Association led the development of an industry-specific HSMS built on the strategic frameworks of ANSI: Z10, OHSAS 18001, The American Chemistry Council's Responsible Care, and ILO-OSH 2001. All of these standards provide strategic guidance and focus on how to incorporate a plan-do-check-act cycle into the identification, management and evaluation of worksite risks. This paper details an exploratory study into whether practices associated with executing a risk-based management framework are visible through the actions of an organization's site-level management of health and safety risks. The results of this study show ways that site-level leaders manage day-to-day risk at their operations that can be characterized according to practices associated with a risk-based management framework. Having tangible operational examples of day-to-day risk management can serve as a starting point for evaluating field-level risk assessment efforts and their alignment to overall company efforts at effective risk mitigation through a HSMS or other processes.

  15. Research on Risk Management and Power Supplying Enterprise Control

    Science.gov (United States)

    Shen, Jianfei; Wang, Yige

    2017-09-01

    This paper derived from the background that electric power enterprises strengthen their risk management under requirements of the government. For the power industry, we explained the risk management theory, analysed current macro environment as well as basic situation, then classified and interpreted the main risks. In a case study on a power bureau, we established a risk management system based on deep understanding about the characteristics of its organization system and risk management function. Then, we focused on risks in operation as well as incorrupt government construction to give a more effective framework of the risk management system. Finally, we came up with the problems and specific countermeasures in risk management, which provided a reference for other electric power enterprises.

  16. Integrated, regional approach to risk management of industrial systems

    International Nuclear Information System (INIS)

    Chakraborty, S.

    1992-01-01

    This paper focuses on the following four main issues: (1) necessity for an integrated, regional approach to risk management of industrial systems; (2) principles of risk management; (3) integrated approach and overall methodology; and (4) implementation of risk management strategies on a regional basis. The U.N. Interagency project on risk management for large industrial areas, which is a pioneer type of international initiative for an integrated approach to risk management, is discussed in this context. Another encouraging activity for further development of overall methodologies for risk management is the ongoing project on the risk and safety of technical systems at the Swiss Federal Institute of Technology in Aurich. The concept of integral risk management takes into account multidimensional factors including technical, economic, political, social, and ethical considerations to allow a well-balanced decision-making process

  17. Risk management - unappreciated instrument of supply chain management strategy

    Directory of Open Access Journals (Sweden)

    Wojciech Machowiak

    2012-12-01

    Full Text Available Background: Unlike Enterprise Risk Management, which is certainly quite well rooted in business practice, Supply Chain Risk Management (SCRM still continues to be dynamically developing subject of academic research, whereas its practical applications are rather scarce. Material and methods: On the basis of broad review of the current state of the art in world literature, significant  relevancies to the core processes and enterprise strategy are discussed.   Results: The paper shows some interesting from the enterprise's performance and competitiveness point of view additional benefits, potentially resulting from the proactive, consistent and effective implementation of the SCRM system. Conclusions: Some additional advantages from proactive supply chain risk management account for perceiving SCRM as multifunctional instrument of strategic SC management, exceeding established understanding RM as security and threat-prevention  tool only. Positive influence from SCRM onto SC performance and competitiveness can make reasonable to enhance its position within SCM strategy.

  18. Systems approach to project risk management

    Energy Technology Data Exchange (ETDEWEB)

    Kindinger, J. P. (John P.)

    2002-01-01

    This paper describes the need for better performance in the planning and execution of projects and examines the capabilities of two different project risk analysis methods for improving project performance. A quantitative approach based on concepts and tools adopted from the disciplines of systems analysis, probabilistic risk analysis, and other fields is advocated for managing risk in large and complex research & development projects. This paper also provides an overview of how this system analysis approach for project risk management is being used at Los Alamos National Laboratory along with examples of quantitative risk analysis results and their application to improve project performance.

  19. Surveying perceptions of landslide risk management in Norway

    Science.gov (United States)

    Chiu, Jessica Ka Yi; Eidsvig, Unni

    2016-04-01

    Enhanced precipitation due to climate change leads to increase in both frequency and intensity of landslides in Norway. A proactive approach to risk management is therefore required to significantly reduce the losses associated with landslides. Opinions and perceptions from practitioners on the performance of landslide risk management can provide insights on areas for improvement in the landslide risk management strategies in Norway. The Risk Management Index (RMI), proposed by Cardona et al. (2004), is a well-established method to measure perceptions of disaster management of selected actors holistically. The RMI is measured based on opinion questionnaires to technical staff, decision-makers, and stakeholders involved in all stages of risk reduction strategies. It is a composite index that considers a wide variety of strategies to manage risks, including structural and non-structural measures, acceptance strategies, disaster management, and risk transfer. The RMI method was modified to be implemented in landslide hazards and to fit with Norwegian conditions. An opinion survey was conducted in autumn 2015 to measure perceptions of landslide risk management in Norway. Perceptions were surveyed for two time periods: 2015 and 2050, and are based on national, county, and municipality levels. Based on the survey results, performance of landslide risk management at any administrative levels in Norway is perceived to improve from `significant' in 2015 to `significant' to `outstanding' in 2050. Knowledge and technology, climate, risk perceptions, and anthropogenic activities are mostly considered by respondents for their 2050 perceptions. Several aspects of landslide risk management in Norway can be improved. For example, landslide hazard evaluation and mapping should be prioritised in Norway. Upgrading, retrofitting, and reconstruction of assets may also be included in the landslide risk reduction strategies. In addition, there should be more focus on inter

  20. Maintenance risk management in Dayabay nuclear power plant

    International Nuclear Information System (INIS)

    He Xuhong; Tong Jiejuan

    2005-01-01

    The importance of proper maintenance to safe and reliable nuclear plant operation has long been recognized by the nuclear utility and regulatory body. This paper presents a process of maintenance risk management developed for a Chinese Nuclear Power Plant (NPP). The process includes three phases: (I) long term maintenance plan risk management, (II) monthly maintenance plan risk management, and (III) detailed risk management for high risk configuration. A risk matrix is developed for phase I whose purpose is to provide a rough guide for risk management in the making of the annual maintenance plan. For Phase II and Phase III, a software tool named Maintenance- Risk-Monitor is developed based on the internal initiating event, level 1 PSA model. The results of Phase II are the risk information of the all plant configurations caused by the unavailability of the components included the monthly maintenance plan. When the increase of core damage frequency (CDF) or the incremental core damage probability (ICDP) of a configuration is higher than the corresponding thresholds, Phase III is needed for this high risk configuration to get the useful information such as risk-importance components, human actions and initial events, from which appropriate preventive measurements could be derived. It is hoped that the provided process of maintenance risk management, together with the developed software tool, could facilitate the maintenance activities in the NPPs of China. (authors)

  1. Developing risk management dashboards using risk and quality measures: A visual best practices approach.

    Science.gov (United States)

    Bunting, Robert F; Siegal, Dana

    2017-10-01

    Because quality measures are ubiquitous, health care risk management leaders often use them as a proxy for risk management measures. While certain quality measures adequately reflect some aspects of risk management, they are neither a perfect nor complete substitute for well-developed and comprehensive risk management measures. Using a comprehensive approach consisting of quality measures, risk measures, and measures that are less amenable to classification would be the best approach. Identifying the most powerful and informative measures, designing the most appropriate dashboards, and incorporating visual best practices are crucial steps required for evaluating the effectiveness and value of an enterprise risk management program. The authors explain the terms and concepts, review the measures available in the literature, propose new measures, discuss visual best practices, and provide sample dashboard components. © 2017 American Society for Healthcare Risk Management of the American Hospital Association.

  2. Risk Management and Financial Derivatives: An Overview

    NARCIS (Netherlands)

    S.M. Hammoudeh (Shawkat); M.J. McAleer (Michael)

    2012-01-01

    textabstractRisk management is crucial for optimal portfolio management. One of the fastest growing areas in empirical finance is the expansion of financial derivatives. The purpose of this special issue on “Risk Management and Financial Derivatives” is to highlight some areas in which novel

  3. Pediatrics patient in computed tomography: risk awareness among medical staff

    International Nuclear Information System (INIS)

    Arandjic, D.; Ciraj-Bjelac, O.; Kosutic, D.; Lazarevic, Dj.

    2009-01-01

    In this paper the results of investigation about risk awareness in pediatrics computed tomography among medical staff are presented. Questionnaires were distributed along seven hospitals, 84 people were enrolled in this investigation. The results showed awareness of the potential risks associated with ionizing radiation in computed tomography. However, there is still widespread underestimation of relative doses and risks in case of pediatric patients. (author) [sr

  4. Risk management and internal audit: Evidence from Greece

    Directory of Open Access Journals (Sweden)

    George Drogalas

    2017-07-01

    Full Text Available Risk management is ranked by financial executives as one of their most important objectives. For this reason, a wide range of literature on risk management has been developed. Within this fluid business environment, internal audit plays a key role in monitoring a company’s risk profile and identifying areas for improving risk management processes. The purpose of this study is to provide a comprehensive overview of the factors that impact on risk management regarding internal audit function. Empirical evidence was collected by means of a mailed survey. Regression analysis is used in order to illustrate the information gathered. Consistent with theory and our expectations, the results indicate that internal audit, internal auditor and added value of internal audit are statistically significantly associated with risk management.

  5. Radiation risk management at DOE accelerator facilities

    International Nuclear Information System (INIS)

    Dyck, O.B. van.

    1997-01-01

    The DOE accelerator contractors have been discussing among themselves and with the Department how to improve radiation safety risk management. This activity-how to assure prevention of unplanned high exposures-is separate from normal exposure management, which historically has been quite successful. The ad-hoc Committee on the Accelerator Safety Order and Guidance [CASOG], formed by the Accelerator Section of the HPS, has proposed a risk- based approach, which will be discussed. Concepts involved are risk quantification and comparison (including with non-radiation risk), passive and active (reacting) protection systems, and probabilistic analysis. Different models of risk management will be presented, and the changing regulatory environment will also be discussed

  6. Risk and Work Configuration Management as a Function of Integrated Safety Management

    International Nuclear Information System (INIS)

    Lana Buehrer; Michele Kelly; Fran Lemieux; Fred Williams

    2007-01-01

    National Security Technologies, LLC (NSTec), has established a work management program and corresponding electronic Facilities and Operations Management Information System (e-FOM) to implement Integrated Safety Management (ISM). The management of work scopes, the identification of hazards, and the establishment of implementing controls are reviewed and approved through electronic signatures. Through the execution of the program and the implementation of the electronic system, NSTec staff work within controls and utilize feedback and improvement process. The Integrated Work Control Manual further implements the five functions of ISM at the Activity level. By adding the Risk and Work Configuration Management program, NSTec establishes risk acceptance (business and physical) for liabilities within the performance direction and work management processes. Requirements, roles, and responsibilities are specifically identified in the program while e-FOM provides the interface and establishes the flowdown from the Safety Chain to work and facilities management processes to company work-related directives, and finally to Subject Matter Expert concurrence. The Program establishes, within the defined management structure, management levels for risk identification, risk mitigation (controls), and risk acceptance (business and physical) within the Safety Chain of Responsibility. The Program also implements Integrated Safeguards and Security Management within the NSTec Safety Chain of Responsibility. Once all information has been entered into e-FOM, approved, and captured as data, the information becomes searchable and sortable by hazard, location, organization, mitigating controls, etc

  7. A Grey Theory Based Approach to Big Data Risk Management Using FMEA

    Directory of Open Access Journals (Sweden)

    Maisa Mendonça Silva

    2016-01-01

    Full Text Available Big data is the term used to denote enormous sets of data that differ from other classic databases in four main ways: (huge volume, (high velocity, (much greater variety, and (big value. In general, data are stored in a distributed fashion and on computing nodes as a result of which big data may be more susceptible to attacks by hackers. This paper presents a risk model for big data, which comprises Failure Mode and Effects Analysis (FMEA and Grey Theory, more precisely grey relational analysis. This approach has several advantages: it provides a structured approach in order to incorporate the impact of big data risk factors; it facilitates the assessment of risk by breaking down the overall risk to big data; and finally its efficient evaluation criteria can help enterprises reduce the risks associated with big data. In order to illustrate the applicability of our proposal in practice, a numerical example, with realistic data based on expert knowledge, was developed. The numerical example analyzes four dimensions, that is, managing identification and access, registering the device and application, managing the infrastructure, and data governance, and 20 failure modes concerning the vulnerabilities of big data. The results show that the most important aspect of risk to big data relates to data governance.

  8. Risk management for industrial safety

    International Nuclear Information System (INIS)

    Novogno, A.

    1989-01-01

    The catastrophic accidents which have occurred in the last decade, in both developed and developing countries, have drawn the attention of decision-makers in the safety area to the urgent necessity to assess and manage risks from hazardous industrial activities which are concentrated in large industrialized areas. The aim of this paper is to review experience gained in conducting studies in the area of 'comparisons of risks in energy systems' and on the practical application of 'cost effectiveness of risk reduction analysis among different energy systems' (case studies). It is also the aim of the paper to discuss and propose a general framework for defining an 'integrated approach' to risk assessment and management in highly industrialized regions within a country. (author)

  9. A view on risk management

    International Nuclear Information System (INIS)

    Joksimovich, V.

