WorldWideScience

Sample records for risk management computer

  1. Managing the Risks Associated with End-User Computing.

    Science.gov (United States)

    Alavi, Maryam; Weiss, Ira R.

    1986-01-01

    Identifies organizational risks of end-user computing (EUC) associated with different stages of the end-user applications life cycle (analysis, design, implementation). Generic controls are identified that address each of the risks enumerated in a manner that allows EUC management to select those most appropriate to their EUC environment. (5…

  2. Risk Management Considerations in Cloud Computing Adoption

    OpenAIRE

    Doherty, Eileen; Carcary, Marian; Conway, Gerard

    2012-01-01

    Information and Communication Technology (ICT) plays a pivotal role in enabling organizational capability and productivity, and in initiating and facilitating innovation across all industry sectors. In recent years, cloud computing has emerged as a growing trend because it serves as an enabler of scalable, flexible and powerful computing. Consequently, each year significant global investment is made in migrating to the cloud environment. However, despite its growing po...

  3. Towards Cloud Computing SLA Risk Management: Issues and Challenges

    OpenAIRE

    Morin, Jean-Henry; Aubert, Jocelyn; Gateau, Benjamin

    2012-01-01

    Cloud Computing has become mainstream technology offering a commoditized approach to software, platform and infrastructure as a service over the Internet on a global scale. This raises important new security issues beyond traditional perimeter based approaches. This paper attempts to identify these issues and their corresponding challenges, proposing to use risk and Service Level Agreement (SLA) management as the basis for a service level framework to improve governance, risk and compliance i...

  4. Computer technologies for industrial risk prevention and emergency management

    International Nuclear Information System (INIS)

    Balduccelli, C.; Bologna, S.; Di Costanzo, G.; Vicoli, G.

    1996-07-01

    This document provides an overview about problems related to the engineering of computer based systems for industrial risk prevention and emergency management. Such systems are rather complex and subject to precise reliability and safety requirements. With the evolution of informatic technologies, such systems are becoming to be the means for building protective barriers for reduction of risk associated with plant operations. For giving more generality to this document, and for not concentrating on only a specific plant, the emergency management systems will be dealt with more details than ones for accident prevention. The document is organized in six chapters. Chapter one is an introduction to the problem and to its state of art, with particular emphasis to the aspects of safety requirements definition. Chapter two is an introduction to the problems related to the emergency management and to the training of operators in charge of this task. Chapter three deals in details the topic of the Training Support Systems, in particular about MUSTER (multi-user system for training and evaluation of environmental emergency response) system. Chapter four deals in details the topic of decision support systems, in particular about ISEM (information technology support for emergency management) system. Chapter five illustrates an application of support to the operators of Civil Protection Department for the management of emergencies in the fields of industrial chemical. Chapter six is about a synthesis of the state of art and the future possibilities, identifying some research and development activities more promising for the future

  5. Computer-Aided Nodule Assessment and Risk Yield Risk Management of Adenocarcinoma: The Future of Imaging?

    Science.gov (United States)

    Foley, Finbar; Rajagopalan, Srinivasan; Raghunath, Sushravya M; Boland, Jennifer M; Karwoski, Ronald A; Maldonado, Fabien; Bartholmai, Brian J; Peikert, Tobias

    2016-01-01

    Increased clinical use of chest high-resolution computed tomography results in increased identification of lung adenocarcinomas and persistent subsolid opacities. However, these lesions range from very indolent to extremely aggressive tumors. Clinically relevant diagnostic tools to noninvasively risk stratify and guide individualized management of these lesions are lacking. Research efforts investigating semiquantitative measures to decrease interrater and intrarater variability are emerging, and in some cases steps have been taken to automate this process. However, many such methods currently are still suboptimal, require validation and are not yet clinically applicable. The computer-aided nodule assessment and risk yield software application represents a validated tool for the automated, quantitative, and noninvasive tool for risk stratification of adenocarcinoma lung nodules. Computer-aided nodule assessment and risk yield correlates well with consensus histology and postsurgical patient outcomes, and therefore may help to guide individualized patient management, for example, in identification of nodules amenable to radiological surveillance, or in need of adjunctive therapy. Copyright © 2016 Elsevier Inc. All rights reserved.

  6. Managing Associated Risks in Cloud Computer Applications Abstract

    African Journals Online (AJOL)

    2012-12-01

    Dec 1, 2012 ... Cloud Computing, the long-held dream of computing as a utility, has the potential to transform a .... standard approaches to many of the issues, although simple cut .... collapse; So security and privacy are high priorities for all ...

  7. Risk perception and risk management in cloud computing: results from a case study of Swiss companies

    OpenAIRE

    Brender, Nathalie; Markov, Iliya

    2013-01-01

    In today's economic turmoil, the pay-per-use pricing model of cloud computing, its flexibility and scalability and the potential for better security and availability levels are alluring to both SMEs and large enterprises. However, cloud computing is fraught with security risks which need to be carefully evaluated before any engagement in this area. This article elaborates on the most important risks inherent to the cloud such as information security, regulatory compliance, data location, inve...

  8. Risk management

    OpenAIRE

    Mcmanus, John

    2009-01-01

    Few projects are completed on time, on budget, and to their original requirement or specifications. Focusing on what project managers need to know about risk in the pursuit of delivering projects, Risk Management covers key components of the risk management process and the software development process, as well as best practices for risk identification, risk planning, and risk analysis. The book examines risk planning, risk analysis responses to risk, the tracking and modelling of risks, intel...

  9. Computational methods in the pricing and risk management of modern financial derivatives

    Science.gov (United States)

    Deutsch, Hans-Peter

    1999-09-01

    In the last 20 years modern finance has developed into a complex mathematically challenging field. Very complicated risks exist in financial markets which need very advanced methods to measure and/or model them. The financial instruments invented by the market participants to trade these risk, the so called derivatives are usually even more complicated than the risks themselves and also sometimes generate new riks. Topics like random walks, stochastic differential equations, martingale measures, time series analysis, implied correlations, etc. are of common use in the field. This is why more and more people with a science background, such as physicists, mathematicians, or computer scientists, are entering the field of finance. The measurement and management of all theses risks is the key to the continuing success of banks. This talk gives insight into today's common methods of modern market risk management such as variance-covariance, historical simulation, Monte Carlo, “Greek” ratios, etc., including the statistical concepts on which they are based. Derivatives are at the same time the main reason for and the most effective means of conducting risk management. As such, they stand at the beginning and end of risk management. The valuation of derivatives and structured financial instruments is therefore the prerequisite, the condition sine qua non, for all risk management. This talk introduces some of the important valuation methods used in modern derivatives pricing such as present value, Black-Scholes, binomial trees, Monte Carlo, etc. In summary this talk highlights an area outside physics where there is a lot of interesting work to do, especially for physicists. Or as one of our consultants said: The fascinating thing about this job is that Arthur Andersen hired me not ALTHOUGH I am a physicist but BECAUSE I am a physicist.

  10. Development of a computational system for management of risks in radiosterilization processes of biological tissues

    International Nuclear Information System (INIS)

    Montoya, Cynara Viterbo

    2009-01-01

    Risk management can be understood to be a systematic management which aims to identify record and control the risks of a process. Applying risk management becomes a complex activity, due to the variety of professionals involved. In order to execute risk management the following are requirements of paramount importance: the experience, discernment and judgment of a multidisciplinary team, guided by means of quality tools, so as to provide standardization in the process of investigating the cause and effects of risks and dynamism in obtaining the objective desired, i.e. the reduction and control of the risk. This work aims to develop a computational system of risk management (software) which makes it feasible to diagnose the risks of the processes of radiosterilization of biological tissues. The methodology adopted was action-research, according to which the researcher performs an active role in the establishment of the problems found, in the follow-up and in the evaluation of the actions taken owing to the problems. The scenario of this action-research was the Laboratory of Biological Tissues (LTB) in the Radiation Technology Center IPEN/CNEN-SP - Sao Paulo/Brazil. The software developed was executed in PHP and Flash/MySQL language, the server (hosting), the software is available on the Internet (www.vcrisk.com.br), which the user can access from anywhere by means of the login/access password previously sent by email to the team responsible for the tissue to be analyzed. The software presents friendly navigability whereby the user is directed step-by-step in the process of investigating the risk up to the means of reducing it. The software 'makes' the user comply with the term and present the effectiveness of the actions taken to reduce the risk. Applying this system provided the organization (LTB/CTR/IPEN) with dynamic communication, effective between the members of the multidisciplinary team: a) in decision-making; b) in lessons learned; c) in knowing the new risk

  11. ePORT, NASA's Computer Database Program for System Safety Risk Management Oversight (Electronic Project Online Risk Tool)

    Science.gov (United States)

    Johnson, Paul W.

    2008-01-01

    ePORT (electronic Project Online Risk Tool) provides a systematic approach to using an electronic database program to manage a program/project risk management processes. This presentation will briefly cover the standard risk management procedures, then thoroughly cover NASA's Risk Management tool called ePORT. This electronic Project Online Risk Tool (ePORT) is a web-based risk management program that provides a common framework to capture and manage risks, independent of a programs/projects size and budget. It is used to thoroughly cover the risk management paradigm providing standardized evaluation criterion for common management reporting, ePORT improves Product Line, Center and Corporate Management insight, simplifies program/project manager reporting, and maintains an archive of data for historical reference.

  12. Managing the risk associated with use of contrast media for computed tomography

    Energy Technology Data Exchange (ETDEWEB)

    Stacul, Fulvio [Department of Radiology, University of Trieste, Cattinara Hospital, Strada di Fiume, 447, 34149 Trieste (Italy)]. E-mail: fulvio.stacul@aots.sanita.fvg.it

    2007-05-15

    Contrast agents are widely used in patients undergoing diagnostic and therapeutic imaging procedures. In recent years, there has been a significant increase in the use of iodinated contrast media (CM) due to the growing number of computed tomography (CT) procedures. Although contrast agents are generally well-tolerated, some patient subsets are at an increased risk of complications from CM. Patients at risk include those with a history of adverse reactions to CM, asthma or severe allergies, impaired renal function, older age, dehydration, congestive heart failure, or concurrent use of some drugs. Although the incidence of CM-associated complications cannot be eliminated, the chances of developing severe adverse reactions can be reduced by incorporating a number of management strategies into clinical practice. Patients at risk for acute adverse reactions can undergo pre-medication with corticosteroids, eventually associated with anti-histamines, although opinion is divided whether this prophylaxis should be used with non-ionic CM. Patients who have been identified as at risk for contrast-induced nephropathy (CIN) should be well-hydrated and have nephrotoxic medications withdrawn prior to CM exposure. Contrast dose should be decreased, as the risk of developing CIN is dose-dependent. For patients with pre-existing renal insufficiency, use of low-osmolar or iso-osmolar CM is preferable to use of high-osmolar CM. Simple strategies for preventing the risk of adverse reactions are reviewed.

  13. Managing the risk associated with use of contrast media for computed tomography

    International Nuclear Information System (INIS)

    Stacul, Fulvio

    2007-01-01

    Contrast agents are widely used in patients undergoing diagnostic and therapeutic imaging procedures. In recent years, there has been a significant increase in the use of iodinated contrast media (CM) due to the growing number of computed tomography (CT) procedures. Although contrast agents are generally well-tolerated, some patient subsets are at an increased risk of complications from CM. Patients at risk include those with a history of adverse reactions to CM, asthma or severe allergies, impaired renal function, older age, dehydration, congestive heart failure, or concurrent use of some drugs. Although the incidence of CM-associated complications cannot be eliminated, the chances of developing severe adverse reactions can be reduced by incorporating a number of management strategies into clinical practice. Patients at risk for acute adverse reactions can undergo pre-medication with corticosteroids, eventually associated with anti-histamines, although opinion is divided whether this prophylaxis should be used with non-ionic CM. Patients who have been identified as at risk for contrast-induced nephropathy (CIN) should be well-hydrated and have nephrotoxic medications withdrawn prior to CM exposure. Contrast dose should be decreased, as the risk of developing CIN is dose-dependent. For patients with pre-existing renal insufficiency, use of low-osmolar or iso-osmolar CM is preferable to use of high-osmolar CM. Simple strategies for preventing the risk of adverse reactions are reviewed

  14. Risk management.

    Science.gov (United States)

    Chambers, David W

    2010-01-01

    Every plan contains risk. To proceed without planning some means of managing that risk is to court failure. The basic logic of risk is explained. It consists in identifying a threshold where some corrective action is necessary, the probability of exceeding that threshold, and the attendant cost should the undesired outcome occur. This is the probable cost of failure. Various risk categories in dentistry are identified, including lack of liquidity; poor quality; equipment or procedure failures; employee slips; competitive environments; new regulations; unreliable suppliers, partners, and patients; and threats to one's reputation. It is prudent to make investments in risk management to the extent that the cost of managing the risk is less than the probable loss due to risk failure and when risk management strategies can be matched to type of risk. Four risk management strategies are discussed: insurance, reducing the probability of failure, reducing the costs of failure, and learning. A risk management accounting of the financial meltdown of October 2008 is provided.

  15. Computer security engineering management

    International Nuclear Information System (INIS)

    McDonald, G.W.

    1988-01-01

    For best results, computer security should be engineered into a system during its development rather than being appended later on. This paper addresses the implementation of computer security in eight stages through the life cycle of the system; starting with the definition of security policies and ending with continuing support for the security aspects of the system throughout its operational life cycle. Security policy is addressed relative to successive decomposition of security objectives (through policy, standard, and control stages) into system security requirements. This is followed by a discussion of computer security organization and responsibilities. Next the paper directs itself to analysis and management of security-related risks, followed by discussion of design and development of the system itself. Discussion of security test and evaluation preparations, and approval to operate (certification and accreditation), is followed by discussion of computer security training for users is followed by coverage of life cycle support for the security of the system

  16. Adapting risk management and computational intelligence network optimization techniques to improve traffic throughput and tail risk analysis.

    Science.gov (United States)

    2014-04-01

    Risk management techniques are used to analyze fluctuations in uncontrollable variables and keep those fluctuations from impeding : the core function of a system or business. Examples of this are making sure that volatility in copper and aluminum pri...

  17. Managing risks

    International Nuclear Information System (INIS)

    Nathwani, J.S.

    1993-01-01

    The three principles to guide regulating authorities are: Risks shall be managed to maximize the total expected net benefit to society; The safety benefit to be promoted is quality-adjusted life expectancy; Decisions for the public in regard to health and safety must be open and apply across the entire range of hazards to life and health. Based on the principle that excessive spending on health and safety, or lack of necessary development, may cause poverty and thereby actually decrease (adjusted) life expectancy, the author has developed a Life Product Index which gives comparable results to the Human Development Index promoted by the United Nations Development Program. These two social indicators can be used for purposes such as project evaluation, choosing between alternative technologies, or evaluation of health and safety programs

  18. Brief: Managing computing technology

    International Nuclear Information System (INIS)

    Startzman, R.A.

    1994-01-01

    While computing is applied widely in the production segment of the petroleum industry, its effective application is the primary goal of computing management. Computing technology has changed significantly since the 1950's, when computers first began to influence petroleum technology. The ability to accomplish traditional tasks faster and more economically probably is the most important effect that computing has had on the industry. While speed and lower cost are important, are they enough? Can computing change the basic functions of the industry? When new computing technology is introduced improperly, it can clash with traditional petroleum technology. This paper examines the role of management in merging these technologies

  19. A Cloud Computing Approach to Personal Risk Management: The Open Hazards Group

    Science.gov (United States)

    Graves, W. R.; Holliday, J. R.; Rundle, J. B.

    2010-12-01

    According to the California Earthquake Authority, only about 12% of current California residences are covered by any form of earthquake insurance, down from about 30% in 1996 following the 1994, M6.7 Northridge earthquake. Part of the reason for this decreasing rate of insurance uptake is the high deductible, either 10% or 15% of the value of the structure, and the relatively high cost of the premiums, as much as thousands of dollars per year. The earthquake insurance industry is composed of the CEA, a public-private partnership; modeling companies that produce damage and loss models similar to the FEMA HAZUS model; and financial companies such as the insurance, reinsurance, and investment banking companies in New York, London, the Cayman Islands, Zurich, Dubai, Singapore, and elsewhere. In setting earthquake insurance rates, financial companies rely on models like HAZUS, that calculate on risk and exposure. In California, the process begins with an official earthquake forecast by the Working Group on California Earthquake Probabilities. Modeling companies use these 30 year earthquake probabilities as inputs to their attenuation and damage models to estimate the possible damage factors from scenario earthquakes. Economic loss is then estimated from processes such as structural failure, lost economic activity, demand surge, and fire following the earthquake. Once the potential losses are known, rates can be set so that a target ruin probability of less than 1% or so can be assured. Open Hazards Group was founded with the idea that the global public might be interested in a personal estimate of earthquake risk, computed using data supplied by the public, with models running in a cloud computing environment. These models process data from the ANSS catalog, updated at least daily, to produce rupture forecasts that are backtested with standard Reliability/Attributes and Receiver Operating Characteristic tests, among others. Models for attenuation and structural damage

  20. Risk management

    International Nuclear Information System (INIS)

    Magne, L.

    1999-01-01

    There is always a risk of an accident occurring at a nuclear power plant, however small. The problem lies in estimating the probability of it occurring. The method of probabilistic safety assessment provides this estimate, and by identifying the sources of potential risk, makes it possible to prevent them from occurring. It is not, however, a substitute for other decision-making processes. (author)

  1. NASA's Risk Management System

    Science.gov (United States)

    Perera, Jeevan S.

    2011-01-01

    Leadership is key to success. Phased-approach for implementation of risk management is necessary. Risk management system will be simple, accessible and promote communication of information to all relevant stakeholders for optimal resource allocation and risk mitigation. Risk management should be used by all team members to manage risks -- risk office personnel. Each group is assigned Risk Integrators who are facilitators for effective risk management. Risks will be managed at the lowest-level feasible, elevate only those risks that require coordination or management from above. Risk reporting and communication is an essential element of risk management and will combine both qualitative and quantitative elements. Risk informed decision making should be introduced to all levels of management. Provide necessary checks and balances to insure that risks are caught/identified and dealt with in a timely manner. Many supporting tools, processes & training must be deployed for effective risk management implementation. Process improvement must be included in the risk processes.

  2. Information systems for risk management

    OpenAIRE

    Michael S. Gibson

    1997-01-01

    Risk management information systems are designed to overcome the problem of aggregating data across diverse trading units. The design of an information system depends on the risk measurement methodology that a firm chooses. Inherent in the design of both a risk management information system and a risk measurement methodology is a tradeoff between the accuracy of the resulting measures of risk and the burden of computing them. Technical progress will make this tradeoff more favorable over time...

  3. NASA's Risk Management System

    Science.gov (United States)

    Perera, Jeevan S.

    2013-01-01

    Phased-approach for implementation of risk management is necessary. Risk management system will be simple, accessible and promote communication of information to all relevant stakeholders for optimal resource allocation and risk mitigation. Risk management should be used by all team members to manage risks - not just risk office personnel. Each group/department is assigned Risk Integrators who are facilitators for effective risk management. Risks will be managed at the lowest-level feasible, elevate only those risks that require coordination or management from above. Risk informed decision making should be introduced to all levels of management. ? Provide necessary checks and balances to insure that risks are caught/identified and dealt with in a timely manner. Many supporting tools, processes & training must be deployed for effective risk management implementation. Process improvement must be included in the risk processes.

  4. Enterprise risk management

    Energy Technology Data Exchange (ETDEWEB)

    Eaton, C. [Enbridge, Calgary, AB (Canada)

    2015-07-01

    Enterprise risk management (ERM) is a relative new, holistic and strategic approach for managing risks in modern organizations. ERM builds on and extends traditional risk management (RM). Risk is the effect of uncertainty on objectives - positive and/or negative. Risk management is a set of practices used to understand and address risk. ERM is a form of RM that emphasizes risk aggregation and integration. Risk aggregation is combining individual risks into categories ({sup r}olled up{sup )}. risk integration is embedding RM into organizational contexts ({sup b}uilt in{sup )}.

  5. Project Risk Management

    Science.gov (United States)

    Jr., R. F. Miles

    1995-01-01

    Project risk management is primarily concerned with performance, reliability, cost, and schedule. Environmental risk management is primarily concerned with human health and ecological hazards and likelihoods. This paper discusses project risk management and compares it to environmental risk management, both with respect to goals and implementation. The approach of the Jet Propulsion Laboratory to risk management is presented as an example of a project risk management approach that is an extension to NASA NHB 7120.5: Management of Major System Programs and Projects.

  6. Risk management and safety

    International Nuclear Information System (INIS)

    Niehaus, F.; Novegno, A.

    1985-01-01

    Risk assessment, including probabilistic analyses, has made great progress over the past decade. In spite of the inherent uncertainties it has now become possible to utilize methods and results for decision making at various levels. This paper will, therefore, review risk management in industrial installations, risk management for energy safety policy and prospects of risk management in highly industrialized areas. (orig.) [de

  7. Computer simulation for risk management: Hydrogen refueling stations and water supply of a large region

    DEFF Research Database (Denmark)

    Markert, Frank; Kozine, Igor

    2012-01-01

    in applying DES models to the analysis of large infrastructures for refueling stations and water supply. Two case studies are described which are concerned with the inherently safer supply and storage of hydrogen at refueling stations and an established drinking water supply system of a large metropolitan...... area, respectively. For both, the simulation aims at identifying points of potential improvement from the reliability point of view. This allows setting up a list of activities and safety measures to reduce risk and possible losses and mitigate the consequences of accidents. Based on the cases...

  8. Benchmarking computational fluid dynamics models of lava flow simulation for hazard assessment, forecasting, and risk management

    Science.gov (United States)

    Dietterich, Hannah; Lev, Einat; Chen, Jiangzhi; Richardson, Jacob A.; Cashman, Katharine V.

    2017-01-01

    Numerical simulations of lava flow emplacement are valuable for assessing lava flow hazards, forecasting active flows, designing flow mitigation measures, interpreting past eruptions, and understanding the controls on lava flow behavior. Existing lava flow models vary in simplifying assumptions, physics, dimensionality, and the degree to which they have been validated against analytical solutions, experiments, and natural observations. In order to assess existing models and guide the development of new codes, we conduct a benchmarking study of computational fluid dynamics (CFD) models for lava flow emplacement, including VolcFlow, OpenFOAM, FLOW-3D, COMSOL, and MOLASSES. We model viscous, cooling, and solidifying flows over horizontal planes, sloping surfaces, and into topographic obstacles. We compare model results to physical observations made during well-controlled analogue and molten basalt experiments, and to analytical theory when available. Overall, the models accurately simulate viscous flow with some variability in flow thickness where flows intersect obstacles. OpenFOAM, COMSOL, and FLOW-3D can each reproduce experimental measurements of cooling viscous flows, and OpenFOAM and FLOW-3D simulations with temperature-dependent rheology match results from molten basalt experiments. We assess the goodness-of-fit of the simulation results and the computational cost. Our results guide the selection of numerical simulation codes for different applications, including inferring emplacement conditions of past lava flows, modeling the temporal evolution of ongoing flows during eruption, and probabilistic assessment of lava flow hazard prior to eruption. Finally, we outline potential experiments and desired key observational data from future flows that would extend existing benchmarking data sets.

  9. Risk management at university

    OpenAIRE

    Ivanova, H.; Abramovich, S.

    2013-01-01

    This article observes the basic recommendations for the risk management system in higher education as an example Yanka Kupala State University of Grodno. Consider the risk-management standard that based in a process approach

  10. Management of business risks

    OpenAIRE

    BAZARBAY A.

    2015-01-01

    The article presents methodological ideas concerning the problem of risk management. Special attention is paid to increasing of enterprises' operating efficiency by means of risk-management system development in business organizations.

  11. Rethinking risk management

    International Nuclear Information System (INIS)

    Kloman, H.F.

    1992-01-01

    The purpose of this paper is to bring together the ideas of those who currently practice the many different forms of risk management on a global basis. These forms include guidance of public policy on macro risks, risk financing and insurance for many larger commercial organizations, managing credit, currency and interest rate risks for financial institutions, plus other extensions of risk management including security, quality control, and quality assurance in a health-care environment

  12. Commodity risk management

    Directory of Open Access Journals (Sweden)

    Hilary Till

    2016-09-01

    Full Text Available This article discusses the practical issues involved in applying a disciplined risk management methodology to commodity futures trading. Accordingly, the paper shows how to apply methodologies derived from both conventional asset management and hedge fund management to futures trading. The article also discusses some of the risk management issues that are unique to leveraged futures trading.

  13. Certification and risk management

    International Nuclear Information System (INIS)

    Villanueva Fernandez, M.

    2015-01-01

    Nowadays more organizations are increasingly aware of the importance of properly managing the uncertainty of its activities and build competitive advantages through the identification, assessment and management of risks that they face. Risk management is also an aspect of great importance within the new version of ISO fact it is one of the most innovative and also the most laborious, because an appropriate risk management achieves expected results and customer satisfaction. In conclusion, risk management is a new field of business and can be considered a cross-cutting component for other relevant factors of organizational change management. (Author)

  14. [Global risk management].

    Science.gov (United States)

    Sghaier, W; Hergon, E; Desroches, A

    2015-08-01

    Risk management is a fundamental component of any successful company, whether it is in economic, societal or environmental aspect. Risk management is an especially important activity for companies that optimal security challenge of products and services is great. This is the case especially for the health sector institutions. Risk management is therefore a decision support tool and a means to ensure the sustainability of an organization. In this context, what methods and approaches implemented to manage the risks? Through this state of the art, we are interested in the concept of risk and risk management processes. Then we focus on the different methods of risk management and the criteria for choosing among these methods. Finally we highlight the need to supplement these methods by a systemic and global approach including through risk assessment by the audits. Copyright © 2015 Elsevier Masson SAS. All rights reserved.

  15. Migration goals and risk management in cloud computing: A review of state of the art and survey results on practitioners

    OpenAIRE

    Islam, Shareeful; Fenz, Stefan; Weippl, Edgar; Kalloniatis, Christos

    2016-01-01

    Organizations are now seriously considering adopting cloud into the existing business context, but migrating\\ud data, application and services into cloud doesn’t come without substantial risks. These risks are the significant\\ud barriers for the wider cloud adoption. Cloud computing has obtained a lot of attention by both research and\\ud industry communities in recent years. There are works that consolidate the existing work on cloud migration\\ud and technology. However, there is no secondary...

  16. Agile risk management

    CERN Document Server

    Moran, Alan

    2014-01-01

    This work is the definitive guide for IT managers and agile practitioners. It elucidates the principles of agile risk management and how these relate to individual projects. Explained in clear and concise terms, this synthesis of project risk management and agile techniques is illustrated using the major methodologies such as XP, Scrum and DSDM.Although the agile community frequently cites risk management, research suggests that risk is often narrowly defined and, at best, implicitly treated, which in turn leads to an inability to make informed decisions concerning risk and reward and a poor u

  17. Risk management in Takaful

    OpenAIRE

    Akhter, Waheed

    2010-01-01

    Risk management is of vital importance in Islam and Takāful provides a way to manage risks in business according to Sharī’ah principles. This research paper attempts to identify various types of risks involved in Takāful business that affect operational and investment functions of Takāful operators across the globe. It lays down criteria for Takāful operator to manage those risks effectively. However, Takāful operators often face difficulty in managing market and credit risks as Sharī’ah comp...

  18. Financial Risk Management

    OpenAIRE

    Catalin-Florinel Stanescu; Laurentiu Mircea Simion

    2011-01-01

    Concerns about the financial risk is increasing. In this climate, companies of all types and sizes want a robust framework for financial risk management to meet compliance requirements, contribute to better decision making and increase performance. Financial risk management professionals working with financial institutions and other corporate clients to achieve these objectives.

  19. Cloud computing assessing the risks

    CERN Document Server

    Carstensen, Jared; Golden, Bernard

    2012-01-01

    Cloud Computing: Assessing the risks answers these questions and many more. Using jargon-free language and relevant examples, analogies and diagrams, it is an up-to-date, clear and comprehensive guide the security, governance, risk, and compliance elements of Cloud Computing.

  20. Value of risk management

    OpenAIRE

    Vik, Marie Amdal

    2012-01-01

    Master's thesis in Risk management The overall aim of this study was to discuss the validity of the hypothesis that risk management contributes with added value to projects and the enterprise holding the projects, and consequently to the enterprise’s stakeholders. To examine this hypothesis, a case study of three projects taken from the same portfolio at Statoil was selected. The projects were said to have an active risk management. Data was collected from the project’s documentation as...

  1. Supply Cain Risk Management

    OpenAIRE

    Goodwin, Les

    2011-01-01

    “The management of supply chain risk is crucial to any business, more so to Rolls Royce who face an almost doubling of load within the next 10 years. So what is supply chain risk management and how well is it deployed within an operational business of Rolls Royce? What are the tools and techniques available and what are the key issues around implementing world class supply chain risk management with a Supply Chain Unit within Rolls Royce?”

  2. Supply chain risk management

    OpenAIRE

    Christian Hollstein; Frank Himpel

    2013-01-01

    Background: Supply chain risk management increasingly gains prominence in many international industries. In order to strengthen supply chain structures, processes, and networks, adequate potentials for risk management need to be built (focus on effective logistics) and to be utilized (focus on efficient logistics). Natural-based disasters, such as the case of Fukushima, illustrate how crucial risk management is. Method: By aligning a theoretical-conceptual framework with empirical-induct...

  3. Exchange Risk Management Policy

    CERN Document Server

    2005-01-01

    At the Finance Committee of March 2005, following a comment by the CERN Audit Committee, the Chairman invited the Management to prepare a document on exchange risk management policy. The Finance Committee is invited to take note of this document.

  4. Identifying and Managing Risk.

    Science.gov (United States)

    Abraham, Janice M.

    1999-01-01

    The role of the college or university chief financial officer in institutional risk management is (1) to identify risk (physical, casualty, fiscal, business, reputational, workplace safety, legal liability, employment practices, general liability), (2) to develop a campus plan to reduce and control risk, (3) to transfer risk, and (4) to track and…

  5. Risk management overview

    International Nuclear Information System (INIS)

    McGovern, S.

    1995-01-01

    Launching of the first natural gas contract by the New York Mercantile Exchange (NYMEX) in April 1990 was a huge success which allowed natural gas to surpass crude oil as the most successful launch of any commodity contract. Despite this unprecedented initial success it must be kept in mind that in a competitive marketplace there are risks of many kinds (market risks, price risks, basis risks, currency risks and timing risks), that parties must deal with in everyday operations. The concept of risk management was defined, techniques and issues in risk management were explained, a glossary of fully explained industry terms, and basic financial tools most often used in risk management, were provided. 11 figs

  6. Software And Systems Engineering Risk Management

    Science.gov (United States)

    2010-04-01

    RSKM 2004 COSO Enterprise RSKM Framework 2006 ISO/IEC 16085 Risk Management Process 2008 ISO/IEC 12207 Software Lifecycle Processes 2009 ISO/IEC...1 Software And Systems Engineering Risk Management John Walz VP Technical and Conferences Activities, IEEE Computer Society Vice-Chair Planning...Software & Systems Engineering Standards Committee, IEEE Computer Society US TAG to ISO TMB Risk Management Working Group Systems and Software

  7. Management Needs for Computer Support.

    Science.gov (United States)

    Irby, Alice J.

    University management has many and varied needs for effective computer services in support of their processing and information functions. The challenge for the computer center managers is to better understand these needs and assist in the development of effective and timely solutions. Management needs can range from accounting and payroll to…

  8. Perspectives: Intellectual Risk Management

    Science.gov (United States)

    Hall, James C.

    2013-01-01

    Ask a college administrator about students and risk management, and you're likely to get a quick and agitated speech about alcohol consumption and bad behavior or a meditation on mental health and campus safety. But in colleges and universities, we manage intellectual risk-taking too. Bring that up, and you'll probably get little out of that same…

  9. Risk Management and Simulation

    DEFF Research Database (Denmark)

    Skovmand, David

    2014-01-01

    Review of: Risk Management and Simulation / Aparna Gupta. Boca Raton, FL: CRC Press, 2013, xxix + 491 pp., $99.95(H), ISBN: 978-1-4398-3594-4.......Review of: Risk Management and Simulation / Aparna Gupta. Boca Raton, FL: CRC Press, 2013, xxix + 491 pp., $99.95(H), ISBN: 978-1-4398-3594-4....

  10. Agricultural risk management

    DEFF Research Database (Denmark)

    Lund, Mogens; Oksen, Arne; Larsen, Torben U.

    2005-01-01

    A new model for risk management in agriculture is described in the paper. The risk model is constructed as a context dependent process, which includes four main phases. The model is aimed at agricultural advisors, who wish to facilitate and disseminate risk management to farmers. It is developed...... and tested by an action research approach in an attempt to make risk management more applicable on family farms. Our obtained experiences indicate that farmers don’t apply probabilistic thinking and other concepts according to formal decision theory....

  11. Risk management for whales

    OpenAIRE

    Cont, R; Wagalath, L

    2016-01-01

    We propose framework for modeling portfolio risk which integrates market risk with liquidation costs which may arise in stress scenarios. Our model provides a systematic method for computing liquidation-adjusted risk measures for a portfolio. Calculation of Liquidation-adjusted VaR (LVaR) for sample portfolios reveals a substantial impact of liquidation costs on portfolio risk for portfolios with large concentrated positions.

  12. The management object in risk management approaches

    OpenAIRE

    Christiansen, Ulrik

    2013-01-01

    Using a systematic review of the last 55 years of research within risk management this paper explores how risk management as a management technology (methodologies, tools and frameworks to mitigate or manage risks) singles out risks as an object for management in order to make action possible. The paper synthesise by developing a framework of how different views on risk management enable and constrain the knowledge about risk and thus frame the possibilities to measure, analyse an...

  13. Individual Property Risk Management

    Directory of Open Access Journals (Sweden)

    Michael S. Finke

    2010-01-01

    Full Text Available This paper reviews household property risk management and estimates normatively optimal choice under theoretical assumptions. Although risk retention limits are common in the financial planning industry, estimates of optimal risk retention that include both financial and human wealth far exceed limits commonly recommended. Households appear to frame property losses differently from other wealth losses leading to wealth-reducing, excess risk transfer. Possible theoretical explanations for excess sensitivity to loss are reviewed. Differences between observed and optimal risk management imply a large potential gain from improved choice.

  14. Optimizing risk management

    International Nuclear Information System (INIS)

    Kindred, G.W.

    2000-01-01

    Commercial nuclear power plant management is focussed on the safe, efficient, economical production of electricity. To accomplish the safe aspect of the equation, risk must be determined for the operation and maintenance of the facility. To accomplish the efficient aspect of the equation, management must understand those risks and factor risk insights into their decision process. The final piece of the equation is economical which is accomplished by minimizing, plant outage durations and proper utilization of resources. Probabilistic Risk Assessment can provide the risk insights to accomplish all three; safety, efficiency, and economically. How? Safe production of electricity can be quantified by use of PRA modeling and other risk insights that can determine the core damage frequency. Efficient production of electricity can be influenced by providing management with quantified risk insights for use in decision making. And, one example of economical production of electricity is by not having over conservative deterministic based defense in depth approaches to system maintenance and availability. By using risk-informed insights nuclear safety can be quantified and risk can be managed. Confidence in this approach can be achieved by ensuring the content and quality of the PRA is standardized throughout the industry. The time has arrived for Probabilistic Risk Assessment to take an active position as a major role player in the safe, efficient, and economical operation of commercial nuclear power plants. (author)

  15. Internal Audit and Risk Management

    OpenAIRE

    Constantin Nicolae Vasile; Alexandru Georgiana

    2011-01-01

    Internal audit and risk management have the same goal: the control of risk. There are various roles for the internal audit in respect of risk management. The main limitations of internal audit in respect of risk management regards assuming risk management tasks. One of the main issues regarding risk management is to make sure that the key risks are taken into consideration and that the management and the board of the organization take action as needed. Internal audit could give advice to mana...

  16. Risk Management Plan Rule

    Science.gov (United States)

    RMP implements Section 112(r) of the 1990 Clean Air Act amendments, and requires facilities that use extremely hazardous substances to develop a Risk Management Plan and revise/resubmit every five years. Find guidance, factsheets, training, and assistance.

  17. Making Risk Management Strategic

    DEFF Research Database (Denmark)

    Sax, Johanna; Andersen, Torben Juul

    2018-01-01

    Enterprise risk management (ERM) is an established management practice and is increasing in prominence as more firms spend substantial resources implementing ERM frameworks, partially induced by regulatory requirements. Yet, there is a lack of knowledge as to whether such frameworks add value and...... outcomes. The study develops a new multidimensional measure of adherence to ERM practices where earlier studies typically have relied on dichotomous proxies. We discuss the implications of these findings for ERM practice and strategic management in general....

  18. Computer software configuration management

    International Nuclear Information System (INIS)

    Pelletier, G.

    1987-08-01

    This report reviews the basic elements of software configuration management (SCM) as defined by military and industry standards. Several software configuration management standards are evaluated given the requirements of the nuclear industry. A survey is included of available automated tools for supporting SCM activities. Some information is given on the experience of establishing and using SCM plans of other organizations that manage critical software. The report concludes with recommendations of practices that would be most appropriate for the nuclear power industry in Canada

  19. Governmental management of chemical risk

    International Nuclear Information System (INIS)

    Zimmerman, R.

    1990-01-01

    This book is organized under the following headings: risk management in the government context; legal and regulatory decrees and directives for managing chemical risk; incentive-based approaches for regulating risk; risk management in the federal system; and traditional approaches and new initiatives for managing chemical risk

  20. Risk management versus incentives

    International Nuclear Information System (INIS)

    Aven, E.; Lovas, K.; Osmundsen, P.

    2006-01-01

    Portfolio theory indicates that risk management should take place at the group level. Hedging at the project level or in the individual business areas may lead to suboptimal results. However, the efficiency of a profit centre depends on its management's being able to influence factors that are crucial to the unit's financial results. Price hedging could be one such factor. In the wider perspective, this constitutes part of the balancing between centralisation and decentralisation. This article covers important elements of risk management and incentive design. It goes on to discuss the balancing of overall risk management at the group level and incentive design in profit centres and corporate units. Throughout the article, the oil industry serves as a case. (author)

  1. Computer technologies for industrial risk prevention and emergency management; Tecnologie informatiche per la prevenzione dei rischi industriali e la gestione delle emergenze

    Energy Technology Data Exchange (ETDEWEB)

    Balducelli, C; Bologna, S; Di Costanzo, G; Vicoli, G [ENEA, Centro Ricerche Casaccia, Rome (Italy). Dip. Energia

    1996-07-01

    This document provides an overview about problems related to the engineering of computer based systems for industrial risk prevention and emergency management. Such systems are rather complex and subject to precise reliability and safety requirements. With the evolution of information technologies, such systems are becoming to be the means for building protective barriers for reduction of risk associated with plant operations. For giving more generality to this document, and for not concentrating on only a specific plant, the emergency management systems will be dealt with more details than ones for accident prevention. The document is organized in six chapters. Chapter one is an introduction to the problem and to its state of art, with particular emphasis to the aspects of safety requirements definition. Chapter two is an introduction to the problems related to the emergency management and to the training of operators in charge of this task. Chapter three deals in details the topic of the Training Support Systems, in particular about MUSTER (multi-user system for training and evaluation of environmental emergency response) system. Chapter four deals in details the topic of decision support systems, in particular about ISEM (information technology support for emergency management) system. Chapter five illustrates an application of support to the operators of Civil Protection Department for the management of emergencies in the fields of industrial chemical. Chapter six is about a synthesis of the state of art and the future possibilities, identifying some research and development activities more promising for the future.

  2. Risk management guide

    International Nuclear Information System (INIS)

    Briscoe, G.J.

    1977-06-01

    Risk management requires an assessment or a knowledge of risk. This, in turn, requires identification of hazards (sources of risk) and a determination of risk (evaluation of the hazard degree). The hazard identification and risk analysis techniques presented in this Guide are, in general, based on the MORT concept that accidents result from unwanted energy flow in the absence of adequate controls and/or barriers. This Guide presents an analytical tree designed to prevent oversight of specific energy sources in risk identification. Hazard identification by field personnel is also discussed. Quantitative risk analysis is discussed in the following section. A method for summary of the risks for each energy classification is given. This method uses a graphical log-normal projection so that low probability events, which are not adequately represented in the experience data, are included in the risk assessment. This permits a more acceptable risk assessment since catastrophes are not ignored, even though the actual risk is only approximated. In addition, a few examples of risk analysis of specific hazards are given. Rudimentary probability and fault tree theory are used in these examples. Total risk assessment and resource allocation and safety performance trend analysis are discussed

  3. Managing Risk and Opportunity

    DEFF Research Database (Denmark)

    Andersen, Torben Juul; Garvey, Maxine; Roggi, Oliviero

    outcomes. This topic is timely and of interest both to the academic community as well as to practicing managers, executives, and directors. The volume focuses on contemporary risk leadership issues based on recent research insights but avoids excessive technical language and mathematical formulas. The book...... is framed around the challenges imposed on executives and directors in dealing with an increasingly complex and unpredictable world. This requires a new risk leadership focus that not only avoids the downside risks but also considers ways to exploit the upside potential offered by a dynamic environment....... The underlying logic is built on the principles of financial economics where benefits derive from reducing bankruptcy costs and increasing future cash inflows. This provides a stringent framework for analyzing the effect of different risk management actions and behaviors in effective risk-taking organizations...

  4. Air quality risk management.

    Science.gov (United States)

    Williams, Martin L

    2008-01-01

    Rather than attempt to provide a comprehensive account of air quality risk assessment, as might be found in a textbook or manual, this article discusses some issues that are of current importance in the United Kingdom and the rest of Europe, with special emphasis on risk assessment in the context of policy formulation, and emerging scientific knowledge. There are two pollutants of particular concern and that both pose challenges for risk assessment and policy, and they are particulate matter (PM) and ozone. The article describes some issues for health risk assessment and finally some forward-looking suggestions for future approaches to air quality management.

  5. Managing power risk

    International Nuclear Information System (INIS)

    Rudd, D.C.

    1999-01-01

    Issues regarding the management of financial risks in the electric power market were discussed. The nature of the risk was defined for electricity producers, local utilities, traders/dealers, and brokers, each of which are exposed to different types of risks with the exception of credit risk, which is common to all. The main features of options, swaps, CFDs, bilateral financial contracts, futures contracts and the terms of the NYMEX electricity contract were outlined. Basic derivative strategies, the role of the broker, the elements of emissions trading, and trading strategies for consumers were also explained. 3 fig

  6. Volunteered Cloud Computing for Disaster Management

    Science.gov (United States)

    Evans, J. D.; Hao, W.; Chettri, S. R.

    2014-12-01

    Disaster management relies increasingly on interpreting earth observations and running numerical models; which require significant computing capacity - usually on short notice and at irregular intervals. Peak computing demand during event detection, hazard assessment, or incident response may exceed agency budgets; however some of it can be met through volunteered computing, which distributes subtasks to participating computers via the Internet. This approach has enabled large projects in mathematics, basic science, and climate research to harness the slack computing capacity of thousands of desktop computers. This capacity is likely to diminish as desktops give way to battery-powered mobile devices (laptops, smartphones, tablets) in the consumer market; but as cloud computing becomes commonplace, it may offer significant slack capacity -- if its users are given an easy, trustworthy mechanism for participating. Such a "volunteered cloud computing" mechanism would also offer several advantages over traditional volunteered computing: tasks distributed within a cloud have fewer bandwidth limitations; granular billing mechanisms allow small slices of "interstitial" computing at no marginal cost; and virtual storage volumes allow in-depth, reversible machine reconfiguration. Volunteered cloud computing is especially suitable for "embarrassingly parallel" tasks, including ones requiring large data volumes: examples in disaster management include near-real-time image interpretation, pattern / trend detection, or large model ensembles. In the context of a major disaster, we estimate that cloud users (if suitably informed) might volunteer hundreds to thousands of CPU cores across a large provider such as Amazon Web Services. To explore this potential, we are building a volunteered cloud computing platform and targeting it to a disaster management context. Using a lightweight, fault-tolerant network protocol, this platform helps cloud users join parallel computing projects

  7. Management of radiation risk

    International Nuclear Information System (INIS)

    Hubert, P.

    1996-01-01

    The need to control the risk from ionizing radiation can be tracked back to the eve of the twentieth century. However, as knowledge improved and practices expanded, the approaches to this control have evolved. No longer is the mere respect of some forms of exposure limits or safety related standards sufficient. Rather, it is widely admitted that there is a need for managing radiation risk, both by balancing the advantages and disadvantages of enhancing protection and by setting up a proper organization that allows handling of the risk. This paper describes the multiple aspects of radiation risk management and points out the main related issues. It critically analyzes ALARA and ICRP recommendations. 74 refs, 8 figs, 5 tabs

  8. Managing Chemical & Material Risks

    Science.gov (United States)

    2011-12-01

    Certification Program Acquisition, Technology and Logistics 9 DoD Hexavalent Chromium Risk Reduction Non- Chrome Primer II EXAVAJ ENT CHROM lrUMI...Royal Demolition eXplosive (RDX) • Cyclotrimethylenetrinitramine  Hexavalent Chromium (Cr6+) Naphthalene …pending downgrade to watch list Beryllium...T1me (secondo) 700 Acquisition, Technology and Logistics 10 Hexavalent Chromium Risk Management Actions • DoD minimization policy signed April

  9. Managing risk at Hanford

    International Nuclear Information System (INIS)

    Hesser, W.A.; Stillwell, W.G.; Rutherford, W.A.

    1994-01-01

    Clearly, there is sufficient motivation from Washington for the Hanford community to pay particular attention to the risks associated with the substantial volumes of radiological, hazardous, and mixed waste at Hanford. But there is also another reason for emphasizing risk: Hanford leaders have come to realize that their decisions must consider risk and risk reduction if those decisions are to be technically sound, financially affordable, and publicly acceptable. The 560-square miles of desert land is worth only a few thousand dollars an acre (if that) -- hardly enough to justify the almost two billion dollars that will be spent at Hanford this year. The benefit of cleaning up the Hanford Site is not the land but the reduction of potential risk to the public and the environment for future generations. If risk reduction is our ultimate goal, decisions about priority of effort and resource allocation must consider those risks, now and in the future. The purpose of this paper is to describe how Hanford is addressing the issues of risk assessment, risk management, and risk-based decision making and to share some of our experiences in these areas

  10. Investigation of risk management auditing

    International Nuclear Information System (INIS)

    Cao Lu

    2012-01-01

    2004, COSO published 'Enterprise Risk Management Framework', 2009, SASAC issued the 'central enterprise-wide risk management guidelines' to promote risk management within the formal state-owned enterprises in medium and large. Nuclear Group, which risk management in all branches to carry out the project homeopathic, and A Ⅱ will carry out risk management program as the first unit has accumulated more experience. This article from the perspective of internal control, based on the company's risk management practices carried out to try for the nuclear power enterprise risk management audit to describe and propose new ideas. Which expounds the significance of risk management, audit, risk management audit of the ways and means, for practical application of risk management audit of a representative summary of the issues and the ways and means to solve the problem of forward-looking recommendations. (authors)

  11. Managing Risk and Opportunity

    DEFF Research Database (Denmark)

    Andersen, Torben Juul; Garvey, Maxine; Roggi, Oliviero

    outcomes. This topic is timely and of interest both to the academic community as well as to practicing managers, executives, and directors. The volume focuses on contemporary risk leadership issues based on recent research insights but avoids excessive technical language and mathematical formulas. The book...... is framed around the challenges imposed on executives and directors in dealing with an increasingly complex and unpredictable world. This requires a new risk leadership focus that not only avoids the downside risks but also considers ways to exploit the upside potential offered by a dynamic environment...

