1 INSE 6320 -- Week 10 • Risk utility or risk tolerance is the amount of satisfaction or pleasure received from a Risk Analysis for Information and Systems Engineering • • • Risk Utility • Project Risk Management • • Dr. A. Ben Hamza 3 Risk Utility potential payoff A utility function shows the relationship between utility and return (or wealth) when the returns are risk-free. It represents a way to translate dollars into “Utility Units”. Risk-Neutral Utility Functions: Investors are indifferent to risk. They only analyze return when making investment decisions. For Risk Neutral person, maximizing EV is the same as maximizing expected utility. Risk-Seeking Utility Functions: For any given rate of return, investors prefer more risk. Risk-Averse Utility Functions: For any given rate of return, investors prefer less risk. Concordia University 2 Risk Management Process • 4 Risk Utility Risk Uncertain or chance events that planning cannot overcome or control. Basic decision on expected values (EVs) is convenient, but it can lead to decision that may not seem intuitively appealing. Using expected Values to make decision means that the decision maker is considering only the average payoff EV does not capture the risk attitudes. • Payoff (0.5) EV=$14.5 Game 1 EV=$50 (0.5) (0.5) $30 -$1 Which game would you choose, game 1 or game 2? $2,000 Game 2 (0.5) -$1,900 Risk Management A proactive attempt to recognize and manage internal events and external threats that affect the likelihood of a project’s success. If expected value (EV) is the basis for the decision, you should choose Game 2. Most of us, however, may consider Game 2 to be too risky and thus choose Game 1. This example illustrates that EV analysis does not capture risk attitudes of decision makers. Individuals who are afraid of risk or are sensitive to risk are called risk-averse. 5 Utility Function • • 7 Risk Attitude (Cont.) Utility functions are models of an individual’s attitude toward risk Utility functions translate dollars into utility units, and might be specified in terms of : Graph Table Mathematical expression U( x ) log( x), U( x ) Utility Risk-Neutral Risk-Seeking Risk-Averse x Utility Dollars U(x) A utility function that displays risk-aversion (upward sloping and concave) Shapes of Utility Functions of Three Different Risk Attitudes • Dollars x The purpose of a utility function is to help decision maker choose from among alternatives that have uncertain payoffs. 6 Some Terminologies Risk Attitude • Risk-Averse: Afraid or Sensitive to Risk Would trade a gamble for a sure amount that is less than the expected value of the gamble U(x) is a concave (opening downward) curve x U( x ) x • (continuous) U(x Δ x) U(x) U(Δ x) (discrete) Risk-Neutral: An EV Decision Maker Maximizing utility is the same as maximizing EV U(x) is a straight line U( x ) is constant x (continuous) U ( x Δ x ) U( x ) U(Δ x ) (discrete) Expected Utility (EU) Weighted average of utilities of all possible states. Instead of maximizing expected value, the decision maker should maximize expected utility. • (continuous) U ( x Δ x ) U( x ) U(Δ x) (discrete) Risk-Seeking: Willing to Accept More Risk Would play a state lottery U(x) is a convex (opening upward) curve x U ( x ) x 8 Certainty equivalent (CE) Amount of money that is equivalent in your mind to a given situation that involves uncertainty. Certainty equivalent is a dollar amount, whereas expected utility is in utility units. • Risk Premium Difference between the EV and the CE, i.e., the amount you would pay to avoid the risk. Premium can be thought of as a measure of how risk-averse a decision maker is in regard to a particular risky situation. You have a lottery which has 0.3 probability of winning $200 and 0.7 probability of losing $10, and you are willing to sell it for $30. Your certainty equivalent for this lottery is $30 The risk premium of the lottery is: (0.3*200+0.7*(-10))-30 =53-30=$23 9 Utility Function Assessment Via Certainty Equivalence Utility U(CE) = EU Expected Utility (EU) 11 Utility Curve • Step 1: set the utility of the best payoff to 1 and the utility of the worst payoff to 0 Step 2: Construct a situation that involves uncertainty and find its CE using reference lottery. Step 3: Calculate the expected utility of the lottery, EU. Because EU is equal to U(CE), we get another point (CE, EU) on the utility curve Step 4: Repeat Steps 2 and 3 until getting enough points to plot the utility curve Risk Premium Certainty EV Equivalent (CE) Assess several certainty equivalents from which the utility function is derived Dollar Graphical Representation of Expected Utility, Certainty Equivalent, and Risk Premium For a risk-seeking person, CE would be on the right side of EV on the horizontal axis 10 Utility Function Assessment • Assessing a Utility Function is a Subjective Judgment, just like assessing subjective