    1991-01-01

    The world at large has enjoyed the benefits of industrial technology for almost two centuries. The managers of industrial facilities as well as members of the public focused on the benefits and typically ignored or underestimated the inherent risks entailed in deployment of these technologies. Two examples will be given for the sake of illustration. In the chemical industry, the impacts of various chemicals on humans are insufficiently understood. In addition, it was not even known that some hazardous chemicals could be formed in the chemical reactions taking place in various chemical reactors. This is equivalent to not knowing that Cesium-iodide compound can be formed within nuclear fuel nor the impact it might have on humans if released, which is inconceivable in the nuclear industry. In the era of risk recognition, many industrial managers proclaimed that safety is everybody's business. The basic premise behind this was that since everyone is responsible, no one can be blamed for accidents. This is, however, shifting because both economics and litigation are now compelling industrial managers to consider risk in conjunction with the benefit. The government managers in many cases interpreted their charter to reap benefits first and pay the price of risks later; e.g., the case of nuclear weapons production facilities seriously contaminated by radioactive and other hazardous materials. Cost of clean-up was estimated at more than $100 billion. Of course, the authors have similar examples in many other industries, e.g., Superfund project of chemical waste sites. The challenge for the technologists is to maximize the benefit/risk ratio, keeping the risks, real or perceived, acceptably small. This brings us to the issue of acceptable risks, the topic of this paper

  10. Variance computations for functional of absolute risk estimates.

    Science.gov (United States)

    Pfeiffer, R M; Petracci, E

    2011-07-01

    We present a simple influence function based approach to compute the variances of estimates of absolute risk and functions of absolute risk. We apply this approach to criteria that assess the impact of changes in the risk factor distribution on absolute risk for an individual and at the population level. As an illustration we use an absolute risk prediction model for breast cancer that includes modifiable risk factors in addition to standard breast cancer risk factors. Influence function based variance estimates for absolute risk and the criteria are compared to bootstrap variance estimates.

  11. Analysis of interactions among barriers in project risk management

    Science.gov (United States)

    Dandage, Rahul V.; Mantha, Shankar S.; Rane, Santosh B.; Bhoola, Vanita

    2018-03-01

    In the context of the scope, time, cost, and quality constraints, failure is not uncommon in project management. While small projects have 70% chances of success, large projects virtually have no chance of meeting the quadruple constraints. While there is no dearth of research on project risk management, the manifestation of barriers to project risk management is a less dwelt topic. The success of project management is oftentimes based on the understanding of barriers to effective risk management, application of appropriate risk management methodology, proactive leadership to avoid barriers, workers' attitude, adequate resources, organizational culture, and involvement of top management. This paper represents various risk categories and barriers to risk management in domestic and international projects through literature survey and feedback from project professionals. After analysing the various modelling methods used in project risk management literature, interpretive structural modelling (ISM) and MICMAC analysis have been used to analyse interactions among the barriers and prioritize them. The analysis indicates that lack of top management support, lack of formal training, and lack of addressing cultural differences are the high priority barriers, among many others.

  12. Risk information in support of cost estimates for the Baseline Environmental Management Report (BEMR). Section 1

    International Nuclear Information System (INIS)

    Gelston, G.M.; Jarvis, M.F.; Warren, B.R.; Von Berg, R.

    1995-06-01

    The Pacific Northwest Laboratory (PNL)(1) effort on the overall Baseline Environmental Management Report (BEMR) project consists of four installation-specific work components performed in succession. These components include (1) development of source terms, 92) collection of data and preparation of environmental settings reports, (3) calculation of unit risk factors, and (4) utilization of the unit risk factors in Automated Remedial Action Methodology (ARAM) for computation of target concentrations and cost estimates. This report documents work completed for the Nevada Test Site, Nevada, for components 2 and 3. The product of this phase of the BEMR project is the development of unit factors (i.e., unit transport factors, unit exposure factors, and unit risk factors). Thousands of these unit factors are gene rated and fill approximately one megabyte of computer information per installation. The final unit risk factors (URF) are transmitted electronically to BEMR-Cost task personnel as input to a computer program (ARAM). Abstracted files and exhibits of the URF information are included in this report. These visual formats are intended to provide a sample of the final task deliverable (the URF files) which can be easily read without a computer

  13. Application of Risk Assessment Tools in the Continuous Risk Management (CRM) Process

    Science.gov (United States)

    Ray, Paul S.

    2002-01-01

    Marshall Space Flight Center (MSFC) of the National Aeronautics and Space Administration (NASA) is currently implementing the Continuous Risk Management (CRM) Program developed by the Carnegie Mellon University and recommended by NASA as the Risk Management (RM) implementation approach. The four most frequently used risk assessment tools in the center are: (a) Failure Modes and Effects Analysis (FMEA), Hazard Analysis (HA), Fault Tree Analysis (FTA), and Probabilistic Risk Analysis (PRA). There are some guidelines for selecting the type of risk assessment tools during the project formulation phase of a project, but there is not enough guidance as to how to apply these tools in the Continuous Risk Management process (CRM). But the ways the safety and risk assessment tools are used make a significant difference in the effectiveness in the risk management function. Decisions regarding, what events are to be included in the analysis, to what level of details should the analysis be continued, make significant difference in the effectiveness of risk management program. Tools of risk analysis also depends on the phase of a project e.g. at the initial phase of a project, when not much data are available on hardware, standard FMEA cannot be applied; instead a functional FMEA may be appropriate. This study attempted to provide some directives to alleviate the difficulty in applying FTA, PRA, and FMEA in the CRM process. Hazard Analysis was not included in the scope of the study due to the short duration of the summer research project.

  14. MISER-I: a computer code for JOYO fuel management

    International Nuclear Information System (INIS)

    Yamashita, Yoshioki

    1976-06-01

    A computer code ''MISER-I'' is for a nuclear fuel management of Japan Experimental Fast Breeder Reactor JOYO. The nuclear fuel management in JOYO can be regarded as a fuel assembly management because a handling unit of fuel in JOYO plant is a fuel subassembly (core and blanket subassembly), and so the recording of material balance in computer code is made with each subassembly. The input information into computer code is given with each subassembly for a transfer operation, or with one reactor cycle and every one month for a burn-up in reactor core. The output information of MISER-I code is the fuel assembly storage record, fuel storage weight record in each material balance subarea at any specified day, and fuel subassembly transfer history record. Change of nuclear fuel composition and weight due to a burn-up is calculated with JOYO-Monitoring Code by off-line computation system. MISER-I code is written in FORTRAN-IV language for FACOM 230-48 computer. (auth.)

  15. Risk managements' communicative effects influencing IT project success

    NARCIS (Netherlands)

    de Bakker, Karel; Boonstra, Albert; Wortmann, Hans

    The central question of this research is if, and how, risk management contributes to the success of IS/IT projects. Risk management is used regularly in IT projects, despite indications in literature that risk management only occasionally contributes to IT project success. Drawing on Habermas we

  16. Business intelligence for improving supply chain risk management

    NARCIS (Netherlands)

    Liu, L.; Daniels, H.A.M.; van Oosterhout, M.; van Dalen, J.

    2014-01-01

    The risk management over a supply chain has to be founded on the risk management in each of partner companies in the chain. The business relationship and operations dependence inevitably bind the management control efforts of partner companies together. This proposes challenges for supply chain risk

  17. 7 CFR 760.104 - Risk management purchase requirements.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Risk management purchase requirements. 760.104 Section... Agricultural Disaster Assistance Programs § 760.104 Risk management purchase requirements. (a) To be eligible... available from the USDA Risk Management Agency (RMA)) obtained catastrophic coverage or better under a...

  18. Practical Risk Management for the CIO

    CERN Document Server

    Scherling, Mark

    2007-01-01

    The growing complexity of today's interconnected systems has not only increased the need for improved information security, but also helped to move information from the IT backroom to the executive boardroom as a strategic asset. And, just like the tip of an iceberg is all you see until you run into it, the risks to your information are mostly invisible until disaster strikes. Detailing procedures that will help your team perform better risk assessments and aggregate results into more meaningful metrics, Practical Risk Management for the CIO approaches information risk management through impro

  19. Study of nuclear computer code maintenance and management system

    International Nuclear Information System (INIS)

    Ryu, Chang Mo; Kim, Yeon Seung; Eom, Heung Seop; Lee, Jong Bok; Kim, Ho Joon; Choi, Young Gil; Kim, Ko Ryeo

    1989-01-01

    Software maintenance is one of the most important problems since late 1970's.We wish to develop a nuclear computer code system to maintenance and manage KAERI's nuclear software. As a part of this system, we have developed three code management programs for use on CYBER and PC systems. They are used in systematic management of computer code in KAERI. The first program is embodied on the CYBER system to rapidly provide information on nuclear codes to the users. The second and the third programs were embodied on the PC system for the code manager and for the management of data in korean language, respectively. In the requirement analysis, we defined each code, magnetic tape, manual and abstract information data. In the conceptual design, we designed retrieval, update, and output functions. In the implementation design, we described the technical considerations of database programs, utilities, and directions for the use of databases. As a result of this research, we compiled the status of nuclear computer codes which belonged KAERI until September, 1988. Thus, by using these three database programs, we could provide the nuclear computer code information to the users more rapidly. (Author)

  20. Risk in Management Systems according to ISO standard

    Directory of Open Access Journals (Sweden)

    P. Królas

    2010-07-01

    Full Text Available The purpose of this article was to present selected management standards in context of risk management. It presents main ISOmanagement standards (ISO 9001, ISO 14001, OHSAS 18001, ISO 27001, BS 25999, ISO 31000 that apply to polish enterprises. In thefirst part of this article there are analyzed management standards regarding quality, environment, occupational health and safety,information security, as well as business continuity management and risk management. The second part of the article discusses the processof dealing with risk based on chosen management standard.

  1. Model risk analysis for risk management and option pricing

    NARCIS (Netherlands)

    Kerkhof, F.L.J.

    2003-01-01

    Due to the growing complexity of products in financial markets, market participants rely more and more on quantitative models for trading and risk management decisions. This introduces a fairly new type of risk, namely, model risk. In the first part of this thesis we investigate the quantitative

  2. Risk Management for New Product Development Projects in Food Industry

    Directory of Open Access Journals (Sweden)

    Porananond, D.

    2014-07-01

    Full Text Available Project risk management provides a guideline for decision making in new product development (NPD projects, reducing uncertainty and increasing success rate. However, the acceptance of formal risk management applications in industry, especially for NPD projects is still in question. A study of a food conglomerate in Thailand found that only 9% of NPD projects used a systematic approach for managing risk. 61% of the projects realised the importance of risk management, while the remaining 30% did not involve risk management at all. This study aims to develop a risk management model for NPD projects in the food industry. The first section of this paper reviews the literature on risk management theory, including international standards for risk and project management (ISO31000 and ISO21500, publications for the Project Management Body of Knowledge (PMBOK, by a professional organisation the Project Management Institute (PMI, and also academic research. 182 academic papers, published between January 2002 and August 2012 were selected. The second part interviews conducted with eight NPD experts from five of the major food manufacturers in Thailand to examine their risk management practices and problems. Conclusions are made on five topics : classification of research method, project type and industrial segment, distribution of articles by region, tools & techniques for risk management and risk factors in projects. Specific requirements of risk management for NPD projects in the food industry are identified. A risk management model and the concept of risk management applications for the food industry are proposed.

  3. Climate Change Risk Management: CRE Adaptation Projects and the Risk Management Process

    Science.gov (United States)

    This document describes National Estuary Program partner projects that demonstrate how risk management can be successfully applied to address environmental challenges in our country’s coastal areas.

  4. Risk management - unappreciated instrument of supply chain management strategy

    OpenAIRE

    Wojciech Machowiak

    2012-01-01

    Background: Unlike Enterprise Risk Management, which is certainly quite well rooted in business practice, Supply Chain Risk Management (SCRM) still continues to be dynamically developing subject of academic research, whereas its practical applications are rather scarce. Material and methods: On the basis of broad review of the current state of the art in world literature, significant  relevancies to the core processes and enterprise strategy are discussed.   Results: ...

  5. CONSIDERATIONS ON RISK MANAGEMENT APPLIED TO FOREST FIRES

    Directory of Open Access Journals (Sweden)

    Ioan Valentin Marcel Posea

    2016-07-01

    Full Text Available Forest risk and management are ubiquitous in any socio-economic activity. Forestry, more than any other field, is at risk from fire. Consequently, it appears the necessity to implement a fire risk management that could resolve, at least partially, the specific problems. This study attempts to identify the specific stages and processes of forest fire risk management and their content. At the same time, I will try to highlight how a forest fire risk management process planning can be achieved and to present a way of achieving the Plan. I also deem necessary a forest fire risk monitoring and control system that I have built using the Deming cycle.