  12. Risk management in customs control

    OpenAIRE

    Drobot, Elena; Klevleeva, Aziza

    2016-01-01

    The particularities of risk-management system implementation within customs control are discussed in the article. The authors single out the elements of risk-management system, evaluate effectiveness of risk-management in customs control. The main reasons for non-implementation of risk-management system in customs control are described, as well. Particular attention is paid to the benefits of customs risk management.

  13. Risk management in nuclear projects

    International Nuclear Information System (INIS)

    Salles, Claudio J.R.

    2002-01-01

    The risk management will be defined by different aspects: danger or loss possibility, or responsibility for damage. The risk management is one stage of project management. The risk management is a continuous process of planning, identification, quantification, answer and risk control to maximize the success potential of activity. The reduction of risk is part of priority establishment. This work will indicate how introduce this important instrument in the management of nuclear projects. (author)

  14. The Management Object in Risk Management Approaches

    DEFF Research Database (Denmark)

    Christiansen, Ulrik

    Using a systematic review of the last 55 years of research within risk management this paper explores how risk management as a management technology (methodologies, tools and frameworks to mitigate or manage risks) singles out risks as an object for management in order to make action possible....... The paper synthesise by developing a framework of how different views on risk management enable and constrain the knowledge about risk and thus frame the possibilities to measure, analyse and calculate uncertainty and risk. Inspired by social studies of finance and accounting, the paper finally develops...... three propositions that illustrate how the framing of risk establishes a boundary for how managers might understand value creation and the possible future and how this impacts the possible responses to risk....

  15. Continuous Risk Management: An Overview

    Science.gov (United States)

    Rosenberg, Linda; Hammer, Theodore F.

    1999-01-01

    Software risk management is important because it helps avoid disasters, rework, and overkill, but more importantly because it stimulates win-win situations. The objectives of software risk management are to identify, address, and eliminate software risk items before they become threats to success or major sources of rework. In general, good project managers are also good managers of risk. It makes good business sense for all software development projects to incorporate risk management as part of project management. The Software Assurance Technology Center (SATC) at NASA GSFC has been tasked with the responsibility for developing and teaching a systems level course for risk management that provides information on how to implement risk management. The course was developed in conjunction with the Software Engineering Institute at Carnegie Mellon University, then tailored to the NASA systems community. This is an introductory tutorial to continuous risk management based on this course. The rational for continuous risk management and how it is incorporated into project management are discussed. The risk management structure of six functions is discussed in sufficient depth for managers to understand what is involved in risk management and how it is implemented. These functions include: (1) Identify the risks in a specific format; (2) Analyze the risk probability, impact/severity, and timeframe; (3) Plan the approach; (4) Track the risk through data compilation and analysis; (5) Control and monitor the risk; (6) Communicate and document the process and decisions.

  16. Smart Grid Risk Management

    Science.gov (United States)

    Abad Lopez, Carlos Adrian

    Current electricity infrastructure is being stressed from several directions -- high demand, unreliable supply, extreme weather conditions, accidents, among others. Infrastructure planners have, traditionally, focused on only the cost of the system; today, resilience and sustainability are increasingly becoming more important. In this dissertation, we develop computational tools for efficiently managing electricity resources to help create a more reliable and sustainable electrical grid. The tools we present in this work will help electric utilities coordinate demand to allow the smooth and large scale integration of renewable sources of energy into traditional grids, as well as provide infrastructure planners and operators in developing countries a framework for making informed planning and control decisions in the presence of uncertainty. Demand-side management is considered as the most viable solution for maintaining grid stability as generation from intermittent renewable sources increases. Demand-side management, particularly demand response (DR) programs that attempt to alter the energy consumption of customers either by using price-based incentives or up-front power interruption contracts, is more cost-effective and sustainable in addressing short-term supply-demand imbalances when compared with the alternative that involves increasing fossil fuel-based fast spinning reserves. An essential step in compensating participating customers and benchmarking the effectiveness of DR programs is to be able to independently detect the load reduction from observed meter data. Electric utilities implementing automated DR programs through direct load control switches are also interested in detecting the reduction in demand to efficiently pinpoint non-functioning devices to reduce maintenance costs. We develop sparse optimization methods for detecting a small change in the demand for electricity of a customer in response to a price change or signal from the utility

  17. Information Risk Management and Resilience

    Science.gov (United States)

    Dynes, Scott

    Are the levels of information risk management efforts within and between firms correlated with the resilience of the firms to information disruptions? This paper examines the question by considering the results of field studies of information risk management practices at organizations and in supply chains. The organizations investigated differ greatly in the degree of coupling from a general and information risk management standpoint, as well as in the levels of internal awareness and activity regarding information risk management. The comparison of the levels of information risk management in the firms and their actual or inferred resilience indicates that a formal information risk management approach is not necessary for resilience in certain sectors.

  18. Nuclear risk management

    International Nuclear Information System (INIS)

    2001-01-01

    This paper gives the list of contributions to Eurosafe 2001 which was organised around two round tables on the first day and five seminars on the second day. The first round table dealt with the technical, organisational and societal aspects of risk management aimed at the prevention of accidents in nuclear power plants. The second round table focused on radiological risks from the normal operation of nuclear installations. Special consideration has been given to the involvement of stakeholders. The five seminars were held in order to provide opportunities for comparing experiences and learning about recent activities of IRSN, GRS and their partners in the European Union and Eastern Europe: - Safety assessment and analysis of nuclear installations; -Nuclear safety research; -Environment and radiation protection; - Waste management; - Nuclear material security. (author)

  19. Nuclear risk management

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-07-01

    This paper gives the list of contributions to Eurosafe 2001 which was organised around two round tables on the first day and five seminars on the second day. The first round table dealt with the technical, organisational and societal aspects of risk management aimed at the prevention of accidents in nuclear power plants. The second round table focused on radiological risks from the normal operation of nuclear installations. Special consideration has been given to the involvement of stakeholders. The five seminars were held in order to provide opportunities for comparing experiences and learning about recent activities of IRSN, GRS and their partners in the European Union and Eastern Europe: - Safety assessment and analysis of nuclear installations; -Nuclear safety research; -Environment and radiation protection; - Waste management; - Nuclear material security. (author)

  20. Credit risk management in banks

    OpenAIRE

    Pětníková, Tereza

    2014-01-01

    The subject of this diploma thesis is managing credit risk in banks, as the most significant risk faced by banks. The aim of this work is to define the basic techniques, tools and methods that are used by banks to manage credit risk. The first part of this work focuses on defining these procedures and describes the entire process of credit risk management, from the definition of credit risk, describing credit strategy and policy, organizational structure, defining the most used credit risk mi...

  1. Current Chemical Risk Management Activities

    Science.gov (United States)

    EPA's existing chemicals programs address pollution prevention, risk assessment, hazard and exposure assessment and/or characterization, and risk management for chemicals substances in commercial use.

  2. Managing Complex Environmental Risks

    Energy Technology Data Exchange (ETDEWEB)

    Karlsson, Mikael [Karlstad Univ. (Sweden). Dept. of Environmental Sciences

    2006-09-15

    Environmental and public health risks are often handled in a process in which experts, and sometimes policy makers, try their best to quantitatively assess, evaluate and manage risks. This approach harmonises with mainstream interpretations of sustainable development, which aim at defining a desirable relationship between human and natural systems, for instance by policies that define limit values of different forms of disturbances. However, under conditions of high scientific incertitude, diverging values and distrust, this approach is far from satisfactory. The use of cell phones, hazardous chemicals, nuclear or fossil energy systems, and modern biotechnology are examples of activities causing such risks with high complexity. Against this background, a complementary interpretation of the concept of sustainable development is suggested. This interpretation is operationalised through new formulations of three common principles for public risk management; the precautionary principle, the polluter pays principle and the principle of public participation. Implementation of these reformulated principles would challenge some foundations of present mainstream views on environmental decision-making, but would on the other hand contribute to improved practices for long-term human welfare and planetary survival (full text of contribution)

  3. Managing Complex Environmental Risks

    International Nuclear Information System (INIS)

    Karlsson, Mikael

    2006-01-01

    Environmental and public health risks are often handled in a process in which experts, and sometimes policy makers, try their best to quantitatively assess, evaluate and manage risks. This approach harmonises with mainstream interpretations of sustainable development, which aim at defining a desirable relationship between human and natural systems, for instance by policies that define limit values of different forms of disturbances. However, under conditions of high scientific incertitude, diverging values and distrust, this approach is far from satisfactory. The use of cell phones, hazardous chemicals, nuclear or fossil energy systems, and modern biotechnology are examples of activities causing such risks with high complexity. Against this background, a complementary interpretation of the concept of sustainable development is suggested. This interpretation is operationalised through new formulations of three common principles for public risk management; the precautionary principle, the polluter pays principle and the principle of public participation. Implementation of these reformulated principles would challenge some foundations of present mainstream views on environmental decision-making, but would on the other hand contribute to improved practices for long-term human welfare and planetary survival (full text of contribution)

  4. RI management by personal computer

    International Nuclear Information System (INIS)

    Ono, Isamu; Hiyoshi, Katsunori; Ono, Kazuhiko; Morimitsu, Wataru

    1983-01-01

    For RI-handling facilities up to medium scale, it has been studied whether a personal computer is applicable to the practical management of radioisotopes. In the present system, the number of writing in mini floppy disks is 1280 articles per diskette, which is the sufficient capacity for a storage medium for one year in variety of books. The correction of radioactivity decay as well as various totalizations can be made easily, so that the state of RI storage and use for the whole RI-handling facility can be grasped. Further, by the improvement of the output formats, the transfer to the books as obligated to write is possible. From the above reason, a personal computer is practically applicable with the management system and also leads to labor saving in RI management personnel. (Mori, K.)

  5. CEA - 2014 risk management assessment

    International Nuclear Information System (INIS)

    Bonnevie, Edwige; Verwaerde, Daniel; Maillot, Bernard

    2015-06-01

    After introducing presentations of CEA managers in charge of risk management and controls, this document presents and comments the actions undertaken by the CEA and the obtained results in terms of risk management in different fields: protection and control of the environment, installation safety, health, safety and radiation protection, transport of hazardous materials, waste management, protection of sites, installations and heritage, management of emergency situations, management of legal risks, internal audits and controls. Other topics are addressed like the presentation of the risk management department, and the role of the CEA in the relationship between research and industry

  6. CEA: risk management assessment 2011

    International Nuclear Information System (INIS)

    Bigot, Bernard; Bonnevie, Edwige; Maillot, Bernard

    2012-01-01

    This report proposes a qualitative and quantitative overview of CEA activities in the field of risk management during 2011. These activities concerned the impact on the environment, the safety of installations, the management of professional risks (safety and health at work), the radiological protection of workers, the transports of hazardous materials, waste management, protection of sites, installations and heritage, the management of emergency situations, the management of law risks, controls and audits

  7. Risk Management in Cocurricular Activities.

    Science.gov (United States)

    Webb, Edward M.

    1988-01-01

    Discusses risk management for colleges' cocurricular activities. Discusses tort liability, contributory negligence, and assumption of risk. Provides six concrete steps for managing risks responsibly and professionally: adopting an educational mission statement, assigning risk to others, establishing safety standards, training club advisors,…

  8. Managing Corruption Risks

    DEFF Research Database (Denmark)

    Krause Hansen, Hans

    2011-01-01

    This article investigates the emerging engagement of private actors and specifically Western corporations in international anti-corruption, drawing on Foucauldian studies of governmentality. It explores this engagement as governing practices that have emanated quite independently from the inter......-state system commonly understood to be at the core of the anti-corruption regime. It demonstrates how corporate anti-corruption ties in with a relatively new way of perceiving corruption. In this framing, anti-corruption comes out as risk management, which is latched on to notions of corporate social...... responsibility and business ethics. Moreover, the constitution of corruption risk relates to the rise of new actors and networks engaged in a wider business of anti-corruption, including commercial and hybrid actors that supply corporations with managerial instruments, benchmarks for best practice, rankings...

  9. INTERNAL AUDIT AND RISK MANAGEMENT

    OpenAIRE

    Elena RUSE; Georgiana SUSMANSCHI (BADEA); Daniel DĂNECI-PĂTRĂU

    2014-01-01

    The existence of risk in economic activity can not be denied. In fact, the risk is a concept which exists in every activity, the term of risk being identified with uncertainty, respectively the (un)chance to produce an undesirable event. Internal audit and risk management aim at the same goal, namely the control of risks. Internal Audit performs several roles in risk management plan. The objectives of the internal audit function varies from company to company, but in all economic entities int...

  10. Managing Climate Change Risks

    Energy Technology Data Exchange (ETDEWEB)

    Jones, R. [CSIRO Atmospheric Research, PMB1 Aspendale, Victoria 3195 (Australia)

    2003-07-01

    Issues of uncertainty, scale and delay between action and response mean that 'dangerous' climate change is best managed within a risk assessment framework that evolves as new information is gathered. Risk can be broadly defined as the combination of likelihood and consequence; the latter measured as vulnerability to greenhouse-induced climate change. The most robust way to assess climate change damages in a probabilistic framework is as the likelihood of critical threshold exceedance. Because vulnerability is dominated by local factors, global vulnerability is the aggregation of many local impacts being forced beyond their coping ranges. Several case studies, generic sea level rise and temperature, coral bleaching on the Great Barrier Reef and water supply in an Australian catchment, are used to show how local risk assessments can be assessed then expressed as a function of global warming. Impacts treated thus can be aggregated to assess global risks consistent with Article 2 of the UNFCCC. A 'proof of concept' example is then used to show how the stabilisation of greenhouse gases can constrain the likelihood of exceeding critical thresholds at both the both local and global scale. This analysis suggests that even if the costs of reducing greenhouse gas emissions and the benefits of avoiding climate damages can be estimated, the likelihood of being able to meet a cost-benefit target is limited by both physical and socio-economic uncertainties. In terms of managing climate change risks, adaptation will be most effective at reducing vulnerability likely to occur at low levels of warming. Successive efforts to mitigate greenhouse gases will reduce the likelihood of reaching levels of global warming from the top down, with the highest potential temperatures being avoided first, irrespective of contributing scientific uncertainties. This implies that the first cuts in emissions will always produce the largest economic benefits in terms of avoided

  11. Communicating Risk to Program Managers

    Science.gov (United States)

    Shivers, C. Herbert

    2005-01-01

    Program Managers (PM) can protect program resources and improve chances of success by anticipating, understanding and managing risks. Understanding the range of potential risks helps one to avoid or manage the risks. A PM must choose which risks to accept to reduce fire fighting, must meet the expectations of stakeholders consistently, and avoid falling into costly "black holes" that may open. A good risk management process provides the PM more confidence to seize opportunities save money, meet schedule, even improve relationships with people important to the program. Evidence of managing risk and sound internal controls can mean better support from superiors for the program by building a trust and reputation from being on top of issues. Risk managers have an obligation to provide the PM with the best information possible to allow the benefits to be realized (Small Business Consortium, 2004). The Institute for Chartered Accountants in England and Wales sees very important benefits for companies in providing better information about what they do to assess and manage key business risks. Such information will: a) provide practical forward-looking information; b) reduce the cost of capital; c) encourage better risk management; and d) improve accountability for stewardship, investor protection and the usefulness of financial reporting. We are particularly convinced that enhanced risk reporting will help listed companies obtain capital at the lowest possible cost (The Institute of Chartered Accountants in England &Wales, June 2002). Risk managers can take a significant role in quantifying the success of their department and communicating those figures to executive (program) management levels while pushing for a broader risk management role. Overall, risk managers must show that risk management work matters in the most crucial place-the bottom line- as they prove risk management can be a profit center (Sullivan, 2004).

  12. Managing information technology security risk

    Science.gov (United States)

    Gilliam, David

    2003-01-01

    Information Technology (IT) Security Risk Management is a critical task for the organization to protect against the loss of confidentiality, integrity and availability of IT resources. As systems bgecome more complex and diverse and and attacks from intrusions and malicious content increase, it is becoming increasingly difficult to manage IT security risk. This paper describes a two-pronged approach in addressing IT security risk and risk management in the organization: 1) an institutional enterprise appraoch, and 2) a project life cycle approach.

  13. Practical Methods for Information Security Risk Management

    Directory of Open Access Journals (Sweden)

    Cristian AMANCEI

    2011-01-01

    Full Text Available The purpose of this paper is to present some directions to perform the risk man-agement for information security. The article follows to practical methods through question-naire that asses the internal control, and through evaluation based on existing controls as part of vulnerability assessment. The methods presented contains all the key elements that concurs in risk management, through the elements proposed for evaluation questionnaire, list of threats, resource classification and evaluation, correlation between risks and controls and residual risk computation.

  14. Credit derivatives and risk management

    OpenAIRE

    Michael S. Gibson

    2007-01-01

    The striking growth of credit derivatives suggests that market participants find them to be useful tools for risk management. I illustrate the value of credit derivatives with three examples. A commercial bank can use credit derivatives to manage the risk of its loan portfolio. An investment bank can use credit derivatives to manage the risks it incurs when underwriting securities. An investor, such as an insurance company, asset manager, or hedge fund, can use credit derivatives to align its...

  15. The Key to Risk Management: Management

    OpenAIRE

    Adrian E. Tschoegl

    2000-01-01

    The Barings, Daiwa Bank and Sumitomo Corp. financial debacles in the mid-1990s suggest that management failures rather than misfortune, errors, or complexity are a major source of the risk of financial debacles. These errors are systematic and are a concommittant of the structure of trading and of human nature. Risk management systems must take these facts into account.

  16. Risk Management in Insurance Companies

    OpenAIRE

    Yang, Xufeng

    2006-01-01

    Insurance is the uncertain business in uncertain society. Today, insures face more complex and difficult risks. Efficient risk management mechanisms are essential for the insurers. The paper is set out initially to explore UK insurance companies risk management and risk disclosure by examining companies annual report after all the listed insurance companies are required to disclose risk information in their annual report, which seeks to reflect the recent development in UK insurance companies...

  17. Framework for systematic risk management

    International Nuclear Information System (INIS)

    Knief, R.A.; Mahn, J.A.; Briant, V.S.; Lee, R.B.; Long, R.L.

    1991-01-01

    The first paper of the Symposium described GPU Nuclear's Risk Management Group (RMG) and the use of literature search and interviews in a extensive study of risk management. One of the most important goals of the study was to identify comprehensive approaches to managing risk in the nuclear and major high-technology industries. This paper discusses RMG's multi-step generic risk-management process consisting of the following steps to: identify hazards; screen hazards and identify preventive actions, including costs; evaluate hazards for severity, probable frequency, and cost of preventive actions; prioritize preventive actions (preference to high risk and low cost); implement preventive actions; monitor and provide feedback

  18. Trends in risk management in nuclear industry

    International Nuclear Information System (INIS)

    Kim, Inn Seock

    1996-01-01

    Safety management may be classified into three dimensions: risk management, accident management, and emergency management. This paper addresses the recent trends of safety management in nuclear industry, focussing on risk management and accident management

  19. Risk assessment and risk management in managed aquifer recharge

    CSIR Research Space (South Africa)

    Page, D

    2012-06-01

    Full Text Available This chapter presents the methodologies used for risk assessment and risk management in MAR in Australia and the European Union, qualitative and quantitative approaches adopted within the RECLAIM Water project and case studies where the outcomes...

  20. Understanding and managing risk attitude

    National Research Council Canada - National Science Library

    Hillson, David; Murray-Webster, Ruth

    2007-01-01

    ... This book highlights how risk attitude factors influence the human psyche, and carefully explains the impacts. Organisations seeking to dramatically improve the effectiveness of their risk management process will want to use this book's insights. Craig Peterson, President, PMI Risk Management SIG This book has prompted me to think more deeply as a change d...

  1. Methods of Financial Risk Management

    Directory of Open Access Journals (Sweden)

    Korzh Natalia

    2016-10-01

    Full Text Available The essence and nature of financial risks are investigated. Their classification is conducted. The features of financial risk management and the main methods of management are considered. The ways of risk compensation are identified. It is proved that the objective external risk basis is such market imperfections as externalities of enterprises and incomplete information about the operation of the business environment and internal objective basis risk – the objective function to maximise profits in a competitive environment. It is revealed that to compensate market imperfections business entities should develop a strategy that combines fill in missing information and neutralise or minimise externalities that tactically implemented in financial risk management programs.

  2. IMPLEMENTING A RISK MANAGEMENT STANDARD

    Directory of Open Access Journals (Sweden)

    Constantin PREDA

    2013-01-01

    Full Text Available After risk management “conquered” more and more project managers’ minds and showed its benefits for business and programs, the need to have a global risk management standard has become a crucial issue in the world of risk management. But having a global risk management standard has been a big challenge, starting from the decision of developing the standard (March-June 2005, to the moment of publishing it, November 2009. So, developing the ISO 31000:2009 standard has been more or less like a bumpy ride. Apparently, the people involved in developing the global risk management standard understood from the very beginning that no challenges are too big, nor any tasks too small and that the task of having a new, comprehensive global risk management standard should be completed with excellence: defining the principles and the framework guiding the risk management process applicable for all type of organizations and for a wide range of activities. Coming up with a global standard should always be based on the real organizations’ needs and should fulfill real risk management requirements. The article is trying to present the pros and cons of risk management standard implementation, challenging the implementation process itself and the added value of implementing the standard due to the lack of implementation enablers, like risk culture, a real problem especially in an international environment.

  3. Computer-Aided Facilities Management Systems (CAFM).

    Science.gov (United States)

    Cyros, Kreon L.

    Computer-aided facilities management (CAFM) refers to a collection of software used with increasing frequency by facilities managers. The six major CAFM components are discussed with respect to their usefulness and popularity in facilities management applications: (1) computer-aided design; (2) computer-aided engineering; (3) decision support…

  4. RISK MANAGEMENT: AN INTEGRATED APPROACH TO RISK MANAGEMENT AND ASSESSMENT

    Directory of Open Access Journals (Sweden)

    Szabo Alina

    2012-12-01

    Full Text Available Purpose: The objective of this paper is to offer an overview over risk management cycle by focusing on prioritization and treatment, in order to ensure an integrated approach to risk management and assessment, and establish the ‘top 8-12’ risks report within the organization. The interface with Internal Audit is ensured by the implementation of the scoring method to prioritize risks collected from previous generated risk report. Methodology/approach: Using evidence from other research in the area and the professional expertise, this article outlines an integrated approach to risk assessment and risk management reporting processes, by separating the risk in two main categories: strategic and operational risks. The focus is on risk prioritization and scoring; the final output will comprise a mix of strategic and operational (‘top 8-12’ risks, which should be used to establish the annual Internal Audit plan. Originality/value: By using an integrated approach to risk assessment and risk management will eliminate the need for a separate Internal Audit risk assessment over prevailing risks. It will reduce the level of risk assessment overlap by different functions (Tax, Treasury, Information System over the same risk categories as a single methodology, is used and will align timings of risk assessment exercises. The risk prioritization by usage of risk and control scoring criteria highlights the combination between financial and non-financial impact criteria allowing risks that do not naturally lend themselves to a financial amount to be also assessed consistently. It is emphasized the usage of score method to prioritize the risks included in the annual audit plan in order to increase accuracy and timelines.

  5. Innovations in Quantitative Risk Management

    CERN Document Server

    Scherer, Matthias; Zagst, Rudi

    2015-01-01

    Quantitative models are omnipresent –but often controversially discussed– in todays risk management practice. New regulations, innovative financial products, and advances in valuation techniques provide a continuous flow of challenging problems for financial engineers and risk managers alike. Designing a sound stochastic model requires finding a careful balance between parsimonious model assumptions, mathematical viability, and interpretability of the output. Moreover, data requirements and the end-user training are to be considered as well. The KPMG Center of Excellence in Risk Management conference Risk Management Reloaded and this proceedings volume contribute to bridging the gap between academia –providing methodological advances– and practice –having a firm understanding of the economic conditions in which a given model is used. Discussed fields of application range from asset management, credit risk, and energy to risk management issues in insurance. Methodologically, dependence modeling...

  6. Integrated Computer System of Management in Logistics

    Science.gov (United States)

    Chwesiuk, Krzysztof

    2011-06-01

    This paper aims at presenting a concept of an integrated computer system of management in logistics, particularly in supply and distribution chains. Consequently, the paper includes the basic idea of the concept of computer-based management in logistics and components of the system, such as CAM and CIM systems in production processes, and management systems for storage, materials flow, and for managing transport, forwarding and logistics companies. The platform which integrates computer-aided management systems is that of electronic data interchange.

  7. RISK MANAGEMENT IN CUSTOMS CONTROL

    Directory of Open Access Journals (Sweden)

    Elena Valerievna Drobot

    2017-06-01

    Full Text Available Customs administrations operating in the modern global economy are faced with a complex range of challenges. The prime responsibilities remain the collection of revenues and the protection of the society, but these demanding tasks must be performed effectively and efficiently, whilst at the same time facilitating the flow of legitimate goods. Risk management is a logical and systematic method of identifying, analyzing and managing risks. Risk management can be associated with any activity, function or process within the organization and will enable the organization to take advantage of opportunities and minimize potential losses. Minimization of the human factor in customs control through the implementation of non-intrusive inspection equipment can be very useful. The particularities of risk-management system (RMS implementation within customs control are discussed in the article. The authors single out the elements of the risk-management system, evaluate the effectiveness of risk-management in customs control. The main reasons for non-implementation of the risk-management system in customs control are described as well. The particular attention is paid to the benefits of customs risk management. The authors’ hypothesis is that risk management in customs control must find a balance between costs and benefits to address all risks equally. Criteria are needed to decide what constitutes an acceptable or unacceptable risk. Thus, system analysis and risk management system are the effective mechanisms for acceleration of customs clearance and improve the quality of customs control. As a conclusion, the authors give recommendations for the improvement of the effectiveness of risk management system in customs control.

  8. Risk management and corporate value

    Directory of Open Access Journals (Sweden)

    Milan Cupic

    2015-12-01

    Full Text Available The paper presents a theoretical framework for assessing the impact of risk management on corporate value. As the relevant factors that determine this impact, the paper analyzes market imperfections and investors’ risk aversion. The results of the present research indicate that risk management contributes to an increase in corporate value if, under the influence of market imperfections, corporate risk exposure is concave. As an expression of market imperfections, the paper analyzes the costs of financial distress, agency costs, and taxation. The results of the research also indicate that the risk management policy should not aim to minimize, but rather optimize risk exposure, by taking into account the costs of risk management, investors’ risk aversion and the competitive advantage a corporation has on the relevant market.

  9. Risk management of precious metals

    NARCIS (Netherlands)

    S.M. Hammoudeh (Shawkat); F. Malik (Farooq); M.J. McAleer (Michael)

    2010-01-01

    textabstractThis paper examines volatility and correlation dynamics in price returns of gold, silver, platinum and palladium, and explores the corresponding risk management implications for market risk and hedging. Value-at-Risk (VaR) is used to analyze the downside market risk associated with

  10. Risk Management in Logystics Chains

    OpenAIRE

    Butrin, Andrey; Vikulov, Vladimir

    2013-01-01

    Article is devoted to risk management of supply chain. The authors considered indicators of supply chain risks, including risks caused by supplier. Authors formed a method of optimizing the level of supply chain risk in the integration with suppliers and customers.

  11. Improving Information Security Risk Management

    Science.gov (United States)

    Singh, Anand

    2009-01-01

    manaOptimizing risk to information to protect the enterprise as well as to satisfy government and industry mandates is a core function of most information security departments. Risk management is the discipline that is focused on assessing, mitigating, monitoring and optimizing risks to information. Risk assessments and analyses are critical…

  12. RISKS MANAGEMENT: NEW LITERATURE REVIEW

    OpenAIRE

    Ennouri Wissem

    2013-01-01

    The complexity of the industrial activities and the important mass of flows crossing the supply chain promotes the emergence of risks that must be considered in the decision process. For this reason, we have developed this paper to clarify the basics of risk management through a short new suggestion of literature review for risk management. Our justification of this attempt is that this area is the most discussed in our days and it is impossible to present all definition of the risk concept, ...

  13. Integrated supply chain risk management

    OpenAIRE

    Riaan Bredell; Jackie Walters

    2007-01-01

    Integrated supply chain risk management (ISCRM) has become indispensable to the theory and practice of supply chain management. The economic and political realities of the modern world require not only a different approach to supply chain management, but also bold steps to secure supply chain performance and sustainable wealth creation. Integrated supply chain risk management provides supply chain organisations with a level of insight into their supply chains yet to be achieved. If correctly ...

  14. Managing the risks of risk management on large fires

    Science.gov (United States)

    Donald G. MacGregor; Armando González-Cabán

    2013-01-01

    Large fires pose risks to a number of important values, including the ecology, property and the lives of incident responders. A relatively unstudied aspect of fire management is the risks to which incident managers are exposed due to organizational and sociopolitical factors that put them in a position of, for example, potential liability or degradation of their image...

  15. The Uncertainties of Risk Management

    DEFF Research Database (Denmark)

    Vinnari, Eija; Skærbæk, Peter

    2014-01-01

    for expanding risk management. More generally, such uncertainties relate to the professional identities and responsibilities of operational managers as defined by the framing devices. Originality/value – The paper offers three contributions to the extant literature: first, it shows how risk management itself......Purpose – The purpose of this paper is to analyse the implementation of risk management as a tool for internal audit activities, focusing on unexpected effects or uncertainties generated during its application. Design/methodology/approach – Public and confidential documents as well as semi......-structured interviews are analysed through the lens of actor-network theory to identify the effects of risk management devices in a Finnish municipality. Findings – The authors found that risk management, rather than reducing uncertainty, itself created unexpected uncertainties that would otherwise not have emerged...

  16. Continuous Risk Management at NASA

    Science.gov (United States)

    Hammer, Theodore F.; Rosenberg, Linda

    1999-01-01

    NPG 7120.5A, "NASA Program and Project Management Processes and Requirements" enacted in April, 1998, requires that "The program or project manager shall apply risk management principles..." The Software Assurance Technology Center (SATC) at NASA GSFC has been tasked with the responsibility for developing and teaching a systems level course for risk management that provides information on how to comply with this edict. The course was developed in conjunction with the Software Engineering Institute at Carnegie Mellon University, then tailored to the NASA systems community. This presentation will briefly discuss the six functions for risk management: (1) Identify the risks in a specific format; (2) Analyze the risk probability, impact/severity, and timeframe; (3) Plan the approach; (4) Track the risk through data compilation and analysis; (5) Control and monitor the risk; (6) Communicate and document the process and decisions. This risk management structure of functions has been taught to projects at all NASA Centers and is being successfully implemented on many projects. This presentation will give project managers the information they need to understand if risk management is to be effectively implemented on their projects at a cost they can afford.

  17. DEFENSE PROGRAMS RISK MANAGEMENT FRAMEWORK

    Directory of Open Access Journals (Sweden)

    Constantin PREDA

    2012-01-01

    Full Text Available For the past years defense programs have faced delays in delivering defense capabilities and budget overruns. Stakeholders are looking for ways to improve program management and the decision making process given the very fluid and uncertain economic and political environment. Consequently, they have increasingly resorted to risk management as the main management tool for achieving defense programs objectives and for delivering the defense capabilities strongly needed for the soldiers on the ground on time and within limited defense budgets. Following a risk management based decision-making approach the stakeholders are expected not only to protect program objectives against a wide range of risks but, at the same time, to take advantage of the opportunities to increase the likelihood of program success. The prerequisite for making risk management the main tool for achieving defense programs objectives is the design and implementation of a strong risk management framework as a foundation providing an efficient and effective application of the best risk management practices. The aim of this paper is to examine the risk management framework for defense programs based on the ISO 31000:2009 standard, best risk management practices and the defense programs’ needs and particularities. For the purposes of this article, the term of defense programs refers to joint defense programs.

  18. RISK MANAGEMENT: AN INTEGRATED APPROACH TO RISK MANAGEMENT AND ASSESSMENT

    OpenAIRE

    Szabo Alina

    2012-01-01

    Purpose: The objective of this paper is to offer an overview over risk management cycle by focusing on prioritization and treatment, in order to ensure an integrated approach to risk management and assessment, and establish the ‘top 8-12’ risks report within the organization. The interface with Internal Audit is ensured by the implementation of the scoring method to prioritize risks collected from previous generated risk report. Methodology/approach: Using evidence from other research in ...

  19. NGNP Risk Management Database: A Model for Managing Risk

    International Nuclear Information System (INIS)

    Collins, John

    2009-01-01

    To facilitate the implementation of the Risk Management Plan, the Next Generation Nuclear Plant (NGNP) Project has developed and employed an analytical software tool called the NGNP Risk Management System (RMS). A relational database developed in Microsoft(reg s ign) Access, the RMS provides conventional database utility including data maintenance, archiving, configuration control, and query ability. Additionally, the tool's design provides a number of unique capabilities specifically designed to facilitate the development and execution of activities outlined in the Risk Management Plan. Specifically, the RMS provides the capability to establish the risk baseline, document and analyze the risk reduction plan, track the current risk reduction status, organize risks by reference configuration system, subsystem, and component (SSC) and Area, and increase the level of NGNP decision making.

  20. NGNP Risk Management Database: A Model for Managing Risk

    Energy Technology Data Exchange (ETDEWEB)

    John Collins

    2009-09-01

    To facilitate the implementation of the Risk Management Plan, the Next Generation Nuclear Plant (NGNP) Project has developed and employed an analytical software tool called the NGNP Risk Management System (RMS). A relational database developed in Microsoft® Access, the RMS provides conventional database utility including data maintenance, archiving, configuration control, and query ability. Additionally, the tool’s design provides a number of unique capabilities specifically designed to facilitate the development and execution of activities outlined in the Risk Management Plan. Specifically, the RMS provides the capability to establish the risk baseline, document and analyze the risk reduction plan, track the current risk reduction status, organize risks by reference configuration system, subsystem, and component (SSC) and Area, and increase the level of NGNP decision making.

  1. Selecting Copulas for Risk Management

    NARCIS (Netherlands)

    H.J.W.G. Kole (Erik); C.G. Koedijk (Kees); M.J.C.M. Verbeek (Marno)

    2006-01-01

    textabstractCopulas offer financial risk managers a powerful tool to model the dependence between the different elements of a portfolio and are preferable to the traditional, correlation-based approach. In this paper we show the importance of selecting an accurate copula for risk management. We

  2. Corporate risk management : an overview

    NARCIS (Netherlands)

    Oosterhof, Casper M.

    2001-01-01

    Corporate risk management and hedging are important activities within financial as well as non-financial corporations. Under the assumptions of Modigliani and Miller [1958], corporate risk management is a redundant activity. However, the existence of market imperfections can explain the corporate

  3. The Supply Chain Risk Management

    OpenAIRE

    Skitsko Volodymyr I.; Voynikov Mykola Yu.

    2018-01-01

    The article considers current approaches of risk-management in supply chains, the main steps of the risk management process are analyzed and detailed both for a separate enterprise – participant of supply chain, for the supply chain in general, and for the Beer game, based on the international risk management standards. The article provides a way to assess the risks of the «producer» in the Beer game according to the three strategies of its behavior, which presumably can correspond to differe...

  4. Business risk management

    International Nuclear Information System (INIS)

    Cosby, C.

    2015-01-01

    Bruce Power's definition: an emerging and demonstrable event or change in business plan assumptions that could impact Bruce Power's achievement of its business plan objectives and results. Risks can be either negative (threats) or positive (opportunities). Risks against the 5 year business plan Net Risk = impact * probability.

  5. Business risk management

    Energy Technology Data Exchange (ETDEWEB)

    Cosby, C., E-mail: Christine.cosby@brucepower.com [Bruce Power, Tiverton, ON (Canada)

    2015-07-01

    Bruce Power's definition: an emerging and demonstrable event or change in business plan assumptions that could impact Bruce Power's achievement of its business plan objectives and results. Risks can be either negative (threats) or positive (opportunities). Risks against the 5 year business plan Net Risk = impact * probability.

  6. TRManager – Technical Risk Manager

    Directory of Open Access Journals (Sweden)

    Mark A. Gregory

    2009-06-01

    Full Text Available This paper presents research into the development of a new information management technique called Technical Risk Manager. Project management involves the use of processes and information management techniques to aid decision making in the pursuit of project success. Project success may be achieved by meeting time, cost or performance criteria. Current project management practices focus on achieving time and cost project success criteria by using three information management techniques developed in the 1950s: Gantt, PERT and Critical Path Method. Technical Risk Manager has been developed to provide an information management technique that may be used to aid project management decision making in the pursuit of achieving the performance project success criteria.

  7. Real-time management (RTM) by cloud computing system dynamics (CCSD) for risk analysis of Fukushima nuclear power plant (NPP) accident

    International Nuclear Information System (INIS)

    Cho, Hyo Sung; Woo, Tae Ho; The Cyber Univ. of Korea, Seoul

    2017-01-01

    The earthquake and tsunami induced accident of nuclear power plant (NPP) in Fukushima disaster is investigated by the real-time management (RTM) method. This non-linear logic of the safety management is applied to enhance the methodological confidence in the NPP reliability. The case study of the earthquake is modeled for the fast reaction characteristics of the RTM. The system dynamics (SD) modeling simulations and cloud computing are applied for the RTM method where the real time simulation has the fast and effective communication for the accident remediation and prevention. Current tablet computing system can improve the safety standard of the NPP. Finally, the procedure of the cloud computing system dynamics (CCSD) modeling is constructed.

  8. Real-time management (RTM) by cloud computing system dynamics (CCSD) for risk analysis of Fukushima nuclear power plant (NPP) accident

    Energy Technology Data Exchange (ETDEWEB)

    Cho, Hyo Sung [Yonsei Univ., Wonju Gangwon-do (Korea, Republic of). Dept. of Radiation Convergence Engineering; Woo, Tae Ho [Yonsei Univ., Wonju Gangwon-do (Korea, Republic of). Dept. of Radiation Convergence Engineering; The Cyber Univ. of Korea, Seoul (Korea, Republic of). Dept. of Mechanical and Control Engineering

    2017-03-15

    The earthquake and tsunami induced accident of nuclear power plant (NPP) in Fukushima disaster is investigated by the real-time management (RTM) method. This non-linear logic of the safety management is applied to enhance the methodological confidence in the NPP reliability. The case study of the earthquake is modeled for the fast reaction characteristics of the RTM. The system dynamics (SD) modeling simulations and cloud computing are applied for the RTM method where the real time simulation has the fast and effective communication for the accident remediation and prevention. Current tablet computing system can improve the safety standard of the NPP. Finally, the procedure of the cloud computing system dynamics (CCSD) modeling is constructed.

  9. Computer managed emergency operating procedures

    International Nuclear Information System (INIS)

    Salamun, I.; Mavko, B.; Stritar, A.

    1994-01-01

    New computer technology is a very effective tool for developing a new design of nuclear power plant control room. It allows designer possibility to create a tool for managing with large database of power plant parameters and displaying them in different graphic forms and possibility of automated execution of well known task. The structure of Emergency Operating Procedures (EOP) is very suitable for programming and for creating expert system. The Computerized Emergency Operating Procedures (CEOP) described in this paper can be considered as an upgrading of standard EOP approach. EmDiSY (Emergency Display System - computer code name for CEOP) main purpose is to supply the operator with necessary information, to document all operator actions and to execute well known tasks. It is a function oriented CEOP that gives operator guidance on how to verify the critical safety functions and how to restore and maintain these functions where they are degraded. All knowledge is coded and stored in database files. The knowledge base consists from stepping order for verifying plant parameters, desired values of parameters, conditions for comparison and links between procedures and actions. Graphical shell allows users to read database, to follow instruction and to find out correct task. The desired information is concentrated in one screen and allows users to focus on a task. User is supported in two ways: desired parameter values are displayed on the process picture and automated monitoring critical safety function status trees are all time in progress and available to the user. (author). 4 refs, 4 figs

  10. INTERNAL AUDIT AND RISK MANAGEMENT

    Directory of Open Access Journals (Sweden)

    Elena RUSE

    2014-04-01

    Full Text Available The existence of risk in economic activity can not be denied. In fact, the risk is a concept which exists in every activity, the term of risk being identified with uncertainty, respectively the (unchance to produce an undesirable event. Internal audit and risk management aim at the same goal, namely the control of risks. Internal Audit performs several roles in risk management plan. The objectives of the internal audit function varies from company to company, but in all economic entities internal audit department aims to improve performance management, enterprise performance and thus improve the internal control system. This paper aims to demonstrate, among other things, that any event that may result in failure is unquestionably classified as risk.

  11. Integrated supply chain risk management

    Directory of Open Access Journals (Sweden)

    Riaan Bredell

    2007-11-01

    Full Text Available Integrated supply chain risk management (ISCRM has become indispensable to the theory and practice of supply chain management. The economic and political realities of the modern world require not only a different approach to supply chain management, but also bold steps to secure supply chain performance and sustainable wealth creation. Integrated supply chain risk management provides supply chain organisations with a level of insight into their supply chains yet to be achieved. If correctly applied, this process may optimise management decision-making and assist in the protection and enhancement of shareholder value.

  12. Enterprise risk management and disclosure

    Directory of Open Access Journals (Sweden)

    Nicoleta Farcane

    2008-01-01

    Full Text Available Our paper deals with aspects regarding risk and uncertainty. Many risk management methods are today implemented in organizations. This perspective reveals that managers are linked in different forms to the activities they are managing, depending on the conditions and levels of uncertainty they are in. Actually, these multiple levels of uncertainty lead to the conclusion that any situation in an organizational system can be classified in two different models of organizational phenomena: the organizational phenomena that are putting managers and stakeholders in conditions of risk and the organizational phenomena that are putting them in condition of uncertainty. Using content analyze in this paper we survey the disclosure level of risk management information in the annual report of top Romanian listed companies.

  13. RISKS IN INVESTMENT AND MANAGEMENT

    Directory of Open Access Journals (Sweden)

    Ms. Tatiana A. Ykovleva

    2016-12-01

    Full Text Available The article discusses the features of investment risks and their causes, as well as provides a detailed classification of investment risks. The authors reveal the essence and content of the investment process, risk management, providing material for presentation in the form of a diagram. In conclusion, the article explains the use of the system of specialized institutions as a way to exclude the basic, or primary investment risk.

  14. Risk Management Issues - An Aerospace Perspective

    Science.gov (United States)

    Perera, Jeevan S.

    2011-01-01

    Phased-approach for implementation of risk management is necessary. Risk management system will be simple, accessible and promote communication of information to all relevant stakeholders for optimal resource allocation and risk mitigation. Risk management should be used by all team members to manage risks--risk office personnel. Each group is assigned Risk Integrators who are facilitators for effective risk management. Risks will be managed at the lowest-level feasible, elevate only those risks that require coordination or management from above. Risk reporting and communication is an essential element of risk management and will combine both qualitative and quantitative elements.. Risk informed decision making should be introduced to all levels of management. Provide necessary checks and balances to insure that risks are caught/identified and dealt with in a timely manner, Many supporting tools, processes & training must be deployed for effective risk management implementation. Process improvement must be included in the risk processes.

  15. Improving Operational Risk Management Using Business Performance Management Technologies

    OpenAIRE

    Bram Pieket Weeserik; Marco Spruit

    2018-01-01

    Operational Risk Management (ORM) comprises the continuous management of risks resulting from: human actions, internal processes, systems, and external events. With increasing requirements, complexity and a growing volume of risks, information systems provide benefits for integrating risk management activities and optimizing performance. Business Performance Management (BPM) technologies are believed to provide a solution for effective Operational Risk Management by offering several combined ...

  16. Scope of environmental risk management

    Energy Technology Data Exchange (ETDEWEB)

    O' Riordan, T

    1979-01-01

    Environmental risk management embraces three techniques for project appraisal: cost/benefit analysis, environmental impact analysis and risk assessment. It also explicitly relates scientific investigations to political judgments, sometimes so closely that the two cannot be separated. Indeed it is now apparent that environmental risk management encompasses procedures both to review the relative merits and priorities of policies as well as to appraise the environmental risks of particular schemes. Until recently this relationship has not been fully appreciated, so much imagination and innovation is still required to develop the most-suitable mechanisms for review.

  17. The Theme of Risk Management

    Directory of Open Access Journals (Sweden)

    Chua, D. K. H.

    2014-07-01

    Full Text Available The papers in this issue of the Journal come from different industry sectors, yet there can be a common theme that ties them together. Two of the papers address explicitly the issue of risk management, while the other three may be related to it in different degrees. One of the critical factors for project success is risk identification, as determined by Chua et al. (1999. The importance of risk management cannot be overemphasized. Failure to identify crucial risk elements in a project can lead to significant project failures in terms of cost and schedule.

  18. Tailoring Risk Management in Design

    DEFF Research Database (Denmark)

    Tegeltija, M.; Oehmen, J.; McMahon, C. A.

    2018-01-01

    While risk quantification research has grown over the last few decades, only a limited number of studies have addressed the overall process integration of these approaches in design risk management. This paper argues that the choice of risk quantification method has strong implications for several...... process aspects. We investigate current risk management maturity models and suggest an expansion to accommodate requirements originating from the choice of quantification method, and to inform the choice of quantification method, based on other process parameters, validated through 3 case companies....

  19. Applied software risk management a guide for software project managers

    CERN Document Server

    Pandian, C Ravindranath

    2006-01-01

    Few software projects are completed on time, on budget, and to their original specifications. Focusing on what practitioners need to know about risk in the pursuit of delivering software projects, Applied Software Risk Management: A Guide for Software Project Managers covers key components of the risk management process and the software development process, as well as best practices for software risk identification, risk planning, and risk analysis. Written in a clear and concise manner, this resource presents concepts and practical insight into managing risk. It first covers risk-driven project management, risk management processes, risk attributes, risk identification, and risk analysis. The book continues by examining responses to risk, the tracking and modeling of risks, intelligence gathering, and integrated risk management. It concludes with details on drafting and implementing procedures. A diary of a risk manager provides insight in implementing risk management processes.Bringing together concepts ...

  20. Managing Multiple Risk Factors

    National Research Council Canada - National Science Library

    Lollis, Charlie

    1998-01-01

    ...) contribute to the racial differences in cardiovascular risk and events among women. High levels of socioeconomic stress, higher dietary fat intake and sedentary lifestyle are more prevalent among black than white women...

  1. Knowledge management in support of enterprise risk management

    OpenAIRE

    Rodriguez, Eduardo; Edwards, John S.

