Qualitative Risk Assessment Risk Analysis for Water Resources Planning and Management Institute for Water Resources 2008.

Slides:



Advertisements
Similar presentations
Museum Presentation Intermuseum Conservation Association.
Advertisements

Risk Analysis Fundamentals and Application Robert L. Griffin International Plant Protection Convention Food and Agriculture Organization of the UN.
Risk Management Introduction Risk Management Fundamentals
Comparative Emergency Management
Determining the Significant Aspects
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
Note: See the text itself for full citations. Information Technology Project Management, Seventh Edition.
INDEPENDENT ENVIRONMENTAL ENGINEERS, SCIENTISTS AND CONSULTANTS MEC Hazard Assessment Former Kirtland Precision Bombing Range Albuquerque, NM Erin Caruso,
Threat/Vulnerability Assessments for Foods FDA Science Board Advisory Committee Meeting November 6, 2003 Robert E. Brackett, Ph.D. Director, Food Safety.
Integrated Risk Management and Risk Communications David DeGagne, Executive Director Centre for Risk Management Tel: Fax: Web:
Session 8: Modeling the Vulnerability of Targets to Threats of Terrorism 1 Session 8 Modeling the Vulnerability of Targets to Threats of Terrorism John.
An Approach to Evaluate Data Trustworthiness Based on Data Provenance Department of Computer Science Purdue University.
COMP8130 and COMP4130 Adrian Marshall Verification and Validation Risk Management Adrian Marshall.
Streamlined LCA © Colin Fitzpatrick. Streamlining the LCA Process Full LCA is only practical with no limitations to time, expense, data availability etc…
1 Risk evaluation Risk treatment. 2 Risk Management Process Risk Management Process.
Lecture 7 Evaluation. Purpose Assessment of the result Against requirements Qualitative Quantitative User trials Etc Assessment of and Reflection on process.
Title slide PIPELINE QRA SEMINAR. PIPELINE RISK ASSESSMENT INTRODUCTION TO GENERAL RISK MANAGEMENT 2.
The Information Systems Audit Process
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Tony Gould Quality Risk Management. 2 | PQ Workshop, Abu Dhabi | October 2010 Introduction Risk management is not new – we do it informally all the time.
TIWANA WALTON MENTOR: SHARON MONICA JONES High Level Aviation Safety Risk Assessment.
Actionable Process Steps and Focused Mitigation Strategies
FAO/WHO CODEX TRAINING PACKAGE
Introduction to Network Defense
NACMPI November 15-16, 2005 Risk-Based Inspection Dr. Barbara Masters Administrator, Food Safety and Inspection Service Philip Derfler Assistant Administrator,
Effective Methods for Software and Systems Integration
«Enhance of ship safety based on maintenance strategies by applying of Analytic Hierarchy Process» DAGKINIS IOANNIS, Dr. NIKITAKOS NIKITAS University of.
PRM 702 Project Risk Management Lecture #28
STUDY PLANNING & DESIGN TO ENHANCE TRANSLATION OF HEALTH BEHAVIOR RESEARCH Lisa Klesges, Russell Glasgow, Paul Estabrooks, David Dzewaltowski, Sheana Bull.
Risk Management & Liability Informa Brownfield Hospital Development Summit June 2009.
Lecture 32 Risk Management (Cont’d)
© Prentice Hall, Modern Management 9 th edition.