  6. Methodology of environmental risk assessment management

    Directory of Open Access Journals (Sweden)

    Saša T. Bakrač

    2012-04-01

    Full Text Available Successful protection of environment is mostly based on high-quality assessment of potential and present risks. Environmental risk management is a complex process which includes: identification, assessment and control of risk, namely taking measures in order to minimize the risk to an acceptable level. Environmental risk management methodology: In addition to these phases in the management of environmental risk, appropriate measures that affect the reduction of risk occurrence should be implemented: - normative and legal regulations (laws and regulations, - appropriate organizational structures in society, and - establishing quality monitoring of environment. The emphasis is placed on the application of assessment methodologies (three-model concept, as the most important aspect of successful management of environmental risk. Risk assessment methodology - European concept: The first concept of ecological risk assessment methodology is based on the so-called European model-concept. In order to better understand this ecological risk assessment methodology, two concepts - hazard and risk - are introduced. The European concept of environmental risk assessment has the following phases in its implementation: identification of hazard (danger, identification of consequences (if there is hazard, estimate of the scale of consequences, estimate of consequence probability and risk assessment (also called risk characterization. The European concept is often used to assess risk in the environment as a model for addressing the distribution of stressors along the source - path - receptor line. Risk assessment methodology - Canadian concept: The second concept of the methodology of environmental risk assessment is based on the so-called Canadian model-concept. The assessment of ecological risk includes risk arising from natural events (floods, extreme weather conditions, etc., technological processes and products, agents (chemical, biological, radiological, etc

  7. Living with risk: a management question

    International Nuclear Information System (INIS)

    Ale, Ben J.M.

    2005-01-01

    Public authorities started to be really involved in risk management of hazardous materials some 30 years ago. Recent developments have led to fresh attention for this matter and many further developments are underway. The history of risk management and safety regulation is one of strongly variable interest, forgotten lessons and rude awakenings. The impetus exerted by accidents is short lived. Safety cases become documents to satisfy regulation rather than instruments to reduce risk. Deregulation, privatisation, and outsourcing pose new challenges to safety and risk management. Some of the unfortunate side effects have already become apparent. This invariably leads to the next disaster, which will have a striking resemblance to the previous one when abstracted from the immediate technological context. Lessons can be learned if we really want. The question remains: 'Do we?'

  8. Probability distributions in risk management operations

    CERN Document Server

    Artikis, Constantinos

    2015-01-01

    This book is about the formulations, theoretical investigations, and practical applications of new stochastic models for fundamental concepts and operations of the discipline of risk management. It also examines how these models can be useful in the descriptions, measurements, evaluations, and treatments of risks threatening various modern organizations. Moreover, the book makes clear that such stochastic models constitute very strong analytical tools which substantially facilitate strategic thinking and strategic decision making in many significant areas of risk management. In particular the incorporation of fundamental probabilistic concepts such as the sum, minimum, and maximum of a random number of continuous, positive, independent, and identically distributed random variables in the mathematical structure of stochastic models significantly supports the suitability of these models in the developments, investigations, selections, and implementations of proactive and reactive risk management operations. The...

  9. Research on elastic resource management for multi-queue under cloud computing environment

    Science.gov (United States)

    CHENG, Zhenjing; LI, Haibo; HUANG, Qiulan; Cheng, Yaodong; CHEN, Gang

    2017-10-01

    As a new approach to manage computing resource, virtualization technology is more and more widely applied in the high-energy physics field. A virtual computing cluster based on Openstack was built at IHEP, using HTCondor as the job queue management system. In a traditional static cluster, a fixed number of virtual machines are pre-allocated to the job queue of different experiments. However this method cannot be well adapted to the volatility of computing resource requirements. To solve this problem, an elastic computing resource management system under cloud computing environment has been designed. This system performs unified management of virtual computing nodes on the basis of job queue in HTCondor based on dual resource thresholds as well as the quota service. A two-stage pool is designed to improve the efficiency of resource pool expansion. This paper will present several use cases of the elastic resource management system in IHEPCloud. The practical run shows virtual computing resource dynamically expanded or shrunk while computing requirements change. Additionally, the CPU utilization ratio of computing resource was significantly increased when compared with traditional resource management. The system also has good performance when there are multiple condor schedulers and multiple job queues.

  10. Benchmarking Outdoor Expeditionary Program Risk Management Strategies

    Science.gov (United States)

    Meerts-Brandsma, Lisa; Furman, Nate; Sibthorp, Jim

    2017-01-01

    In 2003, the University of Utah and the National Outdoor Leadership School (NOLS) completed a study that developed a risk management taxonomy in the outdoor adventure industry and assessed how different outdoor expeditionary programs (OEPs) managed risk (Szolosi, Sibthorp, Paisley, & Gookin, 2003). By unifying the language around risk, the…

  11. Risk taking and effective R&D management.

    Science.gov (United States)

    Banholzer, William F; Vosejpka, Laura J

    2011-01-01

    Several key strategies can be used to manage the risk associated with innovation to create maximum value. These include balancing the timing of investments versus cash flows, management of fads, prioritization across the company, savvy portfolio management, and a system of metrics that measure real success. Successful R&D managers will do whatever is necessary to manage the risks associated with an R&D program and stick to their long-term strategy.

  12. How Can Every Organization Manage the Operational Risk?

    Directory of Open Access Journals (Sweden)

    Ferry Jie

    2002-03-01

    Full Text Available This article describe how every organization (generally and Australian Organizations (specifically can manage the operational risks.  Recently, the operational risks are the significant issues in every organization because every organization will suffer from poor operational performance due to risks, failure, and problems such as a number of losses which are likely to be made worse. Basically, the operational risk management process has five steps, identification, analysis, treatment, controlling, and communication/consulting. Generally, many organizations (in particularly in Australia and New Zealand have already used AS/NZS 4360-Risk Management System, AS/NZS 4801-Occupational Health and Safety Management System, ISO 14001: Effective Environmental Management System, ISO 9001: Quality Management System, AS/NZS 7799: Information Security Management, AS/NZS 3806: Compliance Management System for reducing/mitigating/managing the operational risks. Based on the SAI Certification Register, the number of Australian Organizations got the AS/NZS ISO 9000 series, AS/NZS 14000 series, AS/NZS 4801 and AS/NZS 7799.2:2000 Certifications are 3338, 30, 20 and 5 respectively. It can conclude that Australian Organizations prefer used AS/NZS ISO 9000 series rather than AS/NZS ISO 14000 series, AS/NZS 4801 and AS/NZS 7799.2:2000.

  13. 2015/2016 Quality Risk Management Benchmarking Survey.

    Science.gov (United States)

    Waldron, Kelly; Ramnarine, Emma; Hartman, Jeffrey

    2017-01-01

    This paper investigates the concept of quality risk management (QRM) maturity as it applies to the pharmaceutical and biopharmaceutical industries, using the results and analysis from a QRM benchmarking survey conducted in 2015 and 2016. QRM maturity can be defined as the effectiveness and efficiency of a quality risk management program, moving beyond "check-the-box" compliance with guidelines such as ICH Q9 Quality Risk Management , to explore the value QRM brings to business and quality operations. While significant progress has been made towards full adoption of QRM principles and practices across industry, the full benefits of QRM have not yet been fully realized. The results of the QRM Benchmarking Survey indicate that the pharmaceutical and biopharmaceutical industries are approximately halfway along the journey towards full QRM maturity. LAY ABSTRACT: The management of risks associated with medicinal product quality and patient safety are an important focus for the pharmaceutical and biopharmaceutical industries. These risks are identified, analyzed, and controlled through a defined process called quality risk management (QRM), which seeks to protect the patient from potential quality-related risks. This paper summarizes the outcomes of a comprehensive survey of industry practitioners performed in 2015 and 2016 that aimed to benchmark the level of maturity with regard to the application of QRM. The survey results and subsequent analysis revealed that the pharmaceutical and biopharmaceutical industries have made significant progress in the management of quality risks over the last ten years, and they are roughly halfway towards reaching full maturity of QRM. © PDA, Inc. 2017.

  14. Lessons Learned in Risk Management on NCSX

    International Nuclear Information System (INIS)

    Neilson, G.H.; Gruber, C.O.; Harris, Jeffrey H.; Rej, D.J.; Simmons, R.T.; Strykowsky, R.L.

    2010-01-01

    The National Compact Stellarator Experiment (NCSX) was designed to test physics principles of an innovative stellarator design developed by Princeton Plasma Physics Laboratory and Oak Ridge National Laboratory. Construction of some of the major components and subassemblies was completed, but the estimated cost and schedule for completing the project grew as the technical requirements and risks became better understood, leading to its cancellation in 2008. The project's risks stemmed from its technical challenges, primarily the complex component geometries and tight tolerances that were required. The initial baseline, which was established in 2004, was supported by a risk management plan and risk-based contingencies, both of which proved to be inadequate. Technical successes were achieved in the construction of challenging components and subassemblies, but cost and schedule growth was experienced. As part of an effort to improve project performance, a new risk management program was devised and implemented in 2007-2008. It led to a better understanding of project risks, a sounder basis for contingency estimates, and improved management tools. Although the risks were ultimately unacceptable to the sponsor, valuable lessons in risk management were learned through the experiences with the NCSX project.

  15. Lessons Learned in Risk Management on NCSX

    International Nuclear Information System (INIS)

    Neilson, G.H.; Gruber, C.O.; Harris, J.H.; Rej, D.J.; Simmons, R.T.; Strykowsky, R.L.

    2009-01-01

    The National Compact Stellarator Experiment (NCSX) was designed to test physics principles of an innovative stellarator design developed by the Princeton Plasma Physics Laboratory and Oak Ridge National Laboratory. Construction of some of the major components and sub-assemblies was completed, but the estimated cost and schedule for completing the project grew as the technical requirements and risks became better understood, leading to its cancellation in 2008. The project's risks stemmed from its technical challenges, primarily the complex component geometries and tight tolerances that were required. The initial baseline, established in 2004, was supported by a risk management plan and risk-based contingencies, both of which proved to be inadequate. Technical successes were achieved in the construction of challenging components and subassemblies, but cost and schedule growth was experienced. As part of an effort to improve project performance, a new risk management program was devised and implemented in 2007-08. It led to a better understanding of project risks, a sounder basis for contingency estimates, and improved management tools. Although the risks ultimately were unacceptable to the sponsor, valuable lessons in risk management were learned through the experiences with the NCSX project

  16. THE MANAGEMENT OF RISKS IN BUSINESS AND IN THE MANAGEMENT OF HUMAN RESOURCES

    Directory of Open Access Journals (Sweden)

    Reta CONDEI

    2014-10-01

    Full Text Available The characteristics of market economy and coordinates of modern life have determinate both individual level and organizations increase of number of risk who can affect us, of their dimensions and of the consequences which induce them, but at the same time a highest need of firm security. In economic and financial department was develop an entire area –management risk and many financial instruments to reduce or diminish risk. The behaviour of economical agents respectively of the entrepreneurs and managers is different according to the risk in many respects: risk adversaries unaffected to risk and risk belovers who leave mark on decisions take it. Management risk is an cyclical process with distinct stages: risk identification, risk analyses and risk reactions. The management of this phenomenon goes from this context and the firm objectives, analyse the risk factors into a security conception having the purpose to minimize the risks and the cost. The policies of occupational safety and health at the level of the organization must include information regarding: the general security and health policy at work; the specific risks and the way of dealing with them; the responsibility of the managers in this field; the measures of implementation of these policies and must be based on: Employee safety is very important; Safety is prior to efficiency; Employee safety leads to advantages and efficiency; Respecting the regulations

  17. 7 CFR 2.44 - Administrator, Risk Management Agency and Manager, Federal Crop Insurance Corporation.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 1 2010-01-01 2010-01-01 false Administrator, Risk Management Agency and Manager... Secretary for Farm and Foreign Agricultural Services to the Administrator, Risk Management Agency, and... for the transaction of the business of the Federal Crop Insurance Corporation and the Risk Management...

  18. Stress Analysis in Managing the Region’s Budget Risks

    Directory of Open Access Journals (Sweden)

    Natalya Pavlovna Pazdnikova

    2014-09-01

    Full Text Available The article addresses the implementation of budget risk management methods into the practices of governmental authorities. Drawing on the example of a particular region the article aims to demonstrate the possible methods of budget risk management. The authors refine the existing approaches to the notion of risk in its relation to budget system by introducing the notion of “budget risk.” Here the focus is the risk of default of budget spending in full which causes underfunding of territories and decrease in quality of life in the region. The authors have particularized the classification of budget risks and grouped together the criteria and factors which significantly influence the assessment and choice of method to manage budget risks. They hypothesize that budget risk is a financial risk. Therefore, the methods of financial risks management can be applied to budget risks management. The authors suggest a methodological approach to risk assessment based on correlation and regression analysis of program financing. The application of Kendall rank correlation coefficient allowed to assess the efficiency of budget spending on the implementation of state programs in Perm Krai. Two clusters — “Nature management and infrastructure” and “Public security” — turned out to be in the zone of high budget risk. The method of stress analysis, which consists in calculating Value at Risk (VaR, was applied to budget risks that in terms of probability are classified as critical. In order to assess risk as probability rate, the amount of Perm Krai deficit budget was calculated as induced variable from budget revenues and spending. The results demonstrate that contemporary management of public resources in the regions calls for the implementation of new management tools of higher quality and budget risk management is one of them.