probability Different people have different risk attitudes toward risk and are willing to accept different levels of risk • Two Utility Assessment Methods: Assessment using certainty equivalent • Requires the decision maker to assess several certainty equivalents Assessment using probabilities 12 You face an uncertain situation in which you may earn $10 in the worst case, $100 in the best case, or some amount in between. You have a variety of options, each of which leads to some uncertain payoff between $10 and $100. To evaluate the alternatives, you must assess your utility for payoffs from $10 to $100. Step 1: let U(10)=0 and U(100)=1 Step 2: imagine you have the opportunity to play the following reference lottery A B (0.5) $100 (0.5) $10 Suppose your CE in this lottery is $30 CE Step 3: Calculate EU of lottery A, which is 0.5∙U(100)+0.5∙U(10)=0.5. Therefore, U(30)=0.5 and you have found a third point on your utility curve. • This approach use the probability-equivalent (PE) for assessment technique Step 4: To find another point, you can take a different reference lottery, say using $100 and $30 as two equally likely outcomes in lottery A, and then follow steps 2 and 3. Continue with the same procedures until you have enough points to plot the utility function. 13 15 Risk Tolerance and Exponential Utility Function Suppose you now have five points on your utility curves: U(10)=0, U(18)=0.25, U(30)=0.5, U(50)=0.75, and U(100)=1, you can plot the utility function • Exponential Utility Function U ( x) 1 e x R U(x) R is risk tolerance, showing how risk-averse the function is. Larger R means less risk-aversion and makes the utility function flatter 1 0.9 0.8 0.7 0.6 x (Dollars) R=1 0.5 R=3 0.4 R=5 0.3 Exponential Utility Functions with Three Different Risk Tolerances 0.2 0.1 0 0 1 2 3 4 5 6 7 8 10 11 12 12 14 15 x ↑ => U(x) →1 x =0 => U(x) = 0 14 Utility Function Assessment Via Probability-Equivalent • • Assess the utility of a selected dollar amount directly Adjust the probability in the reference lottery (p) C D (1-p) 16 Risk Tolerance and Exponential Utility Function (Cont.) Assess Risk Tolerance R (0.5) E $100 $10 F (0.5) $Y – $Y/2 $0 $65 U(65) = p∙U(100) + (1-p)∙U(10) = p∙1+(1-p)∙0 = p The largest Y for which you prefer to take gamble E is approximately equal to your risk tolerance Suppose you decide Y is $900, then R=900, and your utility function is U ( x ) 1 e x / 900 17 Risk Tolerance and Exponential Utility Function (Cont.) • It is a fact of life that chance events will occur and affect the outcome of your project • Murphy’s Laws codify this “knowledge” Find CE of Given Uncertain Event 19 Why manage risks? First calculate the expected utility (EU) of the uncertain event Since U(CE)=EU, you can solve the equation to get CE If anything can go wrong, it will! Of things that could go wrong, the one that causes the most damage will occur! 2 If you estimate the expected value, , and variance, , of the payoffs, then CE 2 can be approximately calculated as: CE 0.5R Example: Suppose you face the following gamble: 1) win $2000 with probability 0.4; 2) win $1000 with probability 0.4, or 3) win $500 with probability 0.2, and your utility can be modeled as an exponential function with R=900. What is your CE of this gamble? The expected utility of the gamble is: EU = 0.4∙U($2000)+0.4 ∙U($1000 )+ 0.2∙U($500) = 0.4∙(1-e-2000/900) +0.4 ∙(1-e-1000/900)+ 0.2∙(1-e -500/900) = 0.710 1982 Darwin Award Honorable Mention giv en to “Lawn Chair” Larry W alters. Cartoon by Jay Ziebarth, 2002 • Project risks are defined as the undesirable event, the chance this event might occur and the consequences of all possible outcomes • Risk management attempts to identify such events, minimize their impact & provide a response if the event is detected – The essence of Project Management is Risk Management! Solve 0.710=1-e-CE/900 for CE, you can get CE=$1114.71 18 What is Risk Management? Risk management is a continuous and iterative decision making technique designed to improve the probability of success. It is a proactive approach that: • • • • • • • Seeks or identifies risks Assesses the likelihood and impact of these risks Develops mitigation options for all identified risks Identifies the most significant risks and chooses which mitigation options to implement Tracks progress to confirm that cumulative project risk is indeed declining Communicates and documents the project risk status Repeats this process throughout the project life 20 The Importance of Project Risk Management • Project risk management is the art and science of identifying, analyzing, and responding to risk throughout the life of a project and in the best interests of meeting project objectives. • Risk management is often overlooked in projects, but it can help improve project success by helping select good projects, determining project scope, and developing