    2014-01-01

    Risk management and knowledge management have so far been studied almost independently. The evolution of risk management to the holistic view of Enterprise Risk Management requires the destruction of barriers between organizational silos and the exchange and application of knowledge from different risk management areas. However, knowledge management has received little or no attention in risk management. This paper examines possible relationships between knowledge management constructs relate...

  2. The NASA risk management program

    International Nuclear Information System (INIS)

    Buchbinder, B.; Philipson, L.L.

    1989-01-01

    This paper reports that the NASA Risk Management Program has been established to ensure the appropriate application of risk-based procedures in support of the elimination, reduction, or acceptance of significant safety risks of concern in NASA. The term appropriate is emphasized, in that the particular procedures applied to each given risk are to reflect its character and prioritized importance, the technological and economic feasibility of its treatment. A number of key documents have been produced in support of this implementation. Databases, risk analysis tools, and risk communication procedures requisite to the execution of the risk management functions also are being developed or documented. Several risk management applications have been made and a comprehensive application to a major new NASA program is underway. This paper summarizes the development and current status of the NASA Risk Management Program. Some principal actions that have been carried out in NASA in consonance with the program are noted particularly, and views are presented on the program's likely future directions

  3. How to manage risk better

    CSIR Research Space (South Africa)

    Walwyn, DR

    2002-09-01

    Full Text Available Risk management practices in the R&D departments of many chemical and pharmaceutical companies lack much of the rigor and sophistication of the equivalent corporation in the financial sector. For instance investment decisions on research projects...

  4. Risk Management and Value Creation

    DEFF Research Database (Denmark)

    Andersen, Torben Juul; Roggi, Oliviero

    Corporate failures, periodic recessions, regional debt crises and volatile financial markets have intensified the focus on risk management as the means to deal with turbulent conditions. The ability to respond effectively to abrupt environmental impacts is considered an important source...... of competitive advantage. Yet, surprisingly little research has analyzed whether the presumed advantages of effective risk management are associated with superior outcomes. Here we present a comprehensive study of risk management effectiveness and the relationship to corporate performance based on more than 33......,500 observations in 3,400 firms over the turbulent 20-year period 1991-2010. Determining effective risk management as the ability to reduce earnings and cash flow volatility, we find that both have significant positive relationships to lagged performance measures after controlling for industry effects, company...

  5. Risk assessment and risk management of mycotoxins.

    Science.gov (United States)

    2012-01-01

    Risk assessment is the process of quantifying the magnitude and exposure, or probability, of a harmful effect to individuals or populations from certain agents or activities. Here, we summarize the four steps of risk assessment: hazard identification, dose-response assessment, exposure assessment, and risk characterization. Risk assessments using these principles have been conducted on the major mycotoxins (aflatoxins, fumonisins, ochratoxin A, deoxynivalenol, and zearalenone) by various regulatory agencies for the purpose of setting food safety guidelines. We critically evaluate the impact of these risk assessment parameters on the estimated global burden of the associated diseases as well as the impact of regulatory measures on food supply and international trade. Apart from the well-established risk posed by aflatoxins, many uncertainties still exist about risk assessments for the other major mycotoxins, often reflecting a lack of epidemiological data. Differences exist in the risk management strategies and in the ways different governments impose regulations and technologies to reduce levels of mycotoxins in the food-chain. Regulatory measures have very little impact on remote rural and subsistence farming communities in developing countries, in contrast to developed countries, where regulations are strictly enforced to reduce and/or remove mycotoxin contamination. However, in the absence of the relevant technologies or the necessary infrastructure, we highlight simple intervention practices to reduce mycotoxin contamination in the field and/or prevent mycotoxin formation during storage.

  6. Operation, Management, Security and Sustainability for Cloud Computing

    Directory of Open Access Journals (Sweden)

    WESTPHAL, C. B.

    2014-06-01

    Full Text Available This paper presents some scope, context, proposals and solutions related with the following topics: Decision-Theoretic Planning for Cloud Computing; An Architecture for Risk Analysis in Cloud; Risk-based Dynamic Access Control for a Highly Scalable Cloud Federation; Challenges of Operationalizing PACS on Cloud Over Wireless Networks; Environment, Services and Network Management for Green Clouds; Provisioning and Resource Allocation for Green Clouds; and Optimizing Green Clouds through Legacy Network Infrastructure Management.

  7. 76 FR 45724 - Clearing Member Risk Management

    Science.gov (United States)

    2011-08-01

    ... proposed rules address risk management for cleared trades by futures commission merchants, swap dealers... Commission has proposed extensive regulations addressing open access and risk management at the derivatives..., 2011) (Risk Management Requirements for Derivatives Clearing Organizations). These proposed regulations...

  8. Producers' Complex Risk Management Choices

    NARCIS (Netherlands)

    Pennings, J.M.E.; Isengildina, O.; Irwin, S.H.; Garcia, P.; Good, D.L.

    2008-01-01

    Producers have a wide variety of risk management instruments available, making their choice(s) complex. The way producers deal with this complexity can vary and may influence the impact that the determinants, such as risk aversion, have on their choices. A recently developed choice bracketing

  9. Legal risk management in shipping

    DEFF Research Database (Denmark)

    Siig, Kristina

    The book discusses the most typical legal challenges met in the chartering, broker, agent or port management part of the shipping industry. It discusses these issues in both English and Scandinavian law and gives indications on how to best ensure your legal risk management in these parts...

  10. Computational Aspects of Dam Risk Analysis: Findings and Challenges

    Directory of Open Access Journals (Sweden)

    Ignacio Escuder-Bueno

    2016-09-01

    Full Text Available In recent years, risk analysis techniques have proved to be a useful tool to inform dam safety management. This paper summarizes the outcomes of three themes related to dam risk analysis discussed in the Benchmark Workshops organized by the International Commission on Large Dams Technical Committee on “Computational Aspects of Analysis and Design of Dams.” In the 2011 Benchmark Workshop, estimation of the probability of failure of a gravity dam for the sliding failure mode was discussed. Next, in 2013, the discussion focused on the computational challenges of the estimation of consequences in dam risk analysis. Finally, in 2015, the probability of sliding and overtopping in an embankment was analyzed. These Benchmark Workshops have allowed a complete review of numerical aspects for dam risk analysis, showing that risk analysis methods are a very useful tool to analyze the risk of dam systems, including downstream consequence assessments and the uncertainty of structural models.

  11. Resource Management in Mobile Cloud Computing

    Directory of Open Access Journals (Sweden)

    Andrei IONESCU

    2015-01-01

    Full Text Available Mobile cloud computing is a major research topic in Information Technology & Communications. It integrates cloud computing, mobile computing and wireless networks. While mainly built on cloud computing, it has to operate using more heterogeneous resources with implications on how these resources are managed and used. Managing the resources of a mobile cloud is not a trivial task, involving vastly different architectures. The process is outside the scope of human users. Using the resources by the applications at both platform and software tiers come with its own challenges. This paper presents different approaches in use for managing cloud resources at infrastructure and platform levels.

  12. Price Risk and Risk Management in Agriculture

    Directory of Open Access Journals (Sweden)

    Udo Broll

    2013-06-01

    Full Text Available This note studies the risk-management decisions of a risk-averse farmer. The farmer faces multiple sources of price uncertainty. He sells commodities to two markets at two prices, but only one of these markets has a futures market. We show that the farmer’s optimal commodity futures market position, i.e., a cross-hedge strategy, is actually an over-hedge, a full-hedge, or an under-hedge strategy, depending on whether the two prices are strongly positively correlated, uncorrelated, or negatively correlated, respectively.

  13. Managing Supplier Sustainability Risk

    OpenAIRE

    Harilainen, Hanna-Riitta

    2014-01-01

    Supply chains are increasingly global, often reaching to developing regions. The media pressure brand owners to be responsible, but a product is only as sustainable as the practices of all the companies involved in manufacturing it are. It’s not enough that the brand owner acts responsibly; sustainable practices have to reach component and raw material suppliers upstream. Image risk has often been recognized as reason for investing in sustainability. In the supply chain context, supplier m...

  14. Energy price risk management

    International Nuclear Information System (INIS)

    Evans, J.W.G.

    1998-01-01

    While long term, fixed price contracts for fuel procurement and export of excess power may lock in the economics of a CHP plant, these do not necessarily give the best pricing opportunities that may exist during the life of those contracts. A more prudent approach may be to vary the length of the contracts and markets are now developing in gas and electricity to assist in the management of such a portfolio. (Author)

  15. Risk in Enterprise Cloud Computing: Re-Evaluated

    Science.gov (United States)

    Funmilayo, Bolonduro, R.

    2016-01-01

    A quantitative study was conducted to get the perspectives of IT experts about risks in enterprise cloud computing. In businesses, these IT experts are often not in positions to prioritize business needs. The business experts commonly known as business managers mostly determine an organization's business needs. Even if an IT expert classified a…

  16. Efficient Computation of Exposure Profiles for Counterparty Credit Risk

    NARCIS (Netherlands)

    de Graaf, C.S.L.; Feng, Q.; Kandhai, D.; Oosterlee, C.W.

    2014-01-01

    Three computational techniques for approximation of counterparty exposure for financial derivatives are presented. The exposure can be used to quantify so-called Credit Valuation Adjustment (CVA) and Potential Future Exposure (PFE), which are of utmost importance for modern risk management in the

  17. Underground risk management information systems

    Energy Technology Data Exchange (ETDEWEB)

    Matsuyama, S.; Inoue, M.; Sakai, T.

    2006-03-15

    JCOAL has conducted Joint Research on an Underground Communication and Risk Management Information System with CSIRO of Australia under a commissioned study project for the promotion of coal use starting in fiscal 2002. The goal of this research project is the establishment of a new Safety System focusing on the comprehensive risk management information system by the name of Nexsys. The main components of the system are the Ethernet type underground communication system that represents the data communication base, and the risk management information system that permits risk analysis in real-time and provides decision support based on the collected data. The Nexsys is an open system and is a core element of the underground monitoring system. Using a vast amount of underground data, it is capable of accommodating a wide range of functions that were not available in the past. Because of it, it is possible to construct an advanced underground safety system. 14 figs., 4 tabs.

  18. Risk management for noncombustion wastes

    International Nuclear Information System (INIS)

    Connor, K.K.; Rice, J.S.

    1991-01-01

    The Noncombustion Waste Risk Management Project is designed to incorporate the insights and information developed in these projects into tools that will help utilities make better noncombustion waste management decisions. Specific project goals are to synthesize information useful to utilities on noncombustion wastes, emphasize waste reduction as a priority over end-of-pipe management, develop methods to manage the costs and risks associated with noncombustion wastes (e.g., direct costs, permitting costs, liability costs, public relations costs), develop software and documentation to deliver the information and analysis methods to the industry. This project was initiated EPRI's Environment Division in late 1988. The early phases of the project involved gathering information on current noncombustion waste management practices, specific utility problems and concerns with respect to these wastes, current and potential future regulations, and current and emerging management options. Recent efforts have focused on characterizing the direct and indirect (e.g., lawsuits, remedial action) costs of managing these wastes and on developing and implementing risk management methods for a subset of wastes. The remainder of this paper describes the specific issues addressed by and the results and insights from the three completed waste-specific studies

  19. Development of a computational system for management of risks in radiosterilization processes of biological tissues; Desenvolvimento de um sistema computacional de gerenciamento de riscos em processos de radioesterilizacao de tecidos biologicos

    Energy Technology Data Exchange (ETDEWEB)

    Montoya, Cynara Viterbo

    2009-07-01

    Risk management can be understood to be a systematic management which aims to identify record and control the risks of a process. Applying risk management becomes a complex activity, due to the variety of professionals involved. In order to execute risk management the following are requirements of paramount importance: the experience, discernment and judgment of a multidisciplinary team, guided by means of quality tools, so as to provide standardization in the process of investigating the cause and effects of risks and dynamism in obtaining the objective desired, i.e. the reduction and control of the risk. This work aims to develop a computational system of risk management (software) which makes it feasible to diagnose the risks of the processes of radiosterilization of biological tissues. The methodology adopted was action-research, according to which the researcher performs an active role in the establishment of the problems found, in the follow-up and in the evaluation of the actions taken owing to the problems. The scenario of this action-research was the Laboratory of Biological Tissues (LTB) in the Radiation Technology Center IPEN/CNEN-SP - Sao Paulo/Brazil. The software developed was executed in PHP and Flash/MySQL language, the server (hosting), the software is available on the Internet (www.vcrisk.com.br), which the user can access from anywhere by means of the login/access password previously sent by email to the team responsible for the tissue to be analyzed. The software presents friendly navigability whereby the user is directed step-by-step in the process of investigating the risk up to the means of reducing it. The software 'makes' the user comply with the term and present the effectiveness of the actions taken to reduce the risk. Applying this system provided the organization (LTB/CTR/IPEN) with dynamic communication, effective between the members of the multidisciplinary team: a) in decision-making; b) in lessons learned; c) in knowing

  20. Risk Management in the Exchange Fund Account

    OpenAIRE

    Michel Rochette

    2002-01-01

    In this article, author Michel Rochette of the Bank's Risk-Management Unit briefly describes the initiatives undertaken to identify, analyze, model, and manage the principal risks inherent in the transactions of the Exchange Fund Account (EFA), where the international reserves of the federal government are held. The author focuses on five types of risk: credit risk, market risk, liquidity risk, operational risk, and legal risk. In addition, the author presents the risk-management principles u...

  1. Benefits Management of Cloud Computing Investments

    OpenAIRE

    Richard Greenwell; Xiaodong Liu; Kevin Chalmers

    2014-01-01

    This paper examines investments in cloud computing using the Benefits Management approach. The major contribution of the paper is to provide a unique insight into how organizations derive value from cloud computing investments. The motivation for writing this paper is to consider the business benefits generated from utilizing cloud computing in a range of organizations. Case studies are used to describe a number of organizations approaches to benefits exploitation using cloud computing. It wa...

  2. Managing nuclear supplier risks

    International Nuclear Information System (INIS)

    Ramberg, B.

    1990-01-01

    This paper reports that with the appearance of such third-tier suppliers as Argentina, Brazil, South Korea, Taiwan, China, and others capable of producing nuclear components and sensitive nuclear materials, assurance that importers are using nuclear energy benignly and safely may become more uncertain. It is therefore important to integrate emerging exporters and importers into a regime of norms designed to minimize nuclear risks. The experience of the London Nuclear Suppliers Group (NSG) to arrive at a code of conduct is encouraging. Placed in the context of the larger evolving nuclear energy regime that seeks to address nuclear safety, proliferation, terrorism, and military attacks on reactors, the international community has made substantial progress. Still, there is much that remains to be done

  3. Risk management through concurrency

    International Nuclear Information System (INIS)

    Childress, J.R.; Briant, V.B.

    1991-01-01

    More than ever before, management and technical professionals are concerned with the subtle and dynamic relationships between safety and performance in complex and hazardous industries. This is certainly true in the nuclear power industry. With the US electric energy industry on the verge of deregulation and increased competition, and with a virtual stoppage on building new nuclear power plants, the increasing demand for reliable sources of efficient electric energy is pressing the nuclear utilities to increase production. At the same time, public sentiment and regulatory pressures are increasing their focus on safety at all costs. The purpose of this paper is to present a proven approach to creating a new work culture for improved nuclear safety and performance. The concepts and material which make up this paper have been taken from both authors experience, research, and consulting in the nuclear industry for several years, as well as from over 20 years of consulting work on the relationships between organizational behavior, culture, and productivity

  4. Managing economic risks through simulation

    International Nuclear Information System (INIS)

    Griffin, B.J.; Eresman, R.K.

    1994-01-01

    Industrial operations are commonly managed in terms of such factors as raw material requirements, throughput, equipment reliability, and operator productivity. Simulation can be used to transform standard management performance measures into probabilistic measures which define the associated risks. These results provide valuable insight for effective management of economic risks. Case studies are presented using the Monte Carlo simulation method to demonstrate different applications of simulation techniques, various result formats, and their use for optimizing economic returns. In the first case study, design criteria for a large gas distribution system originally developed from worst-case demand estimates were modelled to provide a risk basis for decisions on alternative upgrading options. In the second, a commercial gas storage facility operation was modelled to develop economic marketing strategies balancing supply and demand requirements from multiple clients. 3 refs

  5. Branding and the Risk Management Imperative

    Directory of Open Access Journals (Sweden)

    Fournier Susan

    2018-05-01

    Full Text Available In an increasingly risky socioeconomic environment, management needs to proactively consider brand-related risks. To understand brands as tools for risk management, they need to understand four types of brand risk: brand reputation risk, brand dilution risk, brand cannibalization risk and brand stretch risk.

  6. Branding and the Risk Management Imperative

    OpenAIRE

    Fournier Susan; Srinivasan Shuba

    2018-01-01

    In an increasingly risky socioeconomic environment, management needs to proactively consider brand-related risks. To understand brands as tools for risk management, they need to understand four types of brand risk: brand reputation risk, brand dilution risk, brand cannibalization risk and brand stretch risk.

  7. Virtual Enterprise Risk Management Using Artificial Intelligence

    Directory of Open Access Journals (Sweden)

    Hanning Chen

    2010-01-01

    Full Text Available Virtual enterprise (VE has to manage its risk effectively in order to guarantee the profit. However, restricting the risk in a VE to the acceptable level is considered difficult due to the agility and diversity of its distributed characteristics. First, in this paper, an optimization model for VE risk management based on distributed decision making model is introduced. This optimization model has two levels, namely, the top model and the base model, which describe the decision processes of the owner and the partners of the VE, respectively. In order to solve the proposed model effectively, this work then applies two powerful artificial intelligence optimization techniques known as evolutionary algorithms (EA and swarm intelligence (SI. Experiments present comparative studies on the VE risk management problem for one EA and three state-of-the-art SI algorithms. All of the algorithms are evaluated against a test scenario, in which the VE is constructed by one owner and different partners. The simulation results show that the PS2O algorithm, which is a recently developed SI paradigm simulating symbiotic coevolution behavior in nature, obtains the superior solution for VE risk management problem than the other algorithms in terms of optimization accuracy and computation robustness.

  8. Supply Chain Risk Management

    OpenAIRE

    Babková, Ivana

    2008-01-01

    Práce se zabývá problematikou řízení rizika v logistických řetězcích se zaměřením na jeden konkrétní článek řetězce. Definuje základní oblasti risk managementu, jeho hlavní aspekty a systém spojitého plánování. Zabývá se bezpečností práce v pojetí EU, České republiky a Velké Británie. V aplikační části uvádí řízení rizika v jednom článku logistického řetězce, skladu poskytovatele logistických služeb ve Velké Británii.

  9. Risk management for industrial safety

    International Nuclear Information System (INIS)

    Novogno, A.

    1989-01-01

    The catastrophic accidents which have occurred in the last decade, in both developed and developing countries, have drawn the attention of decision-makers in the safety area to the urgent necessity to assess and manage risks from hazardous industrial activities which are concentrated in large industrialized areas. The aim of this paper is to review experience gained in conducting studies in the area of 'comparisons of risks in energy systems' and on the practical application of 'cost effectiveness of risk reduction analysis among different energy systems' (case studies). It is also the aim of the paper to discuss and propose a general framework for defining an 'integrated approach' to risk assessment and management in highly industrialized regions within a country. (author)

  10. Computer applications in radiology business management

    International Nuclear Information System (INIS)

    Pratt, J.; Parrish, D.; Butler, J.; Gregg, S.; Farley, G.

    1987-01-01

    This presentation focuses on two areas of prime importance to radiology business management: financial/accounting applications and computer networking. The business management portion is an overview of accounts receivable management, financial reporting, management reporting, budgeting and forecasting (including cost/benefit analysis and break-even analysis), and personal and/or financial tax planning. The networking portion focuses on telecommunications and considers satellite facilities, electronic claims submission, and national database networking. Both numeric and graphic summaries are demonstrated in the presentation

  11. 12 CFR 917.3 - Risk management.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Risk management. 917.3 Section 917.3 Banks and Banking FEDERAL HOUSING FINANCE BOARD GOVERNANCE AND MANAGEMENT OF THE FEDERAL HOME LOAN BANKS POWERS AND RESPONSIBILITIES OF BANK BOARDS OF DIRECTORS AND SENIOR MANAGEMENT § 917.3 Risk management. (a) Risk management...

  12. Stochastic models in risk theory and management accounting

    NARCIS (Netherlands)

    Brekelmans, R.C.M.

    2000-01-01

    This thesis deals with stochastic models in two fields: risk theory and management accounting. Firstly, two extensions of the classical risk process are analyzed. A method is developed that computes bounds of the probability of ruin for the classical risk rocess extended with a constant interest

  13. [Risk Assessment and Risk Management of Chemicals in China].

    Science.gov (United States)

    Wang, Tie-yu; Zhou, Yun-qiao; Li, Qi-feng; Lü, Yong-long

    2016-02-15

    Risk assessment and risk management have been increasingly approved as an effective approach for appropriate disposal and scientific management of chemicals. This study systematically analyzed the risk assessment methods of chemicals from three aspects including health risk, ecological risk and regional risk. Based on the current situation of classification and management towards chemicals in China, a specific framework of risk management on chemicals was proposed by selecting target chemicals, predominant industries and related stakeholders as the objects. The results of the present study will provide scientific support for improving risk assessment and reasonable management of chemicals in China.

  14. A view on risk management

    International Nuclear Information System (INIS)

    Joksimovich, V.

    1991-01-01

    The world at large has enjoyed the benefits of industrial technology for almost two centuries. The managers of industrial facilities as well as members of the public focused on the benefits and typically ignored or underestimated the inherent risks entailed in deployment of these technologies. Two examples will be given for the sake of illustration. In the chemical industry, the impacts of various chemicals on humans are insufficiently understood. In addition, it was not even known that some hazardous chemicals could be formed in the chemical reactions taking place in various chemical reactors. This is equivalent to not knowing that Cesium-iodide compound can be formed within nuclear fuel nor the impact it might have on humans if released, which is inconceivable in the nuclear industry. In the era of risk recognition, many industrial managers proclaimed that safety is everybody's business. The basic premise behind this was that since everyone is responsible, no one can be blamed for accidents. This is, however, shifting because both economics and litigation are now compelling industrial managers to consider risk in conjunction with the benefit. The government managers in many cases interpreted their charter to reap benefits first and pay the price of risks later; e.g., the case of nuclear weapons production facilities seriously contaminated by radioactive and other hazardous materials. Cost of clean-up was estimated at more than $100 billion. Of course, the authors have similar examples in many other industries, e.g., Superfund project of chemical waste sites. The challenge for the technologists is to maximize the benefit/risk ratio, keeping the risks, real or perceived, acceptably small. This brings us to the issue of acceptable risks, the topic of this paper

  15. Developing Risk Management as a Competitive Capability

    OpenAIRE

    Silva, E.; Wu, Y.; Ojiako, U.

    2013-01-01

    At the level of the firm, three major parameters are found to influence the ability of SMEs to develop risk management competencies; these are enterprise risk management, internal control, and risk culture.

  16. Radiation management computer system for Monju

    International Nuclear Information System (INIS)

    Aoyama, Kei; Yasutomo, Katsumi; Sudou, Takayuki; Yamashita, Masahiro; Hayata, Kenichi; Ueda, Hajime; Hosokawa, Hideo

    2002-01-01

    Radiation management of nuclear power research institutes, nuclear power stations and other such facilities are strictly managed under Japanese laws and management policies. Recently, the momentous issues of more accurate radiation dose management and increased work efficiency has been discussed. Up to now, Fuji Electric Company has supplied a large number of Radiation Management Systems to nuclear power stations and related nuclear facilities. We introduce the new radiation management computer system with adopted WWW technique for Japan Nuclear Cycle Development Institute, MONJU Fast Breeder Reactor (MONJU). (author)

  17. Risk management at GPU Nuclear

    International Nuclear Information System (INIS)

    Long, R.L.

    1991-01-01

    This paper reports on GPU Nuclear. Among other goals, it established the independence of key safety functions as highlighted by the lessons learned from the accident. In particular, an independent Nuclear Assurance Division was established which include Quality Assurance, Training and Education, Emergency Preparedness, and Nuclear Safety Assessment. The latter consisted of corporate and site independent-safety-review groups. As the GPU Nuclear organization matured, a mid-1987 reorganization created an even more focused Planning and Nuclear Safety Division bringing together Nuclear Safety Assessment with Licensing and Regulatory Affairs and Risk Management. The Risk Management Group (RMG), which began its work in fall 1987, was formed to develop a framework for proactive identification, evaluation, and cost-effective reduction and management of risks of all types. The RMG set out to learn as much as possible about risks and their management in nuclear and other high-technology industries. This began with a thorough literature search. It progressed to interviews with individuals and organizations which have demonstrated innovative ideas, experience, and reputations for safe and reliable operation

  18. RISK MANAGEMENT USING PROJECT RECON

    Science.gov (United States)

    2016-11-28

    centralized database . • Project Recon (formerly Risk Recon) is designed to be used by all Program Management Offices, Integrated Project Teams and any...Create growth plans to proactively capture benefits • Customize reports to group opportunities by programmatic, technical, business, contracting, and

  19. Integrated Foreign Exchange Risk Management

    DEFF Research Database (Denmark)

    Aabo, Tom; Høg, Esben; Kuhn, Jochen

    Empirical research has focused on export as a proxy for the exchange rate exposure and the use of foreign exchange derivatives as the instrument to deal with this exposure. This empirical study applies an integrated foreign exchange risk management approach with a particular focus on the role...

  20. Efficient Resource Management in Cloud Computing

    OpenAIRE

    Rushikesh Shingade; Amit Patil; Shivam Suryawanshi; M. Venkatesan

    2015-01-01

    Cloud computing, one of the widely used technology to provide cloud services for users who are charged for receiving services. In the aspect of a maximum number of resources, evaluating the performance of Cloud resource management policies are difficult to optimize efficiently. There are different simulation toolkits available for simulation and modelling the Cloud computing environment like GridSim CloudAnalyst, CloudSim, GreenCloud, CloudAuction etc. In proposed Efficient Resource Manage...

  1. Security Management Model in Cloud Computing Environment

    OpenAIRE

    Ahmadpanah, Seyed Hossein

    2016-01-01

    In the cloud computing environment, cloud virtual machine (VM) will be more and more the number of virtual machine security and management faced giant Challenge. In order to address security issues cloud computing virtualization environment, this paper presents a virtual machine based on efficient and dynamic deployment VM security management model state migration and scheduling, study of which virtual machine security architecture, based on AHP (Analytic Hierarchy Process) virtual machine de...

  2. CEA: assessment of risk management 2011

    International Nuclear Information System (INIS)

    2012-06-01

    This report proposes an overview of CEA activities in the field of risk management in different areas: impact on the environment, installation safety, management of occupational risks (occupational health and safety), radiological protection of workers, transportation of hazardous materials, waste management, protection of sites, installations and heritage, management of emergency situations, management of law risks, controls and audits. It finally presents the risk management department

  3. PROJECT MANAGER SKILLS, RISK MANAGEMENT TOOLS

    Directory of Open Access Journals (Sweden)

    Vladut Iacob

    2013-12-01

    Full Text Available Although the projects are different from each other there are many common things that contribute to their success. Looked overall, the success of a project is the result of a multitude of factors. This person is considered the "engine" of the project. The man who makes the action set for the achievement of project objectives to be brought to an end. The project manager must have the technical knowledge and economic diverse. He should be able to choose a team and lead. You must be tenacious, combative, to know how to communicate both within the team and beyond. In a word, the project manager must have an impressive stock of knowledge, skills and abilities and appreciate as Peter Drucker, to "exist for the organization. To be its servant. Any management who forget this will only cause damage to the organization. "This study will focus on highlighting the skills of the project manager and their role in managing difficult situations or risk.

  4. Tank waste remediation system risk management plan

    International Nuclear Information System (INIS)

    Zimmerman, B.D.

    1998-01-01

    The purpose of the Tank Waste Remediation System (TWRS) Risk Management Plan is to describe a consistent approach to risk management such that TWRS Project risks are identified and managed to achieve TWRS Project success. The Risk Management Plan implements the requirements of the Tank Waste Remediation System Systems Engineering Management Plan in the area of risk management. Figure ES-1 shows the relationship of the TWRS Risk Management Plan to other major TWRS Project documents. As the figure indicates, the Risk Management Plan is a tool used to develop and control TWRS Project work. It provides guidance on how TWRS Project risks will be assessed, analyzed, and handled, and it specifies format and content for the risk management lists, which are a primary product of the risk management process. In many instances, the Risk Management Plan references the TWRS Risk Management Procedure, which provides more detailed discussion of many risk management activities. The TWRS Risk Management Plan describes an ongoing program within the TWRS Project. The Risk Management Plan also provides guidance in support of the TWRS Readiness To-Proceed (RTP) assessment package

  5. Reducing the risk, managing safety.

    Science.gov (United States)

    Aldridge, Peter

    2016-02-01

    Fire safety in healthcare premises has always been a challenge to those that discharge this duty. Statutory compliance should be a matter of course, but in an ever increasingly challenged NHS, even this is not a given. While the NHS is driven by managing very complex risk to deliver cutting edge healthcare, providers cannot be risk averse. Which risk, however, takes priority? Here Peter Aldridge, fire and corporate services manager at Leeds Teaching Hospitals NHS Trust, and Secretary to the National Association of Healthcare Fire Officers (NAHFO)--which will this month and next jointly stage fire safety seminars with IHEEM; see page 8--considers the key issues, with input from a fire officer at a leading mental health and community Trust.

  6. Risk Management Practices: The Ghanaian Firms' Perspective ...

    African Journals Online (AJOL)

    Using a quantitative approach the findings of the study are that Ghanaian firms understand risk and risk management. Additionally, operational, liquidity and credit risk are the most dominant risks experienced while risk identification and selection jointly determine risk management practices in Ghana. Based on the findings ...

  7. Cloud computing can simplify HIT infrastructure management.

    Science.gov (United States)

    Glaser, John

    2011-08-01

    Software as a Service (SaaS), built on cloud computing technology, is emerging as the forerunner in IT infrastructure because it helps healthcare providers reduce capital investments. Cloud computing leads to predictable, monthly, fixed operating expenses for hospital IT staff. Outsourced cloud computing facilities are state-of-the-art data centers boasting some of the most sophisticated networking equipment on the market. The SaaS model helps hospitals safeguard against technology obsolescence, minimizes maintenance requirements, and simplifies management.

  8. Risk Management of NASA Projects

    Science.gov (United States)

    Sarper, Hueseyin

    1997-01-01

    Various NASA Langley Research Center and other center projects were attempted for analysis to obtain historical data comparing pre-phase A study and the final outcome for each project. This attempt, however, was abandoned once it became clear that very little documentation was available. Next, extensive literature search was conducted on the role of risk and reliability concepts in project management. Probabilistic risk assessment (PRA) techniques are being used with increasing regularity both in and outside of NASA. The value and the usage of PRA techniques were reviewed for large projects. It was found that both civilian and military branches of the space industry have traditionally refrained from using PRA, which was developed and expanded by nuclear industry. Although much has changed with the end of the cold war and the Challenger disaster, it was found that ingrained anti-PRA culture is hard to stop. Examples of skepticism against the use of risk management and assessment techniques were found both in the literature and in conversations with some technical staff. Program and project managers need to be convinced that the applicability and use of risk management and risk assessment techniques is much broader than just in the traditional safety-related areas of application. The time has come to begin to uniformly apply these techniques. The whole idea of risk-based system can maximize the 'return on investment' that the public demands. Also, it would be very useful if all project documents of NASA Langley Research Center, pre-phase A through final report, are carefully stored in a central repository preferably in electronic format.

  9. Overview of the Hanford risk management plan

    International Nuclear Information System (INIS)

    Halverson, T.G.

    1998-01-01

    The Project Hanford Management Contract called for the enhancement of site-wide decision processes, and development of a Hanford Risk Management Plan to adopt or develop a risk management system for the Hanford Site. This Plan provides a consistent foundation for Site issues and addresses site-wide management of risks of all types. It supports the Department of Energy planning and sitewide decision making policy. Added to this requirement is a risk performance report to characterize the risk management accomplishments. This paper presents the development of risk management within the context of work planning and performance. Also discussed are four risk elements which add value to the context

  10. Coronary computed tomography and triple rule out CT in patients with acute chest pain and an intermediate cardiac risk profile. Part 1: Impact on patient management

    International Nuclear Information System (INIS)

    Gruettner, Joachim; Fink, Christian; Walter, Thomas; Meyer, Mathias; Apfaltrer, Paul; Schoepf, U. Joseph; Saur, Joachim; Sueselbeck, Tim; Traunwieser, Dominik; Takx, Richard

    2013-01-01

    Objective: To evaluate the impact of coronary CT angiography (coronary CTA) or “triple-rule-out” CT angiography (TRO-CTA) on patient management in the work-up of patients with acute chest pain and an intermediate cardiac risk profile. Materials and methods: 100 patients with acute chest pain and an intermediate cardiac risk for acute coronary syndrome (ACS) underwent coronary CTA or TRO-CTA for the evaluation of chest pain. Patients with a high and low cardiac risk profile were not included in this study. All patients with significant coronary stenosis >50% on coronary CTA underwent invasive coronary catheterization (ICC). Important other pathological findings were recorded. All patients had a 90-day follow-up period for major adverse cardiac events (MACE). Results: Based on a negative coronary CTA 60 of 100 patients were discharged on the same day. None of the discharged patients showed MACE during the 90-day follow-up. Coronary CTA revealed a coronary stenosis >50% in 19 of 100 patients. ICC confirmed significant coronary stenosis in 17/19 patients. Among the 17 true positive patients, 9 underwent percutaneous coronary intervention with stent implantation, 7 were received intensified medical therapy, and 1 patient underwent coronary artery bypass surgery. A TRO-CTA protocol was performed in 36/100 patients due to elevated D-dimer levels. Pulmonary embolism was present in 5 patients, pleural effusion of unknown etiology in 3 patients, severe right ventricular dysfunction with pericardial effusion in 1 patient, and an incidental bronchial carcinoma was diagnosed in 1 patient. Conclusion: Coronary CTA and TRO-CTA allow a rapid and safe discharge in the majority of patients presenting with acute chest pain and an intermediate risk for ACS while at the same time identifies those with significant coronary artery stenosis

  11. Coronary computed tomography and triple rule out CT in patients with acute chest pain and an intermediate cardiac risk profile. Part 1: Impact on patient management

    Energy Technology Data Exchange (ETDEWEB)

    Gruettner, Joachim, E-mail: joachim.gruettner@umm.de [Emergency Department, University Medical Center, Medical Faculty Mannheim, Heidelberg University, Theodor-Kutzer-Ufer 1-3, D-68167 Mannheim (Germany); Fink, Christian, E-mail: Christian.Fink@umm.de [Institute of Clinical Radiology and Nuclear Medicine, University Medical Center, Medical Faculty Mannheim, Heidelberg University, Mannheim (Germany); Walter, Thomas, E-mail: thomas.walter@umm.de [Emergency Department, University Medical Center, Medical Faculty Mannheim, Heidelberg University, Theodor-Kutzer-Ufer 1-3, D-68167 Mannheim (Germany); Meyer, Mathias, E-mail: mr.meyer.mathias@gmail.com [Institute of Clinical Radiology and Nuclear Medicine, University Medical Center, Medical Faculty Mannheim, Heidelberg University, Mannheim (Germany); Apfaltrer, Paul, E-mail: Paul.Apfaltrer@umm.de [Institute of Clinical Radiology and Nuclear Medicine, University Medical Center, Medical Faculty Mannheim, Heidelberg University, Mannheim (Germany); Schoepf, U. Joseph, E-mail: schoepf@musc.edu [Department of Radiology and Radiological Science, Medical University of South Carolina, Charleston, Ashley River Tower, 25 Courtenay Drive, Charleston, SC 29425-2260 (United States); Saur, Joachim, E-mail: joachim.saur@umm.de [1st Department of Medicine (Cardiology), University Medical Center, Medical Faculty Mannheim, Heidelberg University, Mannheim (Germany); Sueselbeck, Tim, E-mail: tim.sueselbeck@umm.de [1st Department of Medicine (Cardiology), University Medical Center, Medical Faculty Mannheim, Heidelberg University, Mannheim (Germany); Traunwieser, Dominik, E-mail: dominik.traunwieser@umm.de [1st Department of Medicine (Cardiology), University Medical Center, Medical Faculty Mannheim, Heidelberg University, Mannheim (Germany); Takx, Richard, E-mail: richard.takx@gmail.com [Department of Radiology and Radiological Science, Medical University of South Carolina, Charleston, Ashley River Tower, 25 Courtenay Drive, Charleston, SC 29425-2260 (United States); and others

    2013-01-15

    Objective: To evaluate the impact of coronary CT angiography (coronary CTA) or “triple-rule-out” CT angiography (TRO-CTA) on patient management in the work-up of patients with acute chest pain and an intermediate cardiac risk profile. Materials and methods: 100 patients with acute chest pain and an intermediate cardiac risk for acute coronary syndrome (ACS) underwent coronary CTA or TRO-CTA for the evaluation of chest pain. Patients with a high and low cardiac risk profile were not included in this study. All patients with significant coronary stenosis >50% on coronary CTA underwent invasive coronary catheterization (ICC). Important other pathological findings were recorded. All patients had a 90-day follow-up period for major adverse cardiac events (MACE). Results: Based on a negative coronary CTA 60 of 100 patients were discharged on the same day. None of the discharged patients showed MACE during the 90-day follow-up. Coronary CTA revealed a coronary stenosis >50% in 19 of 100 patients. ICC confirmed significant coronary stenosis in 17/19 patients. Among the 17 true positive patients, 9 underwent percutaneous coronary intervention with stent implantation, 7 were received intensified medical therapy, and 1 patient underwent coronary artery bypass surgery. A TRO-CTA protocol was performed in 36/100 patients due to elevated D-dimer levels. Pulmonary embolism was present in 5 patients, pleural effusion of unknown etiology in 3 patients, severe right ventricular dysfunction with pericardial effusion in 1 patient, and an incidental bronchial carcinoma was diagnosed in 1 patient. Conclusion: Coronary CTA and TRO-CTA allow a rapid and safe discharge in the majority of patients presenting with acute chest pain and an intermediate risk for ACS while at the same time identifies those with significant coronary artery stenosis.

  12. Risk Management for e-Business

    Directory of Open Access Journals (Sweden)

    2007-01-01

    Full Text Available In the new Internet economy, risk management plays a critical role to protect the organization and its ability to perform their business mission, not just its IT assets. Risk management is the process of identifying risk, assessing risk, and taking steps to reduce risk to an acceptable level. The risk management is an important component of a IT security program. Information and communications technology management and IT security are responsible for ensuring that technology risks are managed appropriately. These risks originate from the deployment and use of IT assets in various ways, such as configuring systems incorrectly or gaining access to restricted software.

  13. Risk Management Practices by Barbadian Banks

    Directory of Open Access Journals (Sweden)

    Anthony Wood

    2013-07-01

    The main findings of the paper are: risk managers perceive risk management as critical to their banks’ performance; the types of risks causing the greatest exposures are credit risk, operational risk, country/sovereign risk, interest rate risk and market risk; there was a high level of success with current risk management practices and these practices have evolved over time in line with the changing economic environment and regulatory updates. Overall, the findings suggest strongly that in light of the current depressed economic climate, banks operating in Barbados are indeed risk-focused or might we say “risk intelligent”.

  14. Tank waste remediation system risk management list

    International Nuclear Information System (INIS)

    Collard, L.B.

    1995-01-01

    The Tank Waste Remedation System (TWRS) Risk Management List and it's subset of critical risks, the Critical Risk Management List, provide a tool to senior RL and WHC management (Level-1 and -2) to manage programmatic risks that may significantly impact the TWRS program. The programmatic risks include cost, schedule, and performance risks. Performance risk includes technical risk, supportability risk (such as maintainability and availability), and external risk (i.e., beyond program control, for example, changes in regulations). The risk information includes a description, its impacts, as evaluation of the likelihood, consequences and risk value, possible mitigating actions, and responsible RL and WHC managers. The issues that typically form the basis for the risks are presented in a separate table and the affected functions are provided on the management lists

  15. Risk Management for Food Allergy

    DEFF Research Database (Denmark)

    Risk Management for Food Allergy is developed by a team of scientists and industry professionals who understand the importance of allergen risk assessment and presents practical, real-world guidance for food manufacturers. With more than 12 million Americans suffering from food allergies and little...... appropriate "safe" thresholds of ingredients, the food industry must take increasingly proactive steps to avoid direct or cross-contamination as well as ensuring that their products are appropriately labeled and identified for those at risk. This book covers a range of critical topics in this area, including...... indication of what is causing that number to continue to grow, food producers, packagers and distributors need to appropriately process, label and deliver their products to ensure the safety of customers with allergic conditions. By identifying risk factors during processing as well as determining...

  16. Symbolic computation in waste management

    International Nuclear Information System (INIS)

    Grant, M.W.

    1989-01-01

    This paper reports a prototype environment for decision analysis implemented on the PC using an object-oriented LISP. A unique feature of this environment is the extensive use of symbolic computation and object oriented programming. Models, e.g. contaminant transport and uptake, are built with the environment, itself recognizing new parameters, uncertainties and functions as they first appear and can be modified at any time with the appropriate changes propagated throughout the environment. The environment automatically generates and executes a complete interactive input sequence during the model construction. In addition to a primary decision criterion, secondary criteria or constraints may be used to define any decision

  17. 42 CFR 441.476 - Risk management.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 4 2010-10-01 2010-10-01 false Risk management. 441.476 Section 441.476 Public... Self-Directed Personal Assistance Services Program § 441.476 Risk management. (a) The State must... plan for how identified risks will be mitigated. (d) The State must ensure that the risk management...

  18. Probabilistic risk assessment as an aid to risk management

    International Nuclear Information System (INIS)

    Garrick, B.J.

    1982-01-01

    Probabilistic risk assessments are providing important insights into nuclear power plant safety. Their value is two-fold: first as a means of quantifying nuclear plant risk including contributors to risk, and second as an aid to risk management. A risk assessment provides an analytical plant model that can be the basis for performing meaningful decision analyses for controlling safety. It is the aspect of quantitative risk management that makes probabilistic risk assessment an important technical discipline of the future

  19. Considerations on Integrating Risk and Quality Management

    Directory of Open Access Journals (Sweden)

    Maria POPESCU

    2011-03-01

    Full Text Available This paper aims to highlight the links between risk management and quality management and to study the possibility of their integrated approach. The study reviews the evolution of risk approach within organizations and stresses the need to increase the effectiveness of this approach by incorporating risk management methodology in the quality management system. Starting from this idea, the authors present the current state of risk approach into quality management, basic rules of integrated quality-risk management and major difficulties which may arise in the implementation of integrated quality–risk systems.

  20. Managing risks and hazardous in industrial operations

    Energy Technology Data Exchange (ETDEWEB)

    Almaula, S.C. [Woodward-Clyde International, Oakland, CA (United States)

    1996-12-31

    The main objective of this paper is to demonstrate that it makes good business sense to identify risks and hazards of an operation and take appropriate steps to manage them effectively. Developing and implementing an effective risk and hazard management plan also contibutes to other industry requirements and standards. Development of a risk management system, key elements of a risk management plan, and hazards and risk analysis methods are outlined. Comparing potential risk to the cost of prevention is also discussed. It is estimated that the cost of developing and preparing the first risk management plan varies between $50,000 to $200,000. 3 refs., 2 figs., 1 tab.

  1. Hanford Tanks Initiative risk management guide

    International Nuclear Information System (INIS)

    Schaus, P.S.

    1997-01-01

    This project-specific Risk Management Guide describes the general approach and process being used by the HTI Project to manage risk associated with execution of the HTI mission. It includes the initial identification of risk and the quantification of its likelihood and severity of its consequences. It further addresses the formulation of risk mitigation plans, periodic statusing of the Risk Management List, and risk closure

  2. Managing IT Integration Risk in Acquisitions

    DEFF Research Database (Denmark)

    Henningsson, Stefan; Kettinger, William J.

    2016-01-01

    The article discusses a framework for evaluating risk of information technology (IT) integration in acquisitions. Topics include the use of the experience of serial acquirer Trelleborg AB to show the merits of the framework for managing the risk and to determine low-risk acquisitions......, the importance of managing IT integration risk, and various risk areas for acquisition IT integration....

  3. Risk management in microfinance institutions

    OpenAIRE

    Batin, Artyom

    2014-01-01

    In the following paper I have tried to find the correlation between type of ownership and effective risk management in the operations of microfinance institutions in India. The results found are consistent with the current findings of how the type of ownership does not impact both the financial or social performance of MFIs. Dataset of 72 MFIs was acquired from the Microfinance Information Exchange on MFIs and evaluated using an OLS regression. The results show that the type of ownership insi...

  4. Risk management in nuclear power social aspects

    International Nuclear Information System (INIS)

    Sappa, N.N.

    1996-01-01

    Problems connected with safety evaluation and risk management during operation of nuclear power installations are considered. Social aspects of risk assessment of enterprises with increased danger are discussed

  5. Strategic raw materials. Risk management

    International Nuclear Information System (INIS)

    Bertau, Martin; Matschullat, Joerg; Kausch, Peter

    2014-01-01

    This volume is divided into four chapters: (1) Raw material management, (2) Primary raw materials, (3) Secondary raw materials and recycling, (4). Processing and products. The topics for the chapter ''Raw material management'' are: Substitution of raw materials - framework conditions and implementation; Thales: Strategic raw materials; Time for cooperation between the EU and China in raw materials policy; Availability of elements for the semiconductor industry; Market price risks of raw material-intensive companies - identification and management. The topics on the second item ''Primary raw materials'' are: The supply of economic-critical raw materials - A search and analysis for causes; Lithium extraction from primary raw materials - state and perspectives; The global market of rare earths - A balancing act; Rare earth deposits in Namibia; New technologies in exploration and discovery - Focus on activities in Europe. The third chapter, ''Secondary Raw Materials and Recycling'', covered the topics: Technology metals - Systemic Requirements along the recycling chain; Integrated re-use of high-tech and greentech wastes; From the sewage sludge ash to the phosphorus fertilizer RecoPhos P38 in the stress field of waste, fertilizer and soil protection. In chapter 4. ''Processing and products'' are the topics: Treatment and processing of rare earth metals; Processing of mineral resources - opportunities and challenges; Consequences of modern germanium chemistry; Strategic resources - Risk management. A review and outlook with a pinch of fantasy.. [de

  6. Algorithms for the Computation of Debris Risk

    Science.gov (United States)

    Matney, Mark J.

    2017-01-01

    Determining the risks from space debris involve a number of statistical calculations. These calculations inevitably involve assumptions about geometry - including the physical geometry of orbits and the geometry of satellites. A number of tools have been developed in NASA’s Orbital Debris Program Office to handle these calculations; many of which have never been published before. These include algorithms that are used in NASA’s Orbital Debris Engineering Model ORDEM 3.0, as well as other tools useful for computing orbital collision rates and ground casualty risks. This paper presents an introduction to these algorithms and the assumptions upon which they are based.