  19. COMPLIANCE AS FACTORING BUSINESS RISK MANAGEMENT: CONTROL ASPECTS

    Directory of Open Access Journals (Sweden)

    V.K. Makarovych

    2016-03-01

    Full Text Available Indetermination of modern economy conditions and the lack of theoretical knowledge gained by domestic scientists about risk in factoring business actualize the research concerning the methodology and technique of factoring companies’ risk management. The article examines compliance which is the technology innovative for Ukrainian market of factoring risk management technologies. It is determined that the compliance is the risk management process directed to free will correspondence to state, international legislation as well as to the ethics standards accepted in the field of regulated legal relations and to the traditions of business circulation to sustain the necessary regulations and standards of market behaviour, and to consolidate the image of a factoring company. Compliance risks should be understood as the risks of missed profit or losses caused by the conflicts of interests and the discrepancy of employees’ actions to internal and external standard documents. The attention is paid to the control over the compliance. The author singles out 3 kinds of the compliance control such as institutional, operational and the compliance control over the observance of conducting business professional ethics regulations which are necessary for providing of efficient management of factoring business risks. The paper shows the organizing process of factoring business compliance control (by the development of internal standard documents, a compliance program, the foundation of compliance control subdivision, monitoring of the risks cause the choice, made by management entities of a factoring company, of the management methods of risks for their business. The development of new and improvement of existed forms of compliance control organizing process help satisfy users’ information needs and requests of the risk management factoring company department. The suggestions proposed create the grounds for the transformation and improvement of factoring

  20. Managing Communities – Mining MNEs’ Community Risk Management Practices

    DEFF Research Database (Denmark)

    Taarup Esbensen, Jacob

    This PhD reflects the effort to close a gap in the multinational enterprise (MNE) risk management literature on the identification and mitigation of risk arising from local communities. Small villages and towns that are situated geographically close to the MNEs’ place of operation have increasingly......-to-date information about mining MNE operations. This improved outreach has meant that mines have been closed due to conflicts with local communities and therefor a need had arisen for MNEs to implement management practices that can effectively mitigate these types of risks....... been identified as a source of risk (BSR, 2003; ICMM, 2015). The mining industry is one of the most exposed to risks from local communities, where there historically have been many conflicts between mine owners on one side and the people living close to the mine on the other (Godoy, 1985; Hoskin, 1912...

  1. ECU@Risk, a methodology for risk management applied to MSMEs

    Directory of Open Access Journals (Sweden)

    Esteban Crespo Martínez

    2017-02-01

    Full Text Available Information is the most valuable element for any organization or person in this new century, which, for many companies, is a competitive advantage asset (Vásquez & Gabalán, 2015. However, despite the lack of knowledge about how to protect it properly or the complexity of international standards that indicate procedures to achieve an adequate level of protection, many organizations, especially the MSMEs sector, fails to achieve this goal.Therefore, this study proposes a methodology for information security risk management, which is applicable to the business and organizational environment of the Ecuadorian MSME sector. For this purpose, we analyze several methodologies as Magerit, CRAMM (CCTA Risk Analysis and Management Method, OCTAVE-S, Microsoft Risk Guide, COBIT 5 COSO III. These methodologies are internationally used in risk management of information; in the light of the frameworks of the industry: ISO 27001, 27002, 27005 and 31000.

  2. File and metadata management for BESIII distributed computing

    International Nuclear Information System (INIS)

    Nicholson, C; Zheng, Y H; Lin, L; Deng, Z Y; Li, W D; Zhang, X M

    2012-01-01

    The BESIII experiment at the Institute of High Energy Physics (IHEP), Beijing, uses the high-luminosity BEPCII e + e − collider to study physics in the π-charm energy region around 3.7 GeV; BEPCII has produced the worlds largest samples of J/φ and φ’ events to date. An order of magnitude increase in the data sample size over the 2011-2012 data-taking period demanded a move from a very centralized to a distributed computing environment, as well as the development of an efficient file and metadata management system. While BESIII is on a smaller scale than some other HEP experiments, this poses particular challenges for its distributed computing and data management system. These constraints include limited resources and manpower, and low quality of network connections to IHEP. Drawing on the rich experience of the HEP community, a system has been developed which meets these constraints. The design and development of the BESIII distributed data management system, including its integration with other BESIII distributed computing components, such as job management, are presented here.

  3. [MANAGEMENT OF HEALTHCARE WASTE IN THE HOSPITAL SETTING. UNDERSTANDING RISK MANAGEMENT].

    Science.gov (United States)

    Galimany-Masclans, Jordi; Torres-Egea, Pilar; Sancho-Agredano, Raúl; Girbau-García, Ma Rosa; Fabrellas, Núria; Torrens-Garcia, Ma Llum; Martínez-Estalella, Gemma

    2015-05-01

    The sanitary waste represents a potential hazard for health workers. Given the high risk of infection in labor accidents, the correct management of sanitary waste minimizes this risk and improves labor and environment conditions. To identify risk perception with health professionals in relation to the advanced sorting and management of healthcare waste (HW). The current study is a descriptive, cross-sectional. The sample size was 177 health workers (nurse assistants, nurses, physicians, lab technicians) from three hospitals in Barcelona (Catalonia). Homemade questionnaire and questions with a free and spontaneous association and incomplete sentences were used to analyze labor variables, perception of risk and personal security through a Likert scale. Using a score from 1 (the lowest perception of risk) to 5 (the high perception of risk) to assess the risk perception, the average value for nurse assistants, nurses, physicians, and lab technicians was 3.71, 3.75, 3.83 and 4.03, respectively. Referring to items with free and spontaneous response association, 44.8% of workers consider HW as a biohazard, 29.6% consider it as waste material, 22.1% state that it must be managed properly and 3.5% described it as unknown residues. The results suggest that all health professionals generally have a perception of high risk. The lab technicians have a higher perception of the real risk of inadequate management of HW A 63.2% report that everyone has to make a proper management to preserve their occupational health; the 59% consider that the HW are a biological risk to the general population and only the 47.8% that are harmful to public health. Although it should be noted that only 44.8% think that HW are toxic and dangerous.

  4. TWRS safety and technical integration risk management plan

    International Nuclear Information System (INIS)

    Fordham, R.A.

    1996-01-01

    The objectives of the Tank Waste Remediation System (TWRS) Safety and Technical Integration (STI) programmatic risk management program are to assess, analyze, and handle risks associated with TWRS STI responsibilities and to communicate information about the actions being taken and the results to enable decision making. The objective of this TWRS STI Risk Management Plan is to communicate a consistent approach to risk management that will be used by the organization

  5. COMPLIANCE AS FACTORING BUSINESS RISK MANAGEMENT: CONTROL ASPECTS

    OpenAIRE

    V.K. Makarovych

    2016-01-01

    Indetermination of modern economy conditions and the lack of theoretical knowledge gained by domestic scientists about risk in factoring business actualize the research concerning the methodology and technique of factoring companies’ risk management. The article examines compliance which is the technology innovative for Ukrainian market of factoring risk management technologies. It is determined that the compliance is the risk management process directed to free will correspondence to sta...

  6. COMPARATIVE STUDY BETWEEN TRADITIONAL AND ENTERPRISE RISK MANAGEMENT -A THEORETICAL APPROACH

    Directory of Open Access Journals (Sweden)

    Cican Simona-Iulia

    2014-07-01

    Full Text Available The complexity, volatility and unpredictability of the current economic environment are a daily reminder that organizations face many risks. The traditional approach, according to which risk is a necessary evil which must be removed, is no longer sufficient and that is why companies nowadays are forced to spend significant resources to manage risks. Risk transparency is what one looks for; therefore, identification and management of risks within an organization become increasingly necessary for success and longevity. Risk approach has a major role in a company’s ability to avoid, reduce and turn risks into opportunities. Enterprise risk management is a new concept that revolutionizes the traditional approach and summarizes risk management in an integrated, comprehensive and strategic system. Studies use several synonyms for enterprise risk management such as integrated risk management, holistic risk management, global risk management and strategic risk management. Enterprise risk management implements at the end of the last century a new way to deal with risks: the holistic approach. This risks approach – i.e. interaction of several types of risks which become increasingly threatening and varied and may cause more damage than individual risk – brings forward the need of risk management and raises issues at the highest level of company management. For a proper view on company risks, each individual risk and the possibility of risk interaction must be understood. This is essential to establish a risk classification according to their impact on the company. Traditional approach on risk management, as a management function, is limited to only threats and losses, so relatively few organizations see risks as potential earning-generated opportunities. However, risk management process is not radically changed. Enterprise risk management is an improved version of the traditional risk management, created by expanding its scope. The new risk

  7. Optimal Bi-Objective Redundancy Allocation for Systems Reliability and Risk Management.

    Science.gov (United States)

    Govindan, Kannan; Jafarian, Ahmad; Azbari, Mostafa E; Choi, Tsan-Ming

    2016-08-01

    In the big data era, systems reliability is critical to effective systems risk management. In this paper, a novel multiobjective approach, with hybridization of a known algorithm called NSGA-II and an adaptive population-based simulated annealing (APBSA) method is developed to solve the systems reliability optimization problems. In the first step, to create a good algorithm, we use a coevolutionary strategy. Since the proposed algorithm is very sensitive to parameter values, the response surface method is employed to estimate the appropriate parameters of the algorithm. Moreover, to examine the performance of our proposed approach, several test problems are generated, and the proposed hybrid algorithm and other commonly known approaches (i.e., MOGA, NRGA, and NSGA-II) are compared with respect to four performance measures: 1) mean ideal distance; 2) diversification metric; 3) percentage of domination; and 4) data envelopment analysis. The computational studies have shown that the proposed algorithm is an effective approach for systems reliability and risk management.

  8. Management of occupational health risks in small-animal veterinary practices.

    Science.gov (United States)

    D'Souza, Eva; Barraclough, Richard; Fishwick, David; Curran, Andrew

    2009-08-01

    Small-animal work is a major element of veterinary practice in the UK and may be hazardous, with high levels of work-related injuries and ill-health reported in Australia and USA. There are no studies addressing the management of occupational health risks arising from small-animal work in the UK. To investigate the sources of health and safety information used and how health and safety and 12 specific occupational health risks are managed by practices. A cross-sectional postal survey of all small-animal veterinary practices in Hampshire. A response was mandatory as this was a Health & Safety Executive (HSE) inspection activity. A total of 118 (100%) practices responded of which 93 were eligible for inclusion. Of these, 99 and 86%, respectively, were aware of the Royal College of Veterinary Surgeons (RCVS) practice standards and had British Small Animal Veterinary Association (BSAVA) staff members, while only 51% had previous contact with HSE (publications, advice and visit). Ninety per cent had health and safety policies, but only 31% had trained responsible staff in health and safety. Specific health hazards such as occupational allergens and computer use were relatively overlooked both by practices and the RCVS/BSAVA guidance available in 2002. Failings in active health risk management systems could be due to a lack of training to ensure competence in those with responsibilities. Practices rely on guidance produced by their professional bodies. Current RCVS guidance, available since 2005, has remedied some previous omissions, but further improvements are recommended.

  9. Sustainable flood risk management – What is sustainable?

    DEFF Research Database (Denmark)

    Sørup, Hjalte Jomo Danielsen; Brudler, Sarah; Lerer, Sara Maria

    2016-01-01

    Sustainable flood risk management has to be achieved since flood protection is a fundamental societal service that we must deliver. Based on the discourse within the fields of risk management and sustainable urban water management, we discuss the necessity of assessing the sustainability of flood...... risk management, and propose an evaluation framework for doing so. We argue that it is necessary to include quantitative sustainability measures in flood risk management in order to exclude unsustainable solutions. Furthermore, we use the concept of absolute sustainability to discuss the prospects...... of maintaining current service levels without compromising future generation’s entitlement of services. Discussions on the sustainability of different overall flood risk schemes must take place. Fundamental changes in the approaches will require fundamental changes in the mind-sets of practitioners as well...

  10. Analysis and computer program for rupture-risk prediction of abdominal aortic aneurysms

    Directory of Open Access Journals (Sweden)

    Li Zhonghua

    2006-03-01

    Full Text Available Abstract Background Ruptured abdominal aortic aneurysms (AAAs are the 13th leading cause of death in the United States. While AAA rupture may occur without significant warning, its risk assessment is generally based on critical values of the maximum AAA diameter (>5 cm and AAA-growth rate (>0.5 cm/year. These criteria may be insufficient for reliable AAA-rupture risk assessment especially when predicting possible rupture of smaller AAAs. Methods Based on clinical evidence, eight biomechanical factors with associated weighting coefficients were determined and summed up in terms of a dimensionless, time-dependent severity parameter, SP(t. The most important factor is the maximum wall stress for which a semi-empirical correlation has been developed. Results The patient-specific SP(t indicates the risk level of AAA rupture and provides a threshold value when surgical intervention becomes necessary. The severity parameter was validated with four clinical cases and its application is demonstrated for two AAA cases. Conclusion As part of computational AAA-risk assessment and medical management, a patient-specific severity parameter 0

  11. Risk Management - Variance Minimization or Lower Tail Outcome Elimination

    DEFF Research Database (Denmark)

    Aabo, Tom

    2002-01-01

    on future cash flows (the budget), while risk managers concerned about costly lower tail outcomes will hedge (considerably) less depending on the level of uncertainty. A risk management strategy of lower tail outcome elimination is in line with theoretical recommendations in a corporate value......This paper illustrates the profound difference between a risk management strategy of variance minimization and a risk management strategy of lower tail outcome elimination. Risk managers concerned about the variability of cash flows will tend to center their hedge decisions on their best guess......-adding perspective. A cross-case study of blue-chip industrial companies partly supports the empirical use of a risk management strategy of lower tail outcome elimination but does not exclude other factors from (co-)driving the observations....

  12. Risk management for buildings -- Has the time come?

    Energy Technology Data Exchange (ETDEWEB)

    Berry, D.L.; Hunter, R.L.