realistic estimates. • • • • • A proactive rather than reactive approach. Reduces surprises and negative consequences. Prepares the project manager to take advantage of appropriate risks. Provides better control over the future. Improves chances of reaching project performance objectives within budget and on time. Risk Management Considers the Entire Development and Operations Life of a Project 21 23 ISO 27000 Security Standards Risk Type Examples • Technical Performance Risk • Failure to meet a spacecraft technical requirement or • Cost Risk • Programmatic Risk • Failure to stay within a cost cap for the project • Failure to secure long-term political support • Schedule Risk • Failure to meet a critical launch window (ISO17799) • Liability Risk • Spacecraft deorbits prematurely causing damage over ISO27003 ISO27000 specification during verification ISO27001 ISO27002 the debris footprint • Regulatory Risk • Operational Risk • Safety Risk • Supportability Risk ISO27004 • Failure to secure proper approvals for launch of nuclear materials • Failure of spacecraft during mission ISO27005 • Hazardous material release while fueling during ground operations ISO13335 • Failure to resupply sufficient material to support human presence as planned 22 IT Security Management IT Security Management: a process used to achieve and maintain appropriate levels of confidentiality, integrity, availability, accountability, authenticity and reliability. IT security management functions include: organizational IT security objectives, strategies and policies determining organizational IT security requirements identifying and analyzing security threats to IT assets identifying and analyzing risks specifying appropriate safeguards monitoring the implementation and operation of safeguards developing and implement a security awareness program detecting and reacting to incidents a proposed standard which will define the vocabulary and definitions used in the 27000 family of standards. defines the information security management system specification and requirements against which organizations are formally certified. It replaces the older Australian and British national standards AS7799.2 and BS7799.2. currently published and better known as ISO17799, this standard specifies a code of practice detailing a comprehensive set of information security control objectives and a menu of best-practice security controls. It replaces the older Australian and British national standards AS7799.1 and BS7799.1. a proposed standard containing implementation guidance on the use of the 27000 series of standards following the “Plan-Do-Check-Act” process quality cycle. Publication is proposed for late 2008. a draft standard on information security management measurement to help organizations measure and report the effectiveness of their information security management systems. It will address both the security management processes and controls. Publication is proposed for 2007. a proposed standard on information security risk management. It will replace the recently released British national standard BS7799.3. Publication is proposed for 2008/9. provides guidance on the management of IT security. This standard comprises a number of parts. Part 1 defines concepts and models for information and communications technology security management. Part 2, currently in draft, will provide operational guidance on ICT security. These replace the older series of 5 technical reports ISO/IEC TR 13335 parts 1-5. 24 Risk Management Steps • There are four major steps to developing a risk management plan 1. Identify all the possible risk events that could affect the project 2. Assess each risk in terms of probability, impact severity and controllability 3. Develop a strategy and/or contingency for responding to each risk 4. Monitor and control risks dynamically • • A Risk Management Plan should be developed during the initial project phase and immediately implemented The plan should reviewed & revised as needed during each project phase 25 Identify the project risks • • • Assessing the Risk Impact • • Generate list of all possible risks by “brainstorming” among team members Do not attempt to assess risk probability; that is for a later step Focus on risk events, rather than risk consequences 27 Not all risks need to be subject to monitoring and control Use a Scenario Analysis to assess the risk event impact Determine all consequences and their severity if the event happens Identify when, during the project, will the event likely happen Estimate the probability that the risk event will occur Determine how difficult it will be to detect the event occurrence For example, “instrument does not return correct data” is a consequence of events like poor circuit design, incorrect or failed components, poor software implementation • • First focus on overall project risks, then