  7. Algorithms for the Computation of Debris Risks

    Science.gov (United States)

    Matney, Mark

    2017-01-01

    Determining the risks from space debris involve a number of statistical calculations. These calculations inevitably involve assumptions about geometry - including the physical geometry of orbits and the geometry of non-spherical satellites. A number of tools have been developed in NASA's Orbital Debris Program Office to handle these calculations; many of which have never been published before. These include algorithms that are used in NASA's Orbital Debris Engineering Model ORDEM 3.0, as well as other tools useful for computing orbital collision rates and ground casualty risks. This paper will present an introduction to these algorithms and the assumptions upon which they are based.

  8. RAFT: a computer program for fault tree risk calculations

    International Nuclear Information System (INIS)

    Seybold, G.D.

    1977-11-01

    A description and user instructions are presented for RAFT, a FORTRAN computer code for calculation of a risk measure for fault tree cut sets. RAFT calculates release quantities and a risk measure based on the product of probability and release quantity for cut sets of fault trees modeling the accidental release of radioactive material from a nuclear fuel cycle facility. Cut sets and their probabilities are supplied as input to RAFT from an external fault tree analysis code. Using the total inventory available of radioactive material, along with release fractions for each event in a cut set, the release terms are calculated for each cut set. Each release term is multiplied by the cut set probability to yield the cut set risk measure. RAFT orders the dominant cut sets on the risk measure. The total risk measure of processed cut sets and their fractional contributions are supplied as output. Input options are available to eliminate redundant cut sets, apply threshold values on cut set probability and risk, and control the total number of cut sets output. Hash addressing is used to remove redundant cut sets from the analysis. Computer hardware and software restrictions are given along with a sample problem and cross-reference table of the code. Except for the use of file management utilities, RAFT is written exclusively in FORTRAN language and is operational on a Control Data, CYBER 74-18--series computer system. 4 figures

  9. SEISMIC RISK CARTOGRAPHIC VISUALIZATION FOR CRISIS MANAGEMENT

    Directory of Open Access Journals (Sweden)

    Nina I. Frolova

    2014-01-01

    Full Text Available Earthquake loss estimations before future events and following strong earthquakesin emergency mode and their corresponding visualization are extremely important for properdecision on preventive measures and effective response in order to save lives and properties. The paper addresses the methodological issues of seismic risk and vulnerability assessment, mapping with GIS technology application. Requirements for simulation models,databases used at different levels, as well as ways of visualizations oriented for EmergencyManagement Agencies, as well federal and local authorities are discussed. Examples ofmapping at the different levels: global, country, region and urban one are given and theinfluence of input data uncertainties on the reliability of loss computations is analyzed.

  10. Risk management through dynamic technical specifications

    International Nuclear Information System (INIS)

    Klopp, George T.; Petersen, Thomas A.

    2004-01-01

    The wide deployment of plant specific probabilistic risk assessments for nuclear power plants has provided the means to effect a fresh risk management perspective and a fresh, risk based, regulatory outlook on nuclear power. There has been a great deal of conversation on risk based regulation within the U. S. nuclear power industry but, curiously, very little on effective risk management. This paper proposes a means to link the two subjects through the plant Technical Specifications. A revised concept for Technical Specifications is suggested which is based on deterministic analyses and probabilistic risk assessments for each plant. The revised Technical Specifications would consider, on a real-time basis, the exact state of the plant in terms of the status of key components and systems. It would depict current plant risk levels and compare those levels to the desired and limiting (alert/action) levels. It would advise the plant operator on the risk impact of proposed actions through a simple query system and illustrate the impact of such actions on plant status relative to designated risk values. The basis for the proposed approach lies in realistic deterministic plant analyses and probabilistic risk assessment (PRA) deployment tools being developed, in parallel, by a number of parties in the U.S. today. These PRAs are based primarily on the existing plant responses to Generic Letter 88-20, 'Individual Plant Examinations' (IPEs). Each of these tools allows the plant operator to input, on a real-time basis, the status of key equipment and systems. The tools then provide explicit illustrations of dependency effects; updated, 'real-time' risk status indications such as core damage frequency; and, in some cases, allow the operator to assess the risk impact of removing from service selected components for maintenance or testing. These systems generally operate on personal computers and provide nearly instantaneous responses to plant queries. Moving from these tools to

  11. Guidelines for developing NASA (National Aeronautics and Space Administration) ADP security risk management plans

    Science.gov (United States)

    Tompkins, F. G.

    1983-01-01

    This report presents guidance to NASA Computer security officials for developing ADP security risk management plans. The six components of the risk management process are identified and discussed. Guidance is presented on how to manage security risks that have been identified during a risk analysis performed at a data processing facility or during the security evaluation of an application system.

  12. Value at Risk models for Energy Risk Management

    OpenAIRE

    Novák, Martin

    2010-01-01

    The main focus of this thesis lies on description of Risk Management in context of Energy Trading. The paper will predominantly discuss Value at Risk and its modifications as a main overall indicator of Energy Risk.

  13. Risk management in product innovation projects

    NARCIS (Netherlands)

    Halman, J.I.M.; Keizer, J.A.

    1993-01-01

    In product innovation projects risk management has become increasingly important. Technological and commercial developments ask for effective and efficient product innovation. Systematic diagnosing and management of risks can help to make product innovation projects successful. In this paper a

  14. Drug utilization research and risk management

    NARCIS (Netherlands)

    Mazzaglia, Giampiero; Mol, Peter G. M.; Elseviers, Monique; Wettermark, Björn; Almarsdóttir, Anna Birna; Andersen, Morten; Benko, Ria; Bennie, Marion; Eriksson, Irene; Godman, Brian; Krska, Janet; Poluzzi, Elisabetta; Taxis, Katja; Vlahovic-Palcevski, Vera; Stichele, Robert Vander

    2016-01-01

    Good risk management requires continuous evaluation and improvement of planned activities. The evaluation impact of risk management activities requires robust study designs and carefully selected outcome measures. Key learnings and caveats from drug utilization research should be applied to the

  15. Operational Risk Management and Military Aviation Safety

    National Research Council Canada - National Science Library

    Ashley, Park

    1999-01-01

    .... The Army's Class A aviation mishap rate declined after it implemented risk management (RM) principles in 1987. This reduction caught the attention of Air Force leadership who have since stated that the application of operational risk management...

  16. Framework of Resource Management for Intercloud Computing

    Directory of Open Access Journals (Sweden)

    Mohammad Aazam

    2014-01-01

    Full Text Available There has been a very rapid increase in digital media content, due to which media cloud is gaining importance. Cloud computing paradigm provides management of resources and helps create extended portfolio of services. Through cloud computing, not only are services managed more efficiently, but also service discovery is made possible. To handle rapid increase in the content, media cloud plays a very vital role. But it is not possible for standalone clouds to handle everything with the increasing user demands. For scalability and better service provisioning, at times, clouds have to communicate with other clouds and share their resources. This scenario is called Intercloud computing or cloud federation. The study on Intercloud computing is still in its start. Resource management is one of the key concerns to be addressed in Intercloud computing. Already done studies discuss this issue only in a trivial and simplistic way. In this study, we present a resource management model, keeping in view different types of services, different customer types, customer characteristic, pricing, and refunding. The presented framework was implemented using Java and NetBeans 8.0 and evaluated using CloudSim 3.0.3 toolkit. Presented results and their discussion validate our model and its efficiency.

  17. Managing Macroeconomic Risks by Using Statistical Simulation

    Directory of Open Access Journals (Sweden)

    Merkaš Zvonko

    2017-06-01

    Full Text Available The paper analyzes the possibilities of using statistical simulation in the macroeconomic risks measurement. At the level of the whole world, macroeconomic risks are, due to the excessive imbalance, significantly increased. Using analytical statistical methods and Monte Carlo simulation, the authors interpret the collected data sets, compare and analyze them in order to mitigate potential risks. The empirical part of the study is a qualitative case study that uses statistical methods and Monte Carlo simulation for managing macroeconomic risks, which is the central theme of this work. Application of statistical simulation is necessary because the system, for which it is necessary to specify the model, is too complex for an analytical approach. The objective of the paper is to point out the previous need for consideration of significant macroeconomic risks, particularly in terms of the number of the unemployed in the society, the movement of gross domestic product and the country’s credit rating, and the use of data previously processed by statistical methods, through statistical simulation, to analyze the existing model of managing the macroeconomic risks and suggest elements for a management model development that will allow, with the lowest possible probability and consequences, the emergence of the recent macroeconomic risks. The stochastic characteristics of the system, defined by random variables as input values defined by probability distributions, require the performance of a large number of iterations on which to record the output of the model and calculate the mathematical expectations. The paper expounds the basic procedures and techniques of discrete statistical simulation applied to systems that can be characterized by a number of events which represent a set of circumstances that have caused a change in the system’s state and the possibility of its application in the field of assessment of macroeconomic risks. The method has no

  18. THEORETICAL BASIS FOR MANAGEMENT OF PERSONNEL RISKS

    OpenAIRE

    Haliashova, Katsiaryna

    2017-01-01

    Necessity of personnel risks management is based on research results. The authors' approaches to the determination of personnel risks and to their management have been explored. The author's definition of the concept of "personnel risks" is proposed. A classification of personnel risks is developed depending on the stage of origin and the tasks of the personnel policy, as well as the methods of management personnel risks in the organization. The article presents a methodical approach to perso...

  19. Functions of the computer management games

    OpenAIRE

    Kočí, Josef

    2016-01-01

    This thesis discusses the possibilities of using managerial games, their purpose, meaning, functions and focuses specifically on the management computer games, how it differs from classic games and what are their advantages and disadvantages. The theoretical part of thesis is also focused on why are these games discussed, why are they accepted or sometimes rejected and why they have become so popular for some managers and public gamers. This will serve me a survey conducted in the 11 April 20...

  20. 12 CFR 932.1 - Risk management.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Risk management. 932.1 Section 932.1 Banks and Banking FEDERAL HOUSING FINANCE BOARD FEDERAL HOME LOAN BANK RISK MANAGEMENT AND CAPITAL STANDARDS FEDERAL HOME LOAN BANK CAPITAL REQUIREMENTS § 932.1 Risk management. Before its new capital plan may take...

  1. Study of International Standards of Risk Management

    Directory of Open Access Journals (Sweden)

    Dykan Volodymyr L.

    2014-01-01

    Full Text Available The goal of the article lies in the study of existing international standards of risk management, an important factor of improvement of risk management in domestic corporations and enterprises and development of recommendations on application of international standards in Ukraine, in particular, within the framework of building corporate systems of risk management. The conducted study shows that approaches on organisation of the process of risk management, used in standards of risk management, are of general character and differ with the degree of detailing. Their undoubted value in development of risk management in Ukraine is identification of a general direction of building corporate systems of risk management in practice. The said approaches at the national and corporate levels of standardisation in Ukraine within the framework of building corporate systems of risk management would allow improvement of risk management in corporations and enterprises. The prospect of further studies of domestic specialists in the field of risk management is development of the domestic standard of risk management with consideration of modern domestic specific features of development of risk management in Ukraine and leading foreign experience.

  2. Effect of a computer-guided, quality improvement program for cardiovascular disease risk management in primary health care: the treatment of cardiovascular risk using electronic decision support cluster-randomized trial.

    Science.gov (United States)

    Peiris, David; Usherwood, Tim; Panaretto, Kathryn; Harris, Mark; Hunt, Jennifer; Redfern, Julie; Zwar, Nicholas; Colagiuri, Stephen; Hayman, Noel; Lo, Serigne; Patel, Bindu; Lyford, Marilyn; MacMahon, Stephen; Neal, Bruce; Sullivan, David; Cass, Alan; Jackson, Rod; Patel, Anushka

    2015-01-01

    Despite effective treatments to reduce cardiovascular disease risk, their translation into practice is limited. Using a parallel arm cluster-randomized controlled trial in 60 Australian primary healthcare centers, we tested whether a multifaceted quality improvement intervention comprising computerized decision support, audit/feedback tools, and staff training improved (1) guideline-indicated risk factor measurements and (2) guideline-indicated medications for those at high cardiovascular disease risk. Centers had to use a compatible software system, and eligible patients were regular attendees (Aboriginal and Torres Strait Islander people aged ≥ 35 years and others aged ≥ 45 years). Patient-level analyses were conducted using generalized estimating equations to account for clustering. Median follow-up for 38,725 patients (mean age, 61.0 years; 42% men) was 17.5 months. Mean monthly staff support was improved overall risk factor measurements (62.8% versus 53.4% risk ratio; 1.25; 95% confidence interval, 1.04-1.50; P=0.02), but there was no significant differences in recommended prescriptions for the high-risk cohort (n=10,308; 56.8% versus 51.2%; P=0.12). There were significant treatment escalations (new prescriptions or increased numbers of medicines) for antiplatelet (17.9% versus 2.7%; Pquality improvement intervention, requiring minimal support, improved cardiovascular disease risk measurement but did not increase prescription rates in the high-risk group. Computerized quality improvement tools offer an important, albeit partial, solution to improving primary healthcare system capacity for cardiovascular disease risk management. https://www.anzctr.org.au/Trial/Registration/TrialReview.aspx?id=336630. Australian New Zealand Clinical Trials Registry No. 12611000478910. © 2015 American Heart Association, Inc.

  3. Computer-aided reliability and risk assessment

    International Nuclear Information System (INIS)

    Leicht, R.; Wingender, H.J.

    1989-01-01

    Activities in the fields of reliability and risk analyses have led to the development of particular software tools which now are combined in the PC-based integrated CARARA system. The options available in this system cover a wide range of reliability-oriented tasks, like organizing raw failure data in the component/event data bank FDB, performing statistical analysis of those data with the program FDA, managing the resulting parameters in the reliability data bank RDB, and performing fault tree analysis with the fault tree code FTL or evaluating the risk of toxic or radioactive material release with the STAR code. (orig.)

  4. Construction Management Risk System (CMRS for Construction Management (CM Firms

    Directory of Open Access Journals (Sweden)

    Kyungmo Park

    2017-02-01

    Full Text Available After the global financial crisis of 2008, the need for risk management arose because it was necessary to minimize the losses in construction management (CM firms. This was caused by a decreased amount of orders in the Korean CM market, which intensified order competition between companies. However, research results revealed that risks were not being systematically managed owing to the absence of risk management systems. Thus, it was concluded that it was necessary to develop standard operating systems and implement risk management systems in order to manage risks effectively. Therefore, the purpose of this study was to develop a construction risk management system (CRMS for systematically managing risks. For this purpose, the field operation managers of CM firms were interviewed and surveyed in order to define risk factors. Upon this, a risk assessment priority analysis was performed. Finally, a risk management system that comprised seven modules and 20 sub-modules and was capable of responding systematically to risks was proposed. Furthermore, the effectiveness of this system was verified through on-site inspection. This system allows early response to risks, accountability verification and immediate response to legal disputes with clients by managing risk records.

  5. Cloud Computing Services: Benefits, Risks and Intellectual Property Issues

    Directory of Open Access Journals (Sweden)

    IONELA BĂLŢĂTESCU

    2014-05-01

    Full Text Available Major software players of the global market, such as Google, Amazon and Microsoft are developing cloud computing solutions, providing cloud services on demand: Infrastructure as a Service (IaaS, Platform as a Service (PaaS and Software as a service (SaaS. In software industry and also in ICT services market, cloud computing is playing an increasingly important role. Moreover, the expansion of cloud services indirectly contributed to the development and improvement of other types of services on the market – financial and accounting services, human resources services, educational services etc. – in terms of quality and affordability. Given the fact that cloud computing applications proved to be more affordable for small and medium enterprises (SME, an increasing number of companies in almost all the fields of activity have chosen cloud based solutions, such as Enterprise Resource Management (ERP software and Customer Relationship Management (CRM software. However, cloud computing services involve also some risks concerning privacy, security of data and lack of interoperability between cloud platforms. Patent strategy of certain proprietary software companies leaded to a veritable “patent war” and “patent arm race” endangering the process of standardization in software industry, especially in cloud computing. Intellectual property (IP legislation and court ruling in patent litigations is likely to have a significant impact on the development of cloud computing industry and cloud services.

  6. Development of funding project risk management tools.

    Science.gov (United States)

    2013-11-01

    Funding project risk management is a process for identifying, assessing, and prioritizing project funding risks. To plan to : minimize or eliminate the impact of negative events, one must identify what projects have higher risk to respond to potentia...

  7. Risk management and audit | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    ... a well defined strategic and program framework and sound management processes; and ... A Risk Management Committee supports and monitors the Centre's ... placed on our highly qualified staff in our management of human resources.

  8. Managing risk with renewable resources

    International Nuclear Information System (INIS)

    Brower, M.C.; Bernow, S.; Duckworth, M.; Spinney, P.; Bell, K.

    1997-01-01

    One approach to managing risk is for a utility company to invest in diverse power sources such as wind power plants. Since wind plants consume no fuel, can be built in relatively small increments with short construction lead times, and generate no pollutants, it is often said that they offer significant protection from risks associated with conventional fossil-fuel power plants. With assistance from Convergence Research, Charles River Associates, and the Tellus Institute, the authors tested this hypothesis by conducting an in-depth analysis of the risk implications of a decision to build a 1,600 MW wind power plant instead of a 400 MW gas-fired combined cycle plant. (The two plants were assumed to have equal firm capacity.) The case study utility was Texas Utilities Electric, a very large investor-owned company serving an area with substantial, high-quality wind resources. The uncertain inputs included fuel prices, environmental regulations (specifically, CO 2 and air pollution controls), wind plant output, conventional plant availability, and load growth. Two different market scenarios were examined: traditional regulation and an unregulated wholesale market characterized either by a power pool or fixed-price contracts of varying duration. Conclusions are striking: under traditional regulation, wind energy provides a net present-value risk-reduction benefit of $3.4 to $7.8/MWh

  9. Managing risks: Seveso and Harrisburg

    International Nuclear Information System (INIS)

    Conrads-Herzog, A.; Krebsbach-Gnath, C.

    1980-01-01

    The publications dealing with the technical, organisation-relevant, and social preconditions for risk strategies rely on second-hand information, i.e. the conclusions which are drawn from the production accident in Seveso and the TMI-accident. A comparison results in common facts as well as in fundamental differences. In contrast to the authorities in Italy the authorities in the United States intervened more rapidly; the management of necessary measures was taken over by the authorities and very good information was given. (DG) [de

  10. A computer-based purchase management system

    International Nuclear Information System (INIS)

    Kuriakose, K.K.; Subramani, M.G.

    1989-01-01

    The details of a computer-based purchase management system developed to meet the specific requirements of Madras Regional Purchase Unit (MRPU) is given. Howe ver it can be easily modified to meet the requirements of any other purchase department. It covers various operations of MRPU starting from indent processing to preparation of purchase orders and reminders. In order to enable timely management action and control facilities are provided to generate the necessary management information reports. The scope for further work is also discussed. The system is completely menu driven and user friendly. Appendix A and B contains the menu implemented and the sample outputs respectively. (author)

  11. Computer-Aided Corrosion Program Management

    Science.gov (United States)

    MacDowell, Louis

    2010-01-01

    This viewgraph presentation reviews Computer-Aided Corrosion Program Management at John F. Kennedy Space Center. The contents include: 1) Corrosion at the Kennedy Space Center (KSC); 2) Requirements and Objectives; 3) Program Description, Background and History; 4) Approach and Implementation; 5) Challenges; 6) Lessons Learned; 7) Successes and Benefits; and 8) Summary and Conclusions.

  12. Integrated Geo Hazard Management System in Cloud Computing Technology

    Science.gov (United States)

    Hanifah, M. I. M.; Omar, R. C.; Khalid, N. H. N.; Ismail, A.; Mustapha, I. S.; Baharuddin, I. N. Z.; Roslan, R.; Zalam, W. M. Z.

    2016-11-01

    Geo hazard can result in reducing of environmental health and huge economic losses especially in mountainous area. In order to mitigate geo-hazard effectively, cloud computer technology are introduce for managing geo hazard database. Cloud computing technology and it services capable to provide stakeholder's with geo hazards information in near to real time for an effective environmental management and decision-making. UNITEN Integrated Geo Hazard Management System consist of the network management and operation to monitor geo-hazard disaster especially landslide in our study area at Kelantan River Basin and boundary between Hulu Kelantan and Hulu Terengganu. The system will provide easily manage flexible measuring system with data management operates autonomously and can be controlled by commands to collects and controls remotely by using “cloud” system computing. This paper aims to document the above relationship by identifying the special features and needs associated with effective geohazard database management using “cloud system”. This system later will use as part of the development activities and result in minimizing the frequency of the geo-hazard and risk at that research area.

  13. Data security and risk assessment in cloud computing

    Directory of Open Access Journals (Sweden)

    Li Jing

    2018-01-01

    Full Text Available Cloud computing has attracted more and more attention as it reduces the cost of IT infrastructure of organizations. In our country, business Cloud services, such as Alibaba Cloud, Huawei Cloud, QingCloud, UCloud and so on are gaining more and more uses, especially small or median organizations. In the cloud service scenario, the program and data are migrating into cloud, resulting the lack of trust between customers and cloud service providers. However, the recent study on Cloud computing is mainly focused on the service side, while the data security and trust have not been sufficiently studied yet. This paper investigates into the data security issues from data life cycle which includes five steps when an organization uses Cloud computing. A data management framework is given out, including not only the data classification but also the risk management framework. Concretely, the data is divided into two varieties, business and personal information. And then, four classification levels (high, medium, low, normal according to the different extent of the potential adverse effect is introduced. With the help of classification, the administrators can identify the application or data to implement corresponding security controls. At last, the administrators conduct the risk assessment to alleviate the risk of data security. The trust between customers and cloud service providers will be strengthen through this way.

  14. TRECII: a computer program for transportation risk assessment

    International Nuclear Information System (INIS)

    Franklin, A.L.

    1980-05-01

    A risk-based fault tree analysis method has been developed at the Pacific Northwest Laboratory (PNL) for analysis of nuclear fuel cycle operations. This methodology was developed for the Department of Energy (DOE) as a risk analysis tool for evaluating high level waste management systems. A computer package consisting of three programs was written at that time to assist in the performance of risk assessment: ACORN (draws fault trees), MFAULT (analyzes fault trees), and RAFT (calculates risk). This methodology evaluates release consequences and estimates the frequency of occurrence of these consequences. This document describes an additional risk calculating code which can be used in conjunction with two of the three codes for transportation risk assessment. TRECII modifies the definition of risk used in RAFT (prob. x release) to accommodate release consequences in terms of fatalities. Throughout this report risk shall be defined as probability times consequences (fatalities are one possible health effect consequence). This methodology has been applied to a variety of energy material transportation systems. Typically the material shipped has been radioactive, although some adaptation to fossil fuels has occurred. The approach is normally applied to truck or train transport systems with some adaptation to pipelines and aircraft. TRECII is designed to be used primarily in conjunction with MFAULT; however, with a moderate amount of effort by the user, it can be implemented independent of the risk analysis package developed at PNL. Code description and user instructions necessary for the implementation of the TRECII program are provided

  15. Computational Intelligence in Highway Management: A Review

    Directory of Open Access Journals (Sweden)

    Ondrej Pribyl

    2015-10-01

    Full Text Available Highway management systems are used to improve safety and driving comfort on highways by using control strategies and providing information and warnings to drivers. They use several strategies starting from speed and lane management, through incident detection and warning systems, ramp metering, weather information up to, for example, informing drivers about alternative roads. This paper provides a review of the existing approaches to highway management systems, particularly speed harmonization and ramp metering. It is focused only on modern and advanced approaches, such as soft computing, multi-agent methods and their interconnection. Its objective is to provide guidance in the wide field of highway management and to point out the most relevant recent activities which demonstrate that development in the field of highway management is still important and that the existing research exhibits potential for further enhancement.

  16. Managing project risks and uncertainties

    Directory of Open Access Journals (Sweden)

    Mike Mentis

    2015-01-01

    Full Text Available This article considers threats to a project slipping on budget, schedule and fit-for-purpose. Threat is used here as the collective for risks (quantifiable bad things that can happen and uncertainties (poorly or not quantifiable bad possible events. Based on experience with projects in developing countries this review considers that (a project slippage is due to uncertainties rather than risks, (b while eventuation of some bad things is beyond control, managed execution and oversight are still the primary means to keeping within budget, on time and fit-for-purpose, (c improving project delivery is less about bigger and more complex and more about coordinated focus, effectiveness and developing thought-out heuristics, and (d projects take longer and cost more partly because threat identification is inaccurate, the scope of identified threats is too narrow, and the threat assessment product is not integrated into overall project decision-making and execution. Almost by definition, what is poorly known is likely to cause problems. Yet it is not just the unquantifiability and intangibility of uncertainties causing project slippage, but that they are insufficiently taken into account in project planning and execution that cause budget and time overruns. Improving project performance requires purpose-driven and managed deployment of scarce seasoned professionals. This can be aided with independent oversight by deeply experienced panelists who contribute technical insights and can potentially show that diligence is seen to be done.

  17. Enterprise Content Management Implementation and Risk

    Directory of Open Access Journals (Sweden)

    Jaroslava Klegová

    2015-01-01

    Full Text Available Enterprise Content Management (ECM solutions are commonly used in many areas such as document management, record management, digital asset management, etc. Key features of ECM systems are capturing, indexing, preserving and retrieving of digital information. The state-of-the- art ECM solution can help revolutionize document management and further automated business processes which can lead to better decisions and competitive advantage. Risk management can reduce project failure and that is why controlling risk in ECM implementation projects is considered to be a major contributor to project success. To manage software risk, the first step is to identify a list of ECM projects’ risks. The present paper provides an overview of ECM implementation risks and contains findings from a small survey on experience of ECM implementation and risk in Czech enterprises. Risk of implementation in the public sector is discussed more deeply with case study examples.

  18. Risk management and energy systems

    International Nuclear Information System (INIS)

    Carlevaro, F.; Romerio, F.

    1992-01-01

    In five sessions the following topics were dealt with: risk problems, risk analysis and evaluation tools, risks in industrial societies, risks of energy production, technological risks, ethics and political-social consensus. figs., tabs., refs

  19. PERFORMANCE IN INTERNAL CONTROL AND RISK MANAGEMENT

    Directory of Open Access Journals (Sweden)

    JELER (POPA IOANA

    2017-06-01

    Full Text Available The purpose of this article is to highlight the importance of internal control and risk management. In practice, economic entities meet a variety of risks that have the origins from the internal environment or the external one. Although there are different of views on addressing the concept of risk - threats or opportunities, event or action, accordingly uncertain, proposed by specialists in risk management in this article we try to present these issues and identify techniques to counter risks occurrence. In this article we present also means managing risk and why needs to be implemented at institutional level a risk management. The paper concludes by highlight the role of efficient risk management in the company’s management and company's activities.

  20. Calysto: Risk Management for Commercial Manned Spaceflight

    Science.gov (United States)

    Dillaman, Gary

    2012-01-01

    The Calysto: Risk Management for Commercial Manned Spaceflight study analyzes risk management in large enterprises and how to effectively communicate risks across organizations. The Calysto Risk Management tool developed by NASA's Kennedy Space Center's SharePoint team is used and referenced throughout the study. Calysto is a web-base tool built on Microsoft's SharePoint platform. The risk management process at NASA is examined and incorporated in the study. Using risk management standards from industry and specific organizations at the Kennedy Space Center, three methods of communicating and elevating risk are examined. Each method describes details of the effectiveness and plausibility of using the method in the Calysto Risk Management Tool. At the end of the study suggestions are made for future renditions of Calysto.

  1. Commercializing fuel cells: managing risks

    Science.gov (United States)

    Bos, Peter B.

    Commercialization of fuel cells, like any other product, entails both financial and technical risks. Most of the fuel cell literature has focussed upon technical risks, however, the most significant risks during commercialization may well be associated with the financial funding requirements of this process. Successful commercialization requires an integrated management of these risks. Like any developing technology, fuel cells face the typical 'Catch-22' of commercialization: "to enter the market, the production costs must come down, however, to lower these costs, the cumulative production must be greatly increased, i.e. significant market penetration must occur". Unless explicit steps are taken to address this dilemma, fuel cell commercialization will remain slow and require large subsidies for market entry. To successfully address this commercialization dilemma, it is necessary to follow a market-driven commercialization strategy that identifies high-value entry markets while minimizing the financial and technical risks of market entry. The financial and technical risks of fuel cell commercialization are minimized, both for vendors and end-users, with the initial market entry of small-scale systems into high-value stationary applications. Small-scale systems, in the order of 1-40 kW, benefit from economies of production — as opposed to economies to scale — to attain rapid cost reductions from production learning and continuous technological innovation. These capital costs reductions will accelerate their commercialization through market pull as the fuel cell systems become progressively more viable, starting with various high-value stationary and, eventually, for high-volume mobile applications. To facilitate market penetration via market pull, fuel cell systems must meet market-derived economic and technical specifications and be compatible with existing market and fuels infrastructures. Compatibility with the fuels infrastructure is facilitated by a

  2. Managing Risks in Dry Port Operations

    OpenAIRE

    Ciortescu Cezar-Gabriel; Pãvãla?cu Narcis Sebastian

    2012-01-01

    The purpose of this paper is to have an in-depth look into the phenomenon of risk assessment and risk management strategies in managing dry port operations as an integrated part into international containerized freight trade. The fact that world crises take the form of disruptions, bankruptcies, breakdowns, macroeconomic and political changes, and disasters leads to higher risks and makes risk management more and more difficult. This paper aims to discuss the theory behind the dry port concep...

  3. BEHAVIOURAL INSIGHTS INTO SUPPLY CHAIN RISK MANAGEMENT

    OpenAIRE

    Alexandra-Codruta Popescu (Bîzoi); Cristian-Gabriel Bîzoi

    2015-01-01

    Literature has focused largely on the field of supply chain risk management. Numerous risks occur within supply chain management. Until lately, behavioural risks (implying large amount of losses) have been neglected and considered not relevant. In this paper we provide an analysis of the importance of including behavioural research in logistics and supply chain risk management, what has been written so far and potential future research directions. Until now, literature on logistics and supply...

  4. Probability concepts in quality risk management.

    Science.gov (United States)

    Claycamp, H Gregg

    2012-01-01

    Essentially any concept of risk is built on fundamental concepts of chance, likelihood, or probability. Although risk is generally a probability of loss of something of value, given that a risk-generating event will occur or has occurred, it is ironic that the quality risk management literature and guidelines on quality risk management tools are relatively silent on the meaning and uses of "probability." The probability concept is typically applied by risk managers as a combination of frequency-based calculation and a "degree of belief" meaning of probability. Probability as a concept that is crucial for understanding and managing risk is discussed through examples from the most general, scenario-defining and ranking tools that use probability implicitly to more specific probabilistic tools in risk management. A rich history of probability in risk management applied to other fields suggests that high-quality risk management decisions benefit from the implementation of more thoughtful probability concepts in both risk modeling and risk management. Essentially any concept of risk is built on fundamental concepts of chance, likelihood, or probability. Although "risk" generally describes a probability of loss of something of value, given that a risk-generating event will occur or has occurred, it is ironic that the quality risk management literature and guidelines on quality risk management methodologies and respective tools focus on managing severity but are relatively silent on the in-depth meaning and uses of "probability." Pharmaceutical manufacturers are expanding their use of quality risk management to identify and manage risks to the patient that might occur in phases of the pharmaceutical life cycle from drug development to manufacture, marketing to product discontinuation. A probability concept is typically applied by risk managers as a combination of data-based measures of probability and a subjective "degree of belief" meaning of probability. Probability as

  5. Risk management frameworks for human health and environmental risks.

    Science.gov (United States)

    Jardine, Cindy; Hrudey, Steve; Shortreed, John; Craig, Lorraine; Krewski, Daniel; Furgal, Chris; McColl, Stephen

    2003-01-01

    A comprehensive analytical review of the risk assessment, risk management, and risk communication approaches currently being undertaken by key national, provincial/state, territorial, and international agencies was conducted. The information acquired for review was used to identify the differences, commonalities, strengths, and weaknesses among the various approaches, and to identify elements that should be included in an effective, current, and comprehensive approach applicable to environmental, human health and occupational health risks. More than 80 agencies, organizations, and advisory councils, encompassing more than 100 risk documents, were examined during the period from February 2000 until November 2002. An overview was made of the most important general frameworks for risk assessment, risk management, and risk communication for human health and ecological risk, and for occupational health risk. In addition, frameworks for specific applications were reviewed and summarized, including those for (1)contaminated sites; (2) northern contaminants; (3) priority substances; (4) standards development; (5) food safety; (6) medical devices; (7) prescription drug use; (8) emergency response; (9) transportation; (10) risk communication. Twelve frameworks were selected for more extensive review on the basis of representation of the areas of human health, ecological, and occupational health risk; relevance to Canadian risk management needs; representation of comprehensive and well-defined approaches; generalizability with their risk areas; representation of "state of the art" in Canada, the United States, and/or internationally; and extent of usage of potential usage within Canada. These 12 frameworks were: 1. Framework for Environmental Health Risk Management (US Presidential/Congressional Commission on Risk Assessment and Risk Management, 1997). 2. Health Risk Determination: The Challenge of Health Protection (Health and Welfare Canada, 1990). 3. Health Canada Decision

  6. Credit Risk Evaluation : Modeling - Analysis - Management

    OpenAIRE

    Wehrspohn, Uwe

    2002-01-01

    An analysis and further development of the building blocks of modern credit risk management: -Definitions of default -Estimation of default probabilities -Exposures -Recovery Rates -Pricing -Concepts of portfolio dependence -Time horizons for risk calculations -Quantification of portfolio risk -Estimation of risk measures -Portfolio analysis and portfolio improvement -Evaluation and comparison of credit risk models -Analytic portfolio loss distributions The thesis contributes to the evaluatio...

  7. RISK MANAGEMENT OF GERMAN FRUIT PRODUCERS

    Directory of Open Access Journals (Sweden)

    Annkatrin PORSCH

    2018-03-01

    Full Text Available Horticultural farms in Germany face substantial business risks. However, fruit farms often struggle to implement appropriate risk management processes, and the risk management literature widely has ignored this farm type. The aim of the study was to improve the assessment of risks by farmers and the choice of suitable risk management instruments. Therefore, a risk management process based on subjective probabilities and suitable for small and medium-sized farms was developed, considering the specific needs of family run businesses. An online survey was conducted to achieve a comprehensive view of the risk perception and risk management practices of German fruit producers. Price and production risks are the most relevant risk categories for fruit farmers. However, among single risk sources, those in the people risk category were seen as the most important. Results show significant interactions among risk categories and a significant correlation between loss experience and the rating of risk categories. The assumption that risk averse farmers generally rate risks higher than risk neutral or risk seeking farmers cannot be confirmed. Diversification seems to be the most important risk management instrument for many fruit producers, especially diversification of marketing channels, farm income, and production activities. Further research should focus on the apparent inconsistency between the satisfaction with instruments reported by farmers and the actual implementation of many of them (e.g., hail insurance and anti-hail net. Furthermore, there is a need for research, to develop decision models considering the interactions of risks and risk management instruments, loss experience and risk seeking attitudes.

  8. CEA - Assessment of risk management 2013

    International Nuclear Information System (INIS)

    Bigot, Bernard; Bonnevie, Edwige; Maillot, Bernard

    2014-06-01

    After some introducing texts by CEA managers, this report proposes a rather detailed overview and presentation of CEA activities, objectives and obtained results in different fields: protection and control of the environment, installation safety, health, safety and radiation protection, transports of hazardous materials, waste management, protection of sites, installations and heritage, management of emergency situations, management of legal risks, internal controls and audits, activity of the risk management department, CEA activities from research to industry

  9. Computer-assisted power plant management

    International Nuclear Information System (INIS)

    Boettcher, D.

    1990-01-01

    Operating a power plant and keeping it operational is ensured by a multiplicity of technical management subtasks which are cross referenced and based on an extensive inventory of descriptive and operational plant data. These data stocks are still registered in an isolated mode and managed and updated manually. This is a labor intensive, error prone procedure. In this situation, the introduction of a computer-assisted plant management system, whose core is a data-base of assured quality common to all activities, and which contains standardized processing aids fully planned for the subtasks occurring in the plant, is likely to achieve a considerable improvement in the quality of plant management and to relieve the staff of administrative activities. (orig.) [de

  10. [The relevance of clinical risk management].

    Science.gov (United States)

    Gulino, Matteo; Vergallo, Gianluca Montanari; Frati, Paola

    2011-01-01

    Medical activity includes a risk of possible injury or complications for the patients, that should drive the Health Care Institutions to introduce and/ or improve clinical Risk management instruments. Although Italy is still lacking a National project of Clinical Risk Management, a number of efforts have been made by different Italian Regions to introduce instruments of risk management. In addition, most of National Health Care Institutions include actually a Department specifically in charge to manage the clinical risk. Despite the practical difficulties, the results obtained until now suggest that the risk management may represent a useful instrument to contribute to the reduction of errors in clinical conduct. Indeed, the introduction of adequate instruments of prevention and management of clinical risk may help to ameliorate the quality of health care Institution services.

  11. Contradictions Between Risk Management and Sustainable Development

    Energy Technology Data Exchange (ETDEWEB)

    Olsen, Odd Einar; Langhelle, Oluf; Engen, Ole A. [Univ. of Stavanger (Norway). Dept. of Media, Culture and Social Science

    2006-09-15

    The aim of this paper is to discuss how risk management as a methodology and mindset influence on priorities and decisions concerning sustainable development. Management of risks and hazards often rely on partial analysis with a limited time frame. This may lead to a paradoxical situation where risk management and extended use of risk analysis could hamper long term sustainable development. The question is: Does the use of risk and vulnerability analysis (RaV-analysis) hamper or contribute to sustainable development? Because risk management and assessment has a more narrow scope and a limited time perspective based on well established methodologies, the tangible impacts of risk reducing measures in a project is easier to calculate than long-term and intangible impacts on global development. Empirical evidence is still scarce, but our preliminary conclusion is that mainstream risk management and assessments is counterproductive to sustainable development.

  12. Contradictions Between Risk Management and Sustainable Development

    International Nuclear Information System (INIS)

    Olsen, Odd Einar; Langhelle, Oluf; Engen, Ole A.

    2006-01-01

    The aim of this paper is to discuss how risk management as a methodology and mindset influence on priorities and decisions concerning sustainable development. Management of risks and hazards often rely on partial analysis with a limited time frame. This may lead to a paradoxical situation where risk management and extended use of risk analysis could hamper long term sustainable development. The question is: Does the use of risk and vulnerability analysis (RaV-analysis) hamper or contribute to sustainable development? Because risk management and assessment has a more narrow scope and a limited time perspective based on well established methodologies, the tangible impacts of risk reducing measures in a project is easier to calculate than long-term and intangible impacts on global development. Empirical evidence is still scarce, but our preliminary conclusion is that mainstream risk management and assessments is counterproductive to sustainable development

  13. Risk management with options and futures under liquidity risk

    OpenAIRE

    Adam-Müller, A F A; Panaretou, A

    2009-01-01

    Futures hedging creates liquidity risk through marking to market. Liquidity risk matters if interim losses on a futures position have to be financed at a markup over the risk-free rate. This study analyzes the optimal risk management and production decisions of a firm facing joint price and liquidity risk. It provides a rationale for the use of options on futures in imperfect capital markets. If liquidity risk materializes, the firm sells options on futures in order to partly cover this liqui...

  14. Cattle farmers’ perceptions of risk and risk management strategies

    DEFF Research Database (Denmark)

    Bishu, Kinfe G.; O'Reilly, Seamus; Lahiff, Edward

    2018-01-01

    This study analyzes cattle farmers’ perceptions of risk and risk management strategies in Tigray, Northern Ethiopia. We use survey data from a sample of 356 farmers based on multistage random sampling. Factor analysis is employed to classify scores of risk and management strategies, and multiple...... utilization were perceived as the most important strategies for managing risks. Livestock disease and labor shortage were perceived as less of a risk by farmers who adopted the practice of zero grazing compared to other farmers, pointing to the potential of this practice for risk reduction. We find strong...... evidence that farmers engage in multiple risk management practices in order to reduce losses from cattle morbidity and mortality. The results suggest that government strategies that aim at reducing farmers’ risk need to be tailored to specific farm and farmer characteristics. Findings from this study have...

  15. Risks and crises for healthcare providers: the impact of cloud computing.

    Science.gov (United States)

    Glasberg, Ronald; Hartmann, Michael; Draheim, Michael; Tamm, Gerrit; Hessel, Franz

    2014-01-01

    We analyze risks and crises for healthcare providers and discuss the impact of cloud computing in such scenarios. The analysis is conducted in a holistic way, taking into account organizational and human aspects, clinical, IT-related, and utilities-related risks as well as incorporating the view of the overall risk management.

  16. Risks and Crises for Healthcare Providers: The Impact of Cloud Computing

    OpenAIRE

    Glasberg, Ronald; Hartmann, Michael; Draheim, Michael; Tamm, Gerrit; Hessel, Franz

    2014-01-01

    We analyze risks and crises for healthcare providers and discuss the impact of cloud computing in such scenarios. The analysis is conducted in a holistic way, taking into account organizational and human aspects, clinical, IT-related, and utilities-related risks as well as incorporating the view of the overall risk management.

  17. Risks and Crises for Healthcare Providers: The Impact of Cloud Computing

    Directory of Open Access Journals (Sweden)

    Ronald Glasberg

    2014-01-01

    Full Text Available We analyze risks and crises for healthcare providers and discuss the impact of cloud computing in such scenarios. The analysis is conducted in a holistic way, taking into account organizational and human aspects, clinical, IT-related, and utilities-related risks as well as incorporating the view of the overall risk management.

  18. Hazard evaluation and risk management

    International Nuclear Information System (INIS)

    Fritzsche, A.F.

    1986-01-01

    The eigth chapter deals with the actual handling of hazards. The principal issue concerns man's behaviour towards hazards as an individual formerly and today; the evaluation of expected results of both a positive and a negative kind as determined by the individual's values which may differ and vary greatly from one individual to the next. The evaluation of benefit and hazard as well as the risk management resulting from decision-taking are political processes in the democratic state. Formal decision-taking tools play a major role in this process which concerns such central issues like who will participate; how the decision is arrived at; the participation of citizens; specialist knowledge and participation of the general public. (HSCH) [de

  19. Benchmarking Outdoor Expeditionary Program Risk Management Strategies

    Science.gov (United States)

    Meerts-Brandsma, Lisa; Furman, Nate; Sibthorp, Jim

    2017-01-01

    In 2003, the University of Utah and the National Outdoor Leadership School (NOLS) completed a study that developed a risk management taxonomy in the outdoor adventure industry and assessed how different outdoor expeditionary programs (OEPs) managed risk (Szolosi, Sibthorp, Paisley, & Gookin, 2003). By unifying the language around risk, the…

  20. Information risk management a practitioner's guide

    CERN Document Server

    Sutton, David

    2014-01-01

    Information risk management (IRM) is about identifying, assessing and prioritising risks to keep information secure and available. This accessible book provides practical guidance to the principles and development of a strategic approach to an IRM programme. The only textbook for the BCS Practitioner Certificate in Information Risk Management.

  1. Active Risk Management and Banking Stability

    NARCIS (Netherlands)

    Silva Buston, C.F.

    2013-01-01

    Abstract: This paper analyzes the net impact of two opposing effects of active risk management at banks on their stability: higher risk-taking incentives and better isolation of credit supply from varying economic conditions. We present a model where banks actively manage their portfolio risk by

  2. Risk Management and Financial Derivatives: An Overview

    NARCIS (Netherlands)

    S.M. Hammoudeh (Shawkat); M.J. McAleer (Michael)

    2012-01-01

    textabstractRisk management is crucial for optimal portfolio management. One of the fastest growing areas in empirical finance is the expansion of financial derivatives. The purpose of this special issue on “Risk Management and Financial Derivatives” is to highlight some areas in which novel

  3. Risk management at Lawrence Livermore National Laboratory

    International Nuclear Information System (INIS)

    Cummings, G.E.; Strait, R.S.

    1993-10-01

    Managing risks at a large national laboratory presents a unique set of challenges. These challenges include the management of a broad diversity of activities, the need to balance research flexibility against management control, and a plethora of requirements flowing from regulatory and oversight bodies. This paper will present the experiences of Lawrence Livermore National Laboratory (LLNL) in risk management and in dealing with these challenges. While general risk management has been practiced successfully by all levels of Laboratory management, this paper will focus on the Laboratory's use of probabilistic safety assessment and prioritization techniques and the integration of these techniques into Laboratory operations

  4. Turning Video Resource Management into Cloud Computing

    Directory of Open Access Journals (Sweden)

    Weili Kou

    2016-07-01

    Full Text Available Big data makes cloud computing more and more popular in various fields. Video resources are very useful and important to education, security monitoring, and so on. However, issues of their huge volumes, complex data types, inefficient processing performance, weak security, and long times for loading pose challenges in video resource management. The Hadoop Distributed File System (HDFS is an open-source framework, which can provide cloud-based platforms and presents an opportunity for solving these problems. This paper presents video resource management architecture based on HDFS to provide a uniform framework and a five-layer model for standardizing the current various algorithms and applications. The architecture, basic model, and key algorithms are designed for turning video resources into a cloud computing environment. The design was tested by establishing a simulation system prototype.

  5. Data management on the fusion computational pipeline

    International Nuclear Information System (INIS)

    Klasky, S; Beck, M; Bhat, V; Feibush, E; Ludaescher, B; Parashar, M; Shoshani, A; Silver, D; Vouk, M

    2005-01-01

    Fusion energy science, like other science areas in DOE, is becoming increasingly data intensive and network distributed. We discuss data management techniques that are essential for scientists making discoveries from their simulations and experiments, with special focus on the techniques and support that Fusion Simulation Project (FSP) scientists may need. However, the discussion applies to a broader audience since most of the fusion SciDAC's, and FSP proposals include a strong data management component. Simulations on ultra scale computing platforms imply an ability to efficiently integrate and network heterogeneous components (computational, storage, networks, codes, etc), and to move large amounts of data over large distances. We discuss the workflow categories needed to support such research as well as the automation and other aspects that can allow an FSP scientist to focus on the science and spend less time tending information technology

  6. Risk factor management: antiatherogenic therapies.

    Science.gov (United States)

    Gielen, Stephan; Sandri, Marcus; Schuler, Gerhard; Teupser, Daniel

    2009-08-01

    Despite the advances in interventional techniques, the management of stable atherosclerosis remains the domain of optimal guideline-oriented therapy. Recent studies on the effects of aggressive lipid lowering on atheroma volume changes using intravascular ultrasound indicate that it is possible to achieve atherosclerosis regression by reaching low-density lipoprotein (LDL) levels less than 75 mg/dl. The pleiotropic anti-inflammatory effects of statins contribute to the reduction of cardiovascular (CV) event observed with aggressive lipid lowering. As a second important strategy to prevent disease progression, lifestyle changes with regular physical exercise are capable of halting the atherosclerotic process and reducing angina symptoms and CV events. Optimal medical therapy, a healthy lifestyle with regular physical exercise, and coronary interventions are not mutually exclusive treatment strategies. Over the last few decades, both have proved to be effective in significantly reducing the CV mortality in the Western world. However, risk factor modification contributed to at least half the effect in the reduction of CV mortality. This figure provides an estimate of what could be achieved if we were to take risk factor modification more seriously - especially in the acute care setting. The knowledge is there: today we have a better understanding on how to stop progression and even induce regression of atherosclerosis. Much research still needs to be done and will be done. In the meantime, however, our primary focus should lie in implementing what is already known. In addition, it is essential not just to treat CV risk factors, but also to treat them to achieve the target values as set by the guidelines of European Society of Cardiology.