    1997-08-01

    There are both incentives and challenges for applying formal risk management processes to buildings and other structures, including bridges, highways, dams, stadiums, shopping centers, and private dwellings. Based on an assessment of several issues, the authors conclude that for certain types of buildings and structures the time has come for the use of a formal risk-management approach, including probabilistic risk assessment methods, to help identify dominant risks to public health, safety, and security and to help manage these risks in a cost-effective manner.

  13. Managing Programmatic Risk for Complex Space System Developments

    Science.gov (United States)

    Panetta, Peter V.; Hastings, Daniel; Brumfield, Mark (Technical Monitor)

    2001-01-01

    Risk management strategies have become a recent important research topic to many aerospace organizations as they prepare to develop the revolutionary complex space systems of the future. Future multi-disciplinary complex space systems will make it absolutely essential for organizations to practice a rigorous, comprehensive risk management process, emphasizing thorough systems engineering principles to succeed. Project managers must possess strong leadership skills to direct high quality, cross-disciplinary teams for successfully developing revolutionary space systems that are ever increasing in complexity. Proactive efforts to reduce or eliminate risk throughout a project's lifecycle ideally must be practiced by all technical members in the organization. This paper discusses some of the risk management perspectives that were collected from senior managers and project managers of aerospace and aeronautical organizations by the use of interviews and surveys. Some of the programmatic risks which drive the success or failure of projects are revealed. Key findings lead to a number of insights for organizations to consider for proactively approaching the risks which face current and future complex space systems projects.

  14. Risk management with options and futures under liquidity risk

    OpenAIRE

    Adam-Müller, A F A; Panaretou, A

    2009-01-01

    Futures hedging creates liquidity risk through marking to market. Liquidity risk matters if interim losses on a futures position have to be financed at a markup over the risk-free rate. This study analyzes the optimal risk management and production decisions of a firm facing joint price and liquidity risk. It provides a rationale for the use of options on futures in imperfect capital markets. If liquidity risk materializes, the firm sells options on futures in order to partly cover this liqui...

  15. Managing Reputational Risk through Environmental Management and Reporting: An Options Theory Approach

    Directory of Open Access Journals (Sweden)

    Juan Pineiro-Chousa

    2017-03-01

    Full Text Available Reputation is a complex and multidimensional concept that may be organized in downside and upside reputational risk. In this article, we present a formal modelling for the management capabilities of environmental management and reporting over reputational risk, considering that reputational risk is becoming increasingly important for organizations and it directly depends on the information available about companies’ environmental performances. As long as the effectiveness of communication and disclosure plays a key role in the process, the usefulness of environmental management and reporting as a hedging instrument for reputational risk is addressed through different levels of information transparency. When considering a scenario of voluntary reporting, we show that environmentally concerned companies can reduce the cost of environmental management as a reputational risk strategy, as well as reducing the potential loss of reputational value from reputational threats and increasing the potential profit from reputational opportunities. In the context of mandatory reporting, we highlight the role of assurance companies as bearers of the risk of bad reputations for non-concerned companies. As a result, this novel approach applies theoretical oriented research from options theory to reputational risk management literature, so that it benefits from the option’s well known theory, robustness, and conclusions.

  16. The Future Regulatory Challenges of Liquidity Risk Management

    OpenAIRE

    Petr Teply

    2011-01-01

    Liquidity risk management ranks to key concepts applied in finance. Liquidity is defined as a capacity to obtain funding when needed, while liquidity risk means as a threat to this capacity to generate cash at fair costs. In the paper we present challenges of liquidity risk management resulting from the 2007- 2009 global financial upheaval. We see five main regulatory liquidity risk management issues requiring revision in coming years: liquidity measurement, intra-day and...

  17. Examining the realities of risk management

    International Nuclear Information System (INIS)

    Garrick, B.J.

    1985-01-01

    Sufficient experience now exists, especially in the nuclear industry, to consider the progress that has been made toward meaningful tools or aids for the control and, hence, management of risk. The considerable activity in the field of probabilistic risk assessment (PRA) suggests a high level of interest and application. It is the purpose of this paper to examine our own experience in this regard and to offer some observations and opinions about current practices in risk management and the requirements for success

  18. Decision support for utility environmental risk management

    International Nuclear Information System (INIS)

    Balson, W.E.; Wilson, D.S.

    1991-01-01

    This paper reviews a number of decision support methods developed and applied by Decision Focus Incorporated to help utility personnel manage current environmental problems. This work has been performed for the Environmental Risk Analysis Program of EPRI's Environment Division, and also for a number of electric utilities across the country. These are two distinct types of decision support software tools that have been created: economic risk management and environmental risk analysis. These types differ primarily in the identification of who will make a decision. Economic risk management tools are directed primarily at decisions made by electric utilities. Environmental risk analysis tools are directed primarily at decisions made by legislative or regulatory agencies, about which a utility may wish to comment

  19. The study of the risk management model of construction project

    International Nuclear Information System (INIS)

    Jiang Bo; Feng Yanping; Liu Changbin

    2010-01-01

    The paper first analyzed the development of the risk management of construction project and the risk management processes, and then briefly introduced the risk management experience of foreign project management. From the project management by objectives point of view, the greatest risk came from the lack of clarity of the objectives in the project management, which led to the project's risk emergence. In the analysis of the principles of the project objectives identification and risk allocation, the paper set up a project management model which insurance companies involved in the whole process of the project management, and simply analyzed the roles of insurance company at last. (authors)

  20. Computer System Analysis for Decommissioning Management of Nuclear Reactor

    International Nuclear Information System (INIS)

    Nurokhim; Sumarbagiono

    2008-01-01

    Nuclear reactor decommissioning is a complex activity that should be planed and implemented carefully. A system based on computer need to be developed to support nuclear reactor decommissioning. Some computer systems have been studied for management of nuclear power reactor. Software system COSMARD and DEXUS that have been developed in Japan and IDMT in Italy used as models for analysis and discussion. Its can be concluded that a computer system for nuclear reactor decommissioning management is quite complex that involved some computer code for radioactive inventory database calculation, calculation module on the stages of decommissioning phase, and spatial data system development for virtual reality. (author)

  1. Primary care physicians’ perspectives on computer-based health risk assessment tools for chronic diseases: a mixed methods study

    Directory of Open Access Journals (Sweden)

    Teja Voruganti

    2015-09-01

    Full Text Available Background Health risk assessment tools compute an individual’s risk of developing a disease. Routine use of such tools by primary care physicians (PCPs is potentially useful in chronic disease prevention. We sought physicians’ awareness and perceptions of the usefulness, usability and feasibility of performing assessments with computer-based risk assessment tools in primary care settings.Methods Focus groups and usability testing with a computer-based risk assessment tool were conducted with PCPs from both university-affiliated and community-based practices. Analysis was derived from grounded theory methodology.Results PCPs (n = 30 were aware of several risk assessment tools although only select tools were used routinely. The decision to use a tool depended on how use impacted practice workflow and whether the tool had credibility. Participants felt that embedding tools in the electronic medical records (EMRs system might allow for health information from the medical record to auto-populate into the tool. User comprehension of risk could also be improved with computer-based interfaces that present risk in different formats.Conclusions In this study, PCPs chose to use certain tools more regularly because of usability and credibility. Despite there being differences in the particular tools a clinical practice used, there was general appreciation for the usefulness of tools for different clinical situations. Participants characterised particular features of an ideal tool, feeling strongly that embedding risk assessment tools in the EMR would maximise accessibility and use of the tool for chronic disease management. However, appropriate practice workflow integration and features that facilitate patient understanding at point-of-care are also essential. 

  2. Integrated Risk and Knowledge Management Program -- IRKM-P

    Science.gov (United States)

    Lengyel, David M.

    2009-01-01

    The NASA Exploration Systems Mission Directorate (ESMD) IRKM-P tightly couples risk management and knowledge management processes and tools to produce an effective "modern" work environment. IRKM-P objectives include: (1) to learn lessons from past and current programs (Apollo, Space Shuttle, and the International Space Station); (2) to generate and share new engineering design, operations, and management best practices through preexisting Continuous Risk Management (CRM) procedures and knowledge-management practices; and (3) to infuse those lessons and best practices into current activities. The conceptual framework of the IRKM-P is based on the assumption that risks highlight potential knowledge gaps that might be mitigated through one or more knowledge management practices or artifacts. These same risks also serve as cues for collection of knowledge particularly, knowledge of technical or programmatic challenges that might recur.

  3. Insights from implementation of a risk management methodology

    International Nuclear Information System (INIS)

    Mahn, J.A.; Germann, R.P.; Jacobs, R.R.

    1992-01-01

    In 1988, GPU Nuclear (GPUN) Corporation embarked on a research effort to identify or develop an appropriate methodology for proactively managing risks. The objective of this effort was to increase its ability to identify potential risks and to aid resource allocation decision making for risk control. Such a methodology was presented at a risk management symposium sponsored by GPUN in September of 1989. A pilot project based on this methodology has been conducted at GPUN to test and validate the elements of the methodology and to compare the results of its application with current corporate methods for guiding risk decision making. The pilot project also led to a follow-up policy-capturing study to elicit information about the various risk decision-making models of GPUN decision makers. The combination of these endeavors provided an opportunity to gain numerous insights with respect to understanding the real value of a risk management process, obtaining acceptance of and commitment to risk management and improving operational aspects of the methodology

  4. 12 CFR 563.176 - Interest-rate-risk-management procedures.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Interest-rate-risk-management procedures. 563... ASSOCIATIONS-OPERATIONS Financial Management Policies § 563.176 Interest-rate-risk-management procedures... association's management of that risk. (b) The board of directors shall formerly adopt a policy for the...

  5. Making Risk Management Strategic

    DEFF Research Database (Denmark)

    Sax, Johanna; Andersen, Torben Juul

    2018-01-01

    Enterprise risk management (ERM) is an established management practice and is increasing in prominence as more firms spend substantial resources implementing ERM frameworks, partially induced by regulatory requirements. Yet, there is a lack of knowledge as to whether such frameworks add value and...... outcomes. The study develops a new multidimensional measure of adherence to ERM practices where earlier studies typically have relied on dichotomous proxies. We discuss the implications of these findings for ERM practice and strategic management in general....

  6. Cloud computing can simplify HIT infrastructure management.

    Science.gov (United States)

    Glaser, John

    2011-08-01

    Software as a Service (SaaS), built on cloud computing technology, is emerging as the forerunner in IT infrastructure because it helps healthcare providers reduce capital investments. Cloud computing leads to predictable, monthly, fixed operating expenses for hospital IT staff. Outsourced cloud computing facilities are state-of-the-art data centers boasting some of the most sophisticated networking equipment on the market. The SaaS model helps hospitals safeguard against technology obsolescence, minimizes maintenance requirements, and simplifies management.

  7. Operational Risk Management and Military Aviation Safety

    National Research Council Canada - National Science Library

    Ashley, Park

    1999-01-01

    .... The Army's Class A aviation mishap rate declined after it implemented risk management (RM) principles in 1987. This reduction caught the attention of Air Force leadership who have since stated that the application of operational risk management...

  8. CEA - Assessment of risk management for 2012

    International Nuclear Information System (INIS)

    Bonnevie, Edwige

    2013-06-01

    This report proposes an overview of the main events, actions performed by the CEA, and facts for 2012 regarding protection and monitoring of the environment, installation safety, occupational health and safety, radiological protection of workers, transportation of hazardous materials, waste management, protection of sites, installations and heritage, emergency situation management, legal risk management, internal controls and audits. It also presents the organisation and action of the risk management department within the CEA

  9. Computer-Managed Instruction: State of the Art.

    Science.gov (United States)

    Bozeman, William C.

    1979-01-01

    Summarizes the findings of a report on the current status of systems of computer-managed instruction (CMI). Five systems are reviewed intensively and seventeen others are described briefly. CMI appears to offer potential as a management device but little conclusive evidence exists concerning cost-effectiveness or impact on student achievement.…

  10. Adoption of Building Information Modelling in project planning risk management

    Science.gov (United States)

    Mering, M. M.; Aminudin, E.; Chai, C. S.; Zakaria, R.; Tan, C. S.; Lee, Y. Y.; Redzuan, A. A.

    2017-11-01

    An efficient and effective risk management required a systematic and proper methodology besides knowledge and experience. However, if the risk management is not discussed from the starting of the project, this duty is notably complicated and no longer efficient. This paper presents the adoption of Building Information Modelling (BIM) in project planning risk management. The objectives is to identify the traditional risk management practices and its function, besides, determine the best function of BIM in risk management and investigating the efficiency of adopting BIM-based risk management during the project planning phase. In order to obtain data, a quantitative approach is adopted in this research. Based on data analysis, the lack of compliance with project requirements and failure to recognise risk and develop responses to opportunity are the risks occurred when traditional risk management is implemented. When using BIM in project planning, it works as the tracking of cost control and cash flow give impact on the project cycle to be completed on time. 5D cost estimation or cash flow modeling benefit risk management in planning, controlling and managing budget and cost reasonably. There were two factors that mostly benefit a BIM-based technology which were formwork plan with integrated fall plan and design for safety model check. By adopting risk management, potential risks linked with a project and acknowledging to those risks can be identified to reduce them to an acceptable extent. This means recognizing potential risks and avoiding threat by reducing their negative effects. The BIM-based risk management can enhance the planning process of construction projects. It benefits the construction players in various aspects. It is important to know the application of BIM-based risk management as it can be a lesson learnt to others to implement BIM and increase the quality of the project.