identify specific risks Lessons from past projects are captured via ‘trigger questions’, or questions that challenge a development strategy or design solution • • Seek input from sources from outside your group Emphasize critical thinking and remember Murphy’s Laws Failure Mode and Effects Analysis (FMEA) Impact × Probability × Detection = Risk Value 26 Risk Assessment Matrix Ranking the Risk Importance • Rank risks from those that can be neglected Likelihood of Occurrence Harm is certain or near certain to occur Harm will often occur Harm will seldom occur Likelihood Level High 3 Medium 2 Low 1 • to those that require elevated vigilance A Risk Severity Matrix can be helpful in prioritizing risks Plot of event probability versus impact Severity of Harm Severity Level Death or major injury (as defined by RIDDOR) Major 3 3 day injury or illness (as defined by RIDDOR) Serious 2 All other injuries or illnesses Slight 1 • Red zone identifies the most important • Risk = Severity x Likelihood • Likelihood Severity Slight 1 Serious 2 Major 3 1 Low (1) Low (2) Medium( 3) Medium 2 Low (2) Medium (4) High (6) High Medium (3) High (6) High (9) Low 3 • events Yellow zone lists risks that are moderately important Green zone events probably can be safely ignored Note that the zones are not symmetrical across the matrix – High impact low probability events much more important than likely low impact events 28 Risk During the Project • 29 Develop a Response for Risks Risk and the associated cost to address the risk, varies over the project life cycle • For initial phase there is high chance of risk events, but low cost impact For final phase there is low chance of risk events, but cost impact is high • A risk response plan identifies the primary components necessary for managing the risk Identifying and managing risks will greatly affect project success 31 What response strategy will be used How will the risk event be detected and the response triggered What plan will be put in place in response to the event Who will be responsible for monitoring and controlling the risk The Risk Event Graph Risk Response Strategies • Mitigating risk Actions are taken during the project to either A) reduce the likelihood of a risk, or B) reduce the impact of the risk For example, testing electrical components after receipt would reduce the likelihood that “bad” parts would be used in a circuit • Retaining risk Usually for events with low probability but high impact when no alternate strategy is feasible Have a contingency plan ready in case event occurs • 30 32 Contingency Planning • Can be mitigated by building and testing prototypes of critical components Have available backup or alternate designs that have much lower risk • • Sharing risk Risks associated with costs usually result from estimate errors and omissions Time & cost are related; trade-off schedule delays with lower cost “Descope” options that remove components of the project, but still allow the primary mission to proceed Transferring risk Risk is assumed and managed by a unit outside the immediate project For example, risks associated with the balloon vehicle are transferred to the LA ACES Project management Risks associated with the schedule usually require a trade-off Manage “slack” time to provide resources for delayed components Bring in more people (increase costs) or reduce performance Multiple units associated with the project assume some portion of the risk • Risks associated with the technical aspects of a project can have the most sever outcomes • All “budgets” (mass, power, schedule, cost) should include a reserve percentage that can be expended as risk events occur 33 Risk and Contingency Planning • 35 Partial Risk Profile for Product Development Project Technical Risks Backup strategies if chosen technology fails. Assessing whether technical uncertainties can be resolved. • Schedule Risks Use of slack increases the risk of a late project finish. Imposed duration dates (absolute project finish date) Compression of project schedules due to a shortened project duration date. Risk Response Matrix 34 The Risk Breakdown Structure (RBS) 36 Risk Response Process Control • • The Risk Management Plan should specify the risks, risk responses, and mechanisms used to control the process Need to continuously monitor for risk triggers Potential risk events should be identified early in a project and monitoring for such events immediately commence • Each risk is assigned to a specific person Has the expertise & authority to identify & response to an event • • Need environment where problems are readily reported, embraced & solved Changes in any aspect of the project need to be documented and communicated Who will have the authority to approve a change Use written form to track hardware, software & document changes Who is notified of what changes when
© Copyright 2026 Paperzz