Risk Management - the process of identifying and controlling hazards to protect the force.  It’s five steps represent a logical thought process from.
 RESEARCH TOPIC  Read and analyze FUTURE SCENE  I. IDENTIFY CHALLENGES  II. SELECT AN UNDERLYING PROBLEM  III. PRODUCE SOLUTION IDEAS  IV. SELECT.
Introduction to Risk Management C7 Slide 1. The Concept of Safety  ‘Safety’ refers to the reduction of risk to a tolerable level  Risk = Likelihood.
“ Building Strong “ Delivering Integrated, Sustainable, Water Resources Solutions Qualitative Risk Assessment Charles Yoe, PhD Institute.
Qualitative Risk Assessment Charles Yoe, PhD Institute for Water Resources 2009.
Management & Development of Complex Projects Course Code MS Project Management Perform Qualitative Risk Analysis Lecture # 25.
INFORMATION SECURITY MANAGEMENT L ECTURE 7: R ISK M ANAGEMENT I DENTIFYING AND A SSESSING R ISK You got to be careful if you don’t know where you’re going,
Integrated Risk Management Charles Yoe, PhD Institute for Water Resources 2009.
THE LOW DOWN ON RISK ASSESSMENT HOW SAFE ARE OUR CITIES?
Question? Which lock gates in division present the greatest potential risk to health and safety and therefore should be repaired first?
INTRODUCTION TO COLLECT PRIORITIES 2014 v COLLECT.
Qualitative Risk Assessment
SOFTWARE PROJECT MANAGEMENT
The Risk Management Process
Engineering | Architecture | Design-Build | Surveying | Planning | GeoSpatial Solutions November 16, 2015 THE AWWA J100 - WHAT IT IS, WHY IT IS BEING UPDATED,
WHAT IF ANALYSIS USED TO IDENTIFY HAZARDS HAZARDOUS EVENTS
Session 7 Crisis and Risk Communication Session 7 Slide Deck Slide 7-1.
RISK MANAGEMENT FOR COMMUNITY EVENTS. Today’s Session Risk Management – why is it important? Risk Management and Risk Assessment concepts Steps in the.
Laboratory Decommissioning : Essential Tools and Lessons Learned Jim Carscadden Division of Environmental Protection Office of Research Facilities.
ON “SOFTWARE ENGINEERING” SUBJECT TOPIC “RISK ANALYSIS AND MANAGEMENT” MASTER OF COMPUTER APPLICATION (5th Semester) Presented by: ANOOP GANGWAR SRMSCET,
Computer Science / Risk Management and Risk Assessment Nathan Singleton.
Risk Assessment: A Practical Guide to Assessing Operational Risk
Risk Assessment: A Practical Guide to Assessing Operational Risk
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
Presenters Robert “RJ” Hope, CPP Kevin Whaley
Analysis Manager Training Module
Risk Assessment OSHA 21/09/ WHAT IS RISK ASSESMENT? Risk Assessment is the process of determining the possibility of short and long term unfavorable.
Risk Assessment.
Improvement Selection:
Quality Risk Management
Air Carrier Continuing Analysis and Surveillance System (CASS)
Hazards Planning and Risk Management Risk Analysis and Assessment
Measuring Data Quality and Compilation of Metadata
TERRORIST PROTECTION PLANNING USING A RELATIVE RISK REDUCTION APPROACH
Facilities Planning and Design Course code:
Yves Goulet Director, National Fisheries Intelligence Service
A New Concept for Laboratory Quality Management Systems
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Presentation transcript:

Qualitative Risk Assessment Risk Analysis for Water Resources Planning and Management Institute for Water Resources 2008

Risk Assessment What can go wrong? How can it happen? How likely is it? What are the consequences?

Want to Improve Your Risk Analysis? Use simple narratives that answer these questions honestly Tell story of existing risk Tell story of residual or transformed risk

The Need Manage risk intentionally Do better than has been done Quantitative risk assessment not always possible or necessary Qualitative risk assessment can be a viable option

Qualitative Risk Assessment Is formal, organized, reproducible method based on science and sound evidence Flexible Easy to explain to others Supports risk management decision making

Three Sample Methods Enhanced Criteria Ranking Operational Risk Management (Risk Matrix) CARVER + Shock

Enhanced Criteria Based Ranking Criteria Ratings All Possible Combinations of Ratings Ranking Evaluate Reasonableness of Ranking Add Criteria New Combinations of Ratings New Ranking

Question? Which lock gates in division present the greatest potential risk to health and safety and therefore should be repaired first?

Step One: Criteria Assume criteria equally important (or not). Reflect most important aspects of evaluating risk. Define H, M, L scenarios for each criterion. Use three or four evidence-based criteria.

Step Two: Rating Use expert judgment to critically evaluate the available information Develop estimates for each “hazard” against criteria Use letters or numbers but numbers do not represent an absolute measurement of risk only a relative means for comparison

Step Three: All Possible Combinations Greatest RiskHHH HHM, HMH, MHH HHL, HLH, LHH, HMM, MMH, MHM HLM, MHL, HML, LMH, MLH, MMM, LHM HLL, LHL, LLH, MML, LMM, MLM MLL, LML, LLM Least RiskLLL This is for equally weighted criteria. Unequal weights yield different listings.

Step Four: Rank Subjectively Establish rank according to descending relative risk Identify subjective clusters.

Step Five: Add Criteria? Look at rankings, do they make sense? Have you thought properly about this issue? If they do not, perhaps you did not consider all the most relevant criteria A new criteria may be added to more accurately reflect the assessors rationale for ranking

Step Five: Add Criteria? (cont) Suppose the following was added to our example Criterion 4: Cost of emergency repair H = Major disruptions to navigation or power, much higher costs to repair M = Much higher costs to repair L = Same as scheduled repair

Step Six: New Ratings

Step Seven: New Ranking

Operational Risk Management (ORM)

ORM AKA the risk matrix Risk ranking tool Uses ranges of consequence and likelihood Combinations created enable assessors to qualitatively estimate a risk

Steps Determine purpose and use of matrix Identify the question to be answered Define consequences of interest Identify consequence ranges and definitions Identify likelihood ranges and definitions Identify levels of risk in the cells of the matrix

Your DE Has Seen This “Mishap Risk” DOD "Standard Practice For System Safety” MIL-STD-882D 10 February 2000

Consequence Severities

Probability Levels

Risk Assessment Values Each risk you assess is placed in a cell and managed accordingly

Risk Levels

Another Example Source: Assessing Environmental Risk, A Lecture to the Irish Environmental Law Association By: L. M. Ó Cléirigh 29 June 2004

Risk Matrix

Three Axioms Weak consistency Betweenness Consistent coloring 3x3 and 4x4 should look like this to minimize problems Source: What’s wrong with risk Matrices? By Louis Anthony Cox, Risk Analysis Vol. 28 No.2, 2008

The Risk Management Point of Matrix

CARVER + Shock Vulnerability assessment method developed for Department of Defense CARVER is an acronym Criticality - measure of public health and economic impacts of an attack Accessibility – ability to physically access and egress from target Recuperability – ability of system to recover from an attack Vulnerability – ease of accomplishing attack Effect – amount of direct loss from an attack as measured by loss in production Recognizability – ease of identifying target

SHOCK Technique modified to include seventh attribute that combines health, economic, and psychological impacts of an attack SHOCK attributes of target

Select a Process Identify a critical process or infrastructure and assess vulnerability across nation, or Assess vulnerability of components of a single process

Critical A target is critical when “loss” would have significant life, health or economic impacts

Accessibility A target is accessible when an “attacker” can reach it to conduct the attack and then escape the target undetected

Recuperability The time it will take for the specific facility to recover productivity is the target’s recuperability

Vulnerability Vulnerability measures the ease with which sufficient quantities of threat agents can be introduced to achieve the attacker’s purpose once the target has been accessed

Effect Effect is the percentage of system productivity damaged by an attack at a single facility

Recognizability Recognizability is the extent to which the target can be identified by an attacker without confusing it with other targets or components

Shock Shock combines the measure of the health, psychological, and collateral national economic impacts of a successful attack on the target system

Sandia Labs User friendly software has been developed for food defense by FDA and Sandia Process diagrams Interviews Results

Take Away Points Not all risk assessment needs to be quantitative Develop a few consistent and well developed techniques for your usage