  11. Exploration Systems Development (ESD) Approach to Enterprise Risk Management

    Science.gov (United States)

    Bauder, Stephen P.

    2014-01-01

    The National Aeronautics and Space Administration (NASA) Exploration Systems Development (ESD) Division has implemented an innovative approach to Enterprise Risk Management under a unique governance structure and streamlined integration model. ESD's mission is to design and build the capability to extend human existence to deep space. The Enterprise consists of three Programs: Space Launch System (SLS), Orion, and Ground Systems Development and Operations (GSDO). The SLS is a rocket and launch system that will be capable of powering humans, habitats, and support systems to deep space. Orion will be the first spacecraft in history capable of taking humans to multiple destinations within deep space. GSDO is modernizing Kennedy's spaceport to launch spacecraft built and designed by both NASA and private industry. ESD's approach to Enterprise Risk Management is commensurate with affordability and a streamlined management philosophy. ESD Enterprise Risk Management leverages off of the primary mechanisms for integration within the Enterprise. The Enterprise integration approach emphasizes delegation of authority to manage and execute the majority of cross-program activities and products to the individual Programs, while maintaining the overall responsibility for all cross-program activities at the Division. The intent of the ESD Enterprise Risk Management approach is to improve risk communication, to avoid replication and/or contradictory strategies, and to minimize overhead process burden. This is accomplished by the facilitation and integration of risk information within ESD. The ESD Division risks, Orion risks, SLS risks, and GSDO risks are owned and managed by the applicable Program. When the Programs have shared risks with multiple consequences, they are jointly owned and managed. When a risk is associated with the integrated system that involves more than one Program in condition, consequence, or mitigation plan, it is considered an Exploration Systems Integration

  12. RISK MANAGEMENT AS CHALLENGE TO TODAY’S ENTERPRISES

    Directory of Open Access Journals (Sweden)

    Iwona Gorzeń-Mitka

    2013-07-01

    Full Text Available Risk and its management are becoming increasingly important issues in modern theory and practice of managing organizations. It is propounded that organizations, regardless of the type or size of activity they carry out, take into account the impact of risk in their decisions and processes. Managerial approach to risk is aimed at reducing the extent to which risk impacts the functioning of an organization, allowing it to take optimal decisions. At the same time, changes occurring in the environment increase manifold the risk that organizations are forced to take. Inadequacy of the existing, traditional approaches to risk management, which often do not correspond to the dynamics of the changes in the environment in which today’s organizations function, makes it necessary to look for new, innovative managerial solutions. This has led to the emergence of the paradigm of enterprise risk management (ERM.

  13. RISKS IN INVESTMENT AND MANAGEMENT

    Directory of Open Access Journals (Sweden)

    Ms. Tatiana A. Ykovleva

    2016-12-01

    Full Text Available The article discusses the features of investment risks and their causes, as well as provides a detailed classification of investment risks. The authors reveal the essence and content of the investment process, risk management, providing material for presentation in the form of a diagram. In conclusion, the article explains the use of the system of specialized institutions as a way to exclude the basic, or primary investment risk.

  14. AN OVERVIEW ON STATE OF KNOWLEDGE OF RISK AND RISK MANAGEMENT IN ECONOMICS FIELDS

    OpenAIRE

    Mirela NICHITA

    2015-01-01

    The purpose of this paper is to present a history and an evolution of concepts of risk and risk management in economic, respectively financial fields, highlighting the usefulness (or not) and complexity of tools for risk assessment developed over time. The main objective of risk management is to reduce costs and increase the value of company and stakeholders gains; also, a coherent risk management strategy may improve entity capital structure which will derive in a healthy financing policy. T...

  15. Managing flood risks in the Mekong Delta

    NARCIS (Netherlands)

    Hoang, Long Phi; Biesbroek, Robbert; Tri, Van Pham Dang; Kummu, Matti; Vliet, van Michelle T.H.; Leemans, Rik; Kabat, Pavel; Ludwig, Fulco

    2018-01-01

    Climate change and accelerating socioeconomic developments increasingly challenge flood-risk management in the Vietnamese Mekong River Delta—a typical large, economically dynamic and highly vulnerable delta. This study identifies and addresses the emerging challenges for flood-risk management.

  16. COORDINATES OF A RISK MANAGEMENT PROJECT

    OpenAIRE

    ALEXANDRU OLTEANU; MĂDĂLINA ANTOANETA RĂDOI

    2013-01-01

    High risk – high benefit: a well-known correlation both in the economic field and in the day-to-day life. Another correlation, on which this article is based: large project – numerous participants – increased risks and other malfunctions. The risk management concept is challenged by those projects and is forced to find the most adequate “customized” ways for each project at its turn. In this respect, the assessment of management has followed the trend of the last three decades, marked by movi...

  17. Customer-Specific Transaction Risk Management in E-Commerce

    Science.gov (United States)

    Ruch, Markus; Sackmann, Stefan

    Increasing potential for turnover in e-commerce is inextricably linked with an increase in risk. Online retailers (e-tailers), aiming for a company-wide value orientation should manage this risk. However, current approaches to risk management either use average retail prices elevated by an overall risk premium or restrict the payment methods offered to customers. Thus, they neglect customer-specific value and risk attributes and leave turnover potentials unconsidered. To close this gap, an innovative valuation model is proposed in this contribution that integrates customer-specific risk and potential turnover. The approach presented evaluates different payment methods using their risk-turnover characteristic, provides a risk-adjusted decision basis for selecting payment methods and allows e-tailers to derive automated risk management decisions per customer and transaction without reducing turnover potential.

  18. Back to basics--just how much should a risk manager know about risk financing?

    Science.gov (United States)

    Miller, Vivian B

    2011-01-01

    Whether directly involved in development and implementation of the organization's risk financing program or not, risk management professionals, at the very least, need to be familiar with and understand the various risk financing strategies available to address all areas of exposure. This article addresses the types of coverages and risk financing options that should be considered when developing a comprehensive risk-financing program, and why it is important for risk management professionals to have some knowledge about these products, in order for their true value to be fully appreciated. © 2011 American Society for Healthcare Risk Management of the American Hospital Association.

  19. Risk management in a competitive electricity market

    International Nuclear Information System (INIS)

    Liu, Min; Wu, Felix F.

    2007-01-01

    In a competitive electricity market, it is necessary and important to develop an appropriate risk management scheme for trade with full utilization of the multi-market environment in order to maximize participants' benefits and minimize the corresponding risks. Based on the analyses to trading environments and risks in the electricity market, a layered framework of risk management for electric energy trading is proposed in this paper. Simulation results confirmed that trading among multiple markets is helpful to reduce the complete risk, and VaR provides a useful approach to judge whether the formed risk-control scheme is acceptable. (author)

  20. Computer aided approach for qualitative risk assessment of engineered systems

    International Nuclear Information System (INIS)

    Crowley, W.K.; Arendt, J.S.; Fussell, J.B.; Rooney, J.J.; Wagner, D.P.

    1978-01-01

    This paper outlines a computer aided methodology for determining the relative contributions of various subsystems and components to the total risk associated with an engineered system. Major contributors to overall task risk are identified through comparison of an expected frequency density function with an established risk criterion. Contributions that are inconsistently high are also identified. The results from this analysis are useful for directing efforts for improving system safety and performance. An analysis of uranium hexafluoride handling risk at a gaseous diffusion uranium enrichment plant using a preliminary version of the computer program EXCON is briefly described and illustrated

  1. THE EVOLUTION OF RISK MANAGEMENT RESEARCH: CHANGES IN KNOWLEDGE MAPS

    OpenAIRE

    Iwona Gorzeń-Mitka

    2017-01-01

    One of the leading trends in modern academic research is risk management. Over the years, the approach to risk management has changed and affected many different areas. This study aims to investigate changes in risk management and trends of risk management in the past 20 years. Risk management related publications from 1990 to 2016 were retrieved from the Web of Science and Scopus databases. VOS viewer software was used to analyse the research trend. Literature growth related to risk manageme...

  2. International comparative analyses of healthcare risk management.

    Science.gov (United States)

    Sun, Niuyun; Wang, Li; Zhou, Jun; Yuan, Qiang; Zhang, Zongjiu; Li, Youping; Liang, Minghui; Cheng, Lan; Gao, Guangming; Cui, Xiaohui

    2011-02-01

    Interpretation of the growing body of global literature on health care risk is compromised by a lack of common understanding and language. This series of articles aims to comprehensively compare laws and regulations, institutional management, and administration of incidence reporting systems on medical risk management in the United Kingdom, the United States, Canada, Australia, and Taiwan, so as to provide evidence and recommendations for health care risk management policy in China. We searched the official websites of the healthcare risk management agencies of the four countries and one district for laws, regulatory documents, research reports, reviews and evaluation forms concerned with healthcare risk management and assessment. Descriptive comparative analysis was performed on relevant documents. A total of 146 documents were included in this study, including 2 laws (1.4%), 17 policy documents (11.6%), 41 guidance documents (28.1%), 37 reviews (25.3%), and 49 documents giving general information (33.6%). The United States government implemented one law and one rule of patient safety management, while the United Kingdom and Australia each issued professional guidances on patient safety improvement. The four countries implemented patient safety management policy on four different levels: national, state/province, hospital, and non-governmental organization. The four countries and one district adopted four levels of patient safety management, and the administration modes can be divided into an "NGO-led mode" represented by the United States and Canada and a "government-led mode" represented by the United Kingdom, Australia, and Taiwan. © 2011 Blackwell Publishing Asia Pty Ltd and Chinese Cochrane Center, West China Hospital of Sichuan University.

  3. PERFORMANCE IN INTERNAL CONTROL AND RISK MANAGEMENT

    OpenAIRE

    JELER (POPA) IOANA; FOCŞAN ELEONORA IONELA; CORICI MARIAN CĂTĂLIN

    2017-01-01

    The purpose of this article is to highlight the importance of internal control and risk management. In practice, economic entities meet a variety of risks that have the origins from the internal environment or the external one. Although there are different of views on addressing the concept of risk - threats or opportunities, event or action, accordingly uncertain, proposed by specialists in risk management in this article we try to present these issues and identify techniques to ...

  4. Compendium of technical computer codes used in support of the DOE Office of Civilian Radioactive Waste Management

    International Nuclear Information System (INIS)

    McBride, A.F.; Austin, P.N.; Ward, W.M.; McCarn, L.B.; Roddy, J.W.; Ludwig, S.B.; Reich, W.J.; Roussin, R.W.

    1989-04-01

    A compilation of technical computer codes related to ongoing work under the cognizance of the US Department of Energy's Office of Civilian Radioactive Waste Management (DOE/OCRWM) is presented. Much of the information was obtained from responses to a questionnaire distributed by DOE/OCRWM to all DOE offices associated with the radioactive waste management program. The codes are arranged alphabetically by name. In addition to the code description, each sheet includes other data such as computer hardware and software requirements, document references, name of respondent, and code variants. The codes are categorized into seventeen subject areas plus a miscellaneous category. Some of the subject areas covered are atmospheric dispersion, biosphere transport, geochemistry, nuclear radiation transport, nuclide inventory, and risk assessment. Three appendixes are included which list the names of the contributors, a list of the literature reviewed, and a glossary of computer code terminology and definitions. 50 refs., 3 tabs

  5. The role of internal audit in companies' risk management

    Directory of Open Access Journals (Sweden)

    Vlaović-Begović Sanja

    2012-01-01

    Full Text Available The internal audit area of application differs according to management needs and demands, as well as the structure and the size of a company. Besides examination of bookkeeping information, law synchronization check, criminal action and mistakes discoveries, internal audit is more and more directed towards risk management process in order to respond to the demands of uncertain business and to secure adequate business decisions making for management. This paper examines the role of internal audit in companies' risk management that is represented in examination and evaluation of risk management processes, with the aim of decreasing risk to an acceptable level for a company. Besides that, internal audit can support the management in configuration and establishing more efficient, improved risk management process. In order to ensure independence and objectiveness of internal audit operation, activities and responsibilities of management and internal audit are clearly defined.

  6. Tank Waste Remediation System Characterization Project Programmatic Risk Management Plan

    International Nuclear Information System (INIS)

    Baide, D.G.; Webster, T.L.