  7. Strategies for successful software development risk management

    Directory of Open Access Journals (Sweden)

    Marija Boban

    2003-01-01

    Full Text Available Nowadays, software is becoming a major part of enterprise business. Software development is activity connected with advanced technology and high level of knowledge. Risks on software development projects must be successfully mitigated to produce successful software systems. Lack of a defined approach to risk management is one of the common causes for project failures. To improve project chances for success, this work investigates common risk impact areas to perceive a foundation that can be used to define a common approach to software risk management. Based on typical risk impact areas on software development projects, we propose three risk management strategies suitable for a broad area of enterprises and software development projects with different amounts of connected risks. Proposed strategies define activities that should be performed for successful risk management, the one that will enable software development projects to perceive risks as soon as possible and to solve problems connected with risk materialization. We also propose a risk-based approach to software development planning and risk management as attempts to address and retire the highest impact risks as early as possible in the development process. Proposed strategies should improve risk management on software development projects and help create a successful software solution.

  8. Risk and/or resilience management

    Directory of Open Access Journals (Sweden)

    Jean-Paul Louisot

    2015-06-01

    Full Text Available Risk management aims at managing all the uncertainties that may interfere with the objectives and missions of the organization. Resilience engineering aims at building its capacity to get over disturbances or stress while keeping the functionalities needed to survive, and possibly thrive. A recently open debate on an Internet blog launched by the risk managers of the Scottish Widows Bank seems to arise from what some professionals see as two competing branches of the management sciences. Whereas through the development of ERM – Enterprise-wide Risk Managementrisk management is emerging at last to become a science, as well as an art and a practice, the mentioned above centered on the role of a newly forged name “resilience management”. This opens a new front of the many debates that could derail the path to maturity of Risk Management as a science and reopen new silos much as Business Impact Analysis, BIA, or continuity management, might do if a clear distinction is not made between science, objectives and tools. However, because organizations are so interconnected today in the supply cloud that it is inevitable that they will face catastrophic risk and this is why resilience needs to be a core objective of any risk management plan? Whereas traditional risk management techniques alone may not be adequate to deal with such pervasive and insipient risk scenarios, resilience is ingrained into ERM

  9. The role of CFD computer analyses in hydrogen safety management

    International Nuclear Information System (INIS)

    Komen, E.M.J; Visser, D.C; Roelofs, F.; Te Lintelo, J.G.T

    2014-01-01

    The risks of hydrogen release and combustion during a severe accident in a light water reactor have attracted considerable attention after the Fukushima accident in Japan. Reliable computer analyses are needed for the optimal design of hydrogen mitigation systems, like e.g. passive autocatalytic recombiners (PARs), and for the assessment of the associated residual risk of hydrogen combustion. Traditionally, so-called Lumped Parameter (LP) computer codes are being used for these purposes. In the last decade, significant progress has been made in the development, validation, and application of more detailed, three-dimensional Computational Fluid Dynamics (CFD) simulations for hydrogen safety analyses. The objective of the current paper is to address the following questions: - When are CFD computer analyses needed complementary to the traditional LP code analyses for hydrogen safety management? - What is the validation status of the CFD computer code for hydrogen distribution, mitigation, and combustion analyses? - Can CFD computer analyses nowadays be executed in practical and reliable way for full scale containments? The validation status and reliability of CFD code simulations will be illustrated by validation analyses performed for experiments executed in the PANDA, THAI, and ENACCEF facilities. (authors)

  10. Risk Management in Mergers and Acquisitions

    Directory of Open Access Journals (Sweden)

    Dmitry O. Verdiev

    2015-01-01

    Full Text Available M&A statistics show that less than a third of newly merged companies has realized their planned synergistic effects and increased shareholder value. According to the author, such disgusting situation is due to improper planning and failure of corporate management to understand the importance of risk management in M&A. Lack of practice in identification, evaluation, mitigation and regular monitoring of risks leads to the situation when many companies merge despite the fact that the merger bears substantial risks. Corporate management fails to include risk mitigation expenses in merger costs. In many cases, risk mitigation expenses may be so substantive that the merger loses its attractiveness. Only few companies implement risk management methodology while planning M&A activity. This methodology may anticipate and minimize the consequences of various risk factors that negatively influence integration process. The article suggests an implementation of risk management best practice. This risk management best practice may act as an effective tool of successful realization of synergistic effects in M&A and may be helpful in increasing shareholder value in post-merger period. Risk management is conducted throughout the stages of merger and includes identification, analysis, assessment, management and monitoring of risks. Implementation of risk management at early stages of merger planning significantly decreases uncertainty in relation to achievement of financial and operational goals of newly merged company. The article provides with typical M&A risk matrix that may be adapted for specific M&A project. Risk matrix includes a register of risks sorted by stages of M&A deal, quality assessment of their probability, influence and impact on merger as well as risk mitigation methods.

  11. 77 FR 13585 - Electricity Subsector Cybersecurity Risk Management Process Guideline

    Science.gov (United States)

    2012-03-07

    ... DEPARTMENT OF ENERGY Electricity Subsector Cybersecurity Risk Management Process Guideline AGENCY... Electricity Subsector Cybersecurity Risk Management Process guideline. The guideline describes a risk... Cybersecurity Risk Management Process Guideline. The primary goal of this guideline is to describe a risk...

  12. Hybrid Risk Management Methodology: A Case Study

    Directory of Open Access Journals (Sweden)

    Jacky Siu-Lun Ting

    2009-10-01

    Full Text Available Risk management is a decision-making process involving considerations of political, social, economic and engineering factors with relevant risk assessments relating to a potential hazard. In the last decade, a number of risk management tools are introduced and employed to manage and minimize the uncertainty and threats realization to the organizations. However, the focus of these methodologies are different; in which companies need to adopt various risk management principles to visualize a full picture of the organizational risk level. Regarding to this, this paper presents a new approach of risk management that integrates Hierarchical Holographic Modeling (HHM, Enterprise Risk Management (ERM and Business Recovery Planning (BCP for identifying and assessing risks as well as managing the consequences of realized residual risks. To illustrate the procedures of the proposed methodology, a logistic company ABC Limited is chosen to serve as a case study Through applying HHM and ERM to investigate and assess the risk, ABC Limited can be better evaluated the potential risks and then took the responsive actions (e.g. BCP to handle the risks and crisis in near future.

  13. Continuous Risk Management: A NASA Program Initiative

    Science.gov (United States)

    Hammer, Theodore F.; Rosenberg, Linda

    1999-01-01

    NPG 7120.5A, "NASA Program and Project Management Processes and Requirements" enacted in April, 1998, requires that "The program or project manager shall apply risk management principles..." The Software Assurance Technology Center (SATC) at NASA GSFC has been tasked with the responsibility for developing and teaching a systems level course for risk management that provides information on how to comply with this edict. The course was developed in conjunction with the Software Engineering Institute at Carnegie Mellon University, then tailored to the NASA systems community. This presentation will briefly discuss the six functions for risk management: (1) Identify the risks in a specific format; (2) Analyze the risk probability, impact/severity, and timeframe; (3) Plan the approach; (4) Track the risk through data compilation and analysis; (5) Control and monitor the risk; (6) Communicate and document the process and decisions.

  14. Implications of Risk Management Practices on Financial ...

    African Journals Online (AJOL)

    Implications of Risk Management Practices on Financial Performance of Sugar ... The respondents were functional heads of the companies under the survey. ... of downside losses in order to minimize the negative impact of risk on returns.

  15. RISK MANAGEMENT MECHANISM OF GRAIN PROCESSING ENTERPRISES

    Directory of Open Access Journals (Sweden)

    I. P. Bogomolova

    2013-01-01

    Full Text Available In article the main characteristics of a control system by risks (the purpose, properties, the principles, requirements are defined, and also the possible mechanism of risk management of the flour-grinding enterprises is considered.

  16. Business managers turn to risk assessment

    International Nuclear Information System (INIS)

    Allen, Frank

    1993-01-01

    Risk assessments have evolved to help technical managers in nuclear and other industries to design and operate plant with safety in mind. However, they are now developing into the area of business management. (author)

  17. Highly Enhanced Risk Management Emergency Satellite

    DEFF Research Database (Denmark)

    Dalmeir, Michael; Gataullin, Yunir; Indrajit, Agung

    HERMES (Highly Enhanced Risk Management Emergency Satellite) is potential European satellite mission for global flood management, being implemented by Technical University Munich and European Space Agency. With its main instrument - a reliable and precise Synthetic Aperture Radar (SAR) antenna...

  18. Risk Management Techniques and Practice Workshop Workshop Report

    Energy Technology Data Exchange (ETDEWEB)

    Quinn, T; Zosel, M

    2008-12-02

    At the request of the Department of Energy (DOE) Office of Science (SC), Lawrence Livermore National Laboratory (LLNL) hosted a two-day Risk Management Techniques and Practice (RMTAP) workshop held September 18-19 at the Hotel Nikko in San Francisco. The purpose of the workshop, which was sponsored by the SC/Advanced Scientific Computing Research (ASCR) program and the National Nuclear Security Administration (NNSA)/Advanced Simulation and Computing (ASC) program, was to assess current and emerging techniques, practices, and lessons learned for effectively identifying, understanding, managing, and mitigating the risks associated with acquiring leading-edge computing systems at high-performance computing centers (HPCCs). Representatives from fifteen high-performance computing (HPC) organizations, four HPC vendor partners, and three government agencies attended the workshop. The overall workshop findings were: (1) Standard risk management techniques and tools are in the aggregate applicable to projects at HPCCs and are commonly employed by the HPC community; (2) HPC projects have characteristics that necessitate a tailoring of the standard risk management practices; (3) All HPCC acquisition projects can benefit by employing risk management, but the specific choice of risk management processes and tools is less important to the success of the project; (4) The special relationship between the HPCCs and HPC vendors must be reflected in the risk management strategy; (5) Best practices findings include developing a prioritized risk register with special attention to the top risks, establishing a practice of regular meetings and status updates with the platform partner, supporting regular and open reviews that engage the interests and expertise of a wide range of staff and stakeholders, and documenting and sharing the acquisition/build/deployment experience; and (6) Top risk categories include system scaling issues, request for proposal/contract and acceptance testing, and

  19. Business resilience: Reframing healthcare risk management.

    Science.gov (United States)

    Simeone, Cynthia L

    2015-09-01

    The responsibility of risk management in healthcare is fractured, with multiple stakeholders. Most hospitals and healthcare systems do not have a fully integrated risk management system that spans the entire organizational and operational structure for the delivery of key services. This article provides insight toward utilizing a comprehensive Business Resilience program and associated methodology to understand and manage organizational risk leading to organizational effectiveness and operational efficiencies, with the fringe benefit of realizing sustainable operational capability during adverse conditions. © 2015 American Society for Healthcare Risk Management of the American Hospital Association.

  20. Probabilistic risk assessment methodology for risk management and regulatory applications

    International Nuclear Information System (INIS)

    See Meng Wong; Kelly, D.L.; Riley, J.E.

    1997-01-01

    This paper discusses the development and potential applications of PRA methodology for risk management and regulatory applications in the U.S. nuclear industry. The new PRA methodology centers on the development of This paper discusses the time-dependent configuration risk profile for evaluating the effectiveness of operational risk management programs at U.S. nuclear power plants. Configuration-risk profiles have been used as risk-information tools for (1) a better understanding of the impact of daily operational activities on plant safety, and (2) proactive planning of operational activities to manage risk. Trial applications of the methodology were undertaken to demonstrate that configuration-risk profiles can be developed routinely, and can be useful for various industry and regulatory applications. Lessons learned include a better understanding of the issues and characteristics of PRA models available to industry, and identifying the attributes and pitfalls in the developement of risk profiles

  1. THE ANALYSIS OF RISK MANAGEMENT PROCESS WITHIN MANAGEMENT

    Directory of Open Access Journals (Sweden)

    ROMANESCU MARCEL LAURENTIU

    2016-10-01

    Full Text Available This article highlights the risk analysis within management, focusing on how a company could practicaly integrate the risks management in the existing leading process. Subsequently, it is exemplified the way of manage risk effectively, which gives numerous advantages to all firms, including improving their decision-making process. All these lead to the conclusion that the degree of risk specific to companies is very high, but if managers make the best decisions then it can diminish it and all business activitiy and its income are not influenced by factors that could disturb in a negative way .

  2. Economic Exposure and Integrated Risk Management

    OpenAIRE

    Miller, Kent D.

    1994-01-01

    Most corporate risk management research focuses on particular risk exposures to the exclusion of other interrelated exposures. By contrast, this study models corporate risk exposures using a multivariate approach integrating the distinct exposures of interest to finance and strategy researchers. The paper addresses the implications of multivariate modeling for corporate risk management, some key methodological issues arising in empirical estimation of corporate economic exposrues, and direc...

  3. PERFORMANCE IN INTERNAL CONTROL AND RISK MANAGEMENT

    OpenAIRE

    JELER (POPA) IOANA; FOCŞAN ELEONORA IONELA; CORICI MARIAN CĂTĂLIN

    2017-01-01

    The purpose of this article is to highlight the importance of internal control and risk management. In practice, economic entities meet a variety of risks that have the origins from the internal environment or the external one. Although there are different of views on addressing the concept of risk - threats or opportunities, event or action, accordingly uncertain, proposed by specialists in risk management in this article we try to present these issues and identify techniques to ...

  4. APPLIED ISSUES ABOUT BANKING RISK MANAGEMENT

    Directory of Open Access Journals (Sweden)

    Elena Geanina Clipici

    2017-09-01

    Full Text Available The following paper emphasizes the need to deepen the understanding of the notion of banking risk management by explaining the significant risks the bank encounters during financial exercises as well as their additional entries. The study of the paper will focus on UniCredit Bank during the years 2014 and  2015 on all types of risks, in which we will provide comprehensive data on how the UniCredit Bank management applies its risk policies.

  5. CEA - Assessment of risk management for 2012

    International Nuclear Information System (INIS)

    Bonnevie, Edwige

    2013-06-01

    This report proposes an overview of the main events, actions performed by the CEA, and facts for 2012 regarding protection and monitoring of the environment, installation safety, occupational health and safety, radiological protection of workers, transportation of hazardous materials, waste management, protection of sites, installations and heritage, emergency situation management, legal risk management, internal controls and audits. It also presents the organisation and action of the risk management department within the CEA

  6. Management Ownership and Risk-Shifting Investment

    OpenAIRE

    Nobuyuki Teshima

    2012-01-01

    This study analyzes the relationship between management ownership and its risk-shifting incentive. We first present a simple model showing that the risk-shifting incentive of management of financially distressed firms increases as the management ownership of the firm increases. Empirically, we test the hypothesis that under the former Japanese Corporate Reorganization Law, firms with higher management ownership are more likely to use legal rather than private reorganization. Since the reorgan...

  7. Feedback on flood risk management

    Science.gov (United States)

    Moreau, K.; Roumagnac, A.

    2009-09-01

    For several years, as floods were increasing in South of France, local communities felt deprive to assume their mission of protection and information of citizens, and were looking for assistance in flood management. In term of flood disaster, the fact is that physical protection is necessary but inevitably limited. Tools and structures of assistance to anticipation remain slightly developed. To manage repeated crisis, local authorities need to be able to base their policy against flood on prevention, warnings, post-crisis analysis and feedback from former experience. In this objective, after 3 years of test and improvement since 2003, the initiative Predict-Services was developped in South of France: it aims at helping communities and companies to face repeated flood crisis. The principle is to prepare emergency plans, to organize crisis management and reduce risks; to help and assist communities and companies during crisis to activate and adapt their emergency plans with enough of anticipation; and to analyse floods effects and improve emergency plans afterwards. In order to reduce risks, and to keep the benefits of such an initiative, local communities and companies have to maintain the awareness of risk of the citizens and employees. They also have to maintain their safety plans to keep them constantly operational. This is a part of the message relayed. Companies, Local communities, local government authorities and basin stakeholders are the decision makers. Companies and local communities have to involve themselves in the elaboration of safety plans. They are also completely involved in their activation that is their own responsability. This applies to other local government authorities, like districts one's and basin stakeholders, which participle in the financing community safety plans and adminitrative district which are responsible of the transmission of meteorological alert and of rescue actions. In the crossing of the géo-information stemming from the

  8. Risk Management for the International Space Station

    Science.gov (United States)

    Sebastian, J.; Brezovic, Philip

    2002-01-01

    The International Space Station (ISS) is an extremely complex system, both technically and programmatically. The Space Station must support a wide range of payloads and missions. It must be launched in numerous launch packages and be safely assembled and operated in the harsh environment of space. It is being designed and manufactured by many organizations, including the prime contractor, Boeing, the NASA institutions, and international partners and their contractors. Finally, the ISS has multiple customers, (e.g., the Administration, Congress, users, public, international partners, etc.) with contrasting needs and constraints. It is the ISS Risk Management Office strategy to proactively and systematically manages risks to help ensure ISS Program success. ISS program follows integrated risk management process (both quantitative and qualitative) and is integrated into ISS project management. The process and tools are simple and seamless and permeate to the lowest levels (at a level where effective management can be realized) and follows the continuous risk management methodology. The risk process assesses continually what could go wrong (risks), determine which risks need to be managed, implement strategies to deal with those risks, and measure effectiveness of the implemented strategies. The process integrates all facets of risk including cost, schedule and technical aspects. Support analysis risk tools like PRA are used to support programatic decisions and assist in analyzing risks.

  9. Social Risk and the Management of MNCs

    DEFF Research Database (Denmark)

    Taarup Esbensen, Jacob

    2015-01-01

    Multinational companies (MNCs) are increasing being exposed to risk that originate from local communities in the business environment where they operate. The response has been to implement systems for stakeholder engagement by including social issues into their risk management systems. However......” systems, which are based on the capability to identify frames and sensemaking processes. This paper show how social risk management can be conventionalised using distinct theoretical domains taking its outset in a sociological perspective on risk, linking International Business (IB) risk management...

  10. Risks management in project planning

    OpenAIRE

    Stankevičiūtė, Roberta

    2017-01-01

    Project management consists of two very important aspects – managing the right project and managing the project right. To know that you are managing the right project you need to ensure that your project is based on an actual requirement and that your project goal is relevant and beneficial. And professional project planning assists in managing project the right way. The project planning process is very time consuming and is one of the most important parts of the project management process. T...

  11. The total theory about risk management

    International Nuclear Information System (INIS)

    Furuya, Shunsuke

    2003-01-01

    A general working procedure of risk management, some example of other countries, topics and problems in the future are described. A definition of risk, risk assessment, risk management process, setting of aim and definite policy are explained. As a fundamental way of thinking, risk is controlled by ALARP (As Low As Reasonably Practicable). The upper and lower limit of risk level is called as Quantitative Safety Goal and Target Level of Safety, respectively. These limits in the atomic power and airplane are decided. Evaluation of risk, countermeasure and practice are explained. For example, a permissible range of risk and practical use in England, U.S.A, Holland and Japan are stated. Recently, accountability risk, missing demand risk and control risk are important. (S.Y.)

  12. Development of computerized risk management tool

    International Nuclear Information System (INIS)

    Kil Yoo Kim; Mee Jung Hwang; Seung Cheol Jang; Sang Hoon Han; Tae Woon Kim

    1997-01-01

    The author describes the kinds of efforts for the development of computerized risk management tool; (1) development of a risk monitor, Risk Monster, (2) improvement of McFarm (Missing Cutsets Finding Algorithm for Risk Monitor) and finally (3) development of reliability database management system, KwDBMan. Risk Monster supports for plant operators and maintenance schedulers to monitor plant risk and to avoid high peak risk by rearranging maintenance work schedule. Improved McFarm significantly improved calculation speed of Risk Monster for the cases of supporting system OOS (Out Of Service). KwDBMan manages event data, generic data and CCF (Common Cause Failure) data to support Risk Monster as well as PSA tool, KIRAP (KAERI Integrated Reliability Analysis Package)

  13. Risk management method for small photovoltaic plants

    Directory of Open Access Journals (Sweden)

    Kirova Milena

    2016-09-01

    Full Text Available Risk management is necessary for achieving the goals of the organization. There are many methods, approaches, and instruments in the literature concerning risk management. However, these are often highly specialized and transferring them to a different field can prove difficult. Therefore, managers often face situations where they have no tools to use for risk management. This is the case with small photovoltaic plants (according to a definition by the Bulgarian State Energy and Water Regulatory Commission small applies to systems with a total installed power of 200 kWp. There are some good practices in the energy field for minimizing risks, but they offer only partial risk prevention and are not sufficient. Therefore a new risk management method needs to be introduced. Small photovoltaic plants offer plenty of advantages in comparison to the other renewable energy sources which makes risk management in their case more important. There is no classification of risks for the exploitation of small photovoltaic systems in the available literature as well as to what degree the damages from those risks could spread. This makes risk analysis and evaluation necessary for obtaining information which could aid taking decisions for improving risk management. The owner of the invested capital takes a decision regarding the degree of acceptable risk for his organization and it must be protected depending on the goals set. Investors in small photovoltaic systems need to decide to what degree the existing risks can influence the goals previously set, the payback of the investment, and what is the acceptable level of damages for the investor. The purpose of this work is to present a risk management method, which currently does not exist in the Bulgaria, so that the risks and the damages that could occur during the exploitation of small photovoltaic plants could be identified and the investment in such technology – justified.

  14. Role of NDT in risk management

    International Nuclear Information System (INIS)

    Porter, Jr. James F.

    2009-01-01

    Risk management is identifying and then managing threats that could severely affect or bring down a company. This involves reviewing the operations of the company to include the process, equipment, procedures and personnel. Potential threats are then identified including their probability of occurrence, and then taking appropriate actions to address the most likely threats. Traditionally, risk management was thought of as mostly getting the right insurance. However, this impression of risk management has changed dramatically. With the recent increase in rules and regulations and optimizing utilization of key resources, risk management is becoming a management practice that is as important as financial or facilities management. In ideal risk management, a prioritization process is followed whereby the risks with the greatest loss and greatest probability of occurring are handled first, and risks with lower probability of occurrence and lower loss are handled in descending order. In practice the process can be very difficult, and balancing between risks with a high probability of occurrence but lower loss versus a risk with high but lower probability of occurrence can often be mishandled. (author)

  15. Financial risk management of pharmacy benefits.

    Science.gov (United States)

    Saikami, D

    1997-10-01

    Financial risk management of pharmacy benefits in integrated health systems is explained. A managed care organization should assume financial risk for pharmacy benefits only if it can manage the risk. Horizontally integrated organizations often do not have much control over the management of drug utilization and costs. Vertically integrated organizations have the greatest ability to manage pharmacy financial risk; virtual integration may also be compatible. Contracts can be established in which the provider is incentivized or placed at partial or full risk. The main concerns that health plans have with respect to pharmacy capitation are formulary management and the question of who should receive rebates from manufacturers. The components needed to managed pharmacy financial risk depend on the type of contract negotiated. Health-system pharmacists are uniquely positioned to take advantage of opportunities opening up through pharmacy risk contracting. Functions most organizations must provide when assuming pharmacy financial risk can be divided into internal and external categories. Internally performed functions include formulary management, clinical pharmacy services and utilization management, and utilization reports for physicians. Functions that can be outsourced include claims processing and administration, provider- and customer support services, and rebates. Organizations that integrate the pharmacy benefit across the health care continuum will be more effective in controlling costs and improving outcomes than organizations that handle this benefit as separate from others. Patient care should not focus on payment mechanisms and unit costs but on developing superior processes and systems that improve health care.

  16. Risk Management and Uncertainty in Infrastructure Projects

    DEFF Research Database (Denmark)

    Harty, Chris; Neerup Themsen, Tim; Tryggestad, Kjell

    2014-01-01

    The assumption that large complex projects should be managed in order to reduce uncertainty and increase predictability is not new. What is relatively new, however, is that uncertainty reduction can and should be obtained through formal risk management approaches. We question both assumptions...... by addressing a more fundamental question about the role of knowledge in current risk management practices. Inquiries into the predominant approaches to risk management in large infrastructure and construction projects reveal their assumptions about knowledge and we discuss the ramifications these have...... for project and construction management. Our argument and claim is that predominant risk management approaches tends to reinforce conventional ideas of project control whilst undermining other notions of value and relevance of built assets and project management process. These approaches fail to consider...

  17. Risk management in a competitive electricity market

    International Nuclear Information System (INIS)

    Liu, Min; Wu, Felix F.

    2007-01-01

    In a competitive electricity market, it is necessary and important to develop an appropriate risk management scheme for trade with full utilization of the multi-market environment in order to maximize participants' benefits and minimize the corresponding risks. Based on the analyses to trading environments and risks in the electricity market, a layered framework of risk management for electric energy trading is proposed in this paper. Simulation results confirmed that trading among multiple markets is helpful to reduce the complete risk, and VaR provides a useful approach to judge whether the formed risk-control scheme is acceptable. (author)

  18. INVENTORY AND RISK MANAGEMENT: DECREASING DELIVERY RISK OF PURCHASERS

    Directory of Open Access Journals (Sweden)

    Grzegorz MICHALSKI

    2008-12-01

    Full Text Available The basic financial purpose of an enterprise is maximization of its value. Inventory management should also contribute to realization of this fundamental aim. The enterprise value maximization strategy is executed with a focus on risk and uncertainty. This article presents the consequences for the recipients firm that can result from operating risk that is related to delivery risk generated by the suppliers. The present article offers a method that uses portfolio management theory to choose the suppliers.

  19. Data Management in Metagenomics: A Risk Management Approach

    Directory of Open Access Journals (Sweden)

    Filipe Ferreira

    2014-07-01

    Full Text Available In eScience, where vast data collections are processed in scientific workflows, new risks and challenges are emerging. Those challenges are changing the eScience paradigm, mainly regarding digital preservation and scientific workflows. To address specific concerns with data management in these scenarios, the concept of the Data Management Plan was established, serving as a tool for enabling digital preservation in eScience research projects. We claim risk management can be jointly used with a Data Management Plan, so new risks and challenges can be easily tackled. Therefore, we propose an analysis process for eScience projects using a Data Management Plan and ISO 31000 in order to create a Risk Management Plan that can complement the Data Management Plan. The motivation, requirements and validation of this proposal are explored in the MetaGen-FRAME project, focused in Metagenomics.

  20. Overview of Risk Management for Engineered Nanomaterials

    International Nuclear Information System (INIS)

    Schulte, P A; Geraci, C L; Hodson, L L; Zumwalde, R D; Kuempel, E D; Murashov, V; Martinez, K F; Heidel, D S

    2013-01-01

    Occupational exposure to engineered nanomaterials (ENMs) is considered a new and challenging occurrence. Preliminary information from laboratory studies indicates that workers exposed to some kinds of ENMs could be at risk of adverse health effects. To protect the nanomaterial workforce, a precautionary risk management approach is warranted and given the newness of ENMs and emergence of nanotechnology, a naturalistic view of risk management is useful. Employers have the primary responsibility for providing a safe and healthy workplace. This is achieved by identifying and managing risks which include recognition of hazards, assessing exposures, characterizing actual risk, and implementing measures to control those risks. Following traditional risk management models for nanomaterials is challenging because of uncertainties about the nature of hazards, issues in exposure assessment, questions about appropriate control methods, and lack of occupational exposure limits (OELs) or nano-specific regulations. In the absence of OELs specific for nanomaterials, a precautionary approach has been recommended in many countries. The precautionary approach entails minimizing exposures by using engineering controls and personal protective equipment (PPE). Generally, risk management utilizes the hierarchy of controls. Ideally, risk management for nanomaterials should be part of an enterprise-wide risk management program or system and this should include both risk control and a medical surveillance program that assesses the frequency of adverse effects among groups of workers exposed to nanomaterials. In some cases, the medical surveillance could include medical screening of individual workers to detect early signs of work-related illnesses. All medical surveillance should be used to assess the effectiveness of risk management; however, medical surveillance should be considered as a second line of defense to ensure that implemented risk management practices are effective.

  1. Overview of Risk Management for Engineered Nanomaterials

    Science.gov (United States)

    Schulte, P. A.; Geraci, C. L.; Hodson, L. L.; Zumwalde, R. D.; Kuempel, E. D.; Murashov, V.; Martinez, K. F.; Heidel, D. S.

    2013-04-01

    Occupational exposure to engineered nanomaterials (ENMs) is considered a new and challenging occurrence. Preliminary information from laboratory studies indicates that workers exposed to some kinds of ENMs could be at risk of adverse health effects. To protect the nanomaterial workforce, a precautionary risk management approach is warranted and given the newness of ENMs and emergence of nanotechnology, a naturalistic view of risk management is useful. Employers have the primary responsibility for providing a safe and healthy workplace. This is achieved by identifying and managing risks which include recognition of hazards, assessing exposures, characterizing actual risk, and implementing measures to control those risks. Following traditional risk management models for nanomaterials is challenging because of uncertainties about the nature of hazards, issues in exposure assessment, questions about appropriate control methods, and lack of occupational exposure limits (OELs) or nano-specific regulations. In the absence of OELs specific for nanomaterials, a precautionary approach has been recommended in many countries. The precautionary approach entails minimizing exposures by using engineering controls and personal protective equipment (PPE). Generally, risk management utilizes the hierarchy of controls. Ideally, risk management for nanomaterials should be part of an enterprise-wide risk management program or system and this should include both risk control and a medical surveillance program that assesses the frequency of adverse effects among groups of workers exposed to nanomaterials. In some cases, the medical surveillance could include medical screening of individual workers to detect early signs of work-related illnesses. All medical surveillance should be used to assess the effectiveness of risk management; however, medical surveillance should be considered as a second line of defense to ensure that implemented risk management practices are effective.

  2. Model risk analysis for risk management and option pricing

    NARCIS (Netherlands)

    Kerkhof, F.L.J.

    2003-01-01

    Due to the growing complexity of products in financial markets, market participants rely more and more on quantitative models for trading and risk management decisions. This introduces a fairly new type of risk, namely, model risk. In the first part of this thesis we investigate the quantitative

  3. [Does clinical risk management require a structured conflict management?].

    Science.gov (United States)

    Neumann, Stefan

    2015-01-01

    A key element of clinical risk management is the analysis of errors causing near misses or patient damage. After analyzing the causes and circumstances, measures for process improvement have to be taken. Process management, human resource development and other established methods are used. If an interpersonal conflict is a contributory factor to the error, there is usually no structured conflict management available which includes selection criteria for various methods of conflict processing. The European University Viadrina in Frankfurt (Oder) has created a process model for introducing a structured conflict management system which is suitable for hospitals and could fill the gap in the methodological spectrum of clinical risk management. There is initial evidence that a structured conflict management reduces staff fluctuation and hidden conflict costs. This article should be understood as an impulse for discussion on to what extent the range of methods of clinical risk management should be complemented by conflict management.

  4. Replicated Data Management for Mobile Computing

    CERN Document Server

    Douglas, Terry

    2008-01-01

    Managing data in a mobile computing environment invariably involves caching or replication. In many cases, a mobile device has access only to data that is stored locally, and much of that data arrives via replication from other devices, PCs, and services. Given portable devices with limited resources, weak or intermittent connectivity, and security vulnerabilities, data replication serves to increase availability, reduce communication costs, foster sharing, and enhance survivability of critical information. Mobile systems have employed a variety of distributed architectures from client-server

  5. ANALYSIS AND MANAGEMENT RISK IN INTERNATIONAL AFFAIRS

    OpenAIRE

    Lăpăduşi Mihaela Loredana,; Căruntu Constantin

    2009-01-01

    The risk is one of the most controversial issues for all persons involved both in domestic and international world economic affairs. The need to analyze, understand and effectively manage risk is growing, the ultimate aim being to obtain a higher degree of successThe risk means exposure to an uncertain future, the opportunity to face danger or suffering a loss ( "Risk - possibility of loss or injury", Webster's, 1995) or the chance that things go wrong ( "Risk is the change that something wil...

  6. Managing flood risks in the Mekong Delta

    NARCIS (Netherlands)

    Hoang, Long Phi; Biesbroek, Robbert; Tri, Van Pham Dang; Kummu, Matti; Vliet, van Michelle T.H.; Leemans, Rik; Kabat, Pavel; Ludwig, Fulco

    2018-01-01

    Climate change and accelerating socioeconomic developments increasingly challenge flood-risk management in the Vietnamese Mekong River Delta—a typical large, economically dynamic and highly vulnerable delta. This study identifies and addresses the emerging challenges for flood-risk management.

  7. Hog Producers' Risk Management Attitudes and Desire for Additional Risk Management Education

    OpenAIRE

    Patrick, George F.; Peiter, Amy J.; Knight, Thomas O.; Coble, Keith H.; Baquet, Alan E.

    2007-01-01

    Hog producers in Indiana and Nebraska were surveyed about sources of risk, effectiveness of risk management strategies, and prior participation in and desire for additional risk management education. Ownership of hogs by the producer, size of the operation, and age did have significant effects on ratings of both sources of risk and effectiveness of risk management strategies. Probit analysis found age, prior attendance, knowledge and prior use of the tool, level of integration, and concern ab...

  8. A Computational Framework for Flood Risk Assessment in The Netherlands

    Directory of Open Access Journals (Sweden)

    A.A. Markus

    2010-01-01

    Full Text Available The safety of dikes in The Netherlands, located in the delta of the rivers Rhine, Meuse and Scheldt, has been the subject of debate for more than ten years. The safety (or flood risk of a particular area may depend on the safety of other areas. This is referred to as effects of river system behaviour on flood risk (quantified as the estimated number of casualties and economic damage. A computational framework was developed to assess these effects. It consists of several components that are loosely coupled via data files and Tcl scripts to manage the individual programs and keep track of the state of the computations. The computations involved are lengthy (days or even weeks on a Linux cluster, which makes the framework currently more suitable for planning and design than for real-time operation. While the framework was constructed ad hoc, it can also be viewed more formally as a tuplespace Realising this makes it possible to adopt the philosophy for other similar frameworks.

  9. Large dams and risk management

    International Nuclear Information System (INIS)

    Cazelais, N.

    2003-01-01

    In July 1996, Quebec's Saguenay region was subjected to intensive rainfall which caused severe floods and uncontrolled release of several reservoirs, resulting in extensive damage to dam structures and reservoirs. The probability of occurrence for that disaster was 1:10,000. Following the disaster, the Quebec government established a dam management body entitled the Commission scientifique et technique sur la gestion des barrages, which pointed out several safety shortcomings of existing dams. Many were either very old or had undergone significant function change without being subsequently re-evaluated. A report by the Commission stated that damage following the floods could have been limited if the design and operating standards of the dams had been more stringent. A Dam Safety Act was adopted by the Quebec National Assembly on May 30, 2000 following recommendations to retain safer structures. The Act demands regular reporting of operating procedures. Seismic activity was noted as being a topic that requires in-depth examination since Quebec's St. Lawrence Valley, particularly the Charlevoix region, is one of Canada's largest seismic zones. The other is on the west coast in British Columbia. Earthquakes in Quebec are less intense than the ones in British Columbia, but they have higher frequency content which exerts a quasi-resonance wave effect which impacts roads, bridges, buildings and hydroelectric generating facilities. Hydro-Quebec is a public utility which owns 563 retaining structures, of which 228 are ranked as large dams that measure more than 15 metres high, 400 metres long and with a reservoir capacity of more than 1 million cubic metres of water. Hydro-Quebec addresses hydrological, seismic, technological and human risks through a dam safety procedure that includes structured plans for choosing best alternatives through staged exercises. Hazard levels are minimized through the adoption of emergency, prevention and alleviation measures. The utility

  10. Environmental asset management: Risk management systems

    CSIR Research Space (South Africa)

    Naudé, Brian

    2017-07-01

    Full Text Available bnaude@csir.co.za Charl Petzer Council for Scientific and Industrial Research PO Box 395 Pretoria 0001 South Africa +2712 841 4292 CPetzer1@csir.co.za Copyright © 2017 by B Naudé, C Petzer. Published and used by INCOSE with permission.... Charl Petzer is registered professional engineer with 30 years of programme/project management as well as systems engineering experience in military and other environments. He has been the lead systems engineer, as well as programme manager on several...

  11. RISK MANAGEMENT PROCESSES IN SUPPLY CHAINS

    Directory of Open Access Journals (Sweden)

    Aleksandar Aleksić

    2009-06-01

    Full Text Available One of the keys of successful business last few years is effective dealing with risks in every meaning of that word. At the time when the world economic crisis largely limits business, successful Risk management is the only way of survival for a large number of business systems. This paper will present the processes of risk management in supply chains that are in accordance with the standards ISO 28000 and ISO 31000. By implementing a holistic, enterprise-wide supply chain risk management program, companies also can uphold their commitment to providing strong corporate governance on behalf of stakeholders and increase their market value.

  12. Strategic Risk Management and Corporate Value Creation

    DEFF Research Database (Denmark)

    Andersen, Torben Juul; Roggi, Oliviero

    Major corporate failures, periodic recessions, regional debt crises and volatile markets have intensified the focus on corporate risk management as the means to deal better with turbulent business conditions. Hence, the ability to respond effectively to the often dramatic environmental changes...... is considered an important source of competitive advantage. However, surprisingly little research has analyzed if the presumed advantages of effective risk management lead to superior performance or assessed important antecedents of effective risk management capabilities. Here we present a comprehensive study...... of risk management effectiveness and the relationship to corporate performance based on panel data for more than 3,400 firms accounting for over 33,500 annual observations during the turbulent period 1991-2010. Determining effective risk management as the ability to reduce earnings and cash flow...

  13. Handbook on Decision Making Vol 2 Risk Management in Decision Making

    CERN Document Server

    Lu, Jie; Zhang, Guangquan

    2012-01-01

    This book presents innovative theories, methodologies, and techniques in the field of risk management and decision making. It introduces new research developments and provides a comprehensive image of their potential applications to readers interested in the area. The collection includes: computational intelligence applications in decision making, multi-criteria decision making under risk, risk modelling,forecasting and evaluation, public security and community safety, risk management in supply chain and other business decision making, political risk management and disaster response systems. The book is directed to academic and applied researchers working on risk management, decision making, and management information systems.

  14. Risk, innovation and change : design propositions for implementing risk management in organizations

    NARCIS (Netherlands)

    van Staveren, Martinus Theodorus

    2009-01-01

    This Ph.D. research generated unique design propositions for implementing existing risk management methodologies in organizations. The resulting design propositions incorporate a synthesis of risk management, innovation management and change management. True implementation of risk management is

  15. 78 FR 4848 - Social Media: Consumer Compliance Risk Management Guidance

    Science.gov (United States)

    2013-01-23

    ...: Consumer Compliance Risk Management Guidance AGENCY: Federal Financial Institutions Examination Council... Media: Consumer Compliance Risk Management Guidance'' (guidance). Upon completion of the guidance, and... management practices adequately address the consumer compliance and legal risks, as well as related risks...

  16. Risk assessment and management logistics chains

    Directory of Open Access Journals (Sweden)

    Vladimir Vikulov

    2014-03-01

    Full Text Available Background: In the context of economic globalization and increasing complexity of economic relations enterprises need methods and techniques to improve and sustain their position on the global market. Integration processes offer business new opportunities, but at the same time present new challenges for the management, including the key objectives of the risk management. Method: On the basis of analysis tools known from the pertinent literature (Supply Chain Management and Supply Chain Risk Management methods, methods of probability theory, methods of risk management, methods of statistics the authors of this paper proposed their own risk assessment method and the method of management of logistics chains. The proposed tool is a specific hybrid of solutions known from the literature. Results: The presented method has been successfully used within the frames of economic-mathematical model of industrial enterprises. Indicators of supply chain risks, including risks caused by supplier are considered in this paper. Authors formed a method of optimizing the level of supply chain risk in the integration with suppliers and customers. Conclusion: Every organization, which starting the process of integration with supplier and customers, needs to use tools, methodologies and techniques for identification of "weak links" in the supply chain. The proposed method allows to fix risk origin places in various links of the supply chain and to identify "weak links" of a logistic chain that may occur in the future. The method is a useful tool for managing not only risks and risk situations, but also to improve the efficiency of current assets management by providing the ability to optimize the level of risk in the current assets management of the industrial enterprise.

  17. Internal audit risk management in metropolitan municipalities

    Directory of Open Access Journals (Sweden)

    Christo Ackermann

    2016-07-01

    Full Text Available Internal audit functions (IAFs of organisations are regarded as crucial components of the combined assurance model, alongside the audit committee, management and external auditors. The combined assurance model aims at having integrated and aligned assurance in organisations with the overall aim of maximising risk and governance oversight and control efficiencies. In this regard, internal audit plays a crucial role, insofar as it consists of experts in risk, governance and control consultancy who provide assurance to senior management and the audit committee. Audit committees are dependent on internal audit for information and their effectiveness revolves around a strong and well-resourced internal audit function which is able to aid audit committees to meet their oversight responsibilities. There is thus a growing demand for managing risk through the process of risk management and internal audit is in a perfect position to assist with the improvement of such processes. If internal auditors wish to continue being an important aspect of the combined assurance model, they need to address the critical area, amongst others, of risk management as part of their work. If not, it follows that the board, audit committees and other levels of management will remain uninformed on the status of these matters which, in turn, will negatively impact the ability of these stakeholders to discharge their responsibilities. This study therefore focuses on analysing the functioning of IAFs, with specific reference to their risk management mandate. The study followed a mixed method approach to describe internal audits risk management functioning in the big eight metropolitan municipalities in South Africa. The results show that internal audit provide a broad scope of risk management work which assist senior management in the discharge of their responsibilities. However, in the public eye, internal audits risk management functioning is scant

  18. Decisionmaking under risk in invasive species management: risk management theory and applications

    Science.gov (United States)

    Shefali V. Mehta; Robert G. Haight; Frances R. Homans

    2010-01-01

    Invasive species management is closely entwined with the assessment and management of risk that arises from the inherently random nature of the invasion process. The theory and application of risk management for invasive species with an economic perspective is reviewed in this synthesis. Invasive species management can be delineated into three general categories:...

  19. Examining the realities of risk management

    International Nuclear Information System (INIS)

    Garrick, B.J.

    1985-01-01

    Sufficient experience now exists, especially in the nuclear industry, to consider the progress that has been made toward meaningful tools or aids for the control and, hence, management of risk. The considerable activity in the field of probabilistic risk assessment (PRA) suggests a high level of interest and application. It is the purpose of this paper to examine our own experience in this regard and to offer some observations and opinions about current practices in risk management and the requirements for success

  20. Project risk management in complex petrochemical system

    Directory of Open Access Journals (Sweden)

    Kirin Snežana

    2012-01-01

    Full Text Available Investigation of risk in complex industrial systems, as well as evaluation of main factors influencing decision making and implementation process using large petrochemical company as an example, has proved the importance of successful project risk management. This is even more emphasized when analyzing systems with complex structure, i.e. with several organizational units. It has been shown that successful risk management requires modern methods, based on adequate application of statistical analysis methods.

  1. Production Management System for AMS Computing Centres

    Science.gov (United States)

    Choutko, V.; Demakov, O.; Egorov, A.; Eline, A.; Shan, B. S.; Shi, R.

    2017-10-01

    The Alpha Magnetic Spectrometer [1] (AMS) has collected over 95 billion cosmic ray events since it was installed on the International Space Station (ISS) on May 19, 2011. To cope with enormous flux of events, AMS uses 12 computing centers in Europe, Asia and North America, which have different hardware and software configurations. The centers are participating in data reconstruction, Monte-Carlo (MC) simulation [2]/Data and MC production/as well as in physics analysis. Data production management system has been developed to facilitate data and MC production tasks in AMS computing centers, including job acquiring, submitting, monitoring, transferring, and accounting. It was designed to be modularized, light-weighted, and easy-to-be-deployed. The system is based on Deterministic Finite Automaton [3] model, and implemented by script languages, Python and Perl, and the built-in sqlite3 database on Linux operating systems. Different batch management systems, file system storage, and transferring protocols are supported. The details of the integration with Open Science Grid are presented as well.

  2. Systems approach to project risk management

    Energy Technology Data Exchange (ETDEWEB)

    Kindinger, J. P. (John P.)

    2002-01-01

    This paper describes the need for better performance in the planning and execution of projects and examines the capabilities of two different project risk analysis methods for improving project performance. A quantitative approach based on concepts and tools adopted from the disciplines of systems analysis, probabilistic risk analysis, and other fields is advocated for managing risk in large and complex research & development projects. This paper also provides an overview of how this system analysis approach for project risk management is being used at Los Alamos National Laboratory along with examples of quantitative risk analysis results and their application to improve project performance.

  3. Risk Management Practices of Multinational and indigenous ...

    African Journals Online (AJOL)

    Construction projects' high uncertainty rates make them unattractive to non-risk takers. Construction companies are therefore necessarily risk takers, albeit, to varying degrees. This study made an inquiry into the risk management (RM) practices of multinational and indigenous construction companies (MCCs and ICCs, ...

  4. RISKS MANAGEMENT. A PROPENSITY SCORE APPLICATION

    Directory of Open Access Journals (Sweden)

    Constangioara Alexandru

    2008-05-01

    Full Text Available Risk management is relatively unexplored in Romania. Although Romanian specialists dwell on theoretical aspects such as the risks classification and the important distinction between risks and uncertainty the practical relevance of the matter is outside existing studies. Present paper uses a dataset of consumer data to build a propensity scorecard based on relevant quantitative modeling.

  5. Risks in hospitals. Assessment and Management

    Directory of Open Access Journals (Sweden)

    Bradea Ioana-Alexandra

    2014-12-01

    Full Text Available In a complex world, characterized by a multitude of risks, managers need to manage the risks they encounter, in an efficient way and in the shortest time possible. In the current economic crisis, the concept of hospital risk management, as the process in which is identified, analyzed, reduced, or avoided a risk that may affect the hospital, gained great importance. The Romanian health system, distinguished by: lack of transparency, poor funding, the loss of the valuable medical staff, lack of hospitals in villages and small towns, inability to engage patients due to the old and poor equipment, lack of research and problems in information privacy and cyber-security, requires an appropriate management, enabling risk managers to take decisions in order to avoid the occurrence of risks. Important for the functioning of every hospital is the perception of patients and their degree of satisfaction, regarding the quality of services, which depend largely on the quality of human resources. But what are the human resources weaknesses and risks from the patient point of view? What are the risk indicators which must be monitored to avoid risks? And also, which is the most useful method for measurement and assessment of risk?