    1995-12-01

    The TWRS Characterization Project has developed a process and plan in order to identify, manage and control the risks associated with tank waste characterization activities. The result of implementing this process is a defined list of programmatic risks (i.e. a risk management list) that are used by the Project as management tool. This concept of risk management process is a commonly used systems engineering approach which is being applied to all TWRS program and project elements. The Characterization Project risk management plan and list are subset of the overall TWRS risk management plan and list

  7. Managing Complex Environmental Risks

    Energy Technology Data Exchange (ETDEWEB)

    Karlsson, Mikael [Karlstad Univ. (Sweden). Dept. of Environmental Sciences

    2006-09-15

    Environmental and public health risks are often handled in a process in which experts, and sometimes policy makers, try their best to quantitatively assess, evaluate and manage risks. This approach harmonises with mainstream interpretations of sustainable development, which aim at defining a desirable relationship between human and natural systems, for instance by policies that define limit values of different forms of disturbances. However, under conditions of high scientific incertitude, diverging values and distrust, this approach is far from satisfactory. The use of cell phones, hazardous chemicals, nuclear or fossil energy systems, and modern biotechnology are examples of activities causing such risks with high complexity. Against this background, a complementary interpretation of the concept of sustainable development is suggested. This interpretation is operationalised through new formulations of three common principles for public risk management; the precautionary principle, the polluter pays principle and the principle of public participation. Implementation of these reformulated principles would challenge some foundations of present mainstream views on environmental decision-making, but would on the other hand contribute to improved practices for long-term human welfare and planetary survival (full text of contribution)

  8. Managing Complex Environmental Risks

    International Nuclear Information System (INIS)

    Karlsson, Mikael

    2006-01-01

    Environmental and public health risks are often handled in a process in which experts, and sometimes policy makers, try their best to quantitatively assess, evaluate and manage risks. This approach harmonises with mainstream interpretations of sustainable development, which aim at defining a desirable relationship between human and natural systems, for instance by policies that define limit values of different forms of disturbances. However, under conditions of high scientific incertitude, diverging values and distrust, this approach is far from satisfactory. The use of cell phones, hazardous chemicals, nuclear or fossil energy systems, and modern biotechnology are examples of activities causing such risks with high complexity. Against this background, a complementary interpretation of the concept of sustainable development is suggested. This interpretation is operationalised through new formulations of three common principles for public risk management; the precautionary principle, the polluter pays principle and the principle of public participation. Implementation of these reformulated principles would challenge some foundations of present mainstream views on environmental decision-making, but would on the other hand contribute to improved practices for long-term human welfare and planetary survival (full text of contribution)

  9. 77 FR 13585 - Electricity Subsector Cybersecurity Risk Management Process Guideline

    Science.gov (United States)

    2012-03-07

    ... DEPARTMENT OF ENERGY Electricity Subsector Cybersecurity Risk Management Process Guideline AGENCY... Electricity Subsector Cybersecurity Risk Management Process guideline. The guideline describes a risk... Cybersecurity Risk Management Process Guideline. The primary goal of this guideline is to describe a risk...

  10. Computer-Aided Corrosion Program Management

    Science.gov (United States)

    MacDowell, Louis

    2010-01-01

    This viewgraph presentation reviews Computer-Aided Corrosion Program Management at John F. Kennedy Space Center. The contents include: 1) Corrosion at the Kennedy Space Center (KSC); 2) Requirements and Objectives; 3) Program Description, Background and History; 4) Approach and Implementation; 5) Challenges; 6) Lessons Learned; 7) Successes and Benefits; and 8) Summary and Conclusions.

  11. PROJECT MANAGER SKILLS, RISK MANAGEMENT TOOLS

    Directory of Open Access Journals (Sweden)

    Vladut Iacob

    2013-12-01

    Full Text Available Although the projects are different from each other there are many common things that contribute to their success. Looked overall, the success of a project is the result of a multitude of factors. This person is considered the "engine" of the project. The man who makes the action set for the achievement of project objectives to be brought to an end. The project manager must have the technical knowledge and economic diverse. He should be able to choose a team and lead. You must be tenacious, combative, to know how to communicate both within the team and beyond. In a word, the project manager must have an impressive stock of knowledge, skills and abilities and appreciate as Peter Drucker, to "exist for the organization. To be its servant. Any management who forget this will only cause damage to the organization. "This study will focus on highlighting the skills of the project manager and their role in managing difficult situations or risk.

  12. Therapeutic risk management of the suicidal patient: safety planning.

    Science.gov (United States)

    Matarazzo, Bridget B; Homaifar, Beeta Y; Wortzel, Hal S

    2014-05-01

    This column is the fourth in a series describing a model for therapeutic risk management of the suicidal patient. Previous columns presented an overview of the therapeutic risk management model, provided recommendations for how to augment risk assessment using structured assessments, and discussed the importance of risk stratification in terms of both severity and temporality. This final column in the series discusses the safety planning intervention as a critical component of therapeutic risk management of suicide risk. We first present concerns related to the relatively common practice of using no-suicide contracts to manage risk. We then present the safety planning intervention as an alternative approach and provide recommendations for how to use this innovative strategy to therapeutically mitigate risk in the suicidal patient.

  13. Risk assessment and radioactive waste management

    International Nuclear Information System (INIS)

    Cohen, J.J.

    1979-01-01

    Problems of radioactive waste management, both real and apparent, have provided a serious constraint in the development of nuclear power. Several studies have been conducted in an attempt to evaluate the actual (quantifiable) risks of radioactive waste management and place them in a reasonable perspective. These studies are reviewed and discussed. Generally, the studies indicate the risks to be of a level of seriousness which might normally be considered acceptable in current society. However, it is apparent that this acceptability has not been attained and public apprehension prevails. To understand the reasons for this apprehension requires an assessment of those factors of ''perceived'' risks which play a major role in determining public attitudes toward radioactive waste management programs and nuclear power, in general. Such factors might include the spector of legacies of harm to future generations, genetic effects, nuclear garbage dumps, proliferation of plutonium inventories, nuclear terrorism, etc. A major problem in development of acceptable waste management policies and programs requires not only the recognition of the importance of perceived risk factors but development of a methodology for their incorporation in planning and conduct of such activities. Some approaches to the development of this methodology are discussed

  14. Quantifying risk and accuracy in cancer risk assessment: the process and its role in risk management problem-solving.

    Science.gov (United States)

    Turturro, A; Hart, R W

    1987-01-01

    A better understanding of chemical-induced cancer has led to appreciation of similarities to problems addressed by risk management of radiation-induced toxicity. Techniques developed for cancer risk assessment of toxic substances can be generalized to toxic agents. A recent problem-solving approach for risk management of toxic substances developed for the U.S. Department of Health and Human Services, and the role of risk assessment and how uncertainty should be treated within the context of this approach, is discussed. Finally, two different methods, research into the assumptions underlying risk assessment and the modification of risk assessment/risk management documents, are used to illustrate how the technique can be applied.

  15. Risk, Risk Perception, Risk Management – a Review of the Literature

    OpenAIRE

    Tamás Vasvári

    2015-01-01

    Risks have become an integral part of our society. In this context, the aim of this paper is to provide a summary of the findings of risk research conducted in different fields of study and to trace the effect of these findings on risk management practices. The basic approaches to risk presented in this paper show that the notions of probability employed in studying processes in any area of life belong in the province of epistemology rather than ontology. Therefore, subjectivity cannot be com...

  16. Reducing the risk, managing safety.

    Science.gov (United States)

    Aldridge, Peter

    2016-02-01

    Fire safety in healthcare premises has always been a challenge to those that discharge this duty. Statutory compliance should be a matter of course, but in an ever increasingly challenged NHS, even this is not a given. While the NHS is driven by managing very complex risk to deliver cutting edge healthcare, providers cannot be risk averse. Which risk, however, takes priority? Here Peter Aldridge, fire and corporate services manager at Leeds Teaching Hospitals NHS Trust, and Secretary to the National Association of Healthcare Fire Officers (NAHFO)--which will this month and next jointly stage fire safety seminars with IHEEM; see page 8--considers the key issues, with input from a fire officer at a leading mental health and community Trust.

  17. Operational risk management for a NPP

    Energy Technology Data Exchange (ETDEWEB)

    Scott, C.K., E-mail: KScott@AtlanticNuclear.ca [Atlantic Nuclear Services Inc., Fredericton, New Brunswick (Canada)

    2013-07-01

    Organizational failures are a hazard to the successful operation of a nuclear power plant. Risk reduction strategies have been developed around two themes: using an understanding of the nature and mechanism of human failures to eliminate them by modifying work processes; or, modifying human behaviour by creating a strong safety culture that overrides the tendency to fail. This paper examines the problem from the perspective of operational risk management. It includes the internal management of operations and the influence of the external environment on the organization. A model is proposed that encompasses all the operational risk factors in the organization's decision making process. To prevent failure the organization must have the capability to adapt and the capacity to evolve. The hazards that would lead to an organizational failure are developed from this evolutionary model. The operational risk management program would include these hazards as well as the conventional nuclear safety hazards. (author)

  18. Managing Chemical & Material Risks

    Science.gov (United States)

    2011-12-01

    Certification Program Acquisition, Technology and Logistics 9 DoD Hexavalent Chromium Risk Reduction Non- Chrome Primer II EXAVAJ ENT CHROM lrUMI...Royal Demolition eXplosive (RDX) • Cyclotrimethylenetrinitramine  Hexavalent Chromium (Cr6+) Naphthalene …pending downgrade to watch list Beryllium...T1me (secondo) 700 Acquisition, Technology and Logistics 10 Hexavalent Chromium Risk Management Actions • DoD minimization policy signed April

  19. The role of risk perception in making flood risk management more effective

    Science.gov (United States)

    Buchecker, M.; Salvini, G.; Di Baldassarre, G.; Semenzin, E.; Maidl, E.; Marcomini, A.

    2013-11-01

    Over the last few decades, Europe has suffered from a number of severe flood events and, as a result, there has been a growing interest in probing alternative approaches to managing flood risk via prevention measures. A literature review reveals that, although in the last decades risk evaluation has been recognized as key element of risk management, and risk assessment methodologies (including risk analysis and evaluation) have been improved by including social, economic, cultural, historical and political conditions, the theoretical schemes are not yet applied in practice. One main reason for this shortcoming is that risk perception literature is mainly of universal and theoretical nature and cannot provide the necessary details to implement a comprehensive risk evaluation. This paper therefore aims to explore a procedure that allows the inclusion of stakeholders' perceptions of prevention measures in risk assessment. It proposes to adopt methods of risk communication (both one-way and two-way communication) in risk assessment with the final aim of making flood risk management more effective. The proposed procedure not only focuses on the effect of discursive risk communication on risk perception, and on achieving a shared assessment of the prevention alternatives, but also considers the effects of the communication process on perceived uncertainties, accepted risk levels, and trust in the managing institutions. The effectiveness of this combined procedure has been studied and illustrated using the example of the participatory flood prevention assessment process on the Sihl River in Zurich, Switzerland. The main findings of the case study suggest that the proposed procedure performed well, but that it needs some adaptations for it to be applicable in different contexts and to allow a (semi-) quantitative estimation of risk perception to be used as an indicator of adaptive capacity.

  20. Plant risk status information management system

    International Nuclear Information System (INIS)

    Campbell, D.J.; Ellison, B.C.; Glynn, J.C.; Flanagan, G.F.

    1985-01-01

    The Plant Risk Status Information Management System (PRISIMS) is a PC program that presents information about a nuclear power plant's design, its operation, its technical specifications, and the results of the plant's probabilistic risk assessment (PRA) in a logically and easily accessible format. PRISIMS provides its user with unique information for integrating safety concerns into day-to-day operational decisions and/or long-range management planning

  1. Air quality risk management.

    Science.gov (United States)

    Williams, Martin L

    2008-01-01

    Rather than attempt to provide a comprehensive account of air quality risk assessment, as might be found in a textbook or manual, this article discusses some issues that are of current importance in the United Kingdom and the rest of Europe, with special emphasis on risk assessment in the context of policy formulation, and emerging scientific knowledge. There are two pollutants of particular concern and that both pose challenges for risk assessment and policy, and they are particulate matter (PM) and ozone. The article describes some issues for health risk assessment and finally some forward-looking suggestions for future approaches to air quality management.

  2. Toward effective ecological risk-management of refinery corrective action

    International Nuclear Information System (INIS)

    Metzger, B.H.; Rury, P.M.; Turton, D.; Archibald, B.; Clark, J.; Cura, J.

    1995-01-01

    Cleanup of complex industrial sites, such as refineries, requires risk-based decision tools to ensure that environmentally protective remediation is consistent with current and future land use. However, conventional ecological risk assessment approaches are not well suited for complex industrial sites. Site risk assessments focus on hypothetical chemical risk assuming diverse and undisturbed ecosystems, rather than industrial and disturbed area conditions. In addition, they offer little guidance as to how to make timely and effective risk management decisions. An innovative methodology is proposed to assist industry and regulatory risk managers with rapid EcoRisk reconnaissance and cost-effective remedial decision-making at complex industrial sites. Phase 1 comprises a three-step risk screening of areas of ecological concern at the site, which integrates habitat quality characteristics and potential chemical hazards. It yields an ordering of areas as follows: areas of no significant risk; areas of potentially significant risk; and areas of likely significant risk. A decision rule is then applied to determine appropriate risk management action, including: no action; additional study; and remedial or management action. In Phase 2, additional study is conducted for areas that exhibit potentially significant risk so as to facilitate risk management. This methodology is currently being applied at the 1,300 acre, former Exxon Bayway Refinery in New Jersey

  3. Cloud Computing Governance Lifecycle

    OpenAIRE

    Soňa Karkošková; George Feuerlicht

    2016-01-01

    Externally provisioned cloud services enable flexible and on-demand sourcing of IT resources. Cloud computing introduces new challenges such as need of business process redefinition, establishment of specialized governance and management, organizational structures and relationships with external providers and managing new types of risk arising from dependency on external providers. There is a general consensus that cloud computing in addition to challenges brings many benefits but it is uncle...

  4. Human-Computer Interaction and Information Management Research Needs

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — In a visionary future, Human-Computer Interaction HCI and Information Management IM have the potential to enable humans to better manage their lives through the use...