  6. Risk Management and Risk Psychology in Romanian Sme’s

    Directory of Open Access Journals (Sweden)

    Irina Dănciulescu

    2015-12-01

    Full Text Available Risk is one of the biggest and most fascinating challenges of all times for humanity, because of its presence in all fields. Risk management as a component of modern management, has become a main concern for the modern world and one of the “key mechanisms” of economic development, a complex processn that includes a series of activities meant to alleviate the impact of risk over business and planed or foreseen results. This paper wants to bring to attention the importance of risks and their management in today’s economic crisis. The sector presented is the IT& C, especially software, because Romania had a growth in this area for a few years but beginning the crisis this segment in economy had known a serious decrease. This paper tries to connect risk management and risk psychology to Romanian economy, culture and mentality. The paper presents in short some of risk management characteristics, definitions and few opinions; why in Romania this subject is not treated with the appropriate attention. The paper at hand focuses on the psychology of risk and how it affects the life of individuals and the existence of companies, the importance it should have on day to day basis, especially in Romania

  7. Nuclear power plant risk assembly and decomposition for risk management

    International Nuclear Information System (INIS)

    Iden, D.C.

    1985-01-01

    The state-of-the-art method for analyzing the risk from nuclear power plants is probabilistic risk assessment (PRA). The intermediate results of a PRA are first assembled to quantify the risk from operating a nuclear power plant in the form of (1) core damage (or core melt) frequency, (2) plant damage state frequencies, (3) release category frequencies, and (4) the frequency of exceeding specific levels of offsite consequences. Once the overall PRA results have been quantified, the next step is to decompose those results into the individual contributors to each of the four forms of risk in some rank order. The way in which the PRA model is set up to assemble and decompose the plant risk determines the ease and usefulness of the PRA model as a risk management tool for evaluating perturbations to the PRA model. These perturbations can take the form of technical specification changes, hardware modifications, procedural changes, etc. The matrix formalism developed by Dr. Stan Kaplan for risk assembly and decomposition represents a significant breakthrough in making the PRA model an effective risk management tool. The key to understanding the matrix formalism and making it a useful tool for managing nuclear power plant risk is the structure of the PRA model. PRA risk model structure and decomposition of the risk results are discussed with the Seabrook PRA as an example

  8. Models for assessing and managing credit risk

    Directory of Open Access Journals (Sweden)

    Neogradi Slađana

    2014-01-01

    Full Text Available This essay deals with the definition of a model for assessing and managing credit risk. Risk is an inseparable component of any average and normal credit transaction. Looking at the different aspects of the identification and classification of risk in the banking industry as well as representation of the key components of modern risk management. In the first part of the essay will analyze how the impact of credit risk on bank and empirical models for determining the financial difficulties in which the company can be found. Bank on the basis of these models can reduce number of approved risk assets. In the second part, we consider models for improving credit risk with emphasis on Basel I, II and III, and the third part, we conclude that the most appropriate model and gives the best effect for measuring credit risk in domestic banks.

  9. [What Surgeons Should Know about Risk Management].

    Science.gov (United States)

    Strametz, R; Tannheimer, M; Rall, M

    2017-02-01

    Background: The fact that medical treatment is associated with errors has long been recognized. Based on the principle of "first do no harm", numerous efforts have since been made to prevent such errors or limit their impact. However, recent statistics show that these measures do not sufficiently prevent grave mistakes with serious consequences. Preventable mistakes such as wrong patient or wrong site surgery still frequently occur in error statistics. Methods: Based on insight from research on human error, in due consideration of recent legislative regulations in Germany, the authors give an overview of the clinical risk management tools needed to identify risks in surgery, analyse their causes, and determine adequate measures to manage those risks depending on their relevance. The use and limitations of critical incident reporting systems (CIRS), safety checklists and crisis resource management (CRM) are highlighted. Also the rationale for IT systems to support the risk management process is addressed. Results/Conclusion: No single tool of risk management can be effective as a standalone instrument, but unfolds its effect only when embedded in a superordinate risk management system, which integrates tailor-made elements to increase patient safety into the workflows of each organisation. Competence in choosing adequate tools, effective IT systems to support the risk management process as well as leadership and commitment to constructive handling of human error are crucial components to establish a safety culture in surgery. Georg Thieme Verlag KG Stuttgart · New York.

  10. Quality Risk Management of Compliant Excipients

    Directory of Open Access Journals (Sweden)

    Brian Carlin

    2012-12-01

    Full Text Available Raw material compliance and GMP do not eliminate variability. Quality by Design should minimize the risk that raw material variability will adversely affect the finished product Critical Quality Attributes. The sources of technological risk from excipients are reviewed and approaches to excipient risk management are discussed. Supplier involvement throughout the product life-cycle is recommended to minimize excipient-related risk.

  11. FINANCIAL RISK MANAGEMENT IN TRADE BANKS

    Directory of Open Access Journals (Sweden)

    Ms. Tamara Ye. Kononenko

    2016-09-01

    Full Text Available The paper clarifies the concepts of «risk», «financial risk» in banking business, and considers the main problems of financial risk management in trade banks while financing borrowers. The authors single out the most relevant problems, and conduct the analysis of overdue payment in case of OJSC “Sberbank of Russia”. The authors also offer a number of measures to minimize financial risks in trade bank activities in modern conditions.

  12. Cryptographic Key Management and Critical Risk Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Abercrombie, Robert K [ORNL

    2014-05-01

    The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) CyberSecurity for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing CyberSecurity for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modified and used as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of system

  13. Sustainable Risk Management in the Banking Sector

    Directory of Open Access Journals (Sweden)

    Županović Ivo

    2014-01-01

    Full Text Available The globalization of financial markets and negative consequences of the financial crisis resulted in negative connotations in the operation of many financial institutions, businesses and citizens and imposed the need to implement appropriate risk management measures in the banking sector. Evolution of the financial sector makes a lot of news in the field of risk management and particularly the modelling of market, credit and operational risk. The main methodology for risk management is the value-at-risk, which is used in practice with other techniques such as the capital- at-risk method in order to minimize business risks and achieve optimal results in the banking and, generally, financial operations. Accordingly, at all levels of governance in the banking sector, there are prudential policies in place governing the management of all types of financial and operational risks. Based on the abovementioned, the focus of the examination was on the above postulate, and prompt recognition, control and proper management of banking risks.

  14. The Strategic-Renovation Banks’ Risks Management

    Directory of Open Access Journals (Sweden)

    Yeremeychuk Raisa A.

    2017-04-01

    Full Text Available The article is aimed at developing approaches to implementation of the strategic-renovation risk management. Essence of risk theories was researched, the concept of «risk» in the bank’s management system were analyzed. On the basis of a theoretical generalization of scientific literature and the carried out analysis of existing risk management strategies to ensure the security of banking business, the strategy of renovation management has been selected. Because bank risks are part of the economic risk system, they are complex in their nature. However, given the importance of bank risks, the interpretation of their essence is still a debating matter. In a certain number of cases, their essence is replaced by the cause of occurrence, that is, all the different circumstances, factors that lead to the losses. So today, banks are considering risks, in particular, not only as a source of possible losses, but also as an opportunity to generate additional profits. An algorithm for taking a strategic-renovation decision on the banks’ risks management system has been proposed.

  15. Intentional risk management through complex networks analysis

    CERN Document Server

    Chapela, Victor; Moral, Santiago; Romance, Miguel

    2015-01-01

    This book combines game theory and complex networks to examine intentional technological risk through modeling. As information security risks are in constant evolution,  the methodologies and tools to manage them must evolve to an ever-changing environment. A formal global methodology is explained  in this book, which is able to analyze risks in cyber security based on complex network models and ideas extracted from the Nash equilibrium. A risk management methodology for IT critical infrastructures is introduced which provides guidance and analysis on decision making models and real situations. This model manages the risk of succumbing to a digital attack and assesses an attack from the following three variables: income obtained, expense needed to carry out an attack, and the potential consequences for an attack. Graduate students and researchers interested in cyber security, complex network applications and intentional risk will find this book useful as it is filled with a number of models, methodologies a...

  16. Risk management; Maitriser le risque

    Energy Technology Data Exchange (ETDEWEB)

    Magne, L

    1999-07-01

    There is always a risk of an accident occurring at a nuclear power plant, however small. The problem lies in estimating the probability of it occurring. The method of probabilistic safety assessment provides this estimate, and by identifying the sources of potential risk, makes it possible to prevent them from occurring. It is not, however, a substitute for other decision-making processes. (author)

  17. Managers facing the climatic risks

    International Nuclear Information System (INIS)

    2003-01-01

    This colloquium aimed to analyze the relations between the climatic changes and extreme meteorological events and on the associated risks. It provides information and knowledge on the state of the art concerning the today scientific knowledge, the prevention measures and the adaptation facing the risks and the difficult estimation of the climatic damages costs. (A.L.B.)

  18. Risk management and safety culture

    International Nuclear Information System (INIS)

    Takano, K.

    2007-01-01

    Paper informs on the efforts to elaborate a feedback system for risk comprehensive evaluation and a system to improve structure safety foreseeing the possibility to control the latent risk, ensuring the qualitative evaluation of the safety level and improvement of safety culture in various branches of industry, first and foremost, in the electricity producing sector including the nuclear power industry [ru

  19. Nuclear fuel cycle risk assessment: survey and computer compilation of risk-related literature

    International Nuclear Information System (INIS)

    Yates, K.R.; Schreiber, A.M.; Rudolph, A.W.

    1982-10-01

    The US Nuclear Regulatory Commission has initiated the Fuel Cycle Risk Assessment Program to provide risk assessment methods for assistance in the regulatory process for nuclear fuel cycle facilities other than reactors. Both the once-through cycle and plutonium recycle are being considered. A previous report generated by this program defines and describes fuel cycle facilities, or elements, considered in the program. This report, the second from the program, describes the survey and computer compilation of fuel cycle risk-related literature. Sources of available information on the design, safety, and risk associated with the defined set of fuel cycle elements were searched and documents obtained were catalogued and characterized with respect to fuel cycle elements and specific risk/safety information. Both US and foreign surveys were conducted. Battelle's computer-based BASIS information management system was used to facilitate the establishment of the literature compilation. A complete listing of the literature compilation and several useful indexes are included. Future updates of the literature compilation will be published periodically. 760 annotated citations are included

  20. Credit risk management in the power sector

    International Nuclear Information System (INIS)

    Allen, D.

    2002-01-01

    Deregulation of the electric power industry has the potential to put power businesses at market risk particularly when the value of an asset or liability will change with market movements. Market risk gives rise to credit risk where a contract cannot be fulfilled. This presentation describes how credit risks can be identified and measured. Most practitioners use some variant of value-at-risk (VAR) technology for measuring market risk. Under this approach, risk is determined by the volatility implied by the market. Volatility of electricity prices and natural gas prices has increased significantly in Alberta in recent years. The consequence is an increase in both market and credit risk. The author described the difference between the two risks and their significance. An overview of credit risk management with derivatives, an over-the counter contract, was also presented. The author also discusses issue of protection buyers in the event of a failed contract. 9 figs

  1. Risk management in Swedish hedge funds

    OpenAIRE

    Fri, Samuel; Nilsson, Joakim

    2011-01-01

    Background: Risk management has always been a complex topic, especially when it comes to hedge funds. Since hedge funds are able to utilize many kinds of financial instruments it is difficult to find a risk management strategy that goes well with them. Not much research regarding the Swedish hedge fund industry and its risk management has been done; hence we find it an interesting topic to focus this thesis on. Purpose: The purpose of this thesis is to increase the knowledge of how Swedish he...

  2. Evaluating risk management strategies in resource planning

    International Nuclear Information System (INIS)

    Andrews, C.J.

    1995-01-01

    This paper discusses the evaluation of risk management strategies as a part of integrated resource planning. Value- and scope-related uncertainties can be addressed during the process of planning, but uncertainties in the operating environment require technical analysis within planning models. Flexibility and robustness are two key classes of strategies for managing the risk posed by these uncertainties. This paper reviews standard capacity expansion planning models and shows that they are poorly equipped to compare risk management strategies. Those that acknowledge uncertainty are better at evaluating robustness than flexibility, which implies a bias against flexible options. Techniques are available to overcome this bias

  3. Risk management and analysis: risk assessment (qualitative and quantitative)

    OpenAIRE

    Valentin Mazareanu

    2007-01-01

    We use to define risk as the possibility of suffering a loss. Starting this, risk management is defined as a business process whose purpose is to ensure that the organization is protected against risks and their effects. In order to prioritize, to develop a response plan and after that to monitor the identified risks we need to asses them. But at this point a question is born: should I choose a qualitative approach or a quantitative one? This paper will make a short overview over the risk eva...

  4. Risk perception as a driver for risk management policies

    Science.gov (United States)

    Carmona, María; Mañez, María

    2016-04-01

    Risk is generally defined as the "combination of the probability of the occurrence of an event and its negative consequences" ( UNISDR, 2009). However, the perception of a risk differs among cultures regarding different features such as the context,causes, benefits or damage. Risk perception is the subjective valuation of the probability of an event happening and how concerned individuals or groups are with the consequences (Sjöberg, 2004). Our study is based on an existing framework for risk perception (Rehn and Rohrmann, 2000). We analyse the characteristics of the risk perception regarding extreme events (e.g.droughts) and how the perception of the group drives the action to manage the risk. We do this to achieve an overview of the conditions that let stakeholders join each other to improve risk management especially when governments are not reacting properly. For our research, attention is paid on risk perception of Multi-Sector Partnerships not taking into account the individual level of risk perception. We focus on those factors that make risk management effective and increase resilience. Multi-Sector Partnerships, considered as significant governance structures for risk management, might contribute to reduce vulnerability in prone areas to natural hazards and disasters. The Multi-Sector Partnerships used for our research are existing partnerships identified in the cases studies of the European project ENHANCE. We implement a survey to analyse the perception of risk in the case studies. That survey is based on the Cultural Theory (Douglas and Wildavsky, 1982)and the Protection Motivation Theory (Rogers, 1975). We analyse the results using the Qualitative-Comparative Analysis proposed by Ragin in 1987. The results show the main characteristics of a risk culture that are beneficial to manage a risk. Those characteristics are shaped by the perception of risk of the people involved in the partnership, which in turn shapes their risk management. Nevertheless, we

  5. Practical Risk Management for the CIO

    CERN Document Server

    Scherling, Mark

    2007-01-01

    The growing complexity of today's interconnected systems has not only increased the need for improved information security, but also helped to move information from the IT backroom to the executive boardroom as a strategic asset. And, just like the tip of an iceberg is all you see until you run into it, the risks to your information are mostly invisible until disaster strikes. Detailing procedures that will help your team perform better risk assessments and aggregate results into more meaningful metrics, Practical Risk Management for the CIO approaches information risk management through impro

  6. Managing risk in statistics - "Relative risk" | Durrheim | South African ...

    African Journals Online (AJOL)

    South African Family Practice. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 45, No 8 (2003) >. Log in or Register to get access to full text downloads. Username, Password, Remember me, or Register. Managing risk in statistics - "Relative risk". DN Durrheim ...

  7. The application of holistic risk management in the banking industry

    Directory of Open Access Journals (Sweden)

    J. Chibayambuya

    2007-12-01

    Full Text Available Purpose: The application of holistic risk management is fast becoming a standard measure of good governance in the business arena. What role can holistic risk management play in the management of risk in the financial services industry? The aim of this paper is to propose a holistic risk management framework for the management of risk. Design/Methodology/Approach: A comprehensive framework that covers the holistic view risk management is proposed/developed out of an extensive literature review. Findings: Given the deliberations of various frameworks, a holistic risk management is proposed. The proposed framework ensures that all components of risk management are taken into account when strategizing for risk management in general and holistic risk management in particular; thereby improving the management of risk in the banking industry. Implications: The article proposes a holistic approach to risk management which takes into account all the facets of risk management, e.g. analyzing, planning, strategy, communication, implementation, motivation, systems review and plan modification. This holistic approach, when implemented in the banking industry, can have a significant impact on the improved management of risk. Originality/Value: The new proposed holistic risk management framework offers a fresh perspective of strategizing for risk management in terms of risk analysis, risk planning, risk strategy, risk communication, risk implementation, risk motivation, risk review and risk plan modification.

  8. A Risk Management Approach for a Sustainable Cloud Migration

    Directory of Open Access Journals (Sweden)

    Alifah Aida Lope Abdul Rahman

    2017-11-01

    Full Text Available Cloud computing is not just about resource sharing, cost savings and optimisation of business performance; it also involves fundamental concerns on how businesses need to respond on the risks and challenges upon migration. Managing risks is critical for a sustainable cloud adoption. It includes several dimensions such as cost, practising the concept of green IT, data quality, continuity of services to users and clients, guarantee tangible benefits. This paper presents a risk management approach for a sustainable cloud migration. We consider four dimensions of sustainability, i.e., economic, environmental, social and technology to determine the viability of cloud for the business context. The risks are systematically identified and analysed based on the existing in house controls and the cloud service provider offerings. We use Dempster Shafer (D-S theory to measure the adequacy of controls and apply semi-quantitative approach to perform risk analysis based on the theory of belief. The risk exposure for each sustainability dimension allows us to determine the viability of cloud migration. A practical migration use case is considered to determine the applicability of our work. The results identify the risk exposure and recommended control for the risk mitigation. We conclude that risks depend on specific migration case and both Cloud Service Provider (CSP and users are responsible for the risk mitigation. Inherent risks can evolve due to the cloud migration.

  9. RISK MANAGEMENT IN THE ELECTRONIC BUSINESS

    Directory of Open Access Journals (Sweden)

    Georgeta Soava

    2016-12-01

    Full Text Available Risk should not be understood as a destructive phenomenon, but bear in mind that managers who know how to use it can lead to real opportunities. Manager must first recognize the existence of risk, namely to identify and then use specific methods to avoid or reduce the risk. The purpose of this paper is to enter the world, at all simple, of risk management, relatively easy concept to understand but not so easy to put into practice. Of course, the approach relates primarily at the risks inherent of the business in digital environments, but they not represent only a particular case of the risks they are exposed, in general, the companies. In the paper we put in evidence the significance in general business, risks in e-business, then we added a description of the types of security risks, an exemplification of these and a series of test scenarios, and finally to make a analysis of operational solutions of risk management

  10. Risk Management Considerations for Interoperable Acquisition

    National Research Council Canada - National Science Library

    Meyers, B. C

    2006-01-01

    .... The state of risk management practice -- the specification of standards and the methodologies to implement them -- is addressed and examined with respect to the needs of system-of-systems interoperability...

  11. Diabetic ketoacidosis: risk factors, mechanisms and management ...

    African Journals Online (AJOL)

    Diabetic ketoacidosis: risk factors, mechanisms and management strategies in sub-Saharan Africa: a review. ... ketoacidosis is the most common hyperglycaemic emergency in patients with diabetes mellitus, especially type 1 diabetes.

  12. Managing flood risk through collaborative governance | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2013-05-21

    May 21, 2013 ... Managing flood risk through collaborative governance ... This article profiles a project supported by IDRC's Climate Change and Water program, ... and in the intensity of extreme weather events are resulting in the erosion of lo.

  13. Risk management integration into complex project organizations

    Science.gov (United States)

    Fisher, K.; Greanias, G.; Rose, J.; Dumas, R.

    2002-01-01

    This paper describes the approach used in designing and adapting the SIRTF prototype, discusses some of the lessons learned in developing the SIRTF prototype, and explains the adaptability of the risk management database to varying levels project complexity.

  14. Managing risks in the project pipeline.

    Science.gov (United States)

    2013-08-01

    This research focuses on how to manage the risks of project costs and revenue uncertainties over the long-term, and identifies significant : process improvements to ensure projects are delivered on time and as intended, thus maximizing the miles pave...

  15. Small Business and the Risk Management Program

    Science.gov (United States)

    This factsheet helps small businesses comply with the regulation requiring companies that use regulated substances, hazardous chemical such as ammonia and chlorine, to develop a risk management plan, to help prevent accidental toxic or flammable releases.

  16. Roadway related tort liability and risk management.

    Science.gov (United States)

    2010-06-01

    This workbook provide government employees background information related to tort liability and risk management. Past experience with lawsuits against government entities are summarized. The reasons for the lawsuits and results are analyzed. The obje...

  17. From CSR to Social Risk Management

    DEFF Research Database (Denmark)

    Taarup Esbensen, Jacob

    2014-01-01

    When it comes to social risks multinational companies (MNC) within Mining are one of the most exposed businesses one can imagine. This paper examines how social risk management is practiced through the case of Teghout copper-molybdenum mine in North- Eastern Armenia, supplemented with evidence from...... other mining MNCs in the country, onsite fieldwork, interviews with key stakeholders, and public available information. This evidence suggest that a standards based social risk management strategy is adopted and that this strategy is based on international Corporate Social Responsibility (CSR) standards...... engagement management systems that is promoted through the standard. The implemented social risk management systems are ineffective because they makes the MNC unable to recognise the value of weak ties and fail to build legitimacy and trust with some of the key stakeholders resulting in the creation of more...

  18. Managing Associated Risks in Cloud Computer Applications ...

    African Journals Online (AJOL)

    Java programming language and Google App engine were the tools used to develop and deploy the application. The work demonstrates the benefits of deploying applications using the cloud service over on-premise deployment especially where real time data is needed like reporting incidents during elections. Keywords: ...

  19. Wildfire Risk Management: Challenges and Opportunities

    Science.gov (United States)

    Thompson, M.; Calkin, D. E.; Hand, M. S.; Kreitler, J.

    2014-12-01

    In this presentation we address federal wildfire risk management largely through the lens of economics, targeting questions related to costs, effectiveness, efficiency, and tradeoffs. Beyond risks to resources and assets such as wildlife habitat, watersheds, and homes, wildfires present financial risk and budgetary instability for federal wildfire management agencies due to highly variable annual suppression costs. Despite its variability, the costs of wildfire management have continued to escalate and account for an ever-growing share of overall agency budgets, compromising abilities to attain other objectives related to forest health, recreation, timber management, etc. Trends associated with a changing climate and human expansion into fire-prone areas could lead to additional suppression costs in the future, only further highlighting the need for an ability to evaluate economic tradeoffs in investments across the wildfire management spectrum. Critically, these economic analyses need to accurately capture the complex spatial and stochastic aspects of wildfire, the inherent uncertainty associated with monetizing environmental impacts of wildfire, the costs and effectiveness of alternative management policies, and linkages between pre-fire investments and active incident management. Investing in hazardous fuels reduction and forest restoration in particular is a major policy lever for pre-fire risk mitigation, and will be a primary focus of our presentation. Evaluating alternative fuel management and suppression policies could provide opportunities for significant efficiency improvements in the development of risk-informed management fire management strategies. Better understanding tradeoffs of fire impacts and costs can help inform policy questions such as how much of the landscape to treat and how to balance investments in treating new areas versus maintaining previous investments. We will summarize current data needs, knowledge gaps, and other factors

  20. Decision support for utility environmental risk management

    International Nuclear Information System (INIS)

    Balson, W.E.; Wilson, D.S.

    1991-01-01

    This paper reviews a number of decision support methods developed and applied by Decision Focus Incorporated to help utility personnel manage current environmental problems. This work has been performed for the Environmental Risk Analysis Program of EPRI's Environment Division, and also for a number of electric utilities across the country. These are two distinct types of decision support software tools that have been created: economic risk management and environmental risk analysis. These types differ primarily in the identification of who will make a decision. Economic risk management tools are directed primarily at decisions made by electric utilities. Environmental risk analysis tools are directed primarily at decisions made by legislative or regulatory agencies, about which a utility may wish to comment

  1. Radiation risk management at DOE accelerator facilities

    International Nuclear Information System (INIS)

    Dyck, O.B. van.

    1997-01-01

    The DOE accelerator contractors have been discussing among themselves and with the Department how to improve radiation safety risk management. This activity-how to assure prevention of unplanned high exposures-is separate from normal exposure management, which historically has been quite successful. The ad-hoc Committee on the Accelerator Safety Order and Guidance [CASOG], formed by the Accelerator Section of the HPS, has proposed a risk- based approach, which will be discussed. Concepts involved are risk quantification and comparison (including with non-radiation risk), passive and active (reacting) protection systems, and probabilistic analysis. Different models of risk management will be presented, and the changing regulatory environment will also be discussed

  2. Variance computations for functional of absolute risk estimates.

    Science.gov (United States)

    Pfeiffer, R M; Petracci, E

    2011-07-01

    We present a simple influence function based approach to compute the variances of estimates of absolute risk and functions of absolute risk. We apply this approach to criteria that assess the impact of changes in the risk factor distribution on absolute risk for an individual and at the population level. As an illustration we use an absolute risk prediction model for breast cancer that includes modifiable risk factors in addition to standard breast cancer risk factors. Influence function based variance estimates for absolute risk and the criteria are compared to bootstrap variance estimates.

  3. From risk management to uncertainty management: a significant change in project management

    Institute of Scientific and Technical Information of China (English)

    LI Gui-jun; ZHANG Yue-song

    2006-01-01

    Starting with the meanings of the terms "risk" and "uncertainty,"" he paper compares uncertainty management with risk management in project management. We bring some doubt to the use of "risk" and "uncertainty" interchangeably in project management and deem their scope, methods, responses, monitoring and controlling should be different too. Illustrations are given covering terminology, description, and treatment from different perspectives of uncertainty management and risk management. Furthermore, the paper retains that project risk management (PRM) processes might be modified to facilitate an uncertainty management perspective,and we support that project uncertainty management (PUM) can enlarge its contribution to improving project management performance, which will result in a significant change in emphasis compared with most risk management.

  4. Plant risk status information management system

    International Nuclear Information System (INIS)

    Campbell, D.J.; Ellison, B.C.; Glynn, J.C.; Flanagan, G.F.

    1985-01-01

    The Plant Risk Status Information Management System (PRISIMS) is a PC program that presents information about a nuclear power plant's design, its operation, its technical specifications, and the results of the plant's probabilistic risk assessment (PRA) in a logically and easily accessible format. PRISIMS provides its user with unique information for integrating safety concerns into day-to-day operational decisions and/or long-range management planning

  5. Delegated Portfolio Management and Risk Taking Behavior

    OpenAIRE

    José Luiz Barros Fernandes; Juan Ignacio Peña; Benjamin Miranda Tabak

    2009-01-01

    Standard models of moral hazard predict a negative relationship between risk and incentives; however empirical studies on mutual funds present mixed results. In this paper, we propose a behavioral principal-agent model in the context of professional managers, focusing on active and passive investment strategies. Using this general framework, we evaluate how incentives affect the risk taking behavior of managers, using the standard moral hazard model as a special case; and solve the previous c...

  6. Fundamentals of risk management understanding, evaluating and implementing effective risk management

    CERN Document Server

    Hopkin, Paul

    2012-01-01

    Now more than ever, organizations must plan, response and recognize all forms of risks that they face. "Fundamentals of Risk Management", now in its second edition, provides a comprehensive introduction to the subject of commercial and business risk for anyone studying for a career in risk as well as a broad range of risk professionals. It examines the key components of risk management and its application with examples to demonstrate its benefit to organisations in the public and private sector. The second edition has been completely updated to take into account the greater influence of ISO 3100, the emergence of Governance Risk and Compliance (GRC) and the wide use of the bowtie method to illustrate risk management. In addition, there is now a chapter on the skills and competencies required by an effective risk manager.

  7. Risk management - unappreciated instrument of supply chain management strategy

    OpenAIRE

    Wojciech Machowiak

    2012-01-01

    Background: Unlike Enterprise Risk Management, which is certainly quite well rooted in business practice, Supply Chain Risk Management (SCRM) still continues to be dynamically developing subject of academic research, whereas its practical applications are rather scarce. Material and methods: On the basis of broad review of the current state of the art in world literature, significant  relevancies to the core processes and enterprise strategy are discussed.   Results: ...

  8. Methodical Approaches to Risk Management in a Regional Commercial Bank

    Directory of Open Access Journals (Sweden)

    Elena Vladimirovna Altukhova

    2016-03-01

    Full Text Available The article presents the results of the research of the methodological and information infrastructure of the integrated risk management in a regional commercial bank. Within the study of the general development tendencies of the regional banking services market, the most significant risks for a regional bank are revealed. The analysis is carried out on the basis of the stress testing technique developed at the Plekhanov Russian University of Economics. It is based on a technique of dynamic economic and mathematical modeling with the application of information technologies. The created combination of the methodological and instrumental tools allows to carry out the dynamic scenario analysis of the activity of a commercial bank for the identification of potential risks and for the development of the strategy of financial management reducing the potential risks and leveling the consequences of their realization. The received tool allows during the computer test to watch the predicted dynamics of the condition of the key indicators of the activity of a regional commercial bank changing under the influence of the exogenous regulatory measures and instruments of bank management applied to decrease risk and at the same time to introduce adjustments in the perspective strategy of management. As the result of the analysis, the universal management model of the main bank risks in a regional commercial bank within three alternative scenarios is created. The software product allowing to develop and acquire the practical skills of the students in banking is developed. It also may help to develop the methodological support for the regulation of the organizational procedures of risk management in a regional commercial bank. The received software product may be used in a system of the improving the professional skills, and also for obtaining the expected data in a risk management system in a regional commercial bank.

  9. The Computer as Rorschach: Implications for Management and User Acceptance

    OpenAIRE

    Kaplan, Bonnie

    1983-01-01

    Different views of the computer held by different participants in a medical computing project make it difficult to gain wide acceptance of an application. Researchers', programmers', and clinicians' views illustrate how users project their views onto the computer. Effects of these different views on user acceptance and implications for the management of computer projects are presented.

  10. Pediatrics patient in computed tomography: risk awareness among medical staff

    International Nuclear Information System (INIS)

    Arandjic, D.; Ciraj-Bjelac, O.; Kosutic, D.; Lazarevic, Dj.

    2009-01-01

    In this paper the results of investigation about risk awareness in pediatrics computed tomography among medical staff are presented. Questionnaires were distributed along seven hospitals, 84 people were enrolled in this investigation. The results showed awareness of the potential risks associated with ionizing radiation in computed tomography. However, there is still widespread underestimation of relative doses and risks in case of pediatric patients. (author) [sr

  11. Management of interest rate risk

    Directory of Open Access Journals (Sweden)

    Šabović Šerif

    2014-01-01

    Full Text Available Interest rate risk is one of the biggest and most dangerous risks that a bank is exposed to. When a change of interest rates occurs, the incomes of a bank based on credits and securities endure significant changes. Banks resources also endure some changes. The change of interest rates changes the value of the assets and liabilities of the bank and it's net and investment worth . The change of interest rates also affects bank's balance sheet, income sheet statement and bank's share capital.

  12. Task and Interruption Management in Activity-Centric Computing

    DEFF Research Database (Denmark)

    Jeuris, Steven

    to address these not in isolation, but by fundamentally reevaluating the current computing paradigm. To this end, activity-centric computing has been brought forward as an alternative computing paradigm, addressing the increasing strain put on modern-day computing systems. Activity-centric computing follows...... the scalability and intelligibility of current research prototypes. In this dissertation, I postulate that such issues arise due to a lack of support for the full set of practices which make up activity management. Most notably, although task and interruption management are an integral part of personal...... information management, they have thus far been neglected in prior activity-centric computing systems. Advancing the research agenda of activity-centric computing, I (1) implement and evaluate an activity-centric desktop computing system, incorporating support for interruptions and long-term task management...

  13. Risk management and oil trading contracts

    International Nuclear Information System (INIS)

    Sas, B.

    1992-01-01

    The oil market provides an excellent case study for an analysis of the commodity trading risks and the development of contractual instruments and market structures to meet these risks. The paper identifies the main risks, namely performance, credit/payment, price, regulatory, fiscal, and ''trading'' risk. A conceptual framework provides the basis to trace the evolution of the risk management instruments from relational (e.g. long-term), through ''transactional'' (e.g. spot and forwards) to ''institutional'' (e.g. futures and options) and finally ''pricing'' (e.g. swaps and trigger pricing) contracts. (author)

  14. Integrating Security Risk Management into Business Process Management for the Cloud

    OpenAIRE

    Goettelmann , Elio; Mayer , Nicolas; Godart , Claude

    2014-01-01

    International audience; Security issues are still preventing wider adoption of cloud computing, especially for businesses which are handling sensitive information. Indeed, by outsourcing its information system (IS), a company can lose control over its infrastructure, its software or even its data. Therefore, new methods and tools need to be defined to respond to this challenge. In this paper we propose to integrate Security Risk Management approaches into Business Process Management to effect...

  15. The NASA Continuous Risk Management Process

    Science.gov (United States)

    Pokorny, Frank M.

    2004-01-01

    As an intern this summer in the GRC Risk Management Office, I have become familiar with the NASA Continuous Risk Management Process. In this process, risk is considered in terms of the probability that an undesired event will occur and the impact of the event, should it occur (ref., NASA-NPG: 7120.5). Risk management belongs in every part of every project and should be ongoing from start to finish. Another key point is that a risk is not a problem until it has happened. With that in mind, there is a six step cycle for continuous risk management that prevents risks from becoming problems. The steps are: identify, analyze, plan, track, control, and communicate & document. Incorporated in the first step are several methods to identify risks such as brainstorming and using lessons learned. Once a risk is identified, a risk statement is made on a risk information sheet consisting of a single condition and one or more consequences. There can also be a context section where the risk is explained in more detail. Additionally there are three main goals of analyzing a risk, which are evaluate, classify, and prioritize. Here is where a value is given to the attributes of a risk &e., probability, impact, and timeframe) based on a multi-level classification system (e.g., low, medium, high). It is important to keep in mind that the definitions of these levels are probably different for each project. Furthermore the risks can be combined into groups. Then, the risks are prioritized to see what risk is necessary to mitigate first. After the risks are analyzed, a plan is made to mitigate as many risks as feasible. Each risk should be assigned to someone in the project with knowledge in the area of the risk. Then the possible approaches to choose from are: research, accept, watch, or mitigate. Next, all risks, mitigated or not, are tracked either individually or in groups. As the plan is executed, risks are re-evaluated, and the attribute values are adjusted as necessary. Metrics

  16. Lessons Learned in Risk Management on NCSX

    International Nuclear Information System (INIS)

    Neilson, G.H.; Gruber, C.O.; Harris, Jeffrey H.; Rej, D.J.; Simmons, R.T.; Strykowsky, R.L.

    2010-01-01

    The National Compact Stellarator Experiment (NCSX) was designed to test physics principles of an innovative stellarator design developed by Princeton Plasma Physics Laboratory and Oak Ridge National Laboratory. Construction of some of the major components and subassemblies was completed, but the estimated cost and schedule for completing the project grew as the technical requirements and risks became better understood, leading to its cancellation in 2008. The project's risks stemmed from its technical challenges, primarily the complex component geometries and tight tolerances that were required. The initial baseline, which was established in 2004, was supported by a risk management plan and risk-based contingencies, both of which proved to be inadequate. Technical successes were achieved in the construction of challenging components and subassemblies, but cost and schedule growth was experienced. As part of an effort to improve project performance, a new risk management program was devised and implemented in 2007-2008. It led to a better understanding of project risks, a sounder basis for contingency estimates, and improved management tools. Although the risks were ultimately unacceptable to the sponsor, valuable lessons in risk management were learned through the experiences with the NCSX project.

  17. Risk management, derivatives and shariah compliance

    Science.gov (United States)

    Bacha, Obiyathulla Ismath

    2013-04-01

    Despite the impressive growth of Islamic Banking and Finance (IBF), a number of weaknesses remain. The most important of this is perhaps the lack of shariah compliant risk management tools. While the risk sharing philosophy of Islamic Finance requires the acceptance of risk to justify returns, the shariah also requires adherents to avoid unnecessary risk-maysir. The requirement to avoid maysir is in essence a call for the prudent management of risk. Contemporary risk management revolves around financial engineering, the building blocks of which are financial derivatives. Despite the proven efficacy of derivatives in the management of risk in the conventional space, shariah scholars appear to be suspicious and uneasy with their use in IBF. Some have imposed outright prohibition of their use. This paper re-examines the issue of contemporary derivative instruments and shariah compliance. The shariah compatibility of derivatives is shown in a number of ways. First, by way of qualitative evaluation of whether derivatives can be made to comply with the key prohibitions of the sharia. Second, by way of comparing the payoff profiles of derivatives with risk sharing finance and Bai Salam contracts. Finally, the equivalence between shariah compliant derivatives like the IPRS and Islamic FX Currency Forwards with conventional ones is presented.

  18. Board of directors and risk management

    NARCIS (Netherlands)

    van der Elst, C.F.; Birkmose, H.; Neville, M.; Sorensen, K.

    2013-01-01

    The board of directors is responsible for an appropriate business risk management environment. The paper studies in a comparative way how legislators and courts fill this duty. We question whether the legislative and regulatory framework will improve the equilibrium between entrepreneurship and risk

  19. Lessons Learned in Risk Management on NCSX

    International Nuclear Information System (INIS)

    Neilson, G.H.; Gruber, C.O.; Harris, J.H.; Rej, D.J.; Simmons, R.T.; Strykowsky, R.L.

    2009-01-01

    The National Compact Stellarator Experiment (NCSX) was designed to test physics principles of an innovative stellarator design developed by the Princeton Plasma Physics Laboratory and Oak Ridge National Laboratory. Construction of some of the major components and sub-assemblies was completed, but the estimated cost and schedule for completing the project grew as the technical requirements and risks became better understood, leading to its cancellation in 2008. The project's risks stemmed from its technical challenges, primarily the complex component geometries and tight tolerances that were required. The initial baseline, established in 2004, was supported by a risk management plan and risk-based contingencies, both of which proved to be inadequate. Technical successes were achieved in the construction of challenging components and subassemblies, but cost and schedule growth was experienced. As part of an effort to improve project performance, a new risk management program was devised and implemented in 2007-08. It led to a better understanding of project risks, a sounder basis for contingency estimates, and improved management tools. Although the risks ultimately were unacceptable to the sponsor, valuable lessons in risk management were learned through the experiences with the NCSX project

  20. Managing Risk Areas in Software Development Offshoring

    DEFF Research Database (Denmark)

    Persson, John Stouby; Schlichter, Bjarne Rerup

    2015-01-01

    Software companies are increasingly offshoring development to countries with high expertise at lower cost. Offshoring involves particular risk areas that if ignored increase the likelihood of failure. However, the offshoring client’s maturity level may influence the management of these risk areas...

  1. Self-management of vascular risk factors

    NARCIS (Netherlands)

    Sol-de Rijk, B.G.M.

    2009-01-01

    Summary The aim of this thesis was to provide insight into the potential of a self-management approach in treatment of vascular risk factors and to develop a self-management intervention. Furthermore to examine if this intervention, based on self-efficacy promoting theory, is effective in reducing

  2. Methodology of environmental risk assessment management

    Directory of Open Access Journals (Sweden)

    Saša T. Bakrač

    2012-04-01

    Full Text Available Successful protection of environment is mostly based on high-quality assessment of potential and present risks. Environmental risk management is a complex process which includes: identification, assessment and control of risk, namely taking measures in order to minimize the risk to an acceptable level. Environmental risk management methodology: In addition to these phases in the management of environmental risk, appropriate measures that affect the reduction of risk occurrence should be implemented: - normative and legal regulations (laws and regulations, - appropriate organizational structures in society, and - establishing quality monitoring of environment. The emphasis is placed on the application of assessment methodologies (three-model concept, as the most important aspect of successful management of environmental risk. Risk assessment methodology - European concept: The first concept of ecological risk assessment methodology is based on the so-called European model-concept. In order to better understand this ecological risk assessment methodology, two concepts - hazard and risk - are introduced. The European concept of environmental risk assessment has the following phases in its implementation: identification of hazard (danger, identification of consequences (if there is hazard, estimate of the scale of consequences, estimate of consequence probability and risk assessment (also called risk characterization. The European concept is often used to assess risk in the environment as a model for addressing the distribution of stressors along the source - path - receptor line. Risk assessment methodology - Canadian concept: The second concept of the methodology of environmental risk assessment is based on the so-called Canadian model-concept. The assessment of ecological risk includes risk arising from natural events (floods, extreme weather conditions, etc., technological processes and products, agents (chemical, biological, radiological, etc

  3. Security Risks: Management and Mitigation in the Software Life Cycle

    Science.gov (United States)

    Gilliam, David P.

    2004-01-01

    A formal approach to managing and mitigating security risks in the software life cycle is requisite to developing software that has a higher degree of assurance that it is free of security defects which pose risk to the computing environment and the organization. Due to its criticality, security should be integrated as a formal approach in the software life cycle. Both a software security checklist and assessment tools should be incorporated into this life cycle process and integrated with a security risk assessment and mitigation tool. The current research at JPL addresses these areas through the development of a Sotfware Security Assessment Instrument (SSAI) and integrating it with a Defect Detection and Prevention (DDP) risk management tool.

  4. Interplanetary Supply Chain Risk Management

    Science.gov (United States)

    Galluzzi, Michael C.

    2018-01-01

    Emphasis on KSC ground processing operations, reduced spares up-mass lift requirements and campaign-level flexible path perspective for space systems support as Regolith-based ISM is achieved by; Network modeling for sequencing space logistics and in-space logistics nodal positioning to include feedstock. Economic modeling to assess ISM 3D printing adaption and supply chain risk.

  5. Neural computations underlying social risk sensitivity

    Directory of Open Access Journals (Sweden)

    Nina eLauharatanahirun

    2012-08-01

    Full Text Available Under standard models of expected utility, preferences over stochastic events are assumed to be independent of the source of uncertainty. Thus, in decision-making, an agent should exhibit consistent preferences, regardless of whether the uncertainty derives from the unpredictability of a random process or the unpredictability of a social partner. However, when a social partner is the source of uncertainty, social preferences can influence decisions over and above pure risk attitudes. Here, we compared risk-related hemodynamic activity and individual preferences for two sets of options that differ only in the social or non-social nature of the risk. Risk preferences in social and non-social contexts were systematically related to neural activity during decision and outcome phases of each choice. Individuals who were more risk averse in the social context exhibited decreased risk-related activity in the amygdala during non-social decisions, while individuals who were more risk averse in the non-social context exhibited the opposite pattern. Differential risk preferences were similarly associated with hemodynamic activity in ventral striatum at the outcome of these decisions. These findings suggest that social preferences, including aversion to betrayal or exploitation by social partners, may be associated with variability in the response of these subcortical regions to social risk.

  6. Process-based project proposal risk management

    Directory of Open Access Journals (Sweden)

    Alok Kumar

    2016-12-01

    Full Text Available We all are aware of the organizational omnipresence. Projects within the organizations are ubiquitous too. Projects achieve their goals successfully if they are planned, scheduled, controlled and implemented well. The project lifecycle of initiating, planning, scheduling, controlling and implementing are very well-planned by project managers and the organizations. Successful projects have well-developed risk management plans to deal with situations impacting projects. Like any other organisation, a university does try to access funds for different purposes too. For such organisations, running a project is not the issue, rather getting a project proposal approved to fund a project is the key. Project proposal processing is done by the nodal office in every organisation. Usually, these nodal offices help in administration and submission of a project proposal for accessing funds. Seldom are these nodal project offices within the organizations facilitate a project proposal approval by proactively reaching out to the project managers. And as project managers prepare project proposals, little or no attention is made to prepare a project proposal risk plan so as to maximise project acquisition. Risk plans are submitted while preparing proposals but these risk plans cater to a requirement to address actual projects upon approval. Hence, a risk management plan for project proposal is either missing or very little effort is made to treat the risks inherent in project acquisition. This paper is an integral attempt to highlight the importance of risk treatment for project proposal stage as an extremely important step to preparing the risk management plan made for projects corresponding to their lifecycle phases. Several tools and techniques have been proposed in the paper to help and guide either the project owner (proposer or the main organisational unit responsible for project management. Development of tools and techniques to further enhance project

  7. Managing sovereign credit risk in bond portfolios

    OpenAIRE

    Bruder, Benjamin; Hereil, Pierre; Roncalli, Thierry

    2011-01-01

    With the recent development of the European debt crisis, traditional index bond management has been severely called into question. We focus here on the risk issues raised by the classical market-capitalization weighting scheme. We propose an approach to properly measure sovereign credit risk in a fixed-income portfolio. For that, we assume that CDS spreads follow a SABR process and we derive a sovereign credit risk measure based on CDS spreads and duration of portfolio bonds. We then consider...

  8. Loss Database Architecture for Disaster Risk Management

    OpenAIRE

    RIOS DIAZ FRANCISCO; MARIN FERRER MONTSERRAT

    2018-01-01

    The reformed Union civil protection legislation (Decision on a Union Civil Protection Mechanism), which entered into force on 1 January 2014, is paving the way for more resilient communities by including key actions related to disaster prevention such as developing national risk assessments and the refinement of risk management planning. Under the Decision, Member States agreed to “develop risk assessments at national or appropriate sub- national level and make available to the Commission a s...

  9. Management Risk Reporting Practices and their determinants

    OpenAIRE

    VANDEMAELE, Sigrid; VERGAUWEN, Philip; MICHIELS, Anneleen

    2009-01-01

    In recent years, the need for effective risk management, internal control and transparent risk reporting has become an important corporate governance principle and a predominant issue in business. Already in 1987, the AICPA[ ] report stated that shareholders are increasingly demanding that financial statements include more information concerning the risks and uncertainties companies are facing (Schrand and Elliott, 1998). Abraham and Cox (2007) claim that this information can help investors t...

  10. Credit Risk Management in Chinese Banking Industry

    OpenAIRE

    Zhang, Lei

    2006-01-01

    Abstract Credit risk is by far the most important risk faced by banks, and it influences the bank profitability and its long-term operation significantly. Well management on credit risk can be a competitive advantage for banks in the competitive banking industry. Chinese banks suffer from serious financial fragility manifested by high proportions of NPLs and low capital adequacy ratios (Bonin and Huang, 2001). This dissertation examines the real credit performance of Chinese banks ba...

  11. Critical infrastructure cyber-security risk management

    OpenAIRE

    Spyridopoulos, T.; Maraslis, K.; Tryfonas, T.; Oikonomou, G.

    2017-01-01

    Traditional IT cyber-security risk management methods are based on the evaluation of risks calculated as the likelihood of cyber-security incidents occurring. However, these probabilities are usually estimations or guesses based on past experience and incomplete data. Incorrect estimations can lead to errors in the evaluation of risks that can ultimately affect the protection of the system. This issue is also transferred to methods used in Industrial Control Systems (ICSs), as they are mainly...

  12. Ethical Aspects of Radiation Risk Management

    OpenAIRE

    Wikman-Svahn, Per

    2012-01-01

    This thesis is based on the assumption that the intersection of moral philosophy and practical risk management is a rewarding area to study. In particular, the thesis assumes that concepts, ideas, and methods that are used in moral philosophy can be of great benefit for risk analysis, but also that practices in risk regulation provide a useful testing ground for moral philosophical theories. The thesis consists of an introduction and five articles. Article I is a review article on social and ...

  13. Information needs for risk management/communication

    Energy Technology Data Exchange (ETDEWEB)

    Bennett, D.A. [Environmental Protection Agency, Washington, DC (United States)

    1990-12-31

    The hazardous waste cleanup program under the Comprehensive Environmental Response, Compensation, and Liability Act (Superfund) is delegated to the ten Regions of the US Environmental Protection Agency (EPA) and has, to date, identified more than 33,000 sites for consideration. The size and complexity of the program places great demands on those who would provide information to achieve national consistency in application of risk assessment while meeting site-specific needs for risk management and risk communication.