  5. Managing Risk and Opportunity

    DEFF Research Database (Denmark)

    Andersen, Torben Juul; Garvey, Maxine; Roggi, Oliviero

    outcomes. This topic is timely and of interest both to the academic community as well as to practicing managers, executives, and directors. The volume focuses on contemporary risk leadership issues based on recent research insights but avoids excessive technical language and mathematical formulas. The book...... is framed around the challenges imposed on executives and directors in dealing with an increasingly complex and unpredictable world. This requires a new risk leadership focus that not only avoids the downside risks but also considers ways to exploit the upside potential offered by a dynamic environment...

  6. Integrated Waste Treatment Unit GFSI Risk Management Plan

    International Nuclear Information System (INIS)

    W. A. Owca

    2007-01-01

    This GFSI Risk Management Plan (RMP) describes the strategy for assessing and managing project risks for the Integrated Waste Treatment Unit (IWTU) that are specifically within the control and purview of the U.S. Department of Energy (DOE), and identifies the risks that formed the basis for the DOE contingency included in the performance baseline. DOE-held contingency is required to cover cost and schedule impacts of DOE activities. Prior to approval of the performance baseline (Critical Decision-2) project cost contingency was evaluated during a joint meeting of the Contractor Management Team and the Integrated Project Team for both contractor and DOE risks to schedule and cost. At that time, the contractor cost and schedule risk value was $41.3M and the DOE cost and schedule risk contingency value is $39.0M. The contractor cost and schedule risk value of $41.3M was retained in the performance baseline as the contractor's management reserve for risk contingency. The DOE cost and schedule risk value of $39.0M has been retained in the performance baseline as the DOE Contingency. The performance baseline for the project was approved in December 2006 (Garman 2006). The project will continue to manage to the performance baseline and change control thresholds identified in PLN-1963, ''Idaho Cleanup Project Sodium-Bearing Waste Treatment Project Execution Plan'' (PEP)

  7. Multiple challenges of risk management in EU credit institutions

    Directory of Open Access Journals (Sweden)

    Constantinescu, A.

    2011-01-01

    Full Text Available This paper is intended to be a significant insight into risk management issues by describing the main types of such risks and by providing management and evaluation procedures of significant risks into some active banking companies in Romania. In times of crisis, risk management in the banking system has a greater importance than in the normal economic times. The 2011 was a year in which Romania has been hit by the repercussions of the international economic crisis. Using strategies against risks, implementing procedures to monitor and control risks, risk assessment and quantification can substantially reduce the financial losses of a company or those of a financial institution. Risk management is an integral part of all decision making and business processes from credit institutions, its purpose being to protect their sustainable development. The innovations on the financial market, the internationalization of the specific operations, and the pressure of the competition are just a few arguments that impose a permanent supervision of the general and specific risks. This is the main reason why is compulsory to find new methods of managing risks, to keep in consideration the identification, evaluation of the management and the control of the banking system and of each bank.

  8. Lean and agile supply chain management concepts in the aspect of risk management

    Directory of Open Access Journals (Sweden)

    2010-12-01

    Full Text Available Lean and agile supply chain managements, as well as the hybrid forms (leagile supply chains, are popular and relatively widely discussed in literature. However, there are some disputes concerning differentiating these types of the management from tools and instruments such as outsourcing, single sourcing, quick response, standardizing principles and postponement. The above-mentioned concepts are discussed in a positive light as tools for achieving a competitive advantage of supply chains. A recently introduced term SCRM (Supply Chain Risk Management emphasizes the importance of the risk management in supply chains also due to the ability to achieve a competitive advantage of those chains in which a risk is identified, estimated, managed and controlled. Therefore, it seems to be of benefit to look for the relationships and dependencies between these concepts (some references were made to the author's own research. A significant part of the papers concerns the identification of risks related to the above-mentioned instruments of supply chain management. However, the concepts of lean and agile management are often discussed due to the fundamental determiners of the functioning of a supply chain such as the nature of the demand, the character of goods and the total lead-time. According to the author, the discussed concepts could be viewed concerning supply chain risk management. It could facilitate the choice of a supply chain strategy based on the risk analysis. Several case studies were included to support the presented considerations.

  9. Producers' Complex Risk Management Choices

    NARCIS (Netherlands)

    Pennings, J.M.E.; Isengildina, O.; Irwin, S.H.; Garcia, P.; Good, D.L.

    2008-01-01

    Producers have a wide variety of risk management instruments available, making their choice(s) complex. The way producers deal with this complexity can vary and may influence the impact that the determinants, such as risk aversion, have on their choices. A recently developed choice bracketing

  10. Intentional risk management through complex networks analysis

    CERN Document Server

    Chapela, Victor; Moral, Santiago; Romance, Miguel

    2015-01-01

    This book combines game theory and complex networks to examine intentional technological risk through modeling. As information security risks are in constant evolution,  the methodologies and tools to manage them must evolve to an ever-changing environment. A formal global methodology is explained  in this book, which is able to analyze risks in cyber security based on complex network models and ideas extracted from the Nash equilibrium. A risk management methodology for IT critical infrastructures is introduced which provides guidance and analysis on decision making models and real situations. This model manages the risk of succumbing to a digital attack and assesses an attack from the following three variables: income obtained, expense needed to carry out an attack, and the potential consequences for an attack. Graduate students and researchers interested in cyber security, complex network applications and intentional risk will find this book useful as it is filled with a number of models, methodologies a...

  11. A challenge for land and risk managers: differents stakeholders, differents definitions of the risks

    Science.gov (United States)

    Fernandez, M.; Ruegg, J.

    2012-04-01

    In developing countries, mountain populations and territories are subject to multiple risks and vulnerabilities. In addition, they face even greater challenges than developed countries due to lack of knowledge, resources and technology. There are many different types of actors in society that manage risk at various scales and levels (i.e. engineers, geologists, administrators, land use planners, merchants and local indigenous and non-indigenous people). Because of limited resources and possibilities to reduce all types of risk, these different actors, or 'risk managers' have to choose and compete to prioritize which types of risks to address. This paper addresses a case study from San Cristobal Altaverapaz, Guatemala where a large landslide "Los Chorros", a catastrophic collapse of 6 millions cubic meters of rock, is affecting several communities and one of the country's main west-east access highways. In this case, the government established that the "primary" risk is the landslide, whereas other local stakeholders consider the primary risks to be economic This paper, situated at the cross section between political science, geography and disaster risk management, addresses the social conflict and competition for priorities and solutions for risk management, depending on the group of actors based on the on-going Los Chorros, Guatemala landslide mitigation process. This work is based on the analysis of practices, (Practical Science), policies and institutions in order to understand how the inclusion of multiple stakeholders in determining risk priorities can lead to more sustainable risk management in a given territory. The main objective of this investigation is first to identify and understand the juxtaposition of different readings of the risk equation, usually considered the interface between vulnerability, exposure and hazards. Secondly, it is to analyze the mechanisms of actions taken by various stakeholders, or risk managers. The analysis focuses on the

  12. 78 FR 36784 - Survey of Nanomaterial Risk Management Practices

    Science.gov (United States)

    2013-06-19

    ...-0010, Docket Number NIOSH-265] Survey of Nanomaterial Risk Management Practices AGENCY: National...), Department of Health and Human Services (HHS). ACTION: Proposed NIOSH Survey of Nanomaterial Risk Management... questions addressing risk management practices for ENMs? (5) What should be the maximum amount of time...

  13. Measuring Property Management Risk and Loss: Step One Toward Managing Property on a Foundation of Risk, Cost, and Benefit

    International Nuclear Information System (INIS)

    Johnson, Curtis

    1999-01-01

    This is a period of ever-tightening defense budgets and continuing pressure on the public sector to be more commercial-like, Property policies, practices, and regulations are increasingly being challenged and changed. In these times, we must be leaders in understanding and defining the value of our profession from a commercial standpoint so that we can provide the right services to our customers and explain and defend the value of those services. To do so, we must step outside current property management practices, regulations, and oversight. We must learn to think and speak in the language of those who fund us--a financial language of risk, cost, and benefit. Regardless of regulation and oversight, our bosses are demanding that we demonstrate (financially) the benefits of current practice, or else. This article is intended to be the beginning of an effort to understand and define our profession in terms of risk, cost, and benefit so that we can meet these new challenges. The first step in this effort must be defining and measuring risk, cost, and benefit. Our costs, although sometimes difficult to capture, are easy to understand: they are almost exclusively the effort, both within and without the property management organization, involved in managing property. Unfortunately, property risks and benefits are not so simple or so well understood. Generally, risks and benefits are identified and measured through physical inventory results: potential and actual shortages. This paper will explore the weaknesses in the current understanding and use of shortage information as the yardstick for property management risks and performance. It will define a new framework for understanding the purpose and value of property management. And finally, it will set a course for a new method of measuring and valuing physical inventoty shortages. This new method will yield accurate and useful measures of property management risk and benefit. Once risk and benefit are accurately

  14. Credit Risk Management. A study on risk integration in the bank lending process.

    NARCIS (Netherlands)

    Sleddens, Linda Elsa Wilhelmina

    2011-01-01

    Credit risk management has been a topic much written about in the last decade. Substantial credit risk losses can undermine the stability of the bank. Both banks and national bank supervisors have realized the need to invest in credit risk management. Partly driven by regulations such as the Basel

  15. Evaluating risk management strategies in resource planning

    International Nuclear Information System (INIS)

    Andrews, C.J.

    1995-01-01

    This paper discusses the evaluation of risk management strategies as a part of integrated resource planning. Value- and scope-related uncertainties can be addressed during the process of planning, but uncertainties in the operating environment require technical analysis within planning models. Flexibility and robustness are two key classes of strategies for managing the risk posed by these uncertainties. This paper reviews standard capacity expansion planning models and shows that they are poorly equipped to compare risk management strategies. Those that acknowledge uncertainty are better at evaluating robustness than flexibility, which implies a bias against flexible options. Techniques are available to overcome this bias

  16. On the new ISO guide on risk management terminology

    International Nuclear Information System (INIS)

    Aven, Terje

    2011-01-01

    A new ISO guide on risk management terminology has recently been issued. The guide provides basic vocabulary for developing a common understanding of risk assessment and risk management concepts and terms among organisations and functions, and across different application areas. It provides the foundation of, for example, the ISO 31000 standard on risk management. The guide strongly influences the risk assessment and risk management field, and its quality is thus of utmost importance. In this paper a critical review of the guide is conducted. We argue that the guide fails in several ways in producing consistent and meaningful definitions of many of the key concepts covered. A main focus is placed on the risk concept, which is defined as the effect of uncertainty on objectives, but also many other definitions are looked into, including probability, vulnerability, hazard, risk identification and risk description. Examples are used to illustrate the problems and show how they can be rectified. Although the focus is on the ISO guide, the discussion is to a large extent general. The overall aim of the paper is to contribute to the further development of the area of risk assessment and risk management by strengthening its conceptual basis.

  17. Farmers' motivations, risk perceptions and risk management strategies in a developing economy: Bangladesh experience

    DEFF Research Database (Denmark)

    Ahsan, D. A.

    2011-01-01

    and farm management training are considered among the best methods to manage the risks in the shrimp-farming business. We also observe some disparities in farmers' perceptions. For instance, farmers mentioned that removal of influence of middlemen from supply chain is essential for the betterment......Aquaculture farmers' risk perceptions and risk management strategies have still received little attention in agricultural research. Therefore, an exploratory study has been undertaken to provide empirical insight into Bangladeshi coastal shrimp farmers' risk perceptions and risk management...... and availability of quality shrimp seeds, exploitation by intermediaries and uncertainty about the future demand for shrimp in foreign markets are perceived as the most important sources of risk. On the other hand, prevention of disease, timely supply of shrimp seeds, elimination of middlemen from the supply chain...

  18. Interest Rate Risk Management using Duration Gap Methodology

    Directory of Open Access Journals (Sweden)

    Dan Armeanu

    2008-01-01

    should be measured and managed within an asset-liability management. Then the articles takes a short look at methods for measuring interest rate risk and after that explains and demonstrates how can be used Duration Gap Model for managing interest rate risk in banks.

  19. Risk management activities at the DOE Class A reactor facilities

    International Nuclear Information System (INIS)

    Sharp, D.A.; Hill, D.J.; Linn, M.A.; Atkinson, S.A.; Hu, J.P.

    1993-01-01

    The probabilistic risk assessment (PRA) and risk management group of the Association for Excellence in Reactor Operation (AERO) develops risk management initiatives and standards to improve operation and increase safety of the DOE Class A reactor facilities. Principal risk management applications that have been implemented at each facility are reviewed. The status of a program to develop guidelines for risk management programs at reactor facilities is presented

  20. Risk management methodology applied at thermal power plant

    International Nuclear Information System (INIS)

    Coppolino, R.

    2007-01-01

    Nowadays, the responsibility of the environmental risks, connected the productive processes and to the products of an enterprise, represent one of the main aspects which an adequate management approach has to foresee. In this paper it has been evaluated the guidelines followed by Edipower Thermoelectric Power plant of S. Filippo di Mela (ME). These guidelines were given in order to manage the chemical risk connected to the usage of various chemicals with which the workers get in touch when identifying the risks of the methodology introduced by the AZ/NZS 4360:2004 Risk Management Standard