  14. Planning and management of cloud computing networks

    Science.gov (United States)

    Larumbe, Federico

    The evolution of the Internet has a great impact on a big part of the population. People use it to communicate, query information, receive news, work, and as entertainment. Its extraordinary usefulness as a communication media made the number of applications and technological resources explode. However, that network expansion comes at the cost of an important power consumption. If the power consumption of telecommunication networks and data centers is considered as the power consumption of a country, it would rank at the 5 th place in the world. Furthermore, the number of servers in the world is expected to grow by a factor of 10 between 2013 and 2020. This context motivates us to study techniques and methods to allocate cloud computing resources in an optimal way with respect to cost, quality of service (QoS), power consumption, and environmental impact. The results we obtained from our test cases show that besides minimizing capital expenditures (CAPEX) and operational expenditures (OPEX), the response time can be reduced up to 6 times, power consumption by 30%, and CO2 emissions by a factor of 60. Cloud computing provides dynamic access to IT resources as a service. In this paradigm, programs are executed in servers connected to the Internet that users access from their computers and mobile devices. The first advantage of this architecture is to reduce the time of application deployment and interoperability, because a new user only needs a web browser and does not need to install software on local computers with specific operating systems. Second, applications and information are available from everywhere and with any device with an Internet access. Also, servers and IT resources can be dynamically allocated depending on the number of users and workload, a feature called elasticity. This thesis studies the resource management of cloud computing networks and is divided in three main stages. We start by analyzing the planning of cloud computing networks to get a

  15. COORDINATES OF A RISK MANAGEMENT PROJECT

    Directory of Open Access Journals (Sweden)

    ALEXANDRU OLTEANU

    2013-05-01

    Full Text Available High risk – high benefit: a well-known correlation both in the economic field and in the day-to-day life. Another correlation, on which this article is based: large project – numerous participants – increased risks and other malfunctions. The risk management concept is challenged by those projects and is forced to find the most adequate “customized” ways for each project at its turn. In this respect, the assessment of management has followed the trend of the last three decades, marked by moving of management profit analysis by risk intermediation, respectively the transition from managing profit to risk-return relationship management. Such trend assumes the obligation of participants to identify objectives and expected benefits of the project on the basis of the strategies laid-down, the elements of risk management policies, in conjunction with the indication of the most negative scenarios which they may provide. This activity must take into consideration the process of obtaining and combining human, financial, physical and information resources in order to accomplish the primary goal of the proposed and wanted project by a certain segment of population. Project participants are directed to evaluate their own activities in terms of revenues and risks from the business access, opportunity, operating mode, as well as the limitations and boundaries on certain sides of activity. The paper focuses on the analysis and evaluation of incomes and risks, on simulations to streamline the activities and the determination of the optimal model of project choice. Also, the paper treats the risks that can be taken over by the sponsors, especially those related to implied guaranties, even implied guaranties.

  16. Future Communication, Computing, Control and Management Volume 2

    CERN Document Server

    2012-01-01

    This volume contains revised and extended research articles written by prominent researchers participating in the ICF4C 2011 conference. 2011 International Conference on Future Communication, Computing, Control and Management (ICF4C 2011) has been held on December 16-17, 2011, Phuket, Thailand. Topics covered include intelligent computing, network management, wireless networks, telecommunication, power engineering, control engineering, Signal and Image Processing, Machine Learning, Control Systems and Applications, The book will offer the states of arts of tremendous advances in Computing, Communication, Control, and Management and also serve as an excellent reference work for researchers and graduate students working on Computing, Communication, Control, and Management Research.

  17. Future Communication, Computing, Control and Management Volume 1

    CERN Document Server

    2012-01-01

    This volume contains revised and extended research articles written by prominent researchers participating in the ICF4C 2011 conference. 2011 International Conference on Future Communication, Computing, Control and Management (ICF4C 2011) has been held on December 16-17, 2011, Phuket, Thailand. Topics covered include intelligent computing, network management, wireless networks, telecommunication, power engineering, control engineering, Signal and Image Processing, Machine Learning, Control Systems and Applications, The book will offer the states of arts of tremendous advances in Computing, Communication, Control, and Management and also serve as an excellent reference work for researchers and graduate students working on Computing, Communication, Control, and Management Research.

  18. Future Computing, Communication, Control and Management Volume 2

    CERN Document Server

    2012-01-01

    This volume contains revised and extended research articles written by prominent researchers participating in the ICF4C 2011 conference. 2011 International Conference on Future Communication, Computing, Control and Management (ICF4C 2011) has been held on December 16-17, 2011, Phuket, Thailand. Topics covered include intelligent computing, network management, wireless networks, telecommunication, power engineering, control engineering, Signal and Image Processing, Machine Learning, Control Systems and Applications, The book will offer the states of arts of tremendous advances in Computing, Communication, Control, and Management and also serve as an excellent reference work for researchers and graduate students working on Computing, Communication, Control, and Management Research.

  19. Comparisons on International Approaches of Business and Project Risk Management

    OpenAIRE

    Nadia Carmen ENE

    2005-01-01

    In this article we intend to present a comparative approach between three recognized international methodologies for risk management: RISKMAN, Project Management Institute Methodology-PMBoK and Project Risk Analysis and Management Guide (produced by Association for Project Management).

  20. COORDINATES OF A RISK MANAGEMENT PROJECT

    OpenAIRE

    ALEXANDRU OLTEANU; MĂDĂLINA ANTOANETA RĂDOI

    2013-01-01

    High risk – high benefit: a well-known correlation both in the economic field and in the day-to-day life. Another correlation, on which this article is based: large project – numerous participants – increased risks and other malfunctions. The risk management concept is challenged by those projects and is forced to find the most adequate “customized” ways for each project at its turn. In this respect, the assessment of management has followed the trend of the last three decades, marked by movi...

  1. THRMS: A pilot risk management system

    International Nuclear Information System (INIS)

    Xue, D.; Xu, Y.

    2000-01-01

    Daya Bay NPP is the first commercial nuclear power plant in China. This plant is interested in and pro-active towards the development and application of PSA and PSA tools. This, together with the support from the IAEA promoted the project 'THRMS: the pilot study of risk management system for NPP'. The objectives in development and implementation of THRMS includes: survey and discuss on the development of the approaches used in constructing plant risk models; design and study on the realization of a real-time risk management system. An overview of the project is presented in this paper. (author)

  2. Proposal for a security management in cloud computing for health care.

    Science.gov (United States)

    Haufe, Knut; Dzombeta, Srdan; Brandis, Knud

    2014-01-01

    Cloud computing is actually one of the most popular themes of information systems research. Considering the nature of the processed information especially health care organizations need to assess and treat specific risks according to cloud computing in their information security management system. Therefore, in this paper we propose a framework that includes the most important security processes regarding cloud computing in the health care sector. Starting with a framework of general information security management processes derived from standards of the ISO 27000 family the most important information security processes for health care organizations using cloud computing will be identified considering the main risks regarding cloud computing and the type of information processed. The identified processes will help a health care organization using cloud computing to focus on the most important ISMS processes and establish and operate them at an appropriate level of maturity considering limited resources.

  3. Proposal for a Security Management in Cloud Computing for Health Care

    Directory of Open Access Journals (Sweden)

    Knut Haufe

    2014-01-01

    Full Text Available Cloud computing is actually one of the most popular themes of information systems research. Considering the nature of the processed information especially health care organizations need to assess and treat specific risks according to cloud computing in their information security management system. Therefore, in this paper we propose a framework that includes the most important security processes regarding cloud computing in the health care sector. Starting with a framework of general information security management processes derived from standards of the ISO 27000 family the most important information security processes for health care organizations using cloud computing will be identified considering the main risks regarding cloud computing and the type of information processed. The identified processes will help a health care organization using cloud computing to focus on the most important ISMS processes and establish and operate them at an appropriate level of maturity considering limited resources.

  4. The role of risk perception for risk management

    International Nuclear Information System (INIS)

    Renn, Ortwin

    1998-01-01

    Are risks social constructions of different societal actors that can be checked at best against standards of consistency, cohesion and internal conventions of deduction, but cannot claim any validity outside of the actor's logical framework? Or are technical estimates of risk representations of real hazards that can and will affect people as predicted by the statistical values, regardless of the beliefs or convictions of those who conduct the assessments? Which of the two sides one takes determines the legitimate function of risk perception for management purposes. The paper argues that both extremes, the constructivist and the realist perspective, miss the point, as risks are always mental representations of threats that are capable of claiming real losses. Over the last two decades, risk analysts have dealt with both sides of risk in an additive fashion. In times in which risk management has been under serious pressure to demonstrate effectiveness and cost-efficiency, the parallel approach of pleasing the technical elite and the public alike has lost legitimacy. In order to integrate risk assessment and perception, the paper analyses the strengths and weaknesses of each approach to risk analysis and highlights the potential contributions that the technical sciences and the social sciences can offer to risk management. Technical assessments provide the best estimate for judging the average probability of an adverse effect linked to an object or activity. First, public perception should govern the selection of criteria on which acceptability or tolerability are to be judged. Second, public input is needed to determine the trade-offs between criteria. Third, public preferences are needed to design resilient strategies for coping with remaining uncertainties. A public participation model is introduced that promises an integration of analytic knowledge and deliberative process involving those who will be affected by the respective risk

  5. Climate Change Risk Management: CRE Adaptation Projects and the Risk Management Process

    Science.gov (United States)

    This document describes National Estuary Program partner projects that demonstrate how risk management can be successfully applied to address environmental challenges in our country’s coastal areas.

  6. Transitioning leadership and risk management

    OpenAIRE

    Coulson-Thomas, Colin

    2017-01-01

    One of the dilemmas faced by directors and other corporate leaders is the need to be entrepreneurial in ensuring the future success of a company which involves risk, while at the same time retaining prudent control. Transitioning leadership suggests a process of adjustment, adaptation, transformation or metamorphosis from one condition, situation or state to another, depending upon the extent of the internal or external change required to continue to operate and cope. The process also involve...

  7. Managing Impression Formation in Computer-Mediated Communication.

    Science.gov (United States)

    Liu, Yuliang; Ginther, Dean

    2001-01-01

    Offers suggestions for online instructors regarding verbal and nonverbal impression management. The recommendations should facilitate computer mediated teacher-student or manager-client interactions and help develop constructive relationships that promote learning and productivity. (EV)

  8. Human-Computer Interaction and Information Management Research Needs

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — In a visionary future, Human-Computer Interaction HCI and Information Management IM have the potential to enable humans to better manage their lives through the use...

  9. The Role of risk perception for risk management

    International Nuclear Information System (INIS)

    Renn, Ortwin

    1999-01-01

    The list of individual and social factors that shape risk perception demonstrates that the intuitive understanding of risk is a multidimensional concept and cannot be reduced to the product of probabilities and consequences. Although risk perceptions differ considerably among social and cultural groups, the multi-dimensionality of risk and the integration of beliefs related to risk, the cause of risk, and its circumstances into a consistent belief system appear to be common characteristics of public risk perception in almost all countries in which such studies have been performed. Furthermore, the experience of risk is not limited to the threat of facing harm in the future. It includes subjective predictions of possible outcomes, the social and cultural context in which the risk is experienced, the mental images the risk situation evokes, the perception of the players who are involved in the risk situation and the judgments about fairness and equity related to the distribution of potential hazardous events. In this sense, risk is a social construct rather than a physical entity. Risk communication and conflict resolution is therefore a crucial element of any risk management strategy. The goal of risk communication and conflict resolution should not be to persuade people to accept whatever the communicator thinks is best for them. The ideal communication program envisions a receiver who processes all the available information to form a well-balanced judgement in accordance with the factual evidence, the arguments of all sides, and his/her own interests and preferences. The ultimate goal of risk communication is to reconcile expertise, interests, and public preferences. (EHS)

  10. Operational risk management for a NPP

    Energy Technology Data Exchange (ETDEWEB)

    Scott, C.K., E-mail: KScott@AtlanticNuclear.ca [Atlantic Nuclear Services Inc., Fredericton, New Brunswick (Canada)

    2013-07-01

    Organizational failures are a hazard to the successful operation of a nuclear power plant. Risk reduction strategies have been developed around two themes: using an understanding of the nature and mechanism of human failures to eliminate them by modifying work processes; or, modifying human behaviour by creating a strong safety culture that overrides the tendency to fail. This paper examines the problem from the perspective of operational risk management. It includes the internal management of operations and the influence of the external environment on the organization. A model is proposed that encompasses all the operational risk factors in the organization's decision making process. To prevent failure the organization must have the capability to adapt and the capacity to evolve. The hazards that would lead to an organizational failure are developed from this evolutionary model. The operational risk management program would include these hazards as well as the conventional nuclear safety hazards. (author)

  11. Probability distributions in risk management operations

    CERN Document Server

    Artikis, Constantinos

    2015-01-01

    This book is about the formulations, theoretical investigations, and practical applications of new stochastic models for fundamental concepts and operations of the discipline of risk management. It also examines how these models can be useful in the descriptions, measurements, evaluations, and treatments of risks threatening various modern organizations. Moreover, the book makes clear that such stochastic models constitute very strong analytical tools which substantially facilitate strategic thinking and strategic decision making in many significant areas of risk management. In particular the incorporation of fundamental probabilistic concepts such as the sum, minimum, and maximum of a random number of continuous, positive, independent, and identically distributed random variables in the mathematical structure of stochastic models significantly supports the suitability of these models in the developments, investigations, selections, and implementations of proactive and reactive risk management operations. The...

  12. Living with risk: a management question

    International Nuclear Information System (INIS)

    Ale, Ben J.M.

    2005-01-01

    Public authorities started to be really involved in risk management of hazardous materials some 30 years ago. Recent developments have led to fresh attention for this matter and many further developments are underway. The history of risk management and safety regulation is one of strongly variable interest, forgotten lessons and rude awakenings. The impetus exerted by accidents is short lived. Safety cases become documents to satisfy regulation rather than instruments to reduce risk. Deregulation, privatisation, and outsourcing pose new challenges to safety and risk management. Some of the unfortunate side effects have already become apparent. This invariably leads to the next disaster, which will have a striking resemblance to the previous one when abstracted from the immediate technological context. Lessons can be learned if we really want. The question remains: 'Do we?'

  13. Risk management - unappreciated instrument of supply chain management strategy

    Directory of Open Access Journals (Sweden)

    Wojciech Machowiak

    2012-12-01

    Full Text Available Background: Unlike Enterprise Risk Management, which is certainly quite well rooted in business practice, Supply Chain Risk Management (SCRM still continues to be dynamically developing subject of academic research, whereas its practical applications are rather scarce. Material and methods: On the basis of broad review of the current state of the art in world literature, significant  relevancies to the core processes and enterprise strategy are discussed.   Results: The paper shows some interesting from the enterprise's performance and competitiveness point of view additional benefits, potentially resulting from the proactive, consistent and effective implementation of the SCRM system. Conclusions: Some additional advantages from proactive supply chain risk management account for perceiving SCRM as multifunctional instrument of strategic SC management, exceeding established understanding RM as security and threat-prevention  tool only. Positive influence from SCRM onto SC performance and competitiveness can make reasonable to enhance its position within SCM strategy.

  14. Risk management in a university environment.

    Science.gov (United States)

    Brewer, Ann; Walker, Ian

    2011-06-01

    Risk is an integral part of quality assurance in higher education in Australia. This paper describes a generic methodology for the identification and management of risk in a university or similar tertiary education environment and outlines a framework that enables the management of risk to be incorporated in the institution's governance cycle. The new approach here is that risk is embedded in the quality assurance framework and, in turn, in the strategic planning and budgeting processes. In many organisations, risk is implemented as a separate process and not considered in any meaningful way as integral to the strategic direction and performance of the university. The paper is based on work carried out by the authors and others between March 2008 and April 2009 to develop a comprehensive system for managing risk in a major Australian university, including processes whereby risk management could be integrated with, and add value to, the overall governance of the university. The case study is described in the appendix to this paper.

  15. Competitiveness in organizational integrated computer system project management

    Directory of Open Access Journals (Sweden)

    Zenovic GHERASIM

    2010-06-01

    Full Text Available The organizational integrated computer system project management aims at achieving competitiveness by unitary, connected and personalised treatment of the requirements for this type of projects, along with the adequate application of all the basic management, administration and project planning principles, as well as of the basic concepts of the organisational information management development. The paper presents some aspects of organizational computer systems project management competitiveness with the specific reference to some Romanian companies’ projects.

  16. The Architecture of Financial Risk Management Systems

    Directory of Open Access Journals (Sweden)

    Iosif ZIMAN

    2013-01-01

    Full Text Available The architecture of systems dedicated to risk management is probably one of the more complex tasks to tackle in the world of finance. Financial risk has been at the center of attention since the explosive growth of financial markets and even more so after the 2008 financial crisis. At multiple levels, financial companies, financial regulatory bodies, governments and cross-national regulatory bodies, all have put the subject of financial risk in particular and the way it is calculated, managed, reported and monitored under intense scrutiny. As a result the technology underpinnings which support the implementation of financial risk systems has evolved considerably and has become one of the most complex areas involving systems and technology in the context of the financial industry. We present the main paradigms, require-ments and design considerations when undertaking the implementation of risk system and give examples of user requirements, sample product coverage and performance parameters.

  17. Managing IT-related operational risks

    Directory of Open Access Journals (Sweden)

    Savić Ana

    2008-01-01

    Full Text Available Not so long ago, information technology (IT risk occupied a small corner of operational risk - the opportunity loss from a missed IT development deadline. Today, the success of an entire financial institution may lay on managing a broad landscape of IT risks. IT risk is a potential damage to an organization's value, resulting from inadequate managing of processes and technologies. IT risk includes the failure to respond to security and privacy requirements, as well as many other issues such as: human error, internal fraud through software manipulation, external fraud by intruders, obsolesce in applications and machines, reliability issues or mismanagement. The World Economic Forum provides best information about this problem. They rank a breakdown of critical information infrastructure among the most likely core global risks, with 10-20 % likelihood over the next 10 years and potential worldwide impact of $250 billion. Sustained investment in IT - almost $1.2 trillion or 29% of 2006 private-sector capital investment in the U.S. alone fuels growing exposure to IT risk. Greg Hughes, chief strategy officer in Symantec Corp. recently claimed "IT risk management is more than using technology to solve security problems. With proper planning and broad support, it can give an organization the confidence to innovate, using IT to outdistance competitors".

  18. Managing Communities – Mining MNEs’ Community Risk Management Practices

    DEFF Research Database (Denmark)

    Taarup Esbensen, Jacob

    This PhD reflects the effort to close a gap in the multinational enterprise (MNE) risk management literature on the identification and mitigation of risk arising from local communities. Small villages and towns that are situated geographically close to the MNEs’ place of operation have increasingly......-to-date information about mining MNE operations. This improved outreach has meant that mines have been closed due to conflicts with local communities and therefor a need had arisen for MNEs to implement management practices that can effectively mitigate these types of risks....... been identified as a source of risk (BSR, 2003; ICMM, 2015). The mining industry is one of the most exposed to risks from local communities, where there historically have been many conflicts between mine owners on one side and the people living close to the mine on the other (Godoy, 1985; Hoskin, 1912...

  19. Risk Management Collaboration through Sharing Interactive Graphics

    Science.gov (United States)

    Slingsby, Aidan; Dykes, Jason; Wood, Jo; Foote, Matthew

    2010-05-01

    Risk management involves the cooperation of scientists, underwriters and actuaries all of whom analyse data to support decision-making. Results are often disseminated through static documents with graphics that convey the message the analyst wishes to communicate. Interactive graphics are increasingly popular means of communicating the results of data analyses because they enable other parties to explore and visually analyse some of the data themselves prior to and during discussion. Discussion around interactive graphics can occur synchronously in face-to-face meetings or with video-conferencing and screen sharing or they can occur asynchronously through web-sites such as ManyEyes, web-based fora, blogs, wikis and email. A limitation of approaches that do not involve screen sharing is the difficulty in sharing the results of insights from interacting with the graphic. Static images accompanied can be shared but these themselves cannot be interacted, producing a discussion bottleneck (Baker, 2008). We address this limitation by allowing the state and configuration of graphics to be shared (rather than static images) so that a user can reproduce someone else's graphic, interact with it and then share the results of this accompanied with some commentary. HiVE (Slingsby et al, 2009) is a compact and intuitive text-based language that has been designed for this purpose. We will describe the vizTweets project (a 9-month project funded by JISC) in which we are applying these principles to insurance risk management in the context of the Willis Research Network, the world's largest collaboration between the insurance industry and the academia). The project aims to extend HiVE to meet the needs of the sector, design, implement free-available web services and tools and to provide case studies. We will present a case study that demonstrate the potential of this approach for collaboration within the Willis Research Network. Baker, D. Towards Transparency in Visualisation Based

  20. Tank waste remediation system programmatic risk management plan

    International Nuclear Information System (INIS)

    Seaver, D.A.

    1995-01-01

    This risk management plan defines the approach to be taken to managing risks in the Tank Waste Remediation System (TWRS) program. It defines the actions to be taken at the overall program level, and the risk management requirements for lower-level projects and other activities. The primary focus of this plan is on ''programmatic'' risks, i.e., risks with respect to the cost, schedule, and technical performance of the program. The plan defines an approach providing managers with the flexibility to manage risks according to their specific needs, yet creates. The consistency needed for effectiveness across the program. The basic risk management approach uses a risk management list for the program, each project, and additional lower-level activities. The risk management list will be regularly reviewed and updated by appropriate level of management. Each list defines key risks, their likelihood and consequences, risk management actions to be taken, responsible individuals, and other management information

  1. Identity Management issues in Cloud Computing

    OpenAIRE

    Saini, Smita; Mann, Deep

    2014-01-01

    Cloud computing is providing a low cost on demand services to the users, omnipresent network,large storage capacity due to these features of cloud computing web applications are moving towards the cloud and due to this migration of the web application,cloud computing platform is raised many issues like privacy, security etc. Privacy issue are major concern for the cloud computing. Privacy is to preserve the sensitive information of the cloud consumer and the major issues to the privacy are un...

  2. Secure cloud computing: benefits, risks and controls

    CSIR Research Space (South Africa)

    Carroll, M

    2011-08-01

    Full Text Available Cloud computing presents a new model for IT service delivery and it typically involves over-a-network, on-demand, self-service access, which is dynamically scalable and elastic, utilising pools of often virtualized resources. Through these features...

  3. Improving Operational Risk Management Using Business Performance Management Technologies

    Directory of Open Access Journals (Sweden)

    Bram Pieket Weeserik

    2018-02-01

    Full Text Available Operational Risk Management (ORM comprises the continuous management of risks resulting from: human actions, internal processes, systems, and external events. With increasing requirements, complexity and a growing volume of risks, information systems provide benefits for integrating risk management activities and optimizing performance. Business Performance Management (BPM technologies are believed to provide a solution for effective Operational Risk Management by offering several combined technologies including: work flow, data warehousing, (advanced analytics, reporting and dashboards. BPM technologies can be integrated with an organization’s Planning & Control cycle and related to strategic objectives. This manuscript aims to show how ORM can benefit from BPM technologies via the development and practical validation of a new maturity model. The B4ORM maturity model was developed following the Design Science Research approach. The maturity model relates specific maturity levels of ORM processes with BPM technologies applicable for a specific maturity stage. There appears to be a strong relationship (0.78 with ORM process maturity and supporting BPM technologies. The B4ORM maturity model as described in this manuscript provides an ideal path of BPM technologies related to six distinctive stages of ORM, leading towards technologies suitable for continuous improvement of ORM processes and organization-wide integration.

  4. Risk management methodology for RBMN project

    International Nuclear Information System (INIS)

    Borssatto, Maria F.B.; Tello, Cledola C.O.; Uemura, George

    2013-01-01

    RBMN Project has been developed to design, construct and commission a national repository to dispose the low- and intermediate-level radioactive wastes from the operation of nuclear power plants and other industries that use radioactive sources and materials. Risk is a characteristic of all projects. The risks arise from uncertainties due to assumptions associated with the project and the environment in which it is executed. Risk management is the method by which these uncertainties are systematically monitored to ensure that the objectives of the project will be achieved. Considering the peculiarities of the Project, that is, comprehensive scope, multidisciplinary team, apparently polemic due to the unknowing of the subject by the stake holders, especially the community, it is being developed a specific methodology for risk management of this Project. This methodology will be critical for future generations who will be responsible for the final stages of the repository. It will provide greater guarantee to the processes already implemented and will maintain a specific list of risks and solutions for this Project, ensuring safety and security of the repository throughout its life cycle that is the planned to last at least three hundred years. This paper presents the tools and processes already defined, management actions aimed at developing a culture of proactive risk in order to minimize threats to this Project and promote actions that bring opportunities to its success. The methodology is based on solid research on the subject, considering methodologies already established and globally recognized as best practices for project management. (author)

  5. Model of Axiological Dimension Risk Management

    Directory of Open Access Journals (Sweden)

    Kulińska Ewa

    2016-01-01

    Full Text Available It was on the basis of the obtained results that identify the key prerequisites for the integration of the management of logistics processes, management of the value creation process, and risk management that the methodological basis for the construction of the axiological dimension of the risk management (ADRM model of logistics processes was determined. By taking into account the contribution of individual concepts to the new research area, its essence was defined as an integrated, structured instrumentation aimed at the identification and implementation of logistics processes supporting creation of the value added as well as the identification and elimination of risk factors disturbing the process of the value creation for internal and external customers. The base for the ADRM concept of logistics processes is the use of the potential being inherent in synergistic effects which are obtained by using prerequisites for the integration of the management of logistics processes, of value creation and risk management as the key determinants of the value creation.

  6. Computer aided approach for qualitative risk assessment of engineered systems

    International Nuclear Information System (INIS)

    Crowley, W.K.; Arendt, J.S.; Fussell, J.B.; Rooney, J.J.; Wagner, D.P.

    1978-01-01

    This paper outlines a computer aided methodology for determining the relative contributions of various subsystems and components to the total risk associated with an engineered system. Major contributors to overall task risk are identified through comparison of an expected frequency density function with an established risk criterion. Contributions that are inconsistently high are also identified. The results from this analysis are useful for directing efforts for improving system safety and performance. An analysis of uranium hexafluoride handling risk at a gaseous diffusion uranium enrichment plant using a preliminary version of the computer program EXCON is briefly described and illustrated

  7. Safety control and risk management

    International Nuclear Information System (INIS)

    Rasmussen, J.

    1987-01-01

    The acceptable probability of major accidents in nuclear power is very small, and can not be determined from direct empirical evidence. Therefore, control of the level of safety is a complex problem. The difficulty is related to the fact that a variable, 'safety', which is not accessible to direct measurement, is to be tightly controlled. Control, therefore, depends on a systematic, analytical prediction of the target state, i.e., the level of safety, from indirect evidence. From a control theoretic point of view this means that safety is controlled by a system which includes openloop as well as closed loop control paths. The aim of the paper is to take a general systems view on the complex mechanisms involved in the control of safety of industrial installations like nuclear power. From this, the role of probabilistic risk analysis is evaluated and needs for further development discussed. (author)

  8. International comparative analyses of healthcare risk management.

    Science.gov (United States)

    Sun, Niuyun; Wang, Li; Zhou, Jun; Yuan, Qiang; Zhang, Zongjiu; Li, Youping; Liang, Minghui; Cheng, Lan; Gao, Guangming; Cui, Xiaohui

    2011-02-01

    Interpretation of the growing body of global literature on health care risk is compromised by a lack of common understanding and language. This series of articles aims to comprehensively compare laws and regulations, institutional management, and administration of incidence reporting systems on medical risk management in the United Kingdom, the United States, Canada, Australia, and Taiwan, so as to provide evidence and recommendations for health care risk management policy in China. We searched the official websites of the healthcare risk management agencies of the four countries and one district for laws, regulatory documents, research reports, reviews and evaluation forms concerned with healthcare risk management and assessment. Descriptive comparative analysis was performed on relevant documents. A total of 146 documents were included in this study, including 2 laws (1.4%), 17 policy documents (11.6%), 41 guidance documents (28.1%), 37 reviews (25.3%), and 49 documents giving general information (33.6%). The United States government implemented one law and one rule of patient safety management, while the United Kingdom and Australia each issued professional guidances on patient safety improvement. The four countries implemented patient safety management policy on four different levels: national, state/province, hospital, and non-governmental organization. The four countries and one district adopted four levels of patient safety management, and the administration modes can be divided into an "NGO-led mode" represented by the United States and Canada and a "government-led mode" represented by the United Kingdom, Australia, and Taiwan. © 2011 Blackwell Publishing Asia Pty Ltd and Chinese Cochrane Center, West China Hospital of Sichuan University.

  9. Automated Risk Control in Medical Imaging Equipment Management Using Cloud Application

    Directory of Open Access Journals (Sweden)

    Sally M. Ghanem

    2018-01-01

    Full Text Available Medical imaging equipment (MIE is the baseline of providing patient diagnosis in healthcare facilities. However, that type of equipment poses high risk for patients, operators, and environment in terms of technology and application. Considering risk management in MIE management is rarely covered in literature. The study proposes a methodology that controls risks associated with MIE management. The methodology is based on proposing a set of key performance indicators (KPIs that lead to identify a set of undesired events (UDEs, and through a risk matrix, a risk level is evaluated. By using cloud computing software, risks could be controlled to be manageable. The methodology was verified by using a data set of 204 pieces of MIE along 104 hospitals, which belong to Egyptian Ministry of Health. Results point to appropriateness of proposed KPIs and UDEs in risk evaluation and control. Thus, the study reveals that optimizing risks taking into account the costs has an impact on risk control of MIE management.

  10. LIQUIDITY MANAGEMENT AND CORPORATE RISK

    Directory of Open Access Journals (Sweden)

    Fenyves Veronika

    2011-07-01

    Full Text Available The consequence of the economic crisis, the access of the external financing resources was narrowed significantly and lenders had became more cautious. This meant that the external source providers analyze more thoroughly the source claimants, and they also need to be more aware of their situation, to submit well founded loan applications to financial institutions. The other aspect is why the indicators presented in the study, the firms should be addressed much more thoroughly than ever before to have a much better understanding their situation, to recognize the sources of internal funding opportunities, and to use more efficiently the available internal resources. However, analysts should be aware of which are the ratios which should be paid a special attention and which ones are essential to assess a given situation, knowing them they can properly inform the leaders as well as to give an appropriate help to the decision makers. To ensure the appropriate level of internal resources the company's activity is continuous financing closely related to the working capital management. The other reason is why the working capital management coming into view - which is linked to the previous one - that longer and longer payment periods have emerged in the corporate sales, in point of fact there is a significant increase in commercial lending period, the companies must be able to finance this period. The working capital is essential for companies to determine their short-term financial positions. A significant change in working capital provides an important information to the company's various stakeholders, and this is especially true for the net working capital. The working capital analysis is one way the company's creditability evaluation, and helps also to better understand the company's normal business cycle.

  11. THE EVOLUTION OF RISK MANAGEMENT RESEARCH: CHANGES IN KNOWLEDGE MAPS

    OpenAIRE

    Iwona Gorzeń-Mitka

    2017-01-01

    One of the leading trends in modern academic research is risk management. Over the years, the approach to risk management has changed and affected many different areas. This study aims to investigate changes in risk management and trends of risk management in the past 20 years. Risk management related publications from 1990 to 2016 were retrieved from the Web of Science and Scopus databases. VOS viewer software was used to analyse the research trend. Literature growth related to risk manageme...

  12. Tutorial: Parallel Computing of Simulation Models for Risk Analysis.

    Science.gov (United States)

    Reilly, Allison C; Staid, Andrea; Gao, Michael; Guikema, Seth D

    2016-10-01

    Simulation models are widely used in risk analysis to study the effects of uncertainties on outcomes of interest in complex problems. Often, these models are computationally complex and time consuming to run. This latter point may be at odds with time-sensitive evaluations or may limit the number of parameters that are considered. In this article, we give an introductory tutorial focused on parallelizing simulation code to better leverage modern computing hardware, enabling risk analysts to better utilize simulation-based methods for quantifying uncertainty in practice. This article is aimed primarily at risk analysts who use simulation methods but do not yet utilize parallelization to decrease the computational burden of these models. The discussion is focused on conceptual aspects of embarrassingly parallel computer code and software considerations. Two complementary examples are shown using the languages MATLAB and R. A brief discussion of hardware considerations is located in the Appendix. © 2016 Society for Risk Analysis.

  13. Case histories in pharmaceutical risk management.

    Science.gov (United States)

    McCormick, Cynthia G; Henningfield, Jack E; Haddox, J David; Varughese, Sajan; Lindholm, Anders; Rosen, Susan; Wissel, Janne; Waxman, Deborah; Carter, Lawrence P; Seeger, Vickie; Johnson, Rolley E

    2009-12-01

    The development and implementation of programs in the U.S. to minimize risks and assess unintended consequences of new medications has been increasingly required by the Food and Drug Administration (FDA) since the mid 1990s. This paper provides four case histories of risk management and post-marketing surveillance programs utilized recently to address problems associated with possible abuse, dependence and diversion. The pharmaceutical sponsors of each of these drugs were invited to present their programs and followed a similar template for their summaries that are included in this article. The drugs and presenting companies were OxyContin, an analgesic marketed by Purdue Pharma L.P., Daytrana and Vyvanse, ADHD medications marketed by Shire Pharmaceuticals, Xyrem for narcolepsy marketed by Jazz Pharmaceuticals, and Subutex and Suboxone for opioid dependence marketed by Reckitt Benckiser Pharmaceuticals Inc. These case histories and subsequent discussions provide invaluable real-world examples and illustrate both the promise of risk management programs in providing a path to market and/or for keeping on the market drugs with serious potential risks. They also illustrate the limitations of such programs in actually controlling unintended consequences, as well as the challenge of finding the right balance of reducing risks without posing undue barriers to patient access. These experiences are highly relevant as the FDA increasingly requires pharmaceutical sponsors to develop and implement the more formalized and enforceable versions of the risk management term Risk Evaluation and Mitigation Strategies (REMS).

  14. Managing Laboratory Data Using Cloud Computing as an Organizational Tool

    Science.gov (United States)

    Bennett, Jacqueline; Pence, Harry E.

    2011-01-01

    One of the most significant difficulties encountered when directing undergraduate research and developing new laboratory experiments is how to efficiently manage the data generated by a number of students. Cloud computing, where both software and computer files reside online, offers a solution to this data-management problem and allows researchers…

  15. GENERAL RISKS AND UNCERTAINTIES OF REPORTING AND MANAGEMENT REPORTING RISKS

    Directory of Open Access Journals (Sweden)

    CAMELIA I. LUNGU

    2011-04-01

    Full Text Available Purpose: Highlighting risks and uncertainties reporting based on a literature review research. Objectives: The delimitation of risk management models and uncertainties in fundamental research. Research method: Fundamental research study directed to identify the relevant risks’ models presented in entities’ financial statements. Uncertainty is one of the fundamental coordinates of our world. As showed J.K. Galbraith (1978, the world now lives under the age of uncertainty. Moreover, we can say that contemporary society development could be achieved by taking decisions under uncertainty, though, risks. Growing concern for the study of uncertainty, its effects and precautions led to the rather recent emergence of a new science, science of hazards (les cindyniques - l.fr. (Kenvern, 1991. Current analysis of risk are dominated by Beck’s (1992 notion that a risk society now exists whereby we have become more concerned about our impact upon nature than the impact of nature upon us. Clearly, risk permeates most aspects of corporate but also of regular life decision-making and few can predict with any precision the future. The risk is almost always a major variable in real-world corporate decision-making, and managers that ignore it are in a real peril. In these circumstances, a possible answer is assuming financial discipline with an appropriate system of incentives.

  16. Risk analysis of radioactive waste management systems in Germany

    International Nuclear Information System (INIS)

    Wingender, H.J.

    1978-01-01

    Within the scope of a system study, ''Radioactive wastes in the Federal Republic of Germany,'' performed from 1974 through 1976, the questions of risk assessment were investigated. A risk analysis of a high-level waste (HLW) management system was performed. The results of the HLW tank storage are that the risk expectation value is 700 nJ/kg x RBE (7 x 10 -5 rem) per year for atmospheric release. The discussion of the main contributing accidents shows the possibility of reducing the risk by a technical means. A qualitative comparison on the release basis with the results of the WASH-1400 report shows significant differences that can be explained by the different methodologies applied. The risk analysis activities have led to a comprehensive risk assessment project, which was recently started. The projected includes research and development tasks concerning nuclide migration and transport to the ecosphere, nuclide mobilization by various mechanisms, methodology problems, data collection, computer code development, as well as risk analyses of waste management facilities. It is intended to round off the project with risk analyses of spent fuel element transport, storage, and reprocessing

  17. 3D Risk Management for hydrogen installations (Hy3DRM)

    International Nuclear Information System (INIS)

    Skjold, T.; Siccama, D.; Hisken, H.; Brambilla, A.; Middha, P.; Groth, K.M.; LaFleur, A.C.

    2015-01-01

    This paper introduces the 3D Risk Management (3DRM) concept for hydrogen installations (Hy3DRM). The 3DRM framework entails an integrated solution for risk management that combines a detailed site-specific 3D geometry model for a system, a computational fluid dynamics (CFD) tool for simulating accident scenarios involving dispersion, fire and explosions, and a methodology for frequency analysis and quantitative risk assessment (QRA). In order to reduce calculation time, and to cover escalating accident scenarios such as structural collapse and projectiles, the CFD-based consequence analysis can be complemented with reduced order models or finite element analysis (FEA). The paper outlines the background for 3DRM and presents a proof-of-concept risk assessment for a hypothetical hydrogen filling station. This first prototype focuses on dispersion, fire and explosion scenarios resulting from loss of containment of gaseous hydrogen. The approach adopted here combines consequence assessments obtained with the CFD tool FLACS-Hydrogen from Gexcon, and event frequencies estimated with the Hydrogen Risk Assessment Models (HyRAM) tool from Sandia, to generate 3D risk contours for explosion pressure and radiation loads. For a given population density and set of harm criteria it is straightforward to extend the analysis to include personnel risk, as well as risk-based design such as detector optimization. The discussion outlines main challenges and inherent limitations of the 3DRM concept, as well as possibilities and prospects for future development. (author)

  18. Enterprise risk management in international construction operations

    CERN Document Server

    Zhao, Xianbo; Low, Sui Pheng

    2015-01-01

    This book provides readers an understanding of the implementation of Enterprise Risk Management (ERM) for international construction operations. In an extended case study, it primarily focuses on Chinese construction firms (CCFs) based in Singapore. In this regard, the book explains the differences and similarities between Risk Management (RM), Project Risk Management (PRM) and ERM in the construction industry, and examines their linkages for international construction operations in a broader context. The explanation elaborates on how companies may adopt and implement RM, PRM and ERM as appropriate in their various operations, both in their home market as well as in overseas host markets. The book also reviews the whole spectrum of work relating to organizational behavior (OB) as one of the key underpinnings for companies to evaluate and implement ERM. It will benefit practitioners from the industry as well as academics interested in the implementation of ERM practices in international construction operat...

  19. Managing dynamic epidemiological risks through trade

    Science.gov (United States)

    Horan, Richard D.; Fenichel, Eli P.; Finnoff, David; Wolf, Christopher A.

    2015-01-01

    There is growing concern that trade, by connecting geographically isolated regions, unintentionally facilitates the spread of invasive pathogens and pests – forms of biological pollution that pose significant risks to ecosystem and human health. We use a bioeconomic framework to examine whether trade always increases private risks, focusing specifically on pathogen risks from live animal trade. When the pathogens have already established and traders bear some private risk, we find two results that run counter to the conventional wisdom on trade. First, uncertainty about the disease status of individual animals held in inventory may increase the incentives to trade relative to the disease-free case. Second, trade may facilitate reduced long-run disease prevalence among buyers. These results arise because disease risks are endogenous due to dynamic feedback processes involving valuable inventories, and markets facilitate the management of private risks that producers face with or without trade. PMID:25914431

  20. Protection planning and risk management at Lawrence Livermore National Laboratory

    International Nuclear Information System (INIS)

    Hunt, J.S.; Altman, W.D.; Hockert, J.W.

    1988-01-01

    Effective safeguards and security management begins with comprehensive strategic planning that synthesizes protection objectives, threat information, existing protection capabilities, consequences of protection failure, and the costs and impacts of safeguards changes into cost effective protection strategies that adequately address credible threats. Lawrence Livermore National Laboratory (LLNL) has developed a structured risk management approach to safeguards and security planning that is designed to lead to protection strategies that are cost effective, meet the intent of Department of Energy (DOE) orders, balance protection needs with programmatic priorities, and acknowledge a level of residual risks that is not cost effective to eliminate. This risk management approach to safeguards decision making was used to develop the first DOE-approved Master Safeguards and Security Agreement (MSSA) that addresses all security interests at a major facility including: special nuclear material, classified information and materials, computer and communication security, and other DOE property. This risk management approach also provides the strategic basis for day-to-day management of the LLNL security program as well as the integration of safeguards program upgrades

  1. Weather Risk Management in Agriculture

    Directory of Open Access Journals (Sweden)

    Martina Bobriková

    2016-01-01

    Full Text Available The paper focuses on valuation of a weather derivative with payoffs depending on temperature. We use historical data from the weather station in the Slovak town Košice to obtain unique prices of option contracts in an incomplete market. Numerical examples of prices of some contracts are presented, using the Burn analysis. We provide an example of how a weather contract can be designed to hedge the financial risk of a suboptimal temperature condition. The comparative comparison of the selected option hedging strategies has shown the best results for the producers in agricultural industries who hedges against an unfavourable weather conditions. The results of analysis proved that by buying put option or call option, the farmer establishes the highest payoff in the case of temperature decrease or increase. The Long Straddle Strategy is the most expensive but is available to the farmer who hedges against a high volatility in temperature movement. We conclude with the findings that weather derivatives could be useful tools to diminish the financial losses for agricultural industries highly dependent for temperature.

  2. An approach to societal risk acceptance criteria and risk management

    International Nuclear Information System (INIS)

    Okrent, D.; Whipple, C.

    1977-06-01

    A quantitative approach to risk acceptance criteria and risk management is proposed for activities involving risk to individuals not receiving direct benefits, such as employment, from the activity. Societal activities are divided into major facilities or technologies, all or part of which are categorized as essential, beneficial, or peripheral, and a decreasing level of acceptable risk to the most exposed individual is proposed (say, 0.0002/year for essential, 0.00001/year for beneficial, and 0.000002/year for peripheral activity). The risk would be assessed at a high confidence level (say, 90%), thereby providing an incentive to the gaining of better knowledge. Each risk-producing facility, technology, etc., would have to undergo assessment both of risk to the individual and to society. The cost of the latter would have to be internalized, probably via a tax paid to the Federal Government, which in turn would redistribute the benefit as national health insurance or reduced taxes to the individual. Risk aversion to large events would be built into the internalization of the cost of risk

  3. Context-aware computing and self-managing systems

    CERN Document Server

    Dargie, Waltenegus

    2009-01-01

    Bringing together an extensively researched area with an emerging research issue, Context-Aware Computing and Self-Managing Systems presents the core contributions of context-aware computing in the development of self-managing systems, including devices, applications, middleware, and networks. The expert contributors reveal the usefulness of context-aware computing in developing autonomous systems that have practical application in the real world.The first chapter of the book identifies features that are common to both context-aware computing and autonomous computing. It offers a basic definit

  4. On the ALARP approach to risk management

    International Nuclear Information System (INIS)

    Melchers, R.E.

    2001-01-01

    There is an increasing trend by regulatory authorities for the introduction of the as low as reasonably practicable (ALARP) approach in dealing with risk management of proposed or existing complex hazardous systems. For these, decisions about acceptability or tolerability of risks and consequences can have very significant financial, economic and other consequences for the proponents. Conversely, there may be very significant social and socio-economic implications. ALARP as a guide to achieving a satisfactory outcome has a certain intuitive appeal for the practical management of industrial and other risks. However, as suggested herein, there are a number of areas of concern about the validity of this approach. These include representativeness, morality, philosophy, political reality and practicality. An important, and in some respects fundamental, difficulty is that the risk acceptance criteria are not fully open to public scrutiny and can appear to be settled by negotiation

  5. Risk management for independent power projects

    International Nuclear Information System (INIS)

    Owen, J.L.

    1993-01-01

    Independent Power, where electric utilities or other bulk electric power users contract with individual electric power generation facilities to meet their projected long term power needs, has grown dramatically over the past ten years or more. This concept, to contract with Independent Power Producers (IPP), is not a new concept and in fact goes back to the early formation of the electric power industry in this country and worldwide. Successful Risk Management is the foundation for ultimate project completion and operation in fulfilling the expectations of all parties. The primary risks associated with the development of Independent Power projects include: predicting long term fuel availability and cost; predicting long term price for the deliverable of electricity; site selection, site characteristics and permitting; innovative or evolving technology; project execution (design and construction), and; lifetime O ampersand M costs and plant reliability. This paper focuses on the risks inherent in the development of IPPs and addresses the management of these risks

  6. Stakeholder Risk Management in Ethical Decision Making

    DEFF Research Database (Denmark)

    Lauesen, Linne Marie

    evidence from hybrid organizations as Publicly Owned Enterprises (POEs) mixed of private corporations and political administration. The model offers a new way of combining risk management with ethical decisionmaking processes by the inclusion of multiple stakeholders. Not only does the model apply...... to these kinds of hybrid organizations, but it is easily adopted and tested for other private business models too. The findings and the conceptualization of the model enhances business ethics in decision making by managing and balancing stakeholder concerns with the same concerns as the traditional risk......Stakeholder management has for the last three decades been concerned either with strategic business management or business ethics, values and quality. Many models have been developed, but recently the literature asks for more dynamic models instead of the staticism that characterizes some models...

  7. Risk evaluation mitigation strategies: the evolution of risk management policy.

    Science.gov (United States)

    Hollingsworth, Kristen; Toscani, Michael

    2013-04-01

    The United States Food and Drug Administration (FDA) has the primary regulatory responsibility to ensure that medications are safe and effective both prior to drug approval and while the medication is being actively marketed by manufacturers. The responsibility for safe medications prior to marketing was signed into law in 1938 under the Federal Food, Drug, and Cosmetic Act; however, a significant risk management evolution has taken place since 1938. Additional federal rules, entitled the Food and Drug Administration Amendments Act, were established in 2007 and extended the government's oversight through the addition of a Risk Evaluation and Mitigation Strategy (REMS) for certain drugs. REMS is a mandated strategy to manage a known or potentially serious risk associated with a medication or biological product. Reasons for this extension of oversight were driven primarily by the FDA's movement to ensure that patients and providers are better informed of drug therapies and their specific benefits and risks prior to initiation. This article provides an historical perspective of the evolution of medication risk management policy and includes a review of REMS programs, an assessment of the positive and negative aspects of REMS, and provides suggestions for planning and measuring outcomes. In particular, this publication presents an overview of the evolution of the REMS program and its implications.

  8. RISK MANAGEMENT COMPANIES AND HEDGE ACCOUNTING

    Directory of Open Access Journals (Sweden)

    SABIN ARMĂŞELU

    2014-12-01

    Full Text Available The increasing use of derivatives for risk management of a company lately has led to the need to report on an actual basis as these instruments and regulate these operations accounting. This paper proposes a presentation of hedging transactions and their accounting evaluating the impact, in terms of accounting, risk management derivatives on a company. Hedges are often ineffective. Overcoming the ineffectiveness of hedging operations can be achieved by proper designation of the hedging relationship and create an appropriate method to demonstrate hedge effectiveness.

  9. Climate change. Managing the risks

    International Nuclear Information System (INIS)

    Swart, R.J.

    1994-01-01

    In order to address the key question if a targeted approach to climate change response is feasible, different aspects of this question are analyzed. First, the scientific and political aspects of different options to determine specific long-term objectives for climate change are evaluated on the basis of the current scientific insights and the experiences over the last 5 years to develop climate objectives. Preliminary directions for such objectives are given. Next, important analytical tools are discussed that can be applied to analyze the different options and their implications in detail. In order to evaluate the implications of mitigation options, strategies that are consistent with the preliminary climate goals are analyzed in the third part. In chapter 2, the concept of long-term environmental goals, derived from critical levels of climate change, is discussed. Also a historical perspective is provided. A new, systematic regionalized and risk-based approach to elaborate the ultimate objective of the Framework Convention on Climate Change is proposed. In chapter 3 scenarios and integrated models are discussed. Central is the description of scenarios that were developed with RlVM's Integrated Model to Assess the Greenhouse Effect (IMAGE) and the US-EPA's Atmospheric Stabilization Framework (ASF). In chapter 4 potential long-term international emissions control strategies for the different sources and sinks of the most important greenhouse gases are analyzed. Carbon dioxide from energy, carbon dioxide from deforestation, and non-CO 2 greenhouse gases are dealt with subsequently. The dissertation ends with general conclusions and recommendations for the further design of a targeted approach to climate change response, the development of analytical tools to support policy development in the area of climate change, and strategies that are consistent with preliminary long-term environmental goals. 66 figs., 8 tabs., 417 refs., 1 appendix

  10. Managing industrial price risk: a balancing act

    International Nuclear Information System (INIS)

    Muse, J-F.

    2000-01-01

    The challenge of managing industrial price risk is assessed by a senior executive of Cargill, a diversified industrial conglomerate, involved in steel manufacturing and recycling, oilseeds, cocoa, beef, pork, and poultry processing, fertilizer and fruit juice production, in addition to trading and financial risk management. Energy is a key component in many of Cargill's businesses, hence the company has good reason to be concerned about price volatility. The effects of energy risk management on the company's shareholders are demonstrated by an analysis of month-to-month price fluctuations over the Nov 1999 to Oct 2000 period, showing the monthly value of risk at the 95 per cent confidence level as $4,832,195. The effects of alternatives for an end-user such as passing on cost to customers, improving energy efficiency. fuel switching and production curtailment, are explored and limitations and problems with each of the approaches are discussed. The best options for industrial end-users of natural gas are suggested to be a proactive risk management program in the short-term and asset diversification, fuel switching, and geographic relocation of production facilities in the long-term

  11. Risk Management in IT Governance Framework

    Directory of Open Access Journals (Sweden)

    Mirela GHEORGHE

    2011-12-01

    Full Text Available The concept of governance has an already old contour: the system by which business corporations are directed and controlled. The most praised principles regarding shareholder rights, transparency and board accountability now constitute the foundation for new tendencies evolved from such ground. Executive compensation, transparency and shareholder reporting are new issues attached to board responsibilities. Besides such almost negative approaches the board faces a more and more prominent role from risk management and IT governance perspective. Nowadays is generally acknowledged that the board is in charge for managing and controlling the risks to assets of the enterprises and business future. IT Governance has emerged as a support for corporate governance, as an important part of board’s striving efforts to perform better in a competition environment. These responsibilities, risk management and IT Governance, remain within the framework of old concept of corporate governance and are fed from its substance. The interaction between these concepts is the core interest of this research.IT Governance is defined as procedures and policies established in order to assure that the IT system of an organization sustains its goals and strategies. The management of the organisations face a new challenge: structural redefinition of the IT component in order to create plus value and to minimize IT risks through an efficient management of all IT resources of the organisation. The evolution of the present IT environment is a natural process according to which business environment should adapt.

  12. Managing information risk a director's guide

    CERN Document Server

    Mitchell, Stewart

    2009-01-01

    This pocket guide addresses the scope of risks involved in a modern IT system, and outlines strategies for working through the process of putting risk management at the heart of your corporate culture. Given that no two companies are the same, this pocket guide should not be taken as a step-by-step guide, but should provide decision makers with a solid overview of the factors they need to consider and a framework for implementing a regime that suits their needs.

  13. On the strategic value of risk management

    OpenAIRE

    Léautier, Thomas-Olivier; Rochet, Jean-Charles

    2012-01-01

    This article examines how firms facing volatile input prices and holding some degree of market power in their product market link their risk management and their production or pricing strategies. This issue is relevant in many industries ranging from manufacturing to energy retailing, where risk averse firms decide on their hedging strategies before their product market strategies. We find that hedging modifies the pricing and production strategies of firms. This strategic effect is channelle...

  14. Online professional networks for physicians: risk management.

    Science.gov (United States)

    Hyman, Jon L; Luks, Howard J; Sechrest, Randale

    2012-05-01

    The rapidly developing array of online physician-only communities represents a potential extraordinary advance in the availability of educational and informational resources to physicians. These online communities provide physicians with a new range of controls over the information they process, but use of this social media technology carries some risk. The purpose of this review was to help physicians manage the risks of online professional networking and discuss the potential benefits that may come with such networks. This article explores the risks and benefits of physicians engaging in online professional networking with peers and provides suggestions on risk management. Through an Internet search and literature review, we scrutinized available case law, federal regulatory code, and guidelines of conduct from professional organizations and consultants. We reviewed the OrthoMind.com site as a case example because it is currently the only online social network exclusively for orthopaedic surgeons. Existing case law suggests potential liability for orthopaedic surgeons who engage with patients on openly accessible social network platforms. Current society guidelines in both the United States and Britain provide sensible rules that may mitigate such risks. However, the overall lack of a strong body of legal opinions, government regulations as well as practical experience for most surgeons limit the suitability of such platforms. Closed platforms that are restricted to validated orthopaedic surgeons may limit these downside risks and hence allow surgeons to collaborate with one another both as clinicians and practice owners. Educating surgeons about the pros and cons of participating in these networking platforms is helping them more astutely manage risks and optimize benefits. This evolving online environment of professional interaction is one of few precedents, but the application of risk management strategies that physicians use in daily practice carries over

  15. Risk evaluation of accident management strategies

    International Nuclear Information System (INIS)

    Dingman, S.; Camp, A.

    1992-01-01

    The use of Probabilistic Risk Assessment (PRA) methods to evaluate accident management strategies in nuclear power plants discussed in this paper. The PRA framework allows an integrated evaluation to be performed to give the full implications of a particular strategy. The methodology is demonstrated for a particular accident management strategy, intentional depressurization of the reactor coolant system to avoid containment pressurization during the ejection of molten debris at vessel breach

  16. Does Corporate Governance Impact Risk Management System?

    Directory of Open Access Journals (Sweden)

    Petre BREZEANU

    2011-04-01

    Full Text Available This paper brings forth the contribution of corporate governance to risk management system at the enterprise level. The research is a complex one, integrating both quantitative and qualitative information. The quantitative information consists of balance sheet and profit and loss account data while the qualitative one includes dummy variables reflecting the agency and monitoring costs which govern the relationship between managers and shareholders.

  17. Coastal Risk Management in a Changing Climate

    DEFF Research Database (Denmark)

    Burcharth, Hans F.; Zanuttigh, Barbara; Andersen, Thomas Lykke

    2014-01-01

    Existing coastal management and defense approaches are not well suited to meet the challenges of climate change and related uncertanities. Professionals in this field need a more dynamic, systematic and multidisciplinary approach. Written by an international group of experts, Coastal Risk...... Management in a Changing Climate provides innovative, multidisciplinary best practices for mitigating the effects of climate change on coastal structures. Based on the Theseus program, the book includes eight study sites across Europe, with specific attention to the most vulnerable coastal environments...

  18. Contextualising risk within enterprise risk management through the application of systems thinking

    CSIR Research Space (South Africa)

    Haywood, Lorren K

    2017-06-01

    Full Text Available New and emerging risks create growing uncertainty and unpredictability within enterprise risk management. While ISO 31000:2009 is a progressive risk management framework, it is limited in its guidance on how to contextualise complex risks...

  19. Managing Risk to the Patient: Recoding Quality Risk Management for the Pharmaceutical and Biopharmaceutical Industries

    OpenAIRE

    Waldron, Kelly

    2017-01-01

    This thesis explores the application of quality risk management (QRM) in pharmaceutical and biopharmaceutical companies and its effectiveness at managing risk to the patient. The objective of the research described in this thesis was to characterize a maturity state of QRM implementation in which the patient is adequately protected from the risks associated with medicinal products of inadequate quality. The research was conducted over three phases: first, to determine whether patients are bet...

  20. Cloud Computing and Risk: A look at the EU and the application of the Data Protection Directive to cloud computing

    OpenAIRE

    Victoria Ostrzenski

    2013-01-01

    The use of cloud services for the management of records presents many challenges, both in terms of the particulars of data security as well the need to sustain and ensure the greater reliability, authenticity, and accuracy of records. To properly grapple with these concerns requires the development of more specifically applicable and effective binding legislation; an important first step is the examination and identification of the risks specific to cloud computing coupled with an evaluation...

  1. Perceptions of food risk management among key stakeholders

    DEFF Research Database (Denmark)

    van Kleef, Ellen; Frewer, Lynn J.; Chryssochoidis, George M.

    2006-01-01

    In designing and implementing appropriate food risk management strategies, it is important to examine how key stakeholders perceive both the practice and effectiveness of food risk management.......In designing and implementing appropriate food risk management strategies, it is important to examine how key stakeholders perceive both the practice and effectiveness of food risk management....

  2. 77 FR 30517 - Electricity Subsector Cybersecurity Risk Management Process

    Science.gov (United States)

    2012-05-23

    ... DEPARTMENT OF ENERGY Electricity Subsector Cybersecurity Risk Management Process AGENCY: Office of... Electricity Subsector Cybersecurity Risk Management Process guideline. The guideline describes a risk... Management Process. The primary goal of this guideline is to describe a risk management process that is...

  3. Risk management model of winter navigation operations

    International Nuclear Information System (INIS)

    Valdez Banda, Osiris A.; Goerlandt, Floris; Kuzmin, Vladimir; Kujala, Pentti; Montewka, Jakub

    2016-01-01

    The wintertime maritime traffic operations in the Gulf of Finland are managed through the Finnish–Swedish Winter Navigation System. This establishes the requirements and limitations for the vessels navigating when ice covers this area. During winter navigation in the Gulf of Finland, the largest risk stems from accidental ship collisions which may also trigger oil spills. In this article, a model for managing the risk of winter navigation operations is presented. The model analyses the probability of oil spills derived from collisions involving oil tanker vessels and other vessel types. The model structure is based on the steps provided in the Formal Safety Assessment (FSA) by the International Maritime Organization (IMO) and adapted into a Bayesian Network model. The results indicate that ship independent navigation and convoys are the operations with higher probability of oil spills. Minor spills are most probable, while major oil spills found very unlikely but possible. - Highlights: •A model to assess and manage the risk of winter navigation operations is proposed. •The risks of oil spills in winter navigation in the Gulf of Finland are analysed. •The model assesses and prioritizes actions to control the risk of the operations. •The model suggests navigational training as the most efficient risk control option.

  4. Estimation, assessment and management of risks

    International Nuclear Information System (INIS)

    Reinoehl-Kompa, S.

    2005-01-01

    After the introductory lectures the closed conference divided into sessions on the estimation, assessment and management of risks. This review article summarises some of the central issues which were addressed in the discussions held during the closed conference and which may be of significance for the future work of the ''Radiation Risk'' Committee within the Radiation Protection Commission. Fundamental difficulties still persist in the implementation of risk quantities within the concepts of radiation protection (lectures by Breckow and Kiefer). Some of these difficulties have to do with the definition of dose quantities, in particular with the one most central to radiation protection, the effective dose. In the field of sparsely ionizing radiation attention was focused on two main topics, namely the risk of acquiring thyroid cancer in association with the Chernobyl desaster and analyses of new mortality data on the survivors of the nuclear bomb attacks on Hiroshima and Nagasaki. In the area of lung cancer risk from radon exposure, attention was focused on indoor exposure and the cohort study on bismuth miners. The body of knowledge that has accumulated on the risk of acquiring cancer through UV radiation takes a special position within the wider field of risks associated with nonionizing radiation, since much has already been achieved towards identifying the action mechanisms involved here. Since skin cancer shows the highest increments in incidence of all types of cancer, estimating the risk of acquiring skin cancer through UV radiation will be an important issue in future. One of the tasks of risk management is to translate the results of risk assessment into action. One task of particular importance in this regard is ''risk communication'', the problems surrounding which were illuminated from different perspectives in various contributions

  5. The study of the risk management model of construction project

    International Nuclear Information System (INIS)

    Jiang Bo; Feng Yanping; Liu Changbin

    2010-01-01

    The paper first analyzed the development of the risk management of construction project and the risk management processes, and then briefly introduced the risk management experience of foreign project management. From the project management by objectives point of view, the greatest risk came from the lack of clarity of the objectives in the project management, which led to the project's risk emergence. In the analysis of the principles of the project objectives identification and risk allocation, the paper set up a project management model which insurance companies involved in the whole process of the project management, and simply analyzed the roles of insurance company at last. (authors)

  6. Audit of psychosocial risk management systems

    DEFF Research Database (Denmark)

    Jespersen, Anne Helbo; Hasle, Peter; Hohnen, Pernille

    2014-01-01

    organizations on how to manage risks. Internal and external audits of compliance with the standard are key elements. Auditors should be competent to carry out the task and be familiar with risks of the areas they are auditing. The competences and practice of internal auditors have been studied...... in two Danish municipalities. The results show that auditors have a varied background and a limited knowledge about psychosocial risks. They have difficulties in carrying out audits and the results are mainly influenced by personal preferences....

  7. Safety Risk Management for Homeland Defense and Security Responders

    National Research Council Canada - National Science Library

    Meyers, Tommey H

    2005-01-01

    .... Coast Guard and the U.S. Navy. This revealed that Operational Risk Management (ORM), a risk-based decision-making tool that systematically balances risk and mission completion, and Crew Resource Management (CRM...

  8. Think It Through: Managing the Benefits and Risks of Medicines

    Science.gov (United States)

    ... Drugs) Think It Through: Managing the Benefits and Risks of Medicines Share Tweet Linkedin Pin it More ... make decisions about the medicines you use. Managing Risk When a medicine's benefits outweigh its known risks, ...

  9. Risk management among mountain bikers in selected clubs in ...

    African Journals Online (AJOL)

    Risk management among mountain bikers in selected clubs in Malaysia. ... Journal of Fundamental and Applied Sciences. Journal Home · ABOUT ... is more risky. Keywords: mountain biking, risk management, event management, Malaysia ...

  10. Overcoming Learning Aversion in Evaluating and Managing Uncertain Risks.

    Science.gov (United States)

    Cox, Louis Anthony Tony

    2015-10-01

    Decision biases can distort cost-benefit evaluations of uncertain risks, leading to risk management policy decisions with predictably high retrospective regret. We argue that well-documented decision biases encourage learning aversion, or predictably suboptimal learning and premature decision making in the face of high uncertainty about the costs, risks, and benefits of proposed changes. Biases such as narrow framing, overconfidence, confirmation bias, optimism bias, ambiguity aversion, and hyperbolic discounting of the immediate costs and delayed benefits of learning, contribute to deficient individual and group learning, avoidance of information seeking, underestimation of the value of further information, and hence needlessly inaccurate risk-cost-benefit estimates and suboptimal risk management decisions. In practice, such biases can create predictable regret in selection of potential risk-reducing regulations. Low-regret learning strategies based on computational reinforcement learning models can potentially overcome some of these suboptimal decision processes by replacing aversion to uncertain probabilities with actions calculated to balance exploration (deliberate experimentation and uncertainty reduction) and exploitation (taking actions to maximize the sum of expected immediate reward, expected discounted future reward, and value of information). We discuss the proposed framework for understanding and overcoming learning aversion and for implementing low-regret learning strategies using regulation of air pollutants with uncertain health effects as an example. © 2015 Society for Risk Analysis.

  11. Emergency thoracic ultrasound and clinical risk management

    Directory of Open Access Journals (Sweden)

    Interrigi MC

    2017-02-01

    Full Text Available Maria Concetta Interrigi,1 Francesca M Trovato,2,3 Daniela Catalano,3,4 Guglielmo M Trovato3,5 1Accident and Emergency Department, Ospedale Cannizzaro, Catania, 2Accident and Emergency Department, Ospedale Civile, Ragusa, 3Department of Clinical and Experimental Medicine, The School of Medicine, University of Catania, 4Postgraduate School of Clinical Ultrasound, Department of Clinical and Experimental Medicine, Azienda Ospedaliero-Universitaria Policlinico, University of Catania, 5Postgraduate School of e-Learning and ICT in Health Sciences, The School of Medicine, University of Catania, Catania, Italy Purpose: Thoracic ultrasound (TUS has been proposed as an easy-option replacement for chest X-ray (CXR in emergency diagnosis of pneumonia, pleural effusion, and pneumothorax. We investigated CXR unforeseen diagnosis, subsequently investigated by TUS, considering its usefulness in clinical risk assessment and management and also assessing the sustainability of telementoring. Patients and methods: This observational report includes a period of 6 months with proactive concurrent adjunctive TUS diagnosis telementoring, which was done using freely available smartphone applications for transfer of images and movies. Results: Three hundred and seventy emergency TUS scans (excluding trauma patients were performed and telementored. In 310 cases, no significant chest pathology was detected either by CXR, TUS, or the subsequent work-up; in 24 patients, there was full concordance between TUS and CXR (ten isolated pleural effusion; eleven pleural effusion with lung consolidations; and three lung consolidation without pleural effusion; in ten patients with lung consolidations, abnormalities identified by CXR were not detected by TUS. In 26 patients, only TUS diagnosis criteria of disease were present: in 19 patients, CXR was not diagnostic, ie, substantially negative, but TUS detected these conditions correctly, and these were later confirmed by computed

  12. Automated procedure for performing computer security risk analysis

    International Nuclear Information System (INIS)

    Smith, S.T.; Lim, J.J.

    1984-05-01

    Computers, the invisible backbone of nuclear safeguards, monitor and control plant operations and support many materials accounting systems. Our automated procedure to assess computer security effectiveness differs from traditional risk analysis methods. The system is modeled as an interactive questionnaire, fully automated on a portable microcomputer. A set of modular event trees links the questionnaire to the risk assessment. Qualitative scores are obtained for target vulnerability, and qualitative impact measures are evaluated for a spectrum of threat-target pairs. These are then combined by a linguistic algebra to provide an accurate and meaningful risk measure. 12 references, 7 figures

  13. Latent-failure risk estimates for computer control

    Science.gov (United States)

    Dunn, William R.; Folsom, Rolfe A.; Green, Owen R.

    1991-01-01

    It is shown that critical computer controls employing unmonitored safety circuits are unsafe. Analysis supporting this result leads to two additional, important conclusions: (1) annual maintenance checks of safety circuit function do not, as widely believed, eliminate latent failure risk; (2) safety risk remains even if multiple, series-connected protection circuits are employed. Finally, it is shown analytically that latent failure risk is eliminated when continuous monitoring is employed.

  14. Learned predation risk management by spider mites

    Directory of Open Access Journals (Sweden)

    Thomas eHackl

    2014-09-01

    Full Text Available Predation is a prime selective force shaping prey behavior. Investment in anti-predator behavior is traded-off against time and energy for other fitness-enhancing activities such as foraging or reproduction. To optimize this benefit/cost trade-off, prey should be able to innately and/or by experience modulate their behavior to the level of predation risk. Here, we assessed learned predation risk management in the herbivorous two-spotted spider mite Tetranychus urticae. We exposed spider mites coming from benign (naïve or high immediate predation risk (experienced environments to latent and/or no risk and assessed their site choice, activity and oviposition. Benign environments were characterized by the absence of any predator cues, high immediate risk environments by killed spider mites, physical presence of the predatory mite Phytoseiulus persimilis and associated chemosensory traces left on the surface, and latent risk environments by only predator traces. In the no-choice experiment both naïve and experienced spider mites laid their first egg later on leaves with than without predator traces. Irrespective of predator traces presence/absence, experienced mites laid their first egg earlier than naïve ones did. Naïve spider mites were more active, indicating higher restlessness, and laid fewer eggs on leaves with predator traces, whereas experienced mites were less active and laid similar numbers of eggs on leaves with and without predator traces. In the choice experiment both naïve and experienced spider mites preferentially resided and oviposited on leaves without predator traces but experienced mites were less active than naïve ones. Overall, our study suggests that spider mites experienced with high predation risk behave bolder under latent risk than naïve spider mites. Since predator traces alone do not indicate immediate risk, we argue that the attenuated anti-predator response of experienced spider mites represents adaptive learned

  15. A data management system to enable urgent natural disaster computing

    Science.gov (United States)

    Leong, Siew Hoon; Kranzlmüller, Dieter; Frank, Anton

    2014-05-01

    Civil protection, in particular natural disaster management, is very important to most nations and civilians in the world. When disasters like flash floods, earthquakes and tsunamis are expected or have taken place, it is of utmost importance to make timely decisions for managing the affected areas and reduce casualties. Computer simulations can generate information and provide predictions to facilitate this decision making process. Getting the data to the required resources is a critical requirement to enable the timely computation of the predictions. An urgent data management system to support natural disaster computing is thus necessary to effectively carry out data activities within a stipulated deadline. Since the trigger of a natural disaster is usually unpredictable, it is not always possible to prepare required resources well in advance. As such, an urgent data management system for natural disaster computing has to be able to work with any type of resources. Additional requirements include the need to manage deadlines and huge volume of data, fault tolerance, reliable, flexibility to changes, ease of usage, etc. The proposed data management platform includes a service manager to provide a uniform and extensible interface for the supported data protocols, a configuration manager to check and retrieve configurations of available resources, a scheduler manager to ensure that the deadlines can be met, a fault tolerance manager to increase the reliability of the platform and a data manager to initiate and perform the data activities. These managers will enable the selection of the most appropriate resource, transfer protocol, etc. such that the hard deadline of an urgent computation can be met for a particular urgent activity, e.g. data staging or computation. We associated 2 types of deadlines [2] with an urgent computing system. Soft-hard deadline: Missing a soft-firm deadline will render the computation less useful resulting in a cost that can have severe

  16. Economic optimisation of flood risk management projects

    NARCIS (Netherlands)

    Tsimopoulou, V.

    2015-01-01

    The Netherlands has developed a flood risk management policy based on an economic rationale. After the flood disaster of 1953, when a large area of the south-western part of the country was flooded and more than 1800 people lost their lives, the so-called Delta Committee was installed, whose main

  17. Improving ICU risk management and patient safety.

    Science.gov (United States)

    Kielty, Lucy Ann

    2017-06-12

    Purpose The purpose of this paper is to describe a study which aimed to develop and validate an assessment method for the International Electrotechnical Commission (IEC) 80001-1 (IEC, 2010) standard (the Standard); raise awareness; improve medical IT-network project risk management processes; and improve intensive care unit patient safety. Design/methodology/approach An assessment method was developed and piloted. A healthcare IT-network project assessment was undertaken using a semi-structured group interview with risk management stakeholders. Participants provided feedback via a questionnaire. Descriptive statistics and thematic analysis was undertaken. Findings The assessment method was validated as fit for purpose. Participants agreed (63 per cent, n=7) that assessment questions were clear and easy to understand, and participants agreed (82 per cent, n=9) that the assessment method was appropriate. Participant's knowledge of the Standard increased and non-compliance was identified. Medical IT-network project strengths, weaknesses, opportunities and threats in the risk management processes were identified. Practical implications The study raised awareness of the Standard and enhanced risk management processes that led to improved patient safety. Study participants confirmed they would use the assessment method in future projects. Originality/value Findings add to knowledge relating to IEC 80001-1 implementation.

  18. Risk assessment and radioactive waste management

    International Nuclear Information System (INIS)

    Cohen, J.J.

    1979-01-01

    Problems of radioactive waste management, both real and apparent, have provided a serious constraint in the development of nuclear power. Several studies have been conducted in an attempt to evaluate the actual (quantifiable) risks of radioactive waste management and place them in a reasonable perspective. These studies are reviewed and discussed. Generally, the studies indicate the risks to be of a level of seriousness which might normally be considered acceptable in current society. However, it is apparent that this acceptability has not been attained and public apprehension prevails. To understand the reasons for this apprehension requires an assessment of those factors of ''perceived'' risks which play a major role in determining public attitudes toward radioactive waste management programs and nuclear power, in general. Such factors might include the spector of legacies of harm to future generations, genetic effects, nuclear garbage dumps, proliferation of plutonium inventories, nuclear terrorism, etc. A major problem in development of acceptable waste management policies and programs requires not only the recognition of the importance of perceived risk factors but development of a methodology for their incorporation in planning and conduct of such activities. Some approaches to the development of this methodology are discussed

  19. Preoperative evaluation : risk management and implementation aspects

    NARCIS (Netherlands)

    Klei, W.A. van

    2002-01-01

    In preoperative risk management the anesthesiologist uses diagnostic information to estimate the probability of outcomes and to decide on the anesthetic strategy in a particular patient. The aim of this thesis was explore to what extent simple patient characteristics, particularly obtained from

  20. Managing Risk, Reducing Vulnerability and Enhancing Productivity ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Managing Risk, Reducing Vulnerability and Enhancing Productivity under a Changing Climate. The countries of the Greater Horn of Africa are particularly vulnerable to drought, exacerbated by widespread poverty and dependence on rainfed agriculture. Even with normal rainfall, the region does not produce enough food to ...

  1. Risk management and corporate governance performance ...

    African Journals Online (AJOL)

    The study examines the relative effect of risk management and corporate governance on bank performance in Nigeria. The study utilizes both primary and secondary data. The primary data were collected using structured questionnaire that were administered in Four-hundred and eighty (480) employees of Wema Bank Plc ...

  2. Religion, Heuristics, and Intergenerational Risk Management

    OpenAIRE

    Rupert Read; Nassim Nicholas Taleb

    2014-01-01

    Religions come with risk-​managing interdicts and heuristics, and they carry such interdicts and heuristics across generations. We remark on such facets of religion in relation to a propensity among some decision scientists and others to regard practices that they cannot understand as being irrational, biased, and so on.

  3. Implementing a risk management program at Falconbridge

    International Nuclear Information System (INIS)

    Blechta, G.

    2003-01-01

    A corporate overview of Falconbridge was presented. Falconbridge, founded in 1928 is a leading producer of nickel, copper, cobalt and platinum group metals at low cost. A map displaying its worldwide locations was shown. In Canada, Falconbridge operates in Ontario and Nunavik Territory. The experience in Norway was briefly described, touching on market volatility, market intelligence, portfolio management, and risk management guidelines. The author then explained the purpose of the Energy Project Team, which was responsible for preparing for deregulation, developing strategies for purchasing energy, and minimizing the cost of purchased energy in a competitive market. The plan was described, and the emphasis placed on the core Ontario team. Communication played a large part. The management system functions were reviewed, and analysis provided. The financial integration model was presented. Risk management was dealt with, followed by market intelligence and operational hedge. Division impact was discussed. The major Falconbridge issues were: budget exposure to electricity price variability, how much fixed-price power supply and how long should the contracts be, regulatory structure, market purchase timing, and adhere to corporate risk management policy. The procurement process was described. The author concluded that the product must be kept simple and the number of products limited. A realistic schedule must by adhered to, and a short bidding period of four hours proved ideal. Supplier relationship must be consumer driven. The importance of communication plan was emphasized. Getting pre-approval to make the deal is important. tabs., figs

  4. Pneumoperitoneum after virtual colonoscopy: causes, risk factors, and management.

    Science.gov (United States)

    Baccaro, Leopoldo M; Markelov, Alexey; Wilhelm, Jakub; Bloch, Robert

    2014-06-01

    Computed tomographic virtual colonoscopy (CTVC) is a safe and minimally invasive modality when compared with fiberoptic colonoscopy for evaluating the colon and rectum. We have reviewed the risks for colonic perforation by investigating the relevant literature. The objectives of this study were to assess the risk of colonic perforation during CTVC, describe risk factors, evaluate ways to reduce the incidence complications, and to review management and treatment options. A formal search of indexed publications was performed through PubMed. Search queries using keywords "CT colonography," "CT virtual colonoscopy," "virtual colonoscopy," and "perforation" yielded a total of 133 articles. A total of eight case reports and four review articles were selected. Combining case reports and review articles, a total of 25 cases of colonic perforation after CTVC have been reported. Causes include, but are not limited to, diverticular disease, irritable bowel diseases, obstructive processes, malignancies, and iatrogenic injury. Both operative and nonoperative management has been described. Nonoperative management has been proven safe and successful in minimally symptomatic and stable patients. Colonic perforation after CTVC is a rare complication and very few cases have been reported. Several risk factors are recurrent in the literature and must be acknowledged at the time of the study. Management options vary and should be tailored to each individual patient.

  5. Health risk assessment for program managers

    International Nuclear Information System (INIS)

    Jump, R.A.; Williamson, D.S.

    1994-01-01

    This paper presents the findings of a sensitivity analysis into the independent variables that determine the levels of health risks posed by buried plutonium and americium at a typical contaminated site in an arid region. Environmental Restoration Program Managers often must make decisions concerning cleanup levels, remediation alternatives, schedules, cost estimates, etc. based upon extraordinarily safe assumptions about risk assessment calculation inputs. This study reveals to the Program Manager which variables are major drivers to the calculated levels of risk posed by transuranic radionuclides and which ones have second order effects or less. The findings of this study should indicate which inputs should be the focus of attention during negotiations with regulators and of further empirical investigation

  6. Risk Informed Structural Systems Integrity Management

    DEFF Research Database (Denmark)

    Nielsen, Michael Havbro Faber

    2017-01-01

    The present paper is predominantly a conceptual contribution with an appraisal of major developments in risk informed structural integrity management for offshore installations together with a discussion of their merits and the challenges which still lie ahead. Starting point is taken in a selected...... overview of research and development contributions which have formed the basis for Risk Based Inspection Planning (RBI) as we know it today. Thereafter an outline of the methodical basis for risk informed structural systems integrity management, i.e. the Bayesian decision analysis is provided in summary....... The main focus is here directed on RBI for offshore facilities subject to fatigue damages. New ideas and methodical frameworks in the area of robustness and resilience modeling of structural systems are then introduced, and it is outlined how these may adequately be utilized to enhance Structural Integrity...

  7. Mainstreaming disaster risk management in higher education

    Directory of Open Access Journals (Sweden)

    MARCIA VILLASANA

    Full Text Available Universities should actively participate in disseminating and fostering a culture for disaster risk management (DRM among students and the community. Particularly in countries with high levels of risk, education plays a key role in raising awareness on the importance of preventing and implementing conscious risk management. Though the incorporation of DRM into the curricula, education programs become a mechanism to prepare students from a perspective of strengthening of values, citizenship, and social sensibility towards how disaster represents a disruption of the functioning of a community and impairs business activity. This paper presents the proposal for the integration of DRM of a private university in Mexico, one of the countries particularly susceptible to extreme hydrometereological and geological events. The proposal includes a concentration area for undergraduate business students, a mandatory introductory course for all business majors, and for the business community an executive education program for SMEs

  8. RISK MANAGEMENT FROM THE INFORMATION SECURITY PERSPECTIVE

    Directory of Open Access Journals (Sweden)

    Riza Ionuț

    2017-11-01

    Full Text Available Risk management has emerged ever since the appearance of human communities and it has developed at a slow rate. Over time, a significant improvement was made, from accepting hazards to the identification, evaluation and control of unwanted events, threat prevention and exploitation of opportunities through scientific risk management actions. The fundamental role of research in cyber security is to concentrate the efforts on those contexts and conditions which determine the way in which key players reach a common understanding of the way to conceive and eventually answer to certain challenges in cyber security. In order to build a clear perception of these effects, this work presents the main elements which define cyber space, to come to the aid of turning the management process into an efficient one, especially when talking about cyber space as a space for conflicts, both economic and political.

  9. Cyber Terrorism demands a Global Risks and Threats Strategic Management

    International Nuclear Information System (INIS)

    Gareva, R.

    2007-01-01

    The world is in the third wave of development, which is digital managed and networked. Information, which creates the knowledge is transferring thorough the Internet by exponential function. The rapid advancement of the computer technology has a great influence over the development of the critical information infrastructure, thus changing the safety environment and the national values and interests. This advancement produces threats and risks from computer perspective which are sublimated in different forms of international terrorism and particularly in cyber terrorism. The main aim of this paper is based on a thorough analysis of what is scientifically known and practiced when nowadays critical information infrastructure is in the focus of the cyber terrorism. The rapid IT development demands changes in the strategic management focus. As a result of a time-consuming theoretical and empirical research this paper suggests a methodology for strategic managing of: threats, risks and vulnerabilities. The proposed methodology is seen as a mean to increase the human security conscious in every sense of the word, and to promote the need for rules, procedures and standards establishment from the aspect of the strategic management in the new information epoch concerning. In addition, through a scientific discourse, a short attempt is made to relate Macedonian reality with the phenomenon mentioned above. The most fundamental set phrase is that the efficiency and promptly made decisions during strategic planning are a projection of the systematic organization of functions and models for managing the risks and threats of the critical information infrastructure. Hence, this paper could be seen as a perspective when taking in consideration the regional strategic management, and the cyber space vital functioning. (author)

  10. Human System Risk Management for Space Flight

    Science.gov (United States)

    Davis, Jeffrey

    2015-01-01

    This brief abstract reviews the development of the current day approach to human system risk management for space flight and the development of the critical components of this process over the past few years. The human system risk management process now provides a comprehensive assessment of each human system risk by design reference mission (DRM) and is evaluated not only for mission success but also for long-term health impacts for the astronauts. The discipline of bioastronautics is the study of the biological and medical effects of space flight on humans. In 1997, the Space Life Sciences Directorate (SLSD) initiated the Bioastronautics Roadmap (Roadmap) as the "Critical Path Roadmap", and in 1998 participation in the roadmap was expanded to include the National Space Biomedical Research Institute (NSBRI) and the external community. A total of 55 risks and 250 questions were identified and prioritized and in 2000, the Roadmap was base-lined and put under configuration control. The Roadmap took into account several major advisory committee reviews including the Institute of Medicine (IOM) "Safe Passage: Astronaut care for Exploration Missions", 2001. Subsequently, three collaborating organizations at NASA HQ (Chief Health and Medical Officer, Office of Space Flight and Office of Biological & Physical Research), published the Bioastronautics Strategy in 2003, that identified the human as a "critical subsystem of space flight" and noted that "tolerance limits and safe operating bands must be established" to enable human space flight. These offices also requested a review by the IOM of the Roadmap and that review was published in October 2005 as "A Risk Reduction Strategy for Human Exploration of Space: A Review of NASA's Bioastronautics Roadmap", that noted several strengths and weaknesses of the Roadmap and made several recommendations. In parallel with the development of the Roadmap, the Office of the Chief Health and Medical Officer (OCHMO) began a process in

  11. Quality risk management in pharmaceutical development.

    Science.gov (United States)

    Charoo, Naseem Ahmad; Ali, Areeg Anwer

    2013-07-01

    The objective of ICH Q8, Q9 and Q10 documents is application of systemic and science based approach to formulation development for building quality into product. There is always some uncertainty in new product development. Good risk management practice is essential for success of new product development in decreasing this uncertainty. In quality by design paradigm, the product performance properties relevant to the patient are predefined in target product profile (TPP). Together with prior knowledge and experience, TPP helps in identification of critical quality attributes (CQA's). Initial risk assessment which identifies risks to these CQA's provides impetus for product development. Product and process are designed to gain knowledge about these risks, devise strategies to eliminate or mitigate these risks and meet objectives set in TPP. By laying more emphasis on high risk events the protection level of patient is increased. The process being scientifically driven improves the transparency and reliability of the manufacturer. The focus on risk to the patient together with flexible development approach saves invaluable resources, increases confidence on quality and reduces compliance risk. The knowledge acquired in analysing risks to CQA's permits construction of meaningful design space. Within the boundaries of the design space, variation in critical material characteristics and process parameters must be managed in order to yield a product having the desired characteristics. Specifications based on product and process understanding are established such that product will meet the specifications if tested. In this way, the product is amenable to real time release, since specifications only confirm quality but they do not serve as a means of effective process control.

  12. Risk management of hydropower development in China

    International Nuclear Information System (INIS)

    Tang, Wenzhe; Li, Zhuoyu; Qiang, Maoshan; Wang, Shuli; Lu, Youmei

    2013-01-01

    There is a rapidly increasing demand for hydropower in China. However, little research has been conducted to systematically investigate the overall aspects of hydropower development risks. With support of the data collected from a fieldwork survey, this study reports the multiple facets of hydropower development risks in China as perceived by main project participants. All groups have a common view on the criticality of safety, and the groups also have their own priorities, i.e., resettlement of migrants, incompetence of subcontractors, project delay, inadequate or incorrect design, premature failure of facilities and ecological and environmental impacts are the key risks to clients, whereas quality of work, financial related risks, reputation, and claims and disputes are the main concerns to contractors. A case study of Three Gorges Project further demonstrates that, hydropower development risks can be effectively managed by encouraging joint efforts of all participants to achieve the goals on producing renewable energy, reducing emissions of CO 2 , and providing important social/economical benefits. Future hydropower development should emphasize the interactions between project delivery, environmental, and economical processes to reach appropriate trade-offs among involving stakeholders, by adequately considering the inter-relations between project participants' risks as well as hydropower project's externalities on a broad view. - Highlights: • Largely attributed to unforeseen geology conditions, safety is critical in hydropower development. • Resettlement of migrants is the principal risk to clients, whereas quality of works is the first concern to contractors. • One group's risks are typically related to others', needing collaborative risk management by participants. • Three Gorges Project plays a key role on producing renewable energy, and providing social/economical benefits. • Hydropower development should emphasize the interactions between

  13. Computer System Analysis for Decommissioning Management of Nuclear Reactor

    International Nuclear Information System (INIS)

    Nurokhim; Sumarbagiono

    2008-01-01

    Nuclear reactor decommissioning is a complex activity that should be planed and implemented carefully. A system based on computer need to be developed to support nuclear reactor decommissioning. Some computer systems have been studied for management of nuclear power reactor. Software system COSMARD and DEXUS that have been developed in Japan and IDMT in Italy used as models for analysis and discussion. Its can be concluded that a computer system for nuclear reactor decommissioning management is quite complex that involved some computer code for radioactive inventory database calculation, calculation module on the stages of decommissioning phase, and spatial data system development for virtual reality. (author)

  14. CRISIS: A System for Risk Management

    Directory of Open Access Journals (Sweden)

    Erica Y. Sanchez

    2012-12-01

    Full Text Available In a situation of an unexpected catastrophe, uncertainty and demand for information are constant. In such a disaster scenario, the CRISIS system arises as a tool to contribute to previous coordination, procedure validation, exercise execution, a good and frequent communication among organizations, and weakness and threat assessment for an appropriate risk management. It offers a wide variety of tools for online communication, consultation and collaboration that, up to this day, includes cartography, tasks, resources, news, forums, instant messaging and chat. As a complement, mathematical models for training and emergency management are being researched and developed. For Argentinean society, it is a necessity to switch from the current handcrafted, bureaucratic emergency management method to a decision-making management model. Previous coordination, exercise execution, a fluid communication among institutions, and threats and weaknesses assessment are required for a proper risk management. With that goal in mind, it is important to reduce confusion, avoid the duplication of efforts to fulfill the same tasks, and have access to a complete vision of the situation, generated from the data of all the organizations taking part. The CRISIS system is a secure web application, accessible to every node in a network formed by the organizations which have complementary responsibilities during prevention and response. It offers a wide variety of tools for online communication, consultation and collaboration that, up to this day, includes cartography, tasks, media (organization and resources, news, forums, instant messaging and chat. As a complement, mathematical models for training and emergency management are being researched and developed. Currently, there are toxicological and epidemiological emergency models available. The present paper analyses, from the perspectives related to risk management for emergencies and disasters, the strengths and weaknesses

  15. Risk Management for New Product Development Projects in Food Industry

    Directory of Open Access Journals (Sweden)

    Porananond, D.

    2014-07-01

    Full Text Available Project risk management provides a guideline for decision making in new product development (NPD projects, reducing uncertainty and increasing success rate. However, the acceptance of formal risk management applications in industry, especially for NPD projects is still in question. A study of a food conglomerate in Thailand found that only 9% of NPD projects used a systematic approach for managing risk. 61% of the projects realised the importance of risk management, while the remaining 30% did not involve risk management at all. This study aims to develop a risk management model for NPD projects in the food industry. The first section of this paper reviews the literature on risk management theory, including international standards for risk and project management (ISO31000 and ISO21500, publications for the Project Management Body of Knowledge (PMBOK, by a professional organisation the Project Management Institute (PMI, and also academic research. 182 academic papers, published between January 2002 and August 2012 were selected. The second part interviews conducted with eight NPD experts from five of the major food manufacturers in Thailand to examine their risk management practices and problems. Conclusions are made on five topics : classification of research method, project type and industrial segment, distribution of articles by region, tools & techniques for risk management and risk factors in projects. Specific requirements of risk management for NPD projects in the food industry are identified. A risk management model and the concept of risk management applications for the food industry are proposed.

  16. The process of Risk management for E-business

    Directory of Open Access Journals (Sweden)

    Erion Lekaj

    2017-07-01

    Full Text Available In the new Internet economy, risk management plays a critical role to protect the organization and its ability to perform their business mission, not just its IT assets. Risk management is the process of identifying risk, assessing risk, and taking steps to reduce risk to an acceptable level. The risk management is an important component of an IT security program. Information and communications technology management and IT security are responsible for ensuring that technology risks are managed appropriately. These risks originate from the deployment and use of IT assets in various ways, such as configuring systems incorrectly or gaining access to restricted soft ware.

  17. A model-based risk management framework

    Energy Technology Data Exchange (ETDEWEB)

    Gran, Bjoern Axel; Fredriksen, Rune

    2002-08-15

    The ongoing research activity addresses these issues through two co-operative activities. The first is the IST funded research project CORAS, where Institutt for energiteknikk takes part as responsible for the work package for Risk Analysis. The main objective of the CORAS project is to develop a framework to support risk assessment of security critical systems. The second, called the Halden Open Dependability Demonstrator (HODD), is established in cooperation between Oestfold University College, local companies and HRP. The objective of HODD is to provide an open-source test bed for testing, teaching and learning about risk analysis methods, risk analysis tools, and fault tolerance techniques. The Inverted Pendulum Control System (IPCON), which main task is to keep a pendulum balanced and controlled, is the first system that has been established. In order to make risk assessment one need to know what a system does, or is intended to do. Furthermore, the risk assessment requires correct descriptions of the system, its context and all relevant features. A basic assumption is that a precise model of this knowledge, based on formal or semi-formal descriptions, such as UML, will facilitate a systematic risk assessment. It is also necessary to have a framework to integrate the different risk assessment methods. The experiences so far support this hypothesis. This report presents CORAS and the CORAS model-based risk management framework, including a preliminary guideline for model-based risk assessment. The CORAS framework for model-based risk analysis offers a structured and systematic approach to identify and assess security issues of ICT systems. From the initial assessment of IPCON, we also believe that the framework is applicable in a safety context. Further work on IPCON, as well as the experiences from the CORAS trials, will provide insight and feedback for further improvements. (Author)

  18. Energy Consumption Management of Virtual Cloud Computing Platform

    Science.gov (United States)

    Li, Lin

    2017-11-01

    For energy consumption management research on virtual cloud computing platforms, energy consumption management of virtual computers and cloud computing platform should be understood deeper. Only in this way can problems faced by energy consumption management be solved. In solving problems, the key to solutions points to data centers with high energy consumption, so people are in great need to use a new scientific technique. Virtualization technology and cloud computing have become powerful tools in people’s real life, work and production because they have strong strength and many advantages. Virtualization technology and cloud computing now is in a rapid developing trend. It has very high resource utilization rate. In this way, the presence of virtualization and cloud computing technologies is very necessary in the constantly developing information age. This paper has summarized, explained and further analyzed energy consumption management questions of the virtual cloud computing platform. It eventually gives people a clearer understanding of energy consumption management of virtual cloud computing platform and brings more help to various aspects of people’s live, work and son on.

  19. Exploring the Key Risk Factors for Application of Cloud Computing in Auditing

    Directory of Open Access Journals (Sweden)

    Kuang-Hua Hu

    2016-08-01

    Full Text Available In the cloud computing information technology environment, cloud computing has some advantages such as lower cost, immediate access to hardware resources, lower IT barriers to innovation, higher scalability, etc., but for the financial audit information flow and processing in the cloud system, CPA (Certified Public Accountant firms need special considerations, for example: system problems, information security and other related issues. Auditing cloud computing applications is the future trend in the CPA firms, given this issue is an important factor for them and very few studies have been conducted to investigate this issue; hence this study seeks to explore the key risk factors for the cloud computing and audit considerations. The dimensions/perspectives of the application of cloud computing audit considerations are huge and cover many criteria/factors. These risk factors are becoming increasingly complex, and interdependent. If the dimensions could be established, the mutually influential relations of the dimensions and criteria determined, and the current execution performance established; a prioritized improvement strategy designed could be constructed to use as a reference for CPA firm management decision making; as well as provide CPA firms with a reference for build auditing cloud computing systems. Empirical results show that key risk factors to consider when using cloud computing in auditing are, in order of priority for improvement: Operations (D, Automating user provisioning (C, Technology Risk (B and Protection system (A.

  20. Risk management at hazardous waste sites

    International Nuclear Information System (INIS)

    Travis, C.C.; Doty, C.B.

    1990-01-01

    The Superfund Amendments and Reauthorization Act of 1986 (SARA) provided the Environmental Protection Agency (EPA) with additional resources and direction for the identification, evaluation, and remediation of hazardous waste sites in the United States. SARA established more stringent requirements for the Superfund program, both in terms of the pace of the program and the types of remedial alternatives selected. The central requirement is that remedial alternatives be ''protective of public health and the environment'' and ''significantly and permanently'' reduce the toxicity, mobility, or volume of contaminants. The mandate also requires that potential risk be considered in the decision-making process. This document discusses risk management at hazardous waste sites. Topics include selection of sites for placement on the National Priority List, risk assessment and the decision process, risk reduction and remedial alternative selection, and aquifer restoration. 10 refs